1*c5fe6c4eSniklas.\" $OpenBSD: isakmpd.conf.5,v 1.7 1999/02/26 03:45:09 niklas Exp $ 2*c5fe6c4eSniklas.\" $EOM: isakmpd.conf.5,v 1.11 1999/02/25 11:09:39 niklas Exp $ 32040585eSniklas.\" 42040585eSniklas.\" Copyright (c) 1998 Niklas Hallqvist. All rights reserved. 52040585eSniklas.\" 62040585eSniklas.\" Redistribution and use in source and binary forms, with or without 72040585eSniklas.\" modification, are permitted provided that the following conditions 82040585eSniklas.\" are met: 92040585eSniklas.\" 1. Redistributions of source code must retain the above copyright 102040585eSniklas.\" notice, this list of conditions and the following disclaimer. 112040585eSniklas.\" 2. Redistributions in binary form must reproduce the above copyright 122040585eSniklas.\" notice, this list of conditions and the following disclaimer in the 132040585eSniklas.\" documentation and/or other materials provided with the distribution. 142040585eSniklas.\" 3. All advertising materials mentioning features or use of this software 152040585eSniklas.\" must display the following acknowledgement: 162040585eSniklas.\" This product includes software developed by Ericsson Radio Systems. 172040585eSniklas.\" 4. The name of the author may not be used to endorse or promote products 182040585eSniklas.\" derived from this software without specific prior written permission. 192040585eSniklas.\" 202040585eSniklas.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 212040585eSniklas.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 222040585eSniklas.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 232040585eSniklas.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 242040585eSniklas.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 252040585eSniklas.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 262040585eSniklas.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 272040585eSniklas.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 282040585eSniklas.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 292040585eSniklas.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 302040585eSniklas.\" 312040585eSniklas.\" This code was written under funding by Ericsson Radio Systems. 322040585eSniklas.\" 332040585eSniklas.\" Manual page, using -mandoc macros 342040585eSniklas.\" 352040585eSniklas.Dd October 10, 1998 3658aefd4bSaaron.Dt ISAKMPD.CONF 5 372040585eSniklas.Os 382040585eSniklas.Sh NAME 392040585eSniklas.Nm isakmpd.conf 4058aefd4bSaaron.Nd configuration file for isakmpd 412040585eSniklas.Sh DESCRIPTION 4258aefd4bSaaron.Nm 4358aefd4bSaaronis the configuration file for the 442040585eSniklas.Nm isakmpd 452040585eSniklasdaemon managing security association and key management for the 4658aefd4bSaaronIPSEC layer of the kernel's networking stack. 472040585eSniklas.Pp 482040585eSniklasThe file is of a well known type of format called .INI style, named after 492040585eSniklasthe suffix used by an overrated windowing environment for its configuration 502040585eSniklasfiles. This format consists of sections, each beginning with a line looking 512040585eSniklaslike: 522040585eSniklas.Bd -literal 532040585eSniklas[Section name] 542040585eSniklas.Ed 552040585eSniklasBetween the brackets is the name of the section following this section header. 562040585eSniklasInside a section many tag/value pairs can be stored, each one looking like: 572040585eSniklas.Bd -literal 582040585eSniklasTag=Value 592040585eSniklas.Ed 602040585eSniklasIf the value needs more space than fits on a single line it's possible to 612040585eSniklascontinue it on the next by ending the first with a backspace character 622040585eSniklasimmediately before the newline character. This method can extend a value for 632040585eSniklasan arbitrary amount of lines. 642040585eSniklas.Pp 6558aefd4bSaaronComments can be put anywhere in the file by using a hash mark 6658aefd4bSaaron.Pq Sq \&# . 6758aefd4bSaaronThen the comment goes on to the end of the line. 682040585eSniklas.Pp 69*c5fe6c4eSniklasOften the right-hand side values consist of other section names. 70*c5fe6c4eSniklasThis results in a tree structure. 71*c5fe6c4eSniklasSome values are treated as a list of several scalar values, such lists always 72*c5fe6c4eSniklasuse comma as the separator. Some values are formated like this: X,Y:Z, which 73*c5fe6c4eSniklasis an offer/accept syntax, where X is a value we offer and Y:Z is a range of 74*c5fe6c4eSniklasaccepted values, inclusive. 75*c5fe6c4eSniklas.Pp 76*c5fe6c4eSniklas.Ss Roots 77*c5fe6c4eSniklas.Bl -hang -width 12n 78*c5fe6c4eSniklas.It Em General 79*c5fe6c4eSniklasGeneric global configuration parameters 80*c5fe6c4eSniklas.Bl -tag -width 12n 81*c5fe6c4eSniklas.It Em Retransmits 82*c5fe6c4eSniklasHow many times should a message be retransmitted before giving up. 83*c5fe6c4eSniklas.It Em Exchange-max-time 84*c5fe6c4eSniklasHow many seconds should an exchange maximally take to setup 85*c5fe6c4eSniklasbefore we give up. 86*c5fe6c4eSniklas.It Em Listen-on 87*c5fe6c4eSniklasA list of IP-addresses OK to listen on. This list is used as 88*c5fe6c4eSniklasa filter for the set of addresses the interfaces configured 89*c5fe6c4eSniklasprovides. This means that we won't see if an address given 90*c5fe6c4eSniklashere does not exist on this host, thus no error is given for 91*c5fe6c4eSniklasthat case. 92*c5fe6c4eSniklas.El 93*c5fe6c4eSniklas.It Em Phase 1 94*c5fe6c4eSniklasISAKMP SA negotiation parameter root 95*c5fe6c4eSniklas.Bl -tag -width 12n 96*c5fe6c4eSniklas.It Em <IP-address> 97*c5fe6c4eSniklasA name of the ISAKMP peer at the given IP-address. This name 98*c5fe6c4eSniklasis used as the section name for further information to be 99*c5fe6c4eSniklasfound. Look at <ISAKMP-peer> below. 100*c5fe6c4eSniklas.El 101*c5fe6c4eSniklas.It Em Phase 2 102*c5fe6c4eSniklasIPsec SA negotiation parameter root 103*c5fe6c4eSniklas.Bl -tag -width 12n 104*c5fe6c4eSniklas.It Em Connections 105*c5fe6c4eSniklasA list of directed IPSec "connection" names. This name 106*c5fe6c4eSniklasis used as the section name for further information to be 107*c5fe6c4eSniklasfound. Look at <IPSec-connection> below. 108*c5fe6c4eSniklas.El 109*c5fe6c4eSniklas.El 110*c5fe6c4eSniklas.Ss Referred-to sections 111*c5fe6c4eSniklas.Bl -hang -width 12n 112*c5fe6c4eSniklas.It Em <ISAKMP-peer> 113*c5fe6c4eSniklasParameters for negotiation with an ISAKMP peer 114*c5fe6c4eSniklas.Bl -tag -width 12n 115*c5fe6c4eSniklas.It Em Phase 116*c5fe6c4eSniklasThe constant 117*c5fe6c4eSniklas.Li 1 , 118*c5fe6c4eSniklasas ISAKMP-peers and IPSec-connections 119*c5fe6c4eSniklasreally are handled by the same code inside isakmpd. 120*c5fe6c4eSniklas.It Em Transport 121*c5fe6c4eSniklasThe name of the transport protocol, normally 122*c5fe6c4eSniklas.Li udp . 123*c5fe6c4eSniklas.It Em Address 124*c5fe6c4eSniklasThe IP-address of the peer. 125*c5fe6c4eSniklas.It Em Port 126*c5fe6c4eSniklasIn case of UDP, the UDP port number to send to. This is optional, the 127*c5fe6c4eSniklasdefault value is 500 which is the IANA-registered number for ISAKMP. 128*c5fe6c4eSniklas.It Em Configuration 129*c5fe6c4eSniklasThe name of the ISAKMP-configuration section to use. Look at 130*c5fe6c4eSniklas<ISAKMP-configuration> below. 131*c5fe6c4eSniklas.It Em Authentication 132*c5fe6c4eSniklasAuthentication data for this specific peer. In the case of 133*c5fe6c4eSniklaspreshared key, this is the key value itself. 134*c5fe6c4eSniklas.El 135*c5fe6c4eSniklas.It Em <ISAKMP-configuration> 136*c5fe6c4eSniklas.Bl -tag -width 12n 137*c5fe6c4eSniklas.It Em DOI 138*c5fe6c4eSniklasThe domain of interpretation as given by the RFCs. Normally 139*c5fe6c4eSniklas.Li IPSEC . 140*c5fe6c4eSniklas.It Em EXCHANGE_TYPE 141*c5fe6c4eSniklasThe exchange type as given by the RFCs. For main mode this is 142*c5fe6c4eSniklas.Li ID_PROT . 143*c5fe6c4eSniklas.It Em Transforms 144*c5fe6c4eSniklasA list of proposed transforms to use for protecting the 145*c5fe6c4eSniklasISAKMP traffic. These are actually names for sections 146*c5fe6c4eSniklasfurther describing the transforms. Look at <ISAKMP-transform> 147*c5fe6c4eSniklasbelow. 148*c5fe6c4eSniklas.El 149*c5fe6c4eSniklas.It Em <ISAKMP-transform> 150*c5fe6c4eSniklas.Bl -tag -width 12n 151*c5fe6c4eSniklas.It Em ENCRYPTION_ALGORITHM 152*c5fe6c4eSniklasThe encryption algorithm as the RFCs name it. 153*c5fe6c4eSniklas.It Em KEY_LENGTH 154*c5fe6c4eSniklasFor encryption algorithms with variable key length, this is 155*c5fe6c4eSniklaswhere the offered/accepted keylengths are described. The 156*c5fe6c4eSniklasvalue is of the offer-accept kind described above. 157*c5fe6c4eSniklas.It Em HASH_ALGORITHM 158*c5fe6c4eSniklasThe hash algorithm as the RFCs name it. 159*c5fe6c4eSniklas.It Em AUTHENTICATION_METHOD 160*c5fe6c4eSniklasThe authentication method as the RFCs name it. 161*c5fe6c4eSniklas.It Em GROUP_DESCRIPTION 162*c5fe6c4eSniklasThe group used for Diffie-Hellman exponentiations. The 163*c5fe6c4eSniklasname are symbolic, like 164*c5fe6c4eSniklas.Li MODP_768 , MODP_1024 , EC_155 165*c5fe6c4eSniklasand 166*c5fe6c4eSniklas.Li EC_185 . 167*c5fe6c4eSniklas.It Em Life 168*c5fe6c4eSniklasA list of lifetime descriptions. Each element is in itself 169*c5fe6c4eSniklasa name of the section that defines the lifetime. Look at 170*c5fe6c4eSniklas<Lifetime> below. 171*c5fe6c4eSniklas.El 172*c5fe6c4eSniklas.It Em <Lifetime> 173*c5fe6c4eSniklas.Bl -tag -width 12n 174*c5fe6c4eSniklas.It Em LIFE_TYPE 175*c5fe6c4eSniklas.Li SECONDS 176*c5fe6c4eSniklasor 177*c5fe6c4eSniklas.Li BYTES 178*c5fe6c4eSniklasdepending on the type of the duration. 179*c5fe6c4eSniklas.It Em LIFE_DURATION 180*c5fe6c4eSniklasAn offer/accept kind of value, see above. 181*c5fe6c4eSniklas.El 182*c5fe6c4eSniklas.It Em <IPSec-connection> 183*c5fe6c4eSniklas.Bl -tag -width 12n 184*c5fe6c4eSniklas.It Em Phase 185*c5fe6c4eSniklasThe constant 186*c5fe6c4eSniklas.Li 2 , 187*c5fe6c4eSniklasas ISAKMP-peers and IPSec-connections 188*c5fe6c4eSniklasreally are handled by the same code inside isakmpd. 189*c5fe6c4eSniklas.It Em ISAKMP-peer 190*c5fe6c4eSniklasThe name of the ISAKMP-peer which to talk to in order to 191*c5fe6c4eSniklasset up this connection. The value is the name of an 192*c5fe6c4eSniklas<ISAKMP-peer> section. See above. 193*c5fe6c4eSniklas.It Em Configuration 194*c5fe6c4eSniklasThe name of the IPSec-configuration section to use. Look at 195*c5fe6c4eSniklas<IPSec-configuration> below. 196*c5fe6c4eSniklas.It Em Local-ID 197*c5fe6c4eSniklasIf existent, the name of the section that describes the 198*c5fe6c4eSniklasoptional local client ID that we should present to our peer. 199*c5fe6c4eSniklasLook at <IPSec-ID> below. 200*c5fe6c4eSniklas.It Em Remote-ID 201*c5fe6c4eSniklasIf existent, the name of the section that describes the 202*c5fe6c4eSniklasoptional remote client ID that we should present to our peer. 203*c5fe6c4eSniklasLook at <IPSec-ID> below. 204*c5fe6c4eSniklas.El 205*c5fe6c4eSniklas.It Em <IPSec-configuration> 206*c5fe6c4eSniklas.Bl -tag -width 12n 207*c5fe6c4eSniklas.It Em DOI 208*c5fe6c4eSniklasThe domain of interpretation as given by the RFCs. Normally 209*c5fe6c4eSniklas.Li IPSEC . 210*c5fe6c4eSniklas.It Em EXCHANGE_TYPE 211*c5fe6c4eSniklasThe exchange type as given by the RFCs. For quick mode this is 212*c5fe6c4eSniklas.Li QUICK_MODE . 213*c5fe6c4eSniklas.It Em Suites 214*c5fe6c4eSniklasA list of protection suites (bundles of protocols) useable for 215*c5fe6c4eSniklasprotecting the IP traffic. Each of the list elements is a 216*c5fe6c4eSniklasname of an <IPSec-suite> section. See below. 217*c5fe6c4eSniklas.El 218*c5fe6c4eSniklas.It Em <IPSec-suite> 219*c5fe6c4eSniklas.Bl -tag -width 12n 220*c5fe6c4eSniklas.It Em Protocols 221*c5fe6c4eSniklasA list of the protocols included in this protection suite. 222*c5fe6c4eSniklasEach of the list elements is a name of an <IPSec-protocol> 223*c5fe6c4eSniklassection. See below. 224*c5fe6c4eSniklas.El 225*c5fe6c4eSniklas.It Em <IPSec-protocol> 226*c5fe6c4eSniklas.Bl -tag -width 12n 227*c5fe6c4eSniklas.It Em PROTOCOL_ID 228*c5fe6c4eSniklasThe protocol as given by the RFCs. Acceptable values today 229*c5fe6c4eSniklasare 230*c5fe6c4eSniklas.Li IPSEC_AH 231*c5fe6c4eSniklasand 232*c5fe6c4eSniklas.Li IPSEC_ESP . 233*c5fe6c4eSniklas.It Em Transforms 234*c5fe6c4eSniklasA list of transforms useable for implementing the protocol. 235*c5fe6c4eSniklasEach of the list elements is a name of an <IPSec-transform> 236*c5fe6c4eSniklassection. See below. 237*c5fe6c4eSniklas.It Em ReplayWindow 238*c5fe6c4eSniklasThe size of the window used for replay protection. Normally this is should 239*c5fe6c4eSniklasnot be touched, unless you do local IPSec setups, i.e. both the sender and 240*c5fe6c4eSniklasreceiver are on the same box. Then replay protection has to be turned off 241*c5fe6c4eSniklaswhich is done by setting this parameter to -1. Look at the 242*c5fe6c4eSniklas.Nm ESP 243*c5fe6c4eSniklasand 244*c5fe6c4eSniklas.Nm AH 245*c5fe6c4eSniklasRFCs for a better description. 246*c5fe6c4eSniklas.El 247*c5fe6c4eSniklas.It Em <IPSec-transform> 248*c5fe6c4eSniklas.Bl -tag -width 12n 249*c5fe6c4eSniklas.It Em TRANSFORM_ID 250*c5fe6c4eSniklasThe transform ID as given by the RFCs. 251*c5fe6c4eSniklas.It Em ENCAPSULATION_MODE 252*c5fe6c4eSniklasThe encapsulation mode as given by the RFCs. This means 253*c5fe6c4eSniklasTRANSPORT or TUNNEL. 254*c5fe6c4eSniklas.It Em AUTHENTICATION_ALGORITHM 255*c5fe6c4eSniklasThe optional authentication algorithm in the case of this 256*c5fe6c4eSniklasbeing an ESP transform. 257*c5fe6c4eSniklas.It Em GROUP_DESCRIPTION 258*c5fe6c4eSniklasAn optional (provides PFS if present) Diffie-Hellman group 259*c5fe6c4eSniklasdescription. The values are the same as GROUP_DESCRIPTION's 260*c5fe6c4eSniklasin <ISAKMP-transform> sections shown above. 261*c5fe6c4eSniklas.It Em Life 262*c5fe6c4eSniklasList of lifetimes, each element is a <Lifetime> section name. 263*c5fe6c4eSniklas.El 264*c5fe6c4eSniklas.It Em <IPSec-ID> 265*c5fe6c4eSniklas.Bl -tag -width 12n 266*c5fe6c4eSniklas.It Em ID-type 267*c5fe6c4eSniklasThe ID type as given by the RFCs. For IPSec this is currently 268*c5fe6c4eSniklas.Li IPV4_ADDR 269*c5fe6c4eSniklasor 270*c5fe6c4eSniklas.Li IPV4_ADDR_SUBNET . 271*c5fe6c4eSniklas.It Em Address 272*c5fe6c4eSniklasIf the ID-type is 273*c5fe6c4eSniklas.Li IPV4_ADDR , 274*c5fe6c4eSniklasthis tag should exist and be an IP-address. 275*c5fe6c4eSniklas.It Em Network 276*c5fe6c4eSniklasIf the ID-type is 277*c5fe6c4eSniklas.Li IPV4_ADDR_SUBNET 278*c5fe6c4eSniklasthis tag should exist and 279*c5fe6c4eSniklasbe a network address. 280*c5fe6c4eSniklas.It Em Netmask 281*c5fe6c4eSniklasIf the ID-type is 282*c5fe6c4eSniklas.Li IPV4_ADDR_SUBNET 283*c5fe6c4eSniklasthis tag should exist and 284*c5fe6c4eSniklasbe a network subnet mask. 285*c5fe6c4eSniklas.El 286*c5fe6c4eSniklas.El 2872040585eSniklas.Sh EXAMPLE 2882040585eSniklasAn example of a configuration file: 2892040585eSniklas.Pp 2902040585eSniklas.Bd -literal 2912040585eSniklas# A configuration sample for the isakmpd ISAKMP/Oakley (aka IKE) daemon. 2922040585eSniklas 2932040585eSniklas[General] 2942b81057dSniklasRetransmits= 3 2952b81057dSniklasExchange-max-time= 120 296*c5fe6c4eSniklasListen-on= 10.1.0.2 2972040585eSniklas 298*c5fe6c4eSniklas# Incoming phase 1 negotiations are multiplexed on the source IP address 2992b81057dSniklas[Phase 1] 300*c5fe6c4eSniklas10.1.0.1= ISAKMP-peer-west 3012b81057dSniklas 302*c5fe6c4eSniklas# These connections are walked over after config file parsing and told 303*c5fe6c4eSniklas# to the application layer so that it will inform us when traffic wants to 304*c5fe6c4eSniklas# pass over them. This means we can do on-demand keying. 305*c5fe6c4eSniklas[Phase 2] 306*c5fe6c4eSniklasConnections= IPsec-east-west 307*c5fe6c4eSniklas 308*c5fe6c4eSniklas[ISAKMP-peer-west] 3092b81057dSniklasPhase= 1 3102b81057dSniklasTransport= udp 3112b81057dSniklas# XXX Not yet implemented 3122b81057dSniklas#Local-address= 10.1.0.2 3132b81057dSniklasAddress= 10.1.0.1 3142b81057dSniklas# Default values for "Port" commented out 3152b81057dSniklas#Port= isakmp 3162b81057dSniklas#Port= 500 3172b81057dSniklasConfiguration= Default-main-mode 3182b81057dSniklasAuthentication= mekmitasdigoat 3192b81057dSniklas 320*c5fe6c4eSniklas[IPsec-east-west] 3212b81057dSniklasPhase= 2 322*c5fe6c4eSniklasISAKMP-peer= ISAKMP-peer-west 3232b81057dSniklasConfiguration= Default-quick-mode 324*c5fe6c4eSniklasLocal-ID= Net-east 325*c5fe6c4eSniklasRemote-ID= Net-west 3262b81057dSniklas 327*c5fe6c4eSniklas[Net-west] 3282b81057dSniklasID-type= IPV4_ADDR_SUBNET 3292b81057dSniklasNetwork= 192.168.1.0 3302b81057dSniklasNetmask= 255.255.255.0 3312b81057dSniklas 332*c5fe6c4eSniklas[Net-east] 3332b81057dSniklasID-type= IPV4_ADDR_SUBNET 3342b81057dSniklasNetwork= 192.168.2.0 3352b81057dSniklasNetmask= 255.255.255.0 3362b81057dSniklas 3372b81057dSniklas# Main mode descriptions 3382b81057dSniklas 3392b81057dSniklas[Default-main-mode] 3402b81057dSniklasDOI= IPSEC 3412b81057dSniklasEXCHANGE_TYPE= ID_PROT 3422b81057dSniklasTransforms= 3DES-SHA 3432b81057dSniklas 3442b81057dSniklas# Main mode transforms 3452b81057dSniklas###################### 3462b81057dSniklas 3472b81057dSniklas# DES 3482040585eSniklas 3492040585eSniklas[DES-MD5] 3502040585eSniklasENCRYPTION_ALGORITHM= DES_CBC 3512040585eSniklasHASH_ALGORITHM= MD5 3522040585eSniklasAUTHENTICATION_METHOD= PRE_SHARED 3532040585eSniklasGROUP_DESCRIPTION= MODP_768 3542b81057dSniklasLife= LIFE_600_SECS,LIFE_1000_KB 3552b81057dSniklas 3562b81057dSniklas[DES-MD5-NO-VOL-LIFE] 3572b81057dSniklasENCRYPTION_ALGORITHM= DES_CBC 3582b81057dSniklasHASH_ALGORITHM= MD5 3592b81057dSniklasAUTHENTICATION_METHOD= PRE_SHARED 3602b81057dSniklasGROUP_DESCRIPTION= MODP_768 361d70ca5f7SniklasLife= LIFE_600_SECS 3622040585eSniklas 3632b81057dSniklas[DES-SHA] 3642b81057dSniklasENCRYPTION_ALGORITHM= DES_CBC 3652b81057dSniklasHASH_ALGORITHM= SHA 3662b81057dSniklasAUTHENTICATION_METHOD= PRE_SHARED 3672b81057dSniklasGROUP_DESCRIPTION= MODP_768 3682b81057dSniklasLife= LIFE_600_SECS,LIFE_1000_KB 3692b81057dSniklas 3702b81057dSniklas# 3DES 3712b81057dSniklas 3722b81057dSniklas[3DES-SHA] 3732b81057dSniklasENCRYPTION_ALGORITHM= 3DES_CBC 3742040585eSniklasHASH_ALGORITHM= SHA 3752040585eSniklasAUTHENTICATION_METHOD= PRE_SHARED 3762040585eSniklasGROUP_DESCRIPTION= MODP_1024 3772b81057dSniklasLife= LIFE_600_SECS,LIFE_1000_KB 3782b81057dSniklas 3792b81057dSniklas# Blowfish 3802b81057dSniklas 3812b81057dSniklas[BLF-SHA-M1024] 3822b81057dSniklasENCRYPTION_ALGORITHM= BLOWFISH_CBC 3832b81057dSniklasKEY_LENGTH= 128,96:192 3842b81057dSniklasHASH_ALGORITHM= SHA 3852b81057dSniklasAUTHENTICATION_METHOD= PRE_SHARED 3862b81057dSniklasGROUP_DESCRIPTION= MODP_1024 3872b81057dSniklasLife= LIFE_600_SECS,LIFE_1000_KB 3882040585eSniklas 3892040585eSniklas[BLF-SHA-EC155] 390d70ca5f7SniklasENCRYPTION_ALGORITHM= BLOWFISH_CBC 3912b81057dSniklasKEY_LENGTH= 128,96:192 3922040585eSniklasHASH_ALGORITHM= SHA 3932040585eSniklasAUTHENTICATION_METHOD= PRE_SHARED 3942040585eSniklasGROUP_DESCRIPTION= EC2N_155 3952b81057dSniklasLife= LIFE_600_SECS,LIFE_1000_KB 3962b81057dSniklas 3972b81057dSniklas[BLF-MD5-EC155] 3982b81057dSniklasENCRYPTION_ALGORITHM= BLOWFISH_CBC 3992b81057dSniklasKEY_LENGTH= 128,96:192 4002b81057dSniklasHASH_ALGORITHM= MD5 4012b81057dSniklasAUTHENTICATION_METHOD= PRE_SHARED 4022b81057dSniklasGROUP_DESCRIPTION= EC2N_155 4032b81057dSniklasLife= LIFE_600_SECS,LIFE_1000_KB 4042040585eSniklas 4052040585eSniklas[BLF-SHA-EC185] 406d70ca5f7SniklasENCRYPTION_ALGORITHM= BLOWFISH_CBC 4072b81057dSniklasKEY_LENGTH= 128,96:192 4082040585eSniklasHASH_ALGORITHM= SHA 4092040585eSniklasAUTHENTICATION_METHOD= PRE_SHARED 4102040585eSniklasGROUP_DESCRIPTION= EC2N_185 4112b81057dSniklasLife= LIFE_600_SECS,LIFE_1000_KB 4122040585eSniklas 4132b81057dSniklas# Quick mode description 4142b81057dSniklas######################## 4152b81057dSniklas 4162b81057dSniklas[Default-quick-mode] 4172b81057dSniklasDOI= IPSEC 4182b81057dSniklasEXCHANGE_TYPE= QUICK_MODE 4192b81057dSniklasSuites= QM-ESP-3DES-SHA-PFS-SUITE,QM-ESP-DES-MD5-SUITE 4202b81057dSniklas 4212b81057dSniklas# Quick mode protection suites 4222b81057dSniklas############################## 4232b81057dSniklas 4242b81057dSniklas# DES 4252040585eSniklas 426d70ca5f7Sniklas[QM-ESP-DES-SUITE] 427d70ca5f7SniklasProtocols= QM-ESP-DES 428d70ca5f7Sniklas 4292b81057dSniklas[QM-ESP-DES-PFS-SUITE] 4302b81057dSniklasProtocols= QM-ESP-DES-PFS 4312b81057dSniklas 4322040585eSniklas[QM-ESP-DES-MD5-SUITE] 4332040585eSniklasProtocols= QM-ESP-DES-MD5 4342040585eSniklas 4352b81057dSniklas[QM-ESP-DES-MD5-PFS-SUITE] 4362b81057dSniklasProtocols= QM-ESP-DES-MD5-PFS 4372040585eSniklas 4382b81057dSniklas[QM-ESP-DES-SHA-SUITE] 4392b81057dSniklasProtocols= QM-ESP-DES-SHA 4402040585eSniklas 4412b81057dSniklas[QM-ESP-DES-SHA-PFS-SUITE] 4422b81057dSniklasProtocols= QM-ESP-DES-SHA-PFS 4432040585eSniklas 4442b81057dSniklas# 3DES 4452b81057dSniklas 4462b81057dSniklas[QM-ESP-3DES-SHA-SUITE] 4472b81057dSniklasProtocols= QM-ESP-3DES-SHA 4482b81057dSniklas 4492b81057dSniklas[QM-ESP-3DES-SHA-PFS-SUITE] 4502b81057dSniklasProtocols= QM-ESP-3DES-SHA-PFS 4512b81057dSniklas 4522b81057dSniklas# AH 4532b81057dSniklas 4542b81057dSniklas[QM-AH-MD5-SUITE] 4552b81057dSniklasProtocols= QM-AH-MD5 4562b81057dSniklas 4572b81057dSniklas[QM-AH-MD5-PFS-SUITE] 4582b81057dSniklasProtocols= QM-AH-MD5-PFS 4592b81057dSniklas 4602b81057dSniklas# AH + ESP 4612040585eSniklas 4622040585eSniklas[QM-AH-MD5-ESP-DES-SUITE] 4632040585eSniklasProtocols= QM-AH-MD5,QM-ESP-DES 4642040585eSniklas 4652b81057dSniklas[QM-AH-MD5-ESP-DES-MD5-SUITE] 4662b81057dSniklasProtocols= QM-AH-MD5,QM-ESP-DES-MD5 4672040585eSniklas 4682b81057dSniklas[QM-ESP-DES-MD5-AH-MD5-SUITE] 4692b81057dSniklasProtocols= QM-ESP-DES-MD5,QM-AH-MD5 4702b81057dSniklas 4712b81057dSniklas# Quick mode protocols 4722b81057dSniklas 4732b81057dSniklas# DES 4742040585eSniklas 4752040585eSniklas[QM-ESP-DES] 4762040585eSniklasPROTOCOL_ID= IPSEC_ESP 4772040585eSniklasTransforms= QM-ESP-DES-XF 4782040585eSniklas 4792b81057dSniklas[QM-ESP-DES-MD5] 4802b81057dSniklasPROTOCOL_ID= IPSEC_ESP 4812b81057dSniklasTransforms= QM-ESP-DES-MD5-XF 4822b81057dSniklas 4832b81057dSniklas[QM-ESP-DES-MD5-PFS] 4842b81057dSniklasPROTOCOL_ID= IPSEC_ESP 4852b81057dSniklasTransforms= QM-ESP-DES-MD5-PFS-XF 4862b81057dSniklas 4872b81057dSniklas[QM-ESP-DES-SHA] 4882b81057dSniklasPROTOCOL_ID= IPSEC_ESP 4892b81057dSniklasTransforms= QM-ESP-DES-SHA-XF 4902b81057dSniklas 4912b81057dSniklas# 3DES 4922b81057dSniklas 4932b81057dSniklas[QM-ESP-3DES-SHA] 4942b81057dSniklasPROTOCOL_ID= IPSEC_ESP 4952b81057dSniklasTransforms= QM-ESP-3DES-SHA-XF 4962b81057dSniklas 4972b81057dSniklas[QM-ESP-3DES-SHA-PFS] 4982b81057dSniklasPROTOCOL_ID= IPSEC_ESP 4992b81057dSniklasTransforms= QM-ESP-3DES-SHA-PFS-XF 5002b81057dSniklas 5012b81057dSniklas[QM-ESP-3DES-SHA-TRP] 5022b81057dSniklasPROTOCOL_ID= IPSEC_ESP 5032b81057dSniklasTransforms= QM-ESP-3DES-SHA-TRP-XF 5042b81057dSniklas 5052b81057dSniklas# AH MD5 5062b81057dSniklas 5072b81057dSniklas[QM-AH-MD5] 5082b81057dSniklasPROTOCOL_ID= IPSEC_AH 5092b81057dSniklasTransforms= QM-AH-MD5-XF 5102b81057dSniklas 5112b81057dSniklas[QM-AH-MD5-PFS] 5122b81057dSniklasPROTOCOL_ID= IPSEC_AH 5132b81057dSniklasTransforms= QM-AH-MD5-PFS-XF 5142b81057dSniklas 5152b81057dSniklas# Quick mode transforms 5162b81057dSniklas 5172b81057dSniklas# ESP DES+MD5 5182b81057dSniklas 5192040585eSniklas[QM-ESP-DES-XF] 5202040585eSniklasTRANSFORM_ID= DES 5212040585eSniklasENCAPSULATION_MODE= TUNNEL 5222b81057dSniklasLife= LIFE_600_SECS 5232040585eSniklas 5242b81057dSniklas[QM-ESP-DES-MD5-XF] 5252b81057dSniklasTRANSFORM_ID= DES 5262b81057dSniklasENCAPSULATION_MODE= TUNNEL 5272b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_MD5 5282b81057dSniklasLife= LIFE_600_SECS 5292b81057dSniklas 5302b81057dSniklas[QM-ESP-DES-MD5-PFS-XF] 5312b81057dSniklasTRANSFORM_ID= DES 5322b81057dSniklasENCAPSULATION_MODE= TUNNEL 5332b81057dSniklasGROUP_DESCRIPTION= MODP_768 5342b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_MD5 5352b81057dSniklasLife= LIFE_600_SECS 5362b81057dSniklas 5372b81057dSniklas[QM-ESP-DES-SHA-XF] 5382b81057dSniklasTRANSFORM_ID= DES 5392b81057dSniklasENCAPSULATION_MODE= TUNNEL 5402b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 5412b81057dSniklasLife= LIFE_600_SECS 5422b81057dSniklas 5432b81057dSniklas# 3DES 5442b81057dSniklas 5452b81057dSniklas[QM-ESP-3DES-SHA-XF] 5462b81057dSniklasTRANSFORM_ID= 3DES 5472b81057dSniklasENCAPSULATION_MODE= TUNNEL 5482b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 5492b81057dSniklasLife= LIFE_600_SECS 5502b81057dSniklas 5512b81057dSniklas[QM-ESP-3DES-SHA-PFS-XF] 5522b81057dSniklasTRANSFORM_ID= 3DES 5532b81057dSniklasENCAPSULATION_MODE= TUNNEL 5542b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 5552b81057dSniklasGROUP_DESCRIPTION= MODP_1024 5562b81057dSniklasLife= LIFE_600_SECS 5572b81057dSniklas 5582b81057dSniklas[QM-ESP-3DES-SHA-TRP-XF] 5592b81057dSniklasTRANSFORM_ID= 3DES 5602b81057dSniklasENCAPSULATION_MODE= TRANSPORT 5612b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 5622b81057dSniklasLife= LIFE_600_SECS 5632b81057dSniklas 5642b81057dSniklas# AH 5652b81057dSniklas 5662b81057dSniklas[QM-AH-MD5-XF] 5672b81057dSniklasTRANSFORM_ID= MD5 5682b81057dSniklasENCAPSULATION_MODE= TUNNEL 5692b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_MD5 5702b81057dSniklasLife= LIFE_600_SECS 5712b81057dSniklas 5722b81057dSniklas[QM-AH-MD5-PFS-XF] 5732b81057dSniklasTRANSFORM_ID= MD5 5742b81057dSniklasENCAPSULATION_MODE= TUNNEL 5752b81057dSniklasGROUP_DESCRIPTION= MODP_768 5762b81057dSniklasLife= LIFE_600_SECS 5772b81057dSniklas 5782b81057dSniklas[LIFE_600_SECS] 5792b81057dSniklasLIFE_TYPE= SECONDS 5802b81057dSniklasLIFE_DURATION= 600,450:720 5812b81057dSniklas 5822b81057dSniklas[LIFE_3600_SECS] 5832b81057dSniklasLIFE_TYPE= SECONDS 5842b81057dSniklasLIFE_DURATION= 3600,1800:7200 5852b81057dSniklas 5862b81057dSniklas[LIFE_1000_KB] 5872b81057dSniklasLIFE_TYPE= KILOBYTES 5882b81057dSniklasLIFE_DURATION= 1000,768:1536 5892b81057dSniklas 5902b81057dSniklas[LIFE_32_MB] 5912b81057dSniklasLIFE_TYPE= KILOBYTES 5922b81057dSniklasLIFE_DURATION= 32768,16384:65536 5932b81057dSniklas 5942b81057dSniklas[LIFE_4.5_GB] 5952b81057dSniklasLIFE_TYPE= KILOBYTES 5962b81057dSniklasLIFE_DURATION= 4608000,4096000:8192000 5972040585eSniklas 5982040585eSniklas[RSA_SIG] 5992040585eSniklasCERT= /etc/isakmpd_cert 6002040585eSniklasPRIVKEY= /etc/isakmpd_key 6012040585eSniklasPUBKEY= /etc/isakmpd_key.pub 6022040585eSniklas.Ed 6032040585eSniklas.Pp 6042040585eSniklas.Sh SEE ALSO 605*c5fe6c4eSniklas.Xr isakmpd 8 , 606*c5fe6c4eSniklas.Xr ipsec 4 . 607