I have mediacom cable at home. Don't know what the delinquency page looks
like but they inject a usage banner somehow. And once when I got dmca
flagged there was an injected banner and failed ip redirect. As I
understood it when I asked around before, functional banner injection is an
expensive back end. Banners are probably the wave of the future, captive
portal seems hit or miss

On Tue, Sep 10, 2019, 6:53 PM Adam Moffett <dmmoff...@gmail.com> wrote:

> I toyed with mangling DNS, but the issue was after they paid they still
> have cached results pointing to the wrong IP.  Even when my fake results
> had a TTL of 1 minute the client seemed to keep them longer than that.
>
> Is it sufficient to make DNS entries for the captive portal test sites or
> do you really have capture *all* DNS queries?
>
>
>
> On 9/10/2019 7:04 PM, Jesse DuPont wrote:
>
> Redirecting HTTPS, as you know, doesn't work because of the certificate.
> Even using your own certificate won't work because you can't get a trusted
> certificate issues that is valid for all domain names.
> The only think you can do is redirect them BEFORE they try to do HTTPS by
> triggering the captive portal detection methods in modern OS's - like
> they're in a hotel.
>
>
> https://success.tanaza.com/s/article/How-Automatic-Detection-of-Captive-Portal-works
>
> As you can see in that doc, all devices try to reach a known URL and
> expect to see a well-known result. If the result is different than what it
> expects, it assume it's behind a capture portal. We exploit this (in a
> non-black-hat-hacker kind-of-way).
>
> Our billing system is tied to our RADIUS server so when a suspended
> account authenticates, RADIUS sends an additional attribute (instead of
> denying it) - basically an address-list entry. We use this additional
> attribute on routers to treat traffic from these people differently.
> Primarily:
> 1) We DST-NAT all their DNS queries to a fake-master server which issues
> our "you haven't paid" landing page IP for ANY DNS query they do  except
> for our website and billing portal, which are right (this is the first part
> of triggering captive portal detection - the IP returned to the OS isn't
> right).
> 2) We DST-NAT all their HTTP traffic to the proxy configured on the
> router, which triggers the second part of triggering captive portal
> detection - the HTTP server doesn't return the expected response. Also,
> using the proxy, we allow them to be able to reach our walled-garden
> content (our web page, our billing system portal) using the actual URLs,
> not just the IP. All other requests are redirected to our landing page.
> 3) In the firewall, even though we've essentially blocked it in the proxy,
> we only allow traffic from suspended customers to reach our landing page,
> our payment portal and our web site (the walled-garden).
> 4) Once they pay, they reboot their router and it's resolved.
>
> I can share specifics if you want.
>
> *Jesse DuPont*
>
> Network Architect
> email: jesse.dup...@celeritycorp.net
> Celerity Networks LLC
>
> Celerity Broadband LLC
> Like us! facebook.com/celeritynetworksllc
>
> Like us! facebook.com/celeritybroadband
>
> On 9/10/19 4:05 PM, Adam Moffett wrote:
>
> I already know the answer I think, but if you're redirection non-pay
> customers to a web page what do you do with (the majority) who have an
> HTTPS home page?
>
> do you
> A) present your own certificate and expect them to click through the
> warnings?
> B) Don't bother and just drop https?
> C) do something else?
>
> I told the boss if there was a way to do this then we should quit the ISP
> game and make a killing with phishing scams, but he seems to think there's
> a way to handle it.
>
> Thanks,
> Adam
>
>
>
>
> --
> AF mailing list
> AF@af.afmug.com
> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
>
-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com

Reply via email to