#!/usr/local/bin/php . All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ require("globals.inc"); require("util.inc"); require("config.inc"); require("radius_authentication.inc"); require("radius_accounting.inc"); header("Expires: 0"); header("Cache-Control: no-store, no-cache, must-revalidate"); header("Cache-Control: post-check=0, pre-check=0", false); header("Pragma: no-cache"); $orig_host = $_ENV['HTTP_HOST']; $orig_request = $_ENV['CAPTIVE_REQPATH']; $lockfile = "{$g['varrun_path']}/captiveportal.lock"; $clientip = $_ENV['REMOTE_ADDR']; if (!$clientip) { /* not good - bail out */ exit; } /* find MAC address for client */ $clientmac = arp_get_mac_by_ip($clientip); if (!$clientmac && !isset($config['captiveportal']['nomacfilter'])) { /* unable to find MAC address - shouldn't happen! - bail out */ exit; } if ($clientmac && portal_mac_fixed($clientmac)) { /* punch hole in ipfw for pass thru mac addresses */ portal_allow($clientip, $clientmac, "unauthenticated"); } else if ($_POST['accept'] && file_exists("{$g['vardb_path']}/captiveportal_radius.db")) { /* authenticate against radius server */ $radiusservers = captiveportal_get_radius_servers(); if ($_POST['auth_user'] && $_POST['auth_pass']) { $auth_val = RADIUS_AUTHENTICATION($_POST['auth_user'], $_POST['auth_pass'], $radiusservers[0]['ipaddr'], $radiusservers[0]['port'], $radiusservers[0]['key']); if ($auth_val == 2) { captiveportal_logportalauth($_POST['auth_user'],$clientmac,$clientip,"LOGIN"); $sessionid = portal_allow($clientip, $clientmac, $_POST['auth_user'], $_POST['auth_pass']); if (isset($config['captiveportal']['radacct_enable']) && isset($radiusservers[0])) { $auth_val = RADIUS_ACCOUNTING_START($_POST['auth_user'], $sessionid, $radiusservers[0]['ipaddr'], $radiusservers[0]['acctport'], $radiusservers[0]['key'], $clientip); } } else { captiveportal_logportalauth($_POST['auth_user'],$clientmac,$clientip,"FAILURE"); readfile("{$g['varetc_path']}/captiveportal-error.html"); } } else { readfile("{$g['varetc_path']}/captiveportal-error.html"); } } else if ($_POST['accept'] && $config['captiveportal']['auth_method'] == "local") { //check against local usermanager //erase expired accounts if(trim($config['users'][$_POST['auth_user']]['expirationdate'])!="" && strtotime("-1 day")>strtotime($config['users'][$_POST['auth_user']]['expirationdate'])){ unset($config['users'][$_POST['auth_user']]); write_config(); } if($config['users'][$_POST['auth_user']]['password']==md5($_POST['auth_pass'])){ captiveportal_logportalauth($_POST['auth_user'],$clientmac,$clientip,"LOGIN"); portal_allow($clientip, $clientmac,$_POST['auth_user'],0,0); } else { captiveportal_logportalauth($_POST['auth_user'],$clientmac,$clientip,"FAILURE"); readfile("{$g['varetc_path']}/captiveportal-error.html"); } } else if ($_POST['accept'] && $clientip) { portal_allow($clientip, $clientmac, "unauthenticated"); } else if ($_POST['logout_id']) { disconnect_client($_POST['logout_id']); echo << Disconnecting... You've been disconnected. EOD; } else if (($_ENV['SERVER_PORT'] != 8001) && isset($config['captiveportal']['httpslogin'])) { /* redirect to HTTPS login page */ header("Location: https://{$config['captiveportal']['httpsname']}:8001/?redirurl=" . urlencode("http://{$orig_host}{$orig_request}")); } else { /* display captive portal page */ $htmltext = file_get_contents("{$g['varetc_path']}/captiveportal.html"); /* substitute variables */ if (isset($config['captiveportal']['httpslogin'])) $htmltext = str_replace("\$PORTAL_ACTION\$", "https://{$config['captiveportal']['httpsname']}:8001/", $htmltext); else $htmltext = str_replace("\$PORTAL_ACTION\$", "http://{$config['interfaces'][$config['captiveportal']['interface']]['ipaddr']}:8000/", $htmltext); if (preg_match("/redirurl=(.*)/", $orig_request, $matches)) $redirurl = urldecode($matches[1]); else $redirurl = "http://{$orig_host}{$orig_request}"; $htmltext = str_replace("\$PORTAL_REDIRURL\$", htmlspecialchars($redirurl), $htmltext); echo $htmltext; } exit; function portal_mac_fixed($clientmac) { global $g ; /* open captive portal mac db */ if (file_exists("{$g['vardb_path']}/captiveportal_mac.db")) { $fd = @fopen("{$g['vardb_path']}/captiveportal_mac.db","r") ; if (!$fd) { return FALSE; } while (!feof($fd)) { $mac = trim(fgets($fd)) ; if(strcasecmp($clientmac, $mac) == 0) { fclose($fd) ; return TRUE ; } } fclose($fd) ; } return FALSE ; } function portal_allow($clientip,$clientmac,$clientuser,$password = "") { global $orig_host, $orig_request, $g, $config; /* user has accepted AUP - let him in */ portal_lock(); /* get next ipfw rule number */ if (file_exists("{$g['vardb_path']}/captiveportal.nextrule")) $ruleno = trim(file_get_contents("{$g['vardb_path']}/captiveportal.nextrule")); if (!$ruleno) $ruleno = 10000; /* first rule number */ $saved_ruleno = $ruleno; /* generate unique session ID */ $tod = gettimeofday(); $sessionid = substr(md5(mt_rand() . $tod['sec'] . $tod['usec'] . $clientip . $clientmac), 0, 16); /* add ipfw rules for layer 3 */ exec("/sbin/ipfw add $ruleno set 2 skipto 50000 ip from $clientip to any in"); exec("/sbin/ipfw add $ruleno set 2 skipto 50000 ip from any to $clientip out"); /* add ipfw rules for layer 2 */ if (!isset($config['captiveportal']['nomacfilter'])) { $l2ruleno = $ruleno + 10000; exec("/sbin/ipfw add $l2ruleno set 3 deny all from $clientip to any not MAC any $clientmac layer2 in"); exec("/sbin/ipfw add $l2ruleno set 3 deny all from any to $clientip not MAC $clientmac any layer2 out"); } /* read in client database */ $cpdb = array(); $fd = @fopen("{$g['vardb_path']}/captiveportal.db", "r"); if ($fd) { while (!feof($fd)) { $line = trim(fgets($fd)) ; if($line) { $cpdb[] = explode(",",$line); } } fclose($fd); } $radiusservers = captiveportal_get_radius_servers(); /* find an existing entry and delete it */ for ($i = 0; $i < count($cpdb); $i++) { if(!strcasecmp($cpdb[$i][2],$clientip)) { if(isset($config['captiveportal']['radacct_enable']) && isset($radiusservers[0])) { RADIUS_ACCOUNTING_STOP($cpdb[$i][1], // ruleno $cpdb[$i][4], // username $cpdb[$i][5], // sessionid $cpdb[$i][0], // start time $radiusservers[0]['ipaddr'], $radiusservers[0]['acctport'], $radiusservers[0]['key'], $clientip); } mwexec("/sbin/ipfw delete " . $cpdb[$i][1] . " " . ($cpdb[$i][1]+10000)); unset($cpdb[$i]); break; } } /* rewrite information to database */ $fd = @fopen("{$g['vardb_path']}/captiveportal.db", "w"); if ($fd) { foreach ($cpdb as $cpent) { fwrite($fd, join(",", $cpent) . "\n"); } /* write in this new entry */ /* encode password in Base64 just in case it contains commas */ $bpassword = base64_encode($password); fwrite($fd, time().",{$ruleno},{$clientip},{$clientmac},{$clientuser},{$sessionid},{$bpassword}\n") ; fclose($fd); } /* write next rule number */ $fd = @fopen("{$g['vardb_path']}/captiveportal.nextrule", "w"); if ($fd) { $ruleno++; if ($ruleno > 19899) $ruleno = 10000; /* wrap around */ fwrite($fd, $ruleno); fclose($fd); } portal_unlock(); /* redirect user to desired destination */ if ($config['captiveportal']['redirurl']) $redirurl = $config['captiveportal']['redirurl']; else if ($_POST['redirurl']) $redirurl = $_POST['redirurl']; else $redirurl = "http://{$orig_host}{$orig_request}"; if(isset($config['captiveportal']['logoutwin_enable'])) { if (isset($config['captiveportal']['httpslogin'])) $logouturl = "https://{$config['captiveportal']['httpsname']}:8001/"; else $logouturl = "http://{$config['interfaces'][$config['captiveportal']['interface']]['ipaddr']}:8000/"; echo << Redirecting... Redirecting to {$redirurl}... EOD; } else { header("Location: " . $redirurl); } return $sessionid; } /* read RADIUS servers into array */ function captiveportal_get_radius_servers() { global $g; if (file_exists("{$g['vardb_path']}/captiveportal_radius.db")) { $fd = @fopen("{$g['vardb_path']}/captiveportal_radius.db","r"); if ($fd) { $radiusservers = array(); while (!feof($fd)) { $line = trim(fgets($fd)); if ($line) { $radsrv = array(); list($radsrv['ipaddr'],$radsrv['port'],$radsrv['acctport'],$radsrv['key']) = explode(",",$line); $radiusservers[] = $radsrv; } } fclose($fd); return $radiusservers; } } return false; } /* lock captive portal information, decide that the lock file is stale after 10 seconds */ function portal_lock() { global $lockfile; $n = 0; while ($n < 10) { /* open the lock file in append mode to avoid race condition */ if ($fd = @fopen($lockfile, "x")) { /* succeeded */ fclose($fd); return; } else { /* file locked, wait and try again */ sleep(1); $n++; } } } /* unlock captive portal information file */ function portal_unlock() { global $lockfile; if (file_exists($lockfile)) unlink($lockfile); } /* remove a single client by session ID by Dinesh Nair */ function disconnect_client($sessionid) { global $g, $config; portal_lock(); /* read database */ $cpdb = array() ; $fd = @fopen("{$g['vardb_path']}/captiveportal.db", "r"); if ($fd) { while (!feof($fd)) { $line = trim(fgets($fd)) ; if($line) { $cpdb[] = explode(",",$line); } } fclose($fd); } $radiusservers = captiveportal_get_radius_servers(); /* find entry */ for ($i = 0; $i < count($cpdb); $i++) { if ($cpdb[$i][5] == $sessionid) { /* this client needs to be deleted - remove ipfw rules */ if(isset($config['captiveportal']['radacct_enable']) && isset($radiusservers[0])) { RADIUS_ACCOUNTING_STOP($cpdb[$i][1], // ruleno $cpdb[$i][4], // username $cpdb[$i][5], // sessionid $cpdb[$i][0], // start time $radiusservers[0]['ipaddr'], $radiusservers[0]['acctport'], $radiusservers[0]['key'], $cpdb[$i][2]); } mwexec("/sbin/ipfw delete " . $cpdb[$i][1] . " " . ($cpdb[$i][1]+10000)); captiveportal_logportalauth($cpdb[$i][4],$cpdb[$i][3],$cpdb[$i][2],"LOGOUT"); unset($cpdb[$i]); break; } } /* rewrite information to database */ $fd = @fopen("{$g['vardb_path']}/captiveportal.db", "w"); if ($fd) { foreach ($cpdb as $cpent) { fwrite($fd, join(",", $cpent) . "\n"); } fclose($fd); } portal_unlock(); } /* log successful captive portal authentication to syslog */ /* part of this code from php.net */ function captiveportal_logportalauth($user,$mac,$ip,$status) { define_syslog_variables(); openlog("logportalauth", LOG_PID, LOG_LOCAL4); // Log it syslog(LOG_INFO, "$status: $user, $mac, $ip"); closelog(); } ?>