[124023] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Using private APNIC range in US

daemon@ATHENA.MIT.EDU (=?ISO-8859-2?Q?=A3ukasz_Bromirski?)
Sat Mar 20 09:18:28 2010

Date: Sat, 20 Mar 2010 14:16:53 +0100
From: =?ISO-8859-2?Q?=A3ukasz_Bromirski?= <lukasz@bromirski.net>
To: nanog@nanog.org
In-Reply-To: <B9D64148-4A4D-4B21-9E9E-73B75C4F71DB@puck.nether.net>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 2010-03-18 19:35, Jared Mauch wrote:

> http://www.google.com/search?q=1.2.3.4+site%3Acisco.com
> I know that the University of Michigan utilize 1.2.3.4 for their
> captive portal login/logout pages as recently as monday when I was
> on the medical campus.

A lot of cheap, low-end devices (sometimes with names of well-know
vendors) use IPs like 1.1.1.1 and 1.2.3.4 as captive portal IPs to
authenticate connecting clients. A lot of "WLAN hotspots" users will
have problems reaching 1/8 unless they connect via VPN to corporate
and browse from there or something like that. The question is how
soon 1/8 will have interesting content to serve, as I know at least
one popular hotel chain in Europe using "1.1.1.1".

-- 
"Everything will be okay in the end.  |                 Łukasz Bromirski
 If it's not okay, it's not the end." |      http://lukasz.bromirski.net


home help back first fref pref prev next nref lref last post