6 #include <sys/socket.h>
7 #include <linux/rtnetlink.h>
15 int plugin_api_version
= PLUGIN_API_VERSION
;
16 static struct pluginfuncs
*f
= 0;
18 static int iam_master
= 0; // We're all slaves! Slaves I tell you!
20 char *up_commands
[] = {
21 "iptables -t nat -N garden >/dev/null 2>&1", // Create a chain that all gardened users will go through
22 "iptables -t nat -F garden",
23 ". " PLUGINCONF
"/build-garden", // Populate with site-specific DNAT rules
24 "iptables -t nat -N garden_users >/dev/null 2>&1", // Empty chain, users added/removed by garden_session
25 "iptables -t nat -F garden_users",
26 "iptables -t nat -A PREROUTING -j garden_users", // DNAT any users on the garden_users chain
27 "sysctl -w net.ipv4.netfilter.ip_conntrack_max=512000" // lots of entries
28 " net.ipv4.netfilter.ip_conntrack_tcp_timeout_established=18000 >/dev/null", // 5hrs
32 char *down_commands
[] = {
33 "iptables -t nat -F PREROUTING",
34 "iptables -t nat -F garden_users",
35 "iptables -t nat -X garden_users",
36 "iptables -t nat -F garden",
37 "iptables -t nat -X garden",
38 "rmmod iptable_nat", // Should also remove ip_conntrack, but
39 // doing so can take hours... literally.
40 // If a master is re-started as a slave,
41 // either rmmod manually, or reboot.
49 int garden_session(sessiont
*s
, int flag
, char *newuser
);
51 int plugin_post_auth(struct param_post_auth
*data
)
53 // Ignore if user authentication was successful
54 if (data
->auth_allowed
)
57 f
->log(3, f
->get_id_by_session(data
->s
), data
->s
->tunnel
,
58 "Walled Garden allowing login\n");
60 data
->auth_allowed
= 1;
61 data
->s
->walled_garden
= 1;
65 int plugin_new_session(struct param_new_session
*data
)
68 return PLUGIN_RET_OK
; // Slaves don't do walled garden processing.
70 if (data
->s
->walled_garden
)
71 garden_session(data
->s
, F_GARDEN
, 0);
76 int plugin_kill_session(struct param_new_session
*data
)
79 return PLUGIN_RET_OK
; // Slaves don't do walled garden processing.
81 if (data
->s
->walled_garden
)
82 garden_session(data
->s
, F_CLEANUP
, 0);
87 char *plugin_control_help
[] = {
88 " garden USER|SID Put user into the walled garden",
89 " ungarden SID [USER] Release session from garden",
93 int plugin_control(struct param_control
*data
)
101 return PLUGIN_RET_OK
;
103 if (strcmp(data
->argv
[0], "garden") && strcmp(data
->argv
[0], "ungarden"))
104 return PLUGIN_RET_OK
; // not for us
107 return PLUGIN_RET_NOTMASTER
;
109 flag
= data
->argv
[0][0] == 'g' ? F_GARDEN
: F_UNGARDEN
;
111 if (data
->argc
< 2 || data
->argc
> 3 || (data
->argc
> 2 && flag
== F_GARDEN
))
113 data
->response
= NSCTL_RES_ERR
;
114 data
->additional
= flag
== F_GARDEN
115 ? "requires username or session id"
116 : "requires session id and optional username";
118 return PLUGIN_RET_STOP
;
121 if (!(session
= strtol(data
->argv
[1], &end
, 10)) || *end
)
124 session
= f
->get_session_by_username(data
->argv
[1]);
126 session
= 0; // can't ungarden by username
130 s
= f
->get_session_by_id(session
);
134 data
->response
= NSCTL_RES_ERR
;
135 data
->additional
= "session not found";
136 return PLUGIN_RET_STOP
;
139 if (s
->walled_garden
== flag
)
141 data
->response
= NSCTL_RES_ERR
;
142 data
->additional
= flag
? "already in walled garden" : "not in walled garden";
143 return PLUGIN_RET_STOP
;
146 garden_session(s
, flag
, data
->argc
> 2 ? data
->argv
[2] : 0);
147 f
->session_changed(session
);
149 data
->response
= NSCTL_RES_OK
;
150 data
->additional
= 0;
152 return PLUGIN_RET_STOP
;
155 int plugin_become_master(void)
158 iam_master
= 1; // We just became the master. Wow!
160 for (i
= 0; up_commands
[i
] && *up_commands
[i
]; i
++)
162 f
->log(3, 0, 0, "Running %s\n", up_commands
[i
]);
163 system(up_commands
[i
]);
166 return PLUGIN_RET_OK
;
169 // Called for each active session after becoming master
170 int plugin_new_session_master(sessiont
*s
)
172 if (s
->walled_garden
)
173 garden_session(s
, F_GARDEN
, 0);
175 return PLUGIN_RET_OK
;
178 int garden_session(sessiont
*s
, int flag
, char *newuser
)
184 if (!s
->opened
) return 0;
186 sess
= f
->get_id_by_session(s
);
187 if (flag
== F_GARDEN
)
189 f
->log(2, sess
, s
->tunnel
, "Garden user %s (%s)\n", s
->user
,
190 f
->fmtaddr(htonl(s
->ip
), 0));
192 snprintf(cmd
, sizeof(cmd
),
193 "iptables -t nat -A garden_users -s %s -j garden",
194 f
->fmtaddr(htonl(s
->ip
), 0));
196 f
->log(3, sess
, s
->tunnel
, "%s\n", cmd
);
198 s
->walled_garden
= 1;
206 f
->log(2, sess
, s
->tunnel
, "Un-Garden user %s (%s)\n", s
->user
, f
->fmtaddr(htonl(s
->ip
), 0));
209 snprintf(s
->user
, MAXUSER
, "%s", newuser
);
210 f
->log(2, sess
, s
->tunnel
, " Setting username to %s\n", s
->user
);
213 // Kick off any duplicate usernames
214 // but make sure not to kick off ourself
215 if (s
->ip
&& !s
->die
&& (other
= f
->get_session_by_username(s
->user
)) &&
216 s
!= f
->get_session_by_id(other
))
218 f
->sessionkill(other
,
219 "Duplicate session when user released from walled garden");
222 /* Clean up counters */
223 s
->pin
= s
->pout
= 0;
224 s
->cin
= s
->cout
= 0;
225 s
->cin_delta
= s
->cout_delta
= s
->coutgrp_delta
= 0;
226 s
->cin_wrap
= s
->cout_wrap
= 0;
228 snprintf(cmd
, sizeof(cmd
),
229 "iptables -t nat -D garden_users -s %s -j garden",
230 f
->fmtaddr(htonl(s
->ip
), 0));
232 f
->log(3, sess
, s
->tunnel
, "%s\n", cmd
);
235 int status
= system(cmd
);
236 if (WEXITSTATUS(status
) != 0) break;
239 s
->walled_garden
= 0;
241 if (flag
!= F_CLEANUP
)
244 uint16_t r
= f
->radiusnew(f
->get_id_by_session(s
));
245 if (r
) f
->radiussend(r
, RADIUSSTART
);
252 int plugin_init(struct pluginfuncs
*funcs
)
262 if ((tables
= fopen("/proc/net/ip_tables_names", "r")))
265 while (fgets(buf
, sizeof(buf
), tables
) && !found_nat
)
266 found_nat
= !strcmp(buf
, "nat\n");
271 /* master killed/crashed? */
275 for (i
= 0; down_commands
[i
] && *down_commands
[i
]; i
++)
277 f
->log(3, 0, 0, "Running %s\n", down_commands
[i
]);
278 system(down_commands
[i
]);
289 if (!iam_master
) // Never became master. nothing to do.
292 for (i
= 0; down_commands
[i
] && *down_commands
[i
]; i
++)
294 f
->log(3, 0, 0, "Running %s\n", down_commands
[i
]);
295 system(down_commands
[i
]);