Annotation of embedaddon/strongswan/conf/options/charon.opt, revision 1.1

1.1     ! misho       1: charon {}
        !             2:        Options for the charon IKE daemon.
        !             3: 
        !             4:        Options for the charon IKE daemon.
        !             5: 
        !             6:        **Note**: Many of the options in this section also apply to **charon-cmd**
        !             7:        and other **charon** derivatives.  Just use their respective name (e.g.
        !             8:        **charon-cmd** instead of **charon**). For many options defaults can be
        !             9:        defined in the **libstrongswan** section.
        !            10: 
        !            11: charon.accept_private_algs = no
        !            12:        Deliberately violate the IKE standard's requirement and allow the use of
        !            13:        private algorithm identifiers, even if the peer implementation is unknown.
        !            14: 
        !            15: charon.accept_unencrypted_mainmode_messages = no
        !            16:        Accept unencrypted ID and HASH payloads in IKEv1 Main Mode.
        !            17: 
        !            18:        Accept unencrypted ID and HASH payloads in IKEv1 Main Mode.
        !            19: 
        !            20:        Some implementations send the third Main Mode message unencrypted, probably
        !            21:        to find the PSKs for the specified ID for authentication. This is very
        !            22:        similar to Aggressive Mode, and has the same security implications: A
        !            23:        passive attacker can sniff the negotiated Identity, and start brute forcing
        !            24:        the PSK using the HASH payload.
        !            25: 
        !            26:        It is recommended to keep this option to no, unless you know exactly
        !            27:        what the implications are and require compatibility to such devices (for
        !            28:        example, some SonicWall boxes).
        !            29: 
        !            30: charon.block_threshold = 5
        !            31:        Maximum number of half-open IKE_SAs for a single peer IP.
        !            32: 
        !            33: charon.cert_cache = yes
        !            34:        Whether relations in validated certificate chains should be cached in
        !            35:        memory.
        !            36: 
        !            37: charon.cache_crls = no
        !            38:        Whether Certificate Revocation Lists (CRLs) fetched via HTTP or LDAP should
        !            39:        be saved under a unique file name derived from the public key of the
        !            40:        Certification Authority (CA) to **/etc/ipsec.d/crls** (stroke) or
        !            41:        **/etc/swanctl/x509crl** (vici), respectively.
        !            42: 
        !            43: charon.cisco_unity = no
        !            44:        Send Cisco Unity vendor ID payload (IKEv1 only).
        !            45: 
        !            46: charon.close_ike_on_child_failure = no
        !            47:        Close the IKE_SA if setup of the CHILD_SA along with IKE_AUTH failed.
        !            48: 
        !            49: charon.cookie_threshold = 10
        !            50:        Number of half-open IKE_SAs that activate the cookie mechanism.
        !            51: 
        !            52: charon.crypto_test.bench = no
        !            53:        Benchmark crypto algorithms and order them by efficiency.
        !            54: 
        !            55: charon.crypto_test.bench_size = 1024
        !            56:        Buffer size used for crypto benchmark.
        !            57: 
        !            58: charon.crypto_test.bench_time = 50
        !            59:        Time in ms during which crypto algorithm performance is measured.
        !            60: 
        !            61: charon.crypto_test.on_add = no
        !            62:        Test crypto algorithms during registration (requires test vectors provided
        !            63:        by the _test-vectors_ plugin).
        !            64: 
        !            65: charon.crypto_test.on_create = no
        !            66:        Test crypto algorithms on each crypto primitive instantiation.
        !            67: 
        !            68: charon.crypto_test.required = no
        !            69:        Strictly require at least one test vector to enable an algorithm.
        !            70: 
        !            71: charon.crypto_test.rng_true = no
        !            72:        Whether to test RNG with TRUE quality; requires a lot of entropy.
        !            73: 
        !            74: charon.delete_rekeyed = no
        !            75:        Delete CHILD_SAs right after they got successfully rekeyed (IKEv1 only).
        !            76: 
        !            77:        Delete CHILD_SAs right after they got successfully rekeyed (IKEv1 only).
        !            78:        Reduces the number of stale CHILD_SAs in scenarios with a lot of rekeyings.
        !            79:        However, this might cause problems with implementations that continue to
        !            80:        use rekeyed SAs until they expire.
        !            81: 
        !            82: charon.delete_rekeyed_delay = 5
        !            83:        Delay in seconds until inbound IPsec SAs are deleted after rekeyings (IKEv2
        !            84:        only).
        !            85: 
        !            86:        Delay in seconds until inbound IPsec SAs are deleted after rekeyings (IKEv2
        !            87:        only). To process delayed packets the inbound part of a CHILD_SA is kept
        !            88:        installed up to the configured number of seconds after it got replaced
        !            89:        during a rekeying. If set to 0 the CHILD_SA will be kept installed until it
        !            90:        expires (if no lifetime is set it will be destroyed immediately).
        !            91: 
        !            92: charon.dh_exponent_ansi_x9_42 = yes
        !            93:        Use ANSI X9.42 DH exponent size or optimum size matched to cryptographic
        !            94:        strength.
        !            95: 
        !            96: charon.dlopen_use_rtld_now = no
        !            97:        Use RTLD_NOW with dlopen when loading plugins and IMV/IMCs to reveal missing
        !            98:        symbols immediately.
        !            99: 
        !           100: charon.dns1
        !           101:        DNS server assigned to peer via configuration payload (CP).
        !           102: 
        !           103: charon.dns2
        !           104:        DNS server assigned to peer via configuration payload (CP).
        !           105: 
        !           106: charon.dos_protection = yes
        !           107:        Enable Denial of Service protection using cookies and aggressiveness checks.
        !           108: 
        !           109: charon.ecp_x_coordinate_only = yes
        !           110:        Compliance with the errata for RFC 4753.
        !           111: 
        !           112: charon.flush_auth_cfg = no
        !           113:        Free objects during authentication (might conflict with plugins).
        !           114: 
        !           115:        If enabled objects used during authentication (certificates, identities
        !           116:        etc.) are released to free memory once an IKE_SA is established. Enabling
        !           117:        this might conflict with plugins that later need access to e.g. the used
        !           118:        certificates.
        !           119: 
        !           120: charon.follow_redirects = yes
        !           121:        Whether to follow IKEv2 redirects (RFC 5685).
        !           122: 
        !           123: charon.fragment_size = 1280
        !           124:        Maximum size (complete IP datagram size in bytes) of a sent IKE fragment
        !           125:        when using proprietary IKEv1 or standardized IKEv2 fragmentation, defaults
        !           126:        to 1280 (use 0 for address family specific default values, which uses a
        !           127:        lower value for IPv4).  If specified this limit is used for both IPv4 and
        !           128:        IPv6.
        !           129: 
        !           130: charon.group
        !           131:        Name of the group the daemon changes to after startup.
        !           132: 
        !           133: charon.half_open_timeout = 30
        !           134:        Timeout in seconds for connecting IKE_SAs (also see IKE_SA_INIT DROPPING).
        !           135: 
        !           136: charon.hash_and_url = no
        !           137:        Enable hash and URL support.
        !           138: 
        !           139: charon.host_resolver.max_threads = 3
        !           140:        Maximum number of concurrent resolver threads (they are terminated if
        !           141:        unused).
        !           142: 
        !           143: charon.host_resolver.min_threads = 0
        !           144:        Minimum number of resolver threads to keep around.
        !           145: 
        !           146: charon.i_dont_care_about_security_and_use_aggressive_mode_psk = no
        !           147:        Allow IKEv1 Aggressive Mode with pre-shared keys as responder.
        !           148: 
        !           149:        If enabled responders are allowed to use IKEv1 Aggressive Mode with
        !           150:        pre-shared keys, which is discouraged due to security concerns (offline
        !           151:        attacks on the openly transmitted hash of the PSK).
        !           152: 
        !           153: charon.ignore_routing_tables
        !           154:        A space-separated list of routing tables to be excluded from route lookups.
        !           155: 
        !           156: charon.ignore_acquire_ts = no
        !           157:        Whether to ignore the traffic selectors from the kernel's acquire events for
        !           158:        IKEv2 connections (they are not used for IKEv1).
        !           159: 
        !           160:        If this is disabled the traffic selectors from the kernel's acquire events,
        !           161:        which are derived from the triggering packet, are prepended to the traffic
        !           162:        selectors from the configuration for IKEv2 connection. By enabling this,
        !           163:        such specific traffic selectors will be ignored and only the ones in the
        !           164:        config will     be sent. This always happens for IKEv1 connections as the
        !           165:        protocol only supports one set of traffic selectors per CHILD_SA.
        !           166: 
        !           167: charon.ikesa_limit = 0
        !           168:        Maximum number of IKE_SAs that can be established at the same time before
        !           169:        new connection attempts are blocked.
        !           170: 
        !           171: charon.ikesa_table_segments = 1
        !           172:        Number of exclusively locked segments in the hash table.
        !           173: 
        !           174: charon.ikesa_table_size = 1
        !           175:        Size of the IKE_SA hash table.
        !           176: 
        !           177: charon.inactivity_close_ike = no
        !           178:        Whether to close IKE_SA if the only CHILD_SA closed due to inactivity.
        !           179: 
        !           180: charon.init_limit_half_open = 0
        !           181:        Limit new connections based on the current number of half open IKE_SAs, see
        !           182:        IKE_SA_INIT DROPPING in **strongswan.conf**(5).
        !           183: 
        !           184: charon.init_limit_job_load = 0
        !           185:        Limit new connections based on the number of queued jobs.
        !           186: 
        !           187:        Limit new connections based on the number of jobs currently queued for
        !           188:        processing (see IKE_SA_INIT DROPPING).
        !           189: 
        !           190: charon.initiator_only = no
        !           191:        Causes charon daemon to ignore IKE initiation requests.
        !           192: 
        !           193: charon.install_routes = yes
        !           194:        Install routes into a separate routing table for established IPsec tunnels.
        !           195: 
        !           196: charon.install_virtual_ip = yes
        !           197:        Install virtual IP addresses.
        !           198: 
        !           199: charon.install_virtual_ip_on
        !           200:        The name of the interface on which virtual IP addresses should be installed.
        !           201: 
        !           202:        The name of the interface on which virtual IP addresses should be installed.
        !           203:        If not specified the addresses will be installed on the outbound interface.
        !           204: 
        !           205: charon.integrity_test = no
        !           206:        Check daemon, libstrongswan and plugin integrity at startup.
        !           207: 
        !           208: charon.interfaces_ignore
        !           209:        A comma-separated list of network interfaces that should be ignored, if
        !           210:        **interfaces_use** is specified this option has no effect.
        !           211: 
        !           212: charon.interfaces_use
        !           213:        A comma-separated list of network interfaces that should be used by charon.
        !           214:        All other interfaces are ignored.
        !           215: 
        !           216: charon.keep_alive = 20s
        !           217:        NAT keep alive interval.
        !           218: 
        !           219: charon.leak_detective.detailed = yes
        !           220:        Includes source file names and line numbers in leak detective output.
        !           221: 
        !           222: charon.leak_detective.usage_threshold = 10240
        !           223:        Threshold in bytes for leaks to be reported (0 to report all).
        !           224: 
        !           225: charon.leak_detective.usage_threshold_count = 0
        !           226:        Threshold in number of allocations for leaks to be reported (0 to report
        !           227:        all).
        !           228: 
        !           229: charon.load
        !           230:        Plugins to load in the IKE daemon charon.
        !           231: 
        !           232: charon.load_modular = no
        !           233:        Determine plugins to load via each plugin's load option.
        !           234: 
        !           235:        If enabled, the list of plugins to load is determined via the value of the
        !           236:        _charon.plugins.<name>.load_ options.  In addition to a simple boolean flag
        !           237:        that option may take an integer value indicating the priority of a plugin,
        !           238:        which would influence the order of a plugin in the plugin list (the default
        !           239:        is 1). If two plugins have the same priority their order in the default
        !           240:        plugin list is preserved. Enabled plugins not found in that list are ordered
        !           241:        alphabetically before other plugins with the same priority.
        !           242: 
        !           243: charon.max_ikev1_exchanges = 3
        !           244:        Maximum number of IKEv1 phase 2 exchanges per IKE_SA to keep state about and
        !           245:        track concurrently.
        !           246: 
        !           247: charon.max_packet = 10000
        !           248:        Maximum packet size accepted by charon.
        !           249: 
        !           250: charon.make_before_break = no
        !           251:        Initiate IKEv2 reauthentication with a make-before-break scheme.
        !           252: 
        !           253:        Initiate IKEv2 reauthentication with a make-before-break instead of a
        !           254:        break-before-make scheme. Make-before-break uses overlapping IKE and
        !           255:        CHILD_SA during reauthentication by first recreating all new SAs before
        !           256:        deleting the old ones. This behavior can be beneficial to avoid connectivity
        !           257:        gaps during reauthentication, but requires support for overlapping SAs by
        !           258:        the peer. strongSwan can handle such overlapping SAs since version 5.3.0.
        !           259: 
        !           260: charon.multiple_authentication = yes
        !           261:        Enable multiple authentication exchanges (RFC 4739).
        !           262: 
        !           263: charon.nbns1
        !           264:        WINS servers assigned to peer via configuration payload (CP).
        !           265: 
        !           266: charon.nbns2
        !           267:        WINS servers assigned to peer via configuration payload (CP).
        !           268: 
        !           269: charon.port = 500
        !           270:        UDP port used locally. If set to 0 a random port will be allocated.
        !           271: 
        !           272: charon.port_nat_t = 4500
        !           273:        UDP port used locally in case of NAT-T. If set to 0 a random port will be
        !           274:        allocated.  Has to be different from **charon.port**, otherwise a random
        !           275:        port will be allocated.
        !           276: 
        !           277: charon.prefer_best_path = no
        !           278:        Whether to prefer updating SAs to the path with the best route.
        !           279: 
        !           280:        By default, charon keeps SAs on the routing path with addresses it
        !           281:        previously used if that path is still usable. By setting this option to
        !           282:        yes, it tries more aggressively to update SAs with MOBIKE on routing
        !           283:        priority changes using the cheapest path. This adds more noise, but allows
        !           284:        to dynamically adapt SAs to routing priority changes. This option has no
        !           285:        effect if MOBIKE is not supported or disabled.
        !           286: 
        !           287: charon.prefer_configured_proposals = yes
        !           288:        Prefer locally configured proposals for IKE/IPsec over supplied ones as
        !           289:        responder (disabling this can avoid keying retries due to INVALID_KE_PAYLOAD
        !           290:        notifies).
        !           291: 
        !           292: charon.prefer_temporary_addrs = no
        !           293:        Controls whether permanent or temporary IPv6 addresses are used as source,
        !           294:        or announced as additional addresses if MOBIKE is used.
        !           295: 
        !           296:        By default, permanent IPv6 source addresses are preferred over temporary
        !           297:        ones (RFC 4941), to make connections more stable. Enable this option to
        !           298:        reverse this.
        !           299: 
        !           300:        It also affects which IPv6 addresses are announced as additional addresses
        !           301:        if MOBIKE is used.  If the option is disabled, only permanent addresses are
        !           302:        sent, and only temporary ones if it is enabled.
        !           303: 
        !           304: charon.process_route = yes
        !           305:        Process RTM_NEWROUTE and RTM_DELROUTE events.
        !           306: 
        !           307: charon.processor.priority_threads {}
        !           308:        Section to configure the number of reserved threads per priority class
        !           309:        see JOB PRIORITY MANAGEMENT in **strongswan.conf**(5).
        !           310: 
        !           311: charon.rdn_matching = strict
        !           312:        How RDNs in subject DNs of certificates are matched against configured
        !           313:        identities (_strict_, _reordered_, or _relaxed_).
        !           314: 
        !           315:        How RDNs in subject DNs of certificates are matched against configured
        !           316:        identities. Possible values are _strict_ (the default), _reordered_, and
        !           317:        _relaxed_. With _strict_ the number, type and order of all RDNs has to
        !           318:        match, wildcards (*) for the values of RDNs are allowed (that's the case
        !           319:        for all three variants). Using _reordered_ also matches DNs if the RDNs
        !           320:        appear in a different order, the number and type still has to match.
        !           321:        Finally, _relaxed_ also allows matches of DNs that contain more RDNs than
        !           322:        the configured identity (missing RDNs are treated like a wildcard match).
        !           323: 
        !           324:        Note that _reordered_ and _relaxed_ impose a considerable overhead on memory
        !           325:        usage and runtime, in particular, for mismatches, compared to _strict_.
        !           326: 
        !           327: charon.receive_delay = 0
        !           328:        Delay in ms for receiving packets, to simulate larger RTT.
        !           329: 
        !           330: charon.receive_delay_response = yes
        !           331:        Delay response messages.
        !           332: 
        !           333: charon.receive_delay_request = yes
        !           334:        Delay request messages.
        !           335: 
        !           336: charon.receive_delay_type = 0
        !           337:        Specific IKEv2 message type to delay, 0 for any.
        !           338: 
        !           339: charon.replay_window = 32
        !           340:        Size of the AH/ESP replay window, in packets.
        !           341: 
        !           342: charon.retransmit_base = 1.8
        !           343:        Base to use for calculating exponential back off, see IKEv2 RETRANSMISSION
        !           344:        in **strongswan.conf**(5).
        !           345: 
        !           346: charon.retransmit_timeout = 4.0
        !           347:        Timeout in seconds before sending first retransmit.
        !           348: 
        !           349: charon.retransmit_tries = 5
        !           350:        Number of times to retransmit a packet before giving up.
        !           351: 
        !           352: charon.retransmit_jitter = 0
        !           353:        Maximum jitter in percent to apply randomly to calculated retransmission
        !           354:        timeout (0 to disable).
        !           355: 
        !           356: charon.retransmit_limit = 0
        !           357:        Upper limit in seconds for calculated retransmission timeout (0 to disable).
        !           358: 
        !           359: charon.retry_initiate_interval = 0
        !           360:        Interval in seconds to use when retrying to initiate an IKE_SA (e.g. if DNS
        !           361:        resolution failed), 0 to disable retries.
        !           362: 
        !           363: charon.reuse_ikesa = yes
        !           364:        Initiate CHILD_SA within existing IKE_SAs (always enabled for IKEv1).
        !           365: 
        !           366: charon.routing_table
        !           367:        Numerical routing table to install routes to.
        !           368: 
        !           369: charon.routing_table_prio
        !           370:        Priority of the routing table.
        !           371: 
        !           372: charon.rsa_pss = no
        !           373:        Whether to use RSA with PSS padding instead of PKCS#1 padding by default.
        !           374: 
        !           375: charon.send_delay = 0
        !           376:        Delay in ms for sending packets, to simulate larger RTT.
        !           377: 
        !           378: charon.send_delay_response = yes
        !           379:        Delay response messages.
        !           380: 
        !           381: charon.send_delay_request = yes
        !           382:        Delay request messages.
        !           383: 
        !           384: charon.send_delay_type = 0
        !           385:        Specific IKEv2 message type to delay, 0 for any.
        !           386: 
        !           387: charon.send_vendor_id = no
        !           388:        Send strongSwan vendor ID payload
        !           389: 
        !           390: charon.signature_authentication = yes
        !           391:        Whether to enable Signature Authentication as per RFC 7427.
        !           392: 
        !           393: charon.signature_authentication_constraints = yes
        !           394:        Whether to enable constraints against IKEv2 signature schemes.
        !           395: 
        !           396:        If enabled, signature schemes configured in _rightauth_, in addition to
        !           397:        getting used as constraints against signature schemes employed in the
        !           398:        certificate chain, are also used as constraints against the signature scheme
        !           399:        used by peers during IKEv2.
        !           400: 
        !           401: charon.spi_label = 0x0000000000000000
        !           402:        Value mixed into the local IKE SPIs after applying _spi_mask_.
        !           403: 
        !           404: charon.spi_mask = 0x0000000000000000
        !           405:        Mask applied to local IKE SPIs before mixing in _spi_label_ (bits set will
        !           406:        be replaced with _spi_label_).
        !           407: 
        !           408: charon.spi_min = 0xc0000000
        !           409:        The lower limit for SPIs requested from the kernel for IPsec SAs.
        !           410: 
        !           411:        The lower limit for SPIs requested from the kernel for IPsec SAs. Should not
        !           412:        be set lower than 0x00000100 (256), as SPIs between 1 and 255 are reserved
        !           413:        by IANA.
        !           414: 
        !           415: charon.spi_max = 0xcfffffff
        !           416:        The upper limit for SPIs requested from the kernel for IPsec SAs.
        !           417: 
        !           418: charon.start-scripts {}
        !           419:        Section containing a list of scripts (name = path) that are executed when
        !           420:        the daemon is started.
        !           421: 
        !           422: charon.stop-scripts {}
        !           423:        Section containing a list of scripts (name = path) that are executed when
        !           424:        the daemon is terminated.
        !           425: 
        !           426: charon.threads = 16
        !           427:        Number of worker threads in charon.
        !           428: 
        !           429:        Number of worker threads in charon. Several of these are reserved for long
        !           430:        running tasks in internal modules and plugins. Therefore, make sure you
        !           431:        don't set this value too low. The number of idle worker threads listed in
        !           432:        _ipsec statusall_ might be used as indicator on the number of reserved
        !           433:        threads.
        !           434: 
        !           435: charon.tls.cipher
        !           436:        List of TLS encryption ciphers.
        !           437: 
        !           438: charon.tls.key_exchange
        !           439:        List of TLS key exchange methods.
        !           440: 
        !           441: charon.tls.mac
        !           442:        List of TLS MAC algorithms.
        !           443: 
        !           444: charon.tls.suites
        !           445:        List of TLS cipher suites.
        !           446: 
        !           447: charon.user
        !           448:        Name of the user the daemon changes to after startup.
        !           449: 
        !           450: charon.x509.enforce_critical = yes
        !           451:        Discard certificates with unsupported or unknown critical extensions.

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>