radius_das.c 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414
  1. /*
  2. * RADIUS Dynamic Authorization Server (DAS) (RFC 5176)
  3. * Copyright (c) 2012-2013, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "includes.h"
  9. #include <net/if.h>
  10. #include "utils/common.h"
  11. #include "utils/eloop.h"
  12. #include "utils/ip_addr.h"
  13. #include "radius.h"
  14. #include "radius_das.h"
  15. struct radius_das_data {
  16. int sock;
  17. u8 *shared_secret;
  18. size_t shared_secret_len;
  19. struct hostapd_ip_addr client_addr;
  20. unsigned int time_window;
  21. int require_event_timestamp;
  22. int require_message_authenticator;
  23. void *ctx;
  24. enum radius_das_res (*disconnect)(void *ctx,
  25. struct radius_das_attrs *attr);
  26. };
  27. static struct radius_msg * radius_das_disconnect(struct radius_das_data *das,
  28. struct radius_msg *msg,
  29. const char *abuf,
  30. int from_port)
  31. {
  32. struct radius_hdr *hdr;
  33. struct radius_msg *reply;
  34. u8 allowed[] = {
  35. RADIUS_ATTR_USER_NAME,
  36. RADIUS_ATTR_NAS_IP_ADDRESS,
  37. RADIUS_ATTR_CALLING_STATION_ID,
  38. RADIUS_ATTR_NAS_IDENTIFIER,
  39. RADIUS_ATTR_ACCT_SESSION_ID,
  40. RADIUS_ATTR_ACCT_MULTI_SESSION_ID,
  41. RADIUS_ATTR_EVENT_TIMESTAMP,
  42. RADIUS_ATTR_MESSAGE_AUTHENTICATOR,
  43. RADIUS_ATTR_CHARGEABLE_USER_IDENTITY,
  44. #ifdef CONFIG_IPV6
  45. RADIUS_ATTR_NAS_IPV6_ADDRESS,
  46. #endif /* CONFIG_IPV6 */
  47. 0
  48. };
  49. int error = 405;
  50. u8 attr;
  51. enum radius_das_res res;
  52. struct radius_das_attrs attrs;
  53. u8 *buf;
  54. size_t len;
  55. char tmp[100];
  56. u8 sta_addr[ETH_ALEN];
  57. hdr = radius_msg_get_hdr(msg);
  58. attr = radius_msg_find_unlisted_attr(msg, allowed);
  59. if (attr) {
  60. wpa_printf(MSG_INFO, "DAS: Unsupported attribute %u in "
  61. "Disconnect-Request from %s:%d", attr,
  62. abuf, from_port);
  63. error = 401;
  64. goto fail;
  65. }
  66. os_memset(&attrs, 0, sizeof(attrs));
  67. if (radius_msg_get_attr_ptr(msg, RADIUS_ATTR_NAS_IP_ADDRESS,
  68. &buf, &len, NULL) == 0) {
  69. if (len != 4) {
  70. wpa_printf(MSG_INFO, "DAS: Invalid NAS-IP-Address from %s:%d",
  71. abuf, from_port);
  72. error = 407;
  73. goto fail;
  74. }
  75. attrs.nas_ip_addr = buf;
  76. }
  77. #ifdef CONFIG_IPV6
  78. if (radius_msg_get_attr_ptr(msg, RADIUS_ATTR_NAS_IPV6_ADDRESS,
  79. &buf, &len, NULL) == 0) {
  80. if (len != 16) {
  81. wpa_printf(MSG_INFO, "DAS: Invalid NAS-IPv6-Address from %s:%d",
  82. abuf, from_port);
  83. error = 407;
  84. goto fail;
  85. }
  86. attrs.nas_ipv6_addr = buf;
  87. }
  88. #endif /* CONFIG_IPV6 */
  89. if (radius_msg_get_attr_ptr(msg, RADIUS_ATTR_NAS_IDENTIFIER,
  90. &buf, &len, NULL) == 0) {
  91. attrs.nas_identifier = buf;
  92. attrs.nas_identifier_len = len;
  93. }
  94. if (radius_msg_get_attr_ptr(msg, RADIUS_ATTR_CALLING_STATION_ID,
  95. &buf, &len, NULL) == 0) {
  96. if (len >= sizeof(tmp))
  97. len = sizeof(tmp) - 1;
  98. os_memcpy(tmp, buf, len);
  99. tmp[len] = '\0';
  100. if (hwaddr_aton2(tmp, sta_addr) < 0) {
  101. wpa_printf(MSG_INFO, "DAS: Invalid Calling-Station-Id "
  102. "'%s' from %s:%d", tmp, abuf, from_port);
  103. error = 407;
  104. goto fail;
  105. }
  106. attrs.sta_addr = sta_addr;
  107. }
  108. if (radius_msg_get_attr_ptr(msg, RADIUS_ATTR_USER_NAME,
  109. &buf, &len, NULL) == 0) {
  110. attrs.user_name = buf;
  111. attrs.user_name_len = len;
  112. }
  113. if (radius_msg_get_attr_ptr(msg, RADIUS_ATTR_ACCT_SESSION_ID,
  114. &buf, &len, NULL) == 0) {
  115. attrs.acct_session_id = buf;
  116. attrs.acct_session_id_len = len;
  117. }
  118. if (radius_msg_get_attr_ptr(msg, RADIUS_ATTR_ACCT_MULTI_SESSION_ID,
  119. &buf, &len, NULL) == 0) {
  120. attrs.acct_multi_session_id = buf;
  121. attrs.acct_multi_session_id_len = len;
  122. }
  123. if (radius_msg_get_attr_ptr(msg, RADIUS_ATTR_CHARGEABLE_USER_IDENTITY,
  124. &buf, &len, NULL) == 0) {
  125. attrs.cui = buf;
  126. attrs.cui_len = len;
  127. }
  128. res = das->disconnect(das->ctx, &attrs);
  129. switch (res) {
  130. case RADIUS_DAS_NAS_MISMATCH:
  131. wpa_printf(MSG_INFO, "DAS: NAS mismatch from %s:%d",
  132. abuf, from_port);
  133. error = 403;
  134. break;
  135. case RADIUS_DAS_SESSION_NOT_FOUND:
  136. wpa_printf(MSG_INFO, "DAS: Session not found for request from "
  137. "%s:%d", abuf, from_port);
  138. error = 503;
  139. break;
  140. case RADIUS_DAS_MULTI_SESSION_MATCH:
  141. wpa_printf(MSG_INFO,
  142. "DAS: Multiple sessions match for request from %s:%d",
  143. abuf, from_port);
  144. error = 508;
  145. break;
  146. case RADIUS_DAS_SUCCESS:
  147. error = 0;
  148. break;
  149. }
  150. fail:
  151. reply = radius_msg_new(error ? RADIUS_CODE_DISCONNECT_NAK :
  152. RADIUS_CODE_DISCONNECT_ACK, hdr->identifier);
  153. if (reply == NULL)
  154. return NULL;
  155. if (error) {
  156. if (!radius_msg_add_attr_int32(reply, RADIUS_ATTR_ERROR_CAUSE,
  157. error)) {
  158. radius_msg_free(reply);
  159. return NULL;
  160. }
  161. }
  162. return reply;
  163. }
  164. static void radius_das_receive(int sock, void *eloop_ctx, void *sock_ctx)
  165. {
  166. struct radius_das_data *das = eloop_ctx;
  167. u8 buf[1500];
  168. union {
  169. struct sockaddr_storage ss;
  170. struct sockaddr_in sin;
  171. #ifdef CONFIG_IPV6
  172. struct sockaddr_in6 sin6;
  173. #endif /* CONFIG_IPV6 */
  174. } from;
  175. char abuf[50];
  176. int from_port = 0;
  177. socklen_t fromlen;
  178. int len;
  179. struct radius_msg *msg, *reply = NULL;
  180. struct radius_hdr *hdr;
  181. struct wpabuf *rbuf;
  182. u32 val;
  183. int res;
  184. struct os_time now;
  185. fromlen = sizeof(from);
  186. len = recvfrom(sock, buf, sizeof(buf), 0,
  187. (struct sockaddr *) &from.ss, &fromlen);
  188. if (len < 0) {
  189. wpa_printf(MSG_ERROR, "DAS: recvfrom: %s", strerror(errno));
  190. return;
  191. }
  192. os_strlcpy(abuf, inet_ntoa(from.sin.sin_addr), sizeof(abuf));
  193. from_port = ntohs(from.sin.sin_port);
  194. wpa_printf(MSG_DEBUG, "DAS: Received %d bytes from %s:%d",
  195. len, abuf, from_port);
  196. if (das->client_addr.u.v4.s_addr != from.sin.sin_addr.s_addr) {
  197. wpa_printf(MSG_DEBUG, "DAS: Drop message from unknown client");
  198. return;
  199. }
  200. msg = radius_msg_parse(buf, len);
  201. if (msg == NULL) {
  202. wpa_printf(MSG_DEBUG, "DAS: Parsing incoming RADIUS packet "
  203. "from %s:%d failed", abuf, from_port);
  204. return;
  205. }
  206. if (wpa_debug_level <= MSG_MSGDUMP)
  207. radius_msg_dump(msg);
  208. if (radius_msg_verify_das_req(msg, das->shared_secret,
  209. das->shared_secret_len,
  210. das->require_message_authenticator)) {
  211. wpa_printf(MSG_DEBUG,
  212. "DAS: Invalid authenticator or Message-Authenticator in packet from %s:%d - drop",
  213. abuf, from_port);
  214. goto fail;
  215. }
  216. os_get_time(&now);
  217. res = radius_msg_get_attr(msg, RADIUS_ATTR_EVENT_TIMESTAMP,
  218. (u8 *) &val, 4);
  219. if (res == 4) {
  220. u32 timestamp = ntohl(val);
  221. if ((unsigned int) abs((int) (now.sec - timestamp)) >
  222. das->time_window) {
  223. wpa_printf(MSG_DEBUG, "DAS: Unacceptable "
  224. "Event-Timestamp (%u; local time %u) in "
  225. "packet from %s:%d - drop",
  226. timestamp, (unsigned int) now.sec,
  227. abuf, from_port);
  228. goto fail;
  229. }
  230. } else if (das->require_event_timestamp) {
  231. wpa_printf(MSG_DEBUG, "DAS: Missing Event-Timestamp in packet "
  232. "from %s:%d - drop", abuf, from_port);
  233. goto fail;
  234. }
  235. hdr = radius_msg_get_hdr(msg);
  236. switch (hdr->code) {
  237. case RADIUS_CODE_DISCONNECT_REQUEST:
  238. reply = radius_das_disconnect(das, msg, abuf, from_port);
  239. break;
  240. case RADIUS_CODE_COA_REQUEST:
  241. /* TODO */
  242. reply = radius_msg_new(RADIUS_CODE_COA_NAK,
  243. hdr->identifier);
  244. if (reply == NULL)
  245. break;
  246. /* Unsupported Service */
  247. if (!radius_msg_add_attr_int32(reply, RADIUS_ATTR_ERROR_CAUSE,
  248. 405)) {
  249. radius_msg_free(reply);
  250. reply = NULL;
  251. break;
  252. }
  253. break;
  254. default:
  255. wpa_printf(MSG_DEBUG, "DAS: Unexpected RADIUS code %u in "
  256. "packet from %s:%d",
  257. hdr->code, abuf, from_port);
  258. }
  259. if (reply) {
  260. wpa_printf(MSG_DEBUG, "DAS: Reply to %s:%d", abuf, from_port);
  261. if (!radius_msg_add_attr_int32(reply,
  262. RADIUS_ATTR_EVENT_TIMESTAMP,
  263. now.sec)) {
  264. wpa_printf(MSG_DEBUG, "DAS: Failed to add "
  265. "Event-Timestamp attribute");
  266. }
  267. if (radius_msg_finish_das_resp(reply, das->shared_secret,
  268. das->shared_secret_len, hdr) <
  269. 0) {
  270. wpa_printf(MSG_DEBUG, "DAS: Failed to add "
  271. "Message-Authenticator attribute");
  272. }
  273. if (wpa_debug_level <= MSG_MSGDUMP)
  274. radius_msg_dump(reply);
  275. rbuf = radius_msg_get_buf(reply);
  276. res = sendto(das->sock, wpabuf_head(rbuf),
  277. wpabuf_len(rbuf), 0,
  278. (struct sockaddr *) &from.ss, fromlen);
  279. if (res < 0) {
  280. wpa_printf(MSG_ERROR, "DAS: sendto(to %s:%d): %s",
  281. abuf, from_port, strerror(errno));
  282. }
  283. }
  284. fail:
  285. radius_msg_free(msg);
  286. radius_msg_free(reply);
  287. }
  288. static int radius_das_open_socket(int port)
  289. {
  290. int s;
  291. struct sockaddr_in addr;
  292. s = socket(PF_INET, SOCK_DGRAM, 0);
  293. if (s < 0) {
  294. wpa_printf(MSG_INFO, "RADIUS DAS: socket: %s", strerror(errno));
  295. return -1;
  296. }
  297. os_memset(&addr, 0, sizeof(addr));
  298. addr.sin_family = AF_INET;
  299. addr.sin_port = htons(port);
  300. if (bind(s, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
  301. wpa_printf(MSG_INFO, "RADIUS DAS: bind: %s", strerror(errno));
  302. close(s);
  303. return -1;
  304. }
  305. return s;
  306. }
  307. struct radius_das_data *
  308. radius_das_init(struct radius_das_conf *conf)
  309. {
  310. struct radius_das_data *das;
  311. if (conf->port == 0 || conf->shared_secret == NULL ||
  312. conf->client_addr == NULL)
  313. return NULL;
  314. das = os_zalloc(sizeof(*das));
  315. if (das == NULL)
  316. return NULL;
  317. das->time_window = conf->time_window;
  318. das->require_event_timestamp = conf->require_event_timestamp;
  319. das->require_message_authenticator =
  320. conf->require_message_authenticator;
  321. das->ctx = conf->ctx;
  322. das->disconnect = conf->disconnect;
  323. os_memcpy(&das->client_addr, conf->client_addr,
  324. sizeof(das->client_addr));
  325. das->shared_secret = os_memdup(conf->shared_secret,
  326. conf->shared_secret_len);
  327. if (das->shared_secret == NULL) {
  328. radius_das_deinit(das);
  329. return NULL;
  330. }
  331. das->shared_secret_len = conf->shared_secret_len;
  332. das->sock = radius_das_open_socket(conf->port);
  333. if (das->sock < 0) {
  334. wpa_printf(MSG_ERROR, "Failed to open UDP socket for RADIUS "
  335. "DAS");
  336. radius_das_deinit(das);
  337. return NULL;
  338. }
  339. if (eloop_register_read_sock(das->sock, radius_das_receive, das, NULL))
  340. {
  341. radius_das_deinit(das);
  342. return NULL;
  343. }
  344. return das;
  345. }
  346. void radius_das_deinit(struct radius_das_data *das)
  347. {
  348. if (das == NULL)
  349. return;
  350. if (das->sock >= 0) {
  351. eloop_unregister_read_sock(das->sock);
  352. close(das->sock);
  353. }
  354. os_free(das->shared_secret);
  355. os_free(das);
  356. }