]>
git.ipfire.org Git - thirdparty/freeradius-server.git/log
Jorge Pereira [Thu, 23 Mar 2023 00:10:20 +0000 (21:10 -0300)]
Fix runtime LSAN/ASAN error in command.c
Such error:
src/main/command.c:185:12: runtime error: member access within null
pointer of type 'struct sockaddr_un'
SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior
src/main/command.c:185:12 in
Jorge Pereira [Tue, 14 Mar 2023 21:36:01 +0000 (18:36 -0300)]
Fix heap-buffer-overflow in pap_auth_pbkdf2_parse()
==
3061536 ==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6100000053f9 at pc 0x7f3eb4ff6bbe bp 0x7fff630b7770 sp 0x7fff630b7768
READ of size 1 at 0x6100000053f9 thread T0
#0 0x7f3eb4ff6bbd in strlcpy /home/jpereira/Devel/FreeRADIUS/freeradius-server-v3.2.x.git-linux/src/lib/strlcpy.c:56:10
Jorge Pereira [Thu, 16 Mar 2023 16:12:43 +0000 (13:12 -0300)]
Fix memory leak in client_add()
Such error when we run: radiusd -CX
Configuration appears to be OK
Allocated memory at time of report:
Current state of talloced memory:
full talloc report on 'null_context' (total 1057 bytes in 4 blocks)
autofree_context contains 1 bytes in 2 blocks (ref 0) 0x608000000400
bool contains 1 bytes in 1 blocks (ref 0) 0x60b000044a90
RADCLIENT_LIST contains 1056 bytes in 1 blocks (ref 0) 0x6190000032e0
=================================================================
==43730==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 1152 byte(s) in 1 object(s) allocated from:
#0 0x5603d1a170be in malloc (/__w/freeradius-server/freeradius-server/build/bin/local/radiusd+0x20b0be) (BuildId:
acbe3a0941626cf6f01ae6b2c12df877fb8fc009 )
#1 0x7f2c07e40c86 in _talloc_zero (/lib/x86_64-linux-gnu/libtalloc.so.2+0x6c86) (BuildId:
f3c1074a602981acb4683b4df6b7733b104ba7d4 )
#2 0x5603d1a62780 in client_list_init (/__w/freeradius-server/freeradius-server/build/bin/local/radiusd+0x256780) (BuildId:
acbe3a0941626cf6f01ae6b2c12df877fb8fc009 )
#3 0x5603d1a62a4a in client_add (/__w/freeradius-server/freeradius-server/build/bin/local/radiusd+0x256a4a) (BuildId:
acbe3a0941626cf6f01ae6b2c12df877fb8fc009 )
#4 0x5603d1a6b713 in client_list_parse_section (/__w/freeradius-server/freeradius-server/build/bin/local/radiusd+0x25f713) (BuildId:
acbe3a0941626cf6f01ae6b2c12df877fb8fc009 )
#5 0x5603d1ae8532 in main_config_init (/__w/freeradius-server/freeradius-server/build/bin/local/radiusd+0x2dc532) (BuildId:
acbe3a0941626cf6f01ae6b2c12df877fb8fc009 )
#6 0x5603d1b45bc4 in main (/__w/freeradius-server/freeradius-server/build/bin/local/radiusd+0x339bc4) (BuildId:
acbe3a0941626cf6f01ae6b2c12df877fb8fc009 )
#7 0x7f2c07981082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId:
1878e6b475720c7c51969e69ab2d276fae6d1dee )
#8 0x5603d19924fd in _start (/__w/freeradius-server/freeradius-server/build/bin/local/radiusd+0x1864fd) (BuildId:
acbe3a0941626cf6f01ae6b2c12df877fb8fc009 )
SUMMARY: AddressSanitizer: 1152 byte(s) leaked in 1 allocation(s).
Jorge Pereira [Wed, 15 Mar 2023 19:01:38 +0000 (16:01 -0300)]
ci: Bump LLVM/CLANG for 15
Matthew Newton [Thu, 23 Mar 2023 12:33:25 +0000 (12:33 +0000)]
CI: clearer versions
Jorge Pereira [Mon, 3 Apr 2023 22:48:36 +0000 (19:48 -0300)]
ci: Backport .github/workflows/ci-rpm.yml from v3.2.x
Alan T. DeKok [Thu, 23 Mar 2023 17:23:57 +0000 (13:23 -0400)]
$(Q) -> ${Q}
Jorge Pereira [Tue, 28 Mar 2023 23:21:32 +0000 (20:21 -0300)]
note recent changes
Alan T. DeKok [Wed, 5 Apr 2023 20:53:35 +0000 (16:53 -0400)]
close the TLS socket on TLS errors.
If there's a TLS connection error, then the only way to recover
is to close the socket and start over from scratch.
Jorge Pereira [Mon, 3 Apr 2023 20:42:55 +0000 (17:42 -0300)]
Add assert to catch invalid mutex (#4959)
Jorge Pereira [Mon, 3 Apr 2023 19:05:34 +0000 (16:05 -0300)]
Fix missing phtread destroy (#4957)
As we are calling pthread_mutex_init(), we should call
pthread_mutex_destroy() to release all initialized mutexs.
Jorge Pereira [Mon, 3 Apr 2023 19:01:20 +0000 (16:01 -0300)]
Fix typo (#4956)
Alan T. DeKok [Sat, 1 Apr 2023 14:30:14 +0000 (10:30 -0400)]
more cleanups
Alan T. DeKok [Sat, 1 Apr 2023 14:17:20 +0000 (10:17 -0400)]
just use OpenSSL thread IDs
which uses the address of "errno". That is thread-local on all
platforms we care about.
Jorge Pereira [Mon, 27 Mar 2023 21:46:02 +0000 (18:46 -0300)]
Fix rlm_unbound build (#4941)
Jorge Pereira [Mon, 27 Mar 2023 21:45:48 +0000 (18:45 -0300)]
Fix memory-leak in "radiusd -XCM" (#4934)
Such error:
Current state of talloced memory:
full talloc report on 'null_context' (total 0 bytes in 1 blocks)
=================================================================
==85543==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 96 byte(s) in 1 object(s) allocated from:
#0 0x5598fcd87f3e in malloc (/home/jpereira/Devel/FreeRADIUS/freeradius-server-v3.2.x.git-linux/build/bin/local/radiusd+0x20cf3e) (BuildId:
3bf5bfb4fd72e1e1112726414556f8a4f339789f )
#1 0x7f1cc4453d7f in __talloc_with_prefix /build/talloc-NvEq5A/talloc-2.3.3/bin/default/../../talloc.c:783:9
#2 0x7f1cc4455a5d in __talloc /build/talloc-NvEq5A/talloc-2.3.3/bin/default/../../talloc.c:825:9
#3 0x7f1cc4455a5d in _talloc_named_const /build/talloc-NvEq5A/talloc-2.3.3/bin/default/../../talloc.c:982:8
#4 0x7f1cc4455a5d in talloc_enable_null_tracking /build/talloc-NvEq5A/talloc-2.3.3/bin/default/../../talloc.c:2353:18
#5 0x7f1cc4455a5d in talloc_enable_null_tracking /build/talloc-NvEq5A/talloc-2.3.3/bin/default/../../talloc.c:2350:15
#6 0x5598fceb65b1 in main /home/jpereira/Devel/FreeRADIUS/freeradius-server-v3.2.x.git-linux/src/main/radiusd.c:313:3
#7 0x7f1cc342350f in __libc_start_call_main csu/../sysdeps/nptl/libc_start_call_main.h:58:16
#8 0x7f1cc34235c8 in __libc_start_main csu/../csu/libc-start.c:381:3
#9 0x5598fcd02514 in _start (/home/jpereira/Devel/FreeRADIUS/freeradius-server-v3.2.x.git-linux/build/bin/local/radiusd+0x187514) (BuildId:
3bf5bfb4fd72e1e1112726414556f8a4f339789f )
SUMMARY: AddressSanitizer: 96 byte(s) leaked in 1 allocation(s).
Alan T. DeKok [Fri, 17 Mar 2023 15:10:53 +0000 (11:10 -0400)]
Revert "Suppress GCC unknown pragma warnings in rlm_perl"
This reverts commit
7d0d9b1c08c0857b846023607332f21699f5ff9a .
this breaks the build in CI
Alan T. DeKok [Fri, 17 Mar 2023 14:06:06 +0000 (10:06 -0400)]
remove "other" from here, too
Jorge Pereira [Thu, 16 Mar 2023 16:43:34 +0000 (13:43 -0300)]
Fix missing prototype parameter in ssl_version()
Jorge Pereira [Thu, 16 Mar 2023 21:57:15 +0000 (18:57 -0300)]
Suppress GCC unknown pragma warnings in rlm_perl
Jorge Pereira [Wed, 15 Mar 2023 23:48:32 +0000 (20:48 -0300)]
ci: Bump OpenSSL for 3.0.8
Alan T. DeKok [Fri, 17 Mar 2023 13:40:19 +0000 (09:40 -0400)]
disallow CoA for fake packets. Fixes #4929
The CoA handling in process.c requires that the CoA packet be
associated with a "real" request. i.e. one that was received from
the network, and is therefore long-lived.
"fake" packets, such as ones sent to a virtual home server, or
packets used in the "inner-tunnel" virtual server can't do CoA.
This is because the fake packets are freed immediately after they
are processed, and there is no way for them to push the CoA child
into the main event loop.
Alan T. DeKok [Fri, 17 Mar 2023 13:28:58 +0000 (09:28 -0400)]
just remove the file, as it's entirely unused
Jorge Pereira [Tue, 14 Mar 2023 19:09:56 +0000 (16:09 -0300)]
Fix runtime error in file_common()
Such error:
src/modules/rlm_files/rlm_files.c:431:49: runtime error: null pointer passed as argument 3, which is declared to never be null
src/freeradius-devel/radiusd.h:603:89: note: nonnull attribute specified here
SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior src/modules/rlm_files/rlm_files.c:431:49 in
Jorge Pereira [Tue, 14 Mar 2023 19:05:42 +0000 (16:05 -0300)]
Fix runtime error in cf_file_open()
Such error:
src/main/conffile.c:333:22: runtime error: load of value 190, which is not a valid value for type 'bool'
SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior src/main/conffile.c:333:22 in
Jorge Pereira [Tue, 14 Mar 2023 18:44:21 +0000 (15:44 -0300)]
Fix runtime error: load of misaligned address in xlat_integer()
Such error:
src/main/xlat.c:206:38: runtime error: load of misaligned address 0x00010410ba72 for type 'uint32_t' (aka 'unsigned int'), which requires 4 byte alignment
0x00010410ba72: note: pointer points here
00 00 00 20 39 38 37 3e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
^
SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior src/main/xlat.c:206:38 in
Jorge Pereira [Tue, 14 Mar 2023 18:27:21 +0000 (15:27 -0300)]
Fix runtime LSAN/ASAN error in fr_in6addr_mask()
Such error:
src/lib/misc.c:1266:34: runtime error: load of misaligned address 0x00016f8b1d54 for type 'const uint64_t' (aka 'const unsigned long long'), which requires 8 byte alignment
0x00016f8b1d54: note: pointer points here
e0 89 29 05 00 00 00 00 00 00 00 00 00 00 ff ff cb 00 71 00 00 00 00 00 e0 89 29 05 01 00 00 00
^
SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior src/lib/misc.c:1266:34 in
Jorge Pereira [Tue, 14 Mar 2023 17:51:56 +0000 (14:51 -0300)]
Fix AddressSanitizer: odr-violation in 'radiusd_version'
That's why we are backing port the 'HIDDEN' macro.
Jorge Pereira [Tue, 14 Mar 2023 16:26:16 +0000 (13:26 -0300)]
Fix LSAN/ASAN memory-leak in lib/radius
Jorge Pereira [Wed, 8 Mar 2023 15:20:21 +0000 (12:20 -0300)]
Fix runtime LSAN/ASAN error in src/lib/dict.c
src/lib/dict.c:1365:9: runtime error: signed integer overflow:
429496729 * 10 cannot be represented in type 'int'
Jorge Pereira [Wed, 8 Mar 2023 15:17:44 +0000 (12:17 -0300)]
Fix runtime LSAN/ASAN error in src/main/conffile.c
src/main/conffile.c:1831:49: runtime error: applying zero offset to null pointer
Jorge Pereira [Tue, 14 Mar 2023 17:26:55 +0000 (14:26 -0300)]
radattr: Fix several memory-leaks reported by LSAN
Alan T. DeKok [Fri, 17 Mar 2023 13:20:00 +0000 (09:20 -0400)]
juste use fr_hash() instead of hand-rolled hash from 2002
Alan T. DeKok [Thu, 16 Mar 2023 17:01:56 +0000 (13:01 -0400)]
coa->home_server may be NULL. Fixes #4929
It's not clear _why_ home_server==NULL. Nothing resets it.
And it should only be NULL if the CoA packet is sent through a
virtual home server
Alan T. DeKok [Wed, 15 Mar 2023 17:52:34 +0000 (13:52 -0400)]
Update dictionary.wifialliance (#4928)
Discovered HS20-Roaming-Consortium being mentioned here:
https://wiki.geant.org/pages/viewpage.action?pageId=
133763844
Alan T. DeKok [Fri, 10 Mar 2023 21:31:34 +0000 (16:31 -0500)]
fix documentation on max_request_time
Alan T. DeKok [Thu, 9 Mar 2023 20:15:48 +0000 (15:15 -0500)]
call proxy_send() for sending proxied packets
which works for all packet types, including TLS ones.
Alan T. DeKok [Wed, 8 Mar 2023 18:29:01 +0000 (13:29 -0500)]
fix use of DIAG in macro
Alan T. DeKok [Wed, 8 Mar 2023 18:16:57 +0000 (13:16 -0500)]
more fixes for talloc_autofree_context() deprecation
Alan T. DeKok [Wed, 8 Mar 2023 18:02:27 +0000 (13:02 -0500)]
talloc_autofree_context() is deprecated in newer versions of talloc
Alan T. DeKok [Wed, 8 Mar 2023 17:49:00 +0000 (12:49 -0500)]
note TLS 1.2 or smaller for EAP-FAST
Alan T. DeKok [Wed, 8 Mar 2023 17:41:48 +0000 (12:41 -0500)]
Warn if libldap uses NSS. Fixes #4918
Instead of letting things break, or have random crashes, give a big
warning on startup.
Alan T. DeKok [Wed, 8 Mar 2023 13:15:08 +0000 (08:15 -0500)]
shift 32-bit words, not 8-bit words.
Manual port of
cc49e17c80b6
Jorge Pereira [Mon, 20 Feb 2023 15:14:46 +0000 (12:14 -0300)]
rlm_pap: Destroy MD context, causing leaks with OpenSSL >= 3.0 (#4895)
Jorge Pereira [Mon, 20 Feb 2023 15:14:27 +0000 (12:14 -0300)]
rlm_ippool: Destroy MD context, causing leaks with OpenSSL >= 3.0 (#4896)
Jorge Pereira [Mon, 20 Feb 2023 15:14:09 +0000 (12:14 -0300)]
radius: Destroy MD context, causing leaks with OpenSSL >= 3.0 (#4898)
Jorge Pereira [Mon, 20 Feb 2023 15:11:31 +0000 (12:11 -0300)]
rlm_cram: Destroy MD context, causing leaks with OpenSSL >= 3.0 (#4897)
Jorge Pereira [Wed, 15 Feb 2023 21:40:02 +0000 (18:40 -0300)]
md5 xlat: Destroy MD context, causing leaks with OpenSSL >= 3.0 (#4893) (#4894)
Co-authored-by: Terry Burton <tez@terryburton.co.uk>
Alan T. DeKok [Fri, 10 Feb 2023 15:46:40 +0000 (10:46 -0500)]
Revert "sql.accounting needs Acct-Status-Type"
This reverts commit
85faf6285d11e2e1f8ad40f298694cd667040702 .
Alan T. DeKok [Fri, 10 Feb 2023 15:45:47 +0000 (10:45 -0500)]
Revert "run the accounting "post-auth" query for sql_session_start"
This reverts commit
1e8f652994c02278ba0be19ec8aa686a43a40f2b .
Alan T. DeKok [Fri, 10 Feb 2023 15:45:39 +0000 (10:45 -0500)]
Alan T. DeKok [Thu, 9 Feb 2023 16:00:23 +0000 (11:00 -0500)]
typo
Alan T. DeKok [Thu, 9 Feb 2023 15:49:15 +0000 (10:49 -0500)]
run the accounting "post-auth" query for sql_session_start
Which should make it work again. However, it's not a good idea
to have admins mangle the default queries. We should have a
better way of "just doing the right thing"
Terry Burton [Fri, 27 Jan 2023 13:02:08 +0000 (13:02 +0000)]
check-eap-tls: Set Reply-Message in the right request's list (#4869)
Terry Burton [Thu, 26 Jan 2023 14:05:22 +0000 (14:05 +0000)]
pap: Only look for passwords amongst non-vendor attributes (#4865)
Otherwise, the following will trigger a "Don't set
control:User-Password" warning:
VENDOR ABC 42
BEGIN-VENDOR ABC
ATTRIBUTE Not-A-Password 2 string
END-VENDOR ABC
update { &control:Not-A-Password := "x" }
pap
Jorge Pereira [Tue, 10 Jan 2023 16:53:54 +0000 (13:53 -0300)]
Fix typo. refs #4836 (#4844)
Alan T. DeKok [Sun, 8 Jan 2023 02:46:31 +0000 (21:46 -0500)]
this isn't an error
Alan T. DeKok [Wed, 14 Dec 2022 16:19:03 +0000 (11:19 -0500)]
give better error messages for %{listen:TLS-*}
Alan T. DeKok [Wed, 14 Dec 2022 16:16:46 +0000 (11:16 -0500)]
fix various build warnings with newer compilers
Alan T. DeKok [Fri, 9 Dec 2022 16:17:05 +0000 (11:17 -0500)]
don't remove the .d file, it's an output file
which is needed by the target rule
Nick Porter [Fri, 11 Nov 2022 09:59:16 +0000 (09:59 +0000)]
Move error handling to outside #ifdef WITH_TLS
Alan T. DeKok [Thu, 10 Nov 2022 17:23:12 +0000 (17:23 +0000)]
close fd on error
Alan T. DeKok [Thu, 10 Nov 2022 16:56:36 +0000 (16:56 +0000)]
set the host name to the actual host name
Alan T. DeKok [Thu, 10 Nov 2022 16:26:01 +0000 (16:26 +0000)]
show OpenSSL error, too
Alan T. DeKok [Wed, 9 Nov 2022 18:52:28 +0000 (18:52 +0000)]
use macro for home server is dead
Alan T. DeKok [Wed, 9 Nov 2022 18:52:13 +0000 (18:52 +0000)]
remove unnecessary "break"
Alan T. DeKok [Thu, 3 Nov 2022 15:12:12 +0000 (15:12 +0000)]
Revert "check for multiple "down" states. Fixes #4790"
This reverts commit
c493836d2a72d2ebb29e5a2d5f45f3e033ea0094 .
after review, not needed
Alan T. DeKok [Thu, 3 Nov 2022 13:21:22 +0000 (13:21 +0000)]
check for multiple "down" states. Fixes #4790
Alan T. DeKok [Thu, 3 Nov 2022 11:24:15 +0000 (11:24 +0000)]
resync. Helps with #4570
Alan T. DeKok [Thu, 3 Nov 2022 11:15:31 +0000 (11:15 +0000)]
sync with dictionaries. Heklps with #4790
Nick Porter [Mon, 31 Oct 2022 16:39:46 +0000 (16:39 +0000)]
CI: Remove deprecated set-ouput
Alan T. DeKok [Mon, 31 Oct 2022 13:03:00 +0000 (09:03 -0400)]
ctype macros should take explicitly unsigned input
to avoid chars with high bits being converted to negative numbers
perl -p -i -e 's/(tolower|toupper|isupper|islower|isdigit|isalpha|isspace|isxdigit)\(\s*\*/${1}((uint8_t) */g' $(find . -name "*.[ch]" -print)
perl -p -i -e 's/(tolower|toupper|isupper|islower|isdigit|isalpha|isspace|isxdigit)\(\(int\)/${1}((uint8_t)/g' $(find . -name "*.[ch]" -print)
Nick Porter [Mon, 31 Oct 2022 11:52:02 +0000 (11:52 +0000)]
CI: Ensure git-lfs is installed
Nick Porter [Mon, 31 Oct 2022 11:50:54 +0000 (11:50 +0000)]
Update CI actions to node16 versions
Nick Porter [Mon, 31 Oct 2022 11:06:41 +0000 (11:06 +0000)]
Avoid spurious error about absolute path
Nick Porter [Mon, 31 Oct 2022 11:04:11 +0000 (11:04 +0000)]
Only debug packets when condition matches
radius_evaluate_cond() returns -2 for attribute not found - which was
causing packets without the required attributes to appear in conditional
debug output.
Alan T. DeKok [Wed, 19 Oct 2022 13:46:21 +0000 (09:46 -0400)]
updates
from https://www.juniper.net/documentation/us/en/software/junos/subscriber-mgmt-sessions/topics/topic-map/dhcp-options-radius-server.html
Alan T. DeKok [Tue, 11 Oct 2022 18:43:59 +0000 (14:43 -0400)]
whitespace
Alan T. DeKok [Tue, 11 Oct 2022 16:58:56 +0000 (12:58 -0400)]
as found on the net
Alan T. DeKok [Tue, 25 Oct 2022 14:51:02 +0000 (10:51 -0400)]
set partial chain always. Helps with #4785
Alan T. DeKok [Tue, 25 Oct 2022 12:59:53 +0000 (08:59 -0400)]
move partial chain set to after set cert store. Should fix #4753
Alan T. DeKok [Tue, 18 Oct 2022 17:11:48 +0000 (13:11 -0400)]
Fallback to uname -n on missing hostname. Fixes #4772
Alan T. DeKok [Wed, 12 Oct 2022 13:05:52 +0000 (09:05 -0400)]
allow User-Name and CUI in post-proxy filtering
which is also needed for roaming environments
Alan T. DeKok [Wed, 12 Oct 2022 13:02:59 +0000 (09:02 -0400)]
allow Operator-Name and Called-Station-Id
which are needed for various roaming scenarios
Jorge Pereira [Wed, 12 Oct 2022 12:49:34 +0000 (09:49 -0300)]
DS-Lite-Tunnel-Name data type should be 'octets' (#4767)
Backport from v3.2.x (
be3b0426df )
Nick Porter [Wed, 12 Oct 2022 10:37:17 +0000 (11:37 +0100)]
Improve queries for processing radacct into periodic usage data
Removing `OR` from the query allows better index usage
Nick Porter [Wed, 12 Oct 2022 10:32:55 +0000 (11:32 +0100)]
Typo
Alan T. DeKok [Tue, 11 Oct 2022 22:57:04 +0000 (18:57 -0400)]
update docs to be in line with functionality
Jorge Pereira [Wed, 5 Oct 2022 19:32:15 +0000 (16:32 -0300)]
rediswho: Fix typo (#4756)
Matthew Newton [Wed, 28 Sep 2022 23:12:24 +0000 (00:12 +0100)]
update changelog
note #4441 fixed
Matthew Newton [Wed, 28 Sep 2022 22:50:52 +0000 (23:50 +0100)]
refresh configure scripts
Matthew Newton [Wed, 28 Sep 2022 22:49:32 +0000 (23:49 +0100)]
add python.m4 for detecting python > 3.10
Alan T. DeKok [Mon, 26 Sep 2022 21:53:08 +0000 (17:53 -0400)]
refresh.
Alexander Clouter [Mon, 29 Aug 2022 12:28:36 +0000 (13:28 +0100)]
enable parallel builds for debian
Alan T. DeKok [Sun, 10 Jul 2022 12:14:34 +0000 (08:14 -0400)]
add attribute. Fixes #4608
Jorge Pereira [Tue, 20 Sep 2022 14:10:50 +0000 (15:10 +0100)]
Nokia SR dict: Cleanup and freshen against July 2022 reference
Matthew Newton [Tue, 20 Sep 2022 19:26:27 +0000 (20:26 +0100)]
Bump for v3.0.27
Matthew Newton [Tue, 20 Sep 2022 13:45:21 +0000 (14:45 +0100)]
release 3.0.26
Alan T. DeKok [Sun, 28 Aug 2022 14:37:13 +0000 (10:37 -0400)]
as sent via email
Matthew Newton [Mon, 19 Sep 2022 11:13:54 +0000 (12:13 +0100)]
update ChangeLog