Very Highly Configurable Radius Server
The FreeRADIUS server has a number of features found in other servers
and additional features not found in any other server. The server's
features are:
* Support for RFC and VSA attributes
* Additional server configuration attributes
* Selection of a particular configuration
* Authentication methods
* Accounting methods
- Developed at network
- Sources inherited from project openSUSE:Factory
-
3
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout devel:ARM:Factory:Contrib:ILP32/freeradius-server && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
freeradius-server-3.2.3.tar.bz2 | 0003454869 3.29 MB | |
freeradius-server-3.2.3.tar.bz2.sig | 0000000591 591 Bytes | |
freeradius-server-enable-python3.patch | 0000000767 767 Bytes | |
freeradius-server-fix-perl-shbang.patch | 0000001054 1.03 KB | |
freeradius-server-opensslversion.patch | 0000000566 566 Bytes | |
freeradius-server-radclient-init-error-buffer.patc |
0000000434 434 Bytes | |
freeradius-server-rcradiusd.patch | 0000000556 556 Bytes | |
freeradius-server-rlm_sql_unixodbc-configure.patch | 0000000791 791 Bytes | |
freeradius-server-tmpfiles.patch | 0000000310 310 Bytes | |
freeradius-server.changes | 0000137743 135 KB | |
freeradius-server.spec | 0000040996 40 KB | |
freeradius-tmpfiles.conf | 0000000038 38 Bytes | |
freeradius.keyring | 0000011090 10.8 KB | |
radiusd.service | 0000000408 408 Bytes |
Revision 94 (latest revision is 97)
Ana Guerrero (anag+factory)
accepted
request 1108446
from
Adam Majer (adamm)
(revision 94)
- update to version 3.2.3: Feature Improvements * Add "max_retries" for connection pools. Fixes #4908. * Update dictionary.ciena, dictionary.huawei, dictionary.wifialliance and dictionary.wispr; add dictionary.eleven. * You can now list "eap" in the "pre-proxy" section. If the packet contains a malformed EAP message, then the request will be rejected The home server will either reject (or discard) this packet anyways, so this change can only help with large proxy scenarios. * Show warnings if libldap is not using OpenSSL. * Support RADIUS/1.1. See https://datatracker.ietf.org/doc/draft-dekok-radext-radiusv11/ Disabled by default, can be enabled by passing `--with-radiusv11` to the configure script. For now, this is for testing interoperability. * Add extra sanity checks for malformed EAP attributes. * More TLS debugging output. * Clear old module instance data before HUP reload. Avoids burst memory use when e.g. using large data files with rlm_files. * `rlm_cache_redis` is now included in the freeradius-redis packages. Bug Fixes * Don't leak MD contexts with OpenSSL 3.0. * Increase internal buffer size for TLS connections, which can help with high-load proxies. * Send Status-Server checks for TLS connections. * Give descriptive error if "update CoA" is used with "fake" packets, as it won't work. i.e. inner-tunnel and virtual home servers. * Many small ASAN / LSAN fixes from Jorge Pereira. * Close inbound RADIUS/TLS socket on TLS errors. When a home server sees a TLS error, it will now close the socket, so proxies do not have an open (but dead) TLS connection.
Comments 0