<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Securing Captive Portal with OS fingerprinting]]></title><description><![CDATA[<p dir="auto">Hi all!</p>
<p dir="auto">I would like to discuss something with you that crossed my mind: pfSense uses pf's OS detection in firewall rules. I'm thinking about adding to the security of a Captive Portal scenario by using OS fingerprinting. pfSense allows net access to the MAC and IP of a client who successfully logged in. My question is: wouldn't it make sense to add the OS (that has been detected by pf) to the pf rule as well that allows guest access? Any thoughts? It definitely isn't a solution that will prevent spoofing 100% but it very likely makes things much more difficult. Adding something like Ipguard would add even more security. The only question is what a good way would be to integrate pf's OS fingerprinting and Ipguard with the Captive Portal. Your thoughts are highly appreciated.</p>
<p dir="auto">Cheers,<br />
cs1</p>
<p dir="auto">EDIT: Clarified some terms (OS fingerprinting is included in pf) and included mentioning of Ipguard.</p>
]]></description><link>https://forum.netgate.com/topic/95927/securing-captive-portal-with-os-fingerprinting</link><generator>RSS for Node</generator><lastBuildDate>Mon, 13 Apr 2026 23:14:35 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/topic/95927.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 24 Feb 2016 11:24:29 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Securing Captive Portal with OS fingerprinting on Thu, 25 Feb 2016 05:59:51 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/sebastiannielsen">@<bdi>sebastiannielsen</bdi></a>:</p>
<blockquote>
<p dir="auto">no, he isn't out to restrict to a specific OS.</p>
<p dir="auto">what he is out for, is, when a client authenticate correctly, the client's MAC, OS-fingerprint, and IP is saved in the firewall rule.<br />
So the OS-fingerprint must match whatever the user authenticated with, to prevent spoofing.</p>
</blockquote>
<p dir="auto">Yes, that's precisely what I'm looking for. I wasn't aware that pf wasn't used for the Captive Portal. However, since pf is still available for filtering, I was thinking about something like this:</p>
<ul>
<li>
<p dir="auto">Create a pf rule that logs the OS fingerprints of clients.</p>
</li>
<li>
<p dir="auto">After a successful login of a user, create a pf rule for the IP that the user got that only allows TCP traffic with the OS fingerprint that has been detected during login.</p>
</li>
<li>
<p dir="auto">After either a voluntary logout by the user herself or after the soft / hard timeout, remove the pf rule for the user's IP.</p>
</li>
</ul>
<p dir="auto">This should add one more layer of security. Sure, it's not foolproof but certainly would add one more hurdle to abuse.</p>
]]></description><link>https://forum.netgate.com/post/605019</link><guid isPermaLink="true">https://forum.netgate.com/post/605019</guid><dc:creator><![CDATA[cs1]]></dc:creator><pubDate>Thu, 25 Feb 2016 05:59:51 GMT</pubDate></item><item><title><![CDATA[Reply to Securing Captive Portal with OS fingerprinting on Thu, 25 Feb 2016 02:38:41 GMT]]></title><description><![CDATA[<p dir="auto">There are no pf rules added for captive portal users and ipfw has no OS fingerprinting.</p>
]]></description><link>https://forum.netgate.com/post/605002</link><guid isPermaLink="true">https://forum.netgate.com/post/605002</guid><dc:creator><![CDATA[cmb]]></dc:creator><pubDate>Thu, 25 Feb 2016 02:38:41 GMT</pubDate></item><item><title><![CDATA[Reply to Securing Captive Portal with OS fingerprinting on Thu, 25 Feb 2016 02:32:41 GMT]]></title><description><![CDATA[<p dir="auto">no, he isn't out to restrict to a specific OS.</p>
<p dir="auto">what he is out for, is, when a client authenticate correctly, the client's MAC, OS-fingerprint, and IP is saved in the firewall rule.<br />
So the OS-fingerprint must match whatever the user authenticated with, to prevent spoofing.</p>
]]></description><link>https://forum.netgate.com/post/605001</link><guid isPermaLink="true">https://forum.netgate.com/post/605001</guid><dc:creator><![CDATA[sebastiannielsen]]></dc:creator><pubDate>Thu, 25 Feb 2016 02:32:41 GMT</pubDate></item><item><title><![CDATA[Reply to Securing Captive Portal with OS fingerprinting on Wed, 24 Feb 2016 18:44:53 GMT]]></title><description><![CDATA[<p dir="auto">pf isn't used for Captive Portal itself, ipfw handles that.</p>
<p dir="auto">what would be the point of using os-fingerprinting in addtion to the voucher/user/mac authentication scheme's? Why would you want to restrict a certain user to a specific OS ?</p>
<p dir="auto">captive portal to authenticate on general purpose / free / "public' / networks. like in hotels/bars/cafe's/guest access in enterprises/…). I personally see no use i such a feature.</p>
]]></description><link>https://forum.netgate.com/post/604931</link><guid isPermaLink="true">https://forum.netgate.com/post/604931</guid><dc:creator><![CDATA[heper]]></dc:creator><pubDate>Wed, 24 Feb 2016 18:44:53 GMT</pubDate></item></channel></rss>