INSTALL 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148
  1. -------------------------
  2. strongSwan - Installation
  3. -------------------------
  4. Contents
  5. --------
  6. 1. Overview
  7. 2. Required packages
  8. 3. Optional packages
  9. 3.1 HTTP fetcher
  10. 3.2 LDAP
  11. 3.3 Other pluggable modules
  12. 4. Kernel configuration
  13. 1. Overview
  14. --------
  15. Since version 4.x strongSwan uses the GNU build system (Autotools).
  16. This simplifies the build process and package maintenance. First, check for
  17. the availability of required packages on your system (section 2.). You may
  18. want to include support for additional features, which require other
  19. packages to be installed (section 3.).
  20. To compile an extracted tarball, run the ./configure script first:
  21. ./configure
  22. You may want to specify some arguments listed in section 3., or see the
  23. available options of the script using "./configure --help".
  24. After a successful run of the script, run
  25. make
  26. followed by
  27. make install
  28. in the usual manner.
  29. To check if your kernel fulfills the requirements, see section 4.
  30. Next add your connections to "/etc/ipsec.conf" and your secrets to
  31. "/etc/ipsec.secrets".
  32. At last start strongSwan with
  33. ipsec start
  34. 2. Required packages
  35. -----------------
  36. In order to be able to build strongSwan you'll need one of the following
  37. cryptographic libraries:
  38. * The GNU Multiprecision Arithmetic Library (GMP, libgmp)
  39. http://www.gmplib.org
  40. * The OpenSSL cryptographic library (libcrypto)
  41. http://www.openssl.org
  42. * The GNU cryptographic library (libgcrypt)
  43. http://www.gnupg.org
  44. If no other options are specified during ./configure libgmp will be used.
  45. The libraries and the corresponding header files are usually included in
  46. the form of one or two packages in the major Linux distributions (for GMP on
  47. Debian: libgmp3 and libgmp3-dev).
  48. 3. Optional packages
  49. -----------------
  50. 3.1 HTTP Fetcher
  51. ------------
  52. If you intend to dynamically fetch Certificate Revocation Lists (CRLs)
  53. from an HTTP server or as an alternative want to use the Online
  54. Certificate Status Protocol (OCSP) then you will need the either of the
  55. following libraries:
  56. * The cURL library (libcurl)
  57. http://curl.haxx.se/libcurl/
  58. * The LibSoup library (libsoup)
  59. https://live.gnome.org/LibSoup
  60. In order to activate the use of either of these libraries in strongSwan you
  61. must enable the appropriate ./configure switch.
  62. 3.2 LDAP
  63. ----
  64. If you intend to dynamically fetch Certificate Revocation Lists (CRLs)
  65. from an LDAP server then you will need the libldap library available
  66. from http://www.openldap.org/.
  67. OpenLDAP is usually included with your Linux distribution. You will need
  68. both the run-time and development environments (SuSE: openldap2,
  69. openldap2-devel).
  70. In order to activate the use of the libldap library in strongSwan you must
  71. enable the ./configure switch:
  72. ./configure [...] --enable-ldap
  73. LDAP Protocol version 2 is not supported anymore, --enable-ldap uses always
  74. version 3 of the LDAP protocol
  75. 3.3 Other pluggable modules
  76. -----------------------
  77. There are many other optional plugins that, for instance, provide support
  78. for PKCS#11 or SQL databases.
  79. For a more detailed description of these refer to our wiki:
  80. * http://wiki.strongswan.org
  81. 4. Kernel configuration
  82. --------------------
  83. Since version 4.x strongSwan only supports 2.6.x and 3.x kernels and its
  84. native NETKEY IPsec stack. Please make sure that the following IPsec kernel
  85. modules are available:
  86. * af_key
  87. * ah4
  88. * esp4
  89. * ipcomp
  90. * xfrm_user
  91. * xfrm4_tunnel
  92. These may be built into the kernel or as modules. Modules get loaded
  93. automatically at strongSwan startup.
  94. Also the built-in kernel Cryptoapi modules with selected encryption and
  95. hash algorithms should be available.
  96. Support for multiple routing tables is also recommended.
  97. For a more up-to-date list of recommended modules refer to:
  98. * http://wiki.strongswan.org/projects/strongswan/wiki/KernelModules