{"id":6356,"date":"2018-06-03T14:21:20","date_gmt":"2018-06-03T05:21:20","guid":{"rendered":"http:\/\/haakondahl.com\/blog\/?p=4337"},"modified":"2018-06-03T14:21:20","modified_gmt":"2018-06-03T05:21:20","slug":"w","status":"publish","type":"post","link":"https:\/\/balldiamondball.com\/blog\/w\/","title":{"rendered":"What is this nonsense?  OpenH264.org Download"},"content":{"rendered":"<p>Had a brush with some badness named &#8220;openh264.org&#8221;.<\/p>\n<p>I am sitting in a Starbucks with its own internet access, my very own local shady access point.\u00a0 When I connect to the access point, there is a popup which requires me to click I ACCEPT THE TERMS etc, and then hit the CONNECT button. This usually goes smoothly, as I have the password stored, and that&#8217;s all I have to do. But today I got hit with a pop-up that said such-and-such a site is trying to download(?) a file.\u00a0 The file was named something like this:<\/p>\n<pre>http(s?):\/\/ciscobinary.openh264.org\/{LONG-ugly-UID-here}.zip<\/pre>\n<p>What do you want to do with this file, open with IE, do something else, [ ] remember this choice, OK\/CANCEL.<\/p>\n<p>This popul was the obscured by another that said something like, The following file could not be found:<\/p>\n<pre>C:\\{long user path}\\ciscobinary.openh264.org\/{LONG-ugly-UID-here}.zip.part<\/pre>\n<p>Clicking OK closed both popups.<\/p>\n<p>I looked around for the openh264 and Cisco wisdom (using my cellphone browser over the TELCO signal), and was not satisfied that this particular download attempt was legit. After all, I am at a public access point.<\/p>\n<p>So I whacked the URL provided by the shady access point from this:<\/p>\n<pre>http:\/\/local.shady.accespoint?lotasparameters&amp;something=https:\/\/msftconnecttest.com%2fredirect%2fmsn.something.something...<\/pre>\n<p>which always redirects me to MSN which i despise anway&#8230;\u00a0 to this:<\/p>\n<pre>http:\/\/local.shady.accespoint?lotasparameters&amp;something=https:\/\/drudgereport.com<\/pre>\n<p>Why did I do this? Because drudgereport always flushes cache. That site updates every minute or so, and does not want anybody stuck on yesterday&#8217;s content. Every access to DR is like the first of the day.\u00a0 And because I would rather claw my own eyes out than look at MSN.<\/p>\n<p>Well, it worked perfectly. Now I cannot replicate the condition, hence some of the uncertain language here. I could probably let my session time-out on the local shady access point and try again.<\/p>\n<p>But why is this file being pushed to me &#8212; <em>by Microsoft<\/em>? The way I assess the failure is this: MS wanted me to accept that file without even asking, but I have my shields up, so the browser stopped the download and asked me whether to accept the file (thank you, Firefox).\u00a0 I think that this caused the file-not-found-ness, and that failure caused my validation by &#8220;msftconnecttest.com&#8221; to bottom out. And that is why I could not connect.<\/p>\n<p>Interestingly, it seems the local shady access point asks for but DOES NOT REQUIRE validation from the Microsoft connection test. This is probably the site which returns the fleeting &#8220;Success!&#8221; one-word HTML page which precedes the appearance of the execrable MSN page.<\/p>\n<p>Whatever this file is, I don&#8217;t want it. And I now have an interesting work-around for non-enforced validation at shady local access points.<\/p>\n<div class=\"pld-like-dislike-wrap pld-template-1\">\r\n    <div class=\"pld-like-wrap  pld-common-wrap\">\r\n    <a href=\"https:\/\/balldiamondball.com\/blog\/wp-login.php\" class=\"pld-like-trigger pld-like-dislike-trigger  \" title=\"\" data-post-id=\"6356\" data-trigger-type=\"like\" data-restriction=\"user\" data-already-liked=\"0\">\r\n                        <i class=\"fas fa-thumbs-up\"><\/i>\r\n                <\/a>\r\n    <span class=\"pld-like-count-wrap pld-count-wrap\">    <\/span>\r\n<\/div><div class=\"pld-dislike-wrap  pld-common-wrap\">\r\n    <a href=\"https:\/\/balldiamondball.com\/blog\/wp-login.php\" class=\"pld-dislike-trigger pld-like-dislike-trigger  \" title=\"\" data-post-id=\"6356\" data-trigger-type=\"dislike\" data-restriction=\"user\" data-already-liked=\"0\">\r\n                        <i class=\"fas fa-thumbs-down\"><\/i>\r\n                <\/a>\r\n    <span class=\"pld-dislike-count-wrap pld-count-wrap\"><\/span>\r\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Had a brush with some badness named &#8220;openh264.org&#8221;.<\/p>\n<p>I am sitting in a Starbucks with its own internet access, my very own local shady access point.\u00a0 When I connect to the access point, there is a popup which requires me to click I ACCEPT THE TERMS etc, and then hit the CONNECT button. This usually goes smoothly, as I have the password stored, and that&#8217;s all I have to do. But today I got hit with a pop-up that said such-and-such a site is trying to download(?) a file.\u00a0 The file was named something like this:<\/p>\n<pre>http(s?):\/\/ciscobinary.openh264.org\/{LONG-ugly-UID-here}.zip<\/pre>\n<p>What do you want to do with this file, open with IE, do something else, [ ] remember this choice, OK\/CANCEL.<\/p>\n<p>This popul was the obscured by another that said something &#8230; <a href=\"https:\/\/balldiamondball.com\/blog\/w\/\"> Continue reading <span class=\"meta-nav\">&rarr; <\/span><\/a><\/p>\n","protected":false},"author":34128,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-6356","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/balldiamondball.com\/blog\/wp-json\/wp\/v2\/posts\/6356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/balldiamondball.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/balldiamondball.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/balldiamondball.com\/blog\/wp-json\/wp\/v2\/users\/34128"}],"replies":[{"embeddable":true,"href":"https:\/\/balldiamondball.com\/blog\/wp-json\/wp\/v2\/comments?post=6356"}],"version-history":[{"count":0,"href":"https:\/\/balldiamondball.com\/blog\/wp-json\/wp\/v2\/posts\/6356\/revisions"}],"wp:attachment":[{"href":"https:\/\/balldiamondball.com\/blog\/wp-json\/wp\/v2\/media?parent=6356"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/balldiamondball.com\/blog\/wp-json\/wp\/v2\/categories?post=6356"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/balldiamondball.com\/blog\/wp-json\/wp\/v2\/tags?post=6356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}