e3320f40ba20e6851e73a3237eedf089700bf001markfen<?xml version="1.0"?>
e3320f40ba20e6851e73a3237eedf089700bf001markfen<!DOCTYPE service_bundle SYSTEM "/usr/share/lib/xml/dtd/service_bundle.dtd.1">
e3320f40ba20e6851e73a3237eedf089700bf001markfen<!--
5033e0ced6ec7e35c5a686f180e3fa66088b9394Mark Fenwick Copyright 2009 Sun Microsystems, Inc. All rights reserved.
e3320f40ba20e6851e73a3237eedf089700bf001markfen Use is subject to license terms.
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen CDDL HEADER START
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen The contents of this file are subject to the terms of the
e3320f40ba20e6851e73a3237eedf089700bf001markfen Common Development and Distribution License (the "License").
e3320f40ba20e6851e73a3237eedf089700bf001markfen You may not use this file except in compliance with the License.
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
e3320f40ba20e6851e73a3237eedf089700bf001markfen or http://www.opensolaris.org/os/licensing.
e3320f40ba20e6851e73a3237eedf089700bf001markfen See the License for the specific language governing permissions
e3320f40ba20e6851e73a3237eedf089700bf001markfen and limitations under the License.
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen When distributing Covered Code, include this CDDL HEADER in each
e3320f40ba20e6851e73a3237eedf089700bf001markfen file and include the License file at usr/src/OPENSOLARIS.LICENSE.
e3320f40ba20e6851e73a3237eedf089700bf001markfen If applicable, add the following below this CDDL HEADER, with the
e3320f40ba20e6851e73a3237eedf089700bf001markfen fields enclosed by brackets "[]" replaced with your own identifying
e3320f40ba20e6851e73a3237eedf089700bf001markfen information: Portions Copyright [yyyy] [name of copyright owner]
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen CDDL HEADER END
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen NOTE: This service manifest is not editable; its contents will
e3320f40ba20e6851e73a3237eedf089700bf001markfen be overwritten by package or patch operations, including
e3320f40ba20e6851e73a3237eedf089700bf001markfen operating system upgrade. Make customizations in a different
e3320f40ba20e6851e73a3237eedf089700bf001markfen file.
e3320f40ba20e6851e73a3237eedf089700bf001markfen-->
e3320f40ba20e6851e73a3237eedf089700bf001markfen<service_bundle type='manifest' name='SUNWcsr:policy'>
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen<service
e3320f40ba20e6851e73a3237eedf089700bf001markfen name='network/ipsec/policy'
e3320f40ba20e6851e73a3237eedf089700bf001markfen type='service'
e3320f40ba20e6851e73a3237eedf089700bf001markfen version='1'>
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen <!-- The 'policy' service is delivered enabled for backwards
e3320f40ba20e6851e73a3237eedf089700bf001markfen compatability with existing adminstrative proceedure. -->
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen <create_default_instance enabled='true' />
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen <single_instance />
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen <!-- Read/Write access to /var/run required for lock files -->
e3320f40ba20e6851e73a3237eedf089700bf001markfen <dependency
e3320f40ba20e6851e73a3237eedf089700bf001markfen name='filesystem'
e3320f40ba20e6851e73a3237eedf089700bf001markfen grouping='require_all'
e3320f40ba20e6851e73a3237eedf089700bf001markfen restart_on='none'
e3320f40ba20e6851e73a3237eedf089700bf001markfen type='service'>
e3320f40ba20e6851e73a3237eedf089700bf001markfen <service_fmri
e3320f40ba20e6851e73a3237eedf089700bf001markfen value='svc:/system/filesystem/minimal'
e3320f40ba20e6851e73a3237eedf089700bf001markfen />
e3320f40ba20e6851e73a3237eedf089700bf001markfen </dependency>
e3320f40ba20e6851e73a3237eedf089700bf001markfen <!-- Kernel needs to know supported IPsec algorithms -->
e3320f40ba20e6851e73a3237eedf089700bf001markfen <dependency
e3320f40ba20e6851e73a3237eedf089700bf001markfen name='algorithms'
e3320f40ba20e6851e73a3237eedf089700bf001markfen grouping='require_all'
e3320f40ba20e6851e73a3237eedf089700bf001markfen restart_on='none'
e3320f40ba20e6851e73a3237eedf089700bf001markfen type='service'>
e3320f40ba20e6851e73a3237eedf089700bf001markfen <service_fmri
e3320f40ba20e6851e73a3237eedf089700bf001markfen value='svc:/network/ipsec/ipsecalgs'
e3320f40ba20e6851e73a3237eedf089700bf001markfen />
e3320f40ba20e6851e73a3237eedf089700bf001markfen </dependency>
e3320f40ba20e6851e73a3237eedf089700bf001markfen <!-- General networking services should not start untill IPsec
e3320f40ba20e6851e73a3237eedf089700bf001markfen policy has been configured. -->
e3320f40ba20e6851e73a3237eedf089700bf001markfen <dependent
e3320f40ba20e6851e73a3237eedf089700bf001markfen name='policy-network'
e3320f40ba20e6851e73a3237eedf089700bf001markfen grouping='optional_all'
e3320f40ba20e6851e73a3237eedf089700bf001markfen restart_on='none'>
e3320f40ba20e6851e73a3237eedf089700bf001markfen <service_fmri
e3320f40ba20e6851e73a3237eedf089700bf001markfen value='svc:/milestone/network'
e3320f40ba20e6851e73a3237eedf089700bf001markfen />
e3320f40ba20e6851e73a3237eedf089700bf001markfen </dependent>
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen <exec_method
e3320f40ba20e6851e73a3237eedf089700bf001markfen type='method'
e3320f40ba20e6851e73a3237eedf089700bf001markfen name='start'
e3320f40ba20e6851e73a3237eedf089700bf001markfen exec='/usr/sbin/ipsecconf -q -a %{config/config_file}'
e3320f40ba20e6851e73a3237eedf089700bf001markfen timeout_seconds='60'
e3320f40ba20e6851e73a3237eedf089700bf001markfen />
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen <exec_method
e3320f40ba20e6851e73a3237eedf089700bf001markfen type='method'
e3320f40ba20e6851e73a3237eedf089700bf001markfen name='refresh'
5033e0ced6ec7e35c5a686f180e3fa66088b9394Mark Fenwick exec='/usr/sbin/ipsecconf -q -F -a %{config/config_file}'
e3320f40ba20e6851e73a3237eedf089700bf001markfen timeout_seconds='60'
e3320f40ba20e6851e73a3237eedf089700bf001markfen />
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen <exec_method
e3320f40ba20e6851e73a3237eedf089700bf001markfen type='method'
e3320f40ba20e6851e73a3237eedf089700bf001markfen name='stop'
e3320f40ba20e6851e73a3237eedf089700bf001markfen exec='/usr/sbin/ipsecconf -F'
e3320f40ba20e6851e73a3237eedf089700bf001markfen timeout_seconds='60'
e3320f40ba20e6851e73a3237eedf089700bf001markfen />
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen <property_group name='general' type='framework'>
e3320f40ba20e6851e73a3237eedf089700bf001markfen <!-- A user with this authorization can:
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen svcadm restart policy
e3320f40ba20e6851e73a3237eedf089700bf001markfen svcadm refresh policy
e3320f40ba20e6851e73a3237eedf089700bf001markfen svcadm mark <state> policy
e3320f40ba20e6851e73a3237eedf089700bf001markfen svcadm clear policy
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen see auths(1) and user_attr(4)-->
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen <propval
e3320f40ba20e6851e73a3237eedf089700bf001markfen name='action_authorization'
e3320f40ba20e6851e73a3237eedf089700bf001markfen type='astring'
e3320f40ba20e6851e73a3237eedf089700bf001markfen value='solaris.smf.manage.ipsec'
e3320f40ba20e6851e73a3237eedf089700bf001markfen />
e3320f40ba20e6851e73a3237eedf089700bf001markfen <!-- A user with this authorization can:
e3320f40ba20e6851e73a3237eedf089700bf001markfen svcadm disable policy
e3320f40ba20e6851e73a3237eedf089700bf001markfen svcadm enable policy
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen see auths(1) and user_attr(4)-->
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen <propval
e3320f40ba20e6851e73a3237eedf089700bf001markfen name='value_authorization'
e3320f40ba20e6851e73a3237eedf089700bf001markfen type='astring'
e3320f40ba20e6851e73a3237eedf089700bf001markfen value='solaris.smf.manage.ipsec'
e3320f40ba20e6851e73a3237eedf089700bf001markfen />
e3320f40ba20e6851e73a3237eedf089700bf001markfen </property_group>
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen <!-- The properties defined below can be changed by a user
e3320f40ba20e6851e73a3237eedf089700bf001markfen with 'solaris.smf.value.ipsec' authorization using the
e3320f40ba20e6851e73a3237eedf089700bf001markfen svccfg(1M) command.
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen EG:
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen svccfg -s ipsec/policy setprop config/config_file = /new/config_file
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen The new configurations will be read on service refresh:
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen svcadm refresh ipsec/policy
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen Note: svcadm stop/start does not use the new property
e3320f40ba20e6851e73a3237eedf089700bf001markfen until after the service has been refreshed.
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen ***Dont edit this manifest to change these properties! -->
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen <property_group name='config' type='application'>
e3320f40ba20e6851e73a3237eedf089700bf001markfen <propval
e3320f40ba20e6851e73a3237eedf089700bf001markfen name='config_file'
e3320f40ba20e6851e73a3237eedf089700bf001markfen type='astring'
e3320f40ba20e6851e73a3237eedf089700bf001markfen value='/etc/inet/ipsecinit.conf'
e3320f40ba20e6851e73a3237eedf089700bf001markfen />
e3320f40ba20e6851e73a3237eedf089700bf001markfen <propval
e3320f40ba20e6851e73a3237eedf089700bf001markfen name='value_authorization'
e3320f40ba20e6851e73a3237eedf089700bf001markfen type='astring'
e3320f40ba20e6851e73a3237eedf089700bf001markfen value='solaris.smf.value.ipsec'
e3320f40ba20e6851e73a3237eedf089700bf001markfen />
e3320f40ba20e6851e73a3237eedf089700bf001markfen </property_group>
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen <property_group name='startd' type='framework'>
e3320f40ba20e6851e73a3237eedf089700bf001markfen <propval
e3320f40ba20e6851e73a3237eedf089700bf001markfen name='duration'
e3320f40ba20e6851e73a3237eedf089700bf001markfen type='astring'
e3320f40ba20e6851e73a3237eedf089700bf001markfen value='transient'
e3320f40ba20e6851e73a3237eedf089700bf001markfen />
e3320f40ba20e6851e73a3237eedf089700bf001markfen </property_group>
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen <stability value='Unstable' />
e3320f40ba20e6851e73a3237eedf089700bf001markfen
e3320f40ba20e6851e73a3237eedf089700bf001markfen <template>
e3320f40ba20e6851e73a3237eedf089700bf001markfen <common_name>
e3320f40ba20e6851e73a3237eedf089700bf001markfen <loctext xml:lang='C'>
e3320f40ba20e6851e73a3237eedf089700bf001markfen IPsec policy initialization
e3320f40ba20e6851e73a3237eedf089700bf001markfen </loctext>
e3320f40ba20e6851e73a3237eedf089700bf001markfen </common_name>
e3320f40ba20e6851e73a3237eedf089700bf001markfen <description>
e3320f40ba20e6851e73a3237eedf089700bf001markfen <loctext xml:lang='C'>
e3320f40ba20e6851e73a3237eedf089700bf001markfen IPsec policy configuration involves
e3320f40ba20e6851e73a3237eedf089700bf001markfen loading rules into the kernel Security
e3320f40ba20e6851e73a3237eedf089700bf001markfen Policy Database (SPD)
e3320f40ba20e6851e73a3237eedf089700bf001markfen </loctext>
e3320f40ba20e6851e73a3237eedf089700bf001markfen </description>
e3320f40ba20e6851e73a3237eedf089700bf001markfen <documentation>
e3320f40ba20e6851e73a3237eedf089700bf001markfen <manpage title='ipsecconf' section='1M'
e3320f40ba20e6851e73a3237eedf089700bf001markfen manpath='/usr/share/man' />
e3320f40ba20e6851e73a3237eedf089700bf001markfen </documentation>
e3320f40ba20e6851e73a3237eedf089700bf001markfen </template>
e3320f40ba20e6851e73a3237eedf089700bf001markfen</service>
e3320f40ba20e6851e73a3237eedf089700bf001markfen</service_bundle>