summaryrefslogtreecommitdiff
path: root/radsecproxy.c
diff options
context:
space:
mode:
authorvenaas <venaas>2007-05-23 12:19:35 +0000
committervenaas <venaas@e88ac4ed-0b26-0410-9574-a7f39faa03bf>2007-05-23 12:19:35 +0000
commit9e05be709035deca74e42d4eb88e4faa274f7440 (patch)
treebc98c94843685a09c6891dc91cf6d172c4055097 /radsecproxy.c
parent2ddf1c788d422386387cb5e425aaa0da3a6b67f9 (diff)
finished status-server code
git-svn-id: https://svn.testnett.uninett.no/radsecproxy/trunk@99 e88ac4ed-0b26-0410-9574-a7f39faa03bf
Diffstat (limited to 'radsecproxy.c')
-rw-r--r--radsecproxy.c112
1 files changed, 68 insertions, 44 deletions
diff --git a/radsecproxy.c b/radsecproxy.c
index a409710..2982ac0 100644
--- a/radsecproxy.c
+++ b/radsecproxy.c
@@ -723,9 +723,15 @@ void sendrq(struct server *to, struct request *rq) {
pthread_mutex_unlock(&to->newrq_mutex);
}
-void sendreply(struct client *to, struct server *from, unsigned char *buf, struct sockaddr_storage *tosa) {
+void sendreply(struct client *to, unsigned char *buf, struct sockaddr_storage *tosa) {
struct replyq *replyq = to->replyq;
+ if (!radsign(buf, (unsigned char *)to->peer.secret)) {
+ free(buf);
+ debug(DBG_WARN, "sendreply: failed to sign message");
+ return;
+ }
+
pthread_mutex_lock(&replyq->count_mutex);
if (replyq->count == replyq->size) {
debug(DBG_WARN, "No room in queue, dropping request");
@@ -1086,6 +1092,22 @@ int msmppe(unsigned char *attrs, int length, uint8_t type, char *attrtxt, struct
return 1;
}
+void respondstatusserver(struct request *rq) {
+ unsigned char *resp;
+
+ resp = malloc(20);
+ if (!resp) {
+ debug(DBG_ERR, "respondstatusserver: malloc failed");
+ return;
+ }
+ memcpy(resp, rq->buf, 20);
+ resp[0] = RAD_Access_Accept;
+ resp[2] = 0;
+ resp[3] = 20;
+ debug(DBG_DBG, "respondstatusserver: responding");
+ sendreply(rq->from, resp, rq->from->peer.type == 'U' ? &rq->fromsa : NULL);
+}
+
void radsrv(struct request *rq) {
uint8_t code, id, *auth, *attrs, *attr;
uint16_t len;
@@ -1101,8 +1123,8 @@ void radsrv(struct request *rq) {
debug(DBG_DBG, "radsrv: code %d, id %d, length %d", code, id, len);
- if (code != RAD_Access_Request) {
- debug(DBG_INFO, "radsrv: server currently accepts only access-requests, ignoring");
+ if (code != RAD_Access_Request && code != RAD_Status_Server) {
+ debug(DBG_INFO, "radsrv: server currently accepts only access-requests and status-server, ignoring");
free(buf);
return;
}
@@ -1115,47 +1137,54 @@ void radsrv(struct request *rq) {
free(buf);
return;
}
-
- attr = attrget(attrs, len, RAD_Attr_User_Name);
- if (!attr) {
- debug(DBG_WARN, "radsrv: ignoring request, no username attribute");
- free(buf);
- return;
+
+ if (code == RAD_Access_Request) {
+ attr = attrget(attrs, len, RAD_Attr_User_Name);
+ if (!attr) {
+ debug(DBG_WARN, "radsrv: ignoring request, no username attribute");
+ free(buf);
+ return;
+ }
+ memcpy(username, ATTRVAL(attr), ATTRVALLEN(attr));
+ username[ATTRVALLEN(attr)] = '\0';
+ debug(DBG_DBG, "Access Request with username: %s", username);
+
+ to = id2server(username, strlen(username));
+ if (!to) {
+ debug(DBG_INFO, "radsrv: ignoring request, don't know where to send it");
+ free(buf);
+ return;
+ }
+
+ if (rqinqueue(to, rq->from, id)) {
+ debug(DBG_INFO, "radsrv: already got request from host %s with id %d, ignoring", rq->from->peer.host, id);
+ free(buf);
+ return;
+ }
}
- memcpy(username, ATTRVAL(attr), ATTRVALLEN(attr));
- username[ATTRVALLEN(attr)] = '\0';
- debug(DBG_DBG, "Access Request with username: %s", username);
- to = id2server(username, strlen(username));
- if (!to) {
- debug(DBG_INFO, "radsrv: ignoring request, don't know where to send it");
+ attr = attrget(attrs, len, RAD_Attr_Message_Authenticator);
+ if (attr && (ATTRVALLEN(attr) != 16 || !checkmessageauth(buf, ATTRVAL(attr), rq->from->peer.secret))) {
+ debug(DBG_WARN, "radsrv: message authentication failed");
free(buf);
return;
}
- if (rqinqueue(to, rq->from, id)) {
- debug(DBG_INFO, "radsrv: ignoring request from host %s with id %d, already got one", rq->from->peer.host, id);
- free(buf);
+ if (code == RAD_Status_Server) {
+ respondstatusserver(rq);
return;
}
-
- attr = attrget(attrs, len, RAD_Attr_Message_Authenticator);
- if (attr && (ATTRVALLEN(attr) != 16 || !checkmessageauth(buf, ATTRVAL(attr), rq->from->peer.secret))) {
- debug(DBG_WARN, "radsrv: message authentication failed");
+
+ if (!RAND_bytes(newauth, 16)) {
+ debug(DBG_WARN, "radsrv: failed to generate random auth");
free(buf);
return;
}
- if (!RAND_bytes(newauth, 16)) {
- debug(DBG_WARN, "radsrv: failed to generate random auth");
- free(buf);
- return;
- }
-
#ifdef DEBUG
printauth("auth", auth);
#endif
-
+
attr = attrget(attrs, len, RAD_Attr_User_Password);
if (attr) {
debug(DBG_DBG, "radsrv: found userpwdattr with value length %d", ATTRVALLEN(attr));
@@ -1339,16 +1368,8 @@ void *clientrd(void *arg) {
server->requests[i].received = 1;
pthread_mutex_unlock(&server->newrq_mutex);
- if (!radsign(buf, (unsigned char *)from->peer.secret)) {
- free(buf);
- debug(DBG_WARN, "clientrd: failed to sign message");
- continue;
- }
-#ifdef DEBUG
- printauth("signedorigauth/buf+4", buf + 4);
-#endif
debug(DBG_DBG, "clientrd: giving packet back to where it came from");
- sendreply(from, server, buf, from->peer.type == 'U' ? &fromsa : NULL);
+ sendreply(from, buf, from->peer.type == 'U' ? &fromsa : NULL);
}
}
@@ -1367,8 +1388,7 @@ void *clientwr(void *arg) {
if (server->statusserver) {
memset(&statsrvrq, 0, sizeof(struct request));
- statsrvrq.buf = statsrvbuf;
- memset(&statsrvbuf, 0, sizeof(statsrvbuf));
+ memset(statsrvbuf, 0, sizeof(statsrvbuf));
statsrvbuf[0] = RAD_Status_Server;
statsrvbuf[3] = 38;
statsrvbuf[20] = RAD_Attr_Message_Authenticator;
@@ -1424,8 +1444,7 @@ void *clientwr(void *arg) {
if (rq->received) {
debug(DBG_DBG, "clientwr: removing received packet from queue");
- if (*rq->buf != RAD_Status_Server)
- free(rq->buf);
+ free(rq->buf);
/* setting this to NULL means that it can be reused */
rq->buf = NULL;
pthread_mutex_unlock(&server->newrq_mutex);
@@ -1445,8 +1464,7 @@ void *clientwr(void *arg) {
debug(DBG_DBG, "clientwr: removing expired packet from queue");
if (*rq->buf == RAD_Status_Server)
debug(DBG_WARN, "clientwr: no status server response, server dead?");
- else
- free(rq->buf);
+ free(rq->buf);
/* setting this to NULL means that it can be reused */
rq->buf = NULL;
pthread_mutex_unlock(&server->newrq_mutex);
@@ -1471,6 +1489,12 @@ void *clientwr(void *arg) {
debug(DBG_WARN, "clientwr: failed to generate random auth");
continue;
}
+ statsrvrq.buf = malloc(sizeof(statsrvbuf));
+ if (!statsrvrq.buf) {
+ debug(DBG_ERR, "clientwr: malloc failed");
+ continue;
+ }
+ memcpy(statsrvrq.buf, statsrvbuf, sizeof(statsrvbuf));
debug(DBG_DBG, "clientwr: sending status server to %s", server->peer.host);
lastsend.tv_sec = now.tv_sec;
sendrq(server, &statsrvrq);