Hello,
We are in the process of implementing radsec on our server but when using
authby DNSROAM the SRV lookup always fail:
Radiator logs:
Fri Mar 17 15:56:20 2017: DEBUG: Handling with Radius::AuthDNSROAM
Fri Mar 17 15:56:20 2017: DEBUG: Resolver doing NAPTR lookup for id.fccn.pt,
Fri Mar 17 15:56:20 2017: DEBUG: AuthBy DNSROAM result: IGNORE, Discovering
RadSec servers
Fri Mar 17 15:56:20 2017: DEBUG: Resolver found NAPTR record for realm
id.fccn.pt: id.fccn.pt. 73857 IN NAPTR ( 100 10 s
x-eduroam:radius.tls ""
_radsec._tcp.fccn.pt. )
Fri Mar 17 15:56:20 2017: DEBUG: Resolver doing SRV lookup for
_radsec._tcp.fccn.pt, Protocol radius Transport tcp UseTLS 1 Order 100
Preference 10
Fri Mar 17 15:56:25 2017: INFO: Resolver: No reply from DNS for SRV request for
realm id.fccn.pt
Fri Mar 17 15:56:25 2017: DEBUG: AuthBy DNSROAM: No hardwired Route, no
discovered Route, using DEFAULT Route for id.fccn.pt
When we do a tcpdump on the radius server we see that the dns server responds
to the request but the radius sends (final line) port unreachable and the
resolving of the SRV request fails:
Tcpdump radius (193.137.66.131) > dns (193.137.66.129):
12:37:13.937148 IP 193.137.66.131.40586 > 193.137.66.129.53: 63986+ NAPTR?
id.fccn.pt. (28)
12:37:13.937383 IP 193.137.66.129.53 > 193.137.66.131.40586: 63986 1/0/6 NAPTR
(268)
12:37:13.945746 IP 193.137.66.131.40586 > 193.137.66.129.53: 37804+ SRV?
_radsec._tcp.fccn.pt. (38)
12:37:13.946034 IP 193.137.66.129.53 > 193.137.66.131.40586: 37804 2/0/4 SRV
radius01.fccn.pt.:2083 0 0, SRV radius02.fccn.pt.:2083 0 10 (198)
12:37:13.946058 IP 193.137.66.131 > 193.137.66.129: ICMP 193.137.66.131 udp
port 40586 unreachable, length 234
I've installed all the necessary modules: Net::DNS + Socket6 +
IO::Socket::INET6 for this to work but it always fails.
Anyone has an idea how to solve this?
Useful info:
OS: Centos 7 Updated today (March 17, 2017)
Radiator: 4.17
Resolver config:
<Resolver>
Nameservers 193.137.66.129
Nameservers ipv6:2001:690:2260:AAAA::129
NAPTR-Pattern x-eduroam:(radius)\.(tls)
DirectAddressLookup 0
Debug
</Resolver>
AuthBy DNSROAM config:
<AuthBy DNSROAM>
Identifier RADSEC_ROMAER_ACCESS_DNSROAM
Port 2083
Protocol radsec
Transport tcp
UseTLS 1
Secret XXXXXX
ReconnectTimeout 2
NoreplyTimeout 5
ConnectOnDemand
TLS_CAFile /etc/radiator/certs/radsec/cacert.pem
TLS_CertificateFile
/etc/radiator/certs/radsec/radius.si.ipcb.pt-crt.pem
TLS_CertificateType PEM
TLS_PrivateKeyFile
/etc/radiator/certs/radsec/radius.si.ipcb.pt-key.pem
TLS_PolicyOID .1.3.6.1.4.1.25178.3.1.2
TLS_ExpectedPeerName CN=.*
#<Route>
# Realm id.fccn.pt
# Address 193.137.198.49
# Port 2083
# Transport tcp
# Protocol radsec
#</Route>
<Route>
Realm DEFAULT
Address 193.136.192.43, 193.136.192.44
Port 2083
Transport tcp
Protocol radsec
</Route>
IgnoreAccountingResponse
# Executar o ficheiro que adiciona os enderecos MAC no DHCP
ReplyHook file:"%D/radius_roamer_user_hook.pl"
</AuthBy>
Regards,
Fernando Reis
IT Services | Polytechnic Institute of Castelo Branco
Av. Pedro Álvares Cabral n.º 12 6000-084 Castelo Branco - Portugal
T +351 272 339 600 | F +351 272 339 601 | @
[email protected]<mailto:[email protected]>
_______________________________________________
radiator mailing list
[email protected]
http://lists.open.com.au/mailman/listinfo/radiator