-
Notifications
You must be signed in to change notification settings - Fork 320
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Blocking HTTPs traffic #287
Comments
Actually my issue is similar to this post but what as I see, that guy also didn't get an answer, how it can be done in a proper way |
The short answer is that as the web moves away from http towards systematic use of https, and content delivery networks (CDN) this is becoming increasingly hard to do, and there is an increasing amount of complex code to write. Basically one needs many additional features for this to work seamlessly:
(ok, not that short an answer it seems) |
Thanks a lot Benoit for your quick reply. What is your personal opinion? |
It really depends on WHY you are doing it. However, if for some reason you will have a RADIUS server anyway, you may be better served by a radius-centric solution like https://github.com/coova/coova-chilli |
Our primary aim is to prevent user from accessing internet until he passes
verification process.
On login we show captive portal with login buttons and after we show some
marketing features, like survey, or sponsored ads and etc.
But we noticed that sometimes combination of Lede and Wifidog not very
stable within big number of connections. Our competitors are mainly using
Radius server for the same reason but we don’t like that it purely work on
Java.
On Thu, Jan 11, 2018 at 11:21 PM Benoit Grégoire ***@***.***> wrote:
It really depends on WHY you are doing it.
However, if for some reason you will have a RADIUS server anyway, you may
be better served by a radius-centric solution like
https://github.com/coova/coova-chilli
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#287 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AKGvGMRGbg_SKJOCi0ZiDrs3hPvlRm16ks5tJl8ngaJpZM4Ra72Z>
.
--
Thank you and regards,
Ruslan Nicolaev
<http://www.maptomedia.com/>
|
hello ## about wifidog performance with all of the above, it's a bit better. but still far away from the performace of the "appfree" fork of wifidog. this is done by a chinese team. but uses a "custom"version of SSL for compilation, wich is fishy. it's mostly in chinese, but the english parts allows comprehension. Wifidog :
Appfree
## About portal detection if you really want to desactivate portal detection form cell phones and new OS, add this in your wifidog.conf file.
Note : its add new kind of problems. especially if the people are using an https start page. for this reason I usually i just leave open the 443 in "unknown users" Also, if you check the logs, you will see that wifidog check each line each time a client connects, so it adds charge on CPU/ram/etc
|
Is there any way to block incoming HTTPs traffic except Facebook, because we are using facebook login button in our captive portal. But the problem is that we can't specify entire list of fb domains with one command like (www.facebook.com*). And if you will not allow all domains for Facebook the login page display incorrectly.
Your advise will be highly appreciated. As far as I know this can be easily done using radius server because radius server uses DNS from the router. But unfortunately we are not using radius server.
The text was updated successfully, but these errors were encountered: