I agree that the information you describe should be pulled from somewhere, however, I am more concerned _when_ they should be pulled.
In this working group we acknowledged (welcomed) use cases that go beyond connecting to a network; the latest example: https://www.ietf.org/mail-archive/web/captive-portals/current/msg00455.html
If these use cases are indeed in scope; signalling, or a solution that allows detection that the walled garden is (re)activated after joining the network, need to be in place. The alternative to a signal would be polling, or doing some mitm on protocols that allow it. I think both mitm, and polling regularly to see if the connection state is walled are bad.
Just focussing on signalling (without the semantics/api); I think that leaves us with three directions:
* descope any solution that would improve the scenario where walled gardens are (re-)activated * accept icmp is a valid direction, and think of a way on how we can use this securely in our use-case * invent a new signal? something the nas is allowed to send to the ue, but not icmp?
Gr., Vincent Van: Captive-portals [[email protected]] namens Tommy Pauly [[email protected]]
Verzonden: donderdag 24 augustus 2017 18:03 Aan: Lorenzo Colitti CC: Erik Kline; Eric Vyncke (evyncke); Martin Thomson; [email protected]; David Bird Onderwerp: Re: [Captive-portals] Questions about PvD/API If the client OS needs to add in heuristics to reach a certain volume of ICMP messages before trusting them, I think the design is flawed. Beyond that, the information we'd like to get isn't just as simple as a boolean value that can be aggregated
(like unreachable would be). Among the problems we're trying to solve for CAPPORT is "how much time do I have left", and "when to re-join the portal". Having a source we can query about those properties seems to dramatically simplify the flow and trust model.
However we do things, it seems like this information should be pull-able (even if it allows the client to open a connection on which changes are pushed or notified) rather than unsolicited pushes of ICMP by the network.
|