2 * session.c session management
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
20 * Copyright 2000,2006 The FreeRADIUS server project
23 #include <freeradius-devel/ident.h>
26 #include <freeradius-devel/autoconf.h>
40 #ifdef HAVE_NETINET_IN_H
41 #include <netinet/in.h>
44 #include <freeradius-devel/radiusd.h>
45 #include <freeradius-devel/rad_assert.h>
48 * End a session by faking a Stop packet to all accounting modules.
50 int session_zap(REQUEST *request, uint32_t nasaddr, unsigned int port,
52 const char *sessionid, uint32_t cliaddr, char proto,
56 VALUE_PAIR *vp, *userpair;
59 stopreq = request_alloc_fake(request);
60 stopreq->packet->code = PW_ACCOUNTING_REQUEST; /* just to be safe */
61 rad_assert(stopreq != NULL);
63 /* Hold your breath */
64 #define PAIR(n,v,t,e) do { \
65 if(!(vp = paircreate(n, t))) { \
66 radlog(L_ERR|L_CONS, "no memory"); \
67 pairfree(&(stopreq->packet->vps)); \
71 pairadd(&(stopreq->packet->vps), vp); \
73 #define INTPAIR(n,v) PAIR(n,v,PW_TYPE_INTEGER,lvalue)
74 #define IPPAIR(n,v) PAIR(n,v,PW_TYPE_IPADDR,lvalue)
75 #define STRINGPAIR(n,v) do { \
76 if(!(vp = paircreate(n, PW_TYPE_STRING))) { \
77 radlog(L_ERR|L_CONS, "no memory"); \
78 pairfree(&(stopreq->packet->vps)); \
81 strlcpy((char *)vp->vp_strvalue, v, sizeof vp->vp_strvalue); \
82 vp->length = strlen(v); \
83 pairadd(&(stopreq->packet->vps), vp); \
86 INTPAIR(PW_ACCT_STATUS_TYPE, PW_STATUS_STOP);
87 IPPAIR(PW_NAS_IP_ADDRESS, nasaddr);
88 INTPAIR(PW_ACCT_DELAY_TIME, 0);
89 STRINGPAIR(PW_USER_NAME, user);
91 INTPAIR(PW_NAS_PORT, port);
92 STRINGPAIR(PW_ACCT_SESSION_ID, sessionid);
94 INTPAIR(PW_SERVICE_TYPE, PW_FRAMED_USER);
95 INTPAIR(PW_FRAMED_PROTOCOL, PW_PPP);
96 } else if(proto == 'S') {
97 INTPAIR(PW_SERVICE_TYPE, PW_FRAMED_USER);
98 INTPAIR(PW_FRAMED_PROTOCOL, PW_SLIP);
100 INTPAIR(PW_SERVICE_TYPE, PW_LOGIN_USER); /* A guess, really */
103 IPPAIR(PW_FRAMED_IP_ADDRESS, cliaddr);
104 INTPAIR(PW_ACCT_SESSION_TIME, session_time);
105 INTPAIR(PW_ACCT_INPUT_OCTETS, 0);
106 INTPAIR(PW_ACCT_OUTPUT_OCTETS, 0);
107 INTPAIR(PW_ACCT_INPUT_PACKETS, 0);
108 INTPAIR(PW_ACCT_OUTPUT_PACKETS, 0);
110 stopreq->username = userpair;
111 stopreq->password = NULL;
113 ret = rad_accounting(stopreq);
116 * We've got to clean it up by hand, because no one else will.
118 request_free(&stopreq);
125 * Check one terminal server to see if a user is logged in.
128 * 0 The user is off-line.
129 * 1 The user is logged in.
130 * 2 Some error occured.
132 int rad_check_ts(uint32_t nasaddr, unsigned int portnum, const char *user,
133 const char *session_id)
135 pid_t pid, child_pid;
141 lrad_ipaddr_t ipaddr;
144 ipaddr.ipaddr.ip4addr.s_addr = nasaddr;
149 cl = client_find_old(&ipaddr);
152 * Unknown NAS, so trusting radutmp.
154 DEBUG2("checkrad: Unknown NAS %s, not checking",
155 ip_ntoa(address, nasaddr));
160 * No nastype, or nas type 'other', trust radutmp.
162 if (!cl->nastype || (cl->nastype[0] == '\0') ||
163 (strcmp(cl->nastype, "other") == 0)) {
164 DEBUG2("checkrad: No NAS type, or type \"other\" not checking");
171 if ((pid = rad_fork()) < 0) { /* do wait for the fork'd result */
172 radlog(L_ERR, "Accounting: Failed in fork(): Cannot run checkrad\n");
177 child_pid = rad_waitpid(pid, &status);
180 * It's taking too long. Stop waiting for it.
182 * Don't bother to kill it, as we don't care what
185 if (child_pid == 0) {
186 radlog(L_ERR, "Check-TS: timeout waiting for checkrad");
191 radlog(L_ERR, "Check-TS: unknown error in waitpid()");
195 return WEXITSTATUS(status);
199 * We don't close fd's 0, 1, and 2. If we're in debugging mode,
200 * then they should go to stdout (etc), along with the other
201 * server log messages.
203 * If we're not in debugging mode, then the code in radiusd.c
204 * takes care of connecting fd's 0, 1, and 2 to /dev/null.
208 ip_ntoa(address, nasaddr);
209 snprintf(port, 11, "%u", portnum);
212 /* OS/2 can't directly execute scripts then we call the command
213 processor to execute checkrad
215 execl(getenv("COMSPEC"), "", "/C","checkrad", cl->nastype, address, port,
216 user, session_id, NULL);
218 execl(mainconfig.checkrad, "checkrad", cl->nastype, address, port,
219 user, session_id, NULL);
221 radlog(L_ERR, "Check-TS: exec %s: %s", mainconfig.checkrad, strerror(errno));
224 * Exit - 2 means "some error occured".