Age | Commit message (Collapse) | Author | |
---|---|---|---|
2016-07-23 | check loop against TAC_PLUS_MAX_ARGCOUNT | Paweł Krawczyk | |
2016-07-23 | check for max number of arguments passed in reply | Paweł Krawczyk | |
2016-07-23 | Fix warnings | Paweł Krawczyk | |
Fix various declaration inconsistencies that were throwing compiler warnings | |||
2016-07-22 | Rewrite the getrandom(2) usage | Paweł Krawczyk | |
The getrandom(2) is experimental (on Linux at least) and the presence of headers doesn't guarantee it's usable. It seems to be available from 3.17 kernels only as syscall. | |||
2016-07-22 | check for sys/random.h as well for Solaris | Paweł Krawczyk | |
2016-07-22 | fix format string for long int | Paweł Krawczyk | |
2016-05-27 | fix variable names | Paweł Krawczyk | |
2016-05-27 | wrong var name | Paweł Krawczyk | |
2016-05-27 | typo | Paweł Krawczyk | |
2016-05-27 | replace the broken packet_read check with a hard-coded max packet length | Paweł Krawczyk | |
2016-05-05 | Merge branch 'master' of github.com:jeroennijhof/pam_tacplus | Paweł Krawczyk | |
2016-05-05 | make len_from_* variables unsigned | Paweł Krawczyk | |
2016-05-05 | make len_from_* variables unsigned | Paweł Krawczyk | |
2016-05-05 | format string long int | Paweł Krawczyk | |
2016-05-04 | fix variable reference | Paweł Krawczyk | |
2016-05-03 | port to OpenSSL MD5 | Paweł Krawczyk | |
2016-05-03 | use OpenSSL for MD5 and random numbers | Paweł Krawczyk | |
2016-05-02 | retval cannot be negative when fd is positive as it was just copied from fd | Paweł Krawczyk | |
2016-05-02 | superfluous syslog format string | Paweł Krawczyk | |
2016-05-02 | check packet length declared in header | Paweł Krawczyk | |
2016-05-02 | ensure iteration over argument number sent in packet do not overflow | Paweł Krawczyk | |
past the actual packet data | |||
2016-03-25 | Password change support for TACACS+ | Ben Schumacher | |
Allow pam_tacplus to do challenge/response authentication for TAC backends that force password change during authentication flow. Also add support for password change via 'passwd' by implementing pam_sm_chauthtok. Amongst other things, this requires explicitly managing the sequence number for compatability with some versions of Cisco ACS. | |||
2015-10-26 | Merge pull request #37 from gollub/fix/connection_timeout_leak | Paweł Krawczyk | |
Avoid socket leaks on connection timeouts | |||
2015-10-09 | Avoid socket leaks on connection timeouts | Daniel Gollub | |
... and other not covered error conditions. | |||
2015-08-06 | tac_connect_single: individual timeout | Daniel Gollub | |
Allow to configure an individual timeout per TACACS+ server. Bumped SO-version due to API change. | |||
2015-06-29 | Fix missing semicolons | David Stapleton | |
2015-06-20 | tac_login is a static array so it's never NULL | Paweł Krawczyk | |
2015-06-19 | check open() result including 0 which is a valid return value | Paweł Krawczyk | |
2015-06-19 | close socket if any operation fails | Paweł Krawczyk | |
2015-06-19 | Merge branch 'master' of github.com:jeroennijhof/pam_tacplus | Paweł Krawczyk | |
2015-06-19 | initialise the seed variable and update comments | Paweł Krawczyk | |
2015-06-18 | Make socket creation errno verbose | Daniel Gollub | |
2014-11-26 | close rfd | Pawel Krawczyk | |
2014-11-26 | rewrite the PRNG logic to use urandom on srand() only and then return | Pawel Krawczyk | |
random() on subsequent calls | |||
2014-11-20 | Reduce loglevel for non-critical author messages | Daniel Gollub | |
Messages like "Args cnt %d", "Adding buf/value pair (%s,%s)" should not flood syslog as warning. | |||
2014-10-14 | Close /dev/urandom to fix open file handler leak. | pwdng | |
2014-10-10 | Add source addr parameter for tac_connect_single | Daniel Gollub | |
This allows to specify from which source address/interface the TACACS+ client connection gets initiated. Bump SO-versioning due to API change. | |||
2014-09-18 | allow authorization without protocol defined | Sergey Mironov | |
Protocol is only required for certain subset of services, mainly for ppp. We allow authorization with empty protocol if user wants to use other service names, like 'ssh' From the http://tools.ietf.org/html/draft-grant-tacacs-02 page 30: The protocol attribute is intended for use with PPP. When service equals "ppp" and protocol equals "lcp", the message describes the PPP link layer service. For other values of protocol, this describes a PPP NCP (network layer service). A single PPP session can support multiple NCPs | |||
2013-04-28 | /dev/urandom improvements, thanks Walter. Fixed active_server check | Jeroen Nijhof | |
2013-03-29 | abort() on erroneous input parameters | Walter de Jong | |
2013-03-29 | xstrcpy() belongs in libtac | Walter de Jong | |
2013-03-29 | removed double xcalloc() function; do not leak memory for these small ↵ | Walter de Jong | |
buffers; added safe xstrcpy() | |||
2013-03-28 | fixes various memory leaks, really | Walter de Jong | |
2013-03-28 | server is a struct { address, key } | Walter de Jong | |
2013-03-28 | added FIXME remark about leaking memory | Walter de Jong | |
2013-03-28 | added FIXME remark for ifdef for existence of /dev/urandom | Walter de Jong | |
2013-03-28 | magic is always inited | Walter de Jong | |
2013-03-28 | handle read() errors | Walter de Jong | |
2013-03-27 | same thing, but less confusing | Walter de Jong | |
Note that this does not change anything in regards to buffer overflowing | |||
2013-03-27 | if key is set | Walter de Jong | |