xref: /openbsd/sbin/isakmpd/isakmpd.conf.5 (revision 95f3b939)
1*95f3b939Sjmc.\" $OpenBSD: isakmpd.conf.5,v 1.115 2006/06/11 00:20:36 jmc Exp $
2e55ca143Sniklas.\" $EOM: isakmpd.conf.5,v 1.57 2000/12/21 14:43:17 ho Exp $
32040585eSniklas.\"
444f0148dSniklas.\" Copyright (c) 1998, 1999, 2000 Niklas Hallqvist.  All rights reserved.
54ca71560Sho.\" Copyright (c) 2000, 2001, 2002 H�kan Olsson.  All rights reserved.
62040585eSniklas.\"
72040585eSniklas.\" Redistribution and use in source and binary forms, with or without
82040585eSniklas.\" modification, are permitted provided that the following conditions
92040585eSniklas.\" are met:
102040585eSniklas.\" 1. Redistributions of source code must retain the above copyright
112040585eSniklas.\"    notice, this list of conditions and the following disclaimer.
122040585eSniklas.\" 2. Redistributions in binary form must reproduce the above copyright
132040585eSniklas.\"    notice, this list of conditions and the following disclaimer in the
142040585eSniklas.\"    documentation and/or other materials provided with the distribution.
152040585eSniklas.\"
162040585eSniklas.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
172040585eSniklas.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
182040585eSniklas.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
192040585eSniklas.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
202040585eSniklas.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
212040585eSniklas.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
222040585eSniklas.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
232040585eSniklas.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
242040585eSniklas.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
252040585eSniklas.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
262040585eSniklas.\"
272040585eSniklas.\" This code was written under funding by Ericsson Radio Systems.
282040585eSniklas.\"
292040585eSniklas.\" Manual page, using -mandoc macros
302040585eSniklas.\"
3172578f93Sho.Dd August 07, 2002
3258aefd4bSaaron.Dt ISAKMPD.CONF 5
332040585eSniklas.Os
342040585eSniklas.Sh NAME
352040585eSniklas.Nm isakmpd.conf
3658aefd4bSaaron.Nd configuration file for isakmpd
372040585eSniklas.Sh DESCRIPTION
3858aefd4bSaaron.Nm
3958aefd4bSaaronis the configuration file for the
40e407932bSjmc.Xr isakmpd 8
41ffa2dcb0Sjmcdaemon, managing security association and key management for the
4261d575f0SangelosIPsec layer of the kernel's networking stack.
432040585eSniklas.Pp
442040585eSniklasThe file is of a well known type of format called .INI style, named after
452040585eSniklasthe suffix used by an overrated windowing environment for its configuration
469615e1d4Saaronfiles.
479615e1d4SaaronThis format consists of sections, each beginning with a line looking like:
48ffa2dcb0Sjmc.Bd -unfilled
49ffa2dcb0Sjmc.Bq Sy Section name
502040585eSniklas.Ed
512040585eSniklasBetween the brackets is the name of the section following this section header.
522040585eSniklasInside a section many tag/value pairs can be stored, each one looking like:
53ffa2dcb0Sjmc.Bd -unfilled
54ffa2dcb0Sjmc.Ar Tag Ns = Ns Ar Value
552040585eSniklas.Ed
56ffa2dcb0SjmcIf the value needs more space than fits on a single line, it's possible to
57a2067f52Sniklascontinue it on the next by ending the first with a backslash character
589615e1d4Saaronimmediately before the newline character.
590e2d4717SkjellThis method can extend a value for an arbitrary number of lines.
602040585eSniklas.Pp
6158aefd4bSaaronComments can be put anywhere in the file by using a hash mark
6258aefd4bSaaron.Pq Sq \&# .
630e2d4717SkjellThe comment extends to the end of the current line.
642040585eSniklas.Pp
65c5fe6c4eSniklasOften the right-hand side values consist of other section names.
66c5fe6c4eSniklasThis results in a tree structure.
670e2d4717SkjellSome values are treated as a list of several scalar values.
680e2d4717SkjellSuch lists always use a comma character as the separator.
699615e1d4SaaronSome values are formatted like this: X,Y:Z, which
70c5fe6c4eSniklasis an offer/accept syntax, where X is a value we offer and Y:Z is a range of
71c5fe6c4eSniklasaccepted values, inclusive.
72c5fe6c4eSniklas.Pp
73bad0180eShoTo activate changes to
74bad0180eSho.Nm
75bad0180eShowithout restarting
76ffa2dcb0Sjmc.Xr isakmpd 8 ,
774eb3dd62Sjmcsend a
784eb3dd62Sjmc.Dv SIGHUP
794eb3dd62Sjmcsignal to the daemon process.
80ffa2dcb0Sjmc.Sh AUTO-GENERATED PARTS OF THE CONFIGURATION
810e2d4717SkjellSome predefined section names are recognized by the daemon, avoiding the need
820e2d4717Skjellto fully specify the Main Mode transforms and Quick Mode suites, protocols,
8352e712aeSniklasand transforms.
8452e712aeSniklas.Pp
8552e712aeSniklasFor Main Mode:
86e8200b82Shshoexer.\" .Ar {DES,BLF,3DES,CAST,AES}-{MD5,SHA}[-GRP{1,2,5,14,15}][-RSA_SIG]
87ffa2dcb0Sjmc.Bl -inset -compact
88ffa2dcb0Sjmc.It Xo
89ffa2dcb0Sjmc.Sm off
90ffa2dcb0Sjmc.No {
91ffa2dcb0Sjmc.Ar DES , BLF , 3DES , CAST , AES
92ffa2dcb0Sjmc.No }-{
93ffa2dcb0Sjmc.Ar MD5 , SHA
94ffa2dcb0Sjmc.No }[-
95ffa2dcb0Sjmc.Ar GRP
96ffa2dcb0Sjmc.No {
97e8200b82Shshoexer.Ar 1 , 2 , 5 , 14 , 15
98ffa2dcb0Sjmc.No }]
9977012c86Sjmc.No [-
10077012c86Sjmc.Ar RSA_SIG
10177012c86Sjmc.No ]
102ffa2dcb0Sjmc.Sm on
103ffa2dcb0Sjmc.Xc
104ffa2dcb0Sjmc.El
10552e712aeSniklas.Pp
10652e712aeSniklasFor Quick Mode:
107ffa2dcb0Sjmc.\" .Ar QM-{proto}[-TRP]-{cipher}[-{hash}][-PFS[-{group}]]-SUITE
108ffa2dcb0Sjmc.Bl -inset -compact
109ffa2dcb0Sjmc.It Xo
110ffa2dcb0Sjmc.Sm off
111ffa2dcb0Sjmc.Ar QM
112ffa2dcb0Sjmc.No -{
113ffa2dcb0Sjmc.Ar proto
114ffa2dcb0Sjmc.No }[-
115ffa2dcb0Sjmc.Ar TRP
116ffa2dcb0Sjmc.No ]-{
117ffa2dcb0Sjmc.Ar cipher
118ffa2dcb0Sjmc.No }[-{
119ffa2dcb0Sjmc.Ar hash
120ffa2dcb0Sjmc.No }]
121ffa2dcb0Sjmc.No [-
122ffa2dcb0Sjmc.Ar PFS
123ffa2dcb0Sjmc.No [-{
124ffa2dcb0Sjmc.Ar group
125ffa2dcb0Sjmc.No }]]-
126ffa2dcb0Sjmc.Ar SUITE
127ffa2dcb0Sjmc.Sm on
128ffa2dcb0Sjmc.Xc
129ffa2dcb0Sjmc.El
130ffa2dcb0Sjmc.Pp
131ffa2dcb0Sjmcwhere:
132ffa2dcb0Sjmc.Bl -tag -width "{cipher}" -offset indent -compact
133ffa2dcb0Sjmc.It Ns { Ns Ar proto Ns }
134ffa2dcb0Sjmcis either ESP or AH
135ffa2dcb0Sjmc.It Ns { Ns Ar cipher Ns }
136ffa2dcb0Sjmcis either DES, 3DES, CAST, BLF, or AES
137ffa2dcb0Sjmc.It Ns { Ns Ar hash Ns }
138ffa2dcb0Sjmcis either MD5, SHA, RIPEMD, or SHA2-{256,384,512}
139ffa2dcb0Sjmc.It Ns { Ns Ar group Ns }
140e8200b82Shshoexeris either GRP1, GRP2, GRP5, GRP14 or GRP15
141ffa2dcb0Sjmc.El
14252e712aeSniklas.Pp
1430e2d4717SkjellFor example, 3DES-SHA means: 3DES encryption, SHA hash, and authorization by
14452e712aeSniklaspre-shared keys.
1450e2d4717SkjellSimilarly, QM-ESP-3DES-SHA-PFS-SUITE means: ESP protocol, 3DES encryption,
14682184a41SjmcSHA hash, and use Perfect Forward Secrecy.
14752e712aeSniklas.Pp
148e8200b82ShshoexerUnless explicitly stated with -GRP1, 2, 5, 14 or 15, transforms and
149e8200b82ShshoexerPFS suites use DH group 2.
1504eb3dd62SjmcThere are currently no predefined ESP+AH Quick Mode suites.
15152e712aeSniklas.Pp
1522039fcadShoThe predefinitions include some default values for the special
153419caefeShosections "General", "Keynote", "X509-certificates", and
15435ff0956Sho"Default-phase-1-configuration".
155419caefeShoThese default values are presented in the example below.
15652e712aeSniklas.Pp
15752e712aeSniklasAll autogenerated values can be overridden by manual entries by using the
15852e712aeSniklassame section and tag names in the configuration file.
159b57b191eSniklasIn particular, the default phase 1 (Main or Aggressive Mode) and phase 2
160b57b191eSniklas(Quick Mode) lifetimes can be overridden by these tags under the "General"
161ffa2dcb0Sjmcsection:
162ffa2dcb0Sjmc.Bd -literal -offset indent
163b57b191eSniklas[General]
164b57b191eSniklasDefault-phase-1-lifetime=	3600,60:86400
165b57b191eSniklasDefault-phase-2-lifetime=	1200,60:86400
166b57b191eSniklas.Ed
1672039fcadSho.Pp
1682039fcadShoThe Main Mode lifetime currently defaults to one hour (minimum 60
1694eb3dd62Sjmcseconds, maximum 1 day).
1704eb3dd62SjmcThe Quick Mode lifetime defaults to 20 minutes
1714eb3dd62Sjmc(minimum 60 seconds, maximum 1 day).
17252e712aeSniklas.Pp
173ffa2dcb0SjmcAlso, the default phase 1 ID can be set by creating a
174ffa2dcb0Sjmc.Aq Sy Phase1-ID
1750378d1f2Sniklassection, as shown below, and adding this tag under the "General"
176ffa2dcb0Sjmcsection:
177ffa2dcb0Sjmc.Bd -literal -offset indent
1780378d1f2Sniklas[General]
1790378d1f2SniklasDefault-phase-1-ID=		Phase1-ID-name
1800378d1f2Sniklas
1810378d1f2Sniklas[Phase1-ID-name]
1820378d1f2SniklasID-type=			USER_FQDN
1830378d1f2SniklasName=				foo@bar.com
1840378d1f2Sniklas.Ed
185ffa2dcb0Sjmc.Sh ROOTS
186ffa2dcb0Sjmc.Bl -hang -width 8n
187c00f6aafSjmc.It Bq Sy General
188c5fe6c4eSniklasGeneric global configuration parameters
189ffa2dcb0Sjmc.Bl -tag -width Ds
190e0eef2f9Shshoexer.It Em Acquire-Only
191e0eef2f9ShshoexerIf this tag is defined,
192ffa2dcb0Sjmc.Xr isakmpd 8
193e0eef2f9Shshoexerwill not set up flows automatically.
194e0eef2f9ShshoexerThis is useful when flows are configured with
1959fb8734eSjmc.Xr ipsecctl 8
196e0eef2f9Shshoexeror by other programs like
197e0eef2f9Shshoexer.Xr bgpd 8 .
198e0eef2f9ShshoexerThus
199ffa2dcb0Sjmc.Xr isakmpd 8
200e0eef2f9Shshoexeronly takes care of the SA establishment.
20135ff0956Sho.It Em Check-interval
202e0d722f1ShoThe interval between watchdog checks of connections we want up at all
2031ab51479Sclodertimes, in seconds.
2041ab51479ScloderThe default value is 60 seconds.
205e407932bSjmc.It Em Default-phase-1-ID
206e407932bSjmcOptional default phase 1 ID name.
207e407932bSjmc.It Em Default-phase-1-lifetime
208e407932bSjmcThe default lifetime for autogenerated transforms (phase 1).
209e407932bSjmcIf unspecified, the value 3600,60:86400 is used as the default.
210e407932bSjmc.It Em Default-phase-2-lifetime
211e407932bSjmcThe default lifetime for autogenerated suites (phase 2).
212e407932bSjmcIf unspecified, the value 1200,60:86400 is used as the default.
213e407932bSjmc.It Em Default-phase-2-suites
214e407932bSjmcA list of phase 2 suites that will be used when establishing dynamic
215e407932bSjmcSAs.
216e407932bSjmcIf left unspecified, QM-ESP-3DES-SHA-PFS-SUITE is used as the default.
217e0d722f1Sho.It Em DPD-check-interval
2181ab51479ScloderThe interval between RFC 3706 (Dead Peer Detection) messages, in seconds.
219e0d722f1ShoThe default value is 0 (zero), which means DPD is disabled.
22035ff0956Sho.It Em Exchange-max-time
22135ff0956ShoHow many seconds should an exchange maximally take to set up before we
22235ff0956Shogive up.
22335ff0956Sho.It Em Listen-on
224d39c0235ScloderA list of IP addresses or interface names OK to listen on.
22535ff0956ShoThis list is used as a filter for the set of addresses the interfaces
22635ff0956Shoconfigured provides.
22735ff0956ShoThis means that we won't see if an address given here does not exist
22835ff0956Shoon this host, and thus no error is given for that case.
2294e2ad344Shshoexer.It Em Loglevel
2304e2ad344ShshoexerA list of the form
2314e2ad344Shshoexer.Ar class Ns = Ns Ar level ,
2324e2ad344Shshoexerwhere both
2334e2ad344Shshoexer.Ar class
2344e2ad344Shshoexerand
2354e2ad344Shshoexer.Ar level
2364e2ad344Shshoexerare numbers.
2374e2ad344ShshoexerThis is similar to the
2384e2ad344Shshoexer.Fl D
2394e2ad344Shshoexercommand line switch of
240ffa2dcb0Sjmc.Xr isakmpd 8 .
2414e2ad344Shshoexer.It Em Logverbose
2424e2ad344ShshoexerIf this tag is defined, whatever the value is, verbose logging is enabled.
2434e2ad344ShshoexerThis is similar to the
2444e2ad344Shshoexer.Fl v
245235cbc01Sjmccommand line switch of
246ffa2dcb0Sjmc.Xr isakmpd 8 .
2470b2bcfccSho.It Em NAT-T-Keepalive
2480b2bcfccShoThe number of seconds between NAT-T keepalive messages, sent by the
249d4c8cd14Sjmcpeer behind NAT to keep the mapping active.
250d4c8cd14SjmcDefaults to 20.
251447a9f3aSho.It Em Policy-file
25280c8b3dbSniklasThe name of the file that contains
2531215c700Sjmc.Xr keynote 4
2544aac73a4Saaronpolicies.
255ffa2dcb0SjmcThe default is
256ffa2dcb0Sjmc.Pa /etc/isakmpd/isakmpd.policy .
2570b880a72Sho.It Em Pubkey-directory
2580b880a72ShoThe directory in which
2590b880a72Sho.Nm
260ac1aa35bSmpechlooks for explicitly trusted public keys.
261ffa2dcb0SjmcThe default is
262ffa2dcb0Sjmc.Pa /etc/isakmpd/pubkeys .
263ac1aa35bSmpechRead
2640b880a72Sho.Xr isakmpd 8
2650b880a72Shofor the required naming convention of the files in here.
2664d27bb0fSho.It Em Renegotiate-on-HUP
2674d27bb0fShoIf this tag is defined, whatever the value is,
268ffa2dcb0Sjmc.Xr isakmpd 8
2694eb3dd62Sjmcwill renegotiate all current phase 2 SAs when the daemon receives a
2704eb3dd62Sjmc.Dv SIGHUP
2714eb3dd62Sjmcsignal, or an
2724eb3dd62Sjmc.Sq R
2734eb3dd62Sjmcis sent to the FIFO interface (see
2744d27bb0fSho.Xr isakmpd 8 ) .
27535ff0956Sho.It Em Retransmits
27635ff0956ShoHow many times should a message be retransmitted before giving up.
27735ff0956Sho.It Em Shared-SADB
27835ff0956ShoIf this tag is defined, whatever the value is, some semantics of
27935ff0956Sho.Nm
28035ff0956Shoare changed so that multiple instances can run on top of one SADB
28135ff0956Shoand set up SAs with each other.
28235ff0956ShoSpecifically this means replay
28335ff0956Shoprotection will not be asked for, and errors that can occur when
28435ff0956Shoupdating an SA with its parameters a 2nd time will be ignored.
285e0eef2f9Shshoexer.It Em Use-Keynote
286e0eef2f9ShshoexerThis tag controls the use of
287e0eef2f9Shshoexer.Xr keynote 4
288e0eef2f9Shshoexerpolicy checking.
289e0eef2f9ShshoexerThe default value is
290e0eef2f9Shshoexer.Qq yes ,
291e0eef2f9Shshoexerwhich enables the policy checking.
292e0eef2f9ShshoexerWhen set to any other value, policies will not be checked.
2937a9bba63SjmcThis is useful when policies for flows and SA establishment are arranged by
294e0eef2f9Shshoexerother programs like
295937c2feaSderaadt.Xr ipsecctl 8
296e0eef2f9Shshoexeror
297e0eef2f9Shshoexer.Xr bgpd 8 .
298b4f8e7c2Shshoexer.It Em Delete-SAs
299*95f3b939SjmcThis tag controls whether
300b4f8e7c2Shshoexer.Xr isakmpd 8
301b4f8e7c2Shshoexerdeletes SAs on shutdown or not.
302b4f8e7c2ShshoexerThe default value is
303b4f8e7c2Shshoexer.Qq no .
304c5fe6c4eSniklas.El
305c00f6aafSjmc.It Bq Sy Phase 1
306c5fe6c4eSniklasISAKMP SA negotiation parameter root
307ffa2dcb0Sjmc.Bl -tag -width Ds
308cc3c8b42Sniklas.It Em Default
309ac1aa35bSmpechA name of the default ISAKMP peer.
310ffa2dcb0SjmcIncoming phase 1 connections from other IP addresses will use this peer name.
3119615e1d4SaaronThis name is used as the section name for further information to be found.
312ffa2dcb0SjmcLook at
313ffa2dcb0Sjmc.Aq Sy ISAKMP-peer
314ffa2dcb0Sjmcbelow.
315e407932bSjmc.It Aq Em IP-address
316e407932bSjmcA name of the ISAKMP peer at the given IP address.
317c5fe6c4eSniklas.El
318c00f6aafSjmc.It Bq Sy Phase 2
319c5fe6c4eSniklasIPsec SA negotiation parameter root
320ffa2dcb0Sjmc.Bl -tag -width Ds
321c5fe6c4eSniklas.It Em Connections
32261d575f0SangelosA list of directed IPsec "connection" names that should be brought up
3232ddc24cbSniklasautomatically, either on first use if the system supports it, or at
3249615e1d4Saaronstartup of the daemon.
3259615e1d4SaaronThese names are section names where further information can be found.
326ffa2dcb0SjmcLook at
327ffa2dcb0Sjmc.Aq Sy IPsec-connection
328ffa2dcb0Sjmcbelow.
32944143af3SderaadtNormally any connections mentioned here are treated as part of the
330ffa2dcb0Sjmc"Passive-connection" list we present below; however there is a flag,
331ffa2dcb0Sjmc.Em Active-only ,
332ffa2dcb0Sjmcthat disables this behaviour.
333ffa2dcb0SjmcThis too is mentioned in the
334ffa2dcb0Sjmc.Aq Sy IPsec-connection
335ffa2dcb0Sjmcsection, in the "Flags" tag.
33680baf197Sniklas.It Em Passive-connections
33761d575f0SangelosA list of IPsec "connection" names we recognize and accept initiations for.
3389615e1d4SaaronThese names are section names where further information can be found.
339ffa2dcb0SjmcLook at
340ffa2dcb0Sjmc.Aq Sy IPsec-connection
341ffa2dcb0Sjmcbelow.
3429615e1d4SaaronCurrently only the Local-ID and Remote-ID tags
34380baf197Sniklasare looked at in those sections, as they are matched against the IDs given
34480baf197Sniklasby the initiator.
345c5fe6c4eSniklas.El
346c00f6aafSjmc.It Bq Sy KeyNote
347c00f6aafSjmcKeyNote configuration section
348ffa2dcb0Sjmc.Bl -tag -width Ds
349b57b191eSniklas.It Em Credential-directory
350b57b191eSniklasA directory containing directories named after IDs (IP
3514eb3dd62Sjmcaddresses,
3524eb3dd62Sjmc.Dq user@domain ,
3534eb3dd62Sjmcor hostnames) that contain files named
3544eb3dd62Sjmc.Dq credentials
3554eb3dd62Sjmcand
3564eb3dd62Sjmc.Dq private_key .
357b57b191eSniklas.Pp
358b57b191eSniklasThe credentials file contains
359b57b191eSniklas.Xr keynote 4
360b57b191eSniklascredentials that are sent to a remote IKE daemon when we use the
361b57b191eSniklasassociated ID, or credentials that we may want to consider when doing
362ac1aa35bSmpechan exchange with a remote IKE daemon that uses that ID.
363ac1aa35bSmpechNote that, in the former case, the last credential in the file
364ac1aa35bSmpechMUST contain our public key in its Licensees field.
365ac1aa35bSmpechMore than one credentials may exist in the file.
366ac1aa35bSmpechThey are separated by whitelines (the format is essentially the same as
367ac1aa35bSmpechthat of the policy file).
368ac1aa35bSmpechThe credentials are of the same format as the policies described in
369b57b191eSniklas.Xr isakmpd.policy 5 .
370b57b191eSniklasThe only difference is that the Authorizer field contains a public
371ac1aa35bSmpechkey, and the assertion is signed.
372ac1aa35bSmpechSigned assertions can be generated using the
373b57b191eSniklas.Xr keynote 1
374b57b191eSniklasutility.
375b57b191eSniklas.Pp
376b57b191eSniklasThe private_key file contains the private RSA key we use for
377ac1aa35bSmpechauthentication.
378ac1aa35bSmpechIf the directory (and the files) exist, they take precedence over X509-based
379ac1aa35bSmpechauthentication.
380b57b191eSniklas.El
381c00f6aafSjmc.It Bq Sy X509-Certificates
382c00f6aafSjmcX509-certificate configuration section
383ffa2dcb0Sjmc.Bl -tag -width Ds
38435ff0956Sho.It Em Accept-self-signed
38535ff0956ShoIf this tag is defined, whatever the value is, certificates that
38635ff0956Shodo not originate from a trusted CA but are self-signed will be
38735ff0956Shoaccepted.
388fb1921ccSniklas.It Em Ca-directory
389fb1921ccSniklasA directory containing PEM certificates of certification authorities
390ac1aa35bSmpechthat we trust to sign other certificates.
391ac1aa35bSmpechNote that for a CA to be really trusted, it needs to be somehow
392ac1aa35bSmpechreferred to by policy, in
393e5814869Sangelos.Xr isakmpd.policy 5 .
394e5814869SangelosThe certificates in this directory are used for the actual X.509
395e5814869Sangelosauthentication and for cross-referencing policies that refer to
396ac1aa35bSmpechDistinguished Names (DNs).
397ac1aa35bSmpechKeeping a separate directory (as opposed to integrating policies
398ac1aa35bSmpechand X.509 CA certificates) allows for maintenance of a list of
399ac1aa35bSmpech"well known" CAs without actually having to trust all (or any) of them.
400fb1921ccSniklas.It Em Cert-directory
401fb1921ccSniklasA directory containing PEM certificates that we trust to be valid.
402fb1921ccSniklasThese certificates are used in preference to those passed in messages and
4030e2d4717Skjellare required to have a subjectAltName extension containing the certificate
40491d5cfbaShshoexerholder identity; usually IP address, FQDN, or User FQDN.
405954b1b31Sniklas.It Em Private-key
406954b1b31SniklasThe private key matching the public key of our certificate (which should be
4070e2d4717Skjellin the "Cert-directory", and have an appropriate subjectAltName field).
408db26b2b9Smsf.It Em Private-key-directory
409db26b2b9SmsfA directory containing private keys named after an ID (IP addresses,
410db26b2b9Smsf.Dq user@domain ,
411*95f3b939Sjmcor hostnames).
412fb1921ccSniklas.El
413c5fe6c4eSniklas.El
414ffa2dcb0Sjmc.Sh REFERRED-TO SECTIONS
415ffa2dcb0Sjmc.Bl -hang -width Ds
416ffa2dcb0Sjmc.It Aq Sy ISAKMP-peer
417c5fe6c4eSniklasParameters for negotiation with an ISAKMP peer
418ffa2dcb0Sjmc.Bl -tag -width Ds
419c5fe6c4eSniklas.It Em Address
420ffa2dcb0SjmcIf existent, the IP address of the peer.
421e407932bSjmc.It Em Authentication
422e407932bSjmcIf existent, authentication data for this specific peer.
423e407932bSjmcIn the case of a pre-shared key, this is the key value itself.
424c5fe6c4eSniklas.It Em Configuration
4259615e1d4SaaronThe name of the ISAKMP-configuration section to use.
426ffa2dcb0SjmcLook at
427ffa2dcb0Sjmc.Aq Sy ISAKMP-configuration
428ffa2dcb0Sjmcbelow.
42935ff0956ShoIf unspecified, defaults to "Default-phase-1-configuration".
430e407932bSjmc.It Em Flags
431e407932bSjmcA comma-separated list of flags controlling the further
432e407932bSjmchandling of the ISAKMP SA.
433e407932bSjmcCurrently there are no specific ISAKMP SA flags defined.
4346a8478f3Sniklas.It Em ID
4356a8478f3SniklasIf existent, the name of the section that describes the
4364aac73a4Saaronlocal client ID that we should present to our peer.
4374aac73a4SaaronIf not present, it
4386a8478f3Sniklasdefaults to the address of the local interface we are sending packets
4394aac73a4Saaronover to the remote daemon.
440ffa2dcb0SjmcLook at
441ffa2dcb0Sjmc.Aq Sy Phase1-ID
442ffa2dcb0Sjmcbelow.
443e407932bSjmc.It Em Local-address
444e407932bSjmcThe Local IP address to use, if we are multi-homed, or have aliases.
445e407932bSjmc.It Em Phase
446e407932bSjmcThe constant
447e407932bSjmc.Sq 1 ,
448e407932bSjmcas ISAKMP-peers and IPsec-connections
449e407932bSjmcreally are handled by the same code inside
450e407932bSjmc.Xr isakmpd 8 .
451e407932bSjmc.It Em Port
452e407932bSjmcFor UDP, the UDP port number to send to.
453e407932bSjmcThis is optional;
454e407932bSjmcthe default value is 500 which is the IANA-registered number for ISAKMP.
455a2067f52Sniklas.It Em Remote-ID
456a2067f52SniklasIf existent, the name of the section that describes the remote client
457a2067f52SniklasID we expect the remote daemon to send us.
458a2067f52SniklasIf not present, it defaults to the address of the remote daemon.
459ffa2dcb0SjmcLook at
460ffa2dcb0Sjmc.Aq Sy Phase1-ID
461ffa2dcb0Sjmcbelow.
462e407932bSjmc.It Em Transport
463e407932bSjmcThe name of the transport protocol; defaults to UDP.
464c5fe6c4eSniklas.El
465ffa2dcb0Sjmc.It Aq Sy Phase1-ID
466c00f6aafSjmcParameters for Phase 1 negotiation
467ffa2dcb0Sjmc.Bl -tag -width Ds
468e407932bSjmc.It Em Address
469e407932bSjmcIf the ID-type is
470e407932bSjmc.Li IPV4_ADDR
471e407932bSjmcor
472e407932bSjmc.Li IPV6_ADDR ,
473e407932bSjmcthis tag should exist and be an IP address.
4746a8478f3Sniklas.It Em ID-type
475d8ca7c44ShoThe ID type as given by the RFC specifications.
47635ff0956ShoFor phase 1 this is currently
4776a8478f3Sniklas.Li IPV4_ADDR ,
4786a8478f3Sniklas.Li IPV4_ADDR_SUBNET ,
479d8ca7c44Sho.Li IPV6_ADDR ,
480d8ca7c44Sho.Li IPV6_ADDR_SUBNET ,
4816a8478f3Sniklas.Li FQDN ,
482ffa2dcb0Sjmc.Li USER_FQDN ,
4836a8478f3Sniklasor
4845bc978dfSangelos.Li KEY_ID .
4856a8478f3Sniklas.It Em Name
4866a8478f3SniklasIf the ID-type is
4875bc978dfSangelos.Li FQDN ,
488ffa2dcb0Sjmc.Li USER_FQDN ,
4895bc978dfSangelosor
4905bc978dfSangelos.Li KEY_ID ,
4915bc978dfSangelosthis tag should exist and contain a domain name, user@domain, or
4925bc978dfSangelosother identifying string respectively.
4933f167ca4Sangelos.Pp
4943f167ca4SangelosIn the case of
4953f167ca4Sangelos.Li KEY_ID ,
4963f167ca4Sangelosnote that the IKE protocol allows any octet sequence to be sent or
4973f167ca4Sangelosreceived under this payload, potentially including non-printable
4983f167ca4Sangelosones.
4991215c700Sjmc.Xr isakmpd 8
5003f167ca4Sangeloscan only transmit printable
5013f167ca4Sangelos.Li KEY_ID
5023f167ca4Sangelospayloads, but can receive and process arbitrary
5033f167ca4Sangelos.Li KEY_ID
5043f167ca4Sangelospayloads.
5053f167ca4SangelosThis effectively means that non-printable
5063f167ca4Sangelos.Li KEY_ID
5073f167ca4Sangelosremote identities cannot be verified through this means, although it
5083f167ca4Sangelosis still possible to do so through
5093f167ca4Sangelos.Xr isakmpd.policy 5 .
510e407932bSjmc.It Em Netmask
511e407932bSjmcIf the ID-type is
512e407932bSjmc.Li IPV4_ADDR_SUBNET
513e407932bSjmcor
514e407932bSjmc.Li IPV6_ADDR_SUBNET ,
515e407932bSjmcthis tag should exist and
516e407932bSjmcbe a network subnet mask.
517e407932bSjmc.It Em Network
518e407932bSjmcIf the ID-type is
519e407932bSjmc.Li IPV4_ADDR_SUBNET
520e407932bSjmcor
521e407932bSjmc.Li IPV6_ADDR_SUBNET ,
522e407932bSjmcthis tag should exist and
523e407932bSjmcbe a network address.
5246a8478f3Sniklas.El
525ffa2dcb0Sjmc.It Aq Sy ISAKMP-configuration
526c00f6aafSjmcParameters for ISAKMP configuration
527ffa2dcb0Sjmc.Bl -tag -width Ds
528c5fe6c4eSniklas.It Em DOI
5299615e1d4SaaronThe domain of interpretation as given by the RFCs.
5309615e1d4SaaronNormally
531c5fe6c4eSniklas.Li IPSEC .
532b57b191eSniklasIf unspecified, defaults to
533b57b191eSniklas.Li IPSEC .
534c5fe6c4eSniklas.It Em EXCHANGE_TYPE
5359615e1d4SaaronThe exchange type as given by the RFCs.
5369615e1d4SaaronFor main mode this is
5379f078bd8Sniklas.Li ID_PROT
5389f078bd8Sniklasand for aggressive mode it is
5399f078bd8Sniklas.Li AGGRESSIVE .
540c5fe6c4eSniklas.It Em Transforms
541c5fe6c4eSniklasA list of proposed transforms to use for protecting the
5429615e1d4SaaronISAKMP traffic.
5439615e1d4SaaronThese are actually names for sections
5449615e1d4Saaronfurther describing the transforms.
545ffa2dcb0SjmcLook at
546ffa2dcb0Sjmc.Aq Sy ISAKMP-transform
547ffa2dcb0Sjmcbelow.
548c5fe6c4eSniklas.El
549ffa2dcb0Sjmc.It Aq Sy ISAKMP-transform
550c00f6aafSjmcParameters for ISAKMP authentication
551ffa2dcb0Sjmc.Bl -tag -width Ds
552e407932bSjmc.It Em AUTHENTICATION_METHOD
553e407932bSjmcThe authentication method as the RFCs name it, or ANY.
554c5fe6c4eSniklas.It Em ENCRYPTION_ALGORITHM
555850f7173SniklasThe encryption algorithm as the RFCs name it, or ANY to denote that any
556850f7173Sniklasencryption algorithm proposed will be accepted.
557c5fe6c4eSniklas.It Em GROUP_DESCRIPTION
5589615e1d4SaaronThe group used for Diffie-Hellman exponentiations, or ANY.
55944143af3SderaadtThe names are symbolic, like
560ffa2dcb0Sjmc.Li MODP_768 , MODP_1024 , EC_155 ,
561c5fe6c4eSniklasand
562c5fe6c4eSniklas.Li EC_185 .
563e407932bSjmc.It Em HASH_ALGORITHM
564e407932bSjmcThe hash algorithm as the RFCs name it, or ANY.
565e407932bSjmc.It Em KEY_LENGTH
566e407932bSjmcFor encryption algorithms with variable key length, this is
567e407932bSjmcwhere the offered/accepted keylengths are described.
568e407932bSjmcThe value is of the offer-accept kind described above.
569c5fe6c4eSniklas.It Em Life
5704aac73a4SaaronA list of lifetime descriptions, or ANY.
5714aac73a4SaaronIn the former case, each
572850f7173Sniklaselement is in itself a name of the section that defines the lifetime.
573ffa2dcb0SjmcLook at
574ffa2dcb0Sjmc.Aq Sy Lifetime
575ffa2dcb0Sjmcbelow.
5764aac73a4SaaronIf it is set to ANY, then any type of
577850f7173Sniklasproposed lifetime type and value will be accepted.
578e407932bSjmc.It Em PRF
579e407932bSjmcThe algorithm to use for the keyed pseudo-random function (used for key
580e407932bSjmcderivation and authentication in phase 1), or ANY.
581c5fe6c4eSniklas.El
582ffa2dcb0Sjmc.It Aq Sy Lifetime
583c00f6aafSjmcParameters for connection duration
584ffa2dcb0Sjmc.Bl -tag -width Ds
585e407932bSjmc.It Em LIFE_DURATION
586e407932bSjmcAn offer/accept kind of value; see above.
587e407932bSjmcCan also be set to ANY.
588c5fe6c4eSniklas.It Em LIFE_TYPE
589c5fe6c4eSniklas.Li SECONDS
590c5fe6c4eSniklasor
591e55ca143Sniklas.Li KILOBYTES
5924aac73a4Saarondepending on the type of the duration.
5934aac73a4SaaronNotice that this field may NOT be set to ANY.
594c5fe6c4eSniklas.El
595ffa2dcb0Sjmc.It Aq Sy IPsec-connection
596c00f6aafSjmcParameters for IPsec connection configuration
597ffa2dcb0Sjmc.Bl -tag -width Ds
598c5fe6c4eSniklas.It Em Configuration
59961d575f0SangelosThe name of the IPsec-configuration section to use.
600ffa2dcb0SjmcLook at
601ffa2dcb0Sjmc.Aq Sy IPsec-configuration
602ffa2dcb0Sjmcbelow.
60313a99464Sniklas.It Em Flags
60413a99464SniklasA comma-separated list of flags controlling the further
60561d575f0Sangeloshandling of the IPsec SA.
6069615e1d4SaaronCurrently only one flag is defined:
60780baf197Sniklas.Bl -tag -width 12n
60880baf197Sniklas.It Em Active-only
609ffa2dcb0SjmcIf this flag is given and this
610ffa2dcb0Sjmc.Aq Sy IPsec-connection
611ffa2dcb0Sjmcis part of the phase 2
61280baf197Sniklasconnections we automatically keep up, it will not automatically be used for
61380baf197Sniklasaccepting connections from the peer.
61480baf197Sniklas.El
615e407932bSjmc.It Em ISAKMP-peer
616604faeecSjmcThe name of the ISAKMP-peer to talk to in order to
617e407932bSjmcset up this connection.
618e407932bSjmcThe value is the name of an
619e407932bSjmc.Aq Sy ISAKMP-peer
620e407932bSjmcsection.
621e407932bSjmcSee above.
622e407932bSjmc.It Em Local-ID
623e407932bSjmcIf existent, the name of the section that describes the
624e407932bSjmcoptional local client ID that we should present to our peer.
625e407932bSjmcIt is also used when we act as responders to find out what
626e407932bSjmc.Aq Sy IPsec-connection
627e407932bSjmcwe are dealing with.
628e407932bSjmcLook at
629e407932bSjmc.Aq Sy IPsec-ID
630e407932bSjmcbelow.
631e407932bSjmc.It Em Phase
632e407932bSjmcThe constant
633e407932bSjmc.Sq 2 ,
634e407932bSjmcas ISAKMP-peers and IPsec-connections
635e407932bSjmcreally are handled by the same code inside
636e407932bSjmc.Xr isakmpd 8 .
637e407932bSjmc.It Em Remote-ID
638e407932bSjmcIf existent, the name of the section that describes the
639e407932bSjmcoptional remote client ID that we should present to our peer.
640e407932bSjmcIt is also used when we act as responders to find out what
641e407932bSjmc.Aq Sy IPsec-connection
642e407932bSjmcwe are dealing with.
643e407932bSjmcLook at
644e407932bSjmc.Aq Sy IPsec-ID
645e407932bSjmcbelow.
646c5fe6c4eSniklas.El
647ffa2dcb0Sjmc.It Aq Sy IPsec-configuration
648c00f6aafSjmcParameters for IPsec configuration
649ffa2dcb0Sjmc.Bl -tag -width Ds
650c5fe6c4eSniklas.It Em DOI
6519615e1d4SaaronThe domain of interpretation as given by the RFCs.
6529615e1d4SaaronNormally
653c5fe6c4eSniklas.Li IPSEC .
654b57b191eSniklasIf unspecified, defaults to
655b57b191eSniklas.Li IPSEC .
656c5fe6c4eSniklas.It Em EXCHANGE_TYPE
6579615e1d4SaaronThe exchange type as given by the RFCs.
6589615e1d4SaaronFor quick mode this is
659c5fe6c4eSniklas.Li QUICK_MODE .
660c5fe6c4eSniklas.It Em Suites
6613b2a0cf1SaaronA list of protection suites (bundles of protocols) usable for
6629615e1d4Saaronprotecting the IP traffic.
663ffa2dcb0SjmcEach of the list elements is a name of an
664ffa2dcb0Sjmc.Aq Sy IPsec-suite
6659615e1d4Saaronsection.
6669615e1d4SaaronSee below.
667c5fe6c4eSniklas.El
668ffa2dcb0Sjmc.It Aq Sy IPsec-suite
669c00f6aafSjmcParameters for IPsec protection suite configuration
670ffa2dcb0Sjmc.Bl -tag -width Ds
671ffa2dcb0Sjmc.It Em Protocols
672ffa2dcb0SjmcA list of the protocols included in this protection suite.
673ffa2dcb0SjmcEach of the list elements is a name of an
674ffa2dcb0Sjmc.Aq Sy IPsec-protocol
675ffa2dcb0Sjmcsection.
676ffa2dcb0SjmcSee below.
677ffa2dcb0Sjmc.El
678ffa2dcb0Sjmc.It Aq Sy IPsec-protocol
679c00f6aafSjmcParameters for IPsec protocol configuration
680ffa2dcb0Sjmc.Bl -tag -width Ds
681c5fe6c4eSniklas.It Em PROTOCOL_ID
6829615e1d4SaaronThe protocol as given by the RFCs.
683ffa2dcb0SjmcAcceptable values are currently
684c5fe6c4eSniklas.Li IPSEC_AH
685c5fe6c4eSniklasand
686c5fe6c4eSniklas.Li IPSEC_ESP .
687e407932bSjmc.It Em ReplayWindow
688e407932bSjmcThe size of the window used for replay protection.
689e407932bSjmcThis is normally left alone.
690e407932bSjmcLook at the ESP and AH RFCs for a better description.
691c5fe6c4eSniklas.It Em Transforms
6923b2a0cf1SaaronA list of transforms usable for implementing the protocol.
693ffa2dcb0SjmcEach of the list elements is a name of an
694ffa2dcb0Sjmc.Aq Sy IPsec-transform
6959615e1d4Saaronsection.
6969615e1d4SaaronSee below.
697c5fe6c4eSniklas.El
698ffa2dcb0Sjmc.It Aq Sy IPsec-transform
699c00f6aafSjmcParameters for IPsec transform configuration
700ffa2dcb0Sjmc.Bl -tag -width Ds
701c5fe6c4eSniklas.It Em AUTHENTICATION_ALGORITHM
702c5fe6c4eSniklasThe optional authentication algorithm in the case of this
703c5fe6c4eSniklasbeing an ESP transform.
704e407932bSjmc.It Em ENCAPSULATION_MODE
705e407932bSjmcThe encapsulation mode as given by the RFCs.
706e407932bSjmcThis means TRANSPORT or TUNNEL.
707c5fe6c4eSniklas.It Em GROUP_DESCRIPTION
708c5fe6c4eSniklasAn optional (provides PFS if present) Diffie-Hellman group
7099615e1d4Saarondescription.
710ffa2dcb0SjmcThe values are the same as those for GROUP_DESCRIPTION in
711ffa2dcb0Sjmc.Aq Sy ISAKMP-transform
712ffa2dcb0Sjmcsections shown above.
713a806508bShshoexer.It Em KEY_LENGTH
714a806508bShshoexerFor encryption algorithms with variable key length, this is
715a806508bShshoexerwhere the offered keylength is described.
716c5fe6c4eSniklas.It Em Life
717ffa2dcb0SjmcList of lifetimes, each element is a
718ffa2dcb0Sjmc.Aq Sy Lifetime
719ffa2dcb0Sjmcsection name.
720e407932bSjmc.It Em TRANSFORM_ID
721e407932bSjmcThe transform ID as given by the RFCs.
722c5fe6c4eSniklas.El
723ffa2dcb0Sjmc.It Aq Sy IPsec-ID
724c00f6aafSjmcParameters for IPsec ID configuration
725ffa2dcb0Sjmc.Bl -tag -width Ds
726c5fe6c4eSniklas.It Em Address
727c5fe6c4eSniklasIf the ID-type is
728d8ca7c44Sho.Li IPV4_ADDR
729d8ca7c44Shoor
730ffa2dcb0Sjmc.Li IPV6_ADDR ,
731ffa2dcb0Sjmcthis tag should exist and be an IP address, an interface name, or the
732e3283cbfSmcbride.Em default
733e3283cbfSmcbridekeyword.
734e3283cbfSmcbrideIf an interface is used, the first address of the appropriate
735e3283cbfSmcbridefamily will be used.
736e3283cbfSmcbrideThe
737e3283cbfSmcbride.Em default
738e3283cbfSmcbridekeyword uses the interface associated with the default route.
739ffa2dcb0SjmcIn the case of IPv6, link-local addresses will be skipped if
740e3283cbfSmcbrideaddresses which are not link-local exist.
741e3283cbfSmcbrideIf the address on the interface changes
742ffa2dcb0Sjmc.Xr isakmpd 8
743e3283cbfSmcbridewill not track the change.
744e3283cbfSmcbrideThe configuration must be reloaded to learn the new address.
745e407932bSjmc.It Em ID-type
746e407932bSjmcThe ID type as given by the RFCs.
747e407932bSjmcFor IPsec this is currently
748e407932bSjmc.Li IPV4_ADDR ,
749e407932bSjmc.Li IPV6_ADDR ,
750e407932bSjmc.Li IPV4_ADDR_SUBNET ,
751d8ca7c44Shoor
752e407932bSjmc.Li IPV6_ADDR_SUBNET .
753c5fe6c4eSniklas.It Em Netmask
754c5fe6c4eSniklasIf the ID-type is
755c5fe6c4eSniklas.Li IPV4_ADDR_SUBNET
756d8ca7c44Shoor
757ffa2dcb0Sjmc.Li IPV6_ADDR_SUBNET ,
758c5fe6c4eSniklasthis tag should exist and
759e3283cbfSmcbridebe a network subnet mask or an interface.
760ffa2dcb0SjmcWhen an interface is specified, the netmask is the mask associated with the
761e3283cbfSmcbride.Em Network .
762e3283cbfSmcbrideThe
763e3283cbfSmcbride.Em default
764e3283cbfSmcbridekeyword uses the interface associated with the default route.
765e407932bSjmc.It Em Network
7660378d1f2SniklasIf the ID-type is
767e407932bSjmc.Li IPV4_ADDR_SUBNET
768d8ca7c44Shoor
769ffa2dcb0Sjmc.Li IPV6_ADDR_SUBNET ,
770e407932bSjmcthis tag should exist and be a network address, an interface, or the
771e407932bSjmc.Em default
772e407932bSjmckeyword.
773e407932bSjmcWhen an interface is specified, the network is selected as with the
774e407932bSjmc.Em Address
775e407932bSjmctag.
7760378d1f2Sniklas.It Em Port
7770378d1f2SniklasIf the ID-type is
778d8ca7c44Sho.Li IPV4_ADDR ,
7790378d1f2Sniklas.Li IPV4_ADDR_SUBNET ,
780ffa2dcb0Sjmc.Li IPV6_ADDR ,
781d8ca7c44Shoor
782ffa2dcb0Sjmc.Li IPV6_ADDR_SUBNET ,
7830378d1f2Sniklasthis tag indicates what source or destination port is allowed to be
7840378d1f2Sniklastransported over the SA (depending on whether this is a local or
7850378d1f2Sniklasremote ID).
7860378d1f2SniklasIf left unspecified, all ports of the given transport protocol
7870378d1f2Sniklaswill be transmitted (or permitted) over the SA.
788ffa2dcb0SjmcThe
789ffa2dcb0Sjmc.Em Protocol
790ffa2dcb0Sjmctag must be specified in conjunction with this tag.
791e407932bSjmc.It Em Protocol
792e407932bSjmcIf the ID-type is
793e407932bSjmc.Li IPV4_ADDR ,
794e407932bSjmc.Li IPV4_ADDR_SUBNET ,
795e407932bSjmc.Li IPV6_ADDR ,
796e407932bSjmcor
797e407932bSjmc.Li IPV6_ADDR_SUBNET ,
798e407932bSjmcthis tag indicates what transport protocol should be transmitted over
799e407932bSjmcthe SA.
800e407932bSjmcIf left unspecified, all transport protocols between the two address
801e407932bSjmc(ranges) will be sent (or permitted) over that SA.
802c5fe6c4eSniklas.El
803c5fe6c4eSniklas.El
804ffa2dcb0Sjmc.Sh OTHER SECTIONS
805ffa2dcb0Sjmc.Bl -hang -width 8n
806ffa2dcb0Sjmc.It Aq Sy IKECFG-ID
8074eb3dd62SjmcParameters to use with IKE mode-config.
8084eb3dd62SjmcOne ID per peer.
8094ca71560Sho.Pp
8104ca71560ShoAn IKECFG-ID is written as [<ID-type>/<name>].
8114ca71560ShoThe following ID types are supported:
812ffa2dcb0Sjmc.Pp
813ffa2dcb0Sjmc.Bl -tag -width "ASN1_DNXX" -offset indent -compact
8144ca71560Sho.It IPv4
8154ca71560Sho[ipv4/A.B.C.D]
8164ca71560Sho.It IPv6
8174ca71560Sho[ipv6/abcd:abcd::ab:cd]
8184ca71560Sho.It FQDN
8194ca71560Sho[fqdn/foo.bar.org]
8204ca71560Sho.It UFQDN
8214ca71560Sho[ufqdn/user@foo.bar.org]
8224ca71560Sho.It ASN1_DN
8234ca71560Sho[asn1_dn//C=aa/O=cc/...] (Note the double slashes as the DN itself
8244eb3dd62Sjmcstarts with a
8254eb3dd62Sjmc.Sq / . )
8264ca71560Sho.El
8274ca71560Sho.Pp
8284ca71560ShoEach section specifies what configuration values to return to the peer
8294eb3dd62Sjmcrequesting IKE mode-config.
8304eb3dd62SjmcCurrently supported values are:
831ffa2dcb0Sjmc.Pp
832ffa2dcb0Sjmc.Bl -tag -width "WINS-serverXX" -offset indent -compact
8334ca71560Sho.It Em Address
8344ca71560ShoThe peer's network address.
8354ca71560Sho.It Em Netmask
8364ca71560ShoThe peer's netmask.
8374ca71560Sho.It Em Nameserver
8384ca71560ShoThe IP address of a DNS nameserver.
8394ca71560Sho.It Em WINS-server
8404ca71560ShoThe IP address of a WINS server.
8414ca71560Sho.El
842ffa2dcb0Sjmc.It Aq Sy Initiator-ID
843c00f6aafSjmcParameters for peer initiator configuration
844106cbd59Smarkus.Pp
845106cbd59SmarkusDuring phase 1 negotiation
846ffa2dcb0Sjmc.Xr isakmpd 8
847ffa2dcb0Sjmclooks for a pre-shared key in the
848ffa2dcb0Sjmc.Aq Sy ISAKMP-peer
849ffa2dcb0Sjmcsection.
850106cbd59SmarkusIf no Authentication data is specified in that section, and
851ffa2dcb0Sjmc.Xr isakmpd 8
852106cbd59Smarkusis not the initiator, it looks for Authentication data in a section named after
853106cbd59Smarkusthe initiator's phase 1 ID.
854106cbd59SmarkusThis allows mobile users with dynamic IP addresses
855106cbd59Smarkusto have different shared secrets.
856106cbd59Smarkus.Pp
857106cbd59SmarkusThis only works for aggressive mode because in main mode the remote
858106cbd59Smarkusinitiator ID would not yet be known.
859830c32f9ShshoexerNote, however, that use of aggressive mode is discouraged.
860830c32f9ShshoexerSee
861ffa2dcb0Sjmc.Sx CAVEATS ,
862ffa2dcb0Sjmcbelow.
863106cbd59Smarkus.Pp
864ffa2dcb0SjmcThe name of the
865ffa2dcb0Sjmc.Aq Sy Initiator-ID
866ffa2dcb0Sjmcsection depends on the ID type sent by the initiator.
867106cbd59SmarkusCurrently this can be:
868ffa2dcb0Sjmc.Pp
869ffa2dcb0Sjmc.Bl -tag -width "UFQDNXX" -offset indent -compact
870106cbd59Smarkus.It IPv4
871106cbd59Smarkus[A.B.C.D]
872106cbd59Smarkus.It IPv6
873106cbd59Smarkus[abcd:abcd::ab:cd]
874106cbd59Smarkus.It FQDN
875106cbd59Smarkus[foo.bar.org]
876106cbd59Smarkus.It UFQDN
877106cbd59Smarkus[user@foo.bar.org]
878106cbd59Smarkus.El
8794ca71560Sho.El
8802b65e200Sjmc.Sh FILES
8812b65e200Sjmc.Bl -tag -width /etc/isakmpd/isakmpd.conf
8822b65e200Sjmc.It Pa /etc/isakmpd/isakmpd.conf
8832b65e200SjmcThe default
884ffa2dcb0Sjmc.Xr isakmpd 8
8852b65e200Sjmcconfiguration file.
8862b65e200Sjmc.It Pa /usr/share/ipsec/isakmpd/
8872b65e200SjmcA directory containing some sample
888ffa2dcb0Sjmc.Xr isakmpd 8
8892b65e200Sjmcconfiguration files.
8902b65e200Sjmc.El
89100b2ba71Saaron.Sh EXAMPLES
8922040585eSniklasAn example of a configuration file:
8932040585eSniklas.Bd -literal
8942040585eSniklas# A configuration sample for the isakmpd ISAKMP/Oakley (aka IKE) daemon.
8952040585eSniklas
8962040585eSniklas[General]
897c5fe6c4eSniklasListen-on=		10.1.0.2
8982040585eSniklas
899c5fe6c4eSniklas# Incoming phase 1 negotiations are multiplexed on the source IP address
9002b81057dSniklas[Phase 1]
901c5fe6c4eSniklas10.1.0.1=		ISAKMP-peer-west
9022b81057dSniklas
903c5fe6c4eSniklas# These connections are walked over after config file parsing and told
904c5fe6c4eSniklas# to the application layer so that it will inform us when traffic wants to
90552250141Smoritz# pass over them.  This means we can do on-demand keying.
906c5fe6c4eSniklas[Phase 2]
907c5fe6c4eSniklasConnections=		IPsec-east-west
908c5fe6c4eSniklas
909cc3c8b42Sniklas# Default values are commented out.
910c5fe6c4eSniklas[ISAKMP-peer-west]
9112b81057dSniklasPhase=			1
912cc3c8b42Sniklas#Transport=		udp
913f6dd85a7SniklasLocal-address=		10.1.0.2
9142b81057dSniklasAddress=		10.1.0.1
9152b81057dSniklas#Port=			isakmp
9162b81057dSniklas#Port=			500
91735ff0956Sho#Configuration=		Default-phase-1-configuration
9182b81057dSniklasAuthentication=		mekmitasdigoat
919cc3c8b42Sniklas#Flags=
9202b81057dSniklas
921c5fe6c4eSniklas[IPsec-east-west]
9222b81057dSniklasPhase=			2
923c5fe6c4eSniklasISAKMP-peer=		ISAKMP-peer-west
9242b81057dSniklasConfiguration=		Default-quick-mode
925c5fe6c4eSniklasLocal-ID=		Net-east
926c5fe6c4eSniklasRemote-ID=		Net-west
927cc3c8b42Sniklas#Flags=
9282b81057dSniklas
929c5fe6c4eSniklas[Net-west]
9302b81057dSniklasID-type=		IPV4_ADDR_SUBNET
9312b81057dSniklasNetwork=		192.168.1.0
9322b81057dSniklasNetmask=		255.255.255.0
9332b81057dSniklas
934c5fe6c4eSniklas[Net-east]
9352b81057dSniklasID-type=		IPV4_ADDR_SUBNET
9362b81057dSniklasNetwork=		192.168.2.0
9372b81057dSniklasNetmask=		255.255.255.0
9382b81057dSniklas
93952e712aeSniklas# Quick mode descriptions
94052e712aeSniklas
94152e712aeSniklas[Default-quick-mode]
94252e712aeSniklasEXCHANGE_TYPE=		QUICK_MODE
9431a87c1a3ShoSuites=			QM-ESP-3DES-SHA-PFS-SUITE,QM-ESP-AES-SHA-PFS-SUITE
94452e712aeSniklas
9454ca71560Sho# Data for an IKE mode-config peer
9464ca71560Sho[asn1_dn//C=SE/L=SomeCity/O=SomeCompany/CN=SomePeer.company.com]
9474ca71560ShoAddress=		192.168.1.123
9484ca71560ShoNetmask=		255.255.255.0
9494ca71560ShoNameserver=		192.168.1.10
9504ca71560ShoWINS-server=		192.168.1.11
9514ca71560Sho
952106cbd59Smarkus# pre-shared key based on initiator's phase 1 ID
953106cbd59Smarkus[foo.bar.org]
954106cbd59SmarkusAuthentication=		mekmitasdigoat
955106cbd59Smarkus
95652e712aeSniklas#
95752e712aeSniklas# #####################################################################
95844143af3Sderaadt# All configuration data below this point is not required as the example
95952e712aeSniklas# uses the predefined Main Mode transform and Quick Mode suite names.
96052e712aeSniklas# It is included here for completeness.  Note the default values for the
96152e712aeSniklas# [General] and [X509-certificates] sections just below.
96252e712aeSniklas# #####################################################################
96352e712aeSniklas#
96452e712aeSniklas
96552e712aeSniklas[General]
966447a9f3aShoPolicy-file=		/etc/isakmpd/isakmpd.policy
96752e712aeSniklasRetransmits=		3
96852e712aeSniklasExchange-max-time=	120
96952e712aeSniklas
970b57b191eSniklas# KeyNote credential storage
971b57b191eSniklas[KeyNote]
972b57b191eSniklasCredential-directory=	/etc/isakmpd/keynote/
973b57b191eSniklas
974fb1921ccSniklas# Certificates stored in PEM format
975fb1921ccSniklas[X509-certificates]
976fb1921ccSniklasCA-directory=           /etc/isakmpd/ca/
977fb1921ccSniklasCert-directory=         /etc/isakmpd/certs/
9789dbe9fb4ShoCRL-directory=		/etc/isakmpd/crls/
979954b1b31SniklasPrivate-key=		/etc/isakmpd/private/local.key
980fb1921ccSniklas
981419caefeSho# Default phase 1 description (Main Mode)
982419caefeSho
98335ff0956Sho[Default-phase-1-configuration]
984419caefeShoEXCHANGE_TYPE=		ID_PROT
985419caefeShoTransforms=		3DES-SHA
986419caefeSho
9872b81057dSniklas# Main mode transforms
9882b81057dSniklas######################
9892b81057dSniklas
9902b81057dSniklas# DES
9912040585eSniklas
9922040585eSniklas[DES-MD5]
9932040585eSniklasENCRYPTION_ALGORITHM=	DES_CBC
9942040585eSniklasHASH_ALGORITHM=		MD5
9952040585eSniklasAUTHENTICATION_METHOD=	PRE_SHARED
9962039fcadShoGROUP_DESCRIPTION=	MODP_1024
99760f440ccShoLife=			Default-phase-1-lifetime
9982040585eSniklas
9992b81057dSniklas[DES-SHA]
10002b81057dSniklasENCRYPTION_ALGORITHM=	DES_CBC
10012b81057dSniklasHASH_ALGORITHM=		SHA
10022b81057dSniklasAUTHENTICATION_METHOD=	PRE_SHARED
100360f440ccShoGROUP_DESCRIPTION=	MODP_1024
100460f440ccShoLife=			Default-phase-1-lifetime
10052b81057dSniklas
10062b81057dSniklas# 3DES
10072b81057dSniklas
10082b81057dSniklas[3DES-SHA]
10092b81057dSniklasENCRYPTION_ALGORITHM=	3DES_CBC
10102040585eSniklasHASH_ALGORITHM=		SHA
10112040585eSniklasAUTHENTICATION_METHOD=	PRE_SHARED
10122040585eSniklasGROUP_DESCRIPTION=	MODP_1024
101360f440ccShoLife=			Default-phase-1-lifetime
10142b81057dSniklas
1015a806508bShshoexer# AES
1016a806508bShshoexer
1017a806508bShshoexer[AES-SHA]
1018a806508bShshoexerENCRYPTION_ALGORITHM=	AES_CBC
1019a806508bShshoexerKEY_LENGTH=		128,128:256
1020a806508bShshoexerHASH_ALGORITHM=		SHA
1021a806508bShshoexerAUTHENTICATION_METHOD=	PRE_SHARED
1022a806508bShshoexerGROUP_DESCRIPTION=	MODP_1024
1023a806508bShshoexerLife=			Default-phase-1-lifetime
1024a806508bShshoexer
10252b81057dSniklas# Blowfish
10262b81057dSniklas
102760f440ccSho[BLF-SHA]
10282b81057dSniklasENCRYPTION_ALGORITHM=	BLOWFISH_CBC
10292b81057dSniklasKEY_LENGTH=		128,96:192
10302b81057dSniklasHASH_ALGORITHM=		SHA
10312b81057dSniklasAUTHENTICATION_METHOD=	PRE_SHARED
10322b81057dSniklasGROUP_DESCRIPTION=	MODP_1024
103360f440ccShoLife=			Default-phase-1-lifetime
10342040585eSniklas
103560f440ccSho# Blowfish, using DH group 4 (non-default)
10362040585eSniklas[BLF-SHA-EC185]
1037d70ca5f7SniklasENCRYPTION_ALGORITHM=	BLOWFISH_CBC
10382b81057dSniklasKEY_LENGTH=		128,96:192
10392040585eSniklasHASH_ALGORITHM=		SHA
10402040585eSniklasAUTHENTICATION_METHOD=	PRE_SHARED
10412040585eSniklasGROUP_DESCRIPTION=	EC2N_185
104260f440ccShoLife=			Default-phase-1-lifetime
10432040585eSniklas
10442b81057dSniklas# Quick mode protection suites
10452b81057dSniklas##############################
10462b81057dSniklas
10472b81057dSniklas# DES
10482040585eSniklas
1049d70ca5f7Sniklas[QM-ESP-DES-SUITE]
1050d70ca5f7SniklasProtocols=		QM-ESP-DES
1051d70ca5f7Sniklas
10522b81057dSniklas[QM-ESP-DES-PFS-SUITE]
10532b81057dSniklasProtocols=		QM-ESP-DES-PFS
10542b81057dSniklas
10552040585eSniklas[QM-ESP-DES-MD5-SUITE]
10562040585eSniklasProtocols=		QM-ESP-DES-MD5
10572040585eSniklas
10582b81057dSniklas[QM-ESP-DES-MD5-PFS-SUITE]
10592b81057dSniklasProtocols=		QM-ESP-DES-MD5-PFS
10602040585eSniklas
10612b81057dSniklas[QM-ESP-DES-SHA-SUITE]
10622b81057dSniklasProtocols=		QM-ESP-DES-SHA
10632040585eSniklas
10642b81057dSniklas[QM-ESP-DES-SHA-PFS-SUITE]
10652b81057dSniklasProtocols=		QM-ESP-DES-SHA-PFS
10662040585eSniklas
10672b81057dSniklas# 3DES
10682b81057dSniklas
10692b81057dSniklas[QM-ESP-3DES-SHA-SUITE]
10702b81057dSniklasProtocols=		QM-ESP-3DES-SHA
10712b81057dSniklas
10722b81057dSniklas[QM-ESP-3DES-SHA-PFS-SUITE]
10732b81057dSniklasProtocols=		QM-ESP-3DES-SHA-PFS
10742b81057dSniklas
1075bfc24386Sniklas# AES
1076bfc24386Sniklas
1077bfc24386Sniklas[QM-ESP-AES-SHA-SUITE]
1078bfc24386SniklasProtocols=              QM-ESP-AES-SHA
1079bfc24386Sniklas
108060f440ccSho[QM-ESP-AES-SHA-PFS-SUITE]
1081bfc24386SniklasProtocols=              QM-ESP-AES-SHA-PFS
1082bfc24386Sniklas
10832b81057dSniklas# AH
10842b81057dSniklas
10852b81057dSniklas[QM-AH-MD5-SUITE]
10862b81057dSniklasProtocols=		QM-AH-MD5
10872b81057dSniklas
10882b81057dSniklas[QM-AH-MD5-PFS-SUITE]
10892b81057dSniklasProtocols=		QM-AH-MD5-PFS
10902b81057dSniklas
109160f440ccSho# AH + ESP (non-default)
10922040585eSniklas
10932040585eSniklas[QM-AH-MD5-ESP-DES-SUITE]
10942040585eSniklasProtocols=		QM-AH-MD5,QM-ESP-DES
10952040585eSniklas
10962b81057dSniklas[QM-AH-MD5-ESP-DES-MD5-SUITE]
10972b81057dSniklasProtocols=		QM-AH-MD5,QM-ESP-DES-MD5
10982040585eSniklas
10992b81057dSniklas[QM-ESP-DES-MD5-AH-MD5-SUITE]
11002b81057dSniklasProtocols=		QM-ESP-DES-MD5,QM-AH-MD5
11012b81057dSniklas
11022b81057dSniklas# Quick mode protocols
11032b81057dSniklas
11042b81057dSniklas# DES
11052040585eSniklas
11062040585eSniklas[QM-ESP-DES]
11072040585eSniklasPROTOCOL_ID=		IPSEC_ESP
11082040585eSniklasTransforms=		QM-ESP-DES-XF
11092040585eSniklas
11102b81057dSniklas[QM-ESP-DES-MD5]
11112b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
11122b81057dSniklasTransforms=		QM-ESP-DES-MD5-XF
11132b81057dSniklas
11142b81057dSniklas[QM-ESP-DES-MD5-PFS]
11152b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
11162b81057dSniklasTransforms=		QM-ESP-DES-MD5-PFS-XF
11172b81057dSniklas
11182b81057dSniklas[QM-ESP-DES-SHA]
11192b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
11202b81057dSniklasTransforms=		QM-ESP-DES-SHA-XF
11212b81057dSniklas
11222b81057dSniklas# 3DES
11232b81057dSniklas
11242b81057dSniklas[QM-ESP-3DES-SHA]
11252b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
11262b81057dSniklasTransforms=		QM-ESP-3DES-SHA-XF
11272b81057dSniklas
11282b81057dSniklas[QM-ESP-3DES-SHA-PFS]
11292b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
11302b81057dSniklasTransforms=		QM-ESP-3DES-SHA-PFS-XF
11312b81057dSniklas
11322b81057dSniklas[QM-ESP-3DES-SHA-TRP]
11332b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
11342b81057dSniklasTransforms=		QM-ESP-3DES-SHA-TRP-XF
11352b81057dSniklas
1136bfc24386Sniklas# AES
1137bfc24386Sniklas
1138bfc24386Sniklas[QM-ESP-AES-SHA]
1139bfc24386SniklasPROTOCOL_ID=		IPSEC_ESP
1140bfc24386SniklasTransforms=		QM-ESP-AES-SHA-XF
1141bfc24386Sniklas
1142bfc24386Sniklas[QM-ESP-AES-SHA-PFS]
1143bfc24386SniklasPROTOCOL_ID=		IPSEC_ESP
1144bfc24386SniklasTransforms=		QM-ESP-AES-SHA-PFS-XF
1145bfc24386Sniklas
1146bfc24386Sniklas[QM-ESP-AES-SHA-TRP]
1147bfc24386SniklasPROTOCOL_ID=		IPSEC_ESP
1148bfc24386SniklasTransforms=		QM-ESP-AES-SHA-TRP-XF
1149bfc24386Sniklas
11502b81057dSniklas# AH MD5
11512b81057dSniklas
11522b81057dSniklas[QM-AH-MD5]
11532b81057dSniklasPROTOCOL_ID=		IPSEC_AH
11542b81057dSniklasTransforms=		QM-AH-MD5-XF
11552b81057dSniklas
11562b81057dSniklas[QM-AH-MD5-PFS]
11572b81057dSniklasPROTOCOL_ID=		IPSEC_AH
11582b81057dSniklasTransforms=		QM-AH-MD5-PFS-XF
11592b81057dSniklas
11602b81057dSniklas# Quick mode transforms
11612b81057dSniklas
11622b81057dSniklas# ESP DES+MD5
11632b81057dSniklas
11642040585eSniklas[QM-ESP-DES-XF]
11652040585eSniklasTRANSFORM_ID=		DES
11662040585eSniklasENCAPSULATION_MODE=	TUNNEL
116760f440ccShoLife=			Default-phase-2-lifetime
11682040585eSniklas
11692b81057dSniklas[QM-ESP-DES-MD5-XF]
11702b81057dSniklasTRANSFORM_ID=		DES
11712b81057dSniklasENCAPSULATION_MODE=	TUNNEL
11722b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_MD5
117360f440ccShoLife=			Default-phase-2-lifetime
11742b81057dSniklas
11752b81057dSniklas[QM-ESP-DES-MD5-PFS-XF]
11762b81057dSniklasTRANSFORM_ID=		DES
11772b81057dSniklasENCAPSULATION_MODE=	TUNNEL
11782039fcadShoGROUP_DESCRIPTION=	MODP_1024
11792b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_MD5
118060f440ccShoLife=			Default-phase-2-lifetime
11812b81057dSniklas
11822b81057dSniklas[QM-ESP-DES-SHA-XF]
11832b81057dSniklasTRANSFORM_ID=		DES
11842b81057dSniklasENCAPSULATION_MODE=	TUNNEL
11852b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
118660f440ccShoLife=			Default-phase-2-lifetime
11872b81057dSniklas
11882b81057dSniklas# 3DES
11892b81057dSniklas
11902b81057dSniklas[QM-ESP-3DES-SHA-XF]
11912b81057dSniklasTRANSFORM_ID=		3DES
11922b81057dSniklasENCAPSULATION_MODE=	TUNNEL
11932b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
119460f440ccShoLife=			Default-phase-2-lifetime
11952b81057dSniklas
11962b81057dSniklas[QM-ESP-3DES-SHA-PFS-XF]
11972b81057dSniklasTRANSFORM_ID=		3DES
11982b81057dSniklasENCAPSULATION_MODE=	TUNNEL
11992b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
12002b81057dSniklasGROUP_DESCRIPTION=	MODP_1024
120160f440ccShoLife=			Default-phase-2-lifetime
12022b81057dSniklas
12032b81057dSniklas[QM-ESP-3DES-SHA-TRP-XF]
12042b81057dSniklasTRANSFORM_ID=		3DES
12052b81057dSniklasENCAPSULATION_MODE=	TRANSPORT
12062b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
120760f440ccShoLife=			Default-phase-2-lifetime
12082b81057dSniklas
1209bfc24386Sniklas# AES
1210bfc24386Sniklas
1211bfc24386Sniklas[QM-ESP-AES-SHA-XF]
1212bfc24386SniklasTRANSFORM_ID=		AES
1213bfc24386SniklasENCAPSULATION_MODE=	TUNNEL
1214bfc24386SniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
1215a806508bShshoexerKEY_LENGTH=		128
121660f440ccShoLife=			Default-phase-2-lifetime
1217bfc24386Sniklas
1218bfc24386Sniklas[QM-ESP-AES-SHA-PFS-XF]
1219bfc24386SniklasTRANSFORM_ID=		AES
1220bfc24386SniklasENCAPSULATION_MODE=	TUNNEL
1221bfc24386SniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
1222bfc24386SniklasGROUP_DESCRIPTION=	MODP_1024
1223a806508bShshoexerKEY_LENGTH=		128
122460f440ccShoLife=			Default-phase-2-lifetime
1225bfc24386Sniklas
1226bfc24386Sniklas[QM-ESP-AES-SHA-TRP-XF]
1227bfc24386SniklasTRANSFORM_ID=		AES
1228bfc24386SniklasENCAPSULATION_MODE=	TRANSPORT
1229bfc24386SniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
1230a806508bShshoexerKEY_LENGTH=		128
123160f440ccShoLife=			Default-phase-2-lifetime
1232bfc24386Sniklas
12332b81057dSniklas# AH
12342b81057dSniklas
12352b81057dSniklas[QM-AH-MD5-XF]
12362b81057dSniklasTRANSFORM_ID=		MD5
12372b81057dSniklasENCAPSULATION_MODE=	TUNNEL
12382b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_MD5
123960f440ccShoLife=			Default-phase-2-lifetime
12402b81057dSniklas
12412b81057dSniklas[QM-AH-MD5-PFS-XF]
12422b81057dSniklasTRANSFORM_ID=		MD5
12432b81057dSniklasENCAPSULATION_MODE=	TUNNEL
12442039fcadShoGROUP_DESCRIPTION=	MODP_1024
124560f440ccShoLife=			Default-phase-2-lifetime
12462b81057dSniklas
124760f440ccSho[Sample-Life-Time]
12482b81057dSniklasLIFE_TYPE=		SECONDS
12492b81057dSniklasLIFE_DURATION=		3600,1800:7200
12502b81057dSniklas
125160f440ccSho[Sample-Life-Volume]
12522b81057dSniklasLIFE_TYPE=		KILOBYTES
12532b81057dSniklasLIFE_DURATION=		1000,768:1536
12542040585eSniklas.Ed
12552040585eSniklas.Sh SEE ALSO
1256b57b191eSniklas.Xr keynote 1 ,
1257ffa2dcb0Sjmc.Xr openssl 1 ,
1258dc89b21eSfgsch.Xr ipsec 4 ,
125930a2652aSniklas.Xr keynote 4 ,
126077725688Sniklas.Xr isakmpd.policy 5 ,
126110f11e23Sjmc.Xr isakmpd 8
1262830c32f9Shshoexer.Sh CAVEATS
1263830c32f9ShshoexerUsing aggressive mode is discouraged due to various design problems.
1264830c32f9ShshoexerIf your peer only supports aggressive mode, please consider replacing that
1265830c32f9Shshoexerpeer with a sane ISAKMP/IKE implementation.
1266830c32f9ShshoexerFor details see
1267830c32f9Shshoexer.Pa http://www.usenix.org/publications/login/1999-12/features/harmful.html .
1268d7401508Sho.Sh BUGS
1269d7401508ShoThe RFCs do not permit differing DH groups in the same proposal for
1270d7401508Shoaggressive and quick mode exchanges.
1271d7401508ShoMixing both PFS and non-PFS suites in a quick mode proposal is not possible,
1272d7401508Shoas PFS implies using a DH group.
1273