Bypass Chilli using alternate IPs?
Gunther Mayer
gunther.mayer at googlemail.com
Sat May 3 16:54:36 UTC 2008
Tuc at T-B-O-H.NET wrote:
> Hi,
>
> I'll start out saying this is a Chillispot problem on DD-WRT.
> Unfortunately, support on the DD-WRT forum is generally lacking, so I
> come to you hoping that since this is a branch you'll be able to understand
> and suggest a change for me. If not, I certaininly understand.
>
> On a sample DD-WRT router, I have the chilli.conf to be :
>
> radiusserver1 EXAMPLE.IP.ADDRESS.HERE
> radiusserver2 EXAMPLE.IP.ADDRESS.HERE
> radiussecret TMCQgnAW3f9g31
> dhcpif br0
> uamserver http://www.example.com/cgi-bin/UAM/uam.cgi
> dns1 EXAMPLE.IP.ADDRESS.HERE
> uamsecret aERP68Fi3d9gkh0
> uamallowed www.paypal.com,www.paypalobjects.com,www.seabreezeconnections.com
> radiusnasid SBC-2064
> radiuslisten 192.168.50.13
>
> and :
>
> # ifconfig br0
> br0 Link encap:Ethernet HWaddr 00:16:01:D1:90:3A
> inet addr:192.168.1.1 Bcast:192.168.1.255 Mask:255.255.255.0
> UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
> RX packets:6981 errors:0 dropped:0 overruns:0 frame:0
> TX packets:7444 errors:0 dropped:0 overruns:0 carrier:0
> collisions:0 txqueuelen:0
> RX bytes:690194 (674.0 KiB) TX bytes:5253782 (5.0 MiB)
>
> # ifconfig tun0
> tun0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
> inet addr:192.168.182.1 P-t-P:192.168.182.1 Mask:255.255.255.0
> UP POINTOPOINT RUNNING MTU:1500 Metric:1
> RX packets:5706 errors:0 dropped:0 overruns:0 frame:0
> TX packets:7222 errors:0 dropped:0 overruns:0 carrier:0
> collisions:0 txqueuelen:10
> RX bytes:555035 (542.0 KiB) TX bytes:5097966 (4.8 MiB)
>
> # ifconfig vlan1
> vlan1 Link encap:Ethernet HWaddr 00:16:01:D1:90:3B
> inet addr:192.168.50.13 Bcast:192.168.50.255 Mask:255.255.255.0
> UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
> RX packets:263049 errors:0 dropped:0 overruns:0 frame:0
> TX packets:128066 errors:0 dropped:0 overruns:0 carrier:0
> collisions:0 txqueuelen:0
> RX bytes:31820918 (30.3 MiB) TX bytes:11358988 (10.8 MiB)
>
>
> We've found out that if you MANUALLY set your IP to be in the 192.168.1.X
> range, set 192.168.1.1 as the gateway, and set your own DNS servers.... You can
> surf w/o authenticating... Which is a VERY bad thing...
>
> Is there a way to stop this? (Additional information provided if
> necessary.)
>
I ran across this issue years ago. Your problem is that you have two lan
interfaces, the tun0 one (192.168.182.1/24) and the br0 one. Nothing
stops your box from routing stuff through br0 (the surfing w/o
authenticating). One way to avoid that is to have no ip active on br0
but DD-WRT doesn't allow you enough control to do that iirc. But here's
a simple fix: Put
iptables -I FORWARD -i br0 -j DROP
in your firwall commands and nobody will be able to do that anymore.
In future, please use coova-ap, it's infinitely better, fully open
source and less evil than DD-WRT ;-) well, don't want to start a thread
on dd-wrt vs the rest here...
Gunther
More information about the Chilli
mailing list