]>
git.ipfire.org Git - thirdparty/freeradius-server.git/log
Alan T. DeKok [Thu, 1 Apr 2021 15:24:45 +0000 (11:24 -0400)]
allow for reverse coa proxying in request_will_proxy()
Add new Proxy-To-Originating-Realm attribute, and change
TCP-Session-Key to Originating-Realm-Key, which is perhaps
a little clearer.
also note that when we automatically create a home server
for incoming TLS connections, we set home->server, not
home->coa_server
Alan T. DeKok [Thu, 1 Apr 2021 15:07:05 +0000 (11:07 -0400)]
track the number of IDs used, so that we can allocate a free listener
Alan T. DeKok [Thu, 1 Apr 2021 14:43:48 +0000 (10:43 -0400)]
start of add / delete / lookup API for reverse coa listeners
Alan T. DeKok [Thu, 1 Apr 2021 14:09:51 +0000 (10:09 -0400)]
process coa replies through the coa server
Alan T. DeKok [Thu, 1 Apr 2021 13:41:23 +0000 (09:41 -0400)]
more descriptive errors for people who don't read the documentation
Alan T. DeKok [Thu, 1 Apr 2021 12:45:45 +0000 (08:45 -0400)]
rearrange brackets to quiet scan
Alan T. DeKok [Wed, 31 Mar 2021 20:09:25 +0000 (16:09 -0400)]
only define COA_TUNNEL if we have WITH_TLS
Alan T. DeKok [Wed, 31 Mar 2021 20:06:36 +0000 (16:06 -0400)]
let's define TCP-Session-Key
Alan T. DeKok [Wed, 31 Mar 2021 20:04:47 +0000 (16:04 -0400)]
build without CoA tunnels
Alan T. DeKok [Wed, 31 Mar 2021 19:27:37 +0000 (15:27 -0400)]
add the listener by key if required
so that when doing reverse proxying, we can find equivalent
listeners by key
Alan T. DeKok [Wed, 31 Mar 2021 18:44:12 +0000 (14:44 -0400)]
use listener->fd, not request->packet->sockfd
Alan T. DeKok [Wed, 31 Mar 2021 18:41:17 +0000 (14:41 -0400)]
look for CoA requests from a home server, and send replies
Alan T. DeKok [Wed, 31 Mar 2021 17:04:34 +0000 (13:04 -0400)]
add / delete incoming sockets to proxy list, if they're send_coa
Alan T. DeKok [Wed, 31 Mar 2021 16:52:25 +0000 (12:52 -0400)]
originate CoA requests to the NAS, and deal with the replies
Alan T. DeKok [Wed, 31 Mar 2021 16:51:48 +0000 (12:51 -0400)]
add and parse CoA fields for incoming listeners
Alan T. DeKok [Wed, 31 Mar 2021 15:53:37 +0000 (11:53 -0400)]
add feature flag
Alan T. DeKok [Wed, 31 Mar 2021 13:52:41 +0000 (09:52 -0400)]
add WITH_COA_TUNNEL definition
along with recv_coa functionality in the home server definition.
and parse / verify the home server configuration for recv coa
Alan T. DeKok [Wed, 31 Mar 2021 13:05:16 +0000 (09:05 -0400)]
add and use separate function for sending to a proxy listener
Alan T. DeKok [Wed, 31 Mar 2021 12:47:58 +0000 (08:47 -0400)]
move encode/decode for proxies to their own fields
Alan T. DeKok [Fri, 2 Apr 2021 18:01:44 +0000 (14:01 -0400)]
use better name
Alan T. DeKok [Fri, 2 Apr 2021 17:35:35 +0000 (13:35 -0400)]
make the TLS session information usable.
The code was originally written for TLS 1.0, and not updated
since then. Which means for a very long time, it was printing
TLS version numbers and lengths, but nothing about what was
actually going on. This change means that the output is rather
a lot more understandable.
Alan T. DeKok [Fri, 2 Apr 2021 17:00:28 +0000 (13:00 -0400)]
use correct parameter
Jorge Pereira [Fri, 2 Apr 2021 15:06:20 +0000 (12:06 -0300)]
Fix EAP input tests
Don't need to inform the 'ca_cert=...' cert files.
Jorge Pereira [Fri, 2 Apr 2021 13:55:59 +0000 (10:55 -0300)]
Fix CI EAP tests
Lets use our eapol_test specific version due to we expect to have the
TLS versions on/off options.
Jorge Pereira [Fri, 2 Apr 2021 13:55:18 +0000 (10:55 -0300)]
Fix EAP tests against specific TLS versions
We just need the tls_disable_tlsvXX=1 due to hostapd enables all TLS
versions.
Jorge Pereira [Fri, 2 Apr 2021 01:47:48 +0000 (22:47 -0300)]
Fix EAP tests allowing 'make -C src/tests/ tests.eap'
Even we should use the same 'eapol_test' binary among all systems. then,
just call the wrapper $(top_builddir)/scripts/ci/eapol_test-build.sh
Alan T. DeKok [Fri, 2 Apr 2021 16:32:50 +0000 (12:32 -0400)]
run policies to see if we can accept the RadSec connection
Alan T. DeKok [Fri, 2 Apr 2021 13:29:34 +0000 (09:29 -0400)]
don't delay responses to Status-Server
Alan T. DeKok [Fri, 2 Apr 2021 12:56:26 +0000 (08:56 -0400)]
gracefully handle closed connections
Alan T. DeKok [Fri, 2 Apr 2021 12:05:17 +0000 (08:05 -0400)]
handle SSL_ERROR_ZERO_RETURN a little more politely.
Alan T. DeKok [Fri, 2 Apr 2021 11:54:34 +0000 (07:54 -0400)]
sample stunnel configuration
which makes it easier to test radsec, just using radclient
Alan T. DeKok [Fri, 2 Apr 2021 11:36:05 +0000 (07:36 -0400)]
Allow TLS 1.3 for RadSec
Alan T. DeKok [Fri, 2 Apr 2021 11:23:33 +0000 (07:23 -0400)]
fix typo
Alan T. DeKok [Fri, 2 Apr 2021 10:25:42 +0000 (06:25 -0400)]
fix typo
Alan T. DeKok [Fri, 2 Apr 2021 10:15:00 +0000 (06:15 -0400)]
note recent changes
Alan T. DeKok [Fri, 2 Apr 2021 10:13:46 +0000 (06:13 -0400)]
document suppress_secrets
Alan T. DeKok [Thu, 1 Apr 2021 21:22:44 +0000 (17:22 -0400)]
more documentation for EAP-TLS
Vadim Cargatser [Wed, 24 Mar 2021 15:22:25 +0000 (17:22 +0200)]
Looks like there is bug in tls code w/ fr_nonblock
With that RADSEC is not working at all. The issue is in this commit:
https://github.com/FreeRADIUS/freeradius-server/commit/
b6d7249be1958d0080187846d8bab1f0fae6b857
it pretends to revert erroneously deleted lines from another commit:
https://github.com/FreeRADIUS/freeradius-server/commit/
f9c2f5a55d2df71979d99708f83d52336e44ad00
The thing is that it is not only reverting deleted lines, it also adds fr_nonblock(fd) call in tls_new_client_session.
Was that done by mistake? With that SSL_connect exits immediately while we are trying to send initial Access-Request
packet in proxy_tls_send. Of course at the this time the handshake is not yet finished and SSL_connect returns with an
error. SSL_connect will return success just on the following reads in proxy_tls_recv. But here we are in the recv
callback, handlshake is done... so what, we don't have any packet to send. I have deleted this fr_nonblock(fd) call
meanwhile.
Alan T. DeKok [Thu, 1 Apr 2021 18:17:14 +0000 (14:17 -0400)]
make request_coa_originate() follow the other methods
Jorge Pereira [Thu, 1 Apr 2021 20:58:36 +0000 (17:58 -0300)]
eapol_test: Fix OSX build using clang >= 11 (#3855) (#4044)
Fixes the eapol_test build using clang >= 11
../src/radius/radius_client.c:817:24: error: cast to smaller integer type 'RadiusType' from 'void *' [-Werror,-Wvoid-pointer-to-enum-cast]
RadiusType msg_type = (RadiusType) sock_ctx;
Alan T. DeKok [Wed, 31 Mar 2021 01:54:23 +0000 (21:54 -0400)]
complain if there aren't enough fields
Alan T. DeKok [Wed, 31 Mar 2021 01:52:16 +0000 (21:52 -0400)]
let's not crash, m'kay?
Alan T. DeKok [Wed, 31 Mar 2021 01:45:53 +0000 (21:45 -0400)]
update examples
Alan T. DeKok [Mon, 29 Mar 2021 23:08:07 +0000 (19:08 -0400)]
correct samples
Alan T. DeKok [Sun, 28 Mar 2021 14:24:35 +0000 (10:24 -0400)]
add more WARNINGs so that people who read them will be enlightened.
The default configuration depends on either User-Name or
Stripped-User-Name containing the identity of the user logging in.
If the identity is anonymized, and there's no Stripped-User-Name,
we need to warn the administrator that there is not enough
information to identify the user.
Alan T. DeKok [Sat, 27 Mar 2021 13:58:50 +0000 (09:58 -0400)]
don't print "name name" if we find a duplicate module name
Alan T. DeKok [Fri, 26 Mar 2021 14:01:17 +0000 (10:01 -0400)]
typo
Alan T. DeKok [Fri, 26 Mar 2021 14:00:55 +0000 (10:00 -0400)]
additional notes
Alan T. DeKok [Wed, 24 Mar 2021 14:22:47 +0000 (10:22 -0400)]
mark more attributes "secret"
Alan T. DeKok [Wed, 24 Mar 2021 14:20:06 +0000 (10:20 -0400)]
suppress more secrets
Alan T. DeKok [Wed, 24 Mar 2021 12:22:49 +0000 (08:22 -0400)]
typo
Alan T. DeKok [Mon, 22 Mar 2021 20:08:42 +0000 (16:08 -0400)]
use prefix, too
Alan T. DeKok [Mon, 22 Mar 2021 19:57:17 +0000 (15:57 -0400)]
suppress secrets here, too
Alan T. DeKok [Mon, 22 Mar 2021 19:53:55 +0000 (15:53 -0400)]
add and check for "suppress_secrets"
so that debug output contains fewer secrets
Alan T. DeKok [Mon, 22 Mar 2021 19:39:33 +0000 (15:39 -0400)]
add "secret" flag to attribute
so we can not print it. Sometimes. Maybe.
Alan T. DeKok [Mon, 22 Mar 2021 19:34:00 +0000 (15:34 -0400)]
Add verify_tls_client_common_name policy
Terry Burton [Mon, 22 Mar 2021 19:37:32 +0000 (19:37 +0000)]
CI package tests: Use Azure-hosted mirrors for better reliability (#3981)
Jorge Pereira [Mon, 22 Mar 2021 15:50:57 +0000 (12:50 -0300)]
:wrench: rlm_yubikey: Fix parenting issues (#4012)
Alan T. DeKok [Mon, 22 Mar 2021 13:01:53 +0000 (09:01 -0400)]
Added Centec dictionary. Fixes #4010
Terry Burton [Fri, 19 Mar 2021 23:30:37 +0000 (23:30 +0000)]
Missing subsection search entry for "refresh" cache method (#4009)
Terry Burton [Fri, 19 Mar 2021 21:44:24 +0000 (21:44 +0000)]
Typo (#4008)
Matthew Newton [Fri, 19 Mar 2021 21:14:49 +0000 (21:14 +0000)]
remove from Jenkinsfile, too
Matthew Newton [Fri, 19 Mar 2021 20:59:57 +0000 (20:59 +0000)]
update to fix CentOS' powertools breakage
Matthew Newton [Fri, 19 Mar 2021 20:51:33 +0000 (20:51 +0000)]
Remove CentOS 6 from Jenkins builds as now EOL
Alan T. DeKok [Mon, 15 Mar 2021 17:48:48 +0000 (13:48 -0400)]
whoops, need this too
Alan T. DeKok [Mon, 15 Mar 2021 17:48:15 +0000 (13:48 -0400)]
document "auth+acct" too
Alan T. DeKok [Mon, 15 Mar 2021 17:38:06 +0000 (13:38 -0400)]
note recent changes
Alan T. DeKok [Mon, 15 Mar 2021 17:36:46 +0000 (13:36 -0400)]
add IPv6 address for server / client stats
and check for them when looking up stats for server / client
Alan T. DeKok [Mon, 15 Mar 2021 17:15:31 +0000 (13:15 -0400)]
don't count Status-Server in auth/acct counters
because we already don't count the replies
Jorge Pereira [Sun, 14 Mar 2021 17:37:13 +0000 (14:37 -0300)]
rlm_yubikey: The API uris should be 'https' (#3979)
Jorge Pereira [Sun, 7 Mar 2021 00:16:51 +0000 (21:16 -0300)]
rlm_sql_map: Add 'multiple_rows' option (#3903)
Alan T. DeKok [Thu, 4 Mar 2021 22:14:51 +0000 (17:14 -0500)]
run EAP-MD5, too
and sort the files, so they're always run in the same order.
Alan T. DeKok [Thu, 4 Mar 2021 22:06:36 +0000 (17:06 -0500)]
reformat and normalize eapol_test configuration files
Alexander Clouter [Sat, 13 Feb 2021 10:37:50 +0000 (10:37 +0000)]
eap: test for TLS session resumption
Alan T. DeKok [Thu, 4 Mar 2021 21:22:24 +0000 (16:22 -0500)]
disable resumption tests, and check for TLS version in version tests
Alexander Clouter [Sat, 13 Feb 2021 14:48:18 +0000 (14:48 +0000)]
eap: configuration for fast
Alexander Clouter [Sat, 13 Feb 2021 15:00:31 +0000 (15:00 +0000)]
eap: add eap-{ttls,peap}/eap-tls tests
Terry Burton [Thu, 4 Mar 2021 21:12:58 +0000 (21:12 +0000)]
CI RPMs: Remove workaround for scomp filter bug with faccessat2 (#3969)
No longer required.
Alan T. DeKok [Thu, 4 Mar 2021 19:29:30 +0000 (14:29 -0500)]
note recent changes
Alan T. DeKok [Thu, 4 Mar 2021 16:09:44 +0000 (11:09 -0500)]
use correct name for doxygen
Alan T. DeKok [Thu, 4 Mar 2021 15:03:26 +0000 (10:03 -0500)]
remove unused assignment
Alan T. DeKok [Thu, 4 Mar 2021 14:27:07 +0000 (09:27 -0500)]
remove unnecessary code
due to unresolved issues (interactions with OpenSSL APIs),
just always use 1 session ticket, even for PEAP / TTLS.
Alan T. DeKok [Thu, 4 Mar 2021 13:01:34 +0000 (08:01 -0500)]
Revert "add flag to send early session tickets"
This reverts commit
1663b982854e66eaa9191aec549aa8942c942947 .
this doesn't work.
We really need SSL_new_session_ticket(), which is only in
OpenSSL 3. Which is not released.
Arran Cudbard-Bell [Thu, 4 Mar 2021 14:04:34 +0000 (14:04 +0000)]
Pull over fixes from master
Arran Cudbard-Bell [Thu, 4 Mar 2021 13:40:14 +0000 (13:40 +0000)]
Just use a static value to differentiate tests running on different branches
Arran Cudbard-Bell [Thu, 4 Mar 2021 13:25:49 +0000 (13:25 +0000)]
Add auto-merge for v3.0.x
Alan T. DeKok [Wed, 3 Mar 2021 20:40:12 +0000 (15:40 -0500)]
add flag to send early session tickets
mainly for TTLS and PEAP
Alan T. DeKok [Wed, 3 Mar 2021 13:30:39 +0000 (08:30 -0500)]
be kind to non-TLS builds
Alan T. DeKok [Wed, 3 Mar 2021 13:14:25 +0000 (08:14 -0500)]
include correct header
Alan T. DeKok [Wed, 3 Mar 2021 12:59:55 +0000 (07:59 -0500)]
delay session tickets until after the user was authenticated
for PEAP, TTLS, FAST, etc.
Alan T. DeKok [Wed, 3 Mar 2021 12:34:29 +0000 (07:34 -0500)]
move code to common area
Alan T. DeKok [Wed, 3 Mar 2021 12:30:47 +0000 (07:30 -0500)]
clean up expired sessions
Alan T. DeKok [Wed, 3 Mar 2021 12:26:27 +0000 (07:26 -0500)]
set flag indicating that authentication succeeded.
not used much for now, but will do in the future.
Alan T. DeKok [Wed, 24 Feb 2021 19:05:13 +0000 (14:05 -0500)]
forbid doing session tickets until after the client cert is verified
Alan T. DeKok [Tue, 2 Mar 2021 12:27:39 +0000 (07:27 -0500)]
remove old maintainer who is no longer active
Alan T. DeKok [Fri, 26 Feb 2021 17:42:04 +0000 (12:42 -0500)]
remove unused label
Alan T. DeKok [Fri, 26 Feb 2021 17:37:24 +0000 (12:37 -0500)]
swap the order of allocate for unknown da's. Fixes #3937
Alan T. DeKok [Fri, 26 Feb 2021 17:37:11 +0000 (12:37 -0500)]
don't decode anything for CUI
Alan T. DeKok [Fri, 26 Feb 2021 16:57:34 +0000 (11:57 -0500)]
expose fr_pair_alloc()
Alan T. DeKok [Fri, 26 Feb 2021 16:36:06 +0000 (11:36 -0500)]
remove unused variable