summaryrefslogtreecommitdiff
path: root/doc/manpage.d/ipsec_spi.5.html
diff options
context:
space:
mode:
Diffstat (limited to 'doc/manpage.d/ipsec_spi.5.html')
-rw-r--r--doc/manpage.d/ipsec_spi.5.html305
1 files changed, 305 insertions, 0 deletions
diff --git a/doc/manpage.d/ipsec_spi.5.html b/doc/manpage.d/ipsec_spi.5.html
new file mode 100644
index 000000000..b1cf89033
--- /dev/null
+++ b/doc/manpage.d/ipsec_spi.5.html
@@ -0,0 +1,305 @@
+Content-type: text/html
+
+<HTML><HEAD><TITLE>Manpage of IPSEC_SPI</TITLE>
+</HEAD><BODY>
+<H1>IPSEC_SPI</H1>
+Section: File Formats (5)<BR>Updated: 26 Jun 2000<BR><A HREF="#index">Index</A>
+<A HREF="http://localhost/cgi-bin/man/man2html">Return to Main Contents</A><HR>
+
+
+
+
+<A NAME="lbAB">&nbsp;</A>
+<H2>NAME</H2>
+
+ipsec_spi - list IPSEC Security Associations
+<A NAME="lbAC">&nbsp;</A>
+<H2>SYNOPSIS</H2>
+
+<B>ipsec</B>
+
+<B>spi</B>
+
+<P>
+
+<B>cat</B>
+
+<B>/proc/net/ipsec_spi</B>
+
+<P>
+
+<A NAME="lbAD">&nbsp;</A>
+<H2>DESCRIPTION</H2>
+
+<I>/proc/net/ipsec_spi</I>
+
+is a read-only file that lists the current IPSEC Security Associations.
+A Security Association (SA) is a transform through which packet contents
+are to be processed before being forwarded. A transform can be an
+IPv4-in-IPv4 or IPv6-in-IPv6 encapsulation, an IPSEC Authentication Header (authentication
+with no encryption), or an IPSEC Encapsulation Security Payload
+(encryption, possibly including authentication).
+<P>
+
+When a packet is passed from a higher networking layer through an IPSEC
+virtual interface, a search in the extended routing table (see
+<I><A HREF="ipsec_eroute.5.html">ipsec_eroute</A></I>(5))
+
+yields
+a IP protocol number
+,
+a Security Parameters Index (SPI)
+and
+an effective destination address
+When an IPSEC packet arrives from the network,
+its ostensible destination, an SPI and an IP protocol
+specified by its outermost IPSEC header are used.
+The destination/SPI/protocol combination is used to select a relevant SA.
+(See
+<I><A HREF="ipsec_spigrp.5.html">ipsec_spigrp</A></I>(5)
+
+for discussion of how multiple transforms are combined.)
+<P>
+
+An
+<I>spi ,</I>
+
+<I>proto, </I>
+
+<I>daddr</I>
+
+and
+<I>address_family</I>
+
+arguments specify an SAID.
+<I>Proto</I>
+
+is an ASCII string, &quot;ah&quot;, &quot;esp&quot;, &quot;comp&quot; or &quot;tun&quot;, specifying the IP protocol.
+<I>Spi</I>
+
+is a number, preceded by '.' indicating hexadecimal and IPv4 or by ':' indicating hexadecimal and IPv6,
+where each hexadecimal digit represents 4 bits,
+between
+<B>0x100</B>
+
+and
+<B>0xffffffff</B>;
+
+values from
+<B>0x0</B>
+
+to
+<B>0xff</B>
+
+are reserved.
+<I>Daddr</I>
+
+is a dotted-decimal IPv4 destination address or a coloned hex IPv6 destination address.
+<P>
+
+An
+<I>SAID</I>
+
+combines the three parameters above, such as: &quot;<A HREF="mailto:tun.101@1.2.3.4">tun.101@1.2.3.4</A>&quot; for IPv4 or &quot;tun:<A HREF="mailto:101@3049">101@3049</A>:1::1&quot; for IPv6
+<P>
+
+A table entry consists of:
+<DL COMPACT>
+<DT>+<DD>
+<B>SAID</B>
+
+<DT>+<DD>
+&lt;transform name (proto,encalg,authalg)&gt;:
+<DT>+<DD>
+direction (dir=)
+<DT>+<DD>
+source address (src=)
+<DT>+<DD>
+source and destination addresses and masks for inner header policy check
+addresses (policy=), as dotted-quads or coloned hex, separated by '-&gt;',
+for IPv4-in-IPv4 or IPv6-in-IPv6 SAs only
+<DT>+<DD>
+initialisation vector length and value (iv_bits=, iv=) if non-zero
+<DT>+<DD>
+out-of-order window size, number of out-of-order errors, sequence
+number, recently received packet bitmask, maximum difference between
+sequence numbers (ooowin=, ooo_errs=, seq=, bit=, max_seq_diff=) if SA
+is AH or ESP and if individual items are non-zero
+<DT>+<DD>
+extra flags (flags=) if any are set
+<DT>+<DD>
+authenticator length in bits (alen=) if non-zero
+<DT>+<DD>
+authentication key length in bits (aklen=) if non-zero
+<DT>+<DD>
+authentication errors (auth_errs=) if non-zero
+<DT>+<DD>
+encryption key length in bits (eklen=) if non-zero
+<DT>+<DD>
+encryption size errors (encr_size_errs=) if non-zero
+<DT>+<DD>
+encryption padding error warnings (encr_pad_errs=) if non-zero
+<DT>+<DD>
+lifetimes legend, c=Current status, s=Soft limit when exceeded will
+initiate rekeying, h=Hard limit will cause termination of SA (life(c,s,h)=)
+<DT>+<DD>
+number of connections to which the SA is allocated (c), that will cause a
+rekey (s), that will cause an expiry (h) (alloc=), if any value is non-zero
+<DT>+<DD>
+number of bytes processesd by this SA (c), that will cause a rekey (s), that
+will cause an expiry (h) (bytes=), if any value is non-zero
+<DT>+<DD>
+time since the SA was added (c), until rekey (s), until expiry (h), in seconds (add=)
+<DT>+<DD>
+time since the SA was first used (c), until rekey (s), until expiry (h), in seconds (used=),
+if any value is non-zero
+<DT>+<DD>
+number of packets processesd by this SA (c), that will cause a rekey (s), that
+will cause an expiry (h) (packets=), if any value is non-zero
+<DT>+<DD>
+time since the last packet was processed, in seconds (idle=), if SA has
+been used
+<DT><DD>
+average compression ratio (ratio=)
+</DL>
+<A NAME="lbAE">&nbsp;</A>
+<H2>EXAMPLES</H2>
+
+<B><A HREF="mailto:tun.12a@192.168.43.1">tun.12a@192.168.43.1</A> IPIP: dir=out src=192.168.43.2</B>
+
+<BR>
+
+<B> life(c,s,h)=bytes(14073,0,0)add(269,0,0)</B>
+
+<BR>
+
+<B> use(149,0,0)packets(14,0,0)</B>
+
+<BR>
+
+<B> idle=23</B>
+
+<P>
+
+is an outbound IPv4-in-IPv4 (protocol 4) tunnel-mode SA set up between machines
+192.168.43.2 and 192.168.43.1 with an SPI of 12a in hexadecimal that has
+passed about 14 kilobytes of traffic in 14 packets since it was created,
+269 seconds ago, first used 149 seconds ago and has been idle for 23
+seconds.
+<P>
+
+<B>esp:<A HREF="mailto:9a35fc02@3049">9a35fc02@3049</A>:1::1 ESP_3DES_HMAC_MD5:</B>
+
+<BR>
+
+<B> dir=in src=<A HREF="mailto:9a35fc02@3049">9a35fc02@3049</A>:1::2</B>
+
+<BR>
+
+<B> ooowin=32 seq=7149 bit=0xffffffff</B>
+
+<BR>
+
+<B> alen=128 aklen=128 eklen=192</B>
+
+<BR>
+
+<B> life(c,s,h)=bytes(1222304,0,0)add(4593,0,0)</B>
+
+<BR>
+
+<B> use(3858,0,0)packets(7149,0,0)</B>
+
+<BR>
+
+<B> idle=23</B>
+
+<P>
+
+is an inbound Encapsulating Security Payload (protocol 50) SA on machine
+3049:1::1 with an SPI of 9a35fc02 that uses 3DES as the encryption
+cipher, HMAC MD5 as the authentication algorithm, an out-of-order
+window of 32 packets, a present sequence number of 7149, every one of
+the last 32 sequence numbers was received, the authenticator length and
+keys is 128 bits, the encryption key is 192 bits (actually 168 for 3DES
+since 1 of 8 bits is a parity bit), has passed 1.2 Mbytes of data in
+7149 packets, was added 4593 seconds ago, first used
+3858 seconds ago and has been idle for 23 seconds.
+<P>
+
+<A NAME="lbAF">&nbsp;</A>
+<H2>FILES</H2>
+
+/proc/net/ipsec_spi, /usr/local/bin/ipsec
+<A NAME="lbAG">&nbsp;</A>
+<H2>SEE ALSO</H2>
+
+<A HREF="ipsec.8.html">ipsec</A>(8), <A HREF="ipsec_manual.8.html">ipsec_manual</A>(8), <A HREF="ipsec_tncfg.5.html">ipsec_tncfg</A>(5), <A HREF="ipsec_eroute.5.html">ipsec_eroute</A>(5),
+<A HREF="ipsec_spigrp.5.html">ipsec_spigrp</A>(5), <A HREF="ipsec_klipsdebug.5.html">ipsec_klipsdebug</A>(5), <A HREF="ipsec_spi.8.html">ipsec_spi</A>(8), <A HREF="ipsec_version.5.html">ipsec_version</A>(5),
+<A HREF="ipsec_pf_key.5.html">ipsec_pf_key</A>(5)
+<A NAME="lbAH">&nbsp;</A>
+<H2>HISTORY</H2>
+
+Written for the Linux FreeS/WAN project
+&lt;<A HREF="http://www.freeswan.org/">http://www.freeswan.org/</A>&gt;
+by Richard Guy Briggs.
+<A NAME="lbAI">&nbsp;</A>
+<H2>BUGS</H2>
+
+The add and use times are awkward, displayed in seconds since machine
+start. It would be better to display them in seconds before now for
+human readability.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+<P>
+
+<HR>
+<A NAME="index">&nbsp;</A><H2>Index</H2>
+<DL>
+<DT><A HREF="#lbAB">NAME</A><DD>
+<DT><A HREF="#lbAC">SYNOPSIS</A><DD>
+<DT><A HREF="#lbAD">DESCRIPTION</A><DD>
+<DT><A HREF="#lbAE">EXAMPLES</A><DD>
+<DT><A HREF="#lbAF">FILES</A><DD>
+<DT><A HREF="#lbAG">SEE ALSO</A><DD>
+<DT><A HREF="#lbAH">HISTORY</A><DD>
+<DT><A HREF="#lbAI">BUGS</A><DD>
+</DL>
+<HR>
+This document was created by
+<A HREF="http://localhost/cgi-bin/man/man2html">man2html</A>,
+using the manual pages.<BR>
+Time: 21:40:18 GMT, November 11, 2003
+</BODY>
+</HTML>