Yes, two(2) binaries and one (1) shell script are called via exec as follows from the file,

- user (an authentication binary program - Exec-Program-Wait = "/usr/local/sbin/auth -- %{User-Name} %{User-Password} %{%{Called-Station-Id}:-Missing} %{%{NAS-IP-Address}:-Missing} %{%{Calling-Station-Id}:-Missing} %{%{NAS-Port-Type}:-Missing} %{Vendor-Specific}" ,)

-acct_user (shell script - Exec-Program = "%{exec:/usr/local/sbin/acctstop.sh}", )
and
-attr_rewrite module (a hex translation binary - replacewith = "%{exec:/usr/local/sbin/hexconvert -lX %{User-Name} }")

Is this bad?
Is there a better alternative?


Thanks so much!
-craig



----- Original Message ----- From: "Alan DeKok" <[email protected]>
To: "FreeRadius users mailing list" <[email protected]>
Sent: Friday, October 09, 2009 4:17 PM
Subject: Re: over 30 radiusd processes


Craig Campbell wrote:
radius-a seems to be getting the bulk of the radius records.  Normally,
it has a single process.
Last night it spawned a bunch of children that seem to be loitering...

 Are you forking shell scripts via "exec"?

radius-b and radius-c don't have more than a single radiusd process.

Any idea what is going on?  Why all the children?  Do I need to be
concerned?  Is this normal?

 It's not normal.  They're likely zombies that need to go away.  The
server normally cleans up any zombie children, but...

 Alan DeKok.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

__________ Information from ESET Smart Security, version of virus signature database 4494 (20091009) __________

The message was checked by ESET Smart Security.

http://www.eset.com





__________ Information from ESET Smart Security, version of virus signature 
database 4494 (20091009) __________

The message was checked by ESET Smart Security.

http://www.eset.com



-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to