The FreeRADIUS server $Id: 15bac2a4c627c01d1aa2047687b3418955ac7f00 $
Loading...
Searching...
No Matches
proto_tacacs.c
Go to the documentation of this file.
1/*
2 * This program is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License as published by
4 * the Free Software Foundation; either version 2 of the License, or
5 * (at your option) any later version.
6 *
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
11 *
12 * You should have received a copy of the GNU General Public License
13 * along with this program; if not, write to the Free Software
14 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
15 */
16
17/**
18 * $Id: a9a1e73c9a1cb648e0a9b82bb3f4c0ce2edf45a7 $
19 * @file proto_tacacs.c
20 * @brief TACACS+ module.
21 *
22 * @copyright 2020 The FreeRADIUS server project.
23 * @copyright 2020 Network RADIUS SAS (legal@networkradius.com)
24 */
25
26#include <freeradius-devel/io/listen.h>
27#include <freeradius-devel/io/master.h>
28#include <freeradius-devel/util/debug.h>
29
30#include <freeradius-devel/tacacs/tacacs.h>
31
32#include "proto_tacacs.h"
33
35
36static int transport_parse(TALLOC_CTX *ctx, void *out, void *parent, CONF_ITEM *ci, conf_parser_t const *rule);
37static int type_parse(TALLOC_CTX *ctx, void *out, void *parent, CONF_ITEM *ci, UNUSED conf_parser_t const *rule);
38
39static conf_parser_t const limit_config[] = {
40 { FR_CONF_OFFSET("idle_timeout", proto_tacacs_t, io.idle_timeout), .dflt = "30.0" } ,
41 { FR_CONF_OFFSET("dynamic_timeout", proto_tacacs_t, io.dynamic_timeout), .dflt = "600.0" } ,
42
43 { FR_CONF_OFFSET("max_connections", proto_tacacs_t, io.max_connections), .dflt = "1024" } ,
44
45 /*
46 * For performance tweaking. NOT for normal humans.
47 */
48 { FR_CONF_OFFSET("max_packet_size", proto_tacacs_t, max_packet_size) } ,
49 { FR_CONF_OFFSET("num_messages", proto_tacacs_t, num_messages) } ,
50
52};
53
55 { FR_CONF_OFFSET("Authentication-Start", proto_tacacs_t, priorities[FR_TAC_PLUS_AUTHEN]),
56 .func = cf_table_parse_int, .uctx = &(cf_table_parse_ctx_t){ .table = channel_packet_priority, .len = &channel_packet_priority_len }, .dflt = "high" },
57 { FR_CONF_OFFSET("Authentication-Continue", proto_tacacs_t, priorities[FR_TAC_PLUS_AUTHEN]),
58 .func = cf_table_parse_int, .uctx = &(cf_table_parse_ctx_t){ .table = channel_packet_priority, .len = &channel_packet_priority_len }, .dflt = "high" },
59 { FR_CONF_OFFSET("Authorization-Request", proto_tacacs_t, priorities[FR_TAC_PLUS_AUTHOR]),
60 .func = cf_table_parse_int, .uctx = &(cf_table_parse_ctx_t){ .table = channel_packet_priority, .len = &channel_packet_priority_len }, .dflt = "normal" },
61 { FR_CONF_OFFSET("Accounting-Request", proto_tacacs_t, priorities[FR_TAC_PLUS_ACCT]),
62 .func = cf_table_parse_int, .uctx = &(cf_table_parse_ctx_t){ .table = channel_packet_priority, .len = &channel_packet_priority_len }, .dflt = "low" },
63
65};
66
69 { FR_CONF_OFFSET_TYPE_FLAGS("transport", FR_TYPE_VOID, 0, proto_tacacs_t, io.submodule), .func = transport_parse },
70
71 { FR_CONF_POINTER("limit", 0, CONF_FLAG_SUBSECTION, NULL), .subcs = (void const *) limit_config },
72 { FR_CONF_POINTER("priority", 0, CONF_FLAG_SUBSECTION, NULL), .subcs = (void const *) priority_config },
73
75};
76
77static fr_dict_t const *dict_tacacs;
78
81 { .out = &dict_tacacs, .proto = "tacacs" },
82 { NULL }
83};
84
85
88
91 { .out = &attr_packet_type, .name = "Packet-Type", .type = FR_TYPE_UINT32, .dict = &dict_tacacs},
92 { .out = &attr_tacacs_user_name, .name = "User-Name", .type = FR_TYPE_STRING, .dict = &dict_tacacs },
93 { NULL }
94};
95
96static int transport_parse(TALLOC_CTX *ctx, void *out, void *parent, CONF_ITEM *ci, conf_parser_t const *rule)
97{
98 proto_tacacs_t *inst = talloc_get_type_abort(parent, proto_tacacs_t);
100
101 if (unlikely(virtual_server_listen_transport_parse(ctx, out, parent, ci, rule) < 0)) {
102 return -1;
103 }
104
105 mi = talloc_get_type_abort(*(void **)out, module_instance_t);
106 inst->io.app_io = (fr_app_io_t const *)mi->exported;
107 inst->io.app_io_instance = mi->data;
108 inst->io.app_io_conf = mi->conf;
109
110 return 0;
111}
112
113/** Translates the packet-type into a submodule name
114 *
115 * If we found a Packet-Type = Authentication-Start CONF_PAIR for example, here's we'd load
116 * the proto_tacacs_auth module.
117 *
118 * @param[in] ctx to allocate data in (instance of proto_tacacs).
119 * @param[out] out Where to write a module_instance_t containing the module handle and instance.
120 * @param[in] parent Base structure address.
121 * @param[in] ci #CONF_PAIR specifying the name of the type module.
122 * @param[in] rule unused.
123 * @return
124 * - 0 on success.
125 * - -1 on failure.
126 */
127static int type_parse(UNUSED TALLOC_CTX *ctx, void *out, void *parent, CONF_ITEM *ci, UNUSED conf_parser_t const *rule)
128{
129 proto_tacacs_t *inst = talloc_get_type_abort(parent, proto_tacacs_t);
130 fr_dict_enum_value_t const *dv;
131 CONF_PAIR *cp;
132 char const *value;
133
134 cp = cf_item_to_pair(ci);
135 value = cf_pair_value(cp);
136
138 if (!dv || !FR_TACACS_PACKET_CODE_VALID(dv->value->vb_uint32)) {
139 cf_log_err(ci, "Unknown TACACS+ packet type '%s'", value);
140 return -1;
141 }
142
143 inst->allowed[dv->value->vb_uint32] = true;
144 *((char const **) out) = value;
145
146 return 0;
147}
148
149/** Decode the packet
150 *
151 */
152static int mod_decode(UNUSED void const *instance, request_t *request, uint8_t *const data, size_t data_len)
153{
154 fr_io_track_t const *track = talloc_get_type_abort_const(request->async->packet_ctx, fr_io_track_t);
155 fr_io_address_t const *address = track->address;
156 fr_client_t const *client;
157 int code = -1;
158 fr_tacacs_packet_t const *pkt = (fr_tacacs_packet_t const *)data;
159 char const *secret;
160 size_t secretlen = 0;
161 fr_dict_attr_t const *dv = NULL;
162
163 RHEXDUMP3(data, data_len, "proto_tacacs decode packet");
164
165 client = address->radclient;
166
167 /*
168 * Clients start at ID 1, and go up by 2.
169 */
170 if ((data[2] & 0x01) != 0x01) {
171 REDEBUG("Invalid sequence number %02x", data[2]);
172 return -1;
173 }
174
175 request->packet->id = data[2]; // seq_no
176 request->reply->id = data[2] + 1; // seq_no, but requests are odd, replies are even! */
177
178 request->packet->data = talloc_memdup(request->packet, data, data_len);
179 request->packet->data_len = data_len;
180
181 if (!client->active) {
182 fr_assert(client->dynamic);
184
185 /*
186 * For real packets, the code is extracted during packet decode,
187 * however, we can't do that for a fake packet used to set up a
188 * dynamic client as we don't have the secret - so set an intelligent
189 * packet code.
190 */
191 switch (request->packet->data[1]) {
193 request->packet->code = FR_PACKET_TYPE_VALUE_AUTHENTICATION_START;
194 break;
196 request->packet->code = FR_PACKET_TYPE_VALUE_AUTHORIZATION_REQUEST;
197 break;
198 case FR_TAC_PLUS_ACCT:
199 request->packet->code = FR_PACKET_TYPE_VALUE_ACCOUNTING_REQUEST;
200 break;
201 default:
202 return -1;
203 }
204 goto skip_decode;
205 }
206
207 secret = client->secret;
208 if (secret) {
210 REDEBUG("Expected to see encrypted packet, got unencrypted packet!");
211 return -1;
212 }
213 secretlen = talloc_array_length(client->secret) - 1;
214 }
215
216 /*
217 * See if there's a client-specific vendor in the "nas_type" field.
218 *
219 * If there's no such vendor, too bad for you.
220 */
221 if (client->nas_type) {
223 }
224
225 /*
226 * Note that we don't set a limit on max_attributes here.
227 * That MUST be set and checked in the underlying
228 * transport, via a call to ???
229 */
230 if (fr_tacacs_decode(request->request_ctx, &request->request_pairs, dv,
231 request->packet->data, request->packet->data_len,
232 NULL, secret, secretlen, &code) < 0) {
233 RPEDEBUG("Failed decoding packet");
234 return -1;
235 }
236
237 request->packet->code = code;
238skip_decode:
239
240 /*
241 * RFC 8907 Section 3.6 says:
242 *
243 * If an error occurs but the type of the incoming packet cannot be determined, a packet with the
244 * identical cleartext header but with a sequence number incremented by one and the length set to
245 * zero MUST be returned to indicate an error.
246 *
247 * This is substantially retarded. It should instead just close the connection.
248 */
249
250
251 /*
252 * Set the rest of the fields.
253 */
254 request->client = UNCONST(fr_client_t *, client);
255
256 request->packet->socket = address->socket;
257 fr_socket_addr_swap(&request->reply->socket, &address->socket);
258
259 REQUEST_VERIFY(request);
260
261 if (RDEBUG_ENABLED) {
262 fr_pair_t *vp;
263
264 RDEBUG("Received %s ID %i from %pV:%i to %pV:%i length %zu via socket %s",
265 fr_tacacs_packet_names[request->packet->code],
266 request->packet->id,
267 fr_box_ipaddr(request->packet->socket.inet.src_ipaddr),
268 request->packet->socket.inet.src_port,
269 fr_box_ipaddr(request->packet->socket.inet.dst_ipaddr),
270 request->packet->socket.inet.dst_port,
271 request->packet->data_len,
272 request->async->listen->name);
273
274 log_request_pair_list(L_DBG_LVL_1, request, NULL, &request->request_pairs, NULL);
275
276 /*
277 * Maybe the shared secret is wrong?
278 */
279 if (client->active &&
280 ((pkt->hdr.flags & FR_FLAGS_VALUE_UNENCRYPTED) == 0) &&
282 ((vp = fr_pair_find_by_da(&request->request_pairs, NULL, attr_tacacs_user_name)) != NULL) &&
283 (fr_utf8_str((uint8_t const *) vp->vp_strvalue, vp->vp_length) < 0)) {
284 RWDEBUG("Unprintable characters in the %s. "
285 "Double-check the shared secret on the server "
286 "and the TACACS+ Client!", attr_tacacs_user_name->name);
287 }
288 }
289
290 if (fr_packet_pairs_from_packet(request->request_ctx, &request->request_pairs, request->packet) < 0) {
291 RPEDEBUG("Failed decoding 'Net.*' packet");
292 return -1;
293 }
294
295 return 0;
296}
297
298static ssize_t mod_encode(UNUSED void const *instance, request_t *request, uint8_t *buffer, size_t buffer_len)
299{
300 fr_io_track_t *track = talloc_get_type_abort(request->async->packet_ctx, fr_io_track_t);
301 fr_io_address_t const *address = track->address;
302 ssize_t data_len;
303 fr_client_t const *client;
304 char const *secret;
305 size_t secretlen = 0;
306
307 /*
308 * @todo - RFC 8907 Section 4.4. says:
309 *
310 * When the session is complete, the TCP connection should be handled as follows, according to
311 * whether Single Connection Mode was negotiated:
312 *
313 * * If Single Connection Mode was not negotiated, then the connection should be closed.
314 *
315 * * If Single Connection Mode was enabled, then the connection SHOULD be left open (see
316 * "Single Connection Mode" (Section 4.3)) but may still be closed after a timeout period to
317 * preserve deployment resources.
318 *
319 * * If Single Connection Mode was enabled, but an ERROR occurred due to connection issues
320 * (such as an incorrect secret (see Section 4.5)), then any further new sessions MUST NOT be
321 * accepted on the connection. If there are any sessions that have already been established,
322 * then they MAY be completed. Once all active sessions are completed, then the connection
323 * MUST be closed.
324 */
325
326 /*
327 * Process layer NAK, or "Do not respond".
328 */
329 if ((buffer_len == 1) ||
330 !FR_TACACS_PACKET_CODE_VALID(request->reply->code)) {
331 track->do_not_respond = true;
332 return 1;
333 }
334
335 client = address->radclient;
336 fr_assert(client);
337
338 /*
339 * Dynamic client stuff
340 */
341 if (client->dynamic && !client->active) {
342 fr_client_t *new_client;
343
344 fr_assert(buffer_len >= sizeof(client));
345
346 /*
347 * Allocate the client. If that fails, send back a NAK.
348 *
349 * @todo - deal with NUMA zones? Or just deal with this
350 * client being in different memory.
351 *
352 * Maybe we should create a CONF_SECTION from the client,
353 * and pass *that* back to mod_write(), which can then
354 * parse it to create the actual client....
355 */
356 new_client = client_afrom_request(NULL, request);
357 if (!new_client) {
358 PERROR("Failed creating new client");
359 buffer[0] = true;
360 return 1;
361 }
362
363 memcpy(buffer, &new_client, sizeof(new_client));
364 return sizeof(new_client);
365 }
366
367 secret = client->secret;
368 if (secret) secretlen = talloc_array_length(client->secret) - 1;
369
370 data_len = fr_tacacs_encode(&FR_DBUFF_TMP(buffer, buffer_len), request->packet->data,
371 secret, secretlen,
372 request->reply->code, &request->reply_pairs);
373 if (data_len < 0) {
374 RPEDEBUG("Failed encoding TACACS+ reply");
375 return -1;
376 }
377
378 if (RDEBUG_ENABLED) {
379 RDEBUG("Sending %s ID %i from %pV:%i to %pV:%i length %zu via socket %s",
380 fr_tacacs_packet_names[request->reply->code],
381 request->reply->id,
382 fr_box_ipaddr(request->reply->socket.inet.src_ipaddr),
383 request->reply->socket.inet.src_port,
384 fr_box_ipaddr(request->reply->socket.inet.dst_ipaddr),
385 request->reply->socket.inet.dst_port,
386 data_len,
387 request->async->listen->name);
388
389 log_request_pair_list(L_DBG_LVL_1, request, NULL, &request->reply_pairs, NULL);
390 }
391
392 RHEXDUMP3(buffer, data_len, "proto_tacacs encode packet");
393
394 return data_len;
395}
396
397static int mod_priority_set(void const *instance, uint8_t const *buffer, UNUSED size_t buflen)
398{
400
402
403 /*
404 * Disallowed packet
405 */
406 if (!inst->priorities[buffer[1]]) return 0;
407
408 /*
409 * @todo - if we cared, we could also return -1 for "this
410 * is a bad packet". But that's really only for
411 * mod_inject, as we assume that app_io->read() always
412 * returns good packets.
413 */
414
415 /*
416 * Return the configured priority.
417 */
418 return inst->priorities[buffer[1]];
419}
420
421/** Open listen sockets/connect to external event source
422 *
423 * @param[in] instance Ctx data for this application.
424 * @param[in] sc to add our file descriptor to.
425 * @param[in] conf Listen section parsed to give us instance.
426 * @return
427 * - 0 on success.
428 * - -1 on failure.
429 */
430static int mod_open(void *instance, fr_schedule_t *sc, UNUSED CONF_SECTION *conf)
431{
432 proto_tacacs_t *inst = talloc_get_type_abort(instance, proto_tacacs_t);
433
434 inst->io.app = &proto_tacacs;
435 inst->io.app_instance = instance;
436
437 /*
438 * io.app_io should already be set
439 */
440 return fr_master_io_listen(&inst->io, sc, inst->max_packet_size, inst->num_messages);
441}
442
443/** Instantiate the application
444 *
445 * Instantiate I/O and type submodules.
446 *
447 * @return
448 * - 0 on success.
449 * - -1 on failure.
450 */
451static int mod_instantiate(module_inst_ctx_t const *mctx)
452{
453 proto_tacacs_t *inst = talloc_get_type_abort(mctx->mi->data, proto_tacacs_t);
454
455 /*
456 * Ensure that the server CONF_SECTION is always set.
457 */
458 inst->io.server_cs = cf_item_to_section(cf_parent(mctx->mi->conf));
459
460 fr_assert(dict_tacacs != NULL);
461
462 /*
463 * No IO module, it's an empty listener.
464 */
465 if (!inst->io.submodule) return 0;
466
467 /*
468 * These timers are usually protocol specific.
469 */
470 FR_TIME_DELTA_BOUND_CHECK("idle_timeout", inst->io.idle_timeout, >=, fr_time_delta_from_sec(1));
471 FR_TIME_DELTA_BOUND_CHECK("idle_timeout", inst->io.idle_timeout, <=, fr_time_delta_from_sec(600));
472
473 FR_TIME_DELTA_BOUND_CHECK("nak_lifetime", inst->io.nak_lifetime, >=, fr_time_delta_from_sec(1));
474 FR_TIME_DELTA_BOUND_CHECK("nak_lifetime", inst->io.nak_lifetime, <=, fr_time_delta_from_sec(600));
475
476 /*
477 * Tell the master handler about the main protocol instance.
478 */
479 inst->io.app = &proto_tacacs;
480 inst->io.app_instance = inst;
481
482 /*
483 * We will need this for dynamic clients and connected sockets.
484 */
485 inst->io.mi = mctx->mi;
486
487 /*
488 * These configuration items are not printed by default,
489 * because normal people shouldn't be touching them.
490 */
491 if (!inst->max_packet_size && inst->io.app_io) inst->max_packet_size = inst->io.app_io->default_message_size;
492
493 if (!inst->num_messages) inst->num_messages = 256;
494
495 FR_INTEGER_BOUND_CHECK("num_messages", inst->num_messages, >=, 32);
496 FR_INTEGER_BOUND_CHECK("num_messages", inst->num_messages, <=, 65535);
497
498 FR_INTEGER_BOUND_CHECK("max_packet_size", inst->max_packet_size, >=, 1024);
499 FR_INTEGER_BOUND_CHECK("max_packet_size", inst->max_packet_size, <=, 65535);
500
501 /*
502 * Instantiate the transport module before calling the
503 * common instantiation function.
504 */
505 if (module_instantiate(inst->io.submodule) < 0) return -1;
506
507 /*
508 * Instantiate the master io submodule
509 */
511}
512
513static int mod_load(void)
514{
515 if (fr_tacacs_global_init() < 0) {
516 PERROR("Failed initialising tacacs");
517 return -1;
518 }
519
520 return 0;
521}
522
523static void mod_unload(void)
524{
526}
527
529 .common = {
530 .magic = MODULE_MAGIC_INIT,
531 .name = "tacacs",
533 .inst_size = sizeof(proto_tacacs_t),
534
535 .onload = mod_load,
536 .unload = mod_unload,
537 .instantiate = mod_instantiate
538 },
539 .dict = &dict_tacacs,
540 .open = mod_open,
541 .decode = mod_decode,
542 .encode = mod_encode,
543 .priority = mod_priority_set
544};
static int const char char buffer[256]
Definition acutest.h:576
module_t common
Common fields to all loadable modules.
Definition app_io.h:34
Public structure describing an I/O path for a protocol.
Definition app_io.h:33
module_t common
Common fields provided by all modules.
Definition application.h:72
Describes a new application (protocol)
Definition application.h:71
#define UNCONST(_type, _ptr)
Remove const qualification from a pointer.
Definition build.h:167
#define unlikely(_x)
Definition build.h:383
#define UNUSED
Definition build.h:317
int cf_table_parse_int(UNUSED TALLOC_CTX *ctx, void *out, UNUSED void *parent, CONF_ITEM *ci, conf_parser_t const *rule)
Generic function for parsing conf pair values as int.
Definition cf_parse.c:1592
#define CONF_PARSER_TERMINATOR
Definition cf_parse.h:658
cf_parse_t func
Override default parsing behaviour for the specified type with a custom parsing function.
Definition cf_parse.h:612
#define FR_INTEGER_BOUND_CHECK(_name, _var, _op, _bound)
Definition cf_parse.h:518
#define FR_CONF_OFFSET(_name, _struct, _field)
conf_parser_t which parses a single CONF_PAIR, writing the result to a field in a struct
Definition cf_parse.h:284
#define FR_CONF_POINTER(_name, _type, _flags, _res_p)
conf_parser_t which parses a single CONF_PAIR producing a single global result
Definition cf_parse.h:339
#define FR_CONF_OFFSET_FLAGS(_name, _flags, _struct, _field)
conf_parser_t which parses a single CONF_PAIR, writing the result to a field in a struct
Definition cf_parse.h:272
#define FR_TIME_DELTA_BOUND_CHECK(_name, _var, _op, _bound)
Definition cf_parse.h:529
@ CONF_FLAG_NOT_EMPTY
CONF_PAIR is required to have a non zero length value.
Definition cf_parse.h:449
@ CONF_FLAG_SUBSECTION
Instead of putting the information into a configuration structure, the configuration file routines MA...
Definition cf_parse.h:428
#define FR_CONF_OFFSET_TYPE_FLAGS(_name, _type, _flags, _struct, _field)
conf_parser_t which parses a single CONF_PAIR, writing the result to a field in a struct
Definition cf_parse.h:241
Defines a CONF_PAIR to C data type mapping.
Definition cf_parse.h:595
Common header for all CONF_* types.
Definition cf_priv.h:49
Configuration AVP similar to a fr_pair_t.
Definition cf_priv.h:70
A section grouping multiple CONF_PAIR.
Definition cf_priv.h:101
CONF_SECTION * cf_item_to_section(CONF_ITEM const *ci)
Cast a CONF_ITEM to a CONF_SECTION.
Definition cf_util.c:683
CONF_PAIR * cf_item_to_pair(CONF_ITEM const *ci)
Cast a CONF_ITEM to a CONF_PAIR.
Definition cf_util.c:663
char const * cf_pair_value(CONF_PAIR const *pair)
Return the value of a CONF_PAIR.
Definition cf_util.c:1593
#define cf_log_err(_cf, _fmt,...)
Definition cf_util.h:289
#define cf_parent(_cf)
Definition cf_util.h:101
size_t channel_packet_priority_len
Definition channel.c:170
fr_table_num_sorted_t const channel_packet_priority[]
Definition channel.c:164
#define FR_DBUFF_TMP(_start, _len_or_end)
Creates a compound literal to pass into functions which accept a dbuff.
Definition dbuff.h:514
fr_dict_attr_t const * fr_dict_attr_by_name(fr_dict_attr_err_t *err, fr_dict_attr_t const *parent, char const *attr))
Locate a fr_dict_attr_t by its name.
Definition dict_util.c:3266
fr_dict_attr_t const * fr_dict_root(fr_dict_t const *dict)
Return the root attribute of a dictionary.
Definition dict_util.c:2403
fr_dict_attr_t const ** out
Where to write a pointer to the resolved fr_dict_attr_t.
Definition dict.h:274
fr_dict_t const ** out
Where to write a pointer to the loaded/resolved fr_dict_t.
Definition dict.h:287
fr_value_box_t const * value
Enum value (what name maps to).
Definition dict.h:237
fr_dict_enum_value_t const * fr_dict_enum_by_name(fr_dict_attr_t const *da, char const *name, ssize_t len)
Definition dict_util.c:3439
Specifies an attribute which must be present for the module to function.
Definition dict.h:273
Specifies a dictionary which must be loaded/loadable for the module to function.
Definition dict.h:286
Value of an enumerated attribute.
Definition dict.h:233
Test enumeration values.
Definition dict_test.h:92
#define MODULE_MAGIC_INIT
Stop people using different module/library/server versions together.
Definition dl_module.h:63
fr_socket_t socket
src/dst ip and port.
Definition base.h:336
fr_client_t const * radclient
old-style client definition
Definition base.h:338
char const * secret
Secret PSK.
Definition client.h:90
bool active
for dynamic clients
Definition client.h:119
char const * nas_type
Type of client (arbitrary).
Definition client.h:126
bool dynamic
Whether the client was dynamically defined.
Definition client.h:118
Describes a host allowed to send packets to the server.
Definition client.h:80
void log_request_pair_list(fr_log_lvl_t lvl, request_t *request, fr_pair_t const *parent, fr_pair_list_t const *vps, char const *prefix)
Print a fr_pair_list_t.
Definition log.c:828
#define PERROR(_fmt,...)
Definition log.h:228
#define RWDEBUG(fmt,...)
Definition log.h:361
#define RPEDEBUG(fmt,...)
Definition log.h:376
#define RHEXDUMP3(_data, _len, _fmt,...)
Definition log.h:705
int fr_packet_pairs_from_packet(TALLOC_CTX *ctx, fr_pair_list_t *list, fr_packet_t const *packet)
Allocate a "Net." struct with src/dst host and port.
Definition packet.c:91
@ L_DBG_LVL_1
Highest priority debug messages (-x).
Definition log.h:70
fr_app_io_t fr_master_app_io
Definition master.c:3280
int fr_master_io_listen(fr_io_instance_t *inst, fr_schedule_t *sc, size_t default_message_size, size_t num_messages)
Definition master.c:3071
fr_io_address_t const * address
of this packet.. shared between multiple packets
Definition master.h:54
bool do_not_respond
don't respond
Definition master.h:50
@ FR_TYPE_STRING
String of printable characters.
@ FR_TYPE_UINT32
32 Bit unsigned integer.
@ FR_TYPE_VOID
User data.
long int ssize_t
unsigned char uint8_t
#define MODULE_INST_CTX(_mi)
Wrapper to create a module_inst_ctx_t as a compound literal.
Definition module_ctx.h:158
module_instance_t * mi
Instance of the module being instantiated.
Definition module_ctx.h:51
Temporary structure to hold arguments for instantiation calls.
Definition module_ctx.h:50
fr_pair_t * fr_pair_find_by_da(fr_pair_list_t const *list, fr_pair_t const *prev, fr_dict_attr_t const *da)
Find the first pair with a matching da.
Definition pair.c:697
fr_slen_t fr_utf8_str(uint8_t const *str, ssize_t inlen)
Validate a complete UTF8 string.
Definition print.c:143
static int mod_load(void)
static fr_dict_attr_t const * attr_packet_type
static ssize_t mod_encode(UNUSED void const *instance, request_t *request, uint8_t *buffer, size_t buffer_len)
static const conf_parser_t proto_tacacs_config[]
fr_dict_attr_autoload_t proto_tacacs_dict_attr[]
static conf_parser_t const limit_config[]
static fr_dict_t const * dict_tacacs
static void mod_unload(void)
static int type_parse(TALLOC_CTX *ctx, void *out, void *parent, CONF_ITEM *ci, UNUSED conf_parser_t const *rule)
static int mod_decode(UNUSED void const *instance, request_t *request, uint8_t *const data, size_t data_len)
Decode the packet.
fr_dict_autoload_t proto_tacacs_dict[]
static const conf_parser_t priority_config[]
static int transport_parse(TALLOC_CTX *ctx, void *out, void *parent, CONF_ITEM *ci, conf_parser_t const *rule)
fr_app_t proto_tacacs
static fr_dict_attr_t const * attr_tacacs_user_name
static int mod_instantiate(module_inst_ctx_t const *mctx)
Instantiate the application.
static int mod_open(void *instance, fr_schedule_t *sc, UNUSED CONF_SECTION *conf)
Open listen sockets/connect to external event source.
static int mod_priority_set(void const *instance, uint8_t const *buffer, UNUSED size_t buflen)
An instance of a proto_tacacs listen section.
char const * fr_tacacs_packet_names[FR_TACACS_CODE_MAX]
Definition base.c:119
void fr_tacacs_global_free(void)
Definition base.c:167
int fr_tacacs_global_init(void)
Definition base.c:144
ssize_t fr_tacacs_decode(TALLOC_CTX *ctx, fr_pair_list_t *out, fr_dict_attr_t const *vendor, uint8_t const *buffer, size_t buffer_len, const uint8_t *original, char const *const secret, size_t secret_len, int *code)
Decode a TACACS+ packet.
Definition decode.c:409
ssize_t fr_tacacs_encode(fr_dbuff_t *dbuff, uint8_t const *original_packet, char const *secret, size_t secret_len, unsigned int code, fr_pair_list_t *vps)
Encode VPS into a raw TACACS packet.
Definition encode.c:363
#define fr_assert(_expr)
Definition rad_assert.h:38
static char * secret
#define REDEBUG(fmt,...)
Definition radclient.h:52
#define RDEBUG_ENABLED2()
Definition radclient.h:50
#define RDEBUG(fmt,...)
Definition radclient.h:53
#define RDEBUG_ENABLED()
Definition radclient.h:49
static rs_t * conf
Definition radsniff.c:53
#define REQUEST_VERIFY(_x)
Definition request.h:305
#define request_set_dynamic_client(_x)
Definition request.h:189
The scheduler.
Definition schedule.c:125
CONF_SECTION * conf
Module's instance configuration.
Definition module.h:349
void * data
Module's instance data.
Definition module.h:291
module_instantiate_t instantiate
Callback to allow the module to register any per-instance resources like sockets and file handles.
Definition module.h:227
conf_parser_t const * config
How to convert a CONF_SECTION to a module instance.
Definition module.h:206
module_t * exported
Public module structure.
Definition module.h:296
Module instance data.
Definition module.h:285
static const uchar sc[16]
Definition smbdes.c:115
fr_client_t * client_afrom_request(TALLOC_CTX *ctx, request_t *request)
Create a new client, consuming all attributes in the control list of the request.
Definition client.c:921
int module_instantiate(module_instance_t *instance)
Manually complete module setup by calling its instantiate function.
Definition module.c:1189
eap_aka_sim_process_conf_t * inst
fr_pair_t * vp
Stores an attribute, a value and various bits of other data.
Definition pair.h:68
@ FR_TAC_PLUS_ACCT
Definition tacacs.h:67
@ FR_TAC_PLUS_AUTHEN
Definition tacacs.h:65
@ FR_TAC_PLUS_AUTHOR
Definition tacacs.h:66
#define packet_is_encrypted(p)
Definition tacacs.h:61
#define FR_TACACS_PACKET_CODE_VALID(_code)
Definition tacacs.h:322
fr_tacacs_packet_hdr_t hdr
Definition tacacs.h:277
fr_tacacs_flags_t flags
Definition tacacs.h:99
#define talloc_get_type_abort_const
Definition talloc.h:287
static fr_time_delta_t fr_time_delta_from_sec(int64_t sec)
Definition time.h:590
static fr_slen_t parent
Definition pair.h:839
static void fr_socket_addr_swap(fr_socket_t *dst, fr_socket_t const *src)
Swap src/dst information of a fr_socket_t.
Definition socket.h:121
#define fr_box_ipaddr(_val)
Definition value.h:313
static fr_slen_t data
Definition value.h:1288
static size_t char ** out
Definition value.h:1020
int virtual_server_listen_transport_parse(TALLOC_CTX *ctx, void *out, void *parent, CONF_ITEM *ci, conf_parser_t const *rule)
Generic conf_parser_t func for loading drivers.