Radius.c 57 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421
  1. // SoftEther VPN Source Code - Stable Edition Repository
  2. // Cedar Communication Module
  3. //
  4. // SoftEther VPN Server, Client and Bridge are free software under GPLv2.
  5. //
  6. // Copyright (c) Daiyuu Nobori.
  7. // Copyright (c) SoftEther VPN Project, University of Tsukuba, Japan.
  8. // Copyright (c) SoftEther Corporation.
  9. //
  10. // All Rights Reserved.
  11. //
  12. // http://www.softether.org/
  13. //
  14. // Author: Daiyuu Nobori, Ph.D.
  15. // Comments: Tetsuo Sugiyama, Ph.D.
  16. //
  17. // This program is free software; you can redistribute it and/or
  18. // modify it under the terms of the GNU General Public License
  19. // version 2 as published by the Free Software Foundation.
  20. //
  21. // This program is distributed in the hope that it will be useful,
  22. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  23. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  24. // GNU General Public License for more details.
  25. //
  26. // You should have received a copy of the GNU General Public License version 2
  27. // along with this program; if not, write to the Free Software
  28. // Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
  29. //
  30. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
  31. // EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
  32. // MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
  33. // IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
  34. // CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
  35. // TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
  36. // SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
  37. //
  38. // THE LICENSE AGREEMENT IS ATTACHED ON THE SOURCE-CODE PACKAGE
  39. // AS "LICENSE.TXT" FILE. READ THE TEXT FILE IN ADVANCE TO USE THE SOFTWARE.
  40. //
  41. //
  42. // THIS SOFTWARE IS DEVELOPED IN JAPAN, AND DISTRIBUTED FROM JAPAN,
  43. // UNDER JAPANESE LAWS. YOU MUST AGREE IN ADVANCE TO USE, COPY, MODIFY,
  44. // MERGE, PUBLISH, DISTRIBUTE, SUBLICENSE, AND/OR SELL COPIES OF THIS
  45. // SOFTWARE, THAT ANY JURIDICAL DISPUTES WHICH ARE CONCERNED TO THIS
  46. // SOFTWARE OR ITS CONTENTS, AGAINST US (SOFTETHER PROJECT, SOFTETHER
  47. // CORPORATION, DAIYUU NOBORI OR OTHER SUPPLIERS), OR ANY JURIDICAL
  48. // DISPUTES AGAINST US WHICH ARE CAUSED BY ANY KIND OF USING, COPYING,
  49. // MODIFYING, MERGING, PUBLISHING, DISTRIBUTING, SUBLICENSING, AND/OR
  50. // SELLING COPIES OF THIS SOFTWARE SHALL BE REGARDED AS BE CONSTRUED AND
  51. // CONTROLLED BY JAPANESE LAWS, AND YOU MUST FURTHER CONSENT TO
  52. // EXCLUSIVE JURISDICTION AND VENUE IN THE COURTS SITTING IN TOKYO,
  53. // JAPAN. YOU MUST WAIVE ALL DEFENSES OF LACK OF PERSONAL JURISDICTION
  54. // AND FORUM NON CONVENIENS. PROCESS MAY BE SERVED ON EITHER PARTY IN
  55. // THE MANNER AUTHORIZED BY APPLICABLE LAW OR COURT RULE.
  56. //
  57. // USE ONLY IN JAPAN. DO NOT USE THIS SOFTWARE IN ANOTHER COUNTRY UNLESS
  58. // YOU HAVE A CONFIRMATION THAT THIS SOFTWARE DOES NOT VIOLATE ANY
  59. // CRIMINAL LAWS OR CIVIL RIGHTS IN THAT PARTICULAR COUNTRY. USING THIS
  60. // SOFTWARE IN OTHER COUNTRIES IS COMPLETELY AT YOUR OWN RISK. THE
  61. // SOFTETHER VPN PROJECT HAS DEVELOPED AND DISTRIBUTED THIS SOFTWARE TO
  62. // COMPLY ONLY WITH THE JAPANESE LAWS AND EXISTING CIVIL RIGHTS INCLUDING
  63. // PATENTS WHICH ARE SUBJECTS APPLY IN JAPAN. OTHER COUNTRIES' LAWS OR
  64. // CIVIL RIGHTS ARE NONE OF OUR CONCERNS NOR RESPONSIBILITIES. WE HAVE
  65. // NEVER INVESTIGATED ANY CRIMINAL REGULATIONS, CIVIL LAWS OR
  66. // INTELLECTUAL PROPERTY RIGHTS INCLUDING PATENTS IN ANY OF OTHER 200+
  67. // COUNTRIES AND TERRITORIES. BY NATURE, THERE ARE 200+ REGIONS IN THE
  68. // WORLD, WITH DIFFERENT LAWS. IT IS IMPOSSIBLE TO VERIFY EVERY
  69. // COUNTRIES' LAWS, REGULATIONS AND CIVIL RIGHTS TO MAKE THE SOFTWARE
  70. // COMPLY WITH ALL COUNTRIES' LAWS BY THE PROJECT. EVEN IF YOU WILL BE
  71. // SUED BY A PRIVATE ENTITY OR BE DAMAGED BY A PUBLIC SERVANT IN YOUR
  72. // COUNTRY, THE DEVELOPERS OF THIS SOFTWARE WILL NEVER BE LIABLE TO
  73. // RECOVER OR COMPENSATE SUCH DAMAGES, CRIMINAL OR CIVIL
  74. // RESPONSIBILITIES. NOTE THAT THIS LINE IS NOT LICENSE RESTRICTION BUT
  75. // JUST A STATEMENT FOR WARNING AND DISCLAIMER.
  76. //
  77. //
  78. // SOURCE CODE CONTRIBUTION
  79. // ------------------------
  80. //
  81. // Your contribution to SoftEther VPN Project is much appreciated.
  82. // Please send patches to us through GitHub.
  83. // Read the SoftEther VPN Patch Acceptance Policy in advance:
  84. // http://www.softether.org/5-download/src/9.patch
  85. //
  86. //
  87. // DEAR SECURITY EXPERTS
  88. // ---------------------
  89. //
  90. // If you find a bug or a security vulnerability please kindly inform us
  91. // about the problem immediately so that we can fix the security problem
  92. // to protect a lot of users around the world as soon as possible.
  93. //
  94. // Our e-mail address for security reports is:
  95. // softether-vpn-security [at] softether.org
  96. //
  97. // Please note that the above e-mail address is not a technical support
  98. // inquiry address. If you need technical assistance, please visit
  99. // http://www.softether.org/ and ask your question on the users forum.
  100. //
  101. // Thank you for your cooperation.
  102. //
  103. //
  104. // NO MEMORY OR RESOURCE LEAKS
  105. // ---------------------------
  106. //
  107. // The memory-leaks and resource-leaks verification under the stress
  108. // test has been passed before release this source code.
  109. // Radius.c
  110. // Radius authentication module
  111. #include "CedarPch.h"
  112. ////////// Modern implementation
  113. // send PEAP-MSCHAPv2 auth client response
  114. bool PeapClientSendMsChapv2AuthClientResponse(EAP_CLIENT *e, UCHAR *client_response, UCHAR *client_challenge)
  115. {
  116. bool ret = false;
  117. EAP_MSCHAPV2_RESPONSE msg1;
  118. EAP_MESSAGE msg2;
  119. EAP_MESSAGE msg4;
  120. if (e == NULL || client_response == NULL || client_challenge == NULL)
  121. {
  122. return false;
  123. }
  124. Zero(&msg1, sizeof(msg1));
  125. Zero(&msg2, sizeof(msg2));
  126. Zero(&msg4, sizeof(msg4));
  127. msg1.Type = EAP_TYPE_MS_AUTH;
  128. msg1.Chap_Opcode = EAP_MSCHAPV2_OP_RESPONSE;
  129. msg1.Chap_Id = e->MsChapV2Challenge.Chap_Id;
  130. msg1.Chap_Len = Endian16(54 + StrLen(e->Username));
  131. msg1.Chap_ValueSize = 49;
  132. Copy(msg1.Chap_PeerChallange, client_challenge, 16);
  133. Copy(msg1.Chap_NtResponse, client_response, 24);
  134. Copy(msg1.Chap_Name, e->Username, MIN(StrLen(e->Username), 255));
  135. if (SendPeapPacket(e, &msg1, 59 + StrLen(e->Username)) &&
  136. GetRecvPeapMessage(e, &msg2))
  137. {
  138. if (msg2.Type == EAP_TYPE_MS_AUTH &&
  139. ((EAP_MSCHAPV2_GENERAL *)&msg2)->Chap_Opcode == EAP_MSCHAPV2_OP_SUCCESS)
  140. {
  141. EAP_MSCHAPV2_SUCCESS_SERVER *eaps = (EAP_MSCHAPV2_SUCCESS_SERVER *)&msg2;
  142. if (StartWith(eaps->Message, "S="))
  143. {
  144. BUF *buf = StrToBin(eaps->Message + 2);
  145. if (buf && buf->Size == 20)
  146. {
  147. Copy(&e->MsChapV2Success, eaps, sizeof(EAP_MSCHAPV2_SUCCESS_SERVER));
  148. Copy(e->ServerResponse, buf->Buf, 20);
  149. if (true)
  150. {
  151. EAP_MSCHAPV2_SUCCESS_CLIENT msg3;
  152. Zero(&msg3, sizeof(msg3));
  153. msg3.Type = EAP_TYPE_MS_AUTH;
  154. msg3.Chap_Opcode = EAP_MSCHAPV2_OP_SUCCESS;
  155. if (SendPeapPacket(e, &msg3, 6) && GetRecvPeapMessage(e, &msg4))
  156. {
  157. UCHAR *rd = ((UCHAR *)&msg4);
  158. if (rd[4] == 0x01 && rd[8] == 0x21 && rd[9] == 0x80 &&
  159. rd[10] == 0x03 && rd[11] == 0x00 && rd[12] == 0x02 &&
  160. rd[13] == 0x00 && rd[14] == 0x01)
  161. {
  162. UCHAR reply[15];
  163. Zero(reply, sizeof(reply));
  164. reply[4] = 0x02; reply[5] = rd[5]; reply[6] = 0x00; reply[7] = 0x0b;
  165. reply[8] = 0x21; reply[9] = 0x80; reply[10] = 0x03; reply[11] = 0x00;
  166. reply[12] = 0x02; reply[13] = 0x00; reply[14] = 0x01;
  167. if (SendPeapPacket(e, reply, sizeof(reply)))
  168. {
  169. if (e->RecvLastCode == RADIUS_CODE_ACCESS_ACCEPT)
  170. {
  171. ret = true;
  172. }
  173. }
  174. }
  175. }
  176. }
  177. }
  178. FreeBuf(buf);
  179. }
  180. }
  181. }
  182. return ret;
  183. }
  184. // send PEAP-MSCHAPv2 auth request
  185. bool PeapClientSendMsChapv2AuthRequest(EAP_CLIENT *eap)
  186. {
  187. bool ret = false;
  188. UINT num_retry = 0;
  189. if (eap == NULL)
  190. {
  191. return false;
  192. }
  193. if (StartPeapClient(eap))
  194. {
  195. if (StartPeapSslClient(eap))
  196. {
  197. EAP_MESSAGE recv_msg;
  198. EAP_MESSAGE send_msg;
  199. if (GetRecvPeapMessage(eap, &recv_msg) && recv_msg.Type == EAP_TYPE_IDENTITY)
  200. {
  201. LABEL_RETRY:
  202. num_retry++;
  203. if (num_retry >= 10)
  204. {
  205. return false;
  206. }
  207. Zero(&send_msg, sizeof(send_msg));
  208. send_msg.Type = EAP_TYPE_IDENTITY;
  209. send_msg.Len = Endian16(5 + StrLen(eap->Username));
  210. Copy(send_msg.Data, eap->Username, StrLen(eap->Username));
  211. if (SendPeapPacket(eap, &send_msg, 5 + StrLen(eap->Username)) &&
  212. GetRecvPeapMessage(eap, &recv_msg))
  213. {
  214. LABEL_RETRY2:
  215. num_retry++;
  216. if (num_retry >= 10)
  217. {
  218. return false;
  219. }
  220. if (recv_msg.Type == EAP_TYPE_MS_AUTH &&
  221. ((EAP_MSCHAPV2_GENERAL *)&recv_msg)->Chap_Opcode == EAP_MSCHAPV2_OP_CHALLENGE)
  222. {
  223. EAP_MSCHAPV2_CHALLENGE *svr_challenge = (EAP_MSCHAPV2_CHALLENGE *)&recv_msg;
  224. Copy(&eap->MsChapV2Challenge, svr_challenge, sizeof(EAP_MSCHAPV2_CHALLENGE));
  225. ret = true;
  226. eap->PeapMode = true;
  227. }
  228. else if (recv_msg.Type == EAP_TYPE_IDENTITY)
  229. {
  230. UCHAR *rd = ((UCHAR *)&recv_msg);
  231. if (rd[4] == 0x01 && rd[8] == 0x21 && rd[9] == 0x80 &&
  232. rd[10] == 0x03 && rd[11] == 0x00 && rd[12] == 0x02 &&
  233. rd[13] == 0x00)
  234. {
  235. if (rd[14] == 0x02)
  236. {
  237. // Fail
  238. return false;
  239. }
  240. }
  241. goto LABEL_RETRY;
  242. }
  243. else
  244. {
  245. EAP_MESSAGE nak;
  246. Zero(&nak, sizeof(nak));
  247. nak.Type = EAP_TYPE_LEGACY_NAK;
  248. nak.Data[0] = EAP_TYPE_MS_AUTH;
  249. if (SendPeapPacket(eap, &nak, 6) &&
  250. GetRecvPeapMessage(eap, &recv_msg))
  251. {
  252. goto LABEL_RETRY2;
  253. }
  254. }
  255. }
  256. }
  257. }
  258. }
  259. return ret;
  260. }
  261. // Send a PEAP packet (encrypted)
  262. bool SendPeapRawPacket(EAP_CLIENT *e, UCHAR *peap_data, UINT peap_size)
  263. {
  264. LIST *fragments = NULL;
  265. bool ret = false;
  266. BUF *buf = NULL;
  267. UINT i;
  268. UINT num;
  269. bool send_empty = false;
  270. bool include_len = false;
  271. if (e == NULL)
  272. {
  273. return false;
  274. }
  275. // divide into 1024 bytes
  276. buf = NewBuf();
  277. // size
  278. if ((peap_size + 6 + 2) >= 256)
  279. {
  280. WriteBufInt(buf, peap_size);
  281. include_len = true;
  282. }
  283. // data
  284. WriteBuf(buf, peap_data, peap_size);
  285. if (peap_data == NULL)
  286. {
  287. send_empty = true;
  288. }
  289. SeekBufToBegin(buf);
  290. fragments = NewListFast(NULL);
  291. for (num = 0;;num++)
  292. {
  293. UCHAR tmp[1024];
  294. EAP_PEAP *send_peap_message;
  295. UINT sz;
  296. sz = ReadBuf(buf, tmp, 1024);
  297. if (sz == 0)
  298. {
  299. break;
  300. }
  301. // add header
  302. send_peap_message = ZeroMalloc(sizeof(EAP_PEAP) + sz);
  303. send_peap_message->Code = EAP_CODE_RESPONSE;
  304. send_peap_message->Id = e->LastRecvEapId + num;
  305. send_peap_message->Len = Endian16((UINT)(((UINT)sizeof(EAP_PEAP) + (UINT)sz)));
  306. send_peap_message->Type = EAP_TYPE_PEAP;
  307. send_peap_message->TlsFlags = 0;
  308. if (num == 0 && include_len)
  309. {
  310. send_peap_message->TlsFlags |= EAP_TLS_FLAGS_LEN;
  311. }
  312. if (ReadBufRemainSize(buf) != 0)
  313. {
  314. send_peap_message->TlsFlags |= EAP_TLS_FLAGS_MORE_FRAGMENTS;
  315. }
  316. Copy(((UCHAR *)send_peap_message) + sizeof(EAP_PEAP), tmp, sz);
  317. Add(fragments, MemToBuf(send_peap_message, sizeof(EAP_PEAP) + sz));
  318. Free(send_peap_message);
  319. }
  320. if (num == 0 && send_empty)
  321. {
  322. Add(fragments, MemToBuf("\0", 1));
  323. }
  324. // send each of packets
  325. for (i = 0;i < LIST_NUM(fragments);i++)
  326. {
  327. BUF *b = LIST_DATA(fragments, i);
  328. RADIUS_AVP *eap_avp;
  329. RADIUS_PACKET *response_packet;
  330. RADIUS_PACKET *send_packet = NewRadiusPacket(RADIUS_CODE_ACCESS_REQUEST, e->NextRadiusPacketId++);
  331. EapSetRadiusGeneralAttributes(send_packet, e);
  332. if (e->LastStateSize != 0)
  333. {
  334. Add(send_packet->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_STATE, 0, 0,
  335. e->LastState, e->LastStateSize));
  336. }
  337. if (send_empty == false)
  338. {
  339. eap_avp = NewRadiusAvp(RADIUS_ATTRIBUTE_EAP_MESSAGE, 0, 0, b->Buf, b->Size);
  340. }
  341. else
  342. {
  343. EAP_PEAP empty_peap;
  344. Zero(&empty_peap, sizeof(empty_peap));
  345. empty_peap.Code = EAP_CODE_RESPONSE;
  346. empty_peap.Id = e->LastRecvEapId;
  347. empty_peap.Len = Endian16(sizeof(EAP_PEAP));
  348. empty_peap.Type = EAP_TYPE_PEAP;
  349. eap_avp = NewRadiusAvp(RADIUS_ATTRIBUTE_EAP_MESSAGE, 0, 0, &empty_peap, sizeof(EAP_PEAP));
  350. }
  351. Add(send_packet->AvpList, eap_avp);
  352. response_packet = EapSendPacketAndRecvResponse(e, send_packet);
  353. if (response_packet != NULL)
  354. {
  355. e->RecvLastCode = response_packet->Code;
  356. if (response_packet->Parse_EapMessage != NULL && response_packet->Parse_EapMessage_DataSize >= sizeof(EAP_PEAP))
  357. {
  358. // Received SSL stream
  359. EAP_PEAP *peap_msg = (EAP_PEAP *)response_packet->Parse_EapMessage;
  360. if (peap_msg->Type == EAP_TYPE_PEAP)
  361. {
  362. if (peap_msg->TlsFlags & EAP_TLS_FLAGS_LEN)
  363. {
  364. UINT total_size = READ_UINT(((UCHAR *)peap_msg) + sizeof(EAP_PEAP));
  365. if (total_size <= (response_packet->Parse_EapMessage_DataSize - sizeof(EAP_PEAP) - sizeof(UINT)))
  366. {
  367. WriteFifo(e->SslPipe->RawIn->SendFifo, ((UCHAR *)peap_msg) + sizeof(EAP_PEAP) + sizeof(UINT), total_size);
  368. }
  369. }
  370. else
  371. {
  372. WriteFifo(e->SslPipe->RawIn->SendFifo, ((UCHAR *)peap_msg) + sizeof(EAP_PEAP),
  373. response_packet->Parse_EapMessage_DataSize - sizeof(EAP_PEAP));
  374. }
  375. }
  376. }
  377. }
  378. FreeRadiusPacket(send_packet);
  379. FreeRadiusPacket(response_packet);
  380. }
  381. FreeBuf(buf);
  382. if (fragments != NULL)
  383. {
  384. for (i = 0;i < LIST_NUM(fragments);i++)
  385. {
  386. BUF *b = LIST_DATA(fragments, i);
  387. FreeBuf(b);
  388. }
  389. ReleaseList(fragments);
  390. }
  391. SyncSslPipe(e->SslPipe);
  392. return ret;
  393. }
  394. // Send an encrypted message of PEAP
  395. bool SendPeapPacket(EAP_CLIENT *e, void *msg, UINT msg_size)
  396. {
  397. bool ret = false;
  398. FIFO *send_fifo;
  399. FIFO *recv_fifo;
  400. BUF *buf;
  401. EAP_MESSAGE tmpmsg;
  402. if (e == NULL || msg == NULL || msg_size == 0)
  403. {
  404. return false;
  405. }
  406. if (e->SslPipe == NULL)
  407. {
  408. return false;
  409. }
  410. send_fifo = e->SslPipe->RawOut->RecvFifo;
  411. recv_fifo = e->SslPipe->RawIn->SendFifo;
  412. Zero(&tmpmsg, sizeof(tmpmsg));
  413. Copy(&tmpmsg, msg, MIN(msg_size, sizeof(EAP_MESSAGE)));
  414. WriteFifo(e->SslPipe->SslInOut->SendFifo, &tmpmsg.Type, msg_size - 4);
  415. SyncSslPipe(e->SslPipe);
  416. buf = ReadFifoAll(send_fifo);
  417. while (true)
  418. {
  419. ret = SendPeapRawPacket(e, buf->Buf, buf->Size);
  420. FreeBuf(buf);
  421. if (send_fifo->size == 0)
  422. {
  423. break;
  424. }
  425. buf = ReadFifoAll(send_fifo);
  426. }
  427. return !e->SslPipe->IsDisconnected;
  428. }
  429. // Start a PEAP SSL client
  430. bool StartPeapSslClient(EAP_CLIENT *e)
  431. {
  432. bool ret = false;
  433. FIFO *send_fifo;
  434. FIFO *recv_fifo;
  435. BUF *buf;
  436. if (e == NULL)
  437. {
  438. return false;
  439. }
  440. if (e->SslPipe != NULL)
  441. {
  442. return false;
  443. }
  444. e->SslPipe = NewSslPipe(false, NULL, NULL, NULL);
  445. send_fifo = e->SslPipe->RawOut->RecvFifo;
  446. recv_fifo = e->SslPipe->RawIn->SendFifo;
  447. SyncSslPipe(e->SslPipe);
  448. buf = ReadFifoAll(send_fifo);
  449. while (true)
  450. {
  451. ret = SendPeapRawPacket(e, buf->Buf, buf->Size);
  452. FreeBuf(buf);
  453. if (send_fifo->size == 0)
  454. {
  455. break;
  456. }
  457. buf = ReadFifoAll(send_fifo);
  458. }
  459. SendPeapRawPacket(e, NULL, 0);
  460. return !e->SslPipe->IsDisconnected;
  461. }
  462. // Get a received PEAP message (unencrypted)
  463. bool GetRecvPeapMessage(EAP_CLIENT *e, EAP_MESSAGE *msg)
  464. {
  465. BUF *b;
  466. bool ret = false;
  467. if (e == NULL)
  468. {
  469. return false;
  470. }
  471. if (e->SslPipe == NULL)
  472. {
  473. return false;
  474. }
  475. b = ReadFifoAll(e->SslPipe->SslInOut->RecvFifo);
  476. if (b->Size >= 1)
  477. {
  478. Zero(msg, sizeof(EAP_MESSAGE));
  479. msg->Len = Endian16(b->Size + 4);
  480. Copy(&msg->Type, b->Buf, MIN(b->Size, 1501));
  481. ret = true;
  482. }
  483. FreeBuf(b);
  484. return ret;
  485. }
  486. // Start a PEAP client
  487. bool StartPeapClient(EAP_CLIENT *e)
  488. {
  489. bool ret = false;
  490. RADIUS_PACKET *request1 = NULL;
  491. RADIUS_PACKET *response1 = NULL;
  492. RADIUS_PACKET *request2 = NULL;
  493. RADIUS_PACKET *response2 = NULL;
  494. EAP_MESSAGE *eap1 = NULL;
  495. EAP_MESSAGE *eap2 = NULL;
  496. if (e == NULL)
  497. {
  498. return false;
  499. }
  500. if (e->SslPipe != NULL)
  501. {
  502. return false;
  503. }
  504. request1 = NewRadiusPacket(RADIUS_CODE_ACCESS_REQUEST, e->NextRadiusPacketId++);
  505. EapSetRadiusGeneralAttributes(request1, e);
  506. eap1 = ZeroMalloc(sizeof(EAP_MESSAGE));
  507. eap1->Code = EAP_CODE_RESPONSE;
  508. eap1->Id = e->LastRecvEapId;
  509. eap1->Len = Endian16(StrLen(e->Username) + 5);
  510. eap1->Type = EAP_TYPE_IDENTITY;
  511. Copy(eap1->Data, e->Username, StrLen(e->Username));
  512. Add(request1->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_EAP_MESSAGE, 0, 0, eap1, StrLen(e->Username) + 5));
  513. response1 = EapSendPacketAndRecvResponse(e, request1);
  514. if (response1 != NULL)
  515. {
  516. if (response1->Parse_EapMessage_DataSize != 0 && response1->Parse_EapMessage != NULL)
  517. {
  518. EAP_MESSAGE *eap = response1->Parse_EapMessage;
  519. if (eap->Code == EAP_CODE_REQUEST)
  520. {
  521. if (eap->Type != EAP_TYPE_PEAP)
  522. {
  523. // Unsupported auth type. Request PEAP.
  524. request2 = NewRadiusPacket(RADIUS_CODE_ACCESS_REQUEST, e->NextRadiusPacketId++);
  525. EapSetRadiusGeneralAttributes(request2, e);
  526. if (response1->Parse_StateSize != 0)
  527. {
  528. Add(request2->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_STATE, 0, 0,
  529. response1->Parse_State, response1->Parse_StateSize));
  530. }
  531. eap2 = ZeroMalloc(sizeof(EAP_MESSAGE));
  532. eap2->Code = EAP_CODE_RESPONSE;
  533. eap2->Id = e->LastRecvEapId;
  534. eap2->Len = Endian16(6);
  535. eap2->Type = EAP_TYPE_LEGACY_NAK;
  536. eap2->Data[0] = EAP_TYPE_PEAP;
  537. Add(request2->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_EAP_MESSAGE, 0, 0, eap2, 6));
  538. response2 = EapSendPacketAndRecvResponse(e, request2);
  539. if (response2 != NULL && response2->Parse_EapMessage_DataSize != 0 && response2->Parse_EapMessage != NULL)
  540. {
  541. eap = response2->Parse_EapMessage;
  542. if (eap->Code == EAP_CODE_REQUEST && eap->Type == EAP_TYPE_PEAP)
  543. {
  544. goto LABEL_PARSE_PEAP;
  545. }
  546. }
  547. }
  548. else
  549. {
  550. EAP_PEAP *peap;
  551. LABEL_PARSE_PEAP:
  552. peap = (EAP_PEAP *)eap;
  553. if (peap->TlsFlags == 0x20)
  554. {
  555. ret = true;
  556. }
  557. }
  558. }
  559. }
  560. }
  561. FreeRadiusPacket(request1);
  562. FreeRadiusPacket(request2);
  563. FreeRadiusPacket(response1);
  564. FreeRadiusPacket(response2);
  565. Free(eap1);
  566. Free(eap2);
  567. return ret;
  568. }
  569. // Set RADIUS general attributes
  570. void EapSetRadiusGeneralAttributes(RADIUS_PACKET *r, EAP_CLIENT *e)
  571. {
  572. UINT ui;
  573. char *str;
  574. if (r == NULL || e == NULL)
  575. {
  576. return;
  577. }
  578. ui = Endian32(2);
  579. Add(r->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_SERVICE_TYPE, 0, 0, &ui, sizeof(UINT)));
  580. ui = Endian32(1);
  581. Add(r->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_FRAMED_PROTOCOL, 0, 0, &ui, sizeof(UINT)));
  582. ui = Endian32(5);
  583. Add(r->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_NAS_PORT_TYPE, 0, 0, &ui, sizeof(UINT)));
  584. if (IsEmptyStr(e->CalledStationStr) == false)
  585. {
  586. Add(r->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_CALLED_STATION_ID, 0, 0, e->CalledStationStr, StrLen(e->CalledStationStr)));
  587. }
  588. Add(r->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_CALLING_STATION_ID, 0, 0, e->ClientIpStr, StrLen(e->ClientIpStr)));
  589. Add(r->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_TUNNEL_CLIENT_ENDPOINT, 0, 0, e->ClientIpStr, StrLen(e->ClientIpStr)));
  590. Add(r->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_USER_NAME, 0, 0, e->Username, StrLen(e->Username)));
  591. Add(r->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_NAS_ID, 0, 0, CEDAR_SERVER_STR, StrLen(CEDAR_SERVER_STR)));
  592. ui = Endian32(2);
  593. Add(r->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_VENDOR_SPECIFIC, RADIUS_VENDOR_MICROSOFT,
  594. RADIUS_MS_NETWORK_ACCESS_SERVER_TYPE, &ui, sizeof(UINT)));
  595. ui = Endian32(RADIUS_VENDOR_MICROSOFT);
  596. Add(r->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_VENDOR_SPECIFIC, RADIUS_VENDOR_MICROSOFT,
  597. RADIUS_MS_RAS_VENDOR, &ui, sizeof(UINT)));
  598. str = "MSRASV5.20";
  599. Add(r->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_VENDOR_SPECIFIC, RADIUS_VENDOR_MICROSOFT,
  600. RADIUS_MS_VERSION, str, StrLen(str)));
  601. str = "{5DC53D72-9815-4E97-AC91-339BAFEA6C48}";
  602. Add(r->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_VENDOR_SPECIFIC, RADIUS_VENDOR_MICROSOFT,
  603. RADIUS_MS_RAS_CORRELATION, str, StrLen(str)));
  604. str = "MSRASV5.20";
  605. Add(r->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_VENDOR_SPECIFIC, RADIUS_VENDOR_MICROSOFT,
  606. RADIUS_MS_RAS_CLIENT_VERSION, str, StrLen(str)));
  607. str = "MSRASV5.20";
  608. Add(r->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_VENDOR_SPECIFIC, RADIUS_VENDOR_MICROSOFT,
  609. RADIUS_MS_RAS_CLIENT_NAME, str, StrLen(str)));
  610. }
  611. // Send a MSCHAPv2 client auth response1
  612. bool EapClientSendMsChapv2AuthClientResponse(EAP_CLIENT *e, UCHAR *client_response, UCHAR *client_challenge)
  613. {
  614. bool ret = false;
  615. RADIUS_PACKET *request1 = NULL;
  616. RADIUS_PACKET *response1 = NULL;
  617. RADIUS_PACKET *request2 = NULL;
  618. RADIUS_PACKET *response2 = NULL;
  619. EAP_MSCHAPV2_RESPONSE *eap1 = NULL;
  620. EAP_MSCHAPV2_SUCCESS_CLIENT *eap2 = NULL;
  621. if (e == NULL || client_response == NULL || client_challenge == NULL)
  622. {
  623. return false;
  624. }
  625. request1 = NewRadiusPacket(RADIUS_CODE_ACCESS_REQUEST, e->NextRadiusPacketId++);
  626. EapSetRadiusGeneralAttributes(request1, e);
  627. if (e->LastStateSize != 0)
  628. {
  629. Add(request1->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_STATE, 0, 0,
  630. e->LastState, e->LastStateSize));
  631. }
  632. eap1 = ZeroMalloc(sizeof(EAP_MSCHAPV2_RESPONSE));
  633. eap1->Code = EAP_CODE_RESPONSE;
  634. eap1->Id = e->NextEapId++;
  635. eap1->Len = Endian16(59 + StrLen(e->Username));
  636. eap1->Type = EAP_TYPE_MS_AUTH;
  637. eap1->Chap_Opcode = EAP_MSCHAPV2_OP_RESPONSE;
  638. eap1->Chap_Id = e->MsChapV2Challenge.Chap_Id;
  639. eap1->Chap_Len = Endian16(54 + StrLen(e->Username));
  640. eap1->Chap_ValueSize = 49;
  641. Copy(eap1->Chap_PeerChallange, client_challenge, 16);
  642. Copy(eap1->Chap_NtResponse, client_response, 24);
  643. Copy(eap1->Chap_Name, e->Username, MIN(StrLen(e->Username), 255));
  644. Add(request1->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_EAP_MESSAGE, 0, 0, eap1, StrLen(e->Username) + 59));
  645. response1 = EapSendPacketAndRecvResponse(e, request1);
  646. if (response1 != NULL)
  647. {
  648. if (response1->Parse_EapMessage_DataSize != 0 && response1->Parse_EapMessage != NULL)
  649. {
  650. EAP_MESSAGE *eap = response1->Parse_EapMessage;
  651. if (eap->Code == EAP_CODE_REQUEST)
  652. {
  653. if (eap->Type == EAP_TYPE_MS_AUTH)
  654. {
  655. if (((EAP_MSCHAPV2_GENERAL *)eap)->Chap_Opcode != EAP_MSCHAPV2_OP_SUCCESS)
  656. {
  657. // Auth fail
  658. }
  659. else
  660. {
  661. // Auth ok
  662. EAP_MSCHAPV2_SUCCESS_SERVER *eaps = (EAP_MSCHAPV2_SUCCESS_SERVER *)eap;
  663. if (StartWith(eaps->Message, "S="))
  664. {
  665. BUF *buf = StrToBin(eaps->Message + 2);
  666. if (buf && buf->Size == 20)
  667. {
  668. Copy(&e->MsChapV2Success, eaps, sizeof(EAP_MSCHAPV2_SUCCESS_SERVER));
  669. Copy(e->ServerResponse, buf->Buf, 20);
  670. if (true)
  671. {
  672. // Send the final packet
  673. request2 = NewRadiusPacket(RADIUS_CODE_ACCESS_REQUEST, e->NextRadiusPacketId++);
  674. EapSetRadiusGeneralAttributes(request2, e);
  675. if (e->LastStateSize != 0)
  676. {
  677. Add(request2->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_STATE, 0, 0,
  678. e->LastState, e->LastStateSize));
  679. }
  680. eap2 = ZeroMalloc(sizeof(EAP_MSCHAPV2_SUCCESS_CLIENT));
  681. eap2->Code = EAP_CODE_RESPONSE;
  682. eap2->Id = e->NextEapId++;
  683. eap2->Len = Endian16(6);
  684. eap2->Type = EAP_TYPE_MS_AUTH;
  685. eap2->Chap_Opcode = EAP_MSCHAPV2_OP_SUCCESS;
  686. Add(request2->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_EAP_MESSAGE, 0, 0, eap2, 6));
  687. response2 = EapSendPacketAndRecvResponse(e, request2);
  688. if (response2 != NULL)
  689. {
  690. if (response2->Code == RADIUS_CODE_ACCESS_ACCEPT)
  691. {
  692. ret = true;
  693. }
  694. }
  695. }
  696. }
  697. FreeBuf(buf);
  698. }
  699. }
  700. }
  701. }
  702. }
  703. }
  704. FreeRadiusPacket(request1);
  705. FreeRadiusPacket(request2);
  706. FreeRadiusPacket(response1);
  707. FreeRadiusPacket(response2);
  708. Free(eap1);
  709. Free(eap2);
  710. return ret;
  711. }
  712. // Send a MSCHAPv2 client auth request
  713. bool EapClientSendMsChapv2AuthRequest(EAP_CLIENT *e)
  714. {
  715. bool ret = false;
  716. RADIUS_PACKET *request1 = NULL;
  717. RADIUS_PACKET *response1 = NULL;
  718. RADIUS_PACKET *request2 = NULL;
  719. RADIUS_PACKET *response2 = NULL;
  720. EAP_MESSAGE *eap1 = NULL;
  721. EAP_MESSAGE *eap2 = NULL;
  722. if (e == NULL)
  723. {
  724. return false;
  725. }
  726. request1 = NewRadiusPacket(RADIUS_CODE_ACCESS_REQUEST, e->NextRadiusPacketId++);
  727. EapSetRadiusGeneralAttributes(request1, e);
  728. eap1 = ZeroMalloc(sizeof(EAP_MESSAGE));
  729. eap1->Code = EAP_CODE_RESPONSE;
  730. eap1->Id = e->NextEapId++;
  731. eap1->Len = Endian16(StrLen(e->Username) + 5);
  732. eap1->Type = EAP_TYPE_IDENTITY;
  733. Copy(eap1->Data, e->Username, StrLen(e->Username));
  734. Add(request1->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_EAP_MESSAGE, 0, 0, eap1, StrLen(e->Username) + 5));
  735. response1 = EapSendPacketAndRecvResponse(e, request1);
  736. if (response1 != NULL)
  737. {
  738. if (response1->Parse_EapMessage_DataSize != 0 && response1->Parse_EapMessage != NULL)
  739. {
  740. EAP_MESSAGE *eap = response1->Parse_EapMessage;
  741. if (eap->Code == EAP_CODE_REQUEST)
  742. {
  743. if (eap->Type != EAP_TYPE_MS_AUTH)
  744. {
  745. // Unsupported auth type. Request MS-CHAP-v2.
  746. request2 = NewRadiusPacket(RADIUS_CODE_ACCESS_REQUEST, e->NextRadiusPacketId++);
  747. EapSetRadiusGeneralAttributes(request2, e);
  748. if (response1->Parse_StateSize != 0)
  749. {
  750. Add(request2->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_STATE, 0, 0,
  751. response1->Parse_State, response1->Parse_StateSize));
  752. }
  753. eap2 = ZeroMalloc(sizeof(EAP_MESSAGE));
  754. eap2->Code = EAP_CODE_RESPONSE;
  755. eap2->Id = e->NextEapId++;
  756. eap2->Len = Endian16(6);
  757. eap2->Type = EAP_TYPE_LEGACY_NAK;
  758. eap2->Data[0] = EAP_TYPE_MS_AUTH;
  759. Add(request2->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_EAP_MESSAGE, 0, 0, eap2, 6));
  760. response2 = EapSendPacketAndRecvResponse(e, request2);
  761. if (response2 != NULL && response2->Parse_EapMessage_DataSize != 0 && response2->Parse_EapMessage != NULL)
  762. {
  763. eap = response2->Parse_EapMessage;
  764. if (eap->Code == EAP_CODE_REQUEST && eap->Type == EAP_TYPE_MS_AUTH)
  765. {
  766. goto LABEL_PARSE_EAP;
  767. }
  768. }
  769. }
  770. else
  771. {
  772. EAP_MSCHAPV2_GENERAL *ms_g;
  773. LABEL_PARSE_EAP:
  774. ms_g = (EAP_MSCHAPV2_GENERAL *)eap;
  775. if (ms_g->Chap_Opcode == EAP_MSCHAPV2_OP_CHALLENGE)
  776. {
  777. EAP_MSCHAPV2_CHALLENGE *ms_c = (EAP_MSCHAPV2_CHALLENGE *)eap;
  778. if (ms_c->Chap_ValueSize == 16)
  779. {
  780. Copy(&e->MsChapV2Challenge, ms_c, sizeof(EAP_MSCHAPV2_CHALLENGE));
  781. ret = true;
  782. }
  783. }
  784. }
  785. }
  786. }
  787. }
  788. FreeRadiusPacket(request1);
  789. FreeRadiusPacket(request2);
  790. FreeRadiusPacket(response1);
  791. FreeRadiusPacket(response2);
  792. Free(eap1);
  793. Free(eap2);
  794. return ret;
  795. }
  796. // Send a packet and recv a response
  797. RADIUS_PACKET *EapSendPacketAndRecvResponse(EAP_CLIENT *e, RADIUS_PACKET *r)
  798. {
  799. SOCKSET set;
  800. UINT64 giveup_tick = 0;
  801. UINT64 next_send_tick = 0;
  802. bool select_inited = false;
  803. bool free_r = false;
  804. RADIUS_PACKET *ret = NULL;
  805. if (e == NULL || r == NULL)
  806. {
  807. return NULL;
  808. }
  809. ClearBuf(e->PEAP_CurrentReceivingMsg);
  810. e->PEAP_CurrentReceivingTotalSize = 0;
  811. InitSockSet(&set);
  812. AddSockSet(&set, e->UdpSock);
  813. while (true)
  814. {
  815. UINT64 now = Tick64();
  816. UINT wait_time = INFINITE;
  817. bool is_finish = false;
  818. if (giveup_tick == 0)
  819. {
  820. giveup_tick = now + (UINT64)e->GiveupTimeout;
  821. }
  822. if (giveup_tick <= now)
  823. {
  824. break;
  825. }
  826. if (select_inited)
  827. {
  828. UINT num_error = 0;
  829. while (true)
  830. {
  831. IP from_ip;
  832. UINT from_port;
  833. UINT size;
  834. UCHAR *tmp = e->TmpBuffer;
  835. size = RecvFrom(e->UdpSock, &from_ip, &from_port, tmp, sizeof(e->TmpBuffer));
  836. if (size == 0 && e->UdpSock->IgnoreRecvErr == false)
  837. {
  838. // UDP socket error
  839. is_finish = true;
  840. break;
  841. }
  842. else if (size == SOCK_LATER)
  843. {
  844. break;
  845. }
  846. if (size == 0 && e->UdpSock->IgnoreRecvErr)
  847. {
  848. num_error++;
  849. if (num_error >= 100)
  850. {
  851. is_finish = true;
  852. break;
  853. }
  854. }
  855. // Receive a response packet
  856. if (size != SOCK_LATER && size >= 1)
  857. {
  858. if (CmpIpAddr(&from_ip, &e->ServerIp) == 0 && from_port == e->ServerPort)
  859. {
  860. RADIUS_PACKET *rp = ParseRadiusPacket(tmp, size);
  861. if (rp != NULL)
  862. {
  863. RADIUS_AVP *eap_msg = GetRadiusAvp(rp, RADIUS_ATTRIBUTE_EAP_MESSAGE);
  864. RADIUS_AVP *vlan_avp = GetRadiusAvp(rp, RADIUS_ATTRIBUTE_VLAN_ID);
  865. if (eap_msg != NULL)
  866. {
  867. e->LastRecvEapId = ((EAP_MESSAGE *)(eap_msg->Data))->Id;
  868. }
  869. if (vlan_avp != NULL)
  870. {
  871. // VLAN ID
  872. UINT vlan_id = 0;
  873. char tmp[32];
  874. Zero(tmp, sizeof(tmp));
  875. Copy(tmp, vlan_avp->Data, MIN(vlan_avp->DataSize, sizeof(tmp) - 1));
  876. vlan_id = ToInt(tmp);
  877. e->LastRecvVLanId = vlan_id;
  878. }
  879. // Validate the received packet
  880. if (rp->Parse_EapAuthMessagePos != 0 && rp->Parse_AuthenticatorPos != 0)
  881. {
  882. UCHAR *tmp_buffer = Clone(tmp, size);
  883. UCHAR auth1[16];
  884. UCHAR auth2[16];
  885. Copy(auth1, &tmp_buffer[rp->Parse_EapAuthMessagePos], 16);
  886. Zero(&tmp_buffer[rp->Parse_EapAuthMessagePos], 16);
  887. Copy(&tmp_buffer[rp->Parse_AuthenticatorPos], r->Authenticator, 16);
  888. HMacMd5(auth2, e->SharedSecret, StrLen(e->SharedSecret),
  889. tmp_buffer, size);
  890. if (Cmp(auth1, auth2, 16) == 0)
  891. {
  892. bool send_ack_packet = false;
  893. // ok
  894. Copy(e->LastState, rp->Parse_State, rp->Parse_StateSize);
  895. e->LastStateSize = rp->Parse_StateSize;
  896. if (rp->Parse_EapMessage_DataSize != 0 && rp->Parse_EapMessage != NULL)
  897. {
  898. EAP_MESSAGE *eap_msg = (EAP_MESSAGE *)rp->Parse_EapMessage;
  899. if (eap_msg->Type == EAP_TYPE_PEAP)
  900. {
  901. EAP_PEAP *peap_message = (EAP_PEAP *)eap_msg;
  902. if (peap_message->TlsFlags & EAP_TLS_FLAGS_MORE_FRAGMENTS || e->PEAP_CurrentReceivingTotalSize != 0)
  903. {
  904. // more fragments: reply ack
  905. RADIUS_PACKET *ack_packet = NewRadiusPacket(RADIUS_CODE_ACCESS_REQUEST, e->NextRadiusPacketId++);
  906. EAP_PEAP *ack_msg = ZeroMalloc(sizeof(EAP_PEAP));
  907. EapSetRadiusGeneralAttributes(ack_packet, e);
  908. if (e->LastStateSize != 0)
  909. {
  910. Add(ack_packet->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_STATE, 0, 0,
  911. e->LastState, e->LastStateSize));
  912. }
  913. ack_msg->Code = EAP_CODE_RESPONSE;
  914. ack_msg->Id = e->LastRecvEapId;
  915. ack_msg->Len = Endian16(6);
  916. ack_msg->Type = EAP_TYPE_PEAP;
  917. ack_msg->TlsFlags = 0;
  918. Add(ack_packet->AvpList, NewRadiusAvp(RADIUS_ATTRIBUTE_EAP_MESSAGE, 0, 0,
  919. ack_msg, sizeof(EAP_PEAP)));
  920. next_send_tick = 0;
  921. if (free_r)
  922. {
  923. FreeRadiusPacket(r);
  924. }
  925. r = ack_packet;
  926. free_r = true;
  927. Free(ack_msg);
  928. send_ack_packet = true;
  929. if (e->PEAP_CurrentReceivingTotalSize == 0)
  930. {
  931. if (peap_message->TlsFlags & EAP_TLS_FLAGS_LEN)
  932. {
  933. if (Endian16(peap_message->Len) >= 9)
  934. {
  935. UINT total_size = READ_UINT(((UCHAR *)peap_message) + sizeof(EAP_PEAP));
  936. if (total_size < 65536)
  937. {
  938. if (rp->Parse_EapMessage_DataSize >= 1)
  939. {
  940. e->PEAP_CurrentReceivingTotalSize = total_size;
  941. WriteBuf(e->PEAP_CurrentReceivingMsg,
  942. ((UCHAR *)peap_message),
  943. rp->Parse_EapMessage_DataSize);
  944. }
  945. }
  946. }
  947. }
  948. }
  949. else
  950. {
  951. if ((!(peap_message->TlsFlags & EAP_TLS_FLAGS_LEN)) &&
  952. rp->Parse_EapMessage_DataSize >= sizeof(EAP_PEAP))
  953. {
  954. WriteBuf(e->PEAP_CurrentReceivingMsg,
  955. ((UCHAR *)peap_message) + sizeof(EAP_PEAP),
  956. rp->Parse_EapMessage_DataSize - sizeof(EAP_PEAP));
  957. if (e->PEAP_CurrentReceivingTotalSize <= e->PEAP_CurrentReceivingMsg->Size)
  958. {
  959. // all fragmented segments are arrived
  960. send_ack_packet = false;
  961. is_finish = true;
  962. Free(rp->Parse_EapMessage);
  963. rp->Parse_EapMessage = Clone(e->PEAP_CurrentReceivingMsg->Buf, e->PEAP_CurrentReceivingMsg->Size);
  964. rp->Parse_EapMessage_DataSize = e->PEAP_CurrentReceivingMsg->Size;
  965. }
  966. }
  967. }
  968. }
  969. }
  970. }
  971. if (send_ack_packet == false)
  972. {
  973. ret = rp;
  974. }
  975. }
  976. Free(tmp_buffer);
  977. }
  978. if (ret != NULL)
  979. {
  980. is_finish = true;
  981. break;
  982. }
  983. else
  984. {
  985. FreeRadiusPacket(rp);
  986. }
  987. }
  988. }
  989. }
  990. }
  991. }
  992. if (is_finish)
  993. {
  994. break;
  995. }
  996. if (next_send_tick == 0 || next_send_tick <= now)
  997. {
  998. next_send_tick = now + (UINT64)e->ResendTimeout;
  999. if (EapSendPacket(e, r) == false)
  1000. {
  1001. is_finish = true;
  1002. }
  1003. }
  1004. wait_time = MIN(wait_time, (UINT)(next_send_tick - now));
  1005. wait_time = MIN(wait_time, (UINT)(giveup_tick - now));
  1006. wait_time = MAX(wait_time, 1);
  1007. if (is_finish)
  1008. {
  1009. break;
  1010. }
  1011. Select(&set, wait_time, NULL, NULL);
  1012. select_inited = true;
  1013. }
  1014. if (free_r)
  1015. {
  1016. FreeRadiusPacket(r);
  1017. }
  1018. return ret;
  1019. }
  1020. // Send a RADIUS packet
  1021. bool EapSendPacket(EAP_CLIENT *e, RADIUS_PACKET *r)
  1022. {
  1023. BUF *b;
  1024. bool ret = false;
  1025. if (e == NULL || r == NULL)
  1026. {
  1027. return false;
  1028. }
  1029. b = GenerateRadiusPacket(r, e->SharedSecret);
  1030. if (b != NULL)
  1031. {
  1032. UINT r = SendTo(e->UdpSock, &e->ServerIp, e->ServerPort, b->Buf, b->Size);
  1033. if (!(r == 0 && e->UdpSock->IgnoreSendErr == false))
  1034. {
  1035. ret = true;
  1036. }
  1037. FreeBuf(b);
  1038. }
  1039. return ret;
  1040. }
  1041. // New EAP client
  1042. EAP_CLIENT *NewEapClient(IP *server_ip, UINT server_port, char *shared_secret, UINT resend_timeout, UINT giveup_timeout, char *client_ip_str, char *username, char *hubname)
  1043. {
  1044. EAP_CLIENT *e;
  1045. if (server_ip == NULL)
  1046. {
  1047. return NULL;
  1048. }
  1049. if (resend_timeout == 0)
  1050. {
  1051. resend_timeout = RADIUS_RETRY_INTERVAL;
  1052. }
  1053. if (giveup_timeout == 0)
  1054. {
  1055. giveup_timeout = RADIUS_RETRY_TIMEOUT;
  1056. }
  1057. e = ZeroMalloc(sizeof(EAP_CLIENT));
  1058. e->Ref = NewRef();
  1059. e->NextRadiusPacketId = 1;
  1060. e->UdpSock = NewUDPEx(0, IsIP6(server_ip));
  1061. Copy(&e->ServerIp, server_ip, sizeof(IP));
  1062. e->ServerPort = server_port;
  1063. e->ResendTimeout = resend_timeout;
  1064. e->GiveupTimeout = giveup_timeout;
  1065. StrCpy(e->SharedSecret, sizeof(e->SharedSecret), shared_secret);
  1066. StrCpy(e->CalledStationStr, sizeof(e->CalledStationStr), hubname);
  1067. StrCpy(e->ClientIpStr, sizeof(e->ClientIpStr), client_ip_str);
  1068. StrCpy(e->Username, sizeof(e->Username), username);
  1069. e->LastRecvEapId = 0;
  1070. e->PEAP_CurrentReceivingMsg = NewBuf();
  1071. return e;
  1072. }
  1073. // Free a EAP client
  1074. void ReleaseEapClient(EAP_CLIENT *e)
  1075. {
  1076. if (e == NULL)
  1077. {
  1078. return;
  1079. }
  1080. if (Release(e->Ref) == 0)
  1081. {
  1082. CleanupEapClient(e);
  1083. }
  1084. }
  1085. void CleanupEapClient(EAP_CLIENT *e)
  1086. {
  1087. if (e == NULL)
  1088. {
  1089. return;
  1090. }
  1091. Disconnect(e->UdpSock);
  1092. ReleaseSock(e->UdpSock);
  1093. FreeSslPipe(e->SslPipe);
  1094. FreeBuf(e->PEAP_CurrentReceivingMsg);
  1095. Free(e);
  1096. }
  1097. // New RADIUS AVP value
  1098. RADIUS_AVP *NewRadiusAvp(UCHAR type, UINT vendor_id, UCHAR vendor_code, void *data, UINT size)
  1099. {
  1100. RADIUS_AVP *p = ZeroMalloc(sizeof(RADIUS_AVP));
  1101. p->Type = type;
  1102. p->VendorId = vendor_id;
  1103. p->VendorCode = vendor_code;
  1104. p->DataSize = (UCHAR)size;
  1105. Copy(p->Data, data, (UCHAR)size);
  1106. if (size >= 256)
  1107. {
  1108. Debug("!! size = %u\n", size);
  1109. }
  1110. return p;
  1111. }
  1112. // New RADIUS packet
  1113. RADIUS_PACKET *NewRadiusPacket(UCHAR code, UCHAR packet_id)
  1114. {
  1115. RADIUS_PACKET *r = ZeroMalloc(sizeof(RADIUS_PACKET));
  1116. r->Code = code;
  1117. r->PacketId = packet_id;
  1118. r->AvpList = NewListFast(NULL);
  1119. return r;
  1120. }
  1121. // Get RADIUS AVP
  1122. RADIUS_AVP *GetRadiusAvp(RADIUS_PACKET *p, UCHAR type)
  1123. {
  1124. UINT i;
  1125. if (p == NULL)
  1126. {
  1127. return NULL;
  1128. }
  1129. for (i = 0;i < LIST_NUM(p->AvpList);i++)
  1130. {
  1131. RADIUS_AVP *avp = LIST_DATA(p->AvpList, i);
  1132. if (avp->Type == type)
  1133. {
  1134. return avp;
  1135. }
  1136. }
  1137. return NULL;
  1138. }
  1139. // Free a RADIUS packet
  1140. void FreeRadiusPacket(RADIUS_PACKET *p)
  1141. {
  1142. UINT i;
  1143. if (p == NULL)
  1144. {
  1145. return;
  1146. }
  1147. if (p->AvpList != NULL)
  1148. {
  1149. for (i = 0;i < LIST_NUM(p->AvpList);i++)
  1150. {
  1151. RADIUS_AVP *a = LIST_DATA(p->AvpList, i);
  1152. Free(a);
  1153. }
  1154. ReleaseList(p->AvpList);
  1155. }
  1156. Free(p->Parse_EapMessage);
  1157. Free(p);
  1158. }
  1159. // Generate a RADIUS packet
  1160. BUF *GenerateRadiusPacket(RADIUS_PACKET *p, char *shared_secret)
  1161. {
  1162. BUF *b;
  1163. UINT i;
  1164. UCHAR zero16[16];
  1165. UINT len_pos = 0;
  1166. UINT eap_auth_pos = 0;
  1167. bool exist_eap_msg = false;
  1168. bool exist_eap_auth = false;
  1169. if (p == NULL)
  1170. {
  1171. return NULL;
  1172. }
  1173. Zero(zero16, sizeof(zero16));
  1174. // Add EAP message auth packet
  1175. for (i = 0;i < LIST_NUM(p->AvpList);i++)
  1176. {
  1177. RADIUS_AVP *a = (RADIUS_AVP *)LIST_DATA(p->AvpList, i);
  1178. if (a->Type == RADIUS_ATTRIBUTE_EAP_MESSAGE)
  1179. {
  1180. exist_eap_msg = true;
  1181. }
  1182. if (a->Type == RADIUS_ATTRIBUTE_EAP_AUTHENTICATOR)
  1183. {
  1184. exist_eap_auth = true;
  1185. }
  1186. }
  1187. if (exist_eap_msg && exist_eap_auth == false)
  1188. {
  1189. RADIUS_AVP *a = NewRadiusAvp(RADIUS_ATTRIBUTE_EAP_AUTHENTICATOR, 0, 0, zero16, sizeof(zero16));
  1190. Add(p->AvpList, a);
  1191. }
  1192. if (IsZero(p->Authenticator, 16))
  1193. {
  1194. UCHAR rand16[16];
  1195. Rand(rand16, sizeof(rand16));
  1196. Copy(p->Authenticator, rand16, 16);
  1197. }
  1198. b = NewBuf();
  1199. WriteBufChar(b, p->Code);
  1200. WriteBufChar(b, p->PacketId);
  1201. len_pos = b->Current;
  1202. WriteBufShort(b, 0);
  1203. WriteBuf(b, p->Authenticator, 16);
  1204. for (i = 0;i < LIST_NUM(p->AvpList);i++)
  1205. {
  1206. RADIUS_AVP *a = (RADIUS_AVP *)LIST_DATA(p->AvpList, i);
  1207. WriteBufChar(b, a->Type);
  1208. if (a->Type != RADIUS_ATTRIBUTE_VENDOR_SPECIFIC)
  1209. {
  1210. WriteBufChar(b, (UCHAR)((UINT)a->DataSize + 2));
  1211. if (a->Type == RADIUS_ATTRIBUTE_EAP_AUTHENTICATOR)
  1212. {
  1213. eap_auth_pos = b->Current;
  1214. if (a->DataSize == 16)
  1215. {
  1216. Zero(a->Data, sizeof(a->Data));
  1217. }
  1218. }
  1219. WriteBuf(b, a->Data, a->DataSize);
  1220. }
  1221. else
  1222. {
  1223. WriteBufChar(b, (UCHAR)((UINT)a->DataSize + 8));
  1224. WriteBufInt(b, a->VendorId);
  1225. WriteBufChar(b, a->VendorCode);
  1226. WriteBufChar(b, (UCHAR)((UINT)a->DataSize + 2));
  1227. WriteBuf(b, a->Data, a->DataSize);
  1228. }
  1229. }
  1230. WRITE_USHORT(((UCHAR *)b->Buf) + len_pos, b->Size);
  1231. if (eap_auth_pos != 0)
  1232. {
  1233. UCHAR eap_auth[16];
  1234. HMacMd5(eap_auth, shared_secret, StrLen(shared_secret), b->Buf, b->Size);
  1235. Copy(((UCHAR *)b->Buf) + eap_auth_pos, eap_auth, 16);
  1236. }
  1237. SeekBufToBegin(b);
  1238. return b;
  1239. }
  1240. // Parse a RADIUS packet
  1241. RADIUS_PACKET *ParseRadiusPacket(void *data, UINT size)
  1242. {
  1243. RADIUS_PACKET *p = NULL;
  1244. BUF *buf = NULL;
  1245. USHORT len;
  1246. UCHAR auth[16];
  1247. if (data == NULL || size == 0)
  1248. {
  1249. return NULL;
  1250. }
  1251. p = ZeroMalloc(sizeof(RADIUS_PACKET));
  1252. p->AvpList = NewListFast(NULL);
  1253. buf = MemToBuf(data, size);
  1254. // Code
  1255. p->Code = ReadBufChar(buf);
  1256. p->PacketId = ReadBufChar(buf);
  1257. len = ReadBufShort(buf);
  1258. p->Parse_AuthenticatorPos = buf->Current;
  1259. if (ReadBuf(buf, auth, 16) != 16)
  1260. {
  1261. goto LABEL_ERROR;
  1262. }
  1263. if ((UINT)len < 20)
  1264. {
  1265. goto LABEL_ERROR;
  1266. }
  1267. if ((UINT)len > buf->Size)
  1268. {
  1269. goto LABEL_ERROR;
  1270. }
  1271. else if ((UINT)len < buf->Size)
  1272. {
  1273. buf->Size = len;
  1274. }
  1275. while (true)
  1276. {
  1277. RADIUS_AVP a;
  1278. UCHAR uc;
  1279. UINT data_size;
  1280. Zero(&a, sizeof(a));
  1281. if (ReadBuf(buf, &a.Type, 1) == 0)
  1282. {
  1283. break;
  1284. }
  1285. if (a.Type != RADIUS_ATTRIBUTE_VENDOR_SPECIFIC)
  1286. {
  1287. if (ReadBuf(buf, &uc, 1) == 0)
  1288. {
  1289. break;
  1290. }
  1291. data_size = (UINT)uc;
  1292. if (data_size < 2)
  1293. {
  1294. goto LABEL_ERROR;
  1295. }
  1296. data_size -= 2;
  1297. a.DataSize = (UCHAR)data_size;
  1298. if (a.Type == RADIUS_ATTRIBUTE_EAP_AUTHENTICATOR && a.DataSize == 16)
  1299. {
  1300. p->Parse_EapAuthMessagePos = buf->Current;
  1301. }
  1302. if (ReadBuf(buf, a.Data, a.DataSize) != a.DataSize)
  1303. {
  1304. goto LABEL_ERROR;
  1305. }
  1306. if (a.Type == RADIUS_ATTRIBUTE_EAP_MESSAGE && a.DataSize >= 5 && a.DataSize <= 1500)
  1307. {
  1308. UINT sz_tmp = Endian16(((EAP_MESSAGE *)a.Data)->Len);
  1309. if (sz_tmp >= 5 && sz_tmp <= a.DataSize)
  1310. {
  1311. if (p->Parse_EapMessage == NULL)
  1312. {
  1313. EAP_MESSAGE *eap = Clone(a.Data, a.DataSize);
  1314. p->Parse_EapMessage_DataSize = sz_tmp;
  1315. p->Parse_EapMessage = eap;
  1316. }
  1317. }
  1318. }
  1319. }
  1320. else
  1321. {
  1322. if (ReadBuf(buf, &uc, 1) == 0)
  1323. {
  1324. break;
  1325. }
  1326. data_size = (UINT)uc;
  1327. if (data_size < 8)
  1328. {
  1329. goto LABEL_ERROR;
  1330. }
  1331. data_size -= 8;
  1332. a.VendorId = ReadBufInt(buf);
  1333. a.VendorCode = ReadBufChar(buf);
  1334. if (ReadBuf(buf, &uc, 1) == 0)
  1335. {
  1336. break;
  1337. }
  1338. if (((UINT)uc - 2) != data_size)
  1339. {
  1340. goto LABEL_ERROR;
  1341. }
  1342. a.DataSize = (UINT)data_size;
  1343. if (ReadBuf(buf, a.Data, a.DataSize) != a.DataSize)
  1344. {
  1345. goto LABEL_ERROR;
  1346. }
  1347. }
  1348. Add(p->AvpList, Clone(&a, sizeof(RADIUS_AVP)));
  1349. }
  1350. FreeBuf(buf);
  1351. if (true)
  1352. {
  1353. UINT num, i;
  1354. RADIUS_AVP *avp = GetRadiusAvp(p, RADIUS_ATTRIBUTE_STATE);
  1355. if (avp != NULL)
  1356. {
  1357. Copy(p->Parse_State, avp->Data, avp->DataSize);
  1358. p->Parse_StateSize = avp->DataSize;
  1359. }
  1360. num = 0;
  1361. for (i = 0;i < LIST_NUM(p->AvpList);i++)
  1362. {
  1363. RADIUS_AVP *avp = LIST_DATA(p->AvpList, i);
  1364. if (avp->Type == RADIUS_ATTRIBUTE_EAP_MESSAGE)
  1365. {
  1366. num++;
  1367. }
  1368. }
  1369. if (num >= 2)
  1370. {
  1371. // Reassemble multiple EAP messages
  1372. BUF *b = NewBuf();
  1373. for (i = 0;i < LIST_NUM(p->AvpList);i++)
  1374. {
  1375. RADIUS_AVP *avp = LIST_DATA(p->AvpList, i);
  1376. if (avp->Type == RADIUS_ATTRIBUTE_EAP_MESSAGE)
  1377. {
  1378. WriteBuf(b, avp->Data, avp->DataSize);
  1379. }
  1380. }
  1381. if (Endian16(((EAP_MESSAGE *)b->Buf)->Len) <= b->Size)
  1382. {
  1383. if (p->Parse_EapMessage != NULL)
  1384. {
  1385. Free(p->Parse_EapMessage);
  1386. }
  1387. p->Parse_EapMessage_DataSize = b->Size;
  1388. p->Parse_EapMessage_DataSize = MIN(p->Parse_EapMessage_DataSize, 1500);
  1389. p->Parse_EapMessage = Clone(b->Buf, p->Parse_EapMessage_DataSize);
  1390. }
  1391. FreeBuf(b);
  1392. }
  1393. }
  1394. return p;
  1395. LABEL_ERROR:
  1396. if (p != NULL)
  1397. {
  1398. FreeRadiusPacket(p);
  1399. }
  1400. if (buf != NULL)
  1401. {
  1402. FreeBuf(buf);
  1403. }
  1404. return NULL;
  1405. }
  1406. ////////// Classical implementation
  1407. // Attempts Radius authentication (with specifying retry interval and multiple server)
  1408. bool RadiusLogin(CONNECTION *c, char *server, UINT port, UCHAR *secret, UINT secret_size, wchar_t *username, char *password, UINT interval, UCHAR *mschap_v2_server_response_20,
  1409. RADIUS_LOGIN_OPTION *opt, char *hubname)
  1410. {
  1411. UCHAR random[MD5_SIZE];
  1412. UCHAR id;
  1413. BUF *encrypted_password = NULL;
  1414. BUF *user_name = NULL;
  1415. //IP ip;
  1416. bool ret = false;
  1417. TOKEN_LIST *token;
  1418. UINT i;
  1419. LIST *ip_list;
  1420. IPC_MSCHAP_V2_AUTHINFO mschap;
  1421. bool is_mschap;
  1422. char client_ip_str[MAX_SIZE];
  1423. RADIUS_LOGIN_OPTION opt_dummy;
  1424. static UINT packet_id = 0;
  1425. // Validate arguments
  1426. if (server == NULL || port == 0 || (secret_size != 0 && secret == NULL) || username == NULL || password == NULL)
  1427. {
  1428. return false;
  1429. }
  1430. if (opt == NULL)
  1431. {
  1432. Zero(&opt_dummy, sizeof(opt_dummy));
  1433. opt = &opt_dummy;
  1434. }
  1435. opt->Out_VLanId = 0;
  1436. Zero(client_ip_str, sizeof(client_ip_str));
  1437. if (c != NULL && c->FirstSock != NULL)
  1438. {
  1439. IPToStr(client_ip_str, sizeof(client_ip_str), &c->FirstSock->RemoteIP);
  1440. }
  1441. // Parse the MS-CHAP v2 authentication data
  1442. Zero(&mschap, sizeof(mschap));
  1443. is_mschap = ParseAndExtractMsChapV2InfoFromPassword(&mschap, password);
  1444. if (is_mschap && mschap.MsChapV2_EapClient != NULL)
  1445. {
  1446. // Try the EAP authentication for RADIUS first
  1447. EAP_CLIENT *eap = mschap.MsChapV2_EapClient;
  1448. if (eap->PeapMode == false)
  1449. {
  1450. ret = EapClientSendMsChapv2AuthClientResponse(eap, mschap.MsChapV2_ClientResponse,
  1451. mschap.MsChapV2_ClientChallenge);
  1452. }
  1453. else
  1454. {
  1455. ret = PeapClientSendMsChapv2AuthClientResponse(eap, mschap.MsChapV2_ClientResponse,
  1456. mschap.MsChapV2_ClientChallenge);
  1457. }
  1458. if (ret)
  1459. {
  1460. Copy(mschap_v2_server_response_20, eap->ServerResponse, 20);
  1461. if (opt->In_CheckVLanId)
  1462. {
  1463. opt->Out_VLanId = eap->LastRecvVLanId;
  1464. }
  1465. return true;
  1466. }
  1467. else
  1468. {
  1469. return false;
  1470. }
  1471. }
  1472. // Split the server into tokens
  1473. token = ParseToken(server, " ,;\t");
  1474. // Get the IP address of the server
  1475. ip_list = NewListFast(NULL);
  1476. for(i = 0; i < token->NumTokens; i++)
  1477. {
  1478. IP *tmp_ip = Malloc(sizeof(IP));
  1479. if (GetIP(tmp_ip, token->Token[i]))
  1480. {
  1481. Add(ip_list, tmp_ip);
  1482. }
  1483. else if (GetIPEx(tmp_ip, token->Token[i], true))
  1484. {
  1485. Add(ip_list, tmp_ip);
  1486. }
  1487. else
  1488. {
  1489. Free(tmp_ip);
  1490. }
  1491. }
  1492. FreeToken(token);
  1493. if(LIST_NUM(ip_list) == 0)
  1494. {
  1495. ReleaseList(ip_list);
  1496. return false;
  1497. }
  1498. // Random number generation
  1499. Rand(random, sizeof(random));
  1500. // ID generation
  1501. id = (UCHAR)(packet_id % 254 + 1);
  1502. packet_id++;
  1503. if (is_mschap == false)
  1504. {
  1505. // Encrypt the password
  1506. encrypted_password = RadiusEncryptPassword(password, random, secret, secret_size);
  1507. if (encrypted_password == NULL)
  1508. {
  1509. // Encryption failure
  1510. // Release the ip_list
  1511. for(i = 0; i < LIST_NUM(ip_list); i++)
  1512. {
  1513. IP *tmp_ip = LIST_DATA(ip_list, i);
  1514. Free(tmp_ip);
  1515. }
  1516. ReleaseList(ip_list);
  1517. return false;
  1518. }
  1519. }
  1520. // Generate the user name packet
  1521. user_name = RadiusCreateUserName(username);
  1522. if (user_name != NULL)
  1523. {
  1524. // Generate a password packet
  1525. BUF *user_password = (is_mschap ? NULL : RadiusCreateUserPassword(encrypted_password->Buf, encrypted_password->Size));
  1526. BUF *nas_id;
  1527. if (IsEmptyStr(opt->NasId))
  1528. {
  1529. nas_id = RadiusCreateNasId(CEDAR_SERVER_STR);
  1530. }
  1531. else
  1532. {
  1533. nas_id = RadiusCreateNasId(opt->NasId);
  1534. }
  1535. if (is_mschap || user_password != NULL)
  1536. {
  1537. UINT64 start;
  1538. UINT64 next_send_time;
  1539. UCHAR tmp[MAX_SIZE];
  1540. UINT recv_buf_size = 32768;
  1541. UCHAR *recv_buf = MallocEx(recv_buf_size, true);
  1542. // Generate an UDP packet
  1543. BUF *p = NewBuf();
  1544. UCHAR type = 1;
  1545. SOCK *sock;
  1546. USHORT sz = 0;
  1547. UINT pos = 0;
  1548. BOOL *finish = ZeroMallocEx(sizeof(BOOL) * LIST_NUM(ip_list), true);
  1549. Zero(tmp, sizeof(tmp));
  1550. WriteBuf(p, &type, 1);
  1551. WriteBuf(p, &id, 1);
  1552. WriteBuf(p, &sz, 2);
  1553. WriteBuf(p, random, 16);
  1554. WriteBuf(p, user_name->Buf, user_name->Size);
  1555. if (is_mschap == false)
  1556. {
  1557. UINT ui;
  1558. // PAP
  1559. WriteBuf(p, user_password->Buf, user_password->Size);
  1560. WriteBuf(p, nas_id->Buf, nas_id->Size);
  1561. // Service-Type
  1562. ui = Endian32(2);
  1563. RadiusAddValue(p, 6, 0, 0, &ui, sizeof(ui));
  1564. // NAS-Port-Type
  1565. ui = Endian32(5);
  1566. RadiusAddValue(p, 61, 0, 0, &ui, sizeof(ui));
  1567. // Tunnel-Type
  1568. ui = Endian32(1);
  1569. RadiusAddValue(p, 64, 0, 0, &ui, sizeof(ui));
  1570. // Tunnel-Medium-Type
  1571. ui = Endian32(1);
  1572. RadiusAddValue(p, 65, 0, 0, &ui, sizeof(ui));
  1573. // Called-Station-ID - VPN Hub Name
  1574. if (IsEmptyStr(hubname) == false)
  1575. {
  1576. RadiusAddValue(p, 30, 0, 0, hubname, StrLen(hubname));
  1577. }
  1578. // Calling-Station-Id
  1579. RadiusAddValue(p, 31, 0, 0, client_ip_str, StrLen(client_ip_str));
  1580. // Tunnel-Client-Endpoint
  1581. RadiusAddValue(p, 66, 0, 0, client_ip_str, StrLen(client_ip_str));
  1582. }
  1583. else
  1584. {
  1585. // MS-CHAP v2
  1586. static UINT session_id = 0;
  1587. USHORT us;
  1588. UINT ui;
  1589. char *ms_ras_version = "MSRASV5.20";
  1590. UCHAR ms_chapv2_response[50];
  1591. // Acct-Session-Id
  1592. us = Endian16(session_id % 254 + 1);
  1593. session_id++;
  1594. RadiusAddValue(p, 44, 0, 0, &us, sizeof(us));
  1595. // NAS-IP-Address
  1596. if (c != NULL && c->FirstSock != NULL && c->FirstSock->IPv6 == false)
  1597. {
  1598. ui = IPToUINT(&c->FirstSock->LocalIP);
  1599. RadiusAddValue(p, 4, 0, 0, &ui, sizeof(ui));
  1600. }
  1601. // Service-Type
  1602. ui = Endian32(2);
  1603. RadiusAddValue(p, 6, 0, 0, &ui, sizeof(ui));
  1604. // MS-RAS-Vendor
  1605. ui = Endian32(311);
  1606. RadiusAddValue(p, 26, 311, 9, &ui, sizeof(ui));
  1607. // MS-RAS-Version
  1608. RadiusAddValue(p, 26, 311, 18, ms_ras_version, StrLen(ms_ras_version));
  1609. // NAS-Port-Type
  1610. ui = Endian32(5);
  1611. RadiusAddValue(p, 61, 0, 0, &ui, sizeof(ui));
  1612. // Tunnel-Type
  1613. ui = Endian32(1);
  1614. RadiusAddValue(p, 64, 0, 0, &ui, sizeof(ui));
  1615. // Tunnel-Medium-Type
  1616. ui = Endian32(1);
  1617. RadiusAddValue(p, 65, 0, 0, &ui, sizeof(ui));
  1618. // Called-Station-ID - VPN Hub Name
  1619. if (IsEmptyStr(hubname) == false)
  1620. {
  1621. RadiusAddValue(p, 30, 0, 0, hubname, StrLen(hubname));
  1622. }
  1623. // Calling-Station-Id
  1624. RadiusAddValue(p, 31, 0, 0, client_ip_str, StrLen(client_ip_str));
  1625. // Tunnel-Client-Endpoint
  1626. RadiusAddValue(p, 66, 0, 0, client_ip_str, StrLen(client_ip_str));
  1627. // MS-RAS-Client-Version
  1628. RadiusAddValue(p, 26, 311, 35, ms_ras_version, StrLen(ms_ras_version));
  1629. // MS-RAS-Client-Name
  1630. RadiusAddValue(p, 26, 311, 34, client_ip_str, StrLen(client_ip_str));
  1631. // MS-CHAP-Challenge
  1632. RadiusAddValue(p, 26, 311, 11, mschap.MsChapV2_ServerChallenge, sizeof(mschap.MsChapV2_ServerChallenge));
  1633. // MS-CHAP2-Response
  1634. Zero(ms_chapv2_response, sizeof(ms_chapv2_response));
  1635. Copy(ms_chapv2_response + 2, mschap.MsChapV2_ClientChallenge, 16);
  1636. Copy(ms_chapv2_response + 2 + 16 + 8, mschap.MsChapV2_ClientResponse, 24);
  1637. RadiusAddValue(p, 26, 311, 25, ms_chapv2_response, sizeof(ms_chapv2_response));
  1638. // NAS-ID
  1639. WriteBuf(p, nas_id->Buf, nas_id->Size);
  1640. }
  1641. SeekBuf(p, 0, 0);
  1642. WRITE_USHORT(((UCHAR *)p->Buf) + 2, (USHORT)p->Size);
  1643. // Create a socket
  1644. sock = NewUDPEx(0, IsIP6(LIST_DATA(ip_list, pos)));
  1645. // Transmission process start
  1646. start = Tick64();
  1647. if(interval < RADIUS_RETRY_INTERVAL)
  1648. {
  1649. interval = RADIUS_RETRY_INTERVAL;
  1650. }
  1651. else if(interval > RADIUS_RETRY_TIMEOUT)
  1652. {
  1653. interval = RADIUS_RETRY_TIMEOUT;
  1654. }
  1655. next_send_time = start + (UINT64)interval;
  1656. while (true)
  1657. {
  1658. UINT server_port;
  1659. UINT recv_size;
  1660. //IP server_ip;
  1661. SOCKSET set;
  1662. UINT64 now;
  1663. SEND_RETRY:
  1664. //SendTo(sock, &ip, port, p->Buf, p->Size);
  1665. SendTo(sock, LIST_DATA(ip_list, pos), port, p->Buf, p->Size);
  1666. Debug("send to host:%u\n", pos);
  1667. next_send_time = Tick64() + (UINT64)interval;
  1668. RECV_RETRY:
  1669. now = Tick64();
  1670. if (next_send_time <= now)
  1671. {
  1672. // Switch the host to refer
  1673. pos++;
  1674. pos = pos % LIST_NUM(ip_list);
  1675. goto SEND_RETRY;
  1676. }
  1677. if ((start + RADIUS_RETRY_TIMEOUT) < now)
  1678. {
  1679. // Time-out
  1680. break;
  1681. }
  1682. InitSockSet(&set);
  1683. AddSockSet(&set, sock);
  1684. Select(&set, (UINT)(next_send_time - now), NULL, NULL);
  1685. recv_size = RecvFrom(sock, LIST_DATA(ip_list, pos), &server_port, recv_buf, recv_buf_size);
  1686. if (recv_size == 0)
  1687. {
  1688. Debug("Radius recv_size 0\n");
  1689. finish[pos] = TRUE;
  1690. for(i = 0; i < LIST_NUM(ip_list); i++)
  1691. {
  1692. if(finish[i] == FALSE)
  1693. {
  1694. // Switch the host to refer
  1695. pos++;
  1696. pos = pos % LIST_NUM(ip_list);
  1697. goto SEND_RETRY;
  1698. }
  1699. }
  1700. // Failure
  1701. break;
  1702. }
  1703. else if (recv_size == SOCK_LATER)
  1704. {
  1705. // Waiting
  1706. goto RECV_RETRY;
  1707. }
  1708. else
  1709. {
  1710. // Check such as the IP address
  1711. if (/*Cmp(&server_ip, &ip, sizeof(IP)) != 0 || */server_port != port)
  1712. {
  1713. goto RECV_RETRY;
  1714. }
  1715. // Success
  1716. if (recv_buf[0] == 2)
  1717. {
  1718. ret = true;
  1719. if (is_mschap && mschap_v2_server_response_20 != NULL)
  1720. {
  1721. // Cutting corners Zurukko
  1722. UCHAR signature[] = {0x1A, 0x33, 0x00, 0x00, 0x01, 0x37, 0x1A, 0x2D, 0x00, 0x53, 0x3D, };
  1723. UINT i = SearchBin(recv_buf, 0, recv_buf_size, signature, sizeof(signature));
  1724. if (i == INFINITE || ((i + sizeof(signature) + 40) > recv_buf_size))
  1725. {
  1726. ret = false;
  1727. }
  1728. else
  1729. {
  1730. char tmp[MAX_SIZE];
  1731. BUF *b;
  1732. Zero(tmp, sizeof(tmp));
  1733. Copy(tmp, recv_buf + i + sizeof(signature), 40);
  1734. b = StrToBin(tmp);
  1735. if (b != NULL && b->Size == 20)
  1736. {
  1737. WHERE;
  1738. Copy(mschap_v2_server_response_20, b->Buf, 20);
  1739. }
  1740. else
  1741. {
  1742. WHERE;
  1743. ret = false;
  1744. }
  1745. FreeBuf(b);
  1746. }
  1747. }
  1748. if (opt->In_CheckVLanId)
  1749. {
  1750. BUF *buf = NewBufFromMemory(recv_buf, recv_size);
  1751. LIST *o = RadiusParseOptions(buf);
  1752. if (o != NULL)
  1753. {
  1754. DHCP_OPTION *vlan_option = GetDhcpOption(o, RADIUS_ATTRIBUTE_VLAN_ID);
  1755. if (vlan_option != NULL)
  1756. {
  1757. UINT vlan_id = 0;
  1758. char tmp[32];
  1759. Zero(tmp, sizeof(tmp));
  1760. Copy(tmp, vlan_option->Data, MIN(vlan_option->Size, sizeof(tmp) - 1));
  1761. vlan_id = ToInt(tmp);
  1762. opt->Out_VLanId = vlan_id;
  1763. }
  1764. }
  1765. FreeBuf(buf);
  1766. FreeDhcpOptions(o);
  1767. }
  1768. }
  1769. break;
  1770. }
  1771. }
  1772. Free(finish);
  1773. // Release the socket
  1774. ReleaseSock(sock);
  1775. FreeBuf(p);
  1776. FreeBuf(user_password);
  1777. Free(recv_buf);
  1778. }
  1779. FreeBuf(nas_id);
  1780. FreeBuf(user_name);
  1781. }
  1782. // Release the ip_list
  1783. for(i = 0; i < LIST_NUM(ip_list); i++)
  1784. {
  1785. IP *tmp_ip = LIST_DATA(ip_list, i);
  1786. Free(tmp_ip);
  1787. }
  1788. ReleaseList(ip_list);
  1789. // Release the memory
  1790. FreeBuf(encrypted_password);
  1791. return ret;
  1792. }
  1793. // Parse RADIUS attributes
  1794. LIST *RadiusParseOptions(BUF *b)
  1795. {
  1796. LIST *o;
  1797. UCHAR code;
  1798. UCHAR id;
  1799. USHORT len;
  1800. UCHAR auth[16];
  1801. // Validate arguments
  1802. if (b == NULL)
  1803. {
  1804. return NULL;
  1805. }
  1806. o = NewList(NULL);
  1807. ReadBuf(b, &code, 1);
  1808. ReadBuf(b, &id, 1);
  1809. len = 0;
  1810. ReadBuf(b, &len, 2);
  1811. len = Endian16(len);
  1812. ReadBuf(b, auth, 16);
  1813. while (true)
  1814. {
  1815. UCHAR attribute_id;
  1816. UCHAR size;
  1817. UCHAR data[256];
  1818. DHCP_OPTION *d;
  1819. if (ReadBuf(b, &attribute_id, 1) != 1)
  1820. {
  1821. break;
  1822. }
  1823. if (ReadBuf(b, &size, 1) != 1)
  1824. {
  1825. break;
  1826. }
  1827. if (size <= 2)
  1828. {
  1829. break;
  1830. }
  1831. size -= 2;
  1832. if (ReadBuf(b, data, size) != size)
  1833. {
  1834. break;
  1835. }
  1836. d = ZeroMalloc(sizeof(DHCP_OPTION));
  1837. d->Id = attribute_id;
  1838. d->Size = size;
  1839. d->Data = Clone(data, d->Size);
  1840. Add(o, d);
  1841. }
  1842. return o;
  1843. }
  1844. // Adding Attributes
  1845. void RadiusAddValue(BUF *b, UCHAR t, UINT v, UCHAR vt, void *data, UINT size)
  1846. {
  1847. UINT len;
  1848. // Validate arguments
  1849. if (b == NULL || (data == NULL && size != 0))
  1850. {
  1851. return;
  1852. }
  1853. // type
  1854. WriteBufChar(b, t);
  1855. // length
  1856. len = 2 + size;
  1857. if (t == 26)
  1858. {
  1859. len += 6;
  1860. }
  1861. WriteBufChar(b, (UCHAR)len);
  1862. if (t != 26)
  1863. {
  1864. // value
  1865. WriteBuf(b, data, size);
  1866. }
  1867. else
  1868. {
  1869. // vendor
  1870. WriteBufInt(b, v);
  1871. // vendor type
  1872. WriteBufChar(b, vt);
  1873. // length2
  1874. len = size + 2;
  1875. WriteBufChar(b, (UCHAR)len);
  1876. // value
  1877. WriteBuf(b, data, size);
  1878. }
  1879. }
  1880. // Create a password attribute for Radius
  1881. BUF *RadiusCreateUserPassword(void *data, UINT size)
  1882. {
  1883. BUF *b;
  1884. UCHAR code, sz;
  1885. // Validate arguments
  1886. if (size != 0 && data == NULL || size >= 253)
  1887. {
  1888. return NULL;
  1889. }
  1890. b = NewBuf();
  1891. code = 2;
  1892. sz = 2 + (UCHAR)size;
  1893. WriteBuf(b, &code, 1);
  1894. WriteBuf(b, &sz, 1);
  1895. WriteBuf(b, data, size);
  1896. return b;
  1897. }
  1898. // Generate an ID attribute of Nas
  1899. BUF *RadiusCreateNasId(char *name)
  1900. {
  1901. BUF *b;
  1902. UCHAR code, size;
  1903. // Validate arguments
  1904. if (name == NULL)
  1905. {
  1906. return NULL;
  1907. }
  1908. if (StrLen(name) == 0 || StrLen(name) >= 128)
  1909. {
  1910. return NULL;
  1911. }
  1912. b = NewBuf();
  1913. code = 32;
  1914. size = 2 + (UCHAR)StrLen(name);
  1915. WriteBuf(b, &code, 1);
  1916. WriteBuf(b, &size, 1);
  1917. WriteBuf(b, name, StrLen(name));
  1918. return b;
  1919. }
  1920. // Create a user name attribute for Radius
  1921. BUF *RadiusCreateUserName(wchar_t *username)
  1922. {
  1923. BUF *b;
  1924. UCHAR code, size;
  1925. UCHAR utf8[254];
  1926. // Validate arguments
  1927. if (username == NULL)
  1928. {
  1929. return NULL;
  1930. }
  1931. // Convert the user name to a Unicode string
  1932. UniToStr(utf8, sizeof(utf8), username);
  1933. utf8[253] = 0;
  1934. b = NewBuf();
  1935. code = 1;
  1936. size = 2 + (UCHAR)StrLen(utf8);
  1937. WriteBuf(b, &code, 1);
  1938. WriteBuf(b, &size, 1);
  1939. WriteBuf(b, utf8, StrLen(utf8));
  1940. return b;
  1941. }
  1942. // Encrypt the password for the Radius
  1943. BUF *RadiusEncryptPassword(char *password, UCHAR *random, UCHAR *secret, UINT secret_size)
  1944. {
  1945. UINT n, i;
  1946. BUF *buf;
  1947. UCHAR c[16][16]; // Result
  1948. UCHAR b[16][16]; // Result
  1949. UCHAR p[16][16]; // Password
  1950. // Validate arguments
  1951. if (password == NULL || random == NULL || (secret_size != 0 && secret == NULL))
  1952. {
  1953. return NULL;
  1954. }
  1955. if (StrLen(password) > 256)
  1956. {
  1957. // Password is too long
  1958. return NULL;
  1959. }
  1960. // Initialize
  1961. Zero(c, sizeof(c));
  1962. Zero(p, sizeof(p));
  1963. Zero(b, sizeof(b));
  1964. // Divide the password per 16 characters
  1965. Copy(p, password, StrLen(password));
  1966. // Calculate the number of blocks
  1967. n = StrLen(password) / 16;
  1968. if ((StrLen(password) % 16) != 0)
  1969. {
  1970. n++;
  1971. }
  1972. // Encryption processing
  1973. for (i = 0;i < n;i++)
  1974. {
  1975. // Calculation of b[i]
  1976. UINT j;
  1977. BUF *tmp = NewBuf();
  1978. WriteBuf(tmp, secret, secret_size);
  1979. if (i == 0)
  1980. {
  1981. WriteBuf(tmp, random, 16);
  1982. }
  1983. else
  1984. {
  1985. WriteBuf(tmp, c[i - 1], 16);
  1986. }
  1987. Hash(b[i], tmp->Buf, tmp->Size, false);
  1988. FreeBuf(tmp);
  1989. // Calculation of c[i]
  1990. for (j = 0;j < 16;j++)
  1991. {
  1992. c[i][j] = p[i][j] ^ b[i][j];
  1993. }
  1994. }
  1995. // Return the results
  1996. buf = NewBuf();
  1997. WriteBuf(buf, c, n * 16);
  1998. return buf;
  1999. }