xref: /freebsd/usr.sbin/ppp/radius.c (revision daf1cffce2e07931f27c6c6998652e90df6ba87e)
1 /*
2  * Copyright 1999 Internet Business Solutions Ltd., Switzerland
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  *
14  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24  * SUCH DAMAGE.
25  *
26  * $FreeBSD$
27  *
28  */
29 
30 #include <sys/param.h>
31 #include <netinet/in_systm.h>
32 #include <netinet/in.h>
33 #include <netinet/ip.h>
34 #include <arpa/inet.h>
35 #include <sys/un.h>
36 
37 #include <errno.h>
38 #include <radlib.h>
39 #include <stdio.h>
40 #include <stdlib.h>
41 #include <string.h>
42 #include <sys/time.h>
43 #include <termios.h>
44 #include <ttyent.h>
45 #include <unistd.h>
46 #include <netdb.h>
47 
48 #include "layer.h"
49 #include "defs.h"
50 #include "log.h"
51 #include "descriptor.h"
52 #include "prompt.h"
53 #include "timer.h"
54 #include "fsm.h"
55 #include "iplist.h"
56 #include "slcompress.h"
57 #include "throughput.h"
58 #include "lqr.h"
59 #include "hdlc.h"
60 #include "mbuf.h"
61 #include "ipcp.h"
62 #include "route.h"
63 #include "command.h"
64 #include "filter.h"
65 #include "lcp.h"
66 #include "ccp.h"
67 #include "link.h"
68 #include "mp.h"
69 #include "radius.h"
70 #include "auth.h"
71 #include "async.h"
72 #include "physical.h"
73 #include "chat.h"
74 #include "cbcp.h"
75 #include "chap.h"
76 #include "datalink.h"
77 #include "bundle.h"
78 
79 /*
80  * rad_continue_send_request() has given us `got' (non-zero).  Deal with it.
81  */
82 static void
83 radius_Process(struct radius *r, int got)
84 {
85   char *argv[MAXARGS], *nuke;
86   struct bundle *bundle;
87   int argc, addrs;
88   size_t len;
89   struct in_range dest;
90   struct in_addr gw;
91   const void *data;
92 
93   r->cx.fd = -1;		/* Stop select()ing */
94 
95   switch (got) {
96     case RAD_ACCESS_ACCEPT:
97       log_Printf(LogPHASE, "Radius: ACCEPT received\n");
98       break;
99 
100     case RAD_ACCESS_REJECT:
101       log_Printf(LogPHASE, "Radius: REJECT received\n");
102       auth_Failure(r->cx.auth);
103       rad_close(r->cx.rad);
104       return;
105 
106     case RAD_ACCESS_CHALLENGE:
107       /* we can't deal with this (for now) ! */
108       log_Printf(LogPHASE, "Radius: CHALLENGE received (can't handle yet)\n");
109       auth_Failure(r->cx.auth);
110       rad_close(r->cx.rad);
111       return;
112 
113     case -1:
114       log_Printf(LogPHASE, "radius: %s\n", rad_strerror(r->cx.rad));
115       auth_Failure(r->cx.auth);
116       rad_close(r->cx.rad);
117       return;
118 
119     default:
120       log_Printf(LogERROR, "rad_send_request: Failed %d: %s\n",
121                  got, rad_strerror(r->cx.rad));
122       auth_Failure(r->cx.auth);
123       rad_close(r->cx.rad);
124       return;
125   }
126 
127   /* So we've been accepted !  Let's see what we've got in our reply :-I */
128   r->ip.s_addr = r->mask.s_addr = INADDR_NONE;
129   r->mtu = 0;
130   r->vj = 0;
131   while ((got = rad_get_attr(r->cx.rad, &data, &len)) > 0) {
132     switch (got) {
133       case RAD_FRAMED_IP_ADDRESS:
134         r->ip = rad_cvt_addr(data);
135         log_Printf(LogPHASE, "        IP %s\n", inet_ntoa(r->ip));
136         break;
137 
138       case RAD_FRAMED_IP_NETMASK:
139         r->mask = rad_cvt_addr(data);
140         log_Printf(LogPHASE, "        Netmask %s\n", inet_ntoa(r->mask));
141         break;
142 
143       case RAD_FRAMED_MTU:
144         r->mtu = rad_cvt_int(data);
145         log_Printf(LogPHASE, "        MTU %lu\n", r->mtu);
146         break;
147 
148       case RAD_FRAMED_ROUTING:
149         /* Disabled for now - should we automatically set up some filters ? */
150         /* rad_cvt_int(data); */
151         /* bit 1 = Send routing packets */
152         /* bit 2 = Receive routing packets */
153         break;
154 
155       case RAD_FRAMED_COMPRESSION:
156         r->vj = rad_cvt_int(data) == 1 ? 1 : 0;
157         log_Printf(LogPHASE, "        VJ %sabled\n", r->vj ? "en" : "dis");
158         break;
159 
160       case RAD_FRAMED_ROUTE:
161         /*
162          * We expect a string of the format ``dest[/bits] gw [metrics]''
163          * Any specified metrics are ignored.  MYADDR and HISADDR are
164          * understood for ``dest'' and ``gw'' and ``0.0.0.0'' is the same
165          * as ``HISADDR''.
166          */
167 
168         if ((nuke = rad_cvt_string(data, len)) == NULL) {
169           log_Printf(LogERROR, "rad_cvt_string: %s\n", rad_strerror(r->cx.rad));
170           rad_close(r->cx.rad);
171           return;
172         }
173 
174         log_Printf(LogPHASE, "        Route: %s\n", nuke);
175         bundle = r->cx.auth->physical->dl->bundle;
176         dest.ipaddr.s_addr = dest.mask.s_addr = INADDR_ANY;
177         dest.width = 0;
178         argc = command_Interpret(nuke, strlen(nuke), argv);
179         if (argc < 0)
180           log_Printf(LogWARN, "radius: %s: Syntax error\n",
181                      argc == 1 ? argv[0] : "\"\"");
182         else if (argc < 2)
183           log_Printf(LogWARN, "radius: %s: Invalid route\n",
184                      argc == 1 ? argv[0] : "\"\"");
185         else if ((strcasecmp(argv[0], "default") != 0 &&
186                   !ParseAddr(&bundle->ncp.ipcp, argv[0], &dest.ipaddr,
187                              &dest.mask, &dest.width)) ||
188                  !ParseAddr(&bundle->ncp.ipcp, argv[1], &gw, NULL, NULL))
189           log_Printf(LogWARN, "radius: %s %s: Invalid route\n",
190                      argv[0], argv[1]);
191         else {
192           if (dest.width == 32 && strchr(argv[0], '/') == NULL)
193             /* No mask specified - use the natural mask */
194             dest.mask = addr2mask(dest.ipaddr);
195           addrs = 0;
196 
197           if (!strncasecmp(argv[0], "HISADDR", 7))
198             addrs = ROUTE_DSTHISADDR;
199           else if (!strncasecmp(argv[0], "MYADDR", 6))
200             addrs = ROUTE_DSTMYADDR;
201 
202           if (gw.s_addr == INADDR_ANY) {
203             addrs |= ROUTE_GWHISADDR;
204             gw = bundle->ncp.ipcp.peer_ip;
205           } else if (strcasecmp(argv[1], "HISADDR") == 0)
206             addrs |= ROUTE_GWHISADDR;
207 
208           route_Add(&r->routes, addrs, dest.ipaddr, dest.mask, gw);
209         }
210         free(nuke);
211         break;
212     }
213   }
214 
215   if (got == -1) {
216     log_Printf(LogERROR, "rad_get_attr: %s (failing!)\n",
217                rad_strerror(r->cx.rad));
218     auth_Failure(r->cx.auth);
219     rad_close(r->cx.rad);
220   } else {
221     r->valid = 1;
222     auth_Success(r->cx.auth);
223     rad_close(r->cx.rad);
224   }
225 }
226 
227 /*
228  * We've either timed out or select()ed on the read descriptor
229  */
230 static void
231 radius_Continue(struct radius *r, int sel)
232 {
233   struct timeval tv;
234   int got;
235 
236   timer_Stop(&r->cx.timer);
237   if ((got = rad_continue_send_request(r->cx.rad, sel, &r->cx.fd, &tv)) == 0) {
238     log_Printf(LogPHASE, "Radius: Request re-sent\n");
239     r->cx.timer.load = tv.tv_usec / TICKUNIT + tv.tv_sec * SECTICKS;
240     timer_Start(&r->cx.timer);
241     return;
242   }
243 
244   radius_Process(r, got);
245 }
246 
247 /*
248  * Time to call rad_continue_send_request() - timed out.
249  */
250 static void
251 radius_Timeout(void *v)
252 {
253   radius_Continue((struct radius *)v, 0);
254 }
255 
256 /*
257  * Time to call rad_continue_send_request() - something to read.
258  */
259 static void
260 radius_Read(struct descriptor *d, struct bundle *bundle, const fd_set *fdset)
261 {
262   radius_Continue(descriptor2radius(d), 1);
263 }
264 
265 /*
266  * Behave as a struct descriptor (descriptor.h)
267  */
268 static int
269 radius_UpdateSet(struct descriptor *d, fd_set *r, fd_set *w, fd_set *e, int *n)
270 {
271   struct radius *rad = descriptor2radius(d);
272 
273   if (r && rad->cx.fd != -1) {
274     FD_SET(rad->cx.fd, r);
275     if (*n < rad->cx.fd + 1)
276       *n = rad->cx.fd + 1;
277     log_Printf(LogTIMER, "Radius: fdset(r) %d\n", rad->cx.fd);
278     return 1;
279   }
280 
281   return 0;
282 }
283 
284 /*
285  * Behave as a struct descriptor (descriptor.h)
286  */
287 static int
288 radius_IsSet(struct descriptor *d, const fd_set *fdset)
289 {
290   struct radius *r = descriptor2radius(d);
291 
292   return r && r->cx.fd != -1 && FD_ISSET(r->cx.fd, fdset);
293 }
294 
295 /*
296  * Behave as a struct descriptor (descriptor.h)
297  */
298 static int
299 radius_Write(struct descriptor *d, struct bundle *bundle, const fd_set *fdset)
300 {
301   /* We never want to write here ! */
302   log_Printf(LogALERT, "radius_Write: Internal error: Bad call !\n");
303   return 0;
304 }
305 
306 /*
307  * Initialise ourselves
308  */
309 void
310 radius_Init(struct radius *r)
311 {
312   r->valid = 0;
313   r->cx.fd = -1;
314   *r->cfg.file = '\0';;
315   r->desc.type = RADIUS_DESCRIPTOR;
316   r->desc.UpdateSet = radius_UpdateSet;
317   r->desc.IsSet = radius_IsSet;
318   r->desc.Read = radius_Read;
319   r->desc.Write = radius_Write;
320   memset(&r->cx.timer, '\0', sizeof r->cx.timer);
321 }
322 
323 /*
324  * Forget everything and go back to initialised state.
325  */
326 void
327 radius_Destroy(struct radius *r)
328 {
329   r->valid = 0;
330   timer_Stop(&r->cx.timer);
331   route_DeleteAll(&r->routes);
332   if (r->cx.fd != -1) {
333     r->cx.fd = -1;
334     rad_close(r->cx.rad);
335   }
336 }
337 
338 /*
339  * Start an authentication request to the RADIUS server.
340  */
341 void
342 radius_Authenticate(struct radius *r, struct authinfo *authp, const char *name,
343                     const char *key, const char *challenge)
344 {
345   struct ttyent *ttyp;
346   struct timeval tv;
347   int got, slot;
348   char hostname[MAXHOSTNAMELEN];
349   struct hostent *hp;
350   struct in_addr hostaddr;
351 
352   if (!*r->cfg.file)
353     return;
354 
355   if (r->cx.fd != -1)
356     /*
357      * We assume that our name/key/challenge is the same as last time,
358      * and just continue to wait for the RADIUS server(s).
359      */
360     return;
361 
362   radius_Destroy(r);
363 
364   if ((r->cx.rad = rad_open()) == NULL) {
365     log_Printf(LogERROR, "rad_open: %s\n", strerror(errno));
366     return;
367   }
368 
369   if (rad_config(r->cx.rad, r->cfg.file) != 0) {
370     log_Printf(LogERROR, "rad_config: %s\n", rad_strerror(r->cx.rad));
371     rad_close(r->cx.rad);
372     return;
373   }
374 
375   if (rad_create_request(r->cx.rad, RAD_ACCESS_REQUEST) != 0) {
376     log_Printf(LogERROR, "rad_create_request: %s\n", rad_strerror(r->cx.rad));
377     rad_close(r->cx.rad);
378     return;
379   }
380 
381   if (rad_put_string(r->cx.rad, RAD_USER_NAME, name) != 0 ||
382       rad_put_int(r->cx.rad, RAD_SERVICE_TYPE, RAD_FRAMED) != 0 ||
383       rad_put_int(r->cx.rad, RAD_FRAMED_PROTOCOL, RAD_PPP) != 0) {
384     log_Printf(LogERROR, "rad_put: %s\n", rad_strerror(r->cx.rad));
385     rad_close(r->cx.rad);
386     return;
387   }
388 
389   if (challenge != NULL) {
390     /* We're talking CHAP */
391     if (rad_put_string(r->cx.rad, RAD_CHAP_PASSWORD, key) != 0 ||
392         rad_put_string(r->cx.rad, RAD_CHAP_CHALLENGE, challenge) != 0) {
393       log_Printf(LogERROR, "CHAP: rad_put_string: %s\n",
394                  rad_strerror(r->cx.rad));
395       rad_close(r->cx.rad);
396       return;
397     }
398   } else if (rad_put_string(r->cx.rad, RAD_USER_PASSWORD, key) != 0) {
399     /* We're talking PAP */
400     log_Printf(LogERROR, "PAP: rad_put_string: %s\n", rad_strerror(r->cx.rad));
401     rad_close(r->cx.rad);
402     return;
403   }
404 
405   if (gethostname(hostname, sizeof hostname) != 0)
406     log_Printf(LogERROR, "rad_put: gethostname(): %s\n", strerror(errno));
407   else {
408     if ((hp = gethostbyname(hostname)) != NULL) {
409       hostaddr.s_addr = *(u_long *)hp->h_addr;
410       if (rad_put_addr(r->cx.rad, RAD_NAS_IP_ADDRESS, hostaddr) != 0) {
411         log_Printf(LogERROR, "rad_put: rad_put_string: %s\n",
412                    rad_strerror(r->cx.rad));
413         rad_close(r->cx.rad);
414         return;
415       }
416     }
417     if (rad_put_string(r->cx.rad, RAD_NAS_IDENTIFIER, hostname) != 0) {
418       log_Printf(LogERROR, "rad_put: rad_put_string: %s\n",
419                  rad_strerror(r->cx.rad));
420       rad_close(r->cx.rad);
421       return;
422     }
423   }
424 
425   if (authp->physical->handler &&
426       authp->physical->handler->type == TTY_DEVICE) {
427     setttyent();
428     for (slot = 1; (ttyp = getttyent()); ++slot)
429       if (!strcmp(ttyp->ty_name, authp->physical->name.base)) {
430         if(rad_put_int(r->cx.rad, RAD_NAS_PORT, slot) != 0) {
431           log_Printf(LogERROR, "rad_put: rad_put_string: %s\n",
432                       rad_strerror(r->cx.rad));
433           rad_close(r->cx.rad);
434           endttyent();
435           return;
436         }
437         break;
438       }
439     endttyent();
440   }
441 
442 
443   if ((got = rad_init_send_request(r->cx.rad, &r->cx.fd, &tv)))
444     radius_Process(r, got);
445   else {
446     log_Printf(LogPHASE, "Radius: Request sent\n");
447     log_Printf(LogDEBUG, "Using radius_Timeout [%p]\n", radius_Timeout);
448     r->cx.timer.load = tv.tv_usec / TICKUNIT + tv.tv_sec * SECTICKS;
449     r->cx.timer.func = radius_Timeout;
450     r->cx.timer.name = "radius";
451     r->cx.timer.arg = r;
452     r->cx.auth = authp;
453     timer_Start(&r->cx.timer);
454   }
455 }
456 
457 /*
458  * How do things look at the moment ?
459  */
460 void
461 radius_Show(struct radius *r, struct prompt *p)
462 {
463   prompt_Printf(p, " Radius config: %s", *r->cfg.file ? r->cfg.file : "none");
464   if (r->valid) {
465     prompt_Printf(p, "\n            IP: %s\n", inet_ntoa(r->ip));
466     prompt_Printf(p, "       Netmask: %s\n", inet_ntoa(r->mask));
467     prompt_Printf(p, "           MTU: %lu\n", r->mtu);
468     prompt_Printf(p, "            VJ: %sabled\n", r->vj ? "en" : "dis");
469     if (r->routes)
470       route_ShowSticky(p, r->routes, "        Routes", 16);
471   } else
472     prompt_Printf(p, " (not authenticated)\n");
473 }
474