<feed xmlns='http://www.w3.org/2005/Atom'>
<title>packages/net/openfortivpn/files/openfortivpn-wrapper, branch master</title>
<subtitle>Mirror of packages feed</subtitle>
<id>https://git.openwrt.org/feed/packages/atom?h=master</id>
<link rel='self' href='https://git.openwrt.org/feed/packages/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/'/>
<updated>2020-09-10T21:56:10Z</updated>
<entry>
<title>openfortivpn: fix shellcheck warnings</title>
<updated>2020-09-10T21:56:10Z</updated>
<author>
<name>Aaron Goodman</name>
</author>
<published>2020-09-10T21:56:10Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/commit/?id=c4686691aae19918a7fa7a5a1b3fc341b609494f'/>
<id>urn:sha1:c4686691aae19918a7fa7a5a1b3fc341b609494f</id>
<content type='text'>
Signed-off-by: Aaron Goodman &lt;aaronjg@stanford.edu&gt;
</content>
</entry>
<entry>
<title>openfortivpn: tabify shell scripts</title>
<updated>2020-09-10T19:53:33Z</updated>
<author>
<name>Aaron Goodman</name>
</author>
<published>2020-09-10T19:53:33Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/commit/?id=7d170b8f64e90094bc24d1a6cea7d6e0db1bae36'/>
<id>urn:sha1:7d170b8f64e90094bc24d1a6cea7d6e0db1bae36</id>
<content type='text'>
Signed-off-by: Aaron Goodman &lt;aaronjg@stanford.edu&gt;
</content>
</entry>
<entry>
<title>openfortivpn: improve logging</title>
<updated>2020-07-31T00:47:34Z</updated>
<author>
<name>Aaron Goodman</name>
</author>
<published>2020-07-31T00:45:53Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/commit/?id=991147ff430f56f4018c1d62953fc8da56978672'/>
<id>urn:sha1:991147ff430f56f4018c1d62953fc8da56978672</id>
<content type='text'>
Signed-off-by: Aaron Goodman &lt;aaronjg@stanford.edu&gt;
</content>
</entry>
<entry>
<title>openfortivpn: block restart after authentication failure</title>
<updated>2020-07-29T03:06:09Z</updated>
<author>
<name>Aaron Goodman</name>
</author>
<published>2020-07-20T14:43:32Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/commit/?id=2f9cfb036f219df589c20ad9271e15c92722390b'/>
<id>urn:sha1:2f9cfb036f219df589c20ad9271e15c92722390b</id>
<content type='text'>
Block restart of the interface if the openfortivpn fails to authenticate.
Without this check, with a bad password, netifd will continually
hit the VPN endpoint with connection attempts

Signed-off-by: Aaron Goodman &lt;aaronjg@stanford.edu&gt;
</content>
</entry>
<entry>
<title>openfortivpn: Use netifd for script rather than init script</title>
<updated>2020-06-04T20:51:30Z</updated>
<author>
<name>Aaron Goodman</name>
</author>
<published>2020-05-22T22:57:42Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/feed/packages/commit/?id=9b0fce23d1a60d6cc6e241b7996451fa08e776ee'/>
<id>urn:sha1:9b0fce23d1a60d6cc6e241b7996451fa08e776ee</id>
<content type='text'>
By using the netifd for open fortivpn we are able to set up multiple
VPN connections and manage them through the netifd toolset.

This also adds support for binding an openfortivpn client to a given
interface, in which case when that interface comes online, the vpn
will be initiated via a hotplug script.

This is a breaking commit and configurations will need to be migrated
from openfortivpn.config into the /etc/config/networks.

Example configuration via /etc/config/network:

config interface 'ftvpn'
        option proto 'openfortivpn'
        option server 'example.com'
        option username 'USERNAME'
        option password 'PASSWORD'
        # optional arguments follow
        option local_ip '192.0.5.1'
        option port '443'
        option iface_name 'wan'
        option trusted_cert 'CERT_HASH'
        option set_dns '0'
        option pppd_use_peerdns '0'
        option metric '10'

Signed-off-by: Aaron Goodman &lt;aaronjg@stanford.edu&gt;
</content>
</entry>
</feed>
