Title: Re: FreeRADIUS + DHCP config

Здравствуйте, Ale.


Вы писали 11 января 2010 г., 18:51:30:


>

Hello to all.... 


I'm new in linux & RADIUS,  first I configure a FreeRADIUS 2.1.7 in the most basic way  and it runs very well but now I'm trying to configure a FreeRADIUS 2.1.8 with DHCP server and I need somebody to point me in the right direction to configure it... the steps I took to configure were 


r...@servidor1-desktop:/home/servidor1/Desktop/freeradius-server-2.1.8# ./configure --with-dhcp 

r...@servidor1-desktop:/home/servidor1/Desktop/freeradius-server-2.1.8# make 

r...@servidor1-desktop:/home/servidor1/Desktop/freeradius-server-2.1.8# vi share/dictionary 


Un-comment the line containing $INCLUDE dictionary.dhcp 

# The Cisco VPN300 dictionary is the same as the altiga one. 

# You shouldn't use both at the same time. 

#$INCLUDE dictionary.cisco.vpn3000 

$INCLUDE dictionary.cisco.vpn5000 

$INCLUDE dictionary.cisco.bbsm 

$INCLUDE dictionary.clavister 

$INCLUDE dictionary.colubris 

$INCLUDE dictionary.cosine 

$INCLUDE dictionary.dhcp 

$INCLUDE dictionary.digium 

$INCLUDE dictionary.epygi 

$INCLUDE dictionary.erx 

$INCLUDE dictionary.ericsson 

$INCLUDE dictionary.extreme 

$INCLUDE dictionary.freeradius 

$INCLUDE dictionary.freeswitch 

$INCLUDE dictionary.fortinet 

$INCLUDE dictionary.foundry 

$INCLUDE dictionary.gandalf 

$INCLUDE dictionary.gemtek 

$INCLUDE dictionary.h3c 




save the file. 

$INCLUDE dictionary.colubris 

$INCLUDE dictionary.cosine 

$INCLUDE dictionary.dhcp 

$INCLUDE dictionary.digium 

$INCLUDE dictionary.epygi 

$INCLUDE dictionary.erx 

$INCLUDE dictionary.ericsson 

$INCLUDE dictionary.extreme 

$INCLUDE dictionary.freeradius 

$INCLUDE dictionary.freeswitch 

$INCLUDE dictionary.fortinet 

$INCLUDE dictionary.foundry 

$INCLUDE dictionary.gandalf 

$INCLUDE dictionary.gemtek 

$INCLUDE dictionary.h3c 

:w 


r...@servidor1-desktop:/home/servidor1/Desktop/freeradius-server-2.1.8# make install 





But when I run my radiusd -X I have the following output 



************************************************************************************************** 


r...@servidor1-desktop:/usr/local/etc/raddb# radiusd -X 

FreeRADIUS Version 2.1.8, for host i686-pc-linux-gnu, built on Jan 8 2010 at 16:50:59 

Copyright (C) 1999-2009 The FreeRADIUS server project and contributors. 

There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A 

PARTICULAR PURPOSE. 

You may redistribute copies of FreeRADIUS under the terms of the 

GNU General Public License v2. 

Starting - reading configuration files ... 

including configuration file /usr/local/etc/raddb/radiusd.conf 

including configuration file /usr/local/etc/raddb/proxy.conf 

including configuration file /usr/local/etc/raddb/clients.conf 

including files in directory /usr/local/etc/raddb/modules/ 

including configuration file /usr/local/etc/raddb/modules/ldap 

including configuration file /usr/local/etc/raddb/modules/unix 

including configuration file /usr/local/etc/raddb/modules/digest 

including configuration file /usr/local/etc/raddb/modules/ippool 

including configuration file /usr/local/etc/raddb/modules/echo 

including configuration file /usr/local/etc/raddb/modules/expiration 

including configuration file /usr/local/etc/raddb/modules/acct_unique 

including configuration file /usr/local/etc/raddb/modules/linelog 

including configuration file /usr/local/etc/raddb/modules/krb5 

including configuration file /usr/local/etc/raddb/modules/expr 

including configuration file /usr/local/etc/raddb/modules/sql_log 

including configuration file /usr/local/etc/raddb/modules/otp 

including configuration file /usr/local/etc/raddb/modules/preprocess 

including configuration file /usr/local/etc/raddb/modules/detail.example.com 

including configuration file /usr/local/etc/raddb/modules/files 

including configuration file /usr/local/etc/raddb/modules/inner-eap 

including configuration file /usr/local/etc/raddb/modules/attr_rewrite 

including configuration file /usr/local/etc/raddb/modules/BACK.ippool 

including configuration file /usr/local/etc/raddb/modules/attr_filter 

including configuration file /usr/local/etc/raddb/modules/sqlcounter_expire_on_login 

including configuration file /usr/local/etc/raddb/modules/cui 

including configuration file /usr/local/etc/raddb/modules/pam 

including configuration file /usr/local/etc/raddb/modules/detail.log 

including configuration file /usr/local/etc/raddb/modules/radutmp 

including configuration file /usr/local/etc/raddb/modules/smsotp 

including configuration file /usr/local/etc/raddb/modules/pap 

including configuration file /usr/local/etc/raddb/modules/passwd 

including configuration file /usr/local/etc/raddb/modules/etc_group 

including configuration file /usr/local/etc/raddb/modules/policy 

including configuration file /usr/local/etc/raddb/modules/mschap 

including configuration file /usr/local/etc/raddb/modules/exec 

including configuration file /usr/local/etc/raddb/modules/counter 

including configuration file /usr/local/etc/raddb/modules/sradutmp 

including configuration file /usr/local/etc/raddb/modules/smbpasswd 

including configuration file /usr/local/etc/raddb/modules/mac2vlan 

including configuration file /usr/local/etc/raddb/modules/mac2ip 

including configuration file /usr/local/etc/raddb/modules/detail 

including configuration file /usr/local/etc/raddb/modules/logintime 

including configuration file /usr/local/etc/raddb/modules/realm 

including configuration file /usr/local/etc/raddb/modules/chap 

including configuration file /usr/local/etc/raddb/modules/ntlm_auth 

including configuration file /usr/local/etc/raddb/modules/wimax 

including configuration file /usr/local/etc/raddb/modules/perl 

including configuration file /usr/local/etc/raddb/modules/always 

including configuration file /usr/local/etc/raddb/modules/checkval 

including configuration file /usr/local/etc/raddb/eap.conf 

including configuration file /usr/local/etc/raddb/policy.conf 

including files in directory /usr/local/etc/raddb/sites-enabled/ 

including configuration file /usr/local/etc/raddb/sites-enabled/default 

including configuration file /usr/local/etc/raddb/sites-enabled/control-socket 

including configuration file /usr/local/etc/raddb/sites-enabled/inner-tunnel 

main { 

allow_core_dumps = no 

including dictionary file /usr/local/etc/raddb/dictionary 

main { 

prefix = "/usr/local" 

localstatedir = "/usr/local/var" 

logdir = "/usr/local/var/log/radius" 

libdir = "/usr/local/lib" 

radacctdir = "/usr/local/var/log/radius/radacct" 

hostname_lookups = no 

max_request_time = 30 

cleanup_delay = 5 

max_requests = 1024 

pidfile = "/usr/local/var/run/radiusd/radiusd.pid" 

checkrad = "/usr/local/sbin/checkrad" 

debug_level = 0 

proxy_requests = yes 

log { 

stripped_names = no 

auth = no 

auth_badpass = no 

auth_goodpass = no 

security { 

max_attributes = 200 

reject_delay = 1 

status_server = yes 

radiusd: #### Loading Realms and Home Servers #### 

proxy server { 

retry_delay = 5 

retry_count = 3 

default_fallback = no 

dead_time = 120 

wake_all_if_all_dead = no 

home_server localhost { 

ipaddr = 127.0.0.1 

port = 1812 

type = "auth" 

secret = "testing123" 

response_window = 20 

max_outstanding = 65536 

require_message_authenticator = no 

zombie_period = 40 

status_check = "status-server" 

ping_interval = 30 

check_interval = 30 

check_interval = 30 

num_answers_to_alive = 3 

num_pings_to_alive = 3 

revive_interval = 120 

status_check_timeout = 4 

irt = 2 

mrt = 16 

mrc = 5 

mrd = 30 

home_server_pool my_auth_failover { 

type = fail-over 

home_server = localhost 

realm example.com { 

auth_pool = my_auth_failover 

realm LOCAL { 

radiusd: #### Loading Clients #### 

client localhost { 

ipaddr = 127.0.0.1 

require_message_authenticator = no 

secret = "testing123" 

nastype = "other" 

client 192.168.1.10 { 

require_message_authenticator = no 

secret = "miaccesspoint" 

shortname = "TP-Link" 

client 192.168.1.245 { 

require_message_authenticator = no 

secret = "miaccesspoint" 

shortname = "Linksys" 

radiusd: #### Instantiating modules #### 

instantiate { 

Module: Linked to module rlm_exec 

Module: Instantiating exec 

exec { 

wait = no 

input_pairs = "request" 

shell_escape = yes 

Module: Linked to module rlm_expr 

Module: Instantiating expr 

Module: Linked to module rlm_expiration 

Module: Instantiating expiration 

expiration { 

reply-message = "Password Has Expired " 

Module: Linked to module rlm_logintime 

Module: Instantiating logintime 

logintime { 

reply-message = "You are calling outside your allowed timespan " 

minimum-timeout = 60 

radiusd: #### Loading Virtual Servers #### 

server inner-tunnel { 

modules { 

Module: Checking authenticate {...} for more modules to load 

Module: Linked to module rlm_pap 

Module: Instantiating pap 

pap { 

encryption_scheme = "auto" 

auto_header = no 

Module: Linked to module rlm_chap 

Module: Instantiating chap 

Module: Linked to module rlm_mschap 

Module: Instantiating mschap 

mschap { 

use_mppe = yes 

require_encryption = no 

require_strong = no 

with_ntdomain_hack = no 

Module: Linked to module rlm_unix 

Module: Instantiating unix 

unix { 

radwtmp = "/usr/local/var/log/radius/radwtmp" 

Module: Linked to module rlm_eap 

Module: Instantiating eap 

eap { 

default_eap_type = "md5" 

timer_expire = 60 

ignore_unknown_eap_types = no 

cisco_accounting_username_bug = no 

max_sessions = 2048 

Module: Linked to sub-module rlm_eap_md5 

Module: Instantiating eap-md5 

Module: Linked to sub-module rlm_eap_leap 

Module: Instantiating eap-leap 

Module: Linked to sub-module rlm_eap_gtc 

Module: Instantiating eap-gtc 

gtc { 

challenge = "Password: " 

auth_type = "PAP" 

Module: Linked to sub-module rlm_eap_tls 

Module: Instantiating eap-tls 

tls { 

rsa_key_exchange = no 

dh_key_exchange = yes 

rsa_key_length = 512 

dh_key_length = 512 

verify_depth = 0 

pem_file_type = yes 

private_key_file = "/usr/local/etc/raddb/certs/server.pem" 

certificate_file = "/usr/local/etc/raddb/certs/server.pem" 

CA_file = "/usr/local/etc/raddb/certs/ca.pem" 

private_key_password = "whatever" 

dh_file = "/usr/local/etc/raddb/certs/dh" 

random_file = "/usr/local/etc/raddb/certs/random" 

fragment_size = 1024 

include_length = yes 

check_crl = no 

cipher_list = "DEFAULT" 

make_cert_command = "/usr/local/etc/raddb/certs/bootstrap" 

cache { 

enable = no 

lifetime = 24 

max_entries = 255 

Module: Linked to sub-module rlm_eap_ttls 

Module: Instantiating eap-ttls 

ttls { 

default_eap_type = "md5" 

copy_request_to_tunnel = no 

use_tunneled_reply = no 

virtual_server = "inner-tunnel" 

include_length = yes 

Module: Linked to sub-module rlm_eap_peap 

Module: Instantiating eap-peap 

peap { 

default_eap_type = "mschapv2" 

copy_request_to_tunnel = yes 

use_tunneled_reply = yes 

proxy_tunneled_request_as_eap = yes 

virtual_server = "inner-tunnel" 

Module: Linked to sub-module rlm_eap_mschapv2 

Module: Instantiating eap-mschapv2 

mschapv2 { 

with_ntdomain_hack = no 

Module: Checking authorize {...} for more modules to load 

Module: Linked to module rlm_realm 

Module: Instantiating suffix 

realm suffix { 

format = "suffix" 

delimiter = "@" 

ignore_default = no 

ignore_null = no 

Module: Linked to module rlm_files 

Module: Instantiating files 

files { 

usersfile = "/usr/local/etc/raddb/users" 

acctusersfile = "/usr/local/etc/raddb/acct_users" 

preproxy_usersfile = "/usr/local/etc/raddb/preproxy_users" 

compat = "no" 

Module: Checking session {...} for more modules to load 

Module: Linked to module rlm_radutmp 

Module: Instantiating radutmp 

radutmp { 

filename = "/usr/local/var/log/radius/radutmp" 

username = "%{User-Name}" 

case_sensitive = yes 

check_with_nas = yes 

perm = 384 

callerid = yes 

Module: Checking post-proxy {...} for more modules to load 

Module: Checking post-auth {...} for more modules to load 

Module: Linked to module rlm_attr_filter 

Module: Instantiating attr_filter.access_reject 

attr_filter attr_filter.access_reject { 

attrsfile = "/usr/local/etc/raddb/attrs.access_reject" 

key = "%{User-Name}" 

} # modules 

} # server 

server { 

modules { 

Module: Checking authenticate {...} for more modules to load 

Module: Checking authorize {...} for more modules to load 

Module: Linked to module rlm_preprocess 

Module: Instantiating preprocess 

preprocess { 

huntgroups = "/usr/local/etc/raddb/huntgroups" 

hints = "/usr/local/etc/raddb/hints" 

with_ascend_hack = no 

ascend_channels_per_line = 23 

with_ntdomain_hack = no 

with_specialix_jetstream_hack = no 

with_cisco_vsa_hack = no 

with_alvarion_vsa_hack = no 

Module: Checking preacct {...} for more modules to load 

Module: Linked to module rlm_acct_unique 

Module: Instantiating acct_unique 

acct_unique { 

key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port" 

Module: Checking accounting {...} for more modules to load 

Module: Linked to module rlm_detail 

Module: Instantiating detail 

detail { 

detailfile = "/usr/local/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d" 

header = "%t" 

detailperm = 384 

dirperm = 493 

locking = no 

log_packet_header = no 

Module: Instantiating attr_filter.accounting_response 

attr_filter attr_filter.accounting_response { 

attrsfile = "/usr/local/etc/raddb/attrs.accounting_response" 

key = "%{User-Name}" 

Module: Checking session {...} for more modules to load 

Module: Checking post-proxy {...} for more modules to load 

Module: Checking post-auth {...} for more modules to load 

} # modules 

} # server 

radiusd: #### Opening IP addresses and Ports #### 

listen { 

type = "auth" 

ipaddr = * 

port = 0 

listen { 

type = "acct" 

ipaddr = * 

port = 0 

listen { 

type = "control" 

listen { 

socket = "/usr/local/var/run/radiusd/radiusd.sock" 

Listening on authentication address * port 1812 

Listening on accounting address * port 1813 

Listening on command file /usr/local/var/run/radiusd/radiusd.sock 

Listening on proxy address * port 1814 

Ready to process requests. 


*************************************************************************************************** 


I can see I don't have the line 


including configuration file /usr/local/etc/raddb/sites-enabled/dhcp 


and 


radiusd: #### Loading Virtual Servers #### 

server dhcp { 

modules { 

Module: Checking dhcp DHCP-Discover {...} for more modules to load 

Module: Linked to module rlm_always 

Module: Instantiating ok 

always ok { 

rcode = "ok" 

simulcount = 0 

mpp = no 

Module: Checking dhcp DHCP-Request {...} for more modules to load 

Module: Linked to module rlm_passwd 

Module: Instantiating mac2ip 

passwd mac2ip { 

filename = "/usr/local/etc/raddb/mac2ip" 

format = "*DHCP-Client-Hardware-Address:=DHCP-Your-IP-Address" 

delimiter = "," 

ignorenislike = yes 

ignoreempty = yes 

allowmultiplekeys = no 

hashsize = 100 

rlm_passwd: nfields: 2 keyfield 0(DHCP-Client-Hardware-Address) listable: no 

Module: Checking dhcp (null) {...} for more modules to load 

/usr/local/etc/raddb/sites-enabled/dhcp[159]: No name specified for Post-Auth-Type block 

} # modules 

} # server 


and 


listen { 

type = "dhcp" 

ipaddr = * 

port = 67 


Like other users in this mailing list 


So my question is ... What am I doing wrong ??? or   I need to configure any other thing ??? 


Please I need somebody to put me in the right direction all my doubts I can solve with this mailing list but I can't find the answer to my problem.... 


Thanks in advance.... 


Greetings 



all 




I can suppose you do not have 'dhcp' module in auth, autz and/or etc sections in radiusd.conf


-- 

С уважением,

 Коньков                          mailto:[email protected]

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to