racoon2-iked (8) - Linux Man Pages
racoon2-iked: Internet Key Exchange protocol daemon
iked - Internet Key Exchange protocol daemon
SYNOPSIS[-46hvFV ] [-f configfile ] [-l logfile ] [-p port ] [-I peer-address ] [-S selector-index ] [-d ] [-D level ] [-P outfile ]
DESCRIPTIONis a key management daemon, which supports the Internet Key Exchange (IKE) protocol version 1 (RFC2409) and version 2 (RFC4306). It is driven by upcalls from the kernel via the PF_KEYv2 interface or by negotiation requests from remote peers, and manages IPsec SAs according to racoon2.conf
The following options are available:
- Use IPv4 addresses only for local sockets.
- Use IPv6 addresses only for local sockets.
- Increase the debugging level. This flag may occur multiple times.
- -f configfile
- Read configurations from the specified file.
- -I peer-address
- Immediately initiate to the peer specified.
- -S selector_index
- Immediately initiate using the selector specified.
- Show simple help messages.
- -l logfile
- Output log to logfile instead of syslog.
- -p portnum
- Specify default port number for IKE sockets.
- Output log to stdout in addition to syslog.
- -D num
- Set debug flag.
- Run in the foreground. does not detach itself from the terminal and does not become a daemon. Logs are output to the stderr.
- -P outfile
- Record unencrypted IKE communication packets to the file. This option is available only if was compiled with --enable-pcap configuration option.
- Show the version.
Upon receiving SIGINT or SIGTERM, shuts down IKEv2 IKE_SAs with peer nodes by sending Informational exchange with Delete payload, deletes relevant IPsec SAs, and then exits. Upon receiving SIGHUP, similarly shuts down IKEv2 IKE_SAs and deletes relevant IPsec SAs, then reloads the configuration file.
- The default configuration file for racoon2.
- The PID file of the current instance of the daemon.
HISTORYThe command was developed for racoon2 in 2004-2005.
AUTHORSwas written and is maintained by An WIDE/racoon2 project Aq http://www.racoon2.wide.ad.jp/
ACKNOWLEDGEMENTSPart of the codes are derived from ipsec-tools racoon daemon, which was derived from KAME racoon daemon.
BUGS"default" clause of configuration file is used for two purposes: to provide default values for individual field for other sections of configuration, and to specify default kmp configuration when the responder received a message from unknown peer. In latter case, when "default" clause lacks some necessary fields, error message may be cryptic, since it is not checked by configuration check routine of iked. (Probably it will result in "no proposal chosen".)
On FreeBSD/NetBSD, when IPsec SA expires by IPsec SA lifetime, kernel does not notify iked about the sa expiration. To remedy this, iked maintains its own expiration timer for each IPsec SA. Since the iked can't know how much bytes used for the SA, lifetime_bytes in the configuration are ignored for now.
SA bundles (e.g. AH+ESP) does not conform to protocol spec.
After rekeying IKE_SA, iked may spit some warning messages, if the rekey negotiation or delete request was started from both ends at once.