[124023] in North American Network Operators' Group
Re: Using private APNIC range in US
daemon@ATHENA.MIT.EDU (=?ISO-8859-2?Q?=A3ukasz_Bromirski?)
Sat Mar 20 09:18:28 2010
Date: Sat, 20 Mar 2010 14:16:53 +0100
From: =?ISO-8859-2?Q?=A3ukasz_Bromirski?= <lukasz@bromirski.net>
To: nanog@nanog.org
In-Reply-To: <B9D64148-4A4D-4B21-9E9E-73B75C4F71DB@puck.nether.net>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On 2010-03-18 19:35, Jared Mauch wrote:
> http://www.google.com/search?q=1.2.3.4+site%3Acisco.com
> I know that the University of Michigan utilize 1.2.3.4 for their
> captive portal login/logout pages as recently as monday when I was
> on the medical campus.
A lot of cheap, low-end devices (sometimes with names of well-know
vendors) use IPs like 1.1.1.1 and 1.2.3.4 as captive portal IPs to
authenticate connecting clients. A lot of "WLAN hotspots" users will
have problems reaching 1/8 unless they connect via VPN to corporate
and browse from there or something like that. The question is how
soon 1/8 will have interesting content to serve, as I know at least
one popular hotel chain in Europe using "1.1.1.1".
--
"Everything will be okay in the end. | Łukasz Bromirski
If it's not okay, it's not the end." | http://lukasz.bromirski.net