From owner-freebsd-net@freebsd.org Sun Jan 14 07:24:22 2018 Return-Path: Delivered-To: freebsd-net@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5E631EA6416 for ; Sun, 14 Jan 2018 07:24:22 +0000 (UTC) (envelope-from vas@mpeks.tomsk.su) Received: from relay2.tomsk.ru (mail.sibptus.tomsk.ru [212.73.124.5]) by mx1.freebsd.org (Postfix) with ESMTP id BC8F1707D0 for ; Sun, 14 Jan 2018 07:24:20 +0000 (UTC) (envelope-from vas@mpeks.tomsk.su) X-Virus-Scanned: by clamd daemon 0.98.5_1 for FreeBSD at relay2.tomsk.ru Received: from [212.73.125.240] (HELO admin.sibptus.transneft.ru) by relay2.tomsk.ru (CommuniGate Pro SMTP 5.1.16) with ESMTPS id 39912326; Sun, 14 Jan 2018 13:19:31 +0600 Received: from admin.sibptus.transneft.ru (sudakov@localhost [127.0.0.1]) by admin.sibptus.transneft.ru (8.15.2/8.15.2) with ESMTP id w0E7OHaJ029225; Sun, 14 Jan 2018 14:24:19 +0700 (+07) (envelope-from vas@mpeks.tomsk.su) Received: (from sudakov@localhost) by admin.sibptus.transneft.ru (8.15.2/8.15.2/Submit) id w0E7OCBk029224; Sun, 14 Jan 2018 14:24:12 +0700 (+07) (envelope-from vas@mpeks.tomsk.su) X-Authentication-Warning: admin.sibptus.transneft.ru: sudakov set sender to vas@mpeks.tomsk.su using -f Date: Sun, 14 Jan 2018 14:24:11 +0700 From: Victor Sudakov To: Eugene Grosbein Cc: Marek Zarychta , freebsd-net@freebsd.org Subject: Re: Fwd: Re: Quasi-enterprise WiFi network Message-ID: <20180114072411.GA29210@admin.sibptus.transneft.ru> References: <52165.108.68.171.12.1515350430.squirrel@cosmo.uchicago.edu> <20180108072035.GB52442@admin.sibptus.transneft.ru> <20180113095553.GA19901@admin.sibptus.transneft.ru> <20180113110739.GA20415@admin.sibptus.transneft.ru> <20180113144157.GA33988@plan-b.pwste.edu.pl> <20180114063140.GA28750@admin.sibptus.transneft.ru> <5A5AFAEA.2010506@grosbein.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <5A5AFAEA.2010506@grosbein.net> Organization: AO "Svyaztransneft", SibPTUS X-PGP-Key: http://www.dreamwidth.org/pubkey?user=victor_sudakov X-PGP-Fingerprint: 10E3 1171 1273 E007 C2E9 3532 0DA4 F259 9B5E C634 User-Agent: Mutt/1.9.1 (2017-09-22) X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 14 Jan 2018 07:24:22 -0000 Eugene Grosbein wrote: > 14.01.2018 13:31, Victor Sudakov wrote: > > > Do you know how commercial captive portals handle this problem? Do they > > install their own box near every customer's AP? > > No. For example, UniFi (which is Linux-based AP with iptables/ebtables) > keeps table of MAC addresses of customers passed authorization and redirects > HTTP requests of others to single portal using some kind of socket forwarding or NAT. > And portal informs AP of authorization success for a client to add its MAC to that table. So, they (commercial captive portal services) install their own AP then? In hardware? -- Victor Sudakov, VAS4-RIPE, VAS47-RIPN AS43859