2 * session.c session management
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
20 * Copyright 2000,2006 The FreeRADIUS server project
23 #include <freeradius-devel/ident.h>
26 #include <freeradius-devel/radiusd.h>
27 #include <freeradius-devel/rad_assert.h>
33 * End a session by faking a Stop packet to all accounting modules.
35 int session_zap(REQUEST *request, uint32_t nasaddr, unsigned int port,
37 const char *sessionid, uint32_t cliaddr, char proto,
41 VALUE_PAIR *vp, *userpair;
44 stopreq = request_alloc_fake(request);
45 stopreq->packet->code = PW_ACCOUNTING_REQUEST; /* just to be safe */
46 rad_assert(stopreq != NULL);
48 /* Hold your breath */
49 #define PAIR(n,v,t,e) do { \
50 if(!(vp = paircreate(n, t))) { \
51 radlog(L_ERR|L_CONS, "no memory"); \
52 pairfree(&(stopreq->packet->vps)); \
56 pairadd(&(stopreq->packet->vps), vp); \
58 #define INTPAIR(n,v) PAIR(n,v,PW_TYPE_INTEGER,lvalue)
59 #define IPPAIR(n,v) PAIR(n,v,PW_TYPE_IPADDR,lvalue)
60 #define STRINGPAIR(n,v) do { \
61 if(!(vp = paircreate(n, PW_TYPE_STRING))) { \
62 radlog(L_ERR|L_CONS, "no memory"); \
63 pairfree(&(stopreq->packet->vps)); \
66 strlcpy((char *)vp->vp_strvalue, v, sizeof vp->vp_strvalue); \
67 vp->length = strlen(v); \
68 pairadd(&(stopreq->packet->vps), vp); \
71 INTPAIR(PW_ACCT_STATUS_TYPE, PW_STATUS_STOP);
72 IPPAIR(PW_NAS_IP_ADDRESS, nasaddr);
73 INTPAIR(PW_ACCT_DELAY_TIME, 0);
74 STRINGPAIR(PW_USER_NAME, user);
76 INTPAIR(PW_NAS_PORT, port);
77 STRINGPAIR(PW_ACCT_SESSION_ID, sessionid);
79 INTPAIR(PW_SERVICE_TYPE, PW_FRAMED_USER);
80 INTPAIR(PW_FRAMED_PROTOCOL, PW_PPP);
81 } else if(proto == 'S') {
82 INTPAIR(PW_SERVICE_TYPE, PW_FRAMED_USER);
83 INTPAIR(PW_FRAMED_PROTOCOL, PW_SLIP);
85 INTPAIR(PW_SERVICE_TYPE, PW_LOGIN_USER); /* A guess, really */
88 IPPAIR(PW_FRAMED_IP_ADDRESS, cliaddr);
89 INTPAIR(PW_ACCT_SESSION_TIME, session_time);
90 INTPAIR(PW_ACCT_INPUT_OCTETS, 0);
91 INTPAIR(PW_ACCT_OUTPUT_OCTETS, 0);
92 INTPAIR(PW_ACCT_INPUT_PACKETS, 0);
93 INTPAIR(PW_ACCT_OUTPUT_PACKETS, 0);
95 stopreq->username = userpair;
96 stopreq->password = NULL;
98 ret = rad_accounting(stopreq);
101 * We've got to clean it up by hand, because no one else will.
103 request_free(&stopreq);
110 * Check one terminal server to see if a user is logged in.
113 * 0 The user is off-line.
114 * 1 The user is logged in.
115 * 2 Some error occured.
117 int rad_check_ts(uint32_t nasaddr, unsigned int portnum, const char *user,
118 const char *session_id)
120 pid_t pid, child_pid;
126 lrad_ipaddr_t ipaddr;
129 ipaddr.ipaddr.ip4addr.s_addr = nasaddr;
134 cl = client_find_old(&ipaddr);
137 * Unknown NAS, so trusting radutmp.
139 DEBUG2("checkrad: Unknown NAS %s, not checking",
140 ip_ntoa(address, nasaddr));
145 * No nastype, or nas type 'other', trust radutmp.
147 if (!cl->nastype || (cl->nastype[0] == '\0') ||
148 (strcmp(cl->nastype, "other") == 0)) {
149 DEBUG2("checkrad: No NAS type, or type \"other\" not checking");
156 if ((pid = rad_fork()) < 0) { /* do wait for the fork'd result */
157 radlog(L_ERR, "Accounting: Failed in fork(): Cannot run checkrad\n");
162 child_pid = rad_waitpid(pid, &status);
165 * It's taking too long. Stop waiting for it.
167 * Don't bother to kill it, as we don't care what
170 if (child_pid == 0) {
171 radlog(L_ERR, "Check-TS: timeout waiting for checkrad");
176 radlog(L_ERR, "Check-TS: unknown error in waitpid()");
180 return WEXITSTATUS(status);
184 * We don't close fd's 0, 1, and 2. If we're in debugging mode,
185 * then they should go to stdout (etc), along with the other
186 * server log messages.
188 * If we're not in debugging mode, then the code in radiusd.c
189 * takes care of connecting fd's 0, 1, and 2 to /dev/null.
193 ip_ntoa(address, nasaddr);
194 snprintf(port, 11, "%u", portnum);
197 /* OS/2 can't directly execute scripts then we call the command
198 processor to execute checkrad
200 execl(getenv("COMSPEC"), "", "/C","checkrad", cl->nastype, address, port,
201 user, session_id, NULL);
203 execl(mainconfig.checkrad, "checkrad", cl->nastype, address, port,
204 user, session_id, NULL);
206 radlog(L_ERR, "Check-TS: exec %s: %s", mainconfig.checkrad, strerror(errno));
209 * Exit - 2 means "some error occured".