61e76da062fc1ede18a80f2cc7a4ba27de115d3b
12 char const *cvs_id
= "$Id: garden.c,v 1.21 2005/03/10 03:31:25 bodea Exp $";
14 int plugin_api_version
= PLUGIN_API_VERSION
;
15 static struct pluginfuncs
*p
= 0;
17 static int iam_master
= 0; // We're all slaves! Slaves I tell you!
19 char *up_commands
[] = {
20 "iptables -t nat -N garden >/dev/null 2>&1", // Create a chain that all gardened users will go through
21 "iptables -t nat -F garden",
22 ". " PLUGINCONF
"/build-garden", // Populate with site-specific DNAT rules
23 "iptables -t nat -N garden_users >/dev/null 2>&1", // Empty chain, users added/removed by garden_session
24 "iptables -t nat -F garden_users",
25 "iptables -t nat -A PREROUTING -j garden_users", // DNAT any users on the garden_users chain
26 "sysctl -w net.ipv4.ip_conntrack_max=512000 >/dev/null", // lots of entries
30 char *down_commands
[] = {
31 "iptables -t nat -F PREROUTING",
32 "iptables -t nat -F garden_users",
33 "iptables -t nat -X garden_users",
34 "iptables -t nat -F garden",
35 "iptables -t nat -X garden",
36 "rmmod iptable_nat", // Should also remove ip_conntrack, but
37 // doing so can take hours... literally.
38 // If a master is re-started as a slave,
39 // either rmmod manually, or reboot.
47 int garden_session(sessiont
*s
, int flag
, char *newuser
);
49 int plugin_post_auth(struct param_post_auth
*data
)
51 // Ignore if user authentication was successful
52 if (data
->auth_allowed
) return PLUGIN_RET_OK
;
54 p
->log(3, p
->get_id_by_session(data
->s
), data
->s
->tunnel
, "Walled Garden allowing login\n");
55 data
->auth_allowed
= 1;
56 data
->s
->walled_garden
= 1;
60 int plugin_new_session(struct param_new_session
*data
)
63 return PLUGIN_RET_OK
; // Slaves don't do walled garden processing.
65 if (data
->s
->walled_garden
)
66 garden_session(data
->s
, F_GARDEN
, 0);
71 int plugin_kill_session(struct param_new_session
*data
)
74 return PLUGIN_RET_OK
; // Slaves don't do walled garden processing.
76 if (data
->s
->walled_garden
)
77 garden_session(data
->s
, F_CLEANUP
, 0);
82 char *plugin_control_help
[] = {
83 " garden USER|SID Put user into the walled garden",
84 " ungarden SID [USER] Release session from garden",
88 int plugin_control(struct param_control
*data
)
98 if (strcmp(data
->argv
[0], "garden") && strcmp(data
->argv
[0], "ungarden"))
99 return PLUGIN_RET_OK
; // not for us
102 return PLUGIN_RET_NOTMASTER
;
104 flag
= data
->argv
[0][0] == 'g' ? F_GARDEN
: F_UNGARDEN
;
106 if (data
->argc
< 2 || data
->argc
> 3 || (data
->argc
> 2 && flag
== F_GARDEN
))
108 data
->response
= NSCTL_RES_ERR
;
109 data
->additional
= flag
== F_GARDEN
110 ? "requires username or session id"
111 : "requires session id and optional username";
113 return PLUGIN_RET_STOP
;
116 if (!(session
= strtol(data
->argv
[1], &end
, 10)) || *end
)
119 session
= p
->get_session_by_username(data
->argv
[1]);
121 session
= 0; // can't ungarden by username
125 s
= p
->get_session_by_id(session
);
129 data
->response
= NSCTL_RES_ERR
;
130 data
->additional
= "session not found";
131 return PLUGIN_RET_STOP
;
134 if (s
->walled_garden
== flag
)
136 data
->response
= NSCTL_RES_ERR
;
137 data
->additional
= flag
? "already in walled garden" : "not in walled garden";
138 return PLUGIN_RET_STOP
;
141 garden_session(s
, flag
, data
->argc
> 2 ? data
->argv
[2] : 0);
142 p
->session_changed(session
);
144 data
->response
= NSCTL_RES_OK
;
145 data
->additional
= 0;
147 return PLUGIN_RET_STOP
;
150 int plugin_become_master(void)
153 iam_master
= 1; // We just became the master. Wow!
155 for (i
= 0; up_commands
[i
] && *up_commands
[i
]; i
++)
157 p
->log(3, 0, 0, "Running %s\n", up_commands
[i
]);
158 system(up_commands
[i
]);
161 return PLUGIN_RET_OK
;
164 // Called for each active session after becoming master
165 int plugin_new_session_master(sessiont
*s
)
167 if (s
->walled_garden
)
168 garden_session(s
, F_GARDEN
, 0);
170 return PLUGIN_RET_OK
;
173 int garden_session(sessiont
*s
, int flag
, char *newuser
)
179 if (!s
->opened
) return 0;
181 sess
= p
->get_id_by_session(s
);
182 if (flag
== F_GARDEN
)
184 p
->log(2, sess
, s
->tunnel
, "Garden user %s (%s)\n", s
->user
, p
->fmtaddr(htonl(s
->ip
), 0));
185 snprintf(cmd
, sizeof(cmd
), "iptables -t nat -A garden_users -s %s -j garden", p
->fmtaddr(htonl(s
->ip
), 0));
186 p
->log(3, sess
, s
->tunnel
, "%s\n", cmd
);
188 s
->walled_garden
= 1;
196 p
->log(2, sess
, s
->tunnel
, "Un-Garden user %s (%s)\n", s
->user
, p
->fmtaddr(htonl(s
->ip
), 0));
199 snprintf(s
->user
, MAXUSER
, "%s", newuser
);
200 p
->log(2, sess
, s
->tunnel
, " Setting username to %s\n", s
->user
);
203 // Kick off any duplicate usernames
204 // but make sure not to kick off ourself
205 if (s
->ip
&& !s
->die
&& (other
= p
->get_session_by_username(s
->user
)) && s
!= p
->get_session_by_id(other
)) {
206 p
->sessionkill(other
, "Duplicate session when user released from walled garden");
208 /* Clean up counters */
209 s
->cin
= s
->cout
= 0;
210 s
->pin
= s
->pout
= 0;
212 snprintf(cmd
, sizeof(cmd
), "iptables -t nat -D garden_users -s %s -j garden", p
->fmtaddr(htonl(s
->ip
), 0));
213 p
->log(3, sess
, s
->tunnel
, "%s\n", cmd
);
216 int status
= system(cmd
);
217 if (WEXITSTATUS(status
) != 0) break;
220 s
->walled_garden
= 0;
222 if (flag
!= F_CLEANUP
)
225 uint16_t r
= p
->radiusnew(p
->get_id_by_session(s
));
226 p
->radiussend(r
, RADIUSSTART
);
233 int plugin_init(struct pluginfuncs
*funcs
)
243 if ((tables
= fopen("/proc/net/ip_tables_names", "r")))
246 while (fgets(buf
, sizeof(buf
), tables
) && !found_nat
)
247 found_nat
= !strcmp(buf
, "nat\n");
252 /* master killed/crashed? */
256 for (i
= 0; down_commands
[i
] && *down_commands
[i
]; i
++)
258 p
->log(3, 0, 0, "Running %s\n", down_commands
[i
]);
259 system(down_commands
[i
]);
270 if (!iam_master
) // Never became master. nothing to do.
273 for (i
= 0; down_commands
[i
] && *down_commands
[i
]; i
++)
275 p
->log(3, 0, 0, "Running %s\n", down_commands
[i
]);
276 system(down_commands
[i
]);