newvector should be a bool
[freeradius.git] / src / main / process.c
index d5c75c3..0150a1c 100644 (file)
@@ -71,7 +71,11 @@ static char const *action_codes[] = {
 };
 
 #ifdef DEBUG_STATE_MACHINE
-#define TRACE_STATE_MACHINE if (debug_flag) printf("(%u) ********\tSTATE %s action %s live M-%s C-%s\t********\n", request->number, __FUNCTION__, action_codes[action], master_state_names[request->master_state], child_state_names[request->child_state])
+#define TRACE_STATE_MACHINE if (debug_flag) do { struct timeval debug_tv; \
+                                                gettimeofday(&debug_tv, NULL);\
+                                                debug_tv.tv_sec -= fr_start_time;\
+                                                printf("(%u) %d.%06d ********\tSTATE %s action %s live M-%s C-%s\t********\n",\
+                                                       request->number, (int) debug_tv.tv_sec, (int) debug_tv.tv_usec,  __FUNCTION__, action_codes[action], master_state_names[request->master_state], child_state_names[request->child_state]); } while (0)
 
 static char const *master_state_names[REQUEST_MASTER_NUM_STATES] = {
        "?",
@@ -104,7 +108,16 @@ static char const *child_state_names[REQUEST_CHILD_NUM_STATES] = {
                fr_event_insert(el, request_timer, request, \
                                &when, &request->ev);
 
-
+/*
+ *     We need a different VERIFY_REQUEST macro in process.c
+ *     To avoid the race conditions with the master thread
+ *     checking the REQUEST whilst it's being worked on by
+ *     the child.
+ */
+#if defined(WITH_VERIFY_PTR) && defined(HAVE_PTHREAD_H)
+#  undef VERIFY_REQUEST
+#  define VERIFY_REQUEST(_x) if (pthread_equal(pthread_self(), _x->child_pid) != 0) verify_request(__FILE__, __LINE__, _x)
+#endif
 
 /**
  * @section request_timeline
@@ -282,14 +295,14 @@ void radius_update_listener(rad_listen_t *this)
 #define FD_MUTEX_UNLOCK(_x)
 #endif
 
-static int request_num_counter = 0;
+static int request_num_counter = 1;
 #ifdef WITH_PROXY
 static int request_will_proxy(REQUEST *request);
 static int request_proxy(REQUEST *request, int retransmit);
 STATE_MACHINE_DECL(proxy_wait_for_reply);
 STATE_MACHINE_DECL(proxy_no_reply);
 STATE_MACHINE_DECL(proxy_running);
-static int process_proxy_reply(REQUEST *request);
+static int process_proxy_reply(REQUEST *request, RADIUS_PACKET *reply);
 static void remove_from_proxy_hash(REQUEST *request);
 static void remove_from_proxy_hash_nl(REQUEST *request, bool yank);
 static int insert_into_proxy_hash(REQUEST *request);
@@ -306,6 +319,7 @@ STATE_MACHINE_DECL(request_running);
 static void request_coa_originate(REQUEST *request);
 STATE_MACHINE_DECL(coa_running);
 STATE_MACHINE_DECL(coa_wait_for_reply);
+STATE_MACHINE_DECL(coa_no_reply);
 static void request_coa_separate(REQUEST *coa);
 #endif
 
@@ -340,9 +354,9 @@ static void tv_add(struct timeval *tv, int usec_delay)
 }
 
 /*
- *     In daemon mode, AND this request has debug flags set.
+ *     Debug the packet if requested.
  */
-#define DEBUG_PACKET if (!debug_flag && request->options && request->radlog) debug_packet
+#define DEBUG_PACKET if (request->log.lvl && request->log.func) debug_packet
 
 static void debug_packet(REQUEST *request, RADIUS_PACKET *packet, int direction)
 {
@@ -351,11 +365,11 @@ static void debug_packet(REQUEST *request, RADIUS_PACKET *packet, int direction)
        char buffer[1024];
        char const *received, *from;
        fr_ipaddr_t const *ip;
-       int port;
+       uint16_t port;
 
        if (!packet) return;
 
-       rad_assert(request->radlog != NULL);
+       rad_assert(request->log.func != NULL);
 
        if (direction == 0) {
                received = "Received";
@@ -404,13 +418,62 @@ static void debug_packet(REQUEST *request, RADIUS_PACKET *packet, int direction)
  *
  ***********************************************************************/
 
+static struct timeval *request_response_window(REQUEST *request)
+{
+       VERIFY_REQUEST(request);
+
+       if (request->client) {
+               /*
+                *      The client hasn't set the response window.  Return
+                *      either the home server one, if set, or the global one.
+                */
+               if (!timerisset(&request->client->response_window)) {
+                       return &request->home_server->response_window;
+               }
+
+               if (timercmp(&request->client->response_window,
+                            &request->home_server->response_window, <)) {
+                       return &request->client->response_window;
+               }
+       }
+
+       rad_assert(request->home_server != NULL);
+       return &request->home_server->response_window;
+}
+
+/*
+ * Determine initial request processing delay.
+ */
+static int request_init_delay(REQUEST *request)
+{
+       struct timeval half_response_window;
+
+       VERIFY_REQUEST(request);
+
+       /* Allow client response window to lower initial delay */
+       if (timerisset(&request->client->response_window)) {
+               half_response_window.tv_sec = request->client->response_window.tv_sec >> 1;
+               half_response_window.tv_usec =
+                       ((request->client->response_window.tv_sec & 1) * USEC +
+                               request->client->response_window.tv_usec) >> 1;
+               if (timercmp(&half_response_window, &request->root->init_delay, <))
+                       return (int)half_response_window.tv_sec * USEC +
+                               (int)half_response_window.tv_usec;
+       }
+
+       return (int)request->root->init_delay.tv_sec * USEC +
+               (int)request->root->init_delay.tv_usec;
+}
+
 /*
  *     Callback for ALL timer events related to the request.
  */
 static void request_timer(void *ctx)
 {
-       REQUEST *request = ctx;
-       int action = request->timer_action;
+       REQUEST *request = talloc_get_type_abort(ctx, REQUEST);
+       int action;
+
+       action = request->timer_action;
 
        TRACE_STATE_MACHINE;
 
@@ -427,6 +490,8 @@ STATE_MACHINE_DECL(request_done)
        char buffer[128];
 #endif
 
+       VERIFY_REQUEST(request);
+
        TRACE_STATE_MACHINE;
 
 #ifdef WITH_COA
@@ -477,7 +542,7 @@ STATE_MACHINE_DECL(request_done)
                        request->listener->send(request->listener, request);
                        return;
                } else {
-                       RDEBUG("No reply.  Ignoring retransmit.");
+                       RDEBUG("No reply.  Ignoring retransmit");
                }
                break;
 
@@ -550,12 +615,11 @@ STATE_MACHINE_DECL(request_done)
                 *      packets from the home server.
                 */
        case FR_ACTION_PROXY_REPLY:
-               DEBUG2("Reply from home server %s port %d  - ID: %d arrived too late for request %u. Try increasing 'retry_delay' or 'max_request_time'",
+               RDEBUG2("Reply from home server %s port %d  - ID: %d arrived too late.  Try increasing 'retry_delay' or 'max_request_time'",
                       inet_ntop(request->proxy->src_ipaddr.af,
                                 &request->proxy->src_ipaddr.ipaddr,
                                 buffer, sizeof(buffer)),
-                      request->proxy->dst_port, request->proxy->id,
-                      request->number);
+                       request->proxy->dst_port, request->proxy->id);
                return;
 #endif
 
@@ -593,7 +657,7 @@ STATE_MACHINE_DECL(request_done)
                        when.tv_sec += request->home_server->coa_mrd;
                } else
 #endif
-               when.tv_sec += request->home_server->response_window;
+                       timeradd(&when, request_response_window(request), &when);
 
                /*
                 *      We haven't received all responses, AND there's still
@@ -667,7 +731,7 @@ STATE_MACHINE_DECL(request_done)
 
        if (request->ev) fr_event_delete(el, &request->ev);
 
-       request_free(&request);
+       talloc_free(request);
 }
 
 
@@ -675,6 +739,8 @@ static void request_cleanup_delay_init(REQUEST *request, struct timeval const *p
 {
        struct timeval now, when;
 
+       VERIFY_REQUEST(request);
+
        if (request->packet->code == PW_CODE_ACCOUNTING_REQUEST) goto done;
 
        if (!request->root->cleanup_delay) goto done;
@@ -723,6 +789,8 @@ static void request_process_timer(REQUEST *request)
        int action = FR_ACTION_TIMER;
 #endif
 
+       VERIFY_REQUEST(request);
+
        TRACE_STATE_MACHINE;
        ASSERT_MASTER;
 
@@ -804,9 +872,6 @@ static void request_process_timer(REQUEST *request)
        switch (request->child_state) {
        case REQUEST_QUEUED:
        case REQUEST_RUNNING:
-#ifdef WITH_PROXY
-       case REQUEST_PROXIED:
-#endif
                when = request->packet->timestamp;
                when.tv_sec += request->root->max_request_time;
 
@@ -830,26 +895,54 @@ static void request_process_timer(REQUEST *request)
 #endif
                        request->master_state = REQUEST_STOP_PROCESSING;
                }
+               goto delay;     /* sleep some more */
 
 #ifdef WITH_PROXY
+       case REQUEST_PROXIED:
+               when = request->packet->timestamp;
+               when.tv_sec += request->root->max_request_time;
+
+               if (timercmp(&now, &when, >=)) {
+                       RWDEBUG("No response to proxied request in 'max_request_time'.  Stopping it.");
+                       request->master_state = REQUEST_STOP_PROCESSING;
+                       request_done(request, FR_ACTION_DONE);
+                       break;
+               }
+
+               rad_assert(request->proxy != NULL);
+#ifdef WITH_COA
                /*
-                *      We should wait for the proxy reply.
+                *      Ugh.
                 */
-               if (request->child_state == REQUEST_PROXIED) {
+               if (request->packet->code != request->proxy->code) {
                        if (request->proxy_reply) {
-                               request->process = proxy_running;
+                               request->process = coa_running;
                        } else {
-                               request->process = proxy_wait_for_reply;
+                               request->process = coa_wait_for_reply;
                        }
-               }
+               } else
 #endif
 
+               if (request->proxy_reply) {
+                       request->process = proxy_running;
+               } else {
+                       request->process = proxy_wait_for_reply;
+               }
+
+               when = request->proxy->timestamp;
+               tv_add(&when, request->delay);
+
+               if (timercmp(&now, &when, >=)) {
+                       request->process(request, FR_ACTION_TIMER);
+                       return;
+               }
+
                /*
-                *      If the request has been told to die, we wait.
-                *      Otherwise, we wait for the child thread to
-                *      finish it's work.
+                *      Leave the initial delay alone.
                 */
-               goto delay;
+               STATE_MACHINE_TIMER(FR_ACTION_TIMER);
+               return;
+#endif /* WITH_PROXY */
 
        case REQUEST_RESPONSE_DELAY:
                rad_assert(request->response_delay > 0);
@@ -911,6 +1004,8 @@ static void request_queue_or_run(UNUSED REQUEST *request,
        int action = FR_ACTION_TIMER;
 #endif
 
+       VERIFY_REQUEST(request);
+
        TRACE_STATE_MACHINE;
 
        /*
@@ -937,7 +1032,8 @@ static void request_queue_or_run(UNUSED REQUEST *request,
                /*
                 *      (re) set the initial delay.
                 */
-               request->delay = USEC / 3;
+               request->delay = request_init_delay(request);
+               if (request->delay > USEC) request->delay = USEC;
                gettimeofday(&when, NULL);
                tv_add(&when, request->delay);
                request->delay += request->delay >> 1;
@@ -980,6 +1076,8 @@ STATE_MACHINE_DECL(request_common)
        char buffer[128];
 #endif
 
+       VERIFY_REQUEST(request);
+
        TRACE_STATE_MACHINE;
        ASSERT_MASTER;
 
@@ -998,22 +1096,18 @@ STATE_MACHINE_DECL(request_common)
                 *      We're still waiting for a proxy reply.
                 */
                if (request->child_state == REQUEST_PROXIED) {
+                       request->process = proxy_wait_for_reply;
                        proxy_wait_for_reply(request, action);
                        return;
                }
 #endif
 
-               /*
-                *      We probbly should check if the request is
-                *      DONE.  If so, delete it, and allow the new
-                *      request to continue.  But we can't give
-                *      feedback to request_receive(), so we let it
-                *      take care of that.
-                */
-               ERROR("(%u) Discarding duplicate request from "
-                      "client %s port %d - ID: %u due to unfinished request",
-                      request->number, request->client->shortname,
-                      request->packet->src_port,request->packet->id);
+               ERROR("(%u) Ignoring duplicate packet from "
+                     "client %s port %d - ID: %u due to unfinished request "
+                     "in component %s module %s",
+                     request->number, request->client->shortname,
+                     request->packet->src_port,request->packet->id,
+                     request->component, request->module);
                break;
 
        case FR_ACTION_CONFLICTING:
@@ -1030,12 +1124,11 @@ STATE_MACHINE_DECL(request_common)
 
 #ifdef WITH_PROXY
        case FR_ACTION_PROXY_REPLY:
-               DEBUG2("Reply from home server %s port %d  - ID: %d arrived too late for request %u. Try increasing 'retry_delay' or 'max_request_time'",
-                      inet_ntop(request->proxy->src_ipaddr.af,
-                                &request->proxy->src_ipaddr.ipaddr,
+               RDEBUG2("Reply from home server %s port %d  - ID: %d arrived too late.  Try increasing 'retry_delay' or 'max_request_time'",
+                      inet_ntop(request->proxy->dst_ipaddr.af,
+                                &request->proxy->dst_ipaddr.ipaddr,
                                 buffer, sizeof(buffer)),
-                      request->proxy->dst_port, request->proxy->id,
-                      request->number);
+                       request->proxy->dst_port, request->proxy->id);
                return;
 #endif
 
@@ -1049,6 +1142,8 @@ STATE_MACHINE_DECL(request_cleanup_delay)
 {
        struct timeval when;
 
+       VERIFY_REQUEST(request);
+
        TRACE_STATE_MACHINE;
        ASSERT_MASTER;
 
@@ -1057,7 +1152,7 @@ STATE_MACHINE_DECL(request_cleanup_delay)
                if (request->reply->code != 0) {
                        request->listener->send(request->listener, request);
                } else {
-                       RDEBUG("No reply.  Ignoring retransmit.");
+                       RDEBUG("No reply.  Ignoring retransmit");
                }
 
                /*
@@ -1089,6 +1184,8 @@ STATE_MACHINE_DECL(request_cleanup_delay)
 
 STATE_MACHINE_DECL(request_response_delay)
 {
+       VERIFY_REQUEST(request);
+
        TRACE_STATE_MACHINE;
        ASSERT_MASTER;
 
@@ -1117,10 +1214,12 @@ STATE_MACHINE_DECL(request_response_delay)
 
 static int CC_HINT(nonnull) request_pre_handler(REQUEST *request, UNUSED int action)
 {
-       TRACE_STATE_MACHINE;
-
        int rcode;
 
+       VERIFY_REQUEST(request);
+
+       TRACE_STATE_MACHINE;
+
        if (request->master_state == REQUEST_STOP_PROCESSING) return 0;
 
        /*
@@ -1134,33 +1233,7 @@ static int CC_HINT(nonnull) request_pre_handler(REQUEST *request, UNUSED int act
                return 1;
        }
 
-#ifdef WITH_PROXY
-       /*
-        *      Put the decoded packet into it's proper place.
-        */
-       if (request->proxy_reply != NULL) {
-               /*
-                *      There may be a proxy reply, but it may be too late.
-                */
-               if (!request->proxy_listener) return 0;
-
-               rcode = request->proxy_listener->decode(request->proxy_listener, request);
-               DEBUG_PACKET(request, request->proxy_reply, 0);
-
-               /*
-                *      Pro-actively remove it from the proxy hash.
-                *      This is later than in 2.1.x, but it means that
-                *      the replies are authenticated before being
-                *      removed from the hash.
-                */
-               if ((rcode == 0) &&
-                   (request->num_proxied_requests <= request->num_proxied_responses)) {
-                       remove_from_proxy_hash(request);
-               }
-
-       } else
-#endif
-       if (request->packet->vps == NULL) {
+       if (!request->packet->vps) { /* FIXME: check for correct state */
                rcode = request->listener->decode(request->listener, request);
 
 #ifdef WITH_UNLANG
@@ -1169,8 +1242,8 @@ static int CC_HINT(nonnull) request_pre_handler(REQUEST *request, UNUSED int act
                         *      Ignore parse errors.
                         */
                        if (radius_evaluate_cond(request, RLM_MODULE_OK, 0, debug_condition)) {
-                               request->options = 2;
-                               request->radlog = vradlog_request;
+                               request->log.lvl = L_DBG_LVL_2;
+                               request->log.func = vradlog_request;
                        }
                }
 #endif
@@ -1190,12 +1263,6 @@ static int CC_HINT(nonnull) request_pre_handler(REQUEST *request, UNUSED int act
                request->username = pairfind(request->packet->vps, PW_USER_NAME, 0, TAG_ANY);
        }
 
-#ifdef WITH_PROXY
-       if (action == FR_ACTION_PROXY_REPLY) {
-               return process_proxy_reply(request);
-       }
-#endif
-
        return 1;
 }
 
@@ -1203,6 +1270,8 @@ STATE_MACHINE_DECL(request_finish)
 {
        VALUE_PAIR *vp;
 
+       VERIFY_REQUEST(request);
+
        TRACE_STATE_MACHINE;
 
        (void) action;  /* -Wunused */
@@ -1252,16 +1321,16 @@ STATE_MACHINE_DECL(request_finish)
        /*
         *      Catch Auth-Type := Reject BEFORE proxying the packet.
         */
-       else if (request->packet->code == PW_CODE_AUTHENTICATION_REQUEST) {
+       else if (request->packet->code == PW_CODE_ACCESS_REQUEST) {
                if (request->reply->code == 0) {
                        vp = pairfind(request->config_items, PW_AUTH_TYPE, 0, TAG_ANY);
 
-                       if (!vp || (vp->vp_integer != PW_CODE_AUTHENTICATION_REJECT)) {
+                       if (!vp || (vp->vp_integer != PW_CODE_ACCESS_REJECT)) {
                                RDEBUG2("There was no response configured: "
                                        "rejecting request");
                        }
 
-                       request->reply->code = PW_CODE_AUTHENTICATION_REJECT;
+                       request->reply->code = PW_CODE_ACCESS_REJECT;
                }
        }
 
@@ -1273,7 +1342,7 @@ STATE_MACHINE_DECL(request_finish)
        if (vp) pairadd(&request->reply->vps, vp);
 
        switch (request->reply->code) {
-       case PW_CODE_AUTHENTICATION_ACK:
+       case PW_CODE_ACCESS_ACCEPT:
                rad_postauth(request);
                break;
        case PW_CODE_ACCESS_CHALLENGE:
@@ -1294,7 +1363,7 @@ STATE_MACHINE_DECL(request_finish)
         *      We do this separately so ACK and challenge can change the code
         *      to reject if a module returns reject.
         */
-       if (request->reply->code == PW_CODE_AUTHENTICATION_REJECT) {
+       if (request->reply->code == PW_CODE_ACCESS_REJECT) {
                pairdelete(&request->config_items, PW_POST_AUTH_TYPE, 0, TAG_ANY);
                vp = pairmake_config("Post-Auth-Type", "Reject", T_OP_SET);
                if (vp) rad_postauth(request);
@@ -1331,9 +1400,20 @@ STATE_MACHINE_DECL(request_finish)
        /*
         *      See if we need to delay an Access-Reject packet.
         */
-       if ((request->reply->code == PW_CODE_AUTHENTICATION_REJECT) &&
+       if ((request->reply->code == PW_CODE_ACCESS_REJECT) &&
            (request->root->reject_delay > 0)) {
                request->response_delay = request->root->reject_delay;
+
+#ifdef WITH_PROXY
+               /*
+                *      If we timed out a proxy packet, don't delay
+                *      the reject any more.
+                */
+               if (request->proxy && !request->proxy_reply) {
+                       request->response_delay = 0;
+               }
+#endif
+
        }
 
        /*
@@ -1372,6 +1452,8 @@ STATE_MACHINE_DECL(request_finish)
 
 STATE_MACHINE_DECL(request_running)
 {
+       VERIFY_REQUEST(request);
+
        TRACE_STATE_MACHINE;
 
        switch (action) {
@@ -1394,7 +1476,8 @@ STATE_MACHINE_DECL(request_running)
        case FR_ACTION_PROXY_REPLY:
                request->child_state = REQUEST_RUNNING;
                request->process = proxy_running;
-               /* FALL-THROUGH */
+               request->process(request, FR_ACTION_RUN);
+               break;
 #endif
 
        case FR_ACTION_RUN:
@@ -1462,12 +1545,14 @@ STATE_MACHINE_DECL(request_running)
 int request_receive(rad_listen_t *listener, RADIUS_PACKET *packet,
                    RADCLIENT *client, RAD_REQUEST_FUNP fun)
 {
-       int count;
+       uint32_t count;
        RADIUS_PACKET **packet_p;
        REQUEST *request = NULL;
        struct timeval now;
        listen_socket_t *sock = NULL;
 
+       VERIFY_PACKET(packet);
+
        /*
         *      Set the last packet received.
         */
@@ -1508,7 +1593,7 @@ int request_receive(rad_listen_t *listener, RADIUS_PACKET *packet,
 
 #ifdef WITH_STATS
                                switch (packet->code) {
-                               case PW_CODE_AUTHENTICATION_REQUEST:
+                               case PW_CODE_ACCESS_REQUEST:
                                        FR_STATS_INC(auth, total_dup_requests);
                                        break;
 
@@ -1561,8 +1646,8 @@ int request_receive(rad_listen_t *listener, RADIUS_PACKET *packet,
        /*
         *      Quench maximum number of outstanding requests.
         */
-       if (mainconfig.max_requests &&
-           ((count = fr_packet_list_num_elements(pl)) > mainconfig.max_requests)) {
+       if (main_config.max_requests &&
+           ((count = fr_packet_list_num_elements(pl)) > main_config.max_requests)) {
                RATE_LIMIT(ERROR("Dropping request (%d is too many): from client %s port %d - ID: %d", count,
                                 client->shortname,
                                 packet->src_port, packet->id);
@@ -1578,11 +1663,9 @@ skip_dup:
         *      Rate-limit the incoming packets
         */
        if (sock && sock->max_rate) {
-               int pps;
-
-               pps = rad_pps(&sock->rate_pps_old, &sock->rate_pps_now,
-                             &sock->rate_time, &now);
+               uint32_t pps;
 
+               pps = rad_pps(&sock->rate_pps_old, &sock->rate_pps_now, &sock->rate_time, &now);
                if (pps > sock->max_rate) {
                        DEBUG("Dropping request due to rate limiting");
                        return 0;
@@ -1621,7 +1704,7 @@ skip_dup:
                } else {
                        RDEBUG("Not sending reply");
                }
-               request_free(&request);
+               talloc_free(request);
                return 1;
        }
 
@@ -1644,10 +1727,10 @@ static REQUEST *request_setup(rad_listen_t *listener, RADIUS_PACKET *packet,
         *      Create and initialize the new request.
         */
        request = request_alloc(NULL);
-       request->reply = rad_alloc(request, 0);
+       request->reply = rad_alloc(request, false);
        if (!request->reply) {
                ERROR("No memory");
-               request_free(&request);
+               talloc_free(request);
                return NULL;
        }
 
@@ -1669,7 +1752,7 @@ static REQUEST *request_setup(rad_listen_t *listener, RADIUS_PACKET *packet,
 
 #ifdef WITH_STATS
        request->listener->stats.last_packet = request->packet->timestamp.tv_sec;
-       if (packet->code == PW_CODE_AUTHENTICATION_REQUEST) {
+       if (packet->code == PW_CODE_ACCESS_REQUEST) {
                request->client->auth.last_packet = request->packet->timestamp.tv_sec;
                radius_auth_stats.last_packet = request->packet->timestamp.tv_sec;
 #ifdef WITH_ACCOUNTING
@@ -1696,7 +1779,7 @@ static REQUEST *request_setup(rad_listen_t *listener, RADIUS_PACKET *packet,
                request->server = NULL;
        }
 
-       request->root = &mainconfig;
+       request->root = &main_config;
 #ifdef WITH_TCP
        request->listener->count++;
 #endif
@@ -1740,7 +1823,7 @@ static REQUEST *request_setup(rad_listen_t *listener, RADIUS_PACKET *packet,
  */
 static void tcp_socket_timer(void *ctx)
 {
-       rad_listen_t *listener = ctx;
+       rad_listen_t *listener = talloc_get_type_abort(ctx, rad_listen_t);
        listen_socket_t *sock = listener->data;
        struct timeval end, now;
        char buffer[256];
@@ -1854,7 +1937,7 @@ static void add_jitter(struct timeval *when)
  */
 static int eol_proxy_listener(void *ctx, void *data)
 {
-       rad_listen_t *this = ctx;
+       rad_listen_t *this = talloc_get_type_abort(ctx, rad_listen_t);
        RADIUS_PACKET **proxy_p = data;
        REQUEST *request;
 
@@ -1883,7 +1966,7 @@ static int eol_proxy_listener(void *ctx, void *data)
 
 static int eol_listener(void *ctx, void *data)
 {
-       rad_listen_t *this = ctx;
+       rad_listen_t *this = talloc_get_type_abort(ctx, rad_listen_t);
        RADIUS_PACKET **packet_p = data;
        REQUEST *request;
 
@@ -1908,6 +1991,8 @@ static int eol_listener(void *ctx, void *data)
  */
 static void remove_from_proxy_hash_nl(REQUEST *request, bool yank)
 {
+       VERIFY_REQUEST(request);
+
        if (!request->in_proxy_hash) return;
 
        fr_packet_list_id_free(proxy_list, request->proxy, yank);
@@ -1951,6 +2036,8 @@ static void remove_from_proxy_hash_nl(REQUEST *request, bool yank)
 
 static void remove_from_proxy_hash(REQUEST *request)
 {
+       VERIFY_REQUEST(request);
+
        /*
         *      Check this without grabbing the mutex because it's a
         *      lot faster that way.
@@ -1980,6 +2067,8 @@ static int insert_into_proxy_hash(REQUEST *request)
        int rcode, tries;
        void *proxy_listener;
 
+       VERIFY_REQUEST(request);
+
        rad_assert(request->proxy != NULL);
        rad_assert(request->home_server != NULL);
        rad_assert(proxy_list != NULL);
@@ -1992,6 +2081,7 @@ static int insert_into_proxy_hash(REQUEST *request)
 
        for (tries = 0; tries < 2; tries++) {
                rad_listen_t *this;
+               listen_socket_t *sock;
 
                RDEBUG3("proxy: Trying to allocate ID (%d/2)", tries);
                rcode = fr_packet_list_id_alloc(proxy_list,
@@ -2017,6 +2107,28 @@ static int insert_into_proxy_hash(REQUEST *request)
                request->proxy->src_port = 0; /* Use any new socket */
                proxy_listener = this;
 
+               sock = this->data;
+               if (!fr_packet_list_socket_add(proxy_list, this->fd,
+                                              sock->proto,
+                                              &sock->other_ipaddr, sock->other_port,
+                                              this)) {
+
+#ifdef HAVE_PTHREAD_H
+                       proxy_no_new_sockets = true;
+#endif
+                       PTHREAD_MUTEX_UNLOCK(&proxy_mutex);
+
+                       /*
+                        *      This is bad.  However, the
+                        *      packet list now supports 256
+                        *      open sockets, which should
+                        *      minimize this problem.
+                        */
+                       ERROR("Failed adding proxy socket: %s",
+                             fr_strerror());
+                       goto fail;
+               }
+
                /*
                 *      Add it to the event loop.  Ensure that we have
                 *      only one mutex locked at a time.
@@ -2054,7 +2166,7 @@ static int insert_into_proxy_hash(REQUEST *request)
 
        PTHREAD_MUTEX_UNLOCK(&proxy_mutex);
 
-       RDEBUG3(" proxy: allocating destination %s port %d - Id %d",
+       RDEBUG3("proxy: allocating destination %s port %d - Id %d",
               inet_ntop(request->proxy->dst_ipaddr.af,
                         &request->proxy->dst_ipaddr.ipaddr, buf, sizeof(buf)),
               request->proxy->dst_port,
@@ -2063,12 +2175,19 @@ static int insert_into_proxy_hash(REQUEST *request)
        return 1;
 }
 
-static int process_proxy_reply(REQUEST *request)
+static int process_proxy_reply(REQUEST *request, RADIUS_PACKET *reply)
 {
        int rcode;
        int post_proxy_type = 0;
        VALUE_PAIR *vp;
 
+       VERIFY_REQUEST(request);
+
+       /*
+        *      There may be a proxy reply, but it may be too late.
+        */
+       if (!request->proxy_listener) return 0;
+
        /*
         *      Delete any reply we had accumulated until now.
         */
@@ -2084,8 +2203,8 @@ static int process_proxy_reply(REQUEST *request)
         *      If we have a proxy_reply, and it was a reject, setup
         *      post-proxy-type Reject
         */
-       if (!vp && request->proxy_reply &&
-           request->proxy_reply->code == PW_CODE_AUTHENTICATION_REJECT) {
+       if (!vp && reply &&
+           reply->code == PW_CODE_ACCESS_REJECT) {
                DICT_VALUE      *dval;
 
                dval = dict_valbyname(PW_POST_PROXY_TYPE, 0, "Reject");
@@ -2100,18 +2219,40 @@ static int process_proxy_reply(REQUEST *request)
        if (vp) {
                post_proxy_type = vp->vp_integer;
 
-               RDEBUG2("  Found Post-Proxy-Type %s",
-                       dict_valnamebyattr(PW_POST_PROXY_TYPE, 0,
-                                          post_proxy_type));
+               RDEBUG2("Found Post-Proxy-Type %s", dict_valnamebyattr(PW_POST_PROXY_TYPE, 0, post_proxy_type));
+       }
+
+       if (reply) {
+               VERIFY_PACKET(reply);
+               /*
+                *      Decode the packet.
+                */
+               rcode = request->proxy_listener->decode(request->proxy_listener, request);
+               DEBUG_PACKET(request, reply, 0);
+
+               /*
+                *      Pro-actively remove it from the proxy hash.
+                *      This is later than in 2.1.x, but it means that
+                *      the replies are authenticated before being
+                *      removed from the hash.
+                */
+               if ((rcode == 0) &&
+                   (request->num_proxied_requests <= request->num_proxied_responses)) {
+                       remove_from_proxy_hash(request);
+               }
+       } else {
+               remove_from_proxy_hash(request);
        }
 
        if (request->home_pool && request->home_pool->virtual_server) {
                char const *old_server = request->server;
 
                request->server = request->home_pool->virtual_server;
-               RDEBUG2(" server %s {", request->server);
+               RDEBUG2("server %s {", request->server);
+               RINDENT();
                rcode = process_post_proxy(post_proxy_type, request);
-               RDEBUG2(" }");
+               REXDENT();
+               RDEBUG2("}");
                request->server = old_server;
        } else {
                rcode = process_post_proxy(post_proxy_type, request);
@@ -2130,25 +2271,15 @@ static int process_proxy_reply(REQUEST *request)
         *      There may NOT be a proxy reply, as we may be
         *      running Post-Proxy-Type = Fail.
         */
-       if (request->proxy_reply) {
+       if (reply) {
+               pairadd(&request->reply->vps, paircopy(request->reply, reply->vps));
+
                /*
                 *      Delete the Proxy-State Attributes from
                 *      the reply.  These include Proxy-State
                 *      attributes from us and remote server.
                 */
-               pairdelete(&request->proxy_reply->vps, PW_PROXY_STATE, 0, TAG_ANY);
-
-               /*
-                *      Add the attributes left in the proxy
-                *      reply to the reply list.
-                */
-               pairfilter(request->reply, &request->reply->vps,
-                         &request->proxy_reply->vps, 0, 0, TAG_ANY);
-
-               /*
-                *      Free proxy request pairs.
-                */
-               pairfree(&request->proxy->vps);
+               pairdelete(&request->reply->vps, PW_PROXY_STATE, 0, TAG_ANY);
        }
 
        switch (rcode) {
@@ -2171,6 +2302,8 @@ int request_proxy_reply(RADIUS_PACKET *packet)
        struct timeval now;
        char buffer[128];
 
+       VERIFY_PACKET(packet);
+
        PTHREAD_MUTEX_LOCK(&proxy_mutex);
        proxy_p = fr_packet_list_find_byreply(proxy_list, packet);
 
@@ -2243,7 +2376,7 @@ int request_proxy_reply(RADIUS_PACKET *packet)
         *      Call the state machine to do something useful with the
         *      request.
         */
-       request->proxy_reply = packet;
+       request->proxy_reply = talloc_steal(request, packet);
        packet->timestamp = now;
        request->priority = RAD_LISTEN_PROXY;
 
@@ -2253,13 +2386,14 @@ int request_proxy_reply(RADIUS_PACKET *packet)
         */
        if (request->home_server->state == HOME_STATE_UNKNOWN) {
                request->home_server->state = HOME_STATE_ALIVE;
+               request->home_server->response_timeouts = 0;
        }
 
 #ifdef WITH_STATS
        request->home_server->stats.last_packet = packet->timestamp.tv_sec;
        request->proxy_listener->stats.last_packet = packet->timestamp.tv_sec;
 
-       if (request->proxy->code == PW_CODE_AUTHENTICATION_REQUEST) {
+       if (request->proxy->code == PW_CODE_ACCESS_REQUEST) {
                proxy_auth_stats.last_packet = packet->timestamp.tv_sec;
 #ifdef WITH_ACCOUNTING
        } else if (request->proxy->code == PW_CODE_ACCOUNTING_REQUEST) {
@@ -2294,7 +2428,9 @@ static int setup_post_proxy_fail(REQUEST *request)
        DICT_VALUE const *dval = NULL;
        VALUE_PAIR *vp;
 
-       if (request->proxy->code == PW_CODE_AUTHENTICATION_REQUEST) {
+       VERIFY_REQUEST(request);
+
+       if (request->proxy->code == PW_CODE_ACCESS_REQUEST) {
                dval = dict_valbyname(PW_POST_PROXY_TYPE, 0,
                                      "Fail-Authentication");
 
@@ -2330,6 +2466,8 @@ static int setup_post_proxy_fail(REQUEST *request)
 
 STATE_MACHINE_DECL(proxy_no_reply)
 {
+       VERIFY_REQUEST(request);
+
        TRACE_STATE_MACHINE;
 
        switch (action) {
@@ -2341,10 +2479,10 @@ STATE_MACHINE_DECL(proxy_no_reply)
                break;
 
        case FR_ACTION_RUN:
-               /*
-                *      Which will take care of calling post-proxy-type fail.
-                */
-               request_running(request, FR_ACTION_PROXY_REPLY);
+               if (process_proxy_reply(request, NULL)) {
+                       request_finish(request, action);
+               }
+               request_done(request, FR_ACTION_DONE);
                break;
 
        default:
@@ -2355,6 +2493,8 @@ STATE_MACHINE_DECL(proxy_no_reply)
 
 STATE_MACHINE_DECL(proxy_running)
 {
+       VERIFY_REQUEST(request);
+
        TRACE_STATE_MACHINE;
 
        switch (action) {
@@ -2366,7 +2506,12 @@ STATE_MACHINE_DECL(proxy_running)
                break;
 
        case FR_ACTION_RUN:
-               request_running(request, action);
+               if (process_proxy_reply(request, request->proxy_reply)) {
+                       request->handle(request);
+                       request_finish(request, action);
+               } else {
+                       request_done(request, FR_ACTION_DONE);
+               }
                break;
 
        default:
@@ -2384,6 +2529,8 @@ static int request_will_proxy(REQUEST *request)
        REALM *realm = NULL;
        home_pool_t *pool = NULL;
 
+       VERIFY_REQUEST(request);
+
        if (!request->root->proxy_requests) return 0;
        if (request->packet->dst_port == 0) return 0;
        if (request->packet->code == PW_CODE_STATUS_SERVER) return 0;
@@ -2408,7 +2555,7 @@ static int request_will_proxy(REQUEST *request)
                /*
                 *      Figure out which pool to use.
                 */
-               if (request->packet->code == PW_CODE_AUTHENTICATION_REQUEST) {
+               if (request->packet->code == PW_CODE_ACCESS_REQUEST) {
                        pool = realm->auth_pool;
 
 #ifdef WITH_ACCOUNTING
@@ -2433,7 +2580,7 @@ static int request_will_proxy(REQUEST *request)
                if (!vp) return 0;
 
                switch (request->packet->code) {
-               case PW_CODE_AUTHENTICATION_REQUEST:
+               case PW_CODE_ACCESS_REQUEST:
                        pool_type = HOME_TYPE_AUTH;
                        break;
 
@@ -2535,7 +2682,7 @@ static int request_will_proxy(REQUEST *request)
         *      since we can't use the request authenticator
         *      anymore - we changed it.
         */
-       if ((request->packet->code == PW_CODE_AUTHENTICATION_REQUEST) &&
+       if ((request->packet->code == PW_CODE_ACCESS_REQUEST) &&
            pairfind(request->proxy->vps, PW_CHAP_PASSWORD, 0, TAG_ANY) &&
            pairfind(request->proxy->vps, PW_CHAP_CHALLENGE, 0, TAG_ANY) == NULL) {
                vp = radius_paircreate(request->proxy, &request->proxy->vps, PW_CHAP_CHALLENGE, 0);
@@ -2563,7 +2710,7 @@ static int request_will_proxy(REQUEST *request)
                DICT_VALUE const *dval = dict_valbyattr(vp->da->attr, vp->da->vendor, vp->vp_integer);
                /* Must be a validation issue */
                rad_assert(dval);
-               RDEBUG2("  Found Pre-Proxy-Type %s", dval->name);
+               RDEBUG2("Found Pre-Proxy-Type %s", dval->name);
                pre_proxy_type = vp->vp_integer;
        }
 
@@ -2573,10 +2720,14 @@ static int request_will_proxy(REQUEST *request)
                char const *old_server = request->server;
 
                request->server = request->home_pool->virtual_server;
-               RDEBUG2(" server %s {", request->server);
+
+               RDEBUG2("server %s {", request->server);
+               RINDENT();
                rcode = process_pre_proxy(pre_proxy_type, request);
-               RDEBUG2(" }");
-                       request->server = old_server;
+               REXDENT();
+               RDEBUG2("}");
+
+               request->server = old_server;
        } else {
                rcode = process_pre_proxy(pre_proxy_type, request);
        }
@@ -2609,6 +2760,8 @@ static int request_proxy(REQUEST *request, int retransmit)
 {
        char buffer[128];
 
+       VERIFY_REQUEST(request);
+
        rad_assert(request->parent == NULL);
        rad_assert(request->home_server != NULL);
 
@@ -2636,7 +2789,7 @@ static int request_proxy(REQUEST *request, int retransmit)
                REQUEST *fake;
 
                if (request->packet->dst_port == 0) {
-                       WARN("Cannot proxy an internal request.");
+                       WARN("Cannot proxy an internal request");
                        return 0;
                }
 
@@ -2671,13 +2824,13 @@ static int request_proxy(REQUEST *request, int retransmit)
                request->proxy_reply = talloc_steal(request, fake->reply);
                fake->reply = NULL;
 
-               request_free(&fake);
+               talloc_free(fake);
 
                /*
                 *      Just do the work here, rather than trying to
                 *      run the "decode proxy reply" stuff...
                 */
-               process_proxy_reply(request);
+               process_proxy_reply(request, request->proxy_reply);
 
                request->handle(request); /* to do more post-proxy stuff */
 
@@ -2688,28 +2841,36 @@ static int request_proxy(REQUEST *request, int retransmit)
         *      We're actually sending a proxied packet.  Do that now.
         */
        if (!request->in_proxy_hash && !insert_into_proxy_hash(request)) {
-               ERROR("Failed to insert request into the proxy list.");
+               ERROR("Failed to insert request into the proxy list");
                return -1;
        }
 
        rad_assert(request->proxy->id >= 0);
 
+       if (debug_flag) {
+               struct timeval *response_window;
+
+               response_window = request_response_window(request);
+
 #ifdef WITH_TLS
-       if (request->home_server->tls) {
-               RDEBUG2("Proxying request to home server %s port %d (TLS)",
-                       inet_ntop(request->proxy->dst_ipaddr.af,
-                                 &request->proxy->dst_ipaddr.ipaddr,
-                                 buffer, sizeof(buffer)),
-                       request->proxy->dst_port);
-       } else
+               if (request->home_server->tls) {
+                       RDEBUG2("Proxying request to home server %s port %d (TLS) timeout %d.%06d",
+                               inet_ntop(request->proxy->dst_ipaddr.af,
+                                         &request->proxy->dst_ipaddr.ipaddr,
+                                         buffer, sizeof(buffer)),
+                               request->proxy->dst_port,
+                               (int) response_window->tv_sec, (int) response_window->tv_usec);
+               } else
 #endif
-       RDEBUG2("Proxying request to home server %s port %d",
-              inet_ntop(request->proxy->dst_ipaddr.af,
-                        &request->proxy->dst_ipaddr.ipaddr,
-                        buffer, sizeof(buffer)),
-               request->proxy->dst_port);
+                       RDEBUG2("Proxying request to home server %s port %d timeout %d.%06d",
+                               inet_ntop(request->proxy->dst_ipaddr.af,
+                                         &request->proxy->dst_ipaddr.ipaddr,
+                                         buffer, sizeof(buffer)),
+                               request->proxy->dst_port,
+                               (int) response_window->tv_sec, (int) response_window->tv_usec);
 
-       DEBUG_PACKET(request, request->proxy, 1);
+               DEBUG_PACKET(request, request->proxy, 1);
+       }
 
        gettimeofday(&request->proxy_retransmit, NULL);
        if (!retransmit) {
@@ -2732,6 +2893,8 @@ static int request_proxy_anew(REQUEST *request)
 {
        home_server_t *home;
 
+       VERIFY_REQUEST(request);
+
        /*
         *      Delete the request from the proxy list.
         *
@@ -2761,7 +2924,7 @@ static int request_proxy_anew(REQUEST *request)
        home_server_update_request(home, request);
 
        if (!insert_into_proxy_hash(request)) {
-               RPROXY("Failed to insert retransmission into the proxy list.");
+               RPROXY("Failed to insert retransmission into the proxy list");
                goto post_proxy_fail;
        }
 
@@ -2802,6 +2965,8 @@ STATE_MACHINE_DECL(request_ping)
        home_server_t *home = request->home_server;
        char buffer[128];
 
+       VERIFY_REQUEST(request);
+
        TRACE_STATE_MACHINE;
        ASSERT_MASTER;
 
@@ -2852,6 +3017,7 @@ STATE_MACHINE_DECL(request_ping)
                 *      pings.
                 */
                home->state = HOME_STATE_ALIVE;
+               home->response_timeouts = 0;
                exec_trigger(request, home->cs, "home_server.alive", false);
                home->currently_outstanding = 0;
                home->num_sent_pings = 0;
@@ -2883,7 +3049,7 @@ STATE_MACHINE_DECL(request_ping)
  */
 static void ping_home_server(void *ctx)
 {
-       home_server_t *home = ctx;
+       home_server_t *home = talloc_get_type_abort(ctx, home_server_t);
        REQUEST *request;
        VALUE_PAIR *vp;
        struct timeval when, now;
@@ -2914,7 +3080,7 @@ static void ping_home_server(void *ctx)
        request->number = request_num_counter++;
        NO_CHILD_THREAD;
 
-       request->proxy = rad_alloc(request, 1);
+       request->proxy = rad_alloc(request, true);
        rad_assert(request->proxy != NULL);
 
        if (home->ping_check == HOME_PING_CHECK_STATUS_SERVER) {
@@ -2924,7 +3090,7 @@ static void ping_home_server(void *ctx)
                         "Message-Authenticator", "0x00", T_OP_SET);
 
        } else if (home->type == HOME_TYPE_AUTH) {
-               request->proxy->code = PW_CODE_AUTHENTICATION_REQUEST;
+               request->proxy->code = PW_CODE_ACCESS_REQUEST;
 
                pairmake(request->proxy, &request->proxy->vps,
                         "User-Name", home->ping_user_name, T_OP_SET);
@@ -2985,7 +3151,7 @@ static void ping_home_server(void *ctx)
                rad_assert(!request->in_request_hash);
                rad_assert(!request->in_proxy_hash);
                rad_assert(request->ev == NULL);
-               request_free(&request);
+               talloc_free(request);
                return;
        }
 
@@ -3032,7 +3198,7 @@ static void home_trigger(home_server_t *home, char const *trigger)
        exec_trigger(&my_request, home->cs, trigger, false);
 }
 
-static void mark_home_server_zombie(home_server_t *home, struct timeval *now)
+static void mark_home_server_zombie(home_server_t *home, struct timeval *now, struct timeval *response_window)
 {
        time_t start;
        char buffer[128];
@@ -3079,10 +3245,10 @@ static void mark_home_server_zombie(home_server_t *home, struct timeval *now)
        home->num_sent_pings = 0;
        home->num_received_pings = 0;
 
-       PROXY( "Marking home server %s port %d as zombie (it has not responded in %d seconds).",
+       PROXY( "Marking home server %s port %d as zombie (it has not responded in %d.%06d seconds).",
               inet_ntop(home->ipaddr.af, &home->ipaddr.ipaddr,
                         buffer, sizeof(buffer)),
-              home->port, home->response_window);
+              home->port, (int) response_window->tv_sec, (int) response_window->tv_usec);
 
        ping_home_server(home);
 }
@@ -3090,7 +3256,7 @@ static void mark_home_server_zombie(home_server_t *home, struct timeval *now)
 
 void revive_home_server(void *ctx)
 {
-       home_server_t *home = ctx;
+       home_server_t *home = talloc_get_type_abort(ctx, home_server_t);
        char buffer[128];
 
 #ifdef WITH_TCP
@@ -3098,6 +3264,7 @@ void revive_home_server(void *ctx)
 #endif
 
        home->state = HOME_STATE_ALIVE;
+       home->response_timeouts = 0;
        home_trigger(home, "home_server.alive");
        home->currently_outstanding = 0;
        gettimeofday(&home->revive_time, NULL);
@@ -3163,9 +3330,12 @@ void mark_home_server_dead(home_server_t *home, struct timeval *when)
 STATE_MACHINE_DECL(proxy_wait_for_reply)
 {
        struct timeval now, when;
+       struct timeval *response_window = NULL;
        home_server_t *home = request->home_server;
        char buffer[128];
 
+       VERIFY_REQUEST(request);
+
        TRACE_STATE_MACHINE;
 
        rad_assert(request->packet->code != PW_CODE_STATUS_SERVER);
@@ -3257,6 +3427,8 @@ STATE_MACHINE_DECL(proxy_wait_for_reply)
                break;
 
        case FR_ACTION_TIMER:
+               response_window = request_response_window(request);
+
 #ifdef WITH_TCP
                if (!request->proxy_listener ||
                    (request->proxy_listener->status != RAD_LISTEN_STATUS_KNOWN)) {
@@ -3282,14 +3454,18 @@ STATE_MACHINE_DECL(proxy_wait_for_reply)
                         *      responding to other (better looking) packets.
                         */
                        when = request->proxy->timestamp;
-                       when.tv_sec += home->response_window;
+                       timeradd(&when, response_window, &when);
 
                        /*
                         *      Not at the response window.  Set the timer for
                         *      that.
                         */
                        if (timercmp(&when, &now, >)) {
-                               RDEBUG("Expecting proxy response no later than %d seconds from now", home->response_window);
+                               struct timeval diff;
+                               timersub(&when, &now, &diff);
+
+                               RDEBUG("Expecting proxy response no later than %d.%06d seconds from now",
+                                      (int) diff.tv_sec, (int) diff.tv_usec);
                                STATE_MACHINE_TIMER(FR_ACTION_TIMER);
                                return;
                        }
@@ -3315,7 +3491,9 @@ STATE_MACHINE_DECL(proxy_wait_for_reply)
                    && (home->proto != IPPROTO_TCP)
 #endif
                        ) {
-                       mark_home_server_zombie(home, &now);
+                       home->response_timeouts++;
+                       if (home->response_timeouts >= home->max_response_timeouts)
+                               mark_home_server_zombie(home, &now, response_window);
                }
 
                FR_STATS_TYPE_INC(home->stats.total_timeouts);
@@ -3336,23 +3514,18 @@ STATE_MACHINE_DECL(proxy_wait_for_reply)
                 *      may have failed over to another home server.
                 *      But that one may be dead, too.
                 */
-               RERROR("Failing request - proxy ID %u, due to lack of any response from home server %s port %d",
-                      request->proxy->id,
+               RERROR("Failing proxied request, due to lack of any response from home server %s port %d",
                               inet_ntop(request->proxy->dst_ipaddr.af,
                                         &request->proxy->dst_ipaddr.ipaddr,
                                         buffer, sizeof(buffer)),
                               request->proxy->dst_port);
 
-               if (!setup_post_proxy_fail(request)) {
+               if (setup_post_proxy_fail(request)) {
+                       request_queue_or_run(request, proxy_no_reply);
+               } else {
                        gettimeofday(&request->reply->timestamp, NULL);
                        request_cleanup_delay_init(request, NULL);
-                       return;
                }
-
-               /*
-                *      Remember that we didn't have a reply.
-                */
-               request_queue_or_run(request, proxy_no_reply);
                break;
 
                /*
@@ -3397,7 +3570,8 @@ static void request_coa_originate(REQUEST *request)
        fr_ipaddr_t ipaddr;
        char buffer[256];
 
-       rad_assert(request != NULL);
+       VERIFY_REQUEST(request);
+
        rad_assert(request->coa != NULL);
        rad_assert(request->proxy == NULL);
        rad_assert(!request->in_proxy_hash);
@@ -3414,7 +3588,7 @@ static void request_coa_originate(REQUEST *request)
        if (vp) {
                if (vp->vp_integer == 0) {
                fail:
-                       request_free(&request->coa);
+                       TALLOC_FREE(request->coa);
                        return;
                }
        }
@@ -3472,7 +3646,7 @@ static void request_coa_originate(REQUEST *request)
                home_server_update_request(coa->home_server, coa);
 
        } else if (!coa->home_server) {
-               int port = PW_COA_UDP_PORT;
+               uint16_t port = PW_COA_UDP_PORT;
 
                vp = pairfind(coa->proxy->vps, PW_PACKET_DST_PORT, 0, TAG_ANY);
                if (vp) port = vp->vp_integer;
@@ -3527,7 +3701,7 @@ static void request_coa_originate(REQUEST *request)
                DICT_VALUE const *dval = dict_valbyattr(vp->da->attr, vp->da->vendor, vp->vp_integer);
                /* Must be a validation issue */
                rad_assert(dval);
-               RDEBUG2("  Found Pre-Proxy-Type %s", dval->name);
+               RDEBUG2("Found Pre-Proxy-Type %s", dval->name);
                pre_proxy_type = vp->vp_integer;
        }
 
@@ -3535,9 +3709,11 @@ static void request_coa_originate(REQUEST *request)
                char const *old_server = coa->server;
 
                coa->server = coa->home_pool->virtual_server;
-               RDEBUG2(" server %s {", coa->server);
+               RDEBUG2("server %s {", coa->server);
+               RINDENT();
                rcode = process_pre_proxy(pre_proxy_type, coa);
-               RDEBUG2(" }");
+               REXDENT();
+               RDEBUG2("}");
                coa->server = old_server;
        } else {
                rcode = process_pre_proxy(pre_proxy_type, coa);
@@ -3563,7 +3739,7 @@ static void request_coa_originate(REQUEST *request)
        coa->proxy->dst_port = coa->home_server->port;
 
        if (!insert_into_proxy_hash(coa)) {
-               radlog_request(L_PROXY, 0, coa, "Failed to insert CoA request into proxy list.");
+               radlog_request(L_PROXY, 0, coa, "Failed to insert CoA request into proxy list");
                goto fail;
        }
 
@@ -3601,9 +3777,11 @@ static void request_coa_originate(REQUEST *request)
 
 static void coa_timer(REQUEST *request)
 {
-       int delay, frac;
+       uint32_t delay, frac;
        struct timeval now, when, mrd;
 
+       VERIFY_REQUEST(request);
+
        rad_assert(request->parent == NULL);
 
        if (request->proxy_reply) return request_process_timer(request);
@@ -3654,12 +3832,12 @@ static void coa_timer(REQUEST *request)
                                         &request->proxy->dst_ipaddr.ipaddr,
                                         buffer, sizeof(buffer)),
                               request->proxy->dst_port);
-               if (!setup_post_proxy_fail(request)) {
+
+               if (setup_post_proxy_fail(request)) {
+                       request_queue_or_run(request, coa_no_reply);
+               } else {
                        request_done(request, FR_ACTION_DONE);
-                       return;
                }
-
-               request_queue_or_run(request, coa_running);
                return;
        }
 
@@ -3725,6 +3903,8 @@ STATE_MACHINE_DECL(coa_wait_for_reply)
 {
        rad_assert(request->parent == NULL);
 
+       VERIFY_REQUEST(request);
+
        TRACE_STATE_MACHINE;
 
        switch (action) {
@@ -3737,19 +3917,7 @@ STATE_MACHINE_DECL(coa_wait_for_reply)
 
        case FR_ACTION_PROXY_REPLY:
                rad_assert(request->parent == NULL);
-#ifdef HAVE_PTHREAD_H
-               /*
-                *      Catch the case of a proxy reply when called
-                *      from the main worker thread.
-                */
-               if (we_are_master()) {
-                       request_queue_or_run(request, coa_running);
-                       return;
-               }
-               /* FALL-THROUGH */
-#endif
-       case FR_ACTION_RUN:
-               request_running(request, action);
+               request_queue_or_run(request, coa_running);
                break;
 
        default:
@@ -3763,6 +3931,9 @@ static void request_coa_separate(REQUEST *request)
 #ifdef DEBUG_STATE_MACHINE
        int action = FR_ACTION_TIMER;
 #endif
+
+       VERIFY_REQUEST(request);
+
        TRACE_STATE_MACHINE;
 
        rad_assert(request->parent != NULL);
@@ -3783,8 +3954,45 @@ static void request_coa_separate(REQUEST *request)
        request->process(request, FR_ACTION_TIMER);
 }
 
+STATE_MACHINE_DECL(coa_no_reply)
+{
+       char buffer[128];
+
+       VERIFY_REQUEST(request);
+
+       TRACE_STATE_MACHINE;
+
+       switch (action) {
+       case FR_ACTION_TIMER:
+               request_common(request, action);
+               break;
+
+       case FR_ACTION_PROXY_REPLY: /* too late! */
+               RDEBUG2("Reply from CoA server %s port %d  - ID: %d arrived too late.",
+                       inet_ntop(request->proxy->src_ipaddr.af,
+                                 &request->proxy->src_ipaddr.ipaddr,
+                                 buffer, sizeof(buffer)),
+                       request->proxy->dst_port, request->proxy->id);
+               break;
+
+       case FR_ACTION_RUN:
+               /*
+                *      FIXME: do recv_coa Fail
+                */
+               (void) process_proxy_reply(request, NULL);
+               request_done(request, FR_ACTION_DONE);
+               break;
+
+       default:
+               RDEBUG3("%s: Ignoring action %s", __FUNCTION__, action_codes[action]);
+               break;
+       }
+}
+
 STATE_MACHINE_DECL(coa_running)
 {
+       VERIFY_REQUEST(request);
+
        TRACE_STATE_MACHINE;
 
        switch (action) {
@@ -3797,7 +4005,12 @@ STATE_MACHINE_DECL(coa_running)
                break;
 
        case FR_ACTION_RUN:
-               request_running(request, FR_ACTION_PROXY_REPLY);
+               if (process_proxy_reply(request, request->proxy_reply)) {
+                       request->handle(request);
+                       request_finish(request, action);
+               } else {
+                       request_done(request, FR_ACTION_DONE);
+               }
                break;
 
        default:
@@ -3820,7 +4033,7 @@ STATE_MACHINE_DECL(coa_running)
  ***********************************************************************/
 static void event_socket_handler(UNUSED fr_event_list_t *xel, UNUSED int fd, void *ctx)
 {
-       rad_listen_t *listener = ctx;
+       rad_listen_t *listener = talloc_get_type_abort(ctx, rad_listen_t);
 
        rad_assert(xel == el);
 
@@ -3852,7 +4065,7 @@ static void event_socket_handler(UNUSED fr_event_list_t *xel, UNUSED int fd, voi
 static void event_poll_detail(void *ctx)
 {
        int delay;
-       rad_listen_t *this = ctx;
+       rad_listen_t *this = talloc_get_type_abort(ctx, rad_listen_t);
        struct timeval when, now;
        listen_detail_t *detail = this->data;
 
@@ -3890,14 +4103,14 @@ static void event_status(struct timeval *wake)
 
        if (debug_flag == 0) {
                if (just_started) {
-                       INFO("Ready to process requests.");
+                       INFO("Ready to process requests");
                        just_started = false;
                }
                return;
        }
 
        if (!wake) {
-               INFO("Ready to process requests.");
+               INFO("Ready to process requests");
 
        } else if ((wake->tv_sec != 0) ||
                   (wake->tv_usec >= 100000)) {
@@ -3928,7 +4141,7 @@ static void event_status(struct timeval *wake)
 #ifdef WITH_TCP
 static void listener_free_cb(void *ctx)
 {
-       rad_listen_t *this = ctx;
+       rad_listen_t *this = talloc_get_type_abort(ctx, rad_listen_t);
        char buffer[1024];
 
        if (this->count > 0) {
@@ -4042,29 +4255,6 @@ static int event_new_fd(rad_listen_t *this)
                 *      added to the packet list.
                 */
                case RAD_LISTEN_PROXY:
-                       PTHREAD_MUTEX_LOCK(&proxy_mutex);
-                       if (!fr_packet_list_socket_add(proxy_list, this->fd,
-                                                      sock->proto,
-                                                      &sock->other_ipaddr, sock->other_port,
-                                                      this)) {
-
-#ifdef HAVE_PTHREAD_H
-                               proxy_no_new_sockets = true;
-#endif
-                               PTHREAD_MUTEX_UNLOCK(&proxy_mutex);
-
-                               /*
-                                *      This is bad.  However, the
-                                *      packet list now supports 256
-                                *      open sockets, which should
-                                *      minimize this problem.
-                                */
-                               ERROR("Failed adding proxy socket: %s",
-                                      fr_strerror());
-                               return 0;
-                       }
-                       PTHREAD_MUTEX_UNLOCK(&proxy_mutex);
-
 #ifdef WITH_TCP
                        /*
                         *      Add timers to outgoing child sockets, if necessary.
@@ -4314,7 +4504,7 @@ static void handle_signal_self(int flag)
                        return;
                }
 
-               INFO("Received HUP signal.");
+               INFO("Received HUP signal");
 
                last_hup = when;
 
@@ -4330,7 +4520,7 @@ static void handle_signal_self(int flag)
                /*
                 *      FIXME: O(N) loops suck.
                 */
-               for (this = mainconfig.listen;
+               for (this = main_config.listen;
                     this != NULL;
                     this = this->next) {
                        if (this->type != RAD_LISTEN_DETAIL) continue;
@@ -4414,7 +4604,7 @@ void radius_signal_self(int flag)
 
        buffer[0] |= flag;
 
-       write(self_pipe[1], buffer, 1);
+       if (write(self_pipe[1], buffer, 1) < 0) fr_exit(0);
 }
 
 
@@ -4462,19 +4652,20 @@ int radius_event_start(CONF_SECTION *cs, bool have_children)
 
        time(&fr_start_time);
 
-       /*
-        *  radius_event_init() must be called first
-        */
-       rad_assert(el);
-       if (fr_start_time == (time_t)-1) return 0;
+       if (!check_config) {
+               /*
+                *  radius_event_init() must be called first
+                */
+               rad_assert(el);
 
-       pl = fr_packet_list_create(0);
-       if (!pl) return 0;      /* leak el */
+               pl = fr_packet_list_create(0);
+               if (!pl) return 0;      /* leak el */
+       }
 
        request_num_counter = 0;
 
 #ifdef WITH_PROXY
-       if (mainconfig.proxy_requests) {
+       if (main_config.proxy_requests) {
                /*
                 *      Create the tree for managing proxied requests and
                 *      responses.
@@ -4489,6 +4680,17 @@ int radius_event_start(CONF_SECTION *cs, bool have_children)
                        fr_exit(1);
                }
 #endif
+
+               /*
+                *      The "init_delay" is set to "response_window".
+                *      Reset it to half of "response_window" in order
+                *      to give the event loop enough time to service
+                *      the event before hitting "response_window".
+                */
+               main_config.init_delay.tv_usec += (main_config.init_delay.tv_sec & 0x01) * USEC;
+               main_config.init_delay.tv_usec >>= 1;
+               main_config.init_delay.tv_sec >>= 1;
+
        }
 #endif
 
@@ -4514,7 +4716,7 @@ int radius_event_start(CONF_SECTION *cs, bool have_children)
 
        if (check_config) {
                DEBUG("%s: #### Skipping IP addresses and Ports ####",
-                      mainconfig.name);
+                      main_config.name);
                if (listen_init(cs, &head, spawn_flag) < 0) {
                        fflush(NULL);
                        fr_exit(1);
@@ -4553,7 +4755,7 @@ int radius_event_start(CONF_SECTION *cs, bool have_children)
 #endif
 
        DEBUG("%s: #### Opening IP addresses and Ports ####",
-              mainconfig.name);
+              main_config.name);
 
        /*
        *       The server temporarily switches to an unprivileged
@@ -4568,7 +4770,7 @@ int radius_event_start(CONF_SECTION *cs, bool have_children)
                fr_exit_now(1);
        }
 
-       mainconfig.listen = head;
+       main_config.listen = head;
 
        /*
         *      At this point, no one has any business *ever* going
@@ -4585,6 +4787,8 @@ static int proxy_delete_cb(UNUSED void *ctx, void *data)
 {
        REQUEST *request = fr_packet2myptr(REQUEST, proxy, data);
 
+       VERIFY_REQUEST(request);
+
        request->master_state = REQUEST_STOP_PROCESSING;
 
 #ifdef HAVE_PTHREAD_H
@@ -4617,6 +4821,8 @@ static int request_delete_cb(UNUSED void *ctx, void *data)
 {
        REQUEST *request = fr_packet2myptr(REQUEST, packet, data);
 
+       VERIFY_REQUEST(request);
+
        request->master_state = REQUEST_STOP_PROCESSING;
 
        /*
@@ -4635,7 +4841,7 @@ static int request_delete_cb(UNUSED void *ctx, void *data)
        request->in_request_hash = false;
        if (request->ev) fr_event_delete(el, &request->ev);
 
-       if (mainconfig.memory_report) {
+       if (main_config.memory_report) {
                RDEBUG2("Cleaning up request packet ID %u with timestamp +%d",
                        request->packet->id,
                        (unsigned int) (request->timestamp - fr_start_time));
@@ -4647,7 +4853,7 @@ static int request_delete_cb(UNUSED void *ctx, void *data)
        }
 #endif
 
-       request_free(&request);
+       talloc_free(request);
 
        /*
         *      Delete it from the list, and continue;
@@ -4685,7 +4891,7 @@ void radius_event_free(void)
                 *      Walk the lists again, ensuring that all
                 *      requests are done.
                 */
-               if (mainconfig.memory_report) {
+               if (main_config.memory_report) {
                        int num;
 
 #ifdef WITH_PROXY