Small example of radius and diameter server on python.
For reproducing different testing scenarios, there is a need to test diameter applications by using radius authentication. For example, Radius server can send diameter Credit-Control Initial (Update) requests to PCRF or HSS or to Online-Charging server (OCS) and receive policy based rules or user quota information ( session or event based charging)
To create a small Radius and diameter servers and clients for testing purposes, one can consider using pyprotosim (http://sourceforge.net/p/pyprotosim) software.
In this practical scenario, we will build radius client, radius server listening client auth requests on udp port 1812 and which is connected to diameter-based OCS server listening on tcp port 3868. The OCS application will use internal database ( python dictionary with the key of user's identity). Each user's profile in database will store user's quota for event and session based charging, for example:
Test flow:
Radius client sends radius "Access-Request" message with the following AVPs to Radius server:
"Calling-Station-Id", "123456789012345")) # identity of user
"User-Name", "test"
"User-Password", "password", which is encrypted with shared key.
Radius server by receiving this information, first checks if User-name, decrypted user password and shared key are matched and extracts user identity from Calling-Station-Id AVP. After getting user identity Radius server creates Credit-Control Initial Request to OCS server. OCS server returns Credit-Control Answer with either 2001 "Success" response if user is found in internal database or 5003 "NOT AUTHORIZED" response when user is not found.
Radius server by receiving diameter 2001 response, answers with radius "Access-Accept" to the client OR "Access-Reject" when negative response from OCS is received or username, password are not matched
Scripts for testing scenario:
1) demo_radius_access_client.py
2) demo_radius_diameter_server.py
3) demo_OCS_server.py
User 123456789012345 is provisioned in OCS
User 123456789012348 is not provisioned in OCS
Installation (Ubuntu):
Download and unzip pyprotosim in some directory. Create own directory under it, for example ocs_tests
Copy three script into this directory and (optionally) replace IP address in scripts to your own. By default 127.0.0.1 is used.
Testing:
Start scripts demo_radius_diameter_server.py and OCS_server.py in different terminal consoles
1) Edit radius_access_client.py and replace Calling-Station-Id attributes value with user 123456789012345. Run script which will send Access-Request to radius_diameter_server. Radius server will make diameter request to OCS server and find user in our dictionary DB. Radius server returns Access-Accept response.
Results from tcpdump capture:
tshark -r /tmp/diam.cap -R 'radius or diameter'
1 0.000000 127.0.0.1 -> 127.0.0.1 RADIUS 174 Access-Request(1) (id=1, l=130)
5 0.040622 127.0.0.1 -> 127.0.0.1 DIAMETER 384 cmd=Credit-ControlRequest(272) flags=R--- appl=Diameter Common Messages(0) h2h=541c3666 e2e=1b318003
7 0.163230 127.0.0.1 -> 127.0.0.1 DIAMETER 280 cmd=Credit-ControlAnswer(272) flags=---- appl=Diameter Common Messages(0) h2h=541c3666 e2e=1b318003
12 0.166757 127.0.0.1 -> 127.0.0.1 RADIUS 76 Access-Accept(2) (id=1, l=32)
2) Edit radius_access_client.py and replace Calling-Station-Id attributes value with user 123456789012348. Run script which will send Access-Request to radius_diameter_server. Radius server will make diameter request to OCS and will not find user in our dictionary DB. Radius server returns Access-Reject response.
Results from tcpdump capture:
tshark -r /tmp/diam.cap -R 'radius or diameter'
1 0.000000 127.0.0.1 -> 127.0.0.1 RADIUS 174 Access-Request(1) (id=1, l=130)
5 0.041789 127.0.0.1 -> 127.0.0.1 DIAMETER 384 cmd=Credit-ControlRequest(272) flags=R--- appl=Diameter Common Messages(0) h2h=541c3667 e2e=1b318004
7 0.156535 127.0.0.1 -> 127.0.0.1 DIAMETER 244 cmd=Credit-ControlAnswer(272) flags=---- appl=Diameter Common Messages(0) h2h=541c3667 e2e=1b318004
10 0.159009 127.0.0.1 -> 127.0.0.1 RADIUS 64 Access-Reject(3) (id=1, l=20)
Scripts examples can be seen here:
1) demo_OCS_server.py
For reproducing different testing scenarios, there is a need to test diameter applications by using radius authentication. For example, Radius server can send diameter Credit-Control Initial (Update) requests to PCRF or HSS or to Online-Charging server (OCS) and receive policy based rules or user quota information ( session or event based charging)
To create a small Radius and diameter servers and clients for testing purposes, one can consider using pyprotosim (http://sourceforge.net/p/pyprotosim) software.
In this practical scenario, we will build radius client, radius server listening client auth requests on udp port 1812 and which is connected to diameter-based OCS server listening on tcp port 3868. The OCS application will use internal database ( python dictionary with the key of user's identity). Each user's profile in database will store user's quota for event and session based charging, for example:
users_db =
{'123456789012345':{'maxbytes':'10000000', 'sessionid':'none', 'usedbytes':'0','cctime':'0'},
'123456789012346':{'maxbytes':'20000000', 'sessionid':'none','usedbytes':'0','cctime':'0' },
'123456789012347':{'maxbytes':'30000000', 'sessionid':'none', 'usedbytes':'0','cctime':'0'}}
Test flow:
Radius client sends radius "Access-Request" message with the following AVPs to Radius server:
"Calling-Station-Id", "123456789012345")) # identity of user
"User-Name", "test"
"User-Password", "password", which is encrypted with shared key.
Radius server by receiving this information, first checks if User-name, decrypted user password and shared key are matched and extracts user identity from Calling-Station-Id AVP. After getting user identity Radius server creates Credit-Control Initial Request to OCS server. OCS server returns Credit-Control Answer with either 2001 "Success" response if user is found in internal database or 5003 "NOT AUTHORIZED" response when user is not found.
Radius server by receiving diameter 2001 response, answers with radius "Access-Accept" to the client OR "Access-Reject" when negative response from OCS is received or username, password are not matched
Scripts for testing scenario:
1) demo_radius_access_client.py
2) demo_radius_diameter_server.py
3) demo_OCS_server.py
User 123456789012345 is provisioned in OCS
User 123456789012348 is not provisioned in OCS
Installation (Ubuntu):
Download and unzip pyprotosim in some directory. Create own directory under it, for example ocs_tests
Copy three script into this directory and (optionally) replace IP address in scripts to your own. By default 127.0.0.1 is used.
Testing:
Start scripts demo_radius_diameter_server.py and OCS_server.py in different terminal consoles
1) Edit radius_access_client.py and replace Calling-Station-Id attributes value with user 123456789012345. Run script which will send Access-Request to radius_diameter_server. Radius server will make diameter request to OCS server and find user in our dictionary DB. Radius server returns Access-Accept response.
Results from tcpdump capture:
tshark -r /tmp/diam.cap -R 'radius or diameter'
1 0.000000 127.0.0.1 -> 127.0.0.1 RADIUS 174 Access-Request(1) (id=1, l=130)
5 0.040622 127.0.0.1 -> 127.0.0.1 DIAMETER 384 cmd=Credit-ControlRequest(272) flags=R--- appl=Diameter Common Messages(0) h2h=541c3666 e2e=1b318003
7 0.163230 127.0.0.1 -> 127.0.0.1 DIAMETER 280 cmd=Credit-ControlAnswer(272) flags=---- appl=Diameter Common Messages(0) h2h=541c3666 e2e=1b318003
12 0.166757 127.0.0.1 -> 127.0.0.1 RADIUS 76 Access-Accept(2) (id=1, l=32)
2) Edit radius_access_client.py and replace Calling-Station-Id attributes value with user 123456789012348. Run script which will send Access-Request to radius_diameter_server. Radius server will make diameter request to OCS and will not find user in our dictionary DB. Radius server returns Access-Reject response.
Results from tcpdump capture:
tshark -r /tmp/diam.cap -R 'radius or diameter'
1 0.000000 127.0.0.1 -> 127.0.0.1 RADIUS 174 Access-Request(1) (id=1, l=130)
5 0.041789 127.0.0.1 -> 127.0.0.1 DIAMETER 384 cmd=Credit-ControlRequest(272) flags=R--- appl=Diameter Common Messages(0) h2h=541c3667 e2e=1b318004
7 0.156535 127.0.0.1 -> 127.0.0.1 DIAMETER 244 cmd=Credit-ControlAnswer(272) flags=---- appl=Diameter Common Messages(0) h2h=541c3667 e2e=1b318004
10 0.159009 127.0.0.1 -> 127.0.0.1 RADIUS 64 Access-Reject(3) (id=1, l=20)
Scripts examples can be seen here:
1) demo_OCS_server.py
#!/usr/bin/python
#############################################################################
# Example of diameter server listening client requests on port 3868
# This script is using pyprotosim software
# Read the terms of BSD license at pyprotosim website:
# http://sourceforge.net/projects/pyprotosim/
############################################################################
import sys
sys.path.append("../")
# Remove them if everything is in the same dir
import socket
import select
import logging
from libDiameter import *
###########################################################################################
# users_db is dictionary with key identity, can be replaced connection to ldap db or sql db
#
###########################################################################################
users_db = {'123456789012345':{'maxbytes':'10000000', 'sessionid':'value_1', 'usedbytes':'0','cctime':'0'},
'123456789012346':{'maxbytes':'20000000', 'sessionid':'value_2','usedbytes':'0','cctime':'0' },
'123456789012347':{'maxbytes':'30000000', 'sessionid':'value_3', 'usedbytes':'0','cctime':'0'}}
# Functions to check if user is valid in users_db database and fetch profile settings
# Also upon receiving Credit-Control Initial request, update new session id for this user if exists
def check_valid_user(identity):
id = identity
if id in users_db:
return True
else:
return False
def update_sessionid(identity,sessionid):
id = identity
sessionid = sessionid
if id in users_db:
sessionid_updated = users_db[id]['sessionid']=sessionid
return sessionid_updated
else:
return False
def check_profile(identity):
id=identity
if id in users_db:
maxbytes = users_db[id]['maxbytes']
cctime = users_db[id]['cctime']
return maxbytes,cctime
else:
return None
############END OF USER FUNCTIONS##############################
# Starting tcp server on python listening requests on port 3868
##############################################################
SKIP=0
def handle_OCS(conn):
global sock_list
# conn is the TCP socket connected to the client
dbg="Connection:",conn.getpeername(),'to',conn.getsockname()
logging.info(dbg)
#get input ,wait if no data
data=conn.recv(BUFFER_SIZE)
#suspect more data (try to get it all without stopping if no data)
if (len(data)==BUFFER_SIZE):
while 1:
try:
data+=self.request.recv(BUFFER_SIZE, socket.MSG_DONTWAIT)
except:
#error means no more data
break
if (data != ""):
#processing input
dbg="Incomming message",data.encode("hex")
logging.info(dbg)
ret=process_request(data.encode("hex"))
if ret==ERROR:
dbg="Error responding",ret
logging.error(dbg)
else:
if ret==SKIP:
dbg="Skipping response",ret
logging.info(dbg)
else:
dbg="Sending response",ret
logging.info(dbg)
conn.send(ret.decode("hex"))
else:
#no data found exit loop (posible closed socket)
# remove it from sock_list
sock_list.remove(conn)
conn.close()
# Create CEA response to CER request
# Just answering with 2001 OK
def create_CEA(H):
global DEST_REALM
CER_avps=splitMsgAVPs(H.msg)
DEST_REALM=findAVP("Origin-Realm",CER_avps)
# Let's build Capabilites-Exchange Answer
CEA_avps=[]
CEA_avps.append(encodeAVP("Origin-Host", ORIGIN_HOST))
CEA_avps.append(encodeAVP("Origin-Realm", ORIGIN_REALM))
CEA_avps.append(encodeAVP("Product-Name", "OCS-SIM"))
CEA_avps.append(encodeAVP('Auth-Application-Id', 4))
CEA_avps.append(encodeAVP("Supported-Vendor-Id", 10415))
CEA_avps.append(encodeAVP("Result-Code", 2001)) #DIAMETER_SUCCESS 2001
# Create message header (empty)
CEA=HDRItem()
# Set command code
CEA.cmd=H.cmd
# Set Application-id
CEA.appId=H.appId
# Set Hop-by-Hop and End-to-End from request
CEA.HopByHop=H.HopByHop
CEA.EndToEnd=H.EndToEnd
# Add AVPs to header and calculate remaining fields
ret=createRes(CEA,CEA_avps)
# ret now contains CEA Response as hex string
return ret
# Create Watchdog response in reply to Watchdog request . We reply with 2001 OK
def create_DWA(H):
# Let's build Diameter-WatchdogAnswer
DWA_avps=[]
DWA_avps.append(encodeAVP("Origin-Host", ORIGIN_HOST))
DWA_avps.append(encodeAVP("Origin-Realm", ORIGIN_REALM))
DWA_avps.append(encodeAVP("Result-Code", 2001)) #DIAMETER_SUCCESS 2001
# Create message header (empty)
DWA=HDRItem()
# Set command code
DWA.cmd=H.cmd
# Set Application-id
DWA.appId=H.appId
# Set Hop-by-Hop and End-to-End from request
DWA.HopByHop=H.HopByHop
DWA.EndToEnd=H.EndToEnd
# Add AVPs to header and calculate remaining fields
ret=createRes(DWA,DWA_avps)
# ret now contains DWA Response as hex string
return ret
# Create Disconnect_Peer response in reply to Disconnect_Peer request. We just reply with 2001 OK for testing purposes
def create_DPA(H):
# Let's build Diameter-Disconnect Peer Answer
DPA_avps=[]
DPA_avps.append(encodeAVP("Origin-Host", ORIGIN_HOST))
DPA_avps.append(encodeAVP("Origin-Realm", ORIGIN_REALM))
DPA_avps.append(encodeAVP("Result-Code", 2001)) #DIAMETER_SUCCESS 2001
# Create message header (empty)
DPA=HDRItem()
# Set command code
DPA.cmd=H.cmd
# Set Application-id
DPA.appId=H.appId
# Set Hop-by-Hop and End-to-End from request
DPA.HopByHop=H.HopByHop
DPA.EndToEnd=H.EndToEnd
# Add AVPs to header and calculate remaining fields
ret=createRes(DPA,DPA_avps)
# ret now contains DPA Response as hex string
return ret
# Create Unable To Comply response in reply to request which is not understood. We reply with 5012 result-code AVP
def create_UTC(H,msg):
# Let's build Unable to comply packet
DWA_avps=[]
DWA_avps.append(encodeAVP("Origin-Host", ORIGIN_HOST))
DWA_avps.append(encodeAVP("Origin-Realm", ORIGIN_REALM))
DWA_avps.append(encodeAVP("Result-Code", 5012)) #UNABLE TO COMPLY 5012
DWA_avps.append(encodeAVP("Error-Message", msg))
# Create message header (empty)
DWA=HDRItem()
# Set command code
DWA.cmd=H.cmd
# Set Application-id
DWA.appId=H.appId
# Set Hop-by-Hop and End-to-End from request
DWA.HopByHop=H.HopByHop
DWA.EndToEnd=H.EndToEnd
# Add AVPs to header and calculate remaining fields
ret=createRes(DWA,DWA_avps)
# ret now contains DWA Response as hex string
return ret
# And here we create CCA-I responses in reply to CCR -I requests:
def create_CCA(H):
CCR_avps=splitMsgAVPs(H.msg)
try:
CCA_SESSION=findAVP("Session-Id",CCR_avps)
CCA_SSID=findAVP("Subscription-Id",CCR_avps)
CCA_IMSI=findAVP("Subscription-Id-Data",CCA_SSID)
CCA_REQUEST_TYPE=findAVP("CC-Request-Type",CCR_avps)
CCA_REQUEST_NUMBER=findAVP("CC-Request-Number",CCR_avps)
CCA_Unit=findAVP("Used-Service-Unit",CCR_avps)
except:
pass
if CCA_REQUEST_TYPE in [1]:
# Checking if user is valid in users_db:
valid_user=check_valid_user(CCA_IMSI)
if valid_user is True:
# If user is valid in users_db, check profile settings and extract CC-Time and CC-Total-Octets
max_bytes,cctime=check_profile(CCA_IMSI)
# Update session id received from CCR request in users_db for this user
updated_sessionid=update_sessionid(CCA_IMSI,CCA_SESSION)
print "Updated sessionid in DB is now: ",updated_sessionid
print "User ",CCA_IMSI," has limit of: ",max_bytes,"bytes"
# Answer with CCA response:
CCA_avps=[ ]
CCA_avps.append(encodeAVP('Result-Code', '2001'))
CCA_avps.append(encodeAVP('Session-Id', CCA_SESSION))
CCA_avps.append(encodeAVP('Origin-Host', ORIGIN_HOST))
CCA_avps.append(encodeAVP('Origin-Realm', ORIGIN_REALM))
CCA_avps.append(encodeAVP('CC-Request-Type', CCA_REQUEST_TYPE))
CCA_avps.append(encodeAVP('CC-Request-Number', CCA_REQUEST_NUMBER+1))
CCA_avps.append(encodeAVP('Auth-Application-Id', 4))
CCA_avps.append(encodeAVP('Supported-Vendor-Id', 10415))
# Check for None values:
if str(max_bytes) != 'None' or str(cctime) != 'None':
CCA_avps.append(encodeAVP('Granted-Service-Unit',[
encodeAVP("CC-Total-Octets",int(max_bytes)),encodeAVP("CC-Time",int(cctime))
]))
# Create message header (empty)
CCA=HDRItem()
# Set command code
CCA.cmd=H.cmd
# Set Application-id
CCA.appId=H.appId
# Set Hop-by-Hop and End-to-End from request
CCA.HopByHop=H.HopByHop
CCA.EndToEnd=H.EndToEnd
# Add AVPs to header and calculate remaining fields
ret=createRes(CCA,CCA_avps)
# ret now contains CCA Response as hex string
return ret
elif valid_user is False:
# If user is not found in DB, return 5003 - not authorized
print "No such user ",CCA_IMSI," is found in DB:"
CCA_avps=[ ]
CCA_avps.append(encodeAVP('Result-Code', '5003'))
CCA_avps.append(encodeAVP('Session-Id', CCA_SESSION))
CCA_avps.append(encodeAVP('Origin-Host', ORIGIN_HOST))
CCA_avps.append(encodeAVP('Origin-Realm', ORIGIN_REALM))
CCA_avps.append(encodeAVP('CC-Request-Type', CCA_REQUEST_TYPE))
CCA_avps.append(encodeAVP('CC-Request-Number', CCA_REQUEST_NUMBER+1))
CCA_avps.append(encodeAVP('Auth-Application-Id', 4))
CCA_avps.append(encodeAVP('Supported-Vendor-Id', 10415))
# Create message header (empty)
CCA=HDRItem()
# Set command code
CCA.cmd=H.cmd
# Set Application-id
CCA.appId=H.appId
# Set Hop-by-Hop and End-to-End from request
CCA.HopByHop=H.HopByHop
CCA.EndToEnd=H.EndToEnd
# Add AVPs to header and calculate remaining fields
ret=createRes(CCA,CCA_avps)
# ret now contains CCA Response as hex string
return ret
def process_request(rawdata):
H=HDRItem()
stripHdr(H,rawdata)
dbg="Processing",dictCOMMANDcode2name(H.flags,H.cmd)
logging.info(dbg)
if H.flags & DIAMETER_HDR_REQUEST==0:
# If Answer no need to do anything
return SKIP
if H.cmd==257: # Capabilities-Exchange
return create_CEA(H)
if H.cmd==280: # Device-Watchdog
return create_DWA(H)
if H.cmd==272: # Credit-Control
return create_CCA(H)
if H.cmd==282: # Disconnect-Request-Peer
return create_DPA(H)
return create_UTC(H,"Unknown command code")
def Quit():
for conn in sock_list:
conn.close()
sys.exit(0)
if __name__ == "__main__":
# level for decoding are: DEBUG, INFO, WARNING, ERROR, CRITICAL
#logging.basicConfig(level=logging.INFO)
# Define server_host:port to use
HOST = "127.0.0.1"
DIAM_PORT = 3868
ORIGIN_HOST = "diameter.3gpp.org"
ORIGIN_REALM = "realm.3gpp.org"
DEST_REALM = "" # Leave it empty
LoadDictionary("../dictDiameter.xml")
BUFFER_SIZE=1024
MAX_CLIENTS=5
sock_list=[]
# Create the server, binding to HOST:DIAM_PORT
OCS_server = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
# fix "Address already in use" error upon restart
OCS_server.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
OCS_server.bind((HOST, DIAM_PORT))
OCS_server.listen(MAX_CLIENTS)
sock_list.append(OCS_server)
logging.info("Server started")
# Activate the server; this will keep running until you
# interrupt the program with Ctrl-C
while True:
try:
read, write, error = select.select(sock_list,[],[],1)
except:
break
for r in read:
logging.info("Incoming data")
# Is it new or existing connection
if r==OCS_server:
# New connections: accept on new socket
conn,addr=OCS_server.accept()
sock_list.append(conn)
if handle_OCS(conn)==ERROR:
Quit()
else:
if handle_OCS(r)==ERROR:
Quit()
Quit()
2) demo_radius_diameter_server.py
#!/usr/bin/python
#################################################################################################
# Example of radius server sending diameter Credit-Control requests to IP:port of Diameter server
# This script is using pyprotosim software
# Read the terms of BSD license at pyprotosim website:
# http://sourceforge.net/projects/pyprotosim/
################################################################################################
import sys
#Next line is to include parent directory in PATH where libraries are
sys.path.append("../")
from libRadius import *
import libDiameter
import datetime
# Function to create diameter CCR request and parse received CCA response from Diameter server
def send_ccr_i(identity):
IDENTITY=identity
CCR_avps=[ ]
CCR_avps.append(libDiameter.encodeAVP('Origin-Host', ORIGIN_HOST))
CCR_avps.append(libDiameter.encodeAVP('Session-Id', GY_SESSIONID))
CCR_avps.append(libDiameter.encodeAVP('Called-Station-Id', 'test.apn'))
CCR_avps.append(libDiameter.encodeAVP('Origin-Realm', ORIGIN_REALM))
CCR_avps.append(libDiameter.encodeAVP('Destination-Realm', DEST_REALM))
CCR_avps.append(libDiameter.encodeAVP('Destination-Host', DEST_HOST))
CCR_avps.append(libDiameter.encodeAVP('Auth-Application-Id', 4))
CCR_avps.append(libDiameter.encodeAVP('CC-Request-Type', 1))
CCR_avps.append(libDiameter.encodeAVP('CC-Request-Number', 0))
CCR_avps.append(libDiameter.encodeAVP('Subscription-Id',[libDiameter.encodeAVP('Subscription-Id-Data', IDENTITY ), libDiameter.encodeAVP('Subscription-Id-Type', 1)]))
CCR_avps.append(libDiameter.encodeAVP('3GPP-SGSN-Address', '192.168.0.2'))
CCR_avps.append(libDiameter.encodeAVP('3GPP-MS-TimeZone', 'GMT'))
CCR_avps.append(libDiameter.encodeAVP('Access-Network-Charging-Address', '192.168.0.2'))
# Create message header (empty)
CCR=libDiameter.HDRItem()
# Set command code
CCR.cmd=libDiameter.dictCOMMANDname2code('Credit-Control')
# Set Hop-by-Hop and End-to-End
libDiameter.initializeHops(CCR)
# Add AVPs to header and calculate remaining fields
msg1=libDiameter.createReq(CCR,CCR_avps)
# msg now contains CCR Request as hex string
# send data
Conn=libDiameter.Connect(OCS_HOST,OCS_PORT)
Conn.send(msg1.decode('hex'))
# Receive response
received1 = Conn.recv(1024)
# Parse and display received ANSWER
#print "="*30
#print "THE CCA - I ANSWER IS:"
msg=received1.encode('hex')
#print "="*30
H=libDiameter.HDRItem()
libDiameter.stripHdr(H,msg)
CCA_avps=libDiameter.splitMsgAVPs(H.msg)
cmd=libDiameter.dictCOMMANDcode2name(H.flags,H.cmd)
# We need get STATE 2001 or 5003 from Response
CCA_status=libDiameter.findAVP("Result-Code",CCA_avps)
if str(CCA_status) in ['2001']:
return True
elif str(CCA_status) in ['5003','5002']:
return False
else:
return False
# Function that creates radius access response to the client
def create_Access_Response():
# Create message header (empty)
RES=HDRItem()
stripHdr(RES,data.encode("hex"))
RID=RES.Identifier
RES.Code=dictCOMMANDname2code("Access-Request")
RES.Identifier=RID
REQ_avps=splitMsgAVPs(RES.msg)
try:
IDENTITY=findAVP("Calling-Station-Id",REQ_avps)
USER_NAME=findAVP("User-Name",REQ_avps)
enc_password=findAVP("User-Password",REQ_avps)
USER_PASS_DECODED=PwDecrypt(enc_password,RES.Authenticator.decode("hex"),SECRET)
except:
pass
print "Found user identity is", str(IDENTITY)
print "Received Accounting Access Request from User" + ":"+str(USER_NAME) +","+ "and Password is " + str(USER_PASS_DECODED)
if USER_NAME == 'test' and USER_PASS_DECODED == 'password':
#Call DIAMETER with IDENTITY as CCR-I
valid_user=send_ccr_i(IDENTITY)
#This will be Access-Accept returned to client
if valid_user is True:
RES.Code=dictCOMMANDname2code("Access-Accept")
RES_avps=[]
auth=createAuthenticator()
RES_avps.append(encodeAVP('Session-Timeout',600 ))
RES_avps.append(encodeAVP('Acct-Interim-Interval', 60))
msg=createWithAuthenticator(RES,auth,RES_avps,SECRET)
return msg
elif valid_user is False:
#This will be Access-Reject returned to client
RES.Code=dictCOMMANDname2code("Access-Reject")
RES_avps=[]
auth=createAuthenticator()
msg=createWithAuthenticator(RES,auth,RES_avps,SECRET)
return msg
else:
# This will be Access-Reject too
RES.Code=dictCOMMANDname2code("Access-Reject")
RES_avps=[]
auth=createAuthenticator()
msg=createWithAuthenticator(RES,auth,RES_avps,SECRET)
return msg
def create_Session_Id():
#The Session-Id MUST be globally and eternally unique
#<DiameterIdentity>;<high 32 bits>;<low 32 bits>[;<optional value>]
now=datetime.datetime.now()
ret=ORIGIN_HOST+";"
ret=ret+str(now.year)[2:4]+"%02d"%now.month+"%02d"%now.day
ret=ret+"%02d"%now.hour+"%02d"%now.minute+";"
ret=ret+"%02d"%now.second+str(now.microsecond)
return ret
if __name__ == "__main__":
#logging.basicConfig(level=logging.DEBUG)
#logging.basicConfig(level=logging.INFO)
LoadDictionary("../dictRadius.xml")
libDiameter.LoadDictionary("../dictDiameter.xml")
# Set up here IP and Port for your RADIUS ACCOUNTING server
RADIUS_IP = "127.0.0.1"
RADIUS_PORT = 1812
BUFFER_SIZE=4096
# Set up shared secret here
SECRET="SOMEPASSWORD"
# FOR OCS SERVER:
OCS_HOST="127.0.0.1"
OCS_PORT=3868
ORIGIN_HOST="radius.3gpp.org"
ORIGIN_REALM="realm.3gpp.org"
DEST_REALM="realm.3gpp.org"
DEST_HOST="diameter.3gpp.org"
GY_SESSIONID=create_Session_Id()
# Now creating simple udp socket
RADIUS_server = socket.socket(socket.AF_INET,socket.SOCK_DGRAM)
RADIUS_server.bind((RADIUS_IP, RADIUS_PORT))
# Starting udp server in a loop
# Looping server until user sends CTRL+C or kill to stop it.
while True:
data, addr = RADIUS_server.recvfrom(BUFFER_SIZE)
if (data != ""):
msg=create_Access_Response()
dbg="Sending Access Response"
logging.info(dbg)
RADIUS_server.sendto(msg.decode("hex"),addr)
#End of code
3) demo_radius_client.py
#!/usr/bin/python
#############################################################################
# Example of radius client sending Access-Request to IP:port of Radius server
# This script is using pyprotosim software
# Read the terms of BSD license at pyprotosim website:
# http://sourceforge.net/projects/pyprotosim/
############################################################################
#Next two lines are to include parent directory for testing
import sys
sys.path.append("../")
# Remove them normally
# Radius client
from libRadius import *
import datetime
import time
def create_Request():
# Create message header (empty)
REQ=HDRItem()
# Set command code
REQ.Code=dictCOMMANDname2code("Access-Request")
REQ.Identifier=1
REQ.Authenticator=createAuthenticator()
# Let's build Request
REQ_avps=[]
REQ_avps.append(encodeAVP("Calling-Station-Id", "123456789012348"))
REQ_avps.append(encodeAVP("Called-Station-Id", "test"))
REQ_avps.append(encodeAVP("User-Name", "test"))
REQ_avps.append(encodeAVP("User-Password", PwCrypt(USER_PASSWORD,REQ.Authenticator,SECRET)))
REQ_avps.append(encodeAVP("NAS-Identifier", "GGSN"))
REQ_avps.append(encodeAVP("NAS-IP-Address", "1.2.3.4"))
REQ_avps.append(encodeAVP("NAS-Port-Type", 5))
REQ_avps.append(encodeAVP("NAS-Port", 6000))
REQ_avps.append(encodeAVP("Acct-Session-Id", "sessionID"))
REQ_avps.append(encodeAVP("Acct-Multi-Session-Id", "multisessionID"))
REQ_avps.append(encodeAVP("Service-Type", 2))
REQ_avps.append(encodeAVP("Framed-Protocol", 1))
# Add AVPs to header and calculate remaining fields
msg=createReq(REQ,REQ_avps)
# msg now contains Access-Request as hex string
return msg
if __name__ == "__main__":
#logging.basicConfig(level=logging.DEBUG)
logging.basicConfig(level=logging.INFO)
LoadDictionary("../dictRadius.xml")
HOST="127.0.0.1"
PORT=1812
USER_PASSWORD='password'
SECRET='SOMEPASSWORD'
# Let's assume that my Radius messages will fit into 4k
MSG_SIZE=4096
###########################################################
Conn=socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
# socket is in blocking mode, so let's add a timeout
Conn.settimeout(5)
###########################################################
# Create Access-Request
msg=create_Request()
# msg now contains Access-Request as hex string
logging.debug("+"*30)
#print "Access-Request",msg
# send data
Conn.sendto(msg.decode("hex"),(HOST,PORT))
# Receive response
received = Conn.recv(MSG_SIZE)
# Process response
RES=HDRItem()
stripHdr(RES,received.encode("hex"))
radius_avps=splitMsgAVPs(RES.msg)
for avps in radius_avps:
print decodeAVP(avps)
print radius_avps
# Normally - this is the end.
###########################################################
# And close the connection
Conn.close()