Hi there, Again, we are now marching steadily to our next release. We decided to make this cycle a big one - we will be releasing another major release with intrusive changes across the board.
Here's a rundown of what PacketFence 2.2.0 looks like now, as you'll see it's been a BIG month and a half since 2.1.0: New Hardware Support - Motorola RF Switches (Wireless Controllers) - 3Com Switches 4200G, E4800G and E5500G now supports MAC Authentication and 802.1X New features - Easier integration and configuration of FreeRADIUS 2.x using our new packetfence-freeradius2 RPM - Apache configuration is automatically adjusted on startup based on system resources to avoid performance degradation on heavy workloads (#1204) - User-Agent violation support completely re-written. It is now easier than ever to block devices or old browsers from your network. (#769, #1192) - Administrators can now modify and preview remediation pages from the Web Admin - Kerberos Authentication on the Captive Portal (Thanks to Brad Lhotsky from NIH) Enhancements - Moved several configuration files from conf/templates/ into conf/ (#1166) - SSL certificate configuration for httpd is now in a separate file that is not overwritten by packages making it easier to maintain (#1207) - Process ID information in the logs for some daemons - Removed unused configuration parameters (#767) - Refactoring of the code base (#1058) - FAQ entry: Active directory integration in registration network - 3Com Super Stack 4500 now uses SNMP for MAC authorization (port-security) - DHCP fingerprints sharing now allows submitter to send computer name, user-agent and a contact email to help us identify the devices better (#983) - Updated Developer documentation regarding how to support new wireless hardware - Meru module now supports firmware version identification - Improvements in the logrotate script (#1198) - MAC address format xxxx-xxxx-xxxx supported in our FreeRADIUS' module - New DHCP fingerprint for Cisco SPA series IP Phone, Mikrotik, Freebox, AeroHive Hive AP, Ubuntu Server, Suse Linux Desktop 11, Synology NAS, Polycom Conference IP Phone and Generic Intel PXE - VoIP autodetection in Wired 802.1X and Wired MAC Authentication can now use CDP / LLDP if available (#1175) - Improvement to the samba configuration provided in the administration guide to fix uid mapping issues (#1205) Bug Fixes - Fixed an important problem with VoIP in Wired 802.1X and Wired MAC Authenication modes (#1202) - Fixed important Nortel support regressions (introduced in 2.1.0: #1183, #1195) - Wired 802.1X and MAC Authentication fixes in Network Devices Guide - Fixed an issue with pfcmd-initiated VLAN re-evaluation if you assign VLANs based on a client's connection-type (which is not the default) - Fixed broken person lookups if username is an email address (#1206) - Fixed DHCP fingerprint sharing upload form - Fixed Web Admin which referred to an inexistent Meru MC3000 module (it was renamed Meru::MC in 2.0.1) - Fixed an issue with the Meru module: If the controller sent SNMP traps to PacketFence a thread would crash. Hopefully this configuration is not required and is rarely done. Regression prevention tests have been added. - Fixed overly aggressive Web Administration password validation (#1209) - Minor fixes to the Administration Guide (#743) Translations - New German (de) translation (Thanks to Tino Matysiak of Meetyoo Conferencing) Anything you want us to look at before we release 2.2.0? Let us know! -- Olivier Bilodeau obilod...@inverse.ca :: +1.514.447.4918 *115 :: www.inverse.ca Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence (www.packetfence.org) ------------------------------------------------------------------------------ Benefiting from Server Virtualization: Beyond Initial Workload Consolidation -- Increasing the use of server virtualization is a top priority.Virtualization can reduce costs, simplify management, and improve application availability and disaster protection. Learn more about boosting the value of server virtualization. http://p.sf.net/sfu/vmware-sfdev2dev _______________________________________________ Packetfence-devel mailing list Packetfence-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-devel