If you misconfigure freeradius you can expect a crash. however there is
a misconfiguration in the default dictionary.ascend but you can bypass
it if you "vi /usr/share/freeradius/dictionary" 
...
#$INCLUDE dictionary.ascend #commented out


# ./radius4a.py 128.165.47.2 32998 215 2 1
Running radius-attributes memory leak test version 1.1
Running test 1
Running test 2
Running test 3
Running test 4
Running test 5
Running test 6
------------------------------------------------------------------
radiusd -X
...
Module: Instantiated detail (reply_log) 
Listening on authentication *:32998
Listening on accounting *:32999
Ready to process requests.
rad_recv: Access-Request packet from host 128.165.47.2:43858, id=10,
length=22
        Attr-215 = 0x
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 0
  modcall[authorize]: module "preprocess" returns ok for request 0
radius_xlat: 
'/var/local/radius/accounting/128.165.47.2/auth-detail-20040826'
rlm_detail:
/var/local/radius/accounting/%{Client-IP-Address}/auth-detail-%Y%m%d
expands to
/var/local/radius/accounting/128.165.47.2/auth-detail-20040826
  modcall[authorize]: module "auth_log" returns ok for request 0
modcall: entering group group for request 0
modcall: entering group redundant for request 0
rlm_ldap: - authorize
rlm_ldap: Attribute "User-Name" is required for authentication. 
  modcall[authorize]: module "uid_entry" returns invalid for request 0
modcall: group redundant returns invalid for request 0
modcall: group group returns invalid for request 0
modcall: group authorize returns invalid for request 0
Invalid user: [<no User-Name attribute>] (from client auth1.ds.lanl.gov
port 0)
Delaying request 0 for 1 seconds
Finished request 0
Going to the next request
--- Walking the entire request list ---
Waking up in 1 seconds...
rad_recv: Access-Accept packet from host 128.165.47.2:43858, id=10,
length=22
Authentication reply packet code 2 sent to a non-proxy reply port from
client auth1.ds.lanl.gov:43858 - ID 10 : IGNORED
Waking up in 1 seconds...
rad_recv: Access-Reject packet from host 128.165.47.2:43858, id=10,
length=22
Authentication reply packet code 3 sent to a non-proxy reply port from
client auth1.ds.lanl.gov:43858 - ID 10 : IGNORED
Waking up in 1 seconds...
rad_recv: Accounting-Request packet from host 128.165.47.2:43858, id=10,
length=22
Accounting-Request packet sent to a non-accounting port from client
auth1.ds.lanl.gov:43858 - ID 10 : IGNORED
Waking up in 1 seconds...
rad_recv: Accounting-Response packet from host 128.165.47.2:43858,
id=10, length=22
Accounting reply packet code 5 sent to a non-proxy reply port from
client auth1.ds.lanl.gov:43858 - ID 10 : IGNORED
Waking up in 1 seconds...
rad_recv: Access-Challenge packet from host 128.165.47.2:43858, id=10,
length=22
Authentication reply packet code 11 sent to a non-proxy reply port from
client auth1.ds.lanl.gov:43858 - ID 10 : IGNORED
Waking up in 1 seconds...
--- Walking the entire request list ---
Waking up in 1 seconds...
--- Walking the entire request list ---
Sending Access-Reject of id 10 to 128.165.47.2:43858
Waking up in 4 seconds...
--- Walking the entire request list ---
Cleaning up request 0 ID 10 with timestamp 412e40fb
Nothing to do.  Sleeping until we see a request.



On Tue, 2004-08-24 at 05:05, Evgeny Demidov wrote:
> Hello,
> 
> We are proud to announce the release of the VulnDisco 
> RADIUS protocol
> testsuite to the public.
> 
> This testsuite is a part of VulnDisco testsuite, which is 
> available to
> VulnDisco clients.
> 
> The purpose of this testsuite is to evaluate RADIUS 
> protocol implementations from the security point of view.
> 
> VulnDisco RAIDIUS testsuite written in Python and licensed 
> under GPL.
> 
> Among other things this release contains a few remotes, 
> see README.txt for more information.
> 
> The testsuite is available here: 
> http://www.gleg.net/security_radius_testsuite.shtml
> 
> Best regards
> -Evgeny Demidov


- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to