FreeRADIUS Version 3.0.13 Copyright (C) 1999-2017 The FreeRADIUS server project and contributors There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE You may redistribute copies of FreeRADIUS under the terms of the GNU General Public License For more information about these matters, see the file named COPYRIGHT Starting - reading configuration files ... including dictionary file /usr/local/radius/share/freeradius/dictionary including dictionary file /usr/local/radius/share/freeradius/dictionary.dhcp including dictionary file /usr/local/radius/share/freeradius/dictionary.vqp including dictionary file /usr/local/radius/etc/raddb/dictionary including configuration file /usr/local/radius/etc/raddb/radiusd.conf including configuration file /usr/local/radius/etc/raddb/proxy.conf including configuration file /usr/local/radius/etc/raddb/clients.conf including files in directory /usr/local/radius/etc/raddb/mods-enabled/ including configuration file /usr/local/radius/etc/raddb/mods-enabled/always including configuration file /usr/local/radius/etc/raddb/mods-enabled/attr_filter including configuration file /usr/local/radius/etc/raddb/mods-enabled/cache_eap including configuration file /usr/local/radius/etc/raddb/mods-enabled/chap including configuration file /usr/local/radius/etc/raddb/mods-enabled/detail including configuration file /usr/local/radius/etc/raddb/mods-enabled/detail.log including configuration file /usr/local/radius/etc/raddb/mods-enabled/digest including configuration file /usr/local/radius/etc/raddb/mods-enabled/dynamic_clients including configuration file /usr/local/radius/etc/raddb/mods-enabled/echo including configuration file /usr/local/radius/etc/raddb/mods-enabled/exec including configuration file /usr/local/radius/etc/raddb/mods-enabled/expiration including configuration file /usr/local/radius/etc/raddb/mods-enabled/expr including configuration file /usr/local/radius/etc/raddb/mods-enabled/files including configuration file /usr/local/radius/etc/raddb/mods-enabled/linelog including configuration file /usr/local/radius/etc/raddb/mods-enabled/logintime including configuration file /usr/local/radius/etc/raddb/mods-enabled/mschap including configuration file /usr/local/radius/etc/raddb/mods-enabled/ntlm_auth including configuration file /usr/local/radius/etc/raddb/mods-enabled/pap including configuration file /usr/local/radius/etc/raddb/mods-enabled/passwd including configuration file /usr/local/radius/etc/raddb/mods-enabled/preprocess including configuration file /usr/local/radius/etc/raddb/mods-enabled/radutmp including configuration file /usr/local/radius/etc/raddb/mods-enabled/realm including configuration file /usr/local/radius/etc/raddb/mods-enabled/replicate including configuration file /usr/local/radius/etc/raddb/mods-enabled/soh including configuration file /usr/local/radius/etc/raddb/mods-enabled/sradutmp including configuration file /usr/local/radius/etc/raddb/mods-enabled/unix including configuration file /usr/local/radius/etc/raddb/mods-enabled/unpack including configuration file /usr/local/radius/etc/raddb/mods-enabled/utf8 including files in directory /usr/local/radius/etc/raddb/policy.d/ including configuration file /usr/local/radius/etc/raddb/policy.d/accounting including configuration file /usr/local/radius/etc/raddb/policy.d/canonicalization including configuration file /usr/local/radius/etc/raddb/policy.d/control including configuration file /usr/local/radius/etc/raddb/policy.d/cui including configuration file /usr/local/radius/etc/raddb/policy.d/debug including configuration file /usr/local/radius/etc/raddb/policy.d/dhcp including configuration file /usr/local/radius/etc/raddb/policy.d/eap including configuration file /usr/local/radius/etc/raddb/policy.d/filter including configuration file /usr/local/radius/etc/raddb/policy.d/operator-name including files in directory /usr/local/radius/etc/raddb/sites-enabled/ including configuration file /usr/local/radius/etc/raddb/sites-enabled/hknet including configuration file /usr/local/radius/etc/raddb/sites-enabled/tls main { security { user = "radiusd" group = "radiusd" allow_core_dumps = no } name = "radiusd" prefix = "/usr/local/radius" localstatedir = "/var" logdir = "/var/log/radius" run_dir = "/var/run/radiusd" } main { name = "radiusd" prefix = "/usr/local/radius" localstatedir = "/var" sbindir = "/usr/sbin" logdir = "/var/log/radius" run_dir = "/var/run/radiusd" libdir = "/usr/local/radius/lib/" radacctdir = "/var/log/radius/radacct" hostname_lookups = no max_request_time = 30 cleanup_delay = 10 max_requests = 4096 pidfile = "/var/run/radiusd/radiusd.pid" checkrad = "/usr/sbin/checkrad" debug_level = 0 proxy_requests = yes log { stripped_names = no auth = yes auth_badpass = no auth_goodpass = no colourise = yes msg_denied = "You are already logged in - access denied" } resources { } security { max_attributes = 200 reject_delay = 1.000000 status_server = yes allow_vulnerable_openssl = "CVE-2016-6304" } } radiusd: #### Loading Realms and Home Servers #### proxy server { retry_delay = 5 retry_count = 3 default_fallback = no dead_time = 120 wake_all_if_all_dead = no } home_server localhost { ipaddr = 127.0.0.1 port = 1812 type = "auth" secret = <<< secret >>> response_window = 15.000000 response_timeouts = 1 max_outstanding = 65536 zombie_period = 40 status_check = "status-server" ping_interval = 30 check_interval = 30 check_timeout = 4 num_answers_to_alive = 3 revive_interval = 120 limit { max_connections = 32 max_requests = 0 lifetime = 0 idle_timeout = 0 } coa { irt = 2 mrt = 16 mrc = 5 mrd = 30 } } home_server cuni-tls1 { ipaddr = 195.113.15.22 port = 2083 type = "auth" proto = "tcp" secret = <<< secret >>> response_window = 5.000000 response_timeouts = 1 max_outstanding = 65536 zombie_period = 30 status_check = "none" ping_interval = 30 check_timeout = 4 num_answers_to_alive = 3 revive_interval = 300 limit { max_connections = 16 max_requests = 0 lifetime = 0 idle_timeout = 0 } coa { irt = 2 mrt = 16 mrc = 5 mrd = 30 } } tls { verify_depth = 0 pem_file_type = yes private_key_file = "/usr/local/radius/etc/raddb/certs/radius2.hknet.cz.key" certificate_file = "/usr/local/radius/etc/raddb/certs/radius2.hknet.cz.crt" ca_file = "/usr/local/radius/etc/raddb/certs/ca.pem" fragment_size = 8192 include_length = yes check_crl = no ecdh_curve = "prime256v1" } home_server cuni-tls2 { ipaddr = 195.113.44.19 port = 2083 type = "auth" proto = "tcp" secret = <<< secret >>> response_window = 5.000000 response_timeouts = 1 max_outstanding = 65536 zombie_period = 30 status_check = "none" ping_interval = 30 check_timeout = 4 num_answers_to_alive = 3 revive_interval = 300 limit { max_connections = 16 max_requests = 0 lifetime = 0 idle_timeout = 0 } coa { irt = 2 mrt = 16 mrc = 5 mrd = 30 } } tls { verify_depth = 0 pem_file_type = yes private_key_file = "/usr/local/radius/etc/raddb/certs/radius2.hknet.cz.key" certificate_file = "/usr/local/radius/etc/raddb/certs/radius2.hknet.cz.crt" ca_file = "/usr/local/radius/etc/raddb/certs/ca.pem" fragment_size = 8192 include_length = yes check_crl = no ecdh_curve = "prime256v1" } home_server cesnet-tls1 { ipaddr = 195.113.187.22 port = 2083 type = "auth" proto = "tcp" secret = <<< secret >>> response_window = 30.000000 response_timeouts = 1000 max_outstanding = 65536 zombie_period = 120 status_check = "none" ping_interval = 30 check_timeout = 4 num_answers_to_alive = 3 revive_interval = 60 limit { max_connections = 16 max_requests = 0 lifetime = 0 idle_timeout = 0 } coa { irt = 2 mrt = 16 mrc = 5 mrd = 30 } } tls { verify_depth = 0 pem_file_type = yes private_key_file = "/usr/local/radius/etc/raddb/certs/radius2.hknet.cz.key" certificate_file = "/usr/local/radius/etc/raddb/certs/radius2.hknet.cz.crt" ca_file = "/usr/local/radius/etc/raddb/certs/ca.pem" fragment_size = 8192 include_length = yes check_crl = no ecdh_curve = "prime256v1" } realm LOCAL { } realm faf.cuni.cz { nostrip authhost = 195.113.116.7 secret = <<< secret >>> } realm faf.cuni.cz { authhost = 195.113.116.11 secret = <<< secret >>> } # realm faf.cuni.cz realm uhk.cz { nostrip authhost = 195.113.118.38 secret = <<< secret >>> } realm uhk.cz { authhost = 195.113.118.14 secret = <<< secret >>> } # realm uhk.cz realm NULL { virtual_server = auth-reject } home_server_pool cuni-tls { type = fail-over home_server = cuni-tls1 home_server = cuni-tls2 } realm uvtuk.cuni.cz { auth_pool = cuni-tls nostrip } realm ruk.cuni.cz { auth_pool = cuni-tls nostrip } realm jinonice.cuni.cz { auth_pool = cuni-tls nostrip } realm student.cuni.cz { auth_pool = cuni-tls nostrip } realm staff.cuni.cz { auth_pool = cuni-tls nostrip } realm cuni.cz { auth_pool = cuni-tls nostrip } realm ldap.cuni.cz { auth_pool = cuni-tls nostrip } realm prf.cuni.cz { auth_pool = cuni-tls nostrip } realm karlov.mff.cuni.cz { auth_pool = cuni-tls nostrip } realm ms.mff.cuni.cz { auth_pool = cuni-tls nostrip } home_server_pool cesnet-tls { type = fail-over home_server = cesnet-tls1 } realm ~.+$ { auth_pool = cesnet-tls nostrip } home_server_pool my_auth_failover { type = fail-over home_server = localhost } radiusd: #### Loading Clients #### client localhost { ipaddr = 127.0.0.1 require_message_authenticator = no secret = <<< secret >>> nas_type = "other" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client ermon.cesnet.cz { ipaddr = 195.113.233.246 require_message_authenticator = no secret = <<< secret >>> nas_type = "other" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client wlc1 { ipaddr = 192.168.100.41 require_message_authenticator = no secret = <<< secret >>> shortname = "wlc1.hknet.cz" nas_type = "other" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client wlc2 { ipaddr = 192.168.100.42 require_message_authenticator = no secret = <<< secret >>> shortname = "wlc2.hknet.cz" nas_type = "other" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client wlc3 { ipaddr = 192.168.100.43 require_message_authenticator = no secret = <<< secret >>> shortname = "wlc3.hknet.cz" nas_type = "other" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } Debugger not attached # Creating Auth-Type = digest # Creating Auth-Type = PAP # Creating Auth-Type = CHAP # Creating Auth-Type = MS-CHAP radiusd: #### Instantiating modules #### modules { # Loaded module rlm_always # Loading module "reject" from file /usr/local/radius/etc/raddb/mods-enabled/always always reject { rcode = "reject" simulcount = 0 mpp = no } # Loading module "fail" from file /usr/local/radius/etc/raddb/mods-enabled/always always fail { rcode = "fail" simulcount = 0 mpp = no } # Loading module "ok" from file /usr/local/radius/etc/raddb/mods-enabled/always always ok { rcode = "ok" simulcount = 0 mpp = no } # Loading module "handled" from file /usr/local/radius/etc/raddb/mods-enabled/always always handled { rcode = "handled" simulcount = 0 mpp = no } # Loading module "invalid" from file /usr/local/radius/etc/raddb/mods-enabled/always always invalid { rcode = "invalid" simulcount = 0 mpp = no } # Loading module "userlock" from file /usr/local/radius/etc/raddb/mods-enabled/always always userlock { rcode = "userlock" simulcount = 0 mpp = no } # Loading module "notfound" from file /usr/local/radius/etc/raddb/mods-enabled/always always notfound { rcode = "notfound" simulcount = 0 mpp = no } # Loading module "noop" from file /usr/local/radius/etc/raddb/mods-enabled/always always noop { rcode = "noop" simulcount = 0 mpp = no } # Loading module "updated" from file /usr/local/radius/etc/raddb/mods-enabled/always always updated { rcode = "updated" simulcount = 0 mpp = no } # Loaded module rlm_attr_filter # Loading module "attr_filter.post-proxy" from file /usr/local/radius/etc/raddb/mods-enabled/attr_filter attr_filter attr_filter.post-proxy { filename = "/usr/local/radius/etc/raddb/mods-config/attr_filter/post-proxy" key = "%{Realm}" relaxed = no } # Loading module "attr_filter.pre-proxy" from file /usr/local/radius/etc/raddb/mods-enabled/attr_filter attr_filter attr_filter.pre-proxy { filename = "/usr/local/radius/etc/raddb/mods-config/attr_filter/pre-proxy" key = "%{Realm}" relaxed = no } # Loading module "attr_filter.access_reject" from file /usr/local/radius/etc/raddb/mods-enabled/attr_filter attr_filter attr_filter.access_reject { filename = "/usr/local/radius/etc/raddb/mods-config/attr_filter/access_reject" key = "%{User-Name}" relaxed = no } # Loading module "attr_filter.access_challenge" from file /usr/local/radius/etc/raddb/mods-enabled/attr_filter attr_filter attr_filter.access_challenge { filename = "/usr/local/radius/etc/raddb/mods-config/attr_filter/access_challenge" key = "%{User-Name}" relaxed = no } # Loading module "attr_filter.accounting_response" from file /usr/local/radius/etc/raddb/mods-enabled/attr_filter attr_filter attr_filter.accounting_response { filename = "/usr/local/radius/etc/raddb/mods-config/attr_filter/accounting_response" key = "%{User-Name}" relaxed = no } # Loaded module rlm_cache # Loading module "cache_eap" from file /usr/local/radius/etc/raddb/mods-enabled/cache_eap cache cache_eap { driver = "rlm_cache_rbtree" key = "%{%{control:State}:-%{%{reply:State}:-%{State}}}" ttl = 15 max_entries = 0 epoch = 0 add_stats = no } # Loaded module rlm_chap # Loading module "chap" from file /usr/local/radius/etc/raddb/mods-enabled/chap # Loaded module rlm_detail # Loading module "detail" from file /usr/local/radius/etc/raddb/mods-enabled/detail detail { filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loading module "auth_log" from file /usr/local/radius/etc/raddb/mods-enabled/detail.log detail auth_log { filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loading module "reply_log" from file /usr/local/radius/etc/raddb/mods-enabled/detail.log detail reply_log { filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loading module "pre_proxy_log" from file /usr/local/radius/etc/raddb/mods-enabled/detail.log detail pre_proxy_log { filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loading module "post_proxy_log" from file /usr/local/radius/etc/raddb/mods-enabled/detail.log detail post_proxy_log { filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loaded module rlm_digest # Loading module "digest" from file /usr/local/radius/etc/raddb/mods-enabled/digest # Loaded module rlm_dynamic_clients # Loading module "dynamic_clients" from file /usr/local/radius/etc/raddb/mods-enabled/dynamic_clients # Loaded module rlm_exec # Loading module "echo" from file /usr/local/radius/etc/raddb/mods-enabled/echo exec echo { wait = yes program = "/bin/echo %{User-Name}" input_pairs = "request" output_pairs = "reply" shell_escape = yes } # Loading module "exec" from file /usr/local/radius/etc/raddb/mods-enabled/exec exec { wait = no input_pairs = "request" shell_escape = yes timeout = 10 } # Loaded module rlm_expiration # Loading module "expiration" from file /usr/local/radius/etc/raddb/mods-enabled/expiration # Loaded module rlm_expr # Loading module "expr" from file /usr/local/radius/etc/raddb/mods-enabled/expr expr { safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /" } # Loaded module rlm_files # Loading module "files" from file /usr/local/radius/etc/raddb/mods-enabled/files files { filename = "/usr/local/radius/etc/raddb/mods-config/files/authorize" usersfile = "/usr/local/radius/etc/raddb/mods-config/files/authorize" acctusersfile = "/usr/local/radius/etc/raddb/mods-config/files/accounting" preproxy_usersfile = "/usr/local/radius/etc/raddb/mods-config/files/pre-proxy" } # Loaded module rlm_linelog # Loading module "linelog" from file /usr/local/radius/etc/raddb/mods-enabled/linelog linelog { filename = "/var/log/radius/linelog" escape_filenames = no syslog_severity = "info" permissions = 384 format = "This is a log message for %{User-Name}" reference = "messages.%{%{Packet-Type}:-default}" } # Loading module "log_accounting" from file /usr/local/radius/etc/raddb/mods-enabled/linelog linelog log_accounting { filename = "/var/log/radius/linelog-accounting" escape_filenames = no syslog_severity = "info" permissions = 384 format = "" reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}" } # Loaded module rlm_logintime # Loading module "logintime" from file /usr/local/radius/etc/raddb/mods-enabled/logintime logintime { minimum_timeout = 60 } # Loaded module rlm_mschap # Loading module "mschap" from file /usr/local/radius/etc/raddb/mods-enabled/mschap mschap { use_mppe = yes require_encryption = no require_strong = no with_ntdomain_hack = yes passchange { } allow_retry = yes winbind_retry_with_normalised_username = no } # Loading module "ntlm_auth" from file /usr/local/radius/etc/raddb/mods-enabled/ntlm_auth exec ntlm_auth { wait = yes program = "/path/to/ntlm_auth --request-nt-key --domain=MYDOMAIN --username=%{mschap:User-Name} --password=%{User-Password}" shell_escape = yes } # Loaded module rlm_pap # Loading module "pap" from file /usr/local/radius/etc/raddb/mods-enabled/pap pap { normalise = yes } # Loaded module rlm_passwd # Loading module "etc_passwd" from file /usr/local/radius/etc/raddb/mods-enabled/passwd passwd etc_passwd { filename = "/etc/passwd" format = "*User-Name:Crypt-Password:" delimiter = ":" ignore_nislike = no ignore_empty = yes allow_multiple_keys = no hash_size = 100 } # Loaded module rlm_preprocess # Loading module "preprocess" from file /usr/local/radius/etc/raddb/mods-enabled/preprocess preprocess { huntgroups = "/usr/local/radius/etc/raddb/mods-config/preprocess/huntgroups" hints = "/usr/local/radius/etc/raddb/mods-config/preprocess/hints" with_ascend_hack = no ascend_channels_per_line = 23 with_ntdomain_hack = no with_specialix_jetstream_hack = no with_cisco_vsa_hack = no with_alvarion_vsa_hack = no } # Loaded module rlm_radutmp # Loading module "radutmp" from file /usr/local/radius/etc/raddb/mods-enabled/radutmp radutmp { filename = "/var/log/radius/radutmp" username = "%{User-Name}" case_sensitive = yes check_with_nas = yes permissions = 384 caller_id = yes } # Loaded module rlm_realm # Loading module "IPASS" from file /usr/local/radius/etc/raddb/mods-enabled/realm realm IPASS { format = "prefix" delimiter = "/" ignore_default = no ignore_null = no } # Loading module "suffix" from file /usr/local/radius/etc/raddb/mods-enabled/realm realm suffix { format = "suffix" delimiter = "@" ignore_default = no ignore_null = no } # Loading module "realmpercent" from file /usr/local/radius/etc/raddb/mods-enabled/realm realm realmpercent { format = "suffix" delimiter = "%" ignore_default = no ignore_null = no } # Loading module "ntdomain" from file /usr/local/radius/etc/raddb/mods-enabled/realm realm ntdomain { format = "prefix" delimiter = "\" ignore_default = no ignore_null = no } # Loaded module rlm_replicate # Loading module "replicate" from file /usr/local/radius/etc/raddb/mods-enabled/replicate # Loaded module rlm_soh # Loading module "soh" from file /usr/local/radius/etc/raddb/mods-enabled/soh soh { dhcp = yes } # Loading module "sradutmp" from file /usr/local/radius/etc/raddb/mods-enabled/sradutmp radutmp sradutmp { filename = "/var/log/radius/sradutmp" username = "%{User-Name}" case_sensitive = yes check_with_nas = yes permissions = 420 caller_id = no } # Loaded module rlm_unix # Loading module "unix" from file /usr/local/radius/etc/raddb/mods-enabled/unix unix { radwtmp = "/var/log/radius/radwtmp" } Creating attribute Unix-Group # Loaded module rlm_unpack # Loading module "unpack" from file /usr/local/radius/etc/raddb/mods-enabled/unpack # Loaded module rlm_utf8 # Loading module "utf8" from file /usr/local/radius/etc/raddb/mods-enabled/utf8 instantiate { } # Instantiating module "reject" from file /usr/local/radius/etc/raddb/mods-enabled/always # Instantiating module "fail" from file /usr/local/radius/etc/raddb/mods-enabled/always # Instantiating module "ok" from file /usr/local/radius/etc/raddb/mods-enabled/always # Instantiating module "handled" from file /usr/local/radius/etc/raddb/mods-enabled/always # Instantiating module "invalid" from file /usr/local/radius/etc/raddb/mods-enabled/always # Instantiating module "userlock" from file /usr/local/radius/etc/raddb/mods-enabled/always # Instantiating module "notfound" from file /usr/local/radius/etc/raddb/mods-enabled/always # Instantiating module "noop" from file /usr/local/radius/etc/raddb/mods-enabled/always # Instantiating module "updated" from file /usr/local/radius/etc/raddb/mods-enabled/always # Instantiating module "attr_filter.post-proxy" from file /usr/local/radius/etc/raddb/mods-enabled/attr_filter reading pairlist file /usr/local/radius/etc/raddb/mods-config/attr_filter/post-proxy # Instantiating module "attr_filter.pre-proxy" from file /usr/local/radius/etc/raddb/mods-enabled/attr_filter reading pairlist file /usr/local/radius/etc/raddb/mods-config/attr_filter/pre-proxy # Instantiating module "attr_filter.access_reject" from file /usr/local/radius/etc/raddb/mods-enabled/attr_filter reading pairlist file /usr/local/radius/etc/raddb/mods-config/attr_filter/access_reject # Instantiating module "attr_filter.access_challenge" from file /usr/local/radius/etc/raddb/mods-enabled/attr_filter reading pairlist file /usr/local/radius/etc/raddb/mods-config/attr_filter/access_challenge # Instantiating module "attr_filter.accounting_response" from file /usr/local/radius/etc/raddb/mods-enabled/attr_filter reading pairlist file /usr/local/radius/etc/raddb/mods-config/attr_filter/accounting_response # Instantiating module "cache_eap" from file /usr/local/radius/etc/raddb/mods-enabled/cache_eap rlm_cache (cache_eap): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked # Instantiating module "detail" from file /usr/local/radius/etc/raddb/mods-enabled/detail # Instantiating module "auth_log" from file /usr/local/radius/etc/raddb/mods-enabled/detail.log rlm_detail (auth_log): 'User-Password' suppressed, will not appear in detail output # Instantiating module "reply_log" from file /usr/local/radius/etc/raddb/mods-enabled/detail.log # Instantiating module "pre_proxy_log" from file /usr/local/radius/etc/raddb/mods-enabled/detail.log # Instantiating module "post_proxy_log" from file /usr/local/radius/etc/raddb/mods-enabled/detail.log # Instantiating module "expiration" from file /usr/local/radius/etc/raddb/mods-enabled/expiration # Instantiating module "files" from file /usr/local/radius/etc/raddb/mods-enabled/files reading pairlist file /usr/local/radius/etc/raddb/mods-config/files/authorize reading pairlist file /usr/local/radius/etc/raddb/mods-config/files/authorize reading pairlist file /usr/local/radius/etc/raddb/mods-config/files/accounting reading pairlist file /usr/local/radius/etc/raddb/mods-config/files/pre-proxy # Instantiating module "linelog" from file /usr/local/radius/etc/raddb/mods-enabled/linelog # Instantiating module "log_accounting" from file /usr/local/radius/etc/raddb/mods-enabled/linelog # Instantiating module "logintime" from file /usr/local/radius/etc/raddb/mods-enabled/logintime # Instantiating module "mschap" from file /usr/local/radius/etc/raddb/mods-enabled/mschap rlm_mschap (mschap): using internal authentication # Instantiating module "pap" from file /usr/local/radius/etc/raddb/mods-enabled/pap # Instantiating module "etc_passwd" from file /usr/local/radius/etc/raddb/mods-enabled/passwd rlm_passwd: nfields: 3 keyfield 0(User-Name) listable: no # Instantiating module "preprocess" from file /usr/local/radius/etc/raddb/mods-enabled/preprocess reading pairlist file /usr/local/radius/etc/raddb/mods-config/preprocess/huntgroups reading pairlist file /usr/local/radius/etc/raddb/mods-config/preprocess/hints # Instantiating module "IPASS" from file /usr/local/radius/etc/raddb/mods-enabled/realm # Instantiating module "suffix" from file /usr/local/radius/etc/raddb/mods-enabled/realm # Instantiating module "realmpercent" from file /usr/local/radius/etc/raddb/mods-enabled/realm # Instantiating module "ntdomain" from file /usr/local/radius/etc/raddb/mods-enabled/realm } # modules radiusd: #### Loading Virtual Servers #### server { # from file /usr/local/radius/etc/raddb/radiusd.conf } # server server default { # from file /usr/local/radius/etc/raddb/sites-enabled/hknet # Loading authenticate {...} # Loading authorize {...} # Loading preacct {...} # Loading accounting {...} # Loading post-proxy {...} # Loading post-auth {...} } # server default thread pool { start_servers = 5 max_servers = 32 min_spare_servers = 3 max_spare_servers = 10 max_requests_per_server = 0 cleanup_delay = 5 max_queue_size = 65536 auto_limit_acct = no } Thread spawned new child 1. Total threads in pool: 1 Thread spawned new child 2. Total threads in pool: 2 Thread spawned new child 3. Total threads in pool: 3 Thread spawned new child 4. Total threads in pool: 4 Thread spawned new child 5. Total threads in pool: 5 Thread pool initialized radiusd: #### Opening IP addresses and Ports #### Thread 4 waiting to be assigned a request Thread 1 waiting to be assigned a request listen { type = "auth" Thread 3 waiting to be assigned a request virtual_server = "default" ipaddr = * port = 2083 proto = "tcp" tls { verify_depth = 0 ca_path = "/usr/local/radius/etc/raddb/certs" pem_file_type = yes private_key_file = "/usr/local/radius/etc/raddb/certs/radius2.hknet.cz.key" certificate_file = "/usr/local/radius/etc/raddb/certs/radius2.hknet.cz.crt" ca_file = "/usr/local/radius/etc/raddb/certs/ca.pem" dh_file = "/usr/local/radius/etc/raddb/certs/dh" fragment_size = 8192 include_length = yes auto_chain = yes check_crl = no check_all_crl = no cipher_list = "DEFAULT" require_client_cert = yes ecdh_curve = "prime256v1" cache { enable = no lifetime = 24 max_entries = 255 } verify { skip_if_ocsp_ok = no } ocsp { enable = no override_cert_url = no use_nonce = yes timeout = 0 softfail = no } } Thread 5 waiting to be assigned a request Thread 2 waiting to be assigned a request limit { max_connections = 32 lifetime = 0 idle_timeout = 30 } clients = "radsec" client radius1.eduroam.cuni.cz { ipaddr = 195.113.15.22 require_message_authenticator = no secret = <<< secret >>> proto = "tls" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client radius2.eduroam.cuni.cz { ipaddr = 195.113.44.19 require_message_authenticator = no secret = <<< secret >>> proto = "tls" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client radius1.eduroam.cz { ipaddr = 195.113.187.22 require_message_authenticator = no secret = <<< secret >>> proto = "tls" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } } listen { type = "auth" ipaddr = * port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } listen { type = "acct" ipaddr = * port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } listen { type = "auth" ipv6addr = :: port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } listen { type = "acct" ipv6addr = :: port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } Listening on auth proto tcp address * port 2083 (TLS) bound to server default Listening on auth address * port 1812 bound to server default Listening on acct address * port 1813 bound to server default Listening on auth address :: port 1812 bound to server default Listening on acct address :: port 1813 bound to server default Listening on proxy address * port 33121 Listening on proxy address :: port 54913 Ready to process requests Threads: total/active/spare threads = 5/0/5 Waking up in 0.3 seconds. Thread 2 got semaphore Thread 2 handling request 0, (1 handled so far) (0) Received Access-Request Id 0 from 127.0.0.1:37157 to 127.0.0.1:1812 length 163 (0) User-Name = "r-test-hknet@uvtuk.cuni.cz" (0) NAS-IP-Address = 127.0.0.1 (0) Calling-Station-Id = "70-6F-6C-69-73-68" (0) Framed-MTU = 1400 (0) NAS-Port-Type = Wireless-802.11 (0) Connect-Info = "rad_eap_test + eapol_test" (0) EAP-Message = 0x0200001f01722d746573742d686b6e657440757674756b2e63756e692e637a (0) Message-Authenticator = 0x0f0d0fb25111baaabd81df00ed38e605 (0) # Executing section authorize from file /usr/local/radius/etc/raddb/sites-enabled/hknet (0) authorize { (0) policy filter_username { (0) if (!&User-Name) { (0) if (!&User-Name) -> FALSE (0) if (&User-Name =~ / /) { (0) if (&User-Name =~ / /) -> FALSE (0) if (&User-Name =~ /@.*@/ ) { (0) if (&User-Name =~ /@.*@/ ) -> FALSE (0) if (&User-Name =~ /\\.\\./ ) { (0) if (&User-Name =~ /\\.\\./ ) -> FALSE (0) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/)) { (0) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (0) if (&User-Name =~ /\\.$/) { (0) if (&User-Name =~ /\\.$/) -> FALSE (0) if (&User-Name =~ /@\\./) { (0) if (&User-Name =~ /@\\./) -> FALSE (0) } # policy filter_username = notfound (0) [preprocess] = ok (0) [chap] = noop (0) [mschap] = noop (0) [digest] = noop (0) suffix: Checking for suffix after "@" (0) suffix: Looking up realm "uvtuk.cuni.cz" for User-Name = "r-test-hknet@uvtuk.cuni.cz" (0) suffix: Found realm "uvtuk.cuni.cz" (0) suffix: Adding Realm = "uvtuk.cuni.cz" (0) suffix: Proxying request from user r-test-hknet@uvtuk.cuni.cz to realm uvtuk.cuni.cz (0) suffix: Preparing to proxy authentication request to realm "uvtuk.cuni.cz" (0) [suffix] = updated (0) [files] = noop (0) [expiration] = noop (0) [logintime] = noop (0) [pap] = noop (0) update request { (0) Operator-Name := "1hknet.cz" (0) } # update request = noop (0) policy operator-name.authorize { (0) if ("%{client:Operator-Name}") { (0) EXPAND %{client:Operator-Name} (0) --> (0) if ("%{client:Operator-Name}") -> FALSE (0) } # policy operator-name.authorize = updated (0) } # authorize = updated (0) Starting proxy to home server 195.113.15.22 port 2083 Waking up in 0.4 seconds. Waking up in 0.7 seconds. Waking up in 1.1 seconds. Waking up in 1.6 seconds. (0) Ignoring duplicate packet from client localhost port 37157 - ID: 0 due to unfinished request in component module Waking up in 1.3 seconds. Waking up in 2.5 seconds. Waking up in 3.7 seconds. Waking up in 5.6 seconds. Waking up in 8.5 seconds. Waking up in 12.8 seconds. Unresponsive child for request 0, in component module Waking up in 19.2 seconds. Threads: total/active/spare threads = 5/1/4 Waking up in 0.3 seconds. Thread 3 got semaphore Thread 3 handling request 1, (1 handled so far) (1) Received Access-Request Id 0 from 127.0.0.1:45128 to 127.0.0.1:1812 length 163 (1) User-Name = "r-test-hknet@uvtuk.cuni.cz" (1) NAS-IP-Address = 127.0.0.1 (1) Calling-Station-Id = "70-6F-6C-69-73-68" (1) Framed-MTU = 1400 (1) NAS-Port-Type = Wireless-802.11 (1) Connect-Info = "rad_eap_test + eapol_test" (1) EAP-Message = 0x0200001f01722d746573742d686b6e657440757674756b2e63756e692e637a (1) Message-Authenticator = 0x8e93a70222f483e36bdbbe20f2d8bfe2 (1) # Executing section authorize from file /usr/local/radius/etc/raddb/sites-enabled/hknet (1) authorize { (1) policy filter_username { (1) if (!&User-Name) { (1) if (!&User-Name) -> FALSE (1) if (&User-Name =~ / /) { (1) if (&User-Name =~ / /) -> FALSE (1) if (&User-Name =~ /@.*@/ ) { (1) if (&User-Name =~ /@.*@/ ) -> FALSE (1) if (&User-Name =~ /\\.\\./ ) { (1) if (&User-Name =~ /\\.\\./ ) -> FALSE (1) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/)) { (1) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (1) if (&User-Name =~ /\\.$/) { (1) if (&User-Name =~ /\\.$/) -> FALSE (1) if (&User-Name =~ /@\\./) { (1) if (&User-Name =~ /@\\./) -> FALSE (1) } # policy filter_username = notfound (1) [preprocess] = ok (1) [chap] = noop (1) [mschap] = noop (1) [digest] = noop (1) suffix: Checking for suffix after "@" (1) suffix: Looking up realm "uvtuk.cuni.cz" for User-Name = "r-test-hknet@uvtuk.cuni.cz" (1) suffix: Found realm "uvtuk.cuni.cz" (1) suffix: Adding Realm = "uvtuk.cuni.cz" (1) suffix: Proxying request from user r-test-hknet@uvtuk.cuni.cz to realm uvtuk.cuni.cz (1) suffix: Preparing to proxy authentication request to realm "uvtuk.cuni.cz" (1) [suffix] = updated (1) [files] = noop (1) [expiration] = noop (1) [logintime] = noop (1) [pap] = noop (1) update request { (1) Operator-Name := "1hknet.cz" (1) } # update request = noop (1) policy operator-name.authorize { (1) if ("%{client:Operator-Name}") { (1) EXPAND %{client:Operator-Name} (1) --> (1) if ("%{client:Operator-Name}") -> FALSE (1) } # policy operator-name.authorize = updated (1) } # authorize = updated (1) Starting proxy to home server 195.113.15.22 port 2083 Waking up in 0.4 seconds. Waking up in 0.7 seconds. Waking up in 1.1 seconds. Waking up in 1.6 seconds. (1) Ignoring duplicate packet from client localhost port 45128 - ID: 0 due to unfinished request in component module Waking up in 1.3 seconds. Waking up in 2.5 seconds. Waking up in 3.7 seconds. Waking up in 5.6 seconds. Waking up in 4.3 seconds. Waking up in 4.1 seconds. Waking up in 5.8 seconds. Waking up in 6.9 seconds. Unresponsive child for request 1, in component module Waking up in 3.0 seconds. Waking up in 9.9 seconds. Waking up in 6.1 seconds. Waking up in 3.8 seconds. Waking up in 6.1 seconds. Waking up in 3.8 seconds. Waking up in 6.1 seconds. Waking up in 3.8 seconds. Waking up in 6.1 seconds. Failed opening new proxy socket 'proxy (0.0.0.0, 0) -> home_server (195.113.15.22, 2083)' : Failed connecting socket: Connection timed out (0) Failed to insert request into the proxy list Thread 2 waiting to be assigned a request Waking up in 3.7 seconds. Waking up in 0.3 seconds. Thread 1 got semaphore Thread 1 handling request 2, (1 handled so far) (2) Received Access-Request Id 0 from 127.0.0.1:56618 to 127.0.0.1:1812 length 163 (2) User-Name = "r-test-hknet@uvtuk.cuni.cz" (2) NAS-IP-Address = 127.0.0.1 (2) Calling-Station-Id = "70-6F-6C-69-73-68" (2) Framed-MTU = 1400 (2) NAS-Port-Type = Wireless-802.11 (2) Connect-Info = "rad_eap_test + eapol_test" (2) EAP-Message = 0x0200001f01722d746573742d686b6e657440757674756b2e63756e692e637a (2) Message-Authenticator = 0x6053a0f428db1917a282e79b3ee6802f (2) # Executing section authorize from file /usr/local/radius/etc/raddb/sites-enabled/hknet (2) authorize { (2) policy filter_username { (2) if (!&User-Name) { (2) if (!&User-Name) -> FALSE (2) if (&User-Name =~ / /) { (2) if (&User-Name =~ / /) -> FALSE (2) if (&User-Name =~ /@.*@/ ) { (2) if (&User-Name =~ /@.*@/ ) -> FALSE (2) if (&User-Name =~ /\\.\\./ ) { (2) if (&User-Name =~ /\\.\\./ ) -> FALSE (2) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/)) { (2) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\\.(.+)$/)) -> FALSE (2) if (&User-Name =~ /\\.$/) { (2) if (&User-Name =~ /\\.$/) -> FALSE (2) if (&User-Name =~ /@\\./) { (2) if (&User-Name =~ /@\\./) -> FALSE (2) } # policy filter_username = notfound (2) [preprocess] = ok (2) [chap] = noop (2) [mschap] = noop (2) [digest] = noop (2) suffix: Checking for suffix after "@" (2) suffix: Looking up realm "uvtuk.cuni.cz" for User-Name = "r-test-hknet@uvtuk.cuni.cz" (2) suffix: Found realm "uvtuk.cuni.cz" (2) suffix: Adding Realm = "uvtuk.cuni.cz" (2) suffix: Proxying request from user r-test-hknet@uvtuk.cuni.cz to realm uvtuk.cuni.cz (2) suffix: Preparing to proxy authentication request to realm "uvtuk.cuni.cz" (2) [suffix] = updated (2) [files] = noop (2) [expiration] = noop (2) [logintime] = noop (2) [pap] = noop (2) update request { (2) Operator-Name := "1hknet.cz" (2) } # update request = noop (2) policy operator-name.authorize { (2) if ("%{client:Operator-Name}") { (2) EXPAND %{client:Operator-Name} (2) --> (2) if ("%{client:Operator-Name}") -> FALSE (2) } # policy operator-name.authorize = updated (2) } # authorize = updated (2) Starting proxy to home server 195.113.15.22 port 2083 Waking up in 0.4 seconds. Waking up in 0.7 seconds. Waking up in 1.1 seconds. Waking up in 0.7 seconds. (2) Ignoring duplicate packet from client localhost port 56618 - ID: 0 due to unfinished request in component module Waking up in 0.5 seconds. (0) Cleaning up request packet ID 0 with timestamp +27 Waking up in 0.8 seconds. Waking up in 2.5 seconds. Waking up in 2.7 seconds. Waking up in 1.0 seconds. Waking up in 5.6 seconds. Waking up in 3.2 seconds. Waking up in 5.2 seconds. Waking up in 4.7 seconds. Waking up in 8.0 seconds. Unresponsive child for request 2, in component module Waking up in 1.9 seconds. Waking up in 9.9 seconds. Waking up in 7.2 seconds. Waking up in 2.6 seconds. Waking up in 7.2 seconds. Waking up in 2.6 seconds. Waking up in 7.2 seconds. Waking up in 2.6 seconds. Waking up in 7.3 seconds. Waking up in 2.6 seconds. Waking up in 7.3 seconds. Waking up in 2.6 seconds. Waking up in 7.3 seconds.