This file is indexed.

/etc/news/radius.conf is in inn2 2.5.2+20110413-1build1.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
# $Id: radius.conf 7555 2006-08-28 02:00:23Z eagle $
#
# Sample RADIUS configuration file for the RADIUS readers.conf
# authenticator.  If you're not using that authenticator, this file is not
# used.

server radius {

# Hostname of the RADIUS server.

#radhost:       radius-server.example.com

# Port to query on the RADIUS server.

radport:        1645

# Local hostname or IP address.
#
# The RADIUS server expects an IP address; a hostname will be translated
# into an IP address with gethostbyname().  If not given, not included in
# the request (not all RADIUS setups need this information).

#lochost:       news.example.com

# Local port of connection.
#
# The port the client we're authenticating is connecting to.  If not
# given, defaults to 119.  You'll only need to set this if you're readers
# are connecting on a non-standard port.

#locport:       119

# Shared secret with RADIUS server.
#
# Be careful not to use the '#' symbol in your secret, since in this
# file that indicates the beginning of a comment.

#secret:        SECRET-WORD

# Prefix for username.
#
# Before given to the RADIUS server, usernames will be rewritten by
# prepending the prefix, if given, and then appending the suffix, if
# given.

#prefix:        news-

# Suffix for username.

#suffix:        @example.com

# Whether to ignore bad reply IP.
#
# If set to false, the RADIUS authenticator will check to ensure that the
# response it receives is from the same IP address as it sent the request
# to (for some added security).  If set to true, it will skip this
# verification check (if your RADIUS server has multiple IP addresses or
# if other odd things are going on, it may be perfectly normal for the
# response to come from a different IP address).

ignore-source:  false

}