1 \subsection{014: ways to manipulate tunnel perms.}
3 netfilter, pf\_key, ioctl, $/dev/ipsecNNN$
5 \subsubsection{014: Definition of requirement }
7 This is a variation of the question \#13: how do user applications request
8 security services from the kernel.