1998
DOI: 10.17487/rfc2367
|View full text |Cite
|
Sign up to set email alerts
|

PF_KEY Key Management API, Version 2

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2002
2002
2009
2009

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(22 citation statements)
references
References 5 publications
0
19
0
Order By: Relevance
“…11) The smart card sends to the Linux box a security policy and some configurations for IPsec and IKE. The IPsec policy management program sets up the IP security policy onto the SPD (Security Policy Database) 17) in the Linux kernel. The preparation of the IP security policy is required to run the IPsec software and the IKE software.…”
Section: Inter-device Authentication Middleware Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…11) The smart card sends to the Linux box a security policy and some configurations for IPsec and IKE. The IPsec policy management program sets up the IP security policy onto the SPD (Security Policy Database) 17) in the Linux kernel. The preparation of the IP security policy is required to run the IPsec software and the IKE software.…”
Section: Inter-device Authentication Middleware Systemmentioning
confidence: 99%
“…After establishing the IKE-SA, the IKEv1 program establishes the IPsec-SA by executing the conventional exchange in phase 2. The IKEv1 pro-gram stores the IPsec-SA parameters onto the SAD (Security Association Database) 17) in the Linux kernel. Finally, the communication channel between the two devices will be protected by IPsec.…”
Section: Inter-device Authentication Middleware Systemmentioning
confidence: 99%
“…The sucvP daemon communicates with the IPsec stack through the PFKEY V2 API [21]. It listens for an SADB ACQUIRE message with the unspecified address as its remote tunnel endpoint, indicating that an OEGW needs to be discovered.…”
Section: Appendix A: Implementationmentioning
confidence: 99%
“…The interface constructs a newly-defined zone message and sends the message to the PF KEYv2 [16] socket. PF KEYv2 is a new socket protocol family used by trusted privileged key management applications (e.g., ML-IKE, PKD and DKM) to communicate with the operating system's key management internals (i.e., FreeS/WAN's Security Association Database (SADB)).…”
Section: Methodsmentioning
confidence: 99%