Provided by: ion_3.2.1+dfsg-1.1_amd64 bug

NAME

       ionsecrc - ION security policy management commands file

DESCRIPTION

       ION security policy management commands are passed to ionsecadmin either in a file of text lines or
       interactively at ionsecadmin's command prompt (:).  Commands are interpreted line-by line, with exactly
       one command per line.  The formats and effects of the ION security policy management commands are
       described below.

       A parameter identifed as an eid_expr is an "endpoint ID expression."  For all commands, whenever the last
       character of an endpoint ID expression is the wild-card character '*', an applicable endpoint ID
       "matches" this EID expression if all characters of the endpoint ID expression prior to the last one are
       equal to the corresponding characters of that endpoint ID.  Otherwise an applicable endpoint ID "matches"
       the EID expression only when all characters of the EID and EID expression are identical.

       ION's security policy management encompasses both BP security and LTP authentication.

COMMANDS

       ?   The  help command.  This will display a listing of the commands and their formats.  It is the same as
           the h command.

       #   Comment line.  Lines beginning with # are not interpreted.

       e { 1 | 0 }
           Echo control.  Setting echo to 1 causes all output printed by ionsecadmin to be  logged  as  well  as
           sent to stdout.  Setting echo to 0 disables this behavior.

       v   Version  number.   Prints out the version of ION currently installed.  HINT: combine with e 1 command
           to log the version number at startup.

       1   The initialize command.  Until this command is executed, the local ION node has  no  security  policy
           database and most ionsecadmin commands will fail.

       a key key_name file_name
           The  add  key  command.   This  command  adds a named key value to the security policy database.  The
           content of file_name is taken as the value of the  key.   Named  keys  can  be  referenced  by  other
           elements of the security policy database.

       c key key_name file_name
           The change key command.  This command changes the value of the named key, obtaining the new key value
           from the content of file_name.

       d key key_name
           The delete key command.  This command deletes the key identified by name.

       i key key_name
           This command will print information about the named key, i.e., the length of its current value.

       l key
           This command lists all keys in the security policy database.

       a bspbabrule sender_eid_expr receiver_eid_expr { '' | ciphersuite_name key_name }
           The  add  bspbabrule  command.   This  command  adds  a  rule  specifying  the manner in which Bundle
           Authentication Block (BAB) validation will be applied  to  all  bundles  sent  from  any  node  whose
           endpoints'   IDs  match  sender_eid_expr  and  received  at  any  node  whose  endpoints'  IDs  match
           receiver_eid_expr.   Both  sender_eid_expr  and  receiver_eid_expr  should  terminate  in   wild-card
           characters,  because  both  the  security source and security destination of a BAB are actually nodes
           rather than individual endpoints.

           If a zero-length string ('') is indicated instead  of  a  ciphersuite_name  then  BAB  validation  is
           disabled  for  this  sender/receiver  EID  expression pair: all bundles sent from nodes with matching
           administrative endpoint IDs to nodes with matching administrative endpoint IDs  will  be  immediately
           deemed authentic.  Otherwise, a bundle from a node with matching administrative endpoint ID to a node
           with  matching administrative endpoint ID will only be deemed authentic if it contains a BAB computed
           via the ciphersuite named by ciphersuite_name using a key value that  is  identical  to  the  current
           value of the key named key_name in the local security policy database.

           NOTE:  if  the  security  policy  database  contains  no BAB rules at all, then BAB authentication is
           disabled; all bundles received from all neighboring nodes are considered authentic.   Otherwise,  BAB
           rules  must be defined for all nodes from which bundles are to be received; all bundles received from
           any node for which no BAB rule is defined are considered inauthentic and are discarded.

       c bspbabrule sender_eid_expr receiver_eid_expr { '' | ciphersuite_name key_name }
           The change bspbabrule command.  This command changes the ciphersuite name and/or key name for the BAB
           rule pertaining to  the  sender/receiver  EID  expression  pair  identified  by  sender_eid_expr  and
           receiver_eid_expr.   Note  that  the  eid_exprs  must  exactly  match those of the rule that is to be
           modified, including any terminating wild-card character.

       d bspbabrule sender_eid_expr receiver_eid_expr
           The delete bspbabrule command.  This command deletes the BAB rule pertaining to  the  sender/receiver
           EID  expression  pair  identified  by sender_eid_expr and receiver_eid_expr.  Note that the eid_exprs
           must exactly match those of the rule that is to  be  deleted,  including  any  terminating  wild-card
           character.

       i bspbabrule sender_eid_expr receiver_eid_expr
           This  command will print information (the ciphersuite and key names) about the BAB rule pertaining to
           sender_eid_expr and receiver_eid_expr.

       l bspbabrule
           This command lists all BAB rules in the security policy database.

       a bsppibrule sender_eid_expr receiver_eid_expr block type number { '' | ciphersuite_name key_name }
           The add bsppibrule command.  This command  adds  a  rule  specifying  the  manner  in  which  Payload
           Integrity  Block  (PIB)  validation  will  be  applied  to  all  bundles  sent  from  any  node whose
           administrative endpoint ID matches sender_eid_expr and received  at  any  node  whose  administrative
           endpoint ID ID matches receiver_eid_expr.

           If  a  zero-length  string  ('')  is  indicated  instead of a ciphersuite_name then PIB validation is
           disabled for this sender/receiver EID expression pair: all bundles  sent  from  nodes  with  matching
           administrative  endpoint  IDs  to nodes with matching administrative endpoint IDs will be immediately
           deemed valid.  Otherwise, a bundle from a node with matching administrative endpoint  ID  to  a  node
           with  matching administrative endpoint ID will only be deemed valid if it contains a PIB computed via
           the ciphersuite named by ciphersuite_name using a key value that is identical to the current value of
           the key named key_name in the local security policy database.

       c bsppibrule sender_eid_expr receiver_eid_expr block type number { '' | ciphersuite_name key_name }
           The change bsppibrule command.  This command changes the ciphersuite name and/or key name for the PIB
           rule pertaining to  the  sender/receiver  EID  expression  pair  identified  by  sender_eid_expr  and
           receiver_eid_expr.   Note  that  the  eid_exprs  must  exactly  match those of the rule that is to be
           modified, including any terminating wild-card character.

       d bsppibrule sender_eid_expr receiver_eid_expr block type number
           The delete bsppibrule command.  This command deletes the PIB rule pertaining to  the  sender/receiver
           EID  expression  pair  identified  by sender_eid_expr and receiver_eid_expr.  Note that the eid_exprs
           must exactly match those of the rule that is to  be  deleted,  including  any  terminating  wild-card
           character.

       i bsppibrule sender_eid_expr receiver_eid_expr block type number
           This  command will print information (the ciphersuite and key names) about the PIB rule pertaining to
           sender_eid_expr and receiver_eid_expr.

       l bsppibrule
           This command lists all PIB rules in the security policy database.

       a ltprecvauthrule ltp_engine_id ciphersuite_nbr [key_name]
           The add ltprecvauthrule command.  This command adds a rule specifying the manner in which LTP segment
           authentication will be applied to LTP segments received from the indicated LTP engine.

           A segment  from  the  indicated  LTP  engine  will  only  be  deemed  authentic  if  it  contains  an
           authentication  extension  computed  via  the  ciphersuite  identified  by  ciphersuite_nbr using the
           applicable key value.  If ciphersuite_nbr is 255 then  the  applicable  key  value  is  a  hard-coded
           constant and key_name must be omitted; otherwise key_name is required and the applicable key value is
           the current value of the key named key_name in the local security policy database.

           Valid values of ciphersuite_nbr are:

               0: HMAC-SHA1-80 1: RSA-SHA256 255: NULL

       c ltprecvauthrule ltp_engine_id ciphersuite_nbr [key_name]
           The  change  ltprecvauthrule  command.   This  command  changes  the  parameters  of  the LTP segment
           authentication rule for the indicated LTP engine.

       d ltprecvauthrule ltp_engine_id
           The delete ltprecvauthrule command.  This command deletes the LTP segment authentication rule for the
           indicated LTP engine.

       i ltprecvauthrule ltp_engine_id
           This command will print information (the LTP engine id, ciphersuite number, and key name)  about  the
           LTP segment authentication rule for the indicated LTP engine.

       l ltprecvauthrule
           This command lists all LTP segment authentication rules in the security policy database.

       a ltpxmitauthrule ltp_engine_id ciphersuite_nbr [key_name]
           The  add  ltpxmitauthrule  command.   This  command  adds  a  rule specifying the manner in which LTP
           segments transmitted to the indicated LTP engine must be signed.

           Signing a segment destined for the indicated LTP engine entails computing an authentication extension
           via the ciphersuite identified by ciphersuite_nbr using the applicable key value.  If ciphersuite_nbr
           is 255 then the applicable key value is a hard-coded constant and key_name must be omitted; otherwise
           key_name is required and the applicable key value is the current value of the key named  key_name  in
           the local security policy database.

           Valid values of ciphersuite_nbr are:

               0: HMAC_SHA1-80 1: RSA_SHA256 255: NULL

       c ltpxmitauthrule ltp_engine_id ciphersuite_nbr [key_name]
           The  change  ltpxmitauthrule command.  This command changes the parameters of the LTP segment signing
           rule for the indicated LTP engine.

       d ltpxmitauthrule ltp_engine_id
           The delete ltpxmitauthrule command.  This command deletes  the  LTP  segment  signing  rule  for  the
           indicated LTP engine.

       i ltpxmitauthrule ltp_engine_id
           This  command  will print information (the LTP engine id, ciphersuite number, and key name) about the
           LTP segment signing rule for the indicated LTP engine.

       l ltpxmitauthrule
           This command lists all LTP segment signing rules in the security policy database.

       x [ { ~ | sender_eid_expr } [ { ~ | receiver_eid_expr} [ { ~ | bab | pib | pcb | esb } ] ] ]
           This command will clear all rules for the  indicated  type  of  bundle  security  block  between  the
           indicated  security  source  and  security  destination.   If  block type is omitted it defaults to ~
           signifying "all BSP blocks".  If both block type  and  security  destination  are  omitted,  security
           destination  defaults  to  ~  signifying  "all BSP security destinations".  If all three command-line
           parameters are omitted, then security source defaults to ~ signifying "all BSP security sources".

       h   The help command.  This will display a listing of the commands and their formats.  It is the same  as
           the ? command.

EXAMPLES

       a key BABKEY ./babkey.txt
           Adds a new key named "BABKEY" whose value is the content of the file "./babkey.txt".

       a bspbabrule ipn:19.* ipn:11.* HMAC_SHA1 BABKEY
           Adds  a BAB rule requiring that all bundles sent from node number 19 to node number 11 contain Bundle
           Authentication Blocks computed via the HMAC_SHA1 ciphersuite using a key value that is  identical  to
           the current value of the key named "BABKEY" in the local security policy database.

       c bspbabrule ipn:19.* ipn:11.* ''
           Changes  the  BAB  rule  pertaining  to  all bundles sent from node number 19 to node number 11.  BAB
           checking is disabled; these bundles will be automatically deemed authentic.

SEE ALSO

       ionsecadmin(1)

perl v5.24.1                                       2016-07-07                                        IONSECRC(5)