Project

General

Profile

ipsec.conf: config setup Reference » History » Version 14

Tobias Brunner, 24.10.2011 13:27

1 14 Tobias Brunner
{{title(ipsec.conf: config setup Reference)}}
2 14 Tobias Brunner
3 14 Tobias Brunner
h1. ipsec.conf: config setup
4 1 Martin Willi
5 10 Tobias Brunner
h2. both daemons
6 9 Tobias Brunner
7 10 Tobias Brunner
_cachecrls = yes | *no*_
8 11 Andreas Steffen
9 10 Tobias Brunner
p((. certificate revocation lists (CRLs) fetched via http or ldap will be cached in _/etc/ipsec.d/crls/_
10 12 Tobias Brunner
     under a unique file name derived from the certification authority's public key. Only relevant for
11 12 Tobias Brunner
     IKEv1 as CRLs are always cached in IKEv2.
12 3 Martin Willi
13 1 Martin Willi
_charonstart = *yes* | no_
14 11 Andreas Steffen
15 12 Tobias Brunner
p((. whether to start the IKEv2 charon daemon or not. The default is *yes* if starter was compiled with IKEv2 support.
16 1 Martin Willi
17 10 Tobias Brunner
_plutostart = *yes* | no_
18 11 Andreas Steffen
19 12 Tobias Brunner
p((. whether to start the IKEv1 pluto daemon or not. The default is *yes* if starter was compiled with IKEv1 support.
20 1 Martin Willi
21 10 Tobias Brunner
_strictcrlpolicy = yes | ifuri | *no*_
22 11 Andreas Steffen
23 10 Tobias Brunner
p((. defines if a fresh CRL must be available in order for the peer authentication based on RSA
24 9 Tobias Brunner
     signatures to succeed. IKEv2 additionally recognizes _ifuri_ which reverts to _yes_ if
25 9 Tobias Brunner
     at least one CRL URI is defined and to _no_ if no URI is known.
26 8 Tobias Brunner
27 10 Tobias Brunner
_uniqueids = *yes* | no | replace | keep_
28 11 Andreas Steffen
29 10 Tobias Brunner
p((. whether a particular participant ID should be kept unique, with any new (automatically  keyed)
30 1 Martin Willi
     connection using an ID from a different IP address deemed to replace all old ones using that ID.
31 8 Tobias Brunner
     Participant IDs normally _are_ unique, so a new (automatically-keyed)  connection  using the same ID
32 9 Tobias Brunner
     is almost invariably intended to replace an old one. The IKEv2 daemon also accepts the value _replace_
33 9 Tobias Brunner
     which is identical to _yes_ and the value _keep_ to reject new IKE_SA setups and keep the duplicate
34 1 Martin Willi
     established earlier.
35 1 Martin Willi
36 10 Tobias Brunner
h2. IKEv1 pluto daemon only
37 8 Tobias Brunner
38 10 Tobias Brunner
_crlcheckinterval = *0s* | <time>_
39 11 Andreas Steffen
40 10 Tobias Brunner
p((. interval in seconds. CRL fetching is enabled if the value is greater than zero.
41 1 Martin Willi
     Asynchronous, periodic checking for fresh CRLs is currently done by the IKEv1 Pluto daemon only.
42 3 Martin Willi
43 10 Tobias Brunner
_keep_alive = *20s* | <time>_
44 11 Andreas Steffen
45 10 Tobias Brunner
p((. interval in seconds between NAT keep alive packets.
46 1 Martin Willi
47 10 Tobias Brunner
_nat_traversal = yes | *no*_
48 11 Andreas Steffen
49 10 Tobias Brunner
p((. activates NAT traversal by accepting source ISAKMP ports different from udp/500 and being able
50 10 Tobias Brunner
     of floating to udp/4500 if a NAT situation is detected.  Used by IKEv1 only, NAT traversal is
51 1 Martin Willi
     always being active in IKEv2.
52 3 Martin Willi
53 10 Tobias Brunner
_nocrsend = yes | *no*_
54 11 Andreas Steffen
55 10 Tobias Brunner
p((. no certificate request  payloads will be sent.
56 1 Martin Willi
57 10 Tobias Brunner
_pkcs11initargs = <args>_
58 11 Andreas Steffen
59 10 Tobias Brunner
p((. non-standard argument string for PKCS#11 C_Initialize() function; required by NSS softoken.
60 1 Martin Willi
61 10 Tobias Brunner
_pkcs11module = <lib>_
62 11 Andreas Steffen
63 10 Tobias Brunner
p((. defines the path during run-time to a dynamically loadable PKCS#11 library. Overrides any
64 10 Tobias Brunner
     path defined during compile-time using the --pkcs11-module configure option.
65 9 Tobias Brunner
66 10 Tobias Brunner
_pkcs11keepstate = yes | *no*_
67 11 Andreas Steffen
68 10 Tobias Brunner
p((. PKCS#11 login sessions will be kept during the whole lifetime of the keying daemon.
69 1 Martin Willi
     Useful with  pin-pad smart card readers where PINs cannot be cached. 
70 6 Martin Willi
71 10 Tobias Brunner
_pkcs11proxy = yes | *no*_
72 11 Andreas Steffen
73 1 Martin Willi
p((. Pluto will act as a PKCS#11 proxy accessible via the whack interface.
74 3 Martin Willi
75 10 Tobias Brunner
_plutodebug = *none_* | <debug list> | _all_
76 11 Andreas Steffen
77 12 Tobias Brunner
p((. how much pluto debugging output should be logged. _none_ means  no  debugging output
78 9 Tobias Brunner
     while _all_ means full output.  Otherwise only the specified types of output separated by white space) are enabled;
79 9 Tobias Brunner
     Available debugging types are _control controlmore crypt dns emitting klips lifecycle natt oppo parsing private raw_.
80 9 Tobias Brunner
     Recommended setting is _plutodebug=control_.
81 9 Tobias Brunner
82 10 Tobias Brunner
_plutostderrlog = <file>_
83 1 Martin Willi
84 10 Tobias Brunner
p((. Pluto will not use syslog, but rather log to stderr, and redirect stderr to <file>.
85 3 Martin Willi
86 10 Tobias Brunner
_postpluto = <command>_
87 11 Andreas Steffen
88 12 Tobias Brunner
p((. shell command to run after starting pluto (e.g., to remove a decrypted copy of the [[IpsecSecrets|ipsec.secrets]] file).
89 1 Martin Willi
     It's run in a very simple way; complexities like I/O redirection are best hidden within a script.
90 5 Martin Willi
     Any output is redirected for logging, so running interactive commands is difficult unless they use
91 1 Martin Willi
     _/dev/tty_ or equivalent for their interaction.
92 9 Tobias Brunner
93 10 Tobias Brunner
_prepluto = <command>_
94 11 Andreas Steffen
95 12 Tobias Brunner
p((. shell command to run before starting pluto (e.g., to decrypt an encrypted copy of the [[IpsecSecrets|ipsec.secrets]] file).
96 9 Tobias Brunner
     It's run in a very simple way; complexities like I/O redirection are best hidden within a script.
97 3 Martin Willi
     Any output is redirected for logging, so running interactive commands is difficult unless they use
98 3 Martin Willi
     _/dev/tty_ or equivalent for their interaction.
99 9 Tobias Brunner
100 10 Tobias Brunner
_virtual_private = <networks>_
101 11 Andreas Steffen
102 10 Tobias Brunner
p((. defines private networks using a wildcard notation.
103 1 Martin Willi
104 10 Tobias Brunner
h2. IKEv2 charon daemon only
105 9 Tobias Brunner
106 10 Tobias Brunner
_charondebug = <debug list>_
107 11 Andreas Steffen
108 10 Tobias Brunner
p((. how much Charon debugging output should be logged. A comma-separated list containing
109 13 Tobias Brunner
     _type/level_ pairs  may  be specified, e.g: _dmn 3, ike 1, net -1_.  Acceptable values for
110 13 Tobias Brunner
     types are _dmn, mgr, ike, chd, job, cfg, knl, net, enc, lib, tls, tnc, imc, imv, pts_ and the level is one of
111 13 Tobias Brunner
     _[-1,  0,  1,  2,  3,  4]_ (for silent, audit, control, controlmore, raw, private). By default, the level is
112 13 Tobias Brunner
     set to *1* for all types.
113 10 Tobias Brunner
     For more flexibility see [[LoggerConfiguration]].