File: radiusd.8

package info (click to toggle)
xtradius 1.1-pre2-1
  • links: PTS
  • area: main
  • in suites: woody
  • size: 880 kB
  • ctags: 803
  • sloc: ansic: 8,719; perl: 651; sh: 219; makefile: 116; sql: 21
file content (184 lines) | stat: -rw-r--r-- 7,324 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
.TH RADIUSD 8 "28 June 2000" "" "Cistron Radius Daemon"
.SH NAME
radiusd -- Authentication, Authorization and Accounting server
.SH SYNOPSIS
.B radiusd
.RB [ \-A ]
.RB [ \-C ]
.RB [ \-D ]
.RB [ \-S ]
.RB [ \-a
.IR accounting_directory ]
.RB [ \-b ]
.RB [ \-c ]
.RB [ \-d
.IR config_directory ]
.RB [ \-f ]
.RB [ \-i
.IR ip-address ]
.RB [ \-l
.IR log_directory ]
.RB [ \-p
.IR port ]
.RB [ \-s ]
.RB [ \-v ]
.RB [ \-w ]
.RB [ \-x ]
.RB [ \-y ]
.RB [ \-z ]
.SH DESCRIPTION
This is the Cistron implementation of the well known
.B radius
server program. It is based on \fILivingston's\fP radius version 1.16.
Even though this program is largely compatible with \fILivingston's\fP
radius version 2.0, it's \fBnot\fP based on any part of that code.
.PP
\fBRADIUS\fP is a protocol spoken between an access server, typically
a device connected to several modems or ISDN lines, and a \fBradius\fP
server. When a user connects to the access server, (s)he is asked for
a loginname and a password. This information is then sent to the \fBradius\fP
server. The server replies with "access denied", or "access OK". In the
latter case login information is sent along, such as the IP address in
the case of a PPP connection.
.PP
The access server also sends login and logout records to the \fBradius\fP
server so accounting can be done. These records are kept for each terminal
server seperately in a file called \fBdetail\fP, and in the \fIwtmp\fP
compatible logfile \fB/var/log/radwtmp\fP.
.SH OPTIONS

.IP \-A
Write a file \fIdetail.auth\fP in addition to the standard \fBdetail\fP file
in the same directory. This file will contain all the authentication-request
records. This can be useful for debugging, but not for normal operation.

.IP \-C

Just check the syntax of the config files, print a diagnostic message,
and exit.  If the config files are not OK the exit value will be non-zero.

.IP \-S
Write the stripped usernames (without prefix or suffix) in the \fIdetail\fP
file instead of the raw record as received from the terminal server.

.IP "\-a \fIaccounting directory\fP"
This defaults to \fI/var/log/radacct\fP. If that directory exists,
\fBradiusd\fP will create a subdirectory with the name of the terminal
server and write an ascii accounting record into a detail file (called
\fIdetail\fP) for every login/logout recorded.
The subdirectory name is the "short name"
as defined in \fI/etc/raddb/naslist\fP or, if there isn't one, the
full DNS name.
.IP
If the name of the accounting directory ends in a "/" then no subdirectories
will be created and all accounting data will be written into one common
"detail" file.

.IP "\-l \fIlogging directory\fP"
This defaults to \fI/var/log\fP. \fBRadiusd\fP writes a logfile here called
\fIradius.log\fP. It contains informational and error messages, and optionally
a record of every login attempt (for aiding an ISP's helpdesk). The
special argument \fIstdout\fP causes the information to get written
to the standard output instead.

.IP "\-d \fIconfig directory\fP"
Defaults to \fI/etc/raddb\fP. \fBRadiusd\fP looks here for its configuration
files such as the \fIdictionary\fP and the \fIusers\fP files.

.IP "\-i \fIip-address\fP"
Defines which IP addres to bind to for sending and receiving packets-
useful for multi-homed hosts.

.IP \-b
If the \fBradius\fP server binary was compiled with \fIdbm\fP support,
this flag tells it to actually \fIuse\fP the database files instead of the
flat \fIusers\fP file.

.IP \-c
This is still an \fIexperimental\fP feature.
Cache the password, group and shadow files in a hash-table in memory.
This makes the radius process use a bit more memory, but username
lookups in the password file are \fImuch\fP faster.
.IP
After every change in the real password file (user added, password changed)
you need to send a \fBSIGHUP\fP to the radius server to let it re-read
its configuration and the password/group/shadow files !

.IP \-D
Do not use DNS. Actually this means that DNS isn't used to resolve IP
addresses to hostnames whenever there is something to be logged. If you
really don't want to use DNS at all, you should use dotted-quad notation for
all hostnames/addresses anywhere in the configuration files as well.

.IP \-f
Do not fork, stay running as a foreground process.

.IP "\-p \fIport\fP"
Normally radiusd listens on the ports specified in \fI/etc/services\fP
(radius and radacct). With this option radiusd listens on the specified
port for authentication requests and on the specified port +1 for
accounting requests.

.IP \-s
Normally, the server forks a seperate process for accounting, and a seperate
process for every authentication request. With this flag the server will not
do that. It won't even "daemonize" (auto-background) itself.

.IP \-w
Do not write the \fIradwtmp\fP file.

.IP \-x
Debug mode. In this mode the server will print details of every request
on it's \fBstderr\fP output. Most useful in combination with \fB-s\fP.
You can specify this option 2 times (-x -x or -xx) to get a bit more
debugging output.

.IP \-y
Write details about every authentication request in the
\fIradius.log\fP file.

.IP \-z
Include the password in the \fIradius.log\fP file \fBeven\fP for successful
logins. \fIThis is very insecure!\fP.

.SH CONFIGURATION
\fBRadiusd\fP uses 6 configuration files. Each file has it's own manpage
describing the format of the file. These files are:
.IP dictionary
This file is usually static. It defines all the possible RADIUS attributes
used in the other configuration files. You don't have to modify it.
.IP clients
Contains the IP address and a secret key for every client that wants
to connect to the server.
.IP naslist
Contains an entry for every NAS (Network Access Server) in the network. This
is not the same as a client, especially if you have \fBradius\fP proxy server
in your network. In that case, the proxy server is the client and it sends
requests for different NASes.
.IP
It also contains a abbreviated name for each
terminal server, used to create the directory name where the \fBdetail\fP
file is written, and used for the \fB/var/log/radwtmp\fP file. Finally
it also defines what type of NAS (Cisco, Livingston, Portslave) the NAS is.
.IP hints
Defines certain hints to the radius server based on the users's loginname
or other attributes sent by the access server. It also provides for
mapping user names (such as Pusername -> username). This provides the
functionality that the \fILivingston 2.0\fP server has as "Prefix" and
"Suffix" support in the \fIusers\fP file, but is more general. Ofcourse
the Livingston way of doing things is also supported, and you can even use
both at the same time (within certain limits).
.IP huntgroups
Defines the huntgroups that you have, and makes it possible to restrict
access to certain huntgroups to certain (groups of) users.
.IP users
Here the users are defined. On a typical setup, this file mainly contains
DEFAULT entries to process the different types of logins, based on hints
from the hints file. Authentication is then based on the contents of
the UNIX \fI/etc/passwd\fP file. However it is also possible to define all
users, and their passwords, in this file.
.SH SEE ALSO
builddbm(8rad), users(5rad), huntgroups(5rad), hints(5rad),
clients(5rad), dictionary(5rad).
.SH AUTHOR
Miquel van Smoorenburg, miquels@cistron.nl.