blob: 9cc67db1cd903b7b5fc1436be10861fd29a46019 [file] [log] [blame]
Jacob Erlbeck3b5d4072014-10-24 15:11:03 +02001/* MS authorization and subscriber data handling */
2
3/* (C) 2009-2010 by Harald Welte <laforge@gnumonks.org>
4 *
5 * All Rights Reserved
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Affero General Public License as published by
9 * the Free Software Foundation; either version 3 of the License, or
10 * (at your option) any later version.
11 *
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU Affero General Public License for more details.
16 *
17 * You should have received a copy of the GNU Affero General Public License
18 * along with this program. If not, see <http://www.gnu.org/licenses/>.
19 *
20 */
21
22#include <openbsc/sgsn.h>
23#include <openbsc/gprs_sgsn.h>
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +020024#include <openbsc/gprs_gmm.h>
Jacob Erlbeckbe2c8d92014-11-12 10:18:09 +010025#include <openbsc/gsm_subscriber.h>
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +010026#include <openbsc/gsm_04_08_gprs.h>
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +020027#include <openbsc/debug.h>
28
29const struct value_string auth_state_names[] = {
30 { SGSN_AUTH_ACCEPTED, "accepted"},
31 { SGSN_AUTH_REJECTED, "rejected"},
32 { SGSN_AUTH_UNKNOWN, "unknown"},
33 { 0, NULL }
34};
Jacob Erlbeck3b5d4072014-10-24 15:11:03 +020035
Jacob Erlbeckf951a012014-11-07 14:17:44 +010036const struct value_string *sgsn_auth_state_names = auth_state_names;
37
Jacob Erlbecka0b6efb2014-11-13 10:48:39 +010038void sgsn_auth_init(void)
Jacob Erlbeck3b5d4072014-10-24 15:11:03 +020039{
Jacob Erlbecka0b6efb2014-11-13 10:48:39 +010040 INIT_LLIST_HEAD(&sgsn->cfg.imsi_acl);
Jacob Erlbeck3b5d4072014-10-24 15:11:03 +020041}
42
43/* temporary IMSI ACL hack */
44struct imsi_acl_entry *sgsn_acl_lookup(const char *imsi, struct sgsn_config *cfg)
45{
46 struct imsi_acl_entry *acl;
47 llist_for_each_entry(acl, &cfg->imsi_acl, list) {
48 if (!strcmp(imsi, acl->imsi))
49 return acl;
50 }
51 return NULL;
52}
53
54int sgsn_acl_add(const char *imsi, struct sgsn_config *cfg)
55{
56 struct imsi_acl_entry *acl;
57
58 if (sgsn_acl_lookup(imsi, cfg))
59 return -EEXIST;
60
61 acl = talloc_zero(NULL, struct imsi_acl_entry);
62 if (!acl)
63 return -ENOMEM;
64 strncpy(acl->imsi, imsi, sizeof(acl->imsi));
65
66 llist_add(&acl->list, &cfg->imsi_acl);
67
68 return 0;
69}
70
71int sgsn_acl_del(const char *imsi, struct sgsn_config *cfg)
72{
73 struct imsi_acl_entry *acl;
74
75 acl = sgsn_acl_lookup(imsi, cfg);
76 if (!acl)
77 return -ENODEV;
78
79 llist_del(&acl->list);
80 talloc_free(acl);
81
82 return 0;
83}
84
Jacob Erlbecka0b6efb2014-11-13 10:48:39 +010085enum sgsn_auth_state sgsn_auth_state(struct sgsn_mm_ctx *mmctx)
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +020086{
87 char mccmnc[16];
Jacob Erlbeck106f5472014-11-04 10:08:37 +010088 int check_net = 0;
89 int check_acl = 0;
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +020090
91 OSMO_ASSERT(mmctx);
92
Jacob Erlbeck106f5472014-11-04 10:08:37 +010093 switch (sgsn->cfg.auth_policy) {
94 case SGSN_AUTH_POLICY_OPEN:
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +020095 return SGSN_AUTH_ACCEPTED;
96
Jacob Erlbeck106f5472014-11-04 10:08:37 +010097 case SGSN_AUTH_POLICY_CLOSED:
98 check_net = 1;
99 check_acl = 1;
100 break;
101
102 case SGSN_AUTH_POLICY_ACL_ONLY:
103 check_acl = 1;
104 break;
Jacob Erlbeckbe2c8d92014-11-12 10:18:09 +0100105
106 case SGSN_AUTH_POLICY_REMOTE:
107 if (!mmctx->subscr)
108 return mmctx->auth_state;
109
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100110 if (mmctx->subscr->flags & GPRS_SUBSCRIBER_UPDATE_PENDING_MASK)
Jacob Erlbeckbe2c8d92014-11-12 10:18:09 +0100111 return mmctx->auth_state;
112
Jacob Erlbeck9d4f46c2014-12-17 13:20:08 +0100113 if (sgsn->cfg.require_authentication &&
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100114 (!mmctx->is_authenticated ||
115 mmctx->subscr->sgsn_data->auth_triplets_updated))
Jacob Erlbeck2e5e94c2014-12-08 15:26:47 +0100116 return SGSN_AUTH_AUTHENTICATE;
117
Jacob Erlbeckbe2c8d92014-11-12 10:18:09 +0100118 if (mmctx->subscr->authorized)
119 return SGSN_AUTH_ACCEPTED;
120
121 return SGSN_AUTH_REJECTED;
Jacob Erlbeck106f5472014-11-04 10:08:37 +0100122 }
123
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200124 if (!strlen(mmctx->imsi)) {
125 LOGMMCTXP(LOGL_NOTICE, mmctx,
126 "Missing IMSI, authorization state not known\n");
127 return SGSN_AUTH_UNKNOWN;
128 }
129
Jacob Erlbeck106f5472014-11-04 10:08:37 +0100130 if (check_net) {
131 /* We simply assume that the IMSI exists, as long as it is part
132 * of 'our' network */
133 snprintf(mccmnc, sizeof(mccmnc), "%03d%02d",
134 mmctx->ra.mcc, mmctx->ra.mnc);
135 if (strncmp(mccmnc, mmctx->imsi, 5) == 0)
136 return SGSN_AUTH_ACCEPTED;
137 }
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200138
Jacob Erlbeck106f5472014-11-04 10:08:37 +0100139 if (check_acl && sgsn_acl_lookup(mmctx->imsi, &sgsn->cfg))
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200140 return SGSN_AUTH_ACCEPTED;
141
142 return SGSN_AUTH_REJECTED;
143}
144
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100145/*
146 * This function is directly called by e.g. the GMM layer. It returns either
147 * after calling sgsn_auth_update directly or after triggering an asynchronous
148 * procedure which will call sgsn_auth_update later on.
149 */
Jacob Erlbecka0b6efb2014-11-13 10:48:39 +0100150int sgsn_auth_request(struct sgsn_mm_ctx *mmctx)
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200151{
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100152 struct gsm_subscriber *subscr;
153 struct gsm_auth_tuple *at;
154 int need_update_location;
155 int rc;
156
Jacob Erlbeckbe2c8d92014-11-12 10:18:09 +0100157 LOGMMCTXP(LOGL_DEBUG, mmctx, "Requesting authorization\n");
158
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100159 if (sgsn->cfg.auth_policy != SGSN_AUTH_POLICY_REMOTE) {
160 sgsn_auth_update(mmctx);
161 return 0;
162 }
163
Jacob Erlbeck771573c2014-12-19 18:08:48 +0100164 need_update_location = sgsn->cfg.require_update_location &&
165 (mmctx->subscr == NULL ||
166 mmctx->pending_req == GSM48_MT_GMM_ATTACH_REQ);
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100167
168 /* This has the side effect of registering the subscr with the mmctx */
169 subscr = gprs_subscr_get_or_create_by_mmctx(mmctx);
170 subscr_put(subscr);
171
172 OSMO_ASSERT(mmctx->subscr != NULL);
173
Jacob Erlbeck9d4f46c2014-12-17 13:20:08 +0100174 if (sgsn->cfg.require_authentication && !mmctx->is_authenticated) {
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100175 /* Find next tuple */
176 at = sgsn_auth_get_tuple(mmctx, mmctx->auth_triplet.key_seq);
177
178 if (!at) {
179 /* No valid tuple found, request fresh ones */
180 mmctx->auth_triplet.key_seq = GSM_KEY_SEQ_INVAL;
Jacob Erlbeckbe2c8d92014-11-12 10:18:09 +0100181 LOGMMCTXP(LOGL_INFO, mmctx,
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100182 "Requesting authentication tuples\n");
183 rc = gprs_subscr_request_auth_info(mmctx);
184 if (rc >= 0)
185 return 0;
186
187 return rc;
Jacob Erlbeckbe2c8d92014-11-12 10:18:09 +0100188 }
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100189
190 mmctx->auth_triplet = *at;
191 } else if (need_update_location) {
192 LOGMMCTXP(LOGL_INFO, mmctx,
193 "Missing information, requesting subscriber data\n");
Jacob Erlbeck771573c2014-12-19 18:08:48 +0100194 rc = gprs_subscr_request_update_location(mmctx);
195 if (rc >= 0)
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100196 return 0;
Jacob Erlbeck771573c2014-12-19 18:08:48 +0100197
198 return rc;
Jacob Erlbeckbe2c8d92014-11-12 10:18:09 +0100199 }
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200200
Jacob Erlbecka0b6efb2014-11-13 10:48:39 +0100201 sgsn_auth_update(mmctx);
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200202 return 0;
203}
204
Jacob Erlbecka0b6efb2014-11-13 10:48:39 +0100205void sgsn_auth_update(struct sgsn_mm_ctx *mmctx)
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200206{
Jacob Erlbeckf951a012014-11-07 14:17:44 +0100207 enum sgsn_auth_state auth_state;
Jacob Erlbeckbe2c8d92014-11-12 10:18:09 +0100208 struct gsm_subscriber *subscr = mmctx->subscr;
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100209 struct gsm_auth_tuple *at;
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200210
Jacob Erlbecka0b6efb2014-11-13 10:48:39 +0100211 auth_state = sgsn_auth_state(mmctx);
Jacob Erlbeck3ea22602014-12-19 18:17:10 +0100212
213 LOGMMCTXP(LOGL_DEBUG, mmctx, "Updating authorization (%s -> %s)\n",
214 get_value_string(sgsn_auth_state_names, mmctx->auth_state),
215 get_value_string(sgsn_auth_state_names, auth_state));
216
Jacob Erlbeckbe2c8d92014-11-12 10:18:09 +0100217 if (auth_state == SGSN_AUTH_UNKNOWN && subscr &&
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100218 !(subscr->flags & GPRS_SUBSCRIBER_UPDATE_PENDING_MASK)) {
219 /* Reject requests if gprs_subscr_request_update_location fails */
Jacob Erlbeckf951a012014-11-07 14:17:44 +0100220 LOGMMCTXP(LOGL_ERROR, mmctx,
221 "Missing information, authorization not possible\n");
222 auth_state = SGSN_AUTH_REJECTED;
223 }
224
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100225 if (auth_state == SGSN_AUTH_AUTHENTICATE &&
226 mmctx->auth_triplet.key_seq == GSM_KEY_SEQ_INVAL) {
227 /* The current tuple is not valid, but we are possibly called
228 * because new auth tuples have been received */
229 at = sgsn_auth_get_tuple(mmctx, mmctx->auth_triplet.key_seq);
230 if (!at) {
231 LOGMMCTXP(LOGL_ERROR, mmctx,
232 "Missing auth tuples, authorization not possible\n");
233 auth_state = SGSN_AUTH_REJECTED;
234 } else {
235 mmctx->auth_triplet = *at;
236 }
237 }
238
Jacob Erlbeckf951a012014-11-07 14:17:44 +0100239 if (mmctx->auth_state == auth_state)
240 return;
241
242 LOGMMCTXP(LOGL_INFO, mmctx, "Got authorization update: state %s -> %s\n",
243 get_value_string(sgsn_auth_state_names, mmctx->auth_state),
244 get_value_string(sgsn_auth_state_names, auth_state));
245
246 mmctx->auth_state = auth_state;
247
248 switch (auth_state) {
Jacob Erlbeck2e5e94c2014-12-08 15:26:47 +0100249 case SGSN_AUTH_AUTHENTICATE:
Jacob Erlbeck98a95ac2014-11-28 14:55:25 +0100250 if (subscr)
251 subscr->sgsn_data->auth_triplets_updated = 0;
252
Jacob Erlbeck2e5e94c2014-12-08 15:26:47 +0100253 gsm0408_gprs_authenticate(mmctx);
254 break;
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200255 case SGSN_AUTH_ACCEPTED:
256 gsm0408_gprs_access_granted(mmctx);
257 break;
258 case SGSN_AUTH_REJECTED:
Jacob Erlbeck98647ca2014-11-11 14:47:38 +0100259 if (subscr && (subscr->flags & GPRS_SUBSCRIBER_CANCELLED) != 0)
260 gsm0408_gprs_access_cancelled(mmctx);
261 else
262 gsm0408_gprs_access_denied(mmctx);
Jacob Erlbeck423f8bf2014-10-24 18:09:54 +0200263 break;
264 default:
265 break;
266 }
267}
Jacob Erlbeck7921ab12014-12-08 15:52:00 +0100268
269struct gsm_auth_tuple *sgsn_auth_get_tuple(struct sgsn_mm_ctx *mmctx,
270 unsigned key_seq)
271{
272 unsigned count;
273 unsigned idx;
274 struct gsm_auth_tuple *at = NULL;
275
276 struct sgsn_subscriber_data *sdata;
277
278 if (!mmctx->subscr)
279 return NULL;
280
281 if (key_seq == GSM_KEY_SEQ_INVAL)
282 /* Start with 0 after increment module array size */
283 idx = ARRAY_SIZE(sdata->auth_triplets) - 1;
284 else
285 idx = key_seq;
286
287 sdata = mmctx->subscr->sgsn_data;
288
289 /* Find next tuple */
290 for (count = ARRAY_SIZE(sdata->auth_triplets); count > 0; count--) {
291 idx = (idx + 1) % ARRAY_SIZE(sdata->auth_triplets);
292
293 if (sdata->auth_triplets[idx].key_seq == GSM_KEY_SEQ_INVAL)
294 continue;
295
296 if (sdata->auth_triplets[idx].use_count == 0) {
297 at = &sdata->auth_triplets[idx];
298 at->use_count = 1;
299 return at;
300 }
301 }
302
303 return NULL;
304}