For travel routers there’s travelmate for OpenWrt
<a href="https://github.com/openwrt/packages/blob/master/net/travelmate/files/README.md">https://github.com/openwrt/packages/blob/master/net/travelma...</a>
It’s kind of baffling that after decades of wifi and captive portals, we still don’t have any kind of standard for the network to properly signal the fact “you’ll need to visit <url> in a browser” to a device.<p>It’s hacks (DNS hijacking) upon hacks (captive portal detection) upon hacks (captive portal detection evasion, used e.g. to allow devices to stay connected to networks offering “messaging only” plans).<p>On top of that, after a captive login, the entire session is only identified/authenticated via MAC address, which is very sniffable/cloneable in unencrypted wifi… At least I have yet to see any captive portal hotspot to leverage OWE for something more secure than that.
I wanted to connect my Nintendo Switch to the hotel wifi, but the captive portal wouldn't load on it. So I just spoofed my Switch MAC on my laptop, got thru the captive portal, reverted everything, and I was able to happily play Diablo 3 :)
I've been tempted to work on some kind of script environment to automatically bypass captive portal screens like this, but I've been putting it off in the hopes someone who actually knows how to do it makes one.
Couldn’t he just have used Firefox’s developer mode to record the POST and then do “copy a cURL” for a nice one liner? (Or maybe two to handle cookies)
Funny enough, I'm reading this while connected to hotel Wi-Fi, fresh from navigating through the login page of their website. In my situation, it required inputting my room number along with the last name. Does anyone happen to possess a functional script akin to the one mentioned in this post, or perhaps a comparable script that I could just plug in and use?
(Re-upped from <a href="https://news.ycombinator.com/item?id=39780937">https://news.ycombinator.com/item?id=39780937</a> and comments moved hither)