Index Index for
Section 8
Index Alphabetical
listing for I
Bottom of page Bottom of
page

ipsecd(8)

NAME

ipsecd - The IP Security (IPsec) daemon

SYNOPSIS

/usr/sbin/ ipsecd [-b] [-d] [-h] [-l] [-f file] [-m level] [-o file]

OPTIONS

-b Reads the default backup SPD file (/etc/ipsec.spd.bak). This overrides the normal default SPD file (/etc/ipsec.spd) and any file specified with the -f option. If the daemon is subsequently signaled to reload, it will use the normal default SPD file or the policy file specified with -f. Use this option when restarting the daemon after a failure that might be due to an invalid policy file. -d Runs as a daemon process, detached from the controlling terminal. You should typically run ipsecd with this option. -e Reserved. -f file Specifies the IPsec Security Policy Database (SPD) file that the daemon should read. The default file is /etc/ipsec.spd. -h Displays a summary of command line options and exits. -l Logs packets that do not match any selectors to the /var/adm/syslog.dated/current/auth.log file. You can also enable this option from within the SysMan Menu IPsec application. -m level Specifies the message level for messages reported by the ipsecd daemon. Valid values for the message level are as follows: 0 Very quiet mode. The ipsecd daemon reports only warnings and errors. 1 Default mode. In addition to warnings and errors, the ipsecd daemon reports limited messages for each IKE negotiation. 2 Verbose mode. In addition to warnings and errors, the ipsecd daemon reports detailed messages about each IKE negotiation. -o file Redirects debugging output to the specified file. -p Parses the contents of the SPD file, reporting any syntax errors, and then exits. There may be policy errors which are not detectable until the policy takes effect and will not be detected by this option.

DESCRIPTION

The ipsecd daemon controls the operation of the IP security protocols in the system. It combines the function of an IPsec policy manager and Internet Key Exchange (IKE) daemon. When started, ipsecd reads and parses the specified Security Policy Database (SPD) file. The daemon transfers the information needed for enforcing the policy into the IPsec kernel packet processing engine. The daemon manages all requests to create security associations (SAs) needed to communicate securely with other IPsec systems. It receives Internet Key Exchange (IKE) requests from other systems, validates that they match local policy, and generates the cryptographic keys needed for the the SAs. The daemon initiates IKE exchanges with other systems in response to requests from the kernel packet processing engine. The kernel and the daemon communicate through the /dev/ipsec_engine pseudo-device. By default, the daemon listens on UDP port 500 for IKE traffic with other systems. When IPsec is enabled on the system, the default action is to drop all IP packets into and out of the system. The ipsecd daemon must be running to instantiate a policy that allows packets to flow. If the daemon is not started or is killed, all network traffic will be blocked. The daemon is started automatically at system boot time if IPsec is enabled. If ipsecd receives a HUP signal, it rereads its SPD file and instantiates a new security policy. If an existing connection rule is modified by the new policy, the SAs associated with that connection will be deleted. Other existing SAs will remain in effect until they reach the end of their configured lifetimes. You typically manage IPsec by using the SysMan IPsec application. However, you can manage the daemon directly using the /sbin/init.d/ipsec script. The following list shows the script options and their action: /sbin/init.d/ipsec start Starts ipsecd if IPsec has been enabled through SysMan. After you run this script, the system is in "IP secure" mode. The ipsecd daemon must be running in order for IP traffic to flow into and out of the system. /sbin/init.d/ipsec stop Stops ipsecd. If the system is in "IP secure" mode, no IP traffic will flow into or out of the system. If IPsec processing has been disabled through SysMan, the system is taken out of "IP secure" mode. /sbin/init.d/ipsec reload Forces ipsecd to reread its SPD file and enforce a new security policy. If an existing connection rule is modified by the new policy, the SAs associated with that connection will be deleted. Other existing SAs will remain in effect until they reach the end of their configured lifetimes. /sbin/init.d/ipsec secure Places the system into "IP secure" mode. If ipsecd is not running, no IP traffic will flow into or out of the system. /sbin/init.d/ipsec unsecure Takes the system out of "IP secure" mode. If ipsecd is not running, IP packets will flow with no security processing. If ipsecd is running, IP packets will flow with existing IPsec policy. When running in a cluster, the default IPsec SPD file, /etc/ipsec.spd, applies to all cluster members because the cluster is a single security domain. A copy of ipsecd runs on each member of the cluster.

FILES

/etc/ipsec.spd Specifies the default SPD file for the system. The file will contain keys when manual keying or pre-shared keys are in use. Therefore, the file must have root-only access. In a cluster configuration, this is a cluster common file and contains the (common) IP security policy for the cluster. /etc/ipsec.spd.bak The SysMan IPsec application saves the previous /etc/ipsec.spd file with this name whenever the policy is changed (for example, after a reload signal). If an invalid SPD file is found when the daemon is started or reloaded, the /sbin/init.d/ipsec script attempts to start the daemon with this SPD file. /etc/ipsec_algs.spd This file contains template IPsec and IKE proposals as well as configuration parameters that are not changed during normal operation.

SEE ALSO

Commands: ipsec_certmake(8), ipsec_certview(8), ipsec_convert(8), ipsec_keypaircheck(8), ipsec_keytool(8), ipsec_mgr(8) Information: ipsec(7)

Index Index for
Section 8
Index Alphabetical
listing for I
Top of page Top of
page