亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? klips2-design-api-trips.txt

?? 網(wǎng)上下到的一個很詳細介紹VPN基礎知識的資料
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
#  -*- mode: Outline; fill-column: 78; fill-prefix: "	" -*-##  klips2-design-api-trips.txt#	Richard Guy Briggs <rgb@conscoop.ottawa.on.ca>##  RCSID $Id: klips2-design-api-trips.txt,v 1.8 2001/05/30 08:00:14 rgb Exp $## This document outlines various trips that are made through the# various APIs for different scenarios.  Please see klips2-design.txt# for an overview.# Several scenario titles are listed.  Under each scenario title is# listed point form text to describe what action is happenning and/or# the reason for the following calls.  Following the descriptive text# is a origin and destination entity interface description.  Within# each interface description is a list of specific arguments used or# that need to be added to accomplish the action.Opportunistic encryption:	- put a trap in place from KMd		KMd -> iptables(8) system(3) call (Policy)		KMd -> ip6tables(8) system(3) call (Policy)			in:				char[] -I				char[] -s SADDR/SMASK				char[] -d DADDR/DMASK				char[] --protocol PROTO				char[] --sport SPORT				char[] --dport DPORT				char[] --uid-owner UID				char[] --seclev seclevstr				char[] -J TRAP			out:				unsigned char exit_code		iptables(8) -> seclev match iptables(8) library		ip6tables(8) -> seclev match ip6tables(8) library			in:				char[] --seclev seclevstr			out:				struct seclev		iptables(8) -> NetFilter		ip6tables(8) -> NetFilter		I/F is already defined in NetFilter.  In addition, it will		need structures to pass the following:			in:				struct seclev				target TRAP			- packet comes		NetFilter -> seclev match NetFilter kernel module			in:				struct sk_buff *skb				struct seclev			out:				boolean		NetFilter -> sa match NetFilter kernel module			in:				struct sk_buff *skb				struct ip_said SA[,...]			out:				boolean	- packet matches TRAP		NetFilter -> TRAP target NetFilter kernel module			in:				struct sk_buff *skb			out:				unsigned int = NF_STOLEN	- send up an ACQUIRE		TRAP target NetFilter kernel module -> KMds (PF_KEYv2 ACQUIRE)			see RFC2367, PF_KEYv2 ACQUIRE	- create HOLD target with skb info and store the first packet		TRAP target NetFilter kernel module -> NetFilter			in:				struct sk_buff *skb			out:				boolean	- next packet comes in while KMd is negotiating SAs.		NetFilter -> seclev match NetFilter kernel module			in:				struct sk_buff *skb				struct seclev			out:				boolean		NetFilter -> sa match NetFilter kernel module			in:				struct sk_buff *skb				struct ip_said SA[,...]			out:				boolean	- packet matches HOLD so discard previous skb (packet) and store this one		NetFilter -> HOLD target NetFilter kernel module			in:				struct sk_buff *skb			out:				unsigned int = NF_STOLEN					- put the new SAs in place once the negotiations have succeeded		KMd -> SADB (PF_KEYv2 ADD/UPDATE)			see RFC2367, PF_KEYv2 ADD/UPDATE message for each SA	- add ENCRYPT target with specific SAs to use		KMd -> iptables(8) system(3) call (Policy)		KMd -> ip6tables(8) system(3) call (Policy)			in:				char[] -I				char[] -s SADDR/SMASK				char[] -d DADDR/DMASK				char[] --protocol PROTO				char[] --sport SPORT				char[] --dport DPORT				char[] --uid-owner UID				char[] --seclev seclev				char[] -J ENCRYPT				char[] --salist SAList			out:				unsigned char exit_code		iptables(8) -> seclev match iptables(8) library		ip6tables(8) -> seclev match ip6tables(8) library			in:				char[] --seclev seclevstr			out:				struct seclev		iptables(8) -> ENCRYPT target iptables(8) library		ip6tables(8) -> ENCRYPT target ip6tables(8) library			in:				char[] --salist SAList			out:				struct ip_said SA[, ...]		iptables(8) -> NetFilter		ip6tables(8) -> NetFilter		I/F is already defined in NetFilter.  In addition, it will		need structures to pass the following:			in:				struct seclev				target ENCRYPT				struct ip_said SA[, ...]			- add ACCEPT target for once the packet is processed		KMd -> iptables(8) system(3) call (Policy)		KMd -> ip6tables(8) system(3) call (Policy)			in:				char[] -I				char[] -s SADDR/SMASK (local SG)				char[] -d DADDR/DMASK (remote SG)				char[] --proto ESP				char[] --salist SAList				char[] --espspi SPI				char[] -J ACCEPT			out:				unsigned char exit_code		iptables(8) -> seclev match iptables(8) library		ip6tables(8) -> seclev match ip6tables(8) library			in:				char[] --seclev seclevstr			out:				struct seclev		iptables(8) -> sa match iptables(8) library		ip6tables(8) -> sa match ip6tables(8) library			in:				char[] --salist SAList			out:				struct ip_said SA[, ...]		iptables(8) -> NetFilter		ip6tables(8) -> NetFilter		I/F is already defined in NetFilter.  In addition, it will		need structures to pass the following:			in:				struct seclev				struct ip_said SA[, ...]	- replace HOLD target with ENCRYPT target, releasing skb		HOLD target NetFilter kernel module -> NetFilter				(I don't know the best way to show this				on the diagram, since the skb is				stored with the eroute and not the HOLD				target module)			in:				struct sk_buff *skb	- send released packet through newly created ENCRYPT target and SAs		NetFilter -> ENCRYPT target NetFilter kernel module			in:				struct sk_buff *skb				struct ip_said SA[, ...]			out:				unsigned int = NF_STOLEN	- fetch SAs specified in NetFilter table entry with ENCRYPT args		ENCRYPT target NetFilter kernel module -> SADB (SAID)			in:				struct ip_said SA			out:				struct tdb *tdbp	- send skb (packet) back into NF_IP_POST_ROUTE		ENCRYPT target NetFilter kernel module -> NetFilter			in:				struct sk_buff *skb				struct ip_said SA[,...]			- expire SA if a limit is reached		SADB -> KMd (PF_KEYv2 EXPIRE)			see RFC2367, PF_KEYv2 EXPIRE				Outgoing w/existing connection specifying SAs	- put the new SAs in place once negotiations have succeeded		KMd -> SADB (PF_KEYv2 ADD/UPDATE)			see RFC2367, PF_KEYv2 ADD/UPDATE message for each SA	- put in a rule to match packets for that set of SAs		KMd -> iptables(8) system(3) call (Policy)		KMd -> ip6tables(8) system(3) call (Policy)			in:				char[] -I				char[] -s SADDR/SMASK				char[] -d DADDR/DMASK				char[] --protocol PROTO				char[] --sport SPORT				char[] --dport DPORT				char[] --uid-owner UID				char[] --seclev seclev				char[] -J ENCRYPT				char[] --salist SAList			out:				unsigned char exit_code		iptables(8) -> seclev match iptables(8) library		ip6tables(8) -> seclev match ip6tables(8) library			in:				char[] --seclev seclevstr			out:				struct seclev		iptables(8) -> ENCRYPT target iptables(8) library		ip6tables(8) -> ENCRYPT target ip6tables(8) library			in:				char[] --salist SAList			out:				struct ip_said SA[, ...]		iptables(8) -> NetFilter		ip6tables(8) -> NetFilter		I/F is already defined in NetFilter.  In addition, it will		need structures to pass the following:			in:				struct seclev				target ENCRYPT				struct ip_said SA[, ...]			- add ACCEPT for once the packet is processed		KMd -> iptables(8) system(3) call (Policy)		KMd -> ip6tables(8) system(3) call (Policy)			in:				char[] -I				char[] -s SADDR/SMASK (local SG)				char[] -d DADDR/DMASK (remote SG)				char[] --proto ESP				char[] --salist SAList				char[] --espspi SPI				char[] -J ACCEPT			out:				unsigned char exit_code		iptables(8) -> seclev match iptables(8) library		ip6tables(8) -> seclev match ip6tables(8) library			in:				char[] --seclev seclevstr			out:				struct seclev		iptables(8) -> sa match iptables(8) library		ip6tables(8) -> sa match ip6tables(8) library			in:				char[] --salist SAList			out:				struct ip_said SA[, ...]		iptables(8) -> NetFilter		I/F is already defined in NetFilter.  In addition, it will		need structures to pass the following:			in:				struct seclev				struct ip_said SA[, ...]				target ACCEPT	- outgoing packet is tested on selectors		NetFilter -> seclev match NetFilter kernel module			in:				struct sk_buff *skb				struct seclev			out:				boolean		NetFilter -> sa match NetFilter kernel module			in:				struct sk_buff *skb				struct ip_said SA[,...]			out:				boolean	- matching packet is sent to ENCRYPT target with SAList		NetFilter -> ENCRYPT target NetFilter kernel module			in:				struct sk_buff *skb				struct ip_said SA[, ...]			out:				unsigned int = NF_STOLEN	- fetch SAs specified in NetFilter table entry with ENCRYPT args		ENCRYPT target NetFilter kernel module -> SADB (SAID)			in:				struct ip_said SA			out:				struct tdb *tdbp	- send skb (packet) back into NF_IP_POST_ROUTE		ENCRYPT target NetFilter kernel module -> NetFilter			in:				struct sk_buff *skb				struct ip_said SA[,...]			- outgoing processed packet is tested on selectors and ACCEPTed		NetFilter -> seclev match NetFilter kernel module			in:				struct sk_buff *skb				struct seclev			out:				boolean		NetFilter -> sa match NetFilter kernel module			in:				struct sk_buff *skb				struct ip_said SA[,...]			out:				boolean	- expire SA if a limit is reached		SADB -> KMd (PF_KEYv2 EXPIRE)			see RFC2367, PF_KEYv2 EXPIRE				Outgoing w/existing connection routing through IPSec device	- put the new SAs in place once negotiations have succeeded		KMd -> SADB (PF_KEYv2 ADD/UPDATE)			see RFC2367, PF_KEYv2 ADD/UPDATE message for each SA	- put in a rule to match packets for that set of SAs		KMd -> iptables(8) system(3) call (Policy)		KMd -> ip6tables(8) system(3) call (Policy)			in:				char[] -I				char[] -s SADDR/SMASK				char[] -d DADDR/DMASK				char[] --protocol PROTO				char[] --sport SPORT				char[] --dport DPORT				char[] --uid-owner UID				char[] --seclev seclev				char[] --out-interface IPSECdev				char[] -J ENCRYPT				char[] --salist SAList			out:				unsigned char exit_code		iptables(8) -> seclev match iptables(8) library		ip6tables(8) -> seclev match ip6tables(8) library			in:				char[] --seclev seclevstr			out:				struct seclev		iptables(8) -> ENCRYPT target iptables(8) library		ip6tables(8) -> ENCRYPT target ip6tables(8) library			in:				char[] --salist SAList			out:				struct ip_said SA[, ...]		iptables(8) -> NetFilter		ip6tables(8) -> NetFilter		I/F is already defined in NetFilter.  In addition, it will		need structures to pass the following:			in:				struct seclev				target ENCRYPT				struct ip_said SA[, ...]				KMd -> Routing Table (Routing)			see route(8) or iproute2(8), currently done by				     system(3) calls to _updown.			in:				char[] IPSECdev			out:				unsigned char exit_code	- add ACCEPT for once the packet is processed		KMd -> iptables(8) system(3) call (Policy)		KMd -> ip6tables(8) system(3) call (Policy)			in:				char[] -I				char[] -s SADDR/SMASK (local SG)				char[] -d DADDR/DMASK (remote SG)				char[] --proto ESP				char[] --espspi SPI				char[] --salist SAList				char[] -J ACCEPT			out:				unsigned char exit_code		iptables(8) -> seclev match iptables(8) library		ip6tables(8) -> seclev match ip6tables(8) library			in:				char[] --seclev seclevstr			out:				struct seclev		iptables(8) -> sa match iptables(8) library		ip6tables(8) -> sa match ip6tables(8) library			in:				char[] --salist SAList			out:				struct ip_said SA[, ...]		iptables(8) -> NetFilter		ip6tables(8) -> NetFilter		I/F is already defined in NetFilter.  In addition, it will		need structures to pass the following:			in:				struct seclev				struct ip_said SA[, ...]	- outgoing packet is tested on match modules		NetFilter -> seclev match NetFilter kernel module			in:				struct sk_buff *skb				struct seclev			out:				boolean		NetFilter -> sa match NetFilter kernel module			in:				struct sk_buff *skb				struct ip_said SA[,...]			out:				boolean	- outgoing packet matches IPSECdev and is sent to ENCRYPT target with SAList		NetFilter -> ENCRYPT target NetFilter kernel module			in:				struct sk_buff *skb				struct ip_said SA[, ...]			out:				unsigned int = NF_STOLEN	- fetch SAs specified in NetFilter table entry with ENCRYPT args		ENCRYPT target NetFilter kernel module -> SADB (SAID)			in:				struct ip_said SA			out:				struct tdb *tdbp	- send skb (packet) back into NF_IP_POST_ROUTE		ENCRYPT target NetFilter kernel module -> NetFilter			in:				struct sk_buff *skb				struct ip_said SA[,...]			- processed packet is tested on match modules and ACCEPTed		NetFilter -> seclev match NetFilter kernel module			in:				struct sk_buff *skb				struct seclev			out:				boolean		NetFilter -> sa match NetFilter kernel module			in:				struct sk_buff *skb				struct ip_said SA[,...]			out:				boolean	- expire SA if a limit is reached		SADB -> KMd (PF_KEYv2 EXPIRE)			see RFC2367, PF_KEYv2 EXPIRE				Incoming w/existing connection specifying SAs	- put in the new SAs in place once the negotiations have succeeded		KMd -> SADB (PF_KEYv2 ADD/UPDATE)			see RFC2367, PF_KEYv2 ADD/UPDATE message for each SA	- put in a blocking entry to prevent unprotected packets entering		KMd -> iptables(8) system(3) call (Policy)		KMd -> ip6tables(8) system(3) call (Policy)			in:				char[] -I				char[] -s SADDR/SMASK				char[] -d DADDR/DMASK				char[] --protocol PROTO				char[] --sport SPORT				char[] --dport DPORT

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
夜夜精品视频一区二区| av激情综合网| 欧美人伦禁忌dvd放荡欲情| 日韩毛片高清在线播放| 成人av在线电影| 国产精品女人毛片| 91在线观看免费视频| 国产精品国产精品国产专区不片| 国产美女一区二区| 国产女人18毛片水真多成人如厕| 国产精品一二三区| 成人欧美一区二区三区黑人麻豆| 91丨porny丨国产| 婷婷亚洲久悠悠色悠在线播放| 欧美蜜桃一区二区三区| 久久精品国产99国产| 国产欧美综合在线| 在线视频欧美精品| 久久成人免费日本黄色| 国产精品久久精品日日| 欧美色综合网站| 国产高清久久久| 亚洲一区二区高清| 日本一区二区三区四区在线视频| 色综合久久中文字幕| 韩国成人在线视频| 一区二区三区加勒比av| 久久先锋影音av| 欧洲人成人精品| 国产精品一区二区在线观看不卡| 亚洲二区视频在线| 国产精品理论片| 国产欧美一区二区三区鸳鸯浴| 欧美在线观看视频一区二区三区| 欧美日韩美女一区二区| 亚洲大片在线观看| 69堂国产成人免费视频| 久久99国产精品成人| 最新久久zyz资源站| 日韩午夜激情视频| 香蕉成人啪国产精品视频综合网| 精品对白一区国产伦| 欧美日韩成人激情| 成人99免费视频| 久久精品二区亚洲w码| 亚洲制服丝袜在线| 亚洲欧洲一区二区三区| 91视频在线看| 国产精品一区二区果冻传媒| 久久国产精品免费| 国产高清亚洲一区| 成人免费视频app| 国产成人自拍高清视频在线免费播放| 午夜电影网一区| 日韩电影在线一区| 激情综合色丁香一区二区| 免费在线看一区| 久久国产欧美日韩精品| 成人h动漫精品| 99精品视频一区二区| 99久久er热在这里只有精品66| av在线不卡观看免费观看| 99久久精品免费精品国产| 色噜噜狠狠色综合欧洲selulu| 91国偷自产一区二区使用方法| 欧美区在线观看| 2022国产精品视频| 亚洲人亚洲人成电影网站色| 亚洲激情图片小说视频| 日韩和欧美一区二区三区| 经典一区二区三区| 97超碰欧美中文字幕| 欧美日韩一本到| 欧美国产一区二区| 丝袜亚洲另类丝袜在线| www.亚洲在线| 精品福利二区三区| 亚洲va欧美va人人爽| 丁香天五香天堂综合| 欧美疯狂做受xxxx富婆| 国产精品三级久久久久三级| 天堂成人国产精品一区| 91丨porny丨最新| 欧美精品一区二区三区四区 | 欧美成人在线直播| 亚洲免费av高清| 成人18视频日本| 国产午夜精品美女毛片视频| 日韩电影在线一区| 在线91免费看| 爽好久久久欧美精品| 色呦呦一区二区三区| 久久成人免费网站| 欧美综合在线视频| 性感美女极品91精品| 欧美日韩亚洲不卡| 五月综合激情网| 日韩色视频在线观看| 美腿丝袜亚洲综合| 久久亚洲一区二区三区四区| 久久99这里只有精品| 国产肉丝袜一区二区| 99国产精品一区| 亚洲午夜精品网| 91精品婷婷国产综合久久性色 | 久久精子c满五个校花| 国产老女人精品毛片久久| 国产精品高清亚洲| 在线观看欧美黄色| 精品一区二区免费在线观看| 久久久久久久久蜜桃| 91麻豆精品秘密| 日日摸夜夜添夜夜添精品视频| 欧美大片在线观看一区| 成人av先锋影音| 麻豆精品一区二区| 中文字幕制服丝袜一区二区三区| 欧美日韩一区三区| 国产精品一区二区不卡| 亚洲国产成人va在线观看天堂| 欧美一区二区三区小说| va亚洲va日韩不卡在线观看| 亚洲成人动漫在线观看| 国产日产欧美一区| 欧美一区二区久久久| 91久久精品网| 国产传媒日韩欧美成人| 免费人成黄页网站在线一区二区| 久久久久九九视频| 日韩久久久久久| 欧美日韩中文字幕一区二区| 99热精品国产| 丰满放荡岳乱妇91ww| 国产乱国产乱300精品| 免费观看一级欧美片| 爽好久久久欧美精品| 亚洲一区二区三区在线播放| 日韩毛片精品高清免费| 亚洲国产精品传媒在线观看| 精品电影一区二区| 日韩一区二区在线观看视频播放| 欧美午夜一区二区三区免费大片| 日本韩国一区二区三区视频| voyeur盗摄精品| av中文一区二区三区| av一区二区久久| 色综合天天在线| 91麻豆产精品久久久久久| 成人视屏免费看| 91网站最新地址| 欧美三级电影精品| 欧美日韩在线不卡| 精品国产制服丝袜高跟| 久久久久久久久久久久久女国产乱| 精品国产乱码久久久久久图片 | 麻豆久久久久久久| 成人精品国产免费网站| 色婷婷综合在线| 欧美乱妇23p| 欧美高清一级片在线观看| 最新欧美精品一区二区三区| 亚洲成国产人片在线观看| 精品一区二区三区免费播放| 高清不卡在线观看| 欧美日韩免费高清一区色橹橹| 欧美一区二区视频免费观看| 国产亚洲精品精华液| 一区二区视频在线| 国产一区二区不卡老阿姨| 制服丝袜亚洲网站| 日韩视频一区二区在线观看| 日本一区二区视频在线| 日韩不卡一区二区三区| 99精品热视频| 国产亚洲一区字幕| 日本不卡免费在线视频| 色噜噜狠狠色综合欧洲selulu| 欧美白人最猛性xxxxx69交| 亚洲精品久久嫩草网站秘色| 麻豆精品久久久| 69久久夜色精品国产69蝌蚪网| 久久久久久久一区| 亚洲国产精品欧美一二99| 加勒比av一区二区| 日韩一区二区不卡| 日韩在线卡一卡二| 日本韩国欧美三级| 亚洲欧洲在线观看av| 国产成人免费视频一区| 久久影院午夜片一区| 蜜臀91精品一区二区三区| 欧美精选一区二区| 亚洲成人精品一区| 欧美妇女性影城| 欧美aaa在线| 久久婷婷国产综合国色天香| 久久精品国产网站| 久久奇米777| jiyouzz国产精品久久| 一区二区三区资源|