You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/docs/userguide/use_IPsec_in_Kmesh_cluster.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ IPsec is a mature and widely used encryption method for inter-node communication
17
17
18
18
### How to enable IPsec in Kmesh
19
19
20
-
**Step 1: Generate an IPsec pre-shared key for Kmesh before starting Kmesh. Currently, only the rfc4106 (gcm(AES)) algorithm is supported. The key must be 36 bytes (32 bytes for the algorithm key and 4 bytes for the salt), provided as a 72-character hexadecimal string.**
20
+
#### Step 1: Generate an IPsec pre-shared key for Kmesh before starting Kmesh. Currently, only the rfc4106 (gcm(AES)) algorithm is supported. The key must be 36 bytes (32 bytes for the algorithm key and 4 bytes for the salt), provided as a 72-character hexadecimal string
21
21
22
22
```bash
23
23
kmeshctl secret --key=<aead key>
@@ -35,27 +35,27 @@ If you want to use a custom key, you can use the following command
**Step 4: Test whether the data packet has been encrypted**
58
+
#### Step 4: Test whether the data packet has been encrypted
59
59
60
60
Use tcpdump on nodes to capture packets and check if IPsec has been used during data communication between nodes (determined by ESP packets)
61
61
@@ -69,7 +69,7 @@ tcpdump -i any |grep ESP
69
69
...
70
70
```
71
71
72
-
**Step 5: Replace pre shared key**
72
+
#### Step 5: Replace pre shared key
73
73
74
74
After a period of time, the pre-shared key of the cluster can be changed. After changing the pre-shared key, the ESP SPI number of the IPsec used for communication between nodes will be increased by 1 compared to the previous version. This can be observed again through using tcpdump. The initial IPSec SPI version number is 1
75
75
@@ -85,6 +85,6 @@ root@master:~/kmesh# tcpdump -i any |grep ESP
85
85
86
86
### Note
87
87
88
-
1. IPsec encryption uses mark `0xe0` and `0xd0` as markers for IPsec encryption and decryption. Please ensure that no conflicting Makr is used on the host network, otherwise unknown behavior may occur
88
+
1. IPsec encryption uses mark `0xe0` and `0xd0` as markers for IPsec encryption and decryption. Please ensure that no conflicting Mark is used on the host network, otherwise unknown behavior may occur
89
89
90
90
2. Please ensure that `address MASQ` is not used on packets encrypted with IPsec. After address MASQ, IPsec cannot accurately match encryption and decryption rules, which can result in packet loss
0 commit comments