Skip to content

eduroam Institutional Radius Server (IRS) Configuration using CentOS-07

Notifications You must be signed in to change notification settings

mahedicse/eduroamIRS

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

45 Commits
 
 

Repository files navigation

eduroam Institutional Radius Server (IRS) Configuration Using CentOS-7

Server Basic Configuration for IRS:

Update System:

# yum update -y

Hostname Configuration:

# vim /etc/hostname

irs-lab-XY.group-XY.ac.bd
# hostname irs-lab-XY.group-XY.ac.bd

Note: Please replace XY with your group ID like: irs-lab-01.group-01.ac.bd

Check Hostnane configuration:

# hostname

irs-lab-XY.group-XY.ac.bd
# hostname -d
group-XY.ac.bd

Disable Selinux:

# vim /etc/selinux/config

SELINUX=disabled

Now Reboot your server

# reboot

Secure SSH:

After installing a Server and connect with the public internet. It's essential to protect and secure remote access that prevents your Server from the attacker's easy access. It's better to change the default ssh port and disable direct root login from ssh.

Change SSH default port and disable root login:

Note: Before disabling root login and changed port you must create a user for remote login and allow changed port in the firewall.

Create a User first:

# adduser irs-lab

Set password for the user:

# passwd irs-lab

Changing password for user irs-lab.

New password:  
Retype new password: 

passwd: all authentication tokens updated successfully.

Change SSH port and disable root login:

# vim /etc/ssh/sshd_config

Uncomment line "port 22" and change the port number. Port new port number must be more than 1023 otherwise it will be a conflict with other services. Here I use port number 2200.

Port 2200

To disable root login uncomment line "PermitRootLogin yes" and change yes to no

PermitRootLogin no

And finally allow changed port on firewall:

firewall-cmd --zone=public --permanent --add-port=2200/tcp

firewall-cmd --reload

To see firewall set or not:

firewall-cmd --zone=public --permanent --list-all

Restart SSH Service:

# systemctl restart sshd

Now disconnect from the server and connect again with changed parameters:

From the terminal:

# ssh  [email protected] -p2200

Here check from irs-lab-12 VM:

# ssh  [email protected] -p2200

The authenticity of host '[irs-lab-12.bdren.net.bd]:2200 ([103.28.121.93]:2200)' can't be established.
RSA key fingerprint is e7:32:9c:9a:4a:6f:34:41:4e:45:2c:9a:b8:2b:28:a6.
Are you sure you want to continue connecting (yes/no)? yes

Warning: Permanently added '[irs-lab-12.bdren.net.bd]:2200,[103.28.121.93]:2200' (RSA) to the list of known hosts.

[email protected]'s password: 

[irs-lab@idp-irs-12 ~]$

To became root user:

[irs-lab@idp-irs-12 ~]$ su -

Password: <insert root password>

Last login: Wed Oct  2 13:24:02 +06 2019 from XXX.XXX.XXX.XXX on pts/0

[root@idp-irs ~]#

Firewall Configuration:

firewall-cmd --zone=public --permanent --add-service=http

firewall-cmd --zone=public --permanent --add-service=https

firewall-cmd --zone=public --permanent --add-service=radius

firewall-cmd --zone=public --permanent --add-port=1812/tcp

firewall-cmd --zone=public --permanent --add-port=1812/udp

firewall-cmd --zone=public --permanent --add-port=1813/tcp

firewall-cmd --zone=public --permanent --add-port=1813/udp

firewall-cmd --reload

firewall-cmd --zone=public --permanent --list-all
Output:
[root@idp-irs ~]# firewall-cmd --zone=public --permanent --add-service=http
success

[root@idp-irs ~]# firewall-cmd --zone=public --permanent --add-service=https
success

[root@idp-irs ~]# firewall-cmd --zone=public --permanent --add-service=radius
success

[root@idp-irs ~]# firewall-cmd --zone=public --permanent --add-port=1812/tcp
success

[root@idp-irs ~]# firewall-cmd --zone=public --permanent --add-port=1812/udp
success

[root@idp-irs ~]# firewall-cmd --zone=public --permanent --add-port=1813/tcp
success

[root@idp-irs ~]# firewall-cmd --zone=public --permanent --add-port=1813/udp
success

[root@idp-irs ~]# firewall-cmd --reload
success

[root@idp-irs ~]# firewall-cmd --zone=public --permanent --list-all

public
  target: default
  icmp-block-inversion: no
  interfaces:
  sources:
  services: ssh dhcpv6-client http https radius
  ports: 1812/tcp 1812/udp 1813/tcp 1813/udp
  protocols:
  masquerade: no
  forward-ports:
  source-ports:
  icmp-blocks:
  rich rules:

Add EPEL repo

# yum install epel-release -y

Install and Configure Database:

Istall MariaDB Server:

# yum install mariadb-server mariadb -y

Enable MariaDB Service on boot

# systemctl enable mariadb

Output:

Created symlink from /etc/systemd/system/multi-user.target.wants/mariadb.service to /usr/lib/systemd/system/mariadb.service.

Start MariaDB Service

# systemctl start mariadb

Check Status of MariaDB Service

# systemctl status mariadb

Output:

● mariadb.service - MariaDB database server
   Loaded: loaded (/usr/lib/systemd/system/mariadb.service; enabled; vendor preset: disabled)
   Active: active (running) since Wed 2019-09-18 16:48:39 +06; 46min ago
  Process: 28727 ExecStartPost=/usr/libexec/mariadb-wait-ready $MAINPID (code=exited, status=0/SUCCESS)
  Process: 28645 ExecStartPre=/usr/libexec/mariadb-prepare-db-dir %n (code=exited, status=0/SUCCESS)
 Main PID: 28726 (mysqld_safe)
    Tasks: 20
   CGroup: /system.slice/mariadb.service
           ├─28726 /bin/sh /usr/bin/mysqld_safe --basedir=/usr
           └─28889 /usr/libexec/mysqld --basedir=/usr --datadir=/var/lib/mysql --plugin-dir=/usr/lib64/mysql/plugin

Connect with MariaDB server

# mysql -p

Enter password:
Welcome to the MariaDB monitor.  Commands end with ; or \g.
Your MariaDB connection id is 2
Server version: 5.5.60-MariaDB MariaDB Server

Copyright (c) 2000, 2018, Oracle, MariaDB Corporation Ab and others.

Type 'help;' or '\h' for help. Type '\c' to clear the current input statement.

MariaDB [(none)]>

Create Database and User

MariaDB [(none)]> CREATE DATABASE radius;
Query OK, 1 row affected (0.00 sec)

MariaDB [(none)]> GRANT ALL ON radius.* TO radius@localhost IDENTIFIED BY "radiuspass";
Query OK, 0 rows affected (0.00 sec)

MariaDB [(none)]> FLUSH PRIVILEGES;
Query OK, 0 rows affected (0.00 sec)

MariaDB [(none)]> quit
Bye

Installation and Configure Radius Server:

Install Radius Server:

# yum install freeradius freeradius-utils freeradius-mysql -y

Start and enable freeradius to start at boot up:

# systemctl enable radiusd.service

Output:

Created symlink from /etc/systemd/system/multi-user.target.wants/radiusd.service to /usr/lib/systemd/system/radiusd.service.
# systemctl start radiusd.service

Now check the radius service status:

# systemctl status radiusd.service

Output:

● radiusd.service - FreeRADIUS high performance RADIUS server.
   Loaded: loaded (/usr/lib/systemd/system/radiusd.service; enabled; vendor preset: disabled)
   Active: active (running) since Sun 2017-08-20 02:42:40 EDT; 22s ago
 Main PID: 8283 (radiusd)
   CGroup: /system.slice/radiusd.service
           └─8283 /usr/sbin/radiusd -d /etc/raddb

Configure FreeRADIUS:

To Configure FreeRADIUS to use MariaDB, follow the below steps.

Import the Radius database scheme to populate radius database

# mysql -u radius -p -D radius < /etc/raddb/mods-config/sql/main/mysql/schema.sql

Enter password: <insert password for radius user>

Backup orifinal file:

# mv /etc/raddb/mods-available/sql /etc/raddb/mods-available/sql.ori

Configure SQL module /raddb/mods-available/sql and change the database connection parameters to suite your environment:

# vim /etc/raddb/mods-available/sql

sql section should look similar to below.

sql {
        dialect = "mysql"
        driver = "rlm_sql_mysql"
        
        sqlite {
                filename = "/tmp/freeradius.db"
                busy_timeout = 200
                bootstrap = "${modconfdir}/${..:name}/main/sqlite/schema.sql"
        }
        
        mysql {
                warnings = auto
        }
        
        postgresql {
                send_application_name = yes
        }
        
     # Connection info:
     
        server = "localhost"
        port = 3306
        login = "radius"
        password = "radiuspass"
        radius_db = "radius"
        
        acct_table1 = "radacct"
        acct_table2 = "radacct"
        
        postauth_table = "radpostauth"
        authcheck_table = "radcheck"
        
        groupcheck_table = "radgroupcheck"
        authreply_table = "radreply"
        
        groupreply_table = "radgroupreply"
        usergroup_table = "radusergroup"
        delete_stale_sessions = yes
        
        pool {
                start = ${thread[pool].start_servers}
                min = ${thread[pool].min_spare_servers}
                max = ${thread[pool].max_servers}
                spare = ${thread[pool].max_spare_servers}
                uses = 0
                retry_delay = 30
                lifetime = 0
                idle_timeout = 60
        }
        
        read_clients = yes
        client_table = "nas"
        
        group_attribute = "SQL-Group"
        
        $INCLUDE ${modconfdir}/${.:name}/main/${dialect}/queries.conf
}

– Now you have to create a soft link for SQL under /etc/raddb/mods-enabled

# ln -s /etc/raddb/mods-available/sql /etc/raddb/mods-enabled/

Restart Radius Service:

# systemctl restart radiusd

Configure Default virtual server for MySQL login support:

At first backup the original file:

# mv /etc/raddb/sites-available/default /etc/raddb/sites-available/default.ori

Edit /etc/raddb/sites-available/default file and replace the content with below configuration:

# vim /etc/raddb/sites-available/default 
server default {

listen {
        type = auth
        ipaddr = *
        port = 0
        limit {
              max_connections = 16
              lifetime = 0
              idle_timeout = 30
        }
}

listen {
        ipaddr = *
        port = 0
        type = acct
        limit {
        }
}

listen {
        ipv6addr = ::
        type = auth
        port = 0
        limit {
              max_connections = 16
              lifetime = 0
              idle_timeout = 30
        }
}

listen {
        ipv6addr = ::
        port = 0
        type = acct
        limit {
        }
}

authorize {
        filter_username
        preprocess
        chap
        mschap
        digest
        suffix
        eap {
                ok = return
        }
        files
        sql
        -ldap
        expiration
        logintime
        pap
}

authenticate {
        Auth-Type PAP {
                pap
        }
        Auth-Type CHAP {
                chap
        }
        Auth-Type MS-CHAP {
                mschap
        }
        mschap
        digest
        eap
}

preacct {
        preprocess
        acct_unique
        suffix
        files
}

accounting {
        detail
        unix
        sql
        exec
        attr_filter.accounting_response
}

session {
        sql
}

post-auth {
        if (session-state:User-Name && reply:User-Name && request:User-Name && (reply:User-Name == request:User-Name)) {
                update reply {
                        &User-Name !* ANY
                }
        }
        
        update {
                &reply: += &session-state:
        }
        sql
        exec
        remove_reply_message_if_eap
        
        Post-Auth-Type REJECT {
                sql
                attr_filter.access_reject
                eap
                remove_reply_message_if_eap
        }
        
        Post-Auth-Type Challenge {
        }
}

pre-proxy {
}

post-proxy {
        eap
}

}

Backup the original file:

# mv /etc/raddb/sites-available/inner-tunnel /etc/raddb/sites-available/inner-tunnel.ori

Edit /etc/raddb/sites-available/inner-tunnel file and replace the content with below configuration:

# vim /etc/raddb/sites-available/inner-tunnel  
server inner-tunnel {

listen {
       ipaddr = 127.0.0.1
       port = 18120
       type = auth
}

authorize {
        filter_username
        chap
        mschap
        suffix
        
        update control {
                &Proxy-To-Realm := LOCAL
        }
        
        eap {
                ok = return
        }
        
        files
        sql
        -ldap
        expiration
        logintime
        pap
}

authenticate {
        Auth-Type PAP {
                pap
        }
        Auth-Type CHAP {
                chap
        }
        Auth-Type MS-CHAP {
                mschap
        }
        mschap
        eap
}

session {
        radutmp
        sql
}

post-auth {
        sql
        if (0) {
                update reply {
                        User-Name !* ANY
                        Message-Authenticator !* ANY
                        EAP-Message !* ANY
                        Proxy-State !* ANY
                        MS-MPPE-Encryption-Types !* ANY
                        MS-MPPE-Encryption-Policy !* ANY
                        MS-MPPE-Send-Key !* ANY
                        MS-MPPE-Recv-Key !* ANY
                }
                
                update {
                        &outer.session-state: += &reply:
                }
        }
        
        Post-Auth-Type REJECT {
                sql
                attr_filter.access_reject
                update outer.session-state {
                        &Module-Failure-Message := &request:Module-Failure-Message
                }
        }
}

pre-proxy {
}

post-proxy {
        eap
}
}

Restart Radius Service:

# systemctl restart radiusd

Install Apache Web Server:

# yum install httpd httpd-devel -y

Enable Apache service on boot

# systemctl enable httpd

Output:

Created symlink from /etc/systemd/system/multi-user.target.wants/httpd.service to /usr/lib/systemd/system/httpd.service.

Start Apache Service

# systemctl start httpd

Check Status of Apache Service

# systemctl status httpd

Output:

● httpd.service - The Apache HTTP Server
   Loaded: loaded (/usr/lib/systemd/system/httpd.service; enabled; vendor preset: disabled)
   Active: active (running) since Thu 2019-09-26 14:40:43 +06; 9min ago
     Docs: man:httpd(8)
           man:apachectl(8)
 Main PID: 5671 (httpd)
   Status: "Total requests: 10; Current requests/sec: 0; Current traffic:   0 B/sec"
   CGroup: /system.slice/httpd.service
           ├─5671 /usr/sbin/httpd -DFOREGROUND

Check from browser:

Open Link: http://irs-lab-XY.bdren.net.bd

It's show test page...

Installing and Configuring Daloradius Webtool for Freeradius:

Install required php:

# yum install php-pear php-pear-DB php-devel php-mysql php-common php-gd php-mbstring php-mcrypt php php-xml -y

Installing Daloradius

Github method:

# cd /var/www/html/
# wget https://github.com/lirantal/daloradius/archive/master.zip
# unzip master.zip
# mv daloradius-master/ daloradius

Change directory for configuration:

# cd daloradius

Configuring daloradius: Now import Daloradius mysql tables

# mysql -u radius -p radius < /var/www/html/daloradius/contrib/db/fr2-mysql-daloradius-and-freeradius.sql 
# mysql -u radius -p radius < /var/www/html/daloradius/contrib/db/mysql-daloradius.sql

Configure daloRADIUS database connection details: Then change permissions for http folder and set the right permissions for daloradius configuration file.

# chown -R apache:apache /var/www/html/daloradius/
# chmod 664 /var/www/html/daloradius/library/daloradius.conf.php

You should now modify daloradius.conf.php file to adjust the MySQL database information . Therefore, open the daloradius.conf.php and add the database username, password and db name.

# vim /var/www/html/daloradius/library/daloradius.conf.php

Especially relevant variables to configure are:

$configValues['CONFIG_DB_HOST'] = 'localhost';
$configValues['CONFIG_DB_PORT'] = '3306';
$configValues['CONFIG_DB_USER'] = 'radius';
$configValues['CONFIG_DB_PASS'] = 'radiuspass';

To be sure everything works, restart radiusd,httpd and mysql:

# systemctl restart radiusd.service 
# systemctl restart mariadb.service 
# systemctl restart httpd

Up to this point, we’ve covered complete installation and configuration of daloradius and freeradius, to access daloradius, open the link using your IP address:

http://irs-lab-XY.bdren.net.bd/daloradius/login.php

Default login details are:

Username: administrator
Password: radius

login

Home Page

Create an User: create-user

Note: Please replace XY with your group ID line [email protected]

List User: List-user

Now Test login from command line:

[root@idp-irs raddb]# radtest [email protected] test123 localhost 0 testing123

Output:

Sent Access-Request Id 227 from 0.0.0.0:51113 to 127.0.0.1:1812 length 87
        User-Name = "[email protected]"
        User-Password = "test123"
        NAS-IP-Address = 127.0.0.1
        NAS-Port = 0
        Message-Authenticator = 0x00
        Cleartext-Password = "Mhd123"
Received Access-Accept Id 227 from 127.0.0.1:1812 to 127.0.0.1:51113 length 20

Note: Please replace XY with your group ID like [email protected]

Confiure WLC to connect and test authentication

Open /etc/raddb/clients.conf file and insert the below configuration at the end of the file:

# vim /etc/raddb/clients.conf
client irs-nro.bdren.net.bd {
        ipaddr = 103.28.121.51
        secret = IRS-LAB-20
        require_message_authenticator = yes
        shortname = irs-nro.bdren.net.bd
        nastype = other
        virtual_server = eduroam
}


client WLC-CONTROLLER-1 {
    ipaddr         = 163.47.36.2
    netmask        = 32
    secret         = Radius-IRS-XY
    require_message_authenticator = yes
    shortname      = WLC-CONTROLLER-1
    virtual_server = eduroam
}

Confiure Radius for eduroam

Now create a virtual server for eduroam

# vim /etc/raddb/sites-enabled/eduroam
server eduroam {
        authorize {
                filter_username
                rewrite_called_station_id
                rewrite_calling_station_id
                if ("%{client:shortname}" != "nro-1.bdren.net.bd") {
                        update request {
                                &Operator-Name := "1group-XY.ac.bd"
                                &Eduroam-SP-Country := "BD"
                        }
                }
                cui
                auth_log
                suffix
                eap {
                        ok = return
                }
        }
        authenticate {
                eap
        }
        preacct {
                rewrite_called_station_id
                rewrite_calling_station_id
                suffix
        }
        accounting {
        }
        post-auth {
                update {
                        &reply: += &session-state:
                }
                reply_log
                f_ticks
                remove_reply_message_if_eap
                Post-Auth-Type REJECT {
                        reply_log
                        f_ticks
                        attr_filter.access_reject
                        eap
                        remove_reply_message_if_eap
                }
        }
        pre-proxy {
                cui
                pre_proxy_log
                if("%{Packet-Type}" != "Accounting-Request") {
                        attr_filter.pre-proxy
                }
        }
        post-proxy {
                post_proxy_log
                attr_filter.post-proxy
                eap
        }
}

Create f_ticks for eduroam loggins

# vim  /etc/raddb/mods-enabled/f_ticks
linelog f_ticks {
        filename = syslog
        #syslog_facility = local0
        #syslog_severity = info
        format = ""
        reference = "f_ticks.%{%{reply:Packet-Type}:-format}"
        f_ticks {
                Access-Accept = "F-TICKS/eduroam/1.0#REALM=%{Realm}#VISCOUNTRY=%{Eduroam-SP-Country}#VISINST=%{Operator-Name}#CSI=%{Calling-Station-Id}#RESULT=OK#"
                Access-Reject = "F-TICKS/eduroam/1.0#REALM=%{Realm}#VISCOUNTRY=%{Eduroam-SP-Country}#VISINST=%{Operator-Name}#CSI=%{Calling-Station-Id}#RESULT=FAIL#"
        }
}

Configure Proxy

Open /etc/raddb/proxy.conf file and insert the below configuration at the end of the file:

# vim /etc/raddb/proxy.conf
home_server irs-nro {
        type = auth+acct
        ipaddr = 103.28.121.51
        secret = IRS-LAB-XY
        port = 1812
        require_message_authenticator = yes
        status_check = status-server
}

home_server_pool EDUROAM {
        type = fail-over
        home_server = irs-nro
}

realm LOCAL {
}

realm NULL {
}

realm group-XY.ac.bd {
}

realm "~(.*\.)*group-XT\.ac\.bdt$" {

}

realm "~(.*\.)*3gppnetwork\.org$" {
    nostrip
}

realm "~.+$" {
        pool = EDUROAM
        nostrip
}

Restart Radius Service

# systemctl restart radiusd

Now Test EAP Authentication

Create a file /etc/raddb/eap-test.conf

# vim /etc/raddb/eap-test.conf
#   eapol_test -c eap-test.conf -s testing123
#
network={
        key_mgmt=WPA-EAP
        eap=TTLS
        identity="[email protected]"
        #anonymous_identity="[email protected]"

        # Uncomment to validate the server's certificate by checking
        # it was signed by this CA.
        #ca_cert="raddb/certs/ca.pem"
        password="test123"
        phase2="auth=MSCHAPV2 mschapv2_retry=0"
        phase1="peapver=0"
}

Now test with eap:

# eapol_test -c /etc/raddb/eap-test.conf -s testing123

Note: Please replace XY with your group ID like irs-lab-01.group-01.ac.bd

Ouput for successful login:

EAP: deinitialize previously used EAP method (21, TTLS) at EAP deinit
ENGINE: engine deinit
MPPE keys OK: 1  mismatch: 0
SUCCESS

Ouput for unsuccessful login:

EAP: deinitialize previously used EAP method (21, TTLS) at EAP deinit
ENGINE: engine deinit
MPPE keys OK: 0  mismatch: 1
FAILURE

Logging: To Enable logging edit /etc/raddb/radiusd.conf file and changed like:

   #  Log authentication requests to the log file.
   #
   #  allowed values: {no, yes}
   #
   auth = yes

Now check the log file:

# tail  /var/log/radius/radius.log

Output:

Thu Sep 26 18:34:30 2019 : Info: rlm_sql (sql): Opening additional connection (6), 1 of 26 pending slots used
Thu Sep 26 18:34:30 2019 : Auth: (9)   Login OK: [[email protected]] (from client WLC-CONTROLLER-1 port 0 via TLS tunnel)
Thu Sep 26 18:34:30 2019 : Auth: (10) Login OK: [[email protected]] (from client WLC-CONTROLLER-1 port 1 cli A4-50-46-30-E2-D7)

About

eduroam Institutional Radius Server (IRS) Configuration using CentOS-07

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published