Return to charon.conf CVS log | Up to [ELWIX - Embedded LightWeight unIX -] / embedaddon / strongswan / conf / options |
1.1 ! misho 1: # Options for the charon IKE daemon. ! 2: charon { ! 3: ! 4: # Deliberately violate the IKE standard's requirement and allow the use of ! 5: # private algorithm identifiers, even if the peer implementation is unknown. ! 6: # accept_private_algs = no ! 7: ! 8: # Accept unencrypted ID and HASH payloads in IKEv1 Main Mode. ! 9: # accept_unencrypted_mainmode_messages = no ! 10: ! 11: # Maximum number of half-open IKE_SAs for a single peer IP. ! 12: # block_threshold = 5 ! 13: ! 14: # Whether Certificate Revocation Lists (CRLs) fetched via HTTP or LDAP ! 15: # should be saved under a unique file name derived from the public key of ! 16: # the Certification Authority (CA) to /etc/ipsec.d/crls (stroke) or ! 17: # /etc/swanctl/x509crl (vici), respectively. ! 18: # cache_crls = no ! 19: ! 20: # Whether relations in validated certificate chains should be cached in ! 21: # memory. ! 22: # cert_cache = yes ! 23: ! 24: # Send Cisco Unity vendor ID payload (IKEv1 only). ! 25: # cisco_unity = no ! 26: ! 27: # Close the IKE_SA if setup of the CHILD_SA along with IKE_AUTH failed. ! 28: # close_ike_on_child_failure = no ! 29: ! 30: # Number of half-open IKE_SAs that activate the cookie mechanism. ! 31: # cookie_threshold = 10 ! 32: ! 33: # Delete CHILD_SAs right after they got successfully rekeyed (IKEv1 only). ! 34: # delete_rekeyed = no ! 35: ! 36: # Delay in seconds until inbound IPsec SAs are deleted after rekeyings ! 37: # (IKEv2 only). ! 38: # delete_rekeyed_delay = 5 ! 39: ! 40: # Use ANSI X9.42 DH exponent size or optimum size matched to cryptographic ! 41: # strength. ! 42: # dh_exponent_ansi_x9_42 = yes ! 43: ! 44: # Use RTLD_NOW with dlopen when loading plugins and IMV/IMCs to reveal ! 45: # missing symbols immediately. ! 46: # dlopen_use_rtld_now = no ! 47: ! 48: # DNS server assigned to peer via configuration payload (CP). ! 49: # dns1 = ! 50: ! 51: # DNS server assigned to peer via configuration payload (CP). ! 52: # dns2 = ! 53: ! 54: # Enable Denial of Service protection using cookies and aggressiveness ! 55: # checks. ! 56: # dos_protection = yes ! 57: ! 58: # Compliance with the errata for RFC 4753. ! 59: # ecp_x_coordinate_only = yes ! 60: ! 61: # Free objects during authentication (might conflict with plugins). ! 62: # flush_auth_cfg = no ! 63: ! 64: # Whether to follow IKEv2 redirects (RFC 5685). ! 65: # follow_redirects = yes ! 66: ! 67: # Maximum size (complete IP datagram size in bytes) of a sent IKE fragment ! 68: # when using proprietary IKEv1 or standardized IKEv2 fragmentation, defaults ! 69: # to 1280 (use 0 for address family specific default values, which uses a ! 70: # lower value for IPv4). If specified this limit is used for both IPv4 and ! 71: # IPv6. ! 72: # fragment_size = 1280 ! 73: ! 74: # Name of the group the daemon changes to after startup. ! 75: # group = ! 76: ! 77: # Timeout in seconds for connecting IKE_SAs (also see IKE_SA_INIT DROPPING). ! 78: # half_open_timeout = 30 ! 79: ! 80: # Enable hash and URL support. ! 81: # hash_and_url = no ! 82: ! 83: # Allow IKEv1 Aggressive Mode with pre-shared keys as responder. ! 84: # i_dont_care_about_security_and_use_aggressive_mode_psk = no ! 85: ! 86: # Whether to ignore the traffic selectors from the kernel's acquire events ! 87: # for IKEv2 connections (they are not used for IKEv1). ! 88: # ignore_acquire_ts = no ! 89: ! 90: # A space-separated list of routing tables to be excluded from route ! 91: # lookups. ! 92: # ignore_routing_tables = ! 93: ! 94: # Maximum number of IKE_SAs that can be established at the same time before ! 95: # new connection attempts are blocked. ! 96: # ikesa_limit = 0 ! 97: ! 98: # Number of exclusively locked segments in the hash table. ! 99: # ikesa_table_segments = 1 ! 100: ! 101: # Size of the IKE_SA hash table. ! 102: # ikesa_table_size = 1 ! 103: ! 104: # Whether to close IKE_SA if the only CHILD_SA closed due to inactivity. ! 105: # inactivity_close_ike = no ! 106: ! 107: # Limit new connections based on the current number of half open IKE_SAs, ! 108: # see IKE_SA_INIT DROPPING in strongswan.conf(5). ! 109: # init_limit_half_open = 0 ! 110: ! 111: # Limit new connections based on the number of queued jobs. ! 112: # init_limit_job_load = 0 ! 113: ! 114: # Causes charon daemon to ignore IKE initiation requests. ! 115: # initiator_only = no ! 116: ! 117: # Install routes into a separate routing table for established IPsec ! 118: # tunnels. ! 119: # install_routes = yes ! 120: ! 121: # Install virtual IP addresses. ! 122: # install_virtual_ip = yes ! 123: ! 124: # The name of the interface on which virtual IP addresses should be ! 125: # installed. ! 126: # install_virtual_ip_on = ! 127: ! 128: # Check daemon, libstrongswan and plugin integrity at startup. ! 129: # integrity_test = no ! 130: ! 131: # A comma-separated list of network interfaces that should be ignored, if ! 132: # interfaces_use is specified this option has no effect. ! 133: # interfaces_ignore = ! 134: ! 135: # A comma-separated list of network interfaces that should be used by ! 136: # charon. All other interfaces are ignored. ! 137: # interfaces_use = ! 138: ! 139: # NAT keep alive interval. ! 140: # keep_alive = 20s ! 141: ! 142: # Plugins to load in the IKE daemon charon. ! 143: # load = ! 144: ! 145: # Determine plugins to load via each plugin's load option. ! 146: # load_modular = no ! 147: ! 148: # Initiate IKEv2 reauthentication with a make-before-break scheme. ! 149: # make_before_break = no ! 150: ! 151: # Maximum number of IKEv1 phase 2 exchanges per IKE_SA to keep state about ! 152: # and track concurrently. ! 153: # max_ikev1_exchanges = 3 ! 154: ! 155: # Maximum packet size accepted by charon. ! 156: # max_packet = 10000 ! 157: ! 158: # Enable multiple authentication exchanges (RFC 4739). ! 159: # multiple_authentication = yes ! 160: ! 161: # WINS servers assigned to peer via configuration payload (CP). ! 162: # nbns1 = ! 163: ! 164: # WINS servers assigned to peer via configuration payload (CP). ! 165: # nbns2 = ! 166: ! 167: # UDP port used locally. If set to 0 a random port will be allocated. ! 168: # port = 500 ! 169: ! 170: # UDP port used locally in case of NAT-T. If set to 0 a random port will be ! 171: # allocated. Has to be different from charon.port, otherwise a random port ! 172: # will be allocated. ! 173: # port_nat_t = 4500 ! 174: ! 175: # Whether to prefer updating SAs to the path with the best route. ! 176: # prefer_best_path = no ! 177: ! 178: # Prefer locally configured proposals for IKE/IPsec over supplied ones as ! 179: # responder (disabling this can avoid keying retries due to ! 180: # INVALID_KE_PAYLOAD notifies). ! 181: # prefer_configured_proposals = yes ! 182: ! 183: # Controls whether permanent or temporary IPv6 addresses are used as source, ! 184: # or announced as additional addresses if MOBIKE is used. ! 185: # prefer_temporary_addrs = no ! 186: ! 187: # Process RTM_NEWROUTE and RTM_DELROUTE events. ! 188: # process_route = yes ! 189: ! 190: # How RDNs in subject DNs of certificates are matched against configured ! 191: # identities (strict, reordered, or relaxed). ! 192: # rdn_matching = strict ! 193: ! 194: # Delay in ms for receiving packets, to simulate larger RTT. ! 195: # receive_delay = 0 ! 196: ! 197: # Delay request messages. ! 198: # receive_delay_request = yes ! 199: ! 200: # Delay response messages. ! 201: # receive_delay_response = yes ! 202: ! 203: # Specific IKEv2 message type to delay, 0 for any. ! 204: # receive_delay_type = 0 ! 205: ! 206: # Size of the AH/ESP replay window, in packets. ! 207: # replay_window = 32 ! 208: ! 209: # Base to use for calculating exponential back off, see IKEv2 RETRANSMISSION ! 210: # in strongswan.conf(5). ! 211: # retransmit_base = 1.8 ! 212: ! 213: # Maximum jitter in percent to apply randomly to calculated retransmission ! 214: # timeout (0 to disable). ! 215: # retransmit_jitter = 0 ! 216: ! 217: # Upper limit in seconds for calculated retransmission timeout (0 to ! 218: # disable). ! 219: # retransmit_limit = 0 ! 220: ! 221: # Timeout in seconds before sending first retransmit. ! 222: # retransmit_timeout = 4.0 ! 223: ! 224: # Number of times to retransmit a packet before giving up. ! 225: # retransmit_tries = 5 ! 226: ! 227: # Interval in seconds to use when retrying to initiate an IKE_SA (e.g. if ! 228: # DNS resolution failed), 0 to disable retries. ! 229: # retry_initiate_interval = 0 ! 230: ! 231: # Initiate CHILD_SA within existing IKE_SAs (always enabled for IKEv1). ! 232: # reuse_ikesa = yes ! 233: ! 234: # Numerical routing table to install routes to. ! 235: # routing_table = ! 236: ! 237: # Priority of the routing table. ! 238: # routing_table_prio = ! 239: ! 240: # Whether to use RSA with PSS padding instead of PKCS#1 padding by default. ! 241: # rsa_pss = no ! 242: ! 243: # Delay in ms for sending packets, to simulate larger RTT. ! 244: # send_delay = 0 ! 245: ! 246: # Delay request messages. ! 247: # send_delay_request = yes ! 248: ! 249: # Delay response messages. ! 250: # send_delay_response = yes ! 251: ! 252: # Specific IKEv2 message type to delay, 0 for any. ! 253: # send_delay_type = 0 ! 254: ! 255: # Send strongSwan vendor ID payload ! 256: # send_vendor_id = no ! 257: ! 258: # Whether to enable Signature Authentication as per RFC 7427. ! 259: # signature_authentication = yes ! 260: ! 261: # Whether to enable constraints against IKEv2 signature schemes. ! 262: # signature_authentication_constraints = yes ! 263: ! 264: # Value mixed into the local IKE SPIs after applying spi_mask. ! 265: # spi_label = 0x0000000000000000 ! 266: ! 267: # Mask applied to local IKE SPIs before mixing in spi_label (bits set will ! 268: # be replaced with spi_label). ! 269: # spi_mask = 0x0000000000000000 ! 270: ! 271: # The upper limit for SPIs requested from the kernel for IPsec SAs. ! 272: # spi_max = 0xcfffffff ! 273: ! 274: # The lower limit for SPIs requested from the kernel for IPsec SAs. ! 275: # spi_min = 0xc0000000 ! 276: ! 277: # Number of worker threads in charon. ! 278: # threads = 16 ! 279: ! 280: # Name of the user the daemon changes to after startup. ! 281: # user = ! 282: ! 283: crypto_test { ! 284: ! 285: # Benchmark crypto algorithms and order them by efficiency. ! 286: # bench = no ! 287: ! 288: # Buffer size used for crypto benchmark. ! 289: # bench_size = 1024 ! 290: ! 291: # Time in ms during which crypto algorithm performance is measured. ! 292: # bench_time = 50 ! 293: ! 294: # Test crypto algorithms during registration (requires test vectors ! 295: # provided by the test-vectors plugin). ! 296: # on_add = no ! 297: ! 298: # Test crypto algorithms on each crypto primitive instantiation. ! 299: # on_create = no ! 300: ! 301: # Strictly require at least one test vector to enable an algorithm. ! 302: # required = no ! 303: ! 304: # Whether to test RNG with TRUE quality; requires a lot of entropy. ! 305: # rng_true = no ! 306: ! 307: } ! 308: ! 309: host_resolver { ! 310: ! 311: # Maximum number of concurrent resolver threads (they are terminated if ! 312: # unused). ! 313: # max_threads = 3 ! 314: ! 315: # Minimum number of resolver threads to keep around. ! 316: # min_threads = 0 ! 317: ! 318: } ! 319: ! 320: leak_detective { ! 321: ! 322: # Includes source file names and line numbers in leak detective output. ! 323: # detailed = yes ! 324: ! 325: # Threshold in bytes for leaks to be reported (0 to report all). ! 326: # usage_threshold = 10240 ! 327: ! 328: # Threshold in number of allocations for leaks to be reported (0 to ! 329: # report all). ! 330: # usage_threshold_count = 0 ! 331: ! 332: } ! 333: ! 334: processor { ! 335: ! 336: # Section to configure the number of reserved threads per priority class ! 337: # see JOB PRIORITY MANAGEMENT in strongswan.conf(5). ! 338: priority_threads { ! 339: ! 340: } ! 341: ! 342: } ! 343: ! 344: # Section containing a list of scripts (name = path) that are executed when ! 345: # the daemon is started. ! 346: start-scripts { ! 347: ! 348: } ! 349: ! 350: # Section containing a list of scripts (name = path) that are executed when ! 351: # the daemon is terminated. ! 352: stop-scripts { ! 353: ! 354: } ! 355: ! 356: tls { ! 357: ! 358: # List of TLS encryption ciphers. ! 359: # cipher = ! 360: ! 361: # List of TLS key exchange methods. ! 362: # key_exchange = ! 363: ! 364: # List of TLS MAC algorithms. ! 365: # mac = ! 366: ! 367: # List of TLS cipher suites. ! 368: # suites = ! 369: ! 370: } ! 371: ! 372: x509 { ! 373: ! 374: # Discard certificates with unsupported or unknown critical extensions. ! 375: # enforce_critical = yes ! 376: ! 377: } ! 378: ! 379: } ! 380: