./net/openconnect, Open source VPN client

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: CURRENT, Version: 9.12nb4, Package name: openconnect-9.12nb4, Maintainer: schmonz

OpenConnect is an SSL VPN client initially created to support Cisco's
AnyConnect SSL VPN. It has since been ported to support the Juniper SSL VPN
(which is now known as Pulse Connect Secure), and the Palo Alto Networks
GlobalProtect SSL VPN.


Required to run:
[textproc/libxml2] [security/openssl] [www/libproxy] [net/vpnc-script] [lang/python37]

Required to build:
[pkgtools/cwrappers]

Package options: libproxy

Master sites: (Expand)

Filesize: 2776.479 KB

Version history: (Expand)


CVS history: (Expand)


   2024-03-17 12:24:35 by Nia Alarie | Files touched by this commit (2)
Log message:
openconnect: Add a libproxy option.

Compared to the rest of openconncet, it has some heavy C++ requirements.
   2023-11-08 14:21:43 by Thomas Klausner | Files touched by this commit (2377)
Log message:
*: recursive bump for icu 74.1
   2023-10-25 00:11:51 by Thomas Klausner | Files touched by this commit (2298)
Log message:
*: bump for openssl 3
   2023-08-14 07:25:36 by Thomas Klausner | Files touched by this commit (1247)
Log message:
*: recursive bump for Python 3.11 as new default
   2023-05-22 23:00:50 by Thomas Klausner | Files touched by this commit (645)
Log message:
*: bump for libproxy 0.5
   2023-05-20 17:41:19 by Amitai Schleier | Files touched by this commit (2)
Log message:
Update to 9.12. From the changelog:

- Fix FreeBSD build and tests.
- Explicitly reject overly long tun device names.
- Work around ambiguity between <json.h> from json-parser vs
  json-c (!476).
- Fix symbol versioning for openconnect_set_sni().
- Increase maximum input size from stdin (#579).
- Ignore 0.0.0.0 as NBNS address (!446, vpnc-scripts#58).
- Fix Mac OS build of os-tcp-mtu tool (#612).
   2023-05-18 15:55:54 by Amitai Schleier | Files touched by this commit (4)
Log message:
Update to 9.11. From the changelog:

- Rebuild test suite certificate chains (which had expired: #609)
- Fix stray (null) in URL path after Pulse authentication.
- Fix config XML parsing mistake that left GlobalProtect ESP non-working
  in v9.10 (!475).
- Fix case sensitivity in GPST header matching (!474).
- Add external browser support for Windows (#553).
   2023-05-05 15:21:22 by Amitai Schleier | Files touched by this commit (2)
Log message:
Update to 9.10. From the changelog:

- Fix external browser authentication with KDE plasma-nm < 5.26.
- Always redirect stdout to stderr when spawning external browser.
- Increase default queue length to 32 packets (#582).
- Make the Wintun Layer 3 TUN driver the default on Windows (!427).
- Add support for and bundle Wintun 0.14.1 (!294).
- Fix receiving multiple packets in one TLS frame, and single packets
  split across multiple TLS frames, for Array (#435).
- Fix ESP failures under Windows (#427).
- Add list-system-keys tool to assist Windows/MacOS users in setup.
- Handle idiosyncratic variation in search domain separators for all
  protocols (#433, #443, !388).
- Support region selection field for Pulse authentication (!399).
- Support modified configuration packet from Pulse 9.1R16 servers
  (#472, !401)
- Allow hidden form fields to be populated or converted to text fields
  on the command line (#493, #489, !409)
- Support yet another strange way of encoding challenge-based 2FA for
  GlobalProtect (#495, !411)
- Add --sni option (and corresponding C and Java API functions) to allow
  domain-fronting connections in censored/filtered network environments
  (!297, !451).
- Parrot a GlobalProtect server's software version, if present, as the
  client version (!333)
- Fix NULL pointer dereference that has left Android builds broken since
  v8.20 (!389).
- Fix Fortinet authentication bug where repeated SVPNCOOKIE causes
  segfaults (#514, !418).
- Support F5 VPNs which encode authentication forms only in JSON, not in
  HTML (#512, !431).
- Persist Windows installers for tagged builds (#463, !391).
- Support simultaneous IPv6 and Legacy IP ("dual-stack") for Fortinet
  (#568, !456).
- Support "FTM-push" token mode for Fortinet VPNs (#555, !450).
- Send IPv6-compatible version string in Pulse IF/T session
  establishment, and avoid its ESP/IP version layering idiocy on newer
  servers (#506, !414)
- Add --no-external-auth option to not advertise external-browser
  authentication, as a workaround for servers which behave differently
  when it is advertised (#470, !398)
- Emulate MacOS-specific contents in the HIP report for GlobalProtect (!471).
- Many small improvements in server response parsing, and better logging
  messages and documentation.