]>
git.ipfire.org Git - thirdparty/freeradius-server.git/log
Alan T. DeKok [Thu, 22 Jun 2023 13:56:26 +0000 (09:56 -0400)]
parent is used
Alan T. DeKok [Thu, 22 Jun 2023 13:48:13 +0000 (09:48 -0400)]
as sent via email
Alan T. DeKok [Wed, 14 Jun 2023 14:12:11 +0000 (10:12 -0400)]
check for invalid packet types in more protocols
Nick Porter [Thu, 22 Jun 2023 13:15:35 +0000 (14:15 +0100)]
Correct locating of fr_tls_conf_t when parsing cache mode
`parent` is the fr_tls_cache_conf_t being populated, which is a member
of the fr_tls_conf_t.
Nick Porter [Thu, 22 Jun 2023 10:42:13 +0000 (11:42 +0100)]
Move tls_conf_parse_cache_mode outside of #ifdef __APPLE__
Max Khon [Wed, 21 Jun 2023 21:20:43 +0000 (22:20 +0100)]
Add "--without rlm_python" support
Max Khon [Wed, 21 Jun 2023 21:27:07 +0000 (22:27 +0100)]
Allow to specify YUM_BUILDDEP_FLAGS (like YUM_BUILDDEP_FLAGS="--define '_without_python 1'")
Arran Cudbard-Bell [Thu, 22 Jun 2023 03:36:08 +0000 (23:36 -0400)]
tls: Mark cache mode function as static
James Jones [Wed, 21 Jun 2023 22:23:43 +0000 (17:23 -0500)]
Typo
Arran Cudbard-Bell [Wed, 21 Jun 2023 21:02:10 +0000 (17:02 -0400)]
Print line numbers in the format vscode likes
Arran Cudbard-Bell [Wed, 21 Jun 2023 21:01:37 +0000 (17:01 -0400)]
Fix build issue
Arran Cudbard-Bell [Wed, 21 Jun 2023 20:25:41 +0000 (16:25 -0400)]
call_env: Write out an explicit result from evaluation so that module calls fail correctly
Arran Cudbard-Bell [Wed, 21 Jun 2023 19:47:57 +0000 (15:47 -0400)]
tls: Process cache mode early
Arran Cudbard-Bell [Wed, 21 Jun 2023 19:47:35 +0000 (15:47 -0400)]
triggers: Don't crash on trigger execution
Arran Cudbard-Bell [Thu, 15 Jun 2023 15:48:22 +0000 (11:48 -0400)]
Grammar
Max Khon [Wed, 14 Jun 2023 20:18:04 +0000 (21:18 +0100)]
fr_redis_cluster_conn_create(): tls session should be allocated in `conn' context
Max Khon [Wed, 14 Jun 2023 19:20:14 +0000 (20:20 +0100)]
redis: Add "use_cluster_map = no": when redis server is configured for TLS
and freeradius TLS is implemented using stunnel, freeradius connects to redis
(stunnel) using plaintext, then tries to open plaintext connection to cluster nodes
which only accept TLS
Max Khon [Wed, 14 Jun 2023 19:19:34 +0000 (20:19 +0100)]
redis: Add "use_tls = yes" support (if hiredis supports SSL).
github-actions[bot] [Wed, 21 Jun 2023 09:35:12 +0000 (09:35 +0000)]
Scheduled fuzzing: Update src/tests/fuzzer-corpus/dhcpv6.tar
github-actions[bot] [Wed, 21 Jun 2023 09:35:10 +0000 (09:35 +0000)]
Scheduled fuzzing: Update src/tests/fuzzer-corpus/dhcpv4.tar
github-actions[bot] [Wed, 21 Jun 2023 09:35:06 +0000 (09:35 +0000)]
Scheduled fuzzing: Update src/tests/fuzzer-corpus/radius.tar
github-actions[bot] [Wed, 21 Jun 2023 09:35:01 +0000 (09:35 +0000)]
Scheduled fuzzing: Update src/tests/fuzzer-corpus/util.tar
github-actions[bot] [Wed, 21 Jun 2023 09:34:58 +0000 (09:34 +0000)]
Scheduled fuzzing: Update src/tests/fuzzer-corpus/tftp.tar
github-actions[bot] [Wed, 21 Jun 2023 09:34:55 +0000 (09:34 +0000)]
Scheduled fuzzing: Update src/tests/fuzzer-corpus/vmps.tar
github-actions[bot] [Wed, 21 Jun 2023 09:34:52 +0000 (09:34 +0000)]
Scheduled fuzzing: Update src/tests/fuzzer-corpus/tacacs.tar
github-actions[bot] [Wed, 21 Jun 2023 09:34:48 +0000 (09:34 +0000)]
Scheduled fuzzing: Update src/tests/fuzzer-corpus/dns.tar
James Jones [Tue, 20 Jun 2023 19:31:41 +0000 (14:31 -0500)]
Move assignment to success (CID #
1504462 ) (#5074)
Coverity looks at control flow in xlat_purify_list() and judges that
success is guaranteed to be false by the time it's checked. We think
that moving the initialization before the unlang_xlat_push_node()
call, which passes it &success, will function the same while
reassuring coverity.
James Jones [Tue, 20 Jun 2023 14:50:01 +0000 (09:50 -0500)]
Model fr_md5_calc() (#5065)
James Jones [Tue, 20 Jun 2023 14:49:29 +0000 (09:49 -0500)]
Rewrite udp_len check in fr_udp_header_check() for coverity (CID #
1504068 ) (#5072)
It wasn't practical to write a single UDP header check function,
so the change to make coverity see that udp_len is valid has to be
there twice.
Nick Porter [Tue, 20 Jun 2023 10:20:44 +0000 (11:20 +0100)]
Typo
Jorge Pereira [Tue, 20 Jun 2023 04:43:51 +0000 (01:43 -0300)]
Some dhcpv6 fixes (#5071)
* dhcpv6: Fix potential memory leak
* dhcpv6: Fix typo in default virtual server
* dhcpv6: Don't crash if 'interface' is empty.
It fixes:
Mon Jun 19 23:40:31 2023: Bootstrapping proto_dhcpv4 "dhcp.dhcpv4"
Mon Jun 19 23:40:31 2023: Bootstrapping proto_dhcpv6 "dhcpv6.all_dhcp_servers_and_relays"
Process 73144 stopped
* thread #1, queue = 'com.apple.main-thread', stop reason = EXC_BAD_ACCESS (code=1, address=0x0)
frame #0: 0x00000001a68c853c libsystem_platform.dylib`_platform_strcmp + 12
libsystem_platform.dylib`:
-> 0x1a68c853c <+12>: ldrb w5, [x1], #0x1
0x1a68c8540 <+16>: subs x3, x4, x5
0x1a68c8544 <+20>: ccmp w4, #0x0, #0x4, eq
0x1a68c8548 <+24>: b.ne 0x1a68c8530 ; <+0>
(lldb) bt
* thread #1, queue = 'com.apple.main-thread', stop reason = EXC_BAD_ACCESS (code=1, address=0x0)
* frame #0: 0x00000001a68c853c libsystem_platform.dylib`_platform_strcmp + 12
frame #1: 0x0000000100368d60 libfreeradius-util.dylib`fr_interface_to_ethernet(interface=0x0000000000000000, ethernet=0x0000600003e041b0) at inet.c:1570:7
frame #2: 0x0000000100ed7c7c proto_dhcpv6_udp.dylib`mod_bootstrap(mctx=0x000000016fdfdd60) at proto_dhcpv6_udp.c:564:9
frame #3: 0x00000001002aecbc libfreeradius-io.dylib`mod_bootstrap(mctx=0x000000016fdfe100) at master.c:2610:41
frame #4: 0x0000000100b85260 proto_dhcpv6.dylib`mod_bootstrap(mctx=0x000000016fdfe890) at proto_dhcpv6.c:470:9
frame #5: 0x0000000100619bd8 libfreeradius-server.dylib`module_bootstrap(mi=0x0000000102214890) at module.c:778:7
frame #6: 0x0000000100619d0c libfreeradius-server.dylib`modules_bootstrap(ml=0x0000600002fa85e0) at module.c:811:7
frame #7: 0x000000010066c9b0 libfreeradius-server.dylib`virtual_servers_bootstrap(config=0x0000000100ff2c30) at virtual_servers.c:1301:6
frame #8: 0x00000001005ce87c libfreeradius-server.dylib`server_init(cs=0x0000000100ff2c30) at base.c:68:6
frame #9: 0x00000001000043a0 radiusd`main(argc=7, argv=0x000000016fdfecb8) at radiusd.c:788:6
Jorge Pereira [Tue, 20 Jun 2023 04:41:38 +0000 (01:41 -0300)]
The option 'tmpdir' is no longer available (#5070)
James Jones [Thu, 15 Jun 2023 23:11:48 +0000 (18:11 -0500)]
Help coverity see validation of option_len (#5064)
Arran Cudbard-Bell [Thu, 15 Jun 2023 15:20:09 +0000 (11:20 -0400)]
xlat: Register xlat protocols _AFTER_ bootstrap has completed
Arran Cudbard-Bell [Thu, 15 Jun 2023 15:17:11 +0000 (11:17 -0400)]
xlat: Expose the protocol xlat registraiton function
Arran Cudbard-Bell [Thu, 15 Jun 2023 15:16:46 +0000 (11:16 -0400)]
xlat: Add module find function
Arran Cudbard-Bell [Wed, 14 Jun 2023 22:11:01 +0000 (18:11 -0400)]
Virtual servers should be freed and unloaded before modules Closes #5062
Arran Cudbard-Bell [Wed, 14 Jun 2023 18:19:05 +0000 (14:19 -0400)]
Update copyright year... now we're in June
Arran Cudbard-Bell [Wed, 14 Jun 2023 18:05:37 +0000 (14:05 -0400)]
eap: Deal with the case where the first response message is not an Identity-Response Closes #5061
Jorge Pereira [Wed, 14 Jun 2023 16:15:38 +0000 (13:15 -0300)]
dhcpclient: Add missing '-r <retries>' help message. (#5058)
* dhcpclient: Add missing '-r <retries>' help message.
* dhcpclient: Better message to avoid bad experience
Even in debug mode (-x), its impossible to know if the client is blocked
or trying something.
James Jones [Wed, 14 Jun 2023 16:15:09 +0000 (11:15 -0500)]
Help coverity see validation of field_len (#5059)
Max Khon [Wed, 14 Jun 2023 16:14:41 +0000 (17:14 +0100)]
Don't set msg callback: required for SSL objects created by SSL_new() from freeradius SSL_CTX (#5056)
Alan T. DeKok [Wed, 14 Jun 2023 14:09:24 +0000 (10:09 -0400)]
double-check for bad packets. Fixes #5060
Alan T. DeKok [Wed, 14 Jun 2023 14:06:17 +0000 (10:06 -0400)]
add definition for decline. Helps with #5060
Alan T. DeKok [Wed, 14 Jun 2023 03:13:57 +0000 (23:13 -0400)]
remove unused label
Alan T. DeKok [Wed, 14 Jun 2023 02:20:51 +0000 (22:20 -0400)]
move "set priority or discard"
to just before "send packet to worker"
Alan T. DeKok [Wed, 14 Jun 2023 02:07:22 +0000 (22:07 -0400)]
remove unused priority from mod_read()
this is now a function of the app (proto_radius), and not the
IO layer (proto_radius_udp)
Alan T. DeKok [Wed, 14 Jun 2023 01:53:11 +0000 (21:53 -0400)]
set the priority if there's a mod_priority_set() function
because the app_io routines probably shouldn't be setting the
priority for each packet.
Alan T. DeKok [Wed, 14 Jun 2023 01:46:49 +0000 (21:46 -0400)]
add mod_priority_set(), as with all of the other listeners
because setting the packet priority is a function of the protocol
(i.e. proto_radius), and not of the IO handler (e.g. proto_radius_udp)
Alan T. DeKok [Wed, 14 Jun 2023 01:35:21 +0000 (21:35 -0400)]
remove is_dup parameter from app_io mod_read()
nothing used it, so it's not necessary.
The base IO routines should just read packets. The code which adds
tracking should instead check for duplicates.
Jorge Pereira [Wed, 14 Jun 2023 00:19:41 +0000 (21:19 -0300)]
More SoH clean-ups
Remove all doc references
Jorge Pereira [Tue, 13 Jun 2023 17:33:34 +0000 (14:33 -0300)]
Fix formatting in dhcpv6 (#5053)
Arran Cudbard-Bell [Tue, 13 Jun 2023 17:32:31 +0000 (13:32 -0400)]
tls: Make request optional in more places
James Jones [Tue, 13 Jun 2023 15:18:12 +0000 (10:18 -0500)]
Add TEST_CHECK_SLEN_RETURN() and use as appropriate in sbuff tests (#5050)
Test code typically only looks at check results to the extent
necessary to report errors. That means that even if the functions
tests call are correctly modeled, coverity will rightly see that,
for example, some buffers may not be initialized.
We therefore write TEST_CHECK_SLEN_RETURN(), which does what
TEST_CHECK_SLEN() does and then returns if the check fails.
Jorge Pereira [Tue, 13 Jun 2023 08:36:34 +0000 (05:36 -0300)]
Clean up remains of SoH protocol (#5052)
Related to the previous
309f347 commit.
Jorge Pereira [Mon, 12 Jun 2023 19:57:10 +0000 (16:57 -0300)]
Remove unused variable (#5049)
Matthew Newton [Mon, 12 Jun 2023 19:14:35 +0000 (20:14 +0100)]
CI: fix with latest mariadb 11 docker image
ref https://jira.mariadb.org/browse/MDBF-568
Arran Cudbard-Bell [Mon, 12 Jun 2023 17:57:32 +0000 (13:57 -0400)]
tls: SSL_set_verify is used in the session alloc functions, so we don't need to call it in the SSL_CTX alloc function
Alan T. DeKok [Mon, 12 Jun 2023 17:40:33 +0000 (13:40 -0400)]
just nuke erroneous Proxy-State attributes
There's no reason for a policy or module to create / inspect / use
Proxy-State. It's strictly a RADIUS client-server signalling
attribute.
Alan T. DeKok [Mon, 12 Jun 2023 17:34:09 +0000 (13:34 -0400)]
remove SoH protocol API.
It's been dead for a long time.
Arran Cudbard-Bell [Mon, 12 Jun 2023 16:44:49 +0000 (12:44 -0400)]
Add new Huawei VSA, Closes #5016
Max Khon [Mon, 12 Jun 2023 16:41:06 +0000 (17:41 +0100)]
TLS changes required for native redis TLS support (#5046)
* Allow empty tls configuration
James Jones [Mon, 12 Jun 2023 13:58:19 +0000 (08:58 -0500)]
Model tmpl_print()
James Jones [Mon, 12 Jun 2023 15:39:08 +0000 (10:39 -0500)]
Remove needless benign redefinition of TEST_CHECK_SLEN()
Arran Cudbard-Bell [Mon, 12 Jun 2023 16:34:59 +0000 (12:34 -0400)]
Remove dup macros from dbuff_tests
Arran Cudbard-Bell [Mon, 12 Jun 2023 16:07:27 +0000 (12:07 -0400)]
tls: Make fr_tls_session_alloc_client work without a bound request
Arran Cudbard-Bell [Fri, 9 Jun 2023 18:19:00 +0000 (14:19 -0400)]
unlang: Component isn't used for module compilation anymore
Arran Cudbard-Bell [Fri, 9 Jun 2023 15:31:04 +0000 (11:31 -0400)]
radius: Don't add proxy state if there's already proxy state attributes in the reponse.
Arran Cudbard-Bell [Fri, 9 Jun 2023 15:22:02 +0000 (11:22 -0400)]
subrequest: Don't crash in debug builds when a detached subrequest is about to exit
Nick Porter [Thu, 8 Jun 2023 09:50:51 +0000 (10:50 +0100)]
Use module method names to set methods for DHCP send sections
Nick Porter [Thu, 8 Jun 2023 09:08:57 +0000 (10:08 +0100)]
Remove tmpls from rlm_redis_ippool_t
Nick Porter [Thu, 8 Jun 2023 09:02:06 +0000 (10:02 +0100)]
Remove un-used ippool_pool_name()
Nick Porter [Thu, 8 Jun 2023 08:39:14 +0000 (09:39 +0100)]
Re-work redis_ippool method calls to use call environment
Nick Porter [Wed, 7 Jun 2023 16:23:34 +0000 (17:23 +0100)]
Add a call environment to rlm_redis_ippool
Nick Porter [Thu, 8 Jun 2023 08:41:05 +0000 (09:41 +0100)]
Add check that tmpl exands to attr ref when type == FR_TYPE_ATTRIBUTE
Nick Porter [Wed, 7 Jun 2023 13:44:24 +0000 (14:44 +0100)]
Add tmpl only call environment entries
For use where the requirement is just a tmpl to produce output pair(s)
James Jones [Thu, 8 Jun 2023 16:09:00 +0000 (11:09 -0500)]
Correct function name in comment
James Jones [Thu, 1 Jun 2023 15:00:49 +0000 (10:00 -0500)]
Test get_chunk() return value in some simple cases
Those are cases that use a byte-swapped value, which sets off
coverity's tainted data alarms. Adding the same check used for
the more complex cases shoulo placate coverity and let us get
rid of the annotations that follow get_check() invocations.
Nick Porter [Tue, 30 May 2023 15:13:09 +0000 (16:13 +0100)]
Add test of removing static IP assignment
Nick Porter [Tue, 30 May 2023 12:26:31 +0000 (13:26 +0100)]
Split static and dynamic leases in redis_ippool_tool statistics
Nick Porter [Tue, 30 May 2023 09:43:18 +0000 (10:43 +0100)]
Add un-assignment of static leases to redis_ippool_tool
Nick Porter [Thu, 25 May 2023 14:32:25 +0000 (15:32 +0100)]
Tidy other redis_ippool tests
Nick Porter [Thu, 25 May 2023 12:44:08 +0000 (13:44 +0100)]
Add tests of static redis_ippool assignments
Nick Porter [Mon, 15 May 2023 16:47:53 +0000 (17:47 +0100)]
Update rlm_redis_ippool_tool to be able to add static assignments
Nick Porter [Mon, 15 May 2023 16:49:32 +0000 (17:49 +0100)]
Add a uctx to redis_ippool_queue_t callback
Allows call specific data to be passed
Nick Porter [Tue, 30 May 2023 07:59:19 +0000 (08:59 +0100)]
Renumber lines in redis_ippool Lua scripts
Nick Porter [Mon, 15 May 2023 16:42:21 +0000 (17:42 +0100)]
Update redis_ippool to allow for static IP allocation
Static allocations are defined by a ZSCORE with bit 52 set in the <pool_name>:pool ZSET and pre-created entries in the <pool_name>:ip:<address> hash and <pool_name>:device:<owner> key
Alan T. DeKok [Thu, 8 Jun 2023 08:03:04 +0000 (10:03 +0200)]
remove SoH support
Alan T. DeKok [Thu, 8 Jun 2023 08:02:01 +0000 (10:02 +0200)]
build out make util library, too
Alan T. DeKok [Thu, 8 Jun 2023 07:57:11 +0000 (09:57 +0200)]
remove SoH tests
Alan T. DeKok [Thu, 8 Jun 2023 07:37:36 +0000 (09:37 +0200)]
use IPV6_BOUND_IF, too.
And minor cleanups and consistency changes
Alan T. DeKok [Mon, 29 May 2023 19:42:46 +0000 (15:42 -0400)]
Remove rlm_soh
Microsoft deprecated SoH / NAP in Windows Server 2012 E2, and
removed it from Windows Server 2016. The NAP client was removed
in Windows 10, in 2015
Nick Porter [Wed, 7 Jun 2023 14:54:44 +0000 (15:54 +0100)]
Correct calculation of tmpl pointer
James Jones [Fri, 2 Jun 2023 13:45:24 +0000 (08:45 -0500)]
Use udp_len in UDP length checks
Coverity appears to be faked out by the use of diff to
validate udp_len, and hence complains about tainted data.
James Jones [Fri, 2 Jun 2023 18:44:47 +0000 (13:44 -0500)]
Rewrite check on length in dhcpv6_print_hex()
We suspect that coverity is confused by the check as written, and
so rewrite it so that the variable checked is alone on the LHS of
the comparison.
Arran Cudbard-Bell [Tue, 6 Jun 2023 16:41:37 +0000 (12:41 -0400)]
radius: Make it impossible for the user to modify Proxy-State attributes, as we do with DHCPv6 and response fields
Arran Cudbard-Bell [Tue, 6 Jun 2023 16:41:08 +0000 (12:41 -0400)]
Remove NO_RCTX state machine macros, there's always an RCTX now
Arran Cudbard-Bell [Tue, 6 Jun 2023 13:20:38 +0000 (09:20 -0400)]
Revert "Quick hack to try and get tests passing again"
This reverts commit
82ef4fc33b2d61fe3da92501b036f6db59fde5c5 .
Nick Porter [Tue, 6 Jun 2023 11:29:50 +0000 (12:29 +0100)]
DO_NOT_RESPOND is a valid reply packet type for DHCP
Nick Porter [Tue, 6 Jun 2023 10:11:30 +0000 (11:11 +0100)]
Update tests to match echoed back Proxy-State
The module accounting tests use Access-Request packets but call the
modules in accouning context.
Since Access-Request packets are used, the Proxy-State in the request is
reflected back in the Access-Accept