From owner-freebsd-mobile@FreeBSD.ORG Wed Dec 18 13:19:29 2013 Return-Path: Delivered-To: freebsd-mobile@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id D24089F0 for ; Wed, 18 Dec 2013 13:19:29 +0000 (UTC) Received: from ms-10.1blu.de (ms-10.1blu.de [178.254.4.101]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 8F6FB1E42 for ; Wed, 18 Dec 2013 13:19:29 +0000 (UTC) Received: from [89.204.155.191] (helo=tiny-r255948) by ms-10.1blu.de with esmtpsa (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.76) (envelope-from ) id 1VtGDR-0004dk-Tb for freebsd-mobile@freebsd.org; Wed, 18 Dec 2013 13:27:06 +0100 Received: from tiny-r255948 (localhost [127.0.0.1]) by tiny-r255948 (8.14.7/8.14.3) with ESMTP id rBICR3pd001643 for ; Wed, 18 Dec 2013 13:27:03 +0100 (CET) (envelope-from guru@unixarea.de) Received: (from guru@localhost) by tiny-r255948 (8.14.7/8.14.3/Submit) id rBICR2E8001642 for freebsd-mobile@freebsd.org; Wed, 18 Dec 2013 13:27:02 +0100 (CET) (envelope-from guru@unixarea.de) X-Authentication-Warning: tiny-r255948: guru set sender to guru@unixarea.de using -f Date: Wed, 18 Dec 2013 13:27:02 +0100 From: Matthias Apitz To: freebsd-mobile@freebsd.org Subject: Wifi && connect from Android YourFreedom App (a bit OT) Message-ID: <20131218122702.GA1609@tiny-r255948> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Operating-System: FreeBSD 10.0-CURRENT r235646 (i386) User-Agent: Mutt/1.5.21 (2010-09-15) X-Con-Id: 51246 X-Con-U: 0-guru X-Originating-IP: 89.204.155.191 X-BeenThere: freebsd-mobile@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list Reply-To: Matthias Apitz List-Id: Mobile computing with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 18 Dec 2013 13:19:29 -0000 Hello, I returned last night from Havana, Cuba. They have now Wifi in the hotels and my FreeBSD netbook (10-CURRENT) connected fine, on start of WPA you get an IP addr by DHCP and the first page in a browser (FF 24.0) re-directed you to a page to enter the credentials (login, password for around 4 USD per hour); a lot of cubans were sitting around with their laptops and Android based tablets using the Wifi zone of the hotel; I talked to someone and he said he was using some App 'Your Freedom' (or something like that) and was not asked for credentials to connect to his Facebook account, etc. This surprised me a bit, how this could work technically, and that's why I wanted to ask it here: how this could bypass the credential page, because I could not route traffic through the assigned IP on the WLAN interface without passing the credential page... how this could work with this App? My interest is only technically or due to the surprise, I do not want to use such trick on FreeBSD and I do not have any Android device. Thanks matthias -- Sent from my FreeBSD netbook Matthias Apitz, , http://www.unixarea.de/ f: +49-170-4527211 UNIX since V7 on PDP-11, UNIX on mainframe since ESER 1055 (IBM /370) UNIX on x86 since SVR4.2 UnixWare 2.1.2, FreeBSD since 2.2.5