|
NAMEiked —
Internet Key Exchange protocol daemon
SYNOPSIS
DESCRIPTIONiked is a key management daemon, which supports the
Internet Key Exchange (IKE) protocol version 1 (RFC2409) and version 2
(RFC4306). It is driven by upcalls from the kernel via the PF_KEYv2 interface
or by negotiation requests from remote peers, and manages IPsec SAs according
to racoon2.conf.
The following options are available:
Upon receiving SIGINT or SIGTERM, IPsec policies are managed by
spmd(8),
thus it must be started before FILES
SEE ALSOracoon2(7), racoon2.conf(5), spmd(8), kinkd(8), ipsec(4)The Internet Key Exchange (IKE), RFC2409, November 1998. Internet Key Exchange (IKEv2) Protocol, RFC4306, December 2005. HISTORYTheiked command was developed for racoon2 in 2004-2005.
AUTHORSiked was written and is maintained by
WIDE/racoon2 project
⟨http://www.racoon2.wide.ad.jp/⟩
ACKNOWLEDGEMENTSPart of the codes are derived from ipsec-tools racoon daemon, which was derived from KAME racoon daemon.BUGS"default" clause of configuration file is used for two purposes: to provide default values for individual field for other sections of configuration, and to specify default kmp configuration when the responder received a message from unknown peer. In latter case, when "default" clause lacks some necessary fields, error message may be cryptic, since it is not checked by configuration check routine of iked. (Probably it will result in "no proposal chosen".)On FreeBSD/NetBSD, when IPsec SA expires by IPsec SA lifetime, kernel does not notify iked about the sa expiration. To remedy this, iked maintains its own expiration timer for each IPsec SA. Since the iked can't know how much bytes used for the SA, lifetime_bytes in the configuration are ignored for now. SA bundles (e.g. AH+ESP) does not conform to protocol spec. After rekeying IKE_SA, iked may spit some warning messages, if the rekey negotiation or delete request was started from both ends at once.
Visit the GSP FreeBSD Man Page Interface. |