1
|
<?php
|
2
|
/* vim: set expandtab tabstop=4 shiftwidth=4: */
|
3
|
/*
|
4
|
$Id$
|
5
|
|
6
|
Copyright (c) 2006, Jonathan De Graeve <jonathan.de.graeve@imelda.be>
|
7
|
All rights reserved.
|
8
|
|
9
|
Redistribution and use in source and binary forms, with or without
|
10
|
modification, are permitted provided that the following conditions
|
11
|
are met:
|
12
|
|
13
|
1. Redistributions of source code must retain the above copyright
|
14
|
notice, this list of conditions and the following disclaimer.
|
15
|
2. Redistributions in binary form must reproduce the above copyright
|
16
|
notice, this list of conditions and the following disclaimer in the
|
17
|
documentation and/or other materials provided with the distribution.
|
18
|
3. The names of the authors may not be used to endorse or promote products
|
19
|
derived from this software without specific prior written permission.
|
20
|
|
21
|
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
|
22
|
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
23
|
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
24
|
IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
|
25
|
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
26
|
BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
27
|
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
|
28
|
OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
|
29
|
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
|
30
|
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
31
|
|
32
|
This code cannot simply be copied and put under the GNU Public License or
|
33
|
any other GPL-like (LGPL, GPL2) License.
|
34
|
|
35
|
This code is made possible thx to samples made by Michael Bretterklieber <michael@bretterklieber.com>
|
36
|
author of the PHP PECL Radius package
|
37
|
|
38
|
*/
|
39
|
|
40
|
/*
|
41
|
pfSense_MODULE: captiveportal
|
42
|
*/
|
43
|
|
44
|
/*
|
45
|
RADIUS AUTHENTICATION
|
46
|
---------------------
|
47
|
*/
|
48
|
|
49
|
function RADIUS_AUTHENTICATION($username,$password,$radiusservers,$clientip,$clientmac,$ruleno) {
|
50
|
|
51
|
global $config;
|
52
|
|
53
|
$retvalue = array();
|
54
|
$nas_mac = mac_format(get_interface_mac(get_real_interface("wan")));
|
55
|
$clientmac = mac_format($clientmac);
|
56
|
$nas_port = $ruleno;
|
57
|
$radiusvendor = $config['captiveportal']['radiusvendor'] ? $config['captiveportal']['radiusvendor'] : null;
|
58
|
// Do we even need to set it to NULL?
|
59
|
$retvalue['error'] = $retvalue['reply_message'] = $retvalue['url_redirection'] = $retvalue['session_timeout'] = $retvalue['idle_timeout'] = $retvalue['session_terminate_time'] = null;
|
60
|
|
61
|
switch($radiusvendor) {
|
62
|
|
63
|
case 'cisco':
|
64
|
$calledstationid = $clientmac;
|
65
|
$callingstationid = $clientip;
|
66
|
break;
|
67
|
|
68
|
default:
|
69
|
$calledstationid = get_interface_ip("wan");
|
70
|
$callingstationid = $clientmac;
|
71
|
}
|
72
|
|
73
|
// Create our instance
|
74
|
$rauth = new Auth_RADIUS_PAP($username, $password);
|
75
|
|
76
|
/*
|
77
|
* Add support for more then one radiusserver.
|
78
|
* At most 10 servers may be specified.
|
79
|
* When multiple servers are given, they are tried in round-robin fashion until a valid response is received
|
80
|
*/
|
81
|
foreach ($radiusservers as $radsrv) {
|
82
|
// Add a new server to our instance
|
83
|
$rauth->addServer($radsrv['ipaddr'], $radsrv['port'], $radsrv['key']);
|
84
|
|
85
|
}
|
86
|
|
87
|
// Construct data package
|
88
|
$rauth->username = $username;
|
89
|
$rauth->password = $password;
|
90
|
|
91
|
if (PEAR::isError($rauth->start())) {
|
92
|
$retvalue['auth_val'] = 1;
|
93
|
$retvalue['error'] = $rauth->getError();
|
94
|
|
95
|
// If we encounter an error immediately stop this function and go back
|
96
|
$rauth->close();
|
97
|
return $retvalue;
|
98
|
}
|
99
|
|
100
|
// Default attributes
|
101
|
$rauth->putAttribute(RADIUS_SERVICE_TYPE, RADIUS_LOGIN);
|
102
|
$rauth->putAttribute(RADIUS_NAS_PORT_TYPE, RADIUS_ETHERNET);
|
103
|
$rauth->putAttribute(RADIUS_NAS_PORT, $nas_port);
|
104
|
|
105
|
// Extra data to identify the client and nas
|
106
|
$rauth->putAttribute(RADIUS_FRAMED_IP_ADDRESS, $clientip, addr);
|
107
|
$rauth->putAttribute(RADIUS_CALLED_STATION_ID, $calledstationid);
|
108
|
$rauth->putAttribute(RADIUS_CALLING_STATION_ID, $callingstationid);
|
109
|
|
110
|
// Send request
|
111
|
$result = $rauth->send();
|
112
|
|
113
|
// Evaluation of the response
|
114
|
// 1 -> Access-Request => We will use this value as an error indicator since we can't get a 1 back from the radius
|
115
|
// 2 -> Access-Accept
|
116
|
// 3 -> Access-Reject
|
117
|
// See RFC2865 for this.
|
118
|
if (PEAR::isError($result)) {
|
119
|
$retvalue['auth_val'] = 1;
|
120
|
$retvalue['error'] = $result->getMessage();
|
121
|
|
122
|
} else if ($result === true) {
|
123
|
$retvalue['auth_val'] = 2;
|
124
|
|
125
|
} else {
|
126
|
$retvalue['auth_val'] = 3;
|
127
|
|
128
|
}
|
129
|
|
130
|
// Get attributes, even if auth failed.
|
131
|
// We will push the results in the retvalue array
|
132
|
if (!$rauth->getAttributes()) {
|
133
|
$retvalue['error'] = $rauth->getError();
|
134
|
|
135
|
} else {
|
136
|
$retvalue = array_merge($retvalue,$rauth->listAttributes());
|
137
|
|
138
|
// We convert the session_terminate_time to unixtimestamp if its set before returning the whole array to our caller
|
139
|
if (!empty($retvalue['session_terminate_time'])) {
|
140
|
$stt = &$retvalue['session_terminate_time'];
|
141
|
$stt = strtotime(preg_replace("/\+(\d+):(\d+)$/", " +\${1}\${2}", preg_replace("/(\d+)T(\d+)/", "\${1} \${2}",$stt)));
|
142
|
}
|
143
|
}
|
144
|
|
145
|
// close OO RADIUS_AUTHENTICATION
|
146
|
$rauth->close();
|
147
|
|
148
|
return $retvalue;
|
149
|
|
150
|
}
|
151
|
|
152
|
?>
|