chilli features...

JB list.coovachilli at mac.com
Sun Feb 10 08:44:16 UTC 2008


Hi,

you're welcome.

I guess using a chilli VSA would break the RADIUS RFCs, which say that  
only very few attributes are allowed in an Access-Reject response ([1]  
and [2]). Reply-Message is one of them.

You're right, having an optional parameter like "droptimeout" is  
probably a good idea. Not sending a "normal" Access-Reject (with an  
explanatory message) means that nothing good came from this MAC  
address. Administrators may like to block them for a longer period  
than the normal session/dhcp/idle timeouts without increasing the load  
of the RADIUS server or its database backend.

Just let me know if I can help testing this feature.

JB

[1] http://rfc.net/rfc2865.html#p20
[2] http://rfc.net/rfc5080.html#s2.6.1.


wlan at mac.com (10.02.2008):

> Hi, and thanks for your feedback.
>
> I have been working with the feature, but it still needs more  
> testing before I put it in the wild.
>
> Your suggestion for using the Reply-Message is a good one. Though,  
> might as well use a different attribute; probably a new chilli VSA.
>
> 'Sessions' are maintained in chilli, subject to various timeouts for  
> dhcp lease, idle timeout, etc. So, sessions (or 'connections', as  
> referred to in the code) are handled the same way - keyed on the  
> client's MAC address. When a session is in drop state, of course,  
> all packets are immediately dropped until the session gets cleared.  
> Perhaps it would be an idea to set a specific time period for this  
> state.
>
> David
>
> On Feb 9, 2008, at 8:08 PM, JB wrote:
>
>> Hi,
>>
>> I just stumbled across this idea for a new feature for CoovaChilli:
>>
>> wlan at mac.com wrote:
>>> Right now, when you use MAC authentication, if an access-reject is  
>>> returned, the user will still get assigned an IP address and will  
>>> then be given the captive portal. This is good as a way to have  
>>> certain devices bypass the captive portal. But, it would also be  
>>> nice to use MAC authentication as a way to manage blocked devices.  
>>> I'm considering an option which will have chilli drop all traffic  
>>> from clients that get an access-reject during mac authentication.  
>>> When clients are in the 'drop' state, all traffic from them is  
>>> ignored.
>>
>>
>> I think that would be a great feature! Or has this been already  
>> implemented? If not, here are my two cents:
>>
>> Why not (mis)use the Reply-Message attribute from RADIUS to achieve  
>> this? If the value of Reply-Message is a certain "code", like  
>> "chilli:drop", then Chilli knows it should ignore all further  
>> requests from this MAC address. Basically, there would be three  
>> ways to handle a response from an Access-Request request (apart  
>> from errors or the like):
>>
>> Access-Accept -> UAM "success"
>> Access-Reject and Reply-Message is not "chilli:drop" -> UAM "failed"
>> Access-Reject and Reply-Message is "chilli:drop" -> Drop request(s)
>>
>> This way, we would neither break the current behaviour nor the  
>> RFCs. No need to turn this feature on or off in chilli because the  
>> logic (maybe along with black-/white-lists) resides in the RADIUS  
>> server.
>>
>> Would there still be some sort of session handling? How long would  
>> chilli drop requests until it "asks" RADIUS again?
>>
>> JB
>>



More information about the Chilli mailing list