Proxy (check status of the 3rd party server)

Peter Balsianok balsianok.peter at gmail.com
Wed Aug 12 09:30:13 CEST 2015


[radiusd at tdrad1 acct-test]$ ./run-debug.sh
Copyright (C) 1999-2015 The FreeRADIUS server project and contributors
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
PARTICULAR PURPOSE
You may redistribute copies of FreeRADIUS under the terms of the
GNU General Public License
For more information about these matters, see the file named COPYRIGHT
Starting - reading configuration files ...
including dictionary file
/app/radius/freeradius-3.0.9/share/freeradius/dictionary
including dictionary file
/app/radius/freeradius-3.0.9/share/freeradius/dictionary.dhcp
including dictionary file
/app/radius/freeradius-3.0.9/share/freeradius/dictionary.vqp
including dictionary file /app/radius/conf/acct-test/dictionary
including configuration file /app/radius/conf/acct-test/radiusd.conf
including configuration file /app/radius/conf/acct-test/templates.conf
including configuration file /app/radius/conf/acct-test/proxy.conf
including configuration file /app/radius/conf/acct-test/clients.conf
including files in directory /app/radius/conf/acct-test/mods-enabled/
including configuration file /app/radius/conf/acct-test/mods-enabled/unpack
including configuration file /app/radius/conf/acct-test/mods-enabled/files
including configuration file /app/radius/conf/acct-test/mods-enabled/expr
including configuration file
/app/radius/conf/acct-test/mods-enabled/preprocess
including configuration file
/app/radius/conf/acct-test/mods-enabled/attr_filter
including configuration file /app/radius/conf/acct-test/mods-enabled/always
including configuration file /app/radius/conf/acct-test/mods-enabled/linelog
including configuration file /app/radius/conf/acct-test/mods-enabled/perl
including configuration file
/app/radius/conf/acct-test/mods-enabled/linelog-special
including configuration file /app/radius/conf/acct-test/mods-enabled/realm
including files in directory /app/radius/conf/acct-test/policy-enabled/
including configuration file
/app/radius/conf/acct-test/policy-enabled/accounting
including configuration file
/app/radius/conf/acct-test/policy-enabled/huntgroup
including configuration file
/app/radius/conf/acct-test/policy-enabled/username
including configuration file /app/radius/conf/acct-test/policy-enabled/nas
including files in directory /app/radius/conf/acct-test/sites-enabled/
including configuration file
/app/radius/conf/acct-test/sites-enabled/control-socket
including configuration file
/app/radius/conf/acct-test/sites-enabled/default
main {
name = "acct"
prefix = "/app/radius/freeradius-3.0.9"
localstatedir = "/app_log/radius/acct/"
sbindir = "/app/radius/freeradius-3.0.9/sbin"
logdir = "/app_log/radius/acct/"
run_dir = "/app_log/radius/acct/"
libdir = "/app/radius/freeradius-3.0.9/lib"
radacctdir = "/app_log/radius/acct//radacct"
panic_action = "gdb -silent -x
/app/radius/freeradius-3.0.9/../raddb/acct/panic.gdb %e %p 2>&1 | tee
/app_log/radius/acct//gdb-acct-%p.log"
hostname_lookups = no
max_request_time = 5
cleanup_delay = 2
max_requests = 25600
pidfile = "/app_log/radius/acct//radius.pid"
checkrad = "/app/radius/freeradius-3.0.9/sbin/checkrad"
debug_level = 0
proxy_requests = yes
 log {
  stripped_names = no
  auth = no
  auth_badpass = no
  auth_goodpass = no
  colourise = yes
  msg_denied = "You are already logged in - access denied"
 }
 resources {
 }
 security {
  max_attributes = 200
  reject_delay = 0.000000
  status_server = yes
  allow_vulnerable_openssl = "yes"
 }
}
radiusd: #### Loading Realms and Home Servers ####
 proxy server {
  retry_delay = 5
  retry_count = 3
  default_fallback = no
  dead_time = 120
  wake_all_if_all_dead = no
 }
WARNING: Ignoring "response_window = 30.000000", forcing to
"response_window = 5.000000"
 home_server proxy_server_A {
  ipaddr = localhost IPv4 address [127.0.0.1]
  port = 60812
  type = "auth+acct"
  secret = <<< secret >>>
  response_window = 30.000000
  response_timeouts = 1
  max_outstanding = 65536
  zombie_period = 40
  status_check = "request"
  ping_interval = 30
  check_interval = 6
  check_timeout = 4
  num_answers_to_alive = 3
  revive_interval = 300
  username = "orange-system"
  password = "incorrect"
  limit {
  max_connections = 16
  max_requests = 0
  lifetime = 0
  idle_timeout = 0
  }
  coa {
  irt = 2
  mrt = 16
  mrc = 5
  mrd = 30
  }
 }
WARNING: Ignoring "response_window = 30.000000", forcing to
"response_window = 5.000000"
 home_server proxy_server_B {
  ipaddr = localhost IPv4 address [127.0.0.1]
  port = 61812
  type = "auth+acct"
  secret = <<< secret >>>
  response_window = 30.000000
  response_timeouts = 1
  max_outstanding = 65536
  zombie_period = 40
  status_check = "request"
  ping_interval = 30
  check_interval = 6
  check_timeout = 4
  num_answers_to_alive = 3
  revive_interval = 300
  username = "orange-system"
  password = "incorrect"
  limit {
  max_connections = 16
  max_requests = 0
  lifetime = 0
  idle_timeout = 0
  }
  coa {
  irt = 2
  mrt = 16
  mrc = 5
  mrd = 30
  }
 }
 home_server_pool proxy_pool {
type = load-balance
home_server = proxy_server_A
home_server = proxy_server_B
 }
 home_server_pool proxy_pool {
type = load-balance
home_server = proxy_server_A
home_server = proxy_server_B
 }
 realm testproxy.sk {
auth_pool = proxy_pool
acct_pool = proxy_pool
nostrip
 }
 realm LOCAL {
authhost = LOCAL
accthost = LOCAL
 }
 realm NULL {
authhost = LOCAL
accthost = LOCAL
 }
 realm DEFAULT {
authhost = LOCAL
accthost = LOCAL
 }
radiusd: #### Loading Clients ####
 client localhost {
  ipaddr = 127.0.0.1
  require_message_authenticator = no
  secret = <<< secret >>>
  nas_type = "other"
  proto = "*"
  limit {
  max_connections = 16
  lifetime = 0
  idle_timeout = 30
  }
 }
Debugger not attached
radiusd: #### Instantiating modules ####
  # Loaded module rlm_unpack
  # Loading module "unpack" from file
/app/radius/conf/acct-test/mods-enabled/unpack
  # Loaded module rlm_files
  # Loading module "files" from file
/app/radius/conf/acct-test/mods-enabled/files
  files {
  filename = "/app/radius/conf/acct-test/mods-config/files/authorize"
  usersfile = "/app/radius/conf/acct-test/mods-config/files/authorize"
  acctusersfile = "/app/radius/conf/acct-test/mods-config/files/accounting"
  preproxy_usersfile =
"/app/radius/conf/acct-test/mods-config/files/pre-proxy"
  }
  # Loaded module rlm_expr
  # Loading module "expr" from file
/app/radius/conf/acct-test/mods-enabled/expr
  expr {
  safe_characters =
"@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_:
/äéöüàâæçèéêëîïôœùûüaÿÄÉÖÜßÀÂÆÇÈÉÊËÎÏÔŒÙÛÜŸ"
  }
  # Loaded module rlm_preprocess
  # Loading module "preprocess" from file
/app/radius/conf/acct-test/mods-enabled/preprocess
  preprocess {
  with_ascend_hack = no
  ascend_channels_per_line = 23
  with_ntdomain_hack = no
  with_specialix_jetstream_hack = no
  with_cisco_vsa_hack = no
  with_alvarion_vsa_hack = no
  }
  # Loaded module rlm_attr_filter
  # Loading module "attr_filter.post-proxy" from file
/app/radius/conf/acct-test/mods-enabled/attr_filter
  attr_filter attr_filter.post-proxy {
  filename = "/app/radius/conf/acct-test/mods-config/attr_filter/post-proxy"
  key = "%{Realm}"
  relaxed = no
  }
  # Loading module "attr_filter.pre-proxy" from file
/app/radius/conf/acct-test/mods-enabled/attr_filter
  attr_filter attr_filter.pre-proxy {
  filename = "/app/radius/conf/acct-test/mods-config/attr_filter/pre-proxy"
  key = "%{Realm}"
  relaxed = no
  }
  # Loading module "attr_filter.access_reject" from file
/app/radius/conf/acct-test/mods-enabled/attr_filter
  attr_filter attr_filter.access_reject {
  filename =
"/app/radius/conf/acct-test/mods-config/attr_filter/access_reject"
  key = "%{User-Name}"
  relaxed = no
  }
  # Loading module "attr_filter.access_challenge" from file
/app/radius/conf/acct-test/mods-enabled/attr_filter
  attr_filter attr_filter.access_challenge {
  filename =
"/app/radius/conf/acct-test/mods-config/attr_filter/access_challenge"
  key = "%{User-Name}"
  relaxed = no
  }
  # Loading module "attr_filter.accounting_response" from file
/app/radius/conf/acct-test/mods-enabled/attr_filter
  attr_filter attr_filter.accounting_response {
  filename =
"/app/radius/conf/acct-test/mods-config/attr_filter/accounting_response"
  key = "%{User-Name}"
  relaxed = no
  }
  # Loaded module rlm_always
  # Loading module "reject" from file
/app/radius/conf/acct-test/mods-enabled/always
  always reject {
  rcode = "reject"
  simulcount = 0
  mpp = no
  }
  # Loading module "fail" from file
/app/radius/conf/acct-test/mods-enabled/always
  always fail {
  rcode = "fail"
  simulcount = 0
  mpp = no
  }
  # Loading module "ok" from file
/app/radius/conf/acct-test/mods-enabled/always
  always ok {
  rcode = "ok"
  simulcount = 0
  mpp = no
  }
  # Loading module "handled" from file
/app/radius/conf/acct-test/mods-enabled/always
  always handled {
  rcode = "handled"
  simulcount = 0
  mpp = no
  }
  # Loading module "invalid" from file
/app/radius/conf/acct-test/mods-enabled/always
  always invalid {
  rcode = "invalid"
  simulcount = 0
  mpp = no
  }
  # Loading module "userlock" from file
/app/radius/conf/acct-test/mods-enabled/always
  always userlock {
  rcode = "userlock"
  simulcount = 0
  mpp = no
  }
  # Loading module "notfound" from file
/app/radius/conf/acct-test/mods-enabled/always
  always notfound {
  rcode = "notfound"
  simulcount = 0
  mpp = no
  }
  # Loading module "noop" from file
/app/radius/conf/acct-test/mods-enabled/always
  always noop {
  rcode = "noop"
  simulcount = 0
  mpp = no
  }
  # Loading module "updated" from file
/app/radius/conf/acct-test/mods-enabled/always
  always updated {
  rcode = "updated"
  simulcount = 0
  mpp = no
  }
  # Loaded module rlm_linelog
  # Loading module "linelog" from file
/app/radius/conf/acct-test/mods-enabled/linelog
  linelog {
  filename = "/app_log/radius/acct//linelog"
  escape_filenames = no
  syslog_severity = "info"
  permissions = 384
  format = "This is a log message for %{User-Name}"
  reference = "messages.%{%{Packet-Type}:-default}"
  }
  # Loading module "log_request" from file
/app/radius/conf/acct-test/mods-enabled/linelog
  linelog log_request {
  filename = "/app_log/radius/acct//log.gen"
  escape_filenames = no
  syslog_severity = "info"
  permissions = 384
  format = "%t : Info: REQUEST(%{User-Name}): %{pairs:request:}"
  }
  # Loading module "log_control" from file
/app/radius/conf/acct-test/mods-enabled/linelog
  linelog log_control {
  filename = "/app_log/radius/acct//log.gen"
  escape_filenames = no
  syslog_severity = "info"
  permissions = 384
  format = "%t : Info: CONTROL(%{User-Name}): %{pairs:control:}"
  }
  # Loading module "log_proxy_request" from file
/app/radius/conf/acct-test/mods-enabled/linelog
  linelog log_proxy_request {
  filename = "/app_log/radius/acct//log.gen"
  escape_filenames = no
  syslog_severity = "info"
  permissions = 384
  format = "%t : Info: PROXY-REQUEST(%{User-Name}): %{pairs:proxy-request:}"
  }
  # Loading module "log_reply" from file
/app/radius/conf/acct-test/mods-enabled/linelog
  linelog log_reply {
  filename = "/app_log/radius/acct//log.gen"
  escape_filenames = no
  syslog_severity = "info"
  permissions = 384
  format = "%t : Info REPLY(%{User-Name}): %{pairs:reply:}"
  }
  # Loading module "log_proxy_reply" from file
/app/radius/conf/acct-test/mods-enabled/linelog
  linelog log_proxy_reply {
  filename = "/app_log/radius/acct//log.gen"
  escape_filenames = no
  syslog_severity = "info"
  permissions = 384
  format = "%t : Info PROXY-REPLY(%{User-Name}):
Packet-Type=%{proxy-reply:Packet-Type} %{pairs:proxy-reply:}"
  }
  # Loaded module rlm_perl
  # Loading module "perl" from file
/app/radius/conf/acct-test/mods-enabled/perl
  perl {
  filename = "/app/radius/conf/acct-test/mods-config/perl/radius.pm"
  func_authorize = "authorize"
  func_authenticate = "authenticate"
  func_post_auth = "post_auth"
  func_accounting = "accounting"
  func_preacct = "preacct"
  func_checksimul = "checksimul"
  func_detach = "detach"
  func_xlat = "xlat"
  func_pre_proxy = "pre_proxy"
  func_post_proxy = "post_proxy"
  func_recv_coa = "recv_coa"
  func_send_coa = "send_coa"
  }
  # Loading module "log_acct_bras" from file
/app/radius/conf/acct-test/mods-enabled/linelog-special
  linelog log_acct_bras {
  filename = "/app_log/radius/loaders/bdsl-%D.log"
  escape_filenames = no
  syslog_severity = "info"
  permissions = 384
  format = ""
  reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}"
  }
  # Loading module "log_acct_common" from file
/app/radius/conf/acct-test/mods-enabled/linelog-special
  linelog log_acct_common {
  filename = "/app_log/radius/loaders/common-%D.log"
  escape_filenames = no
  syslog_severity = "info"
  permissions = 384
  format = ""
  reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}"
  }
  # Loading module "log_dispatch_bras" from file
/app/radius/conf/acct-test/mods-enabled/linelog-special
  linelog log_dispatch_bras {
  filename = "/app_log/radius/notification/dispatcher-%D.log"
  escape_filenames = no
  syslog_severity = "info"
  permissions = 384
  format = "00 %l
(0)%{User-Name}|radiusNasPortId|%{NAS-IP-Address}|radiusClientIPAddress|%{%{Framed-IP-Address}:-Unknown}}"
  }
  # Loading module "log_dispatch_asa" from file
/app/radius/conf/acct-test/mods-enabled/linelog-special
  linelog log_dispatch_asa {
  filename = "/app_log/radius/notification/dispatcher-%D.log"
  escape_filenames = no
  syslog_severity = "info"
  permissions = 384
  format = "00 %l
%{User-Name}|radiusNasPortId|%{NAS-IP-Address}|radiusClientIPAddress|%{%{Calling-Station-Id}:-Unknown}}|radiusTunnelClientEndpoint|%{%{Framed-IP-Address}:-Unknown}"
  }
  # Loaded module rlm_realm
  # Loading module "suffix" from file
/app/radius/conf/acct-test/mods-enabled/realm
  realm suffix {
  format = "suffix"
  delimiter = "@"
  ignore_default = no
  ignore_null = no
  }
 instantiate {
  # Instantiating module "perl" from file
/app/radius/conf/acct-test/mods-enabled/perl
    config {
        logdir = /app_log/radius/acct/
        confdir = /app/radius/conf/acct-test/
        name = acct
    }
 }
 modules {
  # Instantiating module "files" from file
/app/radius/conf/acct-test/mods-enabled/files
reading pairlist file /app/radius/conf/acct-test/mods-config/files/authorize
reading pairlist file /app/radius/conf/acct-test/mods-config/files/authorize
reading pairlist file
/app/radius/conf/acct-test/mods-config/files/accounting
reading pairlist file /app/radius/conf/acct-test/mods-config/files/pre-proxy
  # Instantiating module "preprocess" from file
/app/radius/conf/acct-test/mods-enabled/preprocess
  # Instantiating module "attr_filter.post-proxy" from file
/app/radius/conf/acct-test/mods-enabled/attr_filter
reading pairlist file
/app/radius/conf/acct-test/mods-config/attr_filter/post-proxy
  # Instantiating module "attr_filter.pre-proxy" from file
/app/radius/conf/acct-test/mods-enabled/attr_filter
reading pairlist file
/app/radius/conf/acct-test/mods-config/attr_filter/pre-proxy
  # Instantiating module "attr_filter.access_reject" from file
/app/radius/conf/acct-test/mods-enabled/attr_filter
reading pairlist file
/app/radius/conf/acct-test/mods-config/attr_filter/access_reject
  # Instantiating module "attr_filter.access_challenge" from file
/app/radius/conf/acct-test/mods-enabled/attr_filter
reading pairlist file
/app/radius/conf/acct-test/mods-config/attr_filter/access_challenge
  # Instantiating module "attr_filter.accounting_response" from file
/app/radius/conf/acct-test/mods-enabled/attr_filter
reading pairlist file
/app/radius/conf/acct-test/mods-config/attr_filter/accounting_response
  # Instantiating module "reject" from file
/app/radius/conf/acct-test/mods-enabled/always
  # Instantiating module "fail" from file
/app/radius/conf/acct-test/mods-enabled/always
  # Instantiating module "ok" from file
/app/radius/conf/acct-test/mods-enabled/always
  # Instantiating module "handled" from file
/app/radius/conf/acct-test/mods-enabled/always
  # Instantiating module "invalid" from file
/app/radius/conf/acct-test/mods-enabled/always
  # Instantiating module "userlock" from file
/app/radius/conf/acct-test/mods-enabled/always
  # Instantiating module "notfound" from file
/app/radius/conf/acct-test/mods-enabled/always
  # Instantiating module "noop" from file
/app/radius/conf/acct-test/mods-enabled/always
  # Instantiating module "updated" from file
/app/radius/conf/acct-test/mods-enabled/always
  # Instantiating module "linelog" from file
/app/radius/conf/acct-test/mods-enabled/linelog
  # Instantiating module "log_request" from file
/app/radius/conf/acct-test/mods-enabled/linelog
  # Instantiating module "log_control" from file
/app/radius/conf/acct-test/mods-enabled/linelog
  # Instantiating module "log_proxy_request" from file
/app/radius/conf/acct-test/mods-enabled/linelog
  # Instantiating module "log_reply" from file
/app/radius/conf/acct-test/mods-enabled/linelog
  # Instantiating module "log_proxy_reply" from file
/app/radius/conf/acct-test/mods-enabled/linelog
  # Instantiating module "log_acct_bras" from file
/app/radius/conf/acct-test/mods-enabled/linelog-special
  # Instantiating module "log_acct_common" from file
/app/radius/conf/acct-test/mods-enabled/linelog-special
  # Instantiating module "log_dispatch_bras" from file
/app/radius/conf/acct-test/mods-enabled/linelog-special
  # Instantiating module "log_dispatch_asa" from file
/app/radius/conf/acct-test/mods-enabled/linelog-special
  # Instantiating module "suffix" from file
/app/radius/conf/acct-test/mods-enabled/realm
 } # modules
radiusd: #### Loading Virtual Servers ####
server { # from file /app/radius/conf/acct-test/radiusd.conf
} # server
server default { # from file
/app/radius/conf/acct-test/sites-enabled/default
 # Loading preacct {...}
 # Loading accounting {...}
} # server default
radiusd: #### Opening IP addresses and Ports ####
listen {
  type = "control"
 listen {
  socket = "/app_log/radius/acct/control.socket"
  mode = "rw"
  peercred = yes
 }
}
listen {
  type = "acct"
  ipv4addr = *
  port = 10813
   limit {
    max_pps = 0
    max_connections = 16
    lifetime = 0
    idle_timeout = 30
   }
}
listen {
  type = "acct"
  ipv4addr = *
  port = 10646
   limit {
    max_pps = 0
    max_connections = 16
    lifetime = 0
    idle_timeout = 30
   }
}
Listening on command file /app_log/radius/acct/control.socket
Listening on acct address * port 10813 bound to server default
Listening on acct address * port 10646 bound to server default
Opening new proxy socket 'proxy address * port 0'
Listening on proxy address * port 47178
Ready to process requests

####### Both proxy servers are down, send request ######

(0) Received Accounting-Request Id 40 from 127.0.0.1:56107 to
127.0.0.1:10813 length 219
(0)   User-Name = "mon-zdroje1 at testproxy.sk"
(0)   NAS-IP-Address = 213.151.216.201
(0)   NAS-Identifier = "ggsn-01-bb1.orange.sk"
(0)   NAS-Port-Type = Virtual
(0)   Acct-Status-Type = Start
(0)   Called-Station-Id = "proxy.corp"
(0)   Calling-Station-Id = "421905066001"
(0)   Acct-Session-Id = "d597d91523920840"
(0)   Acct-Multi-Session-Id = "d597d91511c28024"
(0)   Acct-Link-Count = 1
(0)   Framed-IP-Address = 172.23.68.11
(0)   Service-Type = Framed-User
(0)   Framed-Protocol = GPRS-PDP-Context
(0)   Acct-Authentic = RADIUS
(0)   X-Ascend-PRI-Number-Type = 8
(0)   Attr-224 = 0x32019104600998f8
(0)   X-Ascend-Dial-Number = "<D5><97>\331\025"
(0)   X-Ascend-Metric = 596772928
(0)   X-Ascend-Route-IP = 213.151.252.24
(0) # Executing section preacct from file
/app/radius/conf/acct-test/sites-enabled/default
(0)   preacct {
(0)     [preprocess] = ok
(0)     if ( ! &NAS-IP-Address ) {
(0)     if ( ! &NAS-IP-Address )  -> FALSE
(0)     else {
(0)       policy huntgroup {
(0)         switch &NAS-IP-Address {
(0)           case 213.151.216.201 {
(0)             update request {
(0)               &Huntgroup-Name := 'GGSN'
(0)             } # update request = noop
(0)           } # case 213.151.216.201 = noop
(0)         } # switch &NAS-IP-Address = noop
(0)       } # policy huntgroup = noop
(0)     } # else = noop
(0)     policy username {
(0)       if (!&User-Name || &User-Name == '') {
(0)       if (!&User-Name || &User-Name == '')  -> FALSE
(0)       elsif (&User-Name =~ /^[0-9]+$/) {
(0)       elsif (&User-Name =~ /^[0-9]+$/)  -> FALSE
(0)     } # policy username = ok
(0)     policy acct_counters64.preacct {
(0)       update request {
(0)         WARNING: Can't find &Acct-Input-Gigawords.  Using 0 as operand
value
(0)         WARNING: Can't find &Acct-Input-Octets.  Using 0 as operand
value
(0)         EXPAND %{expr:(&Acct-Input-Gigawords << 32) |
&Acct-Input-Octets}
(0)            --> 0
(0)         &Acct-Input-Octets64 = 0
(0)         WARNING: Can't find &Acct-Output-Gigawords.  Using 0 as operand
value
(0)         WARNING: Can't find &Acct-Output-Octets.  Using 0 as operand
value
(0)         EXPAND %{expr:(&Acct-Output-Gigawords << 32) |
&Acct-Output-Octets}
(0)            --> 0
(0)         &Acct-Output-Octets64 = 0
(0)       } # update request = noop
(0)     } # policy acct_counters64.preacct = noop
(0)     if (&Class) {
(0)     if (&Class)  -> FALSE
(0)     policy acct_unique {
(0)       if ("%{string:Class}" =~ /ai:([0-9a-f]{32})/i) {
(0)       EXPAND %{string:Class}
(0)          -->
(0)       if ("%{string:Class}" =~ /ai:([0-9a-f]{32})/i)  -> FALSE
(0)       else {
(0)         update request {
(0)           EXPAND
%{md5:%{User-Name},%{Acct-Session-ID},%{%{NAS-IPv6-Address}:-%{NAS-IP-Address}},%{NAS-Identifier},%{NAS-Port-ID},%{NAS-Port}}
(0)              --> 772f7c0824d05fe594797a68d34c3161
(0)           &Acct-Unique-Session-Id := 772f7c0824d05fe594797a68d34c3161
(0)         } # update request = noop
(0)       } # else = noop
(0)     } # policy acct_unique = noop
(0) suffix: Checking for suffix after "@"
(0) suffix: Looking up realm "testproxy.sk" for User-Name = "
mon-zdroje1 at testproxy.sk"
(0) suffix: Found realm "testproxy.sk"
(0) suffix: Adding Realm = "testproxy.sk"
(0) suffix: Proxying request from user mon-zdroje1 at testproxy.sk to realm
testproxy.sk
(0) suffix: Preparing to proxy accounting request to realm "testproxy.sk"
(0)     [suffix] = updated
(0) log_control: EXPAND /app_log/radius/acct//log.gen
(0) log_control:    --> /app_log/radius/acct//log.gen
(0) log_control: EXPAND %t : Info: CONTROL(%{User-Name}): %{pairs:control:}
(0) log_control:    --> Wed Aug 12 09:26:59 2015 : Info: CONTROL(
mon-zdroje1 at testproxy.sk): Proxy-To-Realm = "testproxy.sk"
(0)     [log_control] = ok
(0)   } # preacct = updated
(0) # Executing section accounting from file
/app/radius/conf/acct-test/sites-enabled/default
(0)   accounting {
(0)     if (&Huntgroup-Name == 'LNS') {
(0)     if (&Huntgroup-Name == 'LNS')  -> FALSE
(0)     elsif (&Huntgroup-Name == 'BRAS') {
(0)     elsif (&Huntgroup-Name == 'BRAS')  -> FALSE
(0)     elsif (&Called-Station-Id && &Called-Station-Id =~ /SkyToll/i) {
(0)     elsif (&Called-Station-Id && &Called-Station-Id =~ /SkyToll/i)  ->
FALSE
(0)     elsif (&Huntgroup-Name == 'ASA') {
(0)     elsif (&Huntgroup-Name == 'ASA')  -> FALSE
(0)     else {
(0)       if (&control:Proxy-To-Realm ) {
(0)       if (&control:Proxy-To-Realm )  -> TRUE
(0)       (&control:Proxy-To-Realm )  { ... } # empty sub-section is ignored
(0)       ... skipping else for request 0: Preceding "if" was taken
(0)     } # else = noop
(0)     [ok] = ok
(0)   } # accounting = ok
Opening new proxy socket 'proxy address * port 0'
Listening on proxy address * port 57096
(0) Proxying request to home server 127.0.0.1 port 61813 timeout 5.000000
(0) Sent Accounting-Request Id 210 from 0.0.0.0:57096 to 127.0.0.1:61813
length 229
(0)   User-Name = "mon-zdroje1 at testproxy.sk"
(0)   NAS-IP-Address = 213.151.216.201
(0)   NAS-Identifier = "ggsn-01-bb1.orange.sk"
(0)   NAS-Port-Type = Virtual
(0)   Acct-Status-Type = Start
(0)   Called-Station-Id = "proxy.corp"
(0)   Calling-Station-Id = "421905066001"
(0)   Acct-Session-Id = "d597d91523920840"
(0)   Acct-Multi-Session-Id = "d597d91511c28024"
(0)   Acct-Link-Count = 1
(0)   Framed-IP-Address = 172.23.68.11
(0)   Service-Type = Framed-User
(0)   Framed-Protocol = GPRS-PDP-Context
(0)   Acct-Authentic = RADIUS
(0)   X-Ascend-PRI-Number-Type = 8
(0)   Attr-224 = 0x32019104600998f8
(0)   X-Ascend-Dial-Number = "<D5><97>\331\025"
(0)   X-Ascend-Metric = 596772928
(0)   X-Ascend-Route-IP = 213.151.252.24
(0)   Event-Timestamp = "Aug 12 2015 09:26:59 CEST"
(0)   Proxy-State = 0x3430
Waking up in 0.3 seconds.
(0) Expecting proxy response no later than 4.669045 seconds from now
Waking up in 4.6 seconds.
(0) No proxy response, giving up on request and marking it done
Marking home server 127.0.0.1 port 61813 as zombie (it has not responded in
5.000000 seconds).
PING: Waiting 4 seconds for response to ping
PING: Next status packet in 6 seconds
(0) ERROR: Failing proxied request for user "mon-zdroje1 at testproxy.sk", due
to lack of any response from home server 127.0.0.1 port 61813
(0) Clearing existing &reply: attributes
(0) Found Post-Proxy-Type Fail-Accounting
(0) Post-Proxy-Type sub-section not found.  Ignoring.
(0) Not sending reply to client.
(0) Finished request
(0) <done>: Cleaning up request packet ID 40 with timestamp +17
Waking up in 3.9 seconds.
No response to status check 1 for home server 127.0.0.1 port 61813
Waking up in 2.4 seconds.
PING: Waiting 4 seconds for response to ping
PING: Next status packet in 6 seconds
Waking up in 3.9 seconds.
No response to status check 2 for home server 127.0.0.1 port 61813
Waking up in 1.7 seconds.
PING: Waiting 4 seconds for response to ping
PING: Next status packet in 6 seconds
Waking up in 3.9 seconds.

###### Both severs are up ###########

No outstanding request was found for reply from host 127.0.0.1 port 61813 -
ID 91
Waking up in 3.9 seconds.
No response to status check 3 for home server 127.0.0.1 port 61813
Waking up in 2.8 seconds.
PING: Waiting 4 seconds for response to ping
PING: Next status packet in 6 seconds
Waking up in 3.9 seconds.
No outstanding request was found for reply from host 127.0.0.1 port 61813 -
ID 252
Waking up in 3.9 seconds.
No response to status check 4 for home server 127.0.0.1 port 61813
Waking up in 1.4 seconds.


Debug output from proxy server ( procy-test-B ):
Ready to process requests
(0) Received Accounting-Request Id 91 from 127.0.0.1:57096 to
127.0.0.1:61813 length 89
(0)   User-Name = "orange-system"
(0)   Acct-Status-Type = Stop
(0)   Acct-Session-Id = "00000000"
(0)   Event-Timestamp = "Aug 12 2015 09:27:17 CEST"
(0)   NAS-Identifier = "Status Check 2. Are you alive?"
(0) # Executing section accounting from file
/app/radius/conf/proxy-test-B/sites-enabled/default
(0)   accounting {
(0)     [ok] = ok
(0)   } # accounting = ok
(0) Sent Accounting-Response Id 91 from 127.0.0.1:61813 to 127.0.0.1:57096
length 0
(0) Finished request
(0) <done>: Cleaning up request packet ID 91 with timestamp +3
Ready to process requests
(1) Received Accounting-Request Id 252 from 127.0.0.1:57096 to
127.0.0.1:61813 length 89
(1)   User-Name = "orange-system"
(1)   Acct-Status-Type = Stop
(1)   Acct-Session-Id = "00000000"
(1)   Event-Timestamp = "Aug 12 2015 09:27:23 CEST"
(1)   NAS-Identifier = "Status Check 3. Are you alive?"
(1) # Executing section accounting from file
/app/radius/conf/proxy-test-B/sites-enabled/default
(1)   accounting {
(1)     [ok] = ok
(1)   } # accounting = ok
(1) Sent Accounting-Response Id 252 from 127.0.0.1:61813 to 127.0.0.1:57096
length 0
(1) Finished request
(1) <done>: Cleaning up request packet ID 252 with timestamp +9
Ready to process requests




On Tue, Aug 11, 2015 at 9:42 AM, Alan DeKok <aland at deployingradius.com>
wrote:

> On Aug 11, 2015, at 9:14 AM, Peter Balsianok <balsianok.peter at gmail.com>
> wrote:
> > Could you please tell me, why my RADIUS server doesnt find reply
> > (status-check via using  "request" ) from 3rd party RADIUS server ?
>
>   Post the debug output as suggested in the FAQ, "man" pages, web pages,
> and daily on this list.
>
>   Alan DeKok.
>
>
> -
> List info/subscribe/unsubscribe? See
> http://www.freeradius.org/list/users.html


More information about the Freeradius-Users mailing list