1 /*
2  * Copyright (C) 2000 Alfredo Andres Omella.  All rights reserved.
3  *
4  * Redistribution and use in source and binary forms, with or without
5  * modification, are permitted provided that the following conditions
6  * are met:
7  *
8  *   1. Redistributions of source code must retain the above copyright
9  *      notice, this list of conditions and the following disclaimer.
10  *   2. Redistributions in binary form must reproduce the above copyright
11  *      notice, this list of conditions and the following disclaimer in
12  *      the documentation and/or other materials provided with the
13  *      distribution.
14  *   3. The names of the authors may not be used to endorse or promote
15  *      products derived from this software without specific prior
16  *      written permission.
17  *
18  * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
19  * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
20  * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
21  */
22 /*
23  * Radius printer routines as specified on:
24  *
25  * RFC 2865:
26  *      "Remote Authentication Dial In User Service (RADIUS)"
27  *
28  * RFC 2866:
29  *      "RADIUS Accounting"
30  *
31  * RFC 2867:
32  *      "RADIUS Accounting Modifications for Tunnel Protocol Support"
33  *
34  * RFC 2868:
35  *      "RADIUS Attributes for Tunnel Protocol Support"
36  *
37  * RFC 2869:
38  *      "RADIUS Extensions"
39  *
40  * RFC 4675:
41  *      "RADIUS Attributes for Virtual LAN and Priority Support"
42  *
43  * RFC 5176:
44  *      "Dynamic Authorization Extensions to RADIUS"
45  *
46  * Alfredo Andres Omella (aandres@s21sec.com) v0.1 2000/09/15
47  *
48  * TODO: Among other things to print ok MacIntosh and Vendor values
49  */
50 
51 #define NETDISSECT_REWORKED
52 #ifdef HAVE_CONFIG_H
53 #include "config.h"
54 #endif
55 
56 #include <tcpdump-stdinc.h>
57 
58 #include <string.h>
59 
60 #include "interface.h"
61 #include "addrtoname.h"
62 #include "extract.h"
63 #include "oui.h"
64 
65 static const char tstr[] = " [|radius]";
66 
67 #define TAM_SIZE(x) (sizeof(x)/sizeof(x[0]) )
68 
69 #define PRINT_HEX(bytes_len, ptr_data)                               \
70            while(bytes_len)                                          \
71            {                                                         \
72               ND_PRINT((ndo, "%02X", *ptr_data ));                   \
73               ptr_data++;                                            \
74               bytes_len--;                                           \
75            }
76 
77 
78 /* Radius packet codes */
79 #define RADCMD_ACCESS_REQ   1 /* Access-Request      */
80 #define RADCMD_ACCESS_ACC   2 /* Access-Accept       */
81 #define RADCMD_ACCESS_REJ   3 /* Access-Reject       */
82 #define RADCMD_ACCOUN_REQ   4 /* Accounting-Request  */
83 #define RADCMD_ACCOUN_RES   5 /* Accounting-Response */
84 #define RADCMD_ACCESS_CHA  11 /* Access-Challenge    */
85 #define RADCMD_STATUS_SER  12 /* Status-Server       */
86 #define RADCMD_STATUS_CLI  13 /* Status-Client       */
87 #define RADCMD_DISCON_REQ  40 /* Disconnect-Request  */
88 #define RADCMD_DISCON_ACK  41 /* Disconnect-ACK      */
89 #define RADCMD_DISCON_NAK  42 /* Disconnect-NAK      */
90 #define RADCMD_COA_REQ     43 /* CoA-Request         */
91 #define RADCMD_COA_ACK     44 /* CoA-ACK             */
92 #define RADCMD_COA_NAK     45 /* CoA-NAK             */
93 #define RADCMD_RESERVED   255 /* Reserved            */
94 
95 static const struct tok radius_command_values[] = {
96     { RADCMD_ACCESS_REQ, "Access-Request" },
97     { RADCMD_ACCESS_ACC, "Access-Accept" },
98     { RADCMD_ACCESS_REJ, "Access-Reject" },
99     { RADCMD_ACCOUN_REQ, "Accounting-Request" },
100     { RADCMD_ACCOUN_RES, "Accounting-Response" },
101     { RADCMD_ACCESS_CHA, "Access-Challenge" },
102     { RADCMD_STATUS_SER, "Status-Server" },
103     { RADCMD_STATUS_CLI, "Status-Client" },
104     { RADCMD_DISCON_REQ, "Disconnect-Request" },
105     { RADCMD_DISCON_ACK, "Disconnect-ACK" },
106     { RADCMD_DISCON_NAK, "Disconnect-NAK" },
107     { RADCMD_COA_REQ,    "CoA-Request" },
108     { RADCMD_COA_ACK,    "CoA-ACK" },
109     { RADCMD_COA_NAK,    "CoA-NAK" },
110     { RADCMD_RESERVED,   "Reserved" },
111     { 0, NULL}
112 };
113 
114 /********************************/
115 /* Begin Radius Attribute types */
116 /********************************/
117 #define SERV_TYPE    6
118 #define FRM_IPADDR   8
119 #define LOG_IPHOST  14
120 #define LOG_SERVICE 15
121 #define FRM_IPX     23
122 #define SESSION_TIMEOUT   27
123 #define IDLE_TIMEOUT      28
124 #define FRM_ATALK_LINK    37
125 #define FRM_ATALK_NETWORK 38
126 
127 #define ACCT_DELAY        41
128 #define ACCT_SESSION_TIME 46
129 
130 #define EGRESS_VLAN_ID   56
131 #define EGRESS_VLAN_NAME 58
132 
133 #define TUNNEL_TYPE        64
134 #define TUNNEL_MEDIUM      65
135 #define TUNNEL_CLIENT_END  66
136 #define TUNNEL_SERVER_END  67
137 #define TUNNEL_PASS        69
138 
139 #define ARAP_PASS          70
140 #define ARAP_FEATURES      71
141 
142 #define TUNNEL_PRIV_GROUP  81
143 #define TUNNEL_ASSIGN_ID   82
144 #define TUNNEL_PREFERENCE  83
145 
146 #define ARAP_CHALLENGE_RESP 84
147 #define ACCT_INT_INTERVAL   85
148 
149 #define TUNNEL_CLIENT_AUTH 90
150 #define TUNNEL_SERVER_AUTH 91
151 /********************************/
152 /* End Radius Attribute types */
153 /********************************/
154 
155 #define RFC4675_TAGGED   0x31
156 #define RFC4675_UNTAGGED 0x32
157 
158 static const struct tok rfc4675_tagged[] = {
159     { RFC4675_TAGGED,   "Tagged" },
160     { RFC4675_UNTAGGED, "Untagged" },
161     { 0, NULL}
162 };
163 
164 
165 static void print_attr_string(netdissect_options *, register u_char *, u_int, u_short );
166 static void print_attr_num(netdissect_options *, register u_char *, u_int, u_short );
167 static void print_vendor_attr(netdissect_options *, register u_char *, u_int, u_short );
168 static void print_attr_address(netdissect_options *, register u_char *, u_int, u_short);
169 static void print_attr_time(netdissect_options *, register u_char *, u_int, u_short);
170 static void print_attr_strange(netdissect_options *, register u_char *, u_int, u_short);
171 
172 
173 struct radius_hdr { uint8_t  code; /* Radius packet code  */
174                     uint8_t  id;   /* Radius packet id    */
175                     uint16_t len;  /* Radius total length */
176                     uint8_t  auth[16]; /* Authenticator   */
177                   };
178 
179 #define MIN_RADIUS_LEN	20
180 
181 struct radius_attr { uint8_t type; /* Attribute type   */
182                      uint8_t len;  /* Attribute length */
183                    };
184 
185 
186 /* Service-Type Attribute standard values */
187 static const char *serv_type[]={ NULL,
188                                 "Login",
189                                 "Framed",
190                                 "Callback Login",
191                                 "Callback Framed",
192                                 "Outbound",
193                                 "Administrative",
194                                 "NAS Prompt",
195                                 "Authenticate Only",
196                                 "Callback NAS Prompt",
197                                 "Call Check",
198                                 "Callback Administrative",
199                                };
200 
201 /* Framed-Protocol Attribute standard values */
202 static const char *frm_proto[]={ NULL,
203                                  "PPP",
204                                  "SLIP",
205                                  "ARAP",
206                                  "Gandalf proprietary",
207                                  "Xylogics IPX/SLIP",
208                                  "X.75 Synchronous",
209                                };
210 
211 /* Framed-Routing Attribute standard values */
212 static const char *frm_routing[]={ "None",
213                                    "Send",
214                                    "Listen",
215                                    "Send&Listen",
216                                  };
217 
218 /* Framed-Compression Attribute standard values */
219 static const char *frm_comp[]={ "None",
220                                 "VJ TCP/IP",
221                                 "IPX",
222                                 "Stac-LZS",
223                               };
224 
225 /* Login-Service Attribute standard values */
226 static const char *login_serv[]={ "Telnet",
227                                   "Rlogin",
228                                   "TCP Clear",
229                                   "PortMaster(proprietary)",
230                                   "LAT",
231                                   "X.25-PAD",
232                                   "X.25-T3POS",
233                                   "Unassigned",
234                                   "TCP Clear Quiet",
235                                 };
236 
237 
238 /* Termination-Action Attribute standard values */
239 static const char *term_action[]={ "Default",
240                                    "RADIUS-Request",
241                                  };
242 
243 /* Ingress-Filters Attribute standard values */
244 static const char *ingress_filters[]={ NULL,
245                                        "Enabled",
246                                        "Disabled",
247                                      };
248 
249 /* NAS-Port-Type Attribute standard values */
250 static const char *nas_port_type[]={ "Async",
251                                      "Sync",
252                                      "ISDN Sync",
253                                      "ISDN Async V.120",
254                                      "ISDN Async V.110",
255                                      "Virtual",
256                                      "PIAFS",
257                                      "HDLC Clear Channel",
258                                      "X.25",
259                                      "X.75",
260                                      "G.3 Fax",
261                                      "SDSL",
262                                      "ADSL-CAP",
263                                      "ADSL-DMT",
264                                      "ISDN-DSL",
265                                      "Ethernet",
266                                      "xDSL",
267                                      "Cable",
268                                      "Wireless - Other",
269                                      "Wireless - IEEE 802.11",
270                                    };
271 
272 /* Acct-Status-Type Accounting Attribute standard values */
273 static const char *acct_status[]={ NULL,
274                                    "Start",
275                                    "Stop",
276                                    "Interim-Update",
277                                    "Unassigned",
278                                    "Unassigned",
279                                    "Unassigned",
280                                    "Accounting-On",
281                                    "Accounting-Off",
282                                    "Tunnel-Start",
283                                    "Tunnel-Stop",
284                                    "Tunnel-Reject",
285                                    "Tunnel-Link-Start",
286                                    "Tunnel-Link-Stop",
287                                    "Tunnel-Link-Reject",
288                                    "Failed",
289                                  };
290 
291 /* Acct-Authentic Accounting Attribute standard values */
292 static const char *acct_auth[]={ NULL,
293                                  "RADIUS",
294                                  "Local",
295                                  "Remote",
296                                };
297 
298 /* Acct-Terminate-Cause Accounting Attribute standard values */
299 static const char *acct_term[]={ NULL,
300                                  "User Request",
301                                  "Lost Carrier",
302                                  "Lost Service",
303                                  "Idle Timeout",
304                                  "Session Timeout",
305                                  "Admin Reset",
306                                  "Admin Reboot",
307                                  "Port Error",
308                                  "NAS Error",
309                                  "NAS Request",
310                                  "NAS Reboot",
311                                  "Port Unneeded",
312                                  "Port Preempted",
313                                  "Port Suspended",
314                                  "Service Unavailable",
315                                  "Callback",
316                                  "User Error",
317                                  "Host Request",
318                                };
319 
320 /* Tunnel-Type Attribute standard values */
321 static const char *tunnel_type[]={ NULL,
322                                    "PPTP",
323                                    "L2F",
324                                    "L2TP",
325                                    "ATMP",
326                                    "VTP",
327                                    "AH",
328                                    "IP-IP",
329                                    "MIN-IP-IP",
330                                    "ESP",
331                                    "GRE",
332                                    "DVS",
333                                    "IP-in-IP Tunneling",
334                                  };
335 
336 /* Tunnel-Medium-Type Attribute standard values */
337 static const char *tunnel_medium[]={ NULL,
338                                      "IPv4",
339                                      "IPv6",
340                                      "NSAP",
341                                      "HDLC",
342                                      "BBN 1822",
343                                      "802",
344                                      "E.163",
345                                      "E.164",
346                                      "F.69",
347                                      "X.121",
348                                      "IPX",
349                                      "Appletalk",
350                                      "Decnet IV",
351                                      "Banyan Vines",
352                                      "E.164 with NSAP subaddress",
353                                    };
354 
355 /* ARAP-Zone-Access Attribute standard values */
356 static const char *arap_zone[]={ NULL,
357                                  "Only access to dfl zone",
358                                  "Use zone filter inc.",
359                                  "Not used",
360                                  "Use zone filter exc.",
361                                };
362 
363 static const char *prompt[]={ "No Echo",
364                               "Echo",
365                             };
366 
367 
368 struct attrtype { const char *name;      /* Attribute name                 */
369                   const char **subtypes; /* Standard Values (if any)       */
370                   u_char siz_subtypes;   /* Size of total standard values  */
371                   u_char first_subtype;  /* First standard value is 0 or 1 */
372                   void (*print_func)(netdissect_options *, register u_char *, u_int, u_short);
373                 } attr_type[]=
374   {
375      { NULL,                              NULL, 0, 0, NULL               },
376      { "User-Name",                       NULL, 0, 0, print_attr_string  },
377      { "User-Password",                   NULL, 0, 0, NULL               },
378      { "CHAP-Password",                   NULL, 0, 0, NULL               },
379      { "NAS-IP-Address",                  NULL, 0, 0, print_attr_address },
380      { "NAS-Port",                        NULL, 0, 0, print_attr_num     },
381      { "Service-Type",                    serv_type, TAM_SIZE(serv_type)-1, 1, print_attr_num },
382      { "Framed-Protocol",                 frm_proto, TAM_SIZE(frm_proto)-1, 1, print_attr_num },
383      { "Framed-IP-Address",               NULL, 0, 0, print_attr_address },
384      { "Framed-IP-Netmask",               NULL, 0, 0, print_attr_address },
385      { "Framed-Routing",                  frm_routing, TAM_SIZE(frm_routing), 0, print_attr_num },
386      { "Filter-Id",                       NULL, 0, 0, print_attr_string  },
387      { "Framed-MTU",                      NULL, 0, 0, print_attr_num     },
388      { "Framed-Compression",              frm_comp, TAM_SIZE(frm_comp),   0, print_attr_num },
389      { "Login-IP-Host",                   NULL, 0, 0, print_attr_address },
390      { "Login-Service",                   login_serv, TAM_SIZE(login_serv), 0, print_attr_num },
391      { "Login-TCP-Port",                  NULL, 0, 0, print_attr_num     },
392      { "Unassigned",                      NULL, 0, 0, NULL }, /*17*/
393      { "Reply-Message",                   NULL, 0, 0, print_attr_string },
394      { "Callback-Number",                 NULL, 0, 0, print_attr_string },
395      { "Callback-Id",                     NULL, 0, 0, print_attr_string },
396      { "Unassigned",                      NULL, 0, 0, NULL }, /*21*/
397      { "Framed-Route",                    NULL, 0, 0, print_attr_string },
398      { "Framed-IPX-Network",              NULL, 0, 0, print_attr_num    },
399      { "State",                           NULL, 0, 0, print_attr_string },
400      { "Class",                           NULL, 0, 0, print_attr_string },
401      { "Vendor-Specific",                 NULL, 0, 0, print_vendor_attr },
402      { "Session-Timeout",                 NULL, 0, 0, print_attr_num    },
403      { "Idle-Timeout",                    NULL, 0, 0, print_attr_num    },
404      { "Termination-Action",              term_action, TAM_SIZE(term_action), 0, print_attr_num },
405      { "Called-Station-Id",               NULL, 0, 0, print_attr_string },
406      { "Calling-Station-Id",              NULL, 0, 0, print_attr_string },
407      { "NAS-Identifier",                  NULL, 0, 0, print_attr_string },
408      { "Proxy-State",                     NULL, 0, 0, print_attr_string },
409      { "Login-LAT-Service",               NULL, 0, 0, print_attr_string },
410      { "Login-LAT-Node",                  NULL, 0, 0, print_attr_string },
411      { "Login-LAT-Group",                 NULL, 0, 0, print_attr_string },
412      { "Framed-AppleTalk-Link",           NULL, 0, 0, print_attr_num    },
413      { "Framed-AppleTalk-Network",        NULL, 0, 0, print_attr_num    },
414      { "Framed-AppleTalk-Zone",           NULL, 0, 0, print_attr_string },
415      { "Acct-Status-Type",                acct_status, TAM_SIZE(acct_status)-1, 1, print_attr_num },
416      { "Acct-Delay-Time",                 NULL, 0, 0, print_attr_num    },
417      { "Acct-Input-Octets",               NULL, 0, 0, print_attr_num    },
418      { "Acct-Output-Octets",              NULL, 0, 0, print_attr_num    },
419      { "Acct-Session-Id",                 NULL, 0, 0, print_attr_string },
420      { "Acct-Authentic",                  acct_auth, TAM_SIZE(acct_auth)-1, 1, print_attr_num },
421      { "Acct-Session-Time",               NULL, 0, 0, print_attr_num },
422      { "Acct-Input-Packets",              NULL, 0, 0, print_attr_num },
423      { "Acct-Output-Packets",             NULL, 0, 0, print_attr_num },
424      { "Acct-Terminate-Cause",            acct_term, TAM_SIZE(acct_term)-1, 1, print_attr_num },
425      { "Acct-Multi-Session-Id",           NULL, 0, 0, print_attr_string },
426      { "Acct-Link-Count",                 NULL, 0, 0, print_attr_num },
427      { "Acct-Input-Gigawords",            NULL, 0, 0, print_attr_num },
428      { "Acct-Output-Gigawords",           NULL, 0, 0, print_attr_num },
429      { "Unassigned",                      NULL, 0, 0, NULL }, /*54*/
430      { "Event-Timestamp",                 NULL, 0, 0, print_attr_time },
431      { "Egress-VLANID",                   NULL, 0, 0, print_attr_num },
432      { "Ingress-Filters",                 ingress_filters, TAM_SIZE(ingress_filters)-1, 1, print_attr_num },
433      { "Egress-VLAN-Name",                NULL, 0, 0, print_attr_string },
434      { "User-Priority-Table",             NULL, 0, 0, NULL },
435      { "CHAP-Challenge",                  NULL, 0, 0, print_attr_string },
436      { "NAS-Port-Type",                   nas_port_type, TAM_SIZE(nas_port_type), 0, print_attr_num },
437      { "Port-Limit",                      NULL, 0, 0, print_attr_num },
438      { "Login-LAT-Port",                  NULL, 0, 0, print_attr_string }, /*63*/
439      { "Tunnel-Type",                     tunnel_type, TAM_SIZE(tunnel_type)-1, 1, print_attr_num },
440      { "Tunnel-Medium-Type",              tunnel_medium, TAM_SIZE(tunnel_medium)-1, 1, print_attr_num },
441      { "Tunnel-Client-Endpoint",          NULL, 0, 0, print_attr_string },
442      { "Tunnel-Server-Endpoint",          NULL, 0, 0, print_attr_string },
443      { "Acct-Tunnel-Connection",          NULL, 0, 0, print_attr_string },
444      { "Tunnel-Password",                 NULL, 0, 0, print_attr_string  },
445      { "ARAP-Password",                   NULL, 0, 0, print_attr_strange },
446      { "ARAP-Features",                   NULL, 0, 0, print_attr_strange },
447      { "ARAP-Zone-Access",                arap_zone, TAM_SIZE(arap_zone)-1, 1, print_attr_num }, /*72*/
448      { "ARAP-Security",                   NULL, 0, 0, print_attr_string },
449      { "ARAP-Security-Data",              NULL, 0, 0, print_attr_string },
450      { "Password-Retry",                  NULL, 0, 0, print_attr_num    },
451      { "Prompt",                          prompt, TAM_SIZE(prompt), 0, print_attr_num },
452      { "Connect-Info",                    NULL, 0, 0, print_attr_string   },
453      { "Configuration-Token",             NULL, 0, 0, print_attr_string   },
454      { "EAP-Message",                     NULL, 0, 0, print_attr_string   },
455      { "Message-Authenticator",           NULL, 0, 0, print_attr_string }, /*80*/
456      { "Tunnel-Private-Group-ID",         NULL, 0, 0, print_attr_string },
457      { "Tunnel-Assignment-ID",            NULL, 0, 0, print_attr_string },
458      { "Tunnel-Preference",               NULL, 0, 0, print_attr_num    },
459      { "ARAP-Challenge-Response",         NULL, 0, 0, print_attr_strange },
460      { "Acct-Interim-Interval",           NULL, 0, 0, print_attr_num     },
461      { "Acct-Tunnel-Packets-Lost",        NULL, 0, 0, print_attr_num }, /*86*/
462      { "NAS-Port-Id",                     NULL, 0, 0, print_attr_string },
463      { "Framed-Pool",                     NULL, 0, 0, print_attr_string },
464      { "CUI",                             NULL, 0, 0, print_attr_string },
465      { "Tunnel-Client-Auth-ID",           NULL, 0, 0, print_attr_string },
466      { "Tunnel-Server-Auth-ID",           NULL, 0, 0, print_attr_string },
467      { "Unassigned",                      NULL, 0, 0, NULL }, /*92*/
468      { "Unassigned",                      NULL, 0, 0, NULL }  /*93*/
469   };
470 
471 
472 /*****************************/
473 /* Print an attribute string */
474 /* value pointed by 'data'   */
475 /* and 'length' size.        */
476 /*****************************/
477 /* Returns nothing.          */
478 /*****************************/
479 static void
print_attr_string(netdissect_options * ndo,register u_char * data,u_int length,u_short attr_code)480 print_attr_string(netdissect_options *ndo,
481                   register u_char *data, u_int length, u_short attr_code)
482 {
483    register u_int i;
484 
485    ND_TCHECK2(data[0],length);
486 
487    switch(attr_code)
488    {
489       case TUNNEL_PASS:
490            if (length < 3)
491            {
492               ND_PRINT((ndo, "%s", tstr));
493               return;
494            }
495            if (*data && (*data <=0x1F) )
496               ND_PRINT((ndo, "Tag[%u] ", *data));
497            else
498               ND_PRINT((ndo, "Tag[Unused] "));
499            data++;
500            length--;
501            ND_PRINT((ndo, "Salt %u ", EXTRACT_16BITS(data)));
502            data+=2;
503            length-=2;
504         break;
505       case TUNNEL_CLIENT_END:
506       case TUNNEL_SERVER_END:
507       case TUNNEL_PRIV_GROUP:
508       case TUNNEL_ASSIGN_ID:
509       case TUNNEL_CLIENT_AUTH:
510       case TUNNEL_SERVER_AUTH:
511            if (*data <= 0x1F)
512            {
513               if (length < 1)
514               {
515                  ND_PRINT((ndo, "%s", tstr));
516                  return;
517               }
518               if (*data)
519                 ND_PRINT((ndo, "Tag[%u] ", *data));
520               else
521                 ND_PRINT((ndo, "Tag[Unused] "));
522               data++;
523               length--;
524            }
525         break;
526       case EGRESS_VLAN_NAME:
527            ND_PRINT((ndo, "%s (0x%02x) ",
528                   tok2str(rfc4675_tagged,"Unknown tag",*data),
529                   *data));
530            data++;
531            length--;
532         break;
533    }
534 
535    for (i=0; *data && i < length ; i++, data++)
536        ND_PRINT((ndo, "%c", (*data < 32 || *data > 128) ? '.' : *data));
537 
538    return;
539 
540    trunc:
541       ND_PRINT((ndo, "%s", tstr));
542 }
543 
544 /*
545  * print vendor specific attributes
546  */
547 static void
print_vendor_attr(netdissect_options * ndo,register u_char * data,u_int length,u_short attr_code _U_)548 print_vendor_attr(netdissect_options *ndo,
549                   register u_char *data, u_int length, u_short attr_code _U_)
550 {
551     u_int idx;
552     u_int vendor_id;
553     u_int vendor_type;
554     u_int vendor_length;
555 
556     if (length < 4)
557         goto trunc;
558     ND_TCHECK2(*data, 4);
559     vendor_id = EXTRACT_32BITS(data);
560     data+=4;
561     length-=4;
562 
563     ND_PRINT((ndo, "Vendor: %s (%u)",
564            tok2str(smi_values,"Unknown",vendor_id),
565            vendor_id));
566 
567     while (length >= 2) {
568 	ND_TCHECK2(*data, 2);
569 
570         vendor_type = *(data);
571         vendor_length = *(data+1);
572 
573         if (vendor_length < 2)
574         {
575             ND_PRINT((ndo, "\n\t    Vendor Attribute: %u, Length: %u (bogus, must be >= 2)",
576                    vendor_type,
577                    vendor_length));
578             return;
579         }
580         if (vendor_length > length)
581         {
582             ND_PRINT((ndo, "\n\t    Vendor Attribute: %u, Length: %u (bogus, goes past end of vendor-specific attribute)",
583                    vendor_type,
584                    vendor_length));
585             return;
586         }
587         data+=2;
588         vendor_length-=2;
589         length-=2;
590 	ND_TCHECK2(*data, vendor_length);
591 
592         ND_PRINT((ndo, "\n\t    Vendor Attribute: %u, Length: %u, Value: ",
593                vendor_type,
594                vendor_length));
595         for (idx = 0; idx < vendor_length ; idx++, data++)
596             ND_PRINT((ndo, "%c", (*data < 32 || *data > 128) ? '.' : *data));
597         length-=vendor_length;
598     }
599     return;
600 
601    trunc:
602      ND_PRINT((ndo, "%s", tstr));
603 }
604 
605 /******************************/
606 /* Print an attribute numeric */
607 /* value pointed by 'data'    */
608 /* and 'length' size.         */
609 /******************************/
610 /* Returns nothing.           */
611 /******************************/
612 static void
print_attr_num(netdissect_options * ndo,register u_char * data,u_int length,u_short attr_code)613 print_attr_num(netdissect_options *ndo,
614                register u_char *data, u_int length, u_short attr_code)
615 {
616    uint32_t timeout;
617 
618    if (length != 4)
619    {
620        ND_PRINT((ndo, "ERROR: length %u != 4", length));
621        return;
622    }
623 
624    ND_TCHECK2(data[0],4);
625                           /* This attribute has standard values */
626    if (attr_type[attr_code].siz_subtypes)
627    {
628       static const char **table;
629       uint32_t data_value;
630       table = attr_type[attr_code].subtypes;
631 
632       if ( (attr_code == TUNNEL_TYPE) || (attr_code == TUNNEL_MEDIUM) )
633       {
634          if (!*data)
635             ND_PRINT((ndo, "Tag[Unused] "));
636          else
637             ND_PRINT((ndo, "Tag[%d] ", *data));
638          data++;
639          data_value = EXTRACT_24BITS(data);
640       }
641       else
642       {
643          data_value = EXTRACT_32BITS(data);
644       }
645       if ( data_value <= (uint32_t)(attr_type[attr_code].siz_subtypes - 1 +
646             attr_type[attr_code].first_subtype) &&
647 	   data_value >= attr_type[attr_code].first_subtype )
648          ND_PRINT((ndo, "%s", table[data_value]));
649       else
650          ND_PRINT((ndo, "#%u", data_value));
651    }
652    else
653    {
654       switch(attr_code) /* Be aware of special cases... */
655       {
656         case FRM_IPX:
657              if (EXTRACT_32BITS( data) == 0xFFFFFFFE )
658                 ND_PRINT((ndo, "NAS Select"));
659              else
660                 ND_PRINT((ndo, "%d", EXTRACT_32BITS(data)));
661           break;
662 
663         case SESSION_TIMEOUT:
664         case IDLE_TIMEOUT:
665         case ACCT_DELAY:
666         case ACCT_SESSION_TIME:
667         case ACCT_INT_INTERVAL:
668              timeout = EXTRACT_32BITS( data);
669              if ( timeout < 60 )
670                 ND_PRINT((ndo,  "%02d secs", timeout));
671              else
672              {
673                 if ( timeout < 3600 )
674                    ND_PRINT((ndo,  "%02d:%02d min",
675                           timeout / 60, timeout % 60));
676                 else
677                    ND_PRINT((ndo, "%02d:%02d:%02d hours",
678                           timeout / 3600, (timeout % 3600) / 60,
679                           timeout % 60));
680              }
681           break;
682 
683         case FRM_ATALK_LINK:
684              if (EXTRACT_32BITS(data) )
685                 ND_PRINT((ndo, "%d", EXTRACT_32BITS(data)));
686              else
687                 ND_PRINT((ndo, "Unnumbered"));
688           break;
689 
690         case FRM_ATALK_NETWORK:
691              if (EXTRACT_32BITS(data) )
692                 ND_PRINT((ndo, "%d", EXTRACT_32BITS(data)));
693              else
694                 ND_PRINT((ndo, "NAS assigned"));
695           break;
696 
697         case TUNNEL_PREFERENCE:
698             if (*data)
699                ND_PRINT((ndo, "Tag[%d] ", *data));
700             else
701                ND_PRINT((ndo, "Tag[Unused] "));
702             data++;
703             ND_PRINT((ndo, "%d", EXTRACT_24BITS(data)));
704           break;
705 
706         case EGRESS_VLAN_ID:
707             ND_PRINT((ndo, "%s (0x%02x) ",
708                    tok2str(rfc4675_tagged,"Unknown tag",*data),
709                    *data));
710             data++;
711             ND_PRINT((ndo, "%d", EXTRACT_24BITS(data)));
712           break;
713 
714         default:
715              ND_PRINT((ndo, "%d", EXTRACT_32BITS(data)));
716           break;
717 
718       } /* switch */
719 
720    } /* if-else */
721 
722    return;
723 
724    trunc:
725      ND_PRINT((ndo, "%s", tstr));
726 }
727 
728 /*****************************/
729 /* Print an attribute IPv4   */
730 /* address value pointed by  */
731 /* 'data' and 'length' size. */
732 /*****************************/
733 /* Returns nothing.          */
734 /*****************************/
735 static void
print_attr_address(netdissect_options * ndo,register u_char * data,u_int length,u_short attr_code)736 print_attr_address(netdissect_options *ndo,
737                    register u_char *data, u_int length, u_short attr_code)
738 {
739    if (length != 4)
740    {
741        ND_PRINT((ndo, "ERROR: length %u != 4", length));
742        return;
743    }
744 
745    ND_TCHECK2(data[0],4);
746 
747    switch(attr_code)
748    {
749       case FRM_IPADDR:
750       case LOG_IPHOST:
751            if (EXTRACT_32BITS(data) == 0xFFFFFFFF )
752               ND_PRINT((ndo, "User Selected"));
753            else
754               if (EXTRACT_32BITS(data) == 0xFFFFFFFE )
755                  ND_PRINT((ndo, "NAS Select"));
756               else
757                  ND_PRINT((ndo, "%s",ipaddr_string(ndo, data)));
758       break;
759 
760       default:
761           ND_PRINT((ndo, "%s", ipaddr_string(ndo, data)));
762       break;
763    }
764 
765    return;
766 
767    trunc:
768      ND_PRINT((ndo, "%s", tstr));
769 }
770 
771 /*************************************/
772 /* Print an attribute of 'secs since */
773 /* January 1, 1970 00:00 UTC' value  */
774 /* pointed by 'data' and 'length'    */
775 /* size.                             */
776 /*************************************/
777 /* Returns nothing.                  */
778 /*************************************/
779 static void
print_attr_time(netdissect_options * ndo,register u_char * data,u_int length,u_short attr_code _U_)780 print_attr_time(netdissect_options *ndo,
781                 register u_char *data, u_int length, u_short attr_code _U_)
782 {
783    time_t attr_time;
784    char string[26];
785 
786    if (length != 4)
787    {
788        ND_PRINT((ndo, "ERROR: length %u != 4", length));
789        return;
790    }
791 
792    ND_TCHECK2(data[0],4);
793 
794    attr_time = EXTRACT_32BITS(data);
795    strlcpy(string, ctime(&attr_time), sizeof(string));
796    /* Get rid of the newline */
797    string[24] = '\0';
798    ND_PRINT((ndo, "%.24s", string));
799    return;
800 
801    trunc:
802      ND_PRINT((ndo, "%s", tstr));
803 }
804 
805 /***********************************/
806 /* Print an attribute of 'strange' */
807 /* data format pointed by 'data'   */
808 /* and 'length' size.              */
809 /***********************************/
810 /* Returns nothing.                */
811 /***********************************/
812 static void
print_attr_strange(netdissect_options * ndo,register u_char * data,u_int length,u_short attr_code)813 print_attr_strange(netdissect_options *ndo,
814                    register u_char *data, u_int length, u_short attr_code)
815 {
816    u_short len_data;
817 
818    switch(attr_code)
819    {
820       case ARAP_PASS:
821            if (length != 16)
822            {
823                ND_PRINT((ndo, "ERROR: length %u != 16", length));
824                return;
825            }
826            ND_PRINT((ndo, "User_challenge ("));
827            ND_TCHECK2(data[0],8);
828            len_data = 8;
829            PRINT_HEX(len_data, data);
830            ND_PRINT((ndo, ") User_resp("));
831            ND_TCHECK2(data[0],8);
832            len_data = 8;
833            PRINT_HEX(len_data, data);
834            ND_PRINT((ndo, ")"));
835         break;
836 
837       case ARAP_FEATURES:
838            if (length != 14)
839            {
840                ND_PRINT((ndo, "ERROR: length %u != 14", length));
841                return;
842            }
843            ND_TCHECK2(data[0],1);
844            if (*data)
845               ND_PRINT((ndo, "User can change password"));
846            else
847               ND_PRINT((ndo, "User cannot change password"));
848            data++;
849            ND_TCHECK2(data[0],1);
850            ND_PRINT((ndo, ", Min password length: %d", *data));
851            data++;
852            ND_PRINT((ndo, ", created at: "));
853            ND_TCHECK2(data[0],4);
854            len_data = 4;
855            PRINT_HEX(len_data, data);
856            ND_PRINT((ndo, ", expires in: "));
857            ND_TCHECK2(data[0],4);
858            len_data = 4;
859            PRINT_HEX(len_data, data);
860            ND_PRINT((ndo, ", Current Time: "));
861            ND_TCHECK2(data[0],4);
862            len_data = 4;
863            PRINT_HEX(len_data, data);
864         break;
865 
866       case ARAP_CHALLENGE_RESP:
867            if (length < 8)
868            {
869                ND_PRINT((ndo, "ERROR: length %u != 8", length));
870                return;
871            }
872            ND_TCHECK2(data[0],8);
873            len_data = 8;
874            PRINT_HEX(len_data, data);
875         break;
876    }
877    return;
878 
879    trunc:
880      ND_PRINT((ndo, "%s", tstr));
881 }
882 
883 static void
radius_attrs_print(netdissect_options * ndo,register const u_char * attr,u_int length)884 radius_attrs_print(netdissect_options *ndo,
885                    register const u_char *attr, u_int length)
886 {
887    register const struct radius_attr *rad_attr = (struct radius_attr *)attr;
888    const char *attr_string;
889 
890    while (length > 0)
891    {
892      if (length < 2)
893         goto trunc;
894      ND_TCHECK(*rad_attr);
895 
896      if (rad_attr->type > 0 && rad_attr->type < TAM_SIZE(attr_type))
897 	attr_string = attr_type[rad_attr->type].name;
898      else
899 	attr_string = "Unknown";
900      if (rad_attr->len < 2)
901      {
902 	ND_PRINT((ndo, "\n\t  %s Attribute (%u), length: %u (bogus, must be >= 2)",
903                attr_string,
904                rad_attr->type,
905                rad_attr->len));
906 	return;
907      }
908      if (rad_attr->len > length)
909      {
910 	ND_PRINT((ndo, "\n\t  %s Attribute (%u), length: %u (bogus, goes past end of packet)",
911                attr_string,
912                rad_attr->type,
913                rad_attr->len));
914         return;
915      }
916      ND_PRINT((ndo, "\n\t  %s Attribute (%u), length: %u, Value: ",
917             attr_string,
918             rad_attr->type,
919             rad_attr->len));
920 
921      if (rad_attr->type < TAM_SIZE(attr_type))
922      {
923          if (rad_attr->len > 2)
924          {
925              if ( attr_type[rad_attr->type].print_func )
926                  (*attr_type[rad_attr->type].print_func)(
927                      ndo, ((u_char *)(rad_attr+1)),
928                      rad_attr->len - 2, rad_attr->type);
929          }
930      }
931      /* do we also want to see a hex dump ? */
932      if (ndo->ndo_vflag> 1)
933          print_unknown_data(ndo, (u_char *)rad_attr+2, "\n\t    ", (rad_attr->len)-2);
934 
935      length-=(rad_attr->len);
936      rad_attr = (struct radius_attr *)( ((char *)(rad_attr))+rad_attr->len);
937    }
938    return;
939 
940 trunc:
941    ND_PRINT((ndo, "%s", tstr));
942 }
943 
944 void
radius_print(netdissect_options * ndo,const u_char * dat,u_int length)945 radius_print(netdissect_options *ndo,
946              const u_char *dat, u_int length)
947 {
948    register const struct radius_hdr *rad;
949    u_int len, auth_idx;
950 
951    ND_TCHECK2(*dat, MIN_RADIUS_LEN);
952    rad = (struct radius_hdr *)dat;
953    len = EXTRACT_16BITS(&rad->len);
954 
955    if (len < MIN_RADIUS_LEN)
956    {
957 	  ND_PRINT((ndo, "%s", tstr));
958 	  return;
959    }
960 
961    if (len > length)
962 	  len = length;
963 
964    if (ndo->ndo_vflag < 1) {
965        ND_PRINT((ndo, "RADIUS, %s (%u), id: 0x%02x length: %u",
966               tok2str(radius_command_values,"Unknown Command",rad->code),
967               rad->code,
968               rad->id,
969               len));
970        return;
971    }
972    else {
973        ND_PRINT((ndo, "RADIUS, length: %u\n\t%s (%u), id: 0x%02x, Authenticator: ",
974               len,
975               tok2str(radius_command_values,"Unknown Command",rad->code),
976               rad->code,
977               rad->id));
978 
979        for(auth_idx=0; auth_idx < 16; auth_idx++)
980             ND_PRINT((ndo, "%02x", rad->auth[auth_idx]));
981    }
982 
983    if (len > MIN_RADIUS_LEN)
984       radius_attrs_print(ndo, dat + MIN_RADIUS_LEN, len - MIN_RADIUS_LEN);
985    return;
986 
987 trunc:
988    ND_PRINT((ndo, "%s", tstr));
989 }
990