Skip to content

Commit 8337be4

Browse files
committed
Updated nav files and lots of xref stuff Resolved filepaths for files in the reference and howto modules Update xrefs and fix broken links.Add file panic.gdb.adoc (found in src raddb panic.gdb)
update ref nav file
1 parent feedbb7 commit 8337be4

File tree

32 files changed

+698
-70
lines changed

32 files changed

+698
-70
lines changed

doc/antora/antora.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,9 @@ prerelease: Devel
1010
start_page: ROOT:index.adoc
1111
nav:
1212
- modules/ROOT/nav.adoc
13-
- modules/reference/nav.adoc
14-
- modules/installation/nav.adoc
1513
- modules/concepts/nav.adoc
14+
- modules/reference/nav.adoc
1615
- modules/howto/nav.adoc
16+
- modules/installation/nav.adoc
1717
- modules/tutorials/nav.adoc
1818
- modules/developers/nav.adoc

doc/antora/modules/ROOT/pages/faq.adoc

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ Then the server will always respond with the correct address.
9898
Yes, you can. Assuming you already have daemontools installed, configured and running in your system (see http://cr.yp.to/daemontools.html), you will have to make two decisions:
9999
1. The log account and group name (_log.log_ is used in this example). Logging programs run under this _account.group_. If this _account.group pair_ does not exist yet, create it now.
100100

101-
2. The radiusd local service directory (_/etc/radiusd_ is used in this example). This is where radiusd will store logs and a few configuration files.
101+
//2. The radiusd local service directory (_/etc/radiusd_ is used in this example). This is where radiusd will store logs and a few configuration files.
102102

103103
Then perform these steps:
104104

@@ -454,20 +454,20 @@ If you're REALLY interested in knowing how to debug the RADIUS server yourself,
454454
Ready to process requests.
455455
* If it doesn't, then it should print out an error message. Read it.
456456
* If it takes a long time to start up, and THEN prints out the message, then your DNS is broken.
457-
8. Ensure that you have localhost in your _raddb/clients_ file. FreeRADIUS comes configured this way, so it should be there.
458-
9. Ensure you have a valid user in your _raddb/users_ file. If everything else fails, go to the top of the file and add the following entry:
457+
6. Ensure that you have localhost in your _raddb/clients_ file. FreeRADIUS comes configured this way, so it should be there.
458+
7. Ensure you have a valid user in your _raddb/users_ file. If everything else fails, go to the top of the file and add the following entry:
459459
bob Cleartext-Password := "bob"
460460
Reply-Message = "Hello, bob"
461-
12. Run the radtest program from the LOCAL machine, in another window. This will tell you if the server is alive and is answering requests.
461+
8. Run the radtest program from the LOCAL machine, in another window. This will tell you if the server is alive and is answering requests.
462462
radtest bob bob localhost 0 testing123
463-
14. Ensure that you see the Reply-Message above and that you do NOT see an "Access denied" message. If you get an Access-Accept message, this means that the server is running properly.
464-
15. Configure another machine as a RADIUS client and run radtest from that machine too. You SHOULD see the server receive the request and send a reply.
463+
9. Ensure that you see the Reply-Message above and that you do NOT see an "Access denied" message. If you get an Access-Accept message, this means that the server is running properly.
464+
10. Configure another machine as a RADIUS client and run radtest from that machine too. You SHOULD see the server receive the request and send a reply.
465465
* If the server does NOT receive the request then the ports are confused. RADIUS historically uses 1645/UDP, where RFC 2138 and many new systems use the proper value of 1812/UDP. See _/etc/services_ or use the -p option to specify a different port.
466466
* Run tcpdump in another window on the RADIUS client machine. Use the command:
467467
* `tcpdump udp`
468468
* Look CAREFULLY at the packets coming from the RADIUS server. Which address are they coming from? Which port?
469-
16. If authentication works from a different machine then you have the server set up correctly.
470-
17. Now you should use a more complicated configuration to see if the server receives and replies with the attributes you want. There is little information that can be offered here in the FAQ as your individual systems configuration can not be predicted. However, a few hints can help:
469+
11. If authentication works from a different machine then you have the server set up correctly.
470+
12. Now you should use a more complicated configuration to see if the server receives and replies with the attributes you want. There is little information that can be offered here in the FAQ as your individual systems configuration can not be predicted. However, a few hints can help:
471471
* ALWAYS test your configurations running the server in debugging mode if you want to debug a problem. If you do not do so then DO NOT expect anyone else to be able to help you.
472472
* `radiusd -X`
473473
* Read RFC 2138 to see what the RADIUS attributes are and how they work
@@ -769,13 +769,13 @@ Which gives : (tcpdump output)
769769

770770
The whole netmask business is a complicated one. An IP interface has an IP address and usually a netmask associated with it. Netmasks on point-to-point interfaces like a PPP link are generally not used.
771771

772-
If you set the Framed-IP-Netmask attribute in a radius profile, you are setting the netmask of the interface on the side of the [[NAS]]. The Framed-IP-Netmask attribute is NOT something you can set to influence the netmask on the side of the dialin user. And usually, that makes no sense anyway even if you could set it.
772+
If you set the Framed-IP-Netmask attribute in a radius profile, you are setting the netmask of the interface on the side of the NAS. The Framed-IP-Netmask attribute is NOT something you can set to influence the netmask on the side of the dialin user. And usually, that makes no sense anyway even if you could set it.
773773

774774
The result of this on most NAS is that they start to route a subnet (the subnet that contains the assigned IP address and that is as big as the netmask indicates) to that PPP interface and thus to the user. If that is exactly what you want, then that's fine, but if you do not intend to route a whole subnet to the user, then by all means do NOT use the Framed-IP-Netmask attribute.
775775

776-
Many [[NAS]] interpret a left-out [[Framed-IP-Netmask]] as if it were set to 255.255.255.255, but to be certain you should set the Framed-IP-Netmask to 255.255.255.255.
776+
Many NAS interpret a left-out Framed-IP-Netmask as if it were set to 255.255.255.255, but to be certain you should set the Framed-IP-Netmask to 255.255.255.255.
777777

778-
For example, the following entries do almost the same on most [[NAS]]:
778+
For example, the following entries do almost the same on most NAS:
779779

780780
user Cleartext-Password := "blegh"
781781
Service-Type = Framed-User,
@@ -789,7 +789,7 @@ For example, the following entries do almost the same on most [[NAS]]:
789789
Framed-IP-Address = 192.168.5.78,
790790
Framed-Route = "192.168.5.64/28 0.0.0.0 1"
791791

792-
The result is that the end user gets IP address 192.168.5.78 and that the whole network with IP addresses 192.168.5.64 - 195.64.5.79 is routed over the PPP link to the user (see the [[RADIUS]] [[RFC]]s for the exact syntax of the Framed-Route attribute).
792+
The result is that the end user gets IP address 192.168.5.78 and that the whole network with IP addresses 192.168.5.64 - 195.64.5.79 is routed over the PPP link to the user (see the RADIUS RFCs for the exact syntax of the Framed-Route attribute).
793793

794794
### How do I make CHAP work with LDAP?
795795

doc/antora/modules/ROOT/pages/index.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ desired outcome. At a high level, the subject areas describe:
4040
* The xref:reference:raddb/index.adoc[configuration files] located in `/etc/raddb/`, or `/etc/freeradius/`
4141
* The syntax of the xref:reference:unlang/index.adoc[unlang] processing language
4242
* Various xref:howto:index.adoc[how-to] guides
43-
* xref:howto:installation/index.adoc[Installing] and xref:howto:installation/upgrade.adoc[upgrading] FreeRADIUS
43+
* xref:installation:index.adoc[Installing] and xref:installation:upgrade.adoc[upgrading] FreeRADIUS
4444
* xref:developers:index.adoc[Developer documentation]
4545
4646
This organization means that for example, the `ldap` module will have

doc/antora/modules/concepts/pages/modules/ldap_authentication.adoc

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ involves giving the FreeRADIUS "read-only" user permission to read the
4040
`userPassword` field.
4141

4242
Again, the best method is to test authentication is with the
43-
xref:modules/ldap_search.adoc[ldapsearch] tool. These tests *must* be
43+
ldap search tool. These tests *must* be
4444
run prior to configuring FreeRADIUS. We strongly recommend having the
4545
LDAP database return the `userPassword` field to FreeRADIUS, so that
4646
FreeRADIUS can authenticate the user.
@@ -52,7 +52,8 @@ more detail.
5252

5353
== Password Storage Methods
5454

55-
If the `userPassword` field is returned from LDAP to FreeRADIUS, that
55+
If the `userPassword` field is retu:/raddb
56+
:q!:rned from LDAP to FreeRADIUS, that
5657
information can be stored in a number of different formats:
5758

5859
* the value can be cleartext
@@ -67,15 +68,15 @@ formats. There is sufficient information in the password values to
6768
determine what format it is in (base64, binary, or text), and what
6869
password "encryption" mechanism has been used (crypt, MD5, SHA, SSHA2,
6970
SHA3, etc). All that is necessary is that the
70-
xref:raddb:mods-available/ldap.adoc[ldap module] be configured to map
71+
xref:reference:raddb/mods-available/ldap.adoc[ldap module] be configured to map
7172
the `userPassword` LDAP field to the `&control:Password-With-Header`
7273
attribute in FreeRADIUS. FreeRADIUS will then "do the right thing" to
7374
authenticate the user.
7475

7576
This mapping is done in the default module configuration. There are
7677
no additional changes required for FreeRADIUS to correctly read and
7778
decode the `userPassword` field from LDAP. Please see the
78-
xref:raddb:mods-available/pap.adoc[pap module] for a full list of
79+
xref:reference:raddb/mods-available/pap.adoc[pap module] for a full list of
7980
supported password "encryption" formats.
8081

8182
== Additional Considerations

doc/antora/modules/developers/pages/index.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ List with some usual howtos for FreeRADIUS.
55
Programming reference documentation can be found at the
66
https://doc.freeradius.org/[Doxygen] site.
77

8-
# Instructions for Developers
8+
## Instructions for Developers
99

1010
As the name suggests, FreeRADIUS is developed under the GNU
1111
General Public License, Version 2 (GPLv2).

doc/antora/modules/developers/pages/rfc_compliance.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11

22
= RFC Compliance
33

4-
=== RADIUS Related
4+
== RADIUS Related
55

66
* RFC 2865 Remote Authentication Dial In User Service (RADIUS) (obsoletes RFC 2138 and RFC 2058)
77
* RFC 2866 RADIUS Accounting (obsoletes RFC 2139 and RFC 2059)
@@ -10,15 +10,15 @@
1010
* RFC 2869 RADIUS Extensions
1111
* RFC 2548 Microsoft Vendor-Specific RADIUS Attributes
1212

13-
=== Authentication Related
13+
== Authentication Related
1414

1515
* RFC 1994 PPP Challenge Handshake Authentication Protocol (CHAP)
1616
* RFC 2284 PPP Extensible Authentication Protocol (EAP)
1717
* RFC 2716 PPP EAP TLS Authentication Protocol
1818
* RFC 2759 Microsoft PPP CHAP Extensions, Version 2
1919
* RFC 3748 Extensible Authentication Protocol (EAP)
2020

21-
=== SNMP Related
21+
== SNMP Related
2222

2323
* RFC 1227 SNMP MUX Protocol and MIB
2424
* RFC 2619 RADIUS Authentication Server MIB

doc/antora/modules/howto/nav.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@
4444

4545
*** xref:modules/sqlcounter/index.adoc[SQL-Counter]
4646
*** xref:modules/sqlippool/index.adoc[SQL-IP-Pool]
47-
**** xref:modules/sqlippool/generating.adoc[Generating IPs]
47+
**** xref:modules/sqlippool/populating.adoc[Generating IPs]
4848
**** xref:modules/sqlippool/insert.adoc[Inserting IPs into SQL]
4949

5050
** xref:protocols/index.adoc[Protocols]

doc/antora/modules/howto/pages/git.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
As well as being an excellent SCM (Source control management) tool, git is also very useful for tracking changes to configuration files, and even for performing remote administration of servers.
44

5-
=== The basics
5+
== The basics
66

77
For basic configuration management one only has to:
88

@@ -30,7 +30,7 @@ And if it's all gone horribly wrong:
3030

3131
There are many many tutorials available if you want to learn more generic git administration, this one is extra pretty: http://gitimmersion.com.
3232

33-
==== Remote administration
33+
=== Remote administration
3434

3535
The basic functionality of git is useful on its own, but one of the features that really makes git shine among the SCMs is its support for commit hooks. Hooks don't require anything special to function (like gitosis or the git-daemon), they work just as well over straight SSH.
3636

doc/antora/modules/howto/pages/modules/rest/index.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ FreeRADIUS can be used to communicate with REST APIs.
88
This section describes the basic configuration needed to configure the REST
99
module to communicate with a REST service.
1010

11-
== xref:modules/rest/fixed_data.adoc[Calling REST endpoints with fixed data formats]
11+
//== xref:modules/rest/fixed_data.adoc[Calling REST endpoints with fixed data formats]
1212

1313
The REST module was developed to allow business logic to be separated out into a
1414
separate discrete service. This reduces the role of FreeRADIUS to a translation
@@ -20,10 +20,10 @@ If you will be developing a new REST API to implement business logic for a AAA
2020
service, you should follow the guide in this section, and accept and return
2121
data in that format the REST module expected.
2222

23-
== xref:modules/rest/custom_data.adoc[Calling REST endpoints with a custom data format]
23+
//== xref:modules/rest/custom_data.adoc[Calling REST endpoints with a custom data format]
2424

2525
The REST module can also communicate with arbitrary REST endpoints,
26-
and versions ≥ v4.0.x include a JSON module xref:mods-available/json.adoc[JSON]
26+
and versions ≥ v4.0.x include a JSON module xref:reference:raddb/mods-available/json.adoc[JSON]
2727
which allows mapping elements of a JSON response to FreeRADIUS.
2828

2929
If you're attempting to integrate an existing REST API, this section will provide

doc/antora/modules/howto/pages/modules/sqlippool/index.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -491,7 +491,7 @@ Framed-IPv6-Prefix RADIUS attribute then you can put the IPv6 prefixes into the
491491

492492
Populate the pool either manually using a text editor or database tool, or via a script.
493493

494-
See xref:modules/sqlippool/generating.adoc[Generating IPs for the
494+
See xref:modules/sqlippool/populating.adoc[Generating IPs for the
495495
pools] for instructions on how to create lists of IPs for a pool. And
496496
then xref:modules/sqlippool/insert.adoc[Inserting IPs into SQL]
497497

0 commit comments

Comments
 (0)