1 .\" $Id: racoon.8,v 1.3.10.1 2005/04/18 11:10:55 manubsd Exp $
3 .\" Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
4 .\" All rights reserved.
6 .\" Redistribution and use in source and binary forms, with or without
7 .\" modification, are permitted provided that the following conditions
9 .\" 1. Redistributions of source code must retain the above copyright
10 .\" notice, this list of conditions and the following disclaimer.
11 .\" 2. Redistributions in binary form must reproduce the above copyright
12 .\" notice, this list of conditions and the following disclaimer in the
13 .\" documentation and/or other materials provided with the distribution.
14 .\" 3. Neither the name of the project nor the names of its contributors
15 .\" may be used to endorse or promote products derived from this software
16 .\" without specific prior written permission.
18 .\" THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
19 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
22 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 .Nd IKE (ISAKMP/Oakley) key management daemon
44 .Op Fl f Ar configfile
52 is used to setup and maintain an IPSec tunnel or transport channel,
53 between two devices, over which network traffic is conveyed securely.
54 This security is made possible by cryptographic keys and operations
58 relies on a standardized network protocol (IKE) to automatically
59 negotiate and manage the cryptographic keys (e.g. security
60 associations) that are necessary for the
61 IPSec tunnel or transport channel to function.
66 key management protocol,
67 to establish security associations with other hosts.
69 .Pq Security Policy Database
70 in the kernel usually triggers
73 usually sends all informational messages, warnings and error messages to
79 Debugging messages are sent with the priority
83 appropriately to see these messages.
87 Specify the default address family for the sockets.
89 Install SA(s) from the file which is specified in
92 Increase the debug level.
95 arguments will increase the debug level even more.
100 .It Fl f Ar configfile
103 as the configuration file instead of the default.
106 .Ar file_name:line_number:function_name
111 as the logging file instead of
114 This flag causes the packet dump be more verbose, with higher
119 assumes the presence of the kernel random number device
125 The command exits with 0 on success, and non-zero on errors.
128 .Bl -tag -width /private/etc/racoon/remote/anonymous -compact
129 .It Pa /private/etc/racoon/racoon.conf
130 default configuration file.
131 .It Pa /private/etc/racoon/psk.txt
132 default pre-shared key file.
145 command first appeared in the
147 Yokogawa IPsec implementation.
149 .Sh SECURITY CONSIDERATIONS
150 The use of IKE phase 1 aggressive mode is not recommended,
152 .Pa http://www.kb.cert.org/vuls/id/886601 .