亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? cipe.texinfo

?? cipe 編程
?? TEXINFO
?? 第 1 頁 / 共 5 頁
字號:
\input texinfo   @c -*-texinfo-*-@c %**start of header@setfilename cipe.info@settitle CIPE Manual@direntry* cipe: (cipe). Crypto IP Encapsulation@end direntry@footnotestyle end@paragraphindent asis@iftex@parindent 0pt@end iftex@c %**end of header@c@c If the file options.t is missing, do the following:@c cd cipe; perl genoptions.pl options.in@c --------------------------------------------------------------------------@titlepage@title CIPE@subtitle An IP encryption package@subtitle Version 1.6@subtitle August 2004@author Olaf Titz@page@vskip 0pt plus 1filll    Copyright @copyright{} 1996--2004 Olaf Titz. All rights reserved.    This program including its documentation is free software; you can    redistribute it and/or modify it under the terms of the GNU General    Public License as published by the Free Software Foundation; either    version 2 of the License, or (at your option) any later version.    This program is distributed in the hope that it will be useful, but    WITHOUT ANY WARRANTY; without even the implied warranty of    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU    General Public License for more details.    You should have received a copy of the GNU General Public License    along with this program; if not, write to the Free Software    Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.    The author can be contacted through the electronic mail address    @email{Olaf.Titz@@inka.de}.@c we can't macroize this copyright notice, which appears verbatim a few@c lines down again, because texinfo's macro expansion does not work inside@c @titlepage. Grrr.@end titlepage@ifnottex@node    Top, Introduction, (dir), (dir)@top CIPECIPE (the name is shortened from @emph{Crypto IP Encapsulation}) is apackage for an encrypting IP tunnel device. This can be used to buildencrypting routers for VPN (Virtual Private Networks) and similarapplications.@format    Copyright @copyright{} 1996--2004 Olaf Titz. All rights reserved.    This program including its documentation is free software; you can    redistribute it and/or modify it under the terms of the GNU General    Public License as published by the Free Software Foundation; either    version 2 of the License, or (at your option) any later version.    This program is distributed in the hope that it will be useful, but    WITHOUT ANY WARRANTY; without even the implied warranty of    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU    General Public License for more details.    You should have received a copy of the GNU General Public License    along with this program; if not, write to the Free Software    Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.    The author can be contacted through the electronic mail address    @email{Olaf.Titz@@inka.de}.@end format@menu* Introduction::        About routing, VPNs and encryption.* Installation::        Installing the CIPE software package.* Configuration::       Configuration.* PKCIPE::              The PKCIPE public key tool.* Examples::            Examples of CIPE configurations.* Protocol descriptions::  How the protocols work internally.* Misc::                Odds and ends.* Concept Index::       Index. --- The Detailed Node Listing ---Introduction* Network layers::      Where encryption takes place.* Routing::             About IP routing and VPNs.* How CIPE works::      The encapsulation method employed here.* Components::          Which pieces of software CIPE consists of.* Internals::           A look under the hood of CIPE.Installing the CIPE software package* Prerequisites::       What you need before installing.* Protocols and ciphers::  Important compile-time options to select.* Advanced compiling::  Configuring the compile for different targets.* Install::             Compiling and installing the software.* Compilation errors::  If something goes wrong.* Run::                 Running the software.Running CIPE* Program Names::       How the components of CIPE are named.* insmod::              Loading the kernel module.* ciped::               Running the daemon.Configuration of the CIPE software* Specifying options::  How CIPE gets its parameters.* Parameter list::      All valid and needed parameters.* Keys in older CIPE::  An incompatibility between Version 1.4 and earlier.* SOCKS::               Routing with CIPE over a SOCKS5 relayer.* Dynamic carrier::     How to deal with dynamic IP address assignment.* Error handling::      How ciped deals with errors.The PKCIPE tool* How it works::        Short overview on PKCIPE.* Public Keys::         What public keys are and how to use them.* pkcipe invocation::   Running the pkcipe program.Usage examples* Tips::                General useful tips on CIPE configuration.* Example 1::           The classic VPN setups.* Example 2::           A PKCIPE setup.* Connection modes::    Overview on different carrier network situations.Protocol descriptions* The CIPE Protocol::   Encrypted IP encapsulation used by CIPE.* The PKCIPE Protocol::  Public-key based setup and key exchange.@end menu@code{$Id: cipe.texinfo,v 1.37 2004/08/03 08:21:04 olaf81825 Exp $}@end ifnottex@c --------------------------------------------------------------------------@node Introduction, Installation, Top, Top@chapter        Introduction@menu* Network layers::      Where encryption takes place.* Routing::             About IP routing and VPNs.* How CIPE works::      The encapsulation method employed here.* Components::          Which pieces of software CIPE consists of.* Internals::           A look under the hood of CIPE.@end menu@node Network layers, Routing, Introduction, Introduction@section        Network layers and encryption@cindex Network layersThere are several different places where encryption can be built intoan existing network infrastructure, corresponding to the differentprotocol layers:@enumerate@itemOn the @dfn{network level}: Packets travelling between hosts on thenetwork are encrypted. The encryption engine is placed near the driverwhich sends and receives packets. An implementation is found in CIPE.@itemOn the @dfn{socket level}: A logical connection between programsrunning on different hosts (TCP connection; transport or session layerin OSI) is encrypted. The encryption engine intercepts or proxiesconnections. SSH and SSL work this way.@cindex SSH@cindex SSL@itemOn the @dfn{application level}: Applications contain their ownencryption engine and encrypt data themselves. The best known exampleis PGP for encrypting mail.@cindex PGP@end enumerateLow-level encryption as implemented with CIPE has the advantage thatit can be made to work transparently, without any change toapplication software. In the case of encrypting IP packets, it can bebuilt into IP routers which usually act as "black boxes" that onlyroute traffic between hosts, the hosts themselves don't see at all howthe routing works. So an @dfn{encrypting router} looks exactly like anon-encrypting one, without any difference seen by other hosts andapplications. It can thus be used in places where software changes athigher levels are not feasible.Low-level encryption has the disadvantage that it does not guard againstintruders on a higher level, e.g.@: Trojaned applications, bug exploitsin system software or rogue administrators "sniffing" on terminaldevices.@node Routing, How CIPE works, Network layers, Introduction@section        IP routing and Virtual Private Networks@cindex VPNA @dfn{virtual private network} (VPN for short) is a network@footnote{As CIPE is an IP routing application, this manual talks onlyabout IP-based networks. Even more precisely, this all is only aboutIPv4.} belonging to one organization, using its own address range, butoverlayed on existing network infrastructure.@cindex IP-in-IP tunneling@cindex carrier network@dfn{IP-in-IP tunneling} makes it possible to build IP-based VPNs ontop of other IP-based @dfn{carrier networks}, such as the Internet.@cindex Encrypted tunneling@dfn{Encrypted tunneling} guards against passive (sniffing) and active(faked message injection) attacks on the carrier network. The carriernetwork sees only encrypted data.@cindex traffic analysisDepending on the choice of protocol, all information the originalpackets carry can be encrypted. This includes not only the actual(payload) data but also the TCP/IP headers, leaving no trace as towhich addresses and services are actually used. @dfn{Traffic analysis}attacks, which attempt to gain useful information out of sniffing by"who contacts whom", are thus made unfeasible. An even moresophisticated technique to thwart traffic analysis employs theinjection of dummy packets into the network which carry no usefulinformation at all but are (at the carrier level) indistinguishablefrom real data packets.IP routing in a VPN situation consists of the routing of the carriernetwork, which in most situations is just a standard Internet setup,and routing of the overlayed VPN. This is easiest when the addressranges of carrier and VPN do not overlap in any way. It is common forVPNs to use the 10.0.0.0/8 and 192.168.0.0/16 address ranges, whichare not part of the Internet and thus do never conflict with actualInternet routing: any address in this range must be local to theorganization using it. @xref{Example 1}, for a typical example.@cindex IPSECThe IPSEC standards define a set of protocols which can be used (amongother things) to build encrypted VPNs. However, IPSEC is a ratherheavyweight and complicated protocol set with a lot of options,implementations of the full protocol set are still rarely used andsome issues (such as key management) are still not fully resolved.CIPE uses a simpler approach, in which many things which can beparameterized (such as the choice of the actual encryption algorithmused) are an install-time fixed choice. This limits flexibility butallows for a simple (and therefore efficient, easy to debug...)implementation.@node How CIPE works, Components, Routing, Introduction@section        How CIPE worksCIPE encapsulates encrypted IP datagrams in UDP datagrams and sendsthem via the normal UDP mechanism.@cindex UDPThis is different from standard IPIP encapsulation. UDP was chosen@cindex IPIPbecause this way many different endpoints can easily be distinguishedby port numbers; because an IP protocol number would warrant a formalregistration; and because handling of UDP datagrams is easier thanusing a separate IP protocol number, especially in firewalled setups.Specifically, UDP can be handled by user-level applications such as aSOCKS5 relayer. @xref{SOCKS}.A CIPE @dfn{link} always connects exactly two endpoints. In many ways,@cindex CIPE linkthe link works like a PPP dial-up link. At present, each link has itsown secret 128-bit key which has to be known by both ends (and nobody@cindex link keyelse). This @dfn{link key} (called @dfn{static key} in the protocoldescription) is used to negotiate a frequently changed @dfn{dynamickey}, which encrypts the actual data.Since CIPE 1.5 it is also possible to negotiate the keysvia a @dfn{public key} mechanism, similar to the SSH package. Thisremoves the need for shared secret keys. @xref{PKCIPE}.@node Components, Internals, How CIPE works, Introduction@section        CIPEs software componentsThe CIPE package consists of a kernel module and a driver program.The kernel module does the IP packet handling: sending and receivingpackets, encapsulation including encryption. It implements a@cindex network device@dfn{network device} which is mostly handled like any other networkdevice. Configuration and the whole key exchange process is done bythe user level program @command{ciped}. @xref{Program Names}.@cindex @command{ciped}@cindex @command{pppd}@command{ciped} looks and behaves rather similar to @command{pppd}. Inparticular, opening and closing a CIPE device is tied to starting andending a @command{ciped} process (one per device), the specification ofoptions to the daemon mimics @command{pppd}'s setup and @command{ciped}invokes scripts on opening and closing a device.@cindex @command{pkcipe}, programThe @command{pkcipe} program is a separate add-on to the @command{ciped}driver which manages keys and other parameters.@page@node Internals,  , Components, Introduction@section        Notes on internals

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲bt欧美bt精品| 欧美日韩国产成人在线免费| 久久国产三级精品| 国产麻豆视频一区二区| 亚洲国产日韩精品| 亚洲一区欧美一区| 亚洲国产一区二区在线播放| 亚洲国产一区二区在线播放| 一个色综合av| 午夜成人免费电影| 日本在线不卡视频| 免费成人av在线播放| 美日韩一区二区三区| 久久精品999| 久久爱www久久做| 国产精品一区二区久久不卡| 国产成人免费视频精品含羞草妖精| 久久激情综合网| 国产一区二区在线看| 国产伦精品一区二区三区免费| 国产乱码精品一区二区三区av| 国产精品亚洲第一区在线暖暖韩国| 国产美女av一区二区三区| 国产又粗又猛又爽又黄91精品| 国产精品18久久久久久久久| 国产99精品国产| 色综合视频在线观看| 欧美视频在线观看一区| 日韩一卡二卡三卡国产欧美| 久久久亚洲欧洲日产国码αv| 国产精品午夜免费| 亚洲黄色av一区| 日本午夜一本久久久综合| 久久99国产乱子伦精品免费| 国产成+人+日韩+欧美+亚洲| 色综合咪咪久久| 日韩一区二区三区免费观看| 国产欧美日韩不卡免费| 亚洲视频1区2区| 丝袜诱惑亚洲看片| 国产一区二三区好的| 不卡在线视频中文字幕| 在线观看不卡一区| 精品精品国产高清一毛片一天堂| 中文一区二区完整视频在线观看| 一区二区三区在线视频观看58| 蜜臀av亚洲一区中文字幕| 成人av电影观看| 制服丝袜日韩国产| 国产精品的网站| 蜜臀久久久久久久| 91免费版在线| 精品动漫一区二区三区在线观看| 国产精品久久久久久妇女6080| 午夜视频在线观看一区二区 | 日韩制服丝袜先锋影音| 国产伦精品一区二区三区视频青涩| 91蜜桃视频在线| 精品久久久久av影院| 亚洲少妇30p| 黄色资源网久久资源365| 91蜜桃婷婷狠狠久久综合9色| 日韩欧美www| 亚洲一二三四在线观看| 国产一区视频在线看| 欧美精品xxxxbbbb| 中文字幕在线观看一区| 老司机精品视频一区二区三区| 91麻豆自制传媒国产之光| www国产精品av| 无吗不卡中文字幕| 97se狠狠狠综合亚洲狠狠| 久久色中文字幕| 免费一区二区视频| 欧美亚洲综合网| 国产精品免费久久| 精品亚洲欧美一区| 69成人精品免费视频| 一区二区三区在线视频观看 | 91香蕉视频mp4| 2欧美一区二区三区在线观看视频| 亚洲成人av一区| 99久久99久久精品免费观看| 精品国产一区二区三区四区四| 亚洲国产精品久久久久秋霞影院| 99视频一区二区| 国产欧美一区二区三区鸳鸯浴| 精品一区二区三区在线视频| 欧美喷水一区二区| 亚洲国产视频一区| 色一情一乱一乱一91av| 国产精品美女久久久久久久| 免费在线观看成人| 欧美一区二区女人| 日本亚洲电影天堂| 欧美一二三四在线| 日本不卡中文字幕| 欧美精三区欧美精三区| 亚洲一区二区三区四区在线| 一本到高清视频免费精品| 综合精品久久久| av亚洲精华国产精华| 中文子幕无线码一区tr | 久久精品视频在线免费观看| 午夜精品福利在线| 欧美高清性hdvideosex| 午夜精品福利一区二区蜜股av| 在线视频你懂得一区二区三区| 伊人婷婷欧美激情| 欧美色图天堂网| 日韩专区一卡二卡| 欧美一区二区三区免费在线看 | 高清不卡一区二区在线| 国产欧美一区二区三区在线看蜜臀| 豆国产96在线|亚洲| 国产精品国产三级国产普通话蜜臀| 成人中文字幕在线| 亚洲色图在线看| 欧美日韩一级片在线观看| 午夜精品久久久| 精品国产凹凸成av人网站| 国产乱子伦一区二区三区国色天香| 亚洲精品国产无套在线观| av一本久道久久综合久久鬼色| 自拍偷拍欧美精品| 欧美日本一区二区在线观看| 毛片基地黄久久久久久天堂| 日韩欧美一区二区三区在线| 国产一区二区不卡| 亚洲欧洲国产日本综合| av在线播放一区二区三区| 亚洲视频在线一区| 欧美综合视频在线观看| 久久激情五月婷婷| 亚洲国产高清aⅴ视频| 在线观看欧美日本| 免费成人在线网站| 国产精品久久久久久福利一牛影视 | 亚洲一区二区三区四区五区中文| 欧美一区欧美二区| 国产精品一二三四区| 自拍偷拍亚洲综合| 91精品国产高清一区二区三区| 狠狠色2019综合网| 亚洲男人天堂一区| 欧美一区二区三区啪啪| 国产精品91xxx| 亚洲国产精品自拍| 久久婷婷综合激情| 91美女蜜桃在线| 激情五月激情综合网| 一区视频在线播放| 欧美一区二区私人影院日本| 成人性色生活片| 午夜视频在线观看一区二区三区| 国产日韩欧美在线一区| 99r国产精品| 免费在线一区观看| 亚洲免费视频中文字幕| 久久综合国产精品| 欧美偷拍一区二区| www.欧美日韩| 久久精品国产久精国产| 亚洲国产精品久久久男人的天堂| 国产偷国产偷精品高清尤物| 欧美日韩精品一区二区天天拍小说| 韩国欧美一区二区| 视频一区欧美日韩| 国产精品乱人伦| 精品国产青草久久久久福利| 在线视频欧美区| 成人午夜私人影院| 狠狠色综合播放一区二区| 亚洲一级二级在线| 中文字幕日本不卡| 久久久精品tv| 精品福利一区二区三区 | 国产精品青草久久| 久久综合久久综合亚洲| 欧美猛男gaygay网站| 99免费精品视频| 国产酒店精品激情| 免费不卡在线视频| 日韩av一二三| 亚洲线精品一区二区三区八戒| 国产精品久久久久久久第一福利| 26uuu国产在线精品一区二区| 日韩一卡二卡三卡四卡| 欧美日韩不卡一区二区| 在线一区二区三区| 色婷婷综合在线| 99r国产精品| 9色porny自拍视频一区二区| 国产成人啪免费观看软件| 久久超碰97人人做人人爱| 日本欧美久久久久免费播放网| 亚洲影视在线播放| 一区二区三区视频在线观看| 亚洲欧美日韩在线| 亚洲激情综合网|