Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

libreswan-3.25-9.1.el7_8 RPM for x86_64

From Updates for CentOS 7.9.2009 for x86_64 / Packages

Name: libreswan Distribution: Unknown
Version: 3.25 Vendor: CentOS
Release: 9.1.el7_8 Build date: Thu Aug 6 19:18:53 2020
Group: System Environment/Daemons Build host: x86-02.bsys.centos.org
Size: 4967348 Source RPM: libreswan-3.25-9.1.el7_8.src.rpm
Packager: CentOS BuildSystem <http://bugs.centos.org>
Url: https://libreswan.org/
Summary: IPsec implementation with IKEv1 and IKEv2 keying protocols
Libreswan is a free implementation of IPsec & IKE for Linux.  IPsec is
the Internet Protocol Security and uses strong cryptography to provide
both authentication and encryption services.  These services allow you
to build secure tunnels through untrusted networks.  Everything passing
through the untrusted net is encrypted by the ipsec gateway machine and
decrypted by the gateway at the other end of the tunnel.  The resulting
tunnel is a virtual private network or VPN.

This package contains the daemons and userland tools for setting up
Libreswan. It supports the NETKEY/XFRM IPsec kernel stack that exists
in the default Linux kernel.

Libreswan also supports IKEv2 (RFC-7296) and Secure Labeling

Libreswan is based on Openswan-2.6.38 which in turn is based on FreeS/WAN-2.04

Provides

Requires

License

GPLv2

Changelog

* Tue Jun 16 2020 Paul Wouters <pwouters@redhat.com> - 3.25-9.1
  - Resolves: rhbz#1844621 Backport FIPS keysize fixes from RHEL8
* Mon Aug 26 2019 Paul Wouters <pwouters@redhat.com> - 3.25-9
  - Resolves: rhbz#1724200 libreswan: XFRM policy for OE/32 peer is deleted when shunts for previous half-open state expire
* Tue May 07 2019 Paul Wouters <pwouters@redhat.com> - 3.25-8
  - Resolves: rhbz#1686991 IKEv1 traffic interruption when responder deletes SAs 60 seconds before EVENT_SA_REPLACE
* Wed Feb 27 2019 Paul Wouters <pwouters@redhat.com> - 3.25-7
  - Resolves: rhbz#1673105 Opportunistic IPsec instances of /32 groups or auto=start that receive delete won't restart
* Mon Feb 04 2019 Paul Wouters <pwouters@redhat.com> - 3.25-6
  - Resolves: rhbz#1630355 Libreswan crash upon receiving ISAKMP_NEXT_D with appended ISAKMP_NEXT_N [updated]
  - Resolves: rhbz#1679735 libreswan using NSS IPsec profiles regresses when critical flags are set causing validation failure
* Thu Dec 20 2018 Paul Wouters <pwouters@redhat.com> - 3.25-5
  - Resolves: rhbz#1639404 Unable to verify certificate with non-empty Extended Key Usage which does not include serverAuth or clientAuth
  - Resolves: rhbz#1630355 Libreswan crash upon receiving ISAKMP_NEXT_D with appended ISAKMP_NEXT_N
  - Resolves: rhbz#1629902 libreswan assertion failed when OAKLEY_KEY_LENGTH is zero for IKE using AES_CBC
  - Resolves: rhbz#1623279 [abrt] [faf] libreswan: strncpy(): /usr/libexec/ipsec/pluto killed by 11
  - Resolves: rhbz#1625303 config: recursive include check doesn't work
  - Resolves: rhbz#1664521 libreswan 3.25 in FIPS mode is incorrectly rejecting X.509 public keys that are >= 3072 bits
* Mon Jul 02 2018 Paul Wouters <pwouters@redhat.com> - 3.25-2
  - Resolves: rhbz#1597322 Relax deleting IKE SA's and IPsec SA's to avoid interop issues with third party VPN vendors
* Wed Jun 27 2018 Paul Wouters <pwouters@redhat.com> - 3.25-1
  - Resolves: rhbz#1591817 rebase libreswan to 3.25
  - Resolves: rhbz#1536404 CERT_PKCS7_WRAPPED_X509 error
  - Resolves: rhbz#1544143 ipsec newhostkey fails in FIPS mode when RSA key is generated
  - Resolves: rhbz#1574011 libreswan is missing a Requires: unbound-libs >= 1.6.6
* Fri Apr 27 2018 Paul Wouters <pwouters@redhat.com> - 3.23-4
  - Resolves: rhbz#1544143 ipsec newhostkey fails in FIPS mode when RSA key is generated
  - Resolves: rhbz#1553406 IKEv2 liveness false positive on IKEv2 idle connections causes tunnel to be restarted
  - Resolves: rhbz#1572425 shared IKE SA leads to rekey interop issues
* Wed Feb 07 2018 Paul Wouters <pwouters@redhat.com> - 3.23-3
  - Resolves: rhbz#1471553 libreswan postquantum preshared key (PPK) support [IANA update]
* Tue Feb 06 2018 Paul Wouters <pwouters@redhat.com> - 3.23-2
  - Resolves: rhbz#1457904 rebase libreswan to 3.23 [updated]
  - Resolves: rhbz#1375750 SECCOMP support for libreswan [updated]
* Thu Jan 25 2018 Paul Wouters <pwouters@redhat.com> - 3.23-1
  - Resolves: rhbz#1457904 rebase libreswan to 3.23 [updated]
* Thu Jan 11 2018 Paul Wouters <pwouters@redhat.com> - 3.23-0.1.rc4
  - Resolves: rhbz#1471763 RFE: libreswan MOBIKE support (RFC-4555) [client support]
  - Resolves: rhbz#1457904 rebase libreswan to 3.23 [updated]
  - Resolves: rhbz#1471553 libreswan postquantum preshared key (PPK) support
  - Resolves: rhbz#1492501 Reboot or 'systemctl stop ipsec' brings down _ethernet_ interfaces on _both_ ends of ipv4 ipsec tunnel
  - Resolves: rhbz#1324421 libreswan works not well when setting leftid field to be email address
  - Resolves: rhbz#1136076 After IKE rekeying Pluto sends DPD even if there is active SA
* Tue Dec 12 2017 Paul Wouters <pwouters@redhat.com> - 3.22-5
  - Resolves: rhbz#1471763 RFE: libreswan MOBIKE support (RFC-4555) [updated]
  - Resolves: rhbz#1471553 libreswan postquantum preshared key (PPK) support
  - Resolves: rhbz#1375776 [IKEv2 Conformance] Test IKEv2.EN.R.1.2.2.1: Receipt of retransmitted CREATE_CHILD_SA reques failed
  - Resolves: rhbz#1375750 SECCOMP support for libreswan [updated for libunbound syscalls]
  - Resolves: rhbz#1300763 Implement draft-ietf-ipsecme-split-dns for libreswan
* Thu Nov 30 2017 Paul Wouters <pwouters@redhat.com> - 3.22-4
  - Resolves: rhbz#1463062 NIC-card hardware offload support backport
* Thu Nov 16 2017 Paul Wouters <pwouters@redhat.com> - 3.22-3
  - Resolves: rhbz#1475434 Add support for AES-GMAC for ESP (RFC-4543) to libreswan
  - Resolves: rhbz#1300759 Implement RFC-7427 Digital Signature authentication
* Tue Oct 31 2017 Paul Wouters <pwouters@redhat.com> - 3.22-2
  - Resolves: rhbz#1471763 RFE: libreswan MOBIKE support (RFC-4555)
  - Resolves: rhbz#1372050 RFE: Support IKE and ESP over TCP: RFC 8229
* Mon Oct 23 2017 Paul Wouters <pwouters@redhat.com> - 3.22-1
  - Resolves: rhbz#1457904 rebase libreswan to 3.22 [updated]
* Mon Oct 16 2017 Paul Wouters <pwouters@redhat.com> - 3.21-2
  - Resolves: rhbz#1499845 libreswan does not establish IKE with xauth enabled but modecfg disabled
  - Resolves: rhbz#1497158 xauth password length limited to 64 bytes while XAUTH_MAX_PASS_LENGTH (128)
* Wed Sep 20 2017 Paul Wouters <pwouters@redhat.com> - 3.21-1
  - Resolves: rhbz#1457904 rebase libreswan to 3.22
* Mon Jun 12 2017 Paul Wouters <pwouters@redhat.com> - 3.20-3
  - Resolves: rhbz#1372279 ipsec auto --down CONNECTION returns error for tunnels [updated]
  - Resolves: rhbz#1458227 CAVS test driver does not work in FIPS mode
  - Resolves: rhbz#1452672 (new-ksk-libreswan-el7) DNSSEC trust anchor cannot be updated without recompilation
* Thu Apr 13 2017 Paul Wouters <pwouters@redhat.com> - 3.20-2
  - Resolves: rhbz#1372279 ipsec auto --down CONNECTION returns error for tunnels
  - Resolves: rhbz#1444115 FIPS: libreswan must generate RSA keys with a minimal exponent of F4, nor E=3
  - Resolves: rhbz#1341353 Allow Preshared Key authentication in FIPS mode for libreswan
* Tue Mar 14 2017 Paul Wouters <pwouters@redhat.com> - 3.20-1
  - Resolves: rhbz#1399883 rebase libreswan to 3.20 (full release)
* Mon Feb 20 2017 Paul Wouters <pwouters@redhat.com> - 3.20-0.1.dr3
  - Resolves: rhbz#1399883 rebase libreswan to 3.20
* Wed Sep 07 2016 Paul Wouters <pwouters@redhat.com> - 3.15-8
  - Resolves: rhbz#1361721 libreswan pluto segfault [UPDATED]
  - Resolves: rhbz#1276524 [USGv6] IKEv2.EN.R.1.1.3.2 case failed due to response to bad INFORMATIONAL request [UPDATED]
  - Resolves: rhbz#1309764 ipsec barf [additional man page update and --no-pager]
* Mon Aug 08 2016 Paul Wouters <pwouters@redhat.com> - 3.15-7
  - Resolves: rhbz#1311360  When IKE rekeys, if on a different tunnel, all subsequent attempts to rekey fail
  - Resolves: rhbz#1361721 libreswan pluto segfault
* Tue Jul 05 2016 Paul Wouters <pwouters@redhat.com> - 3.15-6
  - Resolves: rhbz#1283468 keyingtries=0 is broken
  - Resolves: rhbz#1297816 When using SHA2 as PRF algorithm, nonce payload is below the RFC minimum size
  - Resolves: rhbz#1344567 CVE-2016-5361 libreswan: IKEv1 protocol is vulnerable to DoS amplification attack
  - Resolves: rhbz#1313747 ipsec pluto returns zero even if it fails
  - Resolves: rhbz#1302778 fips does not check hash of some files (like _import_crl)
  - Resolves: rhbz#1278063 Unable to authenticate with PAM for IKEv1 XAUTH
  - Resolves: rhbz#1257079 Libreswan doesn't call NetworkManager helper in case of a connection error
  - Resolves: rhbz#1272112 ipsec whack man page discrepancies
  - Resolves: rhbz#1280449 PAM xauth method does not work with pam_sss
  - Resolves: rhbz#1290907 ipsec initnss/checknss custom directory not recognized
  - Resolves: rhbz#1309764 ipsec barf does not show pluto log correctly in the output
  - Resolves: rhbz#1347735 libreswan needs to check additional CRLs after LDAP CRL distributionpoint fails
  - Resolves: rhbz#1219049 Pluto does not handle delete message from responder site in ikev1
  - Resolves: rhbz#1276524 [USGv6] IKEv2.EN.R.1.1.3.2 case failed due to response to bad INFORMATIONAL request
  - Resolves: rhbz#1315412 ipsec.conf manpage does not contain any mention about crl-strict option
  - Resolves: rhbz#1229766 Pluto crashes after stop when I use floating ip address
* Wed Oct 21 2015 Paul Wouters <pwouters@redhat.com> - 3.15-5
  - Resolves: rhbz#1271811 libreswan FIPS test mistakenly looks for non-existent file hashes
* Wed Sep 30 2015 Paul Wouters <pwouters@redhat.com> - 3.15-4
  - Resolves: rhbz#1267370 libreswan should support strictcrlpolicy alias
  - Resolves: rhbz#1229766 Pluto crashes after stop when I use floating ip address
  - Resolves: rhbz#1166146 Pluto crashes on INITIATOR site during 'service ipsec stop'
  - Resolves: rhbz#1259209 CVE-2015-3240
  - Resolves: rhbz#1199374 libreswan does not enforce all FIPS or IPsec Suite B restrictions
  - Resolves: rhbz#1207689 libreswan ignores module blacklist rules
  - Merge rhel6 and rhel7 spec into one
  - Be lenient for racoon padding behaviour
  - Fix seedev option to /dev/random
  - Some IKEv1 PAM methods always gave 'Permission denied'
  - Parser workarounds for differences in gcc/flex/bison on rhel6/rhel7
  - Parser fix to allow specifying time without unit (openswan compat)
  - Fix Labeled IPsec on rekeyed IPsec SA's
  - Workaround for wrong padding by racoon2
  - Disable NSS HW GCM to workaround rhel6 xen builers bug
* Fri May 29 2015 Paul Wouters <pwouters@redhat.com> - 3.12-12
  - Resolves: rhbz#1212121 Support CAVS [updated bogus fips mode fix]
* Fri May 29 2015 Paul Wouters <pwouters@redhat.com> - 3.12-11
  - Resolves: rhbz#1226408 CVE-2015-3204 libreswan: crafted IKE packet causes daemon restart
* Tue May 05 2015 Paul Wouters <pwouters@redhat.com> - 3.12-10
  - Resolves: rhbz#1212121 Support CAVS testing of the PRF/PRF+ functions
  - Resolves: rhbz#1127313 Libreswan with IPv6 [updated patch by Jaroslav Aster]
  - Resolves: rhbz#1207689 libreswan ignores module blacklist [updated modprobe handling]
  - Resolves: rhbz#1218358 pluto crashes in fips mode without dracut-fips package
* Sat Feb 21 2015 Paul Wouters <pwouters@redhat.com> - 3.12-6
  - Resolves: rhbz#1056559 loopback support deprecated
  - Resolves: rhbz#1182224 Add new option for BSI random requirement
  - Resolves: rhbz#1170018 [increase] SELinux context string size limit
  - Resolves: rhbz#1127313 Libreswan with IPv6 in RHEL7 fails after reboot
  - Resolves: rhbz#1207689 libreswan ignores module blacklist rules
  - Resolves: rhbz#1203794 pluto crashes in fips mode
* Tue Jan 20 2015 Paul Wouters <pwouters@redhat.com> - 3.12-5
  - Resolves: rhbz#826264 aes-gcm implementation support (for IKEv2)
  - Resolves: rhbz#1074018 Audit key agreement (integ gcm fixup)
* Tue Dec 30 2014 Paul Wouters <pwouters@redhat.com> - 3.12-4
  - Resolves: rhbz#1134297 aes-ctr cipher is not supported
  - Resolves: rhbz#1131503 non-zero rSPI on INVALID_KE (and proper INVALID_KE handling)
* Thu Dec 04 2014 Paul Wouters <pwouters@redhat.com> - 3.12-2
  - Resolves: rhbz#1105171 (Update man page entry)
  - Resolves: rhbz#1144120 (Update for ESP CAMELLIA with IKEv2)
  - Resolves: rhbz#1074018 Audit key agreement
* Fri Nov 07 2014 Paul Wouters <pwouters@redhat.com> - 3.12-1
  - Resolves: rhbz#1136124 rebase to libreswan 3.12
  - Resolves: rhbz#1052811 [TAHI] (also clear reserved flags for isakmp_sa header)
  - Resolves: rhbz#1157379 [TAHI][IKEv2] IKEv2.EN.R.1.3.3.1: Non RESERVED fields in INFORMATIONAL request
* Mon Oct 27 2014 Paul Wouters <pwouters@redhat.com> - 3.11-2
  - Resolves: rhbz#1136124 rebase to libreswan 3.11 (coverity fixup, dpdaction=clear fix)
* Wed Oct 22 2014 Paul Wouters <pwouters@redhat.com> - 3.11-1
  - Resolves: rhbz#1136124 rebase to libreswan 3.11
  - Resolves: rhbz#1099905 ikev2 delete payloads are not delivered to peer
  - Resolves: rhbz#1147693 NetworkManger-libreswan can not connect to Red Hat IPSec Xauth VPN
  - Resolves: rhbz#1055865 [TAHI][IKEv2] libreswan do not ignore the content of version bit
  - Resolves: rhbz#1146106 Pluto crashes after start when some ah algorithms are used
  - Resolves: rhbz#1108256 addconn compatibility with openswan
  - Resolves: rhbz#1152625 [TAHI][IKEv2] IKEv2.EN.I.1.1.6.2 Part D: Integrity Algorithm AUTH_AES_XCBC_96 fail
  - Resolves: rhbz#1119704 [TAHI][IKEv2]IKEv2Interop.1.13a test fail
  - Resolves: rhbz#1100261 libreswan does not send response when when it receives Delete Payload for a CHILD_SA
  - Resolves: rhbz#1100239 ikev2 IKE SA responder does not send delete request to IKE SA initiator
  - Resolves: rhbz#1052811 [TAHI][IKEv2]IKEv2.EN.I.1.1.11.1: Non zero RESERVED fields in IKE_SA_INIT response
  - Resolves: rhbz#1126868 ikev2 sequence numbers are implemented incorrectly
  - Resolves: rhbz#1145245 Libreswan appears to start with systemd before all the NICs are up and running.
  - Resolves: rhbz#1145231 libreswan 3.10 upgrade breaks old ipsec.secrets configs
  - Resolves: rhbz#1144123 Add ESP support for AES_XCBC hash for USGv6 and IPsec-v3 compliance
  - Resolves: rhbz#1144120 Add ESP support for CAMELLIA for USGv6 and IPsec-v3 compliance
  - Resolves: rhbz#1099877 Missing man-pages ipsec_whack, ipsec_manual
  - Resolves: rhbz#1100255 libreswan Ikev2 implementation does not send an INFORMATIONAL response when it receives an INFORMATIONAL request with a Delete Payload for an IKE_SA
* Tue Sep 09 2014 Paul Wouters <pwouters@redhat.com> - 3.10-3
  - Resolves: rhbz#1136124 rebase to 3.10 (auto=route bug on startup)
* Mon Sep 08 2014 Paul Wouters <pwouters@redhat.com> - 3.10-2
  - Resolves: rhbz#1136124 rebase to libreswan 3.10
* Mon Jul 14 2014 Paul Wouters <pwouters@redhat.com> - 3.8-6
  - Resolves: rhbz#1092047 pluto cannot write to directories not owned by root
* Thu Apr 10 2014 Paul Wouters <pwouters@redhat.com> - 3.8-5
  - Resolves: rhbz#1052834 create_child_sa message ID handling
* Tue Mar 18 2014 Paul Wouters <pwouters@redhat.com> - 3.8-4
  - Resolves: rhbz#1052834 create_child_sa response
* Wed Mar 05 2014 Paul Wouters <pwouters@redhat.com> - 3.8-3
  - Resolves: rhbz#1069024  erroneous debug line with mixture [...]
  - Resolves: rhbz#1030939 update nss/x509 documents, don't load acerts
  - Resolves: rhbz#1058813 newhostkey returns zero value when it fails
* Fri Jan 24 2014 Daniel Mach <dmach@redhat.com> - 3.8-2
  - Mass rebuild 2014-01-24
* Thu Jan 16 2014 Paul Wouters <pwouters@redhat.com> - 3.8-1
  - Resolves: rhbz#CVE-2013-6467 
  - Resolves: rhbz#1043642 rebase to version 3.8
  - Resolves: rhbz#1029912 ipsec force-reload doesn't work
  - Resolves: rhbz#826261 Implement SHA384/512 support for Openswan
  - Resolves: rhbz#1039655 ipsec newhostkey generates false configuration
* Fri Dec 27 2013 Daniel Mach <dmach@redhat.com> - 3.6-3
  - Mass rebuild 2013-12-27
* Fri Nov 08 2013 Paul Wouters <pwouters@redhat.com> - 3.6-2
  - Fix race condition in post for creating nss db
* Thu Oct 31 2013 Paul Wouters <pwouters@redhat.com> - 3.6-1
  - Updated to version 3.6 (IKEv2, MODECFG, Cisco interop fixes)
  - Generate empty NSS db if none exists
  - FIPS update using /etc/system-fips
  - Provide: openswan-doc
* Fri Aug 09 2013 Paul Wouters <pwouters@redhat.com> - 3.5-2
  - rebuilt and bumped EVR to avoid confusion of import->delete->import
  - require iproute
* Mon Jul 15 2013 Paul Wouters <pwouters@redhat.com> - 3.5-1
  - Initial package for RHEL7
  - Added interop patch for (some?) Cisco VPN clients sending 16 zero
    bytes of extraneous IKE data
  - Removed fipscheck_version

Files

/etc/ipsec.conf
/etc/ipsec.d
/etc/ipsec.d/policies
/etc/ipsec.d/policies/block
/etc/ipsec.d/policies/clear
/etc/ipsec.d/policies/clear-or-private
/etc/ipsec.d/policies/portexcludes.conf
/etc/ipsec.d/policies/private
/etc/ipsec.d/policies/private-or-clear
/etc/ipsec.secrets
/etc/pam.d/pluto
/etc/prelink.conf.d
/etc/prelink.conf.d/libreswan-fips.conf
/usr/lib/systemd/system/ipsec.service
/usr/lib64/fipscheck/pluto.hmac
/usr/libexec/ipsec
/usr/libexec/ipsec/_import_crl
/usr/libexec/ipsec/_keycensor
/usr/libexec/ipsec/_plutorun
/usr/libexec/ipsec/_secretcensor
/usr/libexec/ipsec/_stackmanager
/usr/libexec/ipsec/_unbound-hook
/usr/libexec/ipsec/_updown
/usr/libexec/ipsec/_updown.klips
/usr/libexec/ipsec/_updown.netkey
/usr/libexec/ipsec/addconn
/usr/libexec/ipsec/algparse
/usr/libexec/ipsec/auto
/usr/libexec/ipsec/barf
/usr/libexec/ipsec/cavp
/usr/libexec/ipsec/enumcheck
/usr/libexec/ipsec/eroute
/usr/libexec/ipsec/klipsdebug
/usr/libexec/ipsec/look
/usr/libexec/ipsec/newhostkey
/usr/libexec/ipsec/pf_key
/usr/libexec/ipsec/pluto
/usr/libexec/ipsec/readwriteconf
/usr/libexec/ipsec/rsasigkey
/usr/libexec/ipsec/setup
/usr/libexec/ipsec/show
/usr/libexec/ipsec/showhostkey
/usr/libexec/ipsec/spi
/usr/libexec/ipsec/spigrp
/usr/libexec/ipsec/tncfg
/usr/libexec/ipsec/verify
/usr/libexec/ipsec/whack
/usr/sbin/ipsec
/usr/share/doc/libreswan-3.25
/usr/share/doc/libreswan-3.25/CHANGES
/usr/share/doc/libreswan-3.25/CHANGES.freeswan.pluto
/usr/share/doc/libreswan-3.25/CHANGES.openswan
/usr/share/doc/libreswan-3.25/COPYING
/usr/share/doc/libreswan-3.25/CREDITS
/usr/share/doc/libreswan-3.25/CREDITS.freeswan
/usr/share/doc/libreswan-3.25/CREDITS.openswan
/usr/share/doc/libreswan-3.25/LICENSE
/usr/share/doc/libreswan-3.25/PlutoFlow.png
/usr/share/doc/libreswan-3.25/PlutoFlow.svg
/usr/share/doc/libreswan-3.25/ProgrammingConventions.txt
/usr/share/doc/libreswan-3.25/README.IANA-PEN
/usr/share/doc/libreswan-3.25/README.KLIPS
/usr/share/doc/libreswan-3.25/README.OCF
/usr/share/doc/libreswan-3.25/README.XAUTH
/usr/share/doc/libreswan-3.25/README.labeledipsec
/usr/share/doc/libreswan-3.25/README.md
/usr/share/doc/libreswan-3.25/README.nss
/usr/share/doc/libreswan-3.25/README.rfcs
/usr/share/doc/libreswan-3.25/README.x509
/usr/share/doc/libreswan-3.25/examples
/usr/share/doc/libreswan-3.25/examples/hub-spoke.conf
/usr/share/doc/libreswan-3.25/examples/ipv6.conf
/usr/share/doc/libreswan-3.25/examples/l2tp-cert.conf
/usr/share/doc/libreswan-3.25/examples/l2tp-psk.conf
/usr/share/doc/libreswan-3.25/examples/linux-linux.conf
/usr/share/doc/libreswan-3.25/examples/mast-l2tp-psk.conf
/usr/share/doc/libreswan-3.25/examples/oe-authnull.conf
/usr/share/doc/libreswan-3.25/examples/oe-dnssec-client.conf
/usr/share/doc/libreswan-3.25/examples/oe-dnssec-server.conf
/usr/share/doc/libreswan-3.25/examples/oe-exclude-dns.conf
/usr/share/doc/libreswan-3.25/examples/oe-letsencrypt-README.txt
/usr/share/doc/libreswan-3.25/examples/oe-letsencrypt-client.conf
/usr/share/doc/libreswan-3.25/examples/oe-letsencrypt-server.conf
/usr/share/doc/libreswan-3.25/examples/oe-upgrade-authnull.conf
/usr/share/doc/libreswan-3.25/examples/sysctl.conf
/usr/share/doc/libreswan-3.25/examples/xauth.conf
/usr/share/doc/libreswan-3.25/ipsecsaref.png
/usr/share/doc/libreswan-3.25/l2tp-overhead.txt
/usr/share/doc/libreswan-3.25/libreswan-sysctl.conf
/usr/share/doc/libreswan-3.25/nss-howto.txt
/usr/share/doc/libreswan-3.25/opportunistic-v1.historic
/usr/share/doc/libreswan-3.25/opportunistic-v1.historic/opportunism-spec.txt
/usr/share/doc/libreswan-3.25/opportunistic-v1.historic/opportunism.nr
/usr/share/doc/libreswan-3.25/pluto-internals.txt
/usr/share/doc/libreswan-3.25/win2k-notes.txt
/usr/share/doc/libreswan-3.25/windows-cross-compile.txt
/usr/share/man/man5/ipsec.conf.5.gz
/usr/share/man/man5/ipsec.secrets.5.gz
/usr/share/man/man5/ipsec_eroute.5.gz
/usr/share/man/man5/ipsec_klipsdebug.5.gz
/usr/share/man/man5/ipsec_pf_key.5.gz
/usr/share/man/man5/ipsec_spi.5.gz
/usr/share/man/man5/ipsec_spigrp.5.gz
/usr/share/man/man5/ipsec_tncfg.5.gz
/usr/share/man/man5/ipsec_trap_count.5.gz
/usr/share/man/man5/ipsec_trap_sendcount.5.gz
/usr/share/man/man5/ipsec_version.5.gz
/usr/share/man/man8/ipsec.8.gz
/usr/share/man/man8/ipsec__import_crl.8.gz
/usr/share/man/man8/ipsec__keycensor.8.gz
/usr/share/man/man8/ipsec__plutorun.8.gz
/usr/share/man/man8/ipsec__secretcensor.8.gz
/usr/share/man/man8/ipsec__stackmanager.8.gz
/usr/share/man/man8/ipsec__unbound-hook.8.gz
/usr/share/man/man8/ipsec__updown.8.gz
/usr/share/man/man8/ipsec__updown.klips.8.gz
/usr/share/man/man8/ipsec__updown.netkey.8.gz
/usr/share/man/man8/ipsec_addconn.8.gz
/usr/share/man/man8/ipsec_auto.8.gz
/usr/share/man/man8/ipsec_barf.8.gz
/usr/share/man/man8/ipsec_checknss.8.gz
/usr/share/man/man8/ipsec_eroute.8.gz
/usr/share/man/man8/ipsec_import.8.gz
/usr/share/man/man8/ipsec_initnss.8.gz
/usr/share/man/man8/ipsec_klipsdebug.8.gz
/usr/share/man/man8/ipsec_look.8.gz
/usr/share/man/man8/ipsec_newhostkey.8.gz
/usr/share/man/man8/ipsec_pf_key.8.gz
/usr/share/man/man8/ipsec_pluto.8.gz
/usr/share/man/man8/ipsec_readwriteconf.8.gz
/usr/share/man/man8/ipsec_rsasigkey.8.gz
/usr/share/man/man8/ipsec_setup.8.gz
/usr/share/man/man8/ipsec_show.8.gz
/usr/share/man/man8/ipsec_showhostkey.8.gz
/usr/share/man/man8/ipsec_spi.8.gz
/usr/share/man/man8/ipsec_spigrp.8.gz
/usr/share/man/man8/ipsec_tncfg.8.gz
/usr/share/man/man8/ipsec_verify.8.gz
/usr/share/man/man8/ipsec_whack.8.gz
/usr/share/man/man8/pluto.8.gz
/var/log/pluto/peer
/var/run/pluto


Generated by rpm2html 1.8.1

Fabrice Bellet, Fri Jun 14 04:34:56 2024