📄 readme.lucent
字号:
$Id: README.LUCENT,v 1.1 2002/01/19 16:38:56 kiavik Exp $1999/6/23 RADIUS Server 2.1 Release Note The Lucent Remote Access RADIUS server 2.1 with support for RADIUSproxy, iPass roaming, and ActivCard is now available in binary formfor the following platforms, and in source form.IBM RS6000 AIX 4.2Alpha Digital UNIX 4.0BSD/OS 3.0HP-UX 10.20Slackware Linux 2.0Redhat Linux 5.2SGI IRIX 6.3SunOS 4.1.4Solaris 2.5.1Solaris x86 2.5.1NOTE! This release removes the obsolete RADPASS feature. In addition,User-Name values with embedded "at" signs (@) are now treated as proxyrealms.RADIUS server 2.1 includes a new dictionary file with support for theClass, LE-Advice-of-Charge, and LE-Terminate-Detail attributes added inComOS(R) 3.8. Attributes added in ComOS 3.9 and 4.1 are also included.The sradiusd daemon provides support for ActivCard on platformssupported by ActivEngine 2.1: AIX, HP-UX, SunOS, and Solaris.All other files are the same as in RADIUS server 2.0.1.Support is available only for customers owning Lucent PortMasterproducts. Information on contacting Lucent Remote Access technicalsupport is listed at the end of this release note.The radiusd daemon uses GDBM 1.7.3 instead of NDBM on some systems; thesource for GDBM is available for free from ftp://ftp.gnu.org/pub/gnu/gdbm/and other Free Software Foundation (FSF) distribution sites._______________ ContentsRADIUS Server Features Y2K compliant Proxy RADIUS ActivCard iPass Support Accounting Signatures Now Required Vendor-Specific Attributes Virtual Ports Alternate Password File Address Binding Improved Messages Enhanced DebuggingBugs FixedRADIUS test program radtestHow Proxy RADIUS Works and How to Configure ItUpgradingSupport_______________ RADIUS Server FeaturesRADIUS server 2.1 supports the following features: Y2K ComplianceRADIUS server 2.1 is Y2K compliant. It treats all dates internallyas 32-bit unsigned integers or time_t, and prints years in 4-digitformat (for example, 1999). You must ensure that the operatingsystem you are running the RADIUS server on is also Y2K compliant. AllPortMaster products are Y2K compliant because they do not track the year. Proxy RADIUSProxy RADIUS is a feature in which one RADIUS server can forward anauthentication request to a remote RADIUS server, and return its replyto the network access server (NAS). A common use for proxy RADIUS isroaming. Roaming permits two or more ISPs to allow each other'susers to dial in to either ISP's network for service. For more information on proxy RADIUS, see "How Proxy RADIUS Works and Howto Configure It" later in this release note. ActivCardRADIUS server 2.1 now supports ActivCard as well as SecurID forauthentication. Do the following to authenticate a user with ActivCard: 1. Install the new ActivCard server on the same host as the RADIUS server or another host.2. Create the /etc/raddb/config.aeg file on your RADIUS server host describing the parameters used to connect to the ActivCard server.3. Use "Auth-Type = ActivCard" as a check item for the user. iPass SupportRADIUS server 2.1 now supports the iPass protocol. Do the followingto use iPass:1. Register at the iPass website http://www.ipass.com/.2. Add the "ipass" keyword to the appropriate entries in your /etc/raddb/proxy file.3. Run the iradiusd binary instead of radiusd.Direct any problems with the iPass support to iPass technical supportfirst; iPass will contact Lucent Remote Access, if necessary. Accounting Signatures Now RequiredEarlier releases of the Lucent Remote Access RADIUS server loggedRADIUS accounting packets even if their request authenticators wereinvalid. This behavior provided backwards compatibility with ComOS 3.3and earlier releases. RADIUS server 2.1 now discards invalid accountingpackets and logs an error message. CAUTION! If you have any PortMaster running ComOS 3.3 or earlier,you must upgrade it to ComOS release 3.3.1 or later to use RADIUSserver 2.1.The -o flag is provided for backwards compatibility with noncompliantRADIUS clients. If radiusd is run with the -o flag, it logs unsignedaccounting records, and flags them with "Request-Authenticator =None". If radiusd is run without the -o flag, it does not log unsignedaccounting records. Vendor-Specific AttributesRADIUS server 2.1 supports vendor-specific attributes inaccounting-request packets to support the LE-Advice-of-Charge andLE-Terminate-Detail attributes added in ComOS 3.8. ComOS releases areavailable at http://www.livingston.com/forms/one-click-dnload.cgi and viaFTP at ftp://ftp.livingston.com/pub/le/upgrades/.The dictionary file uses the following syntax to define vendor-specificattributes that follow the suggested format in RFC 2138:## Vendor-Specific attributes use the SMI Network Management Private# Enterprise Code from the "Assigned Numbers" RFC.#VENDOR Livingston 307# Livingston Vendor-Specific Attributes (requires ComOS 3.8 and RADIUS 2.1)ATTRIBUTE LE-Terminate-Detail 2 string LivingstonATTRIBUTE LE-Advice-of-Charge 3 string LivingstonLE-Terminate-Detail is a string, included in RADIUS Accounting Stoprecords generated by ComOS 3.8, that contains a detailed description ofthe reason for session termination.LE-Advice-of-Charge is a string containing the Advice of Chargeinformation (if any) provided on the ISDN D channel by the telephonecompany. Virtual PortsIf the file /etc/raddb/vports exists, it restricts the number of loginsto each telephone number listed in the file. The first column of thefile contains the Called-Station-Id, and the second column contains thenumber of logins permitted into that telephone number. This "virtual ports" feature provides only an approximate accesscontrol. Logins occurring before radiusd starts running are notconsidered in the count, nor are accounting records that go to the backupaccounting server. To use this feature you must run radiusd with the -s (single-threaded)flag, and your must run the authentication and accounting servers on thesame host.This feature does not provide simultaneous login limits for users. Itis based on Called-Station-Id, not Calling-Station-Id. Alternate Password FileYou can use the -f flag with radiusd to specify an alternative to thepassword file /etc/passwd. Address BindingThe -i <Address> flag to radiusd instructs the RADIUS server to bind tothe specified IP address to listen for requests, instead of binding toany address. This address binding is useful for running radiusd onmultihomed hosts. Improved Messages* The Calling-Station-Id, where known, is now included in the syslogmessage for many kinds of rejected access-requests, to help youidentify where failed login attempts are dialing from. Currently,this value is logged to syslog for unknown users and for failed "Auth-Type = System" logins. For example:Jul 10 21:10:50 ra radius[14870]: unix_pass: password for "bob" at 5551234 failedThe actual syslog message appears on one line, but is broken into twolines here for legibility.* Other log messages are now more detailed. For example:Jul 10 21:10:50 ra radius[14870]: forwarding request from 192.168.96.6/1093.139 to 172.16.3.24/1645.17 for edu.comThe numbers after the slash are the UDP port (1645) and the RADIUSmessage ID (17) for easier tracking. The actual syslog message appearson one line, but is broken into two lines here for legibility. Enhanced DebuggingSending a SIGUSR1 signal to radiusd now turns on debugging, and sendingSIGUSR2 turns off debugging. Either signal, or exiting radiusd, logs ashort summary of the daemon's activity. The format is subject to change,but for this release the summary looks like the following examples. Theactual syslog message appears on one line, but is broken into two lineshere for legibility.Example 1Mar 19 23:10:50 ra radius[14870]: counters 5 8 / 2 4 / accept 4 reject 1challenge 0 response 8In this example, five packets were received on the RADIUS port (usually1645 unless changed with the -p flag), eight packets were received onthe RADIUS accounting port. Two RADIUS proxy replies were received, andfour RADIUS accounting proxy replies were received. The RADIUS serversent four access-accepts, one access-reject, noaccess-challenges, and eight accounting responses.Example 2Jul 28 09:56:01 ra radius[19340]: memory usage = pair 8/35/4784 peer 0/0/0 req 1/4/570 buf 1/4/570This memory usage summary displays allocations for each of the fourmajor data structures used by radiusd, in the format x/y/z:* x is the number of data structures allocated but not yet freed.* y is the high-water mark (the most structures ever allocated but not freed at one time).* z is the total number of structures allocated._______________ Bugs Fixed* A misconfigured user entry that has a check item of Auth-Type = Local with no Password check item now rejects the user with the debug message "Warning: entry for user <name> is missing its Password check item".* An unknown Auth-Type check item now generates an error message and rejects the user.* A memory leak that resulted from the use of multiple DEFAULT user entries is fixed.* The password decryption code no longer calculates the next RSA Data Security, Inc. MD5 Message-Digest Algorithm (MD5) digest when it does not need to.* The radiusd daemon is now strictly compliant with RFC 2139 and discards accounting-request packets with invalid request authenticators. As a result, you must run ComOS 3.3.1 or later to use RADIUS accounting with RADIUS server 2.1. The -o flag is provided for backwards compatibility with noncompliant RADIUS clients.* Assorted memory leaks and pointer problems have been corrected._______________ RADIUS test program radtestRADIUS 2.1 includes a simple example client program called radtest, that sends a RADIUS packet to a server running on the same host as radtest,and prints out the attributes returned. It doesn't support accountingpackets yet. It always fills in the NAS-IP-Address as 127.0.0.1 andthe NAS-Port as 1. Passwords longer than 16 characters are not supported. It looks for its dictionary in the same directory it is run from. radtest -v prints the version.radtest -h prints help: ./radtest -d called_id -f -g calling_id -h -i id -p port -s secret -t type -v -x -u username password The other flags work as follows: -d Called Station Id-f Send framed dialin hint -g Calling Station Id -i Use id as the packet identifier-p Use port as the port (defaults to definition in /etc/services, or 1645)-s to specify shared secret (defaults to "localkey")-t send type as service type (overrides -f)-u Specifies username and password (notice that this takes two arguments)-x debug option (doesn't do anything currently)_______________ How Proxy RADIUS Works and How to Configure ItProxy RADIUS is a feature in which one RADIUS server can forward anauthentication request to a remote RADIUS server, and return its replyto the NAS. A common use for proxy RADIUS is "roaming." Roaming permitstwo or more ISPs to allow each other's users to dial in to eitherISP's network for service.The "network access server (NAS)" (PortMaster) sends its RADIUSaccess-request to the "forwarding server," which forwards it to the"remote server." The remote server sends an access-accept,access-reject, or access-challenge resonse back to the forwarding server,which sends it back to the NAS. The choice of which server to forwardthe request to is based on the authentication "realm." RealmsA realm can be either of the following: * The part following the "at" sign (@) in a username (a "named realm")* A Called-Station-Id (a "numbered realm") The forwarding server checks for a numbered realm before checking for anamed realm. Frequently, a domain name is used as the named realm toprovide uniqueness.The RADIUS server 2.1 radiusd daemon also supports the "realm/user"style of username, but Lucent Remote Access recommends that you avoidthis username style. Support is provided for older RADIUS servers thatrequire it. However, because the "at" sign (@) always takes precedenceover the slash (/), radiusd interprets the username "a/b@c" as user "a/b"in the named realm "c", for example. Such mixtures are stronglydiscouraged and might not be supported in future releases. Accounting InformationRADIUS accounting-request packets are logged by both the forwardingserver and remote server, but are acknowledged to the NAS only when theremote server sends an accounting-response back to the forwarding server.NOTE! The remote server places the accounting information in adirectory under /usr/adm/radacct named after the forwarding server, NOT
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -