EAP-TLS Memory Leak
Alexander Bergmann
alex at linlab.net
Tue Nov 4 13:02:39 CET 2008
Hi,
I'm using FreeRADIUS 2.1.1 wiht EAP-TLS for my WLAN authentication. It's
working great and I have no authentication problems at all.
I've tested my setup with eapol_test from the wpa_supplicant package and
used it inside an endless loop overnight and the memory usage was 100%
stable. Then I've noticed that the FreeRADIUS memory usage increases if I
interrupt the eapol_test tool after it sends the first RADIUS packet. This
can be done till FreeRADIUS runs out of memory and gets an exception.
Is this a known problem?
To force the problem with eapol_test, I've inserted an 'exit(0);' inside
the radius_client_send() function. Here's the diff:
diff -Nur wpa_supplicant-0.5.10-orig/radius_client.c wpa_supplicant-0.5.10-crash/radius_client.c
--- wpa_supplicant-0.5.10-orig/radius_client.c 2008-02-20 01:08:52.000000000 +0100
+++ wpa_supplicant-0.5.10-crash/radius_client.c 2008-11-03 22:06:10.000000000 +0100
@@ -494,6 +494,9 @@
radius_client_list_add(radius, msg, msg_type, shared_secret,
shared_secret_len, addr);
+ printf("Unexpected EAPOL Client Problem....\n");
+ exit(0);
+
return res;
}
Regards,
Alex
More information about the Freeradius-Devel
mailing list