[isf-wifidog] Redirect

Dr.Marios Moutzouris m.moutzouris at neuron.gr
Mar 27 Sep 09:29:22 EDT 2005


I have tested where the auth server is on the local network and it works
beautifully.


-----Original Message-----
From: wifidog-bounces at listes.ilesansfil.org
[mailto:wifidog-bounces at listes.ilesansfil.org] On Behalf Of Philippe April
Sent: Tuesday, September 27, 2005 4:17 PM
To: WiFiDog Captive Portal
Subject: Re: [isf-wifidog] Redirect

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Yes, the version of openwrt, the version of wifidog you are using  
will help.

If you're willing to, grab Whiterussian RC2 from openwrt.org's  
website, and the ipkg we distribute on sourceforge and you should be  
in business.

If it's not the version, it's because your auth server is located  
inside the LAN and not on the internet, I don't think we have tested  
this configuration!

Let us know, thank you!

Philippe April
GnuPG http://key.philippeapril.com

On 27-Sep-05, at 8:44 AM, Marios Moutzouris wrote:

> Which version of wifidog and openwrt are you using? I had the same  
> problem and it came out to be the redirect module/iptables.
>
>
>
> Marios
>
>
>
> From: wifidog-bounces at listes.ilesansfil.org [mailto:wifidog- 
> bounces at listes.ilesansfil.org] On Behalf Of Dan Holton
> Sent: Tuesday, September 27, 2005 3:30 PM
> To: WiFiDog Captive Portal
> Subject: [isf-wifidog] Redirect
>
>
>
> I have WiFiDog running on a WRT54G, and my auth server (running on  
> debian) plugged into port 1 on the linksys.
>
> I can ping the auth server (192.168.1.139) from the router without  
> a problem.  There weren’t any errors on the setup of the auth server
>
> or on the gateway when I ran wifidog –f –d 7.
>
> When wireless clients connect to the wireless router and try to go  
> to the internet, they are forwarded directly to their page.
>
> Any idea why the router wouldn’t stop clients and force them to the  
> auth server???
>
> I’m trying to find a way of attaching the output of the wifidog –f – 
> d 7 command to an email (since it’s on the linksys, I don’t have a  
> lot of options available to me like FTP, email client, or even just  
> copying the output to disk).
>
> I saved the output to a file, and ran grep for “auth”, and I don’t  
> see any errors.  Some of the lines read:
>
> A lot of firewall stuff (adding rule, etc.)
>
> (date/time)  (centralserver.c:304) Level 1: Connecting to auth  
> server 192.168.1.139:80
>
> (date/time) (centralserver.c:330) Level 1: Successfully connected  
> to auth server 192.168.1.139:80
>
> more firewall stuff
>
> Unlocking Config
>
> Config unlocked
>
> Connected to auth server
>
> AUTH_ONLINE status became ON
>
> HTTP Request to Server: [GET /ping/?gw_id=FarragutWiFi------ßmore  
> stuff, all of it looks correct]
>
> reading response
>
> Read 287 bytes, total now 287 bytes
>
> HTTP Response from Server: [HTTP/1.1 200 OK date/time/ Server:  
> Apache/2.0.54 (Debian GNU/Linux) mod_python/3.1.3 Python/2.3.5 PHP/ 
> 5.0.5-1 mod_perl/2.0.1 Perl/v5.8.7
>
> X-Powered-By: PHP/5.0.5-1
>
> Content-Length: 4
>
> Connection: close
>
> Content-Type: text/html
>
> X-Pad: avoid browser bug
>
> Pong]
>
> [7] [date/time] (ping_thread.c:226) Auth Servert Says: Pong
>
> running fw_counter()
>
> Locking client list
>
> Client list locked
>
> Unlocking client list
>
> Clint list unlocked
>
> Running ping()
>
> Entering ping()
>
> Locking config
>
> Config locked
>
> Level 1: Calculated 1 auth servers in list
>
> Level 1: Resolving auth server [192.168.1.139]
>
> more, much more, but most of it is a repeat of this, or a firewall  
> rule being configured.
>
> Any ideas why clients aren’t being re-directed?
>
> Thanks for any help,
>
> Dan Holton
> IT Administrator
>
> Callahan & Associates, Inc.
> www.CreditUnions.com | www.Callahan.com
> Cooperative Knowledge for the Credit Union Community
>
>
> --
> No virus found in this incoming message.
> Checked by AVG Anti-Virus.
> Version: 7.0.344 / Virus Database: 267.11.7/112 - Release Date:  
> 26/9/2005
>
>
>
> --
> No virus found in this outgoing message.
> Checked by AVG Anti-Virus.
> Version: 7.0.344 / Virus Database: 267.11.7/112 - Release Date:  
> 26/9/2005
>
> _______________________________________________
> WiFiDog mailing list
> WiFiDog at listes.ilesansfil.org
> http://listes.ilesansfil.org/cgi-bin/mailman/listinfo/wifidog

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (Darwin)

iD8DBQFDOUYvOq+Ep5Xn/aARAjW6AKCa2EU9YsrYWAscaWxX/Vo34qS1ZwCeNvcz
zioWh3TNpuXfmdel/YL8NLI=
=4C4m
-----END PGP SIGNATURE-----

-- 
No virus found in this incoming message.
Checked by AVG Anti-Virus.
Version: 7.0.344 / Virus Database: 267.11.7/112 - Release Date: 26/9/2005
 
  

-- 
No virus found in this outgoing message.
Checked by AVG Anti-Virus.
Version: 7.0.344 / Virus Database: 267.11.7/112 - Release Date: 26/9/2005
 



More information about the WiFiDog mailing list