NAME

POE::Component::Server::RADIUS - a POE based RADIUS server component

SYNOPSIS

use strict;
use Net::Radius::Dictionary;
use POE qw(Component::Server::RADIUS);

# Lets define some users who we'll allow access if they can provide the password
my %users = (
        aj => '0fGbqzu0cfA',
        clippy => 'D)z5gcjex1fB',
        cobb => '3ctPbe,cyl8K',
        crudpuppy => '0"bchMltV7dz',
        cthulhu => 'pn}Vbe0Dwr5z',
        matt => 'dyQ4sZ^x0eta',
        mike => 'iRr3auKbv8l>',
        mrcola => 'ynj4H?jec1Ol',
        tanya => 'korvS2~Rip4f',
        tux => 'Io2obo2kT%xq',
);

# We need a Net::Radius::Dictionary object to pass to the poco
my $dict = Net::Radius::Dictionary->new( 'dictionary' );

my $radiusd = POE::Component::Server::RADIUS->spawn( dict => $dict );

# Add some NAS devices to the poco
$radiusd->add_client( name => 'creosote', address => '192.168.1.73', secret => 'Po9hpbN^nz6n' );
$radiusd->add_client( name => 'dunmanifestin', address => '192.168.1.17', secret => '9g~dorQuos5E' );
$radiusd->add_client( name => 'genua', address => '192.168.1.71', secret => 'Qj8zmmr3hZb,' );
$radiusd->add_client( name => 'ladysybilramkin', address => '192.168.1.217', secret => 'j8yTuBfl)t2s' );
$radiusd->add_client( name => 'mort', address => '192.168.1.229', secret => '8oEhfKm(krr0' );
$radiusd->add_client( name => 'ysabell', address => '192.168.1.84', secret => 'i8quDld_2suH' );

POE::Session->create(
   package_states => [
	'main' => [qw(_start _authenticate _accounting)],
   ],
   heap => { users => \%users, },
);

$poe_kernel->run();
exit 0;

sub _start {
  # We need to register with the poco to receive events
  $poe_kernel->post( $radiusd->session_id(), 'register', authevent => '_authenticate', acctevent => '_accounting' );
  return;
}

sub _authenticate {
  my ($kernel,$sender,$heap,$client,$data,$req_id) = @_[KERNEL,SENDER,HEAP,ARG0,ARG1,ARG2];
  # Lets ignore dodgy requests
  return unless $data->{'User-Name'} and $data->{'User-Password'};
  # Send a reject if the username doesn't exist
  unless ( $heap->{users}->{ $data->{'User-Name'} } ) {
     $kernel->call( $sender, 'reject', $req_id );
     return;
  }
  # Does the password match? If not send a reject
  unless ( $heap->{users}->{ $data->{'User-Name'} } eq $data->{'User-Password'} ) {
     $kernel->call( $sender, 'reject', $req_id );
     return;
  }
  # Okay everything is cool. 
  $kernel->call( $sender, 'accept', $req_id );
  return;
}

sub _accounting {
  my ($kernel,$sender,$heap,$client,$data) = @_[KERNEL,SENDER,HEAP,ARG0,ARG1];
  # Do something with the data provided, like log to a database or a file
  return;
}

DESCRIPTION

POE::Component::Server::RADIUS is a POE that provides Remote Authentication Dial In User Service (RADIUS) server services to other POE sessions and components.

RADIUS is commonly used by ISPs and corporations managing access to Internet or internal networks and is an AAA (authentication, authorisation, and accounting) protocol.

The component deals with the receiving and transmission of RADIUS packets and uses the excellent Net::Radius::Packet and Net::Radius::Dictionary modules to construct the RADIUS packets.

Currently only PAP authentication is supported. Help and advice would be appreciated on implementing others. See contact details below.

The component does not deal with the actual authentication of users nor with the logging of accounting data. That is the job of other sessions which register with the component to receive events.

CONSTRUCTOR

spawn

Creates a new POE::Component::Server::RADIUS session that starts various UDP sockets. Takes one mandatory and a number of optional parameters:

'dict', a Net::Radius::Dictionary object reference, mandatory;
'alias', set an alias that you can use to address the component later;
'options', a hashref of POE session options;
'authport', specify a port to listen on for authentication requests;
'acctport', specify a port to listen on for accounting requests;
'legacy', set to a true value to make the component honour legacy listeners ports;
'timeout', set a time out in seconds that the poco waits for sessions to respond to auth requests, default 10;

By default the component listens on ports 1812 and 1813 for authentication and accounting requests, respectively. These are the official ports from the applicable RFCs. Setting legacy option makes the component also listen on ports 1645 and 1646.

Returns an POE::Component::Server::RADIUS object, which provides the following methods:

METHODS

add_client

Adds a RADIUS client to the server configuration. RADIUS clients need to be registered with their IP address and a shared secret. Takes a number of required parameters:

'name', a unique reference name;
'address', an IPv4 address;
'secret', a shared secret pass-phrase;
del_client

Removes a previously registered RADIUS client. Takes one argument, either a name or an IPv4 address.

session_id

Takes no arguments. Returns the POE Session ID of the component.

shutdown

Terminates the component.

authports

Returns a list of all the UDP ports configured for authentication requests.

acctports

Returns a list of all the UDP ports configured for accounting requests.

INPUT EVENTS

These are events that the component will accept:

register

This will register the sending session to receive events from the component. It requires either one of the following parameters. You may specify both if you require:

'authevent', the name of an event in your session that will be triggered for authentication requests;
'acctevent', the name of an event in your session that will be triggered for accounting requests;

The component automatically responds to accounting requests.

Authentication requests require your session to send either an accept or reject response back to the component.

accept

Tells the component to send an Access-Accept response back to the requesting client. Requires one mandatory argument which is a request_id previously given you by the component (See OUTPUT EVENTS for details). The remaining parameters are assumed to be RADIUS attributes that you want adding the the Access-Accept response. Check with the RFC for what attributes are valid.

reject

Tells the component to send an Access-Reject response back to the requesting client. Requires one mandatory argument which is a request_id previously given you by the component (See OUTPUT EVENTS for details). The remaining parameters are assumed to be RADIUS attributes that you want adding the the Access-Reject response. Check with the RFC for what attributes are valid.

unregister

This will unregister the sending session from receiving events.

shutdown

Terminates the component.

OUTPUT EVENTS

Dependent on which event types your session registered with the component to receive, you will get either one or the other of these or both.

acctevent type events

ARG0 will be the IP address of the RADIUS client. The component will have already discarded accounting requests from clients which don't have a matching IP address and shared-secret. ARG1 will be hashref containing RADIUS attributes and value pairs.

As the component automatically responds to valid clients with a Accounting-Response packet, your session need take any further action in response to these events.

authevent type events

ARG0 will be the IP address of the RADIUS client. The component will have already 'decrypted' the User-Password provided using the configured shared-secret for the RADIUS client. ARG1 will be a hashref containing RADIUS attributes and value pairs. ARG3 will be a unique request_id required when sending accept or reject events back to the component.

You must check the validity of the request and then issue either a accept or reject event back to the component using the request_id and specifying any RADIUS attributes that you wish conveyed to the client.

The component times out authentication requests to prevent stale requests. This timeout is configurable through the spawn constructor.

To get timely responses back to RADIUS clients it is suggested that you use call instead of post to send accept or reject events back to the component.

AUTHOR

Chris BinGOs Williams <chris@bingosnet.co.uk>

SEE ALSO

POE

http://en.wikipedia.org/wiki/RADIUS

http://www.faqs.org/rfcs/rfc2138.html

http://www.faqs.org/rfcs/rfc2866.html