summaryrefslogtreecommitdiff
path: root/sbin/ipsecadm
diff options
context:
space:
mode:
authorJason McIntyre <jmc@cvs.openbsd.org>2003-02-03 17:46:58 +0000
committerJason McIntyre <jmc@cvs.openbsd.org>2003-02-03 17:46:58 +0000
commit58fa2623cf2a3b8e31f8287a7e6592901912d388 (patch)
tree8ddd0f97e5091fab98f229c273f7acc1fe782fe5 /sbin/ipsecadm
parentcb186fad5ce8762a476e4343afa5bfe03586b93e (diff)
typos;
ipsecadm(8): examples ho@ help and ok markus@
Diffstat (limited to 'sbin/ipsecadm')
-rw-r--r--sbin/ipsecadm/ipsecadm.842
1 files changed, 21 insertions, 21 deletions
diff --git a/sbin/ipsecadm/ipsecadm.8 b/sbin/ipsecadm/ipsecadm.8
index cf2ee54ed22..99fdd55496b 100644
--- a/sbin/ipsecadm/ipsecadm.8
+++ b/sbin/ipsecadm/ipsecadm.8
@@ -1,4 +1,4 @@
-.\" $OpenBSD: ipsecadm.8,v 1.54 2003/01/15 16:02:09 markus Exp $
+.\" $OpenBSD: ipsecadm.8,v 1.55 2003/02/03 17:46:57 jmc Exp $
.\"
.\" Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de>
.\" All rights reserved.
@@ -70,7 +70,7 @@ provided by IPsec.
The possible commands are:
.Bl -tag -width new_esp
.It new esp
-Setup a Security Association (SA) which uses the new esp transforms.
+Set up a Security Association (SA) which uses the new esp transforms.
A SA consists of the destination address,
a Security Parameter Index (SPI) and a security protocol.
Encryption and authentication algorithms can be applied.
@@ -94,7 +94,7 @@ modifiers are:
and
.Fl keyfile .
.It old esp
-Setup a SA which uses the old esp transforms.
+Set up an SA which uses the old esp transforms.
Only encryption algorithms can be applied.
Allowed modifiers are:
.Fl dst ,
@@ -112,7 +112,7 @@ Allowed modifiers are:
and
.Fl keyfile .
.It new ah
-Setup a SA which uses the new ah transforms.
+Set up an SA which uses the new ah transforms.
Authentication will be done with HMAC using the specified hash algorithm.
Allowed modifiers are:
.Fl dst ,
@@ -129,7 +129,7 @@ Allowed modifiers are:
and
.Fl keyfile .
.It old ah
-Setup a SA which uses the old ah transforms.
+Set up an SA which uses the old ah transforms.
Simple keyed hashes will be used for authentication.
Allowed modifiers are:
.Fl dst ,
@@ -162,7 +162,7 @@ Allowed modifiers are:
and
.Fl proto2 .
.It ip4
-Setup an SA which uses the IP-in-IP encapsulation protocol.
+Set up an SA which uses the IP-in-IP encapsulation protocol.
This mode
offers no security services by itself, but can be used to route other
(experimental or otherwise) protocols over an IP network.
@@ -290,7 +290,7 @@ and
Default action is to flush all types of security associations
from the kernel.
.It ipcomp
-Setup an IP Compression Association (IPCA) which will use the IPcomp
+Set up an IP Compression Association (IPCA) which will use the IPcomp
transforms.
Just like an SA, an IPCA consists of the destination
address, a Compression Parameter Index (CPI) and a protocol (which is
@@ -305,7 +305,7 @@ and
.Fl forcetunnel .
To create an IPsec SA using compression, an IPCA and an SA must first
be created.
-After this a IPCA/SA bundle must be created using the
+After this an IPCA/SA bundle must be created using the
.Nm group
keyword.
The IPCA must be applied first.
@@ -393,7 +393,7 @@ See
CAST encryption is available only in new esp.
.It Nm skipjack
SKIPJACK encryption is available only in new esp.
-This algorithm designed by the NSA and is faster than 3DES.
+This algorithm was designed by the NSA and is faster than 3DES.
However, since it was designed by the NSA
it is a poor choice.
.El
@@ -430,7 +430,7 @@ The
should be given in hexadecimal digits.
The
.Nm key
-should be chosen in random (ideally, using some true-random source like
+should be chosen at random (ideally, using some true-random source like
coin flipping).
It is very important that the key is not guessable.
One practical way of generating 160-bit (20-byte) keys is as follows:
@@ -453,7 +453,7 @@ The
should be given in hexadecimal digits.
The
.Nm key
-should be chosen in random (ideally, using some true-random source like
+should be chosen at random (ideally, using some true-random source like
coin flipping).
It is very important that the key is not guessable.
One practical way of generating 160-bit (20-byte) keys is as follows:
@@ -603,7 +603,7 @@ For
.Nm flow ,
specify that packets matching this flow must use IPsec.
If such SAs are not present, simply drop the packets.
-Such a policy may be used to demand peers to establish SAs before they
+Such a policy may be used to demand peers establish SAs before they
can communicate with us, without going through the burden of
initiating the SA ourselves (thus allowing for some denial of service
attacks).
@@ -638,7 +638,7 @@ For
only flush SAs of type ip4.
.El
.Sh EXAMPLES
-Setup a SA which uses new esp with 3des encryption and HMAC-SHA1
+Set up an SA which uses new esp with 3des encryption and HMAC-SHA1
authentication:
.Bd -literal
# ipsecadm new esp -enc 3des -auth sha1 -spi 100a -dst 169.20.12.2 \\
@@ -647,19 +647,19 @@ authentication:
-authkey 1234123412341234123412341234123412341234
.Ed
.Pp
-Setup a SA for authentication with old ah only:
+Set up an SA for authentication with old ah only:
.Bd -literal
# ipsecadm old ah -auth md5 -spi 10f2 -dst 169.20.12.2 -src 169.20.12.3 \\
-key 12341234deadbeef
.Ed
.Pp
-Setup a flow requiring use of AH:
+Set up a flow requiring use of AH:
.Bd -literal
# ipsecadm flow -dst 169.20.12.2 -proto ah \\
- -addr 10.1.1.0 255.255.255.0 10.0.0.0 255.0.0.0 -out -require
+ -addr 10.1.1.0/24 10.0.0.0/24 -out -require
.Ed
.Pp
-Setup an inbound SA:
+Set up an inbound SA:
.Bd -literal
# ipsecadm new esp -enc blf -auth md5 -spi 1002 -dst 169.20.12.3 \\
-src 169.20.12.2 \\
@@ -667,16 +667,16 @@ Setup an inbound SA:
-authkey 12349876432167890192837465098273
.Ed
.Pp
-Setup an ingress flow on for the inbound SA:
+Set up an ingress flow for the inbound SA:
.Bd -literal
-# ipsecadm flow -addr 10.0.0.0 255.0.0.0 10.1.1.0 255.255.255.0 \\
+# ipsecadm flow -addr 10.0.0.0/8 10.1.1.0/24 \\
-dst 169.20.12.2 -proto esp -in -require
.Ed
.Pp
-Setup a bypass flow:
+Set up a bypass flow:
.Bd -literal
# ipsecadm flow -bypass -out \\
- -addr 10.1.1.0 255.255.255.0 10.1.1.0 255.255.255.0
+ -addr 10.1.1.0/24 10.1.1.0/24
.Ed
.Pp
Delete all esp SAs and their flows and routing information: