Re: [Captive-portals] Alternative authentication mechanism to meet captive portal needs?

"Roscoe, Alexander" <Alexander_Roscoe@cable.comcast.com> Fri, 09 October 2015 15:16 UTC

Return-Path: <Alexander_Roscoe@cable.comcast.com>
X-Original-To: captive-portals@ietfa.amsl.com
Delivered-To: captive-portals@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B79FF1B4360 for <captive-portals@ietfa.amsl.com>; Fri, 9 Oct 2015 08:16:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.225
X-Spam-Level:
X-Spam-Status: No, score=0.225 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_MODEMCABLE=0.768, HOST_EQ_MODEMCABLE=1.368, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OhdblXH2NBXX for <captive-portals@ietfa.amsl.com>; Fri, 9 Oct 2015 08:16:11 -0700 (PDT)
Received: from pacdcmhout01.cable.comcast.com (PACDCMHOUT01.cable.comcast.com [68.87.31.167]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 185331A6FDD for <captive-portals@ietf.org>; Fri, 9 Oct 2015 08:16:10 -0700 (PDT)
X-AuditID: 44571fa7-f79816d000006eef-0c-5617da385ef4
Received: from PACDCEXHUB03.cable.comcast.com (cas-umc02.ndceast.pa.bo.comcast.net [68.87.34.28]) (using TLS with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) by pacdcmhout01.cable.comcast.com (SMTP Gateway) with SMTP id 66.DA.28399.83AD7165; Fri, 9 Oct 2015 11:16:08 -0400 (EDT)
Received: from VAADCEX04.cable.comcast.com (147.191.102.71) by pacdcexhub03.cable.comcast.com (24.40.56.116) with Microsoft SMTP Server (TLS) id 14.3.181.6; Fri, 9 Oct 2015 11:15:42 -0400
Received: from VAADCEX01.cable.comcast.com (147.191.102.68) by VAADCEX04.cable.comcast.com (147.191.102.71) with Microsoft SMTP Server (TLS) id 15.0.1044.25; Fri, 9 Oct 2015 11:15:42 -0400
Received: from VAADCEX01.cable.comcast.com ([fe80::3aea:a7ff:fe12:e288]) by VAADCEX01.cable.comcast.com ([fe80::3aea:a7ff:fe12:e288%19]) with mapi id 15.00.1044.021; Fri, 9 Oct 2015 11:15:41 -0400
From: "Roscoe, Alexander" <Alexander_Roscoe@cable.comcast.com>
To: "stefan.winter@restena.lu" <stefan.winter@restena.lu>, David Illsley <davidillsley@gmail.com>
Thread-Topic: [Captive-portals] Alternative authentication mechanism to meet captive portal needs?
Thread-Index: AQHRAqL0X8VBV07vZ0Sx+OSlbbNqQJ5jRXmA
Date: Fri, 09 Oct 2015 15:15:41 +0000
Message-ID: <D23D501C.11462%alexander_roscoe@cable.comcast.com>
References: <CA+E3Fw1TZc_c7RoiSYc12TA9hga=khLf=+mqdhQZT_8ufVDZ3g@mail.gmail.com> <20151009165819.Horde.xZudPsE-5k0pLb5RjGPfsA1@staffmail.restena.lu>
In-Reply-To: <20151009165819.Horde.xZudPsE-5k0pLb5RjGPfsA1@staffmail.restena.lu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [68.87.29.8]
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <7739C52240D8734C99A863E156DEE776@cable.comcast.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Forward
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFnrPIsWRmVeSWpSXmKPExsXiEq4ko2txSzzMYMNbbYu5sxpYLa692M1u Ma+hkd2B2WPnrLvsHkuW/GTyWN7lE8AcxWWTkpqTWZZapG+XwJWxuO8rS8E8yYpVixeyNjDu Euli5OSQEDCR+Nx4lQXCFpO4cG89WxcjF4eQwC4miY2NXxhBEkIC+xklvq5TgUgcYJT4MH8K K4RzglFi95UeoBYODjYBO4mF+xxBGkQEkiXW/W0Fm8osYCmx8+V6JhBbGCj+Y9YhJpByEYEU iU0X8iHKjSRenZnCBmKzCKhI/Pz1mR3E5hWwlzj9vwHqoGmMEh3THoEVcQoESHycugNsJiPQ 1d9PrWGC2CUucevJfCaIbwQkluw5zwxhi0q8fPyPFcI2kNi6dB/Ux3ISPTtaGSF69SRuTIU4 glnAQWLDhNvsELa2xLKFr5khDhKUODnzCQskUPQl1rbcgtolLnH4yA7WCYwys5CcMQvJ2FlI xs5CMnYWkrELGFlXMcoVJCanJOdm5JeWGBjqJScm5aTqJefnJicWl4DoTYzgZCC/fAfjvRdO hxgFOBiVeHhVDouHCbEmlhVX5h5ilOBgVhLhPXUeKMSbklhZlVqUH19UmpNafIhRmoNFSZx3 871foUIC6YklqdmpqQWpRTBZJg5OqQbG/Tz/Izmd58mrC56bon3Wdsph+zVvP9kLdRofurx6 V/0RqYU6fLr7rP54ZX/UW+pv+8LzaKBlXLq4ipTn1rMbNgSLbXTa29UzZfnCtZseKDTHcBUz CAf6Jby7v+dc+qfkIys3bSu9mKXa1Kk8w+yLwezKd7aLqvLtU1QrPPbMWvf53LUgwb6jSizF GYmGWsxFxYkAJayImAIDAAA=
Archived-At: <http://mailarchive.ietf.org/arch/msg/captive-portals/Q6SeJzZo_OgrY6lL62I52wHH8vc>
Cc: "captive-portals@ietf.org" <captive-portals@ietf.org>
Subject: Re: [Captive-portals] Alternative authentication mechanism to meet captive portal needs?
X-BeenThere: captive-portals@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Discussion of issues related to captive portals <captive-portals.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/captive-portals>, <mailto:captive-portals-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/captive-portals/>
List-Post: <mailto:captive-portals@ietf.org>
List-Help: <mailto:captive-portals-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/captive-portals>, <mailto:captive-portals-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Oct 2015 15:16:12 -0000

I really think we need to focus on upgrading the security of the user
during authentication. Security was echoed by many participants in Prague.
The two main issues are an unsecured physical link and the authorization
by MAC address.  I think Hotspot 2.0 and Passpoint can help solve both of
these issues. I think the role of a captive portal should be to shepherd
the user into upgrading their security during authentication.

I have just rolled out our mobile provisioning configuration via the
captive portal and it was a headache between both iOS and Andriod.  It
would be nice if we can come up with a standard on provisioning these
mobile configs during authentication.  The limited iOS captive portal mode
is a bit clunky during the process but it still works.  The recent version
of the captive portal browser in Android just made it difficult to install
provisioning configurations.


-- 
Alexander Roscoe
Comcast - Wireless Engineer
Phone ­ 215.286.7283
Cell ­ 215.609.2691





On 10/9/15, 10:58 AM, "stefan.winter@restena.lu"
<stefan.winter@restena.lu> wrote:

>Hello,
>
>being a huge EAP-based roaming consortium, eduroam is facing those
>same ToU/branding questions.
>
>We settled for an out-of-EAP approach to show logo and ToU during the
>provisioning phase.
>
>Take a look at  
>https://datatracker.ietf.org/doc/draft-winter-opsawg-eap-metadata/
>
>This is a config file for EAP-based networks. It includes schema
>elements / yang nodes to embed ToU, Logo, helpdesk contact details,
>operator friendly name etc.
>
>An installer program that gets fed with such a config file can display
>the logo, ToU and similar before actually pushing the EAP type
>settings to the device; and from then on just be a normal 802.11i
>network.
>
>There is already an Android app and a Linux installation script that
>consumes the file format; we are also currently working on a Windows
>version.
>
>Apple's mobileconfig files also have a way to embed Terms of Use - but
>no logo.
>
>The only remaining problem then is that the config needs to get to the
>device in the first place - which means in most cases that you need a
>captive portal which only allows to download the config for the "real"
>network.
>
>Hotspot 2.0 was designed with that use case in mind, but for wired
>networks, you are a bit more on your own.
>
>Greetings,
>
>Stefan Winter
>
>Zitat von David Illsley <davidillsley@gmail.com>:
>
>> Hi all,
>> Apologies if this is a silly question (and if I missed it in the
>>archives).
>> Has anyone (anywhere) considered if there's a new (EAP?) authentication
>> mechanism that would meet at least some of the needs of deployers of
>> captive portals? eg allow users to agree to an acceptable use policy,
>>see a
>> logo, and enter their email address?
>>
>> I know its potentially a bigger change than some of the others
>>suggested,
>> but if these requirements aren't going anywhere, it might be worth the
>> long-term investment.
>>
>> David
>
>
>
>_______________________________________________
>Captive-portals mailing list
>Captive-portals@ietf.org
>https://www.ietf.org/mailman/listinfo/captive-portals
>