19a10bb17SJohn Polstra /*-
25e53a4f9SPedro F. Giffuni * SPDX-License-Identifier: BSD-3-Clause
35e53a4f9SPedro F. Giffuni *
49a10bb17SJohn Polstra * Copyright 1998 Juniper Networks, Inc.
59a10bb17SJohn Polstra * All rights reserved.
64d6991c6SDag-Erling Smørgrav * Copyright (c) 2001-2003 Networks Associates Technology, Inc.
78d3978c1SDag-Erling Smørgrav * All rights reserved.
8*716eff47SDag-Erling Smørgrav * Copyright (c) 2015-2018 The University of Oslo
9*716eff47SDag-Erling Smørgrav * All rights reserved.
108d3978c1SDag-Erling Smørgrav *
118d3978c1SDag-Erling Smørgrav * Portions of this software were developed for the FreeBSD Project by
128d3978c1SDag-Erling Smørgrav * ThinkSec AS and NAI Labs, the Security Research Division of Network
138d3978c1SDag-Erling Smørgrav * Associates, Inc. under DARPA/SPAWAR contract N66001-01-C-8035
148d3978c1SDag-Erling Smørgrav * ("CBOSS"), as part of the DARPA CHATS research program.
159a10bb17SJohn Polstra *
169a10bb17SJohn Polstra * Redistribution and use in source and binary forms, with or without
179a10bb17SJohn Polstra * modification, are permitted provided that the following conditions
189a10bb17SJohn Polstra * are met:
199a10bb17SJohn Polstra * 1. Redistributions of source code must retain the above copyright
209a10bb17SJohn Polstra * notice, this list of conditions and the following disclaimer.
219a10bb17SJohn Polstra * 2. Redistributions in binary form must reproduce the above copyright
229a10bb17SJohn Polstra * notice, this list of conditions and the following disclaimer in the
239a10bb17SJohn Polstra * documentation and/or other materials provided with the distribution.
248d3978c1SDag-Erling Smørgrav * 3. The name of the author may not be used to endorse or promote
258d3978c1SDag-Erling Smørgrav * products derived from this software without specific prior written
268d3978c1SDag-Erling Smørgrav * permission.
279a10bb17SJohn Polstra *
289a10bb17SJohn Polstra * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
299a10bb17SJohn Polstra * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
309a10bb17SJohn Polstra * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
319a10bb17SJohn Polstra * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
329a10bb17SJohn Polstra * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
339a10bb17SJohn Polstra * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
349a10bb17SJohn Polstra * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
359a10bb17SJohn Polstra * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
369a10bb17SJohn Polstra * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
379a10bb17SJohn Polstra * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
389a10bb17SJohn Polstra * SUCH DAMAGE.
399a10bb17SJohn Polstra */
409a10bb17SJohn Polstra
419a10bb17SJohn Polstra #include <sys/param.h>
42f142677bSMaxim Sobolev #include <sys/socket.h>
43f142677bSMaxim Sobolev #include <netdb.h>
449a10bb17SJohn Polstra #include <pwd.h>
459a10bb17SJohn Polstra #include <radlib.h>
469a10bb17SJohn Polstra #include <stdlib.h>
479a10bb17SJohn Polstra #include <string.h>
489a10bb17SJohn Polstra #include <syslog.h>
499a10bb17SJohn Polstra #include <unistd.h>
509a10bb17SJohn Polstra
519a10bb17SJohn Polstra #define PAM_SM_AUTH
528d3978c1SDag-Erling Smørgrav
538c66575dSDag-Erling Smørgrav #include <security/pam_appl.h>
549a10bb17SJohn Polstra #include <security/pam_modules.h>
558c66575dSDag-Erling Smørgrav #include <security/pam_mod_misc.h>
569a10bb17SJohn Polstra
57545aa471SDag-Erling Smørgrav #define PAM_OPT_CONF "conf"
58545aa471SDag-Erling Smørgrav #define PAM_OPT_TEMPLATE_USER "template_user"
59545aa471SDag-Erling Smørgrav #define PAM_OPT_NAS_ID "nas_id"
60f142677bSMaxim Sobolev #define PAM_OPT_NAS_IPADDR "nas_ipaddr"
61*716eff47SDag-Erling Smørgrav #define PAM_OPT_NO_REPLYMSG "no_reply_message"
621642eb1aSMark Murray
639a10bb17SJohn Polstra #define MAX_CHALLENGE_MSGS 10
64111ccd25SDag-Erling Smørgrav #define PASSWORD_PROMPT "RADIUS Password:"
659a10bb17SJohn Polstra
669a10bb17SJohn Polstra static int build_access_request(struct rad_handle *, const char *,
67f8b83996SDag-Erling Smørgrav const char *, const char *, const char *, const char *,
68f8b83996SDag-Erling Smørgrav const void *, size_t);
699a10bb17SJohn Polstra static int do_accept(pam_handle_t *, struct rad_handle *);
709a10bb17SJohn Polstra static int do_challenge(pam_handle_t *, struct rad_handle *,
71f8b83996SDag-Erling Smørgrav const char *, const char *, const char *, const char *);
729a10bb17SJohn Polstra
739a10bb17SJohn Polstra /*
749a10bb17SJohn Polstra * Construct an access request, but don't send it. Returns 0 on success,
759a10bb17SJohn Polstra * -1 on failure.
769a10bb17SJohn Polstra */
779a10bb17SJohn Polstra static int
build_access_request(struct rad_handle * radh,const char * user,const char * pass,const char * nas_id,const char * nas_ipaddr,const char * rhost,const void * state,size_t state_len)789a10bb17SJohn Polstra build_access_request(struct rad_handle *radh, const char *user,
79f142677bSMaxim Sobolev const char *pass, const char *nas_id, const char *nas_ipaddr,
80f8b83996SDag-Erling Smørgrav const char *rhost, const void *state, size_t state_len)
819a10bb17SJohn Polstra {
82f142677bSMaxim Sobolev int error;
839a10bb17SJohn Polstra char host[MAXHOSTNAMELEN];
84f142677bSMaxim Sobolev struct sockaddr_in *haddr;
85f142677bSMaxim Sobolev struct addrinfo hints;
86f142677bSMaxim Sobolev struct addrinfo *res;
879a10bb17SJohn Polstra
889a10bb17SJohn Polstra if (rad_create_request(radh, RAD_ACCESS_REQUEST) == -1) {
899a10bb17SJohn Polstra syslog(LOG_CRIT, "rad_create_request: %s", rad_strerror(radh));
9024fe7ba0SDag-Erling Smørgrav return (-1);
919a10bb17SJohn Polstra }
92f142677bSMaxim Sobolev if (nas_id == NULL ||
93f142677bSMaxim Sobolev (nas_ipaddr != NULL && strlen(nas_ipaddr) == 0)) {
94f142677bSMaxim Sobolev if (gethostname(host, sizeof host) != -1) {
95f142677bSMaxim Sobolev if (nas_id == NULL)
96a1d214e8SDag-Erling Smørgrav nas_id = host;
97f142677bSMaxim Sobolev if (nas_ipaddr != NULL && strlen(nas_ipaddr) == 0)
98f142677bSMaxim Sobolev nas_ipaddr = host;
99f142677bSMaxim Sobolev }
100f142677bSMaxim Sobolev }
1019a10bb17SJohn Polstra if ((user != NULL &&
1029a10bb17SJohn Polstra rad_put_string(radh, RAD_USER_NAME, user) == -1) ||
1039a10bb17SJohn Polstra (pass != NULL &&
1049a10bb17SJohn Polstra rad_put_string(radh, RAD_USER_PASSWORD, pass) == -1) ||
105a1d214e8SDag-Erling Smørgrav (nas_id != NULL &&
106a1d214e8SDag-Erling Smørgrav rad_put_string(radh, RAD_NAS_IDENTIFIER, nas_id) == -1)) {
1079a10bb17SJohn Polstra syslog(LOG_CRIT, "rad_put_string: %s", rad_strerror(radh));
10824fe7ba0SDag-Erling Smørgrav return (-1);
1099a10bb17SJohn Polstra }
110f142677bSMaxim Sobolev if (nas_ipaddr != NULL) {
111f142677bSMaxim Sobolev memset(&hints, 0, sizeof(hints));
11230d0a60aSDag-Erling Smørgrav hints.ai_family = AF_INET;
113f142677bSMaxim Sobolev if (getaddrinfo(nas_ipaddr, NULL, &hints, &res) == 0 &&
11430d0a60aSDag-Erling Smørgrav res != NULL && res->ai_family == AF_INET) {
11530d0a60aSDag-Erling Smørgrav haddr = (struct sockaddr_in *)res->ai_addr;
116f142677bSMaxim Sobolev error = rad_put_addr(radh, RAD_NAS_IP_ADDRESS,
117f142677bSMaxim Sobolev haddr->sin_addr);
118f142677bSMaxim Sobolev freeaddrinfo(res);
119f142677bSMaxim Sobolev if (error == -1) {
120f142677bSMaxim Sobolev syslog(LOG_CRIT, "rad_put_addr: %s",
121f142677bSMaxim Sobolev rad_strerror(radh));
122f142677bSMaxim Sobolev return (-1);
123f142677bSMaxim Sobolev }
124f142677bSMaxim Sobolev }
125f142677bSMaxim Sobolev }
126f8b83996SDag-Erling Smørgrav if (rhost != NULL &&
127f8b83996SDag-Erling Smørgrav rad_put_string(radh, RAD_CALLING_STATION_ID, rhost) == -1) {
128f8b83996SDag-Erling Smørgrav syslog(LOG_CRIT, "rad_put_string: %s", rad_strerror(radh));
129f8b83996SDag-Erling Smørgrav return (-1);
130f8b83996SDag-Erling Smørgrav }
131f8b83996SDag-Erling Smørgrav if (state != NULL &&
132f8b83996SDag-Erling Smørgrav rad_put_attr(radh, RAD_STATE, state, state_len) == -1) {
1339a10bb17SJohn Polstra syslog(LOG_CRIT, "rad_put_attr: %s", rad_strerror(radh));
13424fe7ba0SDag-Erling Smørgrav return (-1);
1359a10bb17SJohn Polstra }
1369a10bb17SJohn Polstra if (rad_put_int(radh, RAD_SERVICE_TYPE, RAD_AUTHENTICATE_ONLY) == -1) {
1379a10bb17SJohn Polstra syslog(LOG_CRIT, "rad_put_int: %s", rad_strerror(radh));
13824fe7ba0SDag-Erling Smørgrav return (-1);
1399a10bb17SJohn Polstra }
14024fe7ba0SDag-Erling Smørgrav return (0);
1419a10bb17SJohn Polstra }
1429a10bb17SJohn Polstra
1439a10bb17SJohn Polstra static int
do_accept(pam_handle_t * pamh,struct rad_handle * radh)1449a10bb17SJohn Polstra do_accept(pam_handle_t *pamh, struct rad_handle *radh)
1459a10bb17SJohn Polstra {
1469a10bb17SJohn Polstra int attrtype;
1479a10bb17SJohn Polstra const void *attrval;
1489a10bb17SJohn Polstra size_t attrlen;
1499a10bb17SJohn Polstra char *s;
1509a10bb17SJohn Polstra
1519a10bb17SJohn Polstra while ((attrtype = rad_get_attr(radh, &attrval, &attrlen)) > 0) {
152*716eff47SDag-Erling Smørgrav switch (attrtype) {
153*716eff47SDag-Erling Smørgrav case RAD_USER_NAME:
154*716eff47SDag-Erling Smørgrav if ((s = rad_cvt_string(attrval, attrlen)) == NULL)
155*716eff47SDag-Erling Smørgrav goto enomem;
1569a10bb17SJohn Polstra pam_set_item(pamh, PAM_USER, s);
1579a10bb17SJohn Polstra free(s);
158*716eff47SDag-Erling Smørgrav break;
159*716eff47SDag-Erling Smørgrav case RAD_REPLY_MESSAGE:
160*716eff47SDag-Erling Smørgrav if ((s = rad_cvt_string(attrval, attrlen)) == NULL)
161*716eff47SDag-Erling Smørgrav goto enomem;
162*716eff47SDag-Erling Smørgrav if (!openpam_get_option(pamh, PAM_OPT_NO_REPLYMSG))
163*716eff47SDag-Erling Smørgrav pam_info(pamh, "%s", s);
164*716eff47SDag-Erling Smørgrav free(s);
165*716eff47SDag-Erling Smørgrav break;
166*716eff47SDag-Erling Smørgrav default:
167*716eff47SDag-Erling Smørgrav PAM_LOG("%s(): ignoring RADIUS attribute %d",
168*716eff47SDag-Erling Smørgrav __func__, attrtype);
1699a10bb17SJohn Polstra }
1709a10bb17SJohn Polstra }
1719a10bb17SJohn Polstra if (attrtype == -1) {
1729a10bb17SJohn Polstra syslog(LOG_CRIT, "rad_get_attr: %s", rad_strerror(radh));
17324fe7ba0SDag-Erling Smørgrav return (-1);
1749a10bb17SJohn Polstra }
17524fe7ba0SDag-Erling Smørgrav return (0);
176*716eff47SDag-Erling Smørgrav enomem:
177*716eff47SDag-Erling Smørgrav syslog(LOG_CRIT, "%s(): out of memory", __func__);
178*716eff47SDag-Erling Smørgrav return (-1);
179*716eff47SDag-Erling Smørgrav }
180*716eff47SDag-Erling Smørgrav
181*716eff47SDag-Erling Smørgrav static int
do_reject(pam_handle_t * pamh,struct rad_handle * radh)182*716eff47SDag-Erling Smørgrav do_reject(pam_handle_t *pamh, struct rad_handle *radh)
183*716eff47SDag-Erling Smørgrav {
184*716eff47SDag-Erling Smørgrav int attrtype;
185*716eff47SDag-Erling Smørgrav const void *attrval;
186*716eff47SDag-Erling Smørgrav size_t attrlen;
187*716eff47SDag-Erling Smørgrav char *s;
188*716eff47SDag-Erling Smørgrav
189*716eff47SDag-Erling Smørgrav while ((attrtype = rad_get_attr(radh, &attrval, &attrlen)) > 0) {
190*716eff47SDag-Erling Smørgrav switch (attrtype) {
191*716eff47SDag-Erling Smørgrav case RAD_REPLY_MESSAGE:
192*716eff47SDag-Erling Smørgrav if ((s = rad_cvt_string(attrval, attrlen)) == NULL)
193*716eff47SDag-Erling Smørgrav goto enomem;
194*716eff47SDag-Erling Smørgrav if (!openpam_get_option(pamh, PAM_OPT_NO_REPLYMSG))
195*716eff47SDag-Erling Smørgrav pam_error(pamh, "%s", s);
196*716eff47SDag-Erling Smørgrav free(s);
197*716eff47SDag-Erling Smørgrav break;
198*716eff47SDag-Erling Smørgrav default:
199*716eff47SDag-Erling Smørgrav PAM_LOG("%s(): ignoring RADIUS attribute %d",
200*716eff47SDag-Erling Smørgrav __func__, attrtype);
201*716eff47SDag-Erling Smørgrav }
202*716eff47SDag-Erling Smørgrav }
203*716eff47SDag-Erling Smørgrav if (attrtype < 0) {
204*716eff47SDag-Erling Smørgrav syslog(LOG_CRIT, "rad_get_attr: %s", rad_strerror(radh));
205*716eff47SDag-Erling Smørgrav return (-1);
206*716eff47SDag-Erling Smørgrav }
207*716eff47SDag-Erling Smørgrav return (0);
208*716eff47SDag-Erling Smørgrav enomem:
209*716eff47SDag-Erling Smørgrav syslog(LOG_CRIT, "%s(): out of memory", __func__);
210*716eff47SDag-Erling Smørgrav return (-1);
2119a10bb17SJohn Polstra }
2129a10bb17SJohn Polstra
2139a10bb17SJohn Polstra static int
do_challenge(pam_handle_t * pamh,struct rad_handle * radh,const char * user,const char * nas_id,const char * nas_ipaddr,const char * rhost)214d154a420SPawel Jakub Dawidek do_challenge(pam_handle_t *pamh, struct rad_handle *radh, const char *user,
215f8b83996SDag-Erling Smørgrav const char *nas_id, const char *nas_ipaddr, const char *rhost)
2169a10bb17SJohn Polstra {
2179a10bb17SJohn Polstra int retval;
2189a10bb17SJohn Polstra int attrtype;
2199a10bb17SJohn Polstra const void *attrval;
2209a10bb17SJohn Polstra size_t attrlen;
2219a10bb17SJohn Polstra const void *state;
2229a10bb17SJohn Polstra size_t statelen;
2239a10bb17SJohn Polstra struct pam_message msgs[MAX_CHALLENGE_MSGS];
2249a10bb17SJohn Polstra const struct pam_message *msg_ptrs[MAX_CHALLENGE_MSGS];
2259a10bb17SJohn Polstra struct pam_response *resp;
2269a10bb17SJohn Polstra int num_msgs;
2279a10bb17SJohn Polstra const void *item;
2289a10bb17SJohn Polstra const struct pam_conv *conv;
2299a10bb17SJohn Polstra
2309a10bb17SJohn Polstra state = NULL;
2319a10bb17SJohn Polstra statelen = 0;
2329a10bb17SJohn Polstra num_msgs = 0;
2339a10bb17SJohn Polstra while ((attrtype = rad_get_attr(radh, &attrval, &attrlen)) > 0) {
2349a10bb17SJohn Polstra switch (attrtype) {
2359a10bb17SJohn Polstra
2369a10bb17SJohn Polstra case RAD_STATE:
2379a10bb17SJohn Polstra state = attrval;
2389a10bb17SJohn Polstra statelen = attrlen;
2399a10bb17SJohn Polstra break;
2409a10bb17SJohn Polstra
2419a10bb17SJohn Polstra case RAD_REPLY_MESSAGE:
2429a10bb17SJohn Polstra if (num_msgs >= MAX_CHALLENGE_MSGS) {
2439a10bb17SJohn Polstra syslog(LOG_CRIT,
2449a10bb17SJohn Polstra "Too many RADIUS challenge messages");
24524fe7ba0SDag-Erling Smørgrav return (PAM_SERVICE_ERR);
2469a10bb17SJohn Polstra }
2479a10bb17SJohn Polstra msgs[num_msgs].msg = rad_cvt_string(attrval, attrlen);
2489a10bb17SJohn Polstra if (msgs[num_msgs].msg == NULL) {
2499a10bb17SJohn Polstra syslog(LOG_CRIT,
2509a10bb17SJohn Polstra "rad_cvt_string: out of memory");
25124fe7ba0SDag-Erling Smørgrav return (PAM_SERVICE_ERR);
2529a10bb17SJohn Polstra }
2539a10bb17SJohn Polstra msgs[num_msgs].msg_style = PAM_TEXT_INFO;
2549a10bb17SJohn Polstra msg_ptrs[num_msgs] = &msgs[num_msgs];
2559a10bb17SJohn Polstra num_msgs++;
2569a10bb17SJohn Polstra break;
2579a10bb17SJohn Polstra }
2589a10bb17SJohn Polstra }
2599a10bb17SJohn Polstra if (attrtype == -1) {
2609a10bb17SJohn Polstra syslog(LOG_CRIT, "rad_get_attr: %s", rad_strerror(radh));
26124fe7ba0SDag-Erling Smørgrav return (PAM_SERVICE_ERR);
2629a10bb17SJohn Polstra }
2639a10bb17SJohn Polstra if (num_msgs == 0) {
2649a10bb17SJohn Polstra msgs[num_msgs].msg = strdup("(null RADIUS challenge): ");
2659a10bb17SJohn Polstra if (msgs[num_msgs].msg == NULL) {
2669a10bb17SJohn Polstra syslog(LOG_CRIT, "Out of memory");
26724fe7ba0SDag-Erling Smørgrav return (PAM_SERVICE_ERR);
2689a10bb17SJohn Polstra }
2699a10bb17SJohn Polstra msgs[num_msgs].msg_style = PAM_TEXT_INFO;
2709a10bb17SJohn Polstra msg_ptrs[num_msgs] = &msgs[num_msgs];
2719a10bb17SJohn Polstra num_msgs++;
2729a10bb17SJohn Polstra }
2739a10bb17SJohn Polstra msgs[num_msgs-1].msg_style = PAM_PROMPT_ECHO_ON;
2749a10bb17SJohn Polstra if ((retval = pam_get_item(pamh, PAM_CONV, &item)) != PAM_SUCCESS) {
2759a10bb17SJohn Polstra syslog(LOG_CRIT, "do_challenge: cannot get PAM_CONV");
27624fe7ba0SDag-Erling Smørgrav return (retval);
2779a10bb17SJohn Polstra }
2789a10bb17SJohn Polstra conv = (const struct pam_conv *)item;
2799a10bb17SJohn Polstra if ((retval = conv->conv(num_msgs, msg_ptrs, &resp,
2809a10bb17SJohn Polstra conv->appdata_ptr)) != PAM_SUCCESS)
28124fe7ba0SDag-Erling Smørgrav return (retval);
282d154a420SPawel Jakub Dawidek if (build_access_request(radh, user, resp[num_msgs-1].resp, nas_id,
283f8b83996SDag-Erling Smørgrav nas_ipaddr, rhost, state, statelen) == -1)
28424fe7ba0SDag-Erling Smørgrav return (PAM_SERVICE_ERR);
2859a10bb17SJohn Polstra memset(resp[num_msgs-1].resp, 0, strlen(resp[num_msgs-1].resp));
2869a10bb17SJohn Polstra free(resp[num_msgs-1].resp);
2879a10bb17SJohn Polstra free(resp);
2889a10bb17SJohn Polstra while (num_msgs > 0)
2893a256117SDag-Erling Smørgrav free(msgs[--num_msgs].msg);
29024fe7ba0SDag-Erling Smørgrav return (PAM_SUCCESS);
2919a10bb17SJohn Polstra }
2929a10bb17SJohn Polstra
2939a10bb17SJohn Polstra PAM_EXTERN int
pam_sm_authenticate(pam_handle_t * pamh,int flags __unused,int argc __unused,const char * argv[]__unused)29424fe7ba0SDag-Erling Smørgrav pam_sm_authenticate(pam_handle_t *pamh, int flags __unused,
295545aa471SDag-Erling Smørgrav int argc __unused, const char *argv[] __unused)
2969a10bb17SJohn Polstra {
2979a10bb17SJohn Polstra struct rad_handle *radh;
29891e93869SDag-Erling Smørgrav const char *user, *pass;
299f8b83996SDag-Erling Smørgrav const void *rhost, *tmpuser;
300f142677bSMaxim Sobolev const char *conf_file, *template_user, *nas_id, *nas_ipaddr;
3019a10bb17SJohn Polstra int retval;
3029a10bb17SJohn Polstra int e;
3039a10bb17SJohn Polstra
304545aa471SDag-Erling Smørgrav conf_file = openpam_get_option(pamh, PAM_OPT_CONF);
305545aa471SDag-Erling Smørgrav template_user = openpam_get_option(pamh, PAM_OPT_TEMPLATE_USER);
306545aa471SDag-Erling Smørgrav nas_id = openpam_get_option(pamh, PAM_OPT_NAS_ID);
307f142677bSMaxim Sobolev nas_ipaddr = openpam_get_option(pamh, PAM_OPT_NAS_IPADDR);
308f8b83996SDag-Erling Smørgrav pam_get_item(pamh, PAM_RHOST, &rhost);
3091642eb1aSMark Murray
3101642eb1aSMark Murray retval = pam_get_user(pamh, &user, NULL);
3111642eb1aSMark Murray if (retval != PAM_SUCCESS)
31224fe7ba0SDag-Erling Smørgrav return (retval);
3131642eb1aSMark Murray
3141642eb1aSMark Murray PAM_LOG("Got user: %s", user);
3151642eb1aSMark Murray
316111ccd25SDag-Erling Smørgrav retval = pam_get_authtok(pamh, PAM_AUTHTOK, &pass, PASSWORD_PROMPT);
3171642eb1aSMark Murray if (retval != PAM_SUCCESS)
31824fe7ba0SDag-Erling Smørgrav return (retval);
3191642eb1aSMark Murray
3201642eb1aSMark Murray PAM_LOG("Got password");
3211642eb1aSMark Murray
3221642eb1aSMark Murray radh = rad_open();
3231642eb1aSMark Murray if (radh == NULL) {
3249a10bb17SJohn Polstra syslog(LOG_CRIT, "rad_open failed");
32524fe7ba0SDag-Erling Smørgrav return (PAM_SERVICE_ERR);
3269a10bb17SJohn Polstra }
3271642eb1aSMark Murray
3281642eb1aSMark Murray PAM_LOG("Radius opened");
3291642eb1aSMark Murray
3309a10bb17SJohn Polstra if (rad_config(radh, conf_file) == -1) {
3319a10bb17SJohn Polstra syslog(LOG_ALERT, "rad_config: %s", rad_strerror(radh));
3329a10bb17SJohn Polstra rad_close(radh);
33324fe7ba0SDag-Erling Smørgrav return (PAM_SERVICE_ERR);
3349a10bb17SJohn Polstra }
3351642eb1aSMark Murray
3361642eb1aSMark Murray PAM_LOG("Radius config file read");
3371642eb1aSMark Murray
338f8b83996SDag-Erling Smørgrav if (build_access_request(radh, user, pass, nas_id, nas_ipaddr, rhost,
339f8b83996SDag-Erling Smørgrav NULL, 0) == -1) {
3409a10bb17SJohn Polstra rad_close(radh);
34124fe7ba0SDag-Erling Smørgrav return (PAM_SERVICE_ERR);
3429a10bb17SJohn Polstra }
3431642eb1aSMark Murray
3441642eb1aSMark Murray PAM_LOG("Radius build access done");
3451642eb1aSMark Murray
3469a10bb17SJohn Polstra for (;;) {
3479a10bb17SJohn Polstra switch (rad_send_request(radh)) {
3489a10bb17SJohn Polstra
3499a10bb17SJohn Polstra case RAD_ACCESS_ACCEPT:
3509a10bb17SJohn Polstra e = do_accept(pamh, radh);
3519a10bb17SJohn Polstra rad_close(radh);
3529a10bb17SJohn Polstra if (e == -1)
35324fe7ba0SDag-Erling Smørgrav return (PAM_SERVICE_ERR);
3549a10bb17SJohn Polstra if (template_user != NULL) {
3551642eb1aSMark Murray
3561642eb1aSMark Murray PAM_LOG("Trying template user: %s",
3571642eb1aSMark Murray template_user);
3589a10bb17SJohn Polstra
3599a10bb17SJohn Polstra /*
3609a10bb17SJohn Polstra * If the given user name doesn't exist in
3619a10bb17SJohn Polstra * the local password database, change it
3629a10bb17SJohn Polstra * to the value given in the "template_user"
3639a10bb17SJohn Polstra * option.
3649a10bb17SJohn Polstra */
36591e93869SDag-Erling Smørgrav retval = pam_get_item(pamh, PAM_USER, &tmpuser);
3669a10bb17SJohn Polstra if (retval != PAM_SUCCESS)
36724fe7ba0SDag-Erling Smørgrav return (retval);
3681642eb1aSMark Murray if (getpwnam(tmpuser) == NULL) {
3699a10bb17SJohn Polstra pam_set_item(pamh, PAM_USER,
3709a10bb17SJohn Polstra template_user);
3711642eb1aSMark Murray PAM_LOG("Using template user");
3729a10bb17SJohn Polstra }
3731642eb1aSMark Murray
3741642eb1aSMark Murray }
37524fe7ba0SDag-Erling Smørgrav return (PAM_SUCCESS);
3769a10bb17SJohn Polstra
3779a10bb17SJohn Polstra case RAD_ACCESS_REJECT:
378*716eff47SDag-Erling Smørgrav retval = do_reject(pamh, radh);
3799a10bb17SJohn Polstra rad_close(radh);
38065550d9bSMark Murray PAM_VERBOSE_ERROR("Radius rejection");
38124fe7ba0SDag-Erling Smørgrav return (PAM_AUTH_ERR);
3829a10bb17SJohn Polstra
3839a10bb17SJohn Polstra case RAD_ACCESS_CHALLENGE:
384d154a420SPawel Jakub Dawidek retval = do_challenge(pamh, radh, user, nas_id,
385f8b83996SDag-Erling Smørgrav nas_ipaddr, rhost);
3861642eb1aSMark Murray if (retval != PAM_SUCCESS) {
3879a10bb17SJohn Polstra rad_close(radh);
38824fe7ba0SDag-Erling Smørgrav return (retval);
3899a10bb17SJohn Polstra }
3909a10bb17SJohn Polstra break;
3919a10bb17SJohn Polstra
3929a10bb17SJohn Polstra case -1:
3939a10bb17SJohn Polstra syslog(LOG_CRIT, "rad_send_request: %s",
3949a10bb17SJohn Polstra rad_strerror(radh));
3959a10bb17SJohn Polstra rad_close(radh);
39665550d9bSMark Murray PAM_VERBOSE_ERROR("Radius failure");
39724fe7ba0SDag-Erling Smørgrav return (PAM_AUTHINFO_UNAVAIL);
3989a10bb17SJohn Polstra
3999a10bb17SJohn Polstra default:
4009a10bb17SJohn Polstra syslog(LOG_CRIT,
4019a10bb17SJohn Polstra "rad_send_request: unexpected return value");
4029a10bb17SJohn Polstra rad_close(radh);
40365550d9bSMark Murray PAM_VERBOSE_ERROR("Radius error");
40424fe7ba0SDag-Erling Smørgrav return (PAM_SERVICE_ERR);
4059a10bb17SJohn Polstra }
4069a10bb17SJohn Polstra }
4079a10bb17SJohn Polstra }
4089a10bb17SJohn Polstra
4099a10bb17SJohn Polstra PAM_EXTERN int
pam_sm_setcred(pam_handle_t * pamh __unused,int flags __unused,int argc __unused,const char * argv[]__unused)41024fe7ba0SDag-Erling Smørgrav pam_sm_setcred(pam_handle_t *pamh __unused, int flags __unused,
41124fe7ba0SDag-Erling Smørgrav int argc __unused, const char *argv[] __unused)
4129a10bb17SJohn Polstra {
41365550d9bSMark Murray
41424fe7ba0SDag-Erling Smørgrav return (PAM_SUCCESS);
4158d3978c1SDag-Erling Smørgrav }
4168d3978c1SDag-Erling Smørgrav
4179294327dSJohn Polstra PAM_MODULE_ENTRY("pam_radius");
418