Annotation of embedaddon/ipsec-tools/src/setkey/sample.cf, revision 1.1

1.1     ! misho       1: # Copyright (C) 1995, 1996, 1997, 1998, and 1999 WIDE Project.
        !             2: # All rights reserved.
        !             3: # 
        !             4: # Redistribution and use in source and binary forms, with or without
        !             5: # modification, are permitted provided that the following conditions
        !             6: # are met:
        !             7: # 1. Redistributions of source code must retain the above copyright
        !             8: #    notice, this list of conditions and the following disclaimer.
        !             9: # 2. Redistributions in binary form must reproduce the above copyright
        !            10: #    notice, this list of conditions and the following disclaimer in the
        !            11: #    documentation and/or other materials provided with the distribution.
        !            12: # 3. Neither the name of the project nor the names of its contributors
        !            13: #    may be used to endorse or promote products derived from this software
        !            14: #    without specific prior written permission.
        !            15: # 
        !            16: # THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
        !            17: # ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
        !            18: # IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
        !            19: # ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
        !            20: # FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
        !            21: # DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
        !            22: # OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
        !            23: # HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
        !            24: # LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
        !            25: # OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
        !            26: # SUCH DAMAGE.
        !            27: 
        !            28: # There are sample scripts for IPsec configuration by manual keying.
        !            29: # A security association is uniquely identified by a triple consisting
        !            30: # of a Security Parameter Index (SPI), an IP Destination Address, and a
        !            31: # security protocol (AH or ESP) identifier.  You must take care of these
        !            32: # parameters when you configure by manual keying.
        !            33: 
        !            34: # ESP transport mode is recommended for TCP port number 110 between
        !            35: # Host-A and Host-B. Encryption algorithm is blowfish-cbc whose key
        !            36: # is "kamekame", and authentication algorithm is hmac-sha1 whose key
        !            37: # is "this is the test key".
        !            38: #
        !            39: #       ============ ESP ============
        !            40: #       |                           |
        !            41: #    Host-A                        Host-B
        !            42: #   fec0::10 -------------------- fec0::11
        !            43: #
        !            44: # At Host-A and Host-B,
        !            45: spdadd fec0::10[any] fec0::11[110] tcp -P out ipsec
        !            46:        esp/transport//use ;
        !            47: spdadd fec0::11[110] fec0::10[any] tcp -P in ipsec
        !            48:        esp/transport//use ;
        !            49: add fec0::10 fec0::11 esp 0x10001
        !            50:        -m transport
        !            51:        -E blowfish-cbc "kamekame"
        !            52:        -A hmac-sha1 "this is the test key" ;
        !            53: add fec0::11 fec0::10 esp 0x10002
        !            54:        -m transport
        !            55:        -E blowfish-cbc "kamekame"
        !            56:        -A hmac-sha1 "this is the test key" ;
        !            57: 
        !            58: # "[any]" is wildcard of port number.  Note that "[0]" is the number of
        !            59: # zero in port number.
        !            60: 
        !            61: # Security protocol is old AH tunnel mode, i.e. RFC1826, with keyed-md5
        !            62: # whose key is "this is the test" as authentication algorithm.
        !            63: # That protocol takes place between Gateway-A and Gateway-B.
        !            64: #
        !            65: #                        ======= AH =======
        !            66: #                        |                |
        !            67: #    Network-A       Gateway-A        Gateway-B        Network-B
        !            68: #   10.0.1.0/24 ---- 172.16.0.1 ----- 172.16.0.2 ---- 10.0.2.0/24
        !            69: #
        !            70: # At Gateway-A:
        !            71: spdadd 10.0.1.0/24 10.0.2.0/24 any -P out ipsec
        !            72:        ah/tunnel/172.16.0.1-172.16.0.2/require ;
        !            73: spdadd 10.0.2.0/24 10.0.1.0/24 any -P in ipsec
        !            74:        ah/tunnel/172.16.0.2-172.16.0.1/require ;
        !            75: add 172.16.0.1 172.16.0.2 ah-old 0x10003
        !            76:        -m any
        !            77:        -A keyed-md5 "this is the test" ;
        !            78: add 172.16.0.2 172.16.0.1 ah-old 0x10004
        !            79:        -m any
        !            80:        -A keyed-md5 "this is the test" ;
        !            81: 
        !            82: # If port number field is omitted such above then "[any]" is employed.
        !            83: # -m specifies the mode of SA to be used.  "-m any" means wildcard of
        !            84: # mode of security protocol.  You can use this SAs for both tunnel and
        !            85: # transport mode.
        !            86: 
        !            87: # At Gateway-B.  Attention to the selector and peer's IP address for tunnel.
        !            88: spdadd 10.0.2.0/24 10.0.1.0/24 any -P out ipsec
        !            89:        ah/tunnel/172.16.0.2-172.16.0.1/require ;
        !            90: spdadd 10.0.1.0/24 10.0.2.0/24 any -P in ipsec
        !            91:        ah/tunnel/172.16.0.1-172.16.0.2/require ;
        !            92: add 172.16.0.1 172.16.0.2 ah-old 0x10003
        !            93:        -m tunnel
        !            94:        -A keyed-md5 "this is the test" ;
        !            95: add 172.16.0.2 172.16.0.1 ah-old 0x10004
        !            96:        -m tunnel
        !            97:        -A keyed-md5 "this is the test" ;
        !            98: 
        !            99: # AH transport mode followed by ESP tunnel mode is required between
        !           100: # Gateway-A and Gateway-B.
        !           101: # Encryption algorithm is 3des-cbc, and authentication algorithm for ESP
        !           102: # is hmac-sha1.  Authentication algorithm for AH is hmac-md5.
        !           103: #
        !           104: #                           ========== AH =========
        !           105: #                           |  ======= ESP =====  |
        !           106: #                           |  |               |  |
        !           107: #      Network-A          Gateway-A        Gateway-B           Network-B
        !           108: #   fec0:0:0:1::/64 --- fec0:0:0:1::1 ---- fec0:0:0:2::1 --- fec0:0:0:2::/64
        !           109: #
        !           110: # At Gateway-A:
        !           111: spdadd fec0:0:0:1::/64 fec0:0:0:2::/64 any -P out ipsec
        !           112:        esp/tunnel/fec0:0:0:1::1-fec0:0:0:2::1/require
        !           113:        ah/transport//require ;
        !           114: spdadd fec0:0:0:2::/64 fec0:0:0:1::/64 any -P in ipsec
        !           115:        esp/tunnel/fec0:0:0:2::1-fec0:0:0:1::1/require
        !           116:        ah/transport//require ;
        !           117: add fec0:0:0:1::1 fec0:0:0:2::1 esp 0x10001
        !           118:        -m tunnel
        !           119:        -E 3des-cbc "kamekame12341234kame1234"
        !           120:        -A hmac-sha1 "this is the test key" ;
        !           121: add fec0:0:0:1::1 fec0:0:0:2::1 ah 0x10001
        !           122:        -m transport
        !           123:        -A hmac-md5 "this is the test" ;
        !           124: add fec0:0:0:2::1 fec0:0:0:1::1 esp 0x10001
        !           125:        -m tunnel
        !           126:        -E 3des-cbc "kamekame12341234kame1234"
        !           127:        -A hmac-sha1 "this is the test key" ;
        !           128: add fec0:0:0:2::1 fec0:0:0:1::1 ah 0x10001
        !           129:        -m transport
        !           130:        -A hmac-md5 "this is the test" ;
        !           131: 
        !           132: # ESP tunnel mode is required between Host-A and Gateway-A.
        !           133: # Encryption algorithm is cast128-cbc, and authentication algorithm
        !           134: # for ESP is hmac-sha1.
        !           135: # ESP transport mode is recommended between Host-A and Host-B.
        !           136: # Encryption algorithm is rc5-cbc,  and authentication algorithm
        !           137: # for ESP is hmac-md5.
        !           138: #
        !           139: #       ================== ESP =================
        !           140: #       |  ======= ESP =======                 |
        !           141: #       |  |                 |                 |
        !           142: #      Host-A            Gateway-A           Host-B
        !           143: #   fec0:0:0:1::1 ---- fec0:0:0:2::1 ---- fec0:0:0:2::2
        !           144: #
        !           145: # At Host-A:
        !           146: spdadd fec0:0:0:1::1[any] fec0:0:0:2::2[80] tcp -P out ipsec
        !           147:        esp/transport//use
        !           148:        esp/tunnel/fec0:0:0:1::1-fec0:0:0:2::1/require ;
        !           149: spdadd fec0:0:0:2::1[80] fec0:0:0:1::1[any] tcp -P in ipsec
        !           150:        esp/transport//use
        !           151:        esp/tunnel/fec0:0:0:2::1-fec0:0:0:1::1/require ;
        !           152: add fec0:0:0:1::1 fec0:0:0:2::2 esp 0x10001
        !           153:        -m transport
        !           154:        -E cast128-cbc "12341234"
        !           155:        -A hmac-sha1 "this is the test key" ;
        !           156: add fec0:0:0:1::1 fec0:0:0:2::1 esp 0x10002
        !           157:        -E rc5-cbc "kamekame"
        !           158:        -A hmac-md5 "this is the test" ;
        !           159: add fec0:0:0:2::2 fec0:0:0:1::1 esp 0x10003
        !           160:        -m transport
        !           161:        -E cast128-cbc "12341234"
        !           162:        -A hmac-sha1 "this is the test key" ;
        !           163: add fec0:0:0:2::1 fec0:0:0:1::1 esp 0x10004
        !           164:        -E rc5-cbc "kamekame"
        !           165:        -A hmac-md5 "this is the test" ;
        !           166: 
        !           167: # By "get" command, you can get a entry of either SP or SA.
        !           168: get fec0:0:0:1::1 fec0:0:0:2::2 ah 0x10004 ;
        !           169: 
        !           170: # Also delete command, you can delete a entry of either SP or SA.
        !           171: spddelete fec0:0:0:1::/64 fec0:0:0:2::/64 any -P out;
        !           172: delete fec0:0:0:1::1 fec0:0:0:2::2 ah 0x10004 ;
        !           173: 
        !           174: # By dump command, you can dump all entry of either SP or SA.
        !           175: dump ;
        !           176: spddump ;
        !           177: dump esp ;
        !           178: flush esp ;
        !           179: 
        !           180: # By flush command, you can flush all entry of either SP or SA.
        !           181: flush ;
        !           182: spdflush ;
        !           183: 
        !           184: # "flush" and "dump" commands can specify a security protocol.
        !           185: dump esp ;
        !           186: flush ah ;
        !           187: 
        !           188: # XXX
        !           189: add ::1 ::1 esp 10001 -m transport -E null ;
        !           190: add ::1 ::1 esp 10002 -m transport -E des-deriv "12341234" ;
        !           191: add ::1 ::1 esp-old 10003 -m transport -E des-32iv "12341234" ;
        !           192: add ::1 ::1 esp 10004 -m transport -E null -A null ;
        !           193: add ::1 ::1 esp 10005 -m transport -E null -A hmac-md5 "1234123412341234" ;
        !           194: add ::1 ::1 esp 10006 -m tunnel -E null -A hmac-sha1 "12341234123412341234" ;
        !           195: add ::1 ::1 esp 10007 -m transport -E null -A keyed-md5 "1234123412341234" ;
        !           196: add ::1 ::1 esp 10008 -m any -E null -A keyed-sha1 "12341234123412341234" ;
        !           197: add ::1 ::1 esp 10009 -m transport -E des-cbc "testtest" ;
        !           198: add ::1 ::1 esp 10010 -m transport -E 3des-cbc "testtest12341234testtest" ;
        !           199: add ::1 ::1 esp 10011 -m tunnel -E cast128-cbc "testtest1234" ;
        !           200: add ::1 ::1 esp 10012 -m tunnel -E blowfish-cbc "testtest1234" ;
        !           201: add ::1 ::1 esp 10013 -m tunnel -E rc5-cbc "testtest1234" ;
        !           202: add ::1 ::1 esp 10014 -m any -E rc5-cbc "testtest1234" ;
        !           203: add ::1 ::1 esp 10015 -m transport -f zero-pad -E null ;
        !           204: add ::1 ::1 esp 10016 -m tunnel -f random-pad -r 8 -lh 100 -ls 80 -E null ;
        !           205: add ::1 ::1 esp 10017 -m transport -f seq-pad -f nocyclic-seq -E null ;
        !           206: add ::1 ::1 esp 10018 -m transport -E null ;
        !           207: #add ::1 ::1 ah 20000 -m transport -A null ;
        !           208: add ::1 ::1 ah 20001 -m any -A hmac-md5 "1234123412341234";
        !           209: add ::1 ::1 ah 20002 -m tunnel -A hmac-sha1 "12341234123412341234";
        !           210: add ::1 ::1 ah 20003 -m transport -A keyed-md5 "1234123412341234";
        !           211: add ::1 ::1 ah-old 20004 -m transport -A keyed-md5 "1234123412341234";
        !           212: add ::1 ::1 ah 20005 -m transport -A keyed-sha1 "12341234123412341234";
        !           213: #add ::1 ::1 ipcomp 30000 -C oui ;
        !           214: add ::1 ::1 ipcomp 30001 -C deflate ;
        !           215: #add ::1 ::1 ipcomp 30002 -C lzs ;
        !           216: 
        !           217: # enjoy.

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>