-
Notifications
You must be signed in to change notification settings - Fork 51
Network Detection Backoff
In effort to avoid incurring costly fees, bogging down shared connections, etc., the Simian client attempts to detect if a device is connected via a network which may be undesirable for downloading updates (i.e. mobile tethering, inflight WiFi, etc.).
When detected, the client requests to exit, but the Simian server may decide to force the client to continue execution. This is useful in cases where a critical security update needs to be installed, the client hasn't successfully executed for an extended period of time, etc.
- Android Bluetooth and WiFi (WAP) tethering.
- iOS Bluetooth and WiFi (WAP) tethering.
- MiFi WiFi mobile hotspot.
- Various USB WWAN cards using ppp0.
In addition to local tethering detection, the Simian server has the ability to instruct clients to exit if they're connecting from a predefined set of netblocks. These netblocks can be configured in the Simian Admin UI, at Admin Tools -> IP Blacklist.
- 12.130.116.0/22 (GoGo inflight WiFi, i.e. Delta Airlines)
- 75.104.0.0/14 (ViaSat inflight WiFi, i.e. United Airlines)
- 209.140.64.0/18 (Southwest inflight WiFi)
Please report additional netblocks you encounter.