Annotation of embedaddon/strongswan/src/swanctl/swanctl.conf.5.main, revision 1.1.1.1

1.1       misho       1: .TP
                      2: .B connections
                      3: .br
                      4: Section defining IKE connection configurations.
                      5: 
                      6: The connections section defines IKE connection configurations, each in its own
                      7: subsections. In the keyword description below, the connection is named
                      8: .RI "" "<conn>" ","
                      9: but an arbitrary yet unique connection name can be chosen for each connection
                     10: subsection.
                     11: 
                     12: .TP
                     13: .B connections.<conn>
                     14: .br
                     15: Section for an IKE connection named <conn>.
                     16: 
                     17: .TP
                     18: .BR connections.<conn>.version " [0]"
                     19: IKE major version to use for connection.
                     20: .RI "" "1" ""
                     21: uses IKEv1 aka ISAKMP,
                     22: .RI "" "2" ""
                     23: uses
                     24: IKEv2. A connection using the default of
                     25: .RI "" "0" ""
                     26: accepts both IKEv1 and IKEv2 as
                     27: responder, and initiates the connection actively with IKEv2.
                     28: 
                     29: .TP
                     30: .BR connections.<conn>.local_addrs " [%any]"
                     31: Local address(es) to use for IKE communication, comma separated. Takes single
                     32: IPv4/IPv6 addresses, DNS names, CIDR subnets or IP address ranges.
                     33: 
                     34: As initiator, the first non\-range/non\-subnet is used to initiate the connection
                     35: from. As responder, the local destination address must match at least to one of
                     36: the specified addresses, subnets or ranges.
                     37: 
                     38: If FQDNs are assigned they are resolved every time a configuration lookup is
                     39: done. If DNS resolution times out, the lookup is delayed for that time.
                     40: 
                     41: .TP
                     42: .BR connections.<conn>.remote_addrs " [%any]"
                     43: Remote address(es) to use for IKE communication, comma separated. Takes single
                     44: IPv4/IPv6 addresses, DNS names, CIDR subnets or IP address ranges.
                     45: 
                     46: As initiator, the first non\-range/non\-subnet is used to initiate the connection
                     47: to. As responder, the initiator source address must match at least to one of the
                     48: specified addresses, subnets or ranges.
                     49: 
                     50: If FQDNs are assigned they are resolved every time a configuration lookup is
                     51: done. If DNS resolution times out, the lookup is delayed for that time.
                     52: 
                     53: To initiate a connection, at least one specific address or DNS name must be
                     54: specified.
                     55: 
                     56: .TP
                     57: .BR connections.<conn>.local_port " [500]"
                     58: Local UDP port for IKE communication. By default the port of the socket backend
                     59: is used, which is usually
                     60: .RI "" "500" "."
                     61: If port
                     62: .RI "" "500" ""
                     63: is used, automatic IKE port
                     64: floating to port 4500 is used to work around NAT issues.
                     65: 
                     66: Using a non\-default local IKE port requires support from the socket backend in
                     67: use (socket\-dynamic).
                     68: 
                     69: .TP
                     70: .BR connections.<conn>.remote_port " [500]"
                     71: Remote UDP port for IKE communication. If the default of port
                     72: .RI "" "500" ""
                     73: is used,
                     74: automatic IKE port floating to port 4500 is used to work around NAT issues.
                     75: 
                     76: .TP
                     77: .BR connections.<conn>.proposals " [default]"
                     78: A proposal is a set of algorithms. For non\-AEAD algorithms, this includes for
                     79: IKE an encryption algorithm, an integrity algorithm, a pseudo random function
                     80: and a Diffie\-Hellman group. For AEAD algorithms, instead of encryption and
                     81: integrity algorithms, a combined algorithm is used.
                     82: 
                     83: In IKEv2, multiple algorithms of the same kind can be specified in a single
                     84: proposal, from which one gets selected. In IKEv1, only one algorithm per kind is
                     85: allowed per proposal, more algorithms get implicitly stripped. Use multiple
                     86: proposals to offer different algorithms combinations in IKEv1.
                     87: 
                     88: Algorithm keywords get separated using dashes. Multiple proposals may be
                     89: separated by commas. The special value
                     90: .RI "" "default" ""
                     91: forms a default proposal of
                     92: supported algorithms considered safe, and is usually a good choice for
                     93: interoperability.
                     94: 
                     95: .TP
                     96: .BR connections.<conn>.vips " []"
                     97: Comma separated list of virtual IPs to request in IKEv2 configuration payloads
                     98: or IKEv1 Mode Config. The wildcard addresses
                     99: .RI "" "0.0.0.0" ""
                    100: and
                    101: .RI "" "::" ""
                    102: request an
                    103: arbitrary address, specific addresses may be defined. The responder may return a
                    104: different address, though, or none at all.
                    105: 
                    106: .TP
                    107: .BR connections.<conn>.aggressive " [no]"
                    108: Enables Aggressive Mode instead of Main Mode with Identity Protection.
                    109: Aggressive Mode is considered less secure, because the ID and HASH payloads are
                    110: exchanged unprotected. This allows a passive attacker to snoop peer identities,
                    111: and even worse, start dictionary attacks on the Preshared Key.
                    112: 
                    113: .TP
                    114: .BR connections.<conn>.pull " [yes]"
                    115: If the default of
                    116: .RI "" "yes" ""
                    117: is used, Mode Config works in pull mode, where the
                    118: initiator actively requests a virtual IP. With
                    119: .RI "" "no" ","
                    120: push mode is used, where
                    121: the responder pushes down a virtual IP to the initiating peer.
                    122: 
                    123: Push mode is currently supported for IKEv1, but not in IKEv2. It is used by a
                    124: few implementations only, pull mode is recommended.
                    125: 
                    126: .TP
                    127: .BR connections.<conn>.dscp " [000000]"
                    128: Differentiated Services Field Codepoint to set on outgoing IKE packets for this
                    129: connection. The value is a six digit binary encoded string specifying the
                    130: Codepoint to set, as defined in RFC 2474.
                    131: 
                    132: .TP
                    133: .BR connections.<conn>.encap " [no]"
                    134: To enforce UDP encapsulation of ESP packets, the IKE daemon can fake the NAT
                    135: detection payloads. This makes the peer believe that NAT takes place on the
                    136: path, forcing it to encapsulate ESP packets in UDP.
                    137: 
                    138: Usually this is not required, but it can help to work around connectivity issues
                    139: with too restrictive intermediary firewalls.
                    140: 
                    141: .TP
                    142: .BR connections.<conn>.mobike " [yes]"
                    143: Enables MOBIKE on IKEv2 connections. MOBIKE is enabled by default on IKEv2
                    144: connections, and allows mobility of clients and multi\-homing on servers by
                    145: migrating active IPsec tunnels.
                    146: 
                    147: Usually keeping MOBIKE enabled is unproblematic, as it is not used if the peer
                    148: does not indicate support for it. However, due to the design of MOBIKE, IKEv2
                    149: always floats to port 4500 starting from the second exchange. Some
                    150: implementations don't like this behavior, hence it can be disabled.
                    151: 
                    152: .TP
                    153: .BR connections.<conn>.dpd_delay " [0s]"
                    154: Interval to check the liveness of a peer actively using IKEv2 INFORMATIONAL
                    155: exchanges or IKEv1 R_U_THERE messages. Active DPD checking is only enforced if
                    156: no IKE or ESP/AH packet has been received for the configured DPD delay.
                    157: 
                    158: .TP
                    159: .BR connections.<conn>.dpd_timeout " [0s]"
                    160: Charon by default uses the normal retransmission mechanism and timeouts to check
                    161: the liveness of a peer, as all messages are used for liveness checking. For
                    162: compatibility reasons, with IKEv1 a custom interval may be specified; this
                    163: option has no effect on connections using IKE2.
                    164: 
                    165: .TP
                    166: .BR connections.<conn>.fragmentation " [yes]"
                    167: Use IKE fragmentation (proprietary IKEv1 extension or RFC 7383 IKEv2
                    168: fragmentation).  Acceptable  values  are
                    169: .RI "" "yes" ""
                    170: (the        default),
                    171: .RI "" "accept" ","
                    172: .RI "" "force" ""
                    173: and
                    174: .RI "" "no" "."
                    175: If set to
                    176: .RI "" "yes" ","
                    177: and the peer     supports it, oversized IKE
                    178: messages will be sent in fragments. If set to
                    179: .RI "" "accept" ","
                    180: support for
                    181: fragmentation is announced to the peer but the daemon does not send its own
                    182: messages in fragments.  If set to
                    183: .RI "" "force" ""
                    184: (only supported for IKEv1) the initial
                    185: IKE message will already be fragmented if required. Finally, setting the option
                    186: to
                    187: .RI "" "no" ""
                    188: will disable announcing support for this feature.
                    189: 
                    190: Note that fragmented IKE messages sent by a peer are always accepted
                    191: irrespective of the value of this option (even when set to
                    192: .RI "" "no" ")."
                    193: 
                    194: 
                    195: .TP
                    196: .BR connections.<conn>.childless " [allow]"
                    197: Use childless IKE_SA initiation (RFC 6023) for IKEv2.  Acceptable values are
                    198: .RI "" "allow" ""
                    199: (the default),
                    200: .RI "" "force" ""
                    201: and
                    202: .RI "" "never" "."
                    203: If set to
                    204: .RI "" "allow" ","
                    205: responders will
                    206: accept childless IKE_SAs (as indicated via notify in the IKE_SA_INIT response)
                    207: while initiators continue to create regular IKE_SAs with the first CHILD_SA
                    208: created during IKE_AUTH, unless the IKE_SA is initiated explicitly without any
                    209: children (which will fail if the responder does not support or has disabled this
                    210: extension).  If set to
                    211: .RI "" "force" ","
                    212: only childless initiation is accepted and the
                    213: first CHILD_SA is created with a separate CREATE_CHILD_SA exchange (e.g. to use
                    214: an independent DH exchange for all CHILD_SAs).  Finally, setting the option to
                    215: .RI "" "never" ""
                    216: disables support for childless IKE_SAs as responder.
                    217: 
                    218: .TP
                    219: .BR connections.<conn>.send_certreq " [yes]"
                    220: Send certificate request payloads to offer trusted root CA certificates to the
                    221: peer. Certificate requests help the peer to choose an appropriate
                    222: certificate/private key for authentication and are enabled by default.
                    223: 
                    224: Disabling certificate requests can be useful if too many trusted root CA
                    225: certificates are installed, as each certificate request increases the size of
                    226: the initial IKE packets.
                    227: 
                    228: .TP
                    229: .BR connections.<conn>.send_cert " [ifasked]"
                    230: Send certificate payloads when using certificate authentication. With the
                    231: default of
                    232: .RI "" "ifasked" ""
                    233: the daemon sends certificate payloads only if certificate
                    234: requests have been received.
                    235: .RI "" "never" ""
                    236: disables sending of certificate payloads
                    237: altogether,
                    238: .RI "" "always" ""
                    239: causes certificate payloads to be sent unconditionally
                    240: whenever certificate authentication is used.
                    241: 
                    242: .TP
                    243: .BR connections.<conn>.ppk_id " []"
                    244: String identifying the Postquantum Preshared Key (PPK) to be used.
                    245: 
                    246: .TP
                    247: .BR connections.<conn>.ppk_required " [no]"
                    248: Whether a Postquantum Preshared Key (PPK) is required for this connection.
                    249: 
                    250: .TP
                    251: .BR connections.<conn>.keyingtries " [1]"
                    252: Number of retransmission sequences to perform during initial connect. Instead of
                    253: giving up initiation after the first retransmission sequence with the default
                    254: value of
                    255: .RI "" "1" ","
                    256: additional sequences may be started according to the configured
                    257: value. A value of
                    258: .RI "" "0" ""
                    259: initiates a new sequence until the connection establishes
                    260: or fails with a permanent error.
                    261: 
                    262: .TP
                    263: .BR connections.<conn>.unique " [no]"
                    264: Connection uniqueness policy to enforce. To avoid multiple connections from the
                    265: same user, a uniqueness policy can be enforced. The value
                    266: .RI "" "never" ""
                    267: does never
                    268: enforce such a policy, even if a peer included INITIAL_CONTACT notification
                    269: messages, whereas
                    270: .RI "" "no" ""
                    271: replaces existing connections for the same identity if a
                    272: new one has the INITIAL_CONTACT notify.
                    273: .RI "" "keep" ""
                    274: rejects new connection attempts
                    275: if the same user already has an active connection,
                    276: .RI "" "replace" ""
                    277: deletes any
                    278: existing connection if a new one for the same user gets established.
                    279: 
                    280: To compare connections for uniqueness, the remote IKE identity is used. If EAP
                    281: or XAuth authentication is involved, the EAP\-Identity or XAuth username is used
                    282: to enforce the uniqueness policy instead.
                    283: 
                    284: On initiators this setting specifies whether an INITIAL_CONTACT notify is sent
                    285: during IKE_AUTH if no existing connection is found with the remote peer
                    286: (determined by the identities of the first authentication round). Unless set to
                    287: .RI "" "never" ""
                    288: the client will send a notify.
                    289: 
                    290: .TP
                    291: .BR connections.<conn>.reauth_time " [0s]"
                    292: Time to schedule IKE reauthentication. IKE reauthentication recreates the
                    293: IKE/ISAKMP SA from scratch and re\-evaluates the credentials. In asymmetric
                    294: configurations (with EAP or configuration payloads) it might not be possible to
                    295: actively reauthenticate as responder. The IKEv2 reauthentication lifetime
                    296: negotiation can instruct the client to perform reauthentication.
                    297: 
                    298: Reauthentication is disabled by default. Enabling it usually may lead to small
                    299: connection interruptions, as strongSwan uses a break\-before\-make policy with
                    300: IKEv2 to avoid any conflicts with associated tunnel resources.
                    301: 
                    302: .TP
                    303: .BR connections.<conn>.rekey_time " [4h]"
                    304: IKE rekeying refreshes key material using a Diffie\-Hellman exchange, but does
                    305: not re\-check associated credentials. It is supported in IKEv2 only, IKEv1
                    306: performs a reauthentication procedure instead.
                    307: 
                    308: With the default value IKE rekeying is scheduled every 4 hours, minus the
                    309: configured
                    310: .RB "" "rand_time" "."
                    311: If a
                    312: .RB "" "reauth_time" ""
                    313: is configured,
                    314: .RB "" "rekey_time" ""
                    315: defaults to zero disabling rekeying; explicitly set both to enforce rekeying and
                    316: reauthentication.
                    317: 
                    318: .TP
                    319: .BR connections.<conn>.over_time " [10% of rekey_time/reauth_time]"
                    320: Hard IKE_SA lifetime if rekey/reauth does not complete, as time. To avoid having
                    321: an IKE/ISAKMP kept alive if IKE reauthentication or rekeying fails perpetually,
                    322: a maximum hard lifetime may be specified. If the IKE_SA fails to rekey or
                    323: reauthenticate within the specified time, the IKE_SA gets closed.
                    324: 
                    325: In contrast to CHILD_SA rekeying,
                    326: .RB "" "over_time" ""
                    327: is relative in time to the
                    328: .RB "" "rekey_time" ""
                    329: .RI "" "and" ""
                    330: .RB "" "reauth_time" ""
                    331: values, as it applies to both.
                    332: 
                    333: The default is 10% of the longer of
                    334: .RB "" "rekey_time" ""
                    335: and
                    336: .RB "" "reauth_time" "."
                    337: 
                    338: 
                    339: .TP
                    340: .BR connections.<conn>.rand_time " [over_time]"
                    341: Time range from which to choose a random value to subtract from rekey/reauth
                    342: times. To avoid having both peers initiating the rekey/reauth procedure
                    343: simultaneously, a random time gets subtracted from the rekey/reauth times.
                    344: 
                    345: The default is equal to the configured
                    346: .RB "" "over_time" "."
                    347: 
                    348: 
                    349: .TP
                    350: .BR connections.<conn>.pools " []"
                    351: Comma separated list of named IP pools to allocate virtual IP addresses and
                    352: other configuration attributes from. Each name references a pool by name from
                    353: either the
                    354: .RB "" "pools" ""
                    355: section or an external pool.
                    356: 
                    357: .TP
                    358: .BR connections.<conn>.if_id_in " [0]"
                    359: XFRM interface ID set on inbound policies/SA, can be overridden by child config,
                    360: see there for details.
                    361: 
                    362: .TP
                    363: .BR connections.<conn>.if_id_out " [0]"
                    364: XFRM interface ID set on outbound policies/SA, can be overridden by child
                    365: config, see there for details.
                    366: 
                    367: .TP
                    368: .BR connections.<conn>.mediation " [no]"
                    369: Whether this connection is a mediation connection, that is, whether this
                    370: connection is used to mediate other connections using the IKEv2 Mediation
                    371: Extension.  Mediation connections create no CHILD_SA.
                    372: 
                    373: .TP
                    374: .BR connections.<conn>.mediated_by " []"
                    375: The name of the connection to mediate this connection through. If given, the
                    376: connection will be mediated through the named mediation connection. The
                    377: mediation connection must have
                    378: .RB "" "mediation" ""
                    379: enabled.
                    380: 
                    381: .TP
                    382: .BR connections.<conn>.mediation_peer " []"
                    383: Identity under which the peer is registered at the mediation server, that is,
                    384: the IKE identity the other end of this connection uses as its local identity on
                    385: its connection to the mediation server. This is the identity we request the
                    386: mediation server to mediate us with. Only relevant on connections that set
                    387: .RB "" "mediated_by" "."
                    388: If it is not given, the remote IKE identity of the first
                    389: authentication round of this connection will be used.
                    390: 
                    391: .TP
                    392: .B connections.<conn>.local<suffix>
                    393: .br
                    394: Section for a local authentication round. A local authentication round defines
                    395: the rules how authentication is performed for the local peer. Multiple rounds
                    396: may be defined to use IKEv2 RFC 4739 Multiple Authentication or IKEv1 XAuth.
                    397: 
                    398: Each round is defined in a section having
                    399: .RI "" "local" ""
                    400: as prefix, and an optional
                    401: unique suffix. To define a single authentication round, the suffix may be
                    402: omitted.
                    403: 
                    404: .TP
                    405: .BR connections.<conn>.local<suffix>.round " [0]"
                    406: Optional numeric identifier by which authentication rounds are sorted.  If not
                    407: specified rounds are ordered by their position in the config file/VICI message.
                    408: 
                    409: .TP
                    410: .BR connections.<conn>.local<suffix>.certs " []"
                    411: Comma separated list of certificate candidates to use for authentication. The
                    412: certificates may use a relative path from the
                    413: .RB "" "swanctl" ""
                    414: .RI "" "x509" ""
                    415: directory or an
                    416: absolute path.
                    417: 
                    418: The certificate used for authentication is selected based on the received
                    419: certificate request payloads. If no appropriate CA can be located, the first
                    420: certificate is used.
                    421: 
                    422: .TP
                    423: .BR connections.<conn>.local<suffix>.cert<suffix> " []"
                    424: Section for a certificate candidate to use for authentication. Certificates in
                    425: .RI "" "certs" ""
                    426: are transmitted as binary blobs, these sections offer more flexibility.
                    427: 
                    428: .TP
                    429: .BR connections.<conn>.local<suffix>.cert<suffix>.file " []"
                    430: Absolute path to the certificate to load. Passed as\-is to the daemon, so it must
                    431: be readable by it.
                    432: 
                    433: Configure either this or
                    434: .RI "" "handle" ","
                    435: but not both, in one section.
                    436: 
                    437: .TP
                    438: .BR connections.<conn>.local<suffix>.cert<suffix>.handle " []"
                    439: Hex\-encoded CKA_ID of the certificate on a token.
                    440: 
                    441: Configure either this or
                    442: .RI "" "file" ","
                    443: but not both, in one section.
                    444: 
                    445: .TP
                    446: .BR connections.<conn>.local<suffix>.cert<suffix>.slot " []"
                    447: Optional slot number of the token that stores the certificate.
                    448: 
                    449: .TP
                    450: .BR connections.<conn>.local<suffix>.cert<suffix>.module " []"
                    451: Optional PKCS#11 module name.
                    452: 
                    453: .TP
                    454: .BR connections.<conn>.local<suffix>.pubkeys " []"
                    455: Comma separated list of raw public key candidates to use for authentication. The
                    456: public keys may use a relative path from the
                    457: .RB "" "swanctl" ""
                    458: .RI "" "pubkey" ""
                    459: directory or
                    460: an absolute path.
                    461: 
                    462: Even though multiple local public keys could be defined in principle, only the
                    463: first public key in the list is used for authentication.
                    464: 
                    465: .TP
                    466: .BR connections.<conn>.local<suffix>.auth " [pubkey]"
                    467: Authentication to perform locally.
                    468: .RI "" "pubkey" ""
                    469: uses public key authentication using
                    470: a private key associated to a usable certificate.
                    471: .RI "" "psk" ""
                    472: uses pre\-shared key
                    473: authentication. The IKEv1 specific
                    474: .RI "" "xauth" ""
                    475: is used for XAuth or Hybrid
                    476: authentication, while the IKEv2 specific
                    477: .RI "" "eap" ""
                    478: keyword defines EAP
                    479: authentication.
                    480: 
                    481: For
                    482: .RI "" "xauth" ","
                    483: a specific backend name may be appended, separated by a dash. The
                    484: appropriate
                    485: .RI "" "xauth" ""
                    486: backend is selected to perform the XAuth exchange. For
                    487: traditional XAuth, the
                    488: .RI "" "xauth" ""
                    489: method is usually defined in the second
                    490: authentication round following an initial
                    491: .RI "" "pubkey" ""
                    492: (or
                    493: .RI "" "psk" ")"
                    494: round. Using
                    495: .RI "" "xauth" ""
                    496: in the first round performs Hybrid Mode client authentication.
                    497: 
                    498: For
                    499: .RI "" "eap" ","
                    500: a specific EAP method name may be appended, separated by a dash. An
                    501: EAP module implementing the appropriate method is selected to perform the EAP
                    502: conversation.
                    503: 
                    504: If both peers support RFC 7427 ("Signature Authentication in IKEv2") specific
                    505: hash algorithms to be used during IKEv2 authentication may be configured. To do
                    506: so use
                    507: .RI "" "ike:" ""
                    508: followed by a trust chain signature scheme constraint (see
                    509: description of the
                    510: .RB "" "remote" ""
                    511: section's
                    512: .RB "" "auth" ""
                    513: keyword). For example, with
                    514: .RI "" "ike:pubkey\-sha384\-sha256" ""
                    515: a public key signature scheme with either SHA\-384 or
                    516: SHA\-256 would get used for authentication, in that order and depending on the
                    517: hash algorithms supported by the peer. If no specific hash algorithms are
                    518: configured, the default is to prefer an algorithm that matches or exceeds the
                    519: strength of the signature key. If no constraints with
                    520: .RI "" "ike:" ""
                    521: prefix are
                    522: configured any signature scheme constraint (without
                    523: .RI "" "ike:" ""
                    524: prefix) will also
                    525: apply to IKEv2 authentication, unless this is disabled in
                    526: .RB "" "strongswan.conf" "(5)."
                    527: To use RSASSA\-PSS signatures use
                    528: .RI "" "rsa/pss" ""
                    529: instead of
                    530: .RI "" "pubkey" ""
                    531: or
                    532: .RI "" "rsa" ""
                    533: as in e.g.
                    534: .RI "" "ike:rsa/pss\-sha256" "."
                    535: If
                    536: .RI "" "pubkey" ""
                    537: or
                    538: .RI "" "rsa" ""
                    539: constraints are configured RSASSA\-PSS signatures will only be used if enabled in
                    540: .RB "" "strongswan.conf" "(5)."
                    541: 
                    542: 
                    543: .TP
                    544: .BR connections.<conn>.local<suffix>.id " []"
                    545: IKE identity to use for authentication round. When using certificate
                    546: authentication, the IKE identity must be contained in the certificate, either as
                    547: subject or as subjectAltName.
                    548: 
                    549: The identity can be an IP address, a fully\-qualified domain name, an email
                    550: address or a Distinguished Name for which the ID type is determined
                    551: automatically and the string is converted to the appropriate encoding. To
                    552: enforce a specific identity type, a prefix may be used, followed by a colon (:).
                    553: If the number sign (#) follows the colon, the remaining data is interpreted as
                    554: hex encoding, otherwise the string is used as\-is as the identification data.
                    555: Note that this implies that no conversion is performed for non\-string
                    556: identities. For example,
                    557: .RI "" "ipv4:10.0.0.1" ""
                    558: does not create a valid ID_IPV4_ADDR
                    559: IKE identity, as it does not get converted to binary 0x0a000001. Instead, one
                    560: could use
                    561: .RI "" "ipv4:#0a000001" ""
                    562: to get a valid identity, but just using the implicit
                    563: type with automatic conversion is usually simpler. The same applies to the ASN1
                    564: encoded types. The following prefixes are known:
                    565: .RI "" "ipv4" ","
                    566: .RI "" "ipv6" ","
                    567: .RI "" "rfc822" ","
                    568: .RI "" "email" ","
                    569: .RI "" "userfqdn" ","
                    570: .RI "" "fqdn" ","
                    571: .RI "" "dns" ","
                    572: .RI "" "asn1dn" ","
                    573: .RI "" "asn1gn" ""
                    574: and
                    575: .RI "" "keyid" "."
                    576: Custom type
                    577: prefixes may be specified by surrounding the numerical type value by curly
                    578: brackets.
                    579: 
                    580: .TP
                    581: .BR connections.<conn>.local<suffix>.eap_id " [id]"
                    582: Client EAP\-Identity to use in EAP\-Identity exchange and the EAP method.
                    583: 
                    584: .TP
                    585: .BR connections.<conn>.local<suffix>.aaa_id " [remote-id]"
                    586: Server side EAP\-Identity to expect in the EAP method. Some EAP methods, such as
                    587: EAP\-TLS, use an identity for the server to perform mutual authentication. This
                    588: identity may differ from the IKE identity, especially when EAP authentication is
                    589: delegated from the IKE responder to an AAA backend.
                    590: 
                    591: For EAP\-(T)TLS, this defines the identity for which the server must provide a
                    592: certificate in the TLS exchange.
                    593: 
                    594: .TP
                    595: .BR connections.<conn>.local<suffix>.xauth_id " [id]"
                    596: Client XAuth username used in the XAuth exchange.
                    597: 
                    598: .TP
                    599: .B connections.<conn>.remote<suffix>
                    600: .br
                    601: Section for a remote authentication round. A remote authentication round defines
                    602: the constraints how the peers must authenticate to use this connection. Multiple
                    603: rounds may be defined to use IKEv2 RFC 4739 Multiple Authentication or IKEv1
                    604: XAuth.
                    605: 
                    606: Each round is defined in a section having
                    607: .RI "" "remote" ""
                    608: as prefix, and an optional
                    609: unique suffix. To define a single authentication round, the suffix may be
                    610: omitted.
                    611: 
                    612: .TP
                    613: .BR connections.<conn>.remote<suffix>.round " [0]"
                    614: Optional numeric identifier by which authentication rounds are sorted.  If not
                    615: specified rounds are ordered by their position in the config file/VICI message.
                    616: 
                    617: .TP
                    618: .BR connections.<conn>.remote<suffix>.id " [%any]"
                    619: IKE identity to expect for authentication round. Refer to the
                    620: .RB "" "local" ""
                    621: section's
                    622: .RB "" "id" ""
                    623: keyword for details.
                    624: 
                    625: It's possible to use wildcards to match remote identities (e.g.
                    626: .RI "" "*@strongswan.org" ","
                    627: .RI "" "*.strongswan.org" ","
                    628: or
                    629: .RI "" "C=CH,O=strongSwan,CN=*" ")."
                    630: Connections with exact matches are preferred. When using distinguished names
                    631: with wildcards, the
                    632: .RI "" "charon.rdn_matching" ""
                    633: option in
                    634: .RB "" "strongswan.conf" "(5)"
                    635: specifies how RDNs are matched.
                    636: 
                    637: .TP
                    638: .BR connections.<conn>.remote<suffix>.eap_id " [id]"
                    639: Identity to use as peer identity during EAP authentication. If set to
                    640: .RI "" "%any" ""
                    641: the
                    642: EAP\-Identity method will be used to ask the client for an identity.
                    643: 
                    644: .TP
                    645: .BR connections.<conn>.remote<suffix>.groups " []"
                    646: Comma separated authorization group memberships to require. The peer must prove
                    647: membership to at least one of the specified groups. Group membership can be
                    648: certified by different means, for example by appropriate Attribute Certificates
                    649: or by an AAA backend involved in the authentication.
                    650: 
                    651: .TP
                    652: .BR connections.<conn>.remote<suffix>.cert_policy " []"
                    653: Comma separated list of certificate policy OIDs the peer's certificate must
                    654: have. OIDs are specified using the numerical dotted representation.
                    655: 
                    656: .TP
                    657: .BR connections.<conn>.remote<suffix>.certs " []"
                    658: Comma separated list of certificates to accept for authentication. The
                    659: certificates may use a relative path from the
                    660: .RB "" "swanctl" ""
                    661: .RI "" "x509" ""
                    662: directory or an
                    663: absolute path.
                    664: 
                    665: .TP
                    666: .BR connections.<conn>.remote<suffix>.cert<suffix> " []"
                    667: Section for a certificate to accept for authentication. Certificates in
                    668: .RI "" "certs" ""
                    669: are transmitted as binary blobs, these sections offer more flexibility.
                    670: 
                    671: .TP
                    672: .BR connections.<conn>.remote<suffix>.cert<suffix>.file " []"
                    673: Absolute path to the certificate to load. Passed as\-is to the daemon, so it must
                    674: be readable by it.
                    675: 
                    676: Configure either this or
                    677: .RI "" "handle" ","
                    678: but not both, in one section.
                    679: 
                    680: .TP
                    681: .BR connections.<conn>.remote<suffix>.cert<suffix>.handle " []"
                    682: Hex\-encoded CKA_ID of the certificate on a token.
                    683: 
                    684: Configure either this or
                    685: .RI "" "file" ","
                    686: but not both, in one section.
                    687: 
                    688: .TP
                    689: .BR connections.<conn>.remote<suffix>.cert<suffix>.slot " []"
                    690: Optional slot number of the token that stores the certificate.
                    691: 
                    692: .TP
                    693: .BR connections.<conn>.remote<suffix>.cert<suffix>.module " []"
                    694: Optional PKCS#11 module name.
                    695: 
                    696: .TP
                    697: .BR connections.<conn>.remote<suffix>.cacerts " []"
                    698: Comma separated list of CA certificates to accept for authentication. The
                    699: certificates may use a relative path from the
                    700: .RB "" "swanctl" ""
                    701: .RI "" "x509ca" ""
                    702: directory or
                    703: an absolute path.
                    704: 
                    705: .TP
                    706: .BR connections.<conn>.remote<suffix>.cacert<suffix> " []"
                    707: Section for a CA certificate to accept for authentication. Certificates in
                    708: .RI "" "cacerts" ""
                    709: are transmitted as binary blobs, these sections offer more
                    710: flexibility.
                    711: 
                    712: .TP
                    713: .BR connections.<conn>.remote<suffix>.cacert<suffix>.file " []"
                    714: Absolute path to the certificate to load. Passed as\-is to the daemon, so it must
                    715: be readable by it.
                    716: 
                    717: Configure either this or
                    718: .RI "" "handle" ","
                    719: but not both, in one section.
                    720: 
                    721: .TP
                    722: .BR connections.<conn>.remote<suffix>.cacert<suffix>.handle " []"
                    723: Hex\-encoded CKA_ID of the CA certificate on a token.
                    724: 
                    725: Configure either this or
                    726: .RI "" "file" ","
                    727: but not both, in one section.
                    728: 
                    729: .TP
                    730: .BR connections.<conn>.remote<suffix>.cacert<suffix>.slot " []"
                    731: Optional slot number of the token that stores the CA certificate.
                    732: 
                    733: .TP
                    734: .BR connections.<conn>.remote<suffix>.cacert<suffix>.module " []"
                    735: Optional PKCS#11 module name.
                    736: 
                    737: .TP
                    738: .BR connections.<conn>.remote<suffix>.ca_id " []"
                    739: The specified identity must be contained in one (intermediate) CA of the remote
                    740: peer trustchain, either as subject or as subjectAltName. This has the same
                    741: effect as specifying
                    742: .RI "" "cacerts" ""
                    743: to force clients under a CA to specific
                    744: connections; it does not require the CA certificate to be available locally, and
                    745: can be received from the peer during the IKE exchange.
                    746: 
                    747: .TP
                    748: .BR connections.<conn>.remote<suffix>.pubkeys " []"
                    749: Comma separated list of raw public keys to accept for authentication. The public
                    750: keys may use a relative path from the
                    751: .RB "" "swanctl" ""
                    752: .RI "" "pubkey" ""
                    753: directory or an
                    754: absolute path.
                    755: 
                    756: .TP
                    757: .BR connections.<conn>.remote<suffix>.revocation " [relaxed]"
                    758: Certificate revocation policy for CRL or OCSP revocation.
                    759: 
                    760: A
                    761: .RI "" "strict" ""
                    762: revocation policy fails if no revocation information is available,
                    763: i.e. the certificate is not known to be unrevoked.
                    764: 
                    765: .RI "" "ifuri" ""
                    766: fails only if a CRL/OCSP URI is available, but certificate revocation
                    767: checking fails, i.e. there should be revocation information available, but it
                    768: could not be obtained.
                    769: 
                    770: The default revocation policy
                    771: .RI "" "relaxed" ""
                    772: fails only if a certificate is revoked,
                    773: i.e. it is explicitly known that it is bad.
                    774: 
                    775: .TP
                    776: .BR connections.<conn>.remote<suffix>.auth " [pubkey]"
                    777: Authentication to expect from remote. See the
                    778: .RB "" "local" ""
                    779: section's
                    780: .RB "" "auth" ""
                    781: keyword description about the details of supported mechanisms.
                    782: 
                    783: To require a trustchain public key strength for the remote side, specify the key
                    784: type followed by the minimum strength in bits (for example
                    785: .RI "" "ecdsa\-384" ""
                    786: or
                    787: .RI "" "rsa\-2048\-ecdsa\-256" ")."
                    788: To limit the acceptable set of hashing algorithms for
                    789: trustchain validation, append hash algorithms to
                    790: .RI "" "pubkey" ""
                    791: or a key strength
                    792: definition (for example
                    793: .RI "" "pubkey\-sha256\-sha512" ","
                    794: .RI "" "rsa\-2048\-sha256\-sha384\-sha512" ""
                    795: or
                    796: .RI "" "rsa\-2048\-sha256\-ecdsa\-256\-sha256\-sha384" ")."
                    797: Unless disabled in
                    798: .RB "" "strongswan.conf" "(5),"
                    799: or explicit IKEv2 signature constraints are configured
                    800: (refer to the description of the
                    801: .RB "" "local" ""
                    802: section's
                    803: .RB "" "auth" ""
                    804: keyword for
                    805: details), such key types and hash algorithms are also applied as constraints
                    806: against IKEv2 signature authentication schemes used by the remote side. To
                    807: require RSASSA\-PSS signatures use
                    808: .RI "" "rsa/pss" ""
                    809: instead of
                    810: .RI "" "pubkey" ""
                    811: or
                    812: .RI "" "rsa" ""
                    813: as in
                    814: e.g.
                    815: .RI "" "rsa/pss\-sha256" "."
                    816: If
                    817: .RI "" "pubkey" ""
                    818: or
                    819: .RI "" "rsa" ""
                    820: constraints are configured
                    821: RSASSA\-PSS signatures will only be accepted if enabled in
                    822: .RB "" "strongswan.conf" "(5)."
                    823: 
                    824: 
                    825: To specify trust chain constraints for EAP\-(T)TLS, append a colon to the EAP
                    826: method, followed by the key type/size and hash algorithm as discussed above
                    827: (e.g.
                    828: .RI "" "eap\-tls:ecdsa\-384\-sha384" ")."
                    829: 
                    830: 
                    831: .TP
                    832: .B connections.<conn>.children.<child>
                    833: .br
                    834: CHILD_SA configuration sub\-section. Each connection definition may have one or
                    835: more sections in its
                    836: .RI "" "children" ""
                    837: subsection. The section name defines the name of
                    838: the CHILD_SA configuration, which must be unique within the connection.
                    839: 
                    840: .TP
                    841: .BR connections.<conn>.children.<child>.ah_proposals " []"
                    842: AH proposals to offer for the CHILD_SA. A proposal is a set of algorithms. For
                    843: AH, this includes an integrity algorithm and an optional Diffie\-Hellman group.
                    844: If a DH group is specified, CHILD_SA/Quick Mode rekeying and initial negotiation
                    845: uses a separate Diffie\-Hellman exchange using the specified group (refer to
                    846: .RI "" "esp_proposals" ""
                    847: for details).
                    848: 
                    849: In IKEv2, multiple algorithms of the same kind can be specified in a single
                    850: proposal, from which one gets selected. In IKEv1, only one algorithm per kind is
                    851: allowed per proposal, more algorithms get implicitly stripped. Use multiple
                    852: proposals to offer different algorithms combinations in IKEv1.
                    853: 
                    854: Algorithm keywords get separated using dashes. Multiple proposals may be
                    855: separated by commas. The special value
                    856: .RI "" "default" ""
                    857: forms a default proposal of
                    858: supported algorithms considered safe, and is usually a good choice for
                    859: interoperability. By default no AH proposals are included, instead ESP is
                    860: proposed.
                    861: 
                    862: .TP
                    863: .BR connections.<conn>.children.<child>.esp_proposals " [default]"
                    864: ESP proposals to offer for the CHILD_SA. A proposal is a set of algorithms. For
                    865: ESP non\-AEAD proposals, this includes an integrity algorithm, an encryption
                    866: algorithm, an optional Diffie\-Hellman group and an optional Extended Sequence
                    867: Number Mode indicator. For AEAD proposals, a combined mode algorithm is used
                    868: instead of the separate encryption/integrity algorithms.
                    869: 
                    870: If a DH group is specified, CHILD_SA/Quick Mode rekeying and initial negotiation
                    871: use a separate Diffie\-Hellman exchange using the specified group. However, for
                    872: IKEv2, the keys of the CHILD_SA created implicitly with the IKE_SA will always
                    873: be derived from the IKE_SA's key material. So any DH group specified here will
                    874: only apply when the CHILD_SA is later rekeyed or is created with a separate
                    875: CREATE_CHILD_SA exchange. A proposal mismatch might, therefore, not immediately
                    876: be noticed when the SA is established, but may later cause rekeying to fail.
                    877: 
                    878: Extended Sequence Number support may be indicated with the
                    879: .RI "" "esn" ""
                    880: and
                    881: .RI "" "noesn" ""
                    882: values, both may be included to indicate support for both modes. If omitted,
                    883: .RI "" "noesn" ""
                    884: is assumed.
                    885: 
                    886: In IKEv2, multiple algorithms of the same kind can be specified in a single
                    887: proposal, from which one gets selected. In IKEv1, only one algorithm per kind is
                    888: allowed per proposal, more algorithms get implicitly stripped. Use multiple
                    889: proposals to offer different algorithms combinations in IKEv1.
                    890: 
                    891: Algorithm keywords get separated using dashes. Multiple proposals may be
                    892: separated by commas. The special value
                    893: .RI "" "default" ""
                    894: forms a default proposal of
                    895: supported algorithms considered safe, and is usually a good choice for
                    896: interoperability. If no algorithms are specified for AH nor ESP, the
                    897: .RI "" "default" ""
                    898: set of algorithms for ESP is included.
                    899: 
                    900: .TP
                    901: .BR connections.<conn>.children.<child>.sha256_96 " [no]"
                    902: HMAC\-SHA\-256 is used with 128\-bit truncation with IPsec. For compatibility with
                    903: implementations that incorrectly use 96\-bit truncation this option may be
                    904: enabled to configure the shorter truncation length in the kernel.  This is not
                    905: negotiated, so this only works with peers that use the incorrect truncation
                    906: length (or have this option enabled).
                    907: 
                    908: .TP
                    909: .BR connections.<conn>.children.<child>.local_ts " [dynamic]"
                    910: Comma separated list of local traffic selectors to include in CHILD_SA. Each
                    911: selector is a CIDR subnet definition, followed by an optional proto/port
                    912: selector. The special value
                    913: .RI "" "dynamic" ""
                    914: may be used instead of a subnet
                    915: definition, which gets replaced by the tunnel outer address or the virtual IP,
                    916: if negotiated. This is the default.
                    917: 
                    918: A protocol/port selector is surrounded by opening and closing square brackets.
                    919: Between these brackets, a numeric or
                    920: .RB "" "getservent" "(3)"
                    921: protocol name may be
                    922: specified. After the optional protocol restriction, an optional port restriction
                    923: may be specified, separated by a slash. The port restriction may be numeric, a
                    924: .RB "" "getservent" "(3)"
                    925: service name, or the special value
                    926: .RI "" "opaque" ""
                    927: for RFC 4301
                    928: OPAQUE selectors. Port ranges may be specified as well, none of the kernel
                    929: backends currently support port ranges, though.
                    930: 
                    931: When IKEv1 is used only the first selector is interpreted, except if the Cisco
                    932: Unity extension plugin is used. This is due to a limitation of the IKEv1
                    933: protocol, which only allows a single pair of selectors per CHILD_SA. So to
                    934: tunnel traffic matched by several pairs of selectors when using IKEv1 several
                    935: children (CHILD_SAs) have to be defined that cover the selectors.
                    936: 
                    937: The IKE daemon uses traffic selector narrowing for IKEv1, the same way it is
                    938: standardized and implemented for IKEv2. However, this may lead to problems with
                    939: other implementations. To avoid that, configure identical selectors in such
                    940: scenarios.
                    941: 
                    942: .TP
                    943: .BR connections.<conn>.children.<child>.remote_ts " [dynamic]"
                    944: Comma separated list of remote selectors to include in CHILD_SA. See
                    945: .RB "" "local_ts" ""
                    946: for a description of the selector syntax.
                    947: 
                    948: .TP
                    949: .BR connections.<conn>.children.<child>.rekey_time " [1h]"
                    950: Time to schedule CHILD_SA rekeying. CHILD_SA rekeying refreshes key material,
                    951: optionally using a Diffie\-Hellman exchange if a group is specified in the
                    952: proposal.
                    953: 
                    954: To avoid rekey collisions initiated by both ends simultaneously, a value in the
                    955: range of
                    956: .RB "" "rand_time" ""
                    957: gets subtracted to form the effective soft lifetime.
                    958: 
                    959: By default CHILD_SA rekeying is scheduled every hour, minus
                    960: .RB "" "rand_time" "."
                    961: 
                    962: 
                    963: .TP
                    964: .BR connections.<conn>.children.<child>.life_time " [rekey_time + 10%]"
                    965: Maximum lifetime before CHILD_SA gets closed. Usually this hard lifetime is
                    966: never reached, because the CHILD_SA gets rekeyed before. If that fails for
                    967: whatever reason, this limit closes the CHILD_SA.
                    968: 
                    969: The default is 10% more than the
                    970: .RB "" "rekey_time" "."
                    971: 
                    972: 
                    973: .TP
                    974: .BR connections.<conn>.children.<child>.rand_time " [life_time - rekey_time]"
                    975: Time range from which to choose a random value to subtract from
                    976: .RB "" "rekey_time" "."
                    977: The default is the difference between
                    978: .RB "" "life_time" ""
                    979: and
                    980: .RB "" "rekey_time" "."
                    981: 
                    982: 
                    983: .TP
                    984: .BR connections.<conn>.children.<child>.rekey_bytes " [0]"
                    985: Number of bytes processed before initiating CHILD_SA rekeying. CHILD_SA rekeying
                    986: refreshes key material, optionally using a Diffie\-Hellman exchange if a group is
                    987: specified in the proposal.
                    988: 
                    989: To avoid rekey collisions initiated by both ends simultaneously, a value in the
                    990: range of
                    991: .RB "" "rand_bytes" ""
                    992: gets subtracted to form the effective soft volume limit.
                    993: 
                    994: Volume based CHILD_SA rekeying is disabled by default.
                    995: 
                    996: .TP
                    997: .BR connections.<conn>.children.<child>.life_bytes " [rekey_bytes + 10%]"
                    998: Maximum bytes processed before CHILD_SA gets closed. Usually this hard volume
                    999: limit is never reached, because the CHILD_SA gets rekeyed before. If that fails
                   1000: for whatever reason, this limit closes the CHILD_SA.
                   1001: 
                   1002: The default is 10% more than
                   1003: .RB "" "rekey_bytes" "."
                   1004: 
                   1005: 
                   1006: .TP
                   1007: .BR connections.<conn>.children.<child>.rand_bytes " [life_bytes - rekey_bytes]"
                   1008: Byte range from which to choose a random value to subtract from
                   1009: .RB "" "rekey_bytes" "."
                   1010: The default is the difference between
                   1011: .RB "" "life_bytes" ""
                   1012: and
                   1013: .RB "" "rekey_bytes" "."
                   1014: 
                   1015: 
                   1016: .TP
                   1017: .BR connections.<conn>.children.<child>.rekey_packets " [0]"
                   1018: Number of packets processed before initiating CHILD_SA rekeying. CHILD_SA
                   1019: rekeying refreshes key material, optionally using a Diffie\-Hellman exchange if a
                   1020: group is specified in the proposal.
                   1021: 
                   1022: To avoid rekey collisions initiated by both ends simultaneously, a value in the
                   1023: range of
                   1024: .RB "" "rand_packets" ""
                   1025: gets subtracted to form the effective soft packet
                   1026: count limit.
                   1027: 
                   1028: Packet count based CHILD_SA rekeying is disabled by default.
                   1029: 
                   1030: .TP
                   1031: .BR connections.<conn>.children.<child>.life_packets " [rekey_packets + 10%]"
                   1032: Maximum number of packets processed before CHILD_SA gets closed. Usually this
                   1033: hard packets limit is never reached, because the CHILD_SA gets rekeyed before.
                   1034: If that fails for whatever reason, this limit closes the CHILD_SA.
                   1035: 
                   1036: The default is 10% more than
                   1037: .RB "" "rekey_bytes" "."
                   1038: 
                   1039: 
                   1040: .TP
                   1041: .BR connections.<conn>.children.<child>.rand_packets " [life_packets - rekey_packets]"
                   1042: Packet range from which to choose a random value to subtract from
                   1043: .RB "" "rekey_packets" "."
                   1044: The default is the difference between
                   1045: .RB "" "life_packets" ""
                   1046: and
                   1047: .RB "" "rekey_packets" "."
                   1048: 
                   1049: 
                   1050: .TP
                   1051: .BR connections.<conn>.children.<child>.updown " []"
                   1052: Updown script to invoke on CHILD_SA up and down events.
                   1053: 
                   1054: .TP
                   1055: .BR connections.<conn>.children.<child>.hostaccess " [no]"
                   1056: Hostaccess variable to pass to
                   1057: .RB "" "updown" ""
                   1058: script.
                   1059: 
                   1060: .TP
                   1061: .BR connections.<conn>.children.<child>.mode " [tunnel]"
                   1062: IPsec Mode to establish CHILD_SA with.
                   1063: .RI "" "tunnel" ""
                   1064: negotiates the CHILD_SA in IPsec
                   1065: Tunnel Mode, whereas
                   1066: .RI "" "transport" ""
                   1067: uses IPsec Transport Mode.
                   1068: .RI "" "transport_proxy" ""
                   1069: signifying the special Mobile IPv6 Transport Proxy Mode.
                   1070: .RI "" "beet" ""
                   1071: is the Bound End
                   1072: to End Tunnel mixture mode, working with fixed inner addresses without the need
                   1073: to include them in each packet.
                   1074: 
                   1075: Both
                   1076: .RI "" "transport" ""
                   1077: and
                   1078: .RI "" "beet" ""
                   1079: modes are subject to mode negotiation;
                   1080: .RI "" "tunnel" ""
                   1081: mode
                   1082: is negotiated if the preferred mode is not available.
                   1083: 
                   1084: .RI "" "pass" ""
                   1085: and
                   1086: .RI "" "drop" ""
                   1087: are used to install shunt policies which explicitly bypass the
                   1088: defined traffic from IPsec processing or drop it, respectively.
                   1089: 
                   1090: .TP
                   1091: .BR connections.<conn>.children.<child>.policies " [yes]"
                   1092: Whether to install IPsec policies or not. Disabling this can be useful in some
                   1093: scenarios e.g. MIPv6, where policies are not managed by the IKE daemon.
                   1094: 
                   1095: .TP
                   1096: .BR connections.<conn>.children.<child>.policies_fwd_out " [no]"
                   1097: Whether to install outbound FWD IPsec policies or not. Enabling this is required
                   1098: in case there is a drop policy that would match and block forwarded traffic for
                   1099: this CHILD_SA.
                   1100: 
                   1101: .TP
                   1102: .BR connections.<conn>.children.<child>.dpd_action " [clear]"
                   1103: Action to perform for this CHILD_SA on DPD timeout. The default
                   1104: .RI "" "clear" ""
                   1105: closes
                   1106: the CHILD_SA and does not take further action.
                   1107: .RI "" "trap" ""
                   1108: installs a trap policy,
                   1109: which will catch matching traffic and tries to re\-negotiate the tunnel
                   1110: on\-demand.
                   1111: .RI "" "restart" ""
                   1112: immediately tries to re\-negotiate the CHILD_SA under a
                   1113: fresh IKE_SA.
                   1114: 
                   1115: .TP
                   1116: .BR connections.<conn>.children.<child>.ipcomp " [no]"
                   1117: Enable IPComp compression before encryption. If enabled, IKE tries to negotiate
                   1118: IPComp compression to compress ESP payload data prior to encryption.
                   1119: 
                   1120: .TP
                   1121: .BR connections.<conn>.children.<child>.inactivity " [0s]"
                   1122: Timeout before closing CHILD_SA after inactivity. If no traffic has been
                   1123: processed in either direction for the configured timeout, the CHILD_SA gets
                   1124: closed due to inactivity. The default value of
                   1125: .RI "" "0" ""
                   1126: disables inactivity checks.
                   1127: 
                   1128: .TP
                   1129: .BR connections.<conn>.children.<child>.reqid " [0]"
                   1130: Fixed reqid to use for this CHILD_SA. This might be helpful in some scenarios,
                   1131: but works only if each CHILD_SA configuration is instantiated not more than
                   1132: once. The default of
                   1133: .RI "" "0" ""
                   1134: uses dynamic reqids, allocated incrementally.
                   1135: 
                   1136: .TP
                   1137: .BR connections.<conn>.children.<child>.priority " [0]"
                   1138: Optional fixed priority for IPsec policies. This could be useful to install
                   1139: high\-priority drop policies.  The default of
                   1140: .RI "" "0" ""
                   1141: uses dynamically calculated
                   1142: priorities based on the size of the traffic selectors.
                   1143: 
                   1144: .TP
                   1145: .BR connections.<conn>.children.<child>.interface " []"
                   1146: Optional interface name to restrict IPsec policies.
                   1147: 
                   1148: .TP
                   1149: .BR connections.<conn>.children.<child>.mark_in " [0/0x00000000]"
                   1150: Netfilter mark and mask for input traffic. On Linux, Netfilter may require marks
                   1151: on each packet to match an SA/policy having that option set. This allows
                   1152: installing duplicate policies and enables Netfilter rules to select specific
                   1153: SAs/policies for incoming traffic.  Note that inbound marks are only set on
                   1154: policies, by default, unless *mark_in_sa* is enabled. The special value
                   1155: .RI "" "%unique" ""
                   1156: sets a unique mark on each CHILD_SA instance, beyond that the value
                   1157: .RI "" "%unique\-dir" ""
                   1158: assigns a different unique mark for each CHILD_SA direction
                   1159: (in/out).
                   1160: 
                   1161: An additional mask may be appended to the mark, separated by
                   1162: .RI "" "/" "."
                   1163: The default
                   1164: mask if omitted is 0xffffffff.
                   1165: 
                   1166: .TP
                   1167: .BR connections.<conn>.children.<child>.mark_in_sa " [no]"
                   1168: Whether to set *mark_in* on the inbound SA. By default, the inbound mark is only
                   1169: set on the inbound policy. The tuple destination address, protocol and SPI is
                   1170: unique and the mark is not required to find the correct SA, allowing to mark
                   1171: traffic after decryption instead (where more specific selectors may be used) to
                   1172: match different policies. Marking packets before decryption is still possible,
                   1173: even if no mark is set on the SA.
                   1174: 
                   1175: .TP
                   1176: .BR connections.<conn>.children.<child>.mark_out " [0/0x00000000]"
                   1177: Netfilter mark and mask for output traffic. On Linux, Netfilter may require
                   1178: marks on each packet to match a policy/SA having that option set. This allows
                   1179: installing duplicate policies and enables Netfilter rules to select specific
                   1180: policies/SAs for outgoing traffic. The special value
                   1181: .RI "" "%unique" ""
                   1182: sets a unique
                   1183: mark on each CHILD_SA instance, beyond that the value
                   1184: .RI "" "%unique\-dir" ""
                   1185: assigns a
                   1186: different unique mark for each CHILD_SA direction (in/out).
                   1187: 
                   1188: An additional mask may be appended to the mark, separated by
                   1189: .RI "" "/" "."
                   1190: The default
                   1191: mask if omitted is 0xffffffff.
                   1192: 
                   1193: .TP
                   1194: .BR connections.<conn>.children.<child>.set_mark_in " [0/0x00000000]"
                   1195: Netfilter mark applied to packets after the inbound IPsec SA processed them.
                   1196: This way it's not necessary to mark packets via Netfilter before decryption or
                   1197: right afterwards to match policies or process them differently (e.g. via policy
                   1198: routing).
                   1199: 
                   1200: An additional mask may be appended to the mark, separated by
                   1201: .RI "" "/" "."
                   1202: The default
                   1203: mask if omitted is 0xffffffff. The special value
                   1204: .RI "" "%same" ""
                   1205: uses the value (but not
                   1206: the mask) from
                   1207: .RB "" "mark_in" ""
                   1208: as mark value, which can be fixed,
                   1209: .RI "" "%unique" ""
                   1210: or
                   1211: .RI "" "%unique\-dir" "."
                   1212: 
                   1213: 
                   1214: Setting marks in XFRM input requires Linux 4.19 or higher.
                   1215: 
                   1216: .TP
                   1217: .BR connections.<conn>.children.<child>.set_mark_out " [0/0x00000000]"
                   1218: Netfilter mark applied to packets after the outbound IPsec SA processed them.
                   1219: This allows processing ESP packets differently than the original traffic (e.g.
                   1220: via policy routing).
                   1221: 
                   1222: An additional mask may be appended to the mark, separated by
                   1223: .RI "" "/" "."
                   1224: The default
                   1225: mask if omitted is 0xffffffff. The special value
                   1226: .RI "" "%same" ""
                   1227: uses the value (but not
                   1228: the mask) from
                   1229: .RB "" "mark_out" ""
                   1230: as mark value, which can be fixed,
                   1231: .RI "" "%unique" ""
                   1232: or
                   1233: .RI "" "%unique\-dir" "."
                   1234: 
                   1235: 
                   1236: Setting marks in XFRM output is supported since Linux 4.14. Setting a mask
                   1237: requires at least Linux 4.19.
                   1238: 
                   1239: .TP
                   1240: .BR connections.<conn>.children.<child>.if_id_in " [0]"
                   1241: XFRM interface ID set on inbound policies/SA. This allows installing duplicate
                   1242: policies/SAs and associates them with an interface with the same ID. The special
                   1243: value
                   1244: .RI "" "%unique" ""
                   1245: sets a unique interface ID on each CHILD_SA instance, beyond
                   1246: that the value
                   1247: .RI "" "%unique\-dir" ""
                   1248: assigns a different unique interface ID for each
                   1249: CHILD_SA direction (in/out).
                   1250: 
                   1251: .TP
                   1252: .BR connections.<conn>.children.<child>.if_id_out " [0]"
                   1253: XFRM interface ID set on outbound policies/SA. This allows installing duplicate
                   1254: policies/SAs and associates them with an interface with the same ID. The special
                   1255: value
                   1256: .RI "" "%unique" ""
                   1257: sets a unique interface ID on each CHILD_SA instance, beyond
                   1258: that the value
                   1259: .RI "" "%unique\-dir" ""
                   1260: assigns a different unique interface ID for each
                   1261: CHILD_SA direction (in/out).
                   1262: 
                   1263: The daemon will not install routes for CHILD_SAs that have this option set.
                   1264: 
                   1265: .TP
                   1266: .BR connections.<conn>.children.<child>.tfc_padding " [0]"
                   1267: Pads ESP packets with additional data to have a consistent ESP packet size for
                   1268: improved Traffic Flow Confidentiality. The padding defines the minimum size of
                   1269: all ESP packets sent.
                   1270: 
                   1271: The default value of 0 disables TFC padding, the special value
                   1272: .RI "" "mtu" ""
                   1273: adds TFC
                   1274: padding to create a packet size equal to the Path Maximum Transfer Unit.
                   1275: 
                   1276: .TP
                   1277: .BR connections.<conn>.children.<child>.replay_window " [32]"
                   1278: IPsec replay window to configure for this CHILD_SA. Larger values than the
                   1279: default of 32 are supported using the Netlink backend only, a value of 0
                   1280: disables IPsec replay protection.
                   1281: 
                   1282: .TP
                   1283: .BR connections.<conn>.children.<child>.hw_offload " [no]"
                   1284: Enable hardware offload for this CHILD_SA, if supported by the IPsec
                   1285: implementation. The value
                   1286: .RI "" "yes" ""
                   1287: enforces offloading and the installation will
                   1288: fail if it's not supported by either kernel or device.       The value
                   1289: .RI "" "auto" ""
                   1290: enables offloading, if it's supported, but the installation does not fail
                   1291: otherwise.
                   1292: 
                   1293: .TP
                   1294: .BR connections.<conn>.children.<child>.copy_df " [yes]"
                   1295: Whether to copy the DF bit to the outer IPv4 header in tunnel mode. This
                   1296: effectively disables Path MTU discovery (PMTUD).  Controlling this behavior is
                   1297: not supported by all kernel interfaces.
                   1298: 
                   1299: .TP
                   1300: .BR connections.<conn>.children.<child>.copy_ecn " [yes]"
                   1301: Whether to copy the ECN (Explicit Congestion Notification) header field to/from
                   1302: the outer IP header in tunnel mode. Controlling this behavior is not supported
                   1303: by all kernel interfaces.
                   1304: 
                   1305: .TP
                   1306: .BR connections.<conn>.children.<child>.copy_dscp " [out]"
                   1307: Whether to copy the DSCP (Differentiated Services Field Codepoint) header field
                   1308: to/from the outer IP header in tunnel mode. The value
                   1309: .RI "" "out" ""
                   1310: only copies the
                   1311: field from the inner to the outer header, the value
                   1312: .RI "" "in" ""
                   1313: does the opposite and
                   1314: only copies the field from the outer to the inner header when decapsulating, the
                   1315: value
                   1316: .RI "" "yes" ""
                   1317: copies the field in both directions, and the value
                   1318: .RI "" "no" ""
                   1319: disables
                   1320: copying the field altogether.  Setting this to
                   1321: .RI "" "yes" ""
                   1322: or
                   1323: .RI "" "in" ""
                   1324: could allow an
                   1325: attacker to adversely affect other traffic at the receiver, which is why the
                   1326: default is
                   1327: .RI "" "out" "."
                   1328: Controlling this behavior is not supported by all kernel
                   1329: interfaces.
                   1330: 
                   1331: .TP
                   1332: .BR connections.<conn>.children.<child>.start_action " [none]"
                   1333: Action to perform after loading the configuration. The default of
                   1334: .RI "" "none" ""
                   1335: loads
                   1336: the connection only, which then can be manually initiated or used as a responder
                   1337: configuration.
                   1338: 
                   1339: The value
                   1340: .RI "" "trap" ""
                   1341: installs a trap policy, which triggers the tunnel as soon as
                   1342: matching traffic has been detected. The value
                   1343: .RI "" "start" ""
                   1344: initiates the connection
                   1345: actively.
                   1346: 
                   1347: When unloading or replacing a CHILD_SA configuration having a
                   1348: .RB "" "start_action" ""
                   1349: different from
                   1350: .RI "" "none" ","
                   1351: the inverse action is performed. Configurations with
                   1352: .RI "" "start" ""
                   1353: get closed, while such with
                   1354: .RI "" "trap" ""
                   1355: get uninstalled.
                   1356: 
                   1357: .TP
                   1358: .BR connections.<conn>.children.<child>.close_action " [none]"
                   1359: Action to perform after a CHILD_SA gets closed by the peer. The default of
                   1360: .RI "" "none" ""
                   1361: does not take any action,
                   1362: .RI "" "trap" ""
                   1363: installs a trap policy for the CHILD_SA.
                   1364: .RI "" "start" ""
                   1365: tries to re\-create the CHILD_SA.
                   1366: 
                   1367: .RB "" "close_action" ""
                   1368: does not provide any guarantee that the CHILD_SA is kept alive.
                   1369: It acts on explicit close messages only, but not on negotiation failures. Use
                   1370: trap policies to reliably re\-create failed CHILD_SAs.
                   1371: 
                   1372: .TP
                   1373: .B secrets
                   1374: .br
                   1375: Section defining secrets for IKE/EAP/XAuth authentication and private key
                   1376: decryption. The
                   1377: .RB "" "secrets" ""
                   1378: section takes sub\-sections having a specific prefix
                   1379: which defines the secret type.
                   1380: 
                   1381: It is not recommended to define any private key decryption passphrases, as then
                   1382: there is no real security benefit in having encrypted keys. Either store the key
                   1383: unencrypted or enter the keys manually when loading credentials.
                   1384: 
                   1385: .TP
                   1386: .B secrets.eap<suffix>
                   1387: .br
                   1388: EAP secret section for a specific secret. Each EAP secret is defined in a unique
                   1389: section having the
                   1390: .RI "" "eap" ""
                   1391: prefix. EAP secrets are used for XAuth authentication
                   1392: as well.
                   1393: 
                   1394: .TP
                   1395: .BR secrets.eap<suffix>.secret " []"
                   1396: Value of the EAP/XAuth secret. It may either be an ASCII string, a hex encoded
                   1397: string if it has a
                   1398: .RI "" "0x" ""
                   1399: prefix or a Base64 encoded string if it has a
                   1400: .RI "" "0s" ""
                   1401: prefix in its value.
                   1402: 
                   1403: .TP
                   1404: .BR secrets.eap<suffix>.id<suffix> " []"
                   1405: Identity the EAP/XAuth secret belongs to. Multiple unique identities may be
                   1406: specified, each having an
                   1407: .RI "" "id" ""
                   1408: prefix, if a secret is shared between multiple
                   1409: users.
                   1410: 
                   1411: .TP
                   1412: .B secrets.xauth<suffix>
                   1413: .br
                   1414: XAuth secret section for a specific secret.
                   1415: .RB "" "xauth" ""
                   1416: is just an alias for
                   1417: .RB "" "eap" ","
                   1418: secrets under both section prefixes are used for both EAP and XAuth
                   1419: authentication.
                   1420: 
                   1421: .TP
                   1422: .B secrets.ntlm<suffix>
                   1423: .br
                   1424: NTLM secret section for a specific secret. Each NTLM secret is defined in a
                   1425: unique section having the
                   1426: .RI "" "ntlm" ""
                   1427: prefix. NTLM secrets may only be used for
                   1428: EAP\-MSCHAPv2 authentication.
                   1429: 
                   1430: .TP
                   1431: .BR secrets.ntlm<suffix>.secret " []"
                   1432: Value of the NTLM secret, which is the NT Hash of the actual secret, that is,
                   1433: MD4(UTF\-16LE(secret)). The resulting 16\-byte value may either be given as a hex
                   1434: encoded string with a
                   1435: .RI "" "0x" ""
                   1436: prefix or as a Base64 encoded string with a
                   1437: .RI "" "0s" ""
                   1438: prefix.
                   1439: 
                   1440: .TP
                   1441: .BR secrets.ntlm<suffix>.id<suffix> " []"
                   1442: Identity the NTLM secret belongs to. Multiple unique identities may be
                   1443: specified, each having an
                   1444: .RI "" "id" ""
                   1445: prefix, if a secret is shared between multiple
                   1446: users.
                   1447: 
                   1448: .TP
                   1449: .B secrets.ike<suffix>
                   1450: .br
                   1451: IKE preshared secret section for a specific secret. Each IKE PSK is defined in a
                   1452: unique section having the
                   1453: .RI "" "ike" ""
                   1454: prefix.
                   1455: 
                   1456: .TP
                   1457: .BR secrets.ike<suffix>.secret " []"
                   1458: Value of the IKE preshared secret. It may either be an ASCII string, a hex
                   1459: encoded string if it has a
                   1460: .RI "" "0x" ""
                   1461: prefix or a Base64 encoded string if it has a
                   1462: .RI "" "0s" ""
                   1463: prefix in its value.
                   1464: 
                   1465: .TP
                   1466: .BR secrets.ike<suffix>.id<suffix> " []"
                   1467: IKE identity the IKE preshared secret belongs to. Multiple unique identities may
                   1468: be specified, each having an
                   1469: .RI "" "id" ""
                   1470: prefix, if a secret is shared between multiple
                   1471: peers.
                   1472: 
                   1473: .TP
                   1474: .B secrets.ppk<suffix>
                   1475: .br
                   1476: Postquantum Preshared Key (PPK) section for a specific secret. Each PPK is
                   1477: defined      in a unique section having the
                   1478: .RI "" "ppk" ""
                   1479: prefix.
                   1480: 
                   1481: .TP
                   1482: .BR secrets.ppk<suffix>.secret " []"
                   1483: Value of the PPK. It may either be an ASCII string,     a hex encoded string if
                   1484: it has a
                   1485: .RI "" "0x" ""
                   1486: prefix or a Base64 encoded string if it has a
                   1487: .RI "" "0s" ""
                   1488: prefix in its
                   1489: value. Should have at least 256 bits of entropy for 128\-bit security.
                   1490: 
                   1491: .TP
                   1492: .BR secrets.ppk<suffix>.id<suffix> " []"
                   1493: PPK identity the PPK belongs to. Multiple unique identities may be specified,
                   1494: each having an
                   1495: .RI "" "id" ""
                   1496: prefix, if a secret is shared between multiple peers.
                   1497: 
                   1498: .TP
                   1499: .B secrets.private<suffix>
                   1500: .br
                   1501: Private key decryption passphrase for a key in the
                   1502: .RI "" "private" ""
                   1503: folder.
                   1504: 
                   1505: .TP
                   1506: .BR secrets.private<suffix>.file " []"
                   1507: File name in the
                   1508: .RI "" "private" ""
                   1509: folder for which this passphrase should be used.
                   1510: 
                   1511: .TP
                   1512: .BR secrets.private<suffix>.secret " []"
                   1513: Value of decryption passphrase for private key.
                   1514: 
                   1515: .TP
                   1516: .B secrets.rsa<suffix>
                   1517: .br
                   1518: Private key decryption passphrase for a key in the
                   1519: .RI "" "rsa" ""
                   1520: folder.
                   1521: 
                   1522: .TP
                   1523: .BR secrets.rsa<suffix>.file " []"
                   1524: File name in the
                   1525: .RI "" "rsa" ""
                   1526: folder for which this passphrase should be used.
                   1527: 
                   1528: .TP
                   1529: .BR secrets.rsa<suffix>.secret " []"
                   1530: Value of decryption passphrase for RSA key.
                   1531: 
                   1532: .TP
                   1533: .B secrets.ecdsa<suffix>
                   1534: .br
                   1535: Private key decryption passphrase for a key in the
                   1536: .RI "" "ecdsa" ""
                   1537: folder.
                   1538: 
                   1539: .TP
                   1540: .BR secrets.ecdsa<suffix>.file " []"
                   1541: File name in the
                   1542: .RI "" "ecdsa" ""
                   1543: folder for which this passphrase should be used.
                   1544: 
                   1545: .TP
                   1546: .BR secrets.ecdsa<suffix>.secret " []"
                   1547: Value of decryption passphrase for ECDSA key.
                   1548: 
                   1549: .TP
                   1550: .B secrets.pkcs8<suffix>
                   1551: .br
                   1552: Private key decryption passphrase for a key in the
                   1553: .RI "" "pkcs8" ""
                   1554: folder.
                   1555: 
                   1556: .TP
                   1557: .BR secrets.pkcs8<suffix>.file " []"
                   1558: File name in the
                   1559: .RI "" "pkcs8" ""
                   1560: folder for which this passphrase should be used.
                   1561: 
                   1562: .TP
                   1563: .BR secrets.pkcs8<suffix>.secret " []"
                   1564: Value of decryption passphrase for PKCS#8 key.
                   1565: 
                   1566: .TP
                   1567: .B secrets.pkcs12<suffix>
                   1568: .br
                   1569: PKCS#12 decryption passphrase for a container in the
                   1570: .RI "" "pkcs12" ""
                   1571: folder.
                   1572: 
                   1573: .TP
                   1574: .BR secrets.pkcs12<suffix>.file " []"
                   1575: File name in the
                   1576: .RI "" "pkcs12" ""
                   1577: folder for which this passphrase should be used.
                   1578: 
                   1579: .TP
                   1580: .BR secrets.pkcs12<suffix>.secret " []"
                   1581: Value of decryption passphrase for PKCS#12 container.
                   1582: 
                   1583: .TP
                   1584: .B secrets.token<suffix>
                   1585: .br
                   1586: Definition for a private key that's stored on a token/smartcard.
                   1587: 
                   1588: .TP
                   1589: .BR secrets.token<suffix>.handle " []"
                   1590: Hex\-encoded CKA_ID of the private key on the token.
                   1591: 
                   1592: .TP
                   1593: .BR secrets.token<suffix>.slot " []"
                   1594: Optional slot number to access the token.
                   1595: 
                   1596: .TP
                   1597: .BR secrets.token<suffix>.module " []"
                   1598: Optional PKCS#11 module name to access the token.
                   1599: 
                   1600: .TP
                   1601: .BR secrets.token<suffix>.pin " []"
                   1602: Optional PIN required to access the key on the token. If none is provided the
                   1603: user is prompted during an interactive \-\-load\-creds call.
                   1604: 
                   1605: .TP
                   1606: .B pools
                   1607: .br
                   1608: Section defining named pools. Named pools may be referenced by connections with
                   1609: the
                   1610: .RB "" "pools" ""
                   1611: option to assign virtual IPs and other configuration attributes.
                   1612: 
                   1613: .TP
                   1614: .B pools.<name>
                   1615: .br
                   1616: Section defining a single pool with a unique name.
                   1617: 
                   1618: .TP
                   1619: .BR pools.<name>.addrs " []"
                   1620: Subnet or range defining addresses allocated in pool. Accepts a single CIDR
                   1621: subnet defining the pool to allocate addresses from or an address range
                   1622: (<from>\-<to>).  Pools must be unique and non\-overlapping.
                   1623: 
                   1624: .TP
                   1625: .BR pools.<name>.<attr> " []"
                   1626: Comma separated list of additional attributes of type
                   1627: .RB "" "<attr>" "."
                   1628: The attribute
                   1629: type may be one of
                   1630: .RI "" "dns" ","
                   1631: .RI "" "nbns" ","
                   1632: .RI "" "dhcp" ","
                   1633: .RI "" "netmask" ","
                   1634: .RI "" "server" ","
                   1635: .RI "" "subnet" ","
                   1636: .RI "" "split_include" ""
                   1637: and
                   1638: .RI "" "split_exclude" ""
                   1639: to define addresses or CIDR subnets for the
                   1640: corresponding attribute types. Alternatively,
                   1641: .RB "" "<attr>" ""
                   1642: can be a numerical
                   1643: identifier, for which string attribute values are accepted as well.
                   1644: 
                   1645: .TP
                   1646: .B authorities
                   1647: .br
                   1648: Section defining attributes of certification authorities.
                   1649: 
                   1650: .TP
                   1651: .B authorities.<name>
                   1652: .br
                   1653: Section defining a certification authority with a unique name.
                   1654: 
                   1655: .TP
                   1656: .BR authorities.<name>.cacert " []"
                   1657: CA certificate belonging to the certification authority. The certificates may
                   1658: use a relative path from the
                   1659: .RB "" "swanctl" ""
                   1660: .RI "" "x509ca" ""
                   1661: directory or an absolute path.
                   1662: 
                   1663: Configure one of
                   1664: .RI "" "cacert" ","
                   1665: .RI "" "file" ","
                   1666: or
                   1667: .RI "" "handle" ""
                   1668: per section.
                   1669: 
                   1670: .TP
                   1671: .BR authorities.<name>.file " []"
                   1672: Absolute path to the certificate to load. Passed as\-is to the daemon, so it must
                   1673: be readable by it.
                   1674: 
                   1675: Configure one of
                   1676: .RI "" "cacert" ","
                   1677: .RI "" "file" ","
                   1678: or
                   1679: .RI "" "handle" ""
                   1680: per section.
                   1681: 
                   1682: .TP
                   1683: .BR authorities.<name>.handle " []"
                   1684: Hex\-encoded CKA_ID of the CA certificate on a token.
                   1685: 
                   1686: Configure one of
                   1687: .RI "" "cacert" ","
                   1688: .RI "" "file" ","
                   1689: or
                   1690: .RI "" "handle" ""
                   1691: per section.
                   1692: 
                   1693: .TP
                   1694: .BR authorities.<name>.slot " []"
                   1695: Optional slot number of the token that stores the CA certificate.
                   1696: 
                   1697: .TP
                   1698: .BR authorities.<name>.module " []"
                   1699: Optional PKCS#11 module name.
                   1700: 
                   1701: .TP
                   1702: .BR authorities.<name>.crl_uris " []"
                   1703: Comma\-separated list of CRL distribution points (ldap, http, or file URI).
                   1704: 
                   1705: .TP
                   1706: .BR authorities.<name>.ocsp_uris " []"
                   1707: Comma\-separated list of OCSP URIs.
                   1708: 
                   1709: .TP
                   1710: .BR authorities.<name>.cert_uri_base " []"
                   1711: Defines the base URI for the Hash and URL feature supported by IKEv2. Instead of
                   1712: exchanging complete certificates, IKEv2 allows one to send an URI that resolves
                   1713: to the DER encoded certificate. The certificate URIs are built by appending the
                   1714: SHA1 hash of the DER encoded certificates to this base URI.
                   1715: 

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>