| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377 | 
							- # Options for the charon IKE daemon.
 
- charon {
 
-     # Accept unencrypted ID and HASH payloads in IKEv1 Main Mode.
 
-     # accept_unencrypted_mainmode_messages = no
 
-     # Maximum number of half-open IKE_SAs for a single peer IP.
 
-     # block_threshold = 5
 
-     # Whether Certificate Revocation Lists (CRLs) fetched via HTTP or LDAP
 
-     # should be saved under a unique file name derived from the public key of
 
-     # the Certification Authority (CA) to /etc/ipsec.d/crls (stroke) or
 
-     # /etc/swanctl/x509crl (vici), respectively.
 
-     # cache_crls = no
 
-     # Whether relations in validated certificate chains should be cached in
 
-     # memory.
 
-     # cert_cache = yes
 
-     # Send Cisco Unity vendor ID payload (IKEv1 only).
 
-     # cisco_unity = no
 
-     # Close the IKE_SA if setup of the CHILD_SA along with IKE_AUTH failed.
 
-     # close_ike_on_child_failure = no
 
-     # Number of half-open IKE_SAs that activate the cookie mechanism.
 
-     # cookie_threshold = 10
 
-     # Delete CHILD_SAs right after they got successfully rekeyed (IKEv1 only).
 
-     # delete_rekeyed = no
 
-     # Delay in seconds until inbound IPsec SAs are deleted after rekeyings
 
-     # (IKEv2 only).
 
-     # delete_rekeyed_delay = 5
 
-     # Use ANSI X9.42 DH exponent size or optimum size matched to cryptographic
 
-     # strength.
 
-     # dh_exponent_ansi_x9_42 = yes
 
-     # Use RTLD_NOW with dlopen when loading plugins and IMV/IMCs to reveal
 
-     # missing symbols immediately.
 
-     # dlopen_use_rtld_now = no
 
-     # DNS server assigned to peer via configuration payload (CP).
 
-     # dns1 =
 
-     # DNS server assigned to peer via configuration payload (CP).
 
-     # dns2 =
 
-     # Enable Denial of Service protection using cookies and aggressiveness
 
-     # checks.
 
-     # dos_protection = yes
 
-     # Compliance with the errata for RFC 4753.
 
-     # ecp_x_coordinate_only = yes
 
-     # Free objects during authentication (might conflict with plugins).
 
-     # flush_auth_cfg = no
 
-     # Whether to follow IKEv2 redirects (RFC 5685).
 
-     # follow_redirects = yes
 
-     # Maximum size (complete IP datagram size in bytes) of a sent IKE fragment
 
-     # when using proprietary IKEv1 or standardized IKEv2 fragmentation, defaults
 
-     # to 1280 (use 0 for address family specific default values, which uses a
 
-     # lower value for IPv4).  If specified this limit is used for both IPv4 and
 
-     # IPv6.
 
-     # fragment_size = 1280
 
-     # Name of the group the daemon changes to after startup.
 
-     # group =
 
-     # Timeout in seconds for connecting IKE_SAs (also see IKE_SA_INIT DROPPING).
 
-     # half_open_timeout = 30
 
-     # Enable hash and URL support.
 
-     # hash_and_url = no
 
-     # Allow IKEv1 Aggressive Mode with pre-shared keys as responder.
 
-     # i_dont_care_about_security_and_use_aggressive_mode_psk = no
 
-     # Whether to ignore the traffic selectors from the kernel's acquire events
 
-     # for IKEv2 connections (they are not used for IKEv1).
 
-     # ignore_acquire_ts = no
 
-     # A space-separated list of routing tables to be excluded from route
 
-     # lookups.
 
-     # ignore_routing_tables =
 
-     # Maximum number of IKE_SAs that can be established at the same time before
 
-     # new connection attempts are blocked.
 
-     # ikesa_limit = 0
 
-     # Number of exclusively locked segments in the hash table.
 
-     # ikesa_table_segments = 1
 
-     # Size of the IKE_SA hash table.
 
-     # ikesa_table_size = 1
 
-     # Whether to close IKE_SA if the only CHILD_SA closed due to inactivity.
 
-     # inactivity_close_ike = no
 
-     # Limit new connections based on the current number of half open IKE_SAs,
 
-     # see IKE_SA_INIT DROPPING in strongswan.conf(5).
 
-     # init_limit_half_open = 0
 
-     # Limit new connections based on the number of queued jobs.
 
-     # init_limit_job_load = 0
 
-     # Causes charon daemon to ignore IKE initiation requests.
 
-     # initiator_only = no
 
-     # Install routes into a separate routing table for established IPsec
 
-     # tunnels.
 
-     # install_routes = yes
 
-     # Install virtual IP addresses.
 
-     # install_virtual_ip = yes
 
-     # The name of the interface on which virtual IP addresses should be
 
-     # installed.
 
-     # install_virtual_ip_on =
 
-     # Check daemon, libstrongswan and plugin integrity at startup.
 
-     # integrity_test = no
 
-     # A comma-separated list of network interfaces that should be ignored, if
 
-     # interfaces_use is specified this option has no effect.
 
-     # interfaces_ignore =
 
-     # A comma-separated list of network interfaces that should be used by
 
-     # charon. All other interfaces are ignored.
 
-     # interfaces_use =
 
-     # NAT keep alive interval.
 
-     # keep_alive = 20s
 
-     # Plugins to load in the IKE daemon charon.
 
-     # load =
 
-     # Determine plugins to load via each plugin's load option.
 
-     # load_modular = no
 
-     # Initiate IKEv2 reauthentication with a make-before-break scheme.
 
-     # make_before_break = no
 
-     # Maximum number of IKEv1 phase 2 exchanges per IKE_SA to keep state about
 
-     # and track concurrently.
 
-     # max_ikev1_exchanges = 3
 
-     # Maximum packet size accepted by charon.
 
-     # max_packet = 10000
 
-     # Enable multiple authentication exchanges (RFC 4739).
 
-     # multiple_authentication = yes
 
-     # WINS servers assigned to peer via configuration payload (CP).
 
-     # nbns1 =
 
-     # WINS servers assigned to peer via configuration payload (CP).
 
-     # nbns2 =
 
-     # UDP port used locally. If set to 0 a random port will be allocated.
 
-     # port = 500
 
-     # UDP port used locally in case of NAT-T. If set to 0 a random port will be
 
-     # allocated.  Has to be different from charon.port, otherwise a random port
 
-     # will be allocated.
 
-     # port_nat_t = 4500
 
-     # Whether to prefer updating SAs to the path with the best route.
 
-     # prefer_best_path = no
 
-     # Prefer locally configured proposals for IKE/IPsec over supplied ones as
 
-     # responder (disabling this can avoid keying retries due to
 
-     # INVALID_KE_PAYLOAD notifies).
 
-     # prefer_configured_proposals = yes
 
-     # By default public IPv6 addresses are preferred over temporary ones (RFC
 
-     # 4941), to make connections more stable. Enable this option to reverse
 
-     # this.
 
-     # prefer_temporary_addrs = no
 
-     # Process RTM_NEWROUTE and RTM_DELROUTE events.
 
-     # process_route = yes
 
-     # How RDNs in subject DNs of certificates are matched against configured
 
-     # identities (strict, reordered, or relaxed).
 
-     # rdn_matching = strict
 
-     # Delay in ms for receiving packets, to simulate larger RTT.
 
-     # receive_delay = 0
 
-     # Delay request messages.
 
-     # receive_delay_request = yes
 
-     # Delay response messages.
 
-     # receive_delay_response = yes
 
-     # Specific IKEv2 message type to delay, 0 for any.
 
-     # receive_delay_type = 0
 
-     # Size of the AH/ESP replay window, in packets.
 
-     # replay_window = 32
 
-     # Base to use for calculating exponential back off, see IKEv2 RETRANSMISSION
 
-     # in strongswan.conf(5).
 
-     # retransmit_base = 1.8
 
-     # Maximum jitter in percent to apply randomly to calculated retransmission
 
-     # timeout (0 to disable).
 
-     # retransmit_jitter = 0
 
-     # Upper limit in seconds for calculated retransmission timeout (0 to
 
-     # disable).
 
-     # retransmit_limit = 0
 
-     # Timeout in seconds before sending first retransmit.
 
-     # retransmit_timeout = 4.0
 
-     # Number of times to retransmit a packet before giving up.
 
-     # retransmit_tries = 5
 
-     # Interval in seconds to use when retrying to initiate an IKE_SA (e.g. if
 
-     # DNS resolution failed), 0 to disable retries.
 
-     # retry_initiate_interval = 0
 
-     # Initiate CHILD_SA within existing IKE_SAs (always enabled for IKEv1).
 
-     # reuse_ikesa = yes
 
-     # Numerical routing table to install routes to.
 
-     # routing_table =
 
-     # Priority of the routing table.
 
-     # routing_table_prio =
 
-     # Whether to use RSA with PSS padding instead of PKCS#1 padding by default.
 
-     # rsa_pss = no
 
-     # Delay in ms for sending packets, to simulate larger RTT.
 
-     # send_delay = 0
 
-     # Delay request messages.
 
-     # send_delay_request = yes
 
-     # Delay response messages.
 
-     # send_delay_response = yes
 
-     # Specific IKEv2 message type to delay, 0 for any.
 
-     # send_delay_type = 0
 
-     # Send strongSwan vendor ID payload
 
-     # send_vendor_id = no
 
-     # Whether to enable Signature Authentication as per RFC 7427.
 
-     # signature_authentication = yes
 
-     # Whether to enable constraints against IKEv2 signature schemes.
 
-     # signature_authentication_constraints = yes
 
-     # Value mixed into the local IKE SPIs after applying spi_mask.
 
-     # spi_label = 0x0000000000000000
 
-     # Mask applied to local IKE SPIs before mixing in spi_label (bits set will
 
-     # be replaced with spi_label).
 
-     # spi_mask = 0x0000000000000000
 
-     # The upper limit for SPIs requested from the kernel for IPsec SAs.
 
-     # spi_max = 0xcfffffff
 
-     # The lower limit for SPIs requested from the kernel for IPsec SAs.
 
-     # spi_min = 0xc0000000
 
-     # Number of worker threads in charon.
 
-     # threads = 16
 
-     # Name of the user the daemon changes to after startup.
 
-     # user =
 
-     crypto_test {
 
-         # Benchmark crypto algorithms and order them by efficiency.
 
-         # bench = no
 
-         # Buffer size used for crypto benchmark.
 
-         # bench_size = 1024
 
-         # Time in ms during which crypto algorithm performance is measured.
 
-         # bench_time = 50
 
-         # Test crypto algorithms during registration (requires test vectors
 
-         # provided by the test-vectors plugin).
 
-         # on_add = no
 
-         # Test crypto algorithms on each crypto primitive instantiation.
 
-         # on_create = no
 
-         # Strictly require at least one test vector to enable an algorithm.
 
-         # required = no
 
-         # Whether to test RNG with TRUE quality; requires a lot of entropy.
 
-         # rng_true = no
 
-     }
 
-     host_resolver {
 
-         # Maximum number of concurrent resolver threads (they are terminated if
 
-         # unused).
 
-         # max_threads = 3
 
-         # Minimum number of resolver threads to keep around.
 
-         # min_threads = 0
 
-     }
 
-     leak_detective {
 
-         # Includes source file names and line numbers in leak detective output.
 
-         # detailed = yes
 
-         # Threshold in bytes for leaks to be reported (0 to report all).
 
-         # usage_threshold = 10240
 
-         # Threshold in number of allocations for leaks to be reported (0 to
 
-         # report all).
 
-         # usage_threshold_count = 0
 
-     }
 
-     processor {
 
-         # Section to configure the number of reserved threads per priority class
 
-         # see JOB PRIORITY MANAGEMENT in strongswan.conf(5).
 
-         priority_threads {
 
-         }
 
-     }
 
-     # Section containing a list of scripts (name = path) that are executed when
 
-     # the daemon is started.
 
-     start-scripts {
 
-     }
 
-     # Section containing a list of scripts (name = path) that are executed when
 
-     # the daemon is terminated.
 
-     stop-scripts {
 
-     }
 
-     tls {
 
-         # List of TLS encryption ciphers.
 
-         # cipher =
 
-         # List of TLS key exchange methods.
 
-         # key_exchange =
 
-         # List of TLS MAC algorithms.
 
-         # mac =
 
-         # List of TLS cipher suites.
 
-         # suites =
 
-     }
 
-     x509 {
 
-         # Discard certificates with unsupported or unknown critical extensions.
 
-         # enforce_critical = yes
 
-     }
 
- }
 
 
  |