Hello there, I performed a dist-upgrade on a Debian 9 running freeradius-3.0.12, thus going to Debian 10 and freeradius-3.0.17. I haven't touched the config, nor did I allow the dist-upgrade to do any changes. After the upgrade freeradius starts, but doesn't reply on the network. I have tested with radtest, and it always just prints three tries and ends with "(0) No reply from server for ID 120 socket 3". I have done the tests with both -4 and -6. I am grateful for any pointers on how to solve this problem, or at least where to look at for further researching it. Dual stack IPv4/IPv6. Confirmed working in the previous installation. Thanks Output of freeradius -X with it just sitting there and not doing anything; FreeRADIUS Version 3.0.17 Copyright (C) 1999-2017 The FreeRADIUS server project and contributors There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE You may redistribute copies of FreeRADIUS under the terms of the GNU General Public License For more information about these matters, see the file named COPYRIGHT Starting - reading configuration files ... including dictionary file /usr/share/freeradius/dictionary including dictionary file /usr/share/freeradius/dictionary.dhcp including dictionary file /usr/share/freeradius/dictionary.vqp including dictionary file /etc/freeradius/3.0/dictionary including configuration file /etc/freeradius/3.0/radiusd.conf including configuration file /etc/freeradius/3.0/proxy.conf including configuration file /etc/freeradius/3.0/clients.conf including files in directory /etc/freeradius/3.0/mods-enabled/ including configuration file /etc/freeradius/3.0/mods-enabled/ldap including configuration file /etc/freeradius/3.0/mods-enabled/ntlm_auth including configuration file /etc/freeradius/3.0/mods-enabled/digest including configuration file /etc/freeradius/3.0/mods-enabled/detail including configuration file /etc/freeradius/3.0/mods-enabled/exec including configuration file /etc/freeradius/3.0/mods-enabled/sradutmp including configuration file /etc/freeradius/3.0/mods-enabled/attr_filter including configuration file /etc/freeradius/3.0/mods-enabled/soh including configuration file /etc/freeradius/3.0/mods-enabled/unpack including configuration file /etc/freeradius/3.0/mods-enabled/files including configuration file /etc/freeradius/3.0/mods-enabled/replicate including configuration file /etc/freeradius/3.0/mods-enabled/eap including configuration file /etc/freeradius/3.0/mods-enabled/pap including configuration file /etc/freeradius/3.0/mods-enabled/always including configuration file /etc/freeradius/3.0/mods-enabled/chap including configuration file /etc/freeradius/3.0/mods-enabled/unix including configuration file /etc/freeradius/3.0/mods-enabled/expr including configuration file /etc/freeradius/3.0/mods-enabled/dynamic_clients including configuration file /etc/freeradius/3.0/mods-enabled/logintime including configuration file /etc/freeradius/3.0/mods-enabled/detail.log including configuration file /etc/freeradius/3.0/mods-enabled/utf8 including configuration file /etc/freeradius/3.0/mods-enabled/passwd including configuration file /etc/freeradius/3.0/mods-enabled/mschap including configuration file /etc/freeradius/3.0/mods-enabled/expiration including configuration file /etc/freeradius/3.0/mods-enabled/realm including configuration file /etc/freeradius/3.0/mods-enabled/inner-eap including configuration file /etc/freeradius/3.0/mods-enabled/radutmp including configuration file /etc/freeradius/3.0/mods-enabled/preprocess including configuration file /etc/freeradius/3.0/mods-enabled/linelog including configuration file /etc/freeradius/3.0/mods-enabled/cache_eap including configuration file /etc/freeradius/3.0/mods-enabled/echo including files in directory /etc/freeradius/3.0/policy.d/ including configuration file /etc/freeradius/3.0/policy.d/abfab-tr including configuration file /etc/freeradius/3.0/policy.d/dhcp including configuration file /etc/freeradius/3.0/policy.d/cui including configuration file /etc/freeradius/3.0/policy.d/eap including configuration file /etc/freeradius/3.0/policy.d/control including configuration file /etc/freeradius/3.0/policy.d/canonicalization including configuration file /etc/freeradius/3.0/policy.d/accounting including configuration file /etc/freeradius/3.0/policy.d/filter including configuration file /etc/freeradius/3.0/policy.d/moonshot-targeted-ids including configuration file /etc/freeradius/3.0/policy.d/operator-name including configuration file /etc/freeradius/3.0/policy.d/debug including files in directory /etc/freeradius/3.0/sites-enabled/ including configuration file /etc/freeradius/3.0/sites-enabled/control-socket including configuration file /etc/freeradius/3.0/sites-enabled/eduroam including configuration file /etc/freeradius/3.0/sites-enabled/eduroam-inner-tunnel main { security { user = "freerad" group = "freerad" allow_core_dumps = no } name = "freeradius" prefix = "/usr" localstatedir = "/var" logdir = "/var/log/freeradius" run_dir = "/var/run/freeradius" } main { name = "freeradius" prefix = "/usr" localstatedir = "/var" sbindir = "/usr/sbin" logdir = "/var/log/freeradius" run_dir = "/var/run/freeradius" libdir = "/usr/lib/freeradius" radacctdir = "/var/log/freeradius/radacct" hostname_lookups = no max_request_time = 30 cleanup_delay = 5 max_requests = 16384 pidfile = "/var/run/freeradius/freeradius.pid" checkrad = "/usr/sbin/checkrad" debug_level = 0 proxy_requests = yes log { stripped_names = no auth = yes auth_badpass = no auth_goodpass = no colourise = yes msg_denied = "You are already logged in - access denied" } resources { } security { max_attributes = 200 reject_delay = 1.000000 status_server = yes } } radiusd: #### Loading Realms and Home Servers #### proxy server { retry_delay = 5 retry_count = 3 default_fallback = no dead_time = 120 wake_all_if_all_dead = no } home_server ftlr_funet_fi { ipaddr = 193.166.5.150 port = 1812 type = "auth+acct" secret = <<< secret >>> response_window = 20.000000 response_timeouts = 1 max_outstanding = 65536 zombie_period = 40 status_check = "none" ping_interval = 30 check_interval = 30 check_timeout = 4 num_answers_to_alive = 3 revive_interval = 60 limit { max_connections = 16 max_requests = 0 lifetime = 0 idle_timeout = 0 } coa { irt = 2 mrt = 16 mrc = 5 mrd = 30 } } home_server ftlr2_funet_fi { ipaddr = 193.166.4.105 port = 1812 type = "auth+acct" secret = <<< secret >>> response_window = 20.000000 response_timeouts = 1 max_outstanding = 65536 zombie_period = 40 status_check = "none" ping_interval = 30 check_interval = 30 check_timeout = 4 num_answers_to_alive = 3 revive_interval = 60 limit { max_connections = 16 max_requests = 0 lifetime = 0 idle_timeout = 0 } coa { irt = 2 mrt = 16 mrc = 5 mrd = 30 } } home_server 6ftlr_funet_fi { ipv6addr = 2001:708:10:a1::2 port = 1812 type = "auth+acct" secret = <<< secret >>> response_window = 20.000000 response_timeouts = 1 max_outstanding = 65536 zombie_period = 40 status_check = "none" ping_interval = 30 check_interval = 30 check_timeout = 4 num_answers_to_alive = 3 revive_interval = 60 limit { max_connections = 16 max_requests = 0 lifetime = 0 idle_timeout = 0 } coa { irt = 2 mrt = 16 mrc = 5 mrd = 30 } } home_server 6ftlr2_funet_fi { ipv6addr = 2001:708:10:a3::f2 port = 1812 type = "auth+acct" secret = <<< secret >>> response_window = 20.000000 response_timeouts = 1 max_outstanding = 65536 zombie_period = 40 status_check = "none" ping_interval = 30 check_interval = 30 check_timeout = 4 num_answers_to_alive = 3 revive_interval = 60 limit { max_connections = 16 max_requests = 0 lifetime = 0 idle_timeout = 0 } coa { irt = 2 mrt = 16 mrc = 5 mrd = 30 } } home_server localhost { ipaddr = 127.0.0.1 port = 1812 type = "auth" secret = <<< secret >>> response_window = 20.000000 response_timeouts = 1 max_outstanding = 65536 zombie_period = 40 status_check = "status-server" ping_interval = 30 check_interval = 30 check_timeout = 4 num_answers_to_alive = 3 revive_interval = 120 limit { max_connections = 16 max_requests = 0 lifetime = 0 idle_timeout = 0 } coa { irt = 2 mrt = 16 mrc = 5 mrd = 30 } } home_server_pool my_auth_failover { type = fail-over home_server = localhost } realm example.com { auth_pool = my_auth_failover } realm LOCAL { } realm ~arcada\\.fi$ { authhost = LOCAL accthost = LOCAL } realm arcada.fi { authhost = LOCAL accthost = LOCAL } home_server_pool EDUROAM-FTLR { type = fail-over home_server = ftlr_funet_fi home_server = ftlr2_funet_fi home_server = 6ftlr_funet_fi home_server = 6ftlr2_funet_fi } realm DEFAULT { pool = EDUROAM-FTLR nostrip } radiusd: #### Loading Clients #### client localhost { ipaddr = 127.0.0.1 require_message_authenticator = no secret = <<< secret >>> limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client 193.167.36.0/25 { require_message_authenticator = no secret = <<< secret >>> shortname = "arcada-aps" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or 'ipv6addr' field found in client 193.167.36.0/25. Please fix your configuration Support for old-style clients will be removed in a future release client 10.0.36.0/24 { require_message_authenticator = no secret = <<< secret >>> shortname = "arcada-aps" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or 'ipv6addr' field found in client 10.0.36.0/24. Please fix your configuration Support for old-style clients will be removed in a future release client 10.0.36.253/32 { require_message_authenticator = no secret = <<< secret >>> shortname = "clustrum" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } No 'ipaddr' or 'ipv4addr' or 'ipv6addr' field found in client 10.0.36.253/32. Please fix your configuration Support for old-style clients will be removed in a future release client ftlr_funet.fi { ipaddr = 193.166.5.150 netmask = 32 require_message_authenticator = no secret = <<< secret >>> shortname = "ftlr_funet_fi" virtual_server = "eduroam" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } client ftlr2_funet.fi { ipaddr = 193.166.4.105 netmask = 32 require_message_authenticator = no secret = <<< secret >>> shortname = "ftlr2_funet_fi" virtual_server = "eduroam" limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } Debugger not attached # Creating Auth-Type = eap # Creating Auth-Type = LDAP # Creating Auth-Type = PAP # Creating Auth-Type = MS-CHAP # Creating Auth-Type = inner-eap radiusd: #### Instantiating modules #### modules { # Loaded module rlm_ldap # Loading module "ldap" from file /etc/freeradius/3.0/mods-enabled/ldap ldap { server = "blucher.arcada.fi" port = 636 identity = "cn=sambaadmin,dc=arcada,dc=fi" password = <<< secret >>> sasl { } user { scope = "sub" access_positive = yes sasl { } } group { filter = "(objectClass=posixGroup)" scope = "sub" name_attribute = "cn" membership_attribute = "memberOf" cacheable_name = no cacheable_dn = no } client { filter = "(objectClass=radiusClient)" scope = "sub" base_dn = "dc=arcada,dc=fi" } profile { } options { ldap_debug = 40 chase_referrals = yes rebind = yes net_timeout = 1 res_timeout = 10 srv_timelimit = 3 idle = 60 probes = 3 interval = 3 } tls { ca_path = "/etc/ssl/certs" start_tls = no require_cert = "allow" } } Creating attribute LDAP-Group # Loaded module rlm_exec # Loading module "ntlm_auth" from file /etc/freeradius/3.0/mods-enabled/ntlm_auth exec ntlm_auth { wait = yes program = "/path/to/ntlm_auth --request-nt-key --domain=MYDOMAIN --username=%{mschap:User-Name} --password=%{User-Password}" shell_escape = yes } # Loaded module rlm_digest # Loading module "digest" from file /etc/freeradius/3.0/mods-enabled/digest # Loaded module rlm_detail # Loading module "detail" from file /etc/freeradius/3.0/mods-enabled/detail detail { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loading module "exec" from file /etc/freeradius/3.0/mods-enabled/exec exec { wait = no input_pairs = "request" shell_escape = yes timeout = 10 } # Loaded module rlm_radutmp # Loading module "sradutmp" from file /etc/freeradius/3.0/mods-enabled/sradutmp radutmp sradutmp { filename = "/var/log/freeradius/sradutmp" username = "%{User-Name}" case_sensitive = yes check_with_nas = yes permissions = 420 caller_id = no } # Loaded module rlm_attr_filter # Loading module "attr_filter.post-proxy" from file /etc/freeradius/3.0/mods-enabled/attr_filter attr_filter attr_filter.post-proxy { filename = "/etc/freeradius/3.0/mods-config/attr_filter/post-proxy" key = "%{Realm}" relaxed = no } # Loading module "attr_filter.pre-proxy" from file /etc/freeradius/3.0/mods-enabled/attr_filter attr_filter attr_filter.pre-proxy { filename = "/etc/freeradius/3.0/mods-config/attr_filter/pre-proxy" key = "%{Realm}" relaxed = no } # Loading module "attr_filter.access_reject" from file /etc/freeradius/3.0/mods-enabled/attr_filter attr_filter attr_filter.access_reject { filename = "/etc/freeradius/3.0/mods-config/attr_filter/access_reject" key = "%{User-Name}" relaxed = no } # Loading module "attr_filter.access_challenge" from file /etc/freeradius/3.0/mods-enabled/attr_filter attr_filter attr_filter.access_challenge { filename = "/etc/freeradius/3.0/mods-config/attr_filter/access_challenge" key = "%{User-Name}" relaxed = no } # Loading module "attr_filter.accounting_response" from file /etc/freeradius/3.0/mods-enabled/attr_filter attr_filter attr_filter.accounting_response { filename = "/etc/freeradius/3.0/mods-config/attr_filter/accounting_response" key = "%{User-Name}" relaxed = no } # Loaded module rlm_soh # Loading module "soh" from file /etc/freeradius/3.0/mods-enabled/soh soh { dhcp = yes } # Loaded module rlm_unpack # Loading module "unpack" from file /etc/freeradius/3.0/mods-enabled/unpack # Loaded module rlm_files # Loading module "files" from file /etc/freeradius/3.0/mods-enabled/files files { filename = "/etc/freeradius/3.0/mods-config/files/authorize" acctusersfile = "/etc/freeradius/3.0/mods-config/files/accounting" preproxy_usersfile = "/etc/freeradius/3.0/mods-config/files/pre-proxy" } # Loaded module rlm_replicate # Loading module "replicate" from file /etc/freeradius/3.0/mods-enabled/replicate # Loaded module rlm_eap # Loading module "eap" from file /etc/freeradius/3.0/mods-enabled/eap eap { default_eap_type = "md5" timer_expire = 60 ignore_unknown_eap_types = no cisco_accounting_username_bug = no max_sessions = 2048 } # Loaded module rlm_pap # Loading module "pap" from file /etc/freeradius/3.0/mods-enabled/pap pap { normalise = yes } # Loaded module rlm_always # Loading module "reject" from file /etc/freeradius/3.0/mods-enabled/always always reject { rcode = "reject" simulcount = 0 mpp = no } # Loading module "fail" from file /etc/freeradius/3.0/mods-enabled/always always fail { rcode = "fail" simulcount = 0 mpp = no } # Loading module "ok" from file /etc/freeradius/3.0/mods-enabled/always always ok { rcode = "ok" simulcount = 0 mpp = no } # Loading module "handled" from file /etc/freeradius/3.0/mods-enabled/always always handled { rcode = "handled" simulcount = 0 mpp = no } # Loading module "invalid" from file /etc/freeradius/3.0/mods-enabled/always always invalid { rcode = "invalid" simulcount = 0 mpp = no } # Loading module "userlock" from file /etc/freeradius/3.0/mods-enabled/always always userlock { rcode = "userlock" simulcount = 0 mpp = no } # Loading module "notfound" from file /etc/freeradius/3.0/mods-enabled/always always notfound { rcode = "notfound" simulcount = 0 mpp = no } # Loading module "noop" from file /etc/freeradius/3.0/mods-enabled/always always noop { rcode = "noop" simulcount = 0 mpp = no } # Loading module "updated" from file /etc/freeradius/3.0/mods-enabled/always always updated { rcode = "updated" simulcount = 0 mpp = no } # Loaded module rlm_chap # Loading module "chap" from file /etc/freeradius/3.0/mods-enabled/chap # Loaded module rlm_unix # Loading module "unix" from file /etc/freeradius/3.0/mods-enabled/unix unix { radwtmp = "/var/log/freeradius/radwtmp" } Creating attribute Unix-Group # Loaded module rlm_expr # Loading module "expr" from file /etc/freeradius/3.0/mods-enabled/expr expr { safe_characters = "@abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789.-_: /äéöüàâæçèéêëîïôœùûüaÿÄÉÖÜßÀÂÆÇÈÉÊËÎÏÔŒÙÛÜŸ" } # Loaded module rlm_dynamic_clients # Loading module "dynamic_clients" from file /etc/freeradius/3.0/mods-enabled/dynamic_clients # Loaded module rlm_logintime # Loading module "logintime" from file /etc/freeradius/3.0/mods-enabled/logintime logintime { minimum_timeout = 60 } # Loading module "auth_log" from file /etc/freeradius/3.0/mods-enabled/detail.log detail auth_log { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/auth-detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loading module "reply_log" from file /etc/freeradius/3.0/mods-enabled/detail.log detail reply_log { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/reply-detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loading module "pre_proxy_log" from file /etc/freeradius/3.0/mods-enabled/detail.log detail pre_proxy_log { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/pre-proxy-detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loading module "post_proxy_log" from file /etc/freeradius/3.0/mods-enabled/detail.log detail post_proxy_log { filename = "/var/log/freeradius/radacct/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/post-proxy-detail-%Y%m%d" header = "%t" permissions = 384 locking = no escape_filenames = no log_packet_header = no } # Loaded module rlm_utf8 # Loading module "utf8" from file /etc/freeradius/3.0/mods-enabled/utf8 # Loaded module rlm_passwd # Loading module "etc_passwd" from file /etc/freeradius/3.0/mods-enabled/passwd passwd etc_passwd { filename = "/etc/passwd" format = "*User-Name:Crypt-Password:" delimiter = ":" ignore_nislike = no ignore_empty = yes allow_multiple_keys = no hash_size = 100 } # Loaded module rlm_mschap # Loading module "mschap" from file /etc/freeradius/3.0/mods-enabled/mschap mschap { use_mppe = yes require_encryption = yes require_strong = yes with_ntdomain_hack = yes passchange { } allow_retry = yes winbind_retry_with_normalised_username = no } # Loaded module rlm_expiration # Loading module "expiration" from file /etc/freeradius/3.0/mods-enabled/expiration # Loaded module rlm_realm # Loading module "IPASS" from file /etc/freeradius/3.0/mods-enabled/realm realm IPASS { format = "prefix" delimiter = "/" ignore_default = no ignore_null = no } # Loading module "suffix" from file /etc/freeradius/3.0/mods-enabled/realm realm suffix { format = "suffix" delimiter = "@" ignore_default = no ignore_null = no } # Loading module "realmpercent" from file /etc/freeradius/3.0/mods-enabled/realm realm realmpercent { format = "suffix" delimiter = "%" ignore_default = no ignore_null = no } # Loading module "ntdomain" from file /etc/freeradius/3.0/mods-enabled/realm realm ntdomain { format = "prefix" delimiter = "\\" ignore_default = no ignore_null = no } # Loading module "inner-eap" from file /etc/freeradius/3.0/mods-enabled/inner-eap eap inner-eap { default_eap_type = "mschapv2" timer_expire = 60 ignore_unknown_eap_types = no cisco_accounting_username_bug = no max_sessions = 2048 } # Loading module "radutmp" from file /etc/freeradius/3.0/mods-enabled/radutmp radutmp { filename = "/var/log/freeradius/radutmp" username = "%{User-Name}" case_sensitive = yes check_with_nas = yes permissions = 384 caller_id = yes } # Loaded module rlm_preprocess # Loading module "preprocess" from file /etc/freeradius/3.0/mods-enabled/preprocess preprocess { huntgroups = "/etc/freeradius/3.0/mods-config/preprocess/huntgroups" hints = "/etc/freeradius/3.0/mods-config/preprocess/hints" with_ascend_hack = no ascend_channels_per_line = 23 with_ntdomain_hack = no with_specialix_jetstream_hack = no with_cisco_vsa_hack = no with_alvarion_vsa_hack = no } # Loaded module rlm_linelog # Loading module "linelog" from file /etc/freeradius/3.0/mods-enabled/linelog linelog { filename = "/var/log/freeradius/linelog" escape_filenames = no syslog_severity = "info" permissions = 384 format = "This is a log message for %{User-Name}" reference = "messages.%{%{reply:Packet-Type}:-default}" } # Loading module "log_accounting" from file /etc/freeradius/3.0/mods-enabled/linelog linelog log_accounting { filename = "/var/log/freeradius/linelog-accounting" escape_filenames = no syslog_severity = "info" permissions = 384 format = "" reference = "Accounting-Request.%{%{Acct-Status-Type}:-unknown}" } # Loaded module rlm_cache # Loading module "cache_eap" from file /etc/freeradius/3.0/mods-enabled/cache_eap cache cache_eap { driver = "rlm_cache_rbtree" key = "%{%{control:State}:-%{%{reply:State}:-%{State}}}" ttl = 15 max_entries = 0 epoch = 0 add_stats = no } # Loading module "echo" from file /etc/freeradius/3.0/mods-enabled/echo exec echo { wait = yes program = "/bin/echo %{User-Name}" input_pairs = "request" output_pairs = "reply" shell_escape = yes } instantiate { } # Instantiating module "ldap" from file /etc/freeradius/3.0/mods-enabled/ldap rlm_ldap: libldap vendor: OpenLDAP, version: 20447 accounting { reference = "%{tolower:type.%{Acct-Status-Type}}" } post-auth { reference = "." } rlm_ldap (ldap): Initialising connection pool pool { start = 5 min = 3 max = 32 spare = 10 uses = 0 lifetime = 0 cleanup_interval = 30 idle_timeout = 60 retry_delay = 30 spread = no } rlm_ldap (ldap): Opening additional connection (0), 1 of 32 pending slots used rlm_ldap (ldap): Connecting to ldap://blucher.arcada.fi:636 TLS: warning: cacertdir not implemented for gnutls rlm_ldap (ldap): Waiting for bind result... rlm_ldap (ldap): Bind successful rlm_ldap (ldap): Opening additional connection (1), 1 of 31 pending slots used rlm_ldap (ldap): Connecting to ldap://blucher.arcada.fi:636 TLS: warning: cacertdir not implemented for gnutls rlm_ldap (ldap): Waiting for bind result... rlm_ldap (ldap): Bind successful rlm_ldap (ldap): Opening additional connection (2), 1 of 30 pending slots used rlm_ldap (ldap): Connecting to ldap://blucher.arcada.fi:636 TLS: warning: cacertdir not implemented for gnutls rlm_ldap (ldap): Waiting for bind result... rlm_ldap (ldap): Bind successful rlm_ldap (ldap): Opening additional connection (3), 1 of 29 pending slots used rlm_ldap (ldap): Connecting to ldap://blucher.arcada.fi:636 TLS: warning: cacertdir not implemented for gnutls rlm_ldap (ldap): Waiting for bind result... rlm_ldap (ldap): Bind successful rlm_ldap (ldap): Opening additional connection (4), 1 of 28 pending slots used rlm_ldap (ldap): Connecting to ldap://blucher.arcada.fi:636 TLS: warning: cacertdir not implemented for gnutls rlm_ldap (ldap): Waiting for bind result... rlm_ldap (ldap): Bind successful # Instantiating module "detail" from file /etc/freeradius/3.0/mods-enabled/detail # Instantiating module "attr_filter.post-proxy" from file /etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file /etc/freeradius/3.0/mods-config/attr_filter/post-proxy # Instantiating module "attr_filter.pre-proxy" from file /etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file /etc/freeradius/3.0/mods-config/attr_filter/pre-proxy # Instantiating module "attr_filter.access_reject" from file /etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file /etc/freeradius/3.0/mods-config/attr_filter/access_reject [/etc/freeradius/3.0/mods-config/attr_filter/access_reject]:11 Check item "FreeRADIUS-Response-Delay" found in filter list for realm "DEFAULT". [/etc/freeradius/3.0/mods-config/attr_filter/access_reject]:11 Check item "FreeRADIUS-Response-Delay-USec" found in filter list for realm "DEFAULT". # Instantiating module "attr_filter.access_challenge" from file /etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file /etc/freeradius/3.0/mods-config/attr_filter/access_challenge # Instantiating module "attr_filter.accounting_response" from file /etc/freeradius/3.0/mods-enabled/attr_filter reading pairlist file /etc/freeradius/3.0/mods-config/attr_filter/accounting_response # Instantiating module "files" from file /etc/freeradius/3.0/mods-enabled/files reading pairlist file /etc/freeradius/3.0/mods-config/files/authorize reading pairlist file /etc/freeradius/3.0/mods-config/files/accounting reading pairlist file /etc/freeradius/3.0/mods-config/files/pre-proxy # Instantiating module "eap" from file /etc/freeradius/3.0/mods-enabled/eap # Linked to sub-module rlm_eap_md5 # Linked to sub-module rlm_eap_leap # Linked to sub-module rlm_eap_gtc gtc { challenge = "Password: " auth_type = "PAP" } # Linked to sub-module rlm_eap_tls tls { } TLS section "tls" missing, trying to use legacy configuration tls { verify_depth = 0 pem_file_type = yes private_key_file = "/etc/freeradius/certs/server.pem" certificate_file = "/etc/freeradius/certs/server.pem" private_key_password = <<< secret >>> dh_file = "/etc/freeradius/certs/dh" random_file = "/etc/freeradius/certs/random" fragment_size = 1024 include_length = yes auto_chain = yes check_crl = no check_all_crl = no cipher_list = "DEFAULT" ecdh_curve = "prime256v1" tls_max_version = "" tls_min_version = "1.0" cache { enable = no lifetime = 24 max_entries = 255 } verify { skip_if_ocsp_ok = no } ocsp { enable = no override_cert_url = no use_nonce = yes timeout = 0 softfail = no } } # Linked to sub-module rlm_eap_ttls ttls { default_eap_type = "mschapv2" copy_request_to_tunnel = yes use_tunneled_reply = yes virtual_server = "eduroam-inner-tunnel" include_length = yes require_client_cert = no } TLS section "tls" missing, trying to use legacy configuration tls: Using cached TLS configuration from previous invocation # Linked to sub-module rlm_eap_peap peap { default_eap_type = "mschapv2" copy_request_to_tunnel = no use_tunneled_reply = yes proxy_tunneled_request_as_eap = yes virtual_server = "inner-tunnel" soh = no require_client_cert = no } TLS section "tls" missing, trying to use legacy configuration tls: Using cached TLS configuration from previous invocation # Linked to sub-module rlm_eap_mschapv2 mschapv2 { with_ntdomain_hack = no send_error = no } # Instantiating module "pap" from file /etc/freeradius/3.0/mods-enabled/pap # Instantiating module "reject" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "fail" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "ok" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "handled" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "invalid" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "userlock" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "notfound" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "noop" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "updated" from file /etc/freeradius/3.0/mods-enabled/always # Instantiating module "logintime" from file /etc/freeradius/3.0/mods-enabled/logintime # Instantiating module "auth_log" from file /etc/freeradius/3.0/mods-enabled/detail.log rlm_detail (auth_log): 'User-Password' suppressed, will not appear in detail output # Instantiating module "reply_log" from file /etc/freeradius/3.0/mods-enabled/detail.log # Instantiating module "pre_proxy_log" from file /etc/freeradius/3.0/mods-enabled/detail.log # Instantiating module "post_proxy_log" from file /etc/freeradius/3.0/mods-enabled/detail.log # Instantiating module "etc_passwd" from file /etc/freeradius/3.0/mods-enabled/passwd rlm_passwd: nfields: 3 keyfield 0(User-Name) listable: no # Instantiating module "mschap" from file /etc/freeradius/3.0/mods-enabled/mschap rlm_mschap (mschap): using internal authentication # Instantiating module "expiration" from file /etc/freeradius/3.0/mods-enabled/expiration # Instantiating module "IPASS" from file /etc/freeradius/3.0/mods-enabled/realm # Instantiating module "suffix" from file /etc/freeradius/3.0/mods-enabled/realm # Instantiating module "realmpercent" from file /etc/freeradius/3.0/mods-enabled/realm # Instantiating module "ntdomain" from file /etc/freeradius/3.0/mods-enabled/realm # Instantiating module "inner-eap" from file /etc/freeradius/3.0/mods-enabled/inner-eap # Linked to sub-module rlm_eap_md5 # Linked to sub-module rlm_eap_gtc gtc { challenge = "Password: " auth_type = "PAP" } # Linked to sub-module rlm_eap_mschapv2 mschapv2 { with_ntdomain_hack = no send_error = no } # Linked to sub-module rlm_eap_tls tls { } TLS section "tls" missing, trying to use legacy configuration tls { verify_depth = 0 pem_file_type = yes private_key_file = "/etc/ssl/private/ssl-cert-snakeoil.key" certificate_file = "/etc/ssl/certs/ssl-cert-snakeoil.pem" ca_file = "/etc/ssl/certs/ca-certificates.crt" private_key_password = <<< secret >>> dh_file = "/etc/freeradius/certs/dh" random_file = "/dev/urandom" fragment_size = 1024 include_length = yes auto_chain = yes check_crl = no check_all_crl = no cipher_list = "DEFAULT" ecdh_curve = "prime256v1" tls_max_version = "" tls_min_version = "1.0" cache { enable = no lifetime = 24 max_entries = 255 } verify { skip_if_ocsp_ok = no } ocsp { enable = no override_cert_url = no use_nonce = yes timeout = 0 softfail = no } } # Instantiating module "preprocess" from file /etc/freeradius/3.0/mods-enabled/preprocess reading pairlist file /etc/freeradius/3.0/mods-config/preprocess/huntgroups reading pairlist file /etc/freeradius/3.0/mods-config/preprocess/hints # Instantiating module "linelog" from file /etc/freeradius/3.0/mods-enabled/linelog # Instantiating module "log_accounting" from file /etc/freeradius/3.0/mods-enabled/linelog # Instantiating module "cache_eap" from file /etc/freeradius/3.0/mods-enabled/cache_eap rlm_cache (cache_eap): Driver rlm_cache_rbtree (module rlm_cache_rbtree) loaded and linked } # modules radiusd: #### Loading Virtual Servers #### server { # from file /etc/freeradius/3.0/radiusd.conf } # server server eduroam { # from file /etc/freeradius/3.0/sites-enabled/eduroam # Loading authenticate {...} # Loading authorize {...} # Loading preacct {...} # Loading accounting {...} # Loading session {...} # Loading pre-proxy {...} # Loading post-proxy {...} # Loading post-auth {...} } # server eduroam server eduroam-inner-tunnel { # from file /etc/freeradius/3.0/sites-enabled/eduroam-inner-tunnel # Loading authenticate {...} # Loading authorize {...} # Loading preacct {...} # Loading accounting {...} # Loading session {...} # Loading post-auth {...} } # server eduroam-inner-tunnel radiusd: #### Opening IP addresses and Ports #### listen { type = "control" listen { socket = "/var/run/freeradius/freeradius.sock" peercred = yes } } Listening on command file /var/run/freeradius/freeradius.sock Ready to process requests -- Harald Hannelius | harald.hannelius/a\arcada.fi | +358 50 594 1020 - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html |
On Dec 17, 2020, at 7:34 AM, Harald Hannelius <[hidden email]> wrote:
> I performed a dist-upgrade on a Debian 9 running freeradius-3.0.12, thus going to Debian 10 and freeradius-3.0.17. > > I haven't touched the config, nor did I allow the dist-upgrade to do any changes. *Any* changes? Like maybe add FW rules? > After the upgrade freeradius starts, but doesn't reply on the network. I have tested with radtest, and it always just prints three tries and ends with "(0) No reply from server for ID 120 socket 3". I have done the tests with both -4 and -6. See the firewall. Or maybe SELinux. There is nothing in the server which says "ignore all input packets". Alam DeKok. - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html |
On Thu, 17 Dec 2020, Alan DeKok wrote: > On Dec 17, 2020, at 7:34 AM, Harald Hannelius <[hidden email]> wrote: >> I performed a dist-upgrade on a Debian 9 running freeradius-3.0.12, thus going to Debian 10 and freeradius-3.0.17. >> >> I haven't touched the config, nor did I allow the dist-upgrade to do any changes. > > *Any* changes? Like maybe add FW rules? No changes. No firewall rules. Talking to localhost. I noted that the Debian 9.0 freeradius-3.0.12 freeradius -X output ends with this; } } Listening on command file /var/run/freeradius/freeradius.sock Listening on auth address * port 1812 bound to server default Listening on acct address * port 1813 bound to server default Listening on auth address :: port 1812 bound to server default Listening on acct address :: port 1813 bound to server default Listening on proxy address * port 46685 Listening on proxy address :: port 59709 Ready to process requests Whereas the Debian 10.0 freeradius 3.0.17 freeradius X output ends with; listen { socket = "/var/run/freeradius/freeradius.sock" peercred = yes } } Listening on command file /var/run/freeradius/freeradius.sock Ready to process requests No wonder I don't get any replies on the network :) >> After the upgrade freeradius starts, but doesn't reply on the network. I >> have tested with radtest, and it always just prints three tries and ends >> with "(0) No reply from server for ID 120 socket 3". I have done the >> tests with both -4 and -6. > > See the firewall. Or maybe SELinux. There is nothing in the server which says "ignore all input packets". No iptables-rules defined on this server. # dpkg --get-selections|grep selinux libselinux1:amd64 install I don't seem to have gotten SElinux on this server. I think that apparmor always outpus something in the kernel ring buffer, I can't see anything about freeradius using 'dmesg'. I will have to run a diff on the config before and after upgrade, and check everything. I suspect the Debian upgrade did something it shouldn't have. I might as well be barking up the wrong tree here, have to jog over to the Debian-tree perhaps. -- Harald Hannelius | harald.hannelius/a\arcada.fi | +358 50 594 1020 - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html |
Didnt debian switch from a "one" config to "includes"
.. like do you see /etc/freeradius/3.0/ i think its something like that. > -----Oorspronkelijk bericht----- > Van: Freeradius-Users [mailto:freeradius-users- > bounces+belle=[hidden email]] Namens Harald Hannelius > Verzonden: donderdag 17 december 2020 13:52 > Aan: FreeRadius users mailing list > Onderwerp: Re: Upgraded 3.0.12 -> 3.0.17. Doesn't answer anymore > > > On Thu, 17 Dec 2020, Alan DeKok wrote: > > On Dec 17, 2020, at 7:34 AM, Harald Hannelius > <[hidden email]> wrote: > >> I performed a dist-upgrade on a Debian 9 running freeradius-3.0.12, > thus going to Debian 10 and freeradius-3.0.17. > >> > >> I haven't touched the config, nor did I allow the dist-upgrade to do > any changes. > > > > *Any* changes? Like maybe add FW rules? > > No changes. No firewall rules. Talking to localhost. > > I noted that the Debian 9.0 freeradius-3.0.12 freeradius -X output ends > with > this; > > } > } > Listening on command file /var/run/freeradius/freeradius.sock > Listening on auth address * port 1812 bound to server default > Listening on acct address * port 1813 bound to server default > Listening on auth address :: port 1812 bound to server default > Listening on acct address :: port 1813 bound to server default > Listening on proxy address * port 46685 > Listening on proxy address :: port 59709 > Ready to process requests > > > Whereas the Debian 10.0 freeradius 3.0.17 freeradius X output ends with; > > listen { > socket = "/var/run/freeradius/freeradius.sock" > peercred = yes > } > } > Listening on command file /var/run/freeradius/freeradius.sock > Ready to process requests > > > No wonder I don't get any replies on the network :) > > >> After the upgrade freeradius starts, but doesn't reply on the network. > I > >> have tested with radtest, and it always just prints three tries and > ends > >> with "(0) No reply from server for ID 120 socket 3". I have done the > >> tests with both -4 and -6. > > > > See the firewall. Or maybe SELinux. There is nothing in the server > which says "ignore all input packets". > > No iptables-rules defined on this server. > > # dpkg --get-selections|grep selinux > libselinux1:amd64 install > > I don't seem to have gotten SElinux on this server. > > I think that apparmor always outpus something in the kernel ring buffer, I > can't see anything about freeradius using 'dmesg'. > > I will have to run a diff on the config before and after upgrade, and > check > everything. I suspect the Debian upgrade did something it shouldn't have. > > I might as well be barking up the wrong tree here, have to jog over to the > Debian-tree perhaps. > > -- > > Harald Hannelius | harald.hannelius/a\arcada.fi | +358 50 594 1020 > - > List info/subscribe/unsubscribe? See > http://www.freeradius.org/list/users.html - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html |
In reply to this post by Harald Hannelius
On Dec 17, 2020, at 7:52 AM, Harald Hannelius <[hidden email]> wrote:
> No changes. No firewall rules. Talking to localhost. OK. > No wonder I don't get any replies on the network :) Yes. That's why reading the debug is useful. > I will have to run a diff on the config before and after upgrade, and check everything. I suspect the Debian upgrade did something it shouldn't have. If it deleted the virtual servers, yes. The packages we build will _never_ break your existing configuration: http://packages.networkradius.com Alan DeKok. - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html |
In reply to this post by Users mailing list
Yes, that bit me quite a while when I did the last upgrade :) This is an upgrade from 3.0.12 -> 3.0.17, I really really hope that this wouldn't meen a change like that. On Thu, 17 Dec 2020, L.P.H. van Belle via Freeradius-Users wrote: > Didnt debian switch from a "one" config to "includes" > > .. like do you see /etc/freeradius/3.0/ > > i think its something like that. > > >> -----Oorspronkelijk bericht----- >> Van: Freeradius-Users [mailto:freeradius-users- >> bounces+belle=[hidden email]] Namens Harald Hannelius >> Verzonden: donderdag 17 december 2020 13:52 >> Aan: FreeRadius users mailing list >> Onderwerp: Re: Upgraded 3.0.12 -> 3.0.17. Doesn't answer anymore >> >> >> On Thu, 17 Dec 2020, Alan DeKok wrote: >>> On Dec 17, 2020, at 7:34 AM, Harald Hannelius >> <[hidden email]> wrote: >>>> I performed a dist-upgrade on a Debian 9 running freeradius-3.0.12, >> thus going to Debian 10 and freeradius-3.0.17. >>>> >>>> I haven't touched the config, nor did I allow the dist-upgrade to do >> any changes. >>> >>> *Any* changes? Like maybe add FW rules? >> >> No changes. No firewall rules. Talking to localhost. >> >> I noted that the Debian 9.0 freeradius-3.0.12 freeradius -X output ends >> with >> this; >> >> } >> } >> Listening on command file /var/run/freeradius/freeradius.sock >> Listening on auth address * port 1812 bound to server default >> Listening on acct address * port 1813 bound to server default >> Listening on auth address :: port 1812 bound to server default >> Listening on acct address :: port 1813 bound to server default >> Listening on proxy address * port 46685 >> Listening on proxy address :: port 59709 >> Ready to process requests >> >> >> Whereas the Debian 10.0 freeradius 3.0.17 freeradius X output ends with; >> >> listen { >> socket = "/var/run/freeradius/freeradius.sock" >> peercred = yes >> } >> } >> Listening on command file /var/run/freeradius/freeradius.sock >> Ready to process requests >> >> >> No wonder I don't get any replies on the network :) >> >>>> After the upgrade freeradius starts, but doesn't reply on the network. >> I >>>> have tested with radtest, and it always just prints three tries and >> ends >>>> with "(0) No reply from server for ID 120 socket 3". I have done the >>>> tests with both -4 and -6. >>> >>> See the firewall. Or maybe SELinux. There is nothing in the server >> which says "ignore all input packets". >> >> No iptables-rules defined on this server. >> >> # dpkg --get-selections|grep selinux >> libselinux1:amd64 install >> >> I don't seem to have gotten SElinux on this server. >> >> I think that apparmor always outpus something in the kernel ring buffer, I >> can't see anything about freeradius using 'dmesg'. >> >> I will have to run a diff on the config before and after upgrade, and >> check >> everything. I suspect the Debian upgrade did something it shouldn't have. >> >> I might as well be barking up the wrong tree here, have to jog over to the >> Debian-tree perhaps. >> >> -- >> >> Harald Hannelius | harald.hannelius/a\arcada.fi | +358 50 594 1020 >> - >> List info/subscribe/unsubscribe? See >> http://www.freeradius.org/list/users.html > > > - > List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html > > -- Harald Hannelius | harald.hannelius/a\arcada.fi | +358 50 594 1020 - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html |
In reply to this post by Alan DeKok-2
On Thu, 17 Dec 2020, Alan DeKok wrote: > On Dec 17, 2020, at 7:52 AM, Harald Hannelius <[hidden email]> wrote: >> I will have to run a diff on the config before and after upgrade, and >> check everything. I suspect the Debian upgrade did something it shouldn't >> have. > > If it deleted the virtual servers, yes. Well, I copied the previous config-dir over and started freeradius again. listen { type = "acct" ipv6addr = :: port = 0 limit { max_connections = 16 lifetime = 0 idle_timeout = 30 } } Listening on command file /var/run/freeradius/freeradius.sock Listening on auth address * port 1812 bound to server default Listening on acct address * port 1813 bound to server default Listening on auth address :: port 1812 bound to server default Listening on acct address :: port 1813 bound to server default Listening on proxy address * port 57548 Listening on proxy address :: port 43775 Ready to process requests ^C What do you know! It works! > The packages we build will _never_ break your existing configuration: http://packages.networkradius.com Good to know. I don't feel like building packages myself anymore though. /running to the next tree -- Harald Hannelius | harald.hannelius/a\arcada.fi | +358 50 594 1020 - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html |
On 17/12/2020 13:03, Harald Hannelius wrote: > > On Thu, 17 Dec 2020, Alan DeKok wrote: >> The packages we build will _never_ break your existing >> configuration: http://packages.networkradius.com > > Good to know. I don't feel like building packages myself anymore though. The key is sort of in the name. They _are_ pre-built packages. -- Matthew - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html |
In reply to this post by Harald Hannelius
Hi Harald,
We encourage you to always use the latest version of the FreeRADIUS. In this case, latest is 3.0.21 --- Jorge Pereira [hidden email] > On 17 Dec 2020, at 10:02, Harald Hannelius <[hidden email]> wrote: > > > > Yes, that bit me quite a while when I did the last upgrade :) > > This is an upgrade from 3.0.12 -> 3.0.17, I really really hope that this wouldn't meen a change like that. > > On Thu, 17 Dec 2020, L.P.H. van Belle via Freeradius-Users wrote: > >> Didnt debian switch from a "one" config to "includes" >> >> .. like do you see /etc/freeradius/3.0/ >> >> i think its something like that. >> >> >>> -----Oorspronkelijk bericht----- >>> Van: Freeradius-Users [mailto:freeradius-users- >>> bounces+belle=[hidden email]] Namens Harald Hannelius >>> Verzonden: donderdag 17 december 2020 13:52 >>> Aan: FreeRadius users mailing list >>> Onderwerp: Re: Upgraded 3.0.12 -> 3.0.17. Doesn't answer anymore >>> >>> >>> On Thu, 17 Dec 2020, Alan DeKok wrote: >>>> On Dec 17, 2020, at 7:34 AM, Harald Hannelius >>> <[hidden email]> wrote: >>>>> I performed a dist-upgrade on a Debian 9 running freeradius-3.0.12, >>> thus going to Debian 10 and freeradius-3.0.17. >>>>> >>>>> I haven't touched the config, nor did I allow the dist-upgrade to do >>> any changes. >>>> >>>> *Any* changes? Like maybe add FW rules? >>> >>> No changes. No firewall rules. Talking to localhost. >>> >>> I noted that the Debian 9.0 freeradius-3.0.12 freeradius -X output ends >>> with >>> this; >>> >>> } >>> } >>> Listening on command file /var/run/freeradius/freeradius.sock >>> Listening on auth address * port 1812 bound to server default >>> Listening on acct address * port 1813 bound to server default >>> Listening on auth address :: port 1812 bound to server default >>> Listening on acct address :: port 1813 bound to server default >>> Listening on proxy address * port 46685 >>> Listening on proxy address :: port 59709 >>> Ready to process requests >>> >>> >>> Whereas the Debian 10.0 freeradius 3.0.17 freeradius X output ends with; >>> >>> listen { >>> socket = "/var/run/freeradius/freeradius.sock" >>> peercred = yes >>> } >>> } >>> Listening on command file /var/run/freeradius/freeradius.sock >>> Ready to process requests >>> >>> >>> No wonder I don't get any replies on the network :) >>> >>>>> After the upgrade freeradius starts, but doesn't reply on the network. >>> I >>>>> have tested with radtest, and it always just prints three tries and >>> ends >>>>> with "(0) No reply from server for ID 120 socket 3". I have done the >>>>> tests with both -4 and -6. >>>> >>>> See the firewall. Or maybe SELinux. There is nothing in the server >>> which says "ignore all input packets". >>> >>> No iptables-rules defined on this server. >>> >>> # dpkg --get-selections|grep selinux >>> libselinux1:amd64 install >>> >>> I don't seem to have gotten SElinux on this server. >>> >>> I think that apparmor always outpus something in the kernel ring buffer, I >>> can't see anything about freeradius using 'dmesg'. >>> >>> I will have to run a diff on the config before and after upgrade, and >>> check >>> everything. I suspect the Debian upgrade did something it shouldn't have. >>> >>> I might as well be barking up the wrong tree here, have to jog over to the >>> Debian-tree perhaps. >>> >>> -- >>> >>> Harald Hannelius | harald.hannelius/a\arcada.fi | +358 50 594 1020 >>> - >>> List info/subscribe/unsubscribe? See >>> http://www.freeradius.org/list/users.html >> >> >> - >> List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html >> >> > > -- > > Harald Hannelius | harald.hannelius/a\arcada.fi | +358 50 594 1020 > - > List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html |
Free forum by Nabble | Edit this page |