blob: be6b4ff9372687935a970e5159eb3029a4a57052 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
|
.TH IPSEC_MAILKEY 8 "21 Feb 2002"
.\" RCSID $Id: mailkey.8,v 1.1 2004/03/15 20:35:28 as Exp $
.SH NAME
ipsec mailkey \- mail DNS records for Opportunistic Encryption
.SH SYNOPSIS
.B ipsec
.B mailkey
\-\-me
my@address.tld
[
.B \-\-reverse
1.2.3.4
] [
.B \-\-forward
hostname.domain.tld
]
.SH DESCRIPTION
.I mailkey
is a meta-program. It generates a script which will attempt to mail the TXT
records required to enable Opportunistic Encryption (OE).
.PP
An e-mail address for the domain's DNS administrator is derived from SOA records.
The mail body and destination address are freely editable in the script.
.PP
If no administrator can be located, the output file will not be executable.
.PP
.TP
\fB\-\-me\fP\ \fImy@address.tld\fP
set the Reply-To: address of the mail to be sent.
.TP
\fB\-\-forward\fP\ \fIhostname.domain.tld\fP
the domain name to be used for initator-only OE.
.TP
\fB\-\-reverse\fP\ \fI1.2.3.4\fP
the IP address to be used for full Opportunistic Encryption.
.PP
Only one of --forward or --reverse may be specified.
.SH FILES
.nf
/etc/ipsec.secrets
.fi
.SH SEE ALSO
ipsec_showhostkey(8), host(8)
.SH HISTORY
Written for the Linux FreeS/WAN project <http://www.freeswan.org> by Sam Sgro.
.SH BUGS
May produce indeterminate results when processing non-routable IPs.
|