-------------------------------------------------------------------------------- Fedora EPEL Update Notification FEDORA-EPEL-2014-1415 2014-05-16 02:22:27 --------------------------------------------------------------------------------
Name : xl2tpd Product : Fedora EPEL 6 Version : 1.3.6 Release : 1.el6 URL : https://github.com/xelerance/xl2tpd/ Summary : Layer 2 Tunnelling Protocol Daemon (RFC 2661) Description : xl2tpd is an implementation of the Layer 2 Tunnelling Protocol (RFC 2661). L2TP allows you to tunnel PPP over UDP. Some ISPs use L2TP to tunnel user sessions from dial-in servers (modem banks, ADSL DSLAMs) to back-end PPP servers. Another important application is Virtual Private Networks where the IPsec protocol is used to secure the L2TP connection (L2TP/IPsec, RFC 3193). The L2TP/IPsec protocol is mainly used by Windows and Mac OS X clients. On Linux, xl2tpd can be used in combination with IPsec implementations such as Openswan. Example configuration files for such a setup are included in this RPM.
xl2tpd works by opening a pseudo-tty for communicating with pppd. It runs completely in userspace.
xl2tpd supports IPsec SA Reference tracking to enable overlapping internak NAT'ed IP's by different clients (eg all clients connecting from their linksys internal IP 192.168.1.101) as well as multiple clients behind the same NAT router.
xl2tpd supports the pppol2tp kernel mode operations on 2.6.23 or higher, or via a patch in contrib for 2.4.x kernels.
Xl2tpd is based on the 0.69 L2TP by Jeff McAdams jeffm@iglou.com It was de-facto maintained by Jacco de Leeuw jacco2@dds.nl in 2002 and 2003.
-------------------------------------------------------------------------------- Update Information:
Updated to 1.3.6 which fixes listening on the ANY address and revert of ipparam manipulation -------------------------------------------------------------------------------- References:
[ 1 ] Bug #1051785 - xl2tpd-1.3.7dev1 is available https://bugzilla.redhat.com/show_bug.cgi?id=1051785 [ 2 ] Bug #868391 - xl2tpd sends response packets from wrong IP address https://bugzilla.redhat.com/show_bug.cgi?id=868391 [ 3 ] Bug #929447 - Incorrect "ipparam" manipulation https://bugzilla.redhat.com/show_bug.cgi?id=929447 --------------------------------------------------------------------------------
This update can be installed with the "yum" update programs. Use su -c 'yum update xl2tpd' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora EPEL GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------
epel-package-announce@lists.fedoraproject.org