exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

skip-install.txt

skip-install.txt
Posted Dec 21, 1999

skip-install.txt

tags | encryption
SHA-256 | 763024339faee173fff45a8437b133c65fecf1cdbf9c0872f70629fa6c139a40

skip-install.txt

Change Mirror Download
Quick-Start Guide
-----------------

This is a quick-start guide for SKIP. It covers installing the SKIP
binaries and setting up IP-level encryption between two hosts.

These instructions assume that only one network interface is active
on your machine.

For complete documentation, please refer to the contents of the
doc directory and the SKIP man pages.


1. Install the binaries:

zcat skip.tar.tar | (cd /usr; tar -xvf -)
sh /usr/skip/install.skip

2. Configure a secret/certificate pair.

If you wish to use certificates from a trusted Certificate Authority,
please see the SKIP Installation and User's Guide for instructions.

Otherwise, generate a secret and dhpublic certificate locally by
issuing the command:

skiplocal keygen

3. Add skip to your network interface

skipif -a

4. Reboot the machine.

5. Enable SKIP and configure IP encryption with one other host:

PATH=$PATH:/usr/skip/bin; export PATH

skiphost -a default # default IP traffic is unencrypted

skiplocal export # prints the skiphost command others need
# to run to talk to us

skiplocal export | mail Friend@remote.host

Friend@remote.host should issue these commands as well. Once the
corresponding mail is received, verify out-of-band (say, over the
telephone) that the received mail matches the mail which was sent.
Then execute the received skiphost command.

skiphost -o on # enable SKIP


Is it working?
--------------

At this point encryption should be enabled with the remote host.
Traffic will be exchanged with all other hosts in the clear.

Ping the other host to make sure things are working:

ping host

View the key manager log file to see if the the certificate
exchange and the shared secret computation succeeded:

tail /var/log/skip.log

If you have tcpdump, etherfind, snoop, or some other packet dumping
utility, you can verify that encrypted packets are using protocol 57.


Examining the Local SKIP Configuration
--------------------------------------

skiphost # list the SKIP access control entries
skiplocal list # list the set of local identities
skipdb list # list the certificates in our database
skipca list # list the Certificate Authorities we trust

SKIP configuration files are stored in the /etc/skip directory.

Nomadic and Network encryption
------------------------------
If you are encrypting to a network through an intermediate SKIP system see
the "Network Encryption" section of the advanced.TOPICS file. If you are
configuring an intermediate system which will talk to hosts with dynamic
IP addresses, See the "Nomadic Support" section of the advanced.TOPICS file.

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close