accounting.c 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544
  1. /*
  2. * hostapd / RADIUS Accounting
  3. * Copyright (c) 2002-2009, 2012-2015, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "utils/includes.h"
  9. #include "utils/common.h"
  10. #include "utils/eloop.h"
  11. #include "eapol_auth/eapol_auth_sm.h"
  12. #include "eapol_auth/eapol_auth_sm_i.h"
  13. #include "radius/radius.h"
  14. #include "radius/radius_client.h"
  15. #include "hostapd.h"
  16. #include "ieee802_1x.h"
  17. #include "ap_config.h"
  18. #include "sta_info.h"
  19. #include "ap_drv_ops.h"
  20. #include "accounting.h"
  21. /* Default interval in seconds for polling TX/RX octets from the driver if
  22. * STA is not using interim accounting. This detects wrap arounds for
  23. * input/output octets and updates Acct-{Input,Output}-Gigawords. */
  24. #define ACCT_DEFAULT_UPDATE_INTERVAL 300
  25. static void accounting_sta_interim(struct hostapd_data *hapd,
  26. struct sta_info *sta);
  27. static struct radius_msg * accounting_msg(struct hostapd_data *hapd,
  28. struct sta_info *sta,
  29. int status_type)
  30. {
  31. struct radius_msg *msg;
  32. char buf[128];
  33. u8 *val;
  34. size_t len;
  35. int i;
  36. struct wpabuf *b;
  37. struct os_time now;
  38. msg = radius_msg_new(RADIUS_CODE_ACCOUNTING_REQUEST,
  39. radius_client_get_id(hapd->radius));
  40. if (msg == NULL) {
  41. wpa_printf(MSG_INFO, "Could not create new RADIUS packet");
  42. return NULL;
  43. }
  44. if (!radius_msg_add_attr_int32(msg, RADIUS_ATTR_ACCT_STATUS_TYPE,
  45. status_type)) {
  46. wpa_printf(MSG_INFO, "Could not add Acct-Status-Type");
  47. goto fail;
  48. }
  49. if (sta) {
  50. if (!hostapd_config_get_radius_attr(
  51. hapd->conf->radius_acct_req_attr,
  52. RADIUS_ATTR_ACCT_AUTHENTIC) &&
  53. !radius_msg_add_attr_int32(msg, RADIUS_ATTR_ACCT_AUTHENTIC,
  54. hapd->conf->ieee802_1x ?
  55. RADIUS_ACCT_AUTHENTIC_RADIUS :
  56. RADIUS_ACCT_AUTHENTIC_LOCAL)) {
  57. wpa_printf(MSG_INFO, "Could not add Acct-Authentic");
  58. goto fail;
  59. }
  60. /* Use 802.1X identity if available */
  61. val = ieee802_1x_get_identity(sta->eapol_sm, &len);
  62. /* Use RADIUS ACL identity if 802.1X provides no identity */
  63. if (!val && sta->identity) {
  64. val = (u8 *) sta->identity;
  65. len = os_strlen(sta->identity);
  66. }
  67. /* Use STA MAC if neither 802.1X nor RADIUS ACL provided
  68. * identity */
  69. if (!val) {
  70. os_snprintf(buf, sizeof(buf), RADIUS_ADDR_FORMAT,
  71. MAC2STR(sta->addr));
  72. val = (u8 *) buf;
  73. len = os_strlen(buf);
  74. }
  75. if (!radius_msg_add_attr(msg, RADIUS_ATTR_USER_NAME, val,
  76. len)) {
  77. wpa_printf(MSG_INFO, "Could not add User-Name");
  78. goto fail;
  79. }
  80. }
  81. if (add_common_radius_attr(hapd, hapd->conf->radius_acct_req_attr, sta,
  82. msg) < 0)
  83. goto fail;
  84. if (sta) {
  85. for (i = 0; ; i++) {
  86. val = ieee802_1x_get_radius_class(sta->eapol_sm, &len,
  87. i);
  88. if (val == NULL)
  89. break;
  90. if (!radius_msg_add_attr(msg, RADIUS_ATTR_CLASS,
  91. val, len)) {
  92. wpa_printf(MSG_INFO, "Could not add Class");
  93. goto fail;
  94. }
  95. }
  96. b = ieee802_1x_get_radius_cui(sta->eapol_sm);
  97. if (b &&
  98. !radius_msg_add_attr(msg,
  99. RADIUS_ATTR_CHARGEABLE_USER_IDENTITY,
  100. wpabuf_head(b), wpabuf_len(b))) {
  101. wpa_printf(MSG_ERROR, "Could not add CUI");
  102. goto fail;
  103. }
  104. if (!b && sta->radius_cui &&
  105. !radius_msg_add_attr(msg,
  106. RADIUS_ATTR_CHARGEABLE_USER_IDENTITY,
  107. (u8 *) sta->radius_cui,
  108. os_strlen(sta->radius_cui))) {
  109. wpa_printf(MSG_ERROR, "Could not add CUI from ACL");
  110. goto fail;
  111. }
  112. if (sta->ipaddr &&
  113. !radius_msg_add_attr_int32(msg,
  114. RADIUS_ATTR_FRAMED_IP_ADDRESS,
  115. be_to_host32(sta->ipaddr))) {
  116. wpa_printf(MSG_ERROR,
  117. "Could not add Framed-IP-Address");
  118. goto fail;
  119. }
  120. }
  121. os_get_time(&now);
  122. if (now.sec > 1000000000 &&
  123. !radius_msg_add_attr_int32(msg, RADIUS_ATTR_EVENT_TIMESTAMP,
  124. now.sec)) {
  125. wpa_printf(MSG_INFO, "Could not add Event-Timestamp");
  126. goto fail;
  127. }
  128. /*
  129. * Add Acct-Delay-Time with zero value for the first transmission. This
  130. * will be updated within radius_client.c when retransmitting the frame.
  131. */
  132. if (!radius_msg_add_attr_int32(msg, RADIUS_ATTR_ACCT_DELAY_TIME, 0)) {
  133. wpa_printf(MSG_INFO, "Could not add Acct-Delay-Time");
  134. goto fail;
  135. }
  136. return msg;
  137. fail:
  138. radius_msg_free(msg);
  139. return NULL;
  140. }
  141. static int accounting_sta_update_stats(struct hostapd_data *hapd,
  142. struct sta_info *sta,
  143. struct hostap_sta_driver_data *data)
  144. {
  145. if (hostapd_drv_read_sta_data(hapd, data, sta->addr))
  146. return -1;
  147. if (!data->bytes_64bit) {
  148. /* Extend 32-bit counters from the driver to 64-bit counters */
  149. if (sta->last_rx_bytes_lo > data->rx_bytes)
  150. sta->last_rx_bytes_hi++;
  151. sta->last_rx_bytes_lo = data->rx_bytes;
  152. if (sta->last_tx_bytes_lo > data->tx_bytes)
  153. sta->last_tx_bytes_hi++;
  154. sta->last_tx_bytes_lo = data->tx_bytes;
  155. }
  156. hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_RADIUS,
  157. HOSTAPD_LEVEL_DEBUG,
  158. "updated TX/RX stats: rx_bytes=%llu [%u:%u] tx_bytes=%llu [%u:%u] bytes_64bit=%d",
  159. data->rx_bytes, sta->last_rx_bytes_hi,
  160. sta->last_rx_bytes_lo,
  161. data->tx_bytes, sta->last_tx_bytes_hi,
  162. sta->last_tx_bytes_lo,
  163. data->bytes_64bit);
  164. return 0;
  165. }
  166. static void accounting_interim_update(void *eloop_ctx, void *timeout_ctx)
  167. {
  168. struct hostapd_data *hapd = eloop_ctx;
  169. struct sta_info *sta = timeout_ctx;
  170. int interval;
  171. if (sta->acct_interim_interval) {
  172. accounting_sta_interim(hapd, sta);
  173. interval = sta->acct_interim_interval;
  174. } else {
  175. struct hostap_sta_driver_data data;
  176. accounting_sta_update_stats(hapd, sta, &data);
  177. interval = ACCT_DEFAULT_UPDATE_INTERVAL;
  178. }
  179. eloop_register_timeout(interval, 0, accounting_interim_update,
  180. hapd, sta);
  181. }
  182. /**
  183. * accounting_sta_start - Start STA accounting
  184. * @hapd: hostapd BSS data
  185. * @sta: The station
  186. */
  187. void accounting_sta_start(struct hostapd_data *hapd, struct sta_info *sta)
  188. {
  189. struct radius_msg *msg;
  190. int interval;
  191. if (sta->acct_session_started)
  192. return;
  193. hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_RADIUS,
  194. HOSTAPD_LEVEL_INFO,
  195. "starting accounting session %016llX",
  196. (unsigned long long) sta->acct_session_id);
  197. os_get_reltime(&sta->acct_session_start);
  198. sta->last_rx_bytes_hi = 0;
  199. sta->last_rx_bytes_lo = 0;
  200. sta->last_tx_bytes_hi = 0;
  201. sta->last_tx_bytes_lo = 0;
  202. hostapd_drv_sta_clear_stats(hapd, sta->addr);
  203. if (!hapd->conf->radius->acct_server)
  204. return;
  205. if (sta->acct_interim_interval)
  206. interval = sta->acct_interim_interval;
  207. else
  208. interval = ACCT_DEFAULT_UPDATE_INTERVAL;
  209. eloop_register_timeout(interval, 0, accounting_interim_update,
  210. hapd, sta);
  211. msg = accounting_msg(hapd, sta, RADIUS_ACCT_STATUS_TYPE_START);
  212. if (msg &&
  213. radius_client_send(hapd->radius, msg, RADIUS_ACCT, sta->addr) < 0)
  214. radius_msg_free(msg);
  215. sta->acct_session_started = 1;
  216. }
  217. static void accounting_sta_report(struct hostapd_data *hapd,
  218. struct sta_info *sta, int stop)
  219. {
  220. struct radius_msg *msg;
  221. int cause = sta->acct_terminate_cause;
  222. struct hostap_sta_driver_data data;
  223. struct os_reltime now_r, diff;
  224. u64 bytes;
  225. if (!hapd->conf->radius->acct_server)
  226. return;
  227. msg = accounting_msg(hapd, sta,
  228. stop ? RADIUS_ACCT_STATUS_TYPE_STOP :
  229. RADIUS_ACCT_STATUS_TYPE_INTERIM_UPDATE);
  230. if (!msg) {
  231. wpa_printf(MSG_INFO, "Could not create RADIUS Accounting message");
  232. return;
  233. }
  234. os_get_reltime(&now_r);
  235. os_reltime_sub(&now_r, &sta->acct_session_start, &diff);
  236. if (!radius_msg_add_attr_int32(msg, RADIUS_ATTR_ACCT_SESSION_TIME,
  237. diff.sec)) {
  238. wpa_printf(MSG_INFO, "Could not add Acct-Session-Time");
  239. goto fail;
  240. }
  241. if (accounting_sta_update_stats(hapd, sta, &data) == 0) {
  242. if (!radius_msg_add_attr_int32(msg,
  243. RADIUS_ATTR_ACCT_INPUT_PACKETS,
  244. data.rx_packets)) {
  245. wpa_printf(MSG_INFO, "Could not add Acct-Input-Packets");
  246. goto fail;
  247. }
  248. if (!radius_msg_add_attr_int32(msg,
  249. RADIUS_ATTR_ACCT_OUTPUT_PACKETS,
  250. data.tx_packets)) {
  251. wpa_printf(MSG_INFO, "Could not add Acct-Output-Packets");
  252. goto fail;
  253. }
  254. if (data.bytes_64bit)
  255. bytes = data.rx_bytes;
  256. else
  257. bytes = ((u64) sta->last_rx_bytes_hi << 32) |
  258. sta->last_rx_bytes_lo;
  259. if (!radius_msg_add_attr_int32(msg,
  260. RADIUS_ATTR_ACCT_INPUT_OCTETS,
  261. (u32) bytes)) {
  262. wpa_printf(MSG_INFO, "Could not add Acct-Input-Octets");
  263. goto fail;
  264. }
  265. if (!radius_msg_add_attr_int32(msg,
  266. RADIUS_ATTR_ACCT_INPUT_GIGAWORDS,
  267. (u32) (bytes >> 32))) {
  268. wpa_printf(MSG_INFO, "Could not add Acct-Input-Gigawords");
  269. goto fail;
  270. }
  271. if (data.bytes_64bit)
  272. bytes = data.tx_bytes;
  273. else
  274. bytes = ((u64) sta->last_tx_bytes_hi << 32) |
  275. sta->last_tx_bytes_lo;
  276. if (!radius_msg_add_attr_int32(msg,
  277. RADIUS_ATTR_ACCT_OUTPUT_OCTETS,
  278. (u32) bytes)) {
  279. wpa_printf(MSG_INFO, "Could not add Acct-Output-Octets");
  280. goto fail;
  281. }
  282. if (!radius_msg_add_attr_int32(msg,
  283. RADIUS_ATTR_ACCT_OUTPUT_GIGAWORDS,
  284. (u32) (bytes >> 32))) {
  285. wpa_printf(MSG_INFO, "Could not add Acct-Output-Gigawords");
  286. goto fail;
  287. }
  288. }
  289. if (eloop_terminated())
  290. cause = RADIUS_ACCT_TERMINATE_CAUSE_ADMIN_REBOOT;
  291. if (stop && cause &&
  292. !radius_msg_add_attr_int32(msg, RADIUS_ATTR_ACCT_TERMINATE_CAUSE,
  293. cause)) {
  294. wpa_printf(MSG_INFO, "Could not add Acct-Terminate-Cause");
  295. goto fail;
  296. }
  297. if (radius_client_send(hapd->radius, msg,
  298. stop ? RADIUS_ACCT : RADIUS_ACCT_INTERIM,
  299. sta->addr) < 0)
  300. goto fail;
  301. return;
  302. fail:
  303. radius_msg_free(msg);
  304. }
  305. /**
  306. * accounting_sta_interim - Send a interim STA accounting report
  307. * @hapd: hostapd BSS data
  308. * @sta: The station
  309. */
  310. static void accounting_sta_interim(struct hostapd_data *hapd,
  311. struct sta_info *sta)
  312. {
  313. if (sta->acct_session_started)
  314. accounting_sta_report(hapd, sta, 0);
  315. }
  316. /**
  317. * accounting_sta_stop - Stop STA accounting
  318. * @hapd: hostapd BSS data
  319. * @sta: The station
  320. */
  321. void accounting_sta_stop(struct hostapd_data *hapd, struct sta_info *sta)
  322. {
  323. if (sta->acct_session_started) {
  324. accounting_sta_report(hapd, sta, 1);
  325. eloop_cancel_timeout(accounting_interim_update, hapd, sta);
  326. hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_RADIUS,
  327. HOSTAPD_LEVEL_INFO,
  328. "stopped accounting session %016llX",
  329. (unsigned long long) sta->acct_session_id);
  330. sta->acct_session_started = 0;
  331. }
  332. }
  333. int accounting_sta_get_id(struct hostapd_data *hapd, struct sta_info *sta)
  334. {
  335. return radius_gen_session_id((u8 *) &sta->acct_session_id,
  336. sizeof(sta->acct_session_id));
  337. }
  338. /**
  339. * accounting_receive - Process the RADIUS frames from Accounting Server
  340. * @msg: RADIUS response message
  341. * @req: RADIUS request message
  342. * @shared_secret: RADIUS shared secret
  343. * @shared_secret_len: Length of shared_secret in octets
  344. * @data: Context data (struct hostapd_data *)
  345. * Returns: Processing status
  346. */
  347. static RadiusRxResult
  348. accounting_receive(struct radius_msg *msg, struct radius_msg *req,
  349. const u8 *shared_secret, size_t shared_secret_len,
  350. void *data)
  351. {
  352. if (radius_msg_get_hdr(msg)->code != RADIUS_CODE_ACCOUNTING_RESPONSE) {
  353. wpa_printf(MSG_INFO, "Unknown RADIUS message code");
  354. return RADIUS_RX_UNKNOWN;
  355. }
  356. if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) {
  357. wpa_printf(MSG_INFO, "Incoming RADIUS packet did not have correct Authenticator - dropped");
  358. return RADIUS_RX_INVALID_AUTHENTICATOR;
  359. }
  360. return RADIUS_RX_PROCESSED;
  361. }
  362. static void accounting_report_state(struct hostapd_data *hapd, int on)
  363. {
  364. struct radius_msg *msg;
  365. if (!hapd->conf->radius->acct_server || hapd->radius == NULL)
  366. return;
  367. /* Inform RADIUS server that accounting will start/stop so that the
  368. * server can close old accounting sessions. */
  369. msg = accounting_msg(hapd, NULL,
  370. on ? RADIUS_ACCT_STATUS_TYPE_ACCOUNTING_ON :
  371. RADIUS_ACCT_STATUS_TYPE_ACCOUNTING_OFF);
  372. if (!msg)
  373. return;
  374. if (hapd->acct_session_id) {
  375. char buf[20];
  376. os_snprintf(buf, sizeof(buf), "%016llX",
  377. (unsigned long long) hapd->acct_session_id);
  378. if (!radius_msg_add_attr(msg, RADIUS_ATTR_ACCT_SESSION_ID,
  379. (u8 *) buf, os_strlen(buf)))
  380. wpa_printf(MSG_ERROR, "Could not add Acct-Session-Id");
  381. }
  382. if (radius_client_send(hapd->radius, msg, RADIUS_ACCT, NULL) < 0)
  383. radius_msg_free(msg);
  384. }
  385. static void accounting_interim_error_cb(const u8 *addr, void *ctx)
  386. {
  387. struct hostapd_data *hapd = ctx;
  388. struct sta_info *sta;
  389. unsigned int i, wait_time;
  390. int res;
  391. sta = ap_get_sta(hapd, addr);
  392. if (!sta)
  393. return;
  394. sta->acct_interim_errors++;
  395. if (sta->acct_interim_errors > 10 /* RADIUS_CLIENT_MAX_RETRIES */) {
  396. wpa_printf(MSG_DEBUG,
  397. "Interim RADIUS accounting update failed for " MACSTR
  398. " - too many errors, abandon this interim accounting update",
  399. MAC2STR(addr));
  400. sta->acct_interim_errors = 0;
  401. /* Next update will be tried after normal update interval */
  402. return;
  403. }
  404. /*
  405. * Use a shorter update interval as an improved retransmission mechanism
  406. * for failed interim accounting updates. This allows the statistics to
  407. * be updated for each retransmission.
  408. *
  409. * RADIUS client code has already waited RADIUS_CLIENT_FIRST_WAIT.
  410. * Schedule the first retry attempt immediately and every following one
  411. * with exponential backoff.
  412. */
  413. if (sta->acct_interim_errors == 1) {
  414. wait_time = 0;
  415. } else {
  416. wait_time = 3; /* RADIUS_CLIENT_FIRST_WAIT */
  417. for (i = 1; i < sta->acct_interim_errors; i++)
  418. wait_time *= 2;
  419. }
  420. res = eloop_deplete_timeout(wait_time, 0, accounting_interim_update,
  421. hapd, sta);
  422. if (res == 1)
  423. wpa_printf(MSG_DEBUG,
  424. "Interim RADIUS accounting update failed for " MACSTR
  425. " (error count: %u) - schedule next update in %u seconds",
  426. MAC2STR(addr), sta->acct_interim_errors, wait_time);
  427. else if (res == 0)
  428. wpa_printf(MSG_DEBUG,
  429. "Interim RADIUS accounting update failed for " MACSTR
  430. " (error count: %u)", MAC2STR(addr),
  431. sta->acct_interim_errors);
  432. else
  433. wpa_printf(MSG_DEBUG,
  434. "Interim RADIUS accounting update failed for " MACSTR
  435. " (error count: %u) - no timer found", MAC2STR(addr),
  436. sta->acct_interim_errors);
  437. }
  438. /**
  439. * accounting_init: Initialize accounting
  440. * @hapd: hostapd BSS data
  441. * Returns: 0 on success, -1 on failure
  442. */
  443. int accounting_init(struct hostapd_data *hapd)
  444. {
  445. if (radius_gen_session_id((u8 *) &hapd->acct_session_id,
  446. sizeof(hapd->acct_session_id)) < 0)
  447. return -1;
  448. if (radius_client_register(hapd->radius, RADIUS_ACCT,
  449. accounting_receive, hapd))
  450. return -1;
  451. radius_client_set_interim_error_cb(hapd->radius,
  452. accounting_interim_error_cb, hapd);
  453. accounting_report_state(hapd, 1);
  454. return 0;
  455. }
  456. /**
  457. * accounting_deinit: Deinitialize accounting
  458. * @hapd: hostapd BSS data
  459. */
  460. void accounting_deinit(struct hostapd_data *hapd)
  461. {
  462. accounting_report_state(hapd, 0);
  463. }