RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1437608 - [RFE] Connectivity checking with captive portal detection is not enabled in RHEL Workstation
Summary: [RFE] Connectivity checking with captive portal detection is not enabled in R...
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Red Hat Enterprise Linux 8
Classification: Red Hat
Component: NetworkManager
Version: 8.1
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: rc
: 8.1
Assignee: Thomas Haller
QA Contact: Desktop QE
Ioanna Gkioka
URL:
Whiteboard:
Depends On:
Blocks: 1701002
TreeView+ depends on / blocked
 
Reported: 2017-03-30 16:14 UTC by Lubomir Rintel
Modified: 2021-01-08 07:24 UTC (History)
15 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-01-08 07:24:26 UTC
Type: Bug
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Lubomir Rintel 2017-03-30 16:14:07 UTC
We should add a NetworkManager-config-connectivity-redhat package analogously to Fedora, otherwise captive portal detection wouldn't work.

We should coordinate with Web Ops about the checking URI.

Comment 7 Thomas Haller 2019-02-07 12:58:17 UTC
(In reply to Lubomir Rintel from comment #2)
> Contacted web about the endpoint URI: SN Incident INC0522976

https://redhat.service-now.com/help?id=rh_ticket&table=incident&sys_id=d7ca494e13f9be40daa77b304244b0c1


This was closed as unresolved, 2 years ago.


However, we do now have http://static.redhat.com/test/rhel-networkmanager.txt


Lubomir, do you know where is the discussion that lead to the creation of this URL?


Major problem:

 - static.redhat.com does not resolve IPv6 (which is a serious problem with 1.16 where we do connectivity check per-AF)

Minor problems:

 - possibly, the URL should also set "X-NetworkManager-Status: online\r\n" in the HTTP header. That is what http://connectivity-check.ubuntu.com/ does.

 - note that NM only does a prefix-match of connectivity.responese. http://static.redhat.com/test/rhel-networkmanager.txt returns "OK". But NM would also match "OKanything". I wonde, whether we should instead rely on the "X-NetworkManger-Status" header and instead return an empty response with 204 status code.

Comment 9 Thomas Haller 2019-07-02 16:12:29 UTC
So...


there were concerns setting loosen rp-filter in RHEL (by default).
At that point, it doesn't matter which package is responsible to loosen the rp-filter, none of them is supposed to do it by default.

But strict rp-filter breaks connectivity checking (in common scenarios).

The solution now is to have a separate package NetworkManager-config-connectivity-redhat that configures connectivity checking for NetworkManager and loosens pr-filter. But this package would not be installed by default, instead it's available when the user wishes to do this.

Since it's not installed by default and only provides configuration knobs that are available anyway, this has lower priority and gets moved to rhel-8.2.

Dropping from RPL-8.1


TODO: ensure that Red Hats connectivity check URI is IPv6 capable and that the DNS name resolves for IPv4 and IPv6 addresses. See comment 7.

Comment 14 Chris Bredesen 2020-10-30 18:17:37 UTC
Hey Thomas,

My team is going to stand up a redhat.{com,io} resource to serve this need. I want to clarify the logging/tracking issue however. We will make this URI highly available and very fast. We will ensure it removes cookies and sends none. However, it is going to be impossible to log /nothing/ about the client because things like web app firewalls have some state in them to do rate limiting and prevent DDoS attacks. 

How sensitive are we here to logging? It would be very strange to have a web server log absolutely nothing while be open to the entire web for potential abuse.

Comment 16 Thomas Haller 2020-10-30 18:49:13 UTC
(In reply to Chris Bredesen from comment #14)

Hi Chris, thank you very much for moving this forward!!

The connectivity check URL would (maybe) be used by a wide range of RHEL systems which opt in to the connectivity check.
Connectivity check makes mostly sense for captive portals, that is on machines like a workstation/notebook.
It's hence not a standard server use-case, but still: we do have users who run RHEL on their notebook (like RHEL CSB).

It means, those machines would periodically request this URL. The default poll interval here is 5 minutes,
but when connectivity changes, NetworkManager makes the first checks more frequently (to recover faster from
a momentary connectivity loss).

While NetworkManager's HTTP request sets no special cookies or identifying informations, it still
reveals the IP of the user, that the user was online at a certain time, and (possibly) which version of
RHEL/NetworkManager the user is using. It seems hence very important to be careful about what we log. Especially,
if we are going to enable this on a wider scale on behalf for our users (for certain setups, e.g. Workstation). 

For Fedora we do something similar, and use the URI http://fedoraproject.org/static/hotspot.txt .
I don't know who setup that machine, I only hope it does takes care to protect users' privacy.
If you are familiar/involved with Fedora infrastructure, I would be interested about how it's handled
for that URL.

I am sure you know better than me, but suffice to say, that it is *very* important to behave in a trustworthy
manner about our user's privacy.


I would not think that this URL is an interesting target for abuse. What could an attacker possibly
gain by DOS the server??

Comment 18 Thomas Haller 2020-11-26 16:17:14 UTC
Hi Chris. Do you have further thoughts about this? Thank you.

Comment 19 Chris Bredesen 2020-11-30 19:54:20 UTC
Thomas - I've got a thread going on the internal JIRA; you're tagged on it. Replaying my response here for visibility:'

Thomas Haller the more I think of this the more i want to simply host an untracked, un-chromed file in the Customer Portal. This is for RHEL systems meaning they already have other possible services hitting the a.r.c domain (RHSM is the obvious one) and this would be a pretty simple add. it won't have any analytics on it but it will have the basic apache-style access logs along with it b/c everything we host at the edge has this. There is no PII or personal tracking – you can ensure that in the client, though sending a sensible user agent would be awfully courteous.

Thoughts?

Comment 21 RHEL Program Management 2021-01-08 07:24:26 UTC
After evaluating this issue, there are no plans to address it further or fix it in an upcoming release.  Therefore, it is being closed.  If plans change such that this issue will be fixed in an upcoming release, then the bug can be reopened.


Note You need to log in before you can comment on or make changes to this bug.