Name: | freeradius |
---|---|
Version: | 3.0.20 |
Release: | 3.module+el8.3.0+7821+dc9b437c |
Architecture: | aarch64 |
Module: | freeradius:3.0:8030020200806223029:fbe42456 |
Group: | System Environment/Daemons |
Size: | 6458430 |
License: | GPLv2+ and LGPLv2+ |
RPM: | freeradius-3.0.20-3.module+el8.3.0+7821+dc9b437c.aarch64.rpm |
Source RPM: | freeradius-3.0.20-3.module+el8.3.0+7821+dc9b437c.src.rpm |
Build Date: | Wed Nov 04 2020 |
Build Host: | ca-buildarm05 |
Vendor: | Oracle America |
URL: | http://www.freeradius.org/ |
Summary: | High-performance and highly configurable free RADIUS server |
Description: | The FreeRADIUS Server Project is a high performance and highly configurable GPL'd free RADIUS server. The server is similar in some respects to Livingston's 2.0 server. While FreeRADIUS started as a variant of the Cistron RADIUS server, they don't share a lot in common any more. It now has many more features than Cistron or Livingston, and is much more configurable. FreeRADIUS is an Internet authentication daemon, which implements the RADIUS protocol, as defined in RFC 2865 (and others). It allows Network Access Servers (NAS boxes) to perform authentication for dial-up users. There are also RADIUS clients available for Web servers, firewalls, Unix logins, and more. Using RADIUS allows authentication and authorization for a network to be centralized, and minimizes the amount of re-configuration which has to be done when adding or deleting new users. |
- Require make for proper bootstrap execution, removes post script Resolves: bz#1672285
- Fix breakage caused by OpenSSL FIPS regression Related: bz#1855822 Related: bz#1810911 Resolves: bz#1672285
- Update to FreeRADIUS server version 3.0.20 - Introduce Python 3 support; resolves: bz#1623069 - DoS issues due to multithreaded BN_CTX access; resolves: bz#1818809 - Create tmp files in /run; resolves: bz#1805975
- Fix information leak due to aborting when needing more than 10 iterations Resolves: bz#1751797
- Fix handling of IPv6-only hostnames with listen.ipaddr Resolves: bz#1685546
- Fix possible privilege escalation due to insecure logrotate configuration Resolves: bz#1719369
- Fixes two EAP-PWD security issues Resolves: bz#1699417 authentication bypass with an invalid curve attack Resolves: bz#1699421 fake authentication using reflection
- Updates radiusd.service to start after network-online.target Resolves: bz#1637275
- Update to FreeRADIUS server version 3.0.17 - Adds OpenSSL HMAC patches from upstream (unreleased) - Adds Python2 shebang patches from upstream (unreleased)
- Actually apply patches added previously. Related: Bug#1612512 Man page scan results for freeradius