Age | Commit message (Collapse) | Author | |
---|---|---|---|
2014-12-08 | If a timeout is configured by PAM, make sure we set the | Ben Schumacher | |
tac_readtimeout_enable to a non-zero value to get TACACS+ timeouts to work as expected. | |||
2014-11-27 | too many RELROs | Pawel Krawczyk | |
2014-11-26 | give up AX_ macros as they don't work on older autoconf, use | Pawel Krawczyk p.krawczyk@kainos.com | |
a more conservative method instead | |||
2014-11-26 | Merge branch 'master' of github.com:jeroennijhof/pam_tacplus | Pawel Krawczyk | |
2014-11-26 | check for PAM devel libraries | Pawel Krawczyk | |
2014-11-26 | close rfd | Pawel Krawczyk | |
2014-11-26 | rewrite the PRNG logic to use urandom on srand() only and then return | Pawel Krawczyk | |
random() on subsequent calls | |||
2014-11-26 | add -Wall | Pawel Krawczyk | |
2014-11-21 | Merge pull request #21 from gollub/fix/reduce_log_level | jeroennijhof | |
Reduce loglevel for non-critical author messages | |||
2014-11-20 | Reduce loglevel for non-critical author messages | Daniel Gollub | |
Messages like "Args cnt %d", "Adding buf/value pair (%s,%s)" should not flood syslog as warning. | |||
2014-10-14 | add Jeroen as primary author and list others from GitHub1.3.9 | Pawel Krawczyk | |
2014-10-14 | bump version to 1.3.9, mostly due to file descriptor leak fix | Pawel Krawczyk | |
2014-10-14 | Merge pull request #18 from pwdng/master | Paweł Krawczyk | |
Close /dev/urandom to fix open file handler leak. | |||
2014-10-14 | Close /dev/urandom to fix open file handler leak. | pwdng | |
2014-10-10 | Merge pull request #17 from gollub/feature/client_connect_source_address_v4 | Paweł Krawczyk | |
Add source addr parameter for tac_connect_single | |||
2014-10-10 | Add source addr parameter for tac_connect_single | Daniel Gollub | |
This allows to specify from which source address/interface the TACACS+ client connection gets initiated. Bump SO-versioning due to API change. | |||
2014-10-08 | Merge pull request #16 from gollub/fix/debian_build_for_ax_check_compile_flag | Paweł Krawczyk | |
Fix/debian build for ax check compile flag | |||
2014-10-08 | Whitespace fix | Daniel Gollub | |
2014-10-08 | Fix Debian build failing on AX_CHECK_COMPILE_FLAG | Daniel Gollub | |
2014-10-02 | C compiler hardening options | Pawel Krawczyk | |
Add checks for C compiler hardening options (stack protector etc) and use them if available. | |||
2014-10-02 | Fix always true condition | Pawel Krawczyk | |
The condition was checking tac_prompt which is a static array, so it will always return some address. Now checking the value of the first element of the array, which can be zero on non-zero. | |||
2014-09-18 | Merge pull request #14 from gollub/fix_debian_packaging | Paweł Krawczyk | |
Fix Debian packaging due to README markdown rename | |||
2014-09-18 | Merge pull request #13 from gollub/shared_libtac | Paweł Krawczyk | |
[RFC] Build and install libtac as shared library | |||
2014-09-18 | Merge pull request #15 from grwlf/master | Paweł Krawczyk | |
allow authorization without protocol defined | |||
2014-09-18 | allow authorization without protocol defined | Sergey Mironov | |
Protocol is only required for certain subset of services, mainly for ppp. We allow authorization with empty protocol if user wants to use other service names, like 'ssh' From the http://tools.ietf.org/html/draft-grant-tacacs-02 page 30: The protocol attribute is intended for use with PPP. When service equals "ppp" and protocol equals "lcp", the message describes the PPP link layer service. For other values of protocol, this describes a PPP NCP (network layer service). A single PPP session can support multiple NCPs | |||
2014-09-05 | Fix include directory in pkg-config file | Daniel Gollub | |
All headers are stored in the libtac sub-directory. | |||
2014-08-28 | Introduce pkg-config file for libtac | Daniel Gollub | |
2014-08-28 | debian: Introduce shahred library packaging libtac | Daniel Gollub | |
2014-08-28 | Fix Debian packaging due to README markdown rename | Daniel Gollub | |
Regression introduced with ea841487 | |||
2014-08-27 | Build and install libtac as shared library | Daniel Gollub | |
Additional install public headers for libtac shared library. SO-Versioning is initially set to 0:0:0. | |||
2014-04-22 | Added macro dir and fix readme issue | Jeroen Nijhof | |
2014-04-22 | Added install instruction | jeroennijhof | |
2014-04-22 | Markup extention | Jeroen Nijhof | |
2014-04-22 | Use markup for README | Jeroen Nijhof | |
2014-04-22 | Merge pull request #8 from walterdejong/master | jeroennijhof | |
Thanks guys! But the pam_sm_authenticate() function was indeed looping over the tac_plus servers for authentication. The problem is when a tac_plus server is not working correctly you will be denied during authentication but I agree we need to find a better solution for that issue. | |||
2014-04-18 | Merge pull request #10 from jeroennijhof/hotfix_9 | jeroennijhof | |
Fix issue with automake 1.9 | |||
2014-04-16 | Fix issue with automake 1.9 | Jeroen Nijhof | |
2014-02-19 | cleanup redundant code | Walter de Jong | |
2014-02-19 | bugfix: do not try other server when AUTHEN_STATUS_FAIL | Walter de Jong | |
The loop would continue to try other servers even when a server has indicated that the authentication failed (wrong password!!) Also, try talk the protocol as much as possible. The PAM status is AUTHINFO_UNAVAIL unless a tacacs server has responded with PASS (-> PAM status SUCCESS) or FAIL (-> PAM status ERR) | |||
2014-02-19 | delete extraneous whitespace | Walter de Jong | |
2014-02-19 | Merge branch 'master' of github.com:walterdejong/pam_tacplus | Walter de Jong | |
2014-02-19 | run libtoolize too | Walter de Jong | |
2014-02-17 | Added postinst and prerm for pam-auth-update | Jeroen Nijhof | |
2014-01-31 | Added automake subdir-objects option1.3.8 | Jeroen Nijhof | |
2013-12-20 | Fixed mismatch between compat and debhelper version | Jeroen Nijhof | |
2013-12-17 | Release version 1.3.8 | Jeroen Nijhof | |
2013-07-01 | A lot of cleanups and improvements by Walter de Jong | Jeroen Nijhof | |
2013-06-06 | run libtoolize too | Walter de Jong | |
2013-04-28 | active_server can not be a pointer, data lost after authentication. | Jeroen Nijhof | |
2013-04-28 | /dev/urandom improvements, thanks Walter. Fixed active_server check | Jeroen Nijhof | |