IPSECESP(4P)                      Protocols                     IPSECESP(4P)
NAME
       ipsecesp, ESP - IPsec Encapsulating Security Payload
SYNOPSIS
       drv/ipsecespDESCRIPTION
       The 
ipsecesp module provides confidentiality, integrity,
       authentication, and partial sequence integrity (replay protection) to       
IP datagrams. The encapsulating security payload (
ESP) encapsulates
       its data, enabling it to protect data that follows in the datagram.
       For 
TCP packets, 
ESP encapsulates the 
TCP header and its data only.
       If the packet is an 
IP in 
IP datagram, 
ESP protects the inner 
IP       datagram.  Per-socket policy allows "self-encapsulation" so 
ESP can
       encapsulate 
IP options when necessary. See 
ipsec(4P).
       Unlike the authentication header (
AH), 
ESP allows multiple varieties
       of datagram protection. (Using a single datagram protection form can
       expose vulnerabilities.) For example, only 
ESP can be used to provide
       confidentiality. But protecting confidentiality alone exposes
       vulnerabilities in both replay attacks and cut-and-paste attacks.
       Similarly, if 
ESP protects only integrity and does not fully protect
       against eavesdropping, it may provide weaker protection than 
AH. See       
ipsecah(4P).
   ESP Device
       ESP is implemented as a module that is auto-pushed on top of 
IP.  Use
       the 
/dev/ipsecesp entry to tune 
ESP with 
ndd(8).
   Algorithms
       ESPuses encryption and authentication algorithms. Authentication
       algorithms include HMAC-MD5 and HMAC-SHA-1. Encryption algorithms
       include DES, Triple-DES, Blowfish and AES. Each authentication and
       encryption algorithm contain key size and key format properties. You
       can obtain a list of authentication and encryption algorithms and
       their properties by using the 
ipsecalgs(8) command. You can also use
       the functions described in the 
getipsecalgbyname(3NSL) man page to
       retrieve the properties of algorithms. Because of export laws in the
       United States, not all encryption algorithms are available outside of
       the United States.
   Security Considerations
       ESP without authentication exposes vulnerabilities to cut-and-paste
       cryptographic attacks as well as eavesdropping attacks. Like AH, 
ESP       is vulnerable to eavesdropping when used without confidentiality.
ATTRIBUTES
       See 
attributes(7) for descriptions of the following attributes:
       +--------------------+-----------------+
       |  ATTRIBUTE TYPE    | ATTRIBUTE VALUE |
       |Interface Stability | Evolving        |
       +--------------------+-----------------+
SEE ALSO
       getipsecalgbyname(3NSL), 
ip(4P), 
ipsec(4P), 
ipsecah(4P),       
attributes(7), 
ipsecalgs(8), 
ipsecconf(8), 
ndd(8)       Kent, S. and Atkinson, R. 
RFC 2406, IP Encapsulating Security Payload       (ESP), The Internet Society, 1998.
                                May 18, 2003                    IPSECESP(4P)