2018-02-12 10:39:44 +00:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
2019-02-26 11:34:31 +00:00
|
|
|
"crypto/hmac"
|
2022-02-26 20:57:15 +00:00
|
|
|
"crypto/md5"
|
2019-02-26 11:34:31 +00:00
|
|
|
"crypto/sha512"
|
2018-02-12 10:39:44 +00:00
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
2022-02-26 21:21:31 +00:00
|
|
|
"log"
|
2018-02-12 10:39:44 +00:00
|
|
|
"net"
|
|
|
|
"os"
|
|
|
|
"path"
|
|
|
|
"text/template"
|
|
|
|
)
|
|
|
|
|
|
|
|
const pxeUserTplPath = "pxelinux.cfg/tpl"
|
2019-02-26 11:34:31 +00:00
|
|
|
const ipxeUserTplPath = "pxelinux.cfg/tpl.ipxe"
|
2018-02-12 10:39:44 +00:00
|
|
|
const pxeUserPath = "pxelinux.cfg"
|
|
|
|
|
2022-02-26 21:21:31 +00:00
|
|
|
func RegisterUserMAC(ent ARPEntry, ip net.IP, username, remoteAddr string) error {
|
|
|
|
if err := registerUser(ipxeUserTplPath, remoteAddr, fmt.Sprintf("%02x:%02x:%02x:%02x:%02x:%02x.ipxe", ent.HWAddress[0], ent.HWAddress[1], ent.HWAddress[2], ent.HWAddress[3], ent.HWAddress[4], ent.HWAddress[5]), username, ip); err != nil {
|
2018-02-12 10:39:44 +00:00
|
|
|
return err
|
|
|
|
} else {
|
2022-02-26 21:21:31 +00:00
|
|
|
return registerUser(pxeUserTplPath, remoteAddr, fmt.Sprintf("%02x-%02x-%02x-%02x-%02x-%02x-%02x", ent.HWType, ent.HWAddress[0], ent.HWAddress[1], ent.HWAddress[2], ent.HWAddress[3], ent.HWAddress[4], ent.HWAddress[5]), username, ip)
|
2018-02-12 10:39:44 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-02-26 20:57:15 +00:00
|
|
|
func initrd_name(remote string) string {
|
2022-02-26 21:21:31 +00:00
|
|
|
log.Println("initrd_name:", remote)
|
2022-02-26 20:57:15 +00:00
|
|
|
initrd := hmac.New(md5.New, []byte(loginSalt))
|
|
|
|
initrd.Write([]byte(remote))
|
|
|
|
return fmt.Sprintf("%x", initrd.Sum(nil))
|
|
|
|
}
|
|
|
|
|
2022-02-26 21:21:31 +00:00
|
|
|
func registerUser(tplPath, remoteAddr string, filename string, username string, ip net.IP) error {
|
2019-02-26 11:34:31 +00:00
|
|
|
if pxeTplCnt, err := ioutil.ReadFile(path.Join(tftpDir, tplPath)); err != nil {
|
2018-02-12 10:39:44 +00:00
|
|
|
return err
|
|
|
|
} else if userfd, err := os.OpenFile(path.Join(tftpDir, pxeUserPath, filename), os.O_RDWR|os.O_CREATE, 0644); err != nil {
|
|
|
|
return err
|
|
|
|
} else {
|
|
|
|
defer userfd.Close()
|
2019-02-26 11:34:31 +00:00
|
|
|
|
2022-02-26 21:21:31 +00:00
|
|
|
initrd := initrd_name(remoteAddr)
|
|
|
|
|
|
|
|
err := os.MkdirAll(path.Join(tftpDir, "shadows", initrd), 0755)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2022-03-01 20:30:07 +00:00
|
|
|
fdlogin, err := os.Create(path.Join(tftpDir, "shadows", initrd, "whois"))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer fdlogin.Close()
|
|
|
|
fdlogin.Write([]byte(username + "\n" + remoteAddr + "\n" + ip.String()))
|
|
|
|
|
2022-02-26 21:21:31 +00:00
|
|
|
fd, err := os.Create(path.Join(tftpDir, "shadows", initrd, "challenge-initrd.img"))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer fd.Close()
|
|
|
|
|
|
|
|
err = copy_challenge(fd)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2019-02-26 11:34:31 +00:00
|
|
|
pkey := hmac.New(sha512.New512_224, []byte(loginSalt))
|
2022-02-19 14:30:26 +00:00
|
|
|
pkey.Write([]byte(username))
|
2019-02-26 11:34:31 +00:00
|
|
|
|
2021-02-20 18:13:33 +00:00
|
|
|
if len(ip.To4()) != 4 {
|
|
|
|
return fmt.Errorf("Unable to assign a protected IP.")
|
|
|
|
}
|
|
|
|
|
2018-02-12 10:39:44 +00:00
|
|
|
if pxeTmpl, err := template.New("pxeUser").Parse(string(pxeTplCnt)); err != nil {
|
|
|
|
return err
|
2019-02-28 01:27:33 +00:00
|
|
|
} else if err := pxeTmpl.Execute(userfd, map[string]string{
|
|
|
|
"username": username,
|
2022-02-26 21:21:31 +00:00
|
|
|
"initrd": initrd,
|
2022-02-19 14:30:26 +00:00
|
|
|
"pkey": fmt.Sprintf("%x", pkey.Sum(nil)),
|
2021-02-20 18:13:33 +00:00
|
|
|
"ip": ip.String(),
|
2019-02-28 01:27:33 +00:00
|
|
|
}); err != nil {
|
2018-02-12 10:39:44 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|