Revision tags: release/5.2.1_cvs, release/5.2.1, release/5.2.0_cvs, release/5.2.0, release/4.9.0_cvs, release/4.9.0 |
|
#
2cc2a59d |
| 28-Jun-2003 |
Hajimu UMEMOTO <ume@FreeBSD.org> |
name union.
|
#
ec3e98b8 |
| 20-Jun-2003 |
Hajimu UMEMOTO <ume@FreeBSD.org> |
IPV6PREFIX is set when Framed-IPv6-Prefix is defined, You may want to pass the value to upper layer protocol such as DHCPv6 for prefix delegation.
MFC after: 1 week
|
#
cf7c10d0 |
| 19-Jun-2003 |
Hajimu UMEMOTO <ume@FreeBSD.org> |
Do RADIUS accounting on IPV6CP.
MFC after: 1 week
|
#
0fe74aa4 |
| 19-Jun-2003 |
Hajimu UMEMOTO <ume@FreeBSD.org> |
Install routes specified by Framed-IPv6-Route. Since the format of Framed-IPv6-Route is user defined, it follows Framed-IP-route.
MFC after: 1 week
|
Revision tags: release/5.1.0_cvs, release/5.1.0, release/4.8.0_cvs, release/4.8.0, release/5.0.0_cvs, release/5.0.0, release/4.7.0_cvs |
|
#
6eafd353 |
| 27-Aug-2002 |
Brian Somers <brian@FreeBSD.org> |
Include the correct file (stdarg.h) and use va_list rather than _BSD_VA_LIST_
Suggested by: mike
|
Revision tags: release/4.6.2_cvs, release/4.6.2, release/4.6.1 |
|
#
4dc4e1ee |
| 05-Jul-2002 |
Brian Somers <brian@FreeBSD.org> |
Back out the previous revision
Objected to by: Andre Oppermann <oppermann@pipeline.ch>
After Andre's objection, I've re-examined rfc 2759 and noted that it says that the domain name shouldn't be us
Back out the previous revision
Objected to by: Andre Oppermann <oppermann@pipeline.ch>
After Andre's objection, I've re-examined rfc 2759 and noted that it says that the domain name shouldn't be used when generating the NT-Response field. So it looks like the bug is in freeradius rather than in ppp.
show more ...
|
#
27dc75f1 |
| 03-Jul-2002 |
Brian Somers <brian@FreeBSD.org> |
If we've given a domain name prefix as the authentication name, strip it off before passing it on to the RADIUS server for authentication.
|
Revision tags: release/4.6.0_cvs |
|
#
579abfd8 |
| 28-Jun-2002 |
Brian Somers <brian@FreeBSD.org> |
Complain about (and fix) misformatted RADIUS attributes rather than silently fixing them.
|
#
99cfc2e2 |
| 24-Jun-2002 |
Brian Somers <brian@FreeBSD.org> |
Add a hack to handle RADIUS responses from peers that forget that there's an ``Ident'' field in the MS-CHAP2-Response and MS-CHAP-Error attributes.
The RADIATOR server seems to be guilty of this.
|
#
250be50b |
| 17-Jun-2002 |
Brian Somers <brian@FreeBSD.org> |
Compensate for dodgy Win98/WinME MSCHAPv2 responses later in the code path... after we've talked to any RADIUS servers involved, so that we haven't touched the data before it gets to the server.
Mak
Compensate for dodgy Win98/WinME MSCHAPv2 responses later in the code path... after we've talked to any RADIUS servers involved, so that we haven't touched the data before it gets to the server.
Make it clearer in the code that this compensation is done by setting a flag to a value of zero, a flag which rfc2759 says *MUST* be zero.
While we're here, don't bother passing the peer challenge into radius_Authenticate(). It's already part of the key we're passing in (this becomes obvious now that I've structured that data...).
This ``fix'' doesn't help to authenticate Win98/WinME users in my test environment as ports/net/freeradius seems to ignore the flag completely anyway, but it may help with other RADIUS servers.
show more ...
|
#
10be78d3 |
| 15-Jun-2002 |
Brian Somers <brian@FreeBSD.org> |
Remove whitespace at the end of lines.
|
#
61fe3f63 |
| 15-Jun-2002 |
Brian Somers <brian@FreeBSD.org> |
Remove a forgotten diagnostic
|
#
a95b23a6 |
| 12-Jun-2002 |
Brian Somers <brian@FreeBSD.org> |
Don't forget to process the Ident field on the front of RAD_MICROSOFT_MS_CHAP_ERROR and RAD_MICROSOFT_MS_CHAP2_SUCCESS messages, and remove the hack in chap.c to ignore that ident field on the client
Don't forget to process the Ident field on the front of RAD_MICROSOFT_MS_CHAP_ERROR and RAD_MICROSOFT_MS_CHAP2_SUCCESS messages, and remove the hack in chap.c to ignore that ident field on the client side.
This anomoly was hacked around during development, and I forgot to go back and fix it properly.
Spotted by: Sergey Korolew <ds@rt.balakovo.ru>
show more ...
|
#
8fb5ef5a |
| 12-Jun-2002 |
Brian Somers <brian@FreeBSD.org> |
Understand the following Microsoft Vendor Specific RADIUS attributes:
RAD_MICROSOFT_MS_MPPE_ENCRYPTION_POLICY RAD_MICROSOFT_MS_MPPE_ENCRYPTION_TYPES RAD_MICROSOFT_MS_MPPE_RECV_KEY RAD_MICROS
Understand the following Microsoft Vendor Specific RADIUS attributes:
RAD_MICROSOFT_MS_MPPE_ENCRYPTION_POLICY RAD_MICROSOFT_MS_MPPE_ENCRYPTION_TYPES RAD_MICROSOFT_MS_MPPE_RECV_KEY RAD_MICROSOFT_MS_MPPE_SEND_KEY
These attributes may be supplied by a RADIUS server when MSCHAPv2 is used to authenticate.
It *should* now be possible to build ppp with -DNODES and still support CHAP/MSCHAP/MSCHAPv2/MPPE via a RADIUS server, but the code isn't yet smart enough to do that (building with -DNODES just looses these facilities).
Sponsored by: Monzoon
show more ...
|
#
12b5aaba |
| 06-Jun-2002 |
Brian Somers <brian@FreeBSD.org> |
Cast pid_t to long for printf()ing
Obtained from: OpenBSD
|
#
aadbb4ea |
| 02-Jun-2002 |
Brian Somers <brian@FreeBSD.org> |
Don't send a RAD_NAS_IP_ADDRESS attribute as RAD_NAS_IDENTIFIER is sufficient.
In fact, using both breaks the radiator RADIUS daemon when used with a db as it maps both attributes to the same field
Don't send a RAD_NAS_IP_ADDRESS attribute as RAD_NAS_IDENTIFIER is sufficient.
In fact, using both breaks the radiator RADIUS daemon when used with a db as it maps both attributes to the same field value and then fails the insert.
I decided to remove RAD_NAS_IP_ADDRESS on the basis that rfc2138 says:
An Access-Request MUST contain a User-Name attribute. It SHOULD contain either a NAS-IP-Address attribute or NAS-Identifier attribute (or both, although that is not recommended). It MUST
despite the fact that this not recommended bit was removed from the updated rfc.
show more ...
|
#
a16061b2 |
| 16-May-2002 |
Brian Somers <brian@FreeBSD.org> |
Handle MS-CHAPv2 authentication correctly via the RADIUS server (if it's configured). Handle internal failures in radius_Authenticate() correctly. Bump the ppp version number.
This doesn't yet work
Handle MS-CHAPv2 authentication correctly via the RADIUS server (if it's configured). Handle internal failures in radius_Authenticate() correctly. Bump the ppp version number.
This doesn't yet work with MPPE. More will follow.
Sponsored by: Mozoon
show more ...
|
#
de59e178 |
| 14-May-2002 |
Brian Somers <brian@FreeBSD.org> |
o Clean up some #includes o Bump version number to 3.0.4 o When talking to a RADIUS server, provide a NAS-Port-Type.
When the NAS-Port-Type is Ethernet, provide a NAS-Port value equal to the SES
o Clean up some #includes o Bump version number to 3.0.4 o When talking to a RADIUS server, provide a NAS-Port-Type.
When the NAS-Port-Type is Ethernet, provide a NAS-Port value equal to the SESSIONID from the environment in direct mode or the NGM_PPPOE_SESSIONID message in other modes. If no SESSIONID is found, default to the interface index in client mode or zero in server mode.
When the NAS-Port-Type is ISDN, set the NAS-Port to the minor number of the physical device (ie, the N in /dev/i4brbchN).
This makes it easier for the RADIUS server to identify the client WRT accounting data etc.
Prompted by: lsz8425 <lsz8425@mail.cd.hn.cn>
show more ...
|
#
ff8e577b |
| 10-May-2002 |
Brian Somers <brian@FreeBSD.org> |
Add support for MS-CHAP authentication via a RADIUS server. Add support for Reply-Message and MS-CHAP-Error.
Sponsored by: Monzoon
|
#
bf1eaec5 |
| 07-May-2002 |
Brian Somers <brian@FreeBSD.org> |
Understand the Session-Timeout RADIUS attribute Store the Filter-Id attribute (we don't do anything with it yet)
Submitted mostly by: andrew pavlov <and@kremenchug.net>
|
Revision tags: release/4.5.0_cvs, release/4.4.0_cvs |
|
#
30949fd4 |
| 14-Aug-2001 |
Brian Somers <brian@FreeBSD.org> |
o Add ipv6 support, abstracting most NCP addresses into opaque structures (well, they're treated as opaque).
It's now possible to manage IPv6 interface addresses and routing table entries and
o Add ipv6 support, abstracting most NCP addresses into opaque structures (well, they're treated as opaque).
It's now possible to manage IPv6 interface addresses and routing table entries and to filter IPV6 traffic whether encapsulated or not.
IPV6CP support is crude for now, and hasn't been tested against any other implementations.
RADIUS and IPv6 are independent of eachother for now.
ppp.linkup/ppp.linkdown aren't currently used by IPV6CP
o Understand all protocols(5) in filter rules rather than only a select few.
o Allow a mask specification for the ``delete'' command. It's now possible to specifically delete one of two conflicting routes.
o When creating and deleting proxy arp entries, do it for all IPv4 interface addresses rather than doing it just for the ``current'' peer address.
o When iface-alias isn't in effect, don't blow away manually (via ``iface add'') added interface addresses.
o When listening on a tcp server (diagnostic) socket, bind so that a tcp46 socket is created -- allowing both IPv4 and IPv6 connections.
o When displaying ICMP traffic, don't display the icmp type twice. When display traffic, display at least some information about unrecognised traffic.
o Bump version
Inspired after filtering work by: Makoto MATSUSHITA <matusita@jp.FreeBSD.org>
show more ...
|
Revision tags: release/4.3.0_cvs, release/4.3.0 |
|
#
50ca6ec3 |
| 02-Apr-2001 |
Brian Somers <brian@FreeBSD.org> |
Don't assume challenges and responses don't contain embedded '\0's.
Mschapv2 response generation may produce embedded NULs... causing us to send a bogus response to the radius server and end up fail
Don't assume challenges and responses don't contain embedded '\0's.
Mschapv2 response generation may produce embedded NULs... causing us to send a bogus response to the radius server and end up failing the client's valid response.
Problem pointed out by: Eugene Vigovskiy <vigov@com2com.ru>
show more ...
|
#
26e6a622 |
| 09-Mar-2001 |
Brian Somers <brian@FreeBSD.org> |
MAXHOSTNAME includes space for a NUL
|
#
52847614 |
| 09-Mar-2001 |
Brian Somers <brian@FreeBSD.org> |
MAXPATHLEN -> PATH_MAX Don't assume MAXHOSTNAMELEN includes the NUL Correct a diagnostic Use "localhost" in our prompt instead of ""
|
#
c42627ff |
| 04-Feb-2001 |
Brian Somers <brian@FreeBSD.org> |
Don't send an authentication failure response if we fail sending a radius accounting packet.
|