Annotation of embedaddon/strongswan/conf/strongswan.conf.5.main, revision 1.1

1.1     ! misho       1: .TP
        !             2: .BR aikgen.load " []"
        !             3: Plugins to load in ipsec aikgen tool.
        !             4: 
        !             5: .TP
        !             6: .BR attest.database " []"
        !             7: File measurement information database URI. If it contains a password, make sure
        !             8: to adjust the permissions of the config file accordingly.
        !             9: 
        !            10: .TP
        !            11: .BR attest.load " []"
        !            12: Plugins to load in ipsec attest tool.
        !            13: 
        !            14: .TP
        !            15: .B charon
        !            16: .br
        !            17: Options for the charon IKE daemon.
        !            18: 
        !            19: .RB "" "Note" ":"
        !            20: Many of the options in this section also apply to
        !            21: .RB "" "charon\-cmd" ""
        !            22: and
        !            23: other
        !            24: .RB "" "charon" ""
        !            25: derivatives.  Just use their respective name (e.g.
        !            26: .RB "" "charon\-cmd" ""
        !            27: instead of
        !            28: .RB "" "charon" ")."
        !            29: For many options defaults can be defined
        !            30: in the
        !            31: .RB "" "libstrongswan" ""
        !            32: section.
        !            33: 
        !            34: .TP
        !            35: .BR charon.accept_private_algs " [no]"
        !            36: Deliberately violate the IKE standard's requirement and allow the use of private
        !            37: algorithm identifiers, even if the peer implementation is unknown.
        !            38: 
        !            39: .TP
        !            40: .BR charon.accept_unencrypted_mainmode_messages " [no]"
        !            41: Accept unencrypted ID and HASH payloads in IKEv1 Main Mode.
        !            42: 
        !            43: Some implementations send the third Main Mode message unencrypted, probably to
        !            44: find the PSKs for the specified ID for authentication. This is very similar to
        !            45: Aggressive Mode, and has the same security implications: A passive attacker can
        !            46: sniff the negotiated Identity, and start brute forcing the PSK using the HASH
        !            47: payload.
        !            48: 
        !            49: It is recommended to keep this option to no, unless you know exactly what the
        !            50: implications are and require compatibility to such devices (for example, some
        !            51: SonicWall boxes).
        !            52: 
        !            53: .TP
        !            54: .BR charon.block_threshold " [5]"
        !            55: Maximum number of half\-open IKE_SAs for a single peer IP.
        !            56: 
        !            57: .TP
        !            58: .BR charon.cache_crls " [no]"
        !            59: Whether Certificate Revocation Lists (CRLs) fetched via HTTP or LDAP should be
        !            60: saved under a unique file name derived from the public key of the Certification
        !            61: Authority (CA) to
        !            62: .RB "" "/etc/ipsec.d/crls" ""
        !            63: (stroke) or
        !            64: .RB "" "/etc/swanctl/x509crl" ""
        !            65: (vici), respectively.
        !            66: 
        !            67: .TP
        !            68: .BR charon.cert_cache " [yes]"
        !            69: Whether relations in validated certificate chains should be cached in memory.
        !            70: 
        !            71: .TP
        !            72: .BR charon.cisco_unity " [no]"
        !            73: Send Cisco Unity vendor ID payload (IKEv1 only).
        !            74: 
        !            75: .TP
        !            76: .BR charon.close_ike_on_child_failure " [no]"
        !            77: Close the IKE_SA if setup of the CHILD_SA along with IKE_AUTH failed.
        !            78: 
        !            79: .TP
        !            80: .BR charon.cookie_threshold " [10]"
        !            81: Number of half\-open IKE_SAs that activate the cookie mechanism.
        !            82: 
        !            83: .TP
        !            84: .BR charon.crypto_test.bench " [no]"
        !            85: Benchmark crypto algorithms and order them by efficiency.
        !            86: 
        !            87: .TP
        !            88: .BR charon.crypto_test.bench_size " [1024]"
        !            89: Buffer size used for crypto benchmark.
        !            90: 
        !            91: .TP
        !            92: .BR charon.crypto_test.bench_time " [50]"
        !            93: Time in ms during which crypto algorithm performance is measured.
        !            94: 
        !            95: .TP
        !            96: .BR charon.crypto_test.on_add " [no]"
        !            97: Test crypto algorithms during registration (requires test vectors provided by
        !            98: the
        !            99: .RI "" "test\-vectors" ""
        !           100: plugin).
        !           101: 
        !           102: .TP
        !           103: .BR charon.crypto_test.on_create " [no]"
        !           104: Test crypto algorithms on each crypto primitive instantiation.
        !           105: 
        !           106: .TP
        !           107: .BR charon.crypto_test.required " [no]"
        !           108: Strictly require at least one test vector to enable an algorithm.
        !           109: 
        !           110: .TP
        !           111: .BR charon.crypto_test.rng_true " [no]"
        !           112: Whether to test RNG with TRUE quality; requires a lot of entropy.
        !           113: 
        !           114: .TP
        !           115: .BR charon.delete_rekeyed " [no]"
        !           116: Delete CHILD_SAs right after they got successfully rekeyed (IKEv1 only). Reduces
        !           117: the number of stale CHILD_SAs in scenarios with a lot of rekeyings. However,
        !           118: this might cause problems with implementations that continue to use rekeyed SAs
        !           119: until they expire.
        !           120: 
        !           121: .TP
        !           122: .BR charon.delete_rekeyed_delay " [5]"
        !           123: Delay in seconds until inbound IPsec SAs are deleted after rekeyings (IKEv2
        !           124: only). To process delayed packets the inbound part of a CHILD_SA is kept
        !           125: installed up to the configured number of seconds after it got replaced during a
        !           126: rekeying. If set to 0 the CHILD_SA will be kept installed until it expires (if
        !           127: no lifetime is set it will be destroyed immediately).
        !           128: 
        !           129: .TP
        !           130: .BR charon.dh_exponent_ansi_x9_42 " [yes]"
        !           131: Use ANSI X9.42 DH exponent size or optimum size matched to cryptographic
        !           132: strength.
        !           133: 
        !           134: .TP
        !           135: .BR charon.dlopen_use_rtld_now " [no]"
        !           136: Use RTLD_NOW with dlopen when loading plugins and IMV/IMCs to reveal missing
        !           137: symbols immediately.
        !           138: 
        !           139: .TP
        !           140: .BR charon.dns1 " []"
        !           141: DNS server assigned to peer via configuration payload (CP).
        !           142: 
        !           143: .TP
        !           144: .BR charon.dns2 " []"
        !           145: DNS server assigned to peer via configuration payload (CP).
        !           146: 
        !           147: .TP
        !           148: .BR charon.dos_protection " [yes]"
        !           149: Enable Denial of Service protection using cookies and aggressiveness checks.
        !           150: 
        !           151: .TP
        !           152: .BR charon.ecp_x_coordinate_only " [yes]"
        !           153: Compliance with the errata for RFC 4753.
        !           154: 
        !           155: .TP
        !           156: .B charon.filelog
        !           157: .br
        !           158: Section to define file loggers, see LOGGER CONFIGURATION in
        !           159: .RB "" "strongswan.conf" "(5)."
        !           160: 
        !           161: 
        !           162: .TP
        !           163: .B charon.filelog.<name>
        !           164: .br
        !           165: <name> may be the full path to the log file if it only contains characters
        !           166: permitted in section names. Is ignored if
        !           167: .RI "" "path" ""
        !           168: is specified.
        !           169: 
        !           170: .TP
        !           171: .BR charon.filelog.<name>.<subsystem> " [<default>]"
        !           172: Loglevel for a specific subsystem.
        !           173: 
        !           174: .TP
        !           175: .BR charon.filelog.<name>.append " [yes]"
        !           176: If this option is enabled log entries are appended to the existing file.
        !           177: 
        !           178: .TP
        !           179: .BR charon.filelog.<name>.default " [1]"
        !           180: Specifies the default loglevel to be used for subsystems for which no specific
        !           181: loglevel is defined.
        !           182: 
        !           183: .TP
        !           184: .BR charon.filelog.<name>.flush_line " [no]"
        !           185: Enabling this option disables block buffering and enables line buffering.
        !           186: 
        !           187: .TP
        !           188: .BR charon.filelog.<name>.ike_name " [no]"
        !           189: Prefix each log entry with the connection name and a unique numerical identifier
        !           190: for each IKE_SA.
        !           191: 
        !           192: .TP
        !           193: .BR charon.filelog.<name>.path " []"
        !           194: Optional path to the log file. Overrides the section name. Must be used if the
        !           195: path contains characters that aren't allowed in section names.
        !           196: 
        !           197: .TP
        !           198: .BR charon.filelog.<name>.time_add_ms " [no]"
        !           199: Adds the milliseconds within the current second after the timestamp (separated
        !           200: by a dot, so
        !           201: .RI "" "time_format" ""
        !           202: should end with %S or %T).
        !           203: 
        !           204: .TP
        !           205: .BR charon.filelog.<name>.time_format " []"
        !           206: Prefix each log entry with a timestamp. The option accepts a format string as
        !           207: passed to
        !           208: .RB "" "strftime" "(3)."
        !           209: 
        !           210: 
        !           211: .TP
        !           212: .BR charon.flush_auth_cfg " [no]"
        !           213: If enabled objects used during authentication (certificates, identities etc.)
        !           214: are released to free memory once an IKE_SA is established. Enabling this might
        !           215: conflict with plugins that later need access to e.g. the used certificates.
        !           216: 
        !           217: .TP
        !           218: .BR charon.follow_redirects " [yes]"
        !           219: Whether to follow IKEv2 redirects (RFC 5685).
        !           220: 
        !           221: .TP
        !           222: .BR charon.fragment_size " [1280]"
        !           223: Maximum size (complete IP datagram size in bytes) of a sent IKE fragment when
        !           224: using proprietary IKEv1 or standardized IKEv2 fragmentation, defaults to 1280
        !           225: (use 0 for address family specific default values, which uses a lower value for
        !           226: IPv4).  If specified this limit is used for both IPv4 and IPv6.
        !           227: 
        !           228: .TP
        !           229: .BR charon.group " []"
        !           230: Name of the group the daemon changes to after startup.
        !           231: 
        !           232: .TP
        !           233: .BR charon.half_open_timeout " [30]"
        !           234: Timeout in seconds for connecting IKE_SAs (also see IKE_SA_INIT DROPPING).
        !           235: 
        !           236: .TP
        !           237: .BR charon.hash_and_url " [no]"
        !           238: Enable hash and URL support.
        !           239: 
        !           240: .TP
        !           241: .BR charon.host_resolver.max_threads " [3]"
        !           242: Maximum number of concurrent resolver threads (they are terminated if unused).
        !           243: 
        !           244: .TP
        !           245: .BR charon.host_resolver.min_threads " [0]"
        !           246: Minimum number of resolver threads to keep around.
        !           247: 
        !           248: .TP
        !           249: .BR charon.i_dont_care_about_security_and_use_aggressive_mode_psk " [no]"
        !           250: If enabled responders are allowed to use IKEv1 Aggressive Mode with pre\-shared
        !           251: keys, which is discouraged due to security concerns (offline attacks on the
        !           252: openly transmitted hash of the PSK).
        !           253: 
        !           254: .TP
        !           255: .BR charon.ignore_acquire_ts " [no]"
        !           256: If this is disabled the traffic selectors from the kernel's acquire events,
        !           257: which are derived from the triggering packet, are prepended to the traffic
        !           258: selectors from the configuration for IKEv2 connection. By enabling this, such
        !           259: specific traffic selectors will be ignored and only the ones in the config will
        !           260: be sent. This always happens for IKEv1 connections as the protocol only supports
        !           261: one set of traffic selectors per CHILD_SA.
        !           262: 
        !           263: .TP
        !           264: .BR charon.ignore_routing_tables " []"
        !           265: A space\-separated list of routing tables to be excluded from route lookups.
        !           266: 
        !           267: .TP
        !           268: .BR charon.ikesa_limit " [0]"
        !           269: Maximum number of IKE_SAs that can be established at the same time before new
        !           270: connection attempts are blocked.
        !           271: 
        !           272: .TP
        !           273: .BR charon.ikesa_table_segments " [1]"
        !           274: Number of exclusively locked segments in the hash table.
        !           275: 
        !           276: .TP
        !           277: .BR charon.ikesa_table_size " [1]"
        !           278: Size of the IKE_SA hash table.
        !           279: 
        !           280: .TP
        !           281: .B charon.imcv
        !           282: .br
        !           283: Defaults for options in this section can be configured in the
        !           284: .RI "" "libimcv" ""
        !           285: section.
        !           286: 
        !           287: .TP
        !           288: .BR charon.imcv.assessment_result " [yes]"
        !           289: Whether IMVs send a standard IETF Assessment Result attribute.
        !           290: 
        !           291: .TP
        !           292: .BR charon.imcv.database " []"
        !           293: Global IMV policy database URI. If it contains a password, make sure to adjust
        !           294: the permissions of the config file accordingly.
        !           295: 
        !           296: .TP
        !           297: .BR charon.imcv.os_info.default_password_enabled " [no]"
        !           298: Manually set whether a default password is enabled
        !           299: 
        !           300: .TP
        !           301: .BR charon.imcv.os_info.name " []"
        !           302: Manually set the name of the client OS (e.g. Ubuntu).
        !           303: 
        !           304: .TP
        !           305: .BR charon.imcv.os_info.version " []"
        !           306: Manually set the version of the client OS (e.g. 12.04 i686).
        !           307: 
        !           308: .TP
        !           309: .BR charon.imcv.policy_script " [ipsec _imv_policy]"
        !           310: Script called for each TNC connection to generate IMV policies.
        !           311: 
        !           312: .TP
        !           313: .BR charon.inactivity_close_ike " [no]"
        !           314: Whether to close IKE_SA if the only CHILD_SA closed due to inactivity.
        !           315: 
        !           316: .TP
        !           317: .BR charon.init_limit_half_open " [0]"
        !           318: Limit new connections based on the current number of half open IKE_SAs, see
        !           319: IKE_SA_INIT DROPPING in
        !           320: .RB "" "strongswan.conf" "(5)."
        !           321: 
        !           322: 
        !           323: .TP
        !           324: .BR charon.init_limit_job_load " [0]"
        !           325: Limit new connections based on the number of jobs currently queued for
        !           326: processing (see IKE_SA_INIT DROPPING).
        !           327: 
        !           328: .TP
        !           329: .BR charon.initiator_only " [no]"
        !           330: Causes charon daemon to ignore IKE initiation requests.
        !           331: 
        !           332: .TP
        !           333: .BR charon.install_routes " [yes]"
        !           334: Install routes into a separate routing table for established IPsec tunnels.
        !           335: 
        !           336: .TP
        !           337: .BR charon.install_virtual_ip " [yes]"
        !           338: Install virtual IP addresses.
        !           339: 
        !           340: .TP
        !           341: .BR charon.install_virtual_ip_on " []"
        !           342: The name of the interface on which virtual IP addresses should be installed. If
        !           343: not specified the addresses will be installed on the outbound interface.
        !           344: 
        !           345: .TP
        !           346: .BR charon.integrity_test " [no]"
        !           347: Check daemon, libstrongswan and plugin integrity at startup.
        !           348: 
        !           349: .TP
        !           350: .BR charon.interfaces_ignore " []"
        !           351: A comma\-separated list of network interfaces that should be ignored, if
        !           352: .RB "" "interfaces_use" ""
        !           353: is specified this option has no effect.
        !           354: 
        !           355: .TP
        !           356: .BR charon.interfaces_use " []"
        !           357: A comma\-separated list of network interfaces that should be used by charon. All
        !           358: other interfaces are ignored.
        !           359: 
        !           360: .TP
        !           361: .BR charon.keep_alive " [20s]"
        !           362: NAT keep alive interval.
        !           363: 
        !           364: .TP
        !           365: .BR charon.leak_detective.detailed " [yes]"
        !           366: Includes source file names and line numbers in leak detective output.
        !           367: 
        !           368: .TP
        !           369: .BR charon.leak_detective.usage_threshold " [10240]"
        !           370: Threshold in bytes for leaks to be reported (0 to report all).
        !           371: 
        !           372: .TP
        !           373: .BR charon.leak_detective.usage_threshold_count " [0]"
        !           374: Threshold in number of allocations for leaks to be reported (0 to report all).
        !           375: 
        !           376: .TP
        !           377: .BR charon.load " []"
        !           378: Plugins to load in the IKE daemon charon.
        !           379: 
        !           380: .TP
        !           381: .BR charon.load_modular " [no]"
        !           382: If enabled, the list of plugins to load is determined via the value of the
        !           383: .RI "" "charon.plugins.<name>.load" ""
        !           384: options.  In addition to a simple boolean flag that
        !           385: option may take an integer value indicating the priority of a plugin, which
        !           386: would influence the order of a plugin in the plugin list (the default is 1). If
        !           387: two plugins have the same priority their order in the default plugin list is
        !           388: preserved. Enabled plugins not found in that list are ordered alphabetically
        !           389: before other plugins with the same priority.
        !           390: 
        !           391: .TP
        !           392: .BR charon.make_before_break " [no]"
        !           393: Initiate IKEv2 reauthentication with a make\-before\-break instead of a
        !           394: break\-before\-make scheme. Make\-before\-break uses overlapping IKE and CHILD_SA
        !           395: during reauthentication by first recreating all new SAs before deleting the old
        !           396: ones. This behavior can be beneficial to avoid connectivity gaps during
        !           397: reauthentication, but requires support for overlapping SAs by the peer.
        !           398: strongSwan can handle such overlapping SAs since version 5.3.0.
        !           399: 
        !           400: .TP
        !           401: .BR charon.max_ikev1_exchanges " [3]"
        !           402: Maximum number of IKEv1 phase 2 exchanges per IKE_SA to keep state about and
        !           403: track concurrently.
        !           404: 
        !           405: .TP
        !           406: .BR charon.max_packet " [10000]"
        !           407: Maximum packet size accepted by charon.
        !           408: 
        !           409: .TP
        !           410: .BR charon.multiple_authentication " [yes]"
        !           411: Enable multiple authentication exchanges (RFC 4739).
        !           412: 
        !           413: .TP
        !           414: .BR charon.nbns1 " []"
        !           415: WINS servers assigned to peer via configuration payload (CP).
        !           416: 
        !           417: .TP
        !           418: .BR charon.nbns2 " []"
        !           419: WINS servers assigned to peer via configuration payload (CP).
        !           420: 
        !           421: .TP
        !           422: .BR charon.plugin.ha.buflen " [2048]"
        !           423: Buffer size for received HA messages. For IKEv1 the public DH factors are also
        !           424: transmitted so depending on the DH group the HA messages can get quite big (the
        !           425: default should be fine up to
        !           426: .RI "" "modp4096" ")."
        !           427: 
        !           428: 
        !           429: .TP
        !           430: .BR charon.plugins.addrblock.strict " [yes]"
        !           431: If set to yes, a subject certificate without an addrblock extension is rejected
        !           432: if the issuer certificate has such an addrblock extension. If set to no, subject
        !           433: certificates issued without the addrblock extension are accepted without any
        !           434: traffic selector checks and no policy is enforced by the plugin.
        !           435: 
        !           436: .TP
        !           437: .BR charon.plugins.android_log.loglevel " [1]"
        !           438: Loglevel for logging to Android specific logger.
        !           439: 
        !           440: .TP
        !           441: .B charon.plugins.attr
        !           442: .br
        !           443: Section to specify arbitrary attributes that are assigned to a peer via
        !           444: configuration payload (CP).
        !           445: 
        !           446: .TP
        !           447: .BR charon.plugins.attr.<attr> " []"
        !           448: .RB "" "<attr>" ""
        !           449: can be either
        !           450: .RI "" "address" ","
        !           451: .RI "" "netmask" ","
        !           452: .RI "" "dns" ","
        !           453: .RI "" "nbns" ","
        !           454: .RI "" "dhcp" ","
        !           455: .RI "" "subnet" ","
        !           456: .RI "" "split\-include" ","
        !           457: .RI "" "split\-exclude" ""
        !           458: or the numeric identifier of the attribute
        !           459: type. The assigned value can be an IPv4/IPv6 address, a subnet in CIDR notation
        !           460: or an arbitrary value depending on the attribute type.  For some attribute types
        !           461: multiple values may be specified as a comma separated list.
        !           462: 
        !           463: .TP
        !           464: .BR charon.plugins.attr-sql.crash_recovery " [yes]"
        !           465: Release all online leases during startup.  Disable this to share the DB between
        !           466: multiple VPN gateways.
        !           467: 
        !           468: .TP
        !           469: .BR charon.plugins.attr-sql.database " []"
        !           470: Database URI for attr\-sql plugin used by charon. If it contains a password, make
        !           471: sure to adjust the permissions of the config file accordingly.
        !           472: 
        !           473: .TP
        !           474: .BR charon.plugins.attr-sql.lease_history " [yes]"
        !           475: Enable logging of SQL IP pool leases.
        !           476: 
        !           477: .TP
        !           478: .BR charon.plugins.bliss.use_bliss_b " [yes]"
        !           479: Use the enhanced BLISS\-B key generation and signature algorithm.
        !           480: 
        !           481: .TP
        !           482: .BR charon.plugins.bypass-lan.interfaces_ignore " []"
        !           483: A comma\-separated list of network interfaces for which connected subnets should
        !           484: be ignored, if
        !           485: .RB "" "interfaces_use" ""
        !           486: is specified this option has no effect.
        !           487: 
        !           488: .TP
        !           489: .BR charon.plugins.bypass-lan.interfaces_use " []"
        !           490: A comma\-separated list of network interfaces for which connected subnets should
        !           491: be considered. All other interfaces are ignored.
        !           492: 
        !           493: .TP
        !           494: .BR charon.plugins.certexpire.csv.cron " []"
        !           495: Cron style string specifying CSV export times.
        !           496: 
        !           497: .TP
        !           498: .BR charon.plugins.certexpire.csv.empty_string " []"
        !           499: String to use in empty intermediate CA fields.
        !           500: 
        !           501: .TP
        !           502: .BR charon.plugins.certexpire.csv.fixed_fields " [yes]"
        !           503: Use a fixed intermediate CA field count.
        !           504: 
        !           505: .TP
        !           506: .BR charon.plugins.certexpire.csv.force " [yes]"
        !           507: Force export of all trustchains we have a private key for.
        !           508: 
        !           509: .TP
        !           510: .BR charon.plugins.certexpire.csv.format " [%d:%m:%Y]"
        !           511: .RB "" "strftime" "(3)"
        !           512: format string to export expiration dates as.
        !           513: 
        !           514: .TP
        !           515: .BR charon.plugins.certexpire.csv.local " []"
        !           516: .RB "" "strftime" "(3)"
        !           517: format string for the CSV file name to export local certificates
        !           518: to.
        !           519: 
        !           520: .TP
        !           521: .BR charon.plugins.certexpire.csv.remote " []"
        !           522: .RB "" "strftime" "(3)"
        !           523: format string for the CSV file name to export remote
        !           524: certificates to.
        !           525: 
        !           526: .TP
        !           527: .BR charon.plugins.certexpire.csv.separator " [,]"
        !           528: CSV field separator.
        !           529: 
        !           530: .TP
        !           531: .BR charon.plugins.coupling.file " []"
        !           532: File to store coupling list to.
        !           533: 
        !           534: .TP
        !           535: .BR charon.plugins.coupling.hash " [sha1]"
        !           536: Hashing algorithm to fingerprint coupled certificates.
        !           537: 
        !           538: .TP
        !           539: .BR charon.plugins.coupling.max " [1]"
        !           540: Maximum number of coupling entries to create.
        !           541: 
        !           542: .TP
        !           543: .BR charon.plugins.curl.redir " [-1]"
        !           544: Maximum number of redirects followed by the plugin, set to 0 to disable
        !           545: following redirects, set to \-1 for no limit.
        !           546: 
        !           547: .TP
        !           548: .BR charon.plugins.dhcp.force_server_address " [no]"
        !           549: Always use the configured server address. This might be helpful if the DHCP
        !           550: server runs on the same host as strongSwan, and the DHCP daemon does not listen
        !           551: on the loopback interface.  In that case the server cannot be reached via
        !           552: unicast (or even 255.255.255.255) as that would be routed via loopback. Setting
        !           553: this option to yes and configuring the local broadcast address (e.g.
        !           554: 192.168.0.255) as server address might work.
        !           555: 
        !           556: .TP
        !           557: .BR charon.plugins.dhcp.identity_lease " [no]"
        !           558: Derive user\-defined MAC address from hash of IKE identity and send client
        !           559: identity DHCP option.
        !           560: 
        !           561: .TP
        !           562: .BR charon.plugins.dhcp.interface " []"
        !           563: Interface name the plugin uses for address allocation. The default is to bind to
        !           564: any (0.0.0.0) and let the system decide which way to route the packets to the
        !           565: DHCP server.
        !           566: 
        !           567: .TP
        !           568: .BR charon.plugins.dhcp.server " [255.255.255.255]"
        !           569: DHCP server unicast or broadcast IP address.
        !           570: 
        !           571: .TP
        !           572: .BR charon.plugins.dhcp.use_server_port " [no]"
        !           573: Use the DHCP server port (67) as source port, instead of the DHCP client port
        !           574: (68), when a unicast server address is configured and the plugin acts as relay
        !           575: agent.  When replying in this mode the DHCP server will always send packets to
        !           576: the DHCP server port and if no process binds that port an ICMP port unreachables
        !           577: will be sent back, which might be problematic for some DHCP servers.  To avoid
        !           578: that, enabling this option will cause the plugin to bind the DHCP server port to
        !           579: send its requests when acting as relay agent. This is not necessary if a DHCP
        !           580: server is already running on the same host and might even cause conflicts (and
        !           581: since the server port is already bound, ICMPs should not be an issue).
        !           582: 
        !           583: .TP
        !           584: .BR charon.plugins.dnscert.enable " [no]"
        !           585: Enable fetching of CERT RRs via DNS.
        !           586: 
        !           587: .TP
        !           588: .BR charon.plugins.drbg.max_drbg_requests " [4294967294]"
        !           589: Number of pseudo\-random bit requests from the DRBG before an automatic reseeding
        !           590: occurs.
        !           591: 
        !           592: .TP
        !           593: .BR charon.plugins.duplicheck.enable " [yes]"
        !           594: Enable duplicheck plugin (if loaded).
        !           595: 
        !           596: .TP
        !           597: .BR charon.plugins.duplicheck.socket " [unix://${piddir}/charon.dck]"
        !           598: Socket provided by the duplicheck plugin.
        !           599: 
        !           600: .TP
        !           601: .BR charon.plugins.eap-aka.request_identity " [yes]"
        !           602: .TP
        !           603: .BR charon.plugins.eap-aka-3gpp.seq_check " []"
        !           604: Enable to activate sequence check of the AKA SQN values in order to trigger
        !           605: resync cycles.
        !           606: 
        !           607: .TP
        !           608: .BR charon.plugins.eap-aka-3gpp2.seq_check " []"
        !           609: Enable to activate sequence check of the AKA SQN values in order to trigger
        !           610: resync cycles.
        !           611: 
        !           612: .TP
        !           613: .BR charon.plugins.eap-dynamic.prefer_user " [no]"
        !           614: If enabled the EAP methods proposed in an EAP\-Nak message sent by the peer are
        !           615: preferred over the methods registered locally.
        !           616: 
        !           617: .TP
        !           618: .BR charon.plugins.eap-dynamic.preferred " []"
        !           619: The preferred EAP method(s) to be used.  If it is not given the first registered
        !           620: method will be used initially.  If a comma separated list is given the methods
        !           621: are tried in the given order before trying the rest of the registered methods.
        !           622: 
        !           623: .TP
        !           624: .BR charon.plugins.eap-gtc.backend " [pam]"
        !           625: XAuth backend to be used for credential verification.
        !           626: 
        !           627: .TP
        !           628: .BR charon.plugins.eap-peap.fragment_size " [1024]"
        !           629: Maximum size of an EAP\-PEAP packet.
        !           630: 
        !           631: .TP
        !           632: .BR charon.plugins.eap-peap.include_length " [no]"
        !           633: Include length in non\-fragmented EAP\-PEAP packets.
        !           634: 
        !           635: .TP
        !           636: .BR charon.plugins.eap-peap.max_message_count " [32]"
        !           637: Maximum number of processed EAP\-PEAP packets (0 = no limit).
        !           638: 
        !           639: .TP
        !           640: .BR charon.plugins.eap-peap.phase2_method " [mschapv2]"
        !           641: Phase2 EAP client authentication method.
        !           642: 
        !           643: .TP
        !           644: .BR charon.plugins.eap-peap.phase2_piggyback " [no]"
        !           645: Phase2 EAP Identity request piggybacked by server onto TLS Finished message.
        !           646: 
        !           647: .TP
        !           648: .BR charon.plugins.eap-peap.phase2_tnc " [no]"
        !           649: Start phase2 EAP TNC protocol after successful client authentication.
        !           650: 
        !           651: .TP
        !           652: .BR charon.plugins.eap-peap.request_peer_auth " [no]"
        !           653: Request peer authentication based on a client certificate.
        !           654: 
        !           655: .TP
        !           656: .BR charon.plugins.eap-radius.accounting " [no]"
        !           657: Send RADIUS accounting information to RADIUS servers.
        !           658: 
        !           659: .TP
        !           660: .BR charon.plugins.eap-radius.accounting_close_on_timeout " [yes]"
        !           661: Close the IKE_SA if there is a timeout during interim RADIUS accounting updates.
        !           662: 
        !           663: .TP
        !           664: .BR charon.plugins.eap-radius.accounting_interval " [0]"
        !           665: Interval in seconds for interim RADIUS accounting updates, if not specified by
        !           666: the RADIUS server in the Access\-Accept message.
        !           667: 
        !           668: .TP
        !           669: .BR charon.plugins.eap-radius.accounting_requires_vip " [no]"
        !           670: If enabled, accounting is disabled unless an IKE_SA has at least one virtual IP.
        !           671: Only for IKEv2, for IKEv1 a virtual IP is strictly necessary.
        !           672: 
        !           673: .TP
        !           674: .BR charon.plugins.eap-radius.accounting_send_class " [no]"
        !           675: If enabled, adds the Class attributes received in Access\-Accept message to the
        !           676: RADIUS accounting messages.
        !           677: 
        !           678: .TP
        !           679: .BR charon.plugins.eap-radius.class_group " [no]"
        !           680: Use the
        !           681: .RI "" "class" ""
        !           682: attribute sent in the RADIUS\-Accept message as group membership
        !           683: information that is compared to the groups specified in the
        !           684: .RB "" "rightgroups" ""
        !           685: option in
        !           686: .RB "" "ipsec.conf" "(5)."
        !           687: 
        !           688: 
        !           689: .TP
        !           690: .BR charon.plugins.eap-radius.close_all_on_timeout " [no]"
        !           691: Closes all IKE_SAs if communication with the RADIUS server times out. If it is
        !           692: not set only the current IKE_SA is closed.
        !           693: 
        !           694: .TP
        !           695: .BR charon.plugins.eap-radius.dae.enable " [no]"
        !           696: Enables support for the Dynamic Authorization Extension (RFC 5176).
        !           697: 
        !           698: .TP
        !           699: .BR charon.plugins.eap-radius.dae.listen " [0.0.0.0]"
        !           700: Address to listen for DAE messages from the RADIUS server.
        !           701: 
        !           702: .TP
        !           703: .BR charon.plugins.eap-radius.dae.port " [3799]"
        !           704: Port to listen for DAE requests.
        !           705: 
        !           706: .TP
        !           707: .BR charon.plugins.eap-radius.dae.secret " []"
        !           708: Shared secret used to verify/sign DAE messages. If set, make sure to adjust the
        !           709: permissions of the config file accordingly.
        !           710: 
        !           711: .TP
        !           712: .BR charon.plugins.eap-radius.eap_start " [no]"
        !           713: Send EAP\-Start instead of EAP\-Identity to start RADIUS conversation.
        !           714: 
        !           715: .TP
        !           716: .BR charon.plugins.eap-radius.filter_id " [no]"
        !           717: If the RADIUS
        !           718: .RI "" "tunnel_type" ""
        !           719: attribute with value
        !           720: .RB "" "ESP" ""
        !           721: is received, use the
        !           722: .RI "" "filter_id" ""
        !           723: attribute sent in the RADIUS\-Accept message as group membership
        !           724: information that is compared to the groups specified in the
        !           725: .RB "" "rightgroups" ""
        !           726: option in
        !           727: .RB "" "ipsec.conf" "(5)."
        !           728: 
        !           729: 
        !           730: .TP
        !           731: .BR charon.plugins.eap-radius.forward.ike_to_radius " []"
        !           732: RADIUS attributes to be forwarded from IKEv2 to RADIUS (can be defined by name
        !           733: or attribute number, a colon can be used to specify vendor\-specific attributes,
        !           734: e.g. Reply\-Message, or 11, or 36906:12).
        !           735: 
        !           736: .TP
        !           737: .BR charon.plugins.eap-radius.forward.radius_to_ike " []"
        !           738: Same as
        !           739: .RI "" "charon.plugins.eap\-radius.forward.ike_to_radius" ""
        !           740: but from RADIUS to
        !           741: IKEv2, a strongSwan specific private notify (40969) is used to transmit the
        !           742: attributes.
        !           743: 
        !           744: .TP
        !           745: .BR charon.plugins.eap-radius.id_prefix " []"
        !           746: Prefix to EAP\-Identity, some AAA servers use a IMSI prefix to select the EAP
        !           747: method.
        !           748: 
        !           749: .TP
        !           750: .BR charon.plugins.eap-radius.nas_identifier " [strongSwan]"
        !           751: NAS\-Identifier to include in RADIUS messages.
        !           752: 
        !           753: .TP
        !           754: .BR charon.plugins.eap-radius.port " [1812]"
        !           755: Port of RADIUS server (authentication).
        !           756: 
        !           757: .TP
        !           758: .BR charon.plugins.eap-radius.retransmit_base " [1.4]"
        !           759: Base to use for calculating exponential back off.
        !           760: 
        !           761: .TP
        !           762: .BR charon.plugins.eap-radius.retransmit_timeout " [2.0]"
        !           763: Timeout in seconds before sending first retransmit.
        !           764: 
        !           765: .TP
        !           766: .BR charon.plugins.eap-radius.retransmit_tries " [4]"
        !           767: Number of times to retransmit a packet before giving up.
        !           768: 
        !           769: .TP
        !           770: .BR charon.plugins.eap-radius.secret " []"
        !           771: Shared secret between RADIUS and NAS. If set, make sure to adjust the
        !           772: permissions of the config file accordingly.
        !           773: 
        !           774: .TP
        !           775: .BR charon.plugins.eap-radius.server " []"
        !           776: IP/Hostname of RADIUS server.
        !           777: 
        !           778: .TP
        !           779: .B charon.plugins.eap-radius.servers
        !           780: .br
        !           781: Section to specify multiple RADIUS servers. The
        !           782: .RB "" "nas_identifier" ","
        !           783: .RB "" "secret" ","
        !           784: .RB "" "sockets" ""
        !           785: and
        !           786: .RB "" "port" ""
        !           787: (or
        !           788: .RB "" "auth_port" ")"
        !           789: options can be specified for each
        !           790: server. A server's IP/Hostname can be configured using the
        !           791: .RB "" "address" ""
        !           792: option.
        !           793: The
        !           794: .RB "" "acct_port" ""
        !           795: [1813] option can be used to specify the port used for RADIUS
        !           796: accounting. For each RADIUS server a priority can be specified using the
        !           797: .RB "" "preference" ""
        !           798: [0] option. The retransmission time for each server can set set
        !           799: using
        !           800: .RB "" "retransmit_base" ","
        !           801: .RB "" "retransmit_timeout" ""
        !           802: and
        !           803: .RB "" "retransmit_tries" "."
        !           804: 
        !           805: 
        !           806: .TP
        !           807: .BR charon.plugins.eap-radius.sockets " [1]"
        !           808: Number of sockets (ports) to use, increase for high load.
        !           809: 
        !           810: .TP
        !           811: .BR charon.plugins.eap-radius.station_id_with_port " [yes]"
        !           812: Whether to include the UDP port in the Called\- and Calling\-Station\-Id RADIUS
        !           813: attributes.
        !           814: 
        !           815: .TP
        !           816: .B charon.plugins.eap-radius.xauth
        !           817: .br
        !           818: Section to configure multiple XAuth authentication rounds via RADIUS. The
        !           819: subsections define so called authentication profiles with arbitrary names. In
        !           820: each profile section one or more XAuth types can be configured, with an assigned
        !           821: message. For each type a separate XAuth exchange will be initiated and all
        !           822: replies get concatenated into the User\-Password attribute, which then gets
        !           823: verified over RADIUS.
        !           824: 
        !           825: Available XAuth types are
        !           826: .RB "" "password" ","
        !           827: .RB "" "passcode" ","
        !           828: .RB "" "nextpin" ","
        !           829: and
        !           830: .RB "" "answer" "."
        !           831: This type is not relevant to strongSwan or the AAA server, but the
        !           832: client may show a different dialog (along with the configured message).
        !           833: 
        !           834: To use the configured profiles, they have to be configured in the respective
        !           835: connection in
        !           836: .RB "" "ipsec.conf" "(5)"
        !           837: by appending the profile name, separated by a
        !           838: colon, to the
        !           839: .RB "" "xauth\-radius" ""
        !           840: XAauth backend configuration in
        !           841: .RI "" "rightauth" ""
        !           842: or
        !           843: .RI "" "rightauth2" ","
        !           844: for instance,
        !           845: .RI "" "rightauth2=xauth\-radius:profile" "."
        !           846: 
        !           847: 
        !           848: .TP
        !           849: .BR charon.plugins.eap-sim.request_identity " [yes]"
        !           850: .TP
        !           851: .BR charon.plugins.eap-simaka-sql.database " []"
        !           852: .TP
        !           853: .BR charon.plugins.eap-simaka-sql.remove_used " [no]"
        !           854: .TP
        !           855: .BR charon.plugins.eap-tls.fragment_size " [1024]"
        !           856: Maximum size of an EAP\-TLS packet.
        !           857: 
        !           858: .TP
        !           859: .BR charon.plugins.eap-tls.include_length " [yes]"
        !           860: Include length in non\-fragmented EAP\-TLS packets.
        !           861: 
        !           862: .TP
        !           863: .BR charon.plugins.eap-tls.max_message_count " [32]"
        !           864: Maximum number of processed EAP\-TLS packets (0 = no limit).
        !           865: 
        !           866: .TP
        !           867: .BR charon.plugins.eap-tnc.max_message_count " [10]"
        !           868: Maximum number of processed EAP\-TNC packets (0 = no limit).
        !           869: 
        !           870: .TP
        !           871: .BR charon.plugins.eap-tnc.protocol " [tnccs-2.0]"
        !           872: IF\-TNCCS protocol version to be used 
        !           873: .RI "(" "tnccs\-1.1" ","
        !           874: .RI "" "tnccs\-2.0" ","
        !           875: .RI "" "tnccs\-dynamic" ")."
        !           876: 
        !           877: 
        !           878: .TP
        !           879: .BR charon.plugins.eap-ttls.fragment_size " [1024]"
        !           880: Maximum size of an EAP\-TTLS packet.
        !           881: 
        !           882: .TP
        !           883: .BR charon.plugins.eap-ttls.include_length " [yes]"
        !           884: Include length in non\-fragmented EAP\-TTLS packets.
        !           885: 
        !           886: .TP
        !           887: .BR charon.plugins.eap-ttls.max_message_count " [32]"
        !           888: Maximum number of processed EAP\-TTLS packets (0 = no limit).
        !           889: 
        !           890: .TP
        !           891: .BR charon.plugins.eap-ttls.phase2_method " [md5]"
        !           892: Phase2 EAP client authentication method.
        !           893: 
        !           894: .TP
        !           895: .BR charon.plugins.eap-ttls.phase2_piggyback " [no]"
        !           896: Phase2 EAP Identity request piggybacked by server onto TLS Finished message.
        !           897: 
        !           898: .TP
        !           899: .BR charon.plugins.eap-ttls.phase2_tnc " [no]"
        !           900: Start phase2 EAP TNC protocol after successful client authentication.
        !           901: 
        !           902: .TP
        !           903: .BR charon.plugins.eap-ttls.phase2_tnc_method " [pt]"
        !           904: Phase2 EAP TNC transport protocol 
        !           905: .RI "(" "pt" ""
        !           906: as IETF standard or legacy
        !           907: .RI "" "tnc" ")"
        !           908: 
        !           909: 
        !           910: .TP
        !           911: .BR charon.plugins.eap-ttls.request_peer_auth " [no]"
        !           912: Request peer authentication based on a client certificate.
        !           913: 
        !           914: .TP
        !           915: .BR charon.plugins.error-notify.socket " [unix://${piddir}/charon.enfy]"
        !           916: Socket provided by the error\-notify plugin.
        !           917: 
        !           918: .TP
        !           919: .BR charon.plugins.ext-auth.script " []"
        !           920: Command to pass to the system shell for peer authorization. Authorization is
        !           921: considered successful if the command executes normally with an exit code of
        !           922: zero. For all other exit codes IKE_SA authorization is rejected.
        !           923: 
        !           924: The following environment variables get passed to the script:
        !           925: .RI "" "IKE_UNIQUE_ID" ":"
        !           926: The IKE_SA numerical unique identifier.
        !           927: .RI "" "IKE_NAME" ":"
        !           928: The peer configuration
        !           929: connection name.
        !           930: .RI "" "IKE_LOCAL_HOST" ":"
        !           931: Local IKE IP address.
        !           932: .RI "" "IKE_REMOTE_HOST" ":"
        !           933: Remote IKE IP address.
        !           934: .RI "" "IKE_LOCAL_ID" ":"
        !           935: Local IKE identity.
        !           936: .RI "" "IKE_REMOTE_ID" ":"
        !           937: Remote IKE identity.
        !           938: .RI "" "IKE_REMOTE_EAP_ID" ":"
        !           939: Remote EAP or XAuth identity, if used.
        !           940: 
        !           941: .TP
        !           942: .BR charon.plugins.forecast.groups " [224.0.0.1,224.0.0.22,224.0.0.251,224.0.0.252,239.255.255.250]"
        !           943: Comma separated list of multicast groups to join locally. The local host
        !           944: receives and forwards packets in the local LAN for joined multicast groups only.
        !           945: Packets matching the list of multicast groups get forwarded to connected
        !           946: clients. The default group includes host multicasts, IGMP, mDNS, LLMNR and
        !           947: SSDP/WS\-Discovery, and is usually a good choice for Windows clients.
        !           948: 
        !           949: .TP
        !           950: .BR charon.plugins.forecast.interface " []"
        !           951: Name of the local interface to listen for broadcasts messages to forward. If no
        !           952: interface is configured, the first usable interface is used, which is usually
        !           953: just fine for single\-homed hosts. If your host has multiple interfaces, set this
        !           954: option to the local LAN interface you want to forward broadcasts from/to.
        !           955: 
        !           956: .TP
        !           957: .BR charon.plugins.forecast.reinject " []"
        !           958: Comma separated list of CHILD_SA configuration names for which to perform
        !           959: multi/broadcast reinjection. For clients connecting over such a configuration,
        !           960: any multi/broadcast received over the tunnel gets reinjected to all active
        !           961: tunnels. This makes the broadcasts visible to other peers, and for examples
        !           962: allows clients to see others shares. If disabled, multi/broadcast messages
        !           963: received over a tunnel are injected to the local network only, but not to other
        !           964: IPsec clients.
        !           965: 
        !           966: .TP
        !           967: .BR charon.plugins.gcrypt.quick_random " [no]"
        !           968: Use faster random numbers in gcrypt; for testing only, produces weak keys!
        !           969: 
        !           970: .TP
        !           971: .BR charon.plugins.ha.autobalance " [0]"
        !           972: Interval in seconds to automatically balance handled segments between nodes. Set
        !           973: to 0 to disable.
        !           974: 
        !           975: .TP
        !           976: .BR charon.plugins.ha.fifo_interface " [yes]"
        !           977: .TP
        !           978: .BR charon.plugins.ha.heartbeat_delay " [1000]"
        !           979: .TP
        !           980: .BR charon.plugins.ha.heartbeat_timeout " [2100]"
        !           981: .TP
        !           982: .BR charon.plugins.ha.local " []"
        !           983: .TP
        !           984: .BR charon.plugins.ha.monitor " [yes]"
        !           985: .TP
        !           986: .BR charon.plugins.ha.pools " []"
        !           987: .TP
        !           988: .BR charon.plugins.ha.remote " []"
        !           989: .TP
        !           990: .BR charon.plugins.ha.resync " [yes]"
        !           991: .TP
        !           992: .BR charon.plugins.ha.secret " []"
        !           993: .TP
        !           994: .BR charon.plugins.ha.segment_count " [1]"
        !           995: .TP
        !           996: .BR charon.plugins.ipseckey.enable " [no]"
        !           997: Enable fetching of IPSECKEY RRs via DNS.
        !           998: 
        !           999: .TP
        !          1000: .BR charon.plugins.kernel-libipsec.allow_peer_ts " [no]"
        !          1001: Allow that the remote traffic selector equals the IKE peer. The route installed
        !          1002: for such traffic (via TUN device) usually prevents further IKE traffic. The
        !          1003: fwmark options for the
        !          1004: .RI "" "kernel\-netlink" ""
        !          1005: and
        !          1006: .RI "" "socket\-default" ""
        !          1007: plugins can be used
        !          1008: to circumvent that problem.
        !          1009: 
        !          1010: .TP
        !          1011: .BR charon.plugins.kernel-netlink.buflen " [<min(PAGE_SIZE, 8192)>]"
        !          1012: Buffer size for received Netlink messages.
        !          1013: 
        !          1014: .TP
        !          1015: .BR charon.plugins.kernel-netlink.force_receive_buffer_size " [no]"
        !          1016: If the maximum Netlink socket receive buffer in bytes set by
        !          1017: .RI "" "receive_buffer_size" ""
        !          1018: exceeds the system\-wide maximum from
        !          1019: /proc/sys/net/core/rmem_max, this option can be used to override the limit.
        !          1020: Enabling this option requires special privileges (CAP_NET_ADMIN).
        !          1021: 
        !          1022: .TP
        !          1023: .BR charon.plugins.kernel-netlink.fwmark " []"
        !          1024: Firewall mark to set on the routing rule that directs traffic to our routing
        !          1025: table. The format is [!]mark[/mask], where the optional exclamation mark inverts
        !          1026: the meaning (i.e. the rule only applies to packets that don't match the mark).
        !          1027: 
        !          1028: .TP
        !          1029: .BR charon.plugins.kernel-netlink.hw_offload_feature_interface " [lo]"
        !          1030: If the kernel supports hardware offloading, the plugin needs to find the feature
        !          1031: flag which represents hardware offloading support for network devices. Using the
        !          1032: loopback device for this purpose is usually fine, since it should always be
        !          1033: present. For rare cases in which the loopback device cannot be used to obtain
        !          1034: the appropriate feature flag, this option can be used to specify an alternative
        !          1035: interface for offload feature detection.
        !          1036: 
        !          1037: .TP
        !          1038: .BR charon.plugins.kernel-netlink.ignore_retransmit_errors " [no]"
        !          1039: Whether to ignore errors potentially resulting from a retransmission.
        !          1040: 
        !          1041: .TP
        !          1042: .BR charon.plugins.kernel-netlink.mss " [0]"
        !          1043: MSS to set on installed routes, 0 to disable.
        !          1044: 
        !          1045: .TP
        !          1046: .BR charon.plugins.kernel-netlink.mtu " [0]"
        !          1047: MTU to set on installed routes, 0 to disable.
        !          1048: 
        !          1049: .TP
        !          1050: .BR charon.plugins.kernel-netlink.parallel_route " [no]"
        !          1051: Whether to perform concurrent Netlink ROUTE queries on a single socket. While
        !          1052: parallel queries can improve throughput, it has more overhead. On vanilla Linux,
        !          1053: DUMP queries fail with EBUSY and must be retried, further decreasing
        !          1054: performance.
        !          1055: 
        !          1056: .TP
        !          1057: .BR charon.plugins.kernel-netlink.parallel_xfrm " [no]"
        !          1058: Whether to perform concurrent Netlink XFRM queries on a single socket.
        !          1059: 
        !          1060: .TP
        !          1061: .BR charon.plugins.kernel-netlink.policy_update " [no]"
        !          1062: Whether to always use XFRM_MSG_UPDPOLICY to install policies.
        !          1063: 
        !          1064: .TP
        !          1065: .BR charon.plugins.kernel-netlink.port_bypass " [no]"
        !          1066: Whether to use port or socket based IKE XFRM bypass policies. IKE bypass
        !          1067: policies are used to exempt IKE traffic from XFRM processing. The default socket
        !          1068: based policies are directly tied to the IKE UDP sockets, port based policies use
        !          1069: global XFRM bypass policies for the used IKE UDP ports.
        !          1070: 
        !          1071: .TP
        !          1072: .BR charon.plugins.kernel-netlink.process_rules " [no]"
        !          1073: Whether to process changes in routing rules to trigger roam events. This is
        !          1074: currently only useful if the kernel based route lookup is used (i.e. if route
        !          1075: installation is disabled or an inverted fwmark match is configured).
        !          1076: 
        !          1077: .TP
        !          1078: .BR charon.plugins.kernel-netlink.receive_buffer_size " [0]"
        !          1079: Maximum Netlink socket receive buffer in bytes. This value controls how many
        !          1080: bytes of Netlink messages can be received on a Netlink socket. The default value
        !          1081: is set by /proc/sys/net/core/rmem_default. The specified value cannot exceed the
        !          1082: system\-wide maximum from /proc/sys/net/core/rmem_max, unless
        !          1083: .RI "" "force_receive_buffer_size" ""
        !          1084: is enabled.
        !          1085: 
        !          1086: .TP
        !          1087: .BR charon.plugins.kernel-netlink.retries " [0]"
        !          1088: Number of Netlink message retransmissions to send on timeout.
        !          1089: 
        !          1090: .TP
        !          1091: .BR charon.plugins.kernel-netlink.roam_events " [yes]"
        !          1092: Whether to trigger roam events when interfaces, addresses or routes change.
        !          1093: 
        !          1094: .TP
        !          1095: .BR charon.plugins.kernel-netlink.set_proto_port_transport_sa " [no]"
        !          1096: Whether to set protocol and ports in the selector installed on transport mode
        !          1097: IPsec SAs in the kernel. While doing so enforces policies for inbound traffic,
        !          1098: it also prevents the use of a single IPsec SA by more than one traffic selector.
        !          1099: 
        !          1100: .TP
        !          1101: .B charon.plugins.kernel-netlink.spdh_thresh
        !          1102: .br
        !          1103: XFRM policy hashing threshold configuration for IPv4 and IPv6.
        !          1104: 
        !          1105: The section defines hashing thresholds to configure in the kernel during daemon
        !          1106: startup. Each address family takes a threshold for the local subnet of an IPsec
        !          1107: policy (src in out\-policies, dst in in\- and forward\-policies) and the remote
        !          1108: subnet (dst in out\-policies, src in in\- and forward\-policies).
        !          1109: 
        !          1110: If the subnet has more or equal net bits than the threshold, the first threshold
        !          1111: bits are used to calculate a hash to lookup the policy.
        !          1112: 
        !          1113: Policy hashing thresholds are not supported before Linux 3.18 and might conflict
        !          1114: with socket policies before Linux 4.8.
        !          1115: 
        !          1116: .TP
        !          1117: .BR charon.plugins.kernel-netlink.spdh_thresh.ipv4.lbits " [32]"
        !          1118: Local subnet XFRM policy hashing threshold for IPv4.
        !          1119: 
        !          1120: .TP
        !          1121: .BR charon.plugins.kernel-netlink.spdh_thresh.ipv4.rbits " [32]"
        !          1122: Remote subnet XFRM policy hashing threshold for IPv4.
        !          1123: 
        !          1124: .TP
        !          1125: .BR charon.plugins.kernel-netlink.spdh_thresh.ipv6.lbits " [128]"
        !          1126: Local subnet XFRM policy hashing threshold for IPv6.
        !          1127: 
        !          1128: .TP
        !          1129: .BR charon.plugins.kernel-netlink.spdh_thresh.ipv6.rbits " [128]"
        !          1130: Remote subnet XFRM policy hashing threshold for IPv6.
        !          1131: 
        !          1132: .TP
        !          1133: .BR charon.plugins.kernel-netlink.timeout " [0]"
        !          1134: Netlink message retransmission timeout, 0 to disable retransmissions.
        !          1135: 
        !          1136: .TP
        !          1137: .BR charon.plugins.kernel-netlink.xfrm_acq_expires " [165]"
        !          1138: Lifetime of XFRM acquire state created by the kernel when traffic matches a trap
        !          1139: policy. The value gets written to /proc/sys/net/core/xfrm_acq_expires.
        !          1140: Indirectly controls the delay between XFRM acquire messages triggered by the
        !          1141: kernel for a trap policy. The same value is used as timeout for SPIs allocated
        !          1142: by the kernel. The default value equals the total   retransmission timeout for
        !          1143: IKE messages, see IKEv2 RETRANSMISSION in
        !          1144: .RB "" "strongswan.conf" "(5)."
        !          1145: 
        !          1146: 
        !          1147: .TP
        !          1148: .BR charon.plugins.kernel-pfkey.events_buffer_size " [0]"
        !          1149: Size of the receive buffer for the event socket (0 for default size). Because
        !          1150: events are received asynchronously installing e.g. lots of policies may require
        !          1151: a larger buffer than the default on certain platforms in order to receive all
        !          1152: messages.
        !          1153: 
        !          1154: .TP
        !          1155: .BR charon.plugins.kernel-pfkey.route_via_internal " [no]"
        !          1156: Whether to use the internal or external interface in installed routes. The
        !          1157: internal interface is the one where the IP address contained in the local
        !          1158: traffic selector is located, the external interface is the one over which the
        !          1159: destination address of the IPsec tunnel can be reached. This is not relevant if
        !          1160: virtual IPs are used, for which a TUN device is created that's used in the
        !          1161: routes.
        !          1162: 
        !          1163: .TP
        !          1164: .BR charon.plugins.kernel-pfroute.vip_wait " [1000]"
        !          1165: Time in ms to wait until virtual IP addresses appear/disappear before failing.
        !          1166: 
        !          1167: .TP
        !          1168: .BR charon.plugins.led.activity_led " []"
        !          1169: .TP
        !          1170: .BR charon.plugins.led.blink_time " [50]"
        !          1171: .TP
        !          1172: .B charon.plugins.load-tester
        !          1173: .br
        !          1174: Section to configure the load\-tester plugin, see LOAD TESTS in
        !          1175: .RB "" "strongswan.conf" "(5)"
        !          1176: for details.
        !          1177: 
        !          1178: .TP
        !          1179: .B charon.plugins.load-tester.addrs
        !          1180: .br
        !          1181: Section that contains key/value pairs with address pools (in CIDR notation) to
        !          1182: use for a specific network interface e.g. eth0 = 10.10.0.0/16.
        !          1183: 
        !          1184: .TP
        !          1185: .BR charon.plugins.load-tester.addrs_keep " [no]"
        !          1186: Whether to keep dynamic addresses even after the associated SA got terminated.
        !          1187: 
        !          1188: .TP
        !          1189: .BR charon.plugins.load-tester.addrs_prefix " [16]"
        !          1190: Network prefix length to use when installing dynamic addresses. If set to \-1 the
        !          1191: full address is used (i.e. 32 or 128).
        !          1192: 
        !          1193: .TP
        !          1194: .BR charon.plugins.load-tester.ca_dir " []"
        !          1195: Directory to load (intermediate) CA certificates from.
        !          1196: 
        !          1197: .TP
        !          1198: .BR charon.plugins.load-tester.child_rekey " [600]"
        !          1199: Seconds to start CHILD_SA rekeying after setup.
        !          1200: 
        !          1201: .TP
        !          1202: .BR charon.plugins.load-tester.crl " []"
        !          1203: URI to a CRL to include as certificate distribution point in generated
        !          1204: certificates.
        !          1205: 
        !          1206: .TP
        !          1207: .BR charon.plugins.load-tester.delay " [0]"
        !          1208: Delay between initiations for each thread.
        !          1209: 
        !          1210: .TP
        !          1211: .BR charon.plugins.load-tester.delete_after_established " [no]"
        !          1212: Delete an IKE_SA as soon as it has been established.
        !          1213: 
        !          1214: .TP
        !          1215: .BR charon.plugins.load-tester.digest " [sha1]"
        !          1216: Digest algorithm used when issuing certificates.
        !          1217: 
        !          1218: .TP
        !          1219: .BR charon.plugins.load-tester.dpd_delay " [0]"
        !          1220: DPD delay to use in load test.
        !          1221: 
        !          1222: .TP
        !          1223: .BR charon.plugins.load-tester.dynamic_port " [0]"
        !          1224: Base port to be used for requests (each client uses a different port).
        !          1225: 
        !          1226: .TP
        !          1227: .BR charon.plugins.load-tester.eap_password " [default-pwd]"
        !          1228: EAP secret to use in load test.
        !          1229: 
        !          1230: .TP
        !          1231: .BR charon.plugins.load-tester.enable " [no]"
        !          1232: Enable the load testing plugin.
        !          1233: .RB "" "WARNING" ":"
        !          1234: Never enable this plugin on
        !          1235: productive systems. It provides preconfigured credentials and allows an attacker
        !          1236: to authenticate as any user.
        !          1237: 
        !          1238: .TP
        !          1239: .BR charon.plugins.load-tester.esp " [aes128-sha1]"
        !          1240: CHILD_SA proposal to use for load tests.
        !          1241: 
        !          1242: .TP
        !          1243: .BR charon.plugins.load-tester.fake_kernel " [no]"
        !          1244: Fake the kernel interface to allow load\-testing against self.
        !          1245: 
        !          1246: .TP
        !          1247: .BR charon.plugins.load-tester.ike_rekey " [0]"
        !          1248: Seconds to start IKE_SA rekeying after setup.
        !          1249: 
        !          1250: .TP
        !          1251: .BR charon.plugins.load-tester.init_limit " [0]"
        !          1252: Global limit of concurrently established SAs during load test.
        !          1253: 
        !          1254: .TP
        !          1255: .BR charon.plugins.load-tester.initiator " [0.0.0.0]"
        !          1256: Address to initiate from.
        !          1257: 
        !          1258: .TP
        !          1259: .BR charon.plugins.load-tester.initiator_auth " [pubkey]"
        !          1260: Authentication method(s) the initiator uses.
        !          1261: 
        !          1262: .TP
        !          1263: .BR charon.plugins.load-tester.initiator_id " []"
        !          1264: Initiator ID used in load test.
        !          1265: 
        !          1266: .TP
        !          1267: .BR charon.plugins.load-tester.initiator_match " []"
        !          1268: Initiator ID to match against as responder.
        !          1269: 
        !          1270: .TP
        !          1271: .BR charon.plugins.load-tester.initiator_tsi " []"
        !          1272: Traffic selector on initiator side, as proposed by initiator.
        !          1273: 
        !          1274: .TP
        !          1275: .BR charon.plugins.load-tester.initiator_tsr " []"
        !          1276: Traffic selector on responder side, as proposed by initiator.
        !          1277: 
        !          1278: .TP
        !          1279: .BR charon.plugins.load-tester.initiators " [0]"
        !          1280: Number of concurrent initiator threads to use in load test.
        !          1281: 
        !          1282: .TP
        !          1283: .BR charon.plugins.load-tester.issuer_cert " []"
        !          1284: Path to the issuer certificate (if not configured a hard\-coded default value is
        !          1285: used).
        !          1286: 
        !          1287: .TP
        !          1288: .BR charon.plugins.load-tester.issuer_key " []"
        !          1289: Path to private key that is used to issue certificates (if not configured a
        !          1290: hard\-coded default value is used).
        !          1291: 
        !          1292: .TP
        !          1293: .BR charon.plugins.load-tester.iterations " [1]"
        !          1294: Number of IKE_SAs to initiate by each initiator in load test.
        !          1295: 
        !          1296: .TP
        !          1297: .BR charon.plugins.load-tester.mode " [tunnel]"
        !          1298: IPsec mode to use, one of
        !          1299: .RI "" "tunnel" ","
        !          1300: .RI "" "transport" ","
        !          1301: or
        !          1302: .RI "" "beet" "."
        !          1303: 
        !          1304: 
        !          1305: .TP
        !          1306: .BR charon.plugins.load-tester.pool " []"
        !          1307: Provide INTERNAL_IPV4_ADDRs from a named pool.
        !          1308: 
        !          1309: .TP
        !          1310: .BR charon.plugins.load-tester.preshared_key " [<default-psk>]"
        !          1311: Preshared key to use in load test.
        !          1312: 
        !          1313: .TP
        !          1314: .BR charon.plugins.load-tester.proposal " [aes128-sha1-modp768]"
        !          1315: IKE proposal to use in load test.
        !          1316: 
        !          1317: .TP
        !          1318: .BR charon.plugins.load-tester.request_virtual_ip " [no]"
        !          1319: Request an INTERNAL_IPV4_ADDR from the server.
        !          1320: 
        !          1321: .TP
        !          1322: .BR charon.plugins.load-tester.responder " [127.0.0.1]"
        !          1323: Address to initiation connections to.
        !          1324: 
        !          1325: .TP
        !          1326: .BR charon.plugins.load-tester.responder_auth " [pubkey]"
        !          1327: Authentication method(s) the responder uses.
        !          1328: 
        !          1329: .TP
        !          1330: .BR charon.plugins.load-tester.responder_id " []"
        !          1331: Responder ID used in load test.
        !          1332: 
        !          1333: .TP
        !          1334: .BR charon.plugins.load-tester.responder_tsi " [initiator_tsi]"
        !          1335: Traffic selector on initiator side, as narrowed by responder.
        !          1336: 
        !          1337: .TP
        !          1338: .BR charon.plugins.load-tester.responder_tsr " [initiator_tsr]"
        !          1339: Traffic selector on responder side, as narrowed by responder.
        !          1340: 
        !          1341: .TP
        !          1342: .BR charon.plugins.load-tester.shutdown_when_complete " [no]"
        !          1343: Shutdown the daemon after all IKE_SAs have been established.
        !          1344: 
        !          1345: .TP
        !          1346: .BR charon.plugins.load-tester.socket " [unix://${piddir}/charon.ldt]"
        !          1347: Socket provided by the load\-tester plugin.
        !          1348: 
        !          1349: .TP
        !          1350: .BR charon.plugins.load-tester.version " [0]"
        !          1351: IKE version to use (0 means use IKEv2 as initiator and accept any version as
        !          1352: responder).
        !          1353: 
        !          1354: .TP
        !          1355: .BR charon.plugins.lookip.socket " [unix://${piddir}/charon.lkp]"
        !          1356: Socket provided by the lookip plugin.
        !          1357: 
        !          1358: .TP
        !          1359: .BR charon.plugins.ntru.parameter_set " [optimum]"
        !          1360: The following parameter sets are available:
        !          1361: .RB "" "x9_98_speed" ","
        !          1362: .RB "" "x9_98_bandwidth" ","
        !          1363: .RB "" "x9_98_balance" ""
        !          1364: and
        !          1365: .RB "" "optimum" ","
        !          1366: the last set not being
        !          1367: part of the X9.98 standard but having the best performance.
        !          1368: 
        !          1369: .TP
        !          1370: .BR charon.plugins.openssl.engine_id " [pkcs11]"
        !          1371: ENGINE ID to use in the OpenSSL plugin.
        !          1372: 
        !          1373: .TP
        !          1374: .BR charon.plugins.openssl.fips_mode " [0]"
        !          1375: Set OpenSSL FIPS mode: disabled(0), enabled(1), Suite B enabled(2).
        !          1376: 
        !          1377: .TP
        !          1378: .BR charon.plugins.osx-attr.append " [yes]"
        !          1379: Whether DNS servers are appended to existing entries, instead of replacing them.
        !          1380: 
        !          1381: .TP
        !          1382: .B charon.plugins.p-cscf.enable
        !          1383: .br
        !          1384: Section to enable requesting P\-CSCF server addresses for individual connections.
        !          1385: 
        !          1386: .TP
        !          1387: .BR charon.plugins.p-cscf.enable.<conn> " [no]"
        !          1388: <conn> is the name of a connection with an ePDG from which to request P\-CSCF
        !          1389: server addresses.  Requests will be sent for addresses of the same families for
        !          1390: which internal IPs are requested.
        !          1391: 
        !          1392: .TP
        !          1393: .B charon.plugins.pkcs11.modules
        !          1394: .br
        !          1395: List of available PKCS#11 modules.
        !          1396: 
        !          1397: .TP
        !          1398: .BR charon.plugins.pkcs11.modules.<name>.load_certs " [yes]"
        !          1399: Whether to automatically load certificates from tokens.
        !          1400: 
        !          1401: .TP
        !          1402: .BR charon.plugins.pkcs11.modules.<name>.os_locking " [no]"
        !          1403: Whether OS locking should be enabled for this module.
        !          1404: 
        !          1405: .TP
        !          1406: .BR charon.plugins.pkcs11.modules.<name>.path " []"
        !          1407: Full path to the shared object file of this PKCS#11 module.
        !          1408: 
        !          1409: .TP
        !          1410: .BR charon.plugins.pkcs11.reload_certs " [no]"
        !          1411: Reload certificates from all tokens if charon receives a SIGHUP.
        !          1412: 
        !          1413: .TP
        !          1414: .BR charon.plugins.pkcs11.use_dh " [no]"
        !          1415: Whether the PKCS#11 modules should be used for DH and ECDH (see
        !          1416: .RI "" "use_ecc" ""
        !          1417: option).
        !          1418: 
        !          1419: .TP
        !          1420: .BR charon.plugins.pkcs11.use_ecc " [no]"
        !          1421: Whether the PKCS#11 modules should be used for ECDH and ECDSA public key
        !          1422: operations. ECDSA private keys can be used regardless of this option.
        !          1423: 
        !          1424: .TP
        !          1425: .BR charon.plugins.pkcs11.use_hasher " [no]"
        !          1426: Whether the PKCS#11 modules should be used to hash data.
        !          1427: 
        !          1428: .TP
        !          1429: .BR charon.plugins.pkcs11.use_pubkey " [no]"
        !          1430: Whether the PKCS#11 modules should be used for public key operations, even for
        !          1431: keys not stored on tokens.
        !          1432: 
        !          1433: .TP
        !          1434: .BR charon.plugins.pkcs11.use_rng " [no]"
        !          1435: Whether the PKCS#11 modules should be used as RNG.
        !          1436: 
        !          1437: .TP
        !          1438: .BR charon.plugins.radattr.dir " []"
        !          1439: Directory where RADIUS attributes are stored in client\-ID specific files.
        !          1440: 
        !          1441: .TP
        !          1442: .BR charon.plugins.radattr.message_id " [-1]"
        !          1443: Attributes are added to all IKE_AUTH messages by default (\-1), or only to the
        !          1444: IKE_AUTH message with the given IKEv2 message ID.
        !          1445: 
        !          1446: .TP
        !          1447: .BR charon.plugins.random.random " [${random_device}]"
        !          1448: File to read random bytes from.
        !          1449: 
        !          1450: .TP
        !          1451: .BR charon.plugins.random.strong_equals_true " [no]"
        !          1452: If set to yes the RNG_STRONG class reads random bytes from the same source as
        !          1453: the RNG_TRUE class.
        !          1454: 
        !          1455: .TP
        !          1456: .BR charon.plugins.random.urandom " [${urandom_device}]"
        !          1457: File to read pseudo random bytes from.
        !          1458: 
        !          1459: .TP
        !          1460: .BR charon.plugins.resolve.file " [/etc/resolv.conf]"
        !          1461: File where to add DNS server entries.
        !          1462: 
        !          1463: .TP
        !          1464: .BR charon.plugins.resolve.resolvconf.iface_prefix " [lo.inet.ipsec.]"
        !          1465: Prefix used for interface names sent to
        !          1466: .RB "" "resolvconf" "(8)."
        !          1467: The nameserver
        !          1468: address is appended to this prefix to make it unique.  The result has to be a
        !          1469: valid interface name according to the rules defined by resolvconf.  Also, it
        !          1470: should have a high priority according to the order defined in
        !          1471: .RB "" "interface\-order" "(5)."
        !          1472: 
        !          1473: 
        !          1474: .TP
        !          1475: .BR charon.plugins.revocation.enable_crl " [yes]"
        !          1476: Whether CRL validation should be enabled.
        !          1477: 
        !          1478: .TP
        !          1479: .BR charon.plugins.revocation.enable_ocsp " [yes]"
        !          1480: Whether OCSP validation should be enabled.
        !          1481: 
        !          1482: .TP
        !          1483: .BR charon.plugins.save-keys.esp " [no]"
        !          1484: Whether to save ESP keys.
        !          1485: 
        !          1486: .TP
        !          1487: .BR charon.plugins.save-keys.ike " [no]"
        !          1488: Whether to save IKE keys.
        !          1489: 
        !          1490: .TP
        !          1491: .BR charon.plugins.save-keys.load " [no]"
        !          1492: Whether to load the plugin.
        !          1493: 
        !          1494: .TP
        !          1495: .BR charon.plugins.save-keys.wireshark_keys " []"
        !          1496: Directory where the keys are stored in the format supported by Wireshark. IKEv1
        !          1497: keys are stored in the
        !          1498: .RI "" "ikev1_decryption_table" ""
        !          1499: file. IKEv2 keys are stored in
        !          1500: the
        !          1501: .RI "" "ikev2_decryption_table" ""
        !          1502: file. Keys for ESP CHILD_SAs are stored in the
        !          1503: .RI "" "esp_sa" ""
        !          1504: file.
        !          1505: 
        !          1506: .TP
        !          1507: .BR charon.plugins.socket-default.fwmark " []"
        !          1508: Firewall mark to set on outbound packets.
        !          1509: 
        !          1510: .TP
        !          1511: .BR charon.plugins.socket-default.set_source " [yes]"
        !          1512: Set source address on outbound packets, if possible.
        !          1513: 
        !          1514: .TP
        !          1515: .BR charon.plugins.socket-default.set_sourceif " [no]"
        !          1516: Force sending interface on outbound packets, if possible. This allows using IPv6
        !          1517: link\-local addresses as tunnel endpoints.
        !          1518: 
        !          1519: .TP
        !          1520: .BR charon.plugins.socket-default.use_ipv4 " [yes]"
        !          1521: Listen on IPv4, if possible.
        !          1522: 
        !          1523: .TP
        !          1524: .BR charon.plugins.socket-default.use_ipv6 " [yes]"
        !          1525: Listen on IPv6, if possible.
        !          1526: 
        !          1527: .TP
        !          1528: .BR charon.plugins.sql.database " []"
        !          1529: Database URI for charon's SQL plugin. If it contains a password, make sure to
        !          1530: adjust the permissions of the config file accordingly.
        !          1531: 
        !          1532: .TP
        !          1533: .BR charon.plugins.sql.loglevel " [-1]"
        !          1534: Loglevel for logging to SQL database.
        !          1535: 
        !          1536: .TP
        !          1537: .BR charon.plugins.stroke.allow_swap " [yes]"
        !          1538: Analyze addresses/hostnames in
        !          1539: .RI "" "left|right" ""
        !          1540: to detect which side is local and
        !          1541: swap configuration options if necessary. If disabled
        !          1542: .RI "" "left" ""
        !          1543: is always
        !          1544: .RI "" "local" "."
        !          1545: 
        !          1546: 
        !          1547: .TP
        !          1548: .BR charon.plugins.stroke.ignore_missing_ca_basic_constraint " [no]"
        !          1549: Treat certificates in ipsec.d/cacerts and ipsec.conf ca sections as CA
        !          1550: certificates even if they don't contain a CA basic constraint.
        !          1551: 
        !          1552: .TP
        !          1553: .BR charon.plugins.stroke.max_concurrent " [4]"
        !          1554: Maximum number of stroke messages handled concurrently.
        !          1555: 
        !          1556: .TP
        !          1557: .BR charon.plugins.stroke.prevent_loglevel_changes " [no]"
        !          1558: If enabled log level changes via stroke socket are not allowed.
        !          1559: 
        !          1560: .TP
        !          1561: .BR charon.plugins.stroke.secrets_file " [${sysconfdir}/ipsec.secrets]"
        !          1562: Location of the ipsec.secrets file
        !          1563: 
        !          1564: .TP
        !          1565: .BR charon.plugins.stroke.socket " [unix://${piddir}/charon.ctl]"
        !          1566: Socket provided by the stroke plugin.
        !          1567: 
        !          1568: .TP
        !          1569: .BR charon.plugins.stroke.timeout " [0]"
        !          1570: Timeout in ms for any stroke command. Use 0 to disable the timeout.
        !          1571: 
        !          1572: .TP
        !          1573: .BR charon.plugins.systime-fix.interval " [0]"
        !          1574: Interval in seconds to check system time for validity. 0 disables the check.
        !          1575: 
        !          1576: .TP
        !          1577: .BR charon.plugins.systime-fix.reauth " [no]"
        !          1578: Whether to use reauth or delete if an invalid cert lifetime is detected.
        !          1579: 
        !          1580: .TP
        !          1581: .BR charon.plugins.systime-fix.threshold " []"
        !          1582: Threshold date where system time is considered valid. Disabled if not specified.
        !          1583: 
        !          1584: .TP
        !          1585: .BR charon.plugins.systime-fix.threshold_format " [%Y]"
        !          1586: .RB "" "strptime" "(3)"
        !          1587: format used to parse threshold option.
        !          1588: 
        !          1589: .TP
        !          1590: .BR charon.plugins.systime-fix.timeout " [0s]"
        !          1591: How long to wait for a valid system time if an interval is configured. 0 to
        !          1592: recheck indefinitely.
        !          1593: 
        !          1594: .TP
        !          1595: .BR charon.plugins.tnc-ifmap.client_cert " []"
        !          1596: Path to X.509 certificate file of IF\-MAP client.
        !          1597: 
        !          1598: .TP
        !          1599: .BR charon.plugins.tnc-ifmap.client_key " []"
        !          1600: Path to private key file of IF\-MAP client.
        !          1601: 
        !          1602: .TP
        !          1603: .BR charon.plugins.tnc-ifmap.device_name " []"
        !          1604: Unique name of strongSwan server as a PEP and/or PDP device.
        !          1605: 
        !          1606: .TP
        !          1607: .BR charon.plugins.tnc-ifmap.renew_session_interval " [150]"
        !          1608: Interval in seconds between periodic IF\-MAP RenewSession requests.
        !          1609: 
        !          1610: .TP
        !          1611: .BR charon.plugins.tnc-ifmap.server_cert " []"
        !          1612: Path to X.509 certificate file of IF\-MAP server.
        !          1613: 
        !          1614: .TP
        !          1615: .BR charon.plugins.tnc-ifmap.server_uri " [https://localhost:8444/imap]"
        !          1616: URI of the form [https://]servername[:port][/path].
        !          1617: 
        !          1618: .TP
        !          1619: .BR charon.plugins.tnc-ifmap.username_password " []"
        !          1620: Credentials of IF\-MAP client of the form username:password. If set, make sure to
        !          1621: adjust the permissions of the config file accordingly.
        !          1622: 
        !          1623: .TP
        !          1624: .BR charon.plugins.tnc-imc.dlclose " [yes]"
        !          1625: Unload IMC after use.
        !          1626: 
        !          1627: .TP
        !          1628: .BR charon.plugins.tnc-imc.preferred_language " [en]"
        !          1629: Preferred language for TNC recommendations.
        !          1630: 
        !          1631: .TP
        !          1632: .BR charon.plugins.tnc-imv.dlclose " [yes]"
        !          1633: Unload IMV after use.
        !          1634: 
        !          1635: .TP
        !          1636: .BR charon.plugins.tnc-imv.recommendation_policy " [default]"
        !          1637: TNC recommendation policy, one of
        !          1638: .RI "" "default" ","
        !          1639: .RI "" "any" ","
        !          1640: or
        !          1641: .RI "" "all" "."
        !          1642: 
        !          1643: 
        !          1644: .TP
        !          1645: .BR charon.plugins.tnc-pdp.pt_tls.enable " [yes]"
        !          1646: Enable PT\-TLS protocol on the strongSwan PDP.
        !          1647: 
        !          1648: .TP
        !          1649: .BR charon.plugins.tnc-pdp.pt_tls.port " [271]"
        !          1650: PT\-TLS server port the strongSwan PDP is listening on.
        !          1651: 
        !          1652: .TP
        !          1653: .BR charon.plugins.tnc-pdp.radius.enable " [yes]"
        !          1654: Enable RADIUS protocol on the strongSwan PDP.
        !          1655: 
        !          1656: .TP
        !          1657: .BR charon.plugins.tnc-pdp.radius.method " [ttls]"
        !          1658: EAP tunnel method to be used.
        !          1659: 
        !          1660: .TP
        !          1661: .BR charon.plugins.tnc-pdp.radius.port " [1812]"
        !          1662: RADIUS server port the strongSwan PDP is listening on.
        !          1663: 
        !          1664: .TP
        !          1665: .BR charon.plugins.tnc-pdp.radius.secret " []"
        !          1666: Shared RADIUS secret between strongSwan PDP and NAS. If set, make sure to adjust
        !          1667: the permissions of the config file accordingly.
        !          1668: 
        !          1669: .TP
        !          1670: .BR charon.plugins.tnc-pdp.server " []"
        !          1671: Name of the strongSwan PDP as contained in the AAA certificate.
        !          1672: 
        !          1673: .TP
        !          1674: .BR charon.plugins.tnc-pdp.timeout " []"
        !          1675: Timeout in seconds before closing incomplete connections.
        !          1676: 
        !          1677: .TP
        !          1678: .BR charon.plugins.tnccs-11.max_message_size " [45000]"
        !          1679: Maximum size of a PA\-TNC message (XML & Base64 encoding).
        !          1680: 
        !          1681: .TP
        !          1682: .BR charon.plugins.tnccs-20.max_batch_size " [65522]"
        !          1683: Maximum size of a PB\-TNC batch (upper limit via PT\-EAP = 65529).
        !          1684: 
        !          1685: .TP
        !          1686: .BR charon.plugins.tnccs-20.max_message_size " [65490]"
        !          1687: Maximum size of a PA\-TNC message (upper limit via PT\-EAP = 65497).
        !          1688: 
        !          1689: .TP
        !          1690: .BR charon.plugins.tnccs-20.mutual " [no]"
        !          1691: Enable PB\-TNC mutual protocol.
        !          1692: 
        !          1693: .TP
        !          1694: .BR charon.plugins.tnccs-20.tests.pb_tnc_noskip " [no]"
        !          1695: Send an unsupported PB\-TNC message type with the NOSKIP flag set.
        !          1696: 
        !          1697: .TP
        !          1698: .BR charon.plugins.tnccs-20.tests.pb_tnc_version " [2]"
        !          1699: Send a PB\-TNC batch with a modified PB\-TNC version.
        !          1700: 
        !          1701: .TP
        !          1702: .BR charon.plugins.tpm.fips_186_4 " [no]"
        !          1703: Is the TPM 2.0 FIPS\-186\-4 compliant, forcing e.g. the use of the default salt
        !          1704: length instead of maximum salt length with RSAPSS padding.
        !          1705: 
        !          1706: .TP
        !          1707: .BR charon.plugins.tpm.tcti.name " [device|tabrmd]"
        !          1708: Name of TPM 2.0 TCTI library. Valid values:
        !          1709: .RI "" "tabrmd" ","
        !          1710: .RI "" "device" ""
        !          1711: or
        !          1712: .RI "" "mssim" "."
        !          1713: Defaults are
        !          1714: .RI "" "device" ""
        !          1715: if the
        !          1716: .RI "" "/dev/tpmrm0" ""
        !          1717: in\-kernel TPM 2.0 resource manager
        !          1718: device exists, and
        !          1719: .RI "" "tabrmd" ""
        !          1720: otherwise, requiring the d\-bus based TPM 2.0 access
        !          1721: broker and resource manager to be available.
        !          1722: 
        !          1723: .TP
        !          1724: .BR charon.plugins.tpm.tcti.opts " [/dev/tpmrm0|<none>]"
        !          1725: Options for the TPM 2.0 TCTI library. Defaults are
        !          1726: .RI "" "/dev/tpmrm0" ""
        !          1727: if the TCTI
        !          1728: library name is
        !          1729: .RI "" "device" ""
        !          1730: and no options otherwise.
        !          1731: 
        !          1732: .TP
        !          1733: .BR charon.plugins.tpm.use_rng " [no]"
        !          1734: Whether the TPM should be used as RNG.
        !          1735: 
        !          1736: .TP
        !          1737: .BR charon.plugins.unbound.dlv_anchors " []"
        !          1738: File to read trusted keys for DLV (DNSSEC Lookaside Validation) from. It uses
        !          1739: the same format as
        !          1740: .RI "" "trust_anchors" "."
        !          1741: Only one DLV can be configured, which is
        !          1742: then used as a root trusted DLV, this means that it is a lookaside for the root.
        !          1743: 
        !          1744: .TP
        !          1745: .BR charon.plugins.unbound.resolv_conf " [/etc/resolv.conf]"
        !          1746: File to read DNS resolver configuration from.
        !          1747: 
        !          1748: .TP
        !          1749: .BR charon.plugins.unbound.trust_anchors " [/etc/ipsec.d/dnssec.keys]"
        !          1750: File to read DNSSEC trust anchors from (usually root zone KSK). The format of
        !          1751: the file is the standard DNS Zone file format, anchors can be stored as DS or
        !          1752: DNSKEY entries in the file.
        !          1753: 
        !          1754: .TP
        !          1755: .BR charon.plugins.updown.dns_handler " [no]"
        !          1756: Whether the updown script should handle DNS servers assigned via IKEv1 Mode
        !          1757: Config or IKEv2 Config Payloads (if enabled they can't be handled by other
        !          1758: plugins, like resolve)
        !          1759: 
        !          1760: .TP
        !          1761: .BR charon.plugins.vici.socket " [unix://${piddir}/charon.vici]"
        !          1762: Socket the vici plugin serves clients.
        !          1763: 
        !          1764: .TP
        !          1765: .BR charon.plugins.whitelist.enable " [yes]"
        !          1766: Enable loaded whitelist plugin.
        !          1767: 
        !          1768: .TP
        !          1769: .BR charon.plugins.whitelist.socket " [unix://${piddir}/charon.wlst]"
        !          1770: Socket provided by the whitelist plugin.
        !          1771: 
        !          1772: .TP
        !          1773: .BR charon.plugins.wolfssl.fips_mode " [no]"
        !          1774: Enable to prevent loading the plugin if wolfSSL is not in FIPS mode.
        !          1775: 
        !          1776: .TP
        !          1777: .BR charon.plugins.xauth-eap.backend " [radius]"
        !          1778: EAP plugin to be used as backend for XAuth credential verification.
        !          1779: 
        !          1780: .TP
        !          1781: .BR charon.plugins.xauth-pam.pam_service " [login]"
        !          1782: PAM service to be used for authentication.
        !          1783: 
        !          1784: .TP
        !          1785: .BR charon.plugins.xauth-pam.session " [no]"
        !          1786: Open/close a PAM session for each active IKE_SA.
        !          1787: 
        !          1788: .TP
        !          1789: .BR charon.plugins.xauth-pam.trim_email " [yes]"
        !          1790: If an email address is received as an XAuth username, trim it to just the
        !          1791: username part.
        !          1792: 
        !          1793: .TP
        !          1794: .BR charon.port " [500]"
        !          1795: UDP port used locally. If set to 0 a random port will be allocated.
        !          1796: 
        !          1797: .TP
        !          1798: .BR charon.port_nat_t " [4500]"
        !          1799: UDP port used locally in case of NAT\-T. If set to 0 a random port will be
        !          1800: allocated.  Has to be different from
        !          1801: .RB "" "charon.port" ","
        !          1802: otherwise a random port
        !          1803: will be allocated.
        !          1804: 
        !          1805: .TP
        !          1806: .BR charon.prefer_best_path " [no]"
        !          1807: By default, charon keeps SAs on the routing path with addresses it previously
        !          1808: used if that path is still usable. By setting this option to yes, it tries more
        !          1809: aggressively to update SAs with MOBIKE on routing priority changes using the
        !          1810: cheapest path. This adds more noise, but allows to dynamically adapt SAs to
        !          1811: routing priority changes. This option has no effect if MOBIKE is not supported
        !          1812: or disabled.
        !          1813: 
        !          1814: .TP
        !          1815: .BR charon.prefer_configured_proposals " [yes]"
        !          1816: Prefer locally configured proposals for IKE/IPsec over supplied ones as
        !          1817: responder (disabling this can avoid keying retries due to INVALID_KE_PAYLOAD
        !          1818: notifies).
        !          1819: 
        !          1820: .TP
        !          1821: .BR charon.prefer_temporary_addrs " [no]"
        !          1822: By default, permanent IPv6 source addresses are preferred over temporary ones
        !          1823: (RFC 4941), to make connections more stable. Enable this option to reverse this.
        !          1824: 
        !          1825: It also affects which IPv6 addresses are announced as additional addresses if
        !          1826: MOBIKE is used.  If the option is disabled, only permanent addresses are sent,
        !          1827: and only temporary ones if it is enabled.
        !          1828: 
        !          1829: .TP
        !          1830: .BR charon.process_route " [yes]"
        !          1831: Process RTM_NEWROUTE and RTM_DELROUTE events.
        !          1832: 
        !          1833: .TP
        !          1834: .B charon.processor.priority_threads
        !          1835: .br
        !          1836: Section to configure the number of reserved threads per priority class see JOB
        !          1837: PRIORITY MANAGEMENT in
        !          1838: .RB "" "strongswan.conf" "(5)."
        !          1839: 
        !          1840: 
        !          1841: .TP
        !          1842: .BR charon.rdn_matching " [strict]"
        !          1843: How RDNs in subject DNs of certificates are matched against configured
        !          1844: identities. Possible values are
        !          1845: .RI "" "strict" ""
        !          1846: (the default),
        !          1847: .RI "" "reordered" ","
        !          1848: and
        !          1849: .RI "" "relaxed" "."
        !          1850: With
        !          1851: .RI "" "strict" ""
        !          1852: the number, type and order of all RDNs has to match,
        !          1853: wildcards (*) for the values of RDNs are allowed (that's the case for all three
        !          1854: variants). Using
        !          1855: .RI "" "reordered" ""
        !          1856: also matches DNs if the RDNs appear in a different
        !          1857: order, the number and type still has to match. Finally,
        !          1858: .RI "" "relaxed" ""
        !          1859: also allows
        !          1860: matches of DNs that contain more RDNs than the configured identity (missing RDNs
        !          1861: are treated like a wildcard match).
        !          1862: 
        !          1863: Note that
        !          1864: .RI "" "reordered" ""
        !          1865: and
        !          1866: .RI "" "relaxed" ""
        !          1867: impose a considerable overhead on memory
        !          1868: usage and runtime, in particular, for mismatches, compared to
        !          1869: .RI "" "strict" "."
        !          1870: 
        !          1871: 
        !          1872: .TP
        !          1873: .BR charon.receive_delay " [0]"
        !          1874: Delay in ms for receiving packets, to simulate larger RTT.
        !          1875: 
        !          1876: .TP
        !          1877: .BR charon.receive_delay_request " [yes]"
        !          1878: Delay request messages.
        !          1879: 
        !          1880: .TP
        !          1881: .BR charon.receive_delay_response " [yes]"
        !          1882: Delay response messages.
        !          1883: 
        !          1884: .TP
        !          1885: .BR charon.receive_delay_type " [0]"
        !          1886: Specific IKEv2 message type to delay, 0 for any.
        !          1887: 
        !          1888: .TP
        !          1889: .BR charon.replay_window " [32]"
        !          1890: Size of the AH/ESP replay window, in packets.
        !          1891: 
        !          1892: .TP
        !          1893: .BR charon.retransmit_base " [1.8]"
        !          1894: Base to use for calculating exponential back off, see IKEv2 RETRANSMISSION in
        !          1895: .RB "" "strongswan.conf" "(5)."
        !          1896: 
        !          1897: 
        !          1898: .TP
        !          1899: .BR charon.retransmit_jitter " [0]"
        !          1900: Maximum jitter in percent to apply randomly to calculated retransmission timeout
        !          1901: (0 to disable).
        !          1902: 
        !          1903: .TP
        !          1904: .BR charon.retransmit_limit " [0]"
        !          1905: Upper limit in seconds for calculated retransmission timeout (0 to disable).
        !          1906: 
        !          1907: .TP
        !          1908: .BR charon.retransmit_timeout " [4.0]"
        !          1909: Timeout in seconds before sending first retransmit.
        !          1910: 
        !          1911: .TP
        !          1912: .BR charon.retransmit_tries " [5]"
        !          1913: Number of times to retransmit a packet before giving up.
        !          1914: 
        !          1915: .TP
        !          1916: .BR charon.retry_initiate_interval " [0]"
        !          1917: Interval in seconds to use when retrying to initiate an IKE_SA (e.g. if DNS
        !          1918: resolution failed), 0 to disable retries.
        !          1919: 
        !          1920: .TP
        !          1921: .BR charon.reuse_ikesa " [yes]"
        !          1922: Initiate CHILD_SA within existing IKE_SAs (always enabled for IKEv1).
        !          1923: 
        !          1924: .TP
        !          1925: .BR charon.routing_table " []"
        !          1926: Numerical routing table to install routes to.
        !          1927: 
        !          1928: .TP
        !          1929: .BR charon.routing_table_prio " []"
        !          1930: Priority of the routing table.
        !          1931: 
        !          1932: .TP
        !          1933: .BR charon.rsa_pss " [no]"
        !          1934: Whether to use RSA with PSS padding instead of PKCS#1 padding by default.
        !          1935: 
        !          1936: .TP
        !          1937: .BR charon.send_delay " [0]"
        !          1938: Delay in ms for sending packets, to simulate larger RTT.
        !          1939: 
        !          1940: .TP
        !          1941: .BR charon.send_delay_request " [yes]"
        !          1942: Delay request messages.
        !          1943: 
        !          1944: .TP
        !          1945: .BR charon.send_delay_response " [yes]"
        !          1946: Delay response messages.
        !          1947: 
        !          1948: .TP
        !          1949: .BR charon.send_delay_type " [0]"
        !          1950: Specific IKEv2 message type to delay, 0 for any.
        !          1951: 
        !          1952: .TP
        !          1953: .BR charon.send_vendor_id " [no]"
        !          1954: Send strongSwan vendor ID payload
        !          1955: 
        !          1956: .TP
        !          1957: .BR charon.signature_authentication " [yes]"
        !          1958: Whether to enable Signature Authentication as per RFC 7427.
        !          1959: 
        !          1960: .TP
        !          1961: .BR charon.signature_authentication_constraints " [yes]"
        !          1962: If enabled, signature schemes configured in
        !          1963: .RI "" "rightauth" ","
        !          1964: in addition to getting
        !          1965: used as constraints against signature schemes employed in the certificate chain,
        !          1966: are also used as constraints against the signature scheme used by peers during
        !          1967: IKEv2.
        !          1968: 
        !          1969: .TP
        !          1970: .BR charon.spi_label " [0x0000000000000000]"
        !          1971: Value mixed into the local IKE SPIs after applying
        !          1972: .RI "" "spi_mask" "."
        !          1973: 
        !          1974: 
        !          1975: .TP
        !          1976: .BR charon.spi_mask " [0x0000000000000000]"
        !          1977: Mask applied to local IKE SPIs before mixing in
        !          1978: .RI "" "spi_label" ""
        !          1979: (bits set will be
        !          1980: replaced with
        !          1981: .RI "" "spi_label" ")."
        !          1982: 
        !          1983: 
        !          1984: .TP
        !          1985: .BR charon.spi_max " [0xcfffffff]"
        !          1986: The upper limit for SPIs requested from the kernel for IPsec SAs.
        !          1987: 
        !          1988: .TP
        !          1989: .BR charon.spi_min " [0xc0000000]"
        !          1990: The lower limit for SPIs requested from the kernel for IPsec SAs. Should not be
        !          1991: set lower than 0x00000100 (256), as SPIs between 1 and 255 are reserved by IANA.
        !          1992: 
        !          1993: .TP
        !          1994: .B charon.start-scripts
        !          1995: .br
        !          1996: Section containing a list of scripts (name = path) that are executed when the
        !          1997: daemon is started.
        !          1998: 
        !          1999: .TP
        !          2000: .B charon.stop-scripts
        !          2001: .br
        !          2002: Section containing a list of scripts (name = path) that are executed when the
        !          2003: daemon is terminated.
        !          2004: 
        !          2005: .TP
        !          2006: .B charon.syslog
        !          2007: .br
        !          2008: Section to define syslog loggers, see LOGGER CONFIGURATION in
        !          2009: .RB "" "strongswan.conf" "(5)."
        !          2010: 
        !          2011: 
        !          2012: .TP
        !          2013: .B charon.syslog.<facility>
        !          2014: .br
        !          2015: <facility> is one of the supported syslog facilities, see LOGGER CONFIGURATION
        !          2016: in
        !          2017: .RB "" "strongswan.conf" "(5)."
        !          2018: 
        !          2019: 
        !          2020: .TP
        !          2021: .BR charon.syslog.<facility>.<subsystem> " [<default>]"
        !          2022: Loglevel for a specific subsystem.
        !          2023: 
        !          2024: .TP
        !          2025: .BR charon.syslog.<facility>.default " [1]"
        !          2026: Specifies the default loglevel to be used for subsystems for which no specific
        !          2027: loglevel is defined.
        !          2028: 
        !          2029: .TP
        !          2030: .BR charon.syslog.<facility>.ike_name " [no]"
        !          2031: Prefix each log entry with the connection name and a unique numerical identifier
        !          2032: for each IKE_SA.
        !          2033: 
        !          2034: .TP
        !          2035: .BR charon.syslog.identifier " []"
        !          2036: Global identifier used for an
        !          2037: .RB "" "openlog" "(3)"
        !          2038: call, prepended to each log message
        !          2039: by syslog.  If not configured,
        !          2040: .RB "" "openlog" "(3)"
        !          2041: is not called, so the value will
        !          2042: depend on system defaults (often the program name).
        !          2043: 
        !          2044: .TP
        !          2045: .BR charon.threads " [16]"
        !          2046: Number of worker threads in charon. Several of these are reserved for long
        !          2047: running tasks in internal modules and plugins. Therefore, make sure you don't
        !          2048: set this value too low. The number of idle worker threads listed in
        !          2049: .RI "" "ipsec statusall" ""
        !          2050: might be used as indicator on the number of reserved threads.
        !          2051: 
        !          2052: .TP
        !          2053: .BR charon.tls.cipher " []"
        !          2054: List of TLS encryption ciphers.
        !          2055: 
        !          2056: .TP
        !          2057: .BR charon.tls.key_exchange " []"
        !          2058: List of TLS key exchange methods.
        !          2059: 
        !          2060: .TP
        !          2061: .BR charon.tls.mac " []"
        !          2062: List of TLS MAC algorithms.
        !          2063: 
        !          2064: .TP
        !          2065: .BR charon.tls.suites " []"
        !          2066: List of TLS cipher suites.
        !          2067: 
        !          2068: .TP
        !          2069: .BR charon.tnc.tnc_config " [/etc/tnc_config]"
        !          2070: TNC IMC/IMV configuration file.
        !          2071: 
        !          2072: .TP
        !          2073: .BR charon.user " []"
        !          2074: Name of the user the daemon changes to after startup.
        !          2075: 
        !          2076: .TP
        !          2077: .BR charon.x509.enforce_critical " [yes]"
        !          2078: Discard certificates with unsupported or unknown critical extensions.
        !          2079: 
        !          2080: .TP
        !          2081: .BR charon-nm.ca_dir " [<default>]"
        !          2082: Directory from which to load CA certificates if no certificate is configured.
        !          2083: 
        !          2084: .TP
        !          2085: .B charon-systemd.journal
        !          2086: .br
        !          2087: Section to configure native systemd journal logger, very similar to the syslog
        !          2088: logger as described in LOGGER CONFIGURATION in
        !          2089: .RB "" "strongswan.conf" "(5)."
        !          2090: 
        !          2091: 
        !          2092: .TP
        !          2093: .BR charon-systemd.journal.<subsystem> " [<default>]"
        !          2094: Loglevel for a specific subsystem.
        !          2095: 
        !          2096: .TP
        !          2097: .BR charon-systemd.journal.default " [1]"
        !          2098: Specifies the default loglevel to be used for subsystems for which no specific
        !          2099: loglevel is defined.
        !          2100: 
        !          2101: .TP
        !          2102: .BR imv_policy_manager.command_allow " []"
        !          2103: Shell command to be executed with recommendation allow.
        !          2104: 
        !          2105: .TP
        !          2106: .BR imv_policy_manager.command_block " []"
        !          2107: Shell command to be executed with all other recommendations.
        !          2108: 
        !          2109: .TP
        !          2110: .BR imv_policy_manager.database " []"
        !          2111: Database URI for the database that stores the package information. If it
        !          2112: contains a password, make sure to adjust the permissions of the config file
        !          2113: accordingly.
        !          2114: 
        !          2115: .TP
        !          2116: .BR imv_policy_manager.load " [sqlite]"
        !          2117: Plugins to load in IMV policy manager.
        !          2118: 
        !          2119: .TP
        !          2120: .BR libimcv.debug_level " [1]"
        !          2121: Debug level for a stand\-alone
        !          2122: .RI "" "libimcv" ""
        !          2123: library.
        !          2124: 
        !          2125: .TP
        !          2126: .BR libimcv.load " [random nonce gmp pubkey x509]"
        !          2127: Plugins to load in IMC/IMVs with stand\-alone
        !          2128: .RI "" "libimcv" ""
        !          2129: library.
        !          2130: 
        !          2131: .TP
        !          2132: .BR libimcv.plugins.imc-attestation.aik_blob " []"
        !          2133: AIK encrypted private key blob file.
        !          2134: 
        !          2135: .TP
        !          2136: .BR libimcv.plugins.imc-attestation.aik_cert " []"
        !          2137: AIK certificate file.
        !          2138: 
        !          2139: .TP
        !          2140: .BR libimcv.plugins.imc-attestation.aik_handle " []"
        !          2141: AIK object handle.
        !          2142: 
        !          2143: .TP
        !          2144: .BR libimcv.plugins.imc-attestation.aik_pubkey " []"
        !          2145: AIK public key file.
        !          2146: 
        !          2147: .TP
        !          2148: .BR libimcv.plugins.imc-attestation.mandatory_dh_groups " [yes]"
        !          2149: Enforce mandatory Diffie\-Hellman groups.
        !          2150: 
        !          2151: .TP
        !          2152: .BR libimcv.plugins.imc-attestation.nonce_len " [20]"
        !          2153: DH nonce length.
        !          2154: 
        !          2155: .TP
        !          2156: .BR libimcv.plugins.imc-attestation.pcr17_after " []"
        !          2157: PCR17 value after measurement.
        !          2158: 
        !          2159: .TP
        !          2160: .BR libimcv.plugins.imc-attestation.pcr17_before " []"
        !          2161: PCR17 value before measurement.
        !          2162: 
        !          2163: .TP
        !          2164: .BR libimcv.plugins.imc-attestation.pcr17_meas " []"
        !          2165: Dummy measurement value extended into PCR17 if the TBOOT log is not available.
        !          2166: 
        !          2167: .TP
        !          2168: .BR libimcv.plugins.imc-attestation.pcr18_after " []"
        !          2169: PCR18 value after measurement.
        !          2170: 
        !          2171: .TP
        !          2172: .BR libimcv.plugins.imc-attestation.pcr18_before " []"
        !          2173: PCR18 value before measurement.
        !          2174: 
        !          2175: .TP
        !          2176: .BR libimcv.plugins.imc-attestation.pcr18_meas " []"
        !          2177: Dummy measurement value extended into PCR17 if the TBOOT log is not available.
        !          2178: 
        !          2179: .TP
        !          2180: .BR libimcv.plugins.imc-attestation.pcr_info " [no]"
        !          2181: Whether to send pcr_before and pcr_after info.
        !          2182: 
        !          2183: .TP
        !          2184: .BR libimcv.plugins.imc-attestation.use_quote2 " [yes]"
        !          2185: Use Quote2 AIK signature instead of Quote signature.
        !          2186: 
        !          2187: .TP
        !          2188: .BR libimcv.plugins.imc-attestation.use_version_info " [no]"
        !          2189: Version Info is included in Quote2 signature.
        !          2190: 
        !          2191: .TP
        !          2192: .BR libimcv.plugins.imc-hcd.push_info " [yes]"
        !          2193: Send quadruple info without being prompted.
        !          2194: 
        !          2195: .TP
        !          2196: .BR libimcv.plugins.imc-hcd.subtypes " []"
        !          2197: Section to define PWG HCD PA subtypes.
        !          2198: 
        !          2199: .TP
        !          2200: .BR libimcv.plugins.imc-hcd.subtypes.<section> " []"
        !          2201: Defines a PWG HCD PA subtype section. Recognized subtype section names are
        !          2202: .RI "" "system" ","
        !          2203: .RI "" "control" ","
        !          2204: .RI "" "marker" ","
        !          2205: .RI "" "finisher" ","
        !          2206: .RI "" "interface" ""
        !          2207: and
        !          2208: .RI "" "scanner" "."
        !          2209: 
        !          2210: 
        !          2211: .TP
        !          2212: .BR libimcv.plugins.imc-hcd.subtypes.<section>.<sw_type> " []"
        !          2213: Defines a software type section. Recognized software type section names are
        !          2214: .RI "" "firmware" ","
        !          2215: .RI "" "resident_application" ""
        !          2216: and
        !          2217: .RI "" "user_application" "."
        !          2218: 
        !          2219: 
        !          2220: .TP
        !          2221: .BR libimcv.plugins.imc-hcd.subtypes.<section>.<sw_type>.<software> " []"
        !          2222: Defines a software section having an arbitrary name.
        !          2223: 
        !          2224: .TP
        !          2225: .BR libimcv.plugins.imc-hcd.subtypes.<section>.<sw_type>.<software>.name " []"
        !          2226: Name of the software installed on the hardcopy device.
        !          2227: 
        !          2228: .TP
        !          2229: .BR libimcv.plugins.imc-hcd.subtypes.<section>.<sw_type>.<software>.patches " []"
        !          2230: String describing all patches applied to the given software on this hardcopy
        !          2231: device. The individual patches are separated by a newline character '\\n'.
        !          2232: 
        !          2233: .TP
        !          2234: .BR libimcv.plugins.imc-hcd.subtypes.<section>.<sw_type>.<software>.string_version " []"
        !          2235: String describing the version of the given software on this hardcopy device.
        !          2236: 
        !          2237: .TP
        !          2238: .BR libimcv.plugins.imc-hcd.subtypes.<section>.<sw_type>.<software>.version " []"
        !          2239: Hex\-encoded version string with a length of 16 octets consisting of the fields
        !          2240: major version number (4 octets), minor version number (4 octets), build number
        !          2241: (4 octets), service pack major number (2 octets) and service pack minor number
        !          2242: (2 octets).
        !          2243: 
        !          2244: .TP
        !          2245: .BR libimcv.plugins.imc-hcd.subtypes.<section>.attributes_natural_language " [en]"
        !          2246: Variable length natural language tag conforming to RFC 5646 specifies the
        !          2247: language to be used in the health assessment message of a given subtype.
        !          2248: 
        !          2249: .TP
        !          2250: .BR libimcv.plugins.imc-hcd.subtypes.system.certification_state " []"
        !          2251: Hex\-encoded certification state.
        !          2252: 
        !          2253: .TP
        !          2254: .BR libimcv.plugins.imc-hcd.subtypes.system.configuration_state " []"
        !          2255: Hex\-encoded configuration state.
        !          2256: 
        !          2257: .TP
        !          2258: .BR libimcv.plugins.imc-hcd.subtypes.system.machine_type_model " []"
        !          2259: String specifying the machine type and model of the hardcopy device.
        !          2260: 
        !          2261: .TP
        !          2262: .BR libimcv.plugins.imc-hcd.subtypes.system.pstn_fax_enabled " [no]"
        !          2263: Specifies if a PSTN facsimile interface is installed and enabled on the hardcopy
        !          2264: device.
        !          2265: 
        !          2266: .TP
        !          2267: .BR libimcv.plugins.imc-hcd.subtypes.system.time_source " []"
        !          2268: String specifying the hostname of the network time server used by the hardcopy
        !          2269: device.
        !          2270: 
        !          2271: .TP
        !          2272: .BR libimcv.plugins.imc-hcd.subtypes.system.user_application_enabled " [no]"
        !          2273: Specifies if users can dynamically download and execute applications on the
        !          2274: hardcopy device.
        !          2275: 
        !          2276: .TP
        !          2277: .BR libimcv.plugins.imc-hcd.subtypes.system.user_application_persistence_enabled " [no]"
        !          2278: Specifies if user dynamically downloaded applications can persist outside the
        !          2279: boundaries of a single job on the hardcopy device.
        !          2280: 
        !          2281: .TP
        !          2282: .BR libimcv.plugins.imc-hcd.subtypes.system.vendor_name " []"
        !          2283: String specifying the manufacturer of the hardcopy device.
        !          2284: 
        !          2285: .TP
        !          2286: .BR libimcv.plugins.imc-hcd.subtypes.system.vendor_smi_code " []"
        !          2287: Integer specifying the globally unique 24\-bit SMI code assigned to the
        !          2288: manufacturer of the hardcopy device.
        !          2289: 
        !          2290: .TP
        !          2291: .BR libimcv.plugins.imc-os.device_cert " []"
        !          2292: Manually set the path to the client device certificate (e.g.
        !          2293: /etc/pts/aikCert.der)
        !          2294: 
        !          2295: .TP
        !          2296: .BR libimcv.plugins.imc-os.device_handle " []"
        !          2297: Manually set handle to a private key bound to a smartcard or TPM (e.g.
        !          2298: 0x81010004)
        !          2299: 
        !          2300: .TP
        !          2301: .BR libimcv.plugins.imc-os.device_id " []"
        !          2302: Manually set the client device ID in hexadecimal format (e.g.
        !          2303: 1083f03988c9762703b1c1080c2e46f72b99cc31)
        !          2304: 
        !          2305: .TP
        !          2306: .BR libimcv.plugins.imc-os.device_pubkey " []"
        !          2307: Manually set the path to the client device public key (e.g. /etc/pts/aikPub.der)
        !          2308: 
        !          2309: .TP
        !          2310: .BR libimcv.plugins.imc-os.push_info " [yes]"
        !          2311: Send operating system info without being prompted.
        !          2312: 
        !          2313: .TP
        !          2314: .BR libimcv.plugins.imc-scanner.push_info " [yes]"
        !          2315: Send open listening ports without being prompted.
        !          2316: 
        !          2317: .TP
        !          2318: .BR libimcv.plugins.imc-swima.eid_epoch " [0x11223344]"
        !          2319: Set 32 bit epoch value for event IDs manually if software collector database is
        !          2320: not available.
        !          2321: 
        !          2322: .TP
        !          2323: .BR libimcv.plugins.imc-swima.subscriptions " [no]"
        !          2324: Accept SW Inventory or SW Events subscriptions.
        !          2325: 
        !          2326: .TP
        !          2327: .BR libimcv.plugins.imc-swima.swid_database " []"
        !          2328: URI to software collector database containing event timestamps, software
        !          2329: creation and deletion events and collected software identifiers. If it contains
        !          2330: a password, make sure to adjust the permissions of the config file accordingly.
        !          2331: 
        !          2332: .TP
        !          2333: .BR libimcv.plugins.imc-swima.swid_directory " [${prefix}/share]"
        !          2334: Directory where SWID tags are located.
        !          2335: 
        !          2336: .TP
        !          2337: .BR libimcv.plugins.imc-swima.swid_full " [no]"
        !          2338: Include file information in the XML\-encoded SWID tags.
        !          2339: 
        !          2340: .TP
        !          2341: .BR libimcv.plugins.imc-swima.swid_pretty " [no]"
        !          2342: Generate XML\-encoded SWID tags with pretty indentation.
        !          2343: 
        !          2344: .TP
        !          2345: .BR libimcv.plugins.imc-test.additional_ids " [0]"
        !          2346: Number of additional IMC IDs.
        !          2347: 
        !          2348: .TP
        !          2349: .BR libimcv.plugins.imc-test.command " [none]"
        !          2350: Command to be sent to the Test IMV.
        !          2351: 
        !          2352: .TP
        !          2353: .BR libimcv.plugins.imc-test.dummy_size " [0]"
        !          2354: Size of dummy attribute to be sent to the Test IMV (0 = disabled).
        !          2355: 
        !          2356: .TP
        !          2357: .BR libimcv.plugins.imc-test.retry " [no]"
        !          2358: Do a handshake retry.
        !          2359: 
        !          2360: .TP
        !          2361: .BR libimcv.plugins.imc-test.retry_command " []"
        !          2362: Command to be sent to the Test IMV in the handshake retry.
        !          2363: 
        !          2364: .TP
        !          2365: .BR libimcv.plugins.imv-attestation.cadir " []"
        !          2366: Path to directory with AIK cacerts.
        !          2367: 
        !          2368: .TP
        !          2369: .BR libimcv.plugins.imv-attestation.dh_group " [ecp256]"
        !          2370: Preferred Diffie\-Hellman group.
        !          2371: 
        !          2372: .TP
        !          2373: .BR libimcv.plugins.imv-attestation.hash_algorithm " [sha256]"
        !          2374: Preferred measurement hash algorithm.
        !          2375: 
        !          2376: .TP
        !          2377: .BR libimcv.plugins.imv-attestation.mandatory_dh_groups " [yes]"
        !          2378: Enforce mandatory Diffie\-Hellman groups.
        !          2379: 
        !          2380: .TP
        !          2381: .BR libimcv.plugins.imv-attestation.min_nonce_len " [0]"
        !          2382: DH minimum nonce length.
        !          2383: 
        !          2384: .TP
        !          2385: .BR libimcv.plugins.imv-os.remediation_uri " []"
        !          2386: URI pointing to operating system remediation instructions.
        !          2387: 
        !          2388: .TP
        !          2389: .BR libimcv.plugins.imv-scanner.remediation_uri " []"
        !          2390: URI pointing to scanner remediation instructions.
        !          2391: 
        !          2392: .TP
        !          2393: .BR libimcv.plugins.imv-swima.rest_api.timeout " [120]"
        !          2394: Timeout of SWID REST API HTTP POST transaction.
        !          2395: 
        !          2396: .TP
        !          2397: .BR libimcv.plugins.imv-swima.rest_api.uri " []"
        !          2398: HTTP URI of the SWID REST API.
        !          2399: 
        !          2400: .TP
        !          2401: .BR libimcv.plugins.imv-test.rounds " [0]"
        !          2402: Number of IMC\-IMV retry rounds.
        !          2403: 
        !          2404: .TP
        !          2405: .BR libimcv.stderr_quiet " [no]"
        !          2406: Disable output to stderr with a stand\-alone
        !          2407: .RI "" "libimcv" ""
        !          2408: library.
        !          2409: 
        !          2410: .TP
        !          2411: .BR libimcv.swid_gen.command " [/usr/local/bin/swid_generator]"
        !          2412: SWID generator command to be executed.
        !          2413: 
        !          2414: .TP
        !          2415: .BR libimcv.swid_gen.tag_creator.name " [strongSwan Project]"
        !          2416: Name of the tagCreator entity.
        !          2417: 
        !          2418: .TP
        !          2419: .BR libimcv.swid_gen.tag_creator.regid " [strongswan.org]"
        !          2420: regid of the tagCreator entity.
        !          2421: 
        !          2422: .TP
        !          2423: .BR manager.database " []"
        !          2424: Credential database URI for manager. If it contains a password, make sure to
        !          2425: adjust the permissions of the config file accordingly.
        !          2426: 
        !          2427: .TP
        !          2428: .BR manager.debug " [no]"
        !          2429: Enable debugging in manager.
        !          2430: 
        !          2431: .TP
        !          2432: .BR manager.load " []"
        !          2433: Plugins to load in manager.
        !          2434: 
        !          2435: .TP
        !          2436: .BR manager.socket " []"
        !          2437: FastCGI socket of manager, to run it statically.
        !          2438: 
        !          2439: .TP
        !          2440: .BR manager.threads " [10]"
        !          2441: Threads to use for request handling.
        !          2442: 
        !          2443: .TP
        !          2444: .BR manager.timeout " [15m]"
        !          2445: Session timeout for manager.
        !          2446: 
        !          2447: .TP
        !          2448: .BR medsrv.database " []"
        !          2449: Mediation server database URI. If it contains a password, make sure to adjust
        !          2450: the permissions of the config file accordingly.
        !          2451: 
        !          2452: .TP
        !          2453: .BR medsrv.debug " [no]"
        !          2454: Debugging in mediation server web application.
        !          2455: 
        !          2456: .TP
        !          2457: .BR medsrv.dpd " [5m]"
        !          2458: DPD timeout to use in mediation server plugin.
        !          2459: 
        !          2460: .TP
        !          2461: .BR medsrv.load " []"
        !          2462: Plugins to load in mediation server plugin.
        !          2463: 
        !          2464: .TP
        !          2465: .BR medsrv.password_length " [6]"
        !          2466: Minimum password length required for mediation server user accounts.
        !          2467: 
        !          2468: .TP
        !          2469: .BR medsrv.rekey " [20m]"
        !          2470: Rekeying time on mediation connections in mediation server plugin.
        !          2471: 
        !          2472: .TP
        !          2473: .BR medsrv.socket " []"
        !          2474: Run Mediation server web application statically on socket.
        !          2475: 
        !          2476: .TP
        !          2477: .BR medsrv.threads " [5]"
        !          2478: Number of thread for mediation service web application.
        !          2479: 
        !          2480: .TP
        !          2481: .BR medsrv.timeout " [15m]"
        !          2482: Session timeout for mediation service.
        !          2483: 
        !          2484: .TP
        !          2485: .BR pki.load " []"
        !          2486: Plugins to load in ipsec pki tool.
        !          2487: 
        !          2488: .TP
        !          2489: .BR pool.database " []"
        !          2490: Database URI for the database that stores IP pools and configuration attributes.
        !          2491: If it contains a password, make        sure to adjust the permissions of the
        !          2492: config file accordingly.
        !          2493: 
        !          2494: .TP
        !          2495: .BR pool.load " []"
        !          2496: Plugins to load in ipsec pool tool.
        !          2497: 
        !          2498: .TP
        !          2499: .BR scepclient.load " []"
        !          2500: Plugins to load in ipsec scepclient tool.
        !          2501: 
        !          2502: .TP
        !          2503: .B sec-updater
        !          2504: .br
        !          2505: Options for the sec\-updater tool.
        !          2506: 
        !          2507: .TP
        !          2508: .BR sec-updater.database " []"
        !          2509: Global IMV policy database URI. If it contains a password, make sure to adjust
        !          2510: the permissions of the config file accordingly.
        !          2511: 
        !          2512: .TP
        !          2513: .BR sec-updater.load " []"
        !          2514: Plugins to load in sec\-updater tool.
        !          2515: 
        !          2516: .TP
        !          2517: .BR sec-updater.swid_gen.command " [/usr/local/bin/swid_generator]"
        !          2518: SWID generator command to be executed.
        !          2519: 
        !          2520: .TP
        !          2521: .BR sec-updater.swid_gen.tag_creator.name " [strongSwan Project]"
        !          2522: Name of the tagCreator entity.
        !          2523: 
        !          2524: .TP
        !          2525: .BR sec-updater.swid_gen.tag_creator.regid " [strongswan.org]"
        !          2526: regid of the tagCreator entity.
        !          2527: 
        !          2528: .TP
        !          2529: .BR sec-updater.tmp.deb_file " [/tmp/sec-updater.deb]"
        !          2530: Temporary storage for downloaded deb package file.
        !          2531: 
        !          2532: .TP
        !          2533: .BR sec-updater.tmp.tag_file " [/tmp/sec-updater.tag]"
        !          2534: Temporary storage for generated SWID tags.
        !          2535: 
        !          2536: .TP
        !          2537: .BR sec-updater.tnc_manage_command " [/var/www/tnc/manage.py]"
        !          2538: strongTNC manage.py command used to import SWID tags.
        !          2539: 
        !          2540: .TP
        !          2541: .BR starter.config_file " [${sysconfdir}/ipsec.conf]"
        !          2542: Location of the ipsec.conf file
        !          2543: 
        !          2544: .TP
        !          2545: .BR starter.load_warning " [yes]"
        !          2546: Disable charon plugin load option warning.
        !          2547: 
        !          2548: .TP
        !          2549: .B sw-collector
        !          2550: .br
        !          2551: Options for the sw\-collector tool.
        !          2552: 
        !          2553: .TP
        !          2554: .BR sw-collector.database " []"
        !          2555: URI to software collector database containing event timestamps, software
        !          2556: creation and deletion events and collected software identifiers. If it contains
        !          2557: a password, make sure to adjust the permissions of the config file accordingly.
        !          2558: 
        !          2559: .TP
        !          2560: .BR sw-collector.first_file " [/var/log/bootstrap.log]"
        !          2561: Path pointing to file created when the Linux OS was installed.
        !          2562: 
        !          2563: .TP
        !          2564: .BR sw-collector.first_time " [0000-00-00T00:00:00Z]"
        !          2565: Time in UTC when the Linux OS was installed.
        !          2566: 
        !          2567: .TP
        !          2568: .BR sw-collector.history " []"
        !          2569: Path pointing to apt history.log file.
        !          2570: 
        !          2571: .TP
        !          2572: .BR sw-collector.load " []"
        !          2573: Plugins to load in sw\-collector tool.
        !          2574: 
        !          2575: .TP
        !          2576: .BR sw-collector.rest_api.timeout " [120]"
        !          2577: Timeout of REST API HTTP POST transaction.
        !          2578: 
        !          2579: .TP
        !          2580: .BR sw-collector.rest_api.uri " []"
        !          2581: HTTP URI of the central collector's REST API.
        !          2582: 
        !          2583: .TP
        !          2584: .BR swanctl.load " []"
        !          2585: Plugins to load in swanctl.
        !          2586: 
        !          2587: .TP
        !          2588: .BR swanctl.socket " [unix://${piddir}/charon.vici]"
        !          2589: VICI socket to connect to by default.
        !          2590: 

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>