Installing FreeRADIUS and MySQL DB on Ubuntu

Server Update

Start by updating the software repositories and upgrading the software

sudo apt update
sudo apt upgrade

Install Apache2 (Web Server)

Next we install the Apache2 web server

sudo apt -y install apache2

Install PHP

Now the PHP and associated libraries

sudo apt -y install php libapache2-mod-php php-{gd,common,mail,mail-mime,mysql,pear,db,mbstring,xml,curl}

Install MySQL Database

For the database we are using MySQL however if you prefer you can use MariaDB

sudo apt -y install mysql-server

Configure MySQL

Once installed we will configure the database with the following command

sudo mysql_secure_installation

This part is to select the password validation option, which will specify the complexity of the passwords; however, for us we will select NO. This will also mean our root password will be blank. I would recommend setting this afterwards.

Securing the MySQL server deployment.

Connecting to MySQL using a blank password.

VALIDATE PASSWORD COMPONENT can be used to test passwords
and improve security. It checks the strength of password
and allows the users to set only those passwords which are
secure enough. Would you like to setup VALIDATE PASSWORD component?

Press y|Y for Yes, any other key for No: n

Now to remove anonymous users: Y

Skipping password set for root as authentication with auth_socket is used by default.
If you would like to use password authentication instead, this can be done with the "ALTER_USER" command.
See https://dev.mysql.com/doc/refman/8.0/en/alter-user.html#alter-user-password-management for more information.

By default, a MySQL installation has an anonymous user,
allowing anyone to log into MySQL without having to have
a user account created for them. This is intended only for
testing, and to make the installation go a bit smoother.
You should remove them before moving into a production
environment.

Remove anonymous users? (Press y|Y for Yes, any other key for No) : y
Success.

Prevent ability to log into MySQL using the root password: N

Normally, root should only be allowed to connect from
'localhost'. This ensures that someone cannot guess at
the root password from the network.

Disallow root login remotely? (Press y|Y for Yes, any other key for No) : y
Success.

Remove the Test Database and associated privileges: Y

By default, MySQL comes with a database named 'test' that
anyone can access. This is also intended only for testing,
and should be removed before moving into a production
environment.


Remove test database and access to it? (Press y|Y for Yes, any other key for No) : y
 - Dropping test database...
Success.

 - Removing privileges on test database...
Success.

Reloading the privilege tables to make changes take effect: Y

Reloading the privilege tables will ensure that all changes
made so far will take effect immediately.

Reload privilege tables now? (Press y|Y for Yes, any other key for No) : y
Success.

MySQL is now setup

All done!

Install FreeRADIUS

Now we install FreeRADIUS and required packages

sudo apt -y install freeradius freeradius-mysql freeradius-utils -y

To test the FreeRADIUS installation, first we stop the FreeRADIUS service:

sudo systemctl stop freeradius

Then we run this command to start the service in the foreground so it gives the verbose output. This is also useful when testing and debugging:

sudo freeradius -X
Listening on auth address * port 1812 bound to server default
Listening on acct address * port 1813 bound to server default
Listening on auth address :: port 1812 bound to server default
Listening on acct address :: port 1813 bound to server default
Listening on auth address 127.0.0.1 port 18120 bound to server inner-tunnel
Listening on proxy address * port 33201
Listening on proxy address :: port 59970
Ready to process requests

Configure MySQL Database for freeRADIUS

Now we set up the MySQL database for the FreeRADIUS service. As mentioned in the MySQL configuration, our root password will be blank by disabling the validate passwords. After this command and prompted to Enter Password:, just hit enter.

sudo mysql -u root -p

Once in the MySQL, use the following to create the Database and User details.

NB: The database will be named radius, if you want to use a different name change it under the “CREATE DATABASE” part and “GRANT ALL PRIVILEGES ON”

Also the user will be radius too so if you want to use a separate user then change both the “‘radius’@’localhost'” sections

CREATE DATABASE radius;
CREATE USER 'radius'@'localhost' IDENTIFIED by 'helloworld123';
GRANT ALL PRIVILEGES ON radius.* TO 'radius'@'localhost';
FLUSH PRIVILEGES;
quit;

Now to for the next bit we need to be root, to do this use the following command

sudo su -

This will import the tables needed for FreeRADIUS into our newly created Database

mysql -u root -p radius < /etc/freeradius/3.0/mods-config/sql/main/mysql/schema.sql

Then create a link between these two directories

sudo ln -s /etc/freeradius/3.0/mods-available/sql /etc/freeradius/3.0/mods-enabled/

Now we can edit the FreeRADIUS SQL file. To do this we use the nano text editor. User Ctrl + W to search within the file or use the arrow keys to scroll

sudo nano /etc/freeradius/3.0/mods-enabled/sql

Change driver = from rlm_sql_null to rlm_sql_${dialect} but using the # to comment out the first and remove from the second

        driver = "rlm_sql_null"
#       driver = "rlm_sql_${dialect}"

It should now look like this

#       driver = "rlm_sql_null"
        driver = "rlm_sql_${dialect}"

Now change dialect = from sqlite to MySQL

        dialect = "sqlite"
        dialect = "mysql"

Now find the ‘mysql {‘ and‘tls {‘ and comment out (add #) to all lines except the warnings = auto

        mysql {
                # If any of the files below are set, TLS encryption is enabled
                tls {
                        ca_file = "/etc/ssl/certs/my_ca.crt"
                        ca_path = "/etc/ssl/certs/"
                        certificate_file = "/etc/ssl/certs/private/client.crt"
                        private_key_file = "/etc/ssl/certs/private/client.key"
                        cipher = "DHE-RSA-AES256-SHA:AES128-SHA"

                        tls_required = yes
                        tls_check_cert = no
                        tls_check_cert_cn = no
                }

                # If yes, (or auto and libmysqlclient reports warnings are
                # available), will retrieve and log additional warnings from
                # the server if an error has occured. Defaults to 'auto'
                warnings = auto
        }

It should now look like this

        mysql {
                # If any of the files below are set, TLS encryption is enabled
                #tls {
                #       ca_file = "/etc/ssl/certs/my_ca.crt"
                #       ca_path = "/etc/ssl/certs/"
                #       certificate_file = "/etc/ssl/certs/private/client.crt"
                #       private_key_file = "/etc/ssl/certs/private/client.key"
                #       cipher = "DHE-RSA-AES256-SHA:AES128-SHA"

                #       tls_required = yes
                #       tls_check_cert = no
                #       tls_check_cert_cn = no
                #}

                # If yes, (or auto and libmysqlclient reports warnings are
                # available), will retrieve and log additional warnings from
                # the server if an error has occured. Defaults to 'auto'
                warnings = auto
        }

Now to add the database details. Locate this section

        # Connection info:
        #
#       server = "localhost"
#       port = 3306
#       login = "radius"
#       password = "radpass"

Remove the # from the 4 lines and change the login and password to those set when creating the database. In our example I used the username radius so only the password needed to change.

        # Connection info:
        #
        server = "localhost"
        port = 3306
        login = "radius"
        password = "helloworld123"

Now this will be the name of the database we created, however as we used the default name we don’t need to change it

        radius_db = "radius"

Now find read_clients = yes and uncomment it (remove #)

#       read_clients = yes
        read_clients = yes

By default the table used to manage the Radius clients (the device making the radius request e.g. our MikroTik) is named nas, if you want to change this then it needs to be updated here

        client_table = "nas"

Now fix some relevant permissions

sudo chgrp -h freerad /etc/freeradius/3.0/mods-available/sql
sudo chown -R freerad:freerad /etc/freeradius/3.0/mods-enabled/sql

Finally restart the FreeRADIUS service

sudo systemctl restart freeradius.service

Install PHPMyAdmin

Now to manage our database easierly, we use PHPMyAdmin. To install this run this command

sudo apt install -y phpmyadmin

Now when prompted, when apache2 is selected (red square in brackets) hit the spacebar to put a *. Then hit TAB and enter on <Ok>

Then when prompted provide a password for the default phpmyadmin database.

Now once installed go to: https://<IP of Server>/phpmyadmin

Log in with the same details added when created the database (radius / helloworld123)

Now we can add our Radius Client, which is the device that makes radius request, for example the MikroTik device running the service we need radius for (HotSpot, PPPoE Server, CAPsMAN).

For this we will be testing from a PC so we put that in. To do so we click Insert and add the following:

nasname: The IP or domain/hostname of the device making the request
shortname: A standard descriptive name
secret: The secret/password used to validate the radius client

The IP of the machine I’ll test from is 10.2.0.6

Now we add the client details, which is the device attempting to connect to the service we need the radius for, such as WiFi client or PPPoE client router.

On the radcheck table, click Insert. Add the following cells:

username: Username of the client
attribute: Cleartext-Password
op: :=
value: The password of the client

Now download the NTRadPing Utility and use the details created before:

RADIUS Server: IP of the Radius Server
Port: 1812
RADIUS Secret key: The NAS secret set
User-Name: The username in the radcheck table
Password: The password in the radcheck table

Then if we get the response: Access-Accept then we have made a successful test

Leave a Comment

Your email address will not be published. Required fields are marked *