I am somewhat confused. My RADIUS server forgot about some clients, all by itself, honest!
Users stopped being able to authenticate (I say users, we had one!), using eduroam from Portugal, turns out that some time after September 5th, the RADIUS server stopped recognising the JANET roaming RADIUS servers! I had to restart the servers on September 8th after a failure of our Active Directory servers. RADIUS/Winbind did not recover without help when AD came back. It was the same config however. There had been a restart on 17th March, 8th Sep and 23rd Sep, so RADIUS was running at the time it developed its amnesia. -X output attached, with error at the bottom I am seeing when trying to authenticate from off-site. Anyone got any ideas? ---cut here # /usr/radius/sbin/radiusd -X FreeRADIUS Version 2.0.2, for host i386-pc-solaris2.10, built on Mar 7 2008 at 09:52:42 Copyright (C) 1999-2008 The FreeRADIUS server project and contributors. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. You may redistribute copies of FreeRADIUS under the terms of the GNU General Public License. Starting - reading configuration files ... including configuration file /usr/radius/etc/raddb/radiusd.conf including configuration file /usr/radius/etc/raddb/proxy.conf including configuration file /usr/radius/etc/raddb/snmp.conf including configuration file /usr/radius/etc/raddb/eap.conf including configuration file /usr/radius/etc/raddb/sql.conf including configuration file /usr/radius/etc/raddb/sql/mysql/dialup.conf including configuration file /usr/radius/etc/raddb/sql/mysql/counter.conf including configuration file /usr/radius/etc/raddb/policy.conf including files in directory /usr/radius/etc/raddb/sites-enabled/ including configuration file /usr/radius/etc/raddb/sites-enabled/janet-roaming including configuration file /usr/radius/etc/raddb/jrs-clients.conf including configuration file /usr/radius/etc/raddb/sites-enabled/local-auth including configuration file /usr/radius/etc/raddb/local-clients.conf including dictionary file /usr/radius/etc/raddb/dictionary main { prefix = "/usr/radius" localstatedir = "/usr/radius/var" logdir = "/usr/radius/log" libdir = "/usr/radius/lib" radacctdir = "/usr/radius/log/radacct" hostname_lookups = no max_request_time = 30 cleanup_delay = 5 max_requests = 1024 allow_core_dumps = no pidfile = "/usr/radius/var/run/radiusd/radiusd.pid" user = "radius" group = "radius" checkrad = "/usr/radius/sbin/checkrad" debug_level = 0 proxy_requests = yes security { max_attributes = 200 reject_delay = 1 status_server = yes } } radiusd: #### Loading Realms and Home Servers #### proxy server { retry_delay = 5 retry_count = 3 default_fallback = no dead_time = 120 wake_all_if_all_dead = no } realm LOCAL { authhost = LOCAL accthost = LOCAL } realm NULL { authhost = LOCAL accthost = LOCAL } realm liv.ac.uk { authhost = LOCAL accthost = LOCAL } realm liverpool.ac.uk { authhost = LOCAL accthost = LOCAL } realm DEFAULT { nostrip authhost = roaming0.ja.net:1812 accthost = roaming0.ja.net:1813 secret = <roaming0-secret> } realm DEFAULT { authhost = roaming1.ja.net:1812 accthost = roaming1.ja.net:1813 secret = <roaming1-secret> } # realm DEFAULT realm DEFAULT { authhost = roaming2.ja.net:1812 accthost = roaming2.ja.net:1813 secret = <roaming2-secret> } # realm DEFAULT radiusd: #### Instantiating modules #### instantiate { Module: Linked to module rlm_expr Module: Instantiating expr Module: Linked to module rlm_expiration Module: Instantiating expiration expiration { reply-message = "Password Has Expired " } Module: Linked to module rlm_logintime Module: Instantiating logintime logintime { reply-message = "You are calling outside your allowed timespan " minimum-timeout = 60 } } radiusd: #### Loading Virtual Servers #### server jrsradius { modules { Module: Checking authenticate {...} for more modules to load Module: Linked to module rlm_pap Module: Instantiating pap pap { encryption_scheme = "auto" auto_header = yes } Module: Linked to module rlm_chap Module: Instantiating chap Module: Linked to module rlm_mschap Module: Instantiating mschap mschap { use_mppe = yes require_encryption = yes require_strong = yes with_ntdomain_hack = yes ntlm_auth = "/usr/sfw/bin/ntlm_auth --request-nt-key --username=%{Stripped-User-Name:-%{User-Name:-None}} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00}" } Module: Linked to module rlm_unix Module: Instantiating unix unix { radwtmp = "/usr/radius/log/radwtmp" } Module: Linked to module rlm_ldap Module: Instantiating ldap ldap { server = "<ldapserver>" port = 389 password = "<password>" identity = "CN=<ldap-user>,OU=UOL,DC=liv,DC=ac,DC=uk" net_timeout = 1 timeout = 4 timelimit = 3 tls_mode = no start_tls = no tls_require_cert = "allow" tls { start_tls = no require_cert = "allow" } basedn = "OU=UOL,DC=liv,DC=ac,DC=uk" filter = "(sAMAccountName=%{%{Stripped-User-Name}:-%{User-Name}})" base_filter = "(objectclass=radiusprofile)" auto_header = no access_attr_used_for_allow = yes groupname_attribute = "cn" groupmembership_filter = "(|(&(objectClass=GroupOfNames)(member=%{Ldap-UserDn}))(&(objectClass=GroupOfUniqueNames)(uniquemember=%{Ldap-UserDn})))" dictionary_mapping = "/usr/radius/etc/raddb/ldap.attrmap" ldap_debug = 0 ldap_connections_number = 5 compare_check_items = no do_xlat = yes edir_account_policy_check = no set_auth_type = yes } rlm_ldap: Registering ldap_groupcmp for Ldap-Group rlm_ldap: Registering ldap_xlat with xlat_name ldap rlm_ldap: reading ldap<->radius mappings from file /usr/radius/etc/raddb/ldap.attrmap rlm_ldap: LDAP radiusCheckItem mapped to RADIUS $GENERIC$ rlm_ldap: LDAP radiusReplyItem mapped to RADIUS $GENERIC$ rlm_ldap: LDAP radiusAuthType mapped to RADIUS Auth-Type rlm_ldap: LDAP radiusSimultaneousUse mapped to RADIUS Simultaneous-Use rlm_ldap: LDAP radiusCalledStationId mapped to RADIUS Called-Station-Id rlm_ldap: LDAP radiusCallingStationId mapped to RADIUS Calling-Station-Id rlm_ldap: LDAP lmPassword mapped to RADIUS LM-Password rlm_ldap: LDAP ntPassword mapped to RADIUS NT-Password rlm_ldap: LDAP sambaLmPassword mapped to RADIUS LM-Password rlm_ldap: LDAP sambaNtPassword mapped to RADIUS NT-Password rlm_ldap: LDAP acctFlags mapped to RADIUS SMB-Account-CTRL-TEXT rlm_ldap: LDAP radiusExpiration mapped to RADIUS Expiration rlm_ldap: LDAP radiusNASIpAddress mapped to RADIUS NAS-IP-Address rlm_ldap: LDAP radiusServiceType mapped to RADIUS Service-Type rlm_ldap: LDAP radiusFramedProtocol mapped to RADIUS Framed-Protocol rlm_ldap: LDAP radiusFramedIPAddress mapped to RADIUS Framed-IP-Address rlm_ldap: LDAP radiusFramedIPNetmask mapped to RADIUS Framed-IP-Netmask rlm_ldap: LDAP radiusFramedRoute mapped to RADIUS Framed-Route rlm_ldap: LDAP radiusFramedRouting mapped to RADIUS Framed-Routing rlm_ldap: LDAP radiusFilterId mapped to RADIUS Filter-Id rlm_ldap: LDAP radiusFramedMTU mapped to RADIUS Framed-MTU rlm_ldap: LDAP radiusFramedCompression mapped to RADIUS Framed-Compression rlm_ldap: LDAP radiusLoginIPHost mapped to RADIUS Login-IP-Host rlm_ldap: LDAP radiusLoginService mapped to RADIUS Login-Service rlm_ldap: LDAP radiusLoginTCPPort mapped to RADIUS Login-TCP-Port rlm_ldap: LDAP radiusCallbackNumber mapped to RADIUS Callback-Number rlm_ldap: LDAP radiusCallbackId mapped to RADIUS Callback-Id rlm_ldap: LDAP radiusFramedIPXNetwork mapped to RADIUS Framed-IPX-Network rlm_ldap: LDAP radiusClass mapped to RADIUS Class rlm_ldap: LDAP radiusSessionTimeout mapped to RADIUS Session-Timeout rlm_ldap: LDAP radiusIdleTimeout mapped to RADIUS Idle-Timeout rlm_ldap: LDAP radiusTerminationAction mapped to RADIUS Termination-Action rlm_ldap: LDAP radiusLoginLATService mapped to RADIUS Login-LAT-Service rlm_ldap: LDAP radiusLoginLATNode mapped to RADIUS Login-LAT-Node rlm_ldap: LDAP radiusLoginLATGroup mapped to RADIUS Login-LAT-Group rlm_ldap: LDAP radiusFramedAppleTalkLink mapped to RADIUS Framed-AppleTalk-Link rlm_ldap: LDAP radiusFramedAppleTalkNetwork mapped to RADIUS Framed-AppleTalk-Network rlm_ldap: LDAP radiusFramedAppleTalkZone mapped to RADIUS Framed-AppleTalk-Zone rlm_ldap: LDAP radiusPortLimit mapped to RADIUS Port-Limit rlm_ldap: LDAP radiusLoginLATPort mapped to RADIUS Login-LAT-Port rlm_ldap: LDAP radiusReplyMessage mapped to RADIUS Reply-Message conns: 80946e8 Module: Linked to module rlm_eap Module: Instantiating eap eap { default_eap_type = "peap" timer_expire = 60 ignore_unknown_eap_types = no cisco_accounting_username_bug = no } Module: Linked to sub-module rlm_eap_md5 Module: Instantiating eap-md5 Module: Linked to sub-module rlm_eap_gtc Module: Instantiating eap-gtc gtc { challenge = "Password: " auth_type = "PAP" } Module: Linked to sub-module rlm_eap_tls Module: Instantiating eap-tls tls { rsa_key_exchange = no dh_key_exchange = yes rsa_key_length = 512 dh_key_length = 512 verify_depth = 0 pem_file_type = yes private_key_file = "/usr/radius/etc/raddb/certs/cert-radius2.pem" certificate_file = "/usr/radius/etc/raddb/certs/cert-radius2.pem" CA_file = "/usr/radius/etc/raddb/certs/demoCA/cacert.pem" private_key_password = "<password>" dh_file = "/usr/radius/etc/raddb/certs/dh" random_file = "/usr/radius/etc/raddb/certs/random" fragment_size = 1024 include_length = yes check_crl = no cipher_list = "DEFAULT" make_cert_command = "/usr/radius/etc/raddb/certs/bootstrap" } Module: Linked to sub-module rlm_eap_ttls Module: Instantiating eap-ttls ttls { default_eap_type = "md5" copy_request_to_tunnel = yes use_tunneled_reply = no } Module: Linked to sub-module rlm_eap_peap Module: Instantiating eap-peap peap { default_eap_type = "mschapv2" copy_request_to_tunnel = yes use_tunneled_reply = no proxy_tunneled_request_as_eap = yes } Module: Linked to sub-module rlm_eap_mschapv2 Module: Instantiating eap-mschapv2 mschapv2 { with_ntdomain_hack = no } Module: Checking authorize {...} for more modules to load Module: Linked to module rlm_preprocess Module: Instantiating preprocess preprocess { huntgroups = "/usr/radius/etc/raddb/huntgroups" hints = "/usr/radius/etc/raddb/hints" with_ascend_hack = no ascend_channels_per_line = 23 with_ntdomain_hack = no with_specialix_jetstream_hack = no with_cisco_vsa_hack = no with_alvarion_vsa_hack = no } Module: Linked to module rlm_detail Module: Instantiating auth_log detail auth_log { detailfile = "/usr/radius/log/radacct/%{Client-IP-Address}/auth-detail-%Y%m%d" header = "%t" detailperm = 384 dirperm = 493 locking = no log_packet_header = no } Module: Linked to module rlm_realm Module: Instantiating suffix realm suffix { format = "suffix" delimiter = "@" ignore_default = no ignore_null = no } Module: Linked to module rlm_files Module: Instantiating files files { usersfile = "/usr/radius/etc/raddb/users" acctusersfile = "/usr/radius/etc/raddb/acct_users" preproxy_usersfile = "/usr/radius/etc/raddb/preproxy_users" compat = "no" } Module: Checking preacct {...} for more modules to load Module: Linked to module rlm_acct_unique Module: Instantiating acct_unique acct_unique { key = "User-Name, Acct-Session-Id, NAS-IP-Address, Client-IP-Address, NAS-Port" } Module: Checking accounting {...} for more modules to load Module: Instantiating detail detail { detailfile = "/usr/radius/log/radacct/%{Client-IP-Address}/detail-%Y%m%d" header = "%t" detailperm = 384 dirperm = 493 locking = no log_packet_header = no } Module: Linked to module rlm_radutmp Module: Instantiating radutmp radutmp { filename = "/usr/radius/log/radutmp" username = "%{User-Name}" case_sensitive = yes check_with_nas = yes perm = 384 callerid = yes } Module: Linked to module rlm_attr_filter Module: Instantiating attr_filter.accounting_response attr_filter attr_filter.accounting_response { attrsfile = "/usr/radius/etc/raddb/attrs.accounting_response" key = "%{User-Name}" } Module: Checking session {...} for more modules to load Module: Checking post-proxy {...} for more modules to load Module: Checking post-auth {...} for more modules to load Module: Instantiating attr_filter.access_reject attr_filter attr_filter.access_reject { attrsfile = "/usr/radius/etc/raddb/attrs.access_reject" key = "%{User-Name}" } } } server radius { modules { Module: Checking authenticate {...} for more modules to load Module: Checking authorize {...} for more modules to load Module: Checking preacct {...} for more modules to load Module: Checking accounting {...} for more modules to load Module: Checking session {...} for more modules to load Module: Checking post-proxy {...} for more modules to load Module: Checking post-auth {...} for more modules to load } } server { modules { } } radiusd: #### Opening IP addresses and Ports #### listen { type = "auth" ipaddr = jrsradius2.liv.ac.uk IP address [138.253.100.222] port = 0 client localhost { ipaddr = 127.0.0.1 require_message_authenticator = no secret = "<password>" nastype = "other" } client 138.253.xxx.xxx { require_message_authenticator = no secret = "<password>" shortname = "dot1x" nastype = "cisco" } client 138.253.xxx.xxx { require_message_authenticator = no secret = "<password>" shortname = "wism1" nastype = "cisco" } client 138.253.xxx.xxx { require_message_authenticator = no secret = "<password>" shortname = "wism2" nastype = "cisco" } client roaming0.ja.net { require_message_authenticator = no secret = "<password>" shortname = "roaming0.ja.net" nastype = "other" } client roaming1.ja.net { require_message_authenticator = no secret = "<password>" shortname = "roaming1.ja.net" nastype = "other" } client roaming2.ja.net { require_message_authenticator = no secret = "<password>" shortname = "roaming2.ja.net" nastype = "other" } client 138.253.xxx.xxx { require_message_authenticator = no secret = "<password>" shortname = "roamnet1.liv.ac.uk" nastype = "other" } client 138.253.xxx.xxx { require_message_authenticator = no secret = "<password>" shortname = "campus" nastype = "other" } } listen { type = "acct" ipaddr = jrsradius2.liv.ac.uk IP address [138.253.100.222] port = 0 } listen { type = "auth" ipaddr = radius2.liv.ac.uk IP address [138.253.100.220] port = 0 client localhost { ipaddr = 127.0.0.1 require_message_authenticator = no secret = "<password>" nastype = "other" } client 138.253.100.121 { require_message_authenticator = no secret = "<password>" shortname = "EZProxy" nastype = "other" } client 138.253.xxx.xxx { require_message_authenticator = no secret = "<password>" shortname = "wism1" nastype = "cisco" } client 138.253.xxx.xxx { require_message_authenticator = no secret = "<password>" shortname = "wism2" nastype = "cisco" } client 138.253.xxx.xxx { require_message_authenticator = no secret = "<password>" shortname = "vpn3000" nastype = "cisco" } client 138.253.xxx.xxx { require_message_authenticator = no secret = "<password>" shortname = "blueskt" nastype = "other" } } listen { type = "acct" ipaddr = radius2.liv.ac.uk IP address [138.253.100.220] port = 0 } Listening on authentication address 138.253.100.222 port 1812 as server jrsradius Listening on accounting address 138.253.100.222 port 1813 as server jrsradius Listening on authentication address 138.253.100.220 port 1812 as server radius Listening on accounting address 138.253.100.220 port 1813 as server radius Listening on proxy address 138.253.100.222 port 1814 Ready to process requests. Ignoring request to authentication address 138.253.100.222 port 1812 as server jrsradius from unknown client 194.83.56.233 port 61020 --------------- Barry Dean Networks Team Computing Services Department Web: http://pcwww.liv.ac.uk/~bvd/ --- Nice boy, but about as sharp as a sack of wet mice. -- Foghorn Leghorn - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html