#!/usr/local/bin/php . All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This version of index.php has been modified by Rob Parker . Changes made are in relation to Per-User Bandwidth Management based on returned RADIUS attributes, and are (c) 2004 Keycom PLC. */ require("globals.inc"); require("util.inc"); require("config.inc"); require("radius_authentication.inc") ; require("radius_accounting.inc") ; header("Expires: 0"); header("Cache-Control: no-store, no-cache, must-revalidate"); header("Cache-Control: post-check=0, pre-check=0", false); header("Pragma: no-cache"); $orig_host = $_ENV['HTTP_HOST']; $orig_request = $_ENV['CAPTIVE_REQPATH']; $lockfile = "{$g['varrun_path']}/captiveportal.lock"; $clientip = $_ENV['REMOTE_ADDR']; if (!$clientip) { /* not good - bail out */ exit; } /* find MAC address for client */ $clientmac = arp_get_mac_by_ip($clientip); if (!$clientmac && !isset($config['captiveportal']['nomacfilter'])) { /* unable to find MAC address - shouldn't happen! - bail out */ exit; } if ($clientmac && portal_mac_fixed($clientmac)) { /* punch hole in ipfw for pass thru mac addresses */ // KEYCOM: passthru mac bandwidth control] if (isset($config['captiveportal']['peruserbw'])) { portal_allow($clientip, $clientmac, "unauthenticated",$config['captiveportal']['bwauthmacup'],$config['captiveportal']['bwauthmacdn']); } else { portal_allow($clientip, $clientmac, "unauthenticated",0,0); } } else if ($_POST['accept'] && file_exists("{$g['vardb_path']}/captiveportal_radius.db")) { /* authenticate against radius server */ $radiusservers = captiveportal_get_radius_servers(); if ($_POST['auth_user'] && $_POST['auth_pass']) { $auth_val = RADIUS_AUTHENTICATION($_POST['auth_user'], $_POST['auth_pass'], $radiusservers[0]['ipaddr'], $radiusservers[0]['port'], $radiusservers[0]['key']); $auth_returns = explode("/", $auth_val); $auth_val = $auth_returns[0]; $bw_up = $auth_returns[1]; $bw_down = $auth_returns[2]; if ($auth_val == 2) { if (isset($config['captiveportal']['peruserbw'])) { $sessionid = portal_allow($clientip, $clientmac, $_POST['auth_user'],$bw_up,$bw_down); } else { $sessionid = portal_allow($clientip, $clientmac, $_POST['auth_user'],0,0); } if (isset($config['captiveportal']['radacct_enable']) && isset($radiusservers[0])) { $auth_val = RADIUS_ACCOUNTING_START($_POST['auth_user'], $sessionid, $radiusservers[0]['ipaddr'], $radiusservers[0]['acctport'], $radiusservers[0]['key'], $clientip); } } else { readfile("{$g['varetc_path']}/captiveportal-error.html"); } } else { readfile("{$g['varetc_path']}/captiveportal-error.html"); } } else if ($_POST['accept'] && $config['captiveportal']['auth_method']=="local") { //check against local usermanager //erase expired accounts if(trim($config['users'][$_POST['auth_user']]['expirationdate'])!="" && strtotime("-1 day")>strtotime($config['users'][$_POST['auth_user']]['expirationdate'])){ unset($config['users'][$_POST['auth_user']]); write_config(); } if($config['users'][$_POST['auth_user']]['password']==md5($_POST['auth_pass'])){ portal_allow($clientip, $clientmac,$_POST['auth_user'],0,0); } else { readfile("{$g['varetc_path']}/captiveportal-error.html"); } } else if ($_POST['accept'] && $clientip) { //KEYCOM: authorised up and down bandwidth defaults (set from webgui). If not set, use 128/128 if (isset($config['captiveportal']['peruserbw'])) { $bw_up=$config['captiveportal']['bwauthipup']; $bw_down=$config['captiveportal']['bwauthipdn']; if(!isset($bw_up)) { $bw_up=128; } if(!isset($bw_down)) { $bw_down=128; } portal_allow($clientip, $clientmac, "unauthenticated",$bw_up,$bw_down); } else { portal_allow($clientip, $clientmac, "unauthenticated",0,0); } } else if ($_POST['logout_id']) { disconnect_client($_POST['logout_id']); echo << Disconnecting... You've been disconnected. EOD; } else if (($_ENV['SERVER_PORT'] != 8001) && isset($config['captiveportal']['httpslogin'])) { /* redirect to HTTPS login page */ header("Location: https://{$config['captiveportal']['httpsname']}:8001/?redirurl=" . urlencode("http://{$orig_host}{$orig_request}")); } else { /* display captive portal page */ $htmltext = file_get_contents("{$g['varetc_path']}/captiveportal.html"); /* substitute variables */ if (isset($config['captiveportal']['httpslogin'])) $htmltext = str_replace("\$PORTAL_ACTION\$", "https://{$config['captiveportal']['httpsname']}:8001/", $htmltext); else $htmltext = str_replace("\$PORTAL_ACTION\$", "", $htmltext); if (preg_match("/redirurl=(.*)/", $orig_request, $matches)) $redirurl = urldecode($matches[1]); else $redirurl = "http://{$orig_host}{$orig_request}"; $htmltext = str_replace("\$PORTAL_REDIRURL\$", htmlspecialchars($redirurl), $htmltext); echo $htmltext; } exit; function portal_mac_fixed($clientmac) { global $g ; /* open captive portal mac db */ if (file_exists("{$g['vardb_path']}/captiveportal_mac.db")) { $fd = @fopen("{$g['vardb_path']}/captiveportal_mac.db","r") ; if (!$fd) { return FALSE; } while (!feof($fd)) { $mac = trim(fgets($fd)) ; if(strcasecmp($clientmac, $mac) == 0) { fclose($fd) ; return TRUE ; } } fclose($fd) ; } return FALSE ; } function portal_allow($clientip,$clientmac,$clientuser,$bw_up,$bw_down) { global $orig_host, $orig_request, $g, $config; /* user has accepted AUP - let him in */ portal_lock(); /* get next ipfw rule number */ if (file_exists("{$g['vardb_path']}/captiveportal.nextrule")) $ruleno = trim(file_get_contents("{$g['vardb_path']}/captiveportal.nextrule")); if (!$ruleno) $ruleno = 10000; /* first rule number */ $saved_ruleno = $ruleno; /* generate unique session ID */ $tod = gettimeofday(); $sessionid = substr(md5(mt_rand() . $tod['sec'] . $tod['usec'] . $clientip . $clientmac), 0, 16); /* add ipfw rules for layer 3 */ exec("/sbin/ipfw add $ruleno set 2 skipto 50000 ip from $clientip to any in"); exec("/sbin/ipfw add $ruleno set 2 skipto 50000 ip from any to $clientip out"); /* KEYCOM: add ipfw rules for dummynet based on bw_up and bw_down */ //we're just copying them by adding on some and hoping no collision will occur //2000 users would be expecting a bit much from a WAP ;) //we're using fixed rule numbers which are 'a step above' the m0n0 ones //this makes sure we always know where our rules are, and taht they are deleted when m0n0's are //they're set so they shouldn't hit anything important, and also so they are in roughly the right position in the fw. //of course, we only need to do this if it's enabled in the config if (isset($config['captiveportal']['peruserbw'])) { $up_rule_number = $ruleno + 40500; $down_rule_number = $ruleno + 45500; $lanif = $config['interfaces']['lan']['if']; exec("/sbin/ipfw add $up_rule_number set 4 pipe $up_rule_number ip from $clientip to any via $lanif"); exec("/sbin/ipfw add $down_rule_number set 4 pipe $down_rule_number ip from any to $clientip via $lanif"); exec("/sbin/ipfw pipe $up_rule_number config bw " . trim($bw_up) . "Kbit/s queue 10"); exec("/sbin/ipfw pipe $down_rule_number config bw " . trim($bw_down) . "Kbit/s queue 10"); } /* done */ /* add ipfw rules for layer 2 */ if (!isset($config['captiveportal']['nomacfilter'])) { $l2ruleno = $ruleno + 10000; exec("/sbin/ipfw add $l2ruleno set 3 deny all from $clientip to any not MAC any $clientmac layer2 in"); exec("/sbin/ipfw add $l2ruleno set 3 deny all from any to $clientip not MAC $clientmac any layer2 out"); } /* read in client database */ $cpdb = array(); $fd = @fopen("{$g['vardb_path']}/captiveportal.db", "r"); if ($fd) { while (!feof($fd)) { $line = trim(fgets($fd)) ; if($line) { $cpdb[] = explode(",",$line); } } fclose($fd); } $radiusservers = captiveportal_get_radius_servers(); /* find an existing entry and delete it */ for ($i = 0; $i < count($cpdb); $i++) { if(!strcasecmp($cpdb[$i][2],$clientip)) { if(isset($config['captiveportal']['radacct_enable']) && isset($radiusservers[0])) { RADIUS_ACCOUNTING_STOP($cpdb[$i][1], // ruleno $cpdb[$i][4], // username $cpdb[$i][5], // sessionid $cpdb[$i][0], // start time $radiusservers[0]['ipaddr'], $radiusservers[0]['acctport'], $radiusservers[0]['key'], $clientip); } //KEYCOM: we need to delete +40500 and +45500 as well... //these are the rule numbers we use to control traffic shaping for each logged in user via captive portal mwexec("/sbin/ipfw delete " . $cpdb[$i][1]); //we only need to remove our rules if peruserbw is turned on. if(isset($config['captiveportal']['peruserbw'])) { mwexec("/sbin/ipfw delete " . ($cpdb[$i][1]+40500)); mwexec("/sbin/ipfw delete " . ($cpdb[$i][1]+45500)); } unset($cpdb[$i]); break; } } /* rewrite information to database */ $fd = @fopen("{$g['vardb_path']}/captiveportal.db", "w"); if ($fd) { foreach ($cpdb as $cpent) { fwrite($fd, join(",", $cpent) . "\n"); } /* write in this new entry */ fwrite($fd, time().",{$ruleno},{$clientip},{$clientmac},{$clientuser},{$sessionid}\n") ; fclose($fd); } /* write next rule number */ $fd = @fopen("{$g['vardb_path']}/captiveportal.nextrule", "w"); if ($fd) { $ruleno++; if ($ruleno > 19899) $ruleno = 10000; /* wrap around */ fwrite($fd, $ruleno); fclose($fd); } portal_unlock(); /* redirect user to desired destination */ if ($config['captiveportal']['redirurl']) $redirurl = $config['captiveportal']['redirurl']; else if ($_POST['redirurl']) $redirurl = $_POST['redirurl']; else $redirurl = "http://{$orig_host}{$orig_request}"; if(isset($config['captiveportal']['logoutwin_enable'])) { if (isset($config['captiveportal']['httpslogin'])) $logouturl = "https://{$config['captiveportal']['httpsname']}:8001/"; else $logouturl = "http://{$config['interfaces'][$config['captiveportal']['interface']]['ipaddr']}:8000/"; echo << Redirecting... Redirecting to {$redirurl}... EOD; } else { header("Location: " . $redirurl); } return $sessionid; } /* read RADIUS servers into array */ function captiveportal_get_radius_servers() { global $g; if (file_exists("{$g['vardb_path']}/captiveportal_radius.db")) { $fd = @fopen("{$g['vardb_path']}/captiveportal_radius.db","r"); if ($fd) { $radiusservers = array(); while (!feof($fd)) { $line = trim(fgets($fd)); if ($line) { $radsrv = array(); list($radsrv['ipaddr'],$radsrv['port'],$radsrv['acctport'],$radsrv['key']) = explode(",",$line); $radiusservers[] = $radsrv; } } fclose($fd); return $radiusservers; } } return false; } /* lock captive portal information, decide that the lock file is stale after 10 seconds */ function portal_lock() { global $lockfile; $n = 0; while ($n < 10) { /* open the lock file in append mode to avoid race condition */ if ($fd = @fopen($lockfile, "x")) { /* succeeded */ fclose($fd); return; } else { /* file locked, wait and try again */ sleep(1); $n++; } } } /* unlock captive portal information file */ function portal_unlock() { global $lockfile; if (file_exists($lockfile)) unlink($lockfile); } /* remove a single client by session ID by Dinesh Nair */ function disconnect_client($sessionid) { global $g, $config; portal_lock(); /* read database */ $cpdb = array() ; $fd = @fopen("{$g['vardb_path']}/captiveportal.db", "r"); if ($fd) { while (!feof($fd)) { $line = trim(fgets($fd)) ; if($line) { $cpdb[] = explode(",",$line); } } fclose($fd); } $radiusservers = captiveportal_get_radius_servers(); /* find entry */ for ($i = 0; $i < count($cpdb); $i++) { if ($cpdb[$i][5] == $sessionid) { /* this client needs to be deleted - remove ipfw rules */ if(isset($config['captiveportal']['radacct_enable']) && isset($radiusservers[0])) { RADIUS_ACCOUNTING_STOP($cpdb[$i][1], // ruleno $cpdb[$i][4], // username $cpdb[$i][5], // sessionid $cpdb[$i][0], // start time $radiusservers[0]['ipaddr'], $radiusservers[0]['acctport'], $radiusservers[0]['key'], $clientip); } //again we need to remve +40500 and +45500 as well, if they exist mwexec("/sbin/ipfw delete " . $cpdb[$i][1] . " " . ($cpdb[$i][1]+10000)); if(isset($config['captiveportal']['peruserbw'])) { mwexec("/sbin/ipfw delete " . ($cpdb[$i][1]+40500)); mwexec("/sbin/ipfw delete " . ($cpdb[$i][1]+45500)); } unset($cpdb[$i]); break; } } /* rewrite information to database */ $fd = @fopen("{$g['vardb_path']}/captiveportal.db", "w"); if ($fd) { foreach ($cpdb as $cpent) { fwrite($fd, join(",", $cpent) . "\n"); } fclose($fd); } portal_unlock(); } ?>