Warning: file_exists(): open_basedir restriction in effect. File(/srv/http/vhosts/aur.archlinux.org/public/web/locale//en/LC_MESSAGES/aurweb.mo) is not within the allowed path(s): (/srv/http/vhosts/aur-dev.archlinux.org/:/etc/aurweb/) in /srv/http/vhosts/aur-dev.archlinux.org/public/web/lib/streams.php on line 90
AUR (en) - strongswan

Notice: Undefined variable: name in /srv/http/vhosts/aur-dev.archlinux.org/public/web/lib/pkgfuncs.inc.php on line 248

Package Details: strongswan 5.5.1-5

Git Clone URL: https://aur-dev.archlinux.org/strongswan.git (read-only)
Package Base: strongswan
Description: open source IPsec implementation
Upstream URL: http://www.strongswan.org
Keywords: IPsec strongswan
Licenses: GPL
Conflicts: openswan
Submitter: jayray
Maintainer: Thermi
Last Packager: Thermi
Votes: 99
Popularity: 2.646251
First Submitted: 2007-04-22 16:41
Last Updated: 2017-02-04 18:22

Latest Comments

« First ‹ Previous ... 3 4 5 6 7 8 9 10 11 12 Next › Last »

PattPatel commented on 2014-05-11 10:00

I'm sorry, it was just me. I was coming from a previous version and something got broken. I had a mistaken version of libstrongswan.so that pacman couldn't delete. Fully removing it and cleaning my system did the trick.

dkorzhevin commented on 2014-05-11 09:50

Hi,

This is latest official vanilla stable without any patches and modifications. Can you, please try to use gdb/strace and provide more info?

PattPatel commented on 2014-05-11 09:44

Hi
I'm getting Segmentation Fault when I run 'ipsec pki'

AlgoJerViA commented on 2014-04-26 09:24

Hi
I had this issue with segmentation faults; http://wiki.strongswan.org/issues/452
This patch http://wiki.strongswan.org/projects/strongswan/repository/revisions/079e6c2b04faa8cd09478662a255cc87acfaede1/diff/src/pki/command.h solved the old problem they had by increasing MAX_COMMANDS up to 11 instead of 10. However I had to up this to 12 to get it to work.

Thermi commented on 2014-04-17 10:18

I adopted and upgraded the package. It is no longer susceptible to CVE-2014-2338.

AlD commented on 2014-04-15 15:04

This package is vulnerable to CVE-2014-2338 at the time of writing /!\

dkorzhevin commented on 2013-11-15 13:10

Updated to 5.1.1
Changelog included

dkorzhevin commented on 2013-08-03 07:57

Update to 5.1.0

dkorzhevin commented on 2013-06-24 16:56

Package updated, to comply with:

https://www.archlinux.org/news/binaries-move-to-usrbin-requiring-update-intervention/

Btw, new 5.1.0 Major Release will be released in about a week.

dkorzhevin commented on 2013-06-20 13:25

Thank guys, i will update packages tomorrow.