summaryrefslogtreecommitdiff
path: root/sbin
diff options
context:
space:
mode:
authorJason McIntyre <jmc@cvs.openbsd.org>2011-09-29 17:57:10 +0000
committerJason McIntyre <jmc@cvs.openbsd.org>2011-09-29 17:57:10 +0000
commit989a180e38d1557479a1d98afc0efb7fa1d22977 (patch)
tree4f0bf1e364f2959b2ad49e7f6475e9ebe5fb743c /sbin
parentf8a3edc9fbb2a86ccc401ee5a036fe2caf59aaa1 (diff)
ssl.8: Certifying Authority -> Certificate Authority
isakmpd.8: rsa:1024 -> rsa:2048 (ok markus) all: X509 -> X.509 from Lawrence Teo
Diffstat (limited to 'sbin')
-rw-r--r--sbin/isakmpd/isakmpd.816
-rw-r--r--sbin/isakmpd/isakmpd.policy.518
2 files changed, 17 insertions, 17 deletions
diff --git a/sbin/isakmpd/isakmpd.8 b/sbin/isakmpd/isakmpd.8
index 81afb5c1caa..8320395a002 100644
--- a/sbin/isakmpd/isakmpd.8
+++ b/sbin/isakmpd/isakmpd.8
@@ -1,4 +1,4 @@
-.\" $OpenBSD: isakmpd.8,v 1.108 2011/06/06 08:05:05 jmc Exp $
+.\" $OpenBSD: isakmpd.8,v 1.109 2011/09/29 17:57:09 jmc Exp $
.\" $EOM: isakmpd.8,v 1.23 2000/05/02 00:30:23 niklas Exp $
.\"
.\" Copyright (c) 1998, 1999, 2000, 2001 Niklas Hallqvist.
@@ -30,7 +30,7 @@
.\"
.\" Manual page, using -mandoc macros
.\"
-.Dd $Mdocdate: June 6 2011 $
+.Dd $Mdocdate: September 29 2011 $
.Dt ISAKMPD 8
.Os
.Sh NAME
@@ -556,10 +556,10 @@ Public keys are used to authenticate.
See
.Sx PUBLIC KEY AUTHENTICATION
below.
-.It X509 Certificates:
-X509 Certificates are used to authenticate.
+.It X.509 Certificates:
+X.509 Certificates are used to authenticate.
See
-.Sx X509 AUTHENTICATION
+.Sx X.509 AUTHENTICATION
below.
.It Keynote Certificates:
Keynote Certificates are used to authenticate.
@@ -628,8 +628,8 @@ In this example,
would also have to be set to IPV4_ADDR or IPV4_ADDR_SUBNET
in
.Xr isakmpd.conf 5 .
-.Sh X509 AUTHENTICATION
-X509 is a framework for public key certificates.
+.Sh X.509 AUTHENTICATION
+X.509 is a framework for public key certificates.
Certificates can be generated using
.Xr openssl 1
and provide a means for PKI authentication.
@@ -645,7 +645,7 @@ The CA certificate is named
and its private key
.Pa ca.key :
.Bd -literal -offset indent
-# openssl req -x509 -days 365 -newkey rsa:1024 \e
+# openssl req -x509 -days 365 -newkey rsa:2048 \e
-keyout /etc/ssl/private/ca.key \e
-out /etc/ssl/ca.crt
.Ed
diff --git a/sbin/isakmpd/isakmpd.policy.5 b/sbin/isakmpd/isakmpd.policy.5
index 1e1197ddb8c..1c3627a1dc8 100644
--- a/sbin/isakmpd/isakmpd.policy.5
+++ b/sbin/isakmpd/isakmpd.policy.5
@@ -1,4 +1,4 @@
-.\" $OpenBSD: isakmpd.policy.5,v 1.44 2010/06/07 08:38:09 jmc Exp $
+.\" $OpenBSD: isakmpd.policy.5,v 1.45 2011/09/29 17:57:09 jmc Exp $
.\" $EOM: isakmpd.policy.5,v 1.24 2000/11/23 12:55:25 niklas Exp $
.\"
.\" Copyright (c) 1999-2001, Angelos D. Keromytis. All rights reserved.
@@ -26,7 +26,7 @@
.\"
.\" Manual page, using -mandoc macros
.\"
-.Dd $Mdocdate: June 7 2010 $
+.Dd $Mdocdate: September 29 2011 $
.Dt ISAKMPD.POLICY 5
.Os
.Sh NAME
@@ -124,7 +124,7 @@ to the remote IKE daemon, the KeyNote system is consulted as to
whether the proposal is acceptable based on local policy (contained in
.Nm ,
in the form of policy assertions) and remote credentials (e.g.,
-KeyNote credentials or X509 certificates provided by the remote IKE
+KeyNote credentials or X.509 certificates provided by the remote IKE
daemon).
.Pp
.Nm
@@ -154,7 +154,7 @@ below, for use of policy delegation).
.It
The Licensees field can be an expression of passphrases used for
authentication of the Main Mode exchanges, and/or public keys
-(typically, X509 certificates), and/or X509 distinguished names.
+(typically, X.509 certificates), and/or X.509 distinguished names.
.It
The Conditions field contains an expression of attributes from the
IPsec policy action set (see below as well as the keynote syntax man
@@ -177,7 +177,7 @@ For example, the following policy assertion:
.Ed
.Pp
says that any proposal from a remote host that authenticates using the
-passphrase "foobar" or the public key contained in the X509
+passphrase "foobar" or the public key contained in the X.509
certificate encoded as "abcd==" will be accepted, as long as it
contains ESP with a non-null algorithm (i.e., the packet will be
encrypted).
@@ -196,7 +196,7 @@ The following policy assertion:
.Ed
.Pp
is similar to the previous one, but instead of including a complete
-X509 credential in the Licensees field, only the X509 certificate's
+X.509 credential in the Licensees field, only the X.509 certificate's
Subject Canonical Name needs to be specified (note that the "DN:"
prefix is necessary).
.Pp
@@ -224,16 +224,16 @@ or
hash of the passphrase itself, encoded as a hexadecimal string (using
lower-case letters only).
.Pp
-When X509-based authentication is performed in Main Mode, any X509
+When X.509-based authentication is performed in Main Mode, any X.509
certificates received from the remote IKE daemon are converted to very
simple KeyNote credentials.
The conversion is straightforward: the
-issuer of the X509 certificate becomes the Authorizer of the KeyNote
+issuer of the X.509 certificate becomes the Authorizer of the KeyNote
credential, the subject becomes the only Licensees entry, while the
Conditions field simply asserts that the credential is only valid for
"IPsec policy" use (see the app_domain action attribute below).
.Pp
-Similarly, any X509 CA certificates present in the directory pointed
+Similarly, any X.509 CA certificates present in the directory pointed
to by the appropriate
.Xr isakmpd.conf 5
entry are converted to such pseudo-credentials.