1 --- a/raddb/dictionary.in
2 +++ b/raddb/dictionary.in
5 # The filename given here should be an absolute path.
7 -$INCLUDE @prefix@/share/freeradius/dictionary
8 +$INCLUDE @prefix@/share/freeradius2/dictionary
11 # Place additional attributes or $INCLUDEs here. They will
15 # then that EAP type takes precedence over the
16 # default type configured here.
18 - default_eap_type = md5
19 + default_eap_type = peap
21 # A list is maintained to correlate EAP-Response
22 # packets with EAP-Request packets. After a
24 # for wireless connections. It is insecure, and does
25 # not provide for dynamic WEP keys.
35 # User-Password, or the NT-Password attributes.
36 # 'System' authentication is impossible with LEAP.
46 # the users password will go over the wire in plain-text,
51 # The default challenge, which many clients
53 #challenge = "Password: "
55 # configured for the request, and do the
56 # authentication itself.
66 # In these cases, fragment size should be
69 - # fragment_size = 1024
70 + fragment_size = 1024
72 # include_length is a flag which is
73 # by default set to yes If set to
75 # message is included ONLY in the
76 # First packet of a fragment series.
78 - # include_length = yes
79 + include_length = yes
81 # Check the Certificate Revocation List
84 # configuration. It is here ONLY to make
85 # initial deployments easier.
87 - make_cert_command = "${certdir}/bootstrap"
88 + # make_cert_command = "${certdir}/bootstrap"
91 # Session resumption / fast reauthentication
93 # You probably also want "use_tunneled_reply = yes"
94 # when using fast session resumption.
99 # Enable it. The default is "no".
100 # Deleting the entire "cache" subsection
101 @@ -315,14 +315,14 @@
102 # enable resumption for just one user
103 # by setting the above attribute to "yes".
109 # Lifetime of the cached entries, in hours.
110 # The sessions will be deleted after this
113 - lifetime = 24 # hours
114 + # lifetime = 24 # hours
117 # The maximum number of entries in the
119 # This could be set to the number of users
120 # who are logged in... which can be a LOT.
124 + # max_entries = 255
128 # As of version 2.1.10, client certificates can be
131 # in the control items for a request.
135 # The tunneled EAP session needs a default
136 # EAP type which is separate from the one for
137 # the non-tunneled EAP module. Inside of the
139 # If the request does not contain an EAP
140 # conversation, then this configuration entry
142 - default_eap_type = md5
143 +# default_eap_type = mschapv2
145 # The tunneled authentication request does
146 # not usually contain useful attributes
148 # is copied to the tunneled request.
150 # allowed values: {no, yes}
151 - copy_request_to_tunnel = no
152 +# copy_request_to_tunnel = yes
154 # The reply attributes sent to the NAS are
155 # usually based on the name of the user
157 # the tunneled request.
159 # allowed values: {no, yes}
160 - use_tunneled_reply = no
161 +# use_tunneled_reply = no
164 # The inner tunneled request can be sent
165 @@ -443,13 +443,13 @@
166 # the virtual server that processed the
169 - virtual_server = "inner-tunnel"
170 +# virtual_server = "inner-tunnel"
172 # This has the same meaning as the
173 # same field in the "tls" module, above.
174 # The default value here is "yes".
175 # include_length = yes
179 ##################################################
181 @@ -518,14 +518,14 @@
183 # the PEAP module also has these configuration
184 # items, which are the same as for TTLS.
185 - copy_request_to_tunnel = no
186 - use_tunneled_reply = no
187 + copy_request_to_tunnel = yes
188 + use_tunneled_reply = yes
190 # When the tunneled session is proxied, the
191 # home server may not understand EAP-MSCHAP-V2.
192 # Set this entry to "no" to proxy the tunneled
193 # EAP-MSCHAP-V2 as normal MSCHAPv2.
194 - # proxy_tunneled_request_as_eap = yes
195 + proxy_tunneled_request_as_eap = no
198 # The inner tunneled request can be sent
200 # the virtual server that processed the
203 - virtual_server = "inner-tunnel"
204 + # virtual_server = "inner-tunnel"
205 + EAP-TLS-Require-Client-Cert = no
209 --- a/raddb/modules/counter
210 +++ b/raddb/modules/counter
212 # 'check-name' attribute.
215 - filename = ${db_dir}/db.daily
216 + filename = ${radacctdir}/db.daily
218 count-attribute = Acct-Session-Time
220 --- a/raddb/modules/pap
221 +++ b/raddb/modules/pap
223 # with the correct value. It will also automatically handle
224 # Base-64 encoded data, hex strings, and binary data.
229 --- a/raddb/modules/radutmp
230 +++ b/raddb/modules/radutmp
231 @@ -12,7 +12,7 @@ radutmp {
232 # Where the file is stored. It's not a log file,
233 # so it doesn't need rotating.
235 - filename = ${logdir}/radutmp
236 + filename = ${radacctdir}/radutmp
238 # The field in the packet to key on for the
239 # 'user' name, If you have other fields which you want
240 --- a/raddb/modules/sradutmp
241 +++ b/raddb/modules/sradutmp
243 # then name "sradutmp" to identify it later in the "accounting"
246 - filename = ${logdir}/sradutmp
247 + filename = ${radacctdir}/sradutmp
251 --- a/raddb/radiusd.conf.in
252 +++ b/raddb/radiusd.conf.in
253 @@ -66,7 +66,7 @@ name = radiusd
255 # Location of config and logfiles.
256 confdir = ${raddbdir}
257 -run_dir = ${localstatedir}/run/${name}
258 +run_dir = ${localstatedir}/run
260 # Should likely be ${localstatedir}/lib/radiusd
262 @@ -290,7 +290,7 @@ listen {
263 # If your system does not support this feature, you will
264 # get an error if you try to use it.
269 # Per-socket lists of clients. This is a very useful feature.
271 @@ -317,7 +317,7 @@ listen {
277 # clients = per_socket_clients
280 @@ -541,8 +541,8 @@ security {
282 # allowed values: {no, yes}
284 -proxy_requests = yes
287 +#$INCLUDE proxy.conf
290 # CLIENTS CONFIGURATION
291 @@ -722,7 +722,7 @@ instantiate {
292 # The entire command line (and output) must fit into 253 bytes.
294 # e.g. Framed-Pool = `%{exec:/bin/echo foo}`
299 # The expression module doesn't do authorization,
300 @@ -735,15 +735,15 @@ instantiate {
301 # listed in any other section. See 'doc/rlm_expr' for
308 # We add the counter module here so that it registers
309 # the check-name attribute before any module which sets
317 # subsections here can be thought of as "virtual" modules.
319 @@ -767,7 +767,7 @@ instantiate {
322 ######################################################################
323 -$INCLUDE policy.conf
324 +#$INCLUDE policy.conf
326 ######################################################################
328 @@ -777,9 +777,9 @@ $INCLUDE policy.conf
329 # match the regular expression: /[a-zA-Z0-9_.]+/
331 # It allows you to define new virtual servers simply by placing
332 -# a file into the raddb/sites-enabled/ directory.
333 +# a file into the /etc/freeradius2/sites/ directory.
335 -$INCLUDE sites-enabled/
338 ######################################################################
340 @@ -787,7 +787,7 @@ $INCLUDE sites-enabled/
341 # "authenticate {}", "accounting {}", have been moved to the
344 -# raddb/sites-available/default
345 +# /etc/freeradius2/sites/default
347 # This is the "default" virtual server that has the same
348 # configuration as in version 1.0.x and 1.1.x. The default
349 --- a/raddb/sites-available/default
350 +++ b/raddb/sites-available/default
351 @@ -67,7 +67,7 @@ authorize {
353 # It takes care of processing the 'raddb/hints' and the
354 # 'raddb/huntgroups' files.
359 # If you want to have a log of authentication requests,
360 @@ -78,7 +78,7 @@ authorize {
362 # The chap module will set 'Auth-Type := CHAP' if we are
363 # handling a CHAP request and Auth-Type has not already been set
368 # If the users are logging in with an MS-CHAP-Challenge
369 @@ -86,13 +86,13 @@ authorize {
370 # the MS-CHAP-Challenge attribute, and add 'Auth-Type := MS-CHAP'
371 # to the request, which will cause the server to then use
372 # the mschap module for authentication.
377 # If you have a Cisco SIP server authenticating against
378 # FreeRADIUS, uncomment the following line, and the 'digest'
379 # line in the 'authenticate' section.
384 # The WiMAX specification says that the Calling-Station-Id
385 @@ -115,7 +115,7 @@ authorize {
386 # Otherwise, when the first style of realm doesn't match,
387 # the other styles won't be checked.
394 @@ -177,8 +177,8 @@ authorize {
395 # Use the checkval module
404 # If no other module has claimed responsibility for
405 @@ -259,7 +259,7 @@ authenticate {
406 # If you have a Cisco SIP server authenticating against
407 # FreeRADIUS, uncomment the following line, and the 'digest'
408 # line in the 'authorize' section.
413 # Pluggable Authentication Modules.
414 @@ -276,7 +276,7 @@ authenticate {
415 # be used for authentication ONLY for compatibility with legacy
416 # FreeRADIUS configurations.
421 # Uncomment it if you want to use ldap for authentication
423 @@ -312,8 +312,8 @@ authenticate {
425 # Pre-accounting. Decide which accounting type to use.
433 # Session start times are *implied* in RADIUS.
434 @@ -336,7 +336,7 @@ preacct {
436 # Ensure that we have a semi-unique identifier for every
437 # request, and many NAS boxes are broken.
442 # Look for IPASS-style 'realm/', and if not found, look for
443 @@ -346,13 +346,13 @@ preacct {
444 # Accounting requests are generally proxied to the same
445 # home server as authentication requests.
452 # Read the 'acct_users' file
459 # Accounting. Log the accounting data.
460 @@ -362,7 +362,7 @@ accounting {
461 # Create a 'detail'ed log of the packets.
462 # Note that accounting requests which are proxied
463 # are also logged in the detail file.
468 # Update the wtmp file
469 @@ -414,7 +414,7 @@ accounting {
472 # Filter attributes from the accounting response.
473 - attr_filter.accounting_response
474 + #attr_filter.accounting_response
477 # See "Autz-Type Status-Server" for how this works.
478 @@ -440,7 +440,7 @@ session {
479 # Post-Authentication
480 # Once we KNOW that the user has been authenticated, there are
481 # additional steps we can take.
484 # Get an address from the IP Pool.
487 @@ -470,7 +470,7 @@ post-auth {
490 # For Exec-Program and Exec-Program-Wait
495 # Calculate the various WiMAX keys. In order for this to work,
496 @@ -540,12 +540,12 @@ post-auth {
497 # Add the ldap module name (or instance) if you have set
498 # 'edir_account_policy_check = yes' in the ldap module configuration
500 - Post-Auth-Type REJECT {
501 - # log failed authentications in SQL, too.
502 +# Post-Auth-Type REJECT {
503 +# # log failed authentications in SQL, too.
505 - attr_filter.access_reject
508 +# attr_filter.access_reject
513 # When the server decides to proxy a request to a home server,
514 @@ -555,7 +555,7 @@ post-auth {
516 # Only a few modules currently have this method.
522 # Uncomment the following line if you want to change attributes
523 @@ -571,14 +571,14 @@ pre-proxy {
524 # server, un-comment the following line, and the
525 # 'detail pre_proxy_log' section, above.
531 # When the server receives a reply to a request it proxied
532 # to a home server, the request may be massaged here, in the
538 # If you want to have a log of replies from a home server,
539 # un-comment the following line, and the 'detail post_proxy_log'
540 @@ -602,7 +602,7 @@ post-proxy {
541 # hidden inside of the EAP packet, and the end server will
542 # reject the EAP request.
548 # If the server tries to proxy a request and fails, then the
549 @@ -624,5 +624,5 @@ post-proxy {
550 # Post-Proxy-Type Fail {
558 @@ -169,22 +169,22 @@
559 # by the terminal server in which case there may not be a "P" suffix.
560 # The terminal server sends "Framed-Protocol = PPP" for auto PPP.
562 -DEFAULT Framed-Protocol == PPP
563 - Framed-Protocol = PPP,
564 - Framed-Compression = Van-Jacobson-TCP-IP
565 +#DEFAULT Framed-Protocol == PPP
566 +# Framed-Protocol = PPP,
567 +# Framed-Compression = Van-Jacobson-TCP-IP
570 # Default for CSLIP: dynamic IP address, SLIP mode, VJ-compression.
572 -DEFAULT Hint == "CSLIP"
573 - Framed-Protocol = SLIP,
574 - Framed-Compression = Van-Jacobson-TCP-IP
575 +#DEFAULT Hint == "CSLIP"
576 +# Framed-Protocol = SLIP,
577 +# Framed-Compression = Van-Jacobson-TCP-IP
580 # Default for SLIP: dynamic IP address, SLIP mode.
582 -DEFAULT Hint == "SLIP"
583 - Framed-Protocol = SLIP
584 +#DEFAULT Hint == "SLIP"
585 +# Framed-Protocol = SLIP
588 # Last default: rlogin to our main server.