|Tags||php perl administrator network security wireless web-based monitoring access-control|
7.0.227 May 2017 10:45 minor bugfix: With ip4log cleanup job when rotation was enabled. Adjusted default ip4log retention to match what was in PacketFence version 7 and below. Make REJECT role have precedence over bypass role and VLAN. Make VLAN filters have precedence over bypass role and VLAN. Useless sessions being created in web-auth in the dispatcher. Load liblasso during runtime in order to prevent a segfault of Apache on Debian 8.8. Syntax error in the guest_sponsor_preregistration email template. Previewing email templates in the admin.
7.0.120 May 2017 03:15 minor bugfix: Incorrect locationlog entry when performing RADIUS CoA. Twilio: "To" phone number is being stripped of any "+" sign. Radiusd load-balancer failing to start in cluster with eduroam. Authentication sources ordering for portal modules when using the administration interface. Innobackup tmp directory when used with Galera cluster. Width of auth sources conditions fields. Admin login when only allowed to see auditing section. Locationlog entries for VOIP devices when no voice VLAN is defined. Authentication sources cache in connection profile. Loose matching of host in haproxy dispatcher. Lost MySQL handle errors in pfconfig. Handle sources activation host in haproxy dispatcher. Incorrect handling of unregistration year. Incorrect LDAP error when user not found. File cloning in connection profile. Display of roles in admin GUI. Unregistration date handling when it is over 2038. Logging errors for undefined values. Queues blocking when forking. Pagination in GUI node search. OS type display in status page. URL for connection profile preview.
7.0.019 Apr 2017 03:15 major feature: New Features Added provisioning support for SentinelOne. Added MariaDB Galera cluster support. All services are now handled by systemd. IPv6 network stack in PacketFence. New Golang-based HTTP dispatcher. New Golang-based pfsso service to handle the firewall SSO requests. Revamped the Web administration GUI. Enhancements. SNMP traps are now handled in pfqueue. Added the ability to grant CLI write access for Extreme Networks switches. Added a distributed cache for the accounting information to safely disable the SQL accounting records in active/active clusters. Reduce the number of ipset calls when adding ports for Active Directory. pfmon tasks has their own configuration file. new command pfcmd pfmon - for running pfmon task via pfcmd. CentOS repositories (packetfence and packetfence-devel) packages are now signed. Added way to unregister devices that were inactive for a certain amount of time (maintenance.node_unreg_window). Added a new last_seen column to nodes to track their last activity (Authentication, HTTP portal, DHCP). Delete nodes based on the new last_seen column instead of looking at the last DHCP packet. iplog: Floored lease time for "tolerance". Can now restart the switchport where a node is connected from the administration interface. Added interface description to location entries. New pffilter filtering engine. Ability to manage multiple "active" endpoints behind a single switchport. pfdhcplistner now runs as a master-worker style service. Added a winbindd wrapper for the PacketFence managed winbindd processes. Added a caddy middleware for rate limiting the concurrent connections. Updated the Ruckus SmartZone module to use the most recent webauth technique available. Added vsys support for PaloAlto firewall SSO modules. Portal Profile has been renamed to Connection Profile. Move common flows / process of DHCP processors in base class. Removed PacketFence-Authorization-Status attribute from the RADIUS replies to pre
6.5.124 Feb 2017 06:25 minor bugfix: Incorrect node cleanup job handling. Multiple firewall SSO not working when cached updates were enabled. Removed usage of pf_memoize which could create a race condition when adding a node. Incorrect locationlog informations because of a null role. Syntax error in generated Suricata rules. The Portal preview through the admin. Extracting the SSID from the switch HP::Controller_MSM710.
6.5.031 Jan 2017 03:15 major feature: New Features Twilio support as authentication source. New Redis driven cache for NTLM (Active Directory) 802.1X authentications. New Firewall SSO for WatchGuard. Syslog based SSO support for Palo Alto firewalls. Ubiquiti EdgeSwitch support. New syslog receiver to update the iplog from Infoblox and ISC DHCP syslog lines. Can now specify specific ports for passthroughs. Enhancements. Added a RADIUS filter scope for VoIP devices. Ability to customize the OU in which the machine account will be created. Added new routes service to manage static routes. Added an authentication source that prompts for the password of a predefined user. Added Aruba webauth documentation. Eduroam authentication sources can now match rule. Maintenance patching can now use git in order to ignore files that shouldn't be patched via the maintenance script. Can now print multiple guest passes per page without the AUP in the administration interface. Allow to whitelist unregistered devices from violations. Changed password.valid_from default value to "0000-00-00 00:00:00" so its value is valid across the whole application. Added Percona xtrabackup restore procedure documentation. Added a way to track if files backups and database backup succeeded. pfmon will not register and start a process for disabled task. Added a way to define two different ports for disconnect and CoA. Configurator database step now takes care of 'mysql_secure_installation'. Improved clustering guide for MariaDB and systemd. Added a portal module action to skip other actions. Reduced p0f CPU usage. Updated collectd in order to have new graphs. Do not "match" a rule if "requested" action if not configured in it. Improved monit checks accuracy. Rate limited the DHCP listener processes to prevent specific devices from performing a denial of service on the DHCP listening processes. Improved performance of radacct database table cleanup. Email templates can now be specified on a per-portal basis.
6.4.017 Nov 2016 07:45 major feature: New Features Added Mojo Networks WiFi equipment support. Made Web admin reports more interactive. Added new Eduroam authentication source type. Allow to create different portal templates based on the browser locale. Enhancements. Improved IP log performance. Added fault tolerance on RADIUS monitoring scripts. Improved the database and maintenance backup script. Added password caching support for Novell eDirectory. Improved caching of LDAP person data. Improved clustering documentation. Added RADIUS command line interface support on port 1812. Removed useless htaccess file search for each HTTP request. Turned off HTTP KeepAlive to avoid connections holding onto Apache processes. Added Cisco MSE documentation. Ability to query 'iplog_archive' table for detailed IP/MAC history. Now also display the status for sub services from the Web interface. Requests made with username 'dummy' will not be recorded in the RADIUS audit log anymore. More lightweight p0f processing. Remove useless logging in pfdns.log. Added an activation timeout on sponsor source. Improved captive portal logging. Allow the OAuth landing page template to be customizable. Use RESTful call for RADIUS accounting instead of Perl. Optimized getting node information from the database. New action generateconfig for pfcmd service command. Added memory limitation for httpd.portal processes. Added predefined search in RADUIS audit log and DHCP Option 82 log. Improved display of fingerprinting informations in the nodes search. Allow captiveportal::Form::Authentication to be customize. Default config overlay for switches.conf, profiles.conf, pfqueue.conf and violations.conf. Optimized queries for finding open violations. floating devices in active/active clusters. and improved syntax of `pfcmd ipmachistory`. wrong bandwidth calculation on RADIUS accounting. empty Calling-Station-Id in RADIUS accounting. Make sure connection caches are cleared after forking. Added a wor
6.3.006 Oct 2016 03:25 major feature: New Features Added EAP-FAST support. MySQL is now supported as the Fingerbank database backend. Integration with Cisco MSE adds maps, location based portals and notifications. Added the ability to locate a device based on DHCP Option 82. Added support for Meraki wired switches. New SQL reporting allows creation of personalized reports. Enhancements. Added support for Brocade CLI RADIUS authentication. Added support for OpenWrt Chaos Calmer 15.05 with hostapd. Added configuration conflict handling for active/active clusters. Fingerbank configuration is now cached. Removed the pf/var directory from the backups to make them smaller. Fingerbank is now configurable from the initial PacketFence configurator. Added support for Xirrus switches CLI RADIUS authentication. Pinterest and Instagram are now supported as OAuth authentication sources. Support for Suricata md5 extraction over SMTP protocol. Added sample monit helper scripts under pf/addons. Added support for custom AUP template per portal module. Several improvements to Fingerbank to make it more user-friendly. Added option to export nodes and users within the web administration interface. Third parties can now extend what can be matched in profile filters. PacketFence created interfaces will now be excluded from Red Hat's NetworkManager. Added the ability to restrict the modification of node roles by a user. Added timeout to captive portal to prevent long running requests. Do not start pfqueue processes for pfdetect if it's not running.
6.2.110 Jul 2016 03:15 minor bugfix: Enhancements Forbid trace mode in Apache default configuration. Improved validation of portal modules configuration. Debian 7 failing to start httpd.admin. Missing Metadefender configuration section. Missing parameter for fetchVlanForNode in pfsetvlan. Incorrect NAS-Port use for RADIUS CoA on Cisco WLCs. Incorrect domain handling in Active/Active.
6.2.006 Jul 2016 06:05 major bugfix: Added missing index to radacct table. Searching nodes for "all" devices. Invalid destination URL parsing. Handling of provisioner return code in violations. Binding of IP addresses in Active/Active mode. Cluster status page with pid files. Missing person lookup when using 802.1x autoregistration. Permission on logrotation. Invalid i18n of MAC address in node location view. L2 cache write error of new switches namespaces.
6.1.126 Jun 2016 06:45 minor bugfix: Missing schema version insert in database upgrade script. Too short CA cert validity in raddb/certs/passwords.mk.
6.1.022 Jun 2016 17:25 major feature: New Features Added support for CoovaChilli capable equipment. Added page to visualize the status of the services on all cluster members. Added support for RADIUS Change of Authorization on Meraki. Added configurable actions to be executed at the end of a portal module. Automatic registration of devices is now configurable from the GUI on a per profile basis. Added switch and switch group in violation trigger. Added switch group as a portal profile filter. Moved RADIUS audit log in its own module. Saved searches support for the RADIUS audit log module. The portal now supports RADIUS Challenge Response authentication. Enhancements. Added module to redirect to internal or external pages within the portal modules configuration. Added configuration checkup for cluster.conf. Added ability to limit the number of logins when creating a local account. Added choice of sending either RADIUS CoA or Disconnect when deauthenticating a device. Admin interface is now available on all members of the cluster without the need of being the master. FreeRADIUS now logs to a separate file per process (authentication, accounting, load-balancer). Improved performance of the online/offline search. profile filter saving incorrectly on Debian Jessie. Numerous improvements to i18n in the portal and administration GUI. e-mail registration not working when activating access through a proxy or firewall. Authentication log (auth_log) will now be cleaned automatically via pfmon. incorrect graphite aggregation of metrics when data should not be averaged.
6.0.304 Jun 2016 03:15 minor bugfix: (Id is denoted with #id). Example in vlan filters showing incorrect operand for user_name. The display of the aup when printing a user. Email_instructions blocking email registration. FreeRADIUS dynamic clients hanging the server when the database fails to respond. Violation_add when applying one through bulk actions. Sessions remembering failed authentication sources. to listen to DHCPREQUEST in registration network when in cluster mode.
6.0.227 May 2016 03:15 minor bugfix: (Id is denoted with #id). pfdns to prevent pid file deletion when a child dies. PacketFence will now handle the case where a source in the session is not available anymore. missing PID when using device registration. Fingerbank update will no longer sync all servers anymore. VoIP detection flags default will now be undef in admin interface. Suricata renamed to suricata_event in violations.conf.example. The captive portal will now handle User Agent strings properly. PacketFence will now delete the user (not device) session after activating sponsor. incorrect MAC address formatting in the reporting section of the GUI. "reuse dot1x credentials" in captive portal. incorrect SNMP traps handling. incorrect MAC address handling in radius accounting. Added a check to database backup script for mariadb. unregistration date handling when using email registration.
6.0.129 Apr 2016 06:25 minor bugfix: (Id is denoted with #id). Added back the option to set the logo in a portal profile. Blackhole and Null authentication portal modules. Added missing username field in Debian maintenance crontab. Web authentication web form release in captive portal. Validate configuration identifiers so they don't contain invalid characters. Incorrect samba handling of " h" in server name. Registration ACL computing for Cisco WLC and 2960 in web authentication. Adjust pfdetect startup order to allow Snort / Suricata to start. Pfsetvlan compilation error. Violations internationalization. Incorrect rogue dhcp detection.
6.0.020 Apr 2016 22:25 major feature: New Features Fully redesigned frontend and backend of the captive portal. 'Parking' state for unregistered devices (where it will have a longer DHCP lease time and will only access a lightweight portal). CentOS 7 and Debian 8 (Jessie) support. RADIUS support for Avaya switches. pfdns filter engine (added a way to return custom answers in pfdns). Redirect URL are defined in Role by Web Auth URL switch configuration (Cisco). Added support for Captive-Portal DHCP attribute (RFC7710). Added Google Project Fi as a SMS carrier for SMS signup option. FreeRADIUS 3 support with Redis integration. Enhancements. Added ability to expire users. Automatically update all the Fingerbank databases (Redis, p0f, SQLite3). Do not allow the TRACE method to be used in any of the web processes. Can now limit the maximum unregdate an administrator can set to a person. Added option to disable the accounting recording in the SQL tables. Added caching of the latest accounting request for use in access reevaluation. Reduced the number of webservices calls during RADIUS accounting. Added configuration for Apache 2.4 with Template Toolkit. Added a timer for each RADIUS request (radius audit log). Assign the voice role to VoIP devices when PacketFence detects them. Renamed VLAN to Role in admin gui violation. Unregister a node from a secure connection to an unsecured one is now managed by the VLAN filters. Location history of a node show the role instead of the VLAN id. Documentation to configure Cisco switches with Identity Networking Policy. Trigger violation on source or destination IP address if they are in the trapping range networks. Performance improvement for VoIP detection. Added new RADIUS filter return option (random number in a range). Reinstated iplog (iplog_history and iplog_archive) rotation/cleanup jobs performed by pfmon. (Id is denoted with #id). Compute unregistration for secure connections. unescape value in LDAP search. Apache 2.4 core d
5.7.018 Feb 2016 06:05 major bugfix: New Features DNS based enforcement as a new enforcement mode for routed networks. Captive portal authentication now supports SAML authentication. It is now possible to search for nodes that are online based on RADIUS accounting. Integration with Suricata MD5 extraction module to scan against OPSWAT MetaScan online scanner. Enhancements. Support for floating devices on HP Procurve switches. RADIUS CoA support added to Brocade switches. The NULL authorization source can now be combined with other sources. Added possibility to trigger Firewall Single Sign-On when an endpoint changes status. The username on a captive portal will no longer be stripped unless required otherwise. Improved UDP reflector documentation. Improved vendor specific attributes in radius filters. Now able to specify on which LDAP attribute we should match for SponsorEmail. Now able to strip a username in LDAP source even if not present in RADIUS request. (Id is denoted with #id). incorrect provisioning that ignored broadcast state of provisioned SSID. Present a login page without login form when a blackhole source is used on the portal profile. incorrect provisioning templates that required entering a password twice. ambiguous SQL accounting stored procedure that could return duplicate results. incorrect IPv6 DHCP processing in pfdhcplistener.
5.6.126 Jan 2016 03:25 minor bugfix: Enhancements Pfcmd will now validate the violation configuration in checkup. Pfdns cached entries will now expire after 24 hours. (Id is denoted with #id). Duplicate open entries in locationlog for voip devices. Avoid circular dependency when loading pf::Authentication::Source::StripeSource (1160). Incorrect Cisco switch ACL number. Removed use of pf::class modules which caused compilation errors. an incorrect reload of the cached configuration (1157).
5.6.014 Jan 2016 03:25 major feature: New Features New RADIUS auditing report allows troubleshooting from the GUI. The email authorization source now allows to set roles based on the email used to register. New switch groups now allows to assign settings to multiple switches at once. DHCP filters now allow arbitrary rules to perform actions based on DHCP fingerprinting. Cisco switches login access can now be authenticated through PacketFence. The filter engine configuration can now be edited through the admin GUI. Enhancements. New dedicated search feature for violations in the nodes panel. New pfcmd pfqueue command allows managing the queue from the command line. New option to specify the authentication source to use depending on the RADIUS realm. Upgrade Config::IniFiles to allow faster loading of configuration files. Performance improvements to the filtering engine by avoiding unnecessary database lookups. New columns bypass_vlan and bypass_role are allowed to be import for nodes. Service start/stop order can now be configured through the admin GUI. Pagination can now be defined by the user in the admin GUI search results. The pfdns service now forks to process multiple requests in parallel. Added configurable timeout for send/receive operations on the OMAPI socket. The authorization process will now test if the role changed before reevaluating access. New option to add date based VLAN filter condition (is before date, is after date). pfconfig backend can now be cleared via pfcmd. Improved RADIUS accounting handling for better performance. (Id is denoted with #id). Remove old entries in ipset session. Always reevaluate the access if the order come from the admin gui. Portal profiles templates are now properly synced between members of a cluster. Process requests properly when running a pfdhcplistener on an interface that has networks with and without dhcpd activated. Violation trigger from web admin will now override grace period. queue task counters out of sync when
5.5.205 Dec 2015 03:15 minor bugfix: Enhancements pf::CHI::compute_with_undef now supports cache options. Use the fingerbank cache instead of caching its result globally. Update dependency to 2.1 for fingerbank. (Id is denoted with #id). Completed renaming of trap to reevaluate_access in violations.conf.example. deauthentication source IP not detected properly when no vip is assigned on the management interface. Use proper API client when triggering a violation within pf::fingerbank.
5.5.023 Nov 2015 02:25 major feature: New Features New device detection through TCP fingerprinting. New DHCPv6 fingerprinting through Fingerbank. New RADIUS filter engine to return custom attributes based on rules. Security Onion integration. Paypal payment is now supported in the captive portal. Stripe payment and subscriptions are now supported in the captive portal. Enhancements. New pfqueue service based on Redis to manage asynchronous tasks. Memcached has been replaced by Redis for all caching. pfdetect can now be configured through the administration interface. Added ability to detect hostname changes using the information in the DHCP packets. Added the ability to create 'not equal' conditions in LDAP sources. DoS mitigation on the captive portal through mod_evasive. Load balancing in an active/active process now uses a dedicated process. Authentication and accounting are now in two different RADIUS processes. Reworked violation triggers creation in the administration interface so it's more user friendly. Added the ability to create combined violation triggers which allow to trigger a violation based off multiple attributes of a node. Suricata alerts can now trigger a violation based on the alert category or description instead of only the ID of the alert. Added ability to e-mail device owner as a violation action. The PacketFence syslog parser (pfdetect) has been reworked to allow multiple logs to be parsed concurently. New ntlm_auth wrapper will log authentication latency to StatsD automatically. Handle Microsoft Windows based captive-portal detection mecanisms. Manage pfdhcplistener status with keepalived and run pfdhcplistener on all cluster's members. New portal profile filter (sub connection type). Added switch IP and description in the available columns in the node list view. Use SNMP to determine the ifindex based on the Nas-Port-Id. Improved metrics now track SQL queries, LDAP queries, and more granular metrics in RADIUS AAA. Added support for Nessus 6 scan
5.4.002 Oct 2015 03:15 major feature: New Features PacketFence now supports SCEP integration with Microsoft's Network Enrollment Device Service during the device on-boarding process when using EAP-TLS. Improved integration with social media networks (email address lookups from Github and Facebook sources, kickbox.io support, etc.). External HTTP authentication sources support which allows an HTTP-based external API to act as an authentication source to PacketFence. Introduced a 'packetfence_local' PKI provider to allow the use of locally generated TLS certificates to be used in a PKI provider / provisionner flow. New filtering engine for the portal profiles allowing complex rules to determine which portal will be displayed. Added the ability to define custom LDAP attributes in the configuration. Add the ability to create "administrative" or "authentication" purposes rules in authentication sources. Added support for Cisco SG300 switches. Enhancements. RADIUS Diffie-Hellman key size has been increased to 2048 bits to prevent attacks such as Logjam. HAProxy TLS configuration has been restricted to modern ciphers. Improved error message in the profile management page. Allow precise error messages from the authentication source when providing invalid credentials on the captive portal. Aruba WiFi controllers now support wired RADIUS MAC authentication and 802.1X. Added Kickbox.io authentication source which can allow a new Null type source with email validation. Now redirecting to HTTP for devices that do not support self-signed certificates on the captive portal if needed. httpd.portal now serves static content directly (without going through Catalyst engine). Introduction of a new configuration parameter (captive_portal.wispr_redirection) to allow enabling/disabling captive-portal WISPr redirection capabilities. File transfers through the webservices are now atomic to prevent corruption. New web API call to release all violations for a device. Added better error message propagation d
5.3.126 Jul 2015 03:15 minor feature: This is strictly a bug fix release. It corrects the following: Bug Fixes. Fixed radiusd dying due to OOM caused by pf::statsd calling on pf::config. Fixed incorrect whisper retention policy affecting metrics such as server load and memory use. Fixed SMS and email registration case where using a different device to register may set an incorrect role. Added delete session reason to status page logout. Fixed incorrect HTML escaping in LDAP and AD authentication sources.
5.3.022 Jul 2015 03:15 feature: New Features Support for Single Sign-On integration with the iboss platform. Support for web authentication for NATed clients. Support for MAC Authentication and 802.1x for Alcatel-Lucent switches. Support for the IBM StackSwitch G8052 switch. Enhancements. New Powershell scripts to allow unregistering nodes for disabled accounts on Active Directory. Force a JSON response if the Accept header is set to 'application/json'. Fingerbank processing in pfdhcplistener is now asyncronous using the webservices. Integration of pfconfig commands in bin/pfcmd. Added web form registration to Ruckus Controllers. Improved database maintenance script to prevent prolonged locking of tables. Active/Active mode will now send gratuitous ARPs to update routers when changing master node. Bug Fixes. Fixed multiple XSS vulnerabilities in the administration GUI. Fixed incorrect RADIUS realm detection when using windows computer authentication. Fixed an issue with pfdns returning the wrong IP when using active/active mode. Fixed an issue on Debian and Ubuntu where the GUI could not change some field values. Fixed incorrect graphite document root on Ubuntu. Fixed SMS bug where the list of carriers could be accidentally deleted.
5.2.019 Jun 2015 03:15 feature: New Features Introducing support for the PacketFence PKI application to manage certificates and authenticate RADIUS using EAP-TLS. Twitter OAuth is now supported as an authentication source. New 'portal' interface type to spawn a captive-portal instance on selected interface. Traffic shaping support for Inline mode managed by an ipset session per devices role. Support for OpenWrt 14.07 with hostapd. Enhancements. Specific vhost for httpd.portal diagnostics. Added option to disable logging of sensitive information when failing to execute a command through pf_run. Support for Meraki APs using web authentication on the cloud controller. Passwords are now obfuscated in the Switch configuration. Introduced new 'ports.httpd_portal_modstatus' configuration parameter to limit modstatus to a single virtual host. Bug Fixes. Allow the usage of an external monitoring database when using an Active/Active cluster. Validate that a provisioner is not used before deleting it through the administration interface. Stopped logging database password on schema import failure. Fixed incorrect error message when an external portal authenticated device hits the unknown state.
5.1.027 May 2015 11:45 feature: New activation_domain feature allowing to expose a different domain than PacketFence's name in email templates. Added Windows Management Instrumentation (WMI) as a scan engine. Multiple scan engine definitions based on the OS type and role. Scan definition based on portal profiles. New external command action in violation. New API methods for adding, viewing or modifying a person. New performance dashboard based on Graphite allows tracking of core performance metrics such as number and latency of RADIUS requests, number of httpd processes and authorization latency. Define range of network switches (CIDR) in switch configuration. Module for Cisco Aironet 1600. Added ability to join an Active Directory domain directly from the administration interface. Added the ability to join multiple Active Directory domains for EAP-PEAP authentication. Enhancements: Verify if the database schema matches the current version of PacketFence. Removed the unnecessary "Upstream" listing from the "Combination" menu item of Fingerbank section. Ability to search in Fingerbank "Local" "Devices" listing. Allow rules to match on both source and action. pfsetvlan and snmptrapd are now stopped by default as most users no longer require them. Improve the end process redirection on the captive portal. Refactor mandatory fields to be dynamic and update the person table with them. Moved raddb/sites-enabled/packetfence and raddb/sites-enabled/packetfence-tunnel in conf/radiusd. pfcmd can now validate that certificates used by Apache and FreeRADIUS are still valid. Added new SMS carrier for Switzerland. Ability to fix Fingerbank files permissions from pfcmd fixpermissions. Bug Fixes: Fixes tables displaying bugs in Fingerbank menu items. Fixed search values not being preserved in some cases. Fixed switch access list field turning into an object reference. Fixed bad redirection to the portal at the end of the registration process. Better handling of Fingerbank errors.
5.0.203 May 2015 06:05 minor bugfix: This release is a bug fix only. No new features were introduced. Added availables options (submit unknowns and update database) to the Fingerbank Settings page. PacketFence will now leave clients.conf.inc empty if cluster mode is disabled. PacketFence will longer unregister a device in pending state if the device is hitting the portal more than once while in "pending" state. Fixed broken violation release process. Fixed multiple lines returning from pfconfig. Fixed undefined variables in portal template files. Fixed provisioners OS detection with Fingerbank.
5.0.123 Apr 2015 16:45 feature documentation: . This release is a bug fix only. No new features were introduced. Enhancements. ++++++++++++. A number of strings have seen their translations improved. The Debian and Ubuntu documentation has been split and made clearer. Detailed which features may not work in active/active cluster mode in the documentation. Bug Fixes. +++++++++. Added missing CHI File driver. Delete left over Config::Fingerprint module in Debian and Ubuntu. Fixed pfmon not starting when running a standalone PF server. Fixed broken OS reporting. Added missing dependency on perl-SOAP-Lite for packetfence-remote-snort-sensor. Updating iplog without a lease time now reset end_time to default (0000-00-00 00:00:00) to avoid "closing" a valid entry. fixed pfcmd watch emailing functionality. dhcpd will now properly obey the "disabled" configuration.
5.0.016 Apr 2015 17:45 major feature: New active/active clustering mode. This allows HTTP and RADIUS load balancing and improves availability. Fingerbank integration for accurate devices fingerprinting. It is now easier than ever to share devices fingerprinting. Built-in support for StatsD. This allows fine grained performance monitoring and can be used to create a dashboard using Graphite. Local database passwords are now encrypted using bcrypt by default on all new installations. The old plaintext mode is still supported for legacy installations and to allow migration to the new mode. Devices can now have a "bypass role" that allows the administrator to manage them completely manually. This allows for exceptions to the authorization rules. Support for ISC DHCP OMAPI queries. This allows PacketFence to dynamically query a dhcpd instance to establish IP to MAC mappings. Enhancements: Completely rewritten pfcmd command. pfcmd is now much easier to extend and will allow us to integrate more features in the near future. Rewritten IP/MAC mapping (iplog). Iplog should now never overflow. New admin role action USERS_CREATE_MULTIPLE for finer grained control of the admin GUI. An administrative account can now be prevented from creating more than one other account. PacketFence will no longer start MySQL when starting. PacketFence will accept to start even if there are no internal networks. Added a new listening port to pfdhcplistener to listen for replicated traffic. Added a 'default' default user in replacement of the admin one. Adds support for HP ProCurve 2920 switches. Iptables will now allow access to the captive portal from the production network by default. Major documentation rewrite and improvements. Bug Fixes: Fixed violations applying portal redirection when using web authentication on a Cisco WLC. Registration and Isolation VLAN ids can now be any string allowed by the RFCs. Devices can no longer remain in "pending" state indefinitely.
4.7.007 Mar 2015 18:25 feature: New Features: The admin GUI is now customizable. New category filter on portal profile allows to select a portal based on existing role of a device. New PacketFence-config service allows effortless scaling to thousands of switches and reduces memory use. Enhancements: Nodes are now searchable by status. Removed SSLv3 and legacy ciper suites support from default httpd configuration to prevent POODLE exploit and FREAK attack. Added an option to display Bypass VLAN of a node in the Admin GUI. Added nested groups support for Active Directory. It is now possible to check if a device has already authenticated as member of an Active-Directory domain prior to user authentication. Improved portal language detection. Devices will now avoid autocorrect / uppercasing the login field in the captive portal. Now supports roaming without SNMP on Aerohive APs. Bug Fixes: Fixed broken default behaviour when receiving an SNMP trap. Fixed email confirmation template for sponsor. Fixed email subject encoding. Fixes allowing a non-sponsored user to verify a sponsored email address. Fixed invalid floating device creation where the MAC address was not normalized. Fixed the date range search in node advanced search.
4.6.120 Feb 2015 03:25 feature: New Features Enhancements Bug Fixes Fix dynamic unregdate breaking when handling the infinite unregdate '0000-00-00' Fixed issue where the same password can be generated multiple times Assigned LC_CTYPE to C during postinstall script on debian to prevent i18n issues during installation. Fixed dynamic_unreg_dated called from the wrong place Fix searching for switches in the admin gui
4.6.005 Feb 2015 03:15 feature security cleanup: New Features Added support for MAC authentication on the AeroHIVE Branch Router 100 Added support for MAC authentication floating devices on Juniper EX series, and on the Cisco Catalyst series Added a hybrid 802.1x + web authentication mode for Cisco Catalyst 2960 Added a web notification when network access is granted Added the ability to tag functions that are allowed to be exposed through the web API Added WiFi autoconfiguration for Windows through packetfence-windows-agent Added a "Chained" authentication source where a user must first login in order to register by SMS, Email or SponsorEmail Added call to the web API from the VLAN filters Added a way to retrieve user information after the first registration Added the ability to filter profiles by connection type Profiles can be matched by all or any of its filters Can optionally cache the results of LDAP rule matching for a user New portal profile parameter to set a retry limit for SMS-based activation The information available from an OAuth source are now added to the person when registering Allow limiting the user login attempts Added Check Point firewall integration for Single Sign-On Enhancements Added httpd.aaa service as a new API service for the exclusive use of RADIUS More precisely define which DHCP message types we are listening for Removed dead code referring to 'external' interface type which was no longer supported Added VLAN filter in getNodeInfoForAutoReg and update/create person even if the device has been autoreg Refactored the VLAN filter code to reduce code duplication Added IMG path configuration parameter in admin Added the ability to restrict the roles, access levels and access durations for admin users based on their role/access level Reduced deadlocks caused by the cleaning of the iplog table Reduced deadlocks caused by the cleaning of the locationlog table Reorganized the portal profile configuration page Added checkup on Apache filters and VLAN filters Created a single LDAP connection
4.5.111 Nov 2014 02:45 minor bugfix: Added compliance enforcement to OPSWAT GEARS provisioner. Make Cisco web authentication sessions use less memory. Internationalized the provisioners templates. Fix node pagination when sorting. Fix provisioners that were not enforced on external authentication sources. Fix IBM and Symantec provisioners configuration form.
4.5.024 Oct 2014 10:25 major feature: Added provisioning support for Symantec SEPM, MobileIron and OPSWAT. Added Barracuda firewall support for single sign-on. pfmon can now run tasks on different intervals. Added a way to reevaluate the access of a node from the admin interface. Added a "Blackhole" authentication source. Added a new violation to enforce provisioning of agents. Violation can now be delayed. Added portal profile filter based on switch-port couple. Cache the ipset rule update to avoid unnecessary calls to ipset. Dynamically load violations and nodes for a user for display in admin gui. Dynamically load violations for a node for display in admin gui. Ensure only one pfmon is running at a time.
ManageYou can also help out here by:
← Update project
or flagging this entry for moderator attention.