summaryrefslogtreecommitdiff
path: root/src/ipsec/ipsec.8.in
diff options
context:
space:
mode:
Diffstat (limited to 'src/ipsec/ipsec.8.in')
-rw-r--r--src/ipsec/ipsec.8.in302
1 files changed, 0 insertions, 302 deletions
diff --git a/src/ipsec/ipsec.8.in b/src/ipsec/ipsec.8.in
deleted file mode 100644
index 24a796392..000000000
--- a/src/ipsec/ipsec.8.in
+++ /dev/null
@@ -1,302 +0,0 @@
-.TH IPSEC 8 "2010-05-30" "@IPSEC_VERSION@" "strongSwan"
-.SH NAME
-ipsec \- invoke IPsec utilities
-.SH SYNOPSIS
-.B ipsec
-\fIcommand\fP [ \fIarguments\fP ] [ \fIoptions\fP ]
-.PP
-.SH DESCRIPTION
-The
-.B ipsec
-utility invokes any of several utilities involved in controlling and monitoring
-the IPsec encryption/authentication system, running the specified \fIcommand\fP
-with the specified \fIarguments\fP and \fIoptions\fP as if it had been invoked
-directly. This largely eliminates possible name collisions with other software,
-and also permits some centralized services.
-.PP
-All the commands described in this manual page are built-in and are used to
-control and monitor IPsec connections as well as the IKE daemons.
-.PP
-For other commands
-.I ipsec
-supplies the invoked
-.I command
-with a suitable PATH environment variable,
-and also provides IPSEC_DIR,
-IPSEC_CONFS, and IPSEC_VERSION environment variables,
-containing respectively
-the full pathname of the directory where the IPsec utilities are stored,
-the full pathname of the directory where the configuration files live,
-and the IPsec version number.
-.PP
-.SS CONTROL COMMANDS
-.TP
-.B "ipsec start [ starter options ]"
-calls
-.BR "ipsec starter"
-which in turn parses \fIipsec.conf\fR and starts the IKEv1 \fIpluto\fR and
-IKEv2 \fIcharon\fR daemons.
-.PP
-.TP
-.B "ipsec update"
-sends a \fIHUP\fR signal to
-.BR "ipsec starter"
-which in turn determines any changes in \fIipsec.conf\fR
-and updates the configuration on the running IKEv1 \fIpluto\fR and IKEv2
-\fIcharon\fR daemons, correspondingly.
-.PP
-.TP
-.B "ipsec reload"
-sends a \fIUSR1\fR signal to
-.BR "ipsec starter"
-which in turn reloads the whole configuration on the running IKEv1 \fIpluto\fR
-and IKEv2 \fIcharon\fR daemons based on the actual \fIipsec.conf\fR.
-.PP
-.TP
-.B "ipsec restart"
-is equivalent to
-.B "ipsec stop"
-followed by
-.B "ipsec start"
-after a guard of 2 seconds.
-.PP
-.TP
-.B "ipsec stop"
-terminates all IPsec connections and stops the IKEv1 \fIpluto\fR and IKEv2
-\fIcharon\fR daemons by sending a \fITERM\fR signal to
-.BR "ipsec starter".
-.PP
-.TP
-.B "ipsec up \fIname\fP"
-tells the responsible IKE daemon to start up connection \fIname\fP.
-.PP
-.TP
-.B "ipsec down \fIname\fP"
-tells the responsible IKE daemon to terminate connection \fIname\fP.
-.PP
-.TP
-.B "ipsec down \fIname{n}\fP"
-terminates IKEv2 CHILD SA instance \fIn\fP of connection \fIname\fP.
-.PP
-.TP
-.B "ipsec down \fIname{*}\fP"
-terminates all IKEv2 CHILD SA instances of connection \fIname\fP.
-.PP
-.TP
-.B "ipsec down \fIname[n]\fP"
-terminates all IKEv2 IKE SA instance \fIn\fP of connection \fIname\fP.
-.PP
-.TP
-.B "ipsec down \fIname[*]\fP"
-terminates all IKEv2 IKE SA instances of connection \fIname\fP.
-.PP
-.TP
-.B "ipsec route \fIname\fP"
-tells the responsible IKE daemon to insert an IPsec policy in the kernel
-for connection \fIname\fP. The first payload packet matching the IPsec policy
-will automatically trigger an IKE connection setup.
-.PP
-.TP
-.B "ipsec unroute \fIname\fP"
-remove the IPsec policy in the kernel for connection \fIname\fP.
-.PP
-.TP
-.B "ipsec status [ \fIname\fP ]"
-returns concise status information either on connection
-\fIname\fP or if the argument is lacking, on all connections.
-.PP
-.TP
-.B "ipsec statusall [ \fIname\fP ]"
-returns detailed status information either on connection
-\fIname\fP or if the argument is lacking, on all connections.
-.PP
-.SS LIST COMMANDS
-.TP
-.B "ipsec listalgs"
-returns a list all supported IKE encryption and hash algorithms, the available
-Diffie-Hellman groups, as well as all supported ESP encryption and
-authentication algorithms registered via the Linux kernel's Crypto API.
-.br
-Supported by the IKEv1 \fIpluto\fP daemon only.
-.PP
-.TP
-.B "ipsec listpubkeys [ --utc ]"
-returns a list of RSA public keys that were either loaded in raw key format
-or extracted from X.509 and|or OpenPGP certificates.
-.br
-Supported by the IKEv1 \fIpluto\fP daemon only.
-.PP
-.TP
-.B "ipsec listcerts [ --utc ]"
-returns a list of X.509 and|or OpenPGP certificates that were either loaded
-locally by the IKE daemon or received via the IKEv2 protocol.
-.PP
-.TP
-.B "ipsec listcacerts [ --utc ]"
-returns a list of X.509 Certification Authority (CA) certificates that were
-loaded locally by the IKE daemon from the \fI/etc/ipsec.d/cacerts/\fP
-directory or received in PKCS#7-wrapped certificate payloads via the IKE
-protocol.
-.PP
-.TP
-.B "ipsec listaacerts [ --utc ]"
-returns a list of X.509 Authorization Authority (AA) certificates that were
-loaded locally by the IKE daemon from the \fI/etc/ipsec.d/aacerts/\fP
-directory.
-.PP
-.TP
-.B "ipsec listocspcerts [ --utc ]"
-returns a list of X.509 OCSP Signer certificates that were either loaded
-locally by the IKE daemon from the \fI/etc/ipsec.d/ocspcerts/\fP
-directory or were sent by an OCSP server.
-.PP
-.TP
-.B "ipsec listacerts [ --utc ]"
-returns a list of X.509 Attribute certificates that were loaded locally by
-the IKE daemon from the \fI/etc/ipsec.d/acerts/\fP directory.
-.PP
-.TP
-.B "ipsec listgroups [ --utc ]"
-returns a list of groups that are used to define user authorization profiles.
-.br
-Supported by the IKEv1 \fIpluto\fP daemon only.
-.PP
-.TP
-.B "ipsec listcainfos [ --utc ]"
-returns certification authority information (CRL distribution points, OCSP URIs,
-LDAP servers) that were defined by
-.BR ca
-sections in \fIipsec.conf\fP.
-.PP
-.TP
-.B "ipsec listcrls [ --utc ]"
-returns a list of Certificate Revocation Lists (CRLs) that were either loaded
-by the IKE daemon from the \fI/etc/ipsec.d/crls\fP directory or fetched from
-an HTTP- or LDAP-based CRL distribution point.
-.PP
-.TP
-.B "ipsec listocsp [ --utc ]"
-returns revocation information fetched from OCSP servers.
-.PP
-.TP
-.B "ipsec listcards [ --utc ]"
-list all certificates found on attached smart cards.
-.br
-Supported by the IKEv1 \fIpluto\fP daemon only.
-.PP
-.TP
-.B "ipsec listall [ --utc ]"
-returns all information generated by the list commands above. Each list command
-can be called with the
-\fB\-\-utc\fP
-option which displays all dates in UTC instead of local time.
-.PP
-.SS REREAD COMMANDS
-.TP
-.B "ipsec rereadsecrets"
-flushes and rereads all secrets defined in \fIipsec.secrets\fP.
-.PP
-.TP
-.B "ipsec rereadcacerts"
-reads all certificate files contained in the \fI/etc/ipsec.d/cacerts\fP
-directory and adds them to the list of Certification Authority (CA)
-certificates.
-.PP
-.TP
-.B "ipsec rereadaacerts"
-reads all certificate files contained in the \fI/etc/ipsec.d/aacerts\fP
-directory and adds them to the list of Authorization Authority (AA)
-certificates.
-.PP
-.TP
-.B "ipsec rereadocspcerts"
-reads all certificate files contained in the \fI/etc/ipsec.d/ocspcerts/\fP
-directory and adds them to the list of OCSP signer certificates.
-.PP
-.TP
-.B "ipsec rereadacerts"
-reads all certificate files contained in the \fI/etc/ipsec.d/acerts/\fP
-directory and adds them to the list of attribute certificates.
-.PP
-.TP
-.B "ipsec rereadcrls"
-reads all Certificate Revocation Lists (CRLs) contained in the
-\fI/etc/ipsec.d/crls/\fP directory and adds them to the list of CRLs.
-.PP
-.TP
-.B "ipsec rereadall"
-executes all reread commands listed above.
-.PP
-.SS PURGE COMMANDS
-.TP
-.B "ipsec purgeike"
-purges IKEv2 SAs that don't have a CHILD SA.
-.PP
-.TP
-.B "ipsec purgeocsp"
-purges all cached OCSP information records.
-.PP
-.SS INFO COMMANDS
-.TP
-.B "ipsec \-\-help"
-returns the usage information for the ipsec command.
-.PP
-.TP
-.B "ipsec \-\-version"
-returns the version in the form of
-.B Linux strongSwan U<strongSwan userland version>/K<Linux kernel version>
-if strongSwan uses the native NETKEY IPsec stack of the Linux kernel it is
-running on.
-.PP
-.TP
-.B "ipsec \-\-versioncode"
-returns the version number in the form of
-.B U<strongSwan userland version>/K<Linux kernel version>
-if strongSwan uses the native NETKEY IPsec stack of the Linux kernel it is
-running on.
-.PP
-.TP
-.B "ipsec \-\-copyright"
-returns the copyright information.
-.PP
-.TP
-.B "ipsec \-\-directory"
-returns the \fILIBEXECDIR\fP directory as defined by the configure options.
-.PP
-.TP
-.B "ipsec \-\-confdir"
-returns the \fISYSCONFDIR\fP directory as defined by the configure options.
-.SH FILES
-/usr/local/lib/ipsec usual utilities directory
-.SH ENVIRONMENT
-.PP
-The following environment variables control where strongSwan finds its
-components.
-The
-.B ipsec
-command sets them if they are not already set.
-.nf
-.na
-
-IPSEC_DIR directory containing ipsec programs and utilities
-IPSEC_SBINDIR directory containing \fBipsec\fP command
-IPSEC_CONFDIR directory containing configuration files
-IPSEC_PIDDIR directory containing PID files
-IPSEC_NAME name of ipsec distribution
-IPSEC_VERSION version numer of ipsec userland and kernel
-IPSEC_STARTER_PID PID file for ipsec starter
-IPSEC_PLUTO_PID PID file for IKEv1 keying daemon
-IPSEC_CHARON_PID PID file for IKEv2 keying daemon
-.ad
-.fi
-.SH SEE ALSO
-.hy 0
-.na
-ipsec.conf(5), ipsec.secrets(5)
-.ad
-.hy
-.PP
-.SH HISTORY
-Originally written for the FreeS/WAN project by Henry Spencer.
-Updated and extended for the strongSwan project <http://www.strongswan.org> by
-Tobias Brunner and Andreas Steffen.