No description
Find a file
2017-03-06 10:26:20 +01:00
docs/examples more docs and examples. 2016-12-13 15:33:20 +01:00
plugins minor comment 2017-03-03 01:03:56 +01:00
static these files should not be here. 2017-03-06 10:26:20 +01:00
tools syntax error 2017-03-06 09:29:01 +01:00
views these files should not be here. 2017-03-06 10:26:20 +01:00
.gitignore ignore local configs. 2016-12-15 00:16:31 +01:00
plugins.cfg Reworked iptables plugin. 2016-12-08 14:57:30 +01:00
portal.cfg fixing some issues with redirects. 2016-12-14 16:37:32 +01:00
portal.py started writing better tools 2017-03-03 01:04:12 +01:00
portal_local.cfg these files should not be here. 2017-03-06 10:26:20 +01:00
README.md docs 2016-12-15 12:24:19 +01:00
requirements.txt fixed requirements 2016-12-15 00:16:23 +01:00
setup.py completed deps. 2016-12-22 15:40:48 +01:00

Captive Portal

Captive portal webpage written with simplicity in mind.

  • Present a webpage to the user
  • User submits a form
  • Plugins are executed with form data
  • User is granted access to whatever treasure the portal is guarding

This is a commonly seen setup in public Wifi networks or hotspots.

This app was specifically written for such a hotspot and as such requires a lot of other configuration around it. This is an ongoing documentation project here.

More documentation

I've moved all examples from the aforementioned wiki-page to the docs/examples directory.

Plugins

Plugins are executed when the user clicks through the captive portal form, whether they submit data or just approve an EULA these plugins are executed.

Plugins accept data from the request of the user, as of writing this is only wsgi environ data.

Result of the plugins decide whether the user gets accepted into the portal or not. As such plugins have the potential to do anything from check the users IP against a whitelist to authenticate against a RADIUS server or Active Directory.

Sample plugins prefixed with sample_ are a good starting point for understanding the plugins.

Plugins can be made mandatory, or skipped by being disabled, see plugins.cfg for more configuration.

Why plugins, why job queue?

My primary use case for this portal would be with tens of thousands of users so already I imagined that creating firewall rules would be a blocking action.

Also with plugins there are options to connect other authentication methods like LDAP or RADIUS, and even other actions to the portal. All of which are possibly blocking. So plugins and job queues felt like a necessary technology to use. Otherwise this type of portal could be a very simple CGI script that runs a system() command.

Get started

python setup.py install
python portal.py

RQ worker

rq worker -u redis://127.0.0.1:6379/

Deployment

See examples in docs/examples directory.

Technical details

IPtables

At the heart is iptables doing the following.

  1. Labeling all traffic with the number 99 in the mangle table.
  2. Labeled ICMP, DNS and HTTP traffic is redirected to the portal server in the nat table.
  3. All other labeled traffic is dropped.
  4. Authenticated clients are jumped out of the mangle table before being labeled, using the RETURN target.
  5. Authenticated clients are also deleted from conntrack after having their exception rules created in the mangle table.

Portal

All this is of course triggered by the portal application written in Python using Bottle.

  1. A clients redirected HTTP traffic puts them in the portal webpage.
  2. They send a POST form to the /approve url. This can be with user info, personal info, or simply an approve button for a EULA.
  3. The portal executes its plugins in the order that their config section appears in plugins.cfg.
  4. Each plugin is passed the request object from Bottle which contains form values among other things.

Plugins

There's only one relevant plugin right now, iptables. But the idea is that you could add RADIUS plugins or other services. The mandatory flag in plugins.cfg decides if a plugin must pass before a client is authenticated. So you can string several plugins together for several actions that must be performed.

Each plugin responds with JSON.

iptables plugin

  1. Executes the iptables_cmd defined in plugins.cfg, with arguments being the client IP and potentially the client MAC address.
  2. Ensures the exit code of iptables_cmd is 0, if not 0 it sets a failed flag in its JSON response.