slackware-current/source/n/openvpn
Patrick J Volkerding 037917abe7 Wed Oct 28 20:19:37 UTC 2020
a/libblockdev-2.24-x86_64-1.txz:  Added.
  This is required by the new version of udisks2.
a/libbytesize-2.4-x86_64-1.txz:  Added.
  This is required by the new version of udisks2.
a/ndctl-70.1-x86_64-1.txz:  Added.
  This is required by libblockdev, which in turn is required by the new
  version of udisks2.
a/udisks2-2.9.1-x86_64-1.txz:  Upgraded.
  Thanks to Robby Workman for this update and the deps for it.
a/volume_key-0.3.12-x86_64-1.txz:  Added.
  This is required by the new version of udisks2.
ap/qpdf-10.0.2-x86_64-1.txz:  Upgraded.
n/openvpn-2.5.0-x86_64-1.txz:  Upgraded.
n/php-7.4.12-x86_64-1.txz:  Upgraded.
2020-10-29 08:59:45 +01:00
..
doinst.sh Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
openvpn.SlackBuild Wed Oct 28 20:19:37 UTC 2020 2020-10-29 08:59:45 +01:00
openvpn.url Wed Feb 20 23:59:17 UTC 2019 2019-02-21 08:59:46 +01:00
rc.openvpn Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
README Slackware 13.0 2018-05-31 22:41:17 +02:00
slack-desc Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
slackware.conf Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00

OpenVPN is a full-featured SSL VPN which can accomodate a wide
range of configurations, including remote access, site-to-site VPNs,
WiFi security, and enterprise-scale remote access with load
balancing, failover, and fine-grained access-controls.

OpenVPN implements OSI layer 2 or 3 secure network extension using the
industry standard SSL/TLS protocol, supports flexible client
authentication methods based on certificates, smart cards, and/or
2-factor authentication, and allows user or group-specific access
control policies using firewall rules applied to the VPN virtual
interface.

This build of OpenVPN depends upon having openssl (not just
openssl-solibs) and lzo installed on your computer. 

Please note that there is no default config file for OpenVPN. This is
by design. OpenVPN can technically use any config file in any location.
However, this script does create an /etc/openvpn/ directory with certs/
and keys/ subdirectories.  Feel free to place config files, keys, and
certificates in these directories. certs/ and keys/ are owned by user
root and group nobody and are not world readable nor writable.
Additionally, they are not writable by group nobody. It is recommended
that you run openvpn nobody:nobody, but you may use another
non-privilaged user and group at your option.  Just change the
permissions on these permissions to reflect that if you do.