-
Notifications
You must be signed in to change notification settings - Fork 228
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #381 from nodogsplash/fas_key
Add fasremotefqdn, faskey, bump to v4.0.0
- Loading branch information
Showing
31 changed files
with
1,406 additions
and
915 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,64 +1,105 @@ | ||
Frequently Asked Questions | ||
########################### | ||
|
||
What's the difference between v0.9, v1, v2 and v3? | ||
************************************************** | ||
What's the difference between v0.9, v1, v2, v3 and v4? | ||
****************************************************** | ||
|
||
v0.9 and v1 are the same codebase with the same feature set. | ||
**v0.9 and v1** are the same codebase with the same feature set. | ||
If the documentation says something about v1, this is usually also valid | ||
for v0.9. | ||
|
||
v2 was developed before version v1 was released. In v2 the http code was replaced by libmicrohttpd and the template engine was rewritten. Many features became defunct because of this procedure. | ||
**v2** was developed before version v1 was released. In v2 the http code was replaced by libmicrohttpd and the template engine was rewritten. Many features became defunct because of this procedure. | ||
|
||
v3 cleans up the source code and adds three major new features, | ||
**v3** cleans up the source code and adds three major new features, | ||
|
||
1. **FAS**, a forwarding authentication service. FAS supports development of "Credential Verification" running on any dynamic web serving platform, on the same device as Nodogsplash, on another device on the local network, or on an Internet hosted web server. | ||
* **FAS** | ||
|
||
2. **PreAuth**, an implementation of FAS running on the same device as Nodogsplash and using Nogogsplash's own web server to generate dynamic web pages. Any scripting language or even a compiled application program can be used. This has the advantage of not requiring the resources of a separate web server. | ||
A forwarding authentication service. FAS supports development of "Credential Verification" running on any dynamic web serving platform, on the same device as Nodogsplash, on another device on the local network, or on an Internet hosted web server. | ||
|
||
3. **BinAuth**, enabling an external script to be called for simple username/password authentication as well as doing post authentication processing such as setting session durations. This is similar to the old binvoucher feature, but more flexible. | ||
* **PreAuth** | ||
|
||
In addition, in v3, the ClientTimeout setting was split into PreauthIdleTimeout and AuthIdleTimeout and for the ClientForceTimeout setting, SessionTimeout is now used instead. | ||
An implementation of FAS running on the same device as Nodogsplash and using Nogogsplash's own web server to generate dynamic web pages. Any scripting language or even a compiled application program can be used. This has the advantage of not requiring the resources of a separate web server. | ||
|
||
Can I update from v0.9 to v1 | ||
**************************** | ||
* **BinAuth** | ||
|
||
Enabling an external script to be called for simple username/password authentication as well as doing post authentication processing such as setting session durations. This is similar to the old binvoucher feature, but more flexible. | ||
|
||
In addition, in v3, the ClientTimeout setting was split into PreauthIdleTimeout and AuthIdleTimeout and for the ClientForceTimeout setting, SessionTimeout is now used instead. | ||
|
||
**v4** continues to add enhancements towards improving NDS as a Captive Portal Engine that can be used in the development of custom solutions. | ||
|
||
Two major new features are introduced. | ||
|
||
* **FAS FQDN** | ||
|
||
Enabling simple configuration for a FAS running on a remote shared web hosting server. | ||
|
||
* **FAS secure level 2** | ||
|
||
Enabling aes256cbc encryption on NDS data transferred to remote FAS, thus preventing knowledgable client users from bypassing verification. | ||
|
||
Can I update from v0.9 to v1? | ||
***************************** | ||
|
||
Updating to v1.0.0 and v1.0.1, this is a very smooth update with full compatibility. | ||
|
||
Updating to 1.0.2 requires iptables v1.4.21 or above. | ||
|
||
Can I update from v0.9/v1 to v2.0.0 | ||
*********************************** | ||
Can I update from v0.9/v1 to v2.0.0? | ||
************************************ | ||
|
||
You can, if: | ||
|
||
* You don't use BinVoucher | ||
* You have iptables v1.4.21 or above | ||
|
||
|
||
Can I update from v0.9/v1/v2 to v3.0.0 | ||
************************************** | ||
Can I update from v0.9/v1/v2 to v3.0.0? | ||
*************************************** | ||
|
||
You can, if: | ||
|
||
* You don't use BinVoucher | ||
* You have iptables v1.4.21 or above | ||
* You use the new options contained in the version 3 configuration file | ||
|
||
I would like to use QoS or TrafficControl on OpenWrt | ||
**************************************************** | ||
Can I update from v0.9/v1/v2/v3 to v4.0.0? | ||
****************************************** | ||
|
||
You can, if: | ||
|
||
* You don't use BinVoucher | ||
* You have iptables v1.4.21 or above | ||
* You use the new options contained in the version 4 configuration file | ||
|
||
|
||
How do I use QoS or TrafficControl on OpenWrt? | ||
********************************************** | ||
|
||
The original pre version 1 feature has been broken since OpenWrt 12.09 (Attitude Adjustment), because the IMQ (Intermediate queueing device) is no longer supported. | ||
|
||
**Pull Requests are welcome!** | ||
|
||
However the OpenWrt package, SQM Scripts (Smart Queue Management), is fully compatible with Nodogsplash and if configured to operate on the Nodogsplash interface (br-lan by default) will provide efficient IP connection based traffic control to ensure fair usage of available bandwidth. | ||
However the OpenWrt package, SQM Scripts (Smart Queue Management), is fully compatible with Nodogsplash and if configured to operate on the Nodogsplash interface (br-lan by default) will provide efficient IP connection based traffic control to ensure fair usage of available bandwidth. | ||
|
||
Is https capture supported? | ||
****************************** | ||
|
||
*************************** | ||
**No**. Because all connections would have a critical certificate failure. | ||
|
||
HTTPS web sites are now more or less a standard and to maintain security and user confidence it is essential that captive portals **DO NOT** attempt to capture port 443. | ||
HTTPS web sites are now more or less a standard and to maintain security and user confidence it is essential that captive portals **DO NOT** attempt to capture port 443. | ||
|
||
What is CPD / Captive Portal Detection? | ||
*************************************** | ||
CPD (Captive Portal Detection) has evolved as an enhancement to the network manager component included with major Operating Systems (Linux, Android, iOS/macOS, Windows). | ||
|
||
Using a pre-defined port 80 web page (which one gets used depends on the vendor) the network manager will detect the presence of a captive portal hotspot and notify the user. In addition, most major browsers now support CPD. | ||
|
||
**It should be noted** when designing a custom splash page that for security reasons many client device CPD implementations: | ||
|
||
* Immediately close the browser when the client has authenticated. | ||
|
||
* Prohibit the use of href links. | ||
|
||
* Prohibit downloading of external files (including .css and .js, even if they are allowed in NDS firewall settings). | ||
|
||
**Captive Portal Detection** (CPD) has evolved as an enhancement to the network manager component included with major Operating Systems (Linux, Android, iOS/macOS, Windows). Using a pre-defined port 80 web page (depending on the vendor) the network manager will detect the presence of a captive portal hotspot and notify the user. In addition, most major browsers now support CPD. | ||
* Prohibit the execution of javascript. |
Oops, something went wrong.