Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    CP using IP address for radius session not username

    Scheduled Pinned Locked Moved Captive Portal
    15 Posts 3 Posters 1.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • G
      guntery
      last edited by guntery

      Thanks, am on 2.6. I can't see how this isn't a bug. (ill try 2.7)

      The issue is authentication using IP address - IP shouldn't have anything to do with auth.

      I removed a section from line 99 of /usr/local/captiveportal/index.php and got past that page.

      the CP now shows this:

      Zone: guest - CONCURRENT LOGIN - REUSING IP 10.1.1.12 WITH DIFFERENT MAC ADDRESS 60:32:b1:2b:a5:42
      

      It didnt work as its not that sessions mac.
      Why you would want to reuse a session due to a different mac same IP?.

      I checked captiveportal.inc and it shows that logic, no idea how it implements it

      if ($cpentry[2] == $clientip) {
      				captiveportal_logportalauth($cpentry[4], $cpentry[3], $cpentry[2], "CONCURRENT LOGIN - REUSING IP {$cpentry[2]} WITH DIFFERENT MAC
      
      GertjanG 3 Replies Last reply Reply Quote 0
      • GertjanG
        Gertjan @guntery
        last edited by

        @guntery said in CP using IP address for radius session not username:

        Thanks, am on 2.6. I can't see how this isn't a bug.

        If you use 2.6.0 : the portal is massively broken 'out of the box';
        You need the System Patches package, and apply the patches listed. If not, it's game over right away.

        There is no need to use the old 2.6.0 these days: 2.7.0 is there to make live less hard.

        No "help me" PM's please. Use the forum, the community will thank you.
        Edit : and where are the logs ??

        1 Reply Last reply Reply Quote 0
        • GertjanG
          Gertjan @guntery
          last edited by

          @guntery said in CP using IP address for radius session not username:

          IP shouldn't have anything to do with auth.

          The captive portal uses sessions. They are IP+MAC+User name + password.
          Or IP+MAC+Voucher code.

          The IP and MAC are used to identify a session.
          The firewall uses the IP and MAC to accepts or refuse a connection (authorization).

          No "help me" PM's please. Use the forum, the community will thank you.
          Edit : and where are the logs ??

          G 1 Reply Last reply Reply Quote 0
          • GertjanG
            Gertjan @guntery
            last edited by

            @guntery said in CP using IP address for radius session not username:

            I checked captiveportal.inc and it shows that logic, no idea how it implements it

            if ($cpentry[2] == $clientip) {
            captiveportal_logportalauth($cpentry[4], $cpentry[3], $cpentry[2], "CONCURRENT LOGIN - REUSING IP {$cpentry[2]} WITH DIFFERENT MAC

            $cpentry[2] is the session's user IP.
            If the IP of the client is the same as one in a current (open) session, then the MAC stored in the session is replaced by the current user's MAC.
            Depending on your choice of "concurrent login, or not".

            Don't stay on 2.6.0, it's depreciated.

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            1 Reply Last reply Reply Quote 0
            • G
              guntery @Gertjan
              last edited by

              @Gertjan said in CP using IP address for radius session not username:

              If the IP of the client is the same as one in a current (open) session, then the MAC stored in the session is replaced by the current user's MAC.

              That makes no sense and it dosent actually work.
              It's beyond me why a completely different device might take over that session just because of same IP.

              I'll check 2.7 but am dubious!

              GertjanG 1 Reply Last reply Reply Quote 0
              • GertjanG
                Gertjan @guntery
                last edited by Gertjan

                @guntery said in CP using IP address for radius session not username:

                That makes no sense and it dosent actually work.

                The thing is : you might be right.
                IIRC : the "Concurrent user logins" was somewhat flawed.

                Check https://redmine.pfsense.org/projects/pfsense/issues?set_filter=1&tracker_id=1 and go back in time.
                To the right, select all "2.6.0" issues or even before.
                Then filter by category "captive portal" issues - get the open ones, and the closed ones.

                But as said : all this dates from way back. Up to you to decide if you want to deal with old issues, or new ones ^^

                No "help me" PM's please. Use the forum, the community will thank you.
                Edit : and where are the logs ??

                G 1 Reply Last reply Reply Quote 0
                • G
                  guntery @Gertjan
                  last edited by

                  2.7 is also broken...

                  I guess as there isnt many google hits it hasnt come up much. I would have thought the CP was used a lot though so thats weird.

                  I'll increase the dhcp pool, make the lease times 30 days and add some remove session code in radius to workaround

                  cheers for the help

                  GertjanG 1 Reply Last reply Reply Quote 0
                  • GertjanG
                    Gertjan @guntery
                    last edited by

                    @guntery
                    No need to Google a potential issue.

                    If there was an issue, you go here : Home > pfSense® Software > Captive Portal - if the captive portal was broken, you would see many post about it.

                    Do you really need to "CP using IP address for radius session not username" ?
                    Does it work when you use the classic "pfSense user Manager" as the authorization source with a user (username and password) ?

                    And when you use FreeRadius : stop Freeradius in the GUI.
                    Open the console/SSH, option 8 and then

                    radiusd -X
                    

                    Use the portal, and see what happens on the console.

                    True, I'm not using 2.7.0 but 23.05.1 I'm using FreeRadius, the classic way : with usernames and password. It works fine.

                    Btw : I've used Google and "CP using IP address for radius session not username" and that shows a potential issue. No one uses the portal like that. At least, very little is know.
                    I agree, it should work. But if it was never tested : stay away from it.

                    No "help me" PM's please. Use the forum, the community will thank you.
                    Edit : and where are the logs ??

                    G 1 Reply Last reply Reply Quote 0
                    • G
                      guntery @Gertjan
                      last edited by

                      nothing to do with radius or auth.

                      the CP uses that $cpentry[2] line in its redirect method and if a session already has that IP when you connect it thinks that's your session

                      it disregards mac and username

                      I can't believe no one has seen this. It would happen a lot less if you say used ideltimeout or had much smaller sessions.

                      GertjanG 1 Reply Last reply Reply Quote 0
                      • S
                        serginho
                        last edited by

                        I also have the same problem, I'm glad the production ones weren't updated, but in the laboratory, but the captive portal has several bugs that I detected, including this one with the release of the ips, I already reviewed the entire source code, but as a lot of changes were made to it, the only way now is for the developer to recognize and correct this error

                        1 Reply Last reply Reply Quote 0
                        • GertjanG
                          Gertjan @guntery
                          last edited by

                          @guntery said in CP using IP address for radius session not username:

                          nothing to do with radius or auth.

                          I agree.

                          @guntery said in CP using IP address for radius session not username:

                          it disregards mac and username

                          It looks like that portal_allow() returns with the $sessonid. Portal firewall rules are not modified, so, while the IP is the same, the MAC will be different. No login page is presented, and no "Internet access" : that's your issue ?

                          That is, I could not create a situation with my setup where another device (another MAC) was using an IP that had already a session.
                          Typically, for my usage, Idle timeout (Minutes) is set to 360 and Hard timeout (Minutes) is set to 720 or 12 hours. The latter will remove sessions.
                          My DHCP leases on my captive portal are set to 86400 sec or 24 hours.

                          @serginho said in CP using IP address for radius session not username:

                          for the developer to recognize and correct this error

                          Feel free to enumerate.
                          And as you walked through the code, you should be able to add lots of details.

                          No "help me" PM's please. Use the forum, the community will thank you.
                          Edit : and where are the logs ??

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.