OpenSDE Packages Database (without history before r20070)
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

62 lines
2.8 KiB

  1. [COPY] --- SDE-COPYRIGHT-NOTE-BEGIN ---
  2. [COPY] This copyright note is auto-generated by ./scripts/Create-CopyPatch.
  3. [COPY]
  4. [COPY] Filename: package/.../strongswan/strongswan.desc
  5. [COPY] Copyright (C) 2006 - 2007 The OpenSDE Project
  6. [COPY] Copyright (C) 2004 - 2006 The T2 SDE Project
  7. [COPY]
  8. [COPY] More information can be found in the files COPYING and README.
  9. [COPY]
  10. [COPY] This program is free software; you can redistribute it and/or modify
  11. [COPY] it under the terms of the GNU General Public License as published by
  12. [COPY] the Free Software Foundation; version 2 of the License. A copy of the
  13. [COPY] GNU General Public License can be found in the file COPYING.
  14. [COPY] --- SDE-COPYRIGHT-NOTE-END ---
  15. [I] An IPsec implementation for Linux
  16. [T] strongSwan is an OpenSource IPsec implementation for the Linux operating
  17. [T] system.
  18. [T] It is based on the discontinued FreeS/WAN project and the X.509 patch which
  19. [T] we developped over the last three years. In order to have a stable IPsec
  20. [T] platform to base our future extensions of the X.509 capability on, we
  21. [T] decided to lauch the strongSwan project.
  22. [T]
  23. [T] The focus is on
  24. [T] - simplicity of configuration
  25. [T] - strong encryption and authentication methods
  26. [T] - powerful IPsec policies supporting large and complex VPN networks
  27. [T]
  28. [T] strongSwan features includes:
  29. [T] - both on Linux 2.4 (KLIPS) and Linux 2.6 (native IPsec) kernels.
  30. [T] - Fast connection startup and periodic update using ipsec starter
  31. [T] - Automatic insertion and deletion of IPsec policy based firewall rules
  32. [T] - strong 3DES, AES, Serpent, Twofish, or Blowfish encryption
  33. [T] - NAT-Traversal (RFC 3947) and support of virtual IPs and IKE Mode Config
  34. [T] - Dead Peer Detection (DPD, RFC 3706) takes care of dangling tunnels
  35. [T] - Authentication based on X.509 certificates or preshared keys
  36. [T] - Authentication based on X.509 certificates or preshared keys
  37. [T] - Generation of a default self-signed certificate during first strongSwan startup
  38. [T] - Retrieval and local caching of Certificate Revocation Lists via HTTP or LDAP
  39. [T] - Full support of the Online Certificate Status Protocol (OCSP, RCF 2560)
  40. [T] - CA management (OCSP and CRL URIs, default LDAP server)
  41. [T] - Powerful IPsec policies based on wildcards or intermediate CAs
  42. [T] - Group policies based on X.509 attribute certificates ( RFC 3281)
  43. [T] - Optional storage of RSA private keys and certificates on a smartcard
  44. [T] - Smartcard access via standardized PKCS #11 interface
  45. [T] - PKCS #11 proxy function offering RSA decryption services via whack
  46. [U] http://www.strongswan.org/
  47. [A] Andreas Steffen <andreas.steffen@zhwin.ch>
  48. [M] Christian Wiese <jeru@ixplanet.org>
  49. [C] extra/security
  50. [L] GPL
  51. [S] Stable
  52. [V] 2.8.3
  53. [P] X -----5---9 200.500
  54. [D] 4016879581 strongswan-2.8.3.tar.bz2 http://download.strongswan.org/