|
|
|
|
Changelog for freeradius-server-devel-3.2.5-200.5.x86_64.rpm :
* Tue Aug 13 2024 Andrea Manzini - update to 3.2.5 Feature Improvements * TOTP now supports TOTP-Time-Offset for tokens with times that are out of sync. See mods-available/totp. * radclient now supports forcing the Request Authenticator and ID for Access-Request packets. * Update dictionary.3gpp. * Update advice on shared secrets, including suggesting a secure method for generating useful secrets. Bug Fixes * Allow proxying by pool / home server name to work with auth+acct servers. * Fix OpenSSL API usage which sometimes caused crash in MS-CHAP Previously it would either always crash immediately, or never crash. * Fix packet statistics. Stop double counting some packets, and track packet statistics even if a socket is closed. * Reverted patch in TTLS which broke compatibility with some systems. * Don\'t crash in debug mode when multiple intermediate certs are used Patch from Alexander Chernikov. * Fri May 31 2024 Adam Majer - update to 3.2.4 Configuration changes * Better handle backslashes in strings in the configuration files. If the configuration items contain backslashes, then behavior may change. However, the previous behavior didn\'t work as expected, and therefore is not likely to be used. * reject_delay no longer applies to proxied packets. All servers should now set reject_delay = 1 for security and scalability. * %{randstr:...} now returns the requested amount of data, instead of one too many bytes. Feature Improvements * Preliminary support for TEAP. * Update EAP module pre_proxy checks to make them less restrictive This prevents the \"middle box\" effect from affecting future traffic. * Many fixes and updates for Docker images. * Add dpsk module. See mods-available/dpsk. * Print out what cause the TLS operations to be made, such as the EAP method name (peap, ttls, etc), or RADIUS/TLS listen / proxy socket. * Add auto_escape to sample SQL module config. * Add \'if not exists\' to mysql create table queries. * Update dictionary.aruba; add dictionary.tplink, dictionary.alphion. * Allow for \'encrypt=1\' attributes to be longer than 128 characters. * Added \"radsecret\" program which generates strong secrets. See the top of the \"clients.conf\" file for more information. * radclient now prints packets as hex when using -xxx. * Added \"-t timeout\" to radsniff. It will stop processing packets after seconds. * Support \"interface = ...\" on OSX and other *BSD which have IP_BOUND_IF. * The detail module now has a \"dates_as_integer\" configuration item See mods-available/detail for more information. * Add lookback/lookforward steps and more configuration to totp. See mods-available/totp. * Add \"time_since\" xlat to calculate elapsed time in seconds, milliseconds and microseconds. * Support \"Post-Auth-Type Challenge\" in the inner tunnel. * Add \"proxy_dedup_window\". See radiusd.conf. * Document KRB5_CLIENT_KTNAME in the \"env\" section of radiusd.conf. * Add \"dedup_key\" for misbehaving supplicants. See mods-available/eap. Bug Fixes * Fix corner case with empty defaults in rlm_files. * When we have multiple attributes of the same name, always use the canonical attribute. * Make FreeRADIUS-Server-EMA * attributes work again for home server exponential moving average statistics. * Don\'t send the global server stats when asked for client stats. They use the same attributes, so the result is confusing. * Fix multiple typos in MongoDB query.conf (#5130). * Add define for illumos. Fixes #5135. * Add client configuration for TLS PSK. * Permit originate CoA after proxying to an internal virtual server. * Use virtual server \"default\" when passed \"-i\" and \"-p\" on the command line. * Fix locking issues with rlm_python3. * The detail file reader will catch bad times in the file, and will not update Acct-Delay-Time with extreme values. * Fix issue where Message-Authenticator was calculated incorrectly for CoA / Disconnect ACK and NAK packets. * Update Python thread and error handling. Fixes #5208. * Fix handling of Session-State when proxying. Fixes #5288. * Run relevant post-proxy Fail- * section on CoA / Disconnect timeout. * Add \"limit\" section to AWS health check configurtion. Fixes 35300. * Use MAX in sqlite queries instead of GREATEST. * Fix typo in Mongo queries. Fixes #5301. * Fix occasional crash with bad home servers. Fixes #5308. * Minor bug fixes to the SQL freetds modules. * Fix blocking issue with RADIUS/TLS connection checks. * Fix run-time crash on configuration typos of %{substr ...} instead of %{substr:...} Fixes #5321. * Fix crash with TLS Status-Server requests. Fixes #5326. * Sat Feb 17 2024 Christian Boltz - fix directory permissions for /etc/raddb/mods-config/sql/moonshot-targeted-ids/ *sql * (boo#1220025, accidentally discovered via boo#1220024) * Tue Feb 06 2024 Marcus Meissner - provides for user(radiusd), group(radiusd) and group (winbind) bsc#1219600 * Thu Aug 31 2023 Adam Majer - update to version 3.2.3 (jsc#PED-6567) Feature Improvements * Add \"max_retries\" for connection pools. Fixes #4908. * Update dictionary.ciena, dictionary.huawei, dictionary.wifialliance and dictionary.wispr; add dictionary.eleven. * You can now list \"eap\" in the \"pre-proxy\" section. If the packet contains a malformed EAP message, then the request will be rejected The home server will either reject (or discard) this packet anyways, so this change can only help with large proxy scenarios. * Show warnings if libldap is not using OpenSSL. * Support RADIUS/1.1. See https://datatracker.ietf.org/doc/draft-dekok-radext-radiusv11/ Disabled by default, can be enabled by passing `--with-radiusv11` to the configure script. For now, this is for testing interoperability. * Add extra sanity checks for malformed EAP attributes. * More TLS debugging output. * Clear old module instance data before HUP reload. Avoids burst memory use when e.g. using large data files with rlm_files. * `rlm_cache_redis` is now included in the freeradius-redis packages. Bug Fixes * Don\'t leak MD contexts with OpenSSL 3.0. * Increase internal buffer size for TLS connections, which can help with high-load proxies. * Send Status-Server checks for TLS connections. * Give descriptive error if \"update CoA\" is used with \"fake\" packets, as it won\'t work. i.e. inner-tunnel and virtual home servers. * Many small ASAN / LSAN fixes from Jorge Pereira. * Close inbound RADIUS/TLS socket on TLS errors. When a home server sees a TLS error, it will now close the socket, so proxies do not have an open (but dead) TLS connection. * Fix mutex locking issues on inbound RADIUS/TLS connections This change avoids random issues with \"bad record mac\". * Improve REST encoding loop. Patch from Herwin Weststrate. Closes #4950. * Correctly report the LDAP group a user was found in. Fixes #3084. * Force correct packet type when running Post-Auth-Type. Helps with #4980. * Fix small leak in Client-Lost code. Patch from Terry Burton. PR #4996. * Fix TCP socket statistics. Closes #4990. * Use NAS-Port-Id instead of NAS-Port during SQL simultaneous-use checks. Helps with #5010. Changes in version 3.2.2: Feature Improvements * The \"configure\" process now gives a much clearer report when it\'s finished * Fallback to \"uname -n\" on missing \"hostname\". Fixes #4771. * Export thread details in radmin \"stats threads\". Fixes #4770. * Improve queries for processing radacct into periodic usage data * Update dictionary.juniper. * Add dictionary.calix. * Fix dictionary.rfc6519 DS-Lite-Tunnel-Name to be \"octets\". * Update documentation for robust-proxy-accounting, and be more aggressive about sending packets. * Add per-module README.md files in the source. * Add default Visual Studio configuration for developers. * Postgres can now automatically use alternate queries for errors other than duplicate keys. * %{listen:TLS-PSK-Identity} is now set when using PSK and psk_query This helps the server track the identity of the client which is connecting. * Include thread stats in Status-Server attributes. Fixes #4870. * Mark rlm_unbound stable and add to packages. * Remove broken/unsupported Dockerfiles for centos8 and debian9. Bug Fixes * Preliminary support for non-blocking TLS sockets. Helps with #3501. * Fix support for partial certificate chains after adding reload support. Fixes #4753. * Fix handling of debug_condition. * Clean up home server states, and re-sync with the dictionaries. * Correct certificate order when creating TLS- * attributes Fixes #4785. * Update use of isalpha() etc. so broken configurations have less impact on the server. * Outgoing TLS sockets now set SNI correctly from the \"hostname\" configuration item. * Support Apple Homebrew on the M1. Fixes #4754. * Better error messages when %{listen:TLS-...} is used. * Getting statistics via Status-Server can now be done within a virtual server. Fixes #4868. * Make TTLS+MS-CHAP work with TLS 1.3. Fixes #4878. * Fix md5 xlat memory leak when using OpenSSL 3.0- freeradius-server-rlm_sql_unixodbc-configure.patch: refreshed- spec file cleanup: remove duplicate BR: from subpackages * Mon Feb 06 2023 Adam Majer - update to version 3.2.1: Feature Improvements * Add dictionary.ciena, dictionary.nile, and DHCPv4 dictionaries * Add simultaneous-use queries for MS SQL * Add radmin command for \"stats pool \" which prints out statistics about the connection pools. * Client statistics now shows \"conflicts\", to count conflicting packets. * New optional \"lightweight accounting-on/off\" strategy. When refreshing queries.conf you should also add the new nasreload table and corresponding GRANTs to your DB schema. * Add TLS-Client-Cert-X509v3-Certificate-Policies, which helps with Eduroam. * Allow auth+acct for TCP sockets, too. * Add rlm_cache_redis. See raddb/mods-available/cache for details. * Allow radmin to look up home servers by name, too. * Ensure that dynamic clients don\'t create loops on duplicates * Removed rlm_sqlhpwippool. There was no documentation, no configuration, and the module was ~15 years old with no one using it. * Marked rlm_python3 as stable. * Add sigalgs_list. See raddb/mods-available/eap * For rlm_linelog, when opening files in /dev, look at \"permissions\" to see whether to open them r/w. * More flexibility for dynamic home servers. See doc/configuration/dynamic_home_servers.md and raddb/home_servers/README.md. * Allow setting of application_name for PostgreSQL. See mods-available/sql. Bug Fixes * Correct test for open sessions in radacct for MS SQL. * The linelog module now opens /dev/stdout in \"write-only\" mode if the permissions are set to \"u+w\" (0002). * Various fixes to rlm_unbound from Nick Porter. * PEAP now correctly runs Post-Auth-Type Accept. * Create \"TLS-Cert- *\" for outbound Radsec, instead of TLS-Client-Cert- * Fixes #4698. See sites-available/tls, and fix_cert_order. * Minor updates and fixes to CI, Dockerfiles and packaging. * Fix rlm_python3 build with python >= 3.10. Fixes #4441. Changes in version 3.2.0: Feature Improvements All features from 3.0.x are included in the 3.2.x releases. In addition: * Add \'reset_day\' and \'%%r\' parameter for rlm_sqlcounter to specify which day of the month the counter should be reset. * Partial backport of rlm_json from v4, providing the json_encode xlat See mods-available/json for documentation. * Support for haproxy \"PROXY\" protocol See sites-available/tls, \"proxy_protocol\" and doc/antora/modules/howto/pages/protocols/proxy/. * Support for sending CoA-Request and Disconnect-Request packets in \"reverse\" down RadSec tunnels. Experimental for now, and undocumented. * It is now possible to run a virtual server when saving / loading TLS cache attributes. See sites-available/tls-cache for more information. * Removed the \"cram\" module. It was undocumented, and used old and insecure authentication methods. * Remove the \"otp\" module. The \"otpd\" program it needs is no longer available, and the module has not been usable since at least 2015. * All features from 3.0.x are included in the 3.2.x releases. * 3.2.0 requires OpenSSL 1.0.2 or greater. Bug Fixes * All bug fixes from 3.0.x are included in the 3.2.x releases, including * fixes information leakage in EAP-PWD (bsc#1206204, CVE-2022-41859) * fixes crash on unknown option in EAP-SIM (bsc#1206205, CVE-2022-41860) * fixes crash on invalid abinary data (bsc#1206206, CVE-2022-41861)- freeradius-server-enable-python3.patch: refreshed * Fri Jan 13 2023 Stefan Schubert - Migration of PAM settings to /usr/lib/pam.d. * Thu Sep 29 2022 Michael Ströder - use chown with colon instead dot in radiusd.service * Thu Jul 21 2022 William Brown - Resolve issue with linking python3 with rlm-python * Wed Feb 02 2022 Samuel Cabrero - Remove libwbclient-devel BuildRequires in favor of pkgconfig(wbclient); (jsc#SLE-20577); * Thu Oct 07 2021 Michael Ströder - update to 3.0.25: * `correct_escapes` has been added back into the default configuration. * A segfault when trying to proxy to zombie home servers has been fixed. * A number of other small bugs and compiler warnings were fixed. * Added support for building with PostgreSQL 14. * Thu Oct 07 2021 Adam Majer - Update to version 3.0.24 (jsc#SLE-21237) Feature Improvements * Add sanitizer options to configure script. * Log information needed by Wireshark to decode TLS sessions. * Allow more liberal SQL commands in rlm_sql_map. * Update dictionary.apc, dictionary.h3c. * Add new Acct-Status-Type Subsystem-On and Subsystem-Off See dictionary.iana and https://freeradius.org/rfc/acct_status_type_subsystem.html. * Add reject_unknown_intermediate_ca. See mods-available/eap. * Add dynamic loading of certificates via TLS-Session-Cert-File See raddb/certs/realms/README.md. * Add Server Name Indication (SNI) for outbound RadSec connections See raddb/sites-available/tls, and the home server tls configuration. * Support SNI for inbound RadSec connections. Certificates will be loaded from \"realm_dir\" in the \"tls\" section. SNI will be cached in the TLS-Server-Name-Indication attribute. * Preliminary support for haproxy \"PROXY\" protocol See sites-available/tls, \"proxy_protocol\" and doc/antora/modules/howto/pages/protocols/proxy/. * Generate parse errors in more circumstances when we know that the configuration is wrong. * Add \"weeklycounter\" to sample sqlcounter configuration. * Add certificate attributes to the request list, even if the certificates have expired. * The Simultaneous-Use code is now IPv6 aware, and can deal with NAS-IPv6-Address. * Add dictionary.cambium. * No longer logs passwords in logfiles (bsc#1184016) Bug Fixes * Fix crash in trustrouter module (#4115) * Fix crash in state handling. * Don\'t alter global options in redhat logrotate scripts. * EAP-FAST will print errors and continue, rather than exiting when OpenSSL fails various internal sanity checks. * Allow admin to manually change core limits, even when core limits are disabled. * Fix chunked rlm_rest HTTP body. Closes #4131 * Many fixes around the SQL ippool queries.conf and schema * Fix MySQL stored procedures. PR #4170 * Rework connection pool management for corner cases Fixes #4161, #4162, #4163. * Final fix for double free in #3188. * Fix sqlcounter wrong memory free. PR #4192 * Accept slow writes from proxies over TCP, which allows the server to make more progress when it receives partial packets. * Add \'weeklycounter\' for rlm_sqlcounter. * Outbound proxying over TCP / TLS is better able to deal with partial TCP reads, and has fewer issues with slow networks. * Fix wrong data-type of Acct-Delay-Time in rlm_unix. * Fix EAP-FAST PAC lifetime calculation. * Print correct encoded packet length when debugging.- remove python2 build- drop references to SLE11- freeradius-server-radiusd-logrotate.patch: upstreamed * Sun Jun 27 2021 Ferdinand Thiessen - Add ldap-schemas subpackage for OpenLDAP radius schemas- Add freeradius-server-fix-perl-shbang.patch to fix RPMlint warnings- Fix RPMlint warnings about macros and permissions * Sat Jun 26 2021 Ferdinand Thiessen - Update to version 3.0.23 * Feature improvements * Add \"set home_server state ... down\" in order to mark the home server as administratively down. Use \"alive\" to bring it back to life. * Add Post-Auth-Type \"Client-Lost\" which should make it easier to log when clients stop responding. * Cache TLS messages in &session-state, for more debugging. * Notes in eap configuration about TLS 1.0 / TLS 1.1, and setting cipher_list = \"DEFAULTAATTSECLEVEL=1\" * Added MANY warning messages about using TLS 1.3 with EAP. * Bug fixes * Fix crash in some cases when home server is down, in debug mode. * Fix (again) \"read clients from SQL\" functionality. * Fix sql_map to return values in more situations. * Silently ignore LEAP configuration instead of erroring out.- Update to version 3.0.22 * Feature improvements * Limited support for dynamic home servers. * Add support for prepend operator ^=. * Added rlm_totp, for use with the Google Authenticator app. * The default minimum TLS version is now TLS 1.2, as per RFC 8996. Older versions can be allowed by setting tls_min_version, and updating \"cipher_list\". * Significantly improve the readability and contents of TLS debug messages. * Allow CoA and Disconnect messages over TLS sockets. * Automatically set fragment size / MTU, so that PEAP/EAP-TLS works, and no longer requires manual changes to the configuration. * Allow \"configurable_client_cert=yes\" for EAP-TLS. * Add TLS 1.2 support for EAP-Fast. * Add ca_path_reload_interval option for tls. * Add \"tls_min_version\" to ldap module configuration. * Support running policies when receiving a RadSec connection. * Update TLS \"ecdh_curve\" code to allow for multiple curves. * Allow delta CRLs. * add rlm_sql_map, which can handle multiple columns from an SQL query. See raddb/mods-available/sql_map. * New xlat for setting status of rlm_always instances and new resource-check example virtual server for manipulating control flow in unlang policies based on status of some external resource. Patches from Terry Burton. * Update radmin to show more information about the home servers using \"show home_server list all\". * The default configuration now replies with EAP-Key-Name, if it is available, and was requested. * Include extensions in generated certificates. * Ignore user-provided dhparams in FIPS mode. * Remove native support for Cisco LEAP. It is insecure, and should not be used. Proxying LEAP is still supported. * Allow use of password preparation methods with rlm_eap_pwd. * More RFC compliance for various corner cases of DHCP, * Use DHCP-specific schemas. * Add stored procedures for DHCP lease allocation * Add support for DHCP-Decline. * Added mods-available/dhcp_sql which is a DHCP-specific instance of the SQL module. * Treat DHCP Discover and Request differently for lease allocation times. * Add support for PBKDF2 keys. * Update default PostgreSQL schema to use \"text\" instead of a fixed-size \"varchar\". * Add radmin command \"show client list verbose\", which gives a lot more information about each client. * Add support for EAPS-AKA authentication to rlm_wimax. * Add rlm_rest support for HTTP/2. * Add REST-HTTP-Status-Code attribute holding HTTP status code. * Add option to set http_negotiation in rlm_rest. Fixes #2821. * Encode / decode NAS-Filter-Rule according to RFC 4849. * Allow attributes using old names in configuration files, SQL, or modules to match attributes in the packet which use new names. * Allow querying IPv6 stats via FreeRADIUS-Stats-Client-IPv6-Address and FreeRADIUS-Stats-Server-IPv6-Address * Add warnings if there is no \"real\" User-Name to identify users. * Add sample configuration to update Stripped-User-Name and/or Class for user sessions. See sites-available/default * Add configuration to suppress printing values for User-Name, etc. * Support dictionary.telrad, which is also in WiMAX format. * PEAP \'proxy_tunneled_request_as_eap\' is now configurable at runtime with Proxy-Tunneled-Request-As-EAP. * Debug output now lists client/server proposed TLS ciphers. * Add support for TLS1.3 * Bug fixes * Fix long-term double free due to PCRE calling our \"free\" function twice. * Respect the \"log_reject\" configuration item in more places. * Run Post-Proxy-Type Fail... when all home servers are down. * Note that rlm_replicate can only use UDP, and not TCP or TLS. * DHCP pool lookup is now keyed by Client Identifier (Option 61) when supplied by client, otherwise the hardware address is used. Compliant with RFC 2132. This change will not affect existing systems on upgrade, but new installations will use the new behavior. * Don\'t print invalid tags in rlm_cache, among other places. * Do home_server failover immediately when an initial TCP / Radsec connection fails. * Clear error on SQLITE_BUSY to prevent memory leak in corner cases. * Properly add SQL clients to virtual servers. * Use better API when decoding DHCP packets, to avoid unnecessary work. * Parse locale-dependent dates. * Fix radiusd.conf ENV LD_PRELOAD function. * Make the \"date\" module handle UTC more consistently. * Check for, and complain about, inconsistent use of tls_min_version versus disable_tlsv1 * Fix \"read client from SQL\" code so that it properly ties clients to a virtual server. Also document the behavior. * Fix leak with unknown attributes in detail reader. * Fix parenting issues in rlm_yubikey.- Drop __DATE__ __TIME__ fixes, implicitly done with source_date_epoch variable supported by gcc >= 7 * Mon Jan 04 2021 Adam Majer - freeradius-server-radiusd-logrotate.patch: move logrotate options into specific parts for each log as \"global\" options will persist past and clobber global options in the main logrotate config (bsc#1180525)
|
|
|