亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? uml_netjig.8

?? openswan
?? 8
?? 第 1 頁 / 共 4 頁
字號:
.TH UML_NETJIG 8 "16 June 2002".SH NAMEuml_netjig \- User Mode Linux network testing jig.SH SYNOPSIS.na.nh.HP.ft Buml_netjig[\-\-help][\-\-arpreply][\-\-debug][\-\-exitonempty][\-\-tcpdump][\-\-playpublic\fIfilename\fP][\-\-playprivate]\fIfilename\fP][\-\-recordpublic]\fIfilename\fP][\-\-recordprivate]\fIfilename\fP][\-\-unix\fIdirname\fP][\-\-startup\fIprogram\fP].ft R.HP.ft Buml_netjig [\-\-cmdproto].ft R.hy.ad.SH DESCRIPTION.BR uml_netjigis an descendant of the User-Mode-Linux projects ``uml_switch'') program. Ithas been extended to facilitate automated testing of networking code foundin a User-Mode-Linux guest kernel..BR whackis an auxiliary program to allow requests to be made to a running.BR pluto ..LP.BR plutois used to automatically build shared ``security associations'' on asystem that has IPsec, the secure IP protocol.In other words,.BR plutocan eliminate much of the work of manual keying.The actualsecure transmission of packets is the responsibility of other parts ofthe system (see.BR KLIPS ,the companion implementation of IPsec).\fIipsec_auto\fP(8) provides a more convenient interface to\fBpluto\fP and \fBwhack\fP..SS IKE's Job.LPA \fISecurity Association\fP (\fISA\fP) is an agreement between two network nodes onhow to process certain traffic between them.  This processing involvesencapsulation, authentication, encryption, or compression..LPIKE can be deployed on a network node to negotiate SecurityAssociations for that node.  These IKE implementations can onlynegotiate with other IKE implementations, so IKE must be on each nodethat is to be an endpoint of an IKE-negotiated Security Association.No other nodes need to be running IKE..LPAn IKE instance (i.e. an IKE implementation on a particular networknode) communicates with another IKE instance using UDP IP packets, sothere must be a route between the nodes in each direction..LPThe negotiation of Security Associations requires a number of choicesthat involve tradeoffs between security, convenience, trust, andefficiency.  These are policy issues and are normally specified to theIKE instance by the system administrator..LPIKE deals with two kinds of Security Associations.  The first part ofa negotiation between IKE instances is to build an ISAKMP SA.  AnISAKMP SA is used to protect communication between the two IKEs.IPsec SAs can then be built by the IKEs \- these are used to carryprotected IP traffic between the systems..LPThe negotiation of the ISAKMP SA is known as Phase 1.  In theory,Phase 1 can be accomplished by a couple of different exchange types,but we only implement one called Main Mode (we don't implementAggressive Mode)..LPAny negotiation under the protection of an ISAKMP SA, including thenegotiation of IPsec SAs, is part of Phase 2.  The exchange typethat we use to negotiate an IPsec SA is called Quick Mode..LPIKE instances must be able to authenticate each other as part of theirnegotiation of an ISAKMP SA.  This can be done by several mechanismsdescribed in the draft standards..LPIKE negotiation can be initiated by any instance with any other.  Ifboth can find an agreeable set of characteristics for a SecurityAssociation, and both recognize each others authenticity, they can setup a Security Association.  The standards do not specify what causesan IKE instance to initiate a negotiation..LPIn summary, an IKE instance is prepared to automate the management ofSecurity Associations in an IPsec environment, but a number of issuesare considered policy and are left in the system administrator's hands..SS Pluto.LP\fBpluto\fP is an implementation of IKE.  It runs as a daemon on a networknode.  Currently, this network node must be a LINUX system running the\fBKLIPS\fP implementation of IPsec..LP\fBpluto\fP only implements a subset of IKE.  This is enough for it tointeroperate with other instances of \fBpluto\fP, and many other IKEimplementations.  We are working on implementing more of IKE..LPThe policy for acceptable characteristics for Security Associations ismostly hardwired into the code of \fBpluto\fP (spdb.c).  Eventuallythis will be moved into a security policy database with reasonableexpressive power and more convenience..LP\fBpluto\fP uses shared secrets or RSA signatures to authenticatepeers with whom it is negotiating..LP\fBpluto\fP initiates negotiation of a Security Association when it ismanually prodded: the program \fBwhack\fP is run to trigger this.It will also initiate a negotiation when \fBKLIPS\fP traps an outbound packetfor Opportunistic Encryption..LP\fBpluto\fP implements ISAKMP SAs itself.  After it has negotiated thecharacteristics of an IPsec SA, it directs \fBKLIPS\fP to implement it.It also invokes a script to adjust any firewall and issue \fIroute\fP(8)commands to direct IP packets through \fBKLIPS\fP..LPWhen \fBpluto\fP shuts down, it closes all Security Associations..SS Before Running Pluto.LP\fBpluto\fP runs as a daemon with userid root.  Before running it, a fewthings must be set up..LP\fBpluto\fP requires \fBKLIPS\fP, the FreeS/WAN implementation of IPsec.All of the components of \fBKLIPS\fP and \fBpluto\fP should be installed..LP\fBpluto\fP supports multiple public networks (that is, networksthat are considered insecure and thus need to have their trafficencrypted or authenticated).  It discovers thepublic interfaces to use by looking at all interfaces that areconfigured (the \fB\-\-interface\fP option can be used to limitthe interfaces considered).It does this only when \fBwhack\fP tells it to \-\-listen,so the interfaces must be configured by then.  Each interface with a name of the form\fBipsec\fP[\fB0\fP-\fB9\fP] is taken as a \fBKLIPS\fP virtual public interface.Another network interface with the same IP address (there should be onlyone) is taken as the corresponding real publicinterface.  \fIifconfig\fP(8) with the \fB\-a\fP flag will showthe name and status of each network interface..LP\fBpluto\fP requires a database of preshared secrets and RSA private keys.This is described in the.IR ipsec.secrets (5).\fBpluto\fP is told of RSA public keys via \fBwhack\fP commands.If the connection is Opportunistic, and no RSA public key is known,\fBpluto\fP will attempt to fetch RSA keys using the Domain Name System..SS Setting up \fBKLIPS\fP for \fBpluto\fP.LPThe most basic network topology that \fBpluto\fP supports has two securitygateways negotiating on behalf of client subnets.  The diagram of RGB'stestbed is a good example (see \fIklips/doc/rgb_setup.txt\fP)..LPThe file \fIINSTALL\fP in the base directory of this distributionexplains how to start setting up the whole system, including \fBKLIPS\fP..LPMake sure that the security gateways have routes to each other.  Thisis usually covered by the default route, but may require issuing.IR route (8)commands.  The route must go through a particular IPinterface (we will assume it is \fIeth0\fP, but it need not be).  Theinterface that connects the security gateway to its client must be adifferent one..LPIt is necessary to issue a.IR ipsec_tncfg (8)command on each gateway.  The required command is:\ \ \ ipsec tncfg \-\-attach\ \-\-virtual\ ipsec0 \-\-physical\ eth0A command to set up the ipsec0 virtual interface will also need to berun.  It will have the same parameters as the command used to set upthe physical interface to which it has just been connected using.IR ipsec_tncfg (8)..SS ipsec.secrets file.LPA \fBpluto\fP daemon and another IKE daemon (for example, another instanceof \fBpluto\fP) must convince each other that they are who they are supposedto be before any negotiation can succeed.  This authentication isaccomplished by using either secrets that have been shared beforehand(manually) or by using RSA signatures.  There are other techniques,but they have not been implemented in \fBpluto\fP..LPThe file \fI/etc/ipsec.secrets\fP is used to keep preshared secret keysand RSA private keys forauthentication with other IKE daemons.  For debugging, there is anargument to the \fBpluto\fP command to use a different file.This file is described in.IR ipsec.secrets (5)..SS Running Pluto.LPTo fire up the daemon, just type \fBpluto\fP (be sure to be running asthe superuser).The default IKE port number is 500, the UDP port assigned by IANA for IKE Daemons.\fBpluto\fP must be run by the superuser to be able to use the UDP 500 port..LP\fBpluto\fP attempts to create a lockfile with the name\fI/var/run/pluto/pluto.pid\fP.  If the lockfile cannot be created,\fBpluto\fP exits \- this prevents multiple \fBpluto\fPs fromcompeting  Any ``leftover'' lockfile must be removed before\fBpluto\fP will run.  \fBpluto\fP writes its pid into this file sothat scripts can find it.  This lock will not function properly if itis on an NFS volume (but sharing locks on multiple machines doesn'tmake sense anyway)..LP\fBpluto\fP then forks and the parent exits.  This is the conventional``daemon fork''.  It can make debugging awkward, so there is an optionto suppress this fork..LPAll logging, including diagnostics, is sent to.IR syslog (3)with facility=authpriv;it decides where to put these messages (possibly in /var/log/secure).Since this too can make debugging awkward, there is an option tosteer logging to stderr..LPOnce \fBpluto\fP is started, it waits for requests from \fBwhack\fP..SS Pluto's Internal State.LPTo understand how to use \fBpluto\fP, it is helpful to understand a littleabout its internal state.  Furthermore, the terminology is needed to deciphersome of the diagnostic messages..LPThe \fI(potential) connection\fP database describes attributes of aconnection.  These include the IP addresses of the hosts and clientsubnets and the security characteristics desired.  \fBpluto\fPrequires this information (simply called a connection) before it canrespond to a request to build an SA.  Each connection is given a namewhen it is created, and all references are made using this name..LPDuring the IKE exchange to build an SA, the information about thenegotiation is represented in a \fIstate object\fP.  Each state objectreflects how far the negotiation has reached.  Once the negotiation iscomplete and the SA established, the state object remains to representthe SA.  When the SA is terminated, the state object is discarded.Each State object is given a serial number and this is used to referto the state objects in logged messages..LPEach state object corresponds to a connection and can be thought ofas an instantiation of that connection.At any particular time, there may be any number of state objectscorresponding to a particular connection.Often there is one representing an ISAKMP SA and another representingan IPsec SA..LP\fBKLIPS\fP hooks into the routing code in a LINUX kernel.Traffic to be processed by an IPsec SA must be directed through\fBKLIPS\fP by routing commands.  Furthermore, the processing to bedone is specified by \fIipsec eroute(8)\fP commands.\fBpluto\fP takes the responsibility of managing both of these specialkinds of routes..LPEach connection may be routed, and must be while it has an IPsec SA.The connection specifies the characteristics of the route: theinterface on this machine, the ``gateway'' (the nexthop),and the peer's client subnet.  Twoconnections may not be simultaneously routed if they are for the samepeer's client subnet but use different interfaces or gateways(\fBpluto\fP's logic does not reflect any advanced routing capabilities)..LPEach eroute is associated with the state object for an IPsec SAbecause it has the particular characteristics of the SA.Two eroutes conflict if they specify the identical localand remote clients (unlike for routes, the local clients aretaken into account)..LPWhen \fBpluto\fP needs to install a route for a connection,it must make sure that no conflicting route is in use.  If anotherconnection has a conflicting route, that route will be taken down, as longas there is no IPsec SA instantiating that connection.If there is such an IPsec SA, the attempt to install a route will fail..LPThere is an exception.  If \fBpluto\fP, as Responder, needs to installa route to a fixed client subnet for a connection, and there isalready a conflicting route, then the SAs using the route are deletedto make room for the new SAs.  The rationale is that the newconnection is probably more current.  The need for this usually is aproduct of Road Warrior connections (these are explained later; theycannot be used to initiate)..LPWhen \fBpluto\fP needs to install an eroute for an IPsec SA (for astate object), first the state object's connection must be routed (ifthis cannot be done, the eroute and SA will not be installed).If a conflicting eroute is already in place for another connection,the eroute and SA will not be installed (but note that the routingexception mentioned above may have already deleted potentially conflicting SAs).If another IPsecSA for the same connection already has an eroute, all its outgoing trafficis taken over by the new eroute.  The incoming traffic will still beprocessed.  This characteristic is exploited during rekeying..LPAll of these routing characteristics are expected change when\fBKLIPS\fP is modified to use the firewall hooks in the LINUX 2.4.xkernel..SS Using Whack.LP\fBwhack\fP is used to command a running \fBpluto\fP.\fBwhack\fP uses a UNIX domain socket to speak to \fBpluto\fP(by default, \fI/var/pluto.ctl\fP)..LP\fBwhack\fP has an intricate argument syntax.This syntax allows many different functions to be specified.The help form shows the usage or version information.The connection form gives \fBpluto\fP a description of a potential connection.The public key form informs \fBpluto\fP of the RSA public key for a potential peer.The delete form deletes a connection description and all SAs correspondingto it.The listen form tells \fBpluto\fP to start or stop listening on the public interfacesfor IKE requests from peers.The route form tells \fBpluto\fP to set up routing for a connection;the unroute form undoes this.The initiate form tells \fBpluto\fP to negotiate an SA corresponding to a connection.The terminate form tells \fBpluto\fP to remove all SAs corresponding to a connection,including those being negotiated.The status form displays the \fBpluto\fP's internal state.The debug form tells \fBpluto\fP to change the selection of debugging output``on the fly''.  The shutdown form tells\fBpluto\fP to shut down, deleting all SAs..LPMost options are specific to one of the forms, and will be describedwith that form.  There are three options that apply to all forms..TP\fB\-\-ctlbase\fP\ \fIpath\fP\fIpath\fP.ctl is used as the UNIX domain socket for talkingto \fBpluto\fP.This option facilitates debugging..TP\fB\-\-optionsfrom\fP\ \fIfilename\fP

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲精品第1页| 国产一区二区在线看| 欧美电影免费观看高清完整版在| 99久久综合国产精品| 日日夜夜免费精品| 亚洲伦理在线精品| 国产精品久久久久久亚洲伦| 欧美丝袜自拍制服另类| 一本色道综合亚洲| av电影天堂一区二区在线观看| 国产一区久久久| 国内精品第一页| 蜜臀av性久久久久蜜臀av麻豆| 亚洲小少妇裸体bbw| 亚洲视频综合在线| 亚洲少妇最新在线视频| 中文字幕一区二区三区在线不卡| 国产亚洲福利社区一区| 欧美三级资源在线| 欧美三级日韩三级| 在线播放国产精品二区一二区四区 | 国产精品视频九色porn| 久久久久久久电影| 日本一区二区综合亚洲| 国产日产欧美一区| 国产精品无码永久免费888| 国产网红主播福利一区二区| 国产精品美女久久久久高潮| 国产视频一区在线播放| 国产精品久久久久久久久晋中| 国产精品色哟哟| 亚洲免费观看高清完整版在线| 亚洲综合另类小说| 亚洲欧美综合色| 天使萌一区二区三区免费观看| 日韩av不卡在线观看| 国产九色sp调教91| 成人免费观看男女羞羞视频| 不卡影院免费观看| 欧美精品成人一区二区三区四区| 欧美成人三级电影在线| 欧美一区二区视频观看视频| 久久亚洲精品国产精品紫薇| 中文字幕亚洲电影| 婷婷综合久久一区二区三区| 久久爱另类一区二区小说| 福利电影一区二区| 欧美中文字幕一区| www国产精品av| 成人欧美一区二区三区小说| 一区二区高清免费观看影视大全 | www.日本不卡| 欧美高清性hdvideosex| 国产亚洲精品aa午夜观看| 亚洲激情在线播放| 日韩电影在线免费观看| 成+人+亚洲+综合天堂| 欧美一级淫片007| 国产精品久久久久久久久果冻传媒 | 亚洲综合一区在线| 国产精品性做久久久久久| 欧洲在线/亚洲| 精品久久久久久久久久久久久久久| 国产精品―色哟哟| 国产精品每日更新| 麻豆精品久久精品色综合| 99国产精品久| 2014亚洲片线观看视频免费| 亚洲愉拍自拍另类高清精品| 国产在线精品免费av| 欧美男男青年gay1069videost| 久久九九99视频| 日韩国产一区二| 成人av网站在线观看免费| 久久久久久日产精品| 日本在线不卡视频一二三区| 91国偷自产一区二区开放时间| 久久久91精品国产一区二区三区| 三级一区在线视频先锋| 欧美日韩国产影片| 洋洋成人永久网站入口| 东方aⅴ免费观看久久av| 欧美日韩第一区日日骚| 亚洲蜜臀av乱码久久精品蜜桃| 国产成人午夜高潮毛片| 久久综合久久综合亚洲| 一区二区三区国产精品| 91色婷婷久久久久合中文| 日本一区二区三区四区在线视频 | 91色porny在线视频| 欧美精品一区二区高清在线观看| 久久99久久精品| 欧美女孩性生活视频| 日韩国产在线观看| 在线电影院国产精品| 洋洋av久久久久久久一区| 91福利国产成人精品照片| 国产精品高清亚洲| 成人动漫一区二区三区| 欧美国产在线观看| av欧美精品.com| 亚洲乱码精品一二三四区日韩在线| 91污片在线观看| 亚洲精品中文字幕乱码三区| 欧美三级中文字| 人人狠狠综合久久亚洲| 欧美v日韩v国产v| 国产成人av一区二区三区在线| 日韩欧美在线123| 精品一区二区三区免费毛片爱| 久久先锋资源网| 北条麻妃国产九九精品视频| 国产精品不卡一区| 欧洲av在线精品| 免费成人你懂的| 国产女人18毛片水真多成人如厕| 99久久er热在这里只有精品15 | 一区二区三区在线播放| 99久久久久免费精品国产| 国产精品剧情在线亚洲| 欧洲精品中文字幕| 国产一区二区三区精品欧美日韩一区二区三区 | 丁香五精品蜜臀久久久久99网站| 精品成人在线观看| 国产一区二区三区在线看麻豆| 国产日本一区二区| 欧洲精品视频在线观看| 精品制服美女久久| 亚洲女厕所小便bbb| 日韩欧美国产综合| 成人一区在线观看| 亚洲国产成人tv| 中文子幕无线码一区tr| 欧美三级资源在线| 国产在线视频不卡二| 国产精品乱码一区二区三区软件| 欧美日韩国产系列| 蜜臂av日日欢夜夜爽一区| 中文字幕视频一区| 精品久久久久久亚洲综合网| 3d动漫精品啪啪1区2区免费| 国产福利精品一区| 欧美乱妇15p| 东方aⅴ免费观看久久av| 国产成人综合在线| 久久99在线观看| 狠狠色狠狠色综合日日91app| 亚洲成人一区在线| 亚洲午夜久久久久| 亚洲国产一二三| 天堂成人免费av电影一区| 亚洲一区二区三区精品在线| 一区二区三区中文字幕在线观看| 一色屋精品亚洲香蕉网站| 国产精品美女久久久久aⅴ| 欧美高清在线一区二区| 国产精品久久久久精k8| 亚洲欧洲av在线| 一区二区在线观看免费| 亚洲一区二区三区在线播放| 亚洲午夜免费电影| 日韩在线播放一区二区| 久久99久久久欧美国产| 国产精品系列在线播放| 国产91精品一区二区麻豆网站| av网站一区二区三区| 欧美天天综合网| 日韩亚洲欧美成人一区| 精品国产乱码久久久久久闺蜜| 欧美mv日韩mv国产网站| 国产欧美1区2区3区| 亚洲女人的天堂| 天天色 色综合| 激情五月婷婷综合| 97久久超碰国产精品电影| 一本色道综合亚洲| 日韩限制级电影在线观看| 国产午夜一区二区三区| 亚洲精品久久久久久国产精华液| 天天av天天翘天天综合网 | 欧美成人精精品一区二区频| 国产色一区二区| 亚洲免费观看高清完整版在线| 国内精品久久久久影院色| 99视频国产精品| 欧美色倩网站大全免费| 久久精品亚洲国产奇米99| 亚洲三级小视频| 奇米四色…亚洲| 99久久久久免费精品国产 | 国产一区高清在线| 91黄色免费看| 国产日韩欧美一区二区三区综合| 中文字幕一区二区三区在线观看| 日韩电影一区二区三区| 99国产精品国产精品久久| 欧美v国产在线一区二区三区| 亚洲免费色视频| 高清在线成人网| 宅男噜噜噜66一区二区66|