| from small one page howto to huge articles all in one place 
 
 
 
 Last additions:
 
 May, 25th 2007:
 April, 26th 2007:
 Apr, 10th. 2007:
 
 | You are here: Portage 
 .  
 
 backDetails of net-vpn/strongswan:
Description: IPsec-based VPN solution, supporting IKEv1/IKEv2 and MOBIKE 
Homepage: https://www.strongswan.org/ available versions:| releases | alpha | amd64 | arm | hppa | ia64 | mips | ppc | ppc64 | ppc macos | s390 | sh | sparc | x86 | USE-Flags | dependencies | ebuild warnings | 
|---|
 | strongswan-6.0.2 | - | ~ | ~ | - | - | - | ~ | ~ | - | - | - | - | ~ | +caps curl
 +constraints
 debug
 dhcp
 eap
 farp
 gcrypt
 +gmp
 ldap
 mysql
 networkmanager
 +non-root
 +openssl
 selinux
 sqlite
 systemd
 pam
 pkcs11
 
 | show | showIMPORTANT KERNEL NOTES: Please read carefully...
[ < 2.6.29 ] Due to a missing kernel feature, you have to
include all required IPv6 modules even if you just intend
to run on IPv4 only.
This has been fixed with kernels >= 2.6.29.
[ < 2.6.33 ] Kernels prior to 2.6.33 include a non-standards
compliant implementation for SHA-2 HMAC support in ESP and
miss SHA384 and SHA512 HMAC support altogether.
If you need any of those features, please use kernel >= 2.6.33.
[ < 2.6.34 ] Support for the AES-GMAC authentification-only
ESP cipher is only included in kernels >= 2.6.34.
If you need it, please use kernel >= 2.6.34.
The default permissions for /etc/ipsec.d/* have been tightened for
security reasons. Your system installed directories have been
updated accordingly. Please check if necessary.
IMPORTANT: You previously had ${PN} installed without root
privileges because it was implied by the 'caps' USE flag.
This has been changed. If you want ${PN} with user privileges,
you have to re-emerge it with the 'non-root' USE flag enabled.
You have decided to run ${PN} with root privileges and built it
without support for POSIX capability dropping. It is generally
strongly suggested that you reconsider- especially if you intend
to run ${PN} as server with a public ip address.
You should re-emerge ${PN} with at least the 'caps' USE flag enabled.
${PN} has been installed without superuser privileges (USE=non-root).
 |  | strongswan-6.0.1-r2 | - | ~ | ~ | - | - | - | ~ | ~ | - | - | - | - | ~ | +caps curl
 +constraints
 debug
 dhcp
 eap
 farp
 gcrypt
 +gmp
 ldap
 mysql
 networkmanager
 +non-root
 +openssl
 selinux
 sqlite
 systemd
 pam
 pkcs11
 
 | show | showIMPORTANT KERNEL NOTES: Please read carefully...
[ < 2.6.29 ] Due to a missing kernel feature, you have to
include all required IPv6 modules even if you just intend
to run on IPv4 only.
This has been fixed with kernels >= 2.6.29.
[ < 2.6.33 ] Kernels prior to 2.6.33 include a non-standards
compliant implementation for SHA-2 HMAC support in ESP and
miss SHA384 and SHA512 HMAC support altogether.
If you need any of those features, please use kernel >= 2.6.33.
[ < 2.6.34 ] Support for the AES-GMAC authentification-only
ESP cipher is only included in kernels >= 2.6.34.
If you need it, please use kernel >= 2.6.34.
The default permissions for /etc/ipsec.d/* have been tightened for
security reasons. Your system installed directories have been
updated accordingly. Please check if necessary.
IMPORTANT: You previously had ${PN} installed without root
privileges because it was implied by the 'caps' USE flag.
This has been changed. If you want ${PN} with user privileges,
you have to re-emerge it with the 'non-root' USE flag enabled.
You have decided to run ${PN} with root privileges and built it
without support for POSIX capability dropping. It is generally
strongly suggested that you reconsider- especially if you intend
to run ${PN} as server with a public ip address.
You should re-emerge ${PN} with at least the 'caps' USE flag enabled.
${PN} has been installed without superuser privileges (USE=non-root).
 |  | strongswan-6.0.1-r1 | - | ~ | ~ | - | - | - | ~ | ~ | - | - | - | - | ~ | +caps curl
 +constraints
 debug
 dhcp
 eap
 farp
 gcrypt
 +gmp
 ldap
 mysql
 networkmanager
 +non-root
 +openssl
 selinux
 sqlite
 systemd
 pam
 pkcs11
 
 | show | showIMPORTANT KERNEL NOTES: Please read carefully...
[ < 2.6.29 ] Due to a missing kernel feature, you have to
include all required IPv6 modules even if you just intend
to run on IPv4 only.
This has been fixed with kernels >= 2.6.29.
[ < 2.6.33 ] Kernels prior to 2.6.33 include a non-standards
compliant implementation for SHA-2 HMAC support in ESP and
miss SHA384 and SHA512 HMAC support altogether.
If you need any of those features, please use kernel >= 2.6.33.
[ < 2.6.34 ] Support for the AES-GMAC authentification-only
ESP cipher is only included in kernels >= 2.6.34.
If you need it, please use kernel >= 2.6.34.
The default permissions for /etc/ipsec.d/* have been tightened for
security reasons. Your system installed directories have been
updated accordingly. Please check if necessary.
IMPORTANT: You previously had ${PN} installed without root
privileges because it was implied by the 'caps' USE flag.
This has been changed. If you want ${PN} with user privileges,
you have to re-emerge it with the 'non-root' USE flag enabled.
You have decided to run ${PN} with root privileges and built it
without support for POSIX capability dropping. It is generally
strongly suggested that you reconsider- especially if you intend
to run ${PN} as server with a public ip address.
You should re-emerge ${PN} with at least the 'caps' USE flag enabled.
${PN} has been installed without superuser privileges (USE=non-root).
 |  | strongswan-6.0.1 | - | + | ~ | - | - | - | ~ | ~ | - | - | - | - | + | +caps curl
 +constraints
 debug
 dhcp
 eap
 farp
 gcrypt
 +gmp
 ldap
 mysql
 networkmanager
 +non-root
 +openssl
 selinux
 sqlite
 systemd
 pam
 pkcs11
 
 | show | showIMPORTANT KERNEL NOTES: Please read carefully...
[ < 2.6.29 ] Due to a missing kernel feature, you have to
include all required IPv6 modules even if you just intend
to run on IPv4 only.
This has been fixed with kernels >= 2.6.29.
[ < 2.6.33 ] Kernels prior to 2.6.33 include a non-standards
compliant implementation for SHA-2 HMAC support in ESP and
miss SHA384 and SHA512 HMAC support altogether.
If you need any of those features, please use kernel >= 2.6.33.
[ < 2.6.34 ] Support for the AES-GMAC authentification-only
ESP cipher is only included in kernels >= 2.6.34.
If you need it, please use kernel >= 2.6.34.
The default permissions for /etc/ipsec.d/* have been tightened for
security reasons. Your system installed directories have been
updated accordingly. Please check if necessary.
IMPORTANT: You previously had ${PN} installed without root
privileges because it was implied by the 'caps' USE flag.
This has been changed. If you want ${PN} with user privileges,
you have to re-emerge it with the 'non-root' USE flag enabled.
You have decided to run ${PN} with root privileges and built it
without support for POSIX capability dropping. It is generally
strongly suggested that you reconsider- especially if you intend
to run ${PN} as server with a public ip address.
You should re-emerge ${PN} with at least the 'caps' USE flag enabled.
${PN} has been installed without superuser privileges (USE=non-root).
 |  | strongswan-5.9.14-r2 | - | + | ~ | - | - | - | ~ | ~ | - | - | - | - | + | +caps curl
 +constraints
 debug
 dhcp
 eap
 farp
 gcrypt
 +gmp
 ldap
 mysql
 networkmanager
 +non-root
 +openssl
 selinux
 sqlite
 systemd
 pam
 pkcs11
 
 | show | showIMPORTANT KERNEL NOTES: Please read carefully...
[ < 2.6.29 ] Due to a missing kernel feature, you have to
include all required IPv6 modules even if you just intend
to run on IPv4 only.
This has been fixed with kernels >= 2.6.29.
[ < 2.6.33 ] Kernels prior to 2.6.33 include a non-standards
compliant implementation for SHA-2 HMAC support in ESP and
miss SHA384 and SHA512 HMAC support altogether.
If you need any of those features, please use kernel >= 2.6.33.
[ < 2.6.34 ] Support for the AES-GMAC authentification-only
ESP cipher is only included in kernels >= 2.6.34.
If you need it, please use kernel >= 2.6.34.
The default permissions for /etc/ipsec.d/* have been tightened for
security reasons. Your system installed directories have been
updated accordingly. Please check if necessary.
IMPORTANT: You previously had ${PN} installed without root
privileges because it was implied by the 'caps' USE flag.
This has been changed. If you want ${PN} with user privileges,
you have to re-emerge it with the 'non-root' USE flag enabled.
You have decided to run ${PN} with root privileges and built it
without support for POSIX capability dropping. It is generally
strongly suggested that you reconsider- especially if you intend
to run ${PN} as server with a public ip address.
You should re-emerge ${PN} with at least the 'caps' USE flag enabled.
${PN} has been installed without superuser privileges (USE=non-root).
 |  | strongswan-5.9.14 | - | + | + | - | - | - | ~ | ~ | - | - | - | - | + | +caps curl
 +constraints
 debug
 dhcp
 eap
 farp
 gcrypt
 +gmp
 ldap
 mysql
 networkmanager
 +non-root
 +openssl
 selinux
 sqlite
 systemd
 pam
 pkcs11
 
 | show | showIMPORTANT KERNEL NOTES: Please read carefully...
[ < 2.6.29 ] Due to a missing kernel feature, you have to
include all required IPv6 modules even if you just intend
to run on IPv4 only.
This has been fixed with kernels >= 2.6.29.
[ < 2.6.33 ] Kernels prior to 2.6.33 include a non-standards
compliant implementation for SHA-2 HMAC support in ESP and
miss SHA384 and SHA512 HMAC support altogether.
If you need any of those features, please use kernel >= 2.6.33.
[ < 2.6.34 ] Support for the AES-GMAC authentification-only
ESP cipher is only included in kernels >= 2.6.34.
If you need it, please use kernel >= 2.6.34.
The default permissions for /etc/ipsec.d/* have been tightened for
security reasons. Your system installed directories have been
updated accordingly. Please check if necessary.
IMPORTANT: You previously had ${PN} installed without root
privileges because it was implied by the 'caps' USE flag.
This has been changed. If you want ${PN} with user privileges,
you have to re-emerge it with the 'non-root' USE flag enabled.
You have decided to run ${PN} with root privileges and built it
without support for POSIX capability dropping. It is generally
strongly suggested that you reconsider- especially if you intend
to run ${PN} as server with a public ip address.
You should re-emerge ${PN} with at least the 'caps' USE flag enabled.
${PN} has been installed without superuser privileges (USE=non-root).
 |  | strongswan-5.9.13 | - | + | + | - | - | - | ~ | ~ | - | - | - | - | + | +caps curl
 +constraints
 debug
 dhcp
 eap
 farp
 gcrypt
 +gmp
 ldap
 mysql
 networkmanager
 +non-root
 +openssl
 selinux
 sqlite
 systemd
 pam
 pkcs11
 
 | show | showIMPORTANT KERNEL NOTES: Please read carefully...
[ < 2.6.29 ] Due to a missing kernel feature, you have to
include all required IPv6 modules even if you just intend
to run on IPv4 only.
This has been fixed with kernels >= 2.6.29.
[ < 2.6.33 ] Kernels prior to 2.6.33 include a non-standards
compliant implementation for SHA-2 HMAC support in ESP and
miss SHA384 and SHA512 HMAC support altogether.
If you need any of those features, please use kernel >= 2.6.33.
[ < 2.6.34 ] Support for the AES-GMAC authentification-only
ESP cipher is only included in kernels >= 2.6.34.
If you need it, please use kernel >= 2.6.34.
The default permissions for /etc/ipsec.d/* have been tightened for
security reasons. Your system installed directories have been
updated accordingly. Please check if necessary.
IMPORTANT: You previously had ${PN} installed without root
privileges because it was implied by the 'caps' USE flag.
This has been changed. If you want ${PN} with user privileges,
you have to re-emerge it with the 'non-root' USE flag enabled.
You have decided to run ${PN} with root privileges and built it
without support for POSIX capability dropping. It is generally
strongly suggested that you reconsider- especially if you intend
to run ${PN} as server with a public ip address.
You should re-emerge ${PN} with at least the 'caps' USE flag enabled.
${PN} has been installed without superuser privileges (USE=non-root).
 | 
 Legend:+ stable~ testing- not available some ebuild warning depend on specific use-flags or architectures, all ebuild-warnings are shown. Tutorials:
 no tutorial found
 
 
 
 
 |