from small one page howto to huge articles all in one place
Last additions: May, 25th 2007: April, 26th 2007: Apr, 10th. 2007: |
. You are here: Portage
Details of net-vpn/strongswan:
Description: IPsec-based VPN solution, supporting IKEv1/IKEv2 and MOBIKE
Homepage: https://www.strongswan.org/
available versions:
releases | alpha | amd64 | arm | hppa | ia64 | mips | ppc | ppc64 | ppc macos | s390 | sh | sparc | x86 | USE-Flags | dependencies | ebuild warnings |
strongswan-5.9.14-r1 |
- | ~ | ~ | - | - | - | ~ | ~ | - | - | - | - | ~ | +caps curl +constraints debug dhcp eap farp gcrypt +gmp ldap mysql networkmanager +non-root +openssl selinux sqlite systemd pam pkcs11
| show | IMPORTANT KERNEL NOTES: Please read carefully...
[ < 2.6.29 ] Due to a missing kernel feature, you have to
include all required IPv6 modules even if you just intend
to run on IPv4 only.
This has been fixed with kernels >= 2.6.29.
[ < 2.6.33 ] Kernels prior to 2.6.33 include a non-standards
compliant implementation for SHA-2 HMAC support in ESP and
miss SHA384 and SHA512 HMAC support altogether.
If you need any of those features, please use kernel >= 2.6.33.
[ < 2.6.34 ] Support for the AES-GMAC authentification-only
ESP cipher is only included in kernels >= 2.6.34.
If you need it, please use kernel >= 2.6.34.
The default permissions for /etc/ipsec.d/* have been tightened for
security reasons. Your system installed directories have been
updated accordingly. Please check if necessary.
IMPORTANT: You previously had ${PN} installed without root
privileges because it was implied by the 'caps' USE flag.
This has been changed. If you want ${PN} with user privileges,
you have to re-emerge it with the 'non-root' USE flag enabled.
You have decided to run ${PN} with root privileges and built it
without support for POSIX capability dropping. It is generally
strongly suggested that you reconsider- especially if you intend
to run ${PN} as server with a public ip address.
You should re-emerge ${PN} with at least the 'caps' USE flag enabled.
${PN} has been installed without superuser privileges (USE=non-root).
show | strongswan-5.9.14 |
- | + | + | - | - | - | ~ | ~ | - | - | - | - | + | +caps curl +constraints debug dhcp eap farp gcrypt +gmp ldap mysql networkmanager +non-root +openssl selinux sqlite systemd pam pkcs11
| show | IMPORTANT KERNEL NOTES: Please read carefully...
[ < 2.6.29 ] Due to a missing kernel feature, you have to
include all required IPv6 modules even if you just intend
to run on IPv4 only.
This has been fixed with kernels >= 2.6.29.
[ < 2.6.33 ] Kernels prior to 2.6.33 include a non-standards
compliant implementation for SHA-2 HMAC support in ESP and
miss SHA384 and SHA512 HMAC support altogether.
If you need any of those features, please use kernel >= 2.6.33.
[ < 2.6.34 ] Support for the AES-GMAC authentification-only
ESP cipher is only included in kernels >= 2.6.34.
If you need it, please use kernel >= 2.6.34.
The default permissions for /etc/ipsec.d/* have been tightened for
security reasons. Your system installed directories have been
updated accordingly. Please check if necessary.
IMPORTANT: You previously had ${PN} installed without root
privileges because it was implied by the 'caps' USE flag.
This has been changed. If you want ${PN} with user privileges,
you have to re-emerge it with the 'non-root' USE flag enabled.
You have decided to run ${PN} with root privileges and built it
without support for POSIX capability dropping. It is generally
strongly suggested that you reconsider- especially if you intend
to run ${PN} as server with a public ip address.
You should re-emerge ${PN} with at least the 'caps' USE flag enabled.
${PN} has been installed without superuser privileges (USE=non-root).
show | strongswan-5.9.13 |
- | + | + | - | - | - | ~ | ~ | - | - | - | - | + | +caps curl +constraints debug dhcp eap farp gcrypt +gmp ldap mysql networkmanager +non-root +openssl selinux sqlite systemd pam pkcs11
| show | IMPORTANT KERNEL NOTES: Please read carefully...
[ < 2.6.29 ] Due to a missing kernel feature, you have to
include all required IPv6 modules even if you just intend
to run on IPv4 only.
This has been fixed with kernels >= 2.6.29.
[ < 2.6.33 ] Kernels prior to 2.6.33 include a non-standards
compliant implementation for SHA-2 HMAC support in ESP and
miss SHA384 and SHA512 HMAC support altogether.
If you need any of those features, please use kernel >= 2.6.33.
[ < 2.6.34 ] Support for the AES-GMAC authentification-only
ESP cipher is only included in kernels >= 2.6.34.
If you need it, please use kernel >= 2.6.34.
The default permissions for /etc/ipsec.d/* have been tightened for
security reasons. Your system installed directories have been
updated accordingly. Please check if necessary.
IMPORTANT: You previously had ${PN} installed without root
privileges because it was implied by the 'caps' USE flag.
This has been changed. If you want ${PN} with user privileges,
you have to re-emerge it with the 'non-root' USE flag enabled.
You have decided to run ${PN} with root privileges and built it
without support for POSIX capability dropping. It is generally
strongly suggested that you reconsider- especially if you intend
to run ${PN} as server with a public ip address.
You should re-emerge ${PN} with at least the 'caps' USE flag enabled.
${PN} has been installed without superuser privileges (USE=non-root).
show |
Legend: + stable~ testing- not availablesome ebuild warning depend on specific use-flags or architectures, all ebuild-warnings are shown. Known bugs:
bug ID | component | assigned to | status | description | last change |
---|
424373 | Applications | patrick | UNCONFIRMED | net-misc/strongswan-5.0.0 - Outdated description about (non-)root privileges | 2012-07-03 14:39:13 |
back
|