How to Install and Uninstall strongswan Package on openSuSE Tumbleweed

Last updated: May 17,2024

1. Install "strongswan" package

Here is a brief guide to show you how to install strongswan on openSuSE Tumbleweed

$ sudo zypper refresh $ sudo zypper install strongswan

2. Uninstall "strongswan" package

Please follow the step by step instructions below to uninstall strongswan on openSuSE Tumbleweed:

$ sudo zypper remove strongswan

3. Information about the strongswan package on openSuSE Tumbleweed

Information for package strongswan:
-----------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : strongswan
Version : 5.9.13-2.1
Arch : x86_64
Vendor : openSUSE
Installed Size : 2.3 KiB
Installed : No
Status : not installed
Source package : strongswan-5.9.13-2.1.src
Upstream URL : https://www.strongswan.org/
Summary : IPsec-based VPN solution
Description :
StrongSwan is an IPsec-based VPN solution for Linux.
* Implements both the IKEv1 and IKEv2 (RFC 4306) key exchange protocols
* Fully tested support of IPv6 IPsec tunnel and transport connections
* Dynamic IP address and interface update with IKEv2 MOBIKE (RFC 4555)
* Automatic insertion and deletion of IPsec-policy-based firewall rules
* Strong 128/192/256 bit AES or Camellia encryption, 3DES support
* NAT Traversal via UDP encapsulation and port floating (RFC 3947)
* Dead Peer Detection (DPD, RFC 3706) takes care of dangling tunnels
* Static virtual IP addresses and IKEv1 ModeConfig pull and push modes
* XAUTH server and client functionality on top of IKEv1 Main Mode authentication
* Virtual IP address pool managed by IKE daemon or SQL database
* Secure IKEv2 EAP user authentication (EAP-SIM, EAP-AKA, EAP-MSCHAPv2, etc.)
* Optional relaying of EAP messages to AAA server via EAP-RADIUS plugin
* Support of IKEv2 Multiple Authentication Exchanges (RFC 4739)
* Authentication based on X.509 certificates or preshared keys
* Generation of a default self-signed certificate during first strongSwan startup
* Retrieval and local caching of Certificate Revocation Lists via HTTP or LDAP
* Full support of the Online Certificate Status Protocol (OCSP, RCF 2560).
* CA management (OCSP and CRL URIs, default LDAP server)
* Powerful IPsec policies based on wildcards or intermediate CAs
* Group policies based on X.509 attribute certificates (RFC 3281)
* Storage of RSA private keys and certificates on a smartcard (PKCS #11 interface)
* Modular plugins for crypto algorithms and relational database interfaces
* Support of elliptic curve DH groups and ECDSA certificates (Suite B, RFC 4869)
* Optional built-in integrity and crypto tests for plugins and libraries
* Linux desktop integration via the strongSwan NetworkManager applet
This package triggers the installation of both, IKEv1 and IKEv2 daemons.