/* * (C) 2010-2016 by Harald Welte * (C) 2010 by On-Waves * (C) 2015 by Holger Hans Peter Freyther * All Rights Reserved * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU Affero General Public License as published by * the Free Software Foundation; either version 3 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU Affero General Public License for more details. * * You should have received a copy of the GNU Affero General Public License * along with this program. If not, see . * */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "../../config.h" #ifdef BUILD_IU #include #endif static struct sgsn_config *g_cfg = NULL; const struct value_string sgsn_auth_pol_strs[] = { { SGSN_AUTH_POLICY_OPEN, "accept-all" }, { SGSN_AUTH_POLICY_CLOSED, "closed" }, { SGSN_AUTH_POLICY_ACL_ONLY, "acl-only" }, { SGSN_AUTH_POLICY_REMOTE, "remote" }, { 0, NULL } }; /* Section 11.2.2 / Table 11.3a GPRS Mobility management timers – MS side */ #define GSM0408_T3312_SECS (10*60) /* periodic RAU interval, default 54min */ /* Section 11.2.2 / Table 11.4 MM timers netwokr side */ #define GSM0408_T3322_SECS 6 /* DETACH_REQ -> DETACH_ACC */ #define GSM0408_T3350_SECS 6 /* waiting for ATT/RAU/TMSI COMPL */ #define GSM0408_T3360_SECS 6 /* waiting for AUTH/CIPH RESP */ #define GSM0408_T3370_SECS 6 /* waiting for ID RESP */ /* Section 11.2.2 / Table 11.4a MM timers network side */ #define GSM0408_T3313_SECS 30 /* waiting for paging response */ #define GSM0408_T3314_SECS 44 /* force to STBY on expiry, Ready timer */ #define GSM0408_T3316_SECS 44 /* Section 11.3 / Table 11.2d Timers of Session Management - network side */ #define GSM0408_T3385_SECS 8 /* wait for ACT PDP CTX REQ */ #define GSM0408_T3386_SECS 8 /* wait for MODIFY PDP CTX ACK */ #define GSM0408_T3395_SECS 8 /* wait for DEACT PDP CTX ACK */ #define GSM0408_T3397_SECS 8 /* wait for DEACT AA PDP CTX ACK */ /* Non spec timer */ #define NONSPEC_X1001_SECS 5 /* wait for a RANAP Release Complete */ struct osmo_tdef sgsn_T_defs[] = { { .T=3312, .default_val=GSM0408_T3312_SECS, .desc="Periodic RA Update timer (s)" }, { .T=3313, .default_val=GSM0408_T3313_SECS, .desc="Waiting for paging response timer (s)" }, { .T=3314, .default_val=GSM0408_T3314_SECS, .desc="READY timer. Force to STANDBY on expiry timer (s)" }, { .T=3316, .default_val=GSM0408_T3316_SECS, .desc="AA-Ready timer (s)" }, { .T=3322, .default_val=GSM0408_T3322_SECS, .desc="Detach request -> accept timer (s)" }, { .T=3350, .default_val=GSM0408_T3350_SECS, .desc="Waiting for ATT/RAU/TMSI_COMPL timer (s)" }, { .T=3360, .default_val=GSM0408_T3360_SECS, .desc="Waiting for AUTH/CIPH response timer (s)" }, { .T=3370, .default_val=GSM0408_T3370_SECS, .desc="Waiting for IDENTITY response timer (s)" }, { .T=3385, .default_val=GSM0408_T3385_SECS, .desc="Wait for ACT PDP CTX REQ timer (s)" }, { .T=3386, .default_val=GSM0408_T3386_SECS, .desc="Wait for MODIFY PDP CTX ACK timer (s)" }, { .T=3395, .default_val=GSM0408_T3395_SECS, .desc="Wait for DEACT PDP CTX ACK timer (s)" }, { .T=3397, .default_val=GSM0408_T3397_SECS, .desc="Wait for DEACT AA PDP CTX ACK timer (s)" }, /* non spec timers */ { .T=-1001, .default_val=NONSPEC_X1001_SECS, .desc="RANAP Release timeout. Wait for RANAP Release Complete." "On expiry release Iu connection (s)" }, {} }; DEFUN(show_timer, show_timer_cmd, "show timer " OSMO_TDEF_VTY_ARG_T_OPTIONAL, SHOW_STR "Show timers\n" OSMO_TDEF_VTY_DOC_T) { const char *T_arg = argc > 0 ? argv[0] : NULL; return osmo_tdef_vty_show_cmd(vty, g_cfg->T_defs, T_arg, NULL); } DEFUN(cfg_sgsn_timer, cfg_sgsn_timer_cmd, "timer " OSMO_TDEF_VTY_ARG_SET_OPTIONAL, "Configure or show timers\n" OSMO_TDEF_VTY_DOC_SET) { /* If any arguments are missing, redirect to 'show' */ if (argc < 2) return show_timer(self, vty, argc, argv); return osmo_tdef_vty_set_cmd(vty, g_cfg->T_defs, argv); } DEFUN(show_timer_gtp, show_timer_gtp_cmd, "show timer gtp " OSMO_TDEF_VTY_ARG_T_OPTIONAL, SHOW_STR "Show timers\n" "GTP (libgtp) timers\n" OSMO_TDEF_VTY_DOC_T) { const char *T_arg = argc > 0 ? argv[0] : NULL; return osmo_tdef_vty_show_cmd(vty, g_cfg->T_defs_gtp, T_arg, NULL); } DEFUN(cfg_sgsn_timer_gtp, cfg_sgsn_timer_gtp_cmd, "timer gtp " OSMO_TDEF_VTY_ARG_SET_OPTIONAL, "Configure or show timers\n" "GTP (libgtp) timers\n" OSMO_TDEF_VTY_DOC_SET) { /* If any arguments are missing, redirect to 'show' */ if (argc < 2) return show_timer(self, vty, argc, argv); return osmo_tdef_vty_set_cmd(vty, g_cfg->T_defs_gtp, argv); } char *gprs_pdpaddr2str(uint8_t *pdpa, uint8_t len, bool return_ipv6) { static char str[INET6_ADDRSTRLEN + 10]; if (!pdpa || len < 2) return "none"; switch (pdpa[0] & 0x0f) { case PDP_TYPE_ORG_IETF: switch (pdpa[1]) { case PDP_TYPE_N_IETF_IPv4: if (len < 2 + 4) break; osmo_strlcpy(str, "IPv4 ", sizeof(str)); inet_ntop(AF_INET, pdpa+2, str+5, sizeof(str)-5); return str; case PDP_TYPE_N_IETF_IPv6: if (len < 2 + 8) break; osmo_strlcpy(str, "IPv6 ", sizeof(str)); inet_ntop(AF_INET6, pdpa+2, str+5, sizeof(str)-5); return str; case PDP_TYPE_N_IETF_IPv4v6: if (len < 2 + 20) break; if (return_ipv6) { /* The IPv6 token, (rightmost four fields) is a duplicate of * the site prefix + subnetID (leftmost fields) in pdpa here */ osmo_strlcpy(str, "IPv6 ", sizeof(str)); inet_ntop(AF_INET6, pdpa+6, str+5, sizeof(str)-5); return str; } osmo_strlcpy(str, "IPv4 ", sizeof(str)); inet_ntop(AF_INET, pdpa+2, str+5, sizeof(str)-5); return str; default: break; } break; case PDP_TYPE_ORG_ETSI: if (pdpa[1] == PDP_TYPE_N_ETSI_PPP) return "PPP"; break; default: break; } return "invalid"; } static struct cmd_node sgsn_node = { SGSN_NODE, "%s(config-sgsn)# ", 1, }; static struct cmd_node mme_node = { MME_NODE, "%s(config-sgsn-mme)# ", 1, }; static void config_write_mme(struct vty *vty, const struct sgsn_mme_ctx *mme, const char *prefix) { struct mme_rim_route *rt; vty_out(vty, "%smme %s%s", prefix, mme->name, VTY_NEWLINE); vty_out(vty, "%s gtp remote-ip %s%s", prefix, inet_ntoa(mme->remote_addr), VTY_NEWLINE); if (mme->default_route) vty_out(vty, "%s gtp ran-info-relay default%s", prefix, VTY_NEWLINE); llist_for_each_entry(rt, &mme->routes, list) { vty_out(vty, "%s gtp ran-info-relay %s %s %u%s", prefix, osmo_mcc_name(rt->tai.mcc), osmo_mnc_name(rt->tai.mnc, rt->tai.mnc_3_digits), rt->tai.tac, VTY_NEWLINE); } } static int config_write_sgsn(struct vty *vty) { struct sgsn_ggsn_ctx *gctx; struct imsi_acl_entry *acl; struct apn_ctx *actx; struct ares_addr_node *server; struct sgsn_mme_ctx *mme; int i; vty_out(vty, "sgsn%s", VTY_NEWLINE); vty_out(vty, " gtp state-dir %s%s", g_cfg->gtp_statedir, VTY_NEWLINE); vty_out(vty, " gtp local-ip %s%s", inet_ntoa(g_cfg->gtp_listenaddr.sin_addr), VTY_NEWLINE); llist_for_each_entry(gctx, &sgsn->ggsn_list, list) { if (gctx->id == UINT32_MAX) continue; vty_out(vty, " ggsn %u remote-ip %s%s", gctx->id, inet_ntoa(gctx->remote_addr), VTY_NEWLINE); vty_out(vty, " ggsn %u gtp-version %u%s", gctx->id, gctx->gtp_version, VTY_NEWLINE); if (gctx->echo_interval) vty_out(vty, " ggsn %u echo-interval %u%s", gctx->id, gctx->echo_interval, VTY_NEWLINE); else vty_out(vty, " ggsn %u no echo-interval%s", gctx->id, VTY_NEWLINE); } if (sgsn->cfg.dynamic_lookup) vty_out(vty, " ggsn dynamic%s", VTY_NEWLINE); for (server = sgsn->ares_servers; server; server = server->next) vty_out(vty, " grx-dns-add %s%s", inet_ntoa(server->addr.addr4), VTY_NEWLINE); if (g_cfg->gea_encryption_mask != 0) { vty_out(vty, " encryption gea"); for (i = 0; i < _GPRS_ALGO_NUM; i++) if (g_cfg->gea_encryption_mask >> i & 1) vty_out(vty, " %u", i); vty_out(vty, "%s", VTY_NEWLINE); } if (g_cfg->uea_encryption_mask != 0) { vty_out(vty, " encryption uea"); for (i = 0; i < _OSMO_UTRAN_UEA_NUM; i++) if (g_cfg->uea_encryption_mask >> i & 1) vty_out(vty, " %u", i); vty_out(vty, "%s", VTY_NEWLINE); } if (g_cfg->crypt_cipher_plugin_path) vty_out(vty, " encryption cipher-plugin-path %s%s", g_cfg->crypt_cipher_plugin_path, VTY_NEWLINE); if (g_cfg->sgsn_ipa_name) vty_out(vty, " gsup ipa-name %s%s", g_cfg->sgsn_ipa_name, VTY_NEWLINE); if (g_cfg->gsup_server_addr.sin_addr.s_addr) vty_out(vty, " gsup remote-ip %s%s", inet_ntoa(g_cfg->gsup_server_addr.sin_addr), VTY_NEWLINE); if (g_cfg->gsup_server_port) vty_out(vty, " gsup remote-port %d%s", g_cfg->gsup_server_port, VTY_NEWLINE); if (g_cfg->auth_policy == SGSN_AUTH_POLICY_REMOTE && !g_cfg->require_authentication) vty_out(vty, " authentication optional%s", VTY_NEWLINE); vty_out(vty, " auth-policy %s%s", get_value_string(sgsn_auth_pol_strs, g_cfg->auth_policy), VTY_NEWLINE); vty_out(vty, " gsup oap-id %d%s", (int)g_cfg->oap.client_id, VTY_NEWLINE); if (g_cfg->oap.secret_k_present != 0) vty_out(vty, " gsup oap-k %s%s", osmo_hexdump_nospc(g_cfg->oap.secret_k, sizeof(g_cfg->oap.secret_k)), VTY_NEWLINE); if (g_cfg->oap.secret_opc_present != 0) vty_out(vty, " gsup oap-opc %s%s", osmo_hexdump_nospc(g_cfg->oap.secret_opc, sizeof(g_cfg->oap.secret_opc)), VTY_NEWLINE); llist_for_each_entry(acl, &g_cfg->imsi_acl, list) vty_out(vty, " imsi-acl add %s%s", acl->imsi, VTY_NEWLINE); if (llist_empty(&sgsn->apn_list)) vty_out(vty, " ! apn * ggsn 0%s", VTY_NEWLINE); llist_for_each_entry(actx, &sgsn->apn_list, list) { if (strlen(actx->imsi_prefix) > 0) vty_out(vty, " apn %s imsi-prefix %s ggsn %u%s", actx->name, actx->imsi_prefix, actx->ggsn->id, VTY_NEWLINE); else vty_out(vty, " apn %s ggsn %u%s", actx->name, actx->ggsn->id, VTY_NEWLINE); } if (g_cfg->cdr.filename) vty_out(vty, " cdr filename %s%s", g_cfg->cdr.filename, VTY_NEWLINE); else vty_out(vty, " no cdr filename%s", VTY_NEWLINE); if (g_cfg->cdr.trap) vty_out(vty, " cdr trap%s", VTY_NEWLINE); else vty_out(vty, " no cdr trap%s", VTY_NEWLINE); vty_out(vty, " cdr interval %d%s", g_cfg->cdr.interval, VTY_NEWLINE); osmo_tdef_vty_write(vty, g_cfg->T_defs, " timer "); osmo_tdef_vty_write(vty, g_cfg->T_defs_gtp, " timer gtp "); if (g_cfg->pcomp_rfc1144.active) { vty_out(vty, " compression rfc1144 active slots %d%s", g_cfg->pcomp_rfc1144.s01 + 1, VTY_NEWLINE); } else if (g_cfg->pcomp_rfc1144.passive) { vty_out(vty, " compression rfc1144 passive%s", VTY_NEWLINE); } else vty_out(vty, " no compression rfc1144%s", VTY_NEWLINE); if (g_cfg->dcomp_v42bis.active && g_cfg->dcomp_v42bis.p0 == 1) { vty_out(vty, " compression v42bis active direction sgsn codewords %d strlen %d%s", g_cfg->dcomp_v42bis.p1, g_cfg->dcomp_v42bis.p2, VTY_NEWLINE); } else if (g_cfg->dcomp_v42bis.active && g_cfg->dcomp_v42bis.p0 == 2) { vty_out(vty, " compression v42bis active direction ms codewords %d strlen %d%s", g_cfg->dcomp_v42bis.p1, g_cfg->dcomp_v42bis.p2, VTY_NEWLINE); } else if (g_cfg->dcomp_v42bis.active && g_cfg->dcomp_v42bis.p0 == 3) { vty_out(vty, " compression v42bis active direction both codewords %d strlen %d%s", g_cfg->dcomp_v42bis.p1, g_cfg->dcomp_v42bis.p2, VTY_NEWLINE); } else if (g_cfg->dcomp_v42bis.passive) { vty_out(vty, " compression v42bis passive%s", VTY_NEWLINE); } else vty_out(vty, " no compression v42bis%s", VTY_NEWLINE); llist_for_each_entry(mme, &sgsn->mme_list, list) { config_write_mme(vty, mme, " "); } #ifdef BUILD_IU vty_out(vty, " cs7-instance-iu %u%s", g_cfg->iu.cs7_instance, VTY_NEWLINE); ranap_iu_vty_config_write(vty, " "); #endif return CMD_SUCCESS; } #define SGSN_STR "Configure the SGSN\n" #define GGSN_STR "Configure the GGSN information\n" DEFUN(cfg_sgsn, cfg_sgsn_cmd, "sgsn", SGSN_STR) { vty->node = SGSN_NODE; return CMD_SUCCESS; } DEFUN(cfg_sgsn_state_dir, cfg_sgsn_state_dir_cmd, "gtp state-dir PATH", "GTP Parameters\n" "Set the directory for the GTP State file\n" "Local Directory\n") { if (mkdir(argv[0], 0755) == -1 && errno != EEXIST) { vty_out(vty, "%% Failed to create state-dir: %s%s", argv[0], VTY_NEWLINE); return CMD_WARNING; } osmo_talloc_replace_string(sgsn, &sgsn->cfg.gtp_statedir, argv[0]); return CMD_SUCCESS; } DEFUN(cfg_sgsn_bind_addr, cfg_sgsn_bind_addr_cmd, "gtp local-ip A.B.C.D", "GTP Parameters\n" "Set the IP address for the local GTP bind for the Gp interface (towards the GGSNs)." " Note: in case you would like to run the GGSN on the same machine as the SGSN, you can not run" " both on the same IP address, since both sides are specified to use the same GTP port numbers" " (" OSMO_STRINGIFY_VAL(GTP1C_PORT) " and " OSMO_STRINGIFY_VAL(GTP1U_PORT) ")." " For example, you could use 127.0.0.1 for the SGSN and 127.0.0.2 for the GGSN in such" " situations.\n" "IPv4 Address\n") { inet_aton(argv[0], &g_cfg->gtp_listenaddr.sin_addr); return CMD_SUCCESS; } DEFUN(cfg_ggsn_remote_ip, cfg_ggsn_remote_ip_cmd, "ggsn <0-255> remote-ip A.B.C.D", GGSN_STR "GGSN Number\n" "Configure this static GGSN to use the specified remote IP address.\n" "IPv4 Address\n") { uint32_t id = atoi(argv[0]); struct sgsn_ggsn_ctx *ggc = sgsn_ggsn_ctx_find_alloc(sgsn, id); inet_aton(argv[1], &ggc->remote_addr); return CMD_SUCCESS; } #if 0 DEFUN(cfg_ggsn_remote_port, cfg_ggsn_remote_port_cmd, "ggsn <0-255> remote-port <0-65535>", "") { uint32_t id = atoi(argv[0]); struct sgsn_ggsn_ctx *ggc = sgsn_ggsn_ctx_find_alloc(id); uint16_t port = atoi(argv[1]); } #endif DEFUN(cfg_ggsn_gtp_version, cfg_ggsn_gtp_version_cmd, "ggsn <0-255> gtp-version (0|1)", GGSN_STR "GGSN Number\n" "GTP Version\n" "Version 0\n" "Version 1\n") { uint32_t id = atoi(argv[0]); struct sgsn_ggsn_ctx *ggc = sgsn_ggsn_ctx_find_alloc(sgsn, id); if (atoi(argv[1])) ggc->gtp_version = 1; else ggc->gtp_version = 0; return CMD_SUCCESS; } /* Seee 3GPP TS 29.060 section 7.2.1 */ DEFUN(cfg_ggsn_echo_interval, cfg_ggsn_echo_interval_cmd, "ggsn <0-255> echo-interval <1-36000>", GGSN_STR "GGSN Number\n" "Send an echo request to this static GGSN every interval.\n" "Interval between echo requests in seconds.\n") { uint32_t id = atoi(argv[0]); struct sgsn_ggsn_ctx *ggc = sgsn_ggsn_ctx_find_alloc(sgsn, id); ggc->echo_interval = atoi(argv[1]); if (ggc->echo_interval < 60) vty_out(vty, "%% 3GPP TS 29.060 section 7.2.1 states interval should " \ "not be lower than 60 seconds, use this value for " \ "testing purposes only!%s", VTY_NEWLINE); sgsn_ggsn_ctx_check_echo_timer(ggc); return CMD_SUCCESS; } DEFUN(cfg_ggsn_no_echo_interval, cfg_ggsn_no_echo_interval_cmd, "ggsn <0-255> no echo-interval", GGSN_STR "GGSN Number\n" NO_STR "Send an echo request to this static GGSN every interval.\n") { uint32_t id = atoi(argv[0]); struct sgsn_ggsn_ctx *ggc = sgsn_ggsn_ctx_find_alloc(sgsn, id); ggc->echo_interval = 0; sgsn_ggsn_ctx_check_echo_timer(ggc); return CMD_SUCCESS; } DEFUN(cfg_ggsn_dynamic_lookup, cfg_ggsn_dynamic_lookup_cmd, "ggsn dynamic", GGSN_STR "Enable dynamic resolving of GGSNs based on DNS resolving the APN name like in a GRX-style setup." " Changing this setting requires a restart.\n") { sgsn->cfg.dynamic_lookup = 1; return CMD_SUCCESS; } DEFUN(cfg_grx_ggsn, cfg_grx_ggsn_cmd, "grx-dns-add A.B.C.D", "Use the specified IP address for DNS-resolving the AP names to GGSN IP addresses\n" "IPv4 address\n") { struct ares_addr_node *node = talloc_zero(tall_sgsn_ctx, struct ares_addr_node); node->family = AF_INET; inet_aton(argv[0], &node->addr.addr4); node->next = sgsn->ares_servers; sgsn->ares_servers = node; return CMD_SUCCESS; } #define APN_STR "Configure the information per APN\n" #define APN_GW_STR "The APN gateway name optionally prefixed by '*' (wildcard)\n" static int add_apn_ggsn_mapping(struct vty *vty, const char *apn_str, const char *imsi_prefix, int ggsn_id) { struct apn_ctx *actx; struct sgsn_ggsn_ctx *ggsn; ggsn = sgsn_ggsn_ctx_by_id(sgsn, ggsn_id); if (ggsn == NULL) { vty_out(vty, "%% a GGSN with id %d has not been defined%s", ggsn_id, VTY_NEWLINE); return CMD_WARNING; } actx = sgsn_apn_ctx_find_alloc(apn_str, imsi_prefix); if (!actx) { vty_out(vty, "%% unable to create APN context for %s/%s%s", apn_str, imsi_prefix, VTY_NEWLINE); return CMD_WARNING; } actx->ggsn = ggsn; return CMD_SUCCESS; } DEFUN(cfg_apn_ggsn, cfg_apn_ggsn_cmd, "apn APNAME ggsn <0-255>", APN_STR APN_GW_STR "Select the GGSN to use for the given APN gateway prefix\n" "The GGSN id") { return add_apn_ggsn_mapping(vty, argv[0], "", atoi(argv[1])); } DEFUN(cfg_apn_imsi_ggsn, cfg_apn_imsi_ggsn_cmd, "apn APNAME imsi-prefix IMSIPRE ggsn <0-255>", APN_STR APN_GW_STR "Select the GGSN to use for the given APN gateway prefix if and only if the IMSI matches the" " given prefix.\n" "An IMSI prefix\n" "Select the GGSN to use when APN gateway and IMSI prefix match\n" "The GGSN id") { return add_apn_ggsn_mapping(vty, argv[0], argv[1], atoi(argv[2])); } char *sgsn_gtp_ntoa(struct ul16_t *ul) { struct in_addr ia; if (gsna2in_addr(&ia, ul) != 0) return "UNKNOWN"; return inet_ntoa(ia); } static void vty_dump_pdp(struct vty *vty, const char *pfx, struct sgsn_pdp_ctx *pdp) { const char *imsi = pdp->mm ? pdp->mm->imsi : "(detaching)"; vty_out(vty, "%sPDP Context IMSI: %s, SAPI: %u, NSAPI: %u, TI: %u%s", pfx, imsi, pdp->sapi, pdp->nsapi, pdp->ti, VTY_NEWLINE); if (pdp->lib) { char apnbuf[APN_MAXLEN + 1]; vty_out(vty, "%s APN: %s%s", pfx, osmo_apn_to_str(apnbuf, pdp->lib->apn_use.v, pdp->lib->apn_use.l), VTY_NEWLINE); vty_out(vty, "%s PDP Address: %s%s", pfx, gprs_pdpaddr2str(pdp->lib->eua.v, pdp->lib->eua.l, false), VTY_NEWLINE); if (pdp->lib->eua.v[1] == PDP_TYPE_N_IETF_IPv4v6) { vty_out(vty, "%s PDP Address: %s%s", pfx, gprs_pdpaddr2str(pdp->lib->eua.v, pdp->lib->eua.l, true), VTY_NEWLINE); } vty_out(vty, "%s GTPv%d Local Control(%s / TEIC: 0x%08x) ", pfx, pdp->lib->version, sgsn_gtp_ntoa(&pdp->lib->gsnlc), pdp->lib->teic_own); vty_out(vty, "Data(%s / TEID: 0x%08x)%s", sgsn_gtp_ntoa(&pdp->lib->gsnlu), pdp->lib->teid_own, VTY_NEWLINE); vty_out(vty, "%s GTPv%d Remote Control(%s / TEIC: 0x%08x) ", pfx, pdp->lib->version, sgsn_gtp_ntoa(&pdp->lib->gsnrc), pdp->lib->teic_gn); vty_out(vty, "Data(%s / TEID: 0x%08x)%s", sgsn_gtp_ntoa(&pdp->lib->gsnru), pdp->lib->teid_gn, VTY_NEWLINE); } vty_out_rate_ctr_group(vty, " ", pdp->ctrg); } static void vty_dump_mmctx(struct vty *vty, const char *pfx, struct sgsn_mm_ctx *mm, int pdp) { uint32_t id = 0; const char *mm_state_name = NULL; switch(mm->ran_type) { case MM_CTX_T_UTRAN_Iu: #if BUILD_IU id = mm->iu.ue_ctx->conn_id; mm_state_name = osmo_fsm_inst_state_name(mm->iu.mm_state_fsm); #endif break; case MM_CTX_T_GERAN_Gb: id = mm->gb.tlli; mm_state_name = osmo_fsm_inst_state_name(mm->gb.mm_state_fsm); break; } vty_out(vty, "%sMM Context for IMSI %s, IMEI %s, P-TMSI %08x%s", pfx, mm->imsi, mm->imei, mm->p_tmsi, VTY_NEWLINE); vty_out(vty, "%s MSISDN: %s, TLLI: %08x%s HLR: %s", pfx, mm->msisdn, id, mm->hlr, VTY_NEWLINE); vty_out(vty, "%s GMM State: %s, Routeing Area: %s, Cell ID: %u%s", pfx, osmo_fsm_inst_state_name(mm->gmm_fsm), osmo_rai_name2(&mm->ra), mm->gb.cell_id, VTY_NEWLINE); vty_out(vty, "%s MM State: %s, RAN Type: %s%s", pfx, mm_state_name, get_value_string(sgsn_ran_type_names, mm->ran_type), VTY_NEWLINE); vty_out_rate_ctr_group(vty, " ", mm->ctrg); if (pdp) { struct sgsn_pdp_ctx *pdp; llist_for_each_entry(pdp, &mm->pdp_list, list) vty_dump_pdp(vty, " ", pdp); } } DEFUN(show_sgsn, show_sgsn_cmd, "show sgsn", SHOW_STR "Display information about the SGSN") { if (sgsn->gsup_client) { struct ipa_client_conn *link = sgsn->gsup_client->link; vty_out(vty, " Remote authorization: %sconnected to %s:%d via GSUP%s", sgsn->gsup_client->is_connected ? "" : "not ", link->addr, link->port, VTY_NEWLINE); } if (sgsn->gsn) vty_out(vty, " GSN: signalling %s, user traffic %s%s", inet_ntoa(sgsn->gsn->gsnc), inet_ntoa(sgsn->gsn->gsnu), VTY_NEWLINE); /* FIXME: statistics */ return CMD_SUCCESS; } #define MMCTX_STR "MM Context\n" #define INCLUDE_PDP_STR "Include PDP Context Information\n" #if 0 DEFUN(show_mmctx_tlli, show_mmctx_tlli_cmd, "show mm-context tlli HEX [pdp]", SHOW_STR MMCTX_STR "Identify by TLLI\n" "TLLI\n" INCLUDE_PDP_STR) { uint32_t tlli; struct sgsn_mm_ctx *mm; tlli = strtoul(argv[0], NULL, 16); mm = sgsn_mm_ctx_by_tlli(tlli); if (!mm) { vty_out(vty, "No MM context for TLLI %08x%s", tlli, VTY_NEWLINE); return CMD_WARNING; } vty_dump_mmctx(vty, "", mm, argv[1] ? 1 : 0); return CMD_SUCCESS; } #endif DEFUN(swow_mmctx_imsi, show_mmctx_imsi_cmd, "show mm-context imsi IMSI [pdp]", SHOW_STR MMCTX_STR "Identify by IMSI\n" "IMSI of the MM Context\n" INCLUDE_PDP_STR) { struct sgsn_mm_ctx *mm; mm = sgsn_mm_ctx_by_imsi(argv[0]); if (!mm) { vty_out(vty, "No MM context for IMSI %s%s", argv[0], VTY_NEWLINE); return CMD_WARNING; } vty_dump_mmctx(vty, "", mm, (argc > 1) ? 1 : 0); return CMD_SUCCESS; } DEFUN(swow_mmctx_all, show_mmctx_all_cmd, "show mm-context all [pdp]", SHOW_STR MMCTX_STR "All MM Contexts\n" INCLUDE_PDP_STR) { struct sgsn_mm_ctx *mm; llist_for_each_entry(mm, &sgsn->mm_list, list) vty_dump_mmctx(vty, "", mm, (argc > 0) ? 1 : 0); return CMD_SUCCESS; } DEFUN(show_pdpctx_all, show_pdpctx_all_cmd, "show pdp-context all", SHOW_STR "Display information on PDP Context\n" "Show everything\n") { struct sgsn_pdp_ctx *pdp; llist_for_each_entry(pdp, &sgsn->pdp_list, g_list) vty_dump_pdp(vty, "", pdp); return CMD_SUCCESS; } DEFUN(imsi_acl, cfg_imsi_acl_cmd, "imsi-acl (add|del) IMSI", "Access Control List of foreign IMSIs\n" "Add IMSI to ACL\n" "Remove IMSI from ACL\n" "IMSI of subscriber\n") { char imsi_sanitized[GSM23003_IMSI_MAX_DIGITS + 1]; const char *op = argv[0]; const char *imsi = imsi_sanitized; size_t len = strnlen(argv[1], GSM23003_IMSI_MAX_DIGITS + 1); int rc; memset(imsi_sanitized, '0', GSM23003_IMSI_MAX_DIGITS); imsi_sanitized[GSM23003_IMSI_MAX_DIGITS] = '\0'; /* Sanitize IMSI */ if (len > GSM23003_IMSI_MAX_DIGITS) { vty_out(vty, "%% IMSI (%s) too long (max %u digits) -- ignored!%s", argv[1], GSM23003_IMSI_MAX_DIGITS, VTY_NEWLINE); return CMD_WARNING; } osmo_strlcpy(imsi_sanitized + GSM23003_IMSI_MAX_DIGITS - len, argv[1], sizeof(imsi_sanitized) - (GSM23003_IMSI_MAX_DIGITS - len)); if (!strcmp(op, "add")) rc = sgsn_acl_add(imsi, g_cfg); else rc = sgsn_acl_del(imsi, g_cfg); if (rc < 0) { vty_out(vty, "%% unable to %s ACL%s", op, VTY_NEWLINE); return CMD_WARNING; } return CMD_SUCCESS; } DEFUN_DEPRECATED(cfg_encrypt, cfg_encrypt_cmd, "encryption (GEA0|GEA1|GEA2|GEA3|GEA4)", "Set encryption algorithm for SGSN\n" "Use GEA0 (no encryption)\n" "Use GEA1\nUse GEA2\nUse GEA3\nUse GEA4\n") { enum gprs_ciph_algo c = get_string_value(gprs_cipher_names, argv[0]); if (strcmp(argv[0], "gea") == 0) return CMD_SUCCESS; if (c != GPRS_ALGO_GEA0) { if (gprs_cipher_supported(c) <= 0) { vty_out(vty, "%% cipher %s is unsupported in current version%s", argv[0], VTY_NEWLINE); return CMD_WARNING; } if (!g_cfg->require_authentication) { vty_out(vty, "%% unable to use encryption %s without authentication: please adjust auth-policy%s", argv[0], VTY_NEWLINE); return CMD_WARNING; } } g_cfg->gea_encryption_mask |= (1 << c); return CMD_SUCCESS; } #define ENCRYPTION_STR "Set encryption algorithms for SGSN\n" DEFUN(cfg_encrypt2, cfg_encrypt2_cmd, "encryption gea <0-4> [<0-4>] [<0-4>] [<0-4>] [<0-4>]", ENCRYPTION_STR "GPRS Encryption Algorithm\n" "GEAn Algorithm Number\n" "GEAn Algorithm Number\n" "GEAn Algorithm Number\n" "GEAn Algorithm Number\n" "GEAn Algorithm Number\n") { int i = 0; g_cfg->gea_encryption_mask = 0; for (i = 0; i < argc; i++) g_cfg->gea_encryption_mask |= (1 << atoi(argv[i])); for (i = 0; i < _GPRS_ALGO_NUM; i++) { if (g_cfg->gea_encryption_mask >> i & 1) { if (i == GPRS_ALGO_GEA0) continue; if (gprs_cipher_supported(i) <= 0) { vty_out(vty, "%% cipher %d is unsupported in current version%s", i, VTY_NEWLINE); return CMD_ERR_INCOMPLETE; } if (!g_cfg->require_authentication) { vty_out(vty, "%% unable to use encryption %s without authentication: please adjust auth-policy%s", argv[i], VTY_NEWLINE); return CMD_ERR_INCOMPLETE; } } } return CMD_SUCCESS; } DEFUN(cfg_encrypt_cipher_plugin_path, cfg_encrypt_cipher_plugin_path_cmd, "encryption cipher-plugin-path PATH", ENCRYPTION_STR "Path to gprs encryption cipher plugin directory\n" "Plugin path\n") { osmo_talloc_replace_string(sgsn, &sgsn->cfg.crypt_cipher_plugin_path, argv[0]); return CMD_SUCCESS; } DEFUN(cfg_no_encrypt_cipher_plugin_path, cfg_no_encrypt_cipher_plugin_path_cmd, "no encryption cipher-plugin-path PATH", NO_STR ENCRYPTION_STR "Path to gprs encryption cipher plugin directory\n" "Plugin path\n") { TALLOC_FREE(sgsn->cfg.crypt_cipher_plugin_path); return CMD_SUCCESS; } DEFUN(cfg_authentication, cfg_authentication_cmd, "authentication (optional|required)", "Whether to enforce MS authentication in GERAN (only with auth-policy remote)\n" "Allow MS to attach via GERAN without authentication (default and only possible value for non-remote auth-policy)\n" "Always require authentication (only available for auth-policy remote, default with that auth-policy)\n") { int required = (argv[0][0] == 'r'); if (vty->type != VTY_FILE) { if (g_cfg->auth_policy != SGSN_AUTH_POLICY_REMOTE && required) { vty_out(vty, "%% Authentication is not possible without HLR, " "consider setting 'auth-policy' to 'remote'%s", VTY_NEWLINE); return CMD_WARNING; } } g_cfg->require_authentication = required; return CMD_SUCCESS; } DEFUN(cfg_encryption_uea, cfg_encryption_uea_cmd, "encryption uea <0-2> [<0-2>] [<0-2>]", ENCRYPTION_STR "UTRAN (3G) encryption algorithms to allow: 0 = UEA0 (no encryption), 1 = UEA1, 2 = UEA2.\n" "UEAn Algorithm Number\n" "UEAn Algorithm Number\n" "UEAn Algorithm Number\n") { unsigned int i; g_cfg->uea_encryption_mask = 0; for (i = 0; i < argc; i++) g_cfg->uea_encryption_mask |= (1 << atoi(argv[i])); return CMD_SUCCESS; } DEFUN(cfg_auth_policy, cfg_auth_policy_cmd, "auth-policy (accept-all|closed|acl-only|remote)", "Configure the Authorization policy of the SGSN. This setting determines which subscribers are" " permitted to register to the network.\n" "Accept all IMSIs (DANGEROUS)\n" "Accept only home network subscribers or those in the ACL\n" "Accept only subscribers in the ACL\n" "Use remote subscription data only (HLR)\n") { int val = get_string_value(sgsn_auth_pol_strs, argv[0]); OSMO_ASSERT(val >= SGSN_AUTH_POLICY_OPEN && val <= SGSN_AUTH_POLICY_REMOTE); g_cfg->auth_policy = val; g_cfg->require_update_location = (val == SGSN_AUTH_POLICY_REMOTE); return CMD_SUCCESS; } /* Subscriber */ #include static void subscr_dump_full_vty(struct vty *vty, struct gprs_subscr *gsub, int pending) { #if 0 char expire_time[200]; #endif struct gsm_auth_tuple *at; int at_idx; struct sgsn_subscriber_pdp_data *pdp; vty_out(vty, " Authorized: %d%s", gsub->authorized, VTY_NEWLINE); vty_out(vty, " LAC: %d/0x%x%s", gsub->lac, gsub->lac, VTY_NEWLINE); vty_out(vty, " IMSI: %s%s", gsub->imsi, VTY_NEWLINE); if (gsub->tmsi != GSM_RESERVED_TMSI) vty_out(vty, " TMSI: %08X%s", gsub->tmsi, VTY_NEWLINE); if (gsub->sgsn_data->msisdn_len > 0) vty_out(vty, " MSISDN (BCD): %s%s", osmo_hexdump(gsub->sgsn_data->msisdn, gsub->sgsn_data->msisdn_len), VTY_NEWLINE); if (strlen(gsub->imei) > 0) vty_out(vty, " IMEI: %s%s", gsub->imei, VTY_NEWLINE); for (at_idx = 0; at_idx < ARRAY_SIZE(gsub->sgsn_data->auth_triplets); at_idx++) { at = &gsub->sgsn_data->auth_triplets[at_idx]; if (at->key_seq == GSM_KEY_SEQ_INVAL) continue; vty_out(vty, " A3A8 tuple (used %d times): ", at->use_count); vty_out(vty, " CKSN: %d, ", at->key_seq); if (at->vec.auth_types & OSMO_AUTH_TYPE_GSM) { vty_out(vty, "RAND: %s, ", osmo_hexdump_nospc(at->vec.rand, sizeof(at->vec.rand))); vty_out(vty, "SRES: %s, ", osmo_hexdump_nospc(at->vec.sres, sizeof(at->vec.sres))); vty_out(vty, "Kc: %s%s", osmo_hexdump_nospc(at->vec.kc, sizeof(at->vec.kc)), VTY_NEWLINE); } if (at->vec.auth_types & OSMO_AUTH_TYPE_UMTS) { vty_out(vty, " AUTN: %s, ", osmo_hexdump(at->vec.autn, sizeof(at->vec.autn))); vty_out(vty, "RES: %s, ", osmo_hexdump_nospc(at->vec.res, at->vec.res_len)); vty_out(vty, "IK: %s, ", osmo_hexdump_nospc(at->vec.ik, sizeof(at->vec.ik))); vty_out(vty, "CK: %s, ", osmo_hexdump_nospc(at->vec.ck, sizeof(at->vec.ck))); } } llist_for_each_entry(pdp, &gsub->sgsn_data->pdp_list, list) { char ip_str[INET6_ADDRSTRLEN] = { 0 }; vty_out(vty, " PDP info: Id: %d, Addr(Org: 0x%02x Type: 0x%02x", pdp->context_id, pdp->pdp_type_org, pdp->pdp_type_nr); if (pdp->pdp_address[0].u.sa.sa_family != AF_UNSPEC) vty_out(vty, " Addr[0]: %s", osmo_sockaddr_ntop(&pdp->pdp_address[0].u.sa, ip_str)); if (pdp->pdp_address[0].u.sa.sa_family != AF_UNSPEC) vty_out(vty, " Addr[1]: %s", osmo_sockaddr_ntop(&pdp->pdp_address[1].u.sa, ip_str)); vty_out(vty, ") APN: '%s'", pdp->apn_str); if (pdp->qos_subscribed_len) vty_out(vty, " QoS: %s", osmo_hexdump(pdp->qos_subscribed, pdp->qos_subscribed_len)); vty_out(vty, "%s", VTY_NEWLINE); } #if 0 /* print the expiration time of a subscriber */ if (gsub->expire_lu) { strftime(expire_time, sizeof(expire_time), "%a, %d %b %Y %T %z", localtime(&gsub->expire_lu)); expire_time[sizeof(expire_time) - 1] = '\0'; vty_out(vty, " Expiration Time: %s%s", expire_time, VTY_NEWLINE); } #endif if (gsub->flags) vty_out(vty, " Flags: %s%s%s%s%s%s", gsub->flags & GPRS_SUBSCRIBER_FIRST_CONTACT ? "FIRST_CONTACT " : "", gsub->flags & GPRS_SUBSCRIBER_CANCELLED ? "CANCELLED " : "", gsub->flags & GPRS_SUBSCRIBER_UPDATE_LOCATION_PENDING ? "UPDATE_LOCATION_PENDING " : "", gsub->flags & GPRS_SUBSCRIBER_UPDATE_AUTH_INFO_PENDING ? "AUTH_INFO_PENDING " : "", gsub->flags & GPRS_SUBSCRIBER_ENABLE_PURGE ? "ENABLE_PURGE " : "", VTY_NEWLINE); vty_out(vty, " Use count: %u%s", gsub->use_count, VTY_NEWLINE); } #define RESET_SGSN_STATE_STR \ "Remove all known subscribers, MM contexts and flush BSSGP queues." \ " Useful only when running tests against the SGSN\n" DEFUN_HIDDEN(reset_sgsn_state, reset_sgsn_state_cmd, "reset sgsn state", RESET_SGSN_STATE_STR RESET_SGSN_STATE_STR RESET_SGSN_STATE_STR) { struct gprs_subscr *subscr, *tmp_subscr; struct sgsn_mm_ctx *mm, *tmp_mm; llist_for_each_entry_safe(mm, tmp_mm, &sgsn->mm_list, list) { gsm0408_gprs_access_cancelled(mm, SGSN_ERROR_CAUSE_NONE); } vty_out(vty, "Cancelled MM Ctx. %s", VTY_NEWLINE); llist_for_each_entry_safe(subscr, tmp_subscr, gprs_subscribers, entry) { gprs_subscr_get(subscr); gprs_subscr_cancel(subscr); gprs_subscr_put(subscr); } vty_out(vty, "Removed all gprs subscribers.%s", VTY_NEWLINE); bssgp_flush_all_queues(); vty_out(vty, "Flushed all BSSGPs queues.%s", VTY_NEWLINE); gtp_clear_queues(sgsn->gsn); vty_out(vty, "Flushed rx & tx queus towards the GGSN.%s", VTY_NEWLINE); /* remove all queues to bssgp */ return CMD_SUCCESS; } DEFUN(show_subscr_cache, show_subscr_cache_cmd, "show subscriber cache", SHOW_STR "Show information about subscribers\n" "Display contents of subscriber cache\n") { struct gprs_subscr *subscr; llist_for_each_entry(subscr, gprs_subscribers, entry) { vty_out(vty, " Subscriber:%s", VTY_NEWLINE); subscr_dump_full_vty(vty, subscr, 0); } return CMD_SUCCESS; } #define UPDATE_SUBSCR_STR "update-subscriber imsi IMSI " #define UPDATE_SUBSCR_HELP "Update subscriber list\n" \ "Use the IMSI to select the subscriber\n" \ "The IMSI\n" #define UPDATE_SUBSCR_INSERT_HELP "Insert data into the subscriber record\n" DEFUN(update_subscr_insert_auth_triplet, update_subscr_insert_auth_triplet_cmd, UPDATE_SUBSCR_STR "insert auth-triplet <1-5> sres SRES rand RAND kc KC", UPDATE_SUBSCR_HELP UPDATE_SUBSCR_INSERT_HELP "Update authentication triplet\n" "Triplet index\n" "Set SRES value\nSRES value (4 byte) in hex\n" "Set RAND value\nRAND value (16 byte) in hex\n" "Set Kc value\nKc value (8 byte) in hex\n") { const char *imsi = argv[0]; const int cksn = atoi(argv[1]) - 1; const char *sres_str = argv[2]; const char *rand_str = argv[3]; const char *kc_str = argv[4]; struct gsm_auth_tuple at = {0,}; struct gprs_subscr *subscr; subscr = gprs_subscr_get_by_imsi(imsi); if (!subscr) { vty_out(vty, "%% unable get subscriber record for %s%s", imsi, VTY_NEWLINE); return CMD_WARNING; } OSMO_ASSERT(subscr->sgsn_data); if (osmo_hexparse(sres_str, &at.vec.sres[0], sizeof(at.vec.sres)) < 0) { vty_out(vty, "%% invalid SRES value '%s'%s", sres_str, VTY_NEWLINE); goto failed; } if (osmo_hexparse(rand_str, &at.vec.rand[0], sizeof(at.vec.rand)) < 0) { vty_out(vty, "%% invalid RAND value '%s'%s", rand_str, VTY_NEWLINE); goto failed; } if (osmo_hexparse(kc_str, &at.vec.kc[0], sizeof(at.vec.kc)) < 0) { vty_out(vty, "%% invalid Kc value '%s'%s", kc_str, VTY_NEWLINE); goto failed; } at.key_seq = cksn; subscr->sgsn_data->auth_triplets[cksn] = at; subscr->sgsn_data->auth_triplets_updated = 1; gprs_subscr_put(subscr); return CMD_SUCCESS; failed: gprs_subscr_put(subscr); return CMD_SUCCESS; } DEFUN(update_subscr_cancel, update_subscr_cancel_cmd, UPDATE_SUBSCR_STR "cancel (update-procedure|subscription-withdraw)", UPDATE_SUBSCR_HELP "Cancel (remove) subscriber record\n" "The MS moved to another SGSN\n" "The subscription is no longer valid\n") { const char *imsi = argv[0]; const char *cancel_type = argv[1]; struct gprs_subscr *subscr; subscr = gprs_subscr_get_by_imsi(imsi); if (!subscr) { vty_out(vty, "%% no subscriber record for %s%s", imsi, VTY_NEWLINE); return CMD_WARNING; } if (strcmp(cancel_type, "update-procedure") == 0) subscr->sgsn_data->error_cause = SGSN_ERROR_CAUSE_NONE; else subscr->sgsn_data->error_cause = GMM_CAUSE_IMPL_DETACHED; gprs_subscr_cancel(subscr); gprs_subscr_put(subscr); return CMD_SUCCESS; } DEFUN(update_subscr_create, update_subscr_create_cmd, UPDATE_SUBSCR_STR "create", UPDATE_SUBSCR_HELP "Create a subscriber entry\n") { const char *imsi = argv[0]; struct gprs_subscr *subscr; subscr = gprs_subscr_get_by_imsi(imsi); if (subscr) { vty_out(vty, "%% subscriber record already exists for %s%s", imsi, VTY_NEWLINE); return CMD_WARNING; } subscr = gprs_subscr_get_or_create(imsi); if (!subscr) { vty_out(vty, "Can not create subscriber. Out of memory.%s", imsi); return CMD_WARNING; } subscr->keep_in_ram = 1; gprs_subscr_put(subscr); return CMD_SUCCESS; } DEFUN(update_subscr_destroy, update_subscr_destroy_cmd, UPDATE_SUBSCR_STR "destroy", UPDATE_SUBSCR_HELP "Destroy a subscriber entry\n") { const char *imsi = argv[0]; struct gprs_subscr *subscr; subscr = gprs_subscr_get_by_imsi(imsi); if (!subscr) { vty_out(vty, "%% subscriber record does not exist for %s%s", imsi, VTY_NEWLINE); return CMD_WARNING; } subscr->keep_in_ram = 0; subscr->sgsn_data->error_cause = SGSN_ERROR_CAUSE_NONE; gprs_subscr_cancel(subscr); if (subscr->use_count > 1) vty_out(vty, "%% subscriber is still in use%s", VTY_NEWLINE); gprs_subscr_put(subscr); return CMD_SUCCESS; } #define UL_ERR_STR "system-failure|data-missing|unexpected-data-value|" \ "unknown-subscriber|roaming-not-allowed" #define UL_ERR_HELP \ "Force error code SystemFailure\n" \ "Force error code DataMissing\n" \ "Force error code UnexpectedDataValue\n" \ "Force error code UnknownSubscriber\n" \ "Force error code RoamingNotAllowed\n" DEFUN(update_subscr_update_location_result, update_subscr_update_location_result_cmd, UPDATE_SUBSCR_STR "update-location-result (ok|" UL_ERR_STR ")", UPDATE_SUBSCR_HELP "Complete the update location procedure\n" "The update location request succeeded\n" UL_ERR_HELP) { const char *imsi = argv[0]; const char *ret_code_str = argv[1]; struct gprs_subscr *subscr; const struct value_string cause_mapping[] = { { GMM_CAUSE_NET_FAIL, "system-failure" }, { GMM_CAUSE_INV_MAND_INFO, "data-missing" }, { GMM_CAUSE_PROTO_ERR_UNSPEC, "unexpected-data-value" }, { GMM_CAUSE_IMSI_UNKNOWN, "unknown-subscriber" }, { GMM_CAUSE_GPRS_NOTALLOWED, "roaming-not-allowed" }, { 0, NULL } }; subscr = gprs_subscr_get_by_imsi(imsi); if (!subscr) { vty_out(vty, "%% unable to get subscriber record for %s%s", imsi, VTY_NEWLINE); return CMD_WARNING; } if (strcmp(ret_code_str, "ok") == 0) { subscr->sgsn_data->error_cause = SGSN_ERROR_CAUSE_NONE; subscr->authorized = 1; } else { subscr->sgsn_data->error_cause = get_string_value(cause_mapping, ret_code_str); subscr->authorized = 0; } gprs_subscr_update(subscr); gprs_subscr_put(subscr); return CMD_SUCCESS; } DEFUN(update_subscr_update_auth_info, update_subscr_update_auth_info_cmd, UPDATE_SUBSCR_STR "update-auth-info", UPDATE_SUBSCR_HELP "Complete the send authentication info procedure\n") { const char *imsi = argv[0]; struct gprs_subscr *subscr; subscr = gprs_subscr_get_by_imsi(imsi); if (!subscr) { vty_out(vty, "%% unable to get subscriber record for %s%s", imsi, VTY_NEWLINE); return CMD_WARNING; } gprs_subscr_update_auth_info(subscr); gprs_subscr_put(subscr); return CMD_SUCCESS; } DEFUN(page_subscr, page_subscr_info_cmd, "page imsi IMSI", "Send a PS paging request to subscriber\n" "Use the IMSI to select the subscriber\n" "The IMSI\n") { const char *imsi = argv[0]; struct sgsn_mm_ctx *mm; mm = sgsn_mm_ctx_by_imsi(imsi); if (!mm) { vty_out(vty, "No MM context for IMSI %s%s", imsi, VTY_NEWLINE); return CMD_WARNING; } sgsn_ra_geran_page_ra(&mm->ra, mm); return CMD_SUCCESS; } DEFUN(cfg_gsup_ipa_name, cfg_gsup_ipa_name_cmd, "gsup ipa-name NAME", "GSUP Parameters\n" "Set the IPA name of this SGSN\n" "A unique name for this SGSN. For example: PLMN + redundancy server number: SGSN-901-70-0. " "This name is used for GSUP routing and must be set if more than one SGSN is connected to the network. " "The default is 'SGSN-00-00-00-00-00-00'.\n") { if (vty->type != VTY_FILE) { vty_out(vty, "The IPA name cannot be changed at run-time; " "It can only be set in the configuraton file.%s", VTY_NEWLINE); return CMD_WARNING; } g_cfg->sgsn_ipa_name = talloc_strdup(tall_vty_ctx, argv[0]); return CMD_SUCCESS; } DEFUN(cfg_gsup_remote_ip, cfg_gsup_remote_ip_cmd, "gsup remote-ip A.B.C.D", "GSUP Parameters\n" "Set the IP address of the remote GSUP server (e.g. OsmoHLR)." " This setting only applies if 'auth-policy remote' is used.\n" "IPv4 Address\n") { inet_aton(argv[0], &g_cfg->gsup_server_addr.sin_addr); return CMD_SUCCESS; } DEFUN(cfg_gsup_remote_port, cfg_gsup_remote_port_cmd, "gsup remote-port <0-65535>", "GSUP Parameters\n" "Set the TCP port of the remote GSUP server, see also 'gsup remote-ip'\n" "Remote TCP port\n") { g_cfg->gsup_server_port = atoi(argv[0]); return CMD_SUCCESS; } DEFUN(cfg_gsup_oap_id, cfg_gsup_oap_id_cmd, "gsup oap-id <0-65535>", "GSUP Parameters\n" "Set the OAP client ID for authentication on the GSUP protocol." " This setting only applies if 'auth-policy remote' is used.\n" "OAP client ID (0 == disabled)\n") { /* VTY ensures range */ g_cfg->oap.client_id = (uint16_t)atoi(argv[0]); return CMD_SUCCESS; } DEFUN(cfg_gsup_oap_k, cfg_gsup_oap_k_cmd, "gsup oap-k K", "GSUP Parameters\n" "Set the OAP shared secret key K for authentication on the GSUP protocol." " This setting only applies if auth-policy remote is used.\n" "K value (16 byte) hex\n") { const char *k = argv[0]; g_cfg->oap.secret_k_present = 0; if ((!k) || (strlen(k) == 0)) goto disable; int k_len = osmo_hexparse(k, g_cfg->oap.secret_k, sizeof(g_cfg->oap.secret_k)); if (k_len != 16) { vty_out(vty, "%% need exactly 16 octets for oap-k, got %d.%s", k_len, VTY_NEWLINE); goto disable; } g_cfg->oap.secret_k_present = 1; return CMD_SUCCESS; disable: if (g_cfg->oap.client_id > 0) { vty_out(vty, "%% OAP client ID set, but invalid oap-k value disables OAP.%s", VTY_NEWLINE); return CMD_WARNING; } return CMD_SUCCESS; } DEFUN(cfg_gsup_oap_opc, cfg_gsup_oap_opc_cmd, "gsup oap-opc OPC", "GSUP Parameters\n" "Set the OAP shared secret OPC for authentication on the GSUP protocol." " This setting only applies if auth-policy remote is used.\n" "OPC value (16 byte) hex\n") { const char *opc = argv[0]; g_cfg->oap.secret_opc_present = 0; if ((!opc) || (strlen(opc) == 0)) goto disable; int opc_len = osmo_hexparse(opc, g_cfg->oap.secret_opc, sizeof(g_cfg->oap.secret_opc)); if (opc_len != 16) { vty_out(vty, "%% need exactly 16 octets for oap-opc, got %d.%s", opc_len, VTY_NEWLINE); goto disable; } g_cfg->oap.secret_opc_present = 1; return CMD_SUCCESS; disable: if (g_cfg->oap.client_id > 0) { vty_out(vty, "%% OAP client ID set, but invalid oap-opc value disables OAP.%s", VTY_NEWLINE); return CMD_WARNING; } return CMD_SUCCESS; } DEFUN(cfg_apn_name, cfg_apn_name_cmd, "access-point-name NAME", "Globally allow the given APN name for all subscribers.\n" "Add this NAME to the list\n") { return add_apn_ggsn_mapping(vty, argv[0], "", 0); } DEFUN(cfg_no_apn_name, cfg_no_apn_name_cmd, "no access-point-name NAME", NO_STR "Configure a global list of allowed APNs\n" "Remove entry with NAME\n") { struct apn_ctx *apn_ctx = sgsn_apn_ctx_by_name(argv[0], ""); if (!apn_ctx) return CMD_SUCCESS; sgsn_apn_ctx_free(apn_ctx); return CMD_SUCCESS; } DEFUN(cfg_cdr_filename, cfg_cdr_filename_cmd, "cdr filename NAME", "CDR\n" "Set the file name for the call-data-record file, logging the data usage of each subscriber.\n" "filename\n") { talloc_free(g_cfg->cdr.filename); g_cfg->cdr.filename = talloc_strdup(tall_vty_ctx, argv[0]); return CMD_SUCCESS; } DEFUN(cfg_no_cdr_filename, cfg_no_cdr_filename_cmd, "no cdr filename", NO_STR "CDR\nDisable saving CDR to file\n") { talloc_free(g_cfg->cdr.filename); g_cfg->cdr.filename = NULL; return CMD_SUCCESS; } DEFUN(cfg_cdr_trap, cfg_cdr_trap_cmd, "cdr trap", "CDR\nEnable sending CDR via TRAP CTRL messages\n") { g_cfg->cdr.trap = true; return CMD_SUCCESS; } DEFUN(cfg_no_cdr_trap, cfg_no_cdr_trap_cmd, "no cdr trap", NO_STR "CDR\nDisable sending CDR via TRAP CTRL messages\n") { g_cfg->cdr.trap = false; return CMD_SUCCESS; } DEFUN(cfg_cdr_interval, cfg_cdr_interval_cmd, "cdr interval <1-2147483647>", "CDR\n" "Set the interval for the call-data-record file\n" "interval in seconds\n") { g_cfg->cdr.interval = atoi(argv[0]); return CMD_SUCCESS; } #define COMPRESSION_STR "Configure compression\n" DEFUN(cfg_no_comp_rfc1144, cfg_no_comp_rfc1144_cmd, "no compression rfc1144", NO_STR COMPRESSION_STR "disable rfc1144 TCP/IP header compression\n") { g_cfg->pcomp_rfc1144.active = 0; g_cfg->pcomp_rfc1144.passive = 0; return CMD_SUCCESS; } DEFUN(cfg_comp_rfc1144, cfg_comp_rfc1144_cmd, "compression rfc1144 active slots <1-256>", COMPRESSION_STR "RFC1144 Header compression scheme\n" "Compression is actively proposed\n" "Number of compression state slots\n" "Number of compression state slots\n") { g_cfg->pcomp_rfc1144.active = 1; g_cfg->pcomp_rfc1144.passive = 1; g_cfg->pcomp_rfc1144.s01 = atoi(argv[0]) - 1; return CMD_SUCCESS; } DEFUN(cfg_comp_rfc1144p, cfg_comp_rfc1144p_cmd, "compression rfc1144 passive", COMPRESSION_STR "RFC1144 Header compression scheme\n" "Compression is available on request\n") { g_cfg->pcomp_rfc1144.active = 0; g_cfg->pcomp_rfc1144.passive = 1; return CMD_SUCCESS; } DEFUN(cfg_no_comp_v42bis, cfg_no_comp_v42bis_cmd, "no compression v42bis", NO_STR COMPRESSION_STR "disable V.42bis data compression\n") { g_cfg->dcomp_v42bis.active = 0; g_cfg->dcomp_v42bis.passive = 0; return CMD_SUCCESS; } DEFUN(cfg_comp_v42bis, cfg_comp_v42bis_cmd, "compression v42bis active direction (ms|sgsn|both) codewords <512-65535> strlen <6-250>", COMPRESSION_STR "V.42bis data compression scheme\n" "Compression is actively proposed\n" "Direction in which the compression shall be active (p0)\n" "Compress ms->sgsn direction only\n" "Compress sgsn->ms direction only\n" "Both directions\n" "Number of codewords (p1)\n" "Number of codewords\n" "Maximum string length (p2)\n" "Maximum string length\n") { g_cfg->dcomp_v42bis.active = 1; g_cfg->dcomp_v42bis.passive = 1; switch (argv[0][0]) { case 'm': g_cfg->dcomp_v42bis.p0 = 1; break; case 's': g_cfg->dcomp_v42bis.p0 = 2; break; case 'b': g_cfg->dcomp_v42bis.p0 = 3; break; } g_cfg->dcomp_v42bis.p1 = atoi(argv[1]); g_cfg->dcomp_v42bis.p2 = atoi(argv[2]); return CMD_SUCCESS; } DEFUN(cfg_comp_v42bisp, cfg_comp_v42bisp_cmd, "compression v42bis passive", COMPRESSION_STR "V.42bis data compression scheme\n" "Compression is available on request\n") { g_cfg->dcomp_v42bis.active = 0; g_cfg->dcomp_v42bis.passive = 1; return CMD_SUCCESS; } #if BUILD_IU DEFUN(cfg_sgsn_cs7_instance_iu, cfg_sgsn_cs7_instance_iu_cmd, "cs7-instance-iu <0-15>", "Set SS7 to be used by the Iu-Interface.\n" "SS7 instance reference number (default: 0)\n") { g_cfg->iu.cs7_instance = atoi(argv[0]); return CMD_SUCCESS; } #endif DEFUN(cfg_sgsn_mme, cfg_sgsn_mme_cmd, "mme NAME", "Configure an MME peer\n" "Name identifying the MME peer\n") { struct sgsn_mme_ctx *mme; mme = sgsn_mme_ctx_find_alloc(sgsn, argv[0]); if (!mme) return CMD_WARNING; vty->node = MME_NODE; vty->index = mme; return CMD_SUCCESS; } DEFUN(cfg_sgsn_no_mme, cfg_sgsn_no_mme_cmd, "no mme NAME", NO_STR "Delete an MME peer configuration\n" "Name identifying the MME peer\n") { struct sgsn_mme_ctx *mme; mme = sgsn_mme_ctx_by_name(sgsn, argv[0]); if (!mme) { vty_out(vty, "%% MME %s doesn't exist.%s", argv[0], VTY_NEWLINE); return CMD_WARNING; } sgsn_mme_ctx_free(mme); return CMD_SUCCESS; } #define GTP_STR "Configure GTP connection\n" DEFUN(cfg_mme_remote_ip, cfg_mme_remote_ip_cmd, "gtp remote-ip A.B.C.D", GTP_STR "Set Remote GTP IP address\n" IP_STR) { struct sgsn_mme_ctx *mme = (struct sgsn_mme_ctx *) vty->index; inet_aton(argv[0], &mme->remote_addr); return CMD_SUCCESS; } #define RAN_INFO_STR "Configure RAN Information Relay routing\n" #define TAI_DOC "MCC\n" "MNC\n" "TAC\n" DEFUN(cfg_mme_ran_info_relay_tai, cfg_mme_ran_info_relay_tai_cmd, "gtp ran-info-relay <0-999> <0-999> <0-65535>", GTP_STR RAN_INFO_STR TAI_DOC) { struct sgsn_mme_ctx *mme = (struct sgsn_mme_ctx *) vty->index; struct sgsn_mme_ctx *mme_tmp; struct osmo_eutran_tai tai; const char *mcc = argv[0]; const char *mnc = argv[1]; const char *tac = argv[2]; if (osmo_mcc_from_str(mcc, &tai.mcc)) { vty_out(vty, "%% Error decoding MCC: %s%s", mcc, VTY_NEWLINE); return CMD_WARNING; } if (osmo_mnc_from_str(mnc, &tai.mnc, &tai.mnc_3_digits)) { vty_out(vty, "%% Error decoding MNC: %s%s", mnc, VTY_NEWLINE); return CMD_WARNING; } tai.tac = atoi(tac); if ((mme_tmp = sgsn_mme_ctx_by_route(sgsn, &tai))) { if (mme_tmp != mme) { vty_out(vty, "%% Another MME %s already contains this route%s", mme_tmp->name, VTY_NEWLINE); return CMD_WARNING; } /* else: NO-OP, return */ return CMD_SUCCESS; } sgsn_mme_ctx_route_add(mme, &tai); return CMD_SUCCESS; } DEFUN(cfg_mme_no_ran_info_relay_tai, cfg_mme_no_ran_info_relay_tai_cmd, "no gtp ran-info-relay <0-999> <0-999> <0-65535>", NO_STR GTP_STR RAN_INFO_STR TAI_DOC) { struct sgsn_mme_ctx *mme = (struct sgsn_mme_ctx *) vty->index; struct sgsn_mme_ctx *mme_tmp; struct osmo_eutran_tai tai; const char *mcc = argv[0]; const char *mnc = argv[1]; const char *tac = argv[2]; if (osmo_mcc_from_str(mcc, &tai.mcc)) { vty_out(vty, "%% Error decoding MCC: %s%s", mcc, VTY_NEWLINE); return CMD_WARNING; } if (osmo_mnc_from_str(mnc, &tai.mnc, &tai.mnc_3_digits)) { vty_out(vty, "%% Error decoding MNC: %s%s", mnc, VTY_NEWLINE); return CMD_WARNING; } tai.tac = atoi(tac); if ((mme_tmp = sgsn_mme_ctx_by_route(sgsn, &tai))) { if (mme_tmp != mme) { vty_out(vty, "%% Another MME %s contains this route%s", mme_tmp->name, VTY_NEWLINE); return CMD_WARNING; } sgsn_mme_ctx_route_del(mme, &tai); return CMD_SUCCESS; } else { vty_out(vty, "%% This route doesn't exist in current MME %s%s", mme->name, VTY_NEWLINE); return CMD_WARNING; } } DEFUN(cfg_mme_ran_info_relay_default, cfg_mme_ran_info_relay_default_cmd, "gtp ran-info-relay default", GTP_STR RAN_INFO_STR "Set as default route") { struct sgsn_mme_ctx *mme = (struct sgsn_mme_ctx *) vty->index; struct sgsn_mme_ctx *default_mme; if (mme->default_route) return CMD_SUCCESS; /* NO-OP */ if ((default_mme = sgsn_mme_ctx_by_default_route(sgsn))) { vty_out(vty, "%% Another MME %s is already set as default route, " "remove it before setting it here.%s", default_mme->name, VTY_NEWLINE); return CMD_WARNING; } mme->default_route = true; return CMD_SUCCESS; } DEFUN(cfg_mme_no_ran_info_relay_default, cfg_mme_no_ran_info_relay_default_cmd, "no gtp ran-info-relay default", NO_STR GTP_STR RAN_INFO_STR "Set as default route") { struct sgsn_mme_ctx *mme = (struct sgsn_mme_ctx *) vty->index; mme->default_route = false; return CMD_SUCCESS; } int sgsn_vty_init(struct sgsn_config *cfg) { g_cfg = cfg; install_element_ve(&show_sgsn_cmd); //install_element_ve(&show_mmctx_tlli_cmd); install_element_ve(&show_mmctx_imsi_cmd); install_element_ve(&show_mmctx_all_cmd); install_element_ve(&show_pdpctx_all_cmd); install_element_ve(&show_subscr_cache_cmd); install_element_ve(&show_timer_cmd); install_element_ve(&show_timer_gtp_cmd); install_element(ENABLE_NODE, &update_subscr_insert_auth_triplet_cmd); install_element(ENABLE_NODE, &update_subscr_create_cmd); install_element(ENABLE_NODE, &update_subscr_destroy_cmd); install_element(ENABLE_NODE, &update_subscr_cancel_cmd); install_element(ENABLE_NODE, &update_subscr_update_location_result_cmd); install_element(ENABLE_NODE, &update_subscr_update_auth_info_cmd); install_element(ENABLE_NODE, &page_subscr_info_cmd); install_element(ENABLE_NODE, &reset_sgsn_state_cmd); install_element(CONFIG_NODE, &cfg_sgsn_cmd); install_node(&sgsn_node, config_write_sgsn); install_element(SGSN_NODE, &cfg_sgsn_state_dir_cmd); install_element(SGSN_NODE, &cfg_sgsn_bind_addr_cmd); install_element(SGSN_NODE, &cfg_ggsn_remote_ip_cmd); //install_element(SGSN_NODE, &cfg_ggsn_remote_port_cmd); install_element(SGSN_NODE, &cfg_ggsn_gtp_version_cmd); install_element(SGSN_NODE, &cfg_ggsn_echo_interval_cmd); install_element(SGSN_NODE, &cfg_ggsn_no_echo_interval_cmd); install_element(SGSN_NODE, &cfg_imsi_acl_cmd); install_element(SGSN_NODE, &cfg_auth_policy_cmd); install_element(SGSN_NODE, &cfg_authentication_cmd); /* order matters here: ensure we attempt to parse our new command first! */ install_element(SGSN_NODE, &cfg_encrypt2_cmd); install_element(SGSN_NODE, &cfg_encrypt_cmd); install_element(SGSN_NODE, &cfg_encryption_uea_cmd); install_element(SGSN_NODE, &cfg_encrypt_cipher_plugin_path_cmd); install_element(SGSN_NODE, &cfg_no_encrypt_cipher_plugin_path_cmd); install_element(SGSN_NODE, &cfg_gsup_ipa_name_cmd); install_element(SGSN_NODE, &cfg_gsup_remote_ip_cmd); install_element(SGSN_NODE, &cfg_gsup_remote_port_cmd); install_element(SGSN_NODE, &cfg_gsup_oap_id_cmd); install_element(SGSN_NODE, &cfg_gsup_oap_k_cmd); install_element(SGSN_NODE, &cfg_gsup_oap_opc_cmd); install_element(SGSN_NODE, &cfg_apn_ggsn_cmd); install_element(SGSN_NODE, &cfg_apn_imsi_ggsn_cmd); install_element(SGSN_NODE, &cfg_apn_name_cmd); install_element(SGSN_NODE, &cfg_no_apn_name_cmd); install_element(SGSN_NODE, &cfg_cdr_filename_cmd); install_element(SGSN_NODE, &cfg_no_cdr_filename_cmd); install_element(SGSN_NODE, &cfg_cdr_trap_cmd); install_element(SGSN_NODE, &cfg_no_cdr_trap_cmd); install_element(SGSN_NODE, &cfg_cdr_interval_cmd); install_element(SGSN_NODE, &cfg_ggsn_dynamic_lookup_cmd); install_element(SGSN_NODE, &cfg_grx_ggsn_cmd); install_element(SGSN_NODE, &cfg_sgsn_timer_cmd); install_element(SGSN_NODE, &cfg_sgsn_timer_gtp_cmd); install_element(SGSN_NODE, &cfg_no_comp_rfc1144_cmd); install_element(SGSN_NODE, &cfg_comp_rfc1144_cmd); install_element(SGSN_NODE, &cfg_comp_rfc1144p_cmd); install_element(SGSN_NODE, &cfg_no_comp_v42bis_cmd); install_element(SGSN_NODE, &cfg_comp_v42bis_cmd); install_element(SGSN_NODE, &cfg_comp_v42bisp_cmd); install_element(SGSN_NODE, &cfg_sgsn_mme_cmd); install_element(SGSN_NODE, &cfg_sgsn_no_mme_cmd); install_node(&mme_node, NULL); install_element(MME_NODE, &cfg_mme_remote_ip_cmd); install_element(MME_NODE, &cfg_mme_ran_info_relay_default_cmd); install_element(MME_NODE, &cfg_mme_no_ran_info_relay_default_cmd); install_element(MME_NODE, &cfg_mme_ran_info_relay_tai_cmd); install_element(MME_NODE, &cfg_mme_no_ran_info_relay_tai_cmd); #ifdef BUILD_IU install_element(SGSN_NODE, &cfg_sgsn_cs7_instance_iu_cmd); ranap_iu_vty_init(SGSN_NODE, &g_cfg->iu.rab_assign_addr_enc); #endif return 0; } int sgsn_parse_config(const char *config_file) { int rc; /* make sure sgsn_vty_init() was called before this */ OSMO_ASSERT(g_cfg); rc = vty_read_config_file(config_file, NULL); if (rc < 0) { fprintf(stderr, "Failed to parse the config file: '%s'\n", config_file); return rc; } if (g_cfg->auth_policy == SGSN_AUTH_POLICY_REMOTE && !(g_cfg->gsup_server_addr.sin_addr.s_addr && g_cfg->gsup_server_port)) { fprintf(stderr, "Configuration error:" " 'auth-policy remote' requires both" " 'gsup remote-ip' and 'gsup remote-port'\n"); return -EINVAL; } return 0; }