summaryrefslogtreecommitdiff
path: root/sbin/isakmpd
diff options
context:
space:
mode:
authorJason McIntyre <jmc@cvs.openbsd.org>2005-05-05 10:16:57 +0000
committerJason McIntyre <jmc@cvs.openbsd.org>2005-05-05 10:16:57 +0000
commit774e7478bab4df4b154cae9eb7ff2e5edda07312 (patch)
treedba4c401b5e2a08d7de3331ca08ced8e15dde885 /sbin/isakmpd
parentbf2814a8ee9851b56f9ba7060e4c7e35efce3f48 (diff)
grammar/mdoc tweaks;
Diffstat (limited to 'sbin/isakmpd')
-rw-r--r--sbin/isakmpd/isakmpd.policy.542
1 files changed, 19 insertions, 23 deletions
diff --git a/sbin/isakmpd/isakmpd.policy.5 b/sbin/isakmpd/isakmpd.policy.5
index ff5a2d1c0a4..cac33fcb643 100644
--- a/sbin/isakmpd/isakmpd.policy.5
+++ b/sbin/isakmpd/isakmpd.policy.5
@@ -1,4 +1,4 @@
-.\" $OpenBSD: isakmpd.policy.5,v 1.36 2005/03/13 21:14:15 miod Exp $
+.\" $OpenBSD: isakmpd.policy.5,v 1.37 2005/05/05 10:16:56 jmc Exp $
.\" $EOM: isakmpd.policy.5,v 1.24 2000/11/23 12:55:25 niklas Exp $
.\"
.\" Copyright (c) 1999-2001, Angelos D. Keromytis. All rights reserved.
@@ -35,8 +35,8 @@
.Sh DESCRIPTION
.Nm
is the policy configuration file for the
-.Nm isakmpd
-daemon managing security association and key management for the
+.Xr isakmpd 8
+daemon, managing security association and key management for the
.Xr ipsec 4
layer of the kernel's networking stack.
.Pp
@@ -44,7 +44,7 @@ The
.Xr isakmpd 8
daemon (also known as IKE, for Internet Key Exchange) is used when two
systems need to automatically set up a pair of Security Associations
-(SAs) for securely communicating using IPsec.
+(SAs) for secure communication using IPsec.
IKE operates in two stages:
.Pp
In the first stage (Main or Identity Protection Mode), the two IKE
@@ -67,10 +67,11 @@ The reason for the existence of Quick Mode is to allow for fast
SA setup, once the more heavy-weight Main Mode has been completed.
Generally, Quick Mode uses the key material derived from Main Mode to
provide keys to the IPsec transforms to be used.
+.Pp
Alternatively, a new
-Diffie-Hellman computation may be performed (significantly slowing
-down the exchange, but at the same time providing Perfect Forward
-Secrecy (PFS)).
+Diffie-Hellman computation may be performed, which significantly slows
+down the exchange, but at the same time provides Perfect Forward
+Secrecy (PFS).
Briefly, this means that even should an attacker
manage to break long-term keys used in other sessions (or,
specifically, if an attacker breaks the Diffie-Hellman exchange
@@ -105,7 +106,7 @@ added.
.Pp
The goal of security policy for IKE is thus to determine, based on
local policy (provided in the
-.Nm isakmpd.policy
+.Nm
file), credentials provided during the IKE exchanges (or obtained
through other means), the SA attributes proposed during the exchange,
and perhaps other (side-channel) information, whether a pair of SAs
@@ -114,17 +115,17 @@ and the flows should be installed).
For each proposal suggested by or
to the remote IKE daemon, the KeyNote system is consulted as to
whether the proposal is acceptable based on local policy (contained in
-.Nm isakmpd.policy ,
+.Nm ,
in the form of policy assertions) and remote credentials (e.g.,
KeyNote credentials or X509 certificates provided by the remote IKE
daemon).
.Pp
-.Nm isakmpd.policy
+.Nm
is simply a flat
.Xr ascii 7
file containing KeyNote policy assertions, separated by blank lines
(note that KeyNote assertions may not contain blank lines).
-.Nm isakmpd.policy
+.Nm
is read when
.Xr isakmpd 8
is first started, and every time it receives a
@@ -228,7 +229,7 @@ Conditions field simply asserts that the credential is only valid for
Similarly, any X509 CA certificates present in the directory pointed
to by the appropriate
.Xr isakmpd.conf 5
-entry, are converted to such pseudo-credentials.
+entry are converted to such pseudo-credentials.
This allows one to
write KeyNote policies that delegate specific authority to CAs (and
the keys those CAs certify, recursively).
@@ -242,7 +243,7 @@ is called an action set.
The action set is composed of name-value
attributes, similar in some ways to shell environment variables.
These values are initialized by
-.Nm isakmpd
+.Xr isakmpd 8
before each query to the KeyNote system, and can be tested against in
the Conditions field of assertions.
See
@@ -262,18 +263,13 @@ implementation or network only.
In the following attribute set, IPv4 addresses are encoded as ASCII
strings in the usual dotted-quad format.
However, all quads are three digits long.
-For example, the IPv4 address
-.Va 10.128.1.12
-would be encoded as
-.Va 010.128.001.012 .
+For example, the IPv4 address 10.128.1.12 would be encoded as 010.128.001.012.
Similarly, IPv6 addresses are encoded in the standard x:x:x:x:x:x:x:x
format, where the 'x's are the hexadecimal values of the eight 16-bit
pieces of the address.
All 'x's are four digits long.
-For example, the address
-.Va 1080:0:12:0:8:800:200C:417A
-would be encoded as
-.Va 1080:0000:0012:0000:0008:0800:200C:417A .
+For example, the address 1080:0:12:0:8:800:200C:417A
+would be encoded as 1080:0000:0012:0000:0008:0800:200C:417A.
.Pp
The following attributes are currently defined:
.Bl -tag -width -indent
@@ -503,11 +499,11 @@ Set to the local date/time, in YYYYMMDDHHmmSS format.
.Bl -tag -width /etc/isakmpd/isakmpd.policy
.It Pa /etc/isakmpd/isakmpd.policy
The default
-.Nm isakmpd
+.Xr isakmpd 8
policy configuration file.
.It Pa /usr/share/ipsec/isakmpd/policy
A sample
-.Nm isakmpd
+.Xr isakmpd 8
policy configuration file.
.El
.Sh EXAMPLES