Annotation of embedaddon/strongswan/src/swanctl/swanctl.conf, revision 1.1

1.1     ! misho       1: # Section defining IKE connection configurations.
        !             2: # connections {
        !             3: 
        !             4:     # Section for an IKE connection named <conn>.
        !             5:     # <conn> {
        !             6: 
        !             7:         # IKE major version to use for connection.
        !             8:         # version = 0
        !             9: 
        !            10:         # Local address(es) to use for IKE communication, comma separated.
        !            11:         # local_addrs = %any
        !            12: 
        !            13:         # Remote address(es) to use for IKE communication, comma separated.
        !            14:         # remote_addrs = %any
        !            15: 
        !            16:         # Local UDP port for IKE communication.
        !            17:         # local_port = 500
        !            18: 
        !            19:         # Remote UDP port for IKE communication.
        !            20:         # remote_port = 500
        !            21: 
        !            22:         # Comma separated proposals to accept for IKE.
        !            23:         # proposals = default
        !            24: 
        !            25:         # Virtual IPs to request in configuration payload / Mode Config.
        !            26:         # vips =
        !            27: 
        !            28:         # Use Aggressive Mode in IKEv1.
        !            29:         # aggressive = no
        !            30: 
        !            31:         # Set the Mode Config mode to use.
        !            32:         # pull = yes
        !            33: 
        !            34:         # Differentiated Services Field Codepoint to set on outgoing IKE packets
        !            35:         # (six binary digits).
        !            36:         # dscp = 000000
        !            37: 
        !            38:         # Enforce UDP encapsulation by faking NAT-D payloads.
        !            39:         # encap = no
        !            40: 
        !            41:         # Enables MOBIKE on IKEv2 connections.
        !            42:         # mobike = yes
        !            43: 
        !            44:         # Interval of liveness checks (DPD).
        !            45:         # dpd_delay = 0s
        !            46: 
        !            47:         # Timeout for DPD checks (IKEV1 only).
        !            48:         # dpd_timeout = 0s
        !            49: 
        !            50:         # Use IKE UDP datagram fragmentation (yes, accept, no or force).
        !            51:         # fragmentation = yes
        !            52: 
        !            53:         # Use childless IKE_SA initiation (allow, force or never).
        !            54:         # childless = allow
        !            55: 
        !            56:         # Send certificate requests payloads (yes or no).
        !            57:         # send_certreq = yes
        !            58: 
        !            59:         # Send certificate payloads (always, never or ifasked).
        !            60:         # send_cert = ifasked
        !            61: 
        !            62:         # String identifying the Postquantum Preshared Key (PPK) to be used.
        !            63:         # ppk_id =
        !            64: 
        !            65:         # Whether a Postquantum Preshared Key (PPK) is required for this
        !            66:         # connection.
        !            67:         # ppk_required = no
        !            68: 
        !            69:         # Number of retransmission sequences to perform during initial connect.
        !            70:         # keyingtries = 1
        !            71: 
        !            72:         # Connection uniqueness policy (never, no, keep or replace).
        !            73:         # unique = no
        !            74: 
        !            75:         # Time to schedule IKE reauthentication.
        !            76:         # reauth_time = 0s
        !            77: 
        !            78:         # Time to schedule IKE rekeying.
        !            79:         # rekey_time = 4h
        !            80: 
        !            81:         # Hard IKE_SA lifetime if rekey/reauth does not complete, as time.
        !            82:         # over_time = 10% of rekey_time/reauth_time
        !            83: 
        !            84:         # Range of random time to subtract from rekey/reauth times.
        !            85:         # rand_time = over_time
        !            86: 
        !            87:         # Comma separated list of named IP pools.
        !            88:         # pools =
        !            89: 
        !            90:         # Default inbound XFRM interface ID for children.
        !            91:         # if_id_in = 0
        !            92: 
        !            93:         # Default outbound XFRM interface ID for children.
        !            94:         # if_id_out = 0
        !            95: 
        !            96:         # Whether this connection is a mediation connection.
        !            97:         # mediation = no
        !            98: 
        !            99:         # The name of the connection to mediate this connection through.
        !           100:         # mediated_by =
        !           101: 
        !           102:         # Identity under which the peer is registered at the mediation server.
        !           103:         # mediation_peer =
        !           104: 
        !           105:         # Section for a local authentication round.
        !           106:         # local<suffix> {
        !           107: 
        !           108:             # Optional numeric identifier by which authentication rounds are
        !           109:             # sorted.  If not specified rounds are ordered by their position in
        !           110:             # the config file/VICI message.
        !           111:             # round = 0
        !           112: 
        !           113:             # Comma separated list of certificate candidates to use for
        !           114:             # authentication.
        !           115:             # certs =
        !           116: 
        !           117:             # Section for a certificate candidate to use for authentication.
        !           118:             # cert<suffix> =
        !           119: 
        !           120:             # Comma separated list of raw public key candidates to use for
        !           121:             # authentication.
        !           122:             # pubkeys =
        !           123: 
        !           124:             # Authentication to perform locally (pubkey, psk, xauth[-backend] or
        !           125:             # eap[-method]).
        !           126:             # auth = pubkey
        !           127: 
        !           128:             # IKE identity to use for authentication round.
        !           129:             # id =
        !           130: 
        !           131:             # Client EAP-Identity to use in EAP-Identity exchange and the EAP
        !           132:             # method.
        !           133:             # eap_id = id
        !           134: 
        !           135:             # Server side EAP-Identity to expect in the EAP method.
        !           136:             # aaa_id = remote-id
        !           137: 
        !           138:             # Client XAuth username used in the XAuth exchange.
        !           139:             # xauth_id = id
        !           140: 
        !           141:             # cert<suffix> {
        !           142: 
        !           143:                 # Absolute path to the certificate to load.
        !           144:                 # file =
        !           145: 
        !           146:                 # Hex-encoded CKA_ID of the certificate on a token.
        !           147:                 # handle =
        !           148: 
        !           149:                 # Optional slot number of the token that stores the certificate.
        !           150:                 # slot =
        !           151: 
        !           152:                 # Optional PKCS#11 module name.
        !           153:                 # module =
        !           154: 
        !           155:             # }
        !           156: 
        !           157:         # }
        !           158: 
        !           159:         # Section for a remote authentication round.
        !           160:         # remote<suffix> {
        !           161: 
        !           162:             # Optional numeric identifier by which authentication rounds are
        !           163:             # sorted.  If not specified rounds are ordered by their position in
        !           164:             # the config file/VICI message.
        !           165:             # round = 0
        !           166: 
        !           167:             # IKE identity to expect for authentication round.
        !           168:             # id = %any
        !           169: 
        !           170:             # Identity to use as peer identity during EAP authentication.
        !           171:             # eap_id = id
        !           172: 
        !           173:             # Authorization group memberships to require.
        !           174:             # groups =
        !           175: 
        !           176:             # Certificate policy OIDs the peer's certificate must have.
        !           177:             # cert_policy =
        !           178: 
        !           179:             # Comma separated list of certificate to accept for authentication.
        !           180:             # certs =
        !           181: 
        !           182:             # Section for a certificate to accept for authentication.
        !           183:             # cert<suffix> =
        !           184: 
        !           185:             # Comma separated list of CA certificates to accept for
        !           186:             # authentication.
        !           187:             # cacerts =
        !           188: 
        !           189:             # Section for a CA certificate to accept for authentication.
        !           190:             # cacert<suffix> =
        !           191: 
        !           192:             # Identity in CA certificate to accept for authentication.
        !           193:             # ca_id =
        !           194: 
        !           195:             # Comma separated list of raw public keys to accept for
        !           196:             # authentication.
        !           197:             # pubkeys =
        !           198: 
        !           199:             # Certificate revocation policy, (strict, ifuri or relaxed).
        !           200:             # revocation = relaxed
        !           201: 
        !           202:             # Authentication to expect from remote (pubkey, psk, xauth[-backend]
        !           203:             # or eap[-method]).
        !           204:             # auth = pubkey
        !           205: 
        !           206:             # cert<suffix> {
        !           207: 
        !           208:                 # Absolute path to the certificate to load.
        !           209:                 # file =
        !           210: 
        !           211:                 # Hex-encoded CKA_ID of the certificate on a token.
        !           212:                 # handle =
        !           213: 
        !           214:                 # Optional slot number of the token that stores the certificate.
        !           215:                 # slot =
        !           216: 
        !           217:                 # Optional PKCS#11 module name.
        !           218:                 # module =
        !           219: 
        !           220:             # }
        !           221: 
        !           222:             # cacert<suffix> {
        !           223: 
        !           224:                 # Absolute path to the certificate to load.
        !           225:                 # file =
        !           226: 
        !           227:                 # Hex-encoded CKA_ID of the CA certificate on a token.
        !           228:                 # handle =
        !           229: 
        !           230:                 # Optional slot number of the token that stores the CA
        !           231:                 # certificate.
        !           232:                 # slot =
        !           233: 
        !           234:                 # Optional PKCS#11 module name.
        !           235:                 # module =
        !           236: 
        !           237:             # }
        !           238: 
        !           239:         # }
        !           240: 
        !           241:         # children {
        !           242: 
        !           243:             # CHILD_SA configuration sub-section.
        !           244:             # <child> {
        !           245: 
        !           246:                 # AH proposals to offer for the CHILD_SA.
        !           247:                 # ah_proposals =
        !           248: 
        !           249:                 # ESP proposals to offer for the CHILD_SA.
        !           250:                 # esp_proposals = default
        !           251: 
        !           252:                 # Use incorrect 96-bit truncation for HMAC-SHA-256.
        !           253:                 # sha256_96 = no
        !           254: 
        !           255:                 # Local traffic selectors to include in CHILD_SA.
        !           256:                 # local_ts = dynamic
        !           257: 
        !           258:                 # Remote selectors to include in CHILD_SA.
        !           259:                 # remote_ts = dynamic
        !           260: 
        !           261:                 # Time to schedule CHILD_SA rekeying.
        !           262:                 # rekey_time = 1h
        !           263: 
        !           264:                 # Maximum lifetime before CHILD_SA gets closed, as time.
        !           265:                 # life_time = rekey_time + 10%
        !           266: 
        !           267:                 # Range of random time to subtract from rekey_time.
        !           268:                 # rand_time = life_time - rekey_time
        !           269: 
        !           270:                 # Number of bytes processed before initiating CHILD_SA rekeying.
        !           271:                 # rekey_bytes = 0
        !           272: 
        !           273:                 # Maximum bytes processed before CHILD_SA gets closed.
        !           274:                 # life_bytes = rekey_bytes + 10%
        !           275: 
        !           276:                 # Range of random bytes to subtract from rekey_bytes.
        !           277:                 # rand_bytes = life_bytes - rekey_bytes
        !           278: 
        !           279:                 # Number of packets processed before initiating CHILD_SA
        !           280:                 # rekeying.
        !           281:                 # rekey_packets = 0
        !           282: 
        !           283:                 # Maximum number of packets processed before CHILD_SA gets
        !           284:                 # closed.
        !           285:                 # life_packets = rekey_packets + 10%
        !           286: 
        !           287:                 # Range of random packets to subtract from packets_bytes.
        !           288:                 # rand_packets = life_packets - rekey_packets
        !           289: 
        !           290:                 # Updown script to invoke on CHILD_SA up and down events.
        !           291:                 # updown =
        !           292: 
        !           293:                 # Hostaccess variable to pass to updown script.
        !           294:                 # hostaccess = no
        !           295: 
        !           296:                 # IPsec Mode to establish (tunnel, transport, transport_proxy,
        !           297:                 # beet, pass or drop).
        !           298:                 # mode = tunnel
        !           299: 
        !           300:                 # Whether to install IPsec policies or not.
        !           301:                 # policies = yes
        !           302: 
        !           303:                 # Whether to install outbound FWD IPsec policies or not.
        !           304:                 # policies_fwd_out = no
        !           305: 
        !           306:                 # Action to perform on DPD timeout (clear, trap or restart).
        !           307:                 # dpd_action = clear
        !           308: 
        !           309:                 # Enable IPComp compression before encryption.
        !           310:                 # ipcomp = no
        !           311: 
        !           312:                 # Timeout before closing CHILD_SA after inactivity.
        !           313:                 # inactivity = 0s
        !           314: 
        !           315:                 # Fixed reqid to use for this CHILD_SA.
        !           316:                 # reqid = 0
        !           317: 
        !           318:                 # Optional fixed priority for IPsec policies.
        !           319:                 # priority = 0
        !           320: 
        !           321:                 # Optional interface name to restrict IPsec policies.
        !           322:                 # interface =
        !           323: 
        !           324:                 # Netfilter mark and mask for input traffic.
        !           325:                 # mark_in = 0/0x00000000
        !           326: 
        !           327:                 # Whether to set *mark_in* on the inbound SA.
        !           328:                 # mark_in_sa = no
        !           329: 
        !           330:                 # Netfilter mark and mask for output traffic.
        !           331:                 # mark_out = 0/0x00000000
        !           332: 
        !           333:                 # Netfilter mark applied to packets after the inbound IPsec SA
        !           334:                 # processed them.
        !           335:                 # set_mark_in = 0/0x00000000
        !           336: 
        !           337:                 # Netfilter mark applied to packets after the outbound IPsec SA
        !           338:                 # processed them.
        !           339:                 # set_mark_out = 0/0x00000000
        !           340: 
        !           341:                 # Inbound XFRM interface ID.
        !           342:                 # if_id_in = 0
        !           343: 
        !           344:                 # Outbound XFRM interface ID.
        !           345:                 # if_id_out = 0
        !           346: 
        !           347:                 # Traffic Flow Confidentiality padding.
        !           348:                 # tfc_padding = 0
        !           349: 
        !           350:                 # IPsec replay window to configure for this CHILD_SA.
        !           351:                 # replay_window = 32
        !           352: 
        !           353:                 # Enable hardware offload for this CHILD_SA, if supported by the
        !           354:                 # IPsec implementation.
        !           355:                 # hw_offload = no
        !           356: 
        !           357:                 # Whether to copy the DF bit to the outer IPv4 header in tunnel
        !           358:                 # mode.
        !           359:                 # copy_df = yes
        !           360: 
        !           361:                 # Whether to copy the ECN header field to/from the outer IP
        !           362:                 # header in tunnel mode.
        !           363:                 # copy_ecn = yes
        !           364: 
        !           365:                 # Whether to copy the DSCP header field to/from the outer IP
        !           366:                 # header in tunnel mode.
        !           367:                 # copy_dscp = out
        !           368: 
        !           369:                 # Action to perform after loading the configuration (none, trap,
        !           370:                 # start).
        !           371:                 # start_action = none
        !           372: 
        !           373:                 # Action to perform after a CHILD_SA gets closed (none, trap,
        !           374:                 # start).
        !           375:                 # close_action = none
        !           376: 
        !           377:             # }
        !           378: 
        !           379:         # }
        !           380: 
        !           381:     # }
        !           382: 
        !           383: # }
        !           384: 
        !           385: # Section defining secrets for IKE/EAP/XAuth authentication and private key
        !           386: # decryption.
        !           387: # secrets {
        !           388: 
        !           389:     # EAP secret section for a specific secret.
        !           390:     # eap<suffix> {
        !           391: 
        !           392:         # Value of the EAP/XAuth secret.
        !           393:         # secret =
        !           394: 
        !           395:         # Identity the EAP/XAuth secret belongs to.
        !           396:         # id<suffix> =
        !           397: 
        !           398:     # }
        !           399: 
        !           400:     # XAuth secret section for a specific secret.
        !           401:     # xauth<suffix> {
        !           402: 
        !           403:     # }
        !           404: 
        !           405:     # NTLM secret section for a specific secret.
        !           406:     # ntlm<suffix> {
        !           407: 
        !           408:         # Value of the NTLM secret.
        !           409:         # secret =
        !           410: 
        !           411:         # Identity the NTLM secret belongs to.
        !           412:         # id<suffix> =
        !           413: 
        !           414:     # }
        !           415: 
        !           416:     # IKE preshared secret section for a specific secret.
        !           417:     # ike<suffix> {
        !           418: 
        !           419:         # Value of the IKE preshared secret.
        !           420:         # secret =
        !           421: 
        !           422:         # IKE identity the IKE preshared secret belongs to.
        !           423:         # id<suffix> =
        !           424: 
        !           425:     # }
        !           426: 
        !           427:     # Postquantum Preshared Key (PPK) section for a specific secret.
        !           428:     # ppk<suffix> {
        !           429: 
        !           430:         # Value of the PPK.
        !           431:         # secret =
        !           432: 
        !           433:         # PPK identity the PPK belongs to.
        !           434:         # id<suffix> =
        !           435: 
        !           436:     # }
        !           437: 
        !           438:     # Private key decryption passphrase for a key in the private folder.
        !           439:     # private<suffix> {
        !           440: 
        !           441:         # File name in the private folder for which this passphrase should be
        !           442:         # used.
        !           443:         # file =
        !           444: 
        !           445:         # Value of decryption passphrase for private key.
        !           446:         # secret =
        !           447: 
        !           448:     # }
        !           449: 
        !           450:     # Private key decryption passphrase for a key in the rsa folder.
        !           451:     # rsa<suffix> {
        !           452: 
        !           453:         # File name in the rsa folder for which this passphrase should be used.
        !           454:         # file =
        !           455: 
        !           456:         # Value of decryption passphrase for RSA key.
        !           457:         # secret =
        !           458: 
        !           459:     # }
        !           460: 
        !           461:     # Private key decryption passphrase for a key in the ecdsa folder.
        !           462:     # ecdsa<suffix> {
        !           463: 
        !           464:         # File name in the ecdsa folder for which this passphrase should be
        !           465:         # used.
        !           466:         # file =
        !           467: 
        !           468:         # Value of decryption passphrase for ECDSA key.
        !           469:         # secret =
        !           470: 
        !           471:     # }
        !           472: 
        !           473:     # Private key decryption passphrase for a key in the pkcs8 folder.
        !           474:     # pkcs8<suffix> {
        !           475: 
        !           476:         # File name in the pkcs8 folder for which this passphrase should be
        !           477:         # used.
        !           478:         # file =
        !           479: 
        !           480:         # Value of decryption passphrase for PKCS#8 key.
        !           481:         # secret =
        !           482: 
        !           483:     # }
        !           484: 
        !           485:     # PKCS#12 decryption passphrase for a container in the pkcs12 folder.
        !           486:     # pkcs12<suffix> {
        !           487: 
        !           488:         # File name in the pkcs12 folder for which this passphrase should be
        !           489:         # used.
        !           490:         # file =
        !           491: 
        !           492:         # Value of decryption passphrase for PKCS#12 container.
        !           493:         # secret =
        !           494: 
        !           495:     # }
        !           496: 
        !           497:     # Definition for a private key that's stored on a token/smartcard.
        !           498:     # token<suffix> {
        !           499: 
        !           500:         # Hex-encoded CKA_ID of the private key on the token.
        !           501:         # handle =
        !           502: 
        !           503:         # Optional slot number to access the token.
        !           504:         # slot =
        !           505: 
        !           506:         # Optional PKCS#11 module name to access the token.
        !           507:         # module =
        !           508: 
        !           509:         # Optional PIN required to access the key on the token. If none is
        !           510:         # provided the user is prompted during an interactive --load-creds call.
        !           511:         # pin =
        !           512: 
        !           513:     # }
        !           514: 
        !           515: # }
        !           516: 
        !           517: # Section defining named pools.
        !           518: # pools {
        !           519: 
        !           520:     # Section defining a single pool with a unique name.
        !           521:     # <name> {
        !           522: 
        !           523:         # Addresses allocated in pool.
        !           524:         # addrs =
        !           525: 
        !           526:         # Comma separated list of additional attributes from type <attr>.
        !           527:         # <attr> =
        !           528: 
        !           529:     # }
        !           530: 
        !           531: # }
        !           532: 
        !           533: # Section defining attributes of certification authorities.
        !           534: # authorities {
        !           535: 
        !           536:     # Section defining a certification authority with a unique name.
        !           537:     # <name> {
        !           538: 
        !           539:         # CA certificate belonging to the certification authority.
        !           540:         # cacert =
        !           541: 
        !           542:         # Absolute path to the certificate to load.
        !           543:         # file =
        !           544: 
        !           545:         # Hex-encoded CKA_ID of the CA certificate on a token.
        !           546:         # handle =
        !           547: 
        !           548:         # Optional slot number of the token that stores the CA certificate.
        !           549:         # slot =
        !           550: 
        !           551:         # Optional PKCS#11 module name.
        !           552:         # module =
        !           553: 
        !           554:         # Comma-separated list of CRL distribution points.
        !           555:         # crl_uris =
        !           556: 
        !           557:         # Comma-separated list of OCSP URIs.
        !           558:         # ocsp_uris =
        !           559: 
        !           560:         # Defines the base URI for the Hash and URL feature supported by IKEv2.
        !           561:         # cert_uri_base =
        !           562: 
        !           563:     # }
        !           564: 
        !           565: # }
        !           566: 
        !           567: # Include config snippets
        !           568: include conf.d/*.conf
        !           569: 

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>