1 [COPY] --- T2-COPYRIGHT-NOTE-BEGIN ---
2 [COPY] T2 SDE: package/*/strongswan/strongswan.desc
3 [COPY] Copyright (C) 2004 - 2022 The T2 SDE Project
5 [COPY] This Copyright note is generated by scripts/Create-CopyPatch,
6 [COPY] more information can be found in the files COPYING and README.
8 [COPY] This program is free software; you can redistribute it and/or modify
9 [COPY] it under the terms of the GNU General Public License version 2.
10 [COPY] --- T2-COPYRIGHT-NOTE-END ---
12 [I] An IPsec implementation for Linux
14 [T] strongSwan is an OpenSource IPsec implementation for the Linux operating
16 [T] It is based on the discontinued FreeS/WAN project and the X.509 patch which
17 [T] we developped over the last three years. In order to have a stable IPsec
18 [T] platform to base our future extensions of the X.509 capability on, we
19 [T] decided to lauch the strongSwan project.
22 [T] - simplicity of configuration
23 [T] - strong encryption and authentication methods
24 [T] - powerful IPsec policies supporting large and complex VPN networks
26 [T] strongSwan features includes:
27 [T] - both on Linux 2.4 (KLIPS) and Linux 2.6 (native IPsec) kernels.
28 [T] - Fast connection startup and periodic update using ipsec starter
29 [T] - Automatic insertion and deletion of IPsec policy based firewall rules
30 [T] - strong 3DES, AES, Serpent, Twofish, or Blowfish encryption
31 [T] - NAT-Traversal (RFC 3947) and support of virtual IPs and IKE Mode Config
32 [T] - Dead Peer Detection (DPD, RFC 3706) takes care of dangling tunnels
33 [T] - Authentication based on X.509 certificates or preshared keys
34 [T] - Authentication based on X.509 certificates or preshared keys
35 [T] - Generation of a default self-signed certificate during first strongSwan startup
36 [T] - Retrieval and local caching of Certificate Revocation Lists via HTTP or LDAP
37 [T] - Full support of the Online Certificate Status Protocol (OCSP, RCF 2560)
38 [T] - CA management (OCSP and CRL URIs, default LDAP server)
39 [T] - Powerful IPsec policies based on wildcards or intermediate CAs
40 [T] - Group policies based on X.509 attribute certificates (RFC 3281)
41 [T] - Optional storage of RSA private keys and certificates on a smartcard
42 [T] - Smartcard access via standardized PKCS #11 interface
43 [T] - PKCS #11 proxy function offering RSA decryption services via whack
45 [U] http://www.strongswan.org/
47 [A] Andreas Steffen <andreas.steffen@zhwin.ch>
48 [M] T2 Project <t2@t2-project.org>
57 [P] X -----5---9 200.500
59 [CV-URL] https://www.strongswan.org/download.html
60 [D] 0efab34592a7ea6892db91cc6388fa5f339e3ade58247208b043b2b0 strongswan-6.0dr13.tar.bz2 http://download.strongswan.org/