captiveportal_fakedns 1.2 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344
  1. #!/usr/bin/perl
  2. use strict;
  3. use warnings;
  4. use Net::DNS::Nameserver;
  5. sub get_local_ip_address {
  6. # Savagely obtain the local IP from this command (interfaces that are UP and starting with 'w')
  7. # ... the previous method was not reliable, in theory there are several interfaces and we
  8. # specifically want the local IP for the wifi interface (and in theory there could be many of them..)
  9. my $local_ip_address = `ip -br a | grep "^w" | awk '\$2 == "UP" { print \$3 }' | awk -F/ '{print \$1}'`;
  10. return $local_ip_address;
  11. }
  12. my $ip4_addr = get_local_ip_address();
  13. sub reply_handler {
  14. my ($qname, $qclass, $qtype, $peerhost,$query,$conn) = @_;
  15. my ($rcode, @ans, @auth, @add);
  16. if($qtype eq "A") {
  17. my ($ttl, $rdata) = (1, $ip4_addr);
  18. my $rr = new Net::DNS::RR("$qname $ttl $qclass $qtype $rdata");
  19. push @ans, $rr;
  20. $rcode = "NOERROR";
  21. } else {
  22. $rcode = "NXDOMAIN";
  23. }
  24. return ($rcode, \@ans, \@auth, \@add, { aa => 1 });
  25. }
  26. my $ns = new Net::DNS::Nameserver(
  27. LocalPort => 4253,
  28. LocalAddr => '0.0.0.0',
  29. ReplyHandler => \&reply_handler,
  30. Verbose => 0
  31. ) || die "Couldn't create fake nameserver object.\n";
  32. $ns->main_loop;
  33. exit 0;