Updated to hostap_2_6
[mech_eap.git] / libeap / src / ap / accounting.c
1 /*
2  * hostapd / RADIUS Accounting
3  * Copyright (c) 2002-2009, 2012-2015, Jouni Malinen <j@w1.fi>
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  */
8
9 #include "utils/includes.h"
10
11 #include "utils/common.h"
12 #include "utils/eloop.h"
13 #include "eapol_auth/eapol_auth_sm.h"
14 #include "eapol_auth/eapol_auth_sm_i.h"
15 #include "radius/radius.h"
16 #include "radius/radius_client.h"
17 #include "hostapd.h"
18 #include "ieee802_1x.h"
19 #include "ap_config.h"
20 #include "sta_info.h"
21 #include "ap_drv_ops.h"
22 #include "accounting.h"
23
24
25 /* Default interval in seconds for polling TX/RX octets from the driver if
26  * STA is not using interim accounting. This detects wrap arounds for
27  * input/output octets and updates Acct-{Input,Output}-Gigawords. */
28 #define ACCT_DEFAULT_UPDATE_INTERVAL 300
29
30 static void accounting_sta_interim(struct hostapd_data *hapd,
31                                    struct sta_info *sta);
32
33
34 static struct radius_msg * accounting_msg(struct hostapd_data *hapd,
35                                           struct sta_info *sta,
36                                           int status_type)
37 {
38         struct radius_msg *msg;
39         char buf[128];
40         u8 *val;
41         size_t len;
42         int i;
43         struct wpabuf *b;
44         struct os_time now;
45
46         msg = radius_msg_new(RADIUS_CODE_ACCOUNTING_REQUEST,
47                              radius_client_get_id(hapd->radius));
48         if (msg == NULL) {
49                 wpa_printf(MSG_INFO, "Could not create new RADIUS packet");
50                 return NULL;
51         }
52
53         if (!radius_msg_add_attr_int32(msg, RADIUS_ATTR_ACCT_STATUS_TYPE,
54                                        status_type)) {
55                 wpa_printf(MSG_INFO, "Could not add Acct-Status-Type");
56                 goto fail;
57         }
58
59         if (sta) {
60                 if (!hostapd_config_get_radius_attr(
61                             hapd->conf->radius_acct_req_attr,
62                             RADIUS_ATTR_ACCT_AUTHENTIC) &&
63                     !radius_msg_add_attr_int32(msg, RADIUS_ATTR_ACCT_AUTHENTIC,
64                                                hapd->conf->ieee802_1x ?
65                                                RADIUS_ACCT_AUTHENTIC_RADIUS :
66                                                RADIUS_ACCT_AUTHENTIC_LOCAL)) {
67                         wpa_printf(MSG_INFO, "Could not add Acct-Authentic");
68                         goto fail;
69                 }
70
71                 /* Use 802.1X identity if available */
72                 val = ieee802_1x_get_identity(sta->eapol_sm, &len);
73
74                 /* Use RADIUS ACL identity if 802.1X provides no identity */
75                 if (!val && sta->identity) {
76                         val = (u8 *) sta->identity;
77                         len = os_strlen(sta->identity);
78                 }
79
80                 /* Use STA MAC if neither 802.1X nor RADIUS ACL provided
81                  * identity */
82                 if (!val) {
83                         os_snprintf(buf, sizeof(buf), RADIUS_ADDR_FORMAT,
84                                     MAC2STR(sta->addr));
85                         val = (u8 *) buf;
86                         len = os_strlen(buf);
87                 }
88
89                 if (!radius_msg_add_attr(msg, RADIUS_ATTR_USER_NAME, val,
90                                          len)) {
91                         wpa_printf(MSG_INFO, "Could not add User-Name");
92                         goto fail;
93                 }
94         }
95
96         if (add_common_radius_attr(hapd, hapd->conf->radius_acct_req_attr, sta,
97                                    msg) < 0)
98                 goto fail;
99
100         if (sta) {
101                 for (i = 0; ; i++) {
102                         val = ieee802_1x_get_radius_class(sta->eapol_sm, &len,
103                                                           i);
104                         if (val == NULL)
105                                 break;
106
107                         if (!radius_msg_add_attr(msg, RADIUS_ATTR_CLASS,
108                                                  val, len)) {
109                                 wpa_printf(MSG_INFO, "Could not add Class");
110                                 goto fail;
111                         }
112                 }
113
114                 b = ieee802_1x_get_radius_cui(sta->eapol_sm);
115                 if (b &&
116                     !radius_msg_add_attr(msg,
117                                          RADIUS_ATTR_CHARGEABLE_USER_IDENTITY,
118                                          wpabuf_head(b), wpabuf_len(b))) {
119                         wpa_printf(MSG_ERROR, "Could not add CUI");
120                         goto fail;
121                 }
122
123                 if (!b && sta->radius_cui &&
124                     !radius_msg_add_attr(msg,
125                                          RADIUS_ATTR_CHARGEABLE_USER_IDENTITY,
126                                          (u8 *) sta->radius_cui,
127                                          os_strlen(sta->radius_cui))) {
128                         wpa_printf(MSG_ERROR, "Could not add CUI from ACL");
129                         goto fail;
130                 }
131
132                 if (sta->ipaddr &&
133                     !radius_msg_add_attr_int32(msg,
134                                                RADIUS_ATTR_FRAMED_IP_ADDRESS,
135                                                be_to_host32(sta->ipaddr))) {
136                         wpa_printf(MSG_ERROR,
137                                    "Could not add Framed-IP-Address");
138                         goto fail;
139                 }
140         }
141
142         os_get_time(&now);
143         if (now.sec > 1000000000 &&
144             !radius_msg_add_attr_int32(msg, RADIUS_ATTR_EVENT_TIMESTAMP,
145                                        now.sec)) {
146                 wpa_printf(MSG_INFO, "Could not add Event-Timestamp");
147                 goto fail;
148         }
149
150         /*
151          * Add Acct-Delay-Time with zero value for the first transmission. This
152          * will be updated within radius_client.c when retransmitting the frame.
153          */
154         if (!radius_msg_add_attr_int32(msg, RADIUS_ATTR_ACCT_DELAY_TIME, 0)) {
155                 wpa_printf(MSG_INFO, "Could not add Acct-Delay-Time");
156                 goto fail;
157         }
158
159         return msg;
160
161  fail:
162         radius_msg_free(msg);
163         return NULL;
164 }
165
166
167 static int accounting_sta_update_stats(struct hostapd_data *hapd,
168                                        struct sta_info *sta,
169                                        struct hostap_sta_driver_data *data)
170 {
171         if (hostapd_drv_read_sta_data(hapd, data, sta->addr))
172                 return -1;
173
174         if (!data->bytes_64bit) {
175                 /* Extend 32-bit counters from the driver to 64-bit counters */
176                 if (sta->last_rx_bytes_lo > data->rx_bytes)
177                         sta->last_rx_bytes_hi++;
178                 sta->last_rx_bytes_lo = data->rx_bytes;
179
180                 if (sta->last_tx_bytes_lo > data->tx_bytes)
181                         sta->last_tx_bytes_hi++;
182                 sta->last_tx_bytes_lo = data->tx_bytes;
183         }
184
185         hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_RADIUS,
186                        HOSTAPD_LEVEL_DEBUG,
187                        "updated TX/RX stats: rx_bytes=%llu [%u:%u] tx_bytes=%llu [%u:%u] bytes_64bit=%d",
188                        data->rx_bytes, sta->last_rx_bytes_hi,
189                        sta->last_rx_bytes_lo,
190                        data->tx_bytes, sta->last_tx_bytes_hi,
191                        sta->last_tx_bytes_lo,
192                        data->bytes_64bit);
193
194         return 0;
195 }
196
197
198 static void accounting_interim_update(void *eloop_ctx, void *timeout_ctx)
199 {
200         struct hostapd_data *hapd = eloop_ctx;
201         struct sta_info *sta = timeout_ctx;
202         int interval;
203
204         if (sta->acct_interim_interval) {
205                 accounting_sta_interim(hapd, sta);
206                 interval = sta->acct_interim_interval;
207         } else {
208                 struct hostap_sta_driver_data data;
209                 accounting_sta_update_stats(hapd, sta, &data);
210                 interval = ACCT_DEFAULT_UPDATE_INTERVAL;
211         }
212
213         eloop_register_timeout(interval, 0, accounting_interim_update,
214                                hapd, sta);
215 }
216
217
218 /**
219  * accounting_sta_start - Start STA accounting
220  * @hapd: hostapd BSS data
221  * @sta: The station
222  */
223 void accounting_sta_start(struct hostapd_data *hapd, struct sta_info *sta)
224 {
225         struct radius_msg *msg;
226         int interval;
227
228         if (sta->acct_session_started)
229                 return;
230
231         hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_RADIUS,
232                        HOSTAPD_LEVEL_INFO,
233                        "starting accounting session %016llX",
234                        (unsigned long long) sta->acct_session_id);
235
236         os_get_reltime(&sta->acct_session_start);
237         sta->last_rx_bytes_hi = 0;
238         sta->last_rx_bytes_lo = 0;
239         sta->last_tx_bytes_hi = 0;
240         sta->last_tx_bytes_lo = 0;
241         hostapd_drv_sta_clear_stats(hapd, sta->addr);
242
243         if (!hapd->conf->radius->acct_server)
244                 return;
245
246         if (sta->acct_interim_interval)
247                 interval = sta->acct_interim_interval;
248         else
249                 interval = ACCT_DEFAULT_UPDATE_INTERVAL;
250         eloop_register_timeout(interval, 0, accounting_interim_update,
251                                hapd, sta);
252
253         msg = accounting_msg(hapd, sta, RADIUS_ACCT_STATUS_TYPE_START);
254         if (msg &&
255             radius_client_send(hapd->radius, msg, RADIUS_ACCT, sta->addr) < 0)
256                 radius_msg_free(msg);
257
258         sta->acct_session_started = 1;
259 }
260
261
262 static void accounting_sta_report(struct hostapd_data *hapd,
263                                   struct sta_info *sta, int stop)
264 {
265         struct radius_msg *msg;
266         int cause = sta->acct_terminate_cause;
267         struct hostap_sta_driver_data data;
268         struct os_reltime now_r, diff;
269         u64 bytes;
270
271         if (!hapd->conf->radius->acct_server)
272                 return;
273
274         msg = accounting_msg(hapd, sta,
275                              stop ? RADIUS_ACCT_STATUS_TYPE_STOP :
276                              RADIUS_ACCT_STATUS_TYPE_INTERIM_UPDATE);
277         if (!msg) {
278                 wpa_printf(MSG_INFO, "Could not create RADIUS Accounting message");
279                 return;
280         }
281
282         os_get_reltime(&now_r);
283         os_reltime_sub(&now_r, &sta->acct_session_start, &diff);
284         if (!radius_msg_add_attr_int32(msg, RADIUS_ATTR_ACCT_SESSION_TIME,
285                                        diff.sec)) {
286                 wpa_printf(MSG_INFO, "Could not add Acct-Session-Time");
287                 goto fail;
288         }
289
290         if (accounting_sta_update_stats(hapd, sta, &data) == 0) {
291                 if (!radius_msg_add_attr_int32(msg,
292                                                RADIUS_ATTR_ACCT_INPUT_PACKETS,
293                                                data.rx_packets)) {
294                         wpa_printf(MSG_INFO, "Could not add Acct-Input-Packets");
295                         goto fail;
296                 }
297                 if (!radius_msg_add_attr_int32(msg,
298                                                RADIUS_ATTR_ACCT_OUTPUT_PACKETS,
299                                                data.tx_packets)) {
300                         wpa_printf(MSG_INFO, "Could not add Acct-Output-Packets");
301                         goto fail;
302                 }
303                 if (data.bytes_64bit)
304                         bytes = data.rx_bytes;
305                 else
306                         bytes = ((u64) sta->last_rx_bytes_hi << 32) |
307                                 sta->last_rx_bytes_lo;
308                 if (!radius_msg_add_attr_int32(msg,
309                                                RADIUS_ATTR_ACCT_INPUT_OCTETS,
310                                                (u32) bytes)) {
311                         wpa_printf(MSG_INFO, "Could not add Acct-Input-Octets");
312                         goto fail;
313                 }
314                 if (!radius_msg_add_attr_int32(msg,
315                                                RADIUS_ATTR_ACCT_INPUT_GIGAWORDS,
316                                                (u32) (bytes >> 32))) {
317                         wpa_printf(MSG_INFO, "Could not add Acct-Input-Gigawords");
318                         goto fail;
319                 }
320                 if (data.bytes_64bit)
321                         bytes = data.tx_bytes;
322                 else
323                         bytes = ((u64) sta->last_tx_bytes_hi << 32) |
324                                 sta->last_tx_bytes_lo;
325                 if (!radius_msg_add_attr_int32(msg,
326                                                RADIUS_ATTR_ACCT_OUTPUT_OCTETS,
327                                                (u32) bytes)) {
328                         wpa_printf(MSG_INFO, "Could not add Acct-Output-Octets");
329                         goto fail;
330                 }
331                 if (!radius_msg_add_attr_int32(msg,
332                                                RADIUS_ATTR_ACCT_OUTPUT_GIGAWORDS,
333                                                (u32) (bytes >> 32))) {
334                         wpa_printf(MSG_INFO, "Could not add Acct-Output-Gigawords");
335                         goto fail;
336                 }
337         }
338
339         if (eloop_terminated())
340                 cause = RADIUS_ACCT_TERMINATE_CAUSE_ADMIN_REBOOT;
341
342         if (stop && cause &&
343             !radius_msg_add_attr_int32(msg, RADIUS_ATTR_ACCT_TERMINATE_CAUSE,
344                                        cause)) {
345                 wpa_printf(MSG_INFO, "Could not add Acct-Terminate-Cause");
346                 goto fail;
347         }
348
349         if (radius_client_send(hapd->radius, msg,
350                                stop ? RADIUS_ACCT : RADIUS_ACCT_INTERIM,
351                                sta->addr) < 0)
352                 goto fail;
353         return;
354
355  fail:
356         radius_msg_free(msg);
357 }
358
359
360 /**
361  * accounting_sta_interim - Send a interim STA accounting report
362  * @hapd: hostapd BSS data
363  * @sta: The station
364  */
365 static void accounting_sta_interim(struct hostapd_data *hapd,
366                                    struct sta_info *sta)
367 {
368         if (sta->acct_session_started)
369                 accounting_sta_report(hapd, sta, 0);
370 }
371
372
373 /**
374  * accounting_sta_stop - Stop STA accounting
375  * @hapd: hostapd BSS data
376  * @sta: The station
377  */
378 void accounting_sta_stop(struct hostapd_data *hapd, struct sta_info *sta)
379 {
380         if (sta->acct_session_started) {
381                 accounting_sta_report(hapd, sta, 1);
382                 eloop_cancel_timeout(accounting_interim_update, hapd, sta);
383                 hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_RADIUS,
384                                HOSTAPD_LEVEL_INFO,
385                                "stopped accounting session %016llX",
386                                (unsigned long long) sta->acct_session_id);
387                 sta->acct_session_started = 0;
388         }
389 }
390
391
392 int accounting_sta_get_id(struct hostapd_data *hapd, struct sta_info *sta)
393 {
394         return radius_gen_session_id((u8 *) &sta->acct_session_id,
395                                      sizeof(sta->acct_session_id));
396 }
397
398
399 /**
400  * accounting_receive - Process the RADIUS frames from Accounting Server
401  * @msg: RADIUS response message
402  * @req: RADIUS request message
403  * @shared_secret: RADIUS shared secret
404  * @shared_secret_len: Length of shared_secret in octets
405  * @data: Context data (struct hostapd_data *)
406  * Returns: Processing status
407  */
408 static RadiusRxResult
409 accounting_receive(struct radius_msg *msg, struct radius_msg *req,
410                    const u8 *shared_secret, size_t shared_secret_len,
411                    void *data)
412 {
413         if (radius_msg_get_hdr(msg)->code != RADIUS_CODE_ACCOUNTING_RESPONSE) {
414                 wpa_printf(MSG_INFO, "Unknown RADIUS message code");
415                 return RADIUS_RX_UNKNOWN;
416         }
417
418         if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) {
419                 wpa_printf(MSG_INFO, "Incoming RADIUS packet did not have correct Authenticator - dropped");
420                 return RADIUS_RX_INVALID_AUTHENTICATOR;
421         }
422
423         return RADIUS_RX_PROCESSED;
424 }
425
426
427 static void accounting_report_state(struct hostapd_data *hapd, int on)
428 {
429         struct radius_msg *msg;
430
431         if (!hapd->conf->radius->acct_server || hapd->radius == NULL)
432                 return;
433
434         /* Inform RADIUS server that accounting will start/stop so that the
435          * server can close old accounting sessions. */
436         msg = accounting_msg(hapd, NULL,
437                              on ? RADIUS_ACCT_STATUS_TYPE_ACCOUNTING_ON :
438                              RADIUS_ACCT_STATUS_TYPE_ACCOUNTING_OFF);
439         if (!msg)
440                 return;
441
442         if (hapd->acct_session_id) {
443                 char buf[20];
444
445                 os_snprintf(buf, sizeof(buf), "%016llX",
446                             (unsigned long long) hapd->acct_session_id);
447                 if (!radius_msg_add_attr(msg, RADIUS_ATTR_ACCT_SESSION_ID,
448                                          (u8 *) buf, os_strlen(buf)))
449                         wpa_printf(MSG_ERROR, "Could not add Acct-Session-Id");
450         }
451
452         if (radius_client_send(hapd->radius, msg, RADIUS_ACCT, NULL) < 0)
453                 radius_msg_free(msg);
454 }
455
456
457 static void accounting_interim_error_cb(const u8 *addr, void *ctx)
458 {
459         struct hostapd_data *hapd = ctx;
460         struct sta_info *sta;
461         unsigned int i, wait_time;
462         int res;
463
464         sta = ap_get_sta(hapd, addr);
465         if (!sta)
466                 return;
467         sta->acct_interim_errors++;
468         if (sta->acct_interim_errors > 10 /* RADIUS_CLIENT_MAX_RETRIES */) {
469                 wpa_printf(MSG_DEBUG,
470                            "Interim RADIUS accounting update failed for " MACSTR
471                            " - too many errors, abandon this interim accounting update",
472                            MAC2STR(addr));
473                 sta->acct_interim_errors = 0;
474                 /* Next update will be tried after normal update interval */
475                 return;
476         }
477
478         /*
479          * Use a shorter update interval as an improved retransmission mechanism
480          * for failed interim accounting updates. This allows the statistics to
481          * be updated for each retransmission.
482          *
483          * RADIUS client code has already waited RADIUS_CLIENT_FIRST_WAIT.
484          * Schedule the first retry attempt immediately and every following one
485          * with exponential backoff.
486          */
487         if (sta->acct_interim_errors == 1) {
488                 wait_time = 0;
489         } else {
490                 wait_time = 3; /* RADIUS_CLIENT_FIRST_WAIT */
491                 for (i = 1; i < sta->acct_interim_errors; i++)
492                         wait_time *= 2;
493         }
494         res = eloop_deplete_timeout(wait_time, 0, accounting_interim_update,
495                                     hapd, sta);
496         if (res == 1)
497                 wpa_printf(MSG_DEBUG,
498                            "Interim RADIUS accounting update failed for " MACSTR
499                            " (error count: %u) - schedule next update in %u seconds",
500                            MAC2STR(addr), sta->acct_interim_errors, wait_time);
501         else if (res == 0)
502                 wpa_printf(MSG_DEBUG,
503                            "Interim RADIUS accounting update failed for " MACSTR
504                            " (error count: %u)", MAC2STR(addr),
505                            sta->acct_interim_errors);
506         else
507                 wpa_printf(MSG_DEBUG,
508                            "Interim RADIUS accounting update failed for " MACSTR
509                            " (error count: %u) - no timer found", MAC2STR(addr),
510                            sta->acct_interim_errors);
511 }
512
513
514 /**
515  * accounting_init: Initialize accounting
516  * @hapd: hostapd BSS data
517  * Returns: 0 on success, -1 on failure
518  */
519 int accounting_init(struct hostapd_data *hapd)
520 {
521         if (radius_gen_session_id((u8 *) &hapd->acct_session_id,
522                                   sizeof(hapd->acct_session_id)) < 0)
523                 return -1;
524
525         if (radius_client_register(hapd->radius, RADIUS_ACCT,
526                                    accounting_receive, hapd))
527                 return -1;
528         radius_client_set_interim_error_cb(hapd->radius,
529                                            accounting_interim_error_cb, hapd);
530
531         accounting_report_state(hapd, 1);
532
533         return 0;
534 }
535
536
537 /**
538  * accounting_deinit: Deinitialize accounting
539  * @hapd: hostapd BSS data
540  */
541 void accounting_deinit(struct hostapd_data *hapd)
542 {
543         accounting_report_state(hapd, 0);
544 }