Annotation of embedaddon/coova-chilli/src/radius.c, revision 1.1.1.1
1.1 misho 1: /*
2: *
3: * Radius client functions.
4: * Copyright (C) 2003, 2004, 2005 Mondru AB.
5: * Copyright (c) 2006-2008 David Bird <david@coova.com>
6: *
7: * The contents of this file may be used under the terms of the GNU
8: * General Public License Version 2, provided that the above copyright
9: * notice and this permission notice is included in all copies or
10: * substantial portions of the software.
11: *
12: */
13:
14: #include "system.h"
15: #include "syserr.h"
16: #include "radius.h"
17: #include "md5.h"
18: #include "dhcp.h"
19: #include "redir.h"
20: #include "chilli.h"
21: #include "options.h"
22: #include "radius_wispr.h"
23: #include "radius_chillispot.h"
24:
25:
26: void radius_addnasip(struct radius_t *radius, struct radius_packet_t *pack) {
27: struct in_addr inaddr;
28: struct in_addr *paddr = 0;
29:
30: if (options.nasip && *options.nasip)
31: if (inet_aton(options.nasip, &inaddr))
32: paddr = &inaddr;
33:
34: if (!paddr && options.radiuslisten.s_addr != 0)
35: paddr = &options.radiuslisten;
36:
37: if (!paddr)
38: paddr = &options.uamlisten;
39:
40: radius_addattr(radius, pack, RADIUS_ATTR_NAS_IP_ADDRESS, 0, 0, ntohl(paddr->s_addr), NULL, 0);
41: }
42:
43: void radius_addcalledstation(struct radius_t *radius, struct radius_packet_t *pack) {
44: uint8_t b[24];
45: uint8_t *mac= (uint8_t*)"";
46:
47: if (options.nasmac)
48: mac = (uint8_t *)options.nasmac;
49: else
50: sprintf((char*)(mac=b), "%.2X-%.2X-%.2X-%.2X-%.2X-%.2X",
51: radius->nas_hwaddr[0],radius->nas_hwaddr[1],radius->nas_hwaddr[2],
52: radius->nas_hwaddr[3],radius->nas_hwaddr[4],radius->nas_hwaddr[5]);
53:
54: radius_addattr(radius, pack, RADIUS_ATTR_CALLED_STATION_ID, 0, 0, 0, mac, strlen((char*)mac));
55: }
56:
57: int radius_printqueue(struct radius_t *this) {
58: int n;
59: printf("next %d, first %d, last %d\n",
60: this->next, this->first, this ->last);
61:
62: for(n=0; n<256; n++) {
63: if (this->queue[n].state) {
64: printf("%3d %3d %3d %3d %8d %8d %d\n",
65: n, this->queue[n].state,
66: this->queue[n].next,
67: this->queue[n].prev,
68: (int) this->queue[n].timeout.tv_sec,
69: (int) this->queue[n].timeout.tv_usec,
70: (int) this->queue[n].retrans);
71: }
72: }
73:
74: return 0;
75: }
76:
77: /*
78: * radius_hmac_md5()
79: * Calculate HMAC MD5 on a radius packet.
80: */
81: int radius_hmac_md5(struct radius_t *this, struct radius_packet_t *pack,
82: char *secret, int secretlen, uint8_t *dst) {
83: unsigned char digest[RADIUS_MD5LEN];
84: size_t length;
85:
86: MD5_CTX context;
87:
88: uint8_t *key;
89: size_t key_len;
90:
91: unsigned char k_ipad[65];
92: unsigned char k_opad[65];
93: unsigned char tk[RADIUS_MD5LEN];
94: int i;
95:
96: if (secretlen > 64) { /* TODO: If Microsoft truncate to 64 instead */
97: MD5Init(&context);
98: MD5Update(&context, (uint8_t*)secret, secretlen);
99: MD5Final(tk, &context);
100: key = tk;
101: key_len = 16;
102: }
103: else {
104: key = (uint8_t*)secret;
105: key_len = secretlen;
106: }
107:
108: length = ntohs(pack->length);
109:
110: memset(k_ipad, 0x36, sizeof k_ipad);
111: memset(k_opad, 0x5c, sizeof k_opad);
112:
113: for (i=0; i<key_len; i++) {
114: k_ipad[i] ^= key[i];
115: k_opad[i] ^= key[i];
116: }
117:
118: /* Perform inner MD5 */
119: MD5Init(&context);
120: MD5Update(&context, k_ipad, 64);
121: MD5Update(&context, (uint8_t*) pack, length);
122: MD5Final(digest, &context);
123:
124: /* Perform outer MD5 */
125: MD5Init(&context);
126: MD5Update(&context, k_opad, 64);
127: MD5Update(&context, digest, 16);
128: MD5Final(digest, &context);
129:
130: memcpy(dst, digest, RADIUS_MD5LEN);
131:
132: return 0;
133: }
134:
135: /*
136: * radius_acctreq_authenticator()
137: * Update a packet with an accounting request authenticator
138: */
139: int radius_acctreq_authenticator(struct radius_t *this,
140: struct radius_packet_t *pack) {
141:
142: /* From RFC 2866: Authenticator is the MD5 hash of:
143: Code + Identifier + Length + 16 zero octets + request attributes +
144: shared secret */
145:
146: MD5_CTX context;
147:
148: memset(pack->authenticator, 0, RADIUS_AUTHLEN);
149:
150: /* Get MD5 hash on secret + authenticator */
151: MD5Init(&context);
152: MD5Update(&context, (void*) pack, ntohs(pack->length));
153: MD5Update(&context, (uint8_t*) this->secret, this->secretlen);
154: MD5Final(pack->authenticator, &context);
155:
156: return 0;
157: }
158:
159:
160: /*
161: * radius_authresp_authenticator()
162: * Update a packet with an authentication response authenticator
163: */
164: int radius_authresp_authenticator(struct radius_t *this,
165: struct radius_packet_t *pack,
166: uint8_t *req_auth,
167: char *secret, size_t secretlen) {
168:
169: /* From RFC 2865: Authenticator is the MD5 hash of:
170: Code + Identifier + Length + request authenticator + request attributes +
171: shared secret */
172:
173: MD5_CTX context;
174:
175: memcpy(pack->authenticator, req_auth, RADIUS_AUTHLEN);
176:
177: /* Get MD5 hash on secret + authenticator */
178: MD5Init(&context);
179: MD5Update(&context, (void*) pack, ntohs(pack->length));
180: MD5Update(&context, (uint8_t*) secret, secretlen);
181: MD5Final(pack->authenticator, &context);
182:
183: return 0;
184: }
185:
186:
187: /*
188: * radius_queue_in()
189: * Place data in queue for later retransmission.
190: */
191: int radius_queue_in(struct radius_t *this, struct radius_packet_t *pack,
192: void *cbp) {
193: struct timeval *tv;
194: struct radius_attr_t *ma = NULL; /* Message authenticator */
195:
196: if (this->debug) {
197: log_dbg("radius_queue_in");
198: radius_printqueue(this);
199: }
200:
201: if (this->queue[this->next].state == 1) {
202: log_err(0, "radius queue is full!");
203: /* Queue is not really full. It only means that the next space
204: in queue is not available, but there might be space elsewhere */
205: return -1;
206: }
207:
208: pack->id = this->next;
209:
210: /* If packet contains message authenticator: Calculate it! */
211: if (!radius_getattr(pack, &ma, RADIUS_ATTR_MESSAGE_AUTHENTICATOR, 0,0,0)) {
212: radius_hmac_md5(this, pack, this->secret, this->secretlen, ma->v.t);
213: }
214:
215: /* If accounting request: Calculate authenticator */
216: if (pack->code == RADIUS_CODE_ACCOUNTING_REQUEST)
217: radius_acctreq_authenticator(this, pack);
218:
219: memcpy(&this->queue[this->next].p, pack, RADIUS_PACKSIZE);
220: this->queue[this->next].state = 1;
221: this->queue[this->next].cbp = cbp;
222: this->queue[this->next].retrans = 0;
223:
224: tv = &this->queue[this->next].timeout;
225: gettimeofday(tv, NULL);
226:
227: tv->tv_sec += options.radiustimeout;
228:
229: this->queue[this->next].lastsent = this->lastreply;
230:
231: /* Insert in linked list for handling timeouts */
232: this->queue[this->next].next = -1; /* Last in queue */
233: this->queue[this->next].prev = this->last; /* Link to previous */
234:
235: if (this->last != -1)
236: this->queue[this->last].next=this->next; /* Link previous to us */
237: this->last = this->next; /* End of queue */
238:
239: if (this->first == -1)
240: this->first = this->next; /* First and last */
241:
242: this->next++; /* next = next % RADIUS_QUEUESIZE */
243:
244: if (this->debug) {
245: printf("radius_queue_out end\n");
246: radius_printqueue(this);
247: }
248:
249: return 0;
250: }
251:
252:
253: /*
254: * radius_queue_in()
255: * Remove data from queue.
256: */
257: int radius_queue_out(struct radius_t *this, struct radius_packet_t *pack,
258: int id, void **cbp) {
259:
260: if (this->debug) if (this->debug) printf("radius_queue_out\n");
261:
262: if (this->queue[id].state != 1) {
263: log_err(0, "No such id in radius queue: %d!", id);
264: return -1;
265: }
266:
267: if (this->debug) {
268: log_dbg("radius_queue_out");
269: radius_printqueue(this);
270: }
271:
272: memcpy(pack, &this->queue[id].p, RADIUS_PACKSIZE);
273: *cbp = this->queue[id].cbp;
274:
275: this->queue[id].state = 0;
276:
277: /* Remove from linked list */
278: if (this->queue[id].next == -1) /* Are we the last in queue? */
279: this->last = this->queue[id].prev;
280: else
281: this->queue[this->queue[id].next].prev = this->queue[id].prev;
282:
283: if (this->queue[id].prev == -1) /* Are we the first in queue? */
284: this->first = this->queue[id].next;
285: else
286: this->queue[this->queue[id].prev].next = this->queue[id].next;
287:
288: if (this->debug) {
289: log_dbg("radius_queue_out end");
290: radius_printqueue(this);
291: }
292:
293: return 0;
294: }
295:
296: /*
297: * radius_queue_reschedule()
298: * Recalculate the timeout value of a packet in the queue.
299: */
300: int radius_queue_reschedule(struct radius_t *this, int id) {
301: struct timeval *tv;
302:
303: /* sanity check */
304: if (id < 0 || id >= RADIUS_QUEUESIZE) {
305: log_err(0, "bad id (%d)", id);
306: return -1;
307: }
308:
309: if (this->debug)
310: log_dbg("radius_queue_reschedule");
311:
312: if (this->queue[id].state != 1) {
313: log_err(0, "No such id in radius queue: %d!", id);
314: return -1;
315: }
316:
317: if (this->debug) {
318: log_dbg("radius_reschedule");
319: radius_printqueue(this);
320: }
321:
322: this->queue[id].retrans++;
323:
324: tv = &this->queue[id].timeout;
325: gettimeofday(tv, NULL);
326:
327: tv->tv_sec += options.radiustimeout;
328:
329: /* Remove from linked list */
330: if (this->queue[id].next == -1) /* Are we the last in queue? */
331: this->last = this->queue[id].prev;
332: else
333: this->queue[this->queue[id].next].prev = this->queue[id].prev;
334:
335: if (this->queue[id].prev == -1) /* Are we the first in queue? */
336: this->first = this->queue[id].next;
337: else
338: this->queue[this->queue[id].prev].next = this->queue[id].next;
339:
340: /* Insert in linked list for handling timeouts */
341: this->queue[id].next = -1; /* Last in queue */
342: this->queue[id].prev = this->last; /* Link to previous (could be -1) */
343:
344: if (this->last != -1)
345: this->queue[this->last].next=id; /* If not empty: link previous to us */
346:
347: this->last = id; /* End of queue */
348:
349: if (this->first == -1)
350: this->first = id; /* First and last */
351:
352: if (this->debug) {
353: radius_printqueue(this);
354: }
355:
356: return 0;
357: }
358:
359:
360: /*
361: * radius_cmptv()
362: * Returns an integer less than, equal to or greater than zero if tv1
363: * is found, respectively, to be less than, to match or be greater than tv2.
364: */
365: int
366: radius_cmptv(struct timeval *tv1, struct timeval *tv2)
367: {
368: struct timeval diff;
369:
370: if (0) {
371: printf("tv1 %8d %8d tv2 %8d %8d\n",
372: (int) tv1->tv_sec, (int) tv1->tv_usec,
373: (int) tv2->tv_sec, (int) tv2->tv_usec);
374: }
375:
376: /* First take the difference with |usec| < 1000000 */
377: diff.tv_sec = (tv1->tv_usec - tv2->tv_usec) / 1000000 +
378: (tv1->tv_sec - tv2->tv_sec);
379: diff.tv_usec = (tv1->tv_usec - tv2->tv_usec) % 1000000;
380:
381: if (0) {
382: printf("tv1 %8d %8d tv2 %8d %8d diff %8d %8d\n",
383: (int) tv1->tv_sec, (int) tv1->tv_usec,
384: (int) tv2->tv_sec, (int) tv2->tv_usec,
385: (int) diff.tv_sec, (int) diff.tv_usec);
386: }
387:
388: /* If sec and usec have different polarity add or subtract 1 second */
389: if ((diff.tv_sec > 0) & (diff.tv_usec < 0)) {
390: diff.tv_sec--;
391: diff.tv_usec += 1000000;
392: }
393: if ((diff.tv_sec < 0) & (diff.tv_usec > 0)) {
394: diff.tv_sec++;
395: diff.tv_usec -= 1000000;
396: }
397: if (0) {
398: printf("tv1 %8d %8d tv2 %8d %8d diff %8d %8d\n",
399: (int) tv1->tv_sec, (int) tv1->tv_usec,
400: (int) tv2->tv_sec, (int) tv2->tv_usec,
401: (int) diff.tv_sec, (int) diff.tv_usec);
402: }
403:
404: if (diff.tv_sec < 0) {if (0) printf("-1\n"); return -1; }
405: if (diff.tv_sec > 0) {if (0) printf("1\n"); return 1; }
406:
407: if (diff.tv_usec < 0) {if (0) printf("-1\n"); return -1;}
408: if (diff.tv_usec > 0) {if (0) printf("1\n"); return 1;}
409: if (0) printf("0 \n");
410: return 0;
411:
412: }
413:
414:
415: /*
416: * radius_timeleft()
417: * Determines how nuch time is left until we need to call
418: * radius_timeout().
419: * Only modifies timeout if new value is lower than current value.
420: */
421: int
422: radius_timeleft(struct radius_t *this, struct timeval *timeout)
423: {
424: struct timeval now, later, diff;
425:
426: if (this->first == -1) /* Queue is empty */
427: return 0;
428:
429: gettimeofday(&now, NULL);
430: later.tv_sec = this->queue[this->first].timeout.tv_sec;
431: later.tv_usec = this->queue[this->first].timeout.tv_usec;
432:
433: /* First take the difference with |usec| < 1000000 */
434: diff.tv_sec = (later.tv_usec - now.tv_usec) / 1000000 +
435: (later.tv_sec - now.tv_sec);
436: diff.tv_usec = (later.tv_usec - now.tv_usec) % 1000000;
437:
438: /* If sec and usec have different polarity add or subtract 1 second */
439: if ((diff.tv_sec > 0) & (diff.tv_usec < 0)) {
440: diff.tv_sec--;
441: diff.tv_usec += 1000000;
442: }
443: if ((diff.tv_sec < 0) & (diff.tv_usec > 0)) {
444: diff.tv_sec++;
445: diff.tv_usec -= 1000000;
446: }
447:
448: /* If negative set to zero */
449: if ((diff.tv_sec < 0) || (diff.tv_usec < 0)) {
450: diff.tv_sec = 0;
451: diff.tv_usec = 0;
452: }
453:
454: /* If original was smaller do nothing */
455: if (radius_cmptv(timeout, &diff) <=0)
456: return 0;
457:
458: timeout->tv_sec = diff.tv_sec;
459: timeout->tv_usec = diff.tv_usec;
460: return 0;
461: }
462:
463: /*
464: * radius_timeout()
465: * Retransmit any outstanding packets. This function should be called at
466: * regular intervals. Use radius_timeleft() to determine how much time is
467: * left before this function should be called.
468: */
469: int radius_timeout(struct radius_t *this) {
470: /* Retransmit any outstanding packets */
471: /* Remove from queue if maxretrans exceeded */
472: struct timeval now;
473: struct sockaddr_in addr;
474: struct radius_packet_t pack_req;
475: void *cbp;
476:
477: gettimeofday(&now, NULL);
478:
479: #if(1)
480: if (this->debug) {
481: log_dbg("radius_timeout %8d %8d", (int)now.tv_sec, (int)now.tv_usec);
482: radius_printqueue(this);
483: }
484: #endif
485:
486: while (this->first != -1 &&
487: radius_cmptv(&now, &this->queue[this->first].timeout) >= 0) {
488:
489: if (this->queue[this->first].retrans < options.radiusretry) {
490: memset(&addr, 0, sizeof(addr));
491: addr.sin_family = AF_INET;
492:
493: if (this->queue[this->first].retrans == (options.radiusretrysec-1)) {
494: /* Use the other server for next retransmission */
495: if (this->queue[this->first].lastsent) {
496: addr.sin_addr = this->hisaddr0;
497: this->queue[this->first].lastsent = 0;
498: }
499: else {
500: addr.sin_addr = this->hisaddr1;
501: this->queue[this->first].lastsent = 1;
502: }
503: }
504: else {
505: /* Use the same server for next retransmission */
506: if (this->queue[this->first].lastsent) {
507: addr.sin_addr = this->hisaddr1;
508: }
509: else {
510: addr.sin_addr = this->hisaddr0;
511: }
512: }
513:
514: /* Use the correct port for accounting and authentication */
515: if (this->queue[this->first].p.code == RADIUS_CODE_ACCOUNTING_REQUEST)
516: addr.sin_port = htons(this->acctport);
517: else
518: addr.sin_port = htons(this->authport);
519:
520:
521: if (sendto(this->fd, &this->queue[this->first].p,
522: ntohs(this->queue[this->first].p.length), 0,
523: (struct sockaddr *) &addr, sizeof(addr)) < 0) {
524: log_err(errno, "sendto() failed!");
525: radius_queue_reschedule(this, this->first);
526: return -1;
527: }
528:
529: radius_queue_reschedule(this, this->first);
530: }
531: else { /* Finished retrans */
532: if (radius_queue_out(this, &pack_req, this->first, &cbp)) {
533: log_warn(0, "Matching request was not found in queue: %d!", this->first);
534: return -1;
535: }
536:
537: if ((pack_req.code == RADIUS_CODE_ACCOUNTING_REQUEST) &&
538: (this->cb_acct_conf))
539: return this->cb_acct_conf(this, NULL, &pack_req, cbp);
540:
541: if ((pack_req.code == RADIUS_CODE_ACCESS_REQUEST) &&
542: (this->cb_auth_conf))
543: return this->cb_auth_conf(this, NULL, &pack_req, cbp);
544: }
545: }
546:
547: if (this->debug) {
548: printf("radius_timeout\n");
549: if (this->first > 0) {
550: printf("first %d, timeout %8d %8d\n", this->first,
551: (int) this->queue[this->first].timeout.tv_sec,
552: (int) this->queue[this->first].timeout.tv_usec);
553: }
554: radius_printqueue(this);
555: }
556:
557: return 0;
558: }
559:
560:
561:
562: /*
563: * radius_addattr()
564: * Add an attribute to a packet. The packet length is modified
565: * accordingly.
566: * If data==NULL and dlen!=0 insert null attribute.
567: */
568: int
569: radius_addattr(struct radius_t *this, struct radius_packet_t *pack,
570: uint8_t type, uint32_t vendor_id, uint8_t vendor_type,
571: uint32_t value, uint8_t *data, uint16_t dlen) {
572: struct radius_attr_t *a;
573: char passwd[RADIUS_PWSIZE];
574: uint16_t length = ntohs(pack->length);
575: uint16_t vlen;
576: size_t pwlen;
577:
578: a = (struct radius_attr_t *)((uint8_t*)pack + length);
579:
580: if (type == RADIUS_ATTR_USER_PASSWORD) {
581: radius_pwencode(this,
582: (uint8_t*) passwd, RADIUS_PWSIZE,
583: &pwlen,
584: data, dlen,
585: pack->authenticator,
586: this->secret, this->secretlen);
587: data = (uint8_t *)passwd;
588: dlen = (uint16_t)pwlen;
589: }
590:
591: if (type != RADIUS_ATTR_VENDOR_SPECIFIC) {
592: if (dlen) { /* If dlen != 0 it is a text/string attribute */
593: vlen = dlen;
594: }
595: else {
596: vlen = 4; /* address, integer or time */
597: }
598:
599: if (vlen > RADIUS_ATTR_VLEN) {
600: log_warn(0, "Truncating RADIUS attribute (type:%d/%d/%d) from %d to %d bytes [%s]",
601: type, vendor_id, vendor_type, vlen, RADIUS_ATTR_VLEN, data);
602: vlen = RADIUS_ATTR_VLEN;
603: }
604:
605: if ((length+vlen+2) > RADIUS_PACKSIZE) {
606: log_err(0, "No more space!");
607: return -1;
608: }
609:
610: length += vlen + 2;
611:
612: pack->length = htons(length);
613:
614: a->t = type;
615: a->l = vlen+2;
616:
617: if (data)
618: memcpy(a->v.t, data, vlen);
619: else if (dlen)
620: memset(a->v.t, 0, vlen);
621: else
622: a->v.i = htonl(value);
623: }
624: else { /* Vendor specific */
625: if (dlen) { /* If dlen != 0 it is a text/string attribute */
626: vlen = dlen;
627: }
628: else {
629: vlen = 4; /* address, integer or time */
630: }
631:
632: if (vlen > RADIUS_ATTR_VLEN-8) {
633: log_warn(0, "Truncating RADIUS attribute (type:%d/%d/%d) from %d to %d [%s]",
634: type, vendor_id, vendor_type, vlen, RADIUS_ATTR_VLEN-8, data);
635: vlen = RADIUS_ATTR_VLEN-8;
636: }
637:
638: if ((length+vlen+2) > RADIUS_PACKSIZE) {
639: log_err(0, "No more space!");
640: return -1;
641: }
642:
643: length += vlen + 8;
644:
645: pack->length = htons(length);
646:
647: a->t = type;
648: a->l = vlen+8;
649:
650: a->v.vv.i = htonl(vendor_id);
651: a->v.vv.t = vendor_type;
652: a->v.vv.l = vlen+2;
653:
654: if (data)
655: memcpy(((void*) a)+8, data, dlen);
656: else if (dlen)
657: memset(((void*) a)+8, 0, dlen);
658: else
659: a->v.vv.v.i = htonl(value);
660: }
661:
662: return 0;
663: }
664:
665:
666: /*
667: * radius_getattr()
668: * Search for an attribute in a packet. Returns -1 if attribute is not found.
669: * The first instance matching attributes will be skipped
670: */
671: int
672: radius_getattr(struct radius_packet_t *pack, struct radius_attr_t **attr,
673: uint8_t type, uint32_t vendor_id, uint8_t vendor_type,
674: int instance) {
675: size_t offset = 0;
676: return radius_getnextattr(pack, attr, type, vendor_id, vendor_type, instance, &offset);
677: }
678:
679: int
680: radius_getnextattr(struct radius_packet_t *pack, struct radius_attr_t **attr,
681: uint8_t type, uint32_t vendor_id, uint8_t vendor_type,
682: int instance, size_t *roffset) {
683: struct radius_attr_t *t;
684: size_t len = ntohs(pack->length) - RADIUS_HDRSIZE;
685: size_t offset = *roffset;
686: int count = 0;
687:
688: if (0) {
689: printf("radius_getattr payload(len=%d,off=%d) %.2x %.2x %.2x %.2x\n",
690: len, offset, pack->payload[0], pack->payload[1], pack->payload[2],
691: pack->payload[3]);
692: }
693:
694: while (offset < len) {
695: t = (struct radius_attr_t *)(&pack->payload[offset]);
696:
697: if (0) {
698: printf("radius_getattr %d %d %d %.2x %.2x \n", t->t, t->l,
699: ntohl(t->v.vv.i), (int) t->v.vv.t, (int) t->v.vv.l);
700: }
701:
702: offset += t->l;
703:
704: if (t->t != type)
705: continue;
706:
707: if (t->t == RADIUS_ATTR_VENDOR_SPECIFIC &&
708: (ntohl(t->v.vv.i) != vendor_id || t->v.vv.t != vendor_type))
709: continue;
710:
711: if (count == instance) {
712:
713: if (type == RADIUS_ATTR_VENDOR_SPECIFIC)
714: *attr = (struct radius_attr_t *) &t->v.vv.t;
715: else
716: *attr = t;
717:
718: if (0) printf("Found\n");
719:
720: *roffset = offset;
721: return 0;
722: }
723: else {
724: count++;
725: }
726: }
727:
728: return -1; /* Not found */
729: }
730:
731: /*
732: * radius_countattr()
733: * Count the number of instances of an attribute in a packet.
734: */
735: int
736: radius_countattr(struct radius_packet_t *pack, uint8_t type) {
737: struct radius_attr_t *t;
738: size_t offset = 0;
739: int count = 0;
740:
741: /* Need to check pack -> length */
742:
743: do {
744: t = (struct radius_attr_t*)(&pack->payload[offset]);
745: if (t->t == type) {
746: count++;
747: }
748: offset += 2 + t->l;
749: } while (offset < ntohs(pack->length));
750:
751: if (0) printf("Count %d\n", count);
752: return count;
753: }
754:
755:
756: /*
757: * radius_cmpattr()
758: * Compare two attributes to see if they are the same.
759: */
760: int
761: radius_cmpattr(struct radius_attr_t *t1, struct radius_attr_t *t2) {
762: if (t1->t != t2->t) return -1;
763: if (t1->l != t2->l) return -1;
764: if (memcmp(t1->v.t, t2->v.t, t1->l)) return -1; /* Also int/time/addr */
765: return 0;
766: }
767:
768:
769: /*
770: * radius_keydecode()
771: * Decode an MPPE key using MD5.
772: */
773: int radius_keydecode(struct radius_t *this,
774: uint8_t *dst, size_t dstsize, size_t *dstlen,
775: uint8_t *src, size_t srclen,
776: uint8_t *authenticator,
777: char *secret, size_t secretlen) {
778: MD5_CTX context;
779: unsigned char b[RADIUS_MD5LEN];
780: int blocks;
781: int i, n;
782:
783: blocks = ((int)srclen - 2) / RADIUS_MD5LEN;
784:
785: if ((blocks * RADIUS_MD5LEN + 2) != (int)srclen) {
786: log_err(0, "radius_keydecode: srclen must be 2 plus n*16");
787: return -1;
788: }
789:
790: if (blocks < 1) {
791: log_err(0, "radius_keydecode srclen must be at least 18");
792: return -1;
793: }
794:
795: /* Get MD5 hash on secret + authenticator (First 16 octets) */
796: MD5Init(&context);
797: MD5Update(&context, (uint8_t *)secret, secretlen);
798: MD5Update(&context, authenticator, RADIUS_AUTHLEN);
799: MD5Update(&context, src, 2);
800: MD5Final(b, &context);
801:
802: if ((src[2] ^ b[0]) > dstsize) {
803: log_err(0,"radius_keydecode dstsize too small");
804: return -1;
805: }
806:
807: if ((src[2] ^ b[0]) > (srclen - 3)) {
808: log_err(0,"radius_keydecode dstlen > srclen - 3");
809: return -1;
810: }
811:
812: *dstlen = (size_t)(src[2] ^ b[0]);
813:
814: for (i = 1; i < RADIUS_MD5LEN; i++)
815: if ((i-1) < (int)*dstlen)
816: dst[i-1] = src[i+2] ^ b[i];
817:
818: /* Next blocks of 16 octets */
819: for (n=1; n < blocks; n++) {
820: MD5Init(&context);
821: MD5Update(&context, (uint8_t *)secret, secretlen);
822: MD5Update(&context, &src[2 + ((n-1) * RADIUS_MD5LEN)], RADIUS_MD5LEN);
823: MD5Final(b, &context);
824: for (i = 0; i < RADIUS_MD5LEN; i++)
825: if ((i-1+n*RADIUS_MD5LEN) < (int)*dstlen)
826: dst[i-1+n*RADIUS_MD5LEN] = src[i+2+n*RADIUS_MD5LEN] ^ b[i];
827: }
828:
829: return 0;
830: }
831:
832: /*
833: * radius_keyencode()
834: * Encode an MPPE key using MD5.
835: */
836: int radius_keyencode(struct radius_t *this,
837: uint8_t *dst, size_t dstsize, size_t *dstlen,
838: uint8_t *src, size_t srclen,
839: uint8_t *authenticator,
840: char *secret, size_t secretlen) {
841: MD5_CTX context;
842: unsigned char b[RADIUS_MD5LEN];
843: int blocks;
844: int i, n;
845:
846: blocks = ((int)srclen + 1) / RADIUS_MD5LEN;
847: if ((blocks * RADIUS_MD5LEN) < ((int)srclen + 1)) blocks++;
848:
849: if (((blocks * RADIUS_MD5LEN) + 2) > (int)dstsize) {
850: log_err(0, "radius_keyencode dstsize too small");
851: return -1;
852: }
853:
854: *dstlen = (size_t)((blocks * RADIUS_MD5LEN) + 2);
855:
856: /* Read two salt octets */
857: if (fread(dst, 1, 2, this->urandom_fp) != 2) {
858: log_err(errno, "fread() failed");
859: return -1;
860: }
861:
862: /* Get MD5 hash on secret + authenticator (First 16 octets) */
863: MD5Init(&context);
864: MD5Update(&context, (uint8_t *)secret, secretlen);
865: MD5Update(&context, authenticator, RADIUS_AUTHLEN);
866: MD5Update(&context, dst, 2);
867: MD5Final(b, &context);
868: dst[2] = (uint8_t)srclen ^ b[0]; /* Length of key */
869: for (i = 1; i < RADIUS_MD5LEN; i++)
870: if ((i-1) < (int)srclen)
871: dst[i+2] = src[i-1] ^ b[i];
872: else
873: dst[i+2] = b[i];
874:
875: /* Get MD5 hash on secret + c(n-1) (Next j 16 octets) */
876: for (n=1; n < blocks; n++) {
877: MD5Init(&context);
878: MD5Update(&context, (uint8_t *)secret, secretlen);
879: MD5Update(&context, &dst[2 + ((n-1) * RADIUS_MD5LEN)], RADIUS_MD5LEN);
880: MD5Final(b, &context);
881: for (i = 0; i < RADIUS_MD5LEN; i++)
882: if ((i-1) < (int)srclen)
883: dst[i+2+n*RADIUS_MD5LEN] = src[i-1+n*RADIUS_MD5LEN] ^ b[i];
884: else
885: dst[i+2+n*RADIUS_MD5LEN] = b[i];
886: }
887:
888: return 0;
889: }
890:
891:
892: /*
893: * radius_pwdecode()
894: * Decode a password using MD5. Also used for MSCHAPv1 MPPE keys.
895: */
896: int radius_pwdecode(struct radius_t *this,
897: uint8_t *dst, size_t dstsize, size_t *dstlen,
898: uint8_t *src, size_t srclen,
899: uint8_t *authenticator,
900: char *secret, size_t secretlen) {
901: int i, n;
902: MD5_CTX context;
903: unsigned char output[RADIUS_MD5LEN];
904:
905: if (srclen > dstsize) {
906: log_err(0, "radius_pwdecode srclen larger than dstsize");
907: return -1;
908: }
909:
910: if (srclen % RADIUS_MD5LEN) {
911: log_err(0, "radius_pwdecode srclen is not multiple of 16 octets");
912: return -1;
913: }
914:
915: *dstlen = srclen;
916:
917: if (this->debug) {
918: printf("pwdecode srclen %d\n", srclen);
919: for (n=0; n< srclen; n++) {
920: printf("%.2x ", src[n]);
921: if ((n % 16) == 15)
922: printf("\n");
923: }
924: printf("\n");
925:
926: printf("pwdecode authenticator \n");
927: for (n=0; n< RADIUS_AUTHLEN; n++) {
928: printf("%.2x ", authenticator[n]);
929: if ((n % 16) == 15)
930: printf("\n");
931: }
932: printf("\n");
933:
934: printf("pwdecode secret \n");
935: for (n=0; n< secretlen; n++) {
936: printf("%.2x ", secret[n]);
937: if ((n % 16) == 15)
938: printf("\n");
939: }
940: printf("\n");
941: }
942:
943: /* Get MD5 hash on secret + authenticator */
944: MD5Init(&context);
945: MD5Update(&context, (uint8_t*) secret, secretlen);
946: MD5Update(&context, authenticator, RADIUS_AUTHLEN);
947: MD5Final(output, &context);
948:
949: /* XOR first 16 octets of passwd with MD5 hash */
950: for (i = 0; i < RADIUS_MD5LEN; i++)
951: dst[i] = src[i] ^ output[i];
952:
953: /* Continue with the remaining octets of passwd if any */
954: for (n = 0; n < 128 && n < (*dstlen - RADIUS_AUTHLEN); n += RADIUS_AUTHLEN) {
955: MD5Init(&context);
956: MD5Update(&context, (uint8_t*) secret, secretlen);
957: MD5Update(&context, src + n, RADIUS_AUTHLEN);
958: MD5Final(output, &context);
959: for (i = 0; i < RADIUS_AUTHLEN; i++)
960: dst[i + n + RADIUS_AUTHLEN] = src[i + n + RADIUS_AUTHLEN] ^ output[i];
961: }
962:
963: if (this->debug) {
964: printf("pwdecode dest \n");
965: for (n=0; n< 32; n++) {
966: printf("%.2x ", dst[n]);
967: if ((n % 16) == 15)
968: printf("\n");
969: }
970: printf("\n");
971: }
972:
973: return 0;
974: }
975:
976:
977: /*
978: * radius_pwencode()
979: * Encode a password using MD5.
980: */
981: int radius_pwencode(struct radius_t *this,
982: uint8_t *dst, size_t dstsize,
983: size_t *dstlen,
984: uint8_t *src, size_t srclen,
985: uint8_t *authenticator,
986: char *secret, size_t secretlen) {
987:
988: unsigned char output[RADIUS_MD5LEN];
989: MD5_CTX context;
990: size_t i, n;
991:
992: memset(dst, 0, dstsize);
993:
994: /* Make dstlen multiple of 16 */
995: if (srclen & 0x0f)
996: *dstlen = (srclen & 0xf0) + 0x10; /* Padding 1 to 15 zeros */
997: else
998: *dstlen = srclen; /* No padding */
999:
1000: /* Is dstsize too small ? */
1001: if (dstsize <= *dstlen) {
1002: *dstlen = 0;
1003: return -1;
1004: }
1005:
1006: /* Copy first 128 octets of src into dst */
1007: if (srclen > 128)
1008: memcpy(dst, src, 128);
1009: else
1010: memcpy(dst, src, srclen);
1011:
1012: /* Get MD5 hash on secret + authenticator */
1013: MD5Init(&context);
1014: MD5Update(&context, (uint8_t*) secret, secretlen);
1015: MD5Update(&context, authenticator, RADIUS_AUTHLEN);
1016: MD5Final(output, &context);
1017:
1018: /* XOR first 16 octets of dst with MD5 hash */
1019: for (i = 0; i < RADIUS_MD5LEN; i++)
1020: dst[i] ^= output[i];
1021:
1022: /* if (*dstlen <= RADIUS_MD5LEN) return 0; Finished */
1023:
1024: /* Continue with the remaining octets of dst if any */
1025: for (n = 0;
1026: n < 128 && n < (*dstlen - RADIUS_AUTHLEN);
1027: n += RADIUS_AUTHLEN) {
1028: MD5Init(&context);
1029: MD5Update(&context, (uint8_t*) secret, secretlen);
1030: MD5Update(&context, dst + n, RADIUS_AUTHLEN);
1031: MD5Final(output, &context);
1032: for (i = 0; i < RADIUS_AUTHLEN; i++)
1033: dst[i + n + RADIUS_AUTHLEN] ^= output[i];
1034: }
1035:
1036: return 0;
1037: }
1038:
1039:
1040: /*
1041: * radius_new()
1042: * Allocate a new radius instance.
1043: */
1044: int radius_new(struct radius_t **this,
1045: struct in_addr *listen, uint16_t port, int coanocheck,
1046: struct in_addr *proxylisten, uint16_t proxyport,
1047: struct in_addr *proxyaddr, struct in_addr *proxymask,
1048: char* proxysecret) {
1049: struct sockaddr_in addr;
1050: struct radius_t *new_radius;
1051:
1052: /* Allocate storage for instance */
1053: if (!(new_radius = calloc(sizeof(struct radius_t), 1))) {
1054: log_err(0, "calloc() failed");
1055: return -1;
1056: }
1057:
1058: new_radius->coanocheck = coanocheck;
1059:
1060: /* Radius parameters */
1061: new_radius->ouraddr.s_addr = listen->s_addr;
1062: new_radius->ourport = port;
1063:
1064: /* Proxy parameters */
1065: if (proxylisten && proxyport && proxysecret) {
1066: new_radius->proxylisten.s_addr = proxylisten->s_addr;
1067: new_radius->proxyport = proxyport;
1068:
1069: if (proxyaddr)
1070: new_radius->proxyaddr.s_addr = proxyaddr->s_addr;
1071: else
1072: new_radius->proxyaddr.s_addr = ~0;
1073:
1074: if (proxymask)
1075: new_radius->proxymask.s_addr = proxymask->s_addr;
1076: else
1077: new_radius->proxymask.s_addr = 0;
1078:
1079: if ((new_radius->proxysecretlen = strlen(proxysecret)) < RADIUS_SECRETSIZE) {
1080: memcpy(new_radius->proxysecret, proxysecret, new_radius->proxysecretlen);
1081: }
1082: }
1083:
1084: /* Initialise queue */
1085: new_radius->next = 0;
1086: new_radius->first = -1;
1087: new_radius->last = -1;
1088:
1089: if ((new_radius->urandom_fp = fopen("/dev/urandom", "r")) < 0) {
1090: log_err(errno, "fopen(/dev/urandom, r) failed");
1091: free(new_radius);
1092: return -1;
1093: }
1094:
1095: /* Initialise radius socket */
1096: if ((new_radius->fd = socket(AF_INET, SOCK_DGRAM, 0)) < 0 ) {
1097: log_err(errno, "socket() failed!");
1098: fclose(new_radius->urandom_fp);
1099: free(new_radius);
1100: return -1;
1101: }
1102:
1103: memset(&addr, 0, sizeof(addr));
1104: addr.sin_family = AF_INET;
1105: addr.sin_addr = new_radius->ouraddr;
1106: addr.sin_port = htons(new_radius->ourport);
1107:
1108: if (bind(new_radius->fd, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
1109: log_err(errno, "bind() failed!");
1110: fclose(new_radius->urandom_fp);
1111: close(new_radius->fd);
1112: free(new_radius);
1113: return -1;
1114: }
1115:
1116: /* Initialise proxy socket */
1117: if (proxylisten && proxyport && proxysecret) {
1118: if ((new_radius->proxyfd = socket(AF_INET, SOCK_DGRAM, 0)) < 0 ) {
1119: log_err(errno, "socket() failed for proxyfd!");
1120: fclose(new_radius->urandom_fp);
1121: close(new_radius->fd);
1122: free(new_radius);
1123: return -1;
1124: }
1125:
1126: memset(&addr, 0, sizeof(addr));
1127: addr.sin_family = AF_INET;
1128: addr.sin_addr = new_radius->proxylisten;
1129: addr.sin_port = htons(new_radius->proxyport);
1130:
1131: if (bind(new_radius->proxyfd, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
1132: log_err(errno, "bind() failed for proxylisten!");
1133: fclose(new_radius->urandom_fp);
1134: close(new_radius->fd);
1135: close(new_radius->proxyfd);
1136: free(new_radius);
1137: return -1;
1138: }
1139: }
1140: else {
1141: new_radius->proxyfd = -1; /* Indicate that proxy is not used */
1142: }
1143:
1144: *this = new_radius;
1145: return 0;
1146: }
1147:
1148:
1149: /*
1150: * radius_free()
1151: * Free a radius instance. (Undo radius_new()
1152: */
1153: int
1154: radius_free(struct radius_t *this)
1155: {
1156: if (fclose(this->urandom_fp)) {
1157: log_err(errno, "fclose() failed!");
1158: }
1159: if (close(this->fd)) {
1160: log_err(errno, "close() failed!");
1161: }
1162: free(this);
1163: return 0;
1164: }
1165:
1166: void radius_set(struct radius_t *this, unsigned char *hwaddr, int debug) {
1167: this->debug = debug;
1168:
1169: /* Remote radius server parameters */
1170: this->hisaddr0.s_addr = options.radiusserver1.s_addr;
1171: this->hisaddr1.s_addr = options.radiusserver2.s_addr;
1172:
1173: if (options.radiusauthport) {
1174: this->authport = options.radiusauthport;
1175: }
1176: else {
1177: this->authport = RADIUS_AUTHPORT;
1178: }
1179:
1180: if (options.radiusacctport) {
1181: this->acctport = options.radiusacctport;
1182: }
1183: else {
1184: this->acctport = RADIUS_ACCTPORT;
1185: }
1186:
1187: if ((this->secretlen = strlen(options.radiussecret)) > RADIUS_SECRETSIZE) {
1188: log_err(0, "Radius secret too long. Truncating to %d characters",
1189: RADIUS_SECRETSIZE);
1190: this->secretlen = RADIUS_SECRETSIZE;
1191: }
1192:
1193: if (hwaddr)
1194: memcpy(this->nas_hwaddr, hwaddr, sizeof(this->nas_hwaddr));
1195:
1196: memcpy(this->secret, options.radiussecret, this->secretlen);
1197:
1198: this->lastreply = 0; /* Start out using server 0 */
1199: return;
1200: }
1201:
1202:
1203: /*
1204: * radius_set_cb_ind()
1205: * Set callback function received requests
1206: */
1207: int radius_set_cb_ind(struct radius_t *this,
1208: int (*cb_ind) (struct radius_t *radius, struct radius_packet_t *pack,
1209: struct sockaddr_in *peer)) {
1210:
1211: this->cb_ind = cb_ind;
1212: return 0;
1213: }
1214:
1215:
1216: /*
1217: * radius_set_cb_auth_conf()
1218: * Set callback function for responses to access request
1219: */
1220: int
1221: radius_set_cb_auth_conf(struct radius_t *this,
1222: int (*cb_auth_conf) (struct radius_t *radius, struct radius_packet_t *pack,
1223: struct radius_packet_t *pack_req, void *cbp)) {
1224:
1225: this->cb_auth_conf = cb_auth_conf;
1226: return 0;
1227: }
1228:
1229: /*
1230: * radius_set_cb_acct_conf()
1231: * Set callback function for responses to accounting request
1232: */
1233: int
1234: radius_set_cb_acct_conf(struct radius_t *this,
1235: int (*cb_acct_conf) (struct radius_t *radius, struct radius_packet_t *pack,
1236: struct radius_packet_t *pack_req, void *cbp)) {
1237:
1238: this->cb_acct_conf = cb_acct_conf;
1239: return 0;
1240: }
1241:
1242: /*
1243: * radius_set_cb_coa_ind()
1244: * Set callback function for coa and disconnect request
1245: */
1246: int
1247: radius_set_cb_coa_ind(struct radius_t *this,
1248: int (*cb_coa_ind) (struct radius_t *radius, struct radius_packet_t *pack,
1249: struct sockaddr_in *peer)) {
1250:
1251: this->cb_coa_ind = cb_coa_ind;
1252: return 0;
1253: }
1254:
1255:
1256: /*
1257: * radius_req()
1258: * Send of a packet and place it in the retransmit queue
1259: */
1260: int radius_req(struct radius_t *this,
1261: struct radius_packet_t *pack,
1262: void *cbp)
1263: {
1264: struct sockaddr_in addr;
1265: size_t len = ntohs(pack->length);
1266:
1267: /* Place packet in queue */
1268: if (radius_queue_in(this, pack, cbp)) {
1269: return -1;
1270: }
1271:
1272: memset(&addr, 0, sizeof(addr));
1273: addr.sin_family = AF_INET;
1274:
1275: if (this->debug) printf("Lastreply: %d\n", this->lastreply);
1276:
1277: if (!this->lastreply) {
1278: addr.sin_addr = this->hisaddr0;
1279: }
1280: else {
1281: addr.sin_addr = this->hisaddr1;
1282: }
1283:
1284: if (pack->code == RADIUS_CODE_ACCOUNTING_REQUEST)
1285: addr.sin_port = htons(this->acctport);
1286: else
1287: addr.sin_port = htons(this->authport);
1288:
1289:
1290: if (sendto(this->fd, pack, len, 0,
1291: (struct sockaddr *) &addr, sizeof(addr)) < 0) {
1292: log_err(errno, "sendto() failed!");
1293: return -1;
1294: }
1295:
1296: return 0;
1297: }
1298:
1299:
1300: /*
1301: * radius_resp()
1302: * Send of a packet (no retransmit queue)
1303: */
1304: int radius_resp(struct radius_t *this,
1305: struct radius_packet_t *pack,
1306: struct sockaddr_in *peer, uint8_t *req_auth) {
1307:
1308: size_t len = ntohs(pack->length);
1309: struct radius_attr_t *ma = NULL; /* Message authenticator */
1310:
1311: /* Prepare for message authenticator TODO */
1312: memset(pack->authenticator, 0, RADIUS_AUTHLEN);
1313: memcpy(pack->authenticator, req_auth, RADIUS_AUTHLEN);
1314:
1315: /* If packet contains message authenticator: Calculate it! */
1316: if (!radius_getattr(pack, &ma, RADIUS_ATTR_MESSAGE_AUTHENTICATOR, 0,0,0)) {
1317: radius_hmac_md5(this, pack, this->proxysecret, this->proxysecretlen, ma->v.t);
1318: }
1319:
1320: radius_authresp_authenticator(this, pack, req_auth,
1321: this->proxysecret,
1322: this->proxysecretlen);
1323:
1324: if (sendto(this->proxyfd, pack, len, 0,
1325: (struct sockaddr *) peer, sizeof(struct sockaddr_in)) < 0) {
1326: log_err(errno, "sendto() failed!");
1327: return -1;
1328: }
1329:
1330: return 0;
1331: }
1332:
1333: /*
1334: * radius_coaresp()
1335: * Send of a packet (no retransmit queue)
1336: */
1337: int radius_coaresp(struct radius_t *this,
1338: struct radius_packet_t *pack,
1339: struct sockaddr_in *peer, uint8_t *req_auth) {
1340:
1341: size_t len = ntohs(pack->length);
1342: struct radius_attr_t *ma = NULL; /* Message authenticator */
1343:
1344: /* Prepare for message authenticator TODO */
1345: memset(pack->authenticator, 0, RADIUS_AUTHLEN);
1346: memcpy(pack->authenticator, req_auth, RADIUS_AUTHLEN);
1347:
1348: /* If packet contains message authenticator: Calculate it! */
1349: if (!radius_getattr(pack, &ma, RADIUS_ATTR_MESSAGE_AUTHENTICATOR, 0,0,0)) {
1350: radius_hmac_md5(this, pack, this->secret, this->secretlen, ma->v.t);
1351: }
1352:
1353: radius_authresp_authenticator(this, pack, req_auth,
1354: this->secret,
1355: this->secretlen);
1356:
1357: if (sendto(this->fd, pack, len, 0,
1358: (struct sockaddr *) peer, sizeof(struct sockaddr_in)) < 0) {
1359: log_err(errno, "sendto() failed!");
1360: return -1;
1361: }
1362:
1363: return 0;
1364: }
1365:
1366:
1367: /*
1368: * radius_default_pack()
1369: * Return an empty packet which can be used in subsequent to
1370: * radius_addattr()
1371: */
1372: int
1373: radius_default_pack(struct radius_t *this,
1374: struct radius_packet_t *pack,
1375: int code)
1376: {
1377: memset(pack, 0, RADIUS_PACKSIZE);
1378: pack->code = code;
1379: pack->id = 0; /* Let the send procedure queue the packet and assign id */
1380: pack->length = htons(RADIUS_HDRSIZE);
1381:
1382: if (fread(pack->authenticator, 1, RADIUS_AUTHLEN, this->urandom_fp) != RADIUS_AUTHLEN) {
1383: log_err(errno, "fread() failed");
1384: return -1;
1385: }
1386:
1387: /* always add the chillispot version to requests */
1388: radius_addattr(this, pack, RADIUS_ATTR_VENDOR_SPECIFIC,
1389: RADIUS_VENDOR_CHILLISPOT, RADIUS_ATTR_CHILLISPOT_VERSION,
1390: 0, (uint8_t*)VERSION, strlen(VERSION));
1391:
1392: return 0;
1393: }
1394:
1395:
1396: /*
1397: * radius_authcheck()
1398: * Check that the authenticator on a reply is correct.
1399: */
1400: int radius_authcheck(struct radius_t *this, struct radius_packet_t *pack,
1401: struct radius_packet_t *pack_req)
1402: {
1403: uint8_t auth[RADIUS_AUTHLEN];
1404: MD5_CTX context;
1405:
1406: MD5Init(&context);
1407: MD5Update(&context, (uint8_t *) pack, RADIUS_HDRSIZE-RADIUS_AUTHLEN);
1408: MD5Update(&context, pack_req->authenticator, RADIUS_AUTHLEN);
1409: MD5Update(&context, ((uint8_t *) pack) + RADIUS_HDRSIZE,
1410: ntohs(pack->length) - RADIUS_HDRSIZE);
1411: MD5Update(&context, (uint8_t *)this->secret, this->secretlen);
1412: MD5Final(auth, &context);
1413:
1414: return memcmp(pack->authenticator, auth, RADIUS_AUTHLEN);
1415: }
1416:
1417: /*
1418: * radius_acctcheck()
1419: * Check that the authenticator on an accounting request is correct.
1420: */
1421: int radius_acctcheck(struct radius_t *this, struct radius_packet_t *pack)
1422: {
1423: uint8_t auth[RADIUS_AUTHLEN];
1424: uint8_t padd[RADIUS_AUTHLEN] = {0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0};
1425: MD5_CTX context;
1426:
1427: MD5Init(&context);
1428: MD5Update(&context, (uint8_t *)pack, RADIUS_HDRSIZE-RADIUS_AUTHLEN);
1429: MD5Update(&context, (uint8_t *)padd, RADIUS_AUTHLEN);
1430: MD5Update(&context, ((uint8_t *)pack) + RADIUS_HDRSIZE,
1431: ntohs(pack->length) - RADIUS_HDRSIZE);
1432: MD5Update(&context, (uint8_t *)this->secret, this->secretlen);
1433: MD5Final(auth, &context);
1434:
1435: return memcmp(pack->authenticator, auth, RADIUS_AUTHLEN);
1436: }
1437:
1438:
1439: /*
1440: * radius_decaps()
1441: * Read and process a received radius packet.
1442: */
1443: int radius_decaps(struct radius_t *this) {
1444: ssize_t status;
1445: struct radius_packet_t pack;
1446: struct radius_packet_t pack_req;
1447: void *cbp;
1448: struct sockaddr_in addr;
1449: socklen_t fromlen = sizeof(addr);
1450: int coarequest = 0;
1451:
1452: if (this->debug)
1453: log_dbg("Received radius packet");
1454:
1455: if ((status = recvfrom(this->fd, &pack, sizeof(pack), 0,
1456: (struct sockaddr *) &addr, &fromlen)) <= 0) {
1457: log_err(errno, "recvfrom() failed");
1458: return -1;
1459: }
1460:
1461: if (status < RADIUS_HDRSIZE) {
1462: log_warn(0, "Received radius packet which is too short: %d < %d!",
1463: status, RADIUS_HDRSIZE);
1464: return -1;
1465: }
1466:
1467: if (ntohs(pack.length) != (uint16_t)status) {
1468: log_warn(errno, "Received radius packet with wrong length field %d != %d!",
1469: ntohs(pack.length), status);
1470: return -1;
1471: }
1472:
1473:
1474: switch (pack.code) {
1475: case RADIUS_CODE_DISCONNECT_REQUEST:
1476: case RADIUS_CODE_COA_REQUEST:
1477: coarequest = 1;
1478: break;
1479: default:
1480: coarequest = 0;
1481: }
1482:
1483: if (!coarequest) {
1484: /* Check that reply is from correct address */
1485: if ((addr.sin_addr.s_addr != this->hisaddr0.s_addr) &&
1486: (addr.sin_addr.s_addr != this->hisaddr1.s_addr)) {
1487: log_warn(0, "Received radius reply from wrong address %.8x!",
1488: addr.sin_addr.s_addr);
1489: return -1;
1490: }
1491:
1492: /* Check that UDP source port is correct */
1493: if ((addr.sin_port != htons(this->authport)) &&
1494: (addr.sin_port != htons(this->acctport))) {
1495: log_warn(0, "Received radius packet from wrong port %.4x!",
1496: addr.sin_port);
1497: return -1;
1498: }
1499:
1500: if (radius_queue_out(this, &pack_req, pack.id, &cbp)) {
1501: log_warn(0, "Matching request was not found in queue: %d!", pack.id);
1502: return -1;
1503: }
1504:
1505: if (radius_authcheck(this, &pack, &pack_req)) {
1506: log_warn(0, "Authenticator does not match request!");
1507: return -1;
1508: }
1509:
1510: /* Set which radius server to use next */
1511: if (addr.sin_addr.s_addr == this->hisaddr0.s_addr)
1512: this->lastreply = 0;
1513: else
1514: this->lastreply = 1;
1515:
1516: }
1517: else {
1518: if (!this->coanocheck) {
1519: /* Check that request is from correct address */
1520: if ((addr.sin_addr.s_addr != this->hisaddr0.s_addr) &&
1521: (addr.sin_addr.s_addr != this->hisaddr1.s_addr)) {
1522: log_warn(0, "Received radius request from wrong address %.8x!",
1523: addr.sin_addr.s_addr);
1524: return -1;
1525: }
1526: }
1527:
1528: if (radius_acctcheck(this, &pack)) {
1529: log_warn(0, "Authenticator did not match MD5 of packet!");
1530: return -1;
1531: }
1532: }
1533:
1534: /* TODO: Check consistency of attributes vs packet length */
1535:
1536: switch (pack.code) {
1537: case RADIUS_CODE_ACCESS_ACCEPT:
1538: case RADIUS_CODE_ACCESS_REJECT:
1539: case RADIUS_CODE_ACCESS_CHALLENGE:
1540: case RADIUS_CODE_DISCONNECT_ACK:
1541: case RADIUS_CODE_DISCONNECT_NAK:
1542: case RADIUS_CODE_STATUS_ACCEPT:
1543: case RADIUS_CODE_STATUS_REJECT:
1544: if (this->cb_auth_conf)
1545: return this->cb_auth_conf(this, &pack, &pack_req, cbp);
1546: else
1547: return 0;
1548: break;
1549: case RADIUS_CODE_ACCOUNTING_RESPONSE:
1550: if (this->cb_acct_conf)
1551: return this->cb_acct_conf(this, &pack, &pack_req, cbp);
1552: else
1553: return 0;
1554: break;
1555: case RADIUS_CODE_DISCONNECT_REQUEST:
1556: case RADIUS_CODE_COA_REQUEST:
1557: if (this->cb_coa_ind)
1558: return this->cb_coa_ind(this, &pack, &addr);
1559: else
1560: return 0;
1561: break;
1562: default:
1563: log_warn(0, "Received unknown radius packet %d!", pack.code);
1564: return -1;
1565: }
1566:
1567: log_warn(0, "Received unknown radius packet %d!", pack.code);
1568: return -1;
1569: }
1570:
1571: /*
1572: * radius_proxy_ind()
1573: * Read and process a received radius packet.
1574: */
1575: int radius_proxy_ind(struct radius_t *this) {
1576: ssize_t status;
1577: struct radius_packet_t pack;
1578: struct sockaddr_in addr;
1579: socklen_t fromlen = sizeof(addr);
1580:
1581: if (this->debug)
1582: log_dbg("Received radius packet");
1583:
1584: if ((status = recvfrom(this->proxyfd, &pack, sizeof(pack), 0,
1585: (struct sockaddr *) &addr, &fromlen)) <= 0) {
1586: log_err(errno, "recvfrom() failed");
1587: return -1;
1588: }
1589:
1590: if (status < RADIUS_HDRSIZE) {
1591: log_warn(0, "Received radius packet which is too short: %d < %d!",
1592: status, RADIUS_HDRSIZE);
1593: return -1;
1594: }
1595:
1596: if (ntohs(pack.length) != (uint16_t)status) {
1597: log_err(0, "Received radius packet with wrong length field %d != %d!",
1598: ntohs(pack.length), status);
1599: return -1;
1600: }
1601:
1602: /* Is this a known request? */
1603: if ((this->cb_ind) &&
1604: ((pack.code == RADIUS_CODE_ACCESS_REQUEST) ||
1605: (pack.code == RADIUS_CODE_ACCOUNTING_REQUEST) ||
1606: (pack.code == RADIUS_CODE_DISCONNECT_REQUEST) ||
1607: (pack.code == RADIUS_CODE_STATUS_REQUEST))) {
1608:
1609: /* Check that request is from a known client */
1610: /* Any of the two servers or from one of the clients */
1611: if ((addr.sin_addr.s_addr & this->proxymask.s_addr)!=
1612: this->proxyaddr.s_addr) {
1613: log_warn(0, "Received radius request from wrong address %.8x!",
1614: addr.sin_addr.s_addr);
1615: return -1;
1616: }
1617:
1618: return this->cb_ind(this, &pack, &addr);
1619: }
1620:
1621: log_warn(0, "Received unknown radius packet %d!", pack.code);
1622: return -1;
1623: }
1624:
1625: struct app_conn_t admin_session;
1626:
1627: int chilliauth_radius(struct radius_t *radius) {
1628: struct radius_packet_t radius_pack;
1629: int ret = -1;
1630:
1631: if (radius_default_pack(radius, &radius_pack, RADIUS_CODE_ACCESS_REQUEST)) {
1632: log_err(0, "radius_default_pack() failed");
1633: return ret;
1634: }
1635:
1636: /* adminuser is required */
1637: radius_addattr(radius, &radius_pack, RADIUS_ATTR_USER_NAME, 0, 0, 0,
1638: (uint8_t *)options.adminuser, strlen(options.adminuser));
1639:
1640: if (options.adminpasswd)
1641: radius_addattr(radius, &radius_pack, RADIUS_ATTR_USER_PASSWORD, 0, 0, 0,
1642: (uint8_t *)options.adminpasswd, strlen(options.adminpasswd));
1643:
1644: radius_addattr(radius, &radius_pack, RADIUS_ATTR_SERVICE_TYPE, 0, 0,
1645: RADIUS_SERVICE_TYPE_ADMIN_USER, NULL, 0);
1646:
1647:
1648: radius_addattr(radius, &radius_pack, RADIUS_ATTR_NAS_PORT_TYPE, 0, 0,
1649: options.radiusnasporttype, NULL, 0);
1650:
1651: radius_addnasip(radius, &radius_pack);
1652:
1653: radius_addcalledstation(radius, &radius_pack);
1654:
1655: if (options.radiusnasid)
1656: radius_addattr(radius, &radius_pack, RADIUS_ATTR_NAS_IDENTIFIER, 0, 0, 0,
1657: (uint8_t *)options.radiusnasid, strlen(options.radiusnasid));
1658:
1659: if (options.radiuslocationid)
1660: radius_addattr(radius, &radius_pack, RADIUS_ATTR_VENDOR_SPECIFIC,
1661: RADIUS_VENDOR_WISPR, RADIUS_ATTR_WISPR_LOCATION_ID, 0,
1662: (uint8_t *)options.radiuslocationid, strlen(options.radiuslocationid));
1663:
1664: if (options.radiuslocationname)
1665: radius_addattr(radius, &radius_pack, RADIUS_ATTR_VENDOR_SPECIFIC,
1666: RADIUS_VENDOR_WISPR, RADIUS_ATTR_WISPR_LOCATION_NAME, 0,
1667: (uint8_t *)options.radiuslocationname,
1668: strlen(options.radiuslocationname));
1669:
1670: radius_addattr(radius, &radius_pack, RADIUS_ATTR_ACCT_SESSION_ID, 0, 0, 0,
1671: (uint8_t*)admin_session.s_state.sessionid, REDIR_SESSIONID_LEN-1);
1672:
1673: if (admin_session.s_state.redir.classlen) {
1674: radius_addattr(radius, &radius_pack, RADIUS_ATTR_CLASS, 0, 0, 0,
1675: admin_session.s_state.redir.classbuf,
1676: admin_session.s_state.redir.classlen);
1677: }
1678:
1679: radius_addattr(radius, &radius_pack, RADIUS_ATTR_MESSAGE_AUTHENTICATOR,
1680: 0, 0, 0, NULL, RADIUS_MD5LEN);
1681:
1682: return radius_req(radius, &radius_pack, &admin_session);
1683: }
1684:
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>