EAP-TLS Memory Leak

Alexander Bergmann alex at linlab.net
Tue Nov 4 13:02:39 CET 2008


I'm using FreeRADIUS 2.1.1 wiht EAP-TLS for my WLAN authentication. It's 
working great and I have no authentication problems at all.

I've tested my setup with eapol_test from the wpa_supplicant package and 
used it inside an endless loop overnight and the memory usage was 100% 
stable. Then I've noticed that the FreeRADIUS memory usage increases if I 
interrupt the eapol_test tool after it sends the first RADIUS packet. This 
can be done till FreeRADIUS runs out of memory and gets an exception.

Is this a known problem?

To force the problem with eapol_test, I've inserted an 'exit(0);' inside 
the radius_client_send() function. Here's the diff:

diff -Nur wpa_supplicant-0.5.10-orig/radius_client.c wpa_supplicant-0.5.10-crash/radius_client.c
--- wpa_supplicant-0.5.10-orig/radius_client.c	2008-02-20 01:08:52.000000000 +0100
+++ wpa_supplicant-0.5.10-crash/radius_client.c	2008-11-03 22:06:10.000000000 +0100
@@ -494,6 +494,9 @@
  	radius_client_list_add(radius, msg, msg_type, shared_secret,
  			       shared_secret_len, addr);

+	printf("Unexpected EAPOL Client Problem....\n");
+	exit(0);
  	return res;


More information about the Freeradius-Devel mailing list