Since people seem to be re-inventing the wheel, I guess it's time to remind
them that I've already done this, along with hacks to allow user-defined
authentication and logging routines.
http://www.cuug.ab.ca:8001/~barkers/programs/radius/
-- Scott Barker Linux Consultant scott@galileo.cuug.ab.ca http://www.cuug.ab.ca:8001/~barkers/ (under construction)[ I try to reply to all e-mail within 5 days. If you don't ] [ get a response by then, I probably didn't get your e-mail ] [ (we have a sometimes sporadic connection to the internet) ]
"Strike suddenly, decisively, and in sufficient force to resolve the matter. Do it quickly, and do it with minimum loss of life." - General Colin Powell