• IG 4 Update #26 – Hotfix

    This update fixes the following bugs: • Modern template’s footer is misplaced across the background image • White space appears on top of modern template’s background image when scrolling down a user form with many fields on a mobile device • PT-6 bandwidth graph does not update • Graphs do not update under certain load […]

  • SG 4 Update #26 – Hotfix

    This update fixes the following bugs: • Modern template’s footer is misplaced across the background image • White space appears on top of modern template’s background image when scrolling down a user form with many fields on a mobile device • PT-6 bandwidth graph does not update • Graphs do not update under certain load […]

  • One thing that every service provider aims for is to exceed customer expectations. Customers are now more demanding and they know that they have more options available to them, so it has become paramount for establishments to dig deeper on what they think might work to keep them from running to their competitors. This is one of the reasons why free WiFi is as omnipresent as coffee shops are in metropolitan areas—it serves to attract and retain customers in the area.

    For service providers, each day in service delivery is unique, therefore one must anticipate what customers need (or probably appreciate) and be ready for any eventuality so solving problems would be quick and smooth. Relevant customer insights equip you with the knowledge of who your customers are, what they like, why they go to your establishments, and what might be the reasons that will make them stay or come back.

    Providing reliable WiFi connectivity to your guests (whether you offer it for free or not) while gaining unique, user-verified data about them is what the User Form Authentication feature enables you to do—and it is without incurring additional cost that usually comes with customization. With user form authentication, you can collect information you want from the customers themselves.

    User Form Authentication

    The user form authentication method requires downstream users to fill in a form to access the Internet. There is an option to verify the identity of the user via SMS or email and gateway administrators can enable it upon setting up the form. The data collected is then presented in the web admin GUI and sent to ANTlabs Cloud Service (ACS) if the gateway is connected to ACS, where further analytics and presentation can be viewed.

    How to Design Effective User Forms

    Forms are good for collecting information, but here’s the catch: people are hesitant to give out information, especially when they feel that you are asking too much or make them think too much for replies for each field. It is therefore ideal to have a simple form that is not daunting for first time users to fill up. The sign-up process must be as quick and painless as possible. A well design form encourages good WiFi sign-up rate. Here are some best practices to consider when designing your establishment’s authentication form:

    1. Keep It Simple

    Set your goals and identify what data required to achieve these goals. Only ask what is required. Eliminating unnecessary fields increases sign up rate.

    The ANTlabs authentication form provides the flexibility to select from the default fields and create up to 5 custom fields. Thus, enabling businesses to collect unique bespoke data to meet your business goals.

    2. Group the fields and use logical sequencing

    With the drag and drop capability, related fields can be grouped together logically from a user perspective.

    3. Set optional and mandatory fields

    It’s highly recommended to avoid optional fields. However, if required, you should uncheck the box in the mandatory column. All mandatory fields will an asterisk (*) beside their labels.

    4. Protect your brand – ensure collected data are accurate

    Data validation process (email / SMS) can be easily enabled in the form. This feature not only facilitates data protection but also reduces the cost to handle invalid customer data.

    5. Brand your welcome page

    The welcome page is an excellent platform to connect with your users and showcase your brand. Multiple templates available to give you a quick head start, while you can focus to create your own unique brand experience. Customizable areas include: logo, background image, promotional web banners, color and font settings.

    6. Use Terms and Conditions to protect your business

    You will need your user to agree with the terms and conditions to use your WiFi. This will spell out where your business’ liability ends in a situation when there is a security breach. If a user engages in illegal activity in your network, your business shall be protected from the repercussions of said activity.

    7. Protect your form to block spam

    You can easily enable CAPTCHA in your form to capture only relevant information from humans. However, do note that it may affect the sign-up rate as users can get frustrated after one or two failed attempts.

    8. Test Your Forms

    Randomly request some of your colleagues to go through the form you created. Their feedback will give you an idea if your form is effective or easy to use.

  • SG 4 Update #24 – AP 2100 app authentication and enhanced HTTPS domain proxy service

    This update adds the following enhancements: • Authentication added to AP 2100 Account Printer app for better control and tracking of accounts created • Enhanced HTTPS domain proxy service performance This update fixes the following bugs where: • Admin-assisted device login by specifying a plan fails to login the device • If guest has changed […]

  • IG 4 Update #24 – AP 2100 app authentication and enhanced HTTPS domain proxy service

    This update adds the following enhancements: • Authentication added to AP 2100 Account Printer app for better control and tracking of accounts created • Enhanced HTTPS domain proxy service performance This update fixes the following bugs where: • Admin-assisted device login by specifying a plan fails to login the device • If guest has changed […]

  • captive portal https redirection
    Browsers warn its users of potential security risk when they detect that the requested domain name and the certificate offered to it doesn’t match

    What to do when users get browser and smartphone security warnings when connecting to your network

    ANTlabs gateways have a unique feature that can redirect HTTPS web requests to the captive portal or landing page. This feature was very useful earlier in comparison to other competitors that can only redirect HTTP web requests, thus enhancing customer experience.

    Recently, browsers like Google Chrome and Mozilla Firefox started to warn their users of a potential security risk when they detect that the requested domain name and the certificate offered to it doesn’t match. This warning page allows users to accept the risk and continue, after which the users will be redirected to the captive portal or landing page. However, with even stricter control by the browsers and some of the latest smartphones, this warning message has deterred users to login to the WiFi network.

    This advisory explains the different issues related to the HTTPS and captive portal or landing page redirection and suggests several options and recommendations to overcome them. Note: ‘ANTlabs gateway’ could mean any series of SSG, SG, and IG gateway models. This advisory also assumes that the captive portal’s domain name uses the default ezxcess.antlabs.com domain name. For a custom domain name with a valid certificate matching the domain name, the warning messages or certificate errors may or may not appear depending upon the browsers and OS versions.

    Current User Experience on Different Devices and Browsers

    LAPTOP AND NOTEBOOK WITH WINDOWS 10 OPERATING SYSTEM

    The following flow describes the user experience when connecting to the WiFi network using his Windows 10 OS on a Laptop or Notebook.

    • User connects to the Open WiFi SSID
    • The Laptop or Notebook obtains IP address
    • Windows 10 WiFi Manager will detect that the device does not have internet access and opens the default browser with a HTTP website and check if it can reach this website.
    • Since the laptop does not have internet access yet, ANTlabs gateway will then redirect the HTTP page to the HTTPS-based captive portal or landing page
    • Depending upon the browser, the user will see different messages or warnings, as shown on the images:

    Microsoft Edge

    microsoft edge captive portal redirection
    Microsoft Edge – The user should click on “Go on to the webpage (not recommended)” to see the captive portal or landing page.

    Google Chrome

    chrome captive portal redirection https
    Google Chrome – The user should click on “CONNECT” to see the captive portal or landing page.

    Mozilla Firefox

    firefox captive portal https
    Mozilla Firefox – The user should click on “Open Network Login Page” to see the captive portal or landing page.

    Internet Explorer

    captive portal redirection https
    Internet Explorer – The user should click on “Go on to the webpage (not recommended)” to see the captive portal or landing page.

    Smartphones with Apple iOS or Android OS

    The following flow describes the user experience when connecting to the WiFi network using his Smartphones running on either latest Apple iOS or Android OS

    android captive portal https
    Apple latest iOS – The user should click on “Continue” to see the captive portal or landing page

    captive portal https android
    Android OS – The user should click on “CONNECT” to see the captive portal or landing page

      1. Auto–popup of device pseudo-browser
        • User connects to the Open WiFi SSID
        • The Smartphone obtains IP address
        • Apple’s Captive Network Assistant (CNA) and Android’s Captive portal login shall detect that the smartphone does not have internet access and auto-popups the HTTPS captive portal or landing page
        • The user will see warning messages as shown on the images:
      2. Login using devices’ mobile browser and entering HTTPS website manually
        • User connects to the Open WiFi SSID
        • The Smartphone obtains IP address
        • The pseudo browser is disabled
        • User opens the native browser and types in a HTTPS web request
        • The browser detects that the requested HTTPS domain name and the offered Certificate domain names mismatch and shows a warning page
        • User clicks on continue to the website and sees the captive portal or landing page
      3. Login using devices’ mobile browser and entering HTTP with HSTS enabled manually
        • User connects to the Open WiFi SSID
        • The Smartphone obtains IP address
        • The pseudo browser is disabled
        • User opens the native browser and types in a HTTP web request
        • The HTTP Web server has HSTS enabled and hence redirects to its HTTPS domain
        • The browser detects that the requested HTTPS domain name and the offered Certificate domain names mismatch and shows a warning page
        • User clicks on continue to the website and sees the captive portal or landing page
        • Some stricter websites such as google does not allow the option to proceed, if used on a Google Chrome web browser.
    1. Analysis

      HTTPS is designed to protect the users from man-in-the-middle and eavesdropping attacks. Web browsers have pre-installed certificate authorities in their software to trust HTTPS websites. Latest versions of Chrome, Firefox and Smartphone pseudo browsers changed the way to warn their users when they detect any abnormality in the way a HTTPS website should naturally work.

      The following are the different types of issues that the browsers shall respond with for HTTPS captive portal or landing page:

      WEBSITE DOMAIN NAME AND CERTIFICATE HOSTNAME MISMATCH

      Whenever a web browser requests for a HTTPS website, the website will provide a valid certificate with the hostname of the certificate matching the exact domain name or sub-domains in case of wildcard certificates.

      Before a client is authenticated or logged in to the WiFi network, ANTlabs gateway redirects the HTTPS request and provides it with its own certificate. When the browser detects that the requested HTTPS domain name and the received certificate hostname mismatches, it shows a warning page.

      1. E.g. 1: The user is browsing https://mail.mycompany.com . ANTlabs gateway redirects the user to https://ezxcess.antlabs.com/… If the ANTlabs gateway provides the browser with a certificate with hostname for ezxcess.antlabs.com, but the requested website was mail.mycompany.com, due to this mismatch, the browser displays security warning message and with an option to continue or cancel the request.
      2. E.g. 2:  the browser redirects to the landing page with domain name ezxcess.antlabs.com but the certificate hostname is login.required.open.http.page

    UNTRUSTED CERTIFICATE WARNING

    The browser complains that a certificate is “Untrusted” for two reasons, as below:

        1. If the certificate is a self-signed certificate. i.e. it is not signed by a global trusted CA
        2. If the device cannot verify the root CA or the root CA is not in the device trusted list

    HTTP STRICT TRANSPORT SECURITY (HSTS)

    HTTP Strick Transport Security (HSTS) is a web security policy mechanism which allows web servers to declare that web browsers should only interact with it using a secure HTTPS mechanism.

    When a web application issues HSTS Policy to the web browser, those web browsers that conform behave as follows:

        1. Automatically turn any HTTP links referencing the web application into secure links. (For instance, http://example.com/some/page/ will be modified to https://example.com/some/page/ before accessing the server.)
        2. If the security of the connection cannot be ensured (e.g. the server’s TLS certificate is not trusted), show an error message and do not allow the user to access the web application.

    Solutions for Mitigating Captive Portal HTTPS Reditect Issue

    To overcome the issues in modern web browsers, the following solutions are proposed:

    USE GLOBAL TRUSTED ROOT CA SIGNED CERTIFICATE

    It is advisable to purchase and use a certificate that is signed by a Global Trusted Root CA. This Root CA should be as part of the trusted list for major devices such as Apple, Android, Windows and operating systems. If there are intermediate CA certificates, those should also be added in the ANTlabs gateway.

    WHITELIST HTTPS DOMAINS OF HTTP DOMAINS

    It is recommended to whitelist or wall-garden the HTTP domains in the HTTPS domains as well. This shall ensure that those HTTP Web servers that are configured for HSTS will still be able to be accessed before login, and thereby will not show any warning messages.

    STOP HTTPS REDIRECTION TO CAPTIVE PORTAL

    In addition to the above prevention methods, the ANTlabs Gateway will also be configured to drop all HTTPS requests before user login. This will solve the security warning messages that the users are currently seeing in their browsers. Instead, users will see a default browser page that states that the connection to the website cannot be established. With the majority of the latest browsers automatically verify and redirect based on HTTP websites and pop-up the pseudo-browsers, this method shall enhance the user experience.

    NOTE: Older operating systems that may use HTTPS requests to auto-popup pseudo browsers shall show a network connection error message in the pop-up browser

    Industry References in Solving this Browser Behavior

    Most of the CSPs that provide Public WiFi is moving towards seamless authentication mechanisms that do not use the captive portal or landing pages. Various EAP methods such as EAP-SIM/AKA, EAP-PEAP, EAP-TTLS are being used to authenticate the users seamlessly. In some customers, the EAP methods are combined with mobile applications, thereby making it easier for users to onboard and authenticate. Apart from EAP methods, some customers are also implementing Mobile applications with WISPr 1.2 based authentication method. If for marketing purposes and customer engagement the captive portal or landing page is necessary, ANTlabs gateway’s unique feature allows to pop-up the page after the user has been authenticated using any of the above mechanisms.


    Related Posts

    https://www.antlabs.com/product-features/are-captive-portal-login-pages-still-necessary/

    Houston, TX – ANTlabs, a leading Internet business enabler, is at HITEC Houston to exhibit new product features and give a quick glimpse of a new, upcoming product. This four-day event on June 18-21, 2018 gathers top-notch industry leaders, experts, and key people in the hospitality industry, and is held at the George R. Brown Convention Center, Houston, Texas USA.

    This year, ANTlabs brings InnMobile ‘Hotel WiFi on-the-go’ on the table—a new service delivery platform to allow guests to easily stay connected everywhere. Hotel guests may bring along this device whenever they go outside the hotel premises and they shall get the same hotel WiFi experience they have. Aside from InnMobile, some other highlights this year for ANTlabs products are differentiated WiFi experience for rewards club members, and seamless roaming/re-login for VIPs.

    In line with the company’s focus on increasing guest loyalty while reducing cost through HSIA, a tutorial session entitled “Transforming HSIA for Your Next-Gen Guest” will be conducted by Don West, the National Channel Manager of MTS Inc. This will be on Wednesday, June 20, 11:15 AM-11:45 AM.

    ANTlabs booth can easily be found near the entrance of the convention center at Booth #1513 (Map).

    Contact sales@antlabs.com for more details.

     

  • IG 3100 Patch #20 – SSL Certificate

    This patch extends the expiry date of the default web SSL certificate to 7 April 2021. Note: this patch does not require reboot. IG 3100 SSL Certificate Patch 20 Patch File Name: 20.IG3100_base-sys-ssl-cert-20180523-01.pkg Patch File Size (bytes): 15120 md5: db9eb2327d0e46bd26a374f285ccb6bc Release Date:  2018-06-08 12:00 SGT

  • SG 4 Update # 23 – Updated walled garden, improved admin page GUI

    This update adds the following enhancements: Updated the HTTPS Walled Garden module to close stale connections faster Tightened GUI Admin Page framework to prevent execution of javascript codes passed in via standard GET parameters Note: this update does not require reboot. SG4 Bulk 10 Update 23 Update File Name: 23.SG4000_base-sys-bulk10-20180502-01.pkg Update File Size (bytes): 105808 […]

  • IG 4 Update #23 – Updated walled garden, improved admin page GUI

    This update adds the following enhancements: Updated the HTTPS Walled Garden module to close stale connections faster Tightened GUI Admin Page framework to prevent execution of javascript codes passed in via standard GET parameters Note: this update does not require reboot. IG4 Bulk 08 Update 23 Update File Name: 23.IG4000_base-sys-bulk08-20180502-01.pkg Update File Size (bytes): 105808 […]