From owner-freebsd-security Wed Feb 14 20:52:29 2001 Delivered-To: freebsd-security@freebsd.org Received: from mine.kame.net (kame195.kame.net [203.178.141.195]) by hub.freebsd.org (Postfix) with ESMTP id 5EB3937B401 for ; Wed, 14 Feb 2001 20:52:26 -0800 (PST) Received: from localhost ([3ffe:501:4819:1000:260:1dff:fe1e:f7d4]) by mine.kame.net (8.9.3+3.2W/3.7W) with ESMTP id OAA32309; Thu, 15 Feb 2001 14:02:55 +0900 (JST) To: samwun@yahoo.com Cc: freebsd-security@FreeBSD.ORG Subject: Re: log message for ipsec/vpn connection? In-Reply-To: Your message of "Wed, 14 Feb 2001 14:11:22 +1100" <3A89F75A.21FFEFA5@yahoo.com> References: <3A89F75A.21FFEFA5@yahoo.com> X-Mailer: Cue version 0.6 (010125-0306/sakane) Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Message-Id: <20010215135447C.sakane@ydc.co.jp> Date: Thu, 15 Feb 2001 13:54:47 +0900 From: "Shoichi 'Ne' Sakane" X-Dispatcher: imput version 990905(IM130) Lines: 10 Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org > I would like to write a script utility to monitor the ipsec connection, just like > watching the msg generated by ipmon in the syslog. How this can be done? Could you explain me what the ipsec connection is in detail ? If you use the key exchange daemon, racoon(8), you can find logs in the log file of racoon. If you use the static keying, setkey(8), you can see the message between the kernel and setkey by using setkey with -x option. # sektey -x To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message