captive Portal Pfsense + FreeRadius + MySQL DBMS

2012-12-12 Thread Shiv. Nath

Dear Friends Greetings,

i have a question for you, i am sure someone can help. The pfsense captive
portal is up and running. Time countdown vouchers are working without
issue, such as 30m, 45m, 1h & so on.

However, I'd like to set up a download quota of 200MB per voucher. but
then you need to login with a username and password, instead of vouchers.
but I haven't found a way to generate username & password when generating
vouchers. is there someone who managed to get this working? At the moment
vouchers are only for time based login.

any clue, little information or document reference would be greatly
appreciated.

Thanks / Prabhpal S.

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


captive Portal Pfsense + FreeRadius + MySQL DBMS

2012-12-11 Thread Shiv. Nath
Dear Friends Greetings,

i have a question for you, i am sure someone can help. The pfsense captive
portal is up and running. Time countdown vouchers are working without
issue, such as 30m, 45m, 1h & so on.

However, I'd like to set up a download quota of 200MB per voucher. but
then you need to login with a username and password, instead of vouchers.
but I haven't found a way to generate username & password when generating
vouchers. is there someone who managed to get this working? At the moment
vouchers are only for time based login.

any clue, little information or document reference would be greatly
appreciated.

Thanks / Shiv. Nath

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


WiFi / Hot-Spot Open Source World

2012-12-10 Thread Shiv. Nath
Dear Experts

i am sure many of you would be the part of the real game, where lot of
technology is implemented (Internet Service Providers) those serve
thousands of clients everyday . i am requesting opinion & advice from
those experts. Surfing web does not help much unless someone who is
practically touch and making the use of the technology everyday. And i
could not find the best place than this where i can ask this question &
where my request can reach highly technical peoples those know the
information i need.

Your advice is valuable, i wish to thanks in advance to those guys would
spend their imp time to discuss or respond to this matter. The topic is
WiFi / Hot-Spot reliable solution in open source world.

I work with ISP offering service for hotspots and cafe clubs. initially
company was using hosted service to authenticate / validate hotspot-cafe
users etc for many years. Eventually, our management decided to purchased
a solution that can be one time investment and serve the need for our
clients. 24-Online is a wifi & hotspot solution comes in form of
appliance. We purchased 24-Online appliance that costed more than $40,000.
We purchased by thinking that it is commercial product and it would be
reliable and considered support as well, anyways.

After started using the solution, we released that is not reliable AT ALL.
Almost everyday appliance has problems. sometimes it does not issue ip
address (DHCP) to hotspot client, if that happens, it does not redirect to
portal page so that a user can fill voucher number and start browsing. in
short, everyday this & that. As said, we have purchased the commercial
support as well but support guys take several hours sometime whole weekend
to troubleshoot the problem. in result our customers are down. we have
refund and call for apologies for the service interruption. After this one
year frustration, i wish to seek advice form experts. what kind of program
or what is the right approach to handle this wifi-hotspot clients using
Linux/ Unix. Is there anything reliable exists that can work without
everyday problem. i understand it is a technology once in a while always
be some problem there but not everyday on words. There are four services
those can make it work.

1.) User reached hotspot --> Switched his laptop on --> DHCP request
travels to our data center using existing link to hotspot & hotspot
software should issue a ip to the user (DHCP functionality).

2.) User clicked on his browser icon --> browser opens --> Request is
redirected to a web server (customer portal page) where user can fill his
valid voucher number he purchased form hotspot site for browsing(Apache
functionality)

3.) User clicks ok after entering his voucher number --> authentication
happens --> (FreeRadious functionality)

4.) Then accounting --> user can only browse for 1 hours if he purchased
one hour voucher --> (FreeRadious functionality)


how can i put all four service together and make stuff working.

Thanks / Thanks


___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


Update Failing FreeBSD 9.1-Release

2012-12-05 Thread Shiv. Nath
anyone knows what to do?

[root@rock]# freebsd-update -r 9.1-RELEASE upgrade
Looking up update.FreeBSD.org mirrors... 3 mirrors found.
Fetching metadata signature for 9.1-RC3 from update5.FreeBSD.org... done.
Fetching metadata index... done.
Fetching 1 metadata patches. done.
Applying metadata patches... done.
Inspecting system... done.

The following components of FreeBSD seem to be installed:
kernel/generic src/src world/base world/doc world/games world/lib32

The following components of FreeBSD do not seem to be installed:

Does this look reasonable (y/n)? y

Fetching metadata signature for 9.1-RELEASE from update5.FreeBSD.org...
failed.
Fetching metadata signature for 9.1-RELEASE from update4.FreeBSD.org...
failed.
Fetching metadata signature for 9.1-RELEASE from update3.FreeBSD.org...
failed.
No mirrors remaining, giving up.


Thanks / Shiv. Nath

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


FreeBSDD Upgrade Failing

2012-12-05 Thread Shiv. Nath
Hi FreeBSD Community,

i got warning that 9.1RC3 is approaching end of its life, i should upgrade
with in two week. when i started the upgrade, i get the following error.
any solution anyone knows?

[root@rock]# freebsd-update -r 9.1-RELEASE upgrade
Looking up update.FreeBSD.org mirrors... 3 mirrors found.
Fetching metadata signature for 9.1-RC3 from update5.FreeBSD.org... done.
Fetching metadata index... done.
Inspecting system... done.

The following components of FreeBSD seem to be installed:
kernel/generic src/src world/base world/doc world/games world/lib32

The following components of FreeBSD do not seem to be installed:

Does this look reasonable (y/n)? y

Fetching metadata signature for 9.1-RELEASE from update5.FreeBSD.org...
failed.
Fetching metadata signature for 9.1-RELEASE from update4.FreeBSD.org...
failed.
Fetching metadata signature for 9.1-RELEASE from update3.FreeBSD.org...
failed.
No mirrors remaining, giving up.


Thanks / Shiv. Nath

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


Failed to attach P_CNT - FreeBSD 9.1 RC3

2012-11-04 Thread Shiv. Nath
Dear FreeBSD Community Friends,

It is FreeBSD 9.1 RC3, i get the following warning in the message log
file. i need assistance to understand the meaning of this error, how
serious is it?

acpi_throttle23: failed to attach P_CNT

History:
This error is following FreeBSD for long time because when i was googled
the error. i can across a post that was belongs to FreeBSD 6x.
http://tgrove.com/2007/10/07/freebsd-6-acpi_throttle1-failed-to-attach-p_cnt/

They Provided the solution as well but did not work. They also said that
is is only happening with Intel dual core processor but that is not true.
As it is virtual machine, i tried to restore the FreeBSD VM on three
different servers, those having different specification of processors
(dual cores, quad cores, six cores) still the same then decided to consult
with experts.


Following was the solution but did not remove the error/warning


vi /boot/device.hints
# Add this to the end of the file
hint.acpi_throttle.0.disabled="1"

vi /boot/loader.conf
# Add this to the end of the file
hint.acpi_throttle.0.disabled=”1″


Thanks / Shiv. Nath

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


Alert When Hardware Changes !

2012-10-05 Thread Shiv. Nath

Dear Friends of List,

Well, i understand perhaps someone will think if it is correct please to
ask this question here. But i did not find the better place than here.
Here is community of technical people and the question is technical as
well.

Question:

Is anyone aware of such program (software) that can alert me when hardware
changes? i.e. lets say i will monitor the hardware for a computer/server
using a program (i.e. Zabbix / Nagios) may be different program. Can i
receive the alert when hard disk for the computer has been changed?

Any software anyone aware of?


___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


Re: PF Configuration - FreeBSD Release 9.0 x64

2012-09-11 Thread Shiv. Nath
I would actually question why avahi is even enabled on a server; perhaps 
the correct answer is simply to disable it in rc.conf.

You do know that avahi-daemon's main use is to advertise _services_running on a 
host?


Yes, but zeroconf-style services are often more of a peer-to-peer nature
instead of fixed (which don't *need* zeroconf).  It's also a larger attack
surface.


Dear Brandon A & Kimmo P.

Thanks for the kind assistance and advices, in my case disabling "avahi" 
would not effect me much because it is only a mail server. thanks once 
again.

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


Re: PF Configuration - FreeBSD Release 9.0 x64

2012-09-11 Thread Shiv. Nath
Sep 11 07:49:56 titan avahi-daemon[1567]: Received response from host 
41.211.2.239 with invalid source port 4331 on interface 'em0.0'
Sep 11 07:50:25 titan avahi-daemon[1567]: Received response from host 
41.211.2.239 with invalid source port 38627 on interface 'em0.0'
Sep 11 07:51:29 titan avahi-daemon[1567]: Received response from host 
41.211.2.239 with invalid source port 38627 on interface 'em0.0' 
___ freebsd-stable@freebsd.org
mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-stable To 
unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


It says it received a *response* so my understanding is *you* are trying to 
connect.

Adjust your rule and see if it's any 
better.___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


Dear D. Fleuriot & Christer. S

Thanks for your response and help, logically, you are correct (It says 
it received a *response* so my understanding is *you* are trying to 
connect) but frankly speaking, i don't know what is happening.


i have 5,000 active public IP address configured in my network. The 
problematic IP belongs to one of my customer "41.211.2.239". i see the 
same log in many other server as well. i am bit confuse because how 10 
servers from my data center has decided to send something to same 
particular IP whereas there are many thousand other ip available to send 
something. it is like that machine is sending broadcast and my servers 
receive it, but it confuse when reading logs. have you come across this 
kind of issue before?


Thanks for your assistance, i will try to block using

block log quick ... instead, or i will put this IP to VLAN to stop broadcasting.

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


PF Configuration - FreeBSD Release 9.0 x64

2012-09-11 Thread Shiv. Nath

Dear FreeBSD Guys,

It is FreeBSD Release 9.0 x64 and i see this log very frequent almost 
every second, And i want to block this IP from reaching my server. i 
configured the PF as following but still see the same logs, it is like 
it did not work.


block in log quick from 41.211.2.239/32 to any


Sep 11 07:49:56 titan avahi-daemon[1567]: Received response from host 
41.211.2.239 with invalid source port 4331 on interface 'em0.0'
Sep 11 07:50:25 titan avahi-daemon[1567]: Received response from host 
41.211.2.239 with invalid source port 38627 on interface 'em0.0'
Sep 11 07:51:29 titan avahi-daemon[1567]: Received response from host 
41.211.2.239 with invalid source port 38627 on interface 'em0.0'

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


Re: USE PF to Prevent SMTP Brute Force Attacks - Resolved !!!

2012-06-17 Thread Shiv. Nath

On 16/06/2012 21:03, Shiv. Nath wrote:

Dear Matthew,

Matthew, one a, one e.

first thanks for assisting to secure 22/25 ports from brute force
attack.
i wish to consult if the following white list looks fine to exclude
trusted networks (own network)


int0="em0"
secured_attack_ports="{21,22,25}"

table  persist
block in log quick from 
pass in on $int0 proto tcp \
from any to $int0 port $secured_attack_ports  \
flags S/SA keep state \
(max-src-conn-rate 5/300, overload  flush global)


## Exclude Own Network From Brute-Force Rule ##

table  persist {71.221.25.0/24, 71.139.22.0/24}

pass in on $int0 proto tcp from  to any port
$secured_attack_ports

But, yes, other than that it looks good.  You want to move
the table definitions up to the top of the file and as you've shown, you
want your network specific rule after the more generic rate-limited
accept rule: remember that (except for quick rules) it's the last
matching rule in the ruleset that applies.

Cheers, Matthew


Dear Matthew,

i am sorry for misspelling your named, finally it is done with your
assistance. you have very good knowledge of PF because you are gentleman
indeed. sorry to trouble you too much.

Thanks / Thanks / Thanks / Thanks / Thanks /Thanks / Thanks  / Thanks


___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


Re: USE PF to Prevent SMTP Brute Force Attacks - Resolved !!!

2012-06-16 Thread Shiv. Nath

>> Ooops.  Yes, -t bruteforce is correct.  "expire 604800" means delete
>> entries after they've been in the table for that number of seconds (ie
>> after one week)
>>
>>  Cheers,
>>
>>  Matthew
>>
>> --
>> Dr Matthew J Seaman MA, D.Phil.   7 Priory Courtyard
>>   Flat 3
>> PGP: http://www.infracaninophile.co.uk/pgpkey Ramsgate
>> JID: matt...@infracaninophile.co.uk   Kent, CT11 9PW


Dear Metthew,

first thanks for assisting to secure 22/25 ports from brute force attack.
i wish to consult if the following white list looks fine to exclude
trusted networks (own network)



int0="em0"
secured_attack_ports="{21,22,25}"

table  persist
block in log quick from 
pass in on $int0 proto tcp \
from any to $int0 port $secured_attack_ports  \
flags S/SA keep state \
(max-src-conn-rate 5/300, overload  flush global)


## Exclude Own Netowrk From Brute-Force Rule ##

table  persist {71.221.25.0/24, 71.139.22.0/24}
pass in on $int0 proto tcp from  to any

OR

pass in on $int0 proto tcp from  to secured_attack_ports

Thanks / Regards



___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


Re: PF to Preventing SMTP Brute Force Attacks

2012-06-16 Thread Shiv. Nath

> On Jun 15, 2012, at 12:55 PM, Shiv. Nath wrote:
>
>> # START
>> table bruteforce persist
>> block in log quick from bruteforce
>>
>> pass in on $ext_if proto tcp \
>> from any to $ext_if port $trusted_tcp_ports \
>> flags S/SA keep state \
>> (max-src-conn-rate 3/300, overload bruteforce flush global)
>>
>> # END
>>
>> AND CRON:
>> */12 * * * * /sbin/pfctl -t ssh-bruteforce -T expire 604800 >/dev/null
>> 2>&1
>>
>> What is the function "expire 604800" are they entries in the table?
>> should it be -t bruteforce or -t ssh-bruteforce
>
>
> It refers to entries in the table specified by the "-t" option and
> instructs pf to expire (remove from the table) all entries older than the
> specified time (in seconds).  Basically, the value 604800 will expire
> entries older than 1 week.
>
> For the above pf rules, the cron entry should be "-t bruteforce" (although
> in the pf rules you should be using "").
>
> Cheers,
>
> Paul.
>
> ___
> freebsd-stable@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-stable
> To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"
>

Dear Metthew & Paul,

Thank you very much for your time, efforts and energy to help me
configuring PF. Metthew also advised to create white, so that i do not
lock myself. i have have to yet look at it.

i will get in touch if i require more help. Thanks

Regards



___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


Re: PF to Preventing SMTP Brute Force Attacks

2012-06-15 Thread Shiv. Nath

>> Dear Mattthew,
>>
>> Grateful for sending me in right direction, solution really sounds well.
>> Does it look good configuration for "/etc/pf.conf" ?
>>
>> # START
>> table bruteforce persist
>
> Watch the syntax -- it's table  persist with angle brackets.
>
>> block in log quick from bruteforce
>>
>> pass in on $ext_if proto tcp \
>> from any to $ext_if port $trusted_tcp_ports \
>> flags S/SA keep state \
>> (max-src-conn-rate 3/300, overload bruteforce flush global)
>
> Again -- you need angle brackets around the table name.
>
>>
>> # END
>>
>> AND CRON:
>> */12 * * * * /sbin/pfctl -t ssh-bruteforce -T expire 604800 >/dev/null
>> 2>&1
>>
>> What is the function "expire 604800" are they entries in the table?
>> should it be -t bruteforce or -t ssh-bruteforce
>
> Ooops.  Yes, -t bruteforce is correct.  "expire 604800" means delete
> entries after they've been in the table for that number of seconds (ie
> after one week)
>
>   Cheers,
>
>   Matthew
>
> --
> Dr Matthew J Seaman MA, D.Phil.   7 Priory Courtyard
>   Flat 3
> PGP: http://www.infracaninophile.co.uk/pgpkey Ramsgate
> JID: matt...@infracaninophile.co.uk   Kent, CT11 9PW


Dear Mattthew,

i am very much grateful for your assistance and advice configuring PF
correctly. Well done !

Thanks / Regards






___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


Re: PF to Preventing SMTP Brute Force Attacks

2012-06-15 Thread Shiv. Nath

> Limiting yourself to 200 states won't protect you very much -- you tend
> to get a whole series of attacks from the same IP, and that just uses
> one state at a time.
>
> Instead, look at the frequency with which an attacker tries to connect
> to you.  Something like this:
>
> table  persist
>
> [...]
>
> block in log quick from 
>
> [...]
>
> pass in on $ext_if proto tcp \
>  from any to $ext_if port $trusted_tcp_ports \
>  flags S/SA keep state   \
>  (max-src-conn-rate 3/300, overload  flush global)
>
> Plus you'll need a cron job like this to clean up the bruteforce table,
> otherwise it will just grow larger and larger:
>
> */12 * * * *  /sbin/pfctl -t ssh-bruteforce -T expire 604800 >/dev/null
> 2>&1
>
> The end result of this is that if one IP tries to connect to you more
> than 3 times in 5 minutes, they will get blacklisted.  I normally use
> this just for ssh, so you might want to adjust the parameters
> appropriately.  You should also implement a whitelist for IP ranges you
> control or use frequently and that will never be used for bruteforce
> attacks: it is quite easy to block yourself out with these sort of rules.
>
>   Cheers,
>
>   Matthew
>
> --
> Dr Matthew J Seaman MA, D.Phil.   7 Priory Courtyard
>   Flat 3
> PGP: http://www.infracaninophile.co.uk/pgpkey Ramsgate
> JID: matt...@infracaninophile.co.uk   Kent, CT11 9PW


Dear Mattthew,

Grateful for sending me in right direction, solution really sounds well.
Does it look good configuration for "/etc/pf.conf" ?

# START
table bruteforce persist
block in log quick from bruteforce

pass in on $ext_if proto tcp \
from any to $ext_if port $trusted_tcp_ports \
flags S/SA keep state \
(max-src-conn-rate 3/300, overload bruteforce flush global)

# END

AND CRON:
*/12 * * * */sbin/pfctl -t ssh-bruteforce -T expire 604800 >/dev/null
2>&1

What is the function "expire 604800" are they entries in the table?
should it be -t bruteforce or -t ssh-bruteforce

Thanks



___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


PF to Preventing SMTP Brute Force Attacks

2012-06-15 Thread Shiv. Nath
Hi FreeBSD Gurus,


i want to use PF to Preventing SMTP Brute Force Attacks. i need some help
to understand correct syntax.

URL Explaining this: http://www.openbsd.org/faq/pf/filter.html#stateopts


i expect the following behavior from the PF rule below:

Limit the absolute maximum number of states that this rule can create to 200

Enable source tracking; limit state creation based on states created by
this rule only

Limit the maximum number of nodes that can simultaneously create state to 100

Limit the maximum number of simultaneous states per source IP to 3

Solution:
int0="em0"
trusted_tcp_ports="{22,25,443,465}"

pass in on $int0 proto tcp from any to any port $trusted_tcp_ports keep
state max 200, source-track rule, max-src-nodes 100, max-src-states 3

please help ..

Thanks / Regards


___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"