freeradius-server
NOTE: Automatically created during Factory devel project migration by admin.
- Sources inherited from project network
- Devel package for openSUSE:Factory
-
5
derived packages
- Links to openSUSE:Factory / freeradius-server
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout home:redwil:15.4/freeradius-server && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
_link | 0000000152 152 Bytes | |
freeradius-server-3.2.3.tar.bz2 | 0003454869 3.29 MB | |
freeradius-server-3.2.3.tar.bz2.sig | 0000000591 591 Bytes | |
freeradius-server-enable-python3.patch | 0000000767 767 Bytes | |
freeradius-server-fix-perl-shbang.patch | 0000001054 1.03 KB | |
freeradius-server-opensslversion.patch | 0000000566 566 Bytes | |
freeradius-server-radclient-init-error-buffer.patc |
0000000434 434 Bytes | |
freeradius-server-rcradiusd.patch | 0000000556 556 Bytes | |
freeradius-server-rlm_sql_unixodbc-configure.patch | 0000000791 791 Bytes | |
freeradius-server-tmpfiles.patch | 0000000310 310 Bytes | |
freeradius-server.changes | 0000137743 135 KB | |
freeradius-server.spec | 0000041001 40 KB | |
freeradius-tmpfiles.conf | 0000000038 38 Bytes | |
freeradius.keyring | 0000011090 10.8 KB | |
radiusd.service | 0000000408 408 Bytes |
Revision 161 (latest revision is 173)
- update to version 3.2.3: Feature Improvements * Add "max_retries" for connection pools. Fixes #4908. * Update dictionary.ciena, dictionary.huawei, dictionary.wifialliance and dictionary.wispr; add dictionary.eleven. * You can now list "eap" in the "pre-proxy" section. If the packet contains a malformed EAP message, then the request will be rejected The home server will either reject (or discard) this packet anyways, so this change can only help with large proxy scenarios. * Show warnings if libldap is not using OpenSSL. * Support RADIUS/1.1. See https://datatracker.ietf.org/doc/draft-dekok-radext-radiusv11/ Disabled by default, can be enabled by passing `--with-radiusv11` to the configure script. For now, this is for testing interoperability. * Add extra sanity checks for malformed EAP attributes. * More TLS debugging output. * Clear old module instance data before HUP reload. Avoids burst memory use when e.g. using large data files with rlm_files. * `rlm_cache_redis` is now included in the freeradius-redis packages. Bug Fixes * Don't leak MD contexts with OpenSSL 3.0. * Increase internal buffer size for TLS connections, which can help with high-load proxies. * Send Status-Server checks for TLS connections. * Give descriptive error if "update CoA" is used with "fake" packets, as it won't work. i.e. inner-tunnel and virtual home servers. * Many small ASAN / LSAN fixes from Jorge Pereira. * Close inbound RADIUS/TLS socket on TLS errors. When a home server sees a TLS error, it will now close the socket, so proxies do not have an open (but dead) TLS connection.
Comments 1
Hi, the logrotate config for radius contains a global section, which overrides the logrotate.conf defaults for all other logrotate configs sourced after radius (sssd, samba, ....). This should be avoided. Especially the "su radiusd radiusd" in this global section is the cause of failing logrotate with "permission denied", because radiusd may not read the sssd logfiles ;-)