charon.opt 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439
  1. charon {}
  2. Options for the charon IKE daemon.
  3. Options for the charon IKE daemon.
  4. **Note**: Many of the options in this section also apply to **charon-cmd**
  5. and other **charon** derivatives. Just use their respective name (e.g.
  6. **charon-cmd** instead of **charon**). For many options defaults can be
  7. defined in the **libstrongswan** section.
  8. charon.accept_unencrypted_mainmode_messages = no
  9. Accept unencrypted ID and HASH payloads in IKEv1 Main Mode.
  10. Accept unencrypted ID and HASH payloads in IKEv1 Main Mode.
  11. Some implementations send the third Main Mode message unencrypted, probably
  12. to find the PSKs for the specified ID for authentication. This is very
  13. similar to Aggressive Mode, and has the same security implications: A
  14. passive attacker can sniff the negotiated Identity, and start brute forcing
  15. the PSK using the HASH payload.
  16. It is recommended to keep this option to no, unless you know exactly
  17. what the implications are and require compatibility to such devices (for
  18. example, some SonicWall boxes).
  19. charon.block_threshold = 5
  20. Maximum number of half-open IKE_SAs for a single peer IP.
  21. charon.cert_cache = yes
  22. Whether relations in validated certificate chains should be cached in
  23. memory.
  24. charon.cache_crls = no
  25. Whether Certificate Revocation Lists (CRLs) fetched via HTTP or LDAP should
  26. be saved under a unique file name derived from the public key of the
  27. Certification Authority (CA) to **/etc/ipsec.d/crls** (stroke) or
  28. **/etc/swanctl/x509crl** (vici), respectively.
  29. charon.cisco_unity = no
  30. Send Cisco Unity vendor ID payload (IKEv1 only).
  31. charon.close_ike_on_child_failure = no
  32. Close the IKE_SA if setup of the CHILD_SA along with IKE_AUTH failed.
  33. charon.cookie_threshold = 10
  34. Number of half-open IKE_SAs that activate the cookie mechanism.
  35. charon.crypto_test.bench = no
  36. Benchmark crypto algorithms and order them by efficiency.
  37. charon.crypto_test.bench_size = 1024
  38. Buffer size used for crypto benchmark.
  39. charon.crypto_test.bench_time = 50
  40. Time in ms during which crypto algorithm performance is measured.
  41. charon.crypto_test.on_add = no
  42. Test crypto algorithms during registration (requires test vectors provided
  43. by the _test-vectors_ plugin).
  44. charon.crypto_test.on_create = no
  45. Test crypto algorithms on each crypto primitive instantiation.
  46. charon.crypto_test.required = no
  47. Strictly require at least one test vector to enable an algorithm.
  48. charon.crypto_test.rng_true = no
  49. Whether to test RNG with TRUE quality; requires a lot of entropy.
  50. charon.delete_rekeyed = no
  51. Delete CHILD_SAs right after they got successfully rekeyed (IKEv1 only).
  52. Delete CHILD_SAs right after they got successfully rekeyed (IKEv1 only).
  53. Reduces the number of stale CHILD_SAs in scenarios with a lot of rekeyings.
  54. However, this might cause problems with implementations that continue to
  55. use rekeyed SAs until they expire.
  56. charon.delete_rekeyed_delay = 5
  57. Delay in seconds until inbound IPsec SAs are deleted after rekeyings (IKEv2
  58. only).
  59. Delay in seconds until inbound IPsec SAs are deleted after rekeyings (IKEv2
  60. only). To process delayed packets the inbound part of a CHILD_SA is kept
  61. installed up to the configured number of seconds after it got replaced
  62. during a rekeying. If set to 0 the CHILD_SA will be kept installed until it
  63. expires (if no lifetime is set it will be destroyed immediately).
  64. charon.dh_exponent_ansi_x9_42 = yes
  65. Use ANSI X9.42 DH exponent size or optimum size matched to cryptographic
  66. strength.
  67. charon.dlopen_use_rtld_now = no
  68. Use RTLD_NOW with dlopen when loading plugins and IMV/IMCs to reveal missing
  69. symbols immediately.
  70. charon.dns1
  71. DNS server assigned to peer via configuration payload (CP).
  72. charon.dns2
  73. DNS server assigned to peer via configuration payload (CP).
  74. charon.dos_protection = yes
  75. Enable Denial of Service protection using cookies and aggressiveness checks.
  76. charon.ecp_x_coordinate_only = yes
  77. Compliance with the errata for RFC 4753.
  78. charon.flush_auth_cfg = no
  79. Free objects during authentication (might conflict with plugins).
  80. If enabled objects used during authentication (certificates, identities
  81. etc.) are released to free memory once an IKE_SA is established. Enabling
  82. this might conflict with plugins that later need access to e.g. the used
  83. certificates.
  84. charon.follow_redirects = yes
  85. Whether to follow IKEv2 redirects (RFC 5685).
  86. charon.fragment_size = 1280
  87. Maximum size (complete IP datagram size in bytes) of a sent IKE fragment
  88. when using proprietary IKEv1 or standardized IKEv2 fragmentation, defaults
  89. to 1280 (use 0 for address family specific default values, which uses a
  90. lower value for IPv4). If specified this limit is used for both IPv4 and
  91. IPv6.
  92. charon.group
  93. Name of the group the daemon changes to after startup.
  94. charon.half_open_timeout = 30
  95. Timeout in seconds for connecting IKE_SAs (also see IKE_SA_INIT DROPPING).
  96. charon.hash_and_url = no
  97. Enable hash and URL support.
  98. charon.host_resolver.max_threads = 3
  99. Maximum number of concurrent resolver threads (they are terminated if
  100. unused).
  101. charon.host_resolver.min_threads = 0
  102. Minimum number of resolver threads to keep around.
  103. charon.i_dont_care_about_security_and_use_aggressive_mode_psk = no
  104. Allow IKEv1 Aggressive Mode with pre-shared keys as responder.
  105. If enabled responders are allowed to use IKEv1 Aggressive Mode with
  106. pre-shared keys, which is discouraged due to security concerns (offline
  107. attacks on the openly transmitted hash of the PSK).
  108. charon.ignore_routing_tables
  109. A space-separated list of routing tables to be excluded from route lookups.
  110. charon.ignore_acquire_ts = no
  111. Whether to ignore the traffic selectors from the kernel's acquire events for
  112. IKEv2 connections (they are not used for IKEv1).
  113. If this is disabled the traffic selectors from the kernel's acquire events,
  114. which are derived from the triggering packet, are prepended to the traffic
  115. selectors from the configuration for IKEv2 connection. By enabling this,
  116. such specific traffic selectors will be ignored and only the ones in the
  117. config will be sent. This always happens for IKEv1 connections as the
  118. protocol only supports one set of traffic selectors per CHILD_SA.
  119. charon.ikesa_limit = 0
  120. Maximum number of IKE_SAs that can be established at the same time before
  121. new connection attempts are blocked.
  122. charon.ikesa_table_segments = 1
  123. Number of exclusively locked segments in the hash table.
  124. charon.ikesa_table_size = 1
  125. Size of the IKE_SA hash table.
  126. charon.inactivity_close_ike = no
  127. Whether to close IKE_SA if the only CHILD_SA closed due to inactivity.
  128. charon.init_limit_half_open = 0
  129. Limit new connections based on the current number of half open IKE_SAs, see
  130. IKE_SA_INIT DROPPING in **strongswan.conf**(5).
  131. charon.init_limit_job_load = 0
  132. Limit new connections based on the number of queued jobs.
  133. Limit new connections based on the number of jobs currently queued for
  134. processing (see IKE_SA_INIT DROPPING).
  135. charon.initiator_only = no
  136. Causes charon daemon to ignore IKE initiation requests.
  137. charon.install_routes = yes
  138. Install routes into a separate routing table for established IPsec tunnels.
  139. charon.install_virtual_ip = yes
  140. Install virtual IP addresses.
  141. charon.install_virtual_ip_on
  142. The name of the interface on which virtual IP addresses should be installed.
  143. The name of the interface on which virtual IP addresses should be installed.
  144. If not specified the addresses will be installed on the outbound interface.
  145. charon.integrity_test = no
  146. Check daemon, libstrongswan and plugin integrity at startup.
  147. charon.interfaces_ignore
  148. A comma-separated list of network interfaces that should be ignored, if
  149. **interfaces_use** is specified this option has no effect.
  150. charon.interfaces_use
  151. A comma-separated list of network interfaces that should be used by charon.
  152. All other interfaces are ignored.
  153. charon.keep_alive = 20s
  154. NAT keep alive interval.
  155. charon.leak_detective.detailed = yes
  156. Includes source file names and line numbers in leak detective output.
  157. charon.leak_detective.usage_threshold = 10240
  158. Threshold in bytes for leaks to be reported (0 to report all).
  159. charon.leak_detective.usage_threshold_count = 0
  160. Threshold in number of allocations for leaks to be reported (0 to report
  161. all).
  162. charon.load
  163. Plugins to load in the IKE daemon charon.
  164. charon.load_modular = no
  165. Determine plugins to load via each plugin's load option.
  166. If enabled, the list of plugins to load is determined via the value of the
  167. _charon.plugins.<name>.load_ options. In addition to a simple boolean flag
  168. that option may take an integer value indicating the priority of a plugin,
  169. which would influence the order of a plugin in the plugin list (the default
  170. is 1). If two plugins have the same priority their order in the default
  171. plugin list is preserved. Enabled plugins not found in that list are ordered
  172. alphabetically before other plugins with the same priority.
  173. charon.max_ikev1_exchanges = 3
  174. Maximum number of IKEv1 phase 2 exchanges per IKE_SA to keep state about and
  175. track concurrently.
  176. charon.max_packet = 10000
  177. Maximum packet size accepted by charon.
  178. charon.make_before_break = no
  179. Initiate IKEv2 reauthentication with a make-before-break scheme.
  180. Initiate IKEv2 reauthentication with a make-before-break instead of a
  181. break-before-make scheme. Make-before-break uses overlapping IKE and
  182. CHILD_SA during reauthentication by first recreating all new SAs before
  183. deleting the old ones. This behavior can be beneficial to avoid connectivity
  184. gaps during reauthentication, but requires support for overlapping SAs by
  185. the peer. strongSwan can handle such overlapping SAs since version 5.3.0.
  186. charon.multiple_authentication = yes
  187. Enable multiple authentication exchanges (RFC 4739).
  188. charon.nbns1
  189. WINS servers assigned to peer via configuration payload (CP).
  190. charon.nbns2
  191. WINS servers assigned to peer via configuration payload (CP).
  192. charon.port = 500
  193. UDP port used locally. If set to 0 a random port will be allocated.
  194. charon.port_nat_t = 4500
  195. UDP port used locally in case of NAT-T. If set to 0 a random port will be
  196. allocated. Has to be different from **charon.port**, otherwise a random
  197. port will be allocated.
  198. charon.prefer_best_path = no
  199. Whether to prefer updating SAs to the path with the best route.
  200. By default, charon keeps SAs on the routing path with addresses it
  201. previously used if that path is still usable. By setting this option to
  202. yes, it tries more aggressively to update SAs with MOBIKE on routing
  203. priority changes using the cheapest path. This adds more noise, but allows
  204. to dynamically adapt SAs to routing priority changes. This option has no
  205. effect if MOBIKE is not supported or disabled.
  206. charon.prefer_configured_proposals = yes
  207. Prefer locally configured proposals for IKE/IPsec over supplied ones as
  208. responder (disabling this can avoid keying retries due to INVALID_KE_PAYLOAD
  209. notifies).
  210. charon.prefer_temporary_addrs = no
  211. By default public IPv6 addresses are preferred over temporary ones (RFC
  212. 4941), to make connections more stable. Enable this option to reverse this.
  213. charon.process_route = yes
  214. Process RTM_NEWROUTE and RTM_DELROUTE events.
  215. charon.processor.priority_threads {}
  216. Section to configure the number of reserved threads per priority class
  217. see JOB PRIORITY MANAGEMENT in **strongswan.conf**(5).
  218. charon.rdn_matching = strict
  219. How RDNs in subject DNs of certificates are matched against configured
  220. identities (_strict_, _reordered_, or _relaxed_).
  221. How RDNs in subject DNs of certificates are matched against configured
  222. identities. Possible values are _strict_ (the default), _reordered_, and
  223. _relaxed_. With _strict_ the number, type and order of all RDNs has to
  224. match, wildcards (*) for the values of RDNs are allowed (that's the case
  225. for all three variants). Using _reordered_ also matches DNs if the RDNs
  226. appear in a different order, the number and type still has to match.
  227. Finally, _relaxed_ also allows matches of DNs that contain more RDNs than
  228. the configured identity (missing RDNs are treated like a wildcard match).
  229. Note that _reordered_ and _relaxed_ impose a considerable overhead on memory
  230. usage and runtime, in particular, for mismatches, compared to _strict_.
  231. charon.receive_delay = 0
  232. Delay in ms for receiving packets, to simulate larger RTT.
  233. charon.receive_delay_response = yes
  234. Delay response messages.
  235. charon.receive_delay_request = yes
  236. Delay request messages.
  237. charon.receive_delay_type = 0
  238. Specific IKEv2 message type to delay, 0 for any.
  239. charon.replay_window = 32
  240. Size of the AH/ESP replay window, in packets.
  241. charon.retransmit_base = 1.8
  242. Base to use for calculating exponential back off, see IKEv2 RETRANSMISSION
  243. in **strongswan.conf**(5).
  244. charon.retransmit_timeout = 4.0
  245. Timeout in seconds before sending first retransmit.
  246. charon.retransmit_tries = 5
  247. Number of times to retransmit a packet before giving up.
  248. charon.retransmit_jitter = 0
  249. Maximum jitter in percent to apply randomly to calculated retransmission
  250. timeout (0 to disable).
  251. charon.retransmit_limit = 0
  252. Upper limit in seconds for calculated retransmission timeout (0 to disable).
  253. charon.retry_initiate_interval = 0
  254. Interval in seconds to use when retrying to initiate an IKE_SA (e.g. if DNS
  255. resolution failed), 0 to disable retries.
  256. charon.reuse_ikesa = yes
  257. Initiate CHILD_SA within existing IKE_SAs (always enabled for IKEv1).
  258. charon.routing_table
  259. Numerical routing table to install routes to.
  260. charon.routing_table_prio
  261. Priority of the routing table.
  262. charon.rsa_pss = no
  263. Whether to use RSA with PSS padding instead of PKCS#1 padding by default.
  264. charon.send_delay = 0
  265. Delay in ms for sending packets, to simulate larger RTT.
  266. charon.send_delay_response = yes
  267. Delay response messages.
  268. charon.send_delay_request = yes
  269. Delay request messages.
  270. charon.send_delay_type = 0
  271. Specific IKEv2 message type to delay, 0 for any.
  272. charon.send_vendor_id = no
  273. Send strongSwan vendor ID payload
  274. charon.signature_authentication = yes
  275. Whether to enable Signature Authentication as per RFC 7427.
  276. charon.signature_authentication_constraints = yes
  277. Whether to enable constraints against IKEv2 signature schemes.
  278. If enabled, signature schemes configured in _rightauth_, in addition to
  279. getting used as constraints against signature schemes employed in the
  280. certificate chain, are also used as constraints against the signature scheme
  281. used by peers during IKEv2.
  282. charon.spi_label = 0x0000000000000000
  283. Value mixed into the local IKE SPIs after applying _spi_mask_.
  284. charon.spi_mask = 0x0000000000000000
  285. Mask applied to local IKE SPIs before mixing in _spi_label_ (bits set will
  286. be replaced with _spi_label_).
  287. charon.spi_min = 0xc0000000
  288. The lower limit for SPIs requested from the kernel for IPsec SAs.
  289. The lower limit for SPIs requested from the kernel for IPsec SAs. Should not
  290. be set lower than 0x00000100 (256), as SPIs between 1 and 255 are reserved
  291. by IANA.
  292. charon.spi_max = 0xcfffffff
  293. The upper limit for SPIs requested from the kernel for IPsec SAs.
  294. charon.start-scripts {}
  295. Section containing a list of scripts (name = path) that are executed when
  296. the daemon is started.
  297. charon.stop-scripts {}
  298. Section containing a list of scripts (name = path) that are executed when
  299. the daemon is terminated.
  300. charon.threads = 16
  301. Number of worker threads in charon.
  302. Number of worker threads in charon. Several of these are reserved for long
  303. running tasks in internal modules and plugins. Therefore, make sure you
  304. don't set this value too low. The number of idle worker threads listed in
  305. _ipsec statusall_ might be used as indicator on the number of reserved
  306. threads.
  307. charon.tls.cipher
  308. List of TLS encryption ciphers.
  309. charon.tls.key_exchange
  310. List of TLS key exchange methods.
  311. charon.tls.mac
  312. List of TLS MAC algorithms.
  313. charon.tls.suites
  314. List of TLS cipher suites.
  315. charon.user
  316. Name of the user the daemon changes to after startup.
  317. charon.x509.enforce_critical = yes
  318. Discard certificates with unsupported or unknown critical extensions.