Commit Graph

9 Commits

Author SHA1 Message Date
Andrey V. Elsukov
95e8b991ca Add to if_enc(4) ability to capture packets via BPF after pfil processing.
New flag 0x4 can be configured in net.enc.[in|out].ipsec_bpf_mask.
When it is set, if_enc(4) additionally captures a packet via BPF after
invoking pfil hook. This may be useful for debugging.

MFC after:	2 weeks
Sponsored by:	Yandex LLC
Differential Revision:	https://reviews.freebsd.org/D11804
2017-08-09 12:24:07 +00:00
Edward Tomasz Napierala
e81210c1d0 The tcpdump is section 1, not 8.
MFC after:	1 month
Sponsored by:	The FreeBSD Foundation
2016-02-29 17:16:06 +00:00
Joel Dahl
c913de0e06 Put parentheses around a few macros to prevent mdoc warnings. 2010-08-16 21:26:47 +00:00
Bjoern A. Zeeb
45358a0069 Update man page to reflect latest work on enc(4):
- added sysctls to if_enc(4) to control whether the firewalls or
  bpf will see inner and outer headers or just inner headers
  for incoming and outgoing IPsec packets.

- if_enc work with IPv6 now as well.

Reviewed by:	brueffer
2007-11-28 22:35:48 +00:00
Bjoern A. Zeeb
e0c9263157 Remove the last entries to fast_ipsec.
Merge in parts of the old fast_ipsec.4 man page to ipsec.4 and
start updating ipsec.4 man page.

Reviewed by:	brueffer, sam (slightly earlier versions), bmah
Approved by:	re (bmah)
2007-08-02 08:04:48 +00:00
Christian Brueffer
e0ca5a930d Correct references to tcpdump(1).
PR:		108980
Submitted by:	Yonatan
2007-02-09 20:39:14 +00:00
Ruslan Ermilov
ae91966b64 Revise markup. 2006-09-30 15:14:49 +00:00
Christian Brueffer
904887e254 - Convert to our new SYNOPSIS style
- Correct tcpdump reference
2006-06-27 12:48:15 +00:00
Andrew Thompson
bdea400f3b Add a pseudo interface for packet filtering IPSec connections before or after
encryption. There are two functions, a bpf tap which has a basic header with
the SPI number which our current tcpdump knows how to display, and handoff to
pfil(9) for packet filtering.

Obtained from:	OpenBSD
Based on:	kern/94829
No objections:	arch, net
MFC after:	1 month
2006-06-26 22:30:08 +00:00