The FreeRADIUS server $Id: 15bac2a4c627c01d1aa2047687b3418955ac7f00 $
Loading...
Searching...
No Matches
rlm_eap.c
Go to the documentation of this file.
1/*
2 * This program is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License as published by
4 * the Free Software Foundation; either version 2 of the License, or (at
5 * your option) any later version.
6 *
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
11 *
12 * You should have received a copy of the GNU General Public License
13 * along with this program; if not, write to the Free Software
14 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
15 */
16
17/**
18 * $Id: 92392bb36489a1a475a651b3d49a512c0f8120df $
19 * @file rlm_eap.c
20 * @brief Implements the EAP framework.
21 *
22 * @copyright 2000-2003,2006 The FreeRADIUS server project
23 * @copyright 2001 hereUare Communications, Inc. (raghud@hereuare.com)
24 * @copyright 2003 Alan DeKok (aland@freeradius.org)
25 */
26RCSID("$Id: 92392bb36489a1a475a651b3d49a512c0f8120df $")
27
28#define LOG_PREFIX mctx->mi->name
29
30#include <freeradius-devel/server/base.h>
31#include <freeradius-devel/server/module_rlm.h>
32#include <freeradius-devel/server/dl_module.h>
33#include <freeradius-devel/protocol/freeradius/freeradius.internal.h>
34#include "rlm_eap.h"
35
37
38/** Resume context for calling a submodule
39 *
40 */
41typedef struct {
42 char const *caller; //!< Original caller.
43 rlm_eap_t *inst; //!< Instance of the rlm_eap module.
44 eap_session_t *eap_session; //!< The eap_session we're continuing.
45 rlm_rcode_t rcode; //!< The result of the submodule.
47
48static int submodule_parse(TALLOC_CTX *ctx, void *out, UNUSED void *parent,
49 CONF_ITEM *ci, UNUSED conf_parser_t const *rule);
50static int eap_type_parse(UNUSED TALLOC_CTX *ctx, void *out, UNUSED void *parent,
51 CONF_ITEM *ci, UNUSED conf_parser_t const *rule);
52
54 { L("nai"), REQUIRE_REALM_NAI },
55 { L("no"), REQUIRE_REALM_NO },
56 { L("yes"), REQUIRE_REALM_YES }
57};
59
60static const conf_parser_t module_config[] = {
61 { FR_CONF_OFFSET("require_identity_realm", rlm_eap_t, require_realm),
64 .dflt = "nai" },
65
66 { FR_CONF_OFFSET_IS_SET("default_eap_type", FR_TYPE_VOID, 0, rlm_eap_t, default_method), .func = eap_type_parse },
67
69
70 { FR_CONF_OFFSET("ignore_unknown_eap_types", rlm_eap_t, ignore_unknown_types), .dflt = "no" },
71
72 { FR_CONF_DEPRECATED("timer_expire", rlm_eap_t, timer_limit), .dflt = "60" },
73 { FR_CONF_DEPRECATED("cisco_accounting_username_bug", rlm_eap_t,
74 cisco_accounting_username_bug), .dflt = "no" },
75 { FR_CONF_DEPRECATED("max_sessions", rlm_eap_t, max_sessions), .dflt = "2048" },
77};
78
80static fr_dict_t const *dict_radius;
81
84 { .out = &dict_freeradius, .proto = "freeradius" },
85 { .out = &dict_radius, .proto = "radius" },
87};
88
94
98
99
102 { .out = &attr_auth_type, .name = "Auth-Type", .type = FR_TYPE_UINT32, .dict = &dict_freeradius },
103 { .out = &attr_eap_type, .name = "EAP-Type", .type = FR_TYPE_UINT32, .dict = &dict_freeradius },
104 { .out = &attr_eap_identity, .name = "EAP-Identity", .type = FR_TYPE_STRING, .dict = &dict_freeradius },
105 { .out = &attr_stripped_user_domain, .name = "Stripped-User-Domain", .type = FR_TYPE_STRING, .dict = &dict_freeradius },
106 { .out = &attr_module_failure_message, .name = "Module-Failure-Message", .type = FR_TYPE_STRING, .dict = &dict_freeradius },
107
108 { .out = &attr_eap_message, .name = "EAP-Message", .type = FR_TYPE_OCTETS, .dict = &dict_radius },
109 { .out = &attr_message_authenticator, .name = "Message-Authenticator", .type = FR_TYPE_OCTETS, .dict = &dict_radius },
110 { .out = &attr_user_name, .name = "User-Name", .type = FR_TYPE_STRING, .dict = &dict_radius },
111
113};
114
115static unlang_action_t mod_authenticate(unlang_result_t *p_result, module_ctx_t const *mctx, request_t *request) CC_HINT(nonnull);
116static unlang_action_t mod_authorize(unlang_result_t *p_result, module_ctx_t const *mctx, request_t *request) CC_HINT(nonnull);
117
118/** Loads submodules based on type = foo pairs
119 *
120 * @param[in] ctx to allocate data in (instance of rlm_eap_t).
121 * @param[out] out Where to write child conf section to.
122 * @param[in] parent Base structure address.
123 * @param[in] ci #CONF_PAIR specifying the name of the type module.
124 * @param[in] rule unused.
125 * @return
126 * - 0 on success.
127 * - -1 on failure.
128 */
129static int submodule_parse(TALLOC_CTX *ctx, void *out, void *parent,
130 CONF_ITEM *ci, conf_parser_t const *rule)
131{ char const *name = cf_pair_value(cf_item_to_pair(ci));
132 char *our_name = NULL;
133 char *p;
134 eap_type_t method;
135
136 /*
137 * Search with underscores smashed to hyphens
138 * as that's what's used in the dictionary.
139 */
140 p = our_name = talloc_strdup(NULL, name);
141 while (*p) {
142 if (*p == '_') *p = '-';
143 p++;
144 }
145
146 method = eap_name2type(our_name);
147 talloc_free(our_name);
148
149 if (method == FR_EAP_METHOD_INVALID) {
150 cf_log_err(ci, "Unknown EAP type %s", name);
151 return -1;
152 }
153
154#if !defined(HAVE_OPENSSL_SSL_H) || !defined(HAVE_LIBSSL)
155 /*
156 * This allows the default configuration to be
157 * shipped with EAP-TLS, etc. enabled. If the
158 * system doesn't have OpenSSL, they will be
159 * ignored.
160 *
161 * If the system does have OpenSSL, then this
162 * code will not be used. The administrator will
163 * then have to delete the tls,
164 * etc. configurations from eap.conf in order to
165 * have EAP without the TLS types.
166 */
167 switch (method) {
175 {
177
180 module_instance_t, "rlm_eap"))));
181 WARN("Ignoring EAP method %s because we don't have OpenSSL support", name);
182 }
183 return 0;
184
185 default:
186 break;
187 }
188#endif
189 return module_rlm_submodule_parse(ctx, out, parent, ci, rule);
190}
191
192/** Convert EAP type strings to eap_type_t values
193 *
194 * @param[in] ctx unused.
195 * @param[out] out Where to write the #eap_type_t value we found.
196 * @param[in] parent Base structure address.
197 * @param[in] ci #CONF_PAIR specifying the name of the EAP method.
198 * @param[in] rule unused.
199 * @return
200 * - 0 on success.
201 * - -1 on failure.
202 */
203static int eap_type_parse(UNUSED TALLOC_CTX *ctx, void *out, UNUSED void *parent,
204 CONF_ITEM *ci, UNUSED conf_parser_t const *rule)
205{
206 char const *default_method_name = cf_pair_value(cf_item_to_pair(ci));
207 eap_type_t method;
208
209 /*
210 * Ensure that the default EAP type is loaded.
211 */
212 method = eap_name2type(default_method_name);
213 if (method == FR_EAP_METHOD_INVALID) {
214 cf_log_err(ci, "Unknown EAP type %s", default_method_name);
215 return -1;
216 }
217
218 *(eap_type_t *)out = method;
219
220 return 0;
221}
222
223/** Process NAK data from EAP peer
224 *
225 */
227 eap_type_t last_type,
228 eap_type_data_t *nak)
229{
231 unsigned int i, s_i = 0;
232 fr_pair_t *vp = NULL;
234 eap_type_t sanitised[FR_EAP_METHOD_MAX];
235
236 /*
237 * The NAK data is the preferred EAP type(s) of
238 * the client.
239 *
240 * RFC 3748 says to list one or more proposed
241 * alternative types, one per octet, or to use
242 * 0 for no alternative.
243 */
244 if (!nak->data) {
245 REDEBUG("Peer sent empty (invalid) NAK. Can't select method to continue with");
246
248 }
249
250 /*
251 * Do a loop over the contents of the NAK, only moving entries
252 * which are valid to the sanitised array.
253 */
254 for (i = 0; (i < nak->length) && (i < FR_EAP_METHOD_MAX); i++) {
255
256 /*
257 * Type 0 is valid, and means there are no
258 * common choices.
259 */
260 if (nak->data[i] == 0) {
261 REDEBUG("Peer NAK'd indicating it is not willing to continue");
262
264 }
265
266 /*
267 * It is invalid to request identity,
268 * notification & nak in nak.
269 */
270 if (nak->data[i] < FR_EAP_METHOD_MD5) {
271 REDEBUG("Peer NAK'd asking for bad type %s (%d)", eap_type2name(nak->data[i]), nak->data[i]);
272
274 }
275
276 if ((nak->data[i] >= FR_EAP_METHOD_MAX) ||
277 !inst->methods[nak->data[i]].submodule) {
278 RDEBUG2("Peer NAK'd asking for unsupported EAP type %s (%d), skipping...",
279 eap_type2name(nak->data[i]),
280 nak->data[i]);
281
282 continue;
283 }
284
285 /*
286 * Prevent a firestorm if the client is confused.
287 *
288 * FIXME: Really we should keep a list of
289 * methods we've already sent back.
290 */
291 if (last_type == nak->data[i]) {
292 char const *type_str = eap_type2name(nak->data[i]);
293
294 RDEBUG2("Peer NAK'd our request for %s (%d) with a request for %s (%d), skipping...",
295 type_str, nak->data[i], type_str, nak->data[i]);
296
297 RWARN("!!! We requested to use EAP type %s (%i)", type_str, nak->data[i]);
298 RWARN("!!! The supplicant rejected that, and requested to use the same EAP type.");
299 RWARN("!!! i.e. the supplicant said 'I don't like %s, please use %s instead.",
300 type_str, type_str);
301 RWARN("!!! The supplicant software is broken and does not work properly.");
302 RWARN("!!! Please upgrade it to software that works.");
303
304 continue;
305 }
306
307 sanitised[s_i++] = nak->data[i];
308 }
309
310 if (s_i == 0) {
311 REDEBUG("Peer presented no valid EAP types in its NAK response");
313 }
314
315 vp = fr_pair_find_by_da(&request->control_pairs, NULL, attr_eap_type);
316 if (vp) {
317 /*
318 * Loop over allowed methods and the contents
319 * of the NAK, attempting to find something
320 * we can continue with.
321 */
322 do {
323 /*
324 * Provide a way of the admin potentially
325 * disabling EAP negotiation.
326 */
327 if (vp->vp_uint32 == FR_EAP_METHOD_INVALID) continue;
328
329 for (i = 0; i < s_i; i++) {
330 /*
331 * Enforce per-user configuration of EAP
332 * types.
333 */
334 if (vp->vp_uint32 != sanitised[i]) continue;
335 RDEBUG2("Found mutually acceptable type %s (%d)", eap_type2name(sanitised[i]), sanitised[i]);
336 method = sanitised[i];
337 break;
338 }
339
340 if (method != FR_EAP_METHOD_INVALID) break; /* Found one1 */
341 } while ((vp = fr_pair_find_by_da(&request->control_pairs, vp, attr_eap_type)));
342 /*
343 * If there's no control pairs, respond with
344 * the first valid method in the NAK.
345 */
346 } else {
347 method = sanitised[0];
348 }
349
350 /*
351 * Couldn't find something to continue with,
352 * emit a very verbose message.
353 */
354 if (method == FR_EAP_METHOD_INVALID) {
355 fr_sbuff_t *proposed = NULL, *allowed = NULL;
356
357 FR_SBUFF_TALLOC_THREAD_LOCAL(&proposed, 256, 1024);
358 FR_SBUFF_TALLOC_THREAD_LOCAL(&allowed, 256, 1024);
359
360 for (i = 0; i < s_i; i++) {
361 (void) fr_sbuff_in_sprintf(proposed, "%s (%d), ", eap_type2name(sanitised[i]), sanitised[i]);
362 }
363 fr_sbuff_advance(proposed, -2);
364 fr_sbuff_terminate(proposed);
365
366 vp = NULL;
367 while ((vp = fr_pair_find_by_da(&request->control_pairs, vp, attr_eap_type))) {
368 (void) fr_sbuff_in_sprintf(allowed, "%s (%d), ", eap_type2name(vp->vp_uint32), vp->vp_uint32);
369 }
370 fr_sbuff_advance(allowed, -2); /* Negative advance past start should be disallowed */
371 fr_sbuff_terminate(allowed);
372
373 REDEBUG("No mutually acceptable EAP types found. Supplicant proposed: %s. We allow: %s",
374 fr_sbuff_start(proposed), fr_sbuff_start(allowed));
375 }
376
377 return method;
378}
379
380/** Cancel a call to a submodule
381 *
382 * @param[in] mctx module calling ctx.
383 * @param[in] request The current request.
384 * @param[in] action to perform.
385 */
386static void mod_authenticate_cancel(module_ctx_t const *mctx, request_t *request, UNUSED fr_signal_t action)
387{
388 eap_session_t *eap_session;
389
390 RDEBUG2("Request cancelled - Destroying EAP-Session");
391
392 eap_session = talloc_get_type_abort(mctx->rctx, eap_session_t);
393
394 /*
395 * Normally the unlang_subrequest_signal() function forwards the CANCEL signal to the subrequest,
396 * when there's a subrequest frame in the parents stack. For EAP, this isn't the case. So we
397 * have to forward the signal manually.
398 *
399 * Note that we CANNOT detach the child. It was created as not detachable. If we did create it
400 * as detachable, then the admin could use the "detach" keyword, which is bad.
401 */
402 if (eap_session->subrequest) {
404 }
405
406 /*
407 * This is the only safe thing to do.
408 * We have no idea what state the submodule
409 * left its opaque data in.
410 */
411 eap_session_destroy(&eap_session);
412}
413
414/** Process the result of calling a submodule
415 *
416 * @param[out] p_result Result of calling the module, one of:
417 * - RLM_MODULE_INVALID if the request or EAP session state is invalid.
418 * - RLM_MODULE_OK if this round succeeded.
419 * - RLM_MODULE_HANDLED if we're done with this round.
420 * - RLM_MODULE_REJECT if the user should be rejected.
421 * @param[in] request The current request.
422 * @param[in] mctx module calling ctx.
423 * @param[in] eap_session the EAP session
424 * @param[in] submodule_result the input result from the submodule
425 */
427 request_t *request, eap_session_t *eap_session, unlang_result_t *submodule_result)
428{
429 rlm_rcode_t rcode;
430 fr_pair_t *next, *vp;
431
432 /*
433 * Hoist any instances of Module-Failure-Message from the subrequest
434 * so they can be used for logging failures.
435 */
436 vp = fr_pair_find_by_da(&eap_session->subrequest->request_pairs, NULL, attr_module_failure_message);
437 while (vp) {
438 next = fr_pair_find_by_da(&eap_session->subrequest->request_pairs, vp, attr_module_failure_message);
439 fr_pair_remove(&eap_session->subrequest->request_pairs, vp);
440 fr_pair_steal_append(request->request_ctx, &request->request_pairs, vp);
441 vp = next;
442 }
443
444 /*
445 * Cleanup the subrequest
446 */
447 TALLOC_FREE(eap_session->subrequest);
448
449 /*
450 * The submodule failed. Die.
451 */
452 switch (submodule_result->rcode) {
453 case RLM_MODULE_FAIL:
455 eap_fail(eap_session);
456 eap_session_destroy(&eap_session);
457
458 rcode = RLM_MODULE_INVALID;
459 goto finish;
460
461 /*
462 * Inconsistent result from submodule...
463 */
467 break;
468
469 default:
470 break;
471 }
472
473 /*
474 * We are done, wrap the EAP-request in RADIUS to send
475 * with all other required radius attributes
476 */
477 rcode = eap_compose(eap_session);
478
479 /*
480 * Add to the list only if it is EAP-Request, OR if
481 * it's LEAP, and a response.
482 */
483 if (((eap_session->this_round->request->code == FR_EAP_CODE_REQUEST) &&
484 (eap_session->this_round->request->type.num >= FR_EAP_METHOD_MD5)) ||
485
486 /*
487 * LEAP is a little different. At Stage 4,
488 * it sends an EAP-Success message, but we still
489 * need to keep the State attribute & session
490 * data structure around for the AP Challenge.
491 *
492 * At stage 6, LEAP sends an EAP-Response, which
493 * isn't put into the list.
494 */
495 ((eap_session->this_round->response->code == FR_EAP_CODE_RESPONSE) &&
496 (eap_session->this_round->response->type.num == FR_EAP_METHOD_LEAP) &&
497 (eap_session->this_round->request->code == FR_EAP_CODE_SUCCESS) &&
498 (eap_session->this_round->request->type.num == 0))) {
499 talloc_free(eap_session->prev_round);
500 eap_session->prev_round = eap_session->this_round;
501 eap_session->this_round = NULL;
502 } else {
503 RDEBUG2("Cleaning up EAP session");
504 eap_session_destroy(&eap_session);
505 }
506
507 /*
508 * Freeze the eap_session so we can continue
509 * the authentication session later.
510 */
511 eap_session_freeze(&eap_session);
512
513finish:
514 RETURN_UNLANG_RCODE(rcode);
515}
516
517/** Call mod_authenticate_result asynchronously from the unlang interpreter
518 *
519 * @param[out] p_result The result of the operation.
520 * @param[in] mctx module calling ctx.
521 * @param[in] request the current request.
522 * @return The result of this round of authentication.
523 */
525 request_t *request)
526{
527 eap_session_t *eap_session = talloc_get_type_abort(mctx->rctx, eap_session_t);
528
529 return mod_authenticate_result(p_result, mctx, request, eap_session, &eap_session->submodule_result);
530}
531
532/** Basic tests to determine if an identity is a valid NAI
533 *
534 * In this version we mostly just care about realm.
535 *
536 * @param[in] identity to check.
537 * @return
538 * - The length of the string on success.
539 * - <= 0 a negative offset specifying where the format error occurred.
540 */
541static ssize_t eap_identity_is_nai_with_realm(char const *identity)
542{
543 char const *p = identity;
544 char const *end = identity + (talloc_strlen(identity));
545 char const *realm;
546
547 /*
548 * Get the last '@'
549 */
550 p = realm = memrchr(identity, '@', end - p);
551 if (!p) {
552 fr_strerror_printf("Identity is not valid. Missing realm separator '@'");
553 return identity - end;
554 }
555
556 p = memchr(p, '.', end - p);
557 if (!p) {
558 fr_strerror_printf("Identity is not valid. Realm is missing label separator '.'");
559 return identity - end;
560 }
561
562 if ((realm + 1) == p) {
563 fr_strerror_printf("Identity is not valid. "
564 "Realm is missing label between realm separator '@' and label separator '.'");
565 return identity - realm;
566 }
567 if ((p + 1) == end) {
568 fr_strerror_printf("Identity is not valid. "
569 "Realm is missing label between label separator '.' and the end of the "
570 "identity string");
571 return identity - end;
572 }
573
574 return end - identity;
575}
576
577/** Select the correct callback based on a response
578 *
579 * Based on the EAP response from the supplicant, and setup a call on the
580 * unlang stack to the appropriate submodule.
581 *
582 * Default to the configured EAP-Type for all Unsupported EAP-Types.
583 *
584 * @param[out] p_result the result of the operation.
585 * @param[in] mctx module calling ctx.
586 * @param[in] eap_session State data that persists over multiple rounds of EAP.
587 * @return
588 * - UNLANG_ACTION_CALCULATE_RESULT + p_result->rcode = RLM_MODULE_INVALID.
589 * Invalid request.
590 * - UNLANG_ACTION_PUSHED_CHILD Yield control back to the interpreter so it can
591 * call the submodule.
592 */
594{
596 eap_type_data_t *type = &eap_session->this_round->response->type;
597 request_t *request = eap_session->request;
598
599 rlm_eap_method_t const *method;
600
601 eap_type_t next = inst->default_method;
602 fr_pair_t *vp;
603
604 /*
605 * Session must have been thawed...
606 */
607 fr_assert(eap_session->request);
608
609 /*
610 * Don't trust anyone.
611 */
612 if ((type->num == 0) || (type->num >= FR_EAP_METHOD_MAX)) {
613 REDEBUG("Peer sent EAP type number %d, which is outside known range", type->num);
614
615 is_invalid:
617 }
618
619 /*
620 * Multiple levels of TLS nesting are invalid. But if
621 * the parent has a home_server defined, then this
622 * request is being processed through a virtual
623 * server... so that's OK.
624 *
625 * i.e. we're inside an EAP tunnel, which means we have a
626 * parent. If the outer session exists, and doesn't have
627 * a home server, then it's multiple layers of tunneling.
628 */
629 if (type->num == FR_EAP_METHOD_TLS && eap_session->request->parent &&
630 eap_session->request->parent->parent) {
631 RERROR("Multiple levels of TLS nesting are invalid");
632 goto is_invalid;
633 }
634
635 RDEBUG2("Peer sent packet with EAP method %s (%d)", eap_type2name(type->num), type->num);
636
637 /*
638 * Figure out what to do.
639 */
640 switch (type->num) {
642 {
643 ssize_t slen;
644
645 /*
646 * Check if we allow this identity format
647 */
648 switch (inst->require_realm) {
650 slen = eap_identity_is_nai_with_realm(eap_session->identity);
651 if (slen <= 0) {
652 char *tmp_id;
653 bad_id:
654 /*
655 * Produce an escaped version and run that
656 * through the format check function to get
657 * the correct offset *sigh*...
658 */
659 MEM(tmp_id = fr_asprint(NULL,
660 eap_session->identity,
661 talloc_strlen(eap_session->identity),
662 '"'));
663 slen = eap_identity_is_nai_with_realm(tmp_id);
664
665 REMARKER(tmp_id, slen, "%s", fr_strerror());
666
667 talloc_free(tmp_id);
668 goto is_invalid;
669 }
670 break;
671
673 slen = eap_identity_is_nai_with_realm(eap_session->identity);
674 if (slen <= 0) {
675 fr_pair_t *stripped_user_domain;
676
677 /*
678 * If it's not an NAI with a realm, check
679 * to see if the user has set Stripped-User-domain.
680 */
681 stripped_user_domain = fr_pair_find_by_da_idx(&eap_session->request->request_pairs,
683 if (!stripped_user_domain) goto bad_id;
684 }
685 break;
686
687 case REQUIRE_REALM_NO:
688 break;
689 }
690 }
691 /*
692 * Allow per-user configuration of EAP types.
693 */
694 vp = fr_pair_find_by_da(&eap_session->request->control_pairs, NULL, attr_eap_type);
695 if (vp) {
696 RDEBUG2("Using method from control.EAP-Type");
697 next = vp->vp_uint32;
698 /*
699 * We have an array of the submodules which
700 * have a type_identity callback. Call
701 * each of these in turn to see if any of
702 * them recognise the identity.
703 */
704 } else if (inst->type_identity_submodule) {
705 size_t i;
706
707 for (i = 0; i < inst->type_identity_submodule_len; i++) {
708 rlm_eap_submodule_t const *submodule =
709 (rlm_eap_submodule_t const *)inst->type_identity_submodule[i]->exported;
710 eap_type_t ret;
711
712 ret = submodule->type_identity(inst->type_identity_submodule[i]->data,
713 eap_session->identity,
714 talloc_strlen(eap_session->identity));
715 if (ret != FR_EAP_METHOD_INVALID) {
716 next = ret;
717 break;
718 }
719 }
720 }
721 do_init:
722 /*
723 * Ensure it's valid.
724 */
725 if ((next < FR_EAP_METHOD_MD5) || (next >= FR_EAP_METHOD_MAX) || (!inst->methods[next].submodule)) {
726 REDEBUG2("Peer tried to start unsupported EAP type %s (%d)",
727 eap_type2name(next), next);
728 goto is_invalid;
729 }
730
731 eap_session->process = inst->methods[next].submodule->session_init;
732 eap_session->type = next;
733 break;
734
736 /*
737 * Delete old data, if necessary. If we called a method
738 * before, and it initialized itself, we need to free
739 * the memory it alloced.
740 */
741 TALLOC_FREE(eap_session->opaque);
742 fr_state_discard_child(eap_session->request, eap_session, 0);
743 next = eap_process_nak(mctx, eap_session->request, eap_session->type, type);
744 if (!next) RETURN_UNLANG_REJECT;
745
746 /*
747 * Initialise the state machine for the next submodule
748 */
749 goto do_init;
750
751 /*
752 * Only allow modules that are enabled to be called,
753 * treating any other requests as invalid.
754 *
755 * This may seem a bit harsh, but remember the server
756 * dictates which type of EAP method should be started,
757 * so this is the supplicant ignoring the normal EAP method
758 * negotiation mechanism, by not NAKing and just trying
759 * to start a new EAP method.
760 */
761 default:
762 if (!inst->methods[type->num].submodule) {
763 REDEBUG2("Peer asked for unsupported EAP type %s (%d)", eap_type2name(type->num), type->num);
764 goto is_invalid;
765 }
766 /*
767 * Perr started the EAP method without
768 * sending an Identity-Response.
769 *
770 * There's nothing that says it *HAS* to send an
771 * identity response before starting a method,
772 * so just jump to the initialisation function
773 * of the method and continue.
774 */
775 if (eap_session->rounds == 0) {
776 RDEBUG2("Peer started EAP type %s (%d) without sending an Identity", eap_type2name(type->num), type->num);
777 vp = fr_pair_find_by_da(&eap_session->request->control_pairs, NULL, attr_eap_type);
778 if (vp) {
779 RDEBUG2("Using method from control.EAP-Type");
780 next = vp->vp_uint32;
781 }
782 goto do_init;
783 }
784
785 /*
786 * FIXME - We should only update the type
787 * on completion of the final round.
788 */
789 eap_session->type = type->num;
790 break;
791 }
792
793 method = &inst->methods[eap_session->type];
794
795 RDEBUG2("Calling submodule %s", method->submodule->common.name);
796
797 /*
798 * Allocate a new subrequest, which is NOT detachable.
799 */
800 MEM(eap_session->subrequest = unlang_subrequest_alloc(request,
801 method->submodule->namespace ?
802 *(method->submodule->namespace) :
803 request->proto_dict));
804
805 if (method->submodule->clone_parent_lists) {
806 if (fr_pair_list_copy(eap_session->subrequest->control_ctx,
807 &eap_session->subrequest->control_pairs, &request->control_pairs) < 0) {
808 list_copy_fail:
809 RERROR("Failed copying parent's attribute list");
810 fail:
811 TALLOC_FREE(eap_session->subrequest);
813 }
814
815 if (fr_pair_list_copy(eap_session->subrequest->request_ctx,
816 &eap_session->subrequest->request_pairs,
817 &request->request_pairs) < 0) goto list_copy_fail;
818 }
819
820 /*
821 * Push a resumption frame for the parent
822 * This will get executed when the child is
823 * done (after the subrequest frame in the
824 * parent gets popped).
825 */
827
828 /*
829 * This sets up a subrequest frame in the parent
830 * and a resumption frame in the child.
831 *
832 * This must be done before pushing frames onto
833 * the child's stack.
834 */
835 if (unlang_subrequest_child_push(&eap_session->submodule_result, eap_session->subrequest,
836 eap_session,
837 false, UNLANG_SUB_FRAME) < 0) {
838 child_fail:
839 unlang_interpet_frame_discard(request); /* Ensure the yield frame doesn't stick around */
840 goto fail;
841 }
842
843 /*
844 * Push the EAP submodule into the child's stack
845 */
846 if (unlang_module_push(NULL, /* rcode should bubble up and be set in eap_session->submodule_rcode */
847 eap_session->subrequest, method->submodule_inst, eap_session->process,
848 UNLANG_SUB_FRAME) < 0) {
849 goto child_fail;
850 }
851
852 if (eap_session->identity) {
853 fr_pair_t *identity;
854
855 request = eap_session->subrequest; /* Set request for pair_append_request macro */
856
857 MEM(pair_append_request(&identity, attr_eap_identity) >= 0);
858 fr_pair_value_bstrdup_buffer(identity, eap_session->identity, true);
859 }
860
861 /*
862 * Add the EAP-Type we're running to the subrequest
863 * This is useful for when policies are shared between
864 * virtual server sections for multiple EAP types.
865 */
866 {
867 fr_pair_t *type_vp;
868
869 MEM(pair_append_request(&type_vp, attr_eap_type) >= 0);
870 type_vp->vp_uint32 = eap_session->type;
871 }
872
874}
875
876static void eap_failure(request_t *request)
877{
878 fr_pair_t *vp;
879 uint8_t buffer[4];
880
881 fr_pair_delete_by_da(&request->reply_pairs, attr_eap_message);
882
883 vp = fr_pair_find_by_da(&request->reply_pairs, NULL, attr_message_authenticator);
884 if (!vp) {
885 static uint8_t const auth_vector[RADIUS_AUTH_VECTOR_LENGTH] = { 0x00 };
886
888 fr_pair_value_memdup(vp, auth_vector, sizeof(auth_vector), false);
889 }
890 request->reply->code = FR_RADIUS_CODE_ACCESS_REJECT;
891
893 buffer[1] = (vp->vp_length >= 2) ? vp->vp_octets[1] : 0;
894 buffer[2] = 0;
895 buffer[3] = 4;
896
898 fr_pair_value_memdup(vp, buffer, sizeof(buffer), false);
899
900 eap_session_discard(request);
901}
902
904{
906 eap_session_t *eap_session;
907 eap_packet_raw_t *eap_packet;
909 fr_pair_t *vp;
910
911 vp = fr_pair_find_by_da(&request->request_pairs, NULL, attr_eap_message);
912 if (!vp) {
913 REDEBUG("You set 'Auth-Type = EAP' for a request that does not contain an EAP-Message attribute!");
915 }
916
917 /*
918 * Reconstruct the EAP packet from the EAP-Message
919 * attribute. The relevant decoder should have already
920 * concatenated the fragments into a single buffer.
921 *
922 * If it's not a valid EAP packet, we send back a canned
923 * failure, and discard the entire EAP session.
924 */
925 eap_packet = eap_packet_from_vp(request, &request->request_pairs);
926 if (!eap_packet) {
927 RPERROR("Malformed EAP Message");
928 fail:
929 eap_failure(request);
931 }
932
933 /*
934 * Allocate a new eap_session, or if this request
935 * is part of an ongoing authentication session,
936 * retrieve the existing eap_session from the request
937 * data.
938 */
939 eap_session = eap_session_continue(inst, &eap_packet, request);
940 if (!eap_session) goto fail;
941
942 /*
943 * Call an EAP submodule to process the request,
944 * or with simple types like Identity and NAK,
945 * process it ourselves.
946 */
947 if ((ua = eap_method_select(p_result, mctx, eap_session)) != UNLANG_ACTION_CALCULATE_RESULT) return ua;
948 switch (p_result->rcode) {
949 case RLM_MODULE_OK:
951 eap_session_freeze(&eap_session);
952 break;
953
954 /*
955 * RFC 3748 Section 2
956 * The conversation continues until the authenticator cannot
957 * authenticate the peer (unacceptable Responses to one or more
958 * Requests), in which case the authenticator implementation MUST
959 * transmit an EAP Failure (Code 4).
960 */
961 default:
962 eap_fail(eap_session);
963 eap_session_destroy(&eap_session);
964 break;
965 }
966
967 return ua;
968}
969
970/*
971 * EAP authorization DEPENDS on other rlm authorizations,
972 * to check for user existence & get their configured values.
973 * It Handles EAP-START Messages, User-Name initialization.
974 */
976{
978 int status;
979
980 if (!inst->auth_type) {
981 WARN("No 'authenticate %s {...}' section or 'Auth-Type = %s' set. Cannot setup EAP authentication",
982 mctx->mi->name, mctx->mi->name);
984 }
985
986 /*
987 * For EAP_START, send Access-Challenge with EAP Identity
988 * request. even when we have to proxy this request
989 *
990 * RFC 2869, Section 2.3.1 notes that the "domain" of the
991 * user, (i.e. where to proxy it) comes from the EAP-Identity,
992 * so we CANNOT proxy the user, until we know its identity.
993 *
994 * We therefore send an EAP Identity request.
995 */
996 status = eap_start(request, inst->methods, inst->ignore_unknown_types);
997 switch (status) {
998 case RLM_MODULE_NOOP:
1000 return status;
1001
1002 case RLM_MODULE_FAIL:
1003 case RLM_MODULE_INVALID:
1004 eap_failure(request);
1005 return status;
1006
1007 default:
1008 break;
1009 }
1010
1012
1013 if (status == RLM_MODULE_OK) RETURN_UNLANG_OK;
1014
1016}
1017
1019{
1020 fr_pair_t *vp;
1021 eap_session_t *eap_session;
1022 fr_pair_t *username;
1023
1024 /*
1025 * If it's an Access-Accept, RFC 2869, Section 2.3.1
1026 * says that we MUST include a User-Name attribute in the
1027 * Access-Accept.
1028 */
1029 username = fr_pair_find_by_da(&request->request_pairs, NULL, attr_user_name);
1030 if ((request->reply->code == FR_RADIUS_CODE_ACCESS_ACCEPT) && username) {
1031 /*
1032 * Doesn't exist, add it in.
1033 */
1034 vp = fr_pair_find_by_da(&request->reply_pairs, NULL, attr_user_name);
1035 if (!vp) {
1036 MEM(vp = fr_pair_copy(request->reply_ctx, username));
1037 fr_pair_append(&request->reply_pairs, vp);
1038 }
1039 }
1040
1041 /*
1042 * Only synthesize a failure message if something
1043 * previously rejected the request.
1044 */
1045 if (request->reply->code != FR_RADIUS_CODE_ACCESS_REJECT) RETURN_UNLANG_NOOP;
1046
1047 if (!fr_pair_find_by_da(&request->request_pairs, NULL, attr_eap_message)) {
1048 RDEBUG3("Request didn't contain an EAP-Message, not inserting EAP-Failure");
1050 }
1051
1052 if (fr_pair_find_by_da(&request->reply_pairs, NULL, attr_eap_message)) {
1053 RDEBUG3("Reply already contained an EAP-Message, not inserting EAP-Failure");
1055 }
1056
1057 /*
1058 * Retrieve pre-existing eap_session from request
1059 * data. This will have been added to the request
1060 * data by the state API.
1061 */
1062 eap_session = eap_session_thaw(request);
1063 if (!eap_session) {
1064 RDEBUG3("Failed to get eap_session, probably already removed, not inserting EAP-Failure");
1066 }
1067
1068 /*
1069 * If this reject is before eap has been called in authenticate
1070 * the eap_round will not have been populated.
1071 */
1072 if (!eap_session->this_round) {
1073 eap_packet_raw_t *eap_packet = eap_packet_from_vp(request, &request->request_pairs);
1074 eap_session->this_round = eap_round_build(eap_session, &eap_packet);
1075 }
1076
1077 /*
1078 * This should never happen, but we may be here
1079 * because there was an unexpected error in the
1080 * EAP module.
1081 */
1082 if (!fr_cond_assert(eap_session->this_round) || !fr_cond_assert(eap_session->this_round->request)) {
1083 eap_session_destroy(&eap_session); /* Free the EAP session, and dissociate it from the request */
1085 }
1086
1087 /*
1088 * Already set to failure, assume something else
1089 * added EAP-Message with a failure code, do nothing.
1090 */
1092
1093 /*
1094 * Was *NOT* an EAP-Failure, so we now need to turn it into one.
1095 */
1096 REDEBUG("Request rejected after last call to module \"%s\", transforming response into EAP-Failure",
1097 mctx->mi->name);
1098 eap_fail(eap_session); /* Compose an EAP failure */
1099 eap_session_destroy(&eap_session); /* Free the EAP session, and dissociate it from the request */
1100
1101 /*
1102 * Make sure there's a message authenticator attribute in the response
1103 * RADIUS protocol code will calculate the correct value later...
1104 */
1107
1109}
1110
1111static int mod_instantiate(module_inst_ctx_t const *mctx)
1112{
1113 rlm_eap_t *inst = talloc_get_type_abort(mctx->mi->data, rlm_eap_t);
1114 size_t i;
1115 size_t j, loaded, count = 0;
1116
1117 loaded = talloc_array_length(inst->type_submodules);
1118
1119 /*
1120 * Pre-allocate the method identity to be the number
1121 * of modules we're going to load.
1122 *
1123 * We'll shrink it later.
1124 */
1125 if (!inst->default_method_is_set) {
1126 MEM(inst->type_identity_submodule = talloc_array(inst, module_instance_t const *, loaded));
1127 }
1128
1129 for (i = 0; i < loaded; i++) {
1130 module_instance_t *submodule_inst = inst->type_submodules[i];
1131 rlm_eap_submodule_t const *submodule;
1132
1133 if (!submodule_inst) continue; /* Skipped as we don't have SSL support */
1134
1135 submodule = (rlm_eap_submodule_t const *)submodule_inst->module->exported;
1136
1137 /*
1138 * Add the methods the submodule provides
1139 */
1140 for (j = 0; j < MAX_PROVIDED_METHODS; j++) {
1141 eap_type_t method;
1142
1143 if (!submodule->provides[j]) break;
1144
1145 method = submodule->provides[j];
1146
1147 /*
1148 * If the user didn't specify a default method
1149 * take the first method provided by the first
1150 * submodule as the default.
1151 */
1152 if (!inst->default_method_is_set && (i == 0)) inst->default_method = method;
1153
1154 /*
1155 * Check for duplicates
1156 */
1157 if (inst->methods[method].submodule) {
1158 CONF_SECTION *conf = inst->methods[method].submodule_inst->conf;
1159
1160 cf_log_err(submodule_inst->conf,
1161 "Duplicate EAP-Type %s. Conflicting entry %s[%u]",
1162 eap_type2name(method),
1164
1165 return -1;
1166 }
1167
1168 inst->methods[method].submodule_inst = submodule_inst;
1169 inst->methods[method].submodule = submodule;
1170 }
1171
1172 /*
1173 * This module provides a method identity
1174 * callback. We need to call each of these
1175 * in turn if default_eap_type isn't set,
1176 * to figure out the default eap type.
1177 */
1178 if (!inst->default_method_is_set && submodule->type_identity) {
1179 inst->type_identity_submodule[inst->type_identity_submodule_len++] = submodule_inst;
1180 }
1181 count++;
1182 }
1183
1184 /*
1185 * Check if the default method specified is actually
1186 * allowed by the config.
1187 */
1188 if (inst->default_method_is_set && !inst->methods[inst->default_method].submodule) {
1189 cf_log_err_by_child(mctx->mi->conf, "default_eap_type", "EAP-Type \"%s\" is not enabled",
1190 eap_type2name(inst->default_method));
1191 return -1;
1192 }
1193
1194 if (count == 0) {
1195 cf_log_err(mctx->mi->conf, "No EAP method(s) configured, module cannot do anything");
1196 return -1;
1197 }
1198
1199 /*
1200 * Shrink the method identity array so it's the
1201 * correct length.
1202 */
1203 if (!inst->default_method_is_set) {
1204 if (inst->type_identity_submodule_len > 0) {
1205 MEM(inst->type_identity_submodule = talloc_realloc(inst, inst->type_identity_submodule,
1206 module_instance_t const *,
1207 inst->type_identity_submodule_len));
1208 } else {
1209 TALLOC_FREE(inst->type_identity_submodule);
1210 }
1211 }
1212
1213 inst->auth_type = fr_dict_enum_by_name(attr_auth_type, mctx->mi->name, -1);
1214 if (!inst->auth_type) {
1215 WARN("Failed to find 'authenticate %s {...}' section. EAP authentication will likely not work",
1216 mctx->mi->name);
1217 }
1218
1219 /*
1220 * Create our own random pool.
1221 */
1222 for (i = 0; i < 256; i++) inst->rand_pool.randrsl[i] = fr_rand();
1223 fr_isaac_init(&inst->rand_pool, 1);
1224 inst->rand_pool.randcnt = 0;
1225
1226 return 0;
1227}
1228
1229static int mod_load(void)
1230{
1231 if (eap_base_init() < 0) {
1232 fr_perror("Failed initialising EAP base library");
1233 return -1;
1234 }
1235 return 0;
1236}
1237
1238static void mod_unload(void)
1239{
1240 eap_base_free();
1241}
1242
1243/*
1244 * The module name should be the only globally exported symbol.
1245 * That is, everything else should be 'static'.
1246 */
1248 .common = {
1249 .magic = MODULE_MAGIC_INIT,
1250 .name = "eap",
1251 .inst_size = sizeof(rlm_eap_t),
1253 .onload = mod_load,
1254 .unload = mod_unload,
1255 .instantiate = mod_instantiate,
1256 },
1257 .method_group = {
1258 .bindings = (module_method_binding_t[]){
1259 { .section = SECTION_NAME("authenticate", CF_IDENT_ANY), .method = mod_authenticate },
1260 { .section = SECTION_NAME("recv", "Access-Request"), .method = mod_authorize },
1261 { .section = SECTION_NAME("send", CF_IDENT_ANY), .method = mod_post_auth },
1263 }
1264 }
1265};
unlang_action_t
Returned by unlang_op_t calls, determine the next action of the interpreter.
Definition action.h:35
@ UNLANG_ACTION_PUSHED_CHILD
unlang_t pushed a new child onto the stack, execute it instead of continuing.
Definition action.h:39
@ UNLANG_ACTION_CALCULATE_RESULT
Calculate a new section rlm_rcode_t value.
Definition action.h:37
static int const char char buffer[256]
Definition acutest.h:576
#define RCSID(id)
Definition build.h:512
#define L(_str)
Helper for initialising arrays of string literals.
Definition build.h:228
#define UNUSED
Definition build.h:336
#define NUM_ELEMENTS(_t)
Definition build.h:358
int cf_table_parse_int(UNUSED TALLOC_CTX *ctx, void *out, UNUSED void *parent, CONF_ITEM *ci, conf_parser_t const *rule)
Generic function for parsing conf pair values as int.
Definition cf_parse.c:1707
#define CONF_PARSER_TERMINATOR
Definition cf_parse.h:669
cf_parse_t func
Override default parsing behaviour for the specified type with a custom parsing function.
Definition cf_parse.h:623
#define FR_CONF_DEPRECATED(_name, _struct, _field)
conf_parser_t entry which raises an error if a matching CONF_PAIR is found
Definition cf_parse.h:409
#define FR_CONF_OFFSET(_name, _struct, _field)
conf_parser_t which parses a single CONF_PAIR, writing the result to a field in a struct
Definition cf_parse.h:280
#define FR_CONF_OFFSET_IS_SET(_name, _type, _flags, _struct, _field)
conf_parser_t which parses a single CONF_PAIR, writing the result to a field in a struct,...
Definition cf_parse.h:294
@ CONF_FLAG_MULTI
CONF_PAIR can have multiple copies.
Definition cf_parse.h:446
@ CONF_FLAG_NOT_EMPTY
CONF_PAIR is required to have a non zero length value.
Definition cf_parse.h:447
#define FR_CONF_OFFSET_TYPE_FLAGS(_name, _type, _flags, _struct, _field)
conf_parser_t which parses a single CONF_PAIR, writing the result to a field in a struct
Definition cf_parse.h:238
Defines a CONF_PAIR to C data type mapping.
Definition cf_parse.h:606
Common header for all CONF_* types.
Definition cf_priv.h:49
A section grouping multiple CONF_PAIR.
Definition cf_priv.h:101
void * cf_data_value(CONF_DATA const *cd)
Return the user assigned value of CONF_DATA.
Definition cf_util.c:1750
CONF_SECTION * cf_item_to_section(CONF_ITEM const *ci)
Cast a CONF_ITEM to a CONF_SECTION.
Definition cf_util.c:685
CONF_PAIR * cf_item_to_pair(CONF_ITEM const *ci)
Cast a CONF_ITEM to a CONF_PAIR.
Definition cf_util.c:665
char const * cf_pair_value(CONF_PAIR const *pair)
Return the value of a CONF_PAIR.
Definition cf_util.c:1581
#define cf_log_err(_cf, _fmt,...)
Definition cf_util.h:287
#define cf_lineno(_cf)
Definition cf_util.h:101
#define cf_log_err_by_child(_parent, _child, _fmt,...)
Log an error message against a specified child.
Definition cf_util.h:314
#define cf_data_find(_cf, _type, _name)
Definition cf_util.h:242
#define cf_parent(_cf)
Definition cf_util.h:98
#define cf_filename(_cf)
Definition cf_util.h:104
#define CF_IDENT_ANY
Definition cf_util.h:75
eap_round_t * eap_round_build(eap_session_t *eap_session, eap_packet_raw_t **eap_packet_p)
Definition compose.c:567
rlm_rcode_t eap_fail(eap_session_t *eap_session)
Definition compose.c:513
rlm_rcode_t eap_start(request_t *request, rlm_eap_method_t const methods[], bool ignore_unknown_types)
Definition compose.c:302
rlm_rcode_t eap_compose(eap_session_t *eap_session)
Definition compose.c:157
eap_type_data_t type
Definition compose.h:38
eap_packet_t * response
Packet we received from the peer.
Definition compose.h:48
eap_code_t code
Definition compose.h:35
eap_packet_t * request
Packet we will send to the peer.
Definition compose.h:49
#define fr_cond_assert(_x)
Calls panic_action ifndef NDEBUG, else logs error and evaluates to value of _x.
Definition debug.h:141
#define MEM(x)
Definition debug.h:46
@ FR_RADIUS_CODE_ACCESS_ACCEPT
RFC2865 - Access-Accept.
Definition defs.h:34
@ FR_RADIUS_CODE_ACCESS_REJECT
RFC2865 - Access-Reject.
Definition defs.h:35
fr_dict_attr_t const ** out
Where to write a pointer to the resolved fr_dict_attr_t.
Definition dict.h:292
fr_dict_t const ** out
Where to write a pointer to the loaded/resolved fr_dict_t.
Definition dict.h:305
#define DICT_AUTOLOAD_TERMINATOR
Definition dict.h:311
fr_dict_enum_value_t const * fr_dict_enum_by_name(fr_dict_attr_t const *da, char const *name, ssize_t len)
Definition dict_util.c:3701
Specifies an attribute which must be present for the module to function.
Definition dict.h:291
Specifies a dictionary which must be loaded/loadable for the module to function.
Definition dict.h:304
#define MODULE_MAGIC_INIT
Stop people using different module/library/server versions together.
Definition dl_module.h:63
eap_type_t eap_name2type(char const *name)
Return an EAP-Type for a particular name.
Definition types.c:38
char const * eap_type2name(eap_type_t method)
Return an EAP-name for a particular type.
Definition types.c:54
@ FR_EAP_CODE_FAILURE
Definition types.h:40
@ FR_EAP_CODE_RESPONSE
Definition types.h:38
@ FR_EAP_CODE_REQUEST
Definition types.h:37
@ FR_EAP_CODE_SUCCESS
Definition types.h:39
eap_type_t num
Definition types.h:110
size_t length
Definition types.h:111
enum eap_type eap_type_t
uint8_t * data
Definition types.h:112
@ FR_EAP_METHOD_SIM
Definition types.h:63
@ FR_EAP_METHOD_LEAP
Definition types.h:62
@ FR_EAP_METHOD_NAK
Definition types.h:48
@ FR_EAP_METHOD_AKA
Definition types.h:68
@ FR_EAP_METHOD_PWD
Definition types.h:98
@ FR_EAP_METHOD_AKA_PRIME
Definition types.h:96
@ FR_EAP_METHOD_TTLS
Definition types.h:66
@ FR_EAP_METHOD_MD5
Definition types.h:49
@ FR_EAP_METHOD_IDENTITY
Definition types.h:46
@ FR_EAP_METHOD_INVALID
Definition types.h:45
@ FR_EAP_METHOD_TLS
Definition types.h:58
@ FR_EAP_METHOD_PEAP
Definition types.h:70
@ FR_EAP_METHOD_MAX
Definition types.h:102
Structure to represent packet format of eap on wire
Definition types.h:121
EAP-Type specific data.
Definition types.h:109
talloc_free(hp)
void unlang_interpet_frame_discard(request_t *request)
Discard the bottom most frame on the request's stack.
Definition interpret.c:2382
void unlang_interpret_signal(request_t *request, fr_signal_t action)
Send a signal (usually stop) to a request.
Definition interpret.c:1769
#define UNLANG_SUB_FRAME
Definition interpret.h:37
rlm_rcode_t rcode
The current rcode, from executing the instruction or merging the result from a frame.
Definition interpret.h:139
void fr_isaac_init(fr_randctx *ctx, int flag)
Definition isaac.c:85
int eap_base_init(void)
Initialise the lib eap base library.
Definition base.c:421
void eap_base_free(void)
De-init the lib eap base library.
Definition base.c:444
eap_packet_raw_t * eap_packet_from_vp(TALLOC_CTX *ctx, fr_pair_list_t *vps)
Definition base.c:279
eap_session_t * eap_session_thaw(request_t *request)
Thaw an eap_session_t so it can be continued.
Definition session.c:228
eap_session_t * eap_session_continue(void const *instance, eap_packet_raw_t **eap_packet_p, request_t *request)
Ingest an eap_packet into a thawed or newly allocated session.
Definition session.c:330
void eap_session_discard(request_t *request)
discard and 'destroy' an EAP session and disassociate it from the current request
Definition session.c:164
void eap_session_freeze(eap_session_t **eap_session)
Freeze an eap_session_t so that it can continue later.
Definition session.c:196
void eap_session_destroy(eap_session_t **eap_session)
'destroy' an EAP session and disassociate it from the current request
Definition session.c:148
char * identity
NAI (User-Name) from EAP-Identity.
Definition session.h:56
void * opaque
Opaque data used by EAP methods.
Definition session.h:63
request_t * subrequest
Current subrequest being executed.
Definition session.h:46
eap_type_t type
EAP method number.
Definition session.h:50
module_method_t process
Callback that should be used to process the next round.
Definition session.h:65
unlang_result_t submodule_result
Result of last submodule call.
Definition session.h:47
request_t * request
Current request.
Definition session.h:52
eap_round_t * this_round
The EAP response we're processing, and the EAP request we're building.
Definition session.h:60
eap_round_t * prev_round
Previous response/request pair.
Definition session.h:58
int rounds
How many roundtrips have occurred this session.
Definition session.h:67
Tracks the progress of a single session of any EAP method.
Definition session.h:41
#define RDEBUG3(fmt,...)
Definition log.h:355
#define RWARN(fmt,...)
Definition log.h:309
#define RERROR(fmt,...)
Definition log.h:310
#define RPERROR(fmt,...)
Definition log.h:314
#define REMARKER(_str, _marker_idx, _marker,...)
Output string with error marker, showing where format error occurred.
Definition log.h:510
#define REDEBUG2(fmt,...)
Definition log.h:384
@ FR_TYPE_STRING
String of printable characters.
@ FR_TYPE_UINT32
32 Bit unsigned integer.
@ FR_TYPE_VOID
User data.
@ FR_TYPE_OCTETS
Raw octets.
long int ssize_t
unsigned char uint8_t
void * memrchr(void const *s, int c, size_t n)
GNU libc extension on some platforms.
Definition missing.c:82
module_instance_t const * mi
Instance of the module being instantiated.
Definition module_ctx.h:42
void * rctx
Resume ctx that a module previously set.
Definition module_ctx.h:45
#define MODULE_INST_CTX(_mi)
Wrapper to create a module_inst_ctx_t as a compound literal.
Definition module_ctx.h:158
module_instance_t * mi
Instance of the module being instantiated.
Definition module_ctx.h:51
Temporary structure to hold arguments for module calls.
Definition module_ctx.h:41
Temporary structure to hold arguments for instantiation calls.
Definition module_ctx.h:50
int module_rlm_submodule_parse(TALLOC_CTX *ctx, void *out, void *parent, CONF_ITEM *ci, conf_parser_t const *rule)
Generic conf_parser_t func for loading drivers.
Definition module_rlm.c:932
bool module_rlm_section_type_set(request_t *request, fr_dict_attr_t const *type_da, fr_dict_enum_value_t const *enumv)
Set the next section type if it's not already set.
Definition module_rlm.c:403
module_t common
Common fields presented by all modules.
Definition module_rlm.h:39
#define RADIUS_AUTH_VECTOR_LENGTH
Definition net.h:89
int fr_pair_list_copy(TALLOC_CTX *ctx, fr_pair_list_t *to, fr_pair_list_t const *from)
Duplicate a list of pairs.
Definition pair.c:2326
int fr_pair_value_memdup(fr_pair_t *vp, uint8_t const *src, size_t len, bool tainted)
Copy data into an "octets" data type.
Definition pair.c:2962
fr_pair_t * fr_pair_find_by_da(fr_pair_list_t const *list, fr_pair_t const *prev, fr_dict_attr_t const *da)
Find the first pair with a matching da.
Definition pair.c:707
int fr_pair_append(fr_pair_list_t *list, fr_pair_t *to_add)
Add a VP to the end of the list.
Definition pair.c:1352
int fr_pair_delete_by_da(fr_pair_list_t *list, fr_dict_attr_t const *da)
Delete matching pairs from the specified list.
Definition pair.c:1696
fr_pair_t * fr_pair_find_by_da_idx(fr_pair_list_t const *list, fr_dict_attr_t const *da, unsigned int idx)
Find a pair with a matching da at a given index.
Definition pair.c:755
int fr_pair_steal_append(TALLOC_CTX *list_ctx, fr_pair_list_t *list, fr_pair_t *vp)
Change a vp's talloc ctx and insert it into a new list.
Definition pair.c:562
fr_pair_t * fr_pair_copy(TALLOC_CTX *ctx, fr_pair_t const *vp)
Copy a single valuepair.
Definition pair.c:503
int fr_pair_value_mem_alloc(fr_pair_t *vp, uint8_t **out, size_t size, bool tainted)
Pre-allocate a memory buffer for a "octets" type value pair.
Definition pair.c:2911
char * fr_asprint(TALLOC_CTX *ctx, char const *in, ssize_t inlen, char quote)
Escape string that may contain binary data, and write it to a new buffer.
Definition print.c:438
static const conf_parser_t config[]
Definition base.c:163
#define fr_assert(_expr)
Definition rad_assert.h:37
#define REDEBUG(fmt,...)
#define RDEBUG2(fmt,...)
#define WARN(fmt,...)
static rs_t * conf
Definition radsniff.c:52
uint32_t fr_rand(void)
Return a 32-bit random number.
Definition rand.c:104
#define RETURN_UNLANG_UPDATED
Definition rcode.h:70
#define RETURN_UNLANG_HANDLED
Definition rcode.h:65
#define RETURN_UNLANG_INVALID
Definition rcode.h:66
#define RETURN_UNLANG_RCODE(_rcode)
Definition rcode.h:61
#define RETURN_UNLANG_FAIL
Definition rcode.h:63
#define RETURN_UNLANG_REJECT
Definition rcode.h:62
#define RETURN_UNLANG_OK
Definition rcode.h:64
rlm_rcode_t
Return codes indicating the result of the module call.
Definition rcode.h:44
@ RLM_MODULE_INVALID
The module considers the request invalid.
Definition rcode.h:51
@ RLM_MODULE_OK
The module is OK, continue.
Definition rcode.h:49
@ RLM_MODULE_FAIL
Module failed, don't reply.
Definition rcode.h:48
@ RLM_MODULE_DISALLOW
Reject the request (user is locked out).
Definition rcode.h:52
@ RLM_MODULE_REJECT
Immediately reject the request.
Definition rcode.h:47
@ RLM_MODULE_UPDATED
OK (pairs modified).
Definition rcode.h:55
@ RLM_MODULE_NOOP
Module succeeded without doing anything.
Definition rcode.h:54
@ RLM_MODULE_HANDLED
The module handled the request, so stop.
Definition rcode.h:50
#define RETURN_UNLANG_NOOP
Definition rcode.h:69
fr_dict_autoload_t rlm_eap_dict[]
Definition rlm_eap.c:83
static int mod_load(void)
Definition rlm_eap.c:1229
static fr_table_num_sorted_t const require_identity_realm_table[]
Definition rlm_eap.c:53
static ssize_t eap_identity_is_nai_with_realm(char const *identity)
Basic tests to determine if an identity is a valid NAI.
Definition rlm_eap.c:541
static fr_dict_attr_t const * attr_module_failure_message
Definition rlm_eap.c:93
char const * caller
Original caller.
Definition rlm_eap.c:42
static fr_dict_attr_t const * attr_eap_identity
Definition rlm_eap.c:91
static unlang_action_t mod_post_auth(unlang_result_t *p_result, module_ctx_t const *mctx, request_t *request)
Definition rlm_eap.c:1018
fr_dict_attr_autoload_t rlm_eap_dict_attr[]
Definition rlm_eap.c:101
static int submodule_parse(TALLOC_CTX *ctx, void *out, UNUSED void *parent, CONF_ITEM *ci, UNUSED conf_parser_t const *rule)
static fr_dict_attr_t const * attr_eap_message
Definition rlm_eap.c:95
static unlang_action_t mod_authenticate_result_async(unlang_result_t *p_result, module_ctx_t const *mctx, request_t *request)
Call mod_authenticate_result asynchronously from the unlang interpreter.
Definition rlm_eap.c:524
static fr_dict_attr_t const * attr_eap_type
Definition rlm_eap.c:90
static eap_type_t eap_process_nak(module_ctx_t const *mctx, request_t *request, eap_type_t last_type, eap_type_data_t *nak)
Process NAK data from EAP peer.
Definition rlm_eap.c:226
static void mod_authenticate_cancel(module_ctx_t const *mctx, request_t *request, UNUSED fr_signal_t action)
Cancel a call to a submodule.
Definition rlm_eap.c:386
static fr_dict_t const * dict_freeradius
Definition rlm_eap.c:79
eap_session_t * eap_session
The eap_session we're continuing.
Definition rlm_eap.c:44
rlm_eap_t * inst
Instance of the rlm_eap module.
Definition rlm_eap.c:43
module_rlm_t rlm_eap
Definition rlm_eap.c:1247
static int eap_type_parse(UNUSED TALLOC_CTX *ctx, void *out, UNUSED void *parent, CONF_ITEM *ci, UNUSED conf_parser_t const *rule)
Convert EAP type strings to eap_type_t values.
Definition rlm_eap.c:203
static fr_dict_t const * dict_radius
Definition rlm_eap.c:80
static fr_dict_attr_t const * attr_auth_type
Definition rlm_eap.c:89
rlm_rcode_t rcode
The result of the submodule.
Definition rlm_eap.c:45
static unlang_action_t mod_authorize(unlang_result_t *p_result, module_ctx_t const *mctx, request_t *request)
Definition rlm_eap.c:975
static void mod_unload(void)
Definition rlm_eap.c:1238
static fr_dict_attr_t const * attr_stripped_user_domain
Definition rlm_eap.c:92
static unlang_action_t eap_method_select(unlang_result_t *p_result, module_ctx_t const *mctx, eap_session_t *eap_session)
Select the correct callback based on a response.
Definition rlm_eap.c:593
static unlang_action_t mod_authenticate(unlang_result_t *p_result, module_ctx_t const *mctx, request_t *request)
Definition rlm_eap.c:903
static fr_dict_attr_t const * attr_user_name
Definition rlm_eap.c:97
static size_t require_identity_realm_table_len
Definition rlm_eap.c:58
static const conf_parser_t module_config[]
Definition rlm_eap.c:60
static unlang_action_t mod_authenticate_result(unlang_result_t *p_result, UNUSED module_ctx_t const *mctx, request_t *request, eap_session_t *eap_session, unlang_result_t *submodule_result)
Process the result of calling a submodule.
Definition rlm_eap.c:426
static int mod_instantiate(module_inst_ctx_t const *mctx)
Definition rlm_eap.c:1111
static fr_dict_attr_t const * attr_message_authenticator
Definition rlm_eap.c:96
Resume context for calling a submodule.
Definition rlm_eap.c:41
Implements the EAP framework.
@ REQUIRE_REALM_NAI
Require the EAP-Identity contains an NAI domain.
Definition rlm_eap.h:41
@ REQUIRE_REALM_NO
Don't require that the identity is qualified.
Definition rlm_eap.h:40
@ REQUIRE_REALM_YES
Require the EAP-Identity string contain an NAI realm or that Stripped-User-Domain is present in the r...
Definition rlm_eap.h:38
Instance data for rlm_eap.
Definition rlm_eap.h:47
static char const * name
ssize_t fr_sbuff_in_sprintf(fr_sbuff_t *sbuff, char const *fmt,...)
Print using a fmt string to an sbuff.
Definition sbuff.c:1605
#define fr_sbuff_start(_sbuff_or_marker)
#define fr_sbuff_advance(_sbuff_or_marker, _len)
#define FR_SBUFF_TALLOC_THREAD_LOCAL(_out, _init, _max)
#define SECTION_NAME(_name1, _name2)
Define a section name consisting of a verb and a noun.
Definition section.h:39
char const * name
Instance name e.g. user_database.
Definition module.h:357
CONF_SECTION * conf
Module's instance configuration.
Definition module.h:351
size_t inst_size
Size of the module's instance data.
Definition module.h:212
void * data
Module's instance data.
Definition module.h:293
#define MODULE_BINDING_TERMINATOR
Terminate a module binding list.
Definition module.h:152
module_t * exported
Public module structure.
Definition module.h:298
Module instance data.
Definition module.h:287
Named methods exported by a module.
Definition module.h:174
#define pair_update_reply(_attr, _da)
Return or allocate a fr_pair_t in the reply list.
Definition pair.h:129
#define pair_append_request(_attr, _da)
Allocate and append a fr_pair_t to the request list.
Definition pair.h:37
#define pair_append_reply(_attr, _da)
Allocate and append a fr_pair_t to reply list.
Definition pair.h:47
void fr_state_discard_child(request_t *parent, void const *unique_ptr, int unique_int)
Remove state from a child.
Definition state.c:1008
fr_signal_t
Signals that can be generated/processed by request signal handlers.
Definition signal.h:38
@ FR_SIGNAL_CANCEL
Request has been cancelled.
Definition signal.h:40
return count
Definition module.c:155
unlang_action_t unlang_module_yield(request_t *request, module_method_t resume, unlang_module_signal_t signal, fr_signal_t sigmask, void *rctx)
Yield a request back to the interpreter from within a module.
Definition module.c:431
int unlang_module_push(unlang_result_t *p_result, request_t *request, module_instance_t *mi, module_method_t method, bool top_frame)
Push a module or submodule onto the stack for evaluation.
Definition module.c:50
eap_aka_sim_process_conf_t * inst
fr_pair_value_bstrdup_buffer(vp, eap_session->identity, true)
fr_aka_sim_id_type_t type
fr_pair_t * vp
eap_failure
FAILURE state - State machine exit point after sending EAP-Failure.
Stores an attribute, a value and various bits of other data.
Definition pair.h:68
module_t common
Common fields provided by all modules.
Definition submodule.h:50
module_instance_t * submodule_inst
Submodule's instance data.
Definition submodule.h:68
#define MAX_PROVIDED_METHODS
Definition submodule.h:28
rlm_eap_submodule_t const * submodule
Submodule's exported interface.
Definition submodule.h:69
bool clone_parent_lists
< Namespace children should be allocated in.
Definition submodule.h:59
eap_type_t provides[MAX_PROVIDED_METHODS]
Allow the module to register itself for more than one EAP-Method.
Definition submodule.h:52
eap_type_identity_t type_identity
Do we recognise this identity?
Definition submodule.h:55
Private structure to hold handles and interfaces for an EAP method.
Definition submodule.h:67
Interface exported by EAP submodules.
Definition submodule.h:49
request_t * unlang_subrequest_alloc(request_t *parent, fr_dict_t const *namespace)
Allocate a subrequest to run through a virtual server at some point in the future.
Definition subrequest.c:302
int unlang_subrequest_child_push(unlang_result_t *p_result, request_t *child, void const *unique_session_ptr, bool free_child, bool top_frame)
Push a pre-existing child back onto the stack as a subrequest.
Definition subrequest.c:426
An element in a lexicographically sorted array of name to num mappings.
Definition table.h:49
#define talloc_get_type_abort_const
Definition talloc.h:110
#define talloc_strdup(_ctx, _str)
Definition talloc.h:142
static size_t talloc_strlen(char const *s)
Returns the length of a talloc array containing a string.
Definition talloc.h:136
fr_pair_t * fr_pair_remove(fr_pair_list_t *list, fr_pair_t *vp)
Remove fr_pair_t from a list without freeing.
Definition pair_inline.c:93
static fr_slen_t parent
Definition pair.h:858
char const * fr_strerror(void)
Get the last library error.
Definition strerror.c:553
void fr_perror(char const *fmt,...)
Print the current error to stderr with a prefix.
Definition strerror.c:732
#define fr_strerror_printf(_fmt,...)
Log to thread local error buffer.
Definition strerror.h:64
int nonnull(2, 5))
static size_t char ** out
Definition value.h:1030