xref: /openbsd/sbin/isakmpd/isakmpd.conf.5 (revision c5fe6c4e)
1*c5fe6c4eSniklas.\" $OpenBSD: isakmpd.conf.5,v 1.7 1999/02/26 03:45:09 niklas Exp $
2*c5fe6c4eSniklas.\" $EOM: isakmpd.conf.5,v 1.11 1999/02/25 11:09:39 niklas Exp $
32040585eSniklas.\"
42040585eSniklas.\" Copyright (c) 1998 Niklas Hallqvist.  All rights reserved.
52040585eSniklas.\"
62040585eSniklas.\" Redistribution and use in source and binary forms, with or without
72040585eSniklas.\" modification, are permitted provided that the following conditions
82040585eSniklas.\" are met:
92040585eSniklas.\" 1. Redistributions of source code must retain the above copyright
102040585eSniklas.\"    notice, this list of conditions and the following disclaimer.
112040585eSniklas.\" 2. Redistributions in binary form must reproduce the above copyright
122040585eSniklas.\"    notice, this list of conditions and the following disclaimer in the
132040585eSniklas.\"    documentation and/or other materials provided with the distribution.
142040585eSniklas.\" 3. All advertising materials mentioning features or use of this software
152040585eSniklas.\"    must display the following acknowledgement:
162040585eSniklas.\"	This product includes software developed by Ericsson Radio Systems.
172040585eSniklas.\" 4. The name of the author may not be used to endorse or promote products
182040585eSniklas.\"    derived from this software without specific prior written permission.
192040585eSniklas.\"
202040585eSniklas.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
212040585eSniklas.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
222040585eSniklas.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
232040585eSniklas.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
242040585eSniklas.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
252040585eSniklas.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
262040585eSniklas.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
272040585eSniklas.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
282040585eSniklas.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
292040585eSniklas.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
302040585eSniklas.\"
312040585eSniklas.\" This code was written under funding by Ericsson Radio Systems.
322040585eSniklas.\"
332040585eSniklas.\" Manual page, using -mandoc macros
342040585eSniklas.\"
352040585eSniklas.Dd October 10, 1998
3658aefd4bSaaron.Dt ISAKMPD.CONF 5
372040585eSniklas.Os
382040585eSniklas.Sh NAME
392040585eSniklas.Nm isakmpd.conf
4058aefd4bSaaron.Nd configuration file for isakmpd
412040585eSniklas.Sh DESCRIPTION
4258aefd4bSaaron.Nm
4358aefd4bSaaronis the configuration file for the
442040585eSniklas.Nm isakmpd
452040585eSniklasdaemon managing security association and key management for the
4658aefd4bSaaronIPSEC layer of the kernel's networking stack.
472040585eSniklas.Pp
482040585eSniklasThe file is of a well known type of format called .INI style, named after
492040585eSniklasthe suffix used by an overrated windowing environment for its configuration
502040585eSniklasfiles.  This format consists of sections, each beginning with a line looking
512040585eSniklaslike:
522040585eSniklas.Bd -literal
532040585eSniklas[Section name]
542040585eSniklas.Ed
552040585eSniklasBetween the brackets is the name of the section following this section header.
562040585eSniklasInside a section many tag/value pairs can be stored, each one looking like:
572040585eSniklas.Bd -literal
582040585eSniklasTag=Value
592040585eSniklas.Ed
602040585eSniklasIf the value needs more space than fits on a single line it's possible to
612040585eSniklascontinue it on the next by ending the first with a backspace character
622040585eSniklasimmediately before the newline character.  This method can extend a value for
632040585eSniklasan arbitrary amount of lines.
642040585eSniklas.Pp
6558aefd4bSaaronComments can be put anywhere in the file by using a hash mark
6658aefd4bSaaron.Pq Sq \&# .
6758aefd4bSaaronThen the comment goes on to the end of the line.
682040585eSniklas.Pp
69*c5fe6c4eSniklasOften the right-hand side values consist of other section names.
70*c5fe6c4eSniklasThis results in a tree structure.
71*c5fe6c4eSniklasSome values are treated as a list of several scalar values, such lists always
72*c5fe6c4eSniklasuse comma as the separator.  Some values are formated like this: X,Y:Z, which
73*c5fe6c4eSniklasis an offer/accept syntax, where X is a value we offer and Y:Z is a range of
74*c5fe6c4eSniklasaccepted values, inclusive.
75*c5fe6c4eSniklas.Pp
76*c5fe6c4eSniklas.Ss Roots
77*c5fe6c4eSniklas.Bl -hang -width 12n
78*c5fe6c4eSniklas.It Em General
79*c5fe6c4eSniklasGeneric global configuration parameters
80*c5fe6c4eSniklas.Bl -tag -width 12n
81*c5fe6c4eSniklas.It Em Retransmits
82*c5fe6c4eSniklasHow many times should a message be retransmitted before giving up.
83*c5fe6c4eSniklas.It Em Exchange-max-time
84*c5fe6c4eSniklasHow many seconds should an exchange maximally take to setup
85*c5fe6c4eSniklasbefore we give up.
86*c5fe6c4eSniklas.It Em Listen-on
87*c5fe6c4eSniklasA list of IP-addresses OK to listen on.  This list is used as
88*c5fe6c4eSniklasa filter for the set of addresses the interfaces configured
89*c5fe6c4eSniklasprovides.  This means that we won't see if an address given
90*c5fe6c4eSniklashere does not exist on this host, thus no error is given for
91*c5fe6c4eSniklasthat case.
92*c5fe6c4eSniklas.El
93*c5fe6c4eSniklas.It Em Phase 1
94*c5fe6c4eSniklasISAKMP SA negotiation parameter root
95*c5fe6c4eSniklas.Bl -tag -width 12n
96*c5fe6c4eSniklas.It Em <IP-address>
97*c5fe6c4eSniklasA name of the ISAKMP peer at the given IP-address.  This name
98*c5fe6c4eSniklasis used as the section name for further information to be
99*c5fe6c4eSniklasfound.  Look at <ISAKMP-peer> below.
100*c5fe6c4eSniklas.El
101*c5fe6c4eSniklas.It Em Phase 2
102*c5fe6c4eSniklasIPsec SA negotiation parameter root
103*c5fe6c4eSniklas.Bl -tag -width 12n
104*c5fe6c4eSniklas.It Em Connections
105*c5fe6c4eSniklasA list of directed IPSec "connection" names.  This name
106*c5fe6c4eSniklasis used as the section name for further information to be
107*c5fe6c4eSniklasfound.  Look at <IPSec-connection> below.
108*c5fe6c4eSniklas.El
109*c5fe6c4eSniklas.El
110*c5fe6c4eSniklas.Ss Referred-to sections
111*c5fe6c4eSniklas.Bl -hang -width 12n
112*c5fe6c4eSniklas.It Em <ISAKMP-peer>
113*c5fe6c4eSniklasParameters for negotiation with an ISAKMP peer
114*c5fe6c4eSniklas.Bl -tag -width 12n
115*c5fe6c4eSniklas.It Em Phase
116*c5fe6c4eSniklasThe constant
117*c5fe6c4eSniklas.Li 1 ,
118*c5fe6c4eSniklasas ISAKMP-peers and IPSec-connections
119*c5fe6c4eSniklasreally are handled by the same code inside isakmpd.
120*c5fe6c4eSniklas.It Em Transport
121*c5fe6c4eSniklasThe name of the transport protocol, normally
122*c5fe6c4eSniklas.Li udp .
123*c5fe6c4eSniklas.It Em Address
124*c5fe6c4eSniklasThe IP-address of the peer.
125*c5fe6c4eSniklas.It Em Port
126*c5fe6c4eSniklasIn case of UDP, the UDP port number to send to.  This is optional, the
127*c5fe6c4eSniklasdefault value is 500 which is the IANA-registered number for ISAKMP.
128*c5fe6c4eSniklas.It Em Configuration
129*c5fe6c4eSniklasThe name of the ISAKMP-configuration section to use.  Look at
130*c5fe6c4eSniklas<ISAKMP-configuration> below.
131*c5fe6c4eSniklas.It Em Authentication
132*c5fe6c4eSniklasAuthentication data for this specific peer.  In the case of
133*c5fe6c4eSniklaspreshared key, this is the key value itself.
134*c5fe6c4eSniklas.El
135*c5fe6c4eSniklas.It Em <ISAKMP-configuration>
136*c5fe6c4eSniklas.Bl -tag -width 12n
137*c5fe6c4eSniklas.It Em DOI
138*c5fe6c4eSniklasThe domain of interpretation as given by the RFCs.  Normally
139*c5fe6c4eSniklas.Li IPSEC .
140*c5fe6c4eSniklas.It Em EXCHANGE_TYPE
141*c5fe6c4eSniklasThe exchange type as given by the RFCs.  For main mode this is
142*c5fe6c4eSniklas.Li ID_PROT .
143*c5fe6c4eSniklas.It Em Transforms
144*c5fe6c4eSniklasA list of proposed transforms to use for protecting the
145*c5fe6c4eSniklasISAKMP traffic.  These are actually names for sections
146*c5fe6c4eSniklasfurther describing the transforms.  Look at <ISAKMP-transform>
147*c5fe6c4eSniklasbelow.
148*c5fe6c4eSniklas.El
149*c5fe6c4eSniklas.It Em <ISAKMP-transform>
150*c5fe6c4eSniklas.Bl -tag -width 12n
151*c5fe6c4eSniklas.It Em ENCRYPTION_ALGORITHM
152*c5fe6c4eSniklasThe encryption algorithm as the RFCs name it.
153*c5fe6c4eSniklas.It Em KEY_LENGTH
154*c5fe6c4eSniklasFor encryption algorithms with variable key length, this is
155*c5fe6c4eSniklaswhere the offered/accepted keylengths are described.  The
156*c5fe6c4eSniklasvalue is of the offer-accept kind described above.
157*c5fe6c4eSniklas.It Em HASH_ALGORITHM
158*c5fe6c4eSniklasThe hash algorithm as the RFCs name it.
159*c5fe6c4eSniklas.It Em AUTHENTICATION_METHOD
160*c5fe6c4eSniklasThe authentication method as the RFCs name it.
161*c5fe6c4eSniklas.It Em GROUP_DESCRIPTION
162*c5fe6c4eSniklasThe group used for Diffie-Hellman exponentiations.  The
163*c5fe6c4eSniklasname are symbolic, like
164*c5fe6c4eSniklas.Li MODP_768 , MODP_1024 , EC_155
165*c5fe6c4eSniklasand
166*c5fe6c4eSniklas.Li EC_185 .
167*c5fe6c4eSniklas.It Em Life
168*c5fe6c4eSniklasA list of lifetime descriptions.  Each element is in itself
169*c5fe6c4eSniklasa name of the section that defines the lifetime.  Look at
170*c5fe6c4eSniklas<Lifetime> below.
171*c5fe6c4eSniklas.El
172*c5fe6c4eSniklas.It Em <Lifetime>
173*c5fe6c4eSniklas.Bl -tag -width 12n
174*c5fe6c4eSniklas.It Em LIFE_TYPE
175*c5fe6c4eSniklas.Li SECONDS
176*c5fe6c4eSniklasor
177*c5fe6c4eSniklas.Li BYTES
178*c5fe6c4eSniklasdepending on the type of the duration.
179*c5fe6c4eSniklas.It Em LIFE_DURATION
180*c5fe6c4eSniklasAn offer/accept kind of value, see above.
181*c5fe6c4eSniklas.El
182*c5fe6c4eSniklas.It Em <IPSec-connection>
183*c5fe6c4eSniklas.Bl -tag -width 12n
184*c5fe6c4eSniklas.It Em Phase
185*c5fe6c4eSniklasThe constant
186*c5fe6c4eSniklas.Li 2 ,
187*c5fe6c4eSniklasas ISAKMP-peers and IPSec-connections
188*c5fe6c4eSniklasreally are handled by the same code inside isakmpd.
189*c5fe6c4eSniklas.It Em ISAKMP-peer
190*c5fe6c4eSniklasThe name of the ISAKMP-peer which to talk to in order to
191*c5fe6c4eSniklasset up this connection.  The value is the name of an
192*c5fe6c4eSniklas<ISAKMP-peer> section.  See above.
193*c5fe6c4eSniklas.It Em Configuration
194*c5fe6c4eSniklasThe name of the IPSec-configuration section to use.  Look at
195*c5fe6c4eSniklas<IPSec-configuration> below.
196*c5fe6c4eSniklas.It Em Local-ID
197*c5fe6c4eSniklasIf existent, the name of the section that describes the
198*c5fe6c4eSniklasoptional local client ID that we should present to our peer.
199*c5fe6c4eSniklasLook at <IPSec-ID> below.
200*c5fe6c4eSniklas.It Em Remote-ID
201*c5fe6c4eSniklasIf existent, the name of the section that describes the
202*c5fe6c4eSniklasoptional remote client ID that we should present to our peer.
203*c5fe6c4eSniklasLook at <IPSec-ID> below.
204*c5fe6c4eSniklas.El
205*c5fe6c4eSniklas.It Em <IPSec-configuration>
206*c5fe6c4eSniklas.Bl -tag -width 12n
207*c5fe6c4eSniklas.It Em DOI
208*c5fe6c4eSniklasThe domain of interpretation as given by the RFCs.  Normally
209*c5fe6c4eSniklas.Li IPSEC .
210*c5fe6c4eSniklas.It Em EXCHANGE_TYPE
211*c5fe6c4eSniklasThe exchange type as given by the RFCs.  For quick mode this is
212*c5fe6c4eSniklas.Li QUICK_MODE .
213*c5fe6c4eSniklas.It Em Suites
214*c5fe6c4eSniklasA list of protection suites (bundles of protocols) useable for
215*c5fe6c4eSniklasprotecting the IP traffic.  Each of the list elements is a
216*c5fe6c4eSniklasname of	an <IPSec-suite> section.  See below.
217*c5fe6c4eSniklas.El
218*c5fe6c4eSniklas.It Em <IPSec-suite>
219*c5fe6c4eSniklas.Bl -tag -width 12n
220*c5fe6c4eSniklas.It Em Protocols
221*c5fe6c4eSniklasA list of the protocols included in this protection suite.
222*c5fe6c4eSniklasEach of the list elements is a name of an <IPSec-protocol>
223*c5fe6c4eSniklassection.  See below.
224*c5fe6c4eSniklas.El
225*c5fe6c4eSniklas.It Em <IPSec-protocol>
226*c5fe6c4eSniklas.Bl -tag -width 12n
227*c5fe6c4eSniklas.It Em PROTOCOL_ID
228*c5fe6c4eSniklasThe protocol as given by the RFCs.  Acceptable values today
229*c5fe6c4eSniklasare
230*c5fe6c4eSniklas.Li IPSEC_AH
231*c5fe6c4eSniklasand
232*c5fe6c4eSniklas.Li IPSEC_ESP .
233*c5fe6c4eSniklas.It Em Transforms
234*c5fe6c4eSniklasA list of transforms useable for implementing the protocol.
235*c5fe6c4eSniklasEach of the list elements is a name of an <IPSec-transform>
236*c5fe6c4eSniklassection.  See below.
237*c5fe6c4eSniklas.It Em ReplayWindow
238*c5fe6c4eSniklasThe size of the window used for replay protection.  Normally this is should
239*c5fe6c4eSniklasnot be touched, unless you do local IPSec setups, i.e. both the sender and
240*c5fe6c4eSniklasreceiver are on the same box.  Then replay protection has to be turned off
241*c5fe6c4eSniklaswhich is done by setting this parameter to -1.  Look at the
242*c5fe6c4eSniklas.Nm ESP
243*c5fe6c4eSniklasand
244*c5fe6c4eSniklas.Nm AH
245*c5fe6c4eSniklasRFCs for a better description.
246*c5fe6c4eSniklas.El
247*c5fe6c4eSniklas.It Em <IPSec-transform>
248*c5fe6c4eSniklas.Bl -tag -width 12n
249*c5fe6c4eSniklas.It Em TRANSFORM_ID
250*c5fe6c4eSniklasThe transform ID as given by the RFCs.
251*c5fe6c4eSniklas.It Em ENCAPSULATION_MODE
252*c5fe6c4eSniklasThe encapsulation mode as given by the RFCs.  This means
253*c5fe6c4eSniklasTRANSPORT or TUNNEL.
254*c5fe6c4eSniklas.It Em AUTHENTICATION_ALGORITHM
255*c5fe6c4eSniklasThe optional authentication algorithm in the case of this
256*c5fe6c4eSniklasbeing an ESP transform.
257*c5fe6c4eSniklas.It Em GROUP_DESCRIPTION
258*c5fe6c4eSniklasAn optional (provides PFS if present) Diffie-Hellman group
259*c5fe6c4eSniklasdescription.  The values are the same as GROUP_DESCRIPTION's
260*c5fe6c4eSniklasin <ISAKMP-transform> sections shown above.
261*c5fe6c4eSniklas.It Em Life
262*c5fe6c4eSniklasList of lifetimes, each element is a <Lifetime> section name.
263*c5fe6c4eSniklas.El
264*c5fe6c4eSniklas.It Em <IPSec-ID>
265*c5fe6c4eSniklas.Bl -tag -width 12n
266*c5fe6c4eSniklas.It Em ID-type
267*c5fe6c4eSniklasThe ID type as given by the RFCs.  For IPSec this is currently
268*c5fe6c4eSniklas.Li IPV4_ADDR
269*c5fe6c4eSniklasor
270*c5fe6c4eSniklas.Li IPV4_ADDR_SUBNET .
271*c5fe6c4eSniklas.It Em Address
272*c5fe6c4eSniklasIf the ID-type is
273*c5fe6c4eSniklas.Li IPV4_ADDR ,
274*c5fe6c4eSniklasthis tag should exist and be an IP-address.
275*c5fe6c4eSniklas.It Em Network
276*c5fe6c4eSniklasIf the ID-type is
277*c5fe6c4eSniklas.Li IPV4_ADDR_SUBNET
278*c5fe6c4eSniklasthis tag should exist and
279*c5fe6c4eSniklasbe a network address.
280*c5fe6c4eSniklas.It Em Netmask
281*c5fe6c4eSniklasIf the ID-type is
282*c5fe6c4eSniklas.Li IPV4_ADDR_SUBNET
283*c5fe6c4eSniklasthis tag should exist and
284*c5fe6c4eSniklasbe a network subnet mask.
285*c5fe6c4eSniklas.El
286*c5fe6c4eSniklas.El
2872040585eSniklas.Sh EXAMPLE
2882040585eSniklasAn example of a configuration file:
2892040585eSniklas.Pp
2902040585eSniklas.Bd -literal
2912040585eSniklas# A configuration sample for the isakmpd ISAKMP/Oakley (aka IKE) daemon.
2922040585eSniklas
2932040585eSniklas[General]
2942b81057dSniklasRetransmits=		3
2952b81057dSniklasExchange-max-time=	120
296*c5fe6c4eSniklasListen-on=		10.1.0.2
2972040585eSniklas
298*c5fe6c4eSniklas# Incoming phase 1 negotiations are multiplexed on the source IP address
2992b81057dSniklas[Phase 1]
300*c5fe6c4eSniklas10.1.0.1=		ISAKMP-peer-west
3012b81057dSniklas
302*c5fe6c4eSniklas# These connections are walked over after config file parsing and told
303*c5fe6c4eSniklas# to the application layer so that it will inform us when traffic wants to
304*c5fe6c4eSniklas# pass over them.  This means we can do on-demand keying.
305*c5fe6c4eSniklas[Phase 2]
306*c5fe6c4eSniklasConnections=		IPsec-east-west
307*c5fe6c4eSniklas
308*c5fe6c4eSniklas[ISAKMP-peer-west]
3092b81057dSniklasPhase=			1
3102b81057dSniklasTransport=		udp
3112b81057dSniklas# XXX Not yet implemented
3122b81057dSniklas#Local-address=		10.1.0.2
3132b81057dSniklasAddress=		10.1.0.1
3142b81057dSniklas# Default values for "Port" commented out
3152b81057dSniklas#Port=			isakmp
3162b81057dSniklas#Port=			500
3172b81057dSniklasConfiguration=		Default-main-mode
3182b81057dSniklasAuthentication=		mekmitasdigoat
3192b81057dSniklas
320*c5fe6c4eSniklas[IPsec-east-west]
3212b81057dSniklasPhase=			2
322*c5fe6c4eSniklasISAKMP-peer=		ISAKMP-peer-west
3232b81057dSniklasConfiguration=		Default-quick-mode
324*c5fe6c4eSniklasLocal-ID=		Net-east
325*c5fe6c4eSniklasRemote-ID=		Net-west
3262b81057dSniklas
327*c5fe6c4eSniklas[Net-west]
3282b81057dSniklasID-type=		IPV4_ADDR_SUBNET
3292b81057dSniklasNetwork=		192.168.1.0
3302b81057dSniklasNetmask=		255.255.255.0
3312b81057dSniklas
332*c5fe6c4eSniklas[Net-east]
3332b81057dSniklasID-type=		IPV4_ADDR_SUBNET
3342b81057dSniklasNetwork=		192.168.2.0
3352b81057dSniklasNetmask=		255.255.255.0
3362b81057dSniklas
3372b81057dSniklas# Main mode descriptions
3382b81057dSniklas
3392b81057dSniklas[Default-main-mode]
3402b81057dSniklasDOI=			IPSEC
3412b81057dSniklasEXCHANGE_TYPE=		ID_PROT
3422b81057dSniklasTransforms=		3DES-SHA
3432b81057dSniklas
3442b81057dSniklas# Main mode transforms
3452b81057dSniklas######################
3462b81057dSniklas
3472b81057dSniklas# DES
3482040585eSniklas
3492040585eSniklas[DES-MD5]
3502040585eSniklasENCRYPTION_ALGORITHM=	DES_CBC
3512040585eSniklasHASH_ALGORITHM=		MD5
3522040585eSniklasAUTHENTICATION_METHOD=	PRE_SHARED
3532040585eSniklasGROUP_DESCRIPTION=	MODP_768
3542b81057dSniklasLife=			LIFE_600_SECS,LIFE_1000_KB
3552b81057dSniklas
3562b81057dSniklas[DES-MD5-NO-VOL-LIFE]
3572b81057dSniklasENCRYPTION_ALGORITHM=	DES_CBC
3582b81057dSniklasHASH_ALGORITHM=		MD5
3592b81057dSniklasAUTHENTICATION_METHOD=	PRE_SHARED
3602b81057dSniklasGROUP_DESCRIPTION=	MODP_768
361d70ca5f7SniklasLife=			LIFE_600_SECS
3622040585eSniklas
3632b81057dSniklas[DES-SHA]
3642b81057dSniklasENCRYPTION_ALGORITHM=	DES_CBC
3652b81057dSniklasHASH_ALGORITHM=		SHA
3662b81057dSniklasAUTHENTICATION_METHOD=	PRE_SHARED
3672b81057dSniklasGROUP_DESCRIPTION=	MODP_768
3682b81057dSniklasLife=			LIFE_600_SECS,LIFE_1000_KB
3692b81057dSniklas
3702b81057dSniklas# 3DES
3712b81057dSniklas
3722b81057dSniklas[3DES-SHA]
3732b81057dSniklasENCRYPTION_ALGORITHM=	3DES_CBC
3742040585eSniklasHASH_ALGORITHM=		SHA
3752040585eSniklasAUTHENTICATION_METHOD=	PRE_SHARED
3762040585eSniklasGROUP_DESCRIPTION=	MODP_1024
3772b81057dSniklasLife=			LIFE_600_SECS,LIFE_1000_KB
3782b81057dSniklas
3792b81057dSniklas# Blowfish
3802b81057dSniklas
3812b81057dSniklas[BLF-SHA-M1024]
3822b81057dSniklasENCRYPTION_ALGORITHM=	BLOWFISH_CBC
3832b81057dSniklasKEY_LENGTH=		128,96:192
3842b81057dSniklasHASH_ALGORITHM=		SHA
3852b81057dSniklasAUTHENTICATION_METHOD=	PRE_SHARED
3862b81057dSniklasGROUP_DESCRIPTION=	MODP_1024
3872b81057dSniklasLife=			LIFE_600_SECS,LIFE_1000_KB
3882040585eSniklas
3892040585eSniklas[BLF-SHA-EC155]
390d70ca5f7SniklasENCRYPTION_ALGORITHM=	BLOWFISH_CBC
3912b81057dSniklasKEY_LENGTH=		128,96:192
3922040585eSniklasHASH_ALGORITHM=		SHA
3932040585eSniklasAUTHENTICATION_METHOD=	PRE_SHARED
3942040585eSniklasGROUP_DESCRIPTION=	EC2N_155
3952b81057dSniklasLife=			LIFE_600_SECS,LIFE_1000_KB
3962b81057dSniklas
3972b81057dSniklas[BLF-MD5-EC155]
3982b81057dSniklasENCRYPTION_ALGORITHM=	BLOWFISH_CBC
3992b81057dSniklasKEY_LENGTH=		128,96:192
4002b81057dSniklasHASH_ALGORITHM=		MD5
4012b81057dSniklasAUTHENTICATION_METHOD=	PRE_SHARED
4022b81057dSniklasGROUP_DESCRIPTION=	EC2N_155
4032b81057dSniklasLife=			LIFE_600_SECS,LIFE_1000_KB
4042040585eSniklas
4052040585eSniklas[BLF-SHA-EC185]
406d70ca5f7SniklasENCRYPTION_ALGORITHM=	BLOWFISH_CBC
4072b81057dSniklasKEY_LENGTH=		128,96:192
4082040585eSniklasHASH_ALGORITHM=		SHA
4092040585eSniklasAUTHENTICATION_METHOD=	PRE_SHARED
4102040585eSniklasGROUP_DESCRIPTION=	EC2N_185
4112b81057dSniklasLife=			LIFE_600_SECS,LIFE_1000_KB
4122040585eSniklas
4132b81057dSniklas# Quick mode description
4142b81057dSniklas########################
4152b81057dSniklas
4162b81057dSniklas[Default-quick-mode]
4172b81057dSniklasDOI=			IPSEC
4182b81057dSniklasEXCHANGE_TYPE=		QUICK_MODE
4192b81057dSniklasSuites=			QM-ESP-3DES-SHA-PFS-SUITE,QM-ESP-DES-MD5-SUITE
4202b81057dSniklas
4212b81057dSniklas# Quick mode protection suites
4222b81057dSniklas##############################
4232b81057dSniklas
4242b81057dSniklas# DES
4252040585eSniklas
426d70ca5f7Sniklas[QM-ESP-DES-SUITE]
427d70ca5f7SniklasProtocols=		QM-ESP-DES
428d70ca5f7Sniklas
4292b81057dSniklas[QM-ESP-DES-PFS-SUITE]
4302b81057dSniklasProtocols=		QM-ESP-DES-PFS
4312b81057dSniklas
4322040585eSniklas[QM-ESP-DES-MD5-SUITE]
4332040585eSniklasProtocols=		QM-ESP-DES-MD5
4342040585eSniklas
4352b81057dSniklas[QM-ESP-DES-MD5-PFS-SUITE]
4362b81057dSniklasProtocols=		QM-ESP-DES-MD5-PFS
4372040585eSniklas
4382b81057dSniklas[QM-ESP-DES-SHA-SUITE]
4392b81057dSniklasProtocols=		QM-ESP-DES-SHA
4402040585eSniklas
4412b81057dSniklas[QM-ESP-DES-SHA-PFS-SUITE]
4422b81057dSniklasProtocols=		QM-ESP-DES-SHA-PFS
4432040585eSniklas
4442b81057dSniklas# 3DES
4452b81057dSniklas
4462b81057dSniklas[QM-ESP-3DES-SHA-SUITE]
4472b81057dSniklasProtocols=		QM-ESP-3DES-SHA
4482b81057dSniklas
4492b81057dSniklas[QM-ESP-3DES-SHA-PFS-SUITE]
4502b81057dSniklasProtocols=		QM-ESP-3DES-SHA-PFS
4512b81057dSniklas
4522b81057dSniklas# AH
4532b81057dSniklas
4542b81057dSniklas[QM-AH-MD5-SUITE]
4552b81057dSniklasProtocols=		QM-AH-MD5
4562b81057dSniklas
4572b81057dSniklas[QM-AH-MD5-PFS-SUITE]
4582b81057dSniklasProtocols=		QM-AH-MD5-PFS
4592b81057dSniklas
4602b81057dSniklas# AH + ESP
4612040585eSniklas
4622040585eSniklas[QM-AH-MD5-ESP-DES-SUITE]
4632040585eSniklasProtocols=		QM-AH-MD5,QM-ESP-DES
4642040585eSniklas
4652b81057dSniklas[QM-AH-MD5-ESP-DES-MD5-SUITE]
4662b81057dSniklasProtocols=		QM-AH-MD5,QM-ESP-DES-MD5
4672040585eSniklas
4682b81057dSniklas[QM-ESP-DES-MD5-AH-MD5-SUITE]
4692b81057dSniklasProtocols=		QM-ESP-DES-MD5,QM-AH-MD5
4702b81057dSniklas
4712b81057dSniklas# Quick mode protocols
4722b81057dSniklas
4732b81057dSniklas# DES
4742040585eSniklas
4752040585eSniklas[QM-ESP-DES]
4762040585eSniklasPROTOCOL_ID=		IPSEC_ESP
4772040585eSniklasTransforms=		QM-ESP-DES-XF
4782040585eSniklas
4792b81057dSniklas[QM-ESP-DES-MD5]
4802b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
4812b81057dSniklasTransforms=		QM-ESP-DES-MD5-XF
4822b81057dSniklas
4832b81057dSniklas[QM-ESP-DES-MD5-PFS]
4842b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
4852b81057dSniklasTransforms=		QM-ESP-DES-MD5-PFS-XF
4862b81057dSniklas
4872b81057dSniklas[QM-ESP-DES-SHA]
4882b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
4892b81057dSniklasTransforms=		QM-ESP-DES-SHA-XF
4902b81057dSniklas
4912b81057dSniklas# 3DES
4922b81057dSniklas
4932b81057dSniklas[QM-ESP-3DES-SHA]
4942b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
4952b81057dSniklasTransforms=		QM-ESP-3DES-SHA-XF
4962b81057dSniklas
4972b81057dSniklas[QM-ESP-3DES-SHA-PFS]
4982b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
4992b81057dSniklasTransforms=		QM-ESP-3DES-SHA-PFS-XF
5002b81057dSniklas
5012b81057dSniklas[QM-ESP-3DES-SHA-TRP]
5022b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
5032b81057dSniklasTransforms=		QM-ESP-3DES-SHA-TRP-XF
5042b81057dSniklas
5052b81057dSniklas# AH MD5
5062b81057dSniklas
5072b81057dSniklas[QM-AH-MD5]
5082b81057dSniklasPROTOCOL_ID=		IPSEC_AH
5092b81057dSniklasTransforms=		QM-AH-MD5-XF
5102b81057dSniklas
5112b81057dSniklas[QM-AH-MD5-PFS]
5122b81057dSniklasPROTOCOL_ID=		IPSEC_AH
5132b81057dSniklasTransforms=		QM-AH-MD5-PFS-XF
5142b81057dSniklas
5152b81057dSniklas# Quick mode transforms
5162b81057dSniklas
5172b81057dSniklas# ESP DES+MD5
5182b81057dSniklas
5192040585eSniklas[QM-ESP-DES-XF]
5202040585eSniklasTRANSFORM_ID=		DES
5212040585eSniklasENCAPSULATION_MODE=	TUNNEL
5222b81057dSniklasLife=			LIFE_600_SECS
5232040585eSniklas
5242b81057dSniklas[QM-ESP-DES-MD5-XF]
5252b81057dSniklasTRANSFORM_ID=		DES
5262b81057dSniklasENCAPSULATION_MODE=	TUNNEL
5272b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_MD5
5282b81057dSniklasLife=			LIFE_600_SECS
5292b81057dSniklas
5302b81057dSniklas[QM-ESP-DES-MD5-PFS-XF]
5312b81057dSniklasTRANSFORM_ID=		DES
5322b81057dSniklasENCAPSULATION_MODE=	TUNNEL
5332b81057dSniklasGROUP_DESCRIPTION=	MODP_768
5342b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_MD5
5352b81057dSniklasLife=			LIFE_600_SECS
5362b81057dSniklas
5372b81057dSniklas[QM-ESP-DES-SHA-XF]
5382b81057dSniklasTRANSFORM_ID=		DES
5392b81057dSniklasENCAPSULATION_MODE=	TUNNEL
5402b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
5412b81057dSniklasLife=			LIFE_600_SECS
5422b81057dSniklas
5432b81057dSniklas# 3DES
5442b81057dSniklas
5452b81057dSniklas[QM-ESP-3DES-SHA-XF]
5462b81057dSniklasTRANSFORM_ID=		3DES
5472b81057dSniklasENCAPSULATION_MODE=	TUNNEL
5482b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
5492b81057dSniklasLife=			LIFE_600_SECS
5502b81057dSniklas
5512b81057dSniklas[QM-ESP-3DES-SHA-PFS-XF]
5522b81057dSniklasTRANSFORM_ID=		3DES
5532b81057dSniklasENCAPSULATION_MODE=	TUNNEL
5542b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
5552b81057dSniklasGROUP_DESCRIPTION=	MODP_1024
5562b81057dSniklasLife=			LIFE_600_SECS
5572b81057dSniklas
5582b81057dSniklas[QM-ESP-3DES-SHA-TRP-XF]
5592b81057dSniklasTRANSFORM_ID=		3DES
5602b81057dSniklasENCAPSULATION_MODE=	TRANSPORT
5612b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
5622b81057dSniklasLife=			LIFE_600_SECS
5632b81057dSniklas
5642b81057dSniklas# AH
5652b81057dSniklas
5662b81057dSniklas[QM-AH-MD5-XF]
5672b81057dSniklasTRANSFORM_ID=		MD5
5682b81057dSniklasENCAPSULATION_MODE=	TUNNEL
5692b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_MD5
5702b81057dSniklasLife=			LIFE_600_SECS
5712b81057dSniklas
5722b81057dSniklas[QM-AH-MD5-PFS-XF]
5732b81057dSniklasTRANSFORM_ID=		MD5
5742b81057dSniklasENCAPSULATION_MODE=	TUNNEL
5752b81057dSniklasGROUP_DESCRIPTION=	MODP_768
5762b81057dSniklasLife=			LIFE_600_SECS
5772b81057dSniklas
5782b81057dSniklas[LIFE_600_SECS]
5792b81057dSniklasLIFE_TYPE=		SECONDS
5802b81057dSniklasLIFE_DURATION=		600,450:720
5812b81057dSniklas
5822b81057dSniklas[LIFE_3600_SECS]
5832b81057dSniklasLIFE_TYPE=		SECONDS
5842b81057dSniklasLIFE_DURATION=		3600,1800:7200
5852b81057dSniklas
5862b81057dSniklas[LIFE_1000_KB]
5872b81057dSniklasLIFE_TYPE=		KILOBYTES
5882b81057dSniklasLIFE_DURATION=		1000,768:1536
5892b81057dSniklas
5902b81057dSniklas[LIFE_32_MB]
5912b81057dSniklasLIFE_TYPE=		KILOBYTES
5922b81057dSniklasLIFE_DURATION=		32768,16384:65536
5932b81057dSniklas
5942b81057dSniklas[LIFE_4.5_GB]
5952b81057dSniklasLIFE_TYPE=		KILOBYTES
5962b81057dSniklasLIFE_DURATION=		4608000,4096000:8192000
5972040585eSniklas
5982040585eSniklas[RSA_SIG]
5992040585eSniklasCERT=			/etc/isakmpd_cert
6002040585eSniklasPRIVKEY=		/etc/isakmpd_key
6012040585eSniklasPUBKEY=			/etc/isakmpd_key.pub
6022040585eSniklas.Ed
6032040585eSniklas.Pp
6042040585eSniklas.Sh SEE ALSO
605*c5fe6c4eSniklas.Xr isakmpd 8 ,
606*c5fe6c4eSniklas.Xr ipsec 4 .
607