The FreeRADIUS server $Id: 15bac2a4c627c01d1aa2047687b3418955ac7f00 $
Loading...
Searching...
No Matches
bio.c
Go to the documentation of this file.
1/*
2 * This program is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License as published by
4 * the Free Software Foundation; either version 2 of the License, or (at
5 * your option) any later version.
6 *
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
11 *
12 * You should have received a copy of the GNU General Public License
13 * along with this program; if not, write to the Free Software
14 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
15 */
16
17/**
18 * $Id: 5c219fd263164d9632bba3d04fcb75087d7c3159 $
19 * @file src/modules/rlm_radius/bio.c
20 * @brief RADIUS BIO transport
21 *
22 * @copyright 2017 Network RADIUS SAS
23 * @copyright 2020 Arran Cudbard-Bell (a.cudbardb@freeradius.org)
24 */
25
26#include <freeradius-devel/io/application.h>
27#include <freeradius-devel/io/listen.h>
28#include <freeradius-devel/io/pair.h>
29#include <freeradius-devel/server/connection.h>
30#include <freeradius-devel/util/heap.h>
31#include <freeradius-devel/util/rb_expire.h>
32
33
34//#include "rlm_radius.h"
35#include "track.h"
36
37typedef enum {
38 LIMIT_PORTS_NONE = 0, //!< Source port not restricted
39 LIMIT_PORTS_STATIC, //!< Limited source ports for static home servers
40 LIMIT_PORTS_DYNAMIC //!< Limited source ports for dynamic home servers
42
43typedef struct {
44 char const *module_name; //!< the module that opened the connection
45 rlm_radius_t const *inst; //!< our instance
46 fr_event_list_t *el; //!< Event list.
47 trunk_t *trunk; //!< trunk handler
48 fr_bio_fd_config_t fd_config; //!< for threads or sockets
49 fr_bio_fd_info_t const *fd_info; //!< status of the FD.
50 fr_radius_ctx_t radius_ctx; //!< for signing packets
51 bio_limit_ports_t limit_source_ports; //!< What type of port limit is in use.
52 bool dynamic; //!< is this a dynamic home server.
54
55typedef struct {
56 bio_handle_ctx_t ctx; //!< common struct for home servers and BIO handles
57
58 struct {
59 fr_bio_t *fd; //!< writing
60 uint32_t id; //!< for replication
61 fr_rb_expire_t expires; //!< for proxying / client sending
62 } bio;
63
67
69
70/** Track the handle, which is tightly correlated with the FD
71 *
72 */
73typedef struct {
74 bio_handle_ctx_t ctx; //!< common struct for home servers and BIO handles
75
76 int fd; //!< File descriptor.
77
78 struct {
79 fr_bio_t *main; //!< what we use for IO
80 fr_bio_t *fd; //!< raw FD
81 fr_bio_t *mem; //!< memory wrappers for stream sockets
82 } bio;
83
85
86 uint8_t last_id; //!< Used when replicating to ensure IDs are distributed
87 ///< evenly.
88
89 uint32_t max_packet_size; //!< Our max packet size. may be different from the parent.
90
91 uint8_t *buffer; //!< Receive buffer.
92 size_t buflen; //!< Receive buffer length.
93
94 radius_track_t *tt; //!< RADIUS ID tracking structure.
95
96 fr_time_t mrs_time; //!< Most recent sent time which had a reply.
97 fr_time_t last_reply; //!< When we last received a reply.
98 fr_time_t first_sent; //!< first time we sent a packet since going idle
99 fr_time_t last_sent; //!< last time we sent a packet.
100 fr_time_t last_idle; //!< last time we had nothing to do
101
102 fr_timer_t *zombie_ev; //!< Zombie timeout.
103 unlang_t const *instruction; //!< Instruction which triggered the start of the zombie period.
104
105 bool status_checking; //!< whether we're doing status checks
106 bio_request_t *status_u; //!< for sending status check packets
109
110
111/** Connect request_t to local tracking structure
112 *
113 */
116 rlm_rcode_t rcode; //!< from the transport
118
119 uint32_t priority; //!< copied from request->async->priority
120 fr_time_t recv_time; //!< copied from request->async->recv_time
121
122 uint32_t num_replies; //!< number of reply packets, sent is in retry.count
123
124 bool status_check; //!< is this packet a status check?
125 bool proxied; //!< is this request being proxied
126
127 fr_pair_list_t extra; //!< VPs for debugging, like Proxy-State.
128
129 uint8_t code; //!< Packet code.
130 uint8_t id; //!< Last ID assigned to this packet.
131 uint8_t *packet; //!< Packet we write to the network.
132 size_t packet_len; //!< Length of the packet.
133 size_t partial; //!< partially sent data
134
135 radius_track_entry_t *rr; //!< ID tracking, resend count, etc.
136 fr_timer_t *ev; //!< timer for retransmissions
137 fr_retry_t retry; //!< retransmission timers
138};
139
140typedef struct {
141 bio_handle_ctx_t ctx; //!< for copying to bio_handle_t
142
144
146 connection_t *connections[]; //!< for tracking outbound connections
148
149
150/** Turn a reply code into a module rcode;
151 *
152 */
168
170 UNUSED int flags, void *uctx);
171
172static int encode(bio_handle_t *h, request_t *request, bio_request_t *u, uint8_t id);
173
174static fr_radius_decode_fail_t decode(TALLOC_CTX *ctx, fr_pair_list_t *reply, uint8_t *response_code,
175 bio_handle_t *h, request_t *request, bio_request_t *u,
176 uint8_t const request_authenticator[static RADIUS_AUTH_VECTOR_LENGTH],
177 uint8_t *data, size_t data_len);
178
180
181static void mod_write(request_t *request, trunk_request_t *treq, bio_handle_t *h);
182
183static int _bio_request_free(bio_request_t *u);
184
185static int8_t home_server_cmp(void const *one, void const *two);
186
187#ifndef NDEBUG
188/** Log additional information about a tracking entry
189 *
190 * @param[in] te Tracking entry we're logging information for.
191 * @param[in] log destination.
192 * @param[in] log_type Type of log message.
193 * @param[in] file the logging request was made in.
194 * @param[in] line logging request was made on.
195 */
196static void bio_tracking_entry_log(fr_log_t const *log, fr_log_type_t log_type, char const *file, int line,
198{
199 request_t *request;
200
201 if (!te->request) return; /* Free entry */
202
203 request = talloc_get_type_abort(te->request, request_t);
204
205 fr_log(log, log_type, file, line, "request %s, allocated %s:%d", request->name,
206 request->alloc_file, request->alloc_line);
207
208 trunk_request_state_log(log, log_type, file, line, talloc_get_type_abort(te->uctx, trunk_request_t));
209}
210#endif
211
212/** Clear out any connection specific resources from a udp request
213 *
214 */
216{
217 TALLOC_FREE(u->packet);
219
220 /*
221 * Can have packet put no u->rr
222 * if this is part of a pre-trunk status check.
223 */
224 if (u->rr) radius_track_entry_release(&u->rr);
225
227}
228
229/** Reset a status_check packet, ready to reuse
230 *
231 */
233{
234 fr_assert(u->status_check == true);
235
236 h->status_checking = false;
237 u->num_replies = 0; /* Reset */
238 u->retry.start = fr_time_wrap(0);
239
241
243}
244
245/*
246 * Status-Server checks. Manually build the packet, and
247 * all of its associated glue.
248 */
250{
251 bio_request_t *u;
252 request_t *request;
253 rlm_radius_t const *inst = h->ctx.inst;
254 map_t *map = NULL;
255
257
258 MEM(request = request_local_alloc_external(h, (&(request_init_args_t){ .namespace = dict_radius })));
259 MEM(u = talloc_zero(request, bio_request_t));
260 talloc_set_destructor(u, _bio_request_free);
261
262 h->status_u = u;
263
264 h->status_request = request;
266
267 /*
268 * Status checks are prioritized over any other packet
269 */
270 u->priority = ~(uint32_t) 0;
271 u->status_check = true;
272
273 /*
274 * Allocate outside of the free list.
275 * There appears to be an issue where
276 * the thread destructor runs too
277 * early, and frees the freelist's
278 * head before the module destructor
279 * runs.
280 */
281 request->async = talloc_zero(request, fr_async_t);
282 talloc_const_free(request->name);
283 request->name = talloc_strdup(request, h->ctx.module_name);
284
285 request->packet = fr_packet_alloc(request, false);
286 request->reply = fr_packet_alloc(request, false);
287
288 /*
289 * Create the VPs, and ignore any errors
290 * creating them.
291 */
292 while ((map = map_list_next(&inst->status_check_map, map))) {
293 (void) map_to_request(request, map, map_to_vp, NULL);
294 }
295
296 /*
297 * Ensure that there's a NAS-Identifier, if one wasn't
298 * already added.
299 */
300 if (!fr_pair_find_by_da(&request->request_pairs, NULL, attr_nas_identifier)) {
301 fr_pair_t *vp;
302
304 fr_pair_value_strdup(vp, "status check - are you alive?", false);
305 }
306
307 /*
308 * Always add an Event-Timestamp, which will be the time
309 * at which the first packet is sent. Or for
310 * Status-Server, the time of the current packet.
311 */
312 if (!fr_pair_find_by_da(&request->request_pairs, NULL, attr_event_timestamp)) {
314 }
315
316 /*
317 * Initialize the request IO ctx. Note that we don't set
318 * destructors.
319 */
320 u->code = inst->status_check;
321 request->packet->code = u->code;
322
323 DEBUG3("%s - Status check packet type will be %s", h->ctx.module_name, fr_radius_packet_name[u->code]);
324 log_request_proto_pair_list(L_DBG_LVL_3, request, NULL, &request->request_pairs, NULL);
325}
326
327/** Connection errored
328 *
329 * We were signalled by the event loop that a fatal error occurred on this connection.
330 *
331 * @param[in] el The event list signalling.
332 * @param[in] fd that errored.
333 * @param[in] flags El flags.
334 * @param[in] fd_errno The nature of the error.
335 * @param[in] uctx The trunk connection handle (tconn).
336 */
337static void conn_init_error(UNUSED fr_event_list_t *el, UNUSED int fd, UNUSED int flags, int fd_errno, void *uctx)
338{
339 connection_t *conn = talloc_get_type_abort(uctx, connection_t);
340 bio_handle_t *h;
341
342 /*
343 * Connection must be in the connecting state when this fires
344 */
346
347 h = talloc_get_type_abort(conn->h, bio_handle_t);
348
349 ERROR("%s - Connection %s failed: %s", h->ctx.module_name, h->ctx.fd_info->name, fr_syserror(fd_errno));
350
352}
353
354/** Status check timer when opening the connection for the first time.
355 *
356 * Setup retries, or fail the connection.
357 */
358static void conn_init_timeout(UNUSED fr_timer_list_t *tl, fr_time_t now, void *uctx)
359{
360 connection_t *conn = talloc_get_type_abort(uctx, connection_t);
361 bio_handle_t *h;
362 bio_request_t *u;
363
364 /*
365 * Connection must be in the connecting state when this fires
366 */
368
369 h = talloc_get_type_abort(conn->h, bio_handle_t);
370 u = h->status_u;
371
372 /*
373 * We're only interested in contiguous, good, replies.
374 */
375 u->num_replies = 0;
376
377 switch (fr_retry_next(&u->retry, now)) {
378 case FR_RETRY_MRD:
379 DEBUG("%s - Reached maximum_retransmit_duration (%pVs > %pVs), failing status checks",
382 goto fail;
383
384 case FR_RETRY_MRC:
385 DEBUG("%s - Reached maximum_retransmit_count (%u > %u), failing status checks",
387 fail:
389 return;
390
392 if (fr_event_fd_insert(h, NULL, conn->el, h->fd, conn_init_writable, NULL,
393 conn_init_error, conn) < 0) {
394 PERROR("%s - Failed inserting FD event", h->ctx.module_name);
396 }
397 return;
398 }
399
400 fr_assert(0);
401}
402
403/** Perform the next step of init and negotiation.
404 *
405 */
406static void conn_init_next(UNUSED fr_timer_list_t *tl, UNUSED fr_time_t now, void *uctx)
407{
408 connection_t *conn = talloc_get_type_abort(uctx, connection_t);
409 bio_handle_t *h = talloc_get_type_abort(conn->h, bio_handle_t);
410
411 if (fr_event_fd_insert(h, NULL, conn->el, h->fd, conn_init_writable, NULL, conn_init_error, conn) < 0) {
412 PERROR("%s - Failed inserting FD event", h->ctx.module_name);
414 }
415}
416
417/** Read the connection during the init and negotiation stage.
418 *
419 */
420static void conn_init_readable(fr_event_list_t *el, UNUSED int fd, UNUSED int flags, void *uctx)
421{
422 connection_t *conn = talloc_get_type_abort(uctx, connection_t);
423 bio_handle_t *h = talloc_get_type_abort(conn->h, bio_handle_t);
424 trunk_t *trunk = h->ctx.trunk;
425 rlm_radius_t const *inst = h->ctx.inst;
426 bio_request_t *u = h->status_u;
427 ssize_t slen;
428 fr_pair_list_t reply;
429 uint8_t code = 0;
430
431 fr_pair_list_init(&reply);
432 slen = fr_bio_read(h->bio.main, NULL, h->buffer, h->buflen);
433 if (slen == 0) {
434 /*
435 * @todo - set BIO FD EOF callback, so that we don't have to check it here.
436 */
437 if (h->ctx.fd_info->eof) goto failed;
438 return;
439 }
440
441 /*
442 * We're done reading, return.
443 */
444 if (slen == fr_bio_error(IO_WOULD_BLOCK)) return;
445
446 if (slen < 0) {
447 switch (errno) {
448 case ECONNREFUSED:
449 ERROR("%s - Failed reading response from socket: there is no server listening on outgoing connection %s",
450 h->ctx.module_name, h->ctx.fd_info->name);
451 break;
452
453 default:
454 ERROR("%s - Failed reading response from socket: %s",
455 h->ctx.module_name, fr_syserror(errno));
456 break;
457 }
458
459 failed:
461 return;
462 }
463
464 /*
465 * Where we just return in this function, we're letting
466 * the response timer take care of progressing the
467 * connection attempt.
468 */
469 fr_assert(slen >= RADIUS_HEADER_LENGTH); /* checked in verify */
470
471 if (!u->packet) {
472 ERROR("%s - Received response to expired status check packet",
473 h->ctx.module_name);
474 return;
475 }
476
477 if (u->id != h->buffer[1]) {
478 ERROR("%s - Received response with incorrect or expired ID. Expected %u, got %u",
479 h->ctx.module_name, u->id, h->buffer[1]);
480 return;
481 }
482
483 if (decode(h, &reply, &code,
485 h->buffer, slen) != FR_RADIUS_FAIL_NONE) return;
486
487 fr_pair_list_free(&reply); /* FIXME - Do something with these... */
488
489 /*
490 * Process the error, and count this as a success.
491 * This is usually used for dynamic configuration
492 * on startup.
493 */
495
496 /*
497 * Last trunk event was a failure, be more careful about
498 * bringing up the connection (require multiple responses).
499 */
500 if ((fr_time_gt(trunk->last_failed, fr_time_wrap(0)) && (fr_time_gt(trunk->last_failed, trunk->last_connected))) &&
501 (u->num_replies < inst->num_answers_to_alive)) {
502 /*
503 * Leave the timer in place. This timer is BOTH when we
504 * give up on the current status check, AND when we send
505 * the next status check.
506 */
507 DEBUG("%s - Received %u / %u replies for status check, on connection - %s",
508 h->ctx.module_name, u->num_replies, inst->num_answers_to_alive, h->ctx.fd_info->name);
509 DEBUG("%s - Next status check packet will be in %pVs",
511
512 /*
513 * Set the timer for the next retransmit.
514 */
515 if (fr_timer_at(h, el->tl, &u->ev, u->retry.next, false, conn_init_next, conn) < 0) {
517 }
518 return;
519 }
520
521 /*
522 * It's alive!
523 */
524 status_check_reset(h, u);
525
526 DEBUG("%s - Connection open - %s", h->ctx.module_name, h->ctx.fd_info->name);
527
529}
530
531/** Send initial negotiation.
532 *
533 */
534static void conn_init_writable(fr_event_list_t *el, UNUSED int fd, UNUSED int flags, void *uctx)
535{
536 connection_t *conn = talloc_get_type_abort(uctx, connection_t);
537 bio_handle_t *h = talloc_get_type_abort(conn->h, bio_handle_t);
538 bio_request_t *u = h->status_u;
539 ssize_t slen;
540
541 if (fr_time_eq(u->retry.start, fr_time_wrap(0))) {
542 u->id = fr_rand() & 0xff; /* We don't care what the value is here */
543 h->status_checking = true; /* Ensure this is valid */
544 fr_retry_init(&u->retry, fr_time(), &h->ctx.inst->retry[u->code]);
545
546 /*
547 * Status checks can never be retransmitted
548 * So increment the ID here.
549 */
550 } else {
552 u->id++;
553 }
554
555 DEBUG("%s - Sending %s ID %d over connection %s",
557
558 if (encode(h, h->status_request, u, u->id) < 0) {
559 fail:
561 return;
562 }
563 DEBUG3("Encoded packet");
564 HEXDUMP3(u->packet, u->packet_len, NULL);
565
566 fr_assert(u->packet != NULL);
568
569 slen = fr_bio_write(h->bio.main, NULL, u->packet, u->packet_len);
570
571 if (slen == fr_bio_error(IO_WOULD_BLOCK)) goto blocked;
572
573 if (slen < 0) {
574 ERROR("%s - Failed sending %s ID %d length %zu over connection %s: %s",
576
577
578 goto fail;
579 }
580
581 /*
582 * @todo - handle partial packets and blocked writes.
583 */
584 if ((size_t)slen < u->packet_len) {
585 blocked:
586 ERROR("%s - Failed sending %s ID %d length %zu over connection %s: writing is blocked",
588 goto fail;
589 }
590
591 /*
592 * Switch to waiting on read and insert the event
593 * for the response timeout.
594 */
595 if (fr_event_fd_insert(h, NULL, conn->el, h->fd, conn_init_readable, NULL, conn_init_error, conn) < 0) {
596 PERROR("%s - Failed inserting FD event", h->ctx.module_name);
597 goto fail;
598 }
599
600 DEBUG("%s - %s request. Expecting response within %pVs",
601 h->ctx.module_name, (u->retry.count == 1) ? "Originated" : "Retransmitted",
603
604 if (fr_timer_at(h, el->tl, &u->ev, u->retry.next, false, conn_init_timeout, conn) < 0) {
605 PERROR("%s - Failed inserting timer event", h->ctx.module_name);
606 goto fail;
607 }
608}
609
610/** Free a connection handle, closing associated resources
611 *
612 */
614{
615 fr_assert(h != NULL);
616
617 fr_assert(h->fd >= 0);
618
620
621 /*
622 * The connection code will take care of deleting the FD from the event loop.
623 */
624
625 DEBUG("%s - Connection closed - %s", h->ctx.module_name, h->ctx.fd_info->name);
626
627 return 0;
628}
629
630static void bio_connected(fr_bio_t *bio)
631{
632 bio_handle_t *h = bio->uctx;
633
634 DEBUG("%s - Connection open - %s", h->ctx.module_name, h->ctx.fd_info->name);
635
637}
638
639static void bio_error(fr_bio_t *bio)
640{
641 bio_handle_t *h = bio->uctx;
642
643 DEBUG("%s - Connection failed - %s - %s", h->ctx.module_name, h->ctx.fd_info->name,
645
647}
648
649static fr_bio_verify_action_t rlm_radius_verify(UNUSED fr_bio_t *bio, void *verify_ctx, UNUSED void *packet_ctx, const void *data, size_t *size)
650{
652 size_t in_buffer = *size;
653 bio_handle_t *h = verify_ctx;
654 uint8_t const *hdr = data;
655 size_t want;
656
657 if (in_buffer < 20) {
658 *size = RADIUS_HEADER_LENGTH;
660 }
661
662 /*
663 * Packet is too large, discard it.
664 */
665 want = fr_nbo_to_uint16(hdr + 2);
666 if (want > h->ctx.inst->max_packet_size) {
667 ERROR("%s - Connection %s received too long packet", h->ctx.module_name, h->ctx.fd_info->name);
669 }
670
671 /*
672 * Not a full packet, we want more data.
673 */
674 if (want > *size) {
675 *size = want;
677 }
678
679#define REQUIRE_MA(_h) (((_h)->ctx.inst->require_message_authenticator == FR_RADIUS_REQUIRE_MA_YES) || *(_h)->ctx.inst->received_message_authenticator)
680
681 /*
682 * See if we need to discard the packet.
683 *
684 * @todo - rate limit these messages, and find a way to associate them with a request, or even
685 * the logging destination of the module.
686 */
687 if (!fr_radius_ok(data, size, h->ctx.inst->max_attributes, REQUIRE_MA(h), &failure)) {
689
690 PERROR("%s - Connection %s received bad packet", h->ctx.module_name, h->ctx.fd_info->name);
691
692 if (failure == FR_RADIUS_FAIL_MA_MISSING) {
694 ERROR("We are configured with 'require_message_authenticator = true'");
695 } else {
696 ERROR("We previously received a packet from this client which included a Message-Authenticator attribute");
697 }
698 }
699
700 if (h->ctx.fd_config.socket_type == SOCK_DGRAM) return FR_BIO_VERIFY_DISCARD;
701
703 }
704
705 /*
706 * @todo - check if the reply is allowed. Bad replies are discarded later, but it might be worth
707 * checking them here.
708 */
709
710 /*
711 * On input, *size is how much data we have. On output, *size is how much data we want.
712 */
713 return (in_buffer >= *size) ? FR_BIO_VERIFY_OK : FR_BIO_VERIFY_WANT_MORE;
714}
715
716
717/** Initialise a new outbound connection
718 *
719 * @param[out] h_out Where to write the new file descriptor.
720 * @param[in] conn to initialise.
721 * @param[in] uctx A #bio_handle_ctx_t
722 */
723CC_NO_UBSAN(function) /* UBSAN: false positive - public vs private connection_t trips --fsanitize=function*/
724static connection_state_t conn_init(void **h_out, connection_t *conn, void *uctx)
725{
726 int fd;
727 bio_handle_t *h;
728 bio_handle_ctx_t *ctx = uctx; /* thread or home server */
729 connection_t **to_save = NULL;
730
731 MEM(h = talloc_zero(conn, bio_handle_t));
732 h->ctx = *ctx;
733 h->conn = conn;
735 h->last_idle = fr_time();
736
737 MEM(h->buffer = talloc_array(h, uint8_t, h->max_packet_size));
738 h->buflen = h->max_packet_size;
739
740 MEM(h->tt = radius_track_alloc(h));
741
742 /*
743 * We are proxying to multiple home servers, but using a limited port range. We must track the
744 * source port for each home server, so that we only can select the right unused source port for
745 * this home server.
746 */
747 switch (ctx->limit_source_ports) {
748 case LIMIT_PORTS_NONE:
749 break;
750
751 /*
752 * Dynamic home servers store source port usage in the home_server_t
753 */
755 {
756 int i;
757 home_server_t *home = talloc_get_type_abort(ctx, home_server_t);
758
759 for (i = 0; i < home->num_ports; i++) {
760 if (!home->connections[i]) {
761 to_save = &home->connections[i];
762
763 /*
764 * Set the source port, but also leave the src_port_start and
765 * src_port_end alone.
766 */
768 break;
769 }
770 }
771
772 if (!to_save) {
773 ERROR("%s - Failed opening socket to home server %pV:%u - source port range is full",
775 goto fail;
776 }
777 }
778 break;
779
780 /*
781 * Static home servers store source port usage in bio_thread_t
782 */
784 {
785 int i;
786 bio_thread_t *thread = talloc_get_type_abort(ctx, bio_thread_t);
787
788 for (i = 0; i < thread->num_ports; i++) {
789 if (!thread->connections[i]) {
790 to_save = &thread->connections[i];
792 break;
793 }
794 }
795
796 if (!to_save) {
797 ERROR("%s - Failed opening socket to home server %pV:%u - source port range is full",
799 goto fail;
800 }
801 }
802 break;
803 }
804
805 h->bio.fd = fr_bio_fd_alloc(h, &h->ctx.fd_config, 0);
806 if (!h->bio.fd) {
807 PERROR("%s - failed opening socket", h->ctx.module_name);
808 fail:
809 talloc_free(h);
811 }
812
813 h->bio.fd->uctx = h;
815
816 fd = h->ctx.fd_info->socket.fd;
817 fr_assert(fd >= 0);
818
819 /*
820 * Create a memory BIO for stream sockets. We want to return only complete packets, and not
821 * partial packets.
822 *
823 * @todo - maybe we want to have a fr_bio_verify_t which is independent of fr_bio_mem_t. That
824 * way we don't need a memory BIO for UDP sockets, but we can still add a verification layer for
825 * UDP sockets?
826 */
827 h->bio.mem = fr_bio_mem_alloc(h, (h->ctx.fd_config.socket_type == SOCK_DGRAM) ? 0 : h->ctx.inst->max_packet_size * 4,
828 0, h->bio.fd);
829 if (!h->bio.mem) {
830 PERROR("%s - Failed allocating memory buffer - ", h->ctx.module_name);
831 goto fail;
832 }
833
834 if (fr_bio_mem_set_verify(h->bio.mem, rlm_radius_verify, h, (h->ctx.fd_config.socket_type == SOCK_DGRAM)) < 0) {
835 PERROR("%s - Failed setting validation callback - ", h->ctx.module_name);
836 goto fail;
837 }
838
839 /*
840 * Set the BIO read function to be the memory BIO, which will then call the packet verification
841 * routine.
842 */
843 h->bio.main = h->bio.mem;
844 h->bio.mem->uctx = h;
845
846 h->fd = fd;
847
848 talloc_set_destructor(h, _bio_handle_free);
849
850 /*
851 * If the socket isn't connected, then do that first.
852 */
854 int rcode;
855
857
858 /*
859 * We don't pass timeouts here because the trunk has it's own connection timeouts.
860 */
861 rcode = fr_bio_fd_connect_full(h->bio.fd, conn->el, bio_connected, bio_error, NULL, NULL);
862 if (rcode < 0) goto fail;
863
864 *h_out = h;
865
866 if (rcode == 0) return CONNECTION_STATE_CONNECTING;
867
868 fr_assert(rcode == 1);
870
871 /*
872 * If we're doing status checks, then we want at least
873 * one positive response before signalling that the
874 * connection is open.
875 *
876 * To do this we install special I/O handlers that
877 * only signal the connection as open once we get a
878 * status-check response.
879 */
880 } if (h->ctx.inst->status_check) {
882
883 /*
884 * Start status checking.
885 *
886 * If we've had no recent failures we need exactly
887 * one response to bring the connection online,
888 * otherwise we need inst->num_answers_to_alive
889 */
890 if (fr_event_fd_insert(h, NULL, conn->el, h->fd, NULL,
891 conn_init_writable, conn_init_error, conn) < 0) goto fail;
892
893 /*
894 * If we're not doing status-checks, signal the connection
895 * as open as soon as it becomes writable.
896 */
897 } else {
898 connection_signal_on_fd(conn, fd);
899 }
900
901 *h_out = h;
902
903 if (to_save) *to_save = conn;
904
906}
907
908/** Shutdown/close a file descriptor
909 *
910 */
911static void conn_close(UNUSED fr_event_list_t *el, void *handle, void *uctx)
912{
913 bio_handle_t *h = talloc_get_type_abort(handle, bio_handle_t);
914
915 /*
916 * There's tracking entries still allocated
917 * this is bad, they should have all been
918 * released.
919 */
920 if (h->tt && (h->tt->num_requests != 0)) {
921#ifndef NDEBUG
923#endif
924 fr_assert_fail("%u tracking entries still allocated at conn close", h->tt->num_requests);
925 }
926
927 /*
928 * We have opened a limited number of outbound source ports. This means that when we close a
929 * port, we have to mark it unused.
930 */
931 switch (h->ctx.limit_source_ports) {
932 case LIMIT_PORTS_NONE:
933 break;
934
936 {
937 int offset;
938 home_server_t *home = talloc_get_type_abort(uctx, home_server_t);
939
942
944 fr_assert(offset < home->num_ports);
945
946 fr_assert(home->connections[offset] == h->conn);
947
948 home->connections[offset] = NULL;
949 }
950 break;
951
953 {
954 int offset;
955 bio_thread_t *thread = talloc_get_type_abort(uctx, bio_thread_t);
956
959
961 fr_assert(offset < thread->num_ports);
962
963 fr_assert(thread->connections[offset] == h->conn);
964
965 thread->connections[offset] = NULL;
966 }
967 break;
968 }
969
970 DEBUG4("Freeing handle %p", handle);
971
972 talloc_free(h);
973}
974
975/** Connection failed
976 *
977 * @param[in] handle of connection that failed.
978 * @param[in] state the connection was in when it failed.
979 * @param[in] uctx UNUSED.
980 */
981static connection_state_t conn_failed(void *handle, connection_state_t state, UNUSED void *uctx)
982{
983 switch (state) {
984 /*
985 * If the connection was connected when it failed,
986 * we need to handle any outstanding packets and
987 * timer events before reconnecting.
988 */
990 {
991 bio_handle_t *h = talloc_get_type_abort(handle, bio_handle_t); /* h only available if connected */
992
993 /*
994 * Reset the Status-Server checks.
995 */
996 if (h->status_u) FR_TIMER_DISARM(h->status_u->ev);
997 break;
998
999 default:
1000 break;
1001 }
1002 }
1003
1004 return CONNECTION_STATE_INIT;
1005}
1006
1007CC_NO_UBSAN(function) /* UBSAN: false positive - public vs private connection_t trips --fsanitize=function*/
1009 connection_conf_t const *conf,
1010 char const *log_prefix, void *uctx)
1011{
1012 connection_t *conn;
1013 bio_handle_ctx_t *ctx = uctx; /* thread or home server */
1014
1015 conn = connection_alloc(tconn, el,
1017 .init = conn_init,
1018 .close = conn_close,
1019 .failed = conn_failed
1020 },
1021 conf,
1022 log_prefix,
1023 uctx);
1024 if (!conn) {
1025 PERROR("%s - Failed allocating state handler for new connection", ctx->inst->name);
1026 return NULL;
1027 }
1028 ctx->trunk = tconn->trunk;
1029 ctx->module_name = log_prefix;
1030
1031 return conn;
1032}
1033
1034/** Read and discard data
1035 *
1036 */
1037static void conn_discard(UNUSED fr_event_list_t *el, UNUSED int fd, UNUSED int flags, void *uctx)
1038{
1039 trunk_connection_t *tconn = talloc_get_type_abort(uctx, trunk_connection_t);
1040 bio_handle_t *h = talloc_get_type_abort(tconn->conn->h, bio_handle_t);
1041 uint8_t buffer[4096];
1042 ssize_t slen;
1043
1044 while ((slen = fr_bio_read(h->bio.main, NULL, buffer, sizeof(buffer))) > 0);
1045
1046 if (slen < 0) {
1047 switch (errno) {
1048 case EBADF:
1049 case ECONNRESET:
1050 case ENOTCONN:
1051 case ETIMEDOUT:
1052 ERROR("%s - Failed draining socket: %s", h->ctx.module_name, fr_syserror(errno));
1054 break;
1055
1056 default:
1057 break;
1058 }
1059 }
1060}
1061
1062/** Connection errored
1063 *
1064 * We were signalled by the event loop that a fatal error occurred on this connection.
1065 *
1066 * @param[in] el The event list signalling.
1067 * @param[in] fd that errored.
1068 * @param[in] flags El flags.
1069 * @param[in] fd_errno The nature of the error.
1070 * @param[in] uctx The trunk connection handle (tconn).
1071 */
1072static void conn_error(UNUSED fr_event_list_t *el, UNUSED int fd, UNUSED int flags, int fd_errno, void *uctx)
1073{
1074 trunk_connection_t *tconn = talloc_get_type_abort(uctx, trunk_connection_t);
1075 connection_t *conn = tconn->conn;
1076 bio_handle_t *h = talloc_get_type_abort(conn->h, bio_handle_t);
1077
1078 if (fd_errno) ERROR("%s - Connection %s failed: %s", h->ctx.module_name, h->ctx.fd_info->name, fr_syserror(fd_errno));
1079
1081}
1082
1083CC_NO_UBSAN(function) /* UBSAN: false positive - public vs private connection_t trips --fsanitize=function*/
1086 trunk_connection_event_t notify_on, UNUSED void *uctx)
1087{
1088 bio_handle_t *h = talloc_get_type_abort(conn->h, bio_handle_t);
1089 fr_event_fd_cb_t read_fn = NULL;
1090 fr_event_fd_cb_t write_fn = NULL;
1091
1092 switch (notify_on) {
1093 /*
1094 * We may have sent multiple requests to the
1095 * other end, so it might be sending us multiple
1096 * replies. We want to drain the socket, instead
1097 * of letting the packets sit in the UDP receive
1098 * queue.
1099 */
1101 read_fn = conn_discard;
1102 break;
1103
1106 break;
1107
1110 break;
1111
1115 break;
1116
1117 }
1118
1119 /*
1120 * Over-ride read for replication.
1121 */
1123 read_fn = conn_discard;
1124
1125 if (fr_bio_fd_write_only(h->bio.fd) < 0) {
1126 PERROR("%s - Failed setting socket to write-only", h->ctx.module_name);
1128 return;
1129 }
1130 }
1131
1132 if (fr_event_fd_insert(h, NULL, el, h->fd,
1133 read_fn,
1134 write_fn,
1135 conn_error,
1136 tconn) < 0) {
1137 PERROR("%s - Failed inserting FD event", h->ctx.module_name);
1138
1139 /*
1140 * May free the connection!
1141 */
1143 }
1144}
1145
1146/*
1147 * Return negative numbers to put 'a' at the top of the heap.
1148 * Return positive numbers to put 'b' at the top of the heap.
1149 *
1150 * We want the value with the lowest timestamp to be prioritized at
1151 * the top of the heap.
1152 */
1153static int8_t request_prioritise(void const *one, void const *two)
1154{
1155 bio_request_t const *a = one;
1156 bio_request_t const *b = two;
1157 int8_t ret;
1158
1159 /*
1160 * Prioritise status check packets
1161 */
1163 if (ret != 0) return ret;
1164
1165 /*
1166 * Larger priority is more important.
1167 */
1168 ret = CMP_PREFER_LARGER(a->priority, b->priority);
1169 if (ret != 0) return ret;
1170
1171 /*
1172 * Smaller timestamp (i.e. earlier) is more important.
1173 */
1174 return fr_time_cmp(a->recv_time, b->recv_time);
1175}
1176
1177/** Decode response packet data, extracting relevant information and validating the packet
1178 *
1179 * @param[in] ctx to allocate pairs in.
1180 * @param[out] reply Pointer to head of pair list to add reply attributes to.
1181 * @param[out] response_code The type of response packet.
1182 * @param[in] h connection handle.
1183 * @param[in] request the request.
1184 * @param[in] u UDP request.
1185 * @param[in] request_authenticator from the original request.
1186 * @param[in] data to decode.
1187 * @param[in] data_len Length of input data.
1188 * @return
1189 * - FR_RADIUS_FAIL_NONE on success.
1190 * - FR_RADIUS_FAIL_* on failure.
1191 */
1192static fr_radius_decode_fail_t decode(TALLOC_CTX *ctx, fr_pair_list_t *reply, uint8_t *response_code,
1193 bio_handle_t *h, request_t *request, bio_request_t *u,
1194 uint8_t const request_authenticator[static RADIUS_AUTH_VECTOR_LENGTH],
1195 uint8_t *data, size_t data_len)
1196{
1198 uint8_t code;
1199 fr_radius_decode_ctx_t decode_ctx;
1200
1201 *response_code = 0; /* Initialise to keep the rest of the code happy */
1202
1203 RHEXDUMP3(data, data_len, "Read packet");
1204
1205 decode_ctx = (fr_radius_decode_ctx_t) {
1206 .common = &h->ctx.radius_ctx,
1207 .request_code = u->code,
1208 .request_authenticator = request_authenticator,
1209 .tmp_ctx = talloc(ctx, uint8_t),
1210 .end = data + data_len,
1211 .verify = true,
1212 .require_message_authenticator = REQUIRE_MA(h),
1213 };
1214
1215 if (fr_radius_decode(ctx, reply, data, data_len, &decode_ctx) < 0) {
1216 talloc_free(decode_ctx.tmp_ctx);
1217 RPEDEBUG("Failed reading packet");
1218 return decode_ctx.reason;
1219 }
1220 talloc_free(decode_ctx.tmp_ctx);
1221
1222 code = data[0];
1223
1224 RDEBUG("Received %s ID %d length %zu reply packet on connection %s",
1225 fr_radius_packet_name[code], data[1], data_len, h->ctx.fd_info->name);
1226 log_request_pair_list(L_DBG_LVL_2, request, NULL, reply, NULL);
1227
1228 /*
1229 * This code is for BlastRADIUS mitigation.
1230 *
1231 * The scenario where this applies is where we send Message-Authenticator
1232 * but the home server doesn't support it or require it, in which case
1233 * the response can be manipulated by an attacker.
1234 */
1235 if ((u->code == FR_RADIUS_CODE_ACCESS_REQUEST) &&
1236 (inst->require_message_authenticator == FR_RADIUS_REQUIRE_MA_AUTO) &&
1237 !*(inst->received_message_authenticator) &&
1239 !fr_pair_find_by_da(reply, NULL, attr_eap_message)) {
1240 RINFO("Packet contained a valid Message-Authenticator. Setting \"require_message_authenticator = yes\"");
1241 *(inst->received_message_authenticator) = true;
1242 }
1243
1244 *response_code = code;
1245
1246 /*
1247 * Record the fact we've seen a response
1248 */
1249 u->num_replies++;
1250
1251 /*
1252 * Fixup retry times
1253 */
1254 if (fr_time_gt(u->retry.start, h->mrs_time)) h->mrs_time = u->retry.start;
1255
1256 return FR_RADIUS_FAIL_NONE;
1257}
1258
1259static int encode(bio_handle_t *h, request_t *request, bio_request_t *u, uint8_t id)
1260{
1261 ssize_t packet_len;
1263 rlm_radius_t const *inst = h->ctx.inst;
1264
1265 fr_assert(inst->allowed[u->code]);
1266 fr_assert(!u->packet);
1267
1268 u->packet_len = inst->max_packet_size;
1269 u->packet = h->buffer;
1270
1271 /*
1272 * We should have at minimum 64-byte packets, so don't
1273 * bother doing run-time checks here.
1274 */
1276
1278 .common = &h->ctx.radius_ctx,
1279 .rand_ctx = (fr_fast_rand_t) {
1280 .a = fr_rand(),
1281 .b = fr_rand(),
1282 },
1283 .code = u->code,
1284 .id = id,
1285 .add_proxy_state = u->proxied,
1286 };
1287
1288 /*
1289 * If we're sending a status check packet, update any
1290 * necessary timestamps. Also, don't add Proxy-State, as
1291 * we're originating the packet.
1292 */
1293 if (u->status_check) {
1294 fr_pair_t *vp;
1295
1296 vp = fr_pair_find_by_da(&request->request_pairs, NULL, attr_event_timestamp);
1297 if (vp) vp->vp_date = fr_time_to_unix_time(u->retry.updated);
1298
1299 encode_ctx.add_proxy_state = false;
1300 }
1301
1302 /*
1303 * Encode it, leaving room for Proxy-State if necessary.
1304 */
1305 packet_len = fr_radius_encode(&FR_DBUFF_TMP(u->packet, u->packet_len),
1306 &request->request_pairs, &encode_ctx);
1307 if (packet_len < 0) {
1308 RPERROR("Failed encoding packet");
1309 return -1;
1310 }
1311
1312 /*
1313 * The encoded packet should NOT over-run the input buffer.
1314 */
1315 fr_assert((size_t) packet_len <= u->packet_len);
1316
1317 /*
1318 * Add Proxy-State to the tail end of the packet.
1319 *
1320 * We need to add it here, and NOT in
1321 * request->request_pairs, because multiple modules
1322 * may be sending the packets at the same time.
1323 */
1324 if (encode_ctx.add_proxy_state) {
1325 fr_pair_t *vp;
1326
1328 fr_pair_value_memdup(vp, (uint8_t const *) &inst->common_ctx.proxy_state, sizeof(inst->common_ctx.proxy_state), false);
1329 fr_pair_append(&u->extra, vp);
1330 packet_len += 2 + sizeof(inst->common_ctx.proxy_state);
1331 }
1332
1333 /*
1334 * Update our version of the packet length.
1335 */
1336 u->packet_len = packet_len;
1337
1338 /*
1339 * Now that we're done mangling the packet, sign it.
1340 */
1341 if (fr_radius_sign(u->packet, NULL, (uint8_t const *) h->ctx.radius_ctx.secret,
1342 h->ctx.radius_ctx.secret_length) < 0) {
1343 RPERROR("Failed signing packet");
1344 return -1;
1345 }
1346
1347 MEM(u->packet = talloc_memdup(u, h->buffer, packet_len));
1348
1349 return 0;
1350}
1351
1352
1353/** Revive a connection after "revive_interval"
1354 *
1355 */
1356static void revive_timeout(UNUSED fr_timer_list_t *tl, UNUSED fr_time_t now, void *uctx)
1357{
1358 trunk_connection_t *tconn = talloc_get_type_abort(uctx, trunk_connection_t);
1359 bio_handle_t *h = talloc_get_type_abort(tconn->conn->h, bio_handle_t);
1360
1361 INFO("%s - Reviving connection %s", h->ctx.module_name, h->ctx.fd_info->name);
1363}
1364
1365/** Mark a connection dead after "zombie_interval"
1366 *
1367 */
1368static void zombie_timeout(fr_timer_list_t *tl, fr_time_t now, void *uctx)
1369{
1370 trunk_connection_t *tconn = talloc_get_type_abort(uctx, trunk_connection_t);
1371 bio_handle_t *h = talloc_get_type_abort(tconn->conn->h, bio_handle_t);
1372
1373 INFO("%s - No replies during 'zombie_period', marking connection %s as dead", h->ctx.module_name, h->ctx.fd_info->name);
1374
1375 /*
1376 * Don't use this connection, and re-queue all of its
1377 * requests onto other connections.
1378 */
1380
1381 /*
1382 * We do have status checks. Try to reconnect the
1383 * connection immediately. If the status checks pass,
1384 * then the connection will be marked "alive"
1385 */
1386 if (h->ctx.inst->status_check) {
1388 return;
1389 }
1390
1391 if (!h->ctx.dynamic) {
1392 /*
1393 * Force the instruction to immediately fail until the revive interval has expired.
1394 */
1395 unlang_interpret_force_result(h->instruction, &(unlang_result_t){.rcode = RLM_MODULE_FAIL}, tl,
1397
1398 /*
1399 * Mark the connection as active, so when the module forced result times out
1400 * requests will be sent again.
1401 */
1403 return;
1404 }
1405
1406 /*
1407 * Revive the connection after a time.
1408 */
1409 if (fr_timer_at(h, tl, &h->zombie_ev,
1410 fr_time_add(now, h->ctx.inst->revive_interval), false,
1411 revive_timeout, tconn) < 0) {
1412 ERROR("Failed inserting revive timeout for connection");
1414 }
1415}
1416
1417
1418/** See if the connection is zombied.
1419 *
1420 * We check for zombie when major events happen:
1421 *
1422 * 1) request hits its final timeout
1423 * 2) request timer hits, and it needs to be retransmitted
1424 * 3) a DUP packet comes in, and the request needs to be retransmitted
1425 * 4) we're sending a packet.
1426 *
1427 * There MIGHT not be retries configured, so we MUST check for zombie
1428 * when any new packet comes in. Similarly, there MIGHT not be new
1429 * packets, but retries are configured, so we have to check there,
1430 * too.
1431 *
1432 * Also, the socket might not be writable for a while. There MIGHT
1433 * be a long time between getting the timer / DUP signal, and the
1434 * request finally being written to the socket. So we need to check
1435 * for zombie at BOTH the timeout and the mux / write function.
1436 *
1437 * @return
1438 * - true if the connection is zombie.
1439 * - false if the connection is not zombie.
1440 */
1441static bool check_for_zombie(request_t *request, trunk_connection_t *tconn, fr_time_t now, fr_time_t last_sent)
1442{
1443 bio_handle_t *h = talloc_get_type_abort(tconn->conn->h, bio_handle_t);
1445
1446 /*
1447 * We're replicating, and don't care about the health of
1448 * the home server, and this function should not be called.
1449 */
1451
1452 /*
1453 * If we're status checking OR already zombie, don't go to zombie
1454 */
1455 if (h->status_checking || fr_timer_armed(h->zombie_ev)) return true;
1456
1457 if (fr_time_eq(now, fr_time_wrap(0))) now = fr_time();
1458
1459 /*
1460 * We received a reply since this packet was sent, the connection isn't zombie.
1461 */
1462 if (fr_time_gteq(h->last_reply, last_sent)) return false;
1463
1464 /*
1465 * If we've seen ANY response in the allowed window, then the connection is still alive.
1466 */
1467 if ((h->ctx.inst->mode == RLM_RADIUS_MODE_PROXY) &&
1468 fr_time_gt(h->last_reply, fr_time_sub(now, h->ctx.inst->response_window))) return false;
1469
1470 /*
1471 * Stop using it for new requests.
1472 */
1473 WARN("%s - Entering Zombie state - connection %s", h->ctx.module_name, h->ctx.fd_info->name);
1475
1476 if (h->ctx.inst->status_check) {
1477 /*
1478 * If it's UDP, reconnect. This will start the sending of status checks.
1479 */
1480 if (h->ctx.inst->fd_config.socket_type == SOCK_DGRAM) {
1483 }
1484
1485 h->status_checking = true;
1486
1487 /*
1488 * Queue up the status check packet. It will be sent
1489 * when the connection is writable.
1490 */
1492 h->status_u->treq = NULL;
1493
1495 h->status_u, h->status_u, true) != TRUNK_ENQUEUE_OK) {
1497 }
1498 } else {
1499 /*
1500 * Capture the instruction which started the zombie period.
1501 */
1503
1504 if (fr_timer_at(h, el->tl, &h->zombie_ev, fr_time_add(now, h->ctx.inst->zombie_period),
1505 false, zombie_timeout, tconn) < 0) {
1506 ERROR("Failed inserting zombie timeout for connection");
1508 }
1509 }
1510
1511 return true;
1512}
1513
1514static void mod_dup(request_t *request, bio_request_t *u)
1515{
1516 bio_handle_t *h;
1517
1518 h = talloc_get_type_abort(u->treq->tconn->conn->h, bio_handle_t);
1519
1520 if (h->ctx.fd_config.socket_type != SOCK_DGRAM) {
1521 RDEBUG("Using stream sockets - suppressing retransmission");
1522 return;
1523 }
1524
1525 /*
1526 * Arguably this should never happen for UDP sockets.
1527 */
1528 if (h->ctx.fd_info->write_blocked) {
1529 RDEBUG("IO is blocked - suppressing retransmission");
1530 return;
1531 }
1532 u->is_retry = true;
1533
1534 /*
1535 * We are doing synchronous proxying, retransmit
1536 * the current request on the same connection.
1537 *
1538 * If it's zombie, we still resend it. If the
1539 * connection is dead, then a callback will move
1540 * this request to a new connection.
1541 */
1542 mod_write(request, u->treq, h);
1543}
1544
1545static void do_retry(rlm_radius_t const *inst, bio_request_t *u, request_t *request, fr_retry_t const *retry);
1546
1547/** Handle module retries.
1548 *
1549 */
1550static void mod_retry(module_ctx_t const *mctx, request_t *request, fr_retry_t const *retry)
1551{
1552 bio_request_t *u = talloc_get_type_abort(mctx->rctx, bio_request_t);
1553 rlm_radius_t const *inst = talloc_get_type_abort(mctx->mi->data, rlm_radius_t);
1554
1555 do_retry(inst, u, request, retry);
1556}
1557
1558static void do_retry(rlm_radius_t const *inst, bio_request_t *u, request_t *request, fr_retry_t const *retry)
1559{
1560 trunk_request_t *treq;
1561 trunk_connection_t *tconn;
1562 fr_time_t now;
1563
1564 if (!u->treq) {
1565 RDEBUG("Packet was cancelled by the connection handler - ignoring retry");
1566 return;
1567 }
1568
1569 treq = talloc_get_type_abort(u->treq, trunk_request_t);
1570
1571 fr_assert(request == treq->request);
1572 fr_assert(treq->preq); /* Must still have a protocol request */
1573 fr_assert(treq->preq == u);
1574
1575 tconn = treq->tconn;
1576 now = retry->updated;
1577
1578 switch (retry->state) {
1579 case FR_RETRY_CONTINUE:
1580 u->retry = *retry;
1581
1582 switch (treq->state) {
1585 fr_assert(0);
1586 break;
1587
1589 RDEBUG("Packet is still in the backlog queue to be sent - suppressing retransmission");
1590 return;
1591
1593 RDEBUG("Packet is still in the pending queue to be sent - suppressing retransmission");
1594 return;
1595
1597 RDEBUG("Packet was partially written, as IO is blocked - suppressing retransmission");
1598 return;
1599
1601 fr_assert(tconn);
1602
1603 mod_dup(request, u);
1604 return;
1605
1613 fr_assert(0);
1614 break;
1615 }
1616 break;
1617
1618 case FR_RETRY_MRD:
1619 REDEBUG("Reached maximum_retransmit_duration (%pVs > %pVs), failing request",
1621 break;
1622
1623 case FR_RETRY_MRC:
1624 REDEBUG("Reached maximum_retransmit_count (%u > %u), failing request",
1625 retry->count, retry->config->mrc);
1626 break;
1627 }
1628
1631
1632 /*
1633 * We don't do zombie stuff!
1634 */
1635 if (!tconn || (inst->mode == RLM_RADIUS_MODE_REPLICATE)) return;
1636
1637 check_for_zombie(request, tconn, now, retry->start);
1638}
1639
1640CC_NO_UBSAN(function) /* UBSAN: false positive - public vs private connection_t trips --fsanitize=function*/
1642 trunk_connection_t *tconn, connection_t *conn, UNUSED void *uctx)
1643{
1644 bio_handle_t *h = talloc_get_type_abort(conn->h, bio_handle_t);
1645 trunk_request_t *treq;
1646 request_t *request;
1647
1648 if (unlikely(trunk_connection_pop_request(&treq, tconn) < 0)) return;
1649
1650 /*
1651 * No more requests to send
1652 */
1653 if (!treq) return;
1654
1655 request = treq->request;
1656
1657 mod_write(request, treq, h);
1658}
1659
1660static void mod_write(request_t *request, trunk_request_t *treq, bio_handle_t *h)
1661{
1662 rlm_radius_t const *inst = h->ctx.inst;
1663 bio_request_t *u;
1664 char const *action;
1665 uint8_t const *packet;
1666 size_t packet_len;
1667 ssize_t slen;
1668
1669 u = treq->preq;
1670
1671 fr_assert((treq->state == TRUNK_REQUEST_STATE_PENDING) ||
1672 (treq->state == TRUNK_REQUEST_STATE_PARTIAL) ||
1673 ((u->retry.count > 0) && (treq->state == TRUNK_REQUEST_STATE_SENT)));
1674
1676
1677 /*
1678 * If it's a partial packet, then write the partial bit.
1679 */
1680 if (u->partial) {
1681 fr_assert(u->partial < u->packet_len);
1682 packet = u->packet + u->partial;
1683 packet_len = u->packet_len - u->partial;
1684 goto do_write;
1685 }
1686
1687 /*
1688 * No previous packet, OR can't retransmit the
1689 * existing one. Oh well.
1690 *
1691 * Note that if we can't retransmit the previous
1692 * packet, then u->rr MUST already have been
1693 * deleted in the request_cancel() function
1694 * or request_release_conn() function when
1695 * the REQUEUE signal was received.
1696 */
1697 if (!u->packet) {
1698 fr_assert(!u->rr);
1699
1700 if (unlikely(radius_track_entry_reserve(&u->rr, treq, h->tt, request, u->code, treq) < 0)) {
1701#ifndef NDEBUG
1702 radius_track_state_log(&default_log, L_ERR, __FILE__, __LINE__,
1704#endif
1705 fr_assert_fail("Tracking entry allocation failed: %s", fr_strerror());
1707 return;
1708 }
1709 fr_assert(u->rr);
1710 u->id = u->rr->id;
1711
1712 RDEBUG("Sending %s ID %d length %zu over connection %s",
1714
1715 if (encode(h, request, u, u->id) < 0) {
1716 /*
1717 * Need to do this because request_conn_release
1718 * may not be called.
1719 */
1722 return;
1723 }
1724 RHEXDUMP3(u->packet, u->packet_len, "Encoded packet");
1725
1726 /*
1727 * Remember the authentication vector, which now has the
1728 * packet signature.
1729 */
1731 } else {
1732 RDEBUG("Retransmitting %s ID %d length %zu over connection %s",
1734 }
1735
1736 /*
1737 * @todo - When logging Message-Authenticator, don't print its' value.
1738 */
1739 log_request_proto_pair_list(L_DBG_LVL_2, request, NULL, &request->request_pairs, NULL);
1740 if (!fr_pair_list_empty(&u->extra)) log_request_proto_pair_list(L_DBG_LVL_2, request, NULL, &u->extra, NULL);
1741
1742 packet = u->packet;
1743 packet_len = u->packet_len;
1744
1745do_write:
1746 fr_assert(packet != NULL);
1747 fr_assert(packet_len >= RADIUS_HEADER_LENGTH);
1748
1749 slen = fr_bio_write(h->bio.main, NULL, packet, packet_len);
1750
1751 /*
1752 * Can't write anything, requeue it on a different socket.
1753 */
1754 if (slen == fr_bio_error(IO_WOULD_BLOCK)) goto requeue;
1755
1756 if (slen < 0) {
1757 switch (errno) {
1758 /*
1759 * There is an error in the request.
1760 */
1761 case EMSGSIZE: /* Packet size exceeds max size allowed on socket */
1762 ERROR("%s - Failed sending data over connection %s: %s",
1763 h->ctx.module_name, h->ctx.fd_info->name, fr_syserror(errno));
1765 break;
1766
1767 /*
1768 * There is an error in the connection. The reconnection will re-queue any pending or
1769 * sent requests, so we don't have to do any cleanup.
1770 */
1771 default:
1772 ERROR("%s - Failed sending data over connection %s: %s",
1773 h->ctx.module_name, h->ctx.fd_info->name, fr_syserror(errno));
1775 break;
1776 }
1777
1778 return;
1779 }
1780
1781 /*
1782 * No data to send, ignore the write for partials, but otherwise requeue it.
1783 */
1784 if (slen == 0) {
1785 if (u->partial) return;
1786
1787 requeue:
1788 RWARN("%s - Failed sending data over connection %s: sent zero bytes",
1789 h->ctx.module_name, h->ctx.fd_info->name);
1791 return;
1792 }
1793
1794 packet_len += slen;
1795 if (packet_len < u->packet_len) {
1796 u->partial = packet_len;
1798 return;
1799 }
1800
1801 /*
1802 * For retransmissions.
1803 */
1804 u->partial = 0;
1805
1806 /*
1807 * Don't print anything extra for replication.
1808 */
1809 if (inst->mode == RLM_RADIUS_MODE_REPLICATE) {
1810 u->rcode = RLM_MODULE_OK;
1812 return;
1813 }
1814
1815 /*
1816 * On first packet, signal it as sent, and update stats.
1817 *
1818 * Later packets are just retransmissions to the BIO, and don't need to involve
1819 * the trunk code.
1820 */
1821 if (u->retry.count == 1) {
1822 h->last_sent = u->retry.start;
1824
1826
1827 action = u->proxied ? "Proxied" : "Originated";
1828
1829 } else {
1830 /*
1831 * We don't signal the trunk that it's been sent, it was already senty
1832 */
1833 action = "Retransmitted";
1834 }
1835
1837
1838 if (!u->proxied) {
1839 RDEBUG("%s request. Expecting response within %pVs", action,
1841
1842 } else {
1843 /*
1844 * If the packet doesn't get a response,
1845 * then bio_request_free() will notice, and run conn_zombie()
1846 */
1847 RDEBUG("%s request. Relying on NAS to perform more retransmissions", action);
1848 }
1849
1850 /*
1851 * We don't retransmit over TCP.
1852 */
1853 if (h->ctx.fd_config.socket_type != SOCK_DGRAM) return;
1854
1855 /*
1856 * If we only send one datagram packet, then don't bother saving it.
1857 */
1858 if (u->retry.config && u->retry.config->mrc == 1) {
1859 u->packet = NULL;
1860 return;
1861 }
1862
1863 MEM(u->packet = talloc_memdup(u, u->packet, u->packet_len));
1864}
1865
1866/** Deal with Protocol-Error replies, and possible negotiation
1867 *
1868 */
1870{
1871 bool error_601 = false;
1872 uint32_t response_length = 0;
1873 uint8_t const *attr, *end;
1874
1875 end = h->buffer + fr_nbo_to_uint16(h->buffer + 2);
1876
1877 for (attr = h->buffer + RADIUS_HEADER_LENGTH;
1878 attr < end;
1879 attr += attr[1]) {
1880 /*
1881 * Error-Cause = Response-Too-Big
1882 */
1883 if ((attr[0] == attr_error_cause->attr) && (attr[1] == 6)) {
1884 uint32_t error;
1885
1886 memcpy(&error, attr + 2, 4);
1887 error = ntohl(error);
1888 if (error == 601) error_601 = true;
1889 continue;
1890 }
1891
1892 /*
1893 * The other end wants us to increase our Response-Length
1894 */
1895 if ((attr[0] == attr_response_length->attr) && (attr[1] == 6)) {
1896 memcpy(&response_length, attr + 2, 4);
1897 continue;
1898 }
1899
1900 /*
1901 * Protocol-Error packets MUST contain an
1902 * Original-Packet-Code attribute.
1903 *
1904 * The attribute containing the
1905 * Original-Packet-Code is an extended
1906 * attribute.
1907 */
1908 if (attr[0] != attr_extended_attribute_1->attr) continue;
1909
1910 /*
1911 * ATTR + LEN + EXT-Attr + uint32
1912 */
1913 if (attr[1] != 7) continue;
1914
1915 /*
1916 * See if there's an Original-Packet-Code.
1917 */
1918 if (attr[2] != (uint8_t)attr_original_packet_code->attr) continue;
1919
1920 /*
1921 * Has to be an 8-bit number.
1922 */
1923 if ((attr[3] != 0) ||
1924 (attr[4] != 0) ||
1925 (attr[5] != 0)) {
1927 return;
1928 }
1929
1930 /*
1931 * The value has to match. We don't
1932 * currently multiplex different codes
1933 * with the same IDs on connections. So
1934 * this check is just for RFC compliance,
1935 * and for sanity.
1936 */
1937 if (attr[6] != u->code) {
1939 return;
1940 }
1941 }
1942
1943 /*
1944 * Error-Cause = Response-Too-Big
1945 *
1946 * The other end says it needs more room to send it's response
1947 *
1948 * Limit it to reasonable values.
1949 */
1950 if (error_601 && response_length && (response_length > h->buflen)) {
1951 if (response_length < 4096) response_length = 4096;
1952 if (response_length > 65535) response_length = 65535;
1953
1954 DEBUG("%s - Increasing buffer size to %u for connection %s", h->ctx.module_name, response_length, h->ctx.fd_info->name);
1955
1956 /*
1957 * Make sure to copy the packet over!
1958 */
1959 attr = h->buffer;
1960 h->buflen = response_length;
1961 MEM(h->buffer = talloc_array(h, uint8_t, h->buflen));
1962
1963 memcpy(h->buffer, attr, end - attr);
1964 }
1965
1966 /*
1967 * fail - something went wrong internally, or with the connection.
1968 * invalid - wrong response to packet
1969 * handled - best remaining alternative :(
1970 *
1971 * i.e. if the response is NOT accept, reject, whatever,
1972 * then we shouldn't allow the caller to do any more
1973 * processing of this packet. There was a protocol
1974 * error, and the response is valid, but not useful for
1975 * anything.
1976 */
1978}
1979
1980
1981/** Handle retries for a status check
1982 *
1983 */
1985{
1986 trunk_connection_t *tconn = talloc_get_type_abort(uctx, trunk_connection_t);
1987 bio_handle_t *h = talloc_get_type_abort(tconn->conn->h, bio_handle_t);
1988
1990 h->status_u, h->status_u, true) != TRUNK_ENQUEUE_OK) {
1992 }
1993}
1994
1995
1996/** Deal with replies replies to status checks and possible negotiation
1997 *
1998 */
2000{
2001 bio_handle_t *h = talloc_get_type_abort(treq->tconn->conn->h, bio_handle_t);
2002 rlm_radius_t const *inst = h->ctx.inst;
2003 bio_request_t *u = talloc_get_type_abort(treq->rctx, bio_request_t);
2004
2005 fr_assert(treq->preq == h->status_u);
2006 fr_assert(treq->rctx == h->status_u);
2007
2008 u->treq = NULL;
2009
2010 /*
2011 * @todo - do other negotiation and signaling.
2012 */
2014
2015 if (u->num_replies < inst->num_answers_to_alive) {
2016 DEBUG("Received %u / %u replies for status check, on connection - %s",
2017 u->num_replies, inst->num_answers_to_alive, h->ctx.fd_info->name);
2018 DEBUG("Next status check packet will be in %pVs", fr_box_time_delta(fr_time_sub(u->retry.next, now)));
2019
2020 /*
2021 * Set the timer for the next retransmit.
2022 */
2023 if (fr_timer_at(h, h->ctx.el->tl, &u->ev, u->retry.next, false, status_check_next, treq->tconn) < 0) {
2025 }
2026 return;
2027 }
2028
2029 DEBUG("Received enough replies to status check, marking connection as active - %s", h->ctx.fd_info->name);
2030
2031 /*
2032 * Set the "last idle" time to now, so that we don't
2033 * restart zombie_period until sufficient time has
2034 * passed.
2035 */
2036 h->last_idle = fr_time();
2037
2038 /*
2039 * Reset retry interval and retransmission counters
2040 * also frees u->ev.
2041 */
2042 status_check_reset(h, u);
2043 trunk_connection_signal_active(treq->tconn);
2044}
2045
2046CC_NO_UBSAN(function) /* UBSAN: false positive - public vs private connection_t trips --fsanitize=function*/
2048{
2049 bio_handle_t *h = talloc_get_type_abort(conn->h, bio_handle_t);
2050
2051 DEBUG3("%s - Reading data for connection %s", h->ctx.module_name, h->ctx.fd_info->name);
2052
2053 while (true) {
2054 ssize_t slen;
2055
2056 trunk_request_t *treq;
2057 request_t *request;
2058 bio_request_t *u;
2061 uint8_t code = 0;
2062 fr_pair_list_t reply;
2063 fr_pair_t *vp;
2064
2065 fr_time_t now;
2066
2067 fr_pair_list_init(&reply);
2068
2069 /*
2070 * Drain the socket of all packets. If we're busy, this
2071 * saves a round through the event loop. If we're not
2072 * busy, a few extra system calls don't matter.
2073 */
2074 slen = fr_bio_read(h->bio.main, NULL, h->buffer, h->buflen);
2075 if (slen == 0) {
2076 /*
2077 * @todo - set BIO FD EOF callback, so that we don't have to check it here.
2078 */
2080 return;
2081 }
2082
2083 /*
2084 * We're done reading, return.
2085 */
2086 if (slen == fr_bio_error(IO_WOULD_BLOCK)) return;
2087
2088 if (slen < 0) {
2089 ERROR("%s - Failed reading response from socket: %s",
2090 h->ctx.module_name, fr_syserror(errno));
2092 return;
2093 }
2094
2095 fr_assert(slen >= RADIUS_HEADER_LENGTH); /* checked in verify */
2096
2097 /*
2098 * Note that we don't care about packet codes. All
2099 * packet codes share the same ID space.
2100 */
2101 rr = radius_track_entry_find(h->tt, h->buffer[1], NULL);
2102 if (!rr) {
2103 WARN("%s - Ignoring reply with ID %i that arrived too late",
2104 h->ctx.module_name, h->buffer[1]);
2105 continue;
2106 }
2107
2108 treq = talloc_get_type_abort(rr->uctx, trunk_request_t);
2109 request = treq->request;
2110 fr_assert(request != NULL);
2111 u = talloc_get_type_abort(treq->rctx, bio_request_t);
2112 fr_assert(u == treq->preq);
2113
2114 /*
2115 * If we got a reply during the zombie period mark the
2116 * connection as active and remove the timer.
2117 */
2121 }
2122
2123 /*
2124 * Decode the incoming packet.
2125 */
2126 reason = decode(request->reply_ctx, &reply, &code, h, request, u, rr->vector, h->buffer, (size_t)slen);
2127 if (reason != FR_RADIUS_FAIL_NONE) continue;
2128
2129 /*
2130 * Only valid packets are processed
2131 * Otherwise an attacker could perform
2132 * a DoS attack against the proxying servers
2133 * by sending fake responses for upstream
2134 * servers.
2135 */
2136 h->last_reply = now = fr_time();
2137
2138 /*
2139 * Status-Server can have any reply code, we don't care
2140 * what it is. So long as it's signed properly, we
2141 * accept it. This flexibility is because we don't
2142 * expose Status-Server to the admins. It's only used by
2143 * this module for internal signalling.
2144 */
2145 if (u == h->status_u) {
2146 fr_pair_list_free(&reply); /* Probably want to pass this to status_check_reply? */
2147 status_check_reply(treq, now);
2149 continue;
2150 }
2151
2152 /*
2153 * Handle any state changes, etc. needed by receiving a
2154 * Protocol-Error reply packet.
2155 *
2156 * Protocol-Error is permitted as a reply to any
2157 * packet.
2158 */
2159 switch (code) {
2162
2163 vp = fr_pair_find_by_da(&request->reply_pairs, NULL, attr_original_packet_code);
2164 if (!vp) {
2165 RWDEBUG("Protocol-Error response is missing Original-Packet-Code");
2166 } else {
2167 fr_pair_delete_by_da(&request->reply_pairs, attr_original_packet_code);
2168 }
2169
2170 vp = fr_pair_find_by_da(&request->reply_pairs, NULL, attr_error_cause);
2171 if (!vp) {
2172 MEM(vp = fr_pair_afrom_da(request->reply_ctx, attr_error_cause));
2173 vp->vp_uint32 = FR_ERROR_CAUSE_VALUE_PROXY_PROCESSING_ERROR;
2174 fr_pair_append(&request->reply_pairs, vp);
2175 }
2176 break;
2177
2178 default:
2179 break;
2180 }
2181
2182 /*
2183 * Mark up the request as being an Access-Challenge, if
2184 * required.
2185 *
2186 * We don't do this for other packet types, because the
2187 * ok/fail nature of the module return code will
2188 * automatically result in it the parent request
2189 * returning an ok/fail packet code.
2190 */
2192 vp = fr_pair_find_by_da(&request->reply_pairs, NULL, attr_packet_type);
2193 if (!vp) {
2194 MEM(vp = fr_pair_afrom_da(request->reply_ctx, attr_packet_type));
2196 fr_pair_append(&request->reply_pairs, vp);
2197 }
2198 }
2199
2200 /*
2201 * Delete Proxy-State attributes from the reply.
2202 */
2204
2205 /*
2206 * If the reply has Message-Authenticator, then over-ride its value with all zeros, so
2207 * that we don't confuse anyone reading the debug output.
2208 */
2209 if ((vp = fr_pair_find_by_da(&reply, NULL, attr_message_authenticator)) != NULL) {
2210 (void) fr_pair_value_memdup(vp, (uint8_t const *) "", 1, false);
2211 }
2212
2213 treq->request->reply->code = code;
2214 u->rcode = radius_code_to_rcode[code];
2215 fr_pair_list_append(&request->reply_pairs, &reply);
2217 }
2218}
2219
2220/*
2221 * This is the same as request_mux(), except that we immediately mark the request as complete.
2222 */
2223CC_NO_UBSAN(function) /* UBSAN: false positive - public vs private connection_t trips --fsanitize=function*/
2225 trunk_connection_t *tconn, connection_t *conn, UNUSED void *uctx)
2226{
2227 bio_handle_t *h = talloc_get_type_abort(conn->h, bio_handle_t);
2228 trunk_request_t *treq;
2229
2230 if (unlikely(trunk_connection_pop_request(&treq, tconn) < 0)) return;
2231
2232 /*
2233 * No more requests to send
2234 */
2235 if (!treq) return;
2236
2237 mod_write(treq->request, treq, h);
2238}
2239
2240CC_NO_UBSAN(function) /* UBSAN: false positive - public vs private connection_t trips --fsanitize=function*/
2242{
2243 bio_handle_t *h = talloc_get_type_abort(conn->h, bio_handle_t);
2244
2245 DEBUG3("%s - Reading data for connection %s", h->ctx.module_name, h->ctx.fd_info->name);
2246
2247 while (true) {
2248 ssize_t slen;
2249
2250 trunk_request_t *treq;
2251 request_t *request;
2252 bio_request_t *u;
2255 uint8_t code = 0;
2256 fr_pair_list_t reply;
2257
2258 fr_time_t now;
2259
2260 fr_pair_list_init(&reply);
2261
2262 /*
2263 * Drain the socket of all packets. If we're busy, this
2264 * saves a round through the event loop. If we're not
2265 * busy, a few extra system calls don't matter.
2266 */
2267 slen = fr_bio_read(h->bio.main, NULL, h->buffer, h->buflen);
2268 if (slen == 0) {
2269 /*
2270 * @todo - set BIO FD EOF callback, so that we don't have to check it here.
2271 */
2273 return;
2274 }
2275
2276 /*
2277 * We're done reading, return.
2278 */
2279 if (slen == fr_bio_error(IO_WOULD_BLOCK)) return;
2280
2281 if (slen < 0) {
2282 ERROR("%s - Failed reading response from socket: %s",
2283 h->ctx.module_name, fr_syserror(errno));
2285 return;
2286 }
2287
2288 fr_assert(slen >= RADIUS_HEADER_LENGTH); /* checked in verify */
2289
2290 /*
2291 * We only pay attention to Protocol-Error replies.
2292 *
2293 * All other packets are discarded.
2294 */
2296 continue;
2297 }
2298
2299 /*
2300 * Note that we don't care about packet codes. All
2301 * packet codes share the same ID space.
2302 */
2303 rr = radius_track_entry_find(h->tt, h->buffer[1], NULL);
2304 if (!rr) {
2305 WARN("%s - Ignoring reply with ID %i that arrived too late",
2306 h->ctx.module_name, h->buffer[1]);
2307 continue;
2308 }
2309
2310 treq = talloc_get_type_abort(rr->uctx, trunk_request_t);
2311 request = treq->request;
2312 fr_assert(request != NULL);
2313 u = talloc_get_type_abort(treq->rctx, bio_request_t);
2314 fr_assert(u == treq->preq);
2315
2316 /*
2317 * Decode the incoming packet
2318 */
2319 reason = decode(request->reply_ctx, &reply, &code, h, request, u, rr->vector, h->buffer, (size_t)slen);
2320 if (reason != FR_RADIUS_FAIL_NONE) continue;
2321
2322 /*
2323 * Only valid packets are processed
2324 * Otherwise an attacker could perform
2325 * a DoS attack against the proxying servers
2326 * by sending fake responses for upstream
2327 * servers.
2328 */
2329 h->last_reply = now = fr_time();
2330
2331 /*
2332 * Status-Server can have any reply code, we don't care
2333 * what it is. So long as it's signed properly, we
2334 * accept it. This flexibility is because we don't
2335 * expose Status-Server to the admins. It's only used by
2336 * this module for internal signalling.
2337 */
2338 if (u == h->status_u) {
2339 fr_pair_list_free(&reply); /* Probably want to pass this to status_check_reply? */
2340 status_check_reply(treq, now);
2342 continue;
2343 }
2344
2345 /*
2346 * Handle any state changes, etc. needed by receiving a
2347 * Protocol-Error reply packet.
2348 *
2349 * Protocol-Error is also permitted as a reply to any
2350 * packet.
2351 */
2353 }
2354}
2355
2356
2357/** Remove the request from any tracking structures
2358 *
2359 * Frees encoded packets if the request is being moved to a new connection
2360 */
2361static void request_cancel(UNUSED connection_t *conn, void *preq_to_reset,
2362 trunk_cancel_reason_t reason, UNUSED void *uctx)
2363{
2364 bio_request_t *u = preq_to_reset;
2365
2366 /*
2367 * Request has been requeued on the same
2368 * connection due to timeout or DUP signal. We
2369 * keep the same packet to avoid re-encoding it.
2370 */
2371 if (reason == TRUNK_CANCEL_REASON_REQUEUE) {
2372 /*
2373 * Delete the request_timeout
2374 *
2375 * Note: There might not be a request timeout
2376 * set in the case where the request was
2377 * queued for sendmmsg but never actually
2378 * sent.
2379 */
2380 FR_TIMER_DISARM(u->ev);
2381 }
2382
2383 /*
2384 * Other cancellations are dealt with by
2385 * request_conn_release as the request is removed
2386 * from the trunk.
2387 */
2388}
2389
2390/** Clear out anything associated with the handle from the request
2391 *
2392 */
2393static void request_conn_release(connection_t *conn, void *preq_to_reset, UNUSED void *uctx)
2394{
2395 bio_request_t *u = preq_to_reset;
2396 bio_handle_t *h = talloc_get_type_abort(conn->h, bio_handle_t);
2397
2398 FR_TIMER_DISARM(u->ev);
2400
2401 if (h->ctx.inst->mode == RLM_RADIUS_MODE_REPLICATE) return;
2402
2403 u->num_replies = 0;
2404
2405 /*
2406 * If there are no outstanding tracking entries
2407 * allocated then the connection is "idle".
2408 */
2409 if (!h->tt || (h->tt->num_requests == 0)) h->last_idle = fr_time();
2410}
2411
2412/** Write out a canned failure
2413 *
2414 */
2415static void request_fail(request_t *request, NDEBUG_UNUSED void *preq, void *rctx,
2416 NDEBUG_UNUSED trunk_request_state_t state, UNUSED void *uctx)
2417{
2418 bio_request_t *u = talloc_get_type_abort(rctx, bio_request_t);
2419
2420 fr_assert(u == preq);
2421
2422 fr_assert(!u->rr && !u->packet && fr_pair_list_empty(&u->extra) && !u->ev); /* Dealt with by request_conn_release */
2423
2425
2426 if (u->status_check) return;
2427
2429 u->treq = NULL;
2430
2432}
2433
2434/** Response has already been written to the rctx at this point
2435 *
2436 */
2437static void request_complete(request_t *request, NDEBUG_UNUSED void *preq, void *rctx, UNUSED void *uctx)
2438{
2439 bio_request_t *u = talloc_get_type_abort(rctx, bio_request_t);
2440
2441 fr_assert(u == preq);
2442
2443 fr_assert(!u->rr && !u->packet && fr_pair_list_empty(&u->extra) && !u->ev); /* Dealt with by request_conn_release */
2444
2445 if (u->status_check) return;
2446
2447 u->treq = NULL;
2448
2450}
2451
2452/** Resume execution of the request, returning the rcode set during trunk execution
2453 *
2454 */
2456{
2457 bio_request_t *u = talloc_get_type_abort(mctx->rctx, bio_request_t);
2458 rlm_rcode_t rcode = u->rcode;
2459
2460 talloc_free(u);
2461
2462 RETURN_UNLANG_RCODE(rcode);
2463}
2464
2465static void do_signal(rlm_radius_t const *inst, bio_request_t *u, request_t *request, fr_signal_t action);
2466
2467static void mod_signal(module_ctx_t const *mctx, UNUSED request_t *request, fr_signal_t action)
2468{
2470
2471 bio_request_t *u = talloc_get_type_abort(mctx->rctx, bio_request_t);
2472
2473 do_signal(inst, u, request, action);
2474}
2475
2476static void do_signal(rlm_radius_t const *inst, bio_request_t *u, UNUSED request_t *request, fr_signal_t action)
2477{
2478 /*
2479 * We received a duplicate packet, but we're not doing
2480 * synchronous proxying. Ignore the dup, and rely on the
2481 * IO submodule to time it's own retransmissions.
2482 */
2483 if ((action == FR_SIGNAL_DUP) && (inst->mode != RLM_RADIUS_MODE_PROXY)) return;
2484
2485 /*
2486 * If we don't have a treq associated with the
2487 * rctx it's likely because the request was
2488 * scheduled, but hasn't yet been resumed, and
2489 * has received a signal, OR has been resumed
2490 * and immediately cancelled as the event loop
2491 * is exiting, in which case
2492 * unlang_request_is_scheduled will return false
2493 * (don't use it).
2494 */
2495 if (!u->treq) return;
2496
2497 switch (action) {
2498 /*
2499 * The request is being cancelled, tell the
2500 * trunk so it can clean up the treq.
2501 */
2502 case FR_SIGNAL_CANCEL:
2504 u->treq = NULL;
2505 return;
2506
2507 /*
2508 * Requeue the request on the same connection
2509 * causing a "retransmission" if the request
2510 * has already been sent out.
2511 */
2512 case FR_SIGNAL_DUP:
2513 mod_dup(request, u);
2514 return;
2515
2516 default:
2517 return;
2518 }
2519}
2520
2521/** Free a bio_request_t
2522 *
2523 * Allows us to set break points for debugging.
2524 */
2526{
2527 if (!u->treq) return 0;
2528
2529#ifndef NDEBUG
2530 {
2531 trunk_request_t *treq;
2532 treq = talloc_get_type_abort(u->treq, trunk_request_t);
2533 fr_assert(treq->preq == u);
2534 }
2535#endif
2536
2537 fr_assert_msg(!fr_timer_armed(u->ev), "bio_request_t freed with active timer");
2538
2540
2541 fr_assert(u->rr == NULL);
2542
2543 return 0;
2544}
2545
2546static int mod_enqueue(bio_request_t **p_u, fr_retry_config_t const **p_retry_config,
2547 rlm_radius_t const *inst, trunk_t *trunk, request_t *request)
2548{
2549 bio_request_t *u;
2550 trunk_request_t *treq;
2552
2553 fr_assert(request->packet->code > 0);
2554 fr_assert(request->packet->code < FR_RADIUS_CODE_MAX);
2555
2556 /*
2557 * Do any necessary RADIUS level fixups
2558 * - check Proxy-State
2559 * - do CHAP-Challenge fixups
2560 */
2561 if (radius_fixups(inst, request) < 0) return 0;
2562
2563 treq = trunk_request_alloc(trunk, request);
2564 if (!treq) {
2565 REDEBUG("Failed allocating handler for request");
2566 return -1;
2567 }
2568
2569 MEM(u = talloc_zero(request, bio_request_t));
2570 talloc_set_destructor(u, _bio_request_free);
2571
2572 /*
2573 * Can't use compound literal - const issues.
2574 */
2575 u->code = request->packet->code;
2576 u->priority = request->priority;
2577 u->recv_time = request->async->recv_time;
2579
2580 u->retry.count = 1;
2581
2583
2584 switch(trunk_request_enqueue(&treq, trunk, request, u, u)) {
2585 case TRUNK_ENQUEUE_OK:
2587 break;
2588
2590 REDEBUG("Unable to queue packet - connections at maximum capacity");
2591 fail:
2592 fr_assert(!u->rr && !u->packet); /* Should not have been fed to the muxer */
2593 trunk_request_free(&treq); /* Return to the free list */
2594 talloc_free(u);
2595 return -1;
2596
2598 REDEBUG("All destinations are down - cannot send packet");
2599 goto fail;
2600
2601 case TRUNK_ENQUEUE_FAIL:
2602 REDEBUG("Unable to queue packet");
2603 goto fail;
2604 }
2605
2606 u->treq = treq; /* Remember for signalling purposes */
2607 fr_assert(treq->rctx == u);
2608
2609 /*
2610 * Figure out if we're originating the packet or proxying it. And also figure out if we have to
2611 * retry.
2612 */
2613 switch (inst->mode) {
2615 case RLM_RADIUS_MODE_UNCONNECTED_REPLICATE: /* unconnected sockets are UDP, and bypass the trunk */
2616 REDEBUG("Internal sanity check failed - connection trunking cannot be used for replication");
2617 return -1;
2618
2619 /*
2620 * We originate this packet if it was taken from the detail module, which doesn't have a
2621 * real client. @todo - do a better check here.
2622 *
2623 * We originate this packet if the parent request is not compatible with this one
2624 * (i.e. it's from a different protocol).
2625 *
2626 * We originate the packet if the parent is from the same dictionary, but has a different
2627 * packet code. This lets us receive Accounting-Request, and originate
2628 * Disconnect-Request.
2629 */
2632 if (!request->parent) {
2633 u->proxied = (request->client && request->client->cs != NULL);
2634
2635 } else if (!fr_dict_compatible(request->parent->proto_dict, request->proto_dict)) {
2636 u->proxied = false;
2637
2638 } else {
2639 u->proxied = (request->parent->packet->code == request->packet->code);
2640 }
2641
2642 /*
2643 * Proxied packets get a final timeout, as we retry only on DUP packets.
2644 */
2645 if (u->proxied) goto timeout_retry;
2646
2648
2649 /*
2650 * Client packets (i.e. packets we originate) get retries for UDP. And no retries for TCP.
2651 */
2653 if (inst->fd_config.socket_type == SOCK_DGRAM) {
2654 retry_config = &inst->retry[u->code];
2655 break;
2656 }
2658
2659 /*
2660 * Replicated packets are never retried, but they have a timeout if the socket isn't
2661 * ready for writing.
2662 */
2664 timeout_retry:
2665 retry_config = &inst->timeout_retry;
2666 break;
2667 }
2668
2669 /*
2670 * The event loop will take care of demux && sending the
2671 * packet, along with any retransmissions.
2672 */
2673 *p_u = u;
2674 *p_retry_config = retry_config;
2675
2676 return 1;
2677}
2678
2679static void home_server_free(void *data)
2680{
2681 home_server_t *home = data;
2682
2683 talloc_free(home);
2684}
2685
2688 .connection_notify = thread_conn_notify,
2689 .request_prioritise = request_prioritise,
2690 .request_mux = request_mux,
2691 .request_demux = request_demux,
2692 .request_conn_release = request_conn_release,
2693 .request_complete = request_complete,
2694 .request_fail = request_fail,
2695 .request_cancel = request_cancel,
2696};
2697
2700 .connection_notify = thread_conn_notify,
2701 .request_prioritise = request_prioritise,
2702 .request_mux = request_replicate_mux,
2703 .request_demux = request_replicate_demux,
2704 .request_conn_release = request_conn_release,
2705 .request_complete = request_complete,
2706 .request_fail = request_fail,
2707 .request_cancel = request_cancel,
2708};
2709
2710/** Instantiate thread data for the submodule.
2711 *
2712 */
2714{
2715 rlm_radius_t *inst = talloc_get_type_abort(mctx->mi->data, rlm_radius_t);
2716 bio_thread_t *thread = talloc_get_type_abort(mctx->thread, bio_thread_t);
2717
2718 thread->ctx.el = mctx->el;
2719 thread->ctx.inst = inst;
2720 thread->ctx.fd_config = inst->fd_config;
2721 thread->ctx.radius_ctx = inst->common_ctx;
2722
2723 switch (inst->mode) {
2726 inst->home_server_lifetime);
2728
2729 default:
2730 /*
2731 * Assign each thread a portion of the available source port range.
2732 */
2733 if (thread->ctx.fd_config.src_port_start) {
2734 uint16_t range = inst->fd_config.src_port_end - inst->fd_config.src_port_start + 1;
2735 thread->num_ports = range / main_config->max_workers;
2736 thread->ctx.fd_config.src_port_start = inst->fd_config.src_port_start + (thread->num_ports * fr_schedule_worker_id());
2737 thread->ctx.fd_config.src_port_end = inst->fd_config.src_port_start + (thread->num_ports * (fr_schedule_worker_id() +1)) - 1;
2738 if (inst->mode != RLM_RADIUS_MODE_XLAT_PROXY) {
2739 thread->connections = talloc_zero_array(thread, connection_t *, thread->num_ports);
2741 }
2742 }
2743
2744 thread->ctx.trunk = trunk_alloc(thread, mctx->el, &io_funcs,
2745 &inst->trunk_conf, inst->name, thread, false, inst->trigger_args);
2746 if (!thread->ctx.trunk) return -1;
2747 return 0;
2748
2750 /*
2751 * We can replicate over TCP, but that uses trunks.
2752 */
2753 if (inst->fd_config.socket_type == SOCK_DGRAM) break;
2754
2755 thread->ctx.trunk = trunk_alloc(thread, mctx->el, &io_replicate_funcs,
2756 &inst->trunk_conf, inst->name, thread, false, inst->trigger_args);
2757 if (!thread->ctx.trunk) return -1;
2758 return 0;
2759
2761 break;
2762 }
2763
2764 /*
2765 * If we have a port range, allocate the source port based
2766 * on the range start, plus the thread ID. This means
2767 * that we can avoid "hunt and peck" attempts to open up
2768 * the source port.
2769 */
2770 if (thread->ctx.fd_config.src_port_start) {
2772 }
2773
2774 /*
2775 * Allocate an unconnected socket for replication.
2776 */
2777 thread->bio.fd = fr_bio_fd_alloc(thread, &thread->ctx.fd_config, 0);
2778 if (!thread->bio.fd) {
2779 PERROR("%s - failed opening socket", inst->name);
2780 return -1;
2781 }
2782
2783 thread->bio.fd->uctx = thread;
2784 thread->ctx.fd_info = fr_bio_fd_info(thread->bio.fd);
2785 fr_assert(thread->ctx.fd_info != NULL);
2786
2787 (void) fr_bio_fd_write_only(thread->bio.fd);
2788
2789 DEBUG("%s - Opened unconnected replication socket %s", inst->name, thread->ctx.fd_info->name);
2790 return 0;
2791}
2792
2794 { .required = true, .single = true, .type = FR_TYPE_COMBO_IP_ADDR },
2795 { .required = true, .single = true, .type = FR_TYPE_UINT16 },
2796 { .required = true, .single = true, .type = FR_TYPE_STRING },
2798};
2799
2800/*
2801 * %replicate.sendto.ipaddr(ipaddr, port, secret)
2802 */
2804 xlat_ctx_t const *xctx,
2805 request_t *request, fr_value_box_list_t *args)
2806{
2807 bio_thread_t *thread = talloc_get_type_abort(xctx->mctx->thread, bio_thread_t);
2808 fr_value_box_t *ipaddr, *port, *secret;
2809 ssize_t packet_len;
2810 uint8_t buffer[4096];
2811 fr_radius_ctx_t radius_ctx;
2814
2815 XLAT_ARGS(args, &ipaddr, &port, &secret);
2816
2817 /*
2818 * Can't change IP address families.
2819 */
2820 if (ipaddr->vb_ip.af != thread->ctx.fd_info->socket.af) {
2821 RPERROR("Invalid destination IP address family in %pV", ipaddr);
2822 return XLAT_ACTION_FAIL;
2823 }
2824
2825 /*
2826 * Warn if we're not replicating accounting data. It likely won't wokr/
2827 */
2828 if (request->packet->code != FR_RADIUS_CODE_ACCOUNTING_REQUEST) {
2829 RWDEBUG("Replication of packets other then Accounting-Request will likely not do what you want.");
2830 }
2831
2832 /*
2833 * Set up various context things.
2834 */
2835 radius_ctx = (fr_radius_ctx_t) {
2836 .secret = secret->vb_strvalue,
2837 .secret_length = secret->vb_length,
2838 .proxy_state = 0,
2839 };
2840
2842 .common = &radius_ctx,
2843 .rand_ctx = (fr_fast_rand_t) {
2844 .a = fr_rand(),
2845 .b = fr_rand(),
2846 },
2847 .code = request->packet->code,
2848 .id = thread->bio.id++ & 0xff,
2849 .add_proxy_state = false,
2850 };
2851
2852 /*
2853 * Encode the entire packet.
2854 */
2855 packet_len = fr_radius_encode(&FR_DBUFF_TMP(buffer, sizeof(buffer)),
2856 &request->request_pairs, &encode_ctx);
2857 if (packet_len < 0) {
2858 RPERROR("Failed encoding replicated packet");
2859 return XLAT_ACTION_FAIL;
2860 }
2861
2862 /*
2863 * Sign it.
2864 */
2865 if (fr_radius_sign(buffer, NULL, (uint8_t const *) radius_ctx.secret, radius_ctx.secret_length) < 0) {
2866 RPERROR("Failed signing replicated packet");
2867 return XLAT_ACTION_FAIL;
2868 }
2869
2870 /*
2871 * Prepare destination address.
2872 */
2873 addr = (fr_bio_fd_packet_ctx_t) {
2874 .socket = thread->ctx.fd_info->socket,
2875 };
2876 addr.socket.inet.dst_ipaddr = ipaddr->vb_ip;
2877 addr.socket.inet.dst_port = port->vb_uint16;
2878
2879 RDEBUG("Replicating packet to %pV:%u", ipaddr, port->vb_uint16);
2880
2881 /*
2882 * We either send it, or fail.
2883 */
2884 packet_len = fr_bio_write(thread->bio.fd, &addr, buffer, packet_len);
2885 if (packet_len < 0) {
2886 RPERROR("Failed replicating packet to %pV:%u", ipaddr, port->vb_uint16);
2887 return XLAT_ACTION_FAIL;
2888 }
2889
2890 /*
2891 * No return value.
2892 */
2893 return XLAT_ACTION_DONE;
2894}
2895
2896// **********************************************************************
2897
2898/** Dynamic home server code
2899 *
2900 */
2901
2902static int8_t home_server_cmp(void const *one, void const *two)
2903{
2904 home_server_t const *a = one;
2905 home_server_t const *b = two;
2906 int8_t rcode;
2907
2909 if (rcode != 0) return rcode;
2910
2912}
2913
2915 xlat_ctx_t const *xctx,
2916 request_t *request, UNUSED fr_value_box_list_t *in)
2917{
2918 bio_request_t *u = talloc_get_type_abort(xctx->rctx, bio_request_t);
2919 fr_value_box_t *dst;
2920
2921 if (u->rcode == RLM_MODULE_FAIL) return XLAT_ACTION_FAIL;
2922
2924 dst->vb_uint32 = request->reply->code;
2925
2926 fr_dcursor_append(out, dst);
2927
2928 return XLAT_ACTION_DONE;
2929}
2930
2931static void xlat_sendto_signal(xlat_ctx_t const *xctx, request_t *request, fr_signal_t action)
2932{
2933 rlm_radius_t const *inst = talloc_get_type_abort(xctx->mctx->mi->data, rlm_radius_t);
2934 bio_request_t *u = talloc_get_type_abort(xctx->rctx, bio_request_t);
2935
2936 do_signal(inst, u, request, action);
2937}
2938
2939/*
2940 * @todo - change this to mod_retry
2941 */
2942static void xlat_sendto_retry(xlat_ctx_t const *xctx, request_t *request, fr_retry_t const *retry)
2943{
2944 rlm_radius_t const *inst = talloc_get_type_abort(xctx->mctx->mi->data, rlm_radius_t);
2945 bio_request_t *u = talloc_get_type_abort(xctx->rctx, bio_request_t);
2946
2947 do_retry(inst, u, request, retry);
2948}
2949
2950/*
2951 * %proxy.sendto.ipaddr(ipaddr, port, secret)
2952 */
2954 xlat_ctx_t const *xctx,
2955 request_t *request, fr_value_box_list_t *args)
2956{
2957 rlm_radius_t const *inst = talloc_get_type_abort(xctx->mctx->mi->data, rlm_radius_t);
2958 bio_thread_t *thread = talloc_get_type_abort(xctx->mctx->thread, bio_thread_t);
2959 fr_value_box_t *ipaddr, *port, *secret;
2960 home_server_t *home;
2961 bio_request_t *u = NULL;
2962 fr_retry_config_t const *retry_config = NULL;
2963 int rcode;
2964
2965 XLAT_ARGS(args, &ipaddr, &port, &secret);
2966
2967 /*
2968 * Can't change IP address families.
2969 */
2970 if (ipaddr->vb_ip.af != thread->ctx.fd_config.src_ipaddr.af) {
2971 RDEBUG("Invalid destination IP address family in %pV", ipaddr);
2972 return XLAT_ACTION_DONE;
2973 }
2974
2975 home = fr_rb_find(&thread->bio.expires.tree, &(home_server_t) {
2976 .ctx = {
2977 .fd_config = (fr_bio_fd_config_t) {
2978 .dst_ipaddr = ipaddr->vb_ip,
2979 .dst_port = port->vb_uint16,
2980 },
2981 },
2982 });
2983 if (!home) {
2984 /*
2985 * Track which connections are made to this home server from which open ports.
2986 */
2987 MEM(home = (home_server_t *) talloc_zero_array(thread, uint8_t, sizeof(home_server_t) + sizeof(connection_t *) * thread->num_ports));
2988 talloc_set_type(home, home_server_t);
2989
2990 *home = (home_server_t) {
2991 .ctx = (bio_handle_ctx_t) {
2992 .el = unlang_interpret_event_list(request),
2993 .module_name = inst->name,
2994 .inst = inst,
2995 .limit_source_ports = (thread->num_ports > 0) ? LIMIT_PORTS_DYNAMIC : LIMIT_PORTS_NONE,
2996 .dynamic = true,
2997 },
2998 .num_ports = thread->num_ports,
2999 };
3000
3001 /*
3002 * Copy the home server configuration from the thread configuration. Then update it with
3003 * the needs of the home server.
3004 */
3005 home->ctx.fd_config = thread->ctx.fd_config;
3006 home->ctx.fd_config.type = FR_BIO_FD_CONNECTED;
3007 home->ctx.fd_config.dst_ipaddr = ipaddr->vb_ip;
3008 home->ctx.fd_config.dst_port = port->vb_uint32;
3009
3010 home->ctx.radius_ctx = (fr_radius_ctx_t) {
3011 .secret = talloc_strdup(home, secret->vb_strvalue),
3012 .secret_length = secret->vb_length,
3013 .proxy_state = inst->common_ctx.proxy_state,
3014 };
3015
3016 /*
3017 * Allocate the trunk and start it up.
3018 */
3019 home->ctx.trunk = trunk_alloc(home, unlang_interpret_event_list(request), &io_funcs,
3020 &inst->trunk_conf, inst->name, home, false, inst->trigger_args);
3021 if (!home->ctx.trunk) {
3022 fail:
3023 talloc_free(home);
3024 return XLAT_ACTION_FAIL;
3025 }
3026
3027 if (!fr_rb_expire_insert(&thread->bio.expires, home, fr_time())) goto fail;
3028 } else {
3029 fr_rb_expire_t *expire = &thread->bio.expires;
3030 fr_time_t now = fr_time();
3031 home_server_t *old;
3032
3033 /*
3034 * We can't change secrets on the fly. The home
3035 * server has to expire first, and then the
3036 * secret can be changed.
3037 */
3038 if ((home->ctx.radius_ctx.secret_length != secret->vb_length) ||
3039 (strcmp(home->ctx.radius_ctx.secret, secret->vb_strvalue) != 0)) {
3040 RWDEBUG("The new secret is not the same as the old secret: Ignoring the new one");
3041 }
3042
3043 fr_rb_expire_update(expire, home, now);
3044
3045 while ((old = fr_dlist_head(&expire->head)) != NULL) {
3046 (void) talloc_get_type_abort(old, home_server_t);
3047
3048 fr_assert(old->ctx.trunk);
3049
3050 /*
3051 * Don't delete the home server we're about to use.
3052 */
3053 if (old == home) break;
3054
3055 /*
3056 * It still has a request allocated, do nothing.
3057 */
3058 if (old->ctx.trunk->req_alloc) break;
3059
3060 /*
3061 * Not yet time to expire.
3062 */
3063 if (fr_time_gt(old->expire.when, now)) break;
3064
3065 fr_dlist_remove(&expire->head, old);
3066 fr_rb_delete(&expire->tree, old);
3067 }
3068 }
3069
3070 /*
3071 * Enqueue the packet on the per-home-server trunk.
3072 */
3073 rcode = mod_enqueue(&u, &retry_config, inst, home->ctx.trunk, request);
3074 if (rcode == 0) return XLAT_ACTION_DONE;
3075
3076 if (rcode < 0) {
3077 REDEBUG("Failed enqueuing packet");
3078 return XLAT_ACTION_FAIL;
3079 }
3080 fr_assert(u != NULL);
3081 fr_assert(retry_config != NULL);
3082
3083 /*
3084 * Start the retry.
3085 *
3086 * @todo - change unlang_xlat_timeout_add() to unlang_xlat_retry_add().
3087 */
3088 fr_retry_init(&u->retry, fr_time(), retry_config);
3089
3092 u, retry_config);
3093}
unlang_action_t
Returned by unlang_op_t calls, determine the next action of the interpreter.
Definition action.h:35
static int const char char buffer[256]
Definition acutest.h:576
int const char * file
Definition acutest.h:702
va_list args
Definition acutest.h:770
int const char int line
Definition acutest.h:702
static ssize_t fr_bio_write(fr_bio_t *bio, void *packet_ctx, void const *buffer, size_t size)
Write raw data to a bio.
Definition base.h:184
static ssize_t fr_bio_read(fr_bio_t *bio, void *packet_ctx, void *buffer, size_t size)
Read raw data from a bio.
Definition base.h:161
void * uctx
user ctx, caller can manually set it.
Definition base.h:114
#define fr_bio_error(_x)
Definition base.h:200
#define NDEBUG_UNUSED
Definition build.h:347
#define FALL_THROUGH
clang 10 doesn't recognised the FALL-THROUGH comment anymore
Definition build.h:343
#define CC_NO_UBSAN(_sanitize)
Definition build.h:455
#define CMP_PREFER_LARGER(_a, _b)
Evaluates to -1 for a > b, and +1 for a < b.
Definition build.h:109
#define CMP(_a, _b)
Same as CMP_PREFER_SMALLER use when you don't really care about ordering, you just want an ordering.
Definition build.h:113
#define unlikely(_x)
Definition build.h:407
#define UNUSED
Definition build.h:336
connection_state_t
Definition connection.h:47
@ CONNECTION_STATE_FAILED
Connection has failed.
Definition connection.h:56
@ CONNECTION_STATE_CONNECTED
File descriptor is open (ready for writing).
Definition connection.h:54
@ CONNECTION_STATE_INIT
Init state, sets up connection.
Definition connection.h:51
@ CONNECTION_STATE_CONNECTING
Waiting for connection to establish.
Definition connection.h:52
@ CONNECTION_FAILED
Connection is being reconnected because it failed.
Definition connection.h:85
Holds a complete set of functions for a connection.
Definition connection.h:195
#define FR_DBUFF_TMP(_start, _len_or_end)
Creates a compound literal to pass into functions which accept a dbuff.
Definition dbuff.h:522
static int fr_dcursor_append(fr_dcursor_t *cursor, void *v)
Insert a single item at the end of the list.
Definition dcursor.h:406
#define fr_assert_msg(_x, _msg,...)
Calls panic_action ifndef NDEBUG, else logs error and causes the server to exit immediately with code...
Definition debug.h:202
#define fr_assert_fail(_msg,...)
Calls panic_action ifndef NDEBUG, else logs error.
Definition debug.h:208
#define MEM(x)
Definition debug.h:36
@ FR_RADIUS_CODE_ACCESS_CHALLENGE
RFC2865 - Access-Challenge.
Definition defs.h:43
@ FR_RADIUS_CODE_ACCESS_REQUEST
RFC2865 - Access-Request.
Definition defs.h:33
@ FR_RADIUS_CODE_MAX
Maximum possible protocol code.
Definition defs.h:53
@ FR_RADIUS_CODE_DISCONNECT_ACK
RFC3575/RFC5176 - Disconnect-Ack (positive)
Definition defs.h:47
@ FR_RADIUS_CODE_ACCESS_ACCEPT
RFC2865 - Access-Accept.
Definition defs.h:34
@ FR_RADIUS_CODE_ACCOUNTING_RESPONSE
RFC2866 - Accounting-Response.
Definition defs.h:37
@ FR_RADIUS_CODE_COA_NAK
RFC3575/RFC5176 - CoA-Nak (not willing to perform)
Definition defs.h:51
@ FR_RADIUS_CODE_COA_ACK
RFC3575/RFC5176 - CoA-Ack (positive)
Definition defs.h:50
@ FR_RADIUS_CODE_DISCONNECT_NAK
RFC3575/RFC5176 - Disconnect-Nak (not willing to perform)
Definition defs.h:48
@ FR_RADIUS_CODE_PROTOCOL_ERROR
RFC7930 - Protocol-Error (generic NAK)
Definition defs.h:52
@ FR_RADIUS_CODE_ACCOUNTING_REQUEST
RFC2866 - Accounting-Request.
Definition defs.h:36
@ FR_RADIUS_CODE_ACCESS_REJECT
RFC2865 - Access-Reject.
Definition defs.h:35
static fr_dict_attr_t const * attr_packet_type
Definition dhcpclient.c:88
#define ERROR(fmt,...)
Definition dhcpclient.c:40
int main(int argc, char **argv)
Definition dhcpclient.c:530
#define DEBUG(fmt,...)
Definition dhcpclient.c:38
bool fr_dict_compatible(fr_dict_t const *dict1, fr_dict_t const *dict2)
See if two dictionaries have the same end parent.
Definition dict_util.c:2884
static fr_slen_t in
Definition dict.h:882
static void * fr_dlist_head(fr_dlist_head_t const *list_head)
Return the HEAD item of a list or NULL if the list is empty.
Definition dlist.h:468
static void * fr_dlist_remove(fr_dlist_head_t *list_head, void *ptr)
Remove an item from the list.
Definition dlist.h:620
#define fr_event_fd_insert(...)
Definition event.h:247
void(* fr_event_fd_cb_t)(fr_event_list_t *el, int fd, int flags, void *uctx)
Called when an IO event occurs on a file descriptor.
Definition event.h:150
int fr_bio_fd_connect_full(fr_bio_t *bio, fr_event_list_t *el, fr_bio_callback_t connected_cb, fr_bio_callback_t error_cb, fr_time_delta_t *timeout, fr_bio_callback_t timeout_cb)
Finalize a connect()
Definition fd.c:1198
fr_bio_t * fr_bio_fd_alloc(TALLOC_CTX *ctx, fr_bio_fd_config_t const *cfg, size_t offset)
Allocate a FD bio.
Definition fd.c:971
fr_bio_fd_info_t const * fr_bio_fd_info(fr_bio_t *bio)
Returns a pointer to the bio-specific information.
Definition fd.c:1295
int fr_bio_fd_write_only(fr_bio_t *bio)
Mark up a bio as write-only.
Definition fd.c:1348
fr_socket_t socket
as connected socket
Definition fd.h:132
char const * name
printable name of this BIO
Definition fd.h:137
uint16_t src_port
our port
Definition fd.h:91
bool eof
are we at EOF?
Definition fd.h:141
@ FR_BIO_FD_CONNECTED
connected client sockets (UDP or TCP)
Definition fd.h:68
fr_bio_fd_state_t state
connecting, open, closed, etc.
Definition fd.h:135
uint16_t src_port_start
limit source port ranges for client BIOs
Definition fd.h:94
@ FR_BIO_FD_STATE_CONNECTING
Definition fd.h:60
@ FR_BIO_FD_STATE_OPEN
error states must be before this
Definition fd.h:59
int connect_errno
from connect() or other APIs
Definition fd.h:143
fr_ipaddr_t dst_ipaddr
their IP address
Definition fd.h:89
uint16_t src_port_end
limit source port ranges for client BIOs
Definition fd.h:95
int socket_type
SOCK_STREAM or SOCK_DGRAM.
Definition fd.h:83
uint16_t dst_port
their port
Definition fd.h:92
fr_socket_t socket
socket information, including FD.
Definition fd.h:52
bool write_blocked
did we block on write?
Definition fd.h:140
fr_ipaddr_t src_ipaddr
our IP address
Definition fd.h:88
Configuration for sockets.
Definition fd.h:80
Run-time status of the socket.
Definition fd.h:131
Per-packet context.
Definition fd.h:51
talloc_free(hp)
int8_t fr_ipaddr_cmp(fr_ipaddr_t const *a, fr_ipaddr_t const *b)
Compare two ip addresses.
Definition inet.c:1353
int af
Address family.
Definition inet.h:63
void unlang_interpret_mark_runnable(request_t *request)
Mark a request as resumable.
Definition interpret.c:1988
unlang_t const * unlang_interpret_instruction(request_t *request)
Get the current instruction.
Definition interpret.c:321
int unlang_interpret_force_result(unlang_t const *instruction, unlang_result_t *p_result, fr_timer_list_t *tl, fr_time_delta_t expire)
Set (or clear) a forced result.
Definition interpret.c:344
fr_event_list_t * unlang_interpret_event_list(request_t *request)
Get the event list for the current interpreter.
Definition interpret.c:2409
Minimal data structure to use the new code.
Definition listen.h:63
HIDDEN fr_dict_attr_t const * attr_eap_message
Definition base.c:94
void log_request_proto_pair_list(fr_log_lvl_t lvl, request_t *request, fr_pair_t const *parent, fr_pair_list_t const *vps, char const *prefix)
Print a list of protocol fr_pair_ts.
Definition log.c:855
void log_request_pair_list(fr_log_lvl_t lvl, request_t *request, fr_pair_t const *parent, fr_pair_list_t const *vps, char const *prefix)
Print a fr_pair_list_t.
Definition log.c:831
#define PERROR(_fmt,...)
Definition log.h:228
#define DEBUG3(_fmt,...)
Definition log.h:266
#define RWDEBUG(fmt,...)
Definition log.h:373
#define RWARN(fmt,...)
Definition log.h:309
#define DEBUG4(_fmt,...)
Definition log.h:267
#define RPERROR(fmt,...)
Definition log.h:314
#define RINFO(fmt,...)
Definition log.h:308
#define RPEDEBUG(fmt,...)
Definition log.h:388
#define HEXDUMP3(_data, _len, _fmt,...)
Definition log.h:735
#define RHEXDUMP3(_data, _len, _fmt,...)
Definition log.h:717
int map_to_vp(TALLOC_CTX *ctx, fr_pair_list_t *out, request_t *request, map_t const *map, UNUSED void *uctx)
Convert a map to a fr_pair_t.
Definition map.c:1604
int map_to_request(request_t *request, map_t const *map, radius_map_getvalue_t func, void *ctx)
Convert map_t to fr_pair_t (s) and add them to a request_t.
Definition map.c:1884
#define fr_time()
Definition event.c:60
Stores all information relating to an event list.
Definition event.c:377
fr_log_t default_log
Definition log.c:306
void fr_log(fr_log_t const *log, fr_log_type_t type, char const *file, int line, char const *fmt,...)
Send a server log message to its destination.
Definition log.c:616
@ L_DBG_LVL_3
3rd highest priority debug messages (-xxx | -Xx).
Definition log.h:69
@ L_DBG_LVL_2
2nd highest priority debug messages (-xx | -X).
Definition log.h:68
fr_log_type_t
Definition log.h:51
@ L_ERR
Error message.
Definition log.h:53
fr_packet_t * fr_packet_alloc(TALLOC_CTX *ctx, bool new_vector)
Allocate a new fr_packet_t.
Definition packet.c:38
main_config_t const * main_config
Main server configuration.
Definition main_config.c:56
uint32_t max_workers
for the scheduler
fr_bio_t * fr_bio_mem_alloc(TALLOC_CTX *ctx, size_t read_size, size_t write_size, fr_bio_t *next)
Allocate a memory buffer bio.
Definition mem.c:729
int fr_bio_mem_set_verify(fr_bio_t *bio, fr_bio_verify_t verify, void *verify_ctx, bool datagram)
Set the verification function for memory bios.
Definition mem.c:906
fr_bio_verify_action_t
Status returned by the verification callback.
Definition mem.h:32
@ FR_BIO_VERIFY_ERROR_CLOSE
fatal error, the bio should be closed.
Definition mem.h:36
@ FR_BIO_VERIFY_DISCARD
the packet should be discarded
Definition mem.h:34
@ FR_BIO_VERIFY_OK
packet is OK
Definition mem.h:33
@ FR_BIO_VERIFY_WANT_MORE
not enough data for one packet
Definition mem.h:35
bool fr_radius_ok(uint8_t const *packet, size_t *packet_len_p, uint32_t max_attributes, bool require_message_authenticator, decode_fail_t *reason)
unsigned short uint16_t
@ FR_TYPE_STRING
String of printable characters.
@ FR_TYPE_UINT16
16 Bit unsigned integer.
@ FR_TYPE_UINT32
32 Bit unsigned integer.
@ FR_TYPE_COMBO_IP_ADDR
IPv4 or IPv6 address depending on length.
unsigned int uint32_t
long int ssize_t
unsigned char uint8_t
module_instance_t const * mi
Instance of the module being instantiated.
Definition module_ctx.h:42
void * thread
Thread specific instance data.
Definition module_ctx.h:43
void * rctx
Resume ctx that a module previously set.
Definition module_ctx.h:45
fr_event_list_t * el
Event list to register any IO handlers and timers against.
Definition module_ctx.h:68
void * thread
Thread instance data.
Definition module_ctx.h:67
module_instance_t const * mi
Instance of the module being instantiated.
Definition module_ctx.h:64
Temporary structure to hold arguments for module calls.
Definition module_ctx.h:41
Temporary structure to hold arguments for thread_instantiation calls.
Definition module_ctx.h:63
static int mod_enqueue(bio_request_t **p_u, fr_retry_config_t const **p_retry_config, rlm_radius_t const *inst, trunk_t *trunk, request_t *request)
Definition bio.c:2546
fr_bio_fd_config_t fd_config
for threads or sockets
Definition bio.c:48
int num_ports
Definition bio.c:145
static int8_t request_prioritise(void const *one, void const *two)
Definition bio.c:1153
static void do_retry(rlm_radius_t const *inst, bio_request_t *u, request_t *request, fr_retry_t const *retry)
Definition bio.c:1558
fr_timer_t * ev
timer for retransmissions
Definition bio.c:136
static void request_replicate_mux(UNUSED fr_event_list_t *el, trunk_connection_t *tconn, connection_t *conn, UNUSED void *uctx)
Definition bio.c:2224
static void conn_init_error(UNUSED fr_event_list_t *el, UNUSED int fd, UNUSED int flags, int fd_errno, void *uctx)
Connection errored.
Definition bio.c:337
static void request_demux(UNUSED fr_event_list_t *el, trunk_connection_t *tconn, connection_t *conn, UNUSED void *uctx)
Definition bio.c:2047
static void conn_discard(UNUSED fr_event_list_t *el, UNUSED int fd, UNUSED int flags, void *uctx)
Read and discard data.
Definition bio.c:1037
uint8_t id
Last ID assigned to this packet.
Definition bio.c:130
static void request_replicate_demux(UNUSED fr_event_list_t *el, trunk_connection_t *tconn, connection_t *conn, UNUSED void *uctx)
Definition bio.c:2241
uint32_t max_packet_size
Our max packet size. may be different from the parent.
Definition bio.c:89
static void do_signal(rlm_radius_t const *inst, bio_request_t *u, request_t *request, fr_signal_t action)
bool dynamic
is this a dynamic home server.
Definition bio.c:52
static void bio_connected(fr_bio_t *bio)
Definition bio.c:630
uint32_t num_replies
number of reply packets, sent is in retry.count
Definition bio.c:122
static const trunk_io_funcs_t io_funcs
Definition bio.c:2686
static void conn_close(UNUSED fr_event_list_t *el, void *handle, void *uctx)
Shutdown/close a file descriptor.
Definition bio.c:911
bio_limit_ports_t
Definition bio.c:37
@ LIMIT_PORTS_DYNAMIC
Limited source ports for dynamic home servers.
Definition bio.c:40
@ LIMIT_PORTS_NONE
Source port not restricted.
Definition bio.c:38
@ LIMIT_PORTS_STATIC
Limited source ports for static home servers.
Definition bio.c:39
uint32_t priority
copied from request->async->priority
Definition bio.c:119
static rlm_rcode_t radius_code_to_rcode[FR_RADIUS_CODE_MAX]
Turn a reply code into a module rcode;.
Definition bio.c:153
unlang_t const * instruction
Instruction which triggered the start of the zombie period.
Definition bio.c:103
static void conn_error(UNUSED fr_event_list_t *el, UNUSED int fd, UNUSED int flags, int fd_errno, void *uctx)
Connection errored.
Definition bio.c:1072
char const * module_name
the module that opened the connection
Definition bio.c:44
fr_bio_fd_info_t const * fd_info
status of the FD.
Definition bio.c:49
connection_t * connections[]
for tracking outbound connections
Definition bio.c:146
static void mod_signal(module_ctx_t const *mctx, UNUSED request_t *request, fr_signal_t action)
Definition bio.c:2467
uint8_t last_id
Used when replicating to ensure IDs are distributed evenly.
Definition bio.c:86
static void mod_retry(module_ctx_t const *mctx, request_t *request, fr_retry_t const *retry)
Handle module retries.
Definition bio.c:1550
static fr_radius_decode_fail_t decode(TALLOC_CTX *ctx, fr_pair_list_t *reply, uint8_t *response_code, bio_handle_t *h, request_t *request, bio_request_t *u, uint8_t const request_authenticator[static RADIUS_AUTH_VECTOR_LENGTH], uint8_t *data, size_t data_len)
Decode response packet data, extracting relevant information and validating the packet.
Definition bio.c:1192
static void thread_conn_notify(trunk_connection_t *tconn, connection_t *conn, fr_event_list_t *el, trunk_connection_event_t notify_on, UNUSED void *uctx)
Definition bio.c:1084
static int encode(bio_handle_t *h, request_t *request, bio_request_t *u, uint8_t id)
Definition bio.c:1259
fr_time_t last_reply
When we last received a reply.
Definition bio.c:97
static void request_conn_release(connection_t *conn, void *preq_to_reset, UNUSED void *uctx)
Clear out anything associated with the handle from the request.
Definition bio.c:2393
int fd
File descriptor.
Definition bio.c:76
bio_request_t * status_u
for sending status check packets
Definition bio.c:106
bio_handle_ctx_t ctx
common struct for home servers and BIO handles
Definition bio.c:56
static fr_bio_verify_action_t rlm_radius_verify(UNUSED fr_bio_t *bio, void *verify_ctx, UNUSED void *packet_ctx, const void *data, size_t *size)
Definition bio.c:649
struct bio_thread_t::@187 bio
static void mod_write(request_t *request, trunk_request_t *treq, bio_handle_t *h)
Definition bio.c:1660
#define REQUIRE_MA(_h)
fr_pair_list_t extra
VPs for debugging, like Proxy-State.
Definition bio.c:127
bool proxied
is this request being proxied
Definition bio.c:125
size_t buflen
Receive buffer length.
Definition bio.c:92
static void conn_init_readable(fr_event_list_t *el, UNUSED int fd, UNUSED int flags, void *uctx)
Read the connection during the init and negotiation stage.
Definition bio.c:420
fr_time_t last_idle
last time we had nothing to do
Definition bio.c:100
static void bio_tracking_entry_log(fr_log_t const *log, fr_log_type_t log_type, char const *file, int line, radius_track_entry_t *te)
Log additional information about a tracking entry.
Definition bio.c:196
static xlat_action_t xlat_radius_replicate(UNUSED TALLOC_CTX *ctx, UNUSED fr_dcursor_t *out, xlat_ctx_t const *xctx, request_t *request, fr_value_box_list_t *args)
Definition bio.c:2803
radius_track_entry_t * rr
ID tracking, resend count, etc.
Definition bio.c:135
size_t packet_len
Length of the packet.
Definition bio.c:132
static int _bio_handle_free(bio_handle_t *h)
Free a connection handle, closing associated resources.
Definition bio.c:613
size_t partial
partially sent data
Definition bio.c:133
fr_event_list_t * el
Event list.
Definition bio.c:46
static void request_cancel(UNUSED connection_t *conn, void *preq_to_reset, trunk_cancel_reason_t reason, UNUSED void *uctx)
Remove the request from any tracking structures.
Definition bio.c:2361
static void home_server_free(void *data)
Definition bio.c:2679
int num_ports
Definition bio.c:64
static void protocol_error_reply(bio_request_t *u, bio_handle_t *h)
Deal with Protocol-Error replies, and possible negotiation.
Definition bio.c:1869
static void status_check_reset(bio_handle_t *h, bio_request_t *u)
Reset a status_check packet, ready to reuse.
Definition bio.c:232
static const trunk_io_funcs_t io_replicate_funcs
Definition bio.c:2698
static void request_fail(request_t *request, NDEBUG_UNUSED void *preq, void *rctx, NDEBUG_UNUSED trunk_request_state_t state, UNUSED void *uctx)
Write out a canned failure.
Definition bio.c:2415
fr_time_t recv_time
copied from request->async->recv_time
Definition bio.c:120
fr_retry_t retry
retransmission timers
Definition bio.c:137
static void conn_init_writable(UNUSED fr_event_list_t *el, UNUSED int fd, UNUSED int flags, void *uctx)
static xlat_action_t xlat_radius_client(UNUSED TALLOC_CTX *ctx, UNUSED fr_dcursor_t *out, xlat_ctx_t const *xctx, request_t *request, fr_value_box_list_t *args)
Definition bio.c:2953
struct bio_handle_t::@188 bio
rlm_rcode_t rcode
from the transport
Definition bio.c:116
static void status_check_alloc(bio_handle_t *h)
Definition bio.c:249
fr_time_t mrs_time
Most recent sent time which had a reply.
Definition bio.c:96
bool status_checking
whether we're doing status checks
Definition bio.c:105
trunk_t * trunk
trunk handler
Definition bio.c:47
fr_time_t last_sent
last time we sent a packet.
Definition bio.c:99
static void zombie_timeout(fr_timer_list_t *tl, fr_time_t now, void *uctx)
Mark a connection dead after "zombie_interval".
Definition bio.c:1368
bio_handle_ctx_t ctx
for copying to bio_handle_t
Definition bio.c:141
static int mod_thread_instantiate(module_thread_inst_ctx_t const *mctx)
Instantiate thread data for the submodule.
Definition bio.c:2713
static void bio_error(fr_bio_t *bio)
Definition bio.c:639
static void status_check_reply(trunk_request_t *treq, fr_time_t now)
Deal with replies replies to status checks and possible negotiation.
Definition bio.c:1999
static bool check_for_zombie(request_t *request, trunk_connection_t *tconn, fr_time_t now, fr_time_t last_sent)
See if the connection is zombied.
Definition bio.c:1441
static void conn_init_next(UNUSED fr_timer_list_t *tl, UNUSED fr_time_t now, void *uctx)
Perform the next step of init and negotiation.
Definition bio.c:406
bool is_retry
Definition bio.c:117
static int _bio_request_free(bio_request_t *u)
Free a bio_request_t.
Definition bio.c:2525
connection_t * conn
Definition bio.c:84
fr_time_t first_sent
first time we sent a packet since going idle
Definition bio.c:98
static unlang_action_t mod_resume(unlang_result_t *p_result, module_ctx_t const *mctx, UNUSED request_t *request)
Resume execution of the request, returning the rcode set during trunk execution.
Definition bio.c:2455
fr_timer_t * zombie_ev
Zombie timeout.
Definition bio.c:102
static connection_t * thread_conn_alloc(trunk_connection_t *tconn, fr_event_list_t *el, connection_conf_t const *conf, char const *log_prefix, void *uctx)
Definition bio.c:1008
static void xlat_sendto_retry(xlat_ctx_t const *xctx, request_t *request, fr_retry_t const *retry)
Definition bio.c:2942
static void bio_request_reset(bio_request_t *u)
Clear out any connection specific resources from a udp request.
Definition bio.c:215
trunk_request_t * treq
Definition bio.c:115
static xlat_action_t xlat_sendto_resume(TALLOC_CTX *ctx, fr_dcursor_t *out, xlat_ctx_t const *xctx, request_t *request, UNUSED fr_value_box_list_t *in)
Definition bio.c:2914
static void status_check_next(UNUSED fr_timer_list_t *tl, UNUSED fr_time_t now, void *uctx)
Handle retries for a status check.
Definition bio.c:1984
rlm_radius_t const * inst
our instance
Definition bio.c:45
static connection_state_t conn_init(void **h_out, connection_t *conn, void *uctx)
Initialise a new outbound connection.
Definition bio.c:724
connection_t ** connections
Definition bio.c:65
fr_rb_expire_node_t expire
Definition bio.c:143
static void revive_timeout(UNUSED fr_timer_list_t *tl, UNUSED fr_time_t now, void *uctx)
Revive a connection after "revive_interval".
Definition bio.c:1356
uint8_t * packet
Packet we write to the network.
Definition bio.c:131
static void conn_init_timeout(UNUSED fr_timer_list_t *tl, fr_time_t now, void *uctx)
Status check timer when opening the connection for the first time.
Definition bio.c:358
static connection_state_t conn_failed(void *handle, connection_state_t state, UNUSED void *uctx)
Connection failed.
Definition bio.c:981
bio_limit_ports_t limit_source_ports
What type of port limit is in use.
Definition bio.c:51
fr_radius_ctx_t radius_ctx
for signing packets
Definition bio.c:50
radius_track_t * tt
RADIUS ID tracking structure.
Definition bio.c:94
static void mod_dup(request_t *request, bio_request_t *u)
Definition bio.c:1514
bio_handle_ctx_t ctx
common struct for home servers and BIO handles
Definition bio.c:74
static int8_t home_server_cmp(void const *one, void const *two)
Dynamic home server code.
Definition bio.c:2902
uint8_t code
Packet code.
Definition bio.c:129
static void request_mux(UNUSED fr_event_list_t *el, trunk_connection_t *tconn, connection_t *conn, UNUSED void *uctx)
Definition bio.c:1641
uint8_t * buffer
Receive buffer.
Definition bio.c:91
request_t * status_request
Definition bio.c:107
static void request_complete(request_t *request, NDEBUG_UNUSED void *preq, void *rctx, UNUSED void *uctx)
Response has already been written to the rctx at this point.
Definition bio.c:2437
bool status_check
is this packet a status check?
Definition bio.c:124
static xlat_arg_parser_t const xlat_radius_send_args[]
Definition bio.c:2793
static void xlat_sendto_signal(xlat_ctx_t const *xctx, request_t *request, fr_signal_t action)
Definition bio.c:2931
Track the handle, which is tightly correlated with the FD.
Definition bio.c:73
Connect request_t to local tracking structure.
Definition bio.c:114
static uint16_t fr_nbo_to_uint16(uint8_t const data[static sizeof(uint16_t)])
Read an unsigned 16bit integer from wire format (big endian)
Definition nbo.h:146
#define RADIUS_HEADER_LENGTH
Definition net.h:80
#define RADIUS_AUTH_VECTOR_LENGTH
Definition net.h:89
int fr_pair_value_memdup(fr_pair_t *vp, uint8_t const *src, size_t len, bool tainted)
Copy data into an "octets" data type.
Definition pair.c:2962
int fr_pair_value_strdup(fr_pair_t *vp, char const *src, bool tainted)
Copy data into an "string" data type.
Definition pair.c:2663
fr_pair_t * fr_pair_find_by_da(fr_pair_list_t const *list, fr_pair_t const *prev, fr_dict_attr_t const *da)
Find the first pair with a matching da.
Definition pair.c:707
int fr_pair_append(fr_pair_list_t *list, fr_pair_t *to_add)
Add a VP to the end of the list.
Definition pair.c:1352
int fr_pair_delete_by_da(fr_pair_list_t *list, fr_dict_attr_t const *da)
Delete matching pairs from the specified list.
Definition pair.c:1696
fr_pair_t * fr_pair_afrom_da(TALLOC_CTX *ctx, fr_dict_attr_t const *da)
Dynamically allocate a new attribute and assign a fr_dict_attr_t.
Definition pair.c:290
void fr_pair_list_init(fr_pair_list_t *list)
Initialise a pair list header.
Definition pair.c:46
static fr_internal_encode_ctx_t encode_ctx
static fr_dict_attr_t const * attr_error_cause
ssize_t fr_radius_decode(TALLOC_CTX *ctx, fr_pair_list_t *out, uint8_t *packet, size_t packet_len, fr_radius_decode_ctx_t *decode_ctx)
Definition base.c:1162
int fr_radius_sign(uint8_t *packet, uint8_t const *vector, uint8_t const *secret, size_t secret_len)
Sign a previously encoded packet.
Definition base.c:361
ssize_t fr_radius_encode(fr_dbuff_t *dbuff, fr_pair_list_t *vps, fr_radius_encode_ctx_t *packet_ctx)
Definition base.c:1012
char const * fr_radius_packet_name[FR_RADIUS_CODE_MAX]
Definition base.c:115
#define fr_assert(_expr)
Definition rad_assert.h:37
static char * secret
#define REDEBUG(fmt,...)
#define RDEBUG(fmt,...)
#define WARN(fmt,...)
static fr_dict_attr_t const * attr_proxy_state
Definition radclient.c:126
static fr_dict_attr_t const * attr_message_authenticator
Definition radclient.c:127
#define INFO(fmt,...)
Definition radict.c:63
@ FR_RADIUS_REQUIRE_MA_YES
Require Message-Authenticator.
Definition radius.h:63
@ FR_RADIUS_REQUIRE_MA_AUTO
Only require Message-Authenticator if we've previously received a packet from this client with Messag...
Definition radius.h:64
#define RADIUS_AUTH_VECTOR_OFFSET
Definition radius.h:33
fr_radius_decode_fail_t
Failure reasons.
Definition radius.h:89
@ FR_RADIUS_FAIL_NONE
Definition radius.h:90
@ FR_RADIUS_FAIL_MA_MISSING
Definition radius.h:108
@ FR_RADIUS_FAIL_UNKNOWN_PACKET_CODE
Definition radius.h:95
char const * secret
Definition radius.h:127
size_t secret_length
Definition radius.h:128
fr_radius_ctx_t const * common
Definition radius.h:158
fr_radius_decode_fail_t reason
reason for decode failure
Definition radius.h:165
TALLOC_CTX * tmp_ctx
for temporary things cleaned up during decoding
Definition radius.h:162
static fr_dict_t const * dict_radius
Definition radsniff.c:93
static rs_t * conf
Definition radsniff.c:52
static fr_dict_attr_t const * attr_extended_attribute_1
Definition radsnmp.c:110
uint32_t fr_rand(void)
Return a 32-bit random number.
Definition rand.c:104
Smaller fast random number generator.
Definition rand.h:54
void * fr_rb_find(fr_rb_tree_t const *tree, void const *data)
Find an element in the tree, returning the data, not the node.
Definition rb.c:577
bool fr_rb_delete(fr_rb_tree_t *tree, void const *data)
Remove node and free data (if a free function was specified)
Definition rb.c:741
bool fr_rb_expire_insert(fr_rb_expire_t *expire, void *data, fr_time_t now)
Attempt to find current data in the tree, if it does not exist insert it.
Definition rb_expire.c:39
void fr_rb_expire_update(fr_rb_expire_t *expire, void *data, fr_time_t now)
Definition rb_expire.c:57
#define fr_rb_expire_inline_talloc_init(_expire, _type, _field, _data_cmp, _data_free, _lifetime)
Definition rb_expire.h:50
fr_dlist_head_t head
Definition rb_expire.h:35
fr_rb_tree_t tree
Definition rb_expire.h:34
dlist for expiring old entries
Definition rb_expire.h:44
#define RETURN_UNLANG_RCODE(_rcode)
Definition rcode.h:61
rlm_rcode_t
Return codes indicating the result of the module call.
Definition rcode.h:44
@ RLM_MODULE_OK
The module is OK, continue.
Definition rcode.h:49
@ RLM_MODULE_FAIL
Module failed, don't reply.
Definition rcode.h:48
@ RLM_MODULE_REJECT
Immediately reject the request.
Definition rcode.h:47
@ RLM_MODULE_UPDATED
OK (pairs modified).
Definition rcode.h:55
@ RLM_MODULE_HANDLED
The module handled the request, so stop.
Definition rcode.h:50
#define request_local_alloc_external(_ctx, _args)
Allocate a new external request outside of the request pool.
Definition request.h:337
Optional arguments for initialising requests.
Definition request.h:289
static int radius_fixups(rlm_radius_t const *inst, request_t *request)
Do any RADIUS-layer fixups for proxying.
Definition rlm_radius.c:518
static fr_dict_attr_t const * attr_nas_identifier
Definition rlm_radius.c:191
static fr_dict_attr_t const * attr_original_packet_code
Definition rlm_radius.c:192
static fr_dict_attr_t const * attr_event_timestamp
Definition rlm_radius.c:187
static fr_dict_attr_t const * attr_response_length
Definition rlm_radius.c:193
fr_radius_require_ma_t require_message_authenticator
Require Message-Authenticator in responses.
Definition rlm_radius.h:75
fr_time_delta_t revive_interval
Definition rlm_radius.h:60
fr_retry_config_t retry[FR_RADIUS_CODE_MAX]
Definition rlm_radius.h:87
char const * name
Definition rlm_radius.h:56
uint32_t status_check
code of status-check type
Definition rlm_radius.h:79
rlm_radius_mode_t mode
proxy, client, etc.
Definition rlm_radius.h:71
@ RLM_RADIUS_MODE_XLAT_PROXY
radius.sendto.ipaddr(), but we do look for a reply.
Definition rlm_radius.h:47
@ RLM_RADIUS_MODE_INVALID
Definition rlm_radius.h:42
@ RLM_RADIUS_MODE_PROXY
we proxy to one home server
Definition rlm_radius.h:43
@ RLM_RADIUS_MODE_REPLICATE
to a particular destination
Definition rlm_radius.h:45
@ RLM_RADIUS_MODE_UNCONNECTED_REPLICATE
radius.sendto.ipaddr(), but we don't look for a reply
Definition rlm_radius.h:46
@ RLM_RADIUS_MODE_CLIENT
we are a client to one home server
Definition rlm_radius.h:44
uint32_t max_packet_size
Maximum packet size.
Definition rlm_radius.h:66
fr_time_delta_t response_window
Definition rlm_radius.h:58
uint32_t max_attributes
Maximum number of attributes to decode in response.
Definition rlm_radius.h:73
fr_time_delta_t zombie_period
Definition rlm_radius.h:59
fr_bio_fd_config_t fd_config
for now MUST be at the start!
Definition rlm_radius.h:54
static conf_parser_t retry_config[]
Definition rlm_tacacs.c:38
int fr_schedule_worker_id(void)
Return the worker id for the current thread.
Definition schedule.c:110
void connection_signal_reconnect(connection_t *conn, connection_reason_t reason)
Asynchronously signal the connection should be reconnected.
int connection_signal_on_fd(connection_t *conn, int fd)
Setup the connection to change states to connected or failed based on I/O events.
connection_t * connection_alloc(TALLOC_CTX *ctx, fr_event_list_t *el, connection_funcs_t const *funcs, connection_conf_t const *conf, char const *log_prefix, void const *uctx)
Allocate a new connection.
void connection_signal_connected(connection_t *conn)
Asynchronously signal that the connection is open.
void * data
Module's instance data.
Definition module.h:293
#define pair_append_request(_attr, _da)
Allocate and append a fr_pair_t to the request list.
Definition pair.h:37
fr_signal_t
Signals that can be generated/processed by request signal handlers.
Definition signal.h:38
@ FR_SIGNAL_DUP
A duplicate request was received.
Definition signal.h:44
@ FR_SIGNAL_CANCEL
Request has been cancelled.
Definition signal.h:40
eap_aka_sim_process_conf_t * inst
fr_pair_t * vp
Definition log.h:93
Value pair map.
Definition map.h:77
Stores an attribute, a value and various bits of other data.
Definition pair.h:68
char const * fr_syserror(int num)
Guaranteed to be thread-safe version of strerror.
Definition syserror.c:243
#define talloc_get_type_abort_const
Definition talloc.h:117
static int talloc_const_free(void const *ptr)
Free const'd memory.
Definition talloc.h:254
#define talloc_strdup(_ctx, _str)
Definition talloc.h:149
#define fr_time_gteq(_a, _b)
Definition time.h:238
#define fr_time_wrap(_time)
Definition time.h:145
#define fr_time_lteq(_a, _b)
Definition time.h:240
#define fr_time_eq(_a, _b)
Definition time.h:241
#define fr_time_add(_a, _b)
Add a time/time delta together.
Definition time.h:196
#define fr_time_gt(_a, _b)
Definition time.h:237
#define fr_time_sub(_a, _b)
Subtract one time from another.
Definition time.h:229
static fr_unix_time_t fr_time_to_unix_time(fr_time_t when)
Convert an fr_time_t (internal time) to our version of unix time (wallclock time)
Definition time.h:688
static int8_t fr_time_cmp(fr_time_t a, fr_time_t b)
Compare two fr_time_t values.
Definition time.h:916
"server local" time.
Definition time.h:69
An event timer list.
Definition timer.c:49
A timer event.
Definition timer.c:83
#define FR_TIMER_DELETE(_ev_p)
Definition timer.h:103
#define FR_TIMER_DELETE_RETURN(_ev_p)
Definition timer.h:110
#define FR_TIMER_DISARM(_ev)
Definition timer.h:91
static bool fr_timer_armed(fr_timer_t *ev)
Definition timer.h:120
#define fr_timer_at(...)
Definition timer.h:81
void radius_track_state_log(fr_log_t const *log, fr_log_type_t log_type, char const *file, int line, radius_track_t *tt, radius_track_log_extra_t extra)
Print out the state of every tracking entry.
Definition track.c:298
int radius_track_entry_update(radius_track_entry_t *te, uint8_t const *vector)
Update a tracking entry with the authentication vector.
Definition track.c:223
radius_track_entry_t * radius_track_entry_find(radius_track_t *tt, uint8_t packet_id, uint8_t const *vector)
Find a tracking entry from a request authenticator.
Definition track.c:252
radius_track_t * radius_track_alloc(TALLOC_CTX *ctx)
Create an radius_track_t.
Definition track.c:38
#define radius_track_entry_release(_te)
Definition track.h:90
void * uctx
Result/resumption context.
Definition track.h:47
uint8_t id
our ID
Definition track.h:50
unsigned int num_requests
number of requests in the allocation
Definition track.h:65
#define radius_track_entry_reserve(_te_out, _ctx, _tt, _request, _code, _uctx)
Definition track.h:82
request_t * request
as always...
Definition track.h:45
Track one request to a response.
Definition track.h:36
void trunk_connection_callback_readable(UNUSED fr_event_list_t *el, UNUSED int fd, UNUSED int flags, void *uctx)
Standard I/O read function.
Definition trunk.c:4067
void trunk_connection_callback_writable(UNUSED fr_event_list_t *el, UNUSED int fd, UNUSED int flags, void *uctx)
Standard I/O write function.
Definition trunk.c:4084
void trunk_request_signal_partial(trunk_request_t *treq)
Signal a partial write.
Definition trunk.c:2075
void trunk_request_signal_fail(trunk_request_t *treq)
Signal that a trunk request failed.
Definition trunk.c:2178
trunk_request_t * trunk_request_alloc(trunk_t *trunk, request_t *request)
(Pre-)Allocate a new trunk request
Definition trunk.c:2524
uint64_t trunk_connection_requests_requeue(trunk_connection_t *tconn, int states, uint64_t max, bool fail_bound)
Move requests off of a connection and requeue elsewhere.
Definition trunk.c:2056
trunk_enqueue_t trunk_request_enqueue_on_conn(trunk_request_t **treq_out, trunk_connection_t *tconn, request_t *request, void *preq, void *rctx, bool ignore_limits)
Enqueue additional requests on a specific connection.
Definition trunk.c:2793
trunk_enqueue_t trunk_request_enqueue(trunk_request_t **treq_out, trunk_t *trunk, request_t *request, void *preq, void *rctx)
Enqueue a request that needs data written to the trunk.
Definition trunk.c:2639
trunk_enqueue_t trunk_request_requeue(trunk_request_t *treq)
Re-enqueue a request on the same connection.
Definition trunk.c:2728
int trunk_connection_pop_request(trunk_request_t **treq_out, trunk_connection_t *tconn)
Pop a request off a connection's pending queue.
Definition trunk.c:3936
void trunk_request_signal_cancel(trunk_request_t *treq)
Cancel a trunk request.
Definition trunk.c:2198
trunk_t * trunk_alloc(TALLOC_CTX *ctx, fr_event_list_t *el, trunk_io_funcs_t const *funcs, trunk_conf_t const *conf, char const *log_prefix, void const *uctx, bool delay_start, fr_pair_list_t *trigger_args)
Allocate a new collection of connections.
Definition trunk.c:5001
void trunk_request_free(trunk_request_t **treq_to_free)
If the trunk request is freed then update the target requests.
Definition trunk.c:2368
void trunk_connection_signal_active(trunk_connection_t *tconn)
Signal a trunk connection is no longer full.
Definition trunk.c:4013
void trunk_connection_signal_inactive(trunk_connection_t *tconn)
Signal a trunk connection cannot accept more requests.
Definition trunk.c:3990
void trunk_request_signal_sent(trunk_request_t *treq)
Signal that the request was written to a connection successfully.
Definition trunk.c:2096
void trunk_request_signal_complete(trunk_request_t *treq)
Signal that a trunk request is complete.
Definition trunk.c:2140
void trunk_connection_signal_reconnect(trunk_connection_t *tconn, connection_reason_t reason)
Signal a trunk connection is no longer viable.
Definition trunk.c:4052
void trunk_request_state_log(fr_log_t const *log, fr_log_type_t log_type, char const *file, int line, trunk_request_t const *treq)
Definition trunk.c:2881
Associates request queues with a connection.
Definition trunk.c:133
Wraps a normal request.
Definition trunk.c:99
Main trunk management handle.
Definition trunk.c:215
#define TRUNK_REQUEST_STATE_ALL
All request states.
Definition trunk.h:196
trunk_connection_alloc_t connection_alloc
Allocate a new connection_t.
Definition trunk.h:738
trunk_connection_event_t
What type of I/O events the trunk connection is currently interested in receiving.
Definition trunk.h:72
@ TRUNK_CONN_EVENT_BOTH
Trunk should be notified if a connection is readable or writable.
Definition trunk.h:79
@ TRUNK_CONN_EVENT_WRITE
Trunk should be notified if a connection is writable.
Definition trunk.h:77
@ TRUNK_CONN_EVENT_NONE
Don't notify the trunk on connection state changes.
Definition trunk.h:73
@ TRUNK_CONN_EVENT_READ
Trunk should be notified if a connection is readable.
Definition trunk.h:75
trunk_cancel_reason_t
Reasons for a request being cancelled.
Definition trunk.h:55
@ TRUNK_CANCEL_REASON_REQUEUE
A previously sent request is being requeued.
Definition trunk.h:59
@ TRUNK_ENQUEUE_DST_UNAVAILABLE
Destination is down.
Definition trunk.h:154
@ TRUNK_ENQUEUE_FAIL
General failure.
Definition trunk.h:155
@ TRUNK_ENQUEUE_OK
Operation was successful.
Definition trunk.h:151
@ TRUNK_ENQUEUE_NO_CAPACITY
At maximum number of connections, and no connection has capacity.
Definition trunk.h:152
@ TRUNK_ENQUEUE_IN_BACKLOG
Request should be enqueued in backlog.
Definition trunk.h:150
trunk_request_state_t
Used for sanity checks and to simplify freeing.
Definition trunk.h:162
@ TRUNK_REQUEST_STATE_PARTIAL
Some of the request was written to the socket, more of it should be written later.
Definition trunk.h:171
@ TRUNK_REQUEST_STATE_REAPABLE
Request has been written, needs to persist, but we are not currently waiting for any response.
Definition trunk.h:174
@ TRUNK_REQUEST_STATE_UNASSIGNED
Transition state - Request currently not assigned to any connection.
Definition trunk.h:166
@ TRUNK_REQUEST_STATE_INIT
Initial state.
Definition trunk.h:163
@ TRUNK_REQUEST_STATE_CANCEL_SENT
We've informed the remote server that the request has been cancelled.
Definition trunk.h:186
@ TRUNK_REQUEST_STATE_COMPLETE
The request is complete.
Definition trunk.h:183
@ TRUNK_REQUEST_STATE_FAILED
The request failed.
Definition trunk.h:184
@ TRUNK_REQUEST_STATE_CANCEL
A request on a particular socket was cancel.
Definition trunk.h:185
@ TRUNK_REQUEST_STATE_CANCEL_PARTIAL
We partially wrote a cancellation request.
Definition trunk.h:188
@ TRUNK_REQUEST_STATE_BACKLOG
In the backlog.
Definition trunk.h:168
@ TRUNK_REQUEST_STATE_CANCEL_COMPLETE
Remote server has acknowledged our cancellation.
Definition trunk.h:189
@ TRUNK_REQUEST_STATE_PENDING
In the queue of a connection and is pending writing.
Definition trunk.h:169
@ TRUNK_REQUEST_STATE_SENT
Was written to a socket. Waiting for a response.
Definition trunk.h:173
I/O functions to pass to trunk_alloc.
Definition trunk.h:737
static fr_event_list_t * el
xlat_action_t unlang_xlat_yield_to_retry(request_t *request, xlat_func_t resume, fr_unlang_xlat_retry_t retry, xlat_func_signal_t signal, fr_signal_t sigmask, void *rctx, fr_retry_config_t const *retry_cfg)
Yield a request back to the interpreter, with retries.
Definition xlat.c:663
#define XLAT_ARGS(_list,...)
Populate local variables with value boxes from the input list.
Definition xlat.h:383
unsigned int required
Argument must be present, and non-empty.
Definition xlat.h:146
#define XLAT_ARG_PARSER_TERMINATOR
Definition xlat.h:170
xlat_action_t
Definition xlat.h:37
@ XLAT_ACTION_FAIL
An xlat function failed.
Definition xlat.h:44
@ XLAT_ACTION_DONE
We're done evaluating this level of nesting.
Definition xlat.h:43
Definition for a single argument consumed by an xlat function.
Definition xlat.h:145
A node in a graph of unlang_op_t (s) that we execute.
bool fr_pair_list_empty(fr_pair_list_t const *list)
Is a valuepair list empty.
void fr_pair_list_free(fr_pair_list_t *list)
Free memory used by a valuepair list.
void fr_pair_list_append(fr_pair_list_t *dst, fr_pair_list_t *src)
Appends a list of fr_pair_t from a temporary list to a destination list.
fr_retry_state_t fr_retry_next(fr_retry_t *r, fr_time_t now)
Initialize a retransmission counter.
Definition retry.c:110
void fr_retry_init(fr_retry_t *r, fr_time_t now, fr_retry_config_t const *config)
Initialize a retransmission counter.
Definition retry.c:36
fr_time_t start
when we started the retransmission
Definition retry.h:53
fr_time_delta_t rt
retransmit interval
Definition retry.h:57
uint32_t mrc
Maximum retransmission count.
Definition retry.h:36
fr_retry_config_t const * config
master configuration
Definition retry.h:52
fr_retry_state_t state
so callers can see what state it's in.
Definition retry.h:60
@ FR_RETRY_MRC
reached maximum retransmission count
Definition retry.h:47
@ FR_RETRY_CONTINUE
Definition retry.h:46
@ FR_RETRY_MRD
reached maximum retransmission duration
Definition retry.h:48
uint32_t count
number of sent packets
Definition retry.h:58
fr_time_delta_t mrd
Maximum retransmission duration.
Definition retry.h:35
fr_time_t updated
last update, really a cached "now".
Definition retry.h:56
fr_time_t next
when the next timer should be set
Definition retry.h:55
int af
AF_INET, AF_INET6, or AF_UNIX.
Definition socket.h:75
int fd
File descriptor if this is a live socket.
Definition socket.h:78
char const * fr_strerror(void)
Get the last library error.
Definition strerror.c:553
#define fr_value_box_alloc(_ctx, _type, _enumv)
Allocate a value box of a specific type.
Definition value.h:644
#define fr_box_ipaddr(_val)
Definition value.h:317
static fr_slen_t data
Definition value.h:1340
#define fr_box_time_delta(_val)
Definition value.h:366
int nonnull(2, 5))
static size_t char ** out
Definition value.h:1030
void * rctx
Resume context.
Definition xlat_ctx.h:54
module_ctx_t const * mctx
Synthesised module calling ctx.
Definition xlat_ctx.h:52
An xlat calling ctx.
Definition xlat_ctx.h:49