Need help: Freeradius says "sent access-accept" but actually is not sending it?
Chris Knipe
savage at savage.za.org
Fri Nov 15 08:33:53 CET 2019
| So ISP is redirecting radius request to our network and we should do the
authentication and a static IP assignment.
| (0) Received Access-Request Id 60 from 10.10.10.241:37488 to
10.10.10.75:1812 length 144
| (0) Sent Access-Accept Id 60 from 10.10.10.75:1812 to
10.10.10.241:37488 length
0
| tcpdump I can see only ARP packets sent to the IP address from where the
request came.
It's also not impossible, but it is a bit unlikely, that the ISP would be
using RFC1918 for AAA. It does indeed look like something funny is going
on here network wise, rather than AAA wise. Your not dst-NATing incoming
AAA by any chance and forgetting to srcNAT the response back out? It's
suspect to me at least, that your, and your ISPs AAA is on the same /24.
In the same breath, it's also suspect that the length of the access-accept
packet, is 0 (seeing you are sending Framed-IP-Address and Service-Type).
On Thu, Nov 14, 2019 at 10:22 AM Vyzdura Tomas <Tomas.Vyzdura at vviss.cz>
wrote:
> Hi,
>
> I would like to ask for a help with the following problem.
> Our ISP is managing MPLS for us and as per our demand it added mobile SIM
> cards connecting through special APN to the MPLS. ISP can authenticate SIM
> for us (and it works), however we would like to do it by ourselves.
> So ISP is redirecting radius request to our network and we should do the
> authentication and a static IP assignment.
> I can get the request, and in freeradius debuglog I see it is processed
> and it even shows Sent Access-Accept but it looks like the server doesn’t
> send the actual packet – when monitoring with tcpdump I can see only ARP
> packets sent to the IP address from where the request came.
>
> When testing from another machine with same user/password on our network
> it works – I get authenticated and receive IP address in the response. I
> also see radius sending packet in tcpdump.
> There is no firewall on the server
>
>
> I am new to freeradius and has very limited skills of linux, so maybe I am
> missing some basic stuff...
>
> Thanks for help
>
>
> Log from freeradius:
>
> ############################################################################
> root at ubuntu:/etc# freeradius -X
> FreeRADIUS Version 3.0.16
> Copyright (C) 1999-2017 The FreeRADIUS server project and contributors
> There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
> PARTICULAR PURPOSE
> You may redistribute copies of FreeRADIUS under the terms of the
> GNU General Public License
> For more information about these matters, see the file named COPYRIGHT
> Starting - reading configuration files ...
> including dictionary file /usr/share/freeradius/dictionary
> including dictionary file /usr/share/freeradius/dictionary.dhcp
> including dictionary file /usr/share/freeradius/dictionary.vqp
> including dictionary file /etc/freeradius/3.0/dictionary
> including configuration file /etc/freeradius/3.0/radiusd.conf
> including configuration file /etc/freeradius/3.0/proxy.conf
> including configuration file /etc/freeradius/3.0/clients.conf
> including files in directory /etc/freeradius/3.0/mods-enabled/
> including configuration file /etc/freeradius/3.0/mods-enabled/detail
> including configuration file /etc/freeradius/3.0/mods-enabled/unpack
> including configuration file /etc/freeradius/3.0/mods-enabled/passwd
> including configuration file /etc/freeradius/3.0/mods-enabled/realm
> including configuration file /etc/freeradius/3.0/mods-enabled/expr
> including configuration file /etc/freeradius/3.0/mods-enabled/mschap
> including configuration file /etc/freeradius/3.0/mods-enabled/preprocess
> including configuration file /etc/freeradius/3.0/mods-enabled/ntlm_auth
> including configuration file /etc/freeradius/3.0/mods-enabled/attr_filter
> including configuration file /etc/freeradius/3.0/mods-enabled/unix
> including configuration file /etc/freeradius/3.0/mods-enabled/logintime
> including configuration file /etc/freeradius/3.0/mods-enabled/replicate
> including configuration file /etc/freeradius/3.0/mods-enabled/sradutmp
> including configuration file
> /etc/freeradius/3.0/mods-enabled/dynamic_clients
> including configuration file /etc/freeradius/3.0/mods-enabled/expiration
> including configuration file /etc/freeradius/3.0/mods-enabled/always
> including configuration file /etc/freeradius/3.0/mods-enabled/utf8
> including configuration file /etc/freeradius/3.0/mods-enabled/sql
> including configuration file
> /etc/freeradius/3.0/mods-config/sql/main/mysql/queries.conf
> including configuration file /etc/freeradius/3.0/mods-enabled/detail.log
> including configuration file /etc/freeradius/3.0/mods-enabled/eap
> including configuration file /etc/freeradius/3.0/mods-enabled/digest
> including configuration file /etc/freeradius/3.0/mods-enabled/cache_eap
> including configuration file /etc/freeradius/3.0/mods-enabled/exec
> including configuration file /etc/freeradius/3.0/mods-enabled/soh
> including configuration file /etc/freeradius/3.0/mods-enabled/files
> including configuration file /etc/freeradius/3.0/mods-enabled/linelog
> including configuration file /etc/freeradius/3.0/mods-enabled/chap
> including configuration file /etc/freeradius/3.0/mods-enabled/radutmp
> including configuration file /etc/freeradius/3.0/mods-enabled/pap
> including configuration file /etc/freeradius/3.0/mods-enabled/echo
> including files in directory /etc/freeradius/3.0/policy.d/
> including configuration file /etc/freeradius/3.0/policy.d/accounting
> including configuration file /etc/freeradius/3.0/policy.d/debug
> including configuration file /etc/freeradius/3.0/policy.d/filter
> including configuration file /etc/freeradius/3.0/policy.d/abfab-tr
> including configuration file /etc/freeradius/3.0/policy.d/cui
> including configuration file /etc/freeradius/3.0/policy.d/canonicalization
> including configuration file /etc/freeradius/3.0/policy.d/dhcp
> including configuration file /etc/freeradius/3.0/policy.d/eap
> including configuration file /etc/freeradius/3.0/policy.d/control
> including configuration file /etc/freeradius/3.0/policy.d/operator-name
> including configuration file
> /etc/freeradius/3.0/policy.d/moonshot-targeted-ids
> including files in directory /etc/freeradius/3.0/sites-enabled/
> including configuration file /etc/freeradius/3.0/sites-enabled/inner-tunnel
> including configuration file /etc/freeradius/3.0/sites-enabled/default
> main {
> security {
> user = "freerad"
> group = "freerad"
> allow_core_dumps = no
> }
> name = "freeradius"
> prefix = "/usr"
> localstatedir = "/var"
> logdir = "/var/log/freeradius"
> run_dir = "/var/run/freeradius"
> }
> main {
> name = "freeradius"
> prefix = "/usr"
> localstatedir = "/var"
> sbindir = "/usr/sbin"
> logdir = "/var/log/freeradius"
> run_dir = "/var/run/freeradius"
> libdir = "/usr/lib/freeradius"
> radacctdir = "/var/log/freeradius/radacct"
> hostname_lookups = no
> max_request_time = 30
> cleanup_delay = 5
> max_requests = 16384
> pidfile = "/var/run/freeradius/freeradius.pid"
> checkrad = "/usr/sbin/checkrad"
> debug_level = 0
> proxy_requests = yes
> log {
> stripped_names = no
> auth = no
> auth_badpass = no
> auth_goodpass = no
> colourise = yes
> msg_denied = "You are already logged in - access denied"
> }
> resources {
> }
> security {
> max_attributes = 200
> reject_delay = 1.000000
> status_server = yes
> }
> }
> radiusd: #### Loading Realms and Home Servers ####
> proxy server {
> retry_delay = 5
> retry_count = 3
> default_fallback = no
> dead_time = 120
> wake_all_if_all_dead = no
> }
> home_server localhost {
> ipaddr = 127.0.0.1
> port = 1812
> type = "auth"
> secret = <<< secret >>>
> response_window = 20.000000
> response_timeouts = 1
> max_outstanding = 65536
> zombie_period = 40
> status_check = "status-server"
> ping_interval = 30
> check_interval = 30
> check_timeout = 4
> num_answers_to_alive = 3
> revive_interval = 120
> limit {
> max_connections = 16
> max_requests = 0
> lifetime = 0
> idle_timeout = 0
> }
> coa {
> irt = 2
> mrt = 16
> mrc = 5
> mrd = 30
> }
> }
> home_server_pool my_auth_failover {
> type = fail-over
> home_server = localhost
> }
> realm example.com {
> auth_pool = my_auth_failover
> }
> realm LOCAL {
> }
> radiusd: #### Loading Clients ####
> client localhost {
> ipaddr = 127.0.0.1
> require_message_authenticator = no
> secret = <<< secret >>>
> nas_type = "other"
> proto = "*"
> limit {
> max_connections = 16
> lifetime = 0
> idle_timeout = 30
> }
> }
> client 10.10.10.241 {
> ipaddr = 10.10.10.241
> require_message_authenticator = no
> secret = <<< secret >>>
> shortname = "O2-1x"
> nas_type = "other"
> response_window = 20.000000
> limit {
> max_connections = 16
> lifetime = 0
> idle_timeout = 30
> }
> }
> client 10.10.8.8 {
> ipaddr = 10.10.8.8
> require_message_authenticator = no
> secret = <<< secret >>>
> shortname = "PC51"
> nas_type = "other"
> response_window = 20.000000
> limit {
> max_connections = 16
> lifetime = 0
> idle_timeout = 30
> }
> }
> client localhost_ipv6 {
> ipv6addr = ::1
> require_message_authenticator = no
> secret = <<< secret >>>
> limit {
> max_connections = 16
> lifetime = 0
> idle_timeout = 30
> }
> }
> Debugger not attached
> # Creating Auth-Type = mschap
> # Creating Auth-Type = eap
> # Creating Auth-Type = PAP
> # Creating Auth-Type = CHAP
> # Creating Auth-Type = MS-CHAP
> # Creating Auth-Type = digest
> radiusd: #### Instantiating modules ####
> modules {
> # Loaded module rlm_detail
> # Loading module "detail" from file
> /etc/freeradius/3.0/mods-enabled/detail
> detail {
> filename =
> "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d"
> header = "%t"
> permissions = 384
> locking = no
> escape_filenames = no
> log_packet_header = no
> }
> # Loaded module rlm_unpack
> # Loading module "unpack" from file
> /etc/freeradius/3.0/mods-enabled/unpack
> # Loaded module rlm_passwd
> # Loading module "etc_passwd" from file
> /etc/freeradius/3.0/mods-enabled/passwd
> passwd etc_passwd {
> filename = "/etc/passwd"
> format = "*User-Name:Crypt-Password:"
> delimiter = ":"
> ignore_nislike = no
> ignore_empty = yes
> allow_multiple_keys = no
> hash_size = 100
> }
> # Loaded module rlm_realm
> # Loading module "IPASS" from file /etc/freeradius/3.0/mods-enabled/realm
> realm IPASS {
> format = "prefix"
> delimiter = "/"
> ignore_default = no
> ignore_null = no
> }
> # Loading module "suffix" from file
> /etc/freeradius/3.0/mods-enabled/realm
> realm suffix {
> format = "suffix"
> delimiter = "@"
> ignore_default = no
> ignore_null = no
> }
> # Loading module "realmpercent" from file
> /etc/freeradius/3.0/mods-enabled/realm
> realm realmpercent {
> format = "suffix"
> delimiter = "%"
> ignore_default = no
> ignore_null = no
> }
> # Loading module "ntdomain" from file
> /etc/freeradius/3.0/mods-enabled/realm
> realm ntdomain {
> format = "prefix"
> delimiter = "\\"
> ignore_default = no
> ignore_null = no
> }
> # Loaded module rlm_expr
> # Loading module "expr" from file /etc/freeradius/3.0/mods-enabled/expr
> expr {
> safe_characters =
> "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_:
> /äéöüàâæçèéêëîïôœùûüaÿÄÉÖÜßÀÂÆÇÈÉÊËÎÏÔŒÙÛÜŸ"
> }
> # Loaded module rlm_mschap
> # Loading module "mschap" from file
> /etc/freeradius/3.0/mods-enabled/mschap
> mschap {
> use_mppe = yes
> require_encryption = no
> require_strong = no
> with_ntdomain_hack = yes
> passchange {
> }
> allow_retry = yes
> winbind_retry_with_normalised_username = no
> }
> # Loaded module rlm_preprocess
> # Loading module "preprocess" from file
> /etc/freeradius/3.0/mods-enabled/preprocess
> preprocess {
> huntgroups =
> "/etc/freeradius/3.0/mods-config/preprocess/huntgroups"
> hints = "/etc/freeradius/3.0/mods-config/preprocess/hints"
> with_ascend_hack = no
> ascend_channels_per_line = 23
> with_ntdomain_hack = no
> with_specialix_jetstream_hack = no
> with_cisco_vsa_hack = no
> with_alvarion_vsa_hack = no
> }
> # Loaded module rlm_exec
> # Loading module "ntlm_auth" from file
> /etc/freeradius/3.0/mods-enabled/ntlm_auth
> exec ntlm_auth {
> wait = yes
> program = "/path/to/ntlm_auth --request-nt-key --domain=MYDOMAIN
> --username=%{mschap:User-Name} --password=%{User-Password}"
> shell_escape = yes
> }
> # Loaded module rlm_attr_filter
> # Loading module "attr_filter.post-proxy" from file
> /etc/freeradius/3.0/mods-enabled/attr_filter
> attr_filter attr_filter.post-proxy {
> filename = "/etc/freeradius/3.0/mods-config/attr_filter/post-proxy"
> key = "%{Realm}"
> relaxed = no
> }
> # Loading module "attr_filter.pre-proxy" from file
> /etc/freeradius/3.0/mods-enabled/attr_filter
> attr_filter attr_filter.pre-proxy {
> filename = "/etc/freeradius/3.0/mods-config/attr_filter/pre-proxy"
> key = "%{Realm}"
> relaxed = no
> }
> # Loading module "attr_filter.access_reject" from file
> /etc/freeradius/3.0/mods-enabled/attr_filter
> attr_filter attr_filter.access_reject {
> filename =
> "/etc/freeradius/3.0/mods-config/attr_filter/access_reject"
> key = "%{User-Name}"
> relaxed = no
> }
> # Loading module "attr_filter.access_challenge" from file
> /etc/freeradius/3.0/mods-enabled/attr_filter
> attr_filter attr_filter.access_challenge {
> filename =
> "/etc/freeradius/3.0/mods-config/attr_filter/access_challenge"
> key = "%{User-Name}"
> relaxed = no
> }
> # Loading module "attr_filter.accounting_response" from file
> /etc/freeradius/3.0/mods-enabled/attr_filter
> attr_filter attr_filter.accounting_response {
> filename =
> "/etc/freeradius/3.0/mods-config/attr_filter/accounting_response"
> key = "%{User-Name}"
> relaxed = no
> }
> # Loaded module rlm_unix
> # Loading module "unix" from file /etc/freeradius/3.0/mods-enabled/unix
> unix {
> radwtmp = "/var/log/freeradius/radwtmp"
> }
> Creating attribute Unix-Group
> # Loaded module rlm_logintime
> # Loading module "logintime" from file
> /etc/freeradius/3.0/mods-enabled/logintime
> logintime {
> minimum_timeout = 60
> }
> # Loaded module rlm_replicate
> # Loading module "replicate" from file
> /etc/freeradius/3.0/mods-enabled/replicate
> # Loaded module rlm_radutmp
> # Loading module "sradutmp" from file
> /etc/freeradius/3.0/mods-enabled/sradutmp
> radutmp sradutmp {
> filename = "/var/log/freeradius/sradutmp"
> username = "%{User-Name}"
> case_sensitive = yes
> check_with_nas = yes
> permissions = 420
> caller_id = no
> }
> # Loaded module rlm_dynamic_clients
> # Loading module "dynamic_clients" from file
> /etc/freeradius/3.0/mods-enabled/dynamic_clients
> # Loaded module rlm_expiration
> # Loading module "expiration" from file
> /etc/freeradius/3.0/mods-enabled/expiration
> # Loaded module rlm_always
> # Loading module "reject" from file
> /etc/freeradius/3.0/mods-enabled/always
> always reject {
> rcode = "reject"
> simulcount = 0
> mpp = no
> }
> # Loading module "fail" from file /etc/freeradius/3.0/mods-enabled/always
> always fail {
> rcode = "fail"
> simulcount = 0
> mpp = no
> }
> # Loading module "ok" from file /etc/freeradius/3.0/mods-enabled/always
> always ok {
> rcode = "ok"
> simulcount = 0
> mpp = no
> }
> # Loading module "handled" from file
> /etc/freeradius/3.0/mods-enabled/always
> always handled {
> rcode = "handled"
> simulcount = 0
> mpp = no
> }
> # Loading module "invalid" from file
> /etc/freeradius/3.0/mods-enabled/always
> always invalid {
> rcode = "invalid"
> simulcount = 0
> mpp = no
> }
> # Loading module "userlock" from file
> /etc/freeradius/3.0/mods-enabled/always
> always userlock {
> rcode = "userlock"
> simulcount = 0
> mpp = no
> }
> # Loading module "notfound" from file
> /etc/freeradius/3.0/mods-enabled/always
> always notfound {
> rcode = "notfound"
> simulcount = 0
> mpp = no
> }
> # Loading module "noop" from file /etc/freeradius/3.0/mods-enabled/always
> always noop {
> rcode = "noop"
> simulcount = 0
> mpp = no
> }
> # Loading module "updated" from file
> /etc/freeradius/3.0/mods-enabled/always
> always updated {
> rcode = "updated"
> simulcount = 0
> mpp = no
> }
> # Loaded module rlm_utf8
> # Loading module "utf8" from file /etc/freeradius/3.0/mods-enabled/utf8
> # Loaded module rlm_sql
> # Loading module "sql" from file /etc/freeradius/3.0/mods-enabled/sql
> sql {
> driver = "rlm_sql_mysql"
> server = "localhost"
> port = 3306
> login = "radius"
> password = <<< secret >>>
> radius_db = "radius"
> read_groups = yes
> read_profiles = yes
> read_clients = yes
> delete_stale_sessions = yes
> sql_user_name = "%{User-Name}"
> default_user_profile = ""
> client_query = "SELECT id, nasname, shortname, type, secret,
> server FROM nas"
> authorize_check_query = "SELECT id, username, attribute, value, op
> FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id"
> authorize_reply_query = "SELECT id, username, attribute, value, op
> FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id"
> authorize_group_check_query = "SELECT id, groupname, attribute,
> Value, op FROM radgroupcheck WHERE groupname = '%{SQL-Group}' ORDER BY id"
> authorize_group_reply_query = "SELECT id, groupname, attribute,
> value, op FROM radgroupreply WHERE groupname = '%{SQL-Group}' ORDER BY id"
> group_membership_query = "SELECT groupname FROM radusergroup WHERE
> username = '%{SQL-User-Name}' ORDER BY priority"
> simul_count_query = "SELECT COUNT(*) FROM radacct WHERE username =
> '%{SQL-User-Name}' AND acctstoptime IS NULL"
> simul_verify_query = "SELECT radacctid, acctsessionid, username,
> nasipaddress, nasportid, framedipaddress, callingstationid, framedprotocol
> FROM radacct WHERE username = '%{SQL-User-Name}' AND acctstoptime IS NULL"
> safe_characters =
> "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
> accounting {
> reference = "%{tolower:type.%{Acct-Status-Type}.query}"
> type {
> accounting-on {
> query = "UPDATE radacct SET acctstoptime =
> FROM_UNIXTIME(%{integer:Event-Timestamp}), acctsessiontime =
> '%{integer:Event-Timestamp}' - UNIX_TIMESTAMP(acctstarttime),
> acctterminatecause = '%{%{Acct-Terminate-Cause}:-NAS-Reboot}' WHERE
> acctstoptime IS NULL AND nasipaddress = '%{NAS-IP-Address}' AND
> acctstarttime <= FROM_UNIXTIME(%{integer:Event-Timestamp})"
> }
> accounting-off {
> query = "UPDATE radacct SET acctstoptime =
> FROM_UNIXTIME(%{integer:Event-Timestamp}), acctsessiontime =
> '%{integer:Event-Timestamp}' - UNIX_TIMESTAMP(acctstarttime),
> acctterminatecause = '%{%{Acct-Terminate-Cause}:-NAS-Reboot}' WHERE
> acctstoptime IS NULL AND nasipaddress = '%{NAS-IP-Address}' AND
> acctstarttime <= FROM_UNIXTIME(%{integer:Event-Timestamp})"
> }
> start {
> query = "INSERT INTO radacct (acctsessionid,
> acctuniqueid, username, realm,
> nasipaddress, nasportid, nasporttype, acctstarttime,
> acctupdatetime, acctstoptime, acctsessiontime,
> acctauthentic, connectinfo_start, connectinfo_stop,
> acctinputoctets, acctoutputoctets, calledstationid,
> callingstationid, acctterminatecause, servicetype,
> framedprotocol, framedipaddress) VALUES ('%{Acct-Session-Id}',
> '%{Acct-Unique-Session-Id}', '%{SQL-User-Name}', '%{Realm}',
> '%{NAS-IP-Address}', '%{%{NAS-Port-ID}:-%{NAS-Port}}', '%{NAS-Port-Type}',
> FROM_UNIXTIME(%{integer:Event-Timestamp}),
> FROM_UNIXTIME(%{integer:Event-Timestamp}), NULL, '0', '%{Acct-Authentic}',
> '%{Connect-Info}', '', '0', '0', '%{Called-Station-Id}',
> '%{Calling-Station-Id}', '', '%{Service-Type}', '%{Framed-Protocol}',
> '%{Framed-IP-Address}')"
> }
> interim-update {
> query = "UPDATE radacct SET acctupdatetime =
> (@acctupdatetime_old:=acctupdatetime), acctupdatetime =
> FROM_UNIXTIME(%{integer:Event-Timestamp}), acctinterval =
> %{integer:Event-Timestamp} - UNIX_TIMESTAMP(@acctupdatetime_old),
> framedipaddress = '%{Framed-IP-Address}', acctsessiontime =
> %{%{Acct-Session-Time}:-NULL}, acctinputoctets =
> '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}',
> acctoutputoctets = '%{%{Acct-Output-Gigawords}:-0}' << 32 |
> '%{%{Acct-Output-Octets}:-0}' WHERE AcctUniqueId =
> '%{Acct-Unique-Session-Id}'"
> }
> stop {
> query = "UPDATE radacct SET acctstoptime =
> FROM_UNIXTIME(%{integer:Event-Timestamp}), acctsessiontime =
> %{%{Acct-Session-Time}:-NULL}, acctinputoctets =
> '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}',
> acctoutputoctets = '%{%{Acct-Output-Gigawords}:-0}' << 32 |
> '%{%{Acct-Output-Octets}:-0}', acctterminatecause =
> '%{Acct-Terminate-Cause}', connectinfo_stop = '%{Connect-Info}' WHERE
> AcctUniqueId = '%{Acct-Unique-Session-Id}'"
> }
> }
> }
> post-auth {
> reference = ".query"
> query = "INSERT INTO radpostauth (username, pass, reply, authdate)
> VALUES ( '%{SQL-User-Name}', '%{%{User-Password}:-%{Chap-Password}}',
> '%{reply:Packet-Type}', '%S')"
> }
> }
> rlm_sql (sql): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and
> linked
> Creating attribute SQL-Group
> # Loading module "auth_log" from file
> /etc/freeradius/3.0/mods-enabled/detail.log
> detail auth_log {
> filename =
> "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d"
> header = "%t"
> permissions = 384
> locking = no
> escape_filenames = no
> log_packet_header = no
> }
> # Loading module "reply_log" from file
> /etc/freeradius/3.0/mods-enabled/detail.log
> detail reply_log {
> filename =
> "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d"
> header = "%t"
> permissions = 384
> locking = no
> escape_filenames = no
> log_packet_header = no
> }
> # Loading module "pre_proxy_log" from file
> /etc/freeradius/3.0/mods-enabled/detail.log
> detail pre_proxy_log {
> filename =
> "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d"
> header = "%t"
> permissions = 384
> locking = no
> escape_filenames = no
> log_packet_header = no
> }
> # Loading module "post_proxy_log" from file
> /etc/freeradius/3.0/mods-enabled/detail.log
> detail post_proxy_log {
> filename =
> "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d"
> header = "%t"
> permissions = 384
> locking = no
> escape_filenames = no
> log_packet_header = no
> }
> # Loaded module rlm_eap
> # Loading module "eap" from file /etc/freeradius/3.0/mods-enabled/eap
> eap {
> default_eap_type = "md5"
> timer_expire = 60
> ignore_unknown_eap_types = no
> cisco_accounting_username_bug = no
> max_sessions = 16384
> }
> # Loaded module rlm_digest
> # Loading module "digest" from file
> /etc/freeradius/3.0/mods-enabled/digest
> # Loaded module rlm_cache
> # Loading module "cache_eap" from file
> /etc/freeradius/3.0/mods-enabled/cache_eap
> cache cache_eap {
> driver = "rlm_cache_rbtree"
> key = "%{%{control:State}:-%{%{reply:State}:-%{State}}}"
> ttl = 15
> max_entries = 0
> epoch = 0
> add_stats = no
> }
> # Loading module "exec" from file /etc/freeradius/3.0/mods-enabled/exec
> exec {
> wait = no
> input_pairs = "request"
> shell_escape = yes
> timeout = 10
> }
> # Loaded module rlm_soh
> # Loading module "soh" from file /etc/freeradius/3.0/mods-enabled/soh
> soh {
> dhcp = yes
> }
> # Loaded module rlm_files
> # Loading module "files" from file /etc/freeradius/3.0/mods-enabled/files
> files {
> filename = "/etc/freeradius/3.0/mods-config/files/authorize"
> acctusersfile = "/etc/freeradius/3.0/mods-config/files/accounting"
> preproxy_usersfile =
> "/etc/freeradius/3.0/mods-config/files/pre-proxy"
> }
> # Loaded module rlm_linelog
> # Loading module "linelog" from file
> /etc/freeradius/3.0/mods-enabled/linelog
> linelog {
> filename = "/var/log/freeradius/linelog"
> escape_filenames = no
> syslog_severity = "info"
> permissions = 384
> format = "This is a log message for %{User-Name}"
> reference = "messages.%{%{reply:Packet-Type}:-default}"
> }
> # Loading module "log_accounting" from file
> /etc/freeradius/3.0/mods-enabled/linelog
> linelog log_accounting {
> filename = "/var/log/freeradius/linelog-accounting"
> escape_filenames = no
> syslog_severity = "info"
> permissions = 384
> format = ""
> reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}"
> }
> # Loaded module rlm_chap
> # Loading module "chap" from file /etc/freeradius/3.0/mods-enabled/chap
> # Loading module "radutmp" from file
> /etc/freeradius/3.0/mods-enabled/radutmp
> radutmp {
> filename = "/var/log/freeradius/radutmp"
> username = "%{User-Name}"
> case_sensitive = yes
> check_with_nas = yes
> permissions = 384
> caller_id = yes
> }
> # Loaded module rlm_pap
> # Loading module "pap" from file /etc/freeradius/3.0/mods-enabled/pap
> pap {
> normalise = yes
> }
> # Loading module "echo" from file /etc/freeradius/3.0/mods-enabled/echo
> exec echo {
> wait = yes
> program = "/bin/echo %{User-Name}"
> input_pairs = "request"
> output_pairs = "reply"
> shell_escape = yes
> }
> instantiate {
> }
> # Instantiating module "detail" from file
> /etc/freeradius/3.0/mods-enabled/detail
> # Instantiating module "etc_passwd" from file
> /etc/freeradius/3.0/mods-enabled/passwd
> rlm_passwd: nfields: 3 keyfield 0(User-Name) listable: no
> # Instantiating module "IPASS" from file
> /etc/freeradius/3.0/mods-enabled/realm
> # Instantiating module "suffix" from file
> /etc/freeradius/3.0/mods-enabled/realm
> # Instantiating module "realmpercent" from file
> /etc/freeradius/3.0/mods-enabled/realm
> # Instantiating module "ntdomain" from file
> /etc/freeradius/3.0/mods-enabled/realm
> # Instantiating module "mschap" from file
> /etc/freeradius/3.0/mods-enabled/mschap
> rlm_mschap (mschap): using internal authentication
> # Instantiating module "preprocess" from file
> /etc/freeradius/3.0/mods-enabled/preprocess
> reading pairlist file /etc/freeradius/3.0/mods-config/preprocess/huntgroups
> reading pairlist file /etc/freeradius/3.0/mods-config/preprocess/hints
> # Instantiating module "attr_filter.post-proxy" from file
> /etc/freeradius/3.0/mods-enabled/attr_filter
> reading pairlist file
> /etc/freeradius/3.0/mods-config/attr_filter/post-proxy
> # Instantiating module "attr_filter.pre-proxy" from file
> /etc/freeradius/3.0/mods-enabled/attr_filter
> reading pairlist file /etc/freeradius/3.0/mods-config/attr_filter/pre-proxy
> # Instantiating module "attr_filter.access_reject" from file
> /etc/freeradius/3.0/mods-enabled/attr_filter
> reading pairlist file
> /etc/freeradius/3.0/mods-config/attr_filter/access_reject
> [/etc/freeradius/3.0/mods-config/attr_filter/access_reject]:11 Check item
> "FreeRADIUS-Response-Delay" found in filter list for realm "DEFAULT".
> [/etc/freeradius/3.0/mods-config/attr_filter/access_reject]:11 Check item
> "FreeRADIUS-Response-Delay-USec" found in filter list for realm
> "DEFAULT".
> # Instantiating module "attr_filter.access_challenge" from file
> /etc/freeradius/3.0/mods-enabled/attr_filter
> reading pairlist file
> /etc/freeradius/3.0/mods-config/attr_filter/access_challenge
> # Instantiating module "attr_filter.accounting_response" from file
> /etc/freeradius/3.0/mods-enabled/attr_filter
> reading pairlist file
> /etc/freeradius/3.0/mods-config/attr_filter/accounting_response
> # Instantiating module "logintime" from file
> /etc/freeradius/3.0/mods-enabled/logintime
> # Instantiating module "expiration" from file
> /etc/freeradius/3.0/mods-enabled/expiration
> # Instantiating module "reject" from file
> /etc/freeradius/3.0/mods-enabled/always
> # Instantiating module "fail" from file
> /etc/freeradius/3.0/mods-enabled/always
> # Instantiating module "ok" from file
> /etc/freeradius/3.0/mods-enabled/always
> # Instantiating module "handled" from file
> /etc/freeradius/3.0/mods-enabled/always
> # Instantiating module "invalid" from file
> /etc/freeradius/3.0/mods-enabled/always
> # Instantiating module "userlock" from file
> /etc/freeradius/3.0/mods-enabled/always
> # Instantiating module "notfound" from file
> /etc/freeradius/3.0/mods-enabled/always
> # Instantiating module "noop" from file
> /etc/freeradius/3.0/mods-enabled/always
> # Instantiating module "updated" from file
> /etc/freeradius/3.0/mods-enabled/always
> # Instantiating module "sql" from file
> /etc/freeradius/3.0/mods-enabled/sql
> rlm_sql_mysql: libmysql version: 5.7.27
> mysql {
> tls {
> }
> warnings = "auto"
> }
> rlm_sql (sql): Attempting to connect to database "radius"
> rlm_sql (sql): Initialising connection pool
> pool {
> start = 5
> min = 3
> max = 32
> spare = 10
> uses = 0
> lifetime = 0
> cleanup_interval = 30
> idle_timeout = 60
> retry_delay = 30
> spread = no
> }
> rlm_sql (sql): Opening additional connection (0), 1 of 32 pending slots
> used
> rlm_sql_mysql: Starting connect to MySQL server
> rlm_sql_mysql: Connected to database 'radius' on Localhost via UNIX
> socket, server version 5.5.5-10.4.8-MariaDB-1:10.4.8+maria~bionic-log,
> protocol version 10
> rlm_sql (sql): Opening additional connection (1), 1 of 31 pending slots
> used
> rlm_sql_mysql: Starting connect to MySQL server
> rlm_sql_mysql: Connected to database 'radius' on Localhost via UNIX
> socket, server version 5.5.5-10.4.8-MariaDB-1:10.4.8+maria~bionic-log,
> protocol version 10
> rlm_sql (sql): Opening additional connection (2), 1 of 30 pending slots
> used
> rlm_sql_mysql: Starting connect to MySQL server
> rlm_sql_mysql: Connected to database 'radius' on Localhost via UNIX
> socket, server version 5.5.5-10.4.8-MariaDB-1:10.4.8+maria~bionic-log,
> protocol version 10
> rlm_sql (sql): Opening additional connection (3), 1 of 29 pending slots
> used
> rlm_sql_mysql: Starting connect to MySQL server
> rlm_sql_mysql: Connected to database 'radius' on Localhost via UNIX
> socket, server version 5.5.5-10.4.8-MariaDB-1:10.4.8+maria~bionic-log,
> protocol version 10
> rlm_sql (sql): Opening additional connection (4), 1 of 28 pending slots
> used
> rlm_sql_mysql: Starting connect to MySQL server
> rlm_sql_mysql: Connected to database 'radius' on Localhost via UNIX
> socket, server version 5.5.5-10.4.8-MariaDB-1:10.4.8+maria~bionic-log,
> protocol version 10
> rlm_sql (sql): Processing generate_sql_clients
> rlm_sql (sql) in generate_sql_clients: query is SELECT id, nasname,
> shortname, type, secret, server FROM nas
> rlm_sql (sql): Reserved connection (0)
> rlm_sql (sql): Executing select query: SELECT id, nasname, shortname,
> type, secret, server FROM nas
> rlm_sql (sql): Adding client 10.10.10.16 (DC2016) to global clients list
> rlm_sql (10.10.10.16): Client "DC2016" (sql) added
> rlm_sql (sql): Adding client 10.10.10.240 (O2_1) to global clients list
> rlm_sql (10.10.10.240): Client "O2_1" (sql) added
> rlm_sql (sql): Adding client 10.10.10.242 (O2_2temp) to global clients list
> rlm_sql (10.10.10.242): Client "O2_2temp" (sql) added
> rlm_sql (sql): Released connection (0)
> Need 5 more connections to reach 10 spares
> rlm_sql (sql): Opening additional connection (5), 1 of 27 pending slots
> used
> rlm_sql_mysql: Starting connect to MySQL server
> rlm_sql_mysql: Connected to database 'radius' on Localhost via UNIX
> socket, server version 5.5.5-10.4.8-MariaDB-1:10.4.8+maria~bionic-log,
> protocol version 10
> # Instantiating module "auth_log" from file
> /etc/freeradius/3.0/mods-enabled/detail.log
> rlm_detail (auth_log): 'User-Password' suppressed, will not appear in
> detail output
> # Instantiating module "reply_log" from file
> /etc/freeradius/3.0/mods-enabled/detail.log
> # Instantiating module "pre_proxy_log" from file
> /etc/freeradius/3.0/mods-enabled/detail.log
> # Instantiating module "post_proxy_log" from file
> /etc/freeradius/3.0/mods-enabled/detail.log
> # Instantiating module "eap" from file
> /etc/freeradius/3.0/mods-enabled/eap
> # Linked to sub-module rlm_eap_md5
> # Linked to sub-module rlm_eap_leap
> # Linked to sub-module rlm_eap_gtc
> gtc {
> challenge = "Password: "
> auth_type = "PAP"
> }
> # Linked to sub-module rlm_eap_tls
> tls {
> tls = "tls-common"
> }
> tls-config tls-common {
> verify_depth = 0
> ca_path = "/etc/freeradius/3.0/certs"
> pem_file_type = yes
> private_key_file = "/etc/ssl/private/ssl-cert-snakeoil.key"
> certificate_file = "/etc/ssl/certs/ssl-cert-snakeoil.pem"
> ca_file = "/etc/ssl/certs/ca-certificates.crt"
> private_key_password = <<< secret >>>
> dh_file = "/etc/freeradius/3.0/certs/dh"
> fragment_size = 1024
> include_length = yes
> auto_chain = yes
> check_crl = no
> check_all_crl = no
> cipher_list = "DEFAULT"
> cipher_server_preference = no
> ecdh_curve = "prime256v1"
> tls_max_version = ""
> tls_min_version = "1.0"
> cache {
> enable = no
> lifetime = 24
> max_entries = 255
> }
> verify {
> skip_if_ocsp_ok = no
> }
> ocsp {
> enable = no
> override_cert_url = yes
> url = "http://127.0.0.1/ocsp/"
> use_nonce = yes
> timeout = 0
> softfail = no
> }
> }
> # Linked to sub-module rlm_eap_ttls
> ttls {
> tls = "tls-common"
> default_eap_type = "md5"
> copy_request_to_tunnel = no
> use_tunneled_reply = no
> virtual_server = "inner-tunnel"
> include_length = yes
> require_client_cert = no
> }
> tls: Using cached TLS configuration from previous invocation
> # Linked to sub-module rlm_eap_peap
> peap {
> tls = "tls-common"
> default_eap_type = "mschapv2"
> copy_request_to_tunnel = no
> use_tunneled_reply = no
> proxy_tunneled_request_as_eap = yes
> virtual_server = "inner-tunnel"
> soh = no
> require_client_cert = no
> }
> tls: Using cached TLS configuration from previous invocation
> # Linked to sub-module rlm_eap_mschapv2
> mschapv2 {
> with_ntdomain_hack = no
> send_error = no
> }
> # Instantiating module "cache_eap" from file
> /etc/freeradius/3.0/mods-enabled/cache_eap
> rlm_cache (cache_eap): Driver rlm_cache_rbtree (module rlm_cache_rbtree)
> loaded and linked
> # Instantiating module "files" from file
> /etc/freeradius/3.0/mods-enabled/files
> reading pairlist file /etc/freeradius/3.0/mods-config/files/authorize
> reading pairlist file /etc/freeradius/3.0/mods-config/files/accounting
> reading pairlist file /etc/freeradius/3.0/mods-config/files/pre-proxy
> # Instantiating module "linelog" from file
> /etc/freeradius/3.0/mods-enabled/linelog
> # Instantiating module "log_accounting" from file
> /etc/freeradius/3.0/mods-enabled/linelog
> # Instantiating module "pap" from file
> /etc/freeradius/3.0/mods-enabled/pap
> } # modules
> radiusd: #### Loading Virtual Servers ####
> server { # from file /etc/freeradius/3.0/radiusd.conf
> } # server
> server inner-tunnel { # from file
> /etc/freeradius/3.0/sites-enabled/inner-tunnel
> # Loading authenticate {...}
> # Loading authorize {...}
> Ignoring "ldap" (see raddb/mods-available/README.rst)
> # Loading session {...}
> # Loading post-proxy {...}
> # Loading post-auth {...}
> # Skipping contents of 'if' as it is always 'false' --
> /etc/freeradius/3.0/sites-enabled/inner-tunnel:331
> } # server inner-tunnel
> server default { # from file /etc/freeradius/3.0/sites-enabled/default
> # Loading authenticate {...}
> # Loading authorize {...}
> # Loading preacct {...}
> # Loading accounting {...}
> # Loading post-proxy {...}
> # Loading post-auth {...}
> } # server default
> radiusd: #### Opening IP addresses and Ports ####
> listen {
> type = "auth"
> ipaddr = 127.0.0.1
> port = 18120
> }
> listen {
> type = "auth"
> ipaddr = *
> port = 0
> limit {
> max_connections = 16
> lifetime = 0
> idle_timeout = 30
> }
> }
> listen {
> type = "acct"
> ipaddr = *
> port = 0
> limit {
> max_connections = 16
> lifetime = 0
> idle_timeout = 30
> }
> }
> listen {
> type = "auth"
> ipv6addr = ::
> port = 0
> limit {
> max_connections = 16
> lifetime = 0
> idle_timeout = 30
> }
> }
> listen {
> type = "acct"
> ipv6addr = ::
> port = 0
> limit {
> max_connections = 16
> lifetime = 0
> idle_timeout = 30
> }
> }
> Listening on auth address 127.0.0.1 port 18120 bound to server inner-tunnel
> Listening on auth address * port 1812 bound to server default
> Listening on acct address * port 1813 bound to server default
> Listening on auth address :: port 1812 bound to server default
> Listening on acct address :: port 1813 bound to server default
> Listening on proxy address * port 41074
> Listening on proxy address :: port 33089
> Ready to process requests
> (0) Received Access-Request Id 60 from 10.10.10.241:37488 to
> 10.10.10.75:1812 length 144
> (0) User-Name = "420724847289"
> (0) User-Password = "password"
> (0) NAS-Port-Type = Virtual
> (0) Calling-Station-Id = "420724847289"
> (0) Called-Station-Id = "cma.cma"
> (0) Service-Type = Framed-User
> (0) Framed-Protocol = GPRS-PDP-Context
> (0) Event-Timestamp = "Nov 14 2019 08:59:58 CET"
> (0) Acct-Multi-Session-Id = "914ed7d3"
> (0) Attr-224 = 0x32000201211441f9
> (0) Attr-26.2011.168 = 0x636d612e7676697373
> (0) NAS-IP-Address = 10.10.10.241
> (0) # Executing section authorize from file
> /etc/freeradius/3.0/sites-enabled/default
> (0) authorize {
> (0) policy filter_username {
> (0) if (&User-Name) {
> (0) if (&User-Name) -> TRUE
> (0) if (&User-Name) {
> (0) if (&User-Name =~ / /) {
> (0) if (&User-Name =~ / /) -> FALSE
> (0) if (&User-Name =~ /@[^@]*@/ ) {
> (0) if (&User-Name =~ /@[^@]*@/ ) -> FALSE
> (0) if (&User-Name =~ /\.\./ ) {
> (0) if (&User-Name =~ /\.\./ ) -> FALSE
> (0) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/)) {
> (0) if ((&User-Name =~ /@/) && (&User-Name !~ /@(.+)\.(.+)$/))
> -> FALSE
> (0) if (&User-Name =~ /\.$/) {
> (0) if (&User-Name =~ /\.$/) -> FALSE
> (0) if (&User-Name =~ /@\./) {
> (0) if (&User-Name =~ /@\./) -> FALSE
> (0) } # if (&User-Name) = notfound
> (0) } # policy filter_username = notfound
> (0) [preprocess] = ok
> (0) [chap] = noop
> (0) [mschap] = noop
> (0) [digest] = noop
> (0) suffix: Checking for suffix after "@"
> (0) suffix: No '@' in User-Name = "420724847289", looking up realm NULL
> (0) suffix: No such realm "NULL"
> (0) [suffix] = noop
> (0) eap: No EAP-Message, not doing EAP
> (0) [eap] = noop
> (0) [files] = noop
> (0) sql: EXPAND %{User-Name}
> (0) sql: --> 420724847289
> (0) sql: SQL-User-Name set to '420724847289'
> rlm_sql (sql): Reserved connection (1)
> (0) sql: EXPAND SELECT id, username, attribute, value, op FROM radcheck
> WHERE username = '%{SQL-User-Name}' ORDER BY id
> (0) sql: --> SELECT id, username, attribute, value, op FROM radcheck
> WHERE username = '420724847289' ORDER BY id
> (0) sql: Executing select query: SELECT id, username, attribute, value, op
> FROM radcheck WHERE username = '420724847289' ORDER BY id
> (0) sql: User found in radcheck table
> (0) sql: Conditional check items matched, merging assignment check items
> (0) sql: Cleartext-Password := "password"
> (0) sql: EXPAND SELECT id, username, attribute, value, op FROM radreply
> WHERE username = '%{SQL-User-Name}' ORDER BY id
> (0) sql: --> SELECT id, username, attribute, value, op FROM radreply
> WHERE username = '420724847289' ORDER BY id
> (0) sql: Executing select query: SELECT id, username, attribute, value, op
> FROM radreply WHERE username = '420724847289' ORDER BY id
> (0) sql: User found in radreply table, merging reply items
> (0) sql: Framed-IP-Address := 10.10.104.1
> (0) sql: Service-Type := Framed-User
> (0) sql: EXPAND SELECT groupname FROM radusergroup WHERE username =
> '%{SQL-User-Name}' ORDER BY priority
> (0) sql: --> SELECT groupname FROM radusergroup WHERE username =
> '420724847289' ORDER BY priority
> (0) sql: Executing select query: SELECT groupname FROM radusergroup WHERE
> username = '420724847289' ORDER BY priority
> (0) sql: User not found in any groups
> rlm_sql (sql): Released connection (1)
> Need 4 more connections to reach 10 spares
> rlm_sql (sql): Opening additional connection (6), 1 of 26 pending slots
> used
> rlm_sql_mysql: Starting connect to MySQL server
> rlm_sql_mysql: Connected to database 'radius' on Localhost via UNIX
> socket, server version 5.5.5-10.4.8-MariaDB-1:10.4.8+maria~bionic-log,
> protocol version 10
> (0) [sql] = ok
> (0) [expiration] = noop
> (0) [logintime] = noop
> (0) [pap] = updated
> (0) } # authorize = updated
> (0) Found Auth-Type = PAP
> (0) # Executing group from file /etc/freeradius/3.0/sites-enabled/default
> (0) Auth-Type PAP {
> (0) pap: Login attempt with password
> (0) pap: Comparing with "known good" Cleartext-Password
> (0) pap: User authenticated successfully
> (0) [pap] = ok
> (0) } # Auth-Type PAP = ok
> (0) # Executing section post-auth from file
> /etc/freeradius/3.0/sites-enabled/default
> (0) post-auth {
> (0) update {
> (0) No attributes updated
> (0) } # update = noop
> (0) sql: EXPAND .query
> (0) sql: --> .query
> (0) sql: Using query template 'query'
> rlm_sql (sql): Reserved connection (2)
> (0) sql: EXPAND %{User-Name}
> (0) sql: --> 420724847289
> (0) sql: SQL-User-Name set to '420724847289'
> (0) sql: EXPAND INSERT INTO radpostauth (username, pass, reply, authdate)
> VALUES ( '%{SQL-User-Name}', '%{%{User-Password}:-%{Chap-Password}}',
> '%{reply:Packet-Type}', '%S')
> (0) sql: --> INSERT INTO radpostauth (username, pass, reply, authdate)
> VALUES ( '420724847289', 'password', 'Access-Accept', '2019-11-14 08:59:58')
> (0) sql: Executing query: INSERT INTO radpostauth (username, pass, reply,
> authdate) VALUES ( '420724847289', 'password', 'Access-Accept', '2019-11-14
> 08:59:58')
> (0) sql: SQL query returned: success
> (0) sql: 1 record(s) updated
> rlm_sql (sql): Released connection (2)
> (0) [sql] = ok
> (0) [exec] = noop
> (0) policy remove_reply_message_if_eap {
> (0) if (&reply:EAP-Message && &reply:Reply-Message) {
> (0) if (&reply:EAP-Message && &reply:Reply-Message) -> FALSE
> (0) else {
> (0) [noop] = noop
> (0) } # else = noop
> (0) } # policy remove_reply_message_if_eap = noop
> (0) } # post-auth = ok
> (0) Sent Access-Accept Id 60 from 10.10.10.75:1812 to 10.10.10.241:37488
> length 0
> (0) Framed-IP-Address = 10.10.104.1
> (0) Service-Type = Framed-User
> (0) Finished request
> Waking up in 4.9 seconds.
>
> -
> List info/subscribe/unsubscribe? See
> http://www.freeradius.org/list/users.html
--
Regards,
Chris Knipe
More information about the Freeradius-Users
mailing list