NAME
   Captive::Portal - Perl based solution for controlled network access

ABSTRACT
   A so called *Captive Portal* written in perl for Linux Gateways. For a
   longer explanation see:

   <http://en.wikipedia.org/wiki/Captive_Portal>

DESCRIPTION
   Captive::Portal a.k.a. CaPo is a hotspot solution for Linux Gateways.
   CaPo is developed and in service at Ulm University for thousands of
   concurrent users.

   The main focus is scalability, performance, simple administration and
   user-friendliness. The goals have been achieved by using scalable
   technologies like ipset/iptables, FastCGI/CGI and a fine tuned
   concurrent session handling based on the filesystem locking mechanism
   without any need for an additional RDBMS.

   CaPo is compatible with any FastCGI/CGI enabled HTTPS-server.

ALGORITHM IN SHORT
   1. Access Denied
       Only selected protocols like DHCP/DNS/NTP/IMAPS/IPSec/... to
       selected servers are allowed for unauthenticated clients.

   2. Internal NAT redirect
       HTTP-traffic on the gateways inside interface - from unauthenticated
       clients - is redirected by an iptables(8) NAT-rule to a port the
       HTTP-server is listening, e.g.

        iptables -t nat -A PREROUTING -i eth1 -p tcp --dport 80 -j REDIRECT --to-port 5281

   3. External HTTP redirect
       The HTTP-server redirects the HTTP-request by a rewrite rule to an
       HTTPS-request for the CaPo script *capo.fcgi* , e.g.

        <VirtualHost *:5281>
            RewriteEngine On
            RewriteRule   .*  https://gateway.acme.org/capo/? [R,L]
        </VirtualHost>

        CLIENT REQUEST:

           GET /foo/bar HTTP/1.1
           Host: www.test.org

        SERVER RESPONSE:

           HTTP/1.1 302 Found
           Location: https://gateway.acme.org/capo/

   4. SESSION LOGIN
       The *capo.fcgi* script, fired due to this redirected request, offers
       a splash/login page. After successful login the firewall is
       dynamically changed to allow this clients IP/MAC tuple for internet
       access by ipset(8):

           ipset --add capo_sessions_ipset CLIENT_IP,CLIENT_MAC

   5. SESSION LOGOUT
       The capo.fcgi script offers a status/logout page. After successful
       logout the firewall is dynamically changed to disallow this IP/MAC
       tuple for internet access.

           ipset --del capo_sessions_ipset CLIENT_IP

   6. SESSION IDLE
       A cronjob fires periodically the capo-ctl.pl script checking for
       idle sessions. Idle means, the client didn't send any packet for a
       period of time (cfg param: IDLE_TIME = 10min). Before a session is
       put into IDLE state the client is once pinged.

       It is a design goal not requiring JavaScript on clients!

   7. COMFORTABLE SESSION REACTIVATION
       For a short period of time (cfg param: KEEP_OLD_STATE_PERIOD = 1h)
       the session is still on disc, but in IDLE state. If a client has
       cookies enabled and a HTTP request matches the stored IP/MAC/COOKIE
       data on disc, the session is reactivated without a login page.

INSTALLATION
   Please see the INSTALL file in this distribution. As a minimum please be
   aware of the following access restrictions:

   Captive::Portal needs access to iptables(8) and ipset(8) to change the
   firewall-rules on request. You must add the following rule (or similar)
   to the sudoers file, depending on the username of your http daemon:

    WWW_USER ALL=NOPASSWD: /PATH/TO/iptables, /PATH/TO/ipset

   If you use fping(8) (see USE_FPING config parameter) to trigger idle
   sessions before going idle you must add fping to the sudoers file like
   ipset and iptables, regardless of the suid bit on fping, since we need
   special timing flags available only for root:

    WWW_USER ALL=NOPASSWD: /PATH/TO/iptables, /PATH/TO/ipset, /PATH/TO/fping

   The default $SESSIONS_DIR is set to '/var/cache/capo'.

   WWW_USER must be the owner of this dir with write permissions!

CONFIGURATION
   The configuration file is searched in the following default places:

       $ENV{CAPTIVE_PORTAL_CONFIG} ||
       $Bin/../etc/local/config.pl ||
       $Bin/../etc/config.pl

LOGGING
   Logging is handled by the Log::Log4perl module. The logging
   configuration is searched in the following default places:

       $ENV{CAPTIVE_PORTAL_LOG4PERL}   ||
       $Bin/../etc/local/log4perl.conf ||
       $Bin/../etc/log4perl.conf

LOCAL ADAPTATION
   The HTML files are generated from templates (Template-Toolkit syntax).
   You should use the original template files as stanzas and put the
   locally changed versions into the local template tree. The template
   search order prefers the local templates.

   The CSS is based on the wonderful blueprint css framework, see
   <http://www.blueprintcss.org/>. Of course you may use your own styles if
   needed.

   The firewall rules and commands are also generated from template files.
   Normally there is no need to change the firewall rules but it would be
   possible to add some local needed additional rules without changing the
   perl code. Be careful, you must understand the algorithm and the
   different states. Best you ask the author for any modifications.

I18N
   There exists a template tree for each supported language. Some
   system/error messages used by the program must also be translated for
   the message catalog in the config file.

SEE ALSO
   Captive::Portal::Role::Config, capo.fcgi and capo-ctl.pl

CREDITS
   Most of the good parts have been implemented by many creative discussion
   with my colleague Bernd Leibing.

BUGS AND LIMITATIONS
   There are no known problems with this module.

   Please report any bugs or feature requests to "bug-captive-portal at
   rt.cpan.org", or through the web interface at
   <http://rt.cpan.org/NoAuth/ReportBug.html?Queue=Captive-Portal>. I will
   be notified, and then you'll automatically be notified of progress on
   your bug as I make changes.

AUTHOR
   Karl Gaissmaier, "<gaissmai at cpan.org>"

LICENSE AND COPYRIGHT
   Copyright 2010-2012 Karl Gaissmaier, all rights reserved.

   This distribution is free software; you can redistribute it and/or
   modify it under the terms of either:

   a) the GNU General Public License as published by the Free Software
   Foundation; either version 2, or (at your option) any later version, or

   b) the Artistic License version 2.0.