亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? question

?? Linux 2.6 內核上配置IPSec VPN 的工具
??
?? 第 1 頁 / 共 2 頁
字號:
		should inform IKE of the expiry, and IKE should try to negotiate		a new SA.	deprecation lifetime (90%):		no outbound packet should be generated by this SA.		inbound packet is handled okay.	hard lifetime (100%)		SA will be erased.Q: responder should not modify phase 2 attributes	even for phase 1, we should not modify attributes.	for lifetime attributes, it is okay to switch between V/B format.	draft-ietf-ipsec-ike-01.txt Appendix A:	If this is the case, an	attribute offered as variable (or basic) by the initiator of this	protocol MAY be returned to the initiator as a basic (or variable).Q: check if reserved field is zero, reject if 	we should do this (sakane)	i don't think so, it will kill future protocol enhancements (itojun)Q: order of proposals in IKE phase 2 packet, and IPsec processing order	how to negotiate SA bundle.	IKE: esp+ah, or ah+esp		-> is it safe to consider both as IP|AH|ESP|ULP?		-> is the proposal prefered to send the order of ah+esp.	IKE: ah+ah?		reject? or policy issue.	RFC2401bis should state the pattern of SA bundle.	      AH	      AH+ESP	      AH    +IPCOMP	      AH+ESP+IPCOMP		 ESP	      AH+ESP	      AH+ESP+IPCOMP		 ESP+IPCOMP	      AH+ESP	      AH+ESP+IPCOMP	Also RFC2401bis should state the meaning of protcol mode.	we are going to install both SAs, ESP and AH.  and they are bundled.	we should negotiate both SAs in single phase2.	can we do that separately ?		it is hard to verify the policy because the policy might be		defined SA bundle.	when i make packet IP2|AH|ESP|IP1|ULP.		proposal and order must be			ah/transport + esp/tunnel ?			ah/tunnel + esp/tunnel ?Q: what should we do if phase 1 SA expires, during phase2 SA negotiation?A. restart phase 2 negotiation from scratchQ: what kind of notification message a node should send on decode failure?	ISAKMP_NTYPE_INVALID_PAYLOAD_TYPE		iked	ISAKMP_NTYPE_UNEQUAL_PAYLOAD_LENGTHS		racoon	ISAKMP_NTYPE_PAYLOAD_MALFORMED		sanity check would be hairyQ: Certificate Request.	where to attach CR?		obey draft-ietf-ipsec-pki-req-05.txt.	what should we put inside CR?		my own signer?	RFC2408 page 34 says;    o  Certificate Authority (variable length) - Contains an encoding of       an acceptable certificate authority for the type of certificate       requested.  As an example, for an X.509 certificate this field       would contain the Distinguished Name encoding of the Issuer Name       of an X.509 certificate authority acceptable to the sender of       this payload.  This would be included to assist the responder in       determining how much of the certificate chain would need to be       sent in response to this request.  If there is no specific       certificate authority requested, this field SHOULD not be       included.Message-Id: <200009262047.XAA10637@torni.hel.fi.ssh.com>Subject: CERT_REQ_PAYLOAD usageFrom: Tero Kivinen <kivinen@ssh.fi>Date: Tue, 26 Sep 2000 23:47:00 +0300 (EET DST)	1) If you absolutely need certificates from the other side for	the authentication to work, you MUST send certificate request	payload.	2) If the authentication can succeed without the other end	sending certificates (you have some certificate for the other	end, or you can fetch the certificate from the certificate	repository), you MAY send certificate request.	3) If you just want any certificate without specifying the CA	root, send certificate request having empty CA name.	4) When you receive certificate request you MUST send your own	certificate for that CA.	5) If you receive empty certificate request you MUST send the	certificate you are going use in the authentication. If you	have multiple certificates for the same private key, you	SHOULD send all of them.	6) If you do not receive certificate request, you SHOULD NOT	send any certificates, unless you have reason to belive that	the other end has wrong certificate for you (for example you	have enrolled a new certificate recently).	7) You MAY include extra certificates, CRLs etc if you have	them available (I.e include your other certificates also	(certificate pre-loading), include sub-CA certificates,	include CRLs etc.Q: retransmission method (implementation issue)	how can I realize that the last packet in phase 1 was dropped.	main/base mode:		no problem in initiator side.		responder should wait for the retransmited 5th(3rd) packet		from initiator.	aggressive mode:		responder should wait for the retransmited 2nd packet		from responder.	quick mode:		initiator should wait for the retransmited 2nd packet		from responder.		when i am initiator, if we don not use commit bit, i will		install the SAs after sending last message.	under the following situation we will see retransmisson of phase 1 3rd	packet (prior to the last packet) from the peer, even if we already	have started phase 2 negotiaiton:	- initiator have transmitted the last (5th) packet of phase 1 exchange.	  the initiator believes that phase 1 is done.	- the last (5th) packet in phase 1 exchange was lost	responder retransmits phase 1 N-1 packet		main mode	FW-1 transmits the last packet in phase 1/2 exchange, 3 times.Q: retransmission timer?	should we manage it in per-peer basis?		yup.  we may need to	RFC2408: change retransmission timer dynamically		gets harder to debug...Q: checks against retransmission	check ISAKPM header only (watanabe)	check MD5(msg)Sender: owner-ipsec@lists.tislabs.comMessage-Id: <200007170936.e6H9a2J113489@thunk.east.sun.com>Subject: Re: simplifying rekeying [draft-jenkins-ipsec-rekeying-06.txt]From: Bill Sommerfeld <sommerfeld@East.Sun.COM>	pedants may need to worry about the following case:            initiator          responder		|                  |		|-------(1)------->|		|                  |		|    +--(2)--------|		|    |             |		|-------(1)--+     |		|    |       |     |		|<---+       |     |		|            |     |		|-------(3)------->|		|            |     |		|<------(4)--------|		|            |     |		|            +---->|		|                  |		:                  :Q: Nonce size	a size of value MUST be 4 - 252 (RFC2409)	reject if the value is out-of-rangeQ: x.509 certificate and ID payload	if there is the certificate and the type of ID payload is		not DN, then compare with the subjectAltName in certificate.		DN, then compare with the subjectName in certificate.			must take care of the order of OID.Q: IP address of subjectAltName and of real entity.	There are two subjectAltName, email and IP address, in the certificate.	ID payload includes USER-FQDN, and same to email address of	subjectAltName.	If IP address of subjectAltName is different from the real entity's	IP address.  What should we do ?Q: commit bit	who will set the commit bit?  when?	no action.  if the other end sets it to 1, we should do that too	(sakane)	responder should set it to 1.  or it may leave it as is (watanabe)	should revisit rekey draft.Q: what happens if we have multiple phase 1 SAs for the same src/dst pair?Q: phase 1 ID payload	RSA signature and pre-shared key	same ID value.	must include the ID into subject alt name.Q: rekey.	- common: IPsec layer always use oldest SA.  optionally, send a delete		payload for old SA when we got a new SA.	- freeswan: trust no informational exchange (including initial-contact).		assume everyone will be using the latest SA in IPsec layer.		assume that phase 2 responder will install new key when the		responder got 1st packet of phase 2 (not the 3rd packet).Q: for responder side, is it allowed to reorder proposals?  for example,is it allowed to reply to the following proposal:with this:(initiator sends ESP then AH)46:51.456226 3ffe:501:ffff:0:250:daff:fe87:4bbe:500 -> 3ffe:501:ffff:0:2a0:ccff:fe3c:4093:500: isakmp 1.0 msgid 3827457a: phase 2/others ? oakley-quick:    (hash: len=20)    (sa: doi=ipsec situation=identity        (p: #1 protoid=ipsec-esp transform=15 spi=058a15c0            (t: #1 id=blowfish (type=lifetype value=sec)(type=life value=0e10)(type=enc mode value=transport)(type=keylen value=0080)(type=auth value=hmac-md5)(type=group desc value=modp1024))            (t: #2 id=blowfish (type=lifetype value=sec)(type=life value=0e10)(type=enc mode value=transport)(type=keylen value=0080)(type=auth value=hmac-sha1)(type=group desc value=modp1024))            (t: #3 id=blowfish (type=lifetype value=sec)(type=life value=0e10)(type=enc mode value=transport)(type=keylen value=0080)(type=group desc value=modp1024))            (t: #4 id=3des (type=lifetype value=sec)(type=life value=0e10)(type=enc mode value=transport)(type=auth value=hmac-md5)(type=group desc value=modp1024))            (t: #5 id=3des (type=lifetype value=sec)(type=life value=0e10)(type=enc mode value=transport)(type=auth value=hmac-sha1)(type=group desc value=modp1024))            (t: #6 id=3des (type=lifetype value=sec)(type=life value=0e10)(type=enc mode value=transport)(type=group desc value=modp1024))            (t: #7 id=1des (type=lifetype value=sec)(type=life value=0e10)(type=enc mode value=transport)(type=auth value=hmac-md5)(type=group desc value=modp1024))            (t: #8 id=1des (type=lifetype value=sec)(type=life value=0e10)(type=enc mode value=transport)(type=auth value=hmac-sha1)(type=group desc value=modp1024))            (t: #9 id=1des (type=lifetype value=sec)(type=life value=0e10)(type=enc mode value=transport)(type=group desc value=modp1024))            (t: #10 id=cast (type=lifetype value=sec)(type=life value=0e10)(type=enc mode value=transport)(type=keylen value=0080)(type=auth value=hmac-md5)(type=group desc value=modp1024))            (t: #11 id=cast (type=lifetype value=sec)(type=life value=0e10)(type=enc mode value=transport)(type=keylen value=0080)(type=auth value=hmac-sha1)(type=group desc value=modp1024))            (t: #12 id=cast (type=lifetype value=sec)(type=life value=0e10)(type=enc mode value=transport)(type=keylen value=0080)(type=group desc value=modp1024))            (t: #13 id=null (type=lifetype value=sec)(type=life value=0e10)(type=enc mode value=transport)(type=auth value=hmac-md5)(type=group desc value=modp1024))            (t: #14 id=null (type=lifetype value=sec)(type=life value=0e10)(type=enc mode value=transport)(type=auth value=hmac-sha1)(type=group desc value=modp1024))            (t: #15 id=null (type=lifetype value=sec)(type=life value=0e10)(type=enc mode value=transport)(type=group desc value=modp1024)))        (p: #1 protoid=ipsec-ah transform=2 spi=0f316870            (t: #1 id=md5 (type=lifetype value=sec)(type=life value=0e10)(type=enc mode value=transport)(type=auth value=hmac-md5)(type=group desc value=modp1024))            (t: #2 id=sha (type=lifetype value=sec)(type=life value=0e10)(type=enc mode value=transport)(type=auth value=hmac-sha1)(type=group desc value=modp1024))))    (nonce: n len=16)    (ke: key len=128)    (id: idtype=IPv6 protoid=tcp port=0 len=16 3ffe:501:ffff:0:250:daff:fe87:4bbe)    (id: idtype=IPv6 protoid=tcp port=0 len=16 3ffe:501:ffff:0:2a0:ccff:fe3c:4093)(respoinder swap order, sends AH then ESP)46:53.368883 3ffe:501:ffff:0:2a0:ccff:fe3c:4093:500 -> 3ffe:501:ffff:0:250:daff:fe87:4bbe:500: isakmp 1.0 msgid 3827457a: phase 2/others ? oakley-quick:    (hash: len=20)    (sa: doi=ipsec situation=identity        (p: #1 protoid=ipsec-ah transform=1 spi=f8dc5700            (t: #1 id=md5 (type=lifetype value=sec)(type=life value=0e10)(type=enc mode value=transport)(type=auth value=hmac-md5)(type=group desc value=modp1024)))        (p: #1 protoid=ipsec-esp transform=1 spi=f8dc5701            (t: #4 id=3des (type=lifetype value=sec)(type=life value=0e10)(type=enc mode value=transport)(type=auth value=hmac-md5)(type=group desc value=modp1024))))    (nonce: n len=16)    (ke: key len=128)    (id: idtype=IPv6 protoid=tcp port=0 len=16 3ffe:501:ffff:0:250:daff:fe87:4bbe)    (id: idtype=IPv6 protoid=tcp port=0 len=16 3ffe:501:ffff:0:2a0:ccff:fe3c:4093)Q: IPComp SA with wellknown CPI in CPI field.  how to handle it?  with the current code, wellknown CPI will be installed as is, because:  - racoon can negotiate an IPComp SA with wellknown CPI, and installs it as is  - the kernel have no check about it  however, by doing so we will have CPI (SPI) conflict on rekey, or with  multiple peers.  there could be couple of stragegies from implementation point of view  (workaround):  (1) do not install IPComp SA if we negotiated it with wellknown CPI.      this will introduce another trouble: no trigger for rekey, due to      no lifetime management on the IPComp SA.  (2) install IPComp SA with fabricated (local) CPI, with RAWCPI option flag      raised.  confusing...  (3) use topmost 16 bits to turn wellknown CPI into unique numbers.      how to assign numbers?  the problem is not unique to racoon, it is a generic problem.  protocol-wise, we could have couple of fixes:  (1) never negotiate an IPComp SA with a wellknown CPI.  (2) disambiguate IPComp SA by using other attributes, like lifetime,      installation timestamp or whatever.  (3) always IPComp as a addendum to ESP/AH.  do not treat it as an independent      SA.  I'm in favor of (1).

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
成人永久看片免费视频天堂| 日韩一区二区三区视频在线观看 | 成人激情黄色小说| 久久久美女艺术照精彩视频福利播放| 美女视频黄免费的久久| 欧美一区二区视频在线观看2020 | 国产婷婷一区二区| 99热精品一区二区| 亚洲免费资源在线播放| 欧美丝袜丝nylons| 婷婷成人激情在线网| 久久综合狠狠综合久久综合88| 国产乱人伦偷精品视频不卡 | 国产精品一线二线三线| 国产日韩欧美综合一区| 久久精品国产亚洲a| 亚洲国产精品高清| 欧美色综合网站| 激情六月婷婷久久| 国产精品久久福利| 制服丝袜亚洲播放| 国产大陆a不卡| 亚洲美女区一区| 精品国产成人在线影院| 99精品一区二区三区| 毛片av中文字幕一区二区| 国产精品无人区| 久久人人97超碰com| 欧美日韩中文精品| 成人性生交大片免费看中文| 五月激情综合婷婷| 亚洲欧洲日韩在线| 国产亚洲欧美在线| 欧美日韩国产首页在线观看| 不卡视频一二三| 国产精品资源站在线| 日韩vs国产vs欧美| 亚洲精品国产精华液| 亚洲欧洲精品一区二区三区不卡| 日韩欧美高清dvd碟片| 宅男在线国产精品| 国产91在线观看丝袜| 国产精品一区免费在线观看| 免费在线观看视频一区| 日韩专区在线视频| 视频一区二区国产| 亚洲国产乱码最新视频| 亚洲六月丁香色婷婷综合久久| 中文字幕日韩av资源站| 亚洲人成影院在线观看| 亚洲久本草在线中文字幕| 亚洲区小说区图片区qvod| 亚洲综合免费观看高清完整版在线| 亚洲视频在线一区观看| 亚洲一区在线观看视频| 亚洲国产美女搞黄色| 亚洲不卡av一区二区三区| 免费在线成人网| 国产精品1区2区3区在线观看| 豆国产96在线|亚洲| 精品视频一区 二区 三区| 2021中文字幕一区亚洲| 一区二区三区精品视频在线| 奇米四色…亚洲| 色综合天天综合在线视频| 7777精品伊人久久久大香线蕉 | 亚洲免费在线看| 韩国女主播一区| 欧美日本免费一区二区三区| 一区在线中文字幕| 国产成人免费视| 欧美久久一二区| 欧美变态口味重另类| 欧美蜜桃一区二区三区| 精品福利av导航| 夜夜精品浪潮av一区二区三区| 理论片日本一区| 91麻豆免费看| 欧美激情综合五月色丁香小说| 五月激情丁香一区二区三区| 国产精品一二三| 日韩一级黄色片| 亚洲一卡二卡三卡四卡无卡久久| 不卡一区二区三区四区| 337p粉嫩大胆色噜噜噜噜亚洲| 亚洲精品伦理在线| 99视频一区二区三区| 国产日韩欧美在线一区| 国产精品一区二区在线看| 国产亚洲综合在线| 国产一区二区精品久久91| 日韩一卡二卡三卡国产欧美| 午夜精品久久久久久久久久久| 色综合久久88色综合天天6| 亚洲欧美日韩国产手机在线 | 日本三级亚洲精品| 666欧美在线视频| 热久久久久久久| 日韩欧美一二三四区| 欧美bbbbb| 国产午夜精品福利| 97se狠狠狠综合亚洲狠狠| 亚洲视频香蕉人妖| 91成人网在线| 日韩激情一二三区| 亚洲黄色免费电影| 欧美日韩你懂得| 裸体一区二区三区| 久久精子c满五个校花| 成人激情开心网| 亚洲国产日韩a在线播放性色| 91麻豆精品国产| 国产成人综合视频| 亚洲一区二区视频在线观看| 日韩精品一区二区三区视频| 国产精品一二一区| 一区二区三区在线视频观看| 日韩欧美专区在线| 色悠悠久久综合| 国产一区二区不卡在线 | 亚洲成人免费看| 国产欧美精品在线观看| 欧美伊人久久久久久久久影院 | 精品国产一区二区三区久久影院| 丁香六月综合激情| 亚洲va国产va欧美va观看| 国产精品系列在线| 2欧美一区二区三区在线观看视频| 99国产欧美另类久久久精品| 精品在线观看免费| 亚洲国产精品久久久男人的天堂| 国产调教视频一区| 日韩欧美国产一区二区在线播放 | 色猫猫国产区一区二在线视频| 激情综合网天天干| 免费在线观看一区| 天堂蜜桃91精品| 亚洲一区二区三区视频在线播放 | 不卡av在线网| av在线不卡免费看| 99久久精品情趣| 日韩视频一区在线观看| 欧美精品在欧美一区二区少妇| 91蝌蚪porny| 91丨porny丨最新| 一本久久a久久免费精品不卡| 成人18视频日本| 精品少妇一区二区三区日产乱码 | 日韩一区二区在线观看| 国产精品久久久久影视| 久久久高清一区二区三区| 2023国产一二三区日本精品2022| 久久色.com| 中文字幕精品—区二区四季| 日韩美女视频一区| 亚洲第一搞黄网站| 久久国产精品99久久人人澡| 国产一区二区三区高清播放| 北条麻妃一区二区三区| 欧洲国内综合视频| 日韩欧美亚洲国产精品字幕久久久 | 久久精品夜色噜噜亚洲aⅴ| 国产精品视频麻豆| 亚洲va欧美va国产va天堂影院| 久久精品国产一区二区三| 成人av高清在线| 欧美成人福利视频| 国产精品高潮呻吟| 免费人成精品欧美精品| www.亚洲在线| 精品嫩草影院久久| 亚洲在线一区二区三区| 成人精品一区二区三区中文字幕| 欧美精品一二三区| 国产欧美日韩精品a在线观看| 亚洲一区二区欧美日韩 | 免费欧美日韩国产三级电影| 在线观看亚洲专区| 国产精品天干天干在线综合| 美脚の诱脚舐め脚责91| 欧美私模裸体表演在线观看| 成人欧美一区二区三区1314 | 亚洲综合在线五月| jlzzjlzz欧美大全| 国产亚洲成年网址在线观看| 捆绑调教美女网站视频一区| 欧美高清视频一二三区| 偷拍与自拍一区| 欧美电影在哪看比较好| 亚洲成人资源在线| 91黄色免费网站| 亚瑟在线精品视频| 欧美一级高清大全免费观看| 日韩av在线免费观看不卡| 欧美日韩国产高清一区| 日韩精品欧美成人高清一区二区| 欧美午夜一区二区三区| 亚洲国产精品一区二区www在线| 92精品国产成人观看免费| 综合激情网...|