2 * Copyright (c) 1996 - 2001 Brian Somers <brian@Awfulhak.org>
3 * based on work by Toshiharu OHNO <tony-o@iij.ad.jp>
4 * Internet Initiative Japan, Inc (IIJ)
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
16 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
17 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
20 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 #include <sys/param.h>
32 #include <netinet/in.h>
33 #include <netinet/in_systm.h>
34 #include <netinet/ip.h>
35 #include <sys/socket.h>
51 #include "throughput.h"
52 #include "slcompress.h"
63 #include "descriptor.h"
81 Auth2Nam(u_short auth, u_char type)
89 snprintf(chap, sizeof chap, "CHAP 0x%02x", type);
98 auth_CheckPasswd(const char *name, const char *data, const char *key)
100 if (!strcmp(data, "*")) {
101 /* Then look up the real password database */
105 result = (pw = getpwnam(name)) &&
106 !strcmp(crypt(key, pw->pw_passwd), pw->pw_passwd);
111 return !strcmp(data, key);
115 auth_SetPhoneList(const char *name, char *phone, int phonelen)
119 char *vector[6], buff[LINE_LEN];
122 fp = OpenSecret(SECRETFILE);
126 while (fgets(buff, sizeof buff, fp)) {
130 buff[strlen(buff) - 1] = '\0';
131 memset(vector, '\0', sizeof vector);
132 if ((n = MakeArgs(buff, vector, VECSIZE(vector), PARSE_REDUCE)) < 0)
133 log_Printf(LogWARN, "%s: %d: Invalid line\n", SECRETFILE, lineno);
136 if (strcmp(vector[0], name) == 0) {
138 if (*vector[4] == '\0')
140 strncpy(phone, vector[4], phonelen - 1);
141 phone[phonelen - 1] = '\0';
142 return 1; /* Valid */
146 if ((slash = strrchr(name, '\\')) != NULL && slash[1]) {
147 /* Look for the name without the leading domain */
160 auth_Select(struct bundle *bundle, const char *name)
164 char *vector[5], buff[LINE_LEN];
168 ipcp_Setup(&bundle->ncp.ipcp, INADDR_NONE);
173 if (bundle->radius.valid && bundle->radius.ip.s_addr != INADDR_NONE) {
174 /* We've got a radius IP - it overrides everything */
175 if (!ipcp_UseHisIPaddr(bundle, bundle->radius.ip))
177 ipcp_Setup(&bundle->ncp.ipcp, bundle->radius.mask.s_addr);
178 /* Continue with ppp.secret in case we've got a new label */
182 fp = OpenSecret(SECRETFILE);
186 while (fgets(buff, sizeof buff, fp)) {
190 buff[strlen(buff) - 1] = '\0';
191 memset(vector, '\0', sizeof vector);
192 if ((n = MakeArgs(buff, vector, VECSIZE(vector), PARSE_REDUCE)) < 0)
193 log_Printf(LogWARN, "%s: %d: Invalid line\n", SECRETFILE, lineno);
196 if (strcmp(vector[0], name) == 0) {
199 if (!bundle->radius.valid || bundle->radius.ip.s_addr == INADDR_NONE) {
201 if (n > 2 && *vector[2] && strcmp(vector[2], "*") &&
202 !ipcp_UseHisaddr(bundle, vector[2], 1))
204 ipcp_Setup(&bundle->ncp.ipcp, INADDR_NONE);
208 if (n > 3 && *vector[3] && strcmp(vector[3], "*"))
209 bundle_SetLabel(bundle, vector[3]);
210 return 1; /* Valid */
214 if ((slash = strrchr(name, '\\')) != NULL && slash[1]) {
215 /* Look for the name without the leading domain */
225 /* Let 'em in anyway - they must have been in the passwd file */
226 ipcp_Setup(&bundle->ncp.ipcp, INADDR_NONE);
230 if (bundle->radius.valid)
234 /* Disappeared from ppp.secret ??? */
240 auth_Validate(struct bundle *bundle, const char *name,
241 const char *key, struct physical *physical)
243 /* Used by PAP routines */
247 char *vector[5], buff[LINE_LEN];
250 fp = OpenSecret(SECRETFILE);
254 while (fgets(buff, sizeof buff, fp)) {
258 buff[strlen(buff) - 1] = 0;
259 memset(vector, '\0', sizeof vector);
260 if ((n = MakeArgs(buff, vector, VECSIZE(vector), PARSE_REDUCE)) < 0)
261 log_Printf(LogWARN, "%s: %d: Invalid line\n", SECRETFILE, lineno);
264 if (strcmp(vector[0], name) == 0) {
266 return auth_CheckPasswd(name, vector[1], key);
271 if ((slash = strrchr(name, '\\')) != NULL && slash[1]) {
272 /* Look for the name without the leading domain */
284 if (Enabled(bundle, OPT_PASSWDAUTH))
285 return auth_CheckPasswd(name, "*", key);
288 return 0; /* Invalid */
292 auth_GetSecret(struct bundle *bundle, const char *name, int len,
293 struct physical *physical)
295 /* Used by CHAP routines */
301 static char buff[LINE_LEN]; /* vector[] will point here when returned */
303 fp = OpenSecret(SECRETFILE);
309 while (fgets(buff, sizeof buff, fp)) {
313 n = strlen(buff) - 1;
315 buff[n] = '\0'; /* Trim the '\n' */
316 memset(vector, '\0', sizeof vector);
317 if ((n = MakeArgs(buff, vector, VECSIZE(vector), PARSE_REDUCE)) < 0)
318 log_Printf(LogWARN, "%s: %d: Invalid line\n", SECRETFILE, lineno);
321 if (strlen(vector[0]) == len && strncmp(vector[0], name, len) == 0) {
327 if ((slash = strrchr(name, '\\')) != NULL && slash[1]) {
328 /* Go back and look for the name without the leading domain */
329 len -= slash - name + 1;
336 return (NULL); /* Invalid */
340 AuthTimeout(void *vauthp)
342 struct authinfo *authp = (struct authinfo *)vauthp;
344 timer_Stop(&authp->authtimer);
345 if (--authp->retry > 0) {
347 (*authp->fn.req)(authp);
348 timer_Start(&authp->authtimer);
350 log_Printf(LogPHASE, "Auth: No response from server\n");
351 datalink_AuthNotOk(authp->physical->dl);
356 auth_Init(struct authinfo *authp, struct physical *p, auth_func req,
357 auth_func success, auth_func failure)
359 memset(authp, '\0', sizeof(struct authinfo));
360 authp->cfg.fsm.timeout = DEF_FSMRETRY;
361 authp->cfg.fsm.maxreq = DEF_FSMAUTHTRIES;
362 authp->cfg.fsm.maxtrm = 0; /* not used */
364 authp->fn.success = success;
365 authp->fn.failure = failure;
370 auth_StartReq(struct authinfo *authp)
372 timer_Stop(&authp->authtimer);
373 authp->authtimer.func = AuthTimeout;
374 authp->authtimer.name = "auth";
375 authp->authtimer.load = authp->cfg.fsm.timeout * SECTICKS;
376 authp->authtimer.arg = (void *)authp;
377 authp->retry = authp->cfg.fsm.maxreq;
379 (*authp->fn.req)(authp);
380 timer_Start(&authp->authtimer);
384 auth_StopTimer(struct authinfo *authp)
386 timer_Stop(&authp->authtimer);
390 auth_ReadHeader(struct authinfo *authp, struct mbuf *bp)
395 if (len >= sizeof authp->in.hdr) {
396 bp = mbuf_Read(bp, (u_char *)&authp->in.hdr, sizeof authp->in.hdr);
397 if (len >= ntohs(authp->in.hdr.length))
399 authp->in.hdr.length = htons(0);
400 log_Printf(LogWARN, "auth_ReadHeader: Short packet (%d > %d) !\n",
401 ntohs(authp->in.hdr.length), len);
403 authp->in.hdr.length = htons(0);
404 log_Printf(LogWARN, "auth_ReadHeader: Short packet header (%d > %d) !\n",
405 (int)(sizeof authp->in.hdr), len);
413 auth_ReadName(struct authinfo *authp, struct mbuf *bp, int len)
415 if (len > sizeof authp->in.name - 1)
416 log_Printf(LogWARN, "auth_ReadName: Name too long (%d) !\n", len);
418 int mlen = m_length(bp);
421 log_Printf(LogWARN, "auth_ReadName: Short packet (%d > %d) !\n",
424 bp = mbuf_Read(bp, (u_char *)authp->in.name, len);
425 authp->in.name[len] = '\0';
430 *authp->in.name = '\0';