xref: /freebsd/lib/libradius/libradius.3 (revision af23369a6deaaeb612ab266eb88b8bb8d560c322)
1.\" Copyright 1998 Juniper Networks, Inc.
2.\" Copyright 2009 Alexander Motin <mav@FreeBSD.org>.
3.\" All rights reserved.
4.\"
5.\" Redistribution and use in source and binary forms, with or without
6.\" modification, are permitted provided that the following conditions
7.\" are met:
8.\" 1. Redistributions of source code must retain the above copyright
9.\"    notice, this list of conditions and the following disclaimer.
10.\" 2. Redistributions in binary form must reproduce the above copyright
11.\"    notice, this list of conditions and the following disclaimer in the
12.\"    documentation and/or other materials provided with the distribution.
13.\"
14.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24.\" SUCH DAMAGE.
25.\"
26.\" $FreeBSD$
27.\"
28.Dd August 5, 2009
29.Dt LIBRADIUS 3
30.Os
31.Sh NAME
32.Nm libradius
33.Nd RADIUS client/server library
34.Sh SYNOPSIS
35.In radlib.h
36.Ft "struct rad_handle *"
37.Fn rad_acct_open "void"
38.Ft int
39.Fn rad_add_server "struct rad_handle *h" "const char *host" "int port" "const char *secret" "int timeout" "int max_tries"
40.Ft int
41.Fn rad_add_server_ex "struct rad_handle *h" "const char *host" "int port" "const char *secret" "int timeout" "int max_tries" "int dead_time" "struct in_addr *bindto"
42.Ft "struct rad_handle *"
43.Fn rad_auth_open "void"
44.Ft void
45.Fn rad_close "struct rad_handle *h"
46.Ft int
47.Fn rad_config "struct rad_handle *h" "const char *file"
48.Ft int
49.Fn rad_continue_send_request "struct rad_handle *h" "int selected" "int *fd" "struct timeval *tv"
50.Ft int
51.Fn rad_create_request "struct rad_handle *h" "int code"
52.Ft int
53.Fn rad_create_response "struct rad_handle *h" "int code"
54.Ft "struct in_addr"
55.Fn rad_cvt_addr "const void *data"
56.Ft uint32_t
57.Fn rad_cvt_int "const void *data"
58.Ft char *
59.Fn rad_cvt_string "const void *data" "size_t len"
60.Ft int
61.Fn rad_get_attr "struct rad_handle *h" "const void **data" "size_t *len"
62.Ft int
63.Fn rad_get_vendor_attr "uint32_t *vendor" "const void **data" "size_t *len"
64.Ft int
65.Fn rad_init_send_request "struct rad_handle *h" "int *fd" "struct timeval *tv"
66.Ft int
67.Fn rad_put_addr "struct rad_handle *h" "int type" "struct in_addr addr"
68.Ft int
69.Fn rad_put_attr "struct rad_handle *h" "int type" "const void *data" "size_t len"
70.Ft int
71.Fn rad_put_int "struct rad_handle *h" "int type" "uint32_t value"
72.Ft int
73.Fn rad_put_string "struct rad_handle *h" "int type" "const char *str"
74.Ft int
75.Fn rad_put_message_authentic "struct rad_handle *h"
76.Ft int
77.Fn rad_put_vendor_addr "struct rad_handle *h" "int vendor" "int type" "struct in_addr addr"
78.Ft int
79.Fn rad_put_vendor_attr "struct rad_handle *h" "int vendor" "int type" "const void *data" "size_t len"
80.Ft int
81.Fn rad_put_vendor_int "struct rad_handle *h" "int vendor" "int type" "uint32_t value"
82.Ft int
83.Fn rad_put_vendor_string "struct rad_handle *h" "int vendor" "int type" "const char *str"
84.Ft ssize_t
85.Fn rad_request_authenticator "struct rad_handle *h" "char *buf" "size_t len"
86.Ft int
87.Fn rad_receive_request "struct rad_handle *h"
88.Ft int
89.Fn rad_send_request "struct rad_handle *h"
90.Ft int
91.Fn rad_send_response "struct rad_handle *h"
92.Ft "struct rad_handle *"
93.Fn rad_server_open "int fd"
94.Ft "const char *"
95.Fn rad_server_secret "struct rad_handle *h"
96.Ft "void"
97.Fn rad_bind_to "struct rad_handle *h" "in_addr_t addr"
98.Ft u_char *
99.Fn rad_demangle "struct rad_handle *h" "const void *mangled" "size_t mlen"
100.Ft u_char *
101.Fn rad_demangle_mppe_key "struct rad_handle *h" "const void *mangled" "size_t mlen" "size_t *len"
102.Ft "const char *"
103.Fn rad_strerror "struct rad_handle *h"
104.Sh DESCRIPTION
105The
106.Nm
107library implements the Remote Authentication Dial In User Service (RADIUS).
108RADIUS, defined in RFCs 2865 and 2866,
109allows clients to perform authentication and accounting by means of
110network requests to remote servers.
111.Ss Initialization
112To use the library, an application must first call
113.Fn rad_auth_open ,
114.Fn rad_acct_open
115or
116.Fn rad_server_open
117to obtain a
118.Vt "struct rad_handle *" ,
119which provides the context for subsequent operations.
120The former function is used for RADIUS authentication and the
121latter is used for RADIUS accounting.
122Calls to
123.Fn rad_auth_open ,
124.Fn rad_acct_open
125and
126.Fn rad_server_open
127always succeed unless insufficient virtual memory is available.
128If
129the necessary memory cannot be allocated, the functions return
130.Dv NULL .
131For compatibility with earlier versions of this library,
132.Fn rad_open
133is provided as a synonym for
134.Fn rad_auth_open .
135.Pp
136Before issuing any RADIUS requests, the library must be made aware
137of the servers it can contact.
138The easiest way to configure the
139library is to call
140.Fn rad_config .
141.Fn rad_config
142causes the library to read a configuration file whose format is
143described in
144.Xr radius.conf 5 .
145The pathname of the configuration file is passed as the
146.Fa file
147argument to
148.Fn rad_config .
149This argument may also be given as
150.Dv NULL ,
151in which case the standard configuration file
152.Pa /etc/radius.conf
153is used.
154.Fn rad_config
155returns 0 on success, or \-1 if an error occurs.
156.Pp
157The library can also be configured programmatically by calls to
158.Fn rad_add_server
159or
160.Fn rad_add_server_ex .
161.Fn rad_add_server
162is a backward compatible function, implemented via
163.Fn rad_add_server_ex .
164The
165.Fa host
166parameter specifies the server host, either as a fully qualified
167domain name or as a dotted-quad IP address in text form.
168The
169.Fa port
170parameter specifies the UDP port to contact on the server.
171If
172.Fa port
173is given as 0, the library looks up the
174.Ql radius/udp
175or
176.Ql radacct/udp
177service in the network
178.Xr services 5
179database, and uses the port found
180there.
181If no entry is found, the library uses the standard RADIUS
182ports, 1812 for authentication and 1813 for accounting.
183The shared secret for the server host is passed to the
184.Fa secret
185parameter.
186It may be any
187.Dv NUL Ns -terminated
188string of bytes.
189The RADIUS protocol
190ignores all but the leading 128 bytes of the shared secret.
191The timeout for receiving replies from the server is passed to the
192.Fa timeout
193parameter, in units of seconds.
194The maximum number of repeated
195requests to make before giving up is passed into the
196.Fa max_tries
197parameter.
198Time interval in seconds when the server will not be requested
199if it is marked as dead (did not answer on the last try) set with
200.Fa dead_time
201parameter.
202.Fa bindto
203parameter is an IP address on the multihomed host that is used as
204a source address for all requests.
205.Fn rad_add_server
206returns 0 on success, or \-1 if an error occurs.
207.Pp
208.Fn rad_add_server
209or
210.Fn rad_add_server_ex
211may be called multiple times, and they may be used together with
212.Fn rad_config .
213At most 10 servers may be specified.
214When multiple servers are given, they are tried in round-robin
215fashion until a valid response is received, or until each server's
216.Fa max_tries
217limit has been reached.
218.Ss Creating a RADIUS Request
219A RADIUS request consists of a code specifying the kind of request,
220and zero or more attributes which provide additional information.
221To
222begin constructing a new request, call
223.Fn rad_create_request .
224In addition to the usual
225.Vt "struct rad_handle *" ,
226this function takes a
227.Fa code
228parameter which specifies the type of the request.
229Most often this
230will be
231.Dv RAD_ACCESS_REQUEST .
232.Fn rad_create_request
233returns 0 on success, or \-1 on if an error occurs.
234.Pp
235After the request has been created with
236.Fn rad_create_request ,
237attributes can be attached to it.
238This is done through calls to
239.Fn rad_put_addr ,
240.Fn rad_put_int ,
241and
242.Fn rad_put_string .
243Each accepts a
244.Fa type
245parameter identifying the attribute, and a value which may be
246an Internet address, an integer, or a
247.Dv NUL Ns -terminated
248string,
249respectively.
250Alternatively,
251.Fn rad_put_vendor_addr ,
252.Fn rad_put_vendor_int
253or
254.Fn rad_put_vendor_string
255may be used to specify vendor specific attributes.
256Vendor specific
257definitions may be found in
258.In radlib_vs.h
259.Pp
260The library also provides a function
261.Fn rad_put_attr
262which can be used to supply a raw, uninterpreted attribute.
263The
264.Fa data
265argument points to an array of bytes, and the
266.Fa len
267argument specifies its length.
268.Pp
269It is possible adding the Message-Authenticator to the request.
270This is an HMAC-MD5 hash of the entire Access-Request packet (see RFC 3579).
271This attribute must be present in any packet that includes an EAP-Message
272attribute.
273It can be added by using the
274.Fn rad_put_message_authentic
275function.
276The
277.Nm
278library
279calculates the HMAC-MD5 hash implicitly before sending the request.
280If the Message-Authenticator was found inside the response packet,
281then the packet is silently dropped, if the validation failed.
282In order to get this feature, the library should be compiled with
283OpenSSL support.
284.Pp
285The
286.Fn rad_put_X
287functions return 0 on success, or \-1 if an error occurs.
288.Ss Sending the Request and Receiving the Response
289After the RADIUS request has been constructed, it is sent either by means of
290.Fn rad_send_request
291or by a combination of calls to
292.Fn rad_init_send_request
293and
294.Fn rad_continue_send_request .
295.Pp
296The
297.Fn rad_send_request
298function sends the request and waits for a valid reply,
299retrying the defined servers in round-robin fashion as necessary.
300If a valid response is received,
301.Fn rad_send_request
302returns the RADIUS code which specifies the type of the response.
303This will typically be
304.Dv RAD_ACCESS_ACCEPT ,
305.Dv RAD_ACCESS_REJECT ,
306or
307.Dv RAD_ACCESS_CHALLENGE .
308If no valid response is received,
309.Fn rad_send_request
310returns \-1.
311.Pp
312As an alternative, if you do not wish to block waiting for a response,
313.Fn rad_init_send_request
314and
315.Fn rad_continue_send_request
316may be used instead.
317If a reply is received from the RADIUS server or a
318timeout occurs, these functions return a value as described for
319.Fn rad_send_request .
320Otherwise, a value of zero is returned and the values pointed to by
321.Fa fd
322and
323.Fa tv
324are set to the descriptor and timeout that should be passed to
325.Xr select 2 .
326.Pp
327.Fn rad_init_send_request
328must be called first, followed by repeated calls to
329.Fn rad_continue_send_request
330as long as a return value of zero is given.
331Between each call, the application should call
332.Xr select 2 ,
333passing
334.Fa *fd
335as a read descriptor and timing out after the interval specified by
336.Fa tv .
337When
338.Xr select 2
339returns,
340.Fn rad_continue_send_request
341should be called with
342.Fa selected
343set to a non-zero value if
344.Xr select 2
345indicated that the descriptor is readable.
346.Pp
347Like RADIUS requests, each response may contain zero or more
348attributes.
349After a response has been received successfully by
350.Fn rad_send_request
351or
352.Fn rad_continue_send_request ,
353its attributes can be extracted one by one using
354.Fn rad_get_attr .
355Each time
356.Fn rad_get_attr
357is called, it gets the next attribute from the current response, and
358stores a pointer to the data and the length of the data via the
359reference parameters
360.Fa data
361and
362.Fa len ,
363respectively.
364Note that the data resides in the response itself,
365and must not be modified.
366A successful call to
367.Fn rad_get_attr
368returns the RADIUS attribute type.
369If no more attributes remain in the current response,
370.Fn rad_get_attr
371returns 0.
372If an error such as a malformed attribute is detected, \-1 is
373returned.
374.Pp
375If
376.Fn rad_get_attr
377returns
378.Dv RAD_VENDOR_SPECIFIC ,
379.Fn rad_get_vendor_attr
380may be called to determine the vendor.
381The vendor specific RADIUS attribute type is returned.
382The reference parameters
383.Fa data
384and
385.Fa len
386(as returned from
387.Fn rad_get_attr )
388are passed to
389.Fn rad_get_vendor_attr ,
390and are adjusted to point to the vendor specific attribute data.
391.Pp
392The common types of attributes can be decoded using
393.Fn rad_cvt_addr ,
394.Fn rad_cvt_int ,
395and
396.Fn rad_cvt_string .
397These functions accept a pointer to the attribute data, which should
398have been obtained using
399.Fn rad_get_attr
400and optionally
401.Fn rad_get_vendor_attr .
402In the case of
403.Fn rad_cvt_string ,
404the length
405.Fa len
406must also be given.
407These functions interpret the attribute as an
408Internet address, an integer, or a string, respectively, and return
409its value.
410.Fn rad_cvt_string
411returns its value as a
412.Dv NUL Ns -terminated
413string in dynamically
414allocated memory.
415The application should free the string using
416.Xr free 3
417when it is no longer needed.
418.Pp
419If insufficient virtual memory is available,
420.Fn rad_cvt_string
421returns
422.Dv NULL .
423.Fn rad_cvt_addr
424and
425.Fn rad_cvt_int
426cannot fail.
427.Pp
428The
429.Fn rad_request_authenticator
430function may be used to obtain the Request-Authenticator attribute value
431associated with the current RADIUS server according to the supplied
432rad_handle.
433The target buffer
434.Fa buf
435of length
436.Fa len
437must be supplied and should be at least 16 bytes.
438The return value is the number of bytes written to
439.Fa buf
440or \-1 to indicate that
441.Fa len
442was not large enough.
443.Pp
444The
445.Fn rad_server_secret
446returns the secret shared with the current RADIUS server according to the
447supplied rad_handle.
448.Pp
449The
450.Fn rad_bind_to
451assigns a source address for all requests to the current RADIUS server.
452.Pp
453The
454.Fn rad_demangle
455function demangles attributes containing passwords and MS-CHAPv1 MPPE-Keys.
456The return value is
457.Dv NULL
458on failure, or the plaintext attribute.
459This value should be freed using
460.Xr free 3
461when it is no longer needed.
462.Pp
463The
464.Fn rad_demangle_mppe_key
465function demangles the send- and recv-keys when using MPPE (see RFC 2548).
466The return value is
467.Dv NULL
468on failure, or the plaintext attribute.
469This value should be freed using
470.Xr free 3
471when it is no longer needed.
472.Ss Obtaining Error Messages
473Those functions which accept a
474.Vt "struct rad_handle *"
475argument record an error message if they fail.
476The error message
477can be retrieved by calling
478.Fn rad_strerror .
479The message text is overwritten on each new error for the given
480.Vt "struct rad_handle *" .
481Thus the message must be copied if it is to be preserved through
482subsequent library calls using the same handle.
483.Ss Cleanup
484To free the resources used by the RADIUS library, call
485.Fn rad_close .
486.Ss Server operation
487Server mode operates much alike to client mode, except packet send and receive
488steps are swapped.
489To operate as server you should obtain server context with
490.Fn rad_server_open
491function, passing opened and bound UDP socket file descriptor as argument.
492You should define allowed clients and their secrets using
493.Fn rad_add_server
494function. port, timeout and max_tries arguments are ignored in server mode.
495You should call
496.Fn rad_receive_request
497function to receive request from client.
498If you do not want to block on socket read, you are free to use any
499poll(), select() or non-blocking sockets for the socket.
500Received request can be parsed with same parsing functions as for client.
501To respond to the request you should call
502.Fn rad_create_response
503and fill response content with same packet writing functions as for client.
504When packet is ready, it should be sent with
505.Fn rad_send_response .
506.Sh RETURN VALUES
507The following functions return a non-negative value on success.
508If
509they detect an error, they return \-1 and record an error message
510which can be retrieved using
511.Fn rad_strerror .
512.Pp
513.Bl -item -offset indent -compact
514.It
515.Fn rad_add_server
516.It
517.Fn rad_config
518.It
519.Fn rad_create_request
520.It
521.Fn rad_create_response
522.It
523.Fn rad_get_attr
524.It
525.Fn rad_put_addr
526.It
527.Fn rad_put_attr
528.It
529.Fn rad_put_int
530.It
531.Fn rad_put_string
532.It
533.Fn rad_put_message_authentic
534.It
535.Fn rad_init_send_request
536.It
537.Fn rad_continue_send_request
538.It
539.Fn rad_send_request
540.It
541.Fn rad_send_response
542.El
543.Pp
544The following functions return a
545.No non- Ns Dv NULL
546pointer on success.
547If they are unable to allocate sufficient
548virtual memory, they return
549.Dv NULL ,
550without recording an error message.
551.Pp
552.Bl -item -offset indent -compact
553.It
554.Fn rad_acct_open
555.It
556.Fn rad_auth_open
557.It
558.Fn rad_server_open
559.It
560.Fn rad_cvt_string
561.El
562.Pp
563The following functions return a
564.No non- Ns Dv NULL
565pointer on success.
566If they fail, they return
567.Dv NULL ,
568with recording an error message.
569.Pp
570.Bl -item -offset indent -compact
571.It
572.Fn rad_demangle
573.It
574.Fn rad_demangle_mppe_key
575.El
576.Sh FILES
577.Bl -tag -width indent
578.It Pa /etc/radius.conf
579.El
580.Sh SEE ALSO
581.Xr radius.conf 5
582.Rs
583.%A "C. Rigney, et al"
584.%T "Remote Authentication Dial In User Service (RADIUS)"
585.%O "RFC 2865"
586.Re
587.Rs
588.%A "C. Rigney"
589.%T "RADIUS Accounting"
590.%O "RFC 2866"
591.Re
592.Rs
593.%A G. Zorn
594.%T "Microsoft Vendor-specific RADIUS attributes"
595.%O RFC 2548
596.Re
597.Rs
598.%A C. Rigney, et al
599.%T "RADIUS extensions"
600.%O RFC 2869
601.Re
602.Sh AUTHORS
603.An -nosplit
604This software was originally written by
605.An John Polstra ,
606and donated to the
607.Fx
608project by Juniper Networks, Inc.
609.An Oleg Semyonov
610subsequently added the ability to perform RADIUS
611accounting.
612Later additions and changes by
613.An Michael Bretterklieber .
614Server mode support was added by
615.An Alexander Motin .
616