« CCA client installation bypass | And another outage » |
Recently, Resnet installed a new version of CCA which does the Operating System detection quite differently than the old, brain-dead use of the User-Agent string.
I described some issues here.
I have now figured out when the detection is done in this version (a bit technical): The OS is determined during the SSL negotiation phase of the HTTPS login request.
I have a work-around for people who use my Perl script to log into CCA on Windows. I'll keep the exact work-around private for now, since I don't want Resnet personnel (who are known to read these pages) to dissect it already
So, shoot me an email (jfeise at feise dot com) if you want it.
quick question on you windows perl script. do i upload the script somewhere? i am currently unaware of how to run the script. just wondering of where it needs to go
The script is more designed for Linux.
For Windows, you would have to install Perl first (e.g., from http://www.activeperl.com/ASPN/Perl). You then can run the script.
You can find a program that can bypass any cisco clean access at this website http://ccabypass.googlepages.com/