Enable LDAP Module in Free Radius 3.0

Bhagwat, Shrikant shrbhagw at med.umich.edu
Tue Sep 5 02:06:43 CEST 2017


Are you looking for radiusd.conf file from freeradious3 

Here is one

# -*- text -*-
##
## radiusd.conf	-- FreeRADIUS server configuration file - 3.0.3
##
##	http://www.freeradius.org/
##	$Id: 307ae108f579b9c339e6ba819387ff7ad8baff87 $
##

######################################################################
#
#	Read "man radiusd" before editing this file.  See the section
#	titled DEBUGGING.  It outlines a method where you can quickly
#	obtain the configuration you want, without running into
#	trouble.
#
#	Run the server in debugging mode, and READ the output.
#
#		$ radiusd -X
#
#	We cannot emphasize this point strongly enough.  The vast
#	majority of problems can be solved by carefully reading the
#	debugging output, which includes warnings about common issues,
#	and suggestions for how they may be fixed.
#
#	There may be a lot of output, but look carefully for words like:
#	"warning", "error", "reject", or "failure".  The messages there
#	will usually be enough to guide you to a solution.
#
#	If you are going to ask a question on the mailing list, then
#	explain what you are trying to do, and include the output from
#	debugging mode (radiusd -X).  Failure to do so means that all
#	of the responses to your question will be people telling you
#	to "post the output of radiusd -X".

######################################################################
#
#  	The location of other config files and logfiles are declared
#  	in this file.
#
#  	Also general configuration for modules can be done in this
#  	file, it is exported through the API to modules that ask for
#  	it.
#
#	See "man radiusd.conf" for documentation on the format of this
#	file.  Note that the individual configuration items are NOT
#	documented in that "man" page.  They are only documented here,
#	in the comments.
#
#	The "unlang" policy language can be used to create complex
#	if / else policies.  See "man unlang" for details.
#

prefix = /usr
exec_prefix = /usr
sysconfdir = /etc
localstatedir = /var
sbindir = /usr/sbin
logdir = ${localstatedir}/log/radius
raddbdir = ${sysconfdir}/raddb
radacctdir = ${logdir}/radacct

#
#  name of the running server.  See also the "-n" command-line option.
name = radiusd

#  Location of config and logfiles.
confdir = ${raddbdir}
modconfdir = ${confdir}/mods-config
certdir = ${confdir}/certs
cadir   = ${confdir}/certs
run_dir = ${localstatedir}/run/${name}

# Should likely be ${localstatedir}/lib/radiusd
db_dir = ${raddbdir}

#
# libdir: Where to find the rlm_* modules.
#
#   This should be automatically set at configuration time.
#
#   If the server builds and installs, but fails at execution time
#   with an 'undefined symbol' error, then you can use the libdir
#   directive to work around the problem.
#
#   The cause is usually that a library has been installed on your
#   system in a place where the dynamic linker CANNOT find it.  When
#   executing as root (or another user), your personal environment MAY
#   be set up to allow the dynamic linker to find the library.  When
#   executing as a daemon, FreeRADIUS MAY NOT have the same
#   personalized configuration.
#
#   To work around the problem, find out which library contains that symbol,
#   and add the directory containing that library to the end of 'libdir',
#   with a colon separating the directory names.  NO spaces are allowed.
#
#   e.g. libdir = /usr/local/lib:/opt/package/lib
#
#   You can also try setting the LD_LIBRARY_PATH environment variable
#   in a script which starts the server.
#
#   If that does not work, then you can re-configure and re-build the
#   server to NOT use shared libraries, via:
#
#	./configure --disable-shared
#	make
#	make install
#
libdir = /usr/lib64/freeradius

#  pidfile: Where to place the PID of the RADIUS server.
#
#  The server may be signalled while it's running by using this
#  file.
#
#  This file is written when ONLY running in daemon mode.
#
#  e.g.:  kill -HUP `cat /var/run/radiusd/radiusd.pid`
#
pidfile = ${run_dir}/${name}.pid

#  panic_action: Command to execute if the server dies unexpectedly.
#
#  FOR PRODUCTION SYSTEMS, ACTIONS SHOULD ALWAYS EXIT.
#  AN INTERACTIVE ACTION MEANS THE SERVER IS NOT RESPONDING TO REQUESTS.
#  AN INTERACTICE ACTION MEANS THE SERVER WILL NOT RESTART.
#
#  THE SERVER MUST NOT BE ALLOWED EXECUTE UNTRUSTED PANIC ACTION CODE
#  PATTACH CAN BE USED AS AN ATTACK VECTOR.
#
#  The panic action is a command which will be executed if the server
#  receives a fatal, non user generated signal, i.e. SIGSEGV, SIGBUS,
#  SIGABRT or SIGFPE.
#
#  This can be used to start an interactive debugging session so
#  that information regarding the current state of the server can
#  be acquired.
#
#  The following string substitutions are available:
#  - %e   The currently executing program e.g. /sbin/radiusd
#  - %p   The PID of the currently executing program e.g. 12345
#
#  Standard ${} substitutions are also allowed.
#
#  An example panic action for opening an interactive session in GDB would be:
#
#panic_action = "gdb %e %p"
#
#  Again, don't use that on a production system.
#
#  An example panic action for opening an automated session in GDB would be:
#
#panic_action = "gdb -silent -x ${raddbdir}/panic.gdb %e %p 2>&1 | tee ${logdir}/gdb-${name}-%p.log"
#
#  That command can be used on a production system.
#

#  max_request_time: The maximum time (in seconds) to handle a request.
#
#  Requests which take more time than this to process may be killed, and
#  a REJECT message is returned.
#
#  WARNING: If you notice that requests take a long time to be handled,
#  then this MAY INDICATE a bug in the server, in one of the modules
#  used to handle a request, OR in your local configuration.
#
#  This problem is most often seen when using an SQL database.  If it takes
#  more than a second or two to receive an answer from the SQL database,
#  then it probably means that you haven't indexed the database.  See your
#  SQL server documentation for more information.
#
#  Useful range of values: 5 to 120
#
max_request_time = 30

#  cleanup_delay: The time to wait (in seconds) before cleaning up
#  a reply which was sent to the NAS.
#
#  The RADIUS request is normally cached internally for a short period
#  of time, after the reply is sent to the NAS.  The reply packet may be
#  lost in the network, and the NAS will not see it.  The NAS will then
#  re-send the request, and the server will respond quickly with the
#  cached reply.
#
#  If this value is set too low, then duplicate requests from the NAS
#  MAY NOT be detected, and will instead be handled as separate requests.
#
#  If this value is set too high, then the server will cache too many
#  requests, and some new requests may get blocked.  (See 'max_requests'.)
#
#  Useful range of values: 2 to 10
#
cleanup_delay = 5

#  max_requests: The maximum number of requests which the server keeps
#  track of.  This should be 256 multiplied by the number of clients.
#  e.g. With 4 clients, this number should be 1024.
#
#  If this number is too low, then when the server becomes busy,
#  it will not respond to any new requests, until the 'cleanup_delay'
#  time has passed, and it has removed the old requests.
#
#  If this number is set too high, then the server will use a bit more
#  memory for no real benefit.
#
#  If you aren't sure what it should be set to, it's better to set it
#  too high than too low.  Setting it to 1000 per client is probably
#  the highest it should be.
#
#  Useful range of values: 256 to infinity
#
max_requests = 1024

#  hostname_lookups: Log the names of clients or just their IP addresses
#  e.g., www.freeradius.org (on) or 206.47.27.232 (off).
#
#  The default is 'off' because it would be overall better for the net
#  if people had to knowingly turn this feature on, since enabling it
#  means that each client request will result in AT LEAST one lookup
#  request to the nameserver.   Enabling hostname_lookups will also
#  mean that your server may stop randomly for 30 seconds from time
#  to time, if the DNS requests take too long.
#
#  Turning hostname lookups off also means that the server won't block
#  for 30 seconds, if it sees an IP address which has no name associated
#  with it.
#
#  allowed values: {no, yes}
#
hostname_lookups = no

#
#  Logging section.  The various "log_*" configuration items
#  will eventually be moved here.
#
log {
	#
	#  Destination for log messages.  This can be one of:
	#
	#	files - log to "file", as defined below.
	#	syslog - to syslog (see also the "syslog_facility", below.
	#	stdout - standard output
	#	stderr - standard error.
	#
	#  The command-line option "-X" over-rides this option, and forces
	#  logging to go to stdout.
	#
	destination = files

	#
	#  Highlight important messages sent to stderr and stdout.
	#
	#  Option will be ignored (disabled) if output if TERM is not
	#  an xterm or output is not to a TTY.
	#
	colourise = yes

	#
	#  The logging messages for the server are appended to the
	#  tail of this file if destination == "files"
	#
	#  If the server is running in debugging mode, this file is
	#  NOT used.
	#
	file = ${logdir}/radius.log

	#
	#  If this configuration parameter is set, then log messages for
	#  a *request* go to this file, rather than to radius.log.
	#
	#  i.e. This is a log file per request, once the server has accepted
	#  the request as being from a valid client.  Messages that are
	#  not associated with a request still go to radius.log.
	#
	#  Not all log messages in the server core have been updated to use
	#  this new internal API.  As a result, some messages will still
	#  go to radius.log.  Please submit patches to fix this behavior.
	#
	#  The file name is expanded dynamically.  You should ONLY user
	#  server-side attributes for the filename (e.g. things you control).
	#  Using this feature MAY also slow down the server substantially,
	#  especially if you do thinks like SQL calls as part of the
	#  expansion of the filename.
	#
	#  The name of the log file should use attributes that don't change
	#  over the lifetime of a request, such as User-Name,
	#  Virtual-Server or Packet-Src-IP-Address.  Otherwise, the log
	#  messages will be distributed over multiple files.
	#
	#  Logging can be enabled for an individual request by a special
	#  dynamic expansion macro:  %{debug: 1}, where the debug level
	#  for this request is set to '1' (or 2, 3, etc.).  e.g.
	#
	#	...
	#	update control {
	#	       Tmp-String-0 = "%{debug:1}"
	#	}
	#	...
	#
	#  The attribute that the value is assigned to is unimportant,
	#  and should be a "throw-away" attribute with no side effects.
	#
	#requests = ${logdir}/radiusd-%{%{Virtual-Server}:-DEFAULT}-%Y%m%d.log

	#
	#  Which syslog facility to use, if ${destination} == "syslog"
	#
	#  The exact values permitted here are OS-dependent.  You probably
	#  don't want to change this.
	#
	syslog_facility = daemon

	#  Log the full User-Name attribute, as it was found in the request.
	#
	# allowed values: {no, yes}
	#
	stripped_names = no

	#  Log authentication requests to the log file.
	#
	#  allowed values: {no, yes}
	#
	auth = no

	#  Log passwords with the authentication requests.
	#  auth_badpass  - logs password if it's rejected
	#  auth_goodpass - logs password if it's correct
	#
	#  allowed values: {no, yes}
	#
	auth_badpass = no
	auth_goodpass = no

	#  Log additional text at the end of the "Login OK" messages.
	#  for these to work, the "auth" and "auth_goodpass" or "auth_badpass"
	#  configurations above have to be set to "yes".
	#
	#  The strings below are dynamically expanded, which means that
	#  you can put anything you want in them.  However, note that
	#  this expansion can be slow, and can negatively impact server
	#  performance.
	#
#	msg_goodpass = ""
#	msg_badpass = ""

	#  The message when the user exceeds the Simultaneous-Use limit.
	#
	msg_denied = "You are already logged in - access denied"
}

#  The program to execute to do concurrency checks.
checkrad = ${sbindir}/checkrad

# SECURITY CONFIGURATION
#
#  There may be multiple methods of attacking on the server.  This
#  section holds the configuration items which minimize the impact
#  of those attacks
#
security {
	#  chroot: directory where the server does "chroot".
	#
	#  The chroot is done very early in the process of starting
	#  the server.  After the chroot has been performed it
	#  switches to the "user" listed below (which MUST be
	#  specified).  If "group" is specified, it switches to that
	#  group, too.  Any other groups listed for the specified
	#  "user" in "/etc/group" are also added as part of this
	#  process.
	#
	#  The current working directory (chdir / cd) is left
	#  *outside* of the chroot until all of the modules have been
	#  initialized.  This allows the "raddb" directory to be left
	#  outside of the chroot.  Once the modules have been
	#  initialized, it does a "chdir" to ${logdir}.  This means
	#  that it should be impossible to break out of the chroot.
	#
	#  If you are worried about security issues related to this
	#  use of chdir, then simply ensure that the "raddb" directory
	#  is inside of the chroot, end be sure to do "cd raddb"
	#  BEFORE starting the server.
	#
	#  If the server is statically linked, then the only files
	#  that have to exist in the chroot are ${run_dir} and
	#  ${logdir}.  If you do the "cd raddb" as discussed above,
	#  then the "raddb" directory has to be inside of the chroot
	#  directory, too.
	#
#	chroot = /path/to/chroot/directory

	# user/group: The name (or #number) of the user/group to run radiusd as.
	#
	#   If these are commented out, the server will run as the
	#   user/group that started it.  In order to change to a
	#   different user/group, you MUST be root ( or have root
	#   privileges ) to start the server.
	#
	#   We STRONGLY recommend that you run the server with as few
	#   permissions as possible.  That is, if you're not using
	#   shadow passwords, the user and group items below should be
	#   set to radius'.
	#
	#  NOTE that some kernels refuse to setgid(group) when the
	#  value of (unsigned)group is above 60000; don't use group
	#  "nobody" on these systems!
	#
	#  On systems with shadow passwords, you might have to set
	#  'group = shadow' for the server to be able to read the
	#  shadow password file.  If you can authenticate users while
	#  in debug mode, but not in daemon mode, it may be that the
	#  debugging mode server is running as a user that can read
	#  the shadow info, and the user listed below can not.
	#
	#  The server will also try to use "initgroups" to read
	#  /etc/groups.  It will join all groups where "user" is a
	#  member.  This can allow for some finer-grained access
	#  controls.
	#
#	user = radius
#	group = radius

	#  Core dumps are a bad thing.  This should only be set to
	#  'yes' if you're debugging a problem with the server.
	#
	#  allowed values: {no, yes}
	#
	allow_core_dumps = no

	#
	#  max_attributes: The maximum number of attributes
	#  permitted in a RADIUS packet.  Packets which have MORE
	#  than this number of attributes in them will be dropped.
	#
	#  If this number is set too low, then no RADIUS packets
	#  will be accepted.
	#
	#  If this number is set too high, then an attacker may be
	#  able to send a small number of packets which will cause
	#  the server to use all available memory on the machine.
	#
	#  Setting this number to 0 means "allow any number of attributes"
	max_attributes = 200

	#
	#  reject_delay: When sending an Access-Reject, it can be
	#  delayed for a few seconds.  This may help slow down a DoS
	#  attack.  It also helps to slow down people trying to brute-force
	#  crack a users password.
	#
	#  Setting this number to 0 means "send rejects immediately"
	#
	#  If this number is set higher than 'cleanup_delay', then the
	#  rejects will be sent at 'cleanup_delay' time, when the request
	#  is deleted from the internal cache of requests.
	#
	#  Useful ranges: 1 to 5
	reject_delay = 1

	#
	#  status_server: Whether or not the server will respond
	#  to Status-Server requests.
	#
	#  When sent a Status-Server message, the server responds with
	#  an Access-Accept or Accounting-Response packet.
	#
	#  This is mainly useful for administrators who want to "ping"
	#  the server, without adding test users, or creating fake
	#  accounting packets.
	#
	#  It's also useful when a NAS marks a RADIUS server "dead".
	#  The NAS can periodically "ping" the server with a Status-Server
	#  packet.  If the server responds, it must be alive, and the
	#  NAS can start using it for real requests.
	#
	#  See also raddb/sites-available/status
	#
	status_server = yes

	#
	#  allow_vulnerable_openssl: Allow the server to start with
	#  versions of OpenSSL known to have critical vulnerabilities.
	#
	#  This check is based on the version number reported by libssl
	#  and may not reflect patches applied to libssl by
	#  distribution maintainers.
	#
	allow_vulnerable_openssl = no
}

# PROXY CONFIGURATION
#
#  proxy_requests: Turns proxying of RADIUS requests on or off.
#
#  The server has proxying turned on by default.  If your system is NOT
#  set up to proxy requests to another server, then you can turn proxying
#  off here.  This will save a small amount of resources on the server.
#
#  If you have proxying turned off, and your configuration files say
#  to proxy a request, then an error message will be logged.
#
#  To disable proxying, change the "yes" to "no", and comment the
#  $INCLUDE line.
#
#  allowed values: {no, yes}
#
proxy_requests  = yes
$INCLUDE proxy.conf


# CLIENTS CONFIGURATION
#
#  Client configuration is defined in "clients.conf".
#

#  The 'clients.conf' file contains all of the information from the old
#  'clients' and 'naslist' configuration files.  We recommend that you
#  do NOT use 'client's or 'naslist', although they are still
#  supported.
#
#  Anything listed in 'clients.conf' will take precedence over the
#  information from the old-style configuration files.
#
$INCLUDE clients.conf


# THREAD POOL CONFIGURATION
#
#  The thread pool is a long-lived group of threads which
#  take turns (round-robin) handling any incoming requests.
#
#  You probably want to have a few spare threads around,
#  so that high-load situations can be handled immediately.  If you
#  don't have any spare threads, then the request handling will
#  be delayed while a new thread is created, and added to the pool.
#
#  You probably don't want too many spare threads around,
#  otherwise they'll be sitting there taking up resources, and
#  not doing anything productive.
#
#  The numbers given below should be adequate for most situations.
#
thread pool {
	#  Number of servers to start initially --- should be a reasonable
	#  ballpark figure.
	start_servers = 5

	#  Limit on the total number of servers running.
	#
	#  If this limit is ever reached, clients will be LOCKED OUT, so it
	#  should NOT BE SET TOO LOW.  It is intended mainly as a brake to
	#  keep a runaway server from taking the system with it as it spirals
	#  down...
	#
	#  You may find that the server is regularly reaching the
	#  'max_servers' number of threads, and that increasing
	#  'max_servers' doesn't seem to make much difference.
	#
	#  If this is the case, then the problem is MOST LIKELY that
	#  your back-end databases are taking too long to respond, and
	#  are preventing the server from responding in a timely manner.
	#
	#  The solution is NOT do keep increasing the 'max_servers'
	#  value, but instead to fix the underlying cause of the
	#  problem: slow database, or 'hostname_lookups=yes'.
	#
	#  For more information, see 'max_request_time', above.
	#
	max_servers = 32

	#  Server-pool size regulation.  Rather than making you guess
	#  how many servers you need, FreeRADIUS dynamically adapts to
	#  the load it sees, that is, it tries to maintain enough
	#  servers to handle the current load, plus a few spare
	#  servers to handle transient load spikes.
	#
	#  It does this by periodically checking how many servers are
	#  waiting for a request.  If there are fewer than
	#  min_spare_servers, it creates a new spare.  If there are
	#  more than max_spare_servers, some of the spares die off.
	#  The default values are probably OK for most sites.
	#
	min_spare_servers = 3
	max_spare_servers = 10

	#  When the server receives a packet, it places it onto an
	#  internal queue, where the worker threads (configured above)
	#  pick it up for processing.  The maximum size of that queue
	#  is given here.
	#
	#  When the queue is full, any new packets will be silently
	#  discarded.
	#
	#  The most common cause of the queue being full is that the
	#  server is dependent on a slow database, and it has received
	#  a large "spike" of traffic.  When that happens, there is
	#  very little you can do other than make sure the server
	#  receives less traffic, or make sure that the database can
	#  handle the load.
	#
#	max_queue_size = 65536

	#  There may be memory leaks or resource allocation problems with
	#  the server.  If so, set this value to 300 or so, so that the
	#  resources will be cleaned up periodically.
	#
	#  This should only be necessary if there are serious bugs in the
	#  server which have not yet been fixed.
	#
	#  '0' is a special value meaning 'infinity', or 'the servers never
	#  exit'
	max_requests_per_server = 0

	#  Automatically limit the number of accounting requests.
	#  This configuration item tracks how many requests per second
	#  the server can handle.  It does this by tracking the
	#  packets/s received by the server for processing, and
	#  comparing that to the packets/s handled by the child
	#  threads.
	#

	#  If the received PPS is larger than the processed PPS, *and*
	#  the queue is more than half full, then new accounting
	#  requests are probabilistically discarded.  This lowers the
	#  number of packets that the server needs to process.  Over
	#  time, the server will "catch up" with the traffic.
	#
	#  Throwing away accounting packets is usually safe and low
	#  impact.  The NAS will retransmit them in a few seconds, or
	#  even a few minutes.  Vendors should read RFC 5080 Section 2.2.1
	#  to see how accounting packets should be retransmitted.  Using
	#  any other method is likely to cause network meltdowns.
	#
	auto_limit_acct = no
}

# MODULE CONFIGURATION
#
#  The names and configuration of each module is located in this section.
#
#  After the modules are defined here, they may be referred to by name,
#  in other sections of this configuration file.
#
modules {
	#
	#  Each module has a configuration as follows:
	#
	#	name [ instance ] {
	#		config_item = value
	#		...
	#	}
	#
	#  The 'name' is used to load the 'rlm_name' library
	#  which implements the functionality of the module.
	#
	#  The 'instance' is optional.  To have two different instances
	#  of a module, it first must be referred to by 'name'.
	#  The different copies of the module are then created by
	#  inventing two 'instance' names, e.g. 'instance1' and 'instance2'
	#
	#  The instance names can then be used in later configuration
	#  INSTEAD of the original 'name'.  See the 'radutmp' configuration
	#  for an example.
	#

	#
	#  As of 3.0, modules are in mods-enabled/.  Files matching
	#  the regex /[a-zA-Z0-9_.]+/ are loaded.  The modules are
	#  initialized ONLY if they are referenced in a processing
	#  section, such as authorize, authenticate, accounting,
	#  pre/post-proxy, etc.
	#
	$INCLUDE mods-enabled/
}

# Instantiation
#
#  This section orders the loading of the modules.  Modules
#  listed here will get loaded BEFORE the later sections like
#  authorize, authenticate, etc. get examined.
#
#  This section is not strictly needed.  When a section like
#  authorize refers to a module, it's automatically loaded and
#  initialized.  However, some modules may not be listed in any
#  of the following sections, so they can be listed here.
#
#  Also, listing modules here ensures that you have control over
#  the order in which they are initialized.  If one module needs
#  something defined by another module, you can list them in order
#  here, and ensure that the configuration will be OK.
#
#  After the modules listed here have been loaded, all of the modules
#  in the "mods-enabled" directory will be loaded.  Loading the
#  "mods-enabled" directory means that unlike Version 2, you usually
#  don't need to list modules here.
#
instantiate {
	#
	# We list the counter module here so that it registers
	# the check_name attribute before any module which sets
	# it
#	daily

	# subsections here can be thought of as "virtual" modules.
	#
	# e.g. If you have two redundant SQL servers, and you want to
	# use them in the authorize and accounting sections, you could
	# place a "redundant" block in each section, containing the
	# exact same text.  Or, you could uncomment the following
	# lines, and list "redundant_sql" in the authorize and
	# accounting sections.
	#
	#redundant redundant_sql {
	#	sql1
	#	sql2
	#}
}

######################################################################
#
#  Policies are virtual modules, similar to those defined in the
#  "instantiate" section above.
#
#  Defining a policy in one of the policy.d files means that it can be
#  referenced in multiple places as a *name*, rather than as a series of
#  conditions to match, and actions to take.
#
#  Policies are something like subroutines in a normal language, but
#  they cannot be called recursively. They MUST be defined in order.
#  If policy A calls policy B, then B MUST be defined before A.
#
######################################################################
policy {
	$INCLUDE policy.d/
}

######################################################################
#
#  SNMP notifications.  Uncomment the following line to enable
#  snmptraps.  Note that you MUST also configure the full path
#  to the "snmptrap" command in the "trigger.conf" file.
#
#$INCLUDE trigger.conf

######################################################################
#
#	Load virtual servers.
#
#	This next $INCLUDE line loads files in the directory that
#	match the regular expression: /[a-zA-Z0-9_.]+/
#
#	It allows you to define new virtual servers simply by placing
#	a file into the raddb/sites-enabled/ directory.
#
$INCLUDE sites-enabled/

######################################################################
#
#	All of the other configuration sections like "authorize {}",
#	"authenticate {}", "accounting {}", have been moved to the
#	the file:
#
#		raddb/sites-available/default
#
#	This is the "default" virtual server that has the same
#	configuration as in version 1.0.x and 1.1.x.  The default
#	installation enables this virtual server.  You should
#	edit it to create policies for your local site.
#
#	For more documentation on virtual servers, see:
#
#		raddb/sites-available/README
#
######################################################################

 ldap ldapmed {
        server = "LDAP SERVER"
        port = 636
        # defualt identity is anonymous
        identity = "cn=p-idm-radius,o=services"
        password = XXXXXX
        basedn = "dc=yyyy,dc=edu"
        filter = "(&(uid=%{Stripped-User-Name:-%{User-Name}})(objectclass=radiusprofile))"
        # base_filter = "(objectclass=radiusprofile)"

                # app config
        logFILEname = "/var/log/radius/umhspf.log"

# level-1 config
                level-1_server = "LDAP Server""
                level-1_basedn = "ou=people,dc=yyyy,dc=edu"
        level-1_kdc = "UMICH.EDU"

                duo_host = "XXXX"
                duo_ikey = "XXXX"
                duo_skey = "XXXXX"

        # set this to 'yes' to use TLS encrypted connections
        # to the LDAP database by using the StartTLS extended
        # operation.
        # The StartTLS operation is supposed to be used with normal
        # ldap connections instead of using ldaps (port 689) connections
        start_tls = no

        tls_mode = no
        # tls_cacertfile    = /etc/raddb/certs/cacerts.pem
        # tls_cacertdir     = /path/to/ca/dir/
        # tls_certfile      = /path/to/radius.crt
        # tls_keyfile       = /path/to/radius.key
	# tls_randfile		= /path/to/rnd
	tls_require_cert	= "never"

	# default_profile = "cn=radprofile,ou=dialup,o=My Org,c=UA"
	# profile_attribute = "radiusProfileDn"
	access_attr = "dialupAccess"

	# Mapping of RADIUS dictionary attributes to LDAP
	# directory attributes.
	dictionary_mapping = ${raddbdir}/ldap.attrmap

	ldap_connections_number = 5

	#
	# NOTICE: The password_header directive is NOT case insensitive
	#
	#password_header = "{clear}"
	#
	# Set:
	#	password_attribute = nspmPassword
	#
		# to get the user's password from a Novell eDirectory
		# backend. This will work *only if* freeRADIUS is
		# configured to build with --with-edir option.
		#
		#
		#  The server can usually figure this out on its own, and pull
		#  the correct User-Password or NT-Password from the database.
		#
		#  Note that NT-Passwords MUST be stored as a 32-digit hex
		#  string, and MUST start off with "0x", such as:
		#
		#	0x000102030405060708090a0b0c0d0e0f
		#
		#  Without the leading "0x", NT-Passwords will not work.
		#  This goes for NT-Passwords stored in SQL, too.
		#
		# password_attribute = userPassword
		#
		# Un-comment the following to disable Novell eDirectory account
		# policy check and intruder detection. This will work *only if*
		# FreeRADIUS is configured to build with --with-edir option.
		#
		# password_attribute = nspmPassword
	
	edir_account_policy_check=no
		#
		# groupname_attribute = cn
		# groupmembership_filter = "(|(&(objectClass=GroupOfNames)(member=%{Ldap-UserDn}))(&(objectClass=GroupOfUniqueNames)(uniquemember=%{Ldap-UserDn})))"
		# groupmembership_attribute = radiusGroupName
	timeout = 4
	timelimit = 3
	net_timeout = 1
		# compare_check_items = yes
		# do_xlat = yes
		# access_attr_used_for_allow = yes

		#
		#  By default, if the packet contains a User-Password,
		#  and no other module is configured to handle the
		#  authentication, the LDAP module sets itself to do
		#  LDAP bind for authentication.
		#
		#  You can disable this behavior by setting the following
		#  configuration entry to "no".
		#
		#  allowed values: {no, yes}
		#set_auth_type = yes
		#authtype = LDAP
	}




-----Original Message-----
From: Freeradius-Users [mailto:freeradius-users-bounces+shrbhagw=med.umich.edu at lists.freeradius.org] On Behalf Of Alan Buxey
Sent: Monday, September 04, 2017 7:10 PM
To: FreeRadius users mailing list <freeradius-users at lists.freeradius.org>
Subject: RE: Enable LDAP Module in Free Radius 3.0

Have you taken the default config and modified it as required or just copied the old config from old server (you can't do that for a migration to
3.x) . I'm not doing any further guesswork so provide config file rather than terse few lines of output

alan

On 4 Sep 2017 11:57 pm, "Bhagwat, Shrikant" <shrbhagw at med.umich.edu> wrote:

migrate-idmauth-preprod08:/etc/raddb/mods-enabled # radiusd -X
radiusd: FreeRADIUS Version 3.0.3, for host x86_64-suse-linux-gnu, built on Dec 19 2016 at 11:19 Copyright (C) 1999-2014 The FreeRADIUS server project and contributors There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE You may redistribute copies of FreeRADIUS under the terms of the GNU General Public License For more information about these matters, see the file named COPYRIGHT Starting - reading configuration files ...
including dictionary file /usr/share/freeradius/dictionary including dictionary file /usr/share/freeradius/dictionary.dhcp
including dictionary file /usr/share/freeradius/dictionary.vqp
including dictionary file /etc/raddb/dictionary including configuration file /etc/raddb/radiusd.conf including configuration file /etc/raddb/proxy.conf including configuration file /etc/raddb/clients.conf including files in directory /etc/raddb/mods-enabled/ including configuration file /etc/raddb/mods-enabled/linelog including configuration file /etc/raddb/mods-enabled/expr including configuration file /etc/raddb/mods-enabled/expiration
including configuration file /etc/raddb/mods-enabled/unix including configuration file /etc/raddb/mods-enabled/always including configuration file /etc/raddb/mods-enabled/exec including configuration file /etc/raddb/mods-enabled/sradutmp including configuration file /etc/raddb/mods-enabled/radutmp including configuration file /etc/raddb/mods-enabled/eap including configuration file /etc/raddb/mods-enabled/echo including configuration file /etc/raddb/mods-enabled/soh including configuration file /etc/raddb/mods-enabled/dhcp including configuration file /etc/raddb/mods-enabled/ldap No such configuration item ..base_dn
/etc/raddb/mods-enabled/ldap[157]: Reference "${..base_dn}" not found Errors reading or parsing /etc/raddb/radiusd.conf


-----Original Message-----
From: Freeradius-Users [mailto:freeradius-users-bounces+shrbhagw=med.umich.
edu at lists.freeradius.org] On Behalf Of Alan Buxey
Sent: Monday, September 04, 2017 6:45 PM
To: FreeRadius users mailing list <freeradius-users at lists.freeradius.org>
Subject: Re: Enable LDAP Module in Free Radius 3.0

dont care about your old config.

the server clearly shows that no ldap module is being read in the mods-enabled directory - ensure you put a symlink to mods-available/ldap in there...

then, you should see is load up and no more "Ignoring "ldap" (see raddb/mods-available/README.rst)" errors...

alan

On 4 September 2017 at 22:13, Bhagwat, Shrikant <shrbhagw at med.umich.edu>
wrote:
> Hi
>
> No sure whether LDAP Module is enabled. My Radius Server supposed to 
> connect to LDAP Server
>
> Below is my config freeradius 1.0
> # Lightweight Directory Access Protocol (LDAP)
>     #
>     #  This module definition allows you to use LDAP for
>     #  authorization and authentication (Auth-Type := LDAP)
>     #
>     #  See doc/rlm_ldap for description of configuration options
>     #  and sample authorize{} and authenticate{} blocks
>     ldap ldapmed {
>         server = "ldap.company.com"
>         port = 636
>         # defualt identity is anonymous
>         identity = "cn=radius,o=services"
>         password = XXXXX
>         basedn = "dc=XXX,dc=XXXX"
>         filter = 
> "(&(uid=%{Stripped-User-Name:-%{User-Name}})(objectclass=
radiusprofile))"
>         # base_filter = "(objectclass=radiusprofile)"
>
>                 # app config
>         logFILEname = "/var/log/radius/mycompany.log"
>
>         # level-1 config
>                 level-1_server = "ldap.company.com"
>                 level-1_basedn = "ou=xxx,dc=xxx,dc=xxxx"
>         level-1_kdc = "xxxxx"
>
>         start_tls = no
>
>
>
> radiusd -X
> radiusd: FreeRADIUS Version 3.0.3, for host x86_64-suse-linux-gnu, 
> built on Dec 19 2016 at 11:19 Copyright (C) 1999-2014 The FreeRADIUS 
> server project and contributors There is NO warranty; not even for 
> MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE You may 
> redistribute copies of FreeRADIUS under the terms of the GNU General 
> Public License For more information about these matters, see the file 
> named COPYRIGHT Starting - reading configuration files ...
> including dictionary file /usr/share/freeradius/dictionary including 
> dictionary file /usr/share/freeradius/dictionary.dhcp
> including dictionary file /usr/share/freeradius/dictionary.vqp
> including dictionary file /etc/raddb/dictionary including 
> configuration file /etc/raddb/radiusd.conf including configuration 
> file /etc/raddb/proxy.conf including configuration file 
> /etc/raddb/clients.conf including files in directory 
> /etc/raddb/mods-enabled/ including configuration file 
> /etc/raddb/mods-enabled/linelog including configuration file 
> /etc/raddb/mods-enabled/expr including configuration file 
> /etc/raddb/mods-enabled/expiration
> including configuration file /etc/raddb/mods-enabled/unix including 
> configuration file /etc/raddb/mods-enabled/always including 
> configuration file /etc/raddb/mods-enabled/exec including 
> configuration file /etc/raddb/mods-enabled/sradutmp including 
> configuration file /etc/raddb/mods-enabled/radutmp including 
> configuration file /etc/raddb/mods-enabled/eap including configuration 
> file /etc/raddb/mods-enabled/echo including configuration file 
> /etc/raddb/mods-enabled/soh including configuration file 
> /etc/raddb/mods-enabled/dhcp including configuration file 
> /etc/raddb/mods-enabled/cache_eap including configuration file 
> /etc/raddb/mods-enabled/mschap including configuration file 
> /etc/raddb/mods-enabled/chap including configuration file 
> /etc/raddb/mods-enabled/realm including configuration file 
> /etc/raddb/mods-enabled/passwd including configuration file 
> /etc/raddb/mods-enabled/digest including configuration file 
> /etc/raddb/mods-enabled/preprocess
> including configuration file /etc/raddb/mods-enabled/logintime 
> including configuration file /etc/raddb/mods-enabled/replicate 
> including configuration file /etc/raddb/mods-enabled/detail including 
> configuration file /etc/raddb/mods-enabled/ntlm_auth including 
> configuration file /etc/raddb/mods-enabled/dynamic_clients
> including configuration file /etc/raddb/mods-enabled/utf8 including 
> configuration file /etc/raddb/mods-enabled/detail.log
> including configuration file /etc/raddb/mods-enabled/files including 
> configuration file /etc/raddb/mods-enabled/unpack including 
> configuration file /etc/raddb/mods-enabled/attr_filter
> including configuration file /etc/raddb/mods-enabled/pap including 
> files in directory /etc/raddb/policy.d/ including configuration file 
> /etc/raddb/policy.d/eap including configuration file 
> /etc/raddb/policy.d/dhcp including configuration file 
> /etc/raddb/policy.d/control including configuration file 
> /etc/raddb/policy.d/cui including configuration file 
> /etc/raddb/policy.d/filter including configuration file 
> /etc/raddb/policy.d/canonicalization
> including configuration file /etc/raddb/policy.d/accounting including 
> configuration file /etc/raddb/policy.d/operator-name including files 
> in directory /etc/raddb/sites-enabled/ including configuration file 
> /etc/raddb/sites-enabled/default including configuration file 
> /etc/raddb/sites-enabled/inner-tunnel
> main {
> security {
> allow_core_dumps = no
> }
> }
> main {
> name = "radiusd"
> prefix = "/usr"
> localstatedir = "/var"
> sbindir = "/usr/sbin"
> logdir = "/var/log/radius"
> run_dir = "/var/run/radiusd"
> libdir = "/usr/lib64/freeradius"
> radacctdir = "/var/log/radius/radacct"
> hostname_lookups = no
> max_request_time = 30
> cleanup_delay = 5
> max_requests = 1024
> pidfile = "/var/run/radiusd/radiusd.pid"
> checkrad = "/usr/sbin/checkrad"
> debug_level = 0
> proxy_requests = yes
> log {
> stripped_names = no
> auth = no
> auth_badpass = no
> auth_goodpass = no
> colourise = yes
> msg_denied = "You are already logged in - access denied"
> }
> security {
> max_attributes = 200
> reject_delay = 1
> status_server = yes
> allow_vulnerable_openssl = "no"
> }
> }
> radiusd: #### Loading Realms and Home Servers #### proxy server { 
> retry_delay = 5 retry_count = 3 default_fallback = no dead_time = 120 
> wake_all_if_all_dead = no } home_server localhost { ipaddr = 127.0.0.1 
> port = 1812 type = "auth"
> secret = <<< secret >>>
> response_window = 20
> max_outstanding = 65536
> zombie_period = 40
> status_check = "status-server"
> ping_interval = 30
> check_interval = 30
> num_answers_to_alive = 3
> revive_interval = 120
> status_check_timeout = 4
>   coa {
>   irt = 2
>   mrt = 16
>   mrc = 5
>   mrd = 30
>   }
>   limit {
>   max_connections = 16
>   max_requests = 0
>   lifetime = 0
>   idle_timeout = 0
>   }
> }
> home_server_pool my_auth_failover {
> type = fail-over
> home_server = localhost
> }
> realm example.com {
> auth_pool = my_auth_failover
> }
> realm LOCAL {
> }
> radiusd: #### Loading Clients ####
> client localhost {
> ipaddr = 127.0.0.1
> require_message_authenticator = no
> secret = <<< secret >>>
> nas_type = "other"
> proto = "*"
>   limit {
>   max_connections = 16
>   lifetime = 0
>   idle_timeout = 30
>   }
> }
> radiusd: #### Instantiating modules #### instantiate { } modules {
>   # Loaded module rlm_linelog
>   # Instantiating module "linelog" from file /etc/raddb/mods-enabled/
linelog
>   linelog {
>   filename = "/var/log/radius/linelog"
>  permissions = 384
>   format = "This is a log message for %{User-Name}"
>   reference = "messages.%{%{Packet-Type}:-default}"
>   }
>   # Instantiating module "log_accounting" from file
/etc/raddb/mods-enabled/linelog
>   linelog log_accounting {
>   filename = "/var/log/radius/linelog-accounting"
>   permissions = 384
>   format = ""
>   reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}"
>   }
>   # Loaded module rlm_expr
>   # Instantiating module "expr" from file /etc/raddb/mods-enabled/expr
>   expr {
>   safe_characters = "@abcdefghijklmnopqrstuvwxyzABCD
EFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
>   }
>   # Loaded module rlm_expiration
>   # Instantiating module "expiration" from file 
> /etc/raddb/mods-enabled/
expiration
>   # Loaded module rlm_unix
>   # Instantiating module "unix" from file /etc/raddb/mods-enabled/unix
>   unix {
>   radwtmp = "/var/log/radius/radwtmp"
>   }
>   # Loaded module rlm_always
>   # Instantiating module "reject" from file /etc/raddb/mods-enabled/always
>   always reject {
>   rcode = "reject"
>   simulcount = 0
>   mpp = no
>   }
>   # Instantiating module "fail" from file /etc/raddb/mods-enabled/always
>   always fail {
>   rcode = "fail"
>   simulcount = 0
>   mpp = no
>   }
>   # Instantiating module "ok" from file /etc/raddb/mods-enabled/always
>   always ok {
>   rcode = "ok"
>   simulcount = 0
>   mpp = no
>   }
>   # Instantiating module "handled" from file
/etc/raddb/mods-enabled/always
>   always handled {
>   rcode = "handled"
>   simulcount = 0
>   mpp = no
>   }
>   # Instantiating module "invalid" from file
/etc/raddb/mods-enabled/always
>   always invalid {
>   rcode = "invalid"
>   simulcount = 0
>   mpp = no
>   }
>   # Instantiating module "userlock" from file
/etc/raddb/mods-enabled/always
>   always userlock {
>   rcode = "userlock"
>   simulcount = 0
>   mpp = no
>   }
>   # Instantiating module "notfound" from file
/etc/raddb/mods-enabled/always
>   always notfound {
>   rcode = "notfound"
>   simulcount = 0
>   mpp = no
>   }
>   # Instantiating module "noop" from file /etc/raddb/mods-enabled/always
>   always noop {
>   rcode = "noop"
>   simulcount = 0
>   mpp = no
>   }
>   # Instantiating module "updated" from file
/etc/raddb/mods-enabled/always
>   always updated {
>   rcode = "updated"
>   simulcount = 0
>   mpp = no
>   }
>   # Loaded module rlm_exec
>   # Instantiating module "exec" from file /etc/raddb/mods-enabled/exec
>   exec {
>   wait = no
>   input_pairs = "request"
>   shell_escape = yes
>   timeout = 10
>   }
>   # Loaded module rlm_radutmp
>   # Instantiating module "sradutmp" from file /etc/raddb/mods-enabled/
sradutmp
>   radutmp sradutmp {
>   filename = "/var/log/radius/sradutmp"
>   username = "%{User-Name}"
>   case_sensitive = yes
>   check_with_nas = yes
>   permissions = 420
>   caller_id = no
>   }
>   # Instantiating module "radutmp" from file /etc/raddb/mods-enabled/
radutmp
>   radutmp {
>   filename = "/var/log/radius/radutmp"
>   username = "%{User-Name}"
>   case_sensitive = yes
>   check_with_nas = yes
>   permissions = 384
>   caller_id = yes
>   }
>   # Loaded module rlm_eap
>   # Instantiating module "eap" from file /etc/raddb/mods-enabled/eap
>   eap {
>   default_eap_type = "md5"
>   timer_expire = 60
>   ignore_unknown_eap_types = no
>   mod_accounting_username_bug = no
>   max_sessions = 1024
>   }
>    # Linked to sub-module rlm_eap_md5
>    # Linked to sub-module rlm_eap_leap
>    # Linked to sub-module rlm_eap_gtc
>    gtc {
>    challenge = "Password: "
>   auth_type = "PAP"
>    }
>    # Linked to sub-module rlm_eap_tls
>    tls {
>    tls = "tls-common"
>    }
>    tls-config tls-common {
>    rsa_key_exchange = no
>    dh_key_exchange = yes
>    rsa_key_length = 512
>    dh_key_length = 512
>    verify_depth = 0
>    ca_path = "/etc/raddb/certs"
>    pem_file_type = yes
>    private_key_file = "/etc/raddb/certs/server.pem"
>    certificate_file = "/etc/raddb/certs/server.pem"
>    ca_file = "/etc/raddb/certs/ca.pem"
>    private_key_password = <<< secret >>>
>    dh_file = "/etc/raddb/certs/dh"
>    fragment_size = 1024
>    include_length = yes
>    check_crl = no
>    cipher_list = "DEFAULT"
>    ecdh_curve = "prime256v1"
>     cache {
>     enable = yes
>     lifetime = 24
>     max_entries = 255
>     }
>     verify {
>     }
>     ocsp {
>     enable = no
>     override_cert_url = yes
>     url = "http://127.0.0.1/ocsp/"
>     use_nonce = yes
>     timeout = 0
>     softfail = yes
>     }
>    }
>    # Linked to sub-module rlm_eap_ttls
>    ttls {
>    tls = "tls-common"
>    default_eap_type = "md5"
>    copy_request_to_tunnel = no
>    use_tunneled_reply = no
>    virtual_server = "inner-tunnel"
>    include_length = yes
>    require_client_cert = no
>    }
> Using cached TLS configuration from previous invocation
>    # Linked to sub-module rlm_eap_peap
>    peap {
>    tls = "tls-common"
>    default_method = "mschapv2"
>    copy_request_to_tunnel = no
>    use_tunneled_reply = no
>    proxy_tunneled_request_as_eap = yes
>    virtual_server = "inner-tunnel"
>    soh = no
>    require_client_cert = no
>    }
> Using cached TLS configuration from previous invocation
>    # Linked to sub-module rlm_eap_mschapv2
>    mschapv2 {
>    with_ntdomain_hack = no
>    send_error = no
>    }
>   # Instantiating module "echo" from file /etc/raddb/mods-enabled/echo
>   exec echo {
>   wait = yes
>   program = "/bin/echo %{User-Name}"
>   input_pairs = "request"
>   output_pairs = "reply"
>   shell_escape = yes
>   }
>   # Loaded module rlm_soh
>   # Instantiating module "soh" from file /etc/raddb/mods-enabled/soh
>   soh {
>   dhcp = yes
>   }
>   # Loaded module rlm_dhcp
>   # Instantiating module "dhcp" from file /etc/raddb/mods-enabled/dhcp
>   # Loaded module rlm_cache
>   # Instantiating module "cache_eap" from file
/etc/raddb/mods-enabled/cache_eap
>   cache cache_eap {
>   key = "%{%{control:State}:-%{%{reply:State}:-%{State}}}"
>   ttl = 15
>   max_entries = 16384
>   epoch = 0
>   add_stats = no
>   }
>   # Loaded module rlm_mschap
>   # Instantiating module "mschap" from file /etc/raddb/mods-enabled/mschap
>   mschap {
>   use_mppe = yes
>   require_encryption = no
>   require_strong = no
>   with_ntdomain_hack = yes
>    passchange {
>    }
>   allow_retry = yes
>   }
>   # Loaded module rlm_chap
>   # Instantiating module "chap" from file /etc/raddb/mods-enabled/chap
>   # Loaded module rlm_realm
>   # Instantiating module "IPASS" from file /etc/raddb/mods-enabled/realm
>   realm IPASS {
>   format = "prefix"
>   delimiter = "/"
>   ignore_default = no
>   ignore_null = no
>   }
>   # Instantiating module "suffix" from file /etc/raddb/mods-enabled/realm
>   realm suffix {
>   format = "suffix"
>   delimiter = "@"
>   ignore_default = no
>   ignore_null = no
>   }
>   # Instantiating module "realmpercent" from file
/etc/raddb/mods-enabled/realm
>   realm realmpercent {
>   format = "suffix"
>   delimiter = "%"
>   ignore_default = no
>   ignore_null = no
>   }
>   # Instantiating module "ntdomain" from file
/etc/raddb/mods-enabled/realm
>   realm ntdomain {
>   format = "prefix"
>   delimiter = "\"
>   ignore_default = no
>   ignore_null = no
>   }
>   # Loaded module rlm_passwd
>   # Instantiating module "etc_passwd" from file
/etc/raddb/mods-enabled/passwd
>   passwd etc_passwd {
>   filename = "/etc/passwd"
>   format = "*User-Name:Crypt-Password:"
>   delimiter = ":"
>   ignore_nislike = no
>   ignore_empty = yes
>   allow_multiple_keys = no
>   hash_size = 100
>   }
> rlm_passwd: nfields: 3 keyfield 0(User-Name) listable: no
>   # Loaded module rlm_digest
>   # Instantiating module "digest" from file /etc/raddb/mods-enabled/digest
>   # Loaded module rlm_preprocess
>   # Instantiating module "preprocess" from file 
> /etc/raddb/mods-enabled/
preprocess
>   preprocess {
>   huntgroups = "/etc/raddb/mods-config/preprocess/huntgroups"
>   hints = "/etc/raddb/mods-config/preprocess/hints"
>   with_ascend_hack = no
>   ascend_channels_per_line = 23
>   with_ntdomain_hack = no
>   with_specialix_jetstream_hack = no
>   with_cisco_vsa_hack = no
>   with_alvarion_vsa_hack = no
>   }
> reading pairlist file /etc/raddb/mods-config/preprocess/huntgroups
> reading pairlist file /etc/raddb/mods-config/preprocess/hints
>   # Loaded module rlm_logintime
>   # Instantiating module "logintime" from file 
> /etc/raddb/mods-enabled/
logintime
>   logintime {
>   minimum_timeout = 60
>   }
>   # Loaded module rlm_replicate
>   # Instantiating module "replicate" from file 
> /etc/raddb/mods-enabled/
replicate
>   # Loaded module rlm_detail
>   # Instantiating module "detail" from file /etc/raddb/mods-enabled/detail
>   detail {
>   filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{
Packet-Src-IPv6-Address}}/detail-%Y%m%d"
>   header = "%t"
>   permissions = 384
>   locking = no
>   log_packet_header = no
>   }
>   # Instantiating module "ntlm_auth" from file
/etc/raddb/mods-enabled/ntlm_auth
>   exec ntlm_auth {
>   wait = yes
>   program = "/path/to/ntlm_auth --request-nt-key --domain=MYDOMAIN
--username=%{mschap:User-Name} --password=%{User-Password}"
>   shell_escape = yes
>   }
>   # Loaded module rlm_dynamic_clients
>   # Instantiating module "dynamic_clients" from file
/etc/raddb/mods-enabled/dynamic_clients
>   # Loaded module rlm_utf8
>   # Instantiating module "utf8" from file /etc/raddb/mods-enabled/utf8
>   # Instantiating module "auth_log" from file /etc/raddb/mods-enabled/
detail.log
>   detail auth_log {
>   filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{
Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d"
>   header = "%t"
>   permissions = 384
>   locking = no
>   log_packet_header = no
>   }
> rlm_detail (auth_log): 'User-Password' suppressed, will not appear in
detail output
>   # Instantiating module "reply_log" from file 
> /etc/raddb/mods-enabled/
detail.log
>   detail reply_log {
>   filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{
Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d"
>   header = "%t"
>   permissions = 384
>   locking = no
>   log_packet_header = no
>   }
>   # Instantiating module "pre_proxy_log" from file
/etc/raddb/mods-enabled/detail.log
>   detail pre_proxy_log {
>   filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{
Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d"
>   header = "%t"
>   permissions = 384
>   locking = no
>   log_packet_header = no
>   }
>   # Instantiating module "post_proxy_log" from file
/etc/raddb/mods-enabled/detail.log
>   detail post_proxy_log {
>   filename = "/var/log/radius/radacct/%{%{Packet-Src-IP-Address}:-%{
Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d"
>   header = "%t"
>   permissions = 384
>   locking = no
>   log_packet_header = no
>   }
>   # Loaded module rlm_files
>   # Instantiating module "files" from file /etc/raddb/mods-enabled/files
>   files {
>   filename = "/etc/raddb/mods-config/files/authorize"
>   usersfile = "/etc/raddb/mods-config/files/authorize"
>   acctusersfile = "/etc/raddb/mods-config/files/accounting"
>   preproxy_usersfile = "/etc/raddb/mods-config/files/pre-proxy"
>   compat = "cistron"
>   }
> reading pairlist file /etc/raddb/mods-config/files/authorize
> [/etc/raddb/mods-config/files/authorize]:181 Cistron compatibility 
> checks
for entry DEFAULT ...
> [/etc/raddb/mods-config/files/authorize]:188 Cistron compatibility 
> checks
for entry DEFAULT ...
> [/etc/raddb/mods-config/files/authorize]:195 Cistron compatibility 
> checks
for entry DEFAULT ...
> reading pairlist file /etc/raddb/mods-config/files/authorize
> [/etc/raddb/mods-config/files/authorize]:181 Cistron compatibility 
> checks
for entry DEFAULT ...
> [/etc/raddb/mods-config/files/authorize]:188 Cistron compatibility 
> checks
for entry DEFAULT ...
> [/etc/raddb/mods-config/files/authorize]:195 Cistron compatibility 
> checks
for entry DEFAULT ...
> reading pairlist file /etc/raddb/mods-config/files/accounting
> reading pairlist file /etc/raddb/mods-config/files/pre-proxy
>   # Loaded module rlm_unpack
>   # Instantiating module "unpack" from file /etc/raddb/mods-enabled/unpack
>   # Loaded module rlm_attr_filter
>   # Instantiating module "attr_filter.post-proxy" from file
/etc/raddb/mods-enabled/attr_filter
>   attr_filter attr_filter.post-proxy {
>   filename = "/etc/raddb/mods-config/attr_filter/post-proxy"
>   key = "%{Realm}"
>   relaxed = no
>   }
> reading pairlist file /etc/raddb/mods-config/attr_filter/post-proxy
>   # Instantiating module "attr_filter.pre-proxy" from file
/etc/raddb/mods-enabled/attr_filter
>   attr_filter attr_filter.pre-proxy {
>   filename = "/etc/raddb/mods-config/attr_filter/pre-proxy"
>   key = "%{Realm}"
>   relaxed = no
>   }
> reading pairlist file /etc/raddb/mods-config/attr_filter/pre-proxy
>   # Instantiating module "attr_filter.access_reject" from file
/etc/raddb/mods-enabled/attr_filter
>   attr_filter attr_filter.access_reject {
>   filename = "/etc/raddb/mods-config/attr_filter/access_reject"
>   key = "%{User-Name}"
>   relaxed = no
>   }
> reading pairlist file /etc/raddb/mods-config/attr_filter/access_reject
>   # Instantiating module "attr_filter.access_challenge" from file
/etc/raddb/mods-enabled/attr_filter
>   attr_filter attr_filter.access_challenge {
>   filename = "/etc/raddb/mods-config/attr_filter/access_challenge"
>   key = "%{User-Name}"
>   relaxed = no
>   }
> reading pairlist file /etc/raddb/mods-config/attr_filter/access_challenge
>   # Instantiating module "attr_filter.accounting_response" from file
/etc/raddb/mods-enabled/attr_filter
>   attr_filter attr_filter.accounting_response {
>   filename = "/etc/raddb/mods-config/attr_filter/accounting_response"
>   key = "%{User-Name}"
>   relaxed = no
>   }
> reading pairlist file /etc/raddb/mods-config/attr_
filter/accounting_response
>   # Loaded module rlm_pap
>   # Instantiating module "pap" from file /etc/raddb/mods-enabled/pap 
> pap {
>   normalise = yes
>   }
> } # modules
> radiusd: #### Loading Virtual Servers #### server { # from file 
> /etc/raddb/radiusd.conf } # server server default { # from file 
> /etc/raddb/sites-enabled/default # Creating Auth-Type = digest # 
> Loading authenticate {...} # Loading authorize {...} Ignoring "sql"
> (see raddb/mods-available/README.rst) Ignoring "ldap" (see
> raddb/mods-available/README.rst) # Loading preacct {...} # Loading 
> accounting {...} # Loading post-proxy {...} # Loading post-auth {...} 
> } # server default server inner-tunnel { # from file 
> /etc/raddb/sites-enabled/inner-tunnel
> # Loading authenticate {...}
> # Loading authorize {...}
> # Loading session {...}
> # Loading post-proxy {...}
> # Loading post-auth {...}
> } # server inner-tunnel
> radiusd: #### Opening IP addresses and Ports #### listen {
>   type = "auth"
>   ipaddr = 10.30.23.214
>   port = 1812
>    limit {
>    max_connections = 16
>    lifetime = 0
>    idle_timeout = 30
>    }
> }
> listen {
>   type = "acct"
>   ipaddr = 10.30.23.214
>   port = 1813
>    limit {
>    max_connections = 16
>    lifetime = 0
>    idle_timeout = 30
>    }
> }
> listen {
>   type = "auth"
>   ipaddr = 127.0.0.1
>   port = 18120
> }
> Listening on auth address 10.30.23.214 port 1812 as server default 
> Listening on acct address 10.30.23.214 port 1813 as server default 
> Listening on auth address 127.0.0.1 port 18120 as server inner-tunnel 
> Opening new proxy socket 'proxy address * port 0'
> Listening on proxy address * port 37421 Ready to process requests.
>
>
> **********************************************************
> Electronic Mail is not secure, may not be read every day, and should 
> not be used for urgent or sensitive issues
> -
> List info/subscribe/unsubscribe? See
> http://www.freeradius.org/list/users.html
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/ list/users.html
**********************************************************
Electronic Mail is not secure, may not be read every day, and should not be used for urgent or sensitive issues

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/ list/users.html
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
**********************************************************
Electronic Mail is not secure, may not be read every day, and should not be used for urgent or sensitive issues 



More information about the Freeradius-Users mailing list