gentoo.LinuxHowtos.org
Details of net-vpn/strongswan:
Description: IPsec-based VPN solution, supporting IKEv1/IKEv2 and MOBIKEHomepage: https://www.strongswan.org/
available versions:
releases | alpha | amd64 | arm | hppa | ia64 | mips | ppc | ppc64 | ppc macos | s390 | sh | sparc | x86 | USE-Flags | dependencies | ebuild warnings |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
strongswan-5.9.14-r1 | - | ~ | ~ | - | - | - | ~ | ~ | - | - | - | - | ~ | +caps curl +constraints debug dhcp eap farp gcrypt +gmp ldap mysql networkmanager +non-root +openssl selinux sqlite systemd pam pkcs11 | show | IMPORTANT KERNEL NOTES: Please read carefully... [ < 2.6.29 ] Due to a missing kernel feature, you have to include all required IPv6 modules even if you just intend to run on IPv4 only. This has been fixed with kernels >= 2.6.29. [ < 2.6.33 ] Kernels prior to 2.6.33 include a non-standards compliant implementation for SHA-2 HMAC support in ESP and miss SHA384 and SHA512 HMAC support altogether. If you need any of those features, please use kernel >= 2.6.33. [ < 2.6.34 ] Support for the AES-GMAC authentification-only ESP cipher is only included in kernels >= 2.6.34. If you need it, please use kernel >= 2.6.34. The default permissions for /etc/ipsec.d/* have been tightened for security reasons. Your system installed directories have been updated accordingly. Please check if necessary. IMPORTANT: You previously had ${PN} installed without root privileges because it was implied by the 'caps' USE flag. This has been changed. If you want ${PN} with user privileges, you have to re-emerge it with the 'non-root' USE flag enabled. You have decided to run ${PN} with root privileges and built it without support for POSIX capability dropping. It is generally strongly suggested that you reconsider- especially if you intend to run ${PN} as server with a public ip address. You should re-emerge ${PN} with at least the 'caps' USE flag enabled. ${PN} has been installed without superuser privileges (USE=non-root). |
strongswan-5.9.14 | - | + | + | - | - | - | ~ | ~ | - | - | - | - | + | +caps curl +constraints debug dhcp eap farp gcrypt +gmp ldap mysql networkmanager +non-root +openssl selinux sqlite systemd pam pkcs11 | show | IMPORTANT KERNEL NOTES: Please read carefully... [ < 2.6.29 ] Due to a missing kernel feature, you have to include all required IPv6 modules even if you just intend to run on IPv4 only. This has been fixed with kernels >= 2.6.29. [ < 2.6.33 ] Kernels prior to 2.6.33 include a non-standards compliant implementation for SHA-2 HMAC support in ESP and miss SHA384 and SHA512 HMAC support altogether. If you need any of those features, please use kernel >= 2.6.33. [ < 2.6.34 ] Support for the AES-GMAC authentification-only ESP cipher is only included in kernels >= 2.6.34. If you need it, please use kernel >= 2.6.34. The default permissions for /etc/ipsec.d/* have been tightened for security reasons. Your system installed directories have been updated accordingly. Please check if necessary. IMPORTANT: You previously had ${PN} installed without root privileges because it was implied by the 'caps' USE flag. This has been changed. If you want ${PN} with user privileges, you have to re-emerge it with the 'non-root' USE flag enabled. You have decided to run ${PN} with root privileges and built it without support for POSIX capability dropping. It is generally strongly suggested that you reconsider- especially if you intend to run ${PN} as server with a public ip address. You should re-emerge ${PN} with at least the 'caps' USE flag enabled. ${PN} has been installed without superuser privileges (USE=non-root). |
strongswan-5.9.13 | - | + | + | - | - | - | ~ | ~ | - | - | - | - | + | +caps curl +constraints debug dhcp eap farp gcrypt +gmp ldap mysql networkmanager +non-root +openssl selinux sqlite systemd pam pkcs11 | show | IMPORTANT KERNEL NOTES: Please read carefully... [ < 2.6.29 ] Due to a missing kernel feature, you have to include all required IPv6 modules even if you just intend to run on IPv4 only. This has been fixed with kernels >= 2.6.29. [ < 2.6.33 ] Kernels prior to 2.6.33 include a non-standards compliant implementation for SHA-2 HMAC support in ESP and miss SHA384 and SHA512 HMAC support altogether. If you need any of those features, please use kernel >= 2.6.33. [ < 2.6.34 ] Support for the AES-GMAC authentification-only ESP cipher is only included in kernels >= 2.6.34. If you need it, please use kernel >= 2.6.34. The default permissions for /etc/ipsec.d/* have been tightened for security reasons. Your system installed directories have been updated accordingly. Please check if necessary. IMPORTANT: You previously had ${PN} installed without root privileges because it was implied by the 'caps' USE flag. This has been changed. If you want ${PN} with user privileges, you have to re-emerge it with the 'non-root' USE flag enabled. You have decided to run ${PN} with root privileges and built it without support for POSIX capability dropping. It is generally strongly suggested that you reconsider- especially if you intend to run ${PN} as server with a public ip address. You should re-emerge ${PN} with at least the 'caps' USE flag enabled. ${PN} has been installed without superuser privileges (USE=non-root). |
+ stable
~ testing
- not available
some ebuild warning depend on specific use-flags or architectures, all ebuild-warnings are shown.