<feed xmlns='http://www.w3.org/2005/Atom'>
<title>libpam-radius-auth.git/debian/radius-shell.postinst, branch crux</title>
<subtitle>Updated libpam-radius-auth package for user level auth in radius (mirror of https://github.com/vyos/libpam-radius-auth.git)
</subtitle>
<id>https://git.amelek.net/vyos/libpam-radius-auth.git/atom?h=crux</id>
<link rel='self' href='https://git.amelek.net/vyos/libpam-radius-auth.git/atom?h=crux'/>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/libpam-radius-auth.git/'/>
<updated>2018-05-25T13:20:56+00:00</updated>
<entry>
<title>update depend and group</title>
<updated>2018-05-25T13:20:56+00:00</updated>
<author>
<name>Kim Hagen</name>
<email>kim.sidney@gmail.com</email>
</author>
<published>2018-05-25T13:20:56+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/libpam-radius-auth.git/commit/?id=a9ae965786a981b6c530885eaaf95c8dd8506052'/>
<id>urn:sha1:a9ae965786a981b6c530885eaaf95c8dd8506052</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Revert "Do not include config file"</title>
<updated>2018-05-24T13:14:21+00:00</updated>
<author>
<name>Kim</name>
<email>khagen@jessiedevel</email>
</author>
<published>2018-05-24T13:14:21+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/libpam-radius-auth.git/commit/?id=ff7ea358fa9e5703858e4a7e3241fea35e0166cf'/>
<id>urn:sha1:ff7ea358fa9e5703858e4a7e3241fea35e0166cf</id>
<content type='text'>
This reverts commit 80ec9b746124ca540faeac332131a7833a08b14c.
</content>
</entry>
<entry>
<title>Do not include config file</title>
<updated>2018-05-17T20:52:01+00:00</updated>
<author>
<name>UnicronNL</name>
<email>kim.sidney@gmail.com</email>
</author>
<published>2018-05-17T20:52:01+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/libpam-radius-auth.git/commit/?id=80ec9b746124ca540faeac332131a7833a08b14c'/>
<id>urn:sha1:80ec9b746124ca540faeac332131a7833a08b14c</id>
<content type='text'>
Use vbash instead of bash
Only change shell for priv user
</content>
</entry>
<entry>
<title>Add a new package radius-shell with a setcap radius_shell front end</title>
<updated>2018-04-13T22:04:03+00:00</updated>
<author>
<name>Dave Olson</name>
<email>olson@cumulusnetworks.com</email>
</author>
<published>2018-04-13T06:57:55+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/libpam-radius-auth.git/commit/?id=acc77c4757775bb7689ba769465951a65523db75'/>
<id>urn:sha1:acc77c4757775bb7689ba769465951a65523db75</id>
<content type='text'>
Ticket: CM-19457
Reviewed By: nobody
Testing Done:  multiple logins, separately and simultaneously

Because we can't determine privilege level separately and up front with
the RADIUS protocol, unlike TACACS+, we wind up with all logins as the
same unprivileged radius uid.  But we can set the auid (accounting or
auditing uid) correctly, and a separate setcap radius_shell can be set as
the login shell, and can fixup the uid before running /bin/bash.

To set the auid correctly, we need to know the privileged radius user
account.  Added mapped_priv_user to the configuration file to handle
that.  mapped_priv_user has to match the account used by libnss-mapuser.
That's a bit ugly, but a common config file would be uglier.

The radius shell is in a new package, since it has binaries. The new
package is radius-shell.  In it's post actions, it changes the radius
users shell to radius_shell if they are present, and back to /bin/bash
on package removal.   It uses capabilities, tries to be very restrictive
in what it changes, and depends on being installed setcap cap_setuid

Make the existing libpam-radius-auth package depend on radius-shell, so
it will pull in the new package on upgrades.

Also fixed another issue with reparsing changed config file, have to
handle case where there were servers defined, but aren't any longer.
</content>
</entry>
</feed>
