Package Details: globalprotect-bin 6.0.1.1-6

Git Clone URL: https://aur.archlinux.org/globalprotect-bin.git (read-only, click to copy)
Package Base: globalprotect-bin
Description: GlobalProtect VPN client Agent
Upstream URL: https://docs.paloaltonetworks.com/globalprotect/5-2/globalprotect-app-user-guide/globalprotect-app-for-linux/download-and-install-the-globalprotect-app-for-linux
Licenses: custom
Submitter: hoban
Maintainer: None
Last Packager: hoban
Votes: 6
Popularity: 0.014414
First Submitted: 2022-07-27 23:33 (UTC)
Last Updated: 2022-09-27 15:43 (UTC)

Latest Comments

1 2 Next › Last »

swdmnd commented on 2025-04-20 11:32 (UTC) (edited on 2025-04-20 11:32 (UTC) by swdmnd)

@slowbro doesn't work for me. I found a reddit post that works for me.

Replace "Ubuntu" with "Arch L" (or whatever from lsb_release -ds, the first 6 characters) in PanGPS

sed -i "s/\x55\x62\x75\x6e\x74\x75/\x41\x72\x63\x68\x20\x4c/g" /opt/paloaltonetworks/globalprotect/PanGPS

then restart gpd

slowbro commented on 2025-03-25 18:08 (UTC)

@david-perez i finally found an SSL fix/workaround, see here: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1960268/comments/32

On arch, this is /etc/ssl/openssl.cnf

david-perez commented on 2024-09-23 11:37 (UTC) (edited on 2024-09-23 11:39 (UTC) by david-perez)

I've managed to use GlobalProtect 6.2.0-625 with Arch Linux (in Cachy OS).

Here what I've done:

1) Copy supplied files in "/opt/paloaltonetworks/globalprotect"

2) Execute:

sudo paru qt5-webkit
sudo ln -s /opt/paloaltonetworks/globalprotect/gpd.service /etc/systemd/system/
sudo ln -s /opt/paloaltonetworks/globalprotect/globalprotect /usr/bin/
sudo ln -s /opt/paloaltonetworks/globalprotect/gpa.service /etc/systemd/user/
sudo systemctl daemon-reload
sudo systemctl enable --now gpd
sudo systemctl --global enable gpa.service
systemctl start --user gpa

3) Download https://archive.archlinux.org/packages/i/icu/icu-73.2-2-x86_64.pkg.tar.zst Extract files, and place libicu*.73.2 in /opt/paloaltonetworks/globalprotect

4) Client can be started in this way:

LD_LIBRARY_PATH=/opt/paloaltonetworks/globalprotect /opt/paloaltonetworks/globalprotect/PanGPUI start

5) The only problem I'm experiencing is:

Could not verify the server certificate of the gateway.  
If the issue persists, contact your administrator

I don't know if it is a problem with the gateway of the GP client. Any help will be welcome.

Eothred commented on 2024-03-21 08:20 (UTC)

I've moved to globalprotect-openconnect-git instead so I will leave this package for someone else to adopt (who is hopefully actively using it)

aag commented on 2024-01-23 14:11 (UTC)

I know that 6.2 exists as it is referenced on palo alto website, but I dont have it. Latest my it are giving me is 6.1.2.0, but its problematic for me as well, I have to keep another version of libicu just for vpn.

Eothred commented on 2024-01-22 11:42 (UTC)

The latest version from my company server is 6.1.1.c4, is that the current version? I also don't get it to work properly, so don't want to submit update until I manage to fix. If anyone else want to adopt please let me know, you can probably do a better job than me :)

hoban commented on 2023-12-13 14:03 (UTC)

The company I work for mandated the use of a different distro. I'll be unable to continue maintaining this package.

aag commented on 2023-12-13 13:56 (UTC)

Any chance to upgrade this to 6.2?

ixevix commented on 2022-11-03 08:31 (UTC)

Finally I modified the script to be

#!/bin/bash

if [ $(id -u) -ne 0 ]; then
  PANGPA=/opt/paloaltonetworks/globalprotect/PanGPA

  pgrep -u $USER PanGPA > /dev/null 2>&1

  if [ $? -ne 0 ]; then
    if [ -f $PANGPA ]; then
      $PANGPA start &
    fi
  fi
fi

ixevix commented on 2022-11-02 12:35 (UTC) (edited on 2022-11-03 07:58 (UTC) by ixevix)

I second @Malvineous approach. I also commented out the /etc/profile.d/ file and just copied it to my user's ~/.profile file. I was getting some errors when launching a root terminal so I wanted them to go away.

Edit: Seems the errors were because I didn't start the gpd service. All good now.