On 07.03.2012 17:42, Erik Esterer wrote:
the conflict were added 2 years ago because of bug #583334 (the file
/usr/share/man/man3/ipsec_set_policy.3.gz was available in both
packages).
But openswan doesn't contain that file anymore. Therefor I don't see
a reason for the conflict anymore. Can you
On Monday 31 October 2011 05:55:21 T Z wrote:
I've tested the version from backport and indeed it works.
Please ignore my previous message. Just another question, is there any
possibility to move it back to the mainstream stable repo at all? (i.e.,
get it from stable rather than backports)
On Thursday 27 October 2011 04:42:06 you wrote:
By default Strongswan does not allow NAT Traversal due to its potential
security risks. However this feature is very necessary for most L2TP/IPSec
clients since a good number of them would be NATed and Strongswan from the
Debian binary
On Monday 28 June 2010 07:51:07 Harald Jenny wrote:
Sorry Paul but I don't think the currect behaviour is correct - there is no
indication for the user why *id is ignored and this is not good :-(.
I would tend to agree with that...
best regards,
Rene
--
To UNSUBSCRIBE, email to
On Saturday 19 June 2010 18:09:40 Michael Biebl wrote:
just wanted to know if there was any progress getting this new version of
strongswan uploaded. I'd really appreciate if I could get rid of the symlink.
I'll probably upload this week.
best regards,
Rene
--
To UNSUBSCRIBE, email to
On 05/27/2010 11:12 AM, Stefan Bauer wrote:
Am 27.05.2010 11:05, Rene Mayrhofer schrieb:
We could also simply add a mutual Conflicts, as there seems to be no reason
to
have both racoon and openswan installed. Actually, quite a few years ago
(back
in freeswan days...) it was decided
On Thursday 27 May 2010 10:24:54 Stefan Bauer wrote:
thank you for your report. Do you really think, removing the manpage
in one package might be clever? As both packages are using the same
function under the hood, both packages need to have an appropriate
manpage for this. Both packages
On Friday 16 April 2010 10:56:44 you wrote:
# /etc/init.d/havp start
Cleaning up /var/spool/havp... done
Starting havp: Starting HAVP Version: 0.89
LibClamAV Warning:
*** LibClamAV
Warning: *** This version of the ClamAV engine is
On Friday 16 April 2010 15:46:09 Christoph Berg wrote:
Re: Heiko Schlittermann 2009-04-14
20090414122258.ga7...@jumper.schlittermann.de
The postrotate script (using /etc/init.d/havp reload) does not trigger
havp to release and reopen the log (access/error).
Doing a ``killall -HUP
Hi Martin and Andreas,
Could you please update configure.in due to the libnm_glib name update?
Thanks,
Rene
--
-
Gibraltar firewall http://www.gibraltar.at/
---BeginMessage---
Package: strongswan
Severity: wishlist
Tags: patch
Hi,
since
On Monday 19 April 2010 12:13:29 Martin Willi wrote:
Hi Rene,
Could you please update configure.in due to the libnm_glib name update?
strongSwan 4.3.6 already supports _ and - libnm packages, see
changeset [1].
Ah, just saw it - perfect, we can close the bug report with the next upload.
On Sunday 07 February 2010 19:12:48 Helge Kreutzmann wrote:
On Sun, Feb 07, 2010 at 06:51:28PM +0100, Christian PERRIER wrote:
Quoting Helge Kreutzmann (deb...@helgefjell.de):
due to a communication problem (sorry) within the German team the
deadline for the i18n update was missed and
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Package: ftp.debian.org
Severity: normal
Please remove freeswan, freeswan-modules-source, and
kernel-patch-freeswan. For lenny, these were transitional packages,
but they should no longer be necessary in sid/testing and currently
break installation
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Petter Reinholdtsen schrieb:
Are you OK with me NMUing to fix this issue, or do you plan to work on
it in the next few days?
No problem from my side - please feel free to NMU in unstable (openswan
updates will soon happen in stable and oldstable).
On Saturday, 23. May 2009 22:37:37 Jonathan Wiltshire wrote:
Please notify me of your intents with regards to this. In case you are
short of time, I can either prepare and upload a non-maintainer upload
or prepare an upload for you.
I intend to do the upload myself, but it may take a few days
On Monday, 25. May 2009 17:32:30 Jonathan Wiltshire wrote:
On Sun, May 24, 2009 at 08:05:48AM +0200, Christian Perrier wrote:
Also, your patch still contains the trailing spaces I mentioned in a
previous answer:
Yep, I spotted that too. I've corrected all the spacing problems in the
On Sunday 10 May 2009 18:50:23 Jonathan Wiltshire wrote:
Please review the suggested changes are suggested, and if you have any
objections, let me know in the next 3 days.
No objections from my side.
best regards,
Rene
signature.asc
Description: This is a digitally signed message part.
On Tuesday 31 March 2009 01:55:46 Steffen Joeris wrote:
I've attached the patch from stable-security, please consider including
it for unstable/testing.
Unfortunately, this doesn't apply as dpd code seems to have moved out of
demux.c (I didn't find any of the patch context). Have you had
Hi Openswan and strongSwan teams,
I recently received a wishlist item in the Debian BTS and fully agree that it
would make sense to support setting the MTU on a per-tunnel basis. What do you
think?
best regards,
Rene
---BeginMessage---
Package: openswan
Severity: wishlist
Hi,
It sould
Package: live-initramfs
Severity: wishlist
Tags: patch
Justification: cosmetical
The attached patch just adds a check before trying to copy live.log to the
Package: live-initramfs
Version: 1.154.3-1
Severity: wishlist
Tags: patch
To use live-initramfs for the Gibraltar firewall distribution, I ported two
missing features from my own mkinitrd-cd package to work as scripts/hooks
within the initramfs-tools framework and plug
On Monday 13 October 2008, Scott Kitterman wrote:
since /var/run/havp no longer exists. I'll add a patch in a moment.
Thanks, applied!
best regards,
Rene
signature.asc
Description: This is a digitally signed message part.
On Dienstag, 2. Dezember 2008, Vladimir Stavrinov wrote:
The similar configuration is on the other side. There are no problem when
connection initiating from one side of tunnel and VPN are working fine. But
if it is originated from other side, the following scenario are rolling up.
At the
On Dienstag, 2. Dezember 2008, Vladimir Stavrinov wrote:
If this means ip address then it is not true: no address changed. I
have tried to reproduce this situation on the virtual machines with
most close network configuration without success. Changing interfaces
and firewall and
On Sunday 31 August 2008, Jo Shields wrote:
The problem code has actually been released under a new (DFSG-friendly)
license in the development version of Mono, so if you were to prepare a
dpatch file against 1.9.1+dfsg-3 containing System.Web.Extensions from
Mono SVN, we would be open to
Package: libmono-system-web2.0-cil
Version: 1.9.1+dfsg-3
Severity: important
Justification: Non-obvious and non-documented failure by differing from
upstream distribution
The problem with the current packaging is that
System.Web.Extensions.dll is missing without this being obvious. Yes,
it's
Package: ftp.debian.org
Severity: normal
The package has been mostly obsoleted by initramfs-tools. A future version
will be integrated with initramfs-tools and be re-uploaded with just the
added functionality.
-- System Information:
Debian Release: lenny/sid
APT prefers unstable
APT
On Mittwoch, 7. Mai 2008, Stephen Gran wrote:
I tried to warn all of you ahead of time, but I didn't hear anything
back. If you need help porting your application to work with the new
API, let me know and I'll see what I can do.
A patch would certainly be appreciated :)
best regards,
Rene
On Sonntag, 6. April 2008, Christian Perrier wrote:
Among these, the following translations are incomplete: cs es nl pt pt_BR
sv vi
I plan to do a new upload within the next few days and will include all
updates that are currently in BTS.
best regards,
Rene
signature.asc
Description: This is
On Donnerstag, 3. April 2008, Barry deFreese wrote:
If you disagree and want to continue to maintain this package, please
just close this bug and do an upload also fixing the other issues.
A redesign of the whole package to make use of initramfs-tools is currently
pending, but will take a few
On Montag, 31. März 2008, Petter Reinholdtsen wrote:
I was planning to NMU this package to solve bugs #459872 and #431703,
but am unable to do so because the source fail to build due to this
bug.
According to popcon.debian.org, there are no installations using this
package, which might be
On Freitag 28 März 2008, Vincent Bernat wrote:
Will OpenSwan 2.5.x be packaged to solve this bug? Is any help needed?
I'm in the process of updating openswan to the latest 2.4.x now (2.4.12 is
supposed to work with kernels 2.6.22 according to the changelog) - 2.5 seems
to be unstable at the
Package: wnpp
Severity: wishlist
Owner: Rene Mayrhofer [EMAIL PROTECTED]
* Package name: placelab-linux
Version : 2.1
Upstream Author : Intel research labs
* URL : http://www.placelab.org/
* License : GPL
Programming Lang: Java with some native code
On Mittwoch 16 Januar 2008, Horst Vissel wrote:
Bug ist fixed in upstream till 08-25-07.
Any chance that the patch will be included in the debian package soon?
I'll try to do an upload as soon as possible.
best regards,
Rene
--
-
Gibraltar
Subject: ppp: Please support arbitrary interface names
Package: ppp
Version: 2.4.4rel-9
Severity: normal
Justification (for not being wishlist): because selectable interface names are
becoming necessary on today's increasingly complex ADSL, UMTS; etc.
configrations
Tags: patch, upstream
***
On Freitag 14 Dezember 2007, you wrote:
Looking at what it does, I think it doesn't need to be specific to
vlan. Couldn't you as well rename any interface with a name
parameter?
Yes, very true. But renaming vlan interfaces is a special case, not only
because they are removed again by
`
+VLANBASE=echo $IFACE|sed s/\..*//g
;;
*)
@@ -55,6 +57,12 @@
vconfig add $IF_VLAN_RAW_DEVICE $VLANID
fi
+# addition to allow for arbitrary names, Rene Mayrhofer, 2006-03-30
+# if the name doesn't fit in one of the standard schemes, rename now before
activating
+if [ -n $VLANBASE -a $VLANBASE
Subject: linux-image-2.6.18-5-xen-686: kernel BUG on drbd disconnect
Package: linux-image-2.6.18-5-xen-686
Version: 2.6.18.dfsg.1-13etch4
Severity: important
My cluster of 2 Debian etch boxes (on Intel CPUs with vmx support) running
drbd8 on Linux kernel packages linux-image-2.6.18-4-xen-686
On Samstag 10 November 2007, Christian Perrier wrote:
Quoting Rene Mayrhofer ([EMAIL PROTECTED]):
On Montag 05 November 2007, Christian Perrier wrote:
Please find attached the french debconf templates update, proofread by
the debian-l10n-french mailing list contributors.
The templates
On Montag 05 November 2007, Christian Perrier wrote:
Please find attached the french debconf templates update, proofread by the
debian-l10n-french mailing list contributors.
The templates file is no longer called strongswan.templates.master, but
strongswan.templates - which is why I changed the
On Samstag 27 Oktober 2007, Matthias Julius wrote:
You seem to agree with me that there should be no space
before a question mark. And this is exactly what the patch
does. It removes all the spaces that currently are in front
of question marks.
Sorry, you're right (seems I read the patch the
On Samstag 13 Oktober 2007, Uwe Storbeck wrote:
The key generation during the openswan installation took more than 40
minutes on my system without any warning. The installation hung between
the following two lines:
Setting up openswan (2.4.6+dfsg.2-1.1) ...
Successfully created a plain
On Sonntag 26 August 2007, Luk Claes wrote:
On Sun, Aug 26, 2007 at 12:20:46PM +0200, Joerg Jaspert wrote:
tags 438738 moreinfo
thanks
Hi
Hi Rene
uclibc is about to be removed, though one of your packages depends on
it. Can you please adopt uclibc, ask for removal of gibraltar-bootcd
On Samstag, 23. Juni 2007, Brice Goglin wrote:
I am contacting all of you again since everybody does not agree whether
this bug is fixed or not. It could be related to which chipset you have.
It would be good if all of you could try with the latest
xserver-xorg-video-intel driver (2:2.0.0-5
On Donnerstag, 24. Mai 2007 15:18, Roberto Lumbreras wrote:
: What is the status of this bug now that xserver-xorg-core 1.3 and
: xserver-xorg-video-intel 2.0 are in unstable?
:
: Did you guys see Brandon Philips' comment:
: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=390913;msg=38
On Samstag, 21. April 2007 13:24, you wrote:
What is the status of this bug now that xserver-xorg-core 1.3 and
xserver-xorg-video-intel 2.0 are in unstable?
I'll try to test it today.
Rene
pgpG0NvuZSzrn.pgp
Description: PGP signature
On Samstag, 21. April 2007 19:09, Rene Mayrhofer wrote:
On Samstag, 21. April 2007 13:24, you wrote:
What is the status of this bug now that xserver-xorg-core 1.3 and
xserver-xorg-video-intel 2.0 are in unstable?
I'll try to test it today.
Solved for me with
xserver-xorg
Am Samstag, 14. April 2007 21:27 schrieb Björn Heide:
Because there was already an user havp on my machine (left behind from
an old havp install) the chown commands never got executed.
Thanks for the quick analysis - I have an idea on how to solve the problem,
but I will probably need some time
And just for completeness, I want to add that the patch works nicely. drbd8
and ocfs2 can be used together with no visible side-effects.
If anybody of the kernel team has time to add this, it would help admins
trying to create highly available file systems.
Rene
pgpomzOYfHHCp.pgp
This patch has been fetched from
http://gateway.total-knowledge.com/cgi-bin/gitweb.cgi?p=linux-mips.git;a=commitdiff;h=b559292e066f6d570cd5aa5dbd41de61dd04bdce;hp=925037bcba7691db2403684141a276930ad184f3
and is already in upstream 2.6.20, so should be OK to apply even for etch.
Rene
From:
Am Mittwoch, 28. Februar 2007 13:59 schrieb Stephen Gran:
tags 409690 + patch
thanks
Hi,
Attached is the diff for my havp 0.82-1.1 NMU.
I plan to upload in the next day or two, unless you have any objections.
Please wait for a few more days, I'm in the process of preparing a new upload
After reading the last entry in this bug report, I tried 1.7.2-3. The
changelog of 1.7.2-2 indicates that the issue may have been solved by an
upstream patch, but unfortunately it is not.
Suspending to RAM leaves the X server failing after resume. That is, the X
server still crashes over and
Am Sonntag, 3. Dezember 2006 00:46 schrieb Martín Ferrari:
This package seems to be unmaintained. As is also uninstallable on
default setups (it requires a special mount option on /var!!),
wouldn't it be reasonable to remove it from testing? (popcon reports
only 15 installs)
Not unmaintained,
Am Samstag, 28. Oktober 2006 15:54 schrieb Chris Purves:
I just got openswan working using preshared keys. I couldn't get it
to work until I installed the ppp package, but it's not listed as a
dependency or recommended package.
Do you use Xauth? Else pppd should not be needed, and it's not a
Am Wednesday 04 October 2006 18:37 schrieb Paul Wouters:
openswan series 2.4 is our stable tree. Development is happening in
2.5.x (git #public) and 2.6.x (git #ocf). Debian stable should upgrade
their openswan to 2.4.x
I talked to the release manager. This won't happen. But the next Debian
Am Wednesday 04 October 2006 20:43 schrieb Michael Richardson:
Should we go to dated releases?
openswan-2006q4.tar.gz or something.
and then in hindsight, give them version #s that indicate stability?
Would that make it easier for the release manager to understand that
we do not
Package: kmail
Version: 4:3.5.4-1
Severity: grave
Justification: make package nearly unusable with cachedimap and can
Since a recent update (I think it was from 3.5.3-something to
3.5.4-1), KMail now displays very annoying warning messages in the
style of
Warning - Kontact:
Mails on the server
Am Wednesday 24 May 2006 13:26 schrieb Stefan Huehner:
your package depends on 'coreutils | fileutils'. The latter has been
replaced by coreutils a long time ago (before sarge).
Please consider changing the dependency to coreutils.
The dependency is still in there to support backporting to
Package: kscreensaver-xsavers
Version: 4:3.5.4-1
Severity: wishlist
The xscreensavers package has one nice screen saver that is not added
to KDE by: the WebCollage screen saver. Without any translations, this
webcollage.desktop file seems to work for me:
Package: wnpp
Severity: wishlist
Owner: Rene Mayrhofer [EMAIL PROTECTED]
strongswan is the second fork of the freeswan code basis besided the
openswan package. It has diverged far enough to warrant its own package.
* Package name : strongswan
Version : 2.7.1
Upstream Author
Am Friday 09 June 2006 18:28 schrieb Steinar H. Gunderson:
Aha, you are using CONFIG_HIPPI -- that's marked as experimental and is
rather obscure. (It seems to be some kind of supercomputer networking
standard.) The offending lines are:
#ifdef CONFIG_HIPPI
Am Tuesday 06 June 2006 19:15 schrieb Steinar H. Gunderson:
You mean #363375? I could have a look at it, but I doubt I could be of too
much use.
Yes, the compilation problem - it would be also helpful if you can reproduce
it.
Thanks for the NMU,
Rene
pgpqdtKgDrJje.pgp
Description: PGP
Am Tuesday 06 June 2006 18:03 schrieb Steinar H. Gunderson:
Attached is the diff for my openswan 1:2.4.5+dfsg-0.1 NMU. (Note that
all the changes, except for the one to debian/changelog, are done in the
upstream tarball.)
Thanks, I will apply it as soon as possible (but am currently _very_ busy
Am Sunday 16 April 2006 00:31 schrieb Pieter Jansen:
Does not compute.. I never saw anything apart from this message..
I've got no clue as to the current status of this bugreport :)
Hmm, then my last message does not seem to have come through. Strange...
The IKE server packages in Debian now
Am Tuesday 11 April 2006 14:02 schrieb Lupe Christoph:
I should have checked before using so much time on trying to get the
2.4.4 version going. The OpenSWAN project released 2.4.5 a few days ago.
That version is supposed to work with the 2.6.15 kernel.
I don't think I can close this bug as a
Package: libwbxml2
Version: 0.9.0-3
Severity: wishlist
The syncml plugin for opensync needs a patch to be applied to libxml2. I
applied it here locally to the debian package, and besides two files which
have already been patched, it applies cleanly. Details on the patch can be
found at
This bug has been fixed in newer upstream versions, see #292132.
Rene
pgpL2taEf5tjT.pgp
Description: PGP signature
Am Tuesday 04 April 2006 14:25 schrieb Rene Mayrhofer:
This bug has been fixed in newer upstream versions, see #292132.
But you are right, it should be fixed for sarge too. I just don't know if it
can be fixed without updating to the new upstream version...
Rene
Am Thursday 16 March 2006 08:06 schrieb Christian Perrier:
Attached is the patch for the NMU I just uploaded in the DELAYED/2-day
queue (to give you some opportunity to block it in case you disagree
with a part of it).
Thanks - the diff is against another version you did to enable XAUTH
Am Monday 13 March 2006 11:08 schrieb Christian Perrier:
I fail to understand why this issue, which seems trivial, is not yet
fixed.
Honestly, lack of time
I went on it while trying to build a custom openswan on my system and
I hereby propose to quickly build a NMU to fix this FTBFS.
Am Monday 13 March 2006 17:05 schrieb Christian Perrier:
OK, I'll try to do this NMU.
If you're OK, I can also try to deal with the pending bug (from
Clytie) mentioning typos/errors in the debconf templates and handle
this without breaking existing translations.
And, while I'm at it, I can
Package: libpcsclite1
Severity: normal
Please move the symbolic link libpcsclite.so to the main library package so
hat the library can be found under that name. At least one application that I
use needs that symlink (a Java applet).
[For details please see the bottom of
Am Montag 19 September 2005 22:40 schrieb Steve Langasek:
FWIW, Wouter Verhelst has made progress on identifying the gcc bug causing
these problems, so I'm not sure how much good it does to file per-package
bugs about this issue now.
I agree that automatically filing bugs with severity serious
Am Dienstag 20 September 2005 10:31 schrieb Steve Langasek:
You seem to be agreeing with something I didn't say. :) I only pointed out
that progress is being made on fixing the toolchain; when this was not the
case, I certainly encouraged maintainers to lower the optimization level
they were
Am Montag 19 September 2005 15:06 schrieb Stephen R Marenka:
Package: openswan
Version: 1:2.2.0-11
Severity: serious
Justification: fails to build on release candidate arch.
Tags: sid
openswan fails to build from source on m68k. This is likely due
to bug #317475 on gcc-4.0. As a
On Wednesday 03 August 2005 11:19, Pieter Jansen wrote:
had to manually (apt-get remove) racoon before installation of openswan
would continue
But this is intended, since only one IKE daemon can be active at a time. For
this reason, it has been agreed between the IPSec package maintainers that
Am Thursday 26 May 2005 19:48 schrieb Len Sorensen:
I don't see 2.2.0-7 in sarge yet (at least proposed updates on
ftp.debian.org when I connect still says 2.2.0-6) so I don't think this
bug should be closed until it actually makes it into the archive.
I hope that 2.2.0-8 should hit testing
Am Samstag, 21. Mai 2005 15:59 schrieb Steve Langasek:
The only sane way to get 2.2.0-5 back into testing now would be with an
epoched upload to unstable. I'd still be happy to let it into sarge if you
wanted to do this, as I agree with those who say it's an important piece of
software; even
Hi all,
Does anybody want to test the current openswan 1:2.2.0-7 packages at
http://www.gibraltar.at/~rene/openswan/
or should I upload to unstable? If nobody can give it a try, I intent to
upload tomorrow morning (GMT+2).
with best regards,
Rene
pgpzY0AcGY7xT.pgp
Description: PGP signature
Am Freitag, 20. Mai 2005 07:10 schrieb Steve Langasek:
I'm happy to let openswan 2.3.0-2 in now if the maintainer thinks it's
ready, but IIRC he had some other concerns about 2.3 that were unrelated to
this bug. Rene?
Yes, a pluto (IKE daemon) crash that is triggered by openswan 2.3.(0|1).
Hi Bdale,
Am Donnerstag, 19. Mai 2005 00:25 schrieb Bdale Garbee:
Release team, please allow openswan back into sarge. We had freeswan in
woody, and it's still in sarge. Unfortunately, freeswan is no longer
maintained upstream, openswan is where development continues. See
www.freeswan.org
Carl T. Miller schrieb:
Can you tell me what I need to do to support the ipsec* interfaces?
The ipsec* interfaces are only provided by the KLIPS IPSec stack.
Freeswan does not support 2.6 kernels, only openswan = 2.3.0 properly
supports them.
Also, can the package description and documentation
Carl T. Miller schrieb:
This explains what I'm seeing now. Both sides of the tunnel
show that the tunnel is up. A route is added for each remote
lan using the default gateway. If I try to ping a host on
the remote lan (it's an unrouteable address) I get an error
from the gateway saying
Carl T. Miller schrieb:
I'm running the standard kernel that installs with Sarge on
the i386. I've installed ipsec-tools. Am I just missing
something?
The native IPSec stack in kernel 2.6 does not have the virtual ipsec*
interfaces, the support is different.
with best regards,
Rene
--
To
Am Freitag, 1. April 2005 13:33 schrieb bear:
I have the same problem with ppp-2.4.3 and pptpd-1.2.1-2.
The ppp-2.4.2 is OK. Please help!
I don't use that plugin on my systems, so I can't easily try it out. However,
I have investigated the issue and would propose the following fix:
$ apt-get
Hi Thomas,
Am Freitag, 25. März 2005 10:15 schrieb Thomas Lange:
the new mkinitrd-cd version is fantastic, but it does not work at all
for a 2.6 kernel, since it does not find all .ko kernel modules
needed. The patch is attached.
Thank you very much for the patch! I am still using it with 2.4
Hi Joey,
On Friday 28 January 2005 07:28, Martin Schulze wrote:
Stack-based buffer overflow in the get_internal_addresses function in
the pluto application for Openswan 1.x before 1.0.9, and Openswan 2.x
before 2.3.0, when compiled XAUTH and PAM enabled, allows remote
authenticated attackers
Hi Joey,
Am Donnerstag, 27. Januar 2005 07:34 schrieb Martin Schulze:
Package: openswan
Severity: grave
Tags: security sarge sid patch
Please see the advisory and patch here:
http://www.idefense.com/application/poi/display?id=190type=vulnerabilities
flashstatus=false
Even though iDEFENSE
Dear Joerg,
On Tuesday 25 January 2005 11:23, Joerg Morbitzer wrote:
I am running Debian testing on my main vpn gateway using openswan
2.2.0, the same setup is on all of my road-warriors.
Yesterday one road-warrior was upgraded to Debian unstable with
openswan 2.3.0, since then the openswan
On Friday 21 January 2005 19:37, Stephen Quinney wrote:
Upon investigation I found that debian/rules is calling two scripts:
build-discover (which attempts to download the source for curl, expat
and discover) and build-paste (which attempts to grab the source for
coreutils). This is total and
On Monday 17 January 2005 19:24, Markus Kolb wrote:
This is a release critical bug.
I don't think it is release critical - it works with modules, just the
additional ciphers are not available. And they are not mandatory by the IPSec
RFCs.
When there will be a new revision of this package?
91 matches
Mail list logo