ipsec.conf: config setup Reference » History » Version 11
Andreas Steffen, 19.02.2010 11:31
1 | 9 | Tobias Brunner | h1. config setup |
---|---|---|---|
2 | 1 | Martin Willi | |
3 | 10 | Tobias Brunner | h2. both daemons |
4 | 9 | Tobias Brunner | |
5 | 10 | Tobias Brunner | _cachecrls = yes | *no*_ |
6 | 11 | Andreas Steffen | |
7 | 10 | Tobias Brunner | p((. certificate revocation lists (CRLs) fetched via http or ldap will be cached in _/etc/ipsec.d/crls/_ |
8 | 1 | Martin Willi | under a unique file name derived from the certification authority's public key. |
9 | 3 | Martin Willi | |
10 | 10 | Tobias Brunner | _charonstart = *yes* | no_ |
11 | 11 | Andreas Steffen | |
12 | 10 | Tobias Brunner | p((. starts the IKEv2 charon daemon. |
13 | 1 | Martin Willi | |
14 | 10 | Tobias Brunner | _plutostart = *yes* | no_ |
15 | 11 | Andreas Steffen | |
16 | 10 | Tobias Brunner | p((. starts the IKEv1 pluto daemon. |
17 | 1 | Martin Willi | |
18 | 10 | Tobias Brunner | _strictcrlpolicy = yes | ifuri | *no*_ |
19 | 11 | Andreas Steffen | |
20 | 10 | Tobias Brunner | p((. defines if a fresh CRL must be available in order for the peer authentication based on RSA |
21 | 9 | Tobias Brunner | signatures to succeed. IKEv2 additionally recognizes _ifuri_ which reverts to _yes_ if |
22 | 9 | Tobias Brunner | at least one CRL URI is defined and to _no_ if no URI is known. |
23 | 8 | Tobias Brunner | |
24 | 10 | Tobias Brunner | _uniqueids = *yes* | no | replace | keep_ |
25 | 11 | Andreas Steffen | |
26 | 10 | Tobias Brunner | p((. whether a particular participant ID should be kept unique, with any new (automatically keyed) |
27 | 1 | Martin Willi | connection using an ID from a different IP address deemed to replace all old ones using that ID. |
28 | 8 | Tobias Brunner | Participant IDs normally _are_ unique, so a new (automatically-keyed) connection using the same ID |
29 | 9 | Tobias Brunner | is almost invariably intended to replace an old one. The IKEv2 daemon also accepts the value _replace_ |
30 | 9 | Tobias Brunner | which is identical to _yes_ and the value _keep_ to reject new IKE_SA setups and keep the duplicate |
31 | 1 | Martin Willi | established earlier. |
32 | 1 | Martin Willi | |
33 | 10 | Tobias Brunner | h2. IKEv1 pluto daemon only |
34 | 8 | Tobias Brunner | |
35 | 10 | Tobias Brunner | _crlcheckinterval = *0s* | <time>_ |
36 | 11 | Andreas Steffen | |
37 | 10 | Tobias Brunner | p((. interval in seconds. CRL fetching is enabled if the value is greater than zero. |
38 | 1 | Martin Willi | Asynchronous, periodic checking for fresh CRLs is currently done by the IKEv1 Pluto daemon only. |
39 | 3 | Martin Willi | |
40 | 10 | Tobias Brunner | _keep_alive = *20s* | <time>_ |
41 | 11 | Andreas Steffen | |
42 | 10 | Tobias Brunner | p((. interval in seconds between NAT keep alive packets. |
43 | 1 | Martin Willi | |
44 | 10 | Tobias Brunner | _nat_traversal = yes | *no*_ |
45 | 11 | Andreas Steffen | |
46 | 10 | Tobias Brunner | p((. activates NAT traversal by accepting source ISAKMP ports different from udp/500 and being able |
47 | 10 | Tobias Brunner | of floating to udp/4500 if a NAT situation is detected. Used by IKEv1 only, NAT traversal is |
48 | 1 | Martin Willi | always being active in IKEv2. |
49 | 3 | Martin Willi | |
50 | 10 | Tobias Brunner | _nocrsend = yes | *no*_ |
51 | 11 | Andreas Steffen | |
52 | 10 | Tobias Brunner | p((. no certificate request payloads will be sent. |
53 | 1 | Martin Willi | |
54 | 10 | Tobias Brunner | _pkcs11initargs = <args>_ |
55 | 11 | Andreas Steffen | |
56 | 10 | Tobias Brunner | p((. non-standard argument string for PKCS#11 C_Initialize() function; required by NSS softoken. |
57 | 1 | Martin Willi | |
58 | 10 | Tobias Brunner | _pkcs11module = <lib>_ |
59 | 11 | Andreas Steffen | |
60 | 10 | Tobias Brunner | p((. defines the path during run-time to a dynamically loadable PKCS#11 library. Overrides any |
61 | 10 | Tobias Brunner | path defined during compile-time using the --pkcs11-module configure option. |
62 | 9 | Tobias Brunner | |
63 | 10 | Tobias Brunner | _pkcs11keepstate = yes | *no*_ |
64 | 11 | Andreas Steffen | |
65 | 10 | Tobias Brunner | p((. PKCS#11 login sessions will be kept during the whole lifetime of the keying daemon. |
66 | 1 | Martin Willi | Useful with pin-pad smart card readers where PINs cannot be cached. |
67 | 6 | Martin Willi | |
68 | 10 | Tobias Brunner | _pkcs11proxy = yes | *no*_ |
69 | 11 | Andreas Steffen | |
70 | 10 | Tobias Brunner | p((. Pluto will act as a PKCS#11 proxy accessible via the whack interface. |
71 | 3 | Martin Willi | |
72 | 10 | Tobias Brunner | _plutodebug = *none_* | <debug list> | _all_ |
73 | 11 | Andreas Steffen | |
74 | 10 | Tobias Brunner | p((. how much Pluto debugging output should be logged. _none_ means no debugging output |
75 | 9 | Tobias Brunner | while _all_ means full output. Otherwise only the specified types of output separated by white space) are enabled; |
76 | 9 | Tobias Brunner | Available debugging types are _control controlmore crypt dns emitting klips lifecycle natt oppo parsing private raw_. |
77 | 9 | Tobias Brunner | Recommended setting is _plutodebug=control_. |
78 | 9 | Tobias Brunner | |
79 | 10 | Tobias Brunner | _plutostderrlog = <file>_ |
80 | 11 | Andreas Steffen | |
81 | 10 | Tobias Brunner | p((. Pluto will not use syslog, but rather log to stderr, and redirect stderr to <file>. |
82 | 3 | Martin Willi | |
83 | 10 | Tobias Brunner | _postpluto = <command>_ |
84 | 11 | Andreas Steffen | |
85 | 10 | Tobias Brunner | p((. shell command to run after starting Pluto (e.g., to remove a decrypted copy of the [[IpsecSecrets|ipsec.secrets]] file). |
86 | 9 | Tobias Brunner | It's run in a very simple way; complexities like I/O redirection are best hidden within a script. |
87 | 5 | Martin Willi | Any output is redirected for logging, so running interactive commands is difficult unless they use |
88 | 1 | Martin Willi | _/dev/tty_ or equivalent for their interaction. |
89 | 9 | Tobias Brunner | |
90 | 10 | Tobias Brunner | _prepluto = <command>_ |
91 | 11 | Andreas Steffen | |
92 | 10 | Tobias Brunner | p((. shell command to run before starting Pluto (e.g., to decrypt an encrypted copy of the [[IpsecSecrets|ipsec.secrets]] file). |
93 | 9 | Tobias Brunner | It's run in a very simple way; complexities like I/O redirection are best hidden within a script. |
94 | 3 | Martin Willi | Any output is redirected for logging, so running interactive commands is difficult unless they use |
95 | 3 | Martin Willi | _/dev/tty_ or equivalent for their interaction. |
96 | 9 | Tobias Brunner | |
97 | 10 | Tobias Brunner | _virtual_private = <networks>_ |
98 | 11 | Andreas Steffen | |
99 | 10 | Tobias Brunner | p((. defines private networks using a wildcard notation. |
100 | 1 | Martin Willi | |
101 | 10 | Tobias Brunner | h2. IKEv2 charon daemon only |
102 | 9 | Tobias Brunner | |
103 | 10 | Tobias Brunner | _charondebug = <debug list>_ |
104 | 11 | Andreas Steffen | |
105 | 10 | Tobias Brunner | p((. how much Charon debugging output should be logged. A comma-separated list containing |
106 | 3 | Martin Willi | _type level_ pairs may be specified, e.g: _dmn 3, ike 1, net -1_. Acceptable values for |
107 | 9 | Tobias Brunner | types are _dmn, mgr, ike, chd, job, cfg, knl, net, enc, lib_ and the level is one of |
108 | 10 | Tobias Brunner | _[-1, 0, 1, 2, 3, 4]_ (for silent, audit, control, controlmore, raw, private). |
109 | 10 | Tobias Brunner | For more flexibility see [[LoggerConfiguration]]. |