summaryrefslogtreecommitdiff
path: root/accel-pppd
AgeCommit message (Collapse)Author
2024-05-05ipv6_dhcp: Add RFC6334 AFTR-Name option supportLuiz Amaral
2024-04-29snmp: fix compatibility with net-snmp 5.9.4+ (issue #136)Sergey V. Lobanov
related net-snmp change: https://github.com/net-snmp/net-snmp/commit/a2cb167514ac0c7e1b04e8f151e0b015501362e0 Signed-off-by: Sergey V. Lobanov <sergey@lobanov.in>
2024-04-28Merge pull request #138 from stasn77/upstreamDenys Fedoryshchenko
clsact + fwmark
2024-04-27clsact + fwmarkStasN77
2024-04-24CMakeLists.txt: gentoo fix for __free_fn_t detectionDenys Fedoryshchenko
On Gentoo __free_fn_t wont be detected properly without this include. Signed-off-by: Denys Fedoryshchenko <denys.f@collabora.com> Reported-by: Stanislav <stasn77@gmail.com> Author: Stanislav <stasn77@gmail.com>
2024-04-14Merge pull request #132 from svlobanov/clsactDenys Fedoryshchenko
shaper: add clsact policer support
2024-04-14Merge pull request #133 from nuclearcat/memleak-fix-logtcpDmitriy Eshenko
log_tcp: Fix small memory leak
2024-04-12log_tcp: Fix small memory leakDenys Fedoryshchenko
Discovered using clang sanitizers. Signed-off-by: Denys Fedoryshchenko <denys.f@collabora.com>
2024-04-11shaper: add clsact policer supportSergey V. Lobanov
Use the following configuration to enable clsact up and down limiters: [shaper] up-limiter=police down-limiter=clsact It is also recommended to set down-burst-factor=1.0 How to check current configuration in Linux: tc qdisc show dev ppp0 tc filter show dev ppp0 egress tc filter show dev ppp0 ingress Signed-off-by: Sergey V. Lobanov <sergey@lobanov.in>
2024-04-10workflows: Add CI build in AlpineDenys Fedoryshchenko
As we fixed musl compatibility, we can add also basic check if accel keep working in Alpine Linux Also update default config, enable connlimit and place it before pptp, otherwise Alpine generate error: ``` [2024-04-09 22:30:09.911]loader: failed to load 'pptp': Error relocating /usr/local/lib64/accel-ppp/libpptp.so: connlimit_check: symbol not found ``` Signed-off-by: Denys Fedoryshchenko <denys.f@collabora.com>
2024-04-10musl: Add musl compatibilityDenys Fedoryshchenko
Thanks for hints Alpine Linux project and their patches: https://git.alpinelinux.org/aports/tree/community/accel-ppp?h=master We can adjust a bit code and cmake config files to make accel-ppp buildable under musl "as is". Signed-off-by: Denys Fedoryshchenko <denys.f@collabora.com>
2024-03-10Add safeguards to parse_gw_ip_address helper functionsDenys Fedoryshchenko
In case of invalid configuration we might get stack overflow with unexpected consequences. Signed-off-by: Denys Fedoryshchenko <denys.f@collabora.com>
2024-03-09ippool: use gw-ip-address for ppp even if mask settedDmitriy Eshenko
2023-12-27Merge pull request #118 from DmitriyEshenko/fix_local_net_checkxebd
ipoe: check localnet only for start=UP (unclassified packets) sessions
2023-12-26ipoe: check localnet only for start=UP (unclassified packets) sessionsDmitriy Eshenko
2023-12-17ipoe: Add per-interface check-mac-change optionDmitriy Eshenko
2023-12-07Merge pull request #115 from leonardomeres/radius_server_ipv6Dmitriy Eshenko
Adding support to Radius IPV6 address
2023-11-30vlan_mon: ipoe: pppoe: Add disable vlan timeout featureDmitriy Eshenko
Co-authored-by: Peter Adam <p.adam@cygnusnetworks.de>
2023-11-30Adding support to Radius IPV6 addressLeoMeres
This change enables ipv6 connections between accel-ppp and radius server
2023-07-01Merge pull request #95 from DmitriyEshenko/show-sessions-imprDmitriy Eshenko
CLI: PPPoE: Add possibility to display inbound interface and service-…
2023-06-30Merge pull request #91 from louis-6wind/fix-link-selection-mem-violationDmitriy Eshenko
ipoe: fix memory access violation with unset link-selection
2023-06-29CLI: PPPoE: Add possibility to display inbound interface and service-name in ↵Dmitriy Eshenko
show sessions command
2023-06-29Merge pull request #85 from louis-6wind/fix-non-vlan-crashDmitriy Eshenko
libnetlink: fix a crash with a non vlan interface
2023-06-29CLI: PPPoE: Use global net variable to prevent SEGFAULTDmitriy Eshenko
When accel-ppp has no connected clients, CLI interface add command it try to use net == NULL and crush code.
2023-06-27ipoe: fix memory access violation with unset link-selectionLouis Scalbert
Link-selection pointer is not set to NULL when link-selection IPOE option is not set. It results in a memory access violation in dhcpv4_packet_insert_opt82() Set link-selection pointer to NULL if unset to fix the issue. Fixes: 61e31c591e ("ipoe: add dhcp link selection sub-option") Signed-off-by: Louis Scalbert <louis.scalbert@6wind.com>
2023-06-26libnetlink: fix a crash with a non vlan interfacePhilippe Guibert
Fix a segmentation fault when starting when accel-ppp is configured with an non vlan interface. Signed-off-by: Philippe Guibert <philippe.guibert@6wind.com> Signed-off-by: Louis Scalbert <louis.scalbert@6wind.com>
2023-06-05man: add information about link-selectionPhilippe Guibert
Add information about link-selection ipoe option in accel-ppp.conf man. Signed-off-by: Philippe Guibert <philippe.guibert@6wind.com> Signed-off-by: Louis Scalbert <louis.scalbert@6wind.com>
2023-06-05man: add information about agent-remote-idPhilippe Guibert
DHCP "agent remote id" sub-option 2 of option 82 can already be configured with [ipoe] / "agent-remote-id". However, it is not documented. Add information about agent-remote-id in accel-ppp.conf man. Signed-off-by: Philippe Guibert <philippe.guibert@6wind.com> Signed-off-by: Louis Scalbert <louis.scalbert@6wind.com>
2023-06-05ipoe: add dhcp link selection sub-optionPhilippe Guibert
Add the support of DHCP option 82 "Agent Information" sub-option 5 "link selection". The IPv4 value can be specified in the [ipoe] "link-selection" configuration option. Link: https://www.rfc-editor.org/rfc/rfc3527.html Signed-off-by: Philippe Guibert <philippe.guibert@6wind.com> Signed-off-by: Louis Scalbert <louis.scalbert@6wind.com>
2023-05-05sstp: fix gcc9/clang address-of-packed-member warningVladislav Grishenko
Patially fixes 6e5f9980a8a71015a228279e07970621d23c7b35, there's no really requirement for packed internal sockaddr_t struct. Also, constantify several struct pointer arguments as well.
2023-05-05sstp: revert 6e5f9980a8a71015a228279e07970621d23c7b35Vladislav Grishenko
There's no alignment reason for making temporary vars on stack assuming unaligned block copy.
2023-05-05sstp: fix termios structure initializationVladislav Grishenko
Fixes ad94c19554d7c6bb18ab2e251e4ee403ee0b7732, tios is sill left partially initialized with sane values. Also, log get/set attr errors with error level as well since it raises pty allocation error and connection drop therefore.
2023-01-27radius: implemented accounting delay option (acct-delay-start)Dmitry Kozlov
2022-11-16CLI: Fix counters output typeDmitriy Eshenko
2022-11-15SNMP: Fix previous migration to 64 bit countersDmitriy Eshenko
2022-11-01Merge pull request #66 from boomer41/feature/additions-2022-11-01xebd
Use 64-bit interface statistics and some more env parameters for pppd-compat
2022-11-01Merge pull request #64 from volodymyrhuti/masterEshenko Dmitriy
T72: Fix compilations warnings for unaligned variable access
2022-11-01Remove uninitialized argument from openpty()Stephan Brunner
As per the docs: The openpty() function finds an available pseudoterminal and returns file descriptors for the master and slave in amaster and aslave. [...] If termp is not NULL, the terminal parameters of the slave will be set to the values in termp. [...] So openpty() would set the pty parameters to something undefined. This undefinedness will be fixed by the later tcsetattr() call. As a result, we don't need that parameter in the first place. Additionally, fixes a -Wmaybe-uninitialized warning.
2022-11-01Remove unused variable.Stephan Brunner
2022-11-01Add PACKETS_SENT and PACKETS_RCVD to the pppd-compat environment.Stephan Brunner
2022-11-01Use 64-bit interface statistics rather than doing custom 32-bit overflow ↵Stephan Brunner
handling. When a link has a relatively high throughput, the 32-bit packet and byte counters could overflow multiple times between accounting runs. To accommodate this limitation, directly use 64-bit interface statistics. This also gets rid of the internal giga-word counters.
2022-10-26Merge pull request #51 from cygnusb/dhcp_notify_end_optionEshenko Dmitriy
Add missing dhcp end option on dhcp notify packet
2022-10-22T72: Fix compilations warnings for unaligned variable accessVolodymyr Huti
- IPoE/DHCP4: Specify minimal suitable alignment explicitly. We need to guarantee 2 byte alignment for the `hdr` pointer in `ip_csum(uint16_t *buf)` calculation - PPPOE: Suppress false-positive warning for `sockaddr_pppox`. Similiar issue: https://github.com/kernelslacker/trinity/pull/40 - Introduce tmp variables to avoid alignment issues for SSTP/DHCPv6 For additional details: https://phabricator.accel-ppp.org/T72 Signed-off-by: Volodymyr Huti <v.huti@vyos.io>
2022-08-04sstp: T69: Add timer befor context wakeup to preevent segfaultDmitriy Eshenko
2022-07-27Merge pull request #54 from telirebarry/fix-ipv6-netnsxebd
Fix ipv6 inside netns
2022-07-05ipv6_dhcp:change log message with appropriate file nameTelire Barry
This commit proposes to modify the log message in dhcpv6.c to include the correct file name. It avoids confusion when reading the logs
2022-06-23Merge pull request #48 from DmitriyEshenko/master-08042022xebd
T60: Implement configurable session-timeout param for all connection …
2022-06-22ipv6_dhcp: fix create ipv6 socket inside netnsTelire Barry
This fix allow to create the socket inside the netns for ipv6-dhcp module.
2022-06-22ipv6_nd: fix ipv6 auto-configuration in netnsTelire Barry
ipv6 auto-configuration generate error when link is terminated inside netns. The error message is : "ipv6_nd: setsockopt(SO_BINDTODEVICE): No such device" This error is generated because socket is not created inside the netns but it’s created in the default netns. This fix allow to create the socket in the right place. to propose this fix, i was inspired by : issue : https://phabricator.accel-ppp.org/T68 commit : https://github.com/accel-ppp/accel-ppp/commit/f1d616d91914be493b6a32a96323fa871733f8e0
2022-05-13auth: discard unphased PAP Authenticate-Request packetsVladislav Grishenko
Per https://datatracker.ietf.org/doc/html/rfc1334#section-2.2.1: Implementation Note: Because the Authenticate-Ack might be lost, the authenticator MUST allow repeated Authenticate- Request packets after completing the Authentication phase. Protocol phase MUST return the same reply Code returned when the Authentication phase completed (the message portion MAY be different). Any Authenticate-Request packets received during any other phase MUST be silently discarded.