FreeRadius 3.0.4 | Failed to find "sql" in the "modules" section
Gerald Vogt
vogt at spamcop.net
Fri May 22 09:49:36 CEST 2015
Did you read the README.rst file?
/etc/raddb/README.rst
-Gerald
On 22/05/15 09:32, Larry Cataina wrote:
> Dear Gerald,
>
> Thank you for the quick response, However I cannot find how to enable or load the sql module,
> Appreciate if you can help me. Thanks a lot.
>
> Best Regards,
> Larry
>
>
> On 22 May, 2015, at 3:08 pm, Gerald Vogt <vogt at spamcop.net> wrote:
>
>> You have to enable the sql module. It's not in /etc/raddb/mods-enabled. Only modules in /etc/raddb/mods-enabled are loaded.
>>
>> -Gerald
>>
>> On 22/05/15 09:00, Larry Cataina wrote:
>>> Dear FreeRADIUS,
>>>
>>> Greetings!
>>> I am a newbie linux system admin.
>>> I had setup freeradius 3.04 and tried to use DaloRadius for web management, however I am facing issue as not able to start the radius.
>>>
>>> error:
>>> ******
>>> /etc/raddb/sites-enabled/default[372]: Failed to find "sql" in the "modules" section.
>>> /etc/raddb/sites-enabled/default[254]: Errors parsing authorize section.
>>> ******
>>>
>>> With the freeradius only, it is working. I do understand modules folder had been changed in version 3.0.4. Already uncommented the most sql in mods-available. I appreciate if you can help me how to fix it.
>>> I had attached the radiusD -X logs for your reference.
>>> Looking forward for your reply. Thanks
>>> =============
>>>
>>> [root at pacific-technology raddb]# service radiusd start
>>> Redirecting to /bin/systemctl start radiusd.service
>>> Job for radiusd.service failed. See 'systemctl status radiusd.service' and 'journalctl -xn' for details.
>>> [root at pacific-technology raddb]# systemctl status radiusd.service
>>> radiusd.service - FreeRADIUS high performance RADIUS server.
>>> Loaded: loaded (/usr/lib/systemd/system/radiusd.service; enabled)
>>> Active: failed (Result: exit-code) since Fri 2015-05-22 14:17:51 HKT; 12s ago
>>> Process: 7050 ExecStartPre=/usr/sbin/radiusd -C (code=exited, status=1/FAILURE)
>>> Process: 7048 ExecStartPre=/bin/chown -R radiusd.radiusd /var/run/radiusd (code=exited, status=0/SUCCESS)
>>>
>>> May 22 14:17:51 pacific-technology systemd[1]: Starting FreeRADIUS high performance RADIUS server....
>>> May 22 14:17:51 pacific-technology systemd[1]: radiusd.service: control process exited, code=exited status=1
>>> May 22 14:17:51 pacific-technology systemd[1]: Failed to start FreeRADIUS high performance RADIUS server..
>>> May 22 14:17:51 pacific-technology systemd[1]: Unit radiusd.service entered failed state.
>>> [root at pacific-technology raddb]# radiusd -X
>>> radiusd: FreeRADIUS Version 3.0.4, for host x86_64-redhat-linux-gnu, built on Mar 5 2015 at 23:41:36
>>> Copyright (C) 1999-2014 The FreeRADIUS server project and contributors
>>> There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
>>> PARTICULAR PURPOSE
>>> You may redistribute copies of FreeRADIUS under the terms of the
>>> GNU General Public License
>>> For more information about these matters, see the file named COPYRIGHT
>>> Starting - reading configuration files ...
>>> including dictionary file /usr/share/freeradius/dictionary
>>> including dictionary file /usr/share/freeradius/dictionary.dhcp
>>> including dictionary file /usr/share/freeradius/dictionary.vqp
>>> including dictionary file /etc/raddb/dictionary
>>> including configuration file /etc/raddb/radiusd.conf
>>> including configuration file /etc/raddb/proxy.conf
>>> including configuration file /etc/raddb/clients.conf
>>> including files in directory /etc/raddb/mods-enabled/
>>> including configuration file /etc/raddb/mods-enabled/always
>>> including configuration file /etc/raddb/mods-enabled/attr_filter
>>> including configuration file /etc/raddb/mods-enabled/cache_eap
>>> including configuration file /etc/raddb/mods-enabled/chap
>>> including configuration file /etc/raddb/mods-enabled/detail
>>> including configuration file /etc/raddb/mods-enabled/detail.log
>>> including configuration file /etc/raddb/mods-enabled/dhcp
>>> including configuration file /etc/raddb/mods-enabled/digest
>>> including configuration file /etc/raddb/mods-enabled/dynamic_clients
>>> including configuration file /etc/raddb/mods-enabled/eap
>>> including configuration file /etc/raddb/mods-enabled/echo
>>> including configuration file /etc/raddb/mods-enabled/exec
>>> including configuration file /etc/raddb/mods-enabled/expiration
>>> including configuration file /etc/raddb/mods-enabled/expr
>>> including configuration file /etc/raddb/mods-enabled/files
>>> including configuration file /etc/raddb/mods-enabled/linelog
>>> including configuration file /etc/raddb/mods-enabled/logintime
>>> including configuration file /etc/raddb/mods-enabled/mschap
>>> including configuration file /etc/raddb/mods-enabled/ntlm_auth
>>> including configuration file /etc/raddb/mods-enabled/pap
>>> including configuration file /etc/raddb/mods-enabled/passwd
>>> including configuration file /etc/raddb/mods-enabled/preprocess
>>> including configuration file /etc/raddb/mods-enabled/radutmp
>>> including configuration file /etc/raddb/mods-enabled/realm
>>> including configuration file /etc/raddb/mods-enabled/replicate
>>> including configuration file /etc/raddb/mods-enabled/soh
>>> including configuration file /etc/raddb/mods-enabled/sradutmp
>>> including configuration file /etc/raddb/mods-enabled/unix
>>> including configuration file /etc/raddb/mods-enabled/unpack
>>> including configuration file /etc/raddb/mods-enabled/utf8
>>> including files in directory /etc/raddb/policy.d/
>>> including configuration file /etc/raddb/policy.d/accounting
>>> including configuration file /etc/raddb/policy.d/canonicalization
>>> including configuration file /etc/raddb/policy.d/control
>>> including configuration file /etc/raddb/policy.d/cui
>>> including configuration file /etc/raddb/policy.d/debug
>>> including configuration file /etc/raddb/policy.d/dhcp
>>> including configuration file /etc/raddb/policy.d/eap
>>> including configuration file /etc/raddb/policy.d/filter
>>> including configuration file /etc/raddb/policy.d/operator-name
>>> including files in directory /etc/raddb/sites-enabled/
>>> including configuration file /etc/raddb/sites-enabled/default
>>> including configuration file /etc/raddb/sites-enabled/inner-tunnel
>>> main {
>>> security {
>>> user = "radiusd"
>>> group = "radiusd"
>>> allow_core_dumps = no
>>> }
>>> }
>>> main {
>>> name = "radiusd"
>>> prefix = "/usr"
>>> localstatedir = "/var"
>>> sbindir = "/usr/sbin"
>>> logdir = "/var/log/radius"
>>> run_dir = "/var/run/radiusd"
>>> libdir = "/usr/lib64/freeradius"
>>> radacctdir = "/var/log/radius/radacct"
>>> hostname_lookups = no
>>> max_request_time = 30
>>> cleanup_delay = 5
>>> max_requests = 1024
>>> pidfile = "/var/run/radiusd/radiusd.pid"
>>> checkrad = "/usr/sbin/checkrad"
>>> debug_level = 0
>>> proxy_requests = yes
>>> log {
>>> stripped_names = no
>>> auth = no
>>> auth_badpass = no
>>> auth_goodpass = no
>>> colourise = yes
>>> msg_denied = "You are already logged in - access denied"
>>> }
>>> security {
>>> max_attributes = 200
>>> reject_delay = 1
>>> status_server = yes
>>> }
>>> }
>>> radiusd: #### Loading Realms and Home Servers ####
>>> proxy server {
>>> retry_delay = 5
>>> retry_count = 3
>>> default_fallback = no
>>> dead_time = 120
>>> wake_all_if_all_dead = no
>>> }
>>> home_server localhost {
>>> ipaddr = 127.0.0.1
>>> port = 1812
>>> type = "auth"
>>> secret = <<< secret >>>
>>> response_window = 20.000000
>>> response_timeouts = 1
>>> max_outstanding = 65536
>>> zombie_period = 40
>>> status_check = "status-server"
>>> ping_interval = 30
>>> check_interval = 30
>>> check_timeout = 4
>>> num_answers_to_alive = 3
>>> revive_interval = 120
>>> coa {
>>> irt = 2
>>> mrt = 16
>>> mrc = 5
>>> mrd = 30
>>> }
>>> limit {
>>> max_connections = 16
>>> max_requests = 0
>>> lifetime = 0
>>> idle_timeout = 0
>>> }
>>> }
>>> home_server_pool my_auth_failover {
>>> type = fail-over
>>> home_server = localhost
>>> }
>>> realm example.com {
>>> auth_pool = my_auth_failover
>>> }
>>> realm LOCAL {
>>> }
>>> radiusd: #### Loading Clients ####
>>> client 10.10.10.0/24 {
>>> require_message_authenticator = no
>>> secret = <<< secret >>>
>>> nas_type = "other"
>>> limit {
>>> max_connections = 16
>>> lifetime = 0
>>> idle_timeout = 30
>>> }
>>> }
>>> No 'ipaddr' or 'ipv4addr' or 'ipv6addr' field found in client 10.10.10.0/24. Please fix your configuration
>>> Support for old-style clients will be removed in a future release
>>> client 192.168.100.0/24 {
>>> require_message_authenticator = no
>>> secret = <<< secret >>>
>>> nas_type = "other"
>>> limit {
>>> max_connections = 16
>>> lifetime = 0
>>> idle_timeout = 30
>>> }
>>> }
>>> No 'ipaddr' or 'ipv4addr' or 'ipv6addr' field found in client 192.168.100.0/24. Please fix your configuration
>>> Support for old-style clients will be removed in a future release
>>> client localhost {
>>> ipaddr = 127.0.0.1
>>> require_message_authenticator = no
>>> secret = <<< secret >>>
>>> nas_type = "other"
>>> proto = "*"
>>> limit {
>>> max_connections = 16
>>> lifetime = 0
>>> idle_timeout = 30
>>> }
>>> }
>>> client localhost_ipv6 {
>>> ipv6addr = ::1
>>> require_message_authenticator = no
>>> secret = <<< secret >>>
>>> limit {
>>> max_connections = 16
>>> lifetime = 0
>>> idle_timeout = 30
>>> }
>>> }
>>> radiusd: #### Instantiating modules ####
>>> instantiate {
>>> }
>>> modules {
>>> # Loaded module rlm_always
>>> # Instantiating module "reject" from file /etc/raddb/mods-enabled/always
>>> always reject {
>>> rcode = "reject"
>>> simulcount = 0
>>> mpp = no
>>> }
>>> # Instantiating module "fail" from file /etc/raddb/mods-enabled/always
>>> always fail {
>>> rcode = "fail"
>>> simulcount = 0
>>> mpp = no
>>> }
>>> # Instantiating module "ok" from file /etc/raddb/mods-enabled/always
>>> always ok {
>>> rcode = "ok"
>>> simulcount = 0
>>> mpp = no
>>> }
>>> # Instantiating module "handled" from file /etc/raddb/mods-enabled/always
>>> always handled {
>>> rcode = "handled"
>>> simulcount = 0
>>> mpp = no
>>> }
>>> # Instantiating module "invalid" from file /etc/raddb/mods-enabled/always
>>> always invalid {
>>> rcode = "invalid"
>>> simulcount = 0
>>> mpp = no
>>> }
>>> # Instantiating module "userlock" from file /etc/raddb/mods-enabled/always
>>> always userlock {
>>> rcode = "userlock"
>>> simulcount = 0
>>> mpp = no
>>> }
>>> # Instantiating module "notfound" from file /etc/raddb/mods-enabled/always
>>> always notfound {
>>> rcode = "notfound"
>>> simulcount = 0
>>> mpp = no
>>> }
>>> # Instantiating module "noop" from file /etc/raddb/mods-enabled/always
>>> always noop {
>>> rcode = "noop"
>>> simulcount = 0
>>> mpp = no
>>> }
>>> # Instantiating module "updated" from file /etc/raddb/mods-enabled/always
>>> always updated {
>>> rcode = "updated"
>>> simulcount = 0
>>> mpp = no
>>> }
>>> # Loaded module rlm_attr_filter
>>> # Instantiating module "attr_filter.post-proxy" from file /etc/raddb/mods-enabled/attr_filter
>>> attr_filter attr_filter.post-proxy {
>>> filename = "/etc/raddb/mods-config/attr_filter/post-proxy"
>>> key = "%{Realm}"
>>> relaxed = no
>>> }
>>> reading pairlist file /etc/raddb/mods-config/attr_filter/post-proxy
>>> # Instantiating module "attr_filter.pre-proxy" from file /etc/raddb/mods-enabled/attr_filter
>>> attr_filter attr_filter.pre-proxy {
>>> filename = "/etc/raddb/mods-config/attr_filter/pre-proxy"
>>> key = "%{Realm}"
>>> relaxed = no
>>> }
>>> reading pairlist file /etc/raddb/mods-config/attr_filter/pre-proxy
>>> # Instantiating module "attr_filter.access_reject" from file /etc/raddb/mods-enabled/attr_filter
>>> attr_filter attr_filter.access_reject {
>>> filename = "/etc/raddb/mods-config/attr_filter/access_reject"
>>> key = "%{User-Name}"
>>> relaxed = no
>>> }
>>> reading pairlist file /etc/raddb/mods-config/attr_filter/access_reject
>>> # Instantiating module "attr_filter.access_challenge" from file /etc/raddb/mods-enabled/attr_filter
>>> attr_filter attr_filter.access_challenge {
>>> filename = "/etc/raddb/mods-config/attr_filter/access_challenge"
>>> key = "%{User-Name}"
>>> relaxed = no
>>> }
>>> reading pairlist file /etc/raddb/mods-config/attr_filter/access_challenge
>>> # Instantiating module "attr_filter.accounting_response" from file /etc/raddb/mods-enabled/attr_filter
>>> attr_filter attr_filter.accounting_response {
>>> filename = "/etc/raddb/mods-config/attr_filter/accounting_response"
>>> key = "%{User-Name}"
>>> relaxed = no
>>> }
>>> reading pairlist file /etc/raddb/mods-config/attr_filter/accounting_response
>>> # Loaded module rlm_cache
>>> # Instantiating module "cache_eap" from file /etc/raddb/mods-enabled/cache_eap
>>> cache cache_eap {
>>> key = "%{%{control:State}:-%{%{reply:State}:-%{State}}}"
>>> ttl = 15
>>> max_entries = 16384
>>> epoch = 0
>>> add_stats = no
>>> }
>>> # Loaded module rlm_chap
>>> # Instantiating module "chap" from file /etc/raddb/mods-enabled/chap
>>> # Loaded module rlm_detail
>>> # Instantiating module "detail" from file /etc/raddb/mods-enabled/detail
>>> detail {
>>> filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d"
>>> header = "%t"
>>> permissions = 384
>>> locking = no
>>> log_packet_header = no
>>> }
>>> # Instantiating module "auth_log" from file /etc/raddb/mods-enabled/detail.log
>>> detail auth_log {
>>> filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d"
>>> header = "%t"
>>> permissions = 384
>>> locking = no
>>> log_packet_header = no
>>> }
>>> rlm_detail (auth_log): 'User-Password' suppressed, will not appear in detail output
>>> # Instantiating module "reply_log" from file /etc/raddb/mods-enabled/detail.log
>>> detail reply_log {
>>> filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d"
>>> header = "%t"
>>> permissions = 384
>>> locking = no
>>> log_packet_header = no
>>> }
>>> # Instantiating module "pre_proxy_log" from file /etc/raddb/mods-enabled/detail.log
>>> detail pre_proxy_log {
>>> filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d"
>>> header = "%t"
>>> permissions = 384
>>> locking = no
>>> log_packet_header = no
>>> }
>>> # Instantiating module "post_proxy_log" from file /etc/raddb/mods-enabled/detail.log
>>> detail post_proxy_log {
>>> filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d"
>>> header = "%t"
>>> permissions = 384
>>> locking = no
>>> log_packet_header = no
>>> }
>>> # Loaded module rlm_dhcp
>>> # Instantiating module "dhcp" from file /etc/raddb/mods-enabled/dhcp
>>> # Loaded module rlm_digest
>>> # Instantiating module "digest" from file /etc/raddb/mods-enabled/digest
>>> # Loaded module rlm_dynamic_clients
>>> # Instantiating module "dynamic_clients" from file /etc/raddb/mods-enabled/dynamic_clients
>>> # Loaded module rlm_eap
>>> # Instantiating module "eap" from file /etc/raddb/mods-enabled/eap
>>> eap {
>>> default_eap_type = "md5"
>>> timer_expire = 60
>>> ignore_unknown_eap_types = no
>>> mod_accounting_username_bug = no
>>> max_sessions = 1024
>>> }
>>> # Linked to sub-module rlm_eap_md5
>>> # Linked to sub-module rlm_eap_leap
>>> # Linked to sub-module rlm_eap_gtc
>>> gtc {
>>> challenge = "Password: "
>>> auth_type = "PAP"
>>> }
>>> # Linked to sub-module rlm_eap_tls
>>> tls {
>>> tls = "tls-common"
>>> }
>>> tls-config tls-common {
>>> rsa_key_exchange = no
>>> dh_key_exchange = yes
>>> rsa_key_length = 512
>>> dh_key_length = 512
>>> verify_depth = 0
>>> ca_path = "/etc/raddb/certs"
>>> pem_file_type = yes
>>> private_key_file = "/etc/raddb/certs/server.pem"
>>> certificate_file = "/etc/raddb/certs/server.pem"
>>> ca_file = "/etc/raddb/certs/ca.pem"
>>> private_key_password = <<< secret >>>
>>> dh_file = "/etc/raddb/certs/dh"
>>> fragment_size = 1024
>>> include_length = yes
>>> check_crl = no
>>> cipher_list = "DEFAULT"
>>> ecdh_curve = "prime256v1"
>>> cache {
>>> enable = yes
>>> lifetime = 24
>>> max_entries = 255
>>> }
>>> verify {
>>> }
>>> ocsp {
>>> enable = no
>>> override_cert_url = yes
>>> url = "http://127.0.0.1/ocsp/"
>>> use_nonce = yes
>>> timeout = 0
>>> softfail = yes
>>> }
>>> }
>>> # Linked to sub-module rlm_eap_ttls
>>> ttls {
>>> tls = "tls-common"
>>> default_eap_type = "md5"
>>> copy_request_to_tunnel = no
>>> use_tunneled_reply = no
>>> virtual_server = "inner-tunnel"
>>> include_length = yes
>>> require_client_cert = no
>>> }
>>> Using cached TLS configuration from previous invocation
>>> # Linked to sub-module rlm_eap_peap
>>> peap {
>>> tls = "tls-common"
>>> default_method = "mschapv2"
>>> copy_request_to_tunnel = no
>>> use_tunneled_reply = no
>>> proxy_tunneled_request_as_eap = yes
>>> virtual_server = "inner-tunnel"
>>> soh = no
>>> require_client_cert = no
>>> }
>>> Using cached TLS configuration from previous invocation
>>> # Linked to sub-module rlm_eap_mschapv2
>>> mschapv2 {
>>> with_ntdomain_hack = no
>>> send_error = no
>>> }
>>> # Loaded module rlm_exec
>>> # Instantiating module "echo" from file /etc/raddb/mods-enabled/echo
>>> exec echo {
>>> wait = yes
>>> program = "/bin/echo %{User-Name}"
>>> input_pairs = "request"
>>> output_pairs = "reply"
>>> shell_escape = yes
>>> }
>>> # Instantiating module "exec" from file /etc/raddb/mods-enabled/exec
>>> exec {
>>> wait = no
>>> input_pairs = "request"
>>> shell_escape = yes
>>> timeout = 10
>>> }
>>> # Loaded module rlm_expiration
>>> # Instantiating module "expiration" from file /etc/raddb/mods-enabled/expiration
>>> # Loaded module rlm_expr
>>> # Instantiating module "expr" from file /etc/raddb/mods-enabled/expr
>>> expr {
>>> safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
>>> }
>>> # Loaded module rlm_files
>>> # Instantiating module "files" from file /etc/raddb/mods-enabled/files
>>> files {
>>> filename = "/etc/raddb/mods-config/files/authorize"
>>> usersfile = "/etc/raddb/mods-config/files/authorize"
>>> acctusersfile = "/etc/raddb/mods-config/files/accounting"
>>> preproxy_usersfile = "/etc/raddb/mods-config/files/pre-proxy"
>>> compat = "cistron"
>>> }
>>> reading pairlist file /etc/raddb/mods-config/files/authorize
>>> [/etc/raddb/mods-config/files/authorize]:86 Cistron compatibility checks for entry gannis ...
>>> [/etc/raddb/mods-config/files/authorize]:89 Cistron compatibility checks for entry thomas ...
>>> [/etc/raddb/mods-config/files/authorize]:92 Cistron compatibility checks for entry larry ...
>>> [/etc/raddb/mods-config/files/authorize]:95 Cistron compatibility checks for entry demo1 ...
>>> [/etc/raddb/mods-config/files/authorize]:98 Cistron compatibility checks for entry bob ...
>>> [/etc/raddb/mods-config/files/authorize]:101 Cistron compatibility checks for entry test ...
>>> [/etc/raddb/mods-config/files/authorize]:103 Cistron compatibility checks for entry crew1 ...
>>> [/etc/raddb/mods-config/files/authorize]:194 Cistron compatibility checks for entry DEFAULT ...
>>> [/etc/raddb/mods-config/files/authorize]:201 Cistron compatibility checks for entry DEFAULT ...
>>> [/etc/raddb/mods-config/files/authorize]:208 Cistron compatibility checks for entry DEFAULT ...
>>> reading pairlist file /etc/raddb/mods-config/files/authorize
>>> [/etc/raddb/mods-config/files/authorize]:86 Cistron compatibility checks for entry gannis ...
>>> [/etc/raddb/mods-config/files/authorize]:89 Cistron compatibility checks for entry thomas ...
>>> [/etc/raddb/mods-config/files/authorize]:92 Cistron compatibility checks for entry larry ...
>>> [/etc/raddb/mods-config/files/authorize]:95 Cistron compatibility checks for entry demo1 ...
>>> [/etc/raddb/mods-config/files/authorize]:98 Cistron compatibility checks for entry bob ...
>>> [/etc/raddb/mods-config/files/authorize]:101 Cistron compatibility checks for entry test ...
>>> [/etc/raddb/mods-config/files/authorize]:103 Cistron compatibility checks for entry crew1 ...
>>> [/etc/raddb/mods-config/files/authorize]:194 Cistron compatibility checks for entry DEFAULT ...
>>> [/etc/raddb/mods-config/files/authorize]:201 Cistron compatibility checks for entry DEFAULT ...
>>> [/etc/raddb/mods-config/files/authorize]:208 Cistron compatibility checks for entry DEFAULT ...
>>> reading pairlist file /etc/raddb/mods-config/files/accounting
>>> reading pairlist file /etc/raddb/mods-config/files/pre-proxy
>>> # Loaded module rlm_linelog
>>> # Instantiating module "linelog" from file /etc/raddb/mods-enabled/linelog
>>> linelog {
>>> filename = "/var/log/radius/linelog"
>>> permissions = 384
>>> format = "This is a log message for %{User-Name}"
>>> reference = "messages.%{%{Packet-Type}:-default}"
>>> }
>>> # Instantiating module "log_accounting" from file /etc/raddb/mods-enabled/linelog
>>> linelog log_accounting {
>>> filename = "/var/log/radius/linelog-accounting"
>>> permissions = 384
>>> format = ""
>>> reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}"
>>> }
>>> # Loaded module rlm_logintime
>>> # Instantiating module "logintime" from file /etc/raddb/mods-enabled/logintime
>>> logintime {
>>> minimum_timeout = 60
>>> }
>>> # Loaded module rlm_mschap
>>> # Instantiating module "mschap" from file /etc/raddb/mods-enabled/mschap
>>> mschap {
>>> use_mppe = yes
>>> require_encryption = no
>>> require_strong = no
>>> with_ntdomain_hack = yes
>>> passchange {
>>> }
>>> allow_retry = yes
>>> }
>>> # Instantiating module "ntlm_auth" from file /etc/raddb/mods-enabled/ntlm_auth
>>> exec ntlm_auth {
>>> wait = yes
>>> program = "/path/to/ntlm_auth --request-nt-key --domain=MYDOMAIN --username=%{mschap:User-Name} --password=%{User-Password}"
>>> shell_escape = yes
>>> }
>>> # Loaded module rlm_pap
>>> # Instantiating module "pap" from file /etc/raddb/mods-enabled/pap
>>> pap {
>>> normalise = yes
>>> }
>>> # Loaded module rlm_passwd
>>> # Instantiating module "etc_passwd" from file /etc/raddb/mods-enabled/passwd
>>> passwd etc_passwd {
>>> filename = "/etc/passwd"
>>> format = "*User-Name:Crypt-Password:"
>>> delimiter = ":"
>>> ignore_nislike = no
>>> ignore_empty = yes
>>> allow_multiple_keys = no
>>> hash_size = 100
>>> }
>>> rlm_passwd: nfields: 3 keyfield 0(User-Name) listable: no
>>> # Loaded module rlm_preprocess
>>> # Instantiating module "preprocess" from file /etc/raddb/mods-enabled/preprocess
>>> preprocess {
>>> huntgroups = "/etc/raddb/mods-config/preprocess/huntgroups"
>>> hints = "/etc/raddb/mods-config/preprocess/hints"
>>> with_ascend_hack = no
>>> ascend_channels_per_line = 23
>>> with_ntdomain_hack = no
>>> with_specialix_jetstream_hack = no
>>> with_cisco_vsa_hack = no
>>> with_alvarion_vsa_hack = no
>>> }
>>> reading pairlist file /etc/raddb/mods-config/preprocess/huntgroups
>>> reading pairlist file /etc/raddb/mods-config/preprocess/hints
>>> # Loaded module rlm_radutmp
>>> # Instantiating module "radutmp" from file /etc/raddb/mods-enabled/radutmp
>>> radutmp {
>>> filename = "/var/log/radius/radutmp"
>>> username = "%{User-Name}"
>>> case_sensitive = yes
>>> check_with_nas = yes
>>> permissions = 384
>>> caller_id = yes
>>> }
>>> # Loaded module rlm_realm
>>> # Instantiating module "IPASS" from file /etc/raddb/mods-enabled/realm
>>> realm IPASS {
>>> format = "prefix"
>>> delimiter = "/"
>>> ignore_default = no
>>> ignore_null = no
>>> }
>>> # Instantiating module "suffix" from file /etc/raddb/mods-enabled/realm
>>> realm suffix {
>>> format = "suffix"
>>> delimiter = "@"
>>> ignore_default = no
>>> ignore_null = no
>>> }
>>> # Instantiating module "realmpercent" from file /etc/raddb/mods-enabled/realm
>>> realm realmpercent {
>>> format = "suffix"
>>> delimiter = "%"
>>> ignore_default = no
>>> ignore_null = no
>>> }
>>> # Instantiating module "ntdomain" from file /etc/raddb/mods-enabled/realm
>>> realm ntdomain {
>>> format = "prefix"
>>> delimiter = "\"
>>> ignore_default = no
>>> ignore_null = no
>>> }
>>> # Loaded module rlm_replicate
>>> # Instantiating module "replicate" from file /etc/raddb/mods-enabled/replicate
>>> # Loaded module rlm_soh
>>> # Instantiating module "soh" from file /etc/raddb/mods-enabled/soh
>>> soh {
>>> dhcp = yes
>>> }
>>> # Instantiating module "sradutmp" from file /etc/raddb/mods-enabled/sradutmp
>>> radutmp sradutmp {
>>> filename = "/var/log/radius/sradutmp"
>>> username = "%{User-Name}"
>>> case_sensitive = yes
>>> check_with_nas = yes
>>> permissions = 420
>>> caller_id = no
>>> }
>>> # Loaded module rlm_unix
>>> # Instantiating module "unix" from file /etc/raddb/mods-enabled/unix
>>> unix {
>>> radwtmp = "/var/log/radius/radwtmp"
>>> }
>>> # Loaded module rlm_unpack
>>> # Instantiating module "unpack" from file /etc/raddb/mods-enabled/unpack
>>> # Loaded module rlm_utf8
>>> # Instantiating module "utf8" from file /etc/raddb/mods-enabled/utf8
>>> } # modules
>>> radiusd: #### Loading Virtual Servers ####
>>> server { # from file /etc/raddb/radiusd.conf
>>> } # server
>>> server default { # from file /etc/raddb/sites-enabled/default
>>> # Creating Auth-Type = digest
>>> # Loading authenticate {...}
>>> # Loading authorize {...}
>>> /etc/raddb/sites-enabled/default[372]: Failed to find "sql" in the "modules" section.
>>> /etc/raddb/sites-enabled/default[254]: Errors parsing authorize section.
>>> [root at pacific-technology raddb]#
>>>
>>>
>>> Best Regards,
>>> Larry
>>> -
>>> List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
>>>
>> -
>> List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
>
>
> -
> List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
>
More information about the Freeradius-Users
mailing list