GovWifi currently has a set of 6 RADIUS servers. These servers control network access with AAA authentication.
- Runs on port 1812.
- Requests user details stored in the database via the Authentication API.
- We do not have different levels of access so this is a NOOP.
Runs on Port 1813.
While we don’t block accounting requests, we don’t do anything with them. If an organisation requires accounting, they can enable it on their local infrastructure.
FreeRADIUS is configured using a language called Unlang.
We favor keeping all complex functionality in the backend APIs, instead of in Unlang.
This way it is easier to test and change in the future.
This is the software installed on our RADIUS servers.
It is opensource and can be found on Github.
Starting the freeRADIUS server with the
-X flag will enable verbose logging.
This is managed through the GovWifi Terraform. Due to the volume of transactions on production, enabling this may have an impact on performance.
A better way to use this would be to enable it on staging and to have the client who is having trouble connect to that IP.
Production and staging logs can be found in CloudWatch under
It will contain all the details of the authentication request which can be used to diagnose issues.
You can get help from the FreeRADIUS community by asking questions on their user mailing list.
You will need to sign up before you can ask questions or gain access to the archives.
In order to simulate UDP requests locally, there is a tool called eapol_test.
This is currently used in full-stack automated testing and health checking.
Common error messages
Error: Ignoring request to auth address * port 1812 bound to server default from unknown client
This means that the client isn’t whitelisted by the RADIUS server.
invalid Request Authenticator! (Shared secret is incorrect.)
The server knows the IP but it failed to authenticate with its pre-shared key.