📄 radiusd.8
字号:
.TH RADIUSD 8 "23 June 2004" "" "FreeRADIUS Daemon".SH NAMEradiusd - Authentication, Authorization and Accounting server.SH SYNOPSIS.B radiusd.RB [ \-A ].RB [ \-S ].RB [ \-a.IR accounting_directory ].RB [ \-b ].RB [ \-c ].RB [ \-d.IR config_directory ].RB [ \-f ].RB [ \-i.IR ip-address ].RB [ \-l.IR log_directory ].RB [ \-g.IR facility ].RB [ \-p.IR port ].RB [ \-s ].RB [ \-v ].RB [ \-x ].RB [ \-X ].RB [ \-y ].RB [ \-z ].SH DESCRIPTIONThis is the FreeRADIUS implementation of the well known.B radiusserver program. Even though this program is largely compatible with\fILivingston's\fP radius version 2.0, it is \fBnot\fP based on anypart of that code..PPFreeRADIUS is a high-performance and highly configurable RADIUSserver. As a result, it can be difficult to configure in systems withcomplex requirements. Our suggestion is to proceed via the followingsteps:.PP1) Always run the server in debugging mode (.B radiusd -X). We cannot emphasize this enough. If you are not running theserver in debugging mode, you \fIwill not\fP be able to see what isdoing, and you \fIwill not\fP be able to correct any problems..PP2) When editing the \fIradiusd.conf\fP file, change as little aspossible, especially in the \fIauthorize{}\fP section. The orderingof the modules is critical for the server to be able to"automatically" figure out how to handle the request. Changing theorder of the modules ensures that the server will not work..PP3) When testing, start off by configuring a user and password in the\fIusers\fP file. So long as the server knows about a user, and has aclear-text password for that user, \fBalmost all of the authenticationmethods will "just work"\fP..PP4) Gradually add more complex configurations to the server, whiletesting them as you go. If you start off by configuring the server ina complex configuration, you will never be able to debug it..PP5) Ask questions on the mailing list(freeradius-users@lists.freeradius.org). When asking questions,include the output from debugging mode (.B radiusd -X). This information will allow people to help you. Without it, yourmessage will get ignored..SH BACKGROUND\fBRADIUS\fP is a protocol spoken between an access server, typicallya device connected to several modems or ISDN lines, and a \fBradius\fPserver. When a user connects to the access server, (s)he is asked fora loginname and a password. This information is then sent to the \fBradius\fPserver. The server replies with "access denied", or "access OK". In thelatter case login information is sent along, such as the IP address inthe case of a PPP connection..PPThe access server also sends login and logout records to the \fBradius\fPserver so accounting can be done. These records are kept for each terminalserver seperately in a file called \fBdetail\fP, and in the \fIwtmp\fPcompatible logfile \fB/var/log/radwtmp\fP..SH OPTIONS.IP \-AWrite a file \fIdetail.auth\fP in addition to the standard \fBdetail\fP filein the same directory. This file will contain all the authentication-requestrecords. This can be useful for debugging, but not for normal operation.This command line option is accepted only for backwardscompatibility. It no longer does anything. See the configuration forthe \fIdetail\fP module in \fIradiusd.conf\fP..IP \-SWrite the stripped usernames (without prefix or suffix) in the \fBdetail\fPfile instead of the raw record as received from the terminal server.This command line option is deprecated. See the \fIlog_stripped_names\fPconfiguration item in the \fIradiusd.conf\fP file..IP "\-a \fIaccounting directory\fP"This defaults to \fI/var/log/radacct\fP. If that directory exists,\fBradiusd\fP will write an ascii accounting record into a detail file forevery login/logout recorded. The location of the detail file is\fIacct_dir/\fP\fBterminal_server\fP\fI/detail\fP.This command line option is deprecated. See the \fIradacctdir\fPconfiguration item in the \fIradiusd.conf\fP file..IP "\-l \fIlogging directory\fP"This defaults to \fI/var/log\fP. \fBRadiusd\fP writes a logfile herecalled \fIradius.log\fP. It contains informational and error messages,and optionally a record of every login attempt (for aiding an ISP'shelpdesk). The special arguments \fIstdout\fP and \fIstderr\fP causethe information to get written to the standard output, or standarderror instead. The special argument \fIsyslog\fP sends the informationwith \fBsyslog\fP(3).This command line option is deprecated. See the \fIlog_dir\fPconfiguration item in the \fIradiusd.conf\fP file..IP "\-g \fIfacility\fP"Specifies the syslog facility to be used with \fB-l syslog\fP. Default is\fIdaemon\fP. Another reasonable choice would be \fIauthpriv\fP..IP "\-d \fIconfig directory\fP"Defaults to \fI/etc/raddb\fP. \fBRadiusd\fP looks here for its configurationfiles such as the \fIdictionary\fP and the \fIusers\fP files..IP "\-i \fIip-address\fP"Defines which IP addres to bind to for sending and receiving packets-useful for multi-homed hosts.This command line option is deprecated. See the \fIbind_address\fPconfiguration item in the \fIradiusd.conf\fP file..IP \-bIf the \fBradius\fP server binary was compiled with \fIdbm\fP support,this flag tells it to actually \fIuse\fP the database files instead of theflat \fIusers\fP file.This command line option is deprecated, and does not do anything..IP \-cThis is still an \fIexperimental\fP feature.Cache the password, group and shadow files in a hash-table in memory.This makes the radius process use a bit more memory, but usernamelookups in the password file are \fImuch\fP faster..IPAfter every change in the real password file (user added, password changed)you need to send a \fBSIGHUP\fP to the radius server to let it re-readits configuration and the password/group/shadow files !This command line option is deprecated. See the \fIcache\fPconfiguration item for the \fIunix\fP module in the \fIradiusd.conf\fPfile..IP \-fDo not fork, stay running as a foreground process..IP "\-p \fIport\fP"Normally radiusd listens on the ports specified in \fI/etc/services\fP(radius and radacct). With this option radiusd listens on the specifiedport for authentication requests and on the specified port +1 foraccounting requests.This command line option is deprecated. See the \fIport\fPconfiguration item in the \fIradiusd.conf\fP file..IP \-sRun in "single server" mode. The server normally runs with multiplethreads and/or processes, which can lower its response time torequests. Some systems have issues with threading, however, sorunning in "single server" mode may help to address those issues. Insingle server mode, the server will also not "daemonize"(auto-background) itself..IP \-vPrint server version information and exit..IP \-xDebug mode. In this mode the server will print details of every requeston it's \fBstderr\fP output. Most useful in combination with \fB-s\fP.You can specify this option 2 times (-x -x or -xx) to get a bit moredebugging output..IP \-XExtended debug mode. Equivalent to -sfxx, but simpler to explain..IP \-yWrite details about every authentication request in the\fIradius.log\fP file.This command line option is deprecated. See the \fIlog_auth\fPconfiguration item in the \fIradiusd.conf\fP file..IP \-zInclude the password in the \fIradius.log\fP file \fBeven\fP for successfullogins. \fIThis is very insecure!\fP.This command line option is deprecated. See the\fIlog_auth_badpass\fP and the \fIlog_auth_goodpass\fP configurationitems in the \fIradiusd.conf\fP file..SH CONFIGURATION\fBRadiusd\fP uses a number of configuration files. Each file has it'sown manpage describing the format of the file. These files are:.IP radiusd.confThe main configuration file, which sets the administrator-controlleditems..IP dictionaryThis file is usually static. It defines all the possible RADIUS attributesused in the other configuration files. You don't have to modify it.It includes other dictionary files in the same directory..IP clients[ Deprecated ] Contains the IP address and a secret key for everyclient that wants to connect to the server..IP naslistContains an entry for every NAS (Network Access Server) in the network. Thisis not the same as a client, especially if you have \fBradius\fP proxy serverin your network. In that case, the proxy server is the client and it sendsrequests for different NASes..IPIt also contains a abbreviated name for eachterminal server, used to create the directory name where the \fBdetail\fPfile is written, and used for the \fB/var/log/radwtmp\fP file. Finallyit also defines what type of NAS (Cisco, Livingston, Portslave) the NAS is..IP hintsDefines certain hints to the radius server based on the users's loginnameor other attributes sent by the access server. It also provides formapping user names (such as Pusername -> username). This provides thefunctionality that the \fILivingston 2.0\fP server has as "Prefix" and"Suffix" support in the \fIusers\fP file, but is more general. Ofcoursethe Livingston way of doing things is also supported, and you can even useboth at the same time (within certain limits)..IP huntgroupsDefines the huntgroups that you have, and makes it possible to restrictaccess to certain huntgroups to certain (groups of) users..IP usersHere the users are defined. On a typical setup, this file mainly containsDEFAULT entries to process the different types of logins, based on hintsfrom the hints file. Authentication is then based on the contents ofthe UNIX \fI/etc/passwd\fP file. However it is also possible to define allusers, and their passwords, in this file..SH SEE ALSOradiusd.conf(5), users(5), huntgroups(5), hints(5),clients(5), dictionary(5)..SH AUTHORThe FreeRADIUS Server Project (http://www.freeradius.org)
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -