Annotation of embedaddon/strongswan/conf/strongswan.conf.5.main, revision 1.1.1.1
1.1 misho 1: .TP
2: .BR aikgen.load " []"
3: Plugins to load in ipsec aikgen tool.
4:
5: .TP
6: .BR attest.database " []"
7: File measurement information database URI. If it contains a password, make sure
8: to adjust the permissions of the config file accordingly.
9:
10: .TP
11: .BR attest.load " []"
12: Plugins to load in ipsec attest tool.
13:
14: .TP
15: .B charon
16: .br
17: Options for the charon IKE daemon.
18:
19: .RB "" "Note" ":"
20: Many of the options in this section also apply to
21: .RB "" "charon\-cmd" ""
22: and
23: other
24: .RB "" "charon" ""
25: derivatives. Just use their respective name (e.g.
26: .RB "" "charon\-cmd" ""
27: instead of
28: .RB "" "charon" ")."
29: For many options defaults can be defined
30: in the
31: .RB "" "libstrongswan" ""
32: section.
33:
34: .TP
35: .BR charon.accept_private_algs " [no]"
36: Deliberately violate the IKE standard's requirement and allow the use of private
37: algorithm identifiers, even if the peer implementation is unknown.
38:
39: .TP
40: .BR charon.accept_unencrypted_mainmode_messages " [no]"
41: Accept unencrypted ID and HASH payloads in IKEv1 Main Mode.
42:
43: Some implementations send the third Main Mode message unencrypted, probably to
44: find the PSKs for the specified ID for authentication. This is very similar to
45: Aggressive Mode, and has the same security implications: A passive attacker can
46: sniff the negotiated Identity, and start brute forcing the PSK using the HASH
47: payload.
48:
49: It is recommended to keep this option to no, unless you know exactly what the
50: implications are and require compatibility to such devices (for example, some
51: SonicWall boxes).
52:
53: .TP
54: .BR charon.block_threshold " [5]"
55: Maximum number of half\-open IKE_SAs for a single peer IP.
56:
57: .TP
58: .BR charon.cache_crls " [no]"
59: Whether Certificate Revocation Lists (CRLs) fetched via HTTP or LDAP should be
60: saved under a unique file name derived from the public key of the Certification
61: Authority (CA) to
62: .RB "" "/etc/ipsec.d/crls" ""
63: (stroke) or
64: .RB "" "/etc/swanctl/x509crl" ""
65: (vici), respectively.
66:
67: .TP
68: .BR charon.cert_cache " [yes]"
69: Whether relations in validated certificate chains should be cached in memory.
70:
71: .TP
72: .BR charon.cisco_unity " [no]"
73: Send Cisco Unity vendor ID payload (IKEv1 only).
74:
75: .TP
76: .BR charon.close_ike_on_child_failure " [no]"
77: Close the IKE_SA if setup of the CHILD_SA along with IKE_AUTH failed.
78:
79: .TP
80: .BR charon.cookie_threshold " [10]"
81: Number of half\-open IKE_SAs that activate the cookie mechanism.
82:
83: .TP
84: .BR charon.crypto_test.bench " [no]"
85: Benchmark crypto algorithms and order them by efficiency.
86:
87: .TP
88: .BR charon.crypto_test.bench_size " [1024]"
89: Buffer size used for crypto benchmark.
90:
91: .TP
92: .BR charon.crypto_test.bench_time " [50]"
93: Time in ms during which crypto algorithm performance is measured.
94:
95: .TP
96: .BR charon.crypto_test.on_add " [no]"
97: Test crypto algorithms during registration (requires test vectors provided by
98: the
99: .RI "" "test\-vectors" ""
100: plugin).
101:
102: .TP
103: .BR charon.crypto_test.on_create " [no]"
104: Test crypto algorithms on each crypto primitive instantiation.
105:
106: .TP
107: .BR charon.crypto_test.required " [no]"
108: Strictly require at least one test vector to enable an algorithm.
109:
110: .TP
111: .BR charon.crypto_test.rng_true " [no]"
112: Whether to test RNG with TRUE quality; requires a lot of entropy.
113:
114: .TP
115: .BR charon.delete_rekeyed " [no]"
116: Delete CHILD_SAs right after they got successfully rekeyed (IKEv1 only). Reduces
117: the number of stale CHILD_SAs in scenarios with a lot of rekeyings. However,
118: this might cause problems with implementations that continue to use rekeyed SAs
119: until they expire.
120:
121: .TP
122: .BR charon.delete_rekeyed_delay " [5]"
123: Delay in seconds until inbound IPsec SAs are deleted after rekeyings (IKEv2
124: only). To process delayed packets the inbound part of a CHILD_SA is kept
125: installed up to the configured number of seconds after it got replaced during a
126: rekeying. If set to 0 the CHILD_SA will be kept installed until it expires (if
127: no lifetime is set it will be destroyed immediately).
128:
129: .TP
130: .BR charon.dh_exponent_ansi_x9_42 " [yes]"
131: Use ANSI X9.42 DH exponent size or optimum size matched to cryptographic
132: strength.
133:
134: .TP
135: .BR charon.dlopen_use_rtld_now " [no]"
136: Use RTLD_NOW with dlopen when loading plugins and IMV/IMCs to reveal missing
137: symbols immediately.
138:
139: .TP
140: .BR charon.dns1 " []"
141: DNS server assigned to peer via configuration payload (CP).
142:
143: .TP
144: .BR charon.dns2 " []"
145: DNS server assigned to peer via configuration payload (CP).
146:
147: .TP
148: .BR charon.dos_protection " [yes]"
149: Enable Denial of Service protection using cookies and aggressiveness checks.
150:
151: .TP
152: .BR charon.ecp_x_coordinate_only " [yes]"
153: Compliance with the errata for RFC 4753.
154:
155: .TP
156: .B charon.filelog
157: .br
158: Section to define file loggers, see LOGGER CONFIGURATION in
159: .RB "" "strongswan.conf" "(5)."
160:
161:
162: .TP
163: .B charon.filelog.<name>
164: .br
165: <name> may be the full path to the log file if it only contains characters
166: permitted in section names. Is ignored if
167: .RI "" "path" ""
168: is specified.
169:
170: .TP
171: .BR charon.filelog.<name>.<subsystem> " [<default>]"
172: Loglevel for a specific subsystem.
173:
174: .TP
175: .BR charon.filelog.<name>.append " [yes]"
176: If this option is enabled log entries are appended to the existing file.
177:
178: .TP
179: .BR charon.filelog.<name>.default " [1]"
180: Specifies the default loglevel to be used for subsystems for which no specific
181: loglevel is defined.
182:
183: .TP
184: .BR charon.filelog.<name>.flush_line " [no]"
185: Enabling this option disables block buffering and enables line buffering.
186:
187: .TP
188: .BR charon.filelog.<name>.ike_name " [no]"
189: Prefix each log entry with the connection name and a unique numerical identifier
190: for each IKE_SA.
191:
192: .TP
193: .BR charon.filelog.<name>.path " []"
194: Optional path to the log file. Overrides the section name. Must be used if the
195: path contains characters that aren't allowed in section names.
196:
197: .TP
198: .BR charon.filelog.<name>.time_add_ms " [no]"
199: Adds the milliseconds within the current second after the timestamp (separated
200: by a dot, so
201: .RI "" "time_format" ""
202: should end with %S or %T).
203:
204: .TP
205: .BR charon.filelog.<name>.time_format " []"
206: Prefix each log entry with a timestamp. The option accepts a format string as
207: passed to
208: .RB "" "strftime" "(3)."
209:
210:
211: .TP
212: .BR charon.flush_auth_cfg " [no]"
213: If enabled objects used during authentication (certificates, identities etc.)
214: are released to free memory once an IKE_SA is established. Enabling this might
215: conflict with plugins that later need access to e.g. the used certificates.
216:
217: .TP
218: .BR charon.follow_redirects " [yes]"
219: Whether to follow IKEv2 redirects (RFC 5685).
220:
221: .TP
222: .BR charon.fragment_size " [1280]"
223: Maximum size (complete IP datagram size in bytes) of a sent IKE fragment when
224: using proprietary IKEv1 or standardized IKEv2 fragmentation, defaults to 1280
225: (use 0 for address family specific default values, which uses a lower value for
226: IPv4). If specified this limit is used for both IPv4 and IPv6.
227:
228: .TP
229: .BR charon.group " []"
230: Name of the group the daemon changes to after startup.
231:
232: .TP
233: .BR charon.half_open_timeout " [30]"
234: Timeout in seconds for connecting IKE_SAs (also see IKE_SA_INIT DROPPING).
235:
236: .TP
237: .BR charon.hash_and_url " [no]"
238: Enable hash and URL support.
239:
240: .TP
241: .BR charon.host_resolver.max_threads " [3]"
242: Maximum number of concurrent resolver threads (they are terminated if unused).
243:
244: .TP
245: .BR charon.host_resolver.min_threads " [0]"
246: Minimum number of resolver threads to keep around.
247:
248: .TP
249: .BR charon.i_dont_care_about_security_and_use_aggressive_mode_psk " [no]"
250: If enabled responders are allowed to use IKEv1 Aggressive Mode with pre\-shared
251: keys, which is discouraged due to security concerns (offline attacks on the
252: openly transmitted hash of the PSK).
253:
254: .TP
255: .BR charon.ignore_acquire_ts " [no]"
256: If this is disabled the traffic selectors from the kernel's acquire events,
257: which are derived from the triggering packet, are prepended to the traffic
258: selectors from the configuration for IKEv2 connection. By enabling this, such
259: specific traffic selectors will be ignored and only the ones in the config will
260: be sent. This always happens for IKEv1 connections as the protocol only supports
261: one set of traffic selectors per CHILD_SA.
262:
263: .TP
264: .BR charon.ignore_routing_tables " []"
265: A space\-separated list of routing tables to be excluded from route lookups.
266:
267: .TP
268: .BR charon.ikesa_limit " [0]"
269: Maximum number of IKE_SAs that can be established at the same time before new
270: connection attempts are blocked.
271:
272: .TP
273: .BR charon.ikesa_table_segments " [1]"
274: Number of exclusively locked segments in the hash table.
275:
276: .TP
277: .BR charon.ikesa_table_size " [1]"
278: Size of the IKE_SA hash table.
279:
280: .TP
281: .B charon.imcv
282: .br
283: Defaults for options in this section can be configured in the
284: .RI "" "libimcv" ""
285: section.
286:
287: .TP
288: .BR charon.imcv.assessment_result " [yes]"
289: Whether IMVs send a standard IETF Assessment Result attribute.
290:
291: .TP
292: .BR charon.imcv.database " []"
293: Global IMV policy database URI. If it contains a password, make sure to adjust
294: the permissions of the config file accordingly.
295:
296: .TP
297: .BR charon.imcv.os_info.default_password_enabled " [no]"
298: Manually set whether a default password is enabled
299:
300: .TP
301: .BR charon.imcv.os_info.name " []"
302: Manually set the name of the client OS (e.g. Ubuntu).
303:
304: .TP
305: .BR charon.imcv.os_info.version " []"
306: Manually set the version of the client OS (e.g. 12.04 i686).
307:
308: .TP
309: .BR charon.imcv.policy_script " [ipsec _imv_policy]"
310: Script called for each TNC connection to generate IMV policies.
311:
312: .TP
313: .BR charon.inactivity_close_ike " [no]"
314: Whether to close IKE_SA if the only CHILD_SA closed due to inactivity.
315:
316: .TP
317: .BR charon.init_limit_half_open " [0]"
318: Limit new connections based on the current number of half open IKE_SAs, see
319: IKE_SA_INIT DROPPING in
320: .RB "" "strongswan.conf" "(5)."
321:
322:
323: .TP
324: .BR charon.init_limit_job_load " [0]"
325: Limit new connections based on the number of jobs currently queued for
326: processing (see IKE_SA_INIT DROPPING).
327:
328: .TP
329: .BR charon.initiator_only " [no]"
330: Causes charon daemon to ignore IKE initiation requests.
331:
332: .TP
333: .BR charon.install_routes " [yes]"
334: Install routes into a separate routing table for established IPsec tunnels.
335:
336: .TP
337: .BR charon.install_virtual_ip " [yes]"
338: Install virtual IP addresses.
339:
340: .TP
341: .BR charon.install_virtual_ip_on " []"
342: The name of the interface on which virtual IP addresses should be installed. If
343: not specified the addresses will be installed on the outbound interface.
344:
345: .TP
346: .BR charon.integrity_test " [no]"
347: Check daemon, libstrongswan and plugin integrity at startup.
348:
349: .TP
350: .BR charon.interfaces_ignore " []"
351: A comma\-separated list of network interfaces that should be ignored, if
352: .RB "" "interfaces_use" ""
353: is specified this option has no effect.
354:
355: .TP
356: .BR charon.interfaces_use " []"
357: A comma\-separated list of network interfaces that should be used by charon. All
358: other interfaces are ignored.
359:
360: .TP
361: .BR charon.keep_alive " [20s]"
362: NAT keep alive interval.
363:
364: .TP
365: .BR charon.leak_detective.detailed " [yes]"
366: Includes source file names and line numbers in leak detective output.
367:
368: .TP
369: .BR charon.leak_detective.usage_threshold " [10240]"
370: Threshold in bytes for leaks to be reported (0 to report all).
371:
372: .TP
373: .BR charon.leak_detective.usage_threshold_count " [0]"
374: Threshold in number of allocations for leaks to be reported (0 to report all).
375:
376: .TP
377: .BR charon.load " []"
378: Plugins to load in the IKE daemon charon.
379:
380: .TP
381: .BR charon.load_modular " [no]"
382: If enabled, the list of plugins to load is determined via the value of the
383: .RI "" "charon.plugins.<name>.load" ""
384: options. In addition to a simple boolean flag that
385: option may take an integer value indicating the priority of a plugin, which
386: would influence the order of a plugin in the plugin list (the default is 1). If
387: two plugins have the same priority their order in the default plugin list is
388: preserved. Enabled plugins not found in that list are ordered alphabetically
389: before other plugins with the same priority.
390:
391: .TP
392: .BR charon.make_before_break " [no]"
393: Initiate IKEv2 reauthentication with a make\-before\-break instead of a
394: break\-before\-make scheme. Make\-before\-break uses overlapping IKE and CHILD_SA
395: during reauthentication by first recreating all new SAs before deleting the old
396: ones. This behavior can be beneficial to avoid connectivity gaps during
397: reauthentication, but requires support for overlapping SAs by the peer.
398: strongSwan can handle such overlapping SAs since version 5.3.0.
399:
400: .TP
401: .BR charon.max_ikev1_exchanges " [3]"
402: Maximum number of IKEv1 phase 2 exchanges per IKE_SA to keep state about and
403: track concurrently.
404:
405: .TP
406: .BR charon.max_packet " [10000]"
407: Maximum packet size accepted by charon.
408:
409: .TP
410: .BR charon.multiple_authentication " [yes]"
411: Enable multiple authentication exchanges (RFC 4739).
412:
413: .TP
414: .BR charon.nbns1 " []"
415: WINS servers assigned to peer via configuration payload (CP).
416:
417: .TP
418: .BR charon.nbns2 " []"
419: WINS servers assigned to peer via configuration payload (CP).
420:
421: .TP
422: .BR charon.plugin.ha.buflen " [2048]"
423: Buffer size for received HA messages. For IKEv1 the public DH factors are also
424: transmitted so depending on the DH group the HA messages can get quite big (the
425: default should be fine up to
426: .RI "" "modp4096" ")."
427:
428:
429: .TP
430: .BR charon.plugins.addrblock.strict " [yes]"
431: If set to yes, a subject certificate without an addrblock extension is rejected
432: if the issuer certificate has such an addrblock extension. If set to no, subject
433: certificates issued without the addrblock extension are accepted without any
434: traffic selector checks and no policy is enforced by the plugin.
435:
436: .TP
437: .BR charon.plugins.android_log.loglevel " [1]"
438: Loglevel for logging to Android specific logger.
439:
440: .TP
441: .B charon.plugins.attr
442: .br
443: Section to specify arbitrary attributes that are assigned to a peer via
444: configuration payload (CP).
445:
446: .TP
447: .BR charon.plugins.attr.<attr> " []"
448: .RB "" "<attr>" ""
449: can be either
450: .RI "" "address" ","
451: .RI "" "netmask" ","
452: .RI "" "dns" ","
453: .RI "" "nbns" ","
454: .RI "" "dhcp" ","
455: .RI "" "subnet" ","
456: .RI "" "split\-include" ","
457: .RI "" "split\-exclude" ""
458: or the numeric identifier of the attribute
459: type. The assigned value can be an IPv4/IPv6 address, a subnet in CIDR notation
460: or an arbitrary value depending on the attribute type. For some attribute types
461: multiple values may be specified as a comma separated list.
462:
463: .TP
464: .BR charon.plugins.attr-sql.crash_recovery " [yes]"
465: Release all online leases during startup. Disable this to share the DB between
466: multiple VPN gateways.
467:
468: .TP
469: .BR charon.plugins.attr-sql.database " []"
470: Database URI for attr\-sql plugin used by charon. If it contains a password, make
471: sure to adjust the permissions of the config file accordingly.
472:
473: .TP
474: .BR charon.plugins.attr-sql.lease_history " [yes]"
475: Enable logging of SQL IP pool leases.
476:
477: .TP
478: .BR charon.plugins.bliss.use_bliss_b " [yes]"
479: Use the enhanced BLISS\-B key generation and signature algorithm.
480:
481: .TP
482: .BR charon.plugins.bypass-lan.interfaces_ignore " []"
483: A comma\-separated list of network interfaces for which connected subnets should
484: be ignored, if
485: .RB "" "interfaces_use" ""
486: is specified this option has no effect.
487:
488: .TP
489: .BR charon.plugins.bypass-lan.interfaces_use " []"
490: A comma\-separated list of network interfaces for which connected subnets should
491: be considered. All other interfaces are ignored.
492:
493: .TP
494: .BR charon.plugins.certexpire.csv.cron " []"
495: Cron style string specifying CSV export times.
496:
497: .TP
498: .BR charon.plugins.certexpire.csv.empty_string " []"
499: String to use in empty intermediate CA fields.
500:
501: .TP
502: .BR charon.plugins.certexpire.csv.fixed_fields " [yes]"
503: Use a fixed intermediate CA field count.
504:
505: .TP
506: .BR charon.plugins.certexpire.csv.force " [yes]"
507: Force export of all trustchains we have a private key for.
508:
509: .TP
510: .BR charon.plugins.certexpire.csv.format " [%d:%m:%Y]"
511: .RB "" "strftime" "(3)"
512: format string to export expiration dates as.
513:
514: .TP
515: .BR charon.plugins.certexpire.csv.local " []"
516: .RB "" "strftime" "(3)"
517: format string for the CSV file name to export local certificates
518: to.
519:
520: .TP
521: .BR charon.plugins.certexpire.csv.remote " []"
522: .RB "" "strftime" "(3)"
523: format string for the CSV file name to export remote
524: certificates to.
525:
526: .TP
527: .BR charon.plugins.certexpire.csv.separator " [,]"
528: CSV field separator.
529:
530: .TP
531: .BR charon.plugins.coupling.file " []"
532: File to store coupling list to.
533:
534: .TP
535: .BR charon.plugins.coupling.hash " [sha1]"
536: Hashing algorithm to fingerprint coupled certificates.
537:
538: .TP
539: .BR charon.plugins.coupling.max " [1]"
540: Maximum number of coupling entries to create.
541:
542: .TP
543: .BR charon.plugins.curl.redir " [-1]"
544: Maximum number of redirects followed by the plugin, set to 0 to disable
545: following redirects, set to \-1 for no limit.
546:
547: .TP
548: .BR charon.plugins.dhcp.force_server_address " [no]"
549: Always use the configured server address. This might be helpful if the DHCP
550: server runs on the same host as strongSwan, and the DHCP daemon does not listen
551: on the loopback interface. In that case the server cannot be reached via
552: unicast (or even 255.255.255.255) as that would be routed via loopback. Setting
553: this option to yes and configuring the local broadcast address (e.g.
554: 192.168.0.255) as server address might work.
555:
556: .TP
557: .BR charon.plugins.dhcp.identity_lease " [no]"
558: Derive user\-defined MAC address from hash of IKE identity and send client
559: identity DHCP option.
560:
561: .TP
562: .BR charon.plugins.dhcp.interface " []"
563: Interface name the plugin uses for address allocation. The default is to bind to
564: any (0.0.0.0) and let the system decide which way to route the packets to the
565: DHCP server.
566:
567: .TP
568: .BR charon.plugins.dhcp.server " [255.255.255.255]"
569: DHCP server unicast or broadcast IP address.
570:
571: .TP
572: .BR charon.plugins.dhcp.use_server_port " [no]"
573: Use the DHCP server port (67) as source port, instead of the DHCP client port
574: (68), when a unicast server address is configured and the plugin acts as relay
575: agent. When replying in this mode the DHCP server will always send packets to
576: the DHCP server port and if no process binds that port an ICMP port unreachables
577: will be sent back, which might be problematic for some DHCP servers. To avoid
578: that, enabling this option will cause the plugin to bind the DHCP server port to
579: send its requests when acting as relay agent. This is not necessary if a DHCP
580: server is already running on the same host and might even cause conflicts (and
581: since the server port is already bound, ICMPs should not be an issue).
582:
583: .TP
584: .BR charon.plugins.dnscert.enable " [no]"
585: Enable fetching of CERT RRs via DNS.
586:
587: .TP
588: .BR charon.plugins.drbg.max_drbg_requests " [4294967294]"
589: Number of pseudo\-random bit requests from the DRBG before an automatic reseeding
590: occurs.
591:
592: .TP
593: .BR charon.plugins.duplicheck.enable " [yes]"
594: Enable duplicheck plugin (if loaded).
595:
596: .TP
597: .BR charon.plugins.duplicheck.socket " [unix://${piddir}/charon.dck]"
598: Socket provided by the duplicheck plugin.
599:
600: .TP
601: .BR charon.plugins.eap-aka.request_identity " [yes]"
602: .TP
603: .BR charon.plugins.eap-aka-3gpp.seq_check " []"
604: Enable to activate sequence check of the AKA SQN values in order to trigger
605: resync cycles.
606:
607: .TP
608: .BR charon.plugins.eap-aka-3gpp2.seq_check " []"
609: Enable to activate sequence check of the AKA SQN values in order to trigger
610: resync cycles.
611:
612: .TP
613: .BR charon.plugins.eap-dynamic.prefer_user " [no]"
614: If enabled the EAP methods proposed in an EAP\-Nak message sent by the peer are
615: preferred over the methods registered locally.
616:
617: .TP
618: .BR charon.plugins.eap-dynamic.preferred " []"
619: The preferred EAP method(s) to be used. If it is not given the first registered
620: method will be used initially. If a comma separated list is given the methods
621: are tried in the given order before trying the rest of the registered methods.
622:
623: .TP
624: .BR charon.plugins.eap-gtc.backend " [pam]"
625: XAuth backend to be used for credential verification.
626:
627: .TP
628: .BR charon.plugins.eap-peap.fragment_size " [1024]"
629: Maximum size of an EAP\-PEAP packet.
630:
631: .TP
632: .BR charon.plugins.eap-peap.include_length " [no]"
633: Include length in non\-fragmented EAP\-PEAP packets.
634:
635: .TP
636: .BR charon.plugins.eap-peap.max_message_count " [32]"
637: Maximum number of processed EAP\-PEAP packets (0 = no limit).
638:
639: .TP
640: .BR charon.plugins.eap-peap.phase2_method " [mschapv2]"
641: Phase2 EAP client authentication method.
642:
643: .TP
644: .BR charon.plugins.eap-peap.phase2_piggyback " [no]"
645: Phase2 EAP Identity request piggybacked by server onto TLS Finished message.
646:
647: .TP
648: .BR charon.plugins.eap-peap.phase2_tnc " [no]"
649: Start phase2 EAP TNC protocol after successful client authentication.
650:
651: .TP
652: .BR charon.plugins.eap-peap.request_peer_auth " [no]"
653: Request peer authentication based on a client certificate.
654:
655: .TP
656: .BR charon.plugins.eap-radius.accounting " [no]"
657: Send RADIUS accounting information to RADIUS servers.
658:
659: .TP
660: .BR charon.plugins.eap-radius.accounting_close_on_timeout " [yes]"
661: Close the IKE_SA if there is a timeout during interim RADIUS accounting updates.
662:
663: .TP
664: .BR charon.plugins.eap-radius.accounting_interval " [0]"
665: Interval in seconds for interim RADIUS accounting updates, if not specified by
666: the RADIUS server in the Access\-Accept message.
667:
668: .TP
669: .BR charon.plugins.eap-radius.accounting_requires_vip " [no]"
670: If enabled, accounting is disabled unless an IKE_SA has at least one virtual IP.
671: Only for IKEv2, for IKEv1 a virtual IP is strictly necessary.
672:
673: .TP
674: .BR charon.plugins.eap-radius.accounting_send_class " [no]"
675: If enabled, adds the Class attributes received in Access\-Accept message to the
676: RADIUS accounting messages.
677:
678: .TP
679: .BR charon.plugins.eap-radius.class_group " [no]"
680: Use the
681: .RI "" "class" ""
682: attribute sent in the RADIUS\-Accept message as group membership
683: information that is compared to the groups specified in the
684: .RB "" "rightgroups" ""
685: option in
686: .RB "" "ipsec.conf" "(5)."
687:
688:
689: .TP
690: .BR charon.plugins.eap-radius.close_all_on_timeout " [no]"
691: Closes all IKE_SAs if communication with the RADIUS server times out. If it is
692: not set only the current IKE_SA is closed.
693:
694: .TP
695: .BR charon.plugins.eap-radius.dae.enable " [no]"
696: Enables support for the Dynamic Authorization Extension (RFC 5176).
697:
698: .TP
699: .BR charon.plugins.eap-radius.dae.listen " [0.0.0.0]"
700: Address to listen for DAE messages from the RADIUS server.
701:
702: .TP
703: .BR charon.plugins.eap-radius.dae.port " [3799]"
704: Port to listen for DAE requests.
705:
706: .TP
707: .BR charon.plugins.eap-radius.dae.secret " []"
708: Shared secret used to verify/sign DAE messages. If set, make sure to adjust the
709: permissions of the config file accordingly.
710:
711: .TP
712: .BR charon.plugins.eap-radius.eap_start " [no]"
713: Send EAP\-Start instead of EAP\-Identity to start RADIUS conversation.
714:
715: .TP
716: .BR charon.plugins.eap-radius.filter_id " [no]"
717: If the RADIUS
718: .RI "" "tunnel_type" ""
719: attribute with value
720: .RB "" "ESP" ""
721: is received, use the
722: .RI "" "filter_id" ""
723: attribute sent in the RADIUS\-Accept message as group membership
724: information that is compared to the groups specified in the
725: .RB "" "rightgroups" ""
726: option in
727: .RB "" "ipsec.conf" "(5)."
728:
729:
730: .TP
731: .BR charon.plugins.eap-radius.forward.ike_to_radius " []"
732: RADIUS attributes to be forwarded from IKEv2 to RADIUS (can be defined by name
733: or attribute number, a colon can be used to specify vendor\-specific attributes,
734: e.g. Reply\-Message, or 11, or 36906:12).
735:
736: .TP
737: .BR charon.plugins.eap-radius.forward.radius_to_ike " []"
738: Same as
739: .RI "" "charon.plugins.eap\-radius.forward.ike_to_radius" ""
740: but from RADIUS to
741: IKEv2, a strongSwan specific private notify (40969) is used to transmit the
742: attributes.
743:
744: .TP
745: .BR charon.plugins.eap-radius.id_prefix " []"
746: Prefix to EAP\-Identity, some AAA servers use a IMSI prefix to select the EAP
747: method.
748:
749: .TP
750: .BR charon.plugins.eap-radius.nas_identifier " [strongSwan]"
751: NAS\-Identifier to include in RADIUS messages.
752:
753: .TP
754: .BR charon.plugins.eap-radius.port " [1812]"
755: Port of RADIUS server (authentication).
756:
757: .TP
758: .BR charon.plugins.eap-radius.retransmit_base " [1.4]"
759: Base to use for calculating exponential back off.
760:
761: .TP
762: .BR charon.plugins.eap-radius.retransmit_timeout " [2.0]"
763: Timeout in seconds before sending first retransmit.
764:
765: .TP
766: .BR charon.plugins.eap-radius.retransmit_tries " [4]"
767: Number of times to retransmit a packet before giving up.
768:
769: .TP
770: .BR charon.plugins.eap-radius.secret " []"
771: Shared secret between RADIUS and NAS. If set, make sure to adjust the
772: permissions of the config file accordingly.
773:
774: .TP
775: .BR charon.plugins.eap-radius.server " []"
776: IP/Hostname of RADIUS server.
777:
778: .TP
779: .B charon.plugins.eap-radius.servers
780: .br
781: Section to specify multiple RADIUS servers. The
782: .RB "" "nas_identifier" ","
783: .RB "" "secret" ","
784: .RB "" "sockets" ""
785: and
786: .RB "" "port" ""
787: (or
788: .RB "" "auth_port" ")"
789: options can be specified for each
790: server. A server's IP/Hostname can be configured using the
791: .RB "" "address" ""
792: option.
793: The
794: .RB "" "acct_port" ""
795: [1813] option can be used to specify the port used for RADIUS
796: accounting. For each RADIUS server a priority can be specified using the
797: .RB "" "preference" ""
798: [0] option. The retransmission time for each server can set set
799: using
800: .RB "" "retransmit_base" ","
801: .RB "" "retransmit_timeout" ""
802: and
803: .RB "" "retransmit_tries" "."
804:
805:
806: .TP
807: .BR charon.plugins.eap-radius.sockets " [1]"
808: Number of sockets (ports) to use, increase for high load.
809:
810: .TP
811: .BR charon.plugins.eap-radius.station_id_with_port " [yes]"
812: Whether to include the UDP port in the Called\- and Calling\-Station\-Id RADIUS
813: attributes.
814:
815: .TP
816: .B charon.plugins.eap-radius.xauth
817: .br
818: Section to configure multiple XAuth authentication rounds via RADIUS. The
819: subsections define so called authentication profiles with arbitrary names. In
820: each profile section one or more XAuth types can be configured, with an assigned
821: message. For each type a separate XAuth exchange will be initiated and all
822: replies get concatenated into the User\-Password attribute, which then gets
823: verified over RADIUS.
824:
825: Available XAuth types are
826: .RB "" "password" ","
827: .RB "" "passcode" ","
828: .RB "" "nextpin" ","
829: and
830: .RB "" "answer" "."
831: This type is not relevant to strongSwan or the AAA server, but the
832: client may show a different dialog (along with the configured message).
833:
834: To use the configured profiles, they have to be configured in the respective
835: connection in
836: .RB "" "ipsec.conf" "(5)"
837: by appending the profile name, separated by a
838: colon, to the
839: .RB "" "xauth\-radius" ""
840: XAauth backend configuration in
841: .RI "" "rightauth" ""
842: or
843: .RI "" "rightauth2" ","
844: for instance,
845: .RI "" "rightauth2=xauth\-radius:profile" "."
846:
847:
848: .TP
849: .BR charon.plugins.eap-sim.request_identity " [yes]"
850: .TP
851: .BR charon.plugins.eap-simaka-sql.database " []"
852: .TP
853: .BR charon.plugins.eap-simaka-sql.remove_used " [no]"
854: .TP
855: .BR charon.plugins.eap-tls.fragment_size " [1024]"
856: Maximum size of an EAP\-TLS packet.
857:
858: .TP
859: .BR charon.plugins.eap-tls.include_length " [yes]"
860: Include length in non\-fragmented EAP\-TLS packets.
861:
862: .TP
863: .BR charon.plugins.eap-tls.max_message_count " [32]"
864: Maximum number of processed EAP\-TLS packets (0 = no limit).
865:
866: .TP
867: .BR charon.plugins.eap-tnc.max_message_count " [10]"
868: Maximum number of processed EAP\-TNC packets (0 = no limit).
869:
870: .TP
871: .BR charon.plugins.eap-tnc.protocol " [tnccs-2.0]"
872: IF\-TNCCS protocol version to be used
873: .RI "(" "tnccs\-1.1" ","
874: .RI "" "tnccs\-2.0" ","
875: .RI "" "tnccs\-dynamic" ")."
876:
877:
878: .TP
879: .BR charon.plugins.eap-ttls.fragment_size " [1024]"
880: Maximum size of an EAP\-TTLS packet.
881:
882: .TP
883: .BR charon.plugins.eap-ttls.include_length " [yes]"
884: Include length in non\-fragmented EAP\-TTLS packets.
885:
886: .TP
887: .BR charon.plugins.eap-ttls.max_message_count " [32]"
888: Maximum number of processed EAP\-TTLS packets (0 = no limit).
889:
890: .TP
891: .BR charon.plugins.eap-ttls.phase2_method " [md5]"
892: Phase2 EAP client authentication method.
893:
894: .TP
895: .BR charon.plugins.eap-ttls.phase2_piggyback " [no]"
896: Phase2 EAP Identity request piggybacked by server onto TLS Finished message.
897:
898: .TP
899: .BR charon.plugins.eap-ttls.phase2_tnc " [no]"
900: Start phase2 EAP TNC protocol after successful client authentication.
901:
902: .TP
903: .BR charon.plugins.eap-ttls.phase2_tnc_method " [pt]"
904: Phase2 EAP TNC transport protocol
905: .RI "(" "pt" ""
906: as IETF standard or legacy
907: .RI "" "tnc" ")"
908:
909:
910: .TP
911: .BR charon.plugins.eap-ttls.request_peer_auth " [no]"
912: Request peer authentication based on a client certificate.
913:
914: .TP
915: .BR charon.plugins.error-notify.socket " [unix://${piddir}/charon.enfy]"
916: Socket provided by the error\-notify plugin.
917:
918: .TP
919: .BR charon.plugins.ext-auth.script " []"
920: Command to pass to the system shell for peer authorization. Authorization is
921: considered successful if the command executes normally with an exit code of
922: zero. For all other exit codes IKE_SA authorization is rejected.
923:
924: The following environment variables get passed to the script:
925: .RI "" "IKE_UNIQUE_ID" ":"
926: The IKE_SA numerical unique identifier.
927: .RI "" "IKE_NAME" ":"
928: The peer configuration
929: connection name.
930: .RI "" "IKE_LOCAL_HOST" ":"
931: Local IKE IP address.
932: .RI "" "IKE_REMOTE_HOST" ":"
933: Remote IKE IP address.
934: .RI "" "IKE_LOCAL_ID" ":"
935: Local IKE identity.
936: .RI "" "IKE_REMOTE_ID" ":"
937: Remote IKE identity.
938: .RI "" "IKE_REMOTE_EAP_ID" ":"
939: Remote EAP or XAuth identity, if used.
940:
941: .TP
942: .BR charon.plugins.forecast.groups " [224.0.0.1,224.0.0.22,224.0.0.251,224.0.0.252,239.255.255.250]"
943: Comma separated list of multicast groups to join locally. The local host
944: receives and forwards packets in the local LAN for joined multicast groups only.
945: Packets matching the list of multicast groups get forwarded to connected
946: clients. The default group includes host multicasts, IGMP, mDNS, LLMNR and
947: SSDP/WS\-Discovery, and is usually a good choice for Windows clients.
948:
949: .TP
950: .BR charon.plugins.forecast.interface " []"
951: Name of the local interface to listen for broadcasts messages to forward. If no
952: interface is configured, the first usable interface is used, which is usually
953: just fine for single\-homed hosts. If your host has multiple interfaces, set this
954: option to the local LAN interface you want to forward broadcasts from/to.
955:
956: .TP
957: .BR charon.plugins.forecast.reinject " []"
958: Comma separated list of CHILD_SA configuration names for which to perform
959: multi/broadcast reinjection. For clients connecting over such a configuration,
960: any multi/broadcast received over the tunnel gets reinjected to all active
961: tunnels. This makes the broadcasts visible to other peers, and for examples
962: allows clients to see others shares. If disabled, multi/broadcast messages
963: received over a tunnel are injected to the local network only, but not to other
964: IPsec clients.
965:
966: .TP
967: .BR charon.plugins.gcrypt.quick_random " [no]"
968: Use faster random numbers in gcrypt; for testing only, produces weak keys!
969:
970: .TP
971: .BR charon.plugins.ha.autobalance " [0]"
972: Interval in seconds to automatically balance handled segments between nodes. Set
973: to 0 to disable.
974:
975: .TP
976: .BR charon.plugins.ha.fifo_interface " [yes]"
977: .TP
978: .BR charon.plugins.ha.heartbeat_delay " [1000]"
979: .TP
980: .BR charon.plugins.ha.heartbeat_timeout " [2100]"
981: .TP
982: .BR charon.plugins.ha.local " []"
983: .TP
984: .BR charon.plugins.ha.monitor " [yes]"
985: .TP
986: .BR charon.plugins.ha.pools " []"
987: .TP
988: .BR charon.plugins.ha.remote " []"
989: .TP
990: .BR charon.plugins.ha.resync " [yes]"
991: .TP
992: .BR charon.plugins.ha.secret " []"
993: .TP
994: .BR charon.plugins.ha.segment_count " [1]"
995: .TP
996: .BR charon.plugins.ipseckey.enable " [no]"
997: Enable fetching of IPSECKEY RRs via DNS.
998:
999: .TP
1000: .BR charon.plugins.kernel-libipsec.allow_peer_ts " [no]"
1001: Allow that the remote traffic selector equals the IKE peer. The route installed
1002: for such traffic (via TUN device) usually prevents further IKE traffic. The
1003: fwmark options for the
1004: .RI "" "kernel\-netlink" ""
1005: and
1006: .RI "" "socket\-default" ""
1007: plugins can be used
1008: to circumvent that problem.
1009:
1010: .TP
1011: .BR charon.plugins.kernel-netlink.buflen " [<min(PAGE_SIZE, 8192)>]"
1012: Buffer size for received Netlink messages.
1013:
1014: .TP
1015: .BR charon.plugins.kernel-netlink.force_receive_buffer_size " [no]"
1016: If the maximum Netlink socket receive buffer in bytes set by
1017: .RI "" "receive_buffer_size" ""
1018: exceeds the system\-wide maximum from
1019: /proc/sys/net/core/rmem_max, this option can be used to override the limit.
1020: Enabling this option requires special privileges (CAP_NET_ADMIN).
1021:
1022: .TP
1023: .BR charon.plugins.kernel-netlink.fwmark " []"
1024: Firewall mark to set on the routing rule that directs traffic to our routing
1025: table. The format is [!]mark[/mask], where the optional exclamation mark inverts
1026: the meaning (i.e. the rule only applies to packets that don't match the mark).
1027:
1028: .TP
1029: .BR charon.plugins.kernel-netlink.hw_offload_feature_interface " [lo]"
1030: If the kernel supports hardware offloading, the plugin needs to find the feature
1031: flag which represents hardware offloading support for network devices. Using the
1032: loopback device for this purpose is usually fine, since it should always be
1033: present. For rare cases in which the loopback device cannot be used to obtain
1034: the appropriate feature flag, this option can be used to specify an alternative
1035: interface for offload feature detection.
1036:
1037: .TP
1038: .BR charon.plugins.kernel-netlink.ignore_retransmit_errors " [no]"
1039: Whether to ignore errors potentially resulting from a retransmission.
1040:
1041: .TP
1042: .BR charon.plugins.kernel-netlink.mss " [0]"
1043: MSS to set on installed routes, 0 to disable.
1044:
1045: .TP
1046: .BR charon.plugins.kernel-netlink.mtu " [0]"
1047: MTU to set on installed routes, 0 to disable.
1048:
1049: .TP
1050: .BR charon.plugins.kernel-netlink.parallel_route " [no]"
1051: Whether to perform concurrent Netlink ROUTE queries on a single socket. While
1052: parallel queries can improve throughput, it has more overhead. On vanilla Linux,
1053: DUMP queries fail with EBUSY and must be retried, further decreasing
1054: performance.
1055:
1056: .TP
1057: .BR charon.plugins.kernel-netlink.parallel_xfrm " [no]"
1058: Whether to perform concurrent Netlink XFRM queries on a single socket.
1059:
1060: .TP
1061: .BR charon.plugins.kernel-netlink.policy_update " [no]"
1062: Whether to always use XFRM_MSG_UPDPOLICY to install policies.
1063:
1064: .TP
1065: .BR charon.plugins.kernel-netlink.port_bypass " [no]"
1066: Whether to use port or socket based IKE XFRM bypass policies. IKE bypass
1067: policies are used to exempt IKE traffic from XFRM processing. The default socket
1068: based policies are directly tied to the IKE UDP sockets, port based policies use
1069: global XFRM bypass policies for the used IKE UDP ports.
1070:
1071: .TP
1072: .BR charon.plugins.kernel-netlink.process_rules " [no]"
1073: Whether to process changes in routing rules to trigger roam events. This is
1074: currently only useful if the kernel based route lookup is used (i.e. if route
1075: installation is disabled or an inverted fwmark match is configured).
1076:
1077: .TP
1078: .BR charon.plugins.kernel-netlink.receive_buffer_size " [0]"
1079: Maximum Netlink socket receive buffer in bytes. This value controls how many
1080: bytes of Netlink messages can be received on a Netlink socket. The default value
1081: is set by /proc/sys/net/core/rmem_default. The specified value cannot exceed the
1082: system\-wide maximum from /proc/sys/net/core/rmem_max, unless
1083: .RI "" "force_receive_buffer_size" ""
1084: is enabled.
1085:
1086: .TP
1087: .BR charon.plugins.kernel-netlink.retries " [0]"
1088: Number of Netlink message retransmissions to send on timeout.
1089:
1090: .TP
1091: .BR charon.plugins.kernel-netlink.roam_events " [yes]"
1092: Whether to trigger roam events when interfaces, addresses or routes change.
1093:
1094: .TP
1095: .BR charon.plugins.kernel-netlink.set_proto_port_transport_sa " [no]"
1096: Whether to set protocol and ports in the selector installed on transport mode
1097: IPsec SAs in the kernel. While doing so enforces policies for inbound traffic,
1098: it also prevents the use of a single IPsec SA by more than one traffic selector.
1099:
1100: .TP
1101: .B charon.plugins.kernel-netlink.spdh_thresh
1102: .br
1103: XFRM policy hashing threshold configuration for IPv4 and IPv6.
1104:
1105: The section defines hashing thresholds to configure in the kernel during daemon
1106: startup. Each address family takes a threshold for the local subnet of an IPsec
1107: policy (src in out\-policies, dst in in\- and forward\-policies) and the remote
1108: subnet (dst in out\-policies, src in in\- and forward\-policies).
1109:
1110: If the subnet has more or equal net bits than the threshold, the first threshold
1111: bits are used to calculate a hash to lookup the policy.
1112:
1113: Policy hashing thresholds are not supported before Linux 3.18 and might conflict
1114: with socket policies before Linux 4.8.
1115:
1116: .TP
1117: .BR charon.plugins.kernel-netlink.spdh_thresh.ipv4.lbits " [32]"
1118: Local subnet XFRM policy hashing threshold for IPv4.
1119:
1120: .TP
1121: .BR charon.plugins.kernel-netlink.spdh_thresh.ipv4.rbits " [32]"
1122: Remote subnet XFRM policy hashing threshold for IPv4.
1123:
1124: .TP
1125: .BR charon.plugins.kernel-netlink.spdh_thresh.ipv6.lbits " [128]"
1126: Local subnet XFRM policy hashing threshold for IPv6.
1127:
1128: .TP
1129: .BR charon.plugins.kernel-netlink.spdh_thresh.ipv6.rbits " [128]"
1130: Remote subnet XFRM policy hashing threshold for IPv6.
1131:
1132: .TP
1133: .BR charon.plugins.kernel-netlink.timeout " [0]"
1134: Netlink message retransmission timeout, 0 to disable retransmissions.
1135:
1136: .TP
1137: .BR charon.plugins.kernel-netlink.xfrm_acq_expires " [165]"
1138: Lifetime of XFRM acquire state created by the kernel when traffic matches a trap
1139: policy. The value gets written to /proc/sys/net/core/xfrm_acq_expires.
1140: Indirectly controls the delay between XFRM acquire messages triggered by the
1141: kernel for a trap policy. The same value is used as timeout for SPIs allocated
1142: by the kernel. The default value equals the total retransmission timeout for
1143: IKE messages, see IKEv2 RETRANSMISSION in
1144: .RB "" "strongswan.conf" "(5)."
1145:
1146:
1147: .TP
1148: .BR charon.plugins.kernel-pfkey.events_buffer_size " [0]"
1149: Size of the receive buffer for the event socket (0 for default size). Because
1150: events are received asynchronously installing e.g. lots of policies may require
1151: a larger buffer than the default on certain platforms in order to receive all
1152: messages.
1153:
1154: .TP
1155: .BR charon.plugins.kernel-pfkey.route_via_internal " [no]"
1156: Whether to use the internal or external interface in installed routes. The
1157: internal interface is the one where the IP address contained in the local
1158: traffic selector is located, the external interface is the one over which the
1159: destination address of the IPsec tunnel can be reached. This is not relevant if
1160: virtual IPs are used, for which a TUN device is created that's used in the
1161: routes.
1162:
1163: .TP
1164: .BR charon.plugins.kernel-pfroute.vip_wait " [1000]"
1165: Time in ms to wait until virtual IP addresses appear/disappear before failing.
1166:
1167: .TP
1168: .BR charon.plugins.led.activity_led " []"
1169: .TP
1170: .BR charon.plugins.led.blink_time " [50]"
1171: .TP
1172: .B charon.plugins.load-tester
1173: .br
1174: Section to configure the load\-tester plugin, see LOAD TESTS in
1175: .RB "" "strongswan.conf" "(5)"
1176: for details.
1177:
1178: .TP
1179: .B charon.plugins.load-tester.addrs
1180: .br
1181: Section that contains key/value pairs with address pools (in CIDR notation) to
1182: use for a specific network interface e.g. eth0 = 10.10.0.0/16.
1183:
1184: .TP
1185: .BR charon.plugins.load-tester.addrs_keep " [no]"
1186: Whether to keep dynamic addresses even after the associated SA got terminated.
1187:
1188: .TP
1189: .BR charon.plugins.load-tester.addrs_prefix " [16]"
1190: Network prefix length to use when installing dynamic addresses. If set to \-1 the
1191: full address is used (i.e. 32 or 128).
1192:
1193: .TP
1194: .BR charon.plugins.load-tester.ca_dir " []"
1195: Directory to load (intermediate) CA certificates from.
1196:
1197: .TP
1198: .BR charon.plugins.load-tester.child_rekey " [600]"
1199: Seconds to start CHILD_SA rekeying after setup.
1200:
1201: .TP
1202: .BR charon.plugins.load-tester.crl " []"
1203: URI to a CRL to include as certificate distribution point in generated
1204: certificates.
1205:
1206: .TP
1207: .BR charon.plugins.load-tester.delay " [0]"
1208: Delay between initiations for each thread.
1209:
1210: .TP
1211: .BR charon.plugins.load-tester.delete_after_established " [no]"
1212: Delete an IKE_SA as soon as it has been established.
1213:
1214: .TP
1215: .BR charon.plugins.load-tester.digest " [sha1]"
1216: Digest algorithm used when issuing certificates.
1217:
1218: .TP
1219: .BR charon.plugins.load-tester.dpd_delay " [0]"
1220: DPD delay to use in load test.
1221:
1222: .TP
1223: .BR charon.plugins.load-tester.dynamic_port " [0]"
1224: Base port to be used for requests (each client uses a different port).
1225:
1226: .TP
1227: .BR charon.plugins.load-tester.eap_password " [default-pwd]"
1228: EAP secret to use in load test.
1229:
1230: .TP
1231: .BR charon.plugins.load-tester.enable " [no]"
1232: Enable the load testing plugin.
1233: .RB "" "WARNING" ":"
1234: Never enable this plugin on
1235: productive systems. It provides preconfigured credentials and allows an attacker
1236: to authenticate as any user.
1237:
1238: .TP
1239: .BR charon.plugins.load-tester.esp " [aes128-sha1]"
1240: CHILD_SA proposal to use for load tests.
1241:
1242: .TP
1243: .BR charon.plugins.load-tester.fake_kernel " [no]"
1244: Fake the kernel interface to allow load\-testing against self.
1245:
1246: .TP
1247: .BR charon.plugins.load-tester.ike_rekey " [0]"
1248: Seconds to start IKE_SA rekeying after setup.
1249:
1250: .TP
1251: .BR charon.plugins.load-tester.init_limit " [0]"
1252: Global limit of concurrently established SAs during load test.
1253:
1254: .TP
1255: .BR charon.plugins.load-tester.initiator " [0.0.0.0]"
1256: Address to initiate from.
1257:
1258: .TP
1259: .BR charon.plugins.load-tester.initiator_auth " [pubkey]"
1260: Authentication method(s) the initiator uses.
1261:
1262: .TP
1263: .BR charon.plugins.load-tester.initiator_id " []"
1264: Initiator ID used in load test.
1265:
1266: .TP
1267: .BR charon.plugins.load-tester.initiator_match " []"
1268: Initiator ID to match against as responder.
1269:
1270: .TP
1271: .BR charon.plugins.load-tester.initiator_tsi " []"
1272: Traffic selector on initiator side, as proposed by initiator.
1273:
1274: .TP
1275: .BR charon.plugins.load-tester.initiator_tsr " []"
1276: Traffic selector on responder side, as proposed by initiator.
1277:
1278: .TP
1279: .BR charon.plugins.load-tester.initiators " [0]"
1280: Number of concurrent initiator threads to use in load test.
1281:
1282: .TP
1283: .BR charon.plugins.load-tester.issuer_cert " []"
1284: Path to the issuer certificate (if not configured a hard\-coded default value is
1285: used).
1286:
1287: .TP
1288: .BR charon.plugins.load-tester.issuer_key " []"
1289: Path to private key that is used to issue certificates (if not configured a
1290: hard\-coded default value is used).
1291:
1292: .TP
1293: .BR charon.plugins.load-tester.iterations " [1]"
1294: Number of IKE_SAs to initiate by each initiator in load test.
1295:
1296: .TP
1297: .BR charon.plugins.load-tester.mode " [tunnel]"
1298: IPsec mode to use, one of
1299: .RI "" "tunnel" ","
1300: .RI "" "transport" ","
1301: or
1302: .RI "" "beet" "."
1303:
1304:
1305: .TP
1306: .BR charon.plugins.load-tester.pool " []"
1307: Provide INTERNAL_IPV4_ADDRs from a named pool.
1308:
1309: .TP
1310: .BR charon.plugins.load-tester.preshared_key " [<default-psk>]"
1311: Preshared key to use in load test.
1312:
1313: .TP
1314: .BR charon.plugins.load-tester.proposal " [aes128-sha1-modp768]"
1315: IKE proposal to use in load test.
1316:
1317: .TP
1318: .BR charon.plugins.load-tester.request_virtual_ip " [no]"
1319: Request an INTERNAL_IPV4_ADDR from the server.
1320:
1321: .TP
1322: .BR charon.plugins.load-tester.responder " [127.0.0.1]"
1323: Address to initiation connections to.
1324:
1325: .TP
1326: .BR charon.plugins.load-tester.responder_auth " [pubkey]"
1327: Authentication method(s) the responder uses.
1328:
1329: .TP
1330: .BR charon.plugins.load-tester.responder_id " []"
1331: Responder ID used in load test.
1332:
1333: .TP
1334: .BR charon.plugins.load-tester.responder_tsi " [initiator_tsi]"
1335: Traffic selector on initiator side, as narrowed by responder.
1336:
1337: .TP
1338: .BR charon.plugins.load-tester.responder_tsr " [initiator_tsr]"
1339: Traffic selector on responder side, as narrowed by responder.
1340:
1341: .TP
1342: .BR charon.plugins.load-tester.shutdown_when_complete " [no]"
1343: Shutdown the daemon after all IKE_SAs have been established.
1344:
1345: .TP
1346: .BR charon.plugins.load-tester.socket " [unix://${piddir}/charon.ldt]"
1347: Socket provided by the load\-tester plugin.
1348:
1349: .TP
1350: .BR charon.plugins.load-tester.version " [0]"
1351: IKE version to use (0 means use IKEv2 as initiator and accept any version as
1352: responder).
1353:
1354: .TP
1355: .BR charon.plugins.lookip.socket " [unix://${piddir}/charon.lkp]"
1356: Socket provided by the lookip plugin.
1357:
1358: .TP
1359: .BR charon.plugins.ntru.parameter_set " [optimum]"
1360: The following parameter sets are available:
1361: .RB "" "x9_98_speed" ","
1362: .RB "" "x9_98_bandwidth" ","
1363: .RB "" "x9_98_balance" ""
1364: and
1365: .RB "" "optimum" ","
1366: the last set not being
1367: part of the X9.98 standard but having the best performance.
1368:
1369: .TP
1370: .BR charon.plugins.openssl.engine_id " [pkcs11]"
1371: ENGINE ID to use in the OpenSSL plugin.
1372:
1373: .TP
1374: .BR charon.plugins.openssl.fips_mode " [0]"
1375: Set OpenSSL FIPS mode: disabled(0), enabled(1), Suite B enabled(2).
1376:
1377: .TP
1378: .BR charon.plugins.osx-attr.append " [yes]"
1379: Whether DNS servers are appended to existing entries, instead of replacing them.
1380:
1381: .TP
1382: .B charon.plugins.p-cscf.enable
1383: .br
1384: Section to enable requesting P\-CSCF server addresses for individual connections.
1385:
1386: .TP
1387: .BR charon.plugins.p-cscf.enable.<conn> " [no]"
1388: <conn> is the name of a connection with an ePDG from which to request P\-CSCF
1389: server addresses. Requests will be sent for addresses of the same families for
1390: which internal IPs are requested.
1391:
1392: .TP
1393: .B charon.plugins.pkcs11.modules
1394: .br
1395: List of available PKCS#11 modules.
1396:
1397: .TP
1398: .BR charon.plugins.pkcs11.modules.<name>.load_certs " [yes]"
1399: Whether to automatically load certificates from tokens.
1400:
1401: .TP
1402: .BR charon.plugins.pkcs11.modules.<name>.os_locking " [no]"
1403: Whether OS locking should be enabled for this module.
1404:
1405: .TP
1406: .BR charon.plugins.pkcs11.modules.<name>.path " []"
1407: Full path to the shared object file of this PKCS#11 module.
1408:
1409: .TP
1410: .BR charon.plugins.pkcs11.reload_certs " [no]"
1411: Reload certificates from all tokens if charon receives a SIGHUP.
1412:
1413: .TP
1414: .BR charon.plugins.pkcs11.use_dh " [no]"
1415: Whether the PKCS#11 modules should be used for DH and ECDH (see
1416: .RI "" "use_ecc" ""
1417: option).
1418:
1419: .TP
1420: .BR charon.plugins.pkcs11.use_ecc " [no]"
1421: Whether the PKCS#11 modules should be used for ECDH and ECDSA public key
1422: operations. ECDSA private keys can be used regardless of this option.
1423:
1424: .TP
1425: .BR charon.plugins.pkcs11.use_hasher " [no]"
1426: Whether the PKCS#11 modules should be used to hash data.
1427:
1428: .TP
1429: .BR charon.plugins.pkcs11.use_pubkey " [no]"
1430: Whether the PKCS#11 modules should be used for public key operations, even for
1431: keys not stored on tokens.
1432:
1433: .TP
1434: .BR charon.plugins.pkcs11.use_rng " [no]"
1435: Whether the PKCS#11 modules should be used as RNG.
1436:
1437: .TP
1438: .BR charon.plugins.radattr.dir " []"
1439: Directory where RADIUS attributes are stored in client\-ID specific files.
1440:
1441: .TP
1442: .BR charon.plugins.radattr.message_id " [-1]"
1443: Attributes are added to all IKE_AUTH messages by default (\-1), or only to the
1444: IKE_AUTH message with the given IKEv2 message ID.
1445:
1446: .TP
1447: .BR charon.plugins.random.random " [${random_device}]"
1448: File to read random bytes from.
1449:
1450: .TP
1451: .BR charon.plugins.random.strong_equals_true " [no]"
1452: If set to yes the RNG_STRONG class reads random bytes from the same source as
1453: the RNG_TRUE class.
1454:
1455: .TP
1456: .BR charon.plugins.random.urandom " [${urandom_device}]"
1457: File to read pseudo random bytes from.
1458:
1459: .TP
1460: .BR charon.plugins.resolve.file " [/etc/resolv.conf]"
1461: File where to add DNS server entries.
1462:
1463: .TP
1464: .BR charon.plugins.resolve.resolvconf.iface_prefix " [lo.inet.ipsec.]"
1465: Prefix used for interface names sent to
1466: .RB "" "resolvconf" "(8)."
1467: The nameserver
1468: address is appended to this prefix to make it unique. The result has to be a
1469: valid interface name according to the rules defined by resolvconf. Also, it
1470: should have a high priority according to the order defined in
1471: .RB "" "interface\-order" "(5)."
1472:
1473:
1474: .TP
1475: .BR charon.plugins.revocation.enable_crl " [yes]"
1476: Whether CRL validation should be enabled.
1477:
1478: .TP
1479: .BR charon.plugins.revocation.enable_ocsp " [yes]"
1480: Whether OCSP validation should be enabled.
1481:
1482: .TP
1483: .BR charon.plugins.save-keys.esp " [no]"
1484: Whether to save ESP keys.
1485:
1486: .TP
1487: .BR charon.plugins.save-keys.ike " [no]"
1488: Whether to save IKE keys.
1489:
1490: .TP
1491: .BR charon.plugins.save-keys.load " [no]"
1492: Whether to load the plugin.
1493:
1494: .TP
1495: .BR charon.plugins.save-keys.wireshark_keys " []"
1496: Directory where the keys are stored in the format supported by Wireshark. IKEv1
1497: keys are stored in the
1498: .RI "" "ikev1_decryption_table" ""
1499: file. IKEv2 keys are stored in
1500: the
1501: .RI "" "ikev2_decryption_table" ""
1502: file. Keys for ESP CHILD_SAs are stored in the
1503: .RI "" "esp_sa" ""
1504: file.
1505:
1506: .TP
1507: .BR charon.plugins.socket-default.fwmark " []"
1508: Firewall mark to set on outbound packets.
1509:
1510: .TP
1511: .BR charon.plugins.socket-default.set_source " [yes]"
1512: Set source address on outbound packets, if possible.
1513:
1514: .TP
1515: .BR charon.plugins.socket-default.set_sourceif " [no]"
1516: Force sending interface on outbound packets, if possible. This allows using IPv6
1517: link\-local addresses as tunnel endpoints.
1518:
1519: .TP
1520: .BR charon.plugins.socket-default.use_ipv4 " [yes]"
1521: Listen on IPv4, if possible.
1522:
1523: .TP
1524: .BR charon.plugins.socket-default.use_ipv6 " [yes]"
1525: Listen on IPv6, if possible.
1526:
1527: .TP
1528: .BR charon.plugins.sql.database " []"
1529: Database URI for charon's SQL plugin. If it contains a password, make sure to
1530: adjust the permissions of the config file accordingly.
1531:
1532: .TP
1533: .BR charon.plugins.sql.loglevel " [-1]"
1534: Loglevel for logging to SQL database.
1535:
1536: .TP
1537: .BR charon.plugins.stroke.allow_swap " [yes]"
1538: Analyze addresses/hostnames in
1539: .RI "" "left|right" ""
1540: to detect which side is local and
1541: swap configuration options if necessary. If disabled
1542: .RI "" "left" ""
1543: is always
1544: .RI "" "local" "."
1545:
1546:
1547: .TP
1548: .BR charon.plugins.stroke.ignore_missing_ca_basic_constraint " [no]"
1549: Treat certificates in ipsec.d/cacerts and ipsec.conf ca sections as CA
1550: certificates even if they don't contain a CA basic constraint.
1551:
1552: .TP
1553: .BR charon.plugins.stroke.max_concurrent " [4]"
1554: Maximum number of stroke messages handled concurrently.
1555:
1556: .TP
1557: .BR charon.plugins.stroke.prevent_loglevel_changes " [no]"
1558: If enabled log level changes via stroke socket are not allowed.
1559:
1560: .TP
1561: .BR charon.plugins.stroke.secrets_file " [${sysconfdir}/ipsec.secrets]"
1562: Location of the ipsec.secrets file
1563:
1564: .TP
1565: .BR charon.plugins.stroke.socket " [unix://${piddir}/charon.ctl]"
1566: Socket provided by the stroke plugin.
1567:
1568: .TP
1569: .BR charon.plugins.stroke.timeout " [0]"
1570: Timeout in ms for any stroke command. Use 0 to disable the timeout.
1571:
1572: .TP
1573: .BR charon.plugins.systime-fix.interval " [0]"
1574: Interval in seconds to check system time for validity. 0 disables the check.
1575:
1576: .TP
1577: .BR charon.plugins.systime-fix.reauth " [no]"
1578: Whether to use reauth or delete if an invalid cert lifetime is detected.
1579:
1580: .TP
1581: .BR charon.plugins.systime-fix.threshold " []"
1582: Threshold date where system time is considered valid. Disabled if not specified.
1583:
1584: .TP
1585: .BR charon.plugins.systime-fix.threshold_format " [%Y]"
1586: .RB "" "strptime" "(3)"
1587: format used to parse threshold option.
1588:
1589: .TP
1590: .BR charon.plugins.systime-fix.timeout " [0s]"
1591: How long to wait for a valid system time if an interval is configured. 0 to
1592: recheck indefinitely.
1593:
1594: .TP
1595: .BR charon.plugins.tnc-ifmap.client_cert " []"
1596: Path to X.509 certificate file of IF\-MAP client.
1597:
1598: .TP
1599: .BR charon.plugins.tnc-ifmap.client_key " []"
1600: Path to private key file of IF\-MAP client.
1601:
1602: .TP
1603: .BR charon.plugins.tnc-ifmap.device_name " []"
1604: Unique name of strongSwan server as a PEP and/or PDP device.
1605:
1606: .TP
1607: .BR charon.plugins.tnc-ifmap.renew_session_interval " [150]"
1608: Interval in seconds between periodic IF\-MAP RenewSession requests.
1609:
1610: .TP
1611: .BR charon.plugins.tnc-ifmap.server_cert " []"
1612: Path to X.509 certificate file of IF\-MAP server.
1613:
1614: .TP
1615: .BR charon.plugins.tnc-ifmap.server_uri " [https://localhost:8444/imap]"
1616: URI of the form [https://]servername[:port][/path].
1617:
1618: .TP
1619: .BR charon.plugins.tnc-ifmap.username_password " []"
1620: Credentials of IF\-MAP client of the form username:password. If set, make sure to
1621: adjust the permissions of the config file accordingly.
1622:
1623: .TP
1624: .BR charon.plugins.tnc-imc.dlclose " [yes]"
1625: Unload IMC after use.
1626:
1627: .TP
1628: .BR charon.plugins.tnc-imc.preferred_language " [en]"
1629: Preferred language for TNC recommendations.
1630:
1631: .TP
1632: .BR charon.plugins.tnc-imv.dlclose " [yes]"
1633: Unload IMV after use.
1634:
1635: .TP
1636: .BR charon.plugins.tnc-imv.recommendation_policy " [default]"
1637: TNC recommendation policy, one of
1638: .RI "" "default" ","
1639: .RI "" "any" ","
1640: or
1641: .RI "" "all" "."
1642:
1643:
1644: .TP
1645: .BR charon.plugins.tnc-pdp.pt_tls.enable " [yes]"
1646: Enable PT\-TLS protocol on the strongSwan PDP.
1647:
1648: .TP
1649: .BR charon.plugins.tnc-pdp.pt_tls.port " [271]"
1650: PT\-TLS server port the strongSwan PDP is listening on.
1651:
1652: .TP
1653: .BR charon.plugins.tnc-pdp.radius.enable " [yes]"
1654: Enable RADIUS protocol on the strongSwan PDP.
1655:
1656: .TP
1657: .BR charon.plugins.tnc-pdp.radius.method " [ttls]"
1658: EAP tunnel method to be used.
1659:
1660: .TP
1661: .BR charon.plugins.tnc-pdp.radius.port " [1812]"
1662: RADIUS server port the strongSwan PDP is listening on.
1663:
1664: .TP
1665: .BR charon.plugins.tnc-pdp.radius.secret " []"
1666: Shared RADIUS secret between strongSwan PDP and NAS. If set, make sure to adjust
1667: the permissions of the config file accordingly.
1668:
1669: .TP
1670: .BR charon.plugins.tnc-pdp.server " []"
1671: Name of the strongSwan PDP as contained in the AAA certificate.
1672:
1673: .TP
1674: .BR charon.plugins.tnc-pdp.timeout " []"
1675: Timeout in seconds before closing incomplete connections.
1676:
1677: .TP
1678: .BR charon.plugins.tnccs-11.max_message_size " [45000]"
1679: Maximum size of a PA\-TNC message (XML & Base64 encoding).
1680:
1681: .TP
1682: .BR charon.plugins.tnccs-20.max_batch_size " [65522]"
1683: Maximum size of a PB\-TNC batch (upper limit via PT\-EAP = 65529).
1684:
1685: .TP
1686: .BR charon.plugins.tnccs-20.max_message_size " [65490]"
1687: Maximum size of a PA\-TNC message (upper limit via PT\-EAP = 65497).
1688:
1689: .TP
1690: .BR charon.plugins.tnccs-20.mutual " [no]"
1691: Enable PB\-TNC mutual protocol.
1692:
1693: .TP
1694: .BR charon.plugins.tnccs-20.tests.pb_tnc_noskip " [no]"
1695: Send an unsupported PB\-TNC message type with the NOSKIP flag set.
1696:
1697: .TP
1698: .BR charon.plugins.tnccs-20.tests.pb_tnc_version " [2]"
1699: Send a PB\-TNC batch with a modified PB\-TNC version.
1700:
1701: .TP
1702: .BR charon.plugins.tpm.fips_186_4 " [no]"
1703: Is the TPM 2.0 FIPS\-186\-4 compliant, forcing e.g. the use of the default salt
1704: length instead of maximum salt length with RSAPSS padding.
1705:
1706: .TP
1707: .BR charon.plugins.tpm.tcti.name " [device|tabrmd]"
1708: Name of TPM 2.0 TCTI library. Valid values:
1709: .RI "" "tabrmd" ","
1710: .RI "" "device" ""
1711: or
1712: .RI "" "mssim" "."
1713: Defaults are
1714: .RI "" "device" ""
1715: if the
1716: .RI "" "/dev/tpmrm0" ""
1717: in\-kernel TPM 2.0 resource manager
1718: device exists, and
1719: .RI "" "tabrmd" ""
1720: otherwise, requiring the d\-bus based TPM 2.0 access
1721: broker and resource manager to be available.
1722:
1723: .TP
1724: .BR charon.plugins.tpm.tcti.opts " [/dev/tpmrm0|<none>]"
1725: Options for the TPM 2.0 TCTI library. Defaults are
1726: .RI "" "/dev/tpmrm0" ""
1727: if the TCTI
1728: library name is
1729: .RI "" "device" ""
1730: and no options otherwise.
1731:
1732: .TP
1733: .BR charon.plugins.tpm.use_rng " [no]"
1734: Whether the TPM should be used as RNG.
1735:
1736: .TP
1737: .BR charon.plugins.unbound.dlv_anchors " []"
1738: File to read trusted keys for DLV (DNSSEC Lookaside Validation) from. It uses
1739: the same format as
1740: .RI "" "trust_anchors" "."
1741: Only one DLV can be configured, which is
1742: then used as a root trusted DLV, this means that it is a lookaside for the root.
1743:
1744: .TP
1745: .BR charon.plugins.unbound.resolv_conf " [/etc/resolv.conf]"
1746: File to read DNS resolver configuration from.
1747:
1748: .TP
1749: .BR charon.plugins.unbound.trust_anchors " [/etc/ipsec.d/dnssec.keys]"
1750: File to read DNSSEC trust anchors from (usually root zone KSK). The format of
1751: the file is the standard DNS Zone file format, anchors can be stored as DS or
1752: DNSKEY entries in the file.
1753:
1754: .TP
1755: .BR charon.plugins.updown.dns_handler " [no]"
1756: Whether the updown script should handle DNS servers assigned via IKEv1 Mode
1757: Config or IKEv2 Config Payloads (if enabled they can't be handled by other
1758: plugins, like resolve)
1759:
1760: .TP
1761: .BR charon.plugins.vici.socket " [unix://${piddir}/charon.vici]"
1762: Socket the vici plugin serves clients.
1763:
1764: .TP
1765: .BR charon.plugins.whitelist.enable " [yes]"
1766: Enable loaded whitelist plugin.
1767:
1768: .TP
1769: .BR charon.plugins.whitelist.socket " [unix://${piddir}/charon.wlst]"
1770: Socket provided by the whitelist plugin.
1771:
1772: .TP
1773: .BR charon.plugins.wolfssl.fips_mode " [no]"
1774: Enable to prevent loading the plugin if wolfSSL is not in FIPS mode.
1775:
1776: .TP
1777: .BR charon.plugins.xauth-eap.backend " [radius]"
1778: EAP plugin to be used as backend for XAuth credential verification.
1779:
1780: .TP
1781: .BR charon.plugins.xauth-pam.pam_service " [login]"
1782: PAM service to be used for authentication.
1783:
1784: .TP
1785: .BR charon.plugins.xauth-pam.session " [no]"
1786: Open/close a PAM session for each active IKE_SA.
1787:
1788: .TP
1789: .BR charon.plugins.xauth-pam.trim_email " [yes]"
1790: If an email address is received as an XAuth username, trim it to just the
1791: username part.
1792:
1793: .TP
1794: .BR charon.port " [500]"
1795: UDP port used locally. If set to 0 a random port will be allocated.
1796:
1797: .TP
1798: .BR charon.port_nat_t " [4500]"
1799: UDP port used locally in case of NAT\-T. If set to 0 a random port will be
1800: allocated. Has to be different from
1801: .RB "" "charon.port" ","
1802: otherwise a random port
1803: will be allocated.
1804:
1805: .TP
1806: .BR charon.prefer_best_path " [no]"
1807: By default, charon keeps SAs on the routing path with addresses it previously
1808: used if that path is still usable. By setting this option to yes, it tries more
1809: aggressively to update SAs with MOBIKE on routing priority changes using the
1810: cheapest path. This adds more noise, but allows to dynamically adapt SAs to
1811: routing priority changes. This option has no effect if MOBIKE is not supported
1812: or disabled.
1813:
1814: .TP
1815: .BR charon.prefer_configured_proposals " [yes]"
1816: Prefer locally configured proposals for IKE/IPsec over supplied ones as
1817: responder (disabling this can avoid keying retries due to INVALID_KE_PAYLOAD
1818: notifies).
1819:
1820: .TP
1821: .BR charon.prefer_temporary_addrs " [no]"
1822: By default, permanent IPv6 source addresses are preferred over temporary ones
1823: (RFC 4941), to make connections more stable. Enable this option to reverse this.
1824:
1825: It also affects which IPv6 addresses are announced as additional addresses if
1826: MOBIKE is used. If the option is disabled, only permanent addresses are sent,
1827: and only temporary ones if it is enabled.
1828:
1829: .TP
1830: .BR charon.process_route " [yes]"
1831: Process RTM_NEWROUTE and RTM_DELROUTE events.
1832:
1833: .TP
1834: .B charon.processor.priority_threads
1835: .br
1836: Section to configure the number of reserved threads per priority class see JOB
1837: PRIORITY MANAGEMENT in
1838: .RB "" "strongswan.conf" "(5)."
1839:
1840:
1841: .TP
1842: .BR charon.rdn_matching " [strict]"
1843: How RDNs in subject DNs of certificates are matched against configured
1844: identities. Possible values are
1845: .RI "" "strict" ""
1846: (the default),
1847: .RI "" "reordered" ","
1848: and
1849: .RI "" "relaxed" "."
1850: With
1851: .RI "" "strict" ""
1852: the number, type and order of all RDNs has to match,
1853: wildcards (*) for the values of RDNs are allowed (that's the case for all three
1854: variants). Using
1855: .RI "" "reordered" ""
1856: also matches DNs if the RDNs appear in a different
1857: order, the number and type still has to match. Finally,
1858: .RI "" "relaxed" ""
1859: also allows
1860: matches of DNs that contain more RDNs than the configured identity (missing RDNs
1861: are treated like a wildcard match).
1862:
1863: Note that
1864: .RI "" "reordered" ""
1865: and
1866: .RI "" "relaxed" ""
1867: impose a considerable overhead on memory
1868: usage and runtime, in particular, for mismatches, compared to
1869: .RI "" "strict" "."
1870:
1871:
1872: .TP
1873: .BR charon.receive_delay " [0]"
1874: Delay in ms for receiving packets, to simulate larger RTT.
1875:
1876: .TP
1877: .BR charon.receive_delay_request " [yes]"
1878: Delay request messages.
1879:
1880: .TP
1881: .BR charon.receive_delay_response " [yes]"
1882: Delay response messages.
1883:
1884: .TP
1885: .BR charon.receive_delay_type " [0]"
1886: Specific IKEv2 message type to delay, 0 for any.
1887:
1888: .TP
1889: .BR charon.replay_window " [32]"
1890: Size of the AH/ESP replay window, in packets.
1891:
1892: .TP
1893: .BR charon.retransmit_base " [1.8]"
1894: Base to use for calculating exponential back off, see IKEv2 RETRANSMISSION in
1895: .RB "" "strongswan.conf" "(5)."
1896:
1897:
1898: .TP
1899: .BR charon.retransmit_jitter " [0]"
1900: Maximum jitter in percent to apply randomly to calculated retransmission timeout
1901: (0 to disable).
1902:
1903: .TP
1904: .BR charon.retransmit_limit " [0]"
1905: Upper limit in seconds for calculated retransmission timeout (0 to disable).
1906:
1907: .TP
1908: .BR charon.retransmit_timeout " [4.0]"
1909: Timeout in seconds before sending first retransmit.
1910:
1911: .TP
1912: .BR charon.retransmit_tries " [5]"
1913: Number of times to retransmit a packet before giving up.
1914:
1915: .TP
1916: .BR charon.retry_initiate_interval " [0]"
1917: Interval in seconds to use when retrying to initiate an IKE_SA (e.g. if DNS
1918: resolution failed), 0 to disable retries.
1919:
1920: .TP
1921: .BR charon.reuse_ikesa " [yes]"
1922: Initiate CHILD_SA within existing IKE_SAs (always enabled for IKEv1).
1923:
1924: .TP
1925: .BR charon.routing_table " []"
1926: Numerical routing table to install routes to.
1927:
1928: .TP
1929: .BR charon.routing_table_prio " []"
1930: Priority of the routing table.
1931:
1932: .TP
1933: .BR charon.rsa_pss " [no]"
1934: Whether to use RSA with PSS padding instead of PKCS#1 padding by default.
1935:
1936: .TP
1937: .BR charon.send_delay " [0]"
1938: Delay in ms for sending packets, to simulate larger RTT.
1939:
1940: .TP
1941: .BR charon.send_delay_request " [yes]"
1942: Delay request messages.
1943:
1944: .TP
1945: .BR charon.send_delay_response " [yes]"
1946: Delay response messages.
1947:
1948: .TP
1949: .BR charon.send_delay_type " [0]"
1950: Specific IKEv2 message type to delay, 0 for any.
1951:
1952: .TP
1953: .BR charon.send_vendor_id " [no]"
1954: Send strongSwan vendor ID payload
1955:
1956: .TP
1957: .BR charon.signature_authentication " [yes]"
1958: Whether to enable Signature Authentication as per RFC 7427.
1959:
1960: .TP
1961: .BR charon.signature_authentication_constraints " [yes]"
1962: If enabled, signature schemes configured in
1963: .RI "" "rightauth" ","
1964: in addition to getting
1965: used as constraints against signature schemes employed in the certificate chain,
1966: are also used as constraints against the signature scheme used by peers during
1967: IKEv2.
1968:
1969: .TP
1970: .BR charon.spi_label " [0x0000000000000000]"
1971: Value mixed into the local IKE SPIs after applying
1972: .RI "" "spi_mask" "."
1973:
1974:
1975: .TP
1976: .BR charon.spi_mask " [0x0000000000000000]"
1977: Mask applied to local IKE SPIs before mixing in
1978: .RI "" "spi_label" ""
1979: (bits set will be
1980: replaced with
1981: .RI "" "spi_label" ")."
1982:
1983:
1984: .TP
1985: .BR charon.spi_max " [0xcfffffff]"
1986: The upper limit for SPIs requested from the kernel for IPsec SAs.
1987:
1988: .TP
1989: .BR charon.spi_min " [0xc0000000]"
1990: The lower limit for SPIs requested from the kernel for IPsec SAs. Should not be
1991: set lower than 0x00000100 (256), as SPIs between 1 and 255 are reserved by IANA.
1992:
1993: .TP
1994: .B charon.start-scripts
1995: .br
1996: Section containing a list of scripts (name = path) that are executed when the
1997: daemon is started.
1998:
1999: .TP
2000: .B charon.stop-scripts
2001: .br
2002: Section containing a list of scripts (name = path) that are executed when the
2003: daemon is terminated.
2004:
2005: .TP
2006: .B charon.syslog
2007: .br
2008: Section to define syslog loggers, see LOGGER CONFIGURATION in
2009: .RB "" "strongswan.conf" "(5)."
2010:
2011:
2012: .TP
2013: .B charon.syslog.<facility>
2014: .br
2015: <facility> is one of the supported syslog facilities, see LOGGER CONFIGURATION
2016: in
2017: .RB "" "strongswan.conf" "(5)."
2018:
2019:
2020: .TP
2021: .BR charon.syslog.<facility>.<subsystem> " [<default>]"
2022: Loglevel for a specific subsystem.
2023:
2024: .TP
2025: .BR charon.syslog.<facility>.default " [1]"
2026: Specifies the default loglevel to be used for subsystems for which no specific
2027: loglevel is defined.
2028:
2029: .TP
2030: .BR charon.syslog.<facility>.ike_name " [no]"
2031: Prefix each log entry with the connection name and a unique numerical identifier
2032: for each IKE_SA.
2033:
2034: .TP
2035: .BR charon.syslog.identifier " []"
2036: Global identifier used for an
2037: .RB "" "openlog" "(3)"
2038: call, prepended to each log message
2039: by syslog. If not configured,
2040: .RB "" "openlog" "(3)"
2041: is not called, so the value will
2042: depend on system defaults (often the program name).
2043:
2044: .TP
2045: .BR charon.threads " [16]"
2046: Number of worker threads in charon. Several of these are reserved for long
2047: running tasks in internal modules and plugins. Therefore, make sure you don't
2048: set this value too low. The number of idle worker threads listed in
2049: .RI "" "ipsec statusall" ""
2050: might be used as indicator on the number of reserved threads.
2051:
2052: .TP
2053: .BR charon.tls.cipher " []"
2054: List of TLS encryption ciphers.
2055:
2056: .TP
2057: .BR charon.tls.key_exchange " []"
2058: List of TLS key exchange methods.
2059:
2060: .TP
2061: .BR charon.tls.mac " []"
2062: List of TLS MAC algorithms.
2063:
2064: .TP
2065: .BR charon.tls.suites " []"
2066: List of TLS cipher suites.
2067:
2068: .TP
2069: .BR charon.tnc.tnc_config " [/etc/tnc_config]"
2070: TNC IMC/IMV configuration file.
2071:
2072: .TP
2073: .BR charon.user " []"
2074: Name of the user the daemon changes to after startup.
2075:
2076: .TP
2077: .BR charon.x509.enforce_critical " [yes]"
2078: Discard certificates with unsupported or unknown critical extensions.
2079:
2080: .TP
2081: .BR charon-nm.ca_dir " [<default>]"
2082: Directory from which to load CA certificates if no certificate is configured.
2083:
2084: .TP
2085: .B charon-systemd.journal
2086: .br
2087: Section to configure native systemd journal logger, very similar to the syslog
2088: logger as described in LOGGER CONFIGURATION in
2089: .RB "" "strongswan.conf" "(5)."
2090:
2091:
2092: .TP
2093: .BR charon-systemd.journal.<subsystem> " [<default>]"
2094: Loglevel for a specific subsystem.
2095:
2096: .TP
2097: .BR charon-systemd.journal.default " [1]"
2098: Specifies the default loglevel to be used for subsystems for which no specific
2099: loglevel is defined.
2100:
2101: .TP
2102: .BR imv_policy_manager.command_allow " []"
2103: Shell command to be executed with recommendation allow.
2104:
2105: .TP
2106: .BR imv_policy_manager.command_block " []"
2107: Shell command to be executed with all other recommendations.
2108:
2109: .TP
2110: .BR imv_policy_manager.database " []"
2111: Database URI for the database that stores the package information. If it
2112: contains a password, make sure to adjust the permissions of the config file
2113: accordingly.
2114:
2115: .TP
2116: .BR imv_policy_manager.load " [sqlite]"
2117: Plugins to load in IMV policy manager.
2118:
2119: .TP
2120: .BR libimcv.debug_level " [1]"
2121: Debug level for a stand\-alone
2122: .RI "" "libimcv" ""
2123: library.
2124:
2125: .TP
2126: .BR libimcv.load " [random nonce gmp pubkey x509]"
2127: Plugins to load in IMC/IMVs with stand\-alone
2128: .RI "" "libimcv" ""
2129: library.
2130:
2131: .TP
2132: .BR libimcv.plugins.imc-attestation.aik_blob " []"
2133: AIK encrypted private key blob file.
2134:
2135: .TP
2136: .BR libimcv.plugins.imc-attestation.aik_cert " []"
2137: AIK certificate file.
2138:
2139: .TP
2140: .BR libimcv.plugins.imc-attestation.aik_handle " []"
2141: AIK object handle.
2142:
2143: .TP
2144: .BR libimcv.plugins.imc-attestation.aik_pubkey " []"
2145: AIK public key file.
2146:
2147: .TP
2148: .BR libimcv.plugins.imc-attestation.mandatory_dh_groups " [yes]"
2149: Enforce mandatory Diffie\-Hellman groups.
2150:
2151: .TP
2152: .BR libimcv.plugins.imc-attestation.nonce_len " [20]"
2153: DH nonce length.
2154:
2155: .TP
2156: .BR libimcv.plugins.imc-attestation.pcr17_after " []"
2157: PCR17 value after measurement.
2158:
2159: .TP
2160: .BR libimcv.plugins.imc-attestation.pcr17_before " []"
2161: PCR17 value before measurement.
2162:
2163: .TP
2164: .BR libimcv.plugins.imc-attestation.pcr17_meas " []"
2165: Dummy measurement value extended into PCR17 if the TBOOT log is not available.
2166:
2167: .TP
2168: .BR libimcv.plugins.imc-attestation.pcr18_after " []"
2169: PCR18 value after measurement.
2170:
2171: .TP
2172: .BR libimcv.plugins.imc-attestation.pcr18_before " []"
2173: PCR18 value before measurement.
2174:
2175: .TP
2176: .BR libimcv.plugins.imc-attestation.pcr18_meas " []"
2177: Dummy measurement value extended into PCR17 if the TBOOT log is not available.
2178:
2179: .TP
2180: .BR libimcv.plugins.imc-attestation.pcr_info " [no]"
2181: Whether to send pcr_before and pcr_after info.
2182:
2183: .TP
2184: .BR libimcv.plugins.imc-attestation.use_quote2 " [yes]"
2185: Use Quote2 AIK signature instead of Quote signature.
2186:
2187: .TP
2188: .BR libimcv.plugins.imc-attestation.use_version_info " [no]"
2189: Version Info is included in Quote2 signature.
2190:
2191: .TP
2192: .BR libimcv.plugins.imc-hcd.push_info " [yes]"
2193: Send quadruple info without being prompted.
2194:
2195: .TP
2196: .BR libimcv.plugins.imc-hcd.subtypes " []"
2197: Section to define PWG HCD PA subtypes.
2198:
2199: .TP
2200: .BR libimcv.plugins.imc-hcd.subtypes.<section> " []"
2201: Defines a PWG HCD PA subtype section. Recognized subtype section names are
2202: .RI "" "system" ","
2203: .RI "" "control" ","
2204: .RI "" "marker" ","
2205: .RI "" "finisher" ","
2206: .RI "" "interface" ""
2207: and
2208: .RI "" "scanner" "."
2209:
2210:
2211: .TP
2212: .BR libimcv.plugins.imc-hcd.subtypes.<section>.<sw_type> " []"
2213: Defines a software type section. Recognized software type section names are
2214: .RI "" "firmware" ","
2215: .RI "" "resident_application" ""
2216: and
2217: .RI "" "user_application" "."
2218:
2219:
2220: .TP
2221: .BR libimcv.plugins.imc-hcd.subtypes.<section>.<sw_type>.<software> " []"
2222: Defines a software section having an arbitrary name.
2223:
2224: .TP
2225: .BR libimcv.plugins.imc-hcd.subtypes.<section>.<sw_type>.<software>.name " []"
2226: Name of the software installed on the hardcopy device.
2227:
2228: .TP
2229: .BR libimcv.plugins.imc-hcd.subtypes.<section>.<sw_type>.<software>.patches " []"
2230: String describing all patches applied to the given software on this hardcopy
2231: device. The individual patches are separated by a newline character '\\n'.
2232:
2233: .TP
2234: .BR libimcv.plugins.imc-hcd.subtypes.<section>.<sw_type>.<software>.string_version " []"
2235: String describing the version of the given software on this hardcopy device.
2236:
2237: .TP
2238: .BR libimcv.plugins.imc-hcd.subtypes.<section>.<sw_type>.<software>.version " []"
2239: Hex\-encoded version string with a length of 16 octets consisting of the fields
2240: major version number (4 octets), minor version number (4 octets), build number
2241: (4 octets), service pack major number (2 octets) and service pack minor number
2242: (2 octets).
2243:
2244: .TP
2245: .BR libimcv.plugins.imc-hcd.subtypes.<section>.attributes_natural_language " [en]"
2246: Variable length natural language tag conforming to RFC 5646 specifies the
2247: language to be used in the health assessment message of a given subtype.
2248:
2249: .TP
2250: .BR libimcv.plugins.imc-hcd.subtypes.system.certification_state " []"
2251: Hex\-encoded certification state.
2252:
2253: .TP
2254: .BR libimcv.plugins.imc-hcd.subtypes.system.configuration_state " []"
2255: Hex\-encoded configuration state.
2256:
2257: .TP
2258: .BR libimcv.plugins.imc-hcd.subtypes.system.machine_type_model " []"
2259: String specifying the machine type and model of the hardcopy device.
2260:
2261: .TP
2262: .BR libimcv.plugins.imc-hcd.subtypes.system.pstn_fax_enabled " [no]"
2263: Specifies if a PSTN facsimile interface is installed and enabled on the hardcopy
2264: device.
2265:
2266: .TP
2267: .BR libimcv.plugins.imc-hcd.subtypes.system.time_source " []"
2268: String specifying the hostname of the network time server used by the hardcopy
2269: device.
2270:
2271: .TP
2272: .BR libimcv.plugins.imc-hcd.subtypes.system.user_application_enabled " [no]"
2273: Specifies if users can dynamically download and execute applications on the
2274: hardcopy device.
2275:
2276: .TP
2277: .BR libimcv.plugins.imc-hcd.subtypes.system.user_application_persistence_enabled " [no]"
2278: Specifies if user dynamically downloaded applications can persist outside the
2279: boundaries of a single job on the hardcopy device.
2280:
2281: .TP
2282: .BR libimcv.plugins.imc-hcd.subtypes.system.vendor_name " []"
2283: String specifying the manufacturer of the hardcopy device.
2284:
2285: .TP
2286: .BR libimcv.plugins.imc-hcd.subtypes.system.vendor_smi_code " []"
2287: Integer specifying the globally unique 24\-bit SMI code assigned to the
2288: manufacturer of the hardcopy device.
2289:
2290: .TP
2291: .BR libimcv.plugins.imc-os.device_cert " []"
2292: Manually set the path to the client device certificate (e.g.
2293: /etc/pts/aikCert.der)
2294:
2295: .TP
2296: .BR libimcv.plugins.imc-os.device_handle " []"
2297: Manually set handle to a private key bound to a smartcard or TPM (e.g.
2298: 0x81010004)
2299:
2300: .TP
2301: .BR libimcv.plugins.imc-os.device_id " []"
2302: Manually set the client device ID in hexadecimal format (e.g.
2303: 1083f03988c9762703b1c1080c2e46f72b99cc31)
2304:
2305: .TP
2306: .BR libimcv.plugins.imc-os.device_pubkey " []"
2307: Manually set the path to the client device public key (e.g. /etc/pts/aikPub.der)
2308:
2309: .TP
2310: .BR libimcv.plugins.imc-os.push_info " [yes]"
2311: Send operating system info without being prompted.
2312:
2313: .TP
2314: .BR libimcv.plugins.imc-scanner.push_info " [yes]"
2315: Send open listening ports without being prompted.
2316:
2317: .TP
2318: .BR libimcv.plugins.imc-swima.eid_epoch " [0x11223344]"
2319: Set 32 bit epoch value for event IDs manually if software collector database is
2320: not available.
2321:
2322: .TP
2323: .BR libimcv.plugins.imc-swima.subscriptions " [no]"
2324: Accept SW Inventory or SW Events subscriptions.
2325:
2326: .TP
2327: .BR libimcv.plugins.imc-swima.swid_database " []"
2328: URI to software collector database containing event timestamps, software
2329: creation and deletion events and collected software identifiers. If it contains
2330: a password, make sure to adjust the permissions of the config file accordingly.
2331:
2332: .TP
2333: .BR libimcv.plugins.imc-swima.swid_directory " [${prefix}/share]"
2334: Directory where SWID tags are located.
2335:
2336: .TP
2337: .BR libimcv.plugins.imc-swima.swid_full " [no]"
2338: Include file information in the XML\-encoded SWID tags.
2339:
2340: .TP
2341: .BR libimcv.plugins.imc-swima.swid_pretty " [no]"
2342: Generate XML\-encoded SWID tags with pretty indentation.
2343:
2344: .TP
2345: .BR libimcv.plugins.imc-test.additional_ids " [0]"
2346: Number of additional IMC IDs.
2347:
2348: .TP
2349: .BR libimcv.plugins.imc-test.command " [none]"
2350: Command to be sent to the Test IMV.
2351:
2352: .TP
2353: .BR libimcv.plugins.imc-test.dummy_size " [0]"
2354: Size of dummy attribute to be sent to the Test IMV (0 = disabled).
2355:
2356: .TP
2357: .BR libimcv.plugins.imc-test.retry " [no]"
2358: Do a handshake retry.
2359:
2360: .TP
2361: .BR libimcv.plugins.imc-test.retry_command " []"
2362: Command to be sent to the Test IMV in the handshake retry.
2363:
2364: .TP
2365: .BR libimcv.plugins.imv-attestation.cadir " []"
2366: Path to directory with AIK cacerts.
2367:
2368: .TP
2369: .BR libimcv.plugins.imv-attestation.dh_group " [ecp256]"
2370: Preferred Diffie\-Hellman group.
2371:
2372: .TP
2373: .BR libimcv.plugins.imv-attestation.hash_algorithm " [sha256]"
2374: Preferred measurement hash algorithm.
2375:
2376: .TP
2377: .BR libimcv.plugins.imv-attestation.mandatory_dh_groups " [yes]"
2378: Enforce mandatory Diffie\-Hellman groups.
2379:
2380: .TP
2381: .BR libimcv.plugins.imv-attestation.min_nonce_len " [0]"
2382: DH minimum nonce length.
2383:
2384: .TP
2385: .BR libimcv.plugins.imv-os.remediation_uri " []"
2386: URI pointing to operating system remediation instructions.
2387:
2388: .TP
2389: .BR libimcv.plugins.imv-scanner.remediation_uri " []"
2390: URI pointing to scanner remediation instructions.
2391:
2392: .TP
2393: .BR libimcv.plugins.imv-swima.rest_api.timeout " [120]"
2394: Timeout of SWID REST API HTTP POST transaction.
2395:
2396: .TP
2397: .BR libimcv.plugins.imv-swima.rest_api.uri " []"
2398: HTTP URI of the SWID REST API.
2399:
2400: .TP
2401: .BR libimcv.plugins.imv-test.rounds " [0]"
2402: Number of IMC\-IMV retry rounds.
2403:
2404: .TP
2405: .BR libimcv.stderr_quiet " [no]"
2406: Disable output to stderr with a stand\-alone
2407: .RI "" "libimcv" ""
2408: library.
2409:
2410: .TP
2411: .BR libimcv.swid_gen.command " [/usr/local/bin/swid_generator]"
2412: SWID generator command to be executed.
2413:
2414: .TP
2415: .BR libimcv.swid_gen.tag_creator.name " [strongSwan Project]"
2416: Name of the tagCreator entity.
2417:
2418: .TP
2419: .BR libimcv.swid_gen.tag_creator.regid " [strongswan.org]"
2420: regid of the tagCreator entity.
2421:
2422: .TP
2423: .BR manager.database " []"
2424: Credential database URI for manager. If it contains a password, make sure to
2425: adjust the permissions of the config file accordingly.
2426:
2427: .TP
2428: .BR manager.debug " [no]"
2429: Enable debugging in manager.
2430:
2431: .TP
2432: .BR manager.load " []"
2433: Plugins to load in manager.
2434:
2435: .TP
2436: .BR manager.socket " []"
2437: FastCGI socket of manager, to run it statically.
2438:
2439: .TP
2440: .BR manager.threads " [10]"
2441: Threads to use for request handling.
2442:
2443: .TP
2444: .BR manager.timeout " [15m]"
2445: Session timeout for manager.
2446:
2447: .TP
2448: .BR medsrv.database " []"
2449: Mediation server database URI. If it contains a password, make sure to adjust
2450: the permissions of the config file accordingly.
2451:
2452: .TP
2453: .BR medsrv.debug " [no]"
2454: Debugging in mediation server web application.
2455:
2456: .TP
2457: .BR medsrv.dpd " [5m]"
2458: DPD timeout to use in mediation server plugin.
2459:
2460: .TP
2461: .BR medsrv.load " []"
2462: Plugins to load in mediation server plugin.
2463:
2464: .TP
2465: .BR medsrv.password_length " [6]"
2466: Minimum password length required for mediation server user accounts.
2467:
2468: .TP
2469: .BR medsrv.rekey " [20m]"
2470: Rekeying time on mediation connections in mediation server plugin.
2471:
2472: .TP
2473: .BR medsrv.socket " []"
2474: Run Mediation server web application statically on socket.
2475:
2476: .TP
2477: .BR medsrv.threads " [5]"
2478: Number of thread for mediation service web application.
2479:
2480: .TP
2481: .BR medsrv.timeout " [15m]"
2482: Session timeout for mediation service.
2483:
2484: .TP
2485: .BR pki.load " []"
2486: Plugins to load in ipsec pki tool.
2487:
2488: .TP
2489: .BR pool.database " []"
2490: Database URI for the database that stores IP pools and configuration attributes.
2491: If it contains a password, make sure to adjust the permissions of the
2492: config file accordingly.
2493:
2494: .TP
2495: .BR pool.load " []"
2496: Plugins to load in ipsec pool tool.
2497:
2498: .TP
2499: .BR scepclient.load " []"
2500: Plugins to load in ipsec scepclient tool.
2501:
2502: .TP
2503: .B sec-updater
2504: .br
2505: Options for the sec\-updater tool.
2506:
2507: .TP
2508: .BR sec-updater.database " []"
2509: Global IMV policy database URI. If it contains a password, make sure to adjust
2510: the permissions of the config file accordingly.
2511:
2512: .TP
2513: .BR sec-updater.load " []"
2514: Plugins to load in sec\-updater tool.
2515:
2516: .TP
2517: .BR sec-updater.swid_gen.command " [/usr/local/bin/swid_generator]"
2518: SWID generator command to be executed.
2519:
2520: .TP
2521: .BR sec-updater.swid_gen.tag_creator.name " [strongSwan Project]"
2522: Name of the tagCreator entity.
2523:
2524: .TP
2525: .BR sec-updater.swid_gen.tag_creator.regid " [strongswan.org]"
2526: regid of the tagCreator entity.
2527:
2528: .TP
2529: .BR sec-updater.tmp.deb_file " [/tmp/sec-updater.deb]"
2530: Temporary storage for downloaded deb package file.
2531:
2532: .TP
2533: .BR sec-updater.tmp.tag_file " [/tmp/sec-updater.tag]"
2534: Temporary storage for generated SWID tags.
2535:
2536: .TP
2537: .BR sec-updater.tnc_manage_command " [/var/www/tnc/manage.py]"
2538: strongTNC manage.py command used to import SWID tags.
2539:
2540: .TP
2541: .BR starter.config_file " [${sysconfdir}/ipsec.conf]"
2542: Location of the ipsec.conf file
2543:
2544: .TP
2545: .BR starter.load_warning " [yes]"
2546: Disable charon plugin load option warning.
2547:
2548: .TP
2549: .B sw-collector
2550: .br
2551: Options for the sw\-collector tool.
2552:
2553: .TP
2554: .BR sw-collector.database " []"
2555: URI to software collector database containing event timestamps, software
2556: creation and deletion events and collected software identifiers. If it contains
2557: a password, make sure to adjust the permissions of the config file accordingly.
2558:
2559: .TP
2560: .BR sw-collector.first_file " [/var/log/bootstrap.log]"
2561: Path pointing to file created when the Linux OS was installed.
2562:
2563: .TP
2564: .BR sw-collector.first_time " [0000-00-00T00:00:00Z]"
2565: Time in UTC when the Linux OS was installed.
2566:
2567: .TP
2568: .BR sw-collector.history " []"
2569: Path pointing to apt history.log file.
2570:
2571: .TP
2572: .BR sw-collector.load " []"
2573: Plugins to load in sw\-collector tool.
2574:
2575: .TP
2576: .BR sw-collector.rest_api.timeout " [120]"
2577: Timeout of REST API HTTP POST transaction.
2578:
2579: .TP
2580: .BR sw-collector.rest_api.uri " []"
2581: HTTP URI of the central collector's REST API.
2582:
2583: .TP
2584: .BR swanctl.load " []"
2585: Plugins to load in swanctl.
2586:
2587: .TP
2588: .BR swanctl.socket " [unix://${piddir}/charon.vici]"
2589: VICI socket to connect to by default.
2590:
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>