Annotation of embedaddon/strongswan/src/swanctl/swanctl.conf, revision 1.1.1.1

1.1       misho       1: # Section defining IKE connection configurations.
                      2: # connections {
                      3: 
                      4:     # Section for an IKE connection named <conn>.
                      5:     # <conn> {
                      6: 
                      7:         # IKE major version to use for connection.
                      8:         # version = 0
                      9: 
                     10:         # Local address(es) to use for IKE communication, comma separated.
                     11:         # local_addrs = %any
                     12: 
                     13:         # Remote address(es) to use for IKE communication, comma separated.
                     14:         # remote_addrs = %any
                     15: 
                     16:         # Local UDP port for IKE communication.
                     17:         # local_port = 500
                     18: 
                     19:         # Remote UDP port for IKE communication.
                     20:         # remote_port = 500
                     21: 
                     22:         # Comma separated proposals to accept for IKE.
                     23:         # proposals = default
                     24: 
                     25:         # Virtual IPs to request in configuration payload / Mode Config.
                     26:         # vips =
                     27: 
                     28:         # Use Aggressive Mode in IKEv1.
                     29:         # aggressive = no
                     30: 
                     31:         # Set the Mode Config mode to use.
                     32:         # pull = yes
                     33: 
                     34:         # Differentiated Services Field Codepoint to set on outgoing IKE packets
                     35:         # (six binary digits).
                     36:         # dscp = 000000
                     37: 
                     38:         # Enforce UDP encapsulation by faking NAT-D payloads.
                     39:         # encap = no
                     40: 
                     41:         # Enables MOBIKE on IKEv2 connections.
                     42:         # mobike = yes
                     43: 
                     44:         # Interval of liveness checks (DPD).
                     45:         # dpd_delay = 0s
                     46: 
                     47:         # Timeout for DPD checks (IKEV1 only).
                     48:         # dpd_timeout = 0s
                     49: 
                     50:         # Use IKE UDP datagram fragmentation (yes, accept, no or force).
                     51:         # fragmentation = yes
                     52: 
                     53:         # Use childless IKE_SA initiation (allow, force or never).
                     54:         # childless = allow
                     55: 
                     56:         # Send certificate requests payloads (yes or no).
                     57:         # send_certreq = yes
                     58: 
                     59:         # Send certificate payloads (always, never or ifasked).
                     60:         # send_cert = ifasked
                     61: 
                     62:         # String identifying the Postquantum Preshared Key (PPK) to be used.
                     63:         # ppk_id =
                     64: 
                     65:         # Whether a Postquantum Preshared Key (PPK) is required for this
                     66:         # connection.
                     67:         # ppk_required = no
                     68: 
                     69:         # Number of retransmission sequences to perform during initial connect.
                     70:         # keyingtries = 1
                     71: 
                     72:         # Connection uniqueness policy (never, no, keep or replace).
                     73:         # unique = no
                     74: 
                     75:         # Time to schedule IKE reauthentication.
                     76:         # reauth_time = 0s
                     77: 
                     78:         # Time to schedule IKE rekeying.
                     79:         # rekey_time = 4h
                     80: 
                     81:         # Hard IKE_SA lifetime if rekey/reauth does not complete, as time.
                     82:         # over_time = 10% of rekey_time/reauth_time
                     83: 
                     84:         # Range of random time to subtract from rekey/reauth times.
                     85:         # rand_time = over_time
                     86: 
                     87:         # Comma separated list of named IP pools.
                     88:         # pools =
                     89: 
                     90:         # Default inbound XFRM interface ID for children.
                     91:         # if_id_in = 0
                     92: 
                     93:         # Default outbound XFRM interface ID for children.
                     94:         # if_id_out = 0
                     95: 
                     96:         # Whether this connection is a mediation connection.
                     97:         # mediation = no
                     98: 
                     99:         # The name of the connection to mediate this connection through.
                    100:         # mediated_by =
                    101: 
                    102:         # Identity under which the peer is registered at the mediation server.
                    103:         # mediation_peer =
                    104: 
                    105:         # Section for a local authentication round.
                    106:         # local<suffix> {
                    107: 
                    108:             # Optional numeric identifier by which authentication rounds are
                    109:             # sorted.  If not specified rounds are ordered by their position in
                    110:             # the config file/VICI message.
                    111:             # round = 0
                    112: 
                    113:             # Comma separated list of certificate candidates to use for
                    114:             # authentication.
                    115:             # certs =
                    116: 
                    117:             # Section for a certificate candidate to use for authentication.
                    118:             # cert<suffix> =
                    119: 
                    120:             # Comma separated list of raw public key candidates to use for
                    121:             # authentication.
                    122:             # pubkeys =
                    123: 
                    124:             # Authentication to perform locally (pubkey, psk, xauth[-backend] or
                    125:             # eap[-method]).
                    126:             # auth = pubkey
                    127: 
                    128:             # IKE identity to use for authentication round.
                    129:             # id =
                    130: 
                    131:             # Client EAP-Identity to use in EAP-Identity exchange and the EAP
                    132:             # method.
                    133:             # eap_id = id
                    134: 
                    135:             # Server side EAP-Identity to expect in the EAP method.
                    136:             # aaa_id = remote-id
                    137: 
                    138:             # Client XAuth username used in the XAuth exchange.
                    139:             # xauth_id = id
                    140: 
                    141:             # cert<suffix> {
                    142: 
                    143:                 # Absolute path to the certificate to load.
                    144:                 # file =
                    145: 
                    146:                 # Hex-encoded CKA_ID of the certificate on a token.
                    147:                 # handle =
                    148: 
                    149:                 # Optional slot number of the token that stores the certificate.
                    150:                 # slot =
                    151: 
                    152:                 # Optional PKCS#11 module name.
                    153:                 # module =
                    154: 
                    155:             # }
                    156: 
                    157:         # }
                    158: 
                    159:         # Section for a remote authentication round.
                    160:         # remote<suffix> {
                    161: 
                    162:             # Optional numeric identifier by which authentication rounds are
                    163:             # sorted.  If not specified rounds are ordered by their position in
                    164:             # the config file/VICI message.
                    165:             # round = 0
                    166: 
                    167:             # IKE identity to expect for authentication round.
                    168:             # id = %any
                    169: 
                    170:             # Identity to use as peer identity during EAP authentication.
                    171:             # eap_id = id
                    172: 
                    173:             # Authorization group memberships to require.
                    174:             # groups =
                    175: 
                    176:             # Certificate policy OIDs the peer's certificate must have.
                    177:             # cert_policy =
                    178: 
                    179:             # Comma separated list of certificate to accept for authentication.
                    180:             # certs =
                    181: 
                    182:             # Section for a certificate to accept for authentication.
                    183:             # cert<suffix> =
                    184: 
                    185:             # Comma separated list of CA certificates to accept for
                    186:             # authentication.
                    187:             # cacerts =
                    188: 
                    189:             # Section for a CA certificate to accept for authentication.
                    190:             # cacert<suffix> =
                    191: 
                    192:             # Identity in CA certificate to accept for authentication.
                    193:             # ca_id =
                    194: 
                    195:             # Comma separated list of raw public keys to accept for
                    196:             # authentication.
                    197:             # pubkeys =
                    198: 
                    199:             # Certificate revocation policy, (strict, ifuri or relaxed).
                    200:             # revocation = relaxed
                    201: 
                    202:             # Authentication to expect from remote (pubkey, psk, xauth[-backend]
                    203:             # or eap[-method]).
                    204:             # auth = pubkey
                    205: 
                    206:             # cert<suffix> {
                    207: 
                    208:                 # Absolute path to the certificate to load.
                    209:                 # file =
                    210: 
                    211:                 # Hex-encoded CKA_ID of the certificate on a token.
                    212:                 # handle =
                    213: 
                    214:                 # Optional slot number of the token that stores the certificate.
                    215:                 # slot =
                    216: 
                    217:                 # Optional PKCS#11 module name.
                    218:                 # module =
                    219: 
                    220:             # }
                    221: 
                    222:             # cacert<suffix> {
                    223: 
                    224:                 # Absolute path to the certificate to load.
                    225:                 # file =
                    226: 
                    227:                 # Hex-encoded CKA_ID of the CA certificate on a token.
                    228:                 # handle =
                    229: 
                    230:                 # Optional slot number of the token that stores the CA
                    231:                 # certificate.
                    232:                 # slot =
                    233: 
                    234:                 # Optional PKCS#11 module name.
                    235:                 # module =
                    236: 
                    237:             # }
                    238: 
                    239:         # }
                    240: 
                    241:         # children {
                    242: 
                    243:             # CHILD_SA configuration sub-section.
                    244:             # <child> {
                    245: 
                    246:                 # AH proposals to offer for the CHILD_SA.
                    247:                 # ah_proposals =
                    248: 
                    249:                 # ESP proposals to offer for the CHILD_SA.
                    250:                 # esp_proposals = default
                    251: 
                    252:                 # Use incorrect 96-bit truncation for HMAC-SHA-256.
                    253:                 # sha256_96 = no
                    254: 
                    255:                 # Local traffic selectors to include in CHILD_SA.
                    256:                 # local_ts = dynamic
                    257: 
                    258:                 # Remote selectors to include in CHILD_SA.
                    259:                 # remote_ts = dynamic
                    260: 
                    261:                 # Time to schedule CHILD_SA rekeying.
                    262:                 # rekey_time = 1h
                    263: 
                    264:                 # Maximum lifetime before CHILD_SA gets closed, as time.
                    265:                 # life_time = rekey_time + 10%
                    266: 
                    267:                 # Range of random time to subtract from rekey_time.
                    268:                 # rand_time = life_time - rekey_time
                    269: 
                    270:                 # Number of bytes processed before initiating CHILD_SA rekeying.
                    271:                 # rekey_bytes = 0
                    272: 
                    273:                 # Maximum bytes processed before CHILD_SA gets closed.
                    274:                 # life_bytes = rekey_bytes + 10%
                    275: 
                    276:                 # Range of random bytes to subtract from rekey_bytes.
                    277:                 # rand_bytes = life_bytes - rekey_bytes
                    278: 
                    279:                 # Number of packets processed before initiating CHILD_SA
                    280:                 # rekeying.
                    281:                 # rekey_packets = 0
                    282: 
                    283:                 # Maximum number of packets processed before CHILD_SA gets
                    284:                 # closed.
                    285:                 # life_packets = rekey_packets + 10%
                    286: 
                    287:                 # Range of random packets to subtract from packets_bytes.
                    288:                 # rand_packets = life_packets - rekey_packets
                    289: 
                    290:                 # Updown script to invoke on CHILD_SA up and down events.
                    291:                 # updown =
                    292: 
                    293:                 # Hostaccess variable to pass to updown script.
                    294:                 # hostaccess = no
                    295: 
                    296:                 # IPsec Mode to establish (tunnel, transport, transport_proxy,
                    297:                 # beet, pass or drop).
                    298:                 # mode = tunnel
                    299: 
                    300:                 # Whether to install IPsec policies or not.
                    301:                 # policies = yes
                    302: 
                    303:                 # Whether to install outbound FWD IPsec policies or not.
                    304:                 # policies_fwd_out = no
                    305: 
                    306:                 # Action to perform on DPD timeout (clear, trap or restart).
                    307:                 # dpd_action = clear
                    308: 
                    309:                 # Enable IPComp compression before encryption.
                    310:                 # ipcomp = no
                    311: 
                    312:                 # Timeout before closing CHILD_SA after inactivity.
                    313:                 # inactivity = 0s
                    314: 
                    315:                 # Fixed reqid to use for this CHILD_SA.
                    316:                 # reqid = 0
                    317: 
                    318:                 # Optional fixed priority for IPsec policies.
                    319:                 # priority = 0
                    320: 
                    321:                 # Optional interface name to restrict IPsec policies.
                    322:                 # interface =
                    323: 
                    324:                 # Netfilter mark and mask for input traffic.
                    325:                 # mark_in = 0/0x00000000
                    326: 
                    327:                 # Whether to set *mark_in* on the inbound SA.
                    328:                 # mark_in_sa = no
                    329: 
                    330:                 # Netfilter mark and mask for output traffic.
                    331:                 # mark_out = 0/0x00000000
                    332: 
                    333:                 # Netfilter mark applied to packets after the inbound IPsec SA
                    334:                 # processed them.
                    335:                 # set_mark_in = 0/0x00000000
                    336: 
                    337:                 # Netfilter mark applied to packets after the outbound IPsec SA
                    338:                 # processed them.
                    339:                 # set_mark_out = 0/0x00000000
                    340: 
                    341:                 # Inbound XFRM interface ID.
                    342:                 # if_id_in = 0
                    343: 
                    344:                 # Outbound XFRM interface ID.
                    345:                 # if_id_out = 0
                    346: 
                    347:                 # Traffic Flow Confidentiality padding.
                    348:                 # tfc_padding = 0
                    349: 
                    350:                 # IPsec replay window to configure for this CHILD_SA.
                    351:                 # replay_window = 32
                    352: 
                    353:                 # Enable hardware offload for this CHILD_SA, if supported by the
                    354:                 # IPsec implementation.
                    355:                 # hw_offload = no
                    356: 
                    357:                 # Whether to copy the DF bit to the outer IPv4 header in tunnel
                    358:                 # mode.
                    359:                 # copy_df = yes
                    360: 
                    361:                 # Whether to copy the ECN header field to/from the outer IP
                    362:                 # header in tunnel mode.
                    363:                 # copy_ecn = yes
                    364: 
                    365:                 # Whether to copy the DSCP header field to/from the outer IP
                    366:                 # header in tunnel mode.
                    367:                 # copy_dscp = out
                    368: 
                    369:                 # Action to perform after loading the configuration (none, trap,
                    370:                 # start).
                    371:                 # start_action = none
                    372: 
                    373:                 # Action to perform after a CHILD_SA gets closed (none, trap,
                    374:                 # start).
                    375:                 # close_action = none
                    376: 
                    377:             # }
                    378: 
                    379:         # }
                    380: 
                    381:     # }
                    382: 
                    383: # }
                    384: 
                    385: # Section defining secrets for IKE/EAP/XAuth authentication and private key
                    386: # decryption.
                    387: # secrets {
                    388: 
                    389:     # EAP secret section for a specific secret.
                    390:     # eap<suffix> {
                    391: 
                    392:         # Value of the EAP/XAuth secret.
                    393:         # secret =
                    394: 
                    395:         # Identity the EAP/XAuth secret belongs to.
                    396:         # id<suffix> =
                    397: 
                    398:     # }
                    399: 
                    400:     # XAuth secret section for a specific secret.
                    401:     # xauth<suffix> {
                    402: 
                    403:     # }
                    404: 
                    405:     # NTLM secret section for a specific secret.
                    406:     # ntlm<suffix> {
                    407: 
                    408:         # Value of the NTLM secret.
                    409:         # secret =
                    410: 
                    411:         # Identity the NTLM secret belongs to.
                    412:         # id<suffix> =
                    413: 
                    414:     # }
                    415: 
                    416:     # IKE preshared secret section for a specific secret.
                    417:     # ike<suffix> {
                    418: 
                    419:         # Value of the IKE preshared secret.
                    420:         # secret =
                    421: 
                    422:         # IKE identity the IKE preshared secret belongs to.
                    423:         # id<suffix> =
                    424: 
                    425:     # }
                    426: 
                    427:     # Postquantum Preshared Key (PPK) section for a specific secret.
                    428:     # ppk<suffix> {
                    429: 
                    430:         # Value of the PPK.
                    431:         # secret =
                    432: 
                    433:         # PPK identity the PPK belongs to.
                    434:         # id<suffix> =
                    435: 
                    436:     # }
                    437: 
                    438:     # Private key decryption passphrase for a key in the private folder.
                    439:     # private<suffix> {
                    440: 
                    441:         # File name in the private folder for which this passphrase should be
                    442:         # used.
                    443:         # file =
                    444: 
                    445:         # Value of decryption passphrase for private key.
                    446:         # secret =
                    447: 
                    448:     # }
                    449: 
                    450:     # Private key decryption passphrase for a key in the rsa folder.
                    451:     # rsa<suffix> {
                    452: 
                    453:         # File name in the rsa folder for which this passphrase should be used.
                    454:         # file =
                    455: 
                    456:         # Value of decryption passphrase for RSA key.
                    457:         # secret =
                    458: 
                    459:     # }
                    460: 
                    461:     # Private key decryption passphrase for a key in the ecdsa folder.
                    462:     # ecdsa<suffix> {
                    463: 
                    464:         # File name in the ecdsa folder for which this passphrase should be
                    465:         # used.
                    466:         # file =
                    467: 
                    468:         # Value of decryption passphrase for ECDSA key.
                    469:         # secret =
                    470: 
                    471:     # }
                    472: 
                    473:     # Private key decryption passphrase for a key in the pkcs8 folder.
                    474:     # pkcs8<suffix> {
                    475: 
                    476:         # File name in the pkcs8 folder for which this passphrase should be
                    477:         # used.
                    478:         # file =
                    479: 
                    480:         # Value of decryption passphrase for PKCS#8 key.
                    481:         # secret =
                    482: 
                    483:     # }
                    484: 
                    485:     # PKCS#12 decryption passphrase for a container in the pkcs12 folder.
                    486:     # pkcs12<suffix> {
                    487: 
                    488:         # File name in the pkcs12 folder for which this passphrase should be
                    489:         # used.
                    490:         # file =
                    491: 
                    492:         # Value of decryption passphrase for PKCS#12 container.
                    493:         # secret =
                    494: 
                    495:     # }
                    496: 
                    497:     # Definition for a private key that's stored on a token/smartcard.
                    498:     # token<suffix> {
                    499: 
                    500:         # Hex-encoded CKA_ID of the private key on the token.
                    501:         # handle =
                    502: 
                    503:         # Optional slot number to access the token.
                    504:         # slot =
                    505: 
                    506:         # Optional PKCS#11 module name to access the token.
                    507:         # module =
                    508: 
                    509:         # Optional PIN required to access the key on the token. If none is
                    510:         # provided the user is prompted during an interactive --load-creds call.
                    511:         # pin =
                    512: 
                    513:     # }
                    514: 
                    515: # }
                    516: 
                    517: # Section defining named pools.
                    518: # pools {
                    519: 
                    520:     # Section defining a single pool with a unique name.
                    521:     # <name> {
                    522: 
                    523:         # Addresses allocated in pool.
                    524:         # addrs =
                    525: 
                    526:         # Comma separated list of additional attributes from type <attr>.
                    527:         # <attr> =
                    528: 
                    529:     # }
                    530: 
                    531: # }
                    532: 
                    533: # Section defining attributes of certification authorities.
                    534: # authorities {
                    535: 
                    536:     # Section defining a certification authority with a unique name.
                    537:     # <name> {
                    538: 
                    539:         # CA certificate belonging to the certification authority.
                    540:         # cacert =
                    541: 
                    542:         # Absolute path to the certificate to load.
                    543:         # file =
                    544: 
                    545:         # Hex-encoded CKA_ID of the CA certificate on a token.
                    546:         # handle =
                    547: 
                    548:         # Optional slot number of the token that stores the CA certificate.
                    549:         # slot =
                    550: 
                    551:         # Optional PKCS#11 module name.
                    552:         # module =
                    553: 
                    554:         # Comma-separated list of CRL distribution points.
                    555:         # crl_uris =
                    556: 
                    557:         # Comma-separated list of OCSP URIs.
                    558:         # ocsp_uris =
                    559: 
                    560:         # Defines the base URI for the Hash and URL feature supported by IKEv2.
                    561:         # cert_uri_base =
                    562: 
                    563:     # }
                    564: 
                    565: # }
                    566: 
                    567: # Include config snippets
                    568: include conf.d/*.conf
                    569: 

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>