Bug 1081805 - RFE: Enable Kernel IPSec support
Summary: RFE: Enable Kernel IPSec support
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Fedora EPEL
Classification: Fedora
Component: strongswan
Version: el6
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Pavel Šimerda (pavlix)
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On: 1081804
Blocks:
TreeView+ depends on / blocked
 
Reported: 2014-03-28 03:37 UTC by Christopher Meng
Modified: 2014-04-16 19:38 UTC (History)
3 users (show)

Fixed In Version:
Clone Of: 1081804
Environment:
Last Closed: 2014-04-16 19:38:25 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)

Description Christopher Meng 2014-03-28 03:37:13 UTC
+++ This bug was initially created as a clone of Bug #1081804 +++

Description of problem:

Since strongSwan 5.1.0, it provides a plugin called kernel-libipsec which provides an IPsec backend that works entirely in userland, using TUN devices and its own IPsec implementation libipsec to emulate the IPSec.

Fedora has compiled kernel interface kernel-netlink, it installs IPsec SAs in the operating system's IPsec stack. libipsec plugin provides an alternative for OS implementation does not support a required algorithm.

Enable this plugin doesn't mean to drop the netlink interface, on the contrary, the kernel backend is still required, therefore kernel-netlink is needed as well, and that's not a problem.

This option is really useful for OpenVZ based virtualization.

Version-Release number of selected component (if applicable):
strongswan-5.1.2-4.fc21

Additional info:

Pass "--enable-kernel-libipsec" option to %configure will enable support of libipsec, I've created a patch of the RPM spec, you can apply it from the attachment.

Please enable this option on EPEL also.

Thanks.

Comment 1 Pavel Šimerda (pavlix) 2014-04-16 19:38:25 UTC
So far epel uses whatever is prepared in rawhide. This bug report won't be needed.


Note You need to log in before you can comment on or make changes to this bug.