summaryrefslogtreecommitdiff
path: root/sbin
diff options
context:
space:
mode:
authorJason McIntyre <jmc@cvs.openbsd.org>2006-09-04 15:51:21 +0000
committerJason McIntyre <jmc@cvs.openbsd.org>2006-09-04 15:51:21 +0000
commit52e9fcea0d1f52399fc60029b07e852955c24d90 (patch)
tree3d4b454d74296e22cadb71828a0701f4f31e49fa /sbin
parent64f5f8d88093d5e89f5f9dc07b20ce7a6d87f28d (diff)
some wording fixes for the section headers and minor tweaks;
Diffstat (limited to 'sbin')
-rw-r--r--sbin/ipsecctl/ipsec.conf.538
1 files changed, 12 insertions, 26 deletions
diff --git a/sbin/ipsecctl/ipsec.conf.5 b/sbin/ipsecctl/ipsec.conf.5
index 45258efeee6..2bb3868751c 100644
--- a/sbin/ipsecctl/ipsec.conf.5
+++ b/sbin/ipsecctl/ipsec.conf.5
@@ -1,4 +1,4 @@
-.\" $OpenBSD: ipsec.conf.5,v 1.80 2006/09/04 15:10:37 jmc Exp $
+.\" $OpenBSD: ipsec.conf.5,v 1.81 2006/09/04 15:51:20 jmc Exp $
.\"
.\" Copyright (c) 2004 Mathieu Sauve-Frankel All rights reserved.
.\"
@@ -46,8 +46,8 @@ and then Security Associations
.Pq Em SA
are established,
which detail how the desired protection will be achieved.
-The flows themselves are a type of route which determine
-which packets need to be protected by an SA.
+IPsec uses flows
+to determine whether to apply security services to an IP packet or not.
.Pp
Generally speaking
an automated keying daemon,
@@ -412,36 +412,24 @@ flow esp from 192.168.3.14 to 192.168.3.100
flow esp from 192.168.7.0/24 to 192.168.8.0/24 peer 192.168.3.12
.Ed
.Pp
-The following security services are available:
+The following types of flow are available:
.Bl -tag -width xxxx
.It Ic flow esp
ESP can provide the following properties:
authentication, integrity, replay protection, and confidentiality of the data.
+If no flow type is specified,
+this is the default.
.It Ic flow ah
-AH provides authentication, integrity, and replay protection, but no
+AH provides authentication, integrity, and replay protection, but not
confidentiality.
.It Ic flow ipip
-IPIP provides neither authentication, integrity, replay protection, nor
+IPIP does not provide authentication, integrity, replay protection, or
confidentiality.
-However, it allows you to tunnel IP traffic over IP, without setting up
+However, it does allow tunnelling of IP traffic over IP, without setting up
.Xr gif 4
interfaces.
.El
.Pp
-For details on ESP and AH see
-.Xr ipsec 4 .
-When no service is specified,
-.Xr ipsecctl 8
-will use ESP.
-The settings for the security services have to be negotiated by
-.Xr isakmpd 8 .
-As soon as a packet matches a flow,
-.Xr isakmpd 8
-automatically starts the negotiation.
-See
-.Xr isakmpd 8
-for details.
-.Pp
The commands are as follows:
.Bl -tag -width xxxx
.It Ic in No or Ic out
@@ -549,9 +537,11 @@ esp from 192.168.3.14 to 192.168.3.12 spi 0xdeadbeef:0xbeefdead \e
enckey file "enc14:enc12"
.Ed
.Pp
+Parameters specify the peers, Security Parameter Index (SPI),
+cryptographic transforms, and key material to be used.
The following rules enter SAs in the SADB:
.Pp
-.Bl -tag -width Ds -offset indent -compact
+.Bl -tag -width "tcpmd5XX" -offset indent -compact
.It Ic esp
Enter an ESP SA.
.It Ic ah
@@ -564,9 +554,6 @@ Enter an IPIP pseudo SA.
Enter a TCP MD5 SA.
.El
.Pp
-Parameters specify the peers, Security Parameter Index (SPI),
-cryptographic transforms, and key material to be used.
-.Pp
The commands are as follows:
.Bl -tag -width xxxx
.It Xo
@@ -700,7 +687,6 @@ The encryption key is defined similarly to
.Ic authkey
.Aq Ar keyspec
.Xc
-.Pp
This rule applies for packets with source address
.Aq Ar src
and destination address