tacacs-F4.0.4.28/tac_plus.h (344 lines of code) (raw):
/*
* $Id: tac_plus.h,v 1.55 2009/07/17 16:10:52 heas Exp $
*
* Copyright (c) Facebook, Inc. and its affiliates. All Rights Reserved
* Copyright (c) 1995-1998 by Cisco systems, Inc.
*
* Permission to use, copy, modify, and distribute this software for
* any purpose and without fee is hereby granted, provided that this
* copyright and permission notice appear on all copies of the
* software and supporting documentation, the name of Cisco Systems,
* Inc. not be used in advertising or publicity pertaining to
* distribution of the program without specific prior permission, and
* notice be given in supporting documentation that modification,
* copying and distribution is by permission of Cisco Systems, Inc.
*
* Cisco Systems, Inc. makes no representations about the suitability
* of this software for any purpose. THIS SOFTWARE IS PROVIDED ``AS
* IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
* WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
* FITNESS FOR A PARTICULAR PURPOSE.
*/
#include "config.h"
/* use strerror() if we have one, else sys_errlist[errno] */
#ifndef HAVE_STRERROR
# define strerror(a) sys_errlist[a]
#endif
#ifdef MSCHAP
#define MSCHAP_DIGEST_LEN 49
#endif /* MSCHAP */
#if HAVE_STRING_H
# include <string.h>
#endif
#if HAVE_SYS_TYPES_H
# include <sys/types.h>
#endif
#include <errno.h>
#include <netdb.h>
#include <pwd.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <stdio.h>
#include <sys/ioctl.h>
#include <sys/stat.h>
#include <sys/file.h>
#if TIME_WITH_SYS_TIME
# include <sys/time.h>
# include <time.h>
#else
# if HAVE_SYS_TIME_H
# include <sys/time.h>
# else
# include <time.h>
# endif
#endif
#if HAVE_MALLOC_H
# include <malloc.h>
#endif
#if HAVE_STDLIB_H
# include <stdlib.h>
#endif
#if HAVE_SYSLOG_H
# include <syslog.h>
#else
# include <sys/syslog.h>
#endif
#if HAVE_UTMP_H
# include <utmp.h>
#elif HAVE_UTMPX_H
# include <utmpx.h>
#endif
#include <unistd.h>
#if HAVE_STRINGS_H
# include <strings.h>
#endif
#if HAVE_FCNTL_H
# include <fcntl.h>
#endif
#include "tacacs.h"
#include "pathsl.h"
#include "md5.h"
typedef struct tac_plus_pak_hdr HDR;
/*
* You probably shouldn't be changing much below this line unless you really
* know what you are doing.
*/
#define DOLLARSIGN '$'
/*
* XTACACSP protocol defintions
*/
/*
* This structure describes an authentication method.
* authen_name contains the name of the authentication method.
* authen_func is a pointer to the authentication function.
* authen_method numeric value of authentication method
*/
#define AUTHEN_NAME_SIZE 128
struct authen_type {
char authen_name[AUTHEN_NAME_SIZE];
int (*authen_func)();
int authen_type;
};
/*
* The authen_data structure is the data structure for passing
* information to and from the authentication function
* (authen_type.authen_func).
*/
struct authen_data {
struct identity *NAS_id; /* user identity */
char *server_msg; /* null-terminated output msg */
int server_dlen; /* output data length */
char *server_data; /* output data */
char *client_msg; /* null-terminated input msg a user typed */
int client_dlen; /* input data length */
char *client_data; /* input data */
void *method_data; /* opaque private method data */
int action; /* what's to be done */
int service; /* calling service */
int status; /* Authen status */
int type; /* Authen type */
u_char flags; /* input & output flags fields */
};
/* return values for choose_authen(); */
#define CHOOSE_FAILED -1 /* failed to choose an authentication function */
#define CHOOSE_OK 0 /* successfully chose an authentication function */
#define CHOOSE_GETUSER 1 /* need a username before choosing */
#define CHOOSE_BADTYPE 2 /* Invalid preferred authen function specified */
/*
* This structure is the data structure for passing information to
* and from the authorization function (do_author()).
*/
struct author_data {
struct identity *id; /* user id */
int authen_method; /* authentication method */
#define AUTHEN_METH_NONE 0x01
#define AUTHEN_METH_KRB5 0x02
#define AUTHEN_METH_LINE 0x03
#define AUTHEN_METH_ENABLE 0x04
#define AUTHEN_METH_LOCAL 0x05
#define AUTHEN_METH_TACACSPLUS 0x06
#define AUTHEN_METH_RCMD 0x20
int authen_type; /* authentication type see authen_type */
int service; /* calling service */
char *msg; /* optional NULL-terminated return message */
char *admin_msg; /* optional NULL-terminated admin message */
int status; /* return status */
#define AUTHOR_STATUS_PASS_ADD 0x01
#define AUTHOR_STATUS_PASS_REPL 0x02
#define AUTHOR_STATUS_FAIL 0x10
#define AUTHOR_STATUS_ERROR 0x11
int num_in_args; /* input arg count */
char **input_args; /* input arguments */
int num_out_args; /* output arg cnt */
char **output_args; /* output arguments */
};
#define NAS_PORT_MAX_LEN 255
struct session {
int session_id; /* host specific unique session id */
int aborted; /* have we received an abort flag? */
int seq_no; /* seq. no. of last packet exchanged */
time_t last_exch; /* time of last packet exchange */
int sock; /* socket for this connection */
int flags;
#define SESS_FLAG_ACCTSYSL 0x1 /* syslog accounting records */
#define SESS_NO_SINGLECONN 0x2 /* single-connect not allowed*/
int peerflags; /* header flags from client */
char *key; /* the key */
int keyline; /* line number key was found on */
char *peer; /* name of connected peer */
char *peerip; /* ip of connected peer */
char *cfgfile; /* config file name */
char *acctfile; /* name of accounting file */
char port[NAS_PORT_MAX_LEN+1]; /* For error reporting */
u_char version; /* version of last packet read */
};
extern struct session session; /* the session */
/* Global variables */
extern int console; /* log to console */
extern int debug; /* debugging flag */
extern int facility; /* syslog facility */
extern char *logfile;
extern FILE *ostream; /* for logging to console */
extern int parse_only; /* exit after parsing verbosely */
extern int sendauth_only; /* don't do sendauth */
extern int single; /* do not fork (for debugging) */
extern struct timeval started_at;
extern char *wtmpfile;
extern int wtmpfd;
#define HASH_TAB_SIZE 65539 /* user and group hash table sizes */
struct acct {
u_char flags;
#define TAC_PLUS_ACCT_FLAG_MORE 0x1
#define TAC_PLUS_ACCT_FLAG_START 0x2
#define TAC_PLUS_ACCT_FLAG_STOP 0x4
#define TAC_PLUS_ACCT_FLAG_WATCHDOG 0x8
u_char authen_method;
u_char priv_lvl;
u_char authen_type;
u_char authen_service;
u_char user_len; /* bytes of char data */
u_char port_len; /* bytes of char data */
u_char rem_addr_len; /* bytes of u_char data */
u_char arg_cnt; /* the number of cmd args */
/* one u_char containing size for each arg */
/* char data for args 1 ... n */
};
#define TAC_ACCT_REQ_FIXED_FIELDS_SIZE 9
struct acct_reply {
u_short msg_len;
u_short data_len;
u_char status;
#define TAC_PLUS_ACCT_STATUS_SUCCESS 0x1
#define TAC_PLUS_ACCT_STATUS_ERROR 0x2
#define TAC_PLUS_ACCT_STATUS_FOLLOW 0x21
};
#define TAC_ACCT_REPLY_FIXED_FIELDS_SIZE 5
/* Odds and ends */
#define TAC_PLUS_MAX_ITERATIONS 50
#undef MIN
#define MIN(a,b) ((a)<(b)?(a):(b))
#define STREQ(a,b) (strcmp(a,b)==0)
#define MAX_INPUT_LINE_LEN 255
/* Debugging flags */
#define DEBUG_PARSE_FLAG 2
#define DEBUG_FORK_FLAG 4
#define DEBUG_AUTHOR_FLAG 8
#define DEBUG_AUTHEN_FLAG 16
#define DEBUG_PASSWD_FLAG 32
#define DEBUG_ACCT_FLAG 64
#define DEBUG_CONFIG_FLAG 128
#define DEBUG_PACKET_FLAG 256
#define DEBUG_HEX_FLAG 512
#define DEBUG_MD5_HASH_FLAG 1024
#define DEBUG_XOR_FLAG 2048
#define DEBUG_CLEAN_FLAG 4096
#define DEBUG_SUBST_FLAG 8192
#define DEBUG_PROXY_FLAG 16384
#define DEBUG_MAXSESS_FLAG 32768
#define DEBUG_LOCK_FLAG 65536
#define TAC_IS_USER 1
#define TAC_PLUS_RECURSE 1
#define TAC_PLUS_NORECURSE 0
#define DEFAULT_USERNAME "DEFAULT"
#include "parse.h"
/* Node types */
#define N_arg 50
#define N_optarg 51
#define N_svc_exec 52
#define N_svc_slip 53
#define N_svc_ppp 54
#define N_svc_arap 55
#define N_svc_cmd 56
#define N_permit 57
#define N_deny 58
#define N_svc 59
/* A parse tree node */
typedef struct node {
int type; /* node type (arg, svc, proto) */
void *next; /* pointer to next node in chain */
void *value; /* node value */
void *value1; /* node value */
int dflt; /* default value for node */
int line; /* line number declared on */
} NODE;
typedef union v {
int intval;
void *pval;
} VALUE;
/* acct.c */
void accounting(u_char *);
/* authen.c */
void authen(u_char *);
/* author.c */
void author(u_char *);
/* choose_authen.c */
int choose_authen(struct authen_data *, struct authen_type *);
/* report.c */
void report_string(int, u_char *, int);
void report_hex(int, u_char *, int);
#ifdef __STDC__
void report(int priority, char *fmt, ...);
#else
void report();
#endif
/* utils.c */
RETSIGTYPE tac_exit(int);
int tac_lockfd(char *, int);
char *tac_malloc(int);
char *tac_strdup(char *);
char *tac_make_string(u_char *, int);
char *tac_find_substring(char *, char *);
char *tac_realloc(char *, int);
/* do_acct.c */
int do_acct_file(struct acct_rec *);
int do_acct_syslog(struct acct_rec *);
int do_wtmp(struct acct_rec *);
/* do_author.c */
int do_author(struct author_data *);
/* dump.c */
void dump_header(u_char *);
void dump_nas_pak(u_char *);
void dump_tacacs_pak(u_char *);
char *summarise_outgoing_packet_type(u_char *);
char *summarise_incoming_packet_type(u_char *);
/* hash.c */
struct entry;
void *hash_add_entry(void **, struct entry *);
void *hash_update_entry(void**, struct entry *);
void *hash_delete_entry(void**, char *);
void **hash_get_entries(void **);
void *hash_lookup(void **, char *);
/* client_count.c */
void client_count_init(void);
int get_client_count(char* client_ip);
int increment_client_count(char*);
int decrement_client_count(char*);
int decrement_client_count_for_proc(pid_t);
int increment_client_count_for_proc(pid_t, char *);
void remove_client_entry(char*);
void remove_proc_entry(char*);
void create_proc_client_map(pid_t, char*);
void delete_proc_client_map(pid_t);
void dump_client_tables();
struct client_st {
char *name; /* host name */
void *hash; /* hash table next pointer */
int con_count; /* count of connections from this peer */
};
typedef struct client_st CLIENT;
struct proc_st {
char *name; /* host name */
void *hash; /* hash table next pointer */
char *client_ip; /* client ipv4 or ipv6 address */
};
typedef struct proc_st PROC_CLIENT;
/* config.c */
#ifdef ACLS
int cfg_acl_check(char *, char *);
#endif
void cfg_clean_config(void);
char *cfg_get_arap_secret(char *, int);
char *cfg_get_authen_default(void);
char *cfg_get_chap_secret(char *, int);
NODE *cfg_get_cmd_node(char *, char *, int);
#ifdef UENABLE
char *cfg_get_enable_secret(char *, int);
int cfg_get_user_noenablepwd(char *, int);
#endif
char *cfg_get_expires(char *, int);
int cfg_get_intvalue(char *, int, int, int);
char *cfg_get_phvalue(char *, int);
char *cfg_get_pvalue(char *, int, int, int);
char *cfg_get_global_secret(char *, int);
char *cfg_get_host_enable(char *);
char *cfg_get_host_key(char *);
#ifdef UENABLE
int cfg_get_host_noenablepwd(char *);
#endif
char *cfg_get_host_prompt(char *);
char *cfg_get_login_secret(char *, int);
#ifdef MSCHAP
char *cfg_get_mschap_secret(char *, int);
#endif
char *cfg_get_opap_secret(char *, int);
char *cfg_get_pap_secret(char *, int);
char **cfg_get_svc_attrs(NODE *, int *);
NODE *cfg_get_svc_node(char *, int, char *, char *, int);
int cfg_get_user_nopasswd(char *, int);
char *cfg_nodestring(int);
int cfg_ppp_is_configured(char *, int);
int cfg_read_config(char *);
int cfg_user_exists(char *);
int cfg_user_svc_default_is_permit(char *);
/* default_fn.c */
int default_fn(struct authen_data *);
#ifdef MSCHAP
void mschap_lmchallengeresponse(char *, char *, char *);
void mschap_ntchallengeresponse(char *, char *, char *);
#endif
void pw_bitshift(char *);
int verify_host(char *, struct authen_data *, int, int);
/* enable.c */
int verify(char *, char *, struct authen_data *, int);
int verify_pwd(char *, char *, struct authen_data *, char *);
/* encrypt.c */
int md5_xor(HDR *, u_char *, char *);
/* packet.c */
u_char *get_authen_continue(void);
void send_acct_reply(u_char, char *, char *);
void send_authen_error(char *);
void send_authen_reply(int, char *, u_short, char *, u_short, u_char);
void send_author_reply(u_char, char *, char *, int, char **);
void send_error_reply(int, char *);
u_char *read_packet(void);
/* parse.c */
char *codestring(int);
int keycode(char *);
void parser_init(void);
/* programs.c */
int call_pre_process(char *, struct author_data *, char ***, int *, char *,
int);
int call_post_process(char *, struct author_data *, char ***, int *);
/* pw.c */
struct passwd *tac_passwd_lookup(char *, char *);
/* pwlib.c */
void set_expiration_status(char *, struct authen_data *);
int verify(char *, char *, struct authen_data *, int);
int verify_pwd(char *, char *, struct authen_data *, char *);
int aceclnt_fn(struct authen_data *data);
int default_v0_fn(struct authen_data *data);
int enable_fn(struct authen_data *data);
int sendauth_fn(struct authen_data *data);
int sendpass_fn(struct authen_data *data);
int skey_fn(struct authen_data *data);
/* tac_plus.c */
void open_logfile(void);
int maxsess_check_count(char *, struct author_data *);