]> git.ipfire.org Git - thirdparty/hostap.git/blame - src/radius/radius_server.c
HS 2.0R2 AP: Add OSU Providers list ANQP element
[thirdparty/hostap.git] / src / radius / radius_server.c
CommitLineData
6fc6879b 1/*
362bd35f 2 * RADIUS authentication server
a1dd890a 3 * Copyright (c) 2005-2009, 2011-2014, Jouni Malinen <j@w1.fi>
6fc6879b 4 *
0f3d578e
JM
5 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
6fc6879b
JM
7 */
8
9#include "includes.h"
10#include <net/if.h>
11
12#include "common.h"
13#include "radius.h"
14#include "eloop.h"
6fc6879b
JM
15#include "eap_server/eap.h"
16#include "radius_server.h"
17
362bd35f
JM
18/**
19 * RADIUS_SESSION_TIMEOUT - Session timeout in seconds
20 */
6fc6879b 21#define RADIUS_SESSION_TIMEOUT 60
362bd35f
JM
22
23/**
24 * RADIUS_MAX_SESSION - Maximum number of active sessions
25 */
6fc6879b 26#define RADIUS_MAX_SESSION 100
362bd35f
JM
27
28/**
29 * RADIUS_MAX_MSG_LEN - Maximum message length for incoming RADIUS messages
30 */
6fc6879b
JM
31#define RADIUS_MAX_MSG_LEN 3000
32
33static struct eapol_callbacks radius_server_eapol_cb;
34
35struct radius_client;
36struct radius_server_data;
37
362bd35f
JM
38/**
39 * struct radius_server_counters - RADIUS server statistics counters
40 */
6fc6879b
JM
41struct radius_server_counters {
42 u32 access_requests;
43 u32 invalid_requests;
44 u32 dup_access_requests;
45 u32 access_accepts;
46 u32 access_rejects;
47 u32 access_challenges;
48 u32 malformed_access_requests;
49 u32 bad_authenticators;
50 u32 packets_dropped;
51 u32 unknown_types;
a1dd890a
JM
52
53 u32 acct_requests;
54 u32 invalid_acct_requests;
55 u32 acct_responses;
56 u32 malformed_acct_requests;
57 u32 acct_bad_authenticators;
58 u32 unknown_acct_types;
6fc6879b
JM
59};
60
362bd35f
JM
61/**
62 * struct radius_session - Internal RADIUS server data for a session
63 */
6fc6879b
JM
64struct radius_session {
65 struct radius_session *next;
66 struct radius_client *client;
67 struct radius_server_data *server;
68 unsigned int sess_id;
69 struct eap_sm *eap;
70 struct eap_eapol_interface *eap_if;
71
72 struct radius_msg *last_msg;
73 char *last_from_addr;
74 int last_from_port;
75 struct sockaddr_storage last_from;
76 socklen_t last_fromlen;
77 u8 last_identifier;
78 struct radius_msg *last_reply;
79 u8 last_authenticator[16];
80};
81
362bd35f
JM
82/**
83 * struct radius_client - Internal RADIUS server data for a client
84 */
6fc6879b
JM
85struct radius_client {
86 struct radius_client *next;
87 struct in_addr addr;
88 struct in_addr mask;
89#ifdef CONFIG_IPV6
90 struct in6_addr addr6;
91 struct in6_addr mask6;
92#endif /* CONFIG_IPV6 */
93 char *shared_secret;
94 int shared_secret_len;
95 struct radius_session *sessions;
96 struct radius_server_counters counters;
97};
98
362bd35f
JM
99/**
100 * struct radius_server_data - Internal RADIUS server data
101 */
6fc6879b 102struct radius_server_data {
362bd35f
JM
103 /**
104 * auth_sock - Socket for RADIUS authentication messages
105 */
6fc6879b 106 int auth_sock;
362bd35f 107
a1dd890a
JM
108 /**
109 * acct_sock - Socket for RADIUS accounting messages
110 */
111 int acct_sock;
112
362bd35f
JM
113 /**
114 * clients - List of authorized RADIUS clients
115 */
6fc6879b 116 struct radius_client *clients;
362bd35f
JM
117
118 /**
119 * next_sess_id - Next session identifier
120 */
6fc6879b 121 unsigned int next_sess_id;
362bd35f
JM
122
123 /**
124 * conf_ctx - Context pointer for callbacks
125 *
126 * This is used as the ctx argument in get_eap_user() calls.
127 */
6fc6879b 128 void *conf_ctx;
362bd35f
JM
129
130 /**
131 * num_sess - Number of active sessions
132 */
6fc6879b 133 int num_sess;
362bd35f
JM
134
135 /**
136 * eap_sim_db_priv - EAP-SIM/AKA database context
137 *
138 * This is passed to the EAP-SIM/AKA server implementation as a
139 * callback context.
140 */
6fc6879b 141 void *eap_sim_db_priv;
362bd35f
JM
142
143 /**
144 * ssl_ctx - TLS context
145 *
146 * This is passed to the EAP server implementation as a callback
147 * context for TLS operations.
148 */
6fc6879b 149 void *ssl_ctx;
362bd35f
JM
150
151 /**
152 * pac_opaque_encr_key - PAC-Opaque encryption key for EAP-FAST
153 *
154 * This parameter is used to set a key for EAP-FAST to encrypt the
155 * PAC-Opaque data. It can be set to %NULL if EAP-FAST is not used. If
156 * set, must point to a 16-octet key.
157 */
6fc6879b 158 u8 *pac_opaque_encr_key;
362bd35f
JM
159
160 /**
161 * eap_fast_a_id - EAP-FAST authority identity (A-ID)
162 *
163 * If EAP-FAST is not used, this can be set to %NULL. In theory, this
164 * is a variable length field, but due to some existing implementations
165 * requiring A-ID to be 16 octets in length, it is recommended to use
166 * that length for the field to provide interoperability with deployed
167 * peer implementations.
168 */
2d867244 169 u8 *eap_fast_a_id;
362bd35f
JM
170
171 /**
172 * eap_fast_a_id_len - Length of eap_fast_a_id buffer in octets
173 */
2d867244 174 size_t eap_fast_a_id_len;
362bd35f
JM
175
176 /**
177 * eap_fast_a_id_info - EAP-FAST authority identifier information
178 *
179 * This A-ID-Info contains a user-friendly name for the A-ID. For
180 * example, this could be the enterprise and server names in
181 * human-readable format. This field is encoded as UTF-8. If EAP-FAST
182 * is not used, this can be set to %NULL.
183 */
2d867244 184 char *eap_fast_a_id_info;
362bd35f
JM
185
186 /**
187 * eap_fast_prov - EAP-FAST provisioning modes
188 *
189 * 0 = provisioning disabled, 1 = only anonymous provisioning allowed,
190 * 2 = only authenticated provisioning allowed, 3 = both provisioning
191 * modes allowed.
192 */
378eae5e 193 int eap_fast_prov;
362bd35f
JM
194
195 /**
196 * pac_key_lifetime - EAP-FAST PAC-Key lifetime in seconds
197 *
198 * This is the hard limit on how long a provisioned PAC-Key can be
199 * used.
200 */
a11c90a6 201 int pac_key_lifetime;
362bd35f
JM
202
203 /**
204 * pac_key_refresh_time - EAP-FAST PAC-Key refresh time in seconds
205 *
206 * This is a soft limit on the PAC-Key. The server will automatically
207 * generate a new PAC-Key when this number of seconds (or fewer) of the
208 * lifetime remains.
209 */
a11c90a6 210 int pac_key_refresh_time;
362bd35f
JM
211
212 /**
213 * eap_sim_aka_result_ind - EAP-SIM/AKA protected success indication
214 *
215 * This controls whether the protected success/failure indication
216 * (AT_RESULT_IND) is used with EAP-SIM and EAP-AKA.
217 */
6fc6879b 218 int eap_sim_aka_result_ind;
362bd35f
JM
219
220 /**
221 * tnc - Trusted Network Connect (TNC)
222 *
223 * This controls whether TNC is enabled and will be required before the
224 * peer is allowed to connect. Note: This is only used with EAP-TTLS
225 * and EAP-FAST. If any other EAP method is enabled, the peer will be
226 * allowed to connect without TNC.
227 */
c3e258ae 228 int tnc;
362bd35f 229
df684d82
DH
230 /**
231 * pwd_group - The D-H group assigned for EAP-pwd
232 *
233 * If EAP-pwd is not used it can be set to zero.
234 */
235 u16 pwd_group;
236
67fe933d
JM
237 /**
238 * server_id - Server identity
239 */
240 const char *server_id;
241
362bd35f
JM
242 /**
243 * wps - Wi-Fi Protected Setup context
244 *
245 * If WPS is used with an external RADIUS server (which is quite
246 * unlikely configuration), this is used to provide a pointer to WPS
247 * context data. Normally, this can be set to %NULL.
248 */
ad08c363 249 struct wps_context *wps;
362bd35f
JM
250
251 /**
252 * ipv6 - Whether to enable IPv6 support in the RADIUS server
253 */
6fc6879b 254 int ipv6;
362bd35f
JM
255
256 /**
257 * start_time - Timestamp of server start
258 */
58707176 259 struct os_reltime start_time;
362bd35f
JM
260
261 /**
262 * counters - Statistics counters for server operations
263 *
264 * These counters are the sum over all clients.
265 */
6fc6879b 266 struct radius_server_counters counters;
362bd35f
JM
267
268 /**
269 * get_eap_user - Callback for fetching EAP user information
270 * @ctx: Context data from conf_ctx
271 * @identity: User identity
272 * @identity_len: identity buffer length in octets
273 * @phase2: Whether this is for Phase 2 identity
274 * @user: Data structure for filling in the user information
275 * Returns: 0 on success, -1 on failure
276 *
277 * This is used to fetch information from user database. The callback
278 * will fill in information about allowed EAP methods and the user
279 * password. The password field will be an allocated copy of the
280 * password data and RADIUS server will free it after use.
281 */
6fc6879b
JM
282 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
283 int phase2, struct eap_user *user);
362bd35f
JM
284
285 /**
286 * eap_req_id_text - Optional data for EAP-Request/Identity
287 *
288 * This can be used to configure an optional, displayable message that
289 * will be sent in EAP-Request/Identity. This string can contain an
290 * ASCII-0 character (nul) to separate network infromation per RFC
291 * 4284. The actual string length is explicit provided in
292 * eap_req_id_text_len since nul character will not be used as a string
293 * terminator.
294 */
65d50f0a 295 char *eap_req_id_text;
362bd35f
JM
296
297 /**
298 * eap_req_id_text_len - Length of eap_req_id_text buffer in octets
299 */
65d50f0a 300 size_t eap_req_id_text_len;
bb437f28
GD
301
302 /*
303 * msg_ctx - Context data for wpa_msg() calls
304 */
305 void *msg_ctx;
505a3694
JM
306
307#ifdef CONFIG_RADIUS_TEST
308 char *dump_msk_file;
309#endif /* CONFIG_RADIUS_TEST */
6fc6879b
JM
310};
311
312
6fc6879b
JM
313#define RADIUS_DEBUG(args...) \
314wpa_printf(MSG_DEBUG, "RADIUS SRV: " args)
315#define RADIUS_ERROR(args...) \
316wpa_printf(MSG_ERROR, "RADIUS SRV: " args)
317#define RADIUS_DUMP(args...) \
318wpa_hexdump(MSG_MSGDUMP, "RADIUS SRV: " args)
319#define RADIUS_DUMP_ASCII(args...) \
320wpa_hexdump_ascii(MSG_MSGDUMP, "RADIUS SRV: " args)
321
322
323static void radius_server_session_timeout(void *eloop_ctx, void *timeout_ctx);
f481459f
JM
324static void radius_server_session_remove_timeout(void *eloop_ctx,
325 void *timeout_ctx);
6fc6879b
JM
326
327
328static struct radius_client *
329radius_server_get_client(struct radius_server_data *data, struct in_addr *addr,
330 int ipv6)
331{
332 struct radius_client *client = data->clients;
333
334 while (client) {
335#ifdef CONFIG_IPV6
336 if (ipv6) {
337 struct in6_addr *addr6;
338 int i;
339
340 addr6 = (struct in6_addr *) addr;
341 for (i = 0; i < 16; i++) {
342 if ((addr6->s6_addr[i] &
343 client->mask6.s6_addr[i]) !=
344 (client->addr6.s6_addr[i] &
345 client->mask6.s6_addr[i])) {
346 i = 17;
347 break;
348 }
349 }
350 if (i == 16) {
351 break;
352 }
353 }
354#endif /* CONFIG_IPV6 */
355 if (!ipv6 && (client->addr.s_addr & client->mask.s_addr) ==
356 (addr->s_addr & client->mask.s_addr)) {
357 break;
358 }
359
360 client = client->next;
361 }
362
363 return client;
364}
365
366
367static struct radius_session *
368radius_server_get_session(struct radius_client *client, unsigned int sess_id)
369{
370 struct radius_session *sess = client->sessions;
371
372 while (sess) {
373 if (sess->sess_id == sess_id) {
374 break;
375 }
376 sess = sess->next;
377 }
378
379 return sess;
380}
381
382
383static void radius_server_session_free(struct radius_server_data *data,
384 struct radius_session *sess)
385{
386 eloop_cancel_timeout(radius_server_session_timeout, data, sess);
f481459f 387 eloop_cancel_timeout(radius_server_session_remove_timeout, data, sess);
6fc6879b 388 eap_server_sm_deinit(sess->eap);
9e7245bd 389 radius_msg_free(sess->last_msg);
6fc6879b 390 os_free(sess->last_from_addr);
9e7245bd 391 radius_msg_free(sess->last_reply);
6fc6879b
JM
392 os_free(sess);
393 data->num_sess--;
394}
395
396
6fc6879b
JM
397static void radius_server_session_remove(struct radius_server_data *data,
398 struct radius_session *sess)
399{
400 struct radius_client *client = sess->client;
401 struct radius_session *session, *prev;
402
403 eloop_cancel_timeout(radius_server_session_remove_timeout, data, sess);
404
405 prev = NULL;
406 session = client->sessions;
407 while (session) {
408 if (session == sess) {
409 if (prev == NULL) {
410 client->sessions = sess->next;
411 } else {
412 prev->next = sess->next;
413 }
414 radius_server_session_free(data, sess);
415 break;
416 }
417 prev = session;
418 session = session->next;
419 }
420}
421
422
423static void radius_server_session_remove_timeout(void *eloop_ctx,
424 void *timeout_ctx)
425{
426 struct radius_server_data *data = eloop_ctx;
427 struct radius_session *sess = timeout_ctx;
428 RADIUS_DEBUG("Removing completed session 0x%x", sess->sess_id);
429 radius_server_session_remove(data, sess);
430}
431
432
433static void radius_server_session_timeout(void *eloop_ctx, void *timeout_ctx)
434{
435 struct radius_server_data *data = eloop_ctx;
436 struct radius_session *sess = timeout_ctx;
437
438 RADIUS_DEBUG("Timing out authentication session 0x%x", sess->sess_id);
439 radius_server_session_remove(data, sess);
440}
441
442
443static struct radius_session *
444radius_server_new_session(struct radius_server_data *data,
445 struct radius_client *client)
446{
447 struct radius_session *sess;
448
449 if (data->num_sess >= RADIUS_MAX_SESSION) {
450 RADIUS_DEBUG("Maximum number of existing session - no room "
451 "for a new session");
452 return NULL;
453 }
454
455 sess = os_zalloc(sizeof(*sess));
456 if (sess == NULL)
457 return NULL;
458
459 sess->server = data;
460 sess->client = client;
461 sess->sess_id = data->next_sess_id++;
462 sess->next = client->sessions;
463 client->sessions = sess;
464 eloop_register_timeout(RADIUS_SESSION_TIMEOUT, 0,
465 radius_server_session_timeout, data, sess);
466 data->num_sess++;
467 return sess;
468}
469
470
471static struct radius_session *
472radius_server_get_new_session(struct radius_server_data *data,
473 struct radius_client *client,
474 struct radius_msg *msg)
475{
476 u8 *user;
477 size_t user_len;
478 int res;
479 struct radius_session *sess;
480 struct eap_config eap_conf;
481
482 RADIUS_DEBUG("Creating a new session");
483
484 user = os_malloc(256);
485 if (user == NULL) {
486 return NULL;
487 }
488 res = radius_msg_get_attr(msg, RADIUS_ATTR_USER_NAME, user, 256);
489 if (res < 0 || res > 256) {
490 RADIUS_DEBUG("Could not get User-Name");
491 os_free(user);
492 return NULL;
493 }
494 user_len = res;
495 RADIUS_DUMP_ASCII("User-Name", user, user_len);
496
497 res = data->get_eap_user(data->conf_ctx, user, user_len, 0, NULL);
498 os_free(user);
499
500 if (res == 0) {
501 RADIUS_DEBUG("Matching user entry found");
502 sess = radius_server_new_session(data, client);
503 if (sess == NULL) {
504 RADIUS_DEBUG("Failed to create a new session");
505 return NULL;
506 }
507 } else {
508 RADIUS_DEBUG("User-Name not found from user database");
509 return NULL;
510 }
511
512 os_memset(&eap_conf, 0, sizeof(eap_conf));
513 eap_conf.ssl_ctx = data->ssl_ctx;
bb437f28 514 eap_conf.msg_ctx = data->msg_ctx;
6fc6879b
JM
515 eap_conf.eap_sim_db_priv = data->eap_sim_db_priv;
516 eap_conf.backend_auth = TRUE;
517 eap_conf.eap_server = 1;
518 eap_conf.pac_opaque_encr_key = data->pac_opaque_encr_key;
519 eap_conf.eap_fast_a_id = data->eap_fast_a_id;
2d867244
JM
520 eap_conf.eap_fast_a_id_len = data->eap_fast_a_id_len;
521 eap_conf.eap_fast_a_id_info = data->eap_fast_a_id_info;
378eae5e 522 eap_conf.eap_fast_prov = data->eap_fast_prov;
a11c90a6
JM
523 eap_conf.pac_key_lifetime = data->pac_key_lifetime;
524 eap_conf.pac_key_refresh_time = data->pac_key_refresh_time;
6fc6879b 525 eap_conf.eap_sim_aka_result_ind = data->eap_sim_aka_result_ind;
c3e258ae 526 eap_conf.tnc = data->tnc;
ad08c363 527 eap_conf.wps = data->wps;
df684d82 528 eap_conf.pwd_group = data->pwd_group;
67fe933d
JM
529 eap_conf.server_id = (const u8 *) data->server_id;
530 eap_conf.server_id_len = os_strlen(data->server_id);
6fc6879b
JM
531 sess->eap = eap_server_sm_init(sess, &radius_server_eapol_cb,
532 &eap_conf);
533 if (sess->eap == NULL) {
534 RADIUS_DEBUG("Failed to initialize EAP state machine for the "
535 "new session");
536 radius_server_session_free(data, sess);
537 return NULL;
538 }
539 sess->eap_if = eap_get_interface(sess->eap);
540 sess->eap_if->eapRestart = TRUE;
541 sess->eap_if->portEnabled = TRUE;
542
543 RADIUS_DEBUG("New session 0x%x initialized", sess->sess_id);
544
545 return sess;
546}
547
548
549static struct radius_msg *
550radius_server_encapsulate_eap(struct radius_server_data *data,
551 struct radius_client *client,
552 struct radius_session *sess,
553 struct radius_msg *request)
554{
555 struct radius_msg *msg;
556 int code;
557 unsigned int sess_id;
1489e11a 558 struct radius_hdr *hdr = radius_msg_get_hdr(request);
6fc6879b
JM
559
560 if (sess->eap_if->eapFail) {
561 sess->eap_if->eapFail = FALSE;
562 code = RADIUS_CODE_ACCESS_REJECT;
563 } else if (sess->eap_if->eapSuccess) {
564 sess->eap_if->eapSuccess = FALSE;
565 code = RADIUS_CODE_ACCESS_ACCEPT;
566 } else {
567 sess->eap_if->eapReq = FALSE;
568 code = RADIUS_CODE_ACCESS_CHALLENGE;
569 }
570
1489e11a 571 msg = radius_msg_new(code, hdr->identifier);
6fc6879b
JM
572 if (msg == NULL) {
573 RADIUS_DEBUG("Failed to allocate reply message");
574 return NULL;
575 }
576
577 sess_id = htonl(sess->sess_id);
578 if (code == RADIUS_CODE_ACCESS_CHALLENGE &&
579 !radius_msg_add_attr(msg, RADIUS_ATTR_STATE,
580 (u8 *) &sess_id, sizeof(sess_id))) {
581 RADIUS_DEBUG("Failed to add State attribute");
582 }
583
584 if (sess->eap_if->eapReqData &&
585 !radius_msg_add_eap(msg, wpabuf_head(sess->eap_if->eapReqData),
586 wpabuf_len(sess->eap_if->eapReqData))) {
587 RADIUS_DEBUG("Failed to add EAP-Message attribute");
588 }
589
590 if (code == RADIUS_CODE_ACCESS_ACCEPT && sess->eap_if->eapKeyData) {
591 int len;
505a3694
JM
592#ifdef CONFIG_RADIUS_TEST
593 if (data->dump_msk_file) {
594 FILE *f;
595 char buf[2 * 64 + 1];
596 f = fopen(data->dump_msk_file, "a");
597 if (f) {
598 len = sess->eap_if->eapKeyDataLen;
599 if (len > 64)
600 len = 64;
601 len = wpa_snprintf_hex(
602 buf, sizeof(buf),
603 sess->eap_if->eapKeyData, len);
604 buf[len] = '\0';
605 fprintf(f, "%s\n", buf);
606 fclose(f);
607 }
608 }
609#endif /* CONFIG_RADIUS_TEST */
6fc6879b
JM
610 if (sess->eap_if->eapKeyDataLen > 64) {
611 len = 32;
612 } else {
613 len = sess->eap_if->eapKeyDataLen / 2;
614 }
1489e11a 615 if (!radius_msg_add_mppe_keys(msg, hdr->authenticator,
6fc6879b
JM
616 (u8 *) client->shared_secret,
617 client->shared_secret_len,
618 sess->eap_if->eapKeyData + len,
619 len, sess->eap_if->eapKeyData,
620 len)) {
621 RADIUS_DEBUG("Failed to add MPPE key attributes");
622 }
623 }
624
625 if (radius_msg_copy_attr(msg, request, RADIUS_ATTR_PROXY_STATE) < 0) {
626 RADIUS_DEBUG("Failed to copy Proxy-State attribute(s)");
627 radius_msg_free(msg);
6fc6879b
JM
628 return NULL;
629 }
630
631 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret,
632 client->shared_secret_len,
1489e11a 633 hdr->authenticator) < 0) {
6fc6879b
JM
634 RADIUS_DEBUG("Failed to add Message-Authenticator attribute");
635 }
636
637 return msg;
638}
639
640
641static int radius_server_reject(struct radius_server_data *data,
642 struct radius_client *client,
643 struct radius_msg *request,
644 struct sockaddr *from, socklen_t fromlen,
645 const char *from_addr, int from_port)
646{
647 struct radius_msg *msg;
648 int ret = 0;
649 struct eap_hdr eapfail;
1489e11a
JM
650 struct wpabuf *buf;
651 struct radius_hdr *hdr = radius_msg_get_hdr(request);
6fc6879b
JM
652
653 RADIUS_DEBUG("Reject invalid request from %s:%d",
654 from_addr, from_port);
655
1489e11a 656 msg = radius_msg_new(RADIUS_CODE_ACCESS_REJECT, hdr->identifier);
6fc6879b
JM
657 if (msg == NULL) {
658 return -1;
659 }
660
661 os_memset(&eapfail, 0, sizeof(eapfail));
662 eapfail.code = EAP_CODE_FAILURE;
663 eapfail.identifier = 0;
664 eapfail.length = host_to_be16(sizeof(eapfail));
665
666 if (!radius_msg_add_eap(msg, (u8 *) &eapfail, sizeof(eapfail))) {
667 RADIUS_DEBUG("Failed to add EAP-Message attribute");
668 }
669
670 if (radius_msg_copy_attr(msg, request, RADIUS_ATTR_PROXY_STATE) < 0) {
671 RADIUS_DEBUG("Failed to copy Proxy-State attribute(s)");
672 radius_msg_free(msg);
6fc6879b
JM
673 return -1;
674 }
675
676 if (radius_msg_finish_srv(msg, (u8 *) client->shared_secret,
677 client->shared_secret_len,
1489e11a
JM
678 hdr->authenticator) <
679 0) {
6fc6879b
JM
680 RADIUS_DEBUG("Failed to add Message-Authenticator attribute");
681 }
682
683 if (wpa_debug_level <= MSG_MSGDUMP) {
684 radius_msg_dump(msg);
685 }
686
687 data->counters.access_rejects++;
688 client->counters.access_rejects++;
1489e11a
JM
689 buf = radius_msg_get_buf(msg);
690 if (sendto(data->auth_sock, wpabuf_head(buf), wpabuf_len(buf), 0,
6fc6879b 691 (struct sockaddr *) from, sizeof(*from)) < 0) {
61323e70 692 wpa_printf(MSG_INFO, "sendto[RADIUS SRV]: %s", strerror(errno));
6fc6879b
JM
693 ret = -1;
694 }
695
696 radius_msg_free(msg);
6fc6879b
JM
697
698 return ret;
699}
700
701
702static int radius_server_request(struct radius_server_data *data,
703 struct radius_msg *msg,
704 struct sockaddr *from, socklen_t fromlen,
705 struct radius_client *client,
706 const char *from_addr, int from_port,
707 struct radius_session *force_sess)
708{
e100828b 709 struct wpabuf *eap = NULL;
6fc6879b
JM
710 int res, state_included = 0;
711 u8 statebuf[4];
712 unsigned int state;
713 struct radius_session *sess;
714 struct radius_msg *reply;
7598210b 715 int is_complete = 0;
6fc6879b
JM
716
717 if (force_sess)
718 sess = force_sess;
719 else {
720 res = radius_msg_get_attr(msg, RADIUS_ATTR_STATE, statebuf,
721 sizeof(statebuf));
722 state_included = res >= 0;
723 if (res == sizeof(statebuf)) {
724 state = WPA_GET_BE32(statebuf);
725 sess = radius_server_get_session(client, state);
726 } else {
727 sess = NULL;
728 }
729 }
730
731 if (sess) {
732 RADIUS_DEBUG("Request for session 0x%x", sess->sess_id);
733 } else if (state_included) {
734 RADIUS_DEBUG("State attribute included but no session found");
735 radius_server_reject(data, client, msg, from, fromlen,
736 from_addr, from_port);
737 return -1;
738 } else {
739 sess = radius_server_get_new_session(data, client, msg);
740 if (sess == NULL) {
741 RADIUS_DEBUG("Could not create a new session");
742 radius_server_reject(data, client, msg, from, fromlen,
743 from_addr, from_port);
744 return -1;
745 }
746 }
747
748 if (sess->last_from_port == from_port &&
1489e11a
JM
749 sess->last_identifier == radius_msg_get_hdr(msg)->identifier &&
750 os_memcmp(sess->last_authenticator,
751 radius_msg_get_hdr(msg)->authenticator, 16) == 0) {
6fc6879b
JM
752 RADIUS_DEBUG("Duplicate message from %s", from_addr);
753 data->counters.dup_access_requests++;
754 client->counters.dup_access_requests++;
755
756 if (sess->last_reply) {
1489e11a
JM
757 struct wpabuf *buf;
758 buf = radius_msg_get_buf(sess->last_reply);
759 res = sendto(data->auth_sock, wpabuf_head(buf),
760 wpabuf_len(buf), 0,
6fc6879b
JM
761 (struct sockaddr *) from, fromlen);
762 if (res < 0) {
61323e70
JM
763 wpa_printf(MSG_INFO, "sendto[RADIUS SRV]: %s",
764 strerror(errno));
6fc6879b
JM
765 }
766 return 0;
767 }
768
769 RADIUS_DEBUG("No previous reply available for duplicate "
770 "message");
771 return -1;
772 }
773
e100828b 774 eap = radius_msg_get_eap(msg);
6fc6879b
JM
775 if (eap == NULL) {
776 RADIUS_DEBUG("No EAP-Message in RADIUS packet from %s",
777 from_addr);
778 data->counters.packets_dropped++;
779 client->counters.packets_dropped++;
780 return -1;
781 }
782
e100828b 783 RADIUS_DUMP("Received EAP data", wpabuf_head(eap), wpabuf_len(eap));
6fc6879b
JM
784
785 /* FIX: if Code is Request, Success, or Failure, send Access-Reject;
786 * RFC3579 Sect. 2.6.2.
787 * Include EAP-Response/Nak with no preferred method if
788 * code == request.
789 * If code is not 1-4, discard the packet silently.
790 * Or is this already done by the EAP state machine? */
791
792 wpabuf_free(sess->eap_if->eapRespData);
e100828b 793 sess->eap_if->eapRespData = eap;
6fc6879b
JM
794 sess->eap_if->eapResp = TRUE;
795 eap_server_sm_step(sess->eap);
796
797 if ((sess->eap_if->eapReq || sess->eap_if->eapSuccess ||
798 sess->eap_if->eapFail) && sess->eap_if->eapReqData) {
799 RADIUS_DUMP("EAP data from the state machine",
800 wpabuf_head(sess->eap_if->eapReqData),
801 wpabuf_len(sess->eap_if->eapReqData));
802 } else if (sess->eap_if->eapFail) {
803 RADIUS_DEBUG("No EAP data from the state machine, but eapFail "
804 "set");
805 } else if (eap_sm_method_pending(sess->eap)) {
9e7245bd 806 radius_msg_free(sess->last_msg);
6fc6879b
JM
807 sess->last_msg = msg;
808 sess->last_from_port = from_port;
809 os_free(sess->last_from_addr);
810 sess->last_from_addr = os_strdup(from_addr);
811 sess->last_fromlen = fromlen;
812 os_memcpy(&sess->last_from, from, fromlen);
813 return -2;
814 } else {
815 RADIUS_DEBUG("No EAP data from the state machine - ignore this"
816 " Access-Request silently (assuming it was a "
817 "duplicate)");
818 data->counters.packets_dropped++;
819 client->counters.packets_dropped++;
820 return -1;
821 }
822
7598210b
AB
823 if (sess->eap_if->eapSuccess || sess->eap_if->eapFail)
824 is_complete = 1;
825
6fc6879b
JM
826 reply = radius_server_encapsulate_eap(data, client, sess, msg);
827
828 if (reply) {
1489e11a
JM
829 struct wpabuf *buf;
830 struct radius_hdr *hdr;
831
6fc6879b
JM
832 RADIUS_DEBUG("Reply to %s:%d", from_addr, from_port);
833 if (wpa_debug_level <= MSG_MSGDUMP) {
834 radius_msg_dump(reply);
835 }
836
1489e11a 837 switch (radius_msg_get_hdr(reply)->code) {
6fc6879b
JM
838 case RADIUS_CODE_ACCESS_ACCEPT:
839 data->counters.access_accepts++;
840 client->counters.access_accepts++;
841 break;
842 case RADIUS_CODE_ACCESS_REJECT:
843 data->counters.access_rejects++;
844 client->counters.access_rejects++;
845 break;
846 case RADIUS_CODE_ACCESS_CHALLENGE:
847 data->counters.access_challenges++;
848 client->counters.access_challenges++;
849 break;
850 }
1489e11a
JM
851 buf = radius_msg_get_buf(reply);
852 res = sendto(data->auth_sock, wpabuf_head(buf),
853 wpabuf_len(buf), 0,
6fc6879b
JM
854 (struct sockaddr *) from, fromlen);
855 if (res < 0) {
61323e70
JM
856 wpa_printf(MSG_INFO, "sendto[RADIUS SRV]: %s",
857 strerror(errno));
6fc6879b 858 }
9e7245bd 859 radius_msg_free(sess->last_reply);
6fc6879b
JM
860 sess->last_reply = reply;
861 sess->last_from_port = from_port;
1489e11a
JM
862 hdr = radius_msg_get_hdr(msg);
863 sess->last_identifier = hdr->identifier;
864 os_memcpy(sess->last_authenticator, hdr->authenticator, 16);
6fc6879b
JM
865 } else {
866 data->counters.packets_dropped++;
867 client->counters.packets_dropped++;
868 }
869
7598210b 870 if (is_complete) {
6fc6879b
JM
871 RADIUS_DEBUG("Removing completed session 0x%x after timeout",
872 sess->sess_id);
873 eloop_cancel_timeout(radius_server_session_remove_timeout,
874 data, sess);
875 eloop_register_timeout(10, 0,
876 radius_server_session_remove_timeout,
877 data, sess);
878 }
879
880 return 0;
881}
882
883
884static void radius_server_receive_auth(int sock, void *eloop_ctx,
885 void *sock_ctx)
886{
887 struct radius_server_data *data = eloop_ctx;
888 u8 *buf = NULL;
5a641ae0
JM
889 union {
890 struct sockaddr_storage ss;
891 struct sockaddr_in sin;
892#ifdef CONFIG_IPV6
893 struct sockaddr_in6 sin6;
894#endif /* CONFIG_IPV6 */
895 } from;
6fc6879b
JM
896 socklen_t fromlen;
897 int len;
898 struct radius_client *client = NULL;
899 struct radius_msg *msg = NULL;
900 char abuf[50];
901 int from_port = 0;
902
903 buf = os_malloc(RADIUS_MAX_MSG_LEN);
904 if (buf == NULL) {
905 goto fail;
906 }
907
908 fromlen = sizeof(from);
909 len = recvfrom(sock, buf, RADIUS_MAX_MSG_LEN, 0,
5a641ae0 910 (struct sockaddr *) &from.ss, &fromlen);
6fc6879b 911 if (len < 0) {
61323e70
JM
912 wpa_printf(MSG_INFO, "recvfrom[radius_server]: %s",
913 strerror(errno));
6fc6879b
JM
914 goto fail;
915 }
916
917#ifdef CONFIG_IPV6
918 if (data->ipv6) {
5a641ae0
JM
919 if (inet_ntop(AF_INET6, &from.sin6.sin6_addr, abuf,
920 sizeof(abuf)) == NULL)
6fc6879b 921 abuf[0] = '\0';
5a641ae0 922 from_port = ntohs(from.sin6.sin6_port);
6fc6879b
JM
923 RADIUS_DEBUG("Received %d bytes from %s:%d",
924 len, abuf, from_port);
925
926 client = radius_server_get_client(data,
927 (struct in_addr *)
5a641ae0 928 &from.sin6.sin6_addr, 1);
6fc6879b
JM
929 }
930#endif /* CONFIG_IPV6 */
931
932 if (!data->ipv6) {
5a641ae0
JM
933 os_strlcpy(abuf, inet_ntoa(from.sin.sin_addr), sizeof(abuf));
934 from_port = ntohs(from.sin.sin_port);
6fc6879b
JM
935 RADIUS_DEBUG("Received %d bytes from %s:%d",
936 len, abuf, from_port);
937
5a641ae0 938 client = radius_server_get_client(data, &from.sin.sin_addr, 0);
6fc6879b
JM
939 }
940
941 RADIUS_DUMP("Received data", buf, len);
942
943 if (client == NULL) {
944 RADIUS_DEBUG("Unknown client %s - packet ignored", abuf);
945 data->counters.invalid_requests++;
946 goto fail;
947 }
948
949 msg = radius_msg_parse(buf, len);
950 if (msg == NULL) {
951 RADIUS_DEBUG("Parsing incoming RADIUS frame failed");
952 data->counters.malformed_access_requests++;
953 client->counters.malformed_access_requests++;
954 goto fail;
955 }
956
957 os_free(buf);
958 buf = NULL;
959
960 if (wpa_debug_level <= MSG_MSGDUMP) {
961 radius_msg_dump(msg);
962 }
963
1489e11a
JM
964 if (radius_msg_get_hdr(msg)->code != RADIUS_CODE_ACCESS_REQUEST) {
965 RADIUS_DEBUG("Unexpected RADIUS code %d",
966 radius_msg_get_hdr(msg)->code);
6fc6879b
JM
967 data->counters.unknown_types++;
968 client->counters.unknown_types++;
969 goto fail;
970 }
971
972 data->counters.access_requests++;
973 client->counters.access_requests++;
974
975 if (radius_msg_verify_msg_auth(msg, (u8 *) client->shared_secret,
976 client->shared_secret_len, NULL)) {
977 RADIUS_DEBUG("Invalid Message-Authenticator from %s", abuf);
978 data->counters.bad_authenticators++;
979 client->counters.bad_authenticators++;
980 goto fail;
981 }
982
983 if (radius_server_request(data, msg, (struct sockaddr *) &from,
984 fromlen, client, abuf, from_port, NULL) ==
985 -2)
986 return; /* msg was stored with the session */
987
988fail:
9e7245bd 989 radius_msg_free(msg);
6fc6879b
JM
990 os_free(buf);
991}
992
993
a1dd890a
JM
994static void radius_server_receive_acct(int sock, void *eloop_ctx,
995 void *sock_ctx)
996{
997 struct radius_server_data *data = eloop_ctx;
998 u8 *buf = NULL;
999 union {
1000 struct sockaddr_storage ss;
1001 struct sockaddr_in sin;
1002#ifdef CONFIG_IPV6
1003 struct sockaddr_in6 sin6;
1004#endif /* CONFIG_IPV6 */
1005 } from;
1006 socklen_t fromlen;
1007 int len, res;
1008 struct radius_client *client = NULL;
1009 struct radius_msg *msg = NULL, *resp = NULL;
1010 char abuf[50];
1011 int from_port = 0;
1012 struct radius_hdr *hdr;
1013 struct wpabuf *rbuf;
1014
1015 buf = os_malloc(RADIUS_MAX_MSG_LEN);
1016 if (buf == NULL) {
1017 goto fail;
1018 }
1019
1020 fromlen = sizeof(from);
1021 len = recvfrom(sock, buf, RADIUS_MAX_MSG_LEN, 0,
1022 (struct sockaddr *) &from.ss, &fromlen);
1023 if (len < 0) {
1024 wpa_printf(MSG_INFO, "recvfrom[radius_server]: %s",
1025 strerror(errno));
1026 goto fail;
1027 }
1028
1029#ifdef CONFIG_IPV6
1030 if (data->ipv6) {
1031 if (inet_ntop(AF_INET6, &from.sin6.sin6_addr, abuf,
1032 sizeof(abuf)) == NULL)
1033 abuf[0] = '\0';
1034 from_port = ntohs(from.sin6.sin6_port);
1035 RADIUS_DEBUG("Received %d bytes from %s:%d",
1036 len, abuf, from_port);
1037
1038 client = radius_server_get_client(data,
1039 (struct in_addr *)
1040 &from.sin6.sin6_addr, 1);
1041 }
1042#endif /* CONFIG_IPV6 */
1043
1044 if (!data->ipv6) {
1045 os_strlcpy(abuf, inet_ntoa(from.sin.sin_addr), sizeof(abuf));
1046 from_port = ntohs(from.sin.sin_port);
1047 RADIUS_DEBUG("Received %d bytes from %s:%d",
1048 len, abuf, from_port);
1049
1050 client = radius_server_get_client(data, &from.sin.sin_addr, 0);
1051 }
1052
1053 RADIUS_DUMP("Received data", buf, len);
1054
1055 if (client == NULL) {
1056 RADIUS_DEBUG("Unknown client %s - packet ignored", abuf);
1057 data->counters.invalid_acct_requests++;
1058 goto fail;
1059 }
1060
1061 msg = radius_msg_parse(buf, len);
1062 if (msg == NULL) {
1063 RADIUS_DEBUG("Parsing incoming RADIUS frame failed");
1064 data->counters.malformed_acct_requests++;
1065 client->counters.malformed_acct_requests++;
1066 goto fail;
1067 }
1068
1069 os_free(buf);
1070 buf = NULL;
1071
1072 if (wpa_debug_level <= MSG_MSGDUMP) {
1073 radius_msg_dump(msg);
1074 }
1075
1076 if (radius_msg_get_hdr(msg)->code != RADIUS_CODE_ACCOUNTING_REQUEST) {
1077 RADIUS_DEBUG("Unexpected RADIUS code %d",
1078 radius_msg_get_hdr(msg)->code);
1079 data->counters.unknown_acct_types++;
1080 client->counters.unknown_acct_types++;
1081 goto fail;
1082 }
1083
1084 data->counters.acct_requests++;
1085 client->counters.acct_requests++;
1086
1087 if (radius_msg_verify_acct_req(msg, (u8 *) client->shared_secret,
1088 client->shared_secret_len)) {
1089 RADIUS_DEBUG("Invalid Authenticator from %s", abuf);
1090 data->counters.acct_bad_authenticators++;
1091 client->counters.acct_bad_authenticators++;
1092 goto fail;
1093 }
1094
1095 /* TODO: Write accounting information to a file or database */
1096
1097 hdr = radius_msg_get_hdr(msg);
1098
1099 resp = radius_msg_new(RADIUS_CODE_ACCOUNTING_RESPONSE, hdr->identifier);
1100 if (resp == NULL)
1101 goto fail;
1102
1103 radius_msg_finish_acct_resp(resp, (u8 *) client->shared_secret,
1104 client->shared_secret_len,
1105 hdr->authenticator);
1106
1107 RADIUS_DEBUG("Reply to %s:%d", abuf, from_port);
1108 if (wpa_debug_level <= MSG_MSGDUMP) {
1109 radius_msg_dump(resp);
1110 }
1111 rbuf = radius_msg_get_buf(resp);
1112 data->counters.acct_responses++;
1113 client->counters.acct_responses++;
1114 res = sendto(data->acct_sock, wpabuf_head(rbuf), wpabuf_len(rbuf), 0,
1115 (struct sockaddr *) &from.ss, fromlen);
1116 if (res < 0) {
1117 wpa_printf(MSG_INFO, "sendto[RADIUS SRV]: %s",
1118 strerror(errno));
1119 }
1120
1121fail:
1122 radius_msg_free(resp);
1123 radius_msg_free(msg);
1124 os_free(buf);
1125}
1126
1127
5cd89c26
JM
1128static int radius_server_disable_pmtu_discovery(int s)
1129{
1130 int r = -1;
1131#if defined(IP_MTU_DISCOVER) && defined(IP_PMTUDISC_DONT)
1132 /* Turn off Path MTU discovery on IPv4/UDP sockets. */
1133 int action = IP_PMTUDISC_DONT;
1134 r = setsockopt(s, IPPROTO_IP, IP_MTU_DISCOVER, &action,
1135 sizeof(action));
1136 if (r == -1)
1137 wpa_printf(MSG_ERROR, "Failed to set IP_MTU_DISCOVER: "
1138 "%s", strerror(errno));
1139#endif
1140 return r;
1141}
1142
1143
6fc6879b
JM
1144static int radius_server_open_socket(int port)
1145{
1146 int s;
1147 struct sockaddr_in addr;
1148
1149 s = socket(PF_INET, SOCK_DGRAM, 0);
1150 if (s < 0) {
61323e70 1151 wpa_printf(MSG_INFO, "RADIUS: socket: %s", strerror(errno));
6fc6879b
JM
1152 return -1;
1153 }
1154
5cd89c26
JM
1155 radius_server_disable_pmtu_discovery(s);
1156
6fc6879b
JM
1157 os_memset(&addr, 0, sizeof(addr));
1158 addr.sin_family = AF_INET;
1159 addr.sin_port = htons(port);
1160 if (bind(s, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
61323e70 1161 wpa_printf(MSG_INFO, "RADIUS: bind: %s", strerror(errno));
6fc6879b
JM
1162 close(s);
1163 return -1;
1164 }
1165
1166 return s;
1167}
1168
1169
1170#ifdef CONFIG_IPV6
1171static int radius_server_open_socket6(int port)
1172{
1173 int s;
1174 struct sockaddr_in6 addr;
1175
1176 s = socket(PF_INET6, SOCK_DGRAM, 0);
1177 if (s < 0) {
61323e70
JM
1178 wpa_printf(MSG_INFO, "RADIUS: socket[IPv6]: %s",
1179 strerror(errno));
6fc6879b
JM
1180 return -1;
1181 }
1182
1183 os_memset(&addr, 0, sizeof(addr));
1184 addr.sin6_family = AF_INET6;
1185 os_memcpy(&addr.sin6_addr, &in6addr_any, sizeof(in6addr_any));
1186 addr.sin6_port = htons(port);
1187 if (bind(s, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
61323e70 1188 wpa_printf(MSG_INFO, "RADIUS: bind: %s", strerror(errno));
6fc6879b
JM
1189 close(s);
1190 return -1;
1191 }
1192
1193 return s;
1194}
1195#endif /* CONFIG_IPV6 */
1196
1197
1198static void radius_server_free_sessions(struct radius_server_data *data,
1199 struct radius_session *sessions)
1200{
1201 struct radius_session *session, *prev;
1202
1203 session = sessions;
1204 while (session) {
1205 prev = session;
1206 session = session->next;
1207 radius_server_session_free(data, prev);
1208 }
1209}
1210
1211
1212static void radius_server_free_clients(struct radius_server_data *data,
1213 struct radius_client *clients)
1214{
1215 struct radius_client *client, *prev;
1216
1217 client = clients;
1218 while (client) {
1219 prev = client;
1220 client = client->next;
1221
1222 radius_server_free_sessions(data, prev->sessions);
1223 os_free(prev->shared_secret);
1224 os_free(prev);
1225 }
1226}
1227
1228
1229static struct radius_client *
1230radius_server_read_clients(const char *client_file, int ipv6)
1231{
1232 FILE *f;
1233 const int buf_size = 1024;
1234 char *buf, *pos;
1235 struct radius_client *clients, *tail, *entry;
1236 int line = 0, mask, failed = 0, i;
1237 struct in_addr addr;
1238#ifdef CONFIG_IPV6
1239 struct in6_addr addr6;
1240#endif /* CONFIG_IPV6 */
1241 unsigned int val;
1242
1243 f = fopen(client_file, "r");
1244 if (f == NULL) {
1245 RADIUS_ERROR("Could not open client file '%s'", client_file);
1246 return NULL;
1247 }
1248
1249 buf = os_malloc(buf_size);
1250 if (buf == NULL) {
1251 fclose(f);
1252 return NULL;
1253 }
1254
1255 clients = tail = NULL;
1256 while (fgets(buf, buf_size, f)) {
1257 /* Configuration file format:
1258 * 192.168.1.0/24 secret
1259 * 192.168.1.2 secret
1260 * fe80::211:22ff:fe33:4455/64 secretipv6
1261 */
1262 line++;
1263 buf[buf_size - 1] = '\0';
1264 pos = buf;
1265 while (*pos != '\0' && *pos != '\n')
1266 pos++;
1267 if (*pos == '\n')
1268 *pos = '\0';
1269 if (*buf == '\0' || *buf == '#')
1270 continue;
1271
1272 pos = buf;
1273 while ((*pos >= '0' && *pos <= '9') || *pos == '.' ||
1274 (*pos >= 'a' && *pos <= 'f') || *pos == ':' ||
1275 (*pos >= 'A' && *pos <= 'F')) {
1276 pos++;
1277 }
1278
1279 if (*pos == '\0') {
1280 failed = 1;
1281 break;
1282 }
1283
1284 if (*pos == '/') {
1285 char *end;
1286 *pos++ = '\0';
1287 mask = strtol(pos, &end, 10);
1288 if ((pos == end) ||
1289 (mask < 0 || mask > (ipv6 ? 128 : 32))) {
1290 failed = 1;
1291 break;
1292 }
1293 pos = end;
1294 } else {
1295 mask = ipv6 ? 128 : 32;
1296 *pos++ = '\0';
1297 }
1298
1299 if (!ipv6 && inet_aton(buf, &addr) == 0) {
1300 failed = 1;
1301 break;
1302 }
1303#ifdef CONFIG_IPV6
1304 if (ipv6 && inet_pton(AF_INET6, buf, &addr6) <= 0) {
1305 if (inet_pton(AF_INET, buf, &addr) <= 0) {
1306 failed = 1;
1307 break;
1308 }
1309 /* Convert IPv4 address to IPv6 */
1310 if (mask <= 32)
1311 mask += (128 - 32);
1312 os_memset(addr6.s6_addr, 0, 10);
1313 addr6.s6_addr[10] = 0xff;
1314 addr6.s6_addr[11] = 0xff;
1315 os_memcpy(addr6.s6_addr + 12, (char *) &addr.s_addr,
1316 4);
1317 }
1318#endif /* CONFIG_IPV6 */
1319
1320 while (*pos == ' ' || *pos == '\t') {
1321 pos++;
1322 }
1323
1324 if (*pos == '\0') {
1325 failed = 1;
1326 break;
1327 }
1328
1329 entry = os_zalloc(sizeof(*entry));
1330 if (entry == NULL) {
1331 failed = 1;
1332 break;
1333 }
1334 entry->shared_secret = os_strdup(pos);
1335 if (entry->shared_secret == NULL) {
1336 failed = 1;
1337 os_free(entry);
1338 break;
1339 }
1340 entry->shared_secret_len = os_strlen(entry->shared_secret);
1341 entry->addr.s_addr = addr.s_addr;
1342 if (!ipv6) {
1343 val = 0;
1344 for (i = 0; i < mask; i++)
1345 val |= 1 << (31 - i);
1346 entry->mask.s_addr = htonl(val);
1347 }
1348#ifdef CONFIG_IPV6
1349 if (ipv6) {
1350 int offset = mask / 8;
1351
1352 os_memcpy(entry->addr6.s6_addr, addr6.s6_addr, 16);
1353 os_memset(entry->mask6.s6_addr, 0xff, offset);
1354 val = 0;
1355 for (i = 0; i < (mask % 8); i++)
1356 val |= 1 << (7 - i);
1357 if (offset < 16)
1358 entry->mask6.s6_addr[offset] = val;
1359 }
1360#endif /* CONFIG_IPV6 */
1361
1362 if (tail == NULL) {
1363 clients = tail = entry;
1364 } else {
1365 tail->next = entry;
1366 tail = entry;
1367 }
1368 }
1369
1370 if (failed) {
1371 RADIUS_ERROR("Invalid line %d in '%s'", line, client_file);
1372 radius_server_free_clients(NULL, clients);
1373 clients = NULL;
1374 }
1375
1376 os_free(buf);
1377 fclose(f);
1378
1379 return clients;
1380}
1381
1382
362bd35f
JM
1383/**
1384 * radius_server_init - Initialize RADIUS server
1385 * @conf: Configuration for the RADIUS server
1386 * Returns: Pointer to private RADIUS server context or %NULL on failure
1387 *
1388 * This initializes a RADIUS server instance and returns a context pointer that
1389 * will be used in other calls to the RADIUS server module. The server can be
1390 * deinitialize by calling radius_server_deinit().
1391 */
6fc6879b
JM
1392struct radius_server_data *
1393radius_server_init(struct radius_server_conf *conf)
1394{
1395 struct radius_server_data *data;
1396
1397#ifndef CONFIG_IPV6
1398 if (conf->ipv6) {
61323e70 1399 wpa_printf(MSG_ERROR, "RADIUS server compiled without IPv6 support");
6fc6879b
JM
1400 return NULL;
1401 }
1402#endif /* CONFIG_IPV6 */
1403
1404 data = os_zalloc(sizeof(*data));
1405 if (data == NULL)
1406 return NULL;
1407
58707176 1408 os_get_reltime(&data->start_time);
6fc6879b
JM
1409 data->conf_ctx = conf->conf_ctx;
1410 data->eap_sim_db_priv = conf->eap_sim_db_priv;
1411 data->ssl_ctx = conf->ssl_ctx;
bb437f28 1412 data->msg_ctx = conf->msg_ctx;
6fc6879b
JM
1413 data->ipv6 = conf->ipv6;
1414 if (conf->pac_opaque_encr_key) {
1415 data->pac_opaque_encr_key = os_malloc(16);
1416 os_memcpy(data->pac_opaque_encr_key, conf->pac_opaque_encr_key,
1417 16);
1418 }
2d867244
JM
1419 if (conf->eap_fast_a_id) {
1420 data->eap_fast_a_id = os_malloc(conf->eap_fast_a_id_len);
1421 if (data->eap_fast_a_id) {
1422 os_memcpy(data->eap_fast_a_id, conf->eap_fast_a_id,
1423 conf->eap_fast_a_id_len);
1424 data->eap_fast_a_id_len = conf->eap_fast_a_id_len;
1425 }
1426 }
1427 if (conf->eap_fast_a_id_info)
1428 data->eap_fast_a_id_info = os_strdup(conf->eap_fast_a_id_info);
378eae5e 1429 data->eap_fast_prov = conf->eap_fast_prov;
a11c90a6
JM
1430 data->pac_key_lifetime = conf->pac_key_lifetime;
1431 data->pac_key_refresh_time = conf->pac_key_refresh_time;
6fc6879b
JM
1432 data->get_eap_user = conf->get_eap_user;
1433 data->eap_sim_aka_result_ind = conf->eap_sim_aka_result_ind;
c3e258ae 1434 data->tnc = conf->tnc;
ad08c363 1435 data->wps = conf->wps;
df684d82 1436 data->pwd_group = conf->pwd_group;
67fe933d 1437 data->server_id = conf->server_id;
65d50f0a
JM
1438 if (conf->eap_req_id_text) {
1439 data->eap_req_id_text = os_malloc(conf->eap_req_id_text_len);
1440 if (data->eap_req_id_text) {
1441 os_memcpy(data->eap_req_id_text, conf->eap_req_id_text,
1442 conf->eap_req_id_text_len);
1443 data->eap_req_id_text_len = conf->eap_req_id_text_len;
1444 }
1445 }
6fc6879b 1446
505a3694
JM
1447#ifdef CONFIG_RADIUS_TEST
1448 if (conf->dump_msk_file)
1449 data->dump_msk_file = os_strdup(conf->dump_msk_file);
1450#endif /* CONFIG_RADIUS_TEST */
1451
6fc6879b
JM
1452 data->clients = radius_server_read_clients(conf->client_file,
1453 conf->ipv6);
1454 if (data->clients == NULL) {
61323e70 1455 wpa_printf(MSG_ERROR, "No RADIUS clients configured");
6fc6879b
JM
1456 radius_server_deinit(data);
1457 return NULL;
1458 }
1459
1460#ifdef CONFIG_IPV6
1461 if (conf->ipv6)
1462 data->auth_sock = radius_server_open_socket6(conf->auth_port);
1463 else
1464#endif /* CONFIG_IPV6 */
1465 data->auth_sock = radius_server_open_socket(conf->auth_port);
1466 if (data->auth_sock < 0) {
61323e70 1467 wpa_printf(MSG_ERROR, "Failed to open UDP socket for RADIUS authentication server");
6fc6879b
JM
1468 radius_server_deinit(data);
1469 return NULL;
1470 }
1471 if (eloop_register_read_sock(data->auth_sock,
1472 radius_server_receive_auth,
1473 data, NULL)) {
1474 radius_server_deinit(data);
1475 return NULL;
1476 }
1477
a1dd890a
JM
1478 if (conf->acct_port) {
1479#ifdef CONFIG_IPV6
1480 if (conf->ipv6)
1481 data->acct_sock = radius_server_open_socket6(
1482 conf->acct_port);
1483 else
1484#endif /* CONFIG_IPV6 */
1485 data->acct_sock = radius_server_open_socket(conf->acct_port);
1486 if (data->acct_sock < 0) {
1487 wpa_printf(MSG_ERROR, "Failed to open UDP socket for RADIUS accounting server");
1488 radius_server_deinit(data);
1489 return NULL;
1490 }
1491 if (eloop_register_read_sock(data->acct_sock,
1492 radius_server_receive_acct,
1493 data, NULL)) {
1494 radius_server_deinit(data);
1495 return NULL;
1496 }
1497 } else {
1498 data->acct_sock = -1;
1499 }
1500
6fc6879b
JM
1501 return data;
1502}
1503
1504
362bd35f
JM
1505/**
1506 * radius_server_deinit - Deinitialize RADIUS server
1507 * @data: RADIUS server context from radius_server_init()
1508 */
6fc6879b
JM
1509void radius_server_deinit(struct radius_server_data *data)
1510{
1511 if (data == NULL)
1512 return;
1513
1514 if (data->auth_sock >= 0) {
1515 eloop_unregister_read_sock(data->auth_sock);
1516 close(data->auth_sock);
1517 }
1518
a1dd890a
JM
1519 if (data->acct_sock >= 0) {
1520 eloop_unregister_read_sock(data->acct_sock);
1521 close(data->acct_sock);
1522 }
1523
6fc6879b
JM
1524 radius_server_free_clients(data, data->clients);
1525
1526 os_free(data->pac_opaque_encr_key);
1527 os_free(data->eap_fast_a_id);
2d867244 1528 os_free(data->eap_fast_a_id_info);
65d50f0a 1529 os_free(data->eap_req_id_text);
505a3694
JM
1530#ifdef CONFIG_RADIUS_TEST
1531 os_free(data->dump_msk_file);
1532#endif /* CONFIG_RADIUS_TEST */
6fc6879b
JM
1533 os_free(data);
1534}
1535
1536
362bd35f
JM
1537/**
1538 * radius_server_get_mib - Get RADIUS server MIB information
1539 * @data: RADIUS server context from radius_server_init()
1540 * @buf: Buffer for returning the MIB data in text format
1541 * @buflen: buf length in octets
1542 * Returns: Number of octets written into buf
1543 */
6fc6879b
JM
1544int radius_server_get_mib(struct radius_server_data *data, char *buf,
1545 size_t buflen)
1546{
1547 int ret, uptime;
1548 unsigned int idx;
1549 char *end, *pos;
58707176 1550 struct os_reltime now;
6fc6879b
JM
1551 struct radius_client *cli;
1552
1553 /* RFC 2619 - RADIUS Authentication Server MIB */
1554
1555 if (data == NULL || buflen == 0)
1556 return 0;
1557
1558 pos = buf;
1559 end = buf + buflen;
1560
58707176 1561 os_get_reltime(&now);
6fc6879b
JM
1562 uptime = (now.sec - data->start_time.sec) * 100 +
1563 ((now.usec - data->start_time.usec) / 10000) % 100;
1564 ret = os_snprintf(pos, end - pos,
1565 "RADIUS-AUTH-SERVER-MIB\n"
1566 "radiusAuthServIdent=hostapd\n"
1567 "radiusAuthServUpTime=%d\n"
1568 "radiusAuthServResetTime=0\n"
1569 "radiusAuthServConfigReset=4\n",
1570 uptime);
1571 if (ret < 0 || ret >= end - pos) {
1572 *pos = '\0';
1573 return pos - buf;
1574 }
1575 pos += ret;
1576
1577 ret = os_snprintf(pos, end - pos,
1578 "radiusAuthServTotalAccessRequests=%u\n"
1579 "radiusAuthServTotalInvalidRequests=%u\n"
1580 "radiusAuthServTotalDupAccessRequests=%u\n"
1581 "radiusAuthServTotalAccessAccepts=%u\n"
1582 "radiusAuthServTotalAccessRejects=%u\n"
1583 "radiusAuthServTotalAccessChallenges=%u\n"
1584 "radiusAuthServTotalMalformedAccessRequests=%u\n"
1585 "radiusAuthServTotalBadAuthenticators=%u\n"
1586 "radiusAuthServTotalPacketsDropped=%u\n"
a1dd890a
JM
1587 "radiusAuthServTotalUnknownTypes=%u\n"
1588 "radiusAccServTotalRequests=%u\n"
1589 "radiusAccServTotalInvalidRequests=%u\n"
1590 "radiusAccServTotalResponses=%u\n"
1591 "radiusAccServTotalMalformedRequests=%u\n"
1592 "radiusAccServTotalBadAuthenticators=%u\n"
1593 "radiusAccServTotalUnknownTypes=%u\n",
6fc6879b
JM
1594 data->counters.access_requests,
1595 data->counters.invalid_requests,
1596 data->counters.dup_access_requests,
1597 data->counters.access_accepts,
1598 data->counters.access_rejects,
1599 data->counters.access_challenges,
1600 data->counters.malformed_access_requests,
1601 data->counters.bad_authenticators,
1602 data->counters.packets_dropped,
a1dd890a
JM
1603 data->counters.unknown_types,
1604 data->counters.acct_requests,
1605 data->counters.invalid_acct_requests,
1606 data->counters.acct_responses,
1607 data->counters.malformed_acct_requests,
1608 data->counters.acct_bad_authenticators,
1609 data->counters.unknown_acct_types);
6fc6879b
JM
1610 if (ret < 0 || ret >= end - pos) {
1611 *pos = '\0';
1612 return pos - buf;
1613 }
1614 pos += ret;
1615
1616 for (cli = data->clients, idx = 0; cli; cli = cli->next, idx++) {
1617 char abuf[50], mbuf[50];
1618#ifdef CONFIG_IPV6
1619 if (data->ipv6) {
1620 if (inet_ntop(AF_INET6, &cli->addr6, abuf,
1621 sizeof(abuf)) == NULL)
1622 abuf[0] = '\0';
1623 if (inet_ntop(AF_INET6, &cli->mask6, abuf,
1624 sizeof(mbuf)) == NULL)
1625 mbuf[0] = '\0';
1626 }
1627#endif /* CONFIG_IPV6 */
1628 if (!data->ipv6) {
1629 os_strlcpy(abuf, inet_ntoa(cli->addr), sizeof(abuf));
1630 os_strlcpy(mbuf, inet_ntoa(cli->mask), sizeof(mbuf));
1631 }
1632
1633 ret = os_snprintf(pos, end - pos,
1634 "radiusAuthClientIndex=%u\n"
1635 "radiusAuthClientAddress=%s/%s\n"
1636 "radiusAuthServAccessRequests=%u\n"
1637 "radiusAuthServDupAccessRequests=%u\n"
1638 "radiusAuthServAccessAccepts=%u\n"
1639 "radiusAuthServAccessRejects=%u\n"
1640 "radiusAuthServAccessChallenges=%u\n"
1641 "radiusAuthServMalformedAccessRequests=%u\n"
1642 "radiusAuthServBadAuthenticators=%u\n"
1643 "radiusAuthServPacketsDropped=%u\n"
a1dd890a
JM
1644 "radiusAuthServUnknownTypes=%u\n"
1645 "radiusAccServTotalRequests=%u\n"
1646 "radiusAccServTotalInvalidRequests=%u\n"
1647 "radiusAccServTotalResponses=%u\n"
1648 "radiusAccServTotalMalformedRequests=%u\n"
1649 "radiusAccServTotalBadAuthenticators=%u\n"
1650 "radiusAccServTotalUnknownTypes=%u\n",
6fc6879b
JM
1651 idx,
1652 abuf, mbuf,
1653 cli->counters.access_requests,
1654 cli->counters.dup_access_requests,
1655 cli->counters.access_accepts,
1656 cli->counters.access_rejects,
1657 cli->counters.access_challenges,
1658 cli->counters.malformed_access_requests,
1659 cli->counters.bad_authenticators,
1660 cli->counters.packets_dropped,
a1dd890a
JM
1661 cli->counters.unknown_types,
1662 cli->counters.acct_requests,
1663 cli->counters.invalid_acct_requests,
1664 cli->counters.acct_responses,
1665 cli->counters.malformed_acct_requests,
1666 cli->counters.acct_bad_authenticators,
1667 cli->counters.unknown_acct_types);
6fc6879b
JM
1668 if (ret < 0 || ret >= end - pos) {
1669 *pos = '\0';
1670 return pos - buf;
1671 }
1672 pos += ret;
1673 }
1674
1675 return pos - buf;
1676}
1677
1678
1679static int radius_server_get_eap_user(void *ctx, const u8 *identity,
1680 size_t identity_len, int phase2,
1681 struct eap_user *user)
1682{
1683 struct radius_session *sess = ctx;
1684 struct radius_server_data *data = sess->server;
1685
1686 return data->get_eap_user(data->conf_ctx, identity, identity_len,
1687 phase2, user);
1688}
1689
1690
65d50f0a
JM
1691static const char * radius_server_get_eap_req_id_text(void *ctx, size_t *len)
1692{
1693 struct radius_session *sess = ctx;
1694 struct radius_server_data *data = sess->server;
1695 *len = data->eap_req_id_text_len;
1696 return data->eap_req_id_text;
1697}
1698
1699
6fc6879b
JM
1700static struct eapol_callbacks radius_server_eapol_cb =
1701{
1702 .get_eap_user = radius_server_get_eap_user,
65d50f0a 1703 .get_eap_req_id_text = radius_server_get_eap_req_id_text,
6fc6879b
JM
1704};
1705
1706
362bd35f
JM
1707/**
1708 * radius_server_eap_pending_cb - Pending EAP data notification
1709 * @data: RADIUS server context from radius_server_init()
1710 * @ctx: Pending EAP context pointer
1711 *
1712 * This function is used to notify EAP server module that a pending operation
1713 * has been completed and processing of the EAP session can proceed.
1714 */
6fc6879b
JM
1715void radius_server_eap_pending_cb(struct radius_server_data *data, void *ctx)
1716{
1717 struct radius_client *cli;
1718 struct radius_session *s, *sess = NULL;
1719 struct radius_msg *msg;
1720
1721 if (data == NULL)
1722 return;
1723
1724 for (cli = data->clients; cli; cli = cli->next) {
1725 for (s = cli->sessions; s; s = s->next) {
1726 if (s->eap == ctx && s->last_msg) {
1727 sess = s;
1728 break;
1729 }
1730 if (sess)
1731 break;
1732 }
1733 if (sess)
1734 break;
1735 }
1736
1737 if (sess == NULL) {
1738 RADIUS_DEBUG("No session matched callback ctx");
1739 return;
1740 }
1741
1742 msg = sess->last_msg;
1743 sess->last_msg = NULL;
1744 eap_sm_pending_cb(sess->eap);
1745 if (radius_server_request(data, msg,
1746 (struct sockaddr *) &sess->last_from,
1747 sess->last_fromlen, cli,
1748 sess->last_from_addr,
1749 sess->last_from_port, sess) == -2)
1750 return; /* msg was stored with the session */
1751
1752 radius_msg_free(msg);
6fc6879b 1753}