]> git.ipfire.org Git - thirdparty/hostap.git/commitdiff
RADIUS DAS: Check for single session match for Disconnect-Request
authorJouni Malinen <jouni@qca.qualcomm.com>
Fri, 16 Jan 2015 10:10:52 +0000 (12:10 +0200)
committerJouni Malinen <j@w1.fi>
Fri, 16 Jan 2015 10:50:16 +0000 (12:50 +0200)
Previously, the first matching STA was picked. That is not really the
design in RFC 5176, so extend this matching code to go through all
specified session identification attributes and verify that all of them
match. In addition, check for a possible case of multiple sessions
matching. If such a case is detected, return with Disconnect-NAK and
Error-Code 508 (multiple session selection not supported).

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
src/ap/hostapd.c
src/ap/sta_info.h
src/radius/radius_das.c
src/radius/radius_das.h

index 6e4169ba9ffd8917172ea5eb6462b9e791338293..dea552c1c0cbbf90740191bb36907f33ca87e416 100644 (file)
@@ -614,51 +614,145 @@ static int hostapd_das_nas_mismatch(struct hostapd_data *hapd,
 
 
 static struct sta_info * hostapd_das_find_sta(struct hostapd_data *hapd,
-                                             struct radius_das_attrs *attr)
+                                             struct radius_das_attrs *attr,
+                                             int *multi)
 {
-       struct sta_info *sta = NULL;
+       struct sta_info *selected, *sta;
        char buf[128];
+       int num_attr = 0;
+       int count;
 
-       if (attr->sta_addr)
+       *multi = 0;
+
+       for (sta = hapd->sta_list; sta; sta = sta->next)
+               sta->radius_das_match = 1;
+
+       if (attr->sta_addr) {
+               num_attr++;
                sta = ap_get_sta(hapd, attr->sta_addr);
+               if (!sta) {
+                       wpa_printf(MSG_DEBUG,
+                                  "RADIUS DAS: No Calling-Station-Id match");
+                       return NULL;
+               }
+
+               selected = sta;
+               for (sta = hapd->sta_list; sta; sta = sta->next) {
+                       if (sta != selected)
+                               sta->radius_das_match = 0;
+               }
+               wpa_printf(MSG_DEBUG, "RADIUS DAS: Calling-Station-Id match");
+       }
+
+       if (attr->acct_session_id) {
+               num_attr++;
+               if (attr->acct_session_id_len != 17) {
+                       wpa_printf(MSG_DEBUG,
+                                  "RADIUS DAS: Acct-Session-Id cannot match");
+                       return NULL;
+               }
+               count = 0;
 
-       if (sta == NULL && attr->acct_session_id &&
-           attr->acct_session_id_len == 17) {
                for (sta = hapd->sta_list; sta; sta = sta->next) {
+                       if (!sta->radius_das_match)
+                               continue;
                        os_snprintf(buf, sizeof(buf), "%08X-%08X",
                                    sta->acct_session_id_hi,
                                    sta->acct_session_id_lo);
-                       if (os_memcmp(attr->acct_session_id, buf, 17) == 0)
-                               break;
+                       if (os_memcmp(attr->acct_session_id, buf, 17) != 0)
+                               sta->radius_das_match = 0;
+                       else
+                               count++;
                }
+
+               if (count == 0) {
+                       wpa_printf(MSG_DEBUG,
+                                  "RADIUS DAS: No matches remaining after Acct-Session-Id check");
+                       return NULL;
+               }
+               wpa_printf(MSG_DEBUG, "RADIUS DAS: Acct-Session-Id match");
        }
 
-       if (sta == NULL && attr->cui) {
+       if (attr->cui) {
+               num_attr++;
+               count = 0;
+
                for (sta = hapd->sta_list; sta; sta = sta->next) {
                        struct wpabuf *cui;
+
+                       if (!sta->radius_das_match)
+                               continue;
                        cui = ieee802_1x_get_radius_cui(sta->eapol_sm);
-                       if (cui && wpabuf_len(cui) == attr->cui_len &&
+                       if (!cui || wpabuf_len(cui) != attr->cui_len ||
                            os_memcmp(wpabuf_head(cui), attr->cui,
-                                     attr->cui_len) == 0)
-                               break;
+                                     attr->cui_len) != 0)
+                               sta->radius_das_match = 0;
+                       else
+                               count++;
+               }
+
+               if (count == 0) {
+                       wpa_printf(MSG_DEBUG,
+                                  "RADIUS DAS: No matches remaining after Chargeable-User-Identity check");
+                       return NULL;
                }
+               wpa_printf(MSG_DEBUG,
+                          "RADIUS DAS: Chargeable-User-Identity match");
        }
 
-       if (sta == NULL && attr->user_name) {
+       if (attr->user_name) {
+               num_attr++;
+               count = 0;
+
                for (sta = hapd->sta_list; sta; sta = sta->next) {
                        u8 *identity;
                        size_t identity_len;
+
+                       if (!sta->radius_das_match)
+                               continue;
                        identity = ieee802_1x_get_identity(sta->eapol_sm,
                                                           &identity_len);
-                       if (identity &&
-                           identity_len == attr->user_name_len &&
+                       if (!identity ||
+                           identity_len != attr->user_name_len ||
                            os_memcmp(identity, attr->user_name, identity_len)
-                           == 0)
-                               break;
+                           != 0)
+                               sta->radius_das_match = 0;
+                       else
+                               count++;
+               }
+
+               if (count == 0) {
+                       wpa_printf(MSG_DEBUG,
+                                  "RADIUS DAS: No matches remaining after User-Name check");
+                       return NULL;
+               }
+               wpa_printf(MSG_DEBUG,
+                          "RADIUS DAS: User-Name match");
+       }
+
+       if (num_attr == 0) {
+               /*
+                * In theory, we could match all current associations, but it
+                * seems safer to just reject requests that do not include any
+                * session identification attributes.
+                */
+               wpa_printf(MSG_DEBUG,
+                          "RADIUS DAS: No session identification attributes included");
+               return NULL;
+       }
+
+       selected = NULL;
+       for (sta = hapd->sta_list; sta; sta = sta->next) {
+               if (sta->radius_das_match) {
+                       if (selected) {
+                               *multi = 1;
+                               return NULL;
+                       }
+                       selected = sta;
                }
        }
 
-       return sta;
+       return selected;
 }
 
 
@@ -667,14 +761,24 @@ hostapd_das_disconnect(void *ctx, struct radius_das_attrs *attr)
 {
        struct hostapd_data *hapd = ctx;
        struct sta_info *sta;
+       int multi;
 
        if (hostapd_das_nas_mismatch(hapd, attr))
                return RADIUS_DAS_NAS_MISMATCH;
 
-       sta = hostapd_das_find_sta(hapd, attr);
-       if (sta == NULL)
+       sta = hostapd_das_find_sta(hapd, attr, &multi);
+       if (sta == NULL) {
+               if (multi) {
+                       wpa_printf(MSG_DEBUG,
+                                  "RADIUS DAS: Multiple sessions match - not supported");
+                       return RADIUS_DAS_MULTI_SESSION_MATCH;
+               }
+               wpa_printf(MSG_DEBUG, "RADIUS DAS: No matching session found");
                return RADIUS_DAS_SESSION_NOT_FOUND;
+       }
 
+       wpa_printf(MSG_DEBUG, "RADIUS DAS: Found a matching session " MACSTR
+                  " - disconnecting", MAC2STR(sta->addr));
        wpa_auth_pmksa_remove(hapd->wpa_auth, sta->addr);
 
        hostapd_drv_sta_deauth(hapd, sta->addr,
index 59d0e2915d5f62ceeb624934fe927ad78a75ab6f..57551ab17d5ddf3da9356ce7a9f4e4ce9a863197 100644 (file)
@@ -85,6 +85,7 @@ struct sta_info {
        unsigned int remediation:1;
        unsigned int hs20_deauth_requested:1;
        unsigned int session_timeout_set:1;
+       unsigned int radius_das_match:1;
 
        u16 auth_alg;
 
index 9655f4cead23f77e4b629e11a1246a322ac50f01..7aa703cc6130d8eadaebcad825716d2a3e0abe2f 100644 (file)
@@ -147,6 +147,12 @@ static struct radius_msg * radius_das_disconnect(struct radius_das_data *das,
                           "%s:%d", abuf, from_port);
                error = 503;
                break;
+       case RADIUS_DAS_MULTI_SESSION_MATCH:
+               wpa_printf(MSG_INFO,
+                          "DAS: Multiple sessions match for request from %s:%d",
+                          abuf, from_port);
+               error = 508;
+               break;
        case RADIUS_DAS_SUCCESS:
                error = 0;
                break;
index e3ed5408e30faecfeb7e57d30882b8b1b6f027f4..1d76c26624211ce9665cde7b7c6b459eb175133c 100644 (file)
@@ -14,7 +14,8 @@ struct radius_das_data;
 enum radius_das_res {
        RADIUS_DAS_SUCCESS,
        RADIUS_DAS_NAS_MISMATCH,
-       RADIUS_DAS_SESSION_NOT_FOUND
+       RADIUS_DAS_SESSION_NOT_FOUND,
+       RADIUS_DAS_MULTI_SESSION_MATCH,
 };
 
 struct radius_das_attrs {