summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authordoktornotor <notordoktor@gmail.com>2017-02-18 22:50:15 +0100
committerjim-p <jimp@pfsense.org>2017-04-03 15:44:38 -0400
commit5ffe490ac9ac4a7c575596fb39bbf37955f25592 (patch)
tree104d32a9d5f577e294d82dca1390a978a003df34
parent0f29b3a047c0973ab1bb91b1382b4cb5fcdc4fd7 (diff)
downloadpfsense-5ffe490ac9ac4a7c575596fb39bbf37955f25592.zip
pfsense-5ffe490ac9ac4a7c575596fb39bbf37955f25592.tar.gz
Disallow IPv6 for RADIUS server.
See https://redmine.pfsense.org/issues/4154. No need for users to waste their time with debugging packets black hole.
-rw-r--r--src/usr/local/www/system_authservers.php7
1 files changed, 7 insertions, 0 deletions
diff --git a/src/usr/local/www/system_authservers.php b/src/usr/local/www/system_authservers.php
index 528104e..a125f05 100644
--- a/src/usr/local/www/system_authservers.php
+++ b/src/usr/local/www/system_authservers.php
@@ -321,6 +321,13 @@ if ($_POST) {
}
}
+ // https://redmine.pfsense.org/issues/4154
+ if ($pconfig['type'] == "radius_host") {
+ if (is_ipaddrv6($_POST['radius_host'])) {
+ $input_errors[] = gettext("IPv6 does not work for RADIUS authentication, see Bug #4154.");
+ }
+ }
+
if (!$input_errors) {
$server = array();
$server['refid'] = uniqid();
OpenPOWER on IntegriCloud