That is sad to hear. No known workaround yet without using https on hotspot? I think is better not to have certificate error as it would confuse the customers.Hotspot does not redirect SSL 443 sites , unless you enable HTTPS redirection and run the hotspot on 443 on the Mikrotik.
You will then substitute the lack of redirects for an HTTPS certification error.
/certificate add name=self-signed-certificate common-name=common-name country=it days-valid=365 key-size=2048 locality=locality organization=organization state=state trusted=yes unit=organization-unit subject-alt-name=DNS:my.local.net,IP:192.168.0.101,email:my@email.it key-usage=digital-signature,key-cert-sign,crl-sign;
/certificate sign template=self-signed-certificate ca-crl-host=192.168.0.101 name=common-name ca-on-smart-card=no;
YOU STILL NEED ONE SSL CERTIFICATE (TRUSTED OR YOURSELF MADE, BUT VALID) TO MAKE HTTPS WORK!!!
Create one fake for you own (change the fileds accordingly):
and enable ip / service / www-ssl and set the service to use certificate "common-name"Code: Select all/certificate add name=self-signed-certificate common-name=common-name country=it days-valid=365 key-size=2048 locality=locality organization=organization state=state trusted=yes unit=organization-unit subject-alt-name=DNS:my.local.net,IP:192.168.0.101,email:my@email.it key-usage=digital-signature,key-cert-sign,crl-sign; /certificate sign template=self-signed-certificate ca-crl-host=192.168.0.101 name=common-name ca-on-smart-card=no;
and enable, on hotspot profile, login by https, selecting as certificate "common-name"
You can not remove browser warning.
If you buy one ssl certificate, buy it for 1.2.3.4, not for hs.pippo.com or when redirect warning appear.
But if IP are correct, all work without warning, because the certificate are for IP, not for DNS name...
/certificate sign template=self-signed-certificate name=common-name
As write on my post before:rextended
We are now working with 100% secure hotspot with a valid SSL,
but when users try to access initial page with ssl like https://www.google.com
still warning.
in other post you say anything about 2 redirects to solve this kinf of problem.
can you explain how you do this?
Ps: Sorry about English.
You can not remove browser warning.
If you buy one ssl certificate, buy it for 1.2.3.4, not for hs.pippo.com or when redirect warning appear.
But if IP are correct, all work without warning, because the certificate are for IP, not for DNS name...
I wasnt clear enough, we have multiple hotspot locations, each hotspot in each city; however, all of them are going trough vpn to one public ip address, the central data center.yes, one for each IP
Thank you karina, after 4 hours of trying to get rid of the warning your sollution is the best suited for my config. I only use the hotspot to tell users to connect via PPPOE and show them a small tutorial on how to create a PPPOE connection, so buying a certificate yearly for 55 euros was the LAST option. And the warning translated from my native language in chrome says that someone is trying to steal their passwords and hijack their web pages witch for a small ISP is very bad publicity.my solution to this long time problem as high percentage of browsers home pages are set to google.com
add this expression to your walled garden in the host field
:^www\.google\.com$ with port 443
now when they are directed to https://google.com the google page will load instead of an error, Better in my opinion than an error. 99 times out of a 100 the user will click on a http link and get the login page.
While what you say is true, there is another way: You can go to www.startssl.com and get yourself a FREE level1 SSL certificate for your domain (whoich must exist) and use that DNS name for your mtik HS portal like this:You can not buy a certificate to a local IP. All certification's companies require a public IP or public DNS.
No, it does not work properly.Zvjer,
Go to IP > Services and enable www-ssl. Then go to IP > Hotspot > Server Profiles and click on your profile. Then check "HTTPS" under "Login By"
Hi !While what you say is true, there is another way: You can go to http://www.startssl.com and get yourself a FREE level1 SSL certificate for your domain (whoich must exist) and use that DNS name for your mtik HS portal like this:You can not buy a certificate to a local IP. All certification's companies require a public IP or public DNS.
1. make sure you have a real domain, for example: mysite.com
2. create an working email address webmaster@mysite.com
3. decide which FQDN will your hotspot portal use, for example: hotspot.mysite.com
4. on mikrotik edit server profile, general, and for DNS name use hotspot.mysite.com
5. on startssl website verify your domain through email and create a free ssl cert for hotspot.mysite.com
6. have in mind that mikrotik hotspot portal IP address can be any address, even 1.1.1.1 it does not matter!
7. import the ssl cert (I Know how to do it, but that's another topic) and try to login as guest - it will work with HTTP and your browser will redirect to https://hotspot.mysite.com/login?dst=wh ... ried.to.go
I hope this solves most of your issues so you can now help me:
When the person tries to go to http://www.domain.com it redirects to https portal and the ssl cert Works and everything is very cool
But when the person tries to go to https://www.google.com then the mikrotik does not redirect anywhere - the connection is just Dead!
I have checked firewall rules and they seem OK to me, but obviously something is wrong because many people complain for this problem. Does anyone Know what is the problem?
Can you please confirm that there is no problem with Internet Explorer 11? (I use Windows 8.1)Hi !
I did this and my certificate is working good on the hotspot login page but I still get the Certificate warning if a Hotspot client has his browser set to open https://www.google.com or any https website... I already put the certificate in www-ssl in "services" too.
Does someone has successfully resolved this issue with the "https" website using the "hotspot" feature ?
Thanks
You can't "resolve" this issue as it's how https works. The certificate is to prove your identity. When you interrupt a connection from the client to a https website you are NOT that website therefore the client will show a warning.Hi !
I did this and my certificate is working good on the hotspot login page but I still get the Certificate warning if a Hotspot client has his browser set to open https://www.google.com or any https website... I already put the certificate in www-ssl in "services" too.
Does someone has successfully resolved this issue with the "https" website using the "hotspot" feature ?
Thanks
You are wrong because when the client asks to open a https web site (for example Google) the mikrotik WILL INTERCEPT this attempt and redirect the user to ANOTHER page which is https://myhotspot.mydomain.com/?dst=htt ... google.com and the certificate will be valid.You can't "resolve" this issue as it's how https works. The certificate is to prove your identity. When you interrupt a connection from the client to a https website you are NOT that website therefore the client will show a warning.
Please see also my post http://forum.mikrotik.com/viewtopic.php ... 71#p458147
The client first makes a TCP connection to google on port 443 which get intercepted. The client is not aware of this interception. During the SSL handshake the the router is presenting it's own certificate which is obviously not issued for "google.com" but for "myhotspot.mydomain.com". At that point a proper SSL implementation hangs up and shows a warning as the Hostname of the certificate is not matching with the one which is expected. "myhotspot.mydomain.com" != "myhotspot.mydomain.com". The redirection is happening via HTTP. As the client hangs up before it sends the HTTP-request there is no chance for the Router to send a HTTP-response with a redirect instruction.You are wrong because when the client asks to open a https web site (for example Google) the mikrotik WILL INTERCEPT this attempt and redirect the user to ANOTHER page which is https://myhotspot.mydomain.com/?dst=htt ... google.com and the certificate will be valid.
This is very nice explanation and I suppose you are right which also means that this solution will not work.The client first makes a TCP connection to google on port 443 which get intercepted. The client is not aware of this interception. During the SSL handshake the the router is presenting it's own certificate which is obviously not issued for "google.com" but for "myhotspot.mydomain.com". At that point a proper SSL implementation hangs up and shows a warning as the Hostname of the certificate is not matching with the one which is expected. "myhotspot.mydomain.com" != "myhotspot.mydomain.com". The redirection is happening via HTTP. As the client hangs up before it sends the HTTP-request there is no chance for the Router to send a HTTP-response with a redirect instruction.
Why it's working with Internet Explorer? I don't know. Maybe it handles such a hostname missmatch in an uncommon way. I might research that later as it would be a bad implementation of SSL i'm interested in.
I have tested Internet Explorer over Windows 7 and its not working, still show a Certificate Warning.Can you please confirm that there is no problem with Internet Explorer 11? (I use Windows 8.1)
No, it does not work properly.Zvjer,
Go to IP > Services and enable www-ssl. Then go to IP > Hotspot > Server Profiles and click on your profile. Then check "HTTPS" under "Login By"
The truth is that I have not had www-ssl enabled before you told me to, but after enabling it (and giving it a proper certificate) it did not help at all. Even before I have enabled www-ssl my HTTPS captive portal was WORKING OK with Internet Explorer, but not with Firefox.
For example: when I try going to Facebook web page (it is https) through Internet Explorer - mikrotik opens it's own https login page (as expected) and show no error because the certificate IS VALID. But if I do the exact same thing with Firefox - an error shows that my certicifacate for mydomain is not valid for Facebook.com - which is understandable, because mikrotik hotspot system did not open that magic url: mydomain.com/url?facebook whatever...
My opinion is that Mikrotik OS 6.22 has some kind of a bug with all the browsers except IE and I'm very serious about it. Where can I file a bug?
For my test I used Windows 7 x64 with latest version of Chrome. Nothing special in my Hotspot configuration. In my browser its https://www.google.ca that I have set to open.I started to play with this out of curiosity, because it interested me how IE could magically work, while other browsers don't. But all browsers behave exactly the same here, no exceptions. No working IE, no extra tab in Chrome, just plain and simple certificate error in all of them (IE11 in Win8.1, latest Chrome, Firefox and Pale Moon). Which is exactly what I expected would and _should_ happen.
If your IE works or if your Chrome shows you extra login tab, is there perhaps anything special in your hotspot config (I just used defaults from Hotspot Setup)?
Of course. If client tried to establish encrypted connection to www.google.it, it expects to get certificate valid for www.google.it. Hotspot can't provide that and client must treat it as possible attack and show warning. This is to be expected.It seems that FX/GC test the hotspot cert with http://www.google.it hostname and not the hotspot hostname.
I only have https://www.google.ca in the startup option (Open a Page only)@Netlantique: So in Chrome settings, out of the startup options, you have selected the last one, to open a page or group of pages, with only one page set, which is https://www.google.ca? If so, I'd really like to know, where the login tab comes from. If it happened here, I'd try to sniff packets to see if there's anything interesting going on.
@tobiagrosselle: In your case, are you sure there's nothing wrong with the certificate? Does it work correctly when you access https://<your_hotspot_hostname>/ directly? Because neither ERR_CERT_AUTHORITY_INVALID nor sec_error_inadequate_key_usage (from your previous post) sound like the usual untrusted certificate problem. Is the certificate from trusted CA, some custom CA, self-signed, ...?
Of course. If client tried to establish encrypted connection to http://www.google.it, it expects to get certificate valid for http://www.google.it. Hotspot can't provide that and client must treat it as possible attack and show warning. This is to be expected.It seems that FX/GC test the hotspot cert with http://www.google.it hostname and not the hotspot hostname.
A 204/No Content is a relatively uncommon response, and is unlikely to be a response you'd get from a hotspot login page. Google apparently uses this to determine if you really have internet access:I have figured out someting also... When Google Chrome open the new tab, its open that link first: http://www.gstatic.com/generate_204
then its open my Hotspot Login Page with this: https://hotspot.MYDOMAIN.com/login?dst= ... nerate_204
I dont know where this address come from?!?
People don't understand it, i've tried to explain it multiple times in this forum.No, you can't. You can't impersonate an HTTPS site without either causing a certificate error or getting your own CA certificate onto the client. That's just how HTTPS works.
And I think you should convinced by people's guidance ....The problem not is the people,,, Te problem is MIKROTIK Team,, dont answer never nothing !!!!!
/ip firewall nat
add chain=pre-hotspot action=accept protocol=tcp dst-address-type=!local hotspot=!auth dst-port=443
/ip firewall filter
add chain=hs-unauth action=drop protocol=tcp dst-address-type=!local dst-port=443
Sounds like an acceptable sacrifice to me.Didn't you miss a tiny little bit? You can create certificate containing all *.google.com, *.facebook.com", etc.. But no trusted CA will ever sign it for you. And if you sign in yourself, no user browser will trust it, unless you install your CA into it first.
That's not a problem, at least with Windows 8.1, since the HTTPS login page always opens as soon as the user connects.But I was under impression that the problem is random Joe Visitor who somehow accesses hotspot and then gets confused, when he receives neither his https homepage, nor hotspot login page.
My point exactly. At that very point, you can also give install instructions for the CA (or actually do the installation), if you don't have an "official" certificate.If you have to interact with him, you might skip whole juggling with untrusted certificate and simply tell him, that in order to access internet, he must first log in by going to https://hotspot.your-actual-domain-with ... icate.com/
There's CHAP even for HTTP, so plaintext is not really the problem...(or skip https and save on certificate, if you don't mind credentials going in plaintext over your network).
And that's with your certificate installed as trusted in client browser or without?That's not a problem, at least with Windows 8.1, since the HTTPS login page always opens as soon as the user connects.
If HTTPS is enabled on the hotspot, it goes to it, and if not, to HTTP, regardless of whether the certificate is trusted or not.And that's with your certificate installed as trusted in client browser or without?That's not a problem, at least with Windows 8.1, since the HTTPS login page always opens as soon as the user connects.
If your certificate is self signed, yes, as expected by design.If it's with the certificate, then it won't happen to random visitor (at first access at least), because they won't have it and will get ssl error instead.
A "random" one, sure. But one that you know belongs to the party you're communicating with, and have verified by other means (e.g. phone or "physical" confirmation by the very person registering you) is not any less secure.If someone would ask me to install a CA just to get rit of a warning i would not use that Hotspot at all. It shows me that the operator of the hotspot has no sense for security. From a security point of view installing random CAs is very dangerous.
And would have dozens of different hotspot accounts by dozen of different providers? Sounds like installing a random CA is the least of such a person's problems, security wise...Think of a person who is travailing a lot, (s)he would end up with dozens of hotspot CAs added to the browser/system.
By virtue of being used by fewer people, fewer attackers would target the PCs where you keep your CA's private key. => The fewer people you have, the more secure a custom CA is compared to preinstalled ones.All these CAs can be abused for man in the middle attacks. We have already enough problems as even the "real" CAs to get compromised sometimes. How can you expect that the manual added "hotspot" CAs are safe?
I agree it's the better way.As Sob already mentioned the right way to do it is to tell your customers to browse to https://hotspot.you-company.com rather than telling them to install your creepy CA.
Just because i communicating with you as the party who offers me internet access via a hostspot makes you not trustworthy enough to accept you as a CA. As you are operating the network between me and the internet you could easily do a man in the middle attack, therefore you're one of the last partys i should accept as a trusted CA.A "random" one, sure. But one that you know belongs to the party you're communicating with, and have verified by other means (e.g. phone or "physical" confirmation by the very person registering you) is not any less secure.
You can tell me the fingerprint of your certificate for hotspot.your-campany.com and i could add that to my browser. No need to trust your CA certificate which can sign every other certificate.Inconvenient, yes, but not less secure... Assuming the operator you call is knowledgeable enough to tell you the fingerprint, and tell you to look for it, as opposed to them saying "Just click Install, Next, Next, Next, OK"... And yes, I realize few hotspot operators would go to that length, but that's not a technological problem - it's a human problem.
For your hotspot login you don't need an EV certificate. You just need a just need a cert which proves you own hotspot.your-company.com such certificates you can get for less than $5 per year.But it's not "the only" right way. If the price of the certificate is a big limiting factor, installing CA is a secure way to eliminate the cost... At the expense of the process being less convenient.
AFAIK, if the hotspot certificate is signed by my CA, you need to add the CA too.You can tell me the fingerprint of your certificate for hotspot.your-campany.com and i could add that to my browser. No need to trust your CA certificate which can sign every other certificate.
From where? The cheapest certificates I've seen are more around $11 a year... Which admittedly is not prohibitively expensive either, but still.For your hotspot login you don't need an EV certificate. You just need a just need a cert which proves you own hotspot.your-company.com such certificates you can get for less than $5 per year.
For WiFi, yes. I agree. Hotspot in general is not as good of a solution as WPA2-EAP.If the users have to get in connect with you anyway you could just handout username/password and use 802.1x. 802.1x also has the benefit that the wireless traffic of you customers is encrypted.
I have to admit i don't know how that is in IE. I'm not a Windows person at all. In Firefox i'm 100% sure it's possible. But i would be a bit shocked if you only can add self signed certs in a way you give full trust to it.AFAIK, if the hotspot certificate is signed by my CA, you need to add the CA too.
Unless I'm missing something, and you could just add that one certificate and its chain, without trusting every other thing its CA has signed.
If browsers allow for that, then yes, it's better to go for that. I'm not sure if they allow for that though...
EDIT: OK, I checked... IE11 for one doesn't let you do that (or I'm not seeing how). You need to add some certificate as a root CA. Even if the certificate is a single self signed certificate (one that is explicitly tied to your hotspot page, and isn't tied to a separate CA certificate), that certificate must still be able to act as a root CA, meaning that if you trust that certificate, you're also trusting any other certificates it might sign. I don't see a way to only trust specific certificates signed by the root CA.
Last time a checked, as i needed a cheap cert for a project, i found a few <$5/year offers. Ok as you mentioned they where all for at least 3 years. If you look for 1 year certs i think we talk about around $10/year. Still not that much money.From where? The cheapest certificates I've seen are more around $11 a year... Which admittedly is not prohibitively expensive either, but still.
EDIT: Found one, if you pay for 3 years together... Which is reasonable. I'm even more impressed by the EV certificates price though... The cheapest one I've seen before are about 2.5 times as expensive.
Why not use PPPoE on wired connections or have vlans?It is however good for wired connections, hence my earlier comment about you having access to user's computers when you get cables on their premises the first time around (and installing the certificates then).
How can users be certain they're not connecting to a rogue PPPoE server? Last I checked, PPPoE supports encryption, but no certificates.Why not use PPPoE on wired connections or have vlans?
Yes. I just checked it too, and it's there indeed. Chrome however uses the OS' certificate store, as does IE, and that option is missing from there.I have to admit i don't know how that is in IE. I'm not a Windows person at all. In Firefox i'm 100% sure it's possible. But i would be a bit shocked if you only can add self signed certs in a way you give full trust to it.
Usually you can achieve it with port-isolation on your switch.How can users be certain they're not connecting to a rogue PPPoE server? Last I checked, PPPoE supports encryption, but no certificates.
The problem is most home routers do not support PPPoE-EAP.I now looked a little closer, and it seems Windows at least supports PPPoE with EAP, meaning that there's a way for a client to demand a particular certificate, but not only is setup not as trivial (or so it seems; It's not occurring at a wizard, just an extra option in the properties, post creation), but there's a bigger problem: RouterOS doesn't seem to support that at all.
But if we're talking just "in principle"... Yes, I believe a combined approach of PPPoE-EAP, WPA2-EAP and HTTPS-Hotspot is the best combo. That last one being useful for devices that may not support the former two for one reason or another. Also, as a means to advertise in front of randomly connected wireless clients (over a separate, unencrypted virtual AP).
Now if only User Manager supported EAP, and RouterOS supported PPPoE-EAP...
It would be too expensive to have the entire network with managed switches (i.e. ones that would support this).Usually you can achieve it with port-isolation on your switch.
Yeah, that one's a (separate) big problem too.The problem is most home routers do not support PPPoE-EAP.
All my cheap TP-Link managed switches have such feature. As far as i can see the Mikrotik CRS support it as well. Even with a RB2011 using the switch rule table you can ensure that a client ports can only talk (pppoe) towards the router and not towards other clients. If you are afraid of users doing bad things like a fake pppoe-server on the network you need a managed switch anyway. Think about arp spoofing, dhcp spoofing, floods, etc.It would be too expensive to have the entire network with managed switches (i.e. ones that would support this).
From my point of view hotspot is only nice if you offer a open WiFi where the user get the login page and can directly buy/signup without any interaction with the operator. But you miss encryption on the WiFi and in 2015 even a 12 year old script kiddy can sniff unencrypted wifi-traffic.So in practice, the perfect combo is more like PPPoE-PAP/CHAP (for home routers; sadly, they're an important factor too), PPPoE-EAP (for Windows PCs and the few routers that might support this), WPA2-EAP (for WiFi enabled devices), HTTPS-Hotspot (for everyone else; notably WiFi guests).
I'm personally not "too" afraid in all honesty, hence my reluctance to needlessly spend a lot of money on that. But if it can be done with little to no monetary cost, I'm all for it, willing to invest the time and effort to set it up, and maintain it.If you are afraid of users doing bad things like a fake pppoe-server on the network you need a managed switch anyway. Think about arp spoofing, dhcp spoofing, floods, etc.
How cheap? Which models? I can't find an 8 or 16 port managed switch worth a 2 figure sum. Only unmanaged ones.All my cheap TP-Link managed switches have such feature.
For my network, I'm willing to pay that for a certificate. But I install other networks for others (mostly offices), where customers may not want to pay even that (i.e. they think of my work as a "one time thing" rather than "a recurring service"), and yet want the same features.But maybe even these devices are to expensive for someone who would not spend 5-10$ for a certificate?
That's the ultimate goal I'd like to eventually reach with my network. It's a little further off though, as online payments aren't exactly popular where I live, and SMS payments, while more embraced, are an extra cog to be set up after everything else is ready.From my point of view hotspot is only nice if you offer a open WiFi where the user get the login page and can directly buy/signup without any interaction with the operator.
Amen.But you miss encryption on the WiFi and in 2015 even a 12 year old script kiddy can sniff unencrypted wifi-traffic.
I'm using the "jetstream" devices. For example TL-SG3210 8x Cupper + 2xSFP ~100€. It looks even the "smart switches" have port isolation. At least i found it in the manual of the TL-SG2008How cheap? Which models? I can't find an 8 or 16 port managed switch worth a 2 figure sum. Only unmanaged ones.
Have you so many lightning storms in you area? Maybe you need to review your grounding concept? I always ask my electrician how to do proper grounding at a place.Replacing 1 is fine. But I have more like nearly two dozen. Replacing all of them is too much, especially if, like a lot of my existing routers, they are bricked at the first electrical surge and/or lightning storm.
That's obviously a problem if the customer is not willing to pay. Who is maintaining their network afterwards if your work is a "one time thing" for them?For my network, I'm willing to pay that for a certificate. But I install other networks for others (mostly offices), where customers may not want to pay even that (i.e. they think of my work as a "one time thing" rather than "a recurring service"), and yet want the same features.
Yeah, too much for all switches... Somewhat bearable if I had just 2 or 3 in the entire network, at key junctions.I'm using the "jetstream" devices. For example TL-SG3210 8x Cupper + 2xSFP ~100€. It looks even the "smart switches" have port isolation. At least i found it in the manual of the TL-SG2008
At least twice a year, usually at summer time, where each time, at least 4 go down.Have you so many lightning storms in you area? Maybe you need to review your grounding concept? I always ask my electrician how to do proper grounding at a place.
I do, but only when they need me to, and they pay per visit (or per hardware piece, if needed), rather than per month. Requirements change often (like, as soon as a device is introduced for one reason or another), so this suits me, as much as it suits them (as they don't feel "shackled" to me, giving them a sense of "flexibility"; The fact this feeling is more of an illusion is something that so far, only one client found out the hard way ).That's obviously a problem if the customer is not willing to pay. Who is maintaining their network afterwards if your work is a "one time thing" for them?
Well, I haven't previously deployed hotspot solutions... I've done mostly DHCP and static setups, often with one or few APs involved in the mix... So this is certainly an interesting idea. Hadn't thought about it.If i would offer hotspot wifi solutions i would offer es as a full service with a monthly fee. And then just tunnel everything from the APs to my datacenter.
You can manually trust individual certificates if they're not signed by a CA you recognise. If you trust a CA, however, it can sign certs for *anything* which is what jaykay2342 was worrying about.AFAIK, if the hotspot certificate is signed by my CA, you need to add the CA too.
StartCom do free SSL certs which I think are limited to one per domain. Also there's this Cisco/Mozilla CA project in the works [the name of which escapes me] that will issue free certs soon.The cheapest certificates I've seen are more around $11 a year... Which admittedly is not prohibitively expensive either, but still.
The trusted CA model is so broken that in my opinion, EV is just fiddling around the edges. About the only purpose I can see to it is to extract a bit more money from people who buy certs [and I can see why CAs would want to do this, when you can get a cert for either $0 or $10].Their EVs are still prohibitively expensive for my relatively small network, but yeah, an EV is not a "must" anyway, just a "nice to have".
StartCom free SSL certs are not for business use. The free certs CA you mean is called letsencrypt https://letsencrypt.org/
You can manually trust individual certificates if they're not signed by a CA you recognise. If you trust a CA, however, it can sign certs for *anything* which is what jaykay2342 was worrying about.
StartCom do free SSL certs which I think are limited to one per domain. Also there's this Cisco/Mozilla CA project in the works [the name of which escapes me] that will issue free certs soon.
Full ack on that, maybe dnssec+dane can fix/replace the CA model. But i'm sure it will not happen in the near future.The trusted CA model is so broken that in my opinion, EV is just fiddling around the edges. About the only purpose I can see to it is to extract a bit more money from people who buy certs [and I can see why CAs would want to do this, when you can get a cert for either $0 or $10].
As jaykay2342 later informed me, this is possible in Firefox, after which I found out how to do that.You can manually trust individual certificates if they're not signed by a CA you recognise. If you trust a CA, however, it can sign certs for *anything* which is what jaykay2342 was worrying about.
Again, I re-refer to my earlier post. As far as I can tell 80%+ of people have google as a home page. That is why my calls have dropped by over 80%. I now cannot remember the last time I had a call with this issue. This issue becomes more of an issue in chrome due to google not allowing chrome to continue to "psuedo google" if the cert is wrong, and with chrome being one of the big browsers, this came up a lot.Not a Solution, But a Work Around
We Walled Garden'd all Google.
Due to the fact that Google is a very popular Homepage, and the fact that although FF and IE will throw up and error - which is ok, due to the nature of connection, however Chrome would not allow continue (assumedly, due to the fact that it would believe google's Cert to always be valid and working), We decided that Bypassing http://www.google.(Whatever) was a suitable solution to an otherwise sticky problem.
Those who do then get to google search free, Image as well, however on click of a website, the get the redirect - and as a large chunk of the web is http - no cert errors (unless dates are having a spaz)
Youtube is not included in the free, gmail is also not free (tested), only thins that start with http://www.google.
Have used in the garden...
http://www.google.com
http://www.google.co.??
http://www.google.com.??
http://www.google.??
From what I gather, google in chrome is the only site to not allow a continue option - other https is "Errored" and allows to "Continue"
It's a little free data - that has saved us roughly 50-60 phone calls this last couple of months
As jaykay2342 later informed me, this is possible in Firefox, after which I found out how to do that.You can manually trust individual certificates if they're not signed by a CA you recognise. If you trust a CA, however, it can sign certs for *anything* which is what jaykay2342 was worrying about.
But... How to do this for IE and Chrome (on Windows)? I certainly don't see such an option with them. Do you?
I know about that, but that trusts the certificate for all sites. I was asking if there's the ability to trust a certificate per domain.If you save the CA certificate as a file on your computer, you can then import it into windows' certificate store.
http://www.cs.virginia.edu/~gsw2c/GridT ... icates.htm
There are Name Constraints in x.509. https://tools.ietf.org/html/rfc5280#section-4.2.1.10 but most SSL implementations do not really check it, therefore i would not trust on it.I know about that, but that trusts the certificate for all sites. I was asking if there's the ability to trust a certificate per domain.If you save the CA certificate as a file on your computer, you can then import it into windows' certificate store.
http://www.cs.virginia.edu/~gsw2c/GridT ... icates.htm
I'm sure you can trust an individual certificate. I saw some of my local corporate-only certificates in there as well when I followed along on my own workstation here.I know about that, but that trusts the certificate for all sites. I was asking if there's the ability to trust a certificate per domain.
limited-scope CA certs would be so much better than wildcard certs. Too bad this isn't done more.There are Name Constraints in x.509. https://tools.ietf.org/html/rfc5280#section-4.2.1.10 but most SSL implementations do not really check it, therefore i would not trust on it.
Anyway to change this so it apply's to any https domain that ends with google.com?my solution to this long time problem as high percentage of browsers home pages are set to google.com
add this expression to your walled garden in the host field
:^www\.google\.com$ with port 443
now when they are directed to https://google.com the google page will load instead of an error, Better in my opinion than an error. 99 times out of a 100 the user will click on a http link and get the login page.
To solve this, just enable the : login by "MAC Cookie" option (in the server profiles-login options). With this option they will be automatically logged in as long as the cookie is active(it will not force them to login page each time the sesion runs out).Seems like if they are idle for a while even if there cookie has not expired it forces them through the login page to verify the cookie and it fails since its https. I wonder if I just add MAC to this it will not need to do that?
When the client wants to connect to https://google.com, the certificate offered must have a common name or subject alt name that includes google.com. If not, a certificate error will be displayed to the user. You can't get a certificate for google.com, so you can't intercept the request and redirect it without the user seeing a certificate error.To start the SSL connection, doesn't the browser need first to connect to the server? By sending a request for connection, isn't it visible to the router on port 443 and as result redirected to hotspot login page? What am I missing here?
So what is actually happening, is that router does see the initial request from client and does redirect it, but client is not able to get the certificate and thus the browser displays an error, right?When the client wants to connect to https://google.com, the certificate offered must have a common name or subject alt name that includes google.com. If not, a certificate error will be displayed to the user. You can't get a certificate for google.com, so you can't intercept the request and redirect it without the user seeing a certificate error.To start the SSL connection, doesn't the browser need first to connect to the server? By sending a request for connection, isn't it visible to the router on port 443 and as result redirected to hotspot login page? What am I missing here?
That video didn't show that much how were you doing it. Can you post some details on it? What was the SSL certificate you were using?Hi Guys,
Finally after long forum reading and googling, I am able to work with SSL and HTTPS sites. I will post all the details after few other test and post a video also if its a 100% success. Finger crossed.
https://youtu.be/gth9SG_O8j0
Not at the moment though, there are still a lot of devices which don't do that, which gives a lot of headache since customers do not care about technical issue, they just want solution. The situation is a bit sadThis is less and less of an issue these days, as most devices connecting to a hotspot are smart enough to automatically issue a regular http request and if it's redirected, present the user with the login page.
I guaranty you that I am using CA authorized certificate which I bought from Comodo. Not using self-signed certificate.Unless you control all the devices connecting to your hotspot, there is no possible way to redirect https traffic to your login page! If such a way existed, it would mean anyone else on the network would be able to intercept and modify https traffic, breaking the security promise that https gives. The only way to make this possible is if you own all the client devices and can install your own root certificate. This way you can force clients to trust your custom root certificate, and using that root, issue your own certificates for google.com, etc. These certificates would only ever work on devices where you installed the root certificate.
This is less and less of an issue these days, as most devices connecting to a hotspot are smart enough to automatically issue a regular http request and if it's redirected, present the user with the login page.
That video didn't show that much how were you doing it. Can you post some details on it? What was the SSL certificate you were using?Hi Guys,
Finally after long forum reading and googling, I am able to work with SSL and HTTPS sites. I will post all the details after few other test and post a video also if its a 100% success. Finger crossed.
https://youtu.be/gth9SG_O8j0
Your video shows you ignoring the certificate warning (which is caused by 3rd party antivirus TLS interception).That video didn't show that much how were you doing it. Can you post some details on it? What was the SSL certificate you were using?Hi Guys,
Finally after long forum reading and googling, I am able to work with SSL and HTTPS sites. I will post all the details after few other test and post a video also if its a 100% success. Finger crossed.
https://youtu.be/gth9SG_O8j0
Sorry for the video. Actually I was so happy when it worked for me. And I just capture the video as it is. Will post a video once the field test is done.
The client always gets a certificate but because the certificate offered doesn't have a common name or subject alt name that includes the requested hostname, an error is detected [because it knows it's not talking to who it thinks it should be].So what is actually happening, is that router does see the initial request from client and does redirect it, but client is not able to get the certificate and thus the browser displays an error, right?
You need to look more thoroughly. No matter how thoroughly you look, you will find that you cannot intercept HTTPS without causing an errorI have not looked at it thoroughly, but this seem to happen only with google as homepage, and not other https pages. If so, what is google doing differently?