Update to my previous report, I found the cause of this issue.

It might happen that a remote site sends an incorrectly encoded
tunnel password (or it might just be a wrong secret). As there is
no mechanism for verifying the correctness of the decoded block, and
typically the length field might have any value. The proposed
correction is following :

    substr($password, $len) = '' if ($len < length($password));

This is just a hack, but is there a need to do something more
sophisticated, as if the decoded password is wrong, we really
don't care about what we are returning and we just need to
prevent Radiator from crashing.

Christophe Wolfhugel :
> Just gotcha an error here :
> 
>     substr($password, $len) = '';
> 
> substr outside of string at /usr/local/lib/perl5/site_perl/5.005/Radius/Radius.pm 
>line 461.
> Modification of a read-only value attempted at 
>/usr/local/lib/perl5/site_perl/5.005/Radius/Radius.pm line 461.

===
Archive at http://www.starport.net/~radiator/
Announcements on [EMAIL PROTECTED]
To unsubscribe, email '[EMAIL PROTECTED]' with
'unsubscribe radiator' in the body of the message.

Reply via email to