1 |
|
|
/* $OpenBSD: radiusd_radius.c,v 1.13 2017/05/30 16:30:22 yasuoka Exp $ */ |
2 |
|
|
|
3 |
|
|
/* |
4 |
|
|
* Copyright (c) 2013 Internet Initiative Japan Inc. |
5 |
|
|
* |
6 |
|
|
* Permission to use, copy, modify, and distribute this software for any |
7 |
|
|
* purpose with or without fee is hereby granted, provided that the above |
8 |
|
|
* copyright notice and this permission notice appear in all copies. |
9 |
|
|
* |
10 |
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES |
11 |
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF |
12 |
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR |
13 |
|
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
14 |
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN |
15 |
|
|
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
16 |
|
|
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
17 |
|
|
*/ |
18 |
|
|
|
19 |
|
|
#include <sys/types.h> |
20 |
|
|
#include <sys/queue.h> |
21 |
|
|
#include <sys/socket.h> |
22 |
|
|
#include <netinet/in.h> |
23 |
|
|
|
24 |
|
|
#include <err.h> |
25 |
|
|
#include <errno.h> |
26 |
|
|
#include <event.h> |
27 |
|
|
#include <fcntl.h> |
28 |
|
|
#include <stdbool.h> |
29 |
|
|
#include <stdio.h> |
30 |
|
|
#include <stdlib.h> |
31 |
|
|
#include <string.h> |
32 |
|
|
#include <syslog.h> |
33 |
|
|
#include <unistd.h> |
34 |
|
|
|
35 |
|
|
#include <radius.h> |
36 |
|
|
|
37 |
|
|
#include "radiusd.h" |
38 |
|
|
#include "radiusd_module.h" |
39 |
|
|
#include "util.h" |
40 |
|
|
#include "log.h" |
41 |
|
|
|
42 |
|
|
struct radius_server { |
43 |
|
|
struct module_radius *module; |
44 |
|
|
int sock; |
45 |
|
|
union { |
46 |
|
|
struct sockaddr_in6 sin6; |
47 |
|
|
struct sockaddr_in sin4; |
48 |
|
|
} addr; |
49 |
|
|
union { |
50 |
|
|
struct sockaddr_in6 sin6; |
51 |
|
|
struct sockaddr_in sin4; |
52 |
|
|
} local; |
53 |
|
|
struct event ev; |
54 |
|
|
u_char req_id_seq; |
55 |
|
|
}; |
56 |
|
|
|
57 |
|
|
struct module_radius { |
58 |
|
|
struct module_base *base; |
59 |
|
|
struct radius_server server[4]; |
60 |
|
|
char secret[RADIUSD_SECRET_MAX]; |
61 |
|
|
u_int nserver; |
62 |
|
|
u_int curr_server; |
63 |
|
|
u_int req_timeout; |
64 |
|
|
u_int max_tries; |
65 |
|
|
u_int max_failovers; |
66 |
|
|
u_int nfailover; |
67 |
|
|
TAILQ_HEAD(,module_radius_req) req; |
68 |
|
|
}; |
69 |
|
|
|
70 |
|
|
struct module_radius_req { |
71 |
|
|
struct module_radius *module; |
72 |
|
|
struct radius_server *server; |
73 |
|
|
u_int q_id; |
74 |
|
|
RADIUS_PACKET *q_pkt; |
75 |
|
|
u_int ntry; |
76 |
|
|
u_int nfailover; |
77 |
|
|
u_char req_id; |
78 |
|
|
struct event ev; |
79 |
|
|
TAILQ_ENTRY(module_radius_req) next; |
80 |
|
|
}; |
81 |
|
|
|
82 |
|
|
static void module_radius_init(struct module_radius *); |
83 |
|
|
static void module_radius_config_set(void *, const char *, int, |
84 |
|
|
char * const *); |
85 |
|
|
static void module_radius_start(void *); |
86 |
|
|
static void module_radius_stop(void *); |
87 |
|
|
static void module_radius_access_request(void *, u_int, const u_char *, |
88 |
|
|
size_t); |
89 |
|
|
static int radius_server_start(struct radius_server *); |
90 |
|
|
static void radius_server_stop(struct radius_server *); |
91 |
|
|
static void radius_server_on_event(int, short, void *); |
92 |
|
|
static void radius_server_on_fail(struct radius_server *, const char *); |
93 |
|
|
static void module_radius_req_send(struct module_radius_req *); |
94 |
|
|
static int module_radius_req_reset_event(struct module_radius_req *); |
95 |
|
|
static void module_radius_req_on_timeout(int, short, void *); |
96 |
|
|
static void module_radius_req_on_success(struct module_radius_req *, |
97 |
|
|
const u_char *, size_t); |
98 |
|
|
static void module_radius_req_on_failure(struct module_radius_req *); |
99 |
|
|
|
100 |
|
|
static void module_radius_req_free(struct module_radius_req *); |
101 |
|
|
static void module_radius_req_select_server(struct module_radius_req *); |
102 |
|
|
|
103 |
|
|
static void module_radius_req_reset_msgauth(struct module_radius_req *); |
104 |
|
|
static void module_radius_log(struct module_radius *, int, const char *, ...); |
105 |
|
|
|
106 |
|
|
static struct module_handlers module_radius_handlers = { |
107 |
|
|
.config_set = module_radius_config_set, |
108 |
|
|
.start = module_radius_start, |
109 |
|
|
.stop = module_radius_stop, |
110 |
|
|
.access_request = module_radius_access_request |
111 |
|
|
}; |
112 |
|
|
|
113 |
|
|
#ifndef nitems |
114 |
|
|
#define nitems(_x) (sizeof((_x)) / sizeof((_x)[0])) |
115 |
|
|
#endif |
116 |
|
|
|
117 |
|
|
int |
118 |
|
|
main(int argc, char *argv[]) |
119 |
|
|
{ |
120 |
|
|
static struct module_radius module_radius; |
121 |
|
|
|
122 |
|
|
module_radius_init(&module_radius); |
123 |
|
|
openlog(NULL, LOG_PID, LOG_DAEMON); |
124 |
|
|
|
125 |
|
|
if ((module_radius.base = module_create( |
126 |
|
|
STDIN_FILENO, &module_radius, &module_radius_handlers)) == NULL) |
127 |
|
|
err(1, "Could not create a module instance"); |
128 |
|
|
module_drop_privilege(module_radius.base); |
129 |
|
|
setproctitle("[main]"); |
130 |
|
|
|
131 |
|
|
module_load(module_radius.base); |
132 |
|
|
log_init(0); |
133 |
|
|
event_init(); |
134 |
|
|
|
135 |
|
|
if (pledge("stdio inet flock rpath cpath wpath", NULL) == -1) |
136 |
|
|
err(EXIT_FAILURE, "pledge"); |
137 |
|
|
|
138 |
|
|
module_start(module_radius.base); |
139 |
|
|
event_loop(0); |
140 |
|
|
|
141 |
|
|
exit(EXIT_SUCCESS); |
142 |
|
|
} |
143 |
|
|
|
144 |
|
|
static void |
145 |
|
|
module_radius_init(struct module_radius *module) |
146 |
|
|
{ |
147 |
|
|
memset(module, 0, sizeof(struct module_radius)); |
148 |
|
|
TAILQ_INIT(&module->req); |
149 |
|
|
} |
150 |
|
|
|
151 |
|
|
static void |
152 |
|
|
module_radius_config_set(void *ctx, const char *paramname, int paramvalc, |
153 |
|
|
char * const * paramvalv) |
154 |
|
|
{ |
155 |
|
|
const char *errmsg = NULL; |
156 |
|
|
struct addrinfo *res; |
157 |
|
|
struct module_radius *module = ctx; |
158 |
|
|
|
159 |
|
|
if (strcmp(paramname, "server") == 0) { |
160 |
|
|
SYNTAX_ASSERT(paramvalc == 1, |
161 |
|
|
"`server' must have just one argument"); |
162 |
|
|
SYNTAX_ASSERT(module->nserver < (int)nitems(module->server), |
163 |
|
|
"number of server reached limit"); |
164 |
|
|
|
165 |
|
|
if (addrport_parse(paramvalv[0], IPPROTO_UDP, &res) != 0) |
166 |
|
|
SYNTAX_ASSERT(0, "could not parse address and port"); |
167 |
|
|
memcpy(&module->server[module->nserver].addr, res->ai_addr, |
168 |
|
|
res->ai_addrlen); |
169 |
|
|
|
170 |
|
|
if (ntohs(module->server[module->nserver].addr.sin4.sin_port) |
171 |
|
|
== 0) |
172 |
|
|
module->server[module->nserver].addr.sin4.sin_port |
173 |
|
|
= htons(RADIUS_DEFAULT_PORT); |
174 |
|
|
|
175 |
|
|
module->server[module->nserver].sock = -1; |
176 |
|
|
module->nserver++; |
177 |
|
|
freeaddrinfo(res); |
178 |
|
|
} else if (strcmp(paramname, "request-timeout") == 0) { |
179 |
|
|
SYNTAX_ASSERT(paramvalc == 1, |
180 |
|
|
"`request-timeout' must have just one argument"); |
181 |
|
|
module->req_timeout = (int)strtonum(paramvalv[0], 0, |
182 |
|
|
UINT16_MAX, &errmsg); |
183 |
|
|
if (module->req_timeout == 0 && errmsg != NULL) { |
184 |
|
|
module_send_message(module->base, IMSG_NG, |
185 |
|
|
"`request-timeout must be 0-%d", UINT16_MAX); |
186 |
|
|
return; |
187 |
|
|
} |
188 |
|
|
} else if (strcmp(paramname, "max-tries") == 0) { |
189 |
|
|
SYNTAX_ASSERT(paramvalc == 1, |
190 |
|
|
"`max-tries' must have just one argument"); |
191 |
|
|
module->max_tries = (int)strtonum(paramvalv[0], 0, |
192 |
|
|
UINT16_MAX, &errmsg); |
193 |
|
|
if (module->max_tries == 0 && errmsg != NULL) { |
194 |
|
|
module_send_message(module->base, IMSG_NG, |
195 |
|
|
"`max-tries must be 0-%d", UINT16_MAX); |
196 |
|
|
return; |
197 |
|
|
} |
198 |
|
|
|
199 |
|
|
} else if (strcmp(paramname, "max-failovers") == 0) { |
200 |
|
|
SYNTAX_ASSERT(paramvalc == 1, |
201 |
|
|
"`max-failovers' must have just one argument"); |
202 |
|
|
module->max_failovers = (int)strtonum(paramvalv[0], 0, |
203 |
|
|
UINT16_MAX, &errmsg); |
204 |
|
|
if (module->max_failovers == 0 && errmsg != NULL) { |
205 |
|
|
module_send_message(module->base, IMSG_NG, |
206 |
|
|
"`max-failovers' must be 0-%d", UINT16_MAX); |
207 |
|
|
return; |
208 |
|
|
} |
209 |
|
|
} else if (strcmp(paramname, "secret") == 0) { |
210 |
|
|
SYNTAX_ASSERT(paramvalc == 1, |
211 |
|
|
"`secret' must have just one argument"); |
212 |
|
|
if (strlcpy(module->secret, paramvalv[0], |
213 |
|
|
sizeof(module->secret)) >= sizeof(module->secret)) { |
214 |
|
|
module_send_message(module->base, IMSG_NG, |
215 |
|
|
"`secret' length must be 0-%lu", |
216 |
|
|
(u_long) sizeof(module->secret) - 1); |
217 |
|
|
return; |
218 |
|
|
} |
219 |
|
|
} else { |
220 |
|
|
module_send_message(module->base, IMSG_NG, |
221 |
|
|
"Unknown config parameter name `%s'", paramname); |
222 |
|
|
return; |
223 |
|
|
} |
224 |
|
|
module_send_message(module->base, IMSG_OK, NULL); |
225 |
|
|
|
226 |
|
|
return; |
227 |
|
|
syntax_error: |
228 |
|
|
module_send_message(module->base, IMSG_NG, "%s", errmsg); |
229 |
|
|
} |
230 |
|
|
|
231 |
|
|
static void |
232 |
|
|
module_radius_start(void *ctx) |
233 |
|
|
{ |
234 |
|
|
u_int i; |
235 |
|
|
struct module_radius *module = ctx; |
236 |
|
|
|
237 |
|
|
if (module->nserver <= 0) { |
238 |
|
|
module_send_message(module->base, IMSG_NG, |
239 |
|
|
"module `radius' needs one `server' at least"); |
240 |
|
|
return; |
241 |
|
|
} |
242 |
|
|
|
243 |
|
|
for (i = 0; i < module->nserver; i++) { |
244 |
|
|
module->server[i].module = module; |
245 |
|
|
if (radius_server_start(&module->server[i]) != 0) { |
246 |
|
|
module_send_message(module->base, IMSG_NG, |
247 |
|
|
"module `radius' failed to start one of " |
248 |
|
|
"the servers"); |
249 |
|
|
return; |
250 |
|
|
} |
251 |
|
|
} |
252 |
|
|
module_send_message(module->base, IMSG_OK, NULL); |
253 |
|
|
|
254 |
|
|
if (module->secret[0] != '\0') |
255 |
|
|
module_notify_secret(module->base, module->secret); |
256 |
|
|
} |
257 |
|
|
|
258 |
|
|
static void |
259 |
|
|
module_radius_stop(void *ctx) |
260 |
|
|
{ |
261 |
|
|
u_int i; |
262 |
|
|
struct module_radius_req *req, *treq; |
263 |
|
|
struct module_radius *module = ctx; |
264 |
|
|
|
265 |
|
|
TAILQ_FOREACH_SAFE(req, &module->req, next, treq) |
266 |
|
|
module_radius_req_on_failure(req); |
267 |
|
|
|
268 |
|
|
for (i = 0; i < module->nserver; i++) |
269 |
|
|
radius_server_stop(&module->server[i]); |
270 |
|
|
} |
271 |
|
|
|
272 |
|
|
static void |
273 |
|
|
module_radius_access_request(void *ctx, u_int q_id, const u_char *pkt, |
274 |
|
|
size_t pktlen) |
275 |
|
|
{ |
276 |
|
|
struct module_radius *module = ctx; |
277 |
|
|
struct module_radius_req *req; |
278 |
|
|
u_char attrbuf[256]; |
279 |
|
|
ssize_t attrlen; |
280 |
|
|
|
281 |
|
|
req = calloc(1, sizeof(struct module_radius_req)); |
282 |
|
|
if (req == NULL) { |
283 |
|
|
module_radius_log(module, LOG_WARNING, |
284 |
|
|
"%s: Out of memory: %m", __func__); |
285 |
|
|
goto on_fail; |
286 |
|
|
} |
287 |
|
|
|
288 |
|
|
req->ntry = 0; |
289 |
|
|
req->module = module; |
290 |
|
|
req->q_id = q_id; |
291 |
|
|
if ((req->q_pkt = radius_convert_packet(pkt, pktlen)) == NULL) { |
292 |
|
|
module_radius_log(module, LOG_WARNING, |
293 |
|
|
"%s: radius_convert_packet() failed: %m", __func__); |
294 |
|
|
goto on_fail; |
295 |
|
|
} |
296 |
|
|
evtimer_set(&req->ev, module_radius_req_on_timeout, req); |
297 |
|
|
TAILQ_INSERT_TAIL(&req->module->req, req, next); |
298 |
|
|
|
299 |
|
|
/* |
300 |
|
|
* radiusd decrypt User-Password attribute. crypt it again with our |
301 |
|
|
* secret. |
302 |
|
|
*/ |
303 |
|
|
attrlen = sizeof(attrbuf); |
304 |
|
|
if (module->secret[0] != '\0' && |
305 |
|
|
radius_get_raw_attr(req->q_pkt, RADIUS_TYPE_USER_PASSWORD, |
306 |
|
|
attrbuf, &attrlen) == 0) { |
307 |
|
|
attrbuf[attrlen] = '\0'; |
308 |
|
|
radius_del_attr_all(req->q_pkt, RADIUS_TYPE_USER_PASSWORD); |
309 |
|
|
radius_put_user_password_attr(req->q_pkt, attrbuf, |
310 |
|
|
module->secret); |
311 |
|
|
} |
312 |
|
|
|
313 |
|
|
/* select current server */ |
314 |
|
|
module_radius_req_select_server(req); |
315 |
|
|
|
316 |
|
|
module_radius_req_send(req); |
317 |
|
|
|
318 |
|
|
return; |
319 |
|
|
|
320 |
|
|
on_fail: |
321 |
|
|
free(req); |
322 |
|
|
module_accsreq_aborted(module->base, q_id); |
323 |
|
|
} |
324 |
|
|
|
325 |
|
|
/* |
326 |
|
|
* radius_server |
327 |
|
|
*/ |
328 |
|
|
static int |
329 |
|
|
radius_server_start(struct radius_server *server) |
330 |
|
|
{ |
331 |
|
|
socklen_t locallen; |
332 |
|
|
char buf0[NI_MAXHOST + NI_MAXSERV + 32]; |
333 |
|
|
char buf1[NI_MAXHOST + NI_MAXSERV + 32]; |
334 |
|
|
|
335 |
|
|
if ((server->sock = socket(AF_INET, SOCK_DGRAM | SOCK_NONBLOCK, 0)) |
336 |
|
|
< 0) { |
337 |
|
|
module_radius_log(server->module, LOG_WARNING, |
338 |
|
|
"%s: socket() failed", __func__); |
339 |
|
|
goto on_error; |
340 |
|
|
} |
341 |
|
|
if (connect(server->sock, (struct sockaddr *)&server->addr, |
342 |
|
|
server->addr.sin4.sin_len) != 0) { |
343 |
|
|
module_radius_log(server->module, LOG_WARNING, |
344 |
|
|
"%s: connect to %s failed", __func__, |
345 |
|
|
addrport_tostring((struct sockaddr *)&server->addr, |
346 |
|
|
server->addr.sin4.sin_len, buf1, sizeof(buf1))); |
347 |
|
|
goto on_error; |
348 |
|
|
} |
349 |
|
|
locallen = sizeof(server->local); |
350 |
|
|
if (getsockname(server->sock, (struct sockaddr *)&server->local, |
351 |
|
|
&locallen) != 0) { |
352 |
|
|
module_radius_log(server->module, LOG_WARNING, |
353 |
|
|
"%s: getsockanme() failed", __func__); |
354 |
|
|
goto on_error; |
355 |
|
|
} |
356 |
|
|
module_radius_log(server->module, LOG_INFO, |
357 |
|
|
"Use %s to send requests for %s", |
358 |
|
|
addrport_tostring((struct sockaddr *)&server->local, |
359 |
|
|
locallen, buf0, sizeof(buf0)), |
360 |
|
|
addrport_tostring((struct sockaddr *)&server->addr, |
361 |
|
|
server->addr.sin4.sin_len, buf1, sizeof(buf1))); |
362 |
|
|
|
363 |
|
|
event_set(&server->ev, server->sock, EV_READ | EV_PERSIST, |
364 |
|
|
radius_server_on_event, server); |
365 |
|
|
if (event_add(&server->ev, NULL)) { |
366 |
|
|
module_radius_log(server->module, LOG_WARNING, |
367 |
|
|
"%s: event_add() failed", __func__); |
368 |
|
|
goto on_error; |
369 |
|
|
} |
370 |
|
|
|
371 |
|
|
return (0); |
372 |
|
|
on_error: |
373 |
|
|
if (server->sock >= 0) |
374 |
|
|
close(server->sock); |
375 |
|
|
server->sock = -1; |
376 |
|
|
return (-1); |
377 |
|
|
} |
378 |
|
|
|
379 |
|
|
static void |
380 |
|
|
radius_server_stop(struct radius_server *server) |
381 |
|
|
{ |
382 |
|
|
event_del(&server->ev); |
383 |
|
|
if (server->sock >= 0) |
384 |
|
|
close(server->sock); |
385 |
|
|
server->sock = -1; |
386 |
|
|
} |
387 |
|
|
|
388 |
|
|
static void |
389 |
|
|
radius_server_on_event(int fd, short evmask, void *ctx) |
390 |
|
|
{ |
391 |
|
|
int sz, res_id; |
392 |
|
|
u_char pkt[65535]; |
393 |
|
|
char buf[NI_MAXHOST + NI_MAXSERV + 32]; |
394 |
|
|
struct radius_server *server = ctx; |
395 |
|
|
RADIUS_PACKET *radpkt = NULL; |
396 |
|
|
struct module_radius_req *req; |
397 |
|
|
struct sockaddr *peer; |
398 |
|
|
|
399 |
|
|
peer = (struct sockaddr *)&server->addr; |
400 |
|
|
if ((sz = recv(server->sock, pkt, sizeof(pkt), 0)) == -1) { |
401 |
|
|
if (errno == EAGAIN) |
402 |
|
|
return; |
403 |
|
|
module_radius_log(server->module, LOG_WARNING, |
404 |
|
|
"server=%s recv() failed: %m", |
405 |
|
|
addrport_tostring(peer, peer->sa_len, buf, sizeof(buf))); |
406 |
|
|
return; |
407 |
|
|
} |
408 |
|
|
if ((radpkt = radius_convert_packet(pkt, sz)) == NULL) { |
409 |
|
|
module_radius_log(server->module, LOG_WARNING, |
410 |
|
|
"server=%s could not convert the received message to a " |
411 |
|
|
"RADIUS packet object: %m", |
412 |
|
|
addrport_tostring(peer, peer->sa_len, buf, sizeof(buf))); |
413 |
|
|
return; |
414 |
|
|
} |
415 |
|
|
res_id = radius_get_id(radpkt); |
416 |
|
|
TAILQ_FOREACH(req, &server->module->req, next) { |
417 |
|
|
if (req->server == server && req->req_id == res_id) |
418 |
|
|
break; |
419 |
|
|
} |
420 |
|
|
if (req == NULL) { |
421 |
|
|
module_radius_log(server->module, LOG_WARNING, |
422 |
|
|
"server=%s Received radius message has unknown id=%d", |
423 |
|
|
addrport_tostring(peer, peer->sa_len, buf, sizeof(buf)), |
424 |
|
|
res_id); |
425 |
|
|
goto out; |
426 |
|
|
} |
427 |
|
|
radius_set_request_packet(radpkt, req->q_pkt); |
428 |
|
|
|
429 |
|
|
if (server->module->secret[0] != '\0') { |
430 |
|
|
if (radius_check_response_authenticator(radpkt, |
431 |
|
|
server->module->secret) != 0) { |
432 |
|
|
module_radius_log(server->module, LOG_WARNING, |
433 |
|
|
"server=%s Received radius message(id=%d) has bad " |
434 |
|
|
"authenticator", |
435 |
|
|
addrport_tostring(peer, peer->sa_len, buf, |
436 |
|
|
sizeof(buf)), res_id); |
437 |
|
|
goto out; |
438 |
|
|
} |
439 |
|
|
if (radius_has_attr(radpkt, |
440 |
|
|
RADIUS_TYPE_MESSAGE_AUTHENTICATOR) && |
441 |
|
|
radius_check_message_authenticator(radpkt, |
442 |
|
|
server->module->secret) != 0) { |
443 |
|
|
module_radius_log(server->module, LOG_WARNING, |
444 |
|
|
"server=%s Received radius message(id=%d) has bad " |
445 |
|
|
"message authenticator", |
446 |
|
|
addrport_tostring(peer, peer->sa_len, buf, |
447 |
|
|
sizeof(buf)), res_id); |
448 |
|
|
goto out; |
449 |
|
|
} |
450 |
|
|
} |
451 |
|
|
|
452 |
|
|
module_radius_log(server->module, LOG_INFO, |
453 |
|
|
"q=%u received a response from server %s", req->q_id, |
454 |
|
|
addrport_tostring(peer, peer->sa_len, buf, sizeof(buf))); |
455 |
|
|
|
456 |
|
|
module_radius_req_on_success(req, radius_get_data(radpkt), |
457 |
|
|
radius_get_length(radpkt)); |
458 |
|
|
out: |
459 |
|
|
if (radpkt != NULL) |
460 |
|
|
radius_delete_packet(radpkt); |
461 |
|
|
} |
462 |
|
|
|
463 |
|
|
static void |
464 |
|
|
radius_server_on_fail(struct radius_server *server, const char *failmsg) |
465 |
|
|
{ |
466 |
|
|
char buf0[NI_MAXHOST + NI_MAXSERV + 32]; |
467 |
|
|
char buf1[NI_MAXHOST + NI_MAXSERV + 32]; |
468 |
|
|
struct sockaddr *caddr, *naddr; |
469 |
|
|
|
470 |
|
|
caddr = (struct sockaddr *)&server->addr; |
471 |
|
|
if (server->module->nserver <= 1) { |
472 |
|
|
module_radius_log(server->module, LOG_WARNING, |
473 |
|
|
"Server %s failed: %s", |
474 |
|
|
addrport_tostring(caddr, caddr->sa_len, buf0, sizeof(buf0)), |
475 |
|
|
failmsg); |
476 |
|
|
return; |
477 |
|
|
} |
478 |
|
|
server->module->curr_server++; |
479 |
|
|
server->module->curr_server %= server->module->nserver; |
480 |
|
|
naddr = (struct sockaddr *) |
481 |
|
|
&server->module->server[server->module->curr_server].addr; |
482 |
|
|
|
483 |
|
|
module_radius_log(server->module, LOG_WARNING, |
484 |
|
|
"Server %s failed: %s Fail over to %s", |
485 |
|
|
addrport_tostring(caddr, caddr->sa_len, buf0, sizeof(buf0)), |
486 |
|
|
failmsg, |
487 |
|
|
addrport_tostring(naddr, naddr->sa_len, buf1, sizeof(buf1))); |
488 |
|
|
} |
489 |
|
|
|
490 |
|
|
/* module_radius_req */ |
491 |
|
|
|
492 |
|
|
static void |
493 |
|
|
module_radius_req_send(struct module_radius_req *req) |
494 |
|
|
{ |
495 |
|
|
int sz; |
496 |
|
|
struct sockaddr *peer; |
497 |
|
|
char msg[BUFSIZ]; |
498 |
|
|
|
499 |
|
|
peer = (struct sockaddr *)&req->server->addr; |
500 |
|
|
if ((sz = send(req->server->sock, radius_get_data(req->q_pkt), |
501 |
|
|
radius_get_length(req->q_pkt), 0)) < 0) { |
502 |
|
|
module_radius_log(req->module, LOG_WARNING, |
503 |
|
|
"Sending RADIUS query q=%u to %s failed: %m", |
504 |
|
|
req->q_id, |
505 |
|
|
addrport_tostring(peer, peer->sa_len, msg, sizeof(msg))); |
506 |
|
|
/* retry anyway */ |
507 |
|
|
} |
508 |
|
|
module_radius_log(req->module, LOG_INFO, |
509 |
|
|
"Send RADIUS query q=%u id=%d to %s successfully", |
510 |
|
|
req->q_id, req->req_id, |
511 |
|
|
addrport_tostring(peer, peer->sa_len, msg, sizeof(msg))); |
512 |
|
|
if (module_radius_req_reset_event(req) != -1) |
513 |
|
|
req->ntry++; |
514 |
|
|
} |
515 |
|
|
|
516 |
|
|
static int |
517 |
|
|
module_radius_req_reset_event(struct module_radius_req *req) |
518 |
|
|
{ |
519 |
|
|
struct timeval tv; |
520 |
|
|
static int timeouts[] = { 2, 4, 8 }; |
521 |
|
|
|
522 |
|
|
tv.tv_usec = 0; |
523 |
|
|
if (req->module->req_timeout != 0) |
524 |
|
|
tv.tv_sec = req->module->req_timeout; |
525 |
|
|
else { |
526 |
|
|
if (req->ntry < nitems(timeouts)) |
527 |
|
|
tv.tv_sec = timeouts[req->ntry]; |
528 |
|
|
else |
529 |
|
|
tv.tv_sec = timeouts[nitems(timeouts) - 1]; |
530 |
|
|
} |
531 |
|
|
if (evtimer_add(&req->ev, &tv) != 0) { |
532 |
|
|
module_radius_log(req->module, LOG_WARNING, |
533 |
|
|
"Cannot proccess the request for q=%u: " |
534 |
|
|
"evtimer_add() failed: %m", req->q_id); |
535 |
|
|
module_radius_req_on_failure(req); |
536 |
|
|
return (-1); |
537 |
|
|
} |
538 |
|
|
return (0); |
539 |
|
|
} |
540 |
|
|
|
541 |
|
|
static void |
542 |
|
|
module_radius_req_on_timeout(int fd, short evmask, void *ctx) |
543 |
|
|
{ |
544 |
|
|
struct module_radius_req *req = ctx; |
545 |
|
|
char msg[BUFSIZ]; |
546 |
|
|
|
547 |
|
|
|
548 |
|
|
if (req->module->max_tries <= req->ntry) { |
549 |
|
|
snprintf(msg, sizeof(msg), "q=%u didn't response RADIUS query " |
550 |
|
|
"%d time%s", req->q_id, req->ntry, |
551 |
|
|
(req->ntry > 0)? "s" : ""); |
552 |
|
|
radius_server_on_fail(req->server, msg); |
553 |
|
|
if (++req->nfailover >= req->module->max_failovers) { |
554 |
|
|
module_radius_log(req->module, |
555 |
|
|
LOG_WARNING, "RADIUS query q=%u time out", |
556 |
|
|
req->q_id); |
557 |
|
|
module_radius_req_on_failure(req); |
558 |
|
|
return; |
559 |
|
|
} |
560 |
|
|
/* select the next server */ |
561 |
|
|
module_radius_req_select_server(req); |
562 |
|
|
} |
563 |
|
|
module_radius_req_send(req); |
564 |
|
|
} |
565 |
|
|
|
566 |
|
|
static void |
567 |
|
|
module_radius_req_on_success(struct module_radius_req *req, |
568 |
|
|
const u_char *pkt, size_t pktlen) |
569 |
|
|
{ |
570 |
|
|
module_accsreq_answer(req->module->base, req->q_id, 1, pkt, pktlen); |
571 |
|
|
module_radius_req_free(req); |
572 |
|
|
} |
573 |
|
|
|
574 |
|
|
static void |
575 |
|
|
module_radius_req_on_failure(struct module_radius_req *req) |
576 |
|
|
{ |
577 |
|
|
module_accsreq_aborted(req->module->base, req->q_id); |
578 |
|
|
module_radius_req_free(req); |
579 |
|
|
} |
580 |
|
|
|
581 |
|
|
|
582 |
|
|
static void |
583 |
|
|
module_radius_req_free(struct module_radius_req *req) |
584 |
|
|
{ |
585 |
|
|
evtimer_del(&req->ev); |
586 |
|
|
TAILQ_REMOVE(&req->module->req, req, next); |
587 |
|
|
if (req->q_pkt != NULL) |
588 |
|
|
radius_delete_packet(req->q_pkt); |
589 |
|
|
free(req); |
590 |
|
|
} |
591 |
|
|
|
592 |
|
|
static void |
593 |
|
|
module_radius_req_select_server(struct module_radius_req *req) |
594 |
|
|
{ |
595 |
|
|
req->server = &req->module->server[req->module->curr_server]; |
596 |
|
|
req->ntry = 0; |
597 |
|
|
req->req_id = req->server->req_id_seq++; |
598 |
|
|
radius_set_id(req->q_pkt, req->req_id); |
599 |
|
|
module_radius_req_reset_msgauth(req); |
600 |
|
|
} |
601 |
|
|
|
602 |
|
|
static void |
603 |
|
|
module_radius_req_reset_msgauth(struct module_radius_req *req) |
604 |
|
|
{ |
605 |
|
|
if (radius_has_attr(req->q_pkt, RADIUS_TYPE_MESSAGE_AUTHENTICATOR)) |
606 |
|
|
radius_del_attr_all(req->q_pkt, |
607 |
|
|
RADIUS_TYPE_MESSAGE_AUTHENTICATOR); |
608 |
|
|
if (req->module->secret[0] != '\0') |
609 |
|
|
radius_put_message_authenticator(req->q_pkt, |
610 |
|
|
req->module->secret); |
611 |
|
|
} |
612 |
|
|
|
613 |
|
|
static void |
614 |
|
|
module_radius_log(struct module_radius *module, int pri, const char *fmt, ...) |
615 |
|
|
{ |
616 |
|
|
char fmt0[BUFSIZ]; |
617 |
|
|
va_list va; |
618 |
|
|
|
619 |
|
|
snprintf(fmt0, sizeof(fmt0), "radius: %s", fmt); |
620 |
|
|
va_start(va, fmt); |
621 |
|
|
vlog(pri, fmt0, va); |
622 |
|
|
va_end(va); |
623 |
|
|
} |