mirror of
https://github.com/fleetdm/fleet
synced 2026-04-21 13:37:30 +00:00
Add article: Why work laptops don't work on plane wifi (#39814)
## New article: Why work laptops don't work on plane wifi This article explores why work laptops often fail to connect properly on plane wifi, and proposes that IT teams should consider making employee laptops work on plane wifi by default. ### Key topics covered: - Common frustrations with work laptops on inflight wifi - Technical causes: VPN conflicts, DNS filtering, captive portal blocking, certificate errors - UX challenges: employees can't diagnose or fix issues mid-flight - Potential solutions: split-tunnel VPNs, captive portal detection, graceful security degradation - References a LinkedIn discussion thread on this topic ### Article details: - **Author:** Mike McNeil (mikermcneil) - **Category:** articles - **Word count:** ~750 words - **File:** `articles/why-work-laptops-dont-work-on-plane-wifi.md` --- Built for [mikermcneil](https://fleetdm.slack.com/archives/D0AFASLRHNU/p1770982271436629) by [Kilo for Slack](https://kilo.ai/features/slack-integration) Co-authored-by: kiloconnect[bot] <240665456+kiloconnect[bot]@users.noreply.github.com> Co-authored-by: Brock Walters <153771548+nonpunctual@users.noreply.github.com>
This commit is contained in:
parent
fdb1c7290f
commit
8cd853f3af
1 changed files with 69 additions and 0 deletions
69
articles/why-work-laptops-dont-work-on-plane-wifi.md
Normal file
69
articles/why-work-laptops-dont-work-on-plane-wifi.md
Normal file
|
|
@ -0,0 +1,69 @@
|
|||
# Why work laptops don't work on plane wifi
|
||||
|
||||
You're on a plane. You open your work laptop, connect to the inflight wifi, and… nothing works right.
|
||||
|
||||
The captive portal won't load. Your browser throws certificate errors. Slack won't connect. You can't reach your email. You try a few things, give up, and close the lid.
|
||||
|
||||
This happens constantly. And it's not because plane wifi is bad (although it often is). It's because the security tools on your work laptop weren't designed for this environment.
|
||||
|
||||
## What's actually going wrong
|
||||
|
||||
Most IT teams configure work laptops with layers of security: DNS filtering, always-on VPNs, endpoint protection agents, firewall rules, and certificate-based authentication. These tools assume a "normal" network — your home wifi, a corporate office, or a coffee shop with a standard captive portal.
|
||||
|
||||
Plane wifi is anything but normal.
|
||||
|
||||
Here's what typically breaks:
|
||||
|
||||
- **Captive portals get blocked.** Many DNS filters and VPNs intercept traffic before you can even reach the airline's login page. The portal never loads, so you can't authenticate to the network.
|
||||
- **VPN tunnels fail silently.** Always-on VPNs try to connect immediately, but plane wifi often uses aggressive NAT, bandwidth throttling, or blocks VPN protocols entirely. The VPN can't connect, and because it's configured to block all traffic outside the tunnel, nothing works.
|
||||
- **DNS filtering interferes.** Corporate DNS resolvers may not be reachable from the plane's network, causing every lookup to fail or time out.
|
||||
- **Certificate errors appear.** Some inflight networks use SSL interception or redirect HTTPS traffic in ways that conflict with your laptop's certificate pinning or trust store.
|
||||
|
||||
The result: your laptop is online, but functionally useless.
|
||||
|
||||
## Why employees can't fix it
|
||||
|
||||
Here's the UX problem. Most employees don't have admin access. They can't disable the VPN, change DNS settings, or adjust firewall rules. Even if they could, they wouldn't know which tool is causing the issue.
|
||||
|
||||
Error messages are unhelpful. "Unable to connect" doesn't tell you whether the problem is the VPN, the DNS filter, the captive portal, or the plane's network itself. There's no diagnostic tool that says, "Your VPN is blocking the captive portal — here's what to do."
|
||||
|
||||
So employees sit there, frustrated, unable to work for a 4-hour flight. That's lost productivity. It's also a bad experience that erodes trust in IT.
|
||||
|
||||
This came up recently in a [LinkedIn discussion](https://www.linkedin.com/feed/update/urn:li:activity:7427732997539274753) where IT professionals and frequent travelers shared their frustrations. The thread made one thing clear: this is a widespread, unsolved problem.
|
||||
|
||||
## What if work laptops just worked on plane wifi?
|
||||
|
||||
Here's the thesis worth exploring: maybe IT teams should make employee laptops work on plane wifi by default.
|
||||
|
||||
Not "work perfectly with full security." Just… work. Let people open a browser, reach the captive portal, authenticate, and get basic connectivity. Email, Slack, docs. The essentials.
|
||||
|
||||
What would that look like in practice?
|
||||
|
||||
**Smarter VPN configurations.** Split-tunnel VPNs that route corporate traffic through the tunnel but let general internet traffic flow directly. Or VPN clients that detect captive portals and pause the tunnel until authentication completes.
|
||||
|
||||
**Captive portal detection.** macOS and Windows both have built-in captive portal detection, but security tools often interfere with it. IT teams could configure their tools to allow captive portal flows before enforcing the full security stack.
|
||||
|
||||
**Graceful degradation.** Instead of "all or nothing" security, policies could adapt to the network environment. On a restricted network like plane wifi, the laptop could fall back to a reduced-security mode — still running endpoint protection, still encrypting traffic where possible, but not blocking everything because the VPN can't connect.
|
||||
|
||||
**Better diagnostics.** Give employees a simple status indicator: "You're on a restricted network. Some features may be limited." That's better than a wall of cryptic errors.
|
||||
|
||||
## The tradeoff is real, but manageable
|
||||
|
||||
Yes, relaxing security policies on certain networks introduces risk. But the current situation has its own risks: employees tethering to personal phones to bypass restrictions, or using personal laptops without any security tools at all.
|
||||
|
||||
A managed, intentional approach to restricted networks is better than pretending the problem doesn't exist.
|
||||
|
||||
IT teams already make tradeoffs like this. Guest networks, BYOD policies, and travel configurations all involve balancing security with usability. Plane wifi is just another environment that deserves a thoughtful policy.
|
||||
|
||||
## Where to start
|
||||
|
||||
If you manage a fleet of devices, consider auditing what happens when one of your laptops connects to plane wifi. Try it yourself. See what breaks. Then ask: is this the experience we want our employees to have?
|
||||
|
||||
The answer is probably no. And the fix might be simpler than you think.
|
||||
|
||||
<meta name="articleTitle" value="Why work laptops don't work on plane wifi">
|
||||
<meta name="authorFullName" value="Mike McNeil">
|
||||
<meta name="authorGitHubUsername" value="mikermcneil">
|
||||
<meta name="category" value="articles">
|
||||
<meta name="publishedOn" value="2026-02-13">
|
||||
<meta name="description" value="Work laptops often break on plane wifi due to VPNs, DNS filters, and captive portal conflicts. Maybe IT teams should make them work by default.">
|
||||
Loading…
Reference in a new issue