Revision b21f68b4 doc/bird.sgml

View differences:

doc/bird.sgml
1072 1072
			rx buffer [normal|large|<num>];
1073 1073
			type [broadcast|nonbroadcast|pointopoint];
1074 1074
			strict nonbroadcast <switch>;
1075
			authentication [none|simple];
1075
			authentication [none|simple|cryptographics];
1076 1076
			password "<text>";
1077
			passwords {
1078
				password "<text>" {
1079
					id <num>;
1080
					generate from "<date>";
1081
					generate to "<date>";
1082
					accept from "<date>";
1083
					accept to "<date>";
1084
				};
1077
			password "<text>" {
1078
				id <num>;
1079
				generate from "<date>";
1080
				generate to "<date>";
1081
				accept from "<date>";
1082
				accept to "<date>";
1085 1083
			};
1086 1084
			neighbors {
1087 1085
				<ip>;
......
1210 1208
	 very weak.
1211 1209

  
1212 1210
	<tag>authentication cryptographic</tag>
1213
	 16-byte long md5 digest is appended to every packet. For the digest
1211
	 16-byte long MD5 digest is appended to every packet. For the digest
1214 1212
         generation 16-byte long passwords are used. Those passwords are 
1215 1213
         not sent via network, so this mechanismus is quite secure.
1216 1214
         Packets can still be read by an attacker.
......
1220 1218

  
1221 1219
	<tag>id <M>num</M></tag>
1222 1220
	 ID of the password, (0-255). If it's not used, BIRD will choose
1223
	 some automatically.
1221
	 ID based on an order of the password item in the interface. For
1222
	 example, second password item in one interface will have default
1223
	 ID 2.  
1224 1224

  
1225 1225
	<tag>generate from <M>date</M></tag>
1226 1226
	 The start time of the usage of the password for packet signing.
......
1439 1439
URL="http://www.ietf.org/html.charters/rip-charter.html" name="http://www.ietf.org/html.charters/rip-charter.html">. Both IPv4  
1440 1440
(RFC 1723<htmlurl url="ftp://ftp.rfc-editor.org/in-notes/rfc1723.txt">)
1441 1441
and IPv6 (RFC 2080<htmlurl url="ftp://ftp.rfc-editor.org/in-notes/rfc2080.txt">) versions of RIP are supported by BIRD, historical RIPv1 (RFC 1058<htmlurl url="ftp://ftp.rfc-editor.org/in-notes/rfc1058.txt">)is
1442
not currently supported. RIPv4 md5 authentication (RFC 2082<htmlurl url="ftp://ftp.rfc-editor.org/in-notes/rfc2082.txt">) is supported.
1442
not currently supported. RIPv4 MD5 authentication (RFC 2082<htmlurl url="ftp://ftp.rfc-editor.org/in-notes/rfc2082.txt">) is supported.
1443 1443

  
1444 1444
<p>RIP is a very simple protocol, and it has a lot of shortcomings. Slow
1445 1445
convergence, big network load and inability to handle larger networks
......
1454 1454
<descrip>
1455 1455
	<tag/authentication none|plaintext|md5/ selects authentication method to be used. <cf/none/ means that
1456 1456
	  packets are not authenticated at all, <cf/plaintext/ means that a plaintext password is embedded
1457
	  into each packet, and <cf/md5/ means that packets are authenticated using a md5 cryptographic
1457
	  into each packet, and <cf/md5/ means that packets are authenticated using a MD5 cryptographic
1458 1458
	  hash. If you set authentication to not-none, it is a good idea to add <cf>passwords { }</cf>
1459 1459
	  section. Default: none.
1460 1460

  

Also available in: Unified diff