RACOON(8) | System Manager's Manual | RACOON(8) |
racoon
— IKE
(ISAKMP/Oakley) key management daemon
racoon |
[-46BdFLv ]
[-f configfile]
[-l logfile] |
racoon
is used to setup and maintain an
IPSec tunnel or transport channel, between two devices, over which network
traffic is conveyed securely. This security is made possible by
cryptographic keys and operations on both devices.
racoon
relies on a standardized network protocol
(IKE) to automatically negotiate and manage the cryptographic keys (e.g.
security associations) that are necessary for the IPSec tunnel or transport
channel to function. racoon
speaks the IKE
(ISAKMP/Oakley) key management protocol, to establish security associations
with other hosts. The SPD (Security Policy Database) in the kernel usually
triggers racoon
. racoon
usually sends all informational messages, warnings and error messages to
syslogd(8) with the facility
LOG_DAEMON
and the priority
LOG_INFO
. Debugging messages are sent with the
priority LOG_DEBUG
. You should configure
syslog.conf(5) appropriately to see these messages.
-4
-6
-B
-d
-d
arguments
will increase the debug level even more.-F
racoon
in the foreground.-f
configfile-L
-l
logfile-v
racoon
assumes the presence of the kernel
random number device rnd(4) at
/dev/urandom.
The command exits with 0 on success, and non-zero on errors.
ipsec(4), racoon.conf(5), syslog.conf(5), setkey(8), syslogd(8)
The racoon
command first appeared in the
“YIPS” Yokogawa IPsec implementation.
The use of IKE phase 1 aggressive mode is not recommended, as described in http://www.kb.cert.org/vuls/id/886601.
November 20, 2000 | Mac OS X 12 |