Installing RADIUS-Bridge on a Linux Endpoint

Introduction

RADIUS (Remote Authentication Dial-In User Service) is a protocol that provides centralized authentication, authorization, and accounting (AAA) for users who connect to a network. RADIUS is widely used in various network access technologies, including wireless networks, VPNs, and dial-up services. The protocol enables network administrators to manage access policies and ensure that only authorized users can access network resources. RADIUS operates by securely passing authentication data between the client, the RADIUS server, and the network access device, often using a shared secret for encryption.

Overview

This guide provides detailed instructions for installing and configuring RADIUS-Bridge on a Linux endpoint. Follow these steps carefully to ensure a successful setup.

Prerequisites

  • Linux Machine: Ubuntu/Debian recommended
  • Access: Root/sudo privileges required
  • Network Connectivity: Stable internet connection needed
  • Port 1812: Must be available for RADIUS authentication

Installation Process

1. Initial Setup

  • Access the AuthNull Dashboard
  • Navigate to the Endpoint Page
  • Go to RADIUS section
  • Select RADIUS under Add Radius Device

4. Installation Verification

Check the FreeRADIUS service status:

# Check service status
sudo systemctl status freeradius

Verify configuration in debug mode:

# Run in debug mode
sudo freeradius -XC

Configuration appears to be OK

5. Local User Testing

i. Add a test user by editing the users file:


# Edit users configuration file
sudo nano /etc/freeradius/3.0/users

Access-Accept

ii. Add the following configuration:


username ClearText-Password := "password"
    Reply-Message := "Hello, %{User-Name}"

iii. Test authentication:


# Test local authentication
radtest username password 127.0.0.1 0 testing123

RADIUS Module Configuration

1. Configure RADIUS Client

Edit the clients configuration file:

# Edit RADIUS client configuration
sudo nano /etc/freeradius/3.0/clients.conf

Add this configuration block:

client name {
    ipaddr = <IP-ADDRESS>
    secret = <SHARED-SECRET>
    require_message_authenticator = no
}

Verification and Monitoring

Verify Configuration and Permissions:

  1. Check Module Exists:
    ls -l /etc/freeradius/3.0/mods-enabled/authnull_2fa 
    
  2. Check binary exists and is executable:
    ls -l /usr/local/bin/authnull_2fa 
    
  3. Check FreeRADIUS configuration:
    sudo freeradius -XC
    
  4. Verify Fluent Bit is installed and running:
    sudo systemctl status fluent-bit
    
    sudo journalctl -u fluent-bit
    
  5. Check logs:
    tail -f /var/log/freeradius/radius.log
    
    tail -f /var/log/radius_2fa.log
    

    Security Best Practices

Shared Secret Management

  • Store securely
  • Rotate regularly
  • Use strong encryption

Access Control Measures

  • Limit server access
  • Monitor logs regularly
  • Keep software updated

Network Security

  • Configure firewall rules
  • Use secure protocols
  • Conduct regular security audits

Troubleshooting Guide

Service Issues

If the service won’t start, verify:

  • Port availability
  • Configuration syntax
  • System resources
  • Service logs

Authentication Problems

If authentication fails, check:

  • Shared secret configuration
  • NPS settings
  • Network connectivity
  • Log files for errors

Connection Problems

Troubleshooting steps:

  • Verify network connectivity
  • Check port accessibility
  • Test local authentication
  • Review firewall configuration

Table of contents