Print this page
5782 ike.config(4) needs additional oakley_group numbers

Split Close
Expand all
Collapse all
          --- old/usr/src/man/man4/ike.config.4.man.txt
          +++ new/usr/src/man/man4/ike.config.4.man.txt
↓ open down ↓ 304 lines elided ↑ open up ↑
 305  305             matches one in a phase 1 rule. There can be several of these, and
 306  306             they are additive. There must be either at least one phase 1
 307  307             transform in a rule or a global default phase 1 transform list. In
 308  308             a configuration file without a global default phase 1 transform
 309  309             list and a rule without a phase, transform list is an invalid file.
 310  310             Unless specified as optional, elements in the parameter-list must
 311  311             occur exactly once within a given transform's parameter-list:
 312  312  
 313  313             oakley_group number
 314  314                 The Oakley Diffie-Hellman group used for IKE SA key derivation.
 315      -               The group numbers are defined in RFC 2409, Appendix A, and RFC
 316      -               3526. Acceptable values are currently:
 317      -                 1 (768-bit)
 318      -                 2 (1024-bit)
 319      -                 5 (1536-bit)
 320      -                 14 (2048-bit)
 321      -                 15 (3072-bit)
 322      -                 16 (4096-bit)
      315 +               The group numbers are defined in RFC 2409, Appendix A, RFC
      316 +               3526, and RFC 5114, section 3.2. Acceptable values are
      317 +               currently:
      318 +                 1 (MODP 768-bit)
      319 +                 2 (MODP 1024-bit)
      320 +                 3 (EC2N 155-bit)
      321 +                 4 (EC2N 185-bit)
      322 +                 5 (MODP 1536-bit)
      323 +                 14 (MODP 2048-bit)
      324 +                 15 (MODP 3072-bit)
      325 +                 16 (MODP 4096-bit)
      326 +                 17 (MODP 6144-bit)
      327 +                 18 (MODP 8192-bit)
      328 +                 19 (ECP 256-bit)
      329 +                 20 (ECP 384-bit)
      330 +                 21 (ECP 521-bit)
      331 +                 22 (MODP 1024-bit, with 160-bit Prime Order Subgroup)
      332 +                 23 (MODP 2048-bit, with 224-bit Prime Order Subgroup)
      333 +                 24 (MODP 2048-bit, with 256-bit Prime Order Subgroup)
      334 +                 25 (ECP 192-bit)
      335 +                 26 (ECP 224-bit)
 323  336  
 324  337  
 325  338             encr_alg {3des, 3des-cbc, blowfish, blowfish-cdc, des, des-cbc, aes,
 326  339             aes-cbc}
 327  340                 An encryption algorithm, as in ipsecconf(1M). However, of the
 328  341                 ciphers listed above, only aes and aes-cbc allow optional key-
 329  342                 size setting, using the "low value-to-high value" syntax. To
 330  343                 specify a single AES key size, the low value must equal the
 331  344                 high value. If no range is specified, all three AES key sizes
 332  345                 are allowed.
↓ open down ↓ 352 lines elided ↑ open up ↑
 685  698         Piper, Derrell. RFC 2407, The Internet IP Security Domain of
 686  699         Interpretation for ISAKMP. Network Alchemy. Santa Cruz, California.
 687  700         November 1998.
 688  701  
 689  702  
 690  703         Kivinen, T. RFC 3526, More Modular Exponential (MODP) Diffie-Hellman
 691  704         Groups for Internet Key Exchange (IKE). The Internet Society, Network
 692  705         Working Group. May 2003.
 693  706  
 694  707  
      708 +       Lepinksi, M. and Kent, S. RFC 5114, Additional Diffie-Hellman Groups for
      709 +       Use with IETF Standards. BBN Technologies, January 2008.
      710 +
      711 +
 695  712  
 696  713                                  April 27, 2009                   IKE.CONFIG(4)
    
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX