* RFC 4675:
* "RADIUS Attributes for Virtual LAN and Priority Support"
*
+ * RFC 5176:
+ * "Dynamic Authorization Extensions to RADIUS"
+ *
*
* TODO: Among other things to print ok MacIntosh and Vendor values
#define RADCMD_ACCESS_CHA 11 /* Access-Challenge */
#define RADCMD_STATUS_SER 12 /* Status-Server */
#define RADCMD_STATUS_CLI 13 /* Status-Client */
+#define RADCMD_DISCON_REQ 40 /* Disconnect-Request */
+#define RADCMD_DISCON_ACK 41 /* Disconnect-ACK */
+#define RADCMD_DISCON_NAK 42 /* Disconnect-NAK */
+#define RADCMD_COA_REQ 43 /* CoA-Request */
+#define RADCMD_COA_ACK 44 /* CoA-ACK */
+#define RADCMD_COA_NAK 45 /* CoA-NAK */
#define RADCMD_RESERVED 255 /* Reserved */
static const struct tok radius_command_values[] = {
{ RADCMD_ACCESS_CHA, "Access Challenge" },
{ RADCMD_STATUS_SER, "Status Server" },
{ RADCMD_STATUS_CLI, "Status Client" },
+ { RADCMD_DISCON_REQ, "Disconnect Request" },
+ { RADCMD_DISCON_ACK, "Disconnect ACK" },
+ { RADCMD_DISCON_NAK, "Disconnect NAK" },
+ { RADCMD_COA_REQ, "Change of Authorization Request" },
+ { RADCMD_COA_ACK, "Change of Authorization ACK" },
+ { RADCMD_COA_NAK, "Change of Authorization NAK" },
{ RADCMD_RESERVED, "Reserved" },
{ 0, NULL}
};
else if (ISPORT(RADIUS_PORT) ||
ISPORT(RADIUS_NEW_PORT) ||
ISPORT(RADIUS_ACCOUNTING_PORT) ||
- ISPORT(RADIUS_NEW_ACCOUNTING_PORT) )
+ ISPORT(RADIUS_NEW_ACCOUNTING_PORT) ||
+ ISPORT(RADIUS_COA_PORT) )
radius_print(ndo, (const u_char *)(up+1), length);
else if (dport == HSRP_PORT)
hsrp_print(ndo, (const u_char *)(up + 1), length);
--- /dev/null
+IP (tos 0x0, ttl 4, id 29161, offset 0, flags [none], proto UDP (17), length 66)
+ 10.0.0.10.12345 > 10.0.0.1.3799: RADIUS, length: 38
+ Disconnect Request (40), id: 0x01, Authenticator: e1792d2b4ab349f1a4c0fcc733d091c1
+ Message Authentication Attribute (80), length: 18, Value: XQ=f(G..sJ0.....
+IP (tos 0x0, ttl 4, id 18682, offset 0, flags [none], proto UDP (17), length 66)
+ 10.0.0.1.3799 > 10.0.0.10.12345: RADIUS, length: 38
+ Disconnect ACK (41), id: 0x02, Authenticator: 3bc9c343f689990756b96c583a56890a
+ Message Authentication Attribute (80), length: 18, Value: .O........iC,'}.
+IP (tos 0x0, ttl 4, id 22542, offset 0, flags [none], proto UDP (17), length 66)
+ 10.0.0.1.3799 > 10.0.0.10.12345: RADIUS, length: 38
+ Disconnect NAK (42), id: 0x03, Authenticator: d867c308c9c43112b3a669a0e8c0ab8c
+ Message Authentication Attribute (80), length: 18, Value: ...p.I...(."....
+IP (tos 0x0, ttl 4, id 16413, offset 0, flags [none], proto UDP (17), length 66)
+ 10.0.0.10.12345 > 10.0.0.1.3799: RADIUS, length: 38
+ Change of Authorization Request (43), id: 0x04, Authenticator: 5f18309be67cd6150fe4c3a0b93536c9
+ Message Authentication Attribute (80), length: 18, Value: '..6|.F..._...[.
+IP (tos 0x0, ttl 4, id 170, offset 0, flags [none], proto UDP (17), length 66)
+ 10.0.0.1.3799 > 10.0.0.10.12345: RADIUS, length: 38
+ Change of Authorization ACK (44), id: 0x05, Authenticator: 55ab6cb78aa161d692753fa9130c5019
+ Message Authentication Attribute (80), length: 18, Value: .........+.x...s
+IP (tos 0x0, ttl 4, id 29645, offset 0, flags [none], proto UDP (17), length 66)
+ 10.0.0.1.3799 > 10.0.0.10.12345: RADIUS, length: 38
+ Change of Authorization NAK (45), id: 0x06, Authenticator: 40f21bdee27a87a5d757a30bfed62f28
+ Message Authentication Attribute (80), length: 18, Value: .%y.....x...&j..