Skip to content
Snippets Groups Projects
Select Git revision
  • e8eb83ee33ffff481683fd157a99d51a9b1a9d6a
  • master default protected
  • main
  • update_github_actions
  • 144_rocky8_support
  • 195-update-pdk-to-300
  • 144-rocky8
  • add_test_github_test_workflow
  • pdk_2.4.0
  • fix_unclosed_let_block_in_defines_client_spec
  • validation_fixes
  • freeradius_3_0_21_config_updates
  • data_types
  • PrepareBuster
  • travis
  • 4.0.1
  • 4.0.0
  • 3.9.2
  • 3.9.1
  • 3.9.0
  • 3.8.2
  • 3.8.1
  • 3.8.0
  • 3.7.0
  • 3.6.0
  • 3.5.0
  • 3.4.3
  • 3.4.2
  • 3.4.1
  • 3.4.0
  • 3.3.0
  • 3.2.0
  • 3.1.0
  • 3.0.0
  • 2.3.1
35 results

control-socket

Blame
  • Code owners
    Assign users and groups as approvers for specific file changes. Learn more.
    control-socket 1.92 KiB
    # -*- text -*-
    ######################################################################
    #
    #	Control socket interface.
    #
    #	In the future, we will add username/password checking for
    #	connections to the control socket.  We will also add
    #	command authorization, where the commands entered by the
    #	administrator are run through a virtual server before
    #	they are executed.
    #
    #	For now, anyone who has permission to connect to the socket
    #	has nearly complete control over the server.  Be warned!
    #
    #	This functionality is NOT enabled by default.
    #
    #	See also the "radmin" program, which is used to communicate
    #	with the server over the control socket.
    #
    #	$Id$
    #
    ######################################################################
    listen {
    	#
    	#  Listen on the control socket.
    	#
    	type = control
    
    	#
    	#  Socket location.
    	#
    	#  This file is created with the server's uid and gid.
    	#  It's permissions are r/w for that user and group, and
    	#  no permissions for "other" users.  These permissions form
    	#  minimal security, and should not be relied on.
    	#
    	socket = ${run_dir}/${name}.sock
    
    	#
    	#  The following two parameters perform authentication and
    	#  authorization of connections to the control socket.
    	#
    	#  If not set, then ANYONE can connect to the control socket,	
    	#  and have complete control over the server.  This is likely
    	#  not what you want.
    	#
    	#  One, or both, of "uid" and "gid" should be set.  If set, the
    	#  corresponding value is checked.  Unauthorized users result
    	#  in an error message in the log file, and the connection is
    	#  closed.
    	#
    
    	#
    	#  Name of user that is allowed to connect to the control socket.
    	#
    	uid = radiusd
    
    	#
    	#  Name of group that is allowed to connect to the control socket.
    	#
    	gid = radiusd
    
    	#
    	#  Access mode.
    	#
    	#  This can be used to give *some* administrators access to
    	#  monitor the system, but not to change it.
    	#
    	#	ro = read only access (default)
    	#	rw = read/write access.
    	#
    	mode = rw
    }