2 * radiusd.c Main loop of the radius server.
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
20 * Copyright 2000-2004,2006 The FreeRADIUS server project
21 * Copyright 1999,2000 Miquel van Smoorenburg <miquels@cistron.nl>
22 * Copyright 2000 Alan DeKok <aland@ox.org>
23 * Copyright 2000 Alan Curry <pacman-radius@cqc.com>
24 * Copyright 2000 Jeff Carneal <jeff@apex.net>
25 * Copyright 2000 Chad Miller <cmiller@surfsouth.com>
28 #include <freeradius-devel/ident.h>
31 #include <freeradius-devel/radiusd.h>
32 #include <freeradius-devel/radius_snmp.h>
33 #include <freeradius-devel/rad_assert.h>
46 #ifdef HAVE_SYS_WAIT_H
47 # include <sys/wait.h>
50 # define WEXITSTATUS(stat_val) ((unsigned)(stat_val) >> 8)
53 # define WIFEXITED(stat_val) (((stat_val) & 255) == 0)
59 const char *progname = NULL;
60 const char *radius_dir = NULL;
61 const char *radacct_dir = NULL;
62 const char *radlog_dir = NULL;
63 const char *radlib_dir = NULL;
64 int log_stripped_names;
66 int log_auth_detail = FALSE;
68 const char *radiusd_version = "FreeRADIUS Version " RADIUSD_VERSION ", for host " HOSTINFO ", built on " __DATE__ " at " __TIME__;
73 static int debug_memory = 0;
76 * Configuration items.
82 static void usage(int);
84 static void sig_fatal (int);
85 static void sig_hup (int);
90 int main(int argc, char *argv[])
92 unsigned char buffer[4096];
95 int spawn_flag = TRUE;
96 int dont_fork = FALSE;
101 rad_listen_t *listener;
104 set_auth_parameters(argc,argv);
107 if ((progname = strrchr(argv[0], '/')) == NULL)
114 radius_dir = strdup(RADIUS_DIR);
117 * Ensure that the configuration is initialized.
119 memset(&mainconfig, 0, sizeof(mainconfig));
120 mainconfig.myip.af = AF_UNSPEC;
121 mainconfig.port = -1;
122 mainconfig.radiusd_conf = strdup("radiusd.conf");
124 #ifdef HAVE_SIGACTION
125 memset(&act, 0, sizeof(act));
127 sigemptyset( &act.sa_mask ) ;
131 * Don't put output anywhere until we get told a little
134 mainconfig.radlog_fd = -1;
135 mainconfig.log_file = NULL;
137 /* Process the options. */
138 while ((argval = getopt(argc, argv, "Aa:bcd:fg:hi:l:mn:p:sSvxXyz")) != EOF) {
143 log_auth_detail = TRUE;
147 if (radacct_dir) free(radacct_dir);
148 radacct_dir = strdup(optarg);
152 /* ignore for backwards compatibility with Cistron */
156 if (radius_dir) free(radius_dir);
157 radius_dir = strdup(optarg);
169 if (ip_hton(optarg, AF_UNSPEC, &mainconfig.myip) < 0) {
170 fprintf(stderr, "radiusd: Invalid IP Address or hostname \"%s\"\n", optarg);
176 if ((strcmp(optarg, "stdout") == 0) ||
177 (strcmp(optarg, "stderr") == 0) ||
178 (strcmp(optarg, "syslog") == 0)) {
179 fprintf(stderr, "radiusd: -l %s is unsupported. Use log_destination in radiusd.conf\n", optarg);
182 if (radlog_dir) free(radlog_dir);
183 radlog_dir = strdup(optarg);
187 fprintf(stderr, "radiusd: -g is unsupported. Use log_destination in radiusd.conf.\n");
196 if ((strchr(optarg, '/') != NULL) ||
197 (strchr(optarg, '.') != NULL) ||
198 (strlen(optarg) > 45)) usage(1);
200 snprintf(buffer, sizeof(buffer), "%s.conf",
202 if (mainconfig.radiusd_conf)
203 free(mainconfig.radiusd_conf);
204 mainconfig.radiusd_conf = strdup(buffer);
208 log_stripped_names++;
212 mainconfig.port = atoi(optarg);
213 if ((mainconfig.port <= 0) ||
214 (mainconfig.port >= 65536)) {
215 fprintf(stderr, "radiusd: Invalid port number %s\n", optarg);
220 case 's': /* Single process mode */
230 * BIG debugging mode for users who are
231 * TOO LAZY to type '-sfxxyz -l stdout' themselves.
237 mainconfig.log_auth = TRUE;
238 mainconfig.log_auth_badpass = TRUE;
239 mainconfig.log_auth_goodpass = TRUE;
240 mainconfig.radlog_dest = RADLOG_STDOUT;
241 mainconfig.radlog_fd = STDOUT_FILENO;
249 mainconfig.log_auth = TRUE;
250 mainconfig.log_auth_badpass = TRUE;
254 mainconfig.log_auth_badpass = TRUE;
255 mainconfig.log_auth_goodpass = TRUE;
265 radlog(L_INFO, "%s", radiusd_version);
266 radlog(L_INFO, "Copyright (C) 2000-2007 The FreeRADIUS server project.\n");
267 radlog(L_INFO, "There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A\n");
268 radlog(L_INFO, "PARTICULAR PURPOSE.\n");
269 radlog(L_INFO, "You may redistribute copies of FreeRADIUS under the terms of the\n");
270 radlog(L_INFO, "GNU General Public License.\n");
274 /* Read the configuration files, BEFORE doing anything else. */
275 if (read_mainconfig(0) < 0) {
280 * Disconnect from session
282 if (debug_flag == 0 && dont_fork == FALSE) {
285 radlog(L_ERR|L_CONS, "Couldn't fork");
290 * The parent exits, so the child can run in the background.
301 * If we're NOT debugging, trap fatal signals, so we can
302 * easily clean up after ourselves.
304 * If we ARE debugging, don't trap them, so we can
307 if ((mainconfig.allow_core_dumps == FALSE) && (debug_flag == 0)) {
309 #ifdef HAVE_SIGACTION
310 act.sa_handler = sig_fatal;
311 sigaction(SIGSEGV, &act, NULL);
313 signal(SIGSEGV, sig_fatal);
319 * Ensure that we're using the CORRECT pid after forking,
320 * NOT the one we started with.
322 radius_pid = getpid();
325 * Only write the PID file if we're running as a daemon.
327 * And write it AFTER we've forked, so that we write the
330 if (dont_fork == FALSE) {
333 fp = fopen(mainconfig.pid_file, "w");
336 * FIXME: What about following symlinks,
337 * and having it over-write a normal file?
339 fprintf(fp, "%d\n", (int) radius_pid);
342 radlog(L_ERR|L_CONS, "Failed creating PID file %s: %s\n",
343 mainconfig.pid_file, strerror(errno));
349 * If we're running as a daemon, close the default file
350 * descriptors, AFTER forking.
355 devnull = open("/dev/null", O_RDWR);
357 radlog(L_ERR|L_CONS, "Failed opening /dev/null: %s\n",
361 dup2(devnull, STDIN_FILENO);
362 if (mainconfig.radlog_dest == RADLOG_STDOUT) {
363 mainconfig.radlog_fd = dup(STDOUT_FILENO);
365 dup2(devnull, STDOUT_FILENO);
366 if (mainconfig.radlog_dest == RADLOG_STDERR) {
367 mainconfig.radlog_fd = dup(STDERR_FILENO);
369 dup2(devnull, STDERR_FILENO);
374 * It's called the thread pool, but it does a little
377 radius_event_init(mainconfig.config, spawn_flag);
380 * Use linebuffered or unbuffered stdout if
381 * the debug flag is on.
383 if (debug_flag == TRUE)
387 * Print out which ports we're listening on.
389 for (listener = mainconfig.listen;
391 listener = listener->next) {
392 listener->print(listener, buffer, sizeof(buffer));
393 switch (listener->type) {
394 case RAD_LISTEN_DETAIL:
397 case RAD_LISTEN_SNMP:
398 DEBUG("Listening on SNMP %s", buffer);
405 DEBUG("Listening on %s", buffer);
409 * Now that we've set everything up, we can install the signal
410 * handlers. Before this, if we get any signal, we don't know
411 * what to do, so we might as well do the default, and die.
413 signal(SIGPIPE, SIG_IGN);
414 #ifdef HAVE_SIGACTION
415 act.sa_handler = sig_hup;
416 sigaction(SIGHUP, &act, NULL);
417 act.sa_handler = sig_fatal;
418 sigaction(SIGTERM, &act, NULL);
420 signal(SIGHUP, sig_hup);
421 signal(SIGTERM, sig_fatal);
424 * If we're debugging, then a CTRL-C will cause the
425 * server to die immediately. Use SIGTERM to shut down
426 * the server cleanly in that case.
428 if ((debug_memory == 1) || (debug_flag == 0)) {
429 #ifdef HAVE_SIGACTION
430 act.sa_handler = sig_fatal;
431 sigaction(SIGINT, &act, NULL);
432 sigaction(SIGQUIT, &act, NULL);
434 signal(SIGINT, sig_fatal);
435 signal(SIGQUIT, sig_fatal);
439 radius_event_process();
442 * We're exiting, so we can delete the PID
443 * file. (If it doesn't exist, we can ignore
444 * the error returned by unlink)
446 if (dont_fork == FALSE) {
447 unlink(mainconfig.pid_file);
453 * Free the configuration items.
458 * Detach any modules.
464 if (radius_pid < 0) return 1;
471 * Display the syntax for starting this program.
473 static void NEVER_RETURNS usage(int status)
475 FILE *output = status?stderr:stdout;
478 "Usage: %s [-a acct_dir] [-d db_dir] [-l log_dir] [-i address] [-AcfnsSvXxyz]\n", progname);
479 fprintf(output, "Options:\n\n");
480 fprintf(output, " -a acct_dir use accounting directory 'acct_dir'.\n");
481 fprintf(output, " -A Log auth detail.\n");
482 fprintf(output, " -d raddb_dir Configuration files are in \"raddbdir/*\".\n");
483 fprintf(output, " -f Run as a foreground process, not a daemon.\n");
484 fprintf(output, " -h Print this help message.\n");
485 fprintf(output, " -i ipaddr Listen on ipaddr ONLY\n");
486 fprintf(output, " -l log_dir Log file is \"log_dir/radius.log\" (not used in debug mode)\n");
487 fprintf(output, " -p port Listen on port ONLY\n");
488 fprintf(output, " -s Do not spawn child processes to handle requests.\n");
489 fprintf(output, " -S Log stripped names.\n");
490 fprintf(output, " -v Print server version information.\n");
491 fprintf(output, " -X Turn on full debugging.\n");
492 fprintf(output, " -x Turn on additional debugging. (-xx gives more debugging).\n");
493 fprintf(output, " -y Log authentication failures, with password.\n");
494 fprintf(output, " -z Log authentication successes, with password.\n");
500 * We got a fatal signal.
502 static void sig_fatal(int sig)
507 * We can't really do anything
508 * intelligent here so just die
513 radius_signal_self(RADIUS_SIGNAL_SELF_TERM);
519 radius_signal_self(RADIUS_SIGNAL_SELF_TERM);
525 radius_signal_self(RADIUS_SIGNAL_SELF_EXIT);
532 * We got the hangup signal.
533 * Re-read the configuration files.
535 static void sig_hup(int sig)
537 sig = sig; /* -Wunused */
539 reset_signal(SIGHUP, sig_hup);
541 write(STDOUT_FILENO, "STUFF\n", 6);
543 radius_signal_self(RADIUS_SIGNAL_SELF_HUP);