ipsec.conf: config setup Reference » History » Version 3
Martin Willi, 02.09.2007 07:44
completed descriptions
1 | 1 | Martin Willi | = config setup = |
---|---|---|---|
2 | 1 | Martin Willi | |
3 | 2 | Martin Willi | * ''cachecrls = yes|'''no''''' |
4 | 2 | Martin Willi | certificate revocation lists (CRLs) fetched via http or ldap will be cached in ''/etc/ipsec.d/crls/'' |
5 | 2 | Martin Willi | under a unique file name derived from the certification authority's public key. |
6 | 1 | Martin Willi | |
7 | 3 | Martin Willi | * ''charonstart = '''yes'''|no'' |
8 | 2 | Martin Willi | starts the IKEv2 charon daemon. |
9 | 1 | Martin Willi | |
10 | 2 | Martin Willi | * ''crlcheckinterval = 0s''|<time> |
11 | 2 | Martin Willi | interval in seconds. CRL fetching is enabled if the value is greater than zero. |
12 | 2 | Martin Willi | Asynchronous, periodic checking for fresh CRLs is currently done by the IKEv1 Pluto daemon only. |
13 | 1 | Martin Willi | |
14 | 2 | Martin Willi | * ''plutostart = '''yes'''|no'' |
15 | 2 | Martin Willi | starts the IKEv1 pluto daemon. |
16 | 1 | Martin Willi | |
17 | 2 | Martin Willi | * ''strictcrlpolicy = yes|ifuri|'''no''''' |
18 | 2 | Martin Willi | defines if a fresh CRL must be available in order for the peer authentication based on RSA |
19 | 2 | Martin Willi | signatures to succeed. IKEv2 additionally recognizes ''ifuri'' which reverts to ''yes'' if |
20 | 2 | Martin Willi | at least one CRL URI is defined and to ''no'' if no URI is known. |
21 | 2 | Martin Willi | |
22 | 1 | Martin Willi | '''IKEv1 pluto daemon only:''' |
23 | 1 | Martin Willi | |
24 | 3 | Martin Willi | * ''keep_alive = '''20s'''|''<time> |
25 | 3 | Martin Willi | interval in seconds between NAT keep alive packets. |
26 | 1 | Martin Willi | |
27 | 1 | Martin Willi | * ''nat_traversal = yes|'''no''''' |
28 | 3 | Martin Willi | activates NAT traversal by accepting source ISAKMP ports different from udp/500 and being able |
29 | 3 | Martin Willi | of floating to udp/4500 if a NAT situation is detected. Used by IKEv1 only, NAT traversal |
30 | 3 | Martin Willi | always being active in IKEv2. |
31 | 1 | Martin Willi | |
32 | 3 | Martin Willi | * ''nocrsend = yes|'''no''''' |
33 | 3 | Martin Willi | no certificate request payloads will be sent. |
34 | 3 | Martin Willi | |
35 | 1 | Martin Willi | * ''pkcs11initargs = ''<args> |
36 | 3 | Martin Willi | non-standard argument string for PKCS#11 C_Initialize() function; required by NSS softoken. |
37 | 1 | Martin Willi | |
38 | 2 | Martin Willi | * ''pkcs11module = ''<lib> |
39 | 3 | Martin Willi | defines the path during run-time to a dynamically loadable PKCS #11 library. Overrides any |
40 | 3 | Martin Willi | path defined during compile-time using the ''--pkcs11-module'' configure option. |
41 | 1 | Martin Willi | |
42 | 2 | Martin Willi | * ''pkcs11keepstate = yes|'''no''''' |
43 | 3 | Martin Willi | PKCS #11 login sessions will be kept during the whole lifetime of the keying daemon. |
44 | 3 | Martin Willi | Useful with pin-pad smart card readers where PINs cannot be cached. |
45 | 2 | Martin Willi | |
46 | 1 | Martin Willi | * ''pkcs11proxy = yes|'''no''''' |
47 | 3 | Martin Willi | Pluto will act as a PKCS #11 proxy accessible via the whack interface. |
48 | 1 | Martin Willi | |
49 | 1 | Martin Willi | * ''plutodebug = '''none'''''|<debug list>|''all'' |
50 | 3 | Martin Willi | how much Pluto debugging output should be logged. ''none'' means no debugging output |
51 | 3 | Martin Willi | while ''all'' means full output. Otherwise only the specified types of output |
52 | 3 | Martin Willi | (a quoted list, names without the ''--debug-'' prefix, separated by white space) are enabled; |
53 | 3 | Martin Willi | for details on available debugging types, see ''pluto(8)''. |
54 | 1 | Martin Willi | |
55 | 3 | Martin Willi | * ''postpluto = ''<command> |
56 | 3 | Martin Willi | shell command to run after starting Pluto (e.g., to remove a decrypted copy of the ''ipsec.secrets'' file). |
57 | 3 | Martin Willi | It's run in a very simple way; complexities like I/O redirection are best hidden within a script. |
58 | 3 | Martin Willi | Any output is redirected for logging, so running interactive commands is difficult unless they use |
59 | 3 | Martin Willi | ''/dev/tty'' or equivalent for their interaction. |
60 | 1 | Martin Willi | |
61 | 3 | Martin Willi | * ''prepluto = ''<command> |
62 | 3 | Martin Willi | shell command to run before starting Pluto (e.g., to decrypt an encrypted copy of the ''ipsec.secrets'' file). |
63 | 3 | Martin Willi | It's run in a very simple way; complexities like I/O redirection are best hidden within a script. |
64 | 3 | Martin Willi | Any output is redirected for logging, so running interactive commands is difficult unless they use |
65 | 3 | Martin Willi | ''/dev/tty'' or equivalent for their interaction. |
66 | 1 | Martin Willi | |
67 | 1 | Martin Willi | * ''virtual_private = ''<networks> |
68 | 3 | Martin Willi | defines private networks using a wildcard notation. |
69 | 1 | Martin Willi | |
70 | 2 | Martin Willi | * ''uniqueids = '''yes'''|no'' |
71 | 3 | Martin Willi | whether a particular participant ID should be kept unique, with any new (automatically keyed) |
72 | 3 | Martin Willi | connection using an ID from a different IP address deemed to replace all old ones using that ID. |
73 | 3 | Martin Willi | Participant IDs normally are unique, so a new (automatically-keyed) connection using the same ID |
74 | 3 | Martin Willi | is almost invariably intended to replace an old one. |
75 | 1 | Martin Willi | |
76 | 1 | Martin Willi | '''IKEv2 charon daemon only:''' |
77 | 1 | Martin Willi | |
78 | 2 | Martin Willi | * ''charondebug = ''<debug list> |
79 | 3 | Martin Willi | how much Charon debugging output should be logged. A comma-separated list containing |
80 | 3 | Martin Willi | ''type level'' pairs may be specified, e.g: ''dmn 3, ike 1, net -1''. Acceptable values for |
81 | 3 | Martin Willi | types are ''dmn, mgr, ike, chd, job, cfg, knl, net, enc, lib'' and the level is one of |
82 | 3 | Martin Willi | ''-1, 0, 1, 2, 3, 4'' (for silent, audit, control, controlmore, raw, private). |