Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

794 lines
22 KiB

///////////////////////////////////////////////////////////////////////////////
//
// Copyright (c) Microsoft Corporation
//
// SYNOPSIS
//
// Defines the class RadiusProxy.
//
///////////////////////////////////////////////////////////////////////////////
#include <proxypch.h>
#include <datastore2.h>
#include <proxy.h>
#include <radpack.h>
#include <iasevent.h>
#include <iasinfo.h>
#include <iasutil.h>
#include <dsobj.h>
///////////////////////////////////////////////////////////////////////////////
//
// CLASS
//
// Resolver
//
// DESCRIPTION
//
// Utility class for resolving hostnames and iterating through the results.
//
///////////////////////////////////////////////////////////////////////////////
class Resolver
{
public:
Resolver() throw ()
: first(NULL), last(NULL)
{ }
~Resolver() throw ()
{ if (first != &addr) delete[] first; }
// Returns true if the result set contains the specified address.
bool contains(ULONG address) const throw ()
{
for (const ULONG* i = first; i != last; ++i)
{
if (*i == address) { return true; }
}
return false;
}
// Resolves the given name. The return value is the error code.
ULONG resolve(const PCWSTR name = NULL) throw ()
{
// Clear out the existing result set.
if (first != &addr)
{
delete[] first;
first = last = NULL;
}
if (name)
{
// First try for a quick score on dotted decimal.
addr = ias_inet_wtoh(name);
if (addr != INADDR_NONE)
{
addr = htonl(addr);
first = &addr;
last = first + 1;
return NO_ERROR;
}
}
// That didn't work, so look up the name.
PHOSTENT he = IASGetHostByName(name);
if (!he) { return GetLastError(); }
// Count the number of addresses returned.
ULONG naddr = 0;
while (he->h_addr_list[naddr]) { ++naddr; }
// Allocate an array to hold them.
first = last = new (std::nothrow) ULONG[naddr];
if (first)
{
for (ULONG i = 0; i < naddr; ++i)
{
*last++ = *(PULONG)he->h_addr_list[i];
}
}
LocalFree(he);
return first ? NO_ERROR : WSA_NOT_ENOUGH_MEMORY;
}
const ULONG* begin() const throw ()
{ return first; }
const ULONG* end() const throw ()
{ return last; }
private:
ULONG addr, *first, *last;
// Not implemented.
Resolver(const Resolver&);
Resolver& operator=(const Resolver&);
};
///////////////////////////////////////////////////////////////////////////////
//
// CLASS
//
// IASRemoteServer
//
// DESCRIPTION
//
// Extends RemoteServer to add IAS specific server information.
//
///////////////////////////////////////////////////////////////////////////////
class IASRemoteServer : public RemoteServer
{
public:
IASRemoteServer(
const RemoteServerConfig& config,
RadiusRemoteServerEntry* entry
)
: RemoteServer(config),
counters(entry)
{
// Create the Remote-Server-Address attribute.
IASAttribute name(true);
name->dwId = IAS_ATTRIBUTE_REMOTE_SERVER_ADDRESS;
name->Value.itType = IASTYPE_INET_ADDR;
name->Value.InetAddr = ntohl(config.ipAddress);
attrs.push_back(name);
// Update our PerfMon entry.
if (counters)
{
counters->dwCounters[radiusAuthClientServerPortNumber] =
ntohs(config.authPort);
counters->dwCounters[radiusAccClientServerPortNumber] =
ntohs(config.acctPort);
}
}
// Attributes to be added to each request.
IASAttributeVectorWithBuffer<1> attrs;
// PerfMon counters.
RadiusRemoteServerEntry* counters;
};
RadiusProxy::RadiusProxy()
: engine(this)
{
}
RadiusProxy::~RadiusProxy() throw ()
{
}
HRESULT RadiusProxy::FinalConstruct() throw ()
{
IAS_PRODUCT_LIMITS limits;
DWORD error = IASGetProductLimits(0, &limits);
if (error != NO_ERROR)
{
return HRESULT_FROM_WIN32(error);
}
maxServerGroups = limits.maxServerGroups;
HRESULT hr = counters.FinalConstruct();
if (SUCCEEDED(hr))
{
hr = translator.FinalConstruct();
if (SUCCEEDED(hr))
{
hr = engine.finalConstruct();
}
}
return hr;
}
STDMETHODIMP RadiusProxy::PutProperty(LONG Id, VARIANT* pValue)
{
if (pValue == NULL) { return E_INVALIDARG; }
HRESULT hr;
switch (Id)
{
case PROPERTY_RADIUSPROXY_SERVERGROUPS:
{
if (V_VT(pValue) != VT_DISPATCH) { return DISP_E_TYPEMISMATCH; }
try
{
configure(V_UNKNOWN(pValue));
hr = S_OK;
}
catch (const _com_error& ce)
{
hr = ce.Error();
}
break;
}
default:
{
hr = DISP_E_MEMBERNOTFOUND;
}
}
return hr;
}
void RadiusProxy::onEvent(
const RadiusEvent& event
) throw ()
{
// Convert the event context to an IASRemoteServer.
IASRemoteServer* server = static_cast<IASRemoteServer*>(event.context);
// Update the counters.
counters.updateCounters(
event.portType,
event.eventType,
(server ? server->counters : NULL),
event.data
);
// We always use the address as an insertion string.
WCHAR addr[16], misc[16];
ias_inet_htow(ntohl(event.ipAddress), addr);
// Set up the default parameters for event reporting.
DWORD eventID = 0;
DWORD numStrings = 1;
DWORD dataSize = 0;
PCWSTR strings[2] = { addr, misc };
const void* rawData = NULL;
// Map the RADIUS event to an IAS event ID.
switch (event.eventType)
{
case eventInvalidAddress:
eventID = PROXY_E_INVALID_ADDRESS;
_itow(ntohs(event.ipPort), misc, 10);
numStrings = 2;
break;
case eventMalformedPacket:
eventID = PROXY_E_MALFORMED_RESPONSE;
dataSize = event.packetLength;
rawData = event.packet;
break;
case eventBadAuthenticator:
eventID = PROXY_E_BAD_AUTHENTICATOR;
break;
case eventBadSignature:
eventID = PROXY_E_BAD_SIGNATURE;
break;
case eventMissingSignature:
eventID = PROXY_E_MISSING_SIGNATURE;
break;
case eventUnknownType:
eventID = PROXY_E_UNKNOWN_TYPE;
_itow(event.packet[0], misc, 10);
numStrings = 2;
break;
case eventUnexpectedResponse:
eventID = PROXY_E_UNEXPECTED_RESPONSE;
dataSize = event.packetLength;
rawData = event.packet;
break;
case eventSendError:
eventID = PROXY_E_SEND_ERROR;
_itow(event.data, misc, 10);
numStrings = 2;
break;
case eventReceiveError:
eventID = PROXY_E_RECV_ERROR;
_itow(event.data, misc, 10);
numStrings = 2;
break;
case eventServerAvailable:
eventID = PROXY_S_SERVER_AVAILABLE;
break;
case eventServerUnavailable:
eventID = PROXY_E_SERVER_UNAVAILABLE;
_itow(server->maxEvents, misc, 10);
numStrings = 2;
break;
}
if (eventID)
{
IASReportEvent(
eventID,
numStrings,
dataSize,
strings,
(void*)rawData
);
}
}
void RadiusProxy::onComplete(
RadiusProxyEngine::Result result,
PVOID context,
RemoteServer* server,
BYTE code,
const RadiusAttribute* begin,
const RadiusAttribute* end
) throw ()
{
IRequest* comreq = (IRequest*)context;
IASRESPONSE response = IAS_RESPONSE_DISCARD_PACKET;
// Map the result to a reason code.
IASREASON reason;
switch (result)
{
case RadiusProxyEngine::resultSuccess:
reason = IAS_SUCCESS;
break;
case RadiusProxyEngine::resultNotEnoughMemory:
reason = IAS_INTERNAL_ERROR;
break;
case RadiusProxyEngine::resultUnknownServerGroup:
reason = IAS_PROXY_UNKNOWN_GROUP;
break;
case RadiusProxyEngine::resultUnknownServer:
reason = IAS_PROXY_UNKNOWN_SERVER;
break;
case RadiusProxyEngine::resultInvalidRequest:
reason = IAS_PROXY_PACKET_TOO_LONG;
break;
case RadiusProxyEngine::resultSendError:
reason = IAS_PROXY_SEND_ERROR;
break;
case RadiusProxyEngine::resultRequestTimeout:
reason = IAS_PROXY_TIMEOUT;
break;
case RadiusProxyEngine::resultCryptoError:
reason = IAS_INTERNAL_ERROR;
break;
default:
reason = IAS_INTERNAL_ERROR;
}
try
{
IASRequest request(comreq);
// Always store the server attributes if available.
if (server)
{
static_cast<IASRemoteServer*>(server)->attrs.store(request);
}
if (reason == IAS_SUCCESS)
{
// Set the response code and determine the flags used for returned
// attributes.
DWORD flags = 0;
switch (code)
{
case RADIUS_ACCESS_ACCEPT:
{
response = IAS_RESPONSE_ACCESS_ACCEPT;
flags = IAS_INCLUDE_IN_ACCEPT;
break;
}
case RADIUS_ACCESS_REJECT:
{
response = IAS_RESPONSE_ACCESS_REJECT;
reason = IAS_PROXY_REJECT;
flags = IAS_INCLUDE_IN_REJECT;
break;
}
case RADIUS_ACCESS_CHALLENGE:
{
response = IAS_RESPONSE_ACCESS_CHALLENGE;
flags = IAS_INCLUDE_IN_CHALLENGE;
break;
}
case RADIUS_ACCOUNTING_RESPONSE:
{
response = IAS_RESPONSE_ACCOUNTING;
flags = IAS_INCLUDE_IN_ACCEPT;
break;
}
default:
{
// The RadiusProxyEngine should never do this.
_com_issue_error(E_FAIL);
}
}
// Convert the received attributes to IAS format.
AttributeVector incoming;
for (const RadiusAttribute* src = begin; src != end; ++src)
{
// Temporary hack to workaround bug in the protocol.
if (src->type != RADIUS_SIGNATURE)
{
translator.fromRadius(*src, flags, incoming);
}
}
if (!incoming.empty())
{
// Get the existing attributes.
AttributeVector existing;
existing.load(request);
// Erase any attributes that are already in the request.
AttributeIterator i, j;
for (i = existing.begin(); i != existing.end(); ++i)
{
// Both the flags ...
if (i->pAttribute->dwFlags & flags)
{
for (j = incoming.begin(); j != incoming.end(); )
{
// ... and the ID have to match.
if (j->pAttribute->dwId == i->pAttribute->dwId)
{
j = incoming.erase(j);
}
else
{
++j;
}
}
}
}
// Store the remaining attributes.
incoming.store(request);
}
}
}
catch (const _com_error& ce)
{
response = IAS_RESPONSE_DISCARD_PACKET;
if (ce.Error() == E_INVALIDARG)
{
// We must have had an error translating from RADIUS to IAS format.
reason = IAS_PROXY_MALFORMED_RESPONSE;
}
else
{
// Probably memory allocation.
reason = IAS_INTERNAL_ERROR;
}
}
// Give it back to the pipeline.
comreq->SetResponse(response, reason);
comreq->ReturnToSource(IAS_REQUEST_STATUS_HANDLED);
// This balances the AddRef we did before calling forwardRequest.
comreq->Release();
}
void RadiusProxy::onAsyncRequest(IRequest* pRequest) throw ()
{
try
{
IASRequest request(pRequest);
// Set the packet code based on the request type.
BYTE packetCode;
switch (request.get_Request())
{
case IAS_REQUEST_ACCESS_REQUEST:
{
packetCode = RADIUS_ACCESS_REQUEST;
break;
}
case IAS_REQUEST_ACCOUNTING:
{
packetCode = RADIUS_ACCOUNTING_REQUEST;
break;
}
default:
{
// The pipeline should never give us a request of the wrong type.
_com_issue_error(E_FAIL);
}
}
// Get the attributes from the request.
AttributeVector all, outgoing;
all.load(request);
for (AttributeIterator i = all.begin(); i != all.end(); ++i)
{
// Send all the attributes received from the client except Proxy-State.
if (i->pAttribute->dwFlags & IAS_RECVD_FROM_CLIENT &&
i->pAttribute->dwId != RADIUS_ATTRIBUTE_PROXY_STATE)
{
translator.toRadius(*(i->pAttribute), outgoing);
}
}
// If the request authenticator contains the CHAP challenge:
// it must be used so get the request authenticator (always to
// simplify the code)
PBYTE requestAuthenticator = 0;
IASAttribute radiusHeader;
if (radiusHeader.load(
request,
IAS_ATTRIBUTE_CLIENT_PACKET_HEADER,
IASTYPE_OCTET_STRING
))
{
requestAuthenticator = radiusHeader->Value.OctetString.lpValue + 4;
}
// Allocate an array of RadiusAttributes.
size_t nbyte = outgoing.size() * sizeof(RadiusAttribute);
RadiusAttribute* begin = (RadiusAttribute*)_alloca(nbyte);
RadiusAttribute* end = begin;
// Load the individual attributes.
for (AttributeIterator j = outgoing.begin(); j != outgoing.end(); ++j)
{
end->type = (BYTE)(j->pAttribute->dwId);
end->length = (BYTE)(j->pAttribute->Value.OctetString.dwLength);
end->value = j->pAttribute->Value.OctetString.lpValue;
++end;
}
// Get the RADIUS Server group. This may be NULL since NAS-State bypasses
// proxy policy.
PIASATTRIBUTE group = IASPeekAttribute(
request,
IAS_ATTRIBUTE_PROVIDER_NAME,
IASTYPE_STRING
);
// AddRef the request because we're giving it to the engine.
pRequest->AddRef();
// Add the request authenticator to the parameters of forwardRequest
// That can be NULL
engine.forwardRequest(
(PVOID)pRequest,
(group ? group->Value.String.pszWide : L""),
packetCode,
requestAuthenticator,
begin,
end
);
}
catch (const _com_error&)
{
// We weren't able to forward it to the engine.
pRequest->SetResponse(IAS_RESPONSE_DISCARD_PACKET, IAS_INTERNAL_ERROR);
pRequest->ReturnToSource(IAS_REQUEST_STATUS_HANDLED);
}
}
void RadiusProxy::configure(IUnknown* root)
{
// Get our IP addresses. We don't care if this fails.
Resolver localAddress;
localAddress.resolve();
// Open the RADIUS Server Groups container. If it's not there, we'll just
// assume there's nothing to configure.
DataStoreObject inGroups(
root,
L"RADIUS Server Groups\0"
);
if (inGroups.empty()) { return; }
LONG numGroups = inGroups.numChildren();
if (numGroups > maxServerGroups)
{
IASTracePrintf(
"License Violation: %ld Remote RADIUS Server Groups are "
"configured, but only %lu are allowed for this product type.",
numGroups,
maxServerGroups
);
IASReportLicenseViolation();
_com_issue_error(IAS_E_LICENSE_VIOLATION);
}
// Reserve space for each group.
ServerGroups outGroups(numGroups);
// Iterate through the groups.
DataStoreObject inGroup;
while (inGroups.nextChild(inGroup))
{
// Get the group name.
CComBSTR groupName;
inGroup.getValue(L"Name", &groupName);
// Reserve space for each server. This is really a guess since a server
// may resolve to multiple IP addresses.
RemoteServers outServers(inGroup.numChildren());
// Iterate through the servers.
DataStoreObject inServer;
while (inGroup.nextChild(inServer))
{
configureServer(localAddress, groupName, inServer, outServers);
}
// Ignore any empty groups.
if (outServers.empty()) { continue; }
// Create the new group.
ServerGroupPtr outGroup(new ServerGroup(
groupName,
outServers.begin(),
outServers.end()
));
outGroups.push_back(outGroup);
}
// Wow, we're finally done.
if (engine.setServerGroups(
outGroups.begin(),
outGroups.end()
) == false)
{
// most likely reason for failure is out of memory error
_com_issue_error(E_OUTOFMEMORY);
}
}
void RadiusProxy::configureServer(
const Resolver& localAddress,
const wchar_t* groupName,
DataStoreObject& inServer,
RemoteServers& outServers
)
{
USES_CONVERSION;
// Populate the RemoteServerConfig. It has a lot of fields.
RemoteServerConfig config;
CComBSTR name;
inServer.getValue(L"Name", &name);
CLSIDFromString(name, &config.guid);
ULONG port;
inServer.getValue(L"Server Authentication Port", &port, 1812);
config.authPort = htons((USHORT)port);
inServer.getValue(L"Server Accounting Port", &port, 1813);
config.acctPort = htons((USHORT)port);
CComBSTR bstrAuth;
inServer.getValue(L"Authentication Secret", &bstrAuth);
config.authSecret = W2A(bstrAuth);
CComBSTR bstrAcct;
inServer.getValue(L"Accounting Secret", &bstrAcct, bstrAuth);
config.acctSecret = W2A(bstrAcct);
inServer.getValue(L"Priority", &config.priority, 1);
inServer.getValue(L"Weight", &config.weight, 50);
// Ignore any zero weight servers.
if (config.weight == 0) { return; }
// We don't use this feature for now.
config.sendSignature = false;
inServer.getValue(
L"Forward Accounting On/Off",
&config.sendAcctOnOff,
true
);
inServer.getValue(L"Timeout", &config.timeout, 3);
// Don't allow zero for timeout
if (config.timeout == 0) { config.timeout = 1; }
inServer.getValue(L"Maximum Lost Packets", &config.maxLost, 5);
// Don't allow zero for maxLost.
if (config.maxLost == 0) { config.maxLost = 1; }
inServer.getValue(
L"Blackout Interval",
&config.blackout,
10 * config.timeout
);
if (config.blackout < config.timeout)
{
// Blackout interval must be >= request timeout.
config.blackout = config.timeout;
}
// These need to be in msec.
config.timeout *= 1000;
config.blackout *= 1000;
// Now we have to resolve the server name to an IP address.
CComBSTR address;
inServer.getValue(L"Address", &address);
Resolver serverAddress;
ULONG error = serverAddress.resolve(address);
if (error)
{
WCHAR errorCode[16];
_itow(GetLastError(), errorCode, 10);
PCWSTR strings[3] = { address, groupName, errorCode };
IASReportEvent(
PROXY_E_HOST_NOT_FOUND,
3,
0,
strings,
NULL
);
}
// Create a server entry for each address.
for (const ULONG* addr = serverAddress.begin();
addr != serverAddress.end();
++addr)
{
// Don't allow them to proxy locally.
if (localAddress.contains(*addr))
{
WCHAR ipAddress[16];
ias_inet_htow(ntohl(*addr), ipAddress);
PCWSTR strings[3] = { address, groupName, ipAddress };
IASReportEvent(
PROXY_E_LOCAL_SERVER,
3,
0,
strings,
NULL
);
continue;
}
// Look up the PerfMon counters.
RadiusRemoteServerEntry* entry = counters.getRemoteServerEntry(
*addr
);
// Create the new server
config.ipAddress = *addr;
RemoteServerPtr outServer(new IASRemoteServer(
config,
entry
));
outServers.push_back(outServer);
}
}