1. Start wireshark, start recording traffic across all interfaces, turn wifi on, try to connect to the guest network, fail, stop collecting the traffic and please send it to me (via here, new private bug, to my email, ping me a url with the dump - as appropriate).
2. Get online (or pre-cache these ahead of time) and upgrade to:
3. Rince repeat full wireshark dump & send that to me as well.
Note: https://launchpadlibrarian.net/362123426/systemd_237-3ubuntu4_237-3ubuntu5.diff.gz
It hardcodes securelogin.networks.dell.com, and I expect to see "DVE-2018-0001" in $ journalctl -u systemd-resolved
If this PPA works, then we can assert that EDNS0 is broken with these captive portals. Or if things don't work either way, then it's something else. So far, this is our best guess.
Please note this issue is now documented as a DNS violation at /github. com/dns- violations/ dns-violations/ blob/master/ 2018/DVE- 2018-0001. md
https:/
@superm1
1. Start wireshark, start recording traffic across all interfaces, turn wifi on, try to connect to the guest network, fail, stop collecting the traffic and please send it to me (via here, new private bug, to my email, ping me a url with the dump - as appropriate).
2. Get online (or pre-cache these ahead of time) and upgrade to:
$ sudo add-apt-repository ppa:ci- train-ppa- service/ 3216; sudo apt update; sudo apt full-upgrade; sudo reboot
3. Rince repeat full wireshark dump & send that to me as well.
Note: https:/ /launchpadlibra rian.net/ 362123426/ systemd_ 237-3ubuntu4_ 237-3ubuntu5. diff.gz networks. dell.com, and I expect to see "DVE-2018-0001" in $ journalctl -u systemd-resolved
It hardcodes securelogin.
If this PPA works, then we can assert that EDNS0 is broken with these captive portals. Or if things don't work either way, then it's something else. So far, this is our best guess.