Close
0%
0%

B(h)ackpack AP

Personal secure connection.

Similar projects worth following
I wanted a personal access point that my phone, Roku, Chromecast, and laptop stay connected to. This is actually an evolved concept from the original idea, that I needed my Roku to connect to it's own AP because I couldn't "Accept" the TOS on my employer's WiFi. It's just spun out of control and the B(h)ackpack was born.

Still a work in progress. Help wanted.

edit: In saying "I couldn't "Accept" the TOS on my employer's WiFi", I meant that there is no browser or otherwise any provisions within the Roku menu to navigate to the web authentication redirect where I can actually click "Accept". In addition to that, I do not agree to their TOS including (or anyone who practices) "traffic monitoring" which is why this will establish a VPN tunnel.

List of goals for this project:

  • Automatically connect to whitelisted APs with "open" configuration.
    • Use WiGLE
    • Automatically accept terms of service for APs that require clicking "I Agree" in browser window.
  • Establish VPN.
    • Autoconnect VPN.
  • Receive GPS and send location data to home server.
  • Enclose in nondescript project box with provisions for multiple antennas, Ethernet port, USB host port, USB micro for charging.
    • Pelican 1060
  • Extended Feature Set:
    • Wardrive?
    • Piratebox?
    • Bluetooth?
    • Mesh?
    • Camera?
    • RTL TCP Server?
    • ToR?

  • 0.9?

    load.nikon01/26/2016 at 22:00 3 comments

    This has been back-burner'd for a while. Work and school come first and all. But progress has been made very recently. Some time ago, I gave up on the TP Link pocket router and went with a Raspberry Pi 2, inspired by other projects on here and around the web. That ended up making things much easier for me as there's a much larger support base and community for the Pi than the MR2030. At least for one with my level of skill. Some of this may be easy for those of you who have years of experience with Linux and whatnot. I have had a very basic understanding of Linux but I'm going all in. I've taken it all apart and built it back up and here it is.

    The current iteration has two identical Alfa AWUS036NH wireless adapters and a BU-353S4 GPS receiver. It creates an access point on WLAN0 and connects to an open access point with WLAN1. WLAN1 passes traffic to WLAN0 and ETH0. My thanks to the folks at Realies for providing the walkthrough for setting up the Pi. There were a great many sites on the internet that contributed but theirs was the most comprehensive and the only walkthrough that used WPA2. Additionally, they have some information on getting this setup working with the little Edimax adapters that are so popular with the Pi.

    After wiping the micro SD card on my setup about a hundred times, I decided I was tired of going through the configuration over and over. I have also recently decided to learn bash scripting. So, for the last few weeks I've been schooling up on Bash and Git and Github. I've linked my repo in the project links section, feel free to use it or contribute to make it better. The ap.sh script will set up your Pi as an access point if you've got the same components as I do. Really, it should work with anything that uses the nl80211 driver.

    My current configuration also includes GPS using a BU-353S4 receiver which uses serial over USB. There's been some issues with Raspbian Jessie and this S4 model. I haven't seen anybody having issues with a standard BU-353 (discontinued) or Rasbian Wheezy. The fix was just to update the default config file with the same commands that one would normally pass when running gpsd. I've made a script for that too, because I'd rather spend six hours learning how to do something in ten seconds than spend sixty seconds each time I have to wipe the card and rebuild.

    Next steps, I want to set up the Pi to automatically establish a VPN tunnel to my home server so that any connected clients have all traffic pass through the tunnel and there is no worry of leaks. I also would have the Raspberry Pi report it's position and other nearby access points to my server, like a wardriving rig.

    Additional considerations may include setting up something like a Piratebox on it's own SSID and removable drive, bluetooth connectivity, an SDR server with rtl_tcp, and maybe a camera. I really don't think the Pi can handle all these things at once but maybe a second Pi could be in the same enclosure, connected via ETH0, handling the extra hardware and the first just does the access point and GPS. Super bonus idea: maybe add directional antennas on rotating mounts with servos or stepper motors and have an additional setup in my truck that keeps an antenna aimed at me while I'm out and about and another antenna aimed at whitelisted access points.

    Still looking for help, if anyone can or wants to contribute.

  • Where were these people before?

    load.nikon06/22/2015 at 15:28 0 comments

    So, what happens when I have a good idea? Nobody else has ever done it and I don't know how to do it and I have to learn all new things and then when I'm ready to give up, I find out people have been doing this all along and I don't even know how to Google, apparently.

    The other week, I decided the little TP-Link MR3020 couldn't handle what I was tasking it to do so I bought a Raspberry Pi 2. After a week of fooling around and finding similar projects (https://hackaday.io/project/2040-web-security-everywhere) I decided I'd just follow someone else's instructions. I ended up going with https://realiesone.wordpress.com/2015/03/11/the-raspberry-pi-as-an-internet-pass-through-web-server-using-two-wireless-adapters/ for starters and currently have the device operational with the Edimax adapters. I'll test it out with the captive portal at work tomorrow night.


    I still plan to tinker with this and maybe try some other builds but I'm gonna call this one done. Thank you everyone for all your support and I'll keep you posted if things happen.

  • Starting from scratch.

    load.nikon02/06/2015 at 06:05 0 comments

    It's been a minute but I have news. Firstly, apologies for the delay. I'm in school and have to give priority to it as this is the whole reason I got back in college. Here's what went down in an easy to digest format:

    1. Wiped Windows XP from an old machine and installed FreeBSD 10.1.
    2. Configured SSH daemon on FreeBSD machine.
    3. Setup port forwarding.

    As previously mentioned, I'm making sure I know how to accomplish my goals on my laptop before I apply it all to the bhackpack project. So I went back to square one on the VPN because I was previously running OpenVPN on the XP machine. XP was a problem. So I have the SSH tunnel active now and am able to tunnel select ports. I started with my external router's remote administration port so now remote admin is disabled but I can still access the web GUI internally from the tunnel, and telnet in the same way. Having access to this and being SSH'd into my server at home while at work during downtime should help move this along faster (studies permitting).

    Next objectives:

    • Establish VPN system-wide on remote machine.
    • Apply all necessary configuration to TP-Link pocket router.
    • Verify all traffic will route through tunnel.
    • Write script to continuously monitor for open access points and connect
    • If necessary, agree to terms of service or alert me action is needed.

  • I just had an apostrophe.

    load.nikon07/20/2014 at 05:52 0 comments

    I (finally) started an OpenVPN server and configured my home network for VPN and IP Passthrough.  Testing with my laptop, I got confirmation of a successful connection but for all my testing it appeared dead.  No internet, no network visible.  I had to revert network configuration before leaving for work this evening due to an as yet unexplained loss of connectivity on other network devices.  After enabling remote administration, I was able to make another attempt during downtime at work however my employer appears to be blocking VPN.  Port 1194 is a common port registered to OpenVPN so after running netstat -b I found an active TCP port used by chrome and since they apparently weren't blocking that port, I edited the OpenVPN configuration to connect to that port on my remote network, then configured port forwarding so that any incoming requests on that port were sent to the VPN server's address and port.

    Having talked myself through this just now, I wonder if, instead of pointing requests on that port number to the server-assigned IP, I should have pointed those requests back to the gateway's internal 192.168.1.1 IP and let the firmware handle the request from there as I had told DD-WRT the required information for the OpenVPN server.

  • Server Started

    load.nikon06/08/2014 at 07:10 0 comments

    I dug an older PC and a few routers out and I will be setting up OpenVPN this week.  Once the server is running, I'll start by making my laptop a client for testing.  To be clear, I want the pocket router in my backpack to ultimately be the client and my trusted devices stay connected to the router.

    The workspace you see tends to explode out of the backpack on the right for now but the final solution will stay in the backpack 24/7.  Read: tidy.

    edit: This was my lunch break, please excuse the food at my desk.

    I'm also looking into giving the router it's own 3G/4G connection via Sprint but Sprint is such fail in my community that I may just cross that bridge further down the line.

  • Staying connected.

    load.nikon04/03/2014 at 07:49 0 comments

    So here's the deal.  Up until this point I've flashed the firmware to OpenWRT, added ExtRoot to put the filesystem on an attached USB drive formatted to ext4, and added support for the ALFA adapter as Radio1.  I've tried to keep a journal via readme.txt in the folder on my computer where I store all the firmware backups which I make every time I change ANYTHING.  I got it to connect to my home network via Radio1 as a client, and pipe data through to Radio0 as a master.  It stayed alive indefinitely and all was good.  But at work, where we have guest WiFi, it only stays alive for a few minutes and then becomes unresponsive.  Part of that problem (I think) is in the Guest WiFi because my phone has similar problems where it will remain connected to the AP but no data passes through.

    If anyone here has exhaustive experience with OpenWRT, I'd love to hear from you for your insight and ideas.

View all 6 project logs

  • 1
    Step 1

    These directions will only get you as far as I've come. If you have any ideas for step 9, please consider becoming a collaborator for this project.

    1. Obtain Raspberry Pi 2 (or better).
    2. Install Raspbian.
    3. Obtain a powered USB hub to connect the following components to, with the Pi as host. The Pi can receive power from the hub. Consider the hub and y-cable I used.
    4. Obtain Alfa AWUS036NH adapters.
      1. Any adapter using nl80211 driver will work.
      2. If using Edimax or other Realtek RTL8188CUS, follow directions here and skip next step.
    5. Run the ap.sh script found on my Github repo.
      1. Enter desired BSSID when prompted.
      2. Enter desired passphrase when prompted.
    6. Reboot and connect to the new access point and log in via ssh @ 10.10.0.1.
    7. If desired, obtain USGlobalsat BU-353S4.
    8. Run the gps.sh script found on my Github repo.
    9. ???
    10. Profit.

View all instructions

Enjoy this project?

Share

Discussions

Similar Projects

Does this project spark your interest?

Become a member to follow this project and never miss any updates