1*a2067f52Sniklas.\" $OpenBSD: isakmpd.conf.5,v 1.42 2000/10/16 23:28:22 niklas Exp $ 2*a2067f52Sniklas.\" $EOM: isakmpd.conf.5,v 1.52 2000/10/15 20:01:28 niklas Exp $ 32040585eSniklas.\" 444f0148dSniklas.\" Copyright (c) 1998, 1999, 2000 Niklas Hallqvist. All rights reserved. 5454bb6daSniklas.\" Copyright (c) 2000 H�kan Olsson. All rights reserved. 62040585eSniklas.\" 72040585eSniklas.\" Redistribution and use in source and binary forms, with or without 82040585eSniklas.\" modification, are permitted provided that the following conditions 92040585eSniklas.\" are met: 102040585eSniklas.\" 1. Redistributions of source code must retain the above copyright 112040585eSniklas.\" notice, this list of conditions and the following disclaimer. 122040585eSniklas.\" 2. Redistributions in binary form must reproduce the above copyright 132040585eSniklas.\" notice, this list of conditions and the following disclaimer in the 142040585eSniklas.\" documentation and/or other materials provided with the distribution. 152040585eSniklas.\" 3. All advertising materials mentioning features or use of this software 162040585eSniklas.\" must display the following acknowledgement: 172040585eSniklas.\" This product includes software developed by Ericsson Radio Systems. 182040585eSniklas.\" 4. The name of the author may not be used to endorse or promote products 192040585eSniklas.\" derived from this software without specific prior written permission. 202040585eSniklas.\" 212040585eSniklas.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 222040585eSniklas.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 232040585eSniklas.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 242040585eSniklas.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 252040585eSniklas.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 262040585eSniklas.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 272040585eSniklas.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 282040585eSniklas.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 292040585eSniklas.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 302040585eSniklas.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 312040585eSniklas.\" 322040585eSniklas.\" This code was written under funding by Ericsson Radio Systems. 332040585eSniklas.\" 342040585eSniklas.\" Manual page, using -mandoc macros 352040585eSniklas.\" 362040585eSniklas.Dd October 10, 1998 3758aefd4bSaaron.Dt ISAKMPD.CONF 5 382040585eSniklas.Os 392040585eSniklas.Sh NAME 402040585eSniklas.Nm isakmpd.conf 4158aefd4bSaaron.Nd configuration file for isakmpd 422040585eSniklas.Sh DESCRIPTION 4358aefd4bSaaron.Nm 4458aefd4bSaaronis the configuration file for the 452040585eSniklas.Nm isakmpd 462040585eSniklasdaemon managing security association and key management for the 4758aefd4bSaaronIPSEC layer of the kernel's networking stack. 482040585eSniklas.Pp 492040585eSniklasThe file is of a well known type of format called .INI style, named after 502040585eSniklasthe suffix used by an overrated windowing environment for its configuration 519615e1d4Saaronfiles. 529615e1d4SaaronThis format consists of sections, each beginning with a line looking like: 532040585eSniklas.Bd -literal 542040585eSniklas[Section name] 552040585eSniklas.Ed 562040585eSniklasBetween the brackets is the name of the section following this section header. 572040585eSniklasInside a section many tag/value pairs can be stored, each one looking like: 582040585eSniklas.Bd -literal 592040585eSniklasTag=Value 602040585eSniklas.Ed 612040585eSniklasIf the value needs more space than fits on a single line it's possible to 62*a2067f52Sniklascontinue it on the next by ending the first with a backslash character 639615e1d4Saaronimmediately before the newline character. 649615e1d4SaaronThis method can extend a value for an arbitrary amount of lines. 652040585eSniklas.Pp 6658aefd4bSaaronComments can be put anywhere in the file by using a hash mark 6758aefd4bSaaron.Pq Sq \&# . 6858aefd4bSaaronThen the comment goes on to the end of the line. 692040585eSniklas.Pp 70c5fe6c4eSniklasOften the right-hand side values consist of other section names. 71c5fe6c4eSniklasThis results in a tree structure. 72c5fe6c4eSniklasSome values are treated as a list of several scalar values, such lists always 739615e1d4Saaronuse comma as the separator. 749615e1d4SaaronSome values are formatted like this: X,Y:Z, which 75c5fe6c4eSniklasis an offer/accept syntax, where X is a value we offer and Y:Z is a range of 76c5fe6c4eSniklasaccepted values, inclusive. 77c5fe6c4eSniklas.Pp 7852e712aeSniklas.Ss Auto-generated parts of the configuration 7952e712aeSniklas.Pp 8052e712aeSniklasSome predefined section names are recognized by the daemon, voiding the need 8152e712aeSniklasto fully specify the Main Mode transforms and Quick Mode suites, protocols 8252e712aeSniklasand transforms. 8352e712aeSniklas.Pp 8452e712aeSniklasFor Main Mode: 8552e712aeSniklas.Bd -filled -offset indent -compact 8652e712aeSniklas.Ar {DES,BLF,3DES,CAST}-{MD5,SHA}[-{DSS,RSA_SIG}] 8752e712aeSniklas.Ed 8852e712aeSniklas.Pp 8952e712aeSniklasFor Quick Mode: 9052e712aeSniklas.Bd -filled -offset indent -compact 91*a2067f52Sniklas.Ar QM-{ESP,AH}[-TRP]-{DES,3DES,CAST,BLF,AES}[-{MD5,SHA,RIPEMD}][-PFS]-SUITE 9252e712aeSniklas.Ed 9352e712aeSniklas.Pp 9452e712aeSniklasExample 1: 3DES-SHA means; 3DES encryption, SHA hash, and authorization by 9552e712aeSniklaspre-shared keys. 9652e712aeSniklasExample 2: QM-ESP-3DES-SHA-PFS-SUITE means; ESP protocol, 3DES encryption, 9752e712aeSniklasSHA hash, and use Perfect Forward Security. 9852e712aeSniklas.Pp 9952e712aeSniklasThere are two predefined lifetimes used. The Main Mode lifetime, 10052e712aeSniklasnamed LIFE_MAIN_MODE, currently 10152e712aeSniklasdefaults to one hour (minimum 60 seconds, maximum 1 day). The Quick Mode 10252e712aeSniklaslifetime, 10352e712aeSniklasLIFE_QUICK_MODE, 10452e712aeSniklasdefaults to 20 minutes (minimum 60 seconds, maximum 1 day). 10552e712aeSniklas.Pp 10652e712aeSniklasIn addition, the predefinitions include some default values for the special 10752e712aeSniklassections "General", and "X509-certificates". These values are presented in 10852e712aeSniklasthe example below. 10952e712aeSniklas.Pp 11052e712aeSniklasNote that using the predefined section names imply some minor limitations. 11152e712aeSniklasThere are currently no predefined ESP+AH Quick Mode suites, and the 11252e712aeSniklasDiffie-Hellman group description for Main Mode (and Quick Mode with PFS) is 11352e712aeSniklasset to DH group 1 (MODP_768) when using MD5 hash, and DH group 2 (MODP_1024) 11452e712aeSniklaswhen using SHA hash. 11552e712aeSniklas.Pp 11652e712aeSniklasAll autogenerated values can be overridden by manual entries by using the 11752e712aeSniklassame section and tag names in the configuration file. 118b57b191eSniklas.Pp 119b57b191eSniklasIn particular, the default phase 1 (Main or Aggressive Mode) and phase 2 120b57b191eSniklas(Quick Mode) lifetimes can be overridden by these tags under the "General" 121b57b191eSniklassection; 122b57b191eSniklas.Pp 123b57b191eSniklas.Bd -literal 124b57b191eSniklas[General] 125b57b191eSniklasDefault-phase-1-lifetime= 3600,60:86400 126b57b191eSniklasDefault-phase-2-lifetime= 1200,60:86400 127b57b191eSniklas.Ed 12852e712aeSniklas.\"XXX Following empty .Ss works around a nroff bug, we want the new line." 12952e712aeSniklas.Ss 13052e712aeSniklas.Pp 131c5fe6c4eSniklas.Ss Roots 132c5fe6c4eSniklas.Bl -hang -width 12n 133c5fe6c4eSniklas.It Em General 134c5fe6c4eSniklasGeneric global configuration parameters 135c5fe6c4eSniklas.Bl -tag -width 12n 13680c8b3dbSniklas.It Em Policy-File 13780c8b3dbSniklasThe name of the file that contains 13880c8b3dbSniklas.Xr KeyNote 4 1394aac73a4Saaronpolicies. 1404aac73a4SaaronThe default is "/etc/isakmpd/isakmpd.policy". 141c5fe6c4eSniklas.It Em Retransmits 142c5fe6c4eSniklasHow many times should a message be retransmitted before giving up. 143b393bef8Sniklas.It Em Check-interval 144b393bef8SniklasThe interval between watchdog checks of connections we want up at all times. 145c5fe6c4eSniklas.It Em Exchange-max-time 146c5fe6c4eSniklasHow many seconds should an exchange maximally take to setup 147c5fe6c4eSniklasbefore we give up. 148c5fe6c4eSniklas.It Em Listen-on 1499615e1d4SaaronA list of IP-addresses OK to listen on. 1509615e1d4SaaronThis list is used as 151c5fe6c4eSniklasa filter for the set of addresses the interfaces configured 1529615e1d4Saaronprovides. 1539615e1d4SaaronThis means that we won't see if an address given 15480c8b3dbSniklashere does not exist on this host, and thus no error is given for 155c5fe6c4eSniklasthat case. 156463c7dc9Sniklas.It Em Shared-SADB 157463c7dc9SniklasIf this tag is defined, whatever the value is, some semantics of 158463c7dc9Sniklas.Nm 159463c7dc9Sniklasare changed so that multiple instances can run on top of one SADB 1609615e1d4Saaronand setup SAs with eachother. 1619615e1d4SaaronSpecifically this means replay 162463c7dc9Sniklasprotection will not be asked for, and errors that can occur when 163463c7dc9Sniklasupdating an SA with its parameters a 2nd time will be ignored. 164c5fe6c4eSniklas.El 165c5fe6c4eSniklas.It Em Phase 1 166c5fe6c4eSniklasISAKMP SA negotiation parameter root 167c5fe6c4eSniklas.Bl -tag -width 12n 168c5fe6c4eSniklas.It Em <IP-address> 1699615e1d4SaaronA name of the ISAKMP peer at the given IP-address. 170cc3c8b42Sniklas.It Em Default 171cc3c8b42SniklasA name of the default ISAKMP peer. Incoming 172cc3c8b42SniklasPhase 1 connections from other IP-addresses will use this peer name. 173cc3c8b42Sniklas.It "" 1749615e1d4SaaronThis name is used as the section name for further information to be found. 1759615e1d4SaaronLook at <ISAKMP-peer> below. 176c5fe6c4eSniklas.El 177c5fe6c4eSniklas.It Em Phase 2 178c5fe6c4eSniklasIPsec SA negotiation parameter root 179c5fe6c4eSniklas.Bl -tag -width 12n 180c5fe6c4eSniklas.It Em Connections 1812ddc24cbSniklasA list of directed IPSec "connection" names that should be brought up 1822ddc24cbSniklasautomatically, either on first use if the system supports it, or at 1839615e1d4Saaronstartup of the daemon. 1849615e1d4SaaronThese names are section names where further information can be found. 1859615e1d4SaaronLook at <IPSec-connection> below. 18680baf197SniklasNormally any connection mentioned here are treated as part of the 18780baf197Sniklas"Passive-connection" list we present below, however there is a 1889615e1d4Saaronflag: "Active-only" that disables this behaviour. 1899615e1d4SaaronThis too is mentioned in the <IPSec-connection> section, in the "Flags" tag. 19080baf197Sniklas.It Em Passive-connections 19180baf197SniklasA list of IPSec "connection" names we recognize and accept initiations for. 1929615e1d4SaaronThese names are section names where further information can be found. 1939615e1d4SaaronLook at <IPSec-connection> below. 1949615e1d4SaaronCurrently only the Local-ID and Remote-ID tags 19580baf197Sniklasare looked at in those sections, as they are matched against the IDs given 19680baf197Sniklasby the initiator. 197c5fe6c4eSniklas.El 198b57b191eSniklas.It Em KeyNote 199b57b191eSniklas.Bl -tag -width 12n 200b57b191eSniklas.It Em Credential-directory 201b57b191eSniklasA directory containing directories named after IDs (IP 202b57b191eSniklasaddresses, ``user@domain'', or hostnames) that contain files named 203b57b191eSniklas``credentials'' and ``private_key''. 204b57b191eSniklas.Pp 205b57b191eSniklasThe credentials file contains 206b57b191eSniklas.Xr keynote 4 207b57b191eSniklascredentials that are sent to a remote IKE daemon when we use the 208b57b191eSniklasassociated ID, or credentials that we may want to consider when doing 209b57b191eSniklasan exchange with a remote IKE daemon that uses that ID. Note that, in 210b57b191eSniklasthe former case, the last credential in the file MUST contain our 211b57b191eSniklaspublic key in its Licensees field. More than one credentials may exist 212b57b191eSniklasin the file. They are separated by whitelines (the format is 213b57b191eSniklasessentially the same as that of the policy file). The credentials are 214b57b191eSniklasof the same format as the policies described in 215b57b191eSniklas.Xr isakmpd.policy 5 . 216b57b191eSniklasThe only difference is that the Authorizer field contains a public 217b57b191eSniklaskey, and the assertion is signed. Signed assertions can be generated 218b57b191eSniklasusing the 219b57b191eSniklas.Xr keynote 1 220b57b191eSniklasutility. 221b57b191eSniklas.Pp 222b57b191eSniklasThe private_key file contains the private RSA key we use for 223b57b191eSniklasauthentication. If the directory (and the files) exist, they take 224b57b191eSniklasprecedence over X509-based authentication. 225b57b191eSniklas.El 226fb1921ccSniklas.It Em X509-Certificates 227fb1921ccSniklas.Bl -tag -width 12n 228fb1921ccSniklas.It Em Ca-directory 229fb1921ccSniklasA directory containing PEM certificates of certification authorities 230e5814869Sangelosthat we trust to sign other certificates. Note that for a CA to be 231e5814869Sangelosreally trusted, it needs to be somehow referred to by policy, in 232e5814869Sangelos.Xr isakmpd.policy 5 . 233e5814869SangelosThe certificates in this directory are used for the actual X.509 234e5814869Sangelosauthentication and for cross-referencing policies that refer to 235e5814869SangelosDistinguished Names (DNs). Keeping a separate directory (as opposed 236e5814869Sangelosto integrating policies and X.509 CA certificates) allows for maintenance 237e5814869Sangelosof a list of "well known" CAs without actually having to trust all (or any) 238e5814869Sangelosof them. 239fb1921ccSniklas.It Em Cert-directory 240fb1921ccSniklasA directory containing PEM certificates that we trust to be valid. 241fb1921ccSniklasThese certificates are used in preference to those passed in messages and 242fb1921ccSniklasare required to have a SubjectAltName extension. 243fb1921ccSniklas.It Em Accept-self-signed 244fb1921ccSniklasIf this tag is defined, whatever the value is, certificates that 245fb1921ccSniklasdo not originate from a trusted CA but are self-signed will be 246fb1921ccSniklasaccepted. 247954b1b31Sniklas.It Em Private-key 248954b1b31SniklasThe private key matching the public key of our certificate (which should be 249954b1b31Sniklasin the "Cert-directory", and have a subjectAltName matching our ID, so far 250954b1b31Sniklasthat is our IP-address). 251fb1921ccSniklas.El 252c5fe6c4eSniklas.El 253c5fe6c4eSniklas.Ss Referred-to sections 254c5fe6c4eSniklas.Bl -hang -width 12n 255c5fe6c4eSniklas.It Em <ISAKMP-peer> 256c5fe6c4eSniklasParameters for negotiation with an ISAKMP peer 257c5fe6c4eSniklas.Bl -tag -width 12n 258c5fe6c4eSniklas.It Em Phase 259c5fe6c4eSniklasThe constant 260c5fe6c4eSniklas.Li 1 , 261c5fe6c4eSniklasas ISAKMP-peers and IPSec-connections 262c5fe6c4eSniklasreally are handled by the same code inside isakmpd. 263c5fe6c4eSniklas.It Em Transport 264cc3c8b42SniklasThe name of the transport protocol, defaults to 265cc3c8b42Sniklas.Li UDP . 266cc3c8b42Sniklas.It Em Port 267cc3c8b42SniklasIn case of 268cc3c8b42Sniklas.Li UDP , 269cc3c8b42Sniklasthe 270cc3c8b42Sniklas.Li UDP 271cc3c8b42Sniklasport number to send to. 272cc3c8b42SniklasThis is optional, the 273cc3c8b42Sniklasdefault value is 500 which is the IANA-registered number for ISAKMP. 274*a2067f52Sniklas.It Em Local-address 275e2220ba8SniklasThe Local IP-address to use, if we are multi-homed, or have aliases. 276c5fe6c4eSniklas.It Em Address 277cc3c8b42SniklasIf existent, the IP-address of the peer. 278c5fe6c4eSniklas.It Em Configuration 2799615e1d4SaaronThe name of the ISAKMP-configuration section to use. 2809615e1d4SaaronLook at <ISAKMP-configuration> below. 281c5fe6c4eSniklas.It Em Authentication 282cc3c8b42SniklasIf existent, authentication data for this specific peer. 2839615e1d4SaaronIn the case of preshared key, this is the key value itself. 2846a8478f3Sniklas.It Em ID 2856a8478f3SniklasIf existent, the name of the section that describes the 2864aac73a4Saaronlocal client ID that we should present to our peer. 2874aac73a4SaaronIf not present, it 2886a8478f3Sniklasdefaults to the address of the local interface we are sending packets 2894aac73a4Saaronover to the remote daemon. 2904aac73a4SaaronLook at <Phase1-ID> below. 291*a2067f52Sniklas.It Em Remote-ID 292*a2067f52SniklasIf existent, the name of the section that describes the remote client 293*a2067f52SniklasID we expect the remote daemon to send us. 294*a2067f52SniklasIf not present, it defaults to the address of the remote daemon. 295*a2067f52SniklasLook at <Phase1-ID> below. 2962ddc24cbSniklas.It Em Flags 2972ddc24cbSniklasA comma-separated list of flags controlling the further 2989615e1d4Saaronhandling of the ISAKMP SA. 2999615e1d4SaaronCurrently there are no specific ISAKMP SA flags defined. 300c5fe6c4eSniklas.El 3016a8478f3Sniklas.It Em <Phase1-ID> 3026a8478f3Sniklas.Bl -tag -width 12n 3036a8478f3Sniklas.It Em ID-type 3049615e1d4SaaronThe ID type as given by the RFCs. 3059615e1d4SaaronFor Phase 1 this is currently 3066a8478f3Sniklas.Li IPV4_ADDR , 3076a8478f3Sniklas.Li IPV4_ADDR_SUBNET , 3086a8478f3Sniklas.Li FQDN , 3096a8478f3Sniklasor 3106a8478f3Sniklas.Li USER_FQDN . 3116a8478f3Sniklas.It Em Address 3126a8478f3SniklasIf the ID-type is 3136a8478f3Sniklas.Li IPV4_ADDR , 3146a8478f3Sniklasthis tag should exist and be an IP-address. 3156a8478f3Sniklas.It Em Network 3166a8478f3SniklasIf the ID-type is 3176a8478f3Sniklas.Li IPV4_ADDR_SUBNET 3186a8478f3Sniklasthis tag should exist and 3196a8478f3Sniklasbe a network address. 3206a8478f3Sniklas.It Em Netmask 3216a8478f3SniklasIf the ID-type is 3226a8478f3Sniklas.Li IPV4_ADDR_SUBNET 3236a8478f3Sniklasthis tag should exist and 3246a8478f3Sniklasbe a network subnet mask. 3256a8478f3Sniklas.It Em Name 3266a8478f3SniklasIf the ID-type is 3276a8478f3Sniklas.Li FQDN 3286a8478f3Sniklasor 3296a8478f3Sniklas.Li USER_FQDN , 3306a8478f3Sniklasthis tag should exist and contain a domain name or a user@domain 3316a8478f3Sniklasstring respectively. 3326a8478f3Sniklas.El 333c5fe6c4eSniklas.It Em <ISAKMP-configuration> 334c5fe6c4eSniklas.Bl -tag -width 12n 335c5fe6c4eSniklas.It Em DOI 3369615e1d4SaaronThe domain of interpretation as given by the RFCs. 3379615e1d4SaaronNormally 338c5fe6c4eSniklas.Li IPSEC . 339b57b191eSniklasIf unspecified, defaults to 340b57b191eSniklas.Li IPSEC . 341c5fe6c4eSniklas.It Em EXCHANGE_TYPE 3429615e1d4SaaronThe exchange type as given by the RFCs. 3439615e1d4SaaronFor main mode this is 3449f078bd8Sniklas.Li ID_PROT 3459f078bd8Sniklasand for aggressive mode it is 3469f078bd8Sniklas.Li AGGRESSIVE . 347c5fe6c4eSniklas.It Em Transforms 348c5fe6c4eSniklasA list of proposed transforms to use for protecting the 3499615e1d4SaaronISAKMP traffic. 3509615e1d4SaaronThese are actually names for sections 3519615e1d4Saaronfurther describing the transforms. 3529615e1d4SaaronLook at <ISAKMP-transform> below. 353c5fe6c4eSniklas.El 354c5fe6c4eSniklas.It Em <ISAKMP-transform> 355c5fe6c4eSniklas.Bl -tag -width 12n 356c5fe6c4eSniklas.It Em ENCRYPTION_ALGORITHM 357850f7173SniklasThe encryption algorithm as the RFCs name it, or ANY to denote that any 358850f7173Sniklasencryption algorithm proposed will be accepted. 359c5fe6c4eSniklas.It Em KEY_LENGTH 360c5fe6c4eSniklasFor encryption algorithms with variable key length, this is 3619615e1d4Saaronwhere the offered/accepted keylengths are described. 3629615e1d4SaaronThe value is of the offer-accept kind described above. 363c5fe6c4eSniklas.It Em HASH_ALGORITHM 364850f7173SniklasThe hash algorithm as the RFCs name it, or ANY. 365c5fe6c4eSniklas.It Em AUTHENTICATION_METHOD 366850f7173SniklasThe authentication method as the RFCs name it, or ANY. 367c5fe6c4eSniklas.It Em GROUP_DESCRIPTION 3689615e1d4SaaronThe group used for Diffie-Hellman exponentiations, or ANY. 3699615e1d4SaaronThe name are symbolic, like 370c5fe6c4eSniklas.Li MODP_768 , MODP_1024 , EC_155 371c5fe6c4eSniklasand 372c5fe6c4eSniklas.Li EC_185 . 373850f7173Sniklas.It Em PRF 374850f7173SniklasThe algorithm to use for the keyed pseudo-random function (used for key 375850f7173Sniklasderivation and authentication in Phase 1), or ANY. 376c5fe6c4eSniklas.It Em Life 3774aac73a4SaaronA list of lifetime descriptions, or ANY. 3784aac73a4SaaronIn the former case, each 379850f7173Sniklaselement is in itself a name of the section that defines the lifetime. 3804aac73a4SaaronLook at <Lifetime> below. 3814aac73a4SaaronIf it is set to ANY, then any type of 382850f7173Sniklasproposed lifetime type and value will be accepted. 383c5fe6c4eSniklas.El 384c5fe6c4eSniklas.It Em <Lifetime> 385c5fe6c4eSniklas.Bl -tag -width 12n 386c5fe6c4eSniklas.It Em LIFE_TYPE 387c5fe6c4eSniklas.Li SECONDS 388c5fe6c4eSniklasor 389c5fe6c4eSniklas.Li BYTES 3904aac73a4Saarondepending on the type of the duration. 3914aac73a4SaaronNotice that this field may NOT be set to ANY. 392c5fe6c4eSniklas.It Em LIFE_DURATION 3934aac73a4SaaronAn offer/accept kind of value, see above. 3944aac73a4SaaronCan also be set to ANY. 395c5fe6c4eSniklas.El 396c5fe6c4eSniklas.It Em <IPSec-connection> 397c5fe6c4eSniklas.Bl -tag -width 12n 398c5fe6c4eSniklas.It Em Phase 399c5fe6c4eSniklasThe constant 400c5fe6c4eSniklas.Li 2 , 401c5fe6c4eSniklasas ISAKMP-peers and IPSec-connections 402c5fe6c4eSniklasreally are handled by the same code inside isakmpd. 403c5fe6c4eSniklas.It Em ISAKMP-peer 404c5fe6c4eSniklasThe name of the ISAKMP-peer which to talk to in order to 4059615e1d4Saaronset up this connection. 4069615e1d4SaaronThe value is the name of an <ISAKMP-peer> section. 4079615e1d4SaaronSee above. 408c5fe6c4eSniklas.It Em Configuration 4099615e1d4SaaronThe name of the IPSec-configuration section to use. 4109615e1d4SaaronLook at <IPSec-configuration> below. 411c5fe6c4eSniklas.It Em Local-ID 412c5fe6c4eSniklasIf existent, the name of the section that describes the 413c5fe6c4eSniklasoptional local client ID that we should present to our peer. 41480baf197SniklasIt is also used when we act as responders to find out what 41580baf197Sniklas<IPSec-connection> we are dealing with. 416c5fe6c4eSniklasLook at <IPSec-ID> below. 417c5fe6c4eSniklas.It Em Remote-ID 418c5fe6c4eSniklasIf existent, the name of the section that describes the 419c5fe6c4eSniklasoptional remote client ID that we should present to our peer. 42080baf197SniklasIt is also used when we act as responders to find out what 42180baf197Sniklas<IPSec-connection> we are dealing with. 422c5fe6c4eSniklasLook at <IPSec-ID> below. 42313a99464Sniklas.It Em Flags 42413a99464SniklasA comma-separated list of flags controlling the further 4259615e1d4Saaronhandling of the IPSec SA. 4269615e1d4SaaronCurrently only one flag is defined: 42780baf197Sniklas.Bl -tag -width 12n 42880baf197Sniklas.It Em Active-only 42980baf197SniklasIf this flag is given and this <IPSec-connection> is part of the phase 2 43080baf197Sniklasconnections we automatically keep up, it will not automatically be used for 43180baf197Sniklasaccepting connections from the peer. 43280baf197Sniklas.El 433c5fe6c4eSniklas.El 434c5fe6c4eSniklas.It Em <IPSec-configuration> 435c5fe6c4eSniklas.Bl -tag -width 12n 436c5fe6c4eSniklas.It Em DOI 4379615e1d4SaaronThe domain of interpretation as given by the RFCs. 4389615e1d4SaaronNormally 439c5fe6c4eSniklas.Li IPSEC . 440b57b191eSniklasIf unspecified, defaults to 441b57b191eSniklas.Li IPSEC . 442c5fe6c4eSniklas.It Em EXCHANGE_TYPE 4439615e1d4SaaronThe exchange type as given by the RFCs. 4449615e1d4SaaronFor quick mode this is 445c5fe6c4eSniklas.Li QUICK_MODE . 446c5fe6c4eSniklas.It Em Suites 4473b2a0cf1SaaronA list of protection suites (bundles of protocols) usable for 4489615e1d4Saaronprotecting the IP traffic. 4499615e1d4SaaronEach of the list elements is a name of an <IPSec-suite> section. 4509615e1d4SaaronSee below. 451c5fe6c4eSniklas.El 452c5fe6c4eSniklas.It Em <IPSec-suite> 453c5fe6c4eSniklas.Bl -tag -width 12n 454c5fe6c4eSniklas.It Em Protocols 455c5fe6c4eSniklasA list of the protocols included in this protection suite. 456c5fe6c4eSniklasEach of the list elements is a name of an <IPSec-protocol> 4579615e1d4Saaronsection. 4589615e1d4SaaronSee below. 459c5fe6c4eSniklas.El 460c5fe6c4eSniklas.It Em <IPSec-protocol> 461c5fe6c4eSniklas.Bl -tag -width 12n 462c5fe6c4eSniklas.It Em PROTOCOL_ID 4639615e1d4SaaronThe protocol as given by the RFCs. 4649615e1d4SaaronAcceptable values today are 465c5fe6c4eSniklas.Li IPSEC_AH 466c5fe6c4eSniklasand 467c5fe6c4eSniklas.Li IPSEC_ESP . 468c5fe6c4eSniklas.It Em Transforms 4693b2a0cf1SaaronA list of transforms usable for implementing the protocol. 470c5fe6c4eSniklasEach of the list elements is a name of an <IPSec-transform> 4719615e1d4Saaronsection. 4729615e1d4SaaronSee below. 473c5fe6c4eSniklas.It Em ReplayWindow 4749615e1d4SaaronThe size of the window used for replay protection. 4759615e1d4SaaronThis is normally left alone. 4769615e1d4SaaronLook at the 477c5fe6c4eSniklas.Nm ESP 478c5fe6c4eSniklasand 479c5fe6c4eSniklas.Nm AH 480c5fe6c4eSniklasRFCs for a better description. 481c5fe6c4eSniklas.El 482c5fe6c4eSniklas.It Em <IPSec-transform> 483c5fe6c4eSniklas.Bl -tag -width 12n 484c5fe6c4eSniklas.It Em TRANSFORM_ID 485c5fe6c4eSniklasThe transform ID as given by the RFCs. 486c5fe6c4eSniklas.It Em ENCAPSULATION_MODE 4879615e1d4SaaronThe encapsulation mode as given by the RFCs. 4889615e1d4SaaronThis means TRANSPORT or TUNNEL. 489c5fe6c4eSniklas.It Em AUTHENTICATION_ALGORITHM 490c5fe6c4eSniklasThe optional authentication algorithm in the case of this 491c5fe6c4eSniklasbeing an ESP transform. 492c5fe6c4eSniklas.It Em GROUP_DESCRIPTION 493c5fe6c4eSniklasAn optional (provides PFS if present) Diffie-Hellman group 4949615e1d4Saarondescription. 4959615e1d4SaaronThe values are the same as GROUP_DESCRIPTION's 496c5fe6c4eSniklasin <ISAKMP-transform> sections shown above. 497c5fe6c4eSniklas.It Em Life 498c5fe6c4eSniklasList of lifetimes, each element is a <Lifetime> section name. 499c5fe6c4eSniklas.El 500c5fe6c4eSniklas.It Em <IPSec-ID> 501c5fe6c4eSniklas.Bl -tag -width 12n 502c5fe6c4eSniklas.It Em ID-type 5039615e1d4SaaronThe ID type as given by the RFCs. 5049615e1d4SaaronFor IPSec this is currently 505c5fe6c4eSniklas.Li IPV4_ADDR 506c5fe6c4eSniklasor 507c5fe6c4eSniklas.Li IPV4_ADDR_SUBNET . 508c5fe6c4eSniklas.It Em Address 509c5fe6c4eSniklasIf the ID-type is 510c5fe6c4eSniklas.Li IPV4_ADDR , 511c5fe6c4eSniklasthis tag should exist and be an IP-address. 512c5fe6c4eSniklas.It Em Network 513c5fe6c4eSniklasIf the ID-type is 514c5fe6c4eSniklas.Li IPV4_ADDR_SUBNET 515c5fe6c4eSniklasthis tag should exist and 516c5fe6c4eSniklasbe a network address. 517c5fe6c4eSniklas.It Em Netmask 518c5fe6c4eSniklasIf the ID-type is 519c5fe6c4eSniklas.Li IPV4_ADDR_SUBNET 520c5fe6c4eSniklasthis tag should exist and 521c5fe6c4eSniklasbe a network subnet mask. 522c5fe6c4eSniklas.El 523c5fe6c4eSniklas.El 5242040585eSniklas.Sh EXAMPLE 5252040585eSniklasAn example of a configuration file: 5262040585eSniklas.Pp 5272040585eSniklas.Bd -literal 5282040585eSniklas# A configuration sample for the isakmpd ISAKMP/Oakley (aka IKE) daemon. 5292040585eSniklas 5302040585eSniklas[General] 531c5fe6c4eSniklasListen-on= 10.1.0.2 5322040585eSniklas 533c5fe6c4eSniklas# Incoming phase 1 negotiations are multiplexed on the source IP address 5342b81057dSniklas[Phase 1] 535c5fe6c4eSniklas10.1.0.1= ISAKMP-peer-west 5362b81057dSniklas 537c5fe6c4eSniklas# These connections are walked over after config file parsing and told 538c5fe6c4eSniklas# to the application layer so that it will inform us when traffic wants to 539c5fe6c4eSniklas# pass over them. This means we can do on-demand keying. 540c5fe6c4eSniklas[Phase 2] 541c5fe6c4eSniklasConnections= IPsec-east-west 542c5fe6c4eSniklas 543cc3c8b42Sniklas# Default values are commented out. 544c5fe6c4eSniklas[ISAKMP-peer-west] 5452b81057dSniklasPhase= 1 546cc3c8b42Sniklas#Transport= udp 547f6dd85a7SniklasLocal-address= 10.1.0.2 5482b81057dSniklasAddress= 10.1.0.1 5492b81057dSniklas#Port= isakmp 5502b81057dSniklas#Port= 500 5512b81057dSniklasConfiguration= Default-main-mode 5522b81057dSniklasAuthentication= mekmitasdigoat 553cc3c8b42Sniklas#Flags= 5542b81057dSniklas 555c5fe6c4eSniklas[IPsec-east-west] 5562b81057dSniklasPhase= 2 557c5fe6c4eSniklasISAKMP-peer= ISAKMP-peer-west 5582b81057dSniklasConfiguration= Default-quick-mode 559c5fe6c4eSniklasLocal-ID= Net-east 560c5fe6c4eSniklasRemote-ID= Net-west 561cc3c8b42Sniklas#Flags= 5622b81057dSniklas 563c5fe6c4eSniklas[Net-west] 5642b81057dSniklasID-type= IPV4_ADDR_SUBNET 5652b81057dSniklasNetwork= 192.168.1.0 5662b81057dSniklasNetmask= 255.255.255.0 5672b81057dSniklas 568c5fe6c4eSniklas[Net-east] 5692b81057dSniklasID-type= IPV4_ADDR_SUBNET 5702b81057dSniklasNetwork= 192.168.2.0 5712b81057dSniklasNetmask= 255.255.255.0 5722b81057dSniklas 5732b81057dSniklas# Main mode descriptions 5742b81057dSniklas 5752b81057dSniklas[Default-main-mode] 5762b81057dSniklasEXCHANGE_TYPE= ID_PROT 5772b81057dSniklasTransforms= 3DES-SHA 5782b81057dSniklas 57952e712aeSniklas# Quick mode descriptions 58052e712aeSniklas 58152e712aeSniklas[Default-quick-mode] 58252e712aeSniklasEXCHANGE_TYPE= QUICK_MODE 58352e712aeSniklasSuites= QM-ESP-3DES-SHA-PFS-SUITE,QM-ESP-DES-MD5-SUITE 58452e712aeSniklas 58552e712aeSniklas# 58652e712aeSniklas# ##################################################################### 58752e712aeSniklas# All configration data below this point is not required as the example 58852e712aeSniklas# uses the predefined Main Mode transform and Quick Mode suite names. 58952e712aeSniklas# It is included here for completeness. Note the default values for the 59052e712aeSniklas# [General] and [X509-certificates] sections just below. 59152e712aeSniklas# ##################################################################### 59252e712aeSniklas# 59352e712aeSniklas 59452e712aeSniklas[General] 59552e712aeSniklasPolicy-File= /etc/isakmpd/isakmpd.policy 59652e712aeSniklasRetransmits= 3 59752e712aeSniklasExchange-max-time= 120 59852e712aeSniklas 599b57b191eSniklas# KeyNote credential storage 600b57b191eSniklas[KeyNote] 601b57b191eSniklasCredential-directory= /etc/isakmpd/keynote/ 602b57b191eSniklas 603fb1921ccSniklas# Certificates stored in PEM format 604fb1921ccSniklas[X509-certificates] 605fb1921ccSniklasCA-directory= /etc/isakmpd/ca/ 606fb1921ccSniklasCert-directory= /etc/isakmpd/certs/ 607954b1b31SniklasPrivate-key= /etc/isakmpd/private/local.key 608fb1921ccSniklas 6092b81057dSniklas# Main mode transforms 6102b81057dSniklas###################### 6112b81057dSniklas 6122b81057dSniklas# DES 6132040585eSniklas 6142040585eSniklas[DES-MD5] 6152040585eSniklasENCRYPTION_ALGORITHM= DES_CBC 6162040585eSniklasHASH_ALGORITHM= MD5 6172040585eSniklasAUTHENTICATION_METHOD= PRE_SHARED 6182040585eSniklasGROUP_DESCRIPTION= MODP_768 6192b81057dSniklasLife= LIFE_600_SECS,LIFE_1000_KB 6202b81057dSniklas 6212b81057dSniklas[DES-MD5-NO-VOL-LIFE] 6222b81057dSniklasENCRYPTION_ALGORITHM= DES_CBC 6232b81057dSniklasHASH_ALGORITHM= MD5 6242b81057dSniklasAUTHENTICATION_METHOD= PRE_SHARED 6252b81057dSniklasGROUP_DESCRIPTION= MODP_768 626d70ca5f7SniklasLife= LIFE_600_SECS 6272040585eSniklas 6282b81057dSniklas[DES-SHA] 6292b81057dSniklasENCRYPTION_ALGORITHM= DES_CBC 6302b81057dSniklasHASH_ALGORITHM= SHA 6312b81057dSniklasAUTHENTICATION_METHOD= PRE_SHARED 6322b81057dSniklasGROUP_DESCRIPTION= MODP_768 6332b81057dSniklasLife= LIFE_600_SECS,LIFE_1000_KB 6342b81057dSniklas 6352b81057dSniklas# 3DES 6362b81057dSniklas 6372b81057dSniklas[3DES-SHA] 6382b81057dSniklasENCRYPTION_ALGORITHM= 3DES_CBC 6392040585eSniklasHASH_ALGORITHM= SHA 6402040585eSniklasAUTHENTICATION_METHOD= PRE_SHARED 6412040585eSniklasGROUP_DESCRIPTION= MODP_1024 642f6dd85a7SniklasLife= LIFE_3600_SECS 6432b81057dSniklas 6442b81057dSniklas# Blowfish 6452b81057dSniklas 6462b81057dSniklas[BLF-SHA-M1024] 6472b81057dSniklasENCRYPTION_ALGORITHM= BLOWFISH_CBC 6482b81057dSniklasKEY_LENGTH= 128,96:192 6492b81057dSniklasHASH_ALGORITHM= SHA 6502b81057dSniklasAUTHENTICATION_METHOD= PRE_SHARED 6512b81057dSniklasGROUP_DESCRIPTION= MODP_1024 6522b81057dSniklasLife= LIFE_600_SECS,LIFE_1000_KB 6532040585eSniklas 6542040585eSniklas[BLF-SHA-EC155] 655d70ca5f7SniklasENCRYPTION_ALGORITHM= BLOWFISH_CBC 6562b81057dSniklasKEY_LENGTH= 128,96:192 6572040585eSniklasHASH_ALGORITHM= SHA 6582040585eSniklasAUTHENTICATION_METHOD= PRE_SHARED 6592040585eSniklasGROUP_DESCRIPTION= EC2N_155 6602b81057dSniklasLife= LIFE_600_SECS,LIFE_1000_KB 6612b81057dSniklas 6622b81057dSniklas[BLF-MD5-EC155] 6632b81057dSniklasENCRYPTION_ALGORITHM= BLOWFISH_CBC 6642b81057dSniklasKEY_LENGTH= 128,96:192 6652b81057dSniklasHASH_ALGORITHM= MD5 6662b81057dSniklasAUTHENTICATION_METHOD= PRE_SHARED 6672b81057dSniklasGROUP_DESCRIPTION= EC2N_155 6682b81057dSniklasLife= LIFE_600_SECS,LIFE_1000_KB 6692040585eSniklas 6702040585eSniklas[BLF-SHA-EC185] 671d70ca5f7SniklasENCRYPTION_ALGORITHM= BLOWFISH_CBC 6722b81057dSniklasKEY_LENGTH= 128,96:192 6732040585eSniklasHASH_ALGORITHM= SHA 6742040585eSniklasAUTHENTICATION_METHOD= PRE_SHARED 6752040585eSniklasGROUP_DESCRIPTION= EC2N_185 6762b81057dSniklasLife= LIFE_600_SECS,LIFE_1000_KB 6772040585eSniklas 6782b81057dSniklas# Quick mode protection suites 6792b81057dSniklas############################## 6802b81057dSniklas 6812b81057dSniklas# DES 6822040585eSniklas 683d70ca5f7Sniklas[QM-ESP-DES-SUITE] 684d70ca5f7SniklasProtocols= QM-ESP-DES 685d70ca5f7Sniklas 6862b81057dSniklas[QM-ESP-DES-PFS-SUITE] 6872b81057dSniklasProtocols= QM-ESP-DES-PFS 6882b81057dSniklas 6892040585eSniklas[QM-ESP-DES-MD5-SUITE] 6902040585eSniklasProtocols= QM-ESP-DES-MD5 6912040585eSniklas 6922b81057dSniklas[QM-ESP-DES-MD5-PFS-SUITE] 6932b81057dSniklasProtocols= QM-ESP-DES-MD5-PFS 6942040585eSniklas 6952b81057dSniklas[QM-ESP-DES-SHA-SUITE] 6962b81057dSniklasProtocols= QM-ESP-DES-SHA 6972040585eSniklas 6982b81057dSniklas[QM-ESP-DES-SHA-PFS-SUITE] 6992b81057dSniklasProtocols= QM-ESP-DES-SHA-PFS 7002040585eSniklas 7012b81057dSniklas# 3DES 7022b81057dSniklas 7032b81057dSniklas[QM-ESP-3DES-SHA-SUITE] 7042b81057dSniklasProtocols= QM-ESP-3DES-SHA 7052b81057dSniklas 7062b81057dSniklas[QM-ESP-3DES-SHA-PFS-SUITE] 7072b81057dSniklasProtocols= QM-ESP-3DES-SHA-PFS 7082b81057dSniklas 709bfc24386Sniklas# AES 710bfc24386Sniklas 711bfc24386Sniklas[QM-ESP-AES-SHA-SUITE] 712bfc24386SniklasProtocols= QM-ESP-AES-SHA 713bfc24386Sniklas 714bfc24386Sniklas[QM-ESP-3DES-SHA-PFS-SUITE] 715bfc24386SniklasProtocols= QM-ESP-AES-SHA-PFS 716bfc24386Sniklas 7172b81057dSniklas# AH 7182b81057dSniklas 7192b81057dSniklas[QM-AH-MD5-SUITE] 7202b81057dSniklasProtocols= QM-AH-MD5 7212b81057dSniklas 7222b81057dSniklas[QM-AH-MD5-PFS-SUITE] 7232b81057dSniklasProtocols= QM-AH-MD5-PFS 7242b81057dSniklas 7252b81057dSniklas# AH + ESP 7262040585eSniklas 7272040585eSniklas[QM-AH-MD5-ESP-DES-SUITE] 7282040585eSniklasProtocols= QM-AH-MD5,QM-ESP-DES 7292040585eSniklas 7302b81057dSniklas[QM-AH-MD5-ESP-DES-MD5-SUITE] 7312b81057dSniklasProtocols= QM-AH-MD5,QM-ESP-DES-MD5 7322040585eSniklas 7332b81057dSniklas[QM-ESP-DES-MD5-AH-MD5-SUITE] 7342b81057dSniklasProtocols= QM-ESP-DES-MD5,QM-AH-MD5 7352b81057dSniklas 7362b81057dSniklas# Quick mode protocols 7372b81057dSniklas 7382b81057dSniklas# DES 7392040585eSniklas 7402040585eSniklas[QM-ESP-DES] 7412040585eSniklasPROTOCOL_ID= IPSEC_ESP 7422040585eSniklasTransforms= QM-ESP-DES-XF 7432040585eSniklas 7442b81057dSniklas[QM-ESP-DES-MD5] 7452b81057dSniklasPROTOCOL_ID= IPSEC_ESP 7462b81057dSniklasTransforms= QM-ESP-DES-MD5-XF 7472b81057dSniklas 7482b81057dSniklas[QM-ESP-DES-MD5-PFS] 7492b81057dSniklasPROTOCOL_ID= IPSEC_ESP 7502b81057dSniklasTransforms= QM-ESP-DES-MD5-PFS-XF 7512b81057dSniklas 7522b81057dSniklas[QM-ESP-DES-SHA] 7532b81057dSniklasPROTOCOL_ID= IPSEC_ESP 7542b81057dSniklasTransforms= QM-ESP-DES-SHA-XF 7552b81057dSniklas 7562b81057dSniklas# 3DES 7572b81057dSniklas 7582b81057dSniklas[QM-ESP-3DES-SHA] 7592b81057dSniklasPROTOCOL_ID= IPSEC_ESP 7602b81057dSniklasTransforms= QM-ESP-3DES-SHA-XF 7612b81057dSniklas 7622b81057dSniklas[QM-ESP-3DES-SHA-PFS] 7632b81057dSniklasPROTOCOL_ID= IPSEC_ESP 7642b81057dSniklasTransforms= QM-ESP-3DES-SHA-PFS-XF 7652b81057dSniklas 7662b81057dSniklas[QM-ESP-3DES-SHA-TRP] 7672b81057dSniklasPROTOCOL_ID= IPSEC_ESP 7682b81057dSniklasTransforms= QM-ESP-3DES-SHA-TRP-XF 7692b81057dSniklas 770bfc24386Sniklas# AES 771bfc24386Sniklas 772bfc24386Sniklas[QM-ESP-AES-SHA] 773bfc24386SniklasPROTOCOL_ID= IPSEC_ESP 774bfc24386SniklasTransforms= QM-ESP-AES-SHA-XF 775bfc24386Sniklas 776bfc24386Sniklas[QM-ESP-AES-SHA-PFS] 777bfc24386SniklasPROTOCOL_ID= IPSEC_ESP 778bfc24386SniklasTransforms= QM-ESP-AES-SHA-PFS-XF 779bfc24386Sniklas 780bfc24386Sniklas[QM-ESP-AES-SHA-TRP] 781bfc24386SniklasPROTOCOL_ID= IPSEC_ESP 782bfc24386SniklasTransforms= QM-ESP-AES-SHA-TRP-XF 783bfc24386Sniklas 7842b81057dSniklas# AH MD5 7852b81057dSniklas 7862b81057dSniklas[QM-AH-MD5] 7872b81057dSniklasPROTOCOL_ID= IPSEC_AH 7882b81057dSniklasTransforms= QM-AH-MD5-XF 7892b81057dSniklas 7902b81057dSniklas[QM-AH-MD5-PFS] 7912b81057dSniklasPROTOCOL_ID= IPSEC_AH 7922b81057dSniklasTransforms= QM-AH-MD5-PFS-XF 7932b81057dSniklas 7942b81057dSniklas# Quick mode transforms 7952b81057dSniklas 7962b81057dSniklas# ESP DES+MD5 7972b81057dSniklas 7982040585eSniklas[QM-ESP-DES-XF] 7992040585eSniklasTRANSFORM_ID= DES 8002040585eSniklasENCAPSULATION_MODE= TUNNEL 8012b81057dSniklasLife= LIFE_600_SECS 8022040585eSniklas 8032b81057dSniklas[QM-ESP-DES-MD5-XF] 8042b81057dSniklasTRANSFORM_ID= DES 8052b81057dSniklasENCAPSULATION_MODE= TUNNEL 8062b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_MD5 8072b81057dSniklasLife= LIFE_600_SECS 8082b81057dSniklas 8092b81057dSniklas[QM-ESP-DES-MD5-PFS-XF] 8102b81057dSniklasTRANSFORM_ID= DES 8112b81057dSniklasENCAPSULATION_MODE= TUNNEL 8122b81057dSniklasGROUP_DESCRIPTION= MODP_768 8132b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_MD5 8142b81057dSniklasLife= LIFE_600_SECS 8152b81057dSniklas 8162b81057dSniklas[QM-ESP-DES-SHA-XF] 8172b81057dSniklasTRANSFORM_ID= DES 8182b81057dSniklasENCAPSULATION_MODE= TUNNEL 8192b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 8202b81057dSniklasLife= LIFE_600_SECS 8212b81057dSniklas 8222b81057dSniklas# 3DES 8232b81057dSniklas 8242b81057dSniklas[QM-ESP-3DES-SHA-XF] 8252b81057dSniklasTRANSFORM_ID= 3DES 8262b81057dSniklasENCAPSULATION_MODE= TUNNEL 8272b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 8282b81057dSniklasLife= LIFE_600_SECS 8292b81057dSniklas 8302b81057dSniklas[QM-ESP-3DES-SHA-PFS-XF] 8312b81057dSniklasTRANSFORM_ID= 3DES 8322b81057dSniklasENCAPSULATION_MODE= TUNNEL 8332b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 8342b81057dSniklasGROUP_DESCRIPTION= MODP_1024 8352b81057dSniklasLife= LIFE_600_SECS 8362b81057dSniklas 8372b81057dSniklas[QM-ESP-3DES-SHA-TRP-XF] 8382b81057dSniklasTRANSFORM_ID= 3DES 8392b81057dSniklasENCAPSULATION_MODE= TRANSPORT 8402b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 8412b81057dSniklasLife= LIFE_600_SECS 8422b81057dSniklas 843bfc24386Sniklas# AES 844bfc24386Sniklas 845bfc24386Sniklas[QM-ESP-AES-SHA-XF] 846bfc24386SniklasTRANSFORM_ID= AES 847bfc24386SniklasENCAPSULATION_MODE= TUNNEL 848bfc24386SniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 849bfc24386SniklasLife= LIFE_600_SECS 850bfc24386Sniklas 851bfc24386Sniklas[QM-ESP-AES-SHA-PFS-XF] 852bfc24386SniklasTRANSFORM_ID= AES 853bfc24386SniklasENCAPSULATION_MODE= TUNNEL 854bfc24386SniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 855bfc24386SniklasGROUP_DESCRIPTION= MODP_1024 856bfc24386SniklasLife= LIFE_600_SECS 857bfc24386Sniklas 858bfc24386Sniklas[QM-ESP-AES-SHA-TRP-XF] 859bfc24386SniklasTRANSFORM_ID= AES 860bfc24386SniklasENCAPSULATION_MODE= TRANSPORT 861bfc24386SniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 862bfc24386SniklasLife= LIFE_600_SECS 863bfc24386Sniklas 8642b81057dSniklas# AH 8652b81057dSniklas 8662b81057dSniklas[QM-AH-MD5-XF] 8672b81057dSniklasTRANSFORM_ID= MD5 8682b81057dSniklasENCAPSULATION_MODE= TUNNEL 8692b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_MD5 8702b81057dSniklasLife= LIFE_600_SECS 8712b81057dSniklas 8722b81057dSniklas[QM-AH-MD5-PFS-XF] 8732b81057dSniklasTRANSFORM_ID= MD5 8742b81057dSniklasENCAPSULATION_MODE= TUNNEL 8752b81057dSniklasGROUP_DESCRIPTION= MODP_768 8762b81057dSniklasLife= LIFE_600_SECS 8772b81057dSniklas 8782b81057dSniklas[LIFE_600_SECS] 8792b81057dSniklasLIFE_TYPE= SECONDS 8802b81057dSniklasLIFE_DURATION= 600,450:720 8812b81057dSniklas 8822b81057dSniklas[LIFE_3600_SECS] 8832b81057dSniklasLIFE_TYPE= SECONDS 8842b81057dSniklasLIFE_DURATION= 3600,1800:7200 8852b81057dSniklas 8862b81057dSniklas[LIFE_1000_KB] 8872b81057dSniklasLIFE_TYPE= KILOBYTES 8882b81057dSniklasLIFE_DURATION= 1000,768:1536 8892b81057dSniklas 8902b81057dSniklas[LIFE_32_MB] 8912b81057dSniklasLIFE_TYPE= KILOBYTES 8922b81057dSniklasLIFE_DURATION= 32768,16384:65536 8932b81057dSniklas 8942b81057dSniklas[LIFE_4.5_GB] 8952b81057dSniklasLIFE_TYPE= KILOBYTES 8962b81057dSniklasLIFE_DURATION= 4608000,4096000:8192000 8972040585eSniklas.Ed 898*a2067f52Sniklas.Sh BUGS 899*a2067f52Sniklas.Nm 900*a2067f52Sniklasdoes not currently verify the Remote-ID as specified in the 901*a2067f52SniklasISAKMP-peer section. 902*a2067f52SniklasIt is still possible to verify this through the policy file. 9032040585eSniklas.Sh SEE ALSO 904350bb3b8Salex.Xr ipsec 4 , 905b57b191eSniklas.Xr keynote 1 , 90630a2652aSniklas.Xr keynote 4 , 90777725688Sniklas.Xr isakmpd.policy 5 , 908350bb3b8Salex.Xr isakmpd 8 909