Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

ipsec_spigrp(5) [centos man page]

IPSEC_SPIGRP(5) 						  [FIXME: manual]						   IPSEC_SPIGRP(5)

NAME
ipsec_spigrp - list IPSEC Security Association groupings SYNOPSIS
ipsec spigrp cat/proc/net/ipsec_spigrp OBSOLETE
Note that spigrp is only supported on the classic KLIPS stack. It is not supported on any other stack and will be completely removed in future versions. A replacement command still needs to be designed DESCRIPTION
/proc/net/ipsec_spigrp is a read-only file that lists groups of IPSEC Security Associations (SAs). An entry in the IPSEC extended routing table can only point (via an SAID) to one SA. If more than one transform must be applied to a given type of packet, this can be accomplished by setting up several SAs with the same destination address but potentially different SPIs and protocols, and grouping them with ipsec_spigrp(8). The SA groups are listed, one line per connection/group, as a sequence of SAs to be applied (or that should have been applied, in the case of an incoming packet) from inside to outside the packet. An SA is identified by its SAID, which consists of protocol ("ah", "esp", "comp" or "tun"), SPI (with '.' for IPv4 or ':' for IPv6 prefixed hexadecimal number ) and destination address (IPv4 dotted quad or IPv6 coloned hex) prefixed by '@', in the format <proto><af><spi>@<dest>. EXAMPLES
tun.3d0@192.168.2.110 comp.3d0@192.168.2.110 esp.187a101b@192.168.2.110 ah.187a101a@192.168.2.110 is a group of 3 SAs, destined for 192.168.2.110 with an IPv4-in-IPv4 tunnel SA applied first with an SPI of 3d0 in hexadecimal, followed by a Deflate compression header to compress the packet with CPI of 3d0 in hexadecimal, followed by an Encapsulating Security Payload header to encrypt the packet with SPI 187a101b in hexadecimal, followed by an Authentication Header to authenticate the packet with SPI 187a101a in hexadecimal, applied from inside to outside the packet. This could be an incoming or outgoing group, depending on the address of the local machine. tun:3d0@3049:1::2 comp:3d0@3049:1::2 esp:187a101b@3049:1::2 ah:187a101a@3049:1::2 is a group of 3 SAs, destined for 3049:1::2 with an IPv6-in-IPv6 tunnel SA applied first with an SPI of 3d0 in hexadecimal, followed by a Deflate compression header to compress the packet with CPI of 3d0 in hexadecimal, followed by an Encapsulating Security Payload header to encrypt the packet with SPI 187a101b in hexadecimal, followed by an Authentication Header to authenticate the packet with SPI 187a101a in hexadecimal, applied from inside to outside the packet. This could be an incoming or outgoing group, depending on the address of the local machine. FILES
/proc/net/ipsec_spigrp, /usr/local/bin/ipsec SEE ALSO
ipsec(8), ipsec_manual(8), ipsec_tncfg(5), ipsec_eroute(5), ipsec_spi(5), ipsec_klipsdebug(5), ipsec_spigrp(8), ipsec_version(5), ipsec_pf_key(5) HISTORY
Written for the Linux FreeS/WAN project <http://www.freeswan.org/> by Richard Guy Briggs. BUGS
:-) [FIXME: source] 10/06/2010 IPSEC_SPIGRP(5)

Check Out this Related Man Page

IPSEC_SPI(5)							  [FIXME: manual]						      IPSEC_SPI(5)

NAME
ipsec_spi - list IPSEC Security Associations SYNOPSIS
ipsec spi cat/proc/net/ipsec_spi OBSOLETE
Note that eroute is only supported on the classic KLIPS stack. It is not supported on any other stack and will be completely removed in future versions. A replacement command still needs to be designed DESCRIPTION
/proc/net/ipsec_spi is a read-only file that lists the current IPSEC Security Associations. A Security Association (SA) is a transform through which packet contents are to be processed before being forwarded. A transform can be an IPv4-in-IPv4 or IPv6-in-IPv6 encapsulation, an IPSEC Authentication Header (authentication with no encryption), or an IPSEC Encapsulation Security Payload (encryption, possibly including authentication). When a packet is passed from a higher networking layer through an IPSEC virtual interface, a search in the extended routing table (see ipsec_eroute(5)) yields a IP protocol number , a Security Parameters Index (SPI) and an effective destination address When an IPSEC packet arrives from the network, its ostensible destination, an SPI and an IP protocol specified by its outermost IPSEC header are used. The destination/SPI/protocol combination is used to select a relevant SA. (See ipsec_spigrp(5) for discussion of how multiple transforms are combined.) An spi , proto, daddr and address_family arguments specify an SAID. Proto is an ASCII string, "ah", "esp", "comp" or "tun", specifying the IP protocol. Spi is a number, preceded by '.' indicating hexadecimal and IPv4 or by ':' indicating hexadecimal and IPv6, where each hexadecimal digit represents 4 bits, between 0x100 and 0xffffffff; values from 0x0 to 0xff are reserved. Daddr is a dotted-decimal IPv4 destination address or a coloned hex IPv6 destination address. An SAID combines the three parameters above, such as: "tun.101@1.2.3.4" for IPv4 or "tun:101@3049:1::1" for IPv6 A table entry consists of: + SAID + <transform name (proto,encalg,authalg)>: + direction (dir=) + source address (src=) + source and destination addresses and masks for inner header policy check addresses (policy=), as dotted-quads or coloned hex, separated by '->', for IPv4-in-IPv4 or IPv6-in-IPv6 SAs only + initialisation vector length and value (iv_bits=, iv=) if non-zero + out-of-order window size, number of out-of-order errors, sequence number, recently received packet bitmask, maximum difference between sequence numbers (ooowin=, ooo_errs=, seq=, bit=, max_seq_diff=) if SA is AH or ESP and if individual items are non-zero + extra flags (flags=) if any are set + authenticator length in bits (alen=) if non-zero + authentication key length in bits (aklen=) if non-zero + authentication errors (auth_errs=) if non-zero + encryption key length in bits (eklen=) if non-zero + encryption size errors (encr_size_errs=) if non-zero + encryption padding error warnings (encr_pad_errs=) if non-zero + lifetimes legend, c=Current status, s=Soft limit when exceeded will initiate rekeying, h=Hard limit will cause termination of SA (life(c,s,h)=) + number of connections to which the SA is allocated (c), that will cause a rekey (s), that will cause an expiry (h) (alloc=), if any value is non-zero + number of bytes processesd by this SA (c), that will cause a rekey (s), that will cause an expiry (h) (bytes=), if any value is non-zero + time since the SA was added (c), until rekey (s), until expiry (h), in seconds (add=) + time since the SA was first used (c), until rekey (s), until expiry (h), in seconds (used=), if any value is non-zero + number of packets processesd by this SA (c), that will cause a rekey (s), that will cause an expiry (h) (packets=), if any value is non-zero + time since the last packet was processed, in seconds (idle=), if SA has been used average compression ratio (ratio=) EXAMPLES
tun.12a@192.168.43.1 IPIP: dir=out src=192.168.43.2 life(c,s,h)=bytes(14073,0,0)add(269,0,0) use(149,0,0)packets(14,0,0) idle=23 is an outbound IPv4-in-IPv4 (protocol 4) tunnel-mode SA set up between machines 192.168.43.2 and 192.168.43.1 with an SPI of 12a in hexadecimal that has passed about 14 kilobytes of traffic in 14 packets since it was created, 269 seconds ago, first used 149 seconds ago and has been idle for 23 seconds. esp:9a35fc02@3049:1::1 ESP_3DES_HMAC_MD5: dir=in src=9a35fc02@3049:1::2 ooowin=32 seq=7149 bit=0xffffffff alen=128 aklen=128 eklen=192 life(c,s,h)=bytes(1222304,0,0)add(4593,0,0) use(3858,0,0)packets(7149,0,0) idle=23 is an inbound Encapsulating Security Payload (protocol 50) SA on machine 3049:1::1 with an SPI of 9a35fc02 that uses 3DES as the encryption cipher, HMAC MD5 as the authentication algorithm, an out-of-order window of 32 packets, a present sequence number of 7149, every one of the last 32 sequence numbers was received, the authenticator length and keys is 128 bits, the encryption key is 192 bits (actually 168 for 3DES since 1 of 8 bits is a parity bit), has passed 1.2 Mbytes of data in 7149 packets, was added 4593 seconds ago, first used 3858 seconds ago and has been idle for 23 seconds. FILES
/proc/net/ipsec_spi, /usr/local/bin/ipsec SEE ALSO
ipsec(8), ipsec_manual(8), ipsec_tncfg(5), ipsec_eroute(5), ipsec_spigrp(5), ipsec_klipsdebug(5), ipsec_spi(8), ipsec_version(5), ipsec_pf_key(5) HISTORY
Written for the Linux FreeS/WAN project <http://www.freeswan.org/> by Richard Guy Briggs. BUGS
The add and use times are awkward, displayed in seconds since machine start. It would be better to display them in seconds before now for human readability. [FIXME: source] 10/06/2010 IPSEC_SPI(5)
Man Page