2 * radclient.c General radius packet debug tool.
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 * Copyright 2000 The FreeRADIUS server project
21 * Copyright 2000 Miquel van Smoorenburg <miquels@cistron.nl>
22 * Copyright 2000 Alan DeKok <aland@ox.org>
24 static const char rcsid[] = "$Id$";
27 #include "libradius.h"
39 #include <sys/socket.h>
41 #ifdef HAVE_NETINET_IN_H
42 # include <netinet/in.h>
45 #ifdef HAVE_SYS_SELECT_H
46 # include <sys/select.h>
59 static int retries = 10;
60 static float timeout = 3;
61 static const char *secret = NULL;
62 static int do_output = 1;
63 static int totalapp = 0;
64 static int totaldeny = 0;
65 static int totallost = 0;
67 static int server_port = 0;
68 static int packet_code = 0;
69 static uint32_t server_ipaddr = 0;
70 static int resend_count = 1;
74 static int radius_id[256];
75 static int last_used_id = 0;
77 static rbtree_t *filename_tree = NULL;
78 static rbtree_t *request_tree = NULL;
80 static int sleep_time = -1;
82 typedef struct radclient_t {
83 struct radclient_t *prev;
84 struct radclient_t *next;
87 int packet_number; /* in the file */
90 RADIUS_PACKET *request;
97 static radclient_t *radclient_head = NULL;
98 static radclient_t *radclient_tail = NULL;
101 static void usage(void)
103 fprintf(stderr, "Usage: radclient [options] server[:port] <command> [<secret>]\n");
105 fprintf(stderr, " <command> One of auth, acct, status, or disconnect.\n");
106 fprintf(stderr, " -c count Send each packet 'count' times.\n");
107 fprintf(stderr, " -d raddb Set dictionary directory.\n");
108 fprintf(stderr, " -f file Read packets from file, not stdin.\n");
109 fprintf(stderr, " -r retries If timeout, retry sending the packet 'retries' times.\n");
110 fprintf(stderr, " -t timeout Wait 'timeout' seconds before retrying (may be a floating point number).\n");
111 fprintf(stderr, " -i id Set request id to 'id'. Values may be 0..255\n");
112 fprintf(stderr, " -S file read secret from file, not command line.\n");
113 fprintf(stderr, " -q Do not print anything out.\n");
114 fprintf(stderr, " -s Print out summary information of auth results.\n");
115 fprintf(stderr, " -v Show program version information.\n");
116 fprintf(stderr, " -x Debugging mode.\n");
122 * Free a radclient struct
124 static void radclient_free(radclient_t *radclient)
126 radclient_t *prev, *next;
128 if (radclient->request) rad_free(&radclient->request);
129 if (radclient->reply) rad_free(&radclient->reply);
131 prev = radclient->prev;
132 next = radclient->next;
135 assert(radclient_head != radclient);
138 assert(radclient_head == radclient);
139 radclient_head = next;
143 assert(radclient_tail != radclient);
146 assert(radclient_tail == radclient);
147 radclient_tail = prev;
154 * Initialize a radclient data structure
156 static radclient_t *radclient_init(const char *filename)
160 radclient_t *start, *radclient, *prev = NULL;
162 int packet_number = 1;
167 * Determine where to read the VP's from.
169 if (filename && (strcmp(filename, "-") != 0)) {
170 fp = fopen(filename, "r");
172 fprintf(stderr, "radclient: Error opening %s: %s\n",
173 filename, strerror(errno));
181 * Loop until the file is done.
187 radclient = malloc(sizeof(*radclient));
189 perror("radclient: ");
190 return NULL; /* memory leak "start" */
192 memset(radclient, 0, sizeof(*radclient));
194 radclient->request = rad_alloc(1);
195 if (!radclient->request) {
196 librad_perror("radclient: ");
197 radclient_free(radclient);
198 return NULL; /* memory leak "start" */
201 radclient->filename = filename;
202 radclient->request->id = -1; /* allocate when sending */
203 radclient->packet_number = packet_number++;
208 radclient->request->vps = readvp2(fp, &filedone, "radclient:");
209 if (!radclient->request->vps) {
210 radclient_free(radclient);
211 return NULL; /* memory leak "start" */
215 * Keep a copy of the the User-Password attribute.
217 if ((vp = pairfind(radclient->request->vps, PW_PASSWORD)) != NULL) {
218 strNcpy(radclient->password, (char *)vp->strvalue, sizeof(vp->strvalue));
220 * Otherwise keep a copy of the CHAP-Password attribute.
222 } else if ((vp = pairfind(radclient->request->vps, PW_CHAP_PASSWORD)) != NULL) {
223 strNcpy(radclient->password, (char *)vp->strvalue, sizeof(vp->strvalue));
225 radclient->password[0] = '\0';
229 * Fix up Digest-Attributes issues
231 for (vp = radclient->request->vps; vp != NULL; vp = vp->next) {
232 switch (vp->attribute) {
237 * Allow it to set the packet type in
238 * the attributes read from the file.
241 radclient->request->code = vp->lvalue;
244 case PW_PACKET_DST_PORT:
245 radclient->request->dst_port = (vp->lvalue & 0xffff);
248 case PW_DIGEST_REALM:
249 case PW_DIGEST_NONCE:
250 case PW_DIGEST_METHOD:
253 case PW_DIGEST_ALGORITHM:
254 case PW_DIGEST_BODY_DIGEST:
255 case PW_DIGEST_CNONCE:
256 case PW_DIGEST_NONCE_COUNT:
257 case PW_DIGEST_USER_NAME:
259 memmove(&vp->strvalue[2], &vp->strvalue[0], vp->length);
260 vp->strvalue[0] = vp->attribute - PW_DIGEST_REALM + 1;
262 vp->strvalue[1] = vp->length;
263 vp->attribute = PW_DIGEST_ATTRIBUTES;
266 } /* loop over the VP's we read in */
272 prev->next = radclient;
273 radclient->prev = prev;
276 } while (!filedone); /* loop until the file is done. */
278 if (fp != stdin) fclose(fp);
288 * Sanity check each argument.
290 static int radclient_sane(radclient_t *radclient)
292 if (radclient->request->dst_port == 0) {
293 radclient->request->dst_port = server_port;
295 radclient->request->dst_ipaddr = server_ipaddr;
297 if (radclient->request->code == 0) {
298 if (packet_code == -1) {
299 fprintf(stderr, "radclient: Request was \"auto\", but request %d in file %s did not contain Packet-Type\n",
300 radclient->packet_number, radclient->filename);
304 radclient->request->code = packet_code;
306 radclient->request->sockfd = sockfd;
313 * For request handline.
315 static int filename_cmp(const void *one, const void *two)
317 return strcmp((const char *) one, (const char *) two);
320 static int filename_walk(void *data)
322 const char *filename = data;
323 radclient_t *radclient;
326 * Initialize the request we're about
329 radclient = radclient_init(filename);
334 if (!radclient_head) {
335 assert(radclient_tail == NULL);
336 radclient_head = radclient;
338 assert(radclient_tail->next == NULL);
339 radclient_tail->next = radclient;
340 radclient->prev = radclient_tail;
344 * We may have had a list of "radclient" structures
347 while (radclient->next) radclient = radclient->next;
348 radclient_tail = radclient;
355 * Compare two RADIUS_PACKET data structures, based on a number
358 static int request_cmp(const void *one, const void *two)
360 const radclient_t *a = one;
361 const radclient_t *b = two;
364 * The following code looks unreasonable, but it's
365 * the only way to make the comparisons work.
367 if (a->request->id < b->request->id) return -1;
368 if (a->request->id > b->request->id) return +1;
370 if (a->request->dst_ipaddr < b->request->dst_ipaddr) return -1;
371 if (a->request->dst_ipaddr > b->request->dst_ipaddr) return +1;
373 if (a->request->dst_port < b->request->dst_port) return -1;
374 if (a->request->dst_port > b->request->dst_port) return +1;
377 * Everything's equal. Say so.
385 static void request_free(void *data)
387 radclient_t *radclient = (radclient_t *) data;
389 if (!radclient || !radclient->request ||
390 (radclient->request->id < 0)) {
395 * One more unused RADIUS ID.
397 radius_id[radclient->request->id] = 0;
398 radclient->request->id = -1;
401 * If we've already sent a packet, free up the old one,
402 * and ensure that the next packet has a unique
403 * authentication vector.
405 if (radclient->request->data) {
406 free(radclient->request->data);
407 radclient->request->data = NULL;
410 if (radclient->reply) rad_free(&radclient->reply);
417 static int send_one_packet(radclient_t *radclient)
422 * Sent this packet as many times as requested.
425 if (radclient->resend >= resend_count) {
431 * Remember when we have to wake up, to re-send the
432 * request, of we didn't receive a response.
434 if ((sleep_time == -1) ||
435 (sleep_time > (int) timeout)) {
436 sleep_time = (int) timeout;
440 * Haven't sent the packet yet. Initialize it.
442 if (radclient->request->id == -1) {
445 assert(radclient->reply == NULL);
448 * Find a free packet Id
450 for (i = 0; i < 256; i++) {
451 if (radius_id[(last_used_id + i) & 0xff] == 0) {
452 last_used_id = (last_used_id + i) & 0xff;
453 radius_id[last_used_id] = 1;
454 radclient->request->id = last_used_id++;
461 * Didn't find a free packet ID, we're not done,
462 * we don't sleep, and we stop trying to process
471 assert(radclient->request->id != -1);
472 assert(radclient->request->data == NULL);
474 librad_md5_calc(radclient->request->vector, radclient->request->vector,
475 sizeof(radclient->request->vector));
478 * Update the password, so it can be encrypted with the
479 * new authentication vector.
481 if (radclient->password[0] != '\0') {
484 if ((vp = pairfind(radclient->request->vps, PW_PASSWORD)) != NULL) {
485 strNcpy((char *)vp->strvalue, radclient->password, strlen(radclient->password) + 1);
486 vp->length = strlen(radclient->password);
488 } else if ((vp = pairfind(radclient->request->vps, PW_CHAP_PASSWORD)) != NULL) {
489 strNcpy((char *)vp->strvalue, radclient->password, strlen(radclient->password) + 1);
490 vp->length = strlen(radclient->password);
492 rad_chap_encode(radclient->request, (char *) vp->strvalue, radclient->request->id, vp);
497 radclient->timestamp = time(NULL);
498 radclient->tries = 1;
502 * Duplicate found. Serious error!
504 if (rbtree_insert(request_tree, radclient) == 0) {
508 } else if (radclient->tries == retries) {
510 assert(radclient->request->id >= 0);
513 * Delete the request from the tree of outstanding
516 node = rbtree_find(request_tree, radclient);
517 assert(node != NULL);
519 fprintf(stderr, "radclient: no response from server for ID %d\n", radclient->request->id);
520 rbtree_delete(request_tree, node);
525 * FIXME: Do stuff for packet loss.
528 } else { /* radclient->request->id >= 0 */
529 time_t now = time(NULL);
532 * FIXME: Accounting packets are never retried!
533 * The Acct-Delay-Time attribute is updated to
534 * reflect the delay, and the packet is re-sent
539 * Not time for a retry, do so.
541 if ((now - radclient->timestamp) < timeout) {
543 * When we walk over the tree sending
544 * packets, we update the minimum time
547 if ((sleep_time == -1) ||
548 (sleep_time > (now - radclient->timestamp))) {
549 sleep_time = now - radclient->timestamp;
554 radclient->timestamp = now;
562 rad_send(radclient->request, NULL, secret);
568 * Receive one packet, maybe.
570 static int recv_one_packet(int wait_time)
574 radclient_t myclient, *radclient;
575 RADIUS_PACKET myrequest, *reply;
579 /* And wait for reply, timing out as necessary */
581 FD_SET(sockfd, &set);
583 if (wait_time <= 0) {
586 tv.tv_sec = wait_time;
591 * No packet was received.
593 if (select(sockfd + 1, &set, NULL, NULL, &tv) != 1) {
598 * Look for the packet.
600 reply = rad_recv(sockfd);
602 fprintf(stderr, "radclient: received bad packet\n");
603 return -1; /* bad packet */
606 myclient.request = &myrequest;
607 myrequest.id = reply->id;
608 myrequest.dst_ipaddr = reply->src_ipaddr;
609 myrequest.dst_port = reply->src_port;
611 node = rbtree_find(request_tree, &myclient);
613 fprintf(stderr, "radclient: received response to request we did not send.\n");
614 return -1; /* got reply to packet we didn't send */
617 radclient = rbtree_node2data(request_tree, node);
618 assert(radclient != NULL);
619 rbtree_delete(request_tree, node);
620 assert(radclient->request->id == -1);
621 assert(radclient->request->data == NULL);
623 assert(radclient->reply == NULL);
624 radclient->reply = reply;
627 * FIXME: Do stuff to process the reply.
629 if (rad_decode(reply, radclient->request, secret) != 0) {
630 librad_perror("rad_decode");
635 /* libradius debug already prints out the value pairs for us */
636 if (!librad_debug && do_output) {
637 printf("Received response ID %d, code %d, length = %d\n",
638 reply->id, reply->code, reply->data_len);
639 vp_printlist(stdout, reply->vps);
641 if (reply->code != PW_AUTHENTICATION_REJECT) {
647 if (radclient->reply) rad_free(&radclient->reply);
653 * Walk over the tree, sending packets.
655 static int radclient_send(radclient_t *radclient)
658 * Send the current packet.
660 send_one_packet(radclient);
663 * Do rad_recv(), and look for the response in the tree,
664 * but don't wait for a response.
669 * Still elements to wa
671 if (radclient->resend < resend_count) {
679 static int getport(const char *name)
683 svp = getservbyname (name, "udp");
688 return ntohs(svp->s_port);
691 int main(int argc, char **argv)
695 const char *radius_dir = RADDBDIR;
696 char filesecret[256];
702 id = ((int)getpid() & 0xff);
705 filename_tree = rbtree_create(filename_cmp, NULL, 0);
706 if (!filename_tree) {
707 fprintf(stderr, "radclient: Out of memory\n");
711 request_tree = rbtree_create(request_cmp, request_free, 0);
713 fprintf(stderr, "radclient: Out of memory\n");
717 while ((c = getopt(argc, argv, "c:d:f:hi:qst:r:S:xv")) != EOF) switch(c) {
719 if (!isdigit((int) *optarg))
721 resend_count = atoi(optarg);
727 rbtree_insert(filename_tree, optarg);
736 if (!isdigit((int) *optarg))
738 retries = atoi(optarg);
741 if (!isdigit((int) *optarg))
744 if ((id < 0) || (id > 255)) {
752 if (!isdigit((int) *optarg))
754 timeout = atof(optarg);
757 printf("radclient: $Id$ built on " __DATE__ " at " __TIME__ "\n");
761 fp = fopen(optarg, "r");
763 fprintf(stderr, "radclient: Error opening %s: %s\n",
764 optarg, strerror(errno));
767 if (fgets(filesecret, sizeof(filesecret), fp) == NULL) {
768 fprintf(stderr, "radclient: Error reading %s: %s\n",
769 optarg, strerror(errno));
774 /* truncate newline */
775 p = filesecret + strlen(filesecret) - 1;
776 while ((p >= filesecret) &&
782 if (strlen(filesecret) < 2) {
783 fprintf(stderr, "radclient: Secret in %s is too short\n", optarg);
793 argc -= (optind - 1);
794 argv += (optind - 1);
797 ((secret == NULL) && (argc < 4))) {
801 if (dict_init(radius_dir, RADIUS_DICTIONARY) < 0) {
802 librad_perror("radclient");
807 * Strip port from hostname if needed.
809 if ((p = strchr(argv[1], ':')) != NULL) {
811 server_port = atoi(p);
817 if ((sockfd = socket(AF_INET, SOCK_DGRAM, 0)) < 0) {
818 perror("radclient: socket: ");
821 memset(radius_id, 0, sizeof(radius_id));
824 * See what kind of request we want to send.
826 if (strcmp(argv[2], "auth") == 0) {
827 if (server_port == 0) server_port = getport("radius");
828 if (server_port == 0) server_port = PW_AUTH_UDP_PORT;
829 packet_code = PW_AUTHENTICATION_REQUEST;
831 } else if (strcmp(argv[2], "acct") == 0) {
832 if (server_port == 0) server_port = getport("radacct");
833 if (server_port == 0) server_port = PW_ACCT_UDP_PORT;
834 packet_code = PW_ACCOUNTING_REQUEST;
837 } else if (strcmp(argv[2], "status") == 0) {
838 if (server_port == 0) server_port = getport("radius");
839 if (server_port == 0) server_port = PW_AUTH_UDP_PORT;
840 packet_code = PW_STATUS_SERVER;
842 } else if (strcmp(argv[2], "disconnect") == 0) {
843 if (server_port == 0) server_port = PW_POD_UDP_PORT;
844 packet_code = PW_DISCONNECT_REQUEST;
846 } else if (strcmp(argv[2], "auto") == 0) {
849 } else if (isdigit((int) argv[2][0])) {
850 if (server_port == 0) server_port = getport("radius");
851 if (server_port == 0) server_port = PW_AUTH_UDP_PORT;
852 packet_code = atoi(argv[2]);
860 server_ipaddr = ip_getaddr(argv[1]);
861 if (server_ipaddr == INADDR_NONE) {
862 fprintf(stderr, "radclient: Failed to find IP address for host %s\n", argv[1]);
869 if (argv[3]) secret = argv[3];
872 * Walk over the list of filenames, creating the requests.
874 if (rbtree_walk(filename_tree, filename_walk, InOrder) != 0) {
879 * No packets read. Die.
881 if (!radclient_head) {
882 fprintf(stderr, "radclient: Nothing to send.\n");
887 * Walk over the list of packets, sanity checking
890 for (this = radclient_head; this != NULL; this = this->next) {
891 if (radclient_sane(this) != 0) {
896 last_used_id = getpid() & 0xff;
899 * Walk over the packets to send, until
902 * FIXME: This currently busy-loops until it receives
903 * all of the packets. It should really have some sort of
904 * send packet, get time to wait, select for time, etc.
909 const char *filename = NULL;
915 * Walk over the packets, sending them.
918 for (this = radclient_head; this != NULL; this = next) {
922 * Packets from multiple '-f' are sent
923 * in parallel. Packets from one file
924 * are sent in series.
926 if (this->filename != filename) {
927 filename = this->filename;
928 radclient_send(this);
930 radclient_free(this);
933 assert(this->done == 0);
934 assert(this->reply == NULL);
940 * Still have outstanding requests.
942 if (rbtree_num_elements(request_tree) > 0) {
949 * Nothing to do until we receive a request, so
950 * sleep until then. Once we receive one packet,
951 * we go back, and walk through the whole list again,
952 * sending more packets (if necessary), and updating
955 if (!done && (sleep_time > 0)) {
956 recv_one_packet(sleep_time);
960 rbtree_free(filename_tree);
961 rbtree_free(request_tree);
964 printf("\n\t Total approved auths: %d\n", totalapp);
965 printf("\t Total denied auths: %d\n", totaldeny);
966 printf("\t Total lost auths: %d\n", totallost);