Statistic from Status server

Peter Balsianok balsianok.peter at gmail.com
Tue Oct 24 13:18:31 CEST 2017


Hi,

I want to retrieve statistic for particular home server via Status-Server.
but server sends empty answer. At the end of debug log you can find request.

Help please, thx

Debug log:
FreeRADIUS Version 3.0.13
Copyright (C) 1999-2017 The FreeRADIUS server project and contributors
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
PARTICULAR PURPOSE
You may redistribute copies of FreeRADIUS under the terms of the
GNU General Public License
For more information about these matters, see the file named COPYRIGHT
Starting - reading configuration files ...
including dictionary file
/app/radius/freeradius-3.0.13/share/freeradius/dictionary
including dictionary file
/app/radius/freeradius-3.0.13/share/freeradius/dictionary.dhcp
including dictionary file
/app/radius/freeradius-3.0.13/share/freeradius/dictionary.vqp
including dictionary file /app/radius/conf/auth-test/dictionary
including configuration file /app/radius/conf/auth-test/radiusd.conf
including configuration file /app/radius/conf/auth-test/templates.conf
including configuration file /app/radius/conf/auth-test/proxy.conf
including configuration file /app/radius/conf/auth-test/clients.conf
including files in directory /app/radius/conf/auth-test/mods-enabled/
including configuration file /app/radius/conf/auth-test/mods-enabled/unpack
including configuration file /app/radius/conf/auth-test/mods-enabled/files
including configuration file /app/radius/conf/auth-test/mods-enabled/expr
including configuration file
/app/radius/conf/auth-test/mods-enabled/preprocess
including configuration file /app/radius/conf/auth-test/mods-enabled/chap
including configuration file
/app/radius/conf/auth-test/mods-enabled/attr_filter
including configuration file /app/radius/conf/auth-test/mods-enabled/always
including configuration file /app/radius/conf/auth-test/mods-enabled/linelog
including configuration file /app/radius/conf/auth-test/mods-enabled/perl
including configuration file /app/radius/conf/auth-test/mods-enabled/ldap
including configuration file /app/radius/conf/auth-test/mods-enabled/realm
including configuration file /app/radius/conf/auth-test/mods-enabled/pap
including files in directory /app/radius/conf/auth-test/policy-enabled/
including configuration file
/app/radius/conf/auth-test/policy-enabled/RAN-BACKUP
including configuration file
/app/radius/conf/auth-test/policy-enabled/accounting
including configuration file
/app/radius/conf/auth-test/policy-enabled/SkyToll.new
including configuration file
/app/radius/conf/auth-test/policy-enabled/huntgroup
including configuration file
/app/radius/conf/auth-test/policy-enabled/post-proxy
including configuration file
/app/radius/conf/auth-test/policy-enabled/FixedLTE
including configuration file
/app/radius/conf/auth-test/policy-enabled/username
including configuration file /app/radius/conf/auth-test/policy-enabled/nas
including configuration file
/app/radius/conf/auth-test/policy-enabled/SkyToll
including files in directory /app/radius/conf/auth-test/sites-enabled/
including configuration file
/app/radius/conf/auth-test/sites-enabled/control-socket
including configuration file
/app/radius/conf/auth-test/sites-enabled/default
including configuration file /app/radius/conf/auth-test/sites-enabled/status
main {
    name = "auth-test"
    prefix = "/app/radius/freeradius-v3"
    localstatedir = "/app_log/radius/auth-test/"
    sbindir = "/app/radius/freeradius-v3/sbin"
    logdir = "/app_log/radius/auth-test/"
    run_dir = "/app_log/radius/auth-test/"
    libdir = "/app/radius/freeradius-v3/lib"
    radacctdir = "/app_log/radius/auth-test//radacct"
    panic_action = "gdb -silent -x /app/radius/conf/auth-test/panic.gdb %e
%p 2>&1 | tee /app_log/radius/auth-test//gdb-auth-test-%p.log"
    hostname_lookups = no
    max_request_time = 7
    cleanup_delay = 2
    max_requests = 25600
    pidfile = "/app_log/radius/auth-test//radius.pid"
    checkrad = "/app/radius/freeradius-v3/sbin/checkrad"
    debug_level = 0
    proxy_requests = yes
 log {
     stripped_names = no
     auth = yes
     auth_badpass = yes
     auth_goodpass = yes
     colourise = yes
     msg_denied = "You are already logged in - access denied"
 }
 resources {
 }
 security {
     max_attributes = 200
     reject_delay = 0.000000
     status_server = yes
 }
}
radiusd: #### Loading Realms and Home Servers ####
 proxy server {
     retry_delay = 5
     retry_count = 3
     default_fallback = no
     dead_time = 120
     wake_all_if_all_dead = no
 }

WARNING: Ignoring "response_window = 30.000000", forcing to
"response_window = 7.000000"
 home_server vse_server1_prod {
     ipaddr = 10.14.135.145
     port = 1812
     type = "auth"
     secret = <<< secret >>>
     response_window = 30.000000
     response_timeouts = 1
     max_outstanding = 65536
     zombie_period = 40
     status_check = "request"
     ping_interval = 30
     check_interval = 6
     check_timeout = 4
     num_answers_to_alive = 3
     revive_interval = 300
     username = "orange-system"
     password = "incorrect"
  limit {
      max_connections = 16
      max_requests = 0
      lifetime = 0
      idle_timeout = 0
  }
  coa {
      irt = 2
      mrt = 16
      mrc = 5
      mrd = 30
  }
 }
WARNING: Ignoring "response_window = 30.000000", forcing to
"response_window = 7.000000"
 home_server vse_server2_prod {
     ipaddr = 10.14.135.146
     port = 1812
     type = "auth"
     secret = <<< secret >>>
     response_window = 30.000000
     response_timeouts = 1
     max_outstanding = 65536
     zombie_period = 40
     status_check = "request"
     ping_interval = 30
     check_interval = 6
     check_timeout = 4
     num_answers_to_alive = 3
     revive_interval = 300
     username = "orange-system"
     password = "incorrect"
  limit {
      max_connections = 16
      max_requests = 0
      lifetime = 0
      idle_timeout = 0
  }
  coa {
      irt = 2
      mrt = 16
      mrc = 5
      mrd = 30
  }
 }

WARNING: Ignoring "response_window = 30.000000", forcing to
"response_window = 7.000000"
 home_server_pool prod_pool_vse {
    type = load-balance
    home_server = vse_server1_prod
    home_server = vse_server2_prod
 }
 realm vsetest.sk {
    auth_pool = prod_pool_vse
    nostrip
 }
 realm vseazd.sk {
    auth_pool = prod_pool_vse
    nostrip
 }
 realm vseusec.sk {
    auth_pool = prod_pool_vse
    nostrip
 }
 realm vsegps.sk {
    auth_pool = prod_pool_vse
    nostrip
 }
 realm vsesec.sk {
    auth_pool = prod_pool_vse
    nostrip
 }
 realm vseewo.sk {
    auth_pool = prod_pool_vse
    nostrip
 }
 realm vseims.sk {
    auth_pool = prod_pool_vse
    nostrip
 }
 realm vsdvip.sk {
    auth_pool = prod_pool_vse
    nostrip
 }
 realm LOCAL {
    authhost = LOCAL
    accthost = LOCAL
 }
 realm NULL {
    authhost = LOCAL
    accthost = LOCAL
 }
 realm DEFAULT {
    authhost = LOCAL
    accthost = LOCAL
 }
radiusd: #### Loading Clients ####
 client localhost {
     ipaddr = 127.0.0.1
     require_message_authenticator = no
     secret = <<< secret >>>
     nas_type = "other"
     proto = "*"
  limit {
      max_connections = 16
      lifetime = 0
      idle_timeout = 30
  }
 }
Debugger not attached
 # Creating Auth-Type = PERL
 # Creating Auth-Type = PAP
 # Creating Auth-Type = CHAP
 # Creating Autz-Type = Status-Server
  # Instantiating module "files" from file
/app/radius/conf/auth-test/mods-enabled/files
reading pairlist file /app/radius/conf/auth-test/mods-config/files/authorize
reading pairlist file /app/radius/conf/auth-test/mods-config/files/authorize
reading pairlist file
/app/radius/conf/auth-test/mods-config/files/accounting
reading pairlist file /app/radius/conf/auth-test/mods-config/files/pre-proxy
  # Instantiating module "preprocess" from file
/app/radius/conf/auth-test/mods-enabled/preprocess
  # Instantiating module "attr_filter.post-proxy" from file
/app/radius/conf/auth-test/mods-enabled/attr_filter
reading pairlist file
/app/radius/conf/auth-test/mods-config/attr_filter/post-proxy
  # Instantiating module "attr_filter.pre-proxy" from file
/app/radius/conf/auth-test/mods-enabled/attr_filter
reading pairlist file
/app/radius/conf/auth-test/mods-config/attr_filter/pre-proxy
  # Instantiating module "attr_filter.access_reject" from file
/app/radius/conf/auth-test/mods-enabled/attr_filter
reading pairlist file
/app/radius/conf/auth-test/mods-config/attr_filter/access_reject
  # Instantiating module "attr_filter.access_challenge" from file
/app/radius/conf/auth-test/mods-enabled/attr_filter
reading pairlist file
/app/radius/conf/auth-test/mods-config/attr_filter/access_challenge
  # Instantiating module "attr_filter.accounting_response" from file
/app/radius/conf/auth-test/mods-enabled/attr_filter
reading pairlist file
/app/radius/conf/auth-test/mods-config/attr_filter/accounting_response
  # Instantiating module "reject" from file
/app/radius/conf/auth-test/mods-enabled/always
  # Instantiating module "fail" from file
/app/radius/conf/auth-test/mods-enabled/always
  # Instantiating module "ok" from file
/app/radius/conf/auth-test/mods-enabled/always
  # Instantiating module "handled" from file
/app/radius/conf/auth-test/mods-enabled/always
  # Instantiating module "invalid" from file
/app/radius/conf/auth-test/mods-enabled/always
  # Instantiating module "userlock" from file
/app/radius/conf/auth-test/mods-enabled/always
  # Instantiating module "notfound" from file
/app/radius/conf/auth-test/mods-enabled/always
  # Instantiating module "noop" from file
/app/radius/conf/auth-test/mods-enabled/always
  # Instantiating module "updated" from file
/app/radius/conf/auth-test/mods-enabled/always
radiusd: #### Loading Virtual Servers ####
server { # from file /app/radius/conf/auth-test/radiusd.conf
} # server
server default { # from file
/app/radius/conf/auth-test/sites-enabled/default
 # Loading authenticate {...}
 # Loading authorize {...}
 # Loading pre-proxy {...}
 # Loading post-auth {...}
} # server default
server status { # from file /app/radius/conf/auth-test/sites-enabled/status
 # Loading authorize {...}
} # server status
radiusd: #### Opening IP addresses and Ports ####
listen {
     type = "control"
 listen {
     socket = "/app/radius/conf/auth-test/control.socket"
     mode = "rw"
     peercred = yes
 }
}
listen {
      type = "auth"
      ipv4addr = *
      port = 10812
   limit {
       max_pps = 0
       max_connections = 16
       lifetime = 0
       idle_timeout = 30
   }
}
listen {
      type = "auth"
      ipv4addr = *
      port = 10645
   limit {
       max_pps = 0
       max_connections = 16
       lifetime = 0
       idle_timeout = 30
   }
}
listen {
      type = "status"
      ipaddr = 127.0.0.1
      port = 28121
  client admin {
      ipaddr = 127.0.0.1
      require_message_authenticator = no
      secret = <<< secret >>>
   limit {
       max_connections = 16
       lifetime = 0
       idle_timeout = 30
   }
  }
}
Listening on command file /app/radius/conf/auth-test/control.socket
Listening on auth address * port 10812 bound to server default
Listening on auth address * port 10645 bound to server default
Listening on status address 127.0.0.1 port 28121 bound to server status
Listening on proxy address * port 33049
Ready to process requests
(0) Received Status-Server Id 246 from 127.0.0.1:40048 to 127.0.0.1:28121
length 74
(0)   Message-Authenticator = 0x4c348183f7bb200825f992012e53b89e
(0)   FreeRADIUS-Statistics-Type = 131
(0)   FreeRADIUS-Stats-Server-IP-Address = 10.14.135.145
(0)   FreeRADIUS-Stats-Server-Port = 1812
(0) # Executing group from file
/app/radius/conf/auth-test/sites-enabled/status
(0)   Autz-Type Status-Server {
(0)     [ok] = ok
(0)   } # Autz-Type Status-Server = ok
(0) Sent Access-Accept Id 246 from 127.0.0.1:28121 to 127.0.0.1:40048
length 0
(0) Finished request
Waking up in 1.9 seconds.
(0) Cleaning up request packet ID 246 with timestamp +35


More information about the Freeradius-Users mailing list