github.com/sergle/radius

a golang radius client/server library (support VSA attributes, dictionary files)


License
MIT
Install
go get github.com/sergle/radius

Documentation

a golang radius library

Build Status PkgGoDev GitHub issues GitHub stars GitHub forks MIT License

This project forks from https://github.com/bronze1man/radius

Additional features included:

  • Dictionary file support (FreeRADIUS-compatible)
  • VSA attributes
  • Simple RADIUS client

document

server example (see client example below)

package main

import (
	"fmt"
	"github.com/sergle/radius"
)

type radiusService struct{}

func (p radiusService) RadiusHandle(request *radius.Packet) *radius.Packet {
    // a pretty print of the request.
	fmt.Printf("[Authenticate] %s\n", request.String())
	npac := request.Reply()
	switch request.Code {
	case radius.AccessRequest:
		// check username and password
		if request.GetUsername() == "a" && request.GetPassword() == "a" {
			npac.Code = radius.AccessAccept
			// add Vendor-specific attribute - Vendor Cisco (code 9) Attribute h323-remote-address (code 23)
			npac.AddVSA( radius.VSA{Vendor: 9, Type: 23, Value: []byte("10.20.30.40")} )
			return npac
		} else {
			npac.Code = radius.AccessReject
			npac.AddAVP( radius.AVP{Type: radius.ReplyMessage, Value: []byte("you dick!")} )
			return npac
		}
	case radius.AccountingRequest:
		// accounting start or end
		npac.Code = radius.AccountingResponse
		return npac
	default:
		npac.Code = radius.AccessAccept
		return npac
	}
}

func main() {
	s := radius.NewServer(":1812", "secret", radiusService{})

	// or you can convert it to a server that accept request
	// from some host with different secret
	// cls := radius.NewClientList([]radius.Client{
	// 		radius.NewClient("127.0.0.1", "secret1"),
	// 		radius.NewClient("10.10.10.10", "secret2"),
	// })
	// s.WithClientList(cls)

	signalChan := make(chan os.Signal, 1)
	signal.Notify(signalChan, syscall.SIGINT, syscall.SIGTERM)
	errChan := make(chan error)
	go func() {
		fmt.Println("waiting for packets...")
		err := s.ListenAndServe()
		if err != nil {
			errChan <- err
		}
	}()
	select {
	case <-signalChan:
		log.Println("stopping server...")
		s.Stop()
	case err := <-errChan:
		log.Println("[ERR] %v", err.Error())
	}
}

implemented

  • a radius server can handle AccessRequest request from strongswan with ikev1-xauth-psk
  • a radius server can handle AccountingRequest request from strongswan with ikev1-xauth-psk
  • VSA attributes
  • Dictionary support (from FreeRADIUS)
  • simple RADIUS client

notice

  • A radius client has not been implement.
  • It works , but it is not stable.

reference

TODO

  • avpEapMessaget.Value error handle.
  • implement eap-MSCHAPV2 server side.
  • implement radius client side.

client example

package main

import (
    "fmt"
    "github.com/sergle/radius"
    "github.com/sergle/radius/client"
)

func main() {
    dict := radius.NewDictionary()
    err := dict.LoadFile("/usr/share/freeradius/dictionary")
    if err != nil {
        fmt.Printf("Failed to load dictionary: %s", err)
        return
    }

    client := client.NewClient("127.0.0.1:1812", "gother")

    request := client.NewRequest(radius.DisconnectRequest)
    request.AddAVP( dict.NewAVP("Acct-Session-Id", "100500") )
    request.AddAVP( dict.NewAVP("NAS-IP-Address", "10.8.10.3") )
    fmt.Printf("sending request: %s\n", request.String())

    reply, err := client.Send(request)
    if err != nil {
        fmt.Printf("Error: %s\n", err)
        return
    }
    fmt.Printf("Reply: %s\n", reply.String())
    return
}