Release Notes for RADIUS Server

Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized authentication, authorization, and accounting for wireless network access.

Version: 3.0.25-0515


(2023-04-25)

Compatibility & Installation

  1. RADIUS Server 3.0.25-0504 and above versions require DSM 7.2-60026 or above.

Version: 3.0.25-0452


(2022-08-10)

Fixed Issues

  1. Minor bug fixes.

Version: 3.0.25-0436


(2022-04-06)

What's New

  1. Added support for TLS/SSL compatibility settings.

Fixed Issues

  1. Fixed an issue where RADIUS Server became deactivated following an update when the shared key contained the character #.

Version: 3.0.25-0433


(2022-02-18)

Important Note

  1. The update is expected to be available in all regions within the next few days. The actual time of release may vary slightly depending on the region.

What's New

  1. Updated to FreeRADIUS 3.0.25.
  2. Added support for selecting the network interfaces to be monitored.

Fixed Issues

  1. Minor bug fixes.

Version: 3.0.15-0429


(2021-06-01)

Compatibility and Installation

  1. Updated to be compatible with DSM 7.0.

Version: 3.0.15-0277


(2020-04-28)

Fixed Issues

  1. Refined the alert message displayed when the ports of RADIUS Server conflicts with other applications.

Version: 3.0.15-0275


(2019-04-29)
  1. Aligned display date and time formats with DSM.
  2. Minor bug fixes.

Version: 3.0.15-0273


(2018-08-29)

Added support for login with the format of [username@domain name].

Version: 3.0.15-0272


(2018-05-23)

Thai user interface is now available.

Version: 3.0.15-0270


(2018-03-20)
  1. Updated to FreeRADIUS 3.0.15.
  2. Added support for cipher suite to enhance network connection security.
  3. Minor bug fixes.

Version: 2.2.10-0251


(2017-07-26)

Fixed multiple security vulnerabilities by upgrading FreeRADIUS to version 2.2.10 (CVE-2017-10978, CVE-2017-10979, CVE-2017-10980, CVE-2017-10981, CVE-2017-10982, CVE-2017-10983, CVE-2017-10984, CVE-2017-10985, CVE-2017-10986, CVE-2017-10987).

Version: 2.2.9-0250


(2017-04-25)
  1. Fixed an issue that user may fail to domain authentication.

Version: 2.2.9-0249


(2017-02-21)
  1. The new cache mechanism supports offline authentication when Active Directory is unavailable.
  2. In addition to selecting only one authentication source, you can now select local system accounts plus one additional source against which RADIUS Server authenticates users:
    - Local system accounts + AD domain accounts
    - Local system accounts + LDAP service accounts.
  3. Supports TLS 1.2 protocols to enhance the security on web browsers.
  4. Fixed an issue where RADIUS authentication does not work under certain conditions.

Version: 2.2.9-0247


(2017-01-11)
  1. Fixed an issue where RADIUS authentication does not work under certain conditions.

Version: 2.2.9-0219


(2016-08-22)
  1. Added support for TLS 1.2.
  2. Updated TLS cipher list to enhance security.
  3. Fixed an issue where a wrong password might be displayed in the log after login failed.
  4. Fixed an issue where new logs could not be generated after clearing old ones from the UI.
  5. Fixed an issue where log files might be lost after upgrading the package.
  6. Improved overall stability.

Version: 2.2.5-0214


(2016-06-06)
  1. Fixed an issue where RADIUS cannot authenticate against LDAP server.

Version: 2.2.5-0212


(2016-03-24)
  1. Upgraded to be compatible with DSM 6.0.

Version: 3.0.25-0515


(2023-04-25)

Compatibility & Installation

  1. RADIUS Server 3.0.25-0504 and above versions require DSM 7.2-60026 or above.

Version: 3.0.25-0138


(2022-11-02)

Fixed Issues

  1. Fixed an issue where the RADIUS Server could not be opened after SRM was updated from 1.3.1-9361 to 1.3.1-9346.

Version: 3.0.25-0452


(2022-08-10)

Fixed Issues

  1. Minor bug fixes.

Version: 3.0.25-0137


(2022-06-23)

Compatibility & Installation

  1. RADIUS Server 3.0.15-0137 requires SRM 1.3 or above.

What's New

  1. Updated to FreeRADIUS 3.0.15.

Fixed Issues 1. Minor bug fixes.

Version: 3.0.15-0130


(2022-05-11)

Important Note

  1. This is the initial release for RT6600ax.

Version: 3.0.25-0436


(2022-04-06)

What's New

  1. Added support for TLS/SSL compatibility settings.

Fixed Issues

  1. Fixed an issue where RADIUS Server became deactivated following an update when the shared key contained the character #.

Version: 3.0.25-0433


(2022-02-18)

Important Note

  1. The update is expected to be available in all regions within the next few days. The actual time of release may vary slightly depending on the region.

What's New

  1. Updated to FreeRADIUS 3.0.25.
  2. Added support for selecting the network interfaces to be monitored.

Fixed Issues

  1. Minor bug fixes.

Version: 3.0.15-0429


(2021-06-01)

Compatibility and Installation

  1. Updated to be compatible with DSM 7.0.

Version: 2.3.10-0119


(2020-06-18)

Compatibility & Installation

  1. Radius Server 2.3.10-0119 is only compatible with SRM 1.2.4 and above.

Version: 3.0.15-0277


(2020-04-28)

Fixed Issues

  1. Refined the alert message displayed when the ports of RADIUS Server conflicts with other applications.

Version: 3.0.15-0275


(2019-04-29)
  1. Aligned display date and time formats with DSM.
  2. Minor bug fixes.

Version: 2.3.10-0118


(2018-10-04)

Radius Server 2.3.10-0118 is compatible with SRM1.2 and above.

Version: 3.0.15-0273


(2018-08-29)

Added support for login with the format of [username@domain name].

Version: 3.0.15-0272


(2018-05-23)

Thai user interface is now available.

Version: 3.0.15-0270


(2018-03-20)
  1. Updated to FreeRADIUS 3.0.15.
  2. Added support for cipher suite to enhance network connection security.
  3. Minor bug fixes.

Version: 2.2.10-0251


(2017-07-26)

Fixed multiple security vulnerabilities by upgrading FreeRADIUS to version 2.2.10 (CVE-2017-10978, CVE-2017-10979, CVE-2017-10980, CVE-2017-10981, CVE-2017-10982, CVE-2017-10983, CVE-2017-10984, CVE-2017-10985, CVE-2017-10986, CVE-2017-10987).

Version: 2.3.10-0114


(2017-07-20)

Fixed multiple security vulnerabilities by upgrading FreeRADIUS to version 2.2.10 (CVE-2017-10978, CVE-2017-10979, CVE-2017-10980, CVE-2017-10981, CVE-2017-10982, CVE-2017-10983, CVE-2017-10984, CVE-2017-10985, CVE-2017-10986, CVE-2017-10987).

Version: 2.3.5-0113


(2017-04-27)
  1. Fixed an issue where client devices might fail to connect after RADIUS Server changes the port.

Version: 2.2.9-0250


(2017-04-25)
  1. Fixed an issue that user may fail to domain authentication.

Version: 2.2.9-0249


(2017-02-21)
  1. The new cache mechanism supports offline authentication when Active Directory is unavailable.
  2. In addition to selecting only one authentication source, you can now select local system accounts plus one additional source against which RADIUS Server authenticates users:
    - Local system accounts + AD domain accounts
    - Local system accounts + LDAP service accounts.
  3. Supports TLS 1.2 protocols to enhance the security on web browsers.
  4. Fixed an issue where RADIUS authentication does not work under certain conditions.

Version: 2.3.5-0112


(2017-01-12)
  1. Supports updating authentication configuration file of LDAP users by its encryption type.

  2. Minor bug fixes.

Version: 2.2.9-0247


(2017-01-11)
  1. Fixed an issue where RADIUS authentication does not work under certain conditions.

Version: 2.3.5-0110


(2016-12-21)
  1. Radius Server must be upgraded to the latest version to be compatible with SRM 1.1.1.

  2. Supports domain/LDAP users.

Version: 2.2.9-0219


(2016-08-22)
  1. Added support for TLS 1.2.
  2. Updated TLS cipher list to enhance security.
  3. Fixed an issue where a wrong password might be displayed in the log after login failed.
  4. Fixed an issue where new logs could not be generated after clearing old ones from the UI.
  5. Fixed an issue where log files might be lost after upgrading the package.
  6. Improved overall stability.

Version: 2.2.5-0104


(2016-06-07)
  1. Upgraded to be compatible with SRM 1.1.

Version: 2.2.5-0214


(2016-06-06)
  1. Fixed an issue where RADIUS cannot authenticate against LDAP server.

Version: 2.2.5-0102


(2016-04-28)
  1. Blocked LDAP accounts will not be authenticated.

Version: 2.2.5-0212


(2016-03-24)
  1. Upgraded to be compatible with DSM 6.0.

Version: 2.2.5-0101


(2016-02-18)
  1. Added the support for RT1900ac and DS216play.

Version: 2.2.5-0095


(2015-07-01)
  1. Fixed an issue where RADIUS Server could fail to enable after being disabled.

Version: 1.1-0094


(2015-05-21)
  1. Fixed an issue where the port number had to be over 1024.

Version: 1.1-0092


(2015-05-12)
  1. Minor bug fixes.

Version: 1.1-0079


(2014-12-25)
  1. Fixed a service stability issue caused by authentication packets containing invalid data.
  2. Minor bug fixes.

Version: 1.1-0077


(2014-11-26)
  1. Minor bugs fixed

Version: 1.1-0076


(2014-11-07)
  1. Upgraded to version 2.2.5.
  2. Fixed an issue that could occasionally cause authentication fail.

Version: 1.1-0072


(2014-09-24)
  1. Certified by Synology Trust Level.
  2. Minor bugs fixed.

Version: 1.1-0061


(2014-09-22)

Add DS415+ support

Version: 1.1-0060


(2014-04-29)
  1. Fixed a security issue allowing denial of service attacks when TLS-based EAP authentication was used. (CVE-2012-3547)

Version: 1.0-0029


(2014-04-17)
  1. Fixed a security issue allowing denial of service attacks when TLS-based EAP authentication was used. (CVE-2012-3547)

Version: 1.1-0059


(2014-03-10)
  1. Updated to be compatible with DSM 5.0.

Version: 1.0-0028


(2014-03-04)
  1. Fixed a security issue to prevent unauthorized access.

Version: 1.0-0027


(2013-10-08)
  1. Fixed an issue where AD domain users might not be able to log into DSM successfully if DSM version is 4.2 or previous versions.

Version: 1.0-0026


(2013-08-27)
  1. Minor Bug Fixes.

Version: 1.0-0016


(2013-04-18)
  1. Fixed an issue where users could not obtain authentication successfully by specifying domain\username during login.

Version: 1.0-0013


(2013-03-04)

The initial release.