Annotation of embedaddon/strongswan/conf/strongswan.conf.5.main, revision 1.1.1.2
1.1 misho 1: .TP
2: .BR aikgen.load " []"
3: Plugins to load in ipsec aikgen tool.
4:
5: .TP
6: .BR attest.database " []"
7: File measurement information database URI. If it contains a password, make sure
8: to adjust the permissions of the config file accordingly.
9:
10: .TP
11: .BR attest.load " []"
12: Plugins to load in ipsec attest tool.
13:
14: .TP
15: .B charon
16: .br
17: Options for the charon IKE daemon.
18:
19: .RB "" "Note" ":"
20: Many of the options in this section also apply to
21: .RB "" "charon\-cmd" ""
22: and
23: other
24: .RB "" "charon" ""
25: derivatives. Just use their respective name (e.g.
26: .RB "" "charon\-cmd" ""
27: instead of
28: .RB "" "charon" ")."
29: For many options defaults can be defined
30: in the
31: .RB "" "libstrongswan" ""
32: section.
33:
34: .TP
35: .BR charon.accept_private_algs " [no]"
36: Deliberately violate the IKE standard's requirement and allow the use of private
37: algorithm identifiers, even if the peer implementation is unknown.
38:
39: .TP
40: .BR charon.accept_unencrypted_mainmode_messages " [no]"
41: Accept unencrypted ID and HASH payloads in IKEv1 Main Mode.
42:
43: Some implementations send the third Main Mode message unencrypted, probably to
44: find the PSKs for the specified ID for authentication. This is very similar to
45: Aggressive Mode, and has the same security implications: A passive attacker can
46: sniff the negotiated Identity, and start brute forcing the PSK using the HASH
47: payload.
48:
49: It is recommended to keep this option to no, unless you know exactly what the
50: implications are and require compatibility to such devices (for example, some
51: SonicWall boxes).
52:
53: .TP
54: .BR charon.block_threshold " [5]"
55: Maximum number of half\-open IKE_SAs for a single peer IP.
56:
57: .TP
58: .BR charon.cache_crls " [no]"
59: Whether Certificate Revocation Lists (CRLs) fetched via HTTP or LDAP should be
60: saved under a unique file name derived from the public key of the Certification
61: Authority (CA) to
62: .RB "" "/etc/ipsec.d/crls" ""
63: (stroke) or
64: .RB "" "/etc/swanctl/x509crl" ""
65: (vici), respectively.
66:
67: .TP
68: .BR charon.cert_cache " [yes]"
69: Whether relations in validated certificate chains should be cached in memory.
70:
71: .TP
1.1.1.2 ! misho 72: .BR charon.check_current_path " [no]"
! 73: By default, after detecting any changes to interfaces and/or addresses no action
! 74: is taken if the current path to the remote peer still looks usable. Enabling
! 75: this option will use DPD to check if the path actually still works, or, for
! 76: instance, the peer removed the state after a longer phase without connectivity.
! 77: It will also trigger a MOBIKE update if NAT mappings were removed during the
! 78: downtime.
! 79:
! 80: .TP
! 81: .BR charon.cisco_flexvpn " [no]"
! 82: Send the Cisco FlexVPN vendor ID payload, which is required in order to make
! 83: Cisco brand devices allow negotiating a local traffic selector (from
! 84: strongSwan's point of view) that is not the assigned virtual IP address if such
! 85: an address is requested by strongSwan. Sending the Cisco FlexVPN vendor ID
! 86: prevents the peer from narrowing the initiator's local traffic selector and
! 87: allows it to e.g. negotiate a TS of 0.0.0.0/0 == 0.0.0.0/0 instead. This has
! 88: been tested with a "tunnel mode ipsec ipv4" Cisco template but should also work
! 89: for GRE encapsulation.
! 90:
! 91: .TP
1.1 misho 92: .BR charon.cisco_unity " [no]"
93: Send Cisco Unity vendor ID payload (IKEv1 only).
94:
95: .TP
96: .BR charon.close_ike_on_child_failure " [no]"
97: Close the IKE_SA if setup of the CHILD_SA along with IKE_AUTH failed.
98:
99: .TP
100: .BR charon.cookie_threshold " [10]"
101: Number of half\-open IKE_SAs that activate the cookie mechanism.
102:
103: .TP
104: .BR charon.crypto_test.bench " [no]"
105: Benchmark crypto algorithms and order them by efficiency.
106:
107: .TP
108: .BR charon.crypto_test.bench_size " [1024]"
109: Buffer size used for crypto benchmark.
110:
111: .TP
112: .BR charon.crypto_test.bench_time " [50]"
113: Time in ms during which crypto algorithm performance is measured.
114:
115: .TP
116: .BR charon.crypto_test.on_add " [no]"
117: Test crypto algorithms during registration (requires test vectors provided by
118: the
119: .RI "" "test\-vectors" ""
120: plugin).
121:
122: .TP
123: .BR charon.crypto_test.on_create " [no]"
124: Test crypto algorithms on each crypto primitive instantiation.
125:
126: .TP
127: .BR charon.crypto_test.required " [no]"
128: Strictly require at least one test vector to enable an algorithm.
129:
130: .TP
131: .BR charon.crypto_test.rng_true " [no]"
132: Whether to test RNG with TRUE quality; requires a lot of entropy.
133:
134: .TP
135: .BR charon.delete_rekeyed " [no]"
136: Delete CHILD_SAs right after they got successfully rekeyed (IKEv1 only). Reduces
137: the number of stale CHILD_SAs in scenarios with a lot of rekeyings. However,
138: this might cause problems with implementations that continue to use rekeyed SAs
139: until they expire.
140:
141: .TP
142: .BR charon.delete_rekeyed_delay " [5]"
143: Delay in seconds until inbound IPsec SAs are deleted after rekeyings (IKEv2
144: only). To process delayed packets the inbound part of a CHILD_SA is kept
145: installed up to the configured number of seconds after it got replaced during a
146: rekeying. If set to 0 the CHILD_SA will be kept installed until it expires (if
147: no lifetime is set it will be destroyed immediately).
148:
149: .TP
150: .BR charon.dh_exponent_ansi_x9_42 " [yes]"
151: Use ANSI X9.42 DH exponent size or optimum size matched to cryptographic
152: strength.
153:
154: .TP
155: .BR charon.dlopen_use_rtld_now " [no]"
156: Use RTLD_NOW with dlopen when loading plugins and IMV/IMCs to reveal missing
157: symbols immediately.
158:
159: .TP
160: .BR charon.dns1 " []"
161: DNS server assigned to peer via configuration payload (CP).
162:
163: .TP
164: .BR charon.dns2 " []"
165: DNS server assigned to peer via configuration payload (CP).
166:
167: .TP
168: .BR charon.dos_protection " [yes]"
169: Enable Denial of Service protection using cookies and aggressiveness checks.
170:
171: .TP
172: .B charon.filelog
173: .br
174: Section to define file loggers, see LOGGER CONFIGURATION in
175: .RB "" "strongswan.conf" "(5)."
176:
177:
178: .TP
179: .B charon.filelog.<name>
180: .br
181: <name> may be the full path to the log file if it only contains characters
182: permitted in section names. Is ignored if
183: .RI "" "path" ""
184: is specified.
185:
186: .TP
187: .BR charon.filelog.<name>.<subsystem> " [<default>]"
188: Loglevel for a specific subsystem.
189:
190: .TP
191: .BR charon.filelog.<name>.append " [yes]"
192: If this option is enabled log entries are appended to the existing file.
193:
194: .TP
195: .BR charon.filelog.<name>.default " [1]"
196: Specifies the default loglevel to be used for subsystems for which no specific
197: loglevel is defined.
198:
199: .TP
200: .BR charon.filelog.<name>.flush_line " [no]"
201: Enabling this option disables block buffering and enables line buffering.
202:
203: .TP
204: .BR charon.filelog.<name>.ike_name " [no]"
205: Prefix each log entry with the connection name and a unique numerical identifier
206: for each IKE_SA.
207:
208: .TP
1.1.1.2 ! misho 209: .BR charon.filelog.<name>.log_level " [no]"
! 210: Add the log level of each message after the subsystem (e.g. [IKE2]).
! 211:
! 212: .TP
1.1 misho 213: .BR charon.filelog.<name>.path " []"
214: Optional path to the log file. Overrides the section name. Must be used if the
215: path contains characters that aren't allowed in section names.
216:
217: .TP
218: .BR charon.filelog.<name>.time_add_ms " [no]"
219: Adds the milliseconds within the current second after the timestamp (separated
220: by a dot, so
221: .RI "" "time_format" ""
222: should end with %S or %T).
223:
224: .TP
225: .BR charon.filelog.<name>.time_format " []"
226: Prefix each log entry with a timestamp. The option accepts a format string as
227: passed to
228: .RB "" "strftime" "(3)."
229:
230:
231: .TP
232: .BR charon.flush_auth_cfg " [no]"
233: If enabled objects used during authentication (certificates, identities etc.)
234: are released to free memory once an IKE_SA is established. Enabling this might
235: conflict with plugins that later need access to e.g. the used certificates.
236:
237: .TP
238: .BR charon.follow_redirects " [yes]"
239: Whether to follow IKEv2 redirects (RFC 5685).
240:
241: .TP
1.1.1.2 ! misho 242: .BR charon.force_eap_only_authentication " [no]"
! 243: Violate RFC 5998 and use EAP\-only authentication even if the peer did not send
! 244: an EAP_ONLY_AUTHENTICATION notify during IKE_AUTH.
! 245:
! 246: .TP
1.1 misho 247: .BR charon.fragment_size " [1280]"
248: Maximum size (complete IP datagram size in bytes) of a sent IKE fragment when
249: using proprietary IKEv1 or standardized IKEv2 fragmentation, defaults to 1280
250: (use 0 for address family specific default values, which uses a lower value for
251: IPv4). If specified this limit is used for both IPv4 and IPv6.
252:
253: .TP
254: .BR charon.group " []"
255: Name of the group the daemon changes to after startup.
256:
257: .TP
258: .BR charon.half_open_timeout " [30]"
259: Timeout in seconds for connecting IKE_SAs (also see IKE_SA_INIT DROPPING).
260:
261: .TP
262: .BR charon.hash_and_url " [no]"
263: Enable hash and URL support.
264:
265: .TP
266: .BR charon.host_resolver.max_threads " [3]"
267: Maximum number of concurrent resolver threads (they are terminated if unused).
268:
269: .TP
270: .BR charon.host_resolver.min_threads " [0]"
271: Minimum number of resolver threads to keep around.
272:
273: .TP
274: .BR charon.i_dont_care_about_security_and_use_aggressive_mode_psk " [no]"
275: If enabled responders are allowed to use IKEv1 Aggressive Mode with pre\-shared
276: keys, which is discouraged due to security concerns (offline attacks on the
277: openly transmitted hash of the PSK).
278:
279: .TP
280: .BR charon.ignore_acquire_ts " [no]"
281: If this is disabled the traffic selectors from the kernel's acquire events,
282: which are derived from the triggering packet, are prepended to the traffic
283: selectors from the configuration for IKEv2 connection. By enabling this, such
284: specific traffic selectors will be ignored and only the ones in the config will
285: be sent. This always happens for IKEv1 connections as the protocol only supports
286: one set of traffic selectors per CHILD_SA.
287:
288: .TP
289: .BR charon.ignore_routing_tables " []"
290: A space\-separated list of routing tables to be excluded from route lookups.
291:
292: .TP
293: .BR charon.ikesa_limit " [0]"
294: Maximum number of IKE_SAs that can be established at the same time before new
295: connection attempts are blocked.
296:
297: .TP
298: .BR charon.ikesa_table_segments " [1]"
299: Number of exclusively locked segments in the hash table.
300:
301: .TP
302: .BR charon.ikesa_table_size " [1]"
303: Size of the IKE_SA hash table.
304:
305: .TP
306: .B charon.imcv
307: .br
308: Defaults for options in this section can be configured in the
309: .RI "" "libimcv" ""
310: section.
311:
312: .TP
313: .BR charon.imcv.assessment_result " [yes]"
314: Whether IMVs send a standard IETF Assessment Result attribute.
315:
316: .TP
317: .BR charon.imcv.database " []"
318: Global IMV policy database URI. If it contains a password, make sure to adjust
319: the permissions of the config file accordingly.
320:
321: .TP
322: .BR charon.imcv.os_info.default_password_enabled " [no]"
323: Manually set whether a default password is enabled
324:
325: .TP
326: .BR charon.imcv.os_info.name " []"
327: Manually set the name of the client OS (e.g. Ubuntu).
328:
329: .TP
330: .BR charon.imcv.os_info.version " []"
331: Manually set the version of the client OS (e.g. 12.04 i686).
332:
333: .TP
334: .BR charon.imcv.policy_script " [ipsec _imv_policy]"
335: Script called for each TNC connection to generate IMV policies.
336:
337: .TP
338: .BR charon.inactivity_close_ike " [no]"
339: Whether to close IKE_SA if the only CHILD_SA closed due to inactivity.
340:
341: .TP
342: .BR charon.init_limit_half_open " [0]"
343: Limit new connections based on the current number of half open IKE_SAs, see
344: IKE_SA_INIT DROPPING in
345: .RB "" "strongswan.conf" "(5)."
346:
347:
348: .TP
349: .BR charon.init_limit_job_load " [0]"
350: Limit new connections based on the number of jobs currently queued for
351: processing (see IKE_SA_INIT DROPPING).
352:
353: .TP
354: .BR charon.initiator_only " [no]"
355: Causes charon daemon to ignore IKE initiation requests.
356:
357: .TP
358: .BR charon.install_routes " [yes]"
359: Install routes into a separate routing table for established IPsec tunnels.
360:
361: .TP
362: .BR charon.install_virtual_ip " [yes]"
363: Install virtual IP addresses.
364:
365: .TP
366: .BR charon.install_virtual_ip_on " []"
367: The name of the interface on which virtual IP addresses should be installed. If
368: not specified the addresses will be installed on the outbound interface.
369:
370: .TP
371: .BR charon.integrity_test " [no]"
372: Check daemon, libstrongswan and plugin integrity at startup.
373:
374: .TP
375: .BR charon.interfaces_ignore " []"
376: A comma\-separated list of network interfaces that should be ignored, if
377: .RB "" "interfaces_use" ""
378: is specified this option has no effect.
379:
380: .TP
381: .BR charon.interfaces_use " []"
382: A comma\-separated list of network interfaces that should be used by charon. All
383: other interfaces are ignored.
384:
385: .TP
386: .BR charon.keep_alive " [20s]"
387: NAT keep alive interval.
388:
389: .TP
1.1.1.2 ! misho 390: .BR charon.keep_alive_dpd_margin " [0s]"
! 391: Number of seconds the keep alive interval may be exceeded before a DPD is sent
! 392: instead of a NAT keep alive (0 to disable). This is only useful if a clock is
! 393: used that includes time spent suspended (e.g. CLOCK_BOOTTIME).
! 394:
! 395: .TP
1.1 misho 396: .BR charon.leak_detective.detailed " [yes]"
397: Includes source file names and line numbers in leak detective output.
398:
399: .TP
400: .BR charon.leak_detective.usage_threshold " [10240]"
401: Threshold in bytes for leaks to be reported (0 to report all).
402:
403: .TP
404: .BR charon.leak_detective.usage_threshold_count " [0]"
405: Threshold in number of allocations for leaks to be reported (0 to report all).
406:
407: .TP
408: .BR charon.load " []"
409: Plugins to load in the IKE daemon charon.
410:
411: .TP
412: .BR charon.load_modular " [no]"
413: If enabled, the list of plugins to load is determined via the value of the
414: .RI "" "charon.plugins.<name>.load" ""
415: options. In addition to a simple boolean flag that
416: option may take an integer value indicating the priority of a plugin, which
417: would influence the order of a plugin in the plugin list (the default is 1). If
418: two plugins have the same priority their order in the default plugin list is
419: preserved. Enabled plugins not found in that list are ordered alphabetically
420: before other plugins with the same priority.
421:
422: .TP
423: .BR charon.make_before_break " [no]"
424: Initiate IKEv2 reauthentication with a make\-before\-break instead of a
425: break\-before\-make scheme. Make\-before\-break uses overlapping IKE and CHILD_SA
426: during reauthentication by first recreating all new SAs before deleting the old
427: ones. This behavior can be beneficial to avoid connectivity gaps during
428: reauthentication, but requires support for overlapping SAs by the peer.
429: strongSwan can handle such overlapping SAs since version 5.3.0.
430:
431: .TP
432: .BR charon.max_ikev1_exchanges " [3]"
433: Maximum number of IKEv1 phase 2 exchanges per IKE_SA to keep state about and
434: track concurrently.
435:
436: .TP
437: .BR charon.max_packet " [10000]"
438: Maximum packet size accepted by charon.
439:
440: .TP
441: .BR charon.multiple_authentication " [yes]"
442: Enable multiple authentication exchanges (RFC 4739).
443:
444: .TP
445: .BR charon.nbns1 " []"
446: WINS servers assigned to peer via configuration payload (CP).
447:
448: .TP
449: .BR charon.nbns2 " []"
450: WINS servers assigned to peer via configuration payload (CP).
451:
452: .TP
453: .BR charon.plugin.ha.buflen " [2048]"
454: Buffer size for received HA messages. For IKEv1 the public DH factors are also
455: transmitted so depending on the DH group the HA messages can get quite big (the
456: default should be fine up to
457: .RI "" "modp4096" ")."
458:
459:
460: .TP
461: .BR charon.plugins.addrblock.strict " [yes]"
462: If set to yes, a subject certificate without an addrblock extension is rejected
463: if the issuer certificate has such an addrblock extension. If set to no, subject
464: certificates issued without the addrblock extension are accepted without any
465: traffic selector checks and no policy is enforced by the plugin.
466:
467: .TP
468: .BR charon.plugins.android_log.loglevel " [1]"
469: Loglevel for logging to Android specific logger.
470:
471: .TP
472: .B charon.plugins.attr
473: .br
474: Section to specify arbitrary attributes that are assigned to a peer via
475: configuration payload (CP).
476:
477: .TP
478: .BR charon.plugins.attr.<attr> " []"
479: .RB "" "<attr>" ""
480: can be either
481: .RI "" "address" ","
482: .RI "" "netmask" ","
483: .RI "" "dns" ","
484: .RI "" "nbns" ","
485: .RI "" "dhcp" ","
486: .RI "" "subnet" ","
487: .RI "" "split\-include" ","
488: .RI "" "split\-exclude" ""
489: or the numeric identifier of the attribute
490: type. The assigned value can be an IPv4/IPv6 address, a subnet in CIDR notation
491: or an arbitrary value depending on the attribute type. For some attribute types
492: multiple values may be specified as a comma separated list.
493:
494: .TP
495: .BR charon.plugins.attr-sql.crash_recovery " [yes]"
496: Release all online leases during startup. Disable this to share the DB between
497: multiple VPN gateways.
498:
499: .TP
500: .BR charon.plugins.attr-sql.database " []"
501: Database URI for attr\-sql plugin used by charon. If it contains a password, make
502: sure to adjust the permissions of the config file accordingly.
503:
504: .TP
505: .BR charon.plugins.attr-sql.lease_history " [yes]"
506: Enable logging of SQL IP pool leases.
507:
508: .TP
509: .BR charon.plugins.bliss.use_bliss_b " [yes]"
510: Use the enhanced BLISS\-B key generation and signature algorithm.
511:
512: .TP
1.1.1.2 ! misho 513: .BR charon.plugins.botan.internal_rng_only " [no]"
! 514: If enabled, only Botan's internal RNG will be used throughout the plugin.
! 515: Otherwise, and if supported by Botan, rng_t implementations provided by other
! 516: loaded plugins will be used as RNG.
! 517:
! 518: .TP
1.1 misho 519: .BR charon.plugins.bypass-lan.interfaces_ignore " []"
520: A comma\-separated list of network interfaces for which connected subnets should
521: be ignored, if
522: .RB "" "interfaces_use" ""
523: is specified this option has no effect.
524:
525: .TP
526: .BR charon.plugins.bypass-lan.interfaces_use " []"
527: A comma\-separated list of network interfaces for which connected subnets should
528: be considered. All other interfaces are ignored.
529:
530: .TP
531: .BR charon.plugins.certexpire.csv.cron " []"
532: Cron style string specifying CSV export times.
533:
534: .TP
535: .BR charon.plugins.certexpire.csv.empty_string " []"
536: String to use in empty intermediate CA fields.
537:
538: .TP
539: .BR charon.plugins.certexpire.csv.fixed_fields " [yes]"
540: Use a fixed intermediate CA field count.
541:
542: .TP
543: .BR charon.plugins.certexpire.csv.force " [yes]"
544: Force export of all trustchains we have a private key for.
545:
546: .TP
547: .BR charon.plugins.certexpire.csv.format " [%d:%m:%Y]"
548: .RB "" "strftime" "(3)"
549: format string to export expiration dates as.
550:
551: .TP
552: .BR charon.plugins.certexpire.csv.local " []"
553: .RB "" "strftime" "(3)"
554: format string for the CSV file name to export local certificates
555: to.
556:
557: .TP
558: .BR charon.plugins.certexpire.csv.remote " []"
559: .RB "" "strftime" "(3)"
560: format string for the CSV file name to export remote
561: certificates to.
562:
563: .TP
564: .BR charon.plugins.certexpire.csv.separator " [,]"
565: CSV field separator.
566:
567: .TP
568: .BR charon.plugins.coupling.file " []"
569: File to store coupling list to.
570:
571: .TP
572: .BR charon.plugins.coupling.hash " [sha1]"
573: Hashing algorithm to fingerprint coupled certificates.
574:
575: .TP
576: .BR charon.plugins.coupling.max " [1]"
577: Maximum number of coupling entries to create.
578:
579: .TP
580: .BR charon.plugins.curl.redir " [-1]"
581: Maximum number of redirects followed by the plugin, set to 0 to disable
582: following redirects, set to \-1 for no limit.
583:
584: .TP
585: .BR charon.plugins.dhcp.force_server_address " [no]"
586: Always use the configured server address. This might be helpful if the DHCP
587: server runs on the same host as strongSwan, and the DHCP daemon does not listen
588: on the loopback interface. In that case the server cannot be reached via
589: unicast (or even 255.255.255.255) as that would be routed via loopback. Setting
590: this option to yes and configuring the local broadcast address (e.g.
591: 192.168.0.255) as server address might work.
592:
593: .TP
594: .BR charon.plugins.dhcp.identity_lease " [no]"
595: Derive user\-defined MAC address from hash of IKE identity and send client
596: identity DHCP option.
597:
598: .TP
599: .BR charon.plugins.dhcp.interface " []"
600: Interface name the plugin uses for address allocation. The default is to bind to
601: any (0.0.0.0) and let the system decide which way to route the packets to the
602: DHCP server.
603:
604: .TP
605: .BR charon.plugins.dhcp.server " [255.255.255.255]"
606: DHCP server unicast or broadcast IP address.
607:
608: .TP
609: .BR charon.plugins.dhcp.use_server_port " [no]"
610: Use the DHCP server port (67) as source port, instead of the DHCP client port
611: (68), when a unicast server address is configured and the plugin acts as relay
612: agent. When replying in this mode the DHCP server will always send packets to
613: the DHCP server port and if no process binds that port an ICMP port unreachables
614: will be sent back, which might be problematic for some DHCP servers. To avoid
615: that, enabling this option will cause the plugin to bind the DHCP server port to
616: send its requests when acting as relay agent. This is not necessary if a DHCP
617: server is already running on the same host and might even cause conflicts (and
618: since the server port is already bound, ICMPs should not be an issue).
619:
620: .TP
621: .BR charon.plugins.dnscert.enable " [no]"
622: Enable fetching of CERT RRs via DNS.
623:
624: .TP
625: .BR charon.plugins.drbg.max_drbg_requests " [4294967294]"
626: Number of pseudo\-random bit requests from the DRBG before an automatic reseeding
627: occurs.
628:
629: .TP
630: .BR charon.plugins.duplicheck.enable " [yes]"
631: Enable duplicheck plugin (if loaded).
632:
633: .TP
634: .BR charon.plugins.duplicheck.socket " [unix://${piddir}/charon.dck]"
635: Socket provided by the duplicheck plugin.
636:
637: .TP
638: .BR charon.plugins.eap-aka.request_identity " [yes]"
639: .TP
640: .BR charon.plugins.eap-aka-3gpp.seq_check " []"
641: Enable to activate sequence check of the AKA SQN values in order to trigger
642: resync cycles.
643:
644: .TP
645: .BR charon.plugins.eap-aka-3gpp2.seq_check " []"
646: Enable to activate sequence check of the AKA SQN values in order to trigger
647: resync cycles.
648:
649: .TP
650: .BR charon.plugins.eap-dynamic.prefer_user " [no]"
651: If enabled the EAP methods proposed in an EAP\-Nak message sent by the peer are
652: preferred over the methods registered locally.
653:
654: .TP
655: .BR charon.plugins.eap-dynamic.preferred " []"
656: The preferred EAP method(s) to be used. If it is not given the first registered
657: method will be used initially. If a comma separated list is given the methods
658: are tried in the given order before trying the rest of the registered methods.
659:
660: .TP
661: .BR charon.plugins.eap-gtc.backend " [pam]"
662: XAuth backend to be used for credential verification.
663:
664: .TP
665: .BR charon.plugins.eap-peap.fragment_size " [1024]"
666: Maximum size of an EAP\-PEAP packet.
667:
668: .TP
669: .BR charon.plugins.eap-peap.include_length " [no]"
670: Include length in non\-fragmented EAP\-PEAP packets.
671:
672: .TP
673: .BR charon.plugins.eap-peap.max_message_count " [32]"
674: Maximum number of processed EAP\-PEAP packets (0 = no limit).
675:
676: .TP
677: .BR charon.plugins.eap-peap.phase2_method " [mschapv2]"
678: Phase2 EAP client authentication method.
679:
680: .TP
681: .BR charon.plugins.eap-peap.phase2_piggyback " [no]"
682: Phase2 EAP Identity request piggybacked by server onto TLS Finished message.
683:
684: .TP
685: .BR charon.plugins.eap-peap.phase2_tnc " [no]"
686: Start phase2 EAP TNC protocol after successful client authentication.
687:
688: .TP
689: .BR charon.plugins.eap-peap.request_peer_auth " [no]"
690: Request peer authentication based on a client certificate.
691:
692: .TP
693: .BR charon.plugins.eap-radius.accounting " [no]"
694: Send RADIUS accounting information to RADIUS servers.
695:
696: .TP
697: .BR charon.plugins.eap-radius.accounting_close_on_timeout " [yes]"
698: Close the IKE_SA if there is a timeout during interim RADIUS accounting updates.
699:
700: .TP
701: .BR charon.plugins.eap-radius.accounting_interval " [0]"
702: Interval in seconds for interim RADIUS accounting updates, if not specified by
703: the RADIUS server in the Access\-Accept message.
704:
705: .TP
706: .BR charon.plugins.eap-radius.accounting_requires_vip " [no]"
707: If enabled, accounting is disabled unless an IKE_SA has at least one virtual IP.
708: Only for IKEv2, for IKEv1 a virtual IP is strictly necessary.
709:
710: .TP
711: .BR charon.plugins.eap-radius.accounting_send_class " [no]"
712: If enabled, adds the Class attributes received in Access\-Accept message to the
713: RADIUS accounting messages.
714:
715: .TP
716: .BR charon.plugins.eap-radius.class_group " [no]"
717: Use the
718: .RI "" "class" ""
719: attribute sent in the RADIUS\-Accept message as group membership
720: information that is compared to the groups specified in the
721: .RB "" "rightgroups" ""
722: option in
723: .RB "" "ipsec.conf" "(5)."
724:
725:
726: .TP
727: .BR charon.plugins.eap-radius.close_all_on_timeout " [no]"
728: Closes all IKE_SAs if communication with the RADIUS server times out. If it is
729: not set only the current IKE_SA is closed.
730:
731: .TP
732: .BR charon.plugins.eap-radius.dae.enable " [no]"
733: Enables support for the Dynamic Authorization Extension (RFC 5176).
734:
735: .TP
736: .BR charon.plugins.eap-radius.dae.listen " [0.0.0.0]"
737: Address to listen for DAE messages from the RADIUS server.
738:
739: .TP
740: .BR charon.plugins.eap-radius.dae.port " [3799]"
741: Port to listen for DAE requests.
742:
743: .TP
744: .BR charon.plugins.eap-radius.dae.secret " []"
745: Shared secret used to verify/sign DAE messages. If set, make sure to adjust the
746: permissions of the config file accordingly.
747:
748: .TP
749: .BR charon.plugins.eap-radius.eap_start " [no]"
750: Send EAP\-Start instead of EAP\-Identity to start RADIUS conversation.
751:
752: .TP
753: .BR charon.plugins.eap-radius.filter_id " [no]"
754: If the RADIUS
755: .RI "" "tunnel_type" ""
756: attribute with value
757: .RB "" "ESP" ""
758: is received, use the
759: .RI "" "filter_id" ""
760: attribute sent in the RADIUS\-Accept message as group membership
761: information that is compared to the groups specified in the
762: .RB "" "rightgroups" ""
763: option in
764: .RB "" "ipsec.conf" "(5)."
765:
766:
767: .TP
768: .BR charon.plugins.eap-radius.forward.ike_to_radius " []"
769: RADIUS attributes to be forwarded from IKEv2 to RADIUS (can be defined by name
770: or attribute number, a colon can be used to specify vendor\-specific attributes,
771: e.g. Reply\-Message, or 11, or 36906:12).
772:
773: .TP
774: .BR charon.plugins.eap-radius.forward.radius_to_ike " []"
775: Same as
776: .RI "" "charon.plugins.eap\-radius.forward.ike_to_radius" ""
777: but from RADIUS to
778: IKEv2, a strongSwan specific private notify (40969) is used to transmit the
779: attributes.
780:
781: .TP
782: .BR charon.plugins.eap-radius.id_prefix " []"
783: Prefix to EAP\-Identity, some AAA servers use a IMSI prefix to select the EAP
784: method.
785:
786: .TP
787: .BR charon.plugins.eap-radius.nas_identifier " [strongSwan]"
788: NAS\-Identifier to include in RADIUS messages.
789:
790: .TP
791: .BR charon.plugins.eap-radius.port " [1812]"
792: Port of RADIUS server (authentication).
793:
794: .TP
795: .BR charon.plugins.eap-radius.retransmit_base " [1.4]"
796: Base to use for calculating exponential back off.
797:
798: .TP
799: .BR charon.plugins.eap-radius.retransmit_timeout " [2.0]"
800: Timeout in seconds before sending first retransmit.
801:
802: .TP
803: .BR charon.plugins.eap-radius.retransmit_tries " [4]"
804: Number of times to retransmit a packet before giving up.
805:
806: .TP
807: .BR charon.plugins.eap-radius.secret " []"
808: Shared secret between RADIUS and NAS. If set, make sure to adjust the
809: permissions of the config file accordingly.
810:
811: .TP
812: .BR charon.plugins.eap-radius.server " []"
813: IP/Hostname of RADIUS server.
814:
815: .TP
816: .B charon.plugins.eap-radius.servers
817: .br
818: Section to specify multiple RADIUS servers. The
819: .RB "" "nas_identifier" ","
820: .RB "" "secret" ","
821: .RB "" "sockets" ""
822: and
823: .RB "" "port" ""
824: (or
825: .RB "" "auth_port" ")"
826: options can be specified for each
827: server. A server's IP/Hostname can be configured using the
828: .RB "" "address" ""
829: option.
830: The
831: .RB "" "acct_port" ""
832: [1813] option can be used to specify the port used for RADIUS
833: accounting. For each RADIUS server a priority can be specified using the
834: .RB "" "preference" ""
835: [0] option. The retransmission time for each server can set set
836: using
837: .RB "" "retransmit_base" ","
838: .RB "" "retransmit_timeout" ""
839: and
840: .RB "" "retransmit_tries" "."
841:
842:
843: .TP
844: .BR charon.plugins.eap-radius.sockets " [1]"
845: Number of sockets (ports) to use, increase for high load.
846:
847: .TP
848: .BR charon.plugins.eap-radius.station_id_with_port " [yes]"
849: Whether to include the UDP port in the Called\- and Calling\-Station\-Id RADIUS
850: attributes.
851:
852: .TP
853: .B charon.plugins.eap-radius.xauth
854: .br
855: Section to configure multiple XAuth authentication rounds via RADIUS. The
856: subsections define so called authentication profiles with arbitrary names. In
857: each profile section one or more XAuth types can be configured, with an assigned
858: message. For each type a separate XAuth exchange will be initiated and all
859: replies get concatenated into the User\-Password attribute, which then gets
860: verified over RADIUS.
861:
862: Available XAuth types are
863: .RB "" "password" ","
864: .RB "" "passcode" ","
865: .RB "" "nextpin" ","
866: and
867: .RB "" "answer" "."
868: This type is not relevant to strongSwan or the AAA server, but the
869: client may show a different dialog (along with the configured message).
870:
871: To use the configured profiles, they have to be configured in the respective
872: connection in
873: .RB "" "ipsec.conf" "(5)"
874: by appending the profile name, separated by a
875: colon, to the
876: .RB "" "xauth\-radius" ""
877: XAauth backend configuration in
878: .RI "" "rightauth" ""
879: or
880: .RI "" "rightauth2" ","
881: for instance,
882: .RI "" "rightauth2=xauth\-radius:profile" "."
883:
884:
885: .TP
886: .BR charon.plugins.eap-sim.request_identity " [yes]"
887: .TP
888: .BR charon.plugins.eap-simaka-sql.database " []"
889: .TP
890: .BR charon.plugins.eap-simaka-sql.remove_used " [no]"
891: .TP
892: .BR charon.plugins.eap-tls.fragment_size " [1024]"
893: Maximum size of an EAP\-TLS packet.
894:
895: .TP
896: .BR charon.plugins.eap-tls.include_length " [yes]"
897: Include length in non\-fragmented EAP\-TLS packets.
898:
899: .TP
900: .BR charon.plugins.eap-tls.max_message_count " [32]"
901: Maximum number of processed EAP\-TLS packets (0 = no limit).
902:
903: .TP
904: .BR charon.plugins.eap-tnc.max_message_count " [10]"
905: Maximum number of processed EAP\-TNC packets (0 = no limit).
906:
907: .TP
908: .BR charon.plugins.eap-tnc.protocol " [tnccs-2.0]"
909: IF\-TNCCS protocol version to be used
910: .RI "(" "tnccs\-1.1" ","
911: .RI "" "tnccs\-2.0" ","
912: .RI "" "tnccs\-dynamic" ")."
913:
914:
915: .TP
916: .BR charon.plugins.eap-ttls.fragment_size " [1024]"
917: Maximum size of an EAP\-TTLS packet.
918:
919: .TP
920: .BR charon.plugins.eap-ttls.include_length " [yes]"
921: Include length in non\-fragmented EAP\-TTLS packets.
922:
923: .TP
924: .BR charon.plugins.eap-ttls.max_message_count " [32]"
925: Maximum number of processed EAP\-TTLS packets (0 = no limit).
926:
927: .TP
928: .BR charon.plugins.eap-ttls.phase2_method " [md5]"
929: Phase2 EAP client authentication method.
930:
931: .TP
932: .BR charon.plugins.eap-ttls.phase2_piggyback " [no]"
933: Phase2 EAP Identity request piggybacked by server onto TLS Finished message.
934:
935: .TP
936: .BR charon.plugins.eap-ttls.phase2_tnc " [no]"
937: Start phase2 EAP TNC protocol after successful client authentication.
938:
939: .TP
940: .BR charon.plugins.eap-ttls.phase2_tnc_method " [pt]"
941: Phase2 EAP TNC transport protocol
942: .RI "(" "pt" ""
943: as IETF standard or legacy
944: .RI "" "tnc" ")"
945:
946:
947: .TP
948: .BR charon.plugins.eap-ttls.request_peer_auth " [no]"
949: Request peer authentication based on a client certificate.
950:
951: .TP
952: .BR charon.plugins.error-notify.socket " [unix://${piddir}/charon.enfy]"
953: Socket provided by the error\-notify plugin.
954:
955: .TP
956: .BR charon.plugins.ext-auth.script " []"
957: Command to pass to the system shell for peer authorization. Authorization is
958: considered successful if the command executes normally with an exit code of
959: zero. For all other exit codes IKE_SA authorization is rejected.
960:
961: The following environment variables get passed to the script:
962: .RI "" "IKE_UNIQUE_ID" ":"
963: The IKE_SA numerical unique identifier.
964: .RI "" "IKE_NAME" ":"
965: The peer configuration
966: connection name.
967: .RI "" "IKE_LOCAL_HOST" ":"
968: Local IKE IP address.
969: .RI "" "IKE_REMOTE_HOST" ":"
970: Remote IKE IP address.
971: .RI "" "IKE_LOCAL_ID" ":"
972: Local IKE identity.
973: .RI "" "IKE_REMOTE_ID" ":"
974: Remote IKE identity.
975: .RI "" "IKE_REMOTE_EAP_ID" ":"
976: Remote EAP or XAuth identity, if used.
977:
978: .TP
979: .BR charon.plugins.forecast.groups " [224.0.0.1,224.0.0.22,224.0.0.251,224.0.0.252,239.255.255.250]"
980: Comma separated list of multicast groups to join locally. The local host
981: receives and forwards packets in the local LAN for joined multicast groups only.
982: Packets matching the list of multicast groups get forwarded to connected
983: clients. The default group includes host multicasts, IGMP, mDNS, LLMNR and
984: SSDP/WS\-Discovery, and is usually a good choice for Windows clients.
985:
986: .TP
987: .BR charon.plugins.forecast.interface " []"
988: Name of the local interface to listen for broadcasts messages to forward. If no
989: interface is configured, the first usable interface is used, which is usually
990: just fine for single\-homed hosts. If your host has multiple interfaces, set this
991: option to the local LAN interface you want to forward broadcasts from/to.
992:
993: .TP
994: .BR charon.plugins.forecast.reinject " []"
995: Comma separated list of CHILD_SA configuration names for which to perform
996: multi/broadcast reinjection. For clients connecting over such a configuration,
997: any multi/broadcast received over the tunnel gets reinjected to all active
998: tunnels. This makes the broadcasts visible to other peers, and for examples
999: allows clients to see others shares. If disabled, multi/broadcast messages
1000: received over a tunnel are injected to the local network only, but not to other
1001: IPsec clients.
1002:
1003: .TP
1004: .BR charon.plugins.gcrypt.quick_random " [no]"
1005: Use faster random numbers in gcrypt; for testing only, produces weak keys!
1006:
1007: .TP
1008: .BR charon.plugins.ha.autobalance " [0]"
1009: Interval in seconds to automatically balance handled segments between nodes. Set
1010: to 0 to disable.
1011:
1012: .TP
1013: .BR charon.plugins.ha.fifo_interface " [yes]"
1014: .TP
1015: .BR charon.plugins.ha.heartbeat_delay " [1000]"
1016: .TP
1017: .BR charon.plugins.ha.heartbeat_timeout " [2100]"
1018: .TP
1019: .BR charon.plugins.ha.local " []"
1020: .TP
1021: .BR charon.plugins.ha.monitor " [yes]"
1022: .TP
1023: .BR charon.plugins.ha.pools " []"
1024: .TP
1025: .BR charon.plugins.ha.remote " []"
1026: .TP
1027: .BR charon.plugins.ha.resync " [yes]"
1028: .TP
1029: .BR charon.plugins.ha.secret " []"
1030: .TP
1031: .BR charon.plugins.ha.segment_count " [1]"
1032: .TP
1033: .BR charon.plugins.ipseckey.enable " [no]"
1034: Enable fetching of IPSECKEY RRs via DNS.
1035:
1036: .TP
1037: .BR charon.plugins.kernel-libipsec.allow_peer_ts " [no]"
1038: Allow that the remote traffic selector equals the IKE peer. The route installed
1039: for such traffic (via TUN device) usually prevents further IKE traffic. The
1040: fwmark options for the
1041: .RI "" "kernel\-netlink" ""
1042: and
1043: .RI "" "socket\-default" ""
1044: plugins can be used
1045: to circumvent that problem.
1046:
1047: .TP
1048: .BR charon.plugins.kernel-netlink.buflen " [<min(PAGE_SIZE, 8192)>]"
1049: Buffer size for received Netlink messages.
1050:
1051: .TP
1052: .BR charon.plugins.kernel-netlink.force_receive_buffer_size " [no]"
1053: If the maximum Netlink socket receive buffer in bytes set by
1054: .RI "" "receive_buffer_size" ""
1055: exceeds the system\-wide maximum from
1056: /proc/sys/net/core/rmem_max, this option can be used to override the limit.
1057: Enabling this option requires special privileges (CAP_NET_ADMIN).
1058:
1059: .TP
1060: .BR charon.plugins.kernel-netlink.fwmark " []"
1061: Firewall mark to set on the routing rule that directs traffic to our routing
1062: table. The format is [!]mark[/mask], where the optional exclamation mark inverts
1063: the meaning (i.e. the rule only applies to packets that don't match the mark).
1064:
1065: .TP
1066: .BR charon.plugins.kernel-netlink.hw_offload_feature_interface " [lo]"
1067: If the kernel supports hardware offloading, the plugin needs to find the feature
1068: flag which represents hardware offloading support for network devices. Using the
1069: loopback device for this purpose is usually fine, since it should always be
1070: present. For rare cases in which the loopback device cannot be used to obtain
1071: the appropriate feature flag, this option can be used to specify an alternative
1072: interface for offload feature detection.
1073:
1074: .TP
1075: .BR charon.plugins.kernel-netlink.ignore_retransmit_errors " [no]"
1076: Whether to ignore errors potentially resulting from a retransmission.
1077:
1078: .TP
1079: .BR charon.plugins.kernel-netlink.mss " [0]"
1080: MSS to set on installed routes, 0 to disable.
1081:
1082: .TP
1083: .BR charon.plugins.kernel-netlink.mtu " [0]"
1084: MTU to set on installed routes, 0 to disable.
1085:
1086: .TP
1087: .BR charon.plugins.kernel-netlink.parallel_route " [no]"
1088: Whether to perform concurrent Netlink ROUTE queries on a single socket. While
1089: parallel queries can improve throughput, it has more overhead. On vanilla Linux,
1090: DUMP queries fail with EBUSY and must be retried, further decreasing
1091: performance.
1092:
1093: .TP
1094: .BR charon.plugins.kernel-netlink.parallel_xfrm " [no]"
1095: Whether to perform concurrent Netlink XFRM queries on a single socket.
1096:
1097: .TP
1098: .BR charon.plugins.kernel-netlink.policy_update " [no]"
1099: Whether to always use XFRM_MSG_UPDPOLICY to install policies.
1100:
1101: .TP
1102: .BR charon.plugins.kernel-netlink.port_bypass " [no]"
1103: Whether to use port or socket based IKE XFRM bypass policies. IKE bypass
1104: policies are used to exempt IKE traffic from XFRM processing. The default socket
1105: based policies are directly tied to the IKE UDP sockets, port based policies use
1106: global XFRM bypass policies for the used IKE UDP ports.
1107:
1108: .TP
1109: .BR charon.plugins.kernel-netlink.process_rules " [no]"
1110: Whether to process changes in routing rules to trigger roam events. This is
1111: currently only useful if the kernel based route lookup is used (i.e. if route
1112: installation is disabled or an inverted fwmark match is configured).
1113:
1114: .TP
1115: .BR charon.plugins.kernel-netlink.receive_buffer_size " [0]"
1116: Maximum Netlink socket receive buffer in bytes. This value controls how many
1117: bytes of Netlink messages can be received on a Netlink socket. The default value
1118: is set by /proc/sys/net/core/rmem_default. The specified value cannot exceed the
1119: system\-wide maximum from /proc/sys/net/core/rmem_max, unless
1120: .RI "" "force_receive_buffer_size" ""
1121: is enabled.
1122:
1123: .TP
1124: .BR charon.plugins.kernel-netlink.retries " [0]"
1125: Number of Netlink message retransmissions to send on timeout.
1126:
1127: .TP
1128: .BR charon.plugins.kernel-netlink.roam_events " [yes]"
1129: Whether to trigger roam events when interfaces, addresses or routes change.
1130:
1131: .TP
1132: .BR charon.plugins.kernel-netlink.set_proto_port_transport_sa " [no]"
1133: Whether to set protocol and ports in the selector installed on transport mode
1134: IPsec SAs in the kernel. While doing so enforces policies for inbound traffic,
1135: it also prevents the use of a single IPsec SA by more than one traffic selector.
1136:
1137: .TP
1138: .B charon.plugins.kernel-netlink.spdh_thresh
1139: .br
1140: XFRM policy hashing threshold configuration for IPv4 and IPv6.
1141:
1142: The section defines hashing thresholds to configure in the kernel during daemon
1143: startup. Each address family takes a threshold for the local subnet of an IPsec
1144: policy (src in out\-policies, dst in in\- and forward\-policies) and the remote
1145: subnet (dst in out\-policies, src in in\- and forward\-policies).
1146:
1147: If the subnet has more or equal net bits than the threshold, the first threshold
1148: bits are used to calculate a hash to lookup the policy.
1149:
1150: Policy hashing thresholds are not supported before Linux 3.18 and might conflict
1151: with socket policies before Linux 4.8.
1152:
1153: .TP
1154: .BR charon.plugins.kernel-netlink.spdh_thresh.ipv4.lbits " [32]"
1155: Local subnet XFRM policy hashing threshold for IPv4.
1156:
1157: .TP
1158: .BR charon.plugins.kernel-netlink.spdh_thresh.ipv4.rbits " [32]"
1159: Remote subnet XFRM policy hashing threshold for IPv4.
1160:
1161: .TP
1162: .BR charon.plugins.kernel-netlink.spdh_thresh.ipv6.lbits " [128]"
1163: Local subnet XFRM policy hashing threshold for IPv6.
1164:
1165: .TP
1166: .BR charon.plugins.kernel-netlink.spdh_thresh.ipv6.rbits " [128]"
1167: Remote subnet XFRM policy hashing threshold for IPv6.
1168:
1169: .TP
1170: .BR charon.plugins.kernel-netlink.timeout " [0]"
1171: Netlink message retransmission timeout, 0 to disable retransmissions.
1172:
1173: .TP
1174: .BR charon.plugins.kernel-netlink.xfrm_acq_expires " [165]"
1175: Lifetime of XFRM acquire state created by the kernel when traffic matches a trap
1176: policy. The value gets written to /proc/sys/net/core/xfrm_acq_expires.
1177: Indirectly controls the delay between XFRM acquire messages triggered by the
1178: kernel for a trap policy. The same value is used as timeout for SPIs allocated
1179: by the kernel. The default value equals the total retransmission timeout for
1180: IKE messages, see IKEv2 RETRANSMISSION in
1181: .RB "" "strongswan.conf" "(5)."
1182:
1183:
1184: .TP
1185: .BR charon.plugins.kernel-pfkey.events_buffer_size " [0]"
1186: Size of the receive buffer for the event socket (0 for default size). Because
1187: events are received asynchronously installing e.g. lots of policies may require
1188: a larger buffer than the default on certain platforms in order to receive all
1189: messages.
1190:
1191: .TP
1192: .BR charon.plugins.kernel-pfkey.route_via_internal " [no]"
1193: Whether to use the internal or external interface in installed routes. The
1194: internal interface is the one where the IP address contained in the local
1195: traffic selector is located, the external interface is the one over which the
1196: destination address of the IPsec tunnel can be reached. This is not relevant if
1197: virtual IPs are used, for which a TUN device is created that's used in the
1198: routes.
1199:
1200: .TP
1201: .BR charon.plugins.kernel-pfroute.vip_wait " [1000]"
1202: Time in ms to wait until virtual IP addresses appear/disappear before failing.
1203:
1204: .TP
1205: .BR charon.plugins.led.activity_led " []"
1206: .TP
1207: .BR charon.plugins.led.blink_time " [50]"
1208: .TP
1209: .B charon.plugins.load-tester
1210: .br
1211: Section to configure the load\-tester plugin, see LOAD TESTS in
1212: .RB "" "strongswan.conf" "(5)"
1213: for details.
1214:
1215: .TP
1216: .B charon.plugins.load-tester.addrs
1217: .br
1218: Section that contains key/value pairs with address pools (in CIDR notation) to
1219: use for a specific network interface e.g. eth0 = 10.10.0.0/16.
1220:
1221: .TP
1222: .BR charon.plugins.load-tester.addrs_keep " [no]"
1223: Whether to keep dynamic addresses even after the associated SA got terminated.
1224:
1225: .TP
1226: .BR charon.plugins.load-tester.addrs_prefix " [16]"
1227: Network prefix length to use when installing dynamic addresses. If set to \-1 the
1228: full address is used (i.e. 32 or 128).
1229:
1230: .TP
1231: .BR charon.plugins.load-tester.ca_dir " []"
1232: Directory to load (intermediate) CA certificates from.
1233:
1234: .TP
1235: .BR charon.plugins.load-tester.child_rekey " [600]"
1236: Seconds to start CHILD_SA rekeying after setup.
1237:
1238: .TP
1239: .BR charon.plugins.load-tester.crl " []"
1240: URI to a CRL to include as certificate distribution point in generated
1241: certificates.
1242:
1243: .TP
1244: .BR charon.plugins.load-tester.delay " [0]"
1245: Delay between initiations for each thread.
1246:
1247: .TP
1248: .BR charon.plugins.load-tester.delete_after_established " [no]"
1249: Delete an IKE_SA as soon as it has been established.
1250:
1251: .TP
1252: .BR charon.plugins.load-tester.digest " [sha1]"
1253: Digest algorithm used when issuing certificates.
1254:
1255: .TP
1256: .BR charon.plugins.load-tester.dpd_delay " [0]"
1257: DPD delay to use in load test.
1258:
1259: .TP
1260: .BR charon.plugins.load-tester.dynamic_port " [0]"
1261: Base port to be used for requests (each client uses a different port).
1262:
1263: .TP
1264: .BR charon.plugins.load-tester.eap_password " [default-pwd]"
1265: EAP secret to use in load test.
1266:
1267: .TP
1268: .BR charon.plugins.load-tester.enable " [no]"
1269: Enable the load testing plugin.
1270: .RB "" "WARNING" ":"
1271: Never enable this plugin on
1272: productive systems. It provides preconfigured credentials and allows an attacker
1273: to authenticate as any user.
1274:
1275: .TP
1276: .BR charon.plugins.load-tester.esp " [aes128-sha1]"
1277: CHILD_SA proposal to use for load tests.
1278:
1279: .TP
1280: .BR charon.plugins.load-tester.fake_kernel " [no]"
1281: Fake the kernel interface to allow load\-testing against self.
1282:
1283: .TP
1284: .BR charon.plugins.load-tester.ike_rekey " [0]"
1285: Seconds to start IKE_SA rekeying after setup.
1286:
1287: .TP
1288: .BR charon.plugins.load-tester.init_limit " [0]"
1289: Global limit of concurrently established SAs during load test.
1290:
1291: .TP
1292: .BR charon.plugins.load-tester.initiator " [0.0.0.0]"
1293: Address to initiate from.
1294:
1295: .TP
1296: .BR charon.plugins.load-tester.initiator_auth " [pubkey]"
1297: Authentication method(s) the initiator uses.
1298:
1299: .TP
1300: .BR charon.plugins.load-tester.initiator_id " []"
1301: Initiator ID used in load test.
1302:
1303: .TP
1304: .BR charon.plugins.load-tester.initiator_match " []"
1305: Initiator ID to match against as responder.
1306:
1307: .TP
1308: .BR charon.plugins.load-tester.initiator_tsi " []"
1309: Traffic selector on initiator side, as proposed by initiator.
1310:
1311: .TP
1312: .BR charon.plugins.load-tester.initiator_tsr " []"
1313: Traffic selector on responder side, as proposed by initiator.
1314:
1315: .TP
1316: .BR charon.plugins.load-tester.initiators " [0]"
1317: Number of concurrent initiator threads to use in load test.
1318:
1319: .TP
1320: .BR charon.plugins.load-tester.issuer_cert " []"
1321: Path to the issuer certificate (if not configured a hard\-coded default value is
1322: used).
1323:
1324: .TP
1325: .BR charon.plugins.load-tester.issuer_key " []"
1326: Path to private key that is used to issue certificates (if not configured a
1327: hard\-coded default value is used).
1328:
1329: .TP
1330: .BR charon.plugins.load-tester.iterations " [1]"
1331: Number of IKE_SAs to initiate by each initiator in load test.
1332:
1333: .TP
1334: .BR charon.plugins.load-tester.mode " [tunnel]"
1335: IPsec mode to use, one of
1336: .RI "" "tunnel" ","
1337: .RI "" "transport" ","
1338: or
1339: .RI "" "beet" "."
1340:
1341:
1342: .TP
1343: .BR charon.plugins.load-tester.pool " []"
1344: Provide INTERNAL_IPV4_ADDRs from a named pool.
1345:
1346: .TP
1347: .BR charon.plugins.load-tester.preshared_key " [<default-psk>]"
1348: Preshared key to use in load test.
1349:
1350: .TP
1351: .BR charon.plugins.load-tester.proposal " [aes128-sha1-modp768]"
1352: IKE proposal to use in load test.
1353:
1354: .TP
1355: .BR charon.plugins.load-tester.request_virtual_ip " [no]"
1.1.1.2 ! misho 1356: Request an INTERNAL_IPV4_ADDR and INTERNAL_IPV6_ADDR from the server.
1.1 misho 1357:
1358: .TP
1359: .BR charon.plugins.load-tester.responder " [127.0.0.1]"
1360: Address to initiation connections to.
1361:
1362: .TP
1363: .BR charon.plugins.load-tester.responder_auth " [pubkey]"
1364: Authentication method(s) the responder uses.
1365:
1366: .TP
1367: .BR charon.plugins.load-tester.responder_id " []"
1368: Responder ID used in load test.
1369:
1370: .TP
1371: .BR charon.plugins.load-tester.responder_tsi " [initiator_tsi]"
1372: Traffic selector on initiator side, as narrowed by responder.
1373:
1374: .TP
1375: .BR charon.plugins.load-tester.responder_tsr " [initiator_tsr]"
1376: Traffic selector on responder side, as narrowed by responder.
1377:
1378: .TP
1379: .BR charon.plugins.load-tester.shutdown_when_complete " [no]"
1380: Shutdown the daemon after all IKE_SAs have been established.
1381:
1382: .TP
1383: .BR charon.plugins.load-tester.socket " [unix://${piddir}/charon.ldt]"
1384: Socket provided by the load\-tester plugin.
1385:
1386: .TP
1387: .BR charon.plugins.load-tester.version " [0]"
1388: IKE version to use (0 means use IKEv2 as initiator and accept any version as
1389: responder).
1390:
1391: .TP
1392: .BR charon.plugins.lookip.socket " [unix://${piddir}/charon.lkp]"
1393: Socket provided by the lookip plugin.
1394:
1395: .TP
1396: .BR charon.plugins.ntru.parameter_set " [optimum]"
1397: The following parameter sets are available:
1398: .RB "" "x9_98_speed" ","
1399: .RB "" "x9_98_bandwidth" ","
1400: .RB "" "x9_98_balance" ""
1401: and
1402: .RB "" "optimum" ","
1403: the last set not being
1404: part of the X9.98 standard but having the best performance.
1405:
1406: .TP
1407: .BR charon.plugins.openssl.engine_id " [pkcs11]"
1408: ENGINE ID to use in the OpenSSL plugin.
1409:
1410: .TP
1411: .BR charon.plugins.openssl.fips_mode " [0]"
1412: Set OpenSSL FIPS mode: disabled(0), enabled(1), Suite B enabled(2).
1413:
1414: .TP
1415: .BR charon.plugins.osx-attr.append " [yes]"
1416: Whether DNS servers are appended to existing entries, instead of replacing them.
1417:
1418: .TP
1419: .B charon.plugins.p-cscf.enable
1420: .br
1421: Section to enable requesting P\-CSCF server addresses for individual connections.
1422:
1423: .TP
1424: .BR charon.plugins.p-cscf.enable.<conn> " [no]"
1425: <conn> is the name of a connection with an ePDG from which to request P\-CSCF
1426: server addresses. Requests will be sent for addresses of the same families for
1427: which internal IPs are requested.
1428:
1429: .TP
1430: .B charon.plugins.pkcs11.modules
1431: .br
1432: List of available PKCS#11 modules.
1433:
1434: .TP
1435: .BR charon.plugins.pkcs11.modules.<name>.load_certs " [yes]"
1436: Whether to automatically load certificates from tokens.
1437:
1438: .TP
1439: .BR charon.plugins.pkcs11.modules.<name>.os_locking " [no]"
1440: Whether OS locking should be enabled for this module.
1441:
1442: .TP
1443: .BR charon.plugins.pkcs11.modules.<name>.path " []"
1444: Full path to the shared object file of this PKCS#11 module.
1445:
1446: .TP
1447: .BR charon.plugins.pkcs11.reload_certs " [no]"
1448: Reload certificates from all tokens if charon receives a SIGHUP.
1449:
1450: .TP
1451: .BR charon.plugins.pkcs11.use_dh " [no]"
1452: Whether the PKCS#11 modules should be used for DH and ECDH (see
1453: .RI "" "use_ecc" ""
1454: option).
1455:
1456: .TP
1457: .BR charon.plugins.pkcs11.use_ecc " [no]"
1458: Whether the PKCS#11 modules should be used for ECDH and ECDSA public key
1459: operations. ECDSA private keys can be used regardless of this option.
1460:
1461: .TP
1462: .BR charon.plugins.pkcs11.use_hasher " [no]"
1463: Whether the PKCS#11 modules should be used to hash data.
1464:
1465: .TP
1466: .BR charon.plugins.pkcs11.use_pubkey " [no]"
1467: Whether the PKCS#11 modules should be used for public key operations, even for
1468: keys not stored on tokens.
1469:
1470: .TP
1471: .BR charon.plugins.pkcs11.use_rng " [no]"
1472: Whether the PKCS#11 modules should be used as RNG.
1473:
1474: .TP
1475: .BR charon.plugins.radattr.dir " []"
1476: Directory where RADIUS attributes are stored in client\-ID specific files.
1477:
1478: .TP
1479: .BR charon.plugins.radattr.message_id " [-1]"
1480: Attributes are added to all IKE_AUTH messages by default (\-1), or only to the
1481: IKE_AUTH message with the given IKEv2 message ID.
1482:
1483: .TP
1484: .BR charon.plugins.random.random " [${random_device}]"
1485: File to read random bytes from.
1486:
1487: .TP
1488: .BR charon.plugins.random.strong_equals_true " [no]"
1489: If set to yes the RNG_STRONG class reads random bytes from the same source as
1490: the RNG_TRUE class.
1491:
1492: .TP
1493: .BR charon.plugins.random.urandom " [${urandom_device}]"
1494: File to read pseudo random bytes from.
1495:
1496: .TP
1497: .BR charon.plugins.resolve.file " [/etc/resolv.conf]"
1498: File where to add DNS server entries.
1499:
1500: .TP
1501: .BR charon.plugins.resolve.resolvconf.iface_prefix " [lo.inet.ipsec.]"
1502: Prefix used for interface names sent to
1503: .RB "" "resolvconf" "(8)."
1504: The nameserver
1505: address is appended to this prefix to make it unique. The result has to be a
1506: valid interface name according to the rules defined by resolvconf. Also, it
1507: should have a high priority according to the order defined in
1508: .RB "" "interface\-order" "(5)."
1509:
1510:
1511: .TP
1512: .BR charon.plugins.revocation.enable_crl " [yes]"
1513: Whether CRL validation should be enabled.
1514:
1515: .TP
1516: .BR charon.plugins.revocation.enable_ocsp " [yes]"
1517: Whether OCSP validation should be enabled.
1518:
1519: .TP
1520: .BR charon.plugins.save-keys.esp " [no]"
1521: Whether to save ESP keys.
1522:
1523: .TP
1524: .BR charon.plugins.save-keys.ike " [no]"
1525: Whether to save IKE keys.
1526:
1527: .TP
1528: .BR charon.plugins.save-keys.load " [no]"
1529: Whether to load the plugin.
1530:
1531: .TP
1532: .BR charon.plugins.save-keys.wireshark_keys " []"
1533: Directory where the keys are stored in the format supported by Wireshark. IKEv1
1534: keys are stored in the
1535: .RI "" "ikev1_decryption_table" ""
1536: file. IKEv2 keys are stored in
1537: the
1538: .RI "" "ikev2_decryption_table" ""
1539: file. Keys for ESP CHILD_SAs are stored in the
1540: .RI "" "esp_sa" ""
1541: file.
1542:
1543: .TP
1544: .BR charon.plugins.socket-default.fwmark " []"
1545: Firewall mark to set on outbound packets.
1546:
1547: .TP
1548: .BR charon.plugins.socket-default.set_source " [yes]"
1549: Set source address on outbound packets, if possible.
1550:
1551: .TP
1552: .BR charon.plugins.socket-default.set_sourceif " [no]"
1553: Force sending interface on outbound packets, if possible. This allows using IPv6
1554: link\-local addresses as tunnel endpoints.
1555:
1556: .TP
1557: .BR charon.plugins.socket-default.use_ipv4 " [yes]"
1558: Listen on IPv4, if possible.
1559:
1560: .TP
1561: .BR charon.plugins.socket-default.use_ipv6 " [yes]"
1562: Listen on IPv6, if possible.
1563:
1564: .TP
1565: .BR charon.plugins.sql.database " []"
1566: Database URI for charon's SQL plugin. If it contains a password, make sure to
1567: adjust the permissions of the config file accordingly.
1568:
1569: .TP
1570: .BR charon.plugins.sql.loglevel " [-1]"
1571: Loglevel for logging to SQL database.
1572:
1573: .TP
1574: .BR charon.plugins.stroke.allow_swap " [yes]"
1575: Analyze addresses/hostnames in
1576: .RI "" "left|right" ""
1577: to detect which side is local and
1578: swap configuration options if necessary. If disabled
1579: .RI "" "left" ""
1580: is always
1581: .RI "" "local" "."
1582:
1583:
1584: .TP
1585: .BR charon.plugins.stroke.ignore_missing_ca_basic_constraint " [no]"
1586: Treat certificates in ipsec.d/cacerts and ipsec.conf ca sections as CA
1587: certificates even if they don't contain a CA basic constraint.
1588:
1589: .TP
1590: .BR charon.plugins.stroke.max_concurrent " [4]"
1591: Maximum number of stroke messages handled concurrently.
1592:
1593: .TP
1594: .BR charon.plugins.stroke.prevent_loglevel_changes " [no]"
1595: If enabled log level changes via stroke socket are not allowed.
1596:
1597: .TP
1598: .BR charon.plugins.stroke.secrets_file " [${sysconfdir}/ipsec.secrets]"
1599: Location of the ipsec.secrets file
1600:
1601: .TP
1602: .BR charon.plugins.stroke.socket " [unix://${piddir}/charon.ctl]"
1603: Socket provided by the stroke plugin.
1604:
1605: .TP
1606: .BR charon.plugins.stroke.timeout " [0]"
1607: Timeout in ms for any stroke command. Use 0 to disable the timeout.
1608:
1609: .TP
1610: .BR charon.plugins.systime-fix.interval " [0]"
1611: Interval in seconds to check system time for validity. 0 disables the check.
1612:
1613: .TP
1614: .BR charon.plugins.systime-fix.reauth " [no]"
1615: Whether to use reauth or delete if an invalid cert lifetime is detected.
1616:
1617: .TP
1618: .BR charon.plugins.systime-fix.threshold " []"
1619: Threshold date where system time is considered valid. Disabled if not specified.
1620:
1621: .TP
1622: .BR charon.plugins.systime-fix.threshold_format " [%Y]"
1623: .RB "" "strptime" "(3)"
1624: format used to parse threshold option.
1625:
1626: .TP
1627: .BR charon.plugins.systime-fix.timeout " [0s]"
1628: How long to wait for a valid system time if an interval is configured. 0 to
1629: recheck indefinitely.
1630:
1631: .TP
1632: .BR charon.plugins.tnc-ifmap.client_cert " []"
1633: Path to X.509 certificate file of IF\-MAP client.
1634:
1635: .TP
1636: .BR charon.plugins.tnc-ifmap.client_key " []"
1637: Path to private key file of IF\-MAP client.
1638:
1639: .TP
1640: .BR charon.plugins.tnc-ifmap.device_name " []"
1641: Unique name of strongSwan server as a PEP and/or PDP device.
1642:
1643: .TP
1644: .BR charon.plugins.tnc-ifmap.renew_session_interval " [150]"
1645: Interval in seconds between periodic IF\-MAP RenewSession requests.
1646:
1647: .TP
1648: .BR charon.plugins.tnc-ifmap.server_cert " []"
1649: Path to X.509 certificate file of IF\-MAP server.
1650:
1651: .TP
1652: .BR charon.plugins.tnc-ifmap.server_uri " [https://localhost:8444/imap]"
1653: URI of the form [https://]servername[:port][/path].
1654:
1655: .TP
1656: .BR charon.plugins.tnc-ifmap.username_password " []"
1657: Credentials of IF\-MAP client of the form username:password. If set, make sure to
1658: adjust the permissions of the config file accordingly.
1659:
1660: .TP
1661: .BR charon.plugins.tnc-imc.dlclose " [yes]"
1662: Unload IMC after use.
1663:
1664: .TP
1665: .BR charon.plugins.tnc-imc.preferred_language " [en]"
1666: Preferred language for TNC recommendations.
1667:
1668: .TP
1669: .BR charon.plugins.tnc-imv.dlclose " [yes]"
1670: Unload IMV after use.
1671:
1672: .TP
1673: .BR charon.plugins.tnc-imv.recommendation_policy " [default]"
1674: TNC recommendation policy, one of
1675: .RI "" "default" ","
1676: .RI "" "any" ","
1677: or
1678: .RI "" "all" "."
1679:
1680:
1681: .TP
1682: .BR charon.plugins.tnc-pdp.pt_tls.enable " [yes]"
1683: Enable PT\-TLS protocol on the strongSwan PDP.
1684:
1685: .TP
1686: .BR charon.plugins.tnc-pdp.pt_tls.port " [271]"
1687: PT\-TLS server port the strongSwan PDP is listening on.
1688:
1689: .TP
1690: .BR charon.plugins.tnc-pdp.radius.enable " [yes]"
1691: Enable RADIUS protocol on the strongSwan PDP.
1692:
1693: .TP
1694: .BR charon.plugins.tnc-pdp.radius.method " [ttls]"
1695: EAP tunnel method to be used.
1696:
1697: .TP
1698: .BR charon.plugins.tnc-pdp.radius.port " [1812]"
1699: RADIUS server port the strongSwan PDP is listening on.
1700:
1701: .TP
1702: .BR charon.plugins.tnc-pdp.radius.secret " []"
1703: Shared RADIUS secret between strongSwan PDP and NAS. If set, make sure to adjust
1704: the permissions of the config file accordingly.
1705:
1706: .TP
1707: .BR charon.plugins.tnc-pdp.server " []"
1708: Name of the strongSwan PDP as contained in the AAA certificate.
1709:
1710: .TP
1711: .BR charon.plugins.tnc-pdp.timeout " []"
1712: Timeout in seconds before closing incomplete connections.
1713:
1714: .TP
1715: .BR charon.plugins.tnccs-11.max_message_size " [45000]"
1716: Maximum size of a PA\-TNC message (XML & Base64 encoding).
1717:
1718: .TP
1719: .BR charon.plugins.tnccs-20.max_batch_size " [65522]"
1720: Maximum size of a PB\-TNC batch (upper limit via PT\-EAP = 65529).
1721:
1722: .TP
1723: .BR charon.plugins.tnccs-20.max_message_size " [65490]"
1724: Maximum size of a PA\-TNC message (upper limit via PT\-EAP = 65497).
1725:
1726: .TP
1727: .BR charon.plugins.tnccs-20.mutual " [no]"
1728: Enable PB\-TNC mutual protocol.
1729:
1730: .TP
1731: .BR charon.plugins.tnccs-20.tests.pb_tnc_noskip " [no]"
1732: Send an unsupported PB\-TNC message type with the NOSKIP flag set.
1733:
1734: .TP
1735: .BR charon.plugins.tnccs-20.tests.pb_tnc_version " [2]"
1736: Send a PB\-TNC batch with a modified PB\-TNC version.
1737:
1738: .TP
1739: .BR charon.plugins.tpm.fips_186_4 " [no]"
1740: Is the TPM 2.0 FIPS\-186\-4 compliant, forcing e.g. the use of the default salt
1741: length instead of maximum salt length with RSAPSS padding.
1742:
1743: .TP
1744: .BR charon.plugins.tpm.tcti.name " [device|tabrmd]"
1745: Name of TPM 2.0 TCTI library. Valid values:
1746: .RI "" "tabrmd" ","
1747: .RI "" "device" ""
1748: or
1749: .RI "" "mssim" "."
1750: Defaults are
1751: .RI "" "device" ""
1752: if the
1753: .RI "" "/dev/tpmrm0" ""
1754: in\-kernel TPM 2.0 resource manager
1755: device exists, and
1756: .RI "" "tabrmd" ""
1757: otherwise, requiring the d\-bus based TPM 2.0 access
1758: broker and resource manager to be available.
1759:
1760: .TP
1761: .BR charon.plugins.tpm.tcti.opts " [/dev/tpmrm0|<none>]"
1762: Options for the TPM 2.0 TCTI library. Defaults are
1763: .RI "" "/dev/tpmrm0" ""
1764: if the TCTI
1765: library name is
1766: .RI "" "device" ""
1767: and no options otherwise.
1768:
1769: .TP
1770: .BR charon.plugins.tpm.use_rng " [no]"
1771: Whether the TPM should be used as RNG.
1772:
1773: .TP
1774: .BR charon.plugins.unbound.dlv_anchors " []"
1775: File to read trusted keys for DLV (DNSSEC Lookaside Validation) from. It uses
1776: the same format as
1777: .RI "" "trust_anchors" "."
1778: Only one DLV can be configured, which is
1779: then used as a root trusted DLV, this means that it is a lookaside for the root.
1780:
1781: .TP
1782: .BR charon.plugins.unbound.resolv_conf " [/etc/resolv.conf]"
1783: File to read DNS resolver configuration from.
1784:
1785: .TP
1786: .BR charon.plugins.unbound.trust_anchors " [/etc/ipsec.d/dnssec.keys]"
1787: File to read DNSSEC trust anchors from (usually root zone KSK). The format of
1788: the file is the standard DNS Zone file format, anchors can be stored as DS or
1789: DNSKEY entries in the file.
1790:
1791: .TP
1792: .BR charon.plugins.updown.dns_handler " [no]"
1793: Whether the updown script should handle DNS servers assigned via IKEv1 Mode
1794: Config or IKEv2 Config Payloads (if enabled they can't be handled by other
1795: plugins, like resolve)
1796:
1797: .TP
1798: .BR charon.plugins.vici.socket " [unix://${piddir}/charon.vici]"
1799: Socket the vici plugin serves clients.
1800:
1801: .TP
1802: .BR charon.plugins.whitelist.enable " [yes]"
1803: Enable loaded whitelist plugin.
1804:
1805: .TP
1806: .BR charon.plugins.whitelist.socket " [unix://${piddir}/charon.wlst]"
1807: Socket provided by the whitelist plugin.
1808:
1809: .TP
1810: .BR charon.plugins.wolfssl.fips_mode " [no]"
1811: Enable to prevent loading the plugin if wolfSSL is not in FIPS mode.
1812:
1813: .TP
1814: .BR charon.plugins.xauth-eap.backend " [radius]"
1815: EAP plugin to be used as backend for XAuth credential verification.
1816:
1817: .TP
1818: .BR charon.plugins.xauth-pam.pam_service " [login]"
1819: PAM service to be used for authentication.
1820:
1821: .TP
1822: .BR charon.plugins.xauth-pam.session " [no]"
1823: Open/close a PAM session for each active IKE_SA.
1824:
1825: .TP
1826: .BR charon.plugins.xauth-pam.trim_email " [yes]"
1827: If an email address is received as an XAuth username, trim it to just the
1828: username part.
1829:
1830: .TP
1831: .BR charon.port " [500]"
1832: UDP port used locally. If set to 0 a random port will be allocated.
1833:
1834: .TP
1835: .BR charon.port_nat_t " [4500]"
1836: UDP port used locally in case of NAT\-T. If set to 0 a random port will be
1837: allocated. Has to be different from
1838: .RB "" "charon.port" ","
1839: otherwise a random port
1840: will be allocated.
1841:
1842: .TP
1843: .BR charon.prefer_best_path " [no]"
1844: By default, charon keeps SAs on the routing path with addresses it previously
1845: used if that path is still usable. By setting this option to yes, it tries more
1846: aggressively to update SAs with MOBIKE on routing priority changes using the
1847: cheapest path. This adds more noise, but allows to dynamically adapt SAs to
1848: routing priority changes. This option has no effect if MOBIKE is not supported
1849: or disabled.
1850:
1851: .TP
1852: .BR charon.prefer_configured_proposals " [yes]"
1853: Prefer locally configured proposals for IKE/IPsec over supplied ones as
1854: responder (disabling this can avoid keying retries due to INVALID_KE_PAYLOAD
1855: notifies).
1856:
1857: .TP
1858: .BR charon.prefer_temporary_addrs " [no]"
1859: By default, permanent IPv6 source addresses are preferred over temporary ones
1860: (RFC 4941), to make connections more stable. Enable this option to reverse this.
1861:
1862: It also affects which IPv6 addresses are announced as additional addresses if
1863: MOBIKE is used. If the option is disabled, only permanent addresses are sent,
1864: and only temporary ones if it is enabled.
1865:
1866: .TP
1867: .BR charon.process_route " [yes]"
1868: Process RTM_NEWROUTE and RTM_DELROUTE events.
1869:
1870: .TP
1871: .B charon.processor.priority_threads
1872: .br
1873: Section to configure the number of reserved threads per priority class see JOB
1874: PRIORITY MANAGEMENT in
1875: .RB "" "strongswan.conf" "(5)."
1876:
1877:
1878: .TP
1879: .BR charon.rdn_matching " [strict]"
1880: How RDNs in subject DNs of certificates are matched against configured
1881: identities. Possible values are
1882: .RI "" "strict" ""
1883: (the default),
1884: .RI "" "reordered" ","
1885: and
1886: .RI "" "relaxed" "."
1887: With
1888: .RI "" "strict" ""
1889: the number, type and order of all RDNs has to match,
1890: wildcards (*) for the values of RDNs are allowed (that's the case for all three
1891: variants). Using
1892: .RI "" "reordered" ""
1893: also matches DNs if the RDNs appear in a different
1894: order, the number and type still has to match. Finally,
1895: .RI "" "relaxed" ""
1896: also allows
1897: matches of DNs that contain more RDNs than the configured identity (missing RDNs
1898: are treated like a wildcard match).
1899:
1900: Note that
1901: .RI "" "reordered" ""
1902: and
1903: .RI "" "relaxed" ""
1904: impose a considerable overhead on memory
1905: usage and runtime, in particular, for mismatches, compared to
1906: .RI "" "strict" "."
1907:
1908:
1909: .TP
1910: .BR charon.receive_delay " [0]"
1911: Delay in ms for receiving packets, to simulate larger RTT.
1912:
1913: .TP
1914: .BR charon.receive_delay_request " [yes]"
1915: Delay request messages.
1916:
1917: .TP
1918: .BR charon.receive_delay_response " [yes]"
1919: Delay response messages.
1920:
1921: .TP
1922: .BR charon.receive_delay_type " [0]"
1923: Specific IKEv2 message type to delay, 0 for any.
1924:
1925: .TP
1926: .BR charon.replay_window " [32]"
1927: Size of the AH/ESP replay window, in packets.
1928:
1929: .TP
1930: .BR charon.retransmit_base " [1.8]"
1931: Base to use for calculating exponential back off, see IKEv2 RETRANSMISSION in
1932: .RB "" "strongswan.conf" "(5)."
1933:
1934:
1935: .TP
1936: .BR charon.retransmit_jitter " [0]"
1937: Maximum jitter in percent to apply randomly to calculated retransmission timeout
1938: (0 to disable).
1939:
1940: .TP
1941: .BR charon.retransmit_limit " [0]"
1942: Upper limit in seconds for calculated retransmission timeout (0 to disable).
1943:
1944: .TP
1945: .BR charon.retransmit_timeout " [4.0]"
1946: Timeout in seconds before sending first retransmit.
1947:
1948: .TP
1949: .BR charon.retransmit_tries " [5]"
1950: Number of times to retransmit a packet before giving up.
1951:
1952: .TP
1953: .BR charon.retry_initiate_interval " [0]"
1954: Interval in seconds to use when retrying to initiate an IKE_SA (e.g. if DNS
1955: resolution failed), 0 to disable retries.
1956:
1957: .TP
1958: .BR charon.reuse_ikesa " [yes]"
1959: Initiate CHILD_SA within existing IKE_SAs (always enabled for IKEv1).
1960:
1961: .TP
1962: .BR charon.routing_table " []"
1963: Numerical routing table to install routes to.
1964:
1965: .TP
1966: .BR charon.routing_table_prio " []"
1967: Priority of the routing table.
1968:
1969: .TP
1970: .BR charon.rsa_pss " [no]"
1971: Whether to use RSA with PSS padding instead of PKCS#1 padding by default.
1972:
1973: .TP
1974: .BR charon.send_delay " [0]"
1975: Delay in ms for sending packets, to simulate larger RTT.
1976:
1977: .TP
1978: .BR charon.send_delay_request " [yes]"
1979: Delay request messages.
1980:
1981: .TP
1982: .BR charon.send_delay_response " [yes]"
1983: Delay response messages.
1984:
1985: .TP
1986: .BR charon.send_delay_type " [0]"
1987: Specific IKEv2 message type to delay, 0 for any.
1988:
1989: .TP
1990: .BR charon.send_vendor_id " [no]"
1991: Send strongSwan vendor ID payload
1992:
1993: .TP
1994: .BR charon.signature_authentication " [yes]"
1995: Whether to enable Signature Authentication as per RFC 7427.
1996:
1997: .TP
1998: .BR charon.signature_authentication_constraints " [yes]"
1999: If enabled, signature schemes configured in
2000: .RI "" "rightauth" ","
2001: in addition to getting
2002: used as constraints against signature schemes employed in the certificate chain,
2003: are also used as constraints against the signature scheme used by peers during
2004: IKEv2.
2005:
2006: .TP
2007: .BR charon.spi_label " [0x0000000000000000]"
2008: Value mixed into the local IKE SPIs after applying
2009: .RI "" "spi_mask" "."
2010:
2011:
2012: .TP
2013: .BR charon.spi_mask " [0x0000000000000000]"
2014: Mask applied to local IKE SPIs before mixing in
2015: .RI "" "spi_label" ""
2016: (bits set will be
2017: replaced with
2018: .RI "" "spi_label" ")."
2019:
2020:
2021: .TP
2022: .BR charon.spi_max " [0xcfffffff]"
2023: The upper limit for SPIs requested from the kernel for IPsec SAs.
2024:
2025: .TP
2026: .BR charon.spi_min " [0xc0000000]"
2027: The lower limit for SPIs requested from the kernel for IPsec SAs. Should not be
2028: set lower than 0x00000100 (256), as SPIs between 1 and 255 are reserved by IANA.
2029:
2030: .TP
2031: .B charon.start-scripts
2032: .br
2033: Section containing a list of scripts (name = path) that are executed when the
2034: daemon is started.
2035:
2036: .TP
2037: .B charon.stop-scripts
2038: .br
2039: Section containing a list of scripts (name = path) that are executed when the
2040: daemon is terminated.
2041:
2042: .TP
2043: .B charon.syslog
2044: .br
2045: Section to define syslog loggers, see LOGGER CONFIGURATION in
2046: .RB "" "strongswan.conf" "(5)."
2047:
2048:
2049: .TP
2050: .B charon.syslog.<facility>
2051: .br
2052: <facility> is one of the supported syslog facilities, see LOGGER CONFIGURATION
2053: in
2054: .RB "" "strongswan.conf" "(5)."
2055:
2056:
2057: .TP
2058: .BR charon.syslog.<facility>.<subsystem> " [<default>]"
2059: Loglevel for a specific subsystem.
2060:
2061: .TP
2062: .BR charon.syslog.<facility>.default " [1]"
2063: Specifies the default loglevel to be used for subsystems for which no specific
2064: loglevel is defined.
2065:
2066: .TP
2067: .BR charon.syslog.<facility>.ike_name " [no]"
2068: Prefix each log entry with the connection name and a unique numerical identifier
2069: for each IKE_SA.
2070:
2071: .TP
1.1.1.2 ! misho 2072: .BR charon.syslog.<facility>.log_level " [no]"
! 2073: Add the log level of each message after the subsystem (e.g. [IKE2]).
! 2074:
! 2075: .TP
1.1 misho 2076: .BR charon.syslog.identifier " []"
2077: Global identifier used for an
2078: .RB "" "openlog" "(3)"
2079: call, prepended to each log message
2080: by syslog. If not configured,
2081: .RB "" "openlog" "(3)"
2082: is not called, so the value will
2083: depend on system defaults (often the program name).
2084:
2085: .TP
2086: .BR charon.threads " [16]"
2087: Number of worker threads in charon. Several of these are reserved for long
2088: running tasks in internal modules and plugins. Therefore, make sure you don't
2089: set this value too low. The number of idle worker threads listed in
2090: .RI "" "ipsec statusall" ""
2091: might be used as indicator on the number of reserved threads.
2092:
2093: .TP
2094: .BR charon.tls.cipher " []"
2095: List of TLS encryption ciphers.
2096:
2097: .TP
1.1.1.2 ! misho 2098: .BR charon.tls.ke_group " []"
! 2099: List of TLS key exchange groups.
! 2100:
! 2101: .TP
1.1 misho 2102: .BR charon.tls.key_exchange " []"
2103: List of TLS key exchange methods.
2104:
2105: .TP
2106: .BR charon.tls.mac " []"
2107: List of TLS MAC algorithms.
2108:
2109: .TP
1.1.1.2 ! misho 2110: .BR charon.tls.send_certreq_authorities " [yes]"
! 2111: Whether to include CAs in a server's CertificateRequest message. May be disabled
! 2112: if clients can't handle a long list of CAs.
! 2113:
! 2114: .TP
! 2115: .BR charon.tls.signature " []"
! 2116: List of TLS signature schemes.
! 2117:
! 2118: .TP
1.1 misho 2119: .BR charon.tls.suites " []"
2120: List of TLS cipher suites.
2121:
2122: .TP
1.1.1.2 ! misho 2123: .BR charon.tls.version_max " [1.2]"
! 2124: Maximum TLS version to negotiate.
! 2125:
! 2126: .TP
! 2127: .BR charon.tls.version_min " [1.2]"
! 2128: Minimum TLS version to negotiate.
! 2129:
! 2130: .TP
1.1 misho 2131: .BR charon.tnc.tnc_config " [/etc/tnc_config]"
2132: TNC IMC/IMV configuration file.
2133:
2134: .TP
2135: .BR charon.user " []"
2136: Name of the user the daemon changes to after startup.
2137:
2138: .TP
2139: .BR charon.x509.enforce_critical " [yes]"
2140: Discard certificates with unsupported or unknown critical extensions.
2141:
2142: .TP
2143: .BR charon-nm.ca_dir " [<default>]"
2144: Directory from which to load CA certificates if no certificate is configured.
2145:
2146: .TP
2147: .B charon-systemd.journal
2148: .br
2149: Section to configure native systemd journal logger, very similar to the syslog
2150: logger as described in LOGGER CONFIGURATION in
2151: .RB "" "strongswan.conf" "(5)."
2152:
2153:
2154: .TP
2155: .BR charon-systemd.journal.<subsystem> " [<default>]"
2156: Loglevel for a specific subsystem.
2157:
2158: .TP
2159: .BR charon-systemd.journal.default " [1]"
2160: Specifies the default loglevel to be used for subsystems for which no specific
2161: loglevel is defined.
2162:
2163: .TP
2164: .BR imv_policy_manager.command_allow " []"
2165: Shell command to be executed with recommendation allow.
2166:
2167: .TP
2168: .BR imv_policy_manager.command_block " []"
2169: Shell command to be executed with all other recommendations.
2170:
2171: .TP
2172: .BR imv_policy_manager.database " []"
2173: Database URI for the database that stores the package information. If it
2174: contains a password, make sure to adjust the permissions of the config file
2175: accordingly.
2176:
2177: .TP
2178: .BR imv_policy_manager.load " [sqlite]"
2179: Plugins to load in IMV policy manager.
2180:
2181: .TP
2182: .BR libimcv.debug_level " [1]"
2183: Debug level for a stand\-alone
2184: .RI "" "libimcv" ""
2185: library.
2186:
2187: .TP
2188: .BR libimcv.load " [random nonce gmp pubkey x509]"
2189: Plugins to load in IMC/IMVs with stand\-alone
2190: .RI "" "libimcv" ""
2191: library.
2192:
2193: .TP
2194: .BR libimcv.plugins.imc-attestation.aik_blob " []"
2195: AIK encrypted private key blob file.
2196:
2197: .TP
2198: .BR libimcv.plugins.imc-attestation.aik_cert " []"
2199: AIK certificate file.
2200:
2201: .TP
2202: .BR libimcv.plugins.imc-attestation.aik_handle " []"
2203: AIK object handle.
2204:
2205: .TP
2206: .BR libimcv.plugins.imc-attestation.aik_pubkey " []"
2207: AIK public key file.
2208:
2209: .TP
1.1.1.2 ! misho 2210: .BR libimcv.plugins.imc-attestation.hash_algorithm " [sha384]"
! 2211: Preferred measurement hash algorithm.
! 2212:
! 2213: .TP
1.1 misho 2214: .BR libimcv.plugins.imc-attestation.mandatory_dh_groups " [yes]"
2215: Enforce mandatory Diffie\-Hellman groups.
2216:
2217: .TP
2218: .BR libimcv.plugins.imc-attestation.nonce_len " [20]"
2219: DH nonce length.
2220:
2221: .TP
2222: .BR libimcv.plugins.imc-attestation.pcr17_after " []"
2223: PCR17 value after measurement.
2224:
2225: .TP
2226: .BR libimcv.plugins.imc-attestation.pcr17_before " []"
2227: PCR17 value before measurement.
2228:
2229: .TP
2230: .BR libimcv.plugins.imc-attestation.pcr17_meas " []"
2231: Dummy measurement value extended into PCR17 if the TBOOT log is not available.
2232:
2233: .TP
2234: .BR libimcv.plugins.imc-attestation.pcr18_after " []"
2235: PCR18 value after measurement.
2236:
2237: .TP
2238: .BR libimcv.plugins.imc-attestation.pcr18_before " []"
2239: PCR18 value before measurement.
2240:
2241: .TP
2242: .BR libimcv.plugins.imc-attestation.pcr18_meas " []"
2243: Dummy measurement value extended into PCR17 if the TBOOT log is not available.
2244:
2245: .TP
2246: .BR libimcv.plugins.imc-attestation.pcr_info " [no]"
2247: Whether to send pcr_before and pcr_after info.
2248:
2249: .TP
1.1.1.2 ! misho 2250: .BR libimcv.plugins.imc-attestation.pcr_padding " [no]"
! 2251: Whether to pad IMA SHA1 measurements values when extending into SHA256 PCR bank.
! 2252:
! 2253: .TP
1.1 misho 2254: .BR libimcv.plugins.imc-attestation.use_quote2 " [yes]"
2255: Use Quote2 AIK signature instead of Quote signature.
2256:
2257: .TP
2258: .BR libimcv.plugins.imc-attestation.use_version_info " [no]"
2259: Version Info is included in Quote2 signature.
2260:
2261: .TP
2262: .BR libimcv.plugins.imc-hcd.push_info " [yes]"
2263: Send quadruple info without being prompted.
2264:
2265: .TP
2266: .BR libimcv.plugins.imc-hcd.subtypes " []"
2267: Section to define PWG HCD PA subtypes.
2268:
2269: .TP
2270: .BR libimcv.plugins.imc-hcd.subtypes.<section> " []"
2271: Defines a PWG HCD PA subtype section. Recognized subtype section names are
2272: .RI "" "system" ","
2273: .RI "" "control" ","
2274: .RI "" "marker" ","
2275: .RI "" "finisher" ","
2276: .RI "" "interface" ""
2277: and
2278: .RI "" "scanner" "."
2279:
2280:
2281: .TP
2282: .BR libimcv.plugins.imc-hcd.subtypes.<section>.<sw_type> " []"
2283: Defines a software type section. Recognized software type section names are
2284: .RI "" "firmware" ","
2285: .RI "" "resident_application" ""
2286: and
2287: .RI "" "user_application" "."
2288:
2289:
2290: .TP
2291: .BR libimcv.plugins.imc-hcd.subtypes.<section>.<sw_type>.<software> " []"
2292: Defines a software section having an arbitrary name.
2293:
2294: .TP
2295: .BR libimcv.plugins.imc-hcd.subtypes.<section>.<sw_type>.<software>.name " []"
2296: Name of the software installed on the hardcopy device.
2297:
2298: .TP
2299: .BR libimcv.plugins.imc-hcd.subtypes.<section>.<sw_type>.<software>.patches " []"
2300: String describing all patches applied to the given software on this hardcopy
2301: device. The individual patches are separated by a newline character '\\n'.
2302:
2303: .TP
2304: .BR libimcv.plugins.imc-hcd.subtypes.<section>.<sw_type>.<software>.string_version " []"
2305: String describing the version of the given software on this hardcopy device.
2306:
2307: .TP
2308: .BR libimcv.plugins.imc-hcd.subtypes.<section>.<sw_type>.<software>.version " []"
2309: Hex\-encoded version string with a length of 16 octets consisting of the fields
2310: major version number (4 octets), minor version number (4 octets), build number
2311: (4 octets), service pack major number (2 octets) and service pack minor number
2312: (2 octets).
2313:
2314: .TP
2315: .BR libimcv.plugins.imc-hcd.subtypes.<section>.attributes_natural_language " [en]"
2316: Variable length natural language tag conforming to RFC 5646 specifies the
2317: language to be used in the health assessment message of a given subtype.
2318:
2319: .TP
2320: .BR libimcv.plugins.imc-hcd.subtypes.system.certification_state " []"
2321: Hex\-encoded certification state.
2322:
2323: .TP
2324: .BR libimcv.plugins.imc-hcd.subtypes.system.configuration_state " []"
2325: Hex\-encoded configuration state.
2326:
2327: .TP
2328: .BR libimcv.plugins.imc-hcd.subtypes.system.machine_type_model " []"
2329: String specifying the machine type and model of the hardcopy device.
2330:
2331: .TP
2332: .BR libimcv.plugins.imc-hcd.subtypes.system.pstn_fax_enabled " [no]"
2333: Specifies if a PSTN facsimile interface is installed and enabled on the hardcopy
2334: device.
2335:
2336: .TP
2337: .BR libimcv.plugins.imc-hcd.subtypes.system.time_source " []"
2338: String specifying the hostname of the network time server used by the hardcopy
2339: device.
2340:
2341: .TP
2342: .BR libimcv.plugins.imc-hcd.subtypes.system.user_application_enabled " [no]"
2343: Specifies if users can dynamically download and execute applications on the
2344: hardcopy device.
2345:
2346: .TP
2347: .BR libimcv.plugins.imc-hcd.subtypes.system.user_application_persistence_enabled " [no]"
2348: Specifies if user dynamically downloaded applications can persist outside the
2349: boundaries of a single job on the hardcopy device.
2350:
2351: .TP
2352: .BR libimcv.plugins.imc-hcd.subtypes.system.vendor_name " []"
2353: String specifying the manufacturer of the hardcopy device.
2354:
2355: .TP
2356: .BR libimcv.plugins.imc-hcd.subtypes.system.vendor_smi_code " []"
2357: Integer specifying the globally unique 24\-bit SMI code assigned to the
2358: manufacturer of the hardcopy device.
2359:
2360: .TP
2361: .BR libimcv.plugins.imc-os.device_cert " []"
2362: Manually set the path to the client device certificate (e.g.
2363: /etc/pts/aikCert.der)
2364:
2365: .TP
2366: .BR libimcv.plugins.imc-os.device_handle " []"
2367: Manually set handle to a private key bound to a smartcard or TPM (e.g.
2368: 0x81010004)
2369:
2370: .TP
2371: .BR libimcv.plugins.imc-os.device_id " []"
2372: Manually set the client device ID in hexadecimal format (e.g.
2373: 1083f03988c9762703b1c1080c2e46f72b99cc31)
2374:
2375: .TP
2376: .BR libimcv.plugins.imc-os.device_pubkey " []"
2377: Manually set the path to the client device public key (e.g. /etc/pts/aikPub.der)
2378:
2379: .TP
2380: .BR libimcv.plugins.imc-os.push_info " [yes]"
2381: Send operating system info without being prompted.
2382:
2383: .TP
2384: .BR libimcv.plugins.imc-scanner.push_info " [yes]"
2385: Send open listening ports without being prompted.
2386:
2387: .TP
2388: .BR libimcv.plugins.imc-swima.eid_epoch " [0x11223344]"
2389: Set 32 bit epoch value for event IDs manually if software collector database is
2390: not available.
2391:
2392: .TP
2393: .BR libimcv.plugins.imc-swima.subscriptions " [no]"
2394: Accept SW Inventory or SW Events subscriptions.
2395:
2396: .TP
2397: .BR libimcv.plugins.imc-swima.swid_database " []"
2398: URI to software collector database containing event timestamps, software
2399: creation and deletion events and collected software identifiers. If it contains
2400: a password, make sure to adjust the permissions of the config file accordingly.
2401:
2402: .TP
2403: .BR libimcv.plugins.imc-swima.swid_directory " [${prefix}/share]"
2404: Directory where SWID tags are located.
2405:
2406: .TP
2407: .BR libimcv.plugins.imc-swima.swid_full " [no]"
2408: Include file information in the XML\-encoded SWID tags.
2409:
2410: .TP
2411: .BR libimcv.plugins.imc-swima.swid_pretty " [no]"
2412: Generate XML\-encoded SWID tags with pretty indentation.
2413:
2414: .TP
2415: .BR libimcv.plugins.imc-test.additional_ids " [0]"
2416: Number of additional IMC IDs.
2417:
2418: .TP
2419: .BR libimcv.plugins.imc-test.command " [none]"
2420: Command to be sent to the Test IMV.
2421:
2422: .TP
2423: .BR libimcv.plugins.imc-test.dummy_size " [0]"
2424: Size of dummy attribute to be sent to the Test IMV (0 = disabled).
2425:
2426: .TP
2427: .BR libimcv.plugins.imc-test.retry " [no]"
2428: Do a handshake retry.
2429:
2430: .TP
2431: .BR libimcv.plugins.imc-test.retry_command " []"
2432: Command to be sent to the Test IMV in the handshake retry.
2433:
2434: .TP
2435: .BR libimcv.plugins.imv-attestation.cadir " []"
2436: Path to directory with AIK cacerts.
2437:
2438: .TP
2439: .BR libimcv.plugins.imv-attestation.dh_group " [ecp256]"
2440: Preferred Diffie\-Hellman group.
2441:
2442: .TP
1.1.1.2 ! misho 2443: .BR libimcv.plugins.imv-attestation.hash_algorithm " [sha384]"
1.1 misho 2444: Preferred measurement hash algorithm.
2445:
2446: .TP
2447: .BR libimcv.plugins.imv-attestation.mandatory_dh_groups " [yes]"
2448: Enforce mandatory Diffie\-Hellman groups.
2449:
2450: .TP
2451: .BR libimcv.plugins.imv-attestation.min_nonce_len " [0]"
2452: DH minimum nonce length.
2453:
2454: .TP
2455: .BR libimcv.plugins.imv-os.remediation_uri " []"
2456: URI pointing to operating system remediation instructions.
2457:
2458: .TP
2459: .BR libimcv.plugins.imv-scanner.remediation_uri " []"
2460: URI pointing to scanner remediation instructions.
2461:
2462: .TP
2463: .BR libimcv.plugins.imv-swima.rest_api.timeout " [120]"
2464: Timeout of SWID REST API HTTP POST transaction.
2465:
2466: .TP
2467: .BR libimcv.plugins.imv-swima.rest_api.uri " []"
2468: HTTP URI of the SWID REST API.
2469:
2470: .TP
2471: .BR libimcv.plugins.imv-test.rounds " [0]"
2472: Number of IMC\-IMV retry rounds.
2473:
2474: .TP
2475: .BR libimcv.stderr_quiet " [no]"
2476: Disable output to stderr with a stand\-alone
2477: .RI "" "libimcv" ""
2478: library.
2479:
2480: .TP
2481: .BR libimcv.swid_gen.command " [/usr/local/bin/swid_generator]"
2482: SWID generator command to be executed.
2483:
2484: .TP
2485: .BR libimcv.swid_gen.tag_creator.name " [strongSwan Project]"
2486: Name of the tagCreator entity.
2487:
2488: .TP
2489: .BR libimcv.swid_gen.tag_creator.regid " [strongswan.org]"
2490: regid of the tagCreator entity.
2491:
2492: .TP
2493: .BR manager.database " []"
2494: Credential database URI for manager. If it contains a password, make sure to
2495: adjust the permissions of the config file accordingly.
2496:
2497: .TP
2498: .BR manager.debug " [no]"
2499: Enable debugging in manager.
2500:
2501: .TP
2502: .BR manager.load " []"
2503: Plugins to load in manager.
2504:
2505: .TP
2506: .BR manager.socket " []"
2507: FastCGI socket of manager, to run it statically.
2508:
2509: .TP
2510: .BR manager.threads " [10]"
2511: Threads to use for request handling.
2512:
2513: .TP
2514: .BR manager.timeout " [15m]"
2515: Session timeout for manager.
2516:
2517: .TP
2518: .BR medsrv.database " []"
2519: Mediation server database URI. If it contains a password, make sure to adjust
2520: the permissions of the config file accordingly.
2521:
2522: .TP
2523: .BR medsrv.debug " [no]"
2524: Debugging in mediation server web application.
2525:
2526: .TP
2527: .BR medsrv.dpd " [5m]"
2528: DPD timeout to use in mediation server plugin.
2529:
2530: .TP
2531: .BR medsrv.load " []"
2532: Plugins to load in mediation server plugin.
2533:
2534: .TP
2535: .BR medsrv.password_length " [6]"
2536: Minimum password length required for mediation server user accounts.
2537:
2538: .TP
2539: .BR medsrv.rekey " [20m]"
2540: Rekeying time on mediation connections in mediation server plugin.
2541:
2542: .TP
2543: .BR medsrv.socket " []"
2544: Run Mediation server web application statically on socket.
2545:
2546: .TP
2547: .BR medsrv.threads " [5]"
2548: Number of thread for mediation service web application.
2549:
2550: .TP
2551: .BR medsrv.timeout " [15m]"
2552: Session timeout for mediation service.
2553:
2554: .TP
2555: .BR pki.load " []"
2556: Plugins to load in ipsec pki tool.
2557:
2558: .TP
2559: .BR pool.database " []"
2560: Database URI for the database that stores IP pools and configuration attributes.
2561: If it contains a password, make sure to adjust the permissions of the
2562: config file accordingly.
2563:
2564: .TP
2565: .BR pool.load " []"
2566: Plugins to load in ipsec pool tool.
2567:
2568: .TP
2569: .BR scepclient.load " []"
2570: Plugins to load in ipsec scepclient tool.
2571:
2572: .TP
2573: .B sec-updater
2574: .br
2575: Options for the sec\-updater tool.
2576:
2577: .TP
2578: .BR sec-updater.database " []"
2579: Global IMV policy database URI. If it contains a password, make sure to adjust
2580: the permissions of the config file accordingly.
2581:
2582: .TP
2583: .BR sec-updater.load " []"
2584: Plugins to load in sec\-updater tool.
2585:
2586: .TP
2587: .BR sec-updater.swid_gen.command " [/usr/local/bin/swid_generator]"
2588: SWID generator command to be executed.
2589:
2590: .TP
2591: .BR sec-updater.swid_gen.tag_creator.name " [strongSwan Project]"
2592: Name of the tagCreator entity.
2593:
2594: .TP
2595: .BR sec-updater.swid_gen.tag_creator.regid " [strongswan.org]"
2596: regid of the tagCreator entity.
2597:
2598: .TP
2599: .BR sec-updater.tmp.deb_file " [/tmp/sec-updater.deb]"
2600: Temporary storage for downloaded deb package file.
2601:
2602: .TP
2603: .BR sec-updater.tmp.tag_file " [/tmp/sec-updater.tag]"
2604: Temporary storage for generated SWID tags.
2605:
2606: .TP
2607: .BR sec-updater.tnc_manage_command " [/var/www/tnc/manage.py]"
2608: strongTNC manage.py command used to import SWID tags.
2609:
2610: .TP
2611: .BR starter.config_file " [${sysconfdir}/ipsec.conf]"
2612: Location of the ipsec.conf file
2613:
2614: .TP
2615: .BR starter.load_warning " [yes]"
2616: Disable charon plugin load option warning.
2617:
2618: .TP
2619: .B sw-collector
2620: .br
2621: Options for the sw\-collector tool.
2622:
2623: .TP
2624: .BR sw-collector.database " []"
2625: URI to software collector database containing event timestamps, software
2626: creation and deletion events and collected software identifiers. If it contains
2627: a password, make sure to adjust the permissions of the config file accordingly.
2628:
2629: .TP
2630: .BR sw-collector.first_file " [/var/log/bootstrap.log]"
2631: Path pointing to file created when the Linux OS was installed.
2632:
2633: .TP
2634: .BR sw-collector.first_time " [0000-00-00T00:00:00Z]"
2635: Time in UTC when the Linux OS was installed.
2636:
2637: .TP
2638: .BR sw-collector.history " []"
2639: Path pointing to apt history.log file.
2640:
2641: .TP
2642: .BR sw-collector.load " []"
2643: Plugins to load in sw\-collector tool.
2644:
2645: .TP
2646: .BR sw-collector.rest_api.timeout " [120]"
2647: Timeout of REST API HTTP POST transaction.
2648:
2649: .TP
2650: .BR sw-collector.rest_api.uri " []"
2651: HTTP URI of the central collector's REST API.
2652:
2653: .TP
2654: .BR swanctl.load " []"
2655: Plugins to load in swanctl.
2656:
2657: .TP
2658: .BR swanctl.socket " [unix://${piddir}/charon.vici]"
2659: VICI socket to connect to by default.
2660:
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>