diff options
author | Ermal <eri@pfsense.org> | 2014-05-03 16:27:28 +0000 |
---|---|---|
committer | Ermal <eri@pfsense.org> | 2014-05-03 16:27:28 +0000 |
commit | 4ec6b54d189dbd84265cf1f7dc18050ae941df7c (patch) | |
tree | 17132106f143e276f56bedee56593b7f84f7b94d | |
parent | 4e1b06aac4f32535703e894f302fee670db24b9c (diff) | |
download | pfsense-4ec6b54d189dbd84265cf1f7dc18050ae941df7c.zip pfsense-4ec6b54d189dbd84265cf1f7dc18050ae941df7c.tar.gz |
Merge the forgotten Ticket #3062 patch for CP pipeno leaking issue which leads to the 'Maximum login reached' on CP
-rw-r--r-- | etc/inc/captiveportal.inc | 7 |
1 files changed, 6 insertions, 1 deletions
diff --git a/etc/inc/captiveportal.inc b/etc/inc/captiveportal.inc index ea2f116..c3dfe10 100644 --- a/etc/inc/captiveportal.inc +++ b/etc/inc/captiveportal.inc @@ -1968,8 +1968,13 @@ function portal_allow($clientip,$clientmac,$username,$password = null, $attribut captiveportal_logportalauth($username,$clientmac,$clientip,$type,"RADIUS ACCOUNTING FAILED"); } } - } else + } else { + /* NOTE: #3062-11 If the pipeno has been allocated free it to not DoS the CP and maintain proper operation as in radius() case */ + if (!is_null($pipeno)) + captiveportal_free_dn_ruleno($pipeno); + unlock($cpdblck); + } if ($writecfg == true) write_config(); |