1 |
hwoarang 10/05/10 17:00:51 |
2 |
|
3 |
Modified: metadata.xml ChangeLog |
4 |
Added: strongswan-4.4.0.ebuild |
5 |
Log: |
6 |
Version bump thanks to Matthias Dahl |
7 |
(Portage version: 2.2_rc67/cvs/Linux x86_64) |
8 |
|
9 |
Revision Changes Path |
10 |
1.11 net-misc/strongswan/metadata.xml |
11 |
|
12 |
file : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/net-misc/strongswan/metadata.xml?rev=1.11&view=markup |
13 |
plain: http://sources.gentoo.org/viewvc.cgi/gentoo-x86/net-misc/strongswan/metadata.xml?rev=1.11&content-type=text/plain |
14 |
diff : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/net-misc/strongswan/metadata.xml?r1=1.10&r2=1.11 |
15 |
|
16 |
Index: metadata.xml |
17 |
=================================================================== |
18 |
RCS file: /var/cvsroot/gentoo-x86/net-misc/strongswan/metadata.xml,v |
19 |
retrieving revision 1.10 |
20 |
retrieving revision 1.11 |
21 |
diff -u -r1.10 -r1.11 |
22 |
--- metadata.xml 2 Apr 2010 15:39:54 -0000 1.10 |
23 |
+++ metadata.xml 10 May 2010 17:00:51 -0000 1.11 |
24 |
@@ -23,15 +23,19 @@ |
25 |
<flag name="cisco"> |
26 |
Enable support for the Cisco VPN client. |
27 |
</flag> |
28 |
+ <flag name="dhcp"> |
29 |
+ Enable server support for querying virtual IP addresses for clients |
30 |
+ from a DHCP server. (IKEv2 only) |
31 |
+ </flag> |
32 |
+ <flag name="farp"> |
33 |
+ Enable faking of ARP responses for virtual IP addresses assigned to |
34 |
+ clients. (IKEv2 only) |
35 |
+ </flag> |
36 |
<flag name="gcrypt"> |
37 |
Enable <pkg>dev-libs/libgcrypt</pkg> plugin which provides 3DES, AES, |
38 |
Blowfish, Camellia, CAST, DES, Serpent and Twofish ciphers along with |
39 |
- MD4, MD5 and SHA1/2 hash algorithms, RSA and a software random number |
40 |
- generator. |
41 |
- </flag> |
42 |
- <flag name="nat-transport"> |
43 |
- Enable potentially insecure NAT traversal for transport mode in IKEv1. |
44 |
- Only enable if you really need this. |
45 |
+ MD4, MD5 and SHA1/2 hash algorithms, RSA and DH groups 1,2,5,14-18 and |
46 |
+ 22-24(4.4+). Also includes a software random number generator. |
47 |
</flag> |
48 |
<flag name="ikev1"> |
49 |
Enable IKEv1 protocol (pluto daemon). |
50 |
@@ -39,17 +43,22 @@ |
51 |
<flag name="ikev2"> |
52 |
Enable IKEv2 protocol (charon daemon). |
53 |
</flag> |
54 |
- <flag name="openssl"> |
55 |
- Enable <pkg>dev-libs/openssl</pkg> plugin which is required for Elliptic |
56 |
- Curve Cryptography (Diffie-Hellman groups 19-21, 25, 26) and ECDSA. Also |
57 |
- provides 3DES, AES, Blowfish, Camellia, CAST, DES, IDEA and RC5 ciphers |
58 |
- along with MD2, MD4, MD5 and SHA1/2 hash algorithms and RSA. |
59 |
- <pkg>dev-libs/openssl</pkg> has to be compiled with USE="-bindist". |
60 |
+ <flag name="nat-transport"> |
61 |
+ Enable potentially insecure NAT traversal for transport mode in IKEv1. |
62 |
+ Only enable if you really need this. |
63 |
</flag> |
64 |
<flag name="non-root"> |
65 |
Force IKEv1/IKEv2 daemons to normal user privileges. This might impose |
66 |
some restrictions mainly to the IKEv1 daemon. Disable only if you really |
67 |
require superuser privileges. |
68 |
</flag> |
69 |
+ <flag name="openssl"> |
70 |
+ Enable <pkg>dev-libs/openssl</pkg> plugin which is required for Elliptic |
71 |
+ Curve Cryptography (DH groups 19-21,25,26) and ECDSA. Also provides 3DES, |
72 |
+ AES, Blowfish, Camellia, CAST, DES, IDEA and RC5 ciphers along with MD2, |
73 |
+ MD4, MD5 and SHA1/2 hash algorithms, RSA and DH groups 1,2,5,14-18 and |
74 |
+ 22-24(4.4+) |
75 |
+ <pkg>dev-libs/openssl</pkg> has to be compiled with USE="-bindist". |
76 |
+ </flag> |
77 |
</use> |
78 |
</pkgmetadata> |
79 |
|
80 |
|
81 |
|
82 |
1.83 net-misc/strongswan/ChangeLog |
83 |
|
84 |
file : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/net-misc/strongswan/ChangeLog?rev=1.83&view=markup |
85 |
plain: http://sources.gentoo.org/viewvc.cgi/gentoo-x86/net-misc/strongswan/ChangeLog?rev=1.83&content-type=text/plain |
86 |
diff : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/net-misc/strongswan/ChangeLog?r1=1.82&r2=1.83 |
87 |
|
88 |
Index: ChangeLog |
89 |
=================================================================== |
90 |
RCS file: /var/cvsroot/gentoo-x86/net-misc/strongswan/ChangeLog,v |
91 |
retrieving revision 1.82 |
92 |
retrieving revision 1.83 |
93 |
diff -u -r1.82 -r1.83 |
94 |
--- ChangeLog 2 Apr 2010 15:39:54 -0000 1.82 |
95 |
+++ ChangeLog 10 May 2010 17:00:51 -0000 1.83 |
96 |
@@ -1,6 +1,12 @@ |
97 |
# ChangeLog for net-misc/strongswan |
98 |
# Copyright 1999-2010 Gentoo Foundation; Distributed under the GPL v2 |
99 |
-# $Header: /var/cvsroot/gentoo-x86/net-misc/strongswan/ChangeLog,v 1.82 2010/04/02 15:39:54 yngwin Exp $ |
100 |
+# $Header: /var/cvsroot/gentoo-x86/net-misc/strongswan/ChangeLog,v 1.83 2010/05/10 17:00:51 hwoarang Exp $ |
101 |
+ |
102 |
+*strongswan-4.4.0 (10 May 2010) |
103 |
+ |
104 |
+ 10 May 2010; Markos Chandras <hwoarang@g.o> |
105 |
+ +strongswan-4.4.0.ebuild, metadata.xml: |
106 |
+ Version bump thanks to Matthias Dahl <ua_bugz_gentoo@×××××××××××.de> |
107 |
|
108 |
*strongswan-4.3.6-r2 (02 Apr 2010) |
109 |
|
110 |
|
111 |
|
112 |
|
113 |
1.1 net-misc/strongswan/strongswan-4.4.0.ebuild |
114 |
|
115 |
file : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/net-misc/strongswan/strongswan-4.4.0.ebuild?rev=1.1&view=markup |
116 |
plain: http://sources.gentoo.org/viewvc.cgi/gentoo-x86/net-misc/strongswan/strongswan-4.4.0.ebuild?rev=1.1&content-type=text/plain |
117 |
|
118 |
Index: strongswan-4.4.0.ebuild |
119 |
=================================================================== |
120 |
# Copyright 1999-2010 Gentoo Foundation |
121 |
# Distributed under the terms of the GNU General Public License v2 |
122 |
# $Header: /var/cvsroot/gentoo-x86/net-misc/strongswan/strongswan-4.4.0.ebuild,v 1.1 2010/05/10 17:00:51 hwoarang Exp $ |
123 |
|
124 |
EAPI=2 |
125 |
inherit eutils linux-info |
126 |
|
127 |
DESCRIPTION="IPsec-based VPN solution focused on security and ease of use, supporting IKEv1/IKEv2 and MOBIKE" |
128 |
HOMEPAGE="http://www.strongswan.org/" |
129 |
SRC_URI="http://download.strongswan.org/${P}.tar.bz2" |
130 |
|
131 |
LICENSE="GPL-2 RSA-MD5 RSA-PKCS11 DES" |
132 |
SLOT="0" |
133 |
KEYWORDS="~amd64 ~ppc ~sparc ~x86" |
134 |
IUSE="+caps cisco curl debug dhcp farp gcrypt ldap +ikev1 +ikev2 mysql nat-transport +non-root +openssl smartcard sqlite" |
135 |
|
136 |
COMMON_DEPEND="!net-misc/openswan |
137 |
>=dev-libs/gmp-4.1.5 |
138 |
gcrypt? ( dev-libs/libgcrypt ) |
139 |
caps? ( sys-libs/libcap ) |
140 |
curl? ( net-misc/curl ) |
141 |
ldap? ( net-nds/openldap ) |
142 |
smartcard? ( dev-libs/opensc ) |
143 |
openssl? ( >=dev-libs/openssl-0.9.8[-bindist] ) |
144 |
mysql? ( virtual/mysql ) |
145 |
sqlite? ( >=dev-db/sqlite-3.3.1 )" |
146 |
DEPEND="${COMMON_DEPEND} |
147 |
virtual/linux-sources |
148 |
sys-kernel/linux-headers" |
149 |
RDEPEND="${COMMON_DEPEND} |
150 |
virtual/logger |
151 |
sys-apps/iproute2" |
152 |
|
153 |
UGID="ipsec" |
154 |
|
155 |
pkg_setup() { |
156 |
linux-info_pkg_setup |
157 |
elog "Linux kernel version: ${KV_FULL}" |
158 |
|
159 |
if ! kernel_is -ge 2 6 16; then |
160 |
eerror |
161 |
eerror "This ebuild currently only supports ${PN} with the" |
162 |
eerror "native Linux 2.6 IPsec stack on kernels >= 2.6.16." |
163 |
eerror |
164 |
die "Please install a recent 2.6 kernel." |
165 |
fi |
166 |
|
167 |
if use nat-transport; then |
168 |
ewarn |
169 |
ewarn "You have enabled NAT Traversal for transport mode with the IKEv1" |
170 |
ewarn "protocol. Please double check if you really require this feature" |
171 |
ewarn "as it is potentially insecure and usually only required in certain" |
172 |
ewarn "situations when interoperating with Windows using L2TP/IPsec." |
173 |
ewarn |
174 |
fi |
175 |
|
176 |
if kernel_is -lt 2 6 34; then |
177 |
ewarn |
178 |
ewarn "IMPORTANT KERNEL NOTES: Please read carefully..." |
179 |
ewarn |
180 |
|
181 |
if kernel_is -lt 2 6 29; then |
182 |
ewarn "[ < 2.6.29 ] Due to a missing kernel feature, you have to" |
183 |
ewarn "include all required IPv6 modules even if you just intend" |
184 |
ewarn "to run on IPv4 only." |
185 |
ewarn |
186 |
ewarn "This has been fixed with kernels >= 2.6.29." |
187 |
ewarn |
188 |
fi |
189 |
|
190 |
if kernel_is -lt 2 6 33; then |
191 |
ewarn "[ < 2.6.33 ] Kernels prior to 2.6.33 include a non-standards" |
192 |
ewarn "compliant implementation for SHA-2 HMAC support in ESP and" |
193 |
ewarn "miss SHA384 and SHA512 HMAC support altogether." |
194 |
ewarn |
195 |
ewarn "If you need any of those features, please use kernel >= 2.6.33." |
196 |
ewarn |
197 |
fi |
198 |
|
199 |
if kernel_is -lt 2 6 34; then |
200 |
ewarn "[ < 2.6.34 ] Support for the AES-GMAC authentification-only" |
201 |
ewarn "ESP cipher is only included in kernels >= 2.6.34." |
202 |
ewarn |
203 |
ewarn "If you need it, please use kernel >= 2.6.34." |
204 |
ewarn |
205 |
fi |
206 |
fi |
207 |
|
208 |
if use non-root; then |
209 |
enewgroup ${UGID} |
210 |
enewuser ${UGID} -1 -1 -1 ${UGID} |
211 |
fi |
212 |
} |
213 |
|
214 |
src_configure() { |
215 |
local myconf="" |
216 |
|
217 |
if use non-root; then |
218 |
myconf="${myconf} --with-user=${UGID} --with-group=${UGID}" |
219 |
fi |
220 |
|
221 |
# If a user has already enabled db support, those plugins will |
222 |
# most likely be desired as well. Besides they don't impose new |
223 |
# dependencies and come at no cost (except for space). |
224 |
if use mysql || use sqlite; then |
225 |
myconf="${myconf} --enable-attr-sql --enable-sql" |
226 |
fi |
227 |
|
228 |
# strongSwan builds and installs static libs by default which are |
229 |
# useless to the user (and to strongSwan for that matter) because no |
230 |
# header files or alike get installed... so disabling them is safe. |
231 |
econf \ |
232 |
--disable-static \ |
233 |
$(use_with caps capabilities libcap) \ |
234 |
$(use_enable curl) \ |
235 |
$(use_enable ldap) \ |
236 |
$(use_enable smartcard) \ |
237 |
$(use_enable cisco cisco-quirks) \ |
238 |
$(use_enable debug leak-detective) \ |
239 |
$(use_enable nat-transport) \ |
240 |
$(use_enable openssl) \ |
241 |
$(use_enable gcrypt) \ |
242 |
$(use_enable mysql) \ |
243 |
$(use_enable sqlite) \ |
244 |
$(use_enable ikev1 pluto) \ |
245 |
$(use_enable ikev2 charon) \ |
246 |
$(use_enable dhcp) \ |
247 |
$(use_enable farp) \ |
248 |
${myconf} |
249 |
} |
250 |
|
251 |
src_install() { |
252 |
einstall || die "einstall failed" |
253 |
|
254 |
doinitd "${FILESDIR}"/ipsec |
255 |
|
256 |
local dir_ugid |
257 |
if use non-root; then |
258 |
fowners ${UGID}:${UGID} \ |
259 |
/etc/ipsec.conf \ |
260 |
/etc/ipsec.secrets \ |
261 |
/etc/strongswan.conf |
262 |
|
263 |
dir_ugid="${UGID}" |
264 |
else |
265 |
dir_ugid="root" |
266 |
fi |
267 |
|
268 |
diropts -m 0750 -o ${dir_ugid} -g ${dir_ugid} |
269 |
dodir /etc/ipsec.d \ |
270 |
/etc/ipsec.d/aacerts \ |
271 |
/etc/ipsec.d/acerts \ |
272 |
/etc/ipsec.d/cacerts \ |
273 |
/etc/ipsec.d/certs \ |
274 |
/etc/ipsec.d/crls \ |
275 |
/etc/ipsec.d/ocspcerts \ |
276 |
/etc/ipsec.d/private \ |
277 |
/etc/ipsec.d/reqs |
278 |
|
279 |
dodoc CREDITS NEWS README TODO || die |
280 |
|
281 |
# shared libs are used only internally and there are no static libs, |
282 |
# so it's safe to get rid of the .la files |
283 |
find "${D}" -name '*.la' -delete || die "Failed to remove .la files." |
284 |
} |
285 |
|
286 |
pkg_preinst() { |
287 |
has_version "<net-misc/strongswan-4.3.6-r1" |
288 |
upgrade_from_leq_4_3_6=$(( !$? )) |
289 |
|
290 |
has_version "<net-misc/strongswan-4.3.6-r1[-caps]" |
291 |
previous_4_3_6_with_caps=$(( !$? )) |
292 |
} |
293 |
|
294 |
pkg_postinst() { |
295 |
if ! use openssl && ! use gcrypt; then |
296 |
elog |
297 |
elog "${PN} has been compiled without both OpenSSL and libgcrypt support." |
298 |
elog "Please note that this might effect availability and speed of some" |
299 |
elog "cryptographic features. You are advised to enable the OpenSSL plugin." |
300 |
elif ! use openssl; then |
301 |
elog |
302 |
elog "${PN} has been compiled without the OpenSSL plugin. This might effect" |
303 |
elog "availability and speed of some cryptographic features. There will be" |
304 |
elog "no support for Elliptic Curve Cryptography (Diffie-Hellman groups 19-21," |
305 |
elog "25, 26) and ECDSA." |
306 |
fi |
307 |
|
308 |
if [[ $upgrade_from_leq_4_3_6 == 1 ]]; then |
309 |
chmod 0750 "${ROOT}"/etc/ipsec.d \ |
310 |
"${ROOT}"/etc/ipsec.d/aacerts \ |
311 |
"${ROOT}"/etc/ipsec.d/acerts \ |
312 |
"${ROOT}"/etc/ipsec.d/cacerts \ |
313 |
"${ROOT}"/etc/ipsec.d/certs \ |
314 |
"${ROOT}"/etc/ipsec.d/crls \ |
315 |
"${ROOT}"/etc/ipsec.d/ocspcerts \ |
316 |
"${ROOT}"/etc/ipsec.d/private \ |
317 |
"${ROOT}"/etc/ipsec.d/reqs |
318 |
|
319 |
ewarn |
320 |
ewarn "The default permissions for /etc/ipsec.d/* have been tightened for" |
321 |
ewarn "security reasons. Your system installed directories have been" |
322 |
ewarn "updated accordingly. Please check if necessary." |
323 |
ewarn |
324 |
|
325 |
if [[ $previous_4_3_6_with_caps == 1 ]]; then |
326 |
if ! use non-root; then |
327 |
ewarn |
328 |
ewarn "IMPORTANT: You previously had ${PN} installed without root" |
329 |
ewarn "privileges because it was implied by the 'caps' USE flag." |
330 |
ewarn "This has been changed. If you want ${PN} with user privileges," |
331 |
ewarn "you have to re-emerge it with the 'non-root' USE flag enabled." |
332 |
ewarn |
333 |
fi |
334 |
fi |
335 |
fi |
336 |
if ! use caps && ! use non-root; then |
337 |
ewarn |
338 |
ewarn "You have decided to run ${PN} with root privileges and built it" |
339 |
ewarn "without support for POSIX capability dropping. It is generally" |
340 |
ewarn "strongly suggested that you reconsider- especially if you intend" |
341 |
ewarn "to run ${PN} as server with a public ip address." |
342 |
ewarn |
343 |
ewarn "You should re-emerge ${PN} with at least the 'caps' USE flag enabled." |
344 |
ewarn |
345 |
fi |
346 |
if use non-root; then |
347 |
elog |
348 |
elog "${PN} has been installed without superuser privileges (USE=non-root)." |
349 |
elog "This imposes several limitations mainly to the IKEv1 daemon 'pluto'" |
350 |
elog "but also a few to the IKEv2 daemon 'charon'." |
351 |
elog |
352 |
elog "Please carefully read: http://wiki.strongswan.org/wiki/nonRoot" |
353 |
elog |
354 |
elog "pluto uses a helper script by default to insert/remove routing and" |
355 |
elog "policy rules upon connection start/stop which requires superuser" |
356 |
elog "privileges. charon in contrast does this internally and can do so" |
357 |
elog "even with reduced (user) privileges." |
358 |
elog |
359 |
elog "Thus if you require IKEv1 (pluto) or need to specify a custom updown" |
360 |
elog "script to pluto or charon which requires superuser privileges, you" |
361 |
elog "can work around this limitation by using sudo to grant the" |
362 |
elog "user \"ipsec\" the appropriate rights." |
363 |
elog "For example (the default case):" |
364 |
elog "/etc/sudoers:" |
365 |
elog " Defaults:ipsec always_set_home,!env_reset" |
366 |
elog " ipsec ALL=(ALL) NOPASSWD: /usr/sbin/ipsec" |
367 |
elog "Under the specific connection block in /etc/ipsec.conf:" |
368 |
elog " leftupdown=\"sudo ipsec _updown\"" |
369 |
elog |
370 |
fi |
371 |
elog |
372 |
elog "Make sure you have _all_ required kernel modules available including" |
373 |
elog "the appropriate cryptographic algorithms. A list is available at:" |
374 |
elog " http://wiki.strongswan.org/projects/strongswan/wiki/KernelModules" |
375 |
elog |
376 |
elog "The up-to-date manual is available online at:" |
377 |
elog " http://wiki.strongswan.org/" |
378 |
elog |
379 |
} |