Search Criteria
Package Details: f5vpn 7250.2024.1008.1-2
Package Actions
Git Clone URL: | https://aur.archlinux.org/f5vpn.git (read-only, click to copy) |
---|---|
Package Base: | f5vpn |
Description: | VPN client using the Point-to-Point Protocol to connect to F5Networks BIG-IP APM |
Upstream URL: | https://support.f5.com/csp/article/K32311645#link_04_05 |
Licenses: | Commercial |
Provides: | f5vpn |
Submitter: | zrhoffman |
Maintainer: | zrhoffman |
Last Packager: | zrhoffman |
Votes: | 12 |
Popularity: | 0.25 |
First Submitted: | 2019-12-27 08:37 (UTC) |
Last Updated: | 2024-11-21 20:16 (UTC) |
Dependencies (3)
- openssl (openssl-gitAUR, openssl-staticAUR)
- qt5-base (qt5-base-gitAUR, qt5-base-headlessAUR)
- qt5-base (qt5-base-gitAUR, qt5-base-headlessAUR) (make)
Latest Comments
« First ‹ Previous 1 2 3 4 5 6 7
<deleted-account> commented on 2020-03-16 20:36 (UTC)
Thanks so far!! You have my vote.
zrhoffman commented on 2020-03-16 18:37 (UTC)
Since the issue you are facing is not related to the packaging of
f5vpn
, discussion related to it is better-suited for the Arch Linux forums or IRC.<deleted-account> commented on 2020-03-16 17:58 (UTC)
I think I understand the concept, but none of the methods I read so far really describe applying a passphrase-protected pk12 client cert 'kit' with privatekey to the entire system.
They only thing I have been able to do is apply the CA systemwide, and break the PKCS into pem pieces.
Applying a specific user/client PKCS "kit" systemwide remains a mystery to me.
Ill keep searching.
zrhoffman commented on 2020-03-16 16:51 (UTC)
That CA cert and user cert should be added system-wide. You shouldn't have to specify them with curl. https://wiki.archlinux.org/index.php/Transport_Layer_Security
<deleted-account> commented on 2020-03-16 14:18 (UTC)
Hello,
Yeah i just recently found the log folder. :-)
I think it is because we use a PKCS#12 certificate per user. I manually imported this into my browser to acces the webpage, but I have no idea how to tackle this for your application
Here are the logs that confirm it:
Now, If I use my ps12 certstuff manually;
Dont mind the CLASSIFIED, its to hide the sensitive information of our servers. But that curl works. I can see my profile.
My SSL knowledge/experience is too low how to make your tool use my personal certificate. I think this is the problem. What do you think?
zrhoffman commented on 2020-03-16 13:46 (UTC)
You might get some info on what is failing from the logs inside
~/.F5Networks/
.One possibility is that the RPM version the AUR package uses is too old or too new for your server. You could try rebuilding the package using an RPM downloaded directly from
https://[server]/public/download/linux_f5vpn.x86_64.rpm
.<deleted-account> commented on 2020-03-16 12:32 (UTC)
Update: followed your instructions on https://github.com/zrhoffman/f5vpn-arch/.
I did get a valid f5-vpn:// url, after making the browser import all the needed certificates. I gave it to the f5vpn as instructed, got a trust popup, but then it showed nothing and it appears to stop.
Ill keep searching.
<deleted-account> commented on 2020-03-16 11:57 (UTC)
Im opening f5vpn and nothing happens, I can't even seem to trace the problem. I can see it running for a while and then it just gives up.
Any idea what Im missing here? I'd love to see this program work!
« First ‹ Previous 1 2 3 4 5 6 7