2 * radiusd.c Main loop of the radius server.
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
20 * Copyright 2000-2004,2006 The FreeRADIUS server project
21 * Copyright 1999,2000 Miquel van Smoorenburg <miquels@cistron.nl>
22 * Copyright 2000 Alan DeKok <aland@ox.org>
23 * Copyright 2000 Alan Curry <pacman-radius@cqc.com>
24 * Copyright 2000 Jeff Carneal <jeff@apex.net>
25 * Copyright 2000 Chad Miller <cmiller@surfsouth.com>
28 #include <freeradius-devel/ident.h>
31 #include <freeradius-devel/radiusd.h>
32 #include <freeradius-devel/radius_snmp.h>
33 #include <freeradius-devel/modules.h>
34 #include <freeradius-devel/rad_assert.h>
47 #ifdef HAVE_SYS_WAIT_H
48 # include <sys/wait.h>
51 # define WEXITSTATUS(stat_val) ((unsigned)(stat_val) >> 8)
54 # define WIFEXITED(stat_val) (((stat_val) & 255) == 0)
57 #ifndef HAVE_PTHREAD_H
58 #define thread_pool_lock(_x)
59 #define thread_pool_unlock(_x)
65 const char *progname = NULL;
66 const char *radius_dir = NULL;
67 const char *radacct_dir = NULL;
68 const char *radlog_dir = NULL;
69 const char *radlib_dir = NULL;
70 int log_stripped_names;
72 int log_auth_detail = FALSE;
73 int check_config = FALSE;
75 const char *radiusd_version = "FreeRADIUS Version " RADIUSD_VERSION ", for host " HOSTINFO ", built on " __DATE__ " at " __TIME__;
80 static int debug_memory = 0;
83 * Configuration items.
89 static void usage(int);
91 static void sig_fatal (int);
93 static void sig_hup (int);
99 int main(int argc, char *argv[])
102 unsigned char buffer[4096];
104 int spawn_flag = TRUE;
105 int dont_fork = FALSE;
108 #ifdef HAVE_SIGACTION
109 struct sigaction act;
113 set_auth_parameters(argc,argv);
116 if ((progname = strrchr(argv[0], '/')) == NULL)
124 if (WSAStartup(MAKEWORD(2, 0), &wsaData)) {
125 fprintf(stderr, "%s: Unable to initialize socket library.\n");
133 radius_dir = strdup(RADIUS_DIR);
136 * Ensure that the configuration is initialized.
138 memset(&mainconfig, 0, sizeof(mainconfig));
139 mainconfig.myip.af = AF_UNSPEC;
140 mainconfig.port = -1;
141 mainconfig.radiusd_conf = strdup("radiusd.conf");
143 #ifdef HAVE_SIGACTION
144 memset(&act, 0, sizeof(act));
146 sigemptyset( &act.sa_mask ) ;
150 * Don't put output anywhere until we get told a little
153 mainconfig.radlog_fd = -1;
154 mainconfig.log_file = NULL;
156 /* Process the options. */
157 while ((argval = getopt(argc, argv, "Aa:bcCd:fg:hi:l:mn:p:sSvxXyz")) != EOF) {
162 log_auth_detail = TRUE;
166 if (radacct_dir) free(radacct_dir);
167 radacct_dir = strdup(optarg);
171 /* ignore for backwards compatibility with Cistron */
181 if (radius_dir) free(radius_dir);
182 radius_dir = strdup(optarg);
194 if (ip_hton(optarg, AF_UNSPEC, &mainconfig.myip) < 0) {
195 fprintf(stderr, "radiusd: Invalid IP Address or hostname \"%s\"\n", optarg);
202 if ((strcmp(optarg, "stdout") == 0) ||
203 (strcmp(optarg, "stderr") == 0) ||
204 (strcmp(optarg, "syslog") == 0)) {
205 fprintf(stderr, "radiusd: -l %s is unsupported. Use log_destination in radiusd.conf\n", optarg);
208 if (radlog_dir) free(radlog_dir);
209 radlog_dir = strdup(optarg);
213 fprintf(stderr, "radiusd: -g is unsupported. Use log_destination in radiusd.conf.\n");
222 if ((strchr(optarg, '/') != NULL) ||
223 (strchr(optarg, '.') != NULL) ||
224 (strlen(optarg) > 45)) usage(1);
226 snprintf(buffer, sizeof(buffer), "%s.conf",
228 if (mainconfig.radiusd_conf)
229 free(mainconfig.radiusd_conf);
230 mainconfig.radiusd_conf = strdup(buffer);
234 log_stripped_names++;
238 mainconfig.port = atoi(optarg);
239 if ((mainconfig.port <= 0) ||
240 (mainconfig.port >= 65536)) {
241 fprintf(stderr, "radiusd: Invalid port number %s\n", optarg);
247 case 's': /* Single process mode */
260 mainconfig.log_auth = TRUE;
261 mainconfig.log_auth_badpass = TRUE;
262 mainconfig.log_auth_goodpass = TRUE;
263 mainconfig.radlog_dest = RADLOG_STDOUT;
264 mainconfig.radlog_fd = STDOUT_FILENO;
272 mainconfig.log_auth = TRUE;
273 mainconfig.log_auth_badpass = TRUE;
277 mainconfig.log_auth_badpass = TRUE;
278 mainconfig.log_auth_goodpass = TRUE;
287 if (flag && (flag != 0x03)) {
288 fprintf(stderr, "radiusd: The options -i and -p cannot be used individually.\n");
293 radlog(L_INFO, "%s", radiusd_version);
294 radlog(L_INFO, "Copyright (C) 2000-2007 The FreeRADIUS server project.\n");
295 radlog(L_INFO, "There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A\n");
296 radlog(L_INFO, "PARTICULAR PURPOSE.\n");
297 radlog(L_INFO, "You may redistribute copies of FreeRADIUS under the terms of the\n");
298 radlog(L_INFO, "GNU General Public License.\n");
302 /* Read the configuration files, BEFORE doing anything else. */
303 if (read_mainconfig(0) < 0) {
309 * Disconnect from session
311 if (debug_flag == 0 && dont_fork == FALSE) {
315 radlog(L_ERR, "Couldn't fork: %s", strerror(errno));
320 * The parent exits, so the child can run in the background.
332 * Ensure that we're using the CORRECT pid after forking,
333 * NOT the one we started with.
335 radius_pid = getpid();
338 * Only write the PID file if we're running as a daemon.
340 * And write it AFTER we've forked, so that we write the
343 if (dont_fork == FALSE) {
346 fp = fopen(mainconfig.pid_file, "w");
349 * FIXME: What about following symlinks,
350 * and having it over-write a normal file?
352 fprintf(fp, "%d\n", (int) radius_pid);
355 radlog(L_ERR|L_CONS, "Failed creating PID file %s: %s\n",
356 mainconfig.pid_file, strerror(errno));
362 * If we're running as a daemon, close the default file
363 * descriptors, AFTER forking.
368 devnull = open("/dev/null", O_RDWR);
370 radlog(L_ERR|L_CONS, "Failed opening /dev/null: %s\n",
374 dup2(devnull, STDIN_FILENO);
375 if (mainconfig.radlog_dest == RADLOG_STDOUT) {
376 mainconfig.radlog_fd = dup(STDOUT_FILENO);
378 dup2(devnull, STDOUT_FILENO);
379 if (mainconfig.radlog_dest == RADLOG_STDERR) {
380 mainconfig.radlog_fd = dup(STDERR_FILENO);
382 dup2(devnull, STDERR_FILENO);
386 setlinebuf(stdout); /* unbuffered output */
390 * It's called the thread pool, but it does a little
393 radius_event_init(mainconfig.config, spawn_flag);
396 * Now that we've set everything up, we can install the signal
397 * handlers. Before this, if we get any signal, we don't know
398 * what to do, so we might as well do the default, and die.
401 signal(SIGPIPE, SIG_IGN);
403 #ifdef HAVE_SIGACTION
404 act.sa_handler = sig_hup;
405 sigaction(SIGHUP, &act, NULL);
406 act.sa_handler = sig_fatal;
407 sigaction(SIGTERM, &act, NULL);
410 signal(SIGHUP, sig_hup);
412 signal(SIGTERM, sig_fatal);
415 * If we're debugging, then a CTRL-C will cause the
416 * server to die immediately. Use SIGTERM to shut down
417 * the server cleanly in that case.
419 if ((debug_memory == 1) || (debug_flag == 0)) {
420 #ifdef HAVE_SIGACTION
421 act.sa_handler = sig_fatal;
422 sigaction(SIGINT, &act, NULL);
423 sigaction(SIGQUIT, &act, NULL);
425 signal(SIGINT, sig_fatal);
427 signal(SIGQUIT, sig_fatal);
433 * Everything seems to have loaded OK, exit gracefully.
436 DEBUG("Configuration appears OK.");
441 * Process requests until HUP or exit.
443 while ((rcode = radius_event_process()) == 0x80) {
444 module_hup(cf_section_sub_find(mainconfig.config, "modules"));
450 * Ignore the TERM signal: we're
453 signal(SIGTERM, SIG_IGN);
456 * Send a TERM signal to all
457 * associated processes
458 * (including us, which gets
462 kill(-radius_pid, SIGTERM);
466 * We're exiting, so we can delete the PID
467 * file. (If it doesn't exist, we can ignore
468 * the error returned by unlink)
470 if (dont_fork == FALSE) {
471 unlink(mainconfig.pid_file);
477 * Free the configuration items.
482 * Detach any modules.
497 * Display the syntax for starting this program.
499 static void NEVER_RETURNS usage(int status)
501 FILE *output = status?stderr:stdout;
504 "Usage: %s [-a acct_dir] [-d db_dir] [-l log_dir] [-i address] [-AcfnsSvXxyz]\n", progname);
505 fprintf(output, "Options:\n\n");
506 fprintf(output, " -a acct_dir use accounting directory 'acct_dir'.\n");
507 fprintf(output, " -A Log auth detail.\n");
508 fprintf(output, " -C Check configuration and exit.\n");
509 fprintf(output, " -d raddb_dir Configuration files are in \"raddbdir/*\".\n");
510 fprintf(output, " -f Run as a foreground process, not a daemon.\n");
511 fprintf(output, " -h Print this help message.\n");
512 fprintf(output, " -i ipaddr Listen on ipaddr ONLY\n");
513 fprintf(output, " -l log_dir Log file is \"log_dir/radius.log\" (not used in debug mode)\n");
514 fprintf(output, " -p port Listen on port ONLY\n");
515 fprintf(output, " -s Do not spawn child processes to handle requests.\n");
516 fprintf(output, " -S Log stripped names.\n");
517 fprintf(output, " -v Print server version information.\n");
518 fprintf(output, " -X Turn on full debugging.\n");
519 fprintf(output, " -x Turn on additional debugging. (-xx gives more debugging).\n");
520 fprintf(output, " -y Log authentication failures, with password.\n");
521 fprintf(output, " -z Log authentication successes, with password.\n");
527 * We got a fatal signal.
529 static void sig_fatal(int sig)
534 * We can't really do anything
535 * intelligent here so just die
540 radius_signal_self(RADIUS_SIGNAL_SELF_TERM);
548 radius_signal_self(RADIUS_SIGNAL_SELF_TERM);
554 radius_signal_self(RADIUS_SIGNAL_SELF_EXIT);
561 * We got the hangup signal.
562 * Re-read the configuration files.
564 static void sig_hup(int sig)
566 sig = sig; /* -Wunused */
568 reset_signal(SIGHUP, sig_hup);
570 radius_signal_self(RADIUS_SIGNAL_SELF_HUP);