]>
git.ipfire.org Git - thirdparty/freeradius-server.git/log
Nick Porter [Wed, 14 Aug 2024 08:40:47 +0000 (09:40 +0100)]
Debian sid has OpenSSL legacy providers in an optional package
Alan T. DeKok [Sat, 3 Aug 2024 17:07:24 +0000 (13:07 -0400)]
clean up for v3.0.x
Nick Porter [Mon, 29 Jul 2024 12:34:13 +0000 (13:34 +0100)]
Update 3GPP2 from latest standard revision
Nick Porter [Tue, 30 Jul 2024 09:22:52 +0000 (10:22 +0100)]
If OpenSSL handshake fails during Client Hello report cipher lists
Helps get to the bottom of "no shared cipher" errors.
Nick Porter [Fri, 2 Aug 2024 08:53:29 +0000 (09:53 +0100)]
Ensure fd event removed when removing listener
Nick Porter [Mon, 29 Jul 2024 09:38:57 +0000 (10:38 +0100)]
Bump github action versions
Except for ci-rpm where centos-7 is too old for node > 16
Nick Porter [Mon, 29 Jul 2024 09:35:35 +0000 (10:35 +0100)]
Debian sid appears to have dropped gcc-10
Nick Porter [Mon, 29 Jul 2024 07:42:17 +0000 (08:42 +0100)]
Correct ZTE dictionary
To match real packets seen in active systems.
Alan T. DeKok [Thu, 25 Jul 2024 23:18:37 +0000 (16:18 -0700)]
ignore home server "ping" packets
Nick Porter [Wed, 17 Jul 2024 09:57:15 +0000 (10:57 +0100)]
Use HEXIFY to handle non-octet looking RADIUSD_VERSION
Matthew Newton [Tue, 16 Jul 2024 15:32:22 +0000 (16:32 +0100)]
Bump for 3.0.28
Matthew Newton [Mon, 8 Jul 2024 20:03:16 +0000 (21:03 +0100)]
release 3.0.27
Terry Burton [Mon, 8 Jul 2024 14:55:44 +0000 (15:55 +0100)]
Config docs: Clients aggregators may be RADIUS proxies and set proxy-state
Alan T. DeKok [Sun, 7 Jul 2024 13:50:43 +0000 (09:50 -0400)]
handle dynamic require Message-Authenticator
Alan T. DeKok [Sat, 6 Jul 2024 15:49:54 +0000 (11:49 -0400)]
don't enforce require_ma on packet reception
Alan T. DeKok [Sat, 6 Jul 2024 14:09:27 +0000 (10:09 -0400)]
note recent changes
Alan T. DeKok [Thu, 4 Jul 2024 19:52:10 +0000 (15:52 -0400)]
typos and clarifications
Alan T. DeKok [Sun, 30 Jun 2024 01:53:48 +0000 (21:53 -0400)]
implement and document "require_message_authenticator = auto"
Alan T. DeKok [Sat, 29 Jun 2024 17:54:31 +0000 (13:54 -0400)]
add more helpful error messages
Alan T. DeKok [Sat, 29 Jun 2024 16:05:04 +0000 (12:05 -0400)]
implement and document "limit_proxy_state = auto"
Also add a standard function which complains loudly about security
issues.
Alan T. DeKok [Sat, 29 Jun 2024 14:27:47 +0000 (10:27 -0400)]
Enforce BlastRADIUS checks for TCP sockets, too.
Though TBH, no one should use TCP for anything.
Alan T. DeKok [Sat, 11 May 2024 19:41:03 +0000 (15:41 -0400)]
Add M-A processing for Status-Server and replies from home server
Alan T. DeKok [Wed, 10 Apr 2024 21:34:31 +0000 (17:34 -0400)]
add Blast RADIUS checks to radclient and radtest
Alan T. DeKok [Wed, 10 Apr 2024 21:33:38 +0000 (17:33 -0400)]
word smithing
Alan T. DeKok [Thu, 22 Feb 2024 11:01:22 +0000 (06:01 -0500)]
use and enforce limit_proxy_state for Access-Request packets
Alan T. DeKok [Thu, 22 Feb 2024 10:44:07 +0000 (05:44 -0500)]
make limit_proxy_state the default for clients
Alan T. DeKok [Thu, 22 Feb 2024 10:36:33 +0000 (05:36 -0500)]
add and document global limit_proxy_state
Alan T. DeKok [Fri, 16 Feb 2024 15:36:54 +0000 (10:36 -0500)]
add Message-Authenticator to all Access-Request packets
Alan T. DeKok [Fri, 16 Feb 2024 14:12:35 +0000 (09:12 -0500)]
add and set require_message_authenticator for home servers
Alan T. DeKok [Fri, 16 Feb 2024 13:46:11 +0000 (08:46 -0500)]
always add Message-Authenticator for replies to Access-Request
Alan T. DeKok [Fri, 16 Feb 2024 13:33:54 +0000 (08:33 -0500)]
add tls flag to packets
and set it for TLS transport send / receive. This lets the
packet encoder and verification routines behave differently for
TLS and non-TLS transport
Alan T. DeKok [Fri, 16 Feb 2024 13:29:54 +0000 (08:29 -0500)]
make require_message_authenticator the default for clients
and document the behavior change
Alan T. DeKok [Fri, 16 Feb 2024 13:23:09 +0000 (08:23 -0500)]
add and use "ignore default" flag
which means that if the configuration item is missing, we do not
set the value from the default.
This change allows the value to be set before the configuration
file is parsed, and then only changed if the named configuration
item exists, and is manually set by the admin
Alan T. DeKok [Fri, 16 Feb 2024 13:16:12 +0000 (08:16 -0500)]
rename for consistency
Alan T. DeKok [Fri, 16 Feb 2024 13:09:54 +0000 (08:09 -0500)]
add and document global require_message_authenticator
Matthew Newton [Mon, 8 Jul 2024 15:30:05 +0000 (16:30 +0100)]
Fixups for CentOS 7 which is now EOL
Alan T. DeKok [Sat, 6 Jul 2024 21:14:37 +0000 (17:14 -0400)]
note recent changes
Alexander Chernikov [Sat, 6 Jul 2024 21:12:58 +0000 (17:12 -0400)]
There may be multiple intermediate certs.
Alan T. DeKok [Mon, 24 Jun 2024 02:17:19 +0000 (22:17 -0400)]
note recent changes
Alan T. DeKok [Sun, 23 Jun 2024 17:16:24 +0000 (13:16 -0400)]
remove unused variable
Alan T. DeKok [Sun, 23 Jun 2024 17:05:28 +0000 (13:05 -0400)]
update stats more quickly
Alan T. DeKok [Sun, 23 Jun 2024 16:51:21 +0000 (12:51 -0400)]
don't double-count authentication packets
Alan T. DeKok [Sun, 23 Jun 2024 16:50:38 +0000 (12:50 -0400)]
don't count Status-Server
we don't count replies to it, so we shouldn't count requests, too
Alan T. DeKok [Sun, 23 Jun 2024 16:06:53 +0000 (12:06 -0400)]
typo
Alan T. DeKok [Sat, 15 Jun 2024 11:50:09 +0000 (07:50 -0400)]
update advice on shared secrets
Alan T. DeKok [Fri, 21 Jun 2024 13:15:23 +0000 (09:15 -0400)]
track global stats, even if the listeners have been closed
Matthew Newton [Fri, 21 Jun 2024 10:07:30 +0000 (11:07 +0100)]
Remove Centos 8 from CI
Backport
2d8d738f408 from v3.2.x
simeononsecurity [Fri, 21 Jun 2024 06:55:24 +0000 (01:55 -0500)]
Fix error in dictionary documentation
Change RFC 8859 to RFC 8559
Fixes #5345
simeononsecurity [Fri, 7 Jun 2024 02:15:41 +0000 (21:15 -0500)]
Update dictionary.wispr (#5336)
Add attribute 17 per https://github.com/wireless-broadband-alliance/RADIUS-VSA
Alexander Clouter [Wed, 12 Jun 2024 14:58:21 +0000 (15:58 +0100)]
mschapv2: set key length after specifying the cipher
We get a sigsegv otherwise:
----
(10) eap_mschapv2: Auth-Type MS-CHAP {
(10) mschap: Found Cleartext-Password, hashing to create NT-Password
(10) mschap: MS-CHAPv2 password change request received
(10) mschap: Password change payload valid
(10) mschap: Doing MS-CHAPv2 password change locally
Program received signal SIGSEGV, Segmentation fault.
0x00007ffff7b92f18 in EVP_CIPHER_CTX_set_key_length () from /lib/x86_64-linux-gnu/libcrypto.so.3
(gdb) where
new_nt_password=0x7fffffffb940 "...", nt_password=0x555555ccc290,
request=0x555555a9fde0, inst=0x5555558bacb0) at src/modules/rlm_mschap/rlm_mschap.c:1016
----
Matthew Newton [Wed, 29 May 2024 18:15:50 +0000 (19:15 +0100)]
note recent changes
Matthew Newton [Wed, 29 May 2024 15:56:22 +0000 (16:56 +0100)]
remove TCP Status-Server requests from proxy hash as well
fixes #5326
Nick Porter [Mon, 20 May 2024 08:13:54 +0000 (09:13 +0100)]
Ensure yum is installed on Rocky 9
Once CentOS 7 goes EoL, we can switch to dnf
Nick Porter [Mon, 1 Apr 2024 15:22:34 +0000 (16:22 +0100)]
rlm_sql_freetds: handle returned NULL column values
These don't update the results buffer - so zero it out during allocation.
Alan T. DeKok [Sat, 18 May 2024 20:50:56 +0000 (16:50 -0400)]
allocate instance data even if the module doesn't need it
which lets the rest of the distinguish virtual attributes from
typos in xlat functions
Alan T. DeKok [Sat, 18 May 2024 20:50:17 +0000 (16:50 -0400)]
fix typo.
We loop until the content is non-space, not while the ptr is !NULL
Nick Porter [Tue, 5 Mar 2024 12:24:26 +0000 (12:24 +0000)]
Ubuntu 18.04 is EoL
Nick Porter [Tue, 5 Mar 2024 11:54:56 +0000 (11:54 +0000)]
Ensure fakeroot is available for `make deb`
Alan T. DeKok [Mon, 4 Mar 2024 21:02:15 +0000 (16:02 -0500)]
add necessary backslash. Fixes #5301
Alan T. DeKok [Sat, 17 Feb 2024 12:07:52 +0000 (07:07 -0500)]
use snprintf
Nick Porter [Fri, 29 Dec 2023 10:15:04 +0000 (10:15 +0000)]
Add TP Link dictionary
Alan T. DeKok [Thu, 7 Dec 2023 14:24:42 +0000 (09:24 -0500)]
improve exception handling. Helps with #5242
so that no python exceptions remain after the do_python_single call.
Otherwise the next request will immediately fail.
Patch from #5242, but separated out to keep commit history
a little clearer.
Alan T. DeKok [Thu, 7 Dec 2023 11:45:29 +0000 (06:45 -0500)]
don't delay proxied rejects from a real home server
Alan T. DeKok [Wed, 29 Nov 2023 15:25:48 +0000 (10:25 -0500)]
more notes on connection starvation
Alan T. DeKok [Wed, 15 Nov 2023 13:13:05 +0000 (08:13 -0500)]
print out the module instance name
Alan T. DeKok [Tue, 14 Nov 2023 21:56:48 +0000 (16:56 -0500)]
clarify message a bit
Alan T. DeKok [Wed, 8 Nov 2023 12:28:59 +0000 (13:28 +0100)]
this is for UDP home servers
Alan T. DeKok [Wed, 13 Jul 2022 00:30:57 +0000 (20:30 -0400)]
ensure that cp is initialized on every iteration through the loop
Alan T. DeKok [Tue, 31 Oct 2023 22:00:46 +0000 (18:00 -0400)]
reply packets use request authenticator for Message-Authenticator
Nick Porter [Thu, 31 Aug 2023 10:51:37 +0000 (11:51 +0100)]
Build with winbind on all RHEL >= 7
Alan T. DeKok [Thu, 17 Aug 2023 16:58:19 +0000 (12:58 -0400)]
word smithing
Alan T. DeKok [Thu, 17 Aug 2023 14:10:44 +0000 (10:10 -0400)]
fix warning messages
Alan T. DeKok [Thu, 17 Aug 2023 16:58:45 +0000 (12:58 -0400)]
note recent changes
Alan T. DeKok [Wed, 16 Aug 2023 13:01:36 +0000 (09:01 -0400)]
if there's no "server foo", then use "server default"
Alan T. DeKok [Thu, 10 Aug 2023 13:28:13 +0000 (09:28 -0400)]
update the year
Matthew Newton [Tue, 8 Aug 2023 18:43:50 +0000 (19:43 +0100)]
don't leave dangling pointer to a cancelled coa request
Alan T. DeKok [Tue, 8 Aug 2023 12:20:46 +0000 (08:20 -0400)]
add client configuration for PSK
Jorge Pereira [Wed, 2 Aug 2023 17:21:39 +0000 (14:21 -0300)]
Fix multiple typos in MongoDB query.conf (#5130)
Nick Porter [Thu, 27 Jul 2023 11:34:42 +0000 (12:34 +0100)]
Add BEGIN-VENDOR and END-VENDOR to Calix dictionary
bryan [Thu, 27 Jul 2023 05:24:06 +0000 (13:24 +0800)]
add Calix-Role in Calix Dictionary (#5124)
Alan T. DeKok [Thu, 22 Jun 2023 13:41:45 +0000 (09:41 -0400)]
as sent via email
Matthew Newton [Sun, 11 Jun 2023 22:59:18 +0000 (23:59 +0100)]
add debian 12 bookworm to CI
Matthew Newton [Tue, 20 Jun 2023 19:28:18 +0000 (20:28 +0100)]
don't stop on eapol_test compile warnings
Matthew Newton [Mon, 12 Jun 2023 13:02:57 +0000 (14:02 +0100)]
docker/crossbuild: backport Dockerfile updates from 3.2
commits:
9806381bd3 docker: remove duplicate lines
13091819c3 docker: remove obsolete OSes
d35586d463 generate dockerfiles from m4 templates
ac339f4731 docker: add debian 12 bookworm
2a89b55398 docker: add rocky9
37db20c784 crossbuild: remove centos8
dc67a0492c crossbuild: generate Dockerfiles from m4 templates
707e0eb90a crossbuild: add recent OSes
e4bccf5ef7 crossbuild: update docs
80670757cc crossbuild: don't set rpm BUILDDIR
e88c86b25b crossbuild: newer systems disable TLS1.1 but we need it for testing
deb77d22b0 CI: add job to check all crossbuild docker images work
720709d0b4 docker: use similar m4 template system as for crossbuild
Alan T. DeKok [Tue, 13 Jun 2023 15:11:52 +0000 (11:11 -0400)]
allow for EOL of UDP sockets, too.
which also helps when building without TCP.
Alan T. DeKok [Tue, 13 Jun 2023 15:03:52 +0000 (11:03 -0400)]
document nonblock=yes
Alan T. DeKok [Tue, 13 Jun 2023 14:58:53 +0000 (10:58 -0400)]
note recent changes
Alan T. DeKok [Tue, 13 Jun 2023 14:27:20 +0000 (10:27 -0400)]
fix compiler warning when building without TCP. Fixes #5054
Alan T. DeKok [Tue, 13 Jun 2023 14:09:30 +0000 (10:09 -0400)]
Auth Lost: Free the state's opaque and ctx storage. Fixes #5055
Matthew Newton [Mon, 12 Jun 2023 19:21:24 +0000 (20:21 +0100)]
CI: fix with latest mariadb 11 docker image
ref https://jira.mariadb.org/browse/MDBF-568
Alan T. DeKok [Thu, 8 Jun 2023 06:57:14 +0000 (08:57 +0200)]
document retries. Fixes #5040 / #5041
Alan T. DeKok [Wed, 7 Jun 2023 09:18:45 +0000 (11:18 +0200)]
free check_tmp after using it. Fixes #5035
Alan T. DeKok [Tue, 6 Jun 2023 06:11:22 +0000 (08:11 +0200)]
mark "inst" as unused, and relax checks a bit more
for now, we will only check if the EAP message length is correct.
This prevents "middle box" effect, where the protocol cannot be
upgraded, because middle boxes aren't upgraded.
There is a near-zero chance that EAP will be updated to allow
supplicants to send something other than 1 (Response). But for
general protocol correctness and paranoia, let's allow for that
Alan T. DeKok [Tue, 6 Jun 2023 05:54:36 +0000 (07:54 +0200)]
build without TLS
Alan T. DeKok [Tue, 6 Jun 2023 05:44:52 +0000 (07:44 +0200)]
allow for non-blocking TCP connections, too
Alan T. DeKok [Sat, 3 Jun 2023 15:10:44 +0000 (11:10 -0400)]
relax the pre_proxy checks a bit
to allow any EAP type, even if it currently doesn't make sense
Alan T. DeKok [Fri, 2 Jun 2023 13:54:19 +0000 (09:54 -0400)]
fix typo. #5026 and #5028
Alan T. DeKok [Wed, 26 Apr 2023 14:03:20 +0000 (10:03 -0400)]
add Error-Cause = Invalid EAP Packet (Ignored)
when rejecting EAP packets in the pre-proxy stage
Alan T. DeKok [Thu, 30 Mar 2023 02:23:35 +0000 (11:23 +0900)]
more checks and sanity
allow extended types
Alan T. DeKok [Wed, 29 Mar 2023 08:05:11 +0000 (17:05 +0900)]
check EAP header byte 0, too, and add debug messages