+  
+
diff --git a/roles/network/files/simple.template b/roles/network/files/simple.template
new file mode 100644
index 000000000..ec140a058
--- /dev/null
+++ b/roles/network/files/simple.template
@@ -0,0 +1,100 @@
+
+
+  
+    
+    
+
+    
+    
+  
+  
+     {% if success_token is defined %}
+     Success
+     {% endif %}
+     
+		
+      
Welcome to IIAB
+      
+      {{ message }}
+      
+  
+
diff --git a/roles/network/tasks/captive_portal.yml b/roles/network/tasks/captive_portal.yml
index 033314121..1474a7f0d 100644
--- a/roles/network/tasks/captive_portal.yml
+++ b/roles/network/tasks/captive_portal.yml
@@ -1,47 +1,107 @@
-- name: Create directory for Captive Portal script
+- name: Download & install python-dateutil, sqlite3
+  package:
+    name: "{{ item }}"
+    state: present
+  with_items:
+    - python-dateutil
+    - sqlite3    # @georgehunt hopes to move this to 2-common (or more like stage 3-base-server, alongside MySQL) in October 2018
+
+- name: Create directory /opt/iiab/captive-portal for scripts & templates
   file:
     path: /opt/iiab/captive-portal
     state: directory
-  when: py_captive_portal_install
 
-- name: Copy Captive Portal script
+- name: 'Copy scripts: checkurls, capture-wsgi.py'
   template:
-    src: roles/network/templates/captive_portal/captive_portal.py.j2
-    dest: /opt/iiab/captive-portal/captive_portal.py
+    src: "{{ item.src }}"
+    dest: /opt/iiab/captive-portal/
+    mode: "{{ item.mode }}"
+  with_items:
+    - { src: roles/network/templates/captive-portal/checkurls, mode: '0644' }
+    - { src: roles/network/templates/captive-portal/capture-wsgi.py, mode: '0755' }
+
+- name: 'Copy templates: simple.template, mac.template'
+  copy:
+    src: "{{ item }}"
+    dest: /opt/iiab/captive-portal/
+  with_items:
+    - roles/network/files/simple.template
+    - roles/network/files/mac.template
+
+- name: Copy iiab-catch & iiab-uncatch into /usr/bin/
+  template:
+    src: "{{ item }}"
+    dest: /usr/bin/
     owner: root
     group: root
-    mode: 0740
-  when: py_captive_portal_install
+    mode: 0755
+  with_items:
+    - roles/network/templates/captive-portal/iiab-catch
+    - roles/network/templates/captive-portal/iiab-uncatch
 
-- name: Copy Captive Portal service file
+- name: Run iiab-uncatch to generate diversion lists for dnsmasq and apache2
+  shell: /usr/bin/iiab-uncatch
+     
+- name: Install systemd unit file py-captive-portal.service from template
   template:
-    src: roles/network/templates/captive_portal/captive_portal.service.j2
-    dest: /etc/systemd/system/captive_portal.service
+    src: roles/network/templates/captive-portal/py-captive-portal.service.j2
+    dest: /etc/systemd/system/py-captive-portal.service
     owner: root
     group: root
     mode: 0644
-  when: py_captive_portal_install
 
-- name: Enable captive_portal after copying files
-  service:
-    name: captive_portal.service
+- name: Install Apache's captive-portal.conf from template if py_captive_portal_enabled
+  template:
+    src: roles/network/templates/captive-portal/captive-portal.conf
+    dest: /etc/{{ apache_config_dir }}/captive-portal.conf
+    owner: root
+    group: root
+    mode: 0740
+  when: py_captive_portal_enabled
+
+- name: Enable Apache's captive-portal.conf if py_captive_portal_enabled (debuntu)
+  file:
+    src: /etc/apache2/sites-available/captive-portal.conf
+    path: /etc/apache2/sites-enabled/captive-portal.conf
+    state: link
+  when: py_captive_portal_enabled and is_debuntu
+
+- name: Enable Apache's default-ssl.conf if py_captive_portal_enabled (debuntu)
+  file:
+    src: /etc/apache2/sites-available/default-ssl.conf
+    path: /etc/apache2/sites-enabled/default-ssl.conf
+    state: link
+  when: py_captive_portal_enabled and is_debuntu
+
+- name: Enable & Start systemd service py-captive-portal.service if py_captive_portal_enabled
+  systemd:
+    name: py-captive-portal.service
+    daemon-reload: yes
     enabled: yes
-  when: py_captive_portal_install and py_captive_portal_enabled
-
-- name: Start captive_portal after copying files
-  service:
-    name: captive_portal.service
     state: started
-  when: py_captive_portal_install and py_captive_portal_enabled
+  when: py_captive_portal_enabled
 
-- name: Disable captive_portal after copying files
-  service:
-    name: captive_portal.service
+- name: Disable & Stop py-captive-portal.service if not py_captive_portal_enabled
+  systemd:
+    name: py-captive-portal.service
     enabled: no
-  when: py_captive_portal_install and py_captive_portal_enabled
+    state: stopped
+  when: not py_captive_portal_enabled
 
-- name: Stop captive_portal after copying files
-  service:
-    name: captive_portal.service
-    state: started
-  when: py_captive_portal_install and py_captive_portal_enabled
+- name: Disable Apache's captive-portal.conf if not py_captive_portal_enabled (debuntu)
+  file:
+    path: /etc/apache2/sites-enabled/captive-portal.conf
+    state: absent
+  when: not py_captive_portal_enabled and is_debuntu
+
+- name: Disable Apache's default-ssl.conf if not py_captive_portal_enabled (debuntu)
+  file:
+    path: /etc/apache2/sites-enabled/default-ssl.conf
+    state: absent
+  when: not py_captive_portal_enabled and is_debuntu
+
+- name: Make sure dnsmasq is not diverting if not py_captive_portal_enabled
+  file:
+    path: /etc/dnsmasq.d/capture
+    state: absent
+  when: not py_captive_portal_enabled
diff --git a/roles/network/tasks/hosts.yml b/roles/network/tasks/hosts.yml
index cf4b38278..1344c553a 100644
--- a/roles/network/tasks/hosts.yml
+++ b/roles/network/tasks/hosts.yml
@@ -1,23 +1,25 @@
 #TODO: Use vars instead of hardcoded values
-- name: Remove fqdn in /etc/hosts without LAN
-  lineinfile: dest=/etc/hosts
-              regexp='^172\.18\.96\.1'
-              state=absent
+- name: Remove FQDN in /etc/hosts without LAN
+  lineinfile:
+    path: /etc/hosts
+    regexp: '^172\.18\.96\.1'
+    state: absent
   when: iiab_lan_iface == "none" and not installing
 
-- name: Configure fqdn in /etc/hosts with LAN
-  lineinfile: dest=/etc/hosts
-              regexp='^172\.18\.96\.1'
-              line='172.18.96.1            {{ iiab_hostname }}.{{ iiab_domain }} {{ iiab_hostname }} box'
-              state=present
+- name: Configure FQDN in /etc/hosts with LAN
+  lineinfile:
+    path: /etc/hosts
+    regexp: '^172\.18\.96\.1'
+    line: '172.18.96.1     {{ iiab_hostname }}.{{ iiab_domain }} {{ iiab_hostname }} box iiab-server.lan'
+    state: present
   when: iiab_lan_iface != "none" and not installing
 
-- name: Configure fqdn in /etc/hosts appliance mode
-  lineinfile: dest=/etc/hosts
-              regexp='^127\.0\.0\.1'
-              line='127.0.0.1            localhost.localdomain localhost {{ iiab_hostname }}.{{ iiab_domain }} {{ iiab_hostname }} box '
-              owner=root
-              group=root
-              mode=0644
+- name: Configure FQDN in /etc/hosts appliance mode
+  lineinfile:
+    path: /etc/hosts
+    regexp: '^127\.0\.0\.1'
+    line: '127.0.0.1     localhost.localdomain localhost {{ iiab_hostname }}.{{ iiab_domain }} {{ iiab_hostname }} box iiab-server.lan'
+    owner: root
+    group: root
+    mode: 0644
   when: iiab_lan_iface == "none" and not installing
-
diff --git a/roles/network/templates/captive-portal/captive-portal.conf b/roles/network/templates/captive-portal/captive-portal.conf
new file mode 100644
index 000000000..6c5a8a012
--- /dev/null
+++ b/roles/network/templates/captive-portal/captive-portal.conf
@@ -0,0 +1,14 @@
+
+	# The ServerName directive sets the request scheme, hostname and port that
+	# the server uses to identify itself. This is used when creating
+	# redirection URLs. In the context of virtual hosts, the ServerName
+	# specifies what hostname must appear in the request's Host: header to
+	# match this virtual host. For the default virtual host (this file) this
+	# value is not decisive as it is used as a last resort host regardless.
+	# However, you must set it for any further virtual host explicitly.
+	ServerName iiab.io
+   Include /etc/apache2/capture
+   ProxyPreserveHost On
+   ProxyPass / http://box.lan:{{ py_captive_portal_port }}/
+   ProxyPassReverse / http://box.lan:{{ py_captive_portal_port }}/
+
diff --git a/roles/network/templates/captive_portal/captive_portal.py.j2 b/roles/network/templates/captive-portal/captive-portal.py.j2
similarity index 100%
rename from roles/network/templates/captive_portal/captive_portal.py.j2
rename to roles/network/templates/captive-portal/captive-portal.py.j2
diff --git a/roles/network/templates/captive-portal/capture-wsgi.py b/roles/network/templates/captive-portal/capture-wsgi.py
new file mode 100755
index 000000000..e7e43d0fb
--- /dev/null
+++ b/roles/network/templates/captive-portal/capture-wsgi.py
@@ -0,0 +1,550 @@
+#! /usr/bin/env python
+# -*- coding: utf-8 -*-
+# using Python's bundled WSGI server
+
+from wsgiref.simple_server import make_server
+import subprocess
+from dateutil.tz import *
+import datetime
+import logging
+from logging.handlers import RotatingFileHandler
+import os
+import sys
+from jinja2 import Environment, FileSystemLoader
+import sqlite3
+import re
+
+# Notes on timeout strategy
+# every client timestamp is recorded into current_ts
+# When splash page is clicked , return 204 timeout starts (via ajax call),
+# Return 204 is android (may be different for different versions)
+# captive portal redirect is triggered after inactivity timeout, 
+# which needs to be longer than period of normal connecetivity checks by OS
+# 
+
+# Create the jinja2 environment.
+CAPTIVE_PORTAL_BASE = "/opt/iiab/captive-portal"
+j2_env = Environment(loader=FileSystemLoader(CAPTIVE_PORTAL_BASE),trim_blocks=True)
+
+# Define time outs
+INACTIVITY_TO = 30
+PORTAL_TO = 0 # delay after triggered by ajax upon click of link to home page
+# I had hoped that returning 204 status after some delay 
+#  would dispense with android's "sign-in to network" (no work)
+
+
+# Get the IIAB variables
+sys.path.append('/etc/iiab/')
+from iiab_env import get_iiab_env
+doc_root = get_iiab_env("WWWROOT")
+
+# make a way to find new URLs queried by new clients
+# CATCH substitues this server for apache at port 80
+CATCH = False
+if len(sys.argv) > 1 and sys.argv[1] == '-d':
+    CATCH = True
+    PORT=80
+else:
+    PORT=9090
+
+# set up some logging -- selectable for diagnostics
+# Create dummy iostream to capture stderr and stdout
+class StreamToLogger(object):
+    """
+    Fake file-like stream object that redirects writes to a logger instance.
+    """
+    def __init__(self, logger, log_level=logging.INFO):
+        self.logger = logger
+        self.log_level = log_level
+        self.linebuf = ''
+
+    def write(self, buf):
+        for line in buf.rstrip().splitlines():
+            self.logger.log(self.log_level, line.rstrip())
+
+if len(sys.argv) > 1 and sys.argv[1] == '-l':
+    loggingLevel = logging.DEBUG
+else:
+    loggingLevel = logging.ERROR
+logging.basicConfig(filename='/var/log/apache2/portal.log',format='%(asctime)s.%(msecs)03d:%(name)s:%(message)s', datefmt='%M:%S',level=loggingLevel)
+
+
+logger = logging.getLogger('/var/log/apache2/portal.log')
+handler = RotatingFileHandler("/var/log/apache2/portal.log", maxBytes=100000, backupCount=2)
+logger.addHandler(handler)
+
+
+# divert stdout and stderr to logger
+stdout_logger = logging.getLogger('STDOUT')
+sl = StreamToLogger(stdout_logger, logging.ERROR)
+#sys.stdout = sl
+
+stderr_logger = logging.getLogger('STDERR')
+sl = StreamToLogger(stderr_logger, logging.ERROR)
+sys.stderr = sl
+
+
+# Define globals
+MAC_SUCCESS=False
+ANDROID_TRIGGERED=False
+
+logger.debug("")
+logger.debug('##########################################')
+# what language are we speaking?
+lang = os.environ['LANG'][0:2]
+logger.debug('speaking: %s'%lang)
+
+def tstamp(dtime):
+    '''return a UNIX style seconds since 1970 for datetime input'''
+    epoch = datetime.datetime(1970, 1, 1,tzinfo=tzutc())
+    newdtime = dtime.astimezone(tzutc())
+    since_epoch_delta = newdtime - epoch
+    return since_epoch_delta.total_seconds()
+
+# ##########database operations ##############
+# Use a sqlite database to store per client information
+user_db = os.path.join(CAPTIVE_PORTAL_BASE,"users.sqlite")
+conn = sqlite3.connect(user_db)
+if not os.path.exists(user_db):
+    conn.close()
+    conn = sqlite3.connect(user_db)
+c = conn.cursor()
+c.row_factory = sqlite3.Row
+c.execute( """create table IF NOT EXISTS users 
+            (ip text PRIMARY KEY, mac text, current_ts integer,
+            lasttimestamp integer, send204after integer,
+            os text, os_version text,
+            ymd text)""")
+
+def update_user(ip, mac, system, system_version, ymd):
+    sql = "SELECT * FROM users WHERE ip = ?"
+    c.execute(sql,(ip,))
+    row = c.fetchone()
+    if row == None:
+        sql = "INSERT INTO users (ip,mac,os,os_version,ymd) VALUES (?,?,?,?,?)" 
+        c.execute(sql,(ip, mac, system, system_version, ymd ))
+    else:
+        sql = "UPDATE users SET  (mac,os,os_version,ymd) = ( ?, ?, ?, ? ) WHERE ip = ?"
+        c.execute(sql,(mac, system, system_version, ymd, ip,))
+    conn.commit()
+
+def platform_info(ip):
+    sql = "select * FROM users WHERE ip = ?"
+    c.execute(sql,(ip,))
+    row = c.fetchone()
+    if row is None: return ('','',)
+    return (row['os'],row['os_version'])
+        
+def timeout_info(ip):
+    sql = "select * FROM users WHERE ip = ?"
+    c.execute(sql,(ip,))
+    row = c.fetchone()
+    if row is None: return (0,0,0,)
+    return [row['current_ts'],row['lasttimestamp'],row['send204after']]
+        
+def is_inactive(ip):
+    ts=tstamp(datetime.datetime.now(tzutc()))
+    current_ts, last_ts, send204after = timeout_info(ip) 
+    if not last_ts:
+        return True
+    if ts - int(last_ts) > INACTIVITY_TO:
+        return True
+    else:
+        return False
+
+def is_after204_timeout(ip):
+    ts=tstamp(datetime.datetime.now(tzutc()))
+    current_ts, last_ts, send204after = timeout_info(ip) 
+    if send204after == 0: return False
+    logger.debug("function: is_after204_timeout send204after:%s current: %s"%(send204after,ts,))
+    if not send204after:
+        return False
+    if ts - int(send204after) > 0:
+        return True
+    else:
+        return False
+
+def set_204after(ip,value):
+    global ANDROID_TRIGGERED
+    ts=tstamp(datetime.datetime.now(tzutc()))
+    sql = 'UPDATE users SET send204after = ?  where ip = ?'
+    c.execute(sql,(ts + value,ip,))
+    conn.commit()
+    ANDROID_TRIGGERED = False
+
+def set_lasttimestamp(ip):
+    ts=tstamp(datetime.datetime.now(tzutc()))
+    sql = 'UPDATE users SET lasttimestamp = ?  where ip = ?'
+    c.execute(sql,(ts,ip,))
+    conn.commit()
+
+#  ###################  Action routines based on OS  ################3
+def microsoft(environ,start_response):
+    #logger.debug("sending microsoft response")
+    en_txt={ 'message':"Click on the button to go to the IIAB home page",\
+            'btn1':"GO TO IIAB HOME PAGE",'doc_root':get_iiab_env("WWWROOT")}
+    es_txt={ 'message':"Haga clic en el botón para ir a la página de inicio de IIAB",\
+            'btn1':"IIAB",'doc_root':get_iiab_env("WWWROOT")}
+    if lang == "en":
+        txt = en_txt
+    elif lang == "es":
+        txt = es_txt
+    response_body = str(j2_env.get_template("simple.template").render(**txt))
+    status = '200 OK'
+    response_headers = [('Content-type','text/html'),
+            ('Content-Length',str(len(response_body)))]
+    start_response(status, response_headers)
+    return [response_body]
+
+def android(environ, start_response):
+    global ANDROID_TRIGGERED
+    ip = environ['HTTP_X_FORWARDED_FOR'].strip()
+    system,system_version = platform_info(ip)
+    if system_version[0:1] < '6':
+        logger.debug("system < 6:%s"%system_version)
+        location = '/android_splash'
+        set_204after(ip,0)
+    else:
+        set_204after(ip,20)
+        location = '/android_https'
+    agent = environ['HTTP_USER_AGENT']
+    response_body = "hello"
+    status = '302 Moved Temporarily'
+    response_headers = [('Location',location)]
+    start_response(status, response_headers)
+    return [response_body]
+
+def android_splash(environ, start_response):
+    en_txt={ 'message':"Click on the button to go to the IIAB home page",\
+            'btn1':"GO TO IIAB HOME PAGE", \
+            'doc_root':get_iiab_env("WWWROOT") }
+    es_txt={ 'message':"Haga clic en el botón para ir a la página de inicio de IIAB",\
+            'btn1':"IIAB",'doc_root':get_iiab_env("WWWROOT")}
+    if lang == "en":
+        txt = en_txt
+    elif lang == "es":
+        txt = es_txt
+    response_body = str(j2_env.get_template("simple.template").render(**txt))
+    status = '200 OK'
+    response_headers = [('Content-type','text/html'),
+            ('Content-Length',str(len(response_body)))]
+    start_response(status, response_headers)
+    return [response_body]
+
+def android_https(environ, start_response):
+    en_txt={ 'message':"""Please ignore the SECURITY warning which appears after clicking the first button""",\
+             'btn2':'Click this first Go to the browser we need',\
+             'btn1':'Then click this to go to IIAB home page',\
+            'doc_root':get_iiab_env("WWWROOT") }
+    es_txt={ 'message':"Haga clic en el botón para ir a la página de inicio de IIAB",\
+            'btn1':"IIAB",'doc_root':get_iiab_env("WWWROOT")}
+    if lang == "en":
+        txt = en_txt
+    elif lang == "es":
+        txt = es_txt
+    response_body = str(j2_env.get_template("simple.template").render(**txt))
+    status = '200 OK'
+    response_headers = [('Content-type','text/html'),
+            ('Content-Length',str(len(response_body)))]
+    start_response(status, response_headers)
+    return [response_body]
+
+def mac_splash(environ,start_response):
+    logger.debug("in function mac_splash")
+    en_txt={ 'message':"Click on the button to go to the IIAB home page",\
+            'btn1':"GO TO IIAB HOME PAGE",'success_token': 'Success',
+            'doc_root':get_iiab_env("WWWROOT")}
+    es_txt={ 'message':"Haga clic en el botón para ir a la página de inicio de IIAB",\
+            'btn1':"IIAB",'doc_root':get_iiab_env("WWWROOT")}
+    if lang == "en":
+        txt = en_txt
+    elif lang == "es":
+        txt = es_txt
+    set_lasttimestamp(ip)
+    response_body = str(j2_env.get_template("mac.template").render(**txt))
+    status = '200 Success'
+    response_headers = [('Content-type','text/html'),
+            ('Content-Length',str(len(response_body)))]
+    start_response(status, response_headers)
+    return [response_body]
+
+def macintosh(environ, start_response):
+    global ip
+    logger.debug("in function mcintosh")
+    if not is_inactive(ip):
+        set_lasttimestamp(ip)
+        return success(environ,start_response)
+    # determine if it is time to redirect again
+    if is_after204_timeout(ip):
+        set_204after(ip,10)
+        response_body = """"""
+        status = '302 Moved Temporarily'
+        response_headers = [('content','text/html')]
+        start_response(status, response_headers)
+        return [response_body]
+    else:
+        return mac_splash(environ,start_response)
+
+def microsoft_connect(environ,start_response):
+    status = '200 ok'
+    headers = [('Content-type', 'text/html')]
+    start_response(status, headers)
+    return ["Microsoft Connect Test"]
+
+# =============  Return html pages  ============================
+def banner(environ, start_response):
+    status = '200 OK'
+    headers = [('Content-type', 'image/png')]
+    start_response(status, headers)
+    image = open("%s/iiab-menu/menu-files/images/iiab_banner6.png"%doc_root, "rb").read() 
+    return [image]
+
+def bootstrap(environ, start_response):
+    logger.debug("in bootstrap")
+    status = '200 OK'
+    headers = [('Content-type', 'text/javascript')]
+    start_response(status, headers)
+    boot = open("%s/common/js/bootstrap.min.js"%doc_root, "rb").read() 
+    return [boot]
+
+def jquery(environ, start_response):
+    logger.debug("in jquery")
+    status = '200 OK'
+    headers = [('Content-type', 'text/javascript')]
+    start_response(status, headers)
+    boot = open("%s/common/js/jquery.min.js"%doc_root, "rb").read() 
+    return [boot]
+
+def bootstrap_css(environ, start_response):
+    logger.debug("in bootstrap_css")
+    status = '200 OK'
+    headers = [('Content-type', 'text/css')]
+    start_response(status, headers)
+    boot = open("%s/common/css/bootstrap.min.css"%doc_root, "rb").read() 
+    return [boot]
+
+def null(environ, start_response):
+    status = '200 ok'
+    headers = [('Content-type', 'text/html')]
+    start_response(status, headers)
+    return [""]
+
+def success(environ, start_response):
+    status = '200 ok'
+    html = '
SuccessSuccess'
+    headers = [('Content-type', 'text/html')]
+    start_response(status, headers)
+    return [html]
+
+def put_204(environ, start_response):
+    status = '204 No Data'
+    response_body = ''
+    response_headers = [('Content-type','text/html'),
+            ('Content-Length',str(len(response_body)))]
+    start_response(status, response_headers)
+    logger.debug("in function  put_204: sending 204 html response")
+    return [response_body]
+
+def parse_agent(agent):
+    system = ''
+    system_version = ''
+    match = re.search(r"(Android)\s([.\d]*)",agent)
+    if match:
+        system = match.group(1)
+        system_version = match.group(2)
+    match = re.search(r"(OS X)\s([\d_]*)",agent)
+    if match:
+        system = match.group(1)
+        system_version = match.group(2)
+    match = re.search(r"(iPhone OS)\s([\d_]*)",agent)
+    if match:
+        system = match.group(1)
+        system_version = match.group(2)
+    match = re.search(r"(Windows NT)\s([\d.]*)",agent)
+    if match:
+        system = match.group(1)
+        system_version = match.group(2)
+    return (system, system_version)
+
+#
+# ================== Start serving the wsgi application  =================
+def application (environ, start_response):
+    global ip
+    global CATCH
+    global LIST
+    global INACTIVITY_TO
+    global ANDROID_TRIGGERED
+
+    # Log the URLs that are not in checkurls
+    # This "CATCH" mode substitutes this server for apache at port 80
+    # CATCH mode is started by "iiab-catch" and turned off by "iiab-uncath".
+    if CATCH:
+        logger.debug("Checking for url %s. USER_AGENT:%s"%(environ['HTTP_HOST'],\
+               environ['HTTP_USER_AGENT'],))
+        if environ['HTTP_HOST'] == '/box.lan':
+            return                            
+        if  'HTTP_X_FORWARDED_FOR' in environ:
+            ip = environ['HTTP_X_FORWARDED_FOR'].strip()
+        else:
+            ip = environ['HTTP_HOST'].strip()
+        cmd="arp -an %s|gawk \'{print $4}\'" % ip
+        mac = subprocess.check_output(cmd, shell=True)
+        data = []
+        data.append("host: %s\n"%environ['HTTP_HOST'])
+        data.append("path: %s\n"%environ['PATH_INFO'])
+        data.append("query: %s\n"%environ['QUERY_STRING'])
+        data.append("ip: %s\n"%ip)
+        agent = environ['HTTP_USER_AGENT']
+        data.append("AGENT: %s\n"%agent)
+        #print(data)
+        found = False
+        url_list = os.path.join(CAPTIVE_PORTAL_BASE,"checkurls")
+        if os.path.exists(url_list):
+           with open(url_list,"r") as checkers:
+              for line in checkers:
+                 if line.find(environ['HTTP_HOST']) > -1:
+                    found = True
+                    break
+        if not found:
+            with open(url_list,"a") as checkers:
+               outstr ="%s\n" %  (environ['HTTP_HOST']) 
+               checkers.write(outstr)
+            data = ['%s: %s\n' % (key, value) for key, value in sorted(environ.items()) ]
+            logger.debug("This url was missing from checkurls:%s"%data)
+    
+    # Normal query for captive portal
+    else:
+        if  'HTTP_X_FORWARDED_FOR' in environ:
+            ip = environ['HTTP_X_FORWARDED_FOR'].strip()
+        else:
+            data = ['%s: %s\n' % (key, value) for key, value in sorted(environ.items()) ]
+            #logger.debug("need the correct ip:%s"%data)
+            ip = environ['REMOTE_ADDR'].strip()
+        cmd="arp -an %s|gawk \'{print $4}\'" % ip
+        mac = subprocess.check_output(cmd, shell=True)
+        data = []
+        data.append("host: %s\n"%environ['HTTP_HOST'])
+        data.append("path: %s\n"%environ['PATH_INFO'])
+        data.append("query: %s\n"%environ['QUERY_STRING'])
+        data.append("ip: %s\n"%ip)
+        agent = environ['HTTP_USER_AGENT']
+        data.append("AGENT: %s\n"%agent)
+        logger.debug(data)
+        #print(data)
+        found = False
+        return_204_flag = "False"
+
+        # record the activity with this ip
+        ts=tstamp(datetime.datetime.now(tzutc()))
+        sql = "INSERT or IGNORE INTO users (current_ts,ip) VALUES (?,?)" 
+        c.execute(sql,(ts,ip,))
+        sql = "UPDATE users SET current_ts = ? where ip = ?" 
+        c.execute(sql,(ts,ip,))
+        if c.rowcount == 0:
+            logger.debug("failed UPDATE  users SET current_ts = %s WHERE ip = %s"%(ts,ip,)) 
+        conn.commit()
+        ymd=datetime.datetime.today().strftime("%y%m%d-%H%M")
+
+        system,system_version = parse_agent(agent)
+        if system != '':
+            update_user(ip, mac, system, system_version, ymd)
+
+#######   Return pages based upon PATH   ###############
+        # do more specific stuff first
+        if  environ['PATH_INFO'] == "/iiab_banner6.png":
+            return banner(environ, start_response) 
+
+        if  environ['PATH_INFO'] == "/bootstrap.min.js":
+            return bootstrap(environ, start_response) 
+
+        if  environ['PATH_INFO'] == "/bootstrap.min.css":
+            return bootstrap_css(environ, start_response) 
+
+        if  environ['PATH_INFO'] == "/jquery.min.js":
+            return jquery(environ, start_response) 
+
+        if  environ['PATH_INFO'] == "/favicon.ico":
+            return null(environ, start_response) 
+
+        if  environ['PATH_INFO'] == "/home_selected":
+            # the js link to home page triggers this ajax url 
+            # mark the sign-in conversation completed, return 204 or Success or Success
+            ANDROID_TRIGGERED = True
+            #data = ['%s: %s\n' % (key, value) for key, value in sorted(environ.items()) ]
+            #logger.debug("need the correct ip:%s"%data)
+            logger.debug("function: home_selected. Setting flag to return_204")
+            #print("setting flag to return_204")
+            set_204after(ip,PORTAL_TO)
+            set_lasttimestamp(ip)
+            status = '200 OK'
+            headers = [('Content-type', 'text/html')]
+            start_response(status, headers)
+            return [""]
+
+#### parse OS platform based upon URL  ##################
+        # mac
+        if  environ['PATH_INFO'] == "/mac_splash":
+            return mac_splash(environ, start_response) 
+
+        if  environ['PATH_INFO'] == "/step2":
+            return step2(environ, start_response) 
+
+        if environ['HTTP_HOST'] == "captive.apple.com" or\
+           environ['HTTP_HOST'] == "appleiphonecell.com" or\
+           environ['HTTP_HOST'] == "detectportal.firefox.com" or\
+           environ['HTTP_HOST'] == "*.apple.com.edgekey.net" or\
+           environ['HTTP_HOST'] == "gsp1.apple.com" or\
+           environ['HTTP_HOST'] == "apple.com" or\
+           environ['HTTP_HOST'] == "www.apple.com": 
+           current_ts, last_ts, send204after = timeout_info(ip) 
+           if not send204after:
+                # take care of uninitialized state
+                set_204after(ip,0)
+           return macintosh(environ, start_response) 
+
+        # android
+        if  environ['PATH_INFO'] == "/android_splash":
+           return android_splash(environ, start_response) 
+        if  environ['PATH_INFO'] == "/android_https":
+           return android_https(environ, start_response) 
+        if environ['HTTP_HOST'] == "clients3.google.com" or\
+            environ['HTTP_HOST'] == "mtalk.google.com" or\
+            environ['HTTP_HOST'] == "alt7-mtalk.google.com" or\
+            environ['HTTP_HOST'] == "alt6-mtalk.google.com" or\
+            environ['HTTP_HOST'] == "connectivitycheck.android.com" or\
+            environ['HTTP_HOST'] == "connectivitycheck.gstatic.com":
+            current_ts, last_ts, send204after = timeout_info(ip) 
+            logger.debug("current_ts: %s laat_ts: %s send204after: %s"%(current_ts, last_ts, send204after,))
+            if not last_ts or (ts - int(last_ts) > INACTIVITY_TO):
+                return android(environ, start_response) 
+            elif is_after204_timeout(ip):
+                return put_204(environ,start_response)
+            return null(environ,start_response)  #return without doing anything
+
+        # microsoft
+        if  environ['PATH_INFO'] == "/connecttest.txt" and not is_inactive(ip):
+           return microsoft_connect(environ, start_response) 
+        if environ['HTTP_HOST'] == "ipv6.msftncsi.com" or\
+           environ['HTTP_HOST'] == "ipv6.msftncsi.com.edgesuite.net" or\
+           environ['HTTP_HOST'] == "www.msftncsi.com" or\
+           environ['HTTP_HOST'] == "www.msftncsi.com.edgesuite.net" or\
+           environ['HTTP_HOST'] == "www.msftconnecttest.com" or\
+           environ['HTTP_HOST'] == "teredo.ipv6.microsoft.com" or\
+           environ['HTTP_HOST'] == "teredo.ipv6.microsoft.com.nsatc.net": 
+           return microsoft(environ, start_response) 
+
+    logger.debug("executing the defaut 204 response. [%s"%data)
+    return put_204(environ,start_response)
+
+# Instantiate the server
+httpd = make_server (
+    "", # The host name
+    PORT, # A port number where to wait for the request
+    application # The application object name, in this case a function
+)
+
+httpd.serve_forever()
+#vim: tabstop=3 expandtab shiftwidth=3 softtabstop=3 background=dark
+
diff --git a/roles/network/templates/captive-portal/checkurls b/roles/network/templates/captive-portal/checkurls
new file mode 100755
index 000000000..445022872
--- /dev/null
+++ b/roles/network/templates/captive-portal/checkurls
@@ -0,0 +1,21 @@
+clients3.google.com
+connectivitycheck.gstatic.com
+detectportal.firefox.com
+*.akamaitechnologies.com
+appleiphonecell.com
+thinkdifferent.us
+*.apple.com.edgekey.net
+ipv6.msftncsi.com
+ipv6.msftncsi.com.edgesuite.net
+www.msftncsi.com
+www.msftncsi.com.edgesuite.net
+www.msftconnecttest.com
+teredo.ipv6.microsoft.com
+teredo.ipv6.microsoft.com.nsatc.net
+captive.apple.com
+init-p01st.push.apple.com
+mtalk.google.com
+connectivitycheck.android.com
+alt7-mtalk.google.com
+alt6-mtalk.google.com
+captive.lan
diff --git a/roles/network/templates/captive-portal/iiab-catch b/roles/network/templates/captive-portal/iiab-catch
new file mode 100755
index 000000000..59bf32b65
--- /dev/null
+++ b/roles/network/templates/captive-portal/iiab-catch
@@ -0,0 +1,9 @@
+#!/bin/bash -x
+# substitute our own server to catch OS connectivity checking URL's
+
+systemctl stop apache2
+systemctl stop py-captive-portal
+echo address=/#/172.18.96.1 > /etc/dnsmasq.d/capture
+/opt/iiab/captive-portal/capture-wsgi.py -d &
+# write the pid just started
+echo $! > /opt/iiab/captive-portal/pid
diff --git a/roles/network/templates/captive-portal/iiab-uncatch b/roles/network/templates/captive-portal/iiab-uncatch
new file mode 100755
index 000000000..bfea48d55
--- /dev/null
+++ b/roles/network/templates/captive-portal/iiab-uncatch
@@ -0,0 +1,13 @@
+#!/bin/bash -x
+# Turn off URL recording mode, and return to serving with apache2
+
+kill $(cat /opt/iiab/captive-portal/pid)
+# during testing, I start capture by hand -- recorded pid may be stale
+pid=$(ps aux | grep "capture-wsgi.py -d" | grep -v grep | awk '{print $2}')
+if [ -n "$pid" ]; then
+    kill $pid
+fi
+awk '{print("address=/" $1 "/172.18.96.1")}' /opt/iiab/captive-portal/checkurls > /etc/dnsmasq.d/capture
+awk '{print("ServerAlias ",$1)}' /opt/iiab/captive-portal/checkurls > /etc/apache2/capture
+systemctl start py-captive-portal
+systemctl start apache2
diff --git a/roles/network/templates/captive_portal/captive_portal.service.j2 b/roles/network/templates/captive-portal/py-captive-portal.service.j2
similarity index 80%
rename from roles/network/templates/captive_portal/captive_portal.service.j2
rename to roles/network/templates/captive-portal/py-captive-portal.service.j2
index 03f3c33d5..f1c398bef 100644
--- a/roles/network/templates/captive_portal/captive_portal.service.j2
+++ b/roles/network/templates/captive-portal/py-captive-portal.service.j2
@@ -7,7 +7,7 @@ Type=simple
 User=root
 Group=root
 WorkingDirectory=/opt/iiab/captive-portal
-ExecStart=/opt/iiab/captive-portal/captive_portal.py
+ExecStart=/opt/iiab/captive-portal/capture-wsgi.py
 StandardOutput=syslog
 StandardError=syslog
 
diff --git a/roles/network/templates/gateway/iiab-gen-iptables b/roles/network/templates/gateway/iiab-gen-iptables
index fdd91f56d..1494a2bee 100755
--- a/roles/network/templates/gateway/iiab-gen-iptables
+++ b/roles/network/templates/gateway/iiab-gen-iptables
@@ -9,7 +9,7 @@ IPTABLES_DATA=/etc/sysconfig/iptables
 {% endif %}
 LANIF=$IIAB_LAN_DEVICE
 WANIF=$IIAB_WAN_DEVICE
-MODE=`grep iiab_network_mode_applied  /etc/iiab/iiab.ini | gawk '{print $3}'`
+MODE=`grep iiab_network_mode_applied /etc/iiab/iiab.ini | gawk '{print $3}'`
 
 clear_fw() {
 $IPTABLES -F
@@ -26,7 +26,7 @@ $IPTABLES -A INPUT -p udp --dport 111 -j DROP
 # mysql
 $IPTABLES -A INPUT -p tcp --dport 3306 -j DROP
 $IPTABLES -A INPUT -p udp --dport 3306 -j DROP
-# postgre - not needed listens on lo only
+# postgres - not needed listens on lo only
 $IPTABLES -A INPUT -p tcp --dport 5432 -j DROP
 $IPTABLES -A INPUT -p udp --dport 5432 -j DROP
 # couchdb
@@ -34,7 +34,7 @@ $IPTABLES -A INPUT -p tcp --dport 5984 -j DROP
 $IPTABLES -A INPUT -p udp --dport 5984 -j DROP
 }
 
-if [  "x$WANIF" == "xnone" ] || [ "$MODE" == 'Appliance' ]; then
+if [  "x$WANIF" == "xnone" ] || [ "$MODE" == "Appliance" ]; then
     clear_fw
     # save the rule set
 	{% if is_debuntu %}
@@ -62,7 +62,6 @@ transmission_http_port={{ transmission_http_port }}
 transmission_peer_port={{ transmission_peer_port }}
 sugarizer_port={{ sugarizer_port }}
 block_DNS={{ block_DNS }}
-captive_portal_enabled={{ captive_portal_enabled }}
 py_captive_portal_enabled={{ py_captive_portal_enabled }}
 
 echo "LAN is $lan and WAN is $wan"
@@ -112,28 +111,23 @@ if [  "$gw_block_https" == "True" ]; then
 fi
 
 # Allow outgoing connections from the LAN side.
-if ! [ "$py_captive_portal_enabled" == "True" ];then
+if ! [ "$py_captive_portal_enabled" == "True" ]; then
     $IPTABLES -A FORWARD -i $lan -o $wan -j ACCEPT
 fi
 # Don't forward from the outside to the inside.
 $IPTABLES -A FORWARD -i $wan -o $lan -j DROP
 $IPTABLES -A INPUT -i $wan -j DROP
 
-if [ "$block_DNS" == "True" ];then
+if [ "$block_DNS" == "True" ]; then
     $IPTABLES -t nat -A PREROUTING -i $lan -p tcp --dport 53 ! -d {{ lan_ip }} -j DNAT --to {{ lan_ip }}:53
     $IPTABLES -t nat -A PREROUTING -i $lan -p udp --dport 53 ! -d {{ lan_ip }} -j DNAT --to {{ lan_ip }}:53
 fi
 
-if [ "$captive_portal_enabled" == "True" ];then
-   $IPTABLES -t mangle -N internet
-   $IPTABLES -t mangle -A PREROUTING -i {{ iiab_lan_iface }} -p tcp -m tcp --dport 80 -j internet
-   $IPTABLES -t mangle -A internet -j MARK --set-mark 99
-   $IPTABLES -t nat -A PREROUTING -i {{ iiab_lan_iface }} -p tcp -m mark --mark 99 -m tcp --dport 80 -j DNAT --to-destination {{ lan_ip }}
-
-elif [ "py_$captive_portal_enabled" == "True" ];then
+if [ "$py_captive_portal_enabled" == "True" ]; then
     $IPTABLES  -t nat  -A PREROUTING -i $lan -p tcp --dport 80 ! -d {{ lan_ip }} -j DNAT --to {{ lan_ip }}:{{ py_captive_portal_port }}
+fi
 
-elif [ "$HTTPCACHE_ON" == "True" ]; then
+if [ "$HTTPCACHE_ON" == "True" ]; then
     $IPTABLES  -t nat  -A PREROUTING -i $lan -p tcp --dport 80 ! -d {{ lan_ip }} -j DNAT --to {{ lan_ip }}:3128
 fi
 
diff --git a/vars/default_vars.yml b/vars/default_vars.yml
index ac666d5a3..06ebea839 100644
--- a/vars/default_vars.yml
+++ b/vars/default_vars.yml
@@ -103,23 +103,27 @@ dhcpd_enabled: False
 
 # named
 named_install: True
-named_enabled: True
+named_enabled: False
 block_DNS: False
 
 # dnsmasq
 dnsmasq_install: True
-dnsmasq_enabled: False
+dnsmasq_enabled: True
 
 # Enable in local_vars.yml AFTER installing IIAB!  Then run "cd /opt/iiab/iiab; ./iiab-network"
 dns_jail_enabled: False
 
-# For @tim-moody's Nodogsplash approach to Captive Portal?  High experimental as of June 2018: github.com/iiab/iiab/issues/608
-captive_portal_install: False
-captive_portal_enabled: False
-
-# Simple python Captive Portal, that @m-anish & @jvonau are experimenting with in July 2018: github.com/iiab/iiab/pull/870
+# Python-based Captive Portal, that @m-anish & @jvonau experimented with in
+# July 2018 (https://github.com/iiab/iiab/pull/870) and that @georgejhunt
+# extensively refined in Sept 2018 (https://github.com/iiab/iiab/pull/1179)
 py_captive_portal_install: True
-py_captive_portal_enabled: False
+py_captive_portal_enabled: True
+# In a pinch, disable it by running: systemctl disable py-captive-portal
+
+# For @tim-moody's Nodogsplash approach to Captive Portal?
+# Highly experimental as of June 2018: https://github.com/iiab/iiab/issues/608
+# captive_portal_install: False
+# captive_portal_enabled: False
 
 # Squid
 squid_install: False
diff --git a/vars/local_vars_big.yml b/vars/local_vars_big.yml
index 243f2dc62..ec2e751dd 100644
--- a/vars/local_vars_big.yml
+++ b/vars/local_vars_big.yml
@@ -47,14 +47,17 @@ iiab_gateway_enabled: False
 
 # dnsmasq
 dnsmasq_install: True
-dnsmasq_enabled: False
+dnsmasq_enabled: True
 
 # Enable AFTER installing IIAB!  Then run "cd /opt/iiab/iiab; ./iiab-network"
 dns_jail_enabled: False
 
-# Simple python Captive Portal, that @m-anish & @jvonau are experimenting with in July 2018: github.com/iiab/iiab/pull/870
+# Python-based Captive Portal, that @m-anish & @jvonau experimented with in
+# July 2018 (https://github.com/iiab/iiab/pull/870) and that @georgejhunt
+# extensively refined in Sept 2018 (https://github.com/iiab/iiab/pull/1179)
 py_captive_portal_install: True
-py_captive_portal_enabled: False
+py_captive_portal_enabled: True
+# In a pinch, disable it by running: systemctl disable py-captive-portal
 
 # Stages 3 & 4 must be run (using iiab-install or runrole) if changing these:
 squid_install: True
diff --git a/vars/local_vars_medium.yml b/vars/local_vars_medium.yml
index 7d04368f5..4cc70fd06 100644
--- a/vars/local_vars_medium.yml
+++ b/vars/local_vars_medium.yml
@@ -47,14 +47,17 @@ iiab_gateway_enabled: False
 
 # dnsmasq
 dnsmasq_install: True
-dnsmasq_enabled: False
+dnsmasq_enabled: True
 
 # Enable AFTER installing IIAB!  Then run "cd /opt/iiab/iiab; ./iiab-network"
 dns_jail_enabled: False
 
-# Simple python Captive Portal, that @m-anish & @jvonau are experimenting with in July 2018: github.com/iiab/iiab/pull/870
+# Python-based Captive Portal, that @m-anish & @jvonau experimented with in
+# July 2018 (https://github.com/iiab/iiab/pull/870) and that @georgejhunt
+# extensively refined in Sept 2018 (https://github.com/iiab/iiab/pull/1179)
 py_captive_portal_install: True
-py_captive_portal_enabled: False
+py_captive_portal_enabled: True
+# In a pinch, disable it by running: systemctl disable py-captive-portal
 
 # Stages 3 & 4 must be run (using iiab-install or runrole) if changing these:
 squid_install: False
diff --git a/vars/local_vars_min.yml b/vars/local_vars_min.yml
index a61104c56..b48d9a460 100644
--- a/vars/local_vars_min.yml
+++ b/vars/local_vars_min.yml
@@ -47,14 +47,17 @@ iiab_gateway_enabled: False
 
 # dnsmasq
 dnsmasq_install: True
-dnsmasq_enabled: False
+dnsmasq_enabled: True
 
 # Enable AFTER installing IIAB!  Then run "cd /opt/iiab/iiab; ./iiab-network"
 dns_jail_enabled: False
 
-# Simple python Captive Portal, that @m-anish & @jvonau are experimenting with in July 2018: github.com/iiab/iiab/pull/870
+# Python-based Captive Portal, that @m-anish & @jvonau experimented with in
+# July 2018 (https://github.com/iiab/iiab/pull/870) and that @georgejhunt
+# extensively refined in Sept 2018 (https://github.com/iiab/iiab/pull/1179)
 py_captive_portal_install: True
-py_captive_portal_enabled: False
+py_captive_portal_enabled: True
+# In a pinch, disable it by running: systemctl disable py-captive-portal
 
 # Stages 3 & 4 must be run (using iiab-install or runrole) if changing these:
 squid_install: False