Hostname/Network/Node ID. Enter the name of the host or nomadic system, or the IP address of the host or network.
Netmask--(network only) Enter the netmask of the network. The default (255.255.255.0) is already entered.
Secure button--(SKIP only) Set to either Whole packet (tunnel mode) or Data only (transport mode). Whole packet is recommended because it offers a greater degree of security.
Node ID--(SKIP Version 1 only) This is the IPv4 key ID.
Tunnel Address--Use the tunnel address as the destination IP address. Tunnel address is generally used for clients of encrypted gateways where the IP address of the host entered here serves as the intermediary for any or all hosts on a network whose topography must remain unknown or hidden from the rest of the world. This is called topology hiding. This field is not available if you select Data only.
Remote Key ID button--(SKIP only) Select whether you want the remote system's key ID included in SKIP packets and, if so, the namespace that key ID occupies. Selecting Not Present means that the receiver key ID will not be sent.
The following name spaces are listed in this menu:
Not Present
IPv4 Address
MD5 (DH Public Value)
Not Present is the default. It uses the IP address of the remote system to identify its certificate. If a remote system has a key ID other than that identified by its IP address, set the namespace and indicate the remote system's key ID in the ID field.
When you add a host by entering the hostname and you change the Remote key Id menu to IPV4 address from Not present the cursor does not appear in the ID field even if you click there. You must click on the Local key Id menu to move the cursor and regain focus.
Remote Key ID field--(SKIP only) The namespace indicated in the Remote Key ID field is determined by the type of certificate, shown in the following table, that you are using or have obtained for this system:
Table 3-1 Remote Key ID Field
Certificate Type |
Remote Key ID Field |
CA (Sun or other) |
IPv4 |
Self-generated unsigned key |
MD5 (DH Public Value) |
If the Remote Key ID field has been set to other than Not Present, enter the key ID in hexadecimal format in the ID field (such as 0x0a000000). It must contain the appropriate key ID for the system being authorized based upon the selection made with the Remote Key ID button. Depending on the type of certificate, this information may be obtained from the master key ID on the diskette or from the local key ID field of the other host.
Local Key ID and ID buttons. Use the Local Key ID button to indicate whether you want your local system to send its key ID in the SKIP packet and, if so, the namespace that key occupies. If you select Not Present, the sender's key ID is not sent in the packet and the remote system uses the local system's IP address to decide what key to use.
If you have installed new local keys after you have started skiptool, skiptool will not list them. You must restart the key manager with the skipd_restart command to list them and rerun skiptool.
All the local-key times installed for this host are listed. Select the namespace for the local key that is to be used for communication with the above host. Once you have selected the namespace, click on the ID field to select the key to be used, in hexadecimal, for communication with this host.
Key Encryption button--Selecting this button lists the available key encryption algorithms. The algorithms available are determined by the system type and the selected encryption method selected.
Table 3-2 Available Key and Traffic Encryption Algorithms
|
512 bit |
1024 bit |
2048 and 4096 bit |
Key Encryption |
DES-CBC |
DES-CBC |
DES-CBC |
|
RC2-40 (32-bit mode only) |
RC2-40 (32-bit mode only) |
RC2-40 (32-bit mode only) |
|
|
|
3DES |
|
|
|
SAFER |
|
|
|
|
Traffic Encryption |
RC2-40 (32-bit mode only) |
RC2-40 (32-bit mode only) |
RC2-40 (32-bit mode only) |
|
RC4-40 |
RC4-40 |
RC4-40 |
|
|
3DES |
3DES |
|
|
|
SAFER |
|
|
|
RC4-128 |
The RC2 cryptor is supported in 32-bit mode only. If you inadvertently select this cryptor while in 64-bit mode, the console reports an error message and communication with the system using this cryptor stops (no information is transferred in the clear).
Traffic Encryption button--Select the algorithm for encrypting the traffic between your system and the remote system. The algorithms available are determined by the system type, the version of SunScreen SKIP, and the method of encryption selected. Please see the previous table for complete information.
Authentication button--Use the authentication button to select the type of authentication for the packets. Currently, SunScreen SKIP supports two types of authentication--MD5 and MD5-NAT. You can also select None for no authentication.
While using any of the Add functions of skiptool, if you generate an error msg, clicking the apply button will not close the window. You must close the Add window manually. The normal behavior is for the window to close automatically after you click the apply button.
Click and hold on the Add button at the bottom of the authorized systems list on skiptool's Main Window.
Select the type of connection being authorized: Host, Network, or Nomadic.
Pull right on the type of connection and select the type of encryption that you want to use.
If the remote host system also uses SKIP and the traffic between your systems is to be encrypted, select SKIP.
For systems using Sun Microsystems' SunScreen SPF-100, select SKIP Version 1.
On the Add properties window, enter the name or IP address of the host system to be added to your ACL.
Determine whether Whole packet (tunnel mode) or Data only (transport mode) is secure by clicking on the appropriate selection for the Secure button.
Each type of encryption requires that certain options be set.
The parameters selected are determined by the type of system being authorized and your security policies. The options to be considered are based on the method of encryption selected. They are
For systems using SKIP: Tunnel address, Remote Key ID, Local Key ID. If you leave the tunnel address blank, it will default to the peer's address.
For SKIP Version 1: Key ID, Tunnel address.
Select the appropriate algorithms buttons for Key encryption, Traffic encryption, and Authentication.
The options available for each system are based upon the method of encryption selected from the Security pop-up menu:
Key Encryption button: Selecting this button lists the available key encryption algorithms. The algorithm available is determined by the type of system and selected method of encryption. Please Table 3-2.
Traffic Encryption button: Selecting this button lists the algorithms available for encryption between your system and the remote system. The algorithms that are available for key and traffic encryption depend on the packages that were installed on the system, such as core product and key upgrades. The algorithms available determine the type of system and the method of encryption selected. Please see Table 3-2.
Authentication button: Use this button to select the type of authentication for the packets.
Click Apply to add the host to the authorized systems list.
Refer to the previous section for descriptions of the fields and buttons.
Repeat Steps 1 though 8 for all encrypted hosts. Remember that your policy options for each system entered on your ACL must be the same as those entered on the system entity with which you wish to communicate through encrypted channels. If the configuration on your system does not match that of the party with which you wish to communicate, the packets are silently dropped. It will simply appear as though that host no longer exists.