Add of the RDNSS option to ICMPv6 Router Advertisement (RA).
[l2tpns.git] / radius.c
1 // L2TPNS Radius Stuff
2
3 #include <time.h>
4 #include <stdio.h>
5 #include <sys/types.h>
6 #include <sys/socket.h>
7 #include <malloc.h>
8 #include <string.h>
9 #include <fcntl.h>
10 #include <arpa/inet.h>
11 #include <ctype.h>
12 #include <netinet/in.h>
13 #include <errno.h>
14
15 #include "md5.h"
16 #include "constants.h"
17 #include "dhcp6.h"
18 #include "l2tpns.h"
19 #include "plugin.h"
20 #include "util.h"
21 #include "cluster.h"
22
23 #include "l2tplac.h"
24 #include "pppoe.h"
25
26 extern radiust *radius;
27 extern sessiont *session;
28 extern tunnelt *tunnel;
29 extern configt *config;
30 extern int *radfds;
31 extern ip_filtert *ip_filters;
32
33 static const hasht zero;
34
35 static void calc_auth(const void *buf, size_t len, const uint8_t *in, uint8_t *out)
36 {
37 MD5_CTX ctx;
38
39 MD5_Init(&ctx);
40 MD5_Update(&ctx, (void *)buf, 4); // code, id, length
41 MD5_Update(&ctx, (void *)in, 16); // auth
42 MD5_Update(&ctx, (void *)(buf + 20), len - 20);
43 MD5_Update(&ctx, config->radiussecret, strlen(config->radiussecret));
44 MD5_Final(out, &ctx);
45 }
46
47 // Set up socket for radius requests
48 void initrad(void)
49 {
50 int i;
51 uint16_t port = 0;
52 uint16_t min = config->radius_bind_min;
53 uint16_t max = config->radius_bind_max;
54 int inc = 1;
55 struct sockaddr_in addr;
56
57 if (min)
58 {
59 port = min;
60 if (!max)
61 max = ~0 - 1;
62 }
63 else if (max) /* no minimum specified, bind from max down */
64 {
65 port = max;
66 min = 1;
67 inc = -1;
68 }
69
70 LOG(3, 0, 0, "Creating %d sockets for RADIUS queries\n", RADIUS_FDS);
71 radfds = calloc(sizeof(int), RADIUS_FDS);
72 for (i = 0; i < RADIUS_FDS; i++)
73 {
74 int flags;
75 radfds[i] = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
76 flags = fcntl(radfds[i], F_GETFL, 0);
77 fcntl(radfds[i], F_SETFL, flags | O_NONBLOCK);
78
79 if (port)
80 {
81 int b;
82
83 memset(&addr, 0, sizeof(addr));
84 addr.sin_family = AF_INET;
85 addr.sin_addr.s_addr = INADDR_ANY;
86
87 do {
88 addr.sin_port = htons(port);
89 if ((b = bind(radfds[i], (struct sockaddr *) &addr, sizeof(addr))) < 0)
90 {
91 if ((port += inc) < min || port > max)
92 {
93 LOG(0, 0, 0, "Can't bind RADIUS socket in range %u-%u\n", min, max);
94 exit(1);
95 }
96 }
97 } while (b < 0);
98 }
99 }
100 }
101
102 void radiusclear(uint16_t r, sessionidt s)
103 {
104 if (s) sess_local[s].radius = 0;
105 memset(&radius[r], 0, sizeof(radius[r])); // radius[r].state = RADIUSNULL;
106 }
107
108 static uint16_t get_free_radius()
109 {
110 int count;
111 static uint32_t next_radius_id = 0;
112
113 for (count = MAXRADIUS; count > 0; --count)
114 {
115 ++next_radius_id; // Find the next ID to check.
116 if (next_radius_id >= MAXRADIUS)
117 next_radius_id = 1;
118
119 if (radius[next_radius_id].state == RADIUSNULL)
120 {
121 return next_radius_id;
122 }
123 }
124
125 LOG(0, 0, 0, "Can't find a free radius session! This is very bad!\n");
126 return 0;
127 }
128
129 uint16_t radiusnew(sessionidt s)
130 {
131 uint16_t r = sess_local[s].radius;
132
133 /* re-use */
134 if (r)
135 {
136 LOG(3, s, session[s].tunnel, "Re-used radius %d\n", r);
137 return r;
138 }
139
140 if (!(r = get_free_radius()))
141 {
142 LOG(1, s, session[s].tunnel, "No free RADIUS sessions\n");
143 STAT(radius_overflow);
144 return 0;
145 };
146
147 memset(&radius[r], 0, sizeof(radius[r]));
148 sess_local[s].radius = r;
149 radius[r].session = s;
150 radius[r].state = RADIUSWAIT;
151 radius[r].retry = TIME + 1200; // Wait at least 120 seconds to re-claim this.
152
153 random_data(radius[r].auth, sizeof(radius[r].auth));
154
155 LOG(3, s, session[s].tunnel, "Allocated radius %d\n", r);
156 return r;
157 }
158
159 // Send a RADIUS request
160 void radiussend(uint16_t r, uint8_t state)
161 {
162 struct sockaddr_in addr;
163 uint8_t b[4096]; // RADIUS packet
164 char pass[129];
165 int pl;
166 uint8_t *p;
167 sessionidt s;
168
169 CSTAT(radiussend);
170
171 s = radius[r].session;
172 if (!config->numradiusservers)
173 {
174 LOG(0, s, session[s].tunnel, "No RADIUS servers\n");
175 return;
176 }
177 if (!*config->radiussecret)
178 {
179 LOG(0, s, session[s].tunnel, "No RADIUS secret\n");
180 return;
181 }
182
183 if (state != RADIUSAUTH && state != RADIUSJUSTAUTH && !config->radius_accounting)
184 {
185 // Radius accounting is turned off
186 radiusclear(r, s);
187 return;
188 }
189
190 if (radius[r].state != state)
191 radius[r].try = 0;
192
193 radius[r].state = state;
194 radius[r].retry = backoff(radius[r].try++) + 20; // 3s, 4s, 6s, 10s...
195 LOG(4, s, session[s].tunnel, "Send RADIUS id %d sock %d state %s try %d\n",
196 r >> RADIUS_SHIFT, r & RADIUS_MASK,
197 radius_state(radius[r].state), radius[r].try);
198
199 if (radius[r].try > config->numradiusservers * 2)
200 {
201 if (s)
202 {
203 if (state == RADIUSAUTH || state == RADIUSJUSTAUTH)
204 sessionshutdown(s, "RADIUS timeout.", CDN_ADMIN_DISC, TERM_REAUTHENTICATION_FAILURE);
205 else
206 {
207 LOG(1, s, session[s].tunnel, "RADIUS timeout, but in state %s so don't timeout session\n",
208 radius_state(state));
209 radiusclear(r, s);
210 }
211 STAT(radius_timeout);
212 }
213 else
214 {
215 STAT(radius_retries);
216 radius[r].state = RADIUSWAIT;
217 radius[r].retry = 100;
218 }
219 return;
220 }
221 // contruct RADIUS access request
222 switch (state)
223 {
224 case RADIUSAUTH:
225 case RADIUSJUSTAUTH:
226 b[0] = AccessRequest; // access request
227 break;
228 case RADIUSSTART:
229 case RADIUSSTOP:
230 case RADIUSINTERIM:
231 b[0] = AccountingRequest; // accounting request
232 break;
233 default:
234 LOG(0, 0, 0, "Unknown radius state %d\n", state);
235 }
236 b[1] = r >> RADIUS_SHIFT; // identifier
237 memcpy(b + 4, radius[r].auth, 16);
238
239 p = b + 20;
240 if (s)
241 {
242 *p = 1; // user name
243 p[1] = strlen(session[s].user) + 2;
244 strcpy((char *) p + 2, session[s].user);
245 p += p[1];
246 }
247 if (state == RADIUSAUTH || state == RADIUSJUSTAUTH)
248 {
249 if (radius[r].chap)
250 {
251 *p = 3; // CHAP password
252 p[1] = 19; // length
253 p[2] = radius[r].id; // ID
254 memcpy(p + 3, radius[r].pass, 16); // response from CHAP request
255 p += p[1];
256 *p = 60; // CHAP Challenge
257 p[1] = 18; // length
258 memcpy(p + 2, radius[r].auth, 16);
259 p += p[1];
260 }
261 else
262 {
263 strcpy(pass, radius[r].pass);
264 pl = strlen(pass);
265 while (pl & 15)
266 pass[pl++] = 0; // pad
267 if (pl)
268 { // encrypt
269 hasht hash;
270 int p = 0;
271 while (p < pl)
272 {
273 MD5_CTX ctx;
274 MD5_Init(&ctx);
275 MD5_Update(&ctx, config->radiussecret, strlen(config->radiussecret));
276 if (p)
277 MD5_Update(&ctx, pass + p - 16, 16);
278 else
279 MD5_Update(&ctx, radius[r].auth, 16);
280 MD5_Final(hash, &ctx);
281 do
282 {
283 pass[p] ^= hash[p & 15];
284 p++;
285 }
286 while (p & 15);
287 }
288 }
289 *p = 2; // password
290 p[1] = pl + 2;
291 if (pl)
292 memcpy(p + 2, pass, pl);
293 p += p[1];
294 }
295 }
296 else // accounting
297 {
298 *p = 40; // accounting type
299 p[1] = 6;
300 *(uint32_t *) (p + 2) = htonl(state - RADIUSSTART + 1); // start=1, stop=2, interim=3
301 p += p[1];
302 if (s)
303 {
304 *p = 44; // session ID
305 p[1] = 18;
306 sprintf((char *) p + 2, "%08X%08X", session[s].unique_id, session[s].opened);
307 p += p[1];
308 if (state == RADIUSSTART)
309 { // start
310 *p = 41; // delay
311 p[1] = 6;
312 *(uint32_t *) (p + 2) = htonl(time(NULL) - session[s].opened);
313 p += p[1];
314 sess_local[s].last_interim = time_now; // Setup "first" Interim
315 }
316 else
317 { // stop, interim
318 *p = 42; // input octets
319 p[1] = 6;
320 *(uint32_t *) (p + 2) = htonl(session[s].cin);
321 p += p[1];
322
323 *p = 43; // output octets
324 p[1] = 6;
325 *(uint32_t *) (p + 2) = htonl(session[s].cout);
326 p += p[1];
327
328 *p = 46; // session time
329 p[1] = 6;
330 *(uint32_t *) (p + 2) = htonl(time(NULL) - session[s].opened);
331 p += p[1];
332
333 *p = 47; // input packets
334 p[1] = 6;
335 *(uint32_t *) (p + 2) = htonl(session[s].pin);
336 p += p[1];
337
338 *p = 48; // output packets
339 p[1] = 6;
340 *(uint32_t *) (p + 2) = htonl(session[s].pout);
341 p += p[1];
342
343 *p = 52; // input gigawords
344 p[1] = 6;
345 *(uint32_t *) (p + 2) = htonl(session[s].cin_wrap);
346 p += p[1];
347
348 *p = 53; // output gigawords
349 p[1] = 6;
350 *(uint32_t *) (p + 2) = htonl(session[s].cout_wrap);
351 p += p[1];
352
353 if (state == RADIUSSTOP && radius[r].term_cause)
354 {
355 *p = 49; // acct-terminate-cause
356 p[1] = 6;
357 *(uint32_t *) (p + 2) = htonl(radius[r].term_cause);
358 p += p[1];
359
360 if (radius[r].term_msg)
361 {
362 *p = 26; // vendor-specific
363 *(uint32_t *) (p + 2) = htonl(9); // Cisco
364 p[6] = 1; // Cisco-AVPair
365 p[7] = 2 + sprintf((char *) p + 8, "disc-cause-ext=%s", radius[r].term_msg);
366 p[1] = p[7] + 6;
367 p += p[1];
368 }
369 }
370 }
371
372 if (session[s].classlen) {
373 *p = 25; // class
374 p[1] = session[s].classlen + 2;
375 memcpy(p + 2, session[s].class, session[s].classlen);
376 p += p[1];
377 }
378
379 {
380 struct param_radius_account acct = { &tunnel[session[s].tunnel], &session[s], &p };
381 run_plugins(PLUGIN_RADIUS_ACCOUNT, &acct);
382 }
383 }
384 }
385
386 if (s)
387 {
388 *p = 5; // NAS-Port
389 p[1] = 6;
390 *(uint32_t *) (p + 2) = htonl(s);
391 p += p[1];
392
393 *p = 6; // Service-Type
394 p[1] = 6;
395 *(uint32_t *) (p + 2) = htonl((state == RADIUSJUSTAUTH ? 8 : 2)); // Authenticate only or Framed-User respectevily
396 p += p[1];
397
398 *p = 7; // Framed-Protocol
399 p[1] = htonl((state == RADIUSJUSTAUTH ? 0 : 6));
400 *(uint32_t *) (p + 2) = htonl((state == RADIUSJUSTAUTH ? 0 : 1)); // PPP
401 p += p[1];
402
403 if (session[s].ip)
404 {
405 *p = 8; // Framed-IP-Address
406 p[1] = 6;
407 *(uint32_t *) (p + 2) = htonl(session[s].ip);
408 p += p[1];
409 }
410
411 if (session[s].route[0].ip)
412 {
413 int r;
414 for (r = 0; s && r < MAXROUTE && session[s].route[r].ip; r++)
415 {
416 *p = 22; // Framed-Route
417 p[1] = sprintf((char *) p + 2, "%s/%d %s 1",
418 fmtaddr(htonl(session[s].route[r].ip), 0),
419 session[s].route[r].prefixlen,
420 fmtaddr(htonl(session[s].ip), 1)) + 2;
421
422 p += p[1];
423 }
424 }
425
426 if (session[s].session_timeout)
427 {
428 *p = 27; // Session-Timeout
429 p[1] = 6;
430 *(uint32_t *) (p + 2) = htonl(session[s].session_timeout);
431 p += p[1];
432 }
433
434 if (session[s].idle_timeout)
435 {
436 *p = 28; // Idle-Timeout
437 p[1] = 6;
438 *(uint32_t *) (p + 2) = htonl(session[s].idle_timeout);
439 p += p[1];
440 }
441
442 if (*session[s].called)
443 {
444 *p = 30; // called
445 p[1] = strlen(session[s].called) + 2;
446 strcpy((char *) p + 2, session[s].called);
447 p += p[1];
448 }
449
450 if (*session[s].calling)
451 {
452 *p = 31; // calling
453 p[1] = strlen(session[s].calling) + 2;
454 strcpy((char *) p + 2, session[s].calling);
455 p += p[1];
456 }
457 }
458
459 // NAS-IP-Address
460 *p = 4;
461 p[1] = 6;
462 *(uint32_t *)(p + 2) = config->bind_address;
463 p += p[1];
464
465 // All AVpairs added
466 *(uint16_t *) (b + 2) = htons(p - b);
467 if (state != RADIUSAUTH && state != RADIUSJUSTAUTH)
468 {
469 // Build auth for accounting packet
470 calc_auth(b, p - b, zero, b + 4);
471 memcpy(radius[r].auth, b + 4, 16);
472 }
473 memset(&addr, 0, sizeof(addr));
474 addr.sin_family = AF_INET;
475 *(uint32_t *) & addr.sin_addr = config->radiusserver[(radius[r].try - 1) % config->numradiusservers];
476 {
477 // get radius port
478 uint16_t port = config->radiusport[(radius[r].try - 1) % config->numradiusservers];
479 // assume RADIUS accounting port is the authentication port +1
480 addr.sin_port = htons((state == RADIUSAUTH || state == RADIUSJUSTAUTH) ? port : port+1);
481 }
482
483 LOG_HEX(5, "RADIUS Send", b, (p - b));
484 sendto(radfds[r & RADIUS_MASK], b, p - b, 0, (void *) &addr, sizeof(addr));
485 }
486
487 static void handle_avpair(sessionidt s, uint8_t *avp, int len)
488 {
489 uint8_t *key = avp;
490 uint8_t *value = memchr(avp, '=', len);
491 uint8_t tmp[2048] = "";
492
493 if (value)
494 {
495 *value++ = 0;
496 len -= value - key;
497 }
498 else
499 {
500 value = tmp;
501 len = 0;
502 }
503
504 // strip quotes
505 if (len > 2 && (*value == '"' || *value == '\'') && value[len - 1] == *value)
506 {
507 value++;
508 len--;
509 value[len - 1] = 0;
510 }
511 // copy and null terminate
512 else if (len < sizeof(tmp) - 1)
513 {
514 memcpy(tmp, value, len);
515 tmp[len] = 0;
516 value = tmp;
517 }
518 else
519 return;
520
521 // Run hooks
522 {
523 struct param_radius_response p = { &tunnel[session[s].tunnel], &session[s], (char *) key, (char *) value };
524 run_plugins(PLUGIN_RADIUS_RESPONSE, &p);
525 }
526 }
527
528 // process RADIUS response
529 void processrad(uint8_t *buf, int len, char socket_index)
530 {
531 uint8_t b[MAXETHER];
532 uint16_t r;
533 sessionidt s;
534 tunnelidt t = 0;
535 hasht hash;
536 int routes = 0;
537 int routes6 = 0;
538 int r_code;
539 int r_id;
540 int OpentunnelReq = 0;
541
542 CSTAT(processrad);
543
544 LOG_HEX(5, "RADIUS Response", buf, len);
545 if (len < 20 || len < ntohs(*(uint16_t *) (buf + 2)))
546 {
547 LOG(1, 0, 0, "Duff RADIUS response length %d\n", len);
548 return ;
549 }
550
551 r_code = buf[0]; // response type
552 r_id = buf[1]; // radius reply indentifier.
553
554 len = ntohs(*(uint16_t *) (buf + 2));
555 r = socket_index | (r_id << RADIUS_SHIFT);
556 s = radius[r].session;
557 LOG(3, s, session[s].tunnel, "Received %s, radius %d response for session %u (%s, id %d)\n",
558 radius_state(radius[r].state), r, s, radius_code(r_code), r_id);
559
560 if (!s && radius[r].state != RADIUSSTOP)
561 {
562 LOG(1, s, session[s].tunnel, " Unexpected RADIUS response\n");
563 return;
564 }
565 if (radius[r].state != RADIUSAUTH && radius[r].state != RADIUSJUSTAUTH && radius[r].state != RADIUSSTART
566 && radius[r].state != RADIUSSTOP && radius[r].state != RADIUSINTERIM)
567 {
568 LOG(1, s, session[s].tunnel, " Unexpected RADIUS response\n");
569 return;
570 }
571 t = session[s].tunnel;
572 calc_auth(buf, len, radius[r].auth, hash);
573 do {
574 if (memcmp(hash, buf + 4, 16))
575 {
576 LOG(0, s, session[s].tunnel, " Incorrect auth on RADIUS response!! (wrong secret in radius config?)\n");
577 return; // Do nothing. On timeout, it will try the next radius server.
578 }
579
580 if (((radius[r].state == RADIUSAUTH ||radius[r].state == RADIUSJUSTAUTH) && r_code != AccessAccept && r_code != AccessReject) ||
581 ((radius[r].state == RADIUSSTART || radius[r].state == RADIUSSTOP || radius[r].state == RADIUSINTERIM) && r_code != AccountingResponse))
582 {
583 LOG(1, s, session[s].tunnel, " Unexpected RADIUS response %s\n", radius_code(r_code));
584 return; // We got something we didn't expect. Let the timeouts take
585 // care off finishing the radius session if that's really correct.
586 }
587
588 if (radius[r].state == RADIUSAUTH || radius[r].state == RADIUSJUSTAUTH)
589 {
590 // run post-auth plugin
591 struct param_post_auth packet = {
592 &tunnel[t],
593 &session[s],
594 session[s].user,
595 (r_code == AccessAccept),
596 radius[r].chap ? PPPCHAP : PPPPAP
597 };
598
599 run_plugins(PLUGIN_POST_AUTH, &packet);
600 r_code = packet.auth_allowed ? AccessAccept : AccessReject;
601
602 if (r_code == AccessAccept)
603 {
604 // Login successful
605 // Extract IP, routes, etc
606 uint8_t *p = buf + 20;
607 uint8_t *e = buf + len;
608 uint8_t tag;
609 uint8_t strtemp[256];
610 lac_reset_rad_tag_tunnel_ctxt();
611
612 for (; p + 2 <= e && p[1] && p + p[1] <= e; p += p[1])
613 {
614 if (*p == 26 && p[1] >= 7)
615 {
616 // Vendor-Specific Attribute
617 uint32_t vendor = ntohl(*(int *)(p + 2));
618 uint8_t attrib = *(p + 6);
619 int attrib_length = *(p + 7) - 2;
620
621 LOG(4, s, session[s].tunnel, " Radius reply contains Vendor-Specific. Vendor=%u Attrib=%u Length=%d\n", vendor, attrib, attrib_length);
622 if (vendor == 9 && attrib == 1) // Cisco-AVPair
623 {
624 if (attrib_length < 0) continue;
625 LOG(3, s, session[s].tunnel, " Cisco-AVPair value: %.*s\n",
626 attrib_length, p + 8);
627
628 handle_avpair(s, p + 8, attrib_length);
629 continue;
630 }
631 else if (vendor == 529 && attrib >= 135 && attrib <= 136) // Ascend
632 {
633 // handle old-format ascend DNS attributes below
634 p += 6;
635 }
636 else
637 {
638 LOG(3, s, session[s].tunnel, " Unknown vendor-specific\n");
639 continue;
640 }
641 }
642
643 if (*p == 8)
644 {
645 // Framed-IP-Address
646 if (p[1] < 6) continue;
647 session[s].ip = ntohl(*(uint32_t *) (p + 2));
648 session[s].ip_pool_index = -1;
649 LOG(3, s, session[s].tunnel, " Radius reply contains IP address %s\n",
650 fmtaddr(htonl(session[s].ip), 0));
651
652 if (session[s].ip == 0xFFFFFFFE)
653 session[s].ip = 0; // assign from pool
654 }
655 else if (*p == 135)
656 {
657 // DNS address
658 if (p[1] < 6) continue;
659 session[s].dns1 = ntohl(*(uint32_t *) (p + 2));
660 LOG(3, s, session[s].tunnel, " Radius reply contains primary DNS address %s\n",
661 fmtaddr(htonl(session[s].dns1), 0));
662 }
663 else if (*p == 136)
664 {
665 // DNS address
666 if (p[1] < 6) continue;
667 session[s].dns2 = ntohl(*(uint32_t *) (p + 2));
668 LOG(3, s, session[s].tunnel, " Radius reply contains secondary DNS address %s\n",
669 fmtaddr(htonl(session[s].dns2), 0));
670 }
671 else if (*p == 22)
672 {
673 // Framed-Route
674 in_addr_t ip = 0;
675 uint8_t u = 0;
676 uint8_t bits = 0;
677 uint8_t *n = p + 2;
678 uint8_t *e = p + p[1];
679 while (n < e && (isdigit(*n) || *n == '.'))
680 {
681 if (*n == '.')
682 {
683 ip = (ip << 8) + u;
684 u = 0;
685 }
686 else
687 u = u * 10 + *n - '0';
688 n++;
689 }
690 ip = (ip << 8) + u;
691 if (*n == '/')
692 {
693 n++;
694 while (n < e && isdigit(*n))
695 bits = bits * 10 + *n++ - '0';
696 }
697 else if ((ip >> 24) < 128)
698 bits = 8;
699 else if ((ip >> 24) < 192)
700 bits = 16;
701 else
702 bits = 24;
703
704 if (routes == MAXROUTE)
705 {
706 LOG(1, s, session[s].tunnel, " Too many routes\n");
707 }
708 else if (ip)
709 {
710 LOG(3, s, session[s].tunnel, " Radius reply contains route for %s/%d\n",
711 fmtaddr(htonl(ip), 0), bits);
712
713 session[s].route[routes].ip = ip;
714 session[s].route[routes].prefixlen = bits;
715 routes++;
716 }
717 }
718 else if (*p == 11)
719 {
720 // Filter-Id
721 char *filter = (char *) p + 2;
722 int l = p[1] - 2;
723 char *suffix;
724 int f;
725 uint8_t *fp = 0;
726
727 LOG(3, s, session[s].tunnel, " Radius reply contains Filter-Id \"%.*s\"\n", l, filter);
728 if ((suffix = memchr(filter, '.', l)))
729 {
730 int b = suffix - filter;
731 if (l - b == 3 && !memcmp("in", suffix+1, 2))
732 fp = &session[s].filter_in;
733 else if (l - b == 4 && !memcmp("out", suffix+1, 3))
734 fp = &session[s].filter_out;
735
736 l = b;
737 }
738
739 if (!fp)
740 {
741 LOG(3, s, session[s].tunnel, " Invalid filter\n");
742 continue;
743 }
744
745 if ((f = find_filter(filter, l)) < 0 || !*ip_filters[f].name)
746 {
747 LOG(3, s, session[s].tunnel, " Unknown filter\n");
748 }
749 else
750 {
751 *fp = f + 1;
752 ip_filters[f].used++;
753 }
754 }
755 else if (*p == 27)
756 {
757 // Session-Timeout
758 if (p[1] < 6) continue;
759 session[s].session_timeout = ntohl(*(uint32_t *)(p + 2));
760 LOG(3, s, session[s].tunnel, " Radius reply contains Session-Timeout = %u\n", session[s].session_timeout);
761 if(!session[s].session_timeout && config->kill_timedout_sessions)
762 sessionshutdown(s, "Session timeout is zero", CDN_ADMIN_DISC, 0);
763 }
764 else if (*p == 28)
765 {
766 // Idle-Timeout
767 if (p[1] < 6) continue;
768 session[s].idle_timeout = ntohl(*(uint32_t *)(p + 2));
769 LOG(3, s, session[s].tunnel, " Radius reply contains Idle-Timeout = %u\n", session[s].idle_timeout);
770 }
771 else if (*p == 99)
772 {
773 // Framed-IPv6-Route
774 struct in6_addr r6;
775 int prefixlen;
776 uint8_t *n = p + 2;
777 uint8_t *e = p + p[1];
778 uint8_t *m = memchr(n, '/', e - n);
779
780 *m++ = 0;
781 inet_pton(AF_INET6, (char *) n, &r6);
782
783 prefixlen = 0;
784 while (m < e && isdigit(*m)) {
785 prefixlen = prefixlen * 10 + *m++ - '0';
786 }
787
788 if (prefixlen)
789 {
790 if (routes6 == MAXROUTE6)
791 {
792 LOG(1, s, session[s].tunnel, " Too many IPv6 routes\n");
793 }
794 else
795 {
796 LOG(3, s, session[s].tunnel, " Radius reply contains route for %s/%d\n", n, prefixlen);
797 session[s].route6[routes6].ipv6route = r6;
798 session[s].route6[routes6].ipv6prefixlen = prefixlen;
799 routes6++;
800 }
801 }
802 }
803 else if (*p == 123)
804 {
805 // Delegated-IPv6-Prefix
806 if ((p[1] > 4) && (p[3] > 0) && (p[3] <= 128))
807 {
808 char ipv6addr[INET6_ADDRSTRLEN];
809
810 if (routes6 == MAXROUTE6)
811 {
812 LOG(1, s, session[s].tunnel, " Too many IPv6 routes\n");
813 }
814 else
815 {
816 memcpy(&session[s].route6[routes6].ipv6route, &p[4], p[1] - 4);
817 session[s].route6[routes6].ipv6prefixlen = p[3];
818 LOG(3, s, session[s].tunnel, " Radius reply contains Delegated IPv6 Prefix %s/%d\n",
819 inet_ntop(AF_INET6, &session[s].route6[routes6].ipv6route, ipv6addr, INET6_ADDRSTRLEN), session[s].route6[routes6].ipv6prefixlen);
820 routes6++;
821 }
822 }
823 }
824 else if (*p == 168)
825 {
826 // Framed-IPv6-Address
827 if (p[1] == 18)
828 {
829 char ipv6addr[INET6_ADDRSTRLEN];
830 memcpy(&session[s].ipv6address, &p[2], 16);
831 LOG(3, s, session[s].tunnel, " Radius reply contains Framed-IPv6-Address %s\n", inet_ntop(AF_INET6, &session[s].ipv6address, ipv6addr, INET6_ADDRSTRLEN));
832 }
833 }
834 else if (*p == 25)
835 {
836 // Class
837 if (p[1] < 3) continue;
838 session[s].classlen = p[1] - 2;
839 if (session[s].classlen > MAXCLASS)
840 session[s].classlen = MAXCLASS;
841 memcpy(session[s].class, p + 2, session[s].classlen);
842 }
843 else if (*p == 64)
844 {
845 // Tunnel-Type
846 if (p[1] != 6) continue;
847 tag = p[2];
848 LOG(3, s, session[s].tunnel, " Radius reply Tunnel-Type:%d %d\n",
849 tag, ntohl(*(uint32_t *)(p + 2)) & 0xFFFFFF);
850 // Fill context
851 lac_set_rad_tag_tunnel_type(tag, ntohl(*(uint32_t *)(p + 2)) & 0xFFFFFF);
852 /* Request open tunnel to remote LNS*/
853 OpentunnelReq = 1;
854 }
855 else if (*p == 65)
856 {
857 // Tunnel-Medium-Type
858 if (p[1] < 6) continue;
859 tag = p[2];
860 LOG(3, s, session[s].tunnel, " Radius reply Tunnel-Medium-Type:%d %d\n",
861 tag, ntohl(*(uint32_t *)(p + 2)) & 0xFFFFFF);
862 // Fill context
863 lac_set_rad_tag_tunnel_medium_type(tag, ntohl(*(uint32_t *)(p + 2)) & 0xFFFFFF);
864 }
865 else if (*p == 67)
866 {
867 // Tunnel-Server-Endpoint
868 if (p[1] < 3) continue;
869 tag = p[2];
870 //If the Tag field is greater than 0x1F,
871 // it SHOULD be interpreted as the first byte of the following String field.
872 memset(strtemp, 0, 256);
873 if (tag > 0x1F)
874 {
875 tag = 0;
876 memcpy(strtemp, (p + 2), p[1]-2);
877 }
878 else
879 memcpy(strtemp, (p + 3), p[1]-3);
880
881 LOG(3, s, session[s].tunnel, " Radius reply Tunnel-Server-Endpoint:%d %s\n", tag, strtemp);
882 // Fill context
883 lac_set_rad_tag_tunnel_serv_endpt(tag, (char *) strtemp);
884 }
885 else if (*p == 69)
886 {
887 // Tunnel-Password
888 size_t lentemp;
889
890 if (p[1] < 5) continue;
891 tag = p[2];
892
893 memset(strtemp, 0, 256);
894 lentemp = p[1]-3;
895 memcpy(strtemp, (p + 3), lentemp);
896 if (!rad_tunnel_pwdecode(strtemp, &lentemp, config->radiussecret, radius[r].auth))
897 {
898 LOG_HEX(3, "Error Decode Tunnel-Password, Dump Radius reponse:", p, p[1]);
899 continue;
900 }
901
902 LOG(3, s, session[s].tunnel, " Radius reply Tunnel-Password:%d %s\n", tag, strtemp);
903 if (strlen((char *) strtemp) > 63)
904 {
905 LOG(1, s, session[s].tunnel, "tunnel password is too long (>63)\n");
906 continue;
907 }
908 // Fill context
909 lac_set_rad_tag_tunnel_password(tag, (char *) strtemp);
910 }
911 else if (*p == 82)
912 {
913 // Tunnel-Assignment-Id
914 if (p[1] < 3) continue;
915 tag = p[2];
916 //If the Tag field is greater than 0x1F,
917 // it SHOULD be interpreted as the first byte of the following String field.
918 memset(strtemp, 0, 256);
919 if (tag > 0x1F)
920 {
921 tag = 0;
922 memcpy(strtemp, (p + 2), p[1]-2);
923 }
924 else
925 memcpy(strtemp, (p + 3), p[1]-3);
926
927 LOG(3, s, session[s].tunnel, " Radius reply Tunnel-Assignment-Id:%d %s\n", tag, strtemp);
928 // Fill context
929 lac_set_rad_tag_tunnel_assignment_id(tag, (char *) strtemp);
930 }
931 }
932 }
933 else if (r_code == AccessReject)
934 {
935 LOG(2, s, session[s].tunnel, " Authentication rejected for %s\n", session[s].user);
936 sessionkill(s, "Authentication rejected");
937 break;
938 }
939
940 if ((!config->disable_lac_func) && OpentunnelReq)
941 {
942 char assignment_id[256];
943 // Save radius tag context to conf
944 lac_save_rad_tag_tunnels(s);
945
946 memset(assignment_id, 0, 256);
947 if (!lac_rad_select_assignment_id(s, assignment_id))
948 break; // Error no assignment_id
949
950 LOG(3, s, session[s].tunnel, "Select Tunnel Remote LNS for assignment_id == %s\n", assignment_id);
951
952 if (lac_rad_forwardtoremotelns(s, assignment_id, session[s].user))
953 {
954 int ro;
955 // Sanity check, no local IP to session forwarded
956 session[s].ip = 0;
957 for (ro = 0; r < MAXROUTE && session[s].route[ro].ip; r++)
958 {
959 session[s].route[ro].ip = 0;
960 }
961 break;
962 }
963 }
964
965 // process auth response
966 if (radius[r].chap)
967 {
968 // CHAP
969 uint8_t *p = makeppp(b, sizeof(b), 0, 0, s, t, PPPCHAP, 0, 0, 0);
970 if (!p) return; // Abort!
971
972 *p = (r_code == AccessAccept) ? 3 : 4; // ack/nak
973 p[1] = radius[r].id;
974 *(uint16_t *) (p + 2) = ntohs(4); // no message
975 tunnelsend(b, (p - b) + 4, t); // send it
976
977 LOG(3, s, session[s].tunnel, " CHAP User %s authentication %s.\n", session[s].user,
978 (r_code == AccessAccept) ? "allowed" : "denied");
979 }
980 else
981 {
982 // PAP
983 uint8_t *p = makeppp(b, sizeof(b), 0, 0, s, t, PPPPAP, 0, 0, 0);
984 if (!p) return; // Abort!
985
986 // ack/nak
987 *p = r_code;
988 p[1] = radius[r].id;
989 *(uint16_t *) (p + 2) = ntohs(5);
990 p[4] = 0; // no message
991 tunnelsend(b, (p - b) + 5, t); // send it
992
993 LOG(3, s, session[s].tunnel, " PAP User %s authentication %s.\n", session[s].user,
994 (r_code == AccessAccept) ? "allowed" : "denied");
995 }
996
997 if (!session[s].dns1 && config->default_dns1)
998 {
999 session[s].dns1 = ntohl(config->default_dns1);
1000 LOG(3, s, t, " Sending dns1 = %s\n", fmtaddr(config->default_dns1, 0));
1001 }
1002 if (!session[s].dns2 && config->default_dns2)
1003 {
1004 session[s].dns2 = ntohl(config->default_dns2);
1005 LOG(3, s, t, " Sending dns2 = %s\n", fmtaddr(config->default_dns2, 0));
1006 }
1007
1008 // Valid Session, set it up
1009 session[s].unique_id = 0;
1010 sessionsetup(s, t);
1011 }
1012 else
1013 {
1014 // An ack for a stop or start record.
1015 LOG(3, s, t, " RADIUS accounting ack recv in state %s\n", radius_state(radius[r].state));
1016 break;
1017 }
1018 } while (0);
1019
1020 // finished with RADIUS
1021 radiusclear(r, s);
1022 }
1023
1024 // Send a retry for RADIUS/CHAP message
1025 void radiusretry(uint16_t r)
1026 {
1027 sessionidt s = radius[r].session;
1028 tunnelidt t = 0;
1029
1030 CSTAT(radiusretry);
1031
1032 if (s) t = session[s].tunnel;
1033
1034 switch (radius[r].state)
1035 {
1036 case RADIUSCHAP: // sending CHAP down PPP
1037 sendchap(s, t);
1038 break;
1039 case RADIUSAUTH: // sending auth to RADIUS server
1040 case RADIUSJUSTAUTH: // sending auth to RADIUS server
1041 case RADIUSSTART: // sending start accounting to RADIUS server
1042 case RADIUSSTOP: // sending stop accounting to RADIUS server
1043 case RADIUSINTERIM: // sending interim accounting to RADIUS server
1044 radiussend(r, radius[r].state);
1045 break;
1046 default:
1047 case RADIUSNULL: // Not in use
1048 case RADIUSWAIT: // waiting timeout before available, in case delayed reply from RADIUS server
1049 // free up RADIUS task
1050 radiusclear(r, s);
1051 LOG(3, s, session[s].tunnel, "Freeing up radius session %d\n", r);
1052 break;
1053 }
1054 }
1055
1056 extern int daefd;
1057
1058 void processdae(uint8_t *buf, int len, struct sockaddr_in *addr, int alen, struct in_addr *local)
1059 {
1060 int i, r_code, r_id, length, attribute_length;
1061 uint8_t *packet, attribute;
1062 hasht hash;
1063 char username[MAXUSER] = "";
1064 in_addr_t nas = 0;
1065 in_addr_t ip = 0;
1066 uint32_t port = 0;
1067 uint32_t error = 0;
1068 sessionidt s = 0;
1069 tunnelidt t;
1070 int fin = -1;
1071 int fout = -1;
1072 uint8_t *avpair[64];
1073 int avpair_len[sizeof(avpair)/sizeof(*avpair)];
1074 int avp = 0;
1075 int auth_only = 0;
1076 uint8_t *p;
1077
1078 LOG(3, 0, 0, "DAE request from %s\n", fmtaddr(addr->sin_addr.s_addr, 0));
1079 LOG_HEX(5, "DAE Request", buf, len);
1080
1081 if (len < 20 || len < ntohs(*(uint16_t *) (buf + 2)))
1082 {
1083 LOG(1, 0, 0, "Duff DAE request length %d\n", len);
1084 return;
1085 }
1086
1087 r_code = buf[0]; // request type
1088 r_id = buf[1]; // radius indentifier.
1089
1090 if (r_code != DisconnectRequest && r_code != CoARequest)
1091 {
1092 LOG(1, 0, 0, "Unrecognised DAE request %s\n", radius_code(r_code));
1093 return;
1094 }
1095
1096 if (!config->cluster_iam_master)
1097 {
1098 master_forward_dae_packet(buf, len, addr->sin_addr.s_addr, addr->sin_port);
1099 return;
1100 }
1101
1102 len = ntohs(*(uint16_t *) (buf + 2));
1103
1104 LOG(3, 0, 0, "Received DAE %s, id %d\n", radius_code(r_code), r_id);
1105
1106 // check authenticator
1107 calc_auth(buf, len, zero, hash);
1108 if (memcmp(hash, buf + 4, 16) != 0)
1109 {
1110 LOG(1, 0, 0, "Incorrect vector in DAE request (wrong secret in radius config?)\n");
1111 return;
1112 }
1113
1114 // unpack attributes
1115 packet = buf + 20;
1116 length = len - 20;
1117
1118 while (length > 0)
1119 {
1120 attribute = *packet++;
1121 attribute_length = *packet++;
1122 if (attribute_length < 2)
1123 break;
1124
1125 length -= attribute_length;
1126 attribute_length -= 2;
1127 switch (attribute)
1128 {
1129 case 1: /* username */
1130 len = attribute_length < MAXUSER ? attribute_length : MAXUSER - 1;
1131 memcpy(username, packet, len);
1132 username[len] = 0;
1133 LOG(4, 0, 0, " Received DAE User-Name: %s\n", username);
1134 break;
1135
1136 case 4: /* nas ip address */
1137 nas = *(uint32_t *) packet; // net order
1138 if (nas != config->bind_address)
1139 error = 403; // NAS identification mismatch
1140
1141 LOG(4, 0, 0, " Received DAE NAS-IP-Address: %s\n", fmtaddr(nas, 0));
1142 break;
1143
1144 case 5: /* nas port */
1145 port = ntohl(*(uint32_t *) packet);
1146 if (port < 1 || port > MAXSESSION)
1147 error = 404;
1148
1149 LOG(4, 0, 0, " Received DAE NAS-Port: %u\n", port);
1150 break;
1151
1152 case 6: /* service type */
1153 {
1154 uint32_t service_type = ntohl(*(uint32_t *) packet);
1155 auth_only = service_type == 8; // Authenticate only
1156
1157 LOG(4, 0, 0, " Received DAE Service-Type: %u\n", service_type);
1158 }
1159 break;
1160
1161 case 8: /* ip address */
1162 ip = *(uint32_t *) packet; // net order
1163 LOG(4, 0, 0, " Received DAE Framed-IP-Address: %s\n", fmtaddr(ip, 0));
1164 break;
1165
1166 case 11: /* filter id */
1167 LOG(4, 0, 0, " Received DAE Filter-Id: %.*s\n", attribute_length, packet);
1168 if (!(p = memchr(packet, '.', attribute_length)))
1169 {
1170 error = 404; // invalid request
1171 break;
1172 }
1173
1174 len = p - packet;
1175 i = find_filter((char *) packet, len);
1176 if (i < 0 || !*ip_filters[i].name)
1177 {
1178 error = 404;
1179 break;
1180 }
1181
1182 if (!memcmp(p, ".in", attribute_length - len))
1183 fin = i + 1;
1184 else if (!memcmp(p, ".out", attribute_length - len))
1185 fout = i + 1;
1186 else
1187 error = 404;
1188
1189 break;
1190
1191 case 26: /* vendor specific */
1192 if (attribute_length >= 6
1193 && ntohl(*(uint32_t *) packet) == 9 // Cisco
1194 && *(packet + 4) == 1 // Cisco-AVPair
1195 && *(packet + 5) >= 2) // length
1196 {
1197 int len = *(packet + 5) - 2;
1198 uint8_t *a = packet + 6;
1199
1200 LOG(4, 0, 0, " Received DAE Cisco-AVPair: %.*s\n", len, a);
1201 if (avp < sizeof(avpair)/sizeof(*avpair) - 1)
1202 {
1203 avpair[avp] = a;
1204 avpair_len[avp++] = len;
1205 }
1206 }
1207 break;
1208 }
1209
1210 packet += attribute_length;
1211 }
1212
1213 if (!error && auth_only)
1214 {
1215 if (fin != -1 || fout != -1 || avp)
1216 error = 401; // unsupported attribute
1217 else
1218 error = 405; // unsupported service
1219 }
1220
1221 if (!error && !(port || ip || *username))
1222 error = 402; // missing attribute
1223
1224 // exact match for SID if given
1225 if (!error && port)
1226 {
1227 s = port;
1228 if (!session[s].opened)
1229 error = 503; // not found
1230 }
1231
1232 if (!error && ip)
1233 {
1234 // find/check session by IP
1235 i = sessionbyip(ip);
1236 if (!i || (s && s != i)) // not found or mismatching port
1237 error = 503;
1238 else
1239 s = i;
1240 }
1241
1242 if (!error && *username)
1243 {
1244 if (s)
1245 {
1246 if (strcmp(session[s].user, username))
1247 error = 503;
1248 }
1249 else if (!(s = sessionbyuser(username)))
1250 error = 503;
1251 }
1252
1253 t = session[s].tunnel;
1254
1255 switch (r_code)
1256 {
1257 case DisconnectRequest: // Packet of Disconnect/Death
1258 if (error)
1259 {
1260 r_code = DisconnectNAK;
1261 break;
1262 }
1263
1264 LOG(3, s, t, " DAE Disconnect %d (%s)\n", s, session[s].user);
1265 r_code = DisconnectACK;
1266
1267 sessionshutdown(s, "Requested by PoD", CDN_ADMIN_DISC, TERM_ADMIN_RESET); // disconnect session
1268 break;
1269
1270 case CoARequest: // Change of Authorization
1271 if (error)
1272 {
1273 r_code = CoANAK;
1274 break;
1275 }
1276
1277 LOG(3, s, t, " DAE Change %d (%s)\n", s, session[s].user);
1278 r_code = CoAACK;
1279
1280 // reset
1281 {
1282 struct param_radius_reset p = { &tunnel[session[s].tunnel], &session[s] };
1283 run_plugins(PLUGIN_RADIUS_RESET, &p);
1284 }
1285
1286 // apply filters
1287 if (fin == -1)
1288 fin = 0;
1289 else
1290 LOG(3, s, t, " Filter in %d (%s)\n", fin, ip_filters[fin - 1].name);
1291
1292 if (fout == -1)
1293 fout = 0;
1294 else
1295 LOG(3, s, t, " Filter out %d (%s)\n", fout, ip_filters[fout - 1].name);
1296
1297 filter_session(s, fin, fout);
1298
1299 // process cisco av-pair(s)
1300 for (i = 0; i < avp; i++)
1301 {
1302 LOG(3, s, t, " Cisco-AVPair: %.*s\n", avpair_len[i], avpair[i]);
1303 handle_avpair(s, avpair[i], avpair_len[i]);
1304 }
1305
1306 cluster_send_session(s);
1307 break;
1308 }
1309
1310 // send response
1311 packet = buf;
1312 *packet++ = r_code;
1313 *packet++ = r_id;
1314 // skip len + auth
1315 packet += 2 + 16;
1316 len = packet - buf;
1317
1318 // add attributes
1319 if (error)
1320 {
1321 // add error cause
1322 *packet++ = 101;
1323 *packet++ = 6;
1324 *(uint32_t *) packet = htonl(error);
1325 len += 6;
1326 }
1327
1328 *((uint16_t *)(buf + 2)) = htons(len);
1329
1330 // make vector
1331 calc_auth(buf, len, hash, buf + 4);
1332
1333 LOG(3, 0, 0, "Sending DAE %s, id=%d\n", radius_code(r_code), r_id);
1334
1335 // send DAE response
1336 if (sendtofrom(daefd, buf, len, MSG_DONTWAIT | MSG_NOSIGNAL, (struct sockaddr *) addr, alen, local) < 0)
1337 LOG(0, 0, 0, "Error sending DAE response packet: %s\n", strerror(errno));
1338 }
1339
1340 // Decrypte the encrypted Tunnel Password.
1341 // Defined in RFC-2868.
1342 // the pl2tpsecret buffer must set to 256 characters.
1343 // return 0 on decoding error else length of decoded l2tpsecret
1344 int rad_tunnel_pwdecode(uint8_t *pl2tpsecret, size_t *pl2tpsecretlen,
1345 const char *radiussecret, const uint8_t * auth)
1346 {
1347 MD5_CTX ctx, oldctx;
1348 hasht hash;
1349 int secretlen;
1350 unsigned i, n, len, decodedlen;
1351
1352 /* 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 6 7
1353 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1354 | Salt | Salt | String ..........
1355 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+*/
1356
1357 len = *pl2tpsecretlen;
1358
1359 if (len < 2)
1360 {
1361 LOG(1, 0, 0, "tunnel password is too short, We need at least a salt\n");
1362 return 0;
1363 }
1364
1365 if (len <= 3)
1366 {
1367 pl2tpsecret[0] = 0;
1368 *pl2tpsecretlen = 0;
1369 LOG(1, 0, 0, "tunnel passwd is empty !!!\n");
1370 return 0;
1371 }
1372
1373 len -= 2; /* discount the salt */
1374
1375 //Use the secret to setup the decryption
1376 secretlen = strlen(radiussecret);
1377
1378 MD5_Init(&ctx);
1379 MD5_Update(&ctx, (void *) radiussecret, secretlen);
1380 oldctx = ctx; /* save intermediate work */
1381
1382 // Set up the initial key:
1383 // b(1) = MD5(radiussecret + auth + salt)
1384 MD5_Update(&ctx, (void *) auth, 16);
1385 MD5_Update(&ctx, pl2tpsecret, 2);
1386
1387 decodedlen = 0;
1388 for (n = 0; n < len; n += 16)
1389 {
1390 int base = 0;
1391
1392 if (n == 0)
1393 {
1394 MD5_Final(hash, &ctx);
1395
1396 ctx = oldctx;
1397
1398 // the first octet, it's the 'data_len'
1399 // Check is correct
1400 decodedlen = pl2tpsecret[2] ^ hash[0];
1401 if (decodedlen >= len)
1402 {
1403 LOG(1, 0, 0, "tunnel password is too long !!!\n");
1404 return 0;
1405 }
1406
1407 MD5_Update(&ctx, pl2tpsecret + 2, 16);
1408 base = 1;
1409 } else
1410 {
1411 MD5_Final(hash, &ctx);
1412
1413 ctx = oldctx;
1414 MD5_Update(&ctx, pl2tpsecret + n + 2, 16);
1415 }
1416
1417 for (i = base; i < 16; i++)
1418 {
1419 pl2tpsecret[n + i - 1] = pl2tpsecret[n + i + 2] ^ hash[i];
1420 }
1421 }
1422
1423 if (decodedlen > 239) decodedlen = 239;
1424
1425 *pl2tpsecretlen = decodedlen;
1426 pl2tpsecret[decodedlen] = 0;
1427
1428 return decodedlen;
1429 };