The FreeRADIUS server $Id: 15bac2a4c627c01d1aa2047687b3418955ac7f00 $
Loading...
Searching...
No Matches
proto_radius_tcp.c
Go to the documentation of this file.
1/*
2 * This program is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License as published by
4 * the Free Software Foundation; either version 2 of the License, or
5 * (at your option) any later version.
6 *
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
11 *
12 * You should have received a copy of the GNU General Public License
13 * along with this program; if not, write to the Free Software
14 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
15 */
16
17/**
18 * $Id: bed8c726563e95948b4e153c5ebc1869bc03fa30 $
19 * @file proto_radius_tcp.c
20 * @brief RADIUS handler for TCP.
21 *
22 * @copyright 2016 The FreeRADIUS server project.
23 * @copyright 2016 Alan DeKok (aland@deployingradius.com)
24 */
25#include <netdb.h>
26#include <freeradius-devel/server/protocol.h>
27#include <freeradius-devel/radius/tcp.h>
28#include <freeradius-devel/util/trie.h>
29#include <freeradius-devel/radius/radius.h>
30#include <freeradius-devel/io/application.h>
31#include <freeradius-devel/io/listen.h>
32#include <freeradius-devel/io/schedule.h>
33#include "proto_radius.h"
34
36
38
39typedef struct {
40 CONF_SECTION *cs; //!< our configuration
41
42 fr_ipaddr_t ipaddr; //!< IP address to listen on.
43
44 char const *interface; //!< Interface to bind to.
45 char const *port_name; //!< Name of the port for getservent().
46
47 uint32_t recv_buff; //!< How big the kernel's receive buffer should be.
48
49 uint32_t max_packet_size; //!< for message ring buffer.
50 uint32_t max_attributes; //!< Limit maximum decodable attributes.
51
52 uint16_t port; //!< Port to listen on.
53
54 bool recv_buff_is_set; //!< Whether we were provided with a recv_buff
55 bool dynamic_clients; //!< whether we have dynamic clients
56
57 fr_client_list_t *clients; //!< local clients
58
59 fr_trie_t *trie; //!< for parsed networks
60 fr_ipaddr_t *allow; //!< allowed networks for dynamic clients
61 fr_ipaddr_t *deny; //!< denied networks for dynamic clients
62
63 bool read_hexdump; //!< Do we debug hexdump read packets.
64 bool write_hexdump; //!< Do we debug hexdump write packets.
66
67
74
75
80
81 { FR_CONF_OFFSET("interface", proto_radius_tcp_t, interface) },
82 { FR_CONF_OFFSET("port_name", proto_radius_tcp_t, port_name) },
83
84 { FR_CONF_OFFSET("port", proto_radius_tcp_t, port) },
85 { FR_CONF_OFFSET_IS_SET("recv_buff", FR_TYPE_UINT32, 0, proto_radius_tcp_t, recv_buff) },
86
87 { FR_CONF_OFFSET("dynamic_clients", proto_radius_tcp_t, dynamic_clients) } ,
88 { FR_CONF_POINTER("networks", 0, CONF_FLAG_SUBSECTION, NULL), .subcs = (void const *) networks_config },
89
90 { FR_CONF_OFFSET("max_packet_size", proto_radius_tcp_t, max_packet_size), .dflt = "4096" } ,
91 { FR_CONF_OFFSET("max_attributes", proto_radius_tcp_t, max_attributes), .dflt = STRINGIFY(RADIUS_MAX_ATTRIBUTES) } ,
92
93 { FR_CONF_OFFSET("read_hexdump", proto_radius_tcp_t, read_hexdump) },
94 { FR_CONF_OFFSET("write_hexdump", proto_radius_tcp_t, write_hexdump) },
95
97};
98
99
100static ssize_t mod_read(fr_listen_t *li, UNUSED void **packet_ctx, fr_time_t *recv_time_p, uint8_t *buffer, size_t buffer_len, size_t *leftover)
101{
103 proto_radius_tcp_thread_t *thread = talloc_get_type_abort(li->thread_instance, proto_radius_tcp_thread_t);
104 ssize_t data_size;
105 size_t packet_len, in_buffer;
107
108 /*
109 * We may have read multiple packets in the previous read. In which case the buffer may already
110 * have packets remaining. In that case, we can return packets directly from the buffer, and
111 * skip the read().
112 */
113 if (*leftover >= RADIUS_HEADER_LENGTH) {
114 packet_len = fr_nbo_to_uint16(buffer + 2);
115
116 if (packet_len <= *leftover) {
117 data_size = 0;
118 goto have_packet;
119 }
120
121 /*
122 * Else we don't have a full packet, try to read more data from the network.
123 */
124 }
125
126 /*
127 * Read data into the buffer.
128 */
129 data_size = read(thread->sockfd, buffer + *leftover, buffer_len - *leftover);
130 if (data_size < 0) {
131 switch (errno) {
132#if defined(EWOULDBLOCK) && (EWOULDBLOCK != EAGAIN)
133 case EWOULDBLOCK:
134#endif
135 case EAGAIN:
136 /*
137 * We didn't read any data; leave the buffers alone.
138 *
139 * i.e. if we had a partial packet in the buffer and we didn't read any data,
140 * then the partial packet is still left in the buffer.
141 */
142 return 0;
143
144 default:
145 break;
146 }
147
149 "%s", fr_strerror());
150 return data_size;
151 }
152
153 /*
154 * Note that we return ERROR for all bad packets, as
155 * there's no point in reading RADIUS packets from a TCP
156 * connection which isn't sending us RADIUS packets.
157 */
158
159 /*
160 * TCP read of zero means the socket is dead.
161 */
162 if (!data_size) {
164 "Client closed the connection");
165 return -1;
166 }
167
168have_packet:
169 /*
170 * We MUST always start with a known RADIUS packet.
171 */
172 if ((buffer[0] == 0) || (buffer[0] >= FR_RADIUS_CODE_MAX)) {
174 "Received packet code %u", buffer[0]);
175 thread->stats.total_unknown_types++;
176 return -1;
177 }
178
179 in_buffer = data_size + *leftover;
180
181 /*
182 * Not enough for one packet. Tell the caller that we need to read more.
183 */
184 if (in_buffer < RADIUS_HEADER_LENGTH) {
185 *leftover = in_buffer;
186 return 0;
187 }
188
189 /*
190 * Figure out how large the RADIUS packet is.
191 */
192 packet_len = fr_nbo_to_uint16(buffer + 2);
193
194 /*
195 * Invalid packet lengths cause the socket to be closed.
196 */
197 if (packet_len < RADIUS_HEADER_LENGTH) {
199 "Received packet length %zu", packet_len);
201 return -1;
202 }
203
204 if (packet_len > inst->max_packet_size) {
206 "Received packet length %zu", packet_len);
208 return -1;
209 }
210
211 /*
212 * We don't have a complete RADIUS packet. Tell the
213 * caller that we need to read more.
214 */
215 if (in_buffer < packet_len) {
216 *leftover = in_buffer;
217 return 0;
218 }
219
220 /*
221 * We've read at least one packet. Tell the caller that
222 * there's more data available, and return only one packet.
223 */
224 *leftover = in_buffer - packet_len;
225
226 /*
227 * Unknown packets get discarded, but the socket can remain open.
228 */
229 if ((buffer[0] == 0) || (buffer[0] >= FR_RADIUS_CODE_MAX)) {
231 "Received packet code %u", buffer[0]);
232 thread->stats.total_unknown_types++;
233 return 0;
234 }
235
236 /*
237 * If it's not a RADIUS packet, ignore it.
238 */
239 if (!fr_radius_ok(buffer, &packet_len, inst->max_attributes, false, &reason)) {
240 proto_radius_log(li, reason, NULL, "Received invalid packet");
242 return -1;
243 }
244
245 *recv_time_p = fr_time();
246 thread->stats.total_requests++;
247
248 /*
249 * proto_radius sets the priority
250 */
251
252 /*
253 * Print out what we received.
254 */
255 DEBUG2("proto_radius_tcp - Received %s ID %d length %d %s",
257 (int) packet_len, thread->name);
258
259 return packet_len;
260}
261
262
263static ssize_t mod_write(fr_listen_t *li, void *packet_ctx, UNUSED fr_time_t request_time,
264 uint8_t *buffer, size_t buffer_len, size_t written)
265{
266 proto_radius_tcp_thread_t *thread = talloc_get_type_abort(li->thread_instance, proto_radius_tcp_thread_t);
267 fr_io_track_t *track = talloc_get_type_abort(packet_ctx, fr_io_track_t);
268 ssize_t data_size;
269
270 /*
271 * @todo - share a stats interface with the parent? or
272 * put the stats in the listener, so that proto_radius
273 * can update them, too.. <sigh>
274 */
275 if (!written) thread->stats.total_responses++;
276
277 /*
278 * This handles the race condition where we get a DUP,
279 * but the original packet replies before we're run.
280 * i.e. this packet isn't marked DUP, so we have to
281 * discover it's a dup later...
282 *
283 * As such, if there's already a reply, then we ignore
284 * the encoded reply (which is probably going to be a
285 * NAK), and instead just ignore the DUP and don't reply.
286 */
287 if (track->reply_len) {
288 return buffer_len;
289 }
290
291 /*
292 * We only write RADIUS packets.
293 */
294 fr_assert(buffer_len >= 20);
295 fr_assert(written < buffer_len);
296
297 /*
298 * Only write replies if they're RADIUS packets.
299 * sometimes we want to NOT send a reply...
300 */
301 data_size = write(thread->sockfd, buffer + written, buffer_len - written);
302
303 /*
304 * This socket is dead. That's an error...
305 */
306 if (data_size <= 0) return data_size;
307
308#if 0
309 /*
310 * If we're not tracking duplicates, then track->packet is NULL.
311 *
312 * There's no reason to fix this now, as all of this will
313 * be rewritten when the bio stuff works. Since this
314 * code doesn't do anything anyways, it's best to just
315 * comment it out.
316 */
317
318 /*
319 * Root through the reply to determine any
320 * connection-level negotiation data, but only the first
321 * time the packet is being written.
322 */
323 if ((written == 0) && (track->packet[0] == FR_RADIUS_CODE_STATUS_SERVER)) {
324// status_check_reply(inst, buffer, buffer_len);
325 }
326#endif
327
328 /*
329 * Add in previously written data to the response.
330 */
331 return data_size + written;
332}
333
334
336{
337 proto_radius_tcp_thread_t *thread = talloc_get_type_abort(li->thread_instance, proto_radius_tcp_thread_t);
338
339 thread->connection = connection;
340 return 0;
341}
342
343
344static void mod_network_get(int *ipproto, bool *dynamic_clients, fr_trie_t const **trie, void *instance)
345{
346 proto_radius_tcp_t *inst = talloc_get_type_abort(instance, proto_radius_tcp_t);
347
348 *ipproto = IPPROTO_TCP;
349 *dynamic_clients = inst->dynamic_clients;
350 *trie = inst->trie;
351}
352
353
354/** Open a TCP listener for RADIUS
355 *
356 */
357static int mod_open(fr_listen_t *li)
358{
360 proto_radius_tcp_thread_t *thread = talloc_get_type_abort(li->thread_instance, proto_radius_tcp_thread_t);
361
362 int sockfd;
363 fr_ipaddr_t ipaddr = inst->ipaddr;
364 uint16_t port = inst->port;
365
366 fr_assert(!thread->connection);
367
368 li->fd = sockfd = fr_socket_server_tcp(&inst->ipaddr, &port, inst->port_name, true);
369 if (sockfd < 0) {
370 cf_log_err(li->cs, "Failed opening TCP socket - %s", fr_strerror());
371 error:
372 return -1;
373 }
374
375 (void) fr_nonblock(sockfd);
376
377 if (fr_socket_bind(sockfd, inst->interface, &ipaddr, &port) < 0) {
378 close(sockfd);
379 cf_log_err(li->cs, "Failed binding to socket - %s", fr_strerror());
380 cf_log_err(li->cs, DOC_ROOT_REF(troubleshooting/network/bind));
381 goto error;
382 }
383
384 if (listen(sockfd, 8) < 0) {
385 close(sockfd);
386 cf_log_err(li->cs, "Failed listening on socket - %s", fr_syserror(errno));
387 goto error;
388 }
389
390 thread->sockfd = sockfd;
391
392 fr_assert((cf_parent(inst->cs) != NULL) && (cf_parent(cf_parent(inst->cs)) != NULL)); /* listen { ... } */
393 li->app_io_addr = fr_socket_addr_alloc_inet_src(li, IPPROTO_TCP, 0, &ipaddr, port);
394
396 NULL, 0,
397 &ipaddr, port,
398 inst->interface);
399
400 return 0;
401}
402
403
404/** Set the file descriptor for this socket.
405 */
406static int mod_fd_set(fr_listen_t *li, int fd)
407{
409 proto_radius_tcp_thread_t *thread = talloc_get_type_abort(li->thread_instance, proto_radius_tcp_thread_t);
410
411 thread->sockfd = fd;
412
414 &thread->connection->socket.inet.src_ipaddr, thread->connection->socket.inet.src_port,
415 &inst->ipaddr, inst->port,
416 inst->interface);
417
418 return 0;
419}
420
421static int mod_track_compare(UNUSED void const *instance, UNUSED void *thread_instance, UNUSED fr_client_t *client,
422 void const *one, void const *two)
423{
424 int ret;
425 uint8_t const *a = one;
426 uint8_t const *b = two;
427
428 /*
429 * The tree is ordered by IDs, which are (hopefully)
430 * pseudo-randomly distributed.
431 */
432 ret = (a[1] < b[1]) - (a[1] > b[1]);
433 if (ret != 0) return ret;
434
435 /*
436 * Then ordered by code, which is usually the same.
437 */
438 return (a[0] < b[0]) - (a[0] > b[0]);
439}
440
441
442static char const *mod_name(fr_listen_t *li)
443{
444 proto_radius_tcp_thread_t *thread = talloc_get_type_abort(li->thread_instance, proto_radius_tcp_thread_t);
445
446 return thread->name;
447}
448
449static void mod_hexdump_set(fr_listen_t *li, void *data)
450{
451 proto_radius_tcp_t *inst = talloc_get_type_abort(data, proto_radius_tcp_t);
452 li->read_hexdump = inst->read_hexdump;
453 li->write_hexdump = inst->write_hexdump;
454}
455
456static int mod_instantiate(module_inst_ctx_t const *mctx)
457{
458 proto_radius_tcp_t *inst = talloc_get_type_abort(mctx->mi->data, proto_radius_tcp_t);
459 CONF_SECTION *conf = mctx->mi->conf;
460 size_t num;
461 CONF_ITEM *ci;
462 CONF_SECTION *server_cs;
463
464 inst->cs = conf;
465
466 /*
467 * Complain if no "ipaddr" is set.
468 */
469 if (inst->ipaddr.af == AF_UNSPEC) {
470 cf_log_err(conf, "No 'ipaddr' was specified in the 'tcp' section");
471 return -1;
472 }
473
474 if (inst->recv_buff_is_set) {
475 FR_INTEGER_BOUND_CHECK("recv_buff", inst->recv_buff, >=, 32);
476 FR_INTEGER_BOUND_CHECK("recv_buff", inst->recv_buff, <=, INT_MAX);
477 }
478
479 FR_INTEGER_BOUND_CHECK("max_packet_size", inst->max_packet_size, >=, 20);
480 FR_INTEGER_BOUND_CHECK("max_packet_size", inst->max_packet_size, <=, 65536);
481
482 if (!inst->port) {
483 struct servent *s;
484
485 if (!inst->port_name) {
486 cf_log_err(conf, "No 'port' was specified in the 'tcp' section");
487 return -1;
488 }
489
490 s = getservbyname(inst->port_name, "tcp");
491 if (!s) {
492 cf_log_err(conf, "Unknown value for 'port_name = %s'", inst->port_name);
493 return -1;
494 }
495
496 inst->port = ntohs(s->s_port);
497 }
498
499 /*
500 * Parse and create the trie for dynamic clients, even if
501 * there's no dynamic clients.
502 *
503 * @todo - we could use this for source IP filtering?
504 * e.g. allow clients from a /16, but not from a /24
505 * within that /16.
506 */
507 num = talloc_array_length(inst->allow);
508 if (!num) {
509 if (inst->dynamic_clients) {
510 cf_log_err(conf, "The 'allow' subsection MUST contain at least one 'network' entry when 'dynamic_clients = true'.");
511 return -1;
512 }
513 } else {
514 inst->trie = fr_master_io_network(inst, inst->ipaddr.af, inst->allow, inst->deny);
515 if (!inst->trie) {
516 cf_log_perr(conf, "Failed creating list of networks");
517 return -1;
518 }
519 }
520
521 ci = cf_section_to_item(mctx->mi->parent->conf); /* listen { ... } */
522 fr_assert(ci != NULL);
523 ci = cf_parent(ci);
524 fr_assert(ci != NULL);
525
526 server_cs = cf_item_to_section(ci);
527
528 /*
529 * Look up local clients, if they exist.
530 */
531 if (cf_section_find_next(server_cs, NULL, "client", CF_IDENT_ANY)) {
532 inst->clients = client_list_parse_section(server_cs, IPPROTO_TCP, false);
533 if (!inst->clients) {
534 cf_log_err(conf, "Failed creating local clients");
535 return -1;
536 }
537 }
538
539 return 0;
540}
541
543{
545
546 /*
547 * Prefer local clients.
548 */
549 if (inst->clients) {
550 fr_client_t *client;
551
552 client = client_find(inst->clients, ipaddr, ipproto);
553 if (client) return client;
554 }
555
556 return client_find(NULL, ipaddr, ipproto);
557}
558
560 .common = {
561 .magic = MODULE_MAGIC_INIT,
562 .name = "radius_tcp",
564 .inst_size = sizeof(proto_radius_tcp_t),
565 .thread_inst_size = sizeof(proto_radius_tcp_thread_t),
566 .instantiate = mod_instantiate,
567 },
568 .default_message_size = 4096,
569
570 .open = mod_open,
571 .read = mod_read,
572 .write = mod_write,
573 .fd_set = mod_fd_set,
574 .track_compare = mod_track_compare,
575 .connection_set = mod_connection_set,
576 .network_get = mod_network_get,
577 .client_find = mod_client_find,
578 .get_name = mod_name,
579 .hexdump_set = mod_hexdump_set,
580};
static int const char char buffer[256]
Definition acutest.h:576
char const * fr_app_io_socket_name(TALLOC_CTX *ctx, fr_app_io_t const *app_io, fr_ipaddr_t const *src_ipaddr, int src_port, fr_ipaddr_t const *dst_ipaddr, int dst_port, char const *interface)
Definition app_io.c:32
module_t common
Common fields to all loadable modules.
Definition app_io.h:34
Public structure describing an I/O path for a protocol.
Definition app_io.h:33
#define STRINGIFY(x)
Definition build.h:216
#define UNUSED
Definition build.h:336
#define CONF_PARSER_TERMINATOR
Definition cf_parse.h:657
#define FR_INTEGER_BOUND_CHECK(_name, _var, _op, _bound)
Definition cf_parse.h:517
#define FR_CONF_OFFSET(_name, _struct, _field)
conf_parser_t which parses a single CONF_PAIR, writing the result to a field in a struct
Definition cf_parse.h:280
#define FR_CONF_POINTER(_name, _type, _flags, _res_p)
conf_parser_t which parses a single CONF_PAIR producing a single global result
Definition cf_parse.h:334
#define FR_CONF_OFFSET_IS_SET(_name, _type, _flags, _struct, _field)
conf_parser_t which parses a single CONF_PAIR, writing the result to a field in a struct,...
Definition cf_parse.h:294
@ CONF_FLAG_MULTI
CONF_PAIR can have multiple copies.
Definition cf_parse.h:446
@ CONF_FLAG_SUBSECTION
Instead of putting the information into a configuration structure, the configuration file routines MA...
Definition cf_parse.h:423
#define FR_CONF_OFFSET_TYPE_FLAGS(_name, _type, _flags, _struct, _field)
conf_parser_t which parses a single CONF_PAIR, writing the result to a field in a struct
Definition cf_parse.h:238
Defines a CONF_PAIR to C data type mapping.
Definition cf_parse.h:594
Common header for all CONF_* types.
Definition cf_priv.h:49
A section grouping multiple CONF_PAIR.
Definition cf_priv.h:101
CONF_ITEM * cf_section_to_item(CONF_SECTION const *cs)
Cast a CONF_SECTION to a CONF_ITEM.
Definition cf_util.c:739
CONF_SECTION * cf_item_to_section(CONF_ITEM const *ci)
Cast a CONF_ITEM to a CONF_SECTION.
Definition cf_util.c:685
CONF_SECTION * cf_section_find_next(CONF_SECTION const *cs, CONF_SECTION const *prev, char const *name1, char const *name2)
Return the next matching section.
Definition cf_util.c:1050
#define cf_log_err(_cf, _fmt,...)
Definition cf_util.h:285
#define cf_parent(_cf)
Definition cf_util.h:98
#define cf_log_perr(_cf, _fmt,...)
Definition cf_util.h:292
#define CF_IDENT_ANY
Definition cf_util.h:75
@ FR_RADIUS_CODE_MAX
Maximum possible protocol code.
Definition defs.h:53
@ FR_RADIUS_CODE_STATUS_SERVER
RFC2865/RFC5997 - Status Server (request)
Definition defs.h:44
static int sockfd
Definition dhcpclient.c:55
#define MODULE_MAGIC_INIT
Stop people using different module/library/server versions together.
Definition dl_module.h:63
IPv4/6 prefix.
fr_socket_t socket
src/dst ip and port.
Definition base.h:336
bool read_hexdump
Do we debug hexdump packets as they're read.
Definition listen.h:53
CONF_SECTION * cs
of this listener
Definition listen.h:41
fr_socket_t * app_io_addr
for tracking duplicate sockets
Definition listen.h:36
bool write_hexdump
Do we debug hexdump packets as they're written.
Definition listen.h:54
void const * app_io_instance
I/O path configuration context.
Definition listen.h:33
void * thread_instance
thread / socket context
Definition listen.h:34
int fd
file descriptor for this socket - set by open
Definition listen.h:28
Describes a host allowed to send packets to the server.
Definition client.h:80
uint64_t total_responses
Definition stats.h:38
uint64_t total_unknown_types
Definition stats.h:46
uint64_t total_requests
Definition stats.h:35
uint64_t total_malformed_requests
Definition stats.h:42
#define fr_time()
Definition event.c:60
fr_trie_t * fr_master_io_network(TALLOC_CTX *ctx, int af, fr_ipaddr_t *allow, fr_ipaddr_t *deny)
Create a trie from arrays of allow / deny IP addresses.
Definition master.c:2996
uint8_t * packet
really a tracking structure, not a packet
Definition master.h:57
size_t reply_len
length of reply, or 1 for "do not reply"
Definition master.h:48
bool fr_radius_ok(uint8_t const *packet, size_t *packet_len_p, uint32_t max_attributes, bool require_message_authenticator, decode_fail_t *reason)
unsigned short uint16_t
@ FR_TYPE_IPV4_ADDR
32 Bit IPv4 Address.
@ FR_TYPE_COMBO_IP_PREFIX
IPv4 or IPv6 address prefix depending on length.
@ FR_TYPE_UINT32
32 Bit unsigned integer.
@ FR_TYPE_IPV6_ADDR
128 Bit IPv6 Address.
@ FR_TYPE_COMBO_IP_ADDR
IPv4 or IPv6 address depending on length.
unsigned int uint32_t
long int ssize_t
unsigned char uint8_t
int fr_nonblock(UNUSED int fd)
Definition misc.c:293
module_instance_t * mi
Instance of the module being instantiated.
Definition module_ctx.h:51
Temporary structure to hold arguments for instantiation calls.
Definition module_ctx.h:50
static uint16_t fr_nbo_to_uint16(uint8_t const data[static sizeof(uint16_t)])
Read an unsigned 16bit integer from wire format (big endian)
Definition nbo.h:146
#define RADIUS_HEADER_LENGTH
Definition net.h:80
void proto_radius_log(fr_listen_t const *li, fr_radius_decode_fail_t reason, fr_socket_t const *sock, char const *fmt,...)
Log a message in a canonical format.
fr_stats_t stats
statistics for this socket
char const * name
socket name
fr_io_address_t * connection
for connected sockets.
fr_app_io_t proto_radius_tcp
fr_client_list_t * clients
local clients
static void mod_hexdump_set(fr_listen_t *li, void *data)
char const * interface
Interface to bind to.
fr_ipaddr_t * allow
allowed networks for dynamic clients
uint16_t port
Port to listen on.
fr_trie_t * trie
for parsed networks
bool write_hexdump
Do we debug hexdump write packets.
static fr_client_t * mod_client_find(fr_listen_t *li, fr_ipaddr_t const *ipaddr, int ipproto)
static int mod_open(fr_listen_t *li)
Open a TCP listener for RADIUS.
bool dynamic_clients
whether we have dynamic clients
static void mod_network_get(int *ipproto, bool *dynamic_clients, fr_trie_t const **trie, void *instance)
uint32_t max_packet_size
for message ring buffer.
fr_ipaddr_t * deny
denied networks for dynamic clients
static const conf_parser_t networks_config[]
static ssize_t mod_read(fr_listen_t *li, UNUSED void **packet_ctx, fr_time_t *recv_time_p, uint8_t *buffer, size_t buffer_len, size_t *leftover)
char const * port_name
Name of the port for getservent().
static ssize_t mod_write(fr_listen_t *li, void *packet_ctx, UNUSED fr_time_t request_time, uint8_t *buffer, size_t buffer_len, size_t written)
fr_ipaddr_t ipaddr
IP address to listen on.
static int mod_track_compare(UNUSED void const *instance, UNUSED void *thread_instance, UNUSED fr_client_t *client, void const *one, void const *two)
static int mod_connection_set(fr_listen_t *li, fr_io_address_t *connection)
static int mod_fd_set(fr_listen_t *li, int fd)
Set the file descriptor for this socket.
uint32_t max_attributes
Limit maximum decodable attributes.
static char const * mod_name(fr_listen_t *li)
uint32_t recv_buff
How big the kernel's receive buffer should be.
bool recv_buff_is_set
Whether we were provided with a recv_buff.
CONF_SECTION * cs
our configuration
static int mod_instantiate(module_inst_ctx_t const *mctx)
static const conf_parser_t tcp_listen_config[]
bool read_hexdump
Do we debug hexdump read packets.
char const * fr_radius_packet_name[FR_RADIUS_CODE_MAX]
Definition base.c:115
#define fr_assert(_expr)
Definition rad_assert.h:37
static int ipproto
#define DEBUG2(fmt,...)
fr_radius_decode_fail_t
Failure reasons.
Definition radius.h:89
@ FR_RADIUS_FAIL_IO_ERROR
Definition radius.h:115
@ FR_RADIUS_FAIL_MAX_LENGTH_PACKET
Definition radius.h:92
@ FR_RADIUS_FAIL_UNKNOWN_PACKET_CODE
Definition radius.h:95
@ FR_RADIUS_FAIL_MIN_LENGTH_PACKET
Definition radius.h:91
#define RADIUS_MAX_ATTRIBUTES
Definition radius.h:39
static rs_t * conf
Definition radsniff.c:52
CONF_SECTION * conf
Module's instance configuration.
Definition module.h:351
void * data
Module's instance data.
Definition module.h:293
module_instance_t const * parent
Parent module's instance (if any).
Definition module.h:359
conf_parser_t const * config
How to convert a CONF_SECTION to a module instance.
Definition module.h:206
int fr_socket_server_tcp(fr_ipaddr_t const *src_ipaddr, uint16_t *src_port, char const *port_name, bool async)
Open an IPv4/IPv6 TCP socket.
Definition socket.c:948
int fr_socket_bind(int sockfd, char const *ifname, fr_ipaddr_t *src_ipaddr, uint16_t *src_port)
Bind a UDP/TCP v4/v6 socket to a given ipaddr src port, and interface.
Definition socket.c:200
fr_client_t * client_find(fr_client_list_t const *clients, fr_ipaddr_t const *ipaddr, int proto)
Definition client.c:370
fr_client_list_t * client_list_parse_section(CONF_SECTION *section, int proto, TLS_UNUSED bool tls_required)
Definition client.c:475
Group of clients.
Definition client.c:50
eap_aka_sim_process_conf_t * inst
char const * fr_syserror(int num)
Guaranteed to be thread-safe version of strerror.
Definition syserror.c:243
#define talloc_get_type_abort_const
Definition talloc.h:110
"server local" time.
Definition time.h:69
static fr_socket_t * fr_socket_addr_alloc_inet_src(TALLOC_CTX *ctx, int proto, int ifindex, fr_ipaddr_t const *ipaddr, int port)
A variant of fr_socket_addr_init_inet_src will also allocates a fr_socket_t.
Definition socket.h:241
char const * fr_strerror(void)
Get the last library error.
Definition strerror.c:553
#define DOC_ROOT_REF(_x)
Definition version.h:90
static fr_slen_t data
Definition value.h:1340