1972a1bcfSBrian Somers /* 2972a1bcfSBrian Somers * Copyright 1999 Internet Business Solutions Ltd., Switzerland 3972a1bcfSBrian Somers * All rights reserved. 4972a1bcfSBrian Somers * 5972a1bcfSBrian Somers * Redistribution and use in source and binary forms, with or without 6972a1bcfSBrian Somers * modification, are permitted provided that the following conditions 7972a1bcfSBrian Somers * are met: 8972a1bcfSBrian Somers * 1. Redistributions of source code must retain the above copyright 9972a1bcfSBrian Somers * notice, this list of conditions and the following disclaimer. 10972a1bcfSBrian Somers * 2. Redistributions in binary form must reproduce the above copyright 11972a1bcfSBrian Somers * notice, this list of conditions and the following disclaimer in the 12972a1bcfSBrian Somers * documentation and/or other materials provided with the distribution. 13972a1bcfSBrian Somers * 14972a1bcfSBrian Somers * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 15972a1bcfSBrian Somers * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 16972a1bcfSBrian Somers * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 17972a1bcfSBrian Somers * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 18972a1bcfSBrian Somers * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 19972a1bcfSBrian Somers * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 20972a1bcfSBrian Somers * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 21972a1bcfSBrian Somers * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 22972a1bcfSBrian Somers * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 23972a1bcfSBrian Somers * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 24972a1bcfSBrian Somers * SUCH DAMAGE. 25972a1bcfSBrian Somers * 2697d92980SPeter Wemm * $FreeBSD$ 27972a1bcfSBrian Somers * 28972a1bcfSBrian Somers */ 29972a1bcfSBrian Somers 30972a1bcfSBrian Somers #include <sys/param.h> 316b457978SBrian Somers #include <sys/socket.h> 32972a1bcfSBrian Somers #include <netinet/in_systm.h> 33972a1bcfSBrian Somers #include <netinet/in.h> 34972a1bcfSBrian Somers #include <netinet/ip.h> 35972a1bcfSBrian Somers #include <arpa/inet.h> 36972a1bcfSBrian Somers #include <sys/un.h> 376b457978SBrian Somers #include <net/route.h> 38972a1bcfSBrian Somers 3910e629b9SBrian Somers #ifdef LOCALRAD 4010e629b9SBrian Somers #include "radlib.h" 4110e629b9SBrian Somers #else 42972a1bcfSBrian Somers #include <radlib.h> 4310e629b9SBrian Somers #endif 4410e629b9SBrian Somers 4510e629b9SBrian Somers #include <errno.h> 46972a1bcfSBrian Somers #include <stdio.h> 47972a1bcfSBrian Somers #include <stdlib.h> 48972a1bcfSBrian Somers #include <string.h> 49f0cdd9c0SBrian Somers #include <sys/time.h> 50972a1bcfSBrian Somers #include <termios.h> 51f10f5203SBrian Somers #include <ttyent.h> 52f10f5203SBrian Somers #include <unistd.h> 53f10f5203SBrian Somers #include <netdb.h> 54972a1bcfSBrian Somers 555d9e6103SBrian Somers #include "layer.h" 56972a1bcfSBrian Somers #include "defs.h" 57972a1bcfSBrian Somers #include "log.h" 58972a1bcfSBrian Somers #include "descriptor.h" 59972a1bcfSBrian Somers #include "prompt.h" 60972a1bcfSBrian Somers #include "timer.h" 61972a1bcfSBrian Somers #include "fsm.h" 62972a1bcfSBrian Somers #include "iplist.h" 63972a1bcfSBrian Somers #include "slcompress.h" 64972a1bcfSBrian Somers #include "throughput.h" 65972a1bcfSBrian Somers #include "lqr.h" 66972a1bcfSBrian Somers #include "hdlc.h" 67972a1bcfSBrian Somers #include "mbuf.h" 68972a1bcfSBrian Somers #include "ipcp.h" 69972a1bcfSBrian Somers #include "route.h" 70972a1bcfSBrian Somers #include "command.h" 71972a1bcfSBrian Somers #include "filter.h" 72972a1bcfSBrian Somers #include "lcp.h" 73972a1bcfSBrian Somers #include "ccp.h" 74972a1bcfSBrian Somers #include "link.h" 75972a1bcfSBrian Somers #include "mp.h" 76972a1bcfSBrian Somers #include "radius.h" 77f0cdd9c0SBrian Somers #include "auth.h" 78f0cdd9c0SBrian Somers #include "async.h" 79f0cdd9c0SBrian Somers #include "physical.h" 80f0cdd9c0SBrian Somers #include "chat.h" 81f0cdd9c0SBrian Somers #include "cbcp.h" 82f0cdd9c0SBrian Somers #include "chap.h" 83f0cdd9c0SBrian Somers #include "datalink.h" 84972a1bcfSBrian Somers #include "bundle.h" 85972a1bcfSBrian Somers 86f0cdd9c0SBrian Somers /* 87f0cdd9c0SBrian Somers * rad_continue_send_request() has given us `got' (non-zero). Deal with it. 88f0cdd9c0SBrian Somers */ 89f0cdd9c0SBrian Somers static void 90f0cdd9c0SBrian Somers radius_Process(struct radius *r, int got) 91972a1bcfSBrian Somers { 92972a1bcfSBrian Somers char *argv[MAXARGS], *nuke; 93f0cdd9c0SBrian Somers struct bundle *bundle; 9428e610e3SBrian Somers int argc, addrs; 9528e610e3SBrian Somers size_t len; 96972a1bcfSBrian Somers struct in_range dest; 97972a1bcfSBrian Somers struct in_addr gw; 98f0cdd9c0SBrian Somers const void *data; 99972a1bcfSBrian Somers 100f0cdd9c0SBrian Somers r->cx.fd = -1; /* Stop select()ing */ 101972a1bcfSBrian Somers 102972a1bcfSBrian Somers switch (got) { 103972a1bcfSBrian Somers case RAD_ACCESS_ACCEPT: 104f0cdd9c0SBrian Somers log_Printf(LogPHASE, "Radius: ACCEPT received\n"); 105972a1bcfSBrian Somers break; 106972a1bcfSBrian Somers 107f0cdd9c0SBrian Somers case RAD_ACCESS_REJECT: 108f0cdd9c0SBrian Somers log_Printf(LogPHASE, "Radius: REJECT received\n"); 109f0cdd9c0SBrian Somers auth_Failure(r->cx.auth); 110f0cdd9c0SBrian Somers rad_close(r->cx.rad); 111f0cdd9c0SBrian Somers return; 112f0cdd9c0SBrian Somers 113972a1bcfSBrian Somers case RAD_ACCESS_CHALLENGE: 114972a1bcfSBrian Somers /* we can't deal with this (for now) ! */ 115f0cdd9c0SBrian Somers log_Printf(LogPHASE, "Radius: CHALLENGE received (can't handle yet)\n"); 116f0cdd9c0SBrian Somers auth_Failure(r->cx.auth); 117f0cdd9c0SBrian Somers rad_close(r->cx.rad); 118f0cdd9c0SBrian Somers return; 119972a1bcfSBrian Somers 120794c9bbcSBrian Somers case RAD_ACCOUNTING_RESPONSE: 121794c9bbcSBrian Somers log_Printf(LogPHASE, "Radius: Accounting response received\n"); 122794c9bbcSBrian Somers /* No further processing for accounting requests, please */ 123794c9bbcSBrian Somers rad_close(r->cx.rad); 124794c9bbcSBrian Somers return; 125794c9bbcSBrian Somers 126972a1bcfSBrian Somers case -1: 127f0cdd9c0SBrian Somers log_Printf(LogPHASE, "radius: %s\n", rad_strerror(r->cx.rad)); 128f0cdd9c0SBrian Somers auth_Failure(r->cx.auth); 129f0cdd9c0SBrian Somers rad_close(r->cx.rad); 130f0cdd9c0SBrian Somers return; 131972a1bcfSBrian Somers 132972a1bcfSBrian Somers default: 133972a1bcfSBrian Somers log_Printf(LogERROR, "rad_send_request: Failed %d: %s\n", 134f0cdd9c0SBrian Somers got, rad_strerror(r->cx.rad)); 135f0cdd9c0SBrian Somers auth_Failure(r->cx.auth); 136f0cdd9c0SBrian Somers rad_close(r->cx.rad); 137f0cdd9c0SBrian Somers return; 138972a1bcfSBrian Somers } 139972a1bcfSBrian Somers 140972a1bcfSBrian Somers /* So we've been accepted ! Let's see what we've got in our reply :-I */ 141972a1bcfSBrian Somers r->ip.s_addr = r->mask.s_addr = INADDR_NONE; 142972a1bcfSBrian Somers r->mtu = 0; 143972a1bcfSBrian Somers r->vj = 0; 144f0cdd9c0SBrian Somers while ((got = rad_get_attr(r->cx.rad, &data, &len)) > 0) { 145972a1bcfSBrian Somers switch (got) { 146972a1bcfSBrian Somers case RAD_FRAMED_IP_ADDRESS: 147972a1bcfSBrian Somers r->ip = rad_cvt_addr(data); 148f0cdd9c0SBrian Somers log_Printf(LogPHASE, " IP %s\n", inet_ntoa(r->ip)); 149972a1bcfSBrian Somers break; 150972a1bcfSBrian Somers 151972a1bcfSBrian Somers case RAD_FRAMED_IP_NETMASK: 152972a1bcfSBrian Somers r->mask = rad_cvt_addr(data); 153f0cdd9c0SBrian Somers log_Printf(LogPHASE, " Netmask %s\n", inet_ntoa(r->mask)); 154972a1bcfSBrian Somers break; 155972a1bcfSBrian Somers 156972a1bcfSBrian Somers case RAD_FRAMED_MTU: 157972a1bcfSBrian Somers r->mtu = rad_cvt_int(data); 158f0cdd9c0SBrian Somers log_Printf(LogPHASE, " MTU %lu\n", r->mtu); 159972a1bcfSBrian Somers break; 160972a1bcfSBrian Somers 161972a1bcfSBrian Somers case RAD_FRAMED_ROUTING: 162972a1bcfSBrian Somers /* Disabled for now - should we automatically set up some filters ? */ 163972a1bcfSBrian Somers /* rad_cvt_int(data); */ 164972a1bcfSBrian Somers /* bit 1 = Send routing packets */ 165972a1bcfSBrian Somers /* bit 2 = Receive routing packets */ 166972a1bcfSBrian Somers break; 167972a1bcfSBrian Somers 168972a1bcfSBrian Somers case RAD_FRAMED_COMPRESSION: 169972a1bcfSBrian Somers r->vj = rad_cvt_int(data) == 1 ? 1 : 0; 170f0cdd9c0SBrian Somers log_Printf(LogPHASE, " VJ %sabled\n", r->vj ? "en" : "dis"); 171972a1bcfSBrian Somers break; 172972a1bcfSBrian Somers 173972a1bcfSBrian Somers case RAD_FRAMED_ROUTE: 174972a1bcfSBrian Somers /* 175972a1bcfSBrian Somers * We expect a string of the format ``dest[/bits] gw [metrics]'' 176972a1bcfSBrian Somers * Any specified metrics are ignored. MYADDR and HISADDR are 177972a1bcfSBrian Somers * understood for ``dest'' and ``gw'' and ``0.0.0.0'' is the same 178972a1bcfSBrian Somers * as ``HISADDR''. 179972a1bcfSBrian Somers */ 180972a1bcfSBrian Somers 181972a1bcfSBrian Somers if ((nuke = rad_cvt_string(data, len)) == NULL) { 182f0cdd9c0SBrian Somers log_Printf(LogERROR, "rad_cvt_string: %s\n", rad_strerror(r->cx.rad)); 183f0cdd9c0SBrian Somers rad_close(r->cx.rad); 184f0cdd9c0SBrian Somers return; 185972a1bcfSBrian Somers } 186972a1bcfSBrian Somers 187f0cdd9c0SBrian Somers log_Printf(LogPHASE, " Route: %s\n", nuke); 188f0cdd9c0SBrian Somers bundle = r->cx.auth->physical->dl->bundle; 189972a1bcfSBrian Somers dest.ipaddr.s_addr = dest.mask.s_addr = INADDR_ANY; 190972a1bcfSBrian Somers dest.width = 0; 191972a1bcfSBrian Somers argc = command_Interpret(nuke, strlen(nuke), argv); 192c39aa54eSBrian Somers if (argc < 0) 193c39aa54eSBrian Somers log_Printf(LogWARN, "radius: %s: Syntax error\n", 194c39aa54eSBrian Somers argc == 1 ? argv[0] : "\"\""); 195c39aa54eSBrian Somers else if (argc < 2) 196972a1bcfSBrian Somers log_Printf(LogWARN, "radius: %s: Invalid route\n", 197972a1bcfSBrian Somers argc == 1 ? argv[0] : "\"\""); 198972a1bcfSBrian Somers else if ((strcasecmp(argv[0], "default") != 0 && 199972a1bcfSBrian Somers !ParseAddr(&bundle->ncp.ipcp, argv[0], &dest.ipaddr, 200972a1bcfSBrian Somers &dest.mask, &dest.width)) || 201972a1bcfSBrian Somers !ParseAddr(&bundle->ncp.ipcp, argv[1], &gw, NULL, NULL)) 202972a1bcfSBrian Somers log_Printf(LogWARN, "radius: %s %s: Invalid route\n", 203972a1bcfSBrian Somers argv[0], argv[1]); 204972a1bcfSBrian Somers else { 205972a1bcfSBrian Somers if (dest.width == 32 && strchr(argv[0], '/') == NULL) 206972a1bcfSBrian Somers /* No mask specified - use the natural mask */ 207bc76350eSBrian Somers dest.mask = addr2mask(dest.ipaddr); 208972a1bcfSBrian Somers addrs = 0; 209972a1bcfSBrian Somers 210972a1bcfSBrian Somers if (!strncasecmp(argv[0], "HISADDR", 7)) 211972a1bcfSBrian Somers addrs = ROUTE_DSTHISADDR; 212972a1bcfSBrian Somers else if (!strncasecmp(argv[0], "MYADDR", 6)) 213972a1bcfSBrian Somers addrs = ROUTE_DSTMYADDR; 214972a1bcfSBrian Somers 215972a1bcfSBrian Somers if (gw.s_addr == INADDR_ANY) { 216972a1bcfSBrian Somers addrs |= ROUTE_GWHISADDR; 217972a1bcfSBrian Somers gw = bundle->ncp.ipcp.peer_ip; 218972a1bcfSBrian Somers } else if (strcasecmp(argv[1], "HISADDR") == 0) 219972a1bcfSBrian Somers addrs |= ROUTE_GWHISADDR; 220972a1bcfSBrian Somers 221972a1bcfSBrian Somers route_Add(&r->routes, addrs, dest.ipaddr, dest.mask, gw); 222972a1bcfSBrian Somers } 223972a1bcfSBrian Somers free(nuke); 224972a1bcfSBrian Somers break; 225972a1bcfSBrian Somers } 226972a1bcfSBrian Somers } 227972a1bcfSBrian Somers 228972a1bcfSBrian Somers if (got == -1) { 229f0cdd9c0SBrian Somers log_Printf(LogERROR, "rad_get_attr: %s (failing!)\n", 230f0cdd9c0SBrian Somers rad_strerror(r->cx.rad)); 231f0cdd9c0SBrian Somers auth_Failure(r->cx.auth); 232f0cdd9c0SBrian Somers rad_close(r->cx.rad); 233f0cdd9c0SBrian Somers } else { 234f0cdd9c0SBrian Somers r->valid = 1; 235f0cdd9c0SBrian Somers auth_Success(r->cx.auth); 236f0cdd9c0SBrian Somers rad_close(r->cx.rad); 237f0cdd9c0SBrian Somers } 238972a1bcfSBrian Somers } 239972a1bcfSBrian Somers 240f0cdd9c0SBrian Somers /* 2418e7bd08eSBrian Somers * We've either timed out or select()ed on the read descriptor 242f0cdd9c0SBrian Somers */ 243f0cdd9c0SBrian Somers static void 244f0cdd9c0SBrian Somers radius_Continue(struct radius *r, int sel) 245f0cdd9c0SBrian Somers { 246f0cdd9c0SBrian Somers struct timeval tv; 247f0cdd9c0SBrian Somers int got; 248972a1bcfSBrian Somers 249f0cdd9c0SBrian Somers timer_Stop(&r->cx.timer); 250f0cdd9c0SBrian Somers if ((got = rad_continue_send_request(r->cx.rad, sel, &r->cx.fd, &tv)) == 0) { 251f0cdd9c0SBrian Somers log_Printf(LogPHASE, "Radius: Request re-sent\n"); 252f0cdd9c0SBrian Somers r->cx.timer.load = tv.tv_usec / TICKUNIT + tv.tv_sec * SECTICKS; 253f0cdd9c0SBrian Somers timer_Start(&r->cx.timer); 254f0cdd9c0SBrian Somers return; 255f0cdd9c0SBrian Somers } 256f0cdd9c0SBrian Somers 257f0cdd9c0SBrian Somers radius_Process(r, got); 258f0cdd9c0SBrian Somers } 259f0cdd9c0SBrian Somers 260f0cdd9c0SBrian Somers /* 261f0cdd9c0SBrian Somers * Time to call rad_continue_send_request() - timed out. 262f0cdd9c0SBrian Somers */ 263f0cdd9c0SBrian Somers static void 264f0cdd9c0SBrian Somers radius_Timeout(void *v) 265f0cdd9c0SBrian Somers { 266f0cdd9c0SBrian Somers radius_Continue((struct radius *)v, 0); 267f0cdd9c0SBrian Somers } 268f0cdd9c0SBrian Somers 269f0cdd9c0SBrian Somers /* 270f0cdd9c0SBrian Somers * Time to call rad_continue_send_request() - something to read. 271f0cdd9c0SBrian Somers */ 272f0cdd9c0SBrian Somers static void 273f013f33eSBrian Somers radius_Read(struct fdescriptor *d, struct bundle *bundle, const fd_set *fdset) 274f0cdd9c0SBrian Somers { 275f0cdd9c0SBrian Somers radius_Continue(descriptor2radius(d), 1); 276f0cdd9c0SBrian Somers } 277f0cdd9c0SBrian Somers 278f0cdd9c0SBrian Somers /* 2798e7bd08eSBrian Somers * Behave as a struct fdescriptor (descriptor.h) 280f0cdd9c0SBrian Somers */ 281f0cdd9c0SBrian Somers static int 282f013f33eSBrian Somers radius_UpdateSet(struct fdescriptor *d, fd_set *r, fd_set *w, fd_set *e, int *n) 283f0cdd9c0SBrian Somers { 284f0cdd9c0SBrian Somers struct radius *rad = descriptor2radius(d); 285f0cdd9c0SBrian Somers 286f0cdd9c0SBrian Somers if (r && rad->cx.fd != -1) { 287f0cdd9c0SBrian Somers FD_SET(rad->cx.fd, r); 288f0cdd9c0SBrian Somers if (*n < rad->cx.fd + 1) 289f0cdd9c0SBrian Somers *n = rad->cx.fd + 1; 290f0cdd9c0SBrian Somers log_Printf(LogTIMER, "Radius: fdset(r) %d\n", rad->cx.fd); 29182d6780cSBrian Somers return 1; 292972a1bcfSBrian Somers } 293972a1bcfSBrian Somers 294f0cdd9c0SBrian Somers return 0; 295f0cdd9c0SBrian Somers } 296f0cdd9c0SBrian Somers 297f0cdd9c0SBrian Somers /* 2988e7bd08eSBrian Somers * Behave as a struct fdescriptor (descriptor.h) 299f0cdd9c0SBrian Somers */ 300f0cdd9c0SBrian Somers static int 301f013f33eSBrian Somers radius_IsSet(struct fdescriptor *d, const fd_set *fdset) 302f0cdd9c0SBrian Somers { 303f0cdd9c0SBrian Somers struct radius *r = descriptor2radius(d); 304f0cdd9c0SBrian Somers 305f0cdd9c0SBrian Somers return r && r->cx.fd != -1 && FD_ISSET(r->cx.fd, fdset); 306f0cdd9c0SBrian Somers } 307f0cdd9c0SBrian Somers 308f0cdd9c0SBrian Somers /* 3098e7bd08eSBrian Somers * Behave as a struct fdescriptor (descriptor.h) 310f0cdd9c0SBrian Somers */ 311f0cdd9c0SBrian Somers static int 312f013f33eSBrian Somers radius_Write(struct fdescriptor *d, struct bundle *bundle, const fd_set *fdset) 313f0cdd9c0SBrian Somers { 314f0cdd9c0SBrian Somers /* We never want to write here ! */ 315f0cdd9c0SBrian Somers log_Printf(LogALERT, "radius_Write: Internal error: Bad call !\n"); 316f0cdd9c0SBrian Somers return 0; 317f0cdd9c0SBrian Somers } 318f0cdd9c0SBrian Somers 319f0cdd9c0SBrian Somers /* 320f0cdd9c0SBrian Somers * Initialise ourselves 321f0cdd9c0SBrian Somers */ 322f0cdd9c0SBrian Somers void 323f0cdd9c0SBrian Somers radius_Init(struct radius *r) 324f0cdd9c0SBrian Somers { 325f0cdd9c0SBrian Somers r->valid = 0; 326f0cdd9c0SBrian Somers r->cx.fd = -1; 327f0cdd9c0SBrian Somers *r->cfg.file = '\0';; 328f0cdd9c0SBrian Somers r->desc.type = RADIUS_DESCRIPTOR; 329f0cdd9c0SBrian Somers r->desc.UpdateSet = radius_UpdateSet; 330f0cdd9c0SBrian Somers r->desc.IsSet = radius_IsSet; 331f0cdd9c0SBrian Somers r->desc.Read = radius_Read; 332f0cdd9c0SBrian Somers r->desc.Write = radius_Write; 333f0cdd9c0SBrian Somers memset(&r->cx.timer, '\0', sizeof r->cx.timer); 334794c9bbcSBrian Somers log_Printf(LogDEBUG, "Radius: radius_Init\n"); 335f0cdd9c0SBrian Somers } 336f0cdd9c0SBrian Somers 337f0cdd9c0SBrian Somers /* 338f0cdd9c0SBrian Somers * Forget everything and go back to initialised state. 339f0cdd9c0SBrian Somers */ 340f0cdd9c0SBrian Somers void 341f0cdd9c0SBrian Somers radius_Destroy(struct radius *r) 342f0cdd9c0SBrian Somers { 343f0cdd9c0SBrian Somers r->valid = 0; 344794c9bbcSBrian Somers log_Printf(LogDEBUG, "Radius: radius_Destroy\n"); 345f0cdd9c0SBrian Somers timer_Stop(&r->cx.timer); 346f0cdd9c0SBrian Somers route_DeleteAll(&r->routes); 347f0cdd9c0SBrian Somers if (r->cx.fd != -1) { 348f0cdd9c0SBrian Somers r->cx.fd = -1; 349f0cdd9c0SBrian Somers rad_close(r->cx.rad); 350f0cdd9c0SBrian Somers } 351f0cdd9c0SBrian Somers } 352f0cdd9c0SBrian Somers 353f0cdd9c0SBrian Somers /* 354f0cdd9c0SBrian Somers * Start an authentication request to the RADIUS server. 355f0cdd9c0SBrian Somers */ 356f0cdd9c0SBrian Somers void 357f0cdd9c0SBrian Somers radius_Authenticate(struct radius *r, struct authinfo *authp, const char *name, 358f0cdd9c0SBrian Somers const char *key, const char *challenge) 359f0cdd9c0SBrian Somers { 360f10f5203SBrian Somers struct ttyent *ttyp; 361f0cdd9c0SBrian Somers struct timeval tv; 362f10f5203SBrian Somers int got, slot; 363f10f5203SBrian Somers char hostname[MAXHOSTNAMELEN]; 364f10f5203SBrian Somers struct hostent *hp; 365f10f5203SBrian Somers struct in_addr hostaddr; 366f0cdd9c0SBrian Somers 367f0cdd9c0SBrian Somers if (!*r->cfg.file) 368f0cdd9c0SBrian Somers return; 369f0cdd9c0SBrian Somers 370f0cdd9c0SBrian Somers if (r->cx.fd != -1) 371f0cdd9c0SBrian Somers /* 372f0cdd9c0SBrian Somers * We assume that our name/key/challenge is the same as last time, 373f0cdd9c0SBrian Somers * and just continue to wait for the RADIUS server(s). 374f0cdd9c0SBrian Somers */ 375f0cdd9c0SBrian Somers return; 376f0cdd9c0SBrian Somers 377f0cdd9c0SBrian Somers radius_Destroy(r); 378f0cdd9c0SBrian Somers 379794c9bbcSBrian Somers if ((r->cx.rad = rad_auth_open()) == NULL) { 380794c9bbcSBrian Somers log_Printf(LogERROR, "rad_auth_open: %s\n", strerror(errno)); 381f0cdd9c0SBrian Somers return; 382f0cdd9c0SBrian Somers } 383f0cdd9c0SBrian Somers 384f0cdd9c0SBrian Somers if (rad_config(r->cx.rad, r->cfg.file) != 0) { 385f0cdd9c0SBrian Somers log_Printf(LogERROR, "rad_config: %s\n", rad_strerror(r->cx.rad)); 386f0cdd9c0SBrian Somers rad_close(r->cx.rad); 387f0cdd9c0SBrian Somers return; 388f0cdd9c0SBrian Somers } 389f0cdd9c0SBrian Somers 390f0cdd9c0SBrian Somers if (rad_create_request(r->cx.rad, RAD_ACCESS_REQUEST) != 0) { 391f0cdd9c0SBrian Somers log_Printf(LogERROR, "rad_create_request: %s\n", rad_strerror(r->cx.rad)); 392f0cdd9c0SBrian Somers rad_close(r->cx.rad); 393f0cdd9c0SBrian Somers return; 394f0cdd9c0SBrian Somers } 395f0cdd9c0SBrian Somers 396f0cdd9c0SBrian Somers if (rad_put_string(r->cx.rad, RAD_USER_NAME, name) != 0 || 397f0cdd9c0SBrian Somers rad_put_int(r->cx.rad, RAD_SERVICE_TYPE, RAD_FRAMED) != 0 || 398f0cdd9c0SBrian Somers rad_put_int(r->cx.rad, RAD_FRAMED_PROTOCOL, RAD_PPP) != 0) { 399f0cdd9c0SBrian Somers log_Printf(LogERROR, "rad_put: %s\n", rad_strerror(r->cx.rad)); 400f0cdd9c0SBrian Somers rad_close(r->cx.rad); 401f0cdd9c0SBrian Somers return; 402f0cdd9c0SBrian Somers } 403f0cdd9c0SBrian Somers 404f0cdd9c0SBrian Somers if (challenge != NULL) { 405f0cdd9c0SBrian Somers /* We're talking CHAP */ 406f0cdd9c0SBrian Somers if (rad_put_string(r->cx.rad, RAD_CHAP_PASSWORD, key) != 0 || 407f0cdd9c0SBrian Somers rad_put_string(r->cx.rad, RAD_CHAP_CHALLENGE, challenge) != 0) { 408f0cdd9c0SBrian Somers log_Printf(LogERROR, "CHAP: rad_put_string: %s\n", 409f0cdd9c0SBrian Somers rad_strerror(r->cx.rad)); 410f0cdd9c0SBrian Somers rad_close(r->cx.rad); 411f0cdd9c0SBrian Somers return; 412f0cdd9c0SBrian Somers } 413f0cdd9c0SBrian Somers } else if (rad_put_string(r->cx.rad, RAD_USER_PASSWORD, key) != 0) { 414f0cdd9c0SBrian Somers /* We're talking PAP */ 415f0cdd9c0SBrian Somers log_Printf(LogERROR, "PAP: rad_put_string: %s\n", rad_strerror(r->cx.rad)); 416f0cdd9c0SBrian Somers rad_close(r->cx.rad); 417f0cdd9c0SBrian Somers return; 418f0cdd9c0SBrian Somers } 419f0cdd9c0SBrian Somers 420f10f5203SBrian Somers if (gethostname(hostname, sizeof hostname) != 0) 421f10f5203SBrian Somers log_Printf(LogERROR, "rad_put: gethostname(): %s\n", strerror(errno)); 422f10f5203SBrian Somers else { 423f10f5203SBrian Somers if ((hp = gethostbyname(hostname)) != NULL) { 424f10f5203SBrian Somers hostaddr.s_addr = *(u_long *)hp->h_addr; 425f10f5203SBrian Somers if (rad_put_addr(r->cx.rad, RAD_NAS_IP_ADDRESS, hostaddr) != 0) { 426f10f5203SBrian Somers log_Printf(LogERROR, "rad_put: rad_put_string: %s\n", 427f10f5203SBrian Somers rad_strerror(r->cx.rad)); 428f10f5203SBrian Somers rad_close(r->cx.rad); 429f10f5203SBrian Somers return; 430f10f5203SBrian Somers } 431f10f5203SBrian Somers } 432f10f5203SBrian Somers if (rad_put_string(r->cx.rad, RAD_NAS_IDENTIFIER, hostname) != 0) { 433f10f5203SBrian Somers log_Printf(LogERROR, "rad_put: rad_put_string: %s\n", 434f10f5203SBrian Somers rad_strerror(r->cx.rad)); 435f10f5203SBrian Somers rad_close(r->cx.rad); 436f10f5203SBrian Somers return; 437f10f5203SBrian Somers } 438f10f5203SBrian Somers } 439f10f5203SBrian Somers 440f10f5203SBrian Somers if (authp->physical->handler && 441f10f5203SBrian Somers authp->physical->handler->type == TTY_DEVICE) { 442f10f5203SBrian Somers setttyent(); 443f10f5203SBrian Somers for (slot = 1; (ttyp = getttyent()); ++slot) 444f10f5203SBrian Somers if (!strcmp(ttyp->ty_name, authp->physical->name.base)) { 445f10f5203SBrian Somers if(rad_put_int(r->cx.rad, RAD_NAS_PORT, slot) != 0) { 446f10f5203SBrian Somers log_Printf(LogERROR, "rad_put: rad_put_string: %s\n", 447f10f5203SBrian Somers rad_strerror(r->cx.rad)); 448f10f5203SBrian Somers rad_close(r->cx.rad); 449f10f5203SBrian Somers endttyent(); 450f10f5203SBrian Somers return; 451f10f5203SBrian Somers } 452f10f5203SBrian Somers break; 453f10f5203SBrian Somers } 454f10f5203SBrian Somers endttyent(); 455f10f5203SBrian Somers } 456f10f5203SBrian Somers 457f10f5203SBrian Somers 458f0cdd9c0SBrian Somers if ((got = rad_init_send_request(r->cx.rad, &r->cx.fd, &tv))) 459f0cdd9c0SBrian Somers radius_Process(r, got); 460f0cdd9c0SBrian Somers else { 461f0cdd9c0SBrian Somers log_Printf(LogPHASE, "Radius: Request sent\n"); 462f0cdd9c0SBrian Somers log_Printf(LogDEBUG, "Using radius_Timeout [%p]\n", radius_Timeout); 463f0cdd9c0SBrian Somers r->cx.timer.load = tv.tv_usec / TICKUNIT + tv.tv_sec * SECTICKS; 464f0cdd9c0SBrian Somers r->cx.timer.func = radius_Timeout; 465f0cdd9c0SBrian Somers r->cx.timer.name = "radius"; 466f0cdd9c0SBrian Somers r->cx.timer.arg = r; 467f0cdd9c0SBrian Somers r->cx.auth = authp; 468f0cdd9c0SBrian Somers timer_Start(&r->cx.timer); 469f0cdd9c0SBrian Somers } 470f0cdd9c0SBrian Somers } 471f0cdd9c0SBrian Somers 472f0cdd9c0SBrian Somers /* 473794c9bbcSBrian Somers * Send an accounting request to the RADIUS server 474794c9bbcSBrian Somers */ 475794c9bbcSBrian Somers void 476794c9bbcSBrian Somers radius_Account(struct radius *r, struct radacct *ac, struct datalink *dl, 477794c9bbcSBrian Somers int acct_type, struct in_addr *peer_ip, struct in_addr *netmask, 478794c9bbcSBrian Somers struct pppThroughput *stats) 479794c9bbcSBrian Somers { 480794c9bbcSBrian Somers struct ttyent *ttyp; 481794c9bbcSBrian Somers struct timeval tv; 482794c9bbcSBrian Somers int got, slot; 483794c9bbcSBrian Somers char hostname[MAXHOSTNAMELEN]; 484794c9bbcSBrian Somers struct hostent *hp; 485794c9bbcSBrian Somers struct in_addr hostaddr; 486794c9bbcSBrian Somers 487794c9bbcSBrian Somers if (!*r->cfg.file) 488794c9bbcSBrian Somers return; 489794c9bbcSBrian Somers 490794c9bbcSBrian Somers if (r->cx.fd != -1) 491794c9bbcSBrian Somers /* 492794c9bbcSBrian Somers * We assume that our name/key/challenge is the same as last time, 493794c9bbcSBrian Somers * and just continue to wait for the RADIUS server(s). 494794c9bbcSBrian Somers */ 495794c9bbcSBrian Somers return; 496794c9bbcSBrian Somers 497794c9bbcSBrian Somers radius_Destroy(r); 498794c9bbcSBrian Somers 499794c9bbcSBrian Somers if ((r->cx.rad = rad_auth_open()) == NULL) { 500794c9bbcSBrian Somers log_Printf(LogERROR, "rad_auth_open: %s\n", strerror(errno)); 501794c9bbcSBrian Somers return; 502794c9bbcSBrian Somers } 503794c9bbcSBrian Somers 504794c9bbcSBrian Somers if (rad_config(r->cx.rad, r->cfg.file) != 0) { 505794c9bbcSBrian Somers log_Printf(LogERROR, "rad_config: %s\n", rad_strerror(r->cx.rad)); 506794c9bbcSBrian Somers rad_close(r->cx.rad); 507794c9bbcSBrian Somers return; 508794c9bbcSBrian Somers } 509794c9bbcSBrian Somers 510794c9bbcSBrian Somers if (rad_create_request(r->cx.rad, RAD_ACCOUNTING_REQUEST) != 0) { 511794c9bbcSBrian Somers log_Printf(LogERROR, "rad_create_request: %s\n", rad_strerror(r->cx.rad)); 512794c9bbcSBrian Somers rad_close(r->cx.rad); 513794c9bbcSBrian Somers return; 514794c9bbcSBrian Somers } 515794c9bbcSBrian Somers 516794c9bbcSBrian Somers /* Grab some accounting data and initialize structure */ 517794c9bbcSBrian Somers if (acct_type == RAD_START) { 518794c9bbcSBrian Somers ac->rad_parent = r; 519794c9bbcSBrian Somers /* Fetch username from datalink */ 520794c9bbcSBrian Somers strncpy(ac->user_name, dl->peer.authname, sizeof ac->user_name); 521794c9bbcSBrian Somers ac->user_name[AUTHLEN-1] = '\0'; 522794c9bbcSBrian Somers 523794c9bbcSBrian Somers ac->authentic = 2; /* Assume RADIUS verified auth data */ 524794c9bbcSBrian Somers 525794c9bbcSBrian Somers /* Generate a session ID */ 526794c9bbcSBrian Somers snprintf(ac->session_id, sizeof ac->session_id, "%s%d-%s%lu", 527794c9bbcSBrian Somers dl->bundle->cfg.auth.name, (int)getpid(), 528794c9bbcSBrian Somers dl->peer.authname, (unsigned long)stats->uptime); 529794c9bbcSBrian Somers 530794c9bbcSBrian Somers /* And grab our MP socket name */ 531794c9bbcSBrian Somers snprintf(ac->multi_session_id, sizeof ac->multi_session_id, "%s", 532794c9bbcSBrian Somers dl->bundle->ncp.mp.active ? 533794c9bbcSBrian Somers dl->bundle->ncp.mp.server.socket.sun_path : ""); 534794c9bbcSBrian Somers 535794c9bbcSBrian Somers /* Fetch IP, netmask from IPCP */ 536794c9bbcSBrian Somers memcpy(&ac->ip, peer_ip, sizeof(ac->ip)); 537794c9bbcSBrian Somers memcpy(&ac->mask, netmask, sizeof(ac->mask)); 538794c9bbcSBrian Somers }; 539794c9bbcSBrian Somers 540794c9bbcSBrian Somers if (rad_put_string(r->cx.rad, RAD_USER_NAME, ac->user_name) != 0 || 541794c9bbcSBrian Somers rad_put_int(r->cx.rad, RAD_SERVICE_TYPE, RAD_FRAMED) != 0 || 542794c9bbcSBrian Somers rad_put_int(r->cx.rad, RAD_FRAMED_PROTOCOL, RAD_PPP) != 0 || 543794c9bbcSBrian Somers rad_put_addr(r->cx.rad, RAD_FRAMED_IP_ADDRESS, ac->ip) != 0 || 544794c9bbcSBrian Somers rad_put_addr(r->cx.rad, RAD_FRAMED_IP_NETMASK, ac->mask) != 0) { 545794c9bbcSBrian Somers log_Printf(LogERROR, "rad_put: %s\n", rad_strerror(r->cx.rad)); 546794c9bbcSBrian Somers rad_close(r->cx.rad); 547794c9bbcSBrian Somers return; 548794c9bbcSBrian Somers } 549794c9bbcSBrian Somers 550794c9bbcSBrian Somers if (gethostname(hostname, sizeof hostname) != 0) 551794c9bbcSBrian Somers log_Printf(LogERROR, "rad_put: gethostname(): %s\n", strerror(errno)); 552794c9bbcSBrian Somers else { 553794c9bbcSBrian Somers if ((hp = gethostbyname(hostname)) != NULL) { 554794c9bbcSBrian Somers hostaddr.s_addr = *(u_long *)hp->h_addr; 555794c9bbcSBrian Somers if (rad_put_addr(r->cx.rad, RAD_NAS_IP_ADDRESS, hostaddr) != 0) { 556794c9bbcSBrian Somers log_Printf(LogERROR, "rad_put: rad_put_string: %s\n", 557794c9bbcSBrian Somers rad_strerror(r->cx.rad)); 558794c9bbcSBrian Somers rad_close(r->cx.rad); 559794c9bbcSBrian Somers return; 560794c9bbcSBrian Somers } 561794c9bbcSBrian Somers } 562794c9bbcSBrian Somers if (rad_put_string(r->cx.rad, RAD_NAS_IDENTIFIER, hostname) != 0) { 563794c9bbcSBrian Somers log_Printf(LogERROR, "rad_put: rad_put_string: %s\n", 564794c9bbcSBrian Somers rad_strerror(r->cx.rad)); 565794c9bbcSBrian Somers rad_close(r->cx.rad); 566794c9bbcSBrian Somers return; 567794c9bbcSBrian Somers } 568794c9bbcSBrian Somers } 569794c9bbcSBrian Somers 570794c9bbcSBrian Somers if (dl->physical->handler && 571794c9bbcSBrian Somers dl->physical->handler->type == TTY_DEVICE) { 572794c9bbcSBrian Somers setttyent(); 573794c9bbcSBrian Somers for (slot = 1; (ttyp = getttyent()); ++slot) 574794c9bbcSBrian Somers if (!strcmp(ttyp->ty_name, dl->physical->name.base)) { 575794c9bbcSBrian Somers if(rad_put_int(r->cx.rad, RAD_NAS_PORT, slot) != 0) { 576794c9bbcSBrian Somers log_Printf(LogERROR, "rad_put: rad_put_string: %s\n", 577794c9bbcSBrian Somers rad_strerror(r->cx.rad)); 578794c9bbcSBrian Somers rad_close(r->cx.rad); 579794c9bbcSBrian Somers endttyent(); 580794c9bbcSBrian Somers return; 581794c9bbcSBrian Somers } 582794c9bbcSBrian Somers break; 583794c9bbcSBrian Somers } 584794c9bbcSBrian Somers endttyent(); 585794c9bbcSBrian Somers } 586794c9bbcSBrian Somers 587794c9bbcSBrian Somers if (rad_put_int(r->cx.rad, RAD_ACCT_STATUS_TYPE, acct_type) != 0 || 588794c9bbcSBrian Somers rad_put_string(r->cx.rad, RAD_ACCT_SESSION_ID, ac->session_id) != 0 || 589794c9bbcSBrian Somers rad_put_string(r->cx.rad, RAD_ACCT_MULTI_SESSION_ID, 590794c9bbcSBrian Somers ac->multi_session_id) != 0 || 591794c9bbcSBrian Somers rad_put_int(r->cx.rad, RAD_ACCT_DELAY_TIME, 0) != 0) { 592794c9bbcSBrian Somers /* XXX ACCT_DELAY_TIME should be increased each time a packet is waiting */ 593794c9bbcSBrian Somers log_Printf(LogERROR, "rad_put: %s\n", rad_strerror(r->cx.rad)); 594794c9bbcSBrian Somers rad_close(r->cx.rad); 595794c9bbcSBrian Somers return; 596794c9bbcSBrian Somers } 597794c9bbcSBrian Somers 598794c9bbcSBrian Somers if (acct_type == RAD_STOP) 599794c9bbcSBrian Somers /* Show some statistics */ 600794c9bbcSBrian Somers if (rad_put_int(r->cx.rad, RAD_ACCT_INPUT_OCTETS, stats->OctetsIn) != 0 || 601794c9bbcSBrian Somers rad_put_int(r->cx.rad, RAD_ACCT_INPUT_PACKETS, stats->PacketsIn) != 0 || 602794c9bbcSBrian Somers rad_put_int(r->cx.rad, RAD_ACCT_OUTPUT_OCTETS, stats->OctetsOut) != 0 || 603794c9bbcSBrian Somers rad_put_int(r->cx.rad, RAD_ACCT_OUTPUT_PACKETS, stats->PacketsOut) 604794c9bbcSBrian Somers != 0 || 605794c9bbcSBrian Somers rad_put_int(r->cx.rad, RAD_ACCT_SESSION_TIME, throughput_uptime(stats)) 606794c9bbcSBrian Somers != 0) { 607794c9bbcSBrian Somers log_Printf(LogERROR, "rad_put: %s\n", rad_strerror(r->cx.rad)); 608794c9bbcSBrian Somers rad_close(r->cx.rad); 609794c9bbcSBrian Somers return; 610794c9bbcSBrian Somers } 611794c9bbcSBrian Somers 612794c9bbcSBrian Somers if ((got = rad_init_send_request(r->cx.rad, &r->cx.fd, &tv))) 613794c9bbcSBrian Somers radius_Process(r, got); 614794c9bbcSBrian Somers else { 615794c9bbcSBrian Somers log_Printf(LogDEBUG, "Using radius_Timeout [%p]\n", radius_Timeout); 616794c9bbcSBrian Somers r->cx.timer.load = tv.tv_usec / TICKUNIT + tv.tv_sec * SECTICKS; 617794c9bbcSBrian Somers r->cx.timer.func = radius_Timeout; 618794c9bbcSBrian Somers r->cx.timer.name = "radius"; 619794c9bbcSBrian Somers r->cx.timer.arg = r; 620794c9bbcSBrian Somers r->cx.auth = NULL; /* Not valid for accounting requests */ 621794c9bbcSBrian Somers timer_Start(&r->cx.timer); 622794c9bbcSBrian Somers } 623794c9bbcSBrian Somers } 624794c9bbcSBrian Somers 625794c9bbcSBrian Somers /* 626f0cdd9c0SBrian Somers * How do things look at the moment ? 627f0cdd9c0SBrian Somers */ 628972a1bcfSBrian Somers void 629972a1bcfSBrian Somers radius_Show(struct radius *r, struct prompt *p) 630972a1bcfSBrian Somers { 631972a1bcfSBrian Somers prompt_Printf(p, " Radius config: %s", *r->cfg.file ? r->cfg.file : "none"); 632972a1bcfSBrian Somers if (r->valid) { 633972a1bcfSBrian Somers prompt_Printf(p, "\n IP: %s\n", inet_ntoa(r->ip)); 634972a1bcfSBrian Somers prompt_Printf(p, " Netmask: %s\n", inet_ntoa(r->mask)); 635972a1bcfSBrian Somers prompt_Printf(p, " MTU: %lu\n", r->mtu); 636972a1bcfSBrian Somers prompt_Printf(p, " VJ: %sabled\n", r->vj ? "en" : "dis"); 637972a1bcfSBrian Somers if (r->routes) 638972a1bcfSBrian Somers route_ShowSticky(p, r->routes, " Routes", 16); 639972a1bcfSBrian Somers } else 640972a1bcfSBrian Somers prompt_Printf(p, " (not authenticated)\n"); 641972a1bcfSBrian Somers } 642