1 Index: freeradius-server-2.2.7/raddb/dictionary.in
2 ===================================================================
3 --- freeradius-server-2.2.7.orig/raddb/dictionary.in
4 +++ freeradius-server-2.2.7/raddb/dictionary.in
7 # The filename given here should be an absolute path.
9 -$INCLUDE @prefix@/share/freeradius/dictionary
10 +$INCLUDE @prefix@/share/freeradius2/dictionary
13 # Place additional attributes or $INCLUDEs here. They will
14 Index: freeradius-server-2.2.7/raddb/eap.conf
15 ===================================================================
16 --- freeradius-server-2.2.7.orig/raddb/eap.conf
17 +++ freeradius-server-2.2.7/raddb/eap.conf
19 # then that EAP type takes precedence over the
20 # default type configured here.
22 - default_eap_type = md5
23 + default_eap_type = peap
25 # A list is maintained to correlate EAP-Response
26 # packets with EAP-Request packets. After a
28 # for wireless connections. It is insecure, and does
29 # not provide for dynamic WEP keys.
39 # User-Password, or the NT-Password attributes.
40 # 'System' authentication is impossible with LEAP.
50 # the users password will go over the wire in plain-text,
55 # The default challenge, which many clients
57 #challenge = "Password: "
59 # configured for the request, and do the
60 # authentication itself.
70 # In these cases, fragment size should be
73 - # fragment_size = 1024
74 + fragment_size = 1024
76 # include_length is a flag which is
77 # by default set to yes If set to
79 # message is included ONLY in the
80 # First packet of a fragment series.
82 - # include_length = yes
83 + include_length = yes
85 # Check the Certificate Revocation List
88 # for the server to print out an error message,
89 # and refuse to start.
91 - make_cert_command = "${certdir}/bootstrap"
92 + # make_cert_command = "${certdir}/bootstrap"
95 # Elliptical cryptography configuration
97 # You probably also want "use_tunneled_reply = yes"
98 # when using fast session resumption.
103 # Enable it. The default is "no".
104 # Deleting the entire "cache" subsection
105 @@ -348,14 +348,14 @@
106 # enable resumption for just one user
107 # by setting the above attribute to "yes".
113 # Lifetime of the cached entries, in hours.
114 # The sessions will be deleted after this
117 - lifetime = 24 # hours
118 + # lifetime = 24 # hours
121 # The maximum number of entries in the
123 # This could be set to the number of users
124 # who are logged in... which can be a LOT.
128 + # max_entries = 255
132 # As of version 2.1.10, client certificates can be
135 # in the control items for a request.
139 # The tunneled EAP session needs a default
140 # EAP type which is separate from the one for
141 # the non-tunneled EAP module. Inside of the
143 # If the request does not contain an EAP
144 # conversation, then this configuration entry
146 - default_eap_type = md5
147 +# default_eap_type = mschapv2
149 # The tunneled authentication request does
150 # not usually contain useful attributes
152 # is copied to the tunneled request.
154 # allowed values: {no, yes}
155 - copy_request_to_tunnel = no
156 +# copy_request_to_tunnel = yes
158 # The reply attributes sent to the NAS are
159 # usually based on the name of the user
161 # the tunneled request.
163 # allowed values: {no, yes}
164 - use_tunneled_reply = no
165 +# use_tunneled_reply = no
168 # The inner tunneled request can be sent
169 @@ -552,13 +552,13 @@
170 # the virtual server that processed the
173 - virtual_server = "inner-tunnel"
174 +# virtual_server = "inner-tunnel"
176 # This has the same meaning as the
177 # same field in the "tls" module, above.
178 # The default value here is "yes".
179 # include_length = yes
183 ##################################################
185 @@ -627,14 +627,14 @@
187 # the PEAP module also has these configuration
188 # items, which are the same as for TTLS.
189 - copy_request_to_tunnel = no
190 - use_tunneled_reply = no
191 + copy_request_to_tunnel = yes
192 + use_tunneled_reply = yes
194 # When the tunneled session is proxied, the
195 # home server may not understand EAP-MSCHAP-V2.
196 # Set this entry to "no" to proxy the tunneled
197 # EAP-MSCHAP-V2 as normal MSCHAPv2.
198 - # proxy_tunneled_request_as_eap = yes
199 + proxy_tunneled_request_as_eap = no
202 # The inner tunneled request can be sent
204 # the virtual server that processed the
207 - virtual_server = "inner-tunnel"
208 + # virtual_server = "inner-tunnel"
209 + EAP-TLS-Require-Client-Cert = no
211 # This option enables support for MS-SoH
212 # see doc/SoH.txt for more info.
213 Index: freeradius-server-2.2.7/raddb/modules/counter
214 ===================================================================
215 --- freeradius-server-2.2.7.orig/raddb/modules/counter
216 +++ freeradius-server-2.2.7/raddb/modules/counter
218 # 'check-name' attribute.
221 - filename = ${db_dir}/db.daily
222 + filename = ${radacctdir}/db.daily
224 count-attribute = Acct-Session-Time
226 Index: freeradius-server-2.2.7/raddb/modules/pap
227 ===================================================================
228 --- freeradius-server-2.2.7.orig/raddb/modules/pap
229 +++ freeradius-server-2.2.7/raddb/modules/pap
232 # http://www.openldap.org/faq/data/cache/347.html
237 Index: freeradius-server-2.2.7/raddb/modules/radutmp
238 ===================================================================
239 --- freeradius-server-2.2.7.orig/raddb/modules/radutmp
240 +++ freeradius-server-2.2.7/raddb/modules/radutmp
241 @@ -12,7 +12,7 @@ radutmp {
242 # Where the file is stored. It's not a log file,
243 # so it doesn't need rotating.
245 - filename = ${logdir}/radutmp
246 + filename = ${radacctdir}/radutmp
248 # The field in the packet to key on for the
249 # 'user' name, If you have other fields which you want
250 Index: freeradius-server-2.2.7/raddb/modules/sradutmp
251 ===================================================================
252 --- freeradius-server-2.2.7.orig/raddb/modules/sradutmp
253 +++ freeradius-server-2.2.7/raddb/modules/sradutmp
255 # then name "sradutmp" to identify it later in the "accounting"
258 - filename = ${logdir}/sradutmp
259 + filename = ${radacctdir}/sradutmp
263 Index: freeradius-server-2.2.7/raddb/radiusd.conf.in
264 ===================================================================
265 --- freeradius-server-2.2.7.orig/raddb/radiusd.conf.in
266 +++ freeradius-server-2.2.7/raddb/radiusd.conf.in
267 @@ -66,7 +66,7 @@ name = radiusd
269 # Location of config and logfiles.
270 confdir = ${raddbdir}
271 -run_dir = ${localstatedir}/run/${name}
272 +run_dir = ${localstatedir}/run
274 # Should likely be ${localstatedir}/lib/radiusd
276 @@ -323,7 +323,7 @@ listen {
277 # If your system does not support this feature, you will
278 # get an error if you try to use it.
283 # Per-socket lists of clients. This is a very useful feature.
285 @@ -350,7 +350,7 @@ listen {
291 # clients = per_socket_clients
294 @@ -576,8 +576,8 @@ security {
296 # allowed values: {no, yes}
298 -proxy_requests = yes
301 +#$INCLUDE proxy.conf
304 # CLIENTS CONFIGURATION
305 @@ -774,7 +774,7 @@ instantiate {
306 # The entire command line (and output) must fit into 253 bytes.
308 # e.g. Framed-Pool = `%{exec:/bin/echo foo}`
313 # The expression module doesn't do authorization,
314 @@ -791,15 +791,15 @@ instantiate {
315 # other xlat functions such as md5, sha1 and lc.
317 # We do not recommend removing it's listing here.
322 # We add the counter module here so that it registers
323 # the check-name attribute before any module which sets
331 # subsections here can be thought of as "virtual" modules.
333 @@ -823,7 +823,7 @@ instantiate {
336 ######################################################################
337 -$INCLUDE policy.conf
338 +#$INCLUDE policy.conf
340 ######################################################################
342 @@ -833,9 +833,9 @@ $INCLUDE policy.conf
343 # match the regular expression: /[a-zA-Z0-9_.]+/
345 # It allows you to define new virtual servers simply by placing
346 -# a file into the raddb/sites-enabled/ directory.
347 +# a file into the /etc/freeradius2/sites/ directory.
349 -$INCLUDE sites-enabled/
352 ######################################################################
354 @@ -843,7 +843,7 @@ $INCLUDE sites-enabled/
355 # "authenticate {}", "accounting {}", have been moved to the
358 -# raddb/sites-available/default
359 +# /etc/freeradius2/sites/default
361 # This is the "default" virtual server that has the same
362 # configuration as in version 1.0.x and 1.1.x. The default
363 Index: freeradius-server-2.2.7/raddb/sites-available/default
364 ===================================================================
365 --- freeradius-server-2.2.7.orig/raddb/sites-available/default
366 +++ freeradius-server-2.2.7/raddb/sites-available/default
367 @@ -85,7 +85,7 @@ authorize {
369 # It takes care of processing the 'raddb/hints' and the
370 # 'raddb/huntgroups' files.
375 # If you want to have a log of authentication requests,
376 @@ -96,7 +96,7 @@ authorize {
378 # The chap module will set 'Auth-Type := CHAP' if we are
379 # handling a CHAP request and Auth-Type has not already been set
384 # If the users are logging in with an MS-CHAP-Challenge
385 @@ -104,13 +104,13 @@ authorize {
386 # the MS-CHAP-Challenge attribute, and add 'Auth-Type := MS-CHAP'
387 # to the request, which will cause the server to then use
388 # the mschap module for authentication.
393 # If you have a Cisco SIP server authenticating against
394 # FreeRADIUS, uncomment the following line, and the 'digest'
395 # line in the 'authenticate' section.
400 # The WiMAX specification says that the Calling-Station-Id
401 @@ -133,7 +133,7 @@ authorize {
402 # Otherwise, when the first style of realm doesn't match,
403 # the other styles won't be checked.
410 @@ -197,8 +197,8 @@ authorize {
411 # Use the checkval module
420 # If no other module has claimed responsibility for
421 @@ -279,7 +279,7 @@ authenticate {
422 # If you have a Cisco SIP server authenticating against
423 # FreeRADIUS, uncomment the following line, and the 'digest'
424 # line in the 'authorize' section.
429 # Pluggable Authentication Modules.
430 @@ -296,7 +296,7 @@ authenticate {
431 # be used for authentication ONLY for compatibility with legacy
432 # FreeRADIUS configurations.
437 # Uncomment it if you want to use ldap for authentication
439 @@ -332,8 +332,8 @@ authenticate {
441 # Pre-accounting. Decide which accounting type to use.
449 # Session start times are *implied* in RADIUS.
450 @@ -356,7 +356,7 @@ preacct {
452 # Ensure that we have a semi-unique identifier for every
453 # request, and many NAS boxes are broken.
458 # Look for IPASS-style 'realm/', and if not found, look for
459 @@ -366,13 +366,13 @@ preacct {
460 # Accounting requests are generally proxied to the same
461 # home server as authentication requests.
468 # Read the 'acct_users' file
475 # Accounting. Log the accounting data.
476 @@ -382,7 +382,7 @@ accounting {
477 # Create a 'detail'ed log of the packets.
478 # Note that accounting requests which are proxied
479 # are also logged in the detail file.
484 # Update the wtmp file
485 @@ -434,7 +434,7 @@ accounting {
488 # Filter attributes from the accounting response.
489 - attr_filter.accounting_response
490 + #attr_filter.accounting_response
493 # See "Autz-Type Status-Server" for how this works.
494 @@ -460,7 +460,7 @@ session {
495 # Post-Authentication
496 # Once we KNOW that the user has been authenticated, there are
497 # additional steps we can take.
500 # Get an address from the IP Pool.
503 @@ -490,7 +490,7 @@ post-auth {
506 # For Exec-Program and Exec-Program-Wait
511 # Calculate the various WiMAX keys. In order for this to work,
512 @@ -574,18 +574,18 @@ post-auth {
513 # Add the ldap module name (or instance) if you have set
514 # 'edir_account_policy_check = yes' in the ldap module configuration
516 - Post-Auth-Type REJECT {
517 - # log failed authentications in SQL, too.
518 +# Post-Auth-Type REJECT {
519 +# # log failed authentications in SQL, too.
522 # Insert EAP-Failure message if the request was
523 # rejected by policy instead of because of an
524 # authentication failure
528 - attr_filter.access_reject
531 +# attr_filter.access_reject
536 # When the server decides to proxy a request to a home server,
537 @@ -595,7 +595,7 @@ post-auth {
539 # Only a few modules currently have this method.
545 # Uncomment the following line if you want to change attributes
546 @@ -611,14 +611,14 @@ pre-proxy {
547 # server, un-comment the following line, and the
548 # 'detail pre_proxy_log' section, above.
554 # When the server receives a reply to a request it proxied
555 # to a home server, the request may be massaged here, in the
561 # If you want to have a log of replies from a home server,
562 # un-comment the following line, and the 'detail post_proxy_log'
563 @@ -642,7 +642,7 @@ post-proxy {
564 # hidden inside of the EAP packet, and the end server will
565 # reject the EAP request.
571 # If the server tries to proxy a request and fails, then the
572 @@ -664,5 +664,5 @@ post-proxy {
573 # Post-Proxy-Type Fail {
579 Index: freeradius-server-2.2.7/raddb/users
580 ===================================================================
581 --- freeradius-server-2.2.7.orig/raddb/users
582 +++ freeradius-server-2.2.7/raddb/users
583 @@ -169,22 +169,22 @@
584 # by the terminal server in which case there may not be a "P" suffix.
585 # The terminal server sends "Framed-Protocol = PPP" for auto PPP.
587 -DEFAULT Framed-Protocol == PPP
588 - Framed-Protocol = PPP,
589 - Framed-Compression = Van-Jacobson-TCP-IP
590 +#DEFAULT Framed-Protocol == PPP
591 +# Framed-Protocol = PPP,
592 +# Framed-Compression = Van-Jacobson-TCP-IP
595 # Default for CSLIP: dynamic IP address, SLIP mode, VJ-compression.
597 -DEFAULT Hint == "CSLIP"
598 - Framed-Protocol = SLIP,
599 - Framed-Compression = Van-Jacobson-TCP-IP
600 +#DEFAULT Hint == "CSLIP"
601 +# Framed-Protocol = SLIP,
602 +# Framed-Compression = Van-Jacobson-TCP-IP
605 # Default for SLIP: dynamic IP address, SLIP mode.
607 -DEFAULT Hint == "SLIP"
608 - Framed-Protocol = SLIP
609 +#DEFAULT Hint == "SLIP"
610 +# Framed-Protocol = SLIP
613 # Last default: rlogin to our main server.