radius_client.c 45 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678
  1. /*
  2. * RADIUS client
  3. * Copyright (c) 2002-2015, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "includes.h"
  9. #include "common.h"
  10. #include "radius.h"
  11. #include "radius_client.h"
  12. #include "eloop.h"
  13. /* Defaults for RADIUS retransmit values (exponential backoff) */
  14. /**
  15. * RADIUS_CLIENT_FIRST_WAIT - RADIUS client timeout for first retry in seconds
  16. */
  17. #define RADIUS_CLIENT_FIRST_WAIT 3
  18. /**
  19. * RADIUS_CLIENT_MAX_WAIT - RADIUS client maximum retry timeout in seconds
  20. */
  21. #define RADIUS_CLIENT_MAX_WAIT 120
  22. /**
  23. * RADIUS_CLIENT_MAX_RETRIES - RADIUS client maximum retries
  24. *
  25. * Maximum number of retransmit attempts before the entry is removed from
  26. * retransmit list.
  27. */
  28. #define RADIUS_CLIENT_MAX_RETRIES 10
  29. /**
  30. * RADIUS_CLIENT_MAX_ENTRIES - RADIUS client maximum pending messages
  31. *
  32. * Maximum number of entries in retransmit list (oldest entries will be
  33. * removed, if this limit is exceeded).
  34. */
  35. #define RADIUS_CLIENT_MAX_ENTRIES 30
  36. /**
  37. * RADIUS_CLIENT_NUM_FAILOVER - RADIUS client failover point
  38. *
  39. * The number of failed retry attempts after which the RADIUS server will be
  40. * changed (if one of more backup servers are configured).
  41. */
  42. #define RADIUS_CLIENT_NUM_FAILOVER 4
  43. /**
  44. * struct radius_rx_handler - RADIUS client RX handler
  45. *
  46. * This data structure is used internally inside the RADIUS client module to
  47. * store registered RX handlers. These handlers are registered by calls to
  48. * radius_client_register() and unregistered when the RADIUS client is
  49. * deinitialized with a call to radius_client_deinit().
  50. */
  51. struct radius_rx_handler {
  52. /**
  53. * handler - Received RADIUS message handler
  54. */
  55. RadiusRxResult (*handler)(struct radius_msg *msg,
  56. struct radius_msg *req,
  57. const u8 *shared_secret,
  58. size_t shared_secret_len,
  59. void *data);
  60. /**
  61. * data - Context data for the handler
  62. */
  63. void *data;
  64. };
  65. /**
  66. * struct radius_msg_list - RADIUS client message retransmit list
  67. *
  68. * This data structure is used internally inside the RADIUS client module to
  69. * store pending RADIUS requests that may still need to be retransmitted.
  70. */
  71. struct radius_msg_list {
  72. /**
  73. * addr - STA/client address
  74. *
  75. * This is used to find RADIUS messages for the same STA.
  76. */
  77. u8 addr[ETH_ALEN];
  78. /**
  79. * msg - RADIUS message
  80. */
  81. struct radius_msg *msg;
  82. /**
  83. * msg_type - Message type
  84. */
  85. RadiusType msg_type;
  86. /**
  87. * first_try - Time of the first transmission attempt
  88. */
  89. os_time_t first_try;
  90. /**
  91. * next_try - Time for the next transmission attempt
  92. */
  93. os_time_t next_try;
  94. /**
  95. * attempts - Number of transmission attempts
  96. */
  97. int attempts;
  98. /**
  99. * next_wait - Next retransmission wait time in seconds
  100. */
  101. int next_wait;
  102. /**
  103. * last_attempt - Time of the last transmission attempt
  104. */
  105. struct os_reltime last_attempt;
  106. /**
  107. * shared_secret - Shared secret with the target RADIUS server
  108. */
  109. const u8 *shared_secret;
  110. /**
  111. * shared_secret_len - shared_secret length in octets
  112. */
  113. size_t shared_secret_len;
  114. /* TODO: server config with failover to backup server(s) */
  115. /**
  116. * next - Next message in the list
  117. */
  118. struct radius_msg_list *next;
  119. };
  120. /**
  121. * struct radius_client_data - Internal RADIUS client data
  122. *
  123. * This data structure is used internally inside the RADIUS client module.
  124. * External users allocate this by calling radius_client_init() and free it by
  125. * calling radius_client_deinit(). The pointer to this opaque data is used in
  126. * calls to other functions as an identifier for the RADIUS client instance.
  127. */
  128. struct radius_client_data {
  129. /**
  130. * ctx - Context pointer for hostapd_logger() callbacks
  131. */
  132. void *ctx;
  133. /**
  134. * conf - RADIUS client configuration (list of RADIUS servers to use)
  135. */
  136. struct hostapd_radius_servers *conf;
  137. /**
  138. * auth_serv_sock - IPv4 socket for RADIUS authentication messages
  139. */
  140. int auth_serv_sock;
  141. /**
  142. * acct_serv_sock - IPv4 socket for RADIUS accounting messages
  143. */
  144. int acct_serv_sock;
  145. /**
  146. * auth_serv_sock6 - IPv6 socket for RADIUS authentication messages
  147. */
  148. int auth_serv_sock6;
  149. /**
  150. * acct_serv_sock6 - IPv6 socket for RADIUS accounting messages
  151. */
  152. int acct_serv_sock6;
  153. /**
  154. * auth_sock - Currently used socket for RADIUS authentication server
  155. */
  156. int auth_sock;
  157. /**
  158. * acct_sock - Currently used socket for RADIUS accounting server
  159. */
  160. int acct_sock;
  161. /**
  162. * auth_handlers - Authentication message handlers
  163. */
  164. struct radius_rx_handler *auth_handlers;
  165. /**
  166. * num_auth_handlers - Number of handlers in auth_handlers
  167. */
  168. size_t num_auth_handlers;
  169. /**
  170. * acct_handlers - Accounting message handlers
  171. */
  172. struct radius_rx_handler *acct_handlers;
  173. /**
  174. * num_acct_handlers - Number of handlers in acct_handlers
  175. */
  176. size_t num_acct_handlers;
  177. /**
  178. * msgs - Pending outgoing RADIUS messages
  179. */
  180. struct radius_msg_list *msgs;
  181. /**
  182. * num_msgs - Number of pending messages in the msgs list
  183. */
  184. size_t num_msgs;
  185. /**
  186. * next_radius_identifier - Next RADIUS message identifier to use
  187. */
  188. u8 next_radius_identifier;
  189. /**
  190. * interim_error_cb - Interim accounting error callback
  191. */
  192. void (*interim_error_cb)(const u8 *addr, void *ctx);
  193. /**
  194. * interim_error_cb_ctx - interim_error_cb() context data
  195. */
  196. void *interim_error_cb_ctx;
  197. };
  198. static int
  199. radius_change_server(struct radius_client_data *radius,
  200. struct hostapd_radius_server *nserv,
  201. struct hostapd_radius_server *oserv,
  202. int sock, int sock6, int auth);
  203. static int radius_client_init_acct(struct radius_client_data *radius);
  204. static int radius_client_init_auth(struct radius_client_data *radius);
  205. static void radius_client_auth_failover(struct radius_client_data *radius);
  206. static void radius_client_acct_failover(struct radius_client_data *radius);
  207. static void radius_client_msg_free(struct radius_msg_list *req)
  208. {
  209. radius_msg_free(req->msg);
  210. os_free(req);
  211. }
  212. /**
  213. * radius_client_register - Register a RADIUS client RX handler
  214. * @radius: RADIUS client context from radius_client_init()
  215. * @msg_type: RADIUS client type (RADIUS_AUTH or RADIUS_ACCT)
  216. * @handler: Handler for received RADIUS messages
  217. * @data: Context pointer for handler callbacks
  218. * Returns: 0 on success, -1 on failure
  219. *
  220. * This function is used to register a handler for processing received RADIUS
  221. * authentication and accounting messages. The handler() callback function will
  222. * be called whenever a RADIUS message is received from the active server.
  223. *
  224. * There can be multiple registered RADIUS message handlers. The handlers will
  225. * be called in order until one of them indicates that it has processed or
  226. * queued the message.
  227. */
  228. int radius_client_register(struct radius_client_data *radius,
  229. RadiusType msg_type,
  230. RadiusRxResult (*handler)(struct radius_msg *msg,
  231. struct radius_msg *req,
  232. const u8 *shared_secret,
  233. size_t shared_secret_len,
  234. void *data),
  235. void *data)
  236. {
  237. struct radius_rx_handler **handlers, *newh;
  238. size_t *num;
  239. if (msg_type == RADIUS_ACCT) {
  240. handlers = &radius->acct_handlers;
  241. num = &radius->num_acct_handlers;
  242. } else {
  243. handlers = &radius->auth_handlers;
  244. num = &radius->num_auth_handlers;
  245. }
  246. newh = os_realloc_array(*handlers, *num + 1,
  247. sizeof(struct radius_rx_handler));
  248. if (newh == NULL)
  249. return -1;
  250. newh[*num].handler = handler;
  251. newh[*num].data = data;
  252. (*num)++;
  253. *handlers = newh;
  254. return 0;
  255. }
  256. /**
  257. * radius_client_set_interim_erro_cb - Register an interim acct error callback
  258. * @radius: RADIUS client context from radius_client_init()
  259. * @addr: Station address from the failed message
  260. * @cb: Handler for interim accounting errors
  261. * @ctx: Context pointer for handler callbacks
  262. *
  263. * This function is used to register a handler for processing failed
  264. * transmission attempts of interim accounting update messages.
  265. */
  266. void radius_client_set_interim_error_cb(struct radius_client_data *radius,
  267. void (*cb)(const u8 *addr, void *ctx),
  268. void *ctx)
  269. {
  270. radius->interim_error_cb = cb;
  271. radius->interim_error_cb_ctx = ctx;
  272. }
  273. /*
  274. * Returns >0 if message queue was flushed (i.e., the message that triggered
  275. * the error is not available anymore)
  276. */
  277. static int radius_client_handle_send_error(struct radius_client_data *radius,
  278. int s, RadiusType msg_type)
  279. {
  280. #ifndef CONFIG_NATIVE_WINDOWS
  281. int _errno = errno;
  282. wpa_printf(MSG_INFO, "send[RADIUS,s=%d]: %s", s, strerror(errno));
  283. if (_errno == ENOTCONN || _errno == EDESTADDRREQ || _errno == EINVAL ||
  284. _errno == EBADF || _errno == ENETUNREACH || _errno == EACCES) {
  285. hostapd_logger(radius->ctx, NULL, HOSTAPD_MODULE_RADIUS,
  286. HOSTAPD_LEVEL_INFO,
  287. "Send failed - maybe interface status changed -"
  288. " try to connect again");
  289. if (msg_type == RADIUS_ACCT ||
  290. msg_type == RADIUS_ACCT_INTERIM) {
  291. radius_client_init_acct(radius);
  292. return 0;
  293. } else {
  294. radius_client_init_auth(radius);
  295. return 1;
  296. }
  297. }
  298. #endif /* CONFIG_NATIVE_WINDOWS */
  299. return 0;
  300. }
  301. static int radius_client_retransmit(struct radius_client_data *radius,
  302. struct radius_msg_list *entry,
  303. os_time_t now)
  304. {
  305. struct hostapd_radius_servers *conf = radius->conf;
  306. int s;
  307. struct wpabuf *buf;
  308. size_t prev_num_msgs;
  309. u8 *acct_delay_time;
  310. size_t acct_delay_time_len;
  311. if (entry->msg_type == RADIUS_ACCT ||
  312. entry->msg_type == RADIUS_ACCT_INTERIM) {
  313. if (radius->acct_sock < 0)
  314. radius_client_init_acct(radius);
  315. if (radius->acct_sock < 0 && conf->num_acct_servers > 1) {
  316. prev_num_msgs = radius->num_msgs;
  317. radius_client_acct_failover(radius);
  318. if (prev_num_msgs != radius->num_msgs)
  319. return 0;
  320. }
  321. s = radius->acct_sock;
  322. if (entry->attempts == 0)
  323. conf->acct_server->requests++;
  324. else {
  325. conf->acct_server->timeouts++;
  326. conf->acct_server->retransmissions++;
  327. }
  328. } else {
  329. if (radius->auth_sock < 0)
  330. radius_client_init_auth(radius);
  331. if (radius->auth_sock < 0 && conf->num_auth_servers > 1) {
  332. prev_num_msgs = radius->num_msgs;
  333. radius_client_auth_failover(radius);
  334. if (prev_num_msgs != radius->num_msgs)
  335. return 0;
  336. }
  337. s = radius->auth_sock;
  338. if (entry->attempts == 0)
  339. conf->auth_server->requests++;
  340. else {
  341. conf->auth_server->timeouts++;
  342. conf->auth_server->retransmissions++;
  343. }
  344. }
  345. if (entry->msg_type == RADIUS_ACCT_INTERIM) {
  346. wpa_printf(MSG_DEBUG,
  347. "RADIUS: Failed to transmit interim accounting update to "
  348. MACSTR " - drop message and request a new update",
  349. MAC2STR(entry->addr));
  350. if (radius->interim_error_cb)
  351. radius->interim_error_cb(entry->addr,
  352. radius->interim_error_cb_ctx);
  353. return 1;
  354. }
  355. if (s < 0) {
  356. wpa_printf(MSG_INFO,
  357. "RADIUS: No valid socket for retransmission");
  358. return 1;
  359. }
  360. if (entry->msg_type == RADIUS_ACCT &&
  361. radius_msg_get_attr_ptr(entry->msg, RADIUS_ATTR_ACCT_DELAY_TIME,
  362. &acct_delay_time, &acct_delay_time_len,
  363. NULL) == 0 &&
  364. acct_delay_time_len == 4) {
  365. struct radius_hdr *hdr;
  366. u32 delay_time;
  367. /*
  368. * Need to assign a new identifier since attribute contents
  369. * changes.
  370. */
  371. hdr = radius_msg_get_hdr(entry->msg);
  372. hdr->identifier = radius_client_get_id(radius);
  373. /* Update Acct-Delay-Time to show wait time in queue */
  374. delay_time = now - entry->first_try;
  375. WPA_PUT_BE32(acct_delay_time, delay_time);
  376. wpa_printf(MSG_DEBUG,
  377. "RADIUS: Updated Acct-Delay-Time to %u for retransmission",
  378. delay_time);
  379. radius_msg_finish_acct(entry->msg, entry->shared_secret,
  380. entry->shared_secret_len);
  381. if (radius->conf->msg_dumps)
  382. radius_msg_dump(entry->msg);
  383. }
  384. /* retransmit; remove entry if too many attempts */
  385. entry->attempts++;
  386. hostapd_logger(radius->ctx, entry->addr, HOSTAPD_MODULE_RADIUS,
  387. HOSTAPD_LEVEL_DEBUG, "Resending RADIUS message (id=%d)",
  388. radius_msg_get_hdr(entry->msg)->identifier);
  389. os_get_reltime(&entry->last_attempt);
  390. buf = radius_msg_get_buf(entry->msg);
  391. if (send(s, wpabuf_head(buf), wpabuf_len(buf), 0) < 0) {
  392. if (radius_client_handle_send_error(radius, s, entry->msg_type)
  393. > 0)
  394. return 0;
  395. }
  396. entry->next_try = now + entry->next_wait;
  397. entry->next_wait *= 2;
  398. if (entry->next_wait > RADIUS_CLIENT_MAX_WAIT)
  399. entry->next_wait = RADIUS_CLIENT_MAX_WAIT;
  400. if (entry->attempts >= RADIUS_CLIENT_MAX_RETRIES) {
  401. wpa_printf(MSG_INFO, "RADIUS: Removing un-ACKed message due to too many failed retransmit attempts");
  402. return 1;
  403. }
  404. return 0;
  405. }
  406. static void radius_client_timer(void *eloop_ctx, void *timeout_ctx)
  407. {
  408. struct radius_client_data *radius = eloop_ctx;
  409. struct os_reltime now;
  410. os_time_t first;
  411. struct radius_msg_list *entry, *prev, *tmp;
  412. int auth_failover = 0, acct_failover = 0;
  413. size_t prev_num_msgs;
  414. int s;
  415. entry = radius->msgs;
  416. if (!entry)
  417. return;
  418. os_get_reltime(&now);
  419. first = 0;
  420. prev = NULL;
  421. while (entry) {
  422. prev_num_msgs = radius->num_msgs;
  423. if (now.sec >= entry->next_try &&
  424. radius_client_retransmit(radius, entry, now.sec)) {
  425. if (prev)
  426. prev->next = entry->next;
  427. else
  428. radius->msgs = entry->next;
  429. tmp = entry;
  430. entry = entry->next;
  431. radius_client_msg_free(tmp);
  432. radius->num_msgs--;
  433. continue;
  434. }
  435. if (prev_num_msgs != radius->num_msgs) {
  436. wpa_printf(MSG_DEBUG,
  437. "RADIUS: Message removed from queue - restart from beginning");
  438. entry = radius->msgs;
  439. prev = NULL;
  440. continue;
  441. }
  442. s = entry->msg_type == RADIUS_AUTH ? radius->auth_sock :
  443. radius->acct_sock;
  444. if (entry->attempts > RADIUS_CLIENT_NUM_FAILOVER ||
  445. (s < 0 && entry->attempts > 0)) {
  446. if (entry->msg_type == RADIUS_ACCT ||
  447. entry->msg_type == RADIUS_ACCT_INTERIM)
  448. acct_failover++;
  449. else
  450. auth_failover++;
  451. }
  452. if (first == 0 || entry->next_try < first)
  453. first = entry->next_try;
  454. prev = entry;
  455. entry = entry->next;
  456. }
  457. if (radius->msgs) {
  458. if (first < now.sec)
  459. first = now.sec;
  460. eloop_register_timeout(first - now.sec, 0,
  461. radius_client_timer, radius, NULL);
  462. hostapd_logger(radius->ctx, NULL, HOSTAPD_MODULE_RADIUS,
  463. HOSTAPD_LEVEL_DEBUG, "Next RADIUS client "
  464. "retransmit in %ld seconds",
  465. (long int) (first - now.sec));
  466. }
  467. if (auth_failover)
  468. radius_client_auth_failover(radius);
  469. if (acct_failover)
  470. radius_client_acct_failover(radius);
  471. }
  472. static void radius_client_auth_failover(struct radius_client_data *radius)
  473. {
  474. struct hostapd_radius_servers *conf = radius->conf;
  475. struct hostapd_radius_server *next, *old;
  476. struct radius_msg_list *entry;
  477. char abuf[50];
  478. old = conf->auth_server;
  479. hostapd_logger(radius->ctx, NULL, HOSTAPD_MODULE_RADIUS,
  480. HOSTAPD_LEVEL_NOTICE,
  481. "No response from Authentication server %s:%d - failover",
  482. hostapd_ip_txt(&old->addr, abuf, sizeof(abuf)),
  483. old->port);
  484. for (entry = radius->msgs; entry; entry = entry->next) {
  485. if (entry->msg_type == RADIUS_AUTH)
  486. old->timeouts++;
  487. }
  488. next = old + 1;
  489. if (next > &(conf->auth_servers[conf->num_auth_servers - 1]))
  490. next = conf->auth_servers;
  491. conf->auth_server = next;
  492. radius_change_server(radius, next, old,
  493. radius->auth_serv_sock,
  494. radius->auth_serv_sock6, 1);
  495. }
  496. static void radius_client_acct_failover(struct radius_client_data *radius)
  497. {
  498. struct hostapd_radius_servers *conf = radius->conf;
  499. struct hostapd_radius_server *next, *old;
  500. struct radius_msg_list *entry;
  501. char abuf[50];
  502. old = conf->acct_server;
  503. hostapd_logger(radius->ctx, NULL, HOSTAPD_MODULE_RADIUS,
  504. HOSTAPD_LEVEL_NOTICE,
  505. "No response from Accounting server %s:%d - failover",
  506. hostapd_ip_txt(&old->addr, abuf, sizeof(abuf)),
  507. old->port);
  508. for (entry = radius->msgs; entry; entry = entry->next) {
  509. if (entry->msg_type == RADIUS_ACCT ||
  510. entry->msg_type == RADIUS_ACCT_INTERIM)
  511. old->timeouts++;
  512. }
  513. next = old + 1;
  514. if (next > &conf->acct_servers[conf->num_acct_servers - 1])
  515. next = conf->acct_servers;
  516. conf->acct_server = next;
  517. radius_change_server(radius, next, old,
  518. radius->acct_serv_sock,
  519. radius->acct_serv_sock6, 0);
  520. }
  521. static void radius_client_update_timeout(struct radius_client_data *radius)
  522. {
  523. struct os_reltime now;
  524. os_time_t first;
  525. struct radius_msg_list *entry;
  526. eloop_cancel_timeout(radius_client_timer, radius, NULL);
  527. if (radius->msgs == NULL) {
  528. return;
  529. }
  530. first = 0;
  531. for (entry = radius->msgs; entry; entry = entry->next) {
  532. if (first == 0 || entry->next_try < first)
  533. first = entry->next_try;
  534. }
  535. os_get_reltime(&now);
  536. if (first < now.sec)
  537. first = now.sec;
  538. eloop_register_timeout(first - now.sec, 0, radius_client_timer, radius,
  539. NULL);
  540. hostapd_logger(radius->ctx, NULL, HOSTAPD_MODULE_RADIUS,
  541. HOSTAPD_LEVEL_DEBUG, "Next RADIUS client retransmit in"
  542. " %ld seconds", (long int) (first - now.sec));
  543. }
  544. static void radius_client_list_add(struct radius_client_data *radius,
  545. struct radius_msg *msg,
  546. RadiusType msg_type,
  547. const u8 *shared_secret,
  548. size_t shared_secret_len, const u8 *addr)
  549. {
  550. struct radius_msg_list *entry, *prev;
  551. if (eloop_terminated()) {
  552. /* No point in adding entries to retransmit queue since event
  553. * loop has already been terminated. */
  554. radius_msg_free(msg);
  555. return;
  556. }
  557. entry = os_zalloc(sizeof(*entry));
  558. if (entry == NULL) {
  559. wpa_printf(MSG_INFO, "RADIUS: Failed to add packet into retransmit list");
  560. radius_msg_free(msg);
  561. return;
  562. }
  563. if (addr)
  564. os_memcpy(entry->addr, addr, ETH_ALEN);
  565. entry->msg = msg;
  566. entry->msg_type = msg_type;
  567. entry->shared_secret = shared_secret;
  568. entry->shared_secret_len = shared_secret_len;
  569. os_get_reltime(&entry->last_attempt);
  570. entry->first_try = entry->last_attempt.sec;
  571. entry->next_try = entry->first_try + RADIUS_CLIENT_FIRST_WAIT;
  572. entry->attempts = 1;
  573. entry->next_wait = RADIUS_CLIENT_FIRST_WAIT * 2;
  574. entry->next = radius->msgs;
  575. radius->msgs = entry;
  576. radius_client_update_timeout(radius);
  577. if (radius->num_msgs >= RADIUS_CLIENT_MAX_ENTRIES) {
  578. wpa_printf(MSG_INFO, "RADIUS: Removing the oldest un-ACKed packet due to retransmit list limits");
  579. prev = NULL;
  580. while (entry->next) {
  581. prev = entry;
  582. entry = entry->next;
  583. }
  584. if (prev) {
  585. prev->next = NULL;
  586. radius_client_msg_free(entry);
  587. }
  588. } else
  589. radius->num_msgs++;
  590. }
  591. /**
  592. * radius_client_send - Send a RADIUS request
  593. * @radius: RADIUS client context from radius_client_init()
  594. * @msg: RADIUS message to be sent
  595. * @msg_type: Message type (RADIUS_AUTH, RADIUS_ACCT, RADIUS_ACCT_INTERIM)
  596. * @addr: MAC address of the device related to this message or %NULL
  597. * Returns: 0 on success, -1 on failure
  598. *
  599. * This function is used to transmit a RADIUS authentication (RADIUS_AUTH) or
  600. * accounting request (RADIUS_ACCT or RADIUS_ACCT_INTERIM). The only difference
  601. * between accounting and interim accounting messages is that the interim
  602. * message will not be retransmitted. Instead, a callback is used to indicate
  603. * that the transmission failed for the specific station @addr so that a new
  604. * interim accounting update message can be generated with up-to-date session
  605. * data instead of trying to resend old information.
  606. *
  607. * The message is added on the retransmission queue and will be retransmitted
  608. * automatically until a response is received or maximum number of retries
  609. * (RADIUS_CLIENT_MAX_RETRIES) is reached. No such retries are used with
  610. * RADIUS_ACCT_INTERIM, i.e., such a pending message is removed from the queue
  611. * automatically on transmission failure.
  612. *
  613. * The related device MAC address can be used to identify pending messages that
  614. * can be removed with radius_client_flush_auth().
  615. */
  616. int radius_client_send(struct radius_client_data *radius,
  617. struct radius_msg *msg, RadiusType msg_type,
  618. const u8 *addr)
  619. {
  620. struct hostapd_radius_servers *conf = radius->conf;
  621. const u8 *shared_secret;
  622. size_t shared_secret_len;
  623. char *name;
  624. int s, res;
  625. struct wpabuf *buf;
  626. if (msg_type == RADIUS_ACCT || msg_type == RADIUS_ACCT_INTERIM) {
  627. if (conf->acct_server && radius->acct_sock < 0)
  628. radius_client_init_acct(radius);
  629. if (conf->acct_server == NULL || radius->acct_sock < 0 ||
  630. conf->acct_server->shared_secret == NULL) {
  631. hostapd_logger(radius->ctx, NULL,
  632. HOSTAPD_MODULE_RADIUS,
  633. HOSTAPD_LEVEL_INFO,
  634. "No accounting server configured");
  635. return -1;
  636. }
  637. shared_secret = conf->acct_server->shared_secret;
  638. shared_secret_len = conf->acct_server->shared_secret_len;
  639. radius_msg_finish_acct(msg, shared_secret, shared_secret_len);
  640. name = "accounting";
  641. s = radius->acct_sock;
  642. conf->acct_server->requests++;
  643. } else {
  644. if (conf->auth_server && radius->auth_sock < 0)
  645. radius_client_init_auth(radius);
  646. if (conf->auth_server == NULL || radius->auth_sock < 0 ||
  647. conf->auth_server->shared_secret == NULL) {
  648. hostapd_logger(radius->ctx, NULL,
  649. HOSTAPD_MODULE_RADIUS,
  650. HOSTAPD_LEVEL_INFO,
  651. "No authentication server configured");
  652. return -1;
  653. }
  654. shared_secret = conf->auth_server->shared_secret;
  655. shared_secret_len = conf->auth_server->shared_secret_len;
  656. radius_msg_finish(msg, shared_secret, shared_secret_len);
  657. name = "authentication";
  658. s = radius->auth_sock;
  659. conf->auth_server->requests++;
  660. }
  661. hostapd_logger(radius->ctx, NULL, HOSTAPD_MODULE_RADIUS,
  662. HOSTAPD_LEVEL_DEBUG, "Sending RADIUS message to %s "
  663. "server", name);
  664. if (conf->msg_dumps)
  665. radius_msg_dump(msg);
  666. buf = radius_msg_get_buf(msg);
  667. res = send(s, wpabuf_head(buf), wpabuf_len(buf), 0);
  668. if (res < 0)
  669. radius_client_handle_send_error(radius, s, msg_type);
  670. radius_client_list_add(radius, msg, msg_type, shared_secret,
  671. shared_secret_len, addr);
  672. return 0;
  673. }
  674. static void radius_client_receive(int sock, void *eloop_ctx, void *sock_ctx)
  675. {
  676. struct radius_client_data *radius = eloop_ctx;
  677. struct hostapd_radius_servers *conf = radius->conf;
  678. RadiusType msg_type = (RadiusType) sock_ctx;
  679. int len, roundtrip;
  680. unsigned char buf[3000];
  681. struct radius_msg *msg;
  682. struct radius_hdr *hdr;
  683. struct radius_rx_handler *handlers;
  684. size_t num_handlers, i;
  685. struct radius_msg_list *req, *prev_req;
  686. struct os_reltime now;
  687. struct hostapd_radius_server *rconf;
  688. int invalid_authenticator = 0;
  689. if (msg_type == RADIUS_ACCT) {
  690. handlers = radius->acct_handlers;
  691. num_handlers = radius->num_acct_handlers;
  692. rconf = conf->acct_server;
  693. } else {
  694. handlers = radius->auth_handlers;
  695. num_handlers = radius->num_auth_handlers;
  696. rconf = conf->auth_server;
  697. }
  698. len = recv(sock, buf, sizeof(buf), MSG_DONTWAIT);
  699. if (len < 0) {
  700. wpa_printf(MSG_INFO, "recv[RADIUS]: %s", strerror(errno));
  701. return;
  702. }
  703. hostapd_logger(radius->ctx, NULL, HOSTAPD_MODULE_RADIUS,
  704. HOSTAPD_LEVEL_DEBUG, "Received %d bytes from RADIUS "
  705. "server", len);
  706. if (len == sizeof(buf)) {
  707. wpa_printf(MSG_INFO, "RADIUS: Possibly too long UDP frame for our buffer - dropping it");
  708. return;
  709. }
  710. msg = radius_msg_parse(buf, len);
  711. if (msg == NULL) {
  712. wpa_printf(MSG_INFO, "RADIUS: Parsing incoming frame failed");
  713. rconf->malformed_responses++;
  714. return;
  715. }
  716. hdr = radius_msg_get_hdr(msg);
  717. hostapd_logger(radius->ctx, NULL, HOSTAPD_MODULE_RADIUS,
  718. HOSTAPD_LEVEL_DEBUG, "Received RADIUS message");
  719. if (conf->msg_dumps)
  720. radius_msg_dump(msg);
  721. switch (hdr->code) {
  722. case RADIUS_CODE_ACCESS_ACCEPT:
  723. rconf->access_accepts++;
  724. break;
  725. case RADIUS_CODE_ACCESS_REJECT:
  726. rconf->access_rejects++;
  727. break;
  728. case RADIUS_CODE_ACCESS_CHALLENGE:
  729. rconf->access_challenges++;
  730. break;
  731. case RADIUS_CODE_ACCOUNTING_RESPONSE:
  732. rconf->responses++;
  733. break;
  734. }
  735. prev_req = NULL;
  736. req = radius->msgs;
  737. while (req) {
  738. /* TODO: also match by src addr:port of the packet when using
  739. * alternative RADIUS servers (?) */
  740. if ((req->msg_type == msg_type ||
  741. (req->msg_type == RADIUS_ACCT_INTERIM &&
  742. msg_type == RADIUS_ACCT)) &&
  743. radius_msg_get_hdr(req->msg)->identifier ==
  744. hdr->identifier)
  745. break;
  746. prev_req = req;
  747. req = req->next;
  748. }
  749. if (req == NULL) {
  750. hostapd_logger(radius->ctx, NULL, HOSTAPD_MODULE_RADIUS,
  751. HOSTAPD_LEVEL_DEBUG,
  752. "No matching RADIUS request found (type=%d "
  753. "id=%d) - dropping packet",
  754. msg_type, hdr->identifier);
  755. goto fail;
  756. }
  757. os_get_reltime(&now);
  758. roundtrip = (now.sec - req->last_attempt.sec) * 100 +
  759. (now.usec - req->last_attempt.usec) / 10000;
  760. hostapd_logger(radius->ctx, req->addr, HOSTAPD_MODULE_RADIUS,
  761. HOSTAPD_LEVEL_DEBUG,
  762. "Received RADIUS packet matched with a pending "
  763. "request, round trip time %d.%02d sec",
  764. roundtrip / 100, roundtrip % 100);
  765. rconf->round_trip_time = roundtrip;
  766. /* Remove ACKed RADIUS packet from retransmit list */
  767. if (prev_req)
  768. prev_req->next = req->next;
  769. else
  770. radius->msgs = req->next;
  771. radius->num_msgs--;
  772. for (i = 0; i < num_handlers; i++) {
  773. RadiusRxResult res;
  774. res = handlers[i].handler(msg, req->msg, req->shared_secret,
  775. req->shared_secret_len,
  776. handlers[i].data);
  777. switch (res) {
  778. case RADIUS_RX_PROCESSED:
  779. radius_msg_free(msg);
  780. /* continue */
  781. case RADIUS_RX_QUEUED:
  782. radius_client_msg_free(req);
  783. return;
  784. case RADIUS_RX_INVALID_AUTHENTICATOR:
  785. invalid_authenticator++;
  786. /* continue */
  787. case RADIUS_RX_UNKNOWN:
  788. /* continue with next handler */
  789. break;
  790. }
  791. }
  792. if (invalid_authenticator)
  793. rconf->bad_authenticators++;
  794. else
  795. rconf->unknown_types++;
  796. hostapd_logger(radius->ctx, req->addr, HOSTAPD_MODULE_RADIUS,
  797. HOSTAPD_LEVEL_DEBUG, "No RADIUS RX handler found "
  798. "(type=%d code=%d id=%d)%s - dropping packet",
  799. msg_type, hdr->code, hdr->identifier,
  800. invalid_authenticator ? " [INVALID AUTHENTICATOR]" :
  801. "");
  802. radius_client_msg_free(req);
  803. fail:
  804. radius_msg_free(msg);
  805. }
  806. /**
  807. * radius_client_get_id - Get an identifier for a new RADIUS message
  808. * @radius: RADIUS client context from radius_client_init()
  809. * Returns: Allocated identifier
  810. *
  811. * This function is used to fetch a unique (among pending requests) identifier
  812. * for a new RADIUS message.
  813. */
  814. u8 radius_client_get_id(struct radius_client_data *radius)
  815. {
  816. struct radius_msg_list *entry, *prev, *_remove;
  817. u8 id = radius->next_radius_identifier++;
  818. /* remove entries with matching id from retransmit list to avoid
  819. * using new reply from the RADIUS server with an old request */
  820. entry = radius->msgs;
  821. prev = NULL;
  822. while (entry) {
  823. if (radius_msg_get_hdr(entry->msg)->identifier == id) {
  824. hostapd_logger(radius->ctx, entry->addr,
  825. HOSTAPD_MODULE_RADIUS,
  826. HOSTAPD_LEVEL_DEBUG,
  827. "Removing pending RADIUS message, "
  828. "since its id (%d) is reused", id);
  829. if (prev)
  830. prev->next = entry->next;
  831. else
  832. radius->msgs = entry->next;
  833. _remove = entry;
  834. } else {
  835. _remove = NULL;
  836. prev = entry;
  837. }
  838. entry = entry->next;
  839. if (_remove)
  840. radius_client_msg_free(_remove);
  841. }
  842. return id;
  843. }
  844. /**
  845. * radius_client_flush - Flush all pending RADIUS client messages
  846. * @radius: RADIUS client context from radius_client_init()
  847. * @only_auth: Whether only authentication messages are removed
  848. */
  849. void radius_client_flush(struct radius_client_data *radius, int only_auth)
  850. {
  851. struct radius_msg_list *entry, *prev, *tmp;
  852. if (!radius)
  853. return;
  854. prev = NULL;
  855. entry = radius->msgs;
  856. while (entry) {
  857. if (!only_auth || entry->msg_type == RADIUS_AUTH) {
  858. if (prev)
  859. prev->next = entry->next;
  860. else
  861. radius->msgs = entry->next;
  862. tmp = entry;
  863. entry = entry->next;
  864. radius_client_msg_free(tmp);
  865. radius->num_msgs--;
  866. } else {
  867. prev = entry;
  868. entry = entry->next;
  869. }
  870. }
  871. if (radius->msgs == NULL)
  872. eloop_cancel_timeout(radius_client_timer, radius, NULL);
  873. }
  874. static void radius_client_update_acct_msgs(struct radius_client_data *radius,
  875. const u8 *shared_secret,
  876. size_t shared_secret_len)
  877. {
  878. struct radius_msg_list *entry;
  879. if (!radius)
  880. return;
  881. for (entry = radius->msgs; entry; entry = entry->next) {
  882. if (entry->msg_type == RADIUS_ACCT) {
  883. entry->shared_secret = shared_secret;
  884. entry->shared_secret_len = shared_secret_len;
  885. radius_msg_finish_acct(entry->msg, shared_secret,
  886. shared_secret_len);
  887. }
  888. }
  889. }
  890. static int
  891. radius_change_server(struct radius_client_data *radius,
  892. struct hostapd_radius_server *nserv,
  893. struct hostapd_radius_server *oserv,
  894. int sock, int sock6, int auth)
  895. {
  896. struct sockaddr_in serv, claddr;
  897. #ifdef CONFIG_IPV6
  898. struct sockaddr_in6 serv6, claddr6;
  899. #endif /* CONFIG_IPV6 */
  900. struct sockaddr *addr, *cl_addr;
  901. socklen_t addrlen, claddrlen;
  902. char abuf[50];
  903. int sel_sock;
  904. struct radius_msg_list *entry;
  905. struct hostapd_radius_servers *conf = radius->conf;
  906. struct sockaddr_in disconnect_addr = {
  907. .sin_family = AF_UNSPEC,
  908. };
  909. hostapd_logger(radius->ctx, NULL, HOSTAPD_MODULE_RADIUS,
  910. HOSTAPD_LEVEL_INFO,
  911. "%s server %s:%d",
  912. auth ? "Authentication" : "Accounting",
  913. hostapd_ip_txt(&nserv->addr, abuf, sizeof(abuf)),
  914. nserv->port);
  915. if (oserv && oserv == nserv) {
  916. /* Reconnect to same server, flush */
  917. if (auth)
  918. radius_client_flush(radius, 1);
  919. }
  920. if (oserv && oserv != nserv &&
  921. (nserv->shared_secret_len != oserv->shared_secret_len ||
  922. os_memcmp(nserv->shared_secret, oserv->shared_secret,
  923. nserv->shared_secret_len) != 0)) {
  924. /* Pending RADIUS packets used different shared secret, so
  925. * they need to be modified. Update accounting message
  926. * authenticators here. Authentication messages are removed
  927. * since they would require more changes and the new RADIUS
  928. * server may not be prepared to receive them anyway due to
  929. * missing state information. Client will likely retry
  930. * authentication, so this should not be an issue. */
  931. if (auth)
  932. radius_client_flush(radius, 1);
  933. else {
  934. radius_client_update_acct_msgs(
  935. radius, nserv->shared_secret,
  936. nserv->shared_secret_len);
  937. }
  938. }
  939. /* Reset retry counters for the new server */
  940. for (entry = radius->msgs; oserv && oserv != nserv && entry;
  941. entry = entry->next) {
  942. if ((auth && entry->msg_type != RADIUS_AUTH) ||
  943. (!auth && entry->msg_type != RADIUS_ACCT))
  944. continue;
  945. entry->next_try = entry->first_try + RADIUS_CLIENT_FIRST_WAIT;
  946. entry->attempts = 0;
  947. entry->next_wait = RADIUS_CLIENT_FIRST_WAIT * 2;
  948. }
  949. if (radius->msgs) {
  950. eloop_cancel_timeout(radius_client_timer, radius, NULL);
  951. eloop_register_timeout(RADIUS_CLIENT_FIRST_WAIT, 0,
  952. radius_client_timer, radius, NULL);
  953. }
  954. switch (nserv->addr.af) {
  955. case AF_INET:
  956. os_memset(&serv, 0, sizeof(serv));
  957. serv.sin_family = AF_INET;
  958. serv.sin_addr.s_addr = nserv->addr.u.v4.s_addr;
  959. serv.sin_port = htons(nserv->port);
  960. addr = (struct sockaddr *) &serv;
  961. addrlen = sizeof(serv);
  962. sel_sock = sock;
  963. break;
  964. #ifdef CONFIG_IPV6
  965. case AF_INET6:
  966. os_memset(&serv6, 0, sizeof(serv6));
  967. serv6.sin6_family = AF_INET6;
  968. os_memcpy(&serv6.sin6_addr, &nserv->addr.u.v6,
  969. sizeof(struct in6_addr));
  970. serv6.sin6_port = htons(nserv->port);
  971. addr = (struct sockaddr *) &serv6;
  972. addrlen = sizeof(serv6);
  973. sel_sock = sock6;
  974. break;
  975. #endif /* CONFIG_IPV6 */
  976. default:
  977. return -1;
  978. }
  979. if (sel_sock < 0) {
  980. wpa_printf(MSG_INFO,
  981. "RADIUS: No server socket available (af=%d sock=%d sock6=%d auth=%d",
  982. nserv->addr.af, sock, sock6, auth);
  983. return -1;
  984. }
  985. if (conf->force_client_addr) {
  986. switch (conf->client_addr.af) {
  987. case AF_INET:
  988. os_memset(&claddr, 0, sizeof(claddr));
  989. claddr.sin_family = AF_INET;
  990. claddr.sin_addr.s_addr = conf->client_addr.u.v4.s_addr;
  991. claddr.sin_port = htons(0);
  992. cl_addr = (struct sockaddr *) &claddr;
  993. claddrlen = sizeof(claddr);
  994. break;
  995. #ifdef CONFIG_IPV6
  996. case AF_INET6:
  997. os_memset(&claddr6, 0, sizeof(claddr6));
  998. claddr6.sin6_family = AF_INET6;
  999. os_memcpy(&claddr6.sin6_addr, &conf->client_addr.u.v6,
  1000. sizeof(struct in6_addr));
  1001. claddr6.sin6_port = htons(0);
  1002. cl_addr = (struct sockaddr *) &claddr6;
  1003. claddrlen = sizeof(claddr6);
  1004. break;
  1005. #endif /* CONFIG_IPV6 */
  1006. default:
  1007. return -1;
  1008. }
  1009. if (bind(sel_sock, cl_addr, claddrlen) < 0) {
  1010. wpa_printf(MSG_INFO, "bind[radius]: %s",
  1011. strerror(errno));
  1012. return -1;
  1013. }
  1014. }
  1015. /* Force a reconnect by disconnecting the socket first */
  1016. if (connect(sel_sock, (struct sockaddr *) &disconnect_addr,
  1017. sizeof(disconnect_addr)) < 0)
  1018. wpa_printf(MSG_INFO, "disconnect[radius]: %s", strerror(errno));
  1019. if (connect(sel_sock, addr, addrlen) < 0) {
  1020. wpa_printf(MSG_INFO, "connect[radius]: %s", strerror(errno));
  1021. return -1;
  1022. }
  1023. #ifndef CONFIG_NATIVE_WINDOWS
  1024. switch (nserv->addr.af) {
  1025. case AF_INET:
  1026. claddrlen = sizeof(claddr);
  1027. if (getsockname(sel_sock, (struct sockaddr *) &claddr,
  1028. &claddrlen) == 0) {
  1029. wpa_printf(MSG_DEBUG, "RADIUS local address: %s:%u",
  1030. inet_ntoa(claddr.sin_addr),
  1031. ntohs(claddr.sin_port));
  1032. }
  1033. break;
  1034. #ifdef CONFIG_IPV6
  1035. case AF_INET6: {
  1036. claddrlen = sizeof(claddr6);
  1037. if (getsockname(sel_sock, (struct sockaddr *) &claddr6,
  1038. &claddrlen) == 0) {
  1039. wpa_printf(MSG_DEBUG, "RADIUS local address: %s:%u",
  1040. inet_ntop(AF_INET6, &claddr6.sin6_addr,
  1041. abuf, sizeof(abuf)),
  1042. ntohs(claddr6.sin6_port));
  1043. }
  1044. break;
  1045. }
  1046. #endif /* CONFIG_IPV6 */
  1047. }
  1048. #endif /* CONFIG_NATIVE_WINDOWS */
  1049. if (auth)
  1050. radius->auth_sock = sel_sock;
  1051. else
  1052. radius->acct_sock = sel_sock;
  1053. return 0;
  1054. }
  1055. static void radius_retry_primary_timer(void *eloop_ctx, void *timeout_ctx)
  1056. {
  1057. struct radius_client_data *radius = eloop_ctx;
  1058. struct hostapd_radius_servers *conf = radius->conf;
  1059. struct hostapd_radius_server *oserv;
  1060. if (radius->auth_sock >= 0 && conf->auth_servers &&
  1061. conf->auth_server != conf->auth_servers) {
  1062. oserv = conf->auth_server;
  1063. conf->auth_server = conf->auth_servers;
  1064. if (radius_change_server(radius, conf->auth_server, oserv,
  1065. radius->auth_serv_sock,
  1066. radius->auth_serv_sock6, 1) < 0) {
  1067. conf->auth_server = oserv;
  1068. radius_change_server(radius, oserv, conf->auth_server,
  1069. radius->auth_serv_sock,
  1070. radius->auth_serv_sock6, 1);
  1071. }
  1072. }
  1073. if (radius->acct_sock >= 0 && conf->acct_servers &&
  1074. conf->acct_server != conf->acct_servers) {
  1075. oserv = conf->acct_server;
  1076. conf->acct_server = conf->acct_servers;
  1077. if (radius_change_server(radius, conf->acct_server, oserv,
  1078. radius->acct_serv_sock,
  1079. radius->acct_serv_sock6, 0) < 0) {
  1080. conf->acct_server = oserv;
  1081. radius_change_server(radius, oserv, conf->acct_server,
  1082. radius->acct_serv_sock,
  1083. radius->acct_serv_sock6, 0);
  1084. }
  1085. }
  1086. if (conf->retry_primary_interval)
  1087. eloop_register_timeout(conf->retry_primary_interval, 0,
  1088. radius_retry_primary_timer, radius,
  1089. NULL);
  1090. }
  1091. static int radius_client_disable_pmtu_discovery(int s)
  1092. {
  1093. int r = -1;
  1094. #if defined(IP_MTU_DISCOVER) && defined(IP_PMTUDISC_DONT)
  1095. /* Turn off Path MTU discovery on IPv4/UDP sockets. */
  1096. int action = IP_PMTUDISC_DONT;
  1097. r = setsockopt(s, IPPROTO_IP, IP_MTU_DISCOVER, &action,
  1098. sizeof(action));
  1099. if (r == -1)
  1100. wpa_printf(MSG_ERROR, "RADIUS: Failed to set IP_MTU_DISCOVER: %s",
  1101. strerror(errno));
  1102. #endif
  1103. return r;
  1104. }
  1105. static void radius_close_auth_sockets(struct radius_client_data *radius)
  1106. {
  1107. radius->auth_sock = -1;
  1108. if (radius->auth_serv_sock >= 0) {
  1109. eloop_unregister_read_sock(radius->auth_serv_sock);
  1110. close(radius->auth_serv_sock);
  1111. radius->auth_serv_sock = -1;
  1112. }
  1113. #ifdef CONFIG_IPV6
  1114. if (radius->auth_serv_sock6 >= 0) {
  1115. eloop_unregister_read_sock(radius->auth_serv_sock6);
  1116. close(radius->auth_serv_sock6);
  1117. radius->auth_serv_sock6 = -1;
  1118. }
  1119. #endif /* CONFIG_IPV6 */
  1120. }
  1121. static void radius_close_acct_sockets(struct radius_client_data *radius)
  1122. {
  1123. radius->acct_sock = -1;
  1124. if (radius->acct_serv_sock >= 0) {
  1125. eloop_unregister_read_sock(radius->acct_serv_sock);
  1126. close(radius->acct_serv_sock);
  1127. radius->acct_serv_sock = -1;
  1128. }
  1129. #ifdef CONFIG_IPV6
  1130. if (radius->acct_serv_sock6 >= 0) {
  1131. eloop_unregister_read_sock(radius->acct_serv_sock6);
  1132. close(radius->acct_serv_sock6);
  1133. radius->acct_serv_sock6 = -1;
  1134. }
  1135. #endif /* CONFIG_IPV6 */
  1136. }
  1137. static int radius_client_init_auth(struct radius_client_data *radius)
  1138. {
  1139. struct hostapd_radius_servers *conf = radius->conf;
  1140. int ok = 0;
  1141. radius_close_auth_sockets(radius);
  1142. radius->auth_serv_sock = socket(PF_INET, SOCK_DGRAM, 0);
  1143. if (radius->auth_serv_sock < 0)
  1144. wpa_printf(MSG_INFO, "RADIUS: socket[PF_INET,SOCK_DGRAM]: %s",
  1145. strerror(errno));
  1146. else {
  1147. radius_client_disable_pmtu_discovery(radius->auth_serv_sock);
  1148. ok++;
  1149. }
  1150. #ifdef CONFIG_IPV6
  1151. radius->auth_serv_sock6 = socket(PF_INET6, SOCK_DGRAM, 0);
  1152. if (radius->auth_serv_sock6 < 0)
  1153. wpa_printf(MSG_INFO, "RADIUS: socket[PF_INET6,SOCK_DGRAM]: %s",
  1154. strerror(errno));
  1155. else
  1156. ok++;
  1157. #endif /* CONFIG_IPV6 */
  1158. if (ok == 0)
  1159. return -1;
  1160. radius_change_server(radius, conf->auth_server, NULL,
  1161. radius->auth_serv_sock, radius->auth_serv_sock6,
  1162. 1);
  1163. if (radius->auth_serv_sock >= 0 &&
  1164. eloop_register_read_sock(radius->auth_serv_sock,
  1165. radius_client_receive, radius,
  1166. (void *) RADIUS_AUTH)) {
  1167. wpa_printf(MSG_INFO, "RADIUS: Could not register read socket for authentication server");
  1168. radius_close_auth_sockets(radius);
  1169. return -1;
  1170. }
  1171. #ifdef CONFIG_IPV6
  1172. if (radius->auth_serv_sock6 >= 0 &&
  1173. eloop_register_read_sock(radius->auth_serv_sock6,
  1174. radius_client_receive, radius,
  1175. (void *) RADIUS_AUTH)) {
  1176. wpa_printf(MSG_INFO, "RADIUS: Could not register read socket for authentication server");
  1177. radius_close_auth_sockets(radius);
  1178. return -1;
  1179. }
  1180. #endif /* CONFIG_IPV6 */
  1181. return 0;
  1182. }
  1183. static int radius_client_init_acct(struct radius_client_data *radius)
  1184. {
  1185. struct hostapd_radius_servers *conf = radius->conf;
  1186. int ok = 0;
  1187. radius_close_acct_sockets(radius);
  1188. radius->acct_serv_sock = socket(PF_INET, SOCK_DGRAM, 0);
  1189. if (radius->acct_serv_sock < 0)
  1190. wpa_printf(MSG_INFO, "RADIUS: socket[PF_INET,SOCK_DGRAM]: %s",
  1191. strerror(errno));
  1192. else {
  1193. radius_client_disable_pmtu_discovery(radius->acct_serv_sock);
  1194. ok++;
  1195. }
  1196. #ifdef CONFIG_IPV6
  1197. radius->acct_serv_sock6 = socket(PF_INET6, SOCK_DGRAM, 0);
  1198. if (radius->acct_serv_sock6 < 0)
  1199. wpa_printf(MSG_INFO, "RADIUS: socket[PF_INET6,SOCK_DGRAM]: %s",
  1200. strerror(errno));
  1201. else
  1202. ok++;
  1203. #endif /* CONFIG_IPV6 */
  1204. if (ok == 0)
  1205. return -1;
  1206. radius_change_server(radius, conf->acct_server, NULL,
  1207. radius->acct_serv_sock, radius->acct_serv_sock6,
  1208. 0);
  1209. if (radius->acct_serv_sock >= 0 &&
  1210. eloop_register_read_sock(radius->acct_serv_sock,
  1211. radius_client_receive, radius,
  1212. (void *) RADIUS_ACCT)) {
  1213. wpa_printf(MSG_INFO, "RADIUS: Could not register read socket for accounting server");
  1214. radius_close_acct_sockets(radius);
  1215. return -1;
  1216. }
  1217. #ifdef CONFIG_IPV6
  1218. if (radius->acct_serv_sock6 >= 0 &&
  1219. eloop_register_read_sock(radius->acct_serv_sock6,
  1220. radius_client_receive, radius,
  1221. (void *) RADIUS_ACCT)) {
  1222. wpa_printf(MSG_INFO, "RADIUS: Could not register read socket for accounting server");
  1223. radius_close_acct_sockets(radius);
  1224. return -1;
  1225. }
  1226. #endif /* CONFIG_IPV6 */
  1227. return 0;
  1228. }
  1229. /**
  1230. * radius_client_init - Initialize RADIUS client
  1231. * @ctx: Callback context to be used in hostapd_logger() calls
  1232. * @conf: RADIUS client configuration (RADIUS servers)
  1233. * Returns: Pointer to private RADIUS client context or %NULL on failure
  1234. *
  1235. * The caller is responsible for keeping the configuration data available for
  1236. * the lifetime of the RADIUS client, i.e., until radius_client_deinit() is
  1237. * called for the returned context pointer.
  1238. */
  1239. struct radius_client_data *
  1240. radius_client_init(void *ctx, struct hostapd_radius_servers *conf)
  1241. {
  1242. struct radius_client_data *radius;
  1243. radius = os_zalloc(sizeof(struct radius_client_data));
  1244. if (radius == NULL)
  1245. return NULL;
  1246. radius->ctx = ctx;
  1247. radius->conf = conf;
  1248. radius->auth_serv_sock = radius->acct_serv_sock =
  1249. radius->auth_serv_sock6 = radius->acct_serv_sock6 =
  1250. radius->auth_sock = radius->acct_sock = -1;
  1251. if (conf->auth_server && radius_client_init_auth(radius)) {
  1252. radius_client_deinit(radius);
  1253. return NULL;
  1254. }
  1255. if (conf->acct_server && radius_client_init_acct(radius)) {
  1256. radius_client_deinit(radius);
  1257. return NULL;
  1258. }
  1259. if (conf->retry_primary_interval)
  1260. eloop_register_timeout(conf->retry_primary_interval, 0,
  1261. radius_retry_primary_timer, radius,
  1262. NULL);
  1263. return radius;
  1264. }
  1265. /**
  1266. * radius_client_deinit - Deinitialize RADIUS client
  1267. * @radius: RADIUS client context from radius_client_init()
  1268. */
  1269. void radius_client_deinit(struct radius_client_data *radius)
  1270. {
  1271. if (!radius)
  1272. return;
  1273. radius_close_auth_sockets(radius);
  1274. radius_close_acct_sockets(radius);
  1275. eloop_cancel_timeout(radius_retry_primary_timer, radius, NULL);
  1276. radius_client_flush(radius, 0);
  1277. os_free(radius->auth_handlers);
  1278. os_free(radius->acct_handlers);
  1279. os_free(radius);
  1280. }
  1281. /**
  1282. * radius_client_flush_auth - Flush pending RADIUS messages for an address
  1283. * @radius: RADIUS client context from radius_client_init()
  1284. * @addr: MAC address of the related device
  1285. *
  1286. * This function can be used to remove pending RADIUS authentication messages
  1287. * that are related to a specific device. The addr parameter is matched with
  1288. * the one used in radius_client_send() call that was used to transmit the
  1289. * authentication request.
  1290. */
  1291. void radius_client_flush_auth(struct radius_client_data *radius,
  1292. const u8 *addr)
  1293. {
  1294. struct radius_msg_list *entry, *prev, *tmp;
  1295. prev = NULL;
  1296. entry = radius->msgs;
  1297. while (entry) {
  1298. if (entry->msg_type == RADIUS_AUTH &&
  1299. os_memcmp(entry->addr, addr, ETH_ALEN) == 0) {
  1300. hostapd_logger(radius->ctx, addr,
  1301. HOSTAPD_MODULE_RADIUS,
  1302. HOSTAPD_LEVEL_DEBUG,
  1303. "Removing pending RADIUS authentication"
  1304. " message for removed client");
  1305. if (prev)
  1306. prev->next = entry->next;
  1307. else
  1308. radius->msgs = entry->next;
  1309. tmp = entry;
  1310. entry = entry->next;
  1311. radius_client_msg_free(tmp);
  1312. radius->num_msgs--;
  1313. continue;
  1314. }
  1315. prev = entry;
  1316. entry = entry->next;
  1317. }
  1318. }
  1319. static int radius_client_dump_auth_server(char *buf, size_t buflen,
  1320. struct hostapd_radius_server *serv,
  1321. struct radius_client_data *cli)
  1322. {
  1323. int pending = 0;
  1324. struct radius_msg_list *msg;
  1325. char abuf[50];
  1326. if (cli) {
  1327. for (msg = cli->msgs; msg; msg = msg->next) {
  1328. if (msg->msg_type == RADIUS_AUTH)
  1329. pending++;
  1330. }
  1331. }
  1332. return os_snprintf(buf, buflen,
  1333. "radiusAuthServerIndex=%d\n"
  1334. "radiusAuthServerAddress=%s\n"
  1335. "radiusAuthClientServerPortNumber=%d\n"
  1336. "radiusAuthClientRoundTripTime=%d\n"
  1337. "radiusAuthClientAccessRequests=%u\n"
  1338. "radiusAuthClientAccessRetransmissions=%u\n"
  1339. "radiusAuthClientAccessAccepts=%u\n"
  1340. "radiusAuthClientAccessRejects=%u\n"
  1341. "radiusAuthClientAccessChallenges=%u\n"
  1342. "radiusAuthClientMalformedAccessResponses=%u\n"
  1343. "radiusAuthClientBadAuthenticators=%u\n"
  1344. "radiusAuthClientPendingRequests=%u\n"
  1345. "radiusAuthClientTimeouts=%u\n"
  1346. "radiusAuthClientUnknownTypes=%u\n"
  1347. "radiusAuthClientPacketsDropped=%u\n",
  1348. serv->index,
  1349. hostapd_ip_txt(&serv->addr, abuf, sizeof(abuf)),
  1350. serv->port,
  1351. serv->round_trip_time,
  1352. serv->requests,
  1353. serv->retransmissions,
  1354. serv->access_accepts,
  1355. serv->access_rejects,
  1356. serv->access_challenges,
  1357. serv->malformed_responses,
  1358. serv->bad_authenticators,
  1359. pending,
  1360. serv->timeouts,
  1361. serv->unknown_types,
  1362. serv->packets_dropped);
  1363. }
  1364. static int radius_client_dump_acct_server(char *buf, size_t buflen,
  1365. struct hostapd_radius_server *serv,
  1366. struct radius_client_data *cli)
  1367. {
  1368. int pending = 0;
  1369. struct radius_msg_list *msg;
  1370. char abuf[50];
  1371. if (cli) {
  1372. for (msg = cli->msgs; msg; msg = msg->next) {
  1373. if (msg->msg_type == RADIUS_ACCT ||
  1374. msg->msg_type == RADIUS_ACCT_INTERIM)
  1375. pending++;
  1376. }
  1377. }
  1378. return os_snprintf(buf, buflen,
  1379. "radiusAccServerIndex=%d\n"
  1380. "radiusAccServerAddress=%s\n"
  1381. "radiusAccClientServerPortNumber=%d\n"
  1382. "radiusAccClientRoundTripTime=%d\n"
  1383. "radiusAccClientRequests=%u\n"
  1384. "radiusAccClientRetransmissions=%u\n"
  1385. "radiusAccClientResponses=%u\n"
  1386. "radiusAccClientMalformedResponses=%u\n"
  1387. "radiusAccClientBadAuthenticators=%u\n"
  1388. "radiusAccClientPendingRequests=%u\n"
  1389. "radiusAccClientTimeouts=%u\n"
  1390. "radiusAccClientUnknownTypes=%u\n"
  1391. "radiusAccClientPacketsDropped=%u\n",
  1392. serv->index,
  1393. hostapd_ip_txt(&serv->addr, abuf, sizeof(abuf)),
  1394. serv->port,
  1395. serv->round_trip_time,
  1396. serv->requests,
  1397. serv->retransmissions,
  1398. serv->responses,
  1399. serv->malformed_responses,
  1400. serv->bad_authenticators,
  1401. pending,
  1402. serv->timeouts,
  1403. serv->unknown_types,
  1404. serv->packets_dropped);
  1405. }
  1406. /**
  1407. * radius_client_get_mib - Get RADIUS client MIB information
  1408. * @radius: RADIUS client context from radius_client_init()
  1409. * @buf: Buffer for returning MIB data in text format
  1410. * @buflen: Maximum buf length in octets
  1411. * Returns: Number of octets written into the buffer
  1412. */
  1413. int radius_client_get_mib(struct radius_client_data *radius, char *buf,
  1414. size_t buflen)
  1415. {
  1416. struct hostapd_radius_servers *conf;
  1417. int i;
  1418. struct hostapd_radius_server *serv;
  1419. int count = 0;
  1420. if (!radius)
  1421. return 0;
  1422. conf = radius->conf;
  1423. if (conf->auth_servers) {
  1424. for (i = 0; i < conf->num_auth_servers; i++) {
  1425. serv = &conf->auth_servers[i];
  1426. count += radius_client_dump_auth_server(
  1427. buf + count, buflen - count, serv,
  1428. serv == conf->auth_server ?
  1429. radius : NULL);
  1430. }
  1431. }
  1432. if (conf->acct_servers) {
  1433. for (i = 0; i < conf->num_acct_servers; i++) {
  1434. serv = &conf->acct_servers[i];
  1435. count += radius_client_dump_acct_server(
  1436. buf + count, buflen - count, serv,
  1437. serv == conf->acct_server ?
  1438. radius : NULL);
  1439. }
  1440. }
  1441. return count;
  1442. }
  1443. void radius_client_reconfig(struct radius_client_data *radius,
  1444. struct hostapd_radius_servers *conf)
  1445. {
  1446. if (radius)
  1447. radius->conf = conf;
  1448. }