From 3a326477d408167211b14d9893909c9b3ffb5a6e Mon Sep 17 00:00:00 2001 From: Mike Pechkin Date: Fri, 21 Dec 2001 11:41:51 +0000 Subject: Initial patch for a new mdoc issue. Powered by @mantoya: o) kill extra line in the end of file; o) kill extra space in the end of line; o) replace blank lines with .Pp; millert@ ok --- sbin/isakmpd/isakmpd.8 | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) (limited to 'sbin/isakmpd/isakmpd.8') diff --git a/sbin/isakmpd/isakmpd.8 b/sbin/isakmpd/isakmpd.8 index b4ca86e1a32..45fcbf8a5e7 100644 --- a/sbin/isakmpd/isakmpd.8 +++ b/sbin/isakmpd/isakmpd.8 @@ -1,4 +1,4 @@ -.\" $OpenBSD: isakmpd.8,v 1.36 2001/12/13 20:16:48 mpech Exp $ +.\" $OpenBSD: isakmpd.8,v 1.37 2001/12/21 11:41:50 mpech Exp $ .\" $EOM: isakmpd.8,v 1.23 2000/05/02 00:30:23 niklas Exp $ .\" .\" Copyright (c) 1998, 1999, 2000, 2001 Niklas Hallqvist. @@ -76,13 +76,13 @@ a FIFO or by signals, upcalls from the kernel via a .Dv PF_KEY socket, and lastly by scheduled events triggered by timers running out. .Pp -Most uses of +Most uses of .Nm will be to implement so called "virtual private networks" or VPNs for short. The .Xr vpn 8 -manual page describes how to setup +manual page describes how to setup .Nm for a simple VPN. For other uses, some more knowledge of IKE as a protocol is required. @@ -192,13 +192,13 @@ will be what the daemon binds its local end to when acting as initiator. .It Fl L Enable IKE packet capture. -When this option is given, +When this option is given, .Nm will capture to file an unencrypted copy of the negotiation packets it is sending and receiveing. -This file can later be read by +This file can later be read by .Xr tcpdump 8 -and other utilities using +and other utilities using .Xr pcap 3 . .It Fl l Ar packetlog-file As option @@ -332,7 +332,7 @@ and put it in It is also possible to store trusted public keys to make them directly usable by .Nm isakmpd . -The keys should be saved in PEM format (see +The keys should be saved in PEM format (see .Xr openssl 1 ) and named and stored after this easy formula: .Bl -tag -width for_ufqdn_identities @@ -350,10 +350,10 @@ The .Fl P flag does not do what we document, rather it does nothing. .Sh CAVEATS -When storing a trusted public key for an IPv6 identity, the +When storing a trusted public key for an IPv6 identity, the .Em most efficient form of address representation, i.e "::" instead of ":0:0:0:", -must be used or the matching will fail. +must be used or the matching will fail. .Nm uses the output from .Xr getnameinfo 3 @@ -396,8 +396,8 @@ The report file written when .Dv SIGUSR1 is received. .It Pa /usr/share/ipsec/isakmpd/ -A directory containing some sample -.Nm +A directory containing some sample +.Nm and keynote policy configuration files. .El .Sh SEE ALSO -- cgit v1.2.3