This is so that we don't spam the logs wih a DoS when we get lots
of packets with a bad signature
ev_request_free(&request->coa);
return 1; /* success */
}
-
-
}
if (!request->coa) request_alloc_coa(request);
}
if (rcode < 0) {
- radlog(L_ERR, "%s Dropping packet without response.", fr_strerror());
+ RDEBUG("%s Dropping packet without response.", fr_strerror());
+ request->reply->offset = -2; /* bad authenticator */
request->child_state = REQUEST_DONE;
return 0;
}