1 /*
2  * HLR/AuC testing gateway for hostapd EAP-SIM/AKA database/authenticator
3  * Copyright (c) 2005-2007, 2012-2017, Jouni Malinen <j@w1.fi>
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  *
8  * This is an example implementation of the EAP-SIM/AKA database/authentication
9  * gateway interface to HLR/AuC. It is expected to be replaced with an
10  * implementation of SS7 gateway to GSM/UMTS authentication center (HLR/AuC) or
11  * a local implementation of SIM triplet and AKA authentication data generator.
12  *
13  * hostapd will send SIM/AKA authentication queries over a UNIX domain socket
14  * to and external program, e.g., this hlr_auc_gw. This interface uses simple
15  * text-based format:
16  *
17  * EAP-SIM / GSM triplet query/response:
18  * SIM-REQ-AUTH <IMSI> <max_chal>
19  * SIM-RESP-AUTH <IMSI> Kc1:SRES1:RAND1 Kc2:SRES2:RAND2 [Kc3:SRES3:RAND3]
20  * SIM-RESP-AUTH <IMSI> FAILURE
21  * GSM-AUTH-REQ <IMSI> RAND1:RAND2[:RAND3]
22  * GSM-AUTH-RESP <IMSI> Kc1:SRES1:Kc2:SRES2[:Kc3:SRES3]
23  * GSM-AUTH-RESP <IMSI> FAILURE
24  *
25  * EAP-AKA / UMTS query/response:
26  * AKA-REQ-AUTH <IMSI>
27  * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES>
28  * AKA-RESP-AUTH <IMSI> FAILURE
29  *
30  * EAP-AKA / UMTS AUTS (re-synchronization):
31  * AKA-AUTS <IMSI> <AUTS> <RAND>
32  *
33  * IMSI and max_chal are sent as an ASCII string,
34  * Kc/SRES/RAND/AUTN/IK/CK/RES/AUTS as hex strings.
35  *
36  * An example implementation here reads GSM authentication triplets from a
37  * text file in IMSI:Kc:SRES:RAND format, IMSI in ASCII, other fields as hex
38  * strings. This is used to simulate an HLR/AuC. As such, it is not very useful
39  * for real life authentication, but it is useful both as an example
40  * implementation and for EAP-SIM/AKA/AKA' testing.
41  *
42  * For a stronger example design, Milenage and GSM-Milenage algorithms can be
43  * used to dynamically generate authenticatipn information for EAP-AKA/AKA' and
44  * EAP-SIM, respectively, if Ki is known.
45  *
46  * SQN generation follows the not time-based Profile 2 described in
47  * 3GPP TS 33.102 Annex C.3.2. The length of IND is 5 bits by default, but this
48  * can be changed with a command line options if needed.
49  */
50 
51 #include "includes.h"
52 #include <sys/un.h>
53 #ifdef CONFIG_SQLITE
54 #include <sqlite3.h>
55 #endif /* CONFIG_SQLITE */
56 
57 #include "common.h"
58 #include "crypto/milenage.h"
59 #include "crypto/random.h"
60 
61 static const char *default_socket_path = "/tmp/hlr_auc_gw.sock";
62 static const char *socket_path;
63 static int serv_sock = -1;
64 static char *milenage_file = NULL;
65 static int update_milenage = 0;
66 static int sqn_changes = 0;
67 static int ind_len = 5;
68 static int stdout_debug = 1;
69 
70 /* GSM triplets */
71 struct gsm_triplet {
72 	struct gsm_triplet *next;
73 	char imsi[20];
74 	u8 kc[8];
75 	u8 sres[4];
76 	u8 _rand[16];
77 };
78 
79 static struct gsm_triplet *gsm_db = NULL, *gsm_db_pos = NULL;
80 
81 /* OPc and AMF parameters for Milenage (Example algorithms for AKA). */
82 struct milenage_parameters {
83 	struct milenage_parameters *next;
84 	char imsi[20];
85 	u8 ki[16];
86 	u8 opc[16];
87 	u8 amf[2];
88 	u8 sqn[6];
89 	int set;
90 	size_t res_len;
91 };
92 
93 static struct milenage_parameters *milenage_db = NULL;
94 
95 #define EAP_SIM_MAX_CHAL 3
96 
97 #define EAP_AKA_RAND_LEN 16
98 #define EAP_AKA_AUTN_LEN 16
99 #define EAP_AKA_AUTS_LEN 14
100 #define EAP_AKA_RES_MIN_LEN 4
101 #define EAP_AKA_RES_MAX_LEN 16
102 #define EAP_AKA_IK_LEN 16
103 #define EAP_AKA_CK_LEN 16
104 
105 
106 #ifdef CONFIG_SQLITE
107 
108 static sqlite3 *sqlite_db = NULL;
109 static struct milenage_parameters db_tmp_milenage;
110 
111 
db_table_exists(sqlite3 * db,const char * name)112 static int db_table_exists(sqlite3 *db, const char *name)
113 {
114 	char cmd[128];
115 	os_snprintf(cmd, sizeof(cmd), "SELECT 1 FROM %s;", name);
116 	return sqlite3_exec(db, cmd, NULL, NULL, NULL) == SQLITE_OK;
117 }
118 
119 
db_table_create_milenage(sqlite3 * db)120 static int db_table_create_milenage(sqlite3 *db)
121 {
122 	char *err = NULL;
123 	const char *sql =
124 		"CREATE TABLE milenage("
125 		"  imsi INTEGER PRIMARY KEY NOT NULL,"
126 		"  ki CHAR(32) NOT NULL,"
127 		"  opc CHAR(32) NOT NULL,"
128 		"  amf CHAR(4) NOT NULL,"
129 		"  sqn CHAR(12) NOT NULL,"
130 		"  res_len INTEGER"
131 		");";
132 
133 	printf("Adding database table for milenage information\n");
134 	if (sqlite3_exec(db, sql, NULL, NULL, &err) != SQLITE_OK) {
135 		printf("SQLite error: %s\n", err);
136 		sqlite3_free(err);
137 		return -1;
138 	}
139 
140 	return 0;
141 }
142 
143 
db_open(const char * db_file)144 static sqlite3 * db_open(const char *db_file)
145 {
146 	sqlite3 *db;
147 
148 	if (sqlite3_open(db_file, &db)) {
149 		printf("Failed to open database %s: %s\n",
150 		       db_file, sqlite3_errmsg(db));
151 		sqlite3_close(db);
152 		return NULL;
153 	}
154 
155 	if (!db_table_exists(db, "milenage") &&
156 	    db_table_create_milenage(db) < 0) {
157 		sqlite3_close(db);
158 		return NULL;
159 	}
160 
161 	return db;
162 }
163 
164 
get_milenage_cb(void * ctx,int argc,char * argv[],char * col[])165 static int get_milenage_cb(void *ctx, int argc, char *argv[], char *col[])
166 {
167 	struct milenage_parameters *m = ctx;
168 	int i;
169 
170 	m->set = 1;
171 
172 	for (i = 0; i < argc; i++) {
173 		if (os_strcmp(col[i], "ki") == 0 && argv[i] &&
174 		    hexstr2bin(argv[i], m->ki, sizeof(m->ki))) {
175 			printf("Invalid ki value in database\n");
176 			return -1;
177 		}
178 
179 		if (os_strcmp(col[i], "opc") == 0 && argv[i] &&
180 		    hexstr2bin(argv[i], m->opc, sizeof(m->opc))) {
181 			printf("Invalid opcvalue in database\n");
182 			return -1;
183 		}
184 
185 		if (os_strcmp(col[i], "amf") == 0 && argv[i] &&
186 		    hexstr2bin(argv[i], m->amf, sizeof(m->amf))) {
187 			printf("Invalid amf value in database\n");
188 			return -1;
189 		}
190 
191 		if (os_strcmp(col[i], "sqn") == 0 && argv[i] &&
192 		    hexstr2bin(argv[i], m->sqn, sizeof(m->sqn))) {
193 			printf("Invalid sqn value in database\n");
194 			return -1;
195 		}
196 
197 		if (os_strcmp(col[i], "res_len") == 0 && argv[i]) {
198 			m->res_len = atoi(argv[i]);
199 		}
200 	}
201 
202 	return 0;
203 }
204 
205 
db_get_milenage(const char * imsi_txt)206 static struct milenage_parameters * db_get_milenage(const char *imsi_txt)
207 {
208 	char cmd[128];
209 	unsigned long long imsi;
210 
211 	os_memset(&db_tmp_milenage, 0, sizeof(db_tmp_milenage));
212 	imsi = atoll(imsi_txt);
213 	os_snprintf(db_tmp_milenage.imsi, sizeof(db_tmp_milenage.imsi),
214 		    "%llu", imsi);
215 	os_snprintf(cmd, sizeof(cmd),
216 		    "SELECT * FROM milenage WHERE imsi=%llu;", imsi);
217 	if (sqlite3_exec(sqlite_db, cmd, get_milenage_cb, &db_tmp_milenage,
218 			 NULL) != SQLITE_OK)
219 		return NULL;
220 
221 	if (!db_tmp_milenage.set)
222 		return NULL;
223 	return &db_tmp_milenage;
224 }
225 
226 
db_update_milenage_sqn(struct milenage_parameters * m)227 static int db_update_milenage_sqn(struct milenage_parameters *m)
228 {
229 	char cmd[128], val[13], *pos;
230 
231 	if (sqlite_db == NULL)
232 		return 0;
233 
234 	pos = val;
235 	pos += wpa_snprintf_hex(pos, sizeof(val), m->sqn, 6);
236 	*pos = '\0';
237 	os_snprintf(cmd, sizeof(cmd),
238 		    "UPDATE milenage SET sqn='%s' WHERE imsi=%s;",
239 		    val, m->imsi);
240 	if (sqlite3_exec(sqlite_db, cmd, NULL, NULL, NULL) != SQLITE_OK) {
241 		printf("Failed to update SQN in database for IMSI %s\n",
242 		       m->imsi);
243 		return -1;
244 	}
245 	return 0;
246 }
247 
248 #endif /* CONFIG_SQLITE */
249 
250 
open_socket(const char * path)251 static int open_socket(const char *path)
252 {
253 	struct sockaddr_un addr;
254 	int s;
255 
256 	s = socket(PF_UNIX, SOCK_DGRAM, 0);
257 	if (s < 0) {
258 		perror("socket(PF_UNIX)");
259 		return -1;
260 	}
261 
262 	memset(&addr, 0, sizeof(addr));
263 	addr.sun_family = AF_UNIX;
264 	os_strlcpy(addr.sun_path, path, sizeof(addr.sun_path));
265 	if (bind(s, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
266 		perror("hlr-auc-gw: bind(PF_UNIX)");
267 		close(s);
268 		return -1;
269 	}
270 
271 	return s;
272 }
273 
274 
read_gsm_triplets(const char * fname)275 static int read_gsm_triplets(const char *fname)
276 {
277 	FILE *f;
278 	char buf[200], *pos, *pos2;
279 	struct gsm_triplet *g = NULL;
280 	int line, ret = 0;
281 
282 	if (fname == NULL)
283 		return -1;
284 
285 	f = fopen(fname, "r");
286 	if (f == NULL) {
287 		printf("Could not open GSM triplet data file '%s'\n", fname);
288 		return -1;
289 	}
290 
291 	line = 0;
292 	while (fgets(buf, sizeof(buf), f)) {
293 		line++;
294 
295 		/* Parse IMSI:Kc:SRES:RAND */
296 		buf[sizeof(buf) - 1] = '\0';
297 		if (buf[0] == '#')
298 			continue;
299 		pos = buf;
300 		while (*pos != '\0' && *pos != '\n')
301 			pos++;
302 		if (*pos == '\n')
303 			*pos = '\0';
304 		pos = buf;
305 		if (*pos == '\0')
306 			continue;
307 
308 		g = os_zalloc(sizeof(*g));
309 		if (g == NULL) {
310 			ret = -1;
311 			break;
312 		}
313 
314 		/* IMSI */
315 		pos2 = NULL;
316 		pos = str_token(buf, ":", &pos2);
317 		if (!pos || os_strlen(pos) >= sizeof(g->imsi)) {
318 			printf("%s:%d - Invalid IMSI\n", fname, line);
319 			ret = -1;
320 			break;
321 		}
322 		os_strlcpy(g->imsi, pos, sizeof(g->imsi));
323 
324 		/* Kc */
325 		pos = str_token(buf, ":", &pos2);
326 		if (!pos || os_strlen(pos) != 16 || hexstr2bin(pos, g->kc, 8)) {
327 			printf("%s:%d - Invalid Kc\n", fname, line);
328 			ret = -1;
329 			break;
330 		}
331 
332 		/* SRES */
333 		pos = str_token(buf, ":", &pos2);
334 		if (!pos || os_strlen(pos) != 8 ||
335 		    hexstr2bin(pos, g->sres, 4)) {
336 			printf("%s:%d - Invalid SRES\n", fname, line);
337 			ret = -1;
338 			break;
339 		}
340 
341 		/* RAND */
342 		pos = str_token(buf, ":", &pos2);
343 		if (!pos || os_strlen(pos) != 32 ||
344 		    hexstr2bin(pos, g->_rand, 16)) {
345 			printf("%s:%d - Invalid RAND\n", fname, line);
346 			ret = -1;
347 			break;
348 		}
349 
350 		g->next = gsm_db;
351 		gsm_db = g;
352 		g = NULL;
353 	}
354 	os_free(g);
355 
356 	fclose(f);
357 
358 	return ret;
359 }
360 
361 
get_gsm_triplet(const char * imsi)362 static struct gsm_triplet * get_gsm_triplet(const char *imsi)
363 {
364 	struct gsm_triplet *g = gsm_db_pos;
365 
366 	while (g) {
367 		if (strcmp(g->imsi, imsi) == 0) {
368 			gsm_db_pos = g->next;
369 			return g;
370 		}
371 		g = g->next;
372 	}
373 
374 	g = gsm_db;
375 	while (g && g != gsm_db_pos) {
376 		if (strcmp(g->imsi, imsi) == 0) {
377 			gsm_db_pos = g->next;
378 			return g;
379 		}
380 		g = g->next;
381 	}
382 
383 	return NULL;
384 }
385 
386 
read_milenage(const char * fname)387 static int read_milenage(const char *fname)
388 {
389 	FILE *f;
390 	char buf[200], *pos, *pos2;
391 	struct milenage_parameters *m = NULL;
392 	int line, ret = 0;
393 
394 	if (fname == NULL)
395 		return -1;
396 
397 	f = fopen(fname, "r");
398 	if (f == NULL) {
399 		printf("Could not open Milenage data file '%s'\n", fname);
400 		return -1;
401 	}
402 
403 	line = 0;
404 	while (fgets(buf, sizeof(buf), f)) {
405 		line++;
406 
407 		/* Parse IMSI Ki OPc AMF SQN [RES_len] */
408 		buf[sizeof(buf) - 1] = '\0';
409 		if (buf[0] == '#')
410 			continue;
411 		pos = buf;
412 		while (*pos != '\0' && *pos != '\n')
413 			pos++;
414 		if (*pos == '\n')
415 			*pos = '\0';
416 		pos = buf;
417 		if (*pos == '\0')
418 			continue;
419 
420 		m = os_zalloc(sizeof(*m));
421 		if (m == NULL) {
422 			ret = -1;
423 			break;
424 		}
425 
426 		/* IMSI */
427 		pos2 = NULL;
428 		pos = str_token(buf, " ", &pos2);
429 		if (!pos || os_strlen(pos) >= sizeof(m->imsi)) {
430 			printf("%s:%d - Invalid IMSI\n", fname, line);
431 			ret = -1;
432 			break;
433 		}
434 		os_strlcpy(m->imsi, pos, sizeof(m->imsi));
435 
436 		/* Ki */
437 		pos = str_token(buf, " ", &pos2);
438 		if (!pos || os_strlen(pos) != 32 ||
439 		    hexstr2bin(pos, m->ki, 16)) {
440 			printf("%s:%d - Invalid Ki\n", fname, line);
441 			ret = -1;
442 			break;
443 		}
444 
445 		/* OPc */
446 		pos = str_token(buf, " ", &pos2);
447 		if (!pos || os_strlen(pos) != 32 ||
448 		    hexstr2bin(pos, m->opc, 16)) {
449 			printf("%s:%d - Invalid OPc\n", fname, line);
450 			ret = -1;
451 			break;
452 		}
453 
454 		/* AMF */
455 		pos = str_token(buf, " ", &pos2);
456 		if (!pos || os_strlen(pos) != 4 || hexstr2bin(pos, m->amf, 2)) {
457 			printf("%s:%d - Invalid AMF\n", fname, line);
458 			ret = -1;
459 			break;
460 		}
461 
462 		/* SQN */
463 		pos = str_token(buf, " ", &pos2);
464 		if (!pos || os_strlen(pos) != 12 ||
465 		    hexstr2bin(pos, m->sqn, 6)) {
466 			printf("%s:%d - Invalid SEQ\n", fname, line);
467 			ret = -1;
468 			break;
469 		}
470 
471 		pos = str_token(buf, " ", &pos2);
472 		if (pos) {
473 			m->res_len = atoi(pos);
474 			if (m->res_len &&
475 			    (m->res_len < EAP_AKA_RES_MIN_LEN ||
476 			     m->res_len > EAP_AKA_RES_MAX_LEN)) {
477 				printf("%s:%d - Invalid RES_len\n",
478 				       fname, line);
479 				ret = -1;
480 				break;
481 			}
482 		}
483 
484 		m->next = milenage_db;
485 		milenage_db = m;
486 		m = NULL;
487 	}
488 	os_free(m);
489 
490 	fclose(f);
491 
492 	return ret;
493 }
494 
495 
update_milenage_file(const char * fname)496 static void update_milenage_file(const char *fname)
497 {
498 	FILE *f, *f2;
499 	char name[500], buf[500], *pos;
500 	char *end = buf + sizeof(buf);
501 	struct milenage_parameters *m;
502 	size_t imsi_len;
503 
504 	f = fopen(fname, "r");
505 	if (f == NULL) {
506 		printf("Could not open Milenage data file '%s'\n", fname);
507 		return;
508 	}
509 
510 	snprintf(name, sizeof(name), "%s.new", fname);
511 	f2 = fopen(name, "w");
512 	if (f2 == NULL) {
513 		printf("Could not write Milenage data file '%s'\n", name);
514 		fclose(f);
515 		return;
516 	}
517 
518 	while (fgets(buf, sizeof(buf), f)) {
519 		/* IMSI Ki OPc AMF SQN */
520 		buf[sizeof(buf) - 1] = '\0';
521 
522 		pos = strchr(buf, ' ');
523 		if (buf[0] == '#' || pos == NULL || pos - buf >= 20)
524 			goto no_update;
525 
526 		imsi_len = pos - buf;
527 
528 		for (m = milenage_db; m; m = m->next) {
529 			if (strncmp(buf, m->imsi, imsi_len) == 0 &&
530 			    m->imsi[imsi_len] == '\0')
531 				break;
532 		}
533 
534 		if (!m)
535 			goto no_update;
536 
537 		pos = buf;
538 		pos += snprintf(pos, end - pos, "%s ", m->imsi);
539 		pos += wpa_snprintf_hex(pos, end - pos, m->ki, 16);
540 		*pos++ = ' ';
541 		pos += wpa_snprintf_hex(pos, end - pos, m->opc, 16);
542 		*pos++ = ' ';
543 		pos += wpa_snprintf_hex(pos, end - pos, m->amf, 2);
544 		*pos++ = ' ';
545 		pos += wpa_snprintf_hex(pos, end - pos, m->sqn, 6);
546 		*pos++ = '\n';
547 
548 	no_update:
549 		fprintf(f2, "%s", buf);
550 	}
551 
552 	fclose(f2);
553 	fclose(f);
554 
555 	snprintf(name, sizeof(name), "%s.bak", fname);
556 	if (rename(fname, name) < 0) {
557 		perror("rename");
558 		return;
559 	}
560 
561 	snprintf(name, sizeof(name), "%s.new", fname);
562 	if (rename(name, fname) < 0) {
563 		perror("rename");
564 		return;
565 	}
566 
567 }
568 
569 
get_milenage(const char * imsi)570 static struct milenage_parameters * get_milenage(const char *imsi)
571 {
572 	struct milenage_parameters *m = milenage_db;
573 
574 	while (m) {
575 		if (strcmp(m->imsi, imsi) == 0)
576 			break;
577 		m = m->next;
578 	}
579 
580 #ifdef CONFIG_SQLITE
581 	if (!m)
582 		m = db_get_milenage(imsi);
583 #endif /* CONFIG_SQLITE */
584 
585 	return m;
586 }
587 
588 
sim_req_auth(char * imsi,char * resp,size_t resp_len)589 static int sim_req_auth(char *imsi, char *resp, size_t resp_len)
590 {
591 	int count, max_chal, ret;
592 	char *pos;
593 	char *rpos, *rend;
594 	struct milenage_parameters *m;
595 	struct gsm_triplet *g;
596 
597 	resp[0] = '\0';
598 
599 	pos = strchr(imsi, ' ');
600 	if (pos) {
601 		*pos++ = '\0';
602 		max_chal = atoi(pos);
603 		if (max_chal < 1 || max_chal > EAP_SIM_MAX_CHAL)
604 			max_chal = EAP_SIM_MAX_CHAL;
605 	} else
606 		max_chal = EAP_SIM_MAX_CHAL;
607 
608 	rend = resp + resp_len;
609 	rpos = resp;
610 	ret = snprintf(rpos, rend - rpos, "SIM-RESP-AUTH %s", imsi);
611 	if (ret < 0 || ret >= rend - rpos)
612 		return -1;
613 	rpos += ret;
614 
615 	m = get_milenage(imsi);
616 	if (m) {
617 		u8 _rand[16], sres[4], kc[8];
618 		for (count = 0; count < max_chal; count++) {
619 			if (random_get_bytes(_rand, 16) < 0)
620 				return -1;
621 			gsm_milenage(m->opc, m->ki, _rand, sres, kc);
622 			*rpos++ = ' ';
623 			rpos += wpa_snprintf_hex(rpos, rend - rpos, kc, 8);
624 			*rpos++ = ':';
625 			rpos += wpa_snprintf_hex(rpos, rend - rpos, sres, 4);
626 			*rpos++ = ':';
627 			rpos += wpa_snprintf_hex(rpos, rend - rpos, _rand, 16);
628 		}
629 		*rpos = '\0';
630 		return 0;
631 	}
632 
633 	count = 0;
634 	while (count < max_chal && (g = get_gsm_triplet(imsi))) {
635 		if (strcmp(g->imsi, imsi) != 0)
636 			continue;
637 
638 		if (rpos < rend)
639 			*rpos++ = ' ';
640 		rpos += wpa_snprintf_hex(rpos, rend - rpos, g->kc, 8);
641 		if (rpos < rend)
642 			*rpos++ = ':';
643 		rpos += wpa_snprintf_hex(rpos, rend - rpos, g->sres, 4);
644 		if (rpos < rend)
645 			*rpos++ = ':';
646 		rpos += wpa_snprintf_hex(rpos, rend - rpos, g->_rand, 16);
647 		count++;
648 	}
649 
650 	if (count == 0) {
651 		printf("No GSM triplets found for %s\n", imsi);
652 		ret = snprintf(rpos, rend - rpos, " FAILURE");
653 		if (ret < 0 || ret >= rend - rpos)
654 			return -1;
655 		rpos += ret;
656 	}
657 
658 	return 0;
659 }
660 
661 
gsm_auth_req(char * imsi,char * resp,size_t resp_len)662 static int gsm_auth_req(char *imsi, char *resp, size_t resp_len)
663 {
664 	int count, ret;
665 	char *pos, *rpos, *rend;
666 	struct milenage_parameters *m;
667 
668 	resp[0] = '\0';
669 
670 	pos = os_strchr(imsi, ' ');
671 	if (!pos)
672 		return -1;
673 	*pos++ = '\0';
674 
675 	rend = resp + resp_len;
676 	rpos = resp;
677 	ret = os_snprintf(rpos, rend - rpos, "GSM-AUTH-RESP %s", imsi);
678 	if (os_snprintf_error(rend - rpos, ret))
679 		return -1;
680 	rpos += ret;
681 
682 	m = get_milenage(imsi);
683 	if (m) {
684 		u8 _rand[16], sres[4], kc[8];
685 		for (count = 0; count < EAP_SIM_MAX_CHAL; count++) {
686 			if (hexstr2bin(pos, _rand, 16) != 0)
687 				return -1;
688 			gsm_milenage(m->opc, m->ki, _rand, sres, kc);
689 			*rpos++ = count == 0 ? ' ' : ':';
690 			rpos += wpa_snprintf_hex(rpos, rend - rpos, kc, 8);
691 			*rpos++ = ':';
692 			rpos += wpa_snprintf_hex(rpos, rend - rpos, sres, 4);
693 			pos += 16 * 2;
694 			if (*pos != ':')
695 				break;
696 			pos++;
697 		}
698 		*rpos = '\0';
699 		return 0;
700 	}
701 
702 	printf("No GSM triplets found for %s\n", imsi);
703 	ret = os_snprintf(rpos, rend - rpos, " FAILURE");
704 	if (os_snprintf_error(rend - rpos, ret))
705 		return -1;
706 	rpos += ret;
707 
708 	return 0;
709 }
710 
711 
inc_sqn(u8 * sqn)712 static void inc_sqn(u8 *sqn)
713 {
714 	u64 val, seq, ind;
715 
716 	/*
717 	 * SQN = SEQ | IND = SEQ1 | SEQ2 | IND
718 	 *
719 	 * The mechanism used here is not time-based, so SEQ2 is void and
720 	 * SQN = SEQ1 | IND. The length of IND is ind_len bits and the length
721 	 * of SEQ1 is 48 - ind_len bits.
722 	 */
723 
724 	/* Increment both SEQ and IND by one */
725 	val = ((u64) WPA_GET_BE32(sqn) << 16) | ((u64) WPA_GET_BE16(sqn + 4));
726 	seq = (val >> ind_len) + 1;
727 	ind = (val + 1) & ((1 << ind_len) - 1);
728 	val = (seq << ind_len) | ind;
729 	WPA_PUT_BE32(sqn, val >> 16);
730 	WPA_PUT_BE16(sqn + 4, val & 0xffff);
731 }
732 
733 
aka_req_auth(char * imsi,char * resp,size_t resp_len)734 static int aka_req_auth(char *imsi, char *resp, size_t resp_len)
735 {
736 	/* AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> */
737 	char *pos, *end;
738 	u8 _rand[EAP_AKA_RAND_LEN];
739 	u8 autn[EAP_AKA_AUTN_LEN];
740 	u8 ik[EAP_AKA_IK_LEN];
741 	u8 ck[EAP_AKA_CK_LEN];
742 	u8 res[EAP_AKA_RES_MAX_LEN];
743 	size_t res_len;
744 	int ret;
745 	struct milenage_parameters *m;
746 	int failed = 0;
747 
748 	m = get_milenage(imsi);
749 	if (m) {
750 		if (random_get_bytes(_rand, EAP_AKA_RAND_LEN) < 0)
751 			return -1;
752 		res_len = EAP_AKA_RES_MAX_LEN;
753 		inc_sqn(m->sqn);
754 #ifdef CONFIG_SQLITE
755 		db_update_milenage_sqn(m);
756 #endif /* CONFIG_SQLITE */
757 		sqn_changes = 1;
758 		if (stdout_debug) {
759 			printf("AKA: Milenage with SQN=%02x%02x%02x%02x%02x%02x\n",
760 			       m->sqn[0], m->sqn[1], m->sqn[2],
761 			       m->sqn[3], m->sqn[4], m->sqn[5]);
762 		}
763 		milenage_generate(m->opc, m->amf, m->ki, m->sqn, _rand,
764 				  autn, ik, ck, res, &res_len);
765 		if (m->res_len >= EAP_AKA_RES_MIN_LEN &&
766 		    m->res_len <= EAP_AKA_RES_MAX_LEN &&
767 		    m->res_len < res_len)
768 			res_len = m->res_len;
769 	} else {
770 		printf("Unknown IMSI: %s\n", imsi);
771 #ifdef AKA_USE_FIXED_TEST_VALUES
772 		printf("Using fixed test values for AKA\n");
773 		memset(_rand, '0', EAP_AKA_RAND_LEN);
774 		memset(autn, '1', EAP_AKA_AUTN_LEN);
775 		memset(ik, '3', EAP_AKA_IK_LEN);
776 		memset(ck, '4', EAP_AKA_CK_LEN);
777 		memset(res, '2', EAP_AKA_RES_MAX_LEN);
778 		res_len = EAP_AKA_RES_MAX_LEN;
779 #else /* AKA_USE_FIXED_TEST_VALUES */
780 		failed = 1;
781 #endif /* AKA_USE_FIXED_TEST_VALUES */
782 	}
783 
784 	pos = resp;
785 	end = resp + resp_len;
786 	ret = snprintf(pos, end - pos, "AKA-RESP-AUTH %s ", imsi);
787 	if (ret < 0 || ret >= end - pos)
788 		return -1;
789 	pos += ret;
790 	if (failed) {
791 		ret = snprintf(pos, end - pos, "FAILURE");
792 		if (ret < 0 || ret >= end - pos)
793 			return -1;
794 		pos += ret;
795 		return 0;
796 	}
797 	pos += wpa_snprintf_hex(pos, end - pos, _rand, EAP_AKA_RAND_LEN);
798 	*pos++ = ' ';
799 	pos += wpa_snprintf_hex(pos, end - pos, autn, EAP_AKA_AUTN_LEN);
800 	*pos++ = ' ';
801 	pos += wpa_snprintf_hex(pos, end - pos, ik, EAP_AKA_IK_LEN);
802 	*pos++ = ' ';
803 	pos += wpa_snprintf_hex(pos, end - pos, ck, EAP_AKA_CK_LEN);
804 	*pos++ = ' ';
805 	pos += wpa_snprintf_hex(pos, end - pos, res, res_len);
806 
807 	return 0;
808 }
809 
810 
aka_auts(char * imsi,char * resp,size_t resp_len)811 static int aka_auts(char *imsi, char *resp, size_t resp_len)
812 {
813 	char *auts, *__rand;
814 	u8 _auts[EAP_AKA_AUTS_LEN], _rand[EAP_AKA_RAND_LEN], sqn[6];
815 	struct milenage_parameters *m;
816 
817 	resp[0] = '\0';
818 
819 	/* AKA-AUTS <IMSI> <AUTS> <RAND> */
820 
821 	auts = strchr(imsi, ' ');
822 	if (auts == NULL)
823 		return -1;
824 	*auts++ = '\0';
825 
826 	__rand = strchr(auts, ' ');
827 	if (__rand == NULL)
828 		return -1;
829 	*__rand++ = '\0';
830 
831 	if (stdout_debug) {
832 		printf("AKA-AUTS: IMSI=%s AUTS=%s RAND=%s\n",
833 		       imsi, auts, __rand);
834 	}
835 	if (hexstr2bin(auts, _auts, EAP_AKA_AUTS_LEN) ||
836 	    hexstr2bin(__rand, _rand, EAP_AKA_RAND_LEN)) {
837 		printf("Could not parse AUTS/RAND\n");
838 		return -1;
839 	}
840 
841 	m = get_milenage(imsi);
842 	if (m == NULL) {
843 		printf("Unknown IMSI: %s\n", imsi);
844 		return -1;
845 	}
846 
847 	if (milenage_auts(m->opc, m->ki, _rand, _auts, sqn)) {
848 		printf("AKA-AUTS: Incorrect MAC-S\n");
849 	} else {
850 		memcpy(m->sqn, sqn, 6);
851 		if (stdout_debug) {
852 			printf("AKA-AUTS: Re-synchronized: "
853 			       "SQN=%02x%02x%02x%02x%02x%02x\n",
854 			       sqn[0], sqn[1], sqn[2], sqn[3], sqn[4], sqn[5]);
855 		}
856 #ifdef CONFIG_SQLITE
857 		db_update_milenage_sqn(m);
858 #endif /* CONFIG_SQLITE */
859 		sqn_changes = 1;
860 	}
861 
862 	return 0;
863 }
864 
865 
process_cmd(char * cmd,char * resp,size_t resp_len)866 static int process_cmd(char *cmd, char *resp, size_t resp_len)
867 {
868 	if (os_strncmp(cmd, "SIM-REQ-AUTH ", 13) == 0)
869 		return sim_req_auth(cmd + 13, resp, resp_len);
870 
871 	if (os_strncmp(cmd, "GSM-AUTH-REQ ", 13) == 0)
872 		return gsm_auth_req(cmd + 13, resp, resp_len);
873 
874 	if (os_strncmp(cmd, "AKA-REQ-AUTH ", 13) == 0)
875 		return aka_req_auth(cmd + 13, resp, resp_len);
876 
877 	if (os_strncmp(cmd, "AKA-AUTS ", 9) == 0)
878 		return aka_auts(cmd + 9, resp, resp_len);
879 
880 	printf("Unknown request: %s\n", cmd);
881 	return -1;
882 }
883 
884 
process(int s)885 static int process(int s)
886 {
887 	char buf[1000], resp[1000];
888 	struct sockaddr_un from;
889 	socklen_t fromlen;
890 	ssize_t res;
891 
892 	fromlen = sizeof(from);
893 	res = recvfrom(s, buf, sizeof(buf), 0, (struct sockaddr *) &from,
894 		       &fromlen);
895 	if (res < 0) {
896 		perror("recvfrom");
897 		return -1;
898 	}
899 
900 	if (res == 0)
901 		return 0;
902 
903 	if ((size_t) res >= sizeof(buf))
904 		res = sizeof(buf) - 1;
905 	buf[res] = '\0';
906 
907 	printf("Received: %s\n", buf);
908 
909 	if (process_cmd(buf, resp, sizeof(resp)) < 0) {
910 		printf("Failed to process request\n");
911 		return -1;
912 	}
913 
914 	if (resp[0] == '\0') {
915 		printf("No response\n");
916 		return 0;
917 	}
918 
919 	printf("Send: %s\n", resp);
920 
921 	if (sendto(s, resp, os_strlen(resp), 0, (struct sockaddr *) &from,
922 		   fromlen) < 0)
923 		perror("send");
924 
925 	return 0;
926 }
927 
928 
cleanup(void)929 static void cleanup(void)
930 {
931 	struct gsm_triplet *g, *gprev;
932 	struct milenage_parameters *m, *prev;
933 
934 	if (update_milenage && milenage_file && sqn_changes)
935 		update_milenage_file(milenage_file);
936 
937 	g = gsm_db;
938 	while (g) {
939 		gprev = g;
940 		g = g->next;
941 		os_free(gprev);
942 	}
943 
944 	m = milenage_db;
945 	while (m) {
946 		prev = m;
947 		m = m->next;
948 		os_free(prev);
949 	}
950 
951 	if (serv_sock >= 0)
952 		close(serv_sock);
953 	if (socket_path)
954 		unlink(socket_path);
955 
956 #ifdef CONFIG_SQLITE
957 	if (sqlite_db) {
958 		sqlite3_close(sqlite_db);
959 		sqlite_db = NULL;
960 	}
961 #endif /* CONFIG_SQLITE */
962 }
963 
964 
handle_term(int sig)965 static void handle_term(int sig)
966 {
967 	printf("Signal %d - terminate\n", sig);
968 	exit(0);
969 }
970 
971 
usage(void)972 static void usage(void)
973 {
974 	printf("HLR/AuC testing gateway for hostapd EAP-SIM/AKA "
975 	       "database/authenticator\n"
976 	       "Copyright (c) 2005-2017, Jouni Malinen <j@w1.fi>\n"
977 	       "\n"
978 	       "usage:\n"
979 	       "hlr_auc_gw [-hu] [-s<socket path>] [-g<triplet file>] "
980 	       "[-m<milenage file>] \\\n"
981 	       "        [-D<DB file>] [-i<IND len in bits>] [command]\n"
982 	       "\n"
983 	       "options:\n"
984 	       "  -h = show this usage help\n"
985 	       "  -u = update SQN in Milenage file on exit\n"
986 	       "  -s<socket path> = path for UNIX domain socket\n"
987 	       "                    (default: %s)\n"
988 	       "  -g<triplet file> = path for GSM authentication triplets\n"
989 	       "  -m<milenage file> = path for Milenage keys\n"
990 	       "  -D<DB file> = path to SQLite database\n"
991 	       "  -i<IND len in bits> = IND length for SQN (default: 5)\n"
992 	       "\n"
993 	       "If the optional command argument, like "
994 	       "\"AKA-REQ-AUTH <IMSI>\" is used, a single\n"
995 	       "command is processed with response sent to stdout. Otherwise, "
996 	       "hlr_auc_gw opens\n"
997 	       "a control interface and processes commands sent through it "
998 	       "(e.g., by EAP server\n"
999 	       "in hostapd).\n",
1000 	       default_socket_path);
1001 }
1002 
1003 
main(int argc,char * argv[])1004 int main(int argc, char *argv[])
1005 {
1006 	int c;
1007 	char *gsm_triplet_file = NULL;
1008 	char *sqlite_db_file = NULL;
1009 	int ret = 0;
1010 
1011 	if (os_program_init())
1012 		return -1;
1013 
1014 	socket_path = default_socket_path;
1015 
1016 	for (;;) {
1017 		c = getopt(argc, argv, "D:g:hi:m:s:u");
1018 		if (c < 0)
1019 			break;
1020 		switch (c) {
1021 		case 'D':
1022 #ifdef CONFIG_SQLITE
1023 			sqlite_db_file = optarg;
1024 			break;
1025 #else /* CONFIG_SQLITE */
1026 			printf("No SQLite support included in the build\n");
1027 			return -1;
1028 #endif /* CONFIG_SQLITE */
1029 		case 'g':
1030 			gsm_triplet_file = optarg;
1031 			break;
1032 		case 'h':
1033 			usage();
1034 			return 0;
1035 		case 'i':
1036 			ind_len = atoi(optarg);
1037 			if (ind_len < 0 || ind_len > 32) {
1038 				printf("Invalid IND length\n");
1039 				return -1;
1040 			}
1041 			break;
1042 		case 'm':
1043 			milenage_file = optarg;
1044 			break;
1045 		case 's':
1046 			socket_path = optarg;
1047 			break;
1048 		case 'u':
1049 			update_milenage = 1;
1050 			break;
1051 		default:
1052 			usage();
1053 			return -1;
1054 		}
1055 	}
1056 
1057 	if (!gsm_triplet_file && !milenage_file && !sqlite_db_file) {
1058 		usage();
1059 		return -1;
1060 	}
1061 
1062 #ifdef CONFIG_SQLITE
1063 	if (sqlite_db_file && (sqlite_db = db_open(sqlite_db_file)) == NULL)
1064 		return -1;
1065 #endif /* CONFIG_SQLITE */
1066 
1067 	if (gsm_triplet_file && read_gsm_triplets(gsm_triplet_file) < 0)
1068 		return -1;
1069 
1070 	if (milenage_file && read_milenage(milenage_file) < 0)
1071 		return -1;
1072 
1073 	if (optind == argc) {
1074 		serv_sock = open_socket(socket_path);
1075 		if (serv_sock < 0)
1076 			return -1;
1077 
1078 		printf("Listening for requests on %s\n", socket_path);
1079 
1080 		atexit(cleanup);
1081 		signal(SIGTERM, handle_term);
1082 		signal(SIGINT, handle_term);
1083 
1084 		for (;;)
1085 			process(serv_sock);
1086 	} else {
1087 		char buf[1000];
1088 		socket_path = NULL;
1089 		stdout_debug = 0;
1090 		if (process_cmd(argv[optind], buf, sizeof(buf)) < 0) {
1091 			printf("FAIL\n");
1092 			ret = -1;
1093 		} else {
1094 			printf("%s\n", buf);
1095 		}
1096 		cleanup();
1097 	}
1098 
1099 #ifdef CONFIG_SQLITE
1100 	if (sqlite_db) {
1101 		sqlite3_close(sqlite_db);
1102 		sqlite_db = NULL;
1103 	}
1104 #endif /* CONFIG_SQLITE */
1105 
1106 	os_program_deinit();
1107 
1108 	return ret;
1109 }
1110