The FreeRADIUS server $Id: 15bac2a4c627c01d1aa2047687b3418955ac7f00 $
Loading...
Searching...
No Matches
proto_radius_tcp.c
Go to the documentation of this file.
1/*
2 * This program is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License as published by
4 * the Free Software Foundation; either version 2 of the License, or
5 * (at your option) any later version.
6 *
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
11 *
12 * You should have received a copy of the GNU General Public License
13 * along with this program; if not, write to the Free Software
14 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
15 */
16
17/**
18 * $Id: a11ae376da1bba7fb065af4280c032ef84eab1a7 $
19 * @file proto_radius_tcp.c
20 * @brief RADIUS handler for TCP.
21 *
22 * @copyright 2016 The FreeRADIUS server project.
23 * @copyright 2016 Alan DeKok (aland@deployingradius.com)
24 */
25#include <netdb.h>
26#include <freeradius-devel/server/protocol.h>
27#include <freeradius-devel/radius/tcp.h>
28#include <freeradius-devel/util/trie.h>
29#include <freeradius-devel/radius/radius.h>
30#include <freeradius-devel/io/application.h>
31#include <freeradius-devel/io/listen.h>
32#include <freeradius-devel/io/schedule.h>
33#include "proto_radius.h"
34
36
37typedef struct {
38 char const *name; //!< socket name
39 int sockfd;
40
41 fr_io_address_t *connection; //!< for connected sockets.
42
43 fr_stats_t stats; //!< statistics for this socket
45
46typedef struct {
47 CONF_SECTION *cs; //!< our configuration
48
49 fr_ipaddr_t ipaddr; //!< IP address to listen on.
50
51 char const *interface; //!< Interface to bind to.
52 char const *port_name; //!< Name of the port for getservent().
53
54 uint32_t recv_buff; //!< How big the kernel's receive buffer should be.
55
56 uint32_t max_packet_size; //!< for message ring buffer.
57 uint32_t max_attributes; //!< Limit maximum decodable attributes.
58
59 uint16_t port; //!< Port to listen on.
60
61 bool recv_buff_is_set; //!< Whether we were provided with a recv_buff
62 bool dynamic_clients; //!< whether we have dynamic clients
63
64 fr_client_list_t *clients; //!< local clients
65
66 fr_trie_t *trie; //!< for parsed networks
67 fr_ipaddr_t *allow; //!< allowed networks for dynamic clients
68 fr_ipaddr_t *deny; //!< denied networks for dynamic clients
69
70 bool read_hexdump; //!< Do we debug hexdump read packets.
71 bool write_hexdump; //!< Do we debug hexdump write packets.
73
74
81
82
87
88 { FR_CONF_OFFSET("interface", proto_radius_tcp_t, interface) },
89 { FR_CONF_OFFSET("port_name", proto_radius_tcp_t, port_name) },
90
91 { FR_CONF_OFFSET("port", proto_radius_tcp_t, port) },
92 { FR_CONF_OFFSET_IS_SET("recv_buff", FR_TYPE_UINT32, 0, proto_radius_tcp_t, recv_buff) },
93
94 { FR_CONF_OFFSET("dynamic_clients", proto_radius_tcp_t, dynamic_clients) } ,
95 { FR_CONF_POINTER("networks", 0, CONF_FLAG_SUBSECTION, NULL), .subcs = (void const *) networks_config },
96
97 { FR_CONF_OFFSET("max_packet_size", proto_radius_tcp_t, max_packet_size), .dflt = "4096" } ,
98 { FR_CONF_OFFSET("max_attributes", proto_radius_tcp_t, max_attributes), .dflt = STRINGIFY(RADIUS_MAX_ATTRIBUTES) } ,
99
100 { FR_CONF_OFFSET("read_hexdump", proto_radius_tcp_t, read_hexdump) },
101 { FR_CONF_OFFSET("write_hexdump", proto_radius_tcp_t, write_hexdump) },
102
104};
105
106
107static ssize_t mod_read(fr_listen_t *li, UNUSED void **packet_ctx, fr_time_t *recv_time_p, uint8_t *buffer, size_t buffer_len, size_t *leftover)
108{
110 proto_radius_tcp_thread_t *thread = talloc_get_type_abort(li->thread_instance, proto_radius_tcp_thread_t);
111 ssize_t data_size;
112 size_t packet_len, in_buffer;
114
115 /*
116 * We may have read multiple packets in the previous read. In which case the buffer may already
117 * have packets remaining. In that case, we can return packets directly from the buffer, and
118 * skip the read().
119 */
120 if (*leftover >= RADIUS_HEADER_LENGTH) {
121 packet_len = fr_nbo_to_uint16(buffer + 2);
122
123 if (packet_len <= *leftover) {
124 data_size = 0;
125 goto have_packet;
126 }
127
128 /*
129 * Else we don't have a full packet, try to read more data from the network.
130 */
131 }
132
133 /*
134 * Read data into the buffer.
135 */
136 data_size = read(thread->sockfd, buffer + *leftover, buffer_len - *leftover);
137 if (data_size < 0) {
138 switch (errno) {
139#if defined(EWOULDBLOCK) && (EWOULDBLOCK != EAGAIN)
140 case EWOULDBLOCK:
141#endif
142 case EAGAIN:
143 /*
144 * We didn't read any data; leave the buffers alone.
145 *
146 * i.e. if we had a partial packet in the buffer and we didn't read any data,
147 * then the partial packet is still left in the buffer.
148 */
149 return 0;
150
151 default:
152 break;
153 }
154
155 PDEBUG2("proto_radius_tcp got read error (%zd) - %s", data_size, fr_syserror(errno));
156 return data_size;
157 }
158
159 /*
160 * Note that we return ERROR for all bad packets, as
161 * there's no point in reading RADIUS packets from a TCP
162 * connection which isn't sending us RADIUS packets.
163 */
164
165 /*
166 * TCP read of zero means the socket is dead.
167 */
168 if (!data_size) {
169 DEBUG2("proto_radius_tcp - other side closed the socket.");
170 return -1;
171 }
172
173have_packet:
174 /*
175 * We MUST always start with a known RADIUS packet.
176 */
177 if ((buffer[0] == 0) || (buffer[0] >= FR_RADIUS_CODE_MAX)) {
178 DEBUG("proto_radius_tcp got invalid packet code %d", buffer[0]);
179 thread->stats.total_unknown_types++;
180 return -1;
181 }
182
183 in_buffer = data_size + *leftover;
184
185 /*
186 * Not enough for one packet. Tell the caller that we need to read more.
187 */
188 if (in_buffer < RADIUS_HEADER_LENGTH) {
189 *leftover = in_buffer;
190 return 0;
191 }
192
193 /*
194 * Figure out how large the RADIUS packet is.
195 */
196 packet_len = fr_nbo_to_uint16(buffer + 2);
197
198 /*
199 * We don't have a complete RADIUS packet. Tell the
200 * caller that we need to read more.
201 */
202 if (in_buffer < packet_len) {
203 *leftover = in_buffer;
204 return 0;
205 }
206
207 /*
208 * We've read at least one packet. Tell the caller that
209 * there's more data available, and return only one packet.
210 */
211 *leftover = in_buffer - packet_len;
212
213 /*
214 * If it's not a RADIUS packet, ignore it.
215 */
216 if (!fr_radius_ok(buffer, &packet_len, inst->max_attributes, false, &reason)) {
217 /*
218 * @todo - check for F5 load balancer packets. <sigh>
219 */
220 DEBUG2("proto_radius_tcp got a packet which isn't RADIUS");
222 return -1;
223 }
224
225 *recv_time_p = fr_time();
226 thread->stats.total_requests++;
227
228 /*
229 * proto_radius sets the priority
230 */
231
232 /*
233 * Print out what we received.
234 */
235 DEBUG2("proto_radius_tcp - Received %s ID %d length %d %s",
237 (int) packet_len, thread->name);
238
239 return packet_len;
240}
241
242
243static ssize_t mod_write(fr_listen_t *li, void *packet_ctx, UNUSED fr_time_t request_time,
244 uint8_t *buffer, size_t buffer_len, size_t written)
245{
246 proto_radius_tcp_thread_t *thread = talloc_get_type_abort(li->thread_instance, proto_radius_tcp_thread_t);
247 fr_io_track_t *track = talloc_get_type_abort(packet_ctx, fr_io_track_t);
248 ssize_t data_size;
249
250 /*
251 * @todo - share a stats interface with the parent? or
252 * put the stats in the listener, so that proto_radius
253 * can update them, too.. <sigh>
254 */
255 if (!written) thread->stats.total_responses++;
256
257 /*
258 * This handles the race condition where we get a DUP,
259 * but the original packet replies before we're run.
260 * i.e. this packet isn't marked DUP, so we have to
261 * discover it's a dup later...
262 *
263 * As such, if there's already a reply, then we ignore
264 * the encoded reply (which is probably going to be a
265 * NAK), and instead just ignore the DUP and don't reply.
266 */
267 if (track->reply_len) {
268 return buffer_len;
269 }
270
271 /*
272 * We only write RADIUS packets.
273 */
274 fr_assert(buffer_len >= 20);
275 fr_assert(written < buffer_len);
276
277 /*
278 * Only write replies if they're RADIUS packets.
279 * sometimes we want to NOT send a reply...
280 */
281 data_size = write(thread->sockfd, buffer + written, buffer_len - written);
282
283 /*
284 * This socket is dead. That's an error...
285 */
286 if (data_size <= 0) return data_size;
287
288#if 0
289 /*
290 * If we're not tracking duplicates, then track->packet is NULL.
291 *
292 * There's no reason to fix this now, as all of this will
293 * be rewritten when the bio stuff works. Since this
294 * code doesn't do anything anyways, it's best to just
295 * comment it out.
296 */
297
298 /*
299 * Root through the reply to determine any
300 * connection-level negotiation data, but only the first
301 * time the packet is being written.
302 */
303 if ((written == 0) && (track->packet[0] == FR_RADIUS_CODE_STATUS_SERVER)) {
304// status_check_reply(inst, buffer, buffer_len);
305 }
306#endif
307
308 /*
309 * Add in previously written data to the response.
310 */
311 return data_size + written;
312}
313
314
316{
317 proto_radius_tcp_thread_t *thread = talloc_get_type_abort(li->thread_instance, proto_radius_tcp_thread_t);
318
319 thread->connection = connection;
320 return 0;
321}
322
323
324static void mod_network_get(int *ipproto, bool *dynamic_clients, fr_trie_t const **trie, void *instance)
325{
326 proto_radius_tcp_t *inst = talloc_get_type_abort(instance, proto_radius_tcp_t);
327
328 *ipproto = IPPROTO_TCP;
329 *dynamic_clients = inst->dynamic_clients;
330 *trie = inst->trie;
331}
332
333
334/** Open a TCP listener for RADIUS
335 *
336 */
337static int mod_open(fr_listen_t *li)
338{
340 proto_radius_tcp_thread_t *thread = talloc_get_type_abort(li->thread_instance, proto_radius_tcp_thread_t);
341
342 int sockfd;
343 fr_ipaddr_t ipaddr = inst->ipaddr;
344 uint16_t port = inst->port;
345
346 fr_assert(!thread->connection);
347
348 li->fd = sockfd = fr_socket_server_tcp(&inst->ipaddr, &port, inst->port_name, true);
349 if (sockfd < 0) {
350 PERROR("Failed opening TCP socket");
351 error:
352 return -1;
353 }
354
355 (void) fr_nonblock(sockfd);
356
357 if (fr_socket_bind(sockfd, inst->interface, &ipaddr, &port) < 0) {
358 close(sockfd);
359 PERROR("Failed binding socket");
360 goto error;
361 }
362
363 if (listen(sockfd, 8) < 0) {
364 close(sockfd);
365 PERROR("Failed listening on socket");
366 goto error;
367 }
368
369 thread->sockfd = sockfd;
370
371 fr_assert((cf_parent(inst->cs) != NULL) && (cf_parent(cf_parent(inst->cs)) != NULL)); /* listen { ... } */
372
374 NULL, 0,
375 &inst->ipaddr, inst->port,
376 inst->interface);
377
378 return 0;
379}
380
381
382/** Set the file descriptor for this socket.
383 */
384static int mod_fd_set(fr_listen_t *li, int fd)
385{
387 proto_radius_tcp_thread_t *thread = talloc_get_type_abort(li->thread_instance, proto_radius_tcp_thread_t);
388
389 thread->sockfd = fd;
390
392 &thread->connection->socket.inet.src_ipaddr, thread->connection->socket.inet.src_port,
393 &inst->ipaddr, inst->port,
394 inst->interface);
395
396 return 0;
397}
398
399static int mod_track_compare(UNUSED void const *instance, UNUSED void *thread_instance, UNUSED fr_client_t *client,
400 void const *one, void const *two)
401{
402 int ret;
403 uint8_t const *a = one;
404 uint8_t const *b = two;
405
406 /*
407 * The tree is ordered by IDs, which are (hopefully)
408 * pseudo-randomly distributed.
409 */
410 ret = (a[1] < b[1]) - (a[1] > b[1]);
411 if (ret != 0) return ret;
412
413 /*
414 * Then ordered by code, which is usually the same.
415 */
416 return (a[0] < b[0]) - (a[0] > b[0]);
417}
418
419
420static char const *mod_name(fr_listen_t *li)
421{
422 proto_radius_tcp_thread_t *thread = talloc_get_type_abort(li->thread_instance, proto_radius_tcp_thread_t);
423
424 return thread->name;
425}
426
427static void mod_hexdump_set(fr_listen_t *li, void *data)
428{
429 proto_radius_tcp_t *inst = talloc_get_type_abort(data, proto_radius_tcp_t);
430 li->read_hexdump = inst->read_hexdump;
431 li->write_hexdump = inst->write_hexdump;
432}
433
434static int mod_instantiate(module_inst_ctx_t const *mctx)
435{
436 proto_radius_tcp_t *inst = talloc_get_type_abort(mctx->mi->data, proto_radius_tcp_t);
437 CONF_SECTION *conf = mctx->mi->conf;
438 size_t i, num;
439 CONF_ITEM *ci;
440 CONF_SECTION *server_cs;
441
442 inst->cs = conf;
443
444 /*
445 * Complain if no "ipaddr" is set.
446 */
447 if (inst->ipaddr.af == AF_UNSPEC) {
448 cf_log_err(conf, "No 'ipaddr' was specified in the 'tcp' section");
449 return -1;
450 }
451
452 if (inst->recv_buff_is_set) {
453 FR_INTEGER_BOUND_CHECK("recv_buff", inst->recv_buff, >=, 32);
454 FR_INTEGER_BOUND_CHECK("recv_buff", inst->recv_buff, <=, INT_MAX);
455 }
456
457 FR_INTEGER_BOUND_CHECK("max_packet_size", inst->max_packet_size, >=, 20);
458 FR_INTEGER_BOUND_CHECK("max_packet_size", inst->max_packet_size, <=, 65536);
459
460 if (!inst->port) {
461 struct servent *s;
462
463 if (!inst->port_name) {
464 cf_log_err(conf, "No 'port' was specified in the 'tcp' section");
465 return -1;
466 }
467
468 s = getservbyname(inst->port_name, "tcp");
469 if (!s) {
470 cf_log_err(conf, "Unknown value for 'port_name = %s", inst->port_name);
471 return -1;
472 }
473
474 inst->port = ntohl(s->s_port);
475 }
476
477 /*
478 * Parse and create the trie for dynamic clients, even if
479 * there's no dynamic clients.
480 *
481 * @todo - we could use this for source IP filtering?
482 * e.g. allow clients from a /16, but not from a /24
483 * within that /16.
484 */
485 num = talloc_array_length(inst->allow);
486 if (!num) {
487 if (inst->dynamic_clients) {
488 cf_log_err(conf, "The 'allow' subsection MUST contain at least one 'network' entry when 'dynamic_clients = true'.");
489 return -1;
490 }
491 } else {
492 MEM(inst->trie = fr_trie_alloc(inst, NULL, NULL));
493
494 for (i = 0; i < num; i++) {
495 fr_ipaddr_t *network;
496
497 /*
498 * Can't add v4 networks to a v6 socket, or vice versa.
499 */
500 if (inst->allow[i].af != inst->ipaddr.af) {
501 cf_log_err(conf, "Address family in entry %zd - 'allow = %pV' does not match 'ipaddr'",
502 i + 1, fr_box_ipaddr(inst->allow[i]));
503 return -1;
504 }
505
506 /*
507 * Duplicates are bad.
508 */
509 network = fr_trie_match_by_key(inst->trie,
510 &inst->allow[i].addr, inst->allow[i].prefix);
511 if (network) {
512 cf_log_err(conf, "Cannot add duplicate entry 'allow = %pV'",
513 fr_box_ipaddr(inst->allow[i]));
514 return -1;
515 }
516
517 /*
518 * Look for overlapping entries.
519 * i.e. the networks MUST be disjoint.
520 *
521 * Note that this catches 192.168.1/24
522 * followed by 192.168/16, but NOT the
523 * other way around. The best fix is
524 * likely to add a flag to
525 * fr_trie_alloc() saying "we can only
526 * have terminal fr_trie_user_t nodes"
527 */
528 network = fr_trie_lookup_by_key(inst->trie,
529 &inst->allow[i].addr, inst->allow[i].prefix);
530 if (network && (network->prefix <= inst->allow[i].prefix)) {
531 cf_log_err(conf, "Cannot add overlapping entry 'allow = %pV'",
532 fr_box_ipaddr(inst->allow[i]));
533 cf_log_err(conf, "Entry is completely enclosed inside of a previously defined network");
534 return -1;
535 }
536
537 /*
538 * Insert the network into the trie.
539 * Lookups will return the fr_ipaddr_t of
540 * the network.
541 */
542 if (fr_trie_insert_by_key(inst->trie,
543 &inst->allow[i].addr, inst->allow[i].prefix,
544 &inst->allow[i]) < 0) {
545 cf_log_err(conf, "Failed adding 'allow = %pV' to tracking table",
546 fr_box_ipaddr(inst->allow[i]));
547 return -1;
548 }
549 }
550
551 /*
552 * And now check denied networks.
553 */
554 num = talloc_array_length(inst->deny);
555 if (!num) return 0;
556
557 /*
558 * Since the default is to deny, you can only add
559 * a "deny" inside of a previous "allow".
560 */
561 for (i = 0; i < num; i++) {
562 fr_ipaddr_t *network;
563
564 /*
565 * Can't add v4 networks to a v6 socket, or vice versa.
566 */
567 if (inst->deny[i].af != inst->ipaddr.af) {
568 cf_log_err(conf, "Address family in entry %zd - 'deny = %pV' does not match 'ipaddr'",
569 i + 1, fr_box_ipaddr(inst->deny[i]));
570 return -1;
571 }
572
573 /*
574 * Duplicates are bad.
575 */
576 network = fr_trie_match_by_key(inst->trie,
577 &inst->deny[i].addr, inst->deny[i].prefix);
578 if (network) {
579 cf_log_err(conf, "Cannot add duplicate entry 'deny = %pV'", fr_box_ipaddr(inst->deny[i]));
580 return -1;
581 }
582
583 /*
584 * A "deny" can only be within a previous "allow".
585 */
586 network = fr_trie_lookup_by_key(inst->trie,
587 &inst->deny[i].addr, inst->deny[i].prefix);
588 if (!network) {
589 cf_log_err(conf, "The network in entry %zd - 'deny = %pV' is not contained "
590 "within a previous 'allow'", i + 1, fr_box_ipaddr(inst->deny[i]));
591 return -1;
592 }
593
594 /*
595 * We hack the AF in "deny" rules. If
596 * the lookup gets AF_UNSPEC, then we're
597 * adding a "deny" inside of a "deny".
598 */
599 if (network->af != inst->ipaddr.af) {
600 cf_log_err(conf, "The network in entry %zd - 'deny = %pV' overlaps with "
601 "another 'deny' rule", i + 1, fr_box_ipaddr(inst->deny[i]));
602 return -1;
603 }
604
605 /*
606 * Insert the network into the trie.
607 * Lookups will return the fr_ipaddr_t of
608 * the network.
609 */
610 if (fr_trie_insert_by_key(inst->trie,
611 &inst->deny[i].addr, inst->deny[i].prefix,
612 &inst->deny[i]) < 0) {
613 cf_log_err(conf, "Failed adding 'deny = %pV' to tracking table",
614 fr_box_ipaddr(inst->deny[i]));
615 return -1;
616 }
617
618 /*
619 * Hack it to make it a deny rule.
620 */
621 inst->deny[i].af = AF_UNSPEC;
622 }
623 }
624
625 ci = cf_section_to_item(mctx->mi->parent->conf); /* listen { ... } */
626 fr_assert(ci != NULL);
627 ci = cf_parent(ci);
628 fr_assert(ci != NULL);
629
630 server_cs = cf_item_to_section(ci);
631
632 /*
633 * Look up local clients, if they exist.
634 */
635 if (cf_section_find_next(server_cs, NULL, "client", CF_IDENT_ANY)) {
636 inst->clients = client_list_parse_section(server_cs, IPPROTO_TCP, false);
637 if (!inst->clients) {
638 cf_log_err(conf, "Failed creating local clients");
639 return -1;
640 }
641 }
642
643 return 0;
644}
645
647{
649
650 /*
651 * Prefer local clients.
652 */
653 if (inst->clients) {
654 fr_client_t *client;
655
656 client = client_find(inst->clients, ipaddr, ipproto);
657 if (client) return client;
658 }
659
660 return client_find(NULL, ipaddr, ipproto);
661}
662
664 .common = {
665 .magic = MODULE_MAGIC_INIT,
666 .name = "radius_tcp",
668 .inst_size = sizeof(proto_radius_tcp_t),
669 .thread_inst_size = sizeof(proto_radius_tcp_thread_t),
670 .instantiate = mod_instantiate,
671 },
672 .default_message_size = 4096,
673
674 .open = mod_open,
675 .read = mod_read,
676 .write = mod_write,
677 .fd_set = mod_fd_set,
678 .track_compare = mod_track_compare,
679 .connection_set = mod_connection_set,
680 .network_get = mod_network_get,
681 .client_find = mod_client_find,
682 .get_name = mod_name,
683 .hexdump_set = mod_hexdump_set,
684};
static int const char char buffer[256]
Definition acutest.h:578
char const * fr_app_io_socket_name(TALLOC_CTX *ctx, fr_app_io_t const *app_io, fr_ipaddr_t const *src_ipaddr, int src_port, fr_ipaddr_t const *dst_ipaddr, int dst_port, char const *interface)
Definition app_io.c:32
module_t common
Common fields to all loadable modules.
Definition app_io.h:34
Public structure describing an I/O path for a protocol.
Definition app_io.h:33
#define STRINGIFY(x)
Definition build.h:197
#define UNUSED
Definition build.h:317
#define CONF_PARSER_TERMINATOR
Definition cf_parse.h:660
#define FR_INTEGER_BOUND_CHECK(_name, _var, _op, _bound)
Definition cf_parse.h:520
#define FR_CONF_OFFSET(_name, _struct, _field)
conf_parser_t which parses a single CONF_PAIR, writing the result to a field in a struct
Definition cf_parse.h:283
#define FR_CONF_POINTER(_name, _type, _flags, _res_p)
conf_parser_t which parses a single CONF_PAIR producing a single global result
Definition cf_parse.h:337
#define FR_CONF_OFFSET_IS_SET(_name, _type, _flags, _struct, _field)
conf_parser_t which parses a single CONF_PAIR, writing the result to a field in a struct,...
Definition cf_parse.h:297
@ CONF_FLAG_MULTI
CONF_PAIR can have multiple copies.
Definition cf_parse.h:449
@ CONF_FLAG_SUBSECTION
Instead of putting the information into a configuration structure, the configuration file routines MA...
Definition cf_parse.h:426
#define FR_CONF_OFFSET_TYPE_FLAGS(_name, _type, _flags, _struct, _field)
conf_parser_t which parses a single CONF_PAIR, writing the result to a field in a struct
Definition cf_parse.h:241
Defines a CONF_PAIR to C data type mapping.
Definition cf_parse.h:597
Common header for all CONF_* types.
Definition cf_priv.h:49
A section grouping multiple CONF_PAIR.
Definition cf_priv.h:101
CONF_ITEM * cf_section_to_item(CONF_SECTION const *cs)
Cast a CONF_SECTION to a CONF_ITEM.
Definition cf_util.c:737
CONF_SECTION * cf_item_to_section(CONF_ITEM const *ci)
Cast a CONF_ITEM to a CONF_SECTION.
Definition cf_util.c:683
CONF_SECTION * cf_section_find_next(CONF_SECTION const *cs, CONF_SECTION const *prev, char const *name1, char const *name2)
Return the next matching section.
Definition cf_util.c:1048
#define cf_log_err(_cf, _fmt,...)
Definition cf_util.h:286
#define cf_parent(_cf)
Definition cf_util.h:101
#define CF_IDENT_ANY
Definition cf_util.h:78
#define MEM(x)
Definition debug.h:36
@ FR_RADIUS_CODE_MAX
Maximum possible protocol code.
Definition defs.h:53
@ FR_RADIUS_CODE_STATUS_SERVER
RFC2865/RFC5997 - Status Server (request)
Definition defs.h:44
static int sockfd
Definition dhcpclient.c:56
#define DEBUG(fmt,...)
Definition dhcpclient.c:39
#define MODULE_MAGIC_INIT
Stop people using different module/library/server versions together.
Definition dl_module.h:63
uint8_t prefix
Prefix length - Between 0-32 for IPv4 and 0-128 for IPv6.
Definition inet.h:69
int af
Address family.
Definition inet.h:64
IPv4/6 prefix.
fr_socket_t socket
src/dst ip and port.
Definition base.h:336
bool read_hexdump
Do we debug hexdump packets as they're read.
Definition listen.h:52
bool write_hexdump
Do we debug hexdump packets as they're written.
Definition listen.h:53
void const * app_io_instance
I/O path configuration context.
Definition listen.h:33
void * thread_instance
thread / socket context
Definition listen.h:34
int fd
file descriptor for this socket - set by open
Definition listen.h:28
Describes a host allowed to send packets to the server.
Definition client.h:80
#define PERROR(_fmt,...)
Definition log.h:228
#define PDEBUG2(_fmt,...)
Definition log.h:272
uint8_t * packet
really a tracking structure, not a packet
Definition master.h:56
size_t reply_len
length of reply, or 1 for "do not reply"
Definition master.h:47
bool fr_radius_ok(uint8_t const *packet, size_t *packet_len_p, uint32_t max_attributes, bool require_message_authenticator, decode_fail_t *reason)
unsigned short uint16_t
@ FR_TYPE_IPV4_ADDR
32 Bit IPv4 Address.
@ FR_TYPE_COMBO_IP_PREFIX
IPv4 or IPv6 address prefix depending on length.
@ FR_TYPE_UINT32
32 Bit unsigned integer.
@ FR_TYPE_IPV6_ADDR
128 Bit IPv6 Address.
@ FR_TYPE_COMBO_IP_ADDR
IPv4 or IPv6 address depending on length.
unsigned int uint32_t
long int ssize_t
unsigned char uint8_t
int fr_nonblock(UNUSED int fd)
Definition misc.c:294
module_instance_t * mi
Instance of the module being instantiated.
Definition module_ctx.h:51
Temporary structure to hold arguments for instantiation calls.
Definition module_ctx.h:50
static uint16_t fr_nbo_to_uint16(uint8_t const data[static sizeof(uint16_t)])
Read an unsigned 16bit integer from wire format (big endian)
Definition nbo.h:146
#define RADIUS_HEADER_LENGTH
Definition net.h:80
fr_app_io_t proto_radius_tcp
fr_client_list_t * clients
local clients
static void mod_hexdump_set(fr_listen_t *li, void *data)
char const * interface
Interface to bind to.
fr_io_address_t * connection
for connected sockets.
fr_ipaddr_t * allow
allowed networks for dynamic clients
uint16_t port
Port to listen on.
fr_trie_t * trie
for parsed networks
bool write_hexdump
Do we debug hexdump write packets.
static fr_client_t * mod_client_find(fr_listen_t *li, fr_ipaddr_t const *ipaddr, int ipproto)
static int mod_open(fr_listen_t *li)
Open a TCP listener for RADIUS.
bool dynamic_clients
whether we have dynamic clients
static void mod_network_get(int *ipproto, bool *dynamic_clients, fr_trie_t const **trie, void *instance)
uint32_t max_packet_size
for message ring buffer.
fr_ipaddr_t * deny
denied networks for dynamic clients
static const conf_parser_t networks_config[]
static ssize_t mod_read(fr_listen_t *li, UNUSED void **packet_ctx, fr_time_t *recv_time_p, uint8_t *buffer, size_t buffer_len, size_t *leftover)
char const * port_name
Name of the port for getservent().
static ssize_t mod_write(fr_listen_t *li, void *packet_ctx, UNUSED fr_time_t request_time, uint8_t *buffer, size_t buffer_len, size_t written)
fr_ipaddr_t ipaddr
IP address to listen on.
char const * name
socket name
static int mod_track_compare(UNUSED void const *instance, UNUSED void *thread_instance, UNUSED fr_client_t *client, void const *one, void const *two)
static int mod_connection_set(fr_listen_t *li, fr_io_address_t *connection)
static int mod_fd_set(fr_listen_t *li, int fd)
Set the file descriptor for this socket.
uint32_t max_attributes
Limit maximum decodable attributes.
static char const * mod_name(fr_listen_t *li)
fr_stats_t stats
statistics for this socket
uint32_t recv_buff
How big the kernel's receive buffer should be.
bool recv_buff_is_set
Whether we were provided with a recv_buff.
CONF_SECTION * cs
our configuration
static int mod_instantiate(module_inst_ctx_t const *mctx)
static const conf_parser_t tcp_listen_config[]
bool read_hexdump
Do we debug hexdump read packets.
char const * fr_radius_packet_name[FR_RADIUS_CODE_MAX]
Definition base.c:116
#define fr_assert(_expr)
Definition rad_assert.h:38
static int ipproto
#define DEBUG2(fmt,...)
Definition radclient.h:43
fr_radius_decode_fail_t
Failure reasons.
Definition radius.h:162
#define RADIUS_MAX_ATTRIBUTES
Definition radius.h:40
static rs_t * conf
Definition radsniff.c:53
CONF_SECTION * conf
Module's instance configuration.
Definition module.h:349
void * data
Module's instance data.
Definition module.h:291
module_instance_t const * parent
Parent module's instance (if any).
Definition module.h:357
conf_parser_t const * config
How to convert a CONF_SECTION to a module instance.
Definition module.h:206
uint64_t total_responses
Definition stats.h:38
uint64_t total_unknown_types
Definition stats.h:46
uint64_t total_requests
Definition stats.h:35
uint64_t total_malformed_requests
Definition stats.h:42
int fr_socket_server_tcp(fr_ipaddr_t const *src_ipaddr, uint16_t *src_port, char const *port_name, bool async)
Open an IPv4/IPv6 TCP socket.
Definition socket.c:975
int fr_socket_bind(int sockfd, char const *ifname, fr_ipaddr_t *src_ipaddr, uint16_t *src_port)
Bind a UDP/TCP v4/v6 socket to a given ipaddr src port, and interface.
Definition socket.c:227
fr_client_t * client_find(fr_client_list_t const *clients, fr_ipaddr_t const *ipaddr, int proto)
Definition client.c:373
fr_client_list_t * client_list_parse_section(CONF_SECTION *section, int proto, TLS_UNUSED bool tls_required)
Definition client.c:471
Group of clients.
Definition client.c:50
eap_aka_sim_process_conf_t * inst
#define fr_time()
Allow us to arbitrarily manipulate time.
Definition state_test.c:8
char const * fr_syserror(int num)
Guaranteed to be thread-safe version of strerror.
Definition syserror.c:243
#define talloc_get_type_abort_const
Definition talloc.h:244
"server local" time.
Definition time.h:69
fr_trie_t * fr_trie_alloc(TALLOC_CTX *ctx, fr_trie_key_t get_key, fr_free_t free_data)
Allocate a trie.
Definition trie.c:741
void * fr_trie_lookup_by_key(fr_trie_t const *ft, void const *key, size_t keylen)
Lookup a key in a trie and return user ctx, if any.
Definition trie.c:1262
void * fr_trie_match_by_key(fr_trie_t const *ft, void const *key, size_t keylen)
Match a key and length in a trie and return user ctx, if any.
Definition trie.c:1286
int fr_trie_insert_by_key(fr_trie_t *ft, void const *key, size_t keylen, void const *data)
Insert a key and user ctx into a trie.
Definition trie.c:1875
close(uq->fd)
#define fr_box_ipaddr(_val)
Definition value.h:316
static fr_slen_t data
Definition value.h:1319