ipseckey.8 (bbf215553c7233fbab8a0afdf1fac74c44781867) ipseckey.8 (1edba515a3484e0f74b638b203d462b3112ac84d)
1'\" te
2.\" Copyright (C) 2008, Sun Microsystems, Inc. All Rights Reserved
3.\" The contents of this file are subject to the terms of the Common Development and Distribution License (the "License"). You may not use this file except in compliance with the License.
4.\" You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE or http://www.opensolaris.org/os/licensing. See the License for the specific language governing permissions and limitations under the License.
5.\" When distributing Covered Code, include this CDDL HEADER in each file and include the License file at usr/src/OPENSOLARIS.LICENSE. If applicable, add the following below this CDDL HEADER, with the fields enclosed by brackets "[]" replaced with your own identifying information: Portions Copyright [yyyy] [name of copyright owner]
1'\" te
2.\" Copyright (C) 2008, Sun Microsystems, Inc. All Rights Reserved
3.\" The contents of this file are subject to the terms of the Common Development and Distribution License (the "License"). You may not use this file except in compliance with the License.
4.\" You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE or http://www.opensolaris.org/os/licensing. See the License for the specific language governing permissions and limitations under the License.
5.\" When distributing Covered Code, include this CDDL HEADER in each file and include the License file at usr/src/OPENSOLARIS.LICENSE. If applicable, add the following below this CDDL HEADER, with the fields enclosed by brackets "[]" replaced with your own identifying information: Portions Copyright [yyyy] [name of copyright owner]
6.TH IPSECKEY 8 "November 22, 2021"
6.TH IPSECKEY 8 "April 17, 2024"
7.SH NAME
8ipseckey \- manually manipulate an IPsec Security Association Database (SADB)
9.SH SYNOPSIS
10.nf
11\fBipseckey\fR [\fB-nvp\fR]
12.fi
13
14.LP

--- 52 unchanged lines hidden (view full) ---

67accepts commands from the standard input until the end-of-file is reached. Some
68commands require an explicit security association ("\fBSA\fR") type, while
69others permit the \fBSA\fR type to be unspecified and act on all \fBSA\fR
70types.
71.sp
72.LP
73\fBipseckey\fR uses a \fBPF_KEY\fR socket and the message types \fBSADB_ADD\fR,
74\fBSADB_DELETE\fR, \fBSADB_GET\fR, \fBSADB_UPDATE\fR, \fBSADB_FLUSH\fR, and
7.SH NAME
8ipseckey \- manually manipulate an IPsec Security Association Database (SADB)
9.SH SYNOPSIS
10.nf
11\fBipseckey\fR [\fB-nvp\fR]
12.fi
13
14.LP

--- 52 unchanged lines hidden (view full) ---

67accepts commands from the standard input until the end-of-file is reached. Some
68commands require an explicit security association ("\fBSA\fR") type, while
69others permit the \fBSA\fR type to be unspecified and act on all \fBSA\fR
70types.
71.sp
72.LP
73\fBipseckey\fR uses a \fBPF_KEY\fR socket and the message types \fBSADB_ADD\fR,
74\fBSADB_DELETE\fR, \fBSADB_GET\fR, \fBSADB_UPDATE\fR, \fBSADB_FLUSH\fR, and
75\fBSADB_X_PROMISC\fR. Thus, you must be a superuser to use this command.
75\fBSADB_X_PROMISC\fR. Thus, you must have the \fBPRIV_SYS_IP_CONFIG\fR
76privilege to use this command.
76.sp
77.LP
78\fBipseckey\fR handles sensitive cryptographic keying information. Please read
79the \fBSecurity\fR section for details on how to use this command securely.
80.SH OPTIONS
81.ne 2
82.na
83\fB\fB-c\fR [\fIfilename\fR]\fR

--- 10 unchanged lines hidden (view full) ---

94.sp
95.ne 2
96.na
97\fB\fB-f\fR [\fIfilename\fR]\fR
98.ad
99.sp .6
100.RS 4n
101Read commands from an input file, \fIfilename\fR. The lines of the input file
77.sp
78.LP
79\fBipseckey\fR handles sensitive cryptographic keying information. Please read
80the \fBSecurity\fR section for details on how to use this command securely.
81.SH OPTIONS
82.ne 2
83.na
84\fB\fB-c\fR [\fIfilename\fR]\fR

--- 10 unchanged lines hidden (view full) ---

95.sp
96.ne 2
97.na
98\fB\fB-f\fR [\fIfilename\fR]\fR
99.ad
100.sp .6
101.RS 4n
102Read commands from an input file, \fIfilename\fR. The lines of the input file
102are identical to the command line language. The \fBload\fR command provides
103similar functionality. The \fB-s\fR option or the \fBsave\fR command can
104generate files readable by the \fB-f\fR argument.
103are identical to the command line language. The \fB-s\fR option or the
104\fBsave\fR command can generate files readable by the \fB-f\fR argument.
105.RE
106
107.sp
108.ne 2
109.na
110\fB\fB-n\fR\fR
111.ad
112.sp .6

--- 108 unchanged lines hidden (view full) ---

221
222.sp
223.ne 2
224.na
225\fB\fBget\fR\fR
226.ad
227.sp .6
228.RS 4n
105.RE
106
107.sp
108.ne 2
109.na
110\fB\fB-n\fR\fR
111.ad
112.sp .6

--- 108 unchanged lines hidden (view full) ---

221
222.sp
223.ne 2
224.na
225\fB\fBget\fR\fR
226.ad
227.sp .6
228.RS 4n
229Lookup and display a security association from a specific \fBSADB\fR. Like
229Look up and display a security association from a specific \fBSADB\fR. Like
230\fBdelete\fR, this command only requires \fBspi\fR and \fBdest\fR for IPsec.
231.RE
232
233.sp
234.ne 2
235.na
236\fB\fBflush\fR\fR
237.ad

--- 1260 unchanged lines hidden (view full) ---

1498.BR pf_key (4P),
1499.BR ike.config (5),
1500.BR attributes (7),
1501.BR smf (7),
1502.BR ipsecalgs (8),
1503.BR ipsecconf (8),
1504.BR route (8),
1505.BR svcadm (8),
230\fBdelete\fR, this command only requires \fBspi\fR and \fBdest\fR for IPsec.
231.RE
232
233.sp
234.ne 2
235.na
236\fB\fBflush\fR\fR
237.ad

--- 1260 unchanged lines hidden (view full) ---

1498.BR pf_key (4P),
1499.BR ike.config (5),
1500.BR attributes (7),
1501.BR smf (7),
1502.BR ipsecalgs (8),
1503.BR ipsecconf (8),
1504.BR route (8),
1505.BR svcadm (8),
1506.BR svccfg (8)
1506.BR svccfg (8),
1507.BR tcpkey (8)
1507.sp
1508.LP
1509Schneier, B., \fIApplied Cryptography: Protocols, Algorithms, and Source Code
1510in C\fR. Second ed. New York, New York: John Wiley & Sons, 1996.
1511.SH DIAGNOSTICS
1512The \fBipseckey\fR command parses the configuration file and reports any
1513errors. In the case of multiple errors, \fBipseckey\fR reports as many of these
1514as possible.

--- 125 unchanged lines hidden ---
1508.sp
1509.LP
1510Schneier, B., \fIApplied Cryptography: Protocols, Algorithms, and Source Code
1511in C\fR. Second ed. New York, New York: John Wiley & Sons, 1996.
1512.SH DIAGNOSTICS
1513The \fBipseckey\fR command parses the configuration file and reports any
1514errors. In the case of multiple errors, \fBipseckey\fR reports as many of these
1515as possible.

--- 125 unchanged lines hidden ---