blob: 288a0847baf947014bf267bb1d27f1264fe4d802 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
|
realm blocking-udp {
type = "UDP"
timeout = 2
retries = 2
server {
hostname = "127.0.0.1"
service = "1820"
secret = "sikrit"
}
}
realm testcli-udp {
type = "UDP"
timeout = 2
retries = 2
server {
hostname = "srv1"
service = "4711"
secret = "sikrit"
}
}
realm blocking-tls {
type = "TLS"
timeout = 1
retries = 3
cacertfile = "/home/linus/p/radsecproxy/demoCA/newcerts/01.pem"
certfile = "/home/linus/p/radsecproxy/demoCA/newcerts/03.pem"
certkeyfile = "/home/linus/p/radsecproxy/demoCA/private/cli1.key"
#pskstr = "sikrit psk"
#pskhexstr = "deadbeef4711"
#pskid = "Client_identity"
#pskex = "PSK"
server {
hostname = "srv1"
# test setup: radsecproxy fronting freeradius on 2083
service = "2083"
# test setup: examples/server on 4711
#service = "4711"
secret = "sikrit"
}
}
realm testcli {
type = "TLS"
cacertfile = "/home/linus/p/radsecproxy/demoCA/newcerts/01.pem"
certfile = "/home/linus/p/radsecproxy/demoCA/newcerts/03.pem"
certkeyfile = "/home/linus/p/radsecproxy/demoCA/private/cli1.key"
server {
hostname = "srv1"
service = "4711"
secret = "sikrit"
}
}
realm dispatching-tls {
type = "TLS"
cacertfile = "/home/linus/p/radsecproxy/demoCA/newcerts/01.pem"
certfile = "/home/linus/p/radsecproxy/demoCA/newcerts/03.pem"
certkeyfile = "/home/linus/p/radsecproxy/demoCA/private/cli1.key"
server {
hostname = "srv1"
service = "2083"
secret = "sikrit"
}
}
|