Hi!
I'm using yesterday's git checkout. Routing of the requests to our own RADIUS and germany's DFN Radius server is working OK!
Questions: ==========
* Currently, radsecproxy is running as root. Is that necessary? It's not binding to any privileged ports.
* Can radsecproxy run chrooted?
* during our 2 days of operation, it crashed three times - which is why I compiled the lasted version manually instead of using Ubuntu's packages:
Jul 5 14:51:43 radius-ext kernel: [5611.904760] radsecproxy[2710]: segfault at d8 ip 00007f0717424518 sp 00007f07183e4e20 error 6 in libc-2.23.so[7f071733c000+1c0000] Jul 6 09:28:46 radius-ext kernel: [72633.333687] radsecproxy[21034]: segfault at d8 ip 00007f5c647d8518 sp 00007f5c65798e30 error 6 in libc-2.23.so[7f5c646f0000+1c0000] Jul 6 12:15:19 radius-ext kernel: [82626.748886] radsecproxy[120425]: segfault at d8 ip 00007f1267ec5518 sp 00007f1268e3bd50 error 6 in libc-2.23.so[7f1267ddd000+1c0000]
How do I debug this; is it dumping cores even when running as root?