Menu

Coova-Chilli package broken?

2023-07-05
2023-07-08
  • Stephen Davies

    Stephen Davies - 2023-07-05

    Hi all,

    Has anyone managed to get CoovaChilli working on OpenWrt ver 18 and up and also Ubuntu. I have put over 50 hours into this now and getting CoovaChilli 1.6 to run and allocate an IP address from the captive portal pool but there is no redirection to the RadiusDesk landing page nor is it allowing access to IP's set in 'option uamallowed' or domains set in 'option uamdomain'. 'option dhcpif' is set with wlan0 which is the wireless network and the LAN is not bridged. Firewall and routes look good. It's like CoovaChilli is just broken and beyond the scope of me fixing it. Can anyone help or add any ideas on how to fix this. Thanks

    My OpenWrt settings

    config chilli
        # disable to running chilli. remove this option before running.
        #option disabled 1
    
        # name of TUN device name. required.
        option tundev 'tun0'
    
        # name of network interface
        #option network ''
    
        # Include this flag to include debug information.
        option debug 1
    
        # Re-read configuration file at this interval. Will also cause new domain
        # name lookups to be performed. Value is given in seconds.
        #option interval 3600
    
        # Directory to use for nonvolatile storage.
        # The program must have write access to this directory.
        # this option is currently ignored
        #option statedir ./
    
    
        # TUN parameters
    
        # IP network address of external packet data network
        # Used to allocate dynamic IP addresses and set up routing.
        # Normally you do not need to uncomment this option.
        #option net 192.168.182.0/24
    
        # Dynamic IP address pool
        # Used to allocate dynamic IP addresses to clients.
        # If not set it defaults to the net tag.
        # Do not uncomment this option unless you are an experienced user!
        #option dynip 192.168.182.0/24
    
        # Static IP address pool
        # Used to allocate static IP addresses to clients.
        # Do not uncomment this option unless you are an experienced user!
        #option statip 192.168.182.0/24
    
    
        # Primary DNS server.
        # Will be suggested to the client.
        # If omitted the system default will be used.
        # Normally you do not need to uncomment this option.
        option dns1 8.8.8.8
    
        # Secondary DNS server.
        # Will be suggested to the client.
        # If omitted the system default will be used.
        # Normally you do not need to uncomment this option.
        option dns2 8.8.4.4
    
        # Domain name
        # Will be suggested to the client.
        # Normally you do not need to uncomment this option.
        #option domain key.chillispot.org
    
        # Script executed after network interface has been brought up.
        # Executed with the following parameters: <devicename> <ip address>
        # <mask>
        # Normally you do not need to modify this option.
        option ipup /etc/chilli/up.sh
    # Script executed after network interface has been taken down.
        # Executed with the following parameters: <devicename> <ip address>
        # <mask>
        # Normally you do not need to modify this option.
        option ipdown /etc/chilli/down.sh
    
    
        # Radius parameters
    
        # IP address to listen to
        # Normally you do not need to uncomment this option.
        #option radiuslisten 127.0.0.1
    
        # IP address of radius server 1
        # For most installations you need to modify this option.
        option radiusserver1 192.168.2.199
    
        # IP address of radius server 2
        # If you have only one radius server you should set radiusserver2 to the
        # same value as radiusserver1.
        # For most installations you need to modify this option.
        option radiusserver2 192.168.2.199
    
        # Radius authentication port
        # The UDP port number to use for radius authentication requests.
        # The same port number is used for both radiusserver1 and radiusserver2.
        # Normally you do not need to uncomment this option.
        #option radiusauthport 1812
    
        # Radius accounting port
        # The UDP port number to use for radius accounting requests.
        # The same port number is used for both radiusserver1 and radiusserver2.
        # Normally you do not need to uncomment this option.
        #option radiusacctport 1813
    
        # Radius shared secret for both servers
        # For all installations you should modify this option.
        #option radiussecret testing123
    
        # Radius NAS-Identifier
        # Normally you do not need to uncomment this option.
        #option radiusnasid nas01
    
        # WISPr Location ID. Should be in the format: isocc=<ISO_Country_Code>,
        # cc=<E.164_Country_Code>,ac=<E.164_Area_Code>,network=<ssid/ZONE>
        # Normally you do not need to uncomment this option.
        #option radiuslocationid isocc=us,cc=1,ac=408,network=ACMEWISP_NewarkAirport
    
        # WISPr Location Name. Should be in the format:
        # <HOTSPOT_OPERATOR_NAME>,<LOCATION>
        # Normally you do not need to uncomment this option.
        #option radiuslocationname ACMEWISP,Gate_14_Terminal_C_of_Newark_Airport
    
    
        # Radius proxy parameters
    
        # IP address to listen to
        # Normally you do not need to uncomment this option.
        #option proxylisten 10.0.0.1
    
        # UDP port to listen to.
        # If not specified a port will be selected by the system
        # Normally you do not need to uncomment this option.
        #option proxyport 1645
    # Client(s) from which we accept radius requests
        # Normally you do not need to uncomment this option.
        #option proxyclient 10.0.0.1/24
    
        # Radius proxy shared secret for all clients
        # If not specified defaults to radiussecret
        # Normally you do not need to uncomment this option.
        #option proxysecret testing123
    
    
        # DHCP Parameters
    
        # Ethernet interface to listen to.
        # This is the network interface which is connected to the access points.
        # In a typical configuration this option should be set to eth1.
        option dhcpif wlan0
    
        # Use specified MAC address.
        # An address in the range  00:00:5E:00:02:00 - 00:00:5E:FF:FF:FF falls
        # within the IANA range of addresses and is not allocated for other
        # purposes.
        # Normally you do not need to uncomment this option.
        #option dhcpmac 00:00:5E:00:02:00
    
        # Time before DHCP lease expires
        # Normally you do not need to uncomment this option.
        #option lease 600
    
    
        # Universal access method (UAM) parameters
    
        # URL of web server handling authentication.
        option uamserver http://192.168.2.199/cake3/rd_cake/dynamic-details/chilli-browser-detect/
    
        # URL of welcome homepage.
        # Unauthenticated users will be redirected to this URL. If not specified
        # users will be redirected to the uamserver instead.
        # Normally you do not need to uncomment this option.
        #option uamhomepage http://192.168.182.1/welcome.html
    
        # Shared between chilli and authentication web server
        option uamsecret greatsecret
    
        # IP address to listen to for authentication requests
        # Do not uncomment this option unless you are an experienced user!
        #option uamlisten 192.168.182.1
    
        # TCP port to listen to for authentication requests
        # Do not uncomment this option unless you are an experienced user!
        #option uamport 3990
    
        # Comma separated list of domain names, IP addresses or network segments
        # the client can access without first authenticating.
        # It is possible to specify this option multiple times.
        # Normally you do not need to uncomment this option.
        option uamallowed 192.168.182.1,8.8.8.8,8.8.4.4
    
        # Comma separated list of domain names
        # the client can access without first authenticating.
        # It is possible to specify this option multiple times.
        # Normally you do not need to uncomment this option.
        option uamdomain .chillispot.org,.coova.org
    
        # If this flag is given unauthenticated users are allowed to use
        # any DNS server.
        # Normally you do not need to uncomment this option.
        #option uamanydns
    
    
    
        # MAC authentication
    
        # If this flag is given users will be authenticated only on their MAC
        # address.
        # Normally you do not need to uncomment this option.
        #option macauth
    
        # List of MAC addresses.
        # The MAC addresses specified in this list will be authenticated only on
        # their MAC address.
        # this option is ignored if the macauth tag is given.
        # It is possible to specify this option multiple times.
        # Normally you do not need to uncomment this option.
        #option macallowed 00-0A-5E-AC-BE-51,00-30-1B-3C-32-E9
    
        # Password to use for MAC authentication.
        # Normally you do not need to uncomment this option.
        #option macpasswd password
    
        # Suffix to add to MAC address in order to form the username.
        # Normally you do not need to uncomment this option.
        #option macsuffix suffix
    

    Routes
    lan 0.0.0.0/0 192.168.2.1 0 main
    lan 192.168.2.0/24 - 0 main
    (tun0) 192.168.182.0/24 - 0 main

    /etc/config/firewall
    config defaults
    option input 'ACCEPT'
    option output 'ACCEPT'
    option synflood_protect '1'
    option forward 'REJECT'

    config include
    option path '/etc/firewall.user'

    config zone
    option input 'ACCEPT'
    option output 'ACCEPT'
    option network 'lan'
    option forward 'REJECT'
    option name 'Lan'
    option masq '1'
    option mtu_fix '1'

    config zone
    option network 'Guest'
    option input 'ACCEPT'
    option name 'Guest'
    option output 'ACCEPT'
    option forward 'ACCEPT'

    config forwarding
    option dest 'Lan'
    option src 'Guest'

    IPTABLES
    Table: Filter
    Chain INPUT (Policy: ACCEPT, 0 Packets, 0 B Traffic)
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    28
    2.92 KB
    DROP all wlan0 * 0.0.0.0/0 0.0.0.0/0 - -
    0
    0 B
    ACCEPT icmp tun0 * 0.0.0.0/0 192.168.182.1 - -
    0
    0 B
    ACCEPT udp tun0 * 0.0.0.0/0 192.168.182.1 udp dpt:53 -
    0
    0 B
    ACCEPT udp tun0 * 0.0.0.0/0 192.168.182.1 udp dpts:67:68 -
    0
    0 B
    ACCEPT udp tun0 * 0.0.0.0/0 255.255.255.255 udp dpts:67:68 -
    0
    0 B
    ACCEPT tcp tun0 * 0.0.0.0/0 192.168.182.1 tcp dpt:3991 -
    45
    5.14 KB
    ACCEPT tcp tun0 * 0.0.0.0/0 192.168.182.1 tcp dpt:3990 -
    56
    3.98 KB
    ACCEPT all lo * 0.0.0.0/0 0.0.0.0/0 - -
    6.77 K
    959.66 KB
    input_rule all * * 0.0.0.0/0 0.0.0.0/0 - Custom input rule chain
    6.50 K
    912.90 KB
    ACCEPT all * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED -
    0
    0 B
    syn_flood tcp * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02 -
    274
    46.76 KB
    zone_Lan_input all br-lan * 0.0.0.0/0 0.0.0.0/0 - -
    0
    0 B
    zone_Guest_input all wlan0 * 0.0.0.0/0 0.0.0.0/0 - -
    0
    0 B
    DROP all tun0 * 0.0.0.0/0 192.168.182.1 - -
    Chain FORWARD (Policy: DROP, 0 Packets, 0 B Traffic)
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    0
    0 B
    DROP tcp * * 0.0.0.0/0 192.168.2.1 tcp dpt:80 -
    0
    0 B
    ACCEPT all * * 0.0.0.0/0 192.168.1.51 - -
    0
    0 B
    ACCEPT all * * 0.0.0.0/0 192.168.2.1 - -
    3.45 K
    596.02 KB
    DROP all * * 0.0.0.0/0 192.0.0.0/8 - -
    0
    0 B
    DROP tcp tun0 * 0.0.0.0/0 10.1.0.1 tcp dpt:22 -
    3.38 K
    231.09 KB
    ACCEPT all tun0 br-lan 0.0.0.0/0 0.0.0.0/0 - -
    0
    0 B
    DROP all tun0 !br-lan 0.0.0.0/0 0.0.0.0/0 - -
    51
    3.06 KB
    TCPMSS tcp * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU -
    1
    60 B
    ACCEPT all * tun0 0.0.0.0/0 0.0.0.0/0 - -
    0
    0 B
    ACCEPT all tun0 * 0.0.0.0/0 0.0.0.0/0 - -
    0
    0 B
    DROP all * wlan0 0.0.0.0/0 0.0.0.0/0 - -
    3.45 K
    236.86 KB
    DROP all wlan0 * 0.0.0.0/0 0.0.0.0/0 - -
    14
    1.27 KB
    forwarding_rule all * * 0.0.0.0/0 0.0.0.0/0 - Custom forwarding rule chain
    10
    1.01 KB
    ACCEPT all * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED -
    0
    0 B
    zone_Lan_forward all br-lan * 0.0.0.0/0 0.0.0.0/0 - -
    4
    259 B
    zone_Guest_forward all wlan0 * 0.0.0.0/0 0.0.0.0/0 - -
    0
    0 B
    reject all * * 0.0.0.0/0 0.0.0.0/0 - -
    Chain OUTPUT (Policy: ACCEPT, 0 Packets, 0 B Traffic)
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    56
    3.98 KB
    ACCEPT all * lo 0.0.0.0/0 0.0.0.0/0 - -
    5.70 K
    862.25 KB
    output_rule all * * 0.0.0.0/0 0.0.0.0/0 - Custom output rule chain
    5.69 K
    861.35 KB
    ACCEPT all * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED -
    10
    894 B
    zone_Lan_output all * br-lan 0.0.0.0/0 0.0.0.0/0 - -
    0
    0 B
    zone_Guest_output all * wlan0 0.0.0.0/0 0.0.0.0/0 - -
    Chain forwarding_Guest_rule (1 References)
    Chain zone_Guest_forward, Rule #1
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    No rules in this chain.
    Chain forwarding_Lan_rule (1 References)
    Chain zone_Lan_forward, Rule #1
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    No rules in this chain.
    Chain forwarding_rule (1 References)
    Chain FORWARD, Rule #13
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    No rules in this chain.
    Chain input_Guest_rule (1 References)
    Chain zone_Guest_input, Rule #1
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    No rules in this chain.
    Chain input_Lan_rule (1 References)
    Chain zone_Lan_input, Rule #1
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    No rules in this chain.
    Chain input_rule (1 References)
    Chain INPUT, Rule #9
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    No rules in this chain.
    Chain output_Guest_rule (1 References)
    Chain zone_Guest_output, Rule #1
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    No rules in this chain.
    Chain output_Lan_rule (1 References)
    Chain zone_Lan_output, Rule #1
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    No rules in this chain.
    Chain output_rule (1 References)
    Chain OUTPUT, Rule #2
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    No rules in this chain.
    Chain reject (2 References)
    Chain FORWARD, Rule #17
    Chain zone_Lan_dest_REJECT, Rule #1
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    0
    0 B
    REJECT tcp * * 0.0.0.0/0 0.0.0.0/0 reject-with tcp-reset -
    0
    0 B
    REJECT all * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable -
    Chain syn_flood (1 References)
    Chain INPUT, Rule #11
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    0
    0 B
    RETURN tcp * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02 limit: avg 25/sec burst 50 -
    0
    0 B
    DROP all * * 0.0.0.0/0 0.0.0.0/0 - -
    Chain zone_Guest_dest_ACCEPT (2 References)
    Chain zone_Guest_forward, Rule #4
    Chain zone_Guest_output, Rule #2
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    0
    0 B
    ACCEPT all * wlan0 0.0.0.0/0 0.0.0.0/0 - -
    Chain zone_Guest_forward (1 References)
    Chain FORWARD, Rule #16
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    4
    259 B
    forwarding_Guest_rule all * * 0.0.0.0/0 0.0.0.0/0 - Custom Guest forwarding rule chain
    4
    259 B
    zone_Lan_dest_ACCEPT all * * 0.0.0.0/0 0.0.0.0/0 - Zone Guest to Lan forwarding policy
    0
    0 B
    ACCEPT all * * 0.0.0.0/0 0.0.0.0/0 ctstate DNAT Accept port forwards
    0
    0 B
    zone_Guest_dest_ACCEPT all * * 0.0.0.0/0 0.0.0.0/0 - -
    Chain zone_Guest_input (1 References)
    Chain INPUT, Rule #13
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    0
    0 B
    input_Guest_rule all * * 0.0.0.0/0 0.0.0.0/0 - Custom Guest input rule chain
    0
    0 B
    ACCEPT all * * 0.0.0.0/0 0.0.0.0/0 ctstate DNAT Accept port redirections
    0
    0 B
    zone_Guest_src_ACCEPT all * * 0.0.0.0/0 0.0.0.0/0 - -
    Chain zone_Guest_output (1 References)
    Chain OUTPUT, Rule #5
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    0
    0 B
    output_Guest_rule all * * 0.0.0.0/0 0.0.0.0/0 - Custom Guest output rule chain
    0
    0 B
    zone_Guest_dest_ACCEPT all * * 0.0.0.0/0 0.0.0.0/0 - -
    Chain zone_Guest_src_ACCEPT (1 References)
    Chain zone_Guest_input, Rule #3
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    0
    0 B
    ACCEPT all wlan0 * 0.0.0.0/0 0.0.0.0/0 ctstate NEW,UNTRACKED -
    Chain zone_Lan_dest_ACCEPT (2 References)
    Chain zone_Guest_forward, Rule #2
    Chain zone_Lan_output, Rule #2
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    0
    0 B
    DROP all * br-lan 0.0.0.0/0 0.0.0.0/0 ctstate INVALID Prevent NAT leakage
    14
    1.15 KB
    ACCEPT all * br-lan 0.0.0.0/0 0.0.0.0/0 - -
    Chain zone_Lan_dest_REJECT (1 References)
    Chain zone_Lan_forward, Rule #3
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    0
    0 B
    reject all * br-lan 0.0.0.0/0 0.0.0.0/0 - -
    Chain zone_Lan_forward (1 References)
    Chain FORWARD, Rule #15
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    0
    0 B
    forwarding_Lan_rule all * * 0.0.0.0/0 0.0.0.0/0 - Custom Lan forwarding rule chain
    0
    0 B
    ACCEPT all * * 0.0.0.0/0 0.0.0.0/0 ctstate DNAT Accept port forwards
    0
    0 B
    zone_Lan_dest_REJECT all * * 0.0.0.0/0 0.0.0.0/0 - -
    Chain zone_Lan_input (1 References)
    Chain INPUT, Rule #12
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    274
    46.76 KB
    input_Lan_rule all * * 0.0.0.0/0 0.0.0.0/0 - Custom Lan input rule chain
    0
    0 B
    ACCEPT all * * 0.0.0.0/0 0.0.0.0/0 ctstate DNAT Accept port redirections
    274
    46.76 KB
    zone_Lan_src_ACCEPT all * * 0.0.0.0/0 0.0.0.0/0 - -
    Chain zone_Lan_output (1 References)
    Chain OUTPUT, Rule #4
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    10
    894 B
    output_Lan_rule all * * 0.0.0.0/0 0.0.0.0/0 - Custom Lan output rule chain
    10
    894 B
    zone_Lan_dest_ACCEPT all * * 0.0.0.0/0 0.0.0.0/0 - -
    Chain zone_Lan_src_ACCEPT (1 References)
    Chain zone_Lan_input, Rule #3
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    274
    46.76 KB
    ACCEPT all br-lan * 0.0.0.0/0 0.0.0.0/0 ctstate NEW,UNTRACKED -
    Table: NAT
    Chain PREROUTING (Policy: ACCEPT, 5444 Packets, 642.69 KB Traffic)
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    5.44 K
    642.69 KB
    prerouting_rule all * * 0.0.0.0/0 0.0.0.0/0 - Custom prerouting rule chain
    1.16 K
    345.04 KB
    zone_Lan_prerouting all br-lan * 0.0.0.0/0 0.0.0.0/0 - -
    2.22 K
    157.96 KB
    zone_Guest_prerouting all wlan0 * 0.0.0.0/0 0.0.0.0/0 - -
    Chain INPUT (Policy: ACCEPT, 74 Packets, 8.42 KB Traffic)
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    No rules in this chain.
    Chain OUTPUT (Policy: ACCEPT, 17 Packets, 1.40 KB Traffic)
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    No rules in this chain.
    Chain POSTROUTING (Policy: ACCEPT, 7 Packets, 504 B Traffic)
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    2.05 K
    139.00 KB
    postrouting_rule all * * 0.0.0.0/0 0.0.0.0/0 - Custom postrouting rule chain
    2.04 K
    138.50 KB
    zone_Lan_postrouting all * br-lan 0.0.0.0/0 0.0.0.0/0 - -
    0
    0 B
    zone_Guest_postrouting all * wlan0 0.0.0.0/0 0.0.0.0/0 - -
    Chain postrouting_Guest_rule (1 References)
    Chain zone_Guest_postrouting, Rule #1
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    No rules in this chain.
    Chain postrouting_Lan_rule (1 References)
    Chain zone_Lan_postrouting, Rule #1
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    No rules in this chain.
    Chain postrouting_rule (1 References)
    Chain POSTROUTING, Rule #1
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    No rules in this chain.
    Chain prerouting_Guest_rule (1 References)
    Chain zone_Guest_prerouting, Rule #1
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    No rules in this chain.
    Chain prerouting_Lan_rule (1 References)
    Chain zone_Lan_prerouting, Rule #1
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    No rules in this chain.
    Chain prerouting_rule (1 References)
    Chain PREROUTING, Rule #1
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    No rules in this chain.
    Chain zone_Guest_postrouting (1 References)
    Chain POSTROUTING, Rule #3
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    0
    0 B
    postrouting_Guest_rule all * * 0.0.0.0/0 0.0.0.0/0 - Custom Guest postrouting rule chain
    Chain zone_Guest_prerouting (1 References)
    Chain PREROUTING, Rule #3
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    2.22 K
    157.96 KB
    prerouting_Guest_rule all * * 0.0.0.0/0 0.0.0.0/0 - Custom Guest prerouting rule chain
    Chain zone_Lan_postrouting (1 References)
    Chain POSTROUTING, Rule #2
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    2.04 K
    138.50 KB
    postrouting_Lan_rule all * * 0.0.0.0/0 0.0.0.0/0 - Custom Lan postrouting rule chain
    2.04 K
    138.50 KB
    MASQUERADE all * * 0.0.0.0/0 0.0.0.0/0 - -
    Chain zone_Lan_prerouting (1 References)
    Chain PREROUTING, Rule #2
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    1.16 K
    345.04 KB
    prerouting_Lan_rule all * * 0.0.0.0/0 0.0.0.0/0 - Custom Lan prerouting rule chain
    Table: Mangle
    Chain PREROUTING (Policy: ACCEPT, 18162 Packets, 2.36 MB Traffic)
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    No rules in this chain.
    Chain INPUT (Policy: ACCEPT, 6746 Packets, 948.07 KB Traffic)
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    No rules in this chain.
    Chain FORWARD (Policy: ACCEPT, 10276 Packets, 1.06 MB Traffic)
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    118
    7.08 KB
    TCPMSS tcp * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU -
    118
    7.08 KB
    TCPMSS tcp * br-lan 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU Zone Lan MTU fixing
    6
    360 B
    TCPMSS tcp br-lan * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU Zone Lan MTU fixing
    Chain OUTPUT (Policy: ACCEPT, 5624 Packets, 846.00 KB Traffic)
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment
    No rules in this chain.
    Chain POSTROUTING (Policy: ACCEPT, 9006 Packets, 1.08 MB Traffic)
    Pkts. Traffic Target Prot. In Out Source Destination Options Comment

     

    Last edit: Stephen Davies 2023-07-05
  • Stephen Davies

    Stephen Davies - 2023-07-08

    I resolved this.

    Added the following to /etc/chilli/ipup.sh

    iptables -I POSTROUTING -t nat -o $HS_WANIF -j MASQUERADE

    I also had to put quotes around the options vars and make sure that my radius server, DNS servers and Coova-chilli listening instance (10.19.73.1) were in the uamallowed list.

    option uamserver "http://myradiusserver.com/landingpage.html"
    option uamallowed "10.19.73.1,192.168.2.199,8.8.8.8,8.8.4.4"
    option uamdomain ".myallowedsite.com"

     

Log in to post a comment.

Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.