Skip to content

Latest commit

 

History

History
185 lines (102 loc) · 4.28 KB

README.md

File metadata and controls

185 lines (102 loc) · 4.28 KB

Radius Server (Python)

This Raidus Server is writtten by Python, and is used to Authentication, Authorization, Accounting for WLAN user or PPPoE user. Test authorization through supplicant on Windows10, Android 4.4.4 and iOS 13.

Support authenticate method:

Support Dynamic Authorization Extensions:

  • Disconnect Messages
  • Change-of-Authorization (CoA) Messages

Pull submodule src code

git submodule update --init --recursive  # pull

Installation and Usage

  • Setup mysql

    start mysql: docker-compose -f docker-compose.yml up mysql

    init mysql database and table data with mysql_insert.sql

  • For authenticate

    Build the docker image

    docker-compose build auth

    Run the docker container

    docker-compose up auth

  • For accouting

    similiar with authenticate, but reaplce auth with acct

Build

lib libhostapd.so

cd third_party/hostapd-2.10/hostapd/
cat README.md

simulator eapol_test

cd third_party/wpa_supplicant-2.5/wpa_supplicant/
cat README.md

simulator radclient

cd third_party/freeradius-3.0.21/
cat README.md

Send authenticate request with simulator

authenticate: CHAP

enter into authenticate container: docker-compose exec auth bash

run simulator in container:

radclient -D /app/tools/simulator/etc/dictionary -d /app/etc/dictionary 127.0.0.1:1812  auth  'testing123'  < /app/tools/simulator/radius_test/auth/chap.conf

authenticate: PAP

enter into authenticate container: docker-compose exec auth bash

run simulator in container:

radclient -D /app/tools/simulator/etc/dictionary -d /app/etc/dictionary 127.0.0.1:1812  auth  'testing123'  < /app/tools/simulator/radius_test/auth/pap.conf

authenticate: MSCHAPv2

  1. docker-compose up -d auth_test, listen on port 2812

  2. Access Controller route traffic to 2812

authenticate: EAP-GTC

add USE_GTC=1 in .env and restart docker container

enter into authenticate container: docker-compose exec auth bash

run simulator in container:

./eapol_test -c /app/tools/simulator/eap_test/eapol_test.conf.peapv1.gtc -a 127.0.0.1 -p 1812 -s testing123 -r 0 -N 30:s:FF-FF-FF-FF-FF-FF -N 32:s:AC

authenticate: EAP-MSCHAPv2

remove USE_GTC=0 in .env and restart docker container

enter into authenticate container: docker-compose exec auth bash

run simulator in container:

./eapol_test -c /app/tools/simulator/eap_test/eapol_test.conf.peapv1.mschapv2 -a 127.0.0.1 -p 1812 -s testing123 -r 0 -N 30:s:FF-FF-FF-FF-FF-FF -N 32:s:AC

Send authenticate request with simulator

enter into accounting container: docker-compose exec acct bash

run simulator in container:

./radclient -D /app/tools/simulator/etc/dictionary -d /app/etc/dictionary 127.0.0.1:1813  acct  'testing123'  < /app/tools/simulator/radius_test/acct/i.conf

./radclient -D /app/tools/simulator/etc/dictionary -d /app/etc/dictionary 127.0.0.1:1813  acct  'testing123'  < /app/tools/simulator/radius_test/acct/u.conf

./radclient -D /app/tools/simulator/etc/dictionary -d /app/etc/dictionary 127.0.0.1:1813  acct  'testing123'  < /app/tools/simulator/radius_test/acct/t.conf

Send Dynamic Authorization Extensions request with simulator

disconnect

enter into accounting container: docker-compose exec dae bash

run simulator in container:

./radclient -D /app/tools/simulator/etc/dictionary -d /app/etc/dictionary 127.0.0.1:3799  disconnect  'testing123'  < /app/tools/simulator/radius_test/dae/disconnect.conf

gdb core

gdb /root/.pyenv/shims/python -c core.1 

gdb segmentation fault

ENTRYPOINT="tail -f /dev/null" docker-compose up -d auth_test

apt-get install gdb

./bin/gdb.sh    # gdb python3

(gdb) run /app/src/processor/auth_processor.py

# wait for segfault ##

(gdb) backtrace

# stack trace of the c code