- add MESSAGE with a suggestion from Tom on misc@ of using hostname.tun*
to start OpenVPN; this sidesteps a problem where openvpn destroys and re- creates the tun interface, which affects PF/altq. - shorten DESCR to better fit 80x24 ok fkr@ (maintainer).
This commit is contained in:
parent
f5f01e75d1
commit
ca503995d7
@ -1,10 +1,10 @@
|
||||
# $OpenBSD: Makefile,v 1.22 2009/05/10 13:59:35 fkr Exp $
|
||||
# $OpenBSD: Makefile,v 1.23 2009/06/18 13:02:40 sthen Exp $
|
||||
|
||||
COMMENT= easy-to-use, robust, and highly configurable VPN
|
||||
|
||||
VERSION= 2.1_rc15
|
||||
DISTNAME= openvpn-${VERSION}
|
||||
PKGNAME= ${DISTNAME:S/_//g}p1
|
||||
PKGNAME= ${DISTNAME:S/_//g}p2
|
||||
CATEGORIES= net security
|
||||
|
||||
HOMEPAGE= http://openvpn.net/
|
||||
|
@ -1,37 +1,8 @@
|
||||
OpenVPN is an easy-to-use, robust, and highly configurable VPN (Virtual
|
||||
Private Network) daemon which can be used to securely link two or more
|
||||
private networks using an encrypted tunnel over the internet.
|
||||
OpenVPN is an easy-to-use, robust, highly configurable, cross-platform
|
||||
VPN (Virtual Private Network) daemon which can be used to securely link
|
||||
two or more private networks using an encrypted tunnel over the internet.
|
||||
|
||||
With OpenVPN, you can:
|
||||
|
||||
* tunnel any IP subnetwork or virtual ethernet adapter over a single UDP
|
||||
or TCP port,
|
||||
|
||||
* create cross-platform tunnels between any of the operating systems
|
||||
supported by OpenVPN including Linux, Solaris, OpenBSD, FreeBSD, NetBSD,
|
||||
Mac OS X, and Windows 2000/XP,
|
||||
|
||||
* use all of the encryption, authentication, and certification features
|
||||
of the OpenSSL library to protect your private network traffic as it
|
||||
transits the internet,
|
||||
|
||||
* use any cipher, key size, or HMAC digest (for datagram authentication)
|
||||
supported by the OpenSSL library,
|
||||
|
||||
* choose between static-key based conventional encryption or
|
||||
certificate-based public key encryption,
|
||||
|
||||
* use static, pre-shared keys or TLS-based dynamic key exchange,
|
||||
|
||||
* use real-time adaptive link compression and traffic-shaping to manage
|
||||
link bandwidth utilization,
|
||||
|
||||
* tunnel networks whose public endpoints are dynamic such as DHCP or
|
||||
dial-in clients,
|
||||
|
||||
* tunnel networks through connection-oriented stateful firewalls without
|
||||
having to use explicit firewall rules,
|
||||
|
||||
* tunnel networks over NAT, and
|
||||
|
||||
* create secure ethernet bridges using virtual tap devices.
|
||||
It can forward a tun(4) interface over a single UDP or TCP port with
|
||||
support for NAT, dynamic endpoints, compression, fragmentation and keep-
|
||||
alive. It uses OpenSSL's encryption, authentication, and certification
|
||||
features, with static keys, certificates or TLS-based key exchange.
|
||||
|
7
net/openvpn/pkg/MESSAGE
Normal file
7
net/openvpn/pkg/MESSAGE
Normal file
@ -0,0 +1,7 @@
|
||||
OpenVPN re-creates the tun(4) interface at startup; compatibility
|
||||
with PF is improved by starting it from hostname.if(5). For example:
|
||||
|
||||
# cat << EOF > /etc/hostname.tun0
|
||||
up
|
||||
!${TRUEPREFIX}/sbin/openvpn --daemon --config ${SYSCONFDIR}/openvpn/server.conf
|
||||
EOF
|
Loading…
Reference in New Issue
Block a user