1*95f3b939Sjmc.\" $OpenBSD: isakmpd.conf.5,v 1.115 2006/06/11 00:20:36 jmc Exp $ 2e55ca143Sniklas.\" $EOM: isakmpd.conf.5,v 1.57 2000/12/21 14:43:17 ho Exp $ 32040585eSniklas.\" 444f0148dSniklas.\" Copyright (c) 1998, 1999, 2000 Niklas Hallqvist. All rights reserved. 54ca71560Sho.\" Copyright (c) 2000, 2001, 2002 H�kan Olsson. All rights reserved. 62040585eSniklas.\" 72040585eSniklas.\" Redistribution and use in source and binary forms, with or without 82040585eSniklas.\" modification, are permitted provided that the following conditions 92040585eSniklas.\" are met: 102040585eSniklas.\" 1. Redistributions of source code must retain the above copyright 112040585eSniklas.\" notice, this list of conditions and the following disclaimer. 122040585eSniklas.\" 2. Redistributions in binary form must reproduce the above copyright 132040585eSniklas.\" notice, this list of conditions and the following disclaimer in the 142040585eSniklas.\" documentation and/or other materials provided with the distribution. 152040585eSniklas.\" 162040585eSniklas.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 172040585eSniklas.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 182040585eSniklas.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 192040585eSniklas.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 202040585eSniklas.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 212040585eSniklas.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 222040585eSniklas.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 232040585eSniklas.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 242040585eSniklas.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 252040585eSniklas.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 262040585eSniklas.\" 272040585eSniklas.\" This code was written under funding by Ericsson Radio Systems. 282040585eSniklas.\" 292040585eSniklas.\" Manual page, using -mandoc macros 302040585eSniklas.\" 3172578f93Sho.Dd August 07, 2002 3258aefd4bSaaron.Dt ISAKMPD.CONF 5 332040585eSniklas.Os 342040585eSniklas.Sh NAME 352040585eSniklas.Nm isakmpd.conf 3658aefd4bSaaron.Nd configuration file for isakmpd 372040585eSniklas.Sh DESCRIPTION 3858aefd4bSaaron.Nm 3958aefd4bSaaronis the configuration file for the 40e407932bSjmc.Xr isakmpd 8 41ffa2dcb0Sjmcdaemon, managing security association and key management for the 4261d575f0SangelosIPsec layer of the kernel's networking stack. 432040585eSniklas.Pp 442040585eSniklasThe file is of a well known type of format called .INI style, named after 452040585eSniklasthe suffix used by an overrated windowing environment for its configuration 469615e1d4Saaronfiles. 479615e1d4SaaronThis format consists of sections, each beginning with a line looking like: 48ffa2dcb0Sjmc.Bd -unfilled 49ffa2dcb0Sjmc.Bq Sy Section name 502040585eSniklas.Ed 512040585eSniklasBetween the brackets is the name of the section following this section header. 522040585eSniklasInside a section many tag/value pairs can be stored, each one looking like: 53ffa2dcb0Sjmc.Bd -unfilled 54ffa2dcb0Sjmc.Ar Tag Ns = Ns Ar Value 552040585eSniklas.Ed 56ffa2dcb0SjmcIf the value needs more space than fits on a single line, it's possible to 57a2067f52Sniklascontinue it on the next by ending the first with a backslash character 589615e1d4Saaronimmediately before the newline character. 590e2d4717SkjellThis method can extend a value for an arbitrary number of lines. 602040585eSniklas.Pp 6158aefd4bSaaronComments can be put anywhere in the file by using a hash mark 6258aefd4bSaaron.Pq Sq \&# . 630e2d4717SkjellThe comment extends to the end of the current line. 642040585eSniklas.Pp 65c5fe6c4eSniklasOften the right-hand side values consist of other section names. 66c5fe6c4eSniklasThis results in a tree structure. 670e2d4717SkjellSome values are treated as a list of several scalar values. 680e2d4717SkjellSuch lists always use a comma character as the separator. 699615e1d4SaaronSome values are formatted like this: X,Y:Z, which 70c5fe6c4eSniklasis an offer/accept syntax, where X is a value we offer and Y:Z is a range of 71c5fe6c4eSniklasaccepted values, inclusive. 72c5fe6c4eSniklas.Pp 73bad0180eShoTo activate changes to 74bad0180eSho.Nm 75bad0180eShowithout restarting 76ffa2dcb0Sjmc.Xr isakmpd 8 , 774eb3dd62Sjmcsend a 784eb3dd62Sjmc.Dv SIGHUP 794eb3dd62Sjmcsignal to the daemon process. 80ffa2dcb0Sjmc.Sh AUTO-GENERATED PARTS OF THE CONFIGURATION 810e2d4717SkjellSome predefined section names are recognized by the daemon, avoiding the need 820e2d4717Skjellto fully specify the Main Mode transforms and Quick Mode suites, protocols, 8352e712aeSniklasand transforms. 8452e712aeSniklas.Pp 8552e712aeSniklasFor Main Mode: 86e8200b82Shshoexer.\" .Ar {DES,BLF,3DES,CAST,AES}-{MD5,SHA}[-GRP{1,2,5,14,15}][-RSA_SIG] 87ffa2dcb0Sjmc.Bl -inset -compact 88ffa2dcb0Sjmc.It Xo 89ffa2dcb0Sjmc.Sm off 90ffa2dcb0Sjmc.No { 91ffa2dcb0Sjmc.Ar DES , BLF , 3DES , CAST , AES 92ffa2dcb0Sjmc.No }-{ 93ffa2dcb0Sjmc.Ar MD5 , SHA 94ffa2dcb0Sjmc.No }[- 95ffa2dcb0Sjmc.Ar GRP 96ffa2dcb0Sjmc.No { 97e8200b82Shshoexer.Ar 1 , 2 , 5 , 14 , 15 98ffa2dcb0Sjmc.No }] 9977012c86Sjmc.No [- 10077012c86Sjmc.Ar RSA_SIG 10177012c86Sjmc.No ] 102ffa2dcb0Sjmc.Sm on 103ffa2dcb0Sjmc.Xc 104ffa2dcb0Sjmc.El 10552e712aeSniklas.Pp 10652e712aeSniklasFor Quick Mode: 107ffa2dcb0Sjmc.\" .Ar QM-{proto}[-TRP]-{cipher}[-{hash}][-PFS[-{group}]]-SUITE 108ffa2dcb0Sjmc.Bl -inset -compact 109ffa2dcb0Sjmc.It Xo 110ffa2dcb0Sjmc.Sm off 111ffa2dcb0Sjmc.Ar QM 112ffa2dcb0Sjmc.No -{ 113ffa2dcb0Sjmc.Ar proto 114ffa2dcb0Sjmc.No }[- 115ffa2dcb0Sjmc.Ar TRP 116ffa2dcb0Sjmc.No ]-{ 117ffa2dcb0Sjmc.Ar cipher 118ffa2dcb0Sjmc.No }[-{ 119ffa2dcb0Sjmc.Ar hash 120ffa2dcb0Sjmc.No }] 121ffa2dcb0Sjmc.No [- 122ffa2dcb0Sjmc.Ar PFS 123ffa2dcb0Sjmc.No [-{ 124ffa2dcb0Sjmc.Ar group 125ffa2dcb0Sjmc.No }]]- 126ffa2dcb0Sjmc.Ar SUITE 127ffa2dcb0Sjmc.Sm on 128ffa2dcb0Sjmc.Xc 129ffa2dcb0Sjmc.El 130ffa2dcb0Sjmc.Pp 131ffa2dcb0Sjmcwhere: 132ffa2dcb0Sjmc.Bl -tag -width "{cipher}" -offset indent -compact 133ffa2dcb0Sjmc.It Ns { Ns Ar proto Ns } 134ffa2dcb0Sjmcis either ESP or AH 135ffa2dcb0Sjmc.It Ns { Ns Ar cipher Ns } 136ffa2dcb0Sjmcis either DES, 3DES, CAST, BLF, or AES 137ffa2dcb0Sjmc.It Ns { Ns Ar hash Ns } 138ffa2dcb0Sjmcis either MD5, SHA, RIPEMD, or SHA2-{256,384,512} 139ffa2dcb0Sjmc.It Ns { Ns Ar group Ns } 140e8200b82Shshoexeris either GRP1, GRP2, GRP5, GRP14 or GRP15 141ffa2dcb0Sjmc.El 14252e712aeSniklas.Pp 1430e2d4717SkjellFor example, 3DES-SHA means: 3DES encryption, SHA hash, and authorization by 14452e712aeSniklaspre-shared keys. 1450e2d4717SkjellSimilarly, QM-ESP-3DES-SHA-PFS-SUITE means: ESP protocol, 3DES encryption, 14682184a41SjmcSHA hash, and use Perfect Forward Secrecy. 14752e712aeSniklas.Pp 148e8200b82ShshoexerUnless explicitly stated with -GRP1, 2, 5, 14 or 15, transforms and 149e8200b82ShshoexerPFS suites use DH group 2. 1504eb3dd62SjmcThere are currently no predefined ESP+AH Quick Mode suites. 15152e712aeSniklas.Pp 1522039fcadShoThe predefinitions include some default values for the special 153419caefeShosections "General", "Keynote", "X509-certificates", and 15435ff0956Sho"Default-phase-1-configuration". 155419caefeShoThese default values are presented in the example below. 15652e712aeSniklas.Pp 15752e712aeSniklasAll autogenerated values can be overridden by manual entries by using the 15852e712aeSniklassame section and tag names in the configuration file. 159b57b191eSniklasIn particular, the default phase 1 (Main or Aggressive Mode) and phase 2 160b57b191eSniklas(Quick Mode) lifetimes can be overridden by these tags under the "General" 161ffa2dcb0Sjmcsection: 162ffa2dcb0Sjmc.Bd -literal -offset indent 163b57b191eSniklas[General] 164b57b191eSniklasDefault-phase-1-lifetime= 3600,60:86400 165b57b191eSniklasDefault-phase-2-lifetime= 1200,60:86400 166b57b191eSniklas.Ed 1672039fcadSho.Pp 1682039fcadShoThe Main Mode lifetime currently defaults to one hour (minimum 60 1694eb3dd62Sjmcseconds, maximum 1 day). 1704eb3dd62SjmcThe Quick Mode lifetime defaults to 20 minutes 1714eb3dd62Sjmc(minimum 60 seconds, maximum 1 day). 17252e712aeSniklas.Pp 173ffa2dcb0SjmcAlso, the default phase 1 ID can be set by creating a 174ffa2dcb0Sjmc.Aq Sy Phase1-ID 1750378d1f2Sniklassection, as shown below, and adding this tag under the "General" 176ffa2dcb0Sjmcsection: 177ffa2dcb0Sjmc.Bd -literal -offset indent 1780378d1f2Sniklas[General] 1790378d1f2SniklasDefault-phase-1-ID= Phase1-ID-name 1800378d1f2Sniklas 1810378d1f2Sniklas[Phase1-ID-name] 1820378d1f2SniklasID-type= USER_FQDN 1830378d1f2SniklasName= foo@bar.com 1840378d1f2Sniklas.Ed 185ffa2dcb0Sjmc.Sh ROOTS 186ffa2dcb0Sjmc.Bl -hang -width 8n 187c00f6aafSjmc.It Bq Sy General 188c5fe6c4eSniklasGeneric global configuration parameters 189ffa2dcb0Sjmc.Bl -tag -width Ds 190e0eef2f9Shshoexer.It Em Acquire-Only 191e0eef2f9ShshoexerIf this tag is defined, 192ffa2dcb0Sjmc.Xr isakmpd 8 193e0eef2f9Shshoexerwill not set up flows automatically. 194e0eef2f9ShshoexerThis is useful when flows are configured with 1959fb8734eSjmc.Xr ipsecctl 8 196e0eef2f9Shshoexeror by other programs like 197e0eef2f9Shshoexer.Xr bgpd 8 . 198e0eef2f9ShshoexerThus 199ffa2dcb0Sjmc.Xr isakmpd 8 200e0eef2f9Shshoexeronly takes care of the SA establishment. 20135ff0956Sho.It Em Check-interval 202e0d722f1ShoThe interval between watchdog checks of connections we want up at all 2031ab51479Sclodertimes, in seconds. 2041ab51479ScloderThe default value is 60 seconds. 205e407932bSjmc.It Em Default-phase-1-ID 206e407932bSjmcOptional default phase 1 ID name. 207e407932bSjmc.It Em Default-phase-1-lifetime 208e407932bSjmcThe default lifetime for autogenerated transforms (phase 1). 209e407932bSjmcIf unspecified, the value 3600,60:86400 is used as the default. 210e407932bSjmc.It Em Default-phase-2-lifetime 211e407932bSjmcThe default lifetime for autogenerated suites (phase 2). 212e407932bSjmcIf unspecified, the value 1200,60:86400 is used as the default. 213e407932bSjmc.It Em Default-phase-2-suites 214e407932bSjmcA list of phase 2 suites that will be used when establishing dynamic 215e407932bSjmcSAs. 216e407932bSjmcIf left unspecified, QM-ESP-3DES-SHA-PFS-SUITE is used as the default. 217e0d722f1Sho.It Em DPD-check-interval 2181ab51479ScloderThe interval between RFC 3706 (Dead Peer Detection) messages, in seconds. 219e0d722f1ShoThe default value is 0 (zero), which means DPD is disabled. 22035ff0956Sho.It Em Exchange-max-time 22135ff0956ShoHow many seconds should an exchange maximally take to set up before we 22235ff0956Shogive up. 22335ff0956Sho.It Em Listen-on 224d39c0235ScloderA list of IP addresses or interface names OK to listen on. 22535ff0956ShoThis list is used as a filter for the set of addresses the interfaces 22635ff0956Shoconfigured provides. 22735ff0956ShoThis means that we won't see if an address given here does not exist 22835ff0956Shoon this host, and thus no error is given for that case. 2294e2ad344Shshoexer.It Em Loglevel 2304e2ad344ShshoexerA list of the form 2314e2ad344Shshoexer.Ar class Ns = Ns Ar level , 2324e2ad344Shshoexerwhere both 2334e2ad344Shshoexer.Ar class 2344e2ad344Shshoexerand 2354e2ad344Shshoexer.Ar level 2364e2ad344Shshoexerare numbers. 2374e2ad344ShshoexerThis is similar to the 2384e2ad344Shshoexer.Fl D 2394e2ad344Shshoexercommand line switch of 240ffa2dcb0Sjmc.Xr isakmpd 8 . 2414e2ad344Shshoexer.It Em Logverbose 2424e2ad344ShshoexerIf this tag is defined, whatever the value is, verbose logging is enabled. 2434e2ad344ShshoexerThis is similar to the 2444e2ad344Shshoexer.Fl v 245235cbc01Sjmccommand line switch of 246ffa2dcb0Sjmc.Xr isakmpd 8 . 2470b2bcfccSho.It Em NAT-T-Keepalive 2480b2bcfccShoThe number of seconds between NAT-T keepalive messages, sent by the 249d4c8cd14Sjmcpeer behind NAT to keep the mapping active. 250d4c8cd14SjmcDefaults to 20. 251447a9f3aSho.It Em Policy-file 25280c8b3dbSniklasThe name of the file that contains 2531215c700Sjmc.Xr keynote 4 2544aac73a4Saaronpolicies. 255ffa2dcb0SjmcThe default is 256ffa2dcb0Sjmc.Pa /etc/isakmpd/isakmpd.policy . 2570b880a72Sho.It Em Pubkey-directory 2580b880a72ShoThe directory in which 2590b880a72Sho.Nm 260ac1aa35bSmpechlooks for explicitly trusted public keys. 261ffa2dcb0SjmcThe default is 262ffa2dcb0Sjmc.Pa /etc/isakmpd/pubkeys . 263ac1aa35bSmpechRead 2640b880a72Sho.Xr isakmpd 8 2650b880a72Shofor the required naming convention of the files in here. 2664d27bb0fSho.It Em Renegotiate-on-HUP 2674d27bb0fShoIf this tag is defined, whatever the value is, 268ffa2dcb0Sjmc.Xr isakmpd 8 2694eb3dd62Sjmcwill renegotiate all current phase 2 SAs when the daemon receives a 2704eb3dd62Sjmc.Dv SIGHUP 2714eb3dd62Sjmcsignal, or an 2724eb3dd62Sjmc.Sq R 2734eb3dd62Sjmcis sent to the FIFO interface (see 2744d27bb0fSho.Xr isakmpd 8 ) . 27535ff0956Sho.It Em Retransmits 27635ff0956ShoHow many times should a message be retransmitted before giving up. 27735ff0956Sho.It Em Shared-SADB 27835ff0956ShoIf this tag is defined, whatever the value is, some semantics of 27935ff0956Sho.Nm 28035ff0956Shoare changed so that multiple instances can run on top of one SADB 28135ff0956Shoand set up SAs with each other. 28235ff0956ShoSpecifically this means replay 28335ff0956Shoprotection will not be asked for, and errors that can occur when 28435ff0956Shoupdating an SA with its parameters a 2nd time will be ignored. 285e0eef2f9Shshoexer.It Em Use-Keynote 286e0eef2f9ShshoexerThis tag controls the use of 287e0eef2f9Shshoexer.Xr keynote 4 288e0eef2f9Shshoexerpolicy checking. 289e0eef2f9ShshoexerThe default value is 290e0eef2f9Shshoexer.Qq yes , 291e0eef2f9Shshoexerwhich enables the policy checking. 292e0eef2f9ShshoexerWhen set to any other value, policies will not be checked. 2937a9bba63SjmcThis is useful when policies for flows and SA establishment are arranged by 294e0eef2f9Shshoexerother programs like 295937c2feaSderaadt.Xr ipsecctl 8 296e0eef2f9Shshoexeror 297e0eef2f9Shshoexer.Xr bgpd 8 . 298b4f8e7c2Shshoexer.It Em Delete-SAs 299*95f3b939SjmcThis tag controls whether 300b4f8e7c2Shshoexer.Xr isakmpd 8 301b4f8e7c2Shshoexerdeletes SAs on shutdown or not. 302b4f8e7c2ShshoexerThe default value is 303b4f8e7c2Shshoexer.Qq no . 304c5fe6c4eSniklas.El 305c00f6aafSjmc.It Bq Sy Phase 1 306c5fe6c4eSniklasISAKMP SA negotiation parameter root 307ffa2dcb0Sjmc.Bl -tag -width Ds 308cc3c8b42Sniklas.It Em Default 309ac1aa35bSmpechA name of the default ISAKMP peer. 310ffa2dcb0SjmcIncoming phase 1 connections from other IP addresses will use this peer name. 3119615e1d4SaaronThis name is used as the section name for further information to be found. 312ffa2dcb0SjmcLook at 313ffa2dcb0Sjmc.Aq Sy ISAKMP-peer 314ffa2dcb0Sjmcbelow. 315e407932bSjmc.It Aq Em IP-address 316e407932bSjmcA name of the ISAKMP peer at the given IP address. 317c5fe6c4eSniklas.El 318c00f6aafSjmc.It Bq Sy Phase 2 319c5fe6c4eSniklasIPsec SA negotiation parameter root 320ffa2dcb0Sjmc.Bl -tag -width Ds 321c5fe6c4eSniklas.It Em Connections 32261d575f0SangelosA list of directed IPsec "connection" names that should be brought up 3232ddc24cbSniklasautomatically, either on first use if the system supports it, or at 3249615e1d4Saaronstartup of the daemon. 3259615e1d4SaaronThese names are section names where further information can be found. 326ffa2dcb0SjmcLook at 327ffa2dcb0Sjmc.Aq Sy IPsec-connection 328ffa2dcb0Sjmcbelow. 32944143af3SderaadtNormally any connections mentioned here are treated as part of the 330ffa2dcb0Sjmc"Passive-connection" list we present below; however there is a flag, 331ffa2dcb0Sjmc.Em Active-only , 332ffa2dcb0Sjmcthat disables this behaviour. 333ffa2dcb0SjmcThis too is mentioned in the 334ffa2dcb0Sjmc.Aq Sy IPsec-connection 335ffa2dcb0Sjmcsection, in the "Flags" tag. 33680baf197Sniklas.It Em Passive-connections 33761d575f0SangelosA list of IPsec "connection" names we recognize and accept initiations for. 3389615e1d4SaaronThese names are section names where further information can be found. 339ffa2dcb0SjmcLook at 340ffa2dcb0Sjmc.Aq Sy IPsec-connection 341ffa2dcb0Sjmcbelow. 3429615e1d4SaaronCurrently only the Local-ID and Remote-ID tags 34380baf197Sniklasare looked at in those sections, as they are matched against the IDs given 34480baf197Sniklasby the initiator. 345c5fe6c4eSniklas.El 346c00f6aafSjmc.It Bq Sy KeyNote 347c00f6aafSjmcKeyNote configuration section 348ffa2dcb0Sjmc.Bl -tag -width Ds 349b57b191eSniklas.It Em Credential-directory 350b57b191eSniklasA directory containing directories named after IDs (IP 3514eb3dd62Sjmcaddresses, 3524eb3dd62Sjmc.Dq user@domain , 3534eb3dd62Sjmcor hostnames) that contain files named 3544eb3dd62Sjmc.Dq credentials 3554eb3dd62Sjmcand 3564eb3dd62Sjmc.Dq private_key . 357b57b191eSniklas.Pp 358b57b191eSniklasThe credentials file contains 359b57b191eSniklas.Xr keynote 4 360b57b191eSniklascredentials that are sent to a remote IKE daemon when we use the 361b57b191eSniklasassociated ID, or credentials that we may want to consider when doing 362ac1aa35bSmpechan exchange with a remote IKE daemon that uses that ID. 363ac1aa35bSmpechNote that, in the former case, the last credential in the file 364ac1aa35bSmpechMUST contain our public key in its Licensees field. 365ac1aa35bSmpechMore than one credentials may exist in the file. 366ac1aa35bSmpechThey are separated by whitelines (the format is essentially the same as 367ac1aa35bSmpechthat of the policy file). 368ac1aa35bSmpechThe credentials are of the same format as the policies described in 369b57b191eSniklas.Xr isakmpd.policy 5 . 370b57b191eSniklasThe only difference is that the Authorizer field contains a public 371ac1aa35bSmpechkey, and the assertion is signed. 372ac1aa35bSmpechSigned assertions can be generated using the 373b57b191eSniklas.Xr keynote 1 374b57b191eSniklasutility. 375b57b191eSniklas.Pp 376b57b191eSniklasThe private_key file contains the private RSA key we use for 377ac1aa35bSmpechauthentication. 378ac1aa35bSmpechIf the directory (and the files) exist, they take precedence over X509-based 379ac1aa35bSmpechauthentication. 380b57b191eSniklas.El 381c00f6aafSjmc.It Bq Sy X509-Certificates 382c00f6aafSjmcX509-certificate configuration section 383ffa2dcb0Sjmc.Bl -tag -width Ds 38435ff0956Sho.It Em Accept-self-signed 38535ff0956ShoIf this tag is defined, whatever the value is, certificates that 38635ff0956Shodo not originate from a trusted CA but are self-signed will be 38735ff0956Shoaccepted. 388fb1921ccSniklas.It Em Ca-directory 389fb1921ccSniklasA directory containing PEM certificates of certification authorities 390ac1aa35bSmpechthat we trust to sign other certificates. 391ac1aa35bSmpechNote that for a CA to be really trusted, it needs to be somehow 392ac1aa35bSmpechreferred to by policy, in 393e5814869Sangelos.Xr isakmpd.policy 5 . 394e5814869SangelosThe certificates in this directory are used for the actual X.509 395e5814869Sangelosauthentication and for cross-referencing policies that refer to 396ac1aa35bSmpechDistinguished Names (DNs). 397ac1aa35bSmpechKeeping a separate directory (as opposed to integrating policies 398ac1aa35bSmpechand X.509 CA certificates) allows for maintenance of a list of 399ac1aa35bSmpech"well known" CAs without actually having to trust all (or any) of them. 400fb1921ccSniklas.It Em Cert-directory 401fb1921ccSniklasA directory containing PEM certificates that we trust to be valid. 402fb1921ccSniklasThese certificates are used in preference to those passed in messages and 4030e2d4717Skjellare required to have a subjectAltName extension containing the certificate 40491d5cfbaShshoexerholder identity; usually IP address, FQDN, or User FQDN. 405954b1b31Sniklas.It Em Private-key 406954b1b31SniklasThe private key matching the public key of our certificate (which should be 4070e2d4717Skjellin the "Cert-directory", and have an appropriate subjectAltName field). 408db26b2b9Smsf.It Em Private-key-directory 409db26b2b9SmsfA directory containing private keys named after an ID (IP addresses, 410db26b2b9Smsf.Dq user@domain , 411*95f3b939Sjmcor hostnames). 412fb1921ccSniklas.El 413c5fe6c4eSniklas.El 414ffa2dcb0Sjmc.Sh REFERRED-TO SECTIONS 415ffa2dcb0Sjmc.Bl -hang -width Ds 416ffa2dcb0Sjmc.It Aq Sy ISAKMP-peer 417c5fe6c4eSniklasParameters for negotiation with an ISAKMP peer 418ffa2dcb0Sjmc.Bl -tag -width Ds 419c5fe6c4eSniklas.It Em Address 420ffa2dcb0SjmcIf existent, the IP address of the peer. 421e407932bSjmc.It Em Authentication 422e407932bSjmcIf existent, authentication data for this specific peer. 423e407932bSjmcIn the case of a pre-shared key, this is the key value itself. 424c5fe6c4eSniklas.It Em Configuration 4259615e1d4SaaronThe name of the ISAKMP-configuration section to use. 426ffa2dcb0SjmcLook at 427ffa2dcb0Sjmc.Aq Sy ISAKMP-configuration 428ffa2dcb0Sjmcbelow. 42935ff0956ShoIf unspecified, defaults to "Default-phase-1-configuration". 430e407932bSjmc.It Em Flags 431e407932bSjmcA comma-separated list of flags controlling the further 432e407932bSjmchandling of the ISAKMP SA. 433e407932bSjmcCurrently there are no specific ISAKMP SA flags defined. 4346a8478f3Sniklas.It Em ID 4356a8478f3SniklasIf existent, the name of the section that describes the 4364aac73a4Saaronlocal client ID that we should present to our peer. 4374aac73a4SaaronIf not present, it 4386a8478f3Sniklasdefaults to the address of the local interface we are sending packets 4394aac73a4Saaronover to the remote daemon. 440ffa2dcb0SjmcLook at 441ffa2dcb0Sjmc.Aq Sy Phase1-ID 442ffa2dcb0Sjmcbelow. 443e407932bSjmc.It Em Local-address 444e407932bSjmcThe Local IP address to use, if we are multi-homed, or have aliases. 445e407932bSjmc.It Em Phase 446e407932bSjmcThe constant 447e407932bSjmc.Sq 1 , 448e407932bSjmcas ISAKMP-peers and IPsec-connections 449e407932bSjmcreally are handled by the same code inside 450e407932bSjmc.Xr isakmpd 8 . 451e407932bSjmc.It Em Port 452e407932bSjmcFor UDP, the UDP port number to send to. 453e407932bSjmcThis is optional; 454e407932bSjmcthe default value is 500 which is the IANA-registered number for ISAKMP. 455a2067f52Sniklas.It Em Remote-ID 456a2067f52SniklasIf existent, the name of the section that describes the remote client 457a2067f52SniklasID we expect the remote daemon to send us. 458a2067f52SniklasIf not present, it defaults to the address of the remote daemon. 459ffa2dcb0SjmcLook at 460ffa2dcb0Sjmc.Aq Sy Phase1-ID 461ffa2dcb0Sjmcbelow. 462e407932bSjmc.It Em Transport 463e407932bSjmcThe name of the transport protocol; defaults to UDP. 464c5fe6c4eSniklas.El 465ffa2dcb0Sjmc.It Aq Sy Phase1-ID 466c00f6aafSjmcParameters for Phase 1 negotiation 467ffa2dcb0Sjmc.Bl -tag -width Ds 468e407932bSjmc.It Em Address 469e407932bSjmcIf the ID-type is 470e407932bSjmc.Li IPV4_ADDR 471e407932bSjmcor 472e407932bSjmc.Li IPV6_ADDR , 473e407932bSjmcthis tag should exist and be an IP address. 4746a8478f3Sniklas.It Em ID-type 475d8ca7c44ShoThe ID type as given by the RFC specifications. 47635ff0956ShoFor phase 1 this is currently 4776a8478f3Sniklas.Li IPV4_ADDR , 4786a8478f3Sniklas.Li IPV4_ADDR_SUBNET , 479d8ca7c44Sho.Li IPV6_ADDR , 480d8ca7c44Sho.Li IPV6_ADDR_SUBNET , 4816a8478f3Sniklas.Li FQDN , 482ffa2dcb0Sjmc.Li USER_FQDN , 4836a8478f3Sniklasor 4845bc978dfSangelos.Li KEY_ID . 4856a8478f3Sniklas.It Em Name 4866a8478f3SniklasIf the ID-type is 4875bc978dfSangelos.Li FQDN , 488ffa2dcb0Sjmc.Li USER_FQDN , 4895bc978dfSangelosor 4905bc978dfSangelos.Li KEY_ID , 4915bc978dfSangelosthis tag should exist and contain a domain name, user@domain, or 4925bc978dfSangelosother identifying string respectively. 4933f167ca4Sangelos.Pp 4943f167ca4SangelosIn the case of 4953f167ca4Sangelos.Li KEY_ID , 4963f167ca4Sangelosnote that the IKE protocol allows any octet sequence to be sent or 4973f167ca4Sangelosreceived under this payload, potentially including non-printable 4983f167ca4Sangelosones. 4991215c700Sjmc.Xr isakmpd 8 5003f167ca4Sangeloscan only transmit printable 5013f167ca4Sangelos.Li KEY_ID 5023f167ca4Sangelospayloads, but can receive and process arbitrary 5033f167ca4Sangelos.Li KEY_ID 5043f167ca4Sangelospayloads. 5053f167ca4SangelosThis effectively means that non-printable 5063f167ca4Sangelos.Li KEY_ID 5073f167ca4Sangelosremote identities cannot be verified through this means, although it 5083f167ca4Sangelosis still possible to do so through 5093f167ca4Sangelos.Xr isakmpd.policy 5 . 510e407932bSjmc.It Em Netmask 511e407932bSjmcIf the ID-type is 512e407932bSjmc.Li IPV4_ADDR_SUBNET 513e407932bSjmcor 514e407932bSjmc.Li IPV6_ADDR_SUBNET , 515e407932bSjmcthis tag should exist and 516e407932bSjmcbe a network subnet mask. 517e407932bSjmc.It Em Network 518e407932bSjmcIf the ID-type is 519e407932bSjmc.Li IPV4_ADDR_SUBNET 520e407932bSjmcor 521e407932bSjmc.Li IPV6_ADDR_SUBNET , 522e407932bSjmcthis tag should exist and 523e407932bSjmcbe a network address. 5246a8478f3Sniklas.El 525ffa2dcb0Sjmc.It Aq Sy ISAKMP-configuration 526c00f6aafSjmcParameters for ISAKMP configuration 527ffa2dcb0Sjmc.Bl -tag -width Ds 528c5fe6c4eSniklas.It Em DOI 5299615e1d4SaaronThe domain of interpretation as given by the RFCs. 5309615e1d4SaaronNormally 531c5fe6c4eSniklas.Li IPSEC . 532b57b191eSniklasIf unspecified, defaults to 533b57b191eSniklas.Li IPSEC . 534c5fe6c4eSniklas.It Em EXCHANGE_TYPE 5359615e1d4SaaronThe exchange type as given by the RFCs. 5369615e1d4SaaronFor main mode this is 5379f078bd8Sniklas.Li ID_PROT 5389f078bd8Sniklasand for aggressive mode it is 5399f078bd8Sniklas.Li AGGRESSIVE . 540c5fe6c4eSniklas.It Em Transforms 541c5fe6c4eSniklasA list of proposed transforms to use for protecting the 5429615e1d4SaaronISAKMP traffic. 5439615e1d4SaaronThese are actually names for sections 5449615e1d4Saaronfurther describing the transforms. 545ffa2dcb0SjmcLook at 546ffa2dcb0Sjmc.Aq Sy ISAKMP-transform 547ffa2dcb0Sjmcbelow. 548c5fe6c4eSniklas.El 549ffa2dcb0Sjmc.It Aq Sy ISAKMP-transform 550c00f6aafSjmcParameters for ISAKMP authentication 551ffa2dcb0Sjmc.Bl -tag -width Ds 552e407932bSjmc.It Em AUTHENTICATION_METHOD 553e407932bSjmcThe authentication method as the RFCs name it, or ANY. 554c5fe6c4eSniklas.It Em ENCRYPTION_ALGORITHM 555850f7173SniklasThe encryption algorithm as the RFCs name it, or ANY to denote that any 556850f7173Sniklasencryption algorithm proposed will be accepted. 557c5fe6c4eSniklas.It Em GROUP_DESCRIPTION 5589615e1d4SaaronThe group used for Diffie-Hellman exponentiations, or ANY. 55944143af3SderaadtThe names are symbolic, like 560ffa2dcb0Sjmc.Li MODP_768 , MODP_1024 , EC_155 , 561c5fe6c4eSniklasand 562c5fe6c4eSniklas.Li EC_185 . 563e407932bSjmc.It Em HASH_ALGORITHM 564e407932bSjmcThe hash algorithm as the RFCs name it, or ANY. 565e407932bSjmc.It Em KEY_LENGTH 566e407932bSjmcFor encryption algorithms with variable key length, this is 567e407932bSjmcwhere the offered/accepted keylengths are described. 568e407932bSjmcThe value is of the offer-accept kind described above. 569c5fe6c4eSniklas.It Em Life 5704aac73a4SaaronA list of lifetime descriptions, or ANY. 5714aac73a4SaaronIn the former case, each 572850f7173Sniklaselement is in itself a name of the section that defines the lifetime. 573ffa2dcb0SjmcLook at 574ffa2dcb0Sjmc.Aq Sy Lifetime 575ffa2dcb0Sjmcbelow. 5764aac73a4SaaronIf it is set to ANY, then any type of 577850f7173Sniklasproposed lifetime type and value will be accepted. 578e407932bSjmc.It Em PRF 579e407932bSjmcThe algorithm to use for the keyed pseudo-random function (used for key 580e407932bSjmcderivation and authentication in phase 1), or ANY. 581c5fe6c4eSniklas.El 582ffa2dcb0Sjmc.It Aq Sy Lifetime 583c00f6aafSjmcParameters for connection duration 584ffa2dcb0Sjmc.Bl -tag -width Ds 585e407932bSjmc.It Em LIFE_DURATION 586e407932bSjmcAn offer/accept kind of value; see above. 587e407932bSjmcCan also be set to ANY. 588c5fe6c4eSniklas.It Em LIFE_TYPE 589c5fe6c4eSniklas.Li SECONDS 590c5fe6c4eSniklasor 591e55ca143Sniklas.Li KILOBYTES 5924aac73a4Saarondepending on the type of the duration. 5934aac73a4SaaronNotice that this field may NOT be set to ANY. 594c5fe6c4eSniklas.El 595ffa2dcb0Sjmc.It Aq Sy IPsec-connection 596c00f6aafSjmcParameters for IPsec connection configuration 597ffa2dcb0Sjmc.Bl -tag -width Ds 598c5fe6c4eSniklas.It Em Configuration 59961d575f0SangelosThe name of the IPsec-configuration section to use. 600ffa2dcb0SjmcLook at 601ffa2dcb0Sjmc.Aq Sy IPsec-configuration 602ffa2dcb0Sjmcbelow. 60313a99464Sniklas.It Em Flags 60413a99464SniklasA comma-separated list of flags controlling the further 60561d575f0Sangeloshandling of the IPsec SA. 6069615e1d4SaaronCurrently only one flag is defined: 60780baf197Sniklas.Bl -tag -width 12n 60880baf197Sniklas.It Em Active-only 609ffa2dcb0SjmcIf this flag is given and this 610ffa2dcb0Sjmc.Aq Sy IPsec-connection 611ffa2dcb0Sjmcis part of the phase 2 61280baf197Sniklasconnections we automatically keep up, it will not automatically be used for 61380baf197Sniklasaccepting connections from the peer. 61480baf197Sniklas.El 615e407932bSjmc.It Em ISAKMP-peer 616604faeecSjmcThe name of the ISAKMP-peer to talk to in order to 617e407932bSjmcset up this connection. 618e407932bSjmcThe value is the name of an 619e407932bSjmc.Aq Sy ISAKMP-peer 620e407932bSjmcsection. 621e407932bSjmcSee above. 622e407932bSjmc.It Em Local-ID 623e407932bSjmcIf existent, the name of the section that describes the 624e407932bSjmcoptional local client ID that we should present to our peer. 625e407932bSjmcIt is also used when we act as responders to find out what 626e407932bSjmc.Aq Sy IPsec-connection 627e407932bSjmcwe are dealing with. 628e407932bSjmcLook at 629e407932bSjmc.Aq Sy IPsec-ID 630e407932bSjmcbelow. 631e407932bSjmc.It Em Phase 632e407932bSjmcThe constant 633e407932bSjmc.Sq 2 , 634e407932bSjmcas ISAKMP-peers and IPsec-connections 635e407932bSjmcreally are handled by the same code inside 636e407932bSjmc.Xr isakmpd 8 . 637e407932bSjmc.It Em Remote-ID 638e407932bSjmcIf existent, the name of the section that describes the 639e407932bSjmcoptional remote client ID that we should present to our peer. 640e407932bSjmcIt is also used when we act as responders to find out what 641e407932bSjmc.Aq Sy IPsec-connection 642e407932bSjmcwe are dealing with. 643e407932bSjmcLook at 644e407932bSjmc.Aq Sy IPsec-ID 645e407932bSjmcbelow. 646c5fe6c4eSniklas.El 647ffa2dcb0Sjmc.It Aq Sy IPsec-configuration 648c00f6aafSjmcParameters for IPsec configuration 649ffa2dcb0Sjmc.Bl -tag -width Ds 650c5fe6c4eSniklas.It Em DOI 6519615e1d4SaaronThe domain of interpretation as given by the RFCs. 6529615e1d4SaaronNormally 653c5fe6c4eSniklas.Li IPSEC . 654b57b191eSniklasIf unspecified, defaults to 655b57b191eSniklas.Li IPSEC . 656c5fe6c4eSniklas.It Em EXCHANGE_TYPE 6579615e1d4SaaronThe exchange type as given by the RFCs. 6589615e1d4SaaronFor quick mode this is 659c5fe6c4eSniklas.Li QUICK_MODE . 660c5fe6c4eSniklas.It Em Suites 6613b2a0cf1SaaronA list of protection suites (bundles of protocols) usable for 6629615e1d4Saaronprotecting the IP traffic. 663ffa2dcb0SjmcEach of the list elements is a name of an 664ffa2dcb0Sjmc.Aq Sy IPsec-suite 6659615e1d4Saaronsection. 6669615e1d4SaaronSee below. 667c5fe6c4eSniklas.El 668ffa2dcb0Sjmc.It Aq Sy IPsec-suite 669c00f6aafSjmcParameters for IPsec protection suite configuration 670ffa2dcb0Sjmc.Bl -tag -width Ds 671ffa2dcb0Sjmc.It Em Protocols 672ffa2dcb0SjmcA list of the protocols included in this protection suite. 673ffa2dcb0SjmcEach of the list elements is a name of an 674ffa2dcb0Sjmc.Aq Sy IPsec-protocol 675ffa2dcb0Sjmcsection. 676ffa2dcb0SjmcSee below. 677ffa2dcb0Sjmc.El 678ffa2dcb0Sjmc.It Aq Sy IPsec-protocol 679c00f6aafSjmcParameters for IPsec protocol configuration 680ffa2dcb0Sjmc.Bl -tag -width Ds 681c5fe6c4eSniklas.It Em PROTOCOL_ID 6829615e1d4SaaronThe protocol as given by the RFCs. 683ffa2dcb0SjmcAcceptable values are currently 684c5fe6c4eSniklas.Li IPSEC_AH 685c5fe6c4eSniklasand 686c5fe6c4eSniklas.Li IPSEC_ESP . 687e407932bSjmc.It Em ReplayWindow 688e407932bSjmcThe size of the window used for replay protection. 689e407932bSjmcThis is normally left alone. 690e407932bSjmcLook at the ESP and AH RFCs for a better description. 691c5fe6c4eSniklas.It Em Transforms 6923b2a0cf1SaaronA list of transforms usable for implementing the protocol. 693ffa2dcb0SjmcEach of the list elements is a name of an 694ffa2dcb0Sjmc.Aq Sy IPsec-transform 6959615e1d4Saaronsection. 6969615e1d4SaaronSee below. 697c5fe6c4eSniklas.El 698ffa2dcb0Sjmc.It Aq Sy IPsec-transform 699c00f6aafSjmcParameters for IPsec transform configuration 700ffa2dcb0Sjmc.Bl -tag -width Ds 701c5fe6c4eSniklas.It Em AUTHENTICATION_ALGORITHM 702c5fe6c4eSniklasThe optional authentication algorithm in the case of this 703c5fe6c4eSniklasbeing an ESP transform. 704e407932bSjmc.It Em ENCAPSULATION_MODE 705e407932bSjmcThe encapsulation mode as given by the RFCs. 706e407932bSjmcThis means TRANSPORT or TUNNEL. 707c5fe6c4eSniklas.It Em GROUP_DESCRIPTION 708c5fe6c4eSniklasAn optional (provides PFS if present) Diffie-Hellman group 7099615e1d4Saarondescription. 710ffa2dcb0SjmcThe values are the same as those for GROUP_DESCRIPTION in 711ffa2dcb0Sjmc.Aq Sy ISAKMP-transform 712ffa2dcb0Sjmcsections shown above. 713a806508bShshoexer.It Em KEY_LENGTH 714a806508bShshoexerFor encryption algorithms with variable key length, this is 715a806508bShshoexerwhere the offered keylength is described. 716c5fe6c4eSniklas.It Em Life 717ffa2dcb0SjmcList of lifetimes, each element is a 718ffa2dcb0Sjmc.Aq Sy Lifetime 719ffa2dcb0Sjmcsection name. 720e407932bSjmc.It Em TRANSFORM_ID 721e407932bSjmcThe transform ID as given by the RFCs. 722c5fe6c4eSniklas.El 723ffa2dcb0Sjmc.It Aq Sy IPsec-ID 724c00f6aafSjmcParameters for IPsec ID configuration 725ffa2dcb0Sjmc.Bl -tag -width Ds 726c5fe6c4eSniklas.It Em Address 727c5fe6c4eSniklasIf the ID-type is 728d8ca7c44Sho.Li IPV4_ADDR 729d8ca7c44Shoor 730ffa2dcb0Sjmc.Li IPV6_ADDR , 731ffa2dcb0Sjmcthis tag should exist and be an IP address, an interface name, or the 732e3283cbfSmcbride.Em default 733e3283cbfSmcbridekeyword. 734e3283cbfSmcbrideIf an interface is used, the first address of the appropriate 735e3283cbfSmcbridefamily will be used. 736e3283cbfSmcbrideThe 737e3283cbfSmcbride.Em default 738e3283cbfSmcbridekeyword uses the interface associated with the default route. 739ffa2dcb0SjmcIn the case of IPv6, link-local addresses will be skipped if 740e3283cbfSmcbrideaddresses which are not link-local exist. 741e3283cbfSmcbrideIf the address on the interface changes 742ffa2dcb0Sjmc.Xr isakmpd 8 743e3283cbfSmcbridewill not track the change. 744e3283cbfSmcbrideThe configuration must be reloaded to learn the new address. 745e407932bSjmc.It Em ID-type 746e407932bSjmcThe ID type as given by the RFCs. 747e407932bSjmcFor IPsec this is currently 748e407932bSjmc.Li IPV4_ADDR , 749e407932bSjmc.Li IPV6_ADDR , 750e407932bSjmc.Li IPV4_ADDR_SUBNET , 751d8ca7c44Shoor 752e407932bSjmc.Li IPV6_ADDR_SUBNET . 753c5fe6c4eSniklas.It Em Netmask 754c5fe6c4eSniklasIf the ID-type is 755c5fe6c4eSniklas.Li IPV4_ADDR_SUBNET 756d8ca7c44Shoor 757ffa2dcb0Sjmc.Li IPV6_ADDR_SUBNET , 758c5fe6c4eSniklasthis tag should exist and 759e3283cbfSmcbridebe a network subnet mask or an interface. 760ffa2dcb0SjmcWhen an interface is specified, the netmask is the mask associated with the 761e3283cbfSmcbride.Em Network . 762e3283cbfSmcbrideThe 763e3283cbfSmcbride.Em default 764e3283cbfSmcbridekeyword uses the interface associated with the default route. 765e407932bSjmc.It Em Network 7660378d1f2SniklasIf the ID-type is 767e407932bSjmc.Li IPV4_ADDR_SUBNET 768d8ca7c44Shoor 769ffa2dcb0Sjmc.Li IPV6_ADDR_SUBNET , 770e407932bSjmcthis tag should exist and be a network address, an interface, or the 771e407932bSjmc.Em default 772e407932bSjmckeyword. 773e407932bSjmcWhen an interface is specified, the network is selected as with the 774e407932bSjmc.Em Address 775e407932bSjmctag. 7760378d1f2Sniklas.It Em Port 7770378d1f2SniklasIf the ID-type is 778d8ca7c44Sho.Li IPV4_ADDR , 7790378d1f2Sniklas.Li IPV4_ADDR_SUBNET , 780ffa2dcb0Sjmc.Li IPV6_ADDR , 781d8ca7c44Shoor 782ffa2dcb0Sjmc.Li IPV6_ADDR_SUBNET , 7830378d1f2Sniklasthis tag indicates what source or destination port is allowed to be 7840378d1f2Sniklastransported over the SA (depending on whether this is a local or 7850378d1f2Sniklasremote ID). 7860378d1f2SniklasIf left unspecified, all ports of the given transport protocol 7870378d1f2Sniklaswill be transmitted (or permitted) over the SA. 788ffa2dcb0SjmcThe 789ffa2dcb0Sjmc.Em Protocol 790ffa2dcb0Sjmctag must be specified in conjunction with this tag. 791e407932bSjmc.It Em Protocol 792e407932bSjmcIf the ID-type is 793e407932bSjmc.Li IPV4_ADDR , 794e407932bSjmc.Li IPV4_ADDR_SUBNET , 795e407932bSjmc.Li IPV6_ADDR , 796e407932bSjmcor 797e407932bSjmc.Li IPV6_ADDR_SUBNET , 798e407932bSjmcthis tag indicates what transport protocol should be transmitted over 799e407932bSjmcthe SA. 800e407932bSjmcIf left unspecified, all transport protocols between the two address 801e407932bSjmc(ranges) will be sent (or permitted) over that SA. 802c5fe6c4eSniklas.El 803c5fe6c4eSniklas.El 804ffa2dcb0Sjmc.Sh OTHER SECTIONS 805ffa2dcb0Sjmc.Bl -hang -width 8n 806ffa2dcb0Sjmc.It Aq Sy IKECFG-ID 8074eb3dd62SjmcParameters to use with IKE mode-config. 8084eb3dd62SjmcOne ID per peer. 8094ca71560Sho.Pp 8104ca71560ShoAn IKECFG-ID is written as [<ID-type>/<name>]. 8114ca71560ShoThe following ID types are supported: 812ffa2dcb0Sjmc.Pp 813ffa2dcb0Sjmc.Bl -tag -width "ASN1_DNXX" -offset indent -compact 8144ca71560Sho.It IPv4 8154ca71560Sho[ipv4/A.B.C.D] 8164ca71560Sho.It IPv6 8174ca71560Sho[ipv6/abcd:abcd::ab:cd] 8184ca71560Sho.It FQDN 8194ca71560Sho[fqdn/foo.bar.org] 8204ca71560Sho.It UFQDN 8214ca71560Sho[ufqdn/user@foo.bar.org] 8224ca71560Sho.It ASN1_DN 8234ca71560Sho[asn1_dn//C=aa/O=cc/...] (Note the double slashes as the DN itself 8244eb3dd62Sjmcstarts with a 8254eb3dd62Sjmc.Sq / . ) 8264ca71560Sho.El 8274ca71560Sho.Pp 8284ca71560ShoEach section specifies what configuration values to return to the peer 8294eb3dd62Sjmcrequesting IKE mode-config. 8304eb3dd62SjmcCurrently supported values are: 831ffa2dcb0Sjmc.Pp 832ffa2dcb0Sjmc.Bl -tag -width "WINS-serverXX" -offset indent -compact 8334ca71560Sho.It Em Address 8344ca71560ShoThe peer's network address. 8354ca71560Sho.It Em Netmask 8364ca71560ShoThe peer's netmask. 8374ca71560Sho.It Em Nameserver 8384ca71560ShoThe IP address of a DNS nameserver. 8394ca71560Sho.It Em WINS-server 8404ca71560ShoThe IP address of a WINS server. 8414ca71560Sho.El 842ffa2dcb0Sjmc.It Aq Sy Initiator-ID 843c00f6aafSjmcParameters for peer initiator configuration 844106cbd59Smarkus.Pp 845106cbd59SmarkusDuring phase 1 negotiation 846ffa2dcb0Sjmc.Xr isakmpd 8 847ffa2dcb0Sjmclooks for a pre-shared key in the 848ffa2dcb0Sjmc.Aq Sy ISAKMP-peer 849ffa2dcb0Sjmcsection. 850106cbd59SmarkusIf no Authentication data is specified in that section, and 851ffa2dcb0Sjmc.Xr isakmpd 8 852106cbd59Smarkusis not the initiator, it looks for Authentication data in a section named after 853106cbd59Smarkusthe initiator's phase 1 ID. 854106cbd59SmarkusThis allows mobile users with dynamic IP addresses 855106cbd59Smarkusto have different shared secrets. 856106cbd59Smarkus.Pp 857106cbd59SmarkusThis only works for aggressive mode because in main mode the remote 858106cbd59Smarkusinitiator ID would not yet be known. 859830c32f9ShshoexerNote, however, that use of aggressive mode is discouraged. 860830c32f9ShshoexerSee 861ffa2dcb0Sjmc.Sx CAVEATS , 862ffa2dcb0Sjmcbelow. 863106cbd59Smarkus.Pp 864ffa2dcb0SjmcThe name of the 865ffa2dcb0Sjmc.Aq Sy Initiator-ID 866ffa2dcb0Sjmcsection depends on the ID type sent by the initiator. 867106cbd59SmarkusCurrently this can be: 868ffa2dcb0Sjmc.Pp 869ffa2dcb0Sjmc.Bl -tag -width "UFQDNXX" -offset indent -compact 870106cbd59Smarkus.It IPv4 871106cbd59Smarkus[A.B.C.D] 872106cbd59Smarkus.It IPv6 873106cbd59Smarkus[abcd:abcd::ab:cd] 874106cbd59Smarkus.It FQDN 875106cbd59Smarkus[foo.bar.org] 876106cbd59Smarkus.It UFQDN 877106cbd59Smarkus[user@foo.bar.org] 878106cbd59Smarkus.El 8794ca71560Sho.El 8802b65e200Sjmc.Sh FILES 8812b65e200Sjmc.Bl -tag -width /etc/isakmpd/isakmpd.conf 8822b65e200Sjmc.It Pa /etc/isakmpd/isakmpd.conf 8832b65e200SjmcThe default 884ffa2dcb0Sjmc.Xr isakmpd 8 8852b65e200Sjmcconfiguration file. 8862b65e200Sjmc.It Pa /usr/share/ipsec/isakmpd/ 8872b65e200SjmcA directory containing some sample 888ffa2dcb0Sjmc.Xr isakmpd 8 8892b65e200Sjmcconfiguration files. 8902b65e200Sjmc.El 89100b2ba71Saaron.Sh EXAMPLES 8922040585eSniklasAn example of a configuration file: 8932040585eSniklas.Bd -literal 8942040585eSniklas# A configuration sample for the isakmpd ISAKMP/Oakley (aka IKE) daemon. 8952040585eSniklas 8962040585eSniklas[General] 897c5fe6c4eSniklasListen-on= 10.1.0.2 8982040585eSniklas 899c5fe6c4eSniklas# Incoming phase 1 negotiations are multiplexed on the source IP address 9002b81057dSniklas[Phase 1] 901c5fe6c4eSniklas10.1.0.1= ISAKMP-peer-west 9022b81057dSniklas 903c5fe6c4eSniklas# These connections are walked over after config file parsing and told 904c5fe6c4eSniklas# to the application layer so that it will inform us when traffic wants to 90552250141Smoritz# pass over them. This means we can do on-demand keying. 906c5fe6c4eSniklas[Phase 2] 907c5fe6c4eSniklasConnections= IPsec-east-west 908c5fe6c4eSniklas 909cc3c8b42Sniklas# Default values are commented out. 910c5fe6c4eSniklas[ISAKMP-peer-west] 9112b81057dSniklasPhase= 1 912cc3c8b42Sniklas#Transport= udp 913f6dd85a7SniklasLocal-address= 10.1.0.2 9142b81057dSniklasAddress= 10.1.0.1 9152b81057dSniklas#Port= isakmp 9162b81057dSniklas#Port= 500 91735ff0956Sho#Configuration= Default-phase-1-configuration 9182b81057dSniklasAuthentication= mekmitasdigoat 919cc3c8b42Sniklas#Flags= 9202b81057dSniklas 921c5fe6c4eSniklas[IPsec-east-west] 9222b81057dSniklasPhase= 2 923c5fe6c4eSniklasISAKMP-peer= ISAKMP-peer-west 9242b81057dSniklasConfiguration= Default-quick-mode 925c5fe6c4eSniklasLocal-ID= Net-east 926c5fe6c4eSniklasRemote-ID= Net-west 927cc3c8b42Sniklas#Flags= 9282b81057dSniklas 929c5fe6c4eSniklas[Net-west] 9302b81057dSniklasID-type= IPV4_ADDR_SUBNET 9312b81057dSniklasNetwork= 192.168.1.0 9322b81057dSniklasNetmask= 255.255.255.0 9332b81057dSniklas 934c5fe6c4eSniklas[Net-east] 9352b81057dSniklasID-type= IPV4_ADDR_SUBNET 9362b81057dSniklasNetwork= 192.168.2.0 9372b81057dSniklasNetmask= 255.255.255.0 9382b81057dSniklas 93952e712aeSniklas# Quick mode descriptions 94052e712aeSniklas 94152e712aeSniklas[Default-quick-mode] 94252e712aeSniklasEXCHANGE_TYPE= QUICK_MODE 9431a87c1a3ShoSuites= QM-ESP-3DES-SHA-PFS-SUITE,QM-ESP-AES-SHA-PFS-SUITE 94452e712aeSniklas 9454ca71560Sho# Data for an IKE mode-config peer 9464ca71560Sho[asn1_dn//C=SE/L=SomeCity/O=SomeCompany/CN=SomePeer.company.com] 9474ca71560ShoAddress= 192.168.1.123 9484ca71560ShoNetmask= 255.255.255.0 9494ca71560ShoNameserver= 192.168.1.10 9504ca71560ShoWINS-server= 192.168.1.11 9514ca71560Sho 952106cbd59Smarkus# pre-shared key based on initiator's phase 1 ID 953106cbd59Smarkus[foo.bar.org] 954106cbd59SmarkusAuthentication= mekmitasdigoat 955106cbd59Smarkus 95652e712aeSniklas# 95752e712aeSniklas# ##################################################################### 95844143af3Sderaadt# All configuration data below this point is not required as the example 95952e712aeSniklas# uses the predefined Main Mode transform and Quick Mode suite names. 96052e712aeSniklas# It is included here for completeness. Note the default values for the 96152e712aeSniklas# [General] and [X509-certificates] sections just below. 96252e712aeSniklas# ##################################################################### 96352e712aeSniklas# 96452e712aeSniklas 96552e712aeSniklas[General] 966447a9f3aShoPolicy-file= /etc/isakmpd/isakmpd.policy 96752e712aeSniklasRetransmits= 3 96852e712aeSniklasExchange-max-time= 120 96952e712aeSniklas 970b57b191eSniklas# KeyNote credential storage 971b57b191eSniklas[KeyNote] 972b57b191eSniklasCredential-directory= /etc/isakmpd/keynote/ 973b57b191eSniklas 974fb1921ccSniklas# Certificates stored in PEM format 975fb1921ccSniklas[X509-certificates] 976fb1921ccSniklasCA-directory= /etc/isakmpd/ca/ 977fb1921ccSniklasCert-directory= /etc/isakmpd/certs/ 9789dbe9fb4ShoCRL-directory= /etc/isakmpd/crls/ 979954b1b31SniklasPrivate-key= /etc/isakmpd/private/local.key 980fb1921ccSniklas 981419caefeSho# Default phase 1 description (Main Mode) 982419caefeSho 98335ff0956Sho[Default-phase-1-configuration] 984419caefeShoEXCHANGE_TYPE= ID_PROT 985419caefeShoTransforms= 3DES-SHA 986419caefeSho 9872b81057dSniklas# Main mode transforms 9882b81057dSniklas###################### 9892b81057dSniklas 9902b81057dSniklas# DES 9912040585eSniklas 9922040585eSniklas[DES-MD5] 9932040585eSniklasENCRYPTION_ALGORITHM= DES_CBC 9942040585eSniklasHASH_ALGORITHM= MD5 9952040585eSniklasAUTHENTICATION_METHOD= PRE_SHARED 9962039fcadShoGROUP_DESCRIPTION= MODP_1024 99760f440ccShoLife= Default-phase-1-lifetime 9982040585eSniklas 9992b81057dSniklas[DES-SHA] 10002b81057dSniklasENCRYPTION_ALGORITHM= DES_CBC 10012b81057dSniklasHASH_ALGORITHM= SHA 10022b81057dSniklasAUTHENTICATION_METHOD= PRE_SHARED 100360f440ccShoGROUP_DESCRIPTION= MODP_1024 100460f440ccShoLife= Default-phase-1-lifetime 10052b81057dSniklas 10062b81057dSniklas# 3DES 10072b81057dSniklas 10082b81057dSniklas[3DES-SHA] 10092b81057dSniklasENCRYPTION_ALGORITHM= 3DES_CBC 10102040585eSniklasHASH_ALGORITHM= SHA 10112040585eSniklasAUTHENTICATION_METHOD= PRE_SHARED 10122040585eSniklasGROUP_DESCRIPTION= MODP_1024 101360f440ccShoLife= Default-phase-1-lifetime 10142b81057dSniklas 1015a806508bShshoexer# AES 1016a806508bShshoexer 1017a806508bShshoexer[AES-SHA] 1018a806508bShshoexerENCRYPTION_ALGORITHM= AES_CBC 1019a806508bShshoexerKEY_LENGTH= 128,128:256 1020a806508bShshoexerHASH_ALGORITHM= SHA 1021a806508bShshoexerAUTHENTICATION_METHOD= PRE_SHARED 1022a806508bShshoexerGROUP_DESCRIPTION= MODP_1024 1023a806508bShshoexerLife= Default-phase-1-lifetime 1024a806508bShshoexer 10252b81057dSniklas# Blowfish 10262b81057dSniklas 102760f440ccSho[BLF-SHA] 10282b81057dSniklasENCRYPTION_ALGORITHM= BLOWFISH_CBC 10292b81057dSniklasKEY_LENGTH= 128,96:192 10302b81057dSniklasHASH_ALGORITHM= SHA 10312b81057dSniklasAUTHENTICATION_METHOD= PRE_SHARED 10322b81057dSniklasGROUP_DESCRIPTION= MODP_1024 103360f440ccShoLife= Default-phase-1-lifetime 10342040585eSniklas 103560f440ccSho# Blowfish, using DH group 4 (non-default) 10362040585eSniklas[BLF-SHA-EC185] 1037d70ca5f7SniklasENCRYPTION_ALGORITHM= BLOWFISH_CBC 10382b81057dSniklasKEY_LENGTH= 128,96:192 10392040585eSniklasHASH_ALGORITHM= SHA 10402040585eSniklasAUTHENTICATION_METHOD= PRE_SHARED 10412040585eSniklasGROUP_DESCRIPTION= EC2N_185 104260f440ccShoLife= Default-phase-1-lifetime 10432040585eSniklas 10442b81057dSniklas# Quick mode protection suites 10452b81057dSniklas############################## 10462b81057dSniklas 10472b81057dSniklas# DES 10482040585eSniklas 1049d70ca5f7Sniklas[QM-ESP-DES-SUITE] 1050d70ca5f7SniklasProtocols= QM-ESP-DES 1051d70ca5f7Sniklas 10522b81057dSniklas[QM-ESP-DES-PFS-SUITE] 10532b81057dSniklasProtocols= QM-ESP-DES-PFS 10542b81057dSniklas 10552040585eSniklas[QM-ESP-DES-MD5-SUITE] 10562040585eSniklasProtocols= QM-ESP-DES-MD5 10572040585eSniklas 10582b81057dSniklas[QM-ESP-DES-MD5-PFS-SUITE] 10592b81057dSniklasProtocols= QM-ESP-DES-MD5-PFS 10602040585eSniklas 10612b81057dSniklas[QM-ESP-DES-SHA-SUITE] 10622b81057dSniklasProtocols= QM-ESP-DES-SHA 10632040585eSniklas 10642b81057dSniklas[QM-ESP-DES-SHA-PFS-SUITE] 10652b81057dSniklasProtocols= QM-ESP-DES-SHA-PFS 10662040585eSniklas 10672b81057dSniklas# 3DES 10682b81057dSniklas 10692b81057dSniklas[QM-ESP-3DES-SHA-SUITE] 10702b81057dSniklasProtocols= QM-ESP-3DES-SHA 10712b81057dSniklas 10722b81057dSniklas[QM-ESP-3DES-SHA-PFS-SUITE] 10732b81057dSniklasProtocols= QM-ESP-3DES-SHA-PFS 10742b81057dSniklas 1075bfc24386Sniklas# AES 1076bfc24386Sniklas 1077bfc24386Sniklas[QM-ESP-AES-SHA-SUITE] 1078bfc24386SniklasProtocols= QM-ESP-AES-SHA 1079bfc24386Sniklas 108060f440ccSho[QM-ESP-AES-SHA-PFS-SUITE] 1081bfc24386SniklasProtocols= QM-ESP-AES-SHA-PFS 1082bfc24386Sniklas 10832b81057dSniklas# AH 10842b81057dSniklas 10852b81057dSniklas[QM-AH-MD5-SUITE] 10862b81057dSniklasProtocols= QM-AH-MD5 10872b81057dSniklas 10882b81057dSniklas[QM-AH-MD5-PFS-SUITE] 10892b81057dSniklasProtocols= QM-AH-MD5-PFS 10902b81057dSniklas 109160f440ccSho# AH + ESP (non-default) 10922040585eSniklas 10932040585eSniklas[QM-AH-MD5-ESP-DES-SUITE] 10942040585eSniklasProtocols= QM-AH-MD5,QM-ESP-DES 10952040585eSniklas 10962b81057dSniklas[QM-AH-MD5-ESP-DES-MD5-SUITE] 10972b81057dSniklasProtocols= QM-AH-MD5,QM-ESP-DES-MD5 10982040585eSniklas 10992b81057dSniklas[QM-ESP-DES-MD5-AH-MD5-SUITE] 11002b81057dSniklasProtocols= QM-ESP-DES-MD5,QM-AH-MD5 11012b81057dSniklas 11022b81057dSniklas# Quick mode protocols 11032b81057dSniklas 11042b81057dSniklas# DES 11052040585eSniklas 11062040585eSniklas[QM-ESP-DES] 11072040585eSniklasPROTOCOL_ID= IPSEC_ESP 11082040585eSniklasTransforms= QM-ESP-DES-XF 11092040585eSniklas 11102b81057dSniklas[QM-ESP-DES-MD5] 11112b81057dSniklasPROTOCOL_ID= IPSEC_ESP 11122b81057dSniklasTransforms= QM-ESP-DES-MD5-XF 11132b81057dSniklas 11142b81057dSniklas[QM-ESP-DES-MD5-PFS] 11152b81057dSniklasPROTOCOL_ID= IPSEC_ESP 11162b81057dSniklasTransforms= QM-ESP-DES-MD5-PFS-XF 11172b81057dSniklas 11182b81057dSniklas[QM-ESP-DES-SHA] 11192b81057dSniklasPROTOCOL_ID= IPSEC_ESP 11202b81057dSniklasTransforms= QM-ESP-DES-SHA-XF 11212b81057dSniklas 11222b81057dSniklas# 3DES 11232b81057dSniklas 11242b81057dSniklas[QM-ESP-3DES-SHA] 11252b81057dSniklasPROTOCOL_ID= IPSEC_ESP 11262b81057dSniklasTransforms= QM-ESP-3DES-SHA-XF 11272b81057dSniklas 11282b81057dSniklas[QM-ESP-3DES-SHA-PFS] 11292b81057dSniklasPROTOCOL_ID= IPSEC_ESP 11302b81057dSniklasTransforms= QM-ESP-3DES-SHA-PFS-XF 11312b81057dSniklas 11322b81057dSniklas[QM-ESP-3DES-SHA-TRP] 11332b81057dSniklasPROTOCOL_ID= IPSEC_ESP 11342b81057dSniklasTransforms= QM-ESP-3DES-SHA-TRP-XF 11352b81057dSniklas 1136bfc24386Sniklas# AES 1137bfc24386Sniklas 1138bfc24386Sniklas[QM-ESP-AES-SHA] 1139bfc24386SniklasPROTOCOL_ID= IPSEC_ESP 1140bfc24386SniklasTransforms= QM-ESP-AES-SHA-XF 1141bfc24386Sniklas 1142bfc24386Sniklas[QM-ESP-AES-SHA-PFS] 1143bfc24386SniklasPROTOCOL_ID= IPSEC_ESP 1144bfc24386SniklasTransforms= QM-ESP-AES-SHA-PFS-XF 1145bfc24386Sniklas 1146bfc24386Sniklas[QM-ESP-AES-SHA-TRP] 1147bfc24386SniklasPROTOCOL_ID= IPSEC_ESP 1148bfc24386SniklasTransforms= QM-ESP-AES-SHA-TRP-XF 1149bfc24386Sniklas 11502b81057dSniklas# AH MD5 11512b81057dSniklas 11522b81057dSniklas[QM-AH-MD5] 11532b81057dSniklasPROTOCOL_ID= IPSEC_AH 11542b81057dSniklasTransforms= QM-AH-MD5-XF 11552b81057dSniklas 11562b81057dSniklas[QM-AH-MD5-PFS] 11572b81057dSniklasPROTOCOL_ID= IPSEC_AH 11582b81057dSniklasTransforms= QM-AH-MD5-PFS-XF 11592b81057dSniklas 11602b81057dSniklas# Quick mode transforms 11612b81057dSniklas 11622b81057dSniklas# ESP DES+MD5 11632b81057dSniklas 11642040585eSniklas[QM-ESP-DES-XF] 11652040585eSniklasTRANSFORM_ID= DES 11662040585eSniklasENCAPSULATION_MODE= TUNNEL 116760f440ccShoLife= Default-phase-2-lifetime 11682040585eSniklas 11692b81057dSniklas[QM-ESP-DES-MD5-XF] 11702b81057dSniklasTRANSFORM_ID= DES 11712b81057dSniklasENCAPSULATION_MODE= TUNNEL 11722b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_MD5 117360f440ccShoLife= Default-phase-2-lifetime 11742b81057dSniklas 11752b81057dSniklas[QM-ESP-DES-MD5-PFS-XF] 11762b81057dSniklasTRANSFORM_ID= DES 11772b81057dSniklasENCAPSULATION_MODE= TUNNEL 11782039fcadShoGROUP_DESCRIPTION= MODP_1024 11792b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_MD5 118060f440ccShoLife= Default-phase-2-lifetime 11812b81057dSniklas 11822b81057dSniklas[QM-ESP-DES-SHA-XF] 11832b81057dSniklasTRANSFORM_ID= DES 11842b81057dSniklasENCAPSULATION_MODE= TUNNEL 11852b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 118660f440ccShoLife= Default-phase-2-lifetime 11872b81057dSniklas 11882b81057dSniklas# 3DES 11892b81057dSniklas 11902b81057dSniklas[QM-ESP-3DES-SHA-XF] 11912b81057dSniklasTRANSFORM_ID= 3DES 11922b81057dSniklasENCAPSULATION_MODE= TUNNEL 11932b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 119460f440ccShoLife= Default-phase-2-lifetime 11952b81057dSniklas 11962b81057dSniklas[QM-ESP-3DES-SHA-PFS-XF] 11972b81057dSniklasTRANSFORM_ID= 3DES 11982b81057dSniklasENCAPSULATION_MODE= TUNNEL 11992b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 12002b81057dSniklasGROUP_DESCRIPTION= MODP_1024 120160f440ccShoLife= Default-phase-2-lifetime 12022b81057dSniklas 12032b81057dSniklas[QM-ESP-3DES-SHA-TRP-XF] 12042b81057dSniklasTRANSFORM_ID= 3DES 12052b81057dSniklasENCAPSULATION_MODE= TRANSPORT 12062b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 120760f440ccShoLife= Default-phase-2-lifetime 12082b81057dSniklas 1209bfc24386Sniklas# AES 1210bfc24386Sniklas 1211bfc24386Sniklas[QM-ESP-AES-SHA-XF] 1212bfc24386SniklasTRANSFORM_ID= AES 1213bfc24386SniklasENCAPSULATION_MODE= TUNNEL 1214bfc24386SniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 1215a806508bShshoexerKEY_LENGTH= 128 121660f440ccShoLife= Default-phase-2-lifetime 1217bfc24386Sniklas 1218bfc24386Sniklas[QM-ESP-AES-SHA-PFS-XF] 1219bfc24386SniklasTRANSFORM_ID= AES 1220bfc24386SniklasENCAPSULATION_MODE= TUNNEL 1221bfc24386SniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 1222bfc24386SniklasGROUP_DESCRIPTION= MODP_1024 1223a806508bShshoexerKEY_LENGTH= 128 122460f440ccShoLife= Default-phase-2-lifetime 1225bfc24386Sniklas 1226bfc24386Sniklas[QM-ESP-AES-SHA-TRP-XF] 1227bfc24386SniklasTRANSFORM_ID= AES 1228bfc24386SniklasENCAPSULATION_MODE= TRANSPORT 1229bfc24386SniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 1230a806508bShshoexerKEY_LENGTH= 128 123160f440ccShoLife= Default-phase-2-lifetime 1232bfc24386Sniklas 12332b81057dSniklas# AH 12342b81057dSniklas 12352b81057dSniklas[QM-AH-MD5-XF] 12362b81057dSniklasTRANSFORM_ID= MD5 12372b81057dSniklasENCAPSULATION_MODE= TUNNEL 12382b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_MD5 123960f440ccShoLife= Default-phase-2-lifetime 12402b81057dSniklas 12412b81057dSniklas[QM-AH-MD5-PFS-XF] 12422b81057dSniklasTRANSFORM_ID= MD5 12432b81057dSniklasENCAPSULATION_MODE= TUNNEL 12442039fcadShoGROUP_DESCRIPTION= MODP_1024 124560f440ccShoLife= Default-phase-2-lifetime 12462b81057dSniklas 124760f440ccSho[Sample-Life-Time] 12482b81057dSniklasLIFE_TYPE= SECONDS 12492b81057dSniklasLIFE_DURATION= 3600,1800:7200 12502b81057dSniklas 125160f440ccSho[Sample-Life-Volume] 12522b81057dSniklasLIFE_TYPE= KILOBYTES 12532b81057dSniklasLIFE_DURATION= 1000,768:1536 12542040585eSniklas.Ed 12552040585eSniklas.Sh SEE ALSO 1256b57b191eSniklas.Xr keynote 1 , 1257ffa2dcb0Sjmc.Xr openssl 1 , 1258dc89b21eSfgsch.Xr ipsec 4 , 125930a2652aSniklas.Xr keynote 4 , 126077725688Sniklas.Xr isakmpd.policy 5 , 126110f11e23Sjmc.Xr isakmpd 8 1262830c32f9Shshoexer.Sh CAVEATS 1263830c32f9ShshoexerUsing aggressive mode is discouraged due to various design problems. 1264830c32f9ShshoexerIf your peer only supports aggressive mode, please consider replacing that 1265830c32f9Shshoexerpeer with a sane ISAKMP/IKE implementation. 1266830c32f9ShshoexerFor details see 1267830c32f9Shshoexer.Pa http://www.usenix.org/publications/login/1999-12/features/harmful.html . 1268d7401508Sho.Sh BUGS 1269d7401508ShoThe RFCs do not permit differing DH groups in the same proposal for 1270d7401508Shoaggressive and quick mode exchanges. 1271d7401508ShoMixing both PFS and non-PFS suites in a quick mode proposal is not possible, 1272d7401508Shoas PFS implies using a DH group. 1273