Hi!
I just happened to be doing some work with PAM today and then glanced
over here at the Debian ISP mailing list.
There is actually a pam_iptables module. Maybe it will be useful for
this subject.
Check it out;
http://www.itlab.musc.edu/~nathan/authentication_gateway/
http://www.itlab.mus
I have a similar problem: ethernet socket in a public acxcessible area.
This means that anyone can just plug his PC and get an address.
We want to limit the possibility to exit from the network only to
authorized people.
The way we did was by assigning private address and then asking the
user to
On August 15, 2003 03:46 pm, Kay-Michael Voit wrote:
> Yes, I know, I'm just too stupid, reading my message again you will
> notice, that I wanted to write MAC adress.
> IP is |$_SERVER[REMOTE_ADDR] but I don't think this is usefull here.
> Any solution how to determine the MAC automatically?|
If
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Kay-Michael Voit schrieb:
|
|
|>> If we work with iptables, we have to authenticate the client in some
|>> way. Though I think it is possible to extend iptables, this would
|>> exceed my abilitys a lot.
|>>
|>
|>
|> But maybe would be the cleanest / bes
yes, the solution is plausible this way, but i do think the nocatauth
ppl have some road ahead for this problem (perl based wifi
authentication gateway).
I mean, there are som many ways to do this. For example, the way they
are doing it at airports. You go and buy a little card, fire up the wifi
c
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Kay-Michael Voit schrieb:
| Well, I'll consider Kourosh's suggestions at first.
| But, actually, I've some ideas how I could solve the problem for me and
| probably for some other, too.
|
| Mainly, my idea is limited through my programming skill, but i
fredag 15. august 2003, 21:46, skrev Kay-Michael Voit:
> >>If we work with iptables, we have to authenticate the client in
> >> some way. Though I think it is possible to extend iptables, this
> >> would exceed my abilitys a lot.
> >
> >But maybe would be the cleanest / best solution :-) Okay then
If we work with iptables, we have to authenticate the client in some
way. Though I think it is possible to extend iptables, this would
exceed my abilitys a lot.
But maybe would be the cleanest / best solution :-) Okay then ...
I fully agree, but as I said, it exeeds my skill, I think
Well, I'll consider Kourosh's suggestions at first.
But, actually, I've some ideas how I could solve the problem for me and
probably for some other, too.
Mainly, my idea is limited through my programming skill, but it should
work though...
Just tell me how you think about my considerations...
On Fri, 2003-08-15 at 08:35, Kay-Michael Voit wrote:
> Hi,
> I'm considering to build up a public wlan hotspot. I need time-limited
> authentification, mainly for identity logging purposes, not for billing.
> I thougt about buying tickets (perhaps around 1 EUR/h) with time-limited
> username and
The new buzzword for solutions to the wifi solution provider is VBN or
visitor based networking.
Dumb boxes that force each user to authenticate, then take appropriate
steps in the firewall/proxy...etc.
There was a thread about that a couple of months before.
Please dont go and buy a cisco box.
Hi,
I'm considering to build up a public wlan hotspot. I need time-limited
authentification, mainly for identity logging purposes, not for billing.
I thougt about buying tickets (perhaps around 1 EUR/h) with time-limited
username and password on it.
Where should I put in the authentification? At
12 matches
Mail list logo