summaryrefslogtreecommitdiff
path: root/sbin/ipsecctl/ipsec.conf.5
diff options
context:
space:
mode:
authorJason McIntyre <jmc@cvs.openbsd.org>2006-08-31 11:23:58 +0000
committerJason McIntyre <jmc@cvs.openbsd.org>2006-08-31 11:23:58 +0000
commit2535c3b58ed3ff0a50a0de9baf383fd9e5d2c0b5 (patch)
tree07becffd23ecd43d10c587382e9f50eb9a499817 /sbin/ipsecctl/ipsec.conf.5
parentc3ad20cb0ce003d97cefe235f267997d91310dce (diff)
expand DESCRIPTION; input from ho hshoexer naddy
Diffstat (limited to 'sbin/ipsecctl/ipsec.conf.5')
-rw-r--r--sbin/ipsecctl/ipsec.conf.551
1 files changed, 45 insertions, 6 deletions
diff --git a/sbin/ipsecctl/ipsec.conf.5 b/sbin/ipsecctl/ipsec.conf.5
index 1dd49f1cb62..719a8b0d3e1 100644
--- a/sbin/ipsecctl/ipsec.conf.5
+++ b/sbin/ipsecctl/ipsec.conf.5
@@ -1,4 +1,4 @@
-.\" $OpenBSD: ipsec.conf.5,v 1.75 2006/08/31 01:16:23 jmc Exp $
+.\" $OpenBSD: ipsec.conf.5,v 1.76 2006/08/31 11:23:57 jmc Exp $
.\"
.\" Copyright (c) 2004 Mathieu Sauve-Frankel All rights reserved.
.\"
@@ -31,12 +31,51 @@
.Sh DESCRIPTION
The
.Nm
-file specifies rules and definitions for
-.Xr ipsec 4
-IP security services.
-The rulesets themselves can be loaded, viewed, and modified via the
+file specifies rules and definitions for IPsec,
+which provides security services for IP datagrams.
+IPsec itself is a pair of protocols:
+Encapsulating Security Payload (ESP),
+which provides integrity and confidentiality;
+and Authentication Header (AH),
+which provides integrity.
+.Pp
+In its most basic form, a
+.Em flow
+is established between hosts and/or networks,
+and then Security Associations
+.Pq Em SA
+are established,
+which detail how the desired protection will be achieved.
+The flows themselves are a type of route which determine
+which packets need to be protected by an SA.
+.Pp
+Generally speaking
+an automated keying daemon,
+such as
+.Xr isakmpd 8 ,
+is used to set up flows and establish SAs.
+The keying daemon can be configured using
+.Nm .
+The procedures for running the daemon and
+using passphrases, host keys, X509 certificates,
+or Keynote certificates are documented in
+.Xr isakmpd 8 .
+Note that the
+.Fl K
+option will probably be required to avoid
+.Xr keynote 4
+policy checking.
+.Pp
+An alternative method of setting up SAs is also possible using
+manual keying.
+Manual keying can be convenient for quick setups and testing.
+These procedures are documented within this page.
+.Pp
+The IPsec protocol itself is described in
+.Xr ipsec 4 .
+Rulesets can be loaded, viewed, and modified via the
.Xr ipsecctl 8
-userland utility.
+utility.
.Sh MACROS
Much like
.Xr cpp 1