WISPrの良さはクライアントSWを入れているため、無線LANのMACアドレスが確実に取れる。センター設備でCaptive-portalは通常L2接続をクライアントまであれば、MACアドレス情報がとれるが、L3の場合はとれない。WISPrであれば、L3になってもクライアントのMACアドレス情報が取得可能。
The generic guide specifies WISPr 1.0 specification.
curl -A Wi2Connect -v
"https://securelogin.arubanetworks.com/cgi-bin/login?cmd=login&mac=8c:29:37:ee:28:9c&ip=10.215.1.95&opcode=wispr&if;"
-d "UserName=user1" -d "Password=aruba123" -d
"button=Login" -d
"OriginatingServer=/test/login/redirect" -k
curl -A iPassConnect -v
"https://securelogin.arubanetworks.com/cgi-bin/login?cmd=login&mac=8c:29:37:ee:28:9c&ip=10.215.1.95&opcode=wispr&if;"
-d "UserName=user1" -d "Password=aruba123" -d
"button=Login" -d "OriginatingServer=/test/login/redirect"
-k
Logoff Method:
curl -A Wi2Connect -v
"http://securelogin.arubanetworks.com/cgi-bin/login?cmd=logout&ip=10.215.1.95&opcode=wispr"
-k
curl -A Wi2Connect -v
"https://securelogin.arubanetworks.com/cgi-bin/login?cmd=logout&ip=10.215.1.95&opcode=wispr"
-k
curl -A iPassConnect -v "http://securelogin.arubanetworks.com/cgi-bin/login?cmd=logout&ip=10.215.1.95&opcode=wispr" -k
curl -A iPassConnect -v "https://securelogin.arubanetworks.com/cgi-bin/login?cmd=logout&ip=10.215.1.95&opcode=wispr" -k
以下のLogoffメソッドは失敗する!
curl -A Wi2Connect -v
"http://securelogin.arubanetworks.com/cgi-bin/login?cmd=logout&ip=10.215.1.90&opcode=wispr"
-k
curl -A Wi2Connect -v
"https://securelogin.arubanetworks.com/cgi-bin/login?cmd=logout&ip=10.215.1.90&opcode=wispr"
-k
Testing:
Curl windows版
C:\curl>curl -A Wi2Connect -v "https://securelogin.arubanetworks.com/cgi-bin/log
in?cmd=login&mac=8c:29:37:ee:28:9c&ip=10.215.1.95&opcode=wispr&if;"
-d "UserName=user1" -d "Password=aruba123" -d "button=Login" -d "OriginatingServ
er=/wi2free/login/redirect" -k
* Trying 172.31.98.1...
* Connected to securelogin.arubanetworks.com (172.31.98.1) port 443 (#0)
* TLSv1.0, TLS handshake, Client hello (1):
* TLSv1.0, TLS handshake, Server hello (2):
* TLSv1.0, TLS handshake, CERT (11):
* TLSv1.0, TLS handshake, Server finished (14):
* TLSv1.0, TLS handshake, Client key exchange (16):
* TLSv1.0, TLS change cipher, Client hello (1):
* TLSv1.0, TLS handshake, Finished (20):
* TLSv1.0, TLS change cipher, Client hello (1):
* TLSv1.0, TLS handshake, Finished (20):
* SSL connection using TLSv1.0 / AES128-SHA
* Server certificate:
* subject: serialNumber=lLUge2fRPkWcJe7boLSVdsKOFK8wv3MF; C=US; O=securel
ogin.arubanetworks.com; OU=GT28470348; OU=See www.geotrust.com/resources/cps (c)
11; OU=Domain Control Validated - QuickSSL(R) Premium; CN=securelogin.arubanetwo
rks.com
* start date: 2011-05-11 01:22:10 GMT
* expire date: 2017-08-11 04:40:59 GMT
* issuer: C=US; O=GeoTrust Inc.; OU=Domain Validated SSL; CN=GeoTrust DV
SSL CA
* SSL certificate verify result: self signed certificate in certificate c
hain (19), continuing anyway.
> POST /cgi-bin/login?cmd=login&mac=8c:29:37:ee:28:9c&ip=10.215.1.95&
;opcode=wispr&if; HTTP/1.1
> User-Agent: Wi2Connect
> Host: securelogin.arubanetworks.com
> Accept: */*
> Content-Length: 87
> Content-Type: application/x-www-form-urlencoded
>
* upload completely sent off: 87 out of 87 bytes
* HTTP 1.0, assume close after body
< HTTP/1.0 200 OK
< Transfer-Encoding: chunked
< Content-Type:text/html;
<
<html> <!--<?xml version="1.0" encoding="UTF-8"?><WISPAccessGatewayParam xmlns:x
si="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="ht
tp://us-rws-gw.ipass.com/pages/WISPAccessGatewayParam.xsd"><AuthenticationReply>
<MessageType>120</MessageType><ResponseCode>50</ResponseCode><LogoffURL>http://s
ecurelogin.arubanetworks.com/cgi-bin/login?cmd=logout&ip=10.215.1.95&opc
ode=wispr</LogoffURL></AuthenticationReply></WISPAccessGatewayParam>--> </html>*
Closing connection 0
* TLSv1.0, TLS alert, Client hello (1):
C:\curl>curl -A Wi2Connect -v "http://securelogin.arubanetworks.com/cgi-bin/logi
n?cmd=logout&ip=10.215.1.95&opcode=wispr" -k
* Trying 172.31.98.1...
* Connected to securelogin.arubanetworks.com (172.31.98.1) port 80 (#0)
> GET /cgi-bin/login?cmd=logout&ip=10.215.1.95&opcode=wispr HTTP/1.1
> User-Agent: Wi2Connect
> Host: securelogin.arubanetworks.com
> Accept: */*
>
* Recv failure: Connection was reset
* Closing connection 0
curl: (56) Recv failure: Connection was reset
Summary:
RADIUS Accounting:
WISPr Client example(iPassConnect)
------------------------------------------------
In RADIUS attribute, IAP shows the logoff-URL below:
WISPr-Logoff-URL =
https://securelogin.arubanetworks.com/cgi-bin/login?cmd=logout
In the WISPr exchange, the logoffURL is displayed below:
<LogoffURL>http://securelogin.arubanetworks.com/cgi-bin/login?cmd=logout&ip=10.215.1.90&op
ode=wispr</LogoffURL>
------------------------------------------------
IAP's configuration:
wlan ssid-profile wayport
enable
index 5
type guest
essid wayport
opmode opensystem
max-authentication-failures 0
vlan guest
auth-server External-RADIUS
rf-band all
wispr
dtim-period 1
inactivity-timeout 1000
broadcast-filter arp
radius-accounting
dmo-channel-utilization-threshold 90
local-probe-req-thresh 0
max-clients-threshold 64
!
wlan auth-server External-RADIUS
ip 10.215.107.105
port 1812
acctport 1813
key 0259b9c674ce44ab90a5c58c83891d477920233c77236862
rfc3576
cppm-rfc3576-port 5999
wlan wispr-profile
wispr-location-name-operator-name Wi2Connect
wispr-location-name-location Yokohama-Wi-Fi
wispr-location-id-network Yokohama-Wi-Fi
wispr-location-id-cc 81
wispr-location-id-ac 0
wispr-location-id-isocc JP
RADIUS Accounting:
WISPr Client example(iPassConnect)
0 件のコメント:
コメントを投稿