Annotation of embedaddon/strongswan/conf/plugins/kernel-netlink.opt, revision 1.1
1.1 ! misho 1: charon.plugins.kernel-netlink.buflen = <min(PAGE_SIZE, 8192)>
! 2: Buffer size for received Netlink messages.
! 3:
! 4: charon.plugins.kernel-netlink.force_receive_buffer_size = no
! 5: Force maximum Netlink receive buffer on Netlink socket.
! 6:
! 7: If the maximum Netlink socket receive buffer in bytes set by
! 8: _receive_buffer_size_ exceeds the system-wide maximum from
! 9: /proc/sys/net/core/rmem_max, this option can be used to override the limit.
! 10: Enabling this option requires special privileges (CAP_NET_ADMIN).
! 11:
! 12: charon.plugins.kernel-netlink.fwmark =
! 13: Firewall mark to set on the routing rule that directs traffic to our routing
! 14: table.
! 15:
! 16: Firewall mark to set on the routing rule that directs traffic to our routing
! 17: table. The format is [!]mark[/mask], where the optional exclamation mark
! 18: inverts the meaning (i.e. the rule only applies to packets that don't match
! 19: the mark).
! 20:
! 21: charon.plugins.kernel-netlink.hw_offload_feature_interface = lo
! 22: Interface to be used to find hardware offload feature flag on.
! 23:
! 24: If the kernel supports hardware offloading, the plugin needs to find the
! 25: feature flag which represents hardware offloading support for network
! 26: devices. Using the loopback device for this purpose is usually fine, since
! 27: it should always be present. For rare cases in which the loopback device
! 28: cannot be used to obtain the appropriate feature flag, this option can
! 29: be used to specify an alternative interface for offload feature detection.
! 30:
! 31: charon.plugins.kernel-netlink.mss = 0
! 32: MSS to set on installed routes, 0 to disable.
! 33:
! 34: charon.plugins.kernel-netlink.mtu = 0
! 35: MTU to set on installed routes, 0 to disable.
! 36:
! 37: charon.plugins.kernel-netlink.parallel_route = no
! 38: Whether to perform concurrent Netlink ROUTE queries on a single socket.
! 39:
! 40: Whether to perform concurrent Netlink ROUTE queries on a single socket.
! 41: While parallel queries can improve throughput, it has more overhead. On
! 42: vanilla Linux, DUMP queries fail with EBUSY and must be retried, further
! 43: decreasing performance.
! 44:
! 45: charon.plugins.kernel-netlink.parallel_xfrm = no
! 46: Whether to perform concurrent Netlink XFRM queries on a single socket.
! 47:
! 48: charon.plugins.kernel-netlink.policy_update = no
! 49: Whether to always use XFRM_MSG_UPDPOLICY to install policies.
! 50:
! 51: charon.plugins.kernel-netlink.port_bypass = no
! 52: Whether to use port or socket based IKE XFRM bypass policies.
! 53:
! 54: Whether to use port or socket based IKE XFRM bypass policies.
! 55: IKE bypass policies are used to exempt IKE traffic from XFRM processing.
! 56: The default socket based policies are directly tied to the IKE UDP sockets,
! 57: port based policies use global XFRM bypass policies for the used IKE UDP
! 58: ports.
! 59:
! 60: charon.plugins.kernel-netlink.process_rules = no
! 61: Whether to process changes in routing rules to trigger roam events.
! 62:
! 63: Whether to process changes in routing rules to trigger roam events. This is
! 64: currently only useful if the kernel based route lookup is used (i.e. if
! 65: route installation is disabled or an inverted fwmark match is configured).
! 66:
! 67: charon.plugins.kernel-netlink.receive_buffer_size = 0
! 68: Maximum Netlink socket receive buffer in bytes.
! 69:
! 70: Maximum Netlink socket receive buffer in bytes. This value controls how many
! 71: bytes of Netlink messages can be received on a Netlink socket. The default
! 72: value is set by /proc/sys/net/core/rmem_default. The specified value cannot
! 73: exceed the system-wide maximum from /proc/sys/net/core/rmem_max, unless
! 74: _force_receive_buffer_size_ is enabled.
! 75:
! 76: charon.plugins.kernel-netlink.roam_events = yes
! 77: Whether to trigger roam events when interfaces, addresses or routes change.
! 78:
! 79: charon.plugins.kernel-netlink.set_proto_port_transport_sa = no
! 80: Whether to set protocol and ports in the selector installed on transport
! 81: mode IPsec SAs in the kernel.
! 82:
! 83: Whether to set protocol and ports in the selector installed on transport
! 84: mode IPsec SAs in the kernel. While doing so enforces policies for inbound
! 85: traffic, it also prevents the use of a single IPsec SA by more than one
! 86: traffic selector.
! 87:
! 88: charon.plugins.kernel-netlink.spdh_thresh {}
! 89: XFRM policy hashing threshold configuration for IPv4 and IPv6.
! 90:
! 91: XFRM policy hashing threshold configuration for IPv4 and IPv6.
! 92:
! 93: The section defines hashing thresholds to configure in the kernel during
! 94: daemon startup. Each address family takes a threshold for the local subnet
! 95: of an IPsec policy (src in out-policies, dst in in- and forward-policies)
! 96: and the remote subnet (dst in out-policies, src in in- and
! 97: forward-policies).
! 98:
! 99: If the subnet has more or equal net bits than the threshold, the first
! 100: threshold bits are used to calculate a hash to lookup the policy.
! 101:
! 102: Policy hashing thresholds are not supported before Linux 3.18 and might
! 103: conflict with socket policies before Linux 4.8.
! 104:
! 105: charon.plugins.kernel-netlink.spdh_thresh.ipv4.lbits = 32
! 106: Local subnet XFRM policy hashing threshold for IPv4.
! 107:
! 108: charon.plugins.kernel-netlink.spdh_thresh.ipv4.rbits = 32
! 109: Remote subnet XFRM policy hashing threshold for IPv4.
! 110:
! 111: charon.plugins.kernel-netlink.spdh_thresh.ipv6.lbits = 128
! 112: Local subnet XFRM policy hashing threshold for IPv6.
! 113:
! 114: charon.plugins.kernel-netlink.spdh_thresh.ipv6.rbits = 128
! 115: Remote subnet XFRM policy hashing threshold for IPv6.
! 116:
! 117: charon.plugins.kernel-netlink.retries = 0
! 118: Number of Netlink message retransmissions to send on timeout.
! 119:
! 120: charon.plugins.kernel-netlink.timeout = 0
! 121: Netlink message retransmission timeout, 0 to disable retransmissions.
! 122:
! 123: charon.plugins.kernel-netlink.ignore_retransmit_errors = no
! 124: Whether to ignore errors potentially resulting from a retransmission.
! 125:
! 126: charon.plugins.kernel-netlink.xfrm_acq_expires = 165
! 127: Lifetime of XFRM acquire state and allocated SPIs in kernel.
! 128:
! 129: Lifetime of XFRM acquire state created by the kernel when traffic matches a
! 130: trap policy. The value gets written to /proc/sys/net/core/xfrm_acq_expires.
! 131: Indirectly controls the delay between XFRM acquire messages triggered by the
! 132: kernel for a trap policy. The same value is used as timeout for SPIs
! 133: allocated by the kernel. The default value equals the total retransmission
! 134: timeout for IKE messages, see IKEv2 RETRANSMISSION in
! 135: **strongswan.conf**(5).
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>