Annotation of embedaddon/strongswan/conf/plugins/kernel-netlink.opt, revision 1.1.1.1

1.1       misho       1: charon.plugins.kernel-netlink.buflen = <min(PAGE_SIZE, 8192)>
                      2:        Buffer size for received Netlink messages.
                      3: 
                      4: charon.plugins.kernel-netlink.force_receive_buffer_size = no
                      5:        Force maximum Netlink receive buffer on Netlink socket.
                      6: 
                      7:        If the maximum Netlink socket receive buffer in bytes set by
                      8:        _receive_buffer_size_ exceeds the system-wide maximum from
                      9:        /proc/sys/net/core/rmem_max, this option can be used to override the limit.
                     10:        Enabling this option requires special privileges (CAP_NET_ADMIN).
                     11: 
                     12: charon.plugins.kernel-netlink.fwmark =
                     13:        Firewall mark to set on the routing rule that directs traffic to our routing
                     14:        table.
                     15: 
                     16:        Firewall mark to set on the routing rule that directs traffic to our routing
                     17:        table. The format is [!]mark[/mask], where the optional exclamation mark
                     18:        inverts the meaning (i.e. the rule only applies to packets that don't match
                     19:        the mark).
                     20: 
                     21: charon.plugins.kernel-netlink.hw_offload_feature_interface = lo
                     22:        Interface to be used to find hardware offload feature flag on.
                     23: 
                     24:        If the kernel supports hardware offloading, the plugin needs to find the
                     25:        feature flag which represents hardware offloading support for network
                     26:        devices. Using the loopback device for this purpose is usually fine, since
                     27:        it should always be present. For rare cases in which the loopback device
                     28:        cannot be used to obtain the appropriate feature flag, this option can
                     29:        be used to specify an alternative interface for offload feature detection.
                     30: 
                     31: charon.plugins.kernel-netlink.mss = 0
                     32:        MSS to set on installed routes, 0 to disable.
                     33: 
                     34: charon.plugins.kernel-netlink.mtu = 0
                     35:        MTU to set on installed routes, 0 to disable.
                     36: 
                     37: charon.plugins.kernel-netlink.parallel_route = no
                     38:        Whether to perform concurrent Netlink ROUTE queries on a single socket.
                     39: 
                     40:        Whether to perform concurrent Netlink ROUTE queries on a single socket.
                     41:        While parallel queries can improve throughput, it has more overhead. On
                     42:        vanilla Linux, DUMP queries fail with EBUSY and must be retried, further
                     43:        decreasing performance.
                     44: 
                     45: charon.plugins.kernel-netlink.parallel_xfrm = no
                     46:        Whether to perform concurrent Netlink XFRM queries on a single socket.
                     47: 
                     48: charon.plugins.kernel-netlink.policy_update = no
                     49:        Whether to always use XFRM_MSG_UPDPOLICY to install policies.
                     50: 
                     51: charon.plugins.kernel-netlink.port_bypass = no
                     52:        Whether to use port or socket based IKE XFRM bypass policies.
                     53: 
                     54:        Whether to use port or socket based IKE XFRM bypass policies.
                     55:        IKE bypass policies are used to exempt IKE traffic from XFRM processing.
                     56:        The default socket based policies are directly tied to the IKE UDP sockets,
                     57:        port based policies use global XFRM bypass policies for the used IKE UDP
                     58:        ports.
                     59: 
                     60: charon.plugins.kernel-netlink.process_rules = no
                     61:        Whether to process changes in routing rules to trigger roam events.
                     62: 
                     63:        Whether to process changes in routing rules to trigger roam events. This is
                     64:        currently only useful if the kernel based route lookup is used (i.e. if
                     65:        route installation is disabled or an inverted fwmark match is configured).
                     66: 
                     67: charon.plugins.kernel-netlink.receive_buffer_size = 0
                     68:        Maximum Netlink socket receive buffer in bytes.
                     69: 
                     70:        Maximum Netlink socket receive buffer in bytes. This value controls how many
                     71:        bytes of Netlink messages can be received on a Netlink socket. The default
                     72:        value is set by /proc/sys/net/core/rmem_default. The specified value cannot
                     73:        exceed the system-wide maximum from /proc/sys/net/core/rmem_max, unless
                     74:        _force_receive_buffer_size_     is enabled.
                     75: 
                     76: charon.plugins.kernel-netlink.roam_events = yes
                     77:        Whether to trigger roam events when interfaces, addresses or routes change.
                     78: 
                     79: charon.plugins.kernel-netlink.set_proto_port_transport_sa = no
                     80:        Whether to set protocol and ports in the selector installed on transport
                     81:        mode IPsec SAs in the kernel.
                     82: 
                     83:        Whether to set protocol and ports in the selector installed on transport
                     84:        mode IPsec SAs in the kernel. While doing so enforces policies for inbound
                     85:        traffic, it also prevents the use of a single IPsec SA by more than one
                     86:        traffic selector.
                     87: 
                     88: charon.plugins.kernel-netlink.spdh_thresh {}
                     89:        XFRM policy hashing threshold configuration for IPv4 and IPv6.
                     90: 
                     91:        XFRM policy hashing threshold configuration for IPv4 and IPv6.
                     92: 
                     93:        The section defines hashing thresholds to configure in the kernel during
                     94:        daemon startup. Each address family takes a threshold for the local subnet
                     95:        of an IPsec policy (src in out-policies, dst in in- and forward-policies)
                     96:        and the remote subnet (dst in out-policies, src in in- and
                     97:        forward-policies).
                     98: 
                     99:        If the subnet has more or equal net bits than the threshold, the first
                    100:        threshold bits are used to calculate a hash to lookup the policy.
                    101: 
                    102:        Policy hashing thresholds are not supported before Linux 3.18 and might
                    103:        conflict with socket policies before Linux 4.8.
                    104: 
                    105: charon.plugins.kernel-netlink.spdh_thresh.ipv4.lbits = 32
                    106:        Local subnet XFRM policy hashing threshold for IPv4.
                    107: 
                    108: charon.plugins.kernel-netlink.spdh_thresh.ipv4.rbits = 32
                    109:        Remote subnet XFRM policy hashing threshold for IPv4.
                    110: 
                    111: charon.plugins.kernel-netlink.spdh_thresh.ipv6.lbits = 128
                    112:        Local subnet XFRM policy hashing threshold for IPv6.
                    113: 
                    114: charon.plugins.kernel-netlink.spdh_thresh.ipv6.rbits = 128
                    115:        Remote subnet XFRM policy hashing threshold for IPv6.
                    116: 
                    117: charon.plugins.kernel-netlink.retries = 0
                    118:        Number of Netlink message retransmissions to send on timeout.
                    119: 
                    120: charon.plugins.kernel-netlink.timeout = 0
                    121:        Netlink message retransmission timeout, 0 to disable retransmissions.
                    122: 
                    123: charon.plugins.kernel-netlink.ignore_retransmit_errors = no
                    124:        Whether to ignore errors potentially resulting from a retransmission.
                    125: 
                    126: charon.plugins.kernel-netlink.xfrm_acq_expires = 165
                    127:        Lifetime of XFRM acquire state and allocated SPIs in kernel.
                    128: 
                    129:        Lifetime of XFRM acquire state created by the kernel when traffic matches a
                    130:        trap policy. The value gets written to /proc/sys/net/core/xfrm_acq_expires.
                    131:        Indirectly controls the delay between XFRM acquire messages triggered by the
                    132:        kernel for a trap policy. The same value is used as timeout for SPIs
                    133:        allocated by the kernel. The default value equals the total     retransmission
                    134:        timeout for IKE messages, see IKEv2 RETRANSMISSION in
                    135:        **strongswan.conf**(5).

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>