I'm using portslave to serve as replacement for mgetty+pppd.... The problem is after portslave answers the modem and switches into PPP, error log reports:
Feb 1 13:22:24 psinergybbs port[S100]: Connected - waiting for login Feb 1 13:22:24 psinergybbs port[S100]: PPP frames detected - switching to PPP mode Feb 1 13:22:24 psinergybbs pppd[10477]: Plugin /usr/local/lib/libpsr.so loaded. Feb 1 13:22:24 psinergybbs port[S100]: pppd 2.4.1 started by AutoPPP, uid 0 Feb 1 13:22:24 psinergybbs port[S100]: Using interface ppp1 Feb 1 13:22:24 psinergybbs port[S100]: Connect: ppp1 <--> /dev/ttyS0 Feb 1 13:22:43 psinergybbs port[S100]: radius@[192.168.1.1]1812 not responding Feb 1 13:22:58 psinergybbs port[S100]: radius@[192.168.1.1]1812 not responding I have already used the -i ipaddr argument for freeradius.... Attaced below is my current freeradius and portslave config( Please bear with me, as I am only starting to use these... thanks ^_^) ## ## radiusd.conf -- FreeRADIUS server configuration file. ## ## http://www.freeradius.org/ ## # The location of other config files and # logfiles are declared in this file # # Also general configuration for modules can be done # in this file, it is exported through the API to # modules that ask for it. # Stuff from autoconf prefix = /usr/local exec_prefix = ${prefix} sysconfdir = ${prefix}/etc localstatedir = ${prefix}/var sbindir = ${exec_prefix}/sbin logdir = ${localstatedir}/log/radius libdir = ${exec_prefix}/lib raddbdir = ${sysconfdir}/raddb radacctdir = ${logdir}/radacct # Location of config and logfiles. confdir = ${raddbdir} run_dir = ${localstatedir}/run # pidfile: Where to place the PID of the RADIUS server. # # The server may be signalled while it's running by using this # file. # # e.g.: kill -HUP `cat /var/run/radiusd.pid` pidfile = ${run_dir}/radiusd.pid # user/group: The name (or #number) of the user/group to run radiusd as. # # We STRONGLY recommend that you run the server with as few permissions # as possible. That is, if you're not using shadow passwords, the # user and group items below should be set to 'nobody'. # # On SCO (ODT 3) use "user = nouser" and "group = nogroup". # # NOTE that some kernels refuse to setgid(group) # when the value of (unsigned)group is above 60000; # don't use group nobody on these systems! # # On systems with shadow passwords, you might have to set 'group = shadow' # for the server to be able to read the shadow password file. If you can # authenticate users while in debug mode, but not in normal use, it may be # because the debugged server is running as a user that can read the shadow # info, and the user listed below can not. user = root group = root # max_request_time: The maximum time (in seconds) to handle a request. # # Requests which take more time than this to process may be killed, and # a REJECT message is returned. # # WARNING: If you notice that requests take a long time to be handled, # then this MAY INDICATE a bug in the server, or in one of the modules # used to handle a request. # # Useful range of values: 5 to 120 max_request_time = 30 # delete_blocked_requests: If the request takes MORE THAN 'max_request_time' # to be handled, then maybe the server should delete it. # # If you're running in threaded, or thread pool mode, this setting # should probably be 'no'. Setting it to 'yes' when using a threaded # server MAY cause the server to crash! # delete_blocked_requests = no # cleanup_delay: The time to wait (in seconds) before cleaning up # a reply which was sent to the NAS. # # The RADIUS request is normally cached internally for a short period # of time, after the reply is sent to the NAS. The reply packet may be # lost in the network, and the NAS will not see it. The NAS will then # re-send the request, and the server will respond quickly with the # cached reply. # # If this value is set too low, then duplicate requests from the NAS # MAY NOT be detected, and will instead be handled as seperate requests. # # If this value is set too high, then the server will cache too many # requests, and some new requests may get blocked. (See 'max_requests'.) # # Useful range of values: 2 to 10 cleanup_delay = 5 # max_requests: The maximum number of requests which the server keeps # track of. This should be 256 multiplied by the number of clients. # e.g. With 4 clients, this number should be 1024. # # If this number is too low, then when the server becomes busy, # it will not respond to any new requests, until the 'cleanup_delay' # time has passed, and it has removed the old requests. # # If this number is set too high, then the server will use a bit more # memory for no real benefit. # # If you aren't sure what it should be set to, it's better to set it # too high than too low. Setting it to 1000 per client is probably # the highest it should be. # # Useful range of values: 256 to infinity max_requests = 1024 # bind_address: Make the server listen on a particular IP address, and # send replies out from that address. This directive is most useful # for machines with multiple IP addresses on one interface. # # It can either contain "*", or an IP address, or a fully qualified # Internet domain name. The default is "*" bind_address = * # port: Allows you to bind FreeRADIUS to a specific port. # # The default port that most NAS boxes use is 1645, which is historical. # RFC 2138 defines 1812 to be the new port. Many new servers and # NAS boxes use 1812, which can create interoperability problems. # # The port is defined here to be 0 so that the server will pick up # the machine's local configuration for the radius port, as defined # in /etc/services. # # If you want to use the default RADIUS port as defined on your server, # (usually through 'grep radius /etc/services') set this to 0 (zero). # # A port given on the command-line via '-p' over-rides this one. port = 0 # Which program to execute check doing concurrency checks. checkrad = ${sbindir}/checkrad # hostname_lookups: Log the names of clients or just their IP addresses # e.g., www.freeradius.org (on) or 206.47.27.232 (off). # The default is off because it'd be overall better for the net if people # had to knowingly turn this feature on, since enabling it means that # each client request will result in AT LEAST one lookup request to the # nameserver. # # Turning hostname lookups off also means that the server won't block # for 30 seconds, if it sees an IP address which has no name associated # with it. # # allowed values: {no, yes} hostname_lookups = no # Core dumps are a bad thing. This should only be set to 'yes' # if you're debugging a problem with the server. # # allowed values: {no, yes} allow_core_dumps = no # Regular expressions # # These items are set at configure time. If they're set to "yes", # then setting them to "no" turns off regular expression support. # # If they're set to "no" at configure time, then setting them to "yes" # WILL NOT WORK. It will give you an error. regular_expressions = yes extended_expressions = yes # Log the full User-Name attribute, as it was found in the request. # # allowed values: {no, yes} log_stripped_names = no # Log authentication requests to the log file. # # allowed values: {no, yes} log_auth = no # Log passwords with the authentication requests. # log_auth_badpass - logs password if it's rejected # log_auth_goodpass - logs password if it's correct # # allowed values: {no, yes} log_auth_badpass = no log_auth_goodpass = no # usercollide: Turn "username collision" code on and off. See the # "duplicate-users" documentation usercollide = no # lower_user / lower_pass: # Lowercase the username/password "before" or "after" # attempting to authenticate. # # If "before", the server will first modify the request # and then try to auth the user. If "after", the server # will first auth using the values provided by the # user. If that fails it will reprocess the request # after modifying it as you specify below. # # This is as close as we can get to case insensitivity. It is # the admin's job to ensure that the username on the auth # db side is *also* lowercase to make this work # # Default is 'no' (don't lowercase values) # Valid values = "before" / "after" / "no" lower_user = no lower_pass = no # nospace_user / nospace_pass: # Some users like to enter spaces in their username or # password incorrectly. To save yourself the tech support # call, you can eliminate those spaces here: # # Default is 'no' (don't remove spaces) # Valid values = "before" / "after" / "no" (explanation above) nospace_user = no nospace_pass = no # PROXY CONFIGURATION # # proxy_requests: Turns proxying of RADIUS requests on or off. # # The server has proxying turned on by default. If your system is NOT # set up to proxy requests to another server, then you can turn proxying # off here. This will save a small amount of resources on the server. # # If you have proxying turned off, and your configuration files say # to proxy a request, then an error message will be logged. # # To disable proxying, change the "yes" to "no", and comment the # $INCLUDE line. # # allowed values: {no, yes} proxy_requests = off $INCLUDE ${confdir}/proxy.conf # CLIENTS CONFIGURATION # # Client configuration is defined in "clients.conf". If you don't # use the "clients.conf", you can comment the following. The use of # "clients.conf" is recommended over the old "clients", though both # are supported. # #$INCLUDE ${confdir}/clients.conf # SNMP CONFIGURATION # # Snmp configuration is only valid if you enabled SNMP support when # you compiled radius. To enable SNMP configuration, uncomment the # following line. $INCLUDE ${confdir}/snmp.conf # THREAD POOL CONFIGURATION # # The thread pool is a long-lived group of threads which # take turns (round-robin) handling any incoming requests. # # # You probably want to have a few spare threads around, # so that high-load situations can be handled immediately. If you # don't have any spare threads, then the request handling will # be delayed while a new thread is created, and added to the pool. # # You probably don't want too many spare threads around, # otherwise they'll be sitting there taking up resources, and # not doing anything productive. # # The numbers given below should be adequate for most situations. thread pool { # Number of servers to start initially --- should be a reasonable # ballpark figure. start_servers = 5 # Limit on the total number of servers running. # # If this limit is ever reached, clients will be LOCKED OUT, so it # should NOT BE SET TOO LOW. It is intended mainly as a brake to # keep a runaway server from taking the system with it as it spirals # down... max_servers = 32 # Server-pool size regulation. Rather than making you guess how many # servers you need, FreeRADIUS dynamically adapts to the load it sees # --- that is, it tries to maintain enough servers to handle the # current load, plus a few spare servers to handle transient load # spikes. # # It does this by periodically checking how many servers are waiting # for a request. If there are fewer than min_spare_servers, it # creates a new spare. If there are more than max_spare_servers, some # of the spares die off. The default values are probably OK for most # sites. min_spare_servers = 3 max_spare_servers = 10 # There may be memory leaks or resource allocation problems with # the server. If so, set this value to 300 or so, so that the # resources will be cleaned up periodically. # # This should only be necessary if there are serious bugs in the # server which have not yet been fixed. # # '0' is a special value meaning 'infinity', or 'the servers never # exit' max_requests_per_server = 0 } modules { pam { # # The name to use for PAM authentication. # PAM looks in /etc/pam.d/${pam_auth_name} # for it's configuration. # # Note that any Pam-Auth attribute set in the 'users' # file over-rides this one. # pam_auth = radiusd } unix { # # Cache /etc/passwd, /etc/shadow, and /etc/group # # The default is to NOT cache them. However, caching them can # speed up system authentications by a substantial amount. # # allowed values: {no, yes} cache = no # Reload the cache every 600 seconds (10mins). 0 to disable. cache_reload = 600 # # Define the locations of the normal passwd, shadow, and # group files. # # 'shadow' is commented out by default, because not all # systems have shadow passwords. # passwd = /etc/passwd # shadow = /etc/shadow group = /etc/group # # Where the 'wtmp' file is located. # This will be moved to it's own module soon.. # radwtmp = ${logdir}/radwtmp } # EAP module for all EAP related authentications eap { # Invoke the default supported EAP type when # EAP-Identity response is received # default_eap_type = md5 # Default expiry time to clean the EAP list, # It is maintained to co-relate the # EAP-response for each EAP-request sent. # timer_expire = 60 # Supported EAP-types md5 { } } # This module supports SAMBA passwd file authorization # and MS-CHAP, MS-CHAPv2 authentication mschap { # if given passwd shows location of # SAMBA passwd file # passwd = /etc/smbpasswd # authtype value, if present, will be used # to overwrite (or add) Auth-Type during # authorization. Normally should be MS-CHAP authtype = MS-CHAP # if ignore_password set to yes mschap will # ignore password set by any other module during # authorization and will always use password file # ignore_password = yes } # This module definition allows you to use LDAP for # authorization and authentication (Auth-Type = LDAP) # See doc/rlm_ldap for description of configuration options # and sample authorize{} and authenticate{} blocks ldap { server = "ldap.your.domain" # identity = "cn=admin,o=My Org,c=UA" # password = mypass basedn = "o=My Org,c=UA" filter = "(uid=%u)" start_tls = no # default_profile = "cn=radprofile,ou=dialup,o=My Org,c=UA" # profile_attribute = "radiusProfileDn" access_group = "cn=clients,ou=dialup,o=My Org,c=UA" access_attr = "dialupAccess" dictionary_mapping = ${raddbdir}/ldap.attrmap # password_header = "{clear}" # password_attribute = userPassword # groupname_attribute = cn # groupmembership_filter = "(|(&(objectClass=GroupOfNames)(member=%{Ldap-UserDn}))(&(objectClass=GroupO fUniqueNames)(uniquemember=%{Ldap-UserDn})))" timeout = 4 timelimit = 3 net_timeout = 1 } # You can have multiple instances of the realm module to # support multiple realm syntaxs at the same time. The # search order is defined the order in the authorize and # preacct blocks after the module config block. # # Two config options: # format - must be 'prefix' or 'suffix' # delimiter - must be a single character # # 'username@realm' # realm suffix { format = suffix delimiter = "@" } # 'realm/username' # # Using this entry, IPASS users have their realm set to "IPASS". realm realmslash { format = prefix delimiter = "/" } # 'username%realm' realm realmpercent { format = suffix delimiter = "%" } # rewrite arbitrary packets. Useful in accounting and authorization. ## FIXME: This is highly experimental at the moment. Please give ## feedback. #attr_rewrite sanecallerid { # attribute = Called-Station-Id # may be "packet", "reply", or "config" # searchin = packet # searchfor = "[+ ]" # replacewith = "" # ignore_case = no # max_matches = 10 #} preprocess { huntgroups = ${confdir}/huntgroups hints = ${confdir}/hints # This hack changes Ascend's wierd port numberings # to standard 0-??? port numbers so that the "+" works # for IP address assignments. with_ascend_hack = no ascend_channels_per_line = 23 # Windows NT machines often authenticate themselves as # NT_DOMAIN\username # # If this is set to 'yes', then the NT_DOMAIN portion # of the user-name is silently discarded. with_ntdomain_hack = no # Specialix Jetstream 8500 24 port access server. # # If the user name is 10 characters or longer, a "/" # and the excess characters after the 10th are # appended to the user name. # # If you're not running that NAS, you don't need # this hack. with_specialix_jetstream_hack = no # Cisco sends it's VSA attributes with the attribute # name *again* in the string, like: # # H323-Attribute = "h323-attribute=value". # # If this configuration item is set to 'yes', then # the redundant data in the the attribute text is stripped # out. The result is: # # H323-Attribute = "value" # # If you're not running a Cisco NAS, you don't need # this hack. with_cisco_vsa_hack = no } files { usersfile = ${confdir}/users acctusersfile = ${confdir}/acct_users # If you want to use the old Cistron 'users' file # with FreeRADIUS, you should change the next line # to 'compat = cistron'. You can the copy your 'users' # file from Cistron. compat = no } # See README.rlm_fastusers before using this # module or changing these values. fastusers { usersfile = ${confdir}/users_fast hashsize = 1000 compat = no # Reload the hash every 600 seconds (10mins) hash_reload = 600 } detail { # Note that we do NOT use NAS-IP-Address here, as that # attribute MAY BE from the originating NAS, and NOT # from the proxy which actually sent us the request. # The Client-IP-Address attribute is ALWAYS the address # of the client which sent us the request. # detailfile = ${radacctdir}/%{Client-IP-Address}/detail detailperm = 0600 } # This module will add a (probably) unique session id # to an accounting packet based on the attributes listed # below found in the packet. see doc/README.rlm_acct_unique acct_unique { key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port-Id" } # Include another file that has SQL-related stuff in it. # This is another file solely because it tends to be big. $INCLUDE ${confdir}/sql.conf radutmp { filename = ${logdir}/radutmp perm = 0600 callerid = "yes" } # "Safe" radutmp - does not contain caller ID, so it can be # world-readable, and radwho can work for normal users, without # exposing any information that isn't already exposed by who(1). # # This is another instance of the radutmp module, but it is given # then name "sradutmp" to identify it later in the "accounting" # section. radutmp sradutmp { filename = ${logdir}/sradutmp perm = 0644 callerid = "no" } # attr_filter - filters the attributes received in replies from # proxied servers, to make sure we send back to our RADIUS client # only allowed attributes. attr_filter { attrsfile = ${confdir}/attrs } # This module takes an attribute (count-attribute), which MUST # be an 'integer' or 'time' attribute. It also takes a key, # and creates a counter for each unique key. The count is # incremented when accounting packets are received by the # server. The value of the increment is the value of the # count-attribute. # # The 'reset' parameter defines when the counters are all reset to # zero. It can be hourly, daily, weekly, or monthly. # # The counter-name is the name of the attribute in the 'users' # file used to access that counter. e.g. # # DEFAULT Daily-Session-Time > 3600, Auth-Type = Reject # Reply-Message = "You've used up more than one hour today" counter { filename = ${raddbdir}/db.counter key = User-Name count-attribute = Acct-Session-Time reset = daily counter-name = Daily-Session-Time check-name = Max-Daily-Session allowed-servicetype = Framed-User cache-size = 5000 } # The "always" module is here for debugging purposes. Each instance simply # returns the same result, always, without doing anything. always fail { rcode = fail } always reject { rcode = reject } always ok { rcode = ok simulcount = 0 mpp = no } # ANSI X9.9 token support. Not included by default. # $INCLUDE ${confdir}/x99.conf # Configuration for the example module. Uncommenting it will cause it # to get loaded and initialized, but should have no real effect as long # it is not referencened in one of the autz/auth/preacct/acct sections example { # Boolean variable. # allowed values: {no, yes} boolean = yes # An integer, of any value. integer = 16 # A string. string = "This is an example configuration string" # An IP address, either in dotted quad (1.2.3.4) or hostname # (example.com) ipaddr = 127.0.0.1 # A subsection mysubsection { anotherinteger = 1000 # They nest deeply nested { string = "This is a different string" } } } } # Authorization. First preprocess (hints and huntgroups files), # then realms, and finally look in the "users" file. # The order of the realm modules will determine the order that # we try to find a matching realm. # Make *sure* that 'preprocess' comes before any realm if you # need to setup hints for the remote radius server authorize { preprocess # counter # attr_filter # eap suffix files # mschap } # Authentication. # # This section lists which modules are available for authentication. # Note that it does NOT mean 'try each module in order'. It means # that you have to have a module from the 'authorize' section add # a configuration attribute 'Auth-Type := FOO'. That authentication type # is then used to pick the apropriate module from the list below. authenticate { # pam unix # By grouping modules together in an authtype block, that authtype will be # tried on each module in sequence until one returns REJECT or OK. This # allows authentication failover if the first SQL server has crashed, for # example. # authtype SQL { # sql # sql2 # } # ldap # mschap # eap } # Pre-accounting. Look for proxy realm in order of realms, then # acct_users file, then preprocess (hints file). preacct { suffix files preprocess } # Accounting. Log to detail file, and to the radwtmp file, and maintain # radutmp. accounting { # acct_unique detail # counter unix radutmp # sradutmp } # Session database, used for checking Simultaneous-Use. The radutmp module # handles this session { radutmp } # pslave.conf Here is the sample server configuration file. # # Version: 2002.01.10 # IP address - if left empty, uses the IP address of the system (hostname). # This is used as the "local" address for SLIP and PPP connections. # # used to be conf.ipno all.loc_host 192.168.1.2 # If you set this to "yes", you can always login locally by putting a '!' # before your loginname. Useful for emergencies when the RADIUS server is down. # all.locallogins no # Logging stuff - this program can use a remote syslog daemon if needed. # If you want to log locally leave the "syslog" field empty. The facility # field is an integer between 0 and 7 and sets the syslog facility to # local0-local7. # #all.syslog logger.someisp.com all.syslog all.facility 2 # Directory where your scripts that set up IP filtering (typically using # ipfwadmin) are stored. To invoke them, just add the RADIUS-attribute # Framed-Filter-Id = "foo" to your profile, where foo is the name of script. # all.filterdir /usr/local/etc/filters ## The all entry is used as a template for all others. This means that ## setting all.debug to "2", you set s0.debug, s1.debug, s2.debug etc. ## to "2". It also means that all these settings can be overridden on a ## per-port basis below. # Debugging output to syslog. Set to 0, 1, or 2. 2 is pretty verbose. # all.debug 2 # Authentication type - either "radius" or "none". # all.authtype radius # Default is to accept NULL passwords when doing radius authentication. Set # to "0" or "1". This option does not have effect on non-radius # authentication - i.e. if "authtype" is "none" or if you do a local login. # all.radnullpass yes # Authentication host and accounting host. We can have 2 of both. The # first one is always tried three times before switching to the second one. # They are alternately tried after that, upto maximum 10 times in total. # Timeout is 3 seconds per query. # all.authhost1 psinergybbs.com all.accthost1 psinergybbs.com #all.authhost1 mainhost.someisp.com #all.accthost1 mainhost.someisp.com #all.authhost2 backuphost.someisp.com #all.accthost2 backuphost.someisp.com # Timeout when waiting for response for an authentication or accounting # requests. The default is 3 seconds. # all.radtimeout 3 # The shared secret for RADIUS. # all.secret testing123 # Default protocol and host. # all.protocol ppp # Default IP stuff. If you end the "rem_host" with a "+", the portnumber will # be added to the IP number. The IP number of a port is used when the RADIUS # server doesn't send an IP number, or if it tells us to use a dynamic rem_host. # # Leave the netmask at 255.255.255.255, unless your really know what # you're doing. # # all.rem_host used to be all.ipno all.rem_host 10.0.0.2+ all.netmask 255.255.255.255 all.mtu 1500 # Standard message that is issued on connect. # all.issue \n\ Portslave Internet Services\n\ \n\ Welcome to terminal server %h port S%p \n\ \n\ Customer Support: 123-555-1212 http://www.myisp.net/\n\ \n # If you want portslave to update the wtmp file just # like a regular getty/login, set this to yes. # all.syswtmp yes ## Options for the serial port. # Porttype (passed to radius server for logging). # async, sync, isdn, isdn-v120, isdn-v110 # all.porttype async # Speed. All ports are set to 8N1. # all.speed 115200 # Use this to initialize the connection # # d == delay (1 sec), p == pause (0.1 sec), l == toggle DTR # r == <CR>, l == <LF> # # If the modem tells us the calling number by "NMBR = num" and the called # number by "NDID = num" (as some brands apparently do) then add the # following to the start of the initchat to recognise the CLI numbers: # SETVAR "S=NMBR = " \ # SETVAR "D=NDID = " \ # all.initchat TIMEOUT 10 \ ABORT "NO CARRIER" \ ABORT VOICE \ SETVAR "C=CARRIER " \ SETVAR C+PROTOCOL: \ SETVAR C?CONNECT \ "" \d\l\dATZ \ OK\r\n-ATZ-OK\r\n "\c" \ TIMEOUT 3600 \ RING "\c" \ STATUS Incoming %p:I.HANDSHAKE \ "" ATA \ TIMEOUT 75 \ CONNECT "\c" \ STATUS Connected %p:I.HANDSHAKE # Flow control on this serial port: # hard - hardware, rts/cts # soft - software, CTRL-S / CTRL-Q # none. # all.flow hard # Use the DCD line or not (this sets CLOCAL if off). This means that the # session will get hung up if the modem hangs up. Can be set to 0 or 1. # all.dcd yes # PPP options - used if we autodetect a PPP session. # Note that we set mru and mtu both to the MTU setting. # all.autoppp proxyarp %d asyncmap 0 %i: \ noipx noccp login auth require-pap refuse-chap \ mtu %t mru %t \ ms-dns 192.168.1.1 ms-dns 192.168.1.2 \ plugin /usr/local/lib/libpsr.so ## PPP options - User already authenticated and service type is PPP. # all.pppopt proxyarp %d asyncmap 0 %i:%j \ noipx noccp \ mtu %t mru %t \ netmask %m idle %I maxconnect %T \ ms-dns 192.168.1.1 ms-dns 192.168.1.2 \ plugin /usr/local/lib/libpsr.so ## Tty names are s0...s63. For every port we need to define a tty port, and ## an IP number for when radius tells us to pick one ourself. Unless you ## use the IP pool option mentioned above (IP number with "+" appended). ## ## Note that you can change _all_ of the above settings that start ## with all.xxxx on a per-port basis, such as issue, prompt etc. # ##make the first 32 ports be Rocketport #s{0-31} ttyR{0-31} ##used to need the following lines repeated #s0.tty ttyR0 #s1.tty ttyR1 #s2.tty ttyR2 ##make the next 32 ports be Cyclades #s{32-63} ttyC{0-31} ##make the next 32 ports be Stallion #s{64-95} ttyE{0-31} ##make ports 100 and 101 be standard serial. #s{100-101} ttyS{0-1} ##the above but for devfs #s{0-31} ttS/R{0-31} #s{32-63} ttS/C{0-31} #s{64-95} ttS/E{0-31} #s{100-101} ttS/{0-1} s100.tty ttyS0 - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html