xref: /openbsd/sbin/isakmpd/isakmpd.conf.5 (revision 419caefe)
1*419caefeSho.\" $OpenBSD: isakmpd.conf.5,v 1.69 2002/11/15 14:58:38 ho Exp $
2e55ca143Sniklas.\" $EOM: isakmpd.conf.5,v 1.57 2000/12/21 14:43:17 ho Exp $
32040585eSniklas.\"
444f0148dSniklas.\" Copyright (c) 1998, 1999, 2000 Niklas Hallqvist.  All rights reserved.
54ca71560Sho.\" Copyright (c) 2000, 2001, 2002 H�kan Olsson.  All rights reserved.
62040585eSniklas.\"
72040585eSniklas.\" Redistribution and use in source and binary forms, with or without
82040585eSniklas.\" modification, are permitted provided that the following conditions
92040585eSniklas.\" are met:
102040585eSniklas.\" 1. Redistributions of source code must retain the above copyright
112040585eSniklas.\"    notice, this list of conditions and the following disclaimer.
122040585eSniklas.\" 2. Redistributions in binary form must reproduce the above copyright
132040585eSniklas.\"    notice, this list of conditions and the following disclaimer in the
142040585eSniklas.\"    documentation and/or other materials provided with the distribution.
152040585eSniklas.\" 3. All advertising materials mentioning features or use of this software
162040585eSniklas.\"    must display the following acknowledgement:
172040585eSniklas.\"	This product includes software developed by Ericsson Radio Systems.
182040585eSniklas.\" 4. The name of the author may not be used to endorse or promote products
192040585eSniklas.\"    derived from this software without specific prior written permission.
202040585eSniklas.\"
212040585eSniklas.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
222040585eSniklas.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
232040585eSniklas.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
242040585eSniklas.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
252040585eSniklas.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
262040585eSniklas.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
272040585eSniklas.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
282040585eSniklas.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
292040585eSniklas.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
302040585eSniklas.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
312040585eSniklas.\"
322040585eSniklas.\" This code was written under funding by Ericsson Radio Systems.
332040585eSniklas.\"
342040585eSniklas.\" Manual page, using -mandoc macros
352040585eSniklas.\"
362040585eSniklas.Dd October 10, 1998
3758aefd4bSaaron.Dt ISAKMPD.CONF 5
382040585eSniklas.Os
392040585eSniklas.Sh NAME
402040585eSniklas.Nm isakmpd.conf
4158aefd4bSaaron.Nd configuration file for isakmpd
422040585eSniklas.Sh DESCRIPTION
4358aefd4bSaaron.Nm
4458aefd4bSaaronis the configuration file for the
452040585eSniklas.Nm isakmpd
462040585eSniklasdaemon managing security association and key management for the
4761d575f0SangelosIPsec layer of the kernel's networking stack.
482040585eSniklas.Pp
492040585eSniklasThe file is of a well known type of format called .INI style, named after
502040585eSniklasthe suffix used by an overrated windowing environment for its configuration
519615e1d4Saaronfiles.
529615e1d4SaaronThis format consists of sections, each beginning with a line looking like:
532040585eSniklas.Bd -literal
542040585eSniklas[Section name]
552040585eSniklas.Ed
562040585eSniklasBetween the brackets is the name of the section following this section header.
572040585eSniklasInside a section many tag/value pairs can be stored, each one looking like:
582040585eSniklas.Bd -literal
592040585eSniklasTag=Value
602040585eSniklas.Ed
612040585eSniklasIf the value needs more space than fits on a single line it's possible to
62a2067f52Sniklascontinue it on the next by ending the first with a backslash character
639615e1d4Saaronimmediately before the newline character.
649615e1d4SaaronThis method can extend a value for an arbitrary amount of lines.
652040585eSniklas.Pp
6658aefd4bSaaronComments can be put anywhere in the file by using a hash mark
6758aefd4bSaaron.Pq Sq \&# .
6858aefd4bSaaronThen the comment goes on to the end of the line.
692040585eSniklas.Pp
70c5fe6c4eSniklasOften the right-hand side values consist of other section names.
71c5fe6c4eSniklasThis results in a tree structure.
72c5fe6c4eSniklasSome values are treated as a list of several scalar values, such lists always
739615e1d4Saaronuse comma as the separator.
749615e1d4SaaronSome values are formatted like this: X,Y:Z, which
75c5fe6c4eSniklasis an offer/accept syntax, where X is a value we offer and Y:Z is a range of
76c5fe6c4eSniklasaccepted values, inclusive.
77c5fe6c4eSniklas.Pp
78bad0180eShoTo activate changes to
79bad0180eSho.Nm
80bad0180eShowithout restarting
81bad0180eSho.Nm isakmpd ,
82bad0180eShosend a SIGHUP signal to the daemon process.
8352e712aeSniklas.Ss Auto-generated parts of the configuration
8452e712aeSniklas.Pp
8552e712aeSniklasSome predefined section names are recognized by the daemon, voiding the need
8652e712aeSniklasto fully specify the Main Mode transforms and Quick Mode suites, protocols
8752e712aeSniklasand transforms.
8852e712aeSniklas.Pp
8952e712aeSniklasFor Main Mode:
9018656612Saaron.Bd -filled -compact
912039fcadSho.Ar {DES,BLF,3DES,CAST}-{MD5,SHA}[-GRP{1,2,5}][-{DSS,RSA_SIG}]
9252e712aeSniklas.Ed
9352e712aeSniklas.Pp
9452e712aeSniklasFor Quick Mode:
9518656612Saaron.Bd -filled -compact
962039fcadSho.Ar QM-{proto}[-TRP]-{cipher}[-{hash}][-PFS[-{group}]]-SUITE
972039fcadSho.Ed
982039fcadSho.Bd -literal
992039fcadSho  where
1002039fcadSho    {proto}  is either ESP or AH
1012039fcadSho    {cipher} is either DES, 3DES, CAST, BLF or AES
1022039fcadSho    {hash}   is either MD5, SHA or RIPEMD
1032039fcadSho    {group}  is either GRP1, GRP2 or GRP5
10452e712aeSniklas.Ed
10552e712aeSniklas.Pp
10652e712aeSniklasExample 1: 3DES-SHA means; 3DES encryption, SHA hash, and authorization by
10752e712aeSniklaspre-shared keys.
10852e712aeSniklasExample 2: QM-ESP-3DES-SHA-PFS-SUITE means; ESP protocol, 3DES encryption,
10952e712aeSniklasSHA hash, and use Perfect Forward Security.
11052e712aeSniklas.Pp
11152e712aeSniklas.Pp
1122039fcadShoUnless explicitly stated with -GRP1, 2 or 5, transforms and PFS suites
1132039fcadShouse DH group 2. There are currently no predefined ESP+AH Quick Mode suites.
11452e712aeSniklas.Pp
1152039fcadShoThe predefinitions include some default values for the special
116*419caefeShosections "General", "Keynote", "X509-certificates", and
117*419caefeSho"Default-Phase-1-Configuration".
118*419caefeShoThese default values are presented in the example below.
11952e712aeSniklas.Pp
12052e712aeSniklasAll autogenerated values can be overridden by manual entries by using the
12152e712aeSniklassame section and tag names in the configuration file.
122b57b191eSniklasIn particular, the default phase 1 (Main or Aggressive Mode) and phase 2
123b57b191eSniklas(Quick Mode) lifetimes can be overridden by these tags under the "General"
124b57b191eSniklassection;
125b57b191eSniklas.Pp
126b57b191eSniklas.Bd -literal
127b57b191eSniklas[General]
128b57b191eSniklasDefault-phase-1-lifetime=	3600,60:86400
129b57b191eSniklasDefault-phase-2-lifetime=	1200,60:86400
130b57b191eSniklas.Ed
1312039fcadSho.Pp
1322039fcadShoThe Main Mode lifetime currently defaults to one hour (minimum 60
1332039fcadShoseconds, maximum 1 day). The Quick Mode lifetime defaults to 20
1342039fcadShominutes (minimum 60 seconds, maximum 1 day).
13552e712aeSniklas.\"XXX Following empty .Ss works around a nroff bug, we want the new line."
13652e712aeSniklas.Ss
13752e712aeSniklas.Pp
1380378d1f2SniklasAlso, the default Phase 1 ID can be set by creating a <Phase1-ID>
1390378d1f2Sniklassection, as shown below, and adding this tag under the "General"
1400378d1f2Sniklassection;
1410378d1f2Sniklas.Pp
1420378d1f2Sniklas.Bd -literal
1430378d1f2Sniklas[General]
1440378d1f2SniklasDefault-phase-1-ID=		Phase1-ID-name
1450378d1f2Sniklas
1460378d1f2Sniklas[Phase1-ID-name]
1470378d1f2SniklasID-type=			USER_FQDN
1480378d1f2SniklasName=				foo@bar.com
1490378d1f2Sniklas.Ed
1500378d1f2Sniklas.\"XXX Following empty .Ss works around a nroff bug, we want the new line."
1510378d1f2Sniklas.Ss
1520378d1f2Sniklas.Pp
153c5fe6c4eSniklas.Ss Roots
154c5fe6c4eSniklas.Bl -hang -width 12n
155c5fe6c4eSniklas.It Em General
156c5fe6c4eSniklasGeneric global configuration parameters
157c5fe6c4eSniklas.Bl -tag -width 12n
158447a9f3aSho.It Em Policy-file
15980c8b3dbSniklasThe name of the file that contains
16080c8b3dbSniklas.Xr KeyNote 4
1614aac73a4Saaronpolicies.
1624aac73a4SaaronThe default is "/etc/isakmpd/isakmpd.policy".
1637167d783Sangelos.It Em Default-Phase-2-Suites
1647167d783SangelosA list of Phase 2 suites that will be used when establishing dynamic
1657167d783SangelosSAs.
1667167d783SangelosIf left unspecified, QM-ESP-3DES-SHA-PFS-SUITE is used as the default.
167c5fe6c4eSniklas.It Em Retransmits
168c5fe6c4eSniklasHow many times should a message be retransmitted before giving up.
169b393bef8Sniklas.It Em Check-interval
170b393bef8SniklasThe interval between watchdog checks of connections we want up at all times.
171c5fe6c4eSniklas.It Em Exchange-max-time
172c5fe6c4eSniklasHow many seconds should an exchange maximally take to setup
173c5fe6c4eSniklasbefore we give up.
174c5fe6c4eSniklas.It Em Listen-on
1759615e1d4SaaronA list of IP-addresses OK to listen on.
1769615e1d4SaaronThis list is used as
177c5fe6c4eSniklasa filter for the set of addresses the interfaces configured
1789615e1d4Saaronprovides.
1799615e1d4SaaronThis means that we won't see if an address given
18080c8b3dbSniklashere does not exist on this host, and thus no error is given for
181c5fe6c4eSniklasthat case.
182463c7dc9Sniklas.It Em Shared-SADB
183463c7dc9SniklasIf this tag is defined, whatever the value is, some semantics of
184463c7dc9Sniklas.Nm
185463c7dc9Sniklasare changed so that multiple instances can run on top of one SADB
1869615e1d4Saaronand setup SAs with eachother.
1879615e1d4SaaronSpecifically this means replay
188463c7dc9Sniklasprotection will not be asked for, and errors that can occur when
189463c7dc9Sniklasupdating an SA with its parameters a 2nd time will be ignored.
1900b880a72Sho.It Em Pubkey-directory
1910b880a72ShoThe directory in which
1920b880a72Sho.Nm
193ac1aa35bSmpechlooks for explicitly trusted public keys.
194ac1aa35bSmpechThe default is "/etc/isakmpd/pubkeys".
195ac1aa35bSmpechRead
1960b880a72Sho.Xr isakmpd 8
1970b880a72Shofor the required naming convention of the files in here.
198c5fe6c4eSniklas.El
199c5fe6c4eSniklas.It Em Phase 1
200c5fe6c4eSniklasISAKMP SA negotiation parameter root
201c5fe6c4eSniklas.Bl -tag -width 12n
202c5fe6c4eSniklas.It Em <IP-address>
2039615e1d4SaaronA name of the ISAKMP peer at the given IP-address.
204cc3c8b42Sniklas.It Em Default
205ac1aa35bSmpechA name of the default ISAKMP peer.
206ac1aa35bSmpechIncoming Phase 1 connections from other IP-addresses will use this peer name.
207cc3c8b42Sniklas.It ""
2089615e1d4SaaronThis name is used as the section name for further information to be found.
2099615e1d4SaaronLook at <ISAKMP-peer> below.
210c5fe6c4eSniklas.El
211c5fe6c4eSniklas.It Em Phase 2
212c5fe6c4eSniklasIPsec SA negotiation parameter root
213c5fe6c4eSniklas.Bl -tag -width 12n
214c5fe6c4eSniklas.It Em Connections
21561d575f0SangelosA list of directed IPsec "connection" names that should be brought up
2162ddc24cbSniklasautomatically, either on first use if the system supports it, or at
2179615e1d4Saaronstartup of the daemon.
2189615e1d4SaaronThese names are section names where further information can be found.
21961d575f0SangelosLook at <IPsec-connection> below.
22080baf197SniklasNormally any connection mentioned here are treated as part of the
22180baf197Sniklas"Passive-connection" list we present below, however there is a
2229615e1d4Saaronflag: "Active-only" that disables this behaviour.
22361d575f0SangelosThis too is mentioned in the <IPsec-connection> section, in the "Flags" tag.
22480baf197Sniklas.It Em Passive-connections
22561d575f0SangelosA list of IPsec "connection" names we recognize and accept initiations for.
2269615e1d4SaaronThese names are section names where further information can be found.
22761d575f0SangelosLook at <IPsec-connection> below.
2289615e1d4SaaronCurrently only the Local-ID and Remote-ID tags
22980baf197Sniklasare looked at in those sections, as they are matched against the IDs given
23080baf197Sniklasby the initiator.
231c5fe6c4eSniklas.El
232b57b191eSniklas.It Em KeyNote
233b57b191eSniklas.Bl -tag -width 12n
234b57b191eSniklas.It Em Credential-directory
235b57b191eSniklasA directory containing directories named after IDs (IP
236b57b191eSniklasaddresses, ``user@domain'', or hostnames) that contain files named
237b57b191eSniklas``credentials'' and ``private_key''.
238b57b191eSniklas.Pp
239b57b191eSniklasThe credentials file contains
240b57b191eSniklas.Xr keynote 4
241b57b191eSniklascredentials that are sent to a remote IKE daemon when we use the
242b57b191eSniklasassociated ID, or credentials that we may want to consider when doing
243ac1aa35bSmpechan exchange with a remote IKE daemon that uses that ID.
244ac1aa35bSmpechNote that, in the former case, the last credential in the file
245ac1aa35bSmpechMUST contain our public key in its Licensees field.
246ac1aa35bSmpechMore than one credentials may exist in the file.
247ac1aa35bSmpechThey are separated by whitelines (the format is essentially the same as
248ac1aa35bSmpechthat of the policy file).
249ac1aa35bSmpechThe credentials are of the same format as the policies described in
250b57b191eSniklas.Xr isakmpd.policy 5 .
251b57b191eSniklasThe only difference is that the Authorizer field contains a public
252ac1aa35bSmpechkey, and the assertion is signed.
253ac1aa35bSmpechSigned assertions can be generated using the
254b57b191eSniklas.Xr keynote 1
255b57b191eSniklasutility.
256b57b191eSniklas.Pp
257b57b191eSniklasThe private_key file contains the private RSA key we use for
258ac1aa35bSmpechauthentication.
259ac1aa35bSmpechIf the directory (and the files) exist, they take precedence over X509-based
260ac1aa35bSmpechauthentication.
261b57b191eSniklas.El
262fb1921ccSniklas.It Em X509-Certificates
263fb1921ccSniklas.Bl -tag -width 12n
264fb1921ccSniklas.It Em Ca-directory
265fb1921ccSniklasA directory containing PEM certificates of certification authorities
266ac1aa35bSmpechthat we trust to sign other certificates.
267ac1aa35bSmpechNote that for a CA to be really trusted, it needs to be somehow
268ac1aa35bSmpechreferred to by policy, in
269e5814869Sangelos.Xr isakmpd.policy 5 .
270e5814869SangelosThe certificates in this directory are used for the actual X.509
271e5814869Sangelosauthentication and for cross-referencing policies that refer to
272ac1aa35bSmpechDistinguished Names (DNs).
273ac1aa35bSmpechKeeping a separate directory (as opposed to integrating policies
274ac1aa35bSmpechand X.509 CA certificates) allows for maintenance of a list of
275ac1aa35bSmpech"well known" CAs without actually having to trust all (or any) of them.
276fb1921ccSniklas.It Em Cert-directory
277fb1921ccSniklasA directory containing PEM certificates that we trust to be valid.
278fb1921ccSniklasThese certificates are used in preference to those passed in messages and
279fb1921ccSniklasare required to have a SubjectAltName extension.
280fb1921ccSniklas.It Em Accept-self-signed
281fb1921ccSniklasIf this tag is defined, whatever the value is, certificates that
282fb1921ccSniklasdo not originate from a trusted CA but are self-signed will be
283fb1921ccSniklasaccepted.
284954b1b31Sniklas.It Em Private-key
285954b1b31SniklasThe private key matching the public key of our certificate (which should be
286954b1b31Sniklasin the "Cert-directory", and have a subjectAltName matching our ID, so far
287954b1b31Sniklasthat is our IP-address).
288fb1921ccSniklas.El
289c5fe6c4eSniklas.El
290c5fe6c4eSniklas.Ss Referred-to sections
291c5fe6c4eSniklas.Bl -hang -width 12n
292c5fe6c4eSniklas.It Em <ISAKMP-peer>
293c5fe6c4eSniklasParameters for negotiation with an ISAKMP peer
294c5fe6c4eSniklas.Bl -tag -width 12n
295c5fe6c4eSniklas.It Em Phase
296c5fe6c4eSniklasThe constant
297c5fe6c4eSniklas.Li 1 ,
29861d575f0Sangelosas ISAKMP-peers and IPsec-connections
299c5fe6c4eSniklasreally are handled by the same code inside isakmpd.
300c5fe6c4eSniklas.It Em Transport
301cc3c8b42SniklasThe name of the transport protocol, defaults to
302cc3c8b42Sniklas.Li UDP .
303cc3c8b42Sniklas.It Em Port
304cc3c8b42SniklasIn case of
305cc3c8b42Sniklas.Li UDP ,
306cc3c8b42Sniklasthe
307cc3c8b42Sniklas.Li UDP
308cc3c8b42Sniklasport number to send to.
309cc3c8b42SniklasThis is optional, the
310cc3c8b42Sniklasdefault value is 500 which is the IANA-registered number for ISAKMP.
311a2067f52Sniklas.It Em Local-address
312e2220ba8SniklasThe Local IP-address to use, if we are multi-homed, or have aliases.
313c5fe6c4eSniklas.It Em Address
314cc3c8b42SniklasIf existent, the IP-address of the peer.
315c5fe6c4eSniklas.It Em Configuration
3169615e1d4SaaronThe name of the ISAKMP-configuration section to use.
3179615e1d4SaaronLook at <ISAKMP-configuration> below.
318*419caefeShoIf unspecified, defaults to "Default-Phase-1-Configuration".
319c5fe6c4eSniklas.It Em Authentication
320cc3c8b42SniklasIf existent, authentication data for this specific peer.
3219615e1d4SaaronIn the case of preshared key, this is the key value itself.
3226a8478f3Sniklas.It Em ID
3236a8478f3SniklasIf existent, the name of the section that describes the
3244aac73a4Saaronlocal client ID that we should present to our peer.
3254aac73a4SaaronIf not present, it
3266a8478f3Sniklasdefaults to the address of the local interface we are sending packets
3274aac73a4Saaronover to the remote daemon.
3284aac73a4SaaronLook at <Phase1-ID> below.
329a2067f52Sniklas.It Em Remote-ID
330a2067f52SniklasIf existent, the name of the section that describes the remote client
331a2067f52SniklasID we expect the remote daemon to send us.
332a2067f52SniklasIf not present, it defaults to the address of the remote daemon.
333a2067f52SniklasLook at <Phase1-ID> below.
3342ddc24cbSniklas.It Em Flags
3352ddc24cbSniklasA comma-separated list of flags controlling the further
3369615e1d4Saaronhandling of the ISAKMP SA.
3379615e1d4SaaronCurrently there are no specific ISAKMP SA flags defined.
338c5fe6c4eSniklas.El
3396a8478f3Sniklas.It Em <Phase1-ID>
3406a8478f3Sniklas.Bl -tag -width 12n
3416a8478f3Sniklas.It Em ID-type
342d8ca7c44ShoThe ID type as given by the RFC specifications.
3439615e1d4SaaronFor Phase 1 this is currently
3446a8478f3Sniklas.Li IPV4_ADDR ,
3456a8478f3Sniklas.Li IPV4_ADDR_SUBNET ,
346d8ca7c44Sho.Li IPV6_ADDR ,
347d8ca7c44Sho.Li IPV6_ADDR_SUBNET ,
3486a8478f3Sniklas.Li FQDN ,
349d8ca7c44Sho.Li USER_FQDN
3506a8478f3Sniklasor
3515bc978dfSangelos.Li KEY_ID .
3526a8478f3Sniklas.It Em Address
3536a8478f3SniklasIf the ID-type is
354d8ca7c44Sho.Li IPV4_ADDR
355d8ca7c44Shoor
356d8ca7c44Sho.Li IPV6_ADDR ,
3576a8478f3Sniklasthis tag should exist and be an IP-address.
3586a8478f3Sniklas.It Em Network
3596a8478f3SniklasIf the ID-type is
3606a8478f3Sniklas.Li IPV4_ADDR_SUBNET
361d8ca7c44Shoor
362d8ca7c44Sho.Li IPV6_ADDR_SUBNET
3636a8478f3Sniklasthis tag should exist and
3646a8478f3Sniklasbe a network address.
3656a8478f3Sniklas.It Em Netmask
3666a8478f3SniklasIf the ID-type is
3676a8478f3Sniklas.Li IPV4_ADDR_SUBNET
368d8ca7c44Shoor
369d8ca7c44Sho.Li IPV6_ADDR_SUBNET
3706a8478f3Sniklasthis tag should exist and
3716a8478f3Sniklasbe a network subnet mask.
3726a8478f3Sniklas.It Em Name
3736a8478f3SniklasIf the ID-type is
3745bc978dfSangelos.Li FQDN ,
375d8ca7c44Sho.Li USER_FQDN
3765bc978dfSangelosor
3775bc978dfSangelos.Li KEY_ID ,
3785bc978dfSangelosthis tag should exist and contain a domain name, user@domain, or
3795bc978dfSangelosother identifying string respectively.
3803f167ca4Sangelos.Pp
3813f167ca4SangelosIn the case of
3823f167ca4Sangelos.Li KEY_ID ,
3833f167ca4Sangelosnote that the IKE protocol allows any octet sequence to be sent or
3843f167ca4Sangelosreceived under this payload, potentially including non-printable
3853f167ca4Sangelosones.
3863f167ca4Sangelos.Xr isakmpd 1
3873f167ca4Sangeloscan only transmit printable
3883f167ca4Sangelos.Li KEY_ID
3893f167ca4Sangelospayloads, but can receive and process arbitrary
3903f167ca4Sangelos.Li KEY_ID
3913f167ca4Sangelospayloads.
3923f167ca4SangelosThis effectively means that non-printable
3933f167ca4Sangelos.Li KEY_ID
3943f167ca4Sangelosremote identities cannot be verified through this means, although it
3953f167ca4Sangelosis still possible to do so through
3963f167ca4Sangelos.Xr isakmpd.policy 5 .
3976a8478f3Sniklas.El
398c5fe6c4eSniklas.It Em <ISAKMP-configuration>
399c5fe6c4eSniklas.Bl -tag -width 12n
400c5fe6c4eSniklas.It Em DOI
4019615e1d4SaaronThe domain of interpretation as given by the RFCs.
4029615e1d4SaaronNormally
403c5fe6c4eSniklas.Li IPSEC .
404b57b191eSniklasIf unspecified, defaults to
405b57b191eSniklas.Li IPSEC .
406c5fe6c4eSniklas.It Em EXCHANGE_TYPE
4079615e1d4SaaronThe exchange type as given by the RFCs.
4089615e1d4SaaronFor main mode this is
4099f078bd8Sniklas.Li ID_PROT
4109f078bd8Sniklasand for aggressive mode it is
4119f078bd8Sniklas.Li AGGRESSIVE .
412c5fe6c4eSniklas.It Em Transforms
413c5fe6c4eSniklasA list of proposed transforms to use for protecting the
4149615e1d4SaaronISAKMP traffic.
4159615e1d4SaaronThese are actually names for sections
4169615e1d4Saaronfurther describing the transforms.
4179615e1d4SaaronLook at <ISAKMP-transform> below.
418c5fe6c4eSniklas.El
419c5fe6c4eSniklas.It Em <ISAKMP-transform>
420c5fe6c4eSniklas.Bl -tag -width 12n
421c5fe6c4eSniklas.It Em ENCRYPTION_ALGORITHM
422850f7173SniklasThe encryption algorithm as the RFCs name it, or ANY to denote that any
423850f7173Sniklasencryption algorithm proposed will be accepted.
424c5fe6c4eSniklas.It Em KEY_LENGTH
425c5fe6c4eSniklasFor encryption algorithms with variable key length, this is
4269615e1d4Saaronwhere the offered/accepted keylengths are described.
4279615e1d4SaaronThe value is of the offer-accept kind described above.
428c5fe6c4eSniklas.It Em HASH_ALGORITHM
429850f7173SniklasThe hash algorithm as the RFCs name it, or ANY.
430c5fe6c4eSniklas.It Em AUTHENTICATION_METHOD
431850f7173SniklasThe authentication method as the RFCs name it, or ANY.
432c5fe6c4eSniklas.It Em GROUP_DESCRIPTION
4339615e1d4SaaronThe group used for Diffie-Hellman exponentiations, or ANY.
4349615e1d4SaaronThe name are symbolic, like
435c5fe6c4eSniklas.Li MODP_768 , MODP_1024 , EC_155
436c5fe6c4eSniklasand
437c5fe6c4eSniklas.Li EC_185 .
438850f7173Sniklas.It Em PRF
439850f7173SniklasThe algorithm to use for the keyed pseudo-random function (used for key
440850f7173Sniklasderivation and authentication in Phase 1), or ANY.
441c5fe6c4eSniklas.It Em Life
4424aac73a4SaaronA list of lifetime descriptions, or ANY.
4434aac73a4SaaronIn the former case, each
444850f7173Sniklaselement is in itself a name of the section that defines the lifetime.
4454aac73a4SaaronLook at <Lifetime> below.
4464aac73a4SaaronIf it is set to ANY, then any type of
447850f7173Sniklasproposed lifetime type and value will be accepted.
448c5fe6c4eSniklas.El
449c5fe6c4eSniklas.It Em <Lifetime>
450c5fe6c4eSniklas.Bl -tag -width 12n
451c5fe6c4eSniklas.It Em LIFE_TYPE
452c5fe6c4eSniklas.Li SECONDS
453c5fe6c4eSniklasor
454e55ca143Sniklas.Li KILOBYTES
4554aac73a4Saarondepending on the type of the duration.
4564aac73a4SaaronNotice that this field may NOT be set to ANY.
457c5fe6c4eSniklas.It Em LIFE_DURATION
4584aac73a4SaaronAn offer/accept kind of value, see above.
4594aac73a4SaaronCan also be set to ANY.
460c5fe6c4eSniklas.El
46161d575f0Sangelos.It Em <IPsec-connection>
462c5fe6c4eSniklas.Bl -tag -width 12n
463c5fe6c4eSniklas.It Em Phase
464c5fe6c4eSniklasThe constant
465c5fe6c4eSniklas.Li 2 ,
46661d575f0Sangelosas ISAKMP-peers and IPsec-connections
467c5fe6c4eSniklasreally are handled by the same code inside isakmpd.
468c5fe6c4eSniklas.It Em ISAKMP-peer
469c5fe6c4eSniklasThe name of the ISAKMP-peer which to talk to in order to
4709615e1d4Saaronset up this connection.
4719615e1d4SaaronThe value is the name of an <ISAKMP-peer> section.
4729615e1d4SaaronSee above.
473c5fe6c4eSniklas.It Em Configuration
47461d575f0SangelosThe name of the IPsec-configuration section to use.
47561d575f0SangelosLook at <IPsec-configuration> below.
476c5fe6c4eSniklas.It Em Local-ID
477c5fe6c4eSniklasIf existent, the name of the section that describes the
478c5fe6c4eSniklasoptional local client ID that we should present to our peer.
47980baf197SniklasIt is also used when we act as responders to find out what
48061d575f0Sangelos<IPsec-connection> we are dealing with.
48161d575f0SangelosLook at <IPsec-ID> below.
482c5fe6c4eSniklas.It Em Remote-ID
483c5fe6c4eSniklasIf existent, the name of the section that describes the
484c5fe6c4eSniklasoptional remote client ID that we should present to our peer.
48580baf197SniklasIt is also used when we act as responders to find out what
48661d575f0Sangelos<IPsec-connection> we are dealing with.
48761d575f0SangelosLook at <IPsec-ID> below.
48813a99464Sniklas.It Em Flags
48913a99464SniklasA comma-separated list of flags controlling the further
49061d575f0Sangeloshandling of the IPsec SA.
4919615e1d4SaaronCurrently only one flag is defined:
49280baf197Sniklas.Bl -tag -width 12n
49380baf197Sniklas.It Em Active-only
49461d575f0SangelosIf this flag is given and this <IPsec-connection> is part of the phase 2
49580baf197Sniklasconnections we automatically keep up, it will not automatically be used for
49680baf197Sniklasaccepting connections from the peer.
49780baf197Sniklas.El
498c5fe6c4eSniklas.El
49961d575f0Sangelos.It Em <IPsec-configuration>
500c5fe6c4eSniklas.Bl -tag -width 12n
501c5fe6c4eSniklas.It Em DOI
5029615e1d4SaaronThe domain of interpretation as given by the RFCs.
5039615e1d4SaaronNormally
504c5fe6c4eSniklas.Li IPSEC .
505b57b191eSniklasIf unspecified, defaults to
506b57b191eSniklas.Li IPSEC .
507c5fe6c4eSniklas.It Em EXCHANGE_TYPE
5089615e1d4SaaronThe exchange type as given by the RFCs.
5099615e1d4SaaronFor quick mode this is
510c5fe6c4eSniklas.Li QUICK_MODE .
511c5fe6c4eSniklas.It Em Suites
5123b2a0cf1SaaronA list of protection suites (bundles of protocols) usable for
5139615e1d4Saaronprotecting the IP traffic.
51461d575f0SangelosEach of the list elements is a name of an <IPsec-suite> section.
5159615e1d4SaaronSee below.
516c5fe6c4eSniklas.El
51761d575f0Sangelos.It Em <IPsec-suite>
518c5fe6c4eSniklas.Bl -tag -width 12n
519c5fe6c4eSniklas.It Em Protocols
520c5fe6c4eSniklasA list of the protocols included in this protection suite.
52161d575f0SangelosEach of the list elements is a name of an <IPsec-protocol>
5229615e1d4Saaronsection.
5239615e1d4SaaronSee below.
524c5fe6c4eSniklas.El
52561d575f0Sangelos.It Em <IPsec-protocol>
526c5fe6c4eSniklas.Bl -tag -width 12n
527c5fe6c4eSniklas.It Em PROTOCOL_ID
5289615e1d4SaaronThe protocol as given by the RFCs.
5299615e1d4SaaronAcceptable values today are
530c5fe6c4eSniklas.Li IPSEC_AH
531c5fe6c4eSniklasand
532c5fe6c4eSniklas.Li IPSEC_ESP .
533c5fe6c4eSniklas.It Em Transforms
5343b2a0cf1SaaronA list of transforms usable for implementing the protocol.
53561d575f0SangelosEach of the list elements is a name of an <IPsec-transform>
5369615e1d4Saaronsection.
5379615e1d4SaaronSee below.
538c5fe6c4eSniklas.It Em ReplayWindow
5399615e1d4SaaronThe size of the window used for replay protection.
5409615e1d4SaaronThis is normally left alone.
5419615e1d4SaaronLook at the
542c5fe6c4eSniklas.Nm ESP
543c5fe6c4eSniklasand
544c5fe6c4eSniklas.Nm AH
545c5fe6c4eSniklasRFCs for a better description.
546c5fe6c4eSniklas.El
54761d575f0Sangelos.It Em <IPsec-transform>
548c5fe6c4eSniklas.Bl -tag -width 12n
549c5fe6c4eSniklas.It Em TRANSFORM_ID
550c5fe6c4eSniklasThe transform ID as given by the RFCs.
551c5fe6c4eSniklas.It Em ENCAPSULATION_MODE
5529615e1d4SaaronThe encapsulation mode as given by the RFCs.
5539615e1d4SaaronThis means TRANSPORT or TUNNEL.
554c5fe6c4eSniklas.It Em AUTHENTICATION_ALGORITHM
555c5fe6c4eSniklasThe optional authentication algorithm in the case of this
556c5fe6c4eSniklasbeing an ESP transform.
557c5fe6c4eSniklas.It Em GROUP_DESCRIPTION
558c5fe6c4eSniklasAn optional (provides PFS if present) Diffie-Hellman group
5599615e1d4Saarondescription.
5609615e1d4SaaronThe values are the same as GROUP_DESCRIPTION's
561c5fe6c4eSniklasin <ISAKMP-transform> sections shown above.
562c5fe6c4eSniklas.It Em Life
563c5fe6c4eSniklasList of lifetimes, each element is a <Lifetime> section name.
564c5fe6c4eSniklas.El
56561d575f0Sangelos.It Em <IPsec-ID>
566c5fe6c4eSniklas.Bl -tag -width 12n
567c5fe6c4eSniklas.It Em ID-type
5689615e1d4SaaronThe ID type as given by the RFCs.
56961d575f0SangelosFor IPsec this is currently
570d8ca7c44Sho.Li IPV4_ADDR ,
571d8ca7c44Sho.Li IPV6_ADDR ,
572d8ca7c44Sho.Li IPV4_ADDR_SUBNET
573c5fe6c4eSniklasor
574d8ca7c44Sho.Li IPV6_ADDR_SUBNET .
575c5fe6c4eSniklas.It Em Address
576c5fe6c4eSniklasIf the ID-type is
577d8ca7c44Sho.Li IPV4_ADDR
578d8ca7c44Shoor
579d8ca7c44Sho.Li IPV6_ADDR
580c5fe6c4eSniklasthis tag should exist and be an IP-address.
581c5fe6c4eSniklas.It Em Network
582c5fe6c4eSniklasIf the ID-type is
583c5fe6c4eSniklas.Li IPV4_ADDR_SUBNET
584d8ca7c44Shoor
585d8ca7c44Sho.Li IPV6_ADDR_SUBNET
586c5fe6c4eSniklasthis tag should exist and
587c5fe6c4eSniklasbe a network address.
588c5fe6c4eSniklas.It Em Netmask
589c5fe6c4eSniklasIf the ID-type is
590c5fe6c4eSniklas.Li IPV4_ADDR_SUBNET
591d8ca7c44Shoor
592d8ca7c44Sho.Li IPV6_ADDR_SUBNET
593c5fe6c4eSniklasthis tag should exist and
594c5fe6c4eSniklasbe a network subnet mask.
5950378d1f2Sniklas.It Em Protocol
5960378d1f2SniklasIf the ID-type is
597d8ca7c44Sho.Li IPV4_ADDR ,
5980378d1f2Sniklas.Li IPV4_ADDR_SUBNET ,
599d8ca7c44Sho.Li IPV6_ADDR
600d8ca7c44Shoor
601d8ca7c44Sho.Li IPV6_ADDR_SUBNET
6020378d1f2Sniklasthis tag indicates what transport protocol should be transmitted over
6030378d1f2Sniklasthe SA.
6040378d1f2SniklasIf left unspecified, all transport protocols between the two address
6050378d1f2Sniklas(ranges) will be sent (or permitted) over that SA.
6060378d1f2Sniklas.It Em Port
6070378d1f2SniklasIf the ID-type is
608d8ca7c44Sho.Li IPV4_ADDR ,
6090378d1f2Sniklas.Li IPV4_ADDR_SUBNET ,
610d8ca7c44Sho.Li IPV6_ADDR
611d8ca7c44Shoor
612d8ca7c44Sho.Li IPV6_ADDR_SUBNET
6130378d1f2Sniklasthis tag indicates what source or destination port is allowed to be
6140378d1f2Sniklastransported over the SA (depending on whether this is a local or
6150378d1f2Sniklasremote ID).
6160378d1f2SniklasIf left unspecified, all ports of the given transport protocol
6170378d1f2Sniklaswill be transmitted (or permitted) over the SA.
6180378d1f2SniklasThe Protocol tag must be specified in conjunction with this tag.
619c5fe6c4eSniklas.El
620c5fe6c4eSniklas.El
6214ca71560Sho.Ss Other sections
6224ca71560Sho.Bl -hang -width 12n
6234ca71560Sho.It Em <IKECFG-ID>
6244ca71560ShoParameters to use with IKE mode-config. One ID per peer.
6254ca71560Sho.Pp
6264ca71560ShoAn IKECFG-ID is written as [<ID-type>/<name>].
6274ca71560ShoThe following ID types are supported:
6284ca71560Sho.Bl -tag -width 12n
6294ca71560Sho.It IPv4
6304ca71560Sho[ipv4/A.B.C.D]
6314ca71560Sho.It IPv6
6324ca71560Sho[ipv6/abcd:abcd::ab:cd]
6334ca71560Sho.It FQDN
6344ca71560Sho[fqdn/foo.bar.org]
6354ca71560Sho.It UFQDN
6364ca71560Sho[ufqdn/user@foo.bar.org]
6374ca71560Sho.It ASN1_DN
6384ca71560Sho[asn1_dn//C=aa/O=cc/...] (Note the double slashes as the DN itself
6394ca71560Shostarts with a '/'.)
6404ca71560Sho.El
6414ca71560Sho.Pp
6424ca71560ShoEach section specifies what configuration values to return to the peer
6434ca71560Shorequesting IKE mode-config. Currently supported values are:
6444ca71560Sho.Bl -tag -width 12n
6454ca71560Sho.It Em Address
6464ca71560ShoThe peer's network address.
6474ca71560Sho.It Em Netmask
6484ca71560ShoThe peer's netmask.
6494ca71560Sho.It Em Nameserver
6504ca71560ShoThe IP address of a DNS nameserver.
6514ca71560Sho.It Em WINS-server
6524ca71560ShoThe IP address of a WINS server.
6534ca71560Sho.El
6544ca71560Sho.El
65500b2ba71Saaron.Sh EXAMPLES
6562040585eSniklasAn example of a configuration file:
6572040585eSniklas.Pp
6582040585eSniklas.Bd -literal
6592040585eSniklas# A configuration sample for the isakmpd ISAKMP/Oakley (aka IKE) daemon.
6602040585eSniklas
6612040585eSniklas[General]
662c5fe6c4eSniklasListen-on=		10.1.0.2
6632040585eSniklas
664c5fe6c4eSniklas# Incoming phase 1 negotiations are multiplexed on the source IP address
6652b81057dSniklas[Phase 1]
666c5fe6c4eSniklas10.1.0.1=		ISAKMP-peer-west
6672b81057dSniklas
668c5fe6c4eSniklas# These connections are walked over after config file parsing and told
669c5fe6c4eSniklas# to the application layer so that it will inform us when traffic wants to
670c5fe6c4eSniklas# pass over them.  This means we can do on-demand keying.
671c5fe6c4eSniklas[Phase 2]
672c5fe6c4eSniklasConnections=		IPsec-east-west
673c5fe6c4eSniklas
674cc3c8b42Sniklas# Default values are commented out.
675c5fe6c4eSniklas[ISAKMP-peer-west]
6762b81057dSniklasPhase=			1
677cc3c8b42Sniklas#Transport=		udp
678f6dd85a7SniklasLocal-address=		10.1.0.2
6792b81057dSniklasAddress=		10.1.0.1
6802b81057dSniklas#Port=			isakmp
6812b81057dSniklas#Port=			500
682*419caefeSho#Configuration=		Default-Phase-1-Configuration
6832b81057dSniklasAuthentication=		mekmitasdigoat
684cc3c8b42Sniklas#Flags=
6852b81057dSniklas
686c5fe6c4eSniklas[IPsec-east-west]
6872b81057dSniklasPhase=			2
688c5fe6c4eSniklasISAKMP-peer=		ISAKMP-peer-west
6892b81057dSniklasConfiguration=		Default-quick-mode
690c5fe6c4eSniklasLocal-ID=		Net-east
691c5fe6c4eSniklasRemote-ID=		Net-west
692cc3c8b42Sniklas#Flags=
6932b81057dSniklas
694c5fe6c4eSniklas[Net-west]
6952b81057dSniklasID-type=		IPV4_ADDR_SUBNET
6962b81057dSniklasNetwork=		192.168.1.0
6972b81057dSniklasNetmask=		255.255.255.0
6982b81057dSniklas
699c5fe6c4eSniklas[Net-east]
7002b81057dSniklasID-type=		IPV4_ADDR_SUBNET
7012b81057dSniklasNetwork=		192.168.2.0
7022b81057dSniklasNetmask=		255.255.255.0
7032b81057dSniklas
70452e712aeSniklas# Quick mode descriptions
70552e712aeSniklas
70652e712aeSniklas[Default-quick-mode]
70752e712aeSniklasEXCHANGE_TYPE=		QUICK_MODE
7081a87c1a3ShoSuites=			QM-ESP-3DES-SHA-PFS-SUITE,QM-ESP-AES-SHA-PFS-SUITE
70952e712aeSniklas
7104ca71560Sho# Data for an IKE mode-config peer
7114ca71560Sho[asn1_dn//C=SE/L=SomeCity/O=SomeCompany/CN=SomePeer.company.com]
7124ca71560ShoAddress=		192.168.1.123
7134ca71560ShoNetmask=		255.255.255.0
7144ca71560ShoNameserver=		192.168.1.10
7154ca71560ShoWINS-server=		192.168.1.11
7164ca71560Sho
71752e712aeSniklas#
71852e712aeSniklas# #####################################################################
71952e712aeSniklas# All configration data below this point is not required as the example
72052e712aeSniklas# uses the predefined Main Mode transform and Quick Mode suite names.
72152e712aeSniklas# It is included here for completeness. Note the default values for the
72252e712aeSniklas# [General] and [X509-certificates] sections just below.
72352e712aeSniklas# #####################################################################
72452e712aeSniklas#
72552e712aeSniklas
72652e712aeSniklas[General]
727447a9f3aShoPolicy-file=		/etc/isakmpd/isakmpd.policy
72852e712aeSniklasRetransmits=		3
72952e712aeSniklasExchange-max-time=	120
73052e712aeSniklas
731b57b191eSniklas# KeyNote credential storage
732b57b191eSniklas[KeyNote]
733b57b191eSniklasCredential-directory=	/etc/isakmpd/keynote/
734b57b191eSniklas
735fb1921ccSniklas# Certificates stored in PEM format
736fb1921ccSniklas[X509-certificates]
737fb1921ccSniklasCA-directory=           /etc/isakmpd/ca/
738fb1921ccSniklasCert-directory=         /etc/isakmpd/certs/
7399dbe9fb4ShoCRL-directory=		/etc/isakmpd/crls/
740954b1b31SniklasPrivate-key=		/etc/isakmpd/private/local.key
741fb1921ccSniklas
742*419caefeSho# Default phase 1 description (Main Mode)
743*419caefeSho
744*419caefeSho[Default-Phase-1-Configuration]
745*419caefeShoEXCHANGE_TYPE=		ID_PROT
746*419caefeShoTransforms=		3DES-SHA
747*419caefeSho
7482b81057dSniklas# Main mode transforms
7492b81057dSniklas######################
7502b81057dSniklas
7512b81057dSniklas# DES
7522040585eSniklas
7532040585eSniklas[DES-MD5]
7542040585eSniklasENCRYPTION_ALGORITHM=	DES_CBC
7552040585eSniklasHASH_ALGORITHM=		MD5
7562040585eSniklasAUTHENTICATION_METHOD=	PRE_SHARED
7572039fcadShoGROUP_DESCRIPTION=	MODP_1024
75860f440ccShoLife=			Default-phase-1-lifetime
7592040585eSniklas
7602b81057dSniklas[DES-SHA]
7612b81057dSniklasENCRYPTION_ALGORITHM=	DES_CBC
7622b81057dSniklasHASH_ALGORITHM=		SHA
7632b81057dSniklasAUTHENTICATION_METHOD=	PRE_SHARED
76460f440ccShoGROUP_DESCRIPTION=	MODP_1024
76560f440ccShoLife=			Default-phase-1-lifetime
7662b81057dSniklas
7672b81057dSniklas# 3DES
7682b81057dSniklas
7692b81057dSniklas[3DES-SHA]
7702b81057dSniklasENCRYPTION_ALGORITHM=	3DES_CBC
7712040585eSniklasHASH_ALGORITHM=		SHA
7722040585eSniklasAUTHENTICATION_METHOD=	PRE_SHARED
7732040585eSniklasGROUP_DESCRIPTION=	MODP_1024
77460f440ccShoLife=			Default-phase-1-lifetime
7752b81057dSniklas
7762b81057dSniklas# Blowfish
7772b81057dSniklas
77860f440ccSho[BLF-SHA]
7792b81057dSniklasENCRYPTION_ALGORITHM=	BLOWFISH_CBC
7802b81057dSniklasKEY_LENGTH=		128,96:192
7812b81057dSniklasHASH_ALGORITHM=		SHA
7822b81057dSniklasAUTHENTICATION_METHOD=	PRE_SHARED
7832b81057dSniklasGROUP_DESCRIPTION=	MODP_1024
78460f440ccShoLife=			Default-phase-1-lifetime
7852040585eSniklas
78660f440ccSho# Blowfish, using DH group 4 (non-default)
7872040585eSniklas[BLF-SHA-EC185]
788d70ca5f7SniklasENCRYPTION_ALGORITHM=	BLOWFISH_CBC
7892b81057dSniklasKEY_LENGTH=		128,96:192
7902040585eSniklasHASH_ALGORITHM=		SHA
7912040585eSniklasAUTHENTICATION_METHOD=	PRE_SHARED
7922040585eSniklasGROUP_DESCRIPTION=	EC2N_185
79360f440ccShoLife=			Default-phase-1-lifetime
7942040585eSniklas
7952b81057dSniklas# Quick mode protection suites
7962b81057dSniklas##############################
7972b81057dSniklas
7982b81057dSniklas# DES
7992040585eSniklas
800d70ca5f7Sniklas[QM-ESP-DES-SUITE]
801d70ca5f7SniklasProtocols=		QM-ESP-DES
802d70ca5f7Sniklas
8032b81057dSniklas[QM-ESP-DES-PFS-SUITE]
8042b81057dSniklasProtocols=		QM-ESP-DES-PFS
8052b81057dSniklas
8062040585eSniklas[QM-ESP-DES-MD5-SUITE]
8072040585eSniklasProtocols=		QM-ESP-DES-MD5
8082040585eSniklas
8092b81057dSniklas[QM-ESP-DES-MD5-PFS-SUITE]
8102b81057dSniklasProtocols=		QM-ESP-DES-MD5-PFS
8112040585eSniklas
8122b81057dSniklas[QM-ESP-DES-SHA-SUITE]
8132b81057dSniklasProtocols=		QM-ESP-DES-SHA
8142040585eSniklas
8152b81057dSniklas[QM-ESP-DES-SHA-PFS-SUITE]
8162b81057dSniklasProtocols=		QM-ESP-DES-SHA-PFS
8172040585eSniklas
8182b81057dSniklas# 3DES
8192b81057dSniklas
8202b81057dSniklas[QM-ESP-3DES-SHA-SUITE]
8212b81057dSniklasProtocols=		QM-ESP-3DES-SHA
8222b81057dSniklas
8232b81057dSniklas[QM-ESP-3DES-SHA-PFS-SUITE]
8242b81057dSniklasProtocols=		QM-ESP-3DES-SHA-PFS
8252b81057dSniklas
826bfc24386Sniklas# AES
827bfc24386Sniklas
828bfc24386Sniklas[QM-ESP-AES-SHA-SUITE]
829bfc24386SniklasProtocols=              QM-ESP-AES-SHA
830bfc24386Sniklas
83160f440ccSho[QM-ESP-AES-SHA-PFS-SUITE]
832bfc24386SniklasProtocols=              QM-ESP-AES-SHA-PFS
833bfc24386Sniklas
8342b81057dSniklas# AH
8352b81057dSniklas
8362b81057dSniklas[QM-AH-MD5-SUITE]
8372b81057dSniklasProtocols=		QM-AH-MD5
8382b81057dSniklas
8392b81057dSniklas[QM-AH-MD5-PFS-SUITE]
8402b81057dSniklasProtocols=		QM-AH-MD5-PFS
8412b81057dSniklas
84260f440ccSho# AH + ESP (non-default)
8432040585eSniklas
8442040585eSniklas[QM-AH-MD5-ESP-DES-SUITE]
8452040585eSniklasProtocols=		QM-AH-MD5,QM-ESP-DES
8462040585eSniklas
8472b81057dSniklas[QM-AH-MD5-ESP-DES-MD5-SUITE]
8482b81057dSniklasProtocols=		QM-AH-MD5,QM-ESP-DES-MD5
8492040585eSniklas
8502b81057dSniklas[QM-ESP-DES-MD5-AH-MD5-SUITE]
8512b81057dSniklasProtocols=		QM-ESP-DES-MD5,QM-AH-MD5
8522b81057dSniklas
8532b81057dSniklas# Quick mode protocols
8542b81057dSniklas
8552b81057dSniklas# DES
8562040585eSniklas
8572040585eSniklas[QM-ESP-DES]
8582040585eSniklasPROTOCOL_ID=		IPSEC_ESP
8592040585eSniklasTransforms=		QM-ESP-DES-XF
8602040585eSniklas
8612b81057dSniklas[QM-ESP-DES-MD5]
8622b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
8632b81057dSniklasTransforms=		QM-ESP-DES-MD5-XF
8642b81057dSniklas
8652b81057dSniklas[QM-ESP-DES-MD5-PFS]
8662b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
8672b81057dSniklasTransforms=		QM-ESP-DES-MD5-PFS-XF
8682b81057dSniklas
8692b81057dSniklas[QM-ESP-DES-SHA]
8702b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
8712b81057dSniklasTransforms=		QM-ESP-DES-SHA-XF
8722b81057dSniklas
8732b81057dSniklas# 3DES
8742b81057dSniklas
8752b81057dSniklas[QM-ESP-3DES-SHA]
8762b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
8772b81057dSniklasTransforms=		QM-ESP-3DES-SHA-XF
8782b81057dSniklas
8792b81057dSniklas[QM-ESP-3DES-SHA-PFS]
8802b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
8812b81057dSniklasTransforms=		QM-ESP-3DES-SHA-PFS-XF
8822b81057dSniklas
8832b81057dSniklas[QM-ESP-3DES-SHA-TRP]
8842b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
8852b81057dSniklasTransforms=		QM-ESP-3DES-SHA-TRP-XF
8862b81057dSniklas
887bfc24386Sniklas# AES
888bfc24386Sniklas
889bfc24386Sniklas[QM-ESP-AES-SHA]
890bfc24386SniklasPROTOCOL_ID=		IPSEC_ESP
891bfc24386SniklasTransforms=		QM-ESP-AES-SHA-XF
892bfc24386Sniklas
893bfc24386Sniklas[QM-ESP-AES-SHA-PFS]
894bfc24386SniklasPROTOCOL_ID=		IPSEC_ESP
895bfc24386SniklasTransforms=		QM-ESP-AES-SHA-PFS-XF
896bfc24386Sniklas
897bfc24386Sniklas[QM-ESP-AES-SHA-TRP]
898bfc24386SniklasPROTOCOL_ID=		IPSEC_ESP
899bfc24386SniklasTransforms=		QM-ESP-AES-SHA-TRP-XF
900bfc24386Sniklas
9012b81057dSniklas# AH MD5
9022b81057dSniklas
9032b81057dSniklas[QM-AH-MD5]
9042b81057dSniklasPROTOCOL_ID=		IPSEC_AH
9052b81057dSniklasTransforms=		QM-AH-MD5-XF
9062b81057dSniklas
9072b81057dSniklas[QM-AH-MD5-PFS]
9082b81057dSniklasPROTOCOL_ID=		IPSEC_AH
9092b81057dSniklasTransforms=		QM-AH-MD5-PFS-XF
9102b81057dSniklas
9112b81057dSniklas# Quick mode transforms
9122b81057dSniklas
9132b81057dSniklas# ESP DES+MD5
9142b81057dSniklas
9152040585eSniklas[QM-ESP-DES-XF]
9162040585eSniklasTRANSFORM_ID=		DES
9172040585eSniklasENCAPSULATION_MODE=	TUNNEL
91860f440ccShoLife=			Default-phase-2-lifetime
9192040585eSniklas
9202b81057dSniklas[QM-ESP-DES-MD5-XF]
9212b81057dSniklasTRANSFORM_ID=		DES
9222b81057dSniklasENCAPSULATION_MODE=	TUNNEL
9232b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_MD5
92460f440ccShoLife=			Default-phase-2-lifetime
9252b81057dSniklas
9262b81057dSniklas[QM-ESP-DES-MD5-PFS-XF]
9272b81057dSniklasTRANSFORM_ID=		DES
9282b81057dSniklasENCAPSULATION_MODE=	TUNNEL
9292039fcadShoGROUP_DESCRIPTION=	MODP_1024
9302b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_MD5
93160f440ccShoLife=			Default-phase-2-lifetime
9322b81057dSniklas
9332b81057dSniklas[QM-ESP-DES-SHA-XF]
9342b81057dSniklasTRANSFORM_ID=		DES
9352b81057dSniklasENCAPSULATION_MODE=	TUNNEL
9362b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
93760f440ccShoLife=			Default-phase-2-lifetime
9382b81057dSniklas
9392b81057dSniklas# 3DES
9402b81057dSniklas
9412b81057dSniklas[QM-ESP-3DES-SHA-XF]
9422b81057dSniklasTRANSFORM_ID=		3DES
9432b81057dSniklasENCAPSULATION_MODE=	TUNNEL
9442b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
94560f440ccShoLife=			Default-phase-2-lifetime
9462b81057dSniklas
9472b81057dSniklas[QM-ESP-3DES-SHA-PFS-XF]
9482b81057dSniklasTRANSFORM_ID=		3DES
9492b81057dSniklasENCAPSULATION_MODE=	TUNNEL
9502b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
9512b81057dSniklasGROUP_DESCRIPTION=	MODP_1024
95260f440ccShoLife=			Default-phase-2-lifetime
9532b81057dSniklas
9542b81057dSniklas[QM-ESP-3DES-SHA-TRP-XF]
9552b81057dSniklasTRANSFORM_ID=		3DES
9562b81057dSniklasENCAPSULATION_MODE=	TRANSPORT
9572b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
95860f440ccShoLife=			Default-phase-2-lifetime
9592b81057dSniklas
960bfc24386Sniklas# AES
961bfc24386Sniklas
962bfc24386Sniklas[QM-ESP-AES-SHA-XF]
963bfc24386SniklasTRANSFORM_ID=		AES
964bfc24386SniklasENCAPSULATION_MODE=	TUNNEL
965bfc24386SniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
96660f440ccShoLife=			Default-phase-2-lifetime
967bfc24386Sniklas
968bfc24386Sniklas[QM-ESP-AES-SHA-PFS-XF]
969bfc24386SniklasTRANSFORM_ID=		AES
970bfc24386SniklasENCAPSULATION_MODE=	TUNNEL
971bfc24386SniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
972bfc24386SniklasGROUP_DESCRIPTION=	MODP_1024
97360f440ccShoLife=			Default-phase-2-lifetime
974bfc24386Sniklas
975bfc24386Sniklas[QM-ESP-AES-SHA-TRP-XF]
976bfc24386SniklasTRANSFORM_ID=		AES
977bfc24386SniklasENCAPSULATION_MODE=	TRANSPORT
978bfc24386SniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
97960f440ccShoLife=			Default-phase-2-lifetime
980bfc24386Sniklas
9812b81057dSniklas# AH
9822b81057dSniklas
9832b81057dSniklas[QM-AH-MD5-XF]
9842b81057dSniklasTRANSFORM_ID=		MD5
9852b81057dSniklasENCAPSULATION_MODE=	TUNNEL
9862b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_MD5
98760f440ccShoLife=			Default-phase-2-lifetime
9882b81057dSniklas
9892b81057dSniklas[QM-AH-MD5-PFS-XF]
9902b81057dSniklasTRANSFORM_ID=		MD5
9912b81057dSniklasENCAPSULATION_MODE=	TUNNEL
9922039fcadShoGROUP_DESCRIPTION=	MODP_1024
99360f440ccShoLife=			Default-phase-2-lifetime
9942b81057dSniklas
99560f440ccSho[Sample-Life-Time]
9962b81057dSniklasLIFE_TYPE=		SECONDS
9972b81057dSniklasLIFE_DURATION=		3600,1800:7200
9982b81057dSniklas
99960f440ccSho[Sample-Life-Volume]
10002b81057dSniklasLIFE_TYPE=		KILOBYTES
10012b81057dSniklasLIFE_DURATION=		1000,768:1536
10022040585eSniklas.Ed
1003ab1e9dfdSho.Sh FILES
1004ab1e9dfdSho.Bl -tag -width /etc/isakmpd/isakmpd.conf
1005ab1e9dfdSho.It Pa /etc/isakmpd/isakmpd.conf
1006ab1e9dfdShoThe default
1007ab1e9dfdSho.Nm isakmpd
1008ab1e9dfdShoconfiguration file.
1009ab1e9dfdSho.It Pa /usr/share/ipsec/isakmpd/
1010ab1e9dfdShoA directory containing some sample
1011ab1e9dfdSho.Nm isakmpd
1012ab1e9dfdShoconfiguration files.
1013ab1e9dfdSho.El
10142040585eSniklas.Sh SEE ALSO
1015b57b191eSniklas.Xr keynote 1 ,
1016dc89b21eSfgsch.Xr ipsec 4 ,
101730a2652aSniklas.Xr keynote 4 ,
101877725688Sniklas.Xr isakmpd.policy 5 ,
1019350bb3b8Salex.Xr isakmpd 8
1020