To IPsec Manual Tester Execution Page * To IPsec IKE Tester Execution Page

IP Security Interoperability Tester:
PlutoPlus Usage




PlutoPlus Command Syntax:

plutoplus [-a auth_alg] [-b output_level] [-d dest_addr] [-e enc_alg] [-g gateway_addr] [-k enc_key_len] [-p port_num] [-v enc_iv_len] [-fhirst3]

PlutoPlus Command Line Options:

(1) Options set through test case selection:

Option Explanation Permissible Values PlutoPlus
Default Value
-a auth_alg if no -e option: negotiate an AH association with the specified authentication algorithm
with -e option: negotiate an ESP association with the specified authentication algorithm (and the encryption algorithm specified by -e)
-a 2 ==> HMAC_MD5
-a 3 ==> HMAC_SHA
NONE (without -a, PlutoPlus negotiates an ESP association)
-e enc_alg if no -a option: negotiate an ESP association with the specified encryption algorithm
with -a option: negotiate an ESP association with the specified encryption algorithm (and the authentication algorithm specified by -a)
-e 1 ==> ESP_DES_IV64
-e 2 ==> ESP_DES
-e 3 ==> ESP_3DES
-e 4 ==> ESP_RC5
-e 5 ==> ESP_IDEA
-e 7 ==> ESP_BLOWFISH
-e 11 ==> ESP_NULL
if no -a option:
ESP:DES/HMAC_MD5

with -a option:
NONE
-g gateway_addr Gateway address for tunnel mode Valid Internet address N/A
-i Act as Initiator of key negotiation N/A Act as Responder
-k enc_key_len ESP encryption key length in bytes (BLOWFISH and RC5 ONLY) RC5: 5, 16, 20 bytes
BLOWFISH:
WIT Test Case Values:
5, 16, 20, 56 bytes
PlutoPlus Values: 5-56 bytes
16 bytes
-t Tunnel mode N/A Transport mode
-v enc_iv_len ESP encryption IV length (DES, 3DES, RC5, IDEA, and BLOWFISH only) 0 or 8 bytes ESP_NULL: 0 bytes
Others: 8 bytes

(2) Options set through configuration variables:

Option Explanation Permissible Values PlutoPlus
Default Value
-b output_level print additional DEBUG output -b 1 ==> print verbose debug output
(NOT USED BY WIT)
-b 2 ==> print packets/packet headers
-b 4 ==> print various IKE calculated values
no additional output
-f Conduct an extra Diffie-Hellman Exchange during negotiation to ensure Perfect Forward Secrecy (PFS) for KEYS N/A no PFS
-p port_num PlutoPlus port number 500, 7000+ 500
-s Use HMAC_SHA (instead of HMAC_MD5) for authentication in Main Mode N/A HMAC_MD5
-3 Use 3DES_CBC (instead of DES_CBC) for encryption in Main Mode N/A DES_CBC

(3) Option REQUIRED by WIT (set at LOGIN time):

Option Explanation Permissible Values PlutoPlus
Default Value
-d dest_addr transport mode:
peer WITH whom PlutoPlus is negotiating association
tunnel mode:
peer FOR whom PlutoPlus is negotiating association
Valid Internet address N/A

(4) Options NOT used by WIT:

Option Explanation Permissible Values PlutoPlus
Default Value
-h help (prints Usage message, then exits) N/A N/A
-r turn OFF replay protection N/A replay protection ON

To IPsec Manual Tester Execution Page * To IPsec IKE Tester Execution Page



Comments to sheila.frankel@.nist.gov
Last Modified: