xref: /openbsd/sbin/isakmpd/isakmpd.conf.5 (revision a2067f52)
1*a2067f52Sniklas.\" $OpenBSD: isakmpd.conf.5,v 1.42 2000/10/16 23:28:22 niklas Exp $
2*a2067f52Sniklas.\" $EOM: isakmpd.conf.5,v 1.52 2000/10/15 20:01:28 niklas Exp $
32040585eSniklas.\"
444f0148dSniklas.\" Copyright (c) 1998, 1999, 2000 Niklas Hallqvist.  All rights reserved.
5454bb6daSniklas.\" Copyright (c) 2000 H�kan Olsson.  All rights reserved.
62040585eSniklas.\"
72040585eSniklas.\" Redistribution and use in source and binary forms, with or without
82040585eSniklas.\" modification, are permitted provided that the following conditions
92040585eSniklas.\" are met:
102040585eSniklas.\" 1. Redistributions of source code must retain the above copyright
112040585eSniklas.\"    notice, this list of conditions and the following disclaimer.
122040585eSniklas.\" 2. Redistributions in binary form must reproduce the above copyright
132040585eSniklas.\"    notice, this list of conditions and the following disclaimer in the
142040585eSniklas.\"    documentation and/or other materials provided with the distribution.
152040585eSniklas.\" 3. All advertising materials mentioning features or use of this software
162040585eSniklas.\"    must display the following acknowledgement:
172040585eSniklas.\"	This product includes software developed by Ericsson Radio Systems.
182040585eSniklas.\" 4. The name of the author may not be used to endorse or promote products
192040585eSniklas.\"    derived from this software without specific prior written permission.
202040585eSniklas.\"
212040585eSniklas.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
222040585eSniklas.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
232040585eSniklas.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
242040585eSniklas.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
252040585eSniklas.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
262040585eSniklas.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
272040585eSniklas.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
282040585eSniklas.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
292040585eSniklas.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
302040585eSniklas.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
312040585eSniklas.\"
322040585eSniklas.\" This code was written under funding by Ericsson Radio Systems.
332040585eSniklas.\"
342040585eSniklas.\" Manual page, using -mandoc macros
352040585eSniklas.\"
362040585eSniklas.Dd October 10, 1998
3758aefd4bSaaron.Dt ISAKMPD.CONF 5
382040585eSniklas.Os
392040585eSniklas.Sh NAME
402040585eSniklas.Nm isakmpd.conf
4158aefd4bSaaron.Nd configuration file for isakmpd
422040585eSniklas.Sh DESCRIPTION
4358aefd4bSaaron.Nm
4458aefd4bSaaronis the configuration file for the
452040585eSniklas.Nm isakmpd
462040585eSniklasdaemon managing security association and key management for the
4758aefd4bSaaronIPSEC layer of the kernel's networking stack.
482040585eSniklas.Pp
492040585eSniklasThe file is of a well known type of format called .INI style, named after
502040585eSniklasthe suffix used by an overrated windowing environment for its configuration
519615e1d4Saaronfiles.
529615e1d4SaaronThis format consists of sections, each beginning with a line looking like:
532040585eSniklas.Bd -literal
542040585eSniklas[Section name]
552040585eSniklas.Ed
562040585eSniklasBetween the brackets is the name of the section following this section header.
572040585eSniklasInside a section many tag/value pairs can be stored, each one looking like:
582040585eSniklas.Bd -literal
592040585eSniklasTag=Value
602040585eSniklas.Ed
612040585eSniklasIf the value needs more space than fits on a single line it's possible to
62*a2067f52Sniklascontinue it on the next by ending the first with a backslash character
639615e1d4Saaronimmediately before the newline character.
649615e1d4SaaronThis method can extend a value for an arbitrary amount of lines.
652040585eSniklas.Pp
6658aefd4bSaaronComments can be put anywhere in the file by using a hash mark
6758aefd4bSaaron.Pq Sq \&# .
6858aefd4bSaaronThen the comment goes on to the end of the line.
692040585eSniklas.Pp
70c5fe6c4eSniklasOften the right-hand side values consist of other section names.
71c5fe6c4eSniklasThis results in a tree structure.
72c5fe6c4eSniklasSome values are treated as a list of several scalar values, such lists always
739615e1d4Saaronuse comma as the separator.
749615e1d4SaaronSome values are formatted like this: X,Y:Z, which
75c5fe6c4eSniklasis an offer/accept syntax, where X is a value we offer and Y:Z is a range of
76c5fe6c4eSniklasaccepted values, inclusive.
77c5fe6c4eSniklas.Pp
7852e712aeSniklas.Ss Auto-generated parts of the configuration
7952e712aeSniklas.Pp
8052e712aeSniklasSome predefined section names are recognized by the daemon, voiding the need
8152e712aeSniklasto fully specify the Main Mode transforms and Quick Mode suites, protocols
8252e712aeSniklasand transforms.
8352e712aeSniklas.Pp
8452e712aeSniklasFor Main Mode:
8552e712aeSniklas.Bd -filled -offset indent -compact
8652e712aeSniklas.Ar {DES,BLF,3DES,CAST}-{MD5,SHA}[-{DSS,RSA_SIG}]
8752e712aeSniklas.Ed
8852e712aeSniklas.Pp
8952e712aeSniklasFor Quick Mode:
9052e712aeSniklas.Bd -filled -offset indent -compact
91*a2067f52Sniklas.Ar QM-{ESP,AH}[-TRP]-{DES,3DES,CAST,BLF,AES}[-{MD5,SHA,RIPEMD}][-PFS]-SUITE
9252e712aeSniklas.Ed
9352e712aeSniklas.Pp
9452e712aeSniklasExample 1: 3DES-SHA means; 3DES encryption, SHA hash, and authorization by
9552e712aeSniklaspre-shared keys.
9652e712aeSniklasExample 2: QM-ESP-3DES-SHA-PFS-SUITE means; ESP protocol, 3DES encryption,
9752e712aeSniklasSHA hash, and use Perfect Forward Security.
9852e712aeSniklas.Pp
9952e712aeSniklasThere are two predefined lifetimes used. The Main Mode lifetime,
10052e712aeSniklasnamed LIFE_MAIN_MODE, currently
10152e712aeSniklasdefaults to one hour (minimum 60 seconds, maximum 1 day). The Quick Mode
10252e712aeSniklaslifetime,
10352e712aeSniklasLIFE_QUICK_MODE,
10452e712aeSniklasdefaults to 20 minutes (minimum 60 seconds, maximum 1 day).
10552e712aeSniklas.Pp
10652e712aeSniklasIn addition, the predefinitions include some default values for the special
10752e712aeSniklassections "General", and "X509-certificates".  These values are presented in
10852e712aeSniklasthe example below.
10952e712aeSniklas.Pp
11052e712aeSniklasNote that using the predefined section names imply some minor limitations.
11152e712aeSniklasThere are currently no predefined ESP+AH Quick Mode suites, and the
11252e712aeSniklasDiffie-Hellman group description for Main Mode (and Quick Mode with PFS) is
11352e712aeSniklasset to DH group 1 (MODP_768) when using MD5 hash, and DH group 2 (MODP_1024)
11452e712aeSniklaswhen using SHA hash.
11552e712aeSniklas.Pp
11652e712aeSniklasAll autogenerated values can be overridden by manual entries by using the
11752e712aeSniklassame section and tag names in the configuration file.
118b57b191eSniklas.Pp
119b57b191eSniklasIn particular, the default phase 1 (Main or Aggressive Mode) and phase 2
120b57b191eSniklas(Quick Mode) lifetimes can be overridden by these tags under the "General"
121b57b191eSniklassection;
122b57b191eSniklas.Pp
123b57b191eSniklas.Bd -literal
124b57b191eSniklas[General]
125b57b191eSniklasDefault-phase-1-lifetime=	3600,60:86400
126b57b191eSniklasDefault-phase-2-lifetime=	1200,60:86400
127b57b191eSniklas.Ed
12852e712aeSniklas.\"XXX Following empty .Ss works around a nroff bug, we want the new line."
12952e712aeSniklas.Ss
13052e712aeSniklas.Pp
131c5fe6c4eSniklas.Ss Roots
132c5fe6c4eSniklas.Bl -hang -width 12n
133c5fe6c4eSniklas.It Em General
134c5fe6c4eSniklasGeneric global configuration parameters
135c5fe6c4eSniklas.Bl -tag -width 12n
13680c8b3dbSniklas.It Em Policy-File
13780c8b3dbSniklasThe name of the file that contains
13880c8b3dbSniklas.Xr KeyNote 4
1394aac73a4Saaronpolicies.
1404aac73a4SaaronThe default is "/etc/isakmpd/isakmpd.policy".
141c5fe6c4eSniklas.It Em Retransmits
142c5fe6c4eSniklasHow many times should a message be retransmitted before giving up.
143b393bef8Sniklas.It Em Check-interval
144b393bef8SniklasThe interval between watchdog checks of connections we want up at all times.
145c5fe6c4eSniklas.It Em Exchange-max-time
146c5fe6c4eSniklasHow many seconds should an exchange maximally take to setup
147c5fe6c4eSniklasbefore we give up.
148c5fe6c4eSniklas.It Em Listen-on
1499615e1d4SaaronA list of IP-addresses OK to listen on.
1509615e1d4SaaronThis list is used as
151c5fe6c4eSniklasa filter for the set of addresses the interfaces configured
1529615e1d4Saaronprovides.
1539615e1d4SaaronThis means that we won't see if an address given
15480c8b3dbSniklashere does not exist on this host, and thus no error is given for
155c5fe6c4eSniklasthat case.
156463c7dc9Sniklas.It Em Shared-SADB
157463c7dc9SniklasIf this tag is defined, whatever the value is, some semantics of
158463c7dc9Sniklas.Nm
159463c7dc9Sniklasare changed so that multiple instances can run on top of one SADB
1609615e1d4Saaronand setup SAs with eachother.
1619615e1d4SaaronSpecifically this means replay
162463c7dc9Sniklasprotection will not be asked for, and errors that can occur when
163463c7dc9Sniklasupdating an SA with its parameters a 2nd time will be ignored.
164c5fe6c4eSniklas.El
165c5fe6c4eSniklas.It Em Phase 1
166c5fe6c4eSniklasISAKMP SA negotiation parameter root
167c5fe6c4eSniklas.Bl -tag -width 12n
168c5fe6c4eSniklas.It Em <IP-address>
1699615e1d4SaaronA name of the ISAKMP peer at the given IP-address.
170cc3c8b42Sniklas.It Em Default
171cc3c8b42SniklasA name of the default ISAKMP peer.  Incoming
172cc3c8b42SniklasPhase 1 connections from other IP-addresses will use this peer name.
173cc3c8b42Sniklas.It ""
1749615e1d4SaaronThis name is used as the section name for further information to be found.
1759615e1d4SaaronLook at <ISAKMP-peer> below.
176c5fe6c4eSniklas.El
177c5fe6c4eSniklas.It Em Phase 2
178c5fe6c4eSniklasIPsec SA negotiation parameter root
179c5fe6c4eSniklas.Bl -tag -width 12n
180c5fe6c4eSniklas.It Em Connections
1812ddc24cbSniklasA list of directed IPSec "connection" names that should be brought up
1822ddc24cbSniklasautomatically, either on first use if the system supports it, or at
1839615e1d4Saaronstartup of the daemon.
1849615e1d4SaaronThese names are section names where further information can be found.
1859615e1d4SaaronLook at <IPSec-connection> below.
18680baf197SniklasNormally any connection mentioned here are treated as part of the
18780baf197Sniklas"Passive-connection" list we present below, however there is a
1889615e1d4Saaronflag: "Active-only" that disables this behaviour.
1899615e1d4SaaronThis too is mentioned in the <IPSec-connection> section, in the "Flags" tag.
19080baf197Sniklas.It Em Passive-connections
19180baf197SniklasA list of IPSec "connection" names we recognize and accept initiations for.
1929615e1d4SaaronThese names are section names where further information can be found.
1939615e1d4SaaronLook at <IPSec-connection> below.
1949615e1d4SaaronCurrently only the Local-ID and Remote-ID tags
19580baf197Sniklasare looked at in those sections, as they are matched against the IDs given
19680baf197Sniklasby the initiator.
197c5fe6c4eSniklas.El
198b57b191eSniklas.It Em KeyNote
199b57b191eSniklas.Bl -tag -width 12n
200b57b191eSniklas.It Em Credential-directory
201b57b191eSniklasA directory containing directories named after IDs (IP
202b57b191eSniklasaddresses, ``user@domain'', or hostnames) that contain files named
203b57b191eSniklas``credentials'' and ``private_key''.
204b57b191eSniklas.Pp
205b57b191eSniklasThe credentials file contains
206b57b191eSniklas.Xr keynote 4
207b57b191eSniklascredentials that are sent to a remote IKE daemon when we use the
208b57b191eSniklasassociated ID, or credentials that we may want to consider when doing
209b57b191eSniklasan exchange with a remote IKE daemon that uses that ID. Note that, in
210b57b191eSniklasthe former case, the last credential in the file MUST contain our
211b57b191eSniklaspublic key in its Licensees field. More than one credentials may exist
212b57b191eSniklasin the file. They are separated by whitelines (the format is
213b57b191eSniklasessentially the same as that of the policy file). The credentials are
214b57b191eSniklasof the same format as the policies described in
215b57b191eSniklas.Xr isakmpd.policy 5 .
216b57b191eSniklasThe only difference is that the Authorizer field contains a public
217b57b191eSniklaskey, and the assertion is signed. Signed assertions can be generated
218b57b191eSniklasusing the
219b57b191eSniklas.Xr keynote 1
220b57b191eSniklasutility.
221b57b191eSniklas.Pp
222b57b191eSniklasThe private_key file contains the private RSA key we use for
223b57b191eSniklasauthentication. If the directory (and the files) exist, they take
224b57b191eSniklasprecedence over X509-based authentication.
225b57b191eSniklas.El
226fb1921ccSniklas.It Em X509-Certificates
227fb1921ccSniklas.Bl -tag -width 12n
228fb1921ccSniklas.It Em Ca-directory
229fb1921ccSniklasA directory containing PEM certificates of certification authorities
230e5814869Sangelosthat we trust to sign other certificates.  Note that for a CA to be
231e5814869Sangelosreally trusted, it needs to be somehow referred to by policy, in
232e5814869Sangelos.Xr isakmpd.policy 5 .
233e5814869SangelosThe certificates in this directory are used for the actual X.509
234e5814869Sangelosauthentication and for cross-referencing policies that refer to
235e5814869SangelosDistinguished Names (DNs). Keeping a separate directory (as opposed
236e5814869Sangelosto integrating policies and X.509 CA certificates) allows for maintenance
237e5814869Sangelosof a list of "well known" CAs without actually having to trust all (or any)
238e5814869Sangelosof them.
239fb1921ccSniklas.It Em Cert-directory
240fb1921ccSniklasA directory containing PEM certificates that we trust to be valid.
241fb1921ccSniklasThese certificates are used in preference to those passed in messages and
242fb1921ccSniklasare required to have a SubjectAltName extension.
243fb1921ccSniklas.It Em Accept-self-signed
244fb1921ccSniklasIf this tag is defined, whatever the value is, certificates that
245fb1921ccSniklasdo not originate from a trusted CA but are self-signed will be
246fb1921ccSniklasaccepted.
247954b1b31Sniklas.It Em Private-key
248954b1b31SniklasThe private key matching the public key of our certificate (which should be
249954b1b31Sniklasin the "Cert-directory", and have a subjectAltName matching our ID, so far
250954b1b31Sniklasthat is our IP-address).
251fb1921ccSniklas.El
252c5fe6c4eSniklas.El
253c5fe6c4eSniklas.Ss Referred-to sections
254c5fe6c4eSniklas.Bl -hang -width 12n
255c5fe6c4eSniklas.It Em <ISAKMP-peer>
256c5fe6c4eSniklasParameters for negotiation with an ISAKMP peer
257c5fe6c4eSniklas.Bl -tag -width 12n
258c5fe6c4eSniklas.It Em Phase
259c5fe6c4eSniklasThe constant
260c5fe6c4eSniklas.Li 1 ,
261c5fe6c4eSniklasas ISAKMP-peers and IPSec-connections
262c5fe6c4eSniklasreally are handled by the same code inside isakmpd.
263c5fe6c4eSniklas.It Em Transport
264cc3c8b42SniklasThe name of the transport protocol, defaults to
265cc3c8b42Sniklas.Li UDP .
266cc3c8b42Sniklas.It Em Port
267cc3c8b42SniklasIn case of
268cc3c8b42Sniklas.Li UDP ,
269cc3c8b42Sniklasthe
270cc3c8b42Sniklas.Li UDP
271cc3c8b42Sniklasport number to send to.
272cc3c8b42SniklasThis is optional, the
273cc3c8b42Sniklasdefault value is 500 which is the IANA-registered number for ISAKMP.
274*a2067f52Sniklas.It Em Local-address
275e2220ba8SniklasThe Local IP-address to use, if we are multi-homed, or have aliases.
276c5fe6c4eSniklas.It Em Address
277cc3c8b42SniklasIf existent, the IP-address of the peer.
278c5fe6c4eSniklas.It Em Configuration
2799615e1d4SaaronThe name of the ISAKMP-configuration section to use.
2809615e1d4SaaronLook at <ISAKMP-configuration> below.
281c5fe6c4eSniklas.It Em Authentication
282cc3c8b42SniklasIf existent, authentication data for this specific peer.
2839615e1d4SaaronIn the case of preshared key, this is the key value itself.
2846a8478f3Sniklas.It Em ID
2856a8478f3SniklasIf existent, the name of the section that describes the
2864aac73a4Saaronlocal client ID that we should present to our peer.
2874aac73a4SaaronIf not present, it
2886a8478f3Sniklasdefaults to the address of the local interface we are sending packets
2894aac73a4Saaronover to the remote daemon.
2904aac73a4SaaronLook at <Phase1-ID> below.
291*a2067f52Sniklas.It Em Remote-ID
292*a2067f52SniklasIf existent, the name of the section that describes the remote client
293*a2067f52SniklasID we expect the remote daemon to send us.
294*a2067f52SniklasIf not present, it defaults to the address of the remote daemon.
295*a2067f52SniklasLook at <Phase1-ID> below.
2962ddc24cbSniklas.It Em Flags
2972ddc24cbSniklasA comma-separated list of flags controlling the further
2989615e1d4Saaronhandling of the ISAKMP SA.
2999615e1d4SaaronCurrently there are no specific ISAKMP SA flags defined.
300c5fe6c4eSniklas.El
3016a8478f3Sniklas.It Em <Phase1-ID>
3026a8478f3Sniklas.Bl -tag -width 12n
3036a8478f3Sniklas.It Em ID-type
3049615e1d4SaaronThe ID type as given by the RFCs.
3059615e1d4SaaronFor Phase 1 this is currently
3066a8478f3Sniklas.Li IPV4_ADDR ,
3076a8478f3Sniklas.Li IPV4_ADDR_SUBNET ,
3086a8478f3Sniklas.Li FQDN ,
3096a8478f3Sniklasor
3106a8478f3Sniklas.Li USER_FQDN .
3116a8478f3Sniklas.It Em Address
3126a8478f3SniklasIf the ID-type is
3136a8478f3Sniklas.Li IPV4_ADDR ,
3146a8478f3Sniklasthis tag should exist and be an IP-address.
3156a8478f3Sniklas.It Em Network
3166a8478f3SniklasIf the ID-type is
3176a8478f3Sniklas.Li IPV4_ADDR_SUBNET
3186a8478f3Sniklasthis tag should exist and
3196a8478f3Sniklasbe a network address.
3206a8478f3Sniklas.It Em Netmask
3216a8478f3SniklasIf the ID-type is
3226a8478f3Sniklas.Li IPV4_ADDR_SUBNET
3236a8478f3Sniklasthis tag should exist and
3246a8478f3Sniklasbe a network subnet mask.
3256a8478f3Sniklas.It Em Name
3266a8478f3SniklasIf the ID-type is
3276a8478f3Sniklas.Li FQDN
3286a8478f3Sniklasor
3296a8478f3Sniklas.Li USER_FQDN ,
3306a8478f3Sniklasthis tag should exist and contain a domain name or a user@domain
3316a8478f3Sniklasstring respectively.
3326a8478f3Sniklas.El
333c5fe6c4eSniklas.It Em <ISAKMP-configuration>
334c5fe6c4eSniklas.Bl -tag -width 12n
335c5fe6c4eSniklas.It Em DOI
3369615e1d4SaaronThe domain of interpretation as given by the RFCs.
3379615e1d4SaaronNormally
338c5fe6c4eSniklas.Li IPSEC .
339b57b191eSniklasIf unspecified, defaults to
340b57b191eSniklas.Li IPSEC .
341c5fe6c4eSniklas.It Em EXCHANGE_TYPE
3429615e1d4SaaronThe exchange type as given by the RFCs.
3439615e1d4SaaronFor main mode this is
3449f078bd8Sniklas.Li ID_PROT
3459f078bd8Sniklasand for aggressive mode it is
3469f078bd8Sniklas.Li AGGRESSIVE .
347c5fe6c4eSniklas.It Em Transforms
348c5fe6c4eSniklasA list of proposed transforms to use for protecting the
3499615e1d4SaaronISAKMP traffic.
3509615e1d4SaaronThese are actually names for sections
3519615e1d4Saaronfurther describing the transforms.
3529615e1d4SaaronLook at <ISAKMP-transform> below.
353c5fe6c4eSniklas.El
354c5fe6c4eSniklas.It Em <ISAKMP-transform>
355c5fe6c4eSniklas.Bl -tag -width 12n
356c5fe6c4eSniklas.It Em ENCRYPTION_ALGORITHM
357850f7173SniklasThe encryption algorithm as the RFCs name it, or ANY to denote that any
358850f7173Sniklasencryption algorithm proposed will be accepted.
359c5fe6c4eSniklas.It Em KEY_LENGTH
360c5fe6c4eSniklasFor encryption algorithms with variable key length, this is
3619615e1d4Saaronwhere the offered/accepted keylengths are described.
3629615e1d4SaaronThe value is of the offer-accept kind described above.
363c5fe6c4eSniklas.It Em HASH_ALGORITHM
364850f7173SniklasThe hash algorithm as the RFCs name it, or ANY.
365c5fe6c4eSniklas.It Em AUTHENTICATION_METHOD
366850f7173SniklasThe authentication method as the RFCs name it, or ANY.
367c5fe6c4eSniklas.It Em GROUP_DESCRIPTION
3689615e1d4SaaronThe group used for Diffie-Hellman exponentiations, or ANY.
3699615e1d4SaaronThe name are symbolic, like
370c5fe6c4eSniklas.Li MODP_768 , MODP_1024 , EC_155
371c5fe6c4eSniklasand
372c5fe6c4eSniklas.Li EC_185 .
373850f7173Sniklas.It Em PRF
374850f7173SniklasThe algorithm to use for the keyed pseudo-random function (used for key
375850f7173Sniklasderivation and authentication in Phase 1), or ANY.
376c5fe6c4eSniklas.It Em Life
3774aac73a4SaaronA list of lifetime descriptions, or ANY.
3784aac73a4SaaronIn the former case, each
379850f7173Sniklaselement is in itself a name of the section that defines the lifetime.
3804aac73a4SaaronLook at <Lifetime> below.
3814aac73a4SaaronIf it is set to ANY, then any type of
382850f7173Sniklasproposed lifetime type and value will be accepted.
383c5fe6c4eSniklas.El
384c5fe6c4eSniklas.It Em <Lifetime>
385c5fe6c4eSniklas.Bl -tag -width 12n
386c5fe6c4eSniklas.It Em LIFE_TYPE
387c5fe6c4eSniklas.Li SECONDS
388c5fe6c4eSniklasor
389c5fe6c4eSniklas.Li BYTES
3904aac73a4Saarondepending on the type of the duration.
3914aac73a4SaaronNotice that this field may NOT be set to ANY.
392c5fe6c4eSniklas.It Em LIFE_DURATION
3934aac73a4SaaronAn offer/accept kind of value, see above.
3944aac73a4SaaronCan also be set to ANY.
395c5fe6c4eSniklas.El
396c5fe6c4eSniklas.It Em <IPSec-connection>
397c5fe6c4eSniklas.Bl -tag -width 12n
398c5fe6c4eSniklas.It Em Phase
399c5fe6c4eSniklasThe constant
400c5fe6c4eSniklas.Li 2 ,
401c5fe6c4eSniklasas ISAKMP-peers and IPSec-connections
402c5fe6c4eSniklasreally are handled by the same code inside isakmpd.
403c5fe6c4eSniklas.It Em ISAKMP-peer
404c5fe6c4eSniklasThe name of the ISAKMP-peer which to talk to in order to
4059615e1d4Saaronset up this connection.
4069615e1d4SaaronThe value is the name of an <ISAKMP-peer> section.
4079615e1d4SaaronSee above.
408c5fe6c4eSniklas.It Em Configuration
4099615e1d4SaaronThe name of the IPSec-configuration section to use.
4109615e1d4SaaronLook at <IPSec-configuration> below.
411c5fe6c4eSniklas.It Em Local-ID
412c5fe6c4eSniklasIf existent, the name of the section that describes the
413c5fe6c4eSniklasoptional local client ID that we should present to our peer.
41480baf197SniklasIt is also used when we act as responders to find out what
41580baf197Sniklas<IPSec-connection> we are dealing with.
416c5fe6c4eSniklasLook at <IPSec-ID> below.
417c5fe6c4eSniklas.It Em Remote-ID
418c5fe6c4eSniklasIf existent, the name of the section that describes the
419c5fe6c4eSniklasoptional remote client ID that we should present to our peer.
42080baf197SniklasIt is also used when we act as responders to find out what
42180baf197Sniklas<IPSec-connection> we are dealing with.
422c5fe6c4eSniklasLook at <IPSec-ID> below.
42313a99464Sniklas.It Em Flags
42413a99464SniklasA comma-separated list of flags controlling the further
4259615e1d4Saaronhandling of the IPSec SA.
4269615e1d4SaaronCurrently only one flag is defined:
42780baf197Sniklas.Bl -tag -width 12n
42880baf197Sniklas.It Em Active-only
42980baf197SniklasIf this flag is given and this <IPSec-connection> is part of the phase 2
43080baf197Sniklasconnections we automatically keep up, it will not automatically be used for
43180baf197Sniklasaccepting connections from the peer.
43280baf197Sniklas.El
433c5fe6c4eSniklas.El
434c5fe6c4eSniklas.It Em <IPSec-configuration>
435c5fe6c4eSniklas.Bl -tag -width 12n
436c5fe6c4eSniklas.It Em DOI
4379615e1d4SaaronThe domain of interpretation as given by the RFCs.
4389615e1d4SaaronNormally
439c5fe6c4eSniklas.Li IPSEC .
440b57b191eSniklasIf unspecified, defaults to
441b57b191eSniklas.Li IPSEC .
442c5fe6c4eSniklas.It Em EXCHANGE_TYPE
4439615e1d4SaaronThe exchange type as given by the RFCs.
4449615e1d4SaaronFor quick mode this is
445c5fe6c4eSniklas.Li QUICK_MODE .
446c5fe6c4eSniklas.It Em Suites
4473b2a0cf1SaaronA list of protection suites (bundles of protocols) usable for
4489615e1d4Saaronprotecting the IP traffic.
4499615e1d4SaaronEach of the list elements is a name of an <IPSec-suite> section.
4509615e1d4SaaronSee below.
451c5fe6c4eSniklas.El
452c5fe6c4eSniklas.It Em <IPSec-suite>
453c5fe6c4eSniklas.Bl -tag -width 12n
454c5fe6c4eSniklas.It Em Protocols
455c5fe6c4eSniklasA list of the protocols included in this protection suite.
456c5fe6c4eSniklasEach of the list elements is a name of an <IPSec-protocol>
4579615e1d4Saaronsection.
4589615e1d4SaaronSee below.
459c5fe6c4eSniklas.El
460c5fe6c4eSniklas.It Em <IPSec-protocol>
461c5fe6c4eSniklas.Bl -tag -width 12n
462c5fe6c4eSniklas.It Em PROTOCOL_ID
4639615e1d4SaaronThe protocol as given by the RFCs.
4649615e1d4SaaronAcceptable values today are
465c5fe6c4eSniklas.Li IPSEC_AH
466c5fe6c4eSniklasand
467c5fe6c4eSniklas.Li IPSEC_ESP .
468c5fe6c4eSniklas.It Em Transforms
4693b2a0cf1SaaronA list of transforms usable for implementing the protocol.
470c5fe6c4eSniklasEach of the list elements is a name of an <IPSec-transform>
4719615e1d4Saaronsection.
4729615e1d4SaaronSee below.
473c5fe6c4eSniklas.It Em ReplayWindow
4749615e1d4SaaronThe size of the window used for replay protection.
4759615e1d4SaaronThis is normally left alone.
4769615e1d4SaaronLook at the
477c5fe6c4eSniklas.Nm ESP
478c5fe6c4eSniklasand
479c5fe6c4eSniklas.Nm AH
480c5fe6c4eSniklasRFCs for a better description.
481c5fe6c4eSniklas.El
482c5fe6c4eSniklas.It Em <IPSec-transform>
483c5fe6c4eSniklas.Bl -tag -width 12n
484c5fe6c4eSniklas.It Em TRANSFORM_ID
485c5fe6c4eSniklasThe transform ID as given by the RFCs.
486c5fe6c4eSniklas.It Em ENCAPSULATION_MODE
4879615e1d4SaaronThe encapsulation mode as given by the RFCs.
4889615e1d4SaaronThis means TRANSPORT or TUNNEL.
489c5fe6c4eSniklas.It Em AUTHENTICATION_ALGORITHM
490c5fe6c4eSniklasThe optional authentication algorithm in the case of this
491c5fe6c4eSniklasbeing an ESP transform.
492c5fe6c4eSniklas.It Em GROUP_DESCRIPTION
493c5fe6c4eSniklasAn optional (provides PFS if present) Diffie-Hellman group
4949615e1d4Saarondescription.
4959615e1d4SaaronThe values are the same as GROUP_DESCRIPTION's
496c5fe6c4eSniklasin <ISAKMP-transform> sections shown above.
497c5fe6c4eSniklas.It Em Life
498c5fe6c4eSniklasList of lifetimes, each element is a <Lifetime> section name.
499c5fe6c4eSniklas.El
500c5fe6c4eSniklas.It Em <IPSec-ID>
501c5fe6c4eSniklas.Bl -tag -width 12n
502c5fe6c4eSniklas.It Em ID-type
5039615e1d4SaaronThe ID type as given by the RFCs.
5049615e1d4SaaronFor IPSec this is currently
505c5fe6c4eSniklas.Li IPV4_ADDR
506c5fe6c4eSniklasor
507c5fe6c4eSniklas.Li IPV4_ADDR_SUBNET .
508c5fe6c4eSniklas.It Em Address
509c5fe6c4eSniklasIf the ID-type is
510c5fe6c4eSniklas.Li IPV4_ADDR ,
511c5fe6c4eSniklasthis tag should exist and be an IP-address.
512c5fe6c4eSniklas.It Em Network
513c5fe6c4eSniklasIf the ID-type is
514c5fe6c4eSniklas.Li IPV4_ADDR_SUBNET
515c5fe6c4eSniklasthis tag should exist and
516c5fe6c4eSniklasbe a network address.
517c5fe6c4eSniklas.It Em Netmask
518c5fe6c4eSniklasIf the ID-type is
519c5fe6c4eSniklas.Li IPV4_ADDR_SUBNET
520c5fe6c4eSniklasthis tag should exist and
521c5fe6c4eSniklasbe a network subnet mask.
522c5fe6c4eSniklas.El
523c5fe6c4eSniklas.El
5242040585eSniklas.Sh EXAMPLE
5252040585eSniklasAn example of a configuration file:
5262040585eSniklas.Pp
5272040585eSniklas.Bd -literal
5282040585eSniklas# A configuration sample for the isakmpd ISAKMP/Oakley (aka IKE) daemon.
5292040585eSniklas
5302040585eSniklas[General]
531c5fe6c4eSniklasListen-on=		10.1.0.2
5322040585eSniklas
533c5fe6c4eSniklas# Incoming phase 1 negotiations are multiplexed on the source IP address
5342b81057dSniklas[Phase 1]
535c5fe6c4eSniklas10.1.0.1=		ISAKMP-peer-west
5362b81057dSniklas
537c5fe6c4eSniklas# These connections are walked over after config file parsing and told
538c5fe6c4eSniklas# to the application layer so that it will inform us when traffic wants to
539c5fe6c4eSniklas# pass over them.  This means we can do on-demand keying.
540c5fe6c4eSniklas[Phase 2]
541c5fe6c4eSniklasConnections=		IPsec-east-west
542c5fe6c4eSniklas
543cc3c8b42Sniklas# Default values are commented out.
544c5fe6c4eSniklas[ISAKMP-peer-west]
5452b81057dSniklasPhase=			1
546cc3c8b42Sniklas#Transport=		udp
547f6dd85a7SniklasLocal-address=		10.1.0.2
5482b81057dSniklasAddress=		10.1.0.1
5492b81057dSniklas#Port=			isakmp
5502b81057dSniklas#Port=			500
5512b81057dSniklasConfiguration=		Default-main-mode
5522b81057dSniklasAuthentication=		mekmitasdigoat
553cc3c8b42Sniklas#Flags=
5542b81057dSniklas
555c5fe6c4eSniklas[IPsec-east-west]
5562b81057dSniklasPhase=			2
557c5fe6c4eSniklasISAKMP-peer=		ISAKMP-peer-west
5582b81057dSniklasConfiguration=		Default-quick-mode
559c5fe6c4eSniklasLocal-ID=		Net-east
560c5fe6c4eSniklasRemote-ID=		Net-west
561cc3c8b42Sniklas#Flags=
5622b81057dSniklas
563c5fe6c4eSniklas[Net-west]
5642b81057dSniklasID-type=		IPV4_ADDR_SUBNET
5652b81057dSniklasNetwork=		192.168.1.0
5662b81057dSniklasNetmask=		255.255.255.0
5672b81057dSniklas
568c5fe6c4eSniklas[Net-east]
5692b81057dSniklasID-type=		IPV4_ADDR_SUBNET
5702b81057dSniklasNetwork=		192.168.2.0
5712b81057dSniklasNetmask=		255.255.255.0
5722b81057dSniklas
5732b81057dSniklas# Main mode descriptions
5742b81057dSniklas
5752b81057dSniklas[Default-main-mode]
5762b81057dSniklasEXCHANGE_TYPE=		ID_PROT
5772b81057dSniklasTransforms=		3DES-SHA
5782b81057dSniklas
57952e712aeSniklas# Quick mode descriptions
58052e712aeSniklas
58152e712aeSniklas[Default-quick-mode]
58252e712aeSniklasEXCHANGE_TYPE=		QUICK_MODE
58352e712aeSniklasSuites=			QM-ESP-3DES-SHA-PFS-SUITE,QM-ESP-DES-MD5-SUITE
58452e712aeSniklas
58552e712aeSniklas#
58652e712aeSniklas# #####################################################################
58752e712aeSniklas# All configration data below this point is not required as the example
58852e712aeSniklas# uses the predefined Main Mode transform and Quick Mode suite names.
58952e712aeSniklas# It is included here for completeness. Note the default values for the
59052e712aeSniklas# [General] and [X509-certificates] sections just below.
59152e712aeSniklas# #####################################################################
59252e712aeSniklas#
59352e712aeSniklas
59452e712aeSniklas[General]
59552e712aeSniklasPolicy-File=		/etc/isakmpd/isakmpd.policy
59652e712aeSniklasRetransmits=		3
59752e712aeSniklasExchange-max-time=	120
59852e712aeSniklas
599b57b191eSniklas# KeyNote credential storage
600b57b191eSniklas[KeyNote]
601b57b191eSniklasCredential-directory=	/etc/isakmpd/keynote/
602b57b191eSniklas
603fb1921ccSniklas# Certificates stored in PEM format
604fb1921ccSniklas[X509-certificates]
605fb1921ccSniklasCA-directory=           /etc/isakmpd/ca/
606fb1921ccSniklasCert-directory=         /etc/isakmpd/certs/
607954b1b31SniklasPrivate-key=		/etc/isakmpd/private/local.key
608fb1921ccSniklas
6092b81057dSniklas# Main mode transforms
6102b81057dSniklas######################
6112b81057dSniklas
6122b81057dSniklas# DES
6132040585eSniklas
6142040585eSniklas[DES-MD5]
6152040585eSniklasENCRYPTION_ALGORITHM=	DES_CBC
6162040585eSniklasHASH_ALGORITHM=		MD5
6172040585eSniklasAUTHENTICATION_METHOD=	PRE_SHARED
6182040585eSniklasGROUP_DESCRIPTION=	MODP_768
6192b81057dSniklasLife=			LIFE_600_SECS,LIFE_1000_KB
6202b81057dSniklas
6212b81057dSniklas[DES-MD5-NO-VOL-LIFE]
6222b81057dSniklasENCRYPTION_ALGORITHM=	DES_CBC
6232b81057dSniklasHASH_ALGORITHM=		MD5
6242b81057dSniklasAUTHENTICATION_METHOD=	PRE_SHARED
6252b81057dSniklasGROUP_DESCRIPTION=	MODP_768
626d70ca5f7SniklasLife=			LIFE_600_SECS
6272040585eSniklas
6282b81057dSniklas[DES-SHA]
6292b81057dSniklasENCRYPTION_ALGORITHM=	DES_CBC
6302b81057dSniklasHASH_ALGORITHM=		SHA
6312b81057dSniklasAUTHENTICATION_METHOD=	PRE_SHARED
6322b81057dSniklasGROUP_DESCRIPTION=	MODP_768
6332b81057dSniklasLife=			LIFE_600_SECS,LIFE_1000_KB
6342b81057dSniklas
6352b81057dSniklas# 3DES
6362b81057dSniklas
6372b81057dSniklas[3DES-SHA]
6382b81057dSniklasENCRYPTION_ALGORITHM=	3DES_CBC
6392040585eSniklasHASH_ALGORITHM=		SHA
6402040585eSniklasAUTHENTICATION_METHOD=	PRE_SHARED
6412040585eSniklasGROUP_DESCRIPTION=	MODP_1024
642f6dd85a7SniklasLife=			LIFE_3600_SECS
6432b81057dSniklas
6442b81057dSniklas# Blowfish
6452b81057dSniklas
6462b81057dSniklas[BLF-SHA-M1024]
6472b81057dSniklasENCRYPTION_ALGORITHM=	BLOWFISH_CBC
6482b81057dSniklasKEY_LENGTH=		128,96:192
6492b81057dSniklasHASH_ALGORITHM=		SHA
6502b81057dSniklasAUTHENTICATION_METHOD=	PRE_SHARED
6512b81057dSniklasGROUP_DESCRIPTION=	MODP_1024
6522b81057dSniklasLife=			LIFE_600_SECS,LIFE_1000_KB
6532040585eSniklas
6542040585eSniklas[BLF-SHA-EC155]
655d70ca5f7SniklasENCRYPTION_ALGORITHM=	BLOWFISH_CBC
6562b81057dSniklasKEY_LENGTH=		128,96:192
6572040585eSniklasHASH_ALGORITHM=		SHA
6582040585eSniklasAUTHENTICATION_METHOD=	PRE_SHARED
6592040585eSniklasGROUP_DESCRIPTION=	EC2N_155
6602b81057dSniklasLife=			LIFE_600_SECS,LIFE_1000_KB
6612b81057dSniklas
6622b81057dSniklas[BLF-MD5-EC155]
6632b81057dSniklasENCRYPTION_ALGORITHM=	BLOWFISH_CBC
6642b81057dSniklasKEY_LENGTH=		128,96:192
6652b81057dSniklasHASH_ALGORITHM=		MD5
6662b81057dSniklasAUTHENTICATION_METHOD=	PRE_SHARED
6672b81057dSniklasGROUP_DESCRIPTION=	EC2N_155
6682b81057dSniklasLife=			LIFE_600_SECS,LIFE_1000_KB
6692040585eSniklas
6702040585eSniklas[BLF-SHA-EC185]
671d70ca5f7SniklasENCRYPTION_ALGORITHM=	BLOWFISH_CBC
6722b81057dSniklasKEY_LENGTH=		128,96:192
6732040585eSniklasHASH_ALGORITHM=		SHA
6742040585eSniklasAUTHENTICATION_METHOD=	PRE_SHARED
6752040585eSniklasGROUP_DESCRIPTION=	EC2N_185
6762b81057dSniklasLife=			LIFE_600_SECS,LIFE_1000_KB
6772040585eSniklas
6782b81057dSniklas# Quick mode protection suites
6792b81057dSniklas##############################
6802b81057dSniklas
6812b81057dSniklas# DES
6822040585eSniklas
683d70ca5f7Sniklas[QM-ESP-DES-SUITE]
684d70ca5f7SniklasProtocols=		QM-ESP-DES
685d70ca5f7Sniklas
6862b81057dSniklas[QM-ESP-DES-PFS-SUITE]
6872b81057dSniklasProtocols=		QM-ESP-DES-PFS
6882b81057dSniklas
6892040585eSniklas[QM-ESP-DES-MD5-SUITE]
6902040585eSniklasProtocols=		QM-ESP-DES-MD5
6912040585eSniklas
6922b81057dSniklas[QM-ESP-DES-MD5-PFS-SUITE]
6932b81057dSniklasProtocols=		QM-ESP-DES-MD5-PFS
6942040585eSniklas
6952b81057dSniklas[QM-ESP-DES-SHA-SUITE]
6962b81057dSniklasProtocols=		QM-ESP-DES-SHA
6972040585eSniklas
6982b81057dSniklas[QM-ESP-DES-SHA-PFS-SUITE]
6992b81057dSniklasProtocols=		QM-ESP-DES-SHA-PFS
7002040585eSniklas
7012b81057dSniklas# 3DES
7022b81057dSniklas
7032b81057dSniklas[QM-ESP-3DES-SHA-SUITE]
7042b81057dSniklasProtocols=		QM-ESP-3DES-SHA
7052b81057dSniklas
7062b81057dSniklas[QM-ESP-3DES-SHA-PFS-SUITE]
7072b81057dSniklasProtocols=		QM-ESP-3DES-SHA-PFS
7082b81057dSniklas
709bfc24386Sniklas# AES
710bfc24386Sniklas
711bfc24386Sniklas[QM-ESP-AES-SHA-SUITE]
712bfc24386SniklasProtocols=              QM-ESP-AES-SHA
713bfc24386Sniklas
714bfc24386Sniklas[QM-ESP-3DES-SHA-PFS-SUITE]
715bfc24386SniklasProtocols=              QM-ESP-AES-SHA-PFS
716bfc24386Sniklas
7172b81057dSniklas# AH
7182b81057dSniklas
7192b81057dSniklas[QM-AH-MD5-SUITE]
7202b81057dSniklasProtocols=		QM-AH-MD5
7212b81057dSniklas
7222b81057dSniklas[QM-AH-MD5-PFS-SUITE]
7232b81057dSniklasProtocols=		QM-AH-MD5-PFS
7242b81057dSniklas
7252b81057dSniklas# AH + ESP
7262040585eSniklas
7272040585eSniklas[QM-AH-MD5-ESP-DES-SUITE]
7282040585eSniklasProtocols=		QM-AH-MD5,QM-ESP-DES
7292040585eSniklas
7302b81057dSniklas[QM-AH-MD5-ESP-DES-MD5-SUITE]
7312b81057dSniklasProtocols=		QM-AH-MD5,QM-ESP-DES-MD5
7322040585eSniklas
7332b81057dSniklas[QM-ESP-DES-MD5-AH-MD5-SUITE]
7342b81057dSniklasProtocols=		QM-ESP-DES-MD5,QM-AH-MD5
7352b81057dSniklas
7362b81057dSniklas# Quick mode protocols
7372b81057dSniklas
7382b81057dSniklas# DES
7392040585eSniklas
7402040585eSniklas[QM-ESP-DES]
7412040585eSniklasPROTOCOL_ID=		IPSEC_ESP
7422040585eSniklasTransforms=		QM-ESP-DES-XF
7432040585eSniklas
7442b81057dSniklas[QM-ESP-DES-MD5]
7452b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
7462b81057dSniklasTransforms=		QM-ESP-DES-MD5-XF
7472b81057dSniklas
7482b81057dSniklas[QM-ESP-DES-MD5-PFS]
7492b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
7502b81057dSniklasTransforms=		QM-ESP-DES-MD5-PFS-XF
7512b81057dSniklas
7522b81057dSniklas[QM-ESP-DES-SHA]
7532b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
7542b81057dSniklasTransforms=		QM-ESP-DES-SHA-XF
7552b81057dSniklas
7562b81057dSniklas# 3DES
7572b81057dSniklas
7582b81057dSniklas[QM-ESP-3DES-SHA]
7592b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
7602b81057dSniklasTransforms=		QM-ESP-3DES-SHA-XF
7612b81057dSniklas
7622b81057dSniklas[QM-ESP-3DES-SHA-PFS]
7632b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
7642b81057dSniklasTransforms=		QM-ESP-3DES-SHA-PFS-XF
7652b81057dSniklas
7662b81057dSniklas[QM-ESP-3DES-SHA-TRP]
7672b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
7682b81057dSniklasTransforms=		QM-ESP-3DES-SHA-TRP-XF
7692b81057dSniklas
770bfc24386Sniklas# AES
771bfc24386Sniklas
772bfc24386Sniklas[QM-ESP-AES-SHA]
773bfc24386SniklasPROTOCOL_ID=		IPSEC_ESP
774bfc24386SniklasTransforms=		QM-ESP-AES-SHA-XF
775bfc24386Sniklas
776bfc24386Sniklas[QM-ESP-AES-SHA-PFS]
777bfc24386SniklasPROTOCOL_ID=		IPSEC_ESP
778bfc24386SniklasTransforms=		QM-ESP-AES-SHA-PFS-XF
779bfc24386Sniklas
780bfc24386Sniklas[QM-ESP-AES-SHA-TRP]
781bfc24386SniklasPROTOCOL_ID=		IPSEC_ESP
782bfc24386SniklasTransforms=		QM-ESP-AES-SHA-TRP-XF
783bfc24386Sniklas
7842b81057dSniklas# AH MD5
7852b81057dSniklas
7862b81057dSniklas[QM-AH-MD5]
7872b81057dSniklasPROTOCOL_ID=		IPSEC_AH
7882b81057dSniklasTransforms=		QM-AH-MD5-XF
7892b81057dSniklas
7902b81057dSniklas[QM-AH-MD5-PFS]
7912b81057dSniklasPROTOCOL_ID=		IPSEC_AH
7922b81057dSniklasTransforms=		QM-AH-MD5-PFS-XF
7932b81057dSniklas
7942b81057dSniklas# Quick mode transforms
7952b81057dSniklas
7962b81057dSniklas# ESP DES+MD5
7972b81057dSniklas
7982040585eSniklas[QM-ESP-DES-XF]
7992040585eSniklasTRANSFORM_ID=		DES
8002040585eSniklasENCAPSULATION_MODE=	TUNNEL
8012b81057dSniklasLife=			LIFE_600_SECS
8022040585eSniklas
8032b81057dSniklas[QM-ESP-DES-MD5-XF]
8042b81057dSniklasTRANSFORM_ID=		DES
8052b81057dSniklasENCAPSULATION_MODE=	TUNNEL
8062b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_MD5
8072b81057dSniklasLife=			LIFE_600_SECS
8082b81057dSniklas
8092b81057dSniklas[QM-ESP-DES-MD5-PFS-XF]
8102b81057dSniklasTRANSFORM_ID=		DES
8112b81057dSniklasENCAPSULATION_MODE=	TUNNEL
8122b81057dSniklasGROUP_DESCRIPTION=	MODP_768
8132b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_MD5
8142b81057dSniklasLife=			LIFE_600_SECS
8152b81057dSniklas
8162b81057dSniklas[QM-ESP-DES-SHA-XF]
8172b81057dSniklasTRANSFORM_ID=		DES
8182b81057dSniklasENCAPSULATION_MODE=	TUNNEL
8192b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
8202b81057dSniklasLife=			LIFE_600_SECS
8212b81057dSniklas
8222b81057dSniklas# 3DES
8232b81057dSniklas
8242b81057dSniklas[QM-ESP-3DES-SHA-XF]
8252b81057dSniklasTRANSFORM_ID=		3DES
8262b81057dSniklasENCAPSULATION_MODE=	TUNNEL
8272b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
8282b81057dSniklasLife=			LIFE_600_SECS
8292b81057dSniklas
8302b81057dSniklas[QM-ESP-3DES-SHA-PFS-XF]
8312b81057dSniklasTRANSFORM_ID=		3DES
8322b81057dSniklasENCAPSULATION_MODE=	TUNNEL
8332b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
8342b81057dSniklasGROUP_DESCRIPTION=	MODP_1024
8352b81057dSniklasLife=			LIFE_600_SECS
8362b81057dSniklas
8372b81057dSniklas[QM-ESP-3DES-SHA-TRP-XF]
8382b81057dSniklasTRANSFORM_ID=		3DES
8392b81057dSniklasENCAPSULATION_MODE=	TRANSPORT
8402b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
8412b81057dSniklasLife=			LIFE_600_SECS
8422b81057dSniklas
843bfc24386Sniklas# AES
844bfc24386Sniklas
845bfc24386Sniklas[QM-ESP-AES-SHA-XF]
846bfc24386SniklasTRANSFORM_ID=		AES
847bfc24386SniklasENCAPSULATION_MODE=	TUNNEL
848bfc24386SniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
849bfc24386SniklasLife=			LIFE_600_SECS
850bfc24386Sniklas
851bfc24386Sniklas[QM-ESP-AES-SHA-PFS-XF]
852bfc24386SniklasTRANSFORM_ID=		AES
853bfc24386SniklasENCAPSULATION_MODE=	TUNNEL
854bfc24386SniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
855bfc24386SniklasGROUP_DESCRIPTION=	MODP_1024
856bfc24386SniklasLife=			LIFE_600_SECS
857bfc24386Sniklas
858bfc24386Sniklas[QM-ESP-AES-SHA-TRP-XF]
859bfc24386SniklasTRANSFORM_ID=		AES
860bfc24386SniklasENCAPSULATION_MODE=	TRANSPORT
861bfc24386SniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
862bfc24386SniklasLife=			LIFE_600_SECS
863bfc24386Sniklas
8642b81057dSniklas# AH
8652b81057dSniklas
8662b81057dSniklas[QM-AH-MD5-XF]
8672b81057dSniklasTRANSFORM_ID=		MD5
8682b81057dSniklasENCAPSULATION_MODE=	TUNNEL
8692b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_MD5
8702b81057dSniklasLife=			LIFE_600_SECS
8712b81057dSniklas
8722b81057dSniklas[QM-AH-MD5-PFS-XF]
8732b81057dSniklasTRANSFORM_ID=		MD5
8742b81057dSniklasENCAPSULATION_MODE=	TUNNEL
8752b81057dSniklasGROUP_DESCRIPTION=	MODP_768
8762b81057dSniklasLife=			LIFE_600_SECS
8772b81057dSniklas
8782b81057dSniklas[LIFE_600_SECS]
8792b81057dSniklasLIFE_TYPE=		SECONDS
8802b81057dSniklasLIFE_DURATION=		600,450:720
8812b81057dSniklas
8822b81057dSniklas[LIFE_3600_SECS]
8832b81057dSniklasLIFE_TYPE=		SECONDS
8842b81057dSniklasLIFE_DURATION=		3600,1800:7200
8852b81057dSniklas
8862b81057dSniklas[LIFE_1000_KB]
8872b81057dSniklasLIFE_TYPE=		KILOBYTES
8882b81057dSniklasLIFE_DURATION=		1000,768:1536
8892b81057dSniklas
8902b81057dSniklas[LIFE_32_MB]
8912b81057dSniklasLIFE_TYPE=		KILOBYTES
8922b81057dSniklasLIFE_DURATION=		32768,16384:65536
8932b81057dSniklas
8942b81057dSniklas[LIFE_4.5_GB]
8952b81057dSniklasLIFE_TYPE=		KILOBYTES
8962b81057dSniklasLIFE_DURATION=		4608000,4096000:8192000
8972040585eSniklas.Ed
898*a2067f52Sniklas.Sh BUGS
899*a2067f52Sniklas.Nm
900*a2067f52Sniklasdoes not currently verify the Remote-ID as specified in the
901*a2067f52SniklasISAKMP-peer section.
902*a2067f52SniklasIt is still possible to verify this through the policy file.
9032040585eSniklas.Sh SEE ALSO
904350bb3b8Salex.Xr ipsec 4 ,
905b57b191eSniklas.Xr keynote 1 ,
90630a2652aSniklas.Xr keynote 4 ,
90777725688Sniklas.Xr isakmpd.policy 5 ,
908350bb3b8Salex.Xr isakmpd 8
909