FreeRADIUS + DHCP config

Ale Luna ale-luna at argentina.com
Mon Jan 11 17:51:30 CET 2010


Hello to all.... 

I'm new in linux & RADIUS,  first I configure a FreeRADIUS 2.1.7 in the most basic way  and it runs very well but now I'm trying to configure a FreeRADIUS 2.1.8 with DHCP server and I need somebody to point me in the right direction to configure it... the steps I took to configure were 

root at servidor1-desktop:/home/servidor1/Desktop/freeradius-server-2.1.8# ./configure --with-dhcp 
root at servidor1-desktop:/home/servidor1/Desktop/freeradius-server-2.1.8# make 
root at servidor1-desktop:/home/servidor1/Desktop/freeradius-server-2.1.8# vi share/dictionary 

Un-comment the line containing $INCLUDE dictionary.dhcp 
. 
. 
. 
# 
# The Cisco VPN300 dictionary is the same as the altiga one. 
# You shouldn't use both at the same time. 
# 
#$INCLUDE dictionary.cisco.vpn3000 
$INCLUDE dictionary.cisco.vpn5000 
$INCLUDE dictionary.cisco.bbsm 
$INCLUDE dictionary.clavister 
$INCLUDE dictionary.colubris 
$INCLUDE dictionary.cosine 
$INCLUDE dictionary.dhcp 
$INCLUDE dictionary.digium 
$INCLUDE dictionary.epygi 
$INCLUDE dictionary.erx 
$INCLUDE dictionary.ericsson 
$INCLUDE dictionary.extreme 
$INCLUDE dictionary.freeradius 
$INCLUDE dictionary.freeswitch 
$INCLUDE dictionary.fortinet 
$INCLUDE dictionary.foundry 
$INCLUDE dictionary.gandalf 
$INCLUDE dictionary.gemtek 
$INCLUDE dictionary.h3c 
. 
. 
. 



save the file. 
. 
. 
. 
$INCLUDE dictionary.colubris 
$INCLUDE dictionary.cosine 
$INCLUDE dictionary.dhcp 
$INCLUDE dictionary.digium 
$INCLUDE dictionary.epygi 
$INCLUDE dictionary.erx 
$INCLUDE dictionary.ericsson 
$INCLUDE dictionary.extreme 
$INCLUDE dictionary.freeradius 
$INCLUDE dictionary.freeswitch 
$INCLUDE dictionary.fortinet 
$INCLUDE dictionary.foundry 
$INCLUDE dictionary.gandalf 
$INCLUDE dictionary.gemtek 
$INCLUDE dictionary.h3c 
:w 

root at servidor1-desktop:/home/servidor1/Desktop/freeradius-server-2.1.8# make install 




But when I run my radiusd -X I have the following output 


************************************************************************************************** 

root at servidor1-desktop:/usr/local/etc/raddb# radiusd -X 
FreeRADIUS Version 2.1.8, for host i686-pc-linux-gnu, built on Jan 8 2010 at 16:50:59 
Copyright (C) 1999-2009 The FreeRADIUS server project and contributors. 
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A 
PARTICULAR PURPOSE. 
You may redistribute copies of FreeRADIUS under the terms of the 
GNU General Public License v2. 
Starting - reading configuration files ... 
including configuration file /usr/local/etc/raddb/radiusd.conf 
including configuration file /usr/local/etc/raddb/proxy.conf 
including configuration file /usr/local/etc/raddb/clients.conf 
including files in directory /usr/local/etc/raddb/modules/ 
including configuration file /usr/local/etc/raddb/modules/ldap 
including configuration file /usr/local/etc/raddb/modules/unix 
including configuration file /usr/local/etc/raddb/modules/digest 
including configuration file /usr/local/etc/raddb/modules/ippool 
including configuration file /usr/local/etc/raddb/modules/echo 
including configuration file /usr/local/etc/raddb/modules/expiration 
including configuration file /usr/local/etc/raddb/modules/acct_unique 
including configuration file /usr/local/etc/raddb/modules/linelog 
including configuration file /usr/local/etc/raddb/modules/krb5 
including configuration file /usr/local/etc/raddb/modules/expr 
including configuration file /usr/local/etc/raddb/modules/sql_log 
including configuration file /usr/local/etc/raddb/modules/otp 
including configuration file /usr/local/etc/raddb/modules/preprocess 
including configuration file /usr/local/etc/raddb/modules/detail.example.com 
including configuration file /usr/local/etc/raddb/modules/files 
including configuration file /usr/local/etc/raddb/modules/inner-eap 
including configuration file /usr/local/etc/raddb/modules/attr_rewrite 
including configuration file /usr/local/etc/raddb/modules/BACK.ippool 
including configuration file /usr/local/etc/raddb/modules/attr_filter 
including configuration file /usr/local/etc/raddb/modules/sqlcounter_expire_on_login 
including configuration file /usr/local/etc/raddb/modules/cui 
including configuration file /usr/local/etc/raddb/modules/pam 
including configuration file /usr/local/etc/raddb/modules/detail.log 
including configuration file /usr/local/etc/raddb/modules/radutmp 
including configuration file /usr/local/etc/raddb/modules/smsotp 
including configuration file /usr/local/etc/raddb/modules/pap 
including configuration file /usr/local/etc/raddb/modules/passwd 
including configuration file /usr/local/etc/raddb/modules/etc_group 
including configuration file /usr/local/etc/raddb/modules/policy 
including configuration file /usr/local/etc/raddb/modules/mschap 
including configuration file /usr/local/etc/raddb/modules/exec 
including configuration file /usr/local/etc/raddb/modules/counter 
including configuration file /usr/local/etc/raddb/modules/sradutmp 
including configuration file /usr/local/etc/raddb/modules/smbpasswd 
including configuration file /usr/local/etc/raddb/modules/mac2vlan 
including configuration file /usr/local/etc/raddb/modules/mac2ip 
including configuration file /usr/local/etc/raddb/modules/detail 
including configuration file /usr/local/etc/raddb/modules/logintime 
including configuration file /usr/local/etc/raddb/modules/realm 
including configuration file /usr/local/etc/raddb/modules/chap 
including configuration file /usr/local/etc/raddb/modules/ntlm_auth 
including configuration file /usr/local/etc/raddb/modules/wimax 
including configuration file /usr/local/etc/raddb/modules/perl 
including configuration file /usr/local/etc/raddb/modules/always 
including configuration file /usr/local/etc/raddb/modules/checkval 
including configuration file /usr/local/etc/raddb/eap.conf 
including configuration file /usr/local/etc/raddb/policy.conf 
including files in directory /usr/local/etc/raddb/sites-enabled/ 
including configuration file /usr/local/etc/raddb/sites-enabled/default 
including configuration file /usr/local/etc/raddb/sites-enabled/control-socket 
including configuration file /usr/local/etc/raddb/sites-enabled/inner-tunnel 
main { 
allow_core_dumps = no 
} 
including dictionary file /usr/local/etc/raddb/dictionary 
main { 
prefix = "/usr/local" 
localstatedir = "/usr/local/var" 
logdir = "/usr/local/var/log/radius" 
libdir = "/usr/local/lib" 
radacctdir = "/usr/local/var/log/radius/radacct" 
hostname_lookups = no 
max_request_time = 30 
cleanup_delay = 5 
max_requests = 1024 
pidfile = "/usr/local/var/run/radiusd/radiusd.pid" 
checkrad = "/usr/local/sbin/checkrad" 
debug_level = 0 
proxy_requests = yes 
log { 
stripped_names = no 
auth = no 
auth_badpass = no 
auth_goodpass = no 
} 
security { 
max_attributes = 200 
reject_delay = 1 
status_server = yes 
} 
} 
radiusd: #### Loading Realms and Home Servers #### 
proxy server { 
retry_delay = 5 
retry_count = 3 
default_fallback = no 
dead_time = 120 
wake_all_if_all_dead = no 
} 
home_server localhost { 
ipaddr = 127.0.0.1 
port = 1812 
type = "auth" 
secret = "testing123" 
response_window = 20 
max_outstanding = 65536 
require_message_authenticator = no 
zombie_period = 40 
status_check = "status-server" 
ping_interval = 30 
check_interval = 30 
check_interval = 30 
num_answers_to_alive = 3 
num_pings_to_alive = 3 
revive_interval = 120 
status_check_timeout = 4 
irt = 2 
mrt = 16 
mrc = 5 
mrd = 30 
} 
home_server_pool my_auth_failover { 
type = fail-over 
home_server = localhost 
} 
realm example.com { 
auth_pool = my_auth_failover 
} 
realm LOCAL { 
} 
radiusd: #### Loading Clients #### 
client localhost { 
ipaddr = 127.0.0.1 
require_message_authenticator = no 
secret = "testing123" 
nastype = "other" 
} 
client 192.168.1.10 { 
require_message_authenticator = no 
secret = "miaccesspoint" 
shortname = "TP-Link" 
} 
client 192.168.1.245 { 
require_message_authenticator = no 
secret = "miaccesspoint" 
shortname = "Linksys" 
} 
radiusd: #### Instantiating modules #### 
instantiate { 
Module: Linked to module rlm_exec 
Module: Instantiating exec 
exec { 
wait = no 
input_pairs = "request" 
shell_escape = yes 
} 
Module: Linked to module rlm_expr 
Module: Instantiating expr 
Module: Linked to module rlm_expiration 
Module: Instantiating expiration 
expiration { 
reply-message = "Password Has Expired " 
} 
Module: Linked to module rlm_logintime 
Module: Instantiating logintime 
logintime { 
reply-message = "You are calling outside your allowed timespan " 
minimum-timeout = 60 
} 
} 
radiusd: #### Loading Virtual Servers #### 
server inner-tunnel { 
modules { 
Module: Checking authenticate {...} for more modules to load 
Module: Linked to module rlm_pap 
Module: Instantiating pap 
pap { 
encryption_scheme = "auto" 
auto_header = no 
} 
Module: Linked to module rlm_chap 
Module: Instantiating chap 
Module: Linked to module rlm_mschap 
Module: Instantiating mschap 
mschap { 
use_mppe = yes 
require_encryption = no 
require_strong = no 
with_ntdomain_hack = no 
} 
Module: Linked to module rlm_unix 
Module: Instantiating unix 
unix { 
radwtmp = "/usr/local/var/log/radius/radwtmp" 
} 
Module: Linked to module rlm_eap 
Module: Instantiating eap 
eap { 
default_eap_type = "md5" 
timer_expire = 60 
ignore_unknown_eap_types = no 
cisco_accounting_username_bug = no 
max_sessions = 2048 
} 
Module: Linked to sub-module rlm_eap_md5 
Module: Instantiating eap-md5 
Module: Linked to sub-module rlm_eap_leap 
Module: Instantiating eap-leap 
Module: Linked to sub-module rlm_eap_gtc 
Module: Instantiating eap-gtc 
gtc { 
challenge = "Password: " 
auth_type = "PAP" 
} 
Module: Linked to sub-module rlm_eap_tls 
Module: Instantiating eap-tls 
tls { 
rsa_key_exchange = no 
dh_key_exchange = yes 
rsa_key_length = 512 
dh_key_length = 512 
verify_depth = 0 
pem_file_type = yes 
private_key_file = "/usr/local/etc/raddb/certs/server.pem" 
certificate_file = "/usr/local/etc/raddb/certs/server.pem" 
CA_file = "/usr/local/etc/raddb/certs/ca.pem" 
private_key_password = "whatever" 
dh_file = "/usr/local/etc/raddb/certs/dh" 
random_file = "/usr/local/etc/raddb/certs/random" 
fragment_size = 1024 
include_length = yes 
check_crl = no 
cipher_list = "DEFAULT" 
make_cert_command = "/usr/local/etc/raddb/certs/bootstrap" 
cache { 
enable = no 
lifetime = 24 
max_entries = 255 
} 
} 
Module: Linked to sub-module rlm_eap_ttls 
Module: Instantiating eap-ttls 
ttls { 
default_eap_type = "md5" 
copy_request_to_tunnel = no 
use_tunneled_reply = no 
virtual_server = "inner-tunnel" 
include_length = yes 
} 
Module: Linked to sub-module rlm_eap_peap 
Module: Instantiating eap-peap 
peap { 
default_eap_type = "mschapv2" 
copy_request_to_tunnel = yes 
use_tunneled_reply = yes 
proxy_tunneled_request_as_eap = yes 
virtual_server = "inner-tunnel" 
} 
Module: Linked to sub-module rlm_eap_mschapv2 
Module: Instantiating eap-mschapv2 
mschapv2 { 
with_ntdomain_hack = no 
} 
Module: Checking authorize {...} for more modules to load 
Module: Linked to module rlm_realm 
Module: Instantiating suffix 
realm suffix { 
format = "suffix" 
delimiter = "@" 
ignore_default = no 
ignore_null = no 
} 
Module: Linked to module rlm_files 
Module: Instantiating files 
files { 
usersfile = "/usr/local/etc/raddb/users" 
acctusersfile = "/usr/local/etc/raddb/acct_users" 
preproxy_usersfile = "/usr/local/etc/raddb/preproxy_users" 
compat = "no" 
} 
Module: Checking session {...} for more modules to load 
Module: Linked to module rlm_radutmp 
Module: Instantiating radutmp 
radutmp { 
filename = "/usr/local/var/log/radius/radutmp" 
username = "%{User-Name}" 
case_sensitive = yes 
check_with_nas = yes 
perm = 384 
callerid = yes 
} 
Module: Checking post-proxy {...} for more modules to load 
Module: Checking post-auth {...} for more modules to load 
Module: Linked to module rlm_attr_filter 
Module: Instantiating attr_filter.access_reject 
attr_filter attr_filter.access_reject { 
attrsfile = "/usr/local/etc/raddb/attrs.access_reject" 
key = "%{User-Name}" 
} 
} # modules 
} # server 
server { 
modules { 
Module: Checking authenticate {...} for more modules to load 
Module: Checking authorize {...} for more modules to load 
Module: Linked to module rlm_preprocess 
Module: Instantiating preprocess 
preprocess { 
huntgroups = "/usr/local/etc/raddb/huntgroups" 
hints = "/usr/local/etc/raddb/hints" 
with_ascend_hack = no 
ascend_channels_per_line = 23 
with_ntdomain_hack = no 
with_specialix_jetstream_hack = no 
with_cisco_vsa_hack = no 
with_alvarion_vsa_hack = no 
} 
Module: Checking preacct {...} for more modules to load 
Module: Linked to module rlm_acct_unique 
Module: Instantiating acct_unique 
acct_unique { 
key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port" 
} 
Module: Checking accounting {...} for more modules to load 
Module: Linked to module rlm_detail 
Module: Instantiating detail 
detail { 
detailfile = "/usr/local/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d" 
header = "%t" 
detailperm = 384 
dirperm = 493 
locking = no 
log_packet_header = no 
} 
Module: Instantiating attr_filter.accounting_response 
attr_filter attr_filter.accounting_response { 
attrsfile = "/usr/local/etc/raddb/attrs.accounting_response" 
key = "%{User-Name}" 
} 
Module: Checking session {...} for more modules to load 
Module: Checking post-proxy {...} for more modules to load 
Module: Checking post-auth {...} for more modules to load 
} # modules 
} # server 
radiusd: #### Opening IP addresses and Ports #### 
listen { 
type = "auth" 
ipaddr = * 
port = 0 
} 
listen { 
type = "acct" 
ipaddr = * 
port = 0 
} 
listen { 
type = "control" 
listen { 
socket = "/usr/local/var/run/radiusd/radiusd.sock" 
} 
} 
Listening on authentication address * port 1812 
Listening on accounting address * port 1813 
Listening on command file /usr/local/var/run/radiusd/radiusd.sock 
Listening on proxy address * port 1814 
Ready to process requests. 

*************************************************************************************************** 

I can see I don't have the line 

. 
. 
. 
including configuration file /usr/local/etc/raddb/sites-enabled/dhcp 
. 
. 
. 

and 

. 
. 
. 
radiusd: #### Loading Virtual Servers #### 
server dhcp { 
modules { 
Module: Checking dhcp DHCP-Discover {...} for more modules to load 
Module: Linked to module rlm_always 
Module: Instantiating ok 
always ok { 
rcode = "ok" 
simulcount = 0 
mpp = no 
} 
Module: Checking dhcp DHCP-Request {...} for more modules to load 
Module: Linked to module rlm_passwd 
Module: Instantiating mac2ip 
passwd mac2ip { 
filename = "/usr/local/etc/raddb/mac2ip" 
format = "*DHCP-Client-Hardware-Address:=DHCP-Your-IP-Address" 
delimiter = "," 
ignorenislike = yes 
ignoreempty = yes 
allowmultiplekeys = no 
hashsize = 100 
} 
rlm_passwd: nfields: 2 keyfield 0(DHCP-Client-Hardware-Address) listable: no 
Module: Checking dhcp (null) {...} for more modules to load 
/usr/local/etc/raddb/sites-enabled/dhcp[159]: No name specified for Post-Auth-Type block 
} # modules 
} # server 
. 
. 
. 

and 

. 
. 
listen { 
type = "dhcp" 
ipaddr = * 
port = 67 
} 
. 
. 

Like other users in this mailing list 

So my question is ... What am I doing wrong ??? or   I need to configure any other thing ??? 

Please I need somebody to put me in the right direction all my doubts I can solve with this mailing list but I can't find the answer to my problem.... 

Thanks in advance.... 

Greetings 


all 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20100111/63f78534/attachment.html>


More information about the Freeradius-Users mailing list