Jkaptive is a simple captive portal without RADIUS (and thus without total security, but at the same time without too much hassle). The reason behind this is because a lot of site administrators don't need tight security; their site is just a café that offers free Internet access on an unsecured WLAN access point connected to the Internet, and they need a ticketing system to make it cumbersome for average people to use this offering without actually buying a single coffee. Jkaptive itself just presents the login page and checks the token. The blocking of unticketed traffic is done through Linux' netfilter. As no proxy server is involved, jkaptive has no performance penalty, nor does it create problems with non-HTTP traffic. Once the token is accepted, jkaptive is out of the way of any network packets completely. For presenting the login page, jkaptive has a built-in Web server, so no additional Web server application is needed.
|Tags||Firewall Webserver Wireless|
Release Notes: An additional permutation to the token was added to allow users to share the same expiry date.
Release Notes: This release fixes two bugs. It ifxes base64 decoding of the token malfunctioned with tcllib >= 1.14 from recent Linux distributions. The --loglevel command line switch now overrides the loglevel option from the config file.
Release Notes: Rate limiting rules have been added for jkaptive HTTP server. The socket in the HTTP father process is now closed in any case after worker exit, resolving a file descriptor exhaustion problem.
Release Notes: Support for ipsets (See http://ipset.netfilter.org/) has been added. Some small bugs in the custom SuSEfirewall2 script have been fixed.
Release Notes: A resource leak related to file descriptors in the built-in httpd has been found and fixed.