freeradius-server

Edit Package freeradius-server

NOTE: Automatically created during Factory devel project migration by admin.

Refresh
Refresh
Source Files
Filename Size Changed
freeradius-server-3.2.3.tar.bz2 0003454869 3.29 MB
freeradius-server-3.2.3.tar.bz2.sig 0000000591 591 Bytes
freeradius-server-enable-python3.patch 0000000767 767 Bytes
freeradius-server-fix-perl-shbang.patch 0000001054 1.03 KB
freeradius-server-opensslversion.patch 0000000566 566 Bytes
freeradius-server-radclient-init-error-buffer.patch 0000000434 434 Bytes
freeradius-server-rcradiusd.patch 0000000556 556 Bytes
freeradius-server-rlm_sql_unixodbc-configure.patch 0000000791 791 Bytes
freeradius-server-tmpfiles.patch 0000000310 310 Bytes
freeradius-server.changes 0000137743 135 KB
freeradius-server.spec 0000041001 40 KB
freeradius-tmpfiles.conf 0000000038 38 Bytes
freeradius.keyring 0000011090 10.8 KB
radiusd.service 0000000408 408 Bytes
Revision 161 (latest revision is 173)
Adam Majer's avatar Adam Majer (adamm) committed (revision 161)
- update to version 3.2.3:
  Feature Improvements
  * Add "max_retries" for connection pools. Fixes #4908.
  * Update dictionary.ciena, dictionary.huawei, dictionary.wifialliance and
    dictionary.wispr; add dictionary.eleven.
  * You can now list "eap" in the "pre-proxy" section. If the packet contains a
    malformed EAP message, then the request will be rejected The home server
    will either reject (or discard) this packet anyways, so this change can
    only help with large proxy scenarios.
  * Show warnings if libldap is not using OpenSSL.
  * Support RADIUS/1.1. See
    https://datatracker.ietf.org/doc/draft-dekok-radext-radiusv11/ Disabled by
    default, can be enabled by passing `--with-radiusv11` to the configure
    script. For now, this is for testing interoperability.
  * Add extra sanity checks for malformed EAP attributes.
  * More TLS debugging output.
  * Clear old module instance data before HUP reload. Avoids burst memory use
    when e.g. using large data files with rlm_files.
  * `rlm_cache_redis` is now included in the freeradius-redis packages.
Bug Fixes
  * Don't leak MD contexts with OpenSSL 3.0.
  * Increase internal buffer size for TLS connections, which can help with
    high-load proxies.
  * Send Status-Server checks for TLS connections.
  * Give descriptive error if "update CoA" is used with "fake" packets, as it
    won't work. i.e. inner-tunnel and virtual home servers.
  * Many small ASAN / LSAN fixes from Jorge Pereira.
  * Close inbound RADIUS/TLS socket on TLS errors. When a home server sees a
    TLS error, it will now close the socket, so proxies do not have an open
    (but dead) TLS connection.
Comments 1

flo gleixner's avatar

Hi, the logrotate config for radius contains a global section, which overrides the logrotate.conf defaults for all other logrotate configs sourced after radius (sssd, samba, ....). This should be avoided. Especially the "su radiusd radiusd" in this global section is the cause of failing logrotate with "permission denied", because radiusd may not read the sssd logfiles ;-)

openSUSE Build Service is sponsored by