aboutsummaryrefslogtreecommitdiffstats
path: root/config/freeradius2
diff options
context:
space:
mode:
authorAlexander Wilke <nachtfalkeaw@web.de>2012-02-07 22:54:59 +0100
committerAlexander Wilke <nachtfalkeaw@web.de>2012-02-07 22:54:59 +0100
commit4a1fcd4e9e9de8b2906ef988196d58b4dd72ad3b (patch)
treed8d39b56e4ed7b3598b542f637c26b2ede0ea192 /config/freeradius2
parent188b3624989022dbec69f391234ddf060c516197 (diff)
downloadpfsense-packages-4a1fcd4e9e9de8b2906ef988196d58b4dd72ad3b.tar.gz
pfsense-packages-4a1fcd4e9e9de8b2906ef988196d58b4dd72ad3b.tar.bz2
pfsense-packages-4a1fcd4e9e9de8b2906ef988196d58b4dd72ad3b.zip
OTP support
Diffstat (limited to 'config/freeradius2')
-rw-r--r--config/freeradius2/freeradius.inc205
1 files changed, 197 insertions, 8 deletions
diff --git a/config/freeradius2/freeradius.inc b/config/freeradius2/freeradius.inc
index 83c8d4cd..51029711 100644
--- a/config/freeradius2/freeradius.inc
+++ b/config/freeradius2/freeradius.inc
@@ -378,6 +378,7 @@ EOD;
freeradius_modulesmschap_resync();
freeradius_modulesrealm_resync();
freeradius_plainmacauth_resync();
+ freeradius_motp_resync();
// This is to fix the mysqlclient.so which gets lost after reboot
exec("ldconfig -m /usr/local/lib/mysql");
@@ -397,8 +398,14 @@ if (is_array($arrusers) && !empty($arrusers)) {
foreach ($arrusers as $users) {
// Variables for users file defined parameters
+
$varusersusername = $users['varusersusername'];
$varuserspassword = $users['varuserspassword'];
+
+ $varusersmotpinitsecret = $users['varusersmotpinitsecret'];
+ $varusersmotppin = $users['varusersmotppin'];
+ $varusersmotpoffset = ($users['varusersmotpoffset']?$users['varusersmotpoffset']:'0');
+
$varuserssimultaneousconnect = ($users['varuserssimultaneousconnect']?$users['varuserssimultaneousconnect']:'');
$varuserswisprredirectionurl = $users['varuserswisprredirectionurl'];
$varusersframedipaddress = $users['varusersframedipaddress'];
@@ -456,14 +463,22 @@ if (is_array($arrusers) && !empty($arrusers)) {
$varuserscheckitem = '';
$varusersreplyitem = '';
- // If someone does not want to use username/password but entry "DEFAULT" instead then we can disable this
- if (($users['varusersusername'] == '') && ($users['varuserspassword'] == '')) {
- $varuserscheckitem = '';
- }
- else {
- // Add the user attributes to each user.
- $varuserscheckitem = '"' . $varusersusername . '"' . " Cleartext-Password := " . '"' . $varuserspassword .'"';
- }
+ // check if mobile otp is disabled
+ if ($users['varusersmotpenable'] == '') {
+ // If someone does not want to use username/password but entry "DEFAULT" instead then we can disable this
+ if (($users['varusersusername'] == '') && ($users['varuserspassword'] == '')) {
+ $varuserscheckitem = '';
+ }
+ else {
+ // Add the user attributes to each user.
+ $varuserscheckitem = '"' . $varusersusername . '"' . " Cleartext-Password := " . '"' . $varuserspassword .'"';
+ }
+ } // end of check if otp is enabled
+
+ // if otp is enabled we need to set Auth-Type to accept because password will be checked when the otp script gets executed in reply-item list
+ else {
+ $varuserscheckitem = '"' . $varusersusername . '"' . " Auth-Type = Accept";
+ }
// Add additional CHECK-ITEMS here. Different formatting in "users" file needed.
if ($varuserssimultaneousconnect != '') {
@@ -488,6 +503,14 @@ if (is_array($arrusers) && !empty($arrusers)) {
$varuserscheckitem .= ", $varusersadditionaloptionscheckitems";
}
+ // this is the part for mobile otp
+ if ($users['varusersmotpenable'] == 'on') {
+ $varusersreplyitem .= 'Exec-Program-Wait = "/usr/local/bin/bash /usr/local/bin/otpverify.sh %{User-Name} %{User-Password} ' . "$varusersmotpinitsecret " . "$varusersmotppin " . "$varusersmotpoffset" . '"';
+ }
+ else {
+ $varusersreplyitem .= '';
+ }
+
// Add additional REPLY-ITEMS here. Different formatting in "users" file needed.
if ($varusersframedipaddress != '') {
if ($varusersreplyitem != '') { $varusersreplyitem .=","; }
@@ -3824,4 +3847,170 @@ EOD;
}
+function freeradius_motp_resync() {
+ global $config;
+ $conf = '';
+
+ $varsettings = $config['installedpackages']['freeradiussettings']['config'][0];
+
+ // check if disabled then we delete bash und otpverify.sh script
+ if ($varsettings['varsettingsmotpenable'] == '') {
+ unlink("/usr/local/bin/otpverify.sh");
+ exec("cd /var/db/pkg && pkg_delete `ls | grep bash`");
+ log_error('FreeRADIUS: Uninstalling package "bash-4.1.7" which comes with Mobile-One-Time-Password (motp) if not already done.');
+ }
+
+ // check if enabled then we need to download "bash"
+ else {
+ if (exec("cd /var/db/pkg && ls | grep bash") != "bash-4.1.7") {
+ log_error('FreeRADIUS: Downloading and installing package "bash-4.1.7" to use Mobile-One-Time-Password (motp).');
+ exec("pkg_add -r http://ftp-archive.freebsd.org/pub/FreeBSD-Archive/ports/`uname -m`/packages-8.1-release/All/bash-4.1.7.tbz");
+ }
+
+ $conf .= <<<EOD
+#!/bin/bash
+#
+# Mobile One Time Passwords (Mobile-OTP) for Java 2 Micro Edition, J2ME
+# written by Matthias Straub, Heilbronn, Germany, 2003
+# (c) 2003 by Matthias Straub
+# Modified 2012 by Alexander Wilke <nachtfalkeaw@web.de>
+#
+# Version 1.05a
+#
+# This program is free software; you can redistribute it and/or
+# modify it under the terms of the GNU Library General Public
+# License as published by the Free Software Foundation; either
+# version 2 of the License, or (at your option) any later version.
+#
+# This software is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+# Library General Public License for more details.
+#
+# arguments: \$1 \$2 \$3 \$4 \$5
+# \$1 - username
+# \$2 - one-time-password that is to be checked
+# \$3 - init-secred from token (to init token: #**#)
+# \$4 - user PIN
+# \$5 - time difference between token and server in 10s of seconds (360 = 1 hour)
+#
+# one-time-password must match md5(EPOCHTIME+SECRET+PIN)
+#
+#
+# otpverify.sh version 1.04b, Feb. 2003
+# otpverify.sh version 1.04c, Nov. 2008
+# changed line 1 to ksh because of problems with todays bash an sh
+# otpverify.sh version 1.05a, Jan. 2011
+# changed back to bash and added in shopts line to ensure aliases handled
+# correctly (bash is always available on any modern *nix unlike ksh)
+#
+
+PATH=\$PATH:/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin
+
+ alias checksum=md5
+ have_md5="true"
+
+# ensure aliases are expanded by bash
+shopt -s expand_aliases
+
+if [ -e "`which md5 2>/dev/null`" ]
+then
+ alias checksum=md5
+ have_md5="true"
+fi
+if [ -e "`which md5sum 2>/dev/null`" ]
+then
+ alias checksum=md5sum
+ have_md5="true"
+fi
+
+if [ \$have_md5 != "true" ]
+then
+ echo "No md5 or md5sum available on server!"
+ exit 16
+fi
+
+function chop
+{
+ num=`echo -n "\$1" | wc -c | sed 's/ //g' `
+ nummin1=`expr \$num "-" 1`
+ echo -n "\$1" | cut -b 1-\$nummin1
+}
+
+if [ ! \$# -eq 5 ] ; then
+echo "USAGE: otpverify.sh Username, OTP, Init-Secret, PIN, Offset"
+logger -f /var/log/system.log "FreeRADIUS: Mobile-One-Time-Password - wrong syntax - USAGE: otpverify.sh Username, OTP, Init-Secret, PIN, Offset";
+exit 14
+fi
+
+mkdir /var/log/motp 2>/dev/null
+mkdir /var/log/motp/cache 2>/dev/null
+mkdir /var/log/motp/users 2>/dev/null
+chmod og-rxw /var/log/motp 2>/dev/null || { echo "FAIL! Need write-access to /var/log/motp";logger -f /var/log/system.log "FreeRADIUS: Mobile-One-Time-Password - need write-access to /var/log/motp"; exit 17; }
+chmod og-rxw /var/log/motp/cache
+chmod og-rxw /var/log/motp/users
+
+USERNAME=`echo -n "\$1" | sed 's/[^0-9a-zA-Z._-]/X/g' `
+PASSWD=`echo -n "\$2" | sed 's/[^0-9a-f]/0/g' `
+SECRET=`echo -n "\$3" | sed 's/[^0-9a-f]/0/g' `
+PIN=`echo -n "\$4" | sed 's/[^0-9]/0/g' `
+OFFSET=`echo -n "\$5" | sed 's/[^0-9]/0/g' `
+EPOCHTIME=`date +%s` ; EPOCHTIME=`chop \$EPOCHTIME`
+
+# delete old logins
+find /var/log/motp/cache -type f -cmin +5 | xargs rm 2>/dev/null
+
+if [ -e "/var/log/motp/cache/\$PASSWD" ]; then
+ echo "FAIL"
+ logger -f /var/log/system.log "FreeRADIUS: Authentication failed! Mobile-One-Time-Password incorrect or expired!"
+ exit 15
+fi
+
+# account locked?
+if [ "`cat /var/log/motp/users/\$USERNAME 2>/dev/null`" == "8" ]; then
+ echo "FAIL"
+ logger -f /var/log/system.log "FreeRADIUS: Authentication failed! Mobile-One-Time-Password incorrect or expired!"
+ exit 13
+fi
+
+I=0
+EPOCHTIME=`expr \$EPOCHTIME - 18`
+EPOCHTIME=`expr \$EPOCHTIME + \$OFFSET`
+while [ \$I -lt 36 ] ; do # 3 minutes before and after
+ OTP=`printf \$EPOCHTIME\$SECRET\$PIN|checksum|cut -b 1-6`
+ if [ "\$OTP" = "\$PASSWD" ] ; then
+ touch /var/log/motp/cache/\$OTP || { echo "FAIL! Need write-access to /var/log/motp";logger -f /var/log/system.log "FreeRADIUS: Mobile-One-Time-Password - need write-access to /var/log/motp/cache"; exit 17; }
+ echo "ACCEPT"
+ logger -f /var/log/system.log "FreeRADIUS: Authentication success! Mobile-One-Time-Password is correct!"
+ rm "/var/log/motp/users/\$USERNAME" 2>/dev/null
+ exit 0
+ fi
+ I=`expr \$I + 1`
+ EPOCHTIME=`expr \$EPOCHTIME + 1`
+done
+
+echo "FAIL"
+NUMFAILS=`cat "/var/log/motp/users/\$USERNAME" 2>/dev/null`
+if [ "\$NUMFAILS" = "" ]; then
+ NUMFAILS=0
+fi
+NUMFAILS=`expr \$NUMFAILS + 1`
+echo \$NUMFAILS > "/var/log/motp/users/\$USERNAME"
+logger -f /var/log/system.log "FreeRADIUS: Authentication failed! Mobile-One-Time-Password incorrect or expired!"
+exit 11
+
+
+EOD;
+
+ $filename = '/usr/local/bin/otpverify.sh';
+ conf_mount_rw();
+ file_put_contents($filename, $conf);
+ chmod($filename, 0775);
+ conf_mount_ro();
+
+ // end of above 'check if enabled then we need to download "bash"'
+ }
+
+}
+
?> \ No newline at end of file