charon.conf 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377
  1. # Options for the charon IKE daemon.
  2. charon {
  3. # Accept unencrypted ID and HASH payloads in IKEv1 Main Mode.
  4. # accept_unencrypted_mainmode_messages = no
  5. # Maximum number of half-open IKE_SAs for a single peer IP.
  6. # block_threshold = 5
  7. # Whether Certificate Revocation Lists (CRLs) fetched via HTTP or LDAP
  8. # should be saved under a unique file name derived from the public key of
  9. # the Certification Authority (CA) to /etc/ipsec.d/crls (stroke) or
  10. # /etc/swanctl/x509crl (vici), respectively.
  11. # cache_crls = no
  12. # Whether relations in validated certificate chains should be cached in
  13. # memory.
  14. # cert_cache = yes
  15. # Send Cisco Unity vendor ID payload (IKEv1 only).
  16. # cisco_unity = no
  17. # Close the IKE_SA if setup of the CHILD_SA along with IKE_AUTH failed.
  18. # close_ike_on_child_failure = no
  19. # Number of half-open IKE_SAs that activate the cookie mechanism.
  20. # cookie_threshold = 10
  21. # Delete CHILD_SAs right after they got successfully rekeyed (IKEv1 only).
  22. # delete_rekeyed = no
  23. # Delay in seconds until inbound IPsec SAs are deleted after rekeyings
  24. # (IKEv2 only).
  25. # delete_rekeyed_delay = 5
  26. # Use ANSI X9.42 DH exponent size or optimum size matched to cryptographic
  27. # strength.
  28. # dh_exponent_ansi_x9_42 = yes
  29. # Use RTLD_NOW with dlopen when loading plugins and IMV/IMCs to reveal
  30. # missing symbols immediately.
  31. # dlopen_use_rtld_now = no
  32. # DNS server assigned to peer via configuration payload (CP).
  33. # dns1 =
  34. # DNS server assigned to peer via configuration payload (CP).
  35. # dns2 =
  36. # Enable Denial of Service protection using cookies and aggressiveness
  37. # checks.
  38. # dos_protection = yes
  39. # Compliance with the errata for RFC 4753.
  40. # ecp_x_coordinate_only = yes
  41. # Free objects during authentication (might conflict with plugins).
  42. # flush_auth_cfg = no
  43. # Whether to follow IKEv2 redirects (RFC 5685).
  44. # follow_redirects = yes
  45. # Maximum size (complete IP datagram size in bytes) of a sent IKE fragment
  46. # when using proprietary IKEv1 or standardized IKEv2 fragmentation, defaults
  47. # to 1280 (use 0 for address family specific default values, which uses a
  48. # lower value for IPv4). If specified this limit is used for both IPv4 and
  49. # IPv6.
  50. # fragment_size = 1280
  51. # Name of the group the daemon changes to after startup.
  52. # group =
  53. # Timeout in seconds for connecting IKE_SAs (also see IKE_SA_INIT DROPPING).
  54. # half_open_timeout = 30
  55. # Enable hash and URL support.
  56. # hash_and_url = no
  57. # Allow IKEv1 Aggressive Mode with pre-shared keys as responder.
  58. # i_dont_care_about_security_and_use_aggressive_mode_psk = no
  59. # Whether to ignore the traffic selectors from the kernel's acquire events
  60. # for IKEv2 connections (they are not used for IKEv1).
  61. # ignore_acquire_ts = no
  62. # A space-separated list of routing tables to be excluded from route
  63. # lookups.
  64. # ignore_routing_tables =
  65. # Maximum number of IKE_SAs that can be established at the same time before
  66. # new connection attempts are blocked.
  67. # ikesa_limit = 0
  68. # Number of exclusively locked segments in the hash table.
  69. # ikesa_table_segments = 1
  70. # Size of the IKE_SA hash table.
  71. # ikesa_table_size = 1
  72. # Whether to close IKE_SA if the only CHILD_SA closed due to inactivity.
  73. # inactivity_close_ike = no
  74. # Limit new connections based on the current number of half open IKE_SAs,
  75. # see IKE_SA_INIT DROPPING in strongswan.conf(5).
  76. # init_limit_half_open = 0
  77. # Limit new connections based on the number of queued jobs.
  78. # init_limit_job_load = 0
  79. # Causes charon daemon to ignore IKE initiation requests.
  80. # initiator_only = no
  81. # Install routes into a separate routing table for established IPsec
  82. # tunnels.
  83. # install_routes = yes
  84. # Install virtual IP addresses.
  85. # install_virtual_ip = yes
  86. # The name of the interface on which virtual IP addresses should be
  87. # installed.
  88. # install_virtual_ip_on =
  89. # Check daemon, libstrongswan and plugin integrity at startup.
  90. # integrity_test = no
  91. # A comma-separated list of network interfaces that should be ignored, if
  92. # interfaces_use is specified this option has no effect.
  93. # interfaces_ignore =
  94. # A comma-separated list of network interfaces that should be used by
  95. # charon. All other interfaces are ignored.
  96. # interfaces_use =
  97. # NAT keep alive interval.
  98. # keep_alive = 20s
  99. # Plugins to load in the IKE daemon charon.
  100. # load =
  101. # Determine plugins to load via each plugin's load option.
  102. # load_modular = no
  103. # Initiate IKEv2 reauthentication with a make-before-break scheme.
  104. # make_before_break = no
  105. # Maximum number of IKEv1 phase 2 exchanges per IKE_SA to keep state about
  106. # and track concurrently.
  107. # max_ikev1_exchanges = 3
  108. # Maximum packet size accepted by charon.
  109. # max_packet = 10000
  110. # Enable multiple authentication exchanges (RFC 4739).
  111. # multiple_authentication = yes
  112. # WINS servers assigned to peer via configuration payload (CP).
  113. # nbns1 =
  114. # WINS servers assigned to peer via configuration payload (CP).
  115. # nbns2 =
  116. # UDP port used locally. If set to 0 a random port will be allocated.
  117. # port = 500
  118. # UDP port used locally in case of NAT-T. If set to 0 a random port will be
  119. # allocated. Has to be different from charon.port, otherwise a random port
  120. # will be allocated.
  121. # port_nat_t = 4500
  122. # Whether to prefer updating SAs to the path with the best route.
  123. # prefer_best_path = no
  124. # Prefer locally configured proposals for IKE/IPsec over supplied ones as
  125. # responder (disabling this can avoid keying retries due to
  126. # INVALID_KE_PAYLOAD notifies).
  127. # prefer_configured_proposals = yes
  128. # By default public IPv6 addresses are preferred over temporary ones (RFC
  129. # 4941), to make connections more stable. Enable this option to reverse
  130. # this.
  131. # prefer_temporary_addrs = no
  132. # Process RTM_NEWROUTE and RTM_DELROUTE events.
  133. # process_route = yes
  134. # How RDNs in subject DNs of certificates are matched against configured
  135. # identities (strict, reordered, or relaxed).
  136. # rdn_matching = strict
  137. # Delay in ms for receiving packets, to simulate larger RTT.
  138. # receive_delay = 0
  139. # Delay request messages.
  140. # receive_delay_request = yes
  141. # Delay response messages.
  142. # receive_delay_response = yes
  143. # Specific IKEv2 message type to delay, 0 for any.
  144. # receive_delay_type = 0
  145. # Size of the AH/ESP replay window, in packets.
  146. # replay_window = 32
  147. # Base to use for calculating exponential back off, see IKEv2 RETRANSMISSION
  148. # in strongswan.conf(5).
  149. # retransmit_base = 1.8
  150. # Maximum jitter in percent to apply randomly to calculated retransmission
  151. # timeout (0 to disable).
  152. # retransmit_jitter = 0
  153. # Upper limit in seconds for calculated retransmission timeout (0 to
  154. # disable).
  155. # retransmit_limit = 0
  156. # Timeout in seconds before sending first retransmit.
  157. # retransmit_timeout = 4.0
  158. # Number of times to retransmit a packet before giving up.
  159. # retransmit_tries = 5
  160. # Interval in seconds to use when retrying to initiate an IKE_SA (e.g. if
  161. # DNS resolution failed), 0 to disable retries.
  162. # retry_initiate_interval = 0
  163. # Initiate CHILD_SA within existing IKE_SAs (always enabled for IKEv1).
  164. # reuse_ikesa = yes
  165. # Numerical routing table to install routes to.
  166. # routing_table =
  167. # Priority of the routing table.
  168. # routing_table_prio =
  169. # Whether to use RSA with PSS padding instead of PKCS#1 padding by default.
  170. # rsa_pss = no
  171. # Delay in ms for sending packets, to simulate larger RTT.
  172. # send_delay = 0
  173. # Delay request messages.
  174. # send_delay_request = yes
  175. # Delay response messages.
  176. # send_delay_response = yes
  177. # Specific IKEv2 message type to delay, 0 for any.
  178. # send_delay_type = 0
  179. # Send strongSwan vendor ID payload
  180. # send_vendor_id = no
  181. # Whether to enable Signature Authentication as per RFC 7427.
  182. # signature_authentication = yes
  183. # Whether to enable constraints against IKEv2 signature schemes.
  184. # signature_authentication_constraints = yes
  185. # Value mixed into the local IKE SPIs after applying spi_mask.
  186. # spi_label = 0x0000000000000000
  187. # Mask applied to local IKE SPIs before mixing in spi_label (bits set will
  188. # be replaced with spi_label).
  189. # spi_mask = 0x0000000000000000
  190. # The upper limit for SPIs requested from the kernel for IPsec SAs.
  191. # spi_max = 0xcfffffff
  192. # The lower limit for SPIs requested from the kernel for IPsec SAs.
  193. # spi_min = 0xc0000000
  194. # Number of worker threads in charon.
  195. # threads = 16
  196. # Name of the user the daemon changes to after startup.
  197. # user =
  198. crypto_test {
  199. # Benchmark crypto algorithms and order them by efficiency.
  200. # bench = no
  201. # Buffer size used for crypto benchmark.
  202. # bench_size = 1024
  203. # Time in ms during which crypto algorithm performance is measured.
  204. # bench_time = 50
  205. # Test crypto algorithms during registration (requires test vectors
  206. # provided by the test-vectors plugin).
  207. # on_add = no
  208. # Test crypto algorithms on each crypto primitive instantiation.
  209. # on_create = no
  210. # Strictly require at least one test vector to enable an algorithm.
  211. # required = no
  212. # Whether to test RNG with TRUE quality; requires a lot of entropy.
  213. # rng_true = no
  214. }
  215. host_resolver {
  216. # Maximum number of concurrent resolver threads (they are terminated if
  217. # unused).
  218. # max_threads = 3
  219. # Minimum number of resolver threads to keep around.
  220. # min_threads = 0
  221. }
  222. leak_detective {
  223. # Includes source file names and line numbers in leak detective output.
  224. # detailed = yes
  225. # Threshold in bytes for leaks to be reported (0 to report all).
  226. # usage_threshold = 10240
  227. # Threshold in number of allocations for leaks to be reported (0 to
  228. # report all).
  229. # usage_threshold_count = 0
  230. }
  231. processor {
  232. # Section to configure the number of reserved threads per priority class
  233. # see JOB PRIORITY MANAGEMENT in strongswan.conf(5).
  234. priority_threads {
  235. }
  236. }
  237. # Section containing a list of scripts (name = path) that are executed when
  238. # the daemon is started.
  239. start-scripts {
  240. }
  241. # Section containing a list of scripts (name = path) that are executed when
  242. # the daemon is terminated.
  243. stop-scripts {
  244. }
  245. tls {
  246. # List of TLS encryption ciphers.
  247. # cipher =
  248. # List of TLS key exchange methods.
  249. # key_exchange =
  250. # List of TLS MAC algorithms.
  251. # mac =
  252. # List of TLS cipher suites.
  253. # suites =
  254. }
  255. x509 {
  256. # Discard certificates with unsupported or unknown critical extensions.
  257. # enforce_critical = yes
  258. }
  259. }