Go to file
Ana Guerrero e93469575a Accepting request 1163507 from GNOME:Factory
- Add missing supplements(bsc#1220391):
  + NMA subpackage: Main package and gnome-control-center (forwarded request 1163472 from JonathanKang)

OBS-URL: https://build.opensuse.org/request/show/1163507
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/NetworkManager-strongswan?expand=0&rev=27
2024-04-02 14:39:56 +00:00
.gitattributes Accepting request 53752 from home:BinLi:branches:GNOME:Factory 2010-12-06 13:44:14 +00:00
.gitignore Accepting request 53752 from home:BinLi:branches:GNOME:Factory 2010-12-06 13:44:14 +00:00
NetworkManager-strongswan-1.6.0.tar.bz2 Accepting request 1112165 from home:KaratekHD:branches:GNOME:Factory 2023-09-20 01:57:54 +00:00
NetworkManager-strongswan-1.6.0.tar.bz2.sig Accepting request 1112165 from home:KaratekHD:branches:GNOME:Factory 2023-09-20 01:57:54 +00:00
NetworkManager-strongswan.changes Accepting request 1163472 from home:JonathanKang:branches:GNOME:Factory 2024-03-29 10:51:33 +00:00
NetworkManager-strongswan.keyring Accepting request 1112165 from home:KaratekHD:branches:GNOME:Factory 2023-09-20 01:57:54 +00:00
NetworkManager-strongswan.spec Accepting request 1163472 from home:JonathanKang:branches:GNOME:Factory 2024-03-29 10:51:33 +00:00
README Accepting request 53752 from home:BinLi:branches:GNOME:Factory 2010-12-06 13:44:14 +00:00

NetworkManager allows configuration and control of VPN daemons through
a plugin interface.
We provide such a plugin for NetworkManager to configure road warrior
clients for the most common setups.

NetworkManager uses DBUS to communicate with a plugin loaded by the
IKEv2 charon daemon.

The plugin uses a certificate for gateway authentication and supports
EAP and RSA authentication for client authentication.
PSK is not supported, as it is considered insecure if the secrets are
not strong enough.

You can use any password based EAP method supported by strongSwan
(MD5/GTC/MSCHAPv2) or private key authentication. Private keys are
either stored in a file or accessed through your ready-to-use ssh-agent.
You'll need a certificate matching that key.
Starting with strongSwan 4.4.2 / NetworkManager-strongswan 1.2.0,
private keys and certificates on a smartcard can be used.

If you configure the gateway certificate directly on the clients, there
are no requirements to the certificate. If you deploy CA certificates
(supported in 4.3.1+), the gateway certificate will need a subjectAltName
including the Hostname of the gateway (the same you enter in the clients
configuration). Starting with version 4.3.5, you can also use preinstalled
root CA certificates of your distribution, using the --with-nm-ca-dir
configure option. Just don't specify any gateway/CA certificate to use
preinstalled root certificates.
CA certificates on a smartcard are automatically used.