mirror of
git://slackware.nl/current.git
synced 2024-12-28 09:59:53 +01:00
0857ff7f63
d/llvm-9.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. Thanks to orbea for getting this working and cleaning up the build script. d/vala-0.46.2-x86_64-1.txz: Upgraded. l/imagemagick-6.9.10_67-x86_64-1.txz: Upgraded. Fixed --disable-opencl configure option. Thanks to Markus Wiesner for the bug report and to upstream for the quick fix. n/NetworkManager-1.20.4-x86_64-1.txz: Upgraded. n/gnutls-3.6.10-x86_64-1.txz: Upgraded. x/freeglut-3.2.1-x86_64-1.txz: Upgraded. x/libglvnd-1.1.1-x86_64-2.txz: Upgraded. Reverted to this version since I'm seeing some errors linking with Mesa libraries with the newer one. Thanks to nobodino for the bug report. x/mesa-19.2.0-x86_64-2.txz: Rebuilt. Recompiled against llvm-9.0.0 and libglvnd-1.1.1. x/xf86-video-vmware-13.3.0-x86_64-3.txz: Rebuilt. Recompiled against llvm-9.0.0. |
||
---|---|---|
.. | ||
doinst.sh | ||
openvpn.SlackBuild | ||
openvpn.url | ||
rc.openvpn | ||
README | ||
slack-desc | ||
slackware.conf |
OpenVPN is a full-featured SSL VPN which can accomodate a wide range of configurations, including remote access, site-to-site VPNs, WiFi security, and enterprise-scale remote access with load balancing, failover, and fine-grained access-controls. OpenVPN implements OSI layer 2 or 3 secure network extension using the industry standard SSL/TLS protocol, supports flexible client authentication methods based on certificates, smart cards, and/or 2-factor authentication, and allows user or group-specific access control policies using firewall rules applied to the VPN virtual interface. This build of OpenVPN depends upon having openssl (not just openssl-solibs) and lzo installed on your computer. Please note that there is no default config file for OpenVPN. This is by design. OpenVPN can technically use any config file in any location. However, this script does create an /etc/openvpn/ directory with certs/ and keys/ subdirectories. Feel free to place config files, keys, and certificates in these directories. certs/ and keys/ are owned by user root and group nobody and are not world readable nor writable. Additionally, they are not writable by group nobody. It is recommended that you run openvpn nobody:nobody, but you may use another non-privilaged user and group at your option. Just change the permissions on these permissions to reflect that if you do.