John Baldwin e6dede1456 setkey(8): Clarify language around AEAD ciphers.
AEAD ciphers for IPsec combine both encryption and authentication.  As
such, ESP configurations using an AEAD cipher should not use a
seperate authentication algorithm via -A.  However, this was not
apparent from the setkey manpage and 12.x and earlier did not perform
sufficient argument validation permitting users to pair an explicit -A
such as SHA256-HMAC with AES-GCM.  (The result was a non-standard
combination of AES-CTR with the specified MAC, but with the wrong
initial block counter (and thus different keystream) compared to using
AES-CTR as the cipher.)

Attempt to clarify this in the manpage by explicitly calling out AEAD
ciphers (currently only AES-GCM) and noting that AEAD ciphers should
not use -A.

While here, explicitly note which authentication algorithms can be
used with esp vs esp-old.  Also add subsection headings for the
different algorithm lists and tidy some language.

I did not convert the tables to column lists (Bl -column) though that
would probably be more correct than using literal blocks (Bd
-literal).

PR:		263379
Reviewed by:	Pau Amma <pauamma@gundo.com>, markj
Differential Revision:	https://reviews.freebsd.org/D34947
2022-04-27 12:23:18 -07:00
..
2022-01-12 13:52:23 +08:00
2022-04-20 17:57:42 -06:00
2021-02-11 06:03:53 +01:00
2021-12-07 11:40:22 +01:00
2022-01-08 12:45:46 +02:00
2022-02-05 08:19:56 +00:00
2021-09-11 20:04:52 +08:00
2022-04-09 15:59:43 +00:00
2020-10-09 14:03:45 +00:00
2020-11-26 04:29:30 +00:00
2022-03-20 11:30:43 -07:00