MME-Connections / wifi-hotspot

deploying a wifi hotspot with captive portal using coovachilli in raspbian or ubuntu
MIT License
9 stars 4 forks source link

wifi-hotspot

deploying a wifi hotspot with captive portal using coovachilli in raspbian and ubuntu

Requirements

In order to build a captive portal solution, we will need the following:

RaspberryPi

CoovaChilli needs two network interfaces, we choose eth0 and wlan0.

hostapd

Install and deploy hostapd

Hostapd allows your computer to function as an Access Point (AP) WPA/WPA2 Authenticator. Since debian-based systems have pre-packaged version of hostapd, a simple command will install this package

sudo apt-get install hostapd
sudo echo 'DAEMON_CONF="/etc/hostapd/hostapd.conf"' >> /etc/default/hostapd
sudo vim /etc/hostapd/hostapd.conf

Change the following parameters in hostapd.conf file:

interface=wlan0 # Change this to your wifi interface
driver=nl80211
ssid=MyWiFiHotspot  # Change this to your SSID
#hw_mode=g
channel=1 # Enter your desired channel
macaddr_acl=0
auth_algs=1
ignore_broadcast_ssid=0

Note: You have to delete all the comments in the hostpad config file. Hostapd doesn't support comments in the config file.

Test and start hostapd:

sudo hostapd -d /etc/hostapd/hostapd.conf

If all goes well, the hostapd daemon should start and not quit.

sudo service hostapd restart

Starting hostapd at boot time

Enable the service to start automatically at boot:

sudo systemctl enable hostapd

If you had issues trying to start hostapd in Ubuntu desktop, run the following command:

sudo nmcli radio wifi off
sudo rfkill unblock wlan
sudo systemctl start hostapd
sudo systemctl status hostapd

MySQL

Install and deploy MySQL server

Preparing to package installation. MySQL password is set at “raspbian”. Of course you can put whatever you want.

sudo apt-get install -y debconf-utils
debconf-set-selections <<< 'mysql-server mysql-server/root_password password raspbian'
debconf-set-selections <<< 'mysql-server mysql-server/root_password_again password raspbian'

Install MySQL server.

sudo apt-get install -y debhelper libssl-dev libcurl4-gnutls-dev mysql-server gcc make pkg-config iptables 

Starting MySQL at boot time

Start MySQL server if it is not running.

sudo systemctl start mysql

Make sure service start even at boot:

sudo systemctl enable mysql

FreeRADIUS

FreeRadius server is also available in Ubuntu’s and debian's repo, so we can simply install it using apt-get.

Install and deploy FreeRADIUS server

Install required packages.

sudo apt-get install -y freeradius freeradius-mysql 

Create radius database.

mysqladmin -u root -p raspbian create radius

Configure MySQL database for FreeRadius

Generate database tables using MySQL schema.

sudo cat /etc/freeradius/3.0/mods-config/sql/main/mysql/schema.sql | mysql -u root -p raspbian radius

Create MySQL radius user and set privileges on radius database:

mysql -u root -p raspbian radius

GRANT ALL PRIVILEGES ON radius.* to [freeradius_db_user]@[host_address] IDENTIFIED by '[freeradius_db_password]';

Configure FreeRADIUS

Edit client definition.

sudo vim /etc/freeradius/3.0/clients.conf

The shared secret use to "encrypt" and "sign" packets between the NAS and FreeRADIUS. This secret must be changed from the default, otherwise it is not a secret anymore!

client localhost { 
    ... 
    secret = radtesting123 # Change this to your shared secret
    ...
}

Configure the SQL radius module.

sudo vim /etc/freeradius/3.0/mods-enabled/sql

Change the following parameters:

driver = "rlm_sql_mysql"
dialect = "mysql"
server = "[host_address]"
port = 3306
login = "[freeradius_db_user]"
password = "[freeradius_db_password]"
radius_db = "radius"
read_clients = yes

Next link sql to modules available.

sudo ln -s /etc/freeradius/3.0/mods-available/sql /etc/freeradius/3.0/mods-enabled/sql

Configure the default virtual server under sites-available:

sudo vim /etc/freeradius/3.0/sites-available/default

Change the following:

'-sql' to sql

Testing the FreeRADIUS server

Now test your configuration by stopping and restarting the FreeRadius in debug mode.

sudo service freeradius stop
sudo freeradius -X

Make a connection test. For this, open another terminal and create a test user usertest with his password passwd

echo "insert into radcheck (username, attribute, op, value) values ('usertest', 'Cleartext-Password', ':=', 'passwd');" | mysql -u root -praspbian radius

And now to test you use the command

radtest usertest passwd localhost 0 radtesting123

radtest should return:

Sent Access-Request Id 158 from 0.0.0.0:49930 to 127.0.0.1:1812 length 78
    User-Name = "usertest"
    User-Password = "passwd"
    NAS-IP-Address = 127.0.1.1
    NAS-Port = 0
    Message-Authenticator = 0x00
    Cleartext-Password = "passwd"
Received Access-Accept Id 158 from 127.0.0.1:1812 to 0.0.0.0:0 length 20

Starting FreeRADIUS at boot time

Enable freeradius so it starts up at boot time.

sudo systemctl enable freeradius
sudo systemctl start freeradius

CoovaChilli

Install first the dependencies

To make sure CoovaChilli will run without any problems, we will install the dependencies first. To do so, run the following commands:

sudo apt-get update
sudo apt-get install -y -f debhelper devscripts libcurl4-gnutls-dev haserl g++ gengetopt bash-completion libtool libltdl-dev libjson-c-dev libssl-dev make cmake autoconf automake build-essential dpkg-dev

Download and install the CoovaChilli

Clone the project to your directory

git clone https://github.com/MME-Connections/coova-chilli.git

Once cloned, move inside it.

cd coova-chilli

Then build the debian package,

sudo dpkg-buildpackage -us -uc

After building debian package is done, install the generated .deb file:

sudo dpkg -i coova-chilli_<latest_version_here>_<architecture_here>.deb

Starting CoovaChilli

Don’t forget to enable CoovaChilli to start in /etc/default/chilli

START_CHILLI=1

To start CoovaChilli, run the following command

sudo /etc/init.d/chilli start

Enable CoovaChilli so it starts up at boot time.

sudo systemctl enable chilli

Configure CoovaChilli

All configuration files are located under /etc/chilli. You will need to create a config file with your sites modifications.

sudo cp -v /etc/chilli/defaults /etc/chilli/config
sudo vim /etc/chilli/config

Change the following parameters to match your environment.

###
#   Local Network Configurations
HS_WANIF=eth0            # WAN Interface toward the Internet
HS_LANIF=wlan0            # Subscriber Interface for client devices
HS_NETWORK=10.10.10.0      # HotSpot Network (must include HS_UAMLISTEN)
HS_NETMASK=255.255.255.0   # HotSpot Network Netmask
HS_UAMLISTEN=10.10.10.1    # HotSpot IP Address (on subscriber network)
HS_UAMPORT=3990            # HotSpot UAM Port (on subscriber network)
HS_UAMUIPORT=4990          # HotSpot UAM "UI" Port (on subscriber network, for embedded portal)

... 

# OpenDNS Servers
HS_DNS1=10.10.10.1         # Set this to be the HotSpot IP Address if dnsmasq or BIND is running locally, otherwise use other DNS server
HS_DNS2=208.67.220.220

...

###
#   HotSpot settings for simple Captive Portal
HS_NASID=nas01          # NAS ID
HS_RADIUS=localhost     # FreeRadius server
HS_RADIUS2=localhost        # FreeRadius server

HS_UAMALLOW=10.10.10.0/24

HS_RADSECRET=radtesting123      # Set to be your RADIUS shared secret
HS_UAMSECRET=uamtesting123      # Set to be your UAM secret

...

###
#   Firewall issues
#   
#   Uncomment the following to add ports to the allowed local ports list
#   The up.sh script will allow these local ports to be used, while the default
#   is to block all unwanted traffic to the tun/tap. 
HS_TCP_PORTS="80 443"

...

###
#   Standard configurations
HS_ADMUSR=coovachillispot
HS_ADMPWD=coovachillispot

Network routing

We should not forget to enable packet forwarding and setup NAT (network address translation).

To enable packet forwarding, permanently set forwarding by editing the /etc/sysctl.conf file. Find and edit the following line, replacing 0 with 1.

net.ipv4.ip_forward = 1

Execute the following command to enable the change to the sysctl.conf file.

 sysctl -p /etc/sysctl.conf

Edit the file /etc/chilli/up.sh with execution permission. At the end of file, paste the following

#Enable NAT
iptables -I POSTROUTING -t nat -o $HS_WANIF -j MASQUERADE
#Others iptables rules when chilli come up

Test it out

Restart CoovaChilli for the latest changes to be effected.

sudo /etc/init.d/chilli stop
sudo /etc/init.d/chilli start

Nginx

Nginx is one of the most popular web servers in the world and is responsible for hosting some of the largest and highest-traffic sites on the internet. It is more resource-friendly than Apache in most cases and can be used as a web server or a reverse proxy.

Nginx is available in Ubuntu's and debian's default repositories, so the installation is rather straight forward.

sudo apt-get install -y php-mysql php-pear php-gd php-db php-fpm libgd2-xpm-dev libpcrecpp0v5 libxpm4 nginx php-memcache

Starting nginx at boot time

enable the service to start up at boot

sudo systemctl enable nginx

Hotspot Login

Installation

Download the source and unzip the file

wget -c https://github.com/MME-Connections/hotspot-login/archive/master.zip -O hotspot-login-master.zip

unzip hotspot-login-master.zip

Create webroot folder for the hotspot domain name, copy the hotspot-login in the webroot folder

sudo mkdir /var/www/hotspot.example.com
mv hotspot-login-master /var/www/hotspot.example.com/

Create a server block in nginx

Create the server block file that will tell Nginx on how to process the hotspot login utility.

sudo vim /etc/nginx/sites-available/hotspot.example.com

Copy the following lines and paste it into the server block file

server {
    # Redirect all HTTP traffic to HTTPS since daloRADIUS requires an HTTPS connection
    listen 10.10.10.1:80 default_server; # Change this to match your HotSpot IP address
    server_name hotspot.example.com; # Change this to your domain name
    return 301 https://$server_name$request_uri;
}

server {
    listen 10.10.10.1:443 ssl default_server; # Change this to match your HotSpot IP address
        server_name hotspot.example.com;  # Change this to your domain name

        # Self signed certs generated by the ssl-cert package
        # Don't use them in a production server!
        include snippets/snakeoil.conf;

    # Replace your signed ssl certificate 
    # ssl_certificate /etc/ssl/certs/<public_key_of_ssl_certificate_here>.pem;
    # ssl_certificate_key /etc/ssl/private/<private_key_of_ssl_certificate_here>.key;

    root /var/www/hotspot.example.com; # Change this to match the folder of your hotspot app
    index hotspotlogin.php index.php index.phtml index.html index.htm;

    location / {
        # First attempt to serve request as file, then
        # as directory, then fall back to displaying a 404.
        try_files $uri $uri/ /index.php?$args /hotspotlogin.php?$args $uri/ =404;
    }

    location ~ \.php$ {
        include snippets/fastcgi-php.conf;
        fastcgi_pass unix:/run/php/php7.1-fpm.sock; # check the php-fpm.conf configuration listen directive
    }
}

That is all we need for a basic configuration. Save and close the file to exit.

Enable the server block and restart nginx

Now that we have our server block file, we need to enable them. We can do this by creating symbolic links from these files to the sites-enabled directory, which Nginx reads from during startup.

We can create these links by typing:

sudo ln -s /etc/nginx/sites-available/hotspot.example.com /etc/nginx/sites-enabled/

Next, test to make sure that there are no syntax errors in any of your Nginx files:

sudo nginx -t

If no problems were found, restart Nginx to enable your changes:

sudo systemctl restart nginx

Modify configuration in CoovaChilli and in the hotspot-login

Edit /etc/chilli/config.

sudo vi /etc/chilli/config
#   Use HS_UAMFORMAT to define the actual captive portal url.
HS_UAMFORMAT=https://\$HS_UAMLISTEN/hotspotlogin.php

HS_UAMHOMEPAGE=http://\$HS_UAMLISTEN:\$HS_UAMPORT/prelogin

Edit /var/www/hotspot.example.com/hotspotlogin.php

sudo vi /var/www/hotspot.example.com/hotspotlogin.php
# Shared secret used to encrypt challenge with. Prevents dictionary attacks.
# You should change this to your own shared secret.
$uamsecret = "uamtesting123"; # Change this to match the coovachilli config directive HS_UAMSECRET

Restart the captive portal

Let’s now start the hostapd, nginx and CoovaChilli. And try accessing captive portal from our web browser.

sudo systemctl stop hostapd
sudo systemctl stop nginx
sudo systemctl stop chilli

sudo systemctl start chilli
sudo systemctl start nginx
sudo systemctl start hostapd

Testing your captive portal

Using a wireless client like smartphone or laptop, click the Wi-Fi icon in your laptop's Menu bar, or open the Settings app and tap Wi-Fi on an iPad or Android phone, and choose the Wi-Fi hotspot.

If your followed the above steps, then you will be redirected to the captive portal page. Use the access credential of test user created earlier.

username: usertest
password: passwd

That should be it. You should now be able to browse the internet on your laptop or smartphone.

daloRADIUS (Optional)

Download daloRADIUS

We configure daloRADIUS hotspotlogin into your desired webroot folder (/var/www/hotspotmgmt.example.com).

wget -c https://github.com/MME-Connections/daloradius/archive/master.zip -O daloradius.master.zip
unzip daloradius.master.zip

Create webroot folder for the hotspot domain name, copy the captive portal login page and move daloradius in that webroot folder

sudo mkdir /var/www/hotspotmgmt.example.com
cp -r daloradius-master/contrib/chilli/portal2/hotspotlogin/* /var/www/hotspotmgmt.example.com/
sudo mv daloradius-master /var/www/hotspotmgmt.example.com/daloradius

Modify the MySQL database for FreeRadius

mysql -u root -praspbian radius < /var/www/hotspotmgmt.example.com/daloradius/contrib/db/fr2-mysql-daloradius-and-freeradius.sql

Re-insert our test user.

echo "insert into radcheck (username, attribute, op, value) values ('usertest', 'Cleartext-Password', ':=', 'passwd');" | mysql -u root -praspbian radius

Create a server block in nginx

Create the server block file that will tell Nginx on how to process the hotspot login web app and daloRADIUS.

sudo vim /etc/nginx/sites-available/hotspotmgmt.example.com

Copy the following lines and paste it into the server block file

server {
    # Redirect all HTTP traffic to HTTPS since daloRADIUS requires an HTTPS connection
    listen :80 default_server; # Change this to match your HotSpot IP address
    server_name hotspotmgmt.example.com; # Change this to your domain name
    return 301 https://$server_name$request_uri;
}

server {
    listen :443 ssl default_server; # Change this to match your HotSpot IP address
        server_name hotspotmgmt.example.com;  # Change this to your domain name

        # Self signed certs generated by the ssl-cert package
        # Don't use them in a production server!
        include snippets/snakeoil.conf;

    # Replace your signed ssl certificate 
    # ssl_certificate /etc/ssl/certs/<public_key_of_ssl_certificate_here>.pem;
    # ssl_certificate_key /etc/ssl/private/<private_key_of_ssl_certificate_here>.key;

    root /var/www/hotspotmgmt.example.com; # Change this to match the folder of your hotspot app
    index index.php index.phtml index.html index.htm;

    location / {
        # First attempt to serve request as file, then
        # as directory, then fall back to displaying a 404.
        try_files $uri $uri/ /index.php?$args $uri/ =404;
    }

    location /daloradius {
        alias /var/www/hotspotmgmt.example.com/daloradius;
    }

    location ~ ^/daloradius(.+\.php)$ {
        alias /var/www/hotspotmgmt.example.com/daloradius;
        fastcgi_index index.php;
        fastcgi_param SCRIPT_FILENAME /var/www/hotspotmgmt.example.com/daloradius$1;
        include fastcgi_params;
        fastcgi_pass unix:/run/php/php7.1-fpm.sock; # check the php-fpm.conf configuration regarding the path of listen directive
    }

    location ~ ^/daloradius/(.*\.(eot|otf|woff|ttf|css|js|jpg|jpeg|gif|png|ico|zip|tgz|gz|rar|bz2|xls|tar|bmp))$ {
        alias /var/www/hotspotmgmt.example.com/daloradius/$1;
        expires 30d;
        log_not_found off;
        access_log off;
    }

    location ~ \.php$ {
        include snippets/fastcgi-php.conf;
        fastcgi_pass unix:/run/php/php7.1-fpm.sock; # check the php-fpm.conf configuration listen directive
    }
}

That is all we need for a basic configuration. Save and close the file to exit.

Enable the server block and restart nginx

Now that we have our server block file, we need to enable them. We can do this by creating symbolic links from these files to the sites-enabled directory, which Nginx reads from during startup.

We can create these links by typing:

sudo ln -s /etc/nginx/sites-available/hotspotmgmt.example.com /etc/nginx/sites-enabled/

Next, test to make sure that there are no syntax errors in any of your Nginx files:

sudo nginx -t

If no problems were found, restart Nginx to enable your changes:

sudo systemctl restart nginx

Restart nginx to test the hotspot management

Let’s now start the nginx.

sudo systemctl restart hostapd

Access the hotspot management in your browser

https://hotspotmgmt.example.com/daloradius

Dnsmasq

Dnsmasq is a small, open-source application that’s designed to provide DNS and, optionally, Dynamic Host Configuration Protocol (DHCP), addressing to a small network. It also supports IPv4 and IPv6 static and dynamic DHCP.

Use debian or ubuntu default package installation routines.

sudo apt-get install dnsmasq

That’s it. Dnsmasq should now be running.

Add configuration for resolving domain name for hotspot.example.com to an ip address 10.10.10.1 and define nameservers

sudo vi /etc/dnsmasq.conf

Add the following line:

no-resolv
server=208.67.222.222
server=208.67.220.220
server=8.8.8.8
server=8.8.4.4

address=/hotspot.example.com/10.10.10.1

Restart the dnsmasq service to apply the changes

sudo service dnsmasq restart

Restart the captive portal

Start the apps in the folowing sequence:

sudo systemctl stop dnsmasq
sudo systemctl stop nginx
sudo systemctl stop chilli
sudo systemctl stop hostapd

sudo systemctl start hostapd
sudo systemctl start chilli
sudo systemctl start nginx
sudo systemctl start dnsmasq

You may now reboot the system and make sure CoovaChilli started up fine.

Installation of Raspbian captive portal disk image

In this tutorial, we're going to install Raspbian captive portal onto your microSD card.

You'll need to consider the following before starting the installation:

Download the image

You may download the disk image of this captive portal solution at Google Drive

wget -c https://drive.google.com/file/d/1fzTjN3DIUAysXuPOZISosTDpPZtSnpYt/view?usp=sharing

Uncompress the file

This captive portal image contained in the gzip archive is over 32GB in size when uncompressed. To uncompress the archive, you need to use certain programs to uncompress it. If you have any trouble, try these programs

Write the disc image to microSD card

Put your microSD card into your computer and write the disc image to it. You’ll need a specific program to do this:

Put the microSD card in Pi and boot up

Put that microSD into Rasberry Pi, plug in the peripherals and power source, and enjoy.

Accesss credentials

The following are the access credentials in the Raspbian captive portal. You may tweak it for yourself.

Raspbian user

username: pi
password: raspberry

MySQL user

username: root
password: raspbian

MySQL user for radius database

username: appdemoradius
password: raspbian

FreeRADIUS shared secret

appdemosecret

CoovaChilli UAM secret

appdemouamsecret

Hotspot SSID

MME Captive Portal

Hotspot users

You may add users in the radcheck table of radius database. Use mysql client or the daloRADIUS web app in adding hotspot users.

username: demo
password: passwd

username: usertest
password: passwd

username: mme
password: passwd