2 * radrelay.c This program tails a detail logfile, reads the log
3 * entries, forwards them to a remote radius server,
4 * and moves the processed records to another file.
6 * Used to replicate accounting records to one (central)
7 * server - works even if remote server has extended
8 * downtime, and/or if this program is restarted.
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License as published by
12 * the Free Software Foundation; either version 2 of the License, or
13 * (at your option) any later version.
15 * This program is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 * GNU General Public License for more details.
20 * You should have received a copy of the GNU General Public License
21 * along with this program; if not, write to the Free Software
22 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
24 * Copyright 2001 Cistron Internet Services B.V.
25 * Copyright 2002 Simon Ekstrand <simon@routemeister.net>
28 char radrelay_rcsid[] =
33 #include <sys/types.h>
34 #include <sys/socket.h>
37 #ifdef HAVE_NETINET_IN_H
38 #include <netinet/in.h>
60 const char *radlog_dir = NULL;
61 radlog_dest_t radlog_dest = RADLOG_FILES;
63 const char *radius_dir = NULL;
64 const char *radacct_dir = NULL;
65 const char *radlib_dir = NULL;
66 uint32_t myip = INADDR_ANY;
67 int log_stripped_names;
68 struct main_config_t mainconfig;
71 * Possible states for request->state
79 * Possible states for the loop() function.
82 #define STATE_BACKLOG 1
84 #define STATE_SHUTDOWN 3
88 #define DEFAULT_SLEEP 50
89 #define DEFAULT_SLEEP_EVERY 1
94 struct relay_request {
95 int state; /* REQ_* state */
96 time_t retrans; /* when to retrans */
97 unsigned int retrans_num; /* Number of retransmissions */
98 time_t timestamp; /* orig recv time */
99 uint32_t client_ip; /* Client-IP-Addr */
100 RADIUS_PACKET *req; /* Radius request */
104 int sockfd; /* Main socket descriptor */
105 uint32_t dst_addr; /* Destination address */
106 short dst_port; /* Destination port */
107 uint32_t src_addr; /* Source address */
108 char detail[1024]; /* Detail file */
109 char *secret; /* Secret */
110 char f_secret[256]; /* File secret */
111 int sleep_time; /* Time to sleep between sending packets */
112 int sleep_every; /* Sleep every so many packets */
113 int records_print; /* Print statistics after so many records */
118 uint32_t records_read; /* Records read */
119 uint32_t packets_sent; /* Packets sent */
120 uint32_t last_print_records; /* Records on last statistics printout */
124 * Used for reading the client configurations from the config files.
126 char *c_secret = NULL;
127 char *c_shortname = NULL;
129 struct relay_request slots[NR_SLOTS];
131 int request_head = 0;
136 int get_radius_id(void);
137 void sigterm_handler(int sig);
138 void ms_sleep(int msec);
139 int isdateline(char *d);
140 int read_one(FILE *fp, struct relay_request *req);
141 int do_recv(struct relay_misc *r_args);
142 int do_send(struct relay_request *r, char *secret);
143 int detail_move(char *from, char *to);
144 void loop(struct relay_misc *r_args);
145 int find_shortname(char *shortname, char **host, char **secret);
150 * Get a radius id which is not
151 * currently being used (outstanding request)
152 * Since NR_SLOTS < 256 we can't
153 * have more outstanding requests than radius ids
159 for(id = 0; id < 256; id++){
163 if (id == 256 || id_map[id] != 0){
164 fprintf(stdout, "get_radius_id(): No IDs available. Something is very wrong\n");
168 fprintf(stdout, "get_radius_id(): Assign RADIUS ID = %d\n",id);
173 void sigterm_handler(int sig)
175 signal(sig, sigterm_handler);
181 * Sleep a number of milli seconds
183 inline void ms_sleep(int msec)
187 tv.tv_sec = (msec / 1000);
188 tv.tv_usec = (msec % 1000) * 1000;
189 select(0, NULL, NULL, NULL, &tv);
193 * Does this (remotely) look like "Tue Jan 23 06:55:48 2001" ?
195 inline int isdateline(char *d)
199 return sscanf(d, "%*s %*s %*d %*d:%*d:%*d %d", &y);
204 * Read one request from the detail file.
205 * Note that the file is locked during the read, and that
206 * we return *with the file locked* if we reach end-of-file.
208 * STATE_EMPTY: Slot is empty.
209 * STATE_BUSY1: Looking for start of a detail record (timestamp)
210 * STATE_BUSY2: Reading the A/V pairs of a detail record.
211 * STATE_FULL: Read the complete record.
214 int read_one(FILE *fp, struct relay_request *r_req)
219 char key[32], val[32];
226 if (r_req->state == STATE_FULL)
229 if (r_req->state == STATE_EMPTY) {
230 r_req->state = STATE_BUSY1;
234 * Try to lock the detail-file.
235 * If lockf is used we want to lock the _whole_ file, hence the
236 * fseek to the start of the file.
239 fseek(fp, 0L, SEEK_SET);
241 x = rad_lockfd_nonblock(fileno(fp), 0);
244 } while (x == -1 && i++ < 20);
251 fseek(fp, fpos, SEEK_SET);
253 while ((s = fgets(buf, sizeof(buf), fp)) != NULL) {
255 * Eek! We've just read a broken attribute.
256 * This does seem to happen every once in a long while
257 * due to some quirk involving threading, multiple processes
258 * going for the detail file lock at once and writes not
259 * being flushed properly. Things should be ok next time
263 fprintf(stdout, "read_one: ZERO BYTE\n");
264 fseek(fp, fpos + 1, SEEK_SET);
266 } else if (buf[strlen(buf) - 1] != '\n') {
267 fprintf(stdout, "read_one: BROKEN ATTRIBUTE\n");
268 fseek(fp, fpos + strlen(buf), SEEK_SET);
271 if (r_req->state == STATE_BUSY1) {
272 if (isdateline(buf)) {
273 r_req->state = STATE_BUSY2;
275 } else if (r_req->state == STATE_BUSY2) {
276 if (buf[0] != ' ' && buf[0] != '\t') {
277 r_req->state = STATE_FULL;
281 * Found A/V pair, but we skip non-protocol
285 if (sscanf(buf, "%31s = %31s", key, val) == 2) {
286 if (!strcasecmp(key, "Timestamp")) {
287 r_req->timestamp = atoi(val);
290 if (!strcasecmp(key, "Client-IP-Address")) {
291 r_req->client_ip = ip_getaddr(val);
294 if (!strcasecmp(key, "Request-Authenticator"))
299 if (userparse(buf, &vp) > 0 &&
301 (vp->attribute < 256 ||
302 vp->attribute > 65535) &&
303 vp->attribute != PW_VENDOR_SPECIFIC) {
304 pairadd(&(r_req->req->vps), vp);
314 if (r_req->state == STATE_FULL) {
316 * w00 - we just completed reading a record in full.
320 * Check that we have an Acct-Status-Type attribute. If not
323 if (pairfind(r_req->req->vps, PW_ACCT_STATUS_TYPE) == NULL){
324 fprintf(stdout, "read_one: No Acct-Status-Type attribute present. Rejecting record.\n");
325 r_req->state = STATE_BUSY1;
326 if (r_req->req->vps != NULL) {
327 pairfree(&r_req->req->vps);
328 r_req->req->vps = NULL;
330 if (r_req->req->data != NULL) {
331 free (r_req->req->data);
332 r_req->req->data = NULL;
335 r_req->retrans_num = 0;
336 r_req->timestamp = 0;
337 r_req->client_ip = 0;
340 if (r_req->timestamp == 0)
341 r_req->timestamp = time(NULL);
342 if ((vp = pairfind(r_req->req->vps, PW_ACCT_DELAY_TIME)) != NULL) {
343 r_req->timestamp -= vp->lvalue;
346 r_req->req->id = get_radius_id();
351 * Apparently we reached end of file. If we didn't
352 * partially read a record, we let the caller know
353 * we're at end of file.
355 if (r_req->state == STATE_BUSY1) {
356 r_req->state = STATE_EMPTY;
358 if (r_req->state == STATE_EMPTY || r_req->state == STATE_FULL)
363 fseek(fp, 0L, SEEK_SET);
364 rad_unlockfd(fileno(fp), 0);
365 fseek(fp, fpos, SEEK_SET);
371 * Receive answers from the remote server.
373 int do_recv(struct relay_misc *r_args)
376 struct relay_request *r;
380 * Receive packet and validate it's length.
382 rep = rad_recv(r_args->sockfd);
384 librad_perror("radrelay:");
389 * Must be an accounting response.
390 * FIXME: check if this is the right server!
392 if (rep->code != PW_ACCOUNTING_RESPONSE)
396 * Decode packet into radius attributes.
400 * Now find it in the outstanding requests.
402 for (i = 0; i < NR_SLOTS; i++) {
404 if (r->state == STATE_FULL && r->req->id == rep->id) {
405 if (rad_verify(rep, r->req, r_args->secret) != 0) {
406 librad_perror("rad_verify");
409 if (rad_decode(rep, r->req, r_args->secret) != 0) {
410 librad_perror("rad_decode");
414 * Got it. Clear slot.
415 * FIXME: check reponse digest ?
417 id_map[r->req->id] = 0;
418 fprintf(stdout, "do_recv: Free RADIUS ID = %d\n",r->req->id);
419 if (r->req->vps != NULL) {
420 pairfree(&r->req->vps);
423 if (r->req->data != NULL) {
427 r->state = STATE_EMPTY;
442 * Send accounting packet to remote server.
444 int do_send(struct relay_request *r, char *secret)
452 if (r->client_ip == r->req->dst_ipaddr) {
453 fprintf(stdout, "do_send: Client-IP == Dest-IP. Droping packet.\n");
454 fprintf(stdout, "do_send: Free RADIUS ID = %d\n",r->req->id);
455 id_map[r->req->id] = 0;
456 if (r->req->vps != NULL) {
457 pairfree(&r->req->vps);
460 if (r->req->data != NULL) {
464 r->state = STATE_EMPTY;
473 * Has the time come for this packet ?
476 if (r->retrans > now)
479 * If we are resending a packet we *need* to
480 * change the radius packet id since the request
481 * authenticator is different (due to different
482 * Acct-Delay-Time value).
483 * Otherwise the radius server may consider the
484 * packet a duplicate and we 'll get caught in a
488 id_map[r->req->id] = 0;
489 r->req->id = get_radius_id();
490 if (r->req->data != NULL){
496 if (r->retrans_num > 20)
497 r->retrans = now + 70;
499 r->retrans = now + 3 + (3 * r->retrans_num);
502 * Find the Acct-Delay-Time attribute. If it's
503 * not there, add one.
505 if ((vp = pairfind(r->req->vps, PW_ACCT_DELAY_TIME)) == NULL) {
506 vp = paircreate(PW_ACCT_DELAY_TIME, PW_TYPE_INTEGER);
507 pairadd(&(r->req->vps), vp);
509 vp->lvalue = (now - r->timestamp);
512 * Rebuild the entire packet every time from
513 * scratch - the signature changed because
514 * Acct-Delay-Time changed.
516 rad_send(r->req, NULL, secret);
522 * Rename a file, then recreate the old file with the
523 * same permissions and zero size.
525 int detail_move(char *from, char *to)
531 if (stat(from, &st) < 0)
533 if (rename(from, to) < 0)
537 if ((n = open(from, O_CREAT|O_RDWR, st.st_mode)) >= 0)
546 * Open detail file, collect records, send them to the
547 * remote accounting server, yadda yadda yadda.
549 * STATE_RUN: Reading from detail file, sending to server.
550 * STATE_BACKLOG: Reading from the detail.work file, for example
551 * after a crash or restart. Sending to server.
552 * STATE_WAIT: Waiting for all outstanding requests to be handled.
553 * STATE_CLOSE: Reached end of detail.work file, waiting for
554 * outstanding requests, and removing the file.
555 * STATE_SHUTDOWN: Got SIG_TERM, waiting for outstanding requests
556 * and exiting program.
558 void loop(struct relay_misc *r_args)
561 struct relay_request *r;
563 struct relay_stats stats;
566 time_t now, uptime, last_rename = 0;
568 int state = STATE_RUN;
572 strNcpy(work, r_args->detail, sizeof(work) - 6);
573 strcat(work, ".work");
575 id = ((int)getpid() & 0xff);
577 memset(&stats,0,sizeof(struct relay_stats));
578 stats.startup = time(NULL);
581 * Initialize all our slots, might as well do this right away.
583 for (i = 0; i < NR_SLOTS; i++) {
584 if ((slots[i].req = rad_alloc(1)) == NULL) {
585 librad_perror("radrelay");
588 slots[i].state = STATE_EMPTY;
589 slots[i].retrans = 0;
590 slots[i].retrans_num = 0;
591 slots[i].timestamp = 0;
592 slots[i].client_ip = 0;
593 slots[i].req->sockfd = r_args->sockfd;
594 slots[i].req->dst_ipaddr = r_args->dst_addr;
595 slots[i].req->dst_port = r_args->dst_port;
596 slots[i].req->src_ipaddr = r_args->src_addr;
597 slots[i].req->code = PW_ACCOUNTING_REQUEST;
598 slots[i].req->vps = NULL;
599 slots[i].req->data = NULL;
603 if (got_sigterm) state = STATE_SHUTDOWN;
606 * Open detail file - if needed, and if we can.
608 if (state == STATE_RUN && fp == NULL) {
609 if ((fp = fopen(work, "r+")) != NULL)
610 state = STATE_BACKLOG;
612 fp = fopen(r_args->detail, "r+");
614 fprintf(stderr, "%s: Unable to open detail file - %s\n", progname, r_args->detail);
622 * If "request_head" points to a free or not-completely-
623 * filled slot, we can read from the detail file.
625 r = &slots[request_head];
626 if (fp && (state == STATE_RUN || state == STATE_BACKLOG) &&
627 r->state != STATE_FULL) {
628 if (read_one(fp, r) == EOF) do {
631 * We've reached end of the <detail>.work
632 * It's going to be closed as soon as all
633 * outstanting requests are handled
635 if (state == STATE_BACKLOG) {
641 * End of file. See if the file has
642 * any size, and if we renamed less
643 * than 10 seconds ago or not.
646 if (ftell(fp) == 0 || now < last_rename + 10) {
648 fseek(fp, 0L, SEEK_SET);
649 rad_unlockfd(fileno(fp), 0);
650 fseek(fp, fpos, SEEK_SET);
656 * We rename the file to <file>.work
657 * and create an empty new file.
659 if (detail_move(r_args->detail, work) == 0) {
661 fprintf(stderr, "Moving %s to %s\n",
662 r_args->detail, work);
664 * rlm_detail might still write
665 * something to <detail>.work if
666 * it opens <detail> before it is
667 * renamed (race condition)
670 state = STATE_BACKLOG;
673 fseek(fp, 0L, SEEK_SET);
674 rad_unlockfd(fileno(fp), 0);
675 fseek(fp, fpos, SEEK_SET);
677 if (r_args->records_print && state == STATE_RUN){
678 stats.records_read++;
679 if (stats.last_print_records - stats.records_read >= r_args->records_print){
681 uptime = (stats.startup == now) ? 1 : now - stats.startup;
682 fprintf(stderr, "%s: Running and Processing Records.\n",progname);
683 fprintf(stderr, "Seconds since startup: %ld\n",uptime);
684 fprintf(stderr, "Records Read: %d\n",stats.records_read);
685 fprintf(stderr, "Packets Sent: %d\n",stats.packets_sent);
686 fprintf(stderr, "Record Rate since startup: %.2f\n",
687 (double)stats.records_read / uptime);
688 fprintf(stderr, "Packet Rate since startup: %.2f\n",
689 (double)stats.packets_sent / uptime);
690 stats.last_print_records = stats.records_read;
693 if (r->state == STATE_FULL)
694 request_head = (request_head + 1) % NR_SLOTS;
698 * Perhaps we can receive something.
703 FD_SET(r_args->sockfd, &readfds);
705 while (select(r_args->sockfd + 1, &readfds, NULL, NULL, &tv) > 0) {
707 if (n++ >= NR_SLOTS) break;
711 * If we're in STATE_WAIT and all slots are
712 * finally empty, we can remove the <detail>.work
714 if (state == STATE_WAIT || state == STATE_CLOSE || state == STATE_SHUTDOWN) {
715 for (i = 0; i < NR_SLOTS; i++)
716 if (slots[i].state != STATE_EMPTY)
719 if (state == STATE_CLOSE) {
723 fprintf(stderr, "Unlink file %s\n", work);
726 else if (state == STATE_SHUTDOWN) {
727 for (i = 0; i < NR_SLOTS; i++) {
728 rad_free(&slots[i].req);
737 * See if there's anything to send.
740 for (i = 0; i < NR_SLOTS; i++) {
741 if (slots[i].state == STATE_FULL) {
742 n += do_send(&slots[i], r_args->secret);
743 if ((n % r_args->sleep_every) == 0)
744 ms_sleep(r_args->sleep_time);
745 if (n > NR_SLOTS / 2)
749 if (r_args->records_print)
750 stats.packets_sent += n;
755 * Search through the "client" config sections (usually in clients.conf).
756 * This is an easy way to find a secret and an host.
758 int find_shortname(char *shortname, char **host, char **secret)
760 CONF_SECTION *maincs, *cs;
763 /* Lets go look for the new configuration files */
764 memset(&mainconfig, 0, sizeof(mainconfig)); /* for radlog() */
765 snprintf(buffer, sizeof(buffer), "%.200s/radiusd.conf", radius_dir);
766 if ((maincs = conf_read(NULL, 0, buffer, NULL)) == NULL) {
771 * Find the first 'client' section.
773 cs = cf_section_sub_find(maincs, "client");
775 c_shortname = cf_section_value_find(cs, "shortname");
776 c_secret = cf_section_value_find(cs, "secret");
778 * Keep searching for 'client' sections until they run out
779 * or we find one that matches.
781 while (cs && strcmp(shortname, c_shortname)) {
782 cs = cf_subsection_find_next(cs, cs, "client");
784 c_shortname = cf_section_value_find(cs, "shortname");
785 c_secret = cf_section_value_find(cs, "secret");
791 *host = cf_section_name2(cs);
802 fprintf(stderr, "Usage: radrelay [-a accounting_dir] [-d radius_dir] [-i local_ip] [-s secret]\n");
803 fprintf(stderr, "[-e sleep_every packets] [-t sleep_time (ms)] [-S secret_file] [-fx]\n");
804 fprintf(stderr, "[-R records_print] <[-n shortname] [-r remote-server[:port]]> detailfile\n");
805 fprintf(stderr, " -a accounting_dir Base accounting directory.\n");
806 fprintf(stderr, " -d radius_dir Base radius (raddb) directory.\n");
807 fprintf(stderr, " -f Stay in the foreground (don't fork).\n");
808 fprintf(stderr, " -h This help.\n");
809 fprintf(stderr, " -i local_ip Use local_ip as source address.\n");
810 fprintf(stderr, " -n shortname Use the [shortname] entry from clients.conf for\n");
811 fprintf(stderr, " ip-adress and secret.\n");
812 fprintf(stderr, " -t sleep_time Sleep so much time (in ms) between sending packets. Default: %dms.\n",
814 fprintf(stderr, " -e sleep_every Sleep after sending so many packets. Default: %d\n",
815 DEFAULT_SLEEP_EVERY);
816 fprintf(stderr, " -R records_print If in foreground mode, print statistics after so many records read.\n");
817 fprintf(stderr, " -r remote-server The destination address/hostname.\n");
818 fprintf(stderr, " -s secret Server secret.\n");
819 fprintf(stderr, " -S secret_file Read server secret from file.\n");
820 fprintf(stderr, " -x Debug mode (-xx gives more debugging).\n");
825 int main(int argc, char **argv)
834 struct relay_misc r_args;
843 memset((char *) r_args.detail, 0, 1024);
844 memset((char *) r_args.f_secret, 0, 256);
845 r_args.secret = NULL;
846 r_args.sleep_time = DEFAULT_SLEEP;
847 r_args.sleep_every = DEFAULT_SLEEP_EVERY;
852 radius_dir = strdup(RADIUS_DIR);
857 * Make sure there are stdin/stdout/stderr fds.
859 while ((c = open("/dev/null", O_RDWR)) < 3 && c >= 0);
860 if (c >= 3) close(c);
863 * Process the options.
865 while ((c = getopt(argc, argv, "a:d:fhi:t:e:n:r:R:s:S:x")) != EOF) switch(c) {
867 if (strlen(optarg) > 1021) {
868 fprintf(stderr, "%s: acct_dir to long\n", progname);
871 strncpy(r_args.detail, optarg, 1021);
876 radius_dir = strdup(optarg);
885 r_args.sleep_time = atoi(optarg);
888 r_args.sleep_every = atoi(optarg);
892 fprintf(stderr, "%s: Not in foreground mode. Can't print statistics.\n",progname);
895 r_args.records_print = atoi(optarg);
898 server_name = optarg;
901 r_args.secret = optarg;
905 * If -x is called once we enable internal radrelay
906 * debugging, if it's called twice we also active
907 * lib_rad debugging (fairly verbose).
915 sfile_fp = fopen(optarg, "r");
916 if (sfile_fp == NULL) {
917 fprintf(stderr, "Error opening %s: %s\n",
918 optarg, strerror(errno));
922 if (fgets(r_args.f_secret, 256, sfile_fp) == NULL) {
923 fprintf(stderr, "Error reading from %s: %s\n",
924 optarg, strerror(errno));
930 for (c = 0; c < strlen(r_args.f_secret); c++)
931 if (r_args.f_secret[c] == ' ' ||
932 r_args.f_secret[c] == '\n')
933 r_args.f_secret[c] = '\0';
935 if (strlen(r_args.f_secret) < 2) {
936 fprintf(stderr, "Secret in %s is to short\n",
941 r_args.secret = r_args.f_secret;
944 if ((r_args.src_addr = ip_getaddr(optarg)) == 0) {
945 fprintf(stderr, "%s: unknown host %s\n",
957 * No detail file: die.
959 if (argc == optind) {
963 argc -= (optind - 1);
964 argv += (optind - 1);
965 if (shortname && server_name)
967 if (!shortname && !server_name)
969 if (r_args.secret != NULL && shortname != NULL)
973 * If we've been given a shortname, try to fetch the secret and
974 * adress from the config files.
976 if (shortname != NULL) {
977 if (find_shortname(shortname, &server_name, &r_args.secret) == -1) {
978 fprintf(stderr, "Couldn't find %s in configuration files.\n", shortname);
984 * server_name should already be set either by the -r or the -s
985 * commandline argument.
987 if ((p = strrchr(server_name, ':')) != NULL) {
990 r_args.dst_port = ntohs(atoi(p));
992 if (r_args.dst_port == 0) {
993 svp = getservbyname ("radacct", "udp");
994 r_args.dst_port = svp ? ntohs(svp->s_port) : PW_ACCT_UDP_PORT;
996 r_args.dst_port = ntohs(r_args.dst_port);
998 r_args.dst_addr = ip_getaddr(server_name);
999 if (r_args.dst_addr == 0) {
1000 fprintf(stderr, "%s: unknown host\n",
1005 if (r_args.secret == NULL || r_args.secret[0] == 0) {
1006 fprintf(stderr, "No secret available for server %s\n",
1012 * Find what detail file to read from.
1014 * FIXME: We should be able to expand dates etc. based on the pathname,
1015 * just like the detail module does.
1017 if (r_args.detail[0] == '\0') {
1018 if (strlen(RADIR) > 1021) {
1019 fprintf(stderr, "acct_dir to long\n");
1022 strncpy(r_args.detail, RADIR, 1021);
1024 if (chdir(r_args.detail) == -1) {
1029 if (strlen(argv[1]) + strlen(r_args.detail) > 1023) {
1030 fprintf(stderr, "Detail file path to long");
1033 if (r_args.detail[strlen(r_args.detail) - 1] != '/')
1034 r_args.detail[strlen(r_args.detail)] = '/';
1035 strncat (r_args.detail, argv[1], 1023 - strlen(r_args.detail));
1039 * Initialize dictionary.
1041 if (dict_init(radius_dir, RADIUS_DICTIONARY) < 0) {
1042 librad_perror("radrelay");
1047 * Open a socket to the remote server.
1049 if ((r_args.sockfd = socket(AF_INET, SOCK_DGRAM, 0)) < 0) {
1050 fprintf(stderr, "Error opening socket: %s", strerror(errno));
1054 signal(SIGTERM, sigterm_handler);
1062 (void)open("/dev/null", O_RDWR);
1065 signal(SIGHUP, SIG_IGN);
1066 signal(SIGINT, SIG_IGN);
1067 signal(SIGQUIT, SIG_IGN);
1074 * Initialize the radius id map
1080 * Call main processing loop.