Some vpn using ipsec requires EAP methods, such as eap-mschapv2 for example, which are not provided by openswan nor libreswan (adding eap methods to libreswan is part of a GSOC 2019 project, but not available for now) At the moment, only strongswan has support for eap-mschapv2. Fedora already has an SRPM for strongswan since a few release. Could the Fedora's SRPM be ported to Mageia ? Thanks
Thank you Nicolas for this suggestion, and the information you provide with it. > (adding eap methods to libreswan is part of a GSOC 2019 project, but not > available for now) But hopefully will be soon, at which time we should be able to take it on board with libreswan. Assigning this package request to all packagers collectively. On a voluntary basis, one of them might, if there are no license or other legal issues, want to integrate it to the distribution and maintain it for bug and security fixes. CCing Stig because he does libreswan. You might also want to join the packager team to maintain this piece of software: see https://wiki.mageia.org/en/Becoming_a_Mageia_Packager
Assignee: bugsquad => pkg-bugsSummary: add strongswan for ipsec and eap => strongswan for ipsec and eap: NEW PACKAGE REQUESTCC: (none) => smelrorSeverity: normal => enhancementSource RPM: (none) => libreswan
Not needed, as we have libreswan. *** This bug has been marked as a duplicate of bug 23376 ***
Status: NEW => RESOLVEDResolution: (none) => DUPLICATE
Except libreswan doesn't support EAP and will not do so until the GSOC project is completed (assuming the GSOC reaches all the goals that were assigned, which is not sure yet)
Hi GSOC 2019 is closed and one can see on libreswan page that EAP support was not added to libreswan (and no mention of ongoing work in libreswan mailing list) For now, strongswan remains the only solution to connect to IPSEC in enterprise networks relying on EAP (which seems very common as a requirement). In that case, could strongswan be added to mageia cauldron for next release ? Thanks
Status: RESOLVED => REOPENEDResolution: DUPLICATE => (none)
Not without someone commit to track all of its vulnerabilities and support it in a stable release. *** This bug has been marked as a duplicate of bug 23376 ***
Resolution: (none) => DUPLICATEStatus: REOPENED => RESOLVED