亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? uml_netjig.8

?? openswan
?? 8
?? 第 1 頁 / 共 4 頁
字號:
.TH UML_NETJIG 8 "16 June 2002".SH NAMEuml_netjig \- User Mode Linux network testing jig.SH SYNOPSIS.na.nh.HP.ft Buml_netjig[\-\-help][\-\-arpreply][\-\-debug][\-\-exitonempty][\-\-tcpdump][\-\-playpublic\fIfilename\fP][\-\-playprivate]\fIfilename\fP][\-\-recordpublic]\fIfilename\fP][\-\-recordprivate]\fIfilename\fP][\-\-unix\fIdirname\fP][\-\-startup\fIprogram\fP].ft R.HP.ft Buml_netjig [\-\-cmdproto].ft R.hy.ad.SH DESCRIPTION.BR uml_netjigis an descendant of the User-Mode-Linux projects ``uml_switch'') program. Ithas been extended to facilitate automated testing of networking code foundin a User-Mode-Linux guest kernel..BR whackis an auxiliary program to allow requests to be made to a running.BR pluto ..LP.BR plutois used to automatically build shared ``security associations'' on asystem that has IPsec, the secure IP protocol.In other words,.BR plutocan eliminate much of the work of manual keying.The actualsecure transmission of packets is the responsibility of other parts ofthe system (see.BR KLIPS ,the companion implementation of IPsec).\fIipsec_auto\fP(8) provides a more convenient interface to\fBpluto\fP and \fBwhack\fP..SS IKE's Job.LPA \fISecurity Association\fP (\fISA\fP) is an agreement between two network nodes onhow to process certain traffic between them.  This processing involvesencapsulation, authentication, encryption, or compression..LPIKE can be deployed on a network node to negotiate SecurityAssociations for that node.  These IKE implementations can onlynegotiate with other IKE implementations, so IKE must be on each nodethat is to be an endpoint of an IKE-negotiated Security Association.No other nodes need to be running IKE..LPAn IKE instance (i.e. an IKE implementation on a particular networknode) communicates with another IKE instance using UDP IP packets, sothere must be a route between the nodes in each direction..LPThe negotiation of Security Associations requires a number of choicesthat involve tradeoffs between security, convenience, trust, andefficiency.  These are policy issues and are normally specified to theIKE instance by the system administrator..LPIKE deals with two kinds of Security Associations.  The first part ofa negotiation between IKE instances is to build an ISAKMP SA.  AnISAKMP SA is used to protect communication between the two IKEs.IPsec SAs can then be built by the IKEs \- these are used to carryprotected IP traffic between the systems..LPThe negotiation of the ISAKMP SA is known as Phase 1.  In theory,Phase 1 can be accomplished by a couple of different exchange types,but we only implement one called Main Mode (we don't implementAggressive Mode)..LPAny negotiation under the protection of an ISAKMP SA, including thenegotiation of IPsec SAs, is part of Phase 2.  The exchange typethat we use to negotiate an IPsec SA is called Quick Mode..LPIKE instances must be able to authenticate each other as part of theirnegotiation of an ISAKMP SA.  This can be done by several mechanismsdescribed in the draft standards..LPIKE negotiation can be initiated by any instance with any other.  Ifboth can find an agreeable set of characteristics for a SecurityAssociation, and both recognize each others authenticity, they can setup a Security Association.  The standards do not specify what causesan IKE instance to initiate a negotiation..LPIn summary, an IKE instance is prepared to automate the management ofSecurity Associations in an IPsec environment, but a number of issuesare considered policy and are left in the system administrator's hands..SS Pluto.LP\fBpluto\fP is an implementation of IKE.  It runs as a daemon on a networknode.  Currently, this network node must be a LINUX system running the\fBKLIPS\fP implementation of IPsec..LP\fBpluto\fP only implements a subset of IKE.  This is enough for it tointeroperate with other instances of \fBpluto\fP, and many other IKEimplementations.  We are working on implementing more of IKE..LPThe policy for acceptable characteristics for Security Associations ismostly hardwired into the code of \fBpluto\fP (spdb.c).  Eventuallythis will be moved into a security policy database with reasonableexpressive power and more convenience..LP\fBpluto\fP uses shared secrets or RSA signatures to authenticatepeers with whom it is negotiating..LP\fBpluto\fP initiates negotiation of a Security Association when it ismanually prodded: the program \fBwhack\fP is run to trigger this.It will also initiate a negotiation when \fBKLIPS\fP traps an outbound packetfor Opportunistic Encryption..LP\fBpluto\fP implements ISAKMP SAs itself.  After it has negotiated thecharacteristics of an IPsec SA, it directs \fBKLIPS\fP to implement it.It also invokes a script to adjust any firewall and issue \fIroute\fP(8)commands to direct IP packets through \fBKLIPS\fP..LPWhen \fBpluto\fP shuts down, it closes all Security Associations..SS Before Running Pluto.LP\fBpluto\fP runs as a daemon with userid root.  Before running it, a fewthings must be set up..LP\fBpluto\fP requires \fBKLIPS\fP, the FreeS/WAN implementation of IPsec.All of the components of \fBKLIPS\fP and \fBpluto\fP should be installed..LP\fBpluto\fP supports multiple public networks (that is, networksthat are considered insecure and thus need to have their trafficencrypted or authenticated).  It discovers thepublic interfaces to use by looking at all interfaces that areconfigured (the \fB\-\-interface\fP option can be used to limitthe interfaces considered).It does this only when \fBwhack\fP tells it to \-\-listen,so the interfaces must be configured by then.  Each interface with a name of the form\fBipsec\fP[\fB0\fP-\fB9\fP] is taken as a \fBKLIPS\fP virtual public interface.Another network interface with the same IP address (there should be onlyone) is taken as the corresponding real publicinterface.  \fIifconfig\fP(8) with the \fB\-a\fP flag will showthe name and status of each network interface..LP\fBpluto\fP requires a database of preshared secrets and RSA private keys.This is described in the.IR ipsec.secrets (5).\fBpluto\fP is told of RSA public keys via \fBwhack\fP commands.If the connection is Opportunistic, and no RSA public key is known,\fBpluto\fP will attempt to fetch RSA keys using the Domain Name System..SS Setting up \fBKLIPS\fP for \fBpluto\fP.LPThe most basic network topology that \fBpluto\fP supports has two securitygateways negotiating on behalf of client subnets.  The diagram of RGB'stestbed is a good example (see \fIklips/doc/rgb_setup.txt\fP)..LPThe file \fIINSTALL\fP in the base directory of this distributionexplains how to start setting up the whole system, including \fBKLIPS\fP..LPMake sure that the security gateways have routes to each other.  Thisis usually covered by the default route, but may require issuing.IR route (8)commands.  The route must go through a particular IPinterface (we will assume it is \fIeth0\fP, but it need not be).  Theinterface that connects the security gateway to its client must be adifferent one..LPIt is necessary to issue a.IR ipsec_tncfg (8)command on each gateway.  The required command is:\ \ \ ipsec tncfg \-\-attach\ \-\-virtual\ ipsec0 \-\-physical\ eth0A command to set up the ipsec0 virtual interface will also need to berun.  It will have the same parameters as the command used to set upthe physical interface to which it has just been connected using.IR ipsec_tncfg (8)..SS ipsec.secrets file.LPA \fBpluto\fP daemon and another IKE daemon (for example, another instanceof \fBpluto\fP) must convince each other that they are who they are supposedto be before any negotiation can succeed.  This authentication isaccomplished by using either secrets that have been shared beforehand(manually) or by using RSA signatures.  There are other techniques,but they have not been implemented in \fBpluto\fP..LPThe file \fI/etc/ipsec.secrets\fP is used to keep preshared secret keysand RSA private keys forauthentication with other IKE daemons.  For debugging, there is anargument to the \fBpluto\fP command to use a different file.This file is described in.IR ipsec.secrets (5)..SS Running Pluto.LPTo fire up the daemon, just type \fBpluto\fP (be sure to be running asthe superuser).The default IKE port number is 500, the UDP port assigned by IANA for IKE Daemons.\fBpluto\fP must be run by the superuser to be able to use the UDP 500 port..LP\fBpluto\fP attempts to create a lockfile with the name\fI/var/run/pluto/pluto.pid\fP.  If the lockfile cannot be created,\fBpluto\fP exits \- this prevents multiple \fBpluto\fPs fromcompeting  Any ``leftover'' lockfile must be removed before\fBpluto\fP will run.  \fBpluto\fP writes its pid into this file sothat scripts can find it.  This lock will not function properly if itis on an NFS volume (but sharing locks on multiple machines doesn'tmake sense anyway)..LP\fBpluto\fP then forks and the parent exits.  This is the conventional``daemon fork''.  It can make debugging awkward, so there is an optionto suppress this fork..LPAll logging, including diagnostics, is sent to.IR syslog (3)with facility=authpriv;it decides where to put these messages (possibly in /var/log/secure).Since this too can make debugging awkward, there is an option tosteer logging to stderr..LPOnce \fBpluto\fP is started, it waits for requests from \fBwhack\fP..SS Pluto's Internal State.LPTo understand how to use \fBpluto\fP, it is helpful to understand a littleabout its internal state.  Furthermore, the terminology is needed to deciphersome of the diagnostic messages..LPThe \fI(potential) connection\fP database describes attributes of aconnection.  These include the IP addresses of the hosts and clientsubnets and the security characteristics desired.  \fBpluto\fPrequires this information (simply called a connection) before it canrespond to a request to build an SA.  Each connection is given a namewhen it is created, and all references are made using this name..LPDuring the IKE exchange to build an SA, the information about thenegotiation is represented in a \fIstate object\fP.  Each state objectreflects how far the negotiation has reached.  Once the negotiation iscomplete and the SA established, the state object remains to representthe SA.  When the SA is terminated, the state object is discarded.Each State object is given a serial number and this is used to referto the state objects in logged messages..LPEach state object corresponds to a connection and can be thought ofas an instantiation of that connection.At any particular time, there may be any number of state objectscorresponding to a particular connection.Often there is one representing an ISAKMP SA and another representingan IPsec SA..LP\fBKLIPS\fP hooks into the routing code in a LINUX kernel.Traffic to be processed by an IPsec SA must be directed through\fBKLIPS\fP by routing commands.  Furthermore, the processing to bedone is specified by \fIipsec eroute(8)\fP commands.\fBpluto\fP takes the responsibility of managing both of these specialkinds of routes..LPEach connection may be routed, and must be while it has an IPsec SA.The connection specifies the characteristics of the route: theinterface on this machine, the ``gateway'' (the nexthop),and the peer's client subnet.  Twoconnections may not be simultaneously routed if they are for the samepeer's client subnet but use different interfaces or gateways(\fBpluto\fP's logic does not reflect any advanced routing capabilities)..LPEach eroute is associated with the state object for an IPsec SAbecause it has the particular characteristics of the SA.Two eroutes conflict if they specify the identical localand remote clients (unlike for routes, the local clients aretaken into account)..LPWhen \fBpluto\fP needs to install a route for a connection,it must make sure that no conflicting route is in use.  If anotherconnection has a conflicting route, that route will be taken down, as longas there is no IPsec SA instantiating that connection.If there is such an IPsec SA, the attempt to install a route will fail..LPThere is an exception.  If \fBpluto\fP, as Responder, needs to installa route to a fixed client subnet for a connection, and there isalready a conflicting route, then the SAs using the route are deletedto make room for the new SAs.  The rationale is that the newconnection is probably more current.  The need for this usually is aproduct of Road Warrior connections (these are explained later; theycannot be used to initiate)..LPWhen \fBpluto\fP needs to install an eroute for an IPsec SA (for astate object), first the state object's connection must be routed (ifthis cannot be done, the eroute and SA will not be installed).If a conflicting eroute is already in place for another connection,the eroute and SA will not be installed (but note that the routingexception mentioned above may have already deleted potentially conflicting SAs).If another IPsecSA for the same connection already has an eroute, all its outgoing trafficis taken over by the new eroute.  The incoming traffic will still beprocessed.  This characteristic is exploited during rekeying..LPAll of these routing characteristics are expected change when\fBKLIPS\fP is modified to use the firewall hooks in the LINUX 2.4.xkernel..SS Using Whack.LP\fBwhack\fP is used to command a running \fBpluto\fP.\fBwhack\fP uses a UNIX domain socket to speak to \fBpluto\fP(by default, \fI/var/pluto.ctl\fP)..LP\fBwhack\fP has an intricate argument syntax.This syntax allows many different functions to be specified.The help form shows the usage or version information.The connection form gives \fBpluto\fP a description of a potential connection.The public key form informs \fBpluto\fP of the RSA public key for a potential peer.The delete form deletes a connection description and all SAs correspondingto it.The listen form tells \fBpluto\fP to start or stop listening on the public interfacesfor IKE requests from peers.The route form tells \fBpluto\fP to set up routing for a connection;the unroute form undoes this.The initiate form tells \fBpluto\fP to negotiate an SA corresponding to a connection.The terminate form tells \fBpluto\fP to remove all SAs corresponding to a connection,including those being negotiated.The status form displays the \fBpluto\fP's internal state.The debug form tells \fBpluto\fP to change the selection of debugging output``on the fly''.  The shutdown form tells\fBpluto\fP to shut down, deleting all SAs..LPMost options are specific to one of the forms, and will be describedwith that form.  There are three options that apply to all forms..TP\fB\-\-ctlbase\fP\ \fIpath\fP\fIpath\fP.ctl is used as the UNIX domain socket for talkingto \fBpluto\fP.This option facilitates debugging..TP\fB\-\-optionsfrom\fP\ \fIfilename\fP

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩欧美成人激情| 日韩欧美国产综合一区| 2023国产精华国产精品| 国内精品在线播放| 精品av综合导航| 国产精品中文欧美| 国产精品看片你懂得| 日本久久一区二区三区| 午夜精品一区二区三区电影天堂| 欧美日韩久久一区| 久久91精品久久久久久秒播| 久久久精品免费免费| 91小视频在线| 中文字幕亚洲一区二区av在线| 97se亚洲国产综合自在线观| 亚洲综合图片区| 精品国产一区二区精华| 99久久伊人网影院| 亚洲va欧美va天堂v国产综合| 精品久久免费看| 97久久精品人人做人人爽50路| 亚洲二区在线观看| 国产午夜一区二区三区| 色先锋久久av资源部| 免费久久99精品国产| 中文字幕一区二区三区色视频| 欧美另类z0zxhd电影| 国产九色sp调教91| 亚洲国产中文字幕| 日本一区二区三区电影| 欧美日韩欧美一区二区| 极品少妇xxxx精品少妇| 亚洲一二三区在线观看| 国产欧美日韩卡一| 日韩一区二区三区精品视频| 97久久久精品综合88久久| 麻豆免费看一区二区三区| 成人免费小视频| 久久色在线观看| 欧美日韩激情一区二区三区| 岛国精品一区二区| 九九在线精品视频| 首页欧美精品中文字幕| 亚洲少妇中出一区| 久久蜜桃av一区二区天堂| 欧美图区在线视频| 92精品国产成人观看免费 | 欧美日韩欧美一区二区| 高清国产一区二区| 久久精品久久综合| 亚洲一区二区三区视频在线 | 日韩精品一区二区三区在线| 色综合天天综合| 成人国产精品免费网站| 国产精品影视网| 激情综合色播激情啊| 日日摸夜夜添夜夜添亚洲女人| 亚洲精品第1页| 亚洲日本丝袜连裤袜办公室| 国产亚洲福利社区一区| 精品免费国产一区二区三区四区| 91精品在线一区二区| 在线观看国产精品网站| 色成年激情久久综合| 色综合久久综合网| 99精品视频一区二区| 不卡大黄网站免费看| 粉嫩绯色av一区二区在线观看| 国产一区二区在线看| 久久精品国产久精国产| 九九视频精品免费| 精品在线一区二区三区| 极品瑜伽女神91| 国产精品99久久久久久似苏梦涵| 激情综合亚洲精品| 国产一区二区三区美女| 国产伦精一区二区三区| 高清日韩电视剧大全免费| 国产xxx精品视频大全| 福利一区二区在线观看| 成人av综合在线| 一本到高清视频免费精品| 在线看一区二区| 欧美日韩国产精品自在自线| 91精品国产综合久久福利| 日韩欧美在线观看一区二区三区| 91精品免费在线观看| 日韩精品一区二区在线| 久久尤物电影视频在线观看| 国产精品日产欧美久久久久| 亚洲欧洲99久久| 亚洲成av人片一区二区三区| 日日摸夜夜添夜夜添亚洲女人| 蜜桃久久久久久| 国产99一区视频免费| 93久久精品日日躁夜夜躁欧美| 91国偷自产一区二区开放时间| 欧美日韩国产精品成人| 精品日韩欧美一区二区| 中文字幕免费不卡在线| 亚洲一区二区三区视频在线播放| 秋霞午夜av一区二区三区| 国产精品系列在线播放| 91蜜桃网址入口| 日韩视频在线你懂得| 国产精品日韩成人| 午夜精品免费在线观看| 国产一区二区三区黄视频 | 国产精品66部| 91行情网站电视在线观看高清版| 欧美一区二区在线看| 久久久久久久久久久久久久久99 | 日韩一级在线观看| 欧美国产精品中文字幕| 亚洲国产成人91porn| 韩国欧美国产一区| 91精品1区2区| 久久久久久97三级| 亚洲福中文字幕伊人影院| 国产一区二区三区在线观看免费视频 | 91亚洲国产成人精品一区二三| 4hu四虎永久在线影院成人| 国产网站一区二区三区| 亚洲综合色丁香婷婷六月图片| 国产一区二区视频在线播放| 欧美日韩一区二区三区四区五区| 精品对白一区国产伦| 亚洲资源在线观看| 成人午夜av电影| 欧美成人aa大片| 亚洲妇熟xx妇色黄| 99re成人精品视频| 国产亚洲欧美一级| 日韩电影在线一区二区| 日本韩国精品一区二区在线观看| 久久久综合精品| 麻豆freexxxx性91精品| 91黄色免费看| 综合分类小说区另类春色亚洲小说欧美| 久久国产生活片100| 欧美日韩精品一区二区| 18欧美乱大交hd1984| 国产精品白丝jk黑袜喷水| 欧美一区二区美女| 午夜视频一区二区| 欧美性色综合网| 亚洲免费观看高清完整版在线 | 99久久综合99久久综合网站| 久久久美女毛片| 久久99精品久久久| 日韩欧美国产综合| 日本成人超碰在线观看| 欧美伊人久久久久久久久影院| 国产精品丝袜久久久久久app| 国产一区二区看久久| 精品国产亚洲一区二区三区在线观看| 亚瑟在线精品视频| 欧美日韩亚洲综合在线 欧美亚洲特黄一级| 国产精品天美传媒| 大美女一区二区三区| 国产欧美综合在线观看第十页| 精品一区二区久久| 久久久亚洲精品一区二区三区| 麻豆视频观看网址久久| 欧美大片在线观看一区二区| 免费高清在线一区| 精品国产乱码久久久久久久| 卡一卡二国产精品| 久久综合九色综合97_久久久| 久久精品国产一区二区| 精品嫩草影院久久| 国产成人啪午夜精品网站男同| 久久免费视频色| av福利精品导航| 亚洲激情男女视频| 欧美日韩国产经典色站一区二区三区| 亚洲国产精品久久久久秋霞影院| 在线中文字幕一区二区| 视频一区二区国产| 日韩美女主播在线视频一区二区三区| 精品系列免费在线观看| 久久久国际精品| av一二三不卡影片| 一区二区三区美女| 欧美精三区欧美精三区| 蜜桃av一区二区| 国产午夜精品一区二区三区四区| 成人午夜短视频| 亚洲大片精品永久免费| 精品日韩一区二区三区免费视频| 国产精品1024| 综合欧美一区二区三区| 91在线你懂得| 视频一区二区三区入口| 久久伊99综合婷婷久久伊| 一本一道久久a久久精品| 日韩av电影免费观看高清完整版在线观看| 精品成人一区二区三区四区| 91网站最新地址| 精品一区二区三区免费视频|