A vulnerability has been found in the dyndisc example scripts (naptr-eduroam.sh, radsec-dynsrv.sh) provided with radsecproxy.
For details, see https://github.com/radsecproxy/radsecproxy/security/advisories/GHSA-56gw-9r…
Updated example scripts are provided with the 1.9.0 release. Note that the scripts are not part of the installation package and are not updated automatically. If you are using the examples, you have to update them manually.
Best regards,
Fabian
--
SWITCH
Fabian Mauchle, Network Engineer
Werdstrasse 2, P.O. Box, 8021 Zurich, Switzerland
Phone +41 44 268 15 30, direct +41 44 268 15 39
Dear radsecproxy community,
radsecproxy 1.9.0 release has now been published:
https://github.com/radsecproxy/radsecproxy/releases/tag/1.9.0
Many thanks to all who have helped in developing, testing and fixing it!
Best regards,
Fabian
--
SWITCH
Fabian Mauchle, Network Engineer
Werdstrasse 2, P.O. Box, 8021 Zurich, Switzerland
Phone +41 44 268 15 30, direct +41 44 268 15 39
Hi all,
The release candidate for radsecproxy 1.9.0 has just been published:
https://github.com/radsecproxy/radsecproxy/releases/tag/1.9.0-rc1
Any testing is highly appreciated.
Please report any issues on github or on this mailing list.
Best regards,
Fabian
--
SWITCH
Fabian Mauchle, Network Engineer
Werdstrasse 2, P.O. Box, 8021 Zurich, Switzerland
Phone +41 44 268 15 30, direct +41 44 268 15 39