xref: /freebsd/usr.sbin/ppp/radius.c (revision a95b23a6b21af49cb9d4650322b4e6be070656d0)
1972a1bcfSBrian Somers /*
2972a1bcfSBrian Somers  * Copyright 1999 Internet Business Solutions Ltd., Switzerland
3972a1bcfSBrian Somers  * All rights reserved.
4972a1bcfSBrian Somers  *
5972a1bcfSBrian Somers  * Redistribution and use in source and binary forms, with or without
6972a1bcfSBrian Somers  * modification, are permitted provided that the following conditions
7972a1bcfSBrian Somers  * are met:
8972a1bcfSBrian Somers  * 1. Redistributions of source code must retain the above copyright
9972a1bcfSBrian Somers  *    notice, this list of conditions and the following disclaimer.
10972a1bcfSBrian Somers  * 2. Redistributions in binary form must reproduce the above copyright
11972a1bcfSBrian Somers  *    notice, this list of conditions and the following disclaimer in the
12972a1bcfSBrian Somers  *    documentation and/or other materials provided with the distribution.
13972a1bcfSBrian Somers  *
14972a1bcfSBrian Somers  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15972a1bcfSBrian Somers  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16972a1bcfSBrian Somers  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17972a1bcfSBrian Somers  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18972a1bcfSBrian Somers  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19972a1bcfSBrian Somers  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20972a1bcfSBrian Somers  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21972a1bcfSBrian Somers  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22972a1bcfSBrian Somers  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23972a1bcfSBrian Somers  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24972a1bcfSBrian Somers  * SUCH DAMAGE.
25972a1bcfSBrian Somers  *
2697d92980SPeter Wemm  * $FreeBSD$
27972a1bcfSBrian Somers  *
28972a1bcfSBrian Somers  */
29972a1bcfSBrian Somers 
30972a1bcfSBrian Somers #include <sys/param.h>
318fb5ef5aSBrian Somers 
326b457978SBrian Somers #include <sys/socket.h>
33972a1bcfSBrian Somers #include <netinet/in_systm.h>
34972a1bcfSBrian Somers #include <netinet/in.h>
35972a1bcfSBrian Somers #include <netinet/ip.h>
36972a1bcfSBrian Somers #include <arpa/inet.h>
37972a1bcfSBrian Somers #include <sys/un.h>
386b457978SBrian Somers #include <net/route.h>
39972a1bcfSBrian Somers 
4010e629b9SBrian Somers #ifdef LOCALRAD
4110e629b9SBrian Somers #include "radlib.h"
42ff8e577bSBrian Somers #include "radlib_vs.h"
4310e629b9SBrian Somers #else
44972a1bcfSBrian Somers #include <radlib.h>
45ff8e577bSBrian Somers #include <radlib_vs.h>
4610e629b9SBrian Somers #endif
4710e629b9SBrian Somers 
4810e629b9SBrian Somers #include <errno.h>
498fb5ef5aSBrian Somers #ifndef NODES
508fb5ef5aSBrian Somers #include <md5.h>
518fb5ef5aSBrian Somers #endif
52972a1bcfSBrian Somers #include <stdio.h>
53972a1bcfSBrian Somers #include <stdlib.h>
54972a1bcfSBrian Somers #include <string.h>
55f0cdd9c0SBrian Somers #include <sys/time.h>
56972a1bcfSBrian Somers #include <termios.h>
57f10f5203SBrian Somers #include <unistd.h>
58f10f5203SBrian Somers #include <netdb.h>
59972a1bcfSBrian Somers 
605d9e6103SBrian Somers #include "layer.h"
61972a1bcfSBrian Somers #include "defs.h"
62972a1bcfSBrian Somers #include "log.h"
63972a1bcfSBrian Somers #include "descriptor.h"
64972a1bcfSBrian Somers #include "prompt.h"
65972a1bcfSBrian Somers #include "timer.h"
66972a1bcfSBrian Somers #include "fsm.h"
67972a1bcfSBrian Somers #include "iplist.h"
68972a1bcfSBrian Somers #include "slcompress.h"
69972a1bcfSBrian Somers #include "throughput.h"
70972a1bcfSBrian Somers #include "lqr.h"
71972a1bcfSBrian Somers #include "hdlc.h"
72972a1bcfSBrian Somers #include "mbuf.h"
7330949fd4SBrian Somers #include "ncpaddr.h"
7430949fd4SBrian Somers #include "ip.h"
75972a1bcfSBrian Somers #include "ipcp.h"
7630949fd4SBrian Somers #include "ipv6cp.h"
77972a1bcfSBrian Somers #include "route.h"
78972a1bcfSBrian Somers #include "command.h"
79972a1bcfSBrian Somers #include "filter.h"
80972a1bcfSBrian Somers #include "lcp.h"
81972a1bcfSBrian Somers #include "ccp.h"
82972a1bcfSBrian Somers #include "link.h"
83972a1bcfSBrian Somers #include "mp.h"
84972a1bcfSBrian Somers #include "radius.h"
85f0cdd9c0SBrian Somers #include "auth.h"
86f0cdd9c0SBrian Somers #include "async.h"
87f0cdd9c0SBrian Somers #include "physical.h"
88f0cdd9c0SBrian Somers #include "chat.h"
89f0cdd9c0SBrian Somers #include "cbcp.h"
90f0cdd9c0SBrian Somers #include "chap.h"
91f0cdd9c0SBrian Somers #include "datalink.h"
9230949fd4SBrian Somers #include "ncp.h"
93972a1bcfSBrian Somers #include "bundle.h"
94ff8e577bSBrian Somers #include "proto.h"
95ff8e577bSBrian Somers 
96ff8e577bSBrian Somers #ifndef NODES
97a16061b2SBrian Somers struct mschap_response {
98ff8e577bSBrian Somers   u_char ident;
99ff8e577bSBrian Somers   u_char flags;
100ff8e577bSBrian Somers   u_char lm_response[24];
101ff8e577bSBrian Somers   u_char nt_response[24];
102ff8e577bSBrian Somers };
103a16061b2SBrian Somers 
104a16061b2SBrian Somers struct mschap2_response {
105a16061b2SBrian Somers   u_char ident;
106a16061b2SBrian Somers   u_char flags;
107a16061b2SBrian Somers   u_char pchallenge[16];
108a16061b2SBrian Somers   u_char reserved[8];
109a16061b2SBrian Somers   u_char response[24];
110a16061b2SBrian Somers };
1118fb5ef5aSBrian Somers 
1128fb5ef5aSBrian Somers #define	AUTH_LEN	16
1138fb5ef5aSBrian Somers #define	SALT_LEN	2
1148fb5ef5aSBrian Somers #endif
1158fb5ef5aSBrian Somers 
1168fb5ef5aSBrian Somers static const char *
1178fb5ef5aSBrian Somers radius_policyname(int policy)
1188fb5ef5aSBrian Somers {
1198fb5ef5aSBrian Somers   switch(policy) {
1208fb5ef5aSBrian Somers   case MPPE_POLICY_ALLOWED:
1218fb5ef5aSBrian Somers     return "Allowed";
1228fb5ef5aSBrian Somers   case MPPE_POLICY_REQUIRED:
1238fb5ef5aSBrian Somers     return "Required";
1248fb5ef5aSBrian Somers   }
1258fb5ef5aSBrian Somers   return NumStr(policy, NULL, 0);
1268fb5ef5aSBrian Somers }
1278fb5ef5aSBrian Somers 
1288fb5ef5aSBrian Somers static const char *
1298fb5ef5aSBrian Somers radius_typesname(int types)
1308fb5ef5aSBrian Somers {
1318fb5ef5aSBrian Somers   switch(types) {
1328fb5ef5aSBrian Somers   case MPPE_TYPE_40BIT:
1338fb5ef5aSBrian Somers     return "40 bit";
1348fb5ef5aSBrian Somers   case MPPE_TYPE_128BIT:
1358fb5ef5aSBrian Somers     return "128 bit";
1368fb5ef5aSBrian Somers   case MPPE_TYPE_40BIT|MPPE_TYPE_128BIT:
1378fb5ef5aSBrian Somers     return "40 or 128 bit";
1388fb5ef5aSBrian Somers   }
1398fb5ef5aSBrian Somers   return NumStr(types, NULL, 0);
1408fb5ef5aSBrian Somers }
1418fb5ef5aSBrian Somers 
1428fb5ef5aSBrian Somers #ifndef NODES
1438fb5ef5aSBrian Somers static void
1448fb5ef5aSBrian Somers demangle(struct radius *r, const void *mangled, size_t mlen,
1458fb5ef5aSBrian Somers          char **buf, size_t *len)
1468fb5ef5aSBrian Somers {
1478fb5ef5aSBrian Somers   char R[AUTH_LEN];		/* variable names as per rfc2548 */
1488fb5ef5aSBrian Somers   const char *S;
1498fb5ef5aSBrian Somers   u_char b[16];
1508fb5ef5aSBrian Somers   const u_char *A, *C;
1518fb5ef5aSBrian Somers   MD5_CTX Context;
1528fb5ef5aSBrian Somers   int Slen, i, Clen, Ppos;
1538fb5ef5aSBrian Somers   u_char *P;
1548fb5ef5aSBrian Somers 
1558fb5ef5aSBrian Somers   if (mlen % 16 != SALT_LEN) {
1568fb5ef5aSBrian Somers     log_Printf(LogWARN, "Cannot interpret mangled data of length %ld\n",
1578fb5ef5aSBrian Somers                (u_long)mlen);
1588fb5ef5aSBrian Somers     *buf = NULL;
1598fb5ef5aSBrian Somers     *len = 0;
1608fb5ef5aSBrian Somers     return;
1618fb5ef5aSBrian Somers   }
1628fb5ef5aSBrian Somers 
1638fb5ef5aSBrian Somers   /* We need the RADIUS Request-Authenticator */
1648fb5ef5aSBrian Somers   if (rad_request_authenticator(r->cx.rad, R, sizeof R) != AUTH_LEN) {
1658fb5ef5aSBrian Somers     log_Printf(LogWARN, "Cannot obtain the RADIUS request authenticator\n");
1668fb5ef5aSBrian Somers     *buf = NULL;
1678fb5ef5aSBrian Somers     *len = 0;
1688fb5ef5aSBrian Somers     return;
1698fb5ef5aSBrian Somers   }
1708fb5ef5aSBrian Somers 
1718fb5ef5aSBrian Somers   A = (const u_char *)mangled;			/* Salt comes first */
1728fb5ef5aSBrian Somers   C = (const u_char *)mangled + SALT_LEN;	/* Then the ciphertext */
1738fb5ef5aSBrian Somers   Clen = mlen - SALT_LEN;
1748fb5ef5aSBrian Somers   S = rad_server_secret(r->cx.rad);		/* We need the RADIUS secret */
1758fb5ef5aSBrian Somers   Slen = strlen(S);
1768fb5ef5aSBrian Somers   P = alloca(Clen);				/* We derive our plaintext */
1778fb5ef5aSBrian Somers 
1788fb5ef5aSBrian Somers   MD5Init(&Context);
1798fb5ef5aSBrian Somers   MD5Update(&Context, S, Slen);
1808fb5ef5aSBrian Somers   MD5Update(&Context, R, AUTH_LEN);
1818fb5ef5aSBrian Somers   MD5Update(&Context, A, SALT_LEN);
1828fb5ef5aSBrian Somers   MD5Final(b, &Context);
1838fb5ef5aSBrian Somers   Ppos = 0;
1848fb5ef5aSBrian Somers 
1858fb5ef5aSBrian Somers   while (Clen) {
1868fb5ef5aSBrian Somers     Clen -= 16;
1878fb5ef5aSBrian Somers 
1888fb5ef5aSBrian Somers     for (i = 0; i < 16; i++)
1898fb5ef5aSBrian Somers       P[Ppos++] = C[i] ^ b[i];
1908fb5ef5aSBrian Somers 
1918fb5ef5aSBrian Somers     if (Clen) {
1928fb5ef5aSBrian Somers       MD5Init(&Context);
1938fb5ef5aSBrian Somers       MD5Update(&Context, S, Slen);
1948fb5ef5aSBrian Somers       MD5Update(&Context, C, 16);
1958fb5ef5aSBrian Somers       MD5Final(b, &Context);
1968fb5ef5aSBrian Somers     }
1978fb5ef5aSBrian Somers 
1988fb5ef5aSBrian Somers     C += 16;
1998fb5ef5aSBrian Somers   }
2008fb5ef5aSBrian Somers 
2018fb5ef5aSBrian Somers   /*
2028fb5ef5aSBrian Somers    * The resulting plain text consists of a one-byte length, the text and
2038fb5ef5aSBrian Somers    * maybe some padding.
2048fb5ef5aSBrian Somers    */
2058fb5ef5aSBrian Somers   *len = *P;
2068fb5ef5aSBrian Somers   if (*len > mlen - 1) {
2078fb5ef5aSBrian Somers     log_Printf(LogWARN, "Mangled data seems to be garbage\n");
2088fb5ef5aSBrian Somers     *buf = NULL;
2098fb5ef5aSBrian Somers     *len = 0;
2108fb5ef5aSBrian Somers     return;
2118fb5ef5aSBrian Somers   }
2128fb5ef5aSBrian Somers 
2138fb5ef5aSBrian Somers   *buf = malloc(*len);
2148fb5ef5aSBrian Somers   memcpy(*buf, P + 1, *len);
2158fb5ef5aSBrian Somers log_Printf(LogWARN, "demangled %d bytes\n", *len);
2168fb5ef5aSBrian Somers }
217ff8e577bSBrian Somers #endif
218972a1bcfSBrian Somers 
219f0cdd9c0SBrian Somers /*
220f0cdd9c0SBrian Somers  * rad_continue_send_request() has given us `got' (non-zero).  Deal with it.
221f0cdd9c0SBrian Somers  */
222f0cdd9c0SBrian Somers static void
223f0cdd9c0SBrian Somers radius_Process(struct radius *r, int got)
224972a1bcfSBrian Somers {
225972a1bcfSBrian Somers   char *argv[MAXARGS], *nuke;
226f0cdd9c0SBrian Somers   struct bundle *bundle;
227ff8e577bSBrian Somers   int argc, addrs, res, width;
22828e610e3SBrian Somers   size_t len;
22930949fd4SBrian Somers   struct ncprange dest;
23030949fd4SBrian Somers   struct ncpaddr gw;
231f0cdd9c0SBrian Somers   const void *data;
232c42627ffSBrian Somers   const char *stype;
233ff8e577bSBrian Somers   u_int32_t ipaddr, vendor;
23430949fd4SBrian Somers   struct in_addr ip;
235972a1bcfSBrian Somers 
236f0cdd9c0SBrian Somers   r->cx.fd = -1;		/* Stop select()ing */
237c42627ffSBrian Somers   stype = r->cx.auth ? "auth" : "acct";
238972a1bcfSBrian Somers 
239972a1bcfSBrian Somers   switch (got) {
240972a1bcfSBrian Somers     case RAD_ACCESS_ACCEPT:
241c42627ffSBrian Somers       log_Printf(LogPHASE, "Radius(%s): ACCEPT received\n", stype);
242c42627ffSBrian Somers       if (!r->cx.auth) {
243c42627ffSBrian Somers         rad_close(r->cx.rad);
244c42627ffSBrian Somers         return;
245c42627ffSBrian Somers       }
246972a1bcfSBrian Somers       break;
247972a1bcfSBrian Somers 
248f0cdd9c0SBrian Somers     case RAD_ACCESS_REJECT:
249c42627ffSBrian Somers       log_Printf(LogPHASE, "Radius(%s): REJECT received\n", stype);
250ff8e577bSBrian Somers       if (!r->cx.auth) {
251f0cdd9c0SBrian Somers         rad_close(r->cx.rad);
252f0cdd9c0SBrian Somers         return;
253ff8e577bSBrian Somers       }
254ff8e577bSBrian Somers       break;
255f0cdd9c0SBrian Somers 
256972a1bcfSBrian Somers     case RAD_ACCESS_CHALLENGE:
257972a1bcfSBrian Somers       /* we can't deal with this (for now) ! */
258f0cdd9c0SBrian Somers       log_Printf(LogPHASE, "Radius: CHALLENGE received (can't handle yet)\n");
259c42627ffSBrian Somers       if (r->cx.auth)
260f0cdd9c0SBrian Somers         auth_Failure(r->cx.auth);
261f0cdd9c0SBrian Somers       rad_close(r->cx.rad);
262f0cdd9c0SBrian Somers       return;
263972a1bcfSBrian Somers 
264794c9bbcSBrian Somers     case RAD_ACCOUNTING_RESPONSE:
265c42627ffSBrian Somers       log_Printf(LogPHASE, "Radius(%s): Accounting response received\n", stype);
266c42627ffSBrian Somers       if (r->cx.auth)
267c42627ffSBrian Somers         auth_Failure(r->cx.auth);		/* unexpected !!! */
268c42627ffSBrian Somers 
269794c9bbcSBrian Somers       /* No further processing for accounting requests, please */
270794c9bbcSBrian Somers       rad_close(r->cx.rad);
271794c9bbcSBrian Somers       return;
272794c9bbcSBrian Somers 
273972a1bcfSBrian Somers     case -1:
274c42627ffSBrian Somers       log_Printf(LogPHASE, "radius(%s): %s\n", stype, rad_strerror(r->cx.rad));
275c42627ffSBrian Somers       if (r->cx.auth)
276f0cdd9c0SBrian Somers         auth_Failure(r->cx.auth);
277f0cdd9c0SBrian Somers       rad_close(r->cx.rad);
278f0cdd9c0SBrian Somers       return;
279972a1bcfSBrian Somers 
280972a1bcfSBrian Somers     default:
281c42627ffSBrian Somers       log_Printf(LogERROR, "rad_send_request(%s): Failed %d: %s\n", stype,
282f0cdd9c0SBrian Somers                  got, rad_strerror(r->cx.rad));
283c42627ffSBrian Somers       if (r->cx.auth)
284f0cdd9c0SBrian Somers         auth_Failure(r->cx.auth);
285f0cdd9c0SBrian Somers       rad_close(r->cx.rad);
286f0cdd9c0SBrian Somers       return;
287972a1bcfSBrian Somers   }
288972a1bcfSBrian Somers 
289ff8e577bSBrian Somers   /* Let's see what we've got in our reply */
290972a1bcfSBrian Somers   r->ip.s_addr = r->mask.s_addr = INADDR_NONE;
291972a1bcfSBrian Somers   r->mtu = 0;
292972a1bcfSBrian Somers   r->vj = 0;
293ff8e577bSBrian Somers   while ((res = rad_get_attr(r->cx.rad, &data, &len)) > 0) {
294ff8e577bSBrian Somers     switch (res) {
295972a1bcfSBrian Somers       case RAD_FRAMED_IP_ADDRESS:
296972a1bcfSBrian Somers         r->ip = rad_cvt_addr(data);
297f0cdd9c0SBrian Somers         log_Printf(LogPHASE, " IP %s\n", inet_ntoa(r->ip));
298972a1bcfSBrian Somers         break;
299972a1bcfSBrian Somers 
300bf1eaec5SBrian Somers       case RAD_FILTER_ID:
301bf1eaec5SBrian Somers         free(r->filterid);
302bf1eaec5SBrian Somers         if ((r->filterid = rad_cvt_string(data, len)) == NULL) {
303bf1eaec5SBrian Somers           log_Printf(LogERROR, "rad_cvt_string: %s\n", rad_strerror(r->cx.rad));
304ff8e577bSBrian Somers           auth_Failure(r->cx.auth);
305bf1eaec5SBrian Somers           rad_close(r->cx.rad);
306bf1eaec5SBrian Somers           return;
307bf1eaec5SBrian Somers         }
308bf1eaec5SBrian Somers         log_Printf(LogPHASE, " Filter \"%s\"\n", r->filterid);
309bf1eaec5SBrian Somers         break;
310bf1eaec5SBrian Somers 
311bf1eaec5SBrian Somers       case RAD_SESSION_TIMEOUT:
312bf1eaec5SBrian Somers         r->sessiontime = rad_cvt_int(data);
313bf1eaec5SBrian Somers         log_Printf(LogPHASE, " Session-Timeout %lu\n", r->sessiontime);
314bf1eaec5SBrian Somers         break;
315bf1eaec5SBrian Somers 
316972a1bcfSBrian Somers       case RAD_FRAMED_IP_NETMASK:
317972a1bcfSBrian Somers         r->mask = rad_cvt_addr(data);
318f0cdd9c0SBrian Somers         log_Printf(LogPHASE, " Netmask %s\n", inet_ntoa(r->mask));
319972a1bcfSBrian Somers         break;
320972a1bcfSBrian Somers 
321972a1bcfSBrian Somers       case RAD_FRAMED_MTU:
322972a1bcfSBrian Somers         r->mtu = rad_cvt_int(data);
323f0cdd9c0SBrian Somers         log_Printf(LogPHASE, " MTU %lu\n", r->mtu);
324972a1bcfSBrian Somers         break;
325972a1bcfSBrian Somers 
326972a1bcfSBrian Somers       case RAD_FRAMED_ROUTING:
327972a1bcfSBrian Somers         /* Disabled for now - should we automatically set up some filters ? */
328972a1bcfSBrian Somers         /* rad_cvt_int(data); */
329972a1bcfSBrian Somers         /* bit 1 = Send routing packets */
330972a1bcfSBrian Somers         /* bit 2 = Receive routing packets */
331972a1bcfSBrian Somers         break;
332972a1bcfSBrian Somers 
333972a1bcfSBrian Somers       case RAD_FRAMED_COMPRESSION:
334972a1bcfSBrian Somers         r->vj = rad_cvt_int(data) == 1 ? 1 : 0;
335f0cdd9c0SBrian Somers         log_Printf(LogPHASE, " VJ %sabled\n", r->vj ? "en" : "dis");
336972a1bcfSBrian Somers         break;
337972a1bcfSBrian Somers 
338972a1bcfSBrian Somers       case RAD_FRAMED_ROUTE:
339972a1bcfSBrian Somers         /*
340972a1bcfSBrian Somers          * We expect a string of the format ``dest[/bits] gw [metrics]''
341972a1bcfSBrian Somers          * Any specified metrics are ignored.  MYADDR and HISADDR are
342972a1bcfSBrian Somers          * understood for ``dest'' and ``gw'' and ``0.0.0.0'' is the same
343972a1bcfSBrian Somers          * as ``HISADDR''.
344972a1bcfSBrian Somers          */
345972a1bcfSBrian Somers 
346972a1bcfSBrian Somers         if ((nuke = rad_cvt_string(data, len)) == NULL) {
347f0cdd9c0SBrian Somers           log_Printf(LogERROR, "rad_cvt_string: %s\n", rad_strerror(r->cx.rad));
348ff8e577bSBrian Somers           auth_Failure(r->cx.auth);
349f0cdd9c0SBrian Somers           rad_close(r->cx.rad);
350f0cdd9c0SBrian Somers           return;
351972a1bcfSBrian Somers         }
352972a1bcfSBrian Somers 
353f0cdd9c0SBrian Somers         log_Printf(LogPHASE, " Route: %s\n", nuke);
354f0cdd9c0SBrian Somers         bundle = r->cx.auth->physical->dl->bundle;
35530949fd4SBrian Somers         ip.s_addr = INADDR_ANY;
35630949fd4SBrian Somers         ncprange_setip4host(&dest, ip);
357972a1bcfSBrian Somers         argc = command_Interpret(nuke, strlen(nuke), argv);
358c39aa54eSBrian Somers         if (argc < 0)
359c39aa54eSBrian Somers           log_Printf(LogWARN, "radius: %s: Syntax error\n",
360c39aa54eSBrian Somers                      argc == 1 ? argv[0] : "\"\"");
361c39aa54eSBrian Somers         else if (argc < 2)
362972a1bcfSBrian Somers           log_Printf(LogWARN, "radius: %s: Invalid route\n",
363972a1bcfSBrian Somers                      argc == 1 ? argv[0] : "\"\"");
364972a1bcfSBrian Somers         else if ((strcasecmp(argv[0], "default") != 0 &&
36530949fd4SBrian Somers                   !ncprange_aton(&dest, &bundle->ncp, argv[0])) ||
36630949fd4SBrian Somers                  !ncpaddr_aton(&gw, &bundle->ncp, argv[1]))
367972a1bcfSBrian Somers           log_Printf(LogWARN, "radius: %s %s: Invalid route\n",
368972a1bcfSBrian Somers                      argv[0], argv[1]);
369972a1bcfSBrian Somers         else {
37030949fd4SBrian Somers           ncprange_getwidth(&dest, &width);
37130949fd4SBrian Somers           if (width == 32 && strchr(argv[0], '/') == NULL) {
372972a1bcfSBrian Somers             /* No mask specified - use the natural mask */
37330949fd4SBrian Somers             ncprange_getip4addr(&dest, &ip);
37430949fd4SBrian Somers             ncprange_setip4mask(&dest, addr2mask(ip));
37530949fd4SBrian Somers           }
376972a1bcfSBrian Somers           addrs = 0;
377972a1bcfSBrian Somers 
378972a1bcfSBrian Somers           if (!strncasecmp(argv[0], "HISADDR", 7))
379972a1bcfSBrian Somers             addrs = ROUTE_DSTHISADDR;
380972a1bcfSBrian Somers           else if (!strncasecmp(argv[0], "MYADDR", 6))
381972a1bcfSBrian Somers             addrs = ROUTE_DSTMYADDR;
382972a1bcfSBrian Somers 
38330949fd4SBrian Somers           if (ncpaddr_getip4addr(&gw, &ipaddr) && ipaddr == INADDR_ANY) {
384972a1bcfSBrian Somers             addrs |= ROUTE_GWHISADDR;
38530949fd4SBrian Somers             ncpaddr_setip4(&gw, bundle->ncp.ipcp.peer_ip);
386972a1bcfSBrian Somers           } else if (strcasecmp(argv[1], "HISADDR") == 0)
387972a1bcfSBrian Somers             addrs |= ROUTE_GWHISADDR;
388972a1bcfSBrian Somers 
38930949fd4SBrian Somers           route_Add(&r->routes, addrs, &dest, &gw);
390972a1bcfSBrian Somers         }
391972a1bcfSBrian Somers         free(nuke);
392972a1bcfSBrian Somers         break;
393972a1bcfSBrian Somers 
394ff8e577bSBrian Somers       case RAD_REPLY_MESSAGE:
395ff8e577bSBrian Somers         free(r->repstr);
396ff8e577bSBrian Somers         if ((r->repstr = rad_cvt_string(data, len)) == NULL) {
397ff8e577bSBrian Somers           log_Printf(LogERROR, "rad_cvt_string: %s\n", rad_strerror(r->cx.rad));
398ff8e577bSBrian Somers           auth_Failure(r->cx.auth);
399ff8e577bSBrian Somers           rad_close(r->cx.rad);
400ff8e577bSBrian Somers           return;
401ff8e577bSBrian Somers         }
402ff8e577bSBrian Somers         log_Printf(LogPHASE, " Reply-Message \"%s\"\n", r->repstr);
403ff8e577bSBrian Somers         break;
404ff8e577bSBrian Somers 
405ff8e577bSBrian Somers       case RAD_VENDOR_SPECIFIC:
406ff8e577bSBrian Somers         if ((res = rad_get_vendor_attr(&vendor, &data, &len)) <= 0) {
407ff8e577bSBrian Somers           log_Printf(LogERROR, "rad_get_vendor_attr: %s (failing!)\n",
408f0cdd9c0SBrian Somers                      rad_strerror(r->cx.rad));
409f0cdd9c0SBrian Somers           auth_Failure(r->cx.auth);
410f0cdd9c0SBrian Somers           rad_close(r->cx.rad);
411ff8e577bSBrian Somers           return;
412ff8e577bSBrian Somers         }
413ff8e577bSBrian Somers 
414ff8e577bSBrian Somers 	switch (vendor) {
415ff8e577bSBrian Somers           case RAD_VENDOR_MICROSOFT:
416ff8e577bSBrian Somers             switch (res) {
4178fb5ef5aSBrian Somers #ifndef NODES
418ff8e577bSBrian Somers               case RAD_MICROSOFT_MS_CHAP_ERROR:
419ff8e577bSBrian Somers                 free(r->errstr);
420a95b23a6SBrian Somers                 if (len == 0)
421a95b23a6SBrian Somers                   r->errstr = NULL;
422a95b23a6SBrian Somers                 else {
423a95b23a6SBrian Somers                   if ((r->errstr = rad_cvt_string((const char *)data + 1,
424a95b23a6SBrian Somers                                                   len - 1)) == NULL) {
425ff8e577bSBrian Somers                     log_Printf(LogERROR, "rad_cvt_string: %s\n",
426ff8e577bSBrian Somers                                rad_strerror(r->cx.rad));
427ff8e577bSBrian Somers                     auth_Failure(r->cx.auth);
428ff8e577bSBrian Somers                     rad_close(r->cx.rad);
429ff8e577bSBrian Somers                     return;
430ff8e577bSBrian Somers                   }
431ff8e577bSBrian Somers                   log_Printf(LogPHASE, " MS-CHAP-Error \"%s\"\n", r->errstr);
432a95b23a6SBrian Somers                 }
433ff8e577bSBrian Somers                 break;
434ff8e577bSBrian Somers 
435a16061b2SBrian Somers               case RAD_MICROSOFT_MS_CHAP2_SUCCESS:
436a16061b2SBrian Somers                 free(r->msrepstr);
437a95b23a6SBrian Somers                 if (len == 0)
438a95b23a6SBrian Somers                   r->msrepstr = NULL;
439a95b23a6SBrian Somers                 else {
440a95b23a6SBrian Somers                   if ((r->msrepstr = rad_cvt_string((const char *)data + 1,
441a95b23a6SBrian Somers                                                     len - 1)) == NULL) {
442a16061b2SBrian Somers                     log_Printf(LogERROR, "rad_cvt_string: %s\n",
443a16061b2SBrian Somers                                rad_strerror(r->cx.rad));
444a16061b2SBrian Somers                     auth_Failure(r->cx.auth);
445a16061b2SBrian Somers                     rad_close(r->cx.rad);
446a16061b2SBrian Somers                     return;
447a16061b2SBrian Somers                   }
448a95b23a6SBrian Somers                   log_Printf(LogPHASE, " MS-CHAP2-Success \"%s\"\n",
449a95b23a6SBrian Somers                              r->msrepstr);
450a95b23a6SBrian Somers                 }
451a16061b2SBrian Somers                 break;
452a16061b2SBrian Somers 
4538fb5ef5aSBrian Somers               case RAD_MICROSOFT_MS_MPPE_ENCRYPTION_POLICY:
4548fb5ef5aSBrian Somers                 r->mppe.policy = rad_cvt_int(data);
4558fb5ef5aSBrian Somers                 log_Printf(LogPHASE, " MS-MPPE-Encryption-Policy %s\n",
4568fb5ef5aSBrian Somers                            radius_policyname(r->mppe.policy));
4578fb5ef5aSBrian Somers                 break;
4588fb5ef5aSBrian Somers 
4598fb5ef5aSBrian Somers               case RAD_MICROSOFT_MS_MPPE_ENCRYPTION_TYPES:
4608fb5ef5aSBrian Somers                 r->mppe.types = rad_cvt_int(data);
4618fb5ef5aSBrian Somers                 log_Printf(LogPHASE, " MS-MPPE-Encryption-Types %s\n",
4628fb5ef5aSBrian Somers                            radius_typesname(r->mppe.types));
4638fb5ef5aSBrian Somers                 break;
4648fb5ef5aSBrian Somers 
4658fb5ef5aSBrian Somers               case RAD_MICROSOFT_MS_MPPE_RECV_KEY:
4668fb5ef5aSBrian Somers                 free(r->mppe.recvkey);
4678fb5ef5aSBrian Somers 		demangle(r, data, len, &r->mppe.recvkey, &r->mppe.recvkeylen);
4688fb5ef5aSBrian Somers                 log_Printf(LogPHASE, " MS-MPPE-Recv-Key ********\n");
4698fb5ef5aSBrian Somers                 break;
4708fb5ef5aSBrian Somers 
4718fb5ef5aSBrian Somers               case RAD_MICROSOFT_MS_MPPE_SEND_KEY:
4728fb5ef5aSBrian Somers 		demangle(r, data, len, &r->mppe.sendkey, &r->mppe.sendkeylen);
4738fb5ef5aSBrian Somers                 log_Printf(LogPHASE, " MS-MPPE-Send-Key ********\n");
4748fb5ef5aSBrian Somers                 break;
4758fb5ef5aSBrian Somers #endif
4768fb5ef5aSBrian Somers 
477ff8e577bSBrian Somers               default:
478ff8e577bSBrian Somers                 log_Printf(LogDEBUG, "Dropping MICROSOFT vendor specific "
479ff8e577bSBrian Somers                            "RADIUS attribute %d\n", res);
480ff8e577bSBrian Somers                 break;
481ff8e577bSBrian Somers             }
482ff8e577bSBrian Somers             break;
483ff8e577bSBrian Somers 
484ff8e577bSBrian Somers           default:
485ff8e577bSBrian Somers             log_Printf(LogDEBUG, "Dropping vendor %lu RADIUS attribute %d\n",
486ff8e577bSBrian Somers                        (unsigned long)vendor, res);
487ff8e577bSBrian Somers             break;
488ff8e577bSBrian Somers         }
489ff8e577bSBrian Somers         break;
490ff8e577bSBrian Somers 
491ff8e577bSBrian Somers       default:
492ff8e577bSBrian Somers         log_Printf(LogDEBUG, "Dropping RADIUS attribute %d\n", res);
493ff8e577bSBrian Somers         break;
494ff8e577bSBrian Somers     }
495ff8e577bSBrian Somers   }
496ff8e577bSBrian Somers 
497ff8e577bSBrian Somers   if (res == -1) {
498ff8e577bSBrian Somers     log_Printf(LogERROR, "rad_get_attr: %s (failing!)\n",
499ff8e577bSBrian Somers                rad_strerror(r->cx.rad));
500ff8e577bSBrian Somers     auth_Failure(r->cx.auth);
501ff8e577bSBrian Somers   } else if (got == RAD_ACCESS_REJECT)
502ff8e577bSBrian Somers     auth_Failure(r->cx.auth);
503ff8e577bSBrian Somers   else {
504f0cdd9c0SBrian Somers     r->valid = 1;
505f0cdd9c0SBrian Somers     auth_Success(r->cx.auth);
506f0cdd9c0SBrian Somers   }
507ff8e577bSBrian Somers   rad_close(r->cx.rad);
508972a1bcfSBrian Somers }
509972a1bcfSBrian Somers 
510f0cdd9c0SBrian Somers /*
5118e7bd08eSBrian Somers  * We've either timed out or select()ed on the read descriptor
512f0cdd9c0SBrian Somers  */
513f0cdd9c0SBrian Somers static void
514f0cdd9c0SBrian Somers radius_Continue(struct radius *r, int sel)
515f0cdd9c0SBrian Somers {
516f0cdd9c0SBrian Somers   struct timeval tv;
517f0cdd9c0SBrian Somers   int got;
518972a1bcfSBrian Somers 
519f0cdd9c0SBrian Somers   timer_Stop(&r->cx.timer);
520f0cdd9c0SBrian Somers   if ((got = rad_continue_send_request(r->cx.rad, sel, &r->cx.fd, &tv)) == 0) {
521f0cdd9c0SBrian Somers     log_Printf(LogPHASE, "Radius: Request re-sent\n");
522f0cdd9c0SBrian Somers     r->cx.timer.load = tv.tv_usec / TICKUNIT + tv.tv_sec * SECTICKS;
523f0cdd9c0SBrian Somers     timer_Start(&r->cx.timer);
524f0cdd9c0SBrian Somers     return;
525f0cdd9c0SBrian Somers   }
526f0cdd9c0SBrian Somers 
527f0cdd9c0SBrian Somers   radius_Process(r, got);
528f0cdd9c0SBrian Somers }
529f0cdd9c0SBrian Somers 
530f0cdd9c0SBrian Somers /*
531f0cdd9c0SBrian Somers  * Time to call rad_continue_send_request() - timed out.
532f0cdd9c0SBrian Somers  */
533f0cdd9c0SBrian Somers static void
534f0cdd9c0SBrian Somers radius_Timeout(void *v)
535f0cdd9c0SBrian Somers {
536f0cdd9c0SBrian Somers   radius_Continue((struct radius *)v, 0);
537f0cdd9c0SBrian Somers }
538f0cdd9c0SBrian Somers 
539f0cdd9c0SBrian Somers /*
540f0cdd9c0SBrian Somers  * Time to call rad_continue_send_request() - something to read.
541f0cdd9c0SBrian Somers  */
542f0cdd9c0SBrian Somers static void
543f013f33eSBrian Somers radius_Read(struct fdescriptor *d, struct bundle *bundle, const fd_set *fdset)
544f0cdd9c0SBrian Somers {
545f0cdd9c0SBrian Somers   radius_Continue(descriptor2radius(d), 1);
546f0cdd9c0SBrian Somers }
547f0cdd9c0SBrian Somers 
548f0cdd9c0SBrian Somers /*
5498e7bd08eSBrian Somers  * Behave as a struct fdescriptor (descriptor.h)
550f0cdd9c0SBrian Somers  */
551f0cdd9c0SBrian Somers static int
552f013f33eSBrian Somers radius_UpdateSet(struct fdescriptor *d, fd_set *r, fd_set *w, fd_set *e, int *n)
553f0cdd9c0SBrian Somers {
554f0cdd9c0SBrian Somers   struct radius *rad = descriptor2radius(d);
555f0cdd9c0SBrian Somers 
556f0cdd9c0SBrian Somers   if (r && rad->cx.fd != -1) {
557f0cdd9c0SBrian Somers     FD_SET(rad->cx.fd, r);
558f0cdd9c0SBrian Somers     if (*n < rad->cx.fd + 1)
559f0cdd9c0SBrian Somers       *n = rad->cx.fd + 1;
560f0cdd9c0SBrian Somers     log_Printf(LogTIMER, "Radius: fdset(r) %d\n", rad->cx.fd);
56182d6780cSBrian Somers     return 1;
562972a1bcfSBrian Somers   }
563972a1bcfSBrian Somers 
564f0cdd9c0SBrian Somers   return 0;
565f0cdd9c0SBrian Somers }
566f0cdd9c0SBrian Somers 
567f0cdd9c0SBrian Somers /*
5688e7bd08eSBrian Somers  * Behave as a struct fdescriptor (descriptor.h)
569f0cdd9c0SBrian Somers  */
570f0cdd9c0SBrian Somers static int
571f013f33eSBrian Somers radius_IsSet(struct fdescriptor *d, const fd_set *fdset)
572f0cdd9c0SBrian Somers {
573f0cdd9c0SBrian Somers   struct radius *r = descriptor2radius(d);
574f0cdd9c0SBrian Somers 
575f0cdd9c0SBrian Somers   return r && r->cx.fd != -1 && FD_ISSET(r->cx.fd, fdset);
576f0cdd9c0SBrian Somers }
577f0cdd9c0SBrian Somers 
578f0cdd9c0SBrian Somers /*
5798e7bd08eSBrian Somers  * Behave as a struct fdescriptor (descriptor.h)
580f0cdd9c0SBrian Somers  */
581f0cdd9c0SBrian Somers static int
582f013f33eSBrian Somers radius_Write(struct fdescriptor *d, struct bundle *bundle, const fd_set *fdset)
583f0cdd9c0SBrian Somers {
584f0cdd9c0SBrian Somers   /* We never want to write here ! */
585f0cdd9c0SBrian Somers   log_Printf(LogALERT, "radius_Write: Internal error: Bad call !\n");
586f0cdd9c0SBrian Somers   return 0;
587f0cdd9c0SBrian Somers }
588f0cdd9c0SBrian Somers 
589f0cdd9c0SBrian Somers /*
590f0cdd9c0SBrian Somers  * Initialise ourselves
591f0cdd9c0SBrian Somers  */
592f0cdd9c0SBrian Somers void
593f0cdd9c0SBrian Somers radius_Init(struct radius *r)
594f0cdd9c0SBrian Somers {
595f0cdd9c0SBrian Somers   r->desc.type = RADIUS_DESCRIPTOR;
596f0cdd9c0SBrian Somers   r->desc.UpdateSet = radius_UpdateSet;
597f0cdd9c0SBrian Somers   r->desc.IsSet = radius_IsSet;
598f0cdd9c0SBrian Somers   r->desc.Read = radius_Read;
599f0cdd9c0SBrian Somers   r->desc.Write = radius_Write;
600ff8e577bSBrian Somers   r->cx.fd = -1;
601ff8e577bSBrian Somers   r->cx.rad = NULL;
602f0cdd9c0SBrian Somers   memset(&r->cx.timer, '\0', sizeof r->cx.timer);
603ff8e577bSBrian Somers   r->cx.auth = NULL;
604ff8e577bSBrian Somers   r->valid = 0;
605ff8e577bSBrian Somers   r->vj = 0;
606ff8e577bSBrian Somers   r->ip.s_addr = INADDR_ANY;
607ff8e577bSBrian Somers   r->mask.s_addr = INADDR_NONE;
608ff8e577bSBrian Somers   r->routes = NULL;
609ff8e577bSBrian Somers   r->mtu = DEF_MTU;
610a16061b2SBrian Somers   r->msrepstr = NULL;
611ff8e577bSBrian Somers   r->repstr = NULL;
612ff8e577bSBrian Somers   r->errstr = NULL;
6138fb5ef5aSBrian Somers   r->mppe.policy = 0;
6148fb5ef5aSBrian Somers   r->mppe.types = 0;
6158fb5ef5aSBrian Somers   r->mppe.recvkey = NULL;
6168fb5ef5aSBrian Somers   r->mppe.recvkeylen = 0;
6178fb5ef5aSBrian Somers   r->mppe.sendkey = NULL;
6188fb5ef5aSBrian Somers   r->mppe.sendkeylen = 0;
619ff8e577bSBrian Somers   *r->cfg.file = '\0';;
620794c9bbcSBrian Somers   log_Printf(LogDEBUG, "Radius: radius_Init\n");
621f0cdd9c0SBrian Somers }
622f0cdd9c0SBrian Somers 
623f0cdd9c0SBrian Somers /*
624f0cdd9c0SBrian Somers  * Forget everything and go back to initialised state.
625f0cdd9c0SBrian Somers  */
626f0cdd9c0SBrian Somers void
627f0cdd9c0SBrian Somers radius_Destroy(struct radius *r)
628f0cdd9c0SBrian Somers {
629f0cdd9c0SBrian Somers   r->valid = 0;
630794c9bbcSBrian Somers   log_Printf(LogDEBUG, "Radius: radius_Destroy\n");
631f0cdd9c0SBrian Somers   timer_Stop(&r->cx.timer);
632f0cdd9c0SBrian Somers   route_DeleteAll(&r->routes);
633bf1eaec5SBrian Somers   free(r->filterid);
634bf1eaec5SBrian Somers   r->filterid = NULL;
635a16061b2SBrian Somers   free(r->msrepstr);
636a16061b2SBrian Somers   r->msrepstr = NULL;
637ff8e577bSBrian Somers   free(r->repstr);
638ff8e577bSBrian Somers   r->repstr = NULL;
639ff8e577bSBrian Somers   free(r->errstr);
640ff8e577bSBrian Somers   r->errstr = NULL;
6418fb5ef5aSBrian Somers   free(r->mppe.recvkey);
6428fb5ef5aSBrian Somers   r->mppe.recvkey = NULL;
6438fb5ef5aSBrian Somers   r->mppe.recvkeylen = 0;
6448fb5ef5aSBrian Somers   free(r->mppe.sendkey);
6458fb5ef5aSBrian Somers   r->mppe.sendkey = NULL;
6468fb5ef5aSBrian Somers   r->mppe.sendkeylen = 0;
647f0cdd9c0SBrian Somers   if (r->cx.fd != -1) {
648f0cdd9c0SBrian Somers     r->cx.fd = -1;
649f0cdd9c0SBrian Somers     rad_close(r->cx.rad);
650f0cdd9c0SBrian Somers   }
651f0cdd9c0SBrian Somers }
652f0cdd9c0SBrian Somers 
653de59e178SBrian Somers static int
654de59e178SBrian Somers radius_put_physical_details(struct rad_handle *rad, struct physical *p)
655de59e178SBrian Somers {
656de59e178SBrian Somers   int slot, type;
657de59e178SBrian Somers 
658de59e178SBrian Somers   type = RAD_VIRTUAL;
659de59e178SBrian Somers   if (p->handler)
660de59e178SBrian Somers     switch (p->handler->type) {
661de59e178SBrian Somers       case I4B_DEVICE:
662de59e178SBrian Somers         type = RAD_ISDN_SYNC;
663de59e178SBrian Somers         break;
664de59e178SBrian Somers 
665de59e178SBrian Somers       case TTY_DEVICE:
666de59e178SBrian Somers         type = RAD_ASYNC;
667de59e178SBrian Somers         break;
668de59e178SBrian Somers 
669de59e178SBrian Somers       case ETHER_DEVICE:
670de59e178SBrian Somers         type = RAD_ETHERNET;
671de59e178SBrian Somers         break;
672de59e178SBrian Somers 
673de59e178SBrian Somers       case TCP_DEVICE:
674de59e178SBrian Somers       case UDP_DEVICE:
675de59e178SBrian Somers       case EXEC_DEVICE:
676de59e178SBrian Somers       case ATM_DEVICE:
677de59e178SBrian Somers       case NG_DEVICE:
678de59e178SBrian Somers         type = RAD_VIRTUAL;
679de59e178SBrian Somers         break;
680de59e178SBrian Somers     }
681de59e178SBrian Somers 
682de59e178SBrian Somers   if (rad_put_int(rad, RAD_NAS_PORT_TYPE, type) != 0) {
683de59e178SBrian Somers     log_Printf(LogERROR, "rad_put: rad_put_int: %s\n", rad_strerror(rad));
684de59e178SBrian Somers     rad_close(rad);
685de59e178SBrian Somers     return 0;
686de59e178SBrian Somers   }
687de59e178SBrian Somers 
688de59e178SBrian Somers   if ((slot = physical_Slot(p)) >= 0)
689de59e178SBrian Somers     if (rad_put_int(rad, RAD_NAS_PORT, slot) != 0) {
690de59e178SBrian Somers       log_Printf(LogERROR, "rad_put: rad_put_int: %s\n", rad_strerror(rad));
691de59e178SBrian Somers       rad_close(rad);
692de59e178SBrian Somers       return 0;
693de59e178SBrian Somers     }
694de59e178SBrian Somers 
695de59e178SBrian Somers   return 1;
696de59e178SBrian Somers }
697de59e178SBrian Somers 
698f0cdd9c0SBrian Somers /*
699f0cdd9c0SBrian Somers  * Start an authentication request to the RADIUS server.
700f0cdd9c0SBrian Somers  */
701a16061b2SBrian Somers int
702f0cdd9c0SBrian Somers radius_Authenticate(struct radius *r, struct authinfo *authp, const char *name,
703a16061b2SBrian Somers                     const char *key, int klen, const char *nchallenge,
704a16061b2SBrian Somers                     int nclen, const char *pchallenge, int pclen)
705f0cdd9c0SBrian Somers {
706f0cdd9c0SBrian Somers   struct timeval tv;
707de59e178SBrian Somers   int got;
70826e6a622SBrian Somers   char hostname[MAXHOSTNAMELEN];
709aadbb4eaSBrian Somers #if 0
710f10f5203SBrian Somers   struct hostent *hp;
711f10f5203SBrian Somers   struct in_addr hostaddr;
7128fb5ef5aSBrian Somers #endif
713ff8e577bSBrian Somers #ifndef NODES
714a16061b2SBrian Somers   struct mschap_response msresp;
715a16061b2SBrian Somers   struct mschap2_response msresp2;
716ff8e577bSBrian Somers #endif
717f0cdd9c0SBrian Somers 
718f0cdd9c0SBrian Somers   if (!*r->cfg.file)
719a16061b2SBrian Somers     return 0;
720f0cdd9c0SBrian Somers 
721f0cdd9c0SBrian Somers   if (r->cx.fd != -1)
722f0cdd9c0SBrian Somers     /*
723f0cdd9c0SBrian Somers      * We assume that our name/key/challenge is the same as last time,
724f0cdd9c0SBrian Somers      * and just continue to wait for the RADIUS server(s).
725f0cdd9c0SBrian Somers      */
726a16061b2SBrian Somers     return 1;
727f0cdd9c0SBrian Somers 
728f0cdd9c0SBrian Somers   radius_Destroy(r);
729f0cdd9c0SBrian Somers 
730794c9bbcSBrian Somers   if ((r->cx.rad = rad_auth_open()) == NULL) {
731794c9bbcSBrian Somers     log_Printf(LogERROR, "rad_auth_open: %s\n", strerror(errno));
732a16061b2SBrian Somers     return 0;
733f0cdd9c0SBrian Somers   }
734f0cdd9c0SBrian Somers 
735f0cdd9c0SBrian Somers   if (rad_config(r->cx.rad, r->cfg.file) != 0) {
736f0cdd9c0SBrian Somers     log_Printf(LogERROR, "rad_config: %s\n", rad_strerror(r->cx.rad));
737f0cdd9c0SBrian Somers     rad_close(r->cx.rad);
738a16061b2SBrian Somers     return 0;
739f0cdd9c0SBrian Somers   }
740f0cdd9c0SBrian Somers 
741f0cdd9c0SBrian Somers   if (rad_create_request(r->cx.rad, RAD_ACCESS_REQUEST) != 0) {
742f0cdd9c0SBrian Somers     log_Printf(LogERROR, "rad_create_request: %s\n", rad_strerror(r->cx.rad));
743f0cdd9c0SBrian Somers     rad_close(r->cx.rad);
744a16061b2SBrian Somers     return 0;
745f0cdd9c0SBrian Somers   }
746f0cdd9c0SBrian Somers 
747f0cdd9c0SBrian Somers   if (rad_put_string(r->cx.rad, RAD_USER_NAME, name) != 0 ||
748f0cdd9c0SBrian Somers       rad_put_int(r->cx.rad, RAD_SERVICE_TYPE, RAD_FRAMED) != 0 ||
749f0cdd9c0SBrian Somers       rad_put_int(r->cx.rad, RAD_FRAMED_PROTOCOL, RAD_PPP) != 0) {
750f0cdd9c0SBrian Somers     log_Printf(LogERROR, "rad_put: %s\n", rad_strerror(r->cx.rad));
751f0cdd9c0SBrian Somers     rad_close(r->cx.rad);
752a16061b2SBrian Somers     return 0;
753f0cdd9c0SBrian Somers   }
754f0cdd9c0SBrian Somers 
755ff8e577bSBrian Somers   switch (authp->physical->link.lcp.want_auth) {
756ff8e577bSBrian Somers   case PROTO_PAP:
757ff8e577bSBrian Somers     /* We're talking PAP */
758ff8e577bSBrian Somers     if (rad_put_attr(r->cx.rad, RAD_USER_PASSWORD, key, klen) != 0) {
759ff8e577bSBrian Somers       log_Printf(LogERROR, "PAP: rad_put_string: %s\n",
760ff8e577bSBrian Somers                  rad_strerror(r->cx.rad));
761ff8e577bSBrian Somers       rad_close(r->cx.rad);
762a16061b2SBrian Somers       return 0;
763ff8e577bSBrian Somers     }
764ff8e577bSBrian Somers     break;
765ff8e577bSBrian Somers 
766ff8e577bSBrian Somers   case PROTO_CHAP:
767ff8e577bSBrian Somers     switch (authp->physical->link.lcp.want_authtype) {
768ff8e577bSBrian Somers     case 0x5:
76950ca6ec3SBrian Somers       if (rad_put_attr(r->cx.rad, RAD_CHAP_PASSWORD, key, klen) != 0 ||
770a16061b2SBrian Somers           rad_put_attr(r->cx.rad, RAD_CHAP_CHALLENGE, nchallenge, nclen) != 0) {
771f0cdd9c0SBrian Somers         log_Printf(LogERROR, "CHAP: rad_put_string: %s\n",
772f0cdd9c0SBrian Somers                    rad_strerror(r->cx.rad));
773f0cdd9c0SBrian Somers         rad_close(r->cx.rad);
774a16061b2SBrian Somers         return 0;
775f0cdd9c0SBrian Somers       }
776ff8e577bSBrian Somers       break;
777ff8e577bSBrian Somers 
778ff8e577bSBrian Somers #ifndef NODES
779ff8e577bSBrian Somers     case 0x80:
780ff8e577bSBrian Somers       if (klen != 50) {
781a16061b2SBrian Somers         log_Printf(LogERROR, "CHAP80: Unrecognised key length %d\n", klen);
782f0cdd9c0SBrian Somers         rad_close(r->cx.rad);
783a16061b2SBrian Somers         return 0;
784f0cdd9c0SBrian Somers       }
785a16061b2SBrian Somers 
786ff8e577bSBrian Somers       rad_put_vendor_attr(r->cx.rad, RAD_VENDOR_MICROSOFT,
787a16061b2SBrian Somers                           RAD_MICROSOFT_MS_CHAP_CHALLENGE, nchallenge, nclen);
788a16061b2SBrian Somers       msresp.ident = *key;
789a16061b2SBrian Somers       msresp.flags = 0x01;
790a16061b2SBrian Somers       memcpy(msresp.lm_response, key + 1, 24);
791a16061b2SBrian Somers       memcpy(msresp.nt_response, key + 25, 24);
792ff8e577bSBrian Somers       rad_put_vendor_attr(r->cx.rad, RAD_VENDOR_MICROSOFT,
793a16061b2SBrian Somers                           RAD_MICROSOFT_MS_CHAP_RESPONSE, &msresp,
794a16061b2SBrian Somers                           sizeof msresp);
795ff8e577bSBrian Somers       break;
796ff8e577bSBrian Somers 
797ff8e577bSBrian Somers     case 0x81:
798a16061b2SBrian Somers       if (klen != 50) {
799a16061b2SBrian Somers         log_Printf(LogERROR, "CHAP81: Unrecognised key length %d\n", klen);
800a16061b2SBrian Somers         rad_close(r->cx.rad);
801a16061b2SBrian Somers         return 0;
802a16061b2SBrian Somers       }
803a16061b2SBrian Somers 
804a16061b2SBrian Somers       if (pclen != sizeof msresp2.pchallenge) {
805a16061b2SBrian Somers         log_Printf(LogERROR, "CHAP81: Unrecognised peer challenge length %d\n",
806a16061b2SBrian Somers                    pclen);
807a16061b2SBrian Somers         rad_close(r->cx.rad);
808a16061b2SBrian Somers         return 0;
809a16061b2SBrian Somers       }
810a16061b2SBrian Somers 
811a16061b2SBrian Somers       rad_put_vendor_attr(r->cx.rad, RAD_VENDOR_MICROSOFT,
812a16061b2SBrian Somers                           RAD_MICROSOFT_MS_CHAP_CHALLENGE, nchallenge, nclen);
813a16061b2SBrian Somers       msresp2.ident = *key;
814a16061b2SBrian Somers       msresp2.flags = 0x00;
815a16061b2SBrian Somers       memcpy(msresp2.response, key + 25, 24);
816a16061b2SBrian Somers       memset(msresp2.reserved, '\0', sizeof msresp2.reserved);
817a16061b2SBrian Somers       memcpy(msresp2.pchallenge, pchallenge, pclen);
818a16061b2SBrian Somers       rad_put_vendor_attr(r->cx.rad, RAD_VENDOR_MICROSOFT,
819a16061b2SBrian Somers                           RAD_MICROSOFT_MS_CHAP2_RESPONSE, &msresp2,
820a16061b2SBrian Somers                           sizeof msresp2);
821a16061b2SBrian Somers       break;
822ff8e577bSBrian Somers #endif
823ff8e577bSBrian Somers     default:
824ff8e577bSBrian Somers       log_Printf(LogERROR, "CHAP: Unrecognised type 0x%02x\n",
825ff8e577bSBrian Somers                  authp->physical->link.lcp.want_authtype);
826ff8e577bSBrian Somers       rad_close(r->cx.rad);
827a16061b2SBrian Somers       return 0;
828ff8e577bSBrian Somers     }
829ff8e577bSBrian Somers   }
830f0cdd9c0SBrian Somers 
831f10f5203SBrian Somers   if (gethostname(hostname, sizeof hostname) != 0)
832f10f5203SBrian Somers     log_Printf(LogERROR, "rad_put: gethostname(): %s\n", strerror(errno));
833f10f5203SBrian Somers   else {
834aadbb4eaSBrian Somers #if 0
835f10f5203SBrian Somers     if ((hp = gethostbyname(hostname)) != NULL) {
836f10f5203SBrian Somers       hostaddr.s_addr = *(u_long *)hp->h_addr;
837f10f5203SBrian Somers       if (rad_put_addr(r->cx.rad, RAD_NAS_IP_ADDRESS, hostaddr) != 0) {
838f10f5203SBrian Somers         log_Printf(LogERROR, "rad_put: rad_put_string: %s\n",
839f10f5203SBrian Somers                    rad_strerror(r->cx.rad));
840f10f5203SBrian Somers         rad_close(r->cx.rad);
841a16061b2SBrian Somers         return 0;
842f10f5203SBrian Somers       }
843f10f5203SBrian Somers     }
844aadbb4eaSBrian Somers #endif
845f10f5203SBrian Somers     if (rad_put_string(r->cx.rad, RAD_NAS_IDENTIFIER, hostname) != 0) {
846f10f5203SBrian Somers       log_Printf(LogERROR, "rad_put: rad_put_string: %s\n",
847f10f5203SBrian Somers                  rad_strerror(r->cx.rad));
848f10f5203SBrian Somers       rad_close(r->cx.rad);
849a16061b2SBrian Somers       return 0;
850f10f5203SBrian Somers     }
851f10f5203SBrian Somers   }
852f10f5203SBrian Somers 
853de59e178SBrian Somers   radius_put_physical_details(r->cx.rad, authp->physical);
854f10f5203SBrian Somers 
855c42627ffSBrian Somers   r->cx.auth = authp;
856f0cdd9c0SBrian Somers   if ((got = rad_init_send_request(r->cx.rad, &r->cx.fd, &tv)))
857f0cdd9c0SBrian Somers     radius_Process(r, got);
858f0cdd9c0SBrian Somers   else {
859f0cdd9c0SBrian Somers     log_Printf(LogPHASE, "Radius: Request sent\n");
860f0cdd9c0SBrian Somers     log_Printf(LogDEBUG, "Using radius_Timeout [%p]\n", radius_Timeout);
861f0cdd9c0SBrian Somers     r->cx.timer.load = tv.tv_usec / TICKUNIT + tv.tv_sec * SECTICKS;
862f0cdd9c0SBrian Somers     r->cx.timer.func = radius_Timeout;
863c42627ffSBrian Somers     r->cx.timer.name = "radius auth";
864f0cdd9c0SBrian Somers     r->cx.timer.arg = r;
865f0cdd9c0SBrian Somers     timer_Start(&r->cx.timer);
866f0cdd9c0SBrian Somers   }
867a16061b2SBrian Somers 
868a16061b2SBrian Somers   return 1;
869f0cdd9c0SBrian Somers }
870f0cdd9c0SBrian Somers 
871f0cdd9c0SBrian Somers /*
872794c9bbcSBrian Somers  * Send an accounting request to the RADIUS server
873794c9bbcSBrian Somers  */
874794c9bbcSBrian Somers void
875794c9bbcSBrian Somers radius_Account(struct radius *r, struct radacct *ac, struct datalink *dl,
876794c9bbcSBrian Somers                int acct_type, struct in_addr *peer_ip, struct in_addr *netmask,
877794c9bbcSBrian Somers                struct pppThroughput *stats)
878794c9bbcSBrian Somers {
879794c9bbcSBrian Somers   struct timeval tv;
880de59e178SBrian Somers   int got;
88126e6a622SBrian Somers   char hostname[MAXHOSTNAMELEN];
882aadbb4eaSBrian Somers #if 0
883794c9bbcSBrian Somers   struct hostent *hp;
884794c9bbcSBrian Somers   struct in_addr hostaddr;
8858fb5ef5aSBrian Somers #endif
886794c9bbcSBrian Somers 
887794c9bbcSBrian Somers   if (!*r->cfg.file)
888794c9bbcSBrian Somers     return;
889794c9bbcSBrian Somers 
890794c9bbcSBrian Somers   if (r->cx.fd != -1)
891794c9bbcSBrian Somers     /*
892794c9bbcSBrian Somers      * We assume that our name/key/challenge is the same as last time,
893794c9bbcSBrian Somers      * and just continue to wait for the RADIUS server(s).
894794c9bbcSBrian Somers      */
895794c9bbcSBrian Somers     return;
896794c9bbcSBrian Somers 
8978fb5ef5aSBrian Somers   timer_Stop(&r->cx.timer);
898794c9bbcSBrian Somers 
899ba093e81SBrian Somers   if ((r->cx.rad = rad_acct_open()) == NULL) {
900794c9bbcSBrian Somers     log_Printf(LogERROR, "rad_auth_open: %s\n", strerror(errno));
901794c9bbcSBrian Somers     return;
902794c9bbcSBrian Somers   }
903794c9bbcSBrian Somers 
904794c9bbcSBrian Somers   if (rad_config(r->cx.rad, r->cfg.file) != 0) {
905794c9bbcSBrian Somers     log_Printf(LogERROR, "rad_config: %s\n", rad_strerror(r->cx.rad));
906794c9bbcSBrian Somers     rad_close(r->cx.rad);
907794c9bbcSBrian Somers     return;
908794c9bbcSBrian Somers   }
909794c9bbcSBrian Somers 
910794c9bbcSBrian Somers   if (rad_create_request(r->cx.rad, RAD_ACCOUNTING_REQUEST) != 0) {
911794c9bbcSBrian Somers     log_Printf(LogERROR, "rad_create_request: %s\n", rad_strerror(r->cx.rad));
912794c9bbcSBrian Somers     rad_close(r->cx.rad);
913794c9bbcSBrian Somers     return;
914794c9bbcSBrian Somers   }
915794c9bbcSBrian Somers 
916794c9bbcSBrian Somers   /* Grab some accounting data and initialize structure */
917794c9bbcSBrian Somers   if (acct_type == RAD_START) {
918794c9bbcSBrian Somers     ac->rad_parent = r;
919794c9bbcSBrian Somers     /* Fetch username from datalink */
920794c9bbcSBrian Somers     strncpy(ac->user_name, dl->peer.authname, sizeof ac->user_name);
921794c9bbcSBrian Somers     ac->user_name[AUTHLEN-1] = '\0';
922794c9bbcSBrian Somers 
923794c9bbcSBrian Somers     ac->authentic = 2;		/* Assume RADIUS verified auth data */
924794c9bbcSBrian Somers 
925794c9bbcSBrian Somers     /* Generate a session ID */
92612b5aabaSBrian Somers     snprintf(ac->session_id, sizeof ac->session_id, "%s%ld-%s%lu",
92712b5aabaSBrian Somers              dl->bundle->cfg.auth.name, (long)getpid(),
928794c9bbcSBrian Somers              dl->peer.authname, (unsigned long)stats->uptime);
929794c9bbcSBrian Somers 
930794c9bbcSBrian Somers     /* And grab our MP socket name */
931794c9bbcSBrian Somers     snprintf(ac->multi_session_id, sizeof ac->multi_session_id, "%s",
932794c9bbcSBrian Somers              dl->bundle->ncp.mp.active ?
933794c9bbcSBrian Somers              dl->bundle->ncp.mp.server.socket.sun_path : "");
934794c9bbcSBrian Somers 
935794c9bbcSBrian Somers     /* Fetch IP, netmask from IPCP */
936794c9bbcSBrian Somers     memcpy(&ac->ip, peer_ip, sizeof(ac->ip));
937794c9bbcSBrian Somers     memcpy(&ac->mask, netmask, sizeof(ac->mask));
938794c9bbcSBrian Somers   };
939794c9bbcSBrian Somers 
940794c9bbcSBrian Somers   if (rad_put_string(r->cx.rad, RAD_USER_NAME, ac->user_name) != 0 ||
941794c9bbcSBrian Somers       rad_put_int(r->cx.rad, RAD_SERVICE_TYPE, RAD_FRAMED) != 0 ||
942794c9bbcSBrian Somers       rad_put_int(r->cx.rad, RAD_FRAMED_PROTOCOL, RAD_PPP) != 0 ||
943794c9bbcSBrian Somers       rad_put_addr(r->cx.rad, RAD_FRAMED_IP_ADDRESS, ac->ip) != 0 ||
944794c9bbcSBrian Somers       rad_put_addr(r->cx.rad, RAD_FRAMED_IP_NETMASK, ac->mask) != 0) {
945794c9bbcSBrian Somers     log_Printf(LogERROR, "rad_put: %s\n", rad_strerror(r->cx.rad));
946794c9bbcSBrian Somers     rad_close(r->cx.rad);
947794c9bbcSBrian Somers     return;
948794c9bbcSBrian Somers   }
949794c9bbcSBrian Somers 
950794c9bbcSBrian Somers   if (gethostname(hostname, sizeof hostname) != 0)
951794c9bbcSBrian Somers     log_Printf(LogERROR, "rad_put: gethostname(): %s\n", strerror(errno));
952794c9bbcSBrian Somers   else {
953aadbb4eaSBrian Somers #if 0
954794c9bbcSBrian Somers     if ((hp = gethostbyname(hostname)) != NULL) {
955794c9bbcSBrian Somers       hostaddr.s_addr = *(u_long *)hp->h_addr;
956794c9bbcSBrian Somers       if (rad_put_addr(r->cx.rad, RAD_NAS_IP_ADDRESS, hostaddr) != 0) {
957794c9bbcSBrian Somers         log_Printf(LogERROR, "rad_put: rad_put_string: %s\n",
958794c9bbcSBrian Somers                    rad_strerror(r->cx.rad));
959794c9bbcSBrian Somers         rad_close(r->cx.rad);
960794c9bbcSBrian Somers         return;
961794c9bbcSBrian Somers       }
962794c9bbcSBrian Somers     }
963aadbb4eaSBrian Somers #endif
964794c9bbcSBrian Somers     if (rad_put_string(r->cx.rad, RAD_NAS_IDENTIFIER, hostname) != 0) {
965794c9bbcSBrian Somers       log_Printf(LogERROR, "rad_put: rad_put_string: %s\n",
966794c9bbcSBrian Somers                  rad_strerror(r->cx.rad));
967794c9bbcSBrian Somers       rad_close(r->cx.rad);
968794c9bbcSBrian Somers       return;
969794c9bbcSBrian Somers     }
970794c9bbcSBrian Somers   }
971794c9bbcSBrian Somers 
972de59e178SBrian Somers   radius_put_physical_details(r->cx.rad, dl->physical);
973794c9bbcSBrian Somers 
974794c9bbcSBrian Somers   if (rad_put_int(r->cx.rad, RAD_ACCT_STATUS_TYPE, acct_type) != 0 ||
975794c9bbcSBrian Somers       rad_put_string(r->cx.rad, RAD_ACCT_SESSION_ID, ac->session_id) != 0 ||
976794c9bbcSBrian Somers       rad_put_string(r->cx.rad, RAD_ACCT_MULTI_SESSION_ID,
977794c9bbcSBrian Somers                      ac->multi_session_id) != 0 ||
978794c9bbcSBrian Somers       rad_put_int(r->cx.rad, RAD_ACCT_DELAY_TIME, 0) != 0) {
979794c9bbcSBrian Somers /* XXX ACCT_DELAY_TIME should be increased each time a packet is waiting */
980794c9bbcSBrian Somers     log_Printf(LogERROR, "rad_put: %s\n", rad_strerror(r->cx.rad));
981794c9bbcSBrian Somers     rad_close(r->cx.rad);
982794c9bbcSBrian Somers     return;
983794c9bbcSBrian Somers   }
984794c9bbcSBrian Somers 
985794c9bbcSBrian Somers   if (acct_type == RAD_STOP)
986794c9bbcSBrian Somers   /* Show some statistics */
987794c9bbcSBrian Somers     if (rad_put_int(r->cx.rad, RAD_ACCT_INPUT_OCTETS, stats->OctetsIn) != 0 ||
988794c9bbcSBrian Somers         rad_put_int(r->cx.rad, RAD_ACCT_INPUT_PACKETS, stats->PacketsIn) != 0 ||
989794c9bbcSBrian Somers         rad_put_int(r->cx.rad, RAD_ACCT_OUTPUT_OCTETS, stats->OctetsOut) != 0 ||
990794c9bbcSBrian Somers         rad_put_int(r->cx.rad, RAD_ACCT_OUTPUT_PACKETS, stats->PacketsOut)
991794c9bbcSBrian Somers         != 0 ||
992794c9bbcSBrian Somers         rad_put_int(r->cx.rad, RAD_ACCT_SESSION_TIME, throughput_uptime(stats))
993794c9bbcSBrian Somers         != 0) {
994794c9bbcSBrian Somers       log_Printf(LogERROR, "rad_put: %s\n", rad_strerror(r->cx.rad));
995794c9bbcSBrian Somers       rad_close(r->cx.rad);
996794c9bbcSBrian Somers       return;
997794c9bbcSBrian Somers     }
998794c9bbcSBrian Somers 
999c42627ffSBrian Somers   r->cx.auth = NULL;			/* Not valid for accounting requests */
1000794c9bbcSBrian Somers   if ((got = rad_init_send_request(r->cx.rad, &r->cx.fd, &tv)))
1001794c9bbcSBrian Somers     radius_Process(r, got);
1002794c9bbcSBrian Somers   else {
1003794c9bbcSBrian Somers     log_Printf(LogDEBUG, "Using radius_Timeout [%p]\n", radius_Timeout);
1004794c9bbcSBrian Somers     r->cx.timer.load = tv.tv_usec / TICKUNIT + tv.tv_sec * SECTICKS;
1005794c9bbcSBrian Somers     r->cx.timer.func = radius_Timeout;
1006c42627ffSBrian Somers     r->cx.timer.name = "radius acct";
1007794c9bbcSBrian Somers     r->cx.timer.arg = r;
1008794c9bbcSBrian Somers     timer_Start(&r->cx.timer);
1009794c9bbcSBrian Somers   }
1010794c9bbcSBrian Somers }
1011794c9bbcSBrian Somers 
1012794c9bbcSBrian Somers /*
1013f0cdd9c0SBrian Somers  * How do things look at the moment ?
1014f0cdd9c0SBrian Somers  */
1015972a1bcfSBrian Somers void
1016972a1bcfSBrian Somers radius_Show(struct radius *r, struct prompt *p)
1017972a1bcfSBrian Somers {
101874457d3dSBrian Somers   prompt_Printf(p, " Radius config:     %s",
101974457d3dSBrian Somers                 *r->cfg.file ? r->cfg.file : "none");
1020972a1bcfSBrian Somers   if (r->valid) {
1021972a1bcfSBrian Somers     prompt_Printf(p, "\n                IP: %s\n", inet_ntoa(r->ip));
1022972a1bcfSBrian Somers     prompt_Printf(p, "           Netmask: %s\n", inet_ntoa(r->mask));
1023972a1bcfSBrian Somers     prompt_Printf(p, "               MTU: %lu\n", r->mtu);
1024972a1bcfSBrian Somers     prompt_Printf(p, "                VJ: %sabled\n", r->vj ? "en" : "dis");
1025ff8e577bSBrian Somers     prompt_Printf(p, "           Message: %s\n", r->repstr ? r->repstr : "");
10268fb5ef5aSBrian Somers     prompt_Printf(p, "   MPPE Enc Policy: %s\n",
10278fb5ef5aSBrian Somers                   radius_policyname(r->mppe.policy));
10288fb5ef5aSBrian Somers     prompt_Printf(p, "    MPPE Enc Types: %s\n",
10298fb5ef5aSBrian Somers                   radius_typesname(r->mppe.types));
10308fb5ef5aSBrian Somers     prompt_Printf(p, "     MPPE Recv Key: %seceived\n",
10318fb5ef5aSBrian Somers                   r->mppe.recvkey ? "R" : "Not r");
10328fb5ef5aSBrian Somers     prompt_Printf(p, "     MPPE Send Key: %seceived\n",
10338fb5ef5aSBrian Somers                   r->mppe.sendkey ? "R" : "Not r");
1034a16061b2SBrian Somers     prompt_Printf(p, " MS-CHAP2-Response: %s\n",
1035a16061b2SBrian Somers                   r->msrepstr ? r->msrepstr : "");
1036ff8e577bSBrian Somers     prompt_Printf(p, "     Error Message: %s\n", r->errstr ? r->errstr : "");
1037972a1bcfSBrian Somers     if (r->routes)
1038972a1bcfSBrian Somers       route_ShowSticky(p, r->routes, "            Routes", 16);
1039972a1bcfSBrian Somers   } else
1040972a1bcfSBrian Somers     prompt_Printf(p, " (not authenticated)\n");
1041972a1bcfSBrian Somers }
1042