亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? cipe.texinfo

?? cipe 編程
?? TEXINFO
?? 第 1 頁 / 共 5 頁
字號:
\input texinfo   @c -*-texinfo-*-@c %**start of header@setfilename cipe.info@settitle CIPE Manual@direntry* cipe: (cipe). Crypto IP Encapsulation@end direntry@footnotestyle end@paragraphindent asis@iftex@parindent 0pt@end iftex@c %**end of header@c@c If the file options.t is missing, do the following:@c cd cipe; perl genoptions.pl options.in@c --------------------------------------------------------------------------@titlepage@title CIPE@subtitle An IP encryption package@subtitle Version 1.6@subtitle August 2004@author Olaf Titz@page@vskip 0pt plus 1filll    Copyright @copyright{} 1996--2004 Olaf Titz. All rights reserved.    This program including its documentation is free software; you can    redistribute it and/or modify it under the terms of the GNU General    Public License as published by the Free Software Foundation; either    version 2 of the License, or (at your option) any later version.    This program is distributed in the hope that it will be useful, but    WITHOUT ANY WARRANTY; without even the implied warranty of    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU    General Public License for more details.    You should have received a copy of the GNU General Public License    along with this program; if not, write to the Free Software    Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.    The author can be contacted through the electronic mail address    @email{Olaf.Titz@@inka.de}.@c we can't macroize this copyright notice, which appears verbatim a few@c lines down again, because texinfo's macro expansion does not work inside@c @titlepage. Grrr.@end titlepage@ifnottex@node    Top, Introduction, (dir), (dir)@top CIPECIPE (the name is shortened from @emph{Crypto IP Encapsulation}) is apackage for an encrypting IP tunnel device. This can be used to buildencrypting routers for VPN (Virtual Private Networks) and similarapplications.@format    Copyright @copyright{} 1996--2004 Olaf Titz. All rights reserved.    This program including its documentation is free software; you can    redistribute it and/or modify it under the terms of the GNU General    Public License as published by the Free Software Foundation; either    version 2 of the License, or (at your option) any later version.    This program is distributed in the hope that it will be useful, but    WITHOUT ANY WARRANTY; without even the implied warranty of    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU    General Public License for more details.    You should have received a copy of the GNU General Public License    along with this program; if not, write to the Free Software    Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.    The author can be contacted through the electronic mail address    @email{Olaf.Titz@@inka.de}.@end format@menu* Introduction::        About routing, VPNs and encryption.* Installation::        Installing the CIPE software package.* Configuration::       Configuration.* PKCIPE::              The PKCIPE public key tool.* Examples::            Examples of CIPE configurations.* Protocol descriptions::  How the protocols work internally.* Misc::                Odds and ends.* Concept Index::       Index. --- The Detailed Node Listing ---Introduction* Network layers::      Where encryption takes place.* Routing::             About IP routing and VPNs.* How CIPE works::      The encapsulation method employed here.* Components::          Which pieces of software CIPE consists of.* Internals::           A look under the hood of CIPE.Installing the CIPE software package* Prerequisites::       What you need before installing.* Protocols and ciphers::  Important compile-time options to select.* Advanced compiling::  Configuring the compile for different targets.* Install::             Compiling and installing the software.* Compilation errors::  If something goes wrong.* Run::                 Running the software.Running CIPE* Program Names::       How the components of CIPE are named.* insmod::              Loading the kernel module.* ciped::               Running the daemon.Configuration of the CIPE software* Specifying options::  How CIPE gets its parameters.* Parameter list::      All valid and needed parameters.* Keys in older CIPE::  An incompatibility between Version 1.4 and earlier.* SOCKS::               Routing with CIPE over a SOCKS5 relayer.* Dynamic carrier::     How to deal with dynamic IP address assignment.* Error handling::      How ciped deals with errors.The PKCIPE tool* How it works::        Short overview on PKCIPE.* Public Keys::         What public keys are and how to use them.* pkcipe invocation::   Running the pkcipe program.Usage examples* Tips::                General useful tips on CIPE configuration.* Example 1::           The classic VPN setups.* Example 2::           A PKCIPE setup.* Connection modes::    Overview on different carrier network situations.Protocol descriptions* The CIPE Protocol::   Encrypted IP encapsulation used by CIPE.* The PKCIPE Protocol::  Public-key based setup and key exchange.@end menu@code{$Id: cipe.texinfo,v 1.37 2004/08/03 08:21:04 olaf81825 Exp $}@end ifnottex@c --------------------------------------------------------------------------@node Introduction, Installation, Top, Top@chapter        Introduction@menu* Network layers::      Where encryption takes place.* Routing::             About IP routing and VPNs.* How CIPE works::      The encapsulation method employed here.* Components::          Which pieces of software CIPE consists of.* Internals::           A look under the hood of CIPE.@end menu@node Network layers, Routing, Introduction, Introduction@section        Network layers and encryption@cindex Network layersThere are several different places where encryption can be built intoan existing network infrastructure, corresponding to the differentprotocol layers:@enumerate@itemOn the @dfn{network level}: Packets travelling between hosts on thenetwork are encrypted. The encryption engine is placed near the driverwhich sends and receives packets. An implementation is found in CIPE.@itemOn the @dfn{socket level}: A logical connection between programsrunning on different hosts (TCP connection; transport or session layerin OSI) is encrypted. The encryption engine intercepts or proxiesconnections. SSH and SSL work this way.@cindex SSH@cindex SSL@itemOn the @dfn{application level}: Applications contain their ownencryption engine and encrypt data themselves. The best known exampleis PGP for encrypting mail.@cindex PGP@end enumerateLow-level encryption as implemented with CIPE has the advantage thatit can be made to work transparently, without any change toapplication software. In the case of encrypting IP packets, it can bebuilt into IP routers which usually act as "black boxes" that onlyroute traffic between hosts, the hosts themselves don't see at all howthe routing works. So an @dfn{encrypting router} looks exactly like anon-encrypting one, without any difference seen by other hosts andapplications. It can thus be used in places where software changes athigher levels are not feasible.Low-level encryption has the disadvantage that it does not guard againstintruders on a higher level, e.g.@: Trojaned applications, bug exploitsin system software or rogue administrators "sniffing" on terminaldevices.@node Routing, How CIPE works, Network layers, Introduction@section        IP routing and Virtual Private Networks@cindex VPNA @dfn{virtual private network} (VPN for short) is a network@footnote{As CIPE is an IP routing application, this manual talks onlyabout IP-based networks. Even more precisely, this all is only aboutIPv4.} belonging to one organization, using its own address range, butoverlayed on existing network infrastructure.@cindex IP-in-IP tunneling@cindex carrier network@dfn{IP-in-IP tunneling} makes it possible to build IP-based VPNs ontop of other IP-based @dfn{carrier networks}, such as the Internet.@cindex Encrypted tunneling@dfn{Encrypted tunneling} guards against passive (sniffing) and active(faked message injection) attacks on the carrier network. The carriernetwork sees only encrypted data.@cindex traffic analysisDepending on the choice of protocol, all information the originalpackets carry can be encrypted. This includes not only the actual(payload) data but also the TCP/IP headers, leaving no trace as towhich addresses and services are actually used. @dfn{Traffic analysis}attacks, which attempt to gain useful information out of sniffing by"who contacts whom", are thus made unfeasible. An even moresophisticated technique to thwart traffic analysis employs theinjection of dummy packets into the network which carry no usefulinformation at all but are (at the carrier level) indistinguishablefrom real data packets.IP routing in a VPN situation consists of the routing of the carriernetwork, which in most situations is just a standard Internet setup,and routing of the overlayed VPN. This is easiest when the addressranges of carrier and VPN do not overlap in any way. It is common forVPNs to use the 10.0.0.0/8 and 192.168.0.0/16 address ranges, whichare not part of the Internet and thus do never conflict with actualInternet routing: any address in this range must be local to theorganization using it. @xref{Example 1}, for a typical example.@cindex IPSECThe IPSEC standards define a set of protocols which can be used (amongother things) to build encrypted VPNs. However, IPSEC is a ratherheavyweight and complicated protocol set with a lot of options,implementations of the full protocol set are still rarely used andsome issues (such as key management) are still not fully resolved.CIPE uses a simpler approach, in which many things which can beparameterized (such as the choice of the actual encryption algorithmused) are an install-time fixed choice. This limits flexibility butallows for a simple (and therefore efficient, easy to debug...)implementation.@node How CIPE works, Components, Routing, Introduction@section        How CIPE worksCIPE encapsulates encrypted IP datagrams in UDP datagrams and sendsthem via the normal UDP mechanism.@cindex UDPThis is different from standard IPIP encapsulation. UDP was chosen@cindex IPIPbecause this way many different endpoints can easily be distinguishedby port numbers; because an IP protocol number would warrant a formalregistration; and because handling of UDP datagrams is easier thanusing a separate IP protocol number, especially in firewalled setups.Specifically, UDP can be handled by user-level applications such as aSOCKS5 relayer. @xref{SOCKS}.A CIPE @dfn{link} always connects exactly two endpoints. In many ways,@cindex CIPE linkthe link works like a PPP dial-up link. At present, each link has itsown secret 128-bit key which has to be known by both ends (and nobody@cindex link keyelse). This @dfn{link key} (called @dfn{static key} in the protocoldescription) is used to negotiate a frequently changed @dfn{dynamickey}, which encrypts the actual data.Since CIPE 1.5 it is also possible to negotiate the keysvia a @dfn{public key} mechanism, similar to the SSH package. Thisremoves the need for shared secret keys. @xref{PKCIPE}.@node Components, Internals, How CIPE works, Introduction@section        CIPEs software componentsThe CIPE package consists of a kernel module and a driver program.The kernel module does the IP packet handling: sending and receivingpackets, encapsulation including encryption. It implements a@cindex network device@dfn{network device} which is mostly handled like any other networkdevice. Configuration and the whole key exchange process is done bythe user level program @command{ciped}. @xref{Program Names}.@cindex @command{ciped}@cindex @command{pppd}@command{ciped} looks and behaves rather similar to @command{pppd}. Inparticular, opening and closing a CIPE device is tied to starting andending a @command{ciped} process (one per device), the specification ofoptions to the daemon mimics @command{pppd}'s setup and @command{ciped}invokes scripts on opening and closing a device.@cindex @command{pkcipe}, programThe @command{pkcipe} program is a separate add-on to the @command{ciped}driver which manages keys and other parameters.@page@node Internals,  , Components, Introduction@section        Notes on internals

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美情侣在线播放| 亚洲成av人影院在线观看网| 久久中文娱乐网| 欧美一区三区四区| 欧美精品粉嫩高潮一区二区| 欧美日韩国产免费一区二区 | 91久久精品国产91性色tv| 成人h精品动漫一区二区三区| 国产成人精品免费一区二区| 成人免费观看av| 99久久免费视频.com| 丁香五精品蜜臀久久久久99网站| 国产a精品视频| yourporn久久国产精品| 99精品视频一区二区三区| 色婷婷国产精品综合在线观看| 91国模大尺度私拍在线视频| 欧美怡红院视频| 666欧美在线视频| www国产精品av| 国产精品成人午夜| 亚洲一区二区美女| 久久精品国内一区二区三区| 99久久婷婷国产| 欧美视频一区在线观看| 欧美一区二区美女| 久久久激情视频| 亚洲欧美日韩一区| 首页亚洲欧美制服丝腿| 精品一二三四区| www.日韩大片| 欧美日韩免费不卡视频一区二区三区| 欧美高清激情brazzers| www久久久久| 亚洲柠檬福利资源导航| 免费高清在线视频一区·| 国产大片一区二区| 欧美色视频在线| 久久久精品一品道一区| 亚洲视频中文字幕| 久久精品国产久精国产爱| 成人综合婷婷国产精品久久蜜臀| 91成人网在线| 精品久久国产老人久久综合| 中文字幕人成不卡一区| 日韩成人一级片| av一区二区三区黑人| 欧美一区二区视频在线观看| 国产日韩欧美激情| 五月天亚洲婷婷| 成人网在线免费视频| 欧美日韩电影一区| 中文字幕第一区二区| 日韩电影在线观看一区| 国产一区999| 欧美午夜不卡在线观看免费| 久久先锋影音av| 午夜国产精品一区| av中文一区二区三区| 欧美成人激情免费网| 一区二区三区日韩欧美精品| 狠狠色丁香婷婷综合久久片| 欧美三级乱人伦电影| 欧美激情一区二区三区蜜桃视频| 国产激情91久久精品导航| 亚洲色图都市小说| 性感美女极品91精品| 91精品国产综合久久久久久久久久| 欧美亚洲另类激情小说| 亚洲精品在线免费播放| 亚洲高清不卡在线| 制服视频三区第一页精品| 久久久亚洲国产美女国产盗摄| 亚洲国产精品久久不卡毛片| 黄色精品一二区| 欧美欧美欧美欧美首页| 国产69精品久久99不卡| 日韩一级片网站| 亚洲线精品一区二区三区八戒| 国产福利一区二区三区视频| 欧美成人精品高清在线播放| 香蕉加勒比综合久久| 一本色道久久综合狠狠躁的推荐 | 久久亚洲二区三区| 午夜激情一区二区三区| 91官网在线免费观看| 国产精品国产三级国产aⅴ入口| 狠狠色综合色综合网络| 欧美一个色资源| 日本免费在线视频不卡一不卡二| 欧美在线不卡一区| 亚洲三级在线播放| 成人99免费视频| 国产精品热久久久久夜色精品三区 | 欧美国产一区二区| 国产美女娇喘av呻吟久久| 精品久久久久久综合日本欧美 | 欧美乱熟臀69xxxxxx| 一区二区三区在线免费观看| 色狠狠色狠狠综合| 亚洲精品高清在线| 在线观看www91| 亚洲综合小说图片| 欧美性xxxxx极品少妇| 亚洲一区欧美一区| 欧美视频一区二区三区在线观看| 亚洲国产三级在线| 欧美日韩精品免费| 日韩av在线免费观看不卡| 欧美伦理影视网| 午夜激情久久久| 日韩欧美黄色影院| 激情成人午夜视频| 久久九九全国免费| 粗大黑人巨茎大战欧美成人| 亚洲欧洲日韩在线| 色天天综合色天天久久| 亚洲第一激情av| 日韩欧美成人激情| 福利一区二区在线| 日本在线不卡视频| 欧美mv日韩mv亚洲| 国产精品456| 亚洲精品老司机| 在线播放91灌醉迷j高跟美女| 欧美aaaaa成人免费观看视频| 久久毛片高清国产| 91在线观看下载| 亚洲一区二区欧美| 亚洲精品一区二区精华| 国产99精品视频| 亚洲精品日韩一| 欧美狂野另类xxxxoooo| 国产麻豆视频一区二区| 亚洲日本在线a| 欧美一级淫片007| 国产69精品久久777的优势| 亚洲综合在线电影| 日韩欧美高清dvd碟片| av一区二区三区四区| 日韩精品福利网| 中文字幕免费观看一区| 欧美怡红院视频| 国产精品影视在线| 亚洲午夜一二三区视频| 精品国产乱码91久久久久久网站| 成人av在线观| 视频一区视频二区中文| 日本一区二区三区四区在线视频| 欧美亚一区二区| 国产精品一卡二卡在线观看| 夜夜嗨av一区二区三区中文字幕 | 日韩综合小视频| 国产精品伦一区二区三级视频| 欧美日韩国产不卡| 国产超碰在线一区| 三级久久三级久久| 中文字幕一区二区三区在线播放 | 精品欧美乱码久久久久久1区2区| 成人高清视频在线观看| 日韩二区在线观看| 中文字幕在线免费不卡| 日韩女优毛片在线| 欧美专区在线观看一区| 国产精品99久久久久| 天天操天天综合网| 亚洲精品视频免费观看| 久久天天做天天爱综合色| 精品视频在线免费看| 成人黄色片在线观看| 精东粉嫩av免费一区二区三区| 一区二区三区免费网站| 中文在线一区二区| 精品久久国产97色综合| 欧美日韩极品在线观看一区| 波多野洁衣一区| 国产91精品一区二区麻豆网站| 青青国产91久久久久久| 亚洲综合成人在线| 中文字幕一区在线| 欧美激情一区不卡| 久久精品夜色噜噜亚洲aⅴ| 337p亚洲精品色噜噜噜| 日本久久一区二区三区| aaa国产一区| 国产不卡视频在线观看| 韩国精品久久久| 喷白浆一区二区| 视频一区中文字幕国产| 亚洲国产精品尤物yw在线观看| 亚洲欧美一区二区三区国产精品 | 国产精品国产馆在线真实露脸| 久久久久88色偷偷免费| 日韩欧美国产一区在线观看| 这里只有精品99re| 正在播放亚洲一区| 91.com视频| 91精品国产麻豆国产自产在线| 欧美日韩高清不卡| 欧美日本韩国一区|