http://detectportal.firefox.com/ is hammering our firewalls
Categories
(Core :: Networking, defect)
Tracking
()
People
(Reporter: yves.virginie, Assigned: valentin, NeedInfo)
References
(Blocks 1 open bug)
Details
(Whiteboard: [necko-active])
Attachments
(3 files)
| Reporter | ||
Updated•8 years ago
|
Updated•8 years ago
|
Updated•8 years ago
|
| Reporter | ||
Comment 1•8 years ago
|
||
| Assignee | ||
Comment 2•8 years ago
|
||
Comment 3•8 years ago
|
||
| Reporter | ||
Comment 4•8 years ago
|
||
| Assignee | ||
Comment 5•8 years ago
|
||
| Reporter | ||
Comment 6•8 years ago
|
||
| Assignee | ||
Comment 7•8 years ago
|
||
Updated•8 years ago
|
| Reporter | ||
Comment 8•8 years ago
|
||
| Reporter | ||
Comment 9•8 years ago
|
||
Comment 10•8 years ago
|
||
Comment 11•8 years ago
|
||
Comment 12•8 years ago
|
||
Comment 13•8 years ago
|
||
| Reporter | ||
Comment 14•8 years ago
|
||
| Reporter | ||
Comment 15•8 years ago
|
||
| Assignee | ||
Comment 16•8 years ago
|
||
Comment 17•8 years ago
|
||
| Assignee | ||
Comment 18•8 years ago
|
||
Comment 19•8 years ago
|
||
| Assignee | ||
Comment 20•8 years ago
|
||
| Reporter | ||
Comment 21•8 years ago
|
||
Comment 22•8 years ago
|
||
Comment 23•8 years ago
|
||
| Assignee | ||
Comment 24•8 years ago
|
||
Updated•8 years ago
|
| Assignee | ||
Comment 25•8 years ago
|
||
Comment 26•8 years ago
|
||
Comment 27•8 years ago
|
||
Comment 28•8 years ago
|
||
Updated•8 years ago
|
Comment 29•8 years ago
|
||
| Assignee | ||
Comment 30•8 years ago
|
||
Comment 31•8 years ago
|
||
Comment 32•8 years ago
|
||
| Assignee | ||
Comment 33•8 years ago
|
||
Comment 34•8 years ago
|
||
Comment 35•8 years ago
|
||
Comment 36•6 years ago
|
||
Comment 37•6 years ago
|
||
(above comment posted without my consent, apparently pasting + attaching posts the comment with no edit options)
Above syslog output is the behavior of Firefox 69.0
The reason why I'm posting on a closed bug report, is that I wanted to hear back from the audience of the currently closed issue: I would propose 2 things...
- A killswitch setting for all outgoing connections
- Disabling Hotspot detection by default since this is normally done by the operating system
Do people here find it relevant/sufficient to continue along these two tracks?
| Reporter | ||
Comment 38•6 years ago
|
||
This behaviour was not observed in just Firefox 69... It has been ongoing issue I would suspect even with the latest releases.
This bug was closed but the issue never ceased... I can still pull logs from our firewalls showing the behaviour to this day.
My 0.02c below:
-
A killswitch would have to be controlled by the sysadmins in an enterprise environment. Usually Windows clients within GPOs/SCCM/etc...
For the advanced home user type, this could be a great option.
Towards BYOD clients, the device owner would have to be aware of the option and care about using it... -
The hostspot detection is very useful to us as it redirects non dot1x clients to a web portal where they authenticate prior to accessing the web.
True, most OSes now do this but if some mechanism like dot1x is used, the web browsers redirects to the authentication portal where an authorised session is created with the clients credentials. -
What I think would also really assist is something like Using Cloudflares Anycast DNS services, see https://www.cloudflare.com/learning/dns/what-is-anycast-dns/
Thus, the web browser would always query something like Anycast DNS IPs such as 1.1.1.1, 8.8.8.8, 9.9.9.9, etc for a Firefox Global Anycast IP address of whatever your network/sys admins decides on. You can also use Anycast with IPv6.
Thoughts everyone?
Description
•