<feed xmlns='http://www.w3.org/2005/Atom'>
<title>libpam-radius-auth.git/USAGE, branch sagitta</title>
<subtitle>Updated libpam-radius-auth package for user level auth in radius (mirror of https://github.com/vyos/libpam-radius-auth.git)
</subtitle>
<id>https://git.amelek.net/vyos/libpam-radius-auth.git/atom?h=sagitta</id>
<link rel='self' href='https://git.amelek.net/vyos/libpam-radius-auth.git/atom?h=sagitta'/>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/libpam-radius-auth.git/'/>
<updated>2017-06-21T01:29:11+00:00</updated>
<entry>
<title>Add changes to allow VRF, and mapped users (no local accounts)</title>
<updated>2017-06-21T01:29:11+00:00</updated>
<author>
<name>Dave Olson</name>
<email>olson@cumulusnetworks.com</email>
</author>
<published>2017-06-19T21:08:00+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/libpam-radius-auth.git/commit/?id=61257dc81beebcf324027edb712305c376dd2052'/>
<id>urn:sha1:61257dc81beebcf324027edb712305c376dd2052</id>
<content type='text'>
Add changes allow admins to set up RADIUS clients with no local
knowledge of the RADIUS accounts (no adduser required, nor LDAP, etc.)

This is done by using the nss-mapuser package.   The only real change
to this package is to set up the SUDO prompt, so it's the RADIUS login
name, in the pam_sm_acct_mgmt entry point.

Bumped the version to 1.4.1

Change the PACKAGE info in configure to reflect Cumulus, and also
a few related fields.   Changed maintiner to dev-support

Also incorporated changes to make debuging builds easier under debian.

Added comment and description of src_ip to the config file (author of
the src_ip changes hadn't yet done that), and removed the location of
config file from comments, since debian installs to a different
location.

Quieted config complaints; can't move to current because current is
GPLv3, and this doesn't use autoconf.

Tried to capture the 5 years of changes between 1.3.17 and 1.4.0

Added lintian overrides.  Fixed up debian/copyright file to be standard
format, and match (approximately) the source files.  overrides don't
quite work, because source vs binary confusion, but documents them

Added debian install files

Added man page for the plugin, and for the RADIUS client config file
</content>
</entry>
<entry>
<title>add force_prompt option to enforce new password prompt for use with Token</title>
<updated>2014-11-26T17:06:53+00:00</updated>
<author>
<name>Jens Kuehnel</name>
<email>ilovelogging-git-commit@jens.kuehnel.org</email>
</author>
<published>2014-11-26T17:06:53+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/libpam-radius-auth.git/commit/?id=c1986a03dc27c670e32973c2fabd8fb504585670'/>
<id>urn:sha1:c1986a03dc27c670e32973c2fabd8fb504585670</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Updated text on retry</title>
<updated>2014-08-29T17:04:36+00:00</updated>
<author>
<name>Alan T. DeKok</name>
<email>aland@freeradius.org</email>
</author>
<published>2014-08-29T17:04:36+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/libpam-radius-auth.git/commit/?id=50146dc06372256cb899fbcf68bbc886d5641160'/>
<id>urn:sha1:50146dc06372256cb899fbcf68bbc886d5641160</id>
<content type='text'>
</content>
</entry>
<entry>
<title>new parameter max_challenge limits number of Access-Challenges</title>
<updated>2014-08-29T10:06:46+00:00</updated>
<author>
<name>Walter de Jong</name>
<email>walter.dejong@surfsara.nl</email>
</author>
<published>2014-08-29T10:06:46+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/libpam-radius-auth.git/commit/?id=fabeb81842796838035b64734e53a28463df50f6'/>
<id>urn:sha1:fabeb81842796838035b64734e53a28463df50f6</id>
<content type='text'>
Force authentication failure when a certain amount of challenges
has been reached.
This is a workaround for buggy servers that keep issueing
challenges, when they should really send Access-Reject.
The limit is configurable through parameter "max_challenge".
The default is 0, which means the workaround is disabled.
An invalid or negative value also disables this workaround.
</content>
</entry>
<entry>
<title>Added 'prompt' option</title>
<updated>2014-06-17T21:00:11+00:00</updated>
<author>
<name>Bennett Samowich</name>
<email>bennett@foolean.org</email>
</author>
<published>2014-06-16T01:23:34+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/libpam-radius-auth.git/commit/?id=9a1ee796634504a6f26a08fb8731c1d032dba9f2'/>
<id>urn:sha1:9a1ee796634504a6f26a08fb8731c1d032dba9f2</id>
<content type='text'>
</content>
</entry>
<entry>
<title>doc: don't use the full path to the module in the usage examples.</title>
<updated>2013-02-24T01:20:01+00:00</updated>
<author>
<name>Diego Elio Pettenò</name>
<email>flameeyes@flameeyes.eu</email>
</author>
<published>2013-02-24T01:20:01+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/libpam-radius-auth.git/commit/?id=0089fa4ee9c6de7e7684a88e1227d56beaaf0f85'/>
<id>urn:sha1:0089fa4ee9c6de7e7684a88e1227d56beaaf0f85</id>
<content type='text'>
The path depends on the bitness of the software, so it can't be used
this way.
</content>
</entry>
<entry>
<title>Commit of version 1.3.17</title>
<updated>2012-10-24T07:18:01+00:00</updated>
<author>
<name>Arran Cudbard-Bell</name>
<email>a.cudbardb@freeradius.org</email>
</author>
<published>2012-10-24T07:18:01+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/libpam-radius-auth.git/commit/?id=c2c2b9c4b0571f4e6050de78ae8fd813d1be7431'/>
<id>urn:sha1:c2c2b9c4b0571f4e6050de78ae8fd813d1be7431</id>
<content type='text'>
</content>
</entry>
</feed>
