Hello,

I have a strange problem since I updated my freeradius from 1.x to 2.x, from a simple rpm update. It binds to random ports !

Here is the dump of radiusd -X :

------------------------------------
FreeRADIUS Version 2.0.2, for host i386-redhat-linux-gnu, built on Mar 18 2008 at 13:16:44
Copyright (C) 1999-2008 The FreeRADIUS server project and contributors.
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
PARTICULAR PURPOSE.
You may redistribute copies of FreeRADIUS under the terms of the
GNU General Public License.
Starting - reading configuration files ...
including configuration file /etc/raddb//radiusd.conf
including configuration file /etc/raddb//clients.conf
including configuration file /etc/raddb//snmp.conf
including configuration file /etc/raddb//eap.conf
including configuration file /etc/raddb//sql.conf
including configuration file /etc/raddb//sql/mysql/dialup.conf
including configuration file /etc/raddb//sql/mysql/counter.conf
including configuration file /etc/raddb//policy.conf
including files in directory /etc/raddb//sites-enabled/
including configuration file /etc/raddb//sites-enabled/default
including dictionary file /etc/raddb//dictionary
main {
       prefix = "/usr"
       localstatedir = "/var"
       logdir = "/var/log/radius"
       libdir = "/usr/lib/freeradius"
       radacctdir = "/var/log/radius/radacct"
       hostname_lookups = no
       max_request_time = 30
       cleanup_delay = 5
       max_requests = 1024
       allow_core_dumps = no
       pidfile = "/var/run/radiusd/radiusd.pid"
       user = "radiusd"
       group = "radiusd"
       checkrad = "/usr/sbin/checkrad"
       debug_level = 0
       proxy_requests = no
security {
       max_attributes = 200
       reject_delay = 1
       status_server = yes
}
}
client localhost {
       ipaddr = 127.0.0.1
       require_message_authenticator = no
       secret = "radiusbouffard"
       nastype = "other"
}
client 192.168.0.0/16 {
       require_message_authenticator = no
       secret = "radiusbouffard"
       shortname = "wifigates"
}
radiusd: #### Loading Realms and Home Servers ####
radiusd: #### Instantiating modules ####
instantiate {
Module: Linked to module rlm_exec
Module: Instantiating exec
 exec {
       wait = yes
       input_pairs = "request"
       shell_escape = yes
 }
Module: Linked to module rlm_expr
Module: Instantiating expr
Module: Linked to module rlm_expiration
Module: Instantiating expiration
 expiration {
       reply-message = "Password Has Expired  "
 }
Module: Linked to module rlm_logintime
Module: Instantiating logintime
 logintime {
       reply-message = "You are calling outside your allowed timespan  "
       minimum-timeout = 60
 }
}
radiusd: #### Loading Virtual Servers ####
server {
modules {
Module: Checking authenticate {...} for more modules to load
Module: Linked to module rlm_pap
Module: Instantiating pap
 pap {
       encryption_scheme = "auto"
       auto_header = no
 }
Module: Linked to module rlm_chap
Module: Instantiating chap
Module: Linked to module rlm_mschap
Module: Instantiating mschap
 mschap {
       use_mppe = yes
       require_encryption = no
       require_strong = no
       with_ntdomain_hack = no
 }
Module: Linked to module rlm_unix
Module: Instantiating unix
 unix {
       radwtmp = "/var/log/radius/radwtmp"
 }
Module: Linked to module rlm_eap
Module: Instantiating eap
 eap {
       default_eap_type = "md5"
       timer_expire = 60
       ignore_unknown_eap_types = no
       cisco_accounting_username_bug = no
 }
Module: Linked to sub-module rlm_eap_md5
Module: Instantiating eap-md5
Module: Linked to sub-module rlm_eap_leap
Module: Instantiating eap-leap
Module: Linked to sub-module rlm_eap_gtc
Module: Instantiating eap-gtc
  gtc {
       challenge = "Password: "
       auth_type = "PAP"
  }
Module: Linked to sub-module rlm_eap_tls
Module: Instantiating eap-tls
  tls {
       rsa_key_exchange = no
       dh_key_exchange = yes
       rsa_key_length = 512
       dh_key_length = 512
       verify_depth = 0
       pem_file_type = yes
       private_key_file = "/etc/raddb//certs/server.pem"
       certificate_file = "/etc/raddb//certs/server.pem"
       CA_file = "/etc/raddb//certs/ca.pem"
       private_key_password = "whatever"
       dh_file = "/etc/raddb//certs/dh"
       random_file = "/etc/raddb//certs/random"
       fragment_size = 1024
       include_length = yes
       check_crl = no
       cipher_list = "DEFAULT"
       make_cert_command = "/etc/raddb//certs/bootstrap"
  }
Module: Linked to sub-module rlm_eap_ttls
Module: Instantiating eap-ttls
  ttls {
       default_eap_type = "md5"
       copy_request_to_tunnel = no
       use_tunneled_reply = no
  }
Module: Linked to sub-module rlm_eap_peap
Module: Instantiating eap-peap
  peap {
       default_eap_type = "mschapv2"
       copy_request_to_tunnel = no
       use_tunneled_reply = no
       proxy_tunneled_request_as_eap = yes
  }
Module: Linked to sub-module rlm_eap_mschapv2
Module: Instantiating eap-mschapv2
  mschapv2 {
       with_ntdomain_hack = no
  }
Module: Checking authorize {...} for more modules to load
Module: Linked to module rlm_preprocess
Module: Instantiating preprocess
 preprocess {
       huntgroups = "/etc/raddb//huntgroups"
       hints = "/etc/raddb//hints"
       with_ascend_hack = no
       ascend_channels_per_line = 23
       with_ntdomain_hack = no
       with_specialix_jetstream_hack = no
       with_cisco_vsa_hack = no
       with_alvarion_vsa_hack = no
 }
Module: Linked to module rlm_realm
Module: Instantiating suffix
 realm suffix {
       format = "suffix"
       delimiter = "@"
       ignore_default = no
       ignore_null = no
 }
Module: Linked to module rlm_files
Module: Instantiating files
 files {
       usersfile = "/etc/raddb//users"
       acctusersfile = "/etc/raddb//acct_users"
       preproxy_usersfile = "/etc/raddb//preproxy_users"
       compat = "no"
 }
Module: Checking preacct {...} for more modules to load
Module: Linked to module rlm_acct_unique
Module: Instantiating acct_unique
 acct_unique {
key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port"
 }
Module: Checking accounting {...} for more modules to load
Module: Linked to module rlm_detail
Module: Instantiating detail
 detail {
detailfile = "/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d"
       header = "%t"
       detailperm = 384
       dirperm = 493
       locking = no
       log_packet_header = no
 }
Module: Linked to module rlm_radutmp
Module: Instantiating radutmp
 radutmp {
       filename = "/var/log/radius/radutmp"
       username = "%{User-Name}"
       case_sensitive = yes
       check_with_nas = yes
       perm = 384
       callerid = yes
 }
Module: Linked to module rlm_attr_filter
Module: Instantiating attr_filter.accounting_response
 attr_filter attr_filter.accounting_response {
       attrsfile = "/etc/raddb//attrs.accounting_response"
       key = "%{User-Name}"
 }
Module: Checking session {...} for more modules to load
Module: Checking post-proxy {...} for more modules to load
Module: Checking post-auth {...} for more modules to load
Module: Instantiating attr_filter.access_reject
 attr_filter attr_filter.access_reject {
       attrsfile = "/etc/raddb//attrs.access_reject"
       key = "%{User-Name}"
 }
}
}
radiusd: #### Opening IP addresses and Ports ####
listen {
       type = "auth"
       ipaddr = *
       port = 0
}
listen {
       type = "acct"
       ipaddr = *
       port = 0
}
main {
       snmp = no
       smux_password = ""
       snmp_write_access = no
}
Listening on authentication address * port 45632
Listening on accounting address * port 36936
Ready to process requests.

------------------------------------

I don't really understand why it does that. I checked if there wasn't any other program that would have listened on 1812 before radius.

Do you have an idea ?

   Thanks in advance,

      Hoggins!
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to