Annotation of embedaddon/strongswan/conf/plugins/kernel-netlink.opt, revision 1.1

1.1     ! misho       1: charon.plugins.kernel-netlink.buflen = <min(PAGE_SIZE, 8192)>
        !             2:        Buffer size for received Netlink messages.
        !             3: 
        !             4: charon.plugins.kernel-netlink.force_receive_buffer_size = no
        !             5:        Force maximum Netlink receive buffer on Netlink socket.
        !             6: 
        !             7:        If the maximum Netlink socket receive buffer in bytes set by
        !             8:        _receive_buffer_size_ exceeds the system-wide maximum from
        !             9:        /proc/sys/net/core/rmem_max, this option can be used to override the limit.
        !            10:        Enabling this option requires special privileges (CAP_NET_ADMIN).
        !            11: 
        !            12: charon.plugins.kernel-netlink.fwmark =
        !            13:        Firewall mark to set on the routing rule that directs traffic to our routing
        !            14:        table.
        !            15: 
        !            16:        Firewall mark to set on the routing rule that directs traffic to our routing
        !            17:        table. The format is [!]mark[/mask], where the optional exclamation mark
        !            18:        inverts the meaning (i.e. the rule only applies to packets that don't match
        !            19:        the mark).
        !            20: 
        !            21: charon.plugins.kernel-netlink.hw_offload_feature_interface = lo
        !            22:        Interface to be used to find hardware offload feature flag on.
        !            23: 
        !            24:        If the kernel supports hardware offloading, the plugin needs to find the
        !            25:        feature flag which represents hardware offloading support for network
        !            26:        devices. Using the loopback device for this purpose is usually fine, since
        !            27:        it should always be present. For rare cases in which the loopback device
        !            28:        cannot be used to obtain the appropriate feature flag, this option can
        !            29:        be used to specify an alternative interface for offload feature detection.
        !            30: 
        !            31: charon.plugins.kernel-netlink.mss = 0
        !            32:        MSS to set on installed routes, 0 to disable.
        !            33: 
        !            34: charon.plugins.kernel-netlink.mtu = 0
        !            35:        MTU to set on installed routes, 0 to disable.
        !            36: 
        !            37: charon.plugins.kernel-netlink.parallel_route = no
        !            38:        Whether to perform concurrent Netlink ROUTE queries on a single socket.
        !            39: 
        !            40:        Whether to perform concurrent Netlink ROUTE queries on a single socket.
        !            41:        While parallel queries can improve throughput, it has more overhead. On
        !            42:        vanilla Linux, DUMP queries fail with EBUSY and must be retried, further
        !            43:        decreasing performance.
        !            44: 
        !            45: charon.plugins.kernel-netlink.parallel_xfrm = no
        !            46:        Whether to perform concurrent Netlink XFRM queries on a single socket.
        !            47: 
        !            48: charon.plugins.kernel-netlink.policy_update = no
        !            49:        Whether to always use XFRM_MSG_UPDPOLICY to install policies.
        !            50: 
        !            51: charon.plugins.kernel-netlink.port_bypass = no
        !            52:        Whether to use port or socket based IKE XFRM bypass policies.
        !            53: 
        !            54:        Whether to use port or socket based IKE XFRM bypass policies.
        !            55:        IKE bypass policies are used to exempt IKE traffic from XFRM processing.
        !            56:        The default socket based policies are directly tied to the IKE UDP sockets,
        !            57:        port based policies use global XFRM bypass policies for the used IKE UDP
        !            58:        ports.
        !            59: 
        !            60: charon.plugins.kernel-netlink.process_rules = no
        !            61:        Whether to process changes in routing rules to trigger roam events.
        !            62: 
        !            63:        Whether to process changes in routing rules to trigger roam events. This is
        !            64:        currently only useful if the kernel based route lookup is used (i.e. if
        !            65:        route installation is disabled or an inverted fwmark match is configured).
        !            66: 
        !            67: charon.plugins.kernel-netlink.receive_buffer_size = 0
        !            68:        Maximum Netlink socket receive buffer in bytes.
        !            69: 
        !            70:        Maximum Netlink socket receive buffer in bytes. This value controls how many
        !            71:        bytes of Netlink messages can be received on a Netlink socket. The default
        !            72:        value is set by /proc/sys/net/core/rmem_default. The specified value cannot
        !            73:        exceed the system-wide maximum from /proc/sys/net/core/rmem_max, unless
        !            74:        _force_receive_buffer_size_     is enabled.
        !            75: 
        !            76: charon.plugins.kernel-netlink.roam_events = yes
        !            77:        Whether to trigger roam events when interfaces, addresses or routes change.
        !            78: 
        !            79: charon.plugins.kernel-netlink.set_proto_port_transport_sa = no
        !            80:        Whether to set protocol and ports in the selector installed on transport
        !            81:        mode IPsec SAs in the kernel.
        !            82: 
        !            83:        Whether to set protocol and ports in the selector installed on transport
        !            84:        mode IPsec SAs in the kernel. While doing so enforces policies for inbound
        !            85:        traffic, it also prevents the use of a single IPsec SA by more than one
        !            86:        traffic selector.
        !            87: 
        !            88: charon.plugins.kernel-netlink.spdh_thresh {}
        !            89:        XFRM policy hashing threshold configuration for IPv4 and IPv6.
        !            90: 
        !            91:        XFRM policy hashing threshold configuration for IPv4 and IPv6.
        !            92: 
        !            93:        The section defines hashing thresholds to configure in the kernel during
        !            94:        daemon startup. Each address family takes a threshold for the local subnet
        !            95:        of an IPsec policy (src in out-policies, dst in in- and forward-policies)
        !            96:        and the remote subnet (dst in out-policies, src in in- and
        !            97:        forward-policies).
        !            98: 
        !            99:        If the subnet has more or equal net bits than the threshold, the first
        !           100:        threshold bits are used to calculate a hash to lookup the policy.
        !           101: 
        !           102:        Policy hashing thresholds are not supported before Linux 3.18 and might
        !           103:        conflict with socket policies before Linux 4.8.
        !           104: 
        !           105: charon.plugins.kernel-netlink.spdh_thresh.ipv4.lbits = 32
        !           106:        Local subnet XFRM policy hashing threshold for IPv4.
        !           107: 
        !           108: charon.plugins.kernel-netlink.spdh_thresh.ipv4.rbits = 32
        !           109:        Remote subnet XFRM policy hashing threshold for IPv4.
        !           110: 
        !           111: charon.plugins.kernel-netlink.spdh_thresh.ipv6.lbits = 128
        !           112:        Local subnet XFRM policy hashing threshold for IPv6.
        !           113: 
        !           114: charon.plugins.kernel-netlink.spdh_thresh.ipv6.rbits = 128
        !           115:        Remote subnet XFRM policy hashing threshold for IPv6.
        !           116: 
        !           117: charon.plugins.kernel-netlink.retries = 0
        !           118:        Number of Netlink message retransmissions to send on timeout.
        !           119: 
        !           120: charon.plugins.kernel-netlink.timeout = 0
        !           121:        Netlink message retransmission timeout, 0 to disable retransmissions.
        !           122: 
        !           123: charon.plugins.kernel-netlink.ignore_retransmit_errors = no
        !           124:        Whether to ignore errors potentially resulting from a retransmission.
        !           125: 
        !           126: charon.plugins.kernel-netlink.xfrm_acq_expires = 165
        !           127:        Lifetime of XFRM acquire state and allocated SPIs in kernel.
        !           128: 
        !           129:        Lifetime of XFRM acquire state created by the kernel when traffic matches a
        !           130:        trap policy. The value gets written to /proc/sys/net/core/xfrm_acq_expires.
        !           131:        Indirectly controls the delay between XFRM acquire messages triggered by the
        !           132:        kernel for a trap policy. The same value is used as timeout for SPIs
        !           133:        allocated by the kernel. The default value equals the total     retransmission
        !           134:        timeout for IKE messages, see IKEv2 RETRANSMISSION in
        !           135:        **strongswan.conf**(5).

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>