freeradius-server

Edit Package freeradius-server

NOTE: Automatically created during Factory devel project migration by admin.

Refresh
Refresh
Source Files
Filename Size Changed
freeradius-server-3.2.3.tar.bz2 0003454869 3.29 MB
freeradius-server-3.2.3.tar.bz2.sig 0000000591 591 Bytes
freeradius-server-enable-python3.patch 0000000767 767 Bytes
freeradius-server-fix-perl-shbang.patch 0000001054 1.03 KB
freeradius-server-opensslversion.patch 0000000566 566 Bytes
freeradius-server-radclient-init-error-buffer.patch 0000000434 434 Bytes
freeradius-server-rcradiusd.patch 0000000556 556 Bytes
freeradius-server-rlm_sql_unixodbc-configure.patch 0000000791 791 Bytes
freeradius-server-tmpfiles.patch 0000000310 310 Bytes
freeradius-server.changes 0000137743 135 KB
freeradius-server.spec 0000041050 40.1 KB
freeradius-tmpfiles.conf 0000000038 38 Bytes
freeradius.keyring 0000011090 10.8 KB
radiusd.service 0000000408 408 Bytes
Latest Revision
Peter Varkoly's avatar Peter Varkoly (pvarkoly) committed (revision 3)
- update to version 3.2.3:
  Feature Improvements
  * Add "max_retries" for connection pools. Fixes #4908.
  * Update dictionary.ciena, dictionary.huawei, dictionary.wifialliance and
    dictionary.wispr; add dictionary.eleven.
  * You can now list "eap" in the "pre-proxy" section. If the packet contains a
    malformed EAP message, then the request will be rejected The home server
    will either reject (or discard) this packet anyways, so this change can
    only help with large proxy scenarios.
  * Show warnings if libldap is not using OpenSSL.
  * Support RADIUS/1.1. See
    https://datatracker.ietf.org/doc/draft-dekok-radext-radiusv11/ Disabled by
    default, can be enabled by passing `--with-radiusv11` to the configure
    script. For now, this is for testing interoperability.
  * Add extra sanity checks for malformed EAP attributes.
  * More TLS debugging output.
  * Clear old module instance data before HUP reload. Avoids burst memory use
    when e.g. using large data files with rlm_files.
  * `rlm_cache_redis` is now included in the freeradius-redis packages.
Bug Fixes
  * Don't leak MD contexts with OpenSSL 3.0.
  * Increase internal buffer size for TLS connections, which can help with
    high-load proxies.
  * Send Status-Server checks for TLS connections.
  * Give descriptive error if "update CoA" is used with "fake" packets, as it
    won't work. i.e. inner-tunnel and virtual home servers.
  * Many small ASAN / LSAN fixes from Jorge Pereira.
  * Close inbound RADIUS/TLS socket on TLS errors. When a home server sees a
    TLS error, it will now close the socket, so proxies do not have an open
    (but dead) TLS connection.
Comments 0
openSUSE Build Service is sponsored by