Apply patch from Geoffrey D. Bennett to fix handle RADIUS Class attribute.
[l2tpns.git] / radius.c
1 // L2TPNS Radius Stuff
2
3 #include <time.h>
4 #include <stdio.h>
5 #include <sys/types.h>
6 #include <sys/socket.h>
7 #include <malloc.h>
8 #include <string.h>
9 #include <fcntl.h>
10 #include <arpa/inet.h>
11 #include <ctype.h>
12 #include <netinet/in.h>
13 #include <errno.h>
14 #include "md5.h"
15 #include "constants.h"
16 #include "l2tpns.h"
17 #include "plugin.h"
18 #include "util.h"
19 #include "cluster.h"
20
21 extern radiust *radius;
22 extern sessiont *session;
23 extern tunnelt *tunnel;
24 extern configt *config;
25 extern int *radfds;
26 extern ip_filtert *ip_filters;
27
28 static const hasht zero;
29
30 static void calc_auth(const void *buf, size_t len, const uint8_t *in, uint8_t *out)
31 {
32 MD5_CTX ctx;
33
34 MD5_Init(&ctx);
35 MD5_Update(&ctx, (void *)buf, 4); // code, id, length
36 MD5_Update(&ctx, (void *)in, 16); // auth
37 MD5_Update(&ctx, (void *)(buf + 20), len - 20);
38 MD5_Update(&ctx, config->radiussecret, strlen(config->radiussecret));
39 MD5_Final(out, &ctx);
40 }
41
42 // Set up socket for radius requests
43 void initrad(void)
44 {
45 int i;
46 uint16_t port = 0;
47 uint16_t min = config->radius_bind_min;
48 uint16_t max = config->radius_bind_max;
49 int inc = 1;
50 struct sockaddr_in addr;
51
52 if (min)
53 {
54 port = min;
55 if (!max)
56 max = ~0 - 1;
57 }
58 else if (max) /* no minimum specified, bind from max down */
59 {
60 port = max;
61 min = 1;
62 inc = -1;
63 }
64
65 LOG(3, 0, 0, "Creating %d sockets for RADIUS queries\n", RADIUS_FDS);
66 radfds = calloc(sizeof(int), RADIUS_FDS);
67 for (i = 0; i < RADIUS_FDS; i++)
68 {
69 int flags;
70 radfds[i] = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
71 flags = fcntl(radfds[i], F_GETFL, 0);
72 fcntl(radfds[i], F_SETFL, flags | O_NONBLOCK);
73
74 if (port)
75 {
76 int b;
77
78 memset(&addr, 0, sizeof(addr));
79 addr.sin_family = AF_INET;
80 addr.sin_addr.s_addr = INADDR_ANY;
81
82 do {
83 addr.sin_port = htons(port);
84 if ((b = bind(radfds[i], (struct sockaddr *) &addr, sizeof(addr))) < 0)
85 {
86 if ((port += inc) < min || port > max)
87 {
88 LOG(0, 0, 0, "Can't bind RADIUS socket in range %u-%u\n", min, max);
89 exit(1);
90 }
91 }
92 } while (b < 0);
93 }
94 }
95 }
96
97 void radiusclear(uint16_t r, sessionidt s)
98 {
99 if (s) sess_local[s].radius = 0;
100 memset(&radius[r], 0, sizeof(radius[r])); // radius[r].state = RADIUSNULL;
101 }
102
103 static uint16_t get_free_radius()
104 {
105 int count;
106 static uint32_t next_radius_id = 0;
107
108 for (count = MAXRADIUS; count > 0; --count)
109 {
110 ++next_radius_id; // Find the next ID to check.
111 if (next_radius_id >= MAXRADIUS)
112 next_radius_id = 1;
113
114 if (radius[next_radius_id].state == RADIUSNULL)
115 {
116 return next_radius_id;
117 }
118 }
119
120 LOG(0, 0, 0, "Can't find a free radius session! This is very bad!\n");
121 return 0;
122 }
123
124 uint16_t radiusnew(sessionidt s)
125 {
126 uint16_t r = sess_local[s].radius;
127
128 /* re-use */
129 if (r)
130 {
131 LOG(3, s, session[s].tunnel, "Re-used radius %d\n", r);
132 return r;
133 }
134
135 if (!(r = get_free_radius()))
136 {
137 LOG(1, s, session[s].tunnel, "No free RADIUS sessions\n");
138 STAT(radius_overflow);
139 return 0;
140 };
141
142 memset(&radius[r], 0, sizeof(radius[r]));
143 sess_local[s].radius = r;
144 radius[r].session = s;
145 radius[r].state = RADIUSWAIT;
146 radius[r].retry = TIME + 1200; // Wait at least 120 seconds to re-claim this.
147
148 random_data(radius[r].auth, sizeof(radius[r].auth));
149
150 LOG(3, s, session[s].tunnel, "Allocated radius %d\n", r);
151 return r;
152 }
153
154 // Send a RADIUS request
155 void radiussend(uint16_t r, uint8_t state)
156 {
157 struct sockaddr_in addr;
158 uint8_t b[4096]; // RADIUS packet
159 char pass[129];
160 int pl;
161 uint8_t *p;
162 sessionidt s;
163
164 CSTAT(radiussend);
165
166 s = radius[r].session;
167 if (!config->numradiusservers)
168 {
169 LOG(0, s, session[s].tunnel, "No RADIUS servers\n");
170 return;
171 }
172 if (!*config->radiussecret)
173 {
174 LOG(0, s, session[s].tunnel, "No RADIUS secret\n");
175 return;
176 }
177
178 if (state != RADIUSAUTH && state != RADIUSJUSTAUTH && !config->radius_accounting)
179 {
180 // Radius accounting is turned off
181 radiusclear(r, s);
182 return;
183 }
184
185 if (radius[r].state != state)
186 radius[r].try = 0;
187
188 radius[r].state = state;
189 radius[r].retry = backoff(radius[r].try++) + 20; // 3s, 4s, 6s, 10s...
190 LOG(4, s, session[s].tunnel, "Send RADIUS id %d sock %d state %s try %d\n",
191 r >> RADIUS_SHIFT, r & RADIUS_MASK,
192 radius_state(radius[r].state), radius[r].try);
193
194 if (radius[r].try > config->numradiusservers * 2)
195 {
196 if (s)
197 {
198 if (state == RADIUSAUTH || state == RADIUSJUSTAUTH)
199 sessionshutdown(s, "RADIUS timeout.", CDN_ADMIN_DISC, TERM_REAUTHENTICATION_FAILURE);
200 else
201 {
202 LOG(1, s, session[s].tunnel, "RADIUS timeout, but in state %s so don't timeout session\n",
203 radius_state(state));
204 radiusclear(r, s);
205 }
206 STAT(radius_timeout);
207 }
208 else
209 {
210 STAT(radius_retries);
211 radius[r].state = RADIUSWAIT;
212 radius[r].retry = 100;
213 }
214 return;
215 }
216 // contruct RADIUS access request
217 switch (state)
218 {
219 case RADIUSAUTH:
220 case RADIUSJUSTAUTH:
221 b[0] = AccessRequest; // access request
222 break;
223 case RADIUSSTART:
224 case RADIUSSTOP:
225 case RADIUSINTERIM:
226 b[0] = AccountingRequest; // accounting request
227 break;
228 default:
229 LOG(0, 0, 0, "Unknown radius state %d\n", state);
230 }
231 b[1] = r >> RADIUS_SHIFT; // identifier
232 memcpy(b + 4, radius[r].auth, 16);
233 p = b + 20;
234 if (s)
235 {
236 *p = 1; // user name
237 p[1] = strlen(session[s].user) + 2;
238 strcpy((char *) p + 2, session[s].user);
239 p += p[1];
240 }
241 if (state == RADIUSAUTH || state == RADIUSJUSTAUTH)
242 {
243 if (radius[r].chap)
244 {
245 *p = 3; // CHAP password
246 p[1] = 19; // length
247 p[2] = radius[r].id; // ID
248 memcpy(p + 3, radius[r].pass, 16); // response from CHAP request
249 p += p[1];
250 *p = 60; // CHAP Challenge
251 p[1] = 18; // length
252 memcpy(p + 2, radius[r].auth, 16);
253 p += p[1];
254 }
255 else
256 {
257 strcpy(pass, radius[r].pass);
258 pl = strlen(pass);
259 while (pl & 15)
260 pass[pl++] = 0; // pad
261 if (pl)
262 { // encrypt
263 hasht hash;
264 int p = 0;
265 while (p < pl)
266 {
267 MD5_CTX ctx;
268 MD5_Init(&ctx);
269 MD5_Update(&ctx, config->radiussecret, strlen(config->radiussecret));
270 if (p)
271 MD5_Update(&ctx, pass + p - 16, 16);
272 else
273 MD5_Update(&ctx, radius[r].auth, 16);
274 MD5_Final(hash, &ctx);
275 do
276 {
277 pass[p] ^= hash[p & 15];
278 p++;
279 }
280 while (p & 15);
281 }
282 }
283 *p = 2; // password
284 p[1] = pl + 2;
285 if (pl)
286 memcpy(p + 2, pass, pl);
287 p += p[1];
288 }
289 }
290 else // accounting
291 {
292 *p = 40; // accounting type
293 p[1] = 6;
294 *(uint32_t *) (p + 2) = htonl(state - RADIUSSTART + 1); // start=1, stop=2, interim=3
295 p += p[1];
296 if (s)
297 {
298 *p = 44; // session ID
299 p[1] = 18;
300 sprintf((char *) p + 2, "%08X%08X", session[s].unique_id, session[s].opened);
301 p += p[1];
302 if (state == RADIUSSTART)
303 { // start
304 *p = 41; // delay
305 p[1] = 6;
306 *(uint32_t *) (p + 2) = htonl(time(NULL) - session[s].opened);
307 p += p[1];
308 sess_local[s].last_interim = time_now; // Setup "first" Interim
309 }
310 else
311 { // stop, interim
312 *p = 42; // input octets
313 p[1] = 6;
314 *(uint32_t *) (p + 2) = htonl(session[s].cin);
315 p += p[1];
316
317 *p = 43; // output octets
318 p[1] = 6;
319 *(uint32_t *) (p + 2) = htonl(session[s].cout);
320 p += p[1];
321
322 *p = 46; // session time
323 p[1] = 6;
324 *(uint32_t *) (p + 2) = htonl(time(NULL) - session[s].opened);
325 p += p[1];
326
327 *p = 47; // input packets
328 p[1] = 6;
329 *(uint32_t *) (p + 2) = htonl(session[s].pin);
330 p += p[1];
331
332 *p = 48; // output packets
333 p[1] = 6;
334 *(uint32_t *) (p + 2) = htonl(session[s].pout);
335 p += p[1];
336
337 *p = 52; // input gigawords
338 p[1] = 6;
339 *(uint32_t *) (p + 2) = htonl(session[s].cin_wrap);
340 p += p[1];
341
342 *p = 53; // output gigawords
343 p[1] = 6;
344 *(uint32_t *) (p + 2) = htonl(session[s].cout_wrap);
345 p += p[1];
346
347 if (state == RADIUSSTOP && radius[r].term_cause)
348 {
349 *p = 49; // acct-terminate-cause
350 p[1] = 6;
351 *(uint32_t *) (p + 2) = htonl(radius[r].term_cause);
352 p += p[1];
353
354 if (radius[r].term_msg)
355 {
356 *p = 26; // vendor-specific
357 *(uint32_t *) (p + 2) = htonl(9); // Cisco
358 p[6] = 1; // Cisco-AVPair
359 p[7] = 2 + sprintf((char *) p + 8, "disc-cause-ext=%s", radius[r].term_msg);
360 p[1] = p[7] + 6;
361 p += p[1];
362 }
363 }
364 }
365
366 if (session[s].classlen) {
367 *p = 25; // class
368 p[1] = session[s].classlen + 2;
369 memcpy(p + 2, session[s].class, session[s].classlen);
370 p += p[1];
371 }
372
373 {
374 struct param_radius_account acct = { &tunnel[session[s].tunnel], &session[s], &p };
375 run_plugins(PLUGIN_RADIUS_ACCOUNT, &acct);
376 }
377 }
378 }
379
380 if (s)
381 {
382 *p = 5; // NAS-Port
383 p[1] = 6;
384 *(uint32_t *) (p + 2) = htonl(s);
385 p += p[1];
386
387 *p = 6; // Service-Type
388 p[1] = 6;
389 *(uint32_t *) (p + 2) = htonl((state == RADIUSJUSTAUTH ? 8 : 2)); // Authenticate only or Framed-User respectevily
390 p += p[1];
391
392 *p = 7; // Framed-Protocol
393 p[1] = htonl((state == RADIUSJUSTAUTH ? 0 : 6));
394 *(uint32_t *) (p + 2) = htonl((state == RADIUSJUSTAUTH ? 0 : 1)); // PPP
395 p += p[1];
396
397 if (session[s].ip)
398 {
399 *p = 8; // Framed-IP-Address
400 p[1] = 6;
401 *(uint32_t *) (p + 2) = htonl(session[s].ip);
402 p += p[1];
403 }
404
405 if (session[s].route[0].ip)
406 {
407 int r;
408 for (r = 0; s && r < MAXROUTE && session[s].route[r].ip; r++)
409 {
410 int width = 32;
411 if (session[s].route[r].mask)
412 {
413 int mask = session[s].route[r].mask;
414 while (!(mask & 1))
415 {
416 width--;
417 mask >>= 1;
418 }
419 }
420
421 *p = 22; // Framed-Route
422 p[1] = sprintf((char *) p + 2, "%s/%d %s 1",
423 fmtaddr(htonl(session[s].route[r].ip), 0),
424 width, fmtaddr(htonl(session[s].ip), 1)) + 2;
425
426 p += p[1];
427 }
428 }
429
430 if (session[s].session_timeout)
431 {
432 *p = 27; // Session-Timeout
433 p[1] = 6;
434 *(uint32_t *) (p + 2) = htonl(session[s].session_timeout);
435 p += p[1];
436 }
437
438 if (session[s].idle_timeout)
439 {
440 *p = 28; // Idle-Timeout
441 p[1] = 6;
442 *(uint32_t *) (p + 2) = htonl(session[s].idle_timeout);
443 p += p[1];
444 }
445
446 if (*session[s].called)
447 {
448 *p = 30; // called
449 p[1] = strlen(session[s].called) + 2;
450 strcpy((char *) p + 2, session[s].called);
451 p += p[1];
452 }
453
454 if (*session[s].calling)
455 {
456 *p = 31; // calling
457 p[1] = strlen(session[s].calling) + 2;
458 strcpy((char *) p + 2, session[s].calling);
459 p += p[1];
460 }
461 }
462
463 // NAS-IP-Address
464 *p = 4;
465 p[1] = 6;
466 *(uint32_t *)(p + 2) = config->bind_address;
467 p += p[1];
468
469 // All AVpairs added
470 *(uint16_t *) (b + 2) = htons(p - b);
471 if (state != RADIUSAUTH && state != RADIUSJUSTAUTH)
472 {
473 // Build auth for accounting packet
474 calc_auth(b, p - b, zero, b + 4);
475 memcpy(radius[r].auth, b + 4, 16);
476 }
477 memset(&addr, 0, sizeof(addr));
478 addr.sin_family = AF_INET;
479 *(uint32_t *) & addr.sin_addr = config->radiusserver[(radius[r].try - 1) % config->numradiusservers];
480 {
481 // get radius port
482 uint16_t port = config->radiusport[(radius[r].try - 1) % config->numradiusservers];
483 // assume RADIUS accounting port is the authentication port +1
484 addr.sin_port = htons((state == RADIUSAUTH || state == RADIUSJUSTAUTH) ? port : port+1);
485 }
486
487 LOG_HEX(5, "RADIUS Send", b, (p - b));
488 sendto(radfds[r & RADIUS_MASK], b, p - b, 0, (void *) &addr, sizeof(addr));
489 }
490
491 static void handle_avpair(sessionidt s, uint8_t *avp, int len)
492 {
493 uint8_t *key = avp;
494 uint8_t *value = memchr(avp, '=', len);
495 uint8_t tmp[2048] = "";
496
497 if (value)
498 {
499 *value++ = 0;
500 len -= value - key;
501 }
502 else
503 {
504 value = tmp;
505 len = 0;
506 }
507
508 // strip quotes
509 if (len > 2 && (*value == '"' || *value == '\'') && value[len - 1] == *value)
510 {
511 value++;
512 len--;
513 value[len - 1] = 0;
514 }
515 // copy and null terminate
516 else if (len < sizeof(tmp) - 1)
517 {
518 memcpy(tmp, value, len);
519 tmp[len] = 0;
520 value = tmp;
521 }
522 else
523 return;
524
525 // Run hooks
526 {
527 struct param_radius_response p = { &tunnel[session[s].tunnel], &session[s], (char *) key, (char *) value };
528 run_plugins(PLUGIN_RADIUS_RESPONSE, &p);
529 }
530 }
531
532 // process RADIUS response
533 void processrad(uint8_t *buf, int len, char socket_index)
534 {
535 uint8_t b[MAXETHER];
536 uint16_t r;
537 sessionidt s;
538 tunnelidt t = 0;
539 hasht hash;
540 uint8_t routes = 0;
541 int r_code;
542 int r_id;
543
544 CSTAT(processrad);
545
546 LOG_HEX(5, "RADIUS Response", buf, len);
547 if (len < 20 || len < ntohs(*(uint16_t *) (buf + 2)))
548 {
549 LOG(1, 0, 0, "Duff RADIUS response length %d\n", len);
550 return ;
551 }
552
553 r_code = buf[0]; // response type
554 r_id = buf[1]; // radius reply indentifier.
555
556 len = ntohs(*(uint16_t *) (buf + 2));
557 r = socket_index | (r_id << RADIUS_SHIFT);
558 s = radius[r].session;
559 LOG(3, s, session[s].tunnel, "Received %s, radius %d response for session %u (%s, id %d)\n",
560 radius_state(radius[r].state), r, s, radius_code(r_code), r_id);
561
562 if (!s && radius[r].state != RADIUSSTOP)
563 {
564 LOG(1, s, session[s].tunnel, " Unexpected RADIUS response\n");
565 return;
566 }
567 if (radius[r].state != RADIUSAUTH && radius[r].state != RADIUSJUSTAUTH && radius[r].state != RADIUSSTART
568 && radius[r].state != RADIUSSTOP && radius[r].state != RADIUSINTERIM)
569 {
570 LOG(1, s, session[s].tunnel, " Unexpected RADIUS response\n");
571 return;
572 }
573 t = session[s].tunnel;
574 calc_auth(buf, len, radius[r].auth, hash);
575 do {
576 if (memcmp(hash, buf + 4, 16))
577 {
578 LOG(0, s, session[s].tunnel, " Incorrect auth on RADIUS response!! (wrong secret in radius config?)\n");
579 return; // Do nothing. On timeout, it will try the next radius server.
580 }
581
582 if (((radius[r].state == RADIUSAUTH ||radius[r].state == RADIUSJUSTAUTH) && r_code != AccessAccept && r_code != AccessReject) ||
583 ((radius[r].state == RADIUSSTART || radius[r].state == RADIUSSTOP || radius[r].state == RADIUSINTERIM) && r_code != AccountingResponse))
584 {
585 LOG(1, s, session[s].tunnel, " Unexpected RADIUS response %s\n", radius_code(r_code));
586 return; // We got something we didn't expect. Let the timeouts take
587 // care off finishing the radius session if that's really correct.
588 }
589
590 if (radius[r].state == RADIUSAUTH || radius[r].state == RADIUSJUSTAUTH)
591 {
592 // run post-auth plugin
593 struct param_post_auth packet = {
594 &tunnel[t],
595 &session[s],
596 session[s].user,
597 (r_code == AccessAccept),
598 radius[r].chap ? PPPCHAP : PPPPAP
599 };
600
601 run_plugins(PLUGIN_POST_AUTH, &packet);
602 r_code = packet.auth_allowed ? AccessAccept : AccessReject;
603
604 // process auth response
605 if (radius[r].chap)
606 {
607 // CHAP
608 uint8_t *p = makeppp(b, sizeof(b), 0, 0, s, t, PPPCHAP, 0, 0, 0);
609 if (!p) return; // Abort!
610
611 *p = (r_code == AccessAccept) ? 3 : 4; // ack/nak
612 p[1] = radius[r].id;
613 *(uint16_t *) (p + 2) = ntohs(4); // no message
614 tunnelsend(b, (p - b) + 4, t); // send it
615
616 LOG(3, s, session[s].tunnel, " CHAP User %s authentication %s.\n", session[s].user,
617 (r_code == AccessAccept) ? "allowed" : "denied");
618 }
619 else
620 {
621 // PAP
622 uint8_t *p = makeppp(b, sizeof(b), 0, 0, s, t, PPPPAP, 0, 0, 0);
623 if (!p) return; // Abort!
624
625 // ack/nak
626 *p = r_code;
627 p[1] = radius[r].id;
628 *(uint16_t *) (p + 2) = ntohs(5);
629 p[4] = 0; // no message
630 tunnelsend(b, (p - b) + 5, t); // send it
631
632 LOG(3, s, session[s].tunnel, " PAP User %s authentication %s.\n", session[s].user,
633 (r_code == AccessAccept) ? "allowed" : "denied");
634 }
635
636 if (r_code == AccessAccept)
637 {
638 // Login successful
639 // Extract IP, routes, etc
640 uint8_t *p = buf + 20;
641 uint8_t *e = buf + len;
642 for (; p + 2 <= e && p[1] && p + p[1] <= e; p += p[1])
643 {
644 if (*p == 26 && p[1] >= 7)
645 {
646 // Vendor-Specific Attribute
647 uint32_t vendor = ntohl(*(int *)(p + 2));
648 uint8_t attrib = *(p + 6);
649 int attrib_length = *(p + 7) - 2;
650
651 LOG(4, s, session[s].tunnel, " Radius reply contains Vendor-Specific. Vendor=%u Attrib=%u Length=%d\n", vendor, attrib, attrib_length);
652 if (vendor == 9 && attrib == 1) // Cisco-AVPair
653 {
654 if (attrib_length < 0) continue;
655 LOG(3, s, session[s].tunnel, " Cisco-AVPair value: %.*s\n",
656 attrib_length, p + 8);
657
658 handle_avpair(s, p + 8, attrib_length);
659 continue;
660 }
661 else if (vendor == 529 && attrib >= 135 && attrib <= 136) // Ascend
662 {
663 // handle old-format ascend DNS attributes below
664 p += 6;
665 }
666 else
667 {
668 LOG(3, s, session[s].tunnel, " Unknown vendor-specific\n");
669 continue;
670 }
671 }
672
673 if (*p == 8)
674 {
675 // Framed-IP-Address
676 if (p[1] < 6) continue;
677 session[s].ip = ntohl(*(uint32_t *) (p + 2));
678 session[s].ip_pool_index = -1;
679 LOG(3, s, session[s].tunnel, " Radius reply contains IP address %s\n",
680 fmtaddr(htonl(session[s].ip), 0));
681
682 if (session[s].ip == 0xFFFFFFFE)
683 session[s].ip = 0; // assign from pool
684 }
685 else if (*p == 135)
686 {
687 // DNS address
688 if (p[1] < 6) continue;
689 session[s].dns1 = ntohl(*(uint32_t *) (p + 2));
690 LOG(3, s, session[s].tunnel, " Radius reply contains primary DNS address %s\n",
691 fmtaddr(htonl(session[s].dns1), 0));
692 }
693 else if (*p == 136)
694 {
695 // DNS address
696 if (p[1] < 6) continue;
697 session[s].dns2 = ntohl(*(uint32_t *) (p + 2));
698 LOG(3, s, session[s].tunnel, " Radius reply contains secondary DNS address %s\n",
699 fmtaddr(htonl(session[s].dns2), 0));
700 }
701 else if (*p == 22)
702 {
703 // Framed-Route
704 in_addr_t ip = 0, mask = 0;
705 uint8_t u = 0;
706 uint8_t bits = 0;
707 uint8_t *n = p + 2;
708 uint8_t *e = p + p[1];
709 while (n < e && (isdigit(*n) || *n == '.'))
710 {
711 if (*n == '.')
712 {
713 ip = (ip << 8) + u;
714 u = 0;
715 }
716 else
717 u = u * 10 + *n - '0';
718 n++;
719 }
720 ip = (ip << 8) + u;
721 if (*n == '/')
722 {
723 n++;
724 while (n < e && isdigit(*n))
725 bits = bits * 10 + *n++ - '0';
726 mask = (( -1) << (32 - bits));
727 }
728 else if ((ip >> 24) < 128)
729 mask = 0xFF0000;
730 else if ((ip >> 24) < 192)
731 mask = 0xFFFF0000;
732 else
733 mask = 0xFFFFFF00;
734
735 if (routes == MAXROUTE)
736 {
737 LOG(1, s, session[s].tunnel, " Too many routes\n");
738 }
739 else if (ip)
740 {
741 LOG(3, s, session[s].tunnel, " Radius reply contains route for %s/%s\n",
742 fmtaddr(htonl(ip), 0), fmtaddr(htonl(mask), 1));
743
744 session[s].route[routes].ip = ip;
745 session[s].route[routes].mask = mask;
746 routes++;
747 }
748 }
749 else if (*p == 11)
750 {
751 // Filter-Id
752 char *filter = (char *) p + 2;
753 int l = p[1] - 2;
754 char *suffix;
755 int f;
756 uint8_t *fp = 0;
757
758 LOG(3, s, session[s].tunnel, " Radius reply contains Filter-Id \"%.*s\"\n", l, filter);
759 if ((suffix = memchr(filter, '.', l)))
760 {
761 int b = suffix - filter;
762 if (l - b == 3 && !memcmp("in", suffix+1, 2))
763 fp = &session[s].filter_in;
764 else if (l - b == 4 && !memcmp("out", suffix+1, 3))
765 fp = &session[s].filter_out;
766
767 l = b;
768 }
769
770 if (!fp)
771 {
772 LOG(3, s, session[s].tunnel, " Invalid filter\n");
773 continue;
774 }
775
776 if ((f = find_filter(filter, l)) < 0 || !*ip_filters[f].name)
777 {
778 LOG(3, s, session[s].tunnel, " Unknown filter\n");
779 }
780 else
781 {
782 *fp = f + 1;
783 ip_filters[f].used++;
784 }
785 }
786 else if (*p == 27)
787 {
788 // Session-Timeout
789 if (p[1] < 6) continue;
790 session[s].session_timeout = ntohl(*(uint32_t *)(p + 2));
791 LOG(3, s, session[s].tunnel, " Radius reply contains Session-Timeout = %u\n", session[s].session_timeout);
792 if(!session[s].session_timeout && config->kill_timedout_sessions)
793 sessionshutdown(s, "Session timeout is zero", CDN_ADMIN_DISC, 0);
794 }
795 else if (*p == 28)
796 {
797 // Idle-Timeout
798 if (p[1] < 6) continue;
799 session[s].idle_timeout = ntohl(*(uint32_t *)(p + 2));
800 LOG(3, s, session[s].tunnel, " Radius reply contains Idle-Timeout = %u\n", session[s].idle_timeout);
801 }
802 else if (*p == 99)
803 {
804 // Framed-IPv6-Route
805 struct in6_addr r6;
806 int prefixlen;
807 uint8_t *n = p + 2;
808 uint8_t *e = p + p[1];
809 uint8_t *m = memchr(n, '/', e - p);
810
811 *m++ = 0;
812 inet_pton(AF_INET6, (char *) n, &r6);
813
814 prefixlen = 0;
815 while (m < e && isdigit(*m)) {
816 prefixlen = prefixlen * 10 + *m++ - '0';
817 }
818
819 if (prefixlen)
820 {
821 LOG(3, s, session[s].tunnel,
822 " Radius reply contains route for %s/%d\n",
823 n, prefixlen);
824 session[s].ipv6route = r6;
825 session[s].ipv6prefixlen = prefixlen;
826 }
827 }
828 else if (*p == 25)
829 {
830 // Class
831 if (p[1] < 3) continue;
832 session[s].classlen = p[1] - 2;
833 if (session[s].classlen > MAXCLASS)
834 session[s].classlen = MAXCLASS;
835 memcpy(session[s].class, p + 2, session[s].classlen);
836 }
837 }
838 }
839 else if (r_code == AccessReject)
840 {
841 LOG(2, s, session[s].tunnel, " Authentication rejected for %s\n", session[s].user);
842 sessionkill(s, "Authentication rejected");
843 break;
844 }
845
846 if (!session[s].dns1 && config->default_dns1)
847 {
848 session[s].dns1 = ntohl(config->default_dns1);
849 LOG(3, s, t, " Sending dns1 = %s\n", fmtaddr(config->default_dns1, 0));
850 }
851 if (!session[s].dns2 && config->default_dns2)
852 {
853 session[s].dns2 = ntohl(config->default_dns2);
854 LOG(3, s, t, " Sending dns2 = %s\n", fmtaddr(config->default_dns2, 0));
855 }
856
857 // Valid Session, set it up
858 session[s].unique_id = 0;
859 sessionsetup(s, t);
860 }
861 else
862 {
863 // An ack for a stop or start record.
864 LOG(3, s, t, " RADIUS accounting ack recv in state %s\n", radius_state(radius[r].state));
865 break;
866 }
867 } while (0);
868
869 // finished with RADIUS
870 radiusclear(r, s);
871 }
872
873 // Send a retry for RADIUS/CHAP message
874 void radiusretry(uint16_t r)
875 {
876 sessionidt s = radius[r].session;
877 tunnelidt t = 0;
878
879 CSTAT(radiusretry);
880
881 if (s) t = session[s].tunnel;
882
883 switch (radius[r].state)
884 {
885 case RADIUSCHAP: // sending CHAP down PPP
886 sendchap(s, t);
887 break;
888 case RADIUSAUTH: // sending auth to RADIUS server
889 case RADIUSJUSTAUTH: // sending auth to RADIUS server
890 case RADIUSSTART: // sending start accounting to RADIUS server
891 case RADIUSSTOP: // sending stop accounting to RADIUS server
892 case RADIUSINTERIM: // sending interim accounting to RADIUS server
893 radiussend(r, radius[r].state);
894 break;
895 default:
896 case RADIUSNULL: // Not in use
897 case RADIUSWAIT: // waiting timeout before available, in case delayed reply from RADIUS server
898 // free up RADIUS task
899 radiusclear(r, s);
900 LOG(3, s, session[s].tunnel, "Freeing up radius session %d\n", r);
901 break;
902 }
903 }
904
905 extern int daefd;
906
907 void processdae(uint8_t *buf, int len, struct sockaddr_in *addr, int alen, struct in_addr *local)
908 {
909 int i, r_code, r_id, length, attribute_length;
910 uint8_t *packet, attribute;
911 hasht hash;
912 char username[MAXUSER] = "";
913 in_addr_t nas = 0;
914 in_addr_t ip = 0;
915 uint32_t port = 0;
916 uint32_t error = 0;
917 sessionidt s = 0;
918 tunnelidt t;
919 int fin = -1;
920 int fout = -1;
921 uint8_t *avpair[64];
922 int avpair_len[sizeof(avpair)/sizeof(*avpair)];
923 int avp = 0;
924 int auth_only = 0;
925 uint8_t *p;
926
927 LOG(3, 0, 0, "DAE request from %s\n", fmtaddr(addr->sin_addr.s_addr, 0));
928 LOG_HEX(5, "DAE Request", buf, len);
929
930 if (len < 20 || len < ntohs(*(uint16_t *) (buf + 2)))
931 {
932 LOG(1, 0, 0, "Duff DAE request length %d\n", len);
933 return;
934 }
935
936 r_code = buf[0]; // request type
937 r_id = buf[1]; // radius indentifier.
938
939 if (r_code != DisconnectRequest && r_code != CoARequest)
940 {
941 LOG(1, 0, 0, "Unrecognised DAE request %s\n", radius_code(r_code));
942 return;
943 }
944
945 if (!config->cluster_iam_master)
946 {
947 master_forward_dae_packet(buf, len, addr->sin_addr.s_addr, addr->sin_port);
948 return;
949 }
950
951 len = ntohs(*(uint16_t *) (buf + 2));
952
953 LOG(3, 0, 0, "Received DAE %s, id %d\n", radius_code(r_code), r_id);
954
955 // check authenticator
956 calc_auth(buf, len, zero, hash);
957 if (memcmp(hash, buf + 4, 16) != 0)
958 {
959 LOG(1, 0, 0, "Incorrect vector in DAE request (wrong secret in radius config?)\n");
960 return;
961 }
962
963 // unpack attributes
964 packet = buf + 20;
965 length = len - 20;
966
967 while (length > 0)
968 {
969 attribute = *packet++;
970 attribute_length = *packet++;
971 if (attribute_length < 2)
972 break;
973
974 length -= attribute_length;
975 attribute_length -= 2;
976 switch (attribute)
977 {
978 case 1: /* username */
979 len = attribute_length < MAXUSER ? attribute_length : MAXUSER - 1;
980 memcpy(username, packet, len);
981 username[len] = 0;
982 LOG(4, 0, 0, " Received DAE User-Name: %s\n", username);
983 break;
984
985 case 4: /* nas ip address */
986 nas = *(uint32_t *) packet; // net order
987 if (nas != config->bind_address)
988 error = 403; // NAS identification mismatch
989
990 LOG(4, 0, 0, " Received DAE NAS-IP-Address: %s\n", fmtaddr(nas, 0));
991 break;
992
993 case 5: /* nas port */
994 port = ntohl(*(uint32_t *) packet);
995 if (port < 1 || port > MAXSESSION)
996 error = 404;
997
998 LOG(4, 0, 0, " Received DAE NAS-Port: %u\n", port);
999 break;
1000
1001 case 6: /* service type */
1002 {
1003 uint32_t service_type = ntohl(*(uint32_t *) packet);
1004 auth_only = service_type == 8; // Authenticate only
1005
1006 LOG(4, 0, 0, " Received DAE Service-Type: %u\n", service_type);
1007 }
1008 break;
1009
1010 case 8: /* ip address */
1011 ip = *(uint32_t *) packet; // net order
1012 LOG(4, 0, 0, " Received DAE Framed-IP-Address: %s\n", fmtaddr(ip, 0));
1013 break;
1014
1015 case 11: /* filter id */
1016 LOG(4, 0, 0, " Received DAE Filter-Id: %.*s\n", attribute_length, packet);
1017 if (!(p = memchr(packet, '.', attribute_length)))
1018 {
1019 error = 404; // invalid request
1020 break;
1021 }
1022
1023 len = p - packet;
1024 i = find_filter((char *) packet, len);
1025 if (i < 0 || !*ip_filters[i].name)
1026 {
1027 error = 404;
1028 break;
1029 }
1030
1031 if (!memcmp(p, ".in", attribute_length - len))
1032 fin = i + 1;
1033 else if (!memcmp(p, ".out", attribute_length - len))
1034 fout = i + 1;
1035 else
1036 error = 404;
1037
1038 break;
1039
1040 case 26: /* vendor specific */
1041 if (attribute_length >= 6
1042 && ntohl(*(uint32_t *) packet) == 9 // Cisco
1043 && *(packet + 4) == 1 // Cisco-AVPair
1044 && *(packet + 5) >= 2) // length
1045 {
1046 int len = *(packet + 5) - 2;
1047 uint8_t *a = packet + 6;
1048
1049 LOG(4, 0, 0, " Received DAE Cisco-AVPair: %.*s\n", len, a);
1050 if (avp < sizeof(avpair)/sizeof(*avpair) - 1)
1051 {
1052 avpair[avp] = a;
1053 avpair_len[avp++] = len;
1054 }
1055 }
1056 break;
1057 }
1058
1059 packet += attribute_length;
1060 }
1061
1062 if (!error && auth_only)
1063 {
1064 if (fin != -1 || fout != -1 || avp)
1065 error = 401; // unsupported attribute
1066 else
1067 error = 405; // unsupported service
1068 }
1069
1070 if (!error && !(port || ip || *username))
1071 error = 402; // missing attribute
1072
1073 // exact match for SID if given
1074 if (!error && port)
1075 {
1076 s = port;
1077 if (!session[s].opened)
1078 error = 503; // not found
1079 }
1080
1081 if (!error && ip)
1082 {
1083 // find/check session by IP
1084 i = sessionbyip(ip);
1085 if (!i || (s && s != i)) // not found or mismatching port
1086 error = 503;
1087 else
1088 s = i;
1089 }
1090
1091 if (!error && *username)
1092 {
1093 if (s)
1094 {
1095 if (strcmp(session[s].user, username))
1096 error = 503;
1097 }
1098 else if (!(s = sessionbyuser(username)))
1099 error = 503;
1100 }
1101
1102 t = session[s].tunnel;
1103
1104 switch (r_code)
1105 {
1106 case DisconnectRequest: // Packet of Disconnect/Death
1107 if (error)
1108 {
1109 r_code = DisconnectNAK;
1110 break;
1111 }
1112
1113 LOG(3, s, t, " DAE Disconnect %d (%s)\n", s, session[s].user);
1114 r_code = DisconnectACK;
1115
1116 sessionshutdown(s, "Requested by PoD", CDN_ADMIN_DISC, TERM_ADMIN_RESET); // disconnect session
1117 break;
1118
1119 case CoARequest: // Change of Authorization
1120 if (error)
1121 {
1122 r_code = CoANAK;
1123 break;
1124 }
1125
1126 LOG(3, s, t, " DAE Change %d (%s)\n", s, session[s].user);
1127 r_code = CoAACK;
1128
1129 // reset
1130 {
1131 struct param_radius_reset p = { &tunnel[session[s].tunnel], &session[s] };
1132 run_plugins(PLUGIN_RADIUS_RESET, &p);
1133 }
1134
1135 // apply filters
1136 if (fin == -1)
1137 fin = 0;
1138 else
1139 LOG(3, s, t, " Filter in %d (%s)\n", fin, ip_filters[fin - 1].name);
1140
1141 if (fout == -1)
1142 fout = 0;
1143 else
1144 LOG(3, s, t, " Filter out %d (%s)\n", fout, ip_filters[fout - 1].name);
1145
1146 filter_session(s, fin, fout);
1147
1148 // process cisco av-pair(s)
1149 for (i = 0; i < avp; i++)
1150 {
1151 LOG(3, s, t, " Cisco-AVPair: %.*s\n", avpair_len[i], avpair[i]);
1152 handle_avpair(s, avpair[i], avpair_len[i]);
1153 }
1154
1155 cluster_send_session(s);
1156 break;
1157 }
1158
1159 // send response
1160 packet = buf;
1161 *packet++ = r_code;
1162 *packet++ = r_id;
1163 // skip len + auth
1164 packet += 2 + 16;
1165 len = packet - buf;
1166
1167 // add attributes
1168 if (error)
1169 {
1170 // add error cause
1171 *packet++ = 101;
1172 *packet++ = 6;
1173 *(uint32_t *) packet = htonl(error);
1174 len += 6;
1175 }
1176
1177 *((uint16_t *)(buf + 2)) = htons(len);
1178
1179 // make vector
1180 calc_auth(buf, len, hash, buf + 4);
1181
1182 LOG(3, 0, 0, "Sending DAE %s, id=%d\n", radius_code(r_code), r_id);
1183
1184 // send DAE response
1185 if (sendtofrom(daefd, buf, len, MSG_DONTWAIT | MSG_NOSIGNAL, (struct sockaddr *) addr, alen, local) < 0)
1186 LOG(0, 0, 0, "Error sending DAE response packet: %s\n", strerror(errno));
1187 }