xref: /openbsd/sbin/isakmpd/isakmpd.conf.5 (revision d9bb20e6)
1*d9bb20e6Shshoexer.\" $OpenBSD: isakmpd.conf.5,v 1.116 2006/06/11 11:07:41 hshoexer Exp $
2e55ca143Sniklas.\" $EOM: isakmpd.conf.5,v 1.57 2000/12/21 14:43:17 ho Exp $
32040585eSniklas.\"
444f0148dSniklas.\" Copyright (c) 1998, 1999, 2000 Niklas Hallqvist.  All rights reserved.
54ca71560Sho.\" Copyright (c) 2000, 2001, 2002 H�kan Olsson.  All rights reserved.
62040585eSniklas.\"
72040585eSniklas.\" Redistribution and use in source and binary forms, with or without
82040585eSniklas.\" modification, are permitted provided that the following conditions
92040585eSniklas.\" are met:
102040585eSniklas.\" 1. Redistributions of source code must retain the above copyright
112040585eSniklas.\"    notice, this list of conditions and the following disclaimer.
122040585eSniklas.\" 2. Redistributions in binary form must reproduce the above copyright
132040585eSniklas.\"    notice, this list of conditions and the following disclaimer in the
142040585eSniklas.\"    documentation and/or other materials provided with the distribution.
152040585eSniklas.\"
162040585eSniklas.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
172040585eSniklas.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
182040585eSniklas.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
192040585eSniklas.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
202040585eSniklas.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
212040585eSniklas.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
222040585eSniklas.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
232040585eSniklas.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
242040585eSniklas.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
252040585eSniklas.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
262040585eSniklas.\"
272040585eSniklas.\" This code was written under funding by Ericsson Radio Systems.
282040585eSniklas.\"
292040585eSniklas.\" Manual page, using -mandoc macros
302040585eSniklas.\"
3172578f93Sho.Dd August 07, 2002
3258aefd4bSaaron.Dt ISAKMPD.CONF 5
332040585eSniklas.Os
342040585eSniklas.Sh NAME
352040585eSniklas.Nm isakmpd.conf
3658aefd4bSaaron.Nd configuration file for isakmpd
372040585eSniklas.Sh DESCRIPTION
3858aefd4bSaaron.Nm
3958aefd4bSaaronis the configuration file for the
40e407932bSjmc.Xr isakmpd 8
41ffa2dcb0Sjmcdaemon, managing security association and key management for the
4261d575f0SangelosIPsec layer of the kernel's networking stack.
432040585eSniklas.Pp
442040585eSniklasThe file is of a well known type of format called .INI style, named after
452040585eSniklasthe suffix used by an overrated windowing environment for its configuration
469615e1d4Saaronfiles.
479615e1d4SaaronThis format consists of sections, each beginning with a line looking like:
48ffa2dcb0Sjmc.Bd -unfilled
49ffa2dcb0Sjmc.Bq Sy Section name
502040585eSniklas.Ed
512040585eSniklasBetween the brackets is the name of the section following this section header.
522040585eSniklasInside a section many tag/value pairs can be stored, each one looking like:
53ffa2dcb0Sjmc.Bd -unfilled
54ffa2dcb0Sjmc.Ar Tag Ns = Ns Ar Value
552040585eSniklas.Ed
56ffa2dcb0SjmcIf the value needs more space than fits on a single line, it's possible to
57a2067f52Sniklascontinue it on the next by ending the first with a backslash character
589615e1d4Saaronimmediately before the newline character.
590e2d4717SkjellThis method can extend a value for an arbitrary number of lines.
602040585eSniklas.Pp
6158aefd4bSaaronComments can be put anywhere in the file by using a hash mark
6258aefd4bSaaron.Pq Sq \&# .
630e2d4717SkjellThe comment extends to the end of the current line.
642040585eSniklas.Pp
65c5fe6c4eSniklasOften the right-hand side values consist of other section names.
66c5fe6c4eSniklasThis results in a tree structure.
670e2d4717SkjellSome values are treated as a list of several scalar values.
680e2d4717SkjellSuch lists always use a comma character as the separator.
699615e1d4SaaronSome values are formatted like this: X,Y:Z, which
70c5fe6c4eSniklasis an offer/accept syntax, where X is a value we offer and Y:Z is a range of
71c5fe6c4eSniklasaccepted values, inclusive.
72c5fe6c4eSniklas.Pp
73bad0180eShoTo activate changes to
74bad0180eSho.Nm
75bad0180eShowithout restarting
76ffa2dcb0Sjmc.Xr isakmpd 8 ,
774eb3dd62Sjmcsend a
784eb3dd62Sjmc.Dv SIGHUP
794eb3dd62Sjmcsignal to the daemon process.
80ffa2dcb0Sjmc.Sh AUTO-GENERATED PARTS OF THE CONFIGURATION
810e2d4717SkjellSome predefined section names are recognized by the daemon, avoiding the need
820e2d4717Skjellto fully specify the Main Mode transforms and Quick Mode suites, protocols,
8352e712aeSniklasand transforms.
8452e712aeSniklas.Pp
8552e712aeSniklasFor Main Mode:
86*d9bb20e6Shshoexer.\"{cipher}-{hash}[-{group}][-RSA_SIG]
87ffa2dcb0Sjmc.Bl -inset -compact
88ffa2dcb0Sjmc.It Xo
89ffa2dcb0Sjmc.Sm off
90ffa2dcb0Sjmc.No {
91*d9bb20e6Shshoexer.Ar cipher
92ffa2dcb0Sjmc.No }-{
93*d9bb20e6Shshoexer.Ar hash
94*d9bb20e6Shshoexer.No }[{-
95*d9bb20e6Shshoexer.Ar group
96ffa2dcb0Sjmc.No }]
9777012c86Sjmc.No [-
9877012c86Sjmc.Ar RSA_SIG
9977012c86Sjmc.No ]
100ffa2dcb0Sjmc.Sm on
101ffa2dcb0Sjmc.Xc
102ffa2dcb0Sjmc.El
10352e712aeSniklas.Pp
104*d9bb20e6Shshoexerwhere:
105*d9bb20e6Shshoexer.Bl -tag -width "{cipher}" -offset indent -compact
106*d9bb20e6Shshoexer.It Ns { Ns Ar cipher Ns }
107*d9bb20e6Shshoexeris either DES, BLF, 3DES, CAST, or AES
108*d9bb20e6Shshoexer.It Ns { Ns Ar hash Ns }
109*d9bb20e6Shshoexeris either MD5, SHA, or SHA2-{256,384,512}
110*d9bb20e6Shshoexer.It Ns { Ns Ar group Ns }
111*d9bb20e6Shshoexeris either GRP1, GRP2, GRP5, GRP14, or GRP15
112*d9bb20e6Shshoexer.El
113*d9bb20e6Shshoexer.Pp
11452e712aeSniklasFor Quick Mode:
115ffa2dcb0Sjmc.\" .Ar QM-{proto}[-TRP]-{cipher}[-{hash}][-PFS[-{group}]]-SUITE
116ffa2dcb0Sjmc.Bl -inset -compact
117ffa2dcb0Sjmc.It Xo
118ffa2dcb0Sjmc.Sm off
119ffa2dcb0Sjmc.Ar QM
120ffa2dcb0Sjmc.No -{
121ffa2dcb0Sjmc.Ar proto
122ffa2dcb0Sjmc.No }[-
123ffa2dcb0Sjmc.Ar TRP
124ffa2dcb0Sjmc.No ]-{
125ffa2dcb0Sjmc.Ar cipher
126ffa2dcb0Sjmc.No }[-{
127ffa2dcb0Sjmc.Ar hash
128ffa2dcb0Sjmc.No }]
129ffa2dcb0Sjmc.No [-
130ffa2dcb0Sjmc.Ar PFS
131ffa2dcb0Sjmc.No [-{
132ffa2dcb0Sjmc.Ar group
133ffa2dcb0Sjmc.No }]]-
134ffa2dcb0Sjmc.Ar SUITE
135ffa2dcb0Sjmc.Sm on
136ffa2dcb0Sjmc.Xc
137ffa2dcb0Sjmc.El
138ffa2dcb0Sjmc.Pp
139ffa2dcb0Sjmcwhere:
140ffa2dcb0Sjmc.Bl -tag -width "{cipher}" -offset indent -compact
141ffa2dcb0Sjmc.It Ns { Ns Ar proto Ns }
142ffa2dcb0Sjmcis either ESP or AH
143ffa2dcb0Sjmc.It Ns { Ns Ar cipher Ns }
144*d9bb20e6Shshoexeris either DES, 3DES, CAST, BLF, AES, or AESCTR
145ffa2dcb0Sjmc.It Ns { Ns Ar hash Ns }
146ffa2dcb0Sjmcis either MD5, SHA, RIPEMD, or SHA2-{256,384,512}
147ffa2dcb0Sjmc.It Ns { Ns Ar group Ns }
148*d9bb20e6Shshoexeris either GRP1, GRP2, GRP5, GRP14, or GRP15
149ffa2dcb0Sjmc.El
15052e712aeSniklas.Pp
151*d9bb20e6ShshoexerFor example, AES-SHA2-256 means: AES encryption, SHA2-256 hash, and
152*d9bb20e6Shshoexerauthorization by pre-shared keys.
153*d9bb20e6ShshoexerAdding "-RSA_SIG" will enable public key authentication,
154*d9bb20e6Shshoexere.g. AES-SHA2-256-RSA_SIG.
1550e2d4717SkjellSimilarly, QM-ESP-3DES-SHA-PFS-SUITE means: ESP protocol, 3DES encryption,
15682184a41SjmcSHA hash, and use Perfect Forward Secrecy.
15752e712aeSniklas.Pp
158e8200b82ShshoexerUnless explicitly stated with -GRP1, 2, 5, 14 or 15, transforms and
159e8200b82ShshoexerPFS suites use DH group 2.
1604eb3dd62SjmcThere are currently no predefined ESP+AH Quick Mode suites.
16152e712aeSniklas.Pp
1622039fcadShoThe predefinitions include some default values for the special
163419caefeShosections "General", "Keynote", "X509-certificates", and
16435ff0956Sho"Default-phase-1-configuration".
165419caefeShoThese default values are presented in the example below.
16652e712aeSniklas.Pp
16752e712aeSniklasAll autogenerated values can be overridden by manual entries by using the
16852e712aeSniklassame section and tag names in the configuration file.
169b57b191eSniklasIn particular, the default phase 1 (Main or Aggressive Mode) and phase 2
170b57b191eSniklas(Quick Mode) lifetimes can be overridden by these tags under the "General"
171ffa2dcb0Sjmcsection:
172ffa2dcb0Sjmc.Bd -literal -offset indent
173b57b191eSniklas[General]
174b57b191eSniklasDefault-phase-1-lifetime=	3600,60:86400
175b57b191eSniklasDefault-phase-2-lifetime=	1200,60:86400
176b57b191eSniklas.Ed
1772039fcadSho.Pp
1782039fcadShoThe Main Mode lifetime currently defaults to one hour (minimum 60
1794eb3dd62Sjmcseconds, maximum 1 day).
1804eb3dd62SjmcThe Quick Mode lifetime defaults to 20 minutes
1814eb3dd62Sjmc(minimum 60 seconds, maximum 1 day).
18252e712aeSniklas.Pp
183ffa2dcb0SjmcAlso, the default phase 1 ID can be set by creating a
184ffa2dcb0Sjmc.Aq Sy Phase1-ID
1850378d1f2Sniklassection, as shown below, and adding this tag under the "General"
186ffa2dcb0Sjmcsection:
187ffa2dcb0Sjmc.Bd -literal -offset indent
1880378d1f2Sniklas[General]
1890378d1f2SniklasDefault-phase-1-ID=		Phase1-ID-name
1900378d1f2Sniklas
1910378d1f2Sniklas[Phase1-ID-name]
1920378d1f2SniklasID-type=			USER_FQDN
1930378d1f2SniklasName=				foo@bar.com
1940378d1f2Sniklas.Ed
195ffa2dcb0Sjmc.Sh ROOTS
196ffa2dcb0Sjmc.Bl -hang -width 8n
197c00f6aafSjmc.It Bq Sy General
198c5fe6c4eSniklasGeneric global configuration parameters
199ffa2dcb0Sjmc.Bl -tag -width Ds
200e0eef2f9Shshoexer.It Em Acquire-Only
201e0eef2f9ShshoexerIf this tag is defined,
202ffa2dcb0Sjmc.Xr isakmpd 8
203e0eef2f9Shshoexerwill not set up flows automatically.
204e0eef2f9ShshoexerThis is useful when flows are configured with
2059fb8734eSjmc.Xr ipsecctl 8
206e0eef2f9Shshoexeror by other programs like
207e0eef2f9Shshoexer.Xr bgpd 8 .
208e0eef2f9ShshoexerThus
209ffa2dcb0Sjmc.Xr isakmpd 8
210e0eef2f9Shshoexeronly takes care of the SA establishment.
21135ff0956Sho.It Em Check-interval
212e0d722f1ShoThe interval between watchdog checks of connections we want up at all
2131ab51479Sclodertimes, in seconds.
2141ab51479ScloderThe default value is 60 seconds.
215e407932bSjmc.It Em Default-phase-1-ID
216e407932bSjmcOptional default phase 1 ID name.
217e407932bSjmc.It Em Default-phase-1-lifetime
218e407932bSjmcThe default lifetime for autogenerated transforms (phase 1).
219e407932bSjmcIf unspecified, the value 3600,60:86400 is used as the default.
220e407932bSjmc.It Em Default-phase-2-lifetime
221e407932bSjmcThe default lifetime for autogenerated suites (phase 2).
222e407932bSjmcIf unspecified, the value 1200,60:86400 is used as the default.
223e407932bSjmc.It Em Default-phase-2-suites
224e407932bSjmcA list of phase 2 suites that will be used when establishing dynamic
225e407932bSjmcSAs.
226e407932bSjmcIf left unspecified, QM-ESP-3DES-SHA-PFS-SUITE is used as the default.
227e0d722f1Sho.It Em DPD-check-interval
2281ab51479ScloderThe interval between RFC 3706 (Dead Peer Detection) messages, in seconds.
229e0d722f1ShoThe default value is 0 (zero), which means DPD is disabled.
23035ff0956Sho.It Em Exchange-max-time
23135ff0956ShoHow many seconds should an exchange maximally take to set up before we
23235ff0956Shogive up.
23335ff0956Sho.It Em Listen-on
234d39c0235ScloderA list of IP addresses or interface names OK to listen on.
23535ff0956ShoThis list is used as a filter for the set of addresses the interfaces
23635ff0956Shoconfigured provides.
23735ff0956ShoThis means that we won't see if an address given here does not exist
23835ff0956Shoon this host, and thus no error is given for that case.
2394e2ad344Shshoexer.It Em Loglevel
2404e2ad344ShshoexerA list of the form
2414e2ad344Shshoexer.Ar class Ns = Ns Ar level ,
2424e2ad344Shshoexerwhere both
2434e2ad344Shshoexer.Ar class
2444e2ad344Shshoexerand
2454e2ad344Shshoexer.Ar level
2464e2ad344Shshoexerare numbers.
2474e2ad344ShshoexerThis is similar to the
2484e2ad344Shshoexer.Fl D
2494e2ad344Shshoexercommand line switch of
250ffa2dcb0Sjmc.Xr isakmpd 8 .
2514e2ad344Shshoexer.It Em Logverbose
2524e2ad344ShshoexerIf this tag is defined, whatever the value is, verbose logging is enabled.
2534e2ad344ShshoexerThis is similar to the
2544e2ad344Shshoexer.Fl v
255235cbc01Sjmccommand line switch of
256ffa2dcb0Sjmc.Xr isakmpd 8 .
2570b2bcfccSho.It Em NAT-T-Keepalive
2580b2bcfccShoThe number of seconds between NAT-T keepalive messages, sent by the
259d4c8cd14Sjmcpeer behind NAT to keep the mapping active.
260d4c8cd14SjmcDefaults to 20.
261447a9f3aSho.It Em Policy-file
26280c8b3dbSniklasThe name of the file that contains
2631215c700Sjmc.Xr keynote 4
2644aac73a4Saaronpolicies.
265ffa2dcb0SjmcThe default is
266ffa2dcb0Sjmc.Pa /etc/isakmpd/isakmpd.policy .
2670b880a72Sho.It Em Pubkey-directory
2680b880a72ShoThe directory in which
2690b880a72Sho.Nm
270ac1aa35bSmpechlooks for explicitly trusted public keys.
271ffa2dcb0SjmcThe default is
272ffa2dcb0Sjmc.Pa /etc/isakmpd/pubkeys .
273ac1aa35bSmpechRead
2740b880a72Sho.Xr isakmpd 8
2750b880a72Shofor the required naming convention of the files in here.
2764d27bb0fSho.It Em Renegotiate-on-HUP
2774d27bb0fShoIf this tag is defined, whatever the value is,
278ffa2dcb0Sjmc.Xr isakmpd 8
2794eb3dd62Sjmcwill renegotiate all current phase 2 SAs when the daemon receives a
2804eb3dd62Sjmc.Dv SIGHUP
2814eb3dd62Sjmcsignal, or an
2824eb3dd62Sjmc.Sq R
2834eb3dd62Sjmcis sent to the FIFO interface (see
2844d27bb0fSho.Xr isakmpd 8 ) .
28535ff0956Sho.It Em Retransmits
28635ff0956ShoHow many times should a message be retransmitted before giving up.
28735ff0956Sho.It Em Shared-SADB
28835ff0956ShoIf this tag is defined, whatever the value is, some semantics of
28935ff0956Sho.Nm
29035ff0956Shoare changed so that multiple instances can run on top of one SADB
29135ff0956Shoand set up SAs with each other.
29235ff0956ShoSpecifically this means replay
29335ff0956Shoprotection will not be asked for, and errors that can occur when
29435ff0956Shoupdating an SA with its parameters a 2nd time will be ignored.
295e0eef2f9Shshoexer.It Em Use-Keynote
296e0eef2f9ShshoexerThis tag controls the use of
297e0eef2f9Shshoexer.Xr keynote 4
298e0eef2f9Shshoexerpolicy checking.
299e0eef2f9ShshoexerThe default value is
300e0eef2f9Shshoexer.Qq yes ,
301e0eef2f9Shshoexerwhich enables the policy checking.
302e0eef2f9ShshoexerWhen set to any other value, policies will not be checked.
3037a9bba63SjmcThis is useful when policies for flows and SA establishment are arranged by
304e0eef2f9Shshoexerother programs like
305937c2feaSderaadt.Xr ipsecctl 8
306e0eef2f9Shshoexeror
307e0eef2f9Shshoexer.Xr bgpd 8 .
308b4f8e7c2Shshoexer.It Em Delete-SAs
30995f3b939SjmcThis tag controls whether
310b4f8e7c2Shshoexer.Xr isakmpd 8
311b4f8e7c2Shshoexerdeletes SAs on shutdown or not.
312b4f8e7c2ShshoexerThe default value is
313b4f8e7c2Shshoexer.Qq no .
314c5fe6c4eSniklas.El
315c00f6aafSjmc.It Bq Sy Phase 1
316c5fe6c4eSniklasISAKMP SA negotiation parameter root
317ffa2dcb0Sjmc.Bl -tag -width Ds
318cc3c8b42Sniklas.It Em Default
319ac1aa35bSmpechA name of the default ISAKMP peer.
320ffa2dcb0SjmcIncoming phase 1 connections from other IP addresses will use this peer name.
3219615e1d4SaaronThis name is used as the section name for further information to be found.
322ffa2dcb0SjmcLook at
323ffa2dcb0Sjmc.Aq Sy ISAKMP-peer
324ffa2dcb0Sjmcbelow.
325e407932bSjmc.It Aq Em IP-address
326e407932bSjmcA name of the ISAKMP peer at the given IP address.
327c5fe6c4eSniklas.El
328c00f6aafSjmc.It Bq Sy Phase 2
329c5fe6c4eSniklasIPsec SA negotiation parameter root
330ffa2dcb0Sjmc.Bl -tag -width Ds
331c5fe6c4eSniklas.It Em Connections
33261d575f0SangelosA list of directed IPsec "connection" names that should be brought up
3332ddc24cbSniklasautomatically, either on first use if the system supports it, or at
3349615e1d4Saaronstartup of the daemon.
3359615e1d4SaaronThese names are section names where further information can be found.
336ffa2dcb0SjmcLook at
337ffa2dcb0Sjmc.Aq Sy IPsec-connection
338ffa2dcb0Sjmcbelow.
33944143af3SderaadtNormally any connections mentioned here are treated as part of the
340ffa2dcb0Sjmc"Passive-connection" list we present below; however there is a flag,
341ffa2dcb0Sjmc.Em Active-only ,
342ffa2dcb0Sjmcthat disables this behaviour.
343ffa2dcb0SjmcThis too is mentioned in the
344ffa2dcb0Sjmc.Aq Sy IPsec-connection
345ffa2dcb0Sjmcsection, in the "Flags" tag.
34680baf197Sniklas.It Em Passive-connections
34761d575f0SangelosA list of IPsec "connection" names we recognize and accept initiations for.
3489615e1d4SaaronThese names are section names where further information can be found.
349ffa2dcb0SjmcLook at
350ffa2dcb0Sjmc.Aq Sy IPsec-connection
351ffa2dcb0Sjmcbelow.
3529615e1d4SaaronCurrently only the Local-ID and Remote-ID tags
35380baf197Sniklasare looked at in those sections, as they are matched against the IDs given
35480baf197Sniklasby the initiator.
355c5fe6c4eSniklas.El
356c00f6aafSjmc.It Bq Sy KeyNote
357c00f6aafSjmcKeyNote configuration section
358ffa2dcb0Sjmc.Bl -tag -width Ds
359b57b191eSniklas.It Em Credential-directory
360b57b191eSniklasA directory containing directories named after IDs (IP
3614eb3dd62Sjmcaddresses,
3624eb3dd62Sjmc.Dq user@domain ,
3634eb3dd62Sjmcor hostnames) that contain files named
3644eb3dd62Sjmc.Dq credentials
3654eb3dd62Sjmcand
3664eb3dd62Sjmc.Dq private_key .
367b57b191eSniklas.Pp
368b57b191eSniklasThe credentials file contains
369b57b191eSniklas.Xr keynote 4
370b57b191eSniklascredentials that are sent to a remote IKE daemon when we use the
371b57b191eSniklasassociated ID, or credentials that we may want to consider when doing
372ac1aa35bSmpechan exchange with a remote IKE daemon that uses that ID.
373ac1aa35bSmpechNote that, in the former case, the last credential in the file
374ac1aa35bSmpechMUST contain our public key in its Licensees field.
375ac1aa35bSmpechMore than one credentials may exist in the file.
376ac1aa35bSmpechThey are separated by whitelines (the format is essentially the same as
377ac1aa35bSmpechthat of the policy file).
378ac1aa35bSmpechThe credentials are of the same format as the policies described in
379b57b191eSniklas.Xr isakmpd.policy 5 .
380b57b191eSniklasThe only difference is that the Authorizer field contains a public
381ac1aa35bSmpechkey, and the assertion is signed.
382ac1aa35bSmpechSigned assertions can be generated using the
383b57b191eSniklas.Xr keynote 1
384b57b191eSniklasutility.
385b57b191eSniklas.Pp
386b57b191eSniklasThe private_key file contains the private RSA key we use for
387ac1aa35bSmpechauthentication.
388ac1aa35bSmpechIf the directory (and the files) exist, they take precedence over X509-based
389ac1aa35bSmpechauthentication.
390b57b191eSniklas.El
391c00f6aafSjmc.It Bq Sy X509-Certificates
392c00f6aafSjmcX509-certificate configuration section
393ffa2dcb0Sjmc.Bl -tag -width Ds
39435ff0956Sho.It Em Accept-self-signed
39535ff0956ShoIf this tag is defined, whatever the value is, certificates that
39635ff0956Shodo not originate from a trusted CA but are self-signed will be
39735ff0956Shoaccepted.
398fb1921ccSniklas.It Em Ca-directory
399fb1921ccSniklasA directory containing PEM certificates of certification authorities
400ac1aa35bSmpechthat we trust to sign other certificates.
401ac1aa35bSmpechNote that for a CA to be really trusted, it needs to be somehow
402ac1aa35bSmpechreferred to by policy, in
403e5814869Sangelos.Xr isakmpd.policy 5 .
404e5814869SangelosThe certificates in this directory are used for the actual X.509
405e5814869Sangelosauthentication and for cross-referencing policies that refer to
406ac1aa35bSmpechDistinguished Names (DNs).
407ac1aa35bSmpechKeeping a separate directory (as opposed to integrating policies
408ac1aa35bSmpechand X.509 CA certificates) allows for maintenance of a list of
409ac1aa35bSmpech"well known" CAs without actually having to trust all (or any) of them.
410fb1921ccSniklas.It Em Cert-directory
411fb1921ccSniklasA directory containing PEM certificates that we trust to be valid.
412fb1921ccSniklasThese certificates are used in preference to those passed in messages and
4130e2d4717Skjellare required to have a subjectAltName extension containing the certificate
41491d5cfbaShshoexerholder identity; usually IP address, FQDN, or User FQDN.
415954b1b31Sniklas.It Em Private-key
416954b1b31SniklasThe private key matching the public key of our certificate (which should be
4170e2d4717Skjellin the "Cert-directory", and have an appropriate subjectAltName field).
418db26b2b9Smsf.It Em Private-key-directory
419db26b2b9SmsfA directory containing private keys named after an ID (IP addresses,
420db26b2b9Smsf.Dq user@domain ,
42195f3b939Sjmcor hostnames).
422fb1921ccSniklas.El
423c5fe6c4eSniklas.El
424ffa2dcb0Sjmc.Sh REFERRED-TO SECTIONS
425ffa2dcb0Sjmc.Bl -hang -width Ds
426ffa2dcb0Sjmc.It Aq Sy ISAKMP-peer
427c5fe6c4eSniklasParameters for negotiation with an ISAKMP peer
428ffa2dcb0Sjmc.Bl -tag -width Ds
429c5fe6c4eSniklas.It Em Address
430ffa2dcb0SjmcIf existent, the IP address of the peer.
431e407932bSjmc.It Em Authentication
432e407932bSjmcIf existent, authentication data for this specific peer.
433e407932bSjmcIn the case of a pre-shared key, this is the key value itself.
434c5fe6c4eSniklas.It Em Configuration
4359615e1d4SaaronThe name of the ISAKMP-configuration section to use.
436ffa2dcb0SjmcLook at
437ffa2dcb0Sjmc.Aq Sy ISAKMP-configuration
438ffa2dcb0Sjmcbelow.
43935ff0956ShoIf unspecified, defaults to "Default-phase-1-configuration".
440e407932bSjmc.It Em Flags
441e407932bSjmcA comma-separated list of flags controlling the further
442e407932bSjmchandling of the ISAKMP SA.
443e407932bSjmcCurrently there are no specific ISAKMP SA flags defined.
4446a8478f3Sniklas.It Em ID
4456a8478f3SniklasIf existent, the name of the section that describes the
4464aac73a4Saaronlocal client ID that we should present to our peer.
4474aac73a4SaaronIf not present, it
4486a8478f3Sniklasdefaults to the address of the local interface we are sending packets
4494aac73a4Saaronover to the remote daemon.
450ffa2dcb0SjmcLook at
451ffa2dcb0Sjmc.Aq Sy Phase1-ID
452ffa2dcb0Sjmcbelow.
453e407932bSjmc.It Em Local-address
454e407932bSjmcThe Local IP address to use, if we are multi-homed, or have aliases.
455e407932bSjmc.It Em Phase
456e407932bSjmcThe constant
457e407932bSjmc.Sq 1 ,
458e407932bSjmcas ISAKMP-peers and IPsec-connections
459e407932bSjmcreally are handled by the same code inside
460e407932bSjmc.Xr isakmpd 8 .
461e407932bSjmc.It Em Port
462e407932bSjmcFor UDP, the UDP port number to send to.
463e407932bSjmcThis is optional;
464e407932bSjmcthe default value is 500 which is the IANA-registered number for ISAKMP.
465a2067f52Sniklas.It Em Remote-ID
466a2067f52SniklasIf existent, the name of the section that describes the remote client
467a2067f52SniklasID we expect the remote daemon to send us.
468a2067f52SniklasIf not present, it defaults to the address of the remote daemon.
469ffa2dcb0SjmcLook at
470ffa2dcb0Sjmc.Aq Sy Phase1-ID
471ffa2dcb0Sjmcbelow.
472e407932bSjmc.It Em Transport
473e407932bSjmcThe name of the transport protocol; defaults to UDP.
474c5fe6c4eSniklas.El
475ffa2dcb0Sjmc.It Aq Sy Phase1-ID
476c00f6aafSjmcParameters for Phase 1 negotiation
477ffa2dcb0Sjmc.Bl -tag -width Ds
478e407932bSjmc.It Em Address
479e407932bSjmcIf the ID-type is
480e407932bSjmc.Li IPV4_ADDR
481e407932bSjmcor
482e407932bSjmc.Li IPV6_ADDR ,
483e407932bSjmcthis tag should exist and be an IP address.
4846a8478f3Sniklas.It Em ID-type
485d8ca7c44ShoThe ID type as given by the RFC specifications.
48635ff0956ShoFor phase 1 this is currently
4876a8478f3Sniklas.Li IPV4_ADDR ,
4886a8478f3Sniklas.Li IPV4_ADDR_SUBNET ,
489d8ca7c44Sho.Li IPV6_ADDR ,
490d8ca7c44Sho.Li IPV6_ADDR_SUBNET ,
4916a8478f3Sniklas.Li FQDN ,
492ffa2dcb0Sjmc.Li USER_FQDN ,
4936a8478f3Sniklasor
4945bc978dfSangelos.Li KEY_ID .
4956a8478f3Sniklas.It Em Name
4966a8478f3SniklasIf the ID-type is
4975bc978dfSangelos.Li FQDN ,
498ffa2dcb0Sjmc.Li USER_FQDN ,
4995bc978dfSangelosor
5005bc978dfSangelos.Li KEY_ID ,
5015bc978dfSangelosthis tag should exist and contain a domain name, user@domain, or
5025bc978dfSangelosother identifying string respectively.
5033f167ca4Sangelos.Pp
5043f167ca4SangelosIn the case of
5053f167ca4Sangelos.Li KEY_ID ,
5063f167ca4Sangelosnote that the IKE protocol allows any octet sequence to be sent or
5073f167ca4Sangelosreceived under this payload, potentially including non-printable
5083f167ca4Sangelosones.
5091215c700Sjmc.Xr isakmpd 8
5103f167ca4Sangeloscan only transmit printable
5113f167ca4Sangelos.Li KEY_ID
5123f167ca4Sangelospayloads, but can receive and process arbitrary
5133f167ca4Sangelos.Li KEY_ID
5143f167ca4Sangelospayloads.
5153f167ca4SangelosThis effectively means that non-printable
5163f167ca4Sangelos.Li KEY_ID
5173f167ca4Sangelosremote identities cannot be verified through this means, although it
5183f167ca4Sangelosis still possible to do so through
5193f167ca4Sangelos.Xr isakmpd.policy 5 .
520e407932bSjmc.It Em Netmask
521e407932bSjmcIf the ID-type is
522e407932bSjmc.Li IPV4_ADDR_SUBNET
523e407932bSjmcor
524e407932bSjmc.Li IPV6_ADDR_SUBNET ,
525e407932bSjmcthis tag should exist and
526e407932bSjmcbe a network subnet mask.
527e407932bSjmc.It Em Network
528e407932bSjmcIf the ID-type is
529e407932bSjmc.Li IPV4_ADDR_SUBNET
530e407932bSjmcor
531e407932bSjmc.Li IPV6_ADDR_SUBNET ,
532e407932bSjmcthis tag should exist and
533e407932bSjmcbe a network address.
5346a8478f3Sniklas.El
535ffa2dcb0Sjmc.It Aq Sy ISAKMP-configuration
536c00f6aafSjmcParameters for ISAKMP configuration
537ffa2dcb0Sjmc.Bl -tag -width Ds
538c5fe6c4eSniklas.It Em DOI
5399615e1d4SaaronThe domain of interpretation as given by the RFCs.
5409615e1d4SaaronNormally
541c5fe6c4eSniklas.Li IPSEC .
542b57b191eSniklasIf unspecified, defaults to
543b57b191eSniklas.Li IPSEC .
544c5fe6c4eSniklas.It Em EXCHANGE_TYPE
5459615e1d4SaaronThe exchange type as given by the RFCs.
5469615e1d4SaaronFor main mode this is
5479f078bd8Sniklas.Li ID_PROT
5489f078bd8Sniklasand for aggressive mode it is
5499f078bd8Sniklas.Li AGGRESSIVE .
550c5fe6c4eSniklas.It Em Transforms
551c5fe6c4eSniklasA list of proposed transforms to use for protecting the
5529615e1d4SaaronISAKMP traffic.
5539615e1d4SaaronThese are actually names for sections
5549615e1d4Saaronfurther describing the transforms.
555ffa2dcb0SjmcLook at
556ffa2dcb0Sjmc.Aq Sy ISAKMP-transform
557ffa2dcb0Sjmcbelow.
558c5fe6c4eSniklas.El
559ffa2dcb0Sjmc.It Aq Sy ISAKMP-transform
560c00f6aafSjmcParameters for ISAKMP authentication
561ffa2dcb0Sjmc.Bl -tag -width Ds
562e407932bSjmc.It Em AUTHENTICATION_METHOD
563e407932bSjmcThe authentication method as the RFCs name it, or ANY.
564c5fe6c4eSniklas.It Em ENCRYPTION_ALGORITHM
565850f7173SniklasThe encryption algorithm as the RFCs name it, or ANY to denote that any
566850f7173Sniklasencryption algorithm proposed will be accepted.
567c5fe6c4eSniklas.It Em GROUP_DESCRIPTION
5689615e1d4SaaronThe group used for Diffie-Hellman exponentiations, or ANY.
56944143af3SderaadtThe names are symbolic, like
570ffa2dcb0Sjmc.Li MODP_768 , MODP_1024 , EC_155 ,
571c5fe6c4eSniklasand
572c5fe6c4eSniklas.Li EC_185 .
573e407932bSjmc.It Em HASH_ALGORITHM
574e407932bSjmcThe hash algorithm as the RFCs name it, or ANY.
575e407932bSjmc.It Em KEY_LENGTH
576e407932bSjmcFor encryption algorithms with variable key length, this is
577e407932bSjmcwhere the offered/accepted keylengths are described.
578e407932bSjmcThe value is of the offer-accept kind described above.
579c5fe6c4eSniklas.It Em Life
5804aac73a4SaaronA list of lifetime descriptions, or ANY.
5814aac73a4SaaronIn the former case, each
582850f7173Sniklaselement is in itself a name of the section that defines the lifetime.
583ffa2dcb0SjmcLook at
584ffa2dcb0Sjmc.Aq Sy Lifetime
585ffa2dcb0Sjmcbelow.
5864aac73a4SaaronIf it is set to ANY, then any type of
587850f7173Sniklasproposed lifetime type and value will be accepted.
588e407932bSjmc.It Em PRF
589e407932bSjmcThe algorithm to use for the keyed pseudo-random function (used for key
590e407932bSjmcderivation and authentication in phase 1), or ANY.
591c5fe6c4eSniklas.El
592ffa2dcb0Sjmc.It Aq Sy Lifetime
593c00f6aafSjmcParameters for connection duration
594ffa2dcb0Sjmc.Bl -tag -width Ds
595e407932bSjmc.It Em LIFE_DURATION
596e407932bSjmcAn offer/accept kind of value; see above.
597e407932bSjmcCan also be set to ANY.
598c5fe6c4eSniklas.It Em LIFE_TYPE
599c5fe6c4eSniklas.Li SECONDS
600c5fe6c4eSniklasor
601e55ca143Sniklas.Li KILOBYTES
6024aac73a4Saarondepending on the type of the duration.
6034aac73a4SaaronNotice that this field may NOT be set to ANY.
604c5fe6c4eSniklas.El
605ffa2dcb0Sjmc.It Aq Sy IPsec-connection
606c00f6aafSjmcParameters for IPsec connection configuration
607ffa2dcb0Sjmc.Bl -tag -width Ds
608c5fe6c4eSniklas.It Em Configuration
60961d575f0SangelosThe name of the IPsec-configuration section to use.
610ffa2dcb0SjmcLook at
611ffa2dcb0Sjmc.Aq Sy IPsec-configuration
612ffa2dcb0Sjmcbelow.
61313a99464Sniklas.It Em Flags
61413a99464SniklasA comma-separated list of flags controlling the further
61561d575f0Sangeloshandling of the IPsec SA.
6169615e1d4SaaronCurrently only one flag is defined:
61780baf197Sniklas.Bl -tag -width 12n
61880baf197Sniklas.It Em Active-only
619ffa2dcb0SjmcIf this flag is given and this
620ffa2dcb0Sjmc.Aq Sy IPsec-connection
621ffa2dcb0Sjmcis part of the phase 2
62280baf197Sniklasconnections we automatically keep up, it will not automatically be used for
62380baf197Sniklasaccepting connections from the peer.
62480baf197Sniklas.El
625e407932bSjmc.It Em ISAKMP-peer
626604faeecSjmcThe name of the ISAKMP-peer to talk to in order to
627e407932bSjmcset up this connection.
628e407932bSjmcThe value is the name of an
629e407932bSjmc.Aq Sy ISAKMP-peer
630e407932bSjmcsection.
631e407932bSjmcSee above.
632e407932bSjmc.It Em Local-ID
633e407932bSjmcIf existent, the name of the section that describes the
634e407932bSjmcoptional local client ID that we should present to our peer.
635e407932bSjmcIt is also used when we act as responders to find out what
636e407932bSjmc.Aq Sy IPsec-connection
637e407932bSjmcwe are dealing with.
638e407932bSjmcLook at
639e407932bSjmc.Aq Sy IPsec-ID
640e407932bSjmcbelow.
641e407932bSjmc.It Em Phase
642e407932bSjmcThe constant
643e407932bSjmc.Sq 2 ,
644e407932bSjmcas ISAKMP-peers and IPsec-connections
645e407932bSjmcreally are handled by the same code inside
646e407932bSjmc.Xr isakmpd 8 .
647e407932bSjmc.It Em Remote-ID
648e407932bSjmcIf existent, the name of the section that describes the
649e407932bSjmcoptional remote client ID that we should present to our peer.
650e407932bSjmcIt is also used when we act as responders to find out what
651e407932bSjmc.Aq Sy IPsec-connection
652e407932bSjmcwe are dealing with.
653e407932bSjmcLook at
654e407932bSjmc.Aq Sy IPsec-ID
655e407932bSjmcbelow.
656c5fe6c4eSniklas.El
657ffa2dcb0Sjmc.It Aq Sy IPsec-configuration
658c00f6aafSjmcParameters for IPsec configuration
659ffa2dcb0Sjmc.Bl -tag -width Ds
660c5fe6c4eSniklas.It Em DOI
6619615e1d4SaaronThe domain of interpretation as given by the RFCs.
6629615e1d4SaaronNormally
663c5fe6c4eSniklas.Li IPSEC .
664b57b191eSniklasIf unspecified, defaults to
665b57b191eSniklas.Li IPSEC .
666c5fe6c4eSniklas.It Em EXCHANGE_TYPE
6679615e1d4SaaronThe exchange type as given by the RFCs.
6689615e1d4SaaronFor quick mode this is
669c5fe6c4eSniklas.Li QUICK_MODE .
670c5fe6c4eSniklas.It Em Suites
6713b2a0cf1SaaronA list of protection suites (bundles of protocols) usable for
6729615e1d4Saaronprotecting the IP traffic.
673ffa2dcb0SjmcEach of the list elements is a name of an
674ffa2dcb0Sjmc.Aq Sy IPsec-suite
6759615e1d4Saaronsection.
6769615e1d4SaaronSee below.
677c5fe6c4eSniklas.El
678ffa2dcb0Sjmc.It Aq Sy IPsec-suite
679c00f6aafSjmcParameters for IPsec protection suite configuration
680ffa2dcb0Sjmc.Bl -tag -width Ds
681ffa2dcb0Sjmc.It Em Protocols
682ffa2dcb0SjmcA list of the protocols included in this protection suite.
683ffa2dcb0SjmcEach of the list elements is a name of an
684ffa2dcb0Sjmc.Aq Sy IPsec-protocol
685ffa2dcb0Sjmcsection.
686ffa2dcb0SjmcSee below.
687ffa2dcb0Sjmc.El
688ffa2dcb0Sjmc.It Aq Sy IPsec-protocol
689c00f6aafSjmcParameters for IPsec protocol configuration
690ffa2dcb0Sjmc.Bl -tag -width Ds
691c5fe6c4eSniklas.It Em PROTOCOL_ID
6929615e1d4SaaronThe protocol as given by the RFCs.
693ffa2dcb0SjmcAcceptable values are currently
694c5fe6c4eSniklas.Li IPSEC_AH
695c5fe6c4eSniklasand
696c5fe6c4eSniklas.Li IPSEC_ESP .
697e407932bSjmc.It Em ReplayWindow
698e407932bSjmcThe size of the window used for replay protection.
699e407932bSjmcThis is normally left alone.
700e407932bSjmcLook at the ESP and AH RFCs for a better description.
701c5fe6c4eSniklas.It Em Transforms
7023b2a0cf1SaaronA list of transforms usable for implementing the protocol.
703ffa2dcb0SjmcEach of the list elements is a name of an
704ffa2dcb0Sjmc.Aq Sy IPsec-transform
7059615e1d4Saaronsection.
7069615e1d4SaaronSee below.
707c5fe6c4eSniklas.El
708ffa2dcb0Sjmc.It Aq Sy IPsec-transform
709c00f6aafSjmcParameters for IPsec transform configuration
710ffa2dcb0Sjmc.Bl -tag -width Ds
711c5fe6c4eSniklas.It Em AUTHENTICATION_ALGORITHM
712c5fe6c4eSniklasThe optional authentication algorithm in the case of this
713c5fe6c4eSniklasbeing an ESP transform.
714e407932bSjmc.It Em ENCAPSULATION_MODE
715e407932bSjmcThe encapsulation mode as given by the RFCs.
716e407932bSjmcThis means TRANSPORT or TUNNEL.
717c5fe6c4eSniklas.It Em GROUP_DESCRIPTION
718c5fe6c4eSniklasAn optional (provides PFS if present) Diffie-Hellman group
7199615e1d4Saarondescription.
720ffa2dcb0SjmcThe values are the same as those for GROUP_DESCRIPTION in
721ffa2dcb0Sjmc.Aq Sy ISAKMP-transform
722ffa2dcb0Sjmcsections shown above.
723a806508bShshoexer.It Em KEY_LENGTH
724a806508bShshoexerFor encryption algorithms with variable key length, this is
725a806508bShshoexerwhere the offered keylength is described.
726c5fe6c4eSniklas.It Em Life
727ffa2dcb0SjmcList of lifetimes, each element is a
728ffa2dcb0Sjmc.Aq Sy Lifetime
729ffa2dcb0Sjmcsection name.
730e407932bSjmc.It Em TRANSFORM_ID
731e407932bSjmcThe transform ID as given by the RFCs.
732c5fe6c4eSniklas.El
733ffa2dcb0Sjmc.It Aq Sy IPsec-ID
734c00f6aafSjmcParameters for IPsec ID configuration
735ffa2dcb0Sjmc.Bl -tag -width Ds
736c5fe6c4eSniklas.It Em Address
737c5fe6c4eSniklasIf the ID-type is
738d8ca7c44Sho.Li IPV4_ADDR
739d8ca7c44Shoor
740ffa2dcb0Sjmc.Li IPV6_ADDR ,
741ffa2dcb0Sjmcthis tag should exist and be an IP address, an interface name, or the
742e3283cbfSmcbride.Em default
743e3283cbfSmcbridekeyword.
744e3283cbfSmcbrideIf an interface is used, the first address of the appropriate
745e3283cbfSmcbridefamily will be used.
746e3283cbfSmcbrideThe
747e3283cbfSmcbride.Em default
748e3283cbfSmcbridekeyword uses the interface associated with the default route.
749ffa2dcb0SjmcIn the case of IPv6, link-local addresses will be skipped if
750e3283cbfSmcbrideaddresses which are not link-local exist.
751e3283cbfSmcbrideIf the address on the interface changes
752ffa2dcb0Sjmc.Xr isakmpd 8
753e3283cbfSmcbridewill not track the change.
754e3283cbfSmcbrideThe configuration must be reloaded to learn the new address.
755e407932bSjmc.It Em ID-type
756e407932bSjmcThe ID type as given by the RFCs.
757e407932bSjmcFor IPsec this is currently
758e407932bSjmc.Li IPV4_ADDR ,
759e407932bSjmc.Li IPV6_ADDR ,
760e407932bSjmc.Li IPV4_ADDR_SUBNET ,
761d8ca7c44Shoor
762e407932bSjmc.Li IPV6_ADDR_SUBNET .
763c5fe6c4eSniklas.It Em Netmask
764c5fe6c4eSniklasIf the ID-type is
765c5fe6c4eSniklas.Li IPV4_ADDR_SUBNET
766d8ca7c44Shoor
767ffa2dcb0Sjmc.Li IPV6_ADDR_SUBNET ,
768c5fe6c4eSniklasthis tag should exist and
769e3283cbfSmcbridebe a network subnet mask or an interface.
770ffa2dcb0SjmcWhen an interface is specified, the netmask is the mask associated with the
771e3283cbfSmcbride.Em Network .
772e3283cbfSmcbrideThe
773e3283cbfSmcbride.Em default
774e3283cbfSmcbridekeyword uses the interface associated with the default route.
775e407932bSjmc.It Em Network
7760378d1f2SniklasIf the ID-type is
777e407932bSjmc.Li IPV4_ADDR_SUBNET
778d8ca7c44Shoor
779ffa2dcb0Sjmc.Li IPV6_ADDR_SUBNET ,
780e407932bSjmcthis tag should exist and be a network address, an interface, or the
781e407932bSjmc.Em default
782e407932bSjmckeyword.
783e407932bSjmcWhen an interface is specified, the network is selected as with the
784e407932bSjmc.Em Address
785e407932bSjmctag.
7860378d1f2Sniklas.It Em Port
7870378d1f2SniklasIf the ID-type is
788d8ca7c44Sho.Li IPV4_ADDR ,
7890378d1f2Sniklas.Li IPV4_ADDR_SUBNET ,
790ffa2dcb0Sjmc.Li IPV6_ADDR ,
791d8ca7c44Shoor
792ffa2dcb0Sjmc.Li IPV6_ADDR_SUBNET ,
7930378d1f2Sniklasthis tag indicates what source or destination port is allowed to be
7940378d1f2Sniklastransported over the SA (depending on whether this is a local or
7950378d1f2Sniklasremote ID).
7960378d1f2SniklasIf left unspecified, all ports of the given transport protocol
7970378d1f2Sniklaswill be transmitted (or permitted) over the SA.
798ffa2dcb0SjmcThe
799ffa2dcb0Sjmc.Em Protocol
800ffa2dcb0Sjmctag must be specified in conjunction with this tag.
801e407932bSjmc.It Em Protocol
802e407932bSjmcIf the ID-type is
803e407932bSjmc.Li IPV4_ADDR ,
804e407932bSjmc.Li IPV4_ADDR_SUBNET ,
805e407932bSjmc.Li IPV6_ADDR ,
806e407932bSjmcor
807e407932bSjmc.Li IPV6_ADDR_SUBNET ,
808e407932bSjmcthis tag indicates what transport protocol should be transmitted over
809e407932bSjmcthe SA.
810e407932bSjmcIf left unspecified, all transport protocols between the two address
811e407932bSjmc(ranges) will be sent (or permitted) over that SA.
812c5fe6c4eSniklas.El
813c5fe6c4eSniklas.El
814ffa2dcb0Sjmc.Sh OTHER SECTIONS
815ffa2dcb0Sjmc.Bl -hang -width 8n
816ffa2dcb0Sjmc.It Aq Sy IKECFG-ID
8174eb3dd62SjmcParameters to use with IKE mode-config.
8184eb3dd62SjmcOne ID per peer.
8194ca71560Sho.Pp
8204ca71560ShoAn IKECFG-ID is written as [<ID-type>/<name>].
8214ca71560ShoThe following ID types are supported:
822ffa2dcb0Sjmc.Pp
823ffa2dcb0Sjmc.Bl -tag -width "ASN1_DNXX" -offset indent -compact
8244ca71560Sho.It IPv4
8254ca71560Sho[ipv4/A.B.C.D]
8264ca71560Sho.It IPv6
8274ca71560Sho[ipv6/abcd:abcd::ab:cd]
8284ca71560Sho.It FQDN
8294ca71560Sho[fqdn/foo.bar.org]
8304ca71560Sho.It UFQDN
8314ca71560Sho[ufqdn/user@foo.bar.org]
8324ca71560Sho.It ASN1_DN
8334ca71560Sho[asn1_dn//C=aa/O=cc/...] (Note the double slashes as the DN itself
8344eb3dd62Sjmcstarts with a
8354eb3dd62Sjmc.Sq / . )
8364ca71560Sho.El
8374ca71560Sho.Pp
8384ca71560ShoEach section specifies what configuration values to return to the peer
8394eb3dd62Sjmcrequesting IKE mode-config.
8404eb3dd62SjmcCurrently supported values are:
841ffa2dcb0Sjmc.Pp
842ffa2dcb0Sjmc.Bl -tag -width "WINS-serverXX" -offset indent -compact
8434ca71560Sho.It Em Address
8444ca71560ShoThe peer's network address.
8454ca71560Sho.It Em Netmask
8464ca71560ShoThe peer's netmask.
8474ca71560Sho.It Em Nameserver
8484ca71560ShoThe IP address of a DNS nameserver.
8494ca71560Sho.It Em WINS-server
8504ca71560ShoThe IP address of a WINS server.
8514ca71560Sho.El
852ffa2dcb0Sjmc.It Aq Sy Initiator-ID
853c00f6aafSjmcParameters for peer initiator configuration
854106cbd59Smarkus.Pp
855106cbd59SmarkusDuring phase 1 negotiation
856ffa2dcb0Sjmc.Xr isakmpd 8
857ffa2dcb0Sjmclooks for a pre-shared key in the
858ffa2dcb0Sjmc.Aq Sy ISAKMP-peer
859ffa2dcb0Sjmcsection.
860106cbd59SmarkusIf no Authentication data is specified in that section, and
861ffa2dcb0Sjmc.Xr isakmpd 8
862106cbd59Smarkusis not the initiator, it looks for Authentication data in a section named after
863106cbd59Smarkusthe initiator's phase 1 ID.
864106cbd59SmarkusThis allows mobile users with dynamic IP addresses
865106cbd59Smarkusto have different shared secrets.
866106cbd59Smarkus.Pp
867106cbd59SmarkusThis only works for aggressive mode because in main mode the remote
868106cbd59Smarkusinitiator ID would not yet be known.
869830c32f9ShshoexerNote, however, that use of aggressive mode is discouraged.
870830c32f9ShshoexerSee
871ffa2dcb0Sjmc.Sx CAVEATS ,
872ffa2dcb0Sjmcbelow.
873106cbd59Smarkus.Pp
874ffa2dcb0SjmcThe name of the
875ffa2dcb0Sjmc.Aq Sy Initiator-ID
876ffa2dcb0Sjmcsection depends on the ID type sent by the initiator.
877106cbd59SmarkusCurrently this can be:
878ffa2dcb0Sjmc.Pp
879ffa2dcb0Sjmc.Bl -tag -width "UFQDNXX" -offset indent -compact
880106cbd59Smarkus.It IPv4
881106cbd59Smarkus[A.B.C.D]
882106cbd59Smarkus.It IPv6
883106cbd59Smarkus[abcd:abcd::ab:cd]
884106cbd59Smarkus.It FQDN
885106cbd59Smarkus[foo.bar.org]
886106cbd59Smarkus.It UFQDN
887106cbd59Smarkus[user@foo.bar.org]
888106cbd59Smarkus.El
8894ca71560Sho.El
8902b65e200Sjmc.Sh FILES
8912b65e200Sjmc.Bl -tag -width /etc/isakmpd/isakmpd.conf
8922b65e200Sjmc.It Pa /etc/isakmpd/isakmpd.conf
8932b65e200SjmcThe default
894ffa2dcb0Sjmc.Xr isakmpd 8
8952b65e200Sjmcconfiguration file.
8962b65e200Sjmc.It Pa /usr/share/ipsec/isakmpd/
8972b65e200SjmcA directory containing some sample
898ffa2dcb0Sjmc.Xr isakmpd 8
8992b65e200Sjmcconfiguration files.
9002b65e200Sjmc.El
90100b2ba71Saaron.Sh EXAMPLES
9022040585eSniklasAn example of a configuration file:
9032040585eSniklas.Bd -literal
9042040585eSniklas# A configuration sample for the isakmpd ISAKMP/Oakley (aka IKE) daemon.
9052040585eSniklas
9062040585eSniklas[General]
907c5fe6c4eSniklasListen-on=		10.1.0.2
9082040585eSniklas
909c5fe6c4eSniklas# Incoming phase 1 negotiations are multiplexed on the source IP address
9102b81057dSniklas[Phase 1]
911c5fe6c4eSniklas10.1.0.1=		ISAKMP-peer-west
9122b81057dSniklas
913c5fe6c4eSniklas# These connections are walked over after config file parsing and told
914c5fe6c4eSniklas# to the application layer so that it will inform us when traffic wants to
91552250141Smoritz# pass over them.  This means we can do on-demand keying.
916c5fe6c4eSniklas[Phase 2]
917c5fe6c4eSniklasConnections=		IPsec-east-west
918c5fe6c4eSniklas
919cc3c8b42Sniklas# Default values are commented out.
920c5fe6c4eSniklas[ISAKMP-peer-west]
9212b81057dSniklasPhase=			1
922cc3c8b42Sniklas#Transport=		udp
923f6dd85a7SniklasLocal-address=		10.1.0.2
9242b81057dSniklasAddress=		10.1.0.1
9252b81057dSniklas#Port=			isakmp
9262b81057dSniklas#Port=			500
92735ff0956Sho#Configuration=		Default-phase-1-configuration
9282b81057dSniklasAuthentication=		mekmitasdigoat
929cc3c8b42Sniklas#Flags=
9302b81057dSniklas
931c5fe6c4eSniklas[IPsec-east-west]
9322b81057dSniklasPhase=			2
933c5fe6c4eSniklasISAKMP-peer=		ISAKMP-peer-west
9342b81057dSniklasConfiguration=		Default-quick-mode
935c5fe6c4eSniklasLocal-ID=		Net-east
936c5fe6c4eSniklasRemote-ID=		Net-west
937cc3c8b42Sniklas#Flags=
9382b81057dSniklas
939c5fe6c4eSniklas[Net-west]
9402b81057dSniklasID-type=		IPV4_ADDR_SUBNET
9412b81057dSniklasNetwork=		192.168.1.0
9422b81057dSniklasNetmask=		255.255.255.0
9432b81057dSniklas
944c5fe6c4eSniklas[Net-east]
9452b81057dSniklasID-type=		IPV4_ADDR_SUBNET
9462b81057dSniklasNetwork=		192.168.2.0
9472b81057dSniklasNetmask=		255.255.255.0
9482b81057dSniklas
94952e712aeSniklas# Quick mode descriptions
95052e712aeSniklas
95152e712aeSniklas[Default-quick-mode]
95252e712aeSniklasEXCHANGE_TYPE=		QUICK_MODE
9531a87c1a3ShoSuites=			QM-ESP-3DES-SHA-PFS-SUITE,QM-ESP-AES-SHA-PFS-SUITE
95452e712aeSniklas
9554ca71560Sho# Data for an IKE mode-config peer
9564ca71560Sho[asn1_dn//C=SE/L=SomeCity/O=SomeCompany/CN=SomePeer.company.com]
9574ca71560ShoAddress=		192.168.1.123
9584ca71560ShoNetmask=		255.255.255.0
9594ca71560ShoNameserver=		192.168.1.10
9604ca71560ShoWINS-server=		192.168.1.11
9614ca71560Sho
962106cbd59Smarkus# pre-shared key based on initiator's phase 1 ID
963106cbd59Smarkus[foo.bar.org]
964106cbd59SmarkusAuthentication=		mekmitasdigoat
965106cbd59Smarkus
96652e712aeSniklas#
96752e712aeSniklas# #####################################################################
96844143af3Sderaadt# All configuration data below this point is not required as the example
96952e712aeSniklas# uses the predefined Main Mode transform and Quick Mode suite names.
97052e712aeSniklas# It is included here for completeness.  Note the default values for the
97152e712aeSniklas# [General] and [X509-certificates] sections just below.
97252e712aeSniklas# #####################################################################
97352e712aeSniklas#
97452e712aeSniklas
97552e712aeSniklas[General]
976447a9f3aShoPolicy-file=		/etc/isakmpd/isakmpd.policy
97752e712aeSniklasRetransmits=		3
97852e712aeSniklasExchange-max-time=	120
97952e712aeSniklas
980b57b191eSniklas# KeyNote credential storage
981b57b191eSniklas[KeyNote]
982b57b191eSniklasCredential-directory=	/etc/isakmpd/keynote/
983b57b191eSniklas
984fb1921ccSniklas# Certificates stored in PEM format
985fb1921ccSniklas[X509-certificates]
986fb1921ccSniklasCA-directory=           /etc/isakmpd/ca/
987fb1921ccSniklasCert-directory=         /etc/isakmpd/certs/
9889dbe9fb4ShoCRL-directory=		/etc/isakmpd/crls/
989954b1b31SniklasPrivate-key=		/etc/isakmpd/private/local.key
990fb1921ccSniklas
991419caefeSho# Default phase 1 description (Main Mode)
992419caefeSho
99335ff0956Sho[Default-phase-1-configuration]
994419caefeShoEXCHANGE_TYPE=		ID_PROT
995419caefeShoTransforms=		3DES-SHA
996419caefeSho
9972b81057dSniklas# Main mode transforms
9982b81057dSniklas######################
9992b81057dSniklas
10002b81057dSniklas# DES
10012040585eSniklas
10022040585eSniklas[DES-MD5]
10032040585eSniklasENCRYPTION_ALGORITHM=	DES_CBC
10042040585eSniklasHASH_ALGORITHM=		MD5
10052040585eSniklasAUTHENTICATION_METHOD=	PRE_SHARED
10062039fcadShoGROUP_DESCRIPTION=	MODP_1024
100760f440ccShoLife=			Default-phase-1-lifetime
10082040585eSniklas
10092b81057dSniklas[DES-SHA]
10102b81057dSniklasENCRYPTION_ALGORITHM=	DES_CBC
10112b81057dSniklasHASH_ALGORITHM=		SHA
10122b81057dSniklasAUTHENTICATION_METHOD=	PRE_SHARED
101360f440ccShoGROUP_DESCRIPTION=	MODP_1024
101460f440ccShoLife=			Default-phase-1-lifetime
10152b81057dSniklas
10162b81057dSniklas# 3DES
10172b81057dSniklas
10182b81057dSniklas[3DES-SHA]
10192b81057dSniklasENCRYPTION_ALGORITHM=	3DES_CBC
10202040585eSniklasHASH_ALGORITHM=		SHA
10212040585eSniklasAUTHENTICATION_METHOD=	PRE_SHARED
10222040585eSniklasGROUP_DESCRIPTION=	MODP_1024
102360f440ccShoLife=			Default-phase-1-lifetime
10242b81057dSniklas
1025a806508bShshoexer# AES
1026a806508bShshoexer
1027a806508bShshoexer[AES-SHA]
1028a806508bShshoexerENCRYPTION_ALGORITHM=	AES_CBC
1029a806508bShshoexerKEY_LENGTH=		128,128:256
1030a806508bShshoexerHASH_ALGORITHM=		SHA
1031a806508bShshoexerAUTHENTICATION_METHOD=	PRE_SHARED
1032a806508bShshoexerGROUP_DESCRIPTION=	MODP_1024
1033a806508bShshoexerLife=			Default-phase-1-lifetime
1034a806508bShshoexer
10352b81057dSniklas# Blowfish
10362b81057dSniklas
103760f440ccSho[BLF-SHA]
10382b81057dSniklasENCRYPTION_ALGORITHM=	BLOWFISH_CBC
10392b81057dSniklasKEY_LENGTH=		128,96:192
10402b81057dSniklasHASH_ALGORITHM=		SHA
10412b81057dSniklasAUTHENTICATION_METHOD=	PRE_SHARED
10422b81057dSniklasGROUP_DESCRIPTION=	MODP_1024
104360f440ccShoLife=			Default-phase-1-lifetime
10442040585eSniklas
104560f440ccSho# Blowfish, using DH group 4 (non-default)
10462040585eSniklas[BLF-SHA-EC185]
1047d70ca5f7SniklasENCRYPTION_ALGORITHM=	BLOWFISH_CBC
10482b81057dSniklasKEY_LENGTH=		128,96:192
10492040585eSniklasHASH_ALGORITHM=		SHA
10502040585eSniklasAUTHENTICATION_METHOD=	PRE_SHARED
10512040585eSniklasGROUP_DESCRIPTION=	EC2N_185
105260f440ccShoLife=			Default-phase-1-lifetime
10532040585eSniklas
10542b81057dSniklas# Quick mode protection suites
10552b81057dSniklas##############################
10562b81057dSniklas
10572b81057dSniklas# DES
10582040585eSniklas
1059d70ca5f7Sniklas[QM-ESP-DES-SUITE]
1060d70ca5f7SniklasProtocols=		QM-ESP-DES
1061d70ca5f7Sniklas
10622b81057dSniklas[QM-ESP-DES-PFS-SUITE]
10632b81057dSniklasProtocols=		QM-ESP-DES-PFS
10642b81057dSniklas
10652040585eSniklas[QM-ESP-DES-MD5-SUITE]
10662040585eSniklasProtocols=		QM-ESP-DES-MD5
10672040585eSniklas
10682b81057dSniklas[QM-ESP-DES-MD5-PFS-SUITE]
10692b81057dSniklasProtocols=		QM-ESP-DES-MD5-PFS
10702040585eSniklas
10712b81057dSniklas[QM-ESP-DES-SHA-SUITE]
10722b81057dSniklasProtocols=		QM-ESP-DES-SHA
10732040585eSniklas
10742b81057dSniklas[QM-ESP-DES-SHA-PFS-SUITE]
10752b81057dSniklasProtocols=		QM-ESP-DES-SHA-PFS
10762040585eSniklas
10772b81057dSniklas# 3DES
10782b81057dSniklas
10792b81057dSniklas[QM-ESP-3DES-SHA-SUITE]
10802b81057dSniklasProtocols=		QM-ESP-3DES-SHA
10812b81057dSniklas
10822b81057dSniklas[QM-ESP-3DES-SHA-PFS-SUITE]
10832b81057dSniklasProtocols=		QM-ESP-3DES-SHA-PFS
10842b81057dSniklas
1085bfc24386Sniklas# AES
1086bfc24386Sniklas
1087bfc24386Sniklas[QM-ESP-AES-SHA-SUITE]
1088bfc24386SniklasProtocols=              QM-ESP-AES-SHA
1089bfc24386Sniklas
109060f440ccSho[QM-ESP-AES-SHA-PFS-SUITE]
1091bfc24386SniklasProtocols=              QM-ESP-AES-SHA-PFS
1092bfc24386Sniklas
10932b81057dSniklas# AH
10942b81057dSniklas
10952b81057dSniklas[QM-AH-MD5-SUITE]
10962b81057dSniklasProtocols=		QM-AH-MD5
10972b81057dSniklas
10982b81057dSniklas[QM-AH-MD5-PFS-SUITE]
10992b81057dSniklasProtocols=		QM-AH-MD5-PFS
11002b81057dSniklas
110160f440ccSho# AH + ESP (non-default)
11022040585eSniklas
11032040585eSniklas[QM-AH-MD5-ESP-DES-SUITE]
11042040585eSniklasProtocols=		QM-AH-MD5,QM-ESP-DES
11052040585eSniklas
11062b81057dSniklas[QM-AH-MD5-ESP-DES-MD5-SUITE]
11072b81057dSniklasProtocols=		QM-AH-MD5,QM-ESP-DES-MD5
11082040585eSniklas
11092b81057dSniklas[QM-ESP-DES-MD5-AH-MD5-SUITE]
11102b81057dSniklasProtocols=		QM-ESP-DES-MD5,QM-AH-MD5
11112b81057dSniklas
11122b81057dSniklas# Quick mode protocols
11132b81057dSniklas
11142b81057dSniklas# DES
11152040585eSniklas
11162040585eSniklas[QM-ESP-DES]
11172040585eSniklasPROTOCOL_ID=		IPSEC_ESP
11182040585eSniklasTransforms=		QM-ESP-DES-XF
11192040585eSniklas
11202b81057dSniklas[QM-ESP-DES-MD5]
11212b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
11222b81057dSniklasTransforms=		QM-ESP-DES-MD5-XF
11232b81057dSniklas
11242b81057dSniklas[QM-ESP-DES-MD5-PFS]
11252b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
11262b81057dSniklasTransforms=		QM-ESP-DES-MD5-PFS-XF
11272b81057dSniklas
11282b81057dSniklas[QM-ESP-DES-SHA]
11292b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
11302b81057dSniklasTransforms=		QM-ESP-DES-SHA-XF
11312b81057dSniklas
11322b81057dSniklas# 3DES
11332b81057dSniklas
11342b81057dSniklas[QM-ESP-3DES-SHA]
11352b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
11362b81057dSniklasTransforms=		QM-ESP-3DES-SHA-XF
11372b81057dSniklas
11382b81057dSniklas[QM-ESP-3DES-SHA-PFS]
11392b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
11402b81057dSniklasTransforms=		QM-ESP-3DES-SHA-PFS-XF
11412b81057dSniklas
11422b81057dSniklas[QM-ESP-3DES-SHA-TRP]
11432b81057dSniklasPROTOCOL_ID=		IPSEC_ESP
11442b81057dSniklasTransforms=		QM-ESP-3DES-SHA-TRP-XF
11452b81057dSniklas
1146bfc24386Sniklas# AES
1147bfc24386Sniklas
1148bfc24386Sniklas[QM-ESP-AES-SHA]
1149bfc24386SniklasPROTOCOL_ID=		IPSEC_ESP
1150bfc24386SniklasTransforms=		QM-ESP-AES-SHA-XF
1151bfc24386Sniklas
1152bfc24386Sniklas[QM-ESP-AES-SHA-PFS]
1153bfc24386SniklasPROTOCOL_ID=		IPSEC_ESP
1154bfc24386SniklasTransforms=		QM-ESP-AES-SHA-PFS-XF
1155bfc24386Sniklas
1156bfc24386Sniklas[QM-ESP-AES-SHA-TRP]
1157bfc24386SniklasPROTOCOL_ID=		IPSEC_ESP
1158bfc24386SniklasTransforms=		QM-ESP-AES-SHA-TRP-XF
1159bfc24386Sniklas
11602b81057dSniklas# AH MD5
11612b81057dSniklas
11622b81057dSniklas[QM-AH-MD5]
11632b81057dSniklasPROTOCOL_ID=		IPSEC_AH
11642b81057dSniklasTransforms=		QM-AH-MD5-XF
11652b81057dSniklas
11662b81057dSniklas[QM-AH-MD5-PFS]
11672b81057dSniklasPROTOCOL_ID=		IPSEC_AH
11682b81057dSniklasTransforms=		QM-AH-MD5-PFS-XF
11692b81057dSniklas
11702b81057dSniklas# Quick mode transforms
11712b81057dSniklas
11722b81057dSniklas# ESP DES+MD5
11732b81057dSniklas
11742040585eSniklas[QM-ESP-DES-XF]
11752040585eSniklasTRANSFORM_ID=		DES
11762040585eSniklasENCAPSULATION_MODE=	TUNNEL
117760f440ccShoLife=			Default-phase-2-lifetime
11782040585eSniklas
11792b81057dSniklas[QM-ESP-DES-MD5-XF]
11802b81057dSniklasTRANSFORM_ID=		DES
11812b81057dSniklasENCAPSULATION_MODE=	TUNNEL
11822b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_MD5
118360f440ccShoLife=			Default-phase-2-lifetime
11842b81057dSniklas
11852b81057dSniklas[QM-ESP-DES-MD5-PFS-XF]
11862b81057dSniklasTRANSFORM_ID=		DES
11872b81057dSniklasENCAPSULATION_MODE=	TUNNEL
11882039fcadShoGROUP_DESCRIPTION=	MODP_1024
11892b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_MD5
119060f440ccShoLife=			Default-phase-2-lifetime
11912b81057dSniklas
11922b81057dSniklas[QM-ESP-DES-SHA-XF]
11932b81057dSniklasTRANSFORM_ID=		DES
11942b81057dSniklasENCAPSULATION_MODE=	TUNNEL
11952b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
119660f440ccShoLife=			Default-phase-2-lifetime
11972b81057dSniklas
11982b81057dSniklas# 3DES
11992b81057dSniklas
12002b81057dSniklas[QM-ESP-3DES-SHA-XF]
12012b81057dSniklasTRANSFORM_ID=		3DES
12022b81057dSniklasENCAPSULATION_MODE=	TUNNEL
12032b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
120460f440ccShoLife=			Default-phase-2-lifetime
12052b81057dSniklas
12062b81057dSniklas[QM-ESP-3DES-SHA-PFS-XF]
12072b81057dSniklasTRANSFORM_ID=		3DES
12082b81057dSniklasENCAPSULATION_MODE=	TUNNEL
12092b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
12102b81057dSniklasGROUP_DESCRIPTION=	MODP_1024
121160f440ccShoLife=			Default-phase-2-lifetime
12122b81057dSniklas
12132b81057dSniklas[QM-ESP-3DES-SHA-TRP-XF]
12142b81057dSniklasTRANSFORM_ID=		3DES
12152b81057dSniklasENCAPSULATION_MODE=	TRANSPORT
12162b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
121760f440ccShoLife=			Default-phase-2-lifetime
12182b81057dSniklas
1219bfc24386Sniklas# AES
1220bfc24386Sniklas
1221bfc24386Sniklas[QM-ESP-AES-SHA-XF]
1222bfc24386SniklasTRANSFORM_ID=		AES
1223bfc24386SniklasENCAPSULATION_MODE=	TUNNEL
1224bfc24386SniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
1225a806508bShshoexerKEY_LENGTH=		128
122660f440ccShoLife=			Default-phase-2-lifetime
1227bfc24386Sniklas
1228bfc24386Sniklas[QM-ESP-AES-SHA-PFS-XF]
1229bfc24386SniklasTRANSFORM_ID=		AES
1230bfc24386SniklasENCAPSULATION_MODE=	TUNNEL
1231bfc24386SniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
1232bfc24386SniklasGROUP_DESCRIPTION=	MODP_1024
1233a806508bShshoexerKEY_LENGTH=		128
123460f440ccShoLife=			Default-phase-2-lifetime
1235bfc24386Sniklas
1236bfc24386Sniklas[QM-ESP-AES-SHA-TRP-XF]
1237bfc24386SniklasTRANSFORM_ID=		AES
1238bfc24386SniklasENCAPSULATION_MODE=	TRANSPORT
1239bfc24386SniklasAUTHENTICATION_ALGORITHM=	HMAC_SHA
1240a806508bShshoexerKEY_LENGTH=		128
124160f440ccShoLife=			Default-phase-2-lifetime
1242bfc24386Sniklas
12432b81057dSniklas# AH
12442b81057dSniklas
12452b81057dSniklas[QM-AH-MD5-XF]
12462b81057dSniklasTRANSFORM_ID=		MD5
12472b81057dSniklasENCAPSULATION_MODE=	TUNNEL
12482b81057dSniklasAUTHENTICATION_ALGORITHM=	HMAC_MD5
124960f440ccShoLife=			Default-phase-2-lifetime
12502b81057dSniklas
12512b81057dSniklas[QM-AH-MD5-PFS-XF]
12522b81057dSniklasTRANSFORM_ID=		MD5
12532b81057dSniklasENCAPSULATION_MODE=	TUNNEL
12542039fcadShoGROUP_DESCRIPTION=	MODP_1024
125560f440ccShoLife=			Default-phase-2-lifetime
12562b81057dSniklas
125760f440ccSho[Sample-Life-Time]
12582b81057dSniklasLIFE_TYPE=		SECONDS
12592b81057dSniklasLIFE_DURATION=		3600,1800:7200
12602b81057dSniklas
126160f440ccSho[Sample-Life-Volume]
12622b81057dSniklasLIFE_TYPE=		KILOBYTES
12632b81057dSniklasLIFE_DURATION=		1000,768:1536
12642040585eSniklas.Ed
12652040585eSniklas.Sh SEE ALSO
1266b57b191eSniklas.Xr keynote 1 ,
1267ffa2dcb0Sjmc.Xr openssl 1 ,
1268dc89b21eSfgsch.Xr ipsec 4 ,
126930a2652aSniklas.Xr keynote 4 ,
127077725688Sniklas.Xr isakmpd.policy 5 ,
127110f11e23Sjmc.Xr isakmpd 8
1272830c32f9Shshoexer.Sh CAVEATS
1273830c32f9ShshoexerUsing aggressive mode is discouraged due to various design problems.
1274830c32f9ShshoexerIf your peer only supports aggressive mode, please consider replacing that
1275830c32f9Shshoexerpeer with a sane ISAKMP/IKE implementation.
1276830c32f9ShshoexerFor details see
1277830c32f9Shshoexer.Pa http://www.usenix.org/publications/login/1999-12/features/harmful.html .
1278d7401508Sho.Sh BUGS
1279d7401508ShoThe RFCs do not permit differing DH groups in the same proposal for
1280d7401508Shoaggressive and quick mode exchanges.
1281d7401508ShoMixing both PFS and non-PFS suites in a quick mode proposal is not possible,
1282d7401508Shoas PFS implies using a DH group.
1283