mirror of
				https://github.com/3proxy/3proxy.git
				synced 2025-11-04 07:42:39 +08:00 
			
		
		
		
	RADIUS accounting added (not optimized yet)
This commit is contained in:
		
							parent
							
								
									8702a4c7ab
								
							
						
					
					
						commit
						4a553de100
					
				
							
								
								
									
										106
									
								
								src/authradius.c
									
									
									
									
									
								
							
							
						
						
									
										106
									
								
								src/authradius.c
									
									
									
									
									
								
							@ -198,6 +198,9 @@ void md5_calc(unsigned char *output, unsigned char *input,
 | 
			
		||||
 | 
			
		||||
static uint8_t random_vector_pool[AUTH_VECTOR_LEN*2];
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
static int calc_replydigest(char *packet, char *original, const char *secret, int len)
 | 
			
		||||
{
 | 
			
		||||
	int		secretlen;
 | 
			
		||||
@ -295,7 +298,7 @@ typedef struct radius_packet_t {
 | 
			
		||||
          
 | 
			
		||||
#define RETURN(xxx) { res = xxx; goto CLEANRET; }
 | 
			
		||||
 | 
			
		||||
int radsend(struct clientparam * param, int auth){
 | 
			
		||||
int radsend(struct clientparam * param, int auth, int stop){
 | 
			
		||||
 | 
			
		||||
	int loop;
 | 
			
		||||
	int id;
 | 
			
		||||
@ -320,6 +323,7 @@ int radsend(struct clientparam * param, int auth){
 | 
			
		||||
	uint8_t *attr;
 | 
			
		||||
	long vendor=0;
 | 
			
		||||
	int vendorlen=0;
 | 
			
		||||
	char buf[64];
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
	if(!radiussecret || !nradservers) {
 | 
			
		||||
@ -328,28 +332,34 @@ int radsend(struct clientparam * param, int auth){
 | 
			
		||||
 | 
			
		||||
	memset(&packet, 0, sizeof(packet));
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
	pthread_mutex_lock(&rad_mutex);
 | 
			
		||||
	random_vector(packet.vector, param);
 | 
			
		||||
	if(auth)random_vector(packet.vector, param);
 | 
			
		||||
 | 
			
		||||
	id = ((ntry++) & 0xff);
 | 
			
		||||
	pthread_mutex_unlock(&rad_mutex);
 | 
			
		||||
 | 
			
		||||
	packet.code = PW_AUTHENTICATION_REQUEST;
 | 
			
		||||
	packet.code = auth?PW_AUTHENTICATION_REQUEST:PW_ACCOUNTING_REQUEST;
 | 
			
		||||
	packet.id=id;
 | 
			
		||||
	ptr = packet.data;
 | 
			
		||||
	total_length = 0;
 | 
			
		||||
 | 
			
		||||
	md5_calc(packet.vector, packet.vector,
 | 
			
		||||
			sizeof(packet.vector));
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
	/* Service Type */
 | 
			
		||||
	*ptr++ =  PW_SERVICE_TYPE;
 | 
			
		||||
	*ptr++ =  auth?PW_SERVICE_TYPE:PW_ACCT_STATUS_TYPE;
 | 
			
		||||
	*ptr++ = 6;
 | 
			
		||||
	(*(uint32_t *)ptr)=htonl(PW_AUTHENTICATE_ONLY);
 | 
			
		||||
	(*(uint32_t *)ptr)=htonl(auth?PW_AUTHENTICATE_ONLY:stop?PW_STATUS_STOP:PW_STATUS_START);
 | 
			
		||||
	ptr+=4;
 | 
			
		||||
	total_length+=6;
 | 
			
		||||
 | 
			
		||||
	/* Acct-Session-Id */
 | 
			
		||||
	sprintf(buf, "%u.%u.%u", (unsigned)param->time_start, (unsigned)param->msec_start, (unsigned)param->threadid);
 | 
			
		||||
        len = strlen(buf);
 | 
			
		||||
	*ptr++ =  PW_ACCT_SESSION_ID;
 | 
			
		||||
	*ptr++ = 2+len;
 | 
			
		||||
	memcpy(ptr, buf, len);
 | 
			
		||||
	ptr+=len;
 | 
			
		||||
	total_length+=len+2;
 | 
			
		||||
 | 
			
		||||
	/* NAS-Port-Type */
 | 
			
		||||
	*ptr++ =  PW_NAS_PORT_TYPE;
 | 
			
		||||
	*ptr++ = 6;
 | 
			
		||||
@ -459,7 +469,40 @@ int radsend(struct clientparam * param, int auth){
 | 
			
		||||
	    total_length += (len+2);
 | 
			
		||||
	}
 | 
			
		||||
	
 | 
			
		||||
	if(param->password){
 | 
			
		||||
	if(stop){
 | 
			
		||||
		/* Acct-Input-Octets */
 | 
			
		||||
		*ptr++ =  PW_ACCT_INPUT_OCTETS;
 | 
			
		||||
		*ptr++ = 6;
 | 
			
		||||
		(*(uint32_t *)ptr)=htonl((uint32_t)param->statssrv64);
 | 
			
		||||
		ptr+=4;
 | 
			
		||||
		total_length+=6;
 | 
			
		||||
		/* Acct-Output-Octets */
 | 
			
		||||
		*ptr++ =  PW_ACCT_OUTPUT_OCTETS;
 | 
			
		||||
		*ptr++ = 6;
 | 
			
		||||
		(*(uint32_t *)ptr)=htonl((uint32_t)param->statscli64);
 | 
			
		||||
		ptr+=4;
 | 
			
		||||
		total_length+=6;
 | 
			
		||||
		/* Acct-Input-Packets */
 | 
			
		||||
		*ptr++ =  PW_ACCT_INPUT_PACKETS;
 | 
			
		||||
		*ptr++ = 6;
 | 
			
		||||
		(*(uint32_t *)ptr)=htonl((uint32_t)param->nreads);
 | 
			
		||||
		ptr+=4;
 | 
			
		||||
		total_length+=6;
 | 
			
		||||
		/* Acct-Output-Packets */
 | 
			
		||||
		*ptr++ =  PW_ACCT_OUTPUT_PACKETS;
 | 
			
		||||
		*ptr++ = 6;
 | 
			
		||||
		(*(uint32_t *)ptr)=htonl((uint32_t)param->nwrites);
 | 
			
		||||
		ptr+=4;
 | 
			
		||||
		total_length+=6;
 | 
			
		||||
		/* Acct-Session-Time */
 | 
			
		||||
		*ptr++ =  PW_ACCT_SESSION_TIME;
 | 
			
		||||
		*ptr++ = 6;
 | 
			
		||||
		(*(uint32_t *)ptr)=htonl((uint32_t)(time(0) - param->time_start));
 | 
			
		||||
		ptr+=4;
 | 
			
		||||
		total_length+=6;
 | 
			
		||||
	}
 | 
			
		||||
	
 | 
			
		||||
	if(auth && param->password){
 | 
			
		||||
    	    len = strlen(param->password);
 | 
			
		||||
	    if(len > 128) len = 128;
 | 
			
		||||
	    *ptr++ = PW_PASSWORD;
 | 
			
		||||
@ -473,9 +516,15 @@ int radsend(struct clientparam * param, int auth){
 | 
			
		||||
	    ptr+=len;
 | 
			
		||||
	    total_length+= (len+2);
 | 
			
		||||
	}
 | 
			
		||||
	
 | 
			
		||||
 | 
			
		||||
	total_length+=(4+AUTH_VECTOR_LEN);
 | 
			
		||||
	packet.length = htons(total_length);
 | 
			
		||||
	
 | 
			
		||||
	if(!auth){
 | 
			
		||||
		len = strlen(radiussecret);
 | 
			
		||||
		memcpy(ptr,radiussecret,len);
 | 
			
		||||
		md5_calc(packet.vector, (u_char *)&packet, total_length + len);
 | 
			
		||||
	}
 | 
			
		||||
	memcpy(vector, packet.vector, AUTH_VECTOR_LEN);
 | 
			
		||||
	
 | 
			
		||||
	for (loop = 0; loop < nradservers && loop < MAXRADIUS; loop++) {
 | 
			
		||||
@ -492,15 +541,19 @@ int radsend(struct clientparam * param, int auth){
 | 
			
		||||
			continue;
 | 
			
		||||
		}
 | 
			
		||||
#endif
 | 
			
		||||
		packet.id++;
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
		if(auth) {
 | 
			
		||||
*/
 | 
			
		||||
			if(sockfd >= 0) so._closesocket(sockfd);
 | 
			
		||||
			if ((sockfd = so._socket(SASOCK(&saremote), SOCK_DGRAM, 0)) < 0) {
 | 
			
		||||
			    return 4;
 | 
			
		||||
			}
 | 
			
		||||
			remsock = sockfd;
 | 
			
		||||
/*
 | 
			
		||||
		}
 | 
			
		||||
		else remsock = radiuslist[loop].logsock;
 | 
			
		||||
*/
 | 
			
		||||
		len = so._sendto(remsock, (char *)&packet, total_length, 0,
 | 
			
		||||
		      (struct sockaddr *)&saremote, sizeof(saremote));
 | 
			
		||||
		if(len != ntohs(packet.length)){
 | 
			
		||||
@ -524,10 +577,13 @@ int radsend(struct clientparam * param, int auth){
 | 
			
		||||
			continue;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if( rpacket.code != PW_AUTHENTICATION_ACK &&
 | 
			
		||||
		if( auth && rpacket.code != PW_AUTHENTICATION_ACK &&
 | 
			
		||||
		    rpacket.code != PW_AUTHENTICATION_REJECT ){
 | 
			
		||||
			continue;
 | 
			
		||||
		}
 | 
			
		||||
		if( !auth && rpacket.code != PW_ACCOUNTING_RESPONSE){
 | 
			
		||||
			continue;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if (calc_replydigest((char *)&rpacket, packet.vector, radiussecret,
 | 
			
		||||
			data_len) ){
 | 
			
		||||
@ -539,6 +595,8 @@ int radsend(struct clientparam * param, int auth){
 | 
			
		||||
			continue;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if(!auth) RETURN(0);
 | 
			
		||||
 | 
			
		||||
		attr = rpacket.data;
 | 
			
		||||
		count = total_length - 20;
 | 
			
		||||
		vendor_len = 0;
 | 
			
		||||
@ -575,18 +633,6 @@ int radsend(struct clientparam * param, int auth){
 | 
			
		||||
				for(len = 2; len < attr[1] && isdigit(attr[len]); len++) res = (res * 10) + (attr[len] - '0');
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
			else if (vendor == SANDY && attr[0] == SANDY_MAIL_MAILBOX) {
 | 
			
		||||
				memcpy (p->drop_name, attr + 2, attr[1] - 2);
 | 
			
		||||
			}
 | 
			
		||||
			else if (vendor == SANDY && attr[0] == SANDY_MAIL_MBOXCONTROL) {
 | 
			
		||||
				if (ntohl(*(int *)(attr+2)) & 1) p->dodeletes = 1;
 | 
			
		||||
			}
 | 
			
		||||
			else if (vendor == SANDY && attr[0] == SANDY_MAIL_SERVICE) {
 | 
			
		||||
				mailservice = ntohl(*(int *)(attr+2)) ;
 | 
			
		||||
			}
 | 
			
		||||
*/
 | 
			
		||||
			count -= attr[1];
 | 
			
		||||
			if(vendorlen) {
 | 
			
		||||
				vendorlen -= attr[1];
 | 
			
		||||
@ -610,8 +656,16 @@ CLEANRET:
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
int radauth(struct clientparam * param){
 | 
			
		||||
	return radsend(param, 1);
 | 
			
		||||
	/*radsend(param, 0, 0);*/
 | 
			
		||||
	return radsend(param, 1, 0);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
void logradius(struct clientparam * param, const unsigned char *s) {
 | 
			
		||||
	radsend(param, 0, 1);
 | 
			
		||||
	if(param->trafcountfunc)(*param->trafcountfunc)(param);
 | 
			
		||||
	clearstat(param);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										12
									
								
								src/conf.c
									
									
									
									
									
								
							
							
						
						
									
										12
									
								
								src/conf.c
									
									
									
									
									
								
							@ -327,6 +327,9 @@ static int h_log(int argc, unsigned char ** argv){
 | 
			
		||||
			conf.logfunc = logsql;
 | 
			
		||||
		}
 | 
			
		||||
#endif
 | 
			
		||||
		else if(!strcmp(argv[1],"radius")){
 | 
			
		||||
			conf.logfunc = logradius;
 | 
			
		||||
		}
 | 
			
		||||
		else {
 | 
			
		||||
			FILE *fp;
 | 
			
		||||
			if(argc > 2) {
 | 
			
		||||
@ -1272,13 +1275,15 @@ static int h_delimchar(int argc, unsigned char **argv){
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
static int h_radius(int argc, unsigned char **argv){
 | 
			
		||||
	unsigned short port;
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
	int oldrad;
 | 
			
		||||
#ifdef NOIPV6
 | 
			
		||||
	struct  sockaddr_in bindaddr;
 | 
			
		||||
#else
 | 
			
		||||
	struct  sockaddr_in6 bindaddr;
 | 
			
		||||
#endif
 | 
			
		||||
	unsigned short port;
 | 
			
		||||
 | 
			
		||||
	oldrad = nradservers;
 | 
			
		||||
	nradservers = 0;
 | 
			
		||||
@ -1286,6 +1291,7 @@ static int h_radius(int argc, unsigned char **argv){
 | 
			
		||||
		if(radiuslist[oldrad].logsock >= 0) so._closesocket(radiuslist[oldrad].logsock);
 | 
			
		||||
		radiuslist[oldrad].logsock = -1;
 | 
			
		||||
	}
 | 
			
		||||
*/
 | 
			
		||||
	memset(radiuslist, 0, sizeof(radiuslist));
 | 
			
		||||
	if(strlen(argv[1]) > 63) argv[1][63] = 0;
 | 
			
		||||
	strcpy(radiussecret, argv[1]);
 | 
			
		||||
@ -1294,10 +1300,12 @@ static int h_radius(int argc, unsigned char **argv){
 | 
			
		||||
		if(!*SAPORT(&radiuslist[nradservers].authaddr))*SAPORT(&radiuslist[nradservers].authaddr) = htons(1812);
 | 
			
		||||
		port = ntohs(*SAPORT(&radiuslist[nradservers].authaddr));
 | 
			
		||||
		radiuslist[nradservers].logaddr = radiuslist[nradservers].authaddr;
 | 
			
		||||
 	        *SAPORT(&radiuslist[nradservers].logaddr) = htons(port);
 | 
			
		||||
 	        *SAPORT(&radiuslist[nradservers].logaddr) = htons(port+1);
 | 
			
		||||
/*
 | 
			
		||||
		bindaddr = conf.intsa;
 | 
			
		||||
		if ((radiuslist[nradservers].logsock = so._socket(SASOCK(&radiuslist[nradservers].logaddr), SOCK_DGRAM, 0)) < 0) return 2;
 | 
			
		||||
		if (so._bind(radiuslist[nradservers].logsock, (struct sockaddr *)&bindaddr, SASIZE(&bindaddr))) return 3;
 | 
			
		||||
*/
 | 
			
		||||
	}
 | 
			
		||||
	return 0;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@ -520,6 +520,7 @@ static void * ef_server_childcount(struct node * node){
 | 
			
		||||
 | 
			
		||||
static void * ef_server_log(struct node * node){
 | 
			
		||||
	if(((struct srvparam *)node->value) -> logfunc == lognone)	return "none";
 | 
			
		||||
	else if(((struct srvparam *)node->value) -> logfunc == logradius)	return "radius";
 | 
			
		||||
	else if(((struct srvparam *)node->value) -> logfunc == logstdout)
 | 
			
		||||
		return (((struct srvparam *)node->value) -> logtarget)?"file":"stdout";
 | 
			
		||||
#ifndef _WIN32
 | 
			
		||||
 | 
			
		||||
@ -177,6 +177,8 @@ extern FILE * stdlog;
 | 
			
		||||
void logstdout(struct clientparam * param, const unsigned char *s);
 | 
			
		||||
void logsyslog(struct clientparam * param, const unsigned char *s);
 | 
			
		||||
void lognone(struct clientparam * param, const unsigned char *s);
 | 
			
		||||
void logradius(struct clientparam * param, const unsigned char *s);
 | 
			
		||||
 | 
			
		||||
#ifndef NOSQL
 | 
			
		||||
void logsql(struct clientparam * param, const unsigned char *s);
 | 
			
		||||
int init_sql(char * s);
 | 
			
		||||
@ -339,7 +341,9 @@ extern struct radserver {
 | 
			
		||||
#else
 | 
			
		||||
	struct  sockaddr_in6 authaddr, logaddr;
 | 
			
		||||
#endif
 | 
			
		||||
/*
 | 
			
		||||
	SOCKET logsock;
 | 
			
		||||
*/
 | 
			
		||||
} radiuslist[MAXRADIUS];
 | 
			
		||||
 | 
			
		||||
extern char radiussecret[64];
 | 
			
		||||
 | 
			
		||||
		Loading…
	
		Reference in New Issue
	
	Block a user