Yes, two(2) binaries and one (1) shell script are called via exec as follows
from the file,
- user (an authentication binary program - Exec-Program-Wait =
"/usr/local/sbin/auth -- %{User-Name} %{User-Password}
%{%{Called-Station-Id}:-Missing} %{%{NAS-IP-Address}:-Missing}
%{%{Calling-Station-Id}:-Missing} %{%{NAS-Port-Type}:-Missing}
%{Vendor-Specific}" ,)
-acct_user (shell script - Exec-Program =
"%{exec:/usr/local/sbin/acctstop.sh}", )
and
-attr_rewrite module (a hex translation binary - replacewith =
"%{exec:/usr/local/sbin/hexconvert -lX %{User-Name} }")
Is this bad?
Is there a better alternative?
Thanks so much!
-craig
----- Original Message -----
From: "Alan DeKok" <[email protected]>
To: "FreeRadius users mailing list" <[email protected]>
Sent: Friday, October 09, 2009 4:17 PM
Subject: Re: over 30 radiusd processes
Craig Campbell wrote:
radius-a seems to be getting the bulk of the radius records. Normally,
it has a single process.
Last night it spawned a bunch of children that seem to be loitering...
Are you forking shell scripts via "exec"?
radius-b and radius-c don't have more than a single radiusd process.
Any idea what is going on? Why all the children? Do I need to be
concerned? Is this normal?
It's not normal. They're likely zombies that need to go away. The
server normally cleans up any zombie children, but...
Alan DeKok.
-
List info/subscribe/unsubscribe? See
http://www.freeradius.org/list/users.html
__________ Information from ESET Smart Security, version of virus
signature database 4494 (20091009) __________
The message was checked by ESET Smart Security.
http://www.eset.com
__________ Information from ESET Smart Security, version of virus signature
database 4494 (20091009) __________
The message was checked by ESET Smart Security.
http://www.eset.com
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html