TLS Radsec
Rodrigo Prieto
rodrigoprieto2019 at gmail.com
Tue Jun 10 14:10:28 UTC 2025
I disabled the client.conf configuration since I'm currently testing with
RadSec only. The only way for the timeout to be applied is by adding the
following inside:
client prueba {
ipaddr = 192.168.122.188
.......
limit {
max_connections = 16
lifetime = 0
idle_timeout = 45
}
}
For those 45 seconds to take effect, the idle_timeout in the following
block must be greater, for example, 60:
listen {
ipaddr = *
port = 2083
limit {
idle_timeout = 60
.......
}
I calculate it must be the normal behavior, I'm leaving the radsecproxy
output
Tue Jun 10 11:03:02 2025: sslreadtimeout: SSL: error:0A000126:SSL
routines::unexpected eof while reading
Tue Jun 10 11:03:02 2025: tlsclientrd: connection to server freeradius_tls
lost
Tue Jun 10 11:03:02 2025: tlsconnect: TLS connection to freeradius_tls
(Servidor-Freeradius port 2083), subject
emailAddress=admin at example.org,CN=Servidor-Freeradius,O=Example
Inc.,ST=Radius,C=FR up
Tue Jun 10 11:03:47 2025: sslreadtimeout: SSL: error:0A000126:SSL
routines::unexpected eof while reading
Tue Jun 10 11:03:47 2025: tlsclientrd: connection to server freeradius_tls
lost
Tue Jun 10 11:03:47 2025: tlsconnect: TLS connection to freeradius_tls
(Servidor-Freeradius port 2083), subject
emailAddress=admin at example.org,CN=Servidor-Freeradius,O=Example
Inc.,ST=Radius,C=FR up
Thanks for explaining, and it's not my intention to bother you; it's a
difficult server to configure, that's why my questions
El mar, 10 jun 2025 a las 10:15, Alan DeKok (<aland at deployingradius.com>)
escribió:
> On Jun 10, 2025, at 9:01 AM, Rodrigo Prieto <rodrigoprieto2019 at gmail.com>
> wrote:
> > Thanks Alan for replying. I'm configuring it in this place, and if I set
> it to more than 30 seconds, it doesn't take effect.
>
> It does take effect. Read the debug output. Look for "idle_timeout":
>
> > client cliente2 {
> > ipaddr = 192.168.122.188
> > require_message_authenticator = "no"
> > secret = <<< secret >>>
> > limit {
> > max_connections = 16
> > lifetime = 0
> > idle_timeout = 30
> > }
> > }
> > ...
> > Reached idle timeout on socket auth+acct from client (192.168.122.188,
> 39871) -> (*, 2083, virtual-server=default)
> > ... shutting down socket auth+acct from client (192.168.122.188, 39871)
> -> (*, 2083, virtual-server=default)
> > ... cleaning up socket auth+acct from client (192.168.122.188, 39871) ->
> (*, 2083, virtual-server=default)
> > Ready to process requests
>
> The problem, and solution, should be obvious.
>
> You can also read the comments for idle_timeout in the clients.conf
> file. It explains this behavior.
>
> Alan DeKok.
>
>
More information about the Freeradius-Users
mailing list