safe_characters issue
Fabrice Durand
fdurand at inverse.ca
Wed Jun 17 17:11:57 CEST 2020
I am not sure it's the case, the only place i defined safe_characters is
in mods-enabled/sql
```
[root at localhost raddb]# grep safe_characters * -r
mods-available/dhcp_sqlippool: # To use sqlite you need to add '%' to
safe_characters in
mods-available/expr:# escape escape string similar to rlm_sql
safe_characters
mods-available/expr: safe_characters =
"@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_:
/äéöüàâæçèéêëîïôœùûüaÿÄÉÖÜßÀÂÆÇÈÉÊËÎÏÔŒÙÛÜŸ"
mods-config/sql/main/mysql/extras/wimax/queries.conf:#safe_characters =
"@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
mods-config/sql/main/mysql/queries.conf:#safe_characters =
"@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
mods-config/sql/main/mysql/reject.conf:#safe_characters =
"@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
mods-config/sql/main/postgresql/queries.conf:# safe_characters =
"@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
mods-config/sql/main/sqlite/queries.conf:#safe_characters =
"@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
mods-enabled/sql: safe_characters =
"@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /(),'"
```
I attached 2 debug outputs and the sql files used , the one with
safe_characters defined in the sql {...} section (who works) and the
other one with safe_characters defined in sql sql_degraded{...} (that
doesn't works)
For me it looks that even if you define safe_characters in another
section than the sql {...} one the code doesn't use it and use the one
from the sql {...} section instead.
I did exactly the same tests on the FreeRADIUS version 3.0.13 (i am
using another path for the configuration files than /etc/radiusd, so the
files didn't changed) and it takes the safe_characters defined in the
sql_degraded section.
Btw setting the safe_characters in sql{...} fixed my issue, but it looks
to be a regression.
Regards
Fabrice
Le 20-06-17 à 10 h 19, Alan DeKok a écrit :
> On Jun 17, 2020, at 9:55 AM, Fabrice Durand <fdurand at inverse.ca> wrote:
>> OK i found something, it looks if i set the safe_characters in the main sql definition it works.
> The configuration files are read in order, top to bottom. So if you put the safe_characters line before *any* $INCLUDE statements, then it will override the definitions in some later $INCLUDE.
>
> What's happening is that you have multiple definitions of safe_characters. You were editing the second or third one, but only the first one was relevant. By adding a definition before the others, you've made a new first definition, which is then used.
>
> Alan DeKok.
>
>
> -
> List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
--
Fabrice Durand
fdurand at inverse.ca :: +1.514.447.4918 (x135) :: www.inverse.ca
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu) and PacketFence (http://packetfence.org)
-------------- next part --------------
FreeRADIUS Version 3.0.21
Copyright (C) 1999-2019 The FreeRADIUS server project and contributors
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
PARTICULAR PURPOSE
You may redistribute copies of FreeRADIUS under the terms of the
GNU General Public License
For more information about these matters, see the file named COPYRIGHT
Starting - reading configuration files ...
including dictionary file /usr/share/freeradius/dictionary
including dictionary file /usr/share/freeradius/dictionary.dhcp
including dictionary file /usr/share/freeradius/dictionary.vqp
including dictionary file /usr/local/pf/raddb/dictionary
including configuration file /usr/local/pf/raddb/auth.conf
including configuration file /usr/local/pf/raddb/radiusd.conf
including configuration file /usr/local/pf/raddb/proxy.conf
including configuration file /usr/local/pf/raddb/proxy.conf.inc
including configuration file /usr/local/pf/raddb/clients.conf
including configuration file /usr/local/pf/raddb/clients.conf.inc
including configuration file /usr/local/pf/raddb/clients.eduroam.conf.inc
including files in directory /usr/local/pf/raddb/mods-enabled/
including configuration file /usr/local/pf/raddb/mods-enabled/logintime
including configuration file /usr/local/pf/raddb/mods-enabled/ntlm_auth
including configuration file /usr/local/pf/raddb/mods-enabled/pap
including configuration file /usr/local/pf/raddb/mods-enabled/passwd
including configuration file /usr/local/pf/raddb/mods-enabled/perl
including configuration file /usr/local/pf/raddb/mods-enabled/preprocess
including configuration file /usr/local/pf/raddb/mods-enabled/radutmp
including configuration file /usr/local/pf/raddb/mods-enabled/raw
including configuration file /usr/local/pf/raddb/mods-enabled/realm
including configuration file /usr/local/pf/raddb/mods-enabled/redis
including configuration file /usr/local/pf/raddb/mods-enabled/replicate
including configuration file /usr/local/pf/raddb/mods-enabled/soh
including configuration file /usr/local/pf/raddb/mods-enabled/sradutmp
including configuration file /usr/local/pf/raddb/mods-enabled/unix
including configuration file /usr/local/pf/raddb/mods-enabled/unpack
including configuration file /usr/local/pf/raddb/mods-enabled/utf8
including configuration file /usr/local/pf/raddb/mods-enabled/eap
including configuration file /usr/local/pf/raddb/mods-enabled/rest
including configuration file /usr/local/pf/raddb/mods-enabled/sql
including configuration file /usr/local/pf/raddb/mods-config/sql/main/mysql/queries.conf
including configuration file /usr/local/pf/raddb/mods-config/sql/main/mysql/reject.conf
including configuration file /usr/local/pf/raddb/mods-enabled/mschap
including configuration file /usr/local/pf/raddb/mods-enabled/go
including configuration file /usr/local/pf/raddb/mods-enabled/always
including configuration file /usr/local/pf/raddb/mods-enabled/attr_filter
including configuration file /usr/local/pf/raddb/mods-enabled/cache_eap
including configuration file /usr/local/pf/raddb/mods-enabled/cache_ntlm
including configuration file /usr/local/pf/raddb/mods-enabled/cache_password
including configuration file /usr/local/pf/raddb/mods-enabled/chap
including configuration file /usr/local/pf/raddb/mods-enabled/detail
including configuration file /usr/local/pf/raddb/mods-enabled/detail.log
including configuration file /usr/local/pf/raddb/mods-enabled/digest
including configuration file /usr/local/pf/raddb/mods-enabled/dynamic_clients
including configuration file /usr/local/pf/raddb/mods-enabled/echo
including configuration file /usr/local/pf/raddb/mods-enabled/exec
including configuration file /usr/local/pf/raddb/mods-enabled/expiration
including configuration file /usr/local/pf/raddb/mods-enabled/expr
including configuration file /usr/local/pf/raddb/mods-enabled/files
including configuration file /usr/local/pf/raddb/mods-enabled/linelog
including files in directory /usr/local/pf/raddb/policy.d/
including configuration file /usr/local/pf/raddb/policy.d/abfab-tr
including configuration file /usr/local/pf/raddb/policy.d/accounting
including configuration file /usr/local/pf/raddb/policy.d/canonicalization
including configuration file /usr/local/pf/raddb/policy.d/control
including configuration file /usr/local/pf/raddb/policy.d/cui
including configuration file /usr/local/pf/raddb/policy.d/debug
including configuration file /usr/local/pf/raddb/policy.d/dhcp
including configuration file /usr/local/pf/raddb/policy.d/eap
including configuration file /usr/local/pf/raddb/policy.d/filter
including configuration file /usr/local/pf/raddb/policy.d/operator-name
including configuration file /usr/local/pf/raddb/policy.d/packetfence.orig
including configuration file /usr/local/pf/raddb/policy.d/packetfence
including files in directory /usr/local/pf/raddb/sites-enabled/
including configuration file /usr/local/pf/raddb/sites-enabled/packetfence
including configuration file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
including configuration file /usr/local/pf/raddb/sites-enabled/packetfence-cli
including configuration file /usr/local/pf/raddb/sites-enabled/dynamic-clients
including configuration file /usr/local/pf/raddb/sites-enabled/status
including configuration file /usr/local/pf/raddb/sites-enabled/packetfence-cluster
main {
security {
user = "pf"
group = "pf"
allow_core_dumps = no
}
name = "radiusd"
prefix = "/usr"
localstatedir = "/usr/local/pf/var"
logdir = "/usr/local/pf/logs"
run_dir = "/usr/local/pf/var/run"
}
main {
name = "radiusd"
prefix = "/usr"
localstatedir = "/usr/local/pf/var"
sbindir = "/usr/sbin"
logdir = "/usr/local/pf/logs"
run_dir = "/usr/local/pf/var/run"
libdir = "/usr/lib64/freeradius:/usr/lib/freeradius"
radacctdir = "/usr/local/pf/logs/radacct"
hostname_lookups = no
max_request_time = 10
cleanup_delay = 5
max_requests = 20000
pidfile = "/usr/local/pf/var/run/radiusd.pid"
checkrad = "/usr/sbin/checkrad"
debug_level = 0
proxy_requests = yes
log {
stripped_names = no
auth = yes
auth_badpass = no
auth_goodpass = no
colourise = yes
msg_denied = "You are already logged in - access denied"
}
resources {
}
security {
max_attributes = 200
reject_delay = 1.000000
status_server = yes
allow_vulnerable_openssl = "yes"
}
}
auth: #### Loading Realms and Home Servers ####
proxy server {
retry_delay = 5
retry_count = 3
default_fallback = no
dead_time = 120
wake_all_if_all_dead = no
}
home_server localhost {
ipaddr = 127.0.0.1
port = 1812
type = "auth"
secret = <<< secret >>>
response_window = 20.000000
response_timeouts = 1
max_outstanding = 65536
zombie_period = 40
status_check = "status-server"
ping_interval = 30
check_interval = 30
check_timeout = 4
num_answers_to_alive = 3
revive_interval = 120
limit {
max_connections = 16
max_requests = 0
lifetime = 0
idle_timeout = 0
}
coa {
irt = 2
mrt = 16
mrc = 5
mrd = 30
}
}
Ignoring "response_window = 20.000000", forcing to "response_window = 10.000000"
home_server pf.remote {
ipaddr = 172.20.135.10
port = 1812
type = "auth+acct"
secret = <<< secret >>>
src_ipaddr = "172.20.135.4"
response_window = 6.000000
response_timeouts = 1
max_outstanding = 65536
zombie_period = 40
status_check = "status-server"
ping_interval = 30
check_interval = 30
check_timeout = 4
num_answers_to_alive = 3
revive_interval = 120
limit {
max_connections = 16
max_requests = 0
lifetime = 0
idle_timeout = 0
}
coa {
irt = 2
mrt = 16
mrc = 5
mrd = 30
}
}
home_server degraded {
virtual_server = "pf.degraded"
port = 0
response_window = 30.000000
response_timeouts = 1
max_outstanding = 65536
zombie_period = 40
status_check = "none"
ping_interval = 30
check_timeout = 4
num_answers_to_alive = 3
revive_interval = 300
limit {
max_connections = 16
max_requests = 0
lifetime = 0
idle_timeout = 0
}
coa {
irt = 2
mrt = 16
mrc = 5
mrd = 30
}
}
Ignoring "response_window = 30.000000", forcing to "response_window = 10.000000"
home_server pf0.cluster {
ipaddr = 172.20.135.4
port = 1812
type = "auth+acct"
secret = <<< secret >>>
src_ipaddr = "172.20.135.5"
response_window = 6.000000
response_timeouts = 1
max_outstanding = 65536
zombie_period = 40
status_check = "status-server"
ping_interval = 30
check_interval = 30
check_timeout = 4
num_answers_to_alive = 3
revive_interval = 120
limit {
max_connections = 16
max_requests = 0
lifetime = 0
idle_timeout = 0
}
coa {
irt = 2
mrt = 16
mrc = 5
mrd = 30
}
}
home_server pf0.cli.cluster {
ipaddr = 172.20.135.4
port = 1815
type = "auth"
secret = <<< secret >>>
src_ipaddr = "172.20.135.5"
response_window = 6.000000
response_timeouts = 1
max_outstanding = 65536
zombie_period = 40
status_check = "status-server"
ping_interval = 30
check_interval = 30
check_timeout = 4
num_answers_to_alive = 3
revive_interval = 120
limit {
max_connections = 16
max_requests = 0
lifetime = 0
idle_timeout = 0
}
coa {
irt = 2
mrt = 16
mrc = 5
mrd = 30
}
}
home_server_pool my_auth_failover {
type = fail-over
home_server = localhost
}
realm example.com {
auth_pool = my_auth_failover
}
realm default {
}
realm local {
}
realm null {
}
realm bob {
}
realm bibi {
}
realm inverse.inc {
}
realm eduroam.default {
}
realm eduroam.local {
}
realm eduroam.null {
}
realm eduroam.bob {
}
realm eduroam.bibi {
}
realm eduroam.inverse.inc {
}
home_server_pool pf_auth_pool {
type = fail-over
home_server = pf.remote
home_server = degraded
}
home_server_pool pf_acct_pool {
type = fail-over
home_server = pf.remote
}
realm remote {
auth_pool = pf_auth_pool
acct_pool = pf_acct_pool
}
home_server_pool pf_pool.cluster {
type = keyed-balance
home_server = pf0.cluster
}
home_server_pool pfacct_pool.cluster {
type = load-balance
home_server = pf0.cluster
}
realm packetfence {
auth_pool = pf_pool.cluster
acct_pool = pfacct_pool.cluster
}
home_server_pool pfcli_pool.cluster {
type = keyed-balance
home_server = pf0.cli.cluster
}
realm packetfence-cli {
auth_pool = pfcli_pool.cluster
}
auth: #### Loading Clients ####
client localhost {
ipaddr = 127.0.0.1
require_message_authenticator = no
secret = <<< secret >>>
nas_type = "other"
proto = "*"
limit {
max_connections = 16
lifetime = 0
idle_timeout = 30
}
}
client localhost_ipv6 {
ipv6addr = ::1
require_message_authenticator = no
secret = <<< secret >>>
limit {
max_connections = 16
lifetime = 0
idle_timeout = 30
}
}
client 172.20.135.4 {
ipaddr = 172.20.135.4
require_message_authenticator = no
secret = <<< secret >>>
shortname = "pf"
limit {
max_connections = 16
lifetime = 0
idle_timeout = 30
}
}
client 172.20.135.5 {
ipaddr = 172.20.135.5
require_message_authenticator = no
secret = <<< secret >>>
shortname = "pf"
limit {
max_connections = 16
lifetime = 0
idle_timeout = 30
}
}
client 172.20.135.11 {
ipaddr = 172.20.135.11
require_message_authenticator = no
secret = <<< secret >>>
shortname = "pf"
limit {
max_connections = 16
lifetime = 0
idle_timeout = 30
}
}
client 172.20.135.12 {
ipaddr = 172.20.135.12
require_message_authenticator = no
secret = <<< secret >>>
shortname = "pf"
limit {
max_connections = 16
lifetime = 0
idle_timeout = 30
}
}
client 172.20.135.13 {
ipaddr = 172.20.135.13
require_message_authenticator = no
secret = <<< secret >>>
shortname = "pf"
limit {
max_connections = 16
lifetime = 0
idle_timeout = 30
}
}
client dynamic {
ipaddr = 0.0.0.0/0
require_message_authenticator = no
limit {
max_connections = 16
lifetime = 0
idle_timeout = 30
}
dynamic_clients = "dynamic_clients"
lifetime = 300
}
Debugger not attached
systemd watchdog is disabled
# Creating Auth-Type = eap
# Creating Auth-Type = PAP
# Creating Auth-Type = CHAP
# Creating Auth-Type = MS-CHAP
# Creating Auth-Type = eap-degraded
# Creating Autz-Type = Status-Server
auth: #### Instantiating modules ####
modules {
# Loaded module rlm_logintime
# Loading module "logintime" from file /usr/local/pf/raddb/mods-enabled/logintime
logintime {
minimum_timeout = 60
}
# Loaded module rlm_exec
# Loading module "ntlm_auth" from file /usr/local/pf/raddb/mods-enabled/ntlm_auth
exec ntlm_auth {
wait = yes
program = "/path/to/ntlm_auth --request-nt-key --domain=MYDOMAIN --username=%{mschap:User-Name} --password=%{User-Password}"
shell_escape = yes
}
# Loaded module rlm_pap
# Loading module "pap" from file /usr/local/pf/raddb/mods-enabled/pap
pap {
normalise = yes
}
# Loaded module rlm_passwd
# Loading module "etc_passwd" from file /usr/local/pf/raddb/mods-enabled/passwd
passwd etc_passwd {
filename = "/etc/passwd"
format = "*User-Name:Crypt-Password:"
delimiter = ":"
ignore_nislike = no
ignore_empty = yes
allow_multiple_keys = no
hash_size = 100
}
# Loaded module rlm_perl
# Loading module "perl" from file /usr/local/pf/raddb/mods-enabled/perl
perl {
filename = "/usr/local/pf/raddb/mods-config/perl/example.pl"
func_authorize = "authorize"
func_authenticate = "authenticate"
func_post_auth = "post_auth"
func_accounting = "accounting"
func_preacct = "preacct"
func_checksimul = "checksimul"
func_detach = "detach"
func_xlat = "xlat"
func_pre_proxy = "pre_proxy"
func_post_proxy = "post_proxy"
func_recv_coa = "recv_coa"
func_send_coa = "send_coa"
}
# Loading module "packetfence" from file /usr/local/pf/raddb/mods-enabled/perl
perl packetfence {
filename = "/usr/local/pf/raddb/mods-config/perl/packetfence.pm"
func_authorize = "authorize"
func_authenticate = "authenticate"
func_post_auth = "post_auth"
func_accounting = "accounting"
func_preacct = "preacct"
func_checksimul = "checksimul"
func_detach = "detach"
func_xlat = "xlat"
func_pre_proxy = "pre_proxy"
func_post_proxy = "post_proxy"
func_recv_coa = "recv_coa"
func_send_coa = "send_coa"
}
# Loading module "packetfence-multi-domain" from file /usr/local/pf/raddb/mods-enabled/perl
perl packetfence-multi-domain {
filename = "/usr/local/pf/raddb/mods-config/perl/packetfence-multi-domain.pm"
func_authorize = "authorize"
func_authenticate = "authenticate"
func_post_auth = "post_auth"
func_accounting = "accounting"
func_preacct = "preacct"
func_checksimul = "checksimul"
func_detach = "detach"
func_xlat = "xlat"
func_pre_proxy = "pre_proxy"
func_post_proxy = "post_proxy"
func_recv_coa = "recv_coa"
func_send_coa = "send_coa"
}
# Loading module "reply_in_db" from file /usr/local/pf/raddb/mods-enabled/perl
perl reply_in_db {
filename = "/usr/local/pf/raddb/mods-config/perl/reply_in_db.pm"
func_authorize = "authorize"
func_authenticate = "authenticate"
func_post_auth = "post_auth"
func_accounting = "accounting"
func_preacct = "preacct"
func_checksimul = "checksimul"
func_detach = "detach"
func_xlat = "xlat"
func_pre_proxy = "pre_proxy"
func_post_proxy = "post_proxy"
func_recv_coa = "recv_coa"
func_send_coa = "send_coa"
}
# Loaded module rlm_preprocess
# Loading module "preprocess" from file /usr/local/pf/raddb/mods-enabled/preprocess
preprocess {
huntgroups = "/usr/local/pf/raddb/mods-config/preprocess/huntgroups"
hints = "/usr/local/pf/raddb/mods-config/preprocess/hints"
with_ascend_hack = no
ascend_channels_per_line = 23
with_ntdomain_hack = no
with_specialix_jetstream_hack = no
with_cisco_vsa_hack = no
with_alvarion_vsa_hack = no
}
# Loaded module rlm_radutmp
# Loading module "radutmp" from file /usr/local/pf/raddb/mods-enabled/radutmp
radutmp {
filename = "/usr/local/pf/logs/radutmp"
username = "%{User-Name}"
case_sensitive = yes
check_with_nas = yes
permissions = 384
caller_id = yes
}
# Loaded module rlm_raw
# Loading module "raw" from file /usr/local/pf/raddb/mods-enabled/raw
raw {
name = "raw"
}
# Loaded module rlm_realm
# Loading module "IPASS" from file /usr/local/pf/raddb/mods-enabled/realm
realm IPASS {
format = "prefix"
delimiter = "/"
ignore_default = no
ignore_null = no
}
# Loading module "suffix" from file /usr/local/pf/raddb/mods-enabled/realm
realm suffix {
format = "suffix"
delimiter = "@"
ignore_default = no
ignore_null = yes
}
# Loading module "realmpercent" from file /usr/local/pf/raddb/mods-enabled/realm
realm realmpercent {
format = "suffix"
delimiter = "%"
ignore_default = no
ignore_null = no
}
# Loading module "ntdomain" from file /usr/local/pf/raddb/mods-enabled/realm
realm ntdomain {
format = "prefix"
delimiter = "\\"
ignore_default = no
ignore_null = no
}
# Loaded module rlm_redis
# Loading module "redis" from file /usr/local/pf/raddb/mods-enabled/redis
redis {
server = "127.0.0.1"
port = 6379
database = 0
query_timeout = 5
}
rlm_redis: libhiredis version: 0.12.1
# Loading module "redis_ntlm" from file /usr/local/pf/raddb/mods-enabled/redis
redis redis_ntlm {
server = "127.0.0.1"
port = 6383
database = 0
query_timeout = 5
}
rlm_redis: libhiredis version: 0.12.1
# Loaded module rlm_replicate
# Loading module "replicate" from file /usr/local/pf/raddb/mods-enabled/replicate
# Loaded module rlm_soh
# Loading module "soh" from file /usr/local/pf/raddb/mods-enabled/soh
soh {
dhcp = yes
}
# Loading module "sradutmp" from file /usr/local/pf/raddb/mods-enabled/sradutmp
radutmp sradutmp {
filename = "/usr/local/pf/logs/sradutmp"
username = "%{User-Name}"
case_sensitive = yes
check_with_nas = yes
permissions = 420
caller_id = no
}
# Loaded module rlm_unix
# Loading module "unix" from file /usr/local/pf/raddb/mods-enabled/unix
unix {
radwtmp = "/usr/local/pf/logs/radwtmp"
}
Creating attribute Unix-Group
# Loaded module rlm_unpack
# Loading module "unpack" from file /usr/local/pf/raddb/mods-enabled/unpack
# Loaded module rlm_utf8
# Loading module "utf8" from file /usr/local/pf/raddb/mods-enabled/utf8
# Loaded module rlm_eap
# Loading module "eap" from file /usr/local/pf/raddb/mods-enabled/eap
eap {
default_eap_type = "peap"
timer_expire = 60
ignore_unknown_eap_types = no
cisco_accounting_username_bug = no
max_sessions = 20000
}
# Loading module "eap-degraded" from file /usr/local/pf/raddb/mods-enabled/eap
eap eap-degraded {
default_eap_type = "peap"
timer_expire = 60
ignore_unknown_eap_types = no
cisco_accounting_username_bug = no
max_sessions = 20000
}
# Loaded module rlm_rest
# Loading module "rest" from file /usr/local/pf/raddb/mods-enabled/rest
rest {
connect_uri = "http://127.0.0.1:7070/"
connect_timeout = 4.000000
}
# Loading module "rest-cli" from file /usr/local/pf/raddb/mods-enabled/rest
rest rest-cli {
connect_uri = "http://127.0.0.1:7070/"
connect_timeout = 4.000000
}
# Loaded module rlm_sql
# Loading module "sql" from file /usr/local/pf/raddb/mods-enabled/sql
sql {
driver = "rlm_sql_mysql"
server = "127.0.0.1"
port = 3306
login = "pf"
password = <<< secret >>>
radius_db = "pf"
read_groups = yes
read_profiles = yes
read_clients = yes
delete_stale_sessions = yes
sql_user_name = "%{User-Name}"
default_user_profile = ""
client_query = "SELECT id, nasname, shortname, type, secret, server, tenant_id FROM radius_nas where 1=0"
authorize_check_query = "SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id"
authorize_reply_query = "SELECT id, username, attribute, value, op FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id"
authorize_group_check_query = "SELECT id, groupname, attribute, Value, op FROM radgroupcheck WHERE groupname = '%{SQL-Group}' ORDER BY id"
authorize_group_reply_query = "SELECT id, groupname, attribute, value, op FROM radgroupreply WHERE groupname = '%{SQL-Group}' ORDER BY id"
group_membership_query = "SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority"
simul_verify_query = "SELECT radacctid, acctsessionid, username, nasipaddress, nasportid, framedipaddress, callingstationid, framedprotocol FROM radacct WHERE username = '%{SQL-User-Name}' AND acctstoptime IS NULL"
safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /(),'"
auto_escape = no
accounting {
reference = "%{tolower:type.%{Acct-Status-Type}.query}"
type {
accounting-on {
query = "UPDATE radacct SET acctstoptime = FROM_UNIXTIME(%{integer:Event-Timestamp}), acctsessiontime = '%{integer:Event-Timestamp}' - UNIX_TIMESTAMP(acctstarttime), acctterminatecause = '%{%{Acct-Terminate-Cause}:-NAS-Reboot}' WHERE acctstoptime IS NULL AND nasipaddress = '%{NAS-IP-Address}' AND acctstarttime <= FROM_UNIXTIME(%{integer:Event-Timestamp})"
}
accounting-off {
query = "UPDATE radacct SET acctstoptime = FROM_UNIXTIME(%{integer:Event-Timestamp}), acctsessiontime = '%{integer:Event-Timestamp}' - UNIX_TIMESTAMP(acctstarttime), acctterminatecause = '%{%{Acct-Terminate-Cause}:-NAS-Reboot}' WHERE acctstoptime IS NULL AND nasipaddress = '%{NAS-IP-Address}' AND acctstarttime <= FROM_UNIXTIME(%{integer:Event-Timestamp})"
}
start {
query = "CALL acct_start ( '%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}', '%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{%{NAS-Port-ID}:-%{NAS-Port}}', '%{NAS-Port-Type}', FROM_UNIXTIME(%{integer:Event-Timestamp}), FROM_UNIXTIME(%{integer:Event-Timestamp}), NULL, '0', '%{Acct-Authentic}', '%{Connect-Info}', '', '0', '0', '%{Called-Station-Id}', '%{Calling-Station-Id}', '', '%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}', '%{Acct-Status-Type}','%{NAS-Identifier}', '%{Called-Station-SSID}', '%{control:PacketFence-Tenant-Id}')"
}
interim-update {
query = "CALL acct_update ( FROM_UNIXTIME(%{integer:Event-Timestamp}), '%{Framed-IP-Address}', '%{%{Acct-Session-Time}:-0}', '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}', '%{Acct-Unique-Session-Id}', '%{Acct-Session-Id}', '%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{%{NAS-Port-ID}:-%{NAS-Port}}', '%{NAS-Port-Type}', '%{Acct-Authentic}', '%{Connect-Info}', '%{Called-Station-Id}', '%{Calling-Station-Id}', '%{Service-Type}', '%{Framed-Protocol}', '%{Acct-Status-Type}','%{NAS-Identifier}', '%{Called-Station-SSID}', '%{control:PacketFence-Tenant-Id}')"
}
stop {
query = "CALL acct_stop ( FROM_UNIXTIME(%{integer:Event-Timestamp}), '%{Framed-IP-Address}', '%{%{Acct-Session-Time}:-0}', '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}', '%{Acct-Unique-Session-Id}', '%{Acct-Session-Id}', '%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{%{NAS-Port-ID}:-%{NAS-Port}}', '%{NAS-Port-Type}', '%{Acct-Authentic}', '%{Connect-Info}', '%{Called-Station-Id}', '%{Calling-Station-Id}', '%{Service-Type}', '%{Framed-Protocol}', '%{Acct-Terminate-Cause}', '%{Acct-Status-Type}', '%{NAS-Identifier}', '%{Called-Station-SSID}', '%{control:PacketFence-Tenant-Id}')"
}
}
}
post-auth {
reference = "type.accept.query"
}
}
rlm_sql (sql): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute SQL-Group
# Loading module "pfguest" from file /usr/local/pf/raddb/mods-enabled/sql
sql pfguest {
driver = "rlm_sql_mysql"
server = "127.0.0.1"
port = 3306
login = "pf"
password = <<< secret >>>
radius_db = "pf"
read_groups = yes
read_profiles = yes
read_clients = no
delete_stale_sessions = yes
sql_user_name = "%{User-Name}"
default_user_profile = ""
client_query = "SELECT id,nasname,shortname,type,secret FROM nas"
authorize_check_query = "SELECT 1, pid, ( CASE WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' ELSE 'Cleartext-Password' END ) AS passwordhash, REPLACE(password,'{ntlm}',''), ":=" FROM password JOIN activation using (pid) WHERE pid = '%{SQL-User-Name}' AND (SELECT type from activation WHERE pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = "guest" AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00 00:00:00' ) AND password.tenant_id = '%{control:PacketFence-Tenant-Id}' LIMIT 1"
group_membership_query = "select 1"
safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
auto_escape = no
accounting {
reference = ".query"
type {
accounting-on {
}
accounting-off {
}
start {
}
interim-update {
}
stop {
}
}
}
post-auth {
reference = ".query"
}
}
rlm_sql (pfguest): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute pfguest-SQL-Group
# Loading module "pfsponsor" from file /usr/local/pf/raddb/mods-enabled/sql
sql pfsponsor {
driver = "rlm_sql_mysql"
server = "127.0.0.1"
port = 3306
login = "pf"
password = <<< secret >>>
radius_db = "pf"
read_groups = yes
read_profiles = yes
read_clients = no
delete_stale_sessions = yes
sql_user_name = "%{User-Name}"
default_user_profile = ""
client_query = "SELECT id,nasname,shortname,type,secret FROM nas"
authorize_check_query = "SELECT 1, pid, ( CASE WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' ELSE 'Cleartext-Password' END ) AS passwordhash, REPLACE(password,'{ntlm}',''), ":=" FROM password JOIN activation using (pid) WHERE pid = '%{SQL-User-Name}' AND (SELECT type from activation WHERE pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = "sponsor" AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00 00:00:00' ) AND password.tenant_id = '%{control:PacketFence-Tenant-Id}' LIMIT 1"
group_membership_query = "select 1"
safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
auto_escape = no
accounting {
reference = ".query"
type {
accounting-on {
}
accounting-off {
}
start {
}
interim-update {
}
stop {
}
}
}
post-auth {
reference = ".query"
}
}
rlm_sql (pfsponsor): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute pfsponsor-SQL-Group
# Loading module "pfsms" from file /usr/local/pf/raddb/mods-enabled/sql
sql pfsms {
driver = "rlm_sql_mysql"
server = "127.0.0.1"
port = 3306
login = "pf"
password = <<< secret >>>
radius_db = "pf"
read_groups = yes
read_profiles = yes
read_clients = no
delete_stale_sessions = yes
sql_user_name = "%{User-Name}"
default_user_profile = ""
client_query = "SELECT id,nasname,shortname,type,secret FROM nas"
authorize_check_query = "SELECT 1, pid, ( CASE WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' ELSE 'Cleartext-Password' END ) AS passwordhash, REPLACE(password,'{ntlm}',''), ":=" FROM password JOIN activation using (pid) WHERE pid = '%{SQL-User-Name}' AND (SELECT type from activation WHERE pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = "sms" AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00 00:00:00' ) AND password.tenant_id = '%{control:PacketFence-Tenant-Id}' LIMIT 1"
group_membership_query = "select 1"
safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
auto_escape = no
accounting {
reference = ".query"
type {
accounting-on {
}
accounting-off {
}
start {
}
interim-update {
}
stop {
}
}
}
post-auth {
reference = ".query"
}
}
rlm_sql (pfsms): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute pfsms-SQL-Group
# Loading module "pflocal" from file /usr/local/pf/raddb/mods-enabled/sql
sql pflocal {
driver = "rlm_sql_mysql"
server = "127.0.0.1"
port = 3306
login = "pf"
password = <<< secret >>>
radius_db = "pf"
read_groups = yes
read_profiles = yes
read_clients = no
delete_stale_sessions = yes
sql_user_name = "%{User-Name}"
default_user_profile = ""
client_query = "SELECT id,nasname,shortname,type,secret FROM nas"
authorize_check_query = "SELECT 1, pid, ( CASE WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' ELSE 'Cleartext-Password' END ) AS passwordhash, REPLACE(password,'{ntlm}',''), ":=" FROM password WHERE pid = '%{SQL-User-Name}' AND password.tenant_id = '%{control:PacketFence-Tenant-Id}' AND NOT EXISTS (SELECT pid FROM activation WHERE pid = '%{SQL-User-Name}')"
group_membership_query = "select 1"
safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
auto_escape = no
accounting {
reference = ".query"
type {
accounting-on {
}
accounting-off {
}
start {
}
interim-update {
}
stop {
}
}
}
post-auth {
reference = ".query"
}
}
rlm_sql (pflocal): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute pflocal-SQL-Group
# Loading module "sql_reject" from file /usr/local/pf/raddb/mods-enabled/sql
sql sql_reject {
driver = "rlm_sql_mysql"
server = "127.0.0.1"
port = 3306
login = "pf"
password = <<< secret >>>
radius_db = "pf"
read_groups = yes
read_profiles = yes
read_clients = no
delete_stale_sessions = yes
sql_user_name = "%{User-Name}"
default_user_profile = ""
client_query = "SELECT id,nasname,shortname,type,secret FROM nas"
authorize_check_query = ""
authorize_reply_query = "SELECT id, username, attribute, value, op FROM radreply WHERE username = '%{Calling-Station-Id}' ORDER BY id"
group_membership_query = ""
safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
auto_escape = no
accounting {
reference = ".query"
type {
accounting-on {
}
accounting-off {
}
start {
}
interim-update {
}
stop {
}
}
}
post-auth {
reference = "type.reject.query"
}
}
rlm_sql (sql_reject): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute sql_reject-SQL-Group
# Loading module "sql_degraded" from file /usr/local/pf/raddb/mods-enabled/sql
sql sql_degraded {
driver = "rlm_sql_mysql"
server = "127.0.0.1"
port = 3306
login = "pf"
password = <<< secret >>>
radius_db = "pf"
read_groups = yes
read_profiles = yes
read_clients = no
delete_stale_sessions = yes
sql_user_name = "%{User-Name}"
default_user_profile = ""
client_query = "SELECT id,nasname,shortname,type,secret FROM nas"
group_membership_query = ""
safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
auto_escape = no
accounting {
reference = ".query"
type {
accounting-on {
}
accounting-off {
}
start {
}
interim-update {
}
stop {
}
}
}
post-auth {
reference = ".query"
}
}
rlm_sql (sql_degraded): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute sql_degraded-SQL-Group
# Loaded module rlm_mschap
# Loading module "mschap" from file /usr/local/pf/raddb/mods-enabled/mschap
mschap {
use_mppe = yes
require_encryption = yes
require_strong = yes
with_ntdomain_hack = yes
ntlm_auth = "/usr/local/pf/bin/ntlm_auth_wrapper -p 8125 -- --request-nt-key --username=%{%{control:AD-Samaccountname}:-%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}}} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00}"
ntlm_auth_timeout = 3
passchange {
}
allow_retry = no
winbind_retry_with_normalised_username = no
}
# Loading module "chrooted_mschap" from file /usr/local/pf/raddb/mods-enabled/mschap
mschap chrooted_mschap {
use_mppe = no
require_encryption = yes
require_strong = yes
with_ntdomain_hack = yes
ntlm_auth = "/usr/bin/sudo /usr/sbin/chroot /chroots/%{PacketFence-Domain} /usr/local/pf/bin/ntlm_auth_wrapper -p 8125 -- --request-nt-key --username=%{%{control:AD-Samaccountname}:-%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}}} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00} %{PacketFence-NTLMv2-Only}"
ntlm_auth_timeout = 3
passchange {
}
allow_retry = no
winbind_retry_with_normalised_username = no
}
# Loading module "chrooted_mschap_machine" from file /usr/local/pf/raddb/mods-enabled/mschap
mschap chrooted_mschap_machine {
use_mppe = yes
require_encryption = yes
require_strong = yes
with_ntdomain_hack = yes
ntlm_auth = "/usr/bin/sudo /usr/sbin/chroot /chroots/%{PacketFence-Domain} /usr/local/pf/bin/ntlm_auth_wrapper -p 8125 -- --request-nt-key --username=%{mschap:User-Name:-None} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00} %{PacketFence-NTLMv2-Only}"
ntlm_auth_timeout = 3
passchange {
}
allow_retry = no
winbind_retry_with_normalised_username = no
}
# Loading module "mschap_machine" from file /usr/local/pf/raddb/mods-enabled/mschap
mschap mschap_machine {
use_mppe = yes
require_encryption = yes
require_strong = yes
with_ntdomain_hack = yes
ntlm_auth = "/usr/local/pf/bin/ntlm_auth_wrapper -p 8125 -- --request-nt-key --username=%{mschap:User-Name:-None} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00} %{PacketFence-NTLMv2-Only}"
ntlm_auth_timeout = 3
passchange {
}
allow_retry = no
winbind_retry_with_normalised_username = no
}
# Loading module "mschap_local" from file /usr/local/pf/raddb/mods-enabled/mschap
mschap mschap_local {
use_mppe = no
require_encryption = yes
require_strong = yes
with_ntdomain_hack = yes
passchange {
}
allow_retry = yes
winbind_retry_with_normalised_username = no
}
# Loaded module rlm_always
# Loading module "reject" from file /usr/local/pf/raddb/mods-enabled/always
always reject {
rcode = "reject"
simulcount = 0
mpp = no
}
# Loading module "fail" from file /usr/local/pf/raddb/mods-enabled/always
always fail {
rcode = "fail"
simulcount = 0
mpp = no
}
# Loading module "ok" from file /usr/local/pf/raddb/mods-enabled/always
always ok {
rcode = "ok"
simulcount = 0
mpp = no
}
# Loading module "handled" from file /usr/local/pf/raddb/mods-enabled/always
always handled {
rcode = "handled"
simulcount = 0
mpp = no
}
# Loading module "invalid" from file /usr/local/pf/raddb/mods-enabled/always
always invalid {
rcode = "invalid"
simulcount = 0
mpp = no
}
# Loading module "userlock" from file /usr/local/pf/raddb/mods-enabled/always
always userlock {
rcode = "userlock"
simulcount = 0
mpp = no
}
# Loading module "notfound" from file /usr/local/pf/raddb/mods-enabled/always
always notfound {
rcode = "notfound"
simulcount = 0
mpp = no
}
# Loading module "noop" from file /usr/local/pf/raddb/mods-enabled/always
always noop {
rcode = "noop"
simulcount = 0
mpp = no
}
# Loading module "updated" from file /usr/local/pf/raddb/mods-enabled/always
always updated {
rcode = "updated"
simulcount = 0
mpp = no
}
# Loaded module rlm_attr_filter
# Loading module "attr_filter.post-proxy" from file /usr/local/pf/raddb/mods-enabled/attr_filter
attr_filter attr_filter.post-proxy {
filename = "/usr/local/pf/raddb/mods-config/attr_filter/post-proxy"
key = "%{Realm}"
relaxed = no
}
# Loading module "attr_filter.pre-proxy" from file /usr/local/pf/raddb/mods-enabled/attr_filter
attr_filter attr_filter.pre-proxy {
filename = "/usr/local/pf/raddb/mods-config/attr_filter/pre-proxy"
key = "%{Realm}"
relaxed = no
}
# Loading module "attr_filter.access_reject" from file /usr/local/pf/raddb/mods-enabled/attr_filter
attr_filter attr_filter.access_reject {
filename = "/usr/local/pf/raddb/mods-config/attr_filter/access_reject"
key = "%{User-Name}"
relaxed = no
}
# Loading module "attr_filter.access_challenge" from file /usr/local/pf/raddb/mods-enabled/attr_filter
attr_filter attr_filter.access_challenge {
filename = "/usr/local/pf/raddb/mods-config/attr_filter/access_challenge"
key = "%{User-Name}"
relaxed = no
}
# Loading module "attr_filter.accounting_response" from file /usr/local/pf/raddb/mods-enabled/attr_filter
attr_filter attr_filter.accounting_response {
filename = "/usr/local/pf/raddb/mods-config/attr_filter/accounting_response"
key = "%{User-Name}"
relaxed = no
}
# Loading module "attr_filter.packetfence_post_auth" from file /usr/local/pf/raddb/mods-enabled/attr_filter
attr_filter attr_filter.packetfence_post_auth {
filename = "/usr/local/pf/raddb/mods-config/attr_filter/packetfence-post-auth"
key = "%{User-Name}"
relaxed = yes
}
# Loading module "attr_filter.packetfence_pre_proxy" from file /usr/local/pf/raddb/mods-enabled/attr_filter
attr_filter attr_filter.packetfence_pre_proxy {
filename = "/usr/local/pf/raddb/mods-config/attr_filter/packetfence-pre-proxy"
key = "%{User-Name}"
relaxed = yes
}
# Loaded module rlm_cache
# Loading module "cache_eap" from file /usr/local/pf/raddb/mods-enabled/cache_eap
cache cache_eap {
driver = "rlm_cache_rbtree"
key = "%{%{control:State}:-%{%{reply:State}:-%{State}}}"
ttl = 15
max_entries = 0
epoch = 0
add_stats = no
}
# Loading module "cache_ntlm" from file /usr/local/pf/raddb/mods-enabled/cache_ntlm
cache cache_ntlm {
driver = "rlm_cache_rbtree"
key = "%{User-Name}%{Calling-Station-Id}"
ttl = 300
max_entries = 0
epoch = 0
add_stats = no
}
# Loading module "cache_password" from file /usr/local/pf/raddb/mods-enabled/cache_password
cache cache_password {
driver = "rlm_cache_rbtree"
key = "%{User-Name}"
ttl = 3600
max_entries = 0
epoch = 0
add_stats = no
}
# Loading module "userprincipalname" from file /usr/local/pf/raddb/mods-enabled/cache_password
cache userprincipalname {
driver = "rlm_cache_rbtree"
key = "%{User-Name}"
ttl = 3600
max_entries = 0
epoch = 0
add_stats = no
}
# Loading module "PacketFence-NTCacheHash" from file /usr/local/pf/raddb/mods-enabled/cache_password
cache PacketFence-NTCacheHash {
driver = "rlm_cache_rbtree"
key = "%{User-Name}"
ttl = 10
max_entries = 0
epoch = 0
add_stats = no
}
# Loaded module rlm_chap
# Loading module "chap" from file /usr/local/pf/raddb/mods-enabled/chap
# Loaded module rlm_detail
# Loading module "detail" from file /usr/local/pf/raddb/mods-enabled/detail
detail {
filename = "/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d"
header = "%t"
permissions = 384
locking = no
escape_filenames = no
log_packet_header = no
}
# Loading module "auth_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
detail auth_log {
filename = "/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d"
header = "%t"
permissions = 384
locking = no
escape_filenames = no
log_packet_header = no
}
# Loading module "reply_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
detail reply_log {
filename = "/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d"
header = "%t"
permissions = 384
locking = no
escape_filenames = no
log_packet_header = no
}
# Loading module "pre_proxy_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
detail pre_proxy_log {
filename = "/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d"
header = "%t"
permissions = 384
locking = no
escape_filenames = no
log_packet_header = no
}
# Loading module "post_proxy_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
detail post_proxy_log {
filename = "/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d"
header = "%t"
permissions = 384
locking = no
escape_filenames = no
log_packet_header = no
}
# Loaded module rlm_digest
# Loading module "digest" from file /usr/local/pf/raddb/mods-enabled/digest
# Loaded module rlm_dynamic_clients
# Loading module "dynamic_clients" from file /usr/local/pf/raddb/mods-enabled/dynamic_clients
# Loading module "echo" from file /usr/local/pf/raddb/mods-enabled/echo
exec echo {
wait = yes
program = "/bin/echo %{User-Name}"
input_pairs = "request"
output_pairs = "reply"
shell_escape = yes
}
# Loading module "exec" from file /usr/local/pf/raddb/mods-enabled/exec
exec {
wait = no
input_pairs = "request"
shell_escape = yes
timeout = 10
}
# Loaded module rlm_expiration
# Loading module "expiration" from file /usr/local/pf/raddb/mods-enabled/expiration
# Loaded module rlm_expr
# Loading module "expr" from file /usr/local/pf/raddb/mods-enabled/expr
expr {
safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /äéöüàâæçèéêëîïôœùûüaÿÄÉÖÜßÀÂÆÇÈÉÊËÎÏÔŒÙÛÜŸ"
}
# Loaded module rlm_files
# Loading module "files" from file /usr/local/pf/raddb/mods-enabled/files
files {
filename = "/usr/local/pf/raddb/mods-config/files/authorize"
acctusersfile = "/usr/local/pf/raddb/mods-config/files/accounting"
preproxy_usersfile = "/usr/local/pf/raddb/mods-config/files/pre-proxy"
}
# Loaded module rlm_linelog
# Loading module "linelog" from file /usr/local/pf/raddb/mods-enabled/linelog
linelog {
filename = "syslog"
escape_filenames = no
syslog_facility = "local1"
syslog_severity = "info"
permissions = 384
format = "This is a log message for %{User-Name}"
reference = "messages.%{%{reply:Packet-Type}:-default}"
}
# Loading module "log_accounting" from file /usr/local/pf/raddb/mods-enabled/linelog
linelog log_accounting {
filename = "syslog"
escape_filenames = no
syslog_facility = "local2"
syslog_severity = "info"
permissions = 384
format = ""
reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}"
}
instantiate {
# Instantiating module "redis" from file /usr/local/pf/raddb/mods-enabled/redis
rlm_redis (redis): Initialising connection pool
pool {
start = 0
min = 3
max = 64
spare = 10
uses = 0
lifetime = 86400
cleanup_interval = 300
idle_timeout = 600
retry_delay = 30
spread = no
}
# Instantiating module "rest" from file /usr/local/pf/raddb/mods-enabled/rest
authorize {
uri = "http://127.0.0.1:7070//radius/rest/filter"
method = "post"
body = "json"
auth = "none"
require_auth = no
timeout = 4.000000
chunk = 0
tls {
check_cert = yes
check_cert_cn = yes
}
}
authenticate {
uri = "http://127.0.0.1:7070//radius/rest/filter"
method = "post"
body = "json"
auth = "none"
require_auth = no
timeout = 4.000000
chunk = 0
tls {
check_cert = yes
check_cert_cn = yes
}
}
preacct {
uri = "http://127.0.0.1:7070//radius/rest/filter"
method = "post"
body = "json"
auth = "none"
require_auth = no
timeout = 4.000000
chunk = 0
tls {
check_cert = yes
check_cert_cn = yes
}
}
accounting {
uri = "http://127.0.0.1:7070//radius/rest/accounting"
method = "post"
body = "json"
auth = "none"
require_auth = no
timeout = 4.000000
chunk = 0
tls {
check_cert = yes
check_cert_cn = yes
}
}
pre-proxy {
uri = "http://127.0.0.1:7070//radius/rest/filter"
method = "post"
body = "json"
auth = "none"
require_auth = no
timeout = 4.000000
chunk = 0
tls {
check_cert = yes
check_cert_cn = yes
}
}
post-proxy {
uri = "http://127.0.0.1:7070//radius/rest/filter"
method = "post"
body = "json"
auth = "none"
require_auth = no
timeout = 4.000000
chunk = 0
tls {
check_cert = yes
check_cert_cn = yes
}
}
post-auth {
uri = "http://127.0.0.1:7070//radius/rest/authorize"
method = "post"
body = "json"
auth = "none"
require_auth = no
timeout = 4.000000
chunk = 0
tls {
check_cert = yes
check_cert_cn = yes
}
}
rlm_rest: libcurl version: libcurl/7.29.0 NSS/3.44 zlib/1.2.7 libidn/1.28 libssh2/1.8.0
rlm_rest (rest): Initialising connection pool
pool {
start = 0
min = 3
max = 64
spare = 10
uses = 0
lifetime = 0
cleanup_interval = 30
idle_timeout = 60
retry_delay = 30
spread = no
}
# Instantiating module "raw" from file /usr/local/pf/raddb/mods-enabled/raw
}
# Instantiating module "logintime" from file /usr/local/pf/raddb/mods-enabled/logintime
# Instantiating module "pap" from file /usr/local/pf/raddb/mods-enabled/pap
# Instantiating module "etc_passwd" from file /usr/local/pf/raddb/mods-enabled/passwd
rlm_passwd: nfields: 3 keyfield 0(User-Name) listable: no
# Instantiating module "perl" from file /usr/local/pf/raddb/mods-enabled/perl
# Instantiating module "packetfence" from file /usr/local/pf/raddb/mods-enabled/perl
# Instantiating module "packetfence-multi-domain" from file /usr/local/pf/raddb/mods-enabled/perl
# Instantiating module "reply_in_db" from file /usr/local/pf/raddb/mods-enabled/perl
# Instantiating module "preprocess" from file /usr/local/pf/raddb/mods-enabled/preprocess
reading pairlist file /usr/local/pf/raddb/mods-config/preprocess/huntgroups
reading pairlist file /usr/local/pf/raddb/mods-config/preprocess/hints
# Instantiating module "IPASS" from file /usr/local/pf/raddb/mods-enabled/realm
# Instantiating module "suffix" from file /usr/local/pf/raddb/mods-enabled/realm
# Instantiating module "realmpercent" from file /usr/local/pf/raddb/mods-enabled/realm
# Instantiating module "ntdomain" from file /usr/local/pf/raddb/mods-enabled/realm
# Instantiating module "redis_ntlm" from file /usr/local/pf/raddb/mods-enabled/redis
rlm_redis (redis_ntlm): Initialising connection pool
pool {
start = 0
min = 3
max = 64
spare = 10
uses = 0
lifetime = 86400
cleanup_interval = 300
idle_timeout = 600
retry_delay = 30
spread = no
}
# Instantiating module "eap" from file /usr/local/pf/raddb/mods-enabled/eap
# Linked to sub-module rlm_eap_md5
# Linked to sub-module rlm_eap_mschapv2
mschapv2 {
with_ntdomain_hack = no
send_error = no
}
# Linked to sub-module rlm_eap_peap
peap {
tls = "tls-common"
default_eap_type = "mschapv2"
copy_request_to_tunnel = yes
use_tunneled_reply = yes
proxy_tunneled_request_as_eap = yes
virtual_server = "packetfence-degraded-tunnel"
soh = no
require_client_cert = no
}
tls-config tls-common {
verify_depth = 0
pem_file_type = yes
private_key_file = "/usr/local/pf/conf/certmanager/radius_default_tls-common.key"
certificate_file = "/usr/local/pf/conf/certmanager/radius_default_tls-common.crt"
ca_file = "/usr/local/pf/conf/certmanager/radius_default_tls-common.pem"
dh_file = "/usr/local/pf/raddb/certs/dh"
fragment_size = 1024
include_length = yes
auto_chain = yes
check_crl = no
check_all_crl = no
cipher_list = "DEFAULT"
ecdh_curve = "prime256v1"
tls_max_version = ""
tls_min_version = "1.0"
cache {
enable = no
lifetime = 24
max_entries = 255
}
verify {
skip_if_ocsp_ok = no
}
ocsp {
enable = no
override_cert_url = yes
url = "http://127.0.0.1:22225/api/v1/pki/ocsp"
use_nonce = yes
timeout = 0
softfail = no
}
}
The configuration allows TLS 1.0 and/or TLS 1.1. We STRONGLY recommned using only TLS 1.2 for security
Please set: tls_min_version = "1.2"
# Linked to sub-module rlm_eap_tls
tls {
tls = "tls-common"
}
tls: Using cached TLS configuration from previous invocation
# Linked to sub-module rlm_eap_ttls
ttls {
tls = "tls-common"
default_eap_type = "md5"
copy_request_to_tunnel = yes
use_tunneled_reply = yes
virtual_server = "packetfence-tunnel"
include_length = yes
require_client_cert = no
}
tls: Using cached TLS configuration from previous invocation
# Instantiating module "eap-degraded" from file /usr/local/pf/raddb/mods-enabled/eap
# Linked to sub-module rlm_eap_md5
# Linked to sub-module rlm_eap_mschapv2
mschapv2 {
with_ntdomain_hack = no
send_error = no
}
# Linked to sub-module rlm_eap_peap
peap {
tls = "tls-common"
default_eap_type = "mschapv2"
copy_request_to_tunnel = yes
use_tunneled_reply = yes
proxy_tunneled_request_as_eap = yes
virtual_server = "packetfence-tunnel"
soh = no
require_client_cert = no
}
tls-config tls-common {
verify_depth = 0
pem_file_type = yes
private_key_file = "/usr/local/pf/conf/certmanager/radius_default_tls-common.key"
certificate_file = "/usr/local/pf/conf/certmanager/radius_default_tls-common.crt"
ca_file = "/usr/local/pf/conf/certmanager/radius_default_tls-common.pem"
dh_file = "/usr/local/pf/raddb/certs/dh"
fragment_size = 1024
include_length = yes
auto_chain = yes
check_crl = no
check_all_crl = no
cipher_list = "DEFAULT"
ecdh_curve = "prime256v1"
tls_max_version = ""
tls_min_version = "1.0"
cache {
enable = no
lifetime = 24
max_entries = 255
}
verify {
skip_if_ocsp_ok = no
}
ocsp {
enable = no
override_cert_url = yes
url = "http://127.0.0.1:22225/api/v1/pki/ocsp"
use_nonce = yes
timeout = 0
softfail = no
}
}
The configuration allows TLS 1.0 and/or TLS 1.1. We STRONGLY recommned using only TLS 1.2 for security
Please set: tls_min_version = "1.2"
# Linked to sub-module rlm_eap_tls
tls {
tls = "tls-common"
}
tls: Using cached TLS configuration from previous invocation
# Linked to sub-module rlm_eap_ttls
ttls {
tls = "tls-common"
default_eap_type = "md5"
copy_request_to_tunnel = yes
use_tunneled_reply = yes
virtual_server = "packetfence-degraded-tunnel"
include_length = yes
require_client_cert = no
}
tls: Using cached TLS configuration from previous invocation
# Instantiating module "rest-cli" from file /usr/local/pf/raddb/mods-enabled/rest
authorize {
uri = "http://127.0.0.1:7070//radius/rest/switch/authorize"
method = "post"
body = "json"
auth = "none"
require_auth = no
timeout = 4.000000
chunk = 0
tls {
check_cert = yes
check_cert_cn = yes
}
}
authenticate {
uri = ""
method = "GET"
body = "none"
auth = "none"
require_auth = no
timeout = 4.000000
chunk = 0
tls {
check_cert = yes
check_cert_cn = yes
}
}
accounting {
uri = ""
method = "GET"
body = "none"
auth = "none"
require_auth = no
timeout = 4.000000
chunk = 0
tls {
check_cert = yes
check_cert_cn = yes
}
}
post-auth {
uri = ""
method = "GET"
body = "none"
auth = "none"
require_auth = no
timeout = 4.000000
chunk = 0
tls {
check_cert = yes
check_cert_cn = yes
}
}
rlm_rest (rest-cli): Initialising connection pool
pool {
start = 0
min = 3
max = 64
spare = 10
uses = 0
lifetime = 0
cleanup_interval = 30
idle_timeout = 60
retry_delay = 30
spread = no
}
# Instantiating module "sql" from file /usr/local/pf/raddb/mods-enabled/sql
rlm_sql_mysql: libmysql version: 10.1.21-MariaDB
mysql {
tls {
tls_required = no
}
warnings = "auto"
}
rlm_sql (sql): Attempting to connect to database "pf"
rlm_sql (sql): Initialising connection pool
pool {
start = 0
min = 3
max = 64
spare = 10
uses = 0
lifetime = 0
cleanup_interval = 30
idle_timeout = 60
retry_delay = 30
spread = no
}
rlm_sql (sql): Processing generate_sql_clients
rlm_sql (sql) in generate_sql_clients: query is SELECT id, nasname, shortname, type, secret, server, tenant_id FROM radius_nas where 1=0
rlm_sql (sql): 0 of 0 connections in use. You may need to increase "spare"
rlm_sql (sql): Opening additional connection (0), 1 of 64 pending slots used
rlm_sql_mysql: Starting connect to MySQL server
rlm_sql_mysql: Connected to database 'pf' on 127.0.0.1 via TCP/IP, server version 10.1.21-MariaDB, protocol version 10
rlm_sql (sql): Reserved connection (0)
rlm_sql (sql): Executing select query: SELECT id, nasname, shortname, type, secret, server, tenant_id FROM radius_nas where 1=0
rlm_sql (sql): Released connection (0)
Need 2 more connections to reach min connections (3)
rlm_sql (sql): Opening additional connection (1), 1 of 63 pending slots used
rlm_sql_mysql: Starting connect to MySQL server
rlm_sql_mysql: Connected to database 'pf' on 127.0.0.1 via TCP/IP, server version 10.1.21-MariaDB, protocol version 10
# Instantiating module "pfguest" from file /usr/local/pf/raddb/mods-enabled/sql
mysql {
tls {
tls_required = no
}
warnings = "auto"
}
rlm_sql (pfguest): Attempting to connect to database "pf"
# Instantiating module "pfsponsor" from file /usr/local/pf/raddb/mods-enabled/sql
mysql {
tls {
tls_required = no
}
warnings = "auto"
}
rlm_sql (pfsponsor): Attempting to connect to database "pf"
# Instantiating module "pfsms" from file /usr/local/pf/raddb/mods-enabled/sql
mysql {
tls {
tls_required = no
}
warnings = "auto"
}
rlm_sql (pfsms): Attempting to connect to database "pf"
# Instantiating module "pflocal" from file /usr/local/pf/raddb/mods-enabled/sql
mysql {
tls {
tls_required = no
}
warnings = "auto"
}
rlm_sql (pflocal): Attempting to connect to database "pf"
# Instantiating module "sql_reject" from file /usr/local/pf/raddb/mods-enabled/sql
rlm_sql (sql_reject): groupmemb_query is empty. Please delete it from the configuration
rlm_sql (sql_reject): authorize_check_query is empty. Please delete it from the configuration
mysql {
tls {
tls_required = no
}
warnings = "auto"
}
rlm_sql (sql_reject): Attempting to connect to database "pf"
# Instantiating module "sql_degraded" from file /usr/local/pf/raddb/mods-enabled/sql
rlm_sql (sql_degraded): groupmemb_query is empty. Please delete it from the configuration
mysql {
tls {
tls_required = no
}
warnings = "auto"
}
rlm_sql (sql_degraded): Attempting to connect to database "pf"
# Instantiating module "mschap" from file /usr/local/pf/raddb/mods-enabled/mschap
rlm_mschap (mschap): authenticating by calling 'ntlm_auth'
# Instantiating module "chrooted_mschap" from file /usr/local/pf/raddb/mods-enabled/mschap
rlm_mschap (chrooted_mschap): authenticating by calling 'ntlm_auth'
# Instantiating module "chrooted_mschap_machine" from file /usr/local/pf/raddb/mods-enabled/mschap
rlm_mschap (chrooted_mschap_machine): authenticating by calling 'ntlm_auth'
# Instantiating module "mschap_machine" from file /usr/local/pf/raddb/mods-enabled/mschap
rlm_mschap (mschap_machine): authenticating by calling 'ntlm_auth'
# Instantiating module "mschap_local" from file /usr/local/pf/raddb/mods-enabled/mschap
rlm_mschap (mschap_local): using internal authentication
# Instantiating module "reject" from file /usr/local/pf/raddb/mods-enabled/always
# Instantiating module "fail" from file /usr/local/pf/raddb/mods-enabled/always
# Instantiating module "ok" from file /usr/local/pf/raddb/mods-enabled/always
# Instantiating module "handled" from file /usr/local/pf/raddb/mods-enabled/always
# Instantiating module "invalid" from file /usr/local/pf/raddb/mods-enabled/always
# Instantiating module "userlock" from file /usr/local/pf/raddb/mods-enabled/always
# Instantiating module "notfound" from file /usr/local/pf/raddb/mods-enabled/always
# Instantiating module "noop" from file /usr/local/pf/raddb/mods-enabled/always
# Instantiating module "updated" from file /usr/local/pf/raddb/mods-enabled/always
# Instantiating module "attr_filter.post-proxy" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/post-proxy
# Instantiating module "attr_filter.pre-proxy" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/pre-proxy
# Instantiating module "attr_filter.access_reject" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/access_reject
[/usr/local/pf/raddb/mods-config/attr_filter/access_reject]:11 Check item "FreeRADIUS-Response-Delay" found in filter list for realm "DEFAULT".
[/usr/local/pf/raddb/mods-config/attr_filter/access_reject]:11 Check item "FreeRADIUS-Response-Delay-USec" found in filter list for realm "DEFAULT".
# Instantiating module "attr_filter.access_challenge" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/access_challenge
# Instantiating module "attr_filter.accounting_response" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/accounting_response
# Instantiating module "attr_filter.packetfence_post_auth" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/packetfence-post-auth
# Instantiating module "attr_filter.packetfence_pre_proxy" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/packetfence-pre-proxy
# Instantiating module "cache_eap" from file /usr/local/pf/raddb/mods-enabled/cache_eap
rlm_cache (cache_eap): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked
# Instantiating module "cache_ntlm" from file /usr/local/pf/raddb/mods-enabled/cache_ntlm
rlm_cache (cache_ntlm): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked
# Instantiating module "cache_password" from file /usr/local/pf/raddb/mods-enabled/cache_password
rlm_cache (cache_password): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked
# Instantiating module "userprincipalname" from file /usr/local/pf/raddb/mods-enabled/cache_password
rlm_cache (userprincipalname): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked
# Instantiating module "PacketFence-NTCacheHash" from file /usr/local/pf/raddb/mods-enabled/cache_password
rlm_cache (PacketFence-NTCacheHash): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked
# Instantiating module "detail" from file /usr/local/pf/raddb/mods-enabled/detail
# Instantiating module "auth_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
rlm_detail (auth_log): 'User-Password' suppressed, will not appear in detail output
# Instantiating module "reply_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
# Instantiating module "pre_proxy_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
# Instantiating module "post_proxy_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
# Instantiating module "expiration" from file /usr/local/pf/raddb/mods-enabled/expiration
# Instantiating module "files" from file /usr/local/pf/raddb/mods-enabled/files
reading pairlist file /usr/local/pf/raddb/mods-config/files/authorize
reading pairlist file /usr/local/pf/raddb/mods-config/files/accounting
reading pairlist file /usr/local/pf/raddb/mods-config/files/pre-proxy
# Instantiating module "linelog" from file /usr/local/pf/raddb/mods-enabled/linelog
# Instantiating module "log_accounting" from file /usr/local/pf/raddb/mods-enabled/linelog
} # modules
auth: #### Loading Virtual Servers ####
server { # from file /usr/local/pf/raddb/auth.conf
} # server
server packetfence { # from file /usr/local/pf/raddb/sites-enabled/packetfence
# Loading authenticate {...}
# Loading authorize {...}
# Loading preacct {...}
# Loading accounting {...}
# Loading pre-proxy {...}
# Loading post-proxy {...}
# Loading post-auth {...}
} # server packetfence
server pf-remote { # from file /usr/local/pf/raddb/sites-enabled/packetfence
# Loading authorize {...}
# Loading accounting {...}
# Loading post-proxy {...}
} # server pf-remote
server pf.degraded { # from file /usr/local/pf/raddb/sites-enabled/packetfence
# Loading authenticate {...}
# Loading authorize {...}
# Loading preacct {...}
# Loading accounting {...}
# Loading post-proxy {...}
# Loading post-auth {...}
} # server pf.degraded
server packetfence-degraded-tunnel { # from file /usr/local/pf/raddb/sites-enabled/packetfence
# Loading authenticate {...}
# Loading authorize {...}
# Loading session {...}
# Loading post-proxy {...}
# Loading post-auth {...}
} # server packetfence-degraded-tunnel
server packetfence-tunnel { # from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
# Loading authenticate {...}
# Loading authorize {...}
# Loading session {...}
# Loading post-proxy {...}
# Loading post-auth {...}
} # server packetfence-tunnel
server packetfence-tunnel-fast { # from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
# Loading authenticate {...}
# Loading authorize {...}
# Loading session {...}
# Loading post-proxy {...}
# Loading post-auth {...}
} # server packetfence-tunnel-fast
server packetfence-cli { # from file /usr/local/pf/raddb/sites-enabled/packetfence-cli
# Loading authenticate {...}
# Loading authorize {...}
# Loading accounting {...}
# Loading post-proxy {...}
# Loading post-auth {...}
} # server packetfence-cli
server dynamic_clients { # from file /usr/local/pf/raddb/sites-enabled/dynamic-clients
# Loading authorize {...}
} # server dynamic_clients
server status { # from file /usr/local/pf/raddb/sites-enabled/status
# Loading authorize {...}
} # server status
server pf.cluster { # from file /usr/local/pf/raddb/sites-enabled/packetfence-cluster
# Loading authorize {...}
# Loading accounting {...}
# Loading post-proxy {...}
} # server pf.cluster
server pfcli.cluster { # from file /usr/local/pf/raddb/sites-enabled/packetfence-cluster
# Loading authorize {...}
# Loading post-proxy {...}
} # server pfcli.cluster
thread pool {
start_servers = 0
max_servers = 64
min_spare_servers = 3
max_spare_servers = 10
max_requests_per_server = 0
cleanup_delay = 5
max_queue_size = 65536
auto_limit_acct = no
}
Thread pool initialized
auth: #### Opening IP addresses and Ports ####
listen {
type = "status"
virtual_server = "status"
ipaddr = 127.0.0.1
port = 18121
client admin {
ipaddr = 127.0.0.1
require_message_authenticator = no
secret = <<< secret >>>
limit {
max_connections = 16
lifetime = 0
idle_timeout = 30
}
}
}
listen {
type = "auth"
virtual_server = "pf-remote"
ipaddr = 172.20.135.4
port = 0
}
listen {
type = "auth+acct"
virtual_server = "packetfence"
ipaddr = 172.20.135.4
port = 2083
proto = "tcp"
tls {
verify_depth = 0
ca_path = "/usr/local/pf/raddb/certs"
pem_file_type = yes
private_key_file = "/usr/local/pf/raddb/certs/server.key"
certificate_file = "/usr/local/pf/raddb/certs/server.crt"
ca_file = "/usr/local/pf/raddb/certs/ca.pem"
dh_file = "/usr/local/pf/raddb/certs/dh"
fragment_size = 8192
include_length = yes
auto_chain = yes
check_crl = no
check_all_crl = no
cipher_list = "DEFAULT"
require_client_cert = yes
ecdh_curve = "prime256v1"
tls_max_version = ""
tls_min_version = "1.0"
cache {
enable = no
lifetime = 24
max_entries = 255
}
verify {
skip_if_ocsp_ok = no
}
ocsp {
enable = no
override_cert_url = no
use_nonce = yes
timeout = 0
softfail = no
}
}
The configuration allows TLS 1.0 and/or TLS 1.1. We STRONGLY recommned using only TLS 1.2 for security
Please set: tls_min_version = "1.2"
limit {
max_connections = 16
lifetime = 0
idle_timeout = 30
}
}
listen {
type = "control"
listen {
socket = "/usr/local/pf/var/run/radiusd.sock"
mode = "rw"
peercred = yes
}
}
Listening on status address 127.0.0.1 port 18121 bound to server status
Listening on auth address 172.20.135.4 port 1812 bound to server pf-remote
Listening on auth+acct proto tcp address 172.20.135.4 port 2083 (TLS) bound to server packetfence
Listening on command file /usr/local/pf/var/run/radiusd.sock
Listening on proxy address * port 33071
Ready to process requests
Threads: Spawning 3 spares
Thread spawned new child 1. Total threads in pool: 1
Thread spawned new child 2. Total threads in pool: 2
Thread spawned new child 3. Total threads in pool: 3
Thread 1 waiting to be assigned a request
Waking up in 0.3 seconds.
Thread 1 got semaphore
Thread 2 waiting to be assigned a request
Thread 3 waiting to be assigned a request
Thread 1 handling request 0, (1 handled so far)
(0) Received Access-Request Id 169 from 172.20.135.5:58688 to 172.20.135.4:1812 length 243
(0) User-Name = "64-76-ba-89-71-4c"
(0) User-Password = "64-76-ba-89-71-4c"
(0) NAS-IP-Address = 172.20.110.250
(0) NAS-Port = 0
(0) Service-Type = Call-Check
(0) Called-Station-Id = "00:1a:1e:01:68:f8"
(0) Calling-Station-Id = "64:76:ba:89:71:4c"
(0) NAS-Port-Type = Wireless-802.11
(0) Aruba-Essid-Name = "CPS-District"
(0) Aruba-Location-Id = "MS-A181"
(0) Aruba-AP-Group = "MS"
(0) PacketFence-KeyBalanced = "2cab901e9652f08e98b274d193485eb3"
(0) Message-Authenticator = 0x7e530e25ff2a29433fb983dbe71b3e57
(0) Proxy-State = 0x313830
(0) # Executing section authorize from file /usr/local/pf/raddb/sites-enabled/packetfence
(0) authorize {
(0) update control {
(0) EXPAND %{Calling-Station-Id}
(0) --> 64:76:ba:89:71:4c
(0) Load-Balance-Key := 64:76:ba:89:71:4c
(0) Proxy-To-Realm := "remote"
(0) } # update control = noop
(0) if (!NAS-IP-Address){
(0) if (!NAS-IP-Address) -> FALSE
(0) } # authorize = noop
(0) Starting proxy to home server 172.20.135.10 port 1812
(0) server pf-remote {
(0) }
(0) Proxying request to home server 172.20.135.10 port 1812 timeout 6.000000
(0) Sent Access-Request Id 190 from 172.20.135.4:38624 to 172.20.135.10:1812 length 248
(0) User-Name = "64-76-ba-89-71-4c"
(0) User-Password = "64-76-ba-89-71-4c"
(0) NAS-IP-Address = 172.20.110.250
(0) NAS-Port = 0
(0) Service-Type = Call-Check
(0) Called-Station-Id = "00:1a:1e:01:68:f8"
(0) Calling-Station-Id = "64:76:ba:89:71:4c"
(0) NAS-Port-Type = Wireless-802.11
(0) Aruba-Essid-Name = "CPS-District"
(0) Aruba-Location-Id = "MS-A181"
(0) Aruba-AP-Group = "MS"
(0) PacketFence-KeyBalanced = "2cab901e9652f08e98b274d193485eb3"
(0) Message-Authenticator = 0x7e530e25ff2a29433fb983dbe71b3e57
(0) Proxy-State = 0x313830
(0) Proxy-State = 0x313639
Thread 1 waiting to be assigned a request
Listening on proxy address 172.20.135.4 port 38624
Waking up in 0.3 seconds.
(0) Marking home server 172.20.135.10 port 1812 alive
Threads: total/active/spare threads = 3/0/3
Waking up in 0.3 seconds.
Thread 2 got semaphore
Thread 2 handling request 0, (1 handled so far)
(0) Clearing existing &reply: attributes
(0) Received Access-Accept Id 190 from 172.20.135.10:1812 to 172.20.135.4:38624 length 47
(0) Tunnel-Type:0 = VLAN
(0) Tunnel-Private-Group-Id:0 = "135"
(0) Tunnel-Medium-Type:0 = IEEE-802
(0) Proxy-State = 0x313830
(0) Proxy-State = 0x313639
(0) server pf-remote {
(0) # Executing section post-proxy from file /usr/local/pf/raddb/sites-enabled/packetfence
(0) post-proxy {
(0) update control {
(0) EXPAND %{home_server:ipaddr}
(0) --> 172.20.135.10
(0) PacketFence-Proxied-To := 172.20.135.10
(0) } # update control = noop
(0) if (&proxy-reply:Packet-Type == Access-Accept) {
(0) EXPAND &proxy-reply:Packet-Type
(0) --> Access-Accept
(0) if (&proxy-reply:Packet-Type == Access-Accept) -> TRUE
(0) if (&proxy-reply:Packet-Type == Access-Accept) {
rlm_sql (sql): Reserved connection (0)
rlm_sql (sql): Released connection (0)
Need 1 more connections to reach min connections (3)
rlm_sql (sql): Opening additional connection (2), 1 of 62 pending slots used
rlm_sql_mysql: Starting connect to MySQL server
rlm_sql_mysql: Connected to database 'pf' on 127.0.0.1 via TCP/IP, server version 10.1.21-MariaDB, protocol version 10
(0) EXPAND %{User-Name}
(0) --> 64-76-ba-89-71-4c
(0) SQL-User-Name set to '64-76-ba-89-71-4c'
rlm_sql (sql): Reserved connection (1)
(0) Executing query: DELETE FROM radreply where username="64:76:ba:89:71:4c"
(0) SQL query affected no rows
rlm_sql (sql): Released connection (1)
(0) EXPAND %{sql_degraded:DELETE FROM radreply where username="%{Calling-Station-Id}"}
(0) -->
(0) reply_in_db: $RAD_REQUEST{'User-Name'} = &request:User-Name -> '64-76-ba-89-71-4c'
(0) reply_in_db: $RAD_REQUEST{'User-Password'} = &request:User-Password -> '64-76-ba-89-71-4c'
(0) reply_in_db: $RAD_REQUEST{'NAS-IP-Address'} = &request:NAS-IP-Address -> '172.20.110.250'
(0) reply_in_db: $RAD_REQUEST{'NAS-Port'} = &request:NAS-Port -> '0'
(0) reply_in_db: $RAD_REQUEST{'Service-Type'} = &request:Service-Type -> 'Call-Check'
(0) reply_in_db: $RAD_REQUEST{'Called-Station-Id'} = &request:Called-Station-Id -> '00:1a:1e:01:68:f8'
(0) reply_in_db: $RAD_REQUEST{'Calling-Station-Id'} = &request:Calling-Station-Id -> '64:76:ba:89:71:4c'
(0) reply_in_db: $RAD_REQUEST{'Proxy-State'} = &request:Proxy-State -> '0x313830'
(0) reply_in_db: $RAD_REQUEST{'NAS-Port-Type'} = &request:NAS-Port-Type -> 'Wireless-802.11'
(0) reply_in_db: $RAD_REQUEST{'Message-Authenticator'} = &request:Message-Authenticator -> '0x7e530e25ff2a29433fb983dbe71b3e57'
(0) reply_in_db: $RAD_REQUEST{'Aruba-Essid-Name'} = &request:Aruba-Essid-Name -> 'CPS-District'
(0) reply_in_db: $RAD_REQUEST{'Aruba-Location-Id'} = &request:Aruba-Location-Id -> 'MS-A181'
(0) reply_in_db: $RAD_REQUEST{'Aruba-AP-Group'} = &request:Aruba-AP-Group -> 'MS'
(0) reply_in_db: $RAD_REQUEST{'Realm'} = &request:Realm -> 'remote'
(0) reply_in_db: $RAD_REQUEST{'SQL-User-Name'} = &request:SQL-User-Name -> '64-76-ba-89-71-4c'
(0) reply_in_db: $RAD_REQUEST{'PacketFence-KeyBalanced'} = &request:PacketFence-KeyBalanced -> '2cab901e9652f08e98b274d193485eb3'
(0) reply_in_db: $RAD_CHECK{'Load-Balance-Key'} = &control:Load-Balance-Key -> '64:76:ba:89:71:4c'
(0) reply_in_db: $RAD_CHECK{'Proxy-To-Realm'} = &control:Proxy-To-Realm -> 'remote'
(0) reply_in_db: $RAD_CHECK{'PacketFence-Proxied-To'} = &control:PacketFence-Proxied-To -> '172.20.135.10'
(0) reply_in_db: $RAD_CONFIG{'Load-Balance-Key'} = &control:Load-Balance-Key -> '64:76:ba:89:71:4c'
(0) reply_in_db: $RAD_CONFIG{'Proxy-To-Realm'} = &control:Proxy-To-Realm -> 'remote'
(0) reply_in_db: $RAD_CONFIG{'PacketFence-Proxied-To'} = &control:PacketFence-Proxied-To -> '172.20.135.10'
(0) reply_in_db: $RAD_REQUEST_PROXY{'User-Name'} = &proxy-request:User-Name -> '64-76-ba-89-71-4c'
(0) reply_in_db: $RAD_REQUEST_PROXY{'User-Password'} = &proxy-request:User-Password -> '64-76-ba-89-71-4c'
(0) reply_in_db: $RAD_REQUEST_PROXY{'NAS-IP-Address'} = &proxy-request:NAS-IP-Address -> '172.20.110.250'
(0) reply_in_db: $RAD_REQUEST_PROXY{'NAS-Port'} = &proxy-request:NAS-Port -> '0'
(0) reply_in_db: $RAD_REQUEST_PROXY{'Service-Type'} = &proxy-request:Service-Type -> 'Call-Check'
(0) reply_in_db: $RAD_REQUEST_PROXY{'Called-Station-Id'} = &proxy-request:Called-Station-Id -> '00:1a:1e:01:68:f8'
(0) reply_in_db: $RAD_REQUEST_PROXY{'Calling-Station-Id'} = &proxy-request:Calling-Station-Id -> '64:76:ba:89:71:4c'
(0) reply_in_db: $RAD_REQUEST_PROXY{'Proxy-State'}[0] = &proxy-request:Proxy-State -> '0x313639'
(0) reply_in_db: $RAD_REQUEST_PROXY{'Proxy-State'}[1] = &proxy-request:Proxy-State -> '0x313830'
(0) reply_in_db: $RAD_REQUEST_PROXY{'NAS-Port-Type'} = &proxy-request:NAS-Port-Type -> 'Wireless-802.11'
(0) reply_in_db: $RAD_REQUEST_PROXY{'Message-Authenticator'} = &proxy-request:Message-Authenticator -> '0x7e530e25ff2a29433fb983dbe71b3e57'
(0) reply_in_db: $RAD_REQUEST_PROXY{'Aruba-Essid-Name'} = &proxy-request:Aruba-Essid-Name -> 'CPS-District'
(0) reply_in_db: $RAD_REQUEST_PROXY{'Aruba-Location-Id'} = &proxy-request:Aruba-Location-Id -> 'MS-A181'
(0) reply_in_db: $RAD_REQUEST_PROXY{'Aruba-AP-Group'} = &proxy-request:Aruba-AP-Group -> 'MS'
(0) reply_in_db: $RAD_REQUEST_PROXY{'PacketFence-KeyBalanced'} = &proxy-request:PacketFence-KeyBalanced -> '2cab901e9652f08e98b274d193485eb3'
(0) reply_in_db: $RAD_REQUEST_PROXY_REPLY{'Proxy-State'}[0] = &proxy-reply:Proxy-State -> '0x313830'
(0) reply_in_db: $RAD_REQUEST_PROXY_REPLY{'Proxy-State'}[1] = &proxy-reply:Proxy-State -> '0x313639'
(0) reply_in_db: $RAD_REQUEST_PROXY_REPLY{'Tunnel-Type'} = &proxy-reply:Tunnel-Type -> 'VLAN'
(0) reply_in_db: $RAD_REQUEST_PROXY_REPLY{'Tunnel-Medium-Type'} = &proxy-reply:Tunnel-Medium-Type -> 'IEEE-802'
(0) reply_in_db: $RAD_REQUEST_PROXY_REPLY{'Tunnel-Private-Group-Id'} = &proxy-reply:Tunnel-Private-Group-Id -> '135'
(0) reply_in_db: &request:NAS-Port-Type = $RAD_REQUEST{'NAS-Port-Type'} -> 'Wireless-802.11'
(0) reply_in_db: &request:Proxy-State = $RAD_REQUEST{'Proxy-State'} -> '0x313830'
(0) reply_in_db: &request:Service-Type = $RAD_REQUEST{'Service-Type'} -> 'Call-Check'
(0) reply_in_db: &request:Called-Station-Id = $RAD_REQUEST{'Called-Station-Id'} -> '00:1a:1e:01:68:f8'
(0) reply_in_db: &request:Message-Authenticator = $RAD_REQUEST{'Message-Authenticator'} -> '0x7e530e25ff2a29433fb983dbe71b3e57'
(0) reply_in_db: &request:Realm = $RAD_REQUEST{'Realm'} -> 'remote'
(0) reply_in_db: &request:NAS-IP-Address = $RAD_REQUEST{'NAS-IP-Address'} -> '172.20.110.250'
(0) reply_in_db: &request:SQL-User-Name = $RAD_REQUEST{'SQL-User-Name'} -> '64-76-ba-89-71-4c'
(0) reply_in_db: &request:Calling-Station-Id = $RAD_REQUEST{'Calling-Station-Id'} -> '64:76:ba:89:71:4c'
(0) reply_in_db: &request:Aruba-Essid-Name = $RAD_REQUEST{'Aruba-Essid-Name'} -> 'CPS-District'
(0) reply_in_db: &request:PacketFence-KeyBalanced = $RAD_REQUEST{'PacketFence-KeyBalanced'} -> '2cab901e9652f08e98b274d193485eb3'
(0) reply_in_db: &request:Aruba-AP-Group = $RAD_REQUEST{'Aruba-AP-Group'} -> 'MS'
(0) reply_in_db: &request:User-Name = $RAD_REQUEST{'User-Name'} -> '64-76-ba-89-71-4c'
(0) reply_in_db: &request:Aruba-Location-Id = $RAD_REQUEST{'Aruba-Location-Id'} -> 'MS-A181'
(0) reply_in_db: &request:User-Password = $RAD_REQUEST{'User-Password'} -> '64-76-ba-89-71-4c'
(0) reply_in_db: &request:NAS-Port = $RAD_REQUEST{'NAS-Port'} -> '0'
(0) reply_in_db: &control:PacketFence-Proxied-To = $RAD_CHECK{'PacketFence-Proxied-To'} -> '172.20.135.10'
(0) reply_in_db: &control:Load-Balance-Key = $RAD_CHECK{'Load-Balance-Key'} -> '64:76:ba:89:71:4c'
(0) reply_in_db: &control:PacketFence-reply-insert = $RAD_CHECK{'PacketFence-reply-insert'} -> 'INSERT into radreply (username, attribute, value) values ('64:76:ba:89:71:4c','Tunnel-Medium-Type:0','IEEE-802'), ('64:76:ba:89:71:4c','Tunnel-Private-Group-Id:0','135'), ('64:76:ba:89:71:4c','Tunnel-Type:0','VLAN')'
(0) reply_in_db: &control:Proxy-To-Realm = $RAD_CHECK{'Proxy-To-Realm'} -> 'remote'
(0) reply_in_db: &proxy-request:NAS-Port-Type = $RAD_REQUEST_PROXY{'NAS-Port-Type'} -> 'Wireless-802.11'
(0) reply_in_db: &proxy-request:Proxy-State += $RAD_REQUEST_PROXY{'Proxy-State'} -> '0x313639'
(0) reply_in_db: &proxy-request:Proxy-State += $RAD_REQUEST_PROXY{'Proxy-State'} -> '0x313830'
(0) reply_in_db: &proxy-request:Service-Type = $RAD_REQUEST_PROXY{'Service-Type'} -> 'Call-Check'
(0) reply_in_db: &proxy-request:Aruba-Essid-Name = $RAD_REQUEST_PROXY{'Aruba-Essid-Name'} -> 'CPS-District'
(0) reply_in_db: &proxy-request:Calling-Station-Id = $RAD_REQUEST_PROXY{'Calling-Station-Id'} -> '64:76:ba:89:71:4c'
(0) reply_in_db: &proxy-request:Called-Station-Id = $RAD_REQUEST_PROXY{'Called-Station-Id'} -> '00:1a:1e:01:68:f8'
(0) reply_in_db: &proxy-request:PacketFence-KeyBalanced = $RAD_REQUEST_PROXY{'PacketFence-KeyBalanced'} -> '2cab901e9652f08e98b274d193485eb3'
(0) reply_in_db: &proxy-request:Message-Authenticator = $RAD_REQUEST_PROXY{'Message-Authenticator'} -> '0x7e530e25ff2a29433fb983dbe71b3e57'
(0) reply_in_db: &proxy-request:Aruba-AP-Group = $RAD_REQUEST_PROXY{'Aruba-AP-Group'} -> 'MS'
(0) reply_in_db: &proxy-request:Aruba-Location-Id = $RAD_REQUEST_PROXY{'Aruba-Location-Id'} -> 'MS-A181'
(0) reply_in_db: &proxy-request:User-Name = $RAD_REQUEST_PROXY{'User-Name'} -> '64-76-ba-89-71-4c'
(0) reply_in_db: &proxy-request:User-Password = $RAD_REQUEST_PROXY{'User-Password'} -> '64-76-ba-89-71-4c'
(0) reply_in_db: &proxy-request:NAS-IP-Address = $RAD_REQUEST_PROXY{'NAS-IP-Address'} -> '172.20.110.250'
(0) reply_in_db: &proxy-request:NAS-Port = $RAD_REQUEST_PROXY{'NAS-Port'} -> '0'
(0) reply_in_db: &proxy-reply:Tunnel-Private-Group-Id:0 = $RAD_REQUEST_PROXY_REPLY{'Tunnel-Private-Group-Id:0'} -> '135'
(0) reply_in_db: &proxy-reply:Tunnel-Medium-Type:0 = $RAD_REQUEST_PROXY_REPLY{'Tunnel-Medium-Type:0'} -> 'IEEE-802'
(0) reply_in_db: &proxy-reply:Tunnel-Type:0 = $RAD_REQUEST_PROXY_REPLY{'Tunnel-Type:0'} -> 'VLAN'
(0) reply_in_db: &proxy-reply:Proxy-State += $RAD_REQUEST_PROXY_REPLY{'Proxy-State'} -> '0x313830'
(0) reply_in_db: &proxy-reply:Proxy-State += $RAD_REQUEST_PROXY_REPLY{'Proxy-State'} -> '0x313639'
(0) [reply_in_db] = ok
rlm_sql (sql): Reserved connection (0)
rlm_sql (sql): Released connection (0)
(0) EXPAND %{User-Name}
(0) --> 64-76-ba-89-71-4c
(0) SQL-User-Name set to '64-76-ba-89-71-4c'
rlm_sql (sql): Reserved connection (2)
(0) Executing query: INSERT into radreply (username, attribute, value) values ('64:76:ba:89:71:4c','Tunnel-Medium-Type:0','IEEE-802'), ('64:76:ba:89:71:4c','Tunnel-Private-Group-Id:0','135'), ('64:76:ba:89:71:4c','Tunnel-Type:0','VLAN')
rlm_sql_mysql: Records: 3 Duplicates: 0 Warnings: 0
rlm_sql (sql): Released connection (2)
(0) EXPAND %{sql_degraded:%{control:PacketFence-reply-insert}}
(0) --> 3
(0) } # if (&proxy-reply:Packet-Type == Access-Accept) = ok
(0) ... skipping else: Preceding "if" was taken
(0) attr_filter.packetfence_post_auth: EXPAND %{User-Name}
(0) attr_filter.packetfence_post_auth: --> 64-76-ba-89-71-4c
(0) attr_filter.packetfence_post_auth: Matched entry DEFAULT at line 10
(0) [attr_filter.packetfence_post_auth] = updated
(0) } # post-proxy = updated
(0) }
(0) Found Auth-Type = Accept
(0) Auth-Type = Accept, accepting the user
(0) Login OK: [64-76-ba-89-71-4c] (from client pf port 0 cli 64:76:ba:89:71:4c)
(0) Sent Access-Accept Id 169 from 172.20.135.4:1812 to 172.20.135.5:58688 length 0
(0) Tunnel-Private-Group-Id:0 = "135"
(0) Tunnel-Medium-Type:0 = IEEE-802
(0) Tunnel-Type:0 = VLAN
(0) Proxy-State = 0x313830
(0) Finished request
Thread 2 waiting to be assigned a request
Waking up in 4.6 seconds.
-------------- next part --------------
FreeRADIUS Version 3.0.21
Copyright (C) 1999-2019 The FreeRADIUS server project and contributors
There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
PARTICULAR PURPOSE
You may redistribute copies of FreeRADIUS under the terms of the
GNU General Public License
For more information about these matters, see the file named COPYRIGHT
Starting - reading configuration files ...
including dictionary file /usr/share/freeradius/dictionary
including dictionary file /usr/share/freeradius/dictionary.dhcp
including dictionary file /usr/share/freeradius/dictionary.vqp
including dictionary file /usr/local/pf/raddb/dictionary
including configuration file /usr/local/pf/raddb/auth.conf
including configuration file /usr/local/pf/raddb/radiusd.conf
including configuration file /usr/local/pf/raddb/proxy.conf
including configuration file /usr/local/pf/raddb/proxy.conf.inc
including configuration file /usr/local/pf/raddb/clients.conf
including configuration file /usr/local/pf/raddb/clients.conf.inc
including configuration file /usr/local/pf/raddb/clients.eduroam.conf.inc
including files in directory /usr/local/pf/raddb/mods-enabled/
including configuration file /usr/local/pf/raddb/mods-enabled/logintime
including configuration file /usr/local/pf/raddb/mods-enabled/ntlm_auth
including configuration file /usr/local/pf/raddb/mods-enabled/pap
including configuration file /usr/local/pf/raddb/mods-enabled/passwd
including configuration file /usr/local/pf/raddb/mods-enabled/perl
including configuration file /usr/local/pf/raddb/mods-enabled/preprocess
including configuration file /usr/local/pf/raddb/mods-enabled/radutmp
including configuration file /usr/local/pf/raddb/mods-enabled/raw
including configuration file /usr/local/pf/raddb/mods-enabled/realm
including configuration file /usr/local/pf/raddb/mods-enabled/redis
including configuration file /usr/local/pf/raddb/mods-enabled/replicate
including configuration file /usr/local/pf/raddb/mods-enabled/soh
including configuration file /usr/local/pf/raddb/mods-enabled/sradutmp
including configuration file /usr/local/pf/raddb/mods-enabled/unix
including configuration file /usr/local/pf/raddb/mods-enabled/unpack
including configuration file /usr/local/pf/raddb/mods-enabled/utf8
including configuration file /usr/local/pf/raddb/mods-enabled/eap
including configuration file /usr/local/pf/raddb/mods-enabled/rest
including configuration file /usr/local/pf/raddb/mods-enabled/sql
including configuration file /usr/local/pf/raddb/mods-config/sql/main/mysql/queries.conf
including configuration file /usr/local/pf/raddb/mods-config/sql/main/mysql/reject.conf
including configuration file /usr/local/pf/raddb/mods-enabled/mschap
including configuration file /usr/local/pf/raddb/mods-enabled/go
including configuration file /usr/local/pf/raddb/mods-enabled/always
including configuration file /usr/local/pf/raddb/mods-enabled/attr_filter
including configuration file /usr/local/pf/raddb/mods-enabled/cache_eap
including configuration file /usr/local/pf/raddb/mods-enabled/cache_ntlm
including configuration file /usr/local/pf/raddb/mods-enabled/cache_password
including configuration file /usr/local/pf/raddb/mods-enabled/chap
including configuration file /usr/local/pf/raddb/mods-enabled/detail
including configuration file /usr/local/pf/raddb/mods-enabled/detail.log
including configuration file /usr/local/pf/raddb/mods-enabled/digest
including configuration file /usr/local/pf/raddb/mods-enabled/dynamic_clients
including configuration file /usr/local/pf/raddb/mods-enabled/echo
including configuration file /usr/local/pf/raddb/mods-enabled/exec
including configuration file /usr/local/pf/raddb/mods-enabled/expiration
including configuration file /usr/local/pf/raddb/mods-enabled/expr
including configuration file /usr/local/pf/raddb/mods-enabled/files
including configuration file /usr/local/pf/raddb/mods-enabled/linelog
including files in directory /usr/local/pf/raddb/policy.d/
including configuration file /usr/local/pf/raddb/policy.d/abfab-tr
including configuration file /usr/local/pf/raddb/policy.d/accounting
including configuration file /usr/local/pf/raddb/policy.d/canonicalization
including configuration file /usr/local/pf/raddb/policy.d/control
including configuration file /usr/local/pf/raddb/policy.d/cui
including configuration file /usr/local/pf/raddb/policy.d/debug
including configuration file /usr/local/pf/raddb/policy.d/dhcp
including configuration file /usr/local/pf/raddb/policy.d/eap
including configuration file /usr/local/pf/raddb/policy.d/filter
including configuration file /usr/local/pf/raddb/policy.d/operator-name
including configuration file /usr/local/pf/raddb/policy.d/packetfence.orig
including configuration file /usr/local/pf/raddb/policy.d/packetfence
including files in directory /usr/local/pf/raddb/sites-enabled/
including configuration file /usr/local/pf/raddb/sites-enabled/packetfence
including configuration file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
including configuration file /usr/local/pf/raddb/sites-enabled/packetfence-cli
including configuration file /usr/local/pf/raddb/sites-enabled/dynamic-clients
including configuration file /usr/local/pf/raddb/sites-enabled/status
including configuration file /usr/local/pf/raddb/sites-enabled/packetfence-cluster
main {
security {
user = "pf"
group = "pf"
allow_core_dumps = no
}
name = "radiusd"
prefix = "/usr"
localstatedir = "/usr/local/pf/var"
logdir = "/usr/local/pf/logs"
run_dir = "/usr/local/pf/var/run"
}
main {
name = "radiusd"
prefix = "/usr"
localstatedir = "/usr/local/pf/var"
sbindir = "/usr/sbin"
logdir = "/usr/local/pf/logs"
run_dir = "/usr/local/pf/var/run"
libdir = "/usr/lib64/freeradius:/usr/lib/freeradius"
radacctdir = "/usr/local/pf/logs/radacct"
hostname_lookups = no
max_request_time = 10
cleanup_delay = 5
max_requests = 20000
pidfile = "/usr/local/pf/var/run/radiusd.pid"
checkrad = "/usr/sbin/checkrad"
debug_level = 0
proxy_requests = yes
log {
stripped_names = no
auth = yes
auth_badpass = no
auth_goodpass = no
colourise = yes
msg_denied = "You are already logged in - access denied"
}
resources {
}
security {
max_attributes = 200
reject_delay = 1.000000
status_server = yes
allow_vulnerable_openssl = "yes"
}
}
auth: #### Loading Realms and Home Servers ####
proxy server {
retry_delay = 5
retry_count = 3
default_fallback = no
dead_time = 120
wake_all_if_all_dead = no
}
home_server localhost {
ipaddr = 127.0.0.1
port = 1812
type = "auth"
secret = <<< secret >>>
response_window = 20.000000
response_timeouts = 1
max_outstanding = 65536
zombie_period = 40
status_check = "status-server"
ping_interval = 30
check_interval = 30
check_timeout = 4
num_answers_to_alive = 3
revive_interval = 120
limit {
max_connections = 16
max_requests = 0
lifetime = 0
idle_timeout = 0
}
coa {
irt = 2
mrt = 16
mrc = 5
mrd = 30
}
}
Ignoring "response_window = 20.000000", forcing to "response_window = 10.000000"
home_server pf.remote {
ipaddr = 172.20.135.10
port = 1812
type = "auth+acct"
secret = <<< secret >>>
src_ipaddr = "172.20.135.4"
response_window = 6.000000
response_timeouts = 1
max_outstanding = 65536
zombie_period = 40
status_check = "status-server"
ping_interval = 30
check_interval = 30
check_timeout = 4
num_answers_to_alive = 3
revive_interval = 120
limit {
max_connections = 16
max_requests = 0
lifetime = 0
idle_timeout = 0
}
coa {
irt = 2
mrt = 16
mrc = 5
mrd = 30
}
}
home_server degraded {
virtual_server = "pf.degraded"
port = 0
response_window = 30.000000
response_timeouts = 1
max_outstanding = 65536
zombie_period = 40
status_check = "none"
ping_interval = 30
check_timeout = 4
num_answers_to_alive = 3
revive_interval = 300
limit {
max_connections = 16
max_requests = 0
lifetime = 0
idle_timeout = 0
}
coa {
irt = 2
mrt = 16
mrc = 5
mrd = 30
}
}
Ignoring "response_window = 30.000000", forcing to "response_window = 10.000000"
home_server pf0.cluster {
ipaddr = 172.20.135.4
port = 1812
type = "auth+acct"
secret = <<< secret >>>
src_ipaddr = "172.20.135.5"
response_window = 6.000000
response_timeouts = 1
max_outstanding = 65536
zombie_period = 40
status_check = "status-server"
ping_interval = 30
check_interval = 30
check_timeout = 4
num_answers_to_alive = 3
revive_interval = 120
limit {
max_connections = 16
max_requests = 0
lifetime = 0
idle_timeout = 0
}
coa {
irt = 2
mrt = 16
mrc = 5
mrd = 30
}
}
home_server pf0.cli.cluster {
ipaddr = 172.20.135.4
port = 1815
type = "auth"
secret = <<< secret >>>
src_ipaddr = "172.20.135.5"
response_window = 6.000000
response_timeouts = 1
max_outstanding = 65536
zombie_period = 40
status_check = "status-server"
ping_interval = 30
check_interval = 30
check_timeout = 4
num_answers_to_alive = 3
revive_interval = 120
limit {
max_connections = 16
max_requests = 0
lifetime = 0
idle_timeout = 0
}
coa {
irt = 2
mrt = 16
mrc = 5
mrd = 30
}
}
home_server_pool my_auth_failover {
type = fail-over
home_server = localhost
}
realm example.com {
auth_pool = my_auth_failover
}
realm default {
}
realm local {
}
realm null {
}
realm bob {
}
realm bibi {
}
realm inverse.inc {
}
realm eduroam.default {
}
realm eduroam.local {
}
realm eduroam.null {
}
realm eduroam.bob {
}
realm eduroam.bibi {
}
realm eduroam.inverse.inc {
}
home_server_pool pf_auth_pool {
type = fail-over
home_server = pf.remote
home_server = degraded
}
home_server_pool pf_acct_pool {
type = fail-over
home_server = pf.remote
}
realm remote {
auth_pool = pf_auth_pool
acct_pool = pf_acct_pool
}
home_server_pool pf_pool.cluster {
type = keyed-balance
home_server = pf0.cluster
}
home_server_pool pfacct_pool.cluster {
type = load-balance
home_server = pf0.cluster
}
realm packetfence {
auth_pool = pf_pool.cluster
acct_pool = pfacct_pool.cluster
}
home_server_pool pfcli_pool.cluster {
type = keyed-balance
home_server = pf0.cli.cluster
}
realm packetfence-cli {
auth_pool = pfcli_pool.cluster
}
auth: #### Loading Clients ####
client localhost {
ipaddr = 127.0.0.1
require_message_authenticator = no
secret = <<< secret >>>
nas_type = "other"
proto = "*"
limit {
max_connections = 16
lifetime = 0
idle_timeout = 30
}
}
client localhost_ipv6 {
ipv6addr = ::1
require_message_authenticator = no
secret = <<< secret >>>
limit {
max_connections = 16
lifetime = 0
idle_timeout = 30
}
}
client 172.20.135.4 {
ipaddr = 172.20.135.4
require_message_authenticator = no
secret = <<< secret >>>
shortname = "pf"
limit {
max_connections = 16
lifetime = 0
idle_timeout = 30
}
}
client 172.20.135.5 {
ipaddr = 172.20.135.5
require_message_authenticator = no
secret = <<< secret >>>
shortname = "pf"
limit {
max_connections = 16
lifetime = 0
idle_timeout = 30
}
}
client 172.20.135.11 {
ipaddr = 172.20.135.11
require_message_authenticator = no
secret = <<< secret >>>
shortname = "pf"
limit {
max_connections = 16
lifetime = 0
idle_timeout = 30
}
}
client 172.20.135.12 {
ipaddr = 172.20.135.12
require_message_authenticator = no
secret = <<< secret >>>
shortname = "pf"
limit {
max_connections = 16
lifetime = 0
idle_timeout = 30
}
}
client 172.20.135.13 {
ipaddr = 172.20.135.13
require_message_authenticator = no
secret = <<< secret >>>
shortname = "pf"
limit {
max_connections = 16
lifetime = 0
idle_timeout = 30
}
}
client dynamic {
ipaddr = 0.0.0.0/0
require_message_authenticator = no
limit {
max_connections = 16
lifetime = 0
idle_timeout = 30
}
dynamic_clients = "dynamic_clients"
lifetime = 300
}
Debugger not attached
systemd watchdog is disabled
# Creating Auth-Type = eap
# Creating Auth-Type = PAP
# Creating Auth-Type = CHAP
# Creating Auth-Type = MS-CHAP
# Creating Auth-Type = eap-degraded
# Creating Autz-Type = Status-Server
auth: #### Instantiating modules ####
modules {
# Loaded module rlm_logintime
# Loading module "logintime" from file /usr/local/pf/raddb/mods-enabled/logintime
logintime {
minimum_timeout = 60
}
# Loaded module rlm_exec
# Loading module "ntlm_auth" from file /usr/local/pf/raddb/mods-enabled/ntlm_auth
exec ntlm_auth {
wait = yes
program = "/path/to/ntlm_auth --request-nt-key --domain=MYDOMAIN --username=%{mschap:User-Name} --password=%{User-Password}"
shell_escape = yes
}
# Loaded module rlm_pap
# Loading module "pap" from file /usr/local/pf/raddb/mods-enabled/pap
pap {
normalise = yes
}
# Loaded module rlm_passwd
# Loading module "etc_passwd" from file /usr/local/pf/raddb/mods-enabled/passwd
passwd etc_passwd {
filename = "/etc/passwd"
format = "*User-Name:Crypt-Password:"
delimiter = ":"
ignore_nislike = no
ignore_empty = yes
allow_multiple_keys = no
hash_size = 100
}
# Loaded module rlm_perl
# Loading module "perl" from file /usr/local/pf/raddb/mods-enabled/perl
perl {
filename = "/usr/local/pf/raddb/mods-config/perl/example.pl"
func_authorize = "authorize"
func_authenticate = "authenticate"
func_post_auth = "post_auth"
func_accounting = "accounting"
func_preacct = "preacct"
func_checksimul = "checksimul"
func_detach = "detach"
func_xlat = "xlat"
func_pre_proxy = "pre_proxy"
func_post_proxy = "post_proxy"
func_recv_coa = "recv_coa"
func_send_coa = "send_coa"
}
# Loading module "packetfence" from file /usr/local/pf/raddb/mods-enabled/perl
perl packetfence {
filename = "/usr/local/pf/raddb/mods-config/perl/packetfence.pm"
func_authorize = "authorize"
func_authenticate = "authenticate"
func_post_auth = "post_auth"
func_accounting = "accounting"
func_preacct = "preacct"
func_checksimul = "checksimul"
func_detach = "detach"
func_xlat = "xlat"
func_pre_proxy = "pre_proxy"
func_post_proxy = "post_proxy"
func_recv_coa = "recv_coa"
func_send_coa = "send_coa"
}
# Loading module "packetfence-multi-domain" from file /usr/local/pf/raddb/mods-enabled/perl
perl packetfence-multi-domain {
filename = "/usr/local/pf/raddb/mods-config/perl/packetfence-multi-domain.pm"
func_authorize = "authorize"
func_authenticate = "authenticate"
func_post_auth = "post_auth"
func_accounting = "accounting"
func_preacct = "preacct"
func_checksimul = "checksimul"
func_detach = "detach"
func_xlat = "xlat"
func_pre_proxy = "pre_proxy"
func_post_proxy = "post_proxy"
func_recv_coa = "recv_coa"
func_send_coa = "send_coa"
}
# Loading module "reply_in_db" from file /usr/local/pf/raddb/mods-enabled/perl
perl reply_in_db {
filename = "/usr/local/pf/raddb/mods-config/perl/reply_in_db.pm"
func_authorize = "authorize"
func_authenticate = "authenticate"
func_post_auth = "post_auth"
func_accounting = "accounting"
func_preacct = "preacct"
func_checksimul = "checksimul"
func_detach = "detach"
func_xlat = "xlat"
func_pre_proxy = "pre_proxy"
func_post_proxy = "post_proxy"
func_recv_coa = "recv_coa"
func_send_coa = "send_coa"
}
# Loaded module rlm_preprocess
# Loading module "preprocess" from file /usr/local/pf/raddb/mods-enabled/preprocess
preprocess {
huntgroups = "/usr/local/pf/raddb/mods-config/preprocess/huntgroups"
hints = "/usr/local/pf/raddb/mods-config/preprocess/hints"
with_ascend_hack = no
ascend_channels_per_line = 23
with_ntdomain_hack = no
with_specialix_jetstream_hack = no
with_cisco_vsa_hack = no
with_alvarion_vsa_hack = no
}
# Loaded module rlm_radutmp
# Loading module "radutmp" from file /usr/local/pf/raddb/mods-enabled/radutmp
radutmp {
filename = "/usr/local/pf/logs/radutmp"
username = "%{User-Name}"
case_sensitive = yes
check_with_nas = yes
permissions = 384
caller_id = yes
}
# Loaded module rlm_raw
# Loading module "raw" from file /usr/local/pf/raddb/mods-enabled/raw
raw {
name = "raw"
}
# Loaded module rlm_realm
# Loading module "IPASS" from file /usr/local/pf/raddb/mods-enabled/realm
realm IPASS {
format = "prefix"
delimiter = "/"
ignore_default = no
ignore_null = no
}
# Loading module "suffix" from file /usr/local/pf/raddb/mods-enabled/realm
realm suffix {
format = "suffix"
delimiter = "@"
ignore_default = no
ignore_null = yes
}
# Loading module "realmpercent" from file /usr/local/pf/raddb/mods-enabled/realm
realm realmpercent {
format = "suffix"
delimiter = "%"
ignore_default = no
ignore_null = no
}
# Loading module "ntdomain" from file /usr/local/pf/raddb/mods-enabled/realm
realm ntdomain {
format = "prefix"
delimiter = "\\"
ignore_default = no
ignore_null = no
}
# Loaded module rlm_redis
# Loading module "redis" from file /usr/local/pf/raddb/mods-enabled/redis
redis {
server = "127.0.0.1"
port = 6379
database = 0
query_timeout = 5
}
rlm_redis: libhiredis version: 0.12.1
# Loading module "redis_ntlm" from file /usr/local/pf/raddb/mods-enabled/redis
redis redis_ntlm {
server = "127.0.0.1"
port = 6383
database = 0
query_timeout = 5
}
rlm_redis: libhiredis version: 0.12.1
# Loaded module rlm_replicate
# Loading module "replicate" from file /usr/local/pf/raddb/mods-enabled/replicate
# Loaded module rlm_soh
# Loading module "soh" from file /usr/local/pf/raddb/mods-enabled/soh
soh {
dhcp = yes
}
# Loading module "sradutmp" from file /usr/local/pf/raddb/mods-enabled/sradutmp
radutmp sradutmp {
filename = "/usr/local/pf/logs/sradutmp"
username = "%{User-Name}"
case_sensitive = yes
check_with_nas = yes
permissions = 420
caller_id = no
}
# Loaded module rlm_unix
# Loading module "unix" from file /usr/local/pf/raddb/mods-enabled/unix
unix {
radwtmp = "/usr/local/pf/logs/radwtmp"
}
Creating attribute Unix-Group
# Loaded module rlm_unpack
# Loading module "unpack" from file /usr/local/pf/raddb/mods-enabled/unpack
# Loaded module rlm_utf8
# Loading module "utf8" from file /usr/local/pf/raddb/mods-enabled/utf8
# Loaded module rlm_eap
# Loading module "eap" from file /usr/local/pf/raddb/mods-enabled/eap
eap {
default_eap_type = "peap"
timer_expire = 60
ignore_unknown_eap_types = no
cisco_accounting_username_bug = no
max_sessions = 20000
}
# Loading module "eap-degraded" from file /usr/local/pf/raddb/mods-enabled/eap
eap eap-degraded {
default_eap_type = "peap"
timer_expire = 60
ignore_unknown_eap_types = no
cisco_accounting_username_bug = no
max_sessions = 20000
}
# Loaded module rlm_rest
# Loading module "rest" from file /usr/local/pf/raddb/mods-enabled/rest
rest {
connect_uri = "http://127.0.0.1:7070/"
connect_timeout = 4.000000
}
# Loading module "rest-cli" from file /usr/local/pf/raddb/mods-enabled/rest
rest rest-cli {
connect_uri = "http://127.0.0.1:7070/"
connect_timeout = 4.000000
}
# Loaded module rlm_sql
# Loading module "sql" from file /usr/local/pf/raddb/mods-enabled/sql
sql {
driver = "rlm_sql_mysql"
server = "127.0.0.1"
port = 3306
login = "pf"
password = <<< secret >>>
radius_db = "pf"
read_groups = yes
read_profiles = yes
read_clients = yes
delete_stale_sessions = yes
sql_user_name = "%{User-Name}"
default_user_profile = ""
client_query = "SELECT id, nasname, shortname, type, secret, server, tenant_id FROM radius_nas where 1=0"
authorize_check_query = "SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id"
authorize_reply_query = "SELECT id, username, attribute, value, op FROM radreply WHERE username = '%{SQL-User-Name}' ORDER BY id"
authorize_group_check_query = "SELECT id, groupname, attribute, Value, op FROM radgroupcheck WHERE groupname = '%{SQL-Group}' ORDER BY id"
authorize_group_reply_query = "SELECT id, groupname, attribute, value, op FROM radgroupreply WHERE groupname = '%{SQL-Group}' ORDER BY id"
group_membership_query = "SELECT groupname FROM radusergroup WHERE username = '%{SQL-User-Name}' ORDER BY priority"
simul_verify_query = "SELECT radacctid, acctsessionid, username, nasipaddress, nasportid, framedipaddress, callingstationid, framedprotocol FROM radacct WHERE username = '%{SQL-User-Name}' AND acctstoptime IS NULL"
safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
auto_escape = no
accounting {
reference = "%{tolower:type.%{Acct-Status-Type}.query}"
type {
accounting-on {
query = "UPDATE radacct SET acctstoptime = FROM_UNIXTIME(%{integer:Event-Timestamp}), acctsessiontime = '%{integer:Event-Timestamp}' - UNIX_TIMESTAMP(acctstarttime), acctterminatecause = '%{%{Acct-Terminate-Cause}:-NAS-Reboot}' WHERE acctstoptime IS NULL AND nasipaddress = '%{NAS-IP-Address}' AND acctstarttime <= FROM_UNIXTIME(%{integer:Event-Timestamp})"
}
accounting-off {
query = "UPDATE radacct SET acctstoptime = FROM_UNIXTIME(%{integer:Event-Timestamp}), acctsessiontime = '%{integer:Event-Timestamp}' - UNIX_TIMESTAMP(acctstarttime), acctterminatecause = '%{%{Acct-Terminate-Cause}:-NAS-Reboot}' WHERE acctstoptime IS NULL AND nasipaddress = '%{NAS-IP-Address}' AND acctstarttime <= FROM_UNIXTIME(%{integer:Event-Timestamp})"
}
start {
query = "CALL acct_start ( '%{Acct-Session-Id}', '%{Acct-Unique-Session-Id}', '%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{%{NAS-Port-ID}:-%{NAS-Port}}', '%{NAS-Port-Type}', FROM_UNIXTIME(%{integer:Event-Timestamp}), FROM_UNIXTIME(%{integer:Event-Timestamp}), NULL, '0', '%{Acct-Authentic}', '%{Connect-Info}', '', '0', '0', '%{Called-Station-Id}', '%{Calling-Station-Id}', '', '%{Service-Type}', '%{Framed-Protocol}', '%{Framed-IP-Address}', '%{Acct-Status-Type}','%{NAS-Identifier}', '%{Called-Station-SSID}', '%{control:PacketFence-Tenant-Id}')"
}
interim-update {
query = "CALL acct_update ( FROM_UNIXTIME(%{integer:Event-Timestamp}), '%{Framed-IP-Address}', '%{%{Acct-Session-Time}:-0}', '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}', '%{Acct-Unique-Session-Id}', '%{Acct-Session-Id}', '%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{%{NAS-Port-ID}:-%{NAS-Port}}', '%{NAS-Port-Type}', '%{Acct-Authentic}', '%{Connect-Info}', '%{Called-Station-Id}', '%{Calling-Station-Id}', '%{Service-Type}', '%{Framed-Protocol}', '%{Acct-Status-Type}','%{NAS-Identifier}', '%{Called-Station-SSID}', '%{control:PacketFence-Tenant-Id}')"
}
stop {
query = "CALL acct_stop ( FROM_UNIXTIME(%{integer:Event-Timestamp}), '%{Framed-IP-Address}', '%{%{Acct-Session-Time}:-0}', '%{%{Acct-Input-Gigawords}:-0}' << 32 | '%{%{Acct-Input-Octets}:-0}', '%{%{Acct-Output-Gigawords}:-0}' << 32 | '%{%{Acct-Output-Octets}:-0}', '%{Acct-Unique-Session-Id}', '%{Acct-Session-Id}', '%{SQL-User-Name}', '%{Realm}', '%{NAS-IP-Address}', '%{%{NAS-Port-ID}:-%{NAS-Port}}', '%{NAS-Port-Type}', '%{Acct-Authentic}', '%{Connect-Info}', '%{Called-Station-Id}', '%{Calling-Station-Id}', '%{Service-Type}', '%{Framed-Protocol}', '%{Acct-Terminate-Cause}', '%{Acct-Status-Type}', '%{NAS-Identifier}', '%{Called-Station-SSID}', '%{control:PacketFence-Tenant-Id}')"
}
}
}
post-auth {
reference = "type.accept.query"
}
}
rlm_sql (sql): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute SQL-Group
# Loading module "pfguest" from file /usr/local/pf/raddb/mods-enabled/sql
sql pfguest {
driver = "rlm_sql_mysql"
server = "127.0.0.1"
port = 3306
login = "pf"
password = <<< secret >>>
radius_db = "pf"
read_groups = yes
read_profiles = yes
read_clients = no
delete_stale_sessions = yes
sql_user_name = "%{User-Name}"
default_user_profile = ""
client_query = "SELECT id,nasname,shortname,type,secret FROM nas"
authorize_check_query = "SELECT 1, pid, ( CASE WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' ELSE 'Cleartext-Password' END ) AS passwordhash, REPLACE(password,'{ntlm}',''), ":=" FROM password JOIN activation using (pid) WHERE pid = '%{SQL-User-Name}' AND (SELECT type from activation WHERE pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = "guest" AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00 00:00:00' ) AND password.tenant_id = '%{control:PacketFence-Tenant-Id}' LIMIT 1"
group_membership_query = "select 1"
safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
auto_escape = no
accounting {
reference = ".query"
type {
accounting-on {
}
accounting-off {
}
start {
}
interim-update {
}
stop {
}
}
}
post-auth {
reference = ".query"
}
}
rlm_sql (pfguest): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute pfguest-SQL-Group
# Loading module "pfsponsor" from file /usr/local/pf/raddb/mods-enabled/sql
sql pfsponsor {
driver = "rlm_sql_mysql"
server = "127.0.0.1"
port = 3306
login = "pf"
password = <<< secret >>>
radius_db = "pf"
read_groups = yes
read_profiles = yes
read_clients = no
delete_stale_sessions = yes
sql_user_name = "%{User-Name}"
default_user_profile = ""
client_query = "SELECT id,nasname,shortname,type,secret FROM nas"
authorize_check_query = "SELECT 1, pid, ( CASE WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' ELSE 'Cleartext-Password' END ) AS passwordhash, REPLACE(password,'{ntlm}',''), ":=" FROM password JOIN activation using (pid) WHERE pid = '%{SQL-User-Name}' AND (SELECT type from activation WHERE pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = "sponsor" AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00 00:00:00' ) AND password.tenant_id = '%{control:PacketFence-Tenant-Id}' LIMIT 1"
group_membership_query = "select 1"
safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
auto_escape = no
accounting {
reference = ".query"
type {
accounting-on {
}
accounting-off {
}
start {
}
interim-update {
}
stop {
}
}
}
post-auth {
reference = ".query"
}
}
rlm_sql (pfsponsor): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute pfsponsor-SQL-Group
# Loading module "pfsms" from file /usr/local/pf/raddb/mods-enabled/sql
sql pfsms {
driver = "rlm_sql_mysql"
server = "127.0.0.1"
port = 3306
login = "pf"
password = <<< secret >>>
radius_db = "pf"
read_groups = yes
read_profiles = yes
read_clients = no
delete_stale_sessions = yes
sql_user_name = "%{User-Name}"
default_user_profile = ""
client_query = "SELECT id,nasname,shortname,type,secret FROM nas"
authorize_check_query = "SELECT 1, pid, ( CASE WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' ELSE 'Cleartext-Password' END ) AS passwordhash, REPLACE(password,'{ntlm}',''), ":=" FROM password JOIN activation using (pid) WHERE pid = '%{SQL-User-Name}' AND (SELECT type from activation WHERE pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = "sms" AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00 00:00:00' ) AND password.tenant_id = '%{control:PacketFence-Tenant-Id}' LIMIT 1"
group_membership_query = "select 1"
safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
auto_escape = no
accounting {
reference = ".query"
type {
accounting-on {
}
accounting-off {
}
start {
}
interim-update {
}
stop {
}
}
}
post-auth {
reference = ".query"
}
}
rlm_sql (pfsms): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute pfsms-SQL-Group
# Loading module "pflocal" from file /usr/local/pf/raddb/mods-enabled/sql
sql pflocal {
driver = "rlm_sql_mysql"
server = "127.0.0.1"
port = 3306
login = "pf"
password = <<< secret >>>
radius_db = "pf"
read_groups = yes
read_profiles = yes
read_clients = no
delete_stale_sessions = yes
sql_user_name = "%{User-Name}"
default_user_profile = ""
client_query = "SELECT id,nasname,shortname,type,secret FROM nas"
authorize_check_query = "SELECT 1, pid, ( CASE WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' ELSE 'Cleartext-Password' END ) AS passwordhash, REPLACE(password,'{ntlm}',''), ":=" FROM password WHERE pid = '%{SQL-User-Name}' AND password.tenant_id = '%{control:PacketFence-Tenant-Id}' AND NOT EXISTS (SELECT pid FROM activation WHERE pid = '%{SQL-User-Name}')"
group_membership_query = "select 1"
safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
auto_escape = no
accounting {
reference = ".query"
type {
accounting-on {
}
accounting-off {
}
start {
}
interim-update {
}
stop {
}
}
}
post-auth {
reference = ".query"
}
}
rlm_sql (pflocal): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute pflocal-SQL-Group
# Loading module "sql_reject" from file /usr/local/pf/raddb/mods-enabled/sql
sql sql_reject {
driver = "rlm_sql_mysql"
server = "127.0.0.1"
port = 3306
login = "pf"
password = <<< secret >>>
radius_db = "pf"
read_groups = yes
read_profiles = yes
read_clients = no
delete_stale_sessions = yes
sql_user_name = "%{User-Name}"
default_user_profile = ""
client_query = "SELECT id,nasname,shortname,type,secret FROM nas"
authorize_check_query = ""
authorize_reply_query = "SELECT id, username, attribute, value, op FROM radreply WHERE username = '%{Calling-Station-Id}' ORDER BY id"
group_membership_query = ""
safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /"
auto_escape = no
accounting {
reference = ".query"
type {
accounting-on {
}
accounting-off {
}
start {
}
interim-update {
}
stop {
}
}
}
post-auth {
reference = "type.reject.query"
}
}
rlm_sql (sql_reject): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute sql_reject-SQL-Group
# Loading module "sql_degraded" from file /usr/local/pf/raddb/mods-enabled/sql
sql sql_degraded {
driver = "rlm_sql_mysql"
server = "127.0.0.1"
port = 3306
login = "pf"
password = <<< secret >>>
radius_db = "pf"
read_groups = yes
read_profiles = yes
read_clients = no
delete_stale_sessions = yes
sql_user_name = "%{User-Name}"
default_user_profile = ""
client_query = "SELECT id,nasname,shortname,type,secret FROM nas"
group_membership_query = ""
safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /(),'"
auto_escape = no
accounting {
reference = ".query"
type {
accounting-on {
}
accounting-off {
}
start {
}
interim-update {
}
stop {
}
}
}
post-auth {
reference = ".query"
}
}
rlm_sql (sql_degraded): Driver rlm_sql_mysql (module rlm_sql_mysql) loaded and linked
Creating attribute sql_degraded-SQL-Group
# Loaded module rlm_mschap
# Loading module "mschap" from file /usr/local/pf/raddb/mods-enabled/mschap
mschap {
use_mppe = yes
require_encryption = yes
require_strong = yes
with_ntdomain_hack = yes
ntlm_auth = "/usr/local/pf/bin/ntlm_auth_wrapper -p 8125 -- --request-nt-key --username=%{%{control:AD-Samaccountname}:-%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}}} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00}"
ntlm_auth_timeout = 3
passchange {
}
allow_retry = no
winbind_retry_with_normalised_username = no
}
# Loading module "chrooted_mschap" from file /usr/local/pf/raddb/mods-enabled/mschap
mschap chrooted_mschap {
use_mppe = no
require_encryption = yes
require_strong = yes
with_ntdomain_hack = yes
ntlm_auth = "/usr/bin/sudo /usr/sbin/chroot /chroots/%{PacketFence-Domain} /usr/local/pf/bin/ntlm_auth_wrapper -p 8125 -- --request-nt-key --username=%{%{control:AD-Samaccountname}:-%{%{Stripped-User-Name}:-%{mschap:User-Name:-None}}} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00} %{PacketFence-NTLMv2-Only}"
ntlm_auth_timeout = 3
passchange {
}
allow_retry = no
winbind_retry_with_normalised_username = no
}
# Loading module "chrooted_mschap_machine" from file /usr/local/pf/raddb/mods-enabled/mschap
mschap chrooted_mschap_machine {
use_mppe = yes
require_encryption = yes
require_strong = yes
with_ntdomain_hack = yes
ntlm_auth = "/usr/bin/sudo /usr/sbin/chroot /chroots/%{PacketFence-Domain} /usr/local/pf/bin/ntlm_auth_wrapper -p 8125 -- --request-nt-key --username=%{mschap:User-Name:-None} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00} %{PacketFence-NTLMv2-Only}"
ntlm_auth_timeout = 3
passchange {
}
allow_retry = no
winbind_retry_with_normalised_username = no
}
# Loading module "mschap_machine" from file /usr/local/pf/raddb/mods-enabled/mschap
mschap mschap_machine {
use_mppe = yes
require_encryption = yes
require_strong = yes
with_ntdomain_hack = yes
ntlm_auth = "/usr/local/pf/bin/ntlm_auth_wrapper -p 8125 -- --request-nt-key --username=%{mschap:User-Name:-None} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00} %{PacketFence-NTLMv2-Only}"
ntlm_auth_timeout = 3
passchange {
}
allow_retry = no
winbind_retry_with_normalised_username = no
}
# Loading module "mschap_local" from file /usr/local/pf/raddb/mods-enabled/mschap
mschap mschap_local {
use_mppe = no
require_encryption = yes
require_strong = yes
with_ntdomain_hack = yes
passchange {
}
allow_retry = yes
winbind_retry_with_normalised_username = no
}
# Loaded module rlm_always
# Loading module "reject" from file /usr/local/pf/raddb/mods-enabled/always
always reject {
rcode = "reject"
simulcount = 0
mpp = no
}
# Loading module "fail" from file /usr/local/pf/raddb/mods-enabled/always
always fail {
rcode = "fail"
simulcount = 0
mpp = no
}
# Loading module "ok" from file /usr/local/pf/raddb/mods-enabled/always
always ok {
rcode = "ok"
simulcount = 0
mpp = no
}
# Loading module "handled" from file /usr/local/pf/raddb/mods-enabled/always
always handled {
rcode = "handled"
simulcount = 0
mpp = no
}
# Loading module "invalid" from file /usr/local/pf/raddb/mods-enabled/always
always invalid {
rcode = "invalid"
simulcount = 0
mpp = no
}
# Loading module "userlock" from file /usr/local/pf/raddb/mods-enabled/always
always userlock {
rcode = "userlock"
simulcount = 0
mpp = no
}
# Loading module "notfound" from file /usr/local/pf/raddb/mods-enabled/always
always notfound {
rcode = "notfound"
simulcount = 0
mpp = no
}
# Loading module "noop" from file /usr/local/pf/raddb/mods-enabled/always
always noop {
rcode = "noop"
simulcount = 0
mpp = no
}
# Loading module "updated" from file /usr/local/pf/raddb/mods-enabled/always
always updated {
rcode = "updated"
simulcount = 0
mpp = no
}
# Loaded module rlm_attr_filter
# Loading module "attr_filter.post-proxy" from file /usr/local/pf/raddb/mods-enabled/attr_filter
attr_filter attr_filter.post-proxy {
filename = "/usr/local/pf/raddb/mods-config/attr_filter/post-proxy"
key = "%{Realm}"
relaxed = no
}
# Loading module "attr_filter.pre-proxy" from file /usr/local/pf/raddb/mods-enabled/attr_filter
attr_filter attr_filter.pre-proxy {
filename = "/usr/local/pf/raddb/mods-config/attr_filter/pre-proxy"
key = "%{Realm}"
relaxed = no
}
# Loading module "attr_filter.access_reject" from file /usr/local/pf/raddb/mods-enabled/attr_filter
attr_filter attr_filter.access_reject {
filename = "/usr/local/pf/raddb/mods-config/attr_filter/access_reject"
key = "%{User-Name}"
relaxed = no
}
# Loading module "attr_filter.access_challenge" from file /usr/local/pf/raddb/mods-enabled/attr_filter
attr_filter attr_filter.access_challenge {
filename = "/usr/local/pf/raddb/mods-config/attr_filter/access_challenge"
key = "%{User-Name}"
relaxed = no
}
# Loading module "attr_filter.accounting_response" from file /usr/local/pf/raddb/mods-enabled/attr_filter
attr_filter attr_filter.accounting_response {
filename = "/usr/local/pf/raddb/mods-config/attr_filter/accounting_response"
key = "%{User-Name}"
relaxed = no
}
# Loading module "attr_filter.packetfence_post_auth" from file /usr/local/pf/raddb/mods-enabled/attr_filter
attr_filter attr_filter.packetfence_post_auth {
filename = "/usr/local/pf/raddb/mods-config/attr_filter/packetfence-post-auth"
key = "%{User-Name}"
relaxed = yes
}
# Loading module "attr_filter.packetfence_pre_proxy" from file /usr/local/pf/raddb/mods-enabled/attr_filter
attr_filter attr_filter.packetfence_pre_proxy {
filename = "/usr/local/pf/raddb/mods-config/attr_filter/packetfence-pre-proxy"
key = "%{User-Name}"
relaxed = yes
}
# Loaded module rlm_cache
# Loading module "cache_eap" from file /usr/local/pf/raddb/mods-enabled/cache_eap
cache cache_eap {
driver = "rlm_cache_rbtree"
key = "%{%{control:State}:-%{%{reply:State}:-%{State}}}"
ttl = 15
max_entries = 0
epoch = 0
add_stats = no
}
# Loading module "cache_ntlm" from file /usr/local/pf/raddb/mods-enabled/cache_ntlm
cache cache_ntlm {
driver = "rlm_cache_rbtree"
key = "%{User-Name}%{Calling-Station-Id}"
ttl = 300
max_entries = 0
epoch = 0
add_stats = no
}
# Loading module "cache_password" from file /usr/local/pf/raddb/mods-enabled/cache_password
cache cache_password {
driver = "rlm_cache_rbtree"
key = "%{User-Name}"
ttl = 3600
max_entries = 0
epoch = 0
add_stats = no
}
# Loading module "userprincipalname" from file /usr/local/pf/raddb/mods-enabled/cache_password
cache userprincipalname {
driver = "rlm_cache_rbtree"
key = "%{User-Name}"
ttl = 3600
max_entries = 0
epoch = 0
add_stats = no
}
# Loading module "PacketFence-NTCacheHash" from file /usr/local/pf/raddb/mods-enabled/cache_password
cache PacketFence-NTCacheHash {
driver = "rlm_cache_rbtree"
key = "%{User-Name}"
ttl = 10
max_entries = 0
epoch = 0
add_stats = no
}
# Loaded module rlm_chap
# Loading module "chap" from file /usr/local/pf/raddb/mods-enabled/chap
# Loaded module rlm_detail
# Loading module "detail" from file /usr/local/pf/raddb/mods-enabled/detail
detail {
filename = "/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d"
header = "%t"
permissions = 384
locking = no
escape_filenames = no
log_packet_header = no
}
# Loading module "auth_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
detail auth_log {
filename = "/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d"
header = "%t"
permissions = 384
locking = no
escape_filenames = no
log_packet_header = no
}
# Loading module "reply_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
detail reply_log {
filename = "/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d"
header = "%t"
permissions = 384
locking = no
escape_filenames = no
log_packet_header = no
}
# Loading module "pre_proxy_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
detail pre_proxy_log {
filename = "/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d"
header = "%t"
permissions = 384
locking = no
escape_filenames = no
log_packet_header = no
}
# Loading module "post_proxy_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
detail post_proxy_log {
filename = "/usr/local/pf/logs/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d"
header = "%t"
permissions = 384
locking = no
escape_filenames = no
log_packet_header = no
}
# Loaded module rlm_digest
# Loading module "digest" from file /usr/local/pf/raddb/mods-enabled/digest
# Loaded module rlm_dynamic_clients
# Loading module "dynamic_clients" from file /usr/local/pf/raddb/mods-enabled/dynamic_clients
# Loading module "echo" from file /usr/local/pf/raddb/mods-enabled/echo
exec echo {
wait = yes
program = "/bin/echo %{User-Name}"
input_pairs = "request"
output_pairs = "reply"
shell_escape = yes
}
# Loading module "exec" from file /usr/local/pf/raddb/mods-enabled/exec
exec {
wait = no
input_pairs = "request"
shell_escape = yes
timeout = 10
}
# Loaded module rlm_expiration
# Loading module "expiration" from file /usr/local/pf/raddb/mods-enabled/expiration
# Loaded module rlm_expr
# Loading module "expr" from file /usr/local/pf/raddb/mods-enabled/expr
expr {
safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /äéöüàâæçèéêëîïôœùûüaÿÄÉÖÜßÀÂÆÇÈÉÊËÎÏÔŒÙÛÜŸ"
}
# Loaded module rlm_files
# Loading module "files" from file /usr/local/pf/raddb/mods-enabled/files
files {
filename = "/usr/local/pf/raddb/mods-config/files/authorize"
acctusersfile = "/usr/local/pf/raddb/mods-config/files/accounting"
preproxy_usersfile = "/usr/local/pf/raddb/mods-config/files/pre-proxy"
}
# Loaded module rlm_linelog
# Loading module "linelog" from file /usr/local/pf/raddb/mods-enabled/linelog
linelog {
filename = "syslog"
escape_filenames = no
syslog_facility = "local1"
syslog_severity = "info"
permissions = 384
format = "This is a log message for %{User-Name}"
reference = "messages.%{%{reply:Packet-Type}:-default}"
}
# Loading module "log_accounting" from file /usr/local/pf/raddb/mods-enabled/linelog
linelog log_accounting {
filename = "syslog"
escape_filenames = no
syslog_facility = "local2"
syslog_severity = "info"
permissions = 384
format = ""
reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}"
}
instantiate {
# Instantiating module "redis" from file /usr/local/pf/raddb/mods-enabled/redis
rlm_redis (redis): Initialising connection pool
pool {
start = 0
min = 3
max = 64
spare = 10
uses = 0
lifetime = 86400
cleanup_interval = 300
idle_timeout = 600
retry_delay = 30
spread = no
}
# Instantiating module "rest" from file /usr/local/pf/raddb/mods-enabled/rest
authorize {
uri = "http://127.0.0.1:7070//radius/rest/filter"
method = "post"
body = "json"
auth = "none"
require_auth = no
timeout = 4.000000
chunk = 0
tls {
check_cert = yes
check_cert_cn = yes
}
}
authenticate {
uri = "http://127.0.0.1:7070//radius/rest/filter"
method = "post"
body = "json"
auth = "none"
require_auth = no
timeout = 4.000000
chunk = 0
tls {
check_cert = yes
check_cert_cn = yes
}
}
preacct {
uri = "http://127.0.0.1:7070//radius/rest/filter"
method = "post"
body = "json"
auth = "none"
require_auth = no
timeout = 4.000000
chunk = 0
tls {
check_cert = yes
check_cert_cn = yes
}
}
accounting {
uri = "http://127.0.0.1:7070//radius/rest/accounting"
method = "post"
body = "json"
auth = "none"
require_auth = no
timeout = 4.000000
chunk = 0
tls {
check_cert = yes
check_cert_cn = yes
}
}
pre-proxy {
uri = "http://127.0.0.1:7070//radius/rest/filter"
method = "post"
body = "json"
auth = "none"
require_auth = no
timeout = 4.000000
chunk = 0
tls {
check_cert = yes
check_cert_cn = yes
}
}
post-proxy {
uri = "http://127.0.0.1:7070//radius/rest/filter"
method = "post"
body = "json"
auth = "none"
require_auth = no
timeout = 4.000000
chunk = 0
tls {
check_cert = yes
check_cert_cn = yes
}
}
post-auth {
uri = "http://127.0.0.1:7070//radius/rest/authorize"
method = "post"
body = "json"
auth = "none"
require_auth = no
timeout = 4.000000
chunk = 0
tls {
check_cert = yes
check_cert_cn = yes
}
}
rlm_rest: libcurl version: libcurl/7.29.0 NSS/3.44 zlib/1.2.7 libidn/1.28 libssh2/1.8.0
rlm_rest (rest): Initialising connection pool
pool {
start = 0
min = 3
max = 64
spare = 10
uses = 0
lifetime = 0
cleanup_interval = 30
idle_timeout = 60
retry_delay = 30
spread = no
}
# Instantiating module "raw" from file /usr/local/pf/raddb/mods-enabled/raw
}
# Instantiating module "logintime" from file /usr/local/pf/raddb/mods-enabled/logintime
# Instantiating module "pap" from file /usr/local/pf/raddb/mods-enabled/pap
# Instantiating module "etc_passwd" from file /usr/local/pf/raddb/mods-enabled/passwd
rlm_passwd: nfields: 3 keyfield 0(User-Name) listable: no
# Instantiating module "perl" from file /usr/local/pf/raddb/mods-enabled/perl
# Instantiating module "packetfence" from file /usr/local/pf/raddb/mods-enabled/perl
# Instantiating module "packetfence-multi-domain" from file /usr/local/pf/raddb/mods-enabled/perl
# Instantiating module "reply_in_db" from file /usr/local/pf/raddb/mods-enabled/perl
# Instantiating module "preprocess" from file /usr/local/pf/raddb/mods-enabled/preprocess
reading pairlist file /usr/local/pf/raddb/mods-config/preprocess/huntgroups
reading pairlist file /usr/local/pf/raddb/mods-config/preprocess/hints
# Instantiating module "IPASS" from file /usr/local/pf/raddb/mods-enabled/realm
# Instantiating module "suffix" from file /usr/local/pf/raddb/mods-enabled/realm
# Instantiating module "realmpercent" from file /usr/local/pf/raddb/mods-enabled/realm
# Instantiating module "ntdomain" from file /usr/local/pf/raddb/mods-enabled/realm
# Instantiating module "redis_ntlm" from file /usr/local/pf/raddb/mods-enabled/redis
rlm_redis (redis_ntlm): Initialising connection pool
pool {
start = 0
min = 3
max = 64
spare = 10
uses = 0
lifetime = 86400
cleanup_interval = 300
idle_timeout = 600
retry_delay = 30
spread = no
}
# Instantiating module "eap" from file /usr/local/pf/raddb/mods-enabled/eap
# Linked to sub-module rlm_eap_md5
# Linked to sub-module rlm_eap_mschapv2
mschapv2 {
with_ntdomain_hack = no
send_error = no
}
# Linked to sub-module rlm_eap_peap
peap {
tls = "tls-common"
default_eap_type = "mschapv2"
copy_request_to_tunnel = yes
use_tunneled_reply = yes
proxy_tunneled_request_as_eap = yes
virtual_server = "packetfence-degraded-tunnel"
soh = no
require_client_cert = no
}
tls-config tls-common {
verify_depth = 0
pem_file_type = yes
private_key_file = "/usr/local/pf/conf/certmanager/radius_default_tls-common.key"
certificate_file = "/usr/local/pf/conf/certmanager/radius_default_tls-common.crt"
ca_file = "/usr/local/pf/conf/certmanager/radius_default_tls-common.pem"
dh_file = "/usr/local/pf/raddb/certs/dh"
fragment_size = 1024
include_length = yes
auto_chain = yes
check_crl = no
check_all_crl = no
cipher_list = "DEFAULT"
ecdh_curve = "prime256v1"
tls_max_version = ""
tls_min_version = "1.0"
cache {
enable = no
lifetime = 24
max_entries = 255
}
verify {
skip_if_ocsp_ok = no
}
ocsp {
enable = no
override_cert_url = yes
url = "http://127.0.0.1:22225/api/v1/pki/ocsp"
use_nonce = yes
timeout = 0
softfail = no
}
}
The configuration allows TLS 1.0 and/or TLS 1.1. We STRONGLY recommned using only TLS 1.2 for security
Please set: tls_min_version = "1.2"
# Linked to sub-module rlm_eap_tls
tls {
tls = "tls-common"
}
tls: Using cached TLS configuration from previous invocation
# Linked to sub-module rlm_eap_ttls
ttls {
tls = "tls-common"
default_eap_type = "md5"
copy_request_to_tunnel = yes
use_tunneled_reply = yes
virtual_server = "packetfence-tunnel"
include_length = yes
require_client_cert = no
}
tls: Using cached TLS configuration from previous invocation
# Instantiating module "eap-degraded" from file /usr/local/pf/raddb/mods-enabled/eap
# Linked to sub-module rlm_eap_md5
# Linked to sub-module rlm_eap_mschapv2
mschapv2 {
with_ntdomain_hack = no
send_error = no
}
# Linked to sub-module rlm_eap_peap
peap {
tls = "tls-common"
default_eap_type = "mschapv2"
copy_request_to_tunnel = yes
use_tunneled_reply = yes
proxy_tunneled_request_as_eap = yes
virtual_server = "packetfence-tunnel"
soh = no
require_client_cert = no
}
tls-config tls-common {
verify_depth = 0
pem_file_type = yes
private_key_file = "/usr/local/pf/conf/certmanager/radius_default_tls-common.key"
certificate_file = "/usr/local/pf/conf/certmanager/radius_default_tls-common.crt"
ca_file = "/usr/local/pf/conf/certmanager/radius_default_tls-common.pem"
dh_file = "/usr/local/pf/raddb/certs/dh"
fragment_size = 1024
include_length = yes
auto_chain = yes
check_crl = no
check_all_crl = no
cipher_list = "DEFAULT"
ecdh_curve = "prime256v1"
tls_max_version = ""
tls_min_version = "1.0"
cache {
enable = no
lifetime = 24
max_entries = 255
}
verify {
skip_if_ocsp_ok = no
}
ocsp {
enable = no
override_cert_url = yes
url = "http://127.0.0.1:22225/api/v1/pki/ocsp"
use_nonce = yes
timeout = 0
softfail = no
}
}
The configuration allows TLS 1.0 and/or TLS 1.1. We STRONGLY recommned using only TLS 1.2 for security
Please set: tls_min_version = "1.2"
# Linked to sub-module rlm_eap_tls
tls {
tls = "tls-common"
}
tls: Using cached TLS configuration from previous invocation
# Linked to sub-module rlm_eap_ttls
ttls {
tls = "tls-common"
default_eap_type = "md5"
copy_request_to_tunnel = yes
use_tunneled_reply = yes
virtual_server = "packetfence-degraded-tunnel"
include_length = yes
require_client_cert = no
}
tls: Using cached TLS configuration from previous invocation
# Instantiating module "rest-cli" from file /usr/local/pf/raddb/mods-enabled/rest
authorize {
uri = "http://127.0.0.1:7070//radius/rest/switch/authorize"
method = "post"
body = "json"
auth = "none"
require_auth = no
timeout = 4.000000
chunk = 0
tls {
check_cert = yes
check_cert_cn = yes
}
}
authenticate {
uri = ""
method = "GET"
body = "none"
auth = "none"
require_auth = no
timeout = 4.000000
chunk = 0
tls {
check_cert = yes
check_cert_cn = yes
}
}
accounting {
uri = ""
method = "GET"
body = "none"
auth = "none"
require_auth = no
timeout = 4.000000
chunk = 0
tls {
check_cert = yes
check_cert_cn = yes
}
}
post-auth {
uri = ""
method = "GET"
body = "none"
auth = "none"
require_auth = no
timeout = 4.000000
chunk = 0
tls {
check_cert = yes
check_cert_cn = yes
}
}
rlm_rest (rest-cli): Initialising connection pool
pool {
start = 0
min = 3
max = 64
spare = 10
uses = 0
lifetime = 0
cleanup_interval = 30
idle_timeout = 60
retry_delay = 30
spread = no
}
# Instantiating module "sql" from file /usr/local/pf/raddb/mods-enabled/sql
rlm_sql_mysql: libmysql version: 10.1.21-MariaDB
mysql {
tls {
tls_required = no
}
warnings = "auto"
}
rlm_sql (sql): Attempting to connect to database "pf"
rlm_sql (sql): Initialising connection pool
pool {
start = 0
min = 3
max = 64
spare = 10
uses = 0
lifetime = 0
cleanup_interval = 30
idle_timeout = 60
retry_delay = 30
spread = no
}
rlm_sql (sql): Processing generate_sql_clients
rlm_sql (sql) in generate_sql_clients: query is SELECT id, nasname, shortname, type, secret, server, tenant_id FROM radius_nas where 1=0
rlm_sql (sql): 0 of 0 connections in use. You may need to increase "spare"
rlm_sql (sql): Opening additional connection (0), 1 of 64 pending slots used
rlm_sql_mysql: Starting connect to MySQL server
rlm_sql_mysql: Connected to database 'pf' on 127.0.0.1 via TCP/IP, server version 10.1.21-MariaDB, protocol version 10
rlm_sql (sql): Reserved connection (0)
rlm_sql (sql): Executing select query: SELECT id, nasname, shortname, type, secret, server, tenant_id FROM radius_nas where 1=0
rlm_sql (sql): Released connection (0)
Need 2 more connections to reach min connections (3)
rlm_sql (sql): Opening additional connection (1), 1 of 63 pending slots used
rlm_sql_mysql: Starting connect to MySQL server
rlm_sql_mysql: Connected to database 'pf' on 127.0.0.1 via TCP/IP, server version 10.1.21-MariaDB, protocol version 10
# Instantiating module "pfguest" from file /usr/local/pf/raddb/mods-enabled/sql
mysql {
tls {
tls_required = no
}
warnings = "auto"
}
rlm_sql (pfguest): Attempting to connect to database "pf"
# Instantiating module "pfsponsor" from file /usr/local/pf/raddb/mods-enabled/sql
mysql {
tls {
tls_required = no
}
warnings = "auto"
}
rlm_sql (pfsponsor): Attempting to connect to database "pf"
# Instantiating module "pfsms" from file /usr/local/pf/raddb/mods-enabled/sql
mysql {
tls {
tls_required = no
}
warnings = "auto"
}
rlm_sql (pfsms): Attempting to connect to database "pf"
# Instantiating module "pflocal" from file /usr/local/pf/raddb/mods-enabled/sql
mysql {
tls {
tls_required = no
}
warnings = "auto"
}
rlm_sql (pflocal): Attempting to connect to database "pf"
# Instantiating module "sql_reject" from file /usr/local/pf/raddb/mods-enabled/sql
rlm_sql (sql_reject): groupmemb_query is empty. Please delete it from the configuration
rlm_sql (sql_reject): authorize_check_query is empty. Please delete it from the configuration
mysql {
tls {
tls_required = no
}
warnings = "auto"
}
rlm_sql (sql_reject): Attempting to connect to database "pf"
# Instantiating module "sql_degraded" from file /usr/local/pf/raddb/mods-enabled/sql
rlm_sql (sql_degraded): groupmemb_query is empty. Please delete it from the configuration
mysql {
tls {
tls_required = no
}
warnings = "auto"
}
rlm_sql (sql_degraded): Attempting to connect to database "pf"
# Instantiating module "mschap" from file /usr/local/pf/raddb/mods-enabled/mschap
rlm_mschap (mschap): authenticating by calling 'ntlm_auth'
# Instantiating module "chrooted_mschap" from file /usr/local/pf/raddb/mods-enabled/mschap
rlm_mschap (chrooted_mschap): authenticating by calling 'ntlm_auth'
# Instantiating module "chrooted_mschap_machine" from file /usr/local/pf/raddb/mods-enabled/mschap
rlm_mschap (chrooted_mschap_machine): authenticating by calling 'ntlm_auth'
# Instantiating module "mschap_machine" from file /usr/local/pf/raddb/mods-enabled/mschap
rlm_mschap (mschap_machine): authenticating by calling 'ntlm_auth'
# Instantiating module "mschap_local" from file /usr/local/pf/raddb/mods-enabled/mschap
rlm_mschap (mschap_local): using internal authentication
# Instantiating module "reject" from file /usr/local/pf/raddb/mods-enabled/always
# Instantiating module "fail" from file /usr/local/pf/raddb/mods-enabled/always
# Instantiating module "ok" from file /usr/local/pf/raddb/mods-enabled/always
# Instantiating module "handled" from file /usr/local/pf/raddb/mods-enabled/always
# Instantiating module "invalid" from file /usr/local/pf/raddb/mods-enabled/always
# Instantiating module "userlock" from file /usr/local/pf/raddb/mods-enabled/always
# Instantiating module "notfound" from file /usr/local/pf/raddb/mods-enabled/always
# Instantiating module "noop" from file /usr/local/pf/raddb/mods-enabled/always
# Instantiating module "updated" from file /usr/local/pf/raddb/mods-enabled/always
# Instantiating module "attr_filter.post-proxy" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/post-proxy
# Instantiating module "attr_filter.pre-proxy" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/pre-proxy
# Instantiating module "attr_filter.access_reject" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/access_reject
[/usr/local/pf/raddb/mods-config/attr_filter/access_reject]:11 Check item "FreeRADIUS-Response-Delay" found in filter list for realm "DEFAULT".
[/usr/local/pf/raddb/mods-config/attr_filter/access_reject]:11 Check item "FreeRADIUS-Response-Delay-USec" found in filter list for realm "DEFAULT".
# Instantiating module "attr_filter.access_challenge" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/access_challenge
# Instantiating module "attr_filter.accounting_response" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/accounting_response
# Instantiating module "attr_filter.packetfence_post_auth" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/packetfence-post-auth
# Instantiating module "attr_filter.packetfence_pre_proxy" from file /usr/local/pf/raddb/mods-enabled/attr_filter
reading pairlist file /usr/local/pf/raddb/mods-config/attr_filter/packetfence-pre-proxy
# Instantiating module "cache_eap" from file /usr/local/pf/raddb/mods-enabled/cache_eap
rlm_cache (cache_eap): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked
# Instantiating module "cache_ntlm" from file /usr/local/pf/raddb/mods-enabled/cache_ntlm
rlm_cache (cache_ntlm): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked
# Instantiating module "cache_password" from file /usr/local/pf/raddb/mods-enabled/cache_password
rlm_cache (cache_password): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked
# Instantiating module "userprincipalname" from file /usr/local/pf/raddb/mods-enabled/cache_password
rlm_cache (userprincipalname): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked
# Instantiating module "PacketFence-NTCacheHash" from file /usr/local/pf/raddb/mods-enabled/cache_password
rlm_cache (PacketFence-NTCacheHash): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked
# Instantiating module "detail" from file /usr/local/pf/raddb/mods-enabled/detail
# Instantiating module "auth_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
rlm_detail (auth_log): 'User-Password' suppressed, will not appear in detail output
# Instantiating module "reply_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
# Instantiating module "pre_proxy_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
# Instantiating module "post_proxy_log" from file /usr/local/pf/raddb/mods-enabled/detail.log
# Instantiating module "expiration" from file /usr/local/pf/raddb/mods-enabled/expiration
# Instantiating module "files" from file /usr/local/pf/raddb/mods-enabled/files
reading pairlist file /usr/local/pf/raddb/mods-config/files/authorize
reading pairlist file /usr/local/pf/raddb/mods-config/files/accounting
reading pairlist file /usr/local/pf/raddb/mods-config/files/pre-proxy
# Instantiating module "linelog" from file /usr/local/pf/raddb/mods-enabled/linelog
# Instantiating module "log_accounting" from file /usr/local/pf/raddb/mods-enabled/linelog
} # modules
auth: #### Loading Virtual Servers ####
server { # from file /usr/local/pf/raddb/auth.conf
} # server
server packetfence { # from file /usr/local/pf/raddb/sites-enabled/packetfence
# Loading authenticate {...}
# Loading authorize {...}
# Loading preacct {...}
# Loading accounting {...}
# Loading pre-proxy {...}
# Loading post-proxy {...}
# Loading post-auth {...}
} # server packetfence
server pf-remote { # from file /usr/local/pf/raddb/sites-enabled/packetfence
# Loading authorize {...}
# Loading accounting {...}
# Loading post-proxy {...}
} # server pf-remote
server pf.degraded { # from file /usr/local/pf/raddb/sites-enabled/packetfence
# Loading authenticate {...}
# Loading authorize {...}
# Loading preacct {...}
# Loading accounting {...}
# Loading post-proxy {...}
# Loading post-auth {...}
} # server pf.degraded
server packetfence-degraded-tunnel { # from file /usr/local/pf/raddb/sites-enabled/packetfence
# Loading authenticate {...}
# Loading authorize {...}
# Loading session {...}
# Loading post-proxy {...}
# Loading post-auth {...}
} # server packetfence-degraded-tunnel
server packetfence-tunnel { # from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
# Loading authenticate {...}
# Loading authorize {...}
# Loading session {...}
# Loading post-proxy {...}
# Loading post-auth {...}
} # server packetfence-tunnel
server packetfence-tunnel-fast { # from file /usr/local/pf/raddb/sites-enabled/packetfence-tunnel
# Loading authenticate {...}
# Loading authorize {...}
# Loading session {...}
# Loading post-proxy {...}
# Loading post-auth {...}
} # server packetfence-tunnel-fast
server packetfence-cli { # from file /usr/local/pf/raddb/sites-enabled/packetfence-cli
# Loading authenticate {...}
# Loading authorize {...}
# Loading accounting {...}
# Loading post-proxy {...}
# Loading post-auth {...}
} # server packetfence-cli
server dynamic_clients { # from file /usr/local/pf/raddb/sites-enabled/dynamic-clients
# Loading authorize {...}
} # server dynamic_clients
server status { # from file /usr/local/pf/raddb/sites-enabled/status
# Loading authorize {...}
} # server status
server pf.cluster { # from file /usr/local/pf/raddb/sites-enabled/packetfence-cluster
# Loading authorize {...}
# Loading accounting {...}
# Loading post-proxy {...}
} # server pf.cluster
server pfcli.cluster { # from file /usr/local/pf/raddb/sites-enabled/packetfence-cluster
# Loading authorize {...}
# Loading post-proxy {...}
} # server pfcli.cluster
thread pool {
start_servers = 0
max_servers = 64
min_spare_servers = 3
max_spare_servers = 10
max_requests_per_server = 0
cleanup_delay = 5
max_queue_size = 65536
auto_limit_acct = no
}
Thread pool initialized
auth: #### Opening IP addresses and Ports ####
listen {
type = "status"
virtual_server = "status"
ipaddr = 127.0.0.1
port = 18121
client admin {
ipaddr = 127.0.0.1
require_message_authenticator = no
secret = <<< secret >>>
limit {
max_connections = 16
lifetime = 0
idle_timeout = 30
}
}
}
listen {
type = "auth"
virtual_server = "pf-remote"
ipaddr = 172.20.135.4
port = 0
}
listen {
type = "auth+acct"
virtual_server = "packetfence"
ipaddr = 172.20.135.4
port = 2083
proto = "tcp"
tls {
verify_depth = 0
ca_path = "/usr/local/pf/raddb/certs"
pem_file_type = yes
private_key_file = "/usr/local/pf/raddb/certs/server.key"
certificate_file = "/usr/local/pf/raddb/certs/server.crt"
ca_file = "/usr/local/pf/raddb/certs/ca.pem"
dh_file = "/usr/local/pf/raddb/certs/dh"
fragment_size = 8192
include_length = yes
auto_chain = yes
check_crl = no
check_all_crl = no
cipher_list = "DEFAULT"
require_client_cert = yes
ecdh_curve = "prime256v1"
tls_max_version = ""
tls_min_version = "1.0"
cache {
enable = no
lifetime = 24
max_entries = 255
}
verify {
skip_if_ocsp_ok = no
}
ocsp {
enable = no
override_cert_url = no
use_nonce = yes
timeout = 0
softfail = no
}
}
The configuration allows TLS 1.0 and/or TLS 1.1. We STRONGLY recommned using only TLS 1.2 for security
Please set: tls_min_version = "1.2"
limit {
max_connections = 16
lifetime = 0
idle_timeout = 30
}
}
listen {
type = "control"
listen {
socket = "/usr/local/pf/var/run/radiusd.sock"
mode = "rw"
peercred = yes
}
}
Listening on status address 127.0.0.1 port 18121 bound to server status
Listening on auth address 172.20.135.4 port 1812 bound to server pf-remote
Listening on auth+acct proto tcp address 172.20.135.4 port 2083 (TLS) bound to server packetfence
Listening on command file /usr/local/pf/var/run/radiusd.sock
Listening on proxy address * port 46609
Ready to process requests
Threads: Spawning 3 spares
Thread spawned new child 1. Total threads in pool: 1
Thread spawned new child 2. Total threads in pool: 2
Thread 1 waiting to be assigned a request
Thread spawned new child 3. Total threads in pool: 3
Thread 2 waiting to be assigned a request
Thread 2 got semaphore
Waking up in 0.3 seconds.
Thread 2 handling request 0, (1 handled so far)
Thread 3 waiting to be assigned a request
(0) Received Access-Request Id 70 from 172.20.135.5:58688 to 172.20.135.4:1812 length 243
(0) User-Name = "64-76-ba-89-71-4c"
(0) User-Password = "64-76-ba-89-71-4c"
(0) NAS-IP-Address = 172.20.110.250
(0) NAS-Port = 0
(0) Service-Type = Call-Check
(0) Called-Station-Id = "00:1a:1e:01:68:f8"
(0) Calling-Station-Id = "64:76:ba:89:71:4c"
(0) NAS-Port-Type = Wireless-802.11
(0) Aruba-Essid-Name = "CPS-District"
(0) Aruba-Location-Id = "MS-A181"
(0) Aruba-AP-Group = "MS"
(0) PacketFence-KeyBalanced = "2cab901e9652f08e98b274d193485eb3"
(0) Message-Authenticator = 0xa6f70b05137e44e089e1f208ec6f6196
(0) Proxy-State = 0x323334
(0) # Executing section authorize from file /usr/local/pf/raddb/sites-enabled/packetfence
(0) authorize {
(0) update control {
(0) EXPAND %{Calling-Station-Id}
(0) --> 64:76:ba:89:71:4c
(0) Load-Balance-Key := 64:76:ba:89:71:4c
(0) Proxy-To-Realm := "remote"
(0) } # update control = noop
(0) if (!NAS-IP-Address){
(0) if (!NAS-IP-Address) -> FALSE
(0) } # authorize = noop
(0) Starting proxy to home server 172.20.135.10 port 1812
(0) server pf-remote {
(0) }
(0) Proxying request to home server 172.20.135.10 port 1812 timeout 6.000000
Listening on proxy address 172.20.135.4 port 50053
Waking up in 0.3 seconds.
(0) Sent Access-Request Id 218 from 172.20.135.4:50053 to 172.20.135.10:1812 length 247
(0) User-Name = "64-76-ba-89-71-4c"
(0) User-Password = "64-76-ba-89-71-4c"
(0) NAS-IP-Address = 172.20.110.250
(0) NAS-Port = 0
(0) Service-Type = Call-Check
(0) Called-Station-Id = "00:1a:1e:01:68:f8"
(0) Calling-Station-Id = "64:76:ba:89:71:4c"
(0) NAS-Port-Type = Wireless-802.11
(0) Aruba-Essid-Name = "CPS-District"
(0) Aruba-Location-Id = "MS-A181"
(0) Aruba-AP-Group = "MS"
(0) PacketFence-KeyBalanced = "2cab901e9652f08e98b274d193485eb3"
(0) Message-Authenticator = 0xa6f70b05137e44e089e1f208ec6f6196
(0) Proxy-State = 0x323334
(0) Proxy-State = 0x3730
Thread 2 waiting to be assigned a request
(0) Marking home server 172.20.135.10 port 1812 alive
Threads: total/active/spare threads = 3/0/3
Waking up in 0.3 seconds.
Thread 3 got semaphore
Thread 3 handling request 0, (1 handled so far)
(0) Clearing existing &reply: attributes
(0) Received Access-Accept Id 218 from 172.20.135.10:1812 to 172.20.135.4:50053 length 46
(0) Tunnel-Type:0 = VLAN
(0) Tunnel-Private-Group-Id:0 = "135"
(0) Tunnel-Medium-Type:0 = IEEE-802
(0) Proxy-State = 0x323334
(0) Proxy-State = 0x3730
(0) server pf-remote {
(0) # Executing section post-proxy from file /usr/local/pf/raddb/sites-enabled/packetfence
(0) post-proxy {
(0) update control {
(0) EXPAND %{home_server:ipaddr}
(0) --> 172.20.135.10
(0) PacketFence-Proxied-To := 172.20.135.10
(0) } # update control = noop
(0) if (&proxy-reply:Packet-Type == Access-Accept) {
(0) EXPAND &proxy-reply:Packet-Type
(0) --> Access-Accept
(0) if (&proxy-reply:Packet-Type == Access-Accept) -> TRUE
(0) if (&proxy-reply:Packet-Type == Access-Accept) {
rlm_sql (sql): Reserved connection (0)
rlm_sql (sql): Released connection (0)
Need 1 more connections to reach min connections (3)
rlm_sql (sql): Opening additional connection (2), 1 of 62 pending slots used
rlm_sql_mysql: Starting connect to MySQL server
rlm_sql_mysql: Connected to database 'pf' on 127.0.0.1 via TCP/IP, server version 10.1.21-MariaDB, protocol version 10
(0) EXPAND %{User-Name}
(0) --> 64-76-ba-89-71-4c
(0) SQL-User-Name set to '64-76-ba-89-71-4c'
rlm_sql (sql): Reserved connection (1)
(0) Executing query: DELETE FROM radreply where username="64:76:ba:89:71:4c"
(0) SQL query affected no rows
rlm_sql (sql): Released connection (1)
(0) EXPAND %{sql_degraded:DELETE FROM radreply where username="%{Calling-Station-Id}"}
(0) -->
(0) reply_in_db: $RAD_REQUEST{'User-Name'} = &request:User-Name -> '64-76-ba-89-71-4c'
(0) reply_in_db: $RAD_REQUEST{'User-Password'} = &request:User-Password -> '64-76-ba-89-71-4c'
(0) reply_in_db: $RAD_REQUEST{'NAS-IP-Address'} = &request:NAS-IP-Address -> '172.20.110.250'
(0) reply_in_db: $RAD_REQUEST{'NAS-Port'} = &request:NAS-Port -> '0'
(0) reply_in_db: $RAD_REQUEST{'Service-Type'} = &request:Service-Type -> 'Call-Check'
(0) reply_in_db: $RAD_REQUEST{'Called-Station-Id'} = &request:Called-Station-Id -> '00:1a:1e:01:68:f8'
(0) reply_in_db: $RAD_REQUEST{'Calling-Station-Id'} = &request:Calling-Station-Id -> '64:76:ba:89:71:4c'
(0) reply_in_db: $RAD_REQUEST{'Proxy-State'} = &request:Proxy-State -> '0x323334'
(0) reply_in_db: $RAD_REQUEST{'NAS-Port-Type'} = &request:NAS-Port-Type -> 'Wireless-802.11'
(0) reply_in_db: $RAD_REQUEST{'Message-Authenticator'} = &request:Message-Authenticator -> '0xa6f70b05137e44e089e1f208ec6f6196'
(0) reply_in_db: $RAD_REQUEST{'Aruba-Essid-Name'} = &request:Aruba-Essid-Name -> 'CPS-District'
(0) reply_in_db: $RAD_REQUEST{'Aruba-Location-Id'} = &request:Aruba-Location-Id -> 'MS-A181'
(0) reply_in_db: $RAD_REQUEST{'Aruba-AP-Group'} = &request:Aruba-AP-Group -> 'MS'
(0) reply_in_db: $RAD_REQUEST{'Realm'} = &request:Realm -> 'remote'
(0) reply_in_db: $RAD_REQUEST{'SQL-User-Name'} = &request:SQL-User-Name -> '64-76-ba-89-71-4c'
(0) reply_in_db: $RAD_REQUEST{'PacketFence-KeyBalanced'} = &request:PacketFence-KeyBalanced -> '2cab901e9652f08e98b274d193485eb3'
(0) reply_in_db: $RAD_CHECK{'Load-Balance-Key'} = &control:Load-Balance-Key -> '64:76:ba:89:71:4c'
(0) reply_in_db: $RAD_CHECK{'Proxy-To-Realm'} = &control:Proxy-To-Realm -> 'remote'
(0) reply_in_db: $RAD_CHECK{'PacketFence-Proxied-To'} = &control:PacketFence-Proxied-To -> '172.20.135.10'
(0) reply_in_db: $RAD_CONFIG{'Load-Balance-Key'} = &control:Load-Balance-Key -> '64:76:ba:89:71:4c'
(0) reply_in_db: $RAD_CONFIG{'Proxy-To-Realm'} = &control:Proxy-To-Realm -> 'remote'
(0) reply_in_db: $RAD_CONFIG{'PacketFence-Proxied-To'} = &control:PacketFence-Proxied-To -> '172.20.135.10'
(0) reply_in_db: $RAD_REQUEST_PROXY{'User-Name'} = &proxy-request:User-Name -> '64-76-ba-89-71-4c'
(0) reply_in_db: $RAD_REQUEST_PROXY{'User-Password'} = &proxy-request:User-Password -> '64-76-ba-89-71-4c'
(0) reply_in_db: $RAD_REQUEST_PROXY{'NAS-IP-Address'} = &proxy-request:NAS-IP-Address -> '172.20.110.250'
(0) reply_in_db: $RAD_REQUEST_PROXY{'NAS-Port'} = &proxy-request:NAS-Port -> '0'
(0) reply_in_db: $RAD_REQUEST_PROXY{'Service-Type'} = &proxy-request:Service-Type -> 'Call-Check'
(0) reply_in_db: $RAD_REQUEST_PROXY{'Called-Station-Id'} = &proxy-request:Called-Station-Id -> '00:1a:1e:01:68:f8'
(0) reply_in_db: $RAD_REQUEST_PROXY{'Calling-Station-Id'} = &proxy-request:Calling-Station-Id -> '64:76:ba:89:71:4c'
(0) reply_in_db: $RAD_REQUEST_PROXY{'Proxy-State'}[0] = &proxy-request:Proxy-State -> '0x3730'
(0) reply_in_db: $RAD_REQUEST_PROXY{'Proxy-State'}[1] = &proxy-request:Proxy-State -> '0x323334'
(0) reply_in_db: $RAD_REQUEST_PROXY{'NAS-Port-Type'} = &proxy-request:NAS-Port-Type -> 'Wireless-802.11'
(0) reply_in_db: $RAD_REQUEST_PROXY{'Message-Authenticator'} = &proxy-request:Message-Authenticator -> '0xa6f70b05137e44e089e1f208ec6f6196'
(0) reply_in_db: $RAD_REQUEST_PROXY{'Aruba-Essid-Name'} = &proxy-request:Aruba-Essid-Name -> 'CPS-District'
(0) reply_in_db: $RAD_REQUEST_PROXY{'Aruba-Location-Id'} = &proxy-request:Aruba-Location-Id -> 'MS-A181'
(0) reply_in_db: $RAD_REQUEST_PROXY{'Aruba-AP-Group'} = &proxy-request:Aruba-AP-Group -> 'MS'
(0) reply_in_db: $RAD_REQUEST_PROXY{'PacketFence-KeyBalanced'} = &proxy-request:PacketFence-KeyBalanced -> '2cab901e9652f08e98b274d193485eb3'
(0) reply_in_db: $RAD_REQUEST_PROXY_REPLY{'Proxy-State'}[0] = &proxy-reply:Proxy-State -> '0x323334'
(0) reply_in_db: $RAD_REQUEST_PROXY_REPLY{'Proxy-State'}[1] = &proxy-reply:Proxy-State -> '0x3730'
(0) reply_in_db: $RAD_REQUEST_PROXY_REPLY{'Tunnel-Type'} = &proxy-reply:Tunnel-Type -> 'VLAN'
(0) reply_in_db: $RAD_REQUEST_PROXY_REPLY{'Tunnel-Medium-Type'} = &proxy-reply:Tunnel-Medium-Type -> 'IEEE-802'
(0) reply_in_db: $RAD_REQUEST_PROXY_REPLY{'Tunnel-Private-Group-Id'} = &proxy-reply:Tunnel-Private-Group-Id -> '135'
(0) reply_in_db: &request:NAS-Port-Type = $RAD_REQUEST{'NAS-Port-Type'} -> 'Wireless-802.11'
(0) reply_in_db: &request:Proxy-State = $RAD_REQUEST{'Proxy-State'} -> '0x323334'
(0) reply_in_db: &request:Service-Type = $RAD_REQUEST{'Service-Type'} -> 'Call-Check'
(0) reply_in_db: &request:Called-Station-Id = $RAD_REQUEST{'Called-Station-Id'} -> '00:1a:1e:01:68:f8'
(0) reply_in_db: &request:Message-Authenticator = $RAD_REQUEST{'Message-Authenticator'} -> '0xa6f70b05137e44e089e1f208ec6f6196'
(0) reply_in_db: &request:Realm = $RAD_REQUEST{'Realm'} -> 'remote'
(0) reply_in_db: &request:NAS-IP-Address = $RAD_REQUEST{'NAS-IP-Address'} -> '172.20.110.250'
(0) reply_in_db: &request:SQL-User-Name = $RAD_REQUEST{'SQL-User-Name'} -> '64-76-ba-89-71-4c'
(0) reply_in_db: &request:Calling-Station-Id = $RAD_REQUEST{'Calling-Station-Id'} -> '64:76:ba:89:71:4c'
(0) reply_in_db: &request:Aruba-Essid-Name = $RAD_REQUEST{'Aruba-Essid-Name'} -> 'CPS-District'
(0) reply_in_db: &request:PacketFence-KeyBalanced = $RAD_REQUEST{'PacketFence-KeyBalanced'} -> '2cab901e9652f08e98b274d193485eb3'
(0) reply_in_db: &request:Aruba-AP-Group = $RAD_REQUEST{'Aruba-AP-Group'} -> 'MS'
(0) reply_in_db: &request:User-Name = $RAD_REQUEST{'User-Name'} -> '64-76-ba-89-71-4c'
(0) reply_in_db: &request:Aruba-Location-Id = $RAD_REQUEST{'Aruba-Location-Id'} -> 'MS-A181'
(0) reply_in_db: &request:User-Password = $RAD_REQUEST{'User-Password'} -> '64-76-ba-89-71-4c'
(0) reply_in_db: &request:NAS-Port = $RAD_REQUEST{'NAS-Port'} -> '0'
(0) reply_in_db: &control:PacketFence-Proxied-To = $RAD_CHECK{'PacketFence-Proxied-To'} -> '172.20.135.10'
(0) reply_in_db: &control:Load-Balance-Key = $RAD_CHECK{'Load-Balance-Key'} -> '64:76:ba:89:71:4c'
(0) reply_in_db: &control:PacketFence-reply-insert = $RAD_CHECK{'PacketFence-reply-insert'} -> 'INSERT into radreply (username, attribute, value) values ('64:76:ba:89:71:4c','Tunnel-Medium-Type:0','IEEE-802'), ('64:76:ba:89:71:4c','Tunnel-Private-Group-Id:0','135'), ('64:76:ba:89:71:4c','Tunnel-Type:0','VLAN')'
(0) reply_in_db: &control:Proxy-To-Realm = $RAD_CHECK{'Proxy-To-Realm'} -> 'remote'
(0) reply_in_db: &proxy-request:NAS-Port-Type = $RAD_REQUEST_PROXY{'NAS-Port-Type'} -> 'Wireless-802.11'
(0) reply_in_db: &proxy-request:Proxy-State += $RAD_REQUEST_PROXY{'Proxy-State'} -> '0x3730'
(0) reply_in_db: &proxy-request:Proxy-State += $RAD_REQUEST_PROXY{'Proxy-State'} -> '0x323334'
(0) reply_in_db: &proxy-request:Service-Type = $RAD_REQUEST_PROXY{'Service-Type'} -> 'Call-Check'
(0) reply_in_db: &proxy-request:Aruba-Essid-Name = $RAD_REQUEST_PROXY{'Aruba-Essid-Name'} -> 'CPS-District'
(0) reply_in_db: &proxy-request:Calling-Station-Id = $RAD_REQUEST_PROXY{'Calling-Station-Id'} -> '64:76:ba:89:71:4c'
(0) reply_in_db: &proxy-request:Called-Station-Id = $RAD_REQUEST_PROXY{'Called-Station-Id'} -> '00:1a:1e:01:68:f8'
(0) reply_in_db: &proxy-request:PacketFence-KeyBalanced = $RAD_REQUEST_PROXY{'PacketFence-KeyBalanced'} -> '2cab901e9652f08e98b274d193485eb3'
(0) reply_in_db: &proxy-request:Message-Authenticator = $RAD_REQUEST_PROXY{'Message-Authenticator'} -> '0xa6f70b05137e44e089e1f208ec6f6196'
(0) reply_in_db: &proxy-request:Aruba-AP-Group = $RAD_REQUEST_PROXY{'Aruba-AP-Group'} -> 'MS'
(0) reply_in_db: &proxy-request:Aruba-Location-Id = $RAD_REQUEST_PROXY{'Aruba-Location-Id'} -> 'MS-A181'
(0) reply_in_db: &proxy-request:User-Name = $RAD_REQUEST_PROXY{'User-Name'} -> '64-76-ba-89-71-4c'
(0) reply_in_db: &proxy-request:User-Password = $RAD_REQUEST_PROXY{'User-Password'} -> '64-76-ba-89-71-4c'
(0) reply_in_db: &proxy-request:NAS-IP-Address = $RAD_REQUEST_PROXY{'NAS-IP-Address'} -> '172.20.110.250'
(0) reply_in_db: &proxy-request:NAS-Port = $RAD_REQUEST_PROXY{'NAS-Port'} -> '0'
(0) reply_in_db: &proxy-reply:Tunnel-Private-Group-Id:0 = $RAD_REQUEST_PROXY_REPLY{'Tunnel-Private-Group-Id:0'} -> '135'
(0) reply_in_db: &proxy-reply:Tunnel-Medium-Type:0 = $RAD_REQUEST_PROXY_REPLY{'Tunnel-Medium-Type:0'} -> 'IEEE-802'
(0) reply_in_db: &proxy-reply:Tunnel-Type:0 = $RAD_REQUEST_PROXY_REPLY{'Tunnel-Type:0'} -> 'VLAN'
(0) reply_in_db: &proxy-reply:Proxy-State += $RAD_REQUEST_PROXY_REPLY{'Proxy-State'} -> '0x323334'
(0) reply_in_db: &proxy-reply:Proxy-State += $RAD_REQUEST_PROXY_REPLY{'Proxy-State'} -> '0x3730'
(0) [reply_in_db] = ok
rlm_sql (sql): Reserved connection (0)
rlm_sql (sql): Released connection (0)
(0) EXPAND %{User-Name}
(0) --> 64-76-ba-89-71-4c
(0) SQL-User-Name set to '64-76-ba-89-71-4c'
rlm_sql (sql): Reserved connection (2)
(0) Executing query: INSERT into radreply =28username=2C attribute=2C value=29 values =28=2764:76:ba:89:71:4c=27=2C=27Tunnel-Medium-Type:0=27=2C=27IEEE-802=27=29=2C =28=2764:76:ba:89:71:4c=27=2C=27Tunnel-Private-Group-Id:0=27=2C=27135=27=29=2C =28=2764:76:ba:89:71:4c=27=2C=27Tunnel-Type:0=27=2C=27VLAN=27=29
(0) ERROR: rlm_sql_mysql: ERROR 1064 (You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near '=28username=2C attribute=2C value=29 values =28=2764:76:ba:89:71:4c=27=2C=27Tunn' at line 1): 42000
(0) ERROR: SQL query failed: server error
rlm_sql (sql): Released connection (2)
(0) EXPAND %{sql_degraded:%{control:PacketFence-reply-insert}}
(0) -->
(0) } # if (&proxy-reply:Packet-Type == Access-Accept) = ok
(0) ... skipping else: Preceding "if" was taken
(0) attr_filter.packetfence_post_auth: EXPAND %{User-Name}
(0) attr_filter.packetfence_post_auth: --> 64-76-ba-89-71-4c
(0) attr_filter.packetfence_post_auth: Matched entry DEFAULT at line 10
(0) [attr_filter.packetfence_post_auth] = updated
(0) } # post-proxy = updated
(0) }
(0) Found Auth-Type = Accept
(0) Auth-Type = Accept, accepting the user
(0) Login OK: [64-76-ba-89-71-4c] (from client pf port 0 cli 64:76:ba:89:71:4c)
(0) Sent Access-Accept Id 70 from 172.20.135.4:1812 to 172.20.135.5:58688 length 0
(0) Tunnel-Private-Group-Id:0 = "135"
(0) Tunnel-Medium-Type:0 = IEEE-802
(0) Tunnel-Type:0 = VLAN
(0) Proxy-State = 0x323334
(0) Finished request
Thread 3 waiting to be assigned a request
Waking up in 4.6 seconds.
-------------- next part --------------
sql {
driver = "rlm_sql_mysql"
safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /(),'"
dialect = "mysql"
server = "127.0.0.1"
port = 3306
login = "pf"
password = "inverse"
radius_db = "pf"
acct_table1 = "radacct"
acct_table2 = "radacct"
postauth_table = "radpostauth"
authcheck_table = "radcheck"
groupcheck_table = "radgroupcheck"
authreply_table = "radreply"
groupreply_table = "radgroupreply"
usergroup_table = "radusergroup"
delete_stale_sessions = yes
pool {
start = ${thread[pool].start_servers}
min = ${thread[pool].min_spare_servers}
max = ${thread[pool].max_servers}
spare = ${thread[pool].max_spare_servers}
uses = 0
retry_delay = 30
lifetime = 0
idle_timeout = 60
}
read_clients = yes
client_table = "radius_nas"
group_attribute = "SQL-Group"
$INCLUDE ${modconfdir}/${.:name}/main/${dialect}/queries.conf
}
sql pfguest {
database = "mysql"
driver = "rlm_sql_${database}"
server = "127.0.0.1"
port = 3306
login = "pf"
password = "inverse"
radius_db = "pf"
acct_table1 = "radacct"
acct_table2 = "radacct"
postauth_table = "radpostauth"
authcheck_table = "password"
authreply_table = "radreply"
groupcheck_table = "radgroupcheck"
groupreply_table = "radgroupreply"
usergroup_table = "radusergroup"
delete_stale_sessions = yes
sqltrace = no
sqltracefile = ${logdir}/sqltrace.sql
sql_user_name = "%{User-Name}"
authorize_check_query = "\
SELECT 1, pid, ( \
CASE \
WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' \
ELSE 'Cleartext-Password' \
END ) AS passwordhash, \
REPLACE(password,'{ntlm}',''), \":=\" \
FROM ${authcheck_table} \
JOIN activation using (pid) \
WHERE pid = '%{SQL-User-Name}' \
AND (SELECT type from activation WHERE pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = \"guest\" \
AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00 00:00:00' ) \
AND ${authcheck_table}.tenant_id = '%{control:PacketFence-Tenant-Id}' \
LIMIT 1"
postauth_query = ""
group_membership_query = "select 1"
pool = sql
}
sql pfsponsor {
database = "mysql"
driver = "rlm_sql_${database}"
server = "127.0.0.1"
port = 3306
login = "pf"
password = "inverse"
radius_db = "pf"
acct_table1 = "radacct"
acct_table2 = "radacct"
postauth_table = "radpostauth"
authcheck_table = "password"
authreply_table = "radreply"
groupcheck_table = "radgroupcheck"
groupreply_table = "radgroupreply"
usergroup_table = "radusergroup"
delete_stale_sessions = yes
sqltrace = no
sqltracefile = ${logdir}/sqltrace.sql
sql_user_name = "%{User-Name}"
authorize_check_query = "\
SELECT 1, pid, ( \
CASE \
WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' \
ELSE 'Cleartext-Password' \
END ) AS passwordhash, \
REPLACE(password,'{ntlm}',''), \":=\" \
FROM ${authcheck_table} \
JOIN activation using (pid) \
WHERE pid = '%{SQL-User-Name}' \
AND (SELECT type from activation WHERE pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = \"sponsor\" \
AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00 00:00:00' ) \
AND ${authcheck_table}.tenant_id = '%{control:PacketFence-Tenant-Id}' \
LIMIT 1"
postauth_query = ""
group_membership_query = "select 1"
pool = sql
}
sql pfsms {
database = "mysql"
driver = "rlm_sql_${database}"
server = "127.0.0.1"
port = 3306
login = "pf"
password = "inverse"
radius_db = "pf"
acct_table1 = "radacct"
acct_table2 = "radacct"
postauth_table = "radpostauth"
authcheck_table = "password"
authreply_table = "radreply"
groupcheck_table = "radgroupcheck"
groupreply_table = "radgroupreply"
usergroup_table = "radusergroup"
delete_stale_sessions = yes
sqltrace = no
sqltracefile = ${logdir}/sqltrace.sql
sql_user_name = "%{User-Name}"
authorize_check_query = "\
SELECT 1, pid, ( \
CASE \
WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' \
ELSE 'Cleartext-Password' \
END ) AS passwordhash, \
REPLACE(password,'{ntlm}',''), \":=\" \
FROM ${authcheck_table} \
JOIN activation using (pid) \
WHERE pid = '%{SQL-User-Name}' \
AND (SELECT type from activation WHERE pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = \"sms\" \
AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00 00:00:00' ) \
AND ${authcheck_table}.tenant_id = '%{control:PacketFence-Tenant-Id}' \
LIMIT 1"
postauth_query = ""
group_membership_query = "select 1"
pool = sql
}
sql pflocal {
database = "mysql"
driver = "rlm_sql_${database}"
server = "127.0.0.1"
port = 3306
login = "pf"
password = "inverse"
radius_db = "pf"
acct_table1 = "radacct"
acct_table2 = "radacct"
postauth_table = "radpostauth"
authcheck_table = "password"
authreply_table = "radreply"
groupcheck_table = "radgroupcheck"
groupreply_table = "radgroupreply"
usergroup_table = "radusergroup"
delete_stale_sessions = yes
sqltrace = no
sqltracefile = ${logdir}/sqltrace.sql
sql_user_name = "%{User-Name}"
authorize_check_query = "\
SELECT 1, pid, ( \
CASE \
WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' \
ELSE 'Cleartext-Password' \
END ) AS passwordhash, \
REPLACE(password,'{ntlm}',''), \":=\" \
FROM ${authcheck_table} \
WHERE pid = '%{SQL-User-Name}' \
AND ${authcheck_table}.tenant_id = '%{control:PacketFence-Tenant-Id}' \
AND NOT EXISTS (SELECT pid FROM activation WHERE pid = '%{SQL-User-Name}')"
postauth_query = ""
group_membership_query = "select 1"
pool = sql
}
sql sql_reject {
database = "mysql"
driver = "rlm_sql_${database}"
server = "127.0.0.1"
port = 3306
login = "pf"
password = "inverse"
radius_db = "pf"
acct_table1 = "radacct"
acct_table2 = "radacct"
postauth_table = "radpostauth"
authcheck_table = "password"
authreply_table = "radreply"
groupcheck_table = "radgroupcheck"
groupreply_table = "radgroupreply"
usergroup_table = "radusergroup"
delete_stale_sessions = yes
sqltrace = no
sqltracefile = ${logdir}/sqltrace.sql
sql_user_name = "%{User-Name}"
authorize_check_query = ""
postauth_query = ""
group_membership_query = ""
pool = sql
$INCLUDE ${modconfdir}/${.:name}/main/mysql/reject.conf
}
sql sql_degraded {
database = "mysql"
driver = "rlm_sql_${database}"
server = "127.0.0.1"
port = 3306
login = "pf"
password = "inverse"
radius_db = "pf"
acct_table1 = "radacct"
acct_table2 = "radacct"
postauth_table = "radpostauth"
authcheck_table = "password"
authreply_table = "radreply"
groupcheck_table = "radgroupcheck"
groupreply_table = "radgroupreply"
usergroup_table = "radusergroup"
delete_stale_sessions = yes
sqltrace = no
sqltracefile = ${logdir}/sqltrace.sql
sql_user_name = "%{User-Name}"
postauth_query = ""
group_membership_query = ""
pool = sql
client_table = "radius_nas"
}
-------------- next part --------------
sql {
driver = "rlm_sql_mysql"
dialect = "mysql"
server = "127.0.0.1"
port = 3306
login = "pf"
password = "inverse"
radius_db = "pf"
acct_table1 = "radacct"
acct_table2 = "radacct"
postauth_table = "radpostauth"
authcheck_table = "radcheck"
groupcheck_table = "radgroupcheck"
authreply_table = "radreply"
groupreply_table = "radgroupreply"
usergroup_table = "radusergroup"
delete_stale_sessions = yes
pool {
start = ${thread[pool].start_servers}
min = ${thread[pool].min_spare_servers}
max = ${thread[pool].max_servers}
spare = ${thread[pool].max_spare_servers}
uses = 0
retry_delay = 30
lifetime = 0
idle_timeout = 60
}
read_clients = yes
client_table = "radius_nas"
group_attribute = "SQL-Group"
$INCLUDE ${modconfdir}/${.:name}/main/${dialect}/queries.conf
}
sql pfguest {
database = "mysql"
driver = "rlm_sql_${database}"
server = "127.0.0.1"
port = 3306
login = "pf"
password = "inverse"
radius_db = "pf"
acct_table1 = "radacct"
acct_table2 = "radacct"
postauth_table = "radpostauth"
authcheck_table = "password"
authreply_table = "radreply"
groupcheck_table = "radgroupcheck"
groupreply_table = "radgroupreply"
usergroup_table = "radusergroup"
delete_stale_sessions = yes
sqltrace = no
sqltracefile = ${logdir}/sqltrace.sql
sql_user_name = "%{User-Name}"
authorize_check_query = "\
SELECT 1, pid, ( \
CASE \
WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' \
ELSE 'Cleartext-Password' \
END ) AS passwordhash, \
REPLACE(password,'{ntlm}',''), \":=\" \
FROM ${authcheck_table} \
JOIN activation using (pid) \
WHERE pid = '%{SQL-User-Name}' \
AND (SELECT type from activation WHERE pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = \"guest\" \
AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00 00:00:00' ) \
AND ${authcheck_table}.tenant_id = '%{control:PacketFence-Tenant-Id}' \
LIMIT 1"
postauth_query = ""
group_membership_query = "select 1"
pool = sql
}
sql pfsponsor {
database = "mysql"
driver = "rlm_sql_${database}"
server = "127.0.0.1"
port = 3306
login = "pf"
password = "inverse"
radius_db = "pf"
acct_table1 = "radacct"
acct_table2 = "radacct"
postauth_table = "radpostauth"
authcheck_table = "password"
authreply_table = "radreply"
groupcheck_table = "radgroupcheck"
groupreply_table = "radgroupreply"
usergroup_table = "radusergroup"
delete_stale_sessions = yes
sqltrace = no
sqltracefile = ${logdir}/sqltrace.sql
sql_user_name = "%{User-Name}"
authorize_check_query = "\
SELECT 1, pid, ( \
CASE \
WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' \
ELSE 'Cleartext-Password' \
END ) AS passwordhash, \
REPLACE(password,'{ntlm}',''), \":=\" \
FROM ${authcheck_table} \
JOIN activation using (pid) \
WHERE pid = '%{SQL-User-Name}' \
AND (SELECT type from activation WHERE pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = \"sponsor\" \
AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00 00:00:00' ) \
AND ${authcheck_table}.tenant_id = '%{control:PacketFence-Tenant-Id}' \
LIMIT 1"
postauth_query = ""
group_membership_query = "select 1"
pool = sql
}
sql pfsms {
database = "mysql"
driver = "rlm_sql_${database}"
server = "127.0.0.1"
port = 3306
login = "pf"
password = "inverse"
radius_db = "pf"
acct_table1 = "radacct"
acct_table2 = "radacct"
postauth_table = "radpostauth"
authcheck_table = "password"
authreply_table = "radreply"
groupcheck_table = "radgroupcheck"
groupreply_table = "radgroupreply"
usergroup_table = "radusergroup"
delete_stale_sessions = yes
sqltrace = no
sqltracefile = ${logdir}/sqltrace.sql
sql_user_name = "%{User-Name}"
authorize_check_query = "\
SELECT 1, pid, ( \
CASE \
WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' \
ELSE 'Cleartext-Password' \
END ) AS passwordhash, \
REPLACE(password,'{ntlm}',''), \":=\" \
FROM ${authcheck_table} \
JOIN activation using (pid) \
WHERE pid = '%{SQL-User-Name}' \
AND (SELECT type from activation WHERE pid='%{SQL-User-Name}' ORDER BY code_id DESC LIMIT 1) = \"sms\" \
AND ( now() <= password.unregdate OR password.unregdate = '0000-00-00 00:00:00' ) \
AND ${authcheck_table}.tenant_id = '%{control:PacketFence-Tenant-Id}' \
LIMIT 1"
postauth_query = ""
group_membership_query = "select 1"
pool = sql
}
sql pflocal {
database = "mysql"
driver = "rlm_sql_${database}"
server = "127.0.0.1"
port = 3306
login = "pf"
password = "inverse"
radius_db = "pf"
acct_table1 = "radacct"
acct_table2 = "radacct"
postauth_table = "radpostauth"
authcheck_table = "password"
authreply_table = "radreply"
groupcheck_table = "radgroupcheck"
groupreply_table = "radgroupreply"
usergroup_table = "radusergroup"
delete_stale_sessions = yes
sqltrace = no
sqltracefile = ${logdir}/sqltrace.sql
sql_user_name = "%{User-Name}"
authorize_check_query = "\
SELECT 1, pid, ( \
CASE \
WHEN SUBSTR(password, 1, LENGTH('{ntlm}') ) = '{ntlm}' THEN 'NT-Password' \
ELSE 'Cleartext-Password' \
END ) AS passwordhash, \
REPLACE(password,'{ntlm}',''), \":=\" \
FROM ${authcheck_table} \
WHERE pid = '%{SQL-User-Name}' \
AND ${authcheck_table}.tenant_id = '%{control:PacketFence-Tenant-Id}' \
AND NOT EXISTS (SELECT pid FROM activation WHERE pid = '%{SQL-User-Name}')"
postauth_query = ""
group_membership_query = "select 1"
pool = sql
}
sql sql_reject {
database = "mysql"
driver = "rlm_sql_${database}"
server = "127.0.0.1"
port = 3306
login = "pf"
password = "inverse"
radius_db = "pf"
acct_table1 = "radacct"
acct_table2 = "radacct"
postauth_table = "radpostauth"
authcheck_table = "password"
authreply_table = "radreply"
groupcheck_table = "radgroupcheck"
groupreply_table = "radgroupreply"
usergroup_table = "radusergroup"
delete_stale_sessions = yes
sqltrace = no
sqltracefile = ${logdir}/sqltrace.sql
sql_user_name = "%{User-Name}"
authorize_check_query = ""
postauth_query = ""
group_membership_query = ""
pool = sql
$INCLUDE ${modconfdir}/${.:name}/main/mysql/reject.conf
}
sql sql_degraded {
database = "mysql"
driver = "rlm_sql_${database}"
server = "127.0.0.1"
port = 3306
login = "pf"
password = "inverse"
radius_db = "pf"
acct_table1 = "radacct"
acct_table2 = "radacct"
postauth_table = "radpostauth"
authcheck_table = "password"
authreply_table = "radreply"
groupcheck_table = "radgroupcheck"
groupreply_table = "radgroupreply"
usergroup_table = "radusergroup"
delete_stale_sessions = yes
sqltrace = no
sqltracefile = ${logdir}/sqltrace.sql
sql_user_name = "%{User-Name}"
postauth_query = ""
group_membership_query = ""
pool = sql
client_table = "radius_nas"
safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /(),'"
}
More information about the Freeradius-Users
mailing list