Skip to content
Permalink
Browse files
stoken: Update documentation, manpage with libstoken information
Signed-off-by: Kevin Cernekee <cernekee@gmail.com>
  • Loading branch information
cernekee committed Oct 15, 2012
1 parent 2628bbd commit 5f4ee9fef58eb3a88828aef9c291a45a89baaa39
Showing with 9 additions and 1 deletion.
  1. +0 −1 TODO
  2. +7 −0 openconnect.8.in
  3. +1 −0 www/building.xml
  4. +1 −0 www/features.xml
1 TODO
@@ -1,7 +1,6 @@

openconnect:
Port to/test on Windows, Symbian, etc.
Proper SecurID support

nm-auth-dialog:
Store cookie in GNOME keyring and reuse it instead of logging in again
@@ -49,6 +49,7 @@ openconnect \- Connect to Cisco AnyConnect VPN
.OP \-\-no\-passwd
.OP \-\-non\-inter
.OP \-\-passwd\-on\-stdin
.OP \-\-stoken[=\fItoken-string\fP]
.OP \-\-reconnect\-timeout
.OP \-\-servercert sha1
.OP \-\-useragent string
@@ -322,6 +323,12 @@ Do not expect user input; exit if it is required.
.B \-\-passwd\-on\-stdin
Read password from standard input
.TP
.B \-\-stoken[=\fItoken-string\fP]
Use libstoken to generate one-time passwords compatible with the RSA SecurID
system (when built with libstoken support). If \fItoken-string\fP is omitted,
libstoken will try to use the software token seed stored in \fI~/.stokenrc\fP,
if this file exists.
.TP
.B \-\-reconnect\-timeout
Keep reconnect attempts until so much seconds are elapsed. The default
timeout is 300 seconds, which means that openconnect can recover
@@ -32,6 +32,7 @@ And <em>optionally</em> also:
<ul>
<li><b><tt><a href="http://code.google.com/p/libproxy/">libproxy</a></tt></b></li>
<li><b><tt><a href="http://trousers.sourceforge.net/">trousers</a></tt></b> <i>(for TPM support if using GnuTLS)</i></li>
<li><b><tt><a href="http://stoken.sourceforge.net/">libstoken</a></tt></b> <i>(for SecurID software token support)</i></li>
</ul>
<p>OpenConnect supports the use of HTTP and SOCKS proxies to connect to the
AnyConnect service, even without using libproxy. You may wish to use libproxy
@@ -17,6 +17,7 @@
<li>Automatic detection of IPv4 and IPv6 address, routes.</li>
<li>Authentication via HTTP forms.</li>
<li>Authentication using SSL certificates &#8212; from local file, <a href="http://en.wikipedia.org/wiki/Trusted_Platform_Module">Trusted Platform Module</a> and <i>(when built with GnuTLS)</i> PKCS#11 smartcards.</li>
<li>Authentication using SecurID software tokens <i>(when built with libstoken)</i></li>
<li><i>UserGroup</i> support for selecting between multiple configurations on a single VPN server.</li>
<li>Data transport over TCP <i>(HTTPS)</i> or UDP <i>(DTLS)</i>.</li>
<li>Keepalive and Dead Peer Detection on both HTTPS and DTLS.</li>

0 comments on commit 5f4ee9f

Please sign in to comment.