Module Name: src Committed By: fair Date: Sun May 17 02:22:43 UTC 2009
Modified Files: src/share/man/man4: ipsec.4 Log Message: Eliminate many groff warnings seen in build. Restructure opening description for clarity. This man page is very sparse and assumes a lot of knowledge. We should consider adopting text from the OpenBSD ipsec(4). To generate a diff of this commit: cvs rdiff -u -r1.30 -r1.31 src/share/man/man4/ipsec.4 Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/share/man/man4/ipsec.4 diff -u src/share/man/man4/ipsec.4:1.30 src/share/man/man4/ipsec.4:1.31 --- src/share/man/man4/ipsec.4:1.30 Wed Oct 11 10:14:31 2006 +++ src/share/man/man4/ipsec.4 Sun May 17 02:22:43 2009 @@ -1,4 +1,4 @@ -.\" $NetBSD: ipsec.4,v 1.30 2006/10/11 10:14:31 hubertf Exp $ +.\" $NetBSD: ipsec.4,v 1.31 2009/05/17 02:22:43 fair Exp $ .\" $KAME: ipsec.4,v 1.17 2001/06/27 15:25:10 itojun Exp $ .\" .\" Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. @@ -28,7 +28,7 @@ .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF .\" SUCH DAMAGE. .\" -.Dd February 12, 2005 +.Dd May 16, 2009 .Dt IPSEC 4 .Os .Sh NAME @@ -45,7 +45,7 @@ .Cd options IPSEC_DEBUG .Sh DESCRIPTION .Nm -is a security protocol in Internet Protocol layer. +is a security protocol in Internet Protocol (IP) layer. .Nm is defined for both IPv4 and IPv6 .Po @@ -54,21 +54,30 @@ .Xr inet6 4 .Pc . .Nm -consists of two sub-protocols, namely -ESP -.Pq encapsulated security payload -and AH -.Pq authentication header . -ESP protects IP payload from wire-tapping by encrypting it by +consists of two sub-protocols: +.Pp +.Bl -hang +.It Em Encapsulated Security Payload Pq ESP +protects IP payload from wire-tapping (interception) by encrypting it with secret key cryptography algorithms. -AH guarantees integrity of IP packet +.It Em Authentication Header Pq AH +guarantees integrity of IP packet and protects it from intermediate alteration or impersonation, by attaching cryptographic checksum computed by one-way hash functions. +.El +.Pp .Nm -has two operation modes: transport mode and tunnel mode. -Transport mode is for protecting peer-to-peer communication between end nodes. -Tunnel mode includes IP-in-IP encapsulation operation -and is designed for security gateways, like VPN configurations. +has two operation modes: +.Pp +.Bl -hang +.It Em Transport mode +is for protecting peer-to-peer communication between end nodes. +.It Em Tunnel mode +includes IP-in-IP encapsulation operation +and is designed for security gateways, as in Virtual Private Network +.Pq Tn VPN +configurations. +.El .Pp The following kernel options are available: .Bl -ohang @@ -86,8 +95,7 @@ Kernel binary will not be subject to export control in most of countries, even if compiled with .Em IPSEC . -For example, it should be okay to export it from within the United States -to the outside. +For example, it should be okay to export it from the United States of America. .Em INET6 and .Em IPSEC @@ -116,7 +124,7 @@ .It Cd options IPSEC_NAT_T Includes support for .Tn IPsec -Network Address Translator traversal (NAT-T), as described in RFCs 3947 +Network Address Translator Traversal (NAT-T), as described in RFCs 3947 and 3948. This feature might be patent-encumbered in some countries. This option assumes @@ -205,15 +213,15 @@ .Dq Li require in the syntax. .Bl -column net.inet6.ipsec6.esp_trans_deflev integerxxx -.It Sy Name Type Changeable -.It net.inet.ipsec.esp_trans_deflev integer yes -.It net.inet.ipsec.esp_net_deflev integer yes -.It net.inet.ipsec.ah_trans_deflev integer yes -.It net.inet.ipsec.ah_net_deflev integer yes -.It net.inet6.ipsec6.esp_trans_deflev integer yes -.It net.inet6.ipsec6.esp_net_deflev integer yes -.It net.inet6.ipsec6.ah_trans_deflev integer yes -.It net.inet6.ipsec6.ah_net_deflev integer yes +.It Sy Name Ta Sy Type Ta Sy Changeable +.It net.inet.ipsec.esp_trans_deflev Ta integer Ta yes +.It net.inet.ipsec.esp_net_deflev Ta integer Ta yes +.It net.inet.ipsec.ah_trans_deflev Ta integer Ta yes +.It net.inet.ipsec.ah_net_deflev Ta integer Ta yes +.It net.inet6.ipsec6.esp_trans_deflev Ta integer Ta yes +.It net.inet6.ipsec6.esp_net_deflev Ta integer Ta yes +.It net.inet6.ipsec6.ah_trans_deflev Ta integer Ta yes +.It net.inet6.ipsec6.ah_net_deflev Ta integer Ta yes .El .Pp If kernel finds no matching policy system wide default value is applied. @@ -227,25 +235,25 @@ .Li 1 means .Dq Li none . -.Bl -column net.inet6.ipsec6.def_policy integerxxx -.It Sy Name Type Changeable -.It net.inet.ipsec.def_policy integer yes -.It net.inet6.ipsec6.def_policy integer yes +.Bl -column net.inet6.ipsec6.esp_trans_deflev integerxxx +.It Sy Name Ta Sy Type Ta Sy Changeable +.It net.inet.ipsec.def_policy Ta integer Ta yes +.It net.inet6.ipsec6.def_policy Ta integer Ta yes .El .\" .Ss Miscellaneous sysctl variables The following variables are accessible via .Xr sysctl 8 , for tweaking kernel IPsec behavior: -.Bl -column net.inet6.ipsec6.inbound_call_ike integerxxx -.It Sy Name Type Changeable -.It net.inet.ipsec.ah_cleartos integer yes -.It net.inet.ipsec.ah_offsetmask integer yes -.It net.inet.ipsec.dfbit integer yes -.It net.inet.ipsec.ecn integer yes -.It net.inet.ipsec.debug integer yes -.It net.inet6.ipsec6.ecn integer yes -.It net.inet6.ipsec6.debug integer yes +.Bl -column net.inet6.ipsec6.esp_trans_deflev integerxxx +.It Sy Name Ta Sy Type Ta Sy Changeable +.It net.inet.ipsec.ah_cleartos Ta integer Ta yes +.It net.inet.ipsec.ah_offsetmask Ta integer Ta yes +.It net.inet.ipsec.dfbit Ta integer Ta yes +.It net.inet.ipsec.ecn Ta integer Ta yes +.It net.inet.ipsec.debug Ta integer Ta yes +.It net.inet6.ipsec6.ecn Ta integer Ta yes +.It net.inet6.ipsec6.debug Ta integer Ta yes .El .Pp The variables are interpreted as follows: