Changeset 11656


Ignore:
Timestamp:
2008-07-05T15:07:12+02:00 (8 years ago)
Author:
florian
Message:

Upgrade wifidog to 1.1.5 (#3667)

Location:
packages/net/wifidog
Files:
2 edited

Legend:

Unmodified
Added
Removed
  • packages/net/wifidog/Makefile

    r10407 r11656  
    1010 
    1111PKG_NAME:=wifidog 
    12 PKG_VERSION:=1.1.4 
     12PKG_VERSION:=1.1.5 
    1313PKG_RELEASE:=1 
    1414 
    1515PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz 
    1616PKG_SOURCE_URL:= @SF/$(PKG_NAME) 
    17 PKG_MD5SUM:=daa4f492dd6acafe0a7127d07633aca5 
     17PKG_MD5SUM:=abe5f7123179a0f08c493ce59fb3cb31 
    1818 
    1919PKG_FIXUP = libtool 
     
    3131 
    3232define Package/wifidog/description 
    33         The Wifidog project is a complete and embeddable captive  
    34         portal solution for wireless community groups or individuals  
    35         who wish to open a free Hotspot while still preventing abuse  
     33        The Wifidog project is a complete and embeddable captive 
     34        portal solution for wireless community groups or individuals 
     35        who wish to open a free Hotspot while still preventing abuse 
    3636        of their Internet connection. 
    3737endef 
  • packages/net/wifidog/files/wifidog.conf

    r9024 r11656  
    1 # $Header$ 
     1# $Id$ 
    22# WiFiDog Configuration file 
    33 
    44# Parameter: GatewayID 
    55# Default: default 
    6 # Optional but essential for monitoring purposes 
     6# Optional 
    77# 
    8 # Set this to the template ID on the auth server 
    9 # this is used to give a customized login page to the clients 
    10 # If none is supplied, the default login page will be used. 
     8# Set this to the node ID on the auth server 
     9# this is used to give a customized login page to the clients and for 
     10# monitoring/statistics purpose 
     11# If none is supplied, the mac address of the GatewayInterface interface will be used, 
     12# without the : separators 
    1113 
    1214GatewayID default 
     
    1618# Optional 
    1719# 
    18 # Set this to the external interface.  Typically vlan1 for OpenWrt, and eth0 or ppp0 otherwise 
     20# Set this to the external interface (the one going out to the Inernet or your larger LAN).   
     21# Typically vlan1 for OpenWrt, and eth0 or ppp0 otherwise, 
     22# Normally autodetected 
    1923 
    2024# ExternalInterface eth0 
     
    2428# Mandatory 
    2529# 
    26 # Set this to the internal interface.    Typically br-lan for OpenWrt, and eth1 otherwise 
     30# Set this to the internal interface (typically your wifi interface).     
     31# Typically br-lan for OpenWrt, and eth1, wlan0, ath0, etc. otherwise 
    2732 
    2833GatewayInterface br-lan 
     
    3237# Optional 
    3338# 
    34 # Set this to the internal IP address of the gateway 
     39# Set this to the internal IP address of the gateway.  Not normally required. 
    3540 
    3641# GatewayAddress 192.168.1.1 
    3742 
    38 # Parameter: AuthServMaxTries 
    39 # Default: 1 
    40 # Optional 
    41 # 
    42 # Sets the number of auth servers the gateway will attempt to contact when a request fails. 
    43 # this number should be equal to the number of AuthServer lines in this 
    44 # configuration but it should probably not exceed 3. 
    45  
    46 # AuthServMaxTries 3 
    47  
    4843# Parameter: AuthServer 
    4944# Default: NONE 
    50 # Mandatory 
     45# Mandatory, repeatable 
    5146# 
    52 # Set this to the hostname or IP of your auth server, the path where 
    53 # WiFiDog-auth resides  and optionally as a second argument, the port it 
    54 # listens on. 
     47# This allows you to configure your auth server(s).  Each one will be tried in order, untill one responds. 
     48# Set this to the hostname or IP of your auth server(s), the path where 
     49# WiFiDog-auth resides in and the port it listens on. 
    5550#AuthServer { 
    56 #       Hostname      (Mandatory; Default: NONE) 
    57 #       SSLAvailable  (Optional; Default: no; Possible values: yes, no) 
    58 #       SSLPort 443   (Optional; Default: 443) 
    59 #       HTTPPort 80   (Optional; Default: 80) 
    60 #       Path wifidog/ (Optional; Default: /wifidog/ Note:  The path must be both prefixed and suffixed by /.  Use a single / for server root.) 
     51#       Hostname                 (Mandatory; Default: NONE) 
     52#       SSLAvailable             (Optional; Default: no; Possible values: yes, no) 
     53#       SSLPort                  (Optional; Default: 443) 
     54#       HTTPPort                 (Optional; Default: 80) 
     55#       Path                     (Optional; Default: /wifidog/ Note:  The path must be both prefixed and suffixed by /.  Use a single / for server root.) 
     56#   LoginScriptPathFragment  (Optional; Default: login/? Note:  This is the script the user will be sent to for login.) 
     57#   PortalScriptPathFragment (Optional; Default: portal/? Note:  This is the script the user will be sent to after a successfull login.) 
     58#   MsgScriptPathFragment    (Optional; Default: gw_message.php? Note:  This is the script the user will be sent to upon error to read a readable message.) 
     59#   PingScriptPathFragment    (Optional; Default: ping/? Note:  This is the script the user will be sent to upon error to read a readable message.) 
     60#   AuthScriptPathFragment    (Optional; Default: auth/? Note:  This is the script the user will be sent to upon error to read a readable message.) 
    6161#} 
    6262 
     
    6969#AuthServer { 
    7070#    Hostname auth2.ilesansfil.org 
    71 #    SSLAvailable yes 
    72 #    Path / 
    73 #} 
    74  
    75 #AuthServer { 
    76 #    Hostname auth3.ilesansfil.org 
    7771#    SSLAvailable yes 
    7872#    Path / 
     
    111105# Optional 
    112106# 
    113 # How many seconds should we wait between timeout checks 
     107# How many seconds should we wait between timeout checks.  This is also 
     108# how often the gateway will ping the auth server and how often it will 
     109# update the traffic counters on the auth server.  Setting this too low 
     110# wastes bandwidth, setting this too high will cause the gateway to take  
     111# a long time to switch to it's backup auth server(s). 
     112 
    114113CheckInterval 60 
    115114 
     
    121120# The timeout will be INTERVAL * TIMEOUT 
    122121ClientTimeout 5 
     122 
     123# Parameter: TrustedMACList 
     124# Default: none 
     125# Optional 
     126# 
     127# Comma separated list of MAC addresses who are allowed to pass 
     128# through without authentication 
     129#TrustedMACList 00:00:DE:AD:BE:AF,00:00:C0:1D:F0:0D 
    123130 
    124131# Parameter: FirewallRuleSet 
     
    136143#  
    137144# Used for rules to be applied to all other rulesets except locked. 
    138 # This is the default config for the Teliphone service. 
    139145FirewallRuleSet global { 
    140     FirewallRule allow udp to 69.90.89.192/27 
    141     FirewallRule allow udp to 69.90.85.0/27 
    142     FirewallRule allow tcp port 80 to 69.90.89.205 
     146    ## To block SMTP out, as it's a tech support nightmare, and a legal liability 
     147    #FirewallRule block tcp port 25 
     148     
     149    ## Use the following if you don't want clients to be able to access machines on  
     150    ## the private LAN that gives internet access to wifidog.  Note that this is not 
     151    ## client isolation;  The laptops will still be able to talk to one another, as 
     152    ## well as to any machine bridged to the wifi of the router. 
     153    # FirewallRule block to 192.168.0.0/16 
     154    # FirewallRule block to 172.16.0.0/12 
     155    # FirewallRule block to 10.0.0.0/8 
     156     
     157    ## This is an example ruleset for the Teliphone service. 
     158    #FirewallRule allow udp to 69.90.89.192/27 
     159    #FirewallRule allow udp to 69.90.85.0/27 
     160    #FirewallRule allow tcp port 80 to 69.90.89.205 
    143161} 
    144162 
     
    147165# Used for new users validating their account 
    148166FirewallRuleSet validating-users { 
    149     FirewallRule block tcp port 25 
    150167    FirewallRule allow to 0.0.0.0/0 
    151168} 
     
    172189# Rule Set: locked-users 
    173190# 
    174 # Used for users that have been locked out. 
     191# Not currently used 
    175192FirewallRuleSet locked-users { 
    176193    FirewallRule block to 0.0.0.0/0 
Note: See TracChangeset for help on using the changeset viewer.