63aeec1d90122224a4ef19e0a8f3f802342973ea
3 char const *cvs_id_radius
= "$Id: radius.c,v 1.17 2004-11-28 02:53:11 bodea Exp $";
8 #include <sys/socket.h>
12 #include <arpa/inet.h>
14 #include <netinet/in.h>
16 #include "constants.h"
21 extern radiust
*radius
;
22 extern sessiont
*session
;
23 extern tunnelt
*tunnel
;
25 extern configt
*config
;
27 extern ip_filtert
*ip_filters
;
29 static const char *radius_state(int state
)
31 static char *tmp
= NULL
;
33 for (i
= 0; radius_states
[i
]; i
++)
34 if (i
== state
) return radius_states
[i
];
36 if (tmp
== NULL
) tmp
= (char *)calloc(64, 1);
37 sprintf(tmp
, "%d", state
);
41 // Set up socket for radius requests
45 LOG(3, 0, 0, 0, "Creating %d sockets for RADIUS queries\n", config
->num_radfds
);
46 radfds
= calloc(sizeof(int), config
->num_radfds
);
47 for (i
= 0; i
< config
->num_radfds
; i
++)
50 radfds
[i
] = socket(AF_INET
, SOCK_DGRAM
, IPPROTO_UDP
);
51 flags
= fcntl(radfds
[i
], F_GETFL
, 0);
52 fcntl(radfds
[i
], F_SETFL
, flags
| O_NONBLOCK
);
56 void radiusclear(u16 r
, sessionidt s
)
58 if (s
) session
[s
].radius
= 0;
59 memset(&radius
[r
], 0, sizeof(radius
[r
])); // radius[r].state = RADIUSNULL;
63 static u16
get_free_radius()
66 static u32 next_radius_id
= 0;
68 for (count
= MAXRADIUS
; count
> 0 ; --count
)
70 ++next_radius_id
; // Find the next ID to check.
71 if (next_radius_id
>= MAXRADIUS
)
74 if (radius
[next_radius_id
].state
== RADIUSNULL
)
76 return next_radius_id
;
80 LOG(0, 0, 0, 0, "Can't find a free radius session! This is very bad!\n");
84 u16
radiusnew(sessionidt s
)
86 u16 r
= session
[s
].radius
;
91 LOG(3, 0, s
, session
[s
].tunnel
, "Re-used radius %d\n", r
);
95 if (!(r
= get_free_radius()))
97 LOG(1, 0, s
, session
[s
].tunnel
, "No free RADIUS sessions\n");
98 STAT(radius_overflow
);
102 memset(&radius
[r
], 0, sizeof(radius
[r
]));
103 session
[s
].radius
= r
;
104 radius
[r
].session
= s
;
105 radius
[r
].state
= RADIUSWAIT
;
106 radius
[r
].retry
= TIME
+ 1200; // Wait at least 120 seconds to re-claim this.
108 LOG(3,0,s
, session
[s
].tunnel
, "Allocated radius %d\n", r
);
112 // Send a RADIUS request
113 void radiussend(u16 r
, u8 state
)
115 struct sockaddr_in addr
;
116 u8 b
[4096]; // RADIUS packet
122 CSTAT(call_radiussend
);
124 s
= radius
[r
].session
;
125 if (!config
->numradiusservers
)
127 LOG(0, 0, s
, session
[s
].tunnel
, "No RADIUS servers\n");
130 if (!*config
->radiussecret
)
132 LOG(0, 0, s
, session
[s
].tunnel
, "No RADIUS secret\n");
136 if (state
!= RADIUSAUTH
&& !config
->radius_accounting
)
138 // Radius accounting is turned off
143 if (radius
[r
].state
!= state
)
145 radius
[r
].state
= state
;
146 radius
[r
].retry
= backoff(radius
[r
].try++);
147 LOG(4, 0, s
, session
[s
].tunnel
, "Send RADIUS id %d sock %d state %s try %d\n",
148 r
>> RADIUS_SHIFT
, r
& RADIUS_MASK
,
149 radius_state(radius
[r
].state
), radius
[r
].try);
150 if (radius
[r
].try > config
->numradiusservers
* 2)
154 if (state
== RADIUSAUTH
)
155 sessionshutdown(s
, "RADIUS timeout");
158 LOG(1, 0, s
, session
[s
].tunnel
, "RADIUS timeout, but in state %s so don't timeout session\n",
159 radius_states
[state
]);
162 STAT(radius_timeout
);
166 STAT(radius_retries
);
167 radius
[r
].state
= RADIUSWAIT
;
168 radius
[r
].retry
= 100;
172 // contruct RADIUS access request
176 b
[0] = 1; // access request
180 b
[0] = 4; // accounting request
183 LOG(0, 0, 0, 0, "Unknown radius state %d\n", state
);
185 b
[1] = r
>> RADIUS_SHIFT
; // identifier
186 memcpy(b
+ 4, radius
[r
].auth
, 16);
191 p
[1] = strlen(session
[s
].user
) + 2;
192 strcpy(p
+ 2, session
[s
].user
);
195 if (state
== RADIUSAUTH
)
199 *p
= 3; // CHAP password
201 p
[2] = radius
[r
].id
; // ID
202 memcpy(p
+ 3, radius
[r
].pass
, 16); // response from CHAP request
204 *p
= 60; // CHAP Challenge
206 memcpy(p
+ 2, radius
[r
].auth
, 16);
211 strcpy(pass
, radius
[r
].pass
);
214 pass
[pl
++] = 0; // pad
223 MD5Update(&ctx
, config
->radiussecret
, strlen(config
->radiussecret
));
225 MD5Update(&ctx
, pass
+ p
- 16, 16);
227 MD5Update(&ctx
, radius
[r
].auth
, 16);
228 MD5Final(hash
, &ctx
);
231 pass
[p
] ^= hash
[p
& 15];
240 memcpy(p
+ 2, pass
, pl
);
244 else if (state
== RADIUSSTART
|| state
== RADIUSSTOP
)
246 *p
= 40; // accounting type
248 *(u32
*) (p
+ 2) = htonl((state
== RADIUSSTART
) ? 1 : 2);
252 *p
= 44; // session ID
254 sprintf(p
+ 2, "%08X%08X", session
[s
].id
, session
[s
].opened
);
256 if (state
== RADIUSSTOP
)
258 *p
= 42; // input octets
260 *(u32
*) (p
+ 2) = htonl(session
[s
].cin
);
262 *p
= 43; // output octets
264 *(u32
*) (p
+ 2) = htonl(session
[s
].cout
);
266 *p
= 46; // session time
268 *(u32
*) (p
+ 2) = htonl(time(NULL
) - session
[s
].opened
);
270 *p
= 47; // input packets
272 *(u32
*) (p
+ 2) = htonl(session
[s
].pin
);
274 *p
= 48; // output spackets
276 *(u32
*) (p
+ 2) = htonl(session
[s
].pout
);
283 *(u32
*) (p
+ 2) = htonl(time(NULL
) - session
[s
].opened
);
292 *(u32
*) (p
+ 2) = htonl(s
);
295 if (s
&& session
[s
].ip
)
297 *p
= 8; // Framed-IP-Address
299 *(u32
*) (p
+ 2) = htonl(session
[s
].ip
);
302 if (*session
[s
].called
)
305 p
[1] = strlen(session
[s
].called
) + 2;
306 strcpy(p
+ 2, session
[s
].called
);
309 if (*radius
[r
].calling
)
312 p
[1] = strlen(radius
[r
].calling
) + 2;
313 strcpy(p
+ 2, radius
[r
].calling
);
316 else if (*session
[s
].calling
)
319 p
[1] = strlen(session
[s
].calling
) + 2;
320 strcpy(p
+ 2, session
[s
].calling
);
326 *(u32
*)(p
+ 2) = config
->bind_address
;
330 *(u16
*) (b
+ 2) = htons(p
- b
);
331 if (state
!= RADIUSAUTH
)
333 // Build auth for accounting packet
338 MD5Update(&ctx
, b
, 4);
339 MD5Update(&ctx
, z
, 16);
340 MD5Update(&ctx
, b
+ 20, (p
- b
) - 20);
341 MD5Update(&ctx
, config
->radiussecret
, strlen(config
->radiussecret
));
342 MD5Final(hash
, &ctx
);
343 memcpy(b
+ 4, hash
, 16);
344 memcpy(radius
[r
].auth
, hash
, 16);
346 memset(&addr
, 0, sizeof(addr
));
347 addr
.sin_family
= AF_INET
;
348 *(u32
*) & addr
.sin_addr
= config
->radiusserver
[(radius
[r
].try - 1) % config
->numradiusservers
];
351 u16 port
= config
->radiusport
[(radius
[r
].try - 1) % config
->numradiusservers
];
352 // no need to define the accounting port for itself:
353 // the accounting port is as far as I know always one more
354 // than the auth port JK 20040713
355 addr
.sin_port
= htons((state
== RADIUSAUTH
) ? port
: port
+1);
358 LOG_HEX(5, "RADIUS Send", b
, (p
- b
));
359 sendto(radfds
[r
& RADIUS_MASK
], b
, p
- b
, 0, (void *) &addr
, sizeof(addr
));
362 // process RADIUS response
363 void processrad(u8
*buf
, int len
, char socket_index
)
373 int r_code
, r_id
; // Radius code.
375 r_code
= buf
[0]; // First byte in radius packet.
376 r_id
= buf
[1]; // radius reply indentifier.
379 CSTAT(call_processrad
);
381 LOG_HEX(5, "RADIUS Response", buf
, len
);
382 if (len
< 20 || len
< ntohs(*(u16
*) (buf
+ 2)))
384 LOG(1, 0, 0, 0, "Duff RADIUS response length %d\n", len
);
387 len
= ntohs(*(u16
*) (buf
+ 2));
388 r
= socket_index
| (r_id
<< RADIUS_SHIFT
);
389 s
= radius
[r
].session
;
390 LOG(3, 0, s
, session
[s
].tunnel
, "Received %s, radius %d response for session %u (code %d, id %d)\n",
391 radius_states
[radius
[r
].state
], r
, s
, r_code
, r_id
);
392 if (!s
&& radius
[r
].state
!= RADIUSSTOP
)
394 LOG(1, 0, s
, session
[s
].tunnel
, " Unexpected RADIUS response\n");
397 if (radius
[r
].state
!= RADIUSAUTH
&& radius
[r
].state
!= RADIUSSTART
&& radius
[r
].state
!= RADIUSSTOP
)
399 LOG(1, 0, s
, session
[s
].tunnel
, " Unexpected RADIUS response\n");
402 t
= session
[s
].tunnel
;
404 MD5Update(&ctx
, buf
, 4);
405 MD5Update(&ctx
, radius
[r
].auth
, 16);
406 MD5Update(&ctx
, buf
+ 20, len
- 20);
407 MD5Update(&ctx
, config
->radiussecret
, strlen(config
->radiussecret
));
408 MD5Final(hash
, &ctx
);
410 if (memcmp(hash
, buf
+ 4, 16))
412 LOG(0, 0, s
, session
[s
].tunnel
, " Incorrect auth on RADIUS response!! (wrong secret in radius config?)\n");
413 return; // Do nothing. On timeout, it will try the next radius server.
415 if ((radius
[r
].state
== RADIUSAUTH
&& *buf
!= 2 && *buf
!= 3) ||
416 ((radius
[r
].state
== RADIUSSTART
|| radius
[r
].state
== RADIUSSTOP
) && *buf
!= 5))
418 LOG(1, 0, s
, session
[s
].tunnel
, " Unexpected RADIUS response %d\n", *buf
);
419 return; // We got something we didn't expect. Let the timeouts take
420 // care off finishing the radius session if that's really correct.
422 if (radius
[r
].state
== RADIUSAUTH
)
424 LOG(4, 0, s
, session
[s
].tunnel
, " Original response is \"%s\"\n", (*buf
== 2) ? "accept" : "reject");
425 // process auth response
429 u8
*p
= makeppp(b
, sizeof(b
), 0, 0, t
, s
, PPPCHAP
);
430 if (!p
) return; // Abort!
433 struct param_post_auth packet
= { &tunnel
[t
], &session
[s
], session
[s
].user
, (*buf
== 2), PPPCHAP
};
434 run_plugins(PLUGIN_POST_AUTH
, &packet
);
435 *buf
= packet
.auth_allowed
? 2 : 3;
438 LOG(3, 0, s
, session
[s
].tunnel
, " CHAP User %s authentication %s.\n", session
[s
].user
,
439 (*buf
== 2) ? "allowed" : "denied");
440 *p
= (*buf
== 2) ? 3 : 4; // ack/nak
442 *(u16
*) (p
+ 2) = ntohs(4); // no message
443 tunnelsend(b
, (p
- b
) + 4, t
); // send it
448 u8
*p
= makeppp(b
, sizeof(b
), 0, 0, t
, s
, PPPPAP
);
449 if (!p
) return; // Abort!
452 struct param_post_auth packet
= { &tunnel
[t
], &session
[s
], session
[s
].user
, (*buf
== 2), PPPPAP
};
453 run_plugins(PLUGIN_POST_AUTH
, &packet
);
454 *buf
= packet
.auth_allowed
? 2 : 3;
457 LOG(3, 0, s
, session
[s
].tunnel
, " PAP User %s authentication %s.\n", session
[s
].user
,
458 (*buf
== 2) ? "allowed" : "denied");
462 *(u16
*) (p
+ 2) = ntohs(5);
463 p
[4] = 0; // no message
464 tunnelsend(b
, (p
- b
) + 5, t
); // send it
470 // Extract IP, routes, etc
473 for (p
= buf
+ 20; p
< e
&& p
[1]; p
+= p
[1])
478 LOG(3, 0, s
, session
[s
].tunnel
, " Radius reply contains IP address %s\n", inet_toa(*(u32
*) (p
+ 2)));
479 session
[s
].ip
= ntohl(*(u32
*) (p
+ 2));
480 session
[s
].ip_pool_index
= -1;
485 LOG(3, 0, s
, session
[s
].tunnel
, " Radius reply contains primary DNS address %s\n", inet_toa(*(u32
*) (p
+ 2)));
486 session
[s
].dns1
= ntohl(*(u32
*) (p
+ 2));
491 LOG(3, 0, s
, session
[s
].tunnel
, " Radius reply contains secondary DNS address %s\n", inet_toa(*(u32
*) (p
+ 2)));
492 session
[s
].dns2
= ntohl(*(u32
*) (p
+ 2));
497 ipt ip
= 0, mask
= 0;
502 while (n
< e
&& (isdigit(*n
) || *n
== '.'))
510 u
= u
* 10 + *n
- '0';
517 while (n
< e
&& isdigit(*n
))
518 bits
= bits
* 10 + *n
++ - '0';
519 mask
= (( -1) << (32 - bits
));
521 else if ((ip
>> 24) < 128)
523 else if ((ip
>> 24) < 192)
527 if (routes
== MAXROUTE
)
529 LOG(1, 0, s
, session
[s
].tunnel
, " Too many routes\n");
534 ips
= strdup(inet_toa(htonl(ip
)));
535 masks
= strdup(inet_toa(htonl(mask
)));
536 LOG(3, 0, s
, session
[s
].tunnel
, " Radius reply contains route for %s/%s\n", ips
, masks
);
539 session
[s
].route
[routes
].ip
= ip
;
540 session
[s
].route
[routes
].mask
= mask
;
547 char *filter
= p
+ 2;
553 LOG(3, 0, s
, session
[s
].tunnel
, " Radius reply contains Filter-Id \"%.*s\"\n", l
, filter
);
554 if ((suffix
= memchr(filter
, '.', l
)))
556 int b
= suffix
- filter
;
557 if (l
- b
== 3 && !memcmp("in", suffix
+1, 2))
558 f
= &session
[s
].filter_in
;
559 else if (l
- b
== 4 && !memcmp("out", suffix
+1, 3))
560 f
= &session
[s
].filter_out
;
567 LOG(3, 0, s
, session
[s
].tunnel
, " Invalid filter\n");
571 for (*f
= 0, i
= 0; !*f
&& i
< MAXFILTER
; i
++)
572 if (strlen(ip_filters
[i
].name
) == l
&&
573 !strncmp(ip_filters
[i
].name
, filter
, l
))
577 ip_filters
[*f
- 1].used
++;
579 LOG(3, 0, s
, session
[s
].tunnel
, " Unknown filter\n");
584 // Vendor-Specific Attribute
585 int vendor
= ntohl(*(int *)(p
+ 2));
586 char attrib
= *(p
+ 6);
587 char attrib_length
= *(p
+ 7) - 2;
588 LOG(3, 0, s
, session
[s
].tunnel
, " Radius reply contains Vendor-Specific. Vendor=%d Attrib=%d Length=%d\n", vendor
, attrib
, attrib_length
);
589 if (attrib_length
== 0) continue;
591 LOG(3, 0, s
, session
[s
].tunnel
, " Unknown vendor-specific\n");
594 char *avpair
, *value
, *key
, *newp
;
595 avpair
= key
= calloc(attrib_length
+ 1, 1);
596 memcpy(avpair
, p
+ 8, attrib_length
);
597 LOG(3, 0, s
, session
[s
].tunnel
, " Cisco-Avpair value: %s\n", avpair
);
599 value
= strchr(key
, '=');
603 // Trim quotes off reply string
604 if (*value
== '\'' || *value
== '\"')
608 x
= value
+ strlen(value
) - 1;
609 if (*x
== '\'' || *x
== '\"')
614 newp
= strchr(value
, ',');
615 if (newp
) *newp
++ = 0;
617 struct param_radius_response p
= { &tunnel
[session
[s
].tunnel
], &session
[s
], key
, value
};
618 run_plugins(PLUGIN_RADIUS_RESPONSE
, &p
);
629 LOG(2, 0, s
, session
[s
].tunnel
, " Authentication denied for %s\n", session
[s
].user
);
630 //FIXME: We should tear down the session here!
634 if (!session
[s
].dns1
&& config
->default_dns1
)
636 session
[s
].dns1
= htonl(config
->default_dns1
);
637 LOG(3, 0, s
, t
, " Sending dns1 = %s\n", inet_toa(config
->default_dns1
));
639 if (!session
[s
].dns2
&& config
->default_dns2
)
641 session
[s
].dns2
= htonl(config
->default_dns2
);
642 LOG(3, 0, s
, t
, " Sending dns2 = %s\n", inet_toa(config
->default_dns2
));
645 // Valid Session, set it up
646 session
[s
].unique_id
= 0;
651 // An ack for a stop or start record.
652 LOG(3, 0, s
, t
, " RADIUS accounting ack recv in state %s\n", radius_states
[radius
[r
].state
]);
657 // finished with RADIUS
661 // Send a retry for RADIUS/CHAP message
662 void radiusretry(u16 r
)
664 sessionidt s
= radius
[r
].session
;
667 CSTAT(call_radiusretry
);
670 t
= session
[s
].tunnel
;
671 radius
[r
].retry
= backoff(radius
[r
].try + 1);
672 switch (radius
[r
].state
)
674 case RADIUSCHAP
: // sending CHAP down PPP
678 sendipcp(t
, s
); // send IPCP
680 case RADIUSAUTH
: // sending auth to RADIUS server
681 radiussend(r
, RADIUSAUTH
);
683 case RADIUSSTART
: // sending start accounting to RADIUS server
684 radiussend(r
, RADIUSSTART
);
686 case RADIUSSTOP
: // sending stop accounting to RADIUS server
687 radiussend(r
, RADIUSSTOP
);
690 case RADIUSNULL
: // Not in use
691 case RADIUSWAIT
: // waiting timeout before available, in case delayed reply from RADIUS server
692 // free up RADIUS task
694 LOG(3, 0, s
, session
[s
].tunnel
, "Freeing up radius session %d\n", r
);