perl goodies/hexdump2wireshark.pl < /var/log/radius/logfile > radius-logfile-hexdump.txt
text2pcap -i 17 -u 1812,1812 radius-logfile-hexdump.txt radius-logfile-hexdump.pcap
Handler ConvertedFromGTC=1
.
AuthColumnDef n, attributename, type[, formatted]
For example:
AuthColumnDef 1, Filter-Id, reply, formatted
AuthAttrDef ldapattributename, radiusattributename, type[, formatted]
For example:
AuthAttrDef filter, Filter-Id, reply, formatted
EAPType TTLS, MSCHAP-V2, 16776957:4244372217
where 16776957 is the expanded vendor number and 4244372217 is the expanded
type (this example is for 0xfffefd and 0xfcfbfaf9, the vendor and type of the
wpa_supplicant VENDOR-TEST expanded type).
Included module and config to support testing against wpa_supplicant VENDOR-TEST expanded type.
WiMAX-Packet-Flow-Descriptor=Alvarion-WiMAX-Classifier="ClassifierID=1,Priority=2,Direction=IN"
Also added Alvarion-R3-IF-Descriptor and Alvarion-DHCP-Option VSA tlvs to
dictionary, to support attributes like:
Alvarion-DHCP-Option="Ref-R3-IF-Name=interface1,DHCP-Option-Container=container1"
Alvarion-R3-IF-Descriptor=R3-IF-Name=aaa,R3-IF-ID=1,PDFID=2,IPv4-addr=1.2.3.4,IPv4-netmask=5.6.7.8,DGW-IPv4-add=9.8.7.6
Per Alvarion's document
'RADIUS-WiMAX R3 Interop Spec_Rel 3 0 v 0 81.doc'.
RFC4669 - RADIUS Authentication Server MIB for IPv6 RFC4671 - RADIUS Accounting Server MIB for IPv6The RFC are included in distribution.
sha1$a1976$065f52b49153328da76e13c2b462b860a70eb78b
and
md5$a1976$e67d1ca20e9c28321b86e34076cc48ab
as specified by http://docs.djangoproject.com/en/dev/topics/auth/#passwords.
Contributed by Jerome Fleury.
ppm install http://www.open.com.au/radiator/free-downloads/Win32-Lsa.ppd
ParameterName sql:identifer:query
which will look for a previously defined AuthBy SQL clause with an Identifier
of 'identifier' and run the SQL query given by 'query'. The first row
in the result will be used to set the parameter ParameterName. This lookup
is only ever done once at startup time.
%{SQL:identifier:query}
will look for a previously defined AuthBy SQL clause with an Identifier
of 'identifier' and run the SQL query given by 'query'. The first row
in the result will be used as the value of the special character. This type
of lookup is done whenever the special character is evaluated.
AuthorizeGroup group1 permit service=shell cmd\* {autocmd="telnet 169.163.226.81"}
(ie with double quotes surrounding the predicate)
would result in the autocmd being sent incorrectly with 2 equals signs.
radpwtst -noacct -motp_secret 7ac61d4736f51a2b -password 1234
The password argument is used as the MOTP PIN, and the motp_secret is used as
the MOTP secret key. AuthBy SQLMOTP originally submitted by Jerome Fleury.
Starting Radiator: /usr/bin/radiusd/sbin/start-stop-daemon: (null): Bad address.
Reported by Frank Messie.
TRACE_PREDICATE User-Name=~"^mik",NAS-Port="1234"
Support tests include ==, !=, <, <=, >, >= and =~ (regexp).
Also added support for new command TRACE_NOPACKET, which can be used to
disable tracing of log messages that are not relevant to a particular
incoming request.
TRACE_NOPACKET 0
ERR: Bad attribute=value pair:
. This typo was introduced
in version 3.7.
radpwtst -dictionary dictionary,dictionary.sip -sip
ppm install http://www.roth.net/perl/packages/win32-daemon.ppd
).
ERR: Error in RewriteFunction(mikem): Can't use string ("sub {print "hello world\n"}") as a subroutine ref while "strict refs" in use at (eval 23) line 1Reported by "Andy De Petter" (adepette at krameria.net). Thanks Andy.
Can't call method "log" on unblessed reference at Radius/AuthGeneric.pm line 644.
<Realm /realm.com/i>
In fact, you can use either the i or x modifiers
AcctColumnDef TIME_STAMP,Timestamp,formatted-date,to_date\
('%e %m %Y %H:%M:%S', 'DD MM YYYY HH24:MI:SS')