X-Git-Url: http://git.sameswireless.fr/l2tpns.git/blobdiff_plain/348452cffc1ac8cbe007108905de0022f684aa9d..4554641760c2efefb85661006c3c60ad99d9e7e1:/Changes?ds=sidebyside diff --git a/Changes b/Changes index 217fcb1..5ef5266 100644 --- a/Changes +++ b/Changes @@ -1,3 +1,36 @@ +* Sat May 7 2005 Brendan O'Dea 2.0.19 +- Fix leak in session freelist when initial RADIUS session allocation + fails. + +* Tue May 3 2005 Brendan O'Dea 2.0.18 +- Add a Cisco-Avpair with intercept details to RADIUS Start/Stop + records. + +* Mon May 2 2005 Brendan O'Dea 2.0.17 +- Only send RADIUS stop record in sessionshutdown when there's an ip address. +- Reset .die on master takeover (so that dying sessions don't have to + hang around until the new master has the same uptime as the old one). +- Update .last_packet in cluster_handle_bytes only when there have + been bytes received from the modem (dead sessions were having the + idle timeout reset by stray packets). + +* Mon Feb 14 2005 Brendan O'Dea 2.0.16 +- Ensure that sessionkill is not called on an unopened session (borks + the freelist). +- Bump MAXSESSION to 60K. +- Fix off-by-one errors in session/tunnel initialisation and + sessiont <-> sessionidt functions. +- Use session[s].opened consistently when checking for in-use sessions + (rather than session[s].tunnel). +- Use <= cluster_highest_sessionid rather than < MAXSESSION in a + couple of loops. +- Don't kill a whole tunnel if we're out of sessions. +- Change session[s].ip to 0 if set from RADIUS to 255.255.255.254; + avoids the possibility that it will be interpreted as a valid IP + address. +- Avoid a possible buffer overflow in processpap. +- Kill session if authentication was rejected. + * Thu Jan 13 2005 Brendan O'Dea 2.0.15 - More DoS prevention: add packet_limit option to apply a hard limit to downstream packets per session.