$75.00 USD Bounty
Ggatten at waddell.com
Mon Mar 21 21:55:56 CET 2011
Hmmm, I don't know how to set this (source code hack?), but what in the heck are you doing that takes so long? I'd think your target should be less than 3 seconds and for SURE less than 10 seconds. I think the thread is tied to this waiting, so you're gonna severely limit your throughput and number of users you can handle.
From: freeradius-users-bounces+ggatten=waddell.com at lists.freeradius.org [mailto:freeradius-users-bounces+ggatten=waddell.com at lists.freeradius.org] On Behalf Of Craig Smith
Sent: Monday, March 21, 2011 3:52 PM
To: freeradius-users at lists.freeradius.org
Subject: Re: $75.00 USD Bounty
Okay, I have everything running, but I have one more question.
Is there a way to adjust the timeout of the scripts being exec?
I get the following error. I'm looking to make the timeout around 40 seconds.
Error: Child PID 16599 is taking too much time: forcing failure and killing child.
On Mon, Mar 21, 2011 at 12:27 PM, Craig Smith <craigesmith at gmail.com<mailto:craigesmith at gmail.com>> wrote:
I am also finding the documentation semi helpful. So I put:
program = "/path/to/program/exec-program-wait" <-- I know I need to change this
wait = yes
input_pairs = request
output_pairs = reply
Now how do make my authentication request use exec?
<div style='border:none;border-bottom:double windowtext 2.25pt;padding:0in 0in 1.0pt 0in'>
"This email is intended to be reviewed by only the intended recipient
and may contain information that is privileged and/or confidential.
If you are not the intended recipient, you are hereby notified that
any review, use, dissemination, disclosure or copying of this email
and its attachments, if any, is strictly prohibited. If you have
received this email in error, please immediately notify the sender by
return email and delete this email from your system."
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Freeradius-Users