ipsecalgs(8) 맨 페이지 - 윈디하나의 솔라나라

개요

섹션
맨 페이지 이름
검색(S)

ipsecalgs(8)

System Administration Commands                                    ipsecalgs(8)



NAME
       ipsecalgs - configure the IPsec protocols and algorithms table

SYNOPSIS
       ipsecalgs


       ipsecalgs -l


       ipsecalgs -s


       ipsecalgs -a [-P protocol-number | -p protocol-name] -k keylen-list
            [-i inc] [-K default-keylen] -b blocklen-list -n alg-names
            -N alg-number -m mech-name [-I initialization-vector_length]
            [-M MAC-length] [-S length-of-salt] [-F flags] [-f] [-s]


       ipsecalgs -P protocol-number -p protocol-name
            [-e exec-mode] [-f] [-s]


       ipsecalgs -r -p protocol-name -n alg-name [-s]


       ipsecalgs -r -p protocol-name -N alg-number [-s]


       ipsecalgs -R -P protocol-number [-s]


       ipsecalgs -R -p protocol-name [-s]


       ipsecalgs -e exec-mode -P protocol-number [-s]


       ipsecalgs -e exec-mode -p protocol-name [-s]

DESCRIPTION
       Use  the  ipsecalgs  command to query and modify the IPsec protocol and
       algorithms stored in /etc/inet/ipsecalgs. You  can  use  the  ipsecalgs
       command to do the following:

           o      list the currently defined IPsec protocols and algorithms


           o      modify IPsec protocols definitions


           o      modify IPsec algorithms definitions



       Never  edit the /etc/inet/ipsecalgs file manually. The valid IPsec pro‐
       tocols and algorithms are described by the ISAKMP DOI. See RFC 2407. In
       the  general  sense, a Domain of Interpretation (DOI) defines data for‐
       mats, network traffic exchange types, and conventions for naming  secu‐
       rity-relevant  information  such  as security policies or cryptographic
       algorithms and modes. For ipsecalgs, the DOI defines naming and number‐
       ing  conventions for algorithms and the protocols they belong to. These
       numbers are defined by the Internet Assigned Numbers Authority  (IANA).
       Each  algorithm  belongs  to a protocol. Algorithm information includes
       supported key lengths, block or MAC length, and the name of the crypto‐
       graphic  mechanism corresponding to that algorithm. This information is
       used by the IPsec modules, ipsecesp(4P) and ipsecah(4P),  to  determine
       the  authentication  and  encryption  algorithms that can be applied to
       IPsec traffic.


       The following protocols are predefined:

       IPSEC_PROTO_ESP    Defines the encryption algorithms (transforms)  that
                          can  be  used by IPsec to provide data confidential‐
                          ity.


       IPSEC_PROTO_AH     Defines the authentication  algorithms  (transforms)
                          that can be used by IPsec to provide authentication.



       The mechanism name specified by an algorithm entry must correspond to a
       valid Solaris Cryptographic Framework mechanism.  You  can  obtain  the
       list of available mechanisms by using the cryptoadm(8) command.


       Applications can retrieve the supported algorithms and their associated
       protocols by using  the  functions  getipsecalgbyname(3C),  getipsecal‐
       gbynum(3C), getipsecprotobyname(3C) and getipsecprotobynum(3C).


       Modifications to the protocols and algorithm by default update only the
       contents of the /etc/inet/ipsecalgs configuration file.  In  order  for
       the  new  definitions to be used for IPsec processing, the changes must
       be communicated to the kernel using the -s  option.  See  NOTES  for  a
       description of how the ipsecalgs configuration is synchronized with the
       kernel at system restart.


       When invoked without arguments, ipsecalgs displays the list of mappings
       that  are  currently defined in /etc/inet/ipsecalgs. You can obtain the
       corresponding kernel table of protocols and algorithms by using the  -l
       option.

OPTIONS
       ipsecalgs supports the following options:

       -a

           Adds  an  algorithm of the protocol specified by the -P option. The
           algorithm name(s) are specified with the -n option.  The  supported
           key  lengths  and block sizes are specified with the -k, -i, and -b
           options.


       -b blocklen-list

           Specifies the block or MAC lengths of an algorithm, in  bytes.  Set
           more than one block length by separating the values with commas.


       -e exec-mode

           Designates  the  execution  mode  of cryptographic requests for the
           specified  protocol  in  the  absence  of  cryptographic   hardware
           provider.  See  cryptoadm(8). exec-mode can be one of the following
           values:


           sync     Cryptographic requests are processed synchronously in  the
                    absence  of a cryptographic hardware provider. This execu‐
                    tion mode leads to better latency  when  no  cryptographic
                    hardware providers are available


           async    Cryptographic requests are always processed asynchronously
                    in the absence of cryptographic  hardware  provider.  This
                    execution can improve the resource utilization on a multi-
                    CPU system, but can lead to higher latency when no crypto‐
                    graphic hardware providers are available.

           This  option  can  be  specified when defining a new protocol or to
           modify the execution mode of an existing protocol. By default,  the
           sync execution mode is used in the absence of a cryptographic hard‐
           ware provider.


       -f

           Used with the -a option to force the addition of  an  algorithm  or
           protocol if an entry with the same name or number already exists.


       -i inc

           Specifies the valid key length increments in bits. This option must
           be used when the valid key lengths for an algorithm  are  specified
           by a range with the -k option.


       -K default-keylen

           Specifies the default key lengths for an algorithm, in bits. If the
           -K option is not specified, the minimum key length will  be  deter‐
           mined as follows:

               o      If the supported key lengths are specified by range, the
                      default key length will be the minimum key length.


               o      If the supported key lengths are specified  by  enumera‐
                      tion,  the  default  key length will be the first listed
                      key length.



       -k keylen-list

           Specifies the supported key lengths for an algorithm, in bits.  You
           can designate the supported key lengths by enumeration or by range.

           Without  the  -i  option, -k specifies the supported key lengths by
           enumeration. In this case, keylen-list consists of a list of one or
           more key lengths separated by commas, for example:


             128,192,256

           The listed key lengths need not be increasing, and the first listed
           key length will be used as the default key length  for  that  algo‐
           rithm unless the -K option is used.

           With the -i option, -k specifies the range of supported key lengths
           for the algorithm. The minimum and maximum key lengths must be sep‐
           arated by a dash ('-') character, for example:

             32-448



       -l

           Displays the kernel algorithm tables.


       -m mech-name

           Specifies  the name of the cryptographic framework mechanism corre‐
           sponding to the algorithm. Cryptographic framework  mechanisms  are
           described in the cryptoadm(8) man page.


       -N alg-number

           Specifies  an algorithm number. The algorithm number for a protocol
           must be unique. IANA manages the algorithm numbers. See RFC 2407.


       -n alg-names

           Specifies one or more names for an algorithm. When adding an  algo‐
           rithm  with  the -a option, alg-names contains a string or a comma-
           separated list of strings, for example:


             aes-cbc,aes

           When used with the -r option to remove an algorithm, alg-names con‐
           tains one of the valid algorithm names.


       -P protocol-number

           Adds a protocol of the number specified by protocol-number with the
           name specified by the -p option. This option is also used to  spec‐
           ify  an  IPsec  protocol  when used with the -a and the -R options.
           Protocol numbers are managed by the IANA. See RFC 2407.


       -p protocol-name

           Specifies the name of the IPsec protocol.


       -R

           Removes an IPsec protocol from the algorithm  table.  The  protocol
           can  be  specified  by  number by using the -P option or by name by
           using the -p option. The algorithms associated  with  the  protocol
           are removed as well.


       -r

           Removes  the  mapping for an algorithm. The algorithm can be speci‐
           fied by algorithm number by using the -N option.


       -s

           Synchronizes the kernel with the contents  of  /etc/inet/ipsecalgs.
           The  contents  of  /etc/inet/ipsecalgs  are always updated, but new
           information is not passed on to the kernel unless the -s  is  used.
           See  NOTES  for a description of how the ipsecalgs configuration is
           synchronized with the kernel at system restart.



       The following options allow optional parameters to be configured. These
       are  currently  only  used for combined mode algorithms, that is, algo‐
       rithms that provide encryption and authentication in  a  single  opera‐
       tion.

       -I initialization-vector_length

           The  length of the Initialization Vector (IV) in bytes. The default
           IV length is the same as the block length.


       -M MAC-length

           The length of the MAC or ICV in bytes for combined mode algorithms.


       -S length-of-salt

           The number of bytes of salt needed by the algorithm. The salt needs
           to be provided by the key management mechanism.


       -F flags

           Algorithm  flags.  These influence the way in which the kernel han‐
           dles security tasks, especially authentication, in the kernel. They
           are  also used by ipseckey(8) and ipsecconf(8). Flags can be speci‐
           fied as a comma-separated list of tokens; see  the  example  below.
           The following tokens are supported:


           COUNTERMODE

               The algorithm uses counter mode.


           COMBINED

               The  algorithm  provides  encryption  and authentication in the
               same operation.


           CCM

               The    cryptographic    framework     mechanism     needs     a
               crypto_ccm_params_t structure.


           GMAC

               The     cryptographic     framework     mechanism    needs    a
               crypto_gmac_params_t structure.


           GCM

               The    cryptographic    framework     mechanism     needs     a
               crypto_gcm_params_t structure.


           CBC

               This  flag  indicates the algorithm uses Cipher-block chaining.
               The cryptographic framework mechanism does not  need  a  params
               structure. This is also the default, this flag can be omitted.

           The algorithm flags can be displayed with the -l option.


EXAMPLES
       Example 1 Adding a Protocol for IPsec Encryption



       The following example shows how to add a protocol for IPsec encryption:


         example# ipsecalgs -P 3 -p "IPSEC_PROTO_ESP"


       Example 2 Adding the Blowfish Algorithm



       For  illustration purposes, the following theoretical example shows how
       to add the unsupported Blowfish algorithm:


         example# ipsecalgs -a -P 3 -k 32-488 -K 128 -i 8 -n "blowfish" \
           -b 8 -N 7 -m CKM_BF_CBC


       Example 3 Updating the Kernel Algorithm Table



       The following example updates the kernel algorithm table with the  cur‐
       rently defined protocol and algorithm definitions:


         example# svcadm refresh ipsecalgs


       Example 4 Adding the AES Galois/Counter Mode (GCM) Algorithm



       The following command adds this algorithm.


         example# ipsecalgs -a -P3 -k 128-256 -K 128 -i 64 -N 20 -b 16 \
         -n "aes-gcm16,aes-gcm" -m CKM_AES_GCM -M 16 -I 8 -S 4 \
              -F GCM,COMBINED,COUNTER


FILES
       /etc/inet/ipsecalgs

           File  that  contains  the  configured IPsec protocols and algorithm
           definitions. Never edit this file manually.


ATTRIBUTES
       See attributes(7) for descriptions of the following attributes:


       tab() box; cw(2.75i) |cw(2.75i) lw(2.75i) |lw(2.75i) ATTRIBUTE  TYPEAT‐
       TRIBUTE VALUE _ Availabilitysystem/network _ Interface StabilityCommit‐
       ted


SEE ALSO
       getipsecalgbyname(3C),      getipsecprotobyname(3C),       ipsecah(4P),
       ipsecesp(4P),   ike.config(5),   attributes(7),  smf(7),  cryptoadm(8),
       ipsecconf(8), ipseckey(8), svcadm(8)

       Piper, Derrell. RFC 2407, The Internet IP Security Domain of Interpre‐
       tation for ISAKMP. Network Working Group. November 1998.

           https://tools.ietf.org/html/rfc2407


NOTES
       When  protocols  or  algorithm definitions that are removed or altered,
       services that rely upon these definitions can become  unavailable.  For
       example,  if the IPSEC_PROTO_ESP protocol is removed, then IPsec cannot
       encrypt and decrypt packets.


       Synchronization of the ipsecalgs configuration with the kernel at  sys‐
       tem startup is provided by the following smf(7) service:

         svc:/network/ipsec/ipsecalgs:default



       The IPsec services are delivered as follows:

         svc:/network/ipsec/policy:default (enabled)
         svc:/network/ipsec/ipsecalgs:default (enabled)
         svc:/network/ipsec/manual-key:default (disabled)
         svc:/network/ipsec/ike:default (disabled)



       Services that are delivered disabled are delivered that way because the
       system administrator must create configuration files for those services
       before  enabling  them.  See ipseckey(8) and ike.config(5). The default
       policy for the policy service is to allow all traffic to  pass  without
       IPsec protection. See ipsecconf(8).


       The  correct  administrative  procedure  is to create the configuration
       file for each service, then enable each  service  using  svcadm(8),  as
       shown in the following example:

         example# svcadm enable ipsecalgs



       The service's status can be queried using the svcs(1) command.


       If  the  ipsecalgs  configuration  is  modified,  the new configuration
       should be resynchronized as follows:

         example# svcadm refresh ipsecalgs



       Administrative actions on this service, such  as  enabling,  disabling,
       refreshing,  and requesting restart can be performed using svcadm(8). A
       user who has been assigned the authorization shown  below  can  perform
       these actions:

         solaris.smf.manage.ipsec



       See auths(1), user_attr(5), rbac(7).


       The ipsecalgs  smf(7) service does not have any user-configurable prop‐
       erties.


       The smf(7) framework records any errors  in  the  service-specific  log
       file.  Use  any  of the following commands to examine the logfile prop‐
       erty:

         example# svcs -l ipsecalgs
         example# svcprop ipsecalgs
         example# svccfg -s ipsecalgs listprop



       This command requires sys_ip_config privilege to operate and  thus  can
       run  in  the global zone and in exclusive-IP zones. All shared-IP zones
       share the same available set of algorithms; however, you can use ipsec‐
       conf(8) to set up system policy that uses differing algorithms for var‐
       ious shared-IP zones. All exclusive-IP zones  have  their  own  set  of
       algorithms.



Oracle Solaris 11.4               21 Jun 2021                     ipsecalgs(8)
맨 페이지 내용의 저작권은 맨 페이지 작성자에게 있습니다.
RSS ATOM XHTML 5 CSS3