Community discussions

MikroTik App
 
MECHEGUREN
just joined
Topic Author
Posts: 9
Joined: Sun Feb 01, 2015 4:30 am

https problem!!!!

Fri Apr 03, 2015 8:31 pm

Normis... you can fix the https://www.google.com error in hot spot ???????????????
 
mahmoudxp
newbie
Posts: 31
Joined: Mon Mar 30, 2015 12:31 am

Re: https problem!!!!

Fri Apr 03, 2015 9:15 pm

please be more specific & in English please
 
MECHEGUREN
just joined
Topic Author
Posts: 9
Joined: Sun Feb 01, 2015 4:30 am

Re: https problem!!!!

Fri Apr 03, 2015 9:22 pm

Problem is when users type google.com, they are redirected to https://www.google.com and an SSL error appears. "Unable to make a secure connection to the server."

This only happens when users try to access a https site. Normal http sites redirect correctly to the hotspot login page.
 
User avatar
hossain2004a
Member Candidate
Member Candidate
Posts: 247
Joined: Mon Dec 22, 2014 7:34 pm
Location: Iran

Re: https problem!!!!

Fri Apr 03, 2015 9:27 pm

I think there is topic talked about this matter in past. I think in the end they say you should walled garden google or something like this :D

But I don't know, I don't have such problem with my hotspot....
Last edited by hossain2004a on Sat Apr 04, 2015 7:18 am, edited 1 time in total.
 
User avatar
ZeroByte
Forum Guru
Forum Guru
Posts: 4047
Joined: Wed May 11, 2011 6:08 pm

Re: https problem!!!!

Fri Apr 03, 2015 10:07 pm

I know you think Mikrotik is the problem, and that they are ignoring you because they are evil and too busy spending your money at strip clubs and casinos to help you, the first person who has ever experienced the https: hotspot issue.

Or, you could calm down for a moment and listen:

This is not a bug in Mikrotik.

This is not something that Mikrotik can fix.

This is not the first (or even 1000th time) that someone has reported this "bug"

This is how SSL is DESIGNED to protect the end user from someone intercepting their connection.

All that you can do is allow ssl to google.com in your walled garden so that users do not get such errors.

My company has an enterprise web filtering solution, (which costs over $10k per unit) and even THAT system requires that we install our own private root trust certificate on the filter and use Active Directory to force our workstations to trust anything that this certificate signs. Now the server can intercept any SSL that it wants and the client will accept it, but you cannot install your own CA into all users' trust chains. Since you can't do that, SSL will recognize that you're breaking into the connection - because that's what it SUPPOSED to do - it is SUPPOSED to warn a user that they're not talking to the server they think they are.

Calm down, and resolve to work with the problem and stop throwing a temper tantrum like a little child.

EDIT:

If you really want to avoid the SSL problem, then you can implement MAC address logins to your hotspot. The hotspot will recognize and authorize all registered MAC addresses so they don't get the warning. Of course, new users will still get the SSL warning . . . most people just allow *.google.com in the walled garden so that the warning doesn't pop right up immediately.
 
User avatar
hossain2004a
Member Candidate
Member Candidate
Posts: 247
Joined: Mon Dec 22, 2014 7:34 pm
Location: Iran

Re: https problem!!!!

Sat Apr 04, 2015 7:19 am

@ZeroByte

Still I don't know why I don't have such problem....
and yes. I'm not looking for problem. Just looking for knowledge of it 8)
 
User avatar
ZeroByte
Forum Guru
Forum Guru
Posts: 4047
Joined: Wed May 11, 2011 6:08 pm

Re: https problem!!!!

Mon Apr 06, 2015 9:04 pm

Apparently, current versions of IE, windows 8, and Chrome all try to detect a captive portal. If they detect one, they open the login page without using ssl, so no security warning happens. If your users don't have https:// websites as their default page, then they won't get the problem either - the hotspot just redirects them.

The certificate warning happens when a client tries to open an ssl-protected website before doing anything else. The browser thinks it's going to "my secure website" - so when it gets a certificate from your hotspot server for "myhotspot.com - signed by verisign - 100% legitimate) it is correctly alarming the user: "Warning - you are talking to a web server that is not the one you asked for!"

Many people respond by asking: "But I'm redirecting them to myhotspot.com ssl login page, and my certificate is valid!"
"Why should the client's browser give warning?"

Redirect is a message that happens in the http protocol... certificates and ssl happen on port 443 BEFORE the http messages can begin. SSL starts by giving a certificate - before the client can ask for a website by name. So a browser sends TCP:443 packet to "google.com" and your Mikrotik answers in stead - SYN,ACK" - client acknowledges and starts the SSL request. The Mikrotik's certificate is for myhotspot.com - even if it is signed by Verisign, it is NOT the certificate for the web site that the client was asking for, so the browser will give a warning "certificate does not match website" - if the user clicks "do it anyway" - only THEN does the browser say "I want http 1.1, host=google.com, etc - " to which your Mikrotik finally gets to respond with the redirect header: "site moved to myhotspot.com"

Only a valid certificate signed by a trusted authority, matching the website you requested will work.
Jumping in the middle will break one of these - so there will be a warning, or else you could just as easily intercept connections to the users' banking websites without any warnings.....

So this is why it's good that browsers and operating systems are starting to check for a hotspot as soon as the device joins the network. If the device knows it's on a hotspot, it can open a non-ssl browser window and let the hotspot direct to the login page without any SSL warnings.
 
User avatar
boen_robot
Forum Guru
Forum Guru
Posts: 2400
Joined: Thu Aug 31, 2006 4:43 pm
Location: europe://Bulgaria/Plovdiv

Re: https problem!!!!

Mon Apr 06, 2015 9:30 pm

Apparently, current versions of IE, windows 8, and Chrome all try to detect a captive portal. If they detect one, they open the login page without using ssl, so no security warning happens. If your users don't have https:// websites as their default page, then they won't get the problem either - the hotspot just redirects them.
As I said in the other topic around this issue, if you have SSL on the hotspot, users will get the SSL protected login page.

Yes, Windows sends users to the HTTP variant, but RouterOS then redirects to the HTTPS variant, if you have one, so users are ultimately protected.
 
User avatar
ZeroByte
Forum Guru
Forum Guru
Posts: 4047
Joined: Wed May 11, 2011 6:08 pm

Re: https problem!!!!

Mon Apr 06, 2015 9:44 pm

Apparently, current versions of IE, windows 8, and Chrome all try to detect a captive portal. If they detect one, they open the login page without using ssl, so no security warning happens. If your users don't have https:// websites as their default page, then they won't get the problem either - the hotspot just redirects them.
As I said in the other topic around this issue, if you have SSL on the hotspot, users will get the SSL protected login page.

Yes, Windows sends users to the HTTP variant, but RouterOS then redirects to the HTTPS variant, if you have one, so users are ultimately protected.
Of course, but this ssl connection is after the one which makes the alarms go off on the customers' screens, so I didn't focus on this part of the transaction. It was outside the scope of my explanation, so I kept that part shorter. I guess I could've been more clear.

(I figured I am already long-winded enough as it is - haha)

Who is online

Users browsing this forum: cralin, fems, ieleja, istenik, nichky and 44 guests