I friend had an old Win7 machine that I replaced with a five year old Win10 machine and used his old wireless adapter. Windows automatically installed it and I tested it by doing all the Windows updates.
Seemed fine but it would not connect to most websites.
I never saw such a thing.
When I had a look at his Won7 machine I noticed the wireless was working fine with the factory provided drivers whose interface took over for Windows drivers.
Just curious as to what kind of odd security the factory drivers contained. Rather then mess around with it, I just used another wireless adapter since I had a box full of them.
On 10/17/2022 9:07 AM, philo wrote:
I friend had an old Win7 machine that I replaced with a five year old
Win10 machine and used his old wireless adapter. Windows automatically
installed it and I tested it by doing all the Windows updates.
Seemed fine but it would not connect to most websites.
I never saw such a thing.
When I had a look at his Won7 machine I noticed the wireless was
working fine with the factory provided drivers whose interface took
over for Windows drivers.
Just curious as to what kind of odd security the factory drivers
contained. Rather then mess around with it, I just used another
wireless adapter since I had a box full of them.
My first guess, would be some sort of certificate problem for https.
Was there an AV on the machine ? An AV known to use a MITM attack
method for providing https "Security" ? The software in that case, substitutes its own certificates in place of whatever the rest
of the computer wanted to use.
But none of that really lines up with your symptoms.
I'm not a wireless expert (having no wireless setup here helps).
There used to be some sort of wireless zero config, which likely
require adherence to standards so that a "Microsoft method" could
work for everything.
Microsoft, in fact, does not always allow factory drivers. I use
factory drivers for their improved control panel interface,
making detailed setups possible. But I think Microsoft has
had words with these companies, and there are rules about
which subsystems you can provide drivers for.
An example is Intel. Intel pretends to be installing a USB driver
with an INF. However, if you look inside the USB INF file, you
find #include usbport.inf which is a Microsoft USB driver INF. The
Intel "driver" in that case, just calls the Microsoft driver. This
gets around the Microsoft rule that Microsoft provides that driver,
yet allows Intel to pretend they did it :-) Other companies
are not as big as Intel... and not that cheeky.
If you were to use Wireshark on this connection, first problem
is which "capture" interface does Wifi, and would it work. I use
Wireshark on wired connections, to debug things. The second problem,
is it's https, and I don't know how to debug a running (encrypted)
https session. I understand there is some way to do that. You
might find there are challenges, if attempting debug, but maybe
it's necessary to learn how, if you want to understand the details.
You got certificates, firewalls, flaky hardware as explanations.
A firewall might knock out all traffic. With LetsEncrypt certificate
on hundreds of thousands of smaller web sites, a single fault with
one of those can knock out quite a percentage of the Internet. WinXP
users discovered this, when the LetsEncrypt had something above it
expire. The thing is, when that happens, it's practically impossible
to download the required certificate... unless you have working https.
A kind of Catch22. The last site I could find, which would allow
a WinXP users to bootstrap out of LetsEncrypt (curl.se) has itself
changed from http: access to https: , closing the last door to finding
help obtaining a download tool.
This... is the law of unintended consequences. Mark it well. Sure,
it's secure, so secure it turns WinXP into an island unable to reach
the web. The intention was to prevent three letter agencies from
snooping, but too much of this easily turns a computer into
an Internet-free box.
https://en.wikipedia.org/wiki/HTTPS_Everywhere
Browsers which carry their own certificate store (Firefox, Chrome?),
may be immune to island syndrome. However, modern Firefox and
Chrome don't run on WinXP. I don't think modern Seamonkey does
any more, either.
*******
I think you did the right thing,
by just changing adapters, and moving on :-)
Paul
Machine is out of my workshop now but I could get to Google.
Some sites from there worked , other's didn't
Seemed fine but it would not connect to most websites.
Am 17.10.2022 um 08:07:27 Uhr schrieb philo:
Seemed fine but it would not connect to most websites.
Check the following in cmd
ping google.com
ping 2607:f8b0:4008:807::2003
ping 9.9.9.9
Am 17.10.2022 um 13:46:27 Uhr schrieb philo:
Machine is out of my workshop now but I could get to Google.
Some sites from there worked , other's didn't
Then please check that. Google supports IPv6, but some servers
don't support it and still need old-ass IPv4. If IPv6 works, but Ipv4
doesn't you can't reach such servers. Additionally, you need to check
if DNS works properly. Some entries might be in cache so a DNS problem doesn't occur for certain domains.
I friend had an old Win7 machine that I replaced with a five year old
Win10 machine and used his old wireless adapter. Windows automatically installed it and I tested it by doing all the Windows updates.
Seemed fine but it would not connect to most websites.
I never saw such a thing.
When I had a look at his Won7 machine I noticed the wireless was working
fine with the factory provided drivers whose interface took over for
Windows drivers.
Just curious as to what kind of odd security the factory drivers
contained. Rather then mess around with it, I just used another wireless adapter since I had a box full of them.
On 10/17/22 8:07 AM, philo wrote:
I friend had an old Win7 machine that I replaced with a five year old Win10 machine and used his old wireless adapter. Windows automatically installed it and I tested it by doing all the Windows updates.
Seemed fine but it would not connect to most websites.
I never saw such a thing.
When I had a look at his Won7 machine I noticed the wireless was working fine with the factory provided drivers whose interface took over for Windows drivers.
Just curious as to what kind of odd security the factory drivers contained. Rather then mess around with it, I just used another wireless adapter since I had a box full of them.
I decided to run a few tests.
On a Win10 machine I decided to try the adapter using the mfg's drivers and even with them, I ended up with the same negative results.
I then decided to go through all the wireless adapters in my junk box and found a few older ones that also gave negative results.
Of note is that a few of them had previously worked with Win10 several versions back.
All I can say is that Win10 must have increased something in their security protocol.
I really see no need to investigate,
at least I know which h/w I have that will do the job
On 10/25/2022 1:14 PM, philo wrote:
On 10/17/22 8:07 AM, philo wrote:
I friend had an old Win7 machine that I replaced with a five year old
Win10 machine and used his old wireless adapter. Windows
automatically installed it and I tested it by doing all the Windows
updates.
Seemed fine but it would not connect to most websites.
I never saw such a thing.
When I had a look at his Won7 machine I noticed the wireless was
working fine with the factory provided drivers whose interface took
over for Windows drivers.
Just curious as to what kind of odd security the factory drivers
contained. Rather then mess around with it, I just used another
wireless adapter since I had a box full of them.
I decided to run a few tests.
On a Win10 machine I decided to try the adapter using the mfg's
drivers and even with them, I ended up with the same negative results.
I then decided to go through all the wireless adapters in my junk box
and found a few older ones that also gave negative results.
Of note is that a few of them had previously worked with Win10 several
versions back.
All I can say is that Win10 must have increased something in their
security protocol.
I really see no need to investigate,
at least I know which h/w I have that will do the job
Intel tells us, some changes Microsoft made to what Wifi features
are supported. The manufacturers are supposed to fall into line.
https://www.intel.com/content/www/us/en/support/articles/000023257/wireless.html
"Wireless Hosted Network, Also known as Soft AP
Ad-hoc networks, Also known as Independent Basic Service Set (IBSS)
Allow two or more Wi-Fi clients to connect to each other directly,
without a wireless access point
...new driver model for W10... no longer supports Soft AP and IBSS.
They do support the new Windows 10 mobile hotspot feature instead
via Wi-Fi Direct:
When you set that up, the connection from one PC to another, is similar
to ICS (Internet Connection Sharing). This basically "ties the second PC
to the Internet so Microsoft can sniff it", versus the old way where
two PCs could connect to one another, with absolutely no connection
to teh Internets. However, in the old way, you'd have to define
gateways, DNS or whatever, IP address, manually, which is... do-able
but annoying. And that is only, if say, you wanted to connect two
PCs and do the equivalent of LapLink between them (a transfer of some
sort).
I doubt this has anything to do with your symptoms, but at least
you can tuck that link away in your bookmarks for later.
*******
Microsoft also has the ability to block certain drivers. I don't
see any driver that affects you there.
https://arstechnica.com/information-technology/2022/10/how-a-microsoft-blunder-opened-millions-of-pcs-to-potent-malware-attacks/
Paul
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 300 |
Nodes: | 16 (2 / 14) |
Uptime: | 105:12:30 |
Calls: | 6,700 |
Files: | 12,232 |
Messages: | 5,350,316 |