radius_ipa
Differences
This shows you the differences between two versions of the page.
| radius_ipa [2025/07/26 17:09] – - Imported by DokuWiki Advanced Plugin wikiadm | radius_ipa [Unknown date] (current) – removed - external edit (Unknown date) 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ====== FreeRADIUS ====== | ||
| - | ===== Alterar o hash padrão do FreeIPA ===== | ||
| - | <code bash> | ||
| - | # echo "dn: cn=config | ||
| - | changetype: modify | ||
| - | replace: passwordStorageScheme | ||
| - | passwordStorageScheme: | ||
| - | </ | ||
| - | <code bash> | ||
| - | # ldapsearch -h sp-spo-ipa.juntotelecom.com.br -p 389 -x -D " | ||
| - | Enter LDAP Password: | ||
| - | passwordStorageScheme: | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # ldapmodify -h localhost -p 389 -x -D " | ||
| - | Enter LDAP Password: | ||
| - | modifying entry " | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # ldapsearch -h sp-spo-ipa.juntotelecom.com.br -p 389 -x -D " | ||
| - | Enter LDAP Password: | ||
| - | passwordStorageScheme: | ||
| - | </ | ||
| - | |||
| - | ===== Adicionado o host ===== | ||
| - | <code bash> | ||
| - | # ipa dnsrecord-add juntotelecom.com.br sp-spo-radius --a-rec 172.28.129.6 | ||
| - | Record name: sp-spo-radius | ||
| - | A record: 172.28.129.6 | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # ipa dnsrecord-add juntotelecom.com.br sp-spo-radius --aaaa-rec 2804: | ||
| - | Record name: sp-spo-radius | ||
| - | A record: 172.28.129.6 | ||
| - | AAAA record: 2804: | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # ipa host-add sp-spo-radius.juntotelecom.com.br --desc=" | ||
| - | ---------------------------------------------- | ||
| - | Added host " | ||
| - | ---------------------------------------------- | ||
| - | Host name: sp-spo-radius.juntotelecom.com.br | ||
| - | Description: | ||
| - | Password: True | ||
| - | Keytab: False | ||
| - | Managed by: sp-spo-radius.juntotelecom.com.br | ||
| - | </ | ||
| - | |||
| - | ===== Permissão do usuário radiusadm ===== | ||
| - | <code bash> | ||
| - | # ipa permission-add ' | ||
| - | -------------------------------------------- | ||
| - | Added permission " | ||
| - | -------------------------------------------- | ||
| - | Permission name: userPassword service read | ||
| - | Granted rights: read | ||
| - | Effective attributes: userPassword | ||
| - | Bind rule type: permission | ||
| - | Subtree: cn=users, | ||
| - | Type: user | ||
| - | Permission flags: SYSTEM, V2 | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # ipa privilege-add ' | ||
| - | --------------------------------- | ||
| - | Added privilege " | ||
| - | --------------------------------- | ||
| - | Privilege name: Radius services | ||
| - | Description: | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # ipa privilege-add-permission ' | ||
| - | Privilege name: Radius services | ||
| - | Description: | ||
| - | Permissions: | ||
| - | ----------------------------- | ||
| - | Number of permissions added 1 | ||
| - | ----------------------------- | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # ipa role-add ' | ||
| - | -------------------------- | ||
| - | Added role " | ||
| - | -------------------------- | ||
| - | Role name: Radius server | ||
| - | Description: | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # ipa role-add-privilege --privileges=" | ||
| - | Role name: Radius server | ||
| - | Description: | ||
| - | Privileges: Radius services | ||
| - | ---------------------------- | ||
| - | Number of privileges added 1 | ||
| - | ---------------------------- | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # yes " | ||
| - | ---------------------- | ||
| - | Added user " | ||
| - | ---------------------- | ||
| - | User login: radiusadm | ||
| - | First name: Radius | ||
| - | Last name: User | ||
| - | Full name: Radius User | ||
| - | Display name: Radius User | ||
| - | Initials: RU | ||
| - | Home directory: / | ||
| - | GECOS: Radius User | ||
| - | Login shell: /bin/bash | ||
| - | Principal name: radiusadm@JUNTOTELECOM.COM.BR | ||
| - | Principal alias: radiusadm@JUNTOTELECOM.COM.BR | ||
| - | User password expiration: 20220412204350Z | ||
| - | Email address: radiusadm@juntotelecom.com.br | ||
| - | UID: 187600003 | ||
| - | GID: 187600003 | ||
| - | Password: True | ||
| - | Member of groups: ipausers | ||
| - | Kerberos keys available: True | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # ipa user-mod " | ||
| - | ------------------------- | ||
| - | Modified user " | ||
| - | ------------------------- | ||
| - | User login: radiusadm | ||
| - | First name: Radius | ||
| - | Last name: User | ||
| - | Home directory: / | ||
| - | Login shell: /bin/bash | ||
| - | Principal name: radiusadm@JUNTOTELECOM.COM.BR | ||
| - | Principal alias: radiusadm@JUNTOTELECOM.COM.BR | ||
| - | Email address: radiusadm@juntotelecom.com.br | ||
| - | UID: 187600003 | ||
| - | GID: 187600003 | ||
| - | User authentication types: password, radius | ||
| - | Account disabled: False | ||
| - | Password: True | ||
| - | Member of groups: ipausers | ||
| - | Kerberos keys available: True | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # yes " | ||
| - | ------------------------- | ||
| - | Modified user " | ||
| - | ------------------------- | ||
| - | User login: radiusadm | ||
| - | First name: Radius | ||
| - | Last name: User | ||
| - | Home directory: / | ||
| - | Login shell: /bin/bash | ||
| - | Principal name: radiusadm@JUNTOTELECOM.COM.BR | ||
| - | Principal alias: radiusadm@JUNTOTELECOM.COM.BR | ||
| - | User password expiration: 20220412204516Z | ||
| - | Email address: radiusadm@juntotelecom.com.br | ||
| - | UID: 187600003 | ||
| - | GID: 187600003 | ||
| - | User authentication types: password, radius | ||
| - | Account disabled: False | ||
| - | Password: True | ||
| - | Member of groups: ipausers | ||
| - | Kerberos keys available: True | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # ipa role-add-member ' | ||
| - | Role name: Radius server | ||
| - | Description: | ||
| - | Member users: radiusadm | ||
| - | Privileges: Radius services | ||
| - | ------------------------- | ||
| - | Number of members added 1 | ||
| - | ------------------------- | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # ipa user-show radiusadm --all --raw | ||
| - | dn: uid=radiusadm, | ||
| - | uid: radiusadm | ||
| - | givenname: Radius | ||
| - | sn: User | ||
| - | cn: Radius User | ||
| - | initials: RU | ||
| - | homedirectory: | ||
| - | gecos: Radius User | ||
| - | loginshell: /bin/bash | ||
| - | krbcanonicalname: | ||
| - | krbprincipalname: | ||
| - | mail: radiusadm@juntotelecom.com.br | ||
| - | uidnumber: 187600003 | ||
| - | gidnumber: 187600003 | ||
| - | ipauserauthtype: | ||
| - | ipauserauthtype: | ||
| - | nsaccountlock: | ||
| - | has_password: | ||
| - | has_keytab: TRUE | ||
| - | displayName: | ||
| - | ipaNTSecurityIdentifier: | ||
| - | ipaUniqueID: | ||
| - | krbExtraData: | ||
| - | krbLastPwdChange: | ||
| - | krbPasswordExpiration: | ||
| - | memberof: cn=Radius server, | ||
| - | memberof: cn=ipausers, | ||
| - | memberofindirect: | ||
| - | memberofindirect: | ||
| - | mepManagedEntry: | ||
| - | objectClass: | ||
| - | objectClass: | ||
| - | objectClass: | ||
| - | objectClass: | ||
| - | objectClass: | ||
| - | objectClass: | ||
| - | objectClass: | ||
| - | objectClass: | ||
| - | objectClass: | ||
| - | objectClass: | ||
| - | objectClass: | ||
| - | objectClass: | ||
| - | objectClass: | ||
| - | objectClass: | ||
| - | </ | ||
| - | |||
| - | ===== Instalação FreeRADIUS ===== | ||
| - | <code bash> | ||
| - | # cat <<EOF | tee -a /etc/hosts | ||
| - | 172.28.129.6 sp-spo-radius.juntotelecom.com.br sp-spo-radius | ||
| - | 177.75.187.213 | ||
| - | 2804: | ||
| - | 2804: | ||
| - | EOF | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # hostnamectl set-hostname sp-spo-radius.juntotelecom.com.br | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # echo " | ||
| - | krb5-config krb5-config/ | ||
| - | krb5-config krb5-config/ | ||
| - | krb5-config krb5-config/ | ||
| - | krb5-config krb5-config/ | ||
| - | krb5-config krb5-config/ | ||
| - | libpam-runtime libpam-runtime/ | ||
| - | libpam-runtime libpam-runtime/ | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # apt-get install freeradius freeradius-ldap freeradius-utils sudo patch | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # echo "deb http:// | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # apt-get update | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # DEBIAN_FRONTEND=noninteractive apt-get install -t bullseye-backports freeipa-client | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # yes yes | ipa-client-install --ntp-server=sp-spo-ipa.juntotelecom.com.br --domain=juntotelecom.com.br --enable-dns-updates --password=" | ||
| - | This program will set up IPA client. | ||
| - | Version 4.9.8 | ||
| - | |||
| - | WARNING: conflicting time& | ||
| - | |||
| - | Autodiscovery of servers for failover cannot work with this configuration. | ||
| - | If you proceed with the installation, | ||
| - | Proceed with fixed values and no DNS discovery? [no]: Client hostname: sp-spo-radius.juntotelecom.com.br | ||
| - | Realm: JUNTOTELECOM.COM.BR | ||
| - | DNS Domain: juntotelecom.com.br | ||
| - | IPA Server: sp-spo-ipa.juntotelecom.com.br | ||
| - | BaseDN: dc=juntotelecom, | ||
| - | NTP server: sp-spo-ipa.juntotelecom.com.br | ||
| - | |||
| - | Continue to configure the system with these values? [no]: Synchronizing time | ||
| - | Augeas failed to configure file / | ||
| - | Using default chrony configuration. | ||
| - | Attempting to sync time with chronyc. | ||
| - | Time synchronization was successful. | ||
| - | Do you want to download the CA cert from http:// | ||
| - | (this is INSECURE) [no]: Successfully retrieved CA cert | ||
| - | Subject: | ||
| - | Issuer: | ||
| - | Valid From: 2022-04-12 19:45:00 | ||
| - | Valid Until: 2042-04-12 19:45:00 | ||
| - | |||
| - | Enrolled in IPA realm JUNTOTELECOM.COM.BR | ||
| - | Created / | ||
| - | Configured / | ||
| - | Configured / | ||
| - | Systemwide CA database updated. | ||
| - | Hostname (sp-spo-radius.juntotelecom.com.br) does not have A/AAAA record. | ||
| - | Failed to update DNS records. | ||
| - | Missing A/AAAA record(s) for host sp-spo-radius.juntotelecom.com.br: | ||
| - | Missing reverse record(s) for address(es): | ||
| - | Adding SSH public key from / | ||
| - | Adding SSH public key from / | ||
| - | Adding SSH public key from / | ||
| - | Could not update DNS SSHFP records. | ||
| - | SSSD enabled | ||
| - | Configured / | ||
| - | Principal is not set when enrolling with OTP; using principal ' | ||
| - | Configured / | ||
| - | Configured / | ||
| - | Configuring juntotelecom.com.br as NIS domain. | ||
| - | Client configuration complete. | ||
| - | The ipa-client-install command was successful | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # cp -p / | ||
| - | # sed -i '/ | ||
| - | # systemctl restart sssd | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # cp -p / | ||
| - | # pushd / | ||
| - | # ln -s ../ | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # sed -i -e " | ||
| - | # sed -i " | ||
| - | # sed -i " | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # cp -p / | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # pushd / | ||
| - | / | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # sed -i ' | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | echo ' | ||
| - | < # Auth-Type LDAP { | ||
| - | < # ldap | ||
| - | < # } | ||
| - | --- | ||
| - | > Auth-Type LDAP { | ||
| - | > ldap | ||
| - | > }' | patch default | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # popd | ||
| - | ~ | ||
| - | root@sp-spo-radius: | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # rm / | ||
| - | # systemctl restart freeradius.service | ||
| - | </ | ||
| - | |||
| - | ===== Testando a autenticação ===== | ||
| - | <code bash> | ||
| - | # ldapsearch -h sp-spo-ipa.juntotelecom.com.br -p 389 -v -b ' | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # yes test | ipa user-add " | ||
| - | ----------------------- | ||
| - | Added user " | ||
| - | ----------------------- | ||
| - | User login: radiustest | ||
| - | First name: Radius | ||
| - | Last name: Test | ||
| - | Full name: Radius Test | ||
| - | Display name: Radius Test | ||
| - | Initials: RT | ||
| - | Home directory: / | ||
| - | GECOS: Radius Test | ||
| - | Login shell: / | ||
| - | Principal name: radiustest@JUNTOTELECOM.COM.BR | ||
| - | Principal alias: radiustest@JUNTOTELECOM.COM.BR | ||
| - | User password expiration: 20220412213118Z | ||
| - | Email address: radiustest@juntotelecom.com.br | ||
| - | UID: 187600004 | ||
| - | GID: 187600004 | ||
| - | Password: True | ||
| - | Member of groups: ipausers | ||
| - | Kerberos keys available: True | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # ipa user-mod radiustest --password-expiration=" | ||
| - | -------------------------- | ||
| - | Modified user " | ||
| - | -------------------------- | ||
| - | User login: radiustest | ||
| - | First name: Radius | ||
| - | Last name: Test | ||
| - | Home directory: / | ||
| - | Login shell: / | ||
| - | Principal name: radiustest@JUNTOTELECOM.COM.BR | ||
| - | Principal alias: radiustest@JUNTOTELECOM.COM.BR | ||
| - | User password expiration: 20500101000000Z | ||
| - | Email address: radiustest@juntotelecom.com.br | ||
| - | UID: 187600004 | ||
| - | GID: 187600004 | ||
| - | User authentication types: password, radius | ||
| - | Account disabled: False | ||
| - | Password: True | ||
| - | Member of groups: ipausers | ||
| - | Kerberos keys available: True | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # systemctl stop freeradius.service | ||
| - | # sudo -u freerad freeradius -fxX | ||
| - | </ | ||
| - | |||
| - | <code bashs> | ||
| - | ~$ radtest radiustest test 127.0.0.1 0 testing123 | ||
| - | Sent Access-Request Id 30 from 0.0.0.0: | ||
| - | User-Name = " | ||
| - | User-Password = " | ||
| - | NAS-IP-Address = 172.28.129.6 | ||
| - | NAS-Port = 0 | ||
| - | Message-Authenticator = 0x00 | ||
| - | Cleartext-Password = " | ||
| - | Received Access-Accept Id 30 from 127.0.0.1: | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) Received Access-Request Id 30 from 127.0.0.1: | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) session-state: | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) # Executing section authorize from file / | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) if (& | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) if (& | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) if (& | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) if (& | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) if (& | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) if (& | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) if (& | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) if (& | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) if (& | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) if ((& | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) if ((& | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) if (& | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) if (& | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) if (& | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) if (& | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) } # if (& | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) } # policy filter_username = notfound | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) suffix: Checking for suffix after " | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) suffix: No ' | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) suffix: No such realm " | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) eap: No EAP-Message, | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) [eap] = noop | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Info: rlm_ldap (ldap): Closing connection (0): Hit idle_timeout, | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: rlm_ldap: Closing libldap handle 0x56106ba41f70 | ||
| - | Tue Apr 12 18:36:06 2022 : Info: rlm_ldap (ldap): Closing connection (1): Hit idle_timeout, | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: rlm_ldap: Closing libldap handle 0x56106ba38e60 | ||
| - | Tue Apr 12 18:36:06 2022 : Info: rlm_ldap (ldap): Closing connection (2): Hit idle_timeout, | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: rlm_ldap (ldap): You probably need to lower " | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: rlm_ldap: Closing libldap handle 0x56106ba50eb0 | ||
| - | Tue Apr 12 18:36:06 2022 : Info: rlm_ldap (ldap): Closing connection (3): Hit idle_timeout, | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: rlm_ldap (ldap): You probably need to lower " | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: rlm_ldap: Closing libldap handle 0x56106ba508b0 | ||
| - | Tue Apr 12 18:36:06 2022 : Info: rlm_ldap (ldap): Closing connection (4): Hit idle_timeout, | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: rlm_ldap (ldap): You probably need to lower " | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: rlm_ldap: Closing libldap handle 0x56106ba5c010 | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: rlm_ldap (ldap): 0 of 0 connections in use. You may need to increase " | ||
| - | Tue Apr 12 18:36:06 2022 : Info: rlm_ldap (ldap): Opening additional connection (5), 1 of 32 pending slots used | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: rlm_ldap (ldap): Connecting to ldap:// | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: rlm_ldap (ldap): New libldap handle 0x56106ba5c010 | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: rlm_ldap (ldap): Waiting for bind result... | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: rlm_ldap (ldap): Bind successful | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: rlm_ldap (ldap): Reserved connection (5) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (uid=%{%{Stripped-User-Name}: | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: Parsed xlat tree: | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: literal --> (uid= | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: XLAT-IF { | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: } | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: XLAT-ELSE { | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: } | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: literal --> ) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) ldap: EXPAND (uid=%{%{Stripped-User-Name}: | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) ldap: --> (uid=radiustest) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) ldap: Performing search in " | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) ldap: Waiting for search result... | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) ldap: User object found at DN " | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) ldap: Processing user attributes | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) ldap: control: | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) ldap: Attribute " | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) ldap: Attribute " | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) ldap: Attribute " | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: rlm_ldap (ldap): Released connection (5) | ||
| - | Tue Apr 12 18:36:06 2022 : Info: Need 2 more connections to reach min connections (3) | ||
| - | Tue Apr 12 18:36:06 2022 : Info: rlm_ldap (ldap): Opening additional connection (6), 1 of 31 pending slots used | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: rlm_ldap (ldap): Connecting to ldap:// | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: rlm_ldap (ldap): New libldap handle 0x56106ba39000 | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: rlm_ldap (ldap): Waiting for bind result... | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: rlm_ldap (ldap): Bind successful | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) pap: Converted: & | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) pap: Removing & | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) pap: Normalizing SSHA2-512-Password from base64 encoding, 96 bytes -> 72 bytes | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) [pap] = updated | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) } # authorize = updated | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) Found Auth-Type = PAP | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) # Executing group from file / | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) pap: Login attempt with password " | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) pap: Comparing with " | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) pap: User authenticated successfully | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) [pap] = ok | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) } # Auth-Type PAP = ok | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) # Executing section post-auth from file / | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) if (session-state: | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) if (session-state: | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) No attributes updated for RHS & | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) } # update = noop | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) if (& | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) if (& | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) else { | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) } # else = noop | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) } # policy remove_reply_message_if_eap = noop | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) } # post-auth = noop | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) Sent Access-Accept Id 30 from 127.0.0.1: | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: (0) Finished request | ||
| - | Tue Apr 12 18:36:06 2022 : Debug: Waking up in 4.9 seconds. | ||
| - | Tue Apr 12 18:36:11 2022 : Debug: (0) Cleaning up request packet ID 30 with timestamp +126 | ||
| - | Tue Apr 12 18:36:11 2022 : Info: Ready to process requests | ||
| - | </ | ||
| - | |||
| - | ===== Configuração do arquivo clients ===== | ||
| - | <code bash> | ||
| - | # cp -p / | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # cat / | ||
| - | client localhost { | ||
| - | ipaddr = 127.0.0.1 | ||
| - | proto = * | ||
| - | secret = testing123 | ||
| - | require_message_authenticator = no | ||
| - | |||
| - | # Permitted NAS types are: | ||
| - | # | ||
| - | # cisco | ||
| - | # | ||
| - | # | ||
| - | # | ||
| - | # | ||
| - | # | ||
| - | # | ||
| - | # | ||
| - | # | ||
| - | # | ||
| - | # tc | ||
| - | # | ||
| - | # | ||
| - | |||
| - | # | ||
| - | nas_type | ||
| - | # | ||
| - | limit { | ||
| - | max_connections = 16 | ||
| - | lifetime = 0 | ||
| - | idle_timeout = 30 | ||
| - | } | ||
| - | } | ||
| - | |||
| - | # IPv6 Client | ||
| - | client localhost_ipv6 { | ||
| - | ipv6addr | ||
| - | secret | ||
| - | } | ||
| - | |||
| - | # JuntoTelecom | ||
| - | client bloco_ipv6 { | ||
| - | ipv6addr | ||
| - | secret | ||
| - | } | ||
| - | |||
| - | client private-network-1 { | ||
| - | ipaddr | ||
| - | secret | ||
| - | } | ||
| - | |||
| - | client private-network-2 { | ||
| - | ipaddr | ||
| - | secret | ||
| - | } | ||
| - | |||
| - | client private-network-3 { | ||
| - | ipaddr | ||
| - | secret | ||
| - | } | ||
| - | |||
| - | client bloco_public { | ||
| - | ipaddr | ||
| - | secret | ||
| - | } | ||
| - | |||
| - | client rondonopolis_internet { | ||
| - | ipaddr | ||
| - | secret | ||
| - | } | ||
| - | </ | ||
| - | |||
| - | ===== Configuração arquivo users ===== | ||
| - | <code bash> | ||
| - | # cp -p / | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # cat / | ||
| - | # examples. | ||
| - | # | ||
| - | #bob Cleartext-Password := " | ||
| - | # | ||
| - | # | ||
| - | # Inicío JuntoTelecom - FreeIPA | ||
| - | # Exemplo de uso sem autenticação | ||
| - | #awx_user Cleartext-Password := " | ||
| - | # Service-Type = NAS-Prompt-User, | ||
| - | # Juniper-Local-User-Name := " | ||
| - | # Huawei-Exec-Privilege = " | ||
| - | # Cisco-AVPair = " | ||
| - | |||
| - | # Grupo com permissão de excrita | ||
| - | DEFAULT Ldap-Group == " | ||
| - | Service-Type = NAS-Prompt-User, | ||
| - | Juniper-Local-User-Name := " | ||
| - | Huawei-Exec-Privilege = " | ||
| - | Cisco-AVPair = " | ||
| - | |||
| - | # Grupo com permissão de leitura | ||
| - | DEFAULT Ldap-Group == " | ||
| - | Service-Type = NAS-Prompt-User, | ||
| - | Juniper-Local-User-Name := " | ||
| - | Huawei-Exec-Privilege = " | ||
| - | Cisco-AVPair = " | ||
| - | |||
| - | DEFAULT Auth-Type := Reject | ||
| - | # Fim JuntoTelecom - FreeIPA | ||
| - | # | ||
| - | DEFAULT Framed-Protocol == PPP | ||
| - | Framed-Protocol = PPP, | ||
| - | Framed-Compression = Van-Jacobson-TCP-IP | ||
| - | |||
| - | # | ||
| - | # Default for CSLIP: dynamic IP address, SLIP mode, VJ-compression. | ||
| - | # | ||
| - | DEFAULT Hint == " | ||
| - | Framed-Protocol = SLIP, | ||
| - | Framed-Compression = Van-Jacobson-TCP-IP | ||
| - | |||
| - | # | ||
| - | # Default for SLIP: dynamic IP address, SLIP mode. | ||
| - | # | ||
| - | DEFAULT Hint == " | ||
| - | Framed-Protocol = SLIP | ||
| - | |||
| - | # | ||
| - | </ | ||
| - | |||
| - | <code bash> | ||
| - | # systemctl restart freeradius | ||
| - | </ | ||
| - | ===== Referência ===== | ||
| - | * https:// | ||
| - | * https:// | ||
| - | * https:// | ||
| - | * https:// | ||
| - | * https:// | ||
| - | * https:// | ||
radius_ipa.1753560544.txt.gz · Last modified: by wikiadm
