Revision tags: release/4.3.0_cvs, release/4.3.0 |
|
#
50ca6ec3 |
| 02-Apr-2001 |
Brian Somers <brian@FreeBSD.org> |
Don't assume challenges and responses don't contain embedded '\0's.
Mschapv2 response generation may produce embedded NULs... causing us to send a bogus response to the radius server and end up fail
Don't assume challenges and responses don't contain embedded '\0's.
Mschapv2 response generation may produce embedded NULs... causing us to send a bogus response to the radius server and end up failing the client's valid response.
Problem pointed out by: Eugene Vigovskiy <vigov@com2com.ru>
show more ...
|
#
26e6a622 |
| 09-Mar-2001 |
Brian Somers <brian@FreeBSD.org> |
MAXHOSTNAME includes space for a NUL
|
#
52847614 |
| 09-Mar-2001 |
Brian Somers <brian@FreeBSD.org> |
MAXPATHLEN -> PATH_MAX Don't assume MAXHOSTNAMELEN includes the NUL Correct a diagnostic Use "localhost" in our prompt instead of ""
|
#
c42627ff |
| 04-Feb-2001 |
Brian Somers <brian@FreeBSD.org> |
Don't send an authentication failure response if we fail sending a radius accounting packet.
|
#
74457d3d |
| 26-Jan-2001 |
Brian Somers <brian@FreeBSD.org> |
Allow ``set server closed'' to close the diagnostic socket. Allow ``set server open'' to re-open the diagnostic socket. Handle SIGUSR1 by re-opening the diagnostic socket When receiving SIGUSR2 (and
Allow ``set server closed'' to close the diagnostic socket. Allow ``set server open'' to re-open the diagnostic socket. Handle SIGUSR1 by re-opening the diagnostic socket When receiving SIGUSR2 (and in ``set server none''), don't forget the socket details so that ``set server open'' and SIGUSR1 open it again.
Don't create the diagnostic socket as uid 0 ! It's far to dangerous.
show more ...
|
Revision tags: release/4.2.0 |
|
#
ba093e81 |
| 15-Oct-2000 |
Brian Somers <brian@FreeBSD.org> |
Use rad_acct_open() instead of rad_auth_open().
Suggested by: Victor Ivanov <v0rbiz@icon.bg>
|
Revision tags: release/4.1.1_cvs |
|
#
794c9bbc |
| 29-Aug-2000 |
Brian Somers <brian@FreeBSD.org> |
Support radius accounting, and add a packet count to throughput statistics as a side effect.
Submitted by: Marcin Cieslak <saper@system.pl>
with some tweaks to RAD_ACCT_SESSION_ID and RAD_ACCT_MULT
Support radius accounting, and add a packet count to throughput statistics as a side effect.
Submitted by: Marcin Cieslak <saper@system.pl>
with some tweaks to RAD_ACCT_SESSION_ID and RAD_ACCT_MULTI_SESSION_ID generation by me.
show more ...
|
Revision tags: release/4.1.0, release/3.5.0_cvs, release/4.0.0_cvs |
|
#
8e7bd08e |
| 14-Mar-2000 |
Brian Somers <brian@FreeBSD.org> |
Correct some typos introduced in the descriptor -> fdescriptor change.
|
#
10e629b9 |
| 14-Mar-2000 |
Brian Somers <brian@FreeBSD.org> |
Introduce LOCALNAT and LOCALRAD defines so that the sources can stay exactly the same in FreeBSD & OpenBSD despite libalias and libradius being local to the ppp sources under OpenBSD.
|
#
6b457978 |
| 14-Mar-2000 |
Brian Somers <brian@FreeBSD.org> |
The interface list that comes back from the PF_ROUTE/NET_RT_IFLIST mib is aligned. Teach this to ``show route''.
Clean up some of the sockaddr parsing routines.
|
#
f013f33e |
| 14-Mar-2000 |
Brian Somers <brian@FreeBSD.org> |
To avoid namespace polution in NetBSD:
``struct descriptor'' -> ``struct fdescriptor''
|
#
c39aa54e |
| 20-Dec-1999 |
Brian Somers <brian@FreeBSD.org> |
Notice and warn about unterminated quoted strings in commands. The entire command is ignored if the syntax is invalid...
|
Revision tags: release/3.4.0_cvs |
|
#
b9391689 |
| 21-Sep-1999 |
Brian Somers <brian@FreeBSD.org> |
Back out the bogus #ifdef __NetBSD__ #include <signal.h> lines. The original report was due to a mis-installation of the NetBS header files :-/
Submitted by: Kazuyoshi Kato <kazk@yyy.or.jp>
|
#
7e795ebe |
| 20-Sep-1999 |
Brian Somers <brian@FreeBSD.org> |
NetBSD has moved ``extern int errno;'' to signal.h :-/
Submitted by: Kazuyoshi Kato <kazk@yyy.or.jp>
|
Revision tags: release/3.3.0_cvs |
|
#
f10f5203 |
| 03-Sep-1999 |
Brian Somers <brian@FreeBSD.org> |
When sending radius authentication requests:
Supply RAD_NAS_IDENTIFIER if we have a `hostname` and RAD_IP_ADDRESS if that hostname resolves.
Supply RAD_NAS_PORT using the ttyslot() of the tty
When sending radius authentication requests:
Supply RAD_NAS_IDENTIFIER if we have a `hostname` and RAD_IP_ADDRESS if that hostname resolves.
Supply RAD_NAS_PORT using the ttyslot() of the tty that we're authenticating on if it's a tty device.
Partially submitted by: Andriy I Pilipenko <bamby@marka.net.ua> PR: 12225
show more ...
|
#
97d92980 |
| 28-Aug-1999 |
Peter Wemm <peter@FreeBSD.org> |
$Id$ -> $FreeBSD$
|
Revision tags: release/3.2.0 |
|
#
5d9e6103 |
| 08-May-1999 |
Brian Somers <brian@FreeBSD.org> |
o Redesign the layering mechanism and make the aliasing code part of the layering.
We now ``stack'' layers as soon as we open the device (when we figure out what we're dealing with). A static
o Redesign the layering mechanism and make the aliasing code part of the layering.
We now ``stack'' layers as soon as we open the device (when we figure out what we're dealing with). A static set of `dispatch' routines are also declared for dealing with incoming packets after they've been `pulled' up through the stacked layers.
Physical devices are now assigned handlers based on the device type when they're opened. For the moment there are three device types; ttys, execs and tcps.
o Increment version number to 2.2 o Make an entry in [uw]tmp for non-tty -direct invocations (after pap/chap authentication). o Make throughput counters quad_t's o Account for the absolute number of mbuf malloc()s and free()s in ``show mem''. o ``show modem'' becomes ``show physical''.
show more ...
|
#
28e610e3 |
| 21-Apr-1999 |
Brian Somers <brian@FreeBSD.org> |
int -> size_t
|
#
bc76350e |
| 04-Mar-1999 |
Brian Somers <brian@FreeBSD.org> |
Correct some ntohl/htonl bogons in the netmask handling. This was pretty harmless as netmasks on a POINTOPOINT interface are pretty much ignored, but it looked funny.
Mention the configured netmask
Correct some ntohl/htonl bogons in the netmask handling. This was pretty harmless as netmasks on a POINTOPOINT interface are pretty much ignored, but it looked funny.
Mention the configured netmask in ``show ipcp''.
Describe in more detail what a proxy arp entry is.
show more ...
|
Revision tags: release/3.1.0 |
|
#
f0cdd9c0 |
| 06-Feb-1999 |
Brian Somers <brian@FreeBSD.org> |
Decouple pap & chap output routines from the corresponding input routines and take advantage of the new init/continue interface in libradius. This allows a timely response on other links in an MP se
Decouple pap & chap output routines from the corresponding input routines and take advantage of the new init/continue interface in libradius. This allows a timely response on other links in an MP setup while RADIUS requests are in progress as well as the ability to handle other data from the peer in parallel. It should also make the future addition of PAM support trivial.
While I'm in there, validate pap & chap header IDs if ``idcheck'' is enabled (the default) for other FSM packet types.
NOTE: This involved integrating the generation of chap challenges and the validation of chap responses (and commenting what's going on in those routines). I currently have no way of testing ppps ability to respond to M$Chap CHALLENGEs correctly, so if someone could do the honours, it'd be much appreciated (it *looks* ok!).
Sponsored by: Internet Business Solutions Ltd., Switzerland
show more ...
|
#
82d6780c |
| 29-Jan-1999 |
Brian Somers <brian@FreeBSD.org> |
o Send a CHAP challenge of 16 random digits when RADIUS is configured. This isn't strictly necessary according to the rfc, but it's suggested there.... o Don't forget to include our authname whe
o Send a CHAP challenge of 16 random digits when RADIUS is configured. This isn't strictly necessary according to the rfc, but it's suggested there.... o Don't forget to include our authname when sending a CHAP challenge when RADIUS is configured. o Don't supply the ``16'' representing the chap answer length to radius_Authenticate() - libradius does this for us. o When we successfully authenticate via radius_Authenticate(), continue with datalink_AuthOk() as expected.
Sponsored by: Internet Business Solutions Ltd., Switzerland
show more ...
|
#
972a1bcf |
| 28-Jan-1999 |
Brian Somers <brian@FreeBSD.org> |
Initial RADIUS support (using libradius). See the man page for details. Compiling with -DNORADIUS (the default for `release') removes support.
TODO: The functionality in libradius::rad_send_reques
Initial RADIUS support (using libradius). See the man page for details. Compiling with -DNORADIUS (the default for `release') removes support.
TODO: The functionality in libradius::rad_send_request() needs to be supplied as a set of routines so that ppp doesn't have to wait indefinitely for the radius server(s). Instead, we need to get a descriptor back, select() on the descriptor, and ask libradius to service it when necessary. For now, ppp blocks SIGALRM while in rad_send_request(), so it misses PAP/CHAP retries & timeouts if they occur.
Only PAP is functional. When CHAP is attempted, libradius complains that no User-Password has been specified... rfc2138 says that it *mustn't* be used for CHAP :-(
Sponsored by: Internet Business Solutions Ltd., Switzerland
show more ...
|