@damentz What?? I am sharing info with the community. I didn't saw the pinned comment.
Search Criteria
Package Details: awsvpnclient 4.1.0-3
Package Actions
Git Clone URL: | https://aur.archlinux.org/awsvpnclient.git (read-only, click to copy) |
---|---|
Package Base: | awsvpnclient |
Description: | AWS VPN Client |
Upstream URL: | https://aws.amazon.com/vpn/ |
Keywords: | aws aws-clientvpn aws-vpn aws-vpnclient clientvpn |
Licenses: | custom |
Submitter: | project0 |
Maintainer: | project0 |
Last Packager: | project0 |
Votes: | 10 |
Popularity: | 0.90 |
First Submitted: | 2021-06-26 08:56 (UTC) |
Last Updated: | 2024-12-13 18:25 (UTC) |
Dependencies (3)
- lsof (lsof-gitAUR)
- xdg-utils (busking-gitAUR, xdg-utils-slockAUR, mimiAUR, mimi-gitAUR, xdg-utils-handlrAUR, openerAUR, xdg-utils-mimeoAUR, mimejs-gitAUR)
- zstd (zstd-gitAUR, zstd-staticAUR) (make)
Required by (0)
Sources (2)
Latest Comments
« First ‹ Previous 1 2 3 4 5 6 7 .. 10 Next › Last »
amchacon commented on 2024-02-12 09:25 (UTC)
damentz commented on 2024-02-11 14:03 (UTC)
@amchacon, why are you posting randomly a part of the pinned comment without context? If you are testing a llama spam bot, please stop immediately as you are wasting real people's time.
amchacon commented on 2024-02-11 13:47 (UTC) (edited on 2024-02-11 13:48 (UTC) by amchacon)
This package depends from the package systemd-resolvconf in order to make it work with DNS (and therefore, with SAML aswell).
Renember you have to enable the service aswell:
sudo systemctl enable systemd-resolved.service
sudo systemctl start systemd-resolved.service
Mads_Dixa commented on 2024-01-18 14:19 (UTC)
Running Manjaro with KDE plasma v. 5.27.10 on linux kernel 6.6.10-1.
Just updated to latest version 3.12.0-2, but now my client won't boot up.
Getting a long stack trace from journalctl:
systemd-coredump[200181]: [🡕] Process 200159 (AWS VPN Client) of user 1000 dumped core.
Stack trace of thread 200159:
#0 0x00007f78d74ab713 n/a (libgtk-3.so.0 + 0xab713)
#1 0x00007f7979bb1156 g_cclosure_marshal_VOID__OBJECTv (libgobject-2.0.so.0 + 0x13156)
...
plasmashell[1085]: Could not find the Plasmoid for Plasma::FrameSvgItem(0x5564b0b7ba30) QQmlContext(0x5564ad657490) QUrl("file:///usr/share/plasma/plasmoids/org.kde.plasma.notifications/contents/ui/global/Globals.qml")
systemd[1]: Started Process Core Dump (PID 200180/UID 0).
kernel: AWS VPN Client[200159]: segfault at 0 ip 00007f78d74ab713 sp 00007ffff51368e0 error 4 in libgtk-3.so.0.2407.32[7f78d7484000+395000] likely on CPU 6 (core 2, socket 0)
systemd[903]: Started AWS VPN Client.
Can anybody help me to understand what's going on and why this doesn't work.
m4n commented on 2023-10-24 11:39 (UTC)
Hi,
since you already patch the desktop file for KDE. Is it possible that you add the following line to the awsvpnclient.desktop file so the AWS VPN Client icon is shown for the running application under Gnome:
StartupWMClass=AWS VPN Client
Thanks!
edwargix commented on 2023-08-30 18:55 (UTC)
3.9.0 is available, posting proof here since it's hard to read in "Flagged out-of-date" page:
$ curl -Os https://d20adtppz83p9s.cloudfront.net/GTK/latest/awsvpnclient_amd64.deb
$ aunpack awsvpnclient_amd64.deb
$ grep Version awsvpnclient_amd64/DEBIAN/control
Version: 3.9.0
OJFord commented on 2023-04-13 14:48 (UTC) (edited on 2023-04-13 15:36 (UTC) by OJFord)
I'd suggest including @jantman's patch - thanks very much for that - I've been using it since posted with no (observed) negative effects.
Recently I've had login work and then 'connection failed' pop up from the GUI. (i.e. I can't connect at all at present.) I've never tried from CLI before (so I'm not certain of a prior working invocation) but running /opt/awsvpnclient/Service/Resources/openvpn/acvc-openvpn --config <(aws ec2 export-client-vpn-client-configuration --output=text)
gives the same error as reported by @dcunningham.
The logged error (from GUI attempt) is:
2141 2023-04-13 16:16:28.758 +01:00 [DBG] /bin/ps exit code: 1
2142 2023-04-13 16:16:28.758 +01:00 [ERR] [TI=18] Failed to get process owner of PID: 330602. Stdout: , stderr:
2143 2023-04-13 16:16:28.758 +01:00 [WRN] [TI=18] Exception occured checking process alive: System.Exception: Failed to get process owner of PID: 330602
2144 at ACVC.GTK.Service.DBus.OvpnGtkService.GetProcessOwner(Int32 pid) in /home/ubuntu/Jenkins/workspace/GtkBuild/SecureConnectClient/ACVC.GTK.Service/DBus/OvpnGtkService.cs:line 319
2145 at ACVC.GTK.Service.DBus.OvpnGtkService.IsAliveAsync(Int32 pid) in /home/ubuntu/Jenkins/workspace/GtkBuild/SecureConnectClient/ACVC.GTK.Service/DBus/OvpnGtkService.cs:line 228
Note that /home/ubuntu is (somewhat obviously) not a local path, though I assume that's just a quirk of the logging/compilation, not an issue.
dcunningham commented on 2023-04-07 04:30 (UTC)
I'm getting "Options error: Unrecognized option or missing or extra parameter(s) in /home/user/.vpn/config-file.ovpn:14: auth-federate (2.4.5) Use --help for more information."
I believe I need to use auth-federate as my org's documentation implies that the vpn client will open a browser window after it starts up so that I can log in. I have no other credentials to try.
--help is unhelpful making no mention of federated auth. What can I do to have this function correctly?
Shimmy commented on 2023-03-01 15:42 (UTC) (edited on 2023-03-01 15:42 (UTC) by Shimmy)
FWIW I submitted a support ticket and asked our Technical Account Manager to bump it to the team working on the client. So far no action.
IP forwarding is currently disabled when using the AWS Client VPN Desktop Application. It has been disabled since the launch of the service on December 18, 2018, in order to address an issue reported by NIST. We understand, however, that some customers may need this functionality for their services. While we do not have a specific date at this time, we do plan to safely enable IP forwarding in an upcoming release.
And this was in... August 2022. There were releases since, none has fixed it.
If you're up for it, you could do the same - create a support ticket to move this to the team. Maybe if there's enough voices, they will make this higher priority.
jantman commented on 2023-03-01 14:50 (UTC)
Has anyone looked into having it not constantly overwrite sysctl net.ipv4.ip_forward=0?
Yeah. It's a bit of a hack, but after installing or updating I modify /opt/awsvpnclient/Service/Resources/openvpn/configure-dns to turn forwarding back on right after it calls the configure_dns and reset_dns functions.
Pinned Comments
project0 commented on 2021-06-28 15:58 (UTC) (edited on 2024-02-12 11:07 (UTC) by project0)
Please note the following requirements for AWS VPN Client:
If you depend on DNS servers from VPN you need to have a running systemd-resolved.service. Please ensure it does not conflict with any other DNS resolver service or configuration you may use.
sudo systemctl --now enable systemd-resolved.service
You have to enable and start the awsvpnclient.service after installation:
sudo systemctl --now enable awsvpnclient
For troubelshooting its worth checking first the logs:
See also the official docs: https://docs.aws.amazon.com/vpn/latest/clientvpn-user/client-vpn-connect-linux.html
If you face any other problem please check the troubleshooting guide (DNS issues): https://docs.aws.amazon.com/vpn/latest/clientvpn-user/linux-troubleshooting.html#aws-provided-client