1*106cbd59Smarkus.\" $OpenBSD: isakmpd.conf.5,v 1.76 2003/03/21 15:13:26 markus Exp $ 2e55ca143Sniklas.\" $EOM: isakmpd.conf.5,v 1.57 2000/12/21 14:43:17 ho Exp $ 32040585eSniklas.\" 444f0148dSniklas.\" Copyright (c) 1998, 1999, 2000 Niklas Hallqvist. All rights reserved. 54ca71560Sho.\" Copyright (c) 2000, 2001, 2002 H�kan Olsson. All rights reserved. 62040585eSniklas.\" 72040585eSniklas.\" Redistribution and use in source and binary forms, with or without 82040585eSniklas.\" modification, are permitted provided that the following conditions 92040585eSniklas.\" are met: 102040585eSniklas.\" 1. Redistributions of source code must retain the above copyright 112040585eSniklas.\" notice, this list of conditions and the following disclaimer. 122040585eSniklas.\" 2. Redistributions in binary form must reproduce the above copyright 132040585eSniklas.\" notice, this list of conditions and the following disclaimer in the 142040585eSniklas.\" documentation and/or other materials provided with the distribution. 152040585eSniklas.\" 3. All advertising materials mentioning features or use of this software 162040585eSniklas.\" must display the following acknowledgement: 172040585eSniklas.\" This product includes software developed by Ericsson Radio Systems. 182040585eSniklas.\" 4. The name of the author may not be used to endorse or promote products 192040585eSniklas.\" derived from this software without specific prior written permission. 202040585eSniklas.\" 212040585eSniklas.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 222040585eSniklas.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 232040585eSniklas.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 242040585eSniklas.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 252040585eSniklas.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 262040585eSniklas.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 272040585eSniklas.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 282040585eSniklas.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 292040585eSniklas.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 302040585eSniklas.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 312040585eSniklas.\" 322040585eSniklas.\" This code was written under funding by Ericsson Radio Systems. 332040585eSniklas.\" 342040585eSniklas.\" Manual page, using -mandoc macros 352040585eSniklas.\" 3672578f93Sho.Dd August 07, 2002 3758aefd4bSaaron.Dt ISAKMPD.CONF 5 382040585eSniklas.Os 392040585eSniklas.Sh NAME 402040585eSniklas.Nm isakmpd.conf 4158aefd4bSaaron.Nd configuration file for isakmpd 422040585eSniklas.Sh DESCRIPTION 4358aefd4bSaaron.Nm 4458aefd4bSaaronis the configuration file for the 452040585eSniklas.Nm isakmpd 462040585eSniklasdaemon managing security association and key management for the 4761d575f0SangelosIPsec layer of the kernel's networking stack. 482040585eSniklas.Pp 492040585eSniklasThe file is of a well known type of format called .INI style, named after 502040585eSniklasthe suffix used by an overrated windowing environment for its configuration 519615e1d4Saaronfiles. 529615e1d4SaaronThis format consists of sections, each beginning with a line looking like: 532040585eSniklas.Bd -literal 542040585eSniklas[Section name] 552040585eSniklas.Ed 562040585eSniklasBetween the brackets is the name of the section following this section header. 572040585eSniklasInside a section many tag/value pairs can be stored, each one looking like: 582040585eSniklas.Bd -literal 592040585eSniklasTag=Value 602040585eSniklas.Ed 612040585eSniklasIf the value needs more space than fits on a single line it's possible to 62a2067f52Sniklascontinue it on the next by ending the first with a backslash character 639615e1d4Saaronimmediately before the newline character. 640e2d4717SkjellThis method can extend a value for an arbitrary number of lines. 652040585eSniklas.Pp 6658aefd4bSaaronComments can be put anywhere in the file by using a hash mark 6758aefd4bSaaron.Pq Sq \&# . 680e2d4717SkjellThe comment extends to the end of the current line. 692040585eSniklas.Pp 70c5fe6c4eSniklasOften the right-hand side values consist of other section names. 71c5fe6c4eSniklasThis results in a tree structure. 720e2d4717SkjellSome values are treated as a list of several scalar values. 730e2d4717SkjellSuch lists always use a comma character as the separator. 749615e1d4SaaronSome values are formatted like this: X,Y:Z, which 75c5fe6c4eSniklasis an offer/accept syntax, where X is a value we offer and Y:Z is a range of 76c5fe6c4eSniklasaccepted values, inclusive. 77c5fe6c4eSniklas.Pp 78bad0180eShoTo activate changes to 79bad0180eSho.Nm 80bad0180eShowithout restarting 81bad0180eSho.Nm isakmpd , 82bad0180eShosend a SIGHUP signal to the daemon process. 8352e712aeSniklas.Ss Auto-generated parts of the configuration 8452e712aeSniklas.Pp 850e2d4717SkjellSome predefined section names are recognized by the daemon, avoiding the need 860e2d4717Skjellto fully specify the Main Mode transforms and Quick Mode suites, protocols, 8752e712aeSniklasand transforms. 8852e712aeSniklas.Pp 8952e712aeSniklasFor Main Mode: 9018656612Saaron.Bd -filled -compact 912039fcadSho.Ar {DES,BLF,3DES,CAST}-{MD5,SHA}[-GRP{1,2,5}][-{DSS,RSA_SIG}] 9252e712aeSniklas.Ed 9352e712aeSniklas.Pp 9452e712aeSniklasFor Quick Mode: 9518656612Saaron.Bd -filled -compact 962039fcadSho.Ar QM-{proto}[-TRP]-{cipher}[-{hash}][-PFS[-{group}]]-SUITE 972039fcadSho.Ed 982039fcadSho.Bd -literal 992039fcadSho where 1002039fcadSho {proto} is either ESP or AH 1012039fcadSho {cipher} is either DES, 3DES, CAST, BLF or AES 1022039fcadSho {hash} is either MD5, SHA or RIPEMD 1032039fcadSho {group} is either GRP1, GRP2 or GRP5 10452e712aeSniklas.Ed 10552e712aeSniklas.Pp 1060e2d4717SkjellFor example, 3DES-SHA means: 3DES encryption, SHA hash, and authorization by 10752e712aeSniklaspre-shared keys. 1080e2d4717SkjellSimilarly, QM-ESP-3DES-SHA-PFS-SUITE means: ESP protocol, 3DES encryption, 10952e712aeSniklasSHA hash, and use Perfect Forward Security. 11052e712aeSniklas.Pp 1112039fcadShoUnless explicitly stated with -GRP1, 2 or 5, transforms and PFS suites 1122039fcadShouse DH group 2. There are currently no predefined ESP+AH Quick Mode suites. 11352e712aeSniklas.Pp 1142039fcadShoThe predefinitions include some default values for the special 115419caefeShosections "General", "Keynote", "X509-certificates", and 11635ff0956Sho"Default-phase-1-configuration". 117419caefeShoThese default values are presented in the example below. 11852e712aeSniklas.Pp 11952e712aeSniklasAll autogenerated values can be overridden by manual entries by using the 12052e712aeSniklassame section and tag names in the configuration file. 121b57b191eSniklasIn particular, the default phase 1 (Main or Aggressive Mode) and phase 2 122b57b191eSniklas(Quick Mode) lifetimes can be overridden by these tags under the "General" 123b57b191eSniklassection; 124b57b191eSniklas.Pp 125b57b191eSniklas.Bd -literal 126b57b191eSniklas[General] 127b57b191eSniklasDefault-phase-1-lifetime= 3600,60:86400 128b57b191eSniklasDefault-phase-2-lifetime= 1200,60:86400 129b57b191eSniklas.Ed 1302039fcadSho.Pp 1312039fcadShoThe Main Mode lifetime currently defaults to one hour (minimum 60 1322039fcadShoseconds, maximum 1 day). The Quick Mode lifetime defaults to 20 1332039fcadShominutes (minimum 60 seconds, maximum 1 day). 13452e712aeSniklas.\"XXX Following empty .Ss works around a nroff bug, we want the new line." 13552e712aeSniklas.Ss 13652e712aeSniklas.Pp 13735ff0956ShoAlso, the default phase 1 ID can be set by creating a <Phase1-ID> 1380378d1f2Sniklassection, as shown below, and adding this tag under the "General" 1390378d1f2Sniklassection; 1400378d1f2Sniklas.Pp 1410378d1f2Sniklas.Bd -literal 1420378d1f2Sniklas[General] 1430378d1f2SniklasDefault-phase-1-ID= Phase1-ID-name 1440378d1f2Sniklas 1450378d1f2Sniklas[Phase1-ID-name] 1460378d1f2SniklasID-type= USER_FQDN 1470378d1f2SniklasName= foo@bar.com 1480378d1f2Sniklas.Ed 1490378d1f2Sniklas.\"XXX Following empty .Ss works around a nroff bug, we want the new line." 1500378d1f2Sniklas.Ss 1510378d1f2Sniklas.Pp 152c5fe6c4eSniklas.Ss Roots 153c5fe6c4eSniklas.Bl -hang -width 12n 154c5fe6c4eSniklas.It Em General 155c5fe6c4eSniklasGeneric global configuration parameters 156c5fe6c4eSniklas.Bl -tag -width 12n 15735ff0956Sho.It Em Default-phase-1-ID 15835ff0956ShoOptional default phase 1 ID name. 15935ff0956Sho.It Em Default-phase-1-lifetime 16035ff0956ShoThe default lifetime for autogenerated transforms (phase 1). 16135ff0956ShoIf unspecified, the value 3600,60:86400 is used as the default. 16235ff0956Sho.It Em Default-phase-2-lifetime 16335ff0956ShoThe default lifetime for autogenerated suites (phase 2). 16435ff0956ShoIf unspecified, the value 1200,60:86400 is used as the default. 16535ff0956Sho.It Em Default-phase-2-suites 16635ff0956ShoA list of phase 2 suites that will be used when establishing dynamic 16735ff0956ShoSAs. 16835ff0956ShoIf left unspecified, QM-ESP-3DES-SHA-PFS-SUITE is used as the default. 16935ff0956Sho.It Em Check-interval 17035ff0956ShoThe interval between watchdog checks of connections we want up at all times. 17135ff0956Sho.It Em Exchange-max-time 17235ff0956ShoHow many seconds should an exchange maximally take to setup before we 17335ff0956Shogive up. 17435ff0956Sho.It Em Listen-on 17535ff0956ShoA list of IP-addresses OK to listen on. 17635ff0956ShoThis list is used as a filter for the set of addresses the interfaces 17735ff0956Shoconfigured provides. 17835ff0956ShoThis means that we won't see if an address given here does not exist 17935ff0956Shoon this host, and thus no error is given for that case. 180447a9f3aSho.It Em Policy-file 18180c8b3dbSniklasThe name of the file that contains 1821215c700Sjmc.Xr keynote 4 1834aac73a4Saaronpolicies. 1844aac73a4SaaronThe default is "/etc/isakmpd/isakmpd.policy". 1850b880a72Sho.It Em Pubkey-directory 1860b880a72ShoThe directory in which 1870b880a72Sho.Nm 188ac1aa35bSmpechlooks for explicitly trusted public keys. 189ac1aa35bSmpechThe default is "/etc/isakmpd/pubkeys". 190ac1aa35bSmpechRead 1910b880a72Sho.Xr isakmpd 8 1920b880a72Shofor the required naming convention of the files in here. 19335ff0956Sho.It Em Retransmits 19435ff0956ShoHow many times should a message be retransmitted before giving up. 19535ff0956Sho.It Em Shared-SADB 19635ff0956ShoIf this tag is defined, whatever the value is, some semantics of 19735ff0956Sho.Nm 19835ff0956Shoare changed so that multiple instances can run on top of one SADB 19935ff0956Shoand setup SAs with each other. 20035ff0956ShoSpecifically this means replay 20135ff0956Shoprotection will not be asked for, and errors that can occur when 20235ff0956Shoupdating an SA with its parameters a 2nd time will be ignored. 203c5fe6c4eSniklas.El 204c5fe6c4eSniklas.It Em Phase 1 205c5fe6c4eSniklasISAKMP SA negotiation parameter root 206c5fe6c4eSniklas.Bl -tag -width 12n 207c5fe6c4eSniklas.It Em <IP-address> 2089615e1d4SaaronA name of the ISAKMP peer at the given IP-address. 209cc3c8b42Sniklas.It Em Default 210ac1aa35bSmpechA name of the default ISAKMP peer. 21135ff0956ShoIncoming phase 1 connections from other IP-addresses will use this peer name. 212cc3c8b42Sniklas.It "" 2139615e1d4SaaronThis name is used as the section name for further information to be found. 2149615e1d4SaaronLook at <ISAKMP-peer> below. 215c5fe6c4eSniklas.El 216c5fe6c4eSniklas.It Em Phase 2 217c5fe6c4eSniklasIPsec SA negotiation parameter root 218c5fe6c4eSniklas.Bl -tag -width 12n 219c5fe6c4eSniklas.It Em Connections 22061d575f0SangelosA list of directed IPsec "connection" names that should be brought up 2212ddc24cbSniklasautomatically, either on first use if the system supports it, or at 2229615e1d4Saaronstartup of the daemon. 2239615e1d4SaaronThese names are section names where further information can be found. 22461d575f0SangelosLook at <IPsec-connection> below. 22544143af3SderaadtNormally any connections mentioned here are treated as part of the 22680baf197Sniklas"Passive-connection" list we present below, however there is a 2279615e1d4Saaronflag: "Active-only" that disables this behaviour. 22861d575f0SangelosThis too is mentioned in the <IPsec-connection> section, in the "Flags" tag. 22980baf197Sniklas.It Em Passive-connections 23061d575f0SangelosA list of IPsec "connection" names we recognize and accept initiations for. 2319615e1d4SaaronThese names are section names where further information can be found. 23261d575f0SangelosLook at <IPsec-connection> below. 2339615e1d4SaaronCurrently only the Local-ID and Remote-ID tags 23480baf197Sniklasare looked at in those sections, as they are matched against the IDs given 23580baf197Sniklasby the initiator. 236c5fe6c4eSniklas.El 237b57b191eSniklas.It Em KeyNote 238b57b191eSniklas.Bl -tag -width 12n 239b57b191eSniklas.It Em Credential-directory 240b57b191eSniklasA directory containing directories named after IDs (IP 241b57b191eSniklasaddresses, ``user@domain'', or hostnames) that contain files named 242b57b191eSniklas``credentials'' and ``private_key''. 243b57b191eSniklas.Pp 244b57b191eSniklasThe credentials file contains 245b57b191eSniklas.Xr keynote 4 246b57b191eSniklascredentials that are sent to a remote IKE daemon when we use the 247b57b191eSniklasassociated ID, or credentials that we may want to consider when doing 248ac1aa35bSmpechan exchange with a remote IKE daemon that uses that ID. 249ac1aa35bSmpechNote that, in the former case, the last credential in the file 250ac1aa35bSmpechMUST contain our public key in its Licensees field. 251ac1aa35bSmpechMore than one credentials may exist in the file. 252ac1aa35bSmpechThey are separated by whitelines (the format is essentially the same as 253ac1aa35bSmpechthat of the policy file). 254ac1aa35bSmpechThe credentials are of the same format as the policies described in 255b57b191eSniklas.Xr isakmpd.policy 5 . 256b57b191eSniklasThe only difference is that the Authorizer field contains a public 257ac1aa35bSmpechkey, and the assertion is signed. 258ac1aa35bSmpechSigned assertions can be generated using the 259b57b191eSniklas.Xr keynote 1 260b57b191eSniklasutility. 261b57b191eSniklas.Pp 262b57b191eSniklasThe private_key file contains the private RSA key we use for 263ac1aa35bSmpechauthentication. 264ac1aa35bSmpechIf the directory (and the files) exist, they take precedence over X509-based 265ac1aa35bSmpechauthentication. 266b57b191eSniklas.El 267fb1921ccSniklas.It Em X509-Certificates 268fb1921ccSniklas.Bl -tag -width 12n 26935ff0956Sho.It Em Accept-self-signed 27035ff0956ShoIf this tag is defined, whatever the value is, certificates that 27135ff0956Shodo not originate from a trusted CA but are self-signed will be 27235ff0956Shoaccepted. 273fb1921ccSniklas.It Em Ca-directory 274fb1921ccSniklasA directory containing PEM certificates of certification authorities 275ac1aa35bSmpechthat we trust to sign other certificates. 276ac1aa35bSmpechNote that for a CA to be really trusted, it needs to be somehow 277ac1aa35bSmpechreferred to by policy, in 278e5814869Sangelos.Xr isakmpd.policy 5 . 279e5814869SangelosThe certificates in this directory are used for the actual X.509 280e5814869Sangelosauthentication and for cross-referencing policies that refer to 281ac1aa35bSmpechDistinguished Names (DNs). 282ac1aa35bSmpechKeeping a separate directory (as opposed to integrating policies 283ac1aa35bSmpechand X.509 CA certificates) allows for maintenance of a list of 284ac1aa35bSmpech"well known" CAs without actually having to trust all (or any) of them. 285fb1921ccSniklas.It Em Cert-directory 286fb1921ccSniklasA directory containing PEM certificates that we trust to be valid. 287fb1921ccSniklasThese certificates are used in preference to those passed in messages and 2880e2d4717Skjellare required to have a subjectAltName extension containing the certificate 2890e2d4717Skjellholder identity; usually IP address, FQDN, or User FQDN, as provided by 2900e2d4717Skjell.Xr certpatch 8 . 291954b1b31Sniklas.It Em Private-key 292954b1b31SniklasThe private key matching the public key of our certificate (which should be 2930e2d4717Skjellin the "Cert-directory", and have an appropriate subjectAltName field). 294fb1921ccSniklas.El 295c5fe6c4eSniklas.El 296c5fe6c4eSniklas.Ss Referred-to sections 297c5fe6c4eSniklas.Bl -hang -width 12n 298c5fe6c4eSniklas.It Em <ISAKMP-peer> 299c5fe6c4eSniklasParameters for negotiation with an ISAKMP peer 300c5fe6c4eSniklas.Bl -tag -width 12n 301c5fe6c4eSniklas.It Em Phase 302c5fe6c4eSniklasThe constant 303c5fe6c4eSniklas.Li 1 , 30461d575f0Sangelosas ISAKMP-peers and IPsec-connections 305c5fe6c4eSniklasreally are handled by the same code inside isakmpd. 306c5fe6c4eSniklas.It Em Transport 307cc3c8b42SniklasThe name of the transport protocol, defaults to 308cc3c8b42Sniklas.Li UDP . 309cc3c8b42Sniklas.It Em Port 310cc3c8b42SniklasIn case of 311cc3c8b42Sniklas.Li UDP , 312cc3c8b42Sniklasthe 313cc3c8b42Sniklas.Li UDP 314cc3c8b42Sniklasport number to send to. 315cc3c8b42SniklasThis is optional, the 316cc3c8b42Sniklasdefault value is 500 which is the IANA-registered number for ISAKMP. 317a2067f52Sniklas.It Em Local-address 318e2220ba8SniklasThe Local IP-address to use, if we are multi-homed, or have aliases. 319c5fe6c4eSniklas.It Em Address 320cc3c8b42SniklasIf existent, the IP-address of the peer. 321c5fe6c4eSniklas.It Em Configuration 3229615e1d4SaaronThe name of the ISAKMP-configuration section to use. 3239615e1d4SaaronLook at <ISAKMP-configuration> below. 32435ff0956ShoIf unspecified, defaults to "Default-phase-1-configuration". 325c5fe6c4eSniklas.It Em Authentication 326cc3c8b42SniklasIf existent, authentication data for this specific peer. 3279615e1d4SaaronIn the case of preshared key, this is the key value itself. 3286a8478f3Sniklas.It Em ID 3296a8478f3SniklasIf existent, the name of the section that describes the 3304aac73a4Saaronlocal client ID that we should present to our peer. 3314aac73a4SaaronIf not present, it 3326a8478f3Sniklasdefaults to the address of the local interface we are sending packets 3334aac73a4Saaronover to the remote daemon. 3344aac73a4SaaronLook at <Phase1-ID> below. 335a2067f52Sniklas.It Em Remote-ID 336a2067f52SniklasIf existent, the name of the section that describes the remote client 337a2067f52SniklasID we expect the remote daemon to send us. 338a2067f52SniklasIf not present, it defaults to the address of the remote daemon. 339a2067f52SniklasLook at <Phase1-ID> below. 3402ddc24cbSniklas.It Em Flags 3412ddc24cbSniklasA comma-separated list of flags controlling the further 3429615e1d4Saaronhandling of the ISAKMP SA. 3439615e1d4SaaronCurrently there are no specific ISAKMP SA flags defined. 344c5fe6c4eSniklas.El 3456a8478f3Sniklas.It Em <Phase1-ID> 3466a8478f3Sniklas.Bl -tag -width 12n 3476a8478f3Sniklas.It Em ID-type 348d8ca7c44ShoThe ID type as given by the RFC specifications. 34935ff0956ShoFor phase 1 this is currently 3506a8478f3Sniklas.Li IPV4_ADDR , 3516a8478f3Sniklas.Li IPV4_ADDR_SUBNET , 352d8ca7c44Sho.Li IPV6_ADDR , 353d8ca7c44Sho.Li IPV6_ADDR_SUBNET , 3546a8478f3Sniklas.Li FQDN , 355d8ca7c44Sho.Li USER_FQDN 3566a8478f3Sniklasor 3575bc978dfSangelos.Li KEY_ID . 3586a8478f3Sniklas.It Em Address 3596a8478f3SniklasIf the ID-type is 360d8ca7c44Sho.Li IPV4_ADDR 361d8ca7c44Shoor 362d8ca7c44Sho.Li IPV6_ADDR , 3636a8478f3Sniklasthis tag should exist and be an IP-address. 3646a8478f3Sniklas.It Em Network 3656a8478f3SniklasIf the ID-type is 3666a8478f3Sniklas.Li IPV4_ADDR_SUBNET 367d8ca7c44Shoor 368d8ca7c44Sho.Li IPV6_ADDR_SUBNET 3696a8478f3Sniklasthis tag should exist and 3706a8478f3Sniklasbe a network address. 3716a8478f3Sniklas.It Em Netmask 3726a8478f3SniklasIf the ID-type is 3736a8478f3Sniklas.Li IPV4_ADDR_SUBNET 374d8ca7c44Shoor 375d8ca7c44Sho.Li IPV6_ADDR_SUBNET 3766a8478f3Sniklasthis tag should exist and 3776a8478f3Sniklasbe a network subnet mask. 3786a8478f3Sniklas.It Em Name 3796a8478f3SniklasIf the ID-type is 3805bc978dfSangelos.Li FQDN , 381d8ca7c44Sho.Li USER_FQDN 3825bc978dfSangelosor 3835bc978dfSangelos.Li KEY_ID , 3845bc978dfSangelosthis tag should exist and contain a domain name, user@domain, or 3855bc978dfSangelosother identifying string respectively. 3863f167ca4Sangelos.Pp 3873f167ca4SangelosIn the case of 3883f167ca4Sangelos.Li KEY_ID , 3893f167ca4Sangelosnote that the IKE protocol allows any octet sequence to be sent or 3903f167ca4Sangelosreceived under this payload, potentially including non-printable 3913f167ca4Sangelosones. 3921215c700Sjmc.Xr isakmpd 8 3933f167ca4Sangeloscan only transmit printable 3943f167ca4Sangelos.Li KEY_ID 3953f167ca4Sangelospayloads, but can receive and process arbitrary 3963f167ca4Sangelos.Li KEY_ID 3973f167ca4Sangelospayloads. 3983f167ca4SangelosThis effectively means that non-printable 3993f167ca4Sangelos.Li KEY_ID 4003f167ca4Sangelosremote identities cannot be verified through this means, although it 4013f167ca4Sangelosis still possible to do so through 4023f167ca4Sangelos.Xr isakmpd.policy 5 . 4036a8478f3Sniklas.El 404c5fe6c4eSniklas.It Em <ISAKMP-configuration> 405c5fe6c4eSniklas.Bl -tag -width 12n 406c5fe6c4eSniklas.It Em DOI 4079615e1d4SaaronThe domain of interpretation as given by the RFCs. 4089615e1d4SaaronNormally 409c5fe6c4eSniklas.Li IPSEC . 410b57b191eSniklasIf unspecified, defaults to 411b57b191eSniklas.Li IPSEC . 412c5fe6c4eSniklas.It Em EXCHANGE_TYPE 4139615e1d4SaaronThe exchange type as given by the RFCs. 4149615e1d4SaaronFor main mode this is 4159f078bd8Sniklas.Li ID_PROT 4169f078bd8Sniklasand for aggressive mode it is 4179f078bd8Sniklas.Li AGGRESSIVE . 418c5fe6c4eSniklas.It Em Transforms 419c5fe6c4eSniklasA list of proposed transforms to use for protecting the 4209615e1d4SaaronISAKMP traffic. 4219615e1d4SaaronThese are actually names for sections 4229615e1d4Saaronfurther describing the transforms. 4239615e1d4SaaronLook at <ISAKMP-transform> below. 424c5fe6c4eSniklas.El 425c5fe6c4eSniklas.It Em <ISAKMP-transform> 426c5fe6c4eSniklas.Bl -tag -width 12n 427c5fe6c4eSniklas.It Em ENCRYPTION_ALGORITHM 428850f7173SniklasThe encryption algorithm as the RFCs name it, or ANY to denote that any 429850f7173Sniklasencryption algorithm proposed will be accepted. 430c5fe6c4eSniklas.It Em KEY_LENGTH 431c5fe6c4eSniklasFor encryption algorithms with variable key length, this is 4329615e1d4Saaronwhere the offered/accepted keylengths are described. 4339615e1d4SaaronThe value is of the offer-accept kind described above. 434c5fe6c4eSniklas.It Em HASH_ALGORITHM 435850f7173SniklasThe hash algorithm as the RFCs name it, or ANY. 436c5fe6c4eSniklas.It Em AUTHENTICATION_METHOD 437850f7173SniklasThe authentication method as the RFCs name it, or ANY. 438c5fe6c4eSniklas.It Em GROUP_DESCRIPTION 4399615e1d4SaaronThe group used for Diffie-Hellman exponentiations, or ANY. 44044143af3SderaadtThe names are symbolic, like 441c5fe6c4eSniklas.Li MODP_768 , MODP_1024 , EC_155 442c5fe6c4eSniklasand 443c5fe6c4eSniklas.Li EC_185 . 444850f7173Sniklas.It Em PRF 445850f7173SniklasThe algorithm to use for the keyed pseudo-random function (used for key 44635ff0956Shoderivation and authentication in phase 1), or ANY. 447c5fe6c4eSniklas.It Em Life 4484aac73a4SaaronA list of lifetime descriptions, or ANY. 4494aac73a4SaaronIn the former case, each 450850f7173Sniklaselement is in itself a name of the section that defines the lifetime. 4514aac73a4SaaronLook at <Lifetime> below. 4524aac73a4SaaronIf it is set to ANY, then any type of 453850f7173Sniklasproposed lifetime type and value will be accepted. 454c5fe6c4eSniklas.El 455c5fe6c4eSniklas.It Em <Lifetime> 456c5fe6c4eSniklas.Bl -tag -width 12n 457c5fe6c4eSniklas.It Em LIFE_TYPE 458c5fe6c4eSniklas.Li SECONDS 459c5fe6c4eSniklasor 460e55ca143Sniklas.Li KILOBYTES 4614aac73a4Saarondepending on the type of the duration. 4624aac73a4SaaronNotice that this field may NOT be set to ANY. 463c5fe6c4eSniklas.It Em LIFE_DURATION 4644aac73a4SaaronAn offer/accept kind of value, see above. 4654aac73a4SaaronCan also be set to ANY. 466c5fe6c4eSniklas.El 46761d575f0Sangelos.It Em <IPsec-connection> 468c5fe6c4eSniklas.Bl -tag -width 12n 469c5fe6c4eSniklas.It Em Phase 470c5fe6c4eSniklasThe constant 471c5fe6c4eSniklas.Li 2 , 47261d575f0Sangelosas ISAKMP-peers and IPsec-connections 473c5fe6c4eSniklasreally are handled by the same code inside isakmpd. 474c5fe6c4eSniklas.It Em ISAKMP-peer 475c5fe6c4eSniklasThe name of the ISAKMP-peer which to talk to in order to 4769615e1d4Saaronset up this connection. 4779615e1d4SaaronThe value is the name of an <ISAKMP-peer> section. 4789615e1d4SaaronSee above. 479c5fe6c4eSniklas.It Em Configuration 48061d575f0SangelosThe name of the IPsec-configuration section to use. 48161d575f0SangelosLook at <IPsec-configuration> below. 482c5fe6c4eSniklas.It Em Local-ID 483c5fe6c4eSniklasIf existent, the name of the section that describes the 484c5fe6c4eSniklasoptional local client ID that we should present to our peer. 48580baf197SniklasIt is also used when we act as responders to find out what 48661d575f0Sangelos<IPsec-connection> we are dealing with. 48761d575f0SangelosLook at <IPsec-ID> below. 488c5fe6c4eSniklas.It Em Remote-ID 489c5fe6c4eSniklasIf existent, the name of the section that describes the 490c5fe6c4eSniklasoptional remote client ID that we should present to our peer. 49180baf197SniklasIt is also used when we act as responders to find out what 49261d575f0Sangelos<IPsec-connection> we are dealing with. 49361d575f0SangelosLook at <IPsec-ID> below. 49413a99464Sniklas.It Em Flags 49513a99464SniklasA comma-separated list of flags controlling the further 49661d575f0Sangeloshandling of the IPsec SA. 4979615e1d4SaaronCurrently only one flag is defined: 49880baf197Sniklas.Bl -tag -width 12n 49980baf197Sniklas.It Em Active-only 50061d575f0SangelosIf this flag is given and this <IPsec-connection> is part of the phase 2 50180baf197Sniklasconnections we automatically keep up, it will not automatically be used for 50280baf197Sniklasaccepting connections from the peer. 50380baf197Sniklas.El 504c5fe6c4eSniklas.El 50561d575f0Sangelos.It Em <IPsec-configuration> 506c5fe6c4eSniklas.Bl -tag -width 12n 507c5fe6c4eSniklas.It Em DOI 5089615e1d4SaaronThe domain of interpretation as given by the RFCs. 5099615e1d4SaaronNormally 510c5fe6c4eSniklas.Li IPSEC . 511b57b191eSniklasIf unspecified, defaults to 512b57b191eSniklas.Li IPSEC . 513c5fe6c4eSniklas.It Em EXCHANGE_TYPE 5149615e1d4SaaronThe exchange type as given by the RFCs. 5159615e1d4SaaronFor quick mode this is 516c5fe6c4eSniklas.Li QUICK_MODE . 517c5fe6c4eSniklas.It Em Suites 5183b2a0cf1SaaronA list of protection suites (bundles of protocols) usable for 5199615e1d4Saaronprotecting the IP traffic. 52061d575f0SangelosEach of the list elements is a name of an <IPsec-suite> section. 5219615e1d4SaaronSee below. 522c5fe6c4eSniklas.El 52361d575f0Sangelos.It Em <IPsec-suite> 524c5fe6c4eSniklas.Bl -tag -width 12n 525c5fe6c4eSniklas.It Em Protocols 526c5fe6c4eSniklasA list of the protocols included in this protection suite. 52761d575f0SangelosEach of the list elements is a name of an <IPsec-protocol> 5289615e1d4Saaronsection. 5299615e1d4SaaronSee below. 530c5fe6c4eSniklas.El 53161d575f0Sangelos.It Em <IPsec-protocol> 532c5fe6c4eSniklas.Bl -tag -width 12n 533c5fe6c4eSniklas.It Em PROTOCOL_ID 5349615e1d4SaaronThe protocol as given by the RFCs. 5359615e1d4SaaronAcceptable values today are 536c5fe6c4eSniklas.Li IPSEC_AH 537c5fe6c4eSniklasand 538c5fe6c4eSniklas.Li IPSEC_ESP . 539c5fe6c4eSniklas.It Em Transforms 5403b2a0cf1SaaronA list of transforms usable for implementing the protocol. 54161d575f0SangelosEach of the list elements is a name of an <IPsec-transform> 5429615e1d4Saaronsection. 5439615e1d4SaaronSee below. 544c5fe6c4eSniklas.It Em ReplayWindow 5459615e1d4SaaronThe size of the window used for replay protection. 5469615e1d4SaaronThis is normally left alone. 5479615e1d4SaaronLook at the 548c5fe6c4eSniklas.Nm ESP 549c5fe6c4eSniklasand 550c5fe6c4eSniklas.Nm AH 551c5fe6c4eSniklasRFCs for a better description. 552c5fe6c4eSniklas.El 55361d575f0Sangelos.It Em <IPsec-transform> 554c5fe6c4eSniklas.Bl -tag -width 12n 555c5fe6c4eSniklas.It Em TRANSFORM_ID 556c5fe6c4eSniklasThe transform ID as given by the RFCs. 557c5fe6c4eSniklas.It Em ENCAPSULATION_MODE 5589615e1d4SaaronThe encapsulation mode as given by the RFCs. 5599615e1d4SaaronThis means TRANSPORT or TUNNEL. 560c5fe6c4eSniklas.It Em AUTHENTICATION_ALGORITHM 561c5fe6c4eSniklasThe optional authentication algorithm in the case of this 562c5fe6c4eSniklasbeing an ESP transform. 563c5fe6c4eSniklas.It Em GROUP_DESCRIPTION 564c5fe6c4eSniklasAn optional (provides PFS if present) Diffie-Hellman group 5659615e1d4Saarondescription. 5669615e1d4SaaronThe values are the same as GROUP_DESCRIPTION's 567c5fe6c4eSniklasin <ISAKMP-transform> sections shown above. 568c5fe6c4eSniklas.It Em Life 569c5fe6c4eSniklasList of lifetimes, each element is a <Lifetime> section name. 570c5fe6c4eSniklas.El 57161d575f0Sangelos.It Em <IPsec-ID> 572c5fe6c4eSniklas.Bl -tag -width 12n 573c5fe6c4eSniklas.It Em ID-type 5749615e1d4SaaronThe ID type as given by the RFCs. 57561d575f0SangelosFor IPsec this is currently 576d8ca7c44Sho.Li IPV4_ADDR , 577d8ca7c44Sho.Li IPV6_ADDR , 578d8ca7c44Sho.Li IPV4_ADDR_SUBNET 579c5fe6c4eSniklasor 580d8ca7c44Sho.Li IPV6_ADDR_SUBNET . 581c5fe6c4eSniklas.It Em Address 582c5fe6c4eSniklasIf the ID-type is 583d8ca7c44Sho.Li IPV4_ADDR 584d8ca7c44Shoor 585d8ca7c44Sho.Li IPV6_ADDR 586c5fe6c4eSniklasthis tag should exist and be an IP-address. 587c5fe6c4eSniklas.It Em Network 588c5fe6c4eSniklasIf the ID-type is 589c5fe6c4eSniklas.Li IPV4_ADDR_SUBNET 590d8ca7c44Shoor 591d8ca7c44Sho.Li IPV6_ADDR_SUBNET 592c5fe6c4eSniklasthis tag should exist and 593c5fe6c4eSniklasbe a network address. 594c5fe6c4eSniklas.It Em Netmask 595c5fe6c4eSniklasIf the ID-type is 596c5fe6c4eSniklas.Li IPV4_ADDR_SUBNET 597d8ca7c44Shoor 598d8ca7c44Sho.Li IPV6_ADDR_SUBNET 599c5fe6c4eSniklasthis tag should exist and 600c5fe6c4eSniklasbe a network subnet mask. 6010378d1f2Sniklas.It Em Protocol 6020378d1f2SniklasIf the ID-type is 603d8ca7c44Sho.Li IPV4_ADDR , 6040378d1f2Sniklas.Li IPV4_ADDR_SUBNET , 605d8ca7c44Sho.Li IPV6_ADDR 606d8ca7c44Shoor 607d8ca7c44Sho.Li IPV6_ADDR_SUBNET 6080378d1f2Sniklasthis tag indicates what transport protocol should be transmitted over 6090378d1f2Sniklasthe SA. 6100378d1f2SniklasIf left unspecified, all transport protocols between the two address 6110378d1f2Sniklas(ranges) will be sent (or permitted) over that SA. 6120378d1f2Sniklas.It Em Port 6130378d1f2SniklasIf the ID-type is 614d8ca7c44Sho.Li IPV4_ADDR , 6150378d1f2Sniklas.Li IPV4_ADDR_SUBNET , 616d8ca7c44Sho.Li IPV6_ADDR 617d8ca7c44Shoor 618d8ca7c44Sho.Li IPV6_ADDR_SUBNET 6190378d1f2Sniklasthis tag indicates what source or destination port is allowed to be 6200378d1f2Sniklastransported over the SA (depending on whether this is a local or 6210378d1f2Sniklasremote ID). 6220378d1f2SniklasIf left unspecified, all ports of the given transport protocol 6230378d1f2Sniklaswill be transmitted (or permitted) over the SA. 6240378d1f2SniklasThe Protocol tag must be specified in conjunction with this tag. 625c5fe6c4eSniklas.El 626c5fe6c4eSniklas.El 6274ca71560Sho.Ss Other sections 6284ca71560Sho.Bl -hang -width 12n 6294ca71560Sho.It Em <IKECFG-ID> 6304ca71560ShoParameters to use with IKE mode-config. One ID per peer. 6314ca71560Sho.Pp 6324ca71560ShoAn IKECFG-ID is written as [<ID-type>/<name>]. 6334ca71560ShoThe following ID types are supported: 6344ca71560Sho.Bl -tag -width 12n 6354ca71560Sho.It IPv4 6364ca71560Sho[ipv4/A.B.C.D] 6374ca71560Sho.It IPv6 6384ca71560Sho[ipv6/abcd:abcd::ab:cd] 6394ca71560Sho.It FQDN 6404ca71560Sho[fqdn/foo.bar.org] 6414ca71560Sho.It UFQDN 6424ca71560Sho[ufqdn/user@foo.bar.org] 6434ca71560Sho.It ASN1_DN 6444ca71560Sho[asn1_dn//C=aa/O=cc/...] (Note the double slashes as the DN itself 6454ca71560Shostarts with a '/'.) 6464ca71560Sho.El 6474ca71560Sho.Pp 6484ca71560ShoEach section specifies what configuration values to return to the peer 6494ca71560Shorequesting IKE mode-config. Currently supported values are: 6504ca71560Sho.Bl -tag -width 12n 6514ca71560Sho.It Em Address 6524ca71560ShoThe peer's network address. 6534ca71560Sho.It Em Netmask 6544ca71560ShoThe peer's netmask. 6554ca71560Sho.It Em Nameserver 6564ca71560ShoThe IP address of a DNS nameserver. 6574ca71560Sho.It Em WINS-server 6584ca71560ShoThe IP address of a WINS server. 6594ca71560Sho.El 660*106cbd59Smarkus.It Em <Initiator-ID> 661*106cbd59Smarkus.Pp 662*106cbd59SmarkusDuring phase 1 negotiation 663*106cbd59Smarkus.Nm isakmpd 664*106cbd59Smarkuslooks for a pre-shared key in the <ISAKMP-peer> section. 665*106cbd59SmarkusIf no Authentication data is specified in that section, and 666*106cbd59Smarkus.Nm isakmpd 667*106cbd59Smarkusis not the initiator, it looks for Authentication data in a section named after 668*106cbd59Smarkusthe initiator's phase 1 ID. 669*106cbd59SmarkusThis allows mobile users with dynamic IP addresses 670*106cbd59Smarkusto have different shared secrets. 671*106cbd59Smarkus.Pp 672*106cbd59SmarkusThis only works for aggressive mode because in main mode the remote 673*106cbd59Smarkusinitiator ID would not yet be known. 674*106cbd59Smarkus.Pp 675*106cbd59SmarkusThe name of the <Initiator-ID> section depends on the ID type sent by 676*106cbd59Smarkusthe initiator. 677*106cbd59SmarkusCurrently this can be: 678*106cbd59Smarkus.Bl -tag -width 12n 679*106cbd59Smarkus.It IPv4 680*106cbd59Smarkus[A.B.C.D] 681*106cbd59Smarkus.It IPv6 682*106cbd59Smarkus[abcd:abcd::ab:cd] 683*106cbd59Smarkus.It FQDN 684*106cbd59Smarkus[foo.bar.org] 685*106cbd59Smarkus.It UFQDN 686*106cbd59Smarkus[user@foo.bar.org] 687*106cbd59Smarkus.El 6884ca71560Sho.El 68900b2ba71Saaron.Sh EXAMPLES 6902040585eSniklasAn example of a configuration file: 6912040585eSniklas.Pp 6922040585eSniklas.Bd -literal 6932040585eSniklas# A configuration sample for the isakmpd ISAKMP/Oakley (aka IKE) daemon. 6942040585eSniklas 6952040585eSniklas[General] 696c5fe6c4eSniklasListen-on= 10.1.0.2 6972040585eSniklas 698c5fe6c4eSniklas# Incoming phase 1 negotiations are multiplexed on the source IP address 6992b81057dSniklas[Phase 1] 700c5fe6c4eSniklas10.1.0.1= ISAKMP-peer-west 7012b81057dSniklas 702c5fe6c4eSniklas# These connections are walked over after config file parsing and told 703c5fe6c4eSniklas# to the application layer so that it will inform us when traffic wants to 704c5fe6c4eSniklas# pass over them. This means we can do on-demand keying. 705c5fe6c4eSniklas[Phase 2] 706c5fe6c4eSniklasConnections= IPsec-east-west 707c5fe6c4eSniklas 708cc3c8b42Sniklas# Default values are commented out. 709c5fe6c4eSniklas[ISAKMP-peer-west] 7102b81057dSniklasPhase= 1 711cc3c8b42Sniklas#Transport= udp 712f6dd85a7SniklasLocal-address= 10.1.0.2 7132b81057dSniklasAddress= 10.1.0.1 7142b81057dSniklas#Port= isakmp 7152b81057dSniklas#Port= 500 71635ff0956Sho#Configuration= Default-phase-1-configuration 7172b81057dSniklasAuthentication= mekmitasdigoat 718cc3c8b42Sniklas#Flags= 7192b81057dSniklas 720c5fe6c4eSniklas[IPsec-east-west] 7212b81057dSniklasPhase= 2 722c5fe6c4eSniklasISAKMP-peer= ISAKMP-peer-west 7232b81057dSniklasConfiguration= Default-quick-mode 724c5fe6c4eSniklasLocal-ID= Net-east 725c5fe6c4eSniklasRemote-ID= Net-west 726cc3c8b42Sniklas#Flags= 7272b81057dSniklas 728c5fe6c4eSniklas[Net-west] 7292b81057dSniklasID-type= IPV4_ADDR_SUBNET 7302b81057dSniklasNetwork= 192.168.1.0 7312b81057dSniklasNetmask= 255.255.255.0 7322b81057dSniklas 733c5fe6c4eSniklas[Net-east] 7342b81057dSniklasID-type= IPV4_ADDR_SUBNET 7352b81057dSniklasNetwork= 192.168.2.0 7362b81057dSniklasNetmask= 255.255.255.0 7372b81057dSniklas 73852e712aeSniklas# Quick mode descriptions 73952e712aeSniklas 74052e712aeSniklas[Default-quick-mode] 74152e712aeSniklasEXCHANGE_TYPE= QUICK_MODE 7421a87c1a3ShoSuites= QM-ESP-3DES-SHA-PFS-SUITE,QM-ESP-AES-SHA-PFS-SUITE 74352e712aeSniklas 7444ca71560Sho# Data for an IKE mode-config peer 7454ca71560Sho[asn1_dn//C=SE/L=SomeCity/O=SomeCompany/CN=SomePeer.company.com] 7464ca71560ShoAddress= 192.168.1.123 7474ca71560ShoNetmask= 255.255.255.0 7484ca71560ShoNameserver= 192.168.1.10 7494ca71560ShoWINS-server= 192.168.1.11 7504ca71560Sho 751*106cbd59Smarkus# pre-shared key based on initiator's phase 1 ID 752*106cbd59Smarkus[foo.bar.org] 753*106cbd59SmarkusAuthentication= mekmitasdigoat 754*106cbd59Smarkus 75552e712aeSniklas# 75652e712aeSniklas# ##################################################################### 75744143af3Sderaadt# All configuration data below this point is not required as the example 75852e712aeSniklas# uses the predefined Main Mode transform and Quick Mode suite names. 75952e712aeSniklas# It is included here for completeness. Note the default values for the 76052e712aeSniklas# [General] and [X509-certificates] sections just below. 76152e712aeSniklas# ##################################################################### 76252e712aeSniklas# 76352e712aeSniklas 76452e712aeSniklas[General] 765447a9f3aShoPolicy-file= /etc/isakmpd/isakmpd.policy 76652e712aeSniklasRetransmits= 3 76752e712aeSniklasExchange-max-time= 120 76852e712aeSniklas 769b57b191eSniklas# KeyNote credential storage 770b57b191eSniklas[KeyNote] 771b57b191eSniklasCredential-directory= /etc/isakmpd/keynote/ 772b57b191eSniklas 773fb1921ccSniklas# Certificates stored in PEM format 774fb1921ccSniklas[X509-certificates] 775fb1921ccSniklasCA-directory= /etc/isakmpd/ca/ 776fb1921ccSniklasCert-directory= /etc/isakmpd/certs/ 7779dbe9fb4ShoCRL-directory= /etc/isakmpd/crls/ 778954b1b31SniklasPrivate-key= /etc/isakmpd/private/local.key 779fb1921ccSniklas 780419caefeSho# Default phase 1 description (Main Mode) 781419caefeSho 78235ff0956Sho[Default-phase-1-configuration] 783419caefeShoEXCHANGE_TYPE= ID_PROT 784419caefeShoTransforms= 3DES-SHA 785419caefeSho 7862b81057dSniklas# Main mode transforms 7872b81057dSniklas###################### 7882b81057dSniklas 7892b81057dSniklas# DES 7902040585eSniklas 7912040585eSniklas[DES-MD5] 7922040585eSniklasENCRYPTION_ALGORITHM= DES_CBC 7932040585eSniklasHASH_ALGORITHM= MD5 7942040585eSniklasAUTHENTICATION_METHOD= PRE_SHARED 7952039fcadShoGROUP_DESCRIPTION= MODP_1024 79660f440ccShoLife= Default-phase-1-lifetime 7972040585eSniklas 7982b81057dSniklas[DES-SHA] 7992b81057dSniklasENCRYPTION_ALGORITHM= DES_CBC 8002b81057dSniklasHASH_ALGORITHM= SHA 8012b81057dSniklasAUTHENTICATION_METHOD= PRE_SHARED 80260f440ccShoGROUP_DESCRIPTION= MODP_1024 80360f440ccShoLife= Default-phase-1-lifetime 8042b81057dSniklas 8052b81057dSniklas# 3DES 8062b81057dSniklas 8072b81057dSniklas[3DES-SHA] 8082b81057dSniklasENCRYPTION_ALGORITHM= 3DES_CBC 8092040585eSniklasHASH_ALGORITHM= SHA 8102040585eSniklasAUTHENTICATION_METHOD= PRE_SHARED 8112040585eSniklasGROUP_DESCRIPTION= MODP_1024 81260f440ccShoLife= Default-phase-1-lifetime 8132b81057dSniklas 8142b81057dSniklas# Blowfish 8152b81057dSniklas 81660f440ccSho[BLF-SHA] 8172b81057dSniklasENCRYPTION_ALGORITHM= BLOWFISH_CBC 8182b81057dSniklasKEY_LENGTH= 128,96:192 8192b81057dSniklasHASH_ALGORITHM= SHA 8202b81057dSniklasAUTHENTICATION_METHOD= PRE_SHARED 8212b81057dSniklasGROUP_DESCRIPTION= MODP_1024 82260f440ccShoLife= Default-phase-1-lifetime 8232040585eSniklas 82460f440ccSho# Blowfish, using DH group 4 (non-default) 8252040585eSniklas[BLF-SHA-EC185] 826d70ca5f7SniklasENCRYPTION_ALGORITHM= BLOWFISH_CBC 8272b81057dSniklasKEY_LENGTH= 128,96:192 8282040585eSniklasHASH_ALGORITHM= SHA 8292040585eSniklasAUTHENTICATION_METHOD= PRE_SHARED 8302040585eSniklasGROUP_DESCRIPTION= EC2N_185 83160f440ccShoLife= Default-phase-1-lifetime 8322040585eSniklas 8332b81057dSniklas# Quick mode protection suites 8342b81057dSniklas############################## 8352b81057dSniklas 8362b81057dSniklas# DES 8372040585eSniklas 838d70ca5f7Sniklas[QM-ESP-DES-SUITE] 839d70ca5f7SniklasProtocols= QM-ESP-DES 840d70ca5f7Sniklas 8412b81057dSniklas[QM-ESP-DES-PFS-SUITE] 8422b81057dSniklasProtocols= QM-ESP-DES-PFS 8432b81057dSniklas 8442040585eSniklas[QM-ESP-DES-MD5-SUITE] 8452040585eSniklasProtocols= QM-ESP-DES-MD5 8462040585eSniklas 8472b81057dSniklas[QM-ESP-DES-MD5-PFS-SUITE] 8482b81057dSniklasProtocols= QM-ESP-DES-MD5-PFS 8492040585eSniklas 8502b81057dSniklas[QM-ESP-DES-SHA-SUITE] 8512b81057dSniklasProtocols= QM-ESP-DES-SHA 8522040585eSniklas 8532b81057dSniklas[QM-ESP-DES-SHA-PFS-SUITE] 8542b81057dSniklasProtocols= QM-ESP-DES-SHA-PFS 8552040585eSniklas 8562b81057dSniklas# 3DES 8572b81057dSniklas 8582b81057dSniklas[QM-ESP-3DES-SHA-SUITE] 8592b81057dSniklasProtocols= QM-ESP-3DES-SHA 8602b81057dSniklas 8612b81057dSniklas[QM-ESP-3DES-SHA-PFS-SUITE] 8622b81057dSniklasProtocols= QM-ESP-3DES-SHA-PFS 8632b81057dSniklas 864bfc24386Sniklas# AES 865bfc24386Sniklas 866bfc24386Sniklas[QM-ESP-AES-SHA-SUITE] 867bfc24386SniklasProtocols= QM-ESP-AES-SHA 868bfc24386Sniklas 86960f440ccSho[QM-ESP-AES-SHA-PFS-SUITE] 870bfc24386SniklasProtocols= QM-ESP-AES-SHA-PFS 871bfc24386Sniklas 8722b81057dSniklas# AH 8732b81057dSniklas 8742b81057dSniklas[QM-AH-MD5-SUITE] 8752b81057dSniklasProtocols= QM-AH-MD5 8762b81057dSniklas 8772b81057dSniklas[QM-AH-MD5-PFS-SUITE] 8782b81057dSniklasProtocols= QM-AH-MD5-PFS 8792b81057dSniklas 88060f440ccSho# AH + ESP (non-default) 8812040585eSniklas 8822040585eSniklas[QM-AH-MD5-ESP-DES-SUITE] 8832040585eSniklasProtocols= QM-AH-MD5,QM-ESP-DES 8842040585eSniklas 8852b81057dSniklas[QM-AH-MD5-ESP-DES-MD5-SUITE] 8862b81057dSniklasProtocols= QM-AH-MD5,QM-ESP-DES-MD5 8872040585eSniklas 8882b81057dSniklas[QM-ESP-DES-MD5-AH-MD5-SUITE] 8892b81057dSniklasProtocols= QM-ESP-DES-MD5,QM-AH-MD5 8902b81057dSniklas 8912b81057dSniklas# Quick mode protocols 8922b81057dSniklas 8932b81057dSniklas# DES 8942040585eSniklas 8952040585eSniklas[QM-ESP-DES] 8962040585eSniklasPROTOCOL_ID= IPSEC_ESP 8972040585eSniklasTransforms= QM-ESP-DES-XF 8982040585eSniklas 8992b81057dSniklas[QM-ESP-DES-MD5] 9002b81057dSniklasPROTOCOL_ID= IPSEC_ESP 9012b81057dSniklasTransforms= QM-ESP-DES-MD5-XF 9022b81057dSniklas 9032b81057dSniklas[QM-ESP-DES-MD5-PFS] 9042b81057dSniklasPROTOCOL_ID= IPSEC_ESP 9052b81057dSniklasTransforms= QM-ESP-DES-MD5-PFS-XF 9062b81057dSniklas 9072b81057dSniklas[QM-ESP-DES-SHA] 9082b81057dSniklasPROTOCOL_ID= IPSEC_ESP 9092b81057dSniklasTransforms= QM-ESP-DES-SHA-XF 9102b81057dSniklas 9112b81057dSniklas# 3DES 9122b81057dSniklas 9132b81057dSniklas[QM-ESP-3DES-SHA] 9142b81057dSniklasPROTOCOL_ID= IPSEC_ESP 9152b81057dSniklasTransforms= QM-ESP-3DES-SHA-XF 9162b81057dSniklas 9172b81057dSniklas[QM-ESP-3DES-SHA-PFS] 9182b81057dSniklasPROTOCOL_ID= IPSEC_ESP 9192b81057dSniklasTransforms= QM-ESP-3DES-SHA-PFS-XF 9202b81057dSniklas 9212b81057dSniklas[QM-ESP-3DES-SHA-TRP] 9222b81057dSniklasPROTOCOL_ID= IPSEC_ESP 9232b81057dSniklasTransforms= QM-ESP-3DES-SHA-TRP-XF 9242b81057dSniklas 925bfc24386Sniklas# AES 926bfc24386Sniklas 927bfc24386Sniklas[QM-ESP-AES-SHA] 928bfc24386SniklasPROTOCOL_ID= IPSEC_ESP 929bfc24386SniklasTransforms= QM-ESP-AES-SHA-XF 930bfc24386Sniklas 931bfc24386Sniklas[QM-ESP-AES-SHA-PFS] 932bfc24386SniklasPROTOCOL_ID= IPSEC_ESP 933bfc24386SniklasTransforms= QM-ESP-AES-SHA-PFS-XF 934bfc24386Sniklas 935bfc24386Sniklas[QM-ESP-AES-SHA-TRP] 936bfc24386SniklasPROTOCOL_ID= IPSEC_ESP 937bfc24386SniklasTransforms= QM-ESP-AES-SHA-TRP-XF 938bfc24386Sniklas 9392b81057dSniklas# AH MD5 9402b81057dSniklas 9412b81057dSniklas[QM-AH-MD5] 9422b81057dSniklasPROTOCOL_ID= IPSEC_AH 9432b81057dSniklasTransforms= QM-AH-MD5-XF 9442b81057dSniklas 9452b81057dSniklas[QM-AH-MD5-PFS] 9462b81057dSniklasPROTOCOL_ID= IPSEC_AH 9472b81057dSniklasTransforms= QM-AH-MD5-PFS-XF 9482b81057dSniklas 9492b81057dSniklas# Quick mode transforms 9502b81057dSniklas 9512b81057dSniklas# ESP DES+MD5 9522b81057dSniklas 9532040585eSniklas[QM-ESP-DES-XF] 9542040585eSniklasTRANSFORM_ID= DES 9552040585eSniklasENCAPSULATION_MODE= TUNNEL 95660f440ccShoLife= Default-phase-2-lifetime 9572040585eSniklas 9582b81057dSniklas[QM-ESP-DES-MD5-XF] 9592b81057dSniklasTRANSFORM_ID= DES 9602b81057dSniklasENCAPSULATION_MODE= TUNNEL 9612b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_MD5 96260f440ccShoLife= Default-phase-2-lifetime 9632b81057dSniklas 9642b81057dSniklas[QM-ESP-DES-MD5-PFS-XF] 9652b81057dSniklasTRANSFORM_ID= DES 9662b81057dSniklasENCAPSULATION_MODE= TUNNEL 9672039fcadShoGROUP_DESCRIPTION= MODP_1024 9682b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_MD5 96960f440ccShoLife= Default-phase-2-lifetime 9702b81057dSniklas 9712b81057dSniklas[QM-ESP-DES-SHA-XF] 9722b81057dSniklasTRANSFORM_ID= DES 9732b81057dSniklasENCAPSULATION_MODE= TUNNEL 9742b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 97560f440ccShoLife= Default-phase-2-lifetime 9762b81057dSniklas 9772b81057dSniklas# 3DES 9782b81057dSniklas 9792b81057dSniklas[QM-ESP-3DES-SHA-XF] 9802b81057dSniklasTRANSFORM_ID= 3DES 9812b81057dSniklasENCAPSULATION_MODE= TUNNEL 9822b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 98360f440ccShoLife= Default-phase-2-lifetime 9842b81057dSniklas 9852b81057dSniklas[QM-ESP-3DES-SHA-PFS-XF] 9862b81057dSniklasTRANSFORM_ID= 3DES 9872b81057dSniklasENCAPSULATION_MODE= TUNNEL 9882b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 9892b81057dSniklasGROUP_DESCRIPTION= MODP_1024 99060f440ccShoLife= Default-phase-2-lifetime 9912b81057dSniklas 9922b81057dSniklas[QM-ESP-3DES-SHA-TRP-XF] 9932b81057dSniklasTRANSFORM_ID= 3DES 9942b81057dSniklasENCAPSULATION_MODE= TRANSPORT 9952b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 99660f440ccShoLife= Default-phase-2-lifetime 9972b81057dSniklas 998bfc24386Sniklas# AES 999bfc24386Sniklas 1000bfc24386Sniklas[QM-ESP-AES-SHA-XF] 1001bfc24386SniklasTRANSFORM_ID= AES 1002bfc24386SniklasENCAPSULATION_MODE= TUNNEL 1003bfc24386SniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 100460f440ccShoLife= Default-phase-2-lifetime 1005bfc24386Sniklas 1006bfc24386Sniklas[QM-ESP-AES-SHA-PFS-XF] 1007bfc24386SniklasTRANSFORM_ID= AES 1008bfc24386SniklasENCAPSULATION_MODE= TUNNEL 1009bfc24386SniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 1010bfc24386SniklasGROUP_DESCRIPTION= MODP_1024 101160f440ccShoLife= Default-phase-2-lifetime 1012bfc24386Sniklas 1013bfc24386Sniklas[QM-ESP-AES-SHA-TRP-XF] 1014bfc24386SniklasTRANSFORM_ID= AES 1015bfc24386SniklasENCAPSULATION_MODE= TRANSPORT 1016bfc24386SniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 101760f440ccShoLife= Default-phase-2-lifetime 1018bfc24386Sniklas 10192b81057dSniklas# AH 10202b81057dSniklas 10212b81057dSniklas[QM-AH-MD5-XF] 10222b81057dSniklasTRANSFORM_ID= MD5 10232b81057dSniklasENCAPSULATION_MODE= TUNNEL 10242b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_MD5 102560f440ccShoLife= Default-phase-2-lifetime 10262b81057dSniklas 10272b81057dSniklas[QM-AH-MD5-PFS-XF] 10282b81057dSniklasTRANSFORM_ID= MD5 10292b81057dSniklasENCAPSULATION_MODE= TUNNEL 10302039fcadShoGROUP_DESCRIPTION= MODP_1024 103160f440ccShoLife= Default-phase-2-lifetime 10322b81057dSniklas 103360f440ccSho[Sample-Life-Time] 10342b81057dSniklasLIFE_TYPE= SECONDS 10352b81057dSniklasLIFE_DURATION= 3600,1800:7200 10362b81057dSniklas 103760f440ccSho[Sample-Life-Volume] 10382b81057dSniklasLIFE_TYPE= KILOBYTES 10392b81057dSniklasLIFE_DURATION= 1000,768:1536 10402040585eSniklas.Ed 1041ab1e9dfdSho.Sh FILES 1042ab1e9dfdSho.Bl -tag -width /etc/isakmpd/isakmpd.conf 1043ab1e9dfdSho.It Pa /etc/isakmpd/isakmpd.conf 1044ab1e9dfdShoThe default 1045ab1e9dfdSho.Nm isakmpd 1046ab1e9dfdShoconfiguration file. 1047ab1e9dfdSho.It Pa /usr/share/ipsec/isakmpd/ 1048ab1e9dfdShoA directory containing some sample 1049ab1e9dfdSho.Nm isakmpd 1050ab1e9dfdShoconfiguration files. 1051ab1e9dfdSho.El 10522040585eSniklas.Sh SEE ALSO 1053b57b191eSniklas.Xr keynote 1 , 1054dc89b21eSfgsch.Xr ipsec 4 , 105530a2652aSniklas.Xr keynote 4 , 105677725688Sniklas.Xr isakmpd.policy 5 , 1057350bb3b8Salex.Xr isakmpd 8 1058d7401508Sho.Sh BUGS 1059d7401508ShoThe RFCs do not permit differing DH groups in the same proposal for 1060d7401508Shoaggressive and quick mode exchanges. 1061d7401508ShoMixing both PFS and non-PFS suites in a quick mode proposal is not possible, 1062d7401508Shoas PFS implies using a DH group. 1063