Full-featured SSL VPN solution using a TUN/TAP Interface
OpenVPN is a full-featured SSL VPN solution which can accommodate a wide
range of configurations, including remote access, site-to-site VPNs,
WiFi security, and enterprise-scale remote access solutions with load
balancing, failover, and fine-grained access-controls.
OpenVPN implements OSI layer 2 or 3 secure network extension using the
industry standard SSL/TLS protocol, supports flexible client
authentication methods based on certificates, smart cards, and/or
2-factor authentication, and allows user or group-specific access
control policies using firewall rules applied to the VPN virtual
interface.
OpenVPN runs on: Linux, Windows 2000/XP and higher, OpenBSD, FreeBSD,
NetBSD, Mac OS X, and Solaris.
OpenVPN is not a web application proxy and does not operate through a
web browser.
- Developed at network:vpn
- Sources inherited from project openSUSE:Factory
-
9
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Leap:16.0:FactoryCandidates/openvpn && cd $_
- Create Badge
Source Files
Filename | Size | Changed |
---|---|---|
client-netconfig.down | 0000001043 1.02 KB | |
client-netconfig.up | 0000002188 2.14 KB | |
openvpn-2.3-plugin-man.dif | 0000000596 596 Bytes | |
openvpn-2.3.0-man-dot.diff | 0000000228 228 Bytes | |
openvpn-2.3.6.tar.gz | 0001213272 1.16 MB | |
openvpn-2.3.6.tar.gz.asc | 0000000181 181 Bytes | |
openvpn-fips140-2.3.2.patch | 0000012900 12.6 KB | |
openvpn-tmpfile.conf | 0000000036 36 Bytes | |
openvpn.README.SUSE | 0000000821 821 Bytes | |
openvpn.changes | 0000029604 28.9 KB | |
openvpn.init | 0000008255 8.06 KB | |
openvpn.keyring | 0000001697 1.66 KB | |
openvpn.service | 0000000455 455 Bytes | |
openvpn.spec | 0000009455 9.23 KB | |
openvpn.sysconfig | 0000000552 552 Bytes | |
openvpn.target | 0000000097 97 Bytes | |
rcopenvpn | 0000000553 553 Bytes |
Revision 60 (latest revision is 116)
- Update to version 2.3.6 fixing a denial-of-service vulnerability where an authenticated client could stop the server by triggering a server-side ASSERT (bnc#907764,CVE-2014-8104). See ChangeLog file for a complete list of changes.
Comments 0