6 #include <sys/socket.h>
10 #include <arpa/inet.h>
12 #include <netinet/in.h>
14 #include <linux/rtnetlink.h>
17 #include "constants.h"
28 extern radiust
*radius
;
29 extern sessiont
*session
;
30 extern tunnelt
*tunnel
;
31 extern configt
*config
;
33 extern ip_filtert
*ip_filters
;
35 static const hasht zero
;
37 static void calc_auth(const void *buf
, size_t len
, const uint8_t *in
, uint8_t *out
)
42 MD5_Update(&ctx
, (void *)buf
, 4); // code, id, length
43 MD5_Update(&ctx
, (void *)in
, 16); // auth
44 MD5_Update(&ctx
, (void *)(buf
+ 20), len
- 20);
45 MD5_Update(&ctx
, config
->radiussecret
, strlen(config
->radiussecret
));
49 // Set up socket for radius requests
54 uint16_t min
= config
->radius_bind_min
;
55 uint16_t max
= config
->radius_bind_max
;
57 struct sockaddr_in addr
;
65 else if (max
) /* no minimum specified, bind from max down */
72 LOG(3, 0, 0, "Creating %d sockets for RADIUS queries\n", RADIUS_FDS
);
73 radfds
= calloc(sizeof(int), RADIUS_FDS
);
74 for (i
= 0; i
< RADIUS_FDS
; i
++)
77 radfds
[i
] = socket(AF_INET
, SOCK_DGRAM
, IPPROTO_UDP
);
78 flags
= fcntl(radfds
[i
], F_GETFL
, 0);
79 fcntl(radfds
[i
], F_SETFL
, flags
| O_NONBLOCK
);
85 memset(&addr
, 0, sizeof(addr
));
86 addr
.sin_family
= AF_INET
;
87 addr
.sin_addr
.s_addr
= INADDR_ANY
;
90 addr
.sin_port
= htons(port
);
91 if ((b
= bind(radfds
[i
], (struct sockaddr
*) &addr
, sizeof(addr
))) < 0)
93 if ((port
+= inc
) < min
|| port
> max
)
95 LOG(0, 0, 0, "Can't bind RADIUS socket in range %u-%u\n", min
, max
);
104 void radiusclear(uint16_t r
, sessionidt s
)
106 if (s
) sess_local
[s
].radius
= 0;
107 memset(&radius
[r
], 0, sizeof(radius
[r
])); // radius[r].state = RADIUSNULL;
110 static uint16_t get_free_radius()
113 static uint32_t next_radius_id
= 0;
115 for (count
= MAXRADIUS
; count
> 0; --count
)
117 ++next_radius_id
; // Find the next ID to check.
118 if (next_radius_id
>= MAXRADIUS
)
121 if (radius
[next_radius_id
].state
== RADIUSNULL
)
123 return next_radius_id
;
127 LOG(0, 0, 0, "Can't find a free radius session! This is very bad!\n");
131 uint16_t radiusnew(sessionidt s
)
133 uint16_t r
= sess_local
[s
].radius
;
138 LOG(3, s
, session
[s
].tunnel
, "Re-used radius %d\n", r
);
142 if (!(r
= get_free_radius()))
144 LOG(1, s
, session
[s
].tunnel
, "No free RADIUS sessions\n");
145 STAT(radius_overflow
);
149 memset(&radius
[r
], 0, sizeof(radius
[r
]));
150 sess_local
[s
].radius
= r
;
151 radius
[r
].session
= s
;
152 radius
[r
].state
= RADIUSWAIT
;
153 radius
[r
].retry
= TIME
+ 1200; // Wait at least 120 seconds to re-claim this.
155 random_data(radius
[r
].auth
, sizeof(radius
[r
].auth
));
157 LOG(3, s
, session
[s
].tunnel
, "Allocated radius %d\n", r
);
161 // Send a RADIUS request
162 void radiussend(uint16_t r
, uint8_t state
)
164 struct sockaddr_in addr
;
165 uint8_t b
[4096]; // RADIUS packet
173 s
= radius
[r
].session
;
174 if (!config
->numradiusservers
)
176 LOG(0, s
, session
[s
].tunnel
, "No RADIUS servers\n");
179 if (!*config
->radiussecret
)
181 LOG(0, s
, session
[s
].tunnel
, "No RADIUS secret\n");
185 if (state
!= RADIUSAUTH
&& state
!= RADIUSJUSTAUTH
&& !config
->radius_accounting
)
187 // Radius accounting is turned off
192 if (radius
[r
].state
!= state
)
195 radius
[r
].state
= state
;
196 radius
[r
].retry
= backoff(radius
[r
].try++) + 20; // 3s, 4s, 6s, 10s...
197 LOG(4, s
, session
[s
].tunnel
, "Send RADIUS id %d sock %d state %s try %d\n",
198 r
>> RADIUS_SHIFT
, r
& RADIUS_MASK
,
199 radius_state(radius
[r
].state
), radius
[r
].try);
201 if (radius
[r
].try > config
->numradiusservers
* 2)
205 if (state
== RADIUSAUTH
|| state
== RADIUSJUSTAUTH
)
206 sessionshutdown(s
, "RADIUS timeout.", CDN_ADMIN_DISC
, TERM_REAUTHENTICATION_FAILURE
);
209 LOG(1, s
, session
[s
].tunnel
, "RADIUS timeout, but in state %s so don't timeout session\n",
210 radius_state(state
));
213 STAT(radius_timeout
);
217 STAT(radius_retries
);
218 radius
[r
].state
= RADIUSWAIT
;
219 radius
[r
].retry
= 100;
223 // contruct RADIUS access request
228 b
[0] = AccessRequest
; // access request
233 b
[0] = AccountingRequest
; // accounting request
236 LOG(0, 0, 0, "Unknown radius state %d\n", state
);
238 b
[1] = r
>> RADIUS_SHIFT
; // identifier
239 memcpy(b
+ 4, radius
[r
].auth
, 16);
245 p
[1] = strlen(session
[s
].user
) + 2;
246 strcpy((char *) p
+ 2, session
[s
].user
);
249 if (state
== RADIUSAUTH
|| state
== RADIUSJUSTAUTH
)
253 *p
= 3; // CHAP password
255 p
[2] = radius
[r
].id
; // ID
256 memcpy(p
+ 3, radius
[r
].pass
, 16); // response from CHAP request
258 *p
= 60; // CHAP Challenge
260 memcpy(p
+ 2, radius
[r
].auth
, 16);
265 strcpy(pass
, radius
[r
].pass
);
268 pass
[pl
++] = 0; // pad
277 MD5_Update(&ctx
, config
->radiussecret
, strlen(config
->radiussecret
));
279 MD5_Update(&ctx
, pass
+ p
- 16, 16);
281 MD5_Update(&ctx
, radius
[r
].auth
, 16);
282 MD5_Final(hash
, &ctx
);
285 pass
[p
] ^= hash
[p
& 15];
294 memcpy(p
+ 2, pass
, pl
);
300 *p
= 40; // accounting type
302 *(uint32_t *) (p
+ 2) = htonl(state
- RADIUSSTART
+ 1); // start=1, stop=2, interim=3
306 *p
= 44; // session ID
308 sprintf((char *) p
+ 2, "%08X%08X", session
[s
].unique_id
, session
[s
].opened
);
310 if (state
== RADIUSSTART
)
314 *(uint32_t *) (p
+ 2) = htonl(time(NULL
) - session
[s
].opened
);
316 sess_local
[s
].last_interim
= time_now
; // Setup "first" Interim
320 *p
= 42; // input octets
322 *(uint32_t *) (p
+ 2) = htonl(session
[s
].cin
);
325 *p
= 43; // output octets
327 *(uint32_t *) (p
+ 2) = htonl(session
[s
].cout
);
330 *p
= 46; // session time
332 *(uint32_t *) (p
+ 2) = htonl(time(NULL
) - session
[s
].opened
);
335 *p
= 47; // input packets
337 *(uint32_t *) (p
+ 2) = htonl(session
[s
].pin
);
340 *p
= 48; // output packets
342 *(uint32_t *) (p
+ 2) = htonl(session
[s
].pout
);
345 *p
= 52; // input gigawords
347 *(uint32_t *) (p
+ 2) = htonl(session
[s
].cin_wrap
);
350 *p
= 53; // output gigawords
352 *(uint32_t *) (p
+ 2) = htonl(session
[s
].cout_wrap
);
355 if (state
== RADIUSSTOP
&& radius
[r
].term_cause
)
357 *p
= 49; // acct-terminate-cause
359 *(uint32_t *) (p
+ 2) = htonl(radius
[r
].term_cause
);
362 if (radius
[r
].term_msg
)
364 *p
= 26; // vendor-specific
365 *(uint32_t *) (p
+ 2) = htonl(9); // Cisco
366 p
[6] = 1; // Cisco-AVPair
367 p
[7] = 2 + sprintf((char *) p
+ 8, "disc-cause-ext=%s", radius
[r
].term_msg
);
374 if (session
[s
].classlen
) {
376 p
[1] = session
[s
].classlen
+ 2;
377 memcpy(p
+ 2, session
[s
].class, session
[s
].classlen
);
382 struct param_radius_account acct
= { &tunnel
[session
[s
].tunnel
], &session
[s
], &p
};
383 run_plugins(PLUGIN_RADIUS_ACCOUNT
, &acct
);
392 *(uint32_t *) (p
+ 2) = htonl(s
);
395 *p
= 6; // Service-Type
397 *(uint32_t *) (p
+ 2) = htonl((state
== RADIUSJUSTAUTH
? 8 : 2)); // Authenticate only or Framed-User respectevily
400 *p
= 7; // Framed-Protocol
401 p
[1] = htonl((state
== RADIUSJUSTAUTH
? 0 : 6));
402 *(uint32_t *) (p
+ 2) = htonl((state
== RADIUSJUSTAUTH
? 0 : 1)); // PPP
407 *p
= 8; // Framed-IP-Address
409 *(uint32_t *) (p
+ 2) = htonl(session
[s
].ip
);
413 if (session
[s
].route
[0].ip
)
416 for (r
= 0; s
&& r
< MAXROUTE
&& session
[s
].route
[r
].ip
; r
++)
418 *p
= 22; // Framed-Route
419 p
[1] = sprintf((char *) p
+ 2, "%s/%d %s 1",
420 fmtaddr(htonl(session
[s
].route
[r
].ip
), 0),
421 session
[s
].route
[r
].prefixlen
,
422 fmtaddr(htonl(session
[s
].ip
), 1)) + 2;
428 if (session
[s
].session_timeout
)
430 *p
= 27; // Session-Timeout
432 *(uint32_t *) (p
+ 2) = htonl(session
[s
].session_timeout
);
436 if (session
[s
].idle_timeout
)
438 *p
= 28; // Idle-Timeout
440 *(uint32_t *) (p
+ 2) = htonl(session
[s
].idle_timeout
);
444 if (*session
[s
].called
)
447 p
[1] = strlen(session
[s
].called
) + 2;
448 strcpy((char *) p
+ 2, session
[s
].called
);
452 if (*session
[s
].calling
)
455 p
[1] = strlen(session
[s
].calling
) + 2;
456 strcpy((char *) p
+ 2, session
[s
].calling
);
464 *(uint32_t *)(p
+ 2) = config
->bind_address
;
468 *(uint16_t *) (b
+ 2) = htons(p
- b
);
469 if (state
!= RADIUSAUTH
&& state
!= RADIUSJUSTAUTH
)
471 // Build auth for accounting packet
472 calc_auth(b
, p
- b
, zero
, b
+ 4);
473 memcpy(radius
[r
].auth
, b
+ 4, 16);
475 memset(&addr
, 0, sizeof(addr
));
476 addr
.sin_family
= AF_INET
;
477 *(uint32_t *) & addr
.sin_addr
= config
->radiusserver
[(radius
[r
].try - 1) % config
->numradiusservers
];
480 uint16_t port
= config
->radiusport
[(radius
[r
].try - 1) % config
->numradiusservers
];
481 // assume RADIUS accounting port is the authentication port +1
482 addr
.sin_port
= htons((state
== RADIUSAUTH
|| state
== RADIUSJUSTAUTH
) ? port
: port
+1);
485 LOG_HEX(5, "RADIUS Send", b
, (p
- b
));
486 sendto(radfds
[r
& RADIUS_MASK
], b
, p
- b
, 0, (void *) &addr
, sizeof(addr
));
489 static void handle_avpair(sessionidt s
, uint8_t *avp
, int len
)
492 uint8_t *value
= memchr(avp
, '=', len
);
493 uint8_t tmp
[2048] = "";
507 if (len
> 2 && (*value
== '"' || *value
== '\'') && value
[len
- 1] == *value
)
513 // copy and null terminate
514 else if (len
< sizeof(tmp
) - 1)
516 memcpy(tmp
, value
, len
);
525 struct param_radius_response p
= { &tunnel
[session
[s
].tunnel
], &session
[s
], (char *) key
, (char *) value
};
526 run_plugins(PLUGIN_RADIUS_RESPONSE
, &p
);
530 // process RADIUS response
531 void processrad(uint8_t *buf
, int len
, char socket_index
)
542 int OpentunnelReq
= 0;
547 LOG_HEX(5, "RADIUS Response", buf
, len
);
548 if (len
< 20 || len
< ntohs(*(uint16_t *) (buf
+ 2)))
550 LOG(1, 0, 0, "Duff RADIUS response length %d\n", len
);
554 r_code
= buf
[0]; // response type
555 r_id
= buf
[1]; // radius reply indentifier.
557 len
= ntohs(*(uint16_t *) (buf
+ 2));
558 r
= socket_index
| (r_id
<< RADIUS_SHIFT
);
559 s
= radius
[r
].session
;
560 LOG(3, s
, session
[s
].tunnel
, "Received %s, radius %d response for session %u (%s, id %d)\n",
561 radius_state(radius
[r
].state
), r
, s
, radius_code(r_code
), r_id
);
563 if (!s
&& radius
[r
].state
!= RADIUSSTOP
)
565 LOG(1, s
, session
[s
].tunnel
, " Unexpected RADIUS response\n");
568 if (radius
[r
].state
!= RADIUSAUTH
&& radius
[r
].state
!= RADIUSJUSTAUTH
&& radius
[r
].state
!= RADIUSSTART
569 && radius
[r
].state
!= RADIUSSTOP
&& radius
[r
].state
!= RADIUSINTERIM
)
571 LOG(1, s
, session
[s
].tunnel
, " Unexpected RADIUS response\n");
574 t
= session
[s
].tunnel
;
575 calc_auth(buf
, len
, radius
[r
].auth
, hash
);
577 if (memcmp(hash
, buf
+ 4, 16))
579 LOG(0, s
, session
[s
].tunnel
, " Incorrect auth on RADIUS response!! (wrong secret in radius config?)\n");
580 return; // Do nothing. On timeout, it will try the next radius server.
583 if (((radius
[r
].state
== RADIUSAUTH
||radius
[r
].state
== RADIUSJUSTAUTH
) && r_code
!= AccessAccept
&& r_code
!= AccessReject
) ||
584 ((radius
[r
].state
== RADIUSSTART
|| radius
[r
].state
== RADIUSSTOP
|| radius
[r
].state
== RADIUSINTERIM
) && r_code
!= AccountingResponse
))
586 LOG(1, s
, session
[s
].tunnel
, " Unexpected RADIUS response %s\n", radius_code(r_code
));
587 return; // We got something we didn't expect. Let the timeouts take
588 // care off finishing the radius session if that's really correct.
591 if (radius
[r
].state
== RADIUSAUTH
|| radius
[r
].state
== RADIUSJUSTAUTH
)
593 // run post-auth plugin
594 struct param_post_auth packet
= {
598 (r_code
== AccessAccept
),
599 radius
[r
].chap
? PPPCHAP
: PPPPAP
602 run_plugins(PLUGIN_POST_AUTH
, &packet
);
603 r_code
= packet
.auth_allowed
? AccessAccept
: AccessReject
;
606 // process auth response
610 uint8_t *p
= makeppp(b
, sizeof(b
), 0, 0, s
, t
, PPPCHAP
, 0, 0, 0);
611 if (!p
) return; // Abort!
613 *p
= (r_code
== AccessAccept
) ? 3 : 4; // ack/nak
615 *(uint16_t *) (p
+ 2) = ntohs(4); // no message
616 tunnelsend(b
, (p
- b
) + 4, t
); // send it
618 LOG(3, s
, session
[s
].tunnel
, " CHAP User %s authentication %s.\n", session
[s
].user
,
619 (r_code
== AccessAccept
) ? "allowed" : "denied");
624 uint8_t *p
= makeppp(b
, sizeof(b
), 0, 0, s
, t
, PPPPAP
, 0, 0, 0);
625 if (!p
) return; // Abort!
630 *(uint16_t *) (p
+ 2) = ntohs(5);
631 p
[4] = 0; // no message
632 tunnelsend(b
, (p
- b
) + 5, t
); // send it
634 LOG(3, s
, session
[s
].tunnel
, " PAP User %s authentication %s.\n", session
[s
].user
,
635 (r_code
== AccessAccept
) ? "allowed" : "denied");
639 if (r_code
== AccessAccept
)
642 // Extract IP, routes, etc
643 uint8_t *p
= buf
+ 20;
644 uint8_t *e
= buf
+ len
;
647 uint8_t strtemp
[256];
648 lac_reset_rad_tag_tunnel_ctxt();
650 for (; p
+ 2 <= e
&& p
[1] && p
+ p
[1] <= e
; p
+= p
[1])
652 if (*p
== 26 && p
[1] >= 7)
654 // Vendor-Specific Attribute
655 uint32_t vendor
= ntohl(*(int *)(p
+ 2));
656 uint8_t attrib
= *(p
+ 6);
657 int attrib_length
= *(p
+ 7) - 2;
659 LOG(4, s
, session
[s
].tunnel
, " Radius reply contains Vendor-Specific. Vendor=%u Attrib=%u Length=%d\n", vendor
, attrib
, attrib_length
);
660 if (vendor
== 9 && attrib
== 1) // Cisco-AVPair
662 if (attrib_length
< 0) continue;
663 LOG(3, s
, session
[s
].tunnel
, " Cisco-AVPair value: %.*s\n",
664 attrib_length
, p
+ 8);
666 handle_avpair(s
, p
+ 8, attrib_length
);
669 else if (vendor
== 529 && attrib
>= 135 && attrib
<= 136) // Ascend
671 // handle old-format ascend DNS attributes below
674 else if (vendor
== 64520) // Sames
676 //Sames vendor-specific 64520
677 uint8_t *pvs
= p
+ 6; // pvs set to begin to attribute
678 LOG(3, s
, session
[s
].tunnel
, " Sames vendor-specific: %d, Attrib: %d, lenght: %d\n", vendor
, attrib
, attrib_length
);
679 grp_processvendorspecific(s
, pvs
);
684 LOG(3, s
, session
[s
].tunnel
, " Unknown vendor-specific: %d, Attrib: %d\n", vendor
, attrib
);
692 if (p
[1] < 6) continue;
693 session
[s
].ip
= ntohl(*(uint32_t *) (p
+ 2));
694 session
[s
].ip_pool_index
= -1;
695 LOG(3, s
, session
[s
].tunnel
, " Radius reply contains IP address %s\n",
696 fmtaddr(htonl(session
[s
].ip
), 0));
698 if (session
[s
].ip
== 0xFFFFFFFE)
699 session
[s
].ip
= 0; // assign from pool
704 if (p
[1] < 6) continue;
705 session
[s
].dns1
= ntohl(*(uint32_t *) (p
+ 2));
706 LOG(3, s
, session
[s
].tunnel
, " Radius reply contains primary DNS address %s\n",
707 fmtaddr(htonl(session
[s
].dns1
), 0));
712 if (p
[1] < 6) continue;
713 session
[s
].dns2
= ntohl(*(uint32_t *) (p
+ 2));
714 LOG(3, s
, session
[s
].tunnel
, " Radius reply contains secondary DNS address %s\n",
715 fmtaddr(htonl(session
[s
].dns2
), 0));
724 uint8_t *e
= p
+ p
[1];
725 while (n
< e
&& (isdigit(*n
) || *n
== '.'))
733 u
= u
* 10 + *n
- '0';
740 while (n
< e
&& isdigit(*n
))
741 bits
= bits
* 10 + *n
++ - '0';
743 else if ((ip
>> 24) < 128)
745 else if ((ip
>> 24) < 192)
750 if (routes
== MAXROUTE
)
752 LOG(1, s
, session
[s
].tunnel
, " Too many routes\n");
756 LOG(3, s
, session
[s
].tunnel
, " Radius reply contains route for %s/%d\n",
757 fmtaddr(htonl(ip
), 0), bits
);
759 session
[s
].route
[routes
].ip
= ip
;
760 session
[s
].route
[routes
].prefixlen
= bits
;
767 char *filter
= (char *) p
+ 2;
773 LOG(3, s
, session
[s
].tunnel
, " Radius reply contains Filter-Id \"%.*s\"\n", l
, filter
);
774 if ((suffix
= memchr(filter
, '.', l
)))
776 int b
= suffix
- filter
;
777 if (l
- b
== 3 && !memcmp("in", suffix
+1, 2))
778 fp
= &session
[s
].filter_in
;
779 else if (l
- b
== 4 && !memcmp("out", suffix
+1, 3))
780 fp
= &session
[s
].filter_out
;
787 LOG(3, s
, session
[s
].tunnel
, " Invalid filter\n");
791 if ((f
= find_filter(filter
, l
)) < 0 || !*ip_filters
[f
].name
)
793 LOG(3, s
, session
[s
].tunnel
, " Unknown filter\n");
798 ip_filters
[f
].used
++;
804 if (p
[1] < 6) continue;
805 session
[s
].session_timeout
= ntohl(*(uint32_t *)(p
+ 2));
806 LOG(3, s
, session
[s
].tunnel
, " Radius reply contains Session-Timeout = %u\n", session
[s
].session_timeout
);
807 if(!session
[s
].session_timeout
&& config
->kill_timedout_sessions
)
808 sessionshutdown(s
, "Session timeout is zero", CDN_ADMIN_DISC
, 0);
813 if (p
[1] < 6) continue;
814 session
[s
].idle_timeout
= ntohl(*(uint32_t *)(p
+ 2));
815 LOG(3, s
, session
[s
].tunnel
, " Radius reply contains Idle-Timeout = %u\n", session
[s
].idle_timeout
);
823 uint8_t *e
= p
+ p
[1];
824 uint8_t *m
= memchr(n
, '/', e
- p
);
827 inet_pton(AF_INET6
, (char *) n
, &r6
);
830 while (m
< e
&& isdigit(*m
)) {
831 prefixlen
= prefixlen
* 10 + *m
++ - '0';
836 LOG(3, s
, session
[s
].tunnel
,
837 " Radius reply contains route for %s/%d\n",
839 session
[s
].ipv6route
= r6
;
840 session
[s
].ipv6prefixlen
= prefixlen
;
846 if (p
[1] < 3) continue;
847 session
[s
].classlen
= p
[1] - 2;
848 if (session
[s
].classlen
> MAXCLASS
)
849 session
[s
].classlen
= MAXCLASS
;
850 memcpy(session
[s
].class, p
+ 2, session
[s
].classlen
);
856 if (p
[1] != 6) continue;
858 LOG(3, s
, session
[s
].tunnel
, " Radius reply Tunnel-Type:%d %d\n",
859 tag
, ntohl(*(uint32_t *)(p
+ 2)) & 0xFFFFFF);
861 lac_set_rad_tag_tunnel_type(tag
, ntohl(*(uint32_t *)(p
+ 2)) & 0xFFFFFF);
862 /* Request open tunnel to remote LNS*/
867 // Tunnel-Medium-Type
868 if (p
[1] < 6) continue;
870 LOG(3, s
, session
[s
].tunnel
, " Radius reply Tunnel-Medium-Type:%d %d\n",
871 tag
, ntohl(*(uint32_t *)(p
+ 2)) & 0xFFFFFF);
873 lac_set_rad_tag_tunnel_medium_type(tag
, ntohl(*(uint32_t *)(p
+ 2)) & 0xFFFFFF);
877 // Tunnel-Server-Endpoint
878 if (p
[1] < 3) continue;
880 //If the Tag field is greater than 0x1F,
881 // it SHOULD be interpreted as the first byte of the following String field.
882 memset(strtemp
, 0, 256);
886 memcpy(strtemp
, (p
+ 2), p
[1]-2);
889 memcpy(strtemp
, (p
+ 3), p
[1]-3);
891 LOG(3, s
, session
[s
].tunnel
, " Radius reply Tunnel-Server-Endpoint:%d %s\n", tag
, strtemp
);
893 lac_set_rad_tag_tunnel_serv_endpt(tag
, (char *) strtemp
);
900 if (p
[1] < 5) continue;
903 memset(strtemp
, 0, 256);
905 memcpy(strtemp
, (p
+ 3), lentemp
);
906 if (!rad_tunnel_pwdecode(strtemp
, &lentemp
, config
->radiussecret
, radius
[r
].auth
))
908 LOG_HEX(3, "Error Decode Tunnel-Password, Dump Radius reponse:", p
, p
[1]);
912 LOG(3, s
, session
[s
].tunnel
, " Radius reply Tunnel-Password:%d %s\n", tag
, strtemp
);
913 if (strlen((char *) strtemp
) > 63)
915 LOG(1, s
, session
[s
].tunnel
, "tunnel password is too long (>63)\n");
919 lac_set_rad_tag_tunnel_password(tag
, (char *) strtemp
);
923 // Tunnel-Assignment-Id
924 if (p
[1] < 3) continue;
926 //If the Tag field is greater than 0x1F,
927 // it SHOULD be interpreted as the first byte of the following String field.
928 memset(strtemp
, 0, 256);
932 memcpy(strtemp
, (p
+ 2), p
[1]-2);
935 memcpy(strtemp
, (p
+ 3), p
[1]-3);
937 LOG(3, s
, session
[s
].tunnel
, " Radius reply Tunnel-Assignment-Id:%d %s\n", tag
, strtemp
);
939 lac_set_rad_tag_tunnel_assignment_id(tag
, (char *) strtemp
);
944 else if (r_code
== AccessReject
)
946 LOG(2, s
, session
[s
].tunnel
, " Authentication rejected for %s\n", session
[s
].user
);
947 sessionkill(s
, "Authentication rejected");
952 if ((!config
->disable_lac_func
) && OpentunnelReq
)
954 char assignment_id
[256];
955 // Save radius tag context to conf
956 lac_save_rad_tag_tunnels(s
);
958 memset(assignment_id
, 0, 256);
959 if (!lac_rad_select_assignment_id(s
, assignment_id
))
960 break; // Error no assignment_id
962 LOG(3, s
, session
[s
].tunnel
, "Select Tunnel Remote LNS for assignment_id == %s\n", assignment_id
);
964 if (lac_rad_forwardtoremotelns(s
, assignment_id
, session
[s
].user
))
967 // Sanity check, no local IP to session forwarded
969 for (ro
= 0; r
< MAXROUTE
&& session
[s
].route
[ro
].ip
; r
++)
971 session
[s
].route
[ro
].ip
= 0;
977 // process auth response
981 uint8_t *p
= makeppp(b
, sizeof(b
), 0, 0, s
, t
, PPPCHAP
, 0, 0, 0);
982 if (!p
) return; // Abort!
984 *p
= (r_code
== AccessAccept
) ? 3 : 4; // ack/nak
986 *(uint16_t *) (p
+ 2) = ntohs(4); // no message
987 tunnelsend(b
, (p
- b
) + 4, t
); // send it
989 LOG(3, s
, session
[s
].tunnel
, " CHAP User %s authentication %s.\n", session
[s
].user
,
990 (r_code
== AccessAccept
) ? "allowed" : "denied");
995 uint8_t *p
= makeppp(b
, sizeof(b
), 0, 0, s
, t
, PPPPAP
, 0, 0, 0);
996 if (!p
) return; // Abort!
1000 p
[1] = radius
[r
].id
;
1001 *(uint16_t *) (p
+ 2) = ntohs(5);
1002 p
[4] = 0; // no message
1003 tunnelsend(b
, (p
- b
) + 5, t
); // send it
1005 LOG(3, s
, session
[s
].tunnel
, " PAP User %s authentication %s.\n", session
[s
].user
,
1006 (r_code
== AccessAccept
) ? "allowed" : "denied");
1010 if (!session
[s
].dns1
&& config
->default_dns1
)
1012 session
[s
].dns1
= ntohl(config
->default_dns1
);
1013 LOG(3, s
, t
, " Sending dns1 = %s\n", fmtaddr(config
->default_dns1
, 0));
1015 if (!session
[s
].dns2
&& config
->default_dns2
)
1017 session
[s
].dns2
= ntohl(config
->default_dns2
);
1018 LOG(3, s
, t
, " Sending dns2 = %s\n", fmtaddr(config
->default_dns2
, 0));
1021 // Valid Session, set it up
1022 session
[s
].unique_id
= 0;
1027 // An ack for a stop or start record.
1028 LOG(3, s
, t
, " RADIUS accounting ack recv in state %s\n", radius_state(radius
[r
].state
));
1033 // finished with RADIUS
1037 // Send a retry for RADIUS/CHAP message
1038 void radiusretry(uint16_t r
)
1040 sessionidt s
= radius
[r
].session
;
1045 if (s
) t
= session
[s
].tunnel
;
1047 switch (radius
[r
].state
)
1049 case RADIUSCHAP
: // sending CHAP down PPP
1052 case RADIUSAUTH
: // sending auth to RADIUS server
1053 case RADIUSJUSTAUTH
: // sending auth to RADIUS server
1054 case RADIUSSTART
: // sending start accounting to RADIUS server
1055 case RADIUSSTOP
: // sending stop accounting to RADIUS server
1056 case RADIUSINTERIM
: // sending interim accounting to RADIUS server
1057 radiussend(r
, radius
[r
].state
);
1060 case RADIUSNULL
: // Not in use
1061 case RADIUSWAIT
: // waiting timeout before available, in case delayed reply from RADIUS server
1062 // free up RADIUS task
1064 LOG(3, s
, session
[s
].tunnel
, "Freeing up radius session %d\n", r
);
1071 void processdae(uint8_t *buf
, int len
, struct sockaddr_in
*addr
, int alen
, struct in_addr
*local
)
1073 int i
, r_code
, r_id
, length
, attribute_length
;
1074 uint8_t *packet
, attribute
;
1076 char username
[MAXUSER
] = "";
1085 uint8_t *avpair
[64];
1086 int avpair_len
[sizeof(avpair
)/sizeof(*avpair
)];
1091 LOG(3, 0, 0, "DAE request from %s\n", fmtaddr(addr
->sin_addr
.s_addr
, 0));
1092 LOG_HEX(5, "DAE Request", buf
, len
);
1094 if (len
< 20 || len
< ntohs(*(uint16_t *) (buf
+ 2)))
1096 LOG(1, 0, 0, "Duff DAE request length %d\n", len
);
1100 r_code
= buf
[0]; // request type
1101 r_id
= buf
[1]; // radius indentifier.
1103 if (r_code
!= DisconnectRequest
&& r_code
!= CoARequest
)
1105 LOG(1, 0, 0, "Unrecognised DAE request %s\n", radius_code(r_code
));
1109 if (!config
->cluster_iam_master
)
1111 master_forward_dae_packet(buf
, len
, addr
->sin_addr
.s_addr
, addr
->sin_port
);
1115 len
= ntohs(*(uint16_t *) (buf
+ 2));
1117 LOG(3, 0, 0, "Received DAE %s, id %d\n", radius_code(r_code
), r_id
);
1119 // check authenticator
1120 calc_auth(buf
, len
, zero
, hash
);
1121 if (memcmp(hash
, buf
+ 4, 16) != 0)
1123 LOG(1, 0, 0, "Incorrect vector in DAE request (wrong secret in radius config?)\n");
1127 // unpack attributes
1133 attribute
= *packet
++;
1134 attribute_length
= *packet
++;
1135 if (attribute_length
< 2)
1138 length
-= attribute_length
;
1139 attribute_length
-= 2;
1142 case 1: /* username */
1143 len
= attribute_length
< MAXUSER
? attribute_length
: MAXUSER
- 1;
1144 memcpy(username
, packet
, len
);
1146 LOG(4, 0, 0, " Received DAE User-Name: %s\n", username
);
1149 case 4: /* nas ip address */
1150 nas
= *(uint32_t *) packet
; // net order
1151 if (nas
!= config
->bind_address
)
1152 error
= 403; // NAS identification mismatch
1154 LOG(4, 0, 0, " Received DAE NAS-IP-Address: %s\n", fmtaddr(nas
, 0));
1157 case 5: /* nas port */
1158 port
= ntohl(*(uint32_t *) packet
);
1159 if (port
< 1 || port
> MAXSESSION
)
1162 LOG(4, 0, 0, " Received DAE NAS-Port: %u\n", port
);
1165 case 6: /* service type */
1167 uint32_t service_type
= ntohl(*(uint32_t *) packet
);
1168 auth_only
= service_type
== 8; // Authenticate only
1170 LOG(4, 0, 0, " Received DAE Service-Type: %u\n", service_type
);
1174 case 8: /* ip address */
1175 ip
= *(uint32_t *) packet
; // net order
1176 LOG(4, 0, 0, " Received DAE Framed-IP-Address: %s\n", fmtaddr(ip
, 0));
1179 case 11: /* filter id */
1180 LOG(4, 0, 0, " Received DAE Filter-Id: %.*s\n", attribute_length
, packet
);
1181 if (!(p
= memchr(packet
, '.', attribute_length
)))
1183 error
= 404; // invalid request
1188 i
= find_filter((char *) packet
, len
);
1189 if (i
< 0 || !*ip_filters
[i
].name
)
1195 if (!memcmp(p
, ".in", attribute_length
- len
))
1197 else if (!memcmp(p
, ".out", attribute_length
- len
))
1204 case 26: /* vendor specific */
1205 if (attribute_length
>= 6
1206 && ntohl(*(uint32_t *) packet
) == 9 // Cisco
1207 && *(packet
+ 4) == 1 // Cisco-AVPair
1208 && *(packet
+ 5) >= 2) // length
1210 int len
= *(packet
+ 5) - 2;
1211 uint8_t *a
= packet
+ 6;
1213 LOG(4, 0, 0, " Received DAE Cisco-AVPair: %.*s\n", len
, a
);
1214 if (avp
< sizeof(avpair
)/sizeof(*avpair
) - 1)
1217 avpair_len
[avp
++] = len
;
1223 packet
+= attribute_length
;
1226 if (!error
&& auth_only
)
1228 if (fin
!= -1 || fout
!= -1 || avp
)
1229 error
= 401; // unsupported attribute
1231 error
= 405; // unsupported service
1234 if (!error
&& !(port
|| ip
|| *username
))
1235 error
= 402; // missing attribute
1237 // exact match for SID if given
1241 if (!session
[s
].opened
)
1242 error
= 503; // not found
1247 // find/check session by IP
1248 i
= sessionbyip(ip
);
1249 if (!i
|| (s
&& s
!= i
)) // not found or mismatching port
1255 if (!error
&& *username
)
1259 if (strcmp(session
[s
].user
, username
))
1262 else if (!(s
= sessionbyuser(username
)))
1266 t
= session
[s
].tunnel
;
1270 case DisconnectRequest
: // Packet of Disconnect/Death
1273 r_code
= DisconnectNAK
;
1277 LOG(3, s
, t
, " DAE Disconnect %d (%s)\n", s
, session
[s
].user
);
1278 r_code
= DisconnectACK
;
1280 sessionshutdown(s
, "Requested by PoD", CDN_ADMIN_DISC
, TERM_ADMIN_RESET
); // disconnect session
1283 case CoARequest
: // Change of Authorization
1290 LOG(3, s
, t
, " DAE Change %d (%s)\n", s
, session
[s
].user
);
1295 struct param_radius_reset p
= { &tunnel
[session
[s
].tunnel
], &session
[s
] };
1296 run_plugins(PLUGIN_RADIUS_RESET
, &p
);
1303 LOG(3, s
, t
, " Filter in %d (%s)\n", fin
, ip_filters
[fin
- 1].name
);
1308 LOG(3, s
, t
, " Filter out %d (%s)\n", fout
, ip_filters
[fout
- 1].name
);
1310 filter_session(s
, fin
, fout
);
1312 // process cisco av-pair(s)
1313 for (i
= 0; i
< avp
; i
++)
1315 LOG(3, s
, t
, " Cisco-AVPair: %.*s\n", avpair_len
[i
], avpair
[i
]);
1316 handle_avpair(s
, avpair
[i
], avpair_len
[i
]);
1319 cluster_send_session(s
);
1337 *(uint32_t *) packet
= htonl(error
);
1341 *((uint16_t *)(buf
+ 2)) = htons(len
);
1344 calc_auth(buf
, len
, hash
, buf
+ 4);
1346 LOG(3, 0, 0, "Sending DAE %s, id=%d\n", radius_code(r_code
), r_id
);
1348 // send DAE response
1349 if (sendtofrom(daefd
, buf
, len
, MSG_DONTWAIT
| MSG_NOSIGNAL
, (struct sockaddr
*) addr
, alen
, local
) < 0)
1350 LOG(0, 0, 0, "Error sending DAE response packet: %s\n", strerror(errno
));
1354 // Decrypte the encrypted Tunnel Password.
1355 // Defined in RFC-2868.
1356 // the pl2tpsecret buffer must set to 256 characters.
1357 // return 0 on decoding error else length of decoded l2tpsecret
1358 int rad_tunnel_pwdecode(uint8_t *pl2tpsecret
, size_t *pl2tpsecretlen
,
1359 const char *radiussecret
, const uint8_t * auth
)
1361 MD5_CTX ctx
, oldctx
;
1364 unsigned i
, n
, len
, decodedlen
;
1366 /* 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 6 7
1367 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1368 | Salt | Salt | String ..........
1369 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+*/
1371 len
= *pl2tpsecretlen
;
1375 LOG(1, 0, 0, "tunnel password is too short, We need at least a salt\n");
1382 *pl2tpsecretlen
= 0;
1383 LOG(1, 0, 0, "tunnel passwd is empty !!!\n");
1387 len
-= 2; /* discount the salt */
1389 //Use the secret to setup the decryption
1390 secretlen
= strlen(radiussecret
);
1393 MD5_Update(&ctx
, (void *) radiussecret
, secretlen
);
1394 oldctx
= ctx
; /* save intermediate work */
1396 // Set up the initial key:
1397 // b(1) = MD5(radiussecret + auth + salt)
1398 MD5_Update(&ctx
, (void *) auth
, 16);
1399 MD5_Update(&ctx
, pl2tpsecret
, 2);
1402 for (n
= 0; n
< len
; n
+= 16)
1408 MD5_Final(hash
, &ctx
);
1412 // the first octet, it's the 'data_len'
1414 decodedlen
= pl2tpsecret
[2] ^ hash
[0];
1415 if (decodedlen
>= len
)
1417 LOG(1, 0, 0, "tunnel password is too long !!!\n");
1421 MD5_Update(&ctx
, pl2tpsecret
+ 2, 16);
1425 MD5_Final(hash
, &ctx
);
1428 MD5_Update(&ctx
, pl2tpsecret
+ n
+ 2, 16);
1431 for (i
= base
; i
< 16; i
++)
1433 pl2tpsecret
[n
+ i
- 1] = pl2tpsecret
[n
+ i
+ 2] ^ hash
[i
];
1437 if (decodedlen
> 239) decodedlen
= 239;
1439 *pl2tpsecretlen
= decodedlen
;
1440 pl2tpsecret
[decodedlen
] = 0;