Skip to content

Conversation

@nuclearcat
Copy link
Member

No description provided.

Copy link

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR implements security hardening for RADIUS DM/CoA (Dynamic Authorization Extension / Change of Authorization) by restricting which source IP addresses are allowed to send DM/CoA requests. This addresses a security concern where any host knowing the shared secret could send DM/CoA requests to disconnect or modify sessions.

Key changes:

  • Adds dae-allowed configuration option to specify allowed source IPs/CIDR ranges
  • Implements source IP validation in the DM/CoA packet handler
  • Provides deprecation warnings when DAE is configured without source restrictions

Reviewed changes

Copilot reviewed 6 out of 6 changed files in this pull request and generated 6 comments.

Show a summary per file
File Description
accel-pppd/radius/radius_p.h Adds function declaration for rad_dae_src_allowed and removes trailing blank line
accel-pppd/radius/radius.c Implements IP range parsing, storage, and validation logic for DAE source restrictions
accel-pppd/radius/dm_coa.c Adds source IP validation check before processing DM/CoA requests
accel-pppd/accel-ppp.conf.5 Documents the new dae-allowed configuration option
accel-pppd/accel-ppp.conf Adds commented example of dae-allowed configuration
README Adds note about using dae-allowed for DM/CoA deployments

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

…addresses

Signed-off-by: Denys Fedoryshchenko <denys.f@collabora.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant