<div dir="ltr">alan!! <br>and install the new version and the probe, probe with radtest and I get this:<br><br>Sending Access-Request of id 236 to <a href="http://127.0.0.1">127.0.0.1</a> port 1812<br> User-Name = "test"<br>
User-Password = "testing123"<br> NAS-IP-Address = <a href="http://10.30.1.104">10.30.1.104</a><br> NAS-Port = 1812<br>rad_recv: Access-Accept packet from host <a href="http://127.0.0.1">127.0.0.1</a> port 1812, id=236, length=20<br>
<br>its ok but...<br><br><br><br>radiusd -X run and I get this::<br clear="all"><br><br>FreeRADIUS Version 2.0.5, for host x86_64-unknown-linux-gnu, built on Sep 3 2008 at 17:32:08<br>Copyright (C) 1999-2008 The FreeRADIUS server project and contributors. <br>
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A <br>PARTICULAR PURPOSE. <br>You may redistribute copies of FreeRADIUS under the terms of the <br>GNU General Public License v2. <br>Starting - reading configuration files ...<br>
including configuration file /usr/local/etc/raddb/radiusd.conf<br>including configuration file /usr/local/etc/raddb/proxy.conf<br>including configuration file /usr/local/etc/raddb/clients.conf<br>including configuration file /usr/local/etc/raddb/snmp.conf<br>
including files in directory /usr/local/etc/raddb/modules/<br>including configuration file /usr/local/etc/raddb/modules/mac2vlan<br>including configuration file /usr/local/etc/raddb/modules/ldap<br>including configuration file /usr/local/etc/raddb/modules/smbpasswd<br>
including configuration file /usr/local/etc/raddb/modules/files<br>including configuration file /usr/local/etc/raddb/modules/policy<br>including configuration file /usr/local/etc/raddb/modules/echo<br>including configuration file /usr/local/etc/raddb/modules/passwd<br>
including configuration file /usr/local/etc/raddb/modules/expr<br>including configuration file /usr/local/etc/raddb/modules/attr_filter<br>including configuration file /usr/local/etc/raddb/modules/always<br>including configuration file /usr/local/etc/raddb/modules/realm<br>
including configuration file /usr/local/etc/raddb/modules/ippool<br>including configuration file /usr/local/etc/raddb/modules/preprocess<br>including configuration file /usr/local/etc/raddb/modules/chap<br>including configuration file /usr/local/etc/raddb/modules/unix<br>
including configuration file /usr/local/etc/raddb/modules/mschap<br>including configuration file /usr/local/etc/raddb/modules/radutmp<br>including configuration file /usr/local/etc/raddb/modules/detail<br>including configuration file /usr/local/etc/raddb/modules/expiration<br>
including configuration file /usr/local/etc/raddb/modules/pam<br>including configuration file /usr/local/etc/raddb/modules/checkval<br>including configuration file /usr/local/etc/raddb/modules/logintime<br>including configuration file /usr/local/etc/raddb/modules/pap<br>
including configuration file /usr/local/etc/raddb/modules/etc_group<br>including configuration file /usr/local/etc/raddb/modules/detail.log<br>including configuration file /usr/local/etc/raddb/modules/acct_unique<br>including configuration file /usr/local/etc/raddb/modules/mac2ip<br>
including configuration file /usr/local/etc/raddb/modules/digest<br>including configuration file /usr/local/etc/raddb/modules/attr_rewrite<br>including configuration file /usr/local/etc/raddb/modules/sradutmp<br>including configuration file /usr/local/etc/raddb/modules/krb5<br>
including configuration file /usr/local/etc/raddb/modules/exec<br>including configuration file /usr/local/etc/raddb/modules/sql_log<br>including configuration file /usr/local/etc/raddb/modules/counter<br>including configuration file /usr/local/etc/raddb/eap.conf<br>
including configuration file /usr/local/etc/raddb/sql.conf<br>including configuration file /usr/local/etc/raddb/sql/mysql/dialup.conf<br>including configuration file /usr/local/etc/raddb/sql/mysql/counter.conf<br>including configuration file /usr/local/etc/raddb/policy.conf<br>
including files in directory /usr/local/etc/raddb/sites-enabled/<br>including configuration file /usr/local/etc/raddb/sites-enabled/inner-tunnel<br>including configuration file /usr/local/etc/raddb/sites-enabled/default<br>
including dictionary file /usr/local/etc/raddb/dictionary<br>main {<br> prefix = "/usr/local"<br> localstatedir = "/usr/local/var"<br> logdir = "/usr/local/var/log/radius"<br>
libdir = "/usr/local/lib"<br> radacctdir = "/usr/local/var/log/radius/radacct"<br> hostname_lookups = no<br> max_request_time = 30<br> cleanup_delay = 5<br> max_requests = 1024<br>
allow_core_dumps = no<br> pidfile = "/usr/local/var/run/radiusd/radiusd.pid"<br> checkrad = "/usr/local/sbin/checkrad"<br> debug_level = 0<br> proxy_requests = yes<br>
log {<br> stripped_names = no<br> auth = no<br> auth_badpass = no<br> auth_goodpass = no<br> }<br>}<br> client <a href="http://10.0.6.29">10.0.6.29</a> {<br> require_message_authenticator = no<br>
secret = "testing123"<br> shortname = "ap"<br> }<br> client localhost {<br> ipaddr = <a href="http://127.0.0.1">127.0.0.1</a><br> require_message_authenticator = no<br> secret = "testing123"<br>
nastype = "other"<br> }<br>radiusd: #### Loading Realms and Home Servers ####<br> proxy server {<br> retry_delay = 5<br> retry_count = 3<br> default_fallback = no<br> dead_time = 120<br>
wake_all_if_all_dead = no<br> }<br> home_server localhost {<br> ipaddr = <a href="http://127.0.0.1">127.0.0.1</a><br> port = 1812<br> type = "auth"<br> secret = "testing123"<br>
response_window = 20<br> max_outstanding = 65536<br> zombie_period = 40<br> status_check = "status-server"<br> ping_check = "none"<br> ping_interval = 30<br> check_interval = 30<br>
num_answers_to_alive = 3<br> num_pings_to_alive = 3<br> revive_interval = 120<br> status_check_timeout = 4<br> }<br> home_server_pool my_auth_failover {<br> type = fail-over<br> home_server = localhost<br>
}<br> realm <a href="http://example.com">example.com</a> {<br> auth_pool = my_auth_failover<br> }<br> realm LOCAL {<br> }<br>radiusd: #### Instantiating modules ####<br> instantiate {<br> Module: Linked to module rlm_exec<br>
Module: Instantiating exec<br> exec {<br> wait = no<br> input_pairs = "request"<br> shell_escape = yes<br> }<br> Module: Linked to module rlm_expr<br> Module: Instantiating expr<br> Module: Linked to module rlm_expiration<br>
Module: Instantiating expiration<br> expiration {<br> reply-message = "Password Has Expired "<br> }<br> Module: Linked to module rlm_logintime<br> Module: Instantiating logintime<br> logintime {<br> reply-message = "You are calling outside your allowed timespan "<br>
minimum-timeout = 60<br> }<br> }<br>radiusd: #### Loading Virtual Servers ####<br>server inner-tunnel {<br> modules {<br> Module: Checking authenticate {...} for more modules to load<br> Module: Linked to module rlm_pap<br>
Module: Instantiating pap<br> pap {<br> encryption_scheme = "auto"<br> auto_header = no<br> }<br> Module: Linked to module rlm_chap<br> Module: Instantiating chap<br> Module: Linked to module rlm_mschap<br>
Module: Instantiating mschap<br> mschap {<br> use_mppe = yes<br> require_encryption = no<br> require_strong = no<br> with_ntdomain_hack = no<br> }<br> Module: Linked to module rlm_unix<br> Module: Instantiating unix<br>
unix {<br> radwtmp = "/usr/local/var/log/radius/radwtmp"<br> }<br> Module: Linked to module rlm_eap<br> Module: Instantiating eap<br> eap {<br> default_eap_type = "md5"<br> timer_expire = 60<br>
ignore_unknown_eap_types = no<br> cisco_accounting_username_bug = no<br> }<br> Module: Linked to sub-module rlm_eap_md5<br> Module: Instantiating eap-md5<br> Module: Linked to sub-module rlm_eap_leap<br> Module: Instantiating eap-leap<br>
Module: Linked to sub-module rlm_eap_gtc<br> Module: Instantiating eap-gtc<br> gtc {<br> challenge = "Password: "<br> auth_type = "PAP"<br> }<br> Module: Linked to sub-module rlm_eap_tls<br>
Module: Instantiating eap-tls<br> tls {<br> rsa_key_exchange = no<br> dh_key_exchange = yes<br> rsa_key_length = 512<br> dh_key_length = 512<br> verify_depth = 0<br> pem_file_type = yes<br>
private_key_file = "/usr/local/etc/raddb/certs/server.pem"<br> certificate_file = "/usr/local/etc/raddb/certs/server.pem"<br> CA_file = "/usr/local/etc/raddb/certs/ca.pem"<br>
private_key_password = "whatever"<br> dh_file = "/usr/local/etc/raddb/certs/dh"<br> random_file = "/usr/local/etc/raddb/certs/random"<br> fragment_size = 1024<br>
include_length = yes<br> check_crl = no<br> cipher_list = "DEFAULT"<br> make_cert_command = "/usr/local/etc/raddb/certs/bootstrap"<br> }<br>Generating a 2048 bit RSA private key<br>
........................................................................................................................................................................................................................................................................................................+++<br>
.....+++<br>unable to write 'random state'<br>writing new private key to 'ca.key'<br>-----<br>Generating a 2048 bit RSA private key<br>.......+++<br>..................................+++<br>unable to write 'random state'<br>
writing new private key to 'server.key'<br>-----<br>Using configuration from ./server.cnf<br>Check that the request matches the signature<br>Signature ok<br>Certificate Details:<br> Serial Number: 1 (0x1)<br>
Validity<br> Not Before: Sep 3 20:51:16 2008 GMT<br> Not After : Sep 3 20:51:16 2009 GMT<br> Subject:<br> countryName = FR<br> stateOrProvinceName = Radius<br>
organizationName = Example Inc.<br> commonName = Example Server Certificate<br> emailAddress = <a href="mailto:admin@example.com">admin@example.com</a><br>
X509v3 extensions:<br> X509v3 Extended Key Usage: <br> TLS Web Server Authentication<br>Certificate is to be certified until Sep 3 20:51:16 2009 GMT (365 days)<br><br>Write out database with 1 new entries<br>
Data Base Updated<br>unable to write 'random state'<br>unable to write 'random state'<br>MAC verified OK<br>Generating DH parameters, 1024 bit long safe prime, generator 2<br>This is going to take a long time<br>
<br>*****************************+*************************+****************************** ...<br><br>unable to write 'random state'<br>Exec-Program output: openssl req -new -x509 -keyout ca.key -out ca.pem -config ./ca.cnf openssl x509 -inform PEM -outform DER -in ca.pem -out ca.der openssl req -new -out server.csr -keyout server.key -config ./server.cnf openssl ca -batch -keyfile ca.key -cert ca.pem -in server.csr -key `grep output_password ca.cnf | sed 's/.*=//;s/^ *//'` -out server.crt -extensions xpserver_ext -extfile xpextensions -config ./server.cnf openssl pkcs12 -export -in server.crt -inkey server.key -out server.p12 -passin pass:`grep output_password server.cnf | sed 's/.*=//;s/^ *//'` -passout pass:`grep output_password server.cnf | sed 's/.*=//;s/^ *//'` openssl pkcs12 -in server.p12 -out server.pem -passin pass:`grep output_password server.cnf | sed 's/.*=//;s/^ *//'` -passout pass:`grep output_password server.cnf | sed 's/.*=//;s/^ *//'` openssl dhparam -out dh 1024 <br>
Exec-Program-Wait: plaintext: openssl req -new -x509 -keyout ca.key -out ca.pem -config ./ca.cnf openssl x509 -inform PEM -outform DER -in ca.pem -out ca.der openssl req -new -out server.csr -keyout server.key -config ./server.cnf openssl ca -batch -keyfile ca.key -cert ca.pem -in server.csr -key `grep output_password ca.cnf | sed 's/.*=//;s/^ *//'` -out server.crt -extensions xpserver_ext -extfile xpextensions -config ./server.cnf openssl pkcs12 -export -in server.crt -inkey server.key -out server.p12 -passin pass:`grep output_password server.cnf | sed 's/.*=//;s/^ *//'` -passout pass:`grep output_password server.cnf | sed 's/.*=//;s/^ *//'` openssl pkcs12 -in server.p12 -out server.pem -passin pass:`grep output_password server.cnf | sed 's/.*=//;s/^ *//'` -passout pass:`grep output_password server.cnf | sed 's/.*=//;s/^ *//'` openssl dhparam -out dh 1024 <br>
Exec-Program: returned: 0<br> Module: Linked to sub-module rlm_eap_ttls<br> Module: Instantiating eap-ttls<br> ttls {<br> default_eap_type = "md5"<br> copy_request_to_tunnel = no<br> use_tunneled_reply = no<br>
virtual_server = "inner-tunnel"<br> }<br> Module: Linked to sub-module rlm_eap_peap<br> Module: Instantiating eap-peap<br> peap {<br> default_eap_type = "mschapv2"<br> copy_request_to_tunnel = no<br>
use_tunneled_reply = no<br> proxy_tunneled_request_as_eap = yes<br> virtual_server = "inner-tunnel"<br> }<br> Module: Linked to sub-module rlm_eap_mschapv2<br> Module: Instantiating eap-mschapv2<br>
mschapv2 {<br> with_ntdomain_hack = no<br> }<br> Module: Checking authorize {...} for more modules to load<br> Module: Linked to module rlm_realm<br> Module: Instantiating suffix<br> realm suffix {<br> format = "suffix"<br>
delimiter = "@"<br> ignore_default = no<br> ignore_null = no<br> }<br> Module: Linked to module rlm_files<br> Module: Instantiating files<br> files {<br> usersfile = "/usr/local/etc/raddb/users"<br>
acctusersfile = "/usr/local/etc/raddb/acct_users"<br> preproxy_usersfile = "/usr/local/etc/raddb/preproxy_users"<br> compat = "no"<br> }<br> Module: Checking session {...} for more modules to load<br>
Module: Linked to module rlm_radutmp<br> Module: Instantiating radutmp<br> radutmp {<br> filename = "/usr/local/var/log/radius/radutmp"<br> username = "%{User-Name}"<br> case_sensitive = yes<br>
check_with_nas = yes<br> perm = 384<br> callerid = yes<br> }<br> Module: Checking post-proxy {...} for more modules to load<br> Module: Checking post-auth {...} for more modules to load<br> Module: Linked to module rlm_attr_filter<br>
Module: Instantiating attr_filter.access_reject<br> attr_filter attr_filter.access_reject {<br> attrsfile = "/usr/local/etc/raddb/attrs.access_reject"<br> key = "%{User-Name}"<br> }<br>
}<br>}<br>server {<br> modules {<br> Module: Checking authenticate {...} for more modules to load<br> Module: Checking authorize {...} for more modules to load<br> Module: Linked to module rlm_preprocess<br> Module: Instantiating preprocess<br>
preprocess {<br> huntgroups = "/usr/local/etc/raddb/huntgroups"<br> hints = "/usr/local/etc/raddb/hints"<br> with_ascend_hack = no<br> ascend_channels_per_line = 23<br> with_ntdomain_hack = no<br>
with_specialix_jetstream_hack = no<br> with_cisco_vsa_hack = no<br> with_alvarion_vsa_hack = no<br> }<br> Module: Checking preacct {...} for more modules to load<br> Module: Linked to module rlm_acct_unique<br>
Module: Instantiating acct_unique<br> acct_unique {<br> key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port"<br> }<br> Module: Checking accounting {...} for more modules to load<br>
Module: Linked to module rlm_detail<br> Module: Instantiating detail<br> detail {<br> detailfile = "/usr/local/var/log/radius/radacct/%{Client-IP-Address}/detail-%Y%m%d"<br> header = "%t"<br>
detailperm = 384<br> dirperm = 493<br> locking = no<br> log_packet_header = no<br> }<br> Module: Instantiating attr_filter.accounting_response<br> attr_filter attr_filter.accounting_response {<br>
attrsfile = "/usr/local/etc/raddb/attrs.accounting_response"<br> key = "%{User-Name}"<br> }<br> Module: Checking session {...} for more modules to load<br> Module: Checking post-proxy {...} for more modules to load<br>
Module: Checking post-auth {...} for more modules to load<br> }<br>}<br>radiusd: #### Opening IP addresses and Ports ####<br>listen {<br> type = "auth"<br> ipaddr = *<br> port = 0<br>ERROR: Failed to open socket: cannot bind socket: Address already in use<br>
/usr/local/etc/raddb/radiusd.conf[236]: Error binding to port for <a href="http://0.0.0.0">0.0.0.0</a> port 1812<br><br><br><br><br><br>¿a que se debe este error?<br><br><br>Why is this wrong?<br>
</div>