2 * radiusd.c Main loop of the radius server.
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
20 * Copyright 2000-2004,2006 The FreeRADIUS server project
21 * Copyright 1999,2000 Miquel van Smoorenburg <miquels@cistron.nl>
22 * Copyright 2000 Alan DeKok <aland@ox.org>
23 * Copyright 2000 Alan Curry <pacman-radius@cqc.com>
24 * Copyright 2000 Jeff Carneal <jeff@apex.net>
25 * Copyright 2000 Chad Miller <cmiller@surfsouth.com>
28 #include <freeradius-devel/ident.h>
31 #include <freeradius-devel/radiusd.h>
32 #include <freeradius-devel/radius_snmp.h>
33 #include <freeradius-devel/rad_assert.h>
46 #ifdef HAVE_SYS_WAIT_H
47 # include <sys/wait.h>
50 # define WEXITSTATUS(stat_val) ((unsigned)(stat_val) >> 8)
53 # define WIFEXITED(stat_val) (((stat_val) & 255) == 0)
56 #ifndef HAVE_PTHREAD_H
57 #define thread_pool_lock(_x)
58 #define thread_pool_unlock(_x)
64 const char *progname = NULL;
65 const char *radius_dir = NULL;
66 const char *radacct_dir = NULL;
67 const char *radlog_dir = NULL;
68 const char *radlib_dir = NULL;
69 int log_stripped_names;
71 int log_auth_detail = FALSE;
72 int check_config = FALSE;
74 const char *radiusd_version = "FreeRADIUS Version " RADIUSD_VERSION ", for host " HOSTINFO ", built on " __DATE__ " at " __TIME__;
79 static int debug_memory = 0;
82 * Configuration items.
88 static void usage(int);
90 static void sig_fatal (int);
92 static void sig_hup (int);
98 int main(int argc, char *argv[])
101 unsigned char buffer[4096];
103 int spawn_flag = TRUE;
104 int dont_fork = FALSE;
107 #ifdef HAVE_SIGACTION
108 struct sigaction act;
112 set_auth_parameters(argc,argv);
115 if ((progname = strrchr(argv[0], '/')) == NULL)
122 radius_dir = strdup(RADIUS_DIR);
125 * Ensure that the configuration is initialized.
127 memset(&mainconfig, 0, sizeof(mainconfig));
128 mainconfig.myip.af = AF_UNSPEC;
129 mainconfig.port = -1;
130 mainconfig.radiusd_conf = strdup("radiusd.conf");
132 #ifdef HAVE_SIGACTION
133 memset(&act, 0, sizeof(act));
135 sigemptyset( &act.sa_mask ) ;
139 * Don't put output anywhere until we get told a little
142 mainconfig.radlog_fd = -1;
143 mainconfig.log_file = NULL;
145 /* Process the options. */
146 while ((argval = getopt(argc, argv, "Aa:bcCd:fg:hi:l:mn:p:sSvxXyz")) != EOF) {
151 log_auth_detail = TRUE;
155 if (radacct_dir) free(radacct_dir);
156 radacct_dir = strdup(optarg);
160 /* ignore for backwards compatibility with Cistron */
170 if (radius_dir) free(radius_dir);
171 radius_dir = strdup(optarg);
183 if (ip_hton(optarg, AF_UNSPEC, &mainconfig.myip) < 0) {
184 fprintf(stderr, "radiusd: Invalid IP Address or hostname \"%s\"\n", optarg);
191 if ((strcmp(optarg, "stdout") == 0) ||
192 (strcmp(optarg, "stderr") == 0) ||
193 (strcmp(optarg, "syslog") == 0)) {
194 fprintf(stderr, "radiusd: -l %s is unsupported. Use log_destination in radiusd.conf\n", optarg);
197 if (radlog_dir) free(radlog_dir);
198 radlog_dir = strdup(optarg);
202 fprintf(stderr, "radiusd: -g is unsupported. Use log_destination in radiusd.conf.\n");
211 if ((strchr(optarg, '/') != NULL) ||
212 (strchr(optarg, '.') != NULL) ||
213 (strlen(optarg) > 45)) usage(1);
215 snprintf(buffer, sizeof(buffer), "%s.conf",
217 if (mainconfig.radiusd_conf)
218 free(mainconfig.radiusd_conf);
219 mainconfig.radiusd_conf = strdup(buffer);
223 log_stripped_names++;
227 mainconfig.port = atoi(optarg);
228 if ((mainconfig.port <= 0) ||
229 (mainconfig.port >= 65536)) {
230 fprintf(stderr, "radiusd: Invalid port number %s\n", optarg);
236 case 's': /* Single process mode */
249 mainconfig.log_auth = TRUE;
250 mainconfig.log_auth_badpass = TRUE;
251 mainconfig.log_auth_goodpass = TRUE;
252 mainconfig.radlog_dest = RADLOG_STDOUT;
253 mainconfig.radlog_fd = STDOUT_FILENO;
261 mainconfig.log_auth = TRUE;
262 mainconfig.log_auth_badpass = TRUE;
266 mainconfig.log_auth_badpass = TRUE;
267 mainconfig.log_auth_goodpass = TRUE;
276 if (flag && (flag != 0x03)) {
277 fprintf(stderr, "radiusd: The options -i and -p cannot be used individually.\n");
282 radlog(L_INFO, "%s", radiusd_version);
283 radlog(L_INFO, "Copyright (C) 2000-2007 The FreeRADIUS server project.\n");
284 radlog(L_INFO, "There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A\n");
285 radlog(L_INFO, "PARTICULAR PURPOSE.\n");
286 radlog(L_INFO, "You may redistribute copies of FreeRADIUS under the terms of the\n");
287 radlog(L_INFO, "GNU General Public License.\n");
291 /* Read the configuration files, BEFORE doing anything else. */
292 if (read_mainconfig(0) < 0) {
298 * Disconnect from session
300 if (debug_flag == 0 && dont_fork == FALSE) {
304 radlog(L_ERR, "Couldn't fork: %s", strerror(errno));
309 * The parent exits, so the child can run in the background.
321 * Ensure that we're using the CORRECT pid after forking,
322 * NOT the one we started with.
324 radius_pid = getpid();
327 * Only write the PID file if we're running as a daemon.
329 * And write it AFTER we've forked, so that we write the
332 if (dont_fork == FALSE) {
335 fp = fopen(mainconfig.pid_file, "w");
338 * FIXME: What about following symlinks,
339 * and having it over-write a normal file?
341 fprintf(fp, "%d\n", (int) radius_pid);
344 radlog(L_ERR|L_CONS, "Failed creating PID file %s: %s\n",
345 mainconfig.pid_file, strerror(errno));
351 * If we're running as a daemon, close the default file
352 * descriptors, AFTER forking.
357 devnull = open("/dev/null", O_RDWR);
359 radlog(L_ERR|L_CONS, "Failed opening /dev/null: %s\n",
363 dup2(devnull, STDIN_FILENO);
364 if (mainconfig.radlog_dest == RADLOG_STDOUT) {
365 mainconfig.radlog_fd = dup(STDOUT_FILENO);
367 dup2(devnull, STDOUT_FILENO);
368 if (mainconfig.radlog_dest == RADLOG_STDERR) {
369 mainconfig.radlog_fd = dup(STDERR_FILENO);
371 dup2(devnull, STDERR_FILENO);
375 setlinebuf(stdout); /* unbuffered output */
379 * It's called the thread pool, but it does a little
382 radius_event_init(mainconfig.config, spawn_flag);
385 * Now that we've set everything up, we can install the signal
386 * handlers. Before this, if we get any signal, we don't know
387 * what to do, so we might as well do the default, and die.
390 signal(SIGPIPE, SIG_IGN);
392 #ifdef HAVE_SIGACTION
393 act.sa_handler = sig_hup;
394 sigaction(SIGHUP, &act, NULL);
395 act.sa_handler = sig_fatal;
396 sigaction(SIGTERM, &act, NULL);
399 signal(SIGHUP, sig_hup);
401 signal(SIGTERM, sig_fatal);
404 * If we're debugging, then a CTRL-C will cause the
405 * server to die immediately. Use SIGTERM to shut down
406 * the server cleanly in that case.
408 if ((debug_memory == 1) || (debug_flag == 0)) {
409 #ifdef HAVE_SIGACTION
410 act.sa_handler = sig_fatal;
411 sigaction(SIGINT, &act, NULL);
412 sigaction(SIGQUIT, &act, NULL);
414 signal(SIGINT, sig_fatal);
416 signal(SIGQUIT, sig_fatal);
422 * Everything seems to have loaded OK, exit gracefully.
425 DEBUG("Configuration appears OK.");
430 * Process requests until HUP or exit.
432 while ((rcode = radius_event_process()) == 0x80) {
435 * Reload anything that can safely be reloaded.
437 DEBUG("HUP support not available.");
439 thread_pool_unlock();
445 * Ignore the TERM signal: we're
448 signal(SIGTERM, SIG_IGN);
451 * Send a TERM signal to all
452 * associated processes
453 * (including us, which gets
457 kill(-radius_pid, SIGTERM);
461 * We're exiting, so we can delete the PID
462 * file. (If it doesn't exist, we can ignore
463 * the error returned by unlink)
465 if (dont_fork == FALSE) {
466 unlink(mainconfig.pid_file);
472 * Free the configuration items.
477 * Detach any modules.
488 * Display the syntax for starting this program.
490 static void NEVER_RETURNS usage(int status)
492 FILE *output = status?stderr:stdout;
495 "Usage: %s [-a acct_dir] [-d db_dir] [-l log_dir] [-i address] [-AcfnsSvXxyz]\n", progname);
496 fprintf(output, "Options:\n\n");
497 fprintf(output, " -a acct_dir use accounting directory 'acct_dir'.\n");
498 fprintf(output, " -A Log auth detail.\n");
499 fprintf(output, " -C Check configuration and exit.\n");
500 fprintf(output, " -d raddb_dir Configuration files are in \"raddbdir/*\".\n");
501 fprintf(output, " -f Run as a foreground process, not a daemon.\n");
502 fprintf(output, " -h Print this help message.\n");
503 fprintf(output, " -i ipaddr Listen on ipaddr ONLY\n");
504 fprintf(output, " -l log_dir Log file is \"log_dir/radius.log\" (not used in debug mode)\n");
505 fprintf(output, " -p port Listen on port ONLY\n");
506 fprintf(output, " -s Do not spawn child processes to handle requests.\n");
507 fprintf(output, " -S Log stripped names.\n");
508 fprintf(output, " -v Print server version information.\n");
509 fprintf(output, " -X Turn on full debugging.\n");
510 fprintf(output, " -x Turn on additional debugging. (-xx gives more debugging).\n");
511 fprintf(output, " -y Log authentication failures, with password.\n");
512 fprintf(output, " -z Log authentication successes, with password.\n");
518 * We got a fatal signal.
520 static void sig_fatal(int sig)
525 * We can't really do anything
526 * intelligent here so just die
531 radius_signal_self(RADIUS_SIGNAL_SELF_TERM);
539 radius_signal_self(RADIUS_SIGNAL_SELF_TERM);
545 radius_signal_self(RADIUS_SIGNAL_SELF_EXIT);
552 * We got the hangup signal.
553 * Re-read the configuration files.
555 static void sig_hup(int sig)
557 sig = sig; /* -Wunused */
559 reset_signal(SIGHUP, sig_hup);
561 radius_signal_self(RADIUS_SIGNAL_SELF_HUP);