FreeRADIUS Version 3.0.15 Copyright (C) 1999-2017 The FreeRADIUS server project and contributors There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE You may redistribute copies of FreeRADIUS under the terms of the GNU General Public License For more information about these matters, see the file named COPYRIGHT Starting - reading configuration files ... including dictionary file /usr/local/radius/share/freeradius/dictionary including dictionary file /usr/local/radius/share/freeradius/dictionary.dhcp including dictionary file /usr/local/radius/share/freeradius/dictionary.vqp including dictionary file /usr/local/radius/etc/raddb/dictionary including configuration file /usr/local/radius/etc/raddb/radiusd.conf including configuration file /usr/local/radius/etc/raddb/proxy.conf including configuration file /usr/local/radius/etc/raddb/clients.conf including files in directory /usr/local/radius/etc/raddb/mods-enabled/ including configuration file /usr/local/radius/etc/raddb/mods-enabled/detail.log including configuration file /usr/local/radius/etc/raddb/mods-enabled/radutmp including configuration file /usr/local/radius/etc/raddb/mods-enabled/logintime including configuration file /usr/local/radius/etc/raddb/mods-enabled/chap including configuration file /usr/local/radius/etc/raddb/mods-enabled/detail including configuration file /usr/local/radius/etc/raddb/mods-enabled/attr_filter including configuration file /usr/local/radius/etc/raddb/mods-enabled/digest including configuration file /usr/local/radius/etc/raddb/mods-enabled/ldap-cas including configuration file /usr/local/radius/etc/raddb/mods-enabled/passwd including configuration file /usr/local/radius/etc/raddb/mods-enabled/sradutmp including configuration file /usr/local/radius/etc/raddb/mods-enabled/files including configuration file /usr/local/radius/etc/raddb/mods-enabled/unix including configuration file /usr/local/radius/etc/raddb/mods-enabled/unpack including configuration file /usr/local/radius/etc/raddb/mods-enabled/ldap-jinonice including configuration file /usr/local/radius/etc/raddb/mods-enabled/f_ticks including configuration file /usr/local/radius/etc/raddb/mods-enabled/mschap including configuration file /usr/local/radius/etc/raddb/mods-enabled/soh including configuration file /usr/local/radius/etc/raddb/mods-enabled/linelog including configuration file /usr/local/radius/etc/raddb/mods-enabled/exec including configuration file /usr/local/radius/etc/raddb/mods-enabled/dynamic_clients including configuration file /usr/local/radius/etc/raddb/mods-enabled/replicate including configuration file /usr/local/radius/etc/raddb/mods-enabled/dhcp including configuration file /usr/local/radius/etc/raddb/mods-enabled/eap including configuration file /usr/local/radius/etc/raddb/mods-enabled/preprocess including configuration file /usr/local/radius/etc/raddb/mods-enabled/cache_eap including configuration file /usr/local/radius/etc/raddb/mods-enabled/always including configuration file /usr/local/radius/etc/raddb/mods-enabled/cui including configuration file /usr/local/radius/etc/raddb/mods-config/sql/cui/sqlite/queries.conf including configuration file /usr/local/radius/etc/raddb/mods-enabled/expr including configuration file /usr/local/radius/etc/raddb/mods-enabled/date including configuration file /usr/local/radius/etc/raddb/mods-enabled/echo including configuration file /usr/local/radius/etc/raddb/mods-enabled/ntlm_auth including configuration file /usr/local/radius/etc/raddb/mods-enabled/utf8 including configuration file /usr/local/radius/etc/raddb/mods-enabled/expiration including configuration file /usr/local/radius/etc/raddb/mods-enabled/ldap-uvtuk including configuration file /usr/local/radius/etc/raddb/mods-enabled/realm including configuration file /usr/local/radius/etc/raddb/mods-enabled/pap including files in directory /usr/local/radius/etc/raddb/policy.d/ including configuration file /usr/local/radius/etc/raddb/policy.d/accounting including configuration file /usr/local/radius/etc/raddb/policy.d/eduroam-realm-checks including configuration file /usr/local/radius/etc/raddb/policy.d/control including configuration file /usr/local/radius/etc/raddb/policy.d/dhcp including configuration file /usr/local/radius/etc/raddb/policy.d/eap including configuration file /usr/local/radius/etc/raddb/policy.d/moonshot-targeted-ids including configuration file /usr/local/radius/etc/raddb/policy.d/debug including configuration file /usr/local/radius/etc/raddb/policy.d/cui including configuration file /usr/local/radius/etc/raddb/policy.d/filter including configuration file /usr/local/radius/etc/raddb/policy.d/canonicalization including configuration file /usr/local/radius/etc/raddb/policy.d/abfab-tr including configuration file /usr/local/radius/etc/raddb/policy.d/operator-name including files in directory /usr/local/radius/etc/raddb/sites-enabled/ including configuration file /usr/local/radius/etc/raddb/sites-enabled/tls including configuration file /usr/local/radius/etc/raddb/sites-enabled/control-socket including configuration file /usr/local/radius/etc/raddb/sites-enabled/default including configuration file /usr/local/radius/etc/raddb/sites-enabled/inner-tunnel main { security { user = "radius" group = "radius" allow_core_dumps = no } name = "radiusd" prefix = "/usr/local/radius" localstatedir = "/usr/local/radius/var" logdir = "/usr/local/radius/var/log/radius" run_dir = "/usr/local/radius/var/run/radiusd" } main { name = "radiusd" prefix = "/usr/local/radius" localstatedir = "/usr/local/radius/var" sbindir = "/usr/local/radius/sbin" logdir = "/usr/local/radius/var/log/radius" run_dir = "/usr/local/radius/var/run/radiusd" libdir = "/usr/local/radius/lib" radacctdir = "/usr/local/radius/var/log/radius/radacct" hostname_lookups = no max_request_time = 30 cleanup_delay = 10 max_requests = 327680 pidfile = "/usr/local/radius/var/run/radiusd/radiusd.pid" checkrad = "/usr/local/radius/sbin/checkrad" debug_level = 0 proxy_requests = yes log { stripped_names = no auth = yes auth_badpass = no auth_goodpass = no colourise = yes msg_denied = "You are already logged in - access denied" } resources { } security { max_attributes = 200 reject_delay = 1.000000 status_server = yes allow_vulnerable_openssl = "yes" } } radiusd: #### Loading Realms and Home Servers #### proxy server { retry_delay = 5 retry_count = 3 default_fallback = no dead_time = 120 wake_all_if_all_dead = no } home_server localhost { ipaddr = 127.0.0.1 port = 1812 type = "auth" secret = <<< secret >>> response_window = 20.000000 response_timeouts = 1 max_outstanding = 65536 zombie_period = 40 status_check = "status-server" ping_interval = 30 check_interval = 30 check_timeout = 4 num_answers_to_alive = 3 revive_interval = 120 limit { max_connections = 16 max_requests = 0 lifetime = 0 idle_timeout = 0 } coa { irt = 2 mrt = 16 mrc = 5 mrd = 30 } } home_server tls { ipaddr = radius1.eduroam.cz IPv4 address [195.113.187.22] port = 2083 type = "auth" proto = "tcp" secret = <<< secret >>> response_window = 30.000000 response_timeouts = 1000 max_outstanding = 65536 zombie_period = 120 status_check = "none" ping_interval = 30 check_timeout = 4 num_answers_to_alive = 3 revive_interval = 60 limit { max_connections = 16 max_requests = 0 lifetime = 0 idle_timeout = 0 } coa { irt = 2 mrt = 16 mrc = 5 mrd = 30 } } tls { verify_depth = 0 pem_file_type = yes private_key_file = "/usr/local/radius/etc/raddb/certs/my-tls-server.key" certificate_file = "/usr/local/radius/etc/raddb/certs/my-tls-server.crt" ca_file = "/usr/local/radius/etc/raddb/certs/chain_CESNET_CA3.pem" dh_file = "/usr/local/radius/etc/raddb/certs/dh" random_file = "/dev/urandom" fragment_size = 8192 include_length = yes check_crl = no cipher_list = "DEFAULT" ecdh_curve = "prime256v1" } home_server_pool my_auth_failover { type = fail-over home_server = localhost } realm example.com { auth_pool = my_auth_failover } realm cuni.cz { } realm test.cuni.cz { } realm ldap.cuni.cz { } realm ff.cuni.cz { } realm uvtuk.cuni.cz { } realm ruk.cuni.cz { } realm jinonice.cuni.cz { } realm student.cuni.cz { } realm staff.cuni.cz { } realm prf.cuni.cz { nostrip authhost = 195.113.8.9:1812 secret = <<< secret >>> } realm karlov.mff.cuni.cz { nostrip authhost = 195.113.27.89:1812 secret = <<< secret >>> } realm karlov.mff.cuni.cz { authhost = 195.113.27.78:1812 secret = <<< secret >>> } # realm karlov.mff.cuni.cz realm ms.mff.cuni.cz { nostrip authhost = 195.113.20.20:1812 secret = <<< secret >>> } realm ms.mff.cuni.cz { authhost = 195.113.20.3:1812 secret = <<< secret >>> } # realm ms.mff.cuni.cz realm LOCAL { } realm NULL { virtual_server = auth-reject } home_server_pool tls { type = fail-over home_server = tls } realm ~.+$ { auth_pool = tls nostrip } realm tls { auth_pool = tls } radiusd: #### Loading Clients #### client localhost { ipaddr = 127.0.0.1 require_message_authenticator = no secret = <<< secret >>> nas_type = "other" proto = "*" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client localhost_ipv6 { ipv6addr = ::1 require_message_authenticator = no secret = <<< secret >>> limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client 195.113.15.22 { ipaddr = 195.113.15.22 require_message_authenticator = no secret = <<< secret >>> shortname = "nas-ruk2" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client 195.113.44.19 { ipaddr = 195.113.44.19 require_message_authenticator = no secret = <<< secret >>> shortname = "zizala" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client 195.113.1.196 { ipaddr = 195.113.1.196 require_message_authenticator = no secret = <<< secret >>> shortname = "wlc" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client 195.113.1.198 { ipaddr = 195.113.1.198 require_message_authenticator = no secret = <<< secret >>> shortname = "wlc2" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client radius1.eduroam.cz { ipaddr = 195.113.187.22 require_message_authenticator = no secret = <<< secret >>> shortname = "radius1.eduroam.cz" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client 195.113.233.246 { ipaddr = 195.113.233.246 require_message_authenticator = no secret = <<< secret >>> shortname = "ermon.cesnet.cz" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client 195.113.8.9 { ipaddr = 195.113.8.9 require_message_authenticator = no secret = <<< secret >>> shortname = "radiusator.prf.cuni.cz" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client 195.113.27.89 { ipaddr = 195.113.27.89 require_message_authenticator = no secret = <<< secret >>> shortname = "radius1.karlov.mff.cuni.cz" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client 195.113.27.78 { ipaddr = 195.113.27.78 require_message_authenticator = no secret = <<< secret >>> shortname = "radius2.karlov.mff.cuni.cz" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client 195.113.30.216 { ipaddr = 195.113.30.216 require_message_authenticator = no secret = <<< secret >>> shortname = "radius1.karlin.mff.cuni.cz" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client 195.113.20.20 { ipaddr = 195.113.20.20 require_message_authenticator = no secret = <<< secret >>> shortname = "radius.ms.mff.cuni.cz" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client 195.113.20.3 { ipaddr = 195.113.20.3 require_message_authenticator = no secret = <<< secret >>> shortname = "dzungle.ms.mff.cuni.cz" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client 195.113.44.128 { ipaddr = 195.113.44.128 require_message_authenticator = no secret = <<< secret >>> shortname = "radius1.koleje.cuni.cz" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client 195.113.0.180 { ipaddr = 195.113.0.180 require_message_authenticator = no secret = <<< secret >>> shortname = "k1j.ruk.cuni.cz" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client 195.113.0.181 { ipaddr = 195.113.0.181 require_message_authenticator = no secret = <<< secret >>> shortname = "k2r.ruk.cuni.cz" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client 195.113.62.153 { ipaddr = 195.113.62.153 require_message_authenticator = no secret = <<< secret >>> shortname = "radius1.lf3.cuni.cz" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client 195.113.40.15 { ipaddr = 195.113.40.15 require_message_authenticator = no secret = <<< secret >>> shortname = "eduroam1.lf2.cuni.cz" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client 78.128.204.8 { ipaddr = 78.128.204.8 require_message_authenticator = no secret = <<< secret >>> shortname = "radius1.ff.cuni.cz" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client 78.128.204.9 { ipaddr = 78.128.204.9 require_message_authenticator = no secret = <<< secret >>> shortname = "radius2.ff.cuni.cz" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client 195.113.115.169 { ipaddr = 195.113.115.169 require_message_authenticator = no secret = <<< secret >>> shortname = "radius1.hknet.cz" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client 195.113.115.166 { ipaddr = 195.113.115.166 require_message_authenticator = no secret = <<< secret >>> shortname = "radius2.hknet.cz" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } Debugger not attached # Creating Auth-Type = mschap # Creating Auth-Type = digest # Creating Auth-Type = eap # Creating Auth-Type = PAP # Creating Auth-Type = CHAP # Creating Auth-Type = MS-CHAP radiusd: #### Instantiating modules #### modules { # Loaded module rlm_detail # Loading module "auth_log" from file /usr/local/radius/etc/raddb/mods-enabled/detail.log detail auth_log { filename = "/usr/local/radius/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loading module "reply_log" from file /usr/local/radius/etc/raddb/mods-enabled/detail.log detail reply_log { filename = "/usr/local/radius/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loading module "pre_proxy_log" from file /usr/local/radius/etc/raddb/mods-enabled/detail.log detail pre_proxy_log { filename = "/usr/local/radius/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loading module "post_proxy_log" from file /usr/local/radius/etc/raddb/mods-enabled/detail.log detail post_proxy_log { filename = "/usr/local/radius/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loaded module rlm_radutmp # Loading module "radutmp" from file /usr/local/radius/etc/raddb/mods-enabled/radutmp radutmp { filename = "/usr/local/radius/var/log/radius/radutmp" username = "%{User-Name}" case_sensitive = yes check_with_nas = yes permissions = 384 caller_id = yes } # Loaded module rlm_logintime # Loading module "logintime" from file /usr/local/radius/etc/raddb/mods-enabled/logintime logintime { minimum_timeout = 60 } # Loaded module rlm_chap # Loading module "chap" from file /usr/local/radius/etc/raddb/mods-enabled/chap # Loading module "detail" from file /usr/local/radius/etc/raddb/mods-enabled/detail detail { filename = "/usr/local/radius/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loaded module rlm_attr_filter # Loading module "attr_filter.post-proxy" from file /usr/local/radius/etc/raddb/mods-enabled/attr_filter attr_filter attr_filter.post-proxy { filename = "/usr/local/radius/etc/raddb/mods-config/attr_filter/post-proxy" key = "%{Realm}" relaxed = no } # Loading module "attr_filter.pre-proxy" from file /usr/local/radius/etc/raddb/mods-enabled/attr_filter attr_filter attr_filter.pre-proxy { filename = "/usr/local/radius/etc/raddb/mods-config/attr_filter/pre-proxy" key = "%{Realm}" relaxed = no } # Loading module "attr_filter.access_reject" from file /usr/local/radius/etc/raddb/mods-enabled/attr_filter attr_filter attr_filter.access_reject { filename = "/usr/local/radius/etc/raddb/mods-config/attr_filter/access_reject" key = "%{User-Name}" relaxed = no } # Loading module "attr_filter.access_challenge" from file /usr/local/radius/etc/raddb/mods-enabled/attr_filter attr_filter attr_filter.access_challenge { filename = "/usr/local/radius/etc/raddb/mods-config/attr_filter/access_challenge" key = "%{User-Name}" relaxed = no } # Loading module "attr_filter.accounting_response" from file /usr/local/radius/etc/raddb/mods-enabled/attr_filter attr_filter attr_filter.accounting_response { filename = "/usr/local/radius/etc/raddb/mods-config/attr_filter/accounting_response" key = "%{User-Name}" relaxed = no } # Loaded module rlm_digest # Loading module "digest" from file /usr/local/radius/etc/raddb/mods-enabled/digest # Loaded module rlm_ldap # Loading module "ldap-cas" from file /usr/local/radius/etc/raddb/mods-enabled/ldap-cas ldap ldap-cas { server = "ldaps://ldap1.cuni.cz" port = 636 identity = "cn=radius-eduroam,OU=Special users,DC=cuni,DC=cz" password = <<< secret >>> sasl { } user { scope = "sub" access_positive = yes sasl { } } group { filter = "(objectClass=posixGroup)" scope = "sub" name_attribute = "cn" membership_attribute = "memberOf" cacheable_name = no cacheable_dn = no } client { filter = "(objectClass=radiusClient)" scope = "sub" base_dn = "DC=cuni,DC=cz" } profile { } options { ldap_debug = 40 chase_referrals = yes rebind = yes net_timeout = 1 res_timeout = 10 srv_timelimit = 3 idle = 60 probes = 3 interval = 3 } tls { ca_path = "/etc/ssl/certs" start_tls = no require_cert = "never" } } Creating attribute ldap-cas-LDAP-Group # Loaded module rlm_passwd # Loading module "etc_passwd" from file /usr/local/radius/etc/raddb/mods-enabled/passwd passwd etc_passwd { filename = "/etc/passwd" format = "*User-Name:Crypt-Password:" delimiter = ":" ignore_nislike = no ignore_empty = yes allow_multiple_keys = no hash_size = 100 } # Loading module "sradutmp" from file /usr/local/radius/etc/raddb/mods-enabled/sradutmp radutmp sradutmp { filename = "/usr/local/radius/var/log/radius/sradutmp" username = "%{User-Name}" case_sensitive = yes check_with_nas = yes permissions = 420 caller_id = no } # Loaded module rlm_files # Loading module "files" from file /usr/local/radius/etc/raddb/mods-enabled/files files { filename = "/usr/local/radius/etc/raddb/mods-config/files/authorize" acctusersfile = "/usr/local/radius/etc/raddb/mods-config/files/accounting" preproxy_usersfile = "/usr/local/radius/etc/raddb/mods-config/files/pre-proxy" } # Loaded module rlm_unix # Loading module "unix" from file /usr/local/radius/etc/raddb/mods-enabled/unix unix { radwtmp = "/usr/local/radius/var/log/radius/radwtmp" } Creating attribute Unix-Group # Loaded module rlm_unpack # Loading module "unpack" from file /usr/local/radius/etc/raddb/mods-enabled/unpack # Loading module "ldap-jinonice" from file /usr/local/radius/etc/raddb/mods-enabled/ldap-jinonice ldap ldap-jinonice { server = "ldaps://rukfs01.jinonice.cuni.cz" port = 3269 identity = "cn=r-service-auth,OU=Service,OU=Roaming,DC=jinonice,DC=cuni,DC=cz" password = <<< secret >>> sasl { } user { scope = "sub" access_positive = yes sasl { } } group { filter = "(objectClass=posixGroup)" scope = "sub" name_attribute = "cn" membership_attribute = "memberOf" cacheable_name = no cacheable_dn = no } client { filter = "(objectClass=radiusClient)" scope = "sub" base_dn = "DC=jinonice,DC=cuni,DC=cz" } profile { } options { ldap_debug = 40 chase_referrals = yes rebind = yes net_timeout = 1 res_timeout = 10 srv_timelimit = 3 idle = 60 probes = 3 interval = 3 } tls { ca_path = "/etc/ssl/certs" start_tls = no require_cert = "never" } } Creating attribute ldap-jinonice-LDAP-Group # Loaded module rlm_linelog # Loading module "f_ticks" from file /usr/local/radius/etc/raddb/mods-enabled/f_ticks linelog f_ticks { filename = "/usr/local/radius/var/log/radius/fticks/fticks.log" escape_filenames = no syslog_severity = "info" permissions = 384 format = "" reference = "f_ticks.%{%{reply:Packet-Type}:-format}" } # Loaded module rlm_mschap # Loading module "mschap" from file /usr/local/radius/etc/raddb/mods-enabled/mschap mschap { use_mppe = yes require_encryption = no require_strong = no with_ntdomain_hack = yes passchange { } allow_retry = yes winbind_retry_with_normalised_username = no } # Loaded module rlm_soh # Loading module "soh" from file /usr/local/radius/etc/raddb/mods-enabled/soh soh { dhcp = yes } # Loading module "linelog" from file /usr/local/radius/etc/raddb/mods-enabled/linelog linelog { filename = "/usr/local/radius/var/log/radius/linelog" escape_filenames = no syslog_severity = "info" permissions = 384 format = "This is a log message for %{User-Name}" reference = "messages.%{%{reply:Packet-Type}:-default}" } # Loading module "log_accounting" from file /usr/local/radius/etc/raddb/mods-enabled/linelog linelog log_accounting { filename = "/usr/local/radius/var/log/radius/linelog-accounting" escape_filenames = no syslog_severity = "info" permissions = 384 format = "" reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}" } # Loaded module rlm_exec # Loading module "exec" from file /usr/local/radius/etc/raddb/mods-enabled/exec exec { wait = no input_pairs = "request" shell_escape = yes timeout = 10 } # Loaded module rlm_dynamic_clients # Loading module "dynamic_clients" from file /usr/local/radius/etc/raddb/mods-enabled/dynamic_clients # Loaded module rlm_replicate # Loading module "replicate" from file /usr/local/radius/etc/raddb/mods-enabled/replicate # Loaded module rlm_dhcp # Loading module "dhcp" from file /usr/local/radius/etc/raddb/mods-enabled/dhcp # Loaded module rlm_eap # Loading module "eap" from file /usr/local/radius/etc/raddb/mods-enabled/eap eap { default_eap_type = "peap" timer_expire = 60 ignore_unknown_eap_types = no cisco_accounting_username_bug = no max_sessions = 327680 } # Loaded module rlm_preprocess # Loading module "preprocess" from file /usr/local/radius/etc/raddb/mods-enabled/preprocess preprocess { huntgroups = "/usr/local/radius/etc/raddb/mods-config/preprocess/huntgroups" hints = "/usr/local/radius/etc/raddb/mods-config/preprocess/hints" with_ascend_hack = no ascend_channels_per_line = 23 with_ntdomain_hack = no with_specialix_jetstream_hack = no with_cisco_vsa_hack = no with_alvarion_vsa_hack = no } # Loaded module rlm_cache # Loading module "cache_eap" from file /usr/local/radius/etc/raddb/mods-enabled/cache_eap cache cache_eap { driver = "rlm_cache_rbtree" key = "%{%{control:State}:-%{%{reply:State}:-%{State}}}" ttl = 15 max_entries = 0 epoch = 0 add_stats = no } # Loaded module rlm_always # Loading module "reject" from file /usr/local/radius/etc/raddb/mods-enabled/always always reject { rcode = "reject" simulcount = 0 mpp = no } # Loading module "fail" from file /usr/local/radius/etc/raddb/mods-enabled/always always fail { rcode = "fail" simulcount = 0 mpp = no } # Loading module "ok" from file /usr/local/radius/etc/raddb/mods-enabled/always always ok { rcode = "ok" simulcount = 0 mpp = no } # Loading module "handled" from file /usr/local/radius/etc/raddb/mods-enabled/always always handled { rcode = "handled" simulcount = 0 mpp = no } # Loading module "invalid" from file /usr/local/radius/etc/raddb/mods-enabled/always always invalid { rcode = "invalid" simulcount = 0 mpp = no } # Loading module "userlock" from file /usr/local/radius/etc/raddb/mods-enabled/always always userlock { rcode = "userlock" simulcount = 0 mpp = no } # Loading module "notfound" from file /usr/local/radius/etc/raddb/mods-enabled/always always notfound { rcode = "notfound" simulcount = 0 mpp = no } # Loading module "noop" from file /usr/local/radius/etc/raddb/mods-enabled/always always noop { rcode = "noop" simulcount = 0 mpp = no } # Loading module "updated" from file /usr/local/radius/etc/raddb/mods-enabled/always always updated { rcode = "updated" simulcount = 0 mpp = no } # Loaded module rlm_sql # Loading module "cuisql" from file /usr/local/radius/etc/raddb/mods-enabled/cui sql cuisql { driver = "rlm_sql_sqlite" server = "" port = 0 login = "" password = <<< secret >>> radius_db = "radius" read_groups = yes read_profiles = yes read_clients = no delete_stale_sessions = yes sql_user_name = "%{User-Name}" default_user_profile = "" client_query = "SELECT id,nasname,shortname,type,secret FROM nas" safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /" accounting { reference = "%{tolower:type.%{Acct-Status-Type}.query}" type { accounting-on { } accounting-off { } start { query = "UPDATE cui SET lastaccounting = CURRENT_TIMESTAMP WHERE clientipaddress = '%{%{Packet-Src-IPv6-Address}:-%{Packet-Src-IP-Address}}' AND callingstationid = '%{Calling-Station-Id}' AND username = '%{User-Name}' AND cui = '%{Chargeable-User-Identity}'" } interim-update { query = "UPDATE cui SET lastaccounting = CURRENT_TIMESTAMP WHERE clientipaddress = '%{%{Packet-Src-IPv6-Address}:-%{Packet-Src-IP-Address}}' AND callingstationid = '%{Calling-Station-Id}' AND username = '%{User-Name}' AND cui = '%{Chargeable-User-Identity}'" } stop { query = "DELETE FROM cui WHERE clientipaddress = '%{%{Packet-Src-IPv6-Address}:-%{Packet-Src-IP-Address}}' AND callingstationid = '%{Calling-Station-Id}' AND username = '%{User-Name}' AND cui = '%{Chargeable-User-Identity}'" } } } post-auth { reference = ".query" query = "INSERT OR REPLACE INTO cui (clientipaddress, callingstationid, username, cui, lastaccounting) VALUES ('%{%{Packet-Src-IPv6-Address}:-%{Packet-Src-IP-Address}}', '%{Calling-Station-Id}', '%{User-Name}', '%{reply:Chargeable-User-Identity}', NULL)" } } rlm_sql (cuisql): Driver rlm_sql_sqlite (module rlm_sql_sqlite) loaded and linked # Loaded module rlm_expr # Loading module "expr" from file /usr/local/radius/etc/raddb/mods-enabled/expr expr { safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /äéöüàâæçèéêëîïôœùûüaÿÄÉÖÜßÀÂÆÇÈÉÊËÎÏÔŒÙÛÜŸ" } # Loaded module rlm_date # Loading module "date" from file /usr/local/radius/etc/raddb/mods-enabled/date date { format = "%b %e %Y %H:%M:%S %Z" utc = no } # Loading module "echo" from file /usr/local/radius/etc/raddb/mods-enabled/echo exec echo { wait = yes program = "/bin/echo %{User-Name}" input_pairs = "request" output_pairs = "reply" shell_escape = yes } # Loading module "ntlm_auth" from file /usr/local/radius/etc/raddb/mods-enabled/ntlm_auth exec ntlm_auth { wait = yes program = "/path/to/ntlm_auth --request-nt-key --domain=MYDOMAIN --username=%{mschap:User-Name} --password=%{User-Password}" shell_escape = yes } # Loaded module rlm_utf8 # Loading module "utf8" from file /usr/local/radius/etc/raddb/mods-enabled/utf8 # Loaded module rlm_expiration # Loading module "expiration" from file /usr/local/radius/etc/raddb/mods-enabled/expiration # Loading module "ldap-uvtuk" from file /usr/local/radius/etc/raddb/mods-enabled/ldap-uvtuk ldap ldap-uvtuk { server = "ldaps://uvtdc01.uvtuk.cuni.cz" port = 3269 identity = "cn=r-service-auth,OU=Service,OU=Roaming,DC=uvtuk,DC=cuni,DC=cz" password = <<< secret >>> sasl { } user { scope = "sub" access_positive = yes sasl { } } group { filter = "(objectClass=posixGroup)" scope = "sub" name_attribute = "cn" membership_attribute = "memberOf" cacheable_name = no cacheable_dn = no } client { filter = "(objectClass=radiusClient)" scope = "sub" base_dn = "DC=uvtuk,DC=cuni,DC=cz" } profile { } options { ldap_debug = 40 chase_referrals = yes rebind = yes net_timeout = 1 res_timeout = 10 srv_timelimit = 3 idle = 60 probes = 3 interval = 3 } tls { ca_path = "/etc/ssl/certs" start_tls = no require_cert = "never" } } Creating attribute ldap-uvtuk-LDAP-Group # Loaded module rlm_realm # Loading module "IPASS" from file /usr/local/radius/etc/raddb/mods-enabled/realm realm IPASS { format = "prefix" delimiter = "/" ignore_default = no ignore_null = no } # Loading module "suffix" from file /usr/local/radius/etc/raddb/mods-enabled/realm realm suffix { format = "suffix" delimiter = "@" ignore_default = no ignore_null = no } # Loading module "realmpercent" from file /usr/local/radius/etc/raddb/mods-enabled/realm realm realmpercent { format = "suffix" delimiter = "%" ignore_default = no ignore_null = no } # Loading module "ntdomain" from file /usr/local/radius/etc/raddb/mods-enabled/realm realm ntdomain { format = "prefix" delimiter = "\\" ignore_default = no ignore_null = no } # Loaded module rlm_pap # Loading module "pap" from file /usr/local/radius/etc/raddb/mods-enabled/pap pap { normalise = yes } instantiate { } # Instantiating module "auth_log" from file /usr/local/radius/etc/raddb/mods-enabled/detail.log rlm_detail (auth_log): 'User-Password' suppressed, will not appear in detail output # Instantiating module "reply_log" from file /usr/local/radius/etc/raddb/mods-enabled/detail.log # Instantiating module "pre_proxy_log" from file /usr/local/radius/etc/raddb/mods-enabled/detail.log # Instantiating module "post_proxy_log" from file /usr/local/radius/etc/raddb/mods-enabled/detail.log # Instantiating module "logintime" from file /usr/local/radius/etc/raddb/mods-enabled/logintime # Instantiating module "detail" from file /usr/local/radius/etc/raddb/mods-enabled/detail # Instantiating module "attr_filter.post-proxy" from file /usr/local/radius/etc/raddb/mods-enabled/attr_filter reading pairlist file /usr/local/radius/etc/raddb/mods-config/attr_filter/post-proxy # Instantiating module "attr_filter.pre-proxy" from file /usr/local/radius/etc/raddb/mods-enabled/attr_filter reading pairlist file /usr/local/radius/etc/raddb/mods-config/attr_filter/pre-proxy # Instantiating module "attr_filter.access_reject" from file /usr/local/radius/etc/raddb/mods-enabled/attr_filter reading pairlist file /usr/local/radius/etc/raddb/mods-config/attr_filter/access_reject [/usr/local/radius/etc/raddb/mods-config/attr_filter/access_reject]:11 Check item "FreeRADIUS-Response-Delay" found in filter list for realm "DEFAULT". [/usr/local/radius/etc/raddb/mods-config/attr_filter/access_reject]:11 Check item "FreeRADIUS-Response-Delay-USec" found in filter list for realm "DEFAULT". # Instantiating module "attr_filter.access_challenge" from file /usr/local/radius/etc/raddb/mods-enabled/attr_filter reading pairlist file /usr/local/radius/etc/raddb/mods-config/attr_filter/access_challenge # Instantiating module "attr_filter.accounting_response" from file /usr/local/radius/etc/raddb/mods-enabled/attr_filter reading pairlist file /usr/local/radius/etc/raddb/mods-config/attr_filter/accounting_response # Instantiating module "ldap-cas" from file /usr/local/radius/etc/raddb/mods-enabled/ldap-cas rlm_ldap: libldap vendor: OpenLDAP, version: 20440 accounting { reference = "%{tolower:type.%{Acct-Status-Type}}" } post-auth { reference = "." } rlm_ldap (ldap-cas): Initialising connection pool pool { start = 5 min = 3 max = 32 spare = 10 uses = 0 lifetime = 0 cleanup_interval = 30 idle_timeout = 60 retry_delay = 30 spread = no } rlm_ldap (ldap-cas): Opening additional connection (0), 1 of 32 pending slots used rlm_ldap (ldap-cas): Connecting to ldaps://ldap1.cuni.cz:636 ldaps://ldap2.cuni.cz:636 rlm_ldap (ldap-cas): Waiting for bind result... rlm_ldap (ldap-cas): Bind successful rlm_ldap (ldap-cas): Opening additional connection (1), 1 of 31 pending slots used rlm_ldap (ldap-cas): Connecting to ldaps://ldap1.cuni.cz:636 ldaps://ldap2.cuni.cz:636 rlm_ldap (ldap-cas): Waiting for bind result... rlm_ldap (ldap-cas): Bind successful rlm_ldap (ldap-cas): Opening additional connection (2), 1 of 30 pending slots used rlm_ldap (ldap-cas): Connecting to ldaps://ldap1.cuni.cz:636 ldaps://ldap2.cuni.cz:636 rlm_ldap (ldap-cas): Waiting for bind result... rlm_ldap (ldap-cas): Bind successful rlm_ldap (ldap-cas): Opening additional connection (3), 1 of 29 pending slots used rlm_ldap (ldap-cas): Connecting to ldaps://ldap1.cuni.cz:636 ldaps://ldap2.cuni.cz:636 rlm_ldap (ldap-cas): Waiting for bind result... rlm_ldap (ldap-cas): Bind successful rlm_ldap (ldap-cas): Opening additional connection (4), 1 of 28 pending slots used rlm_ldap (ldap-cas): Connecting to ldaps://ldap1.cuni.cz:636 ldaps://ldap2.cuni.cz:636 rlm_ldap (ldap-cas): Waiting for bind result... rlm_ldap (ldap-cas): Bind successful # Instantiating module "etc_passwd" from file /usr/local/radius/etc/raddb/mods-enabled/passwd rlm_passwd: nfields: 3 keyfield 0(User-Name) listable: no # Instantiating module "files" from file /usr/local/radius/etc/raddb/mods-enabled/files reading pairlist file /usr/local/radius/etc/raddb/mods-config/files/authorize reading pairlist file /usr/local/radius/etc/raddb/mods-config/files/accounting reading pairlist file /usr/local/radius/etc/raddb/mods-config/files/pre-proxy # Instantiating module "ldap-jinonice" from file /usr/local/radius/etc/raddb/mods-enabled/ldap-jinonice accounting { reference = "%{tolower:type.%{Acct-Status-Type}}" } post-auth { reference = "." } rlm_ldap (ldap-jinonice): Initialising connection pool pool { start = 5 min = 3 max = 32 spare = 10 uses = 0 lifetime = 0 cleanup_interval = 30 idle_timeout = 60 retry_delay = 30 spread = no } rlm_ldap (ldap-jinonice): Opening additional connection (0), 1 of 32 pending slots used rlm_ldap (ldap-jinonice): Connecting to ldaps://rukfs01.jinonice.cuni.cz:3269 ldaps://ajifs01.jinonice.cuni.cz:3269 rlm_ldap (ldap-jinonice): Waiting for bind result... rlm_ldap (ldap-jinonice): Bind successful rlm_ldap (ldap-jinonice): Opening additional connection (1), 1 of 31 pending slots used rlm_ldap (ldap-jinonice): Connecting to ldaps://rukfs01.jinonice.cuni.cz:3269 ldaps://ajifs01.jinonice.cuni.cz:3269 rlm_ldap (ldap-jinonice): Waiting for bind result... rlm_ldap (ldap-jinonice): Bind successful rlm_ldap (ldap-jinonice): Opening additional connection (2), 1 of 30 pending slots used rlm_ldap (ldap-jinonice): Connecting to ldaps://rukfs01.jinonice.cuni.cz:3269 ldaps://ajifs01.jinonice.cuni.cz:3269 rlm_ldap (ldap-jinonice): Waiting for bind result... rlm_ldap (ldap-jinonice): Bind successful rlm_ldap (ldap-jinonice): Opening additional connection (3), 1 of 29 pending slots used rlm_ldap (ldap-jinonice): Connecting to ldaps://rukfs01.jinonice.cuni.cz:3269 ldaps://ajifs01.jinonice.cuni.cz:3269 rlm_ldap (ldap-jinonice): Waiting for bind result... rlm_ldap (ldap-jinonice): Bind successful rlm_ldap (ldap-jinonice): Opening additional connection (4), 1 of 28 pending slots used rlm_ldap (ldap-jinonice): Connecting to ldaps://rukfs01.jinonice.cuni.cz:3269 ldaps://ajifs01.jinonice.cuni.cz:3269 rlm_ldap (ldap-jinonice): Waiting for bind result... rlm_ldap (ldap-jinonice): Bind successful # Instantiating module "f_ticks" from file /usr/local/radius/etc/raddb/mods-enabled/f_ticks # Instantiating module "mschap" from file /usr/local/radius/etc/raddb/mods-enabled/mschap rlm_mschap (mschap): using internal authentication # Instantiating module "linelog" from file /usr/local/radius/etc/raddb/mods-enabled/linelog # Instantiating module "log_accounting" from file /usr/local/radius/etc/raddb/mods-enabled/linelog # Instantiating module "eap" from file /usr/local/radius/etc/raddb/mods-enabled/eap # Linked to sub-module rlm_eap_md5 # Linked to sub-module rlm_eap_leap # Linked to sub-module rlm_eap_gtc gtc { challenge = "Password: " auth_type = "PAP" } # Linked to sub-module rlm_eap_tls tls { tls = "tls-common" } tls-config tls-common { verify_depth = 0 pem_file_type = yes private_key_file = "/usr/local/radius/etc/raddb/certs/my-server.key" certificate_file = "/usr/local/radius/etc/raddb/certs/my-server.crt" dh_file = "/usr/local/radius/etc/raddb/certs/dh" fragment_size = 999 include_length = yes auto_chain = yes check_crl = no check_all_crl = no cipher_list = "DEFAULT" cipher_server_preference = no ecdh_curve = "prime256v1" cache { enable = no lifetime = 24 max_entries = 255 } verify { skip_if_ocsp_ok = no } ocsp { enable = no override_cert_url = yes url = "http://127.0.0.1/ocsp/" use_nonce = yes timeout = 0 softfail = no } } # Linked to sub-module rlm_eap_ttls ttls { tls = "tls-common" default_eap_type = "md5" copy_request_to_tunnel = no use_tunneled_reply = no virtual_server = "inner-tunnel" include_length = yes require_client_cert = no } tls: Using cached TLS configuration from previous invocation # Linked to sub-module rlm_eap_peap peap { tls = "tls-common" default_eap_type = "mschapv2" copy_request_to_tunnel = no use_tunneled_reply = yes proxy_tunneled_request_as_eap = yes virtual_server = "inner-tunnel" soh = no require_client_cert = no } tls: Using cached TLS configuration from previous invocation # Linked to sub-module rlm_eap_mschapv2 mschapv2 { with_ntdomain_hack = no send_error = no } # Instantiating module "preprocess" from file /usr/local/radius/etc/raddb/mods-enabled/preprocess reading pairlist file /usr/local/radius/etc/raddb/mods-config/preprocess/huntgroups reading pairlist file /usr/local/radius/etc/raddb/mods-config/preprocess/hints # Instantiating module "cache_eap" from file /usr/local/radius/etc/raddb/mods-enabled/cache_eap rlm_cache (cache_eap): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked # Instantiating module "reject" from file /usr/local/radius/etc/raddb/mods-enabled/always # Instantiating module "fail" from file /usr/local/radius/etc/raddb/mods-enabled/always # Instantiating module "ok" from file /usr/local/radius/etc/raddb/mods-enabled/always # Instantiating module "handled" from file /usr/local/radius/etc/raddb/mods-enabled/always # Instantiating module "invalid" from file /usr/local/radius/etc/raddb/mods-enabled/always # Instantiating module "userlock" from file /usr/local/radius/etc/raddb/mods-enabled/always # Instantiating module "notfound" from file /usr/local/radius/etc/raddb/mods-enabled/always # Instantiating module "noop" from file /usr/local/radius/etc/raddb/mods-enabled/always # Instantiating module "updated" from file /usr/local/radius/etc/raddb/mods-enabled/always # Instantiating module "cuisql" from file /usr/local/radius/etc/raddb/mods-enabled/cui rlm_sql_sqlite: libsqlite version: 3.8.7.1 sqlite { filename = "/usr/local/radius/var/log/radius/radacct/cui.sqlite" busy_timeout = 200 } rlm_sql (cuisql): Attempting to connect to database "radius" rlm_sql (cuisql): Initialising connection pool pool { start = 5 min = 4 max = 10 spare = 3 uses = 0 lifetime = 0 cleanup_interval = 30 idle_timeout = 60 retry_delay = 1 spread = no } rlm_sql (cuisql): Opening additional connection (0), 1 of 10 pending slots used rlm_sql_sqlite: Opening SQLite database "/usr/local/radius/var/log/radius/radacct/cui.sqlite" rlm_sql (cuisql): Opening additional connection (1), 1 of 9 pending slots used rlm_sql_sqlite: Opening SQLite database "/usr/local/radius/var/log/radius/radacct/cui.sqlite" rlm_sql (cuisql): Opening additional connection (2), 1 of 8 pending slots used rlm_sql_sqlite: Opening SQLite database "/usr/local/radius/var/log/radius/radacct/cui.sqlite" rlm_sql (cuisql): Opening additional connection (3), 1 of 7 pending slots used rlm_sql_sqlite: Opening SQLite database "/usr/local/radius/var/log/radius/radacct/cui.sqlite" rlm_sql (cuisql): Opening additional connection (4), 1 of 6 pending slots used rlm_sql_sqlite: Opening SQLite database "/usr/local/radius/var/log/radius/radacct/cui.sqlite" # Instantiating module "expiration" from file /usr/local/radius/etc/raddb/mods-enabled/expiration # Instantiating module "ldap-uvtuk" from file /usr/local/radius/etc/raddb/mods-enabled/ldap-uvtuk accounting { reference = "%{tolower:type.%{Acct-Status-Type}}" } post-auth { reference = "." } rlm_ldap (ldap-uvtuk): Initialising connection pool pool { start = 5 min = 3 max = 32 spare = 10 uses = 0 lifetime = 0 cleanup_interval = 30 idle_timeout = 60 retry_delay = 30 spread = no } rlm_ldap (ldap-uvtuk): Opening additional connection (0), 1 of 32 pending slots used rlm_ldap (ldap-uvtuk): Connecting to ldaps://uvtdc01.uvtuk.cuni.cz:3269 ldaps://handyman.uvtuk.cuni.cz:3269 rlm_ldap (ldap-uvtuk): Waiting for bind result... rlm_ldap (ldap-uvtuk): Bind successful rlm_ldap (ldap-uvtuk): Opening additional connection (1), 1 of 31 pending slots used rlm_ldap (ldap-uvtuk): Connecting to ldaps://uvtdc01.uvtuk.cuni.cz:3269 ldaps://handyman.uvtuk.cuni.cz:3269 rlm_ldap (ldap-uvtuk): Waiting for bind result... rlm_ldap (ldap-uvtuk): Bind successful rlm_ldap (ldap-uvtuk): Opening additional connection (2), 1 of 30 pending slots used rlm_ldap (ldap-uvtuk): Connecting to ldaps://uvtdc01.uvtuk.cuni.cz:3269 ldaps://handyman.uvtuk.cuni.cz:3269 rlm_ldap (ldap-uvtuk): Waiting for bind result... rlm_ldap (ldap-uvtuk): Bind successful rlm_ldap (ldap-uvtuk): Opening additional connection (3), 1 of 29 pending slots used rlm_ldap (ldap-uvtuk): Connecting to ldaps://uvtdc01.uvtuk.cuni.cz:3269 ldaps://handyman.uvtuk.cuni.cz:3269 rlm_ldap (ldap-uvtuk): Waiting for bind result... rlm_ldap (ldap-uvtuk): Bind successful rlm_ldap (ldap-uvtuk): Opening additional connection (4), 1 of 28 pending slots used rlm_ldap (ldap-uvtuk): Connecting to ldaps://uvtdc01.uvtuk.cuni.cz:3269 ldaps://handyman.uvtuk.cuni.cz:3269 rlm_ldap (ldap-uvtuk): Waiting for bind result... rlm_ldap (ldap-uvtuk): Bind successful # Instantiating module "IPASS" from file /usr/local/radius/etc/raddb/mods-enabled/realm # Instantiating module "suffix" from file /usr/local/radius/etc/raddb/mods-enabled/realm # Instantiating module "realmpercent" from file /usr/local/radius/etc/raddb/mods-enabled/realm # Instantiating module "ntdomain" from file /usr/local/radius/etc/raddb/mods-enabled/realm # Instantiating module "pap" from file /usr/local/radius/etc/raddb/mods-enabled/pap } # modules radiusd: #### Loading Virtual Servers #### server { # from file /usr/local/radius/etc/raddb/radiusd.conf } # server server default { # from file /usr/local/radius/etc/raddb/sites-enabled/default # Loading authenticate {...} # Loading authorize {...} # Loading preacct {...} # Loading accounting {...} # Loading pre-proxy {...} # Loading post-proxy {...} # Loading post-auth {...} } # server default server inner-tunnel { # from file /usr/local/radius/etc/raddb/sites-enabled/inner-tunnel # Loading authenticate {...} # Loading authorize {...} # Loading session {...} # Loading post-proxy {...} # Loading post-auth {...} # Skipping contents of 'if' as it is always 'false' -- /usr/local/radius/etc/raddb/sites-enabled/inner-tunnel:355 } # server inner-tunnel thread pool { start_servers = 5 max_servers = 32 min_spare_servers = 3 max_spare_servers = 10 max_requests_per_server = 0 cleanup_delay = 5 max_queue_size = 65536 auto_limit_acct = no } Thread spawned new child 1. Total threads in pool: 1 Thread 1 waiting to be assigned a request Thread spawned new child 2. Total threads in pool: 2 Thread 2 waiting to be assigned a request Thread spawned new child 3. Total threads in pool: 3 Thread spawned new child 4. Total threads in pool: 4 Thread 4 waiting to be assigned a request Thread spawned new child 5. Total threads in pool: 5 Thread pool initialized radiusd: #### Opening IP addresses and Ports #### Thread 5 waiting to be assigned a request Thread 3 waiting to be assigned a request listen { type = "auth+acct" virtual_server = "default" ipaddr = * port = 2083 proto = "tcp" tls { verify_depth = 0 ca_path = "/usr/local/radius/etc/raddb/certs" pem_file_type = yes private_key_file = "/usr/local/radius/etc/raddb/certs/my-tls-server.key" certificate_file = "/usr/local/radius/etc/raddb/certs/my-tls-server.crt" ca_file = "/usr/local/radius/etc/raddb/certs/all-ca.pem" dh_file = "/usr/local/radius/etc/raddb/certs/dh" fragment_size = 8192 include_length = yes auto_chain = yes check_crl = no check_all_crl = no cipher_list = "DEFAULT" cipher_server_preference = no require_client_cert = yes ecdh_curve = "prime256v1" cache { enable = no lifetime = 24 max_entries = 255 } verify { skip_if_ocsp_ok = no } ocsp { enable = no override_cert_url = no use_nonce = yes timeout = 0 softfail = no } } limit { max_connections = 16 lifetime = 300 idle_timeout = 30 } clients = "radsec" client 127.0.0.1 { ipaddr = 127.0.0.1 require_message_authenticator = no secret = <<< secret >>> proto = "tls" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client radius1.eduroam.cz { ipaddr = 195.113.187.22 require_message_authenticator = no secret = <<< secret >>> proto = "tls" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client radius1.hknet.cz { ipaddr = 195.113.115.169 require_message_authenticator = no secret = <<< secret >>> proto = "tls" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client radius2.hknet.cz { ipaddr = 195.113.115.166 require_message_authenticator = no secret = <<< secret >>> proto = "tls" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } } listen { type = "control" listen { socket = "/usr/local/radius/var/run/radiusd/radiusd.sock" uid = "root" mode = "rw" peercred = yes } } listen { type = "auth" ipaddr = * port = 1812 limit { max_connections = 16 lifetime = 300 idle_timeout = 30 } } listen { type = "acct" ipaddr = * port = 1813 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } listen { type = "auth" ipv6addr = :: port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } listen { type = "acct" ipv6addr = :: port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } listen { type = "auth" ipaddr = 127.0.0.1 port = 18120 } Listening on auth+acct proto tcp address * port 2083 (TLS) bound to server default Listening on command file /usr/local/radius/var/run/radiusd/radiusd.sock Listening on auth address * port 1812 bound to server default Listening on acct address * port 1813 bound to server default Listening on auth address :: port 1812 bound to server default Listening on acct address :: port 1813 bound to server default Listening on auth address 127.0.0.1 port 18120 bound to server inner-tunnel Listening on proxy address * port 60747 Listening on proxy address :: port 49877 Ready to process requests Threads: total/active/spare threads = 5/0/5 Waking up in 0.3 seconds.