1*419caefeSho.\" $OpenBSD: isakmpd.conf.5,v 1.69 2002/11/15 14:58:38 ho Exp $ 2e55ca143Sniklas.\" $EOM: isakmpd.conf.5,v 1.57 2000/12/21 14:43:17 ho Exp $ 32040585eSniklas.\" 444f0148dSniklas.\" Copyright (c) 1998, 1999, 2000 Niklas Hallqvist. All rights reserved. 54ca71560Sho.\" Copyright (c) 2000, 2001, 2002 H�kan Olsson. All rights reserved. 62040585eSniklas.\" 72040585eSniklas.\" Redistribution and use in source and binary forms, with or without 82040585eSniklas.\" modification, are permitted provided that the following conditions 92040585eSniklas.\" are met: 102040585eSniklas.\" 1. Redistributions of source code must retain the above copyright 112040585eSniklas.\" notice, this list of conditions and the following disclaimer. 122040585eSniklas.\" 2. Redistributions in binary form must reproduce the above copyright 132040585eSniklas.\" notice, this list of conditions and the following disclaimer in the 142040585eSniklas.\" documentation and/or other materials provided with the distribution. 152040585eSniklas.\" 3. All advertising materials mentioning features or use of this software 162040585eSniklas.\" must display the following acknowledgement: 172040585eSniklas.\" This product includes software developed by Ericsson Radio Systems. 182040585eSniklas.\" 4. The name of the author may not be used to endorse or promote products 192040585eSniklas.\" derived from this software without specific prior written permission. 202040585eSniklas.\" 212040585eSniklas.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 222040585eSniklas.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 232040585eSniklas.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 242040585eSniklas.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 252040585eSniklas.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 262040585eSniklas.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 272040585eSniklas.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 282040585eSniklas.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 292040585eSniklas.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 302040585eSniklas.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 312040585eSniklas.\" 322040585eSniklas.\" This code was written under funding by Ericsson Radio Systems. 332040585eSniklas.\" 342040585eSniklas.\" Manual page, using -mandoc macros 352040585eSniklas.\" 362040585eSniklas.Dd October 10, 1998 3758aefd4bSaaron.Dt ISAKMPD.CONF 5 382040585eSniklas.Os 392040585eSniklas.Sh NAME 402040585eSniklas.Nm isakmpd.conf 4158aefd4bSaaron.Nd configuration file for isakmpd 422040585eSniklas.Sh DESCRIPTION 4358aefd4bSaaron.Nm 4458aefd4bSaaronis the configuration file for the 452040585eSniklas.Nm isakmpd 462040585eSniklasdaemon managing security association and key management for the 4761d575f0SangelosIPsec layer of the kernel's networking stack. 482040585eSniklas.Pp 492040585eSniklasThe file is of a well known type of format called .INI style, named after 502040585eSniklasthe suffix used by an overrated windowing environment for its configuration 519615e1d4Saaronfiles. 529615e1d4SaaronThis format consists of sections, each beginning with a line looking like: 532040585eSniklas.Bd -literal 542040585eSniklas[Section name] 552040585eSniklas.Ed 562040585eSniklasBetween the brackets is the name of the section following this section header. 572040585eSniklasInside a section many tag/value pairs can be stored, each one looking like: 582040585eSniklas.Bd -literal 592040585eSniklasTag=Value 602040585eSniklas.Ed 612040585eSniklasIf the value needs more space than fits on a single line it's possible to 62a2067f52Sniklascontinue it on the next by ending the first with a backslash character 639615e1d4Saaronimmediately before the newline character. 649615e1d4SaaronThis method can extend a value for an arbitrary amount of lines. 652040585eSniklas.Pp 6658aefd4bSaaronComments can be put anywhere in the file by using a hash mark 6758aefd4bSaaron.Pq Sq \&# . 6858aefd4bSaaronThen the comment goes on to the end of the line. 692040585eSniklas.Pp 70c5fe6c4eSniklasOften the right-hand side values consist of other section names. 71c5fe6c4eSniklasThis results in a tree structure. 72c5fe6c4eSniklasSome values are treated as a list of several scalar values, such lists always 739615e1d4Saaronuse comma as the separator. 749615e1d4SaaronSome values are formatted like this: X,Y:Z, which 75c5fe6c4eSniklasis an offer/accept syntax, where X is a value we offer and Y:Z is a range of 76c5fe6c4eSniklasaccepted values, inclusive. 77c5fe6c4eSniklas.Pp 78bad0180eShoTo activate changes to 79bad0180eSho.Nm 80bad0180eShowithout restarting 81bad0180eSho.Nm isakmpd , 82bad0180eShosend a SIGHUP signal to the daemon process. 8352e712aeSniklas.Ss Auto-generated parts of the configuration 8452e712aeSniklas.Pp 8552e712aeSniklasSome predefined section names are recognized by the daemon, voiding the need 8652e712aeSniklasto fully specify the Main Mode transforms and Quick Mode suites, protocols 8752e712aeSniklasand transforms. 8852e712aeSniklas.Pp 8952e712aeSniklasFor Main Mode: 9018656612Saaron.Bd -filled -compact 912039fcadSho.Ar {DES,BLF,3DES,CAST}-{MD5,SHA}[-GRP{1,2,5}][-{DSS,RSA_SIG}] 9252e712aeSniklas.Ed 9352e712aeSniklas.Pp 9452e712aeSniklasFor Quick Mode: 9518656612Saaron.Bd -filled -compact 962039fcadSho.Ar QM-{proto}[-TRP]-{cipher}[-{hash}][-PFS[-{group}]]-SUITE 972039fcadSho.Ed 982039fcadSho.Bd -literal 992039fcadSho where 1002039fcadSho {proto} is either ESP or AH 1012039fcadSho {cipher} is either DES, 3DES, CAST, BLF or AES 1022039fcadSho {hash} is either MD5, SHA or RIPEMD 1032039fcadSho {group} is either GRP1, GRP2 or GRP5 10452e712aeSniklas.Ed 10552e712aeSniklas.Pp 10652e712aeSniklasExample 1: 3DES-SHA means; 3DES encryption, SHA hash, and authorization by 10752e712aeSniklaspre-shared keys. 10852e712aeSniklasExample 2: QM-ESP-3DES-SHA-PFS-SUITE means; ESP protocol, 3DES encryption, 10952e712aeSniklasSHA hash, and use Perfect Forward Security. 11052e712aeSniklas.Pp 11152e712aeSniklas.Pp 1122039fcadShoUnless explicitly stated with -GRP1, 2 or 5, transforms and PFS suites 1132039fcadShouse DH group 2. There are currently no predefined ESP+AH Quick Mode suites. 11452e712aeSniklas.Pp 1152039fcadShoThe predefinitions include some default values for the special 116*419caefeShosections "General", "Keynote", "X509-certificates", and 117*419caefeSho"Default-Phase-1-Configuration". 118*419caefeShoThese default values are presented in the example below. 11952e712aeSniklas.Pp 12052e712aeSniklasAll autogenerated values can be overridden by manual entries by using the 12152e712aeSniklassame section and tag names in the configuration file. 122b57b191eSniklasIn particular, the default phase 1 (Main or Aggressive Mode) and phase 2 123b57b191eSniklas(Quick Mode) lifetimes can be overridden by these tags under the "General" 124b57b191eSniklassection; 125b57b191eSniklas.Pp 126b57b191eSniklas.Bd -literal 127b57b191eSniklas[General] 128b57b191eSniklasDefault-phase-1-lifetime= 3600,60:86400 129b57b191eSniklasDefault-phase-2-lifetime= 1200,60:86400 130b57b191eSniklas.Ed 1312039fcadSho.Pp 1322039fcadShoThe Main Mode lifetime currently defaults to one hour (minimum 60 1332039fcadShoseconds, maximum 1 day). The Quick Mode lifetime defaults to 20 1342039fcadShominutes (minimum 60 seconds, maximum 1 day). 13552e712aeSniklas.\"XXX Following empty .Ss works around a nroff bug, we want the new line." 13652e712aeSniklas.Ss 13752e712aeSniklas.Pp 1380378d1f2SniklasAlso, the default Phase 1 ID can be set by creating a <Phase1-ID> 1390378d1f2Sniklassection, as shown below, and adding this tag under the "General" 1400378d1f2Sniklassection; 1410378d1f2Sniklas.Pp 1420378d1f2Sniklas.Bd -literal 1430378d1f2Sniklas[General] 1440378d1f2SniklasDefault-phase-1-ID= Phase1-ID-name 1450378d1f2Sniklas 1460378d1f2Sniklas[Phase1-ID-name] 1470378d1f2SniklasID-type= USER_FQDN 1480378d1f2SniklasName= foo@bar.com 1490378d1f2Sniklas.Ed 1500378d1f2Sniklas.\"XXX Following empty .Ss works around a nroff bug, we want the new line." 1510378d1f2Sniklas.Ss 1520378d1f2Sniklas.Pp 153c5fe6c4eSniklas.Ss Roots 154c5fe6c4eSniklas.Bl -hang -width 12n 155c5fe6c4eSniklas.It Em General 156c5fe6c4eSniklasGeneric global configuration parameters 157c5fe6c4eSniklas.Bl -tag -width 12n 158447a9f3aSho.It Em Policy-file 15980c8b3dbSniklasThe name of the file that contains 16080c8b3dbSniklas.Xr KeyNote 4 1614aac73a4Saaronpolicies. 1624aac73a4SaaronThe default is "/etc/isakmpd/isakmpd.policy". 1637167d783Sangelos.It Em Default-Phase-2-Suites 1647167d783SangelosA list of Phase 2 suites that will be used when establishing dynamic 1657167d783SangelosSAs. 1667167d783SangelosIf left unspecified, QM-ESP-3DES-SHA-PFS-SUITE is used as the default. 167c5fe6c4eSniklas.It Em Retransmits 168c5fe6c4eSniklasHow many times should a message be retransmitted before giving up. 169b393bef8Sniklas.It Em Check-interval 170b393bef8SniklasThe interval between watchdog checks of connections we want up at all times. 171c5fe6c4eSniklas.It Em Exchange-max-time 172c5fe6c4eSniklasHow many seconds should an exchange maximally take to setup 173c5fe6c4eSniklasbefore we give up. 174c5fe6c4eSniklas.It Em Listen-on 1759615e1d4SaaronA list of IP-addresses OK to listen on. 1769615e1d4SaaronThis list is used as 177c5fe6c4eSniklasa filter for the set of addresses the interfaces configured 1789615e1d4Saaronprovides. 1799615e1d4SaaronThis means that we won't see if an address given 18080c8b3dbSniklashere does not exist on this host, and thus no error is given for 181c5fe6c4eSniklasthat case. 182463c7dc9Sniklas.It Em Shared-SADB 183463c7dc9SniklasIf this tag is defined, whatever the value is, some semantics of 184463c7dc9Sniklas.Nm 185463c7dc9Sniklasare changed so that multiple instances can run on top of one SADB 1869615e1d4Saaronand setup SAs with eachother. 1879615e1d4SaaronSpecifically this means replay 188463c7dc9Sniklasprotection will not be asked for, and errors that can occur when 189463c7dc9Sniklasupdating an SA with its parameters a 2nd time will be ignored. 1900b880a72Sho.It Em Pubkey-directory 1910b880a72ShoThe directory in which 1920b880a72Sho.Nm 193ac1aa35bSmpechlooks for explicitly trusted public keys. 194ac1aa35bSmpechThe default is "/etc/isakmpd/pubkeys". 195ac1aa35bSmpechRead 1960b880a72Sho.Xr isakmpd 8 1970b880a72Shofor the required naming convention of the files in here. 198c5fe6c4eSniklas.El 199c5fe6c4eSniklas.It Em Phase 1 200c5fe6c4eSniklasISAKMP SA negotiation parameter root 201c5fe6c4eSniklas.Bl -tag -width 12n 202c5fe6c4eSniklas.It Em <IP-address> 2039615e1d4SaaronA name of the ISAKMP peer at the given IP-address. 204cc3c8b42Sniklas.It Em Default 205ac1aa35bSmpechA name of the default ISAKMP peer. 206ac1aa35bSmpechIncoming Phase 1 connections from other IP-addresses will use this peer name. 207cc3c8b42Sniklas.It "" 2089615e1d4SaaronThis name is used as the section name for further information to be found. 2099615e1d4SaaronLook at <ISAKMP-peer> below. 210c5fe6c4eSniklas.El 211c5fe6c4eSniklas.It Em Phase 2 212c5fe6c4eSniklasIPsec SA negotiation parameter root 213c5fe6c4eSniklas.Bl -tag -width 12n 214c5fe6c4eSniklas.It Em Connections 21561d575f0SangelosA list of directed IPsec "connection" names that should be brought up 2162ddc24cbSniklasautomatically, either on first use if the system supports it, or at 2179615e1d4Saaronstartup of the daemon. 2189615e1d4SaaronThese names are section names where further information can be found. 21961d575f0SangelosLook at <IPsec-connection> below. 22080baf197SniklasNormally any connection mentioned here are treated as part of the 22180baf197Sniklas"Passive-connection" list we present below, however there is a 2229615e1d4Saaronflag: "Active-only" that disables this behaviour. 22361d575f0SangelosThis too is mentioned in the <IPsec-connection> section, in the "Flags" tag. 22480baf197Sniklas.It Em Passive-connections 22561d575f0SangelosA list of IPsec "connection" names we recognize and accept initiations for. 2269615e1d4SaaronThese names are section names where further information can be found. 22761d575f0SangelosLook at <IPsec-connection> below. 2289615e1d4SaaronCurrently only the Local-ID and Remote-ID tags 22980baf197Sniklasare looked at in those sections, as they are matched against the IDs given 23080baf197Sniklasby the initiator. 231c5fe6c4eSniklas.El 232b57b191eSniklas.It Em KeyNote 233b57b191eSniklas.Bl -tag -width 12n 234b57b191eSniklas.It Em Credential-directory 235b57b191eSniklasA directory containing directories named after IDs (IP 236b57b191eSniklasaddresses, ``user@domain'', or hostnames) that contain files named 237b57b191eSniklas``credentials'' and ``private_key''. 238b57b191eSniklas.Pp 239b57b191eSniklasThe credentials file contains 240b57b191eSniklas.Xr keynote 4 241b57b191eSniklascredentials that are sent to a remote IKE daemon when we use the 242b57b191eSniklasassociated ID, or credentials that we may want to consider when doing 243ac1aa35bSmpechan exchange with a remote IKE daemon that uses that ID. 244ac1aa35bSmpechNote that, in the former case, the last credential in the file 245ac1aa35bSmpechMUST contain our public key in its Licensees field. 246ac1aa35bSmpechMore than one credentials may exist in the file. 247ac1aa35bSmpechThey are separated by whitelines (the format is essentially the same as 248ac1aa35bSmpechthat of the policy file). 249ac1aa35bSmpechThe credentials are of the same format as the policies described in 250b57b191eSniklas.Xr isakmpd.policy 5 . 251b57b191eSniklasThe only difference is that the Authorizer field contains a public 252ac1aa35bSmpechkey, and the assertion is signed. 253ac1aa35bSmpechSigned assertions can be generated using the 254b57b191eSniklas.Xr keynote 1 255b57b191eSniklasutility. 256b57b191eSniklas.Pp 257b57b191eSniklasThe private_key file contains the private RSA key we use for 258ac1aa35bSmpechauthentication. 259ac1aa35bSmpechIf the directory (and the files) exist, they take precedence over X509-based 260ac1aa35bSmpechauthentication. 261b57b191eSniklas.El 262fb1921ccSniklas.It Em X509-Certificates 263fb1921ccSniklas.Bl -tag -width 12n 264fb1921ccSniklas.It Em Ca-directory 265fb1921ccSniklasA directory containing PEM certificates of certification authorities 266ac1aa35bSmpechthat we trust to sign other certificates. 267ac1aa35bSmpechNote that for a CA to be really trusted, it needs to be somehow 268ac1aa35bSmpechreferred to by policy, in 269e5814869Sangelos.Xr isakmpd.policy 5 . 270e5814869SangelosThe certificates in this directory are used for the actual X.509 271e5814869Sangelosauthentication and for cross-referencing policies that refer to 272ac1aa35bSmpechDistinguished Names (DNs). 273ac1aa35bSmpechKeeping a separate directory (as opposed to integrating policies 274ac1aa35bSmpechand X.509 CA certificates) allows for maintenance of a list of 275ac1aa35bSmpech"well known" CAs without actually having to trust all (or any) of them. 276fb1921ccSniklas.It Em Cert-directory 277fb1921ccSniklasA directory containing PEM certificates that we trust to be valid. 278fb1921ccSniklasThese certificates are used in preference to those passed in messages and 279fb1921ccSniklasare required to have a SubjectAltName extension. 280fb1921ccSniklas.It Em Accept-self-signed 281fb1921ccSniklasIf this tag is defined, whatever the value is, certificates that 282fb1921ccSniklasdo not originate from a trusted CA but are self-signed will be 283fb1921ccSniklasaccepted. 284954b1b31Sniklas.It Em Private-key 285954b1b31SniklasThe private key matching the public key of our certificate (which should be 286954b1b31Sniklasin the "Cert-directory", and have a subjectAltName matching our ID, so far 287954b1b31Sniklasthat is our IP-address). 288fb1921ccSniklas.El 289c5fe6c4eSniklas.El 290c5fe6c4eSniklas.Ss Referred-to sections 291c5fe6c4eSniklas.Bl -hang -width 12n 292c5fe6c4eSniklas.It Em <ISAKMP-peer> 293c5fe6c4eSniklasParameters for negotiation with an ISAKMP peer 294c5fe6c4eSniklas.Bl -tag -width 12n 295c5fe6c4eSniklas.It Em Phase 296c5fe6c4eSniklasThe constant 297c5fe6c4eSniklas.Li 1 , 29861d575f0Sangelosas ISAKMP-peers and IPsec-connections 299c5fe6c4eSniklasreally are handled by the same code inside isakmpd. 300c5fe6c4eSniklas.It Em Transport 301cc3c8b42SniklasThe name of the transport protocol, defaults to 302cc3c8b42Sniklas.Li UDP . 303cc3c8b42Sniklas.It Em Port 304cc3c8b42SniklasIn case of 305cc3c8b42Sniklas.Li UDP , 306cc3c8b42Sniklasthe 307cc3c8b42Sniklas.Li UDP 308cc3c8b42Sniklasport number to send to. 309cc3c8b42SniklasThis is optional, the 310cc3c8b42Sniklasdefault value is 500 which is the IANA-registered number for ISAKMP. 311a2067f52Sniklas.It Em Local-address 312e2220ba8SniklasThe Local IP-address to use, if we are multi-homed, or have aliases. 313c5fe6c4eSniklas.It Em Address 314cc3c8b42SniklasIf existent, the IP-address of the peer. 315c5fe6c4eSniklas.It Em Configuration 3169615e1d4SaaronThe name of the ISAKMP-configuration section to use. 3179615e1d4SaaronLook at <ISAKMP-configuration> below. 318*419caefeShoIf unspecified, defaults to "Default-Phase-1-Configuration". 319c5fe6c4eSniklas.It Em Authentication 320cc3c8b42SniklasIf existent, authentication data for this specific peer. 3219615e1d4SaaronIn the case of preshared key, this is the key value itself. 3226a8478f3Sniklas.It Em ID 3236a8478f3SniklasIf existent, the name of the section that describes the 3244aac73a4Saaronlocal client ID that we should present to our peer. 3254aac73a4SaaronIf not present, it 3266a8478f3Sniklasdefaults to the address of the local interface we are sending packets 3274aac73a4Saaronover to the remote daemon. 3284aac73a4SaaronLook at <Phase1-ID> below. 329a2067f52Sniklas.It Em Remote-ID 330a2067f52SniklasIf existent, the name of the section that describes the remote client 331a2067f52SniklasID we expect the remote daemon to send us. 332a2067f52SniklasIf not present, it defaults to the address of the remote daemon. 333a2067f52SniklasLook at <Phase1-ID> below. 3342ddc24cbSniklas.It Em Flags 3352ddc24cbSniklasA comma-separated list of flags controlling the further 3369615e1d4Saaronhandling of the ISAKMP SA. 3379615e1d4SaaronCurrently there are no specific ISAKMP SA flags defined. 338c5fe6c4eSniklas.El 3396a8478f3Sniklas.It Em <Phase1-ID> 3406a8478f3Sniklas.Bl -tag -width 12n 3416a8478f3Sniklas.It Em ID-type 342d8ca7c44ShoThe ID type as given by the RFC specifications. 3439615e1d4SaaronFor Phase 1 this is currently 3446a8478f3Sniklas.Li IPV4_ADDR , 3456a8478f3Sniklas.Li IPV4_ADDR_SUBNET , 346d8ca7c44Sho.Li IPV6_ADDR , 347d8ca7c44Sho.Li IPV6_ADDR_SUBNET , 3486a8478f3Sniklas.Li FQDN , 349d8ca7c44Sho.Li USER_FQDN 3506a8478f3Sniklasor 3515bc978dfSangelos.Li KEY_ID . 3526a8478f3Sniklas.It Em Address 3536a8478f3SniklasIf the ID-type is 354d8ca7c44Sho.Li IPV4_ADDR 355d8ca7c44Shoor 356d8ca7c44Sho.Li IPV6_ADDR , 3576a8478f3Sniklasthis tag should exist and be an IP-address. 3586a8478f3Sniklas.It Em Network 3596a8478f3SniklasIf the ID-type is 3606a8478f3Sniklas.Li IPV4_ADDR_SUBNET 361d8ca7c44Shoor 362d8ca7c44Sho.Li IPV6_ADDR_SUBNET 3636a8478f3Sniklasthis tag should exist and 3646a8478f3Sniklasbe a network address. 3656a8478f3Sniklas.It Em Netmask 3666a8478f3SniklasIf the ID-type is 3676a8478f3Sniklas.Li IPV4_ADDR_SUBNET 368d8ca7c44Shoor 369d8ca7c44Sho.Li IPV6_ADDR_SUBNET 3706a8478f3Sniklasthis tag should exist and 3716a8478f3Sniklasbe a network subnet mask. 3726a8478f3Sniklas.It Em Name 3736a8478f3SniklasIf the ID-type is 3745bc978dfSangelos.Li FQDN , 375d8ca7c44Sho.Li USER_FQDN 3765bc978dfSangelosor 3775bc978dfSangelos.Li KEY_ID , 3785bc978dfSangelosthis tag should exist and contain a domain name, user@domain, or 3795bc978dfSangelosother identifying string respectively. 3803f167ca4Sangelos.Pp 3813f167ca4SangelosIn the case of 3823f167ca4Sangelos.Li KEY_ID , 3833f167ca4Sangelosnote that the IKE protocol allows any octet sequence to be sent or 3843f167ca4Sangelosreceived under this payload, potentially including non-printable 3853f167ca4Sangelosones. 3863f167ca4Sangelos.Xr isakmpd 1 3873f167ca4Sangeloscan only transmit printable 3883f167ca4Sangelos.Li KEY_ID 3893f167ca4Sangelospayloads, but can receive and process arbitrary 3903f167ca4Sangelos.Li KEY_ID 3913f167ca4Sangelospayloads. 3923f167ca4SangelosThis effectively means that non-printable 3933f167ca4Sangelos.Li KEY_ID 3943f167ca4Sangelosremote identities cannot be verified through this means, although it 3953f167ca4Sangelosis still possible to do so through 3963f167ca4Sangelos.Xr isakmpd.policy 5 . 3976a8478f3Sniklas.El 398c5fe6c4eSniklas.It Em <ISAKMP-configuration> 399c5fe6c4eSniklas.Bl -tag -width 12n 400c5fe6c4eSniklas.It Em DOI 4019615e1d4SaaronThe domain of interpretation as given by the RFCs. 4029615e1d4SaaronNormally 403c5fe6c4eSniklas.Li IPSEC . 404b57b191eSniklasIf unspecified, defaults to 405b57b191eSniklas.Li IPSEC . 406c5fe6c4eSniklas.It Em EXCHANGE_TYPE 4079615e1d4SaaronThe exchange type as given by the RFCs. 4089615e1d4SaaronFor main mode this is 4099f078bd8Sniklas.Li ID_PROT 4109f078bd8Sniklasand for aggressive mode it is 4119f078bd8Sniklas.Li AGGRESSIVE . 412c5fe6c4eSniklas.It Em Transforms 413c5fe6c4eSniklasA list of proposed transforms to use for protecting the 4149615e1d4SaaronISAKMP traffic. 4159615e1d4SaaronThese are actually names for sections 4169615e1d4Saaronfurther describing the transforms. 4179615e1d4SaaronLook at <ISAKMP-transform> below. 418c5fe6c4eSniklas.El 419c5fe6c4eSniklas.It Em <ISAKMP-transform> 420c5fe6c4eSniklas.Bl -tag -width 12n 421c5fe6c4eSniklas.It Em ENCRYPTION_ALGORITHM 422850f7173SniklasThe encryption algorithm as the RFCs name it, or ANY to denote that any 423850f7173Sniklasencryption algorithm proposed will be accepted. 424c5fe6c4eSniklas.It Em KEY_LENGTH 425c5fe6c4eSniklasFor encryption algorithms with variable key length, this is 4269615e1d4Saaronwhere the offered/accepted keylengths are described. 4279615e1d4SaaronThe value is of the offer-accept kind described above. 428c5fe6c4eSniklas.It Em HASH_ALGORITHM 429850f7173SniklasThe hash algorithm as the RFCs name it, or ANY. 430c5fe6c4eSniklas.It Em AUTHENTICATION_METHOD 431850f7173SniklasThe authentication method as the RFCs name it, or ANY. 432c5fe6c4eSniklas.It Em GROUP_DESCRIPTION 4339615e1d4SaaronThe group used for Diffie-Hellman exponentiations, or ANY. 4349615e1d4SaaronThe name are symbolic, like 435c5fe6c4eSniklas.Li MODP_768 , MODP_1024 , EC_155 436c5fe6c4eSniklasand 437c5fe6c4eSniklas.Li EC_185 . 438850f7173Sniklas.It Em PRF 439850f7173SniklasThe algorithm to use for the keyed pseudo-random function (used for key 440850f7173Sniklasderivation and authentication in Phase 1), or ANY. 441c5fe6c4eSniklas.It Em Life 4424aac73a4SaaronA list of lifetime descriptions, or ANY. 4434aac73a4SaaronIn the former case, each 444850f7173Sniklaselement is in itself a name of the section that defines the lifetime. 4454aac73a4SaaronLook at <Lifetime> below. 4464aac73a4SaaronIf it is set to ANY, then any type of 447850f7173Sniklasproposed lifetime type and value will be accepted. 448c5fe6c4eSniklas.El 449c5fe6c4eSniklas.It Em <Lifetime> 450c5fe6c4eSniklas.Bl -tag -width 12n 451c5fe6c4eSniklas.It Em LIFE_TYPE 452c5fe6c4eSniklas.Li SECONDS 453c5fe6c4eSniklasor 454e55ca143Sniklas.Li KILOBYTES 4554aac73a4Saarondepending on the type of the duration. 4564aac73a4SaaronNotice that this field may NOT be set to ANY. 457c5fe6c4eSniklas.It Em LIFE_DURATION 4584aac73a4SaaronAn offer/accept kind of value, see above. 4594aac73a4SaaronCan also be set to ANY. 460c5fe6c4eSniklas.El 46161d575f0Sangelos.It Em <IPsec-connection> 462c5fe6c4eSniklas.Bl -tag -width 12n 463c5fe6c4eSniklas.It Em Phase 464c5fe6c4eSniklasThe constant 465c5fe6c4eSniklas.Li 2 , 46661d575f0Sangelosas ISAKMP-peers and IPsec-connections 467c5fe6c4eSniklasreally are handled by the same code inside isakmpd. 468c5fe6c4eSniklas.It Em ISAKMP-peer 469c5fe6c4eSniklasThe name of the ISAKMP-peer which to talk to in order to 4709615e1d4Saaronset up this connection. 4719615e1d4SaaronThe value is the name of an <ISAKMP-peer> section. 4729615e1d4SaaronSee above. 473c5fe6c4eSniklas.It Em Configuration 47461d575f0SangelosThe name of the IPsec-configuration section to use. 47561d575f0SangelosLook at <IPsec-configuration> below. 476c5fe6c4eSniklas.It Em Local-ID 477c5fe6c4eSniklasIf existent, the name of the section that describes the 478c5fe6c4eSniklasoptional local client ID that we should present to our peer. 47980baf197SniklasIt is also used when we act as responders to find out what 48061d575f0Sangelos<IPsec-connection> we are dealing with. 48161d575f0SangelosLook at <IPsec-ID> below. 482c5fe6c4eSniklas.It Em Remote-ID 483c5fe6c4eSniklasIf existent, the name of the section that describes the 484c5fe6c4eSniklasoptional remote client ID that we should present to our peer. 48580baf197SniklasIt is also used when we act as responders to find out what 48661d575f0Sangelos<IPsec-connection> we are dealing with. 48761d575f0SangelosLook at <IPsec-ID> below. 48813a99464Sniklas.It Em Flags 48913a99464SniklasA comma-separated list of flags controlling the further 49061d575f0Sangeloshandling of the IPsec SA. 4919615e1d4SaaronCurrently only one flag is defined: 49280baf197Sniklas.Bl -tag -width 12n 49380baf197Sniklas.It Em Active-only 49461d575f0SangelosIf this flag is given and this <IPsec-connection> is part of the phase 2 49580baf197Sniklasconnections we automatically keep up, it will not automatically be used for 49680baf197Sniklasaccepting connections from the peer. 49780baf197Sniklas.El 498c5fe6c4eSniklas.El 49961d575f0Sangelos.It Em <IPsec-configuration> 500c5fe6c4eSniklas.Bl -tag -width 12n 501c5fe6c4eSniklas.It Em DOI 5029615e1d4SaaronThe domain of interpretation as given by the RFCs. 5039615e1d4SaaronNormally 504c5fe6c4eSniklas.Li IPSEC . 505b57b191eSniklasIf unspecified, defaults to 506b57b191eSniklas.Li IPSEC . 507c5fe6c4eSniklas.It Em EXCHANGE_TYPE 5089615e1d4SaaronThe exchange type as given by the RFCs. 5099615e1d4SaaronFor quick mode this is 510c5fe6c4eSniklas.Li QUICK_MODE . 511c5fe6c4eSniklas.It Em Suites 5123b2a0cf1SaaronA list of protection suites (bundles of protocols) usable for 5139615e1d4Saaronprotecting the IP traffic. 51461d575f0SangelosEach of the list elements is a name of an <IPsec-suite> section. 5159615e1d4SaaronSee below. 516c5fe6c4eSniklas.El 51761d575f0Sangelos.It Em <IPsec-suite> 518c5fe6c4eSniklas.Bl -tag -width 12n 519c5fe6c4eSniklas.It Em Protocols 520c5fe6c4eSniklasA list of the protocols included in this protection suite. 52161d575f0SangelosEach of the list elements is a name of an <IPsec-protocol> 5229615e1d4Saaronsection. 5239615e1d4SaaronSee below. 524c5fe6c4eSniklas.El 52561d575f0Sangelos.It Em <IPsec-protocol> 526c5fe6c4eSniklas.Bl -tag -width 12n 527c5fe6c4eSniklas.It Em PROTOCOL_ID 5289615e1d4SaaronThe protocol as given by the RFCs. 5299615e1d4SaaronAcceptable values today are 530c5fe6c4eSniklas.Li IPSEC_AH 531c5fe6c4eSniklasand 532c5fe6c4eSniklas.Li IPSEC_ESP . 533c5fe6c4eSniklas.It Em Transforms 5343b2a0cf1SaaronA list of transforms usable for implementing the protocol. 53561d575f0SangelosEach of the list elements is a name of an <IPsec-transform> 5369615e1d4Saaronsection. 5379615e1d4SaaronSee below. 538c5fe6c4eSniklas.It Em ReplayWindow 5399615e1d4SaaronThe size of the window used for replay protection. 5409615e1d4SaaronThis is normally left alone. 5419615e1d4SaaronLook at the 542c5fe6c4eSniklas.Nm ESP 543c5fe6c4eSniklasand 544c5fe6c4eSniklas.Nm AH 545c5fe6c4eSniklasRFCs for a better description. 546c5fe6c4eSniklas.El 54761d575f0Sangelos.It Em <IPsec-transform> 548c5fe6c4eSniklas.Bl -tag -width 12n 549c5fe6c4eSniklas.It Em TRANSFORM_ID 550c5fe6c4eSniklasThe transform ID as given by the RFCs. 551c5fe6c4eSniklas.It Em ENCAPSULATION_MODE 5529615e1d4SaaronThe encapsulation mode as given by the RFCs. 5539615e1d4SaaronThis means TRANSPORT or TUNNEL. 554c5fe6c4eSniklas.It Em AUTHENTICATION_ALGORITHM 555c5fe6c4eSniklasThe optional authentication algorithm in the case of this 556c5fe6c4eSniklasbeing an ESP transform. 557c5fe6c4eSniklas.It Em GROUP_DESCRIPTION 558c5fe6c4eSniklasAn optional (provides PFS if present) Diffie-Hellman group 5599615e1d4Saarondescription. 5609615e1d4SaaronThe values are the same as GROUP_DESCRIPTION's 561c5fe6c4eSniklasin <ISAKMP-transform> sections shown above. 562c5fe6c4eSniklas.It Em Life 563c5fe6c4eSniklasList of lifetimes, each element is a <Lifetime> section name. 564c5fe6c4eSniklas.El 56561d575f0Sangelos.It Em <IPsec-ID> 566c5fe6c4eSniklas.Bl -tag -width 12n 567c5fe6c4eSniklas.It Em ID-type 5689615e1d4SaaronThe ID type as given by the RFCs. 56961d575f0SangelosFor IPsec this is currently 570d8ca7c44Sho.Li IPV4_ADDR , 571d8ca7c44Sho.Li IPV6_ADDR , 572d8ca7c44Sho.Li IPV4_ADDR_SUBNET 573c5fe6c4eSniklasor 574d8ca7c44Sho.Li IPV6_ADDR_SUBNET . 575c5fe6c4eSniklas.It Em Address 576c5fe6c4eSniklasIf the ID-type is 577d8ca7c44Sho.Li IPV4_ADDR 578d8ca7c44Shoor 579d8ca7c44Sho.Li IPV6_ADDR 580c5fe6c4eSniklasthis tag should exist and be an IP-address. 581c5fe6c4eSniklas.It Em Network 582c5fe6c4eSniklasIf the ID-type is 583c5fe6c4eSniklas.Li IPV4_ADDR_SUBNET 584d8ca7c44Shoor 585d8ca7c44Sho.Li IPV6_ADDR_SUBNET 586c5fe6c4eSniklasthis tag should exist and 587c5fe6c4eSniklasbe a network address. 588c5fe6c4eSniklas.It Em Netmask 589c5fe6c4eSniklasIf the ID-type is 590c5fe6c4eSniklas.Li IPV4_ADDR_SUBNET 591d8ca7c44Shoor 592d8ca7c44Sho.Li IPV6_ADDR_SUBNET 593c5fe6c4eSniklasthis tag should exist and 594c5fe6c4eSniklasbe a network subnet mask. 5950378d1f2Sniklas.It Em Protocol 5960378d1f2SniklasIf the ID-type is 597d8ca7c44Sho.Li IPV4_ADDR , 5980378d1f2Sniklas.Li IPV4_ADDR_SUBNET , 599d8ca7c44Sho.Li IPV6_ADDR 600d8ca7c44Shoor 601d8ca7c44Sho.Li IPV6_ADDR_SUBNET 6020378d1f2Sniklasthis tag indicates what transport protocol should be transmitted over 6030378d1f2Sniklasthe SA. 6040378d1f2SniklasIf left unspecified, all transport protocols between the two address 6050378d1f2Sniklas(ranges) will be sent (or permitted) over that SA. 6060378d1f2Sniklas.It Em Port 6070378d1f2SniklasIf the ID-type is 608d8ca7c44Sho.Li IPV4_ADDR , 6090378d1f2Sniklas.Li IPV4_ADDR_SUBNET , 610d8ca7c44Sho.Li IPV6_ADDR 611d8ca7c44Shoor 612d8ca7c44Sho.Li IPV6_ADDR_SUBNET 6130378d1f2Sniklasthis tag indicates what source or destination port is allowed to be 6140378d1f2Sniklastransported over the SA (depending on whether this is a local or 6150378d1f2Sniklasremote ID). 6160378d1f2SniklasIf left unspecified, all ports of the given transport protocol 6170378d1f2Sniklaswill be transmitted (or permitted) over the SA. 6180378d1f2SniklasThe Protocol tag must be specified in conjunction with this tag. 619c5fe6c4eSniklas.El 620c5fe6c4eSniklas.El 6214ca71560Sho.Ss Other sections 6224ca71560Sho.Bl -hang -width 12n 6234ca71560Sho.It Em <IKECFG-ID> 6244ca71560ShoParameters to use with IKE mode-config. One ID per peer. 6254ca71560Sho.Pp 6264ca71560ShoAn IKECFG-ID is written as [<ID-type>/<name>]. 6274ca71560ShoThe following ID types are supported: 6284ca71560Sho.Bl -tag -width 12n 6294ca71560Sho.It IPv4 6304ca71560Sho[ipv4/A.B.C.D] 6314ca71560Sho.It IPv6 6324ca71560Sho[ipv6/abcd:abcd::ab:cd] 6334ca71560Sho.It FQDN 6344ca71560Sho[fqdn/foo.bar.org] 6354ca71560Sho.It UFQDN 6364ca71560Sho[ufqdn/user@foo.bar.org] 6374ca71560Sho.It ASN1_DN 6384ca71560Sho[asn1_dn//C=aa/O=cc/...] (Note the double slashes as the DN itself 6394ca71560Shostarts with a '/'.) 6404ca71560Sho.El 6414ca71560Sho.Pp 6424ca71560ShoEach section specifies what configuration values to return to the peer 6434ca71560Shorequesting IKE mode-config. Currently supported values are: 6444ca71560Sho.Bl -tag -width 12n 6454ca71560Sho.It Em Address 6464ca71560ShoThe peer's network address. 6474ca71560Sho.It Em Netmask 6484ca71560ShoThe peer's netmask. 6494ca71560Sho.It Em Nameserver 6504ca71560ShoThe IP address of a DNS nameserver. 6514ca71560Sho.It Em WINS-server 6524ca71560ShoThe IP address of a WINS server. 6534ca71560Sho.El 6544ca71560Sho.El 65500b2ba71Saaron.Sh EXAMPLES 6562040585eSniklasAn example of a configuration file: 6572040585eSniklas.Pp 6582040585eSniklas.Bd -literal 6592040585eSniklas# A configuration sample for the isakmpd ISAKMP/Oakley (aka IKE) daemon. 6602040585eSniklas 6612040585eSniklas[General] 662c5fe6c4eSniklasListen-on= 10.1.0.2 6632040585eSniklas 664c5fe6c4eSniklas# Incoming phase 1 negotiations are multiplexed on the source IP address 6652b81057dSniklas[Phase 1] 666c5fe6c4eSniklas10.1.0.1= ISAKMP-peer-west 6672b81057dSniklas 668c5fe6c4eSniklas# These connections are walked over after config file parsing and told 669c5fe6c4eSniklas# to the application layer so that it will inform us when traffic wants to 670c5fe6c4eSniklas# pass over them. This means we can do on-demand keying. 671c5fe6c4eSniklas[Phase 2] 672c5fe6c4eSniklasConnections= IPsec-east-west 673c5fe6c4eSniklas 674cc3c8b42Sniklas# Default values are commented out. 675c5fe6c4eSniklas[ISAKMP-peer-west] 6762b81057dSniklasPhase= 1 677cc3c8b42Sniklas#Transport= udp 678f6dd85a7SniklasLocal-address= 10.1.0.2 6792b81057dSniklasAddress= 10.1.0.1 6802b81057dSniklas#Port= isakmp 6812b81057dSniklas#Port= 500 682*419caefeSho#Configuration= Default-Phase-1-Configuration 6832b81057dSniklasAuthentication= mekmitasdigoat 684cc3c8b42Sniklas#Flags= 6852b81057dSniklas 686c5fe6c4eSniklas[IPsec-east-west] 6872b81057dSniklasPhase= 2 688c5fe6c4eSniklasISAKMP-peer= ISAKMP-peer-west 6892b81057dSniklasConfiguration= Default-quick-mode 690c5fe6c4eSniklasLocal-ID= Net-east 691c5fe6c4eSniklasRemote-ID= Net-west 692cc3c8b42Sniklas#Flags= 6932b81057dSniklas 694c5fe6c4eSniklas[Net-west] 6952b81057dSniklasID-type= IPV4_ADDR_SUBNET 6962b81057dSniklasNetwork= 192.168.1.0 6972b81057dSniklasNetmask= 255.255.255.0 6982b81057dSniklas 699c5fe6c4eSniklas[Net-east] 7002b81057dSniklasID-type= IPV4_ADDR_SUBNET 7012b81057dSniklasNetwork= 192.168.2.0 7022b81057dSniklasNetmask= 255.255.255.0 7032b81057dSniklas 70452e712aeSniklas# Quick mode descriptions 70552e712aeSniklas 70652e712aeSniklas[Default-quick-mode] 70752e712aeSniklasEXCHANGE_TYPE= QUICK_MODE 7081a87c1a3ShoSuites= QM-ESP-3DES-SHA-PFS-SUITE,QM-ESP-AES-SHA-PFS-SUITE 70952e712aeSniklas 7104ca71560Sho# Data for an IKE mode-config peer 7114ca71560Sho[asn1_dn//C=SE/L=SomeCity/O=SomeCompany/CN=SomePeer.company.com] 7124ca71560ShoAddress= 192.168.1.123 7134ca71560ShoNetmask= 255.255.255.0 7144ca71560ShoNameserver= 192.168.1.10 7154ca71560ShoWINS-server= 192.168.1.11 7164ca71560Sho 71752e712aeSniklas# 71852e712aeSniklas# ##################################################################### 71952e712aeSniklas# All configration data below this point is not required as the example 72052e712aeSniklas# uses the predefined Main Mode transform and Quick Mode suite names. 72152e712aeSniklas# It is included here for completeness. Note the default values for the 72252e712aeSniklas# [General] and [X509-certificates] sections just below. 72352e712aeSniklas# ##################################################################### 72452e712aeSniklas# 72552e712aeSniklas 72652e712aeSniklas[General] 727447a9f3aShoPolicy-file= /etc/isakmpd/isakmpd.policy 72852e712aeSniklasRetransmits= 3 72952e712aeSniklasExchange-max-time= 120 73052e712aeSniklas 731b57b191eSniklas# KeyNote credential storage 732b57b191eSniklas[KeyNote] 733b57b191eSniklasCredential-directory= /etc/isakmpd/keynote/ 734b57b191eSniklas 735fb1921ccSniklas# Certificates stored in PEM format 736fb1921ccSniklas[X509-certificates] 737fb1921ccSniklasCA-directory= /etc/isakmpd/ca/ 738fb1921ccSniklasCert-directory= /etc/isakmpd/certs/ 7399dbe9fb4ShoCRL-directory= /etc/isakmpd/crls/ 740954b1b31SniklasPrivate-key= /etc/isakmpd/private/local.key 741fb1921ccSniklas 742*419caefeSho# Default phase 1 description (Main Mode) 743*419caefeSho 744*419caefeSho[Default-Phase-1-Configuration] 745*419caefeShoEXCHANGE_TYPE= ID_PROT 746*419caefeShoTransforms= 3DES-SHA 747*419caefeSho 7482b81057dSniklas# Main mode transforms 7492b81057dSniklas###################### 7502b81057dSniklas 7512b81057dSniklas# DES 7522040585eSniklas 7532040585eSniklas[DES-MD5] 7542040585eSniklasENCRYPTION_ALGORITHM= DES_CBC 7552040585eSniklasHASH_ALGORITHM= MD5 7562040585eSniklasAUTHENTICATION_METHOD= PRE_SHARED 7572039fcadShoGROUP_DESCRIPTION= MODP_1024 75860f440ccShoLife= Default-phase-1-lifetime 7592040585eSniklas 7602b81057dSniklas[DES-SHA] 7612b81057dSniklasENCRYPTION_ALGORITHM= DES_CBC 7622b81057dSniklasHASH_ALGORITHM= SHA 7632b81057dSniklasAUTHENTICATION_METHOD= PRE_SHARED 76460f440ccShoGROUP_DESCRIPTION= MODP_1024 76560f440ccShoLife= Default-phase-1-lifetime 7662b81057dSniklas 7672b81057dSniklas# 3DES 7682b81057dSniklas 7692b81057dSniklas[3DES-SHA] 7702b81057dSniklasENCRYPTION_ALGORITHM= 3DES_CBC 7712040585eSniklasHASH_ALGORITHM= SHA 7722040585eSniklasAUTHENTICATION_METHOD= PRE_SHARED 7732040585eSniklasGROUP_DESCRIPTION= MODP_1024 77460f440ccShoLife= Default-phase-1-lifetime 7752b81057dSniklas 7762b81057dSniklas# Blowfish 7772b81057dSniklas 77860f440ccSho[BLF-SHA] 7792b81057dSniklasENCRYPTION_ALGORITHM= BLOWFISH_CBC 7802b81057dSniklasKEY_LENGTH= 128,96:192 7812b81057dSniklasHASH_ALGORITHM= SHA 7822b81057dSniklasAUTHENTICATION_METHOD= PRE_SHARED 7832b81057dSniklasGROUP_DESCRIPTION= MODP_1024 78460f440ccShoLife= Default-phase-1-lifetime 7852040585eSniklas 78660f440ccSho# Blowfish, using DH group 4 (non-default) 7872040585eSniklas[BLF-SHA-EC185] 788d70ca5f7SniklasENCRYPTION_ALGORITHM= BLOWFISH_CBC 7892b81057dSniklasKEY_LENGTH= 128,96:192 7902040585eSniklasHASH_ALGORITHM= SHA 7912040585eSniklasAUTHENTICATION_METHOD= PRE_SHARED 7922040585eSniklasGROUP_DESCRIPTION= EC2N_185 79360f440ccShoLife= Default-phase-1-lifetime 7942040585eSniklas 7952b81057dSniklas# Quick mode protection suites 7962b81057dSniklas############################## 7972b81057dSniklas 7982b81057dSniklas# DES 7992040585eSniklas 800d70ca5f7Sniklas[QM-ESP-DES-SUITE] 801d70ca5f7SniklasProtocols= QM-ESP-DES 802d70ca5f7Sniklas 8032b81057dSniklas[QM-ESP-DES-PFS-SUITE] 8042b81057dSniklasProtocols= QM-ESP-DES-PFS 8052b81057dSniklas 8062040585eSniklas[QM-ESP-DES-MD5-SUITE] 8072040585eSniklasProtocols= QM-ESP-DES-MD5 8082040585eSniklas 8092b81057dSniklas[QM-ESP-DES-MD5-PFS-SUITE] 8102b81057dSniklasProtocols= QM-ESP-DES-MD5-PFS 8112040585eSniklas 8122b81057dSniklas[QM-ESP-DES-SHA-SUITE] 8132b81057dSniklasProtocols= QM-ESP-DES-SHA 8142040585eSniklas 8152b81057dSniklas[QM-ESP-DES-SHA-PFS-SUITE] 8162b81057dSniklasProtocols= QM-ESP-DES-SHA-PFS 8172040585eSniklas 8182b81057dSniklas# 3DES 8192b81057dSniklas 8202b81057dSniklas[QM-ESP-3DES-SHA-SUITE] 8212b81057dSniklasProtocols= QM-ESP-3DES-SHA 8222b81057dSniklas 8232b81057dSniklas[QM-ESP-3DES-SHA-PFS-SUITE] 8242b81057dSniklasProtocols= QM-ESP-3DES-SHA-PFS 8252b81057dSniklas 826bfc24386Sniklas# AES 827bfc24386Sniklas 828bfc24386Sniklas[QM-ESP-AES-SHA-SUITE] 829bfc24386SniklasProtocols= QM-ESP-AES-SHA 830bfc24386Sniklas 83160f440ccSho[QM-ESP-AES-SHA-PFS-SUITE] 832bfc24386SniklasProtocols= QM-ESP-AES-SHA-PFS 833bfc24386Sniklas 8342b81057dSniklas# AH 8352b81057dSniklas 8362b81057dSniklas[QM-AH-MD5-SUITE] 8372b81057dSniklasProtocols= QM-AH-MD5 8382b81057dSniklas 8392b81057dSniklas[QM-AH-MD5-PFS-SUITE] 8402b81057dSniklasProtocols= QM-AH-MD5-PFS 8412b81057dSniklas 84260f440ccSho# AH + ESP (non-default) 8432040585eSniklas 8442040585eSniklas[QM-AH-MD5-ESP-DES-SUITE] 8452040585eSniklasProtocols= QM-AH-MD5,QM-ESP-DES 8462040585eSniklas 8472b81057dSniklas[QM-AH-MD5-ESP-DES-MD5-SUITE] 8482b81057dSniklasProtocols= QM-AH-MD5,QM-ESP-DES-MD5 8492040585eSniklas 8502b81057dSniklas[QM-ESP-DES-MD5-AH-MD5-SUITE] 8512b81057dSniklasProtocols= QM-ESP-DES-MD5,QM-AH-MD5 8522b81057dSniklas 8532b81057dSniklas# Quick mode protocols 8542b81057dSniklas 8552b81057dSniklas# DES 8562040585eSniklas 8572040585eSniklas[QM-ESP-DES] 8582040585eSniklasPROTOCOL_ID= IPSEC_ESP 8592040585eSniklasTransforms= QM-ESP-DES-XF 8602040585eSniklas 8612b81057dSniklas[QM-ESP-DES-MD5] 8622b81057dSniklasPROTOCOL_ID= IPSEC_ESP 8632b81057dSniklasTransforms= QM-ESP-DES-MD5-XF 8642b81057dSniklas 8652b81057dSniklas[QM-ESP-DES-MD5-PFS] 8662b81057dSniklasPROTOCOL_ID= IPSEC_ESP 8672b81057dSniklasTransforms= QM-ESP-DES-MD5-PFS-XF 8682b81057dSniklas 8692b81057dSniklas[QM-ESP-DES-SHA] 8702b81057dSniklasPROTOCOL_ID= IPSEC_ESP 8712b81057dSniklasTransforms= QM-ESP-DES-SHA-XF 8722b81057dSniklas 8732b81057dSniklas# 3DES 8742b81057dSniklas 8752b81057dSniklas[QM-ESP-3DES-SHA] 8762b81057dSniklasPROTOCOL_ID= IPSEC_ESP 8772b81057dSniklasTransforms= QM-ESP-3DES-SHA-XF 8782b81057dSniklas 8792b81057dSniklas[QM-ESP-3DES-SHA-PFS] 8802b81057dSniklasPROTOCOL_ID= IPSEC_ESP 8812b81057dSniklasTransforms= QM-ESP-3DES-SHA-PFS-XF 8822b81057dSniklas 8832b81057dSniklas[QM-ESP-3DES-SHA-TRP] 8842b81057dSniklasPROTOCOL_ID= IPSEC_ESP 8852b81057dSniklasTransforms= QM-ESP-3DES-SHA-TRP-XF 8862b81057dSniklas 887bfc24386Sniklas# AES 888bfc24386Sniklas 889bfc24386Sniklas[QM-ESP-AES-SHA] 890bfc24386SniklasPROTOCOL_ID= IPSEC_ESP 891bfc24386SniklasTransforms= QM-ESP-AES-SHA-XF 892bfc24386Sniklas 893bfc24386Sniklas[QM-ESP-AES-SHA-PFS] 894bfc24386SniklasPROTOCOL_ID= IPSEC_ESP 895bfc24386SniklasTransforms= QM-ESP-AES-SHA-PFS-XF 896bfc24386Sniklas 897bfc24386Sniklas[QM-ESP-AES-SHA-TRP] 898bfc24386SniklasPROTOCOL_ID= IPSEC_ESP 899bfc24386SniklasTransforms= QM-ESP-AES-SHA-TRP-XF 900bfc24386Sniklas 9012b81057dSniklas# AH MD5 9022b81057dSniklas 9032b81057dSniklas[QM-AH-MD5] 9042b81057dSniklasPROTOCOL_ID= IPSEC_AH 9052b81057dSniklasTransforms= QM-AH-MD5-XF 9062b81057dSniklas 9072b81057dSniklas[QM-AH-MD5-PFS] 9082b81057dSniklasPROTOCOL_ID= IPSEC_AH 9092b81057dSniklasTransforms= QM-AH-MD5-PFS-XF 9102b81057dSniklas 9112b81057dSniklas# Quick mode transforms 9122b81057dSniklas 9132b81057dSniklas# ESP DES+MD5 9142b81057dSniklas 9152040585eSniklas[QM-ESP-DES-XF] 9162040585eSniklasTRANSFORM_ID= DES 9172040585eSniklasENCAPSULATION_MODE= TUNNEL 91860f440ccShoLife= Default-phase-2-lifetime 9192040585eSniklas 9202b81057dSniklas[QM-ESP-DES-MD5-XF] 9212b81057dSniklasTRANSFORM_ID= DES 9222b81057dSniklasENCAPSULATION_MODE= TUNNEL 9232b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_MD5 92460f440ccShoLife= Default-phase-2-lifetime 9252b81057dSniklas 9262b81057dSniklas[QM-ESP-DES-MD5-PFS-XF] 9272b81057dSniklasTRANSFORM_ID= DES 9282b81057dSniklasENCAPSULATION_MODE= TUNNEL 9292039fcadShoGROUP_DESCRIPTION= MODP_1024 9302b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_MD5 93160f440ccShoLife= Default-phase-2-lifetime 9322b81057dSniklas 9332b81057dSniklas[QM-ESP-DES-SHA-XF] 9342b81057dSniklasTRANSFORM_ID= DES 9352b81057dSniklasENCAPSULATION_MODE= TUNNEL 9362b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 93760f440ccShoLife= Default-phase-2-lifetime 9382b81057dSniklas 9392b81057dSniklas# 3DES 9402b81057dSniklas 9412b81057dSniklas[QM-ESP-3DES-SHA-XF] 9422b81057dSniklasTRANSFORM_ID= 3DES 9432b81057dSniklasENCAPSULATION_MODE= TUNNEL 9442b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 94560f440ccShoLife= Default-phase-2-lifetime 9462b81057dSniklas 9472b81057dSniklas[QM-ESP-3DES-SHA-PFS-XF] 9482b81057dSniklasTRANSFORM_ID= 3DES 9492b81057dSniklasENCAPSULATION_MODE= TUNNEL 9502b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 9512b81057dSniklasGROUP_DESCRIPTION= MODP_1024 95260f440ccShoLife= Default-phase-2-lifetime 9532b81057dSniklas 9542b81057dSniklas[QM-ESP-3DES-SHA-TRP-XF] 9552b81057dSniklasTRANSFORM_ID= 3DES 9562b81057dSniklasENCAPSULATION_MODE= TRANSPORT 9572b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 95860f440ccShoLife= Default-phase-2-lifetime 9592b81057dSniklas 960bfc24386Sniklas# AES 961bfc24386Sniklas 962bfc24386Sniklas[QM-ESP-AES-SHA-XF] 963bfc24386SniklasTRANSFORM_ID= AES 964bfc24386SniklasENCAPSULATION_MODE= TUNNEL 965bfc24386SniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 96660f440ccShoLife= Default-phase-2-lifetime 967bfc24386Sniklas 968bfc24386Sniklas[QM-ESP-AES-SHA-PFS-XF] 969bfc24386SniklasTRANSFORM_ID= AES 970bfc24386SniklasENCAPSULATION_MODE= TUNNEL 971bfc24386SniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 972bfc24386SniklasGROUP_DESCRIPTION= MODP_1024 97360f440ccShoLife= Default-phase-2-lifetime 974bfc24386Sniklas 975bfc24386Sniklas[QM-ESP-AES-SHA-TRP-XF] 976bfc24386SniklasTRANSFORM_ID= AES 977bfc24386SniklasENCAPSULATION_MODE= TRANSPORT 978bfc24386SniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 97960f440ccShoLife= Default-phase-2-lifetime 980bfc24386Sniklas 9812b81057dSniklas# AH 9822b81057dSniklas 9832b81057dSniklas[QM-AH-MD5-XF] 9842b81057dSniklasTRANSFORM_ID= MD5 9852b81057dSniklasENCAPSULATION_MODE= TUNNEL 9862b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_MD5 98760f440ccShoLife= Default-phase-2-lifetime 9882b81057dSniklas 9892b81057dSniklas[QM-AH-MD5-PFS-XF] 9902b81057dSniklasTRANSFORM_ID= MD5 9912b81057dSniklasENCAPSULATION_MODE= TUNNEL 9922039fcadShoGROUP_DESCRIPTION= MODP_1024 99360f440ccShoLife= Default-phase-2-lifetime 9942b81057dSniklas 99560f440ccSho[Sample-Life-Time] 9962b81057dSniklasLIFE_TYPE= SECONDS 9972b81057dSniklasLIFE_DURATION= 3600,1800:7200 9982b81057dSniklas 99960f440ccSho[Sample-Life-Volume] 10002b81057dSniklasLIFE_TYPE= KILOBYTES 10012b81057dSniklasLIFE_DURATION= 1000,768:1536 10022040585eSniklas.Ed 1003ab1e9dfdSho.Sh FILES 1004ab1e9dfdSho.Bl -tag -width /etc/isakmpd/isakmpd.conf 1005ab1e9dfdSho.It Pa /etc/isakmpd/isakmpd.conf 1006ab1e9dfdShoThe default 1007ab1e9dfdSho.Nm isakmpd 1008ab1e9dfdShoconfiguration file. 1009ab1e9dfdSho.It Pa /usr/share/ipsec/isakmpd/ 1010ab1e9dfdShoA directory containing some sample 1011ab1e9dfdSho.Nm isakmpd 1012ab1e9dfdShoconfiguration files. 1013ab1e9dfdSho.El 10142040585eSniklas.Sh SEE ALSO 1015b57b191eSniklas.Xr keynote 1 , 1016dc89b21eSfgsch.Xr ipsec 4 , 101730a2652aSniklas.Xr keynote 4 , 101877725688Sniklas.Xr isakmpd.policy 5 , 1019350bb3b8Salex.Xr isakmpd 8 1020