q ISAKMP/Oakley key management protocol, to establish security associations with other hosts. The SPD
q Security Policy Database in the kernel usually triggers .Nm . .Nm usually sends all informational messages, warnings and error messages to .Xr syslogd 8 with the facility .Dv LOG_DAEMON and the priority .Dv LOG_INFO . Debugging messages are sent with the priority .Dv LOG_DEBUG . You should configure .Xr syslog.conf 5 appropriately to see these messages. l -tag -width Ds t Fl 4 t Fl 6 Specify the default address family for the sockets. t Fl B Install SA(s) from the file which is specified in .Xr racoon.conf 5 . t Fl d Increase the debug level. Multiple .Fl d arguments will increase the debug level even more. t Fl F Run .Nm in the foreground. t Fl f Ar configfile Use .Ar configfile as the configuration file instead of the default. t Fl L Include .Ar file_name:line_number:function_name in all messages. t Fl l Ar logfile Use .Ar logfile as the logging file instead of .Xr syslogd 8 . t Fl P Ar isakmp-natt-port Use .Ar isakmp-natt-port for NAT-Traversal port-floating. The default is 4500. t Fl p Ar isakmp-port Listen to the ISAKMP key exchange on port .Ar isakmp-port instead of the default port number, 500. t Fl v This flag causes the packet dump be more verbose, with higher debugging level. .El
p .Nm assumes the presence of the kernel random number device .Xr rnd 4 at
a /dev/urandom .
.Sh RETURN VALUES
The command exits with 0 on success, and non-zero on errors.
.Sh FILES
l -tag -width /etc/racoon.conf -compact t Pa /etc/racoon.conf default configuration file.
.El
.Sh SEE ALSO
.Xr ipsec 4 ,
.Xr racoon.conf 5 ,
.Xr syslog.conf 5 ,
.Xr setkey 8 ,
.Xr syslogd 8
.Sh HISTORY
The
.Nm
command first appeared in the
.Dq YIPS
Yokogawa IPsec implementation.
.Sh SECURITY CONSIDERATIONS
The use of IKE phase 1 aggressive mode is not recommended,
as described in
a http://www.kb.cert.org/vuls/id/886601 .