mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2025-01-19 11:24:05 -05:00
e2722bf81d
hostapd EAP server can now be configured with two separate server certificates/keys to enable parallel operations using both RSA and ECC public keys. The server will pick which one to use based on the client preferences for the cipher suite (in the TLS ClientHello message). It should be noted that number of deployed EAP peer implementations do not filter out the cipher suite list based on their local configuration and as such, configuration of alternative types of certificates on the server may result in interoperability issues. Signed-off-by: Jouni Malinen <j@w1.fi>
306 lines
8.7 KiB
C
306 lines
8.7 KiB
C
/*
|
|
* Authentication server setup
|
|
* Copyright (c) 2002-2009, Jouni Malinen <j@w1.fi>
|
|
*
|
|
* This software may be distributed under the terms of the BSD license.
|
|
* See README for more details.
|
|
*/
|
|
|
|
#include "utils/includes.h"
|
|
|
|
#include "utils/common.h"
|
|
#include "crypto/tls.h"
|
|
#include "eap_server/eap.h"
|
|
#include "eap_server/eap_sim_db.h"
|
|
#include "eapol_auth/eapol_auth_sm.h"
|
|
#include "radius/radius_server.h"
|
|
#include "hostapd.h"
|
|
#include "ap_config.h"
|
|
#include "sta_info.h"
|
|
#include "authsrv.h"
|
|
|
|
|
|
#if defined(EAP_SERVER_SIM) || defined(EAP_SERVER_AKA)
|
|
#define EAP_SIM_DB
|
|
#endif /* EAP_SERVER_SIM || EAP_SERVER_AKA */
|
|
|
|
|
|
#ifdef EAP_SIM_DB
|
|
static int hostapd_sim_db_cb_sta(struct hostapd_data *hapd,
|
|
struct sta_info *sta, void *ctx)
|
|
{
|
|
if (eapol_auth_eap_pending_cb(sta->eapol_sm, ctx) == 0)
|
|
return 1;
|
|
return 0;
|
|
}
|
|
|
|
|
|
static void hostapd_sim_db_cb(void *ctx, void *session_ctx)
|
|
{
|
|
struct hostapd_data *hapd = ctx;
|
|
if (ap_for_each_sta(hapd, hostapd_sim_db_cb_sta, session_ctx) == 0) {
|
|
#ifdef RADIUS_SERVER
|
|
radius_server_eap_pending_cb(hapd->radius_srv, session_ctx);
|
|
#endif /* RADIUS_SERVER */
|
|
}
|
|
}
|
|
#endif /* EAP_SIM_DB */
|
|
|
|
|
|
#ifdef RADIUS_SERVER
|
|
|
|
static int hostapd_radius_get_eap_user(void *ctx, const u8 *identity,
|
|
size_t identity_len, int phase2,
|
|
struct eap_user *user)
|
|
{
|
|
const struct hostapd_eap_user *eap_user;
|
|
int i;
|
|
int rv = -1;
|
|
|
|
eap_user = hostapd_get_eap_user(ctx, identity, identity_len, phase2);
|
|
if (eap_user == NULL)
|
|
goto out;
|
|
|
|
if (user == NULL)
|
|
return 0;
|
|
|
|
os_memset(user, 0, sizeof(*user));
|
|
for (i = 0; i < EAP_MAX_METHODS; i++) {
|
|
user->methods[i].vendor = eap_user->methods[i].vendor;
|
|
user->methods[i].method = eap_user->methods[i].method;
|
|
}
|
|
|
|
if (eap_user->password) {
|
|
user->password = os_memdup(eap_user->password,
|
|
eap_user->password_len);
|
|
if (user->password == NULL)
|
|
goto out;
|
|
user->password_len = eap_user->password_len;
|
|
user->password_hash = eap_user->password_hash;
|
|
if (eap_user->salt && eap_user->salt_len) {
|
|
user->salt = os_memdup(eap_user->salt,
|
|
eap_user->salt_len);
|
|
if (!user->salt)
|
|
goto out;
|
|
user->salt_len = eap_user->salt_len;
|
|
}
|
|
}
|
|
user->force_version = eap_user->force_version;
|
|
user->macacl = eap_user->macacl;
|
|
user->ttls_auth = eap_user->ttls_auth;
|
|
user->remediation = eap_user->remediation;
|
|
user->accept_attr = eap_user->accept_attr;
|
|
user->t_c_timestamp = eap_user->t_c_timestamp;
|
|
rv = 0;
|
|
|
|
out:
|
|
if (rv)
|
|
wpa_printf(MSG_DEBUG, "%s: Failed to find user", __func__);
|
|
|
|
return rv;
|
|
}
|
|
|
|
|
|
static int hostapd_setup_radius_srv(struct hostapd_data *hapd)
|
|
{
|
|
struct radius_server_conf srv;
|
|
struct hostapd_bss_config *conf = hapd->conf;
|
|
os_memset(&srv, 0, sizeof(srv));
|
|
srv.client_file = conf->radius_server_clients;
|
|
srv.auth_port = conf->radius_server_auth_port;
|
|
srv.acct_port = conf->radius_server_acct_port;
|
|
srv.conf_ctx = hapd;
|
|
srv.eap_sim_db_priv = hapd->eap_sim_db_priv;
|
|
srv.ssl_ctx = hapd->ssl_ctx;
|
|
srv.msg_ctx = hapd->msg_ctx;
|
|
srv.pac_opaque_encr_key = conf->pac_opaque_encr_key;
|
|
srv.eap_fast_a_id = conf->eap_fast_a_id;
|
|
srv.eap_fast_a_id_len = conf->eap_fast_a_id_len;
|
|
srv.eap_fast_a_id_info = conf->eap_fast_a_id_info;
|
|
srv.eap_fast_prov = conf->eap_fast_prov;
|
|
srv.pac_key_lifetime = conf->pac_key_lifetime;
|
|
srv.pac_key_refresh_time = conf->pac_key_refresh_time;
|
|
srv.eap_teap_auth = conf->eap_teap_auth;
|
|
srv.eap_teap_pac_no_inner = conf->eap_teap_pac_no_inner;
|
|
srv.eap_sim_aka_result_ind = conf->eap_sim_aka_result_ind;
|
|
srv.tnc = conf->tnc;
|
|
srv.wps = hapd->wps;
|
|
srv.ipv6 = conf->radius_server_ipv6;
|
|
srv.get_eap_user = hostapd_radius_get_eap_user;
|
|
srv.eap_req_id_text = conf->eap_req_id_text;
|
|
srv.eap_req_id_text_len = conf->eap_req_id_text_len;
|
|
srv.pwd_group = conf->pwd_group;
|
|
srv.server_id = conf->server_id ? conf->server_id : "hostapd";
|
|
srv.sqlite_file = conf->eap_user_sqlite;
|
|
#ifdef CONFIG_RADIUS_TEST
|
|
srv.dump_msk_file = conf->dump_msk_file;
|
|
#endif /* CONFIG_RADIUS_TEST */
|
|
#ifdef CONFIG_HS20
|
|
srv.subscr_remediation_url = conf->subscr_remediation_url;
|
|
srv.subscr_remediation_method = conf->subscr_remediation_method;
|
|
srv.hs20_sim_provisioning_url = conf->hs20_sim_provisioning_url;
|
|
srv.t_c_server_url = conf->t_c_server_url;
|
|
#endif /* CONFIG_HS20 */
|
|
srv.erp = conf->eap_server_erp;
|
|
srv.erp_domain = conf->erp_domain;
|
|
srv.tls_session_lifetime = conf->tls_session_lifetime;
|
|
srv.tls_flags = conf->tls_flags;
|
|
|
|
hapd->radius_srv = radius_server_init(&srv);
|
|
if (hapd->radius_srv == NULL) {
|
|
wpa_printf(MSG_ERROR, "RADIUS server initialization failed.");
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
#endif /* RADIUS_SERVER */
|
|
|
|
|
|
#ifdef EAP_TLS_FUNCS
|
|
static void authsrv_tls_event(void *ctx, enum tls_event ev,
|
|
union tls_event_data *data)
|
|
{
|
|
switch (ev) {
|
|
case TLS_CERT_CHAIN_SUCCESS:
|
|
wpa_printf(MSG_DEBUG, "authsrv: remote certificate verification success");
|
|
break;
|
|
case TLS_CERT_CHAIN_FAILURE:
|
|
wpa_printf(MSG_INFO, "authsrv: certificate chain failure: reason=%d depth=%d subject='%s' err='%s'",
|
|
data->cert_fail.reason,
|
|
data->cert_fail.depth,
|
|
data->cert_fail.subject,
|
|
data->cert_fail.reason_txt);
|
|
break;
|
|
case TLS_PEER_CERTIFICATE:
|
|
wpa_printf(MSG_DEBUG, "authsrv: peer certificate: depth=%d serial_num=%s subject=%s",
|
|
data->peer_cert.depth,
|
|
data->peer_cert.serial_num ? data->peer_cert.serial_num : "N/A",
|
|
data->peer_cert.subject);
|
|
break;
|
|
case TLS_ALERT:
|
|
if (data->alert.is_local)
|
|
wpa_printf(MSG_DEBUG, "authsrv: local TLS alert: %s",
|
|
data->alert.description);
|
|
else
|
|
wpa_printf(MSG_DEBUG, "authsrv: remote TLS alert: %s",
|
|
data->alert.description);
|
|
break;
|
|
}
|
|
}
|
|
#endif /* EAP_TLS_FUNCS */
|
|
|
|
|
|
int authsrv_init(struct hostapd_data *hapd)
|
|
{
|
|
#ifdef EAP_TLS_FUNCS
|
|
if (hapd->conf->eap_server &&
|
|
(hapd->conf->ca_cert || hapd->conf->server_cert ||
|
|
hapd->conf->private_key || hapd->conf->dh_file ||
|
|
hapd->conf->server_cert2 || hapd->conf->private_key2)) {
|
|
struct tls_config conf;
|
|
struct tls_connection_params params;
|
|
|
|
os_memset(&conf, 0, sizeof(conf));
|
|
conf.tls_session_lifetime = hapd->conf->tls_session_lifetime;
|
|
if (hapd->conf->crl_reload_interval > 0 &&
|
|
hapd->conf->check_crl <= 0) {
|
|
wpa_printf(MSG_INFO,
|
|
"Cannot enable CRL reload functionality - it depends on check_crl being set");
|
|
} else if (hapd->conf->crl_reload_interval > 0) {
|
|
conf.crl_reload_interval =
|
|
hapd->conf->crl_reload_interval;
|
|
wpa_printf(MSG_INFO,
|
|
"Enabled CRL reload functionality");
|
|
}
|
|
conf.tls_flags = hapd->conf->tls_flags;
|
|
conf.event_cb = authsrv_tls_event;
|
|
conf.cb_ctx = hapd;
|
|
hapd->ssl_ctx = tls_init(&conf);
|
|
if (hapd->ssl_ctx == NULL) {
|
|
wpa_printf(MSG_ERROR, "Failed to initialize TLS");
|
|
authsrv_deinit(hapd);
|
|
return -1;
|
|
}
|
|
|
|
os_memset(¶ms, 0, sizeof(params));
|
|
params.ca_cert = hapd->conf->ca_cert;
|
|
params.client_cert = hapd->conf->server_cert;
|
|
params.client_cert2 = hapd->conf->server_cert2;
|
|
params.private_key = hapd->conf->private_key;
|
|
params.private_key2 = hapd->conf->private_key2;
|
|
params.private_key_passwd = hapd->conf->private_key_passwd;
|
|
params.private_key_passwd2 = hapd->conf->private_key_passwd2;
|
|
params.dh_file = hapd->conf->dh_file;
|
|
params.openssl_ciphers = hapd->conf->openssl_ciphers;
|
|
params.openssl_ecdh_curves = hapd->conf->openssl_ecdh_curves;
|
|
params.ocsp_stapling_response =
|
|
hapd->conf->ocsp_stapling_response;
|
|
params.ocsp_stapling_response_multi =
|
|
hapd->conf->ocsp_stapling_response_multi;
|
|
params.check_cert_subject = hapd->conf->check_cert_subject;
|
|
|
|
if (tls_global_set_params(hapd->ssl_ctx, ¶ms)) {
|
|
wpa_printf(MSG_ERROR, "Failed to set TLS parameters");
|
|
authsrv_deinit(hapd);
|
|
return -1;
|
|
}
|
|
|
|
if (tls_global_set_verify(hapd->ssl_ctx,
|
|
hapd->conf->check_crl,
|
|
hapd->conf->check_crl_strict)) {
|
|
wpa_printf(MSG_ERROR, "Failed to enable check_crl");
|
|
authsrv_deinit(hapd);
|
|
return -1;
|
|
}
|
|
}
|
|
#endif /* EAP_TLS_FUNCS */
|
|
|
|
#ifdef EAP_SIM_DB
|
|
if (hapd->conf->eap_sim_db) {
|
|
hapd->eap_sim_db_priv =
|
|
eap_sim_db_init(hapd->conf->eap_sim_db,
|
|
hapd->conf->eap_sim_db_timeout,
|
|
hostapd_sim_db_cb, hapd);
|
|
if (hapd->eap_sim_db_priv == NULL) {
|
|
wpa_printf(MSG_ERROR, "Failed to initialize EAP-SIM "
|
|
"database interface");
|
|
authsrv_deinit(hapd);
|
|
return -1;
|
|
}
|
|
}
|
|
#endif /* EAP_SIM_DB */
|
|
|
|
#ifdef RADIUS_SERVER
|
|
if (hapd->conf->radius_server_clients &&
|
|
hostapd_setup_radius_srv(hapd))
|
|
return -1;
|
|
#endif /* RADIUS_SERVER */
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
void authsrv_deinit(struct hostapd_data *hapd)
|
|
{
|
|
#ifdef RADIUS_SERVER
|
|
radius_server_deinit(hapd->radius_srv);
|
|
hapd->radius_srv = NULL;
|
|
#endif /* RADIUS_SERVER */
|
|
|
|
#ifdef EAP_TLS_FUNCS
|
|
if (hapd->ssl_ctx) {
|
|
tls_deinit(hapd->ssl_ctx);
|
|
hapd->ssl_ctx = NULL;
|
|
}
|
|
#endif /* EAP_TLS_FUNCS */
|
|
|
|
#ifdef EAP_SIM_DB
|
|
if (hapd->eap_sim_db_priv) {
|
|
eap_sim_db_deinit(hapd->eap_sim_db_priv);
|
|
hapd->eap_sim_db_priv = NULL;
|
|
}
|
|
#endif /* EAP_SIM_DB */
|
|
}
|