Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: openfortivpn | Distribution: openSUSE:Factory:zSystems |
Version: 1.21.0 | Vendor: openSUSE |
Release: 1.1 | Build date: Fri Dec 29 00:34:04 2023 |
Group: Productivity/Networking/Security | Build host: s390zl26 |
Size: 168246 | Source RPM: openfortivpn-1.21.0-1.1.src.rpm |
Packager: https://bugs.opensuse.org | |
Url: https://github.com/adrienverge/openfortivpn | |
Summary: Client for PPP+SSL VPN tunnel services |
openfortivpn is a client for PPP+SSL VPN tunnel services. It spawns a pppd process and operates the communication between the gateway and this process. It is compatible with Fortinet VPNs.
GPL-3.0-or-later
* Thu Dec 14 2023 Martin Hauke <mardnh@gmx.de> - Update to version 1.21.0 * fix "Peer refused to agree to his IP address" message, again. * deprecate option --plugin. * better masking of password in logs. * Sun Aug 27 2023 Martin Hauke <mardnh@gmx.de> - Compile with support for systemd (sd_notify) * Mon Jul 03 2023 Martin Hauke <mardnh@gmx.de> - Update to version 1.20.5 * revert previous fix from 1.20.4, make it optional. - Update to version 1.20.4 * fix "Peer refused to agree to his IP address" message. - Update to version 1.20.3 * minor change in a warning message. * documentation improvement. * minor changes in build and test files. - Update to version 1.20.2 * fix regression: do attempt to apply duplicate routes, log INFO instead of WARN. * minor changes in log messages. - Update patch: * harden_openfortivpn@.service.patch * Mon Feb 27 2023 Martin Hauke <mardnh@gmx.de> - Update to versoin 1.20.1 * Bugfix release. - Update to versoin 1.20.0 * Discard invalid empty HDLC frame at end of buffer. * Prepend "SVPNCOOKIE=" to the given cookie if missing. * Wed Oct 12 2022 Martin Hauke <mardnh@gmx.de> - Update to version 1.19.0 * fix "Peer refused to agree to our IP address" message * avoid setting duplicate routes * remove obsolete code that reads non-XML config from FortiOS * improve warning message when reading options from config file - Update to version 1.18.0 * add new options to delegate the authentication to external programs * minor fixes in documentation * Sat May 07 2022 Martin Hauke <mardnh@gmx.de> - Update to version 1.17.3 * fix regression: spurious warning message after reading config * Thu Mar 31 2022 Martin Hauke <mardnh@gmx.de> - Update to version 1.17.2 * fix memory leak when reading user input * improve calls to getsockopt() and associated debug output * allow reading config from process substitution * work around CodeQL false positives, improving code at the same time * change type of systemd.service from simple to notify * Wed Oct 13 2021 Johannes Segitz <jsegitz@suse.com> - Added hardening to systemd service(s) (bsc#1181400). Added patch(es): * harden_openfortivpn@.service.patch * Thu Sep 09 2021 Martin Hauke <mardnh@gmx.de> - Updat eto version 1.17.1 * fix regression: enable OpenSSL engines by default * fix typos found by codespell * fix LGTM alerts * Fri Jul 16 2021 Martin Hauke <mardnh@gmx.de> - Update to version 1.17.0 * make OpenSSL engines optional * document and favor --pinentry over plain text password in configuration file * fix buffer overflow and other errors in URI espcaping for - -pinentry * use different --pinentry hints for different hosts, usernames and realms * fix memory management errors related to --user-agent option * Sun Feb 14 2021 Martin Hauke <mardnh@gmx.de> - Update to version 1.16.0 * support for user key pass phrase * add a space at the end of the OTP prompt * modify memory allocation in the tunnel configuration structure * openfortivpn returns the PPP exit status * print SSL socket options in log * Wed Sep 09 2020 Martin Hauke <mardnh@gmx.de> - Update to version 1.15.0 * fix issue sending pin codes * add command line option to bind to specific interface * use different hints for OTP and 2FA * remove password from /proc/#/cmd * extend OTP to allow FTM push * add preliminary support for host checks * don't accept route to the vpn gateway * fix byte counter in pppd_write * Sat May 23 2020 Martin Hauke <mardnh@gmx.de> - Update to version 1.14.1 * fix out of bounds array access * Tue May 12 2020 Martin Hauke <mardnh@gmx.de> - Update to version 1.14.0 * add git commit id in debug output * do not use interface ip for routing on linux * avoid extra hop on interface for default route * clean up, updates and improvments in the build system * increase the inbound HTTP buffer capacity when needed * print domain search list to output * add systemd service file * add systemd notification when stopping * allow logging with both smartcard and username * fix GCC 9 and clang warnings * bump default minimal TLS version from TLSv1.0 to TLSv1.2 * fix a couple coverity warnings - Package systemd service file * Wed Apr 01 2020 Martin Hauke <mardnh@gmx.de> - Update to version 1.13.3 * fix a coverity warning * cross-compile: do not check resolvconf on the host system * Wed Mar 25 2020 Martin Hauke <mardnh@gmx.de> - Update to version 1.13.2 * properly build on FreeBSD, even if ppp is not installed at configure time * build in the absence of resolvconf * Tue Mar 24 2020 Martin Hauke <mardnh@gmx.de> - Update to versin 1.13.0 * avoid unsupported versions of resolvconf * add configure and command line option for resolvconf * increase BUFSIZ * reinitialize static variables with the --persistent option * fix a memory leak in ipv4_add_nameservers_to_resolv_conf * Thu Feb 27 2020 Martin Hauke <mardnh@gmx.de> - Update to version 1.12.0 * fix CVE-2020-7043: TLS Certificate CommonName NULL Byte Vulnerability * fix CVE-2020-7042: use of uninitialized memory in X509_check_host * fix CVE-2020-7041: incorrect use of X509_check_host (regarding return value). * always hide cleartest password in -vv output * add a clear warning about sensitive information in the debug output * add a hint in debug output when password is read from config file * fix segfault when connecting with empty password * use resolvconf if available to update resolv.conf file * replace semicolon by space in dns-suffix string
/etc/openfortivpn /etc/openfortivpn/config /usr/bin/openfortivpn /usr/lib/systemd/system/openfortivpn@.service /usr/share/doc/packages/openfortivpn /usr/share/doc/packages/openfortivpn/README.md /usr/share/licenses/openfortivpn /usr/share/licenses/openfortivpn/LICENSE /usr/share/licenses/openfortivpn/LICENSE.OpenSSL /usr/share/man/man1/openfortivpn.1.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Sat Mar 9 12:50:11 2024