[isf-wifidog] Client captured but no access to login page.
Scott Tully
scott.tully at gmail.com
Ven 25 Fév 09:52:03 EST 2005
Hi all - fist post to the list...
WiFiDog looks to be a really great captive portal system. I am
currently using NoCat and would like to start making a move to using
the dog. But, my initial testing is not going so smoothly...
I am trying to get wifidog 1.0.2 working on a debian sid installation.
Everything goes good up to the point of the redirect to the login
page. I can see the client is captured and the url is properly
formated and the request is being attempted, but never happens. I can
see by looking at the apache access.log on the authserver that the
request never reaches the server. (I can see that "pings" do).
To me, it seems like the rule to allow the client access to the
authserver is not working... Or am i missing something? Can anybody
help me get this working?
TIA
Scott
Here is my iptable dump
>>>>> NAT table: <<<<<
Chain PREROUTING (policy ACCEPT)
target prot opt source destination
WiFiDog_Class all -- 0.0.0.0/0 0.0.0.0/0
Chain POSTROUTING (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain WiFiDog_AuthServers (2 references)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 192.168.1.76
ACCEPT all -- 0.0.0.0/0 216.239.84.234
ACCEPT all -- 0.0.0.0/0 216.239.84.234
Chain WiFiDog_Class (1 references)
target prot opt source destination
WiFiDog_Validate all -- 0.0.0.0/0 0.0.0.0/0
MARK match 0x1
WiFiDog_Known all -- 0.0.0.0/0 0.0.0.0/0 MARK match 0x2
WiFiDog_Locked all -- 0.0.0.0/0 0.0.0.0/0 MARK
match 0x254
WiFiDog_Unknown all -- 0.0.0.0/0 0.0.0.0/0
Chain WiFiDog_Known (1 references)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
Chain WiFiDog_Locked (1 references)
target prot opt source destination
DROP all -- 0.0.0.0/0 0.0.0.0/0
Chain WiFiDog_Unknown (1 references)
target prot opt source destination
WiFiDog_AuthServers all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all -- 0.0.0.0/0 10.10.10.1
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:67
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:67
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:53
REDIRECT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp
dpt:80 redir ports 2060
DROP all -- 0.0.0.0/0 0.0.0.0/0
Chain WiFiDog_Validate (1 references)
target prot opt source destination
WiFiDog_AuthServers all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all -- 0.0.0.0/0 10.10.10.1
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:67
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:67
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:53
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:110
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:995
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:143
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:993
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:220
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:993
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:443
DROP all -- 0.0.0.0/0 0.0.0.0/0
>>>>> Mangle table: <<<<<
Chain PREROUTING (policy ACCEPT)
target prot opt source destination
WiFiDog_Outgoing all -- 0.0.0.0/0 0.0.0.0/0
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain FORWARD (policy ACCEPT)
target prot opt source destination
WiFiDog_Incoming all -- 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain POSTROUTING (policy ACCEPT)
target prot opt source destination
Chain WiFiDog_Incoming (1 references)
target prot opt source destination
Chain WiFiDog_Outgoing (1 references)
target prot opt source destination
>>>>> Filter table: <<<<<
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Plus d'informations sur la liste de diffusion WiFiDog