Regarding Snort, you can sign up as a "Registered User" and obtain VRT rules 30 days after they are released free of charge. The benefit of a paid subscription is immediate access to updated rules.

As for Nessus, you can also register and obtain the "Home Feed" free of charge. However, this feed is not to be used in a corporate environment. In these cases, you need to purchase the "Professional Feed" for $1,200 per year per scanner. Both feeds offer access to over 38,000 plugins and allow you to perform credentialed/authenticated scans. However, the Professional Feed allows additional capabilities like policy compliance checking which allows you to load customized "audit" files to perform specific policy compliance audits.

Hope this helps.


On 9/16/2010 11:20 AM, Ubence Quevedo wrote:

Hi All,

We have somewhat gotten the Packetfence ZEN 1.9.0 to work with wired connections, but we are having some issues getting freeradius configured to be usable for wireless connections.

From the PF Admin manual [specifically Chapter 5], we've put all of the configuration information in place for freeradius, however the service fails to start.

Here is the output from running radiusd -X:

[r...@localhost raddb]# radiusd -X

Starting - reading configuration files ...

reread_config:  reading radiusd.conf

Config:   including file: /etc/raddb/proxy.conf

Config:   including file: /etc/raddb/clients.conf

Config:   including file: /etc/raddb/snmp.conf

Config:   including file: /etc/raddb/eap.conf

 main: prefix = "/usr"

 main: localstatedir = "/var"

 main: logdir = "/var/log/radius"

 main: libdir = "/usr/lib"

 main: radacctdir = "/var/log/radius/radacct"

 main: hostname_lookups = no

 main: snmp = no

 main: max_request_time = 30

 main: cleanup_delay = 5

 main: max_requests = 1024

 main: delete_blocked_requests = 0

 main: port = 0

 main: allow_core_dumps = no

 main: log_stripped_names = no

 main: log_file = "/var/log/radius/radius.log"

 main: log_auth = no

 main: log_auth_badpass = no

 main: log_auth_goodpass = no

 main: pidfile = "/var/run/radiusd/radiusd.pid"

 main: user = "radiusd"

 main: group = "radiusd"

 main: usercollide = no

 main: lower_user = "no"

 main: lower_pass = "no"

 main: nospace_user = "no"

 main: nospace_pass = "no"

 main: checkrad = "/usr/sbin/checkrad"

 main: proxy_requests = yes

 proxy: retry_delay = 5

 proxy: retry_count = 3

 proxy: synchronous = no

 proxy: default_fallback = yes

 proxy: dead_time = 120

 proxy: post_proxy_authorize = no

 proxy: wake_all_if_all_dead = no

 security: max_attributes = 200

 security: reject_delay = 1

 security: status_server = no

 main: debug_level = 0

read_config_files:  reading dictionary

read_config_files:  reading naslist

Using deprecated naslist file.  Support for this will go away soon.

read_config_files:  reading clients

read_config_files:  reading realms

radiusd:  entering modules setup

Module: Library search path is /usr/lib

Module: Loaded exec

 exec: wait = yes

 exec: program = "(null)"

 exec: input_pairs = "request"

 exec: output_pairs = "(null)"

 exec: packet_type = "(null)"

rlm_exec: Wait=yes but no output defined. Did you mean output=none?

Module: Instantiated exec (exec)

Module: Loaded expr

Module: Instantiated expr (expr)

Module: Loaded PAP

 pap: encryption_scheme = "crypt"

Module: Instantiated pap (pap)

Module: Loaded CHAP

Module: Instantiated chap (chap)

Module: Loaded MS-CHAP

 mschap: use_mppe = yes

 mschap: require_encryption = no

 mschap: require_strong = no

 mschap: with_ntdomain_hack = no

 mschap: passwd = "(null)"

 mschap: ntlm_auth = "(null)"

Module: Instantiated mschap (mschap)

Module: Loaded System

 unix: cache = no

 unix: passwd = "(null)"

 unix: shadow = "/etc/shadow"

 unix: group = "(null)"

 unix: radwtmp = "/var/log/radius/radwtmp"

 unix: usegroup = no

 unix: cache_reload = 600

Module: Instantiated unix (unix)

Module: Loaded eap

 eap: default_eap_type = "peap"

 eap: timer_expire = 60

 eap: ignore_unknown_eap_types = no

 eap: cisco_accounting_username_bug = no

rlm_eap: Loaded and initialized type md5

rlm_eap: Loaded and initialized type leap

 gtc: challenge = "Password: "

 gtc: auth_type = "PAP"

rlm_eap: Loaded and initialized type gtc

 mschapv2: with_ntdomain_hack = no

rlm_eap: Loaded and initialized type mschapv2

rlm_eap: No such sub-type for default EAP type peap

radiusd.conf[10]: eap: Module instantiation failed.

radiusd.conf[1945] Unknown module "eap".

radiusd.conf[1892] Failed to parse authenticate section.

Is there something we are missing in our radius config in order for it to work properly?

Also, both Snort and Nessus look to be non-free products. Do we need to purchase the full versions of both softwares in order to get full functionality out of both? I ask because when I try to get Snort working, the service fails to start properly even when I reference the oinkmaster config that is included in PF. When we tried to get Nessus scanning working, it just seemed to hang on the initial client registration portal.

Thanks for any help in advance.

/Ubence Quevedo/
/Technology Support Specialist/
/Information Systems, Business Services
Merced County Office of Education/


------------------------------------------------------------------------------
Start uncovering the many advantages of virtual appliances
and start using them to simplify application deployment and
accelerate your shift to cloud computing.
http://p.sf.net/sfu/novell-sfdev2dev


_______________________________________________
Packetfence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users
------------------------------------------------------------------------------
Start uncovering the many advantages of virtual appliances
and start using them to simplify application deployment and
accelerate your shift to cloud computing.
http://p.sf.net/sfu/novell-sfdev2dev
_______________________________________________
Packetfence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to