You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Updated nav files and lots of xref stuff Resolved filepaths for files in the reference and howto modules Update xrefs and fix broken links.Add file panic.gdb.adoc (found in src raddb panic.gdb)
Copy file name to clipboardExpand all lines: doc/antora/modules/ROOT/pages/faq.adoc
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -98,7 +98,7 @@ Then the server will always respond with the correct address.
98
98
Yes, you can. Assuming you already have daemontools installed, configured and running in your system (see http://cr.yp.to/daemontools.html), you will have to make two decisions:
99
99
1. The log account and group name (_log.log_ is used in this example). Logging programs run under this _account.group_. If this _account.group pair_ does not exist yet, create it now.
100
100
101
-
2. The radiusd local service directory (_/etc/radiusd_ is used in this example). This is where radiusd will store logs and a few configuration files.
101
+
//2. The radiusd local service directory (_/etc/radiusd_ is used in this example). This is where radiusd will store logs and a few configuration files.
102
102
103
103
Then perform these steps:
104
104
@@ -454,20 +454,20 @@ If you're REALLY interested in knowing how to debug the RADIUS server yourself,
454
454
Ready to process requests.
455
455
* If it doesn't, then it should print out an error message. Read it.
456
456
* If it takes a long time to start up, and THEN prints out the message, then your DNS is broken.
457
-
8. Ensure that you have localhost in your _raddb/clients_ file. FreeRADIUS comes configured this way, so it should be there.
458
-
9. Ensure you have a valid user in your _raddb/users_ file. If everything else fails, go to the top of the file and add the following entry:
457
+
6. Ensure that you have localhost in your _raddb/clients_ file. FreeRADIUS comes configured this way, so it should be there.
458
+
7. Ensure you have a valid user in your _raddb/users_ file. If everything else fails, go to the top of the file and add the following entry:
459
459
bob Cleartext-Password := "bob"
460
460
Reply-Message = "Hello, bob"
461
-
12. Run the radtest program from the LOCAL machine, in another window. This will tell you if the server is alive and is answering requests.
461
+
8. Run the radtest program from the LOCAL machine, in another window. This will tell you if the server is alive and is answering requests.
462
462
radtest bob bob localhost 0 testing123
463
-
14. Ensure that you see the Reply-Message above and that you do NOT see an "Access denied" message. If you get an Access-Accept message, this means that the server is running properly.
464
-
15. Configure another machine as a RADIUS client and run radtest from that machine too. You SHOULD see the server receive the request and send a reply.
463
+
9. Ensure that you see the Reply-Message above and that you do NOT see an "Access denied" message. If you get an Access-Accept message, this means that the server is running properly.
464
+
10. Configure another machine as a RADIUS client and run radtest from that machine too. You SHOULD see the server receive the request and send a reply.
465
465
* If the server does NOT receive the request then the ports are confused. RADIUS historically uses 1645/UDP, where RFC 2138 and many new systems use the proper value of 1812/UDP. See _/etc/services_ or use the -p option to specify a different port.
466
466
* Run tcpdump in another window on the RADIUS client machine. Use the command:
467
467
* `tcpdump udp`
468
468
* Look CAREFULLY at the packets coming from the RADIUS server. Which address are they coming from? Which port?
469
-
16. If authentication works from a different machine then you have the server set up correctly.
470
-
17. Now you should use a more complicated configuration to see if the server receives and replies with the attributes you want. There is little information that can be offered here in the FAQ as your individual systems configuration can not be predicted. However, a few hints can help:
469
+
11. If authentication works from a different machine then you have the server set up correctly.
470
+
12. Now you should use a more complicated configuration to see if the server receives and replies with the attributes you want. There is little information that can be offered here in the FAQ as your individual systems configuration can not be predicted. However, a few hints can help:
471
471
* ALWAYS test your configurations running the server in debugging mode if you want to debug a problem. If you do not do so then DO NOT expect anyone else to be able to help you.
472
472
* `radiusd -X`
473
473
* Read RFC 2138 to see what the RADIUS attributes are and how they work
@@ -769,13 +769,13 @@ Which gives : (tcpdump output)
769
769
770
770
The whole netmask business is a complicated one. An IP interface has an IP address and usually a netmask associated with it. Netmasks on point-to-point interfaces like a PPP link are generally not used.
771
771
772
-
If you set the Framed-IP-Netmask attribute in a radius profile, you are setting the netmask of the interface on the side of the [[NAS]]. The Framed-IP-Netmask attribute is NOT something you can set to influence the netmask on the side of the dialin user. And usually, that makes no sense anyway even if you could set it.
772
+
If you set the Framed-IP-Netmask attribute in a radius profile, you are setting the netmask of the interface on the side of the NAS. The Framed-IP-Netmask attribute is NOT something you can set to influence the netmask on the side of the dialin user. And usually, that makes no sense anyway even if you could set it.
773
773
774
774
The result of this on most NAS is that they start to route a subnet (the subnet that contains the assigned IP address and that is as big as the netmask indicates) to that PPP interface and thus to the user. If that is exactly what you want, then that's fine, but if you do not intend to route a whole subnet to the user, then by all means do NOT use the Framed-IP-Netmask attribute.
775
775
776
-
Many [[NAS]] interpret a left-out [[Framed-IP-Netmask]] as if it were set to 255.255.255.255, but to be certain you should set the Framed-IP-Netmask to 255.255.255.255.
776
+
Many NAS interpret a left-out Framed-IP-Netmask as if it were set to 255.255.255.255, but to be certain you should set the Framed-IP-Netmask to 255.255.255.255.
777
777
778
-
For example, the following entries do almost the same on most [[NAS]]:
778
+
For example, the following entries do almost the same on most NAS:
779
779
780
780
user Cleartext-Password := "blegh"
781
781
Service-Type = Framed-User,
@@ -789,7 +789,7 @@ For example, the following entries do almost the same on most [[NAS]]:
789
789
Framed-IP-Address = 192.168.5.78,
790
790
Framed-Route = "192.168.5.64/28 0.0.0.0 1"
791
791
792
-
The result is that the end user gets IP address 192.168.5.78 and that the whole network with IP addresses 192.168.5.64 - 195.64.5.79 is routed over the PPP link to the user (see the [[RADIUS]] [[RFC]]s for the exact syntax of the Framed-Route attribute).
792
+
The result is that the end user gets IP address 192.168.5.78 and that the whole network with IP addresses 192.168.5.64 - 195.64.5.79 is routed over the PPP link to the user (see the RADIUS RFCs for the exact syntax of the Framed-Route attribute).
Copy file name to clipboardExpand all lines: doc/antora/modules/howto/pages/git.adoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
3
3
As well as being an excellent SCM (Source control management) tool, git is also very useful for tracking changes to configuration files, and even for performing remote administration of servers.
4
4
5
-
===The basics
5
+
== The basics
6
6
7
7
For basic configuration management one only has to:
8
8
@@ -30,7 +30,7 @@ And if it's all gone horribly wrong:
30
30
31
31
There are many many tutorials available if you want to learn more generic git administration, this one is extra pretty: http://gitimmersion.com.
32
32
33
-
==== Remote administration
33
+
=== Remote administration
34
34
35
35
The basic functionality of git is useful on its own, but one of the features that really makes git shine among the SCMs is its support for commit hooks. Hooks don't require anything special to function (like gitosis or the git-daemon), they work just as well over straight SSH.
0 commit comments