93 lines
3.6 KiB
Python
93 lines
3.6 KiB
Python
from pyrad.server import Server, RemoteHost
|
|
from pyrad.dictionary import Dictionary
|
|
from pyrad.packet import AccessAccept, AccessReject
|
|
import mysql.connector
|
|
import os
|
|
|
|
DEFAULT_VLAN_ID = os.getenv("DEFAULT_VLAN", "505")
|
|
DENIED_VLAN = os.getenv("DENIED_VLAN", "999")
|
|
|
|
class MacRadiusServer(Server):
|
|
def __init__(self, *args, **kwargs):
|
|
super().__init__(*args, **kwargs)
|
|
|
|
self.db = mysql.connector.connect(
|
|
host=os.getenv('DB_HOST'),
|
|
port=int(os.getenv('DB_PORT', 3306)),
|
|
user=os.getenv('DB_USER'),
|
|
password=os.getenv('DB_PASSWORD'),
|
|
database=os.getenv('DB_NAME'),
|
|
)
|
|
|
|
def HandleAuthPacket(self, pkt):
|
|
username = pkt['User-Name'][0].upper()
|
|
cursor = self.db.cursor(dictionary=True)
|
|
|
|
# Step 1: Check if the MAC exists in the users table
|
|
cursor.execute("SELECT vlan_id FROM users WHERE mac_address = %s", (username,))
|
|
result = cursor.fetchone()
|
|
|
|
reply = self.CreateReplyPacket(pkt)
|
|
|
|
# Step 2: Handle the Access-Accept or Access-Reject scenario
|
|
if result:
|
|
# MAC found in users table
|
|
vlan_id = result['vlan_id']
|
|
|
|
# Check if the VLAN is a denied VLAN
|
|
denied_vlan = os.getenv("DENIED_VLAN", "999") # Get the denied VLAN from environment
|
|
|
|
if vlan_id == denied_vlan:
|
|
# Step 3: If the MAC is in a denied VLAN, reject the access
|
|
reply.code = AccessReject
|
|
cursor.execute("""
|
|
INSERT INTO auth_logs (mac_address, reply, result)
|
|
VALUES (%s, %s, %s)
|
|
""", (username, "Access-Reject", f"Denied due to VLAN {denied_vlan}"))
|
|
self.db.commit()
|
|
print(f"[INFO] MAC {username} rejected due to VLAN {denied_vlan}")
|
|
|
|
else:
|
|
# Step 4: If the MAC is valid and not in the denied VLAN, accept access and assign VLAN
|
|
reply.code = AccessAccept
|
|
reply.AddAttribute("Tunnel-Type", 13)
|
|
reply.AddAttribute("Tunnel-Medium-Type", 6)
|
|
reply.AddAttribute("Tunnel-Private-Group-Id", vlan_id)
|
|
|
|
# Log successful access
|
|
cursor.execute("""
|
|
INSERT INTO auth_logs (mac_address, reply, result)
|
|
VALUES (%s, %s, %s)
|
|
""", (username, "Access-Accept", f"Assigned to VLAN {vlan_id}"))
|
|
self.db.commit()
|
|
print(f"[INFO] MAC {username} accepted and assigned to VLAN {vlan_id}")
|
|
|
|
else:
|
|
# Step 5: If the MAC is not found in the database, assign to fallback VLAN
|
|
reply.code = AccessAccept # Still send Access-Accept even for fallback
|
|
reply["Tunnel-Type"] = 13 # VLAN
|
|
reply["Tunnel-Medium-Type"] = 6 # IEEE-802
|
|
reply["Tunnel-Private-Group-Id"] = DEFAULT_VLAN_ID
|
|
|
|
# Log fallback assignment
|
|
cursor.execute("""
|
|
INSERT INTO auth_logs (mac_address, reply, result)
|
|
VALUES (%s, %s, %s)
|
|
""", (username, "Access-Accept", f"Assigned to fallback VLAN {DEFAULT_VLAN_ID}"))
|
|
self.db.commit()
|
|
|
|
print(f"[INFO] MAC {username} not found — assigned to fallback VLAN {DEFAULT_VLAN_ID}")
|
|
|
|
# Send the reply packet (whether accept or reject)
|
|
self.SendReplyPacket(pkt.fd, reply)
|
|
cursor.close()
|
|
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
srv = MacRadiusServer(dict=Dictionary("dictionary"))
|
|
srv.hosts["0.0.0.0"] = RemoteHost("0.0.0.0", os.getenv("RADIUS_SECRET", "testing123").encode(), "localhost")
|
|
srv.BindToAddress("0.0.0.0")
|
|
srv.Run()
|