Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Captive portal security

    Captive Portal
    4
    7
    2.5k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Y
      yaman.amin
      last edited by

      I read recently some Papers about authentication of  the WLAN users through Captive portal .
      and as it was written in these papers that Captive Portal is something very easy to circumvent  using either ARP spoofing  or man in the middle .
      because they said that after the client being authenticated , it will be recognized by Captive portal system through his MAC address and IP address.
      so any attacker could use some wireschark or sniffing tool to get the MAC  and IP addresses of the Victim , and can make use of them to access the Internet without being authenticated.

      Any body knows how Captive Portal in Pfsense is built?
      which type of redirection does it use ? HTTP redirection, IP redirection or DNS redirection?
      what are the necessary security precautions must we use together with captive portal to make it more secure? for example must we configure snort service on the captive portal interface to enhance security using Intrusion detection  ? what is else we can combine with Captive portal to enhance  Security.

      Thanks for your Feedback

      Yaman Amin

      1 Reply Last reply Reply Quote 0
      • C
        cmb
        last edited by

        That question has no relation to captive portals specifically. Ours enforces IP and MAC associations, but whether those are coming from the appropriate system is impossible to determine once traffic reaches that level. Something to ask your wireless AP vendor. For wifi clients, the AP is the only thing that can prevent such things.

        1 Reply Last reply Reply Quote 0
        • GertjanG
          Gertjan
          last edited by

          To gain more security, the first step would be : do not use radio (Wifi, whatever) devices.
          "Cable" everything ….

          No "help me" PM's please. Use the forum, the community will thank you.
          Edit : and where are the logs ??

          1 Reply Last reply Reply Quote 0
          • Y
            yaman.amin
            last edited by

            @Gertjan:
            Thanks for your reply, i didnt get you exactly, i am using Captive Portal for WLAN Network .
            what do you mean dont use radio(wifi,…), do you mean as aconnection between Access Point (APs) and Core Network?
            so you mean every thing between AP and Core network should be cable connecting?

            1 Reply Last reply Reply Quote 0
            • Y
              yaman.amin
              last edited by

              I also intersted to know is there any special Firewall rules can I configure to get the best security features , in my acptive portal WLAN Network
              I decided to deploy Snort , kindly ask you if there is other packages or rules can man use to enhance security?
              thanks for feed back

              1 Reply Last reply Reply Quote 0
              • GertjanG
                Gertjan
                last edited by

                @yaman.amin:

                @Gertjan:
                Thanks for your reply, i didnt get you exactly, i am using Captive Portal for WLAN Network .
                what do you mean dont use radio(wifi,…), do you mean as aconnection between Access Point (APs) and Core Network?
                so you mean every thing between AP and Core network should be cable connecting?

                No.
                Ditch the AP (the 'box' that converts electric signals on a Cat5/6 câble to radio signals) because radio signals can be intercepted, retransmitted, etc by everybody …
                The physical part of the captive portal function that pfSense offers is nothing more as a "RJ45" connection. Nothings obliges you to use AP's ...
                I propose : use secured optical fibre connections. Only then the transmission becomes somewhat "secure".

                Using a "captive portal" doesn't means you should use AP's ... that your interpretation ;)

                Btw : Wifi, but also CPL, Bleutooth, etc .... if security is an issue, forget about these ..

                No "help me" PM's please. Use the forum, the community will thank you.
                Edit : and where are the logs ??

                1 Reply Last reply Reply Quote 0
                • A
                  asistio04
                  last edited by

                  @yaman.amin:

                  I also intersted to know is there any special Firewall rules can I configure to get the best security features , in my acptive portal WLAN Network
                  I decided to deploy Snort , kindly ask you if there is other packages or rules can man use to enhance security?
                  thanks for feed back

                  Snort will prevent this kind of event?

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.