1*d9bb20e6Shshoexer.\" $OpenBSD: isakmpd.conf.5,v 1.116 2006/06/11 11:07:41 hshoexer Exp $ 2e55ca143Sniklas.\" $EOM: isakmpd.conf.5,v 1.57 2000/12/21 14:43:17 ho Exp $ 32040585eSniklas.\" 444f0148dSniklas.\" Copyright (c) 1998, 1999, 2000 Niklas Hallqvist. All rights reserved. 54ca71560Sho.\" Copyright (c) 2000, 2001, 2002 H�kan Olsson. All rights reserved. 62040585eSniklas.\" 72040585eSniklas.\" Redistribution and use in source and binary forms, with or without 82040585eSniklas.\" modification, are permitted provided that the following conditions 92040585eSniklas.\" are met: 102040585eSniklas.\" 1. Redistributions of source code must retain the above copyright 112040585eSniklas.\" notice, this list of conditions and the following disclaimer. 122040585eSniklas.\" 2. Redistributions in binary form must reproduce the above copyright 132040585eSniklas.\" notice, this list of conditions and the following disclaimer in the 142040585eSniklas.\" documentation and/or other materials provided with the distribution. 152040585eSniklas.\" 162040585eSniklas.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 172040585eSniklas.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 182040585eSniklas.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 192040585eSniklas.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 202040585eSniklas.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 212040585eSniklas.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 222040585eSniklas.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 232040585eSniklas.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 242040585eSniklas.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 252040585eSniklas.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 262040585eSniklas.\" 272040585eSniklas.\" This code was written under funding by Ericsson Radio Systems. 282040585eSniklas.\" 292040585eSniklas.\" Manual page, using -mandoc macros 302040585eSniklas.\" 3172578f93Sho.Dd August 07, 2002 3258aefd4bSaaron.Dt ISAKMPD.CONF 5 332040585eSniklas.Os 342040585eSniklas.Sh NAME 352040585eSniklas.Nm isakmpd.conf 3658aefd4bSaaron.Nd configuration file for isakmpd 372040585eSniklas.Sh DESCRIPTION 3858aefd4bSaaron.Nm 3958aefd4bSaaronis the configuration file for the 40e407932bSjmc.Xr isakmpd 8 41ffa2dcb0Sjmcdaemon, managing security association and key management for the 4261d575f0SangelosIPsec layer of the kernel's networking stack. 432040585eSniklas.Pp 442040585eSniklasThe file is of a well known type of format called .INI style, named after 452040585eSniklasthe suffix used by an overrated windowing environment for its configuration 469615e1d4Saaronfiles. 479615e1d4SaaronThis format consists of sections, each beginning with a line looking like: 48ffa2dcb0Sjmc.Bd -unfilled 49ffa2dcb0Sjmc.Bq Sy Section name 502040585eSniklas.Ed 512040585eSniklasBetween the brackets is the name of the section following this section header. 522040585eSniklasInside a section many tag/value pairs can be stored, each one looking like: 53ffa2dcb0Sjmc.Bd -unfilled 54ffa2dcb0Sjmc.Ar Tag Ns = Ns Ar Value 552040585eSniklas.Ed 56ffa2dcb0SjmcIf the value needs more space than fits on a single line, it's possible to 57a2067f52Sniklascontinue it on the next by ending the first with a backslash character 589615e1d4Saaronimmediately before the newline character. 590e2d4717SkjellThis method can extend a value for an arbitrary number of lines. 602040585eSniklas.Pp 6158aefd4bSaaronComments can be put anywhere in the file by using a hash mark 6258aefd4bSaaron.Pq Sq \&# . 630e2d4717SkjellThe comment extends to the end of the current line. 642040585eSniklas.Pp 65c5fe6c4eSniklasOften the right-hand side values consist of other section names. 66c5fe6c4eSniklasThis results in a tree structure. 670e2d4717SkjellSome values are treated as a list of several scalar values. 680e2d4717SkjellSuch lists always use a comma character as the separator. 699615e1d4SaaronSome values are formatted like this: X,Y:Z, which 70c5fe6c4eSniklasis an offer/accept syntax, where X is a value we offer and Y:Z is a range of 71c5fe6c4eSniklasaccepted values, inclusive. 72c5fe6c4eSniklas.Pp 73bad0180eShoTo activate changes to 74bad0180eSho.Nm 75bad0180eShowithout restarting 76ffa2dcb0Sjmc.Xr isakmpd 8 , 774eb3dd62Sjmcsend a 784eb3dd62Sjmc.Dv SIGHUP 794eb3dd62Sjmcsignal to the daemon process. 80ffa2dcb0Sjmc.Sh AUTO-GENERATED PARTS OF THE CONFIGURATION 810e2d4717SkjellSome predefined section names are recognized by the daemon, avoiding the need 820e2d4717Skjellto fully specify the Main Mode transforms and Quick Mode suites, protocols, 8352e712aeSniklasand transforms. 8452e712aeSniklas.Pp 8552e712aeSniklasFor Main Mode: 86*d9bb20e6Shshoexer.\"{cipher}-{hash}[-{group}][-RSA_SIG] 87ffa2dcb0Sjmc.Bl -inset -compact 88ffa2dcb0Sjmc.It Xo 89ffa2dcb0Sjmc.Sm off 90ffa2dcb0Sjmc.No { 91*d9bb20e6Shshoexer.Ar cipher 92ffa2dcb0Sjmc.No }-{ 93*d9bb20e6Shshoexer.Ar hash 94*d9bb20e6Shshoexer.No }[{- 95*d9bb20e6Shshoexer.Ar group 96ffa2dcb0Sjmc.No }] 9777012c86Sjmc.No [- 9877012c86Sjmc.Ar RSA_SIG 9977012c86Sjmc.No ] 100ffa2dcb0Sjmc.Sm on 101ffa2dcb0Sjmc.Xc 102ffa2dcb0Sjmc.El 10352e712aeSniklas.Pp 104*d9bb20e6Shshoexerwhere: 105*d9bb20e6Shshoexer.Bl -tag -width "{cipher}" -offset indent -compact 106*d9bb20e6Shshoexer.It Ns { Ns Ar cipher Ns } 107*d9bb20e6Shshoexeris either DES, BLF, 3DES, CAST, or AES 108*d9bb20e6Shshoexer.It Ns { Ns Ar hash Ns } 109*d9bb20e6Shshoexeris either MD5, SHA, or SHA2-{256,384,512} 110*d9bb20e6Shshoexer.It Ns { Ns Ar group Ns } 111*d9bb20e6Shshoexeris either GRP1, GRP2, GRP5, GRP14, or GRP15 112*d9bb20e6Shshoexer.El 113*d9bb20e6Shshoexer.Pp 11452e712aeSniklasFor Quick Mode: 115ffa2dcb0Sjmc.\" .Ar QM-{proto}[-TRP]-{cipher}[-{hash}][-PFS[-{group}]]-SUITE 116ffa2dcb0Sjmc.Bl -inset -compact 117ffa2dcb0Sjmc.It Xo 118ffa2dcb0Sjmc.Sm off 119ffa2dcb0Sjmc.Ar QM 120ffa2dcb0Sjmc.No -{ 121ffa2dcb0Sjmc.Ar proto 122ffa2dcb0Sjmc.No }[- 123ffa2dcb0Sjmc.Ar TRP 124ffa2dcb0Sjmc.No ]-{ 125ffa2dcb0Sjmc.Ar cipher 126ffa2dcb0Sjmc.No }[-{ 127ffa2dcb0Sjmc.Ar hash 128ffa2dcb0Sjmc.No }] 129ffa2dcb0Sjmc.No [- 130ffa2dcb0Sjmc.Ar PFS 131ffa2dcb0Sjmc.No [-{ 132ffa2dcb0Sjmc.Ar group 133ffa2dcb0Sjmc.No }]]- 134ffa2dcb0Sjmc.Ar SUITE 135ffa2dcb0Sjmc.Sm on 136ffa2dcb0Sjmc.Xc 137ffa2dcb0Sjmc.El 138ffa2dcb0Sjmc.Pp 139ffa2dcb0Sjmcwhere: 140ffa2dcb0Sjmc.Bl -tag -width "{cipher}" -offset indent -compact 141ffa2dcb0Sjmc.It Ns { Ns Ar proto Ns } 142ffa2dcb0Sjmcis either ESP or AH 143ffa2dcb0Sjmc.It Ns { Ns Ar cipher Ns } 144*d9bb20e6Shshoexeris either DES, 3DES, CAST, BLF, AES, or AESCTR 145ffa2dcb0Sjmc.It Ns { Ns Ar hash Ns } 146ffa2dcb0Sjmcis either MD5, SHA, RIPEMD, or SHA2-{256,384,512} 147ffa2dcb0Sjmc.It Ns { Ns Ar group Ns } 148*d9bb20e6Shshoexeris either GRP1, GRP2, GRP5, GRP14, or GRP15 149ffa2dcb0Sjmc.El 15052e712aeSniklas.Pp 151*d9bb20e6ShshoexerFor example, AES-SHA2-256 means: AES encryption, SHA2-256 hash, and 152*d9bb20e6Shshoexerauthorization by pre-shared keys. 153*d9bb20e6ShshoexerAdding "-RSA_SIG" will enable public key authentication, 154*d9bb20e6Shshoexere.g. AES-SHA2-256-RSA_SIG. 1550e2d4717SkjellSimilarly, QM-ESP-3DES-SHA-PFS-SUITE means: ESP protocol, 3DES encryption, 15682184a41SjmcSHA hash, and use Perfect Forward Secrecy. 15752e712aeSniklas.Pp 158e8200b82ShshoexerUnless explicitly stated with -GRP1, 2, 5, 14 or 15, transforms and 159e8200b82ShshoexerPFS suites use DH group 2. 1604eb3dd62SjmcThere are currently no predefined ESP+AH Quick Mode suites. 16152e712aeSniklas.Pp 1622039fcadShoThe predefinitions include some default values for the special 163419caefeShosections "General", "Keynote", "X509-certificates", and 16435ff0956Sho"Default-phase-1-configuration". 165419caefeShoThese default values are presented in the example below. 16652e712aeSniklas.Pp 16752e712aeSniklasAll autogenerated values can be overridden by manual entries by using the 16852e712aeSniklassame section and tag names in the configuration file. 169b57b191eSniklasIn particular, the default phase 1 (Main or Aggressive Mode) and phase 2 170b57b191eSniklas(Quick Mode) lifetimes can be overridden by these tags under the "General" 171ffa2dcb0Sjmcsection: 172ffa2dcb0Sjmc.Bd -literal -offset indent 173b57b191eSniklas[General] 174b57b191eSniklasDefault-phase-1-lifetime= 3600,60:86400 175b57b191eSniklasDefault-phase-2-lifetime= 1200,60:86400 176b57b191eSniklas.Ed 1772039fcadSho.Pp 1782039fcadShoThe Main Mode lifetime currently defaults to one hour (minimum 60 1794eb3dd62Sjmcseconds, maximum 1 day). 1804eb3dd62SjmcThe Quick Mode lifetime defaults to 20 minutes 1814eb3dd62Sjmc(minimum 60 seconds, maximum 1 day). 18252e712aeSniklas.Pp 183ffa2dcb0SjmcAlso, the default phase 1 ID can be set by creating a 184ffa2dcb0Sjmc.Aq Sy Phase1-ID 1850378d1f2Sniklassection, as shown below, and adding this tag under the "General" 186ffa2dcb0Sjmcsection: 187ffa2dcb0Sjmc.Bd -literal -offset indent 1880378d1f2Sniklas[General] 1890378d1f2SniklasDefault-phase-1-ID= Phase1-ID-name 1900378d1f2Sniklas 1910378d1f2Sniklas[Phase1-ID-name] 1920378d1f2SniklasID-type= USER_FQDN 1930378d1f2SniklasName= foo@bar.com 1940378d1f2Sniklas.Ed 195ffa2dcb0Sjmc.Sh ROOTS 196ffa2dcb0Sjmc.Bl -hang -width 8n 197c00f6aafSjmc.It Bq Sy General 198c5fe6c4eSniklasGeneric global configuration parameters 199ffa2dcb0Sjmc.Bl -tag -width Ds 200e0eef2f9Shshoexer.It Em Acquire-Only 201e0eef2f9ShshoexerIf this tag is defined, 202ffa2dcb0Sjmc.Xr isakmpd 8 203e0eef2f9Shshoexerwill not set up flows automatically. 204e0eef2f9ShshoexerThis is useful when flows are configured with 2059fb8734eSjmc.Xr ipsecctl 8 206e0eef2f9Shshoexeror by other programs like 207e0eef2f9Shshoexer.Xr bgpd 8 . 208e0eef2f9ShshoexerThus 209ffa2dcb0Sjmc.Xr isakmpd 8 210e0eef2f9Shshoexeronly takes care of the SA establishment. 21135ff0956Sho.It Em Check-interval 212e0d722f1ShoThe interval between watchdog checks of connections we want up at all 2131ab51479Sclodertimes, in seconds. 2141ab51479ScloderThe default value is 60 seconds. 215e407932bSjmc.It Em Default-phase-1-ID 216e407932bSjmcOptional default phase 1 ID name. 217e407932bSjmc.It Em Default-phase-1-lifetime 218e407932bSjmcThe default lifetime for autogenerated transforms (phase 1). 219e407932bSjmcIf unspecified, the value 3600,60:86400 is used as the default. 220e407932bSjmc.It Em Default-phase-2-lifetime 221e407932bSjmcThe default lifetime for autogenerated suites (phase 2). 222e407932bSjmcIf unspecified, the value 1200,60:86400 is used as the default. 223e407932bSjmc.It Em Default-phase-2-suites 224e407932bSjmcA list of phase 2 suites that will be used when establishing dynamic 225e407932bSjmcSAs. 226e407932bSjmcIf left unspecified, QM-ESP-3DES-SHA-PFS-SUITE is used as the default. 227e0d722f1Sho.It Em DPD-check-interval 2281ab51479ScloderThe interval between RFC 3706 (Dead Peer Detection) messages, in seconds. 229e0d722f1ShoThe default value is 0 (zero), which means DPD is disabled. 23035ff0956Sho.It Em Exchange-max-time 23135ff0956ShoHow many seconds should an exchange maximally take to set up before we 23235ff0956Shogive up. 23335ff0956Sho.It Em Listen-on 234d39c0235ScloderA list of IP addresses or interface names OK to listen on. 23535ff0956ShoThis list is used as a filter for the set of addresses the interfaces 23635ff0956Shoconfigured provides. 23735ff0956ShoThis means that we won't see if an address given here does not exist 23835ff0956Shoon this host, and thus no error is given for that case. 2394e2ad344Shshoexer.It Em Loglevel 2404e2ad344ShshoexerA list of the form 2414e2ad344Shshoexer.Ar class Ns = Ns Ar level , 2424e2ad344Shshoexerwhere both 2434e2ad344Shshoexer.Ar class 2444e2ad344Shshoexerand 2454e2ad344Shshoexer.Ar level 2464e2ad344Shshoexerare numbers. 2474e2ad344ShshoexerThis is similar to the 2484e2ad344Shshoexer.Fl D 2494e2ad344Shshoexercommand line switch of 250ffa2dcb0Sjmc.Xr isakmpd 8 . 2514e2ad344Shshoexer.It Em Logverbose 2524e2ad344ShshoexerIf this tag is defined, whatever the value is, verbose logging is enabled. 2534e2ad344ShshoexerThis is similar to the 2544e2ad344Shshoexer.Fl v 255235cbc01Sjmccommand line switch of 256ffa2dcb0Sjmc.Xr isakmpd 8 . 2570b2bcfccSho.It Em NAT-T-Keepalive 2580b2bcfccShoThe number of seconds between NAT-T keepalive messages, sent by the 259d4c8cd14Sjmcpeer behind NAT to keep the mapping active. 260d4c8cd14SjmcDefaults to 20. 261447a9f3aSho.It Em Policy-file 26280c8b3dbSniklasThe name of the file that contains 2631215c700Sjmc.Xr keynote 4 2644aac73a4Saaronpolicies. 265ffa2dcb0SjmcThe default is 266ffa2dcb0Sjmc.Pa /etc/isakmpd/isakmpd.policy . 2670b880a72Sho.It Em Pubkey-directory 2680b880a72ShoThe directory in which 2690b880a72Sho.Nm 270ac1aa35bSmpechlooks for explicitly trusted public keys. 271ffa2dcb0SjmcThe default is 272ffa2dcb0Sjmc.Pa /etc/isakmpd/pubkeys . 273ac1aa35bSmpechRead 2740b880a72Sho.Xr isakmpd 8 2750b880a72Shofor the required naming convention of the files in here. 2764d27bb0fSho.It Em Renegotiate-on-HUP 2774d27bb0fShoIf this tag is defined, whatever the value is, 278ffa2dcb0Sjmc.Xr isakmpd 8 2794eb3dd62Sjmcwill renegotiate all current phase 2 SAs when the daemon receives a 2804eb3dd62Sjmc.Dv SIGHUP 2814eb3dd62Sjmcsignal, or an 2824eb3dd62Sjmc.Sq R 2834eb3dd62Sjmcis sent to the FIFO interface (see 2844d27bb0fSho.Xr isakmpd 8 ) . 28535ff0956Sho.It Em Retransmits 28635ff0956ShoHow many times should a message be retransmitted before giving up. 28735ff0956Sho.It Em Shared-SADB 28835ff0956ShoIf this tag is defined, whatever the value is, some semantics of 28935ff0956Sho.Nm 29035ff0956Shoare changed so that multiple instances can run on top of one SADB 29135ff0956Shoand set up SAs with each other. 29235ff0956ShoSpecifically this means replay 29335ff0956Shoprotection will not be asked for, and errors that can occur when 29435ff0956Shoupdating an SA with its parameters a 2nd time will be ignored. 295e0eef2f9Shshoexer.It Em Use-Keynote 296e0eef2f9ShshoexerThis tag controls the use of 297e0eef2f9Shshoexer.Xr keynote 4 298e0eef2f9Shshoexerpolicy checking. 299e0eef2f9ShshoexerThe default value is 300e0eef2f9Shshoexer.Qq yes , 301e0eef2f9Shshoexerwhich enables the policy checking. 302e0eef2f9ShshoexerWhen set to any other value, policies will not be checked. 3037a9bba63SjmcThis is useful when policies for flows and SA establishment are arranged by 304e0eef2f9Shshoexerother programs like 305937c2feaSderaadt.Xr ipsecctl 8 306e0eef2f9Shshoexeror 307e0eef2f9Shshoexer.Xr bgpd 8 . 308b4f8e7c2Shshoexer.It Em Delete-SAs 30995f3b939SjmcThis tag controls whether 310b4f8e7c2Shshoexer.Xr isakmpd 8 311b4f8e7c2Shshoexerdeletes SAs on shutdown or not. 312b4f8e7c2ShshoexerThe default value is 313b4f8e7c2Shshoexer.Qq no . 314c5fe6c4eSniklas.El 315c00f6aafSjmc.It Bq Sy Phase 1 316c5fe6c4eSniklasISAKMP SA negotiation parameter root 317ffa2dcb0Sjmc.Bl -tag -width Ds 318cc3c8b42Sniklas.It Em Default 319ac1aa35bSmpechA name of the default ISAKMP peer. 320ffa2dcb0SjmcIncoming phase 1 connections from other IP addresses will use this peer name. 3219615e1d4SaaronThis name is used as the section name for further information to be found. 322ffa2dcb0SjmcLook at 323ffa2dcb0Sjmc.Aq Sy ISAKMP-peer 324ffa2dcb0Sjmcbelow. 325e407932bSjmc.It Aq Em IP-address 326e407932bSjmcA name of the ISAKMP peer at the given IP address. 327c5fe6c4eSniklas.El 328c00f6aafSjmc.It Bq Sy Phase 2 329c5fe6c4eSniklasIPsec SA negotiation parameter root 330ffa2dcb0Sjmc.Bl -tag -width Ds 331c5fe6c4eSniklas.It Em Connections 33261d575f0SangelosA list of directed IPsec "connection" names that should be brought up 3332ddc24cbSniklasautomatically, either on first use if the system supports it, or at 3349615e1d4Saaronstartup of the daemon. 3359615e1d4SaaronThese names are section names where further information can be found. 336ffa2dcb0SjmcLook at 337ffa2dcb0Sjmc.Aq Sy IPsec-connection 338ffa2dcb0Sjmcbelow. 33944143af3SderaadtNormally any connections mentioned here are treated as part of the 340ffa2dcb0Sjmc"Passive-connection" list we present below; however there is a flag, 341ffa2dcb0Sjmc.Em Active-only , 342ffa2dcb0Sjmcthat disables this behaviour. 343ffa2dcb0SjmcThis too is mentioned in the 344ffa2dcb0Sjmc.Aq Sy IPsec-connection 345ffa2dcb0Sjmcsection, in the "Flags" tag. 34680baf197Sniklas.It Em Passive-connections 34761d575f0SangelosA list of IPsec "connection" names we recognize and accept initiations for. 3489615e1d4SaaronThese names are section names where further information can be found. 349ffa2dcb0SjmcLook at 350ffa2dcb0Sjmc.Aq Sy IPsec-connection 351ffa2dcb0Sjmcbelow. 3529615e1d4SaaronCurrently only the Local-ID and Remote-ID tags 35380baf197Sniklasare looked at in those sections, as they are matched against the IDs given 35480baf197Sniklasby the initiator. 355c5fe6c4eSniklas.El 356c00f6aafSjmc.It Bq Sy KeyNote 357c00f6aafSjmcKeyNote configuration section 358ffa2dcb0Sjmc.Bl -tag -width Ds 359b57b191eSniklas.It Em Credential-directory 360b57b191eSniklasA directory containing directories named after IDs (IP 3614eb3dd62Sjmcaddresses, 3624eb3dd62Sjmc.Dq user@domain , 3634eb3dd62Sjmcor hostnames) that contain files named 3644eb3dd62Sjmc.Dq credentials 3654eb3dd62Sjmcand 3664eb3dd62Sjmc.Dq private_key . 367b57b191eSniklas.Pp 368b57b191eSniklasThe credentials file contains 369b57b191eSniklas.Xr keynote 4 370b57b191eSniklascredentials that are sent to a remote IKE daemon when we use the 371b57b191eSniklasassociated ID, or credentials that we may want to consider when doing 372ac1aa35bSmpechan exchange with a remote IKE daemon that uses that ID. 373ac1aa35bSmpechNote that, in the former case, the last credential in the file 374ac1aa35bSmpechMUST contain our public key in its Licensees field. 375ac1aa35bSmpechMore than one credentials may exist in the file. 376ac1aa35bSmpechThey are separated by whitelines (the format is essentially the same as 377ac1aa35bSmpechthat of the policy file). 378ac1aa35bSmpechThe credentials are of the same format as the policies described in 379b57b191eSniklas.Xr isakmpd.policy 5 . 380b57b191eSniklasThe only difference is that the Authorizer field contains a public 381ac1aa35bSmpechkey, and the assertion is signed. 382ac1aa35bSmpechSigned assertions can be generated using the 383b57b191eSniklas.Xr keynote 1 384b57b191eSniklasutility. 385b57b191eSniklas.Pp 386b57b191eSniklasThe private_key file contains the private RSA key we use for 387ac1aa35bSmpechauthentication. 388ac1aa35bSmpechIf the directory (and the files) exist, they take precedence over X509-based 389ac1aa35bSmpechauthentication. 390b57b191eSniklas.El 391c00f6aafSjmc.It Bq Sy X509-Certificates 392c00f6aafSjmcX509-certificate configuration section 393ffa2dcb0Sjmc.Bl -tag -width Ds 39435ff0956Sho.It Em Accept-self-signed 39535ff0956ShoIf this tag is defined, whatever the value is, certificates that 39635ff0956Shodo not originate from a trusted CA but are self-signed will be 39735ff0956Shoaccepted. 398fb1921ccSniklas.It Em Ca-directory 399fb1921ccSniklasA directory containing PEM certificates of certification authorities 400ac1aa35bSmpechthat we trust to sign other certificates. 401ac1aa35bSmpechNote that for a CA to be really trusted, it needs to be somehow 402ac1aa35bSmpechreferred to by policy, in 403e5814869Sangelos.Xr isakmpd.policy 5 . 404e5814869SangelosThe certificates in this directory are used for the actual X.509 405e5814869Sangelosauthentication and for cross-referencing policies that refer to 406ac1aa35bSmpechDistinguished Names (DNs). 407ac1aa35bSmpechKeeping a separate directory (as opposed to integrating policies 408ac1aa35bSmpechand X.509 CA certificates) allows for maintenance of a list of 409ac1aa35bSmpech"well known" CAs without actually having to trust all (or any) of them. 410fb1921ccSniklas.It Em Cert-directory 411fb1921ccSniklasA directory containing PEM certificates that we trust to be valid. 412fb1921ccSniklasThese certificates are used in preference to those passed in messages and 4130e2d4717Skjellare required to have a subjectAltName extension containing the certificate 41491d5cfbaShshoexerholder identity; usually IP address, FQDN, or User FQDN. 415954b1b31Sniklas.It Em Private-key 416954b1b31SniklasThe private key matching the public key of our certificate (which should be 4170e2d4717Skjellin the "Cert-directory", and have an appropriate subjectAltName field). 418db26b2b9Smsf.It Em Private-key-directory 419db26b2b9SmsfA directory containing private keys named after an ID (IP addresses, 420db26b2b9Smsf.Dq user@domain , 42195f3b939Sjmcor hostnames). 422fb1921ccSniklas.El 423c5fe6c4eSniklas.El 424ffa2dcb0Sjmc.Sh REFERRED-TO SECTIONS 425ffa2dcb0Sjmc.Bl -hang -width Ds 426ffa2dcb0Sjmc.It Aq Sy ISAKMP-peer 427c5fe6c4eSniklasParameters for negotiation with an ISAKMP peer 428ffa2dcb0Sjmc.Bl -tag -width Ds 429c5fe6c4eSniklas.It Em Address 430ffa2dcb0SjmcIf existent, the IP address of the peer. 431e407932bSjmc.It Em Authentication 432e407932bSjmcIf existent, authentication data for this specific peer. 433e407932bSjmcIn the case of a pre-shared key, this is the key value itself. 434c5fe6c4eSniklas.It Em Configuration 4359615e1d4SaaronThe name of the ISAKMP-configuration section to use. 436ffa2dcb0SjmcLook at 437ffa2dcb0Sjmc.Aq Sy ISAKMP-configuration 438ffa2dcb0Sjmcbelow. 43935ff0956ShoIf unspecified, defaults to "Default-phase-1-configuration". 440e407932bSjmc.It Em Flags 441e407932bSjmcA comma-separated list of flags controlling the further 442e407932bSjmchandling of the ISAKMP SA. 443e407932bSjmcCurrently there are no specific ISAKMP SA flags defined. 4446a8478f3Sniklas.It Em ID 4456a8478f3SniklasIf existent, the name of the section that describes the 4464aac73a4Saaronlocal client ID that we should present to our peer. 4474aac73a4SaaronIf not present, it 4486a8478f3Sniklasdefaults to the address of the local interface we are sending packets 4494aac73a4Saaronover to the remote daemon. 450ffa2dcb0SjmcLook at 451ffa2dcb0Sjmc.Aq Sy Phase1-ID 452ffa2dcb0Sjmcbelow. 453e407932bSjmc.It Em Local-address 454e407932bSjmcThe Local IP address to use, if we are multi-homed, or have aliases. 455e407932bSjmc.It Em Phase 456e407932bSjmcThe constant 457e407932bSjmc.Sq 1 , 458e407932bSjmcas ISAKMP-peers and IPsec-connections 459e407932bSjmcreally are handled by the same code inside 460e407932bSjmc.Xr isakmpd 8 . 461e407932bSjmc.It Em Port 462e407932bSjmcFor UDP, the UDP port number to send to. 463e407932bSjmcThis is optional; 464e407932bSjmcthe default value is 500 which is the IANA-registered number for ISAKMP. 465a2067f52Sniklas.It Em Remote-ID 466a2067f52SniklasIf existent, the name of the section that describes the remote client 467a2067f52SniklasID we expect the remote daemon to send us. 468a2067f52SniklasIf not present, it defaults to the address of the remote daemon. 469ffa2dcb0SjmcLook at 470ffa2dcb0Sjmc.Aq Sy Phase1-ID 471ffa2dcb0Sjmcbelow. 472e407932bSjmc.It Em Transport 473e407932bSjmcThe name of the transport protocol; defaults to UDP. 474c5fe6c4eSniklas.El 475ffa2dcb0Sjmc.It Aq Sy Phase1-ID 476c00f6aafSjmcParameters for Phase 1 negotiation 477ffa2dcb0Sjmc.Bl -tag -width Ds 478e407932bSjmc.It Em Address 479e407932bSjmcIf the ID-type is 480e407932bSjmc.Li IPV4_ADDR 481e407932bSjmcor 482e407932bSjmc.Li IPV6_ADDR , 483e407932bSjmcthis tag should exist and be an IP address. 4846a8478f3Sniklas.It Em ID-type 485d8ca7c44ShoThe ID type as given by the RFC specifications. 48635ff0956ShoFor phase 1 this is currently 4876a8478f3Sniklas.Li IPV4_ADDR , 4886a8478f3Sniklas.Li IPV4_ADDR_SUBNET , 489d8ca7c44Sho.Li IPV6_ADDR , 490d8ca7c44Sho.Li IPV6_ADDR_SUBNET , 4916a8478f3Sniklas.Li FQDN , 492ffa2dcb0Sjmc.Li USER_FQDN , 4936a8478f3Sniklasor 4945bc978dfSangelos.Li KEY_ID . 4956a8478f3Sniklas.It Em Name 4966a8478f3SniklasIf the ID-type is 4975bc978dfSangelos.Li FQDN , 498ffa2dcb0Sjmc.Li USER_FQDN , 4995bc978dfSangelosor 5005bc978dfSangelos.Li KEY_ID , 5015bc978dfSangelosthis tag should exist and contain a domain name, user@domain, or 5025bc978dfSangelosother identifying string respectively. 5033f167ca4Sangelos.Pp 5043f167ca4SangelosIn the case of 5053f167ca4Sangelos.Li KEY_ID , 5063f167ca4Sangelosnote that the IKE protocol allows any octet sequence to be sent or 5073f167ca4Sangelosreceived under this payload, potentially including non-printable 5083f167ca4Sangelosones. 5091215c700Sjmc.Xr isakmpd 8 5103f167ca4Sangeloscan only transmit printable 5113f167ca4Sangelos.Li KEY_ID 5123f167ca4Sangelospayloads, but can receive and process arbitrary 5133f167ca4Sangelos.Li KEY_ID 5143f167ca4Sangelospayloads. 5153f167ca4SangelosThis effectively means that non-printable 5163f167ca4Sangelos.Li KEY_ID 5173f167ca4Sangelosremote identities cannot be verified through this means, although it 5183f167ca4Sangelosis still possible to do so through 5193f167ca4Sangelos.Xr isakmpd.policy 5 . 520e407932bSjmc.It Em Netmask 521e407932bSjmcIf the ID-type is 522e407932bSjmc.Li IPV4_ADDR_SUBNET 523e407932bSjmcor 524e407932bSjmc.Li IPV6_ADDR_SUBNET , 525e407932bSjmcthis tag should exist and 526e407932bSjmcbe a network subnet mask. 527e407932bSjmc.It Em Network 528e407932bSjmcIf the ID-type is 529e407932bSjmc.Li IPV4_ADDR_SUBNET 530e407932bSjmcor 531e407932bSjmc.Li IPV6_ADDR_SUBNET , 532e407932bSjmcthis tag should exist and 533e407932bSjmcbe a network address. 5346a8478f3Sniklas.El 535ffa2dcb0Sjmc.It Aq Sy ISAKMP-configuration 536c00f6aafSjmcParameters for ISAKMP configuration 537ffa2dcb0Sjmc.Bl -tag -width Ds 538c5fe6c4eSniklas.It Em DOI 5399615e1d4SaaronThe domain of interpretation as given by the RFCs. 5409615e1d4SaaronNormally 541c5fe6c4eSniklas.Li IPSEC . 542b57b191eSniklasIf unspecified, defaults to 543b57b191eSniklas.Li IPSEC . 544c5fe6c4eSniklas.It Em EXCHANGE_TYPE 5459615e1d4SaaronThe exchange type as given by the RFCs. 5469615e1d4SaaronFor main mode this is 5479f078bd8Sniklas.Li ID_PROT 5489f078bd8Sniklasand for aggressive mode it is 5499f078bd8Sniklas.Li AGGRESSIVE . 550c5fe6c4eSniklas.It Em Transforms 551c5fe6c4eSniklasA list of proposed transforms to use for protecting the 5529615e1d4SaaronISAKMP traffic. 5539615e1d4SaaronThese are actually names for sections 5549615e1d4Saaronfurther describing the transforms. 555ffa2dcb0SjmcLook at 556ffa2dcb0Sjmc.Aq Sy ISAKMP-transform 557ffa2dcb0Sjmcbelow. 558c5fe6c4eSniklas.El 559ffa2dcb0Sjmc.It Aq Sy ISAKMP-transform 560c00f6aafSjmcParameters for ISAKMP authentication 561ffa2dcb0Sjmc.Bl -tag -width Ds 562e407932bSjmc.It Em AUTHENTICATION_METHOD 563e407932bSjmcThe authentication method as the RFCs name it, or ANY. 564c5fe6c4eSniklas.It Em ENCRYPTION_ALGORITHM 565850f7173SniklasThe encryption algorithm as the RFCs name it, or ANY to denote that any 566850f7173Sniklasencryption algorithm proposed will be accepted. 567c5fe6c4eSniklas.It Em GROUP_DESCRIPTION 5689615e1d4SaaronThe group used for Diffie-Hellman exponentiations, or ANY. 56944143af3SderaadtThe names are symbolic, like 570ffa2dcb0Sjmc.Li MODP_768 , MODP_1024 , EC_155 , 571c5fe6c4eSniklasand 572c5fe6c4eSniklas.Li EC_185 . 573e407932bSjmc.It Em HASH_ALGORITHM 574e407932bSjmcThe hash algorithm as the RFCs name it, or ANY. 575e407932bSjmc.It Em KEY_LENGTH 576e407932bSjmcFor encryption algorithms with variable key length, this is 577e407932bSjmcwhere the offered/accepted keylengths are described. 578e407932bSjmcThe value is of the offer-accept kind described above. 579c5fe6c4eSniklas.It Em Life 5804aac73a4SaaronA list of lifetime descriptions, or ANY. 5814aac73a4SaaronIn the former case, each 582850f7173Sniklaselement is in itself a name of the section that defines the lifetime. 583ffa2dcb0SjmcLook at 584ffa2dcb0Sjmc.Aq Sy Lifetime 585ffa2dcb0Sjmcbelow. 5864aac73a4SaaronIf it is set to ANY, then any type of 587850f7173Sniklasproposed lifetime type and value will be accepted. 588e407932bSjmc.It Em PRF 589e407932bSjmcThe algorithm to use for the keyed pseudo-random function (used for key 590e407932bSjmcderivation and authentication in phase 1), or ANY. 591c5fe6c4eSniklas.El 592ffa2dcb0Sjmc.It Aq Sy Lifetime 593c00f6aafSjmcParameters for connection duration 594ffa2dcb0Sjmc.Bl -tag -width Ds 595e407932bSjmc.It Em LIFE_DURATION 596e407932bSjmcAn offer/accept kind of value; see above. 597e407932bSjmcCan also be set to ANY. 598c5fe6c4eSniklas.It Em LIFE_TYPE 599c5fe6c4eSniklas.Li SECONDS 600c5fe6c4eSniklasor 601e55ca143Sniklas.Li KILOBYTES 6024aac73a4Saarondepending on the type of the duration. 6034aac73a4SaaronNotice that this field may NOT be set to ANY. 604c5fe6c4eSniklas.El 605ffa2dcb0Sjmc.It Aq Sy IPsec-connection 606c00f6aafSjmcParameters for IPsec connection configuration 607ffa2dcb0Sjmc.Bl -tag -width Ds 608c5fe6c4eSniklas.It Em Configuration 60961d575f0SangelosThe name of the IPsec-configuration section to use. 610ffa2dcb0SjmcLook at 611ffa2dcb0Sjmc.Aq Sy IPsec-configuration 612ffa2dcb0Sjmcbelow. 61313a99464Sniklas.It Em Flags 61413a99464SniklasA comma-separated list of flags controlling the further 61561d575f0Sangeloshandling of the IPsec SA. 6169615e1d4SaaronCurrently only one flag is defined: 61780baf197Sniklas.Bl -tag -width 12n 61880baf197Sniklas.It Em Active-only 619ffa2dcb0SjmcIf this flag is given and this 620ffa2dcb0Sjmc.Aq Sy IPsec-connection 621ffa2dcb0Sjmcis part of the phase 2 62280baf197Sniklasconnections we automatically keep up, it will not automatically be used for 62380baf197Sniklasaccepting connections from the peer. 62480baf197Sniklas.El 625e407932bSjmc.It Em ISAKMP-peer 626604faeecSjmcThe name of the ISAKMP-peer to talk to in order to 627e407932bSjmcset up this connection. 628e407932bSjmcThe value is the name of an 629e407932bSjmc.Aq Sy ISAKMP-peer 630e407932bSjmcsection. 631e407932bSjmcSee above. 632e407932bSjmc.It Em Local-ID 633e407932bSjmcIf existent, the name of the section that describes the 634e407932bSjmcoptional local client ID that we should present to our peer. 635e407932bSjmcIt is also used when we act as responders to find out what 636e407932bSjmc.Aq Sy IPsec-connection 637e407932bSjmcwe are dealing with. 638e407932bSjmcLook at 639e407932bSjmc.Aq Sy IPsec-ID 640e407932bSjmcbelow. 641e407932bSjmc.It Em Phase 642e407932bSjmcThe constant 643e407932bSjmc.Sq 2 , 644e407932bSjmcas ISAKMP-peers and IPsec-connections 645e407932bSjmcreally are handled by the same code inside 646e407932bSjmc.Xr isakmpd 8 . 647e407932bSjmc.It Em Remote-ID 648e407932bSjmcIf existent, the name of the section that describes the 649e407932bSjmcoptional remote client ID that we should present to our peer. 650e407932bSjmcIt is also used when we act as responders to find out what 651e407932bSjmc.Aq Sy IPsec-connection 652e407932bSjmcwe are dealing with. 653e407932bSjmcLook at 654e407932bSjmc.Aq Sy IPsec-ID 655e407932bSjmcbelow. 656c5fe6c4eSniklas.El 657ffa2dcb0Sjmc.It Aq Sy IPsec-configuration 658c00f6aafSjmcParameters for IPsec configuration 659ffa2dcb0Sjmc.Bl -tag -width Ds 660c5fe6c4eSniklas.It Em DOI 6619615e1d4SaaronThe domain of interpretation as given by the RFCs. 6629615e1d4SaaronNormally 663c5fe6c4eSniklas.Li IPSEC . 664b57b191eSniklasIf unspecified, defaults to 665b57b191eSniklas.Li IPSEC . 666c5fe6c4eSniklas.It Em EXCHANGE_TYPE 6679615e1d4SaaronThe exchange type as given by the RFCs. 6689615e1d4SaaronFor quick mode this is 669c5fe6c4eSniklas.Li QUICK_MODE . 670c5fe6c4eSniklas.It Em Suites 6713b2a0cf1SaaronA list of protection suites (bundles of protocols) usable for 6729615e1d4Saaronprotecting the IP traffic. 673ffa2dcb0SjmcEach of the list elements is a name of an 674ffa2dcb0Sjmc.Aq Sy IPsec-suite 6759615e1d4Saaronsection. 6769615e1d4SaaronSee below. 677c5fe6c4eSniklas.El 678ffa2dcb0Sjmc.It Aq Sy IPsec-suite 679c00f6aafSjmcParameters for IPsec protection suite configuration 680ffa2dcb0Sjmc.Bl -tag -width Ds 681ffa2dcb0Sjmc.It Em Protocols 682ffa2dcb0SjmcA list of the protocols included in this protection suite. 683ffa2dcb0SjmcEach of the list elements is a name of an 684ffa2dcb0Sjmc.Aq Sy IPsec-protocol 685ffa2dcb0Sjmcsection. 686ffa2dcb0SjmcSee below. 687ffa2dcb0Sjmc.El 688ffa2dcb0Sjmc.It Aq Sy IPsec-protocol 689c00f6aafSjmcParameters for IPsec protocol configuration 690ffa2dcb0Sjmc.Bl -tag -width Ds 691c5fe6c4eSniklas.It Em PROTOCOL_ID 6929615e1d4SaaronThe protocol as given by the RFCs. 693ffa2dcb0SjmcAcceptable values are currently 694c5fe6c4eSniklas.Li IPSEC_AH 695c5fe6c4eSniklasand 696c5fe6c4eSniklas.Li IPSEC_ESP . 697e407932bSjmc.It Em ReplayWindow 698e407932bSjmcThe size of the window used for replay protection. 699e407932bSjmcThis is normally left alone. 700e407932bSjmcLook at the ESP and AH RFCs for a better description. 701c5fe6c4eSniklas.It Em Transforms 7023b2a0cf1SaaronA list of transforms usable for implementing the protocol. 703ffa2dcb0SjmcEach of the list elements is a name of an 704ffa2dcb0Sjmc.Aq Sy IPsec-transform 7059615e1d4Saaronsection. 7069615e1d4SaaronSee below. 707c5fe6c4eSniklas.El 708ffa2dcb0Sjmc.It Aq Sy IPsec-transform 709c00f6aafSjmcParameters for IPsec transform configuration 710ffa2dcb0Sjmc.Bl -tag -width Ds 711c5fe6c4eSniklas.It Em AUTHENTICATION_ALGORITHM 712c5fe6c4eSniklasThe optional authentication algorithm in the case of this 713c5fe6c4eSniklasbeing an ESP transform. 714e407932bSjmc.It Em ENCAPSULATION_MODE 715e407932bSjmcThe encapsulation mode as given by the RFCs. 716e407932bSjmcThis means TRANSPORT or TUNNEL. 717c5fe6c4eSniklas.It Em GROUP_DESCRIPTION 718c5fe6c4eSniklasAn optional (provides PFS if present) Diffie-Hellman group 7199615e1d4Saarondescription. 720ffa2dcb0SjmcThe values are the same as those for GROUP_DESCRIPTION in 721ffa2dcb0Sjmc.Aq Sy ISAKMP-transform 722ffa2dcb0Sjmcsections shown above. 723a806508bShshoexer.It Em KEY_LENGTH 724a806508bShshoexerFor encryption algorithms with variable key length, this is 725a806508bShshoexerwhere the offered keylength is described. 726c5fe6c4eSniklas.It Em Life 727ffa2dcb0SjmcList of lifetimes, each element is a 728ffa2dcb0Sjmc.Aq Sy Lifetime 729ffa2dcb0Sjmcsection name. 730e407932bSjmc.It Em TRANSFORM_ID 731e407932bSjmcThe transform ID as given by the RFCs. 732c5fe6c4eSniklas.El 733ffa2dcb0Sjmc.It Aq Sy IPsec-ID 734c00f6aafSjmcParameters for IPsec ID configuration 735ffa2dcb0Sjmc.Bl -tag -width Ds 736c5fe6c4eSniklas.It Em Address 737c5fe6c4eSniklasIf the ID-type is 738d8ca7c44Sho.Li IPV4_ADDR 739d8ca7c44Shoor 740ffa2dcb0Sjmc.Li IPV6_ADDR , 741ffa2dcb0Sjmcthis tag should exist and be an IP address, an interface name, or the 742e3283cbfSmcbride.Em default 743e3283cbfSmcbridekeyword. 744e3283cbfSmcbrideIf an interface is used, the first address of the appropriate 745e3283cbfSmcbridefamily will be used. 746e3283cbfSmcbrideThe 747e3283cbfSmcbride.Em default 748e3283cbfSmcbridekeyword uses the interface associated with the default route. 749ffa2dcb0SjmcIn the case of IPv6, link-local addresses will be skipped if 750e3283cbfSmcbrideaddresses which are not link-local exist. 751e3283cbfSmcbrideIf the address on the interface changes 752ffa2dcb0Sjmc.Xr isakmpd 8 753e3283cbfSmcbridewill not track the change. 754e3283cbfSmcbrideThe configuration must be reloaded to learn the new address. 755e407932bSjmc.It Em ID-type 756e407932bSjmcThe ID type as given by the RFCs. 757e407932bSjmcFor IPsec this is currently 758e407932bSjmc.Li IPV4_ADDR , 759e407932bSjmc.Li IPV6_ADDR , 760e407932bSjmc.Li IPV4_ADDR_SUBNET , 761d8ca7c44Shoor 762e407932bSjmc.Li IPV6_ADDR_SUBNET . 763c5fe6c4eSniklas.It Em Netmask 764c5fe6c4eSniklasIf the ID-type is 765c5fe6c4eSniklas.Li IPV4_ADDR_SUBNET 766d8ca7c44Shoor 767ffa2dcb0Sjmc.Li IPV6_ADDR_SUBNET , 768c5fe6c4eSniklasthis tag should exist and 769e3283cbfSmcbridebe a network subnet mask or an interface. 770ffa2dcb0SjmcWhen an interface is specified, the netmask is the mask associated with the 771e3283cbfSmcbride.Em Network . 772e3283cbfSmcbrideThe 773e3283cbfSmcbride.Em default 774e3283cbfSmcbridekeyword uses the interface associated with the default route. 775e407932bSjmc.It Em Network 7760378d1f2SniklasIf the ID-type is 777e407932bSjmc.Li IPV4_ADDR_SUBNET 778d8ca7c44Shoor 779ffa2dcb0Sjmc.Li IPV6_ADDR_SUBNET , 780e407932bSjmcthis tag should exist and be a network address, an interface, or the 781e407932bSjmc.Em default 782e407932bSjmckeyword. 783e407932bSjmcWhen an interface is specified, the network is selected as with the 784e407932bSjmc.Em Address 785e407932bSjmctag. 7860378d1f2Sniklas.It Em Port 7870378d1f2SniklasIf the ID-type is 788d8ca7c44Sho.Li IPV4_ADDR , 7890378d1f2Sniklas.Li IPV4_ADDR_SUBNET , 790ffa2dcb0Sjmc.Li IPV6_ADDR , 791d8ca7c44Shoor 792ffa2dcb0Sjmc.Li IPV6_ADDR_SUBNET , 7930378d1f2Sniklasthis tag indicates what source or destination port is allowed to be 7940378d1f2Sniklastransported over the SA (depending on whether this is a local or 7950378d1f2Sniklasremote ID). 7960378d1f2SniklasIf left unspecified, all ports of the given transport protocol 7970378d1f2Sniklaswill be transmitted (or permitted) over the SA. 798ffa2dcb0SjmcThe 799ffa2dcb0Sjmc.Em Protocol 800ffa2dcb0Sjmctag must be specified in conjunction with this tag. 801e407932bSjmc.It Em Protocol 802e407932bSjmcIf the ID-type is 803e407932bSjmc.Li IPV4_ADDR , 804e407932bSjmc.Li IPV4_ADDR_SUBNET , 805e407932bSjmc.Li IPV6_ADDR , 806e407932bSjmcor 807e407932bSjmc.Li IPV6_ADDR_SUBNET , 808e407932bSjmcthis tag indicates what transport protocol should be transmitted over 809e407932bSjmcthe SA. 810e407932bSjmcIf left unspecified, all transport protocols between the two address 811e407932bSjmc(ranges) will be sent (or permitted) over that SA. 812c5fe6c4eSniklas.El 813c5fe6c4eSniklas.El 814ffa2dcb0Sjmc.Sh OTHER SECTIONS 815ffa2dcb0Sjmc.Bl -hang -width 8n 816ffa2dcb0Sjmc.It Aq Sy IKECFG-ID 8174eb3dd62SjmcParameters to use with IKE mode-config. 8184eb3dd62SjmcOne ID per peer. 8194ca71560Sho.Pp 8204ca71560ShoAn IKECFG-ID is written as [<ID-type>/<name>]. 8214ca71560ShoThe following ID types are supported: 822ffa2dcb0Sjmc.Pp 823ffa2dcb0Sjmc.Bl -tag -width "ASN1_DNXX" -offset indent -compact 8244ca71560Sho.It IPv4 8254ca71560Sho[ipv4/A.B.C.D] 8264ca71560Sho.It IPv6 8274ca71560Sho[ipv6/abcd:abcd::ab:cd] 8284ca71560Sho.It FQDN 8294ca71560Sho[fqdn/foo.bar.org] 8304ca71560Sho.It UFQDN 8314ca71560Sho[ufqdn/user@foo.bar.org] 8324ca71560Sho.It ASN1_DN 8334ca71560Sho[asn1_dn//C=aa/O=cc/...] (Note the double slashes as the DN itself 8344eb3dd62Sjmcstarts with a 8354eb3dd62Sjmc.Sq / . ) 8364ca71560Sho.El 8374ca71560Sho.Pp 8384ca71560ShoEach section specifies what configuration values to return to the peer 8394eb3dd62Sjmcrequesting IKE mode-config. 8404eb3dd62SjmcCurrently supported values are: 841ffa2dcb0Sjmc.Pp 842ffa2dcb0Sjmc.Bl -tag -width "WINS-serverXX" -offset indent -compact 8434ca71560Sho.It Em Address 8444ca71560ShoThe peer's network address. 8454ca71560Sho.It Em Netmask 8464ca71560ShoThe peer's netmask. 8474ca71560Sho.It Em Nameserver 8484ca71560ShoThe IP address of a DNS nameserver. 8494ca71560Sho.It Em WINS-server 8504ca71560ShoThe IP address of a WINS server. 8514ca71560Sho.El 852ffa2dcb0Sjmc.It Aq Sy Initiator-ID 853c00f6aafSjmcParameters for peer initiator configuration 854106cbd59Smarkus.Pp 855106cbd59SmarkusDuring phase 1 negotiation 856ffa2dcb0Sjmc.Xr isakmpd 8 857ffa2dcb0Sjmclooks for a pre-shared key in the 858ffa2dcb0Sjmc.Aq Sy ISAKMP-peer 859ffa2dcb0Sjmcsection. 860106cbd59SmarkusIf no Authentication data is specified in that section, and 861ffa2dcb0Sjmc.Xr isakmpd 8 862106cbd59Smarkusis not the initiator, it looks for Authentication data in a section named after 863106cbd59Smarkusthe initiator's phase 1 ID. 864106cbd59SmarkusThis allows mobile users with dynamic IP addresses 865106cbd59Smarkusto have different shared secrets. 866106cbd59Smarkus.Pp 867106cbd59SmarkusThis only works for aggressive mode because in main mode the remote 868106cbd59Smarkusinitiator ID would not yet be known. 869830c32f9ShshoexerNote, however, that use of aggressive mode is discouraged. 870830c32f9ShshoexerSee 871ffa2dcb0Sjmc.Sx CAVEATS , 872ffa2dcb0Sjmcbelow. 873106cbd59Smarkus.Pp 874ffa2dcb0SjmcThe name of the 875ffa2dcb0Sjmc.Aq Sy Initiator-ID 876ffa2dcb0Sjmcsection depends on the ID type sent by the initiator. 877106cbd59SmarkusCurrently this can be: 878ffa2dcb0Sjmc.Pp 879ffa2dcb0Sjmc.Bl -tag -width "UFQDNXX" -offset indent -compact 880106cbd59Smarkus.It IPv4 881106cbd59Smarkus[A.B.C.D] 882106cbd59Smarkus.It IPv6 883106cbd59Smarkus[abcd:abcd::ab:cd] 884106cbd59Smarkus.It FQDN 885106cbd59Smarkus[foo.bar.org] 886106cbd59Smarkus.It UFQDN 887106cbd59Smarkus[user@foo.bar.org] 888106cbd59Smarkus.El 8894ca71560Sho.El 8902b65e200Sjmc.Sh FILES 8912b65e200Sjmc.Bl -tag -width /etc/isakmpd/isakmpd.conf 8922b65e200Sjmc.It Pa /etc/isakmpd/isakmpd.conf 8932b65e200SjmcThe default 894ffa2dcb0Sjmc.Xr isakmpd 8 8952b65e200Sjmcconfiguration file. 8962b65e200Sjmc.It Pa /usr/share/ipsec/isakmpd/ 8972b65e200SjmcA directory containing some sample 898ffa2dcb0Sjmc.Xr isakmpd 8 8992b65e200Sjmcconfiguration files. 9002b65e200Sjmc.El 90100b2ba71Saaron.Sh EXAMPLES 9022040585eSniklasAn example of a configuration file: 9032040585eSniklas.Bd -literal 9042040585eSniklas# A configuration sample for the isakmpd ISAKMP/Oakley (aka IKE) daemon. 9052040585eSniklas 9062040585eSniklas[General] 907c5fe6c4eSniklasListen-on= 10.1.0.2 9082040585eSniklas 909c5fe6c4eSniklas# Incoming phase 1 negotiations are multiplexed on the source IP address 9102b81057dSniklas[Phase 1] 911c5fe6c4eSniklas10.1.0.1= ISAKMP-peer-west 9122b81057dSniklas 913c5fe6c4eSniklas# These connections are walked over after config file parsing and told 914c5fe6c4eSniklas# to the application layer so that it will inform us when traffic wants to 91552250141Smoritz# pass over them. This means we can do on-demand keying. 916c5fe6c4eSniklas[Phase 2] 917c5fe6c4eSniklasConnections= IPsec-east-west 918c5fe6c4eSniklas 919cc3c8b42Sniklas# Default values are commented out. 920c5fe6c4eSniklas[ISAKMP-peer-west] 9212b81057dSniklasPhase= 1 922cc3c8b42Sniklas#Transport= udp 923f6dd85a7SniklasLocal-address= 10.1.0.2 9242b81057dSniklasAddress= 10.1.0.1 9252b81057dSniklas#Port= isakmp 9262b81057dSniklas#Port= 500 92735ff0956Sho#Configuration= Default-phase-1-configuration 9282b81057dSniklasAuthentication= mekmitasdigoat 929cc3c8b42Sniklas#Flags= 9302b81057dSniklas 931c5fe6c4eSniklas[IPsec-east-west] 9322b81057dSniklasPhase= 2 933c5fe6c4eSniklasISAKMP-peer= ISAKMP-peer-west 9342b81057dSniklasConfiguration= Default-quick-mode 935c5fe6c4eSniklasLocal-ID= Net-east 936c5fe6c4eSniklasRemote-ID= Net-west 937cc3c8b42Sniklas#Flags= 9382b81057dSniklas 939c5fe6c4eSniklas[Net-west] 9402b81057dSniklasID-type= IPV4_ADDR_SUBNET 9412b81057dSniklasNetwork= 192.168.1.0 9422b81057dSniklasNetmask= 255.255.255.0 9432b81057dSniklas 944c5fe6c4eSniklas[Net-east] 9452b81057dSniklasID-type= IPV4_ADDR_SUBNET 9462b81057dSniklasNetwork= 192.168.2.0 9472b81057dSniklasNetmask= 255.255.255.0 9482b81057dSniklas 94952e712aeSniklas# Quick mode descriptions 95052e712aeSniklas 95152e712aeSniklas[Default-quick-mode] 95252e712aeSniklasEXCHANGE_TYPE= QUICK_MODE 9531a87c1a3ShoSuites= QM-ESP-3DES-SHA-PFS-SUITE,QM-ESP-AES-SHA-PFS-SUITE 95452e712aeSniklas 9554ca71560Sho# Data for an IKE mode-config peer 9564ca71560Sho[asn1_dn//C=SE/L=SomeCity/O=SomeCompany/CN=SomePeer.company.com] 9574ca71560ShoAddress= 192.168.1.123 9584ca71560ShoNetmask= 255.255.255.0 9594ca71560ShoNameserver= 192.168.1.10 9604ca71560ShoWINS-server= 192.168.1.11 9614ca71560Sho 962106cbd59Smarkus# pre-shared key based on initiator's phase 1 ID 963106cbd59Smarkus[foo.bar.org] 964106cbd59SmarkusAuthentication= mekmitasdigoat 965106cbd59Smarkus 96652e712aeSniklas# 96752e712aeSniklas# ##################################################################### 96844143af3Sderaadt# All configuration data below this point is not required as the example 96952e712aeSniklas# uses the predefined Main Mode transform and Quick Mode suite names. 97052e712aeSniklas# It is included here for completeness. Note the default values for the 97152e712aeSniklas# [General] and [X509-certificates] sections just below. 97252e712aeSniklas# ##################################################################### 97352e712aeSniklas# 97452e712aeSniklas 97552e712aeSniklas[General] 976447a9f3aShoPolicy-file= /etc/isakmpd/isakmpd.policy 97752e712aeSniklasRetransmits= 3 97852e712aeSniklasExchange-max-time= 120 97952e712aeSniklas 980b57b191eSniklas# KeyNote credential storage 981b57b191eSniklas[KeyNote] 982b57b191eSniklasCredential-directory= /etc/isakmpd/keynote/ 983b57b191eSniklas 984fb1921ccSniklas# Certificates stored in PEM format 985fb1921ccSniklas[X509-certificates] 986fb1921ccSniklasCA-directory= /etc/isakmpd/ca/ 987fb1921ccSniklasCert-directory= /etc/isakmpd/certs/ 9889dbe9fb4ShoCRL-directory= /etc/isakmpd/crls/ 989954b1b31SniklasPrivate-key= /etc/isakmpd/private/local.key 990fb1921ccSniklas 991419caefeSho# Default phase 1 description (Main Mode) 992419caefeSho 99335ff0956Sho[Default-phase-1-configuration] 994419caefeShoEXCHANGE_TYPE= ID_PROT 995419caefeShoTransforms= 3DES-SHA 996419caefeSho 9972b81057dSniklas# Main mode transforms 9982b81057dSniklas###################### 9992b81057dSniklas 10002b81057dSniklas# DES 10012040585eSniklas 10022040585eSniklas[DES-MD5] 10032040585eSniklasENCRYPTION_ALGORITHM= DES_CBC 10042040585eSniklasHASH_ALGORITHM= MD5 10052040585eSniklasAUTHENTICATION_METHOD= PRE_SHARED 10062039fcadShoGROUP_DESCRIPTION= MODP_1024 100760f440ccShoLife= Default-phase-1-lifetime 10082040585eSniklas 10092b81057dSniklas[DES-SHA] 10102b81057dSniklasENCRYPTION_ALGORITHM= DES_CBC 10112b81057dSniklasHASH_ALGORITHM= SHA 10122b81057dSniklasAUTHENTICATION_METHOD= PRE_SHARED 101360f440ccShoGROUP_DESCRIPTION= MODP_1024 101460f440ccShoLife= Default-phase-1-lifetime 10152b81057dSniklas 10162b81057dSniklas# 3DES 10172b81057dSniklas 10182b81057dSniklas[3DES-SHA] 10192b81057dSniklasENCRYPTION_ALGORITHM= 3DES_CBC 10202040585eSniklasHASH_ALGORITHM= SHA 10212040585eSniklasAUTHENTICATION_METHOD= PRE_SHARED 10222040585eSniklasGROUP_DESCRIPTION= MODP_1024 102360f440ccShoLife= Default-phase-1-lifetime 10242b81057dSniklas 1025a806508bShshoexer# AES 1026a806508bShshoexer 1027a806508bShshoexer[AES-SHA] 1028a806508bShshoexerENCRYPTION_ALGORITHM= AES_CBC 1029a806508bShshoexerKEY_LENGTH= 128,128:256 1030a806508bShshoexerHASH_ALGORITHM= SHA 1031a806508bShshoexerAUTHENTICATION_METHOD= PRE_SHARED 1032a806508bShshoexerGROUP_DESCRIPTION= MODP_1024 1033a806508bShshoexerLife= Default-phase-1-lifetime 1034a806508bShshoexer 10352b81057dSniklas# Blowfish 10362b81057dSniklas 103760f440ccSho[BLF-SHA] 10382b81057dSniklasENCRYPTION_ALGORITHM= BLOWFISH_CBC 10392b81057dSniklasKEY_LENGTH= 128,96:192 10402b81057dSniklasHASH_ALGORITHM= SHA 10412b81057dSniklasAUTHENTICATION_METHOD= PRE_SHARED 10422b81057dSniklasGROUP_DESCRIPTION= MODP_1024 104360f440ccShoLife= Default-phase-1-lifetime 10442040585eSniklas 104560f440ccSho# Blowfish, using DH group 4 (non-default) 10462040585eSniklas[BLF-SHA-EC185] 1047d70ca5f7SniklasENCRYPTION_ALGORITHM= BLOWFISH_CBC 10482b81057dSniklasKEY_LENGTH= 128,96:192 10492040585eSniklasHASH_ALGORITHM= SHA 10502040585eSniklasAUTHENTICATION_METHOD= PRE_SHARED 10512040585eSniklasGROUP_DESCRIPTION= EC2N_185 105260f440ccShoLife= Default-phase-1-lifetime 10532040585eSniklas 10542b81057dSniklas# Quick mode protection suites 10552b81057dSniklas############################## 10562b81057dSniklas 10572b81057dSniklas# DES 10582040585eSniklas 1059d70ca5f7Sniklas[QM-ESP-DES-SUITE] 1060d70ca5f7SniklasProtocols= QM-ESP-DES 1061d70ca5f7Sniklas 10622b81057dSniklas[QM-ESP-DES-PFS-SUITE] 10632b81057dSniklasProtocols= QM-ESP-DES-PFS 10642b81057dSniklas 10652040585eSniklas[QM-ESP-DES-MD5-SUITE] 10662040585eSniklasProtocols= QM-ESP-DES-MD5 10672040585eSniklas 10682b81057dSniklas[QM-ESP-DES-MD5-PFS-SUITE] 10692b81057dSniklasProtocols= QM-ESP-DES-MD5-PFS 10702040585eSniklas 10712b81057dSniklas[QM-ESP-DES-SHA-SUITE] 10722b81057dSniklasProtocols= QM-ESP-DES-SHA 10732040585eSniklas 10742b81057dSniklas[QM-ESP-DES-SHA-PFS-SUITE] 10752b81057dSniklasProtocols= QM-ESP-DES-SHA-PFS 10762040585eSniklas 10772b81057dSniklas# 3DES 10782b81057dSniklas 10792b81057dSniklas[QM-ESP-3DES-SHA-SUITE] 10802b81057dSniklasProtocols= QM-ESP-3DES-SHA 10812b81057dSniklas 10822b81057dSniklas[QM-ESP-3DES-SHA-PFS-SUITE] 10832b81057dSniklasProtocols= QM-ESP-3DES-SHA-PFS 10842b81057dSniklas 1085bfc24386Sniklas# AES 1086bfc24386Sniklas 1087bfc24386Sniklas[QM-ESP-AES-SHA-SUITE] 1088bfc24386SniklasProtocols= QM-ESP-AES-SHA 1089bfc24386Sniklas 109060f440ccSho[QM-ESP-AES-SHA-PFS-SUITE] 1091bfc24386SniklasProtocols= QM-ESP-AES-SHA-PFS 1092bfc24386Sniklas 10932b81057dSniklas# AH 10942b81057dSniklas 10952b81057dSniklas[QM-AH-MD5-SUITE] 10962b81057dSniklasProtocols= QM-AH-MD5 10972b81057dSniklas 10982b81057dSniklas[QM-AH-MD5-PFS-SUITE] 10992b81057dSniklasProtocols= QM-AH-MD5-PFS 11002b81057dSniklas 110160f440ccSho# AH + ESP (non-default) 11022040585eSniklas 11032040585eSniklas[QM-AH-MD5-ESP-DES-SUITE] 11042040585eSniklasProtocols= QM-AH-MD5,QM-ESP-DES 11052040585eSniklas 11062b81057dSniklas[QM-AH-MD5-ESP-DES-MD5-SUITE] 11072b81057dSniklasProtocols= QM-AH-MD5,QM-ESP-DES-MD5 11082040585eSniklas 11092b81057dSniklas[QM-ESP-DES-MD5-AH-MD5-SUITE] 11102b81057dSniklasProtocols= QM-ESP-DES-MD5,QM-AH-MD5 11112b81057dSniklas 11122b81057dSniklas# Quick mode protocols 11132b81057dSniklas 11142b81057dSniklas# DES 11152040585eSniklas 11162040585eSniklas[QM-ESP-DES] 11172040585eSniklasPROTOCOL_ID= IPSEC_ESP 11182040585eSniklasTransforms= QM-ESP-DES-XF 11192040585eSniklas 11202b81057dSniklas[QM-ESP-DES-MD5] 11212b81057dSniklasPROTOCOL_ID= IPSEC_ESP 11222b81057dSniklasTransforms= QM-ESP-DES-MD5-XF 11232b81057dSniklas 11242b81057dSniklas[QM-ESP-DES-MD5-PFS] 11252b81057dSniklasPROTOCOL_ID= IPSEC_ESP 11262b81057dSniklasTransforms= QM-ESP-DES-MD5-PFS-XF 11272b81057dSniklas 11282b81057dSniklas[QM-ESP-DES-SHA] 11292b81057dSniklasPROTOCOL_ID= IPSEC_ESP 11302b81057dSniklasTransforms= QM-ESP-DES-SHA-XF 11312b81057dSniklas 11322b81057dSniklas# 3DES 11332b81057dSniklas 11342b81057dSniklas[QM-ESP-3DES-SHA] 11352b81057dSniklasPROTOCOL_ID= IPSEC_ESP 11362b81057dSniklasTransforms= QM-ESP-3DES-SHA-XF 11372b81057dSniklas 11382b81057dSniklas[QM-ESP-3DES-SHA-PFS] 11392b81057dSniklasPROTOCOL_ID= IPSEC_ESP 11402b81057dSniklasTransforms= QM-ESP-3DES-SHA-PFS-XF 11412b81057dSniklas 11422b81057dSniklas[QM-ESP-3DES-SHA-TRP] 11432b81057dSniklasPROTOCOL_ID= IPSEC_ESP 11442b81057dSniklasTransforms= QM-ESP-3DES-SHA-TRP-XF 11452b81057dSniklas 1146bfc24386Sniklas# AES 1147bfc24386Sniklas 1148bfc24386Sniklas[QM-ESP-AES-SHA] 1149bfc24386SniklasPROTOCOL_ID= IPSEC_ESP 1150bfc24386SniklasTransforms= QM-ESP-AES-SHA-XF 1151bfc24386Sniklas 1152bfc24386Sniklas[QM-ESP-AES-SHA-PFS] 1153bfc24386SniklasPROTOCOL_ID= IPSEC_ESP 1154bfc24386SniklasTransforms= QM-ESP-AES-SHA-PFS-XF 1155bfc24386Sniklas 1156bfc24386Sniklas[QM-ESP-AES-SHA-TRP] 1157bfc24386SniklasPROTOCOL_ID= IPSEC_ESP 1158bfc24386SniklasTransforms= QM-ESP-AES-SHA-TRP-XF 1159bfc24386Sniklas 11602b81057dSniklas# AH MD5 11612b81057dSniklas 11622b81057dSniklas[QM-AH-MD5] 11632b81057dSniklasPROTOCOL_ID= IPSEC_AH 11642b81057dSniklasTransforms= QM-AH-MD5-XF 11652b81057dSniklas 11662b81057dSniklas[QM-AH-MD5-PFS] 11672b81057dSniklasPROTOCOL_ID= IPSEC_AH 11682b81057dSniklasTransforms= QM-AH-MD5-PFS-XF 11692b81057dSniklas 11702b81057dSniklas# Quick mode transforms 11712b81057dSniklas 11722b81057dSniklas# ESP DES+MD5 11732b81057dSniklas 11742040585eSniklas[QM-ESP-DES-XF] 11752040585eSniklasTRANSFORM_ID= DES 11762040585eSniklasENCAPSULATION_MODE= TUNNEL 117760f440ccShoLife= Default-phase-2-lifetime 11782040585eSniklas 11792b81057dSniklas[QM-ESP-DES-MD5-XF] 11802b81057dSniklasTRANSFORM_ID= DES 11812b81057dSniklasENCAPSULATION_MODE= TUNNEL 11822b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_MD5 118360f440ccShoLife= Default-phase-2-lifetime 11842b81057dSniklas 11852b81057dSniklas[QM-ESP-DES-MD5-PFS-XF] 11862b81057dSniklasTRANSFORM_ID= DES 11872b81057dSniklasENCAPSULATION_MODE= TUNNEL 11882039fcadShoGROUP_DESCRIPTION= MODP_1024 11892b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_MD5 119060f440ccShoLife= Default-phase-2-lifetime 11912b81057dSniklas 11922b81057dSniklas[QM-ESP-DES-SHA-XF] 11932b81057dSniklasTRANSFORM_ID= DES 11942b81057dSniklasENCAPSULATION_MODE= TUNNEL 11952b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 119660f440ccShoLife= Default-phase-2-lifetime 11972b81057dSniklas 11982b81057dSniklas# 3DES 11992b81057dSniklas 12002b81057dSniklas[QM-ESP-3DES-SHA-XF] 12012b81057dSniklasTRANSFORM_ID= 3DES 12022b81057dSniklasENCAPSULATION_MODE= TUNNEL 12032b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 120460f440ccShoLife= Default-phase-2-lifetime 12052b81057dSniklas 12062b81057dSniklas[QM-ESP-3DES-SHA-PFS-XF] 12072b81057dSniklasTRANSFORM_ID= 3DES 12082b81057dSniklasENCAPSULATION_MODE= TUNNEL 12092b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 12102b81057dSniklasGROUP_DESCRIPTION= MODP_1024 121160f440ccShoLife= Default-phase-2-lifetime 12122b81057dSniklas 12132b81057dSniklas[QM-ESP-3DES-SHA-TRP-XF] 12142b81057dSniklasTRANSFORM_ID= 3DES 12152b81057dSniklasENCAPSULATION_MODE= TRANSPORT 12162b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 121760f440ccShoLife= Default-phase-2-lifetime 12182b81057dSniklas 1219bfc24386Sniklas# AES 1220bfc24386Sniklas 1221bfc24386Sniklas[QM-ESP-AES-SHA-XF] 1222bfc24386SniklasTRANSFORM_ID= AES 1223bfc24386SniklasENCAPSULATION_MODE= TUNNEL 1224bfc24386SniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 1225a806508bShshoexerKEY_LENGTH= 128 122660f440ccShoLife= Default-phase-2-lifetime 1227bfc24386Sniklas 1228bfc24386Sniklas[QM-ESP-AES-SHA-PFS-XF] 1229bfc24386SniklasTRANSFORM_ID= AES 1230bfc24386SniklasENCAPSULATION_MODE= TUNNEL 1231bfc24386SniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 1232bfc24386SniklasGROUP_DESCRIPTION= MODP_1024 1233a806508bShshoexerKEY_LENGTH= 128 123460f440ccShoLife= Default-phase-2-lifetime 1235bfc24386Sniklas 1236bfc24386Sniklas[QM-ESP-AES-SHA-TRP-XF] 1237bfc24386SniklasTRANSFORM_ID= AES 1238bfc24386SniklasENCAPSULATION_MODE= TRANSPORT 1239bfc24386SniklasAUTHENTICATION_ALGORITHM= HMAC_SHA 1240a806508bShshoexerKEY_LENGTH= 128 124160f440ccShoLife= Default-phase-2-lifetime 1242bfc24386Sniklas 12432b81057dSniklas# AH 12442b81057dSniklas 12452b81057dSniklas[QM-AH-MD5-XF] 12462b81057dSniklasTRANSFORM_ID= MD5 12472b81057dSniklasENCAPSULATION_MODE= TUNNEL 12482b81057dSniklasAUTHENTICATION_ALGORITHM= HMAC_MD5 124960f440ccShoLife= Default-phase-2-lifetime 12502b81057dSniklas 12512b81057dSniklas[QM-AH-MD5-PFS-XF] 12522b81057dSniklasTRANSFORM_ID= MD5 12532b81057dSniklasENCAPSULATION_MODE= TUNNEL 12542039fcadShoGROUP_DESCRIPTION= MODP_1024 125560f440ccShoLife= Default-phase-2-lifetime 12562b81057dSniklas 125760f440ccSho[Sample-Life-Time] 12582b81057dSniklasLIFE_TYPE= SECONDS 12592b81057dSniklasLIFE_DURATION= 3600,1800:7200 12602b81057dSniklas 126160f440ccSho[Sample-Life-Volume] 12622b81057dSniklasLIFE_TYPE= KILOBYTES 12632b81057dSniklasLIFE_DURATION= 1000,768:1536 12642040585eSniklas.Ed 12652040585eSniklas.Sh SEE ALSO 1266b57b191eSniklas.Xr keynote 1 , 1267ffa2dcb0Sjmc.Xr openssl 1 , 1268dc89b21eSfgsch.Xr ipsec 4 , 126930a2652aSniklas.Xr keynote 4 , 127077725688Sniklas.Xr isakmpd.policy 5 , 127110f11e23Sjmc.Xr isakmpd 8 1272830c32f9Shshoexer.Sh CAVEATS 1273830c32f9ShshoexerUsing aggressive mode is discouraged due to various design problems. 1274830c32f9ShshoexerIf your peer only supports aggressive mode, please consider replacing that 1275830c32f9Shshoexerpeer with a sane ISAKMP/IKE implementation. 1276830c32f9ShshoexerFor details see 1277830c32f9Shshoexer.Pa http://www.usenix.org/publications/login/1999-12/features/harmful.html . 1278d7401508Sho.Sh BUGS 1279d7401508ShoThe RFCs do not permit differing DH groups in the same proposal for 1280d7401508Shoaggressive and quick mode exchanges. 1281d7401508ShoMixing both PFS and non-PFS suites in a quick mode proposal is not possible, 1282d7401508Shoas PFS implies using a DH group. 1283