cloudstack/patches/systemvm/debian/config/opt/cloud/bin
Sheng Yang 4d42845853 S2S VPN: Add back pfs=no for ipsec.conf
According to ipsec.conf manual:

pfs

whether Perfect Forward Secrecy of keys is desired on the connection's keying
channel (with PFS, penetration of the key-exchange protocol does not compromise
keys negotiated earlier); Since there is no reason to ever refuse PFS, Openswan
will allow a connection defined with pfs=no to use PFS anyway. Acceptable values
are yes (the default) and no.

Found removing the option would make it impossible to work with no PFS setting
router. It may related to CS-15511.
2012-07-23 19:35:08 -07:00
..
acl.sh VPC : move acl.sh ipassoc.sh to /opt/cloud/bin/ 2012-06-15 14:24:09 -07:00
checks2svpn.sh CS-6840: Add status checking for site 2 site VPN 2012-07-02 16:29:23 -07:00
cloud-nic.sh VPC : fix nic hot plug script 2012-06-15 14:32:31 -07:00
get_template_version.sh Switch to Apache license 2012-04-03 04:50:05 -07:00
guestnw.sh VPC : bug fix 2012-06-15 14:29:47 -07:00
ipassoc.sh VPC : revert changes in ipassoc.sh 2012-06-15 14:29:56 -07:00
ipsectunnel.sh S2S VPN: Add back pfs=no for ipsec.conf 2012-07-23 19:35:08 -07:00
netusage.sh VPC : use routerProxy to call networkUsage.sh 2012-06-15 14:25:21 -07:00
passwd_server bug 14558: Add log for passwd_server 2012-03-30 14:20:11 -07:00
patchsystemvm.sh Fix keepalived process not started issue 2012-05-01 16:20:08 -07:00
serve_password.sh Switch to Apache license 2012-04-03 04:50:05 -07:00
vpc_ipassoc.sh VPC : vpc_ipassosc.sh 2012-06-15 14:30:50 -07:00