Age | Commit message (Collapse) | Author |
|
ok henning@
|
|
|
|
|
|
|
|
|
|
and extendedkeyusage and nscerttype flags. the ikectl CA can now be used
with all kinds of other vpn tools in addition to iked and isakmpd.
ok phessler@
|
|
case as well, spotted by mikeb
|
|
|
|
are relative to /etc
|
|
install into the isakmpd directory hierarchy for example.
|
|
|
|
|
|
scripting). The "peer" argument now needs to be preceded with the "peer"
keyword, eg. ... export peer 10.1.1.1 instead of export 10.1.1.1.
|
|
|
|
split them into Xo/Xc blocks to make nroff happy again.
|
|
set openssl batch mode: don't ask for x509 options, use the defaults.
- allow to specify the initial ca password on the command line to also
make it scriptable.
- allow to create certificates for clientAuth or serverAuth only
(eg. ikectl ca foo certificate bar server).
- cosmetics: move double declarations of ca_*() functions to parser.h.
ok phessler@
|
|
perms of /etc/iked when extracting
OK jsg@
|
|
While here, set our used defaults in the config file.
OK reyk@, jsg@
|
|
|
|
|
|
CA and peers certificates.
With input from mikeb@
|
|
in the cert case.
|
|
|
|
and make both export commands optionally take an argument that will be
added to a peer.txt file in the exported output. Additionally
include any site specific notes from /usr/share/iked if present.
man page bits and help with the parser from reyk
|
|
|
|
|
|
involving certificates as suggested by reyk and don't
recreate private keys if a key already exists.
ok reyk@
|
|
make the ca install command install the CRL as well.
discussed with reyk@
|
|
learned flows and SAs to the kernel which is useful for testing and
debugging. the active/passive commands are required to use iked
with sasyncd(8); sasyncd just needs to call "ikectl active/passive" or
send the appropriate imsg to support iked but this is not implemented yet.
|
|
|
|
readable as suggested by reyk@
|
|
iked(8) is an automatic keying daemon for IPsec, like isakmpd(8), that
IPsec creates flows and SAs automatically. Unlike isakmpd, iked(8)
implements the newer IKEv2 protocol instead of IKEv1/ISAKMP. The
daemon is still work-in-progress and not enabled in the builds, but is
already able to establish IKEv2 sessions with some other IKEv2
implementations as a responder.
with lots of help and debugging by jsg@
ok deraadt@
|
|
iked(8) is an automatic keying daemon for IPsec, like isakmpd(8), that
IPsec creates flows and SAs automatically. Unlike isakmpd, iked(8)
implements the newer IKEv2 protocol instead of IKEv1/ISAKMP. The
daemon is still work-in-progress and not enabled in the builds, but is
already able to establish IKEv2 sessions with some other IKEv2
implementations as a responder.
with lots of help and debugging by jsg@
ok deraadt@
|