networking - RadWho not working -
radwho: error reading /var/log/freeradius/radutmp: no such file or directory should doing?
freeradius version 2.1.12, host x86_64-pc-linux-gnu, built on dec 16 2012 @ 13:28:43 copyright (c) 1999-2009 freeradius server project , contributors. there no warranty; not merchantability or fitness particular purpose. may redistribute copies of freeradius under terms of gnu general public license v2. starting - reading configuration files ... including configuration file /etc/freeradius/radiusd.conf including configuration file /etc/freeradius/proxy.conf including configuration file /etc/freeradius/clients.conf including files in directory /etc/freeradius/modules/ including configuration file /etc/freeradius/modules/sqlcounter_expire_on_login including configuration file /etc/freeradius/modules/attr_filter including configuration file /etc/freeradius/modules/soh including configuration file /etc/freeradius/modules/otp including configuration file /etc/freeradius/modules/dynamic_clients including configuration file /etc/freeradius/modules/perl including configuration file /etc/freeradius/modules/etc_group including configuration file /etc/freeradius/modules/ntlm_auth including configuration file /etc/freeradius/modules/preprocess including configuration file /etc/freeradius/modules/detail.example.com including configuration file /etc/freeradius/modules/detail.log including configuration file /etc/freeradius/modules/krb5 including configuration file /etc/freeradius/modules/ippool including configuration file /etc/freeradius/modules/opendirectory including configuration file /etc/freeradius/modules/redis including configuration file /etc/freeradius/modules/pap including configuration file /etc/freeradius/modules/detail including configuration file /etc/freeradius/modules/replicate including configuration file /etc/freeradius/modules/exec including configuration file /etc/freeradius/modules/linelog including configuration file /etc/freeradius/modules/logintime including configuration file /etc/freeradius/modules/unix including configuration file /etc/freeradius/modules/expiration including configuration file /etc/freeradius/modules/inner-eap including configuration file /etc/freeradius/modules/always including configuration file /etc/freeradius/modules/realm including configuration file /etc/freeradius/modules/radutmp including configuration file /etc/freeradius/modules/policy including configuration file /etc/freeradius/modules/digest including configuration file /etc/freeradius/modules/mac2vlan including configuration file /etc/freeradius/modules/mac2ip including configuration file /etc/freeradius/modules/smbpasswd including configuration file /etc/freeradius/modules/echo including configuration file /etc/freeradius/modules/pam including configuration file /etc/freeradius/modules/rediswho including configuration file /etc/freeradius/modules/files including configuration file /etc/freeradius/modules/ldap including configuration file /etc/freeradius/modules/chap including configuration file /etc/freeradius/modules/cui including configuration file /etc/freeradius/modules/checkval including configuration file /etc/freeradius/modules/counter including configuration file /etc/freeradius/modules/attr_rewrite including configuration file /etc/freeradius/modules/wimax including configuration file /etc/freeradius/modules/mschap including configuration file /etc/freeradius/modules/acct_unique including configuration file /etc/freeradius/modules/sql_log including configuration file /etc/freeradius/modules/sradutmp including configuration file /etc/freeradius/modules/expr including configuration file /etc/freeradius/modules/passwd including configuration file /etc/freeradius/modules/smsotp including configuration file /etc/freeradius/eap.conf including configuration file /etc/freeradius/sql.conf including configuration file /etc/freeradius/sql/mysql/dialup.conf including configuration file /etc/freeradius/policy.conf including files in directory /etc/freeradius/sites-enabled/ including configuration file /etc/freeradius/sites-enabled/default including configuration file /etc/freeradius/sites-enabled/inner-tunnel main { user = "freerad" group = "freerad" allow_core_dumps = no } including dictionary file /etc/freeradius/dictionary main { name = "freeradius" prefix = "/usr" localstatedir = "/var" sbindir = "/usr/sbin" logdir = "/var/log/freeradius" run_dir = "/var/run/freeradius" libdir = "/usr/lib/freeradius" radacctdir = "/var/log/freeradius/radacct" hostname_lookups = no max_request_time = 30 cleanup_delay = 5 max_requests = 1024 pidfile = "/var/run/freeradius/freeradius.pid" checkrad = "/usr/sbin/checkrad" debug_level = 0 proxy_requests = yes log { stripped_names = no auth = no auth_badpass = no auth_goodpass = no } security { max_attributes = 200 reject_delay = 1 status_server = yes } } radiusd: #### loading realms , home servers #### proxy server { retry_delay = 5 retry_count = 3 default_fallback = no dead_time = 120 wake_all_if_all_dead = no } home_server localhost { ipaddr = 127.0.0.1 port = 1812 type = "auth" secret = "testing123" src_ipaddr = "127.0.0.1" response_window = 20 max_outstanding = 65536 require_message_authenticator = yes zombie_period = 40 status_check = "status-server" ping_interval = 30 check_interval = 30 num_answers_to_alive = 3 num_pings_to_alive = 3 revive_interval = 120 status_check_timeout = 4 coa { irt = 2 mrt = 16 mrc = 5 mrd = 30 } } home_server_pool my_auth_failover { type = fail-over home_server = localhost } realm example.com { auth_pool = my_auth_failover } realm local { } radiusd: #### loading clients #### client localhost { ipaddr = 127.0.0.1 require_message_authenticator = no secret = "testing123" nastype = "other" } radiusd: #### instantiating modules #### instantiate { module: linked module rlm_exec module: instantiating module "exec" file /etc/freeradius/modules/exec exec { wait = no input_pairs = "request" shell_escape = yes } module: linked module rlm_expr module: instantiating module "expr" file /etc/freeradius/modules/expr module: linked module rlm_expiration module: instantiating module "expiration" file /etc/freeradius/modules/expiration expiration { reply-message = "password has expired " } module: linked module rlm_logintime module: instantiating module "logintime" file /etc/freeradius/modules/logintime logintime { reply-message = "you calling outside allowed timespan " minimum-timeout = 60 } } radiusd: #### loading virtual servers #### server { # file /etc/freeradius/radiusd.conf modules { module: creating auth-type = digest module: creating post-auth-type = reject module: checking authenticate {...} more modules load module: linked module rlm_pap module: instantiating module "pap" file /etc/freeradius/modules/pap pap { encryption_scheme = "auto" auto_header = no } module: linked module rlm_chap module: instantiating module "chap" file /etc/freeradius/modules/chap module: linked module rlm_mschap module: instantiating module "mschap" file /etc/freeradius/modules/mschap mschap { use_mppe = yes require_encryption = no require_strong = no with_ntdomain_hack = no allow_retry = yes } module: linked module rlm_digest module: instantiating module "digest" file /etc/freeradius/modules/digest module: linked module rlm_unix module: instantiating module "unix" file /etc/freeradius/modules/unix unix { radwtmp = "/var/log/freeradius/radwtmp" } module: linked module rlm_eap module: instantiating module "eap" file /etc/freeradius/eap.conf eap { default_eap_type = "md5" timer_expire = 60 ignore_unknown_eap_types = no cisco_accounting_username_bug = no max_sessions = 4096 } module: linked sub-module rlm_eap_md5 module: instantiating eap-md5 module: linked sub-module rlm_eap_leap module: instantiating eap-leap module: linked sub-module rlm_eap_gtc module: instantiating eap-gtc gtc { challenge = "password: " auth_type = "pap" } module: linked sub-module rlm_eap_tls module: instantiating eap-tls tls { rsa_key_exchange = no dh_key_exchange = yes rsa_key_length = 512 dh_key_length = 512 verify_depth = 0 ca_path = "/etc/freeradius/certs" pem_file_type = yes private_key_file = "/etc/freeradius/certs/server.key" certificate_file = "/etc/freeradius/certs/server.pem" ca_file = "/etc/freeradius/certs/ca.pem" private_key_password = "whatever" dh_file = "/etc/freeradius/certs/dh" random_file = "/dev/urandom" fragment_size = 1024 include_length = yes check_crl = no cipher_list = "default" make_cert_command = "/etc/freeradius/certs/bootstrap" ecdh_curve = "prime256v1" cache { enable = no lifetime = 24 max_entries = 255 } verify { } ocsp { enable = no override_cert_url = yes url = "http://127.0.0.1/ocsp/" } } module: linked sub-module rlm_eap_ttls module: instantiating eap-ttls ttls { default_eap_type = "md5" copy_request_to_tunnel = no use_tunneled_reply = no virtual_server = "inner-tunnel" include_length = yes } module: linked sub-module rlm_eap_peap module: instantiating eap-peap peap { default_eap_type = "mschapv2" copy_request_to_tunnel = no use_tunneled_reply = no proxy_tunneled_request_as_eap = yes virtual_server = "inner-tunnel" soh = no } module: linked sub-module rlm_eap_mschapv2 module: instantiating eap-mschapv2 mschapv2 { with_ntdomain_hack = no send_error = no } module: checking authorize {...} more modules load module: linked module rlm_preprocess module: instantiating module "preprocess" file /etc/freeradius/modules/preprocess preprocess { huntgroups = "/etc/freeradius/huntgroups" hints = "/etc/freeradius/hints" with_ascend_hack = no ascend_channels_per_line = 23 with_ntdomain_hack = no with_specialix_jetstream_hack = no with_cisco_vsa_hack = no with_alvarion_vsa_hack = no } module: linked module rlm_realm module: instantiating module "suffix" file /etc/freeradius/modules/realm realm suffix { format = "suffix" delimiter = "@" ignore_default = no ignore_null = no } module: linked module rlm_files module: instantiating module "files" file /etc/freeradius/modules/files files { usersfile = "/etc/freeradius/users" acctusersfile = "/etc/freeradius/acct_users" preproxy_usersfile = "/etc/freeradius/preproxy_users" compat = "no" } module: linked module rlm_sql module: instantiating module "sql" file /etc/freeradius/sql.conf sql { driver = "rlm_sql_mysql" server = "localhost" port = "" login = "radius" password = "radpass" radius_db = "radius" read_groups = yes sqltrace = no sqltracefile = "/var/log/freeradius/sqltrace.sql" readclients = no deletestalesessions = yes num_sql_socks = 5 lifetime = 0 max_queries = 0 sql_user_name = "%{user-name}" default_user_profile = "" nas_query = "select id, nasname, shortname, type, secret, server nas" authorize_check_query = "select id, username, attribute, value, op radcheck username = '%{sql-user-name}' order id" authorize_reply_query = "select id, username, attribute, value, op radreply username = '%{sql-user-name}' order id" authorize_group_check_query = "select id, groupname, attribute, value, op radgroupcheck groupname = '%{sql-group}' order id" authorize_group_reply_query = "select id, groupname, attribute, value, op radgroupreply groupname = '%{sql-group}' order id" accounting_onoff_query = " update radacct set acctstoptime = '%s', acctsessiontime = unix_timestamp('%s') - unix_timestamp(acctstarttime), acctterminatecause = '%{acct-terminate-cause}', acctstopdelay = %{%{acct-delay-time}:-0} acctstoptime null , nasipaddress = '%{nas-ip-address}' , acctstarttime <= '%s'" accounting_update_query = " update radacct set framedipaddress = '%{framed-ip-address}', acctsessiontime = '%{acct-session-time}', acctinputoctets = '%{%{acct-input-gigawords}:-0}' << 32 | '%{%{acct-input-octets}:-0}', acctoutputoctets = '%{%{acct-output-gigawords}:-0}' << 32 | '%{%{acct-output-octets}:-0}' acctsessionid = '%{acct-session-id}' , username = '%{sql-user-name}' , nasipaddress = '%{nas-ip-address}'" accounting_update_query_alt = " insert radacct (acctsessionid, acctuniqueid, username, realm, nasipaddress, nasportid, nasporttype, acctstarttime, acctsessiontime, acctauthentic, connectinfo_start, acctinputoctets, acctoutputoctets, calledstationid, callingstationid, servicetype, framedprotocol, framedipaddress, acctstartdelay, xascendsessionsvrkey) values ('%{acct-session-id}', '%{acct-unique-session-id}', '%{sql-user-name}', '%{realm}', '%{nas-ip-address}', '%{nas-port}', '%{nas-port-type}', date_sub('%s', interval (%{%{acct-session-time}:-0} + %{%{acct-delay-time}:-0}) second), '%{acct-session-time}', '%{acct-authentic}', '', '%{%{acct-input-gigawords}:-0}' << 32 | '%{%{acct-input-octets}:-0}', '%{%{acct-output-gigawords}:-0}' << 32 | '%{%{acct-output-octets}:-0}', '%{called-station-id}', '%{calling-station-id}', '%{service-type}', '%{framed-protocol}', '%{framed-ip-address}', '0', '%{x-ascend-session-svr-key}')" accounting_start_query = " insert radacct (acctsessionid, acctuniqueid, username, realm, nasipaddress, nasportid, nasporttype, acctstarttime, acctstoptime, acctsessiontime, acctauthentic, connectinfo_start, connectinfo_stop, acctinputoctets, acctoutputoctets, calledstationid, callingstationid, acctterminatecause, servicetype, framedprotocol, framedipaddress, acctstartdelay, acctstopdelay, xascendsessionsvrkey) values ('%{acct-session-id}', '%{acct-unique-session-id}', '%{sql-user-name}', '%{realm}', '%{nas-ip-address}', '%{nas-port}', '%{nas-port-type}', '%s', null, '0', '%{acct-authentic}', '%{connect-info}', '', '0', '0', '%{called-station-id}', '%{calling-station-id}', '', '%{service-type}', '%{framed-protocol}', '%{framed-ip-address}', '%{%{acct-delay-time}:-0}', '0', '%{x-ascend-session-svr-key}')" accounting_start_query_alt = " update radacct set acctstarttime = '%s', acctstartdelay = '%{%{acct-delay-time}:-0}', connectinfo_start = '%{connect-info}' acctsessionid = '%{acct-session-id}' , username = '%{sql-user-name}' , nasipaddress = '%{nas-ip-address}'" accounting_stop_query = " update radacct set acctstoptime = '%s', acctsessiontime = '%{acct-session-time}', acctinputoctets = '%{%{acct-input-gigawords}:-0}' << 32 | '%{%{acct-input-octets}:-0}', acctoutputoctets = '%{%{acct-output-gigawords}:-0}' << 32 | '%{%{acct-output-octets}:-0}', acctterminatecause = '%{acct-terminate-cause}', acctstopdelay = '%{%{acct-delay-time}:-0}', connectinfo_stop = '%{connect-info}' acctsessionid = '%{acct-session-id}' , username = '%{sql-user-name}' , nasipaddress = '%{nas-ip-address}'" accounting_stop_query_alt = " insert radacct (acctsessionid, acctuniqueid, username, realm, nasipaddress, nasportid, nasporttype, acctstarttime, acctstoptime, acctsessiontime, acctauthentic, connectinfo_start, connectinfo_stop, acctinputoctets, acctoutputoctets, calledstationid, callingstationid, acctterminatecause, servicetype, framedprotocol, framedipaddress, acctstartdelay, acctstopdelay) values ('%{acct-session-id}', '%{acct-unique-session-id}', '%{sql-user-name}', '%{realm}', '%{nas-ip-address}', '%{nas-port}', '%{nas-port-type}', date_sub('%s', interval (%{%{acct-session-time}:-0} + %{%{acct-delay-time}:-0}) second), '%s', '%{acct-session-time}', '%{acct-authentic}', '', '%{connect-info}', '%{%{acct-input-gigawords}:-0}' << 32 | '%{%{acct-input-octets}:-0}', '%{%{acct-output-gigawords}:-0}' << 32 | '%{%{acct-output-octets}:-0}', '%{called-station-id}', '%{calling-station-id}', '%{acct-terminate-cause}', '%{service-type}', '%{framed-protocol}', '%{framed-ip-address}', '0', '%{%{acct-delay-time}:-0}')" group_membership_query = "select groupname radusergroup username = '%{sql-user-name}' order priority" connect_failure_retry_delay = 60 simul_count_query = "" simul_verify_query = "select radacctid, acctsessionid, username, nasipaddress, nasportid, framedipaddress, callingstationid, framedprotocol radacct username = '%{sql-user-name}' , acctstoptime null" postauth_query = "insert radpostauth (username, pass, reply, authdate) values ( '%{user-name}', '%{%{user-password}:-%{chap-password}}', '%{reply:packet-type}', '%s')" safe-characters = "@abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz0123456789.-_: /" } rlm_sql (sql): driver rlm_sql_mysql (module rlm_sql_mysql) loaded , linked rlm_sql (sql): attempting connect radius@localhost:/radius rlm_sql (sql): starting 0 rlm_sql (sql): attempting connect rlm_sql_mysql #0 rlm_sql_mysql: starting connect mysql server #0 rlm_sql (sql): connected new db handle, #0 rlm_sql (sql): starting 1 rlm_sql (sql): attempting connect rlm_sql_mysql #1 rlm_sql_mysql: starting connect mysql server #1 rlm_sql (sql): connected new db handle, #1 rlm_sql (sql): starting 2 rlm_sql (sql): attempting connect rlm_sql_mysql #2 rlm_sql_mysql: starting connect mysql server #2 rlm_sql (sql): connected new db handle, #2 rlm_sql (sql): starting 3 rlm_sql (sql): attempting connect rlm_sql_mysql #3 rlm_sql_mysql: starting connect mysql server #3 rlm_sql (sql): connected new db handle, #3 rlm_sql (sql): starting 4 rlm_sql (sql): attempting connect rlm_sql_mysql #4 rlm_sql_mysql: starting connect mysql server #4 rlm_sql (sql): connected new db handle, #4 module: checking preacct {...} more modules load module: linked module rlm_acct_unique module: instantiating module "acct_unique" file /etc/freeradius/modules/acct_unique acct_unique { key = "user-name, acct-session-id, nas-ip-address, client-ip-address, nas-port" } module: checking accounting {...} more modules load module: linked module rlm_detail module: instantiating module "detail" file /etc/freeradius/modules/detail detail { detailfile = "/var/log/freeradius/radacct/%{%{packet-src-ip-address}:-%{packet-src-ipv6-address}}/detail-%y%m%d" header = "%t" detailperm = 384 dirperm = 493 locking = no log_packet_header = no } module: linked module rlm_radutmp module: instantiating module "radutmp" file /etc/freeradius/modules/radutmp radutmp { filename = "/var/log/freeradius/radutmp" username = "%{user-name}" case_sensitive = yes check_with_nas = yes perm = 384 callerid = yes } module: linked module rlm_attr_filter module: instantiating module "attr_filter.accounting_response" file /etc/freeradius/modules/attr_filter attr_filter attr_filter.accounting_response { attrsfile = "/etc/freeradius/attrs.accounting_response" key = "%{user-name}" relaxed = no } module: checking session {...} more modules load module: checking post-proxy {...} more modules load module: checking post-auth {...} more modules load module: instantiating module "attr_filter.access_reject" file /etc/freeradius/modules/attr_filter attr_filter attr_filter.access_reject { attrsfile = "/etc/freeradius/attrs.access_reject" key = "%{user-name}" relaxed = no } } # modules } # server server inner-tunnel { # file /etc/freeradius/sites-enabled/inner-tunnel modules { module: checking authenticate {...} more modules load module: checking authorize {...} more modules load module: checking session {...} more modules load module: checking post-proxy {...} more modules load module: checking post-auth {...} more modules load } # modules } # server radiusd: #### opening ip addresses , ports #### listen { type = "auth" ipaddr = * port = 0 } listen { type = "acct" ipaddr = * port = 0 } listen { type = "auth" ipaddr = 127.0.0.1 port = 18120 } ... adding new socket proxy address 127.0.0.1 port 39513 listening on authentication address * port 1812 listening on accounting address * port 1813 listening on authentication address 127.0.0.1 port 18120 server inner-tunnel listening on proxy address * port 1814 ready process requests.
that suggests either radutmp module isn't listen in session section of configuration, or haven't received accounting packets.
run server in debug mode -x
, verify you're receiving accounting packets nas, , you've listed radutmp module in session section.
Comments
Post a Comment