gentoo.LinuxHowtos.org

Details of net-vpn/strongswan:

Description: IPsec-based VPN solution, supporting IKEv1/IKEv2 and MOBIKE
Homepage: https://www.strongswan.org/

available versions:

releasesalphaamd64armhppaia64mipsppcppc64ppc macoss390shsparcx86USE-Flagsdependenciesebuild warnings
strongswan-5.9.14-r1 -~~---~~----~+caps
curl
+constraints
debug
dhcp
eap
farp
gcrypt
+gmp
ldap
mysql
networkmanager
+non-root
+openssl
selinux
sqlite
systemd
pam
pkcs11
show
IMPORTANT KERNEL NOTES: Please read carefully...
[ < 2.6.29 ] Due to a missing kernel feature, you have to
include all required IPv6 modules even if you just intend
to run on IPv4 only.
This has been fixed with kernels >= 2.6.29.
[ < 2.6.33 ] Kernels prior to 2.6.33 include a non-standards
compliant implementation for SHA-2 HMAC support in ESP and
miss SHA384 and SHA512 HMAC support altogether.
If you need any of those features, please use kernel >= 2.6.33.
[ < 2.6.34 ] Support for the AES-GMAC authentification-only
ESP cipher is only included in kernels >= 2.6.34.
If you need it, please use kernel >= 2.6.34.

The default permissions for /etc/ipsec.d/* have been tightened for
security reasons. Your system installed directories have been
updated accordingly. Please check if necessary.
IMPORTANT: You previously had ${PN} installed without root
privileges because it was implied by the 'caps' USE flag.
This has been changed. If you want ${PN} with user privileges,
you have to re-emerge it with the 'non-root' USE flag enabled.
You have decided to run ${PN} with root privileges and built it
without support for POSIX capability dropping. It is generally
strongly suggested that you reconsider- especially if you intend
to run ${PN} as server with a public ip address.
You should re-emerge ${PN} with at least the 'caps' USE flag enabled.
${PN} has been installed without superuser privileges (USE=non-root).
show
strongswan-5.9.14 -++---~~----++caps
curl
+constraints
debug
dhcp
eap
farp
gcrypt
+gmp
ldap
mysql
networkmanager
+non-root
+openssl
selinux
sqlite
systemd
pam
pkcs11
show
IMPORTANT KERNEL NOTES: Please read carefully...
[ < 2.6.29 ] Due to a missing kernel feature, you have to
include all required IPv6 modules even if you just intend
to run on IPv4 only.
This has been fixed with kernels >= 2.6.29.
[ < 2.6.33 ] Kernels prior to 2.6.33 include a non-standards
compliant implementation for SHA-2 HMAC support in ESP and
miss SHA384 and SHA512 HMAC support altogether.
If you need any of those features, please use kernel >= 2.6.33.
[ < 2.6.34 ] Support for the AES-GMAC authentification-only
ESP cipher is only included in kernels >= 2.6.34.
If you need it, please use kernel >= 2.6.34.

The default permissions for /etc/ipsec.d/* have been tightened for
security reasons. Your system installed directories have been
updated accordingly. Please check if necessary.
IMPORTANT: You previously had ${PN} installed without root
privileges because it was implied by the 'caps' USE flag.
This has been changed. If you want ${PN} with user privileges,
you have to re-emerge it with the 'non-root' USE flag enabled.
You have decided to run ${PN} with root privileges and built it
without support for POSIX capability dropping. It is generally
strongly suggested that you reconsider- especially if you intend
to run ${PN} as server with a public ip address.
You should re-emerge ${PN} with at least the 'caps' USE flag enabled.
${PN} has been installed without superuser privileges (USE=non-root).
show
strongswan-5.9.13 -++---~~----++caps
curl
+constraints
debug
dhcp
eap
farp
gcrypt
+gmp
ldap
mysql
networkmanager
+non-root
+openssl
selinux
sqlite
systemd
pam
pkcs11
show
IMPORTANT KERNEL NOTES: Please read carefully...
[ < 2.6.29 ] Due to a missing kernel feature, you have to
include all required IPv6 modules even if you just intend
to run on IPv4 only.
This has been fixed with kernels >= 2.6.29.
[ < 2.6.33 ] Kernels prior to 2.6.33 include a non-standards
compliant implementation for SHA-2 HMAC support in ESP and
miss SHA384 and SHA512 HMAC support altogether.
If you need any of those features, please use kernel >= 2.6.33.
[ < 2.6.34 ] Support for the AES-GMAC authentification-only
ESP cipher is only included in kernels >= 2.6.34.
If you need it, please use kernel >= 2.6.34.

The default permissions for /etc/ipsec.d/* have been tightened for
security reasons. Your system installed directories have been
updated accordingly. Please check if necessary.
IMPORTANT: You previously had ${PN} installed without root
privileges because it was implied by the 'caps' USE flag.
This has been changed. If you want ${PN} with user privileges,
you have to re-emerge it with the 'non-root' USE flag enabled.
You have decided to run ${PN} with root privileges and built it
without support for POSIX capability dropping. It is generally
strongly suggested that you reconsider- especially if you intend
to run ${PN} as server with a public ip address.
You should re-emerge ${PN} with at least the 'caps' USE flag enabled.
${PN} has been installed without superuser privileges (USE=non-root).
show
Legend:
+ stable
~ testing
- not available
some ebuild warning depend on specific use-flags or architectures, all ebuild-warnings are shown.

Tutorials:
no tutorial found


back