blob: 1fa7fc4ae706d6296a08f42d482982d0fb1a3111 [file] [log] [blame]
Jacob Erlbeck3b5d4072014-10-24 15:11:03 +02001/* MS authorization and subscriber data handling */
2
3/* (C) 2009-2010 by Harald Welte <laforge@gnumonks.org>
4 *
5 * All Rights Reserved
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Affero General Public License as published by
9 * the Free Software Foundation; either version 3 of the License, or
10 * (at your option) any later version.
11 *
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU Affero General Public License for more details.
16 *
17 * You should have received a copy of the GNU Affero General Public License
18 * along with this program. If not, see <http://www.gnu.org/licenses/>.
19 *
20 */
21
Harald Welte53373bc2016-04-20 17:11:43 +020022#include <osmocom/gsm/protocol/gsm_04_08_gprs.h>
Neels Hofmeyr93bafb62017-01-13 03:12:08 +010023#include <osmocom/core/utils.h>
Jacob Erlbeck3b5d4072014-10-24 15:11:03 +020024#include <openbsc/sgsn.h>
25#include <openbsc/gprs_sgsn.h>
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +020026#include <openbsc/gprs_gmm.h>
Jacob Erlbeckbe2c8d92014-11-12 10:18:09 +010027#include <openbsc/gsm_subscriber.h>
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +020028#include <openbsc/debug.h>
29
30const struct value_string auth_state_names[] = {
31 { SGSN_AUTH_ACCEPTED, "accepted"},
32 { SGSN_AUTH_REJECTED, "rejected"},
33 { SGSN_AUTH_UNKNOWN, "unknown"},
Harald Welte7c55ede2016-05-05 18:31:37 +020034 { SGSN_AUTH_AUTHENTICATE, "authenticate" },
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +020035 { 0, NULL }
36};
Jacob Erlbeck3b5d4072014-10-24 15:11:03 +020037
Jacob Erlbeckf951a012014-11-07 14:17:44 +010038const struct value_string *sgsn_auth_state_names = auth_state_names;
39
Jacob Erlbecka0b6efb2014-11-13 10:48:39 +010040void sgsn_auth_init(void)
Jacob Erlbeck3b5d4072014-10-24 15:11:03 +020041{
Jacob Erlbecka0b6efb2014-11-13 10:48:39 +010042 INIT_LLIST_HEAD(&sgsn->cfg.imsi_acl);
Jacob Erlbeck3b5d4072014-10-24 15:11:03 +020043}
44
45/* temporary IMSI ACL hack */
46struct imsi_acl_entry *sgsn_acl_lookup(const char *imsi, struct sgsn_config *cfg)
47{
48 struct imsi_acl_entry *acl;
49 llist_for_each_entry(acl, &cfg->imsi_acl, list) {
50 if (!strcmp(imsi, acl->imsi))
51 return acl;
52 }
53 return NULL;
54}
55
56int sgsn_acl_add(const char *imsi, struct sgsn_config *cfg)
57{
58 struct imsi_acl_entry *acl;
59
60 if (sgsn_acl_lookup(imsi, cfg))
61 return -EEXIST;
62
63 acl = talloc_zero(NULL, struct imsi_acl_entry);
64 if (!acl)
65 return -ENOMEM;
Neels Hofmeyr93bafb62017-01-13 03:12:08 +010066 osmo_strlcpy(acl->imsi, imsi, sizeof(acl->imsi));
Jacob Erlbeck3b5d4072014-10-24 15:11:03 +020067
68 llist_add(&acl->list, &cfg->imsi_acl);
69
70 return 0;
71}
72
73int sgsn_acl_del(const char *imsi, struct sgsn_config *cfg)
74{
75 struct imsi_acl_entry *acl;
76
77 acl = sgsn_acl_lookup(imsi, cfg);
78 if (!acl)
79 return -ENODEV;
80
81 llist_del(&acl->list);
82 talloc_free(acl);
83
84 return 0;
85}
86
Jacob Erlbecka0b6efb2014-11-13 10:48:39 +010087enum sgsn_auth_state sgsn_auth_state(struct sgsn_mm_ctx *mmctx)
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +020088{
89 char mccmnc[16];
Jacob Erlbeck106f5472014-11-04 10:08:37 +010090 int check_net = 0;
91 int check_acl = 0;
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +020092
93 OSMO_ASSERT(mmctx);
94
Jacob Erlbeck106f5472014-11-04 10:08:37 +010095 switch (sgsn->cfg.auth_policy) {
96 case SGSN_AUTH_POLICY_OPEN:
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +020097 return SGSN_AUTH_ACCEPTED;
98
Jacob Erlbeck106f5472014-11-04 10:08:37 +010099 case SGSN_AUTH_POLICY_CLOSED:
100 check_net = 1;
101 check_acl = 1;
102 break;
103
104 case SGSN_AUTH_POLICY_ACL_ONLY:
105 check_acl = 1;
106 break;
Jacob Erlbeckbe2c8d92014-11-12 10:18:09 +0100107
108 case SGSN_AUTH_POLICY_REMOTE:
109 if (!mmctx->subscr)
110 return mmctx->auth_state;
111
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100112 if (mmctx->subscr->flags & GPRS_SUBSCRIBER_UPDATE_PENDING_MASK)
Jacob Erlbeckbe2c8d92014-11-12 10:18:09 +0100113 return mmctx->auth_state;
114
Jacob Erlbeck9d4f46c2014-12-17 13:20:08 +0100115 if (sgsn->cfg.require_authentication &&
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100116 (!mmctx->is_authenticated ||
117 mmctx->subscr->sgsn_data->auth_triplets_updated))
Jacob Erlbeck2e5e94c2014-12-08 15:26:47 +0100118 return SGSN_AUTH_AUTHENTICATE;
119
Jacob Erlbeckbe2c8d92014-11-12 10:18:09 +0100120 if (mmctx->subscr->authorized)
121 return SGSN_AUTH_ACCEPTED;
122
123 return SGSN_AUTH_REJECTED;
Jacob Erlbeck106f5472014-11-04 10:08:37 +0100124 }
125
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200126 if (!strlen(mmctx->imsi)) {
127 LOGMMCTXP(LOGL_NOTICE, mmctx,
128 "Missing IMSI, authorization state not known\n");
129 return SGSN_AUTH_UNKNOWN;
130 }
131
Jacob Erlbeck106f5472014-11-04 10:08:37 +0100132 if (check_net) {
133 /* We simply assume that the IMSI exists, as long as it is part
134 * of 'our' network */
135 snprintf(mccmnc, sizeof(mccmnc), "%03d%02d",
136 mmctx->ra.mcc, mmctx->ra.mnc);
137 if (strncmp(mccmnc, mmctx->imsi, 5) == 0)
138 return SGSN_AUTH_ACCEPTED;
139 }
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200140
Jacob Erlbeck106f5472014-11-04 10:08:37 +0100141 if (check_acl && sgsn_acl_lookup(mmctx->imsi, &sgsn->cfg))
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200142 return SGSN_AUTH_ACCEPTED;
143
144 return SGSN_AUTH_REJECTED;
145}
146
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100147/*
148 * This function is directly called by e.g. the GMM layer. It returns either
149 * after calling sgsn_auth_update directly or after triggering an asynchronous
150 * procedure which will call sgsn_auth_update later on.
151 */
Jacob Erlbecka0b6efb2014-11-13 10:48:39 +0100152int sgsn_auth_request(struct sgsn_mm_ctx *mmctx)
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200153{
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100154 struct gsm_subscriber *subscr;
155 struct gsm_auth_tuple *at;
156 int need_update_location;
157 int rc;
158
Jacob Erlbeckbe2c8d92014-11-12 10:18:09 +0100159 LOGMMCTXP(LOGL_DEBUG, mmctx, "Requesting authorization\n");
160
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100161 if (sgsn->cfg.auth_policy != SGSN_AUTH_POLICY_REMOTE) {
162 sgsn_auth_update(mmctx);
163 return 0;
164 }
165
Jacob Erlbeck771573c2014-12-19 18:08:48 +0100166 need_update_location = sgsn->cfg.require_update_location &&
167 (mmctx->subscr == NULL ||
168 mmctx->pending_req == GSM48_MT_GMM_ATTACH_REQ);
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100169
170 /* This has the side effect of registering the subscr with the mmctx */
171 subscr = gprs_subscr_get_or_create_by_mmctx(mmctx);
172 subscr_put(subscr);
173
174 OSMO_ASSERT(mmctx->subscr != NULL);
175
Jacob Erlbeck9d4f46c2014-12-17 13:20:08 +0100176 if (sgsn->cfg.require_authentication && !mmctx->is_authenticated) {
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100177 /* Find next tuple */
178 at = sgsn_auth_get_tuple(mmctx, mmctx->auth_triplet.key_seq);
179
180 if (!at) {
181 /* No valid tuple found, request fresh ones */
182 mmctx->auth_triplet.key_seq = GSM_KEY_SEQ_INVAL;
Jacob Erlbeckbe2c8d92014-11-12 10:18:09 +0100183 LOGMMCTXP(LOGL_INFO, mmctx,
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100184 "Requesting authentication tuples\n");
185 rc = gprs_subscr_request_auth_info(mmctx);
186 if (rc >= 0)
187 return 0;
188
189 return rc;
Jacob Erlbeckbe2c8d92014-11-12 10:18:09 +0100190 }
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100191
192 mmctx->auth_triplet = *at;
193 } else if (need_update_location) {
194 LOGMMCTXP(LOGL_INFO, mmctx,
195 "Missing information, requesting subscriber data\n");
Jacob Erlbeck771573c2014-12-19 18:08:48 +0100196 rc = gprs_subscr_request_update_location(mmctx);
197 if (rc >= 0)
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100198 return 0;
Jacob Erlbeck771573c2014-12-19 18:08:48 +0100199
200 return rc;
Jacob Erlbeckbe2c8d92014-11-12 10:18:09 +0100201 }
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200202
Jacob Erlbecka0b6efb2014-11-13 10:48:39 +0100203 sgsn_auth_update(mmctx);
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200204 return 0;
205}
206
Jacob Erlbecka0b6efb2014-11-13 10:48:39 +0100207void sgsn_auth_update(struct sgsn_mm_ctx *mmctx)
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200208{
Jacob Erlbeckf951a012014-11-07 14:17:44 +0100209 enum sgsn_auth_state auth_state;
Jacob Erlbeckbe2c8d92014-11-12 10:18:09 +0100210 struct gsm_subscriber *subscr = mmctx->subscr;
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100211 struct gsm_auth_tuple *at;
Jacob Erlbeckaf3d5c52015-01-05 17:51:17 +0100212 int gmm_cause;
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200213
Jacob Erlbecka0b6efb2014-11-13 10:48:39 +0100214 auth_state = sgsn_auth_state(mmctx);
Jacob Erlbeck3ea22602014-12-19 18:17:10 +0100215
216 LOGMMCTXP(LOGL_DEBUG, mmctx, "Updating authorization (%s -> %s)\n",
217 get_value_string(sgsn_auth_state_names, mmctx->auth_state),
218 get_value_string(sgsn_auth_state_names, auth_state));
219
Jacob Erlbeckbe2c8d92014-11-12 10:18:09 +0100220 if (auth_state == SGSN_AUTH_UNKNOWN && subscr &&
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100221 !(subscr->flags & GPRS_SUBSCRIBER_UPDATE_PENDING_MASK)) {
222 /* Reject requests if gprs_subscr_request_update_location fails */
Jacob Erlbeckf951a012014-11-07 14:17:44 +0100223 LOGMMCTXP(LOGL_ERROR, mmctx,
224 "Missing information, authorization not possible\n");
225 auth_state = SGSN_AUTH_REJECTED;
226 }
227
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100228 if (auth_state == SGSN_AUTH_AUTHENTICATE &&
229 mmctx->auth_triplet.key_seq == GSM_KEY_SEQ_INVAL) {
230 /* The current tuple is not valid, but we are possibly called
231 * because new auth tuples have been received */
232 at = sgsn_auth_get_tuple(mmctx, mmctx->auth_triplet.key_seq);
233 if (!at) {
234 LOGMMCTXP(LOGL_ERROR, mmctx,
235 "Missing auth tuples, authorization not possible\n");
236 auth_state = SGSN_AUTH_REJECTED;
237 } else {
238 mmctx->auth_triplet = *at;
239 }
240 }
241
Jacob Erlbeckf951a012014-11-07 14:17:44 +0100242 if (mmctx->auth_state == auth_state)
243 return;
244
245 LOGMMCTXP(LOGL_INFO, mmctx, "Got authorization update: state %s -> %s\n",
246 get_value_string(sgsn_auth_state_names, mmctx->auth_state),
247 get_value_string(sgsn_auth_state_names, auth_state));
248
249 mmctx->auth_state = auth_state;
250
251 switch (auth_state) {
Jacob Erlbeck2e5e94c2014-12-08 15:26:47 +0100252 case SGSN_AUTH_AUTHENTICATE:
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100253 if (subscr)
254 subscr->sgsn_data->auth_triplets_updated = 0;
255
Jacob Erlbeck2e5e94c2014-12-08 15:26:47 +0100256 gsm0408_gprs_authenticate(mmctx);
257 break;
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200258 case SGSN_AUTH_ACCEPTED:
259 gsm0408_gprs_access_granted(mmctx);
260 break;
261 case SGSN_AUTH_REJECTED:
Jacob Erlbeckd6267d12015-01-19 11:10:04 +0100262 gmm_cause =
263 subscr ? subscr->sgsn_data->error_cause :
264 SGSN_ERROR_CAUSE_NONE;
Jacob Erlbeckaf3d5c52015-01-05 17:51:17 +0100265
Jacob Erlbeck98647ca2014-11-11 14:47:38 +0100266 if (subscr && (subscr->flags & GPRS_SUBSCRIBER_CANCELLED) != 0)
Jacob Erlbeckaf3d5c52015-01-05 17:51:17 +0100267 gsm0408_gprs_access_cancelled(mmctx, gmm_cause);
Jacob Erlbeck98647ca2014-11-11 14:47:38 +0100268 else
Jacob Erlbeckaf3d5c52015-01-05 17:51:17 +0100269 gsm0408_gprs_access_denied(mmctx, gmm_cause);
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200270 break;
271 default:
272 break;
273 }
274}
Jacob Erlbeck7921ab12014-12-08 15:52:00 +0100275
276struct gsm_auth_tuple *sgsn_auth_get_tuple(struct sgsn_mm_ctx *mmctx,
277 unsigned key_seq)
278{
279 unsigned count;
280 unsigned idx;
281 struct gsm_auth_tuple *at = NULL;
282
283 struct sgsn_subscriber_data *sdata;
284
285 if (!mmctx->subscr)
286 return NULL;
287
288 if (key_seq == GSM_KEY_SEQ_INVAL)
289 /* Start with 0 after increment module array size */
290 idx = ARRAY_SIZE(sdata->auth_triplets) - 1;
291 else
292 idx = key_seq;
293
294 sdata = mmctx->subscr->sgsn_data;
295
296 /* Find next tuple */
297 for (count = ARRAY_SIZE(sdata->auth_triplets); count > 0; count--) {
298 idx = (idx + 1) % ARRAY_SIZE(sdata->auth_triplets);
299
300 if (sdata->auth_triplets[idx].key_seq == GSM_KEY_SEQ_INVAL)
301 continue;
302
303 if (sdata->auth_triplets[idx].use_count == 0) {
304 at = &sdata->auth_triplets[idx];
305 at->use_count = 1;
306 return at;
307 }
308 }
309
310 return NULL;
311}