freeradius2: update to version 2.1.9
authorHauke Mehrtens <hauke@hauke-m.de>
Sat, 10 Jul 2010 22:46:50 +0000 (22:46 +0000)
committerHauke Mehrtens <hauke@hauke-m.de>
Sat, 10 Jul 2010 22:46:50 +0000 (22:46 +0000)
SVN-Revision: 22120

net/freeradius2/Makefile
net/freeradius2/patches/002-config.patch

index 297d8d7..7a6d17a 100644 (file)
@@ -8,12 +8,12 @@
 include $(TOPDIR)/rules.mk
 
 PKG_NAME:=freeradius2
-PKG_VERSION:=2.1.8
+PKG_VERSION:=2.1.9
 PKG_RELEASE:=3
 
 PKG_SOURCE:=freeradius-server-$(PKG_VERSION).tar.bz2
 PKG_SOURCE_URL:=ftp://ftp.freeradius.org/pub/freeradius/
-PKG_MD5SUM:=d326525490bfba273471d77560471fcb
+PKG_MD5SUM:=5e16a0869acdf448b191c7e30f6507d8
 
 PKG_BUILD_DIR:=$(BUILD_DIR)/freeradius-server-$(PKG_VERSION)
 PKG_FIXUP:=libtool
index dff97cf..66d32f8 100644 (file)
                #  These test certificates SHOULD NOT be used in a normal
                #  deployment.  They are created only to make it easier
                #  to install the server, and to perform some simple
-@@ -201,7 +181,7 @@
+@@ -205,7 +185,7 @@
                        #  In these cases, fragment size should be
                        #  1024 or less.
                        #
  
                        #  include_length is a flag which is
                        #  by default set to yes If set to
-@@ -211,7 +191,7 @@
+@@ -215,7 +195,7 @@
                        #  message is included ONLY in the
                        #  First packet of a fragment series.
                        #
  
                        #  Check the Certificate Revocation List
                        #
-@@ -220,83 +200,74 @@
+@@ -224,83 +204,74 @@
                        #    'c_rehash' is OpenSSL's command.
                        #  3) uncomment the line below.
                        #  5) Restart radiusd
                }
  
                #  The TTLS module implements the EAP-TTLS protocol,
-@@ -320,7 +291,7 @@
+@@ -324,7 +295,7 @@
                #
                #  in the control items for a request.
                #
                        #  The tunneled EAP session needs a default
                        #  EAP type which is separate from the one for
                        #  the non-tunneled EAP module.  Inside of the
-@@ -328,7 +299,7 @@
+@@ -332,7 +303,7 @@
                        #  If the request does not contain an EAP
                        #  conversation, then this configuration entry
                        #  is ignored.
  
                        #  The tunneled authentication request does
                        #  not usually contain useful attributes
-@@ -344,7 +315,7 @@
+@@ -348,7 +319,7 @@
                        #  is copied to the tunneled request.
                        #
                        # allowed values: {no, yes}
  
                        #  The reply attributes sent to the NAS are
                        #  usually based on the name of the user
-@@ -357,7 +328,7 @@
+@@ -361,7 +332,7 @@
                        #  the tunneled request.
                        #
                        # allowed values: {no, yes}
  
                        #
                        #  The inner tunneled request can be sent
-@@ -369,13 +340,13 @@
+@@ -373,13 +344,13 @@
                        #  the virtual server that processed the
                        #  outer requests.
                        #
  
                ##################################################
                #
-@@ -438,26 +409,16 @@
+@@ -448,26 +419,16 @@
  
                        #  the PEAP module also has these configuration
                        #  items, which are the same as for TTLS.
  #
 --- a/raddb/proxy.conf
 +++ b/raddb/proxy.conf
-@@ -559,9 +559,8 @@ home_server_pool my_auth_failover {
+@@ -566,9 +566,8 @@ home_server_pool my_auth_failover {
  #  This section defines a new-style "realm".  Note the in version 2.0,
  #  there are many fewer configuration items than in 1.x for a realm.
  #
  
        #
        #  Calculate the various WiMAX keys.  In order for this to work,
-@@ -505,10 +439,10 @@ post-auth {
+@@ -505,12 +439,12 @@ post-auth {
        #  Add the ldap module name (or instance) if you have set 
        #  'edir_account_policy_check = yes' in the ldap module configuration
        #
 -      Post-Auth-Type REJECT {
+-              # log failed authentications in SQL, too.
++#     Post-Auth-Type REJECT {
++#             # log failed authentications in SQL, too.
+ #             sql
 -              attr_filter.access_reject
 -      }
 -}
-+#     Post-Auth-Type REJECT {
 +#             attr_filter.access_reject
 +#     }
 +#}
  
  #
  #  When the server decides to proxy a request to a home server,
-@@ -518,7 +452,7 @@ post-auth {
+@@ -520,7 +454,7 @@ post-auth {
  #
  #  Only a few modules currently have this method.
  #
  #     attr_rewrite
  
        #  Uncomment the following line if you want to change attributes
-@@ -534,14 +468,14 @@ pre-proxy {
+@@ -536,14 +470,14 @@ pre-proxy {
        #  server, un-comment the following line, and the
        #  'detail pre_proxy_log' section, above.
  #     pre_proxy_log
  
        #  If you want to have a log of replies from a home server,
        #  un-comment the following line, and the 'detail post_proxy_log'
-@@ -565,7 +499,7 @@ post-proxy {
+@@ -567,7 +501,7 @@ post-proxy {
        #  hidden inside of the EAP packet, and the end server will
        #  reject the EAP request.
        #
  
        #
        #  If the server tries to proxy a request and fails, then the
-@@ -587,6 +521,5 @@ post-proxy {
+@@ -589,5 +523,5 @@ post-proxy {
  #     Post-Proxy-Type Fail {
  #                     detail
  #     }
--
 -}
 +#}