Proxying with radsec/TLS, Access-Reject leads to "spoofed proxy reply"

Sebastian Hagedorn Hagedorn at uni-koeln.de
Fri Jan 1 16:48:41 CET 2016


>> I have set breakpoints at the suggested places and as far as I can see
>> the secret is "radsec" in all cases:
>
>   I've pushed a fix.

Thanks. We don't build directly from git, so I want to make sure I'm 
picking the right commit as a patch for the 3.0.10 SRPM. I'm guessing it's 
this one?

commit d182083dbda2e64da1955255c18ef26ae27eefb3
Author: Alan T. DeKok <aland at freeradius.org>
Date:   Wed Dec 30 13:47:29 2015 -0500

    Ensure that the authentication vectors are always updated
--
Sebastian Hagedorn - Weyertal 121, Zimmer 2.02
Regionales Rechenzentrum (RRZK)
Universität zu Köln / Cologne University - Tel. +49-221-470-89578
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 191 bytes
Desc: not available
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20160101/79169990/attachment.sig>


More information about the Freeradius-Users mailing list