1 .\" $Id: racoon.conf.5,v 1.27.2.12 2005/11/25 16:06:32 manubsd Exp $
3 .\" Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
4 .\" All rights reserved.
6 .\" Redistribution and use in source and binary forms, with or without
7 .\" modification, are permitted provided that the following conditions
9 .\" 1. Redistributions of source code must retain the above copyright
10 .\" notice, this list of conditions and the following disclaimer.
11 .\" 2. Redistributions in binary form must reproduce the above copyright
12 .\" notice, this list of conditions and the following disclaimer in the
13 .\" documentation and/or other materials provided with the distribution.
14 .\" 3. Neither the name of the project nor the names of its contributors
15 .\" may be used to endorse or promote products derived from this software
16 .\" without specific prior written permission.
18 .\" THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
19 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
22 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 .Nd configuration file for racoon
42 is the configuration file for the
46 negotiates security associations for itself (ISAKMP SA, or phase 1 SA)
47 and for kernel IPsec (IPsec SA, or phase 2 SA).
48 The file consists of a sequence of directives and statements.
49 Each directive is composed by a tag and statements, enclosed by
58 Keywords and special characters that the parser expects exactly are
62 Parameters are specified with
71 are used to show optional keywords and parameters.
73 you have to pay attention when this manual is describing
78 number is always enclosed by
82 In this case, the port number is not an optional keyword.
83 If it is possible to omit the
86 the expression becomes
91 a choice between optional parameters.
98 are used to group keywords and parameters when necessary.
99 Major parameters are listed below.
101 .Bl -tag -width addressx -compact
103 means a hexadecimal or a decimal number.
104 The former must be prefixed with
109 means any string enclosed in
113 means IPv6 and/or IPv4 address.
115 means a TCP/UDP port number.
116 The port number is always enclosed by
122 .Ic sec , secs , second , seconds ,
123 .Ic min , mins , minute , minutes ,
127 .Ss Privilege separation
128 .Bl -tag -width Ds -compact
129 .It Ic privsep { Ar statements Ic }
130 specifies privilege separation parameters.
131 When enabled, these enable
133 to operate with an unprivileged instance doing most of the work, while
134 a privileged instance takes care of performing the following operations
135 as root: reading PSK and private keys, launching hook scripts, and
136 validating passwords against system databases or against PAM.
138 .Bl -tag -width Ds -compact
139 .It Ic user Ar user ;
140 The user to which the unprivileged instance of
143 This can be a quoted user name or a numeric UID.
144 .It Ic group Ar group ;
145 The group to which the unprivileged instance of
148 This can be a quoted group name or a numeric GID.
149 .It Ic chroot Ar path ;
150 A directory to which the unprivileged instance of
154 This directory should hold a tree where the following files must be
156 .Bl -tag -width Ds -compact
160 .It the file containing the Xauth banner
163 The PSK file, the private keys, and the hook scripts are accessed through the
164 privileged instance of
166 and do not need to be reachable in the
171 .Ss Path Specification
172 This section specify various paths used by racoon.
173 When running in privilege separation mode,
178 .Bl -tag -width Ds -compact
179 .It Ic path include Ar path ;
180 specifies a path to include a file.
183 .It Ic path pre_shared_key Ar file ;
184 specifies a file containing pre-shared key(s) for various ID(s).
186 .Sx Pre-shared key File .
187 .It Ic path certificate Ar path ;
189 will search this directory if a certificate or certificate request is received.
190 If you run with privilege separation,
192 will refuse to use a certificate stored outside of this directory.
193 .It Ic path backupsa Ar file ;
194 specifies a file to which SA information which is negotiated by
195 racoon should be stored.
197 will install SA(s) from the file when started with the
200 The file is growing because
202 simply adds SAs to it.
203 You should maintain the file manually.
204 .It Ic path script Ar path ;
206 will search this directory for scripts hooks.
207 If you run with privilege separation,
209 will refuse to execute a script stored outside of this directory.
210 .It Ic path pidfile Ar file ;
211 specifies file where to store PID of process.
215 an absolute path, otherwise relative to VARRUN directory specified at
219 .It Ic path logfile Ar file ;
220 specifies log file path.
224 .Bl -tag -width Ds -compact
225 .It Ic include Ar file
226 other configuration files can be included.
229 .Ss Identifier Specification
231 It must be defined at each
235 .Ss Timer Specification
236 .Bl -tag -width Ds -compact
237 .It Ic timer { Ar statements Ic }
238 specifies various timer values.
240 .Bl -tag -width Ds -compact
241 .It Ic counter Ar number ;
242 the maximum number of retries to send.
244 .It Ic interval Ar number Ar timeunit ;
245 the interval to resend, in seconds.
246 The default time is 10 seconds.
247 .It Ic persend Ar number ;
248 the number of packets per send.
250 .It Ic phase1 Ar number Ar timeunit ;
251 the maximum time it should take to complete phase 1.
252 The default time is 15 seconds.
253 .It Ic phase2 Ar number Ar timeunit ;
254 the maximum time it should take to complete phase 2.
255 The default time is 10 seconds.
256 .It Ic natt_keepalive Ar number Ar timeunit ;
257 interval between sending NAT-Traversal keep-alive packets.
258 The default time is 20 seconds.
259 Set to 0s to disable keep-alive packets.
263 .Ss Listening Port Specification
264 .Bl -tag -width Ds -compact
265 .It Ic listen { Ar statements Ic }
268 directive is specified,
270 will listen on all available interface addresses.
271 The following is the list of valid statements:
273 .Bl -tag -width Ds -compact
274 .\" How do I express bold brackets; `[' and `]' .
275 .\" Answer: For bold brackets, do "Ic \&[ foo \&]".
276 .\" Is the "Bq Ic [ Ar port ] ;" buggy ?
277 .It Ic isakmp Ar address Bq Bq Ar port ;
278 If this is specified,
282 The default port is 500, which is specified by IANA.
283 You can provide more than one address definition.
284 .It Ic isakmp_natt Ar address Bq Ar port ;
287 but also sets the socket options to accept UDP-encapsulated ESP traffic for
289 If you plan to use NAT-T, you should provide at least one address
290 with port 4500, which is specified by IANA.
292 .It Ic strict_address ;
293 require that all addresses for ISAKMP must be bound.
294 This statement will be ignored if you do not specify any address.
298 section can also be used to specify the admin socket mode and ownership,
299 if racoon was built with support for admin port.
300 .Bl -tag -width Ds -compact
301 .It Ic adminsock Ar path Op Ar owner\ group\ mode ;
306 are the socket path, owner, and group; they must be quoted.
308 .Pa /var/racoon/racoon.sock ,
311 is the access mode in octal, default is 0600.
312 .It Ic adminsock disabled ;
313 This directive tells racoon to not listen on the admin socket.
317 .Ss Miscellaneous Global Parameters
318 .Bl -tag -width Ds -compact
319 .It Ic gss_id_enc Ar enctype ;
322 used ISO-Latin-1 as the encoding of the GSS-API identifier attribute.
323 For interoperability with Microsoft Windows' GSS-API authentication
324 scheme, the default encoding has been changed to UTF-16LE.
329 to be configured to use the old encoding for compatibility with existing
332 The following are valid values for
335 .Bl -tag -width Ds -compact
337 Use UTF-16LE to encode the GSS-API identifier attribute.
338 This is the default encoding.
339 This encoding is compatible with Microsoft Windows.
341 Use ISO-Latin-1 to encode the GSS-API identifier attribute.
342 This is the encoding used by older versions of
347 .Ss Remote Nodes Specifications
348 .Bl -tag -width Ds -compact
350 .Ic remote ( Ar address | Ic anonymous )
352 .Bq Ic inherit Ar parent
353 .Ic { Ar statements Ic }
355 specifies the parameters for IKE phase 1 for each remote node.
356 The default port is 500.
359 is specified, the statements apply to all peers which do not match
365 .Ic inherit Ar parent
372 have all values predefined to those of a given
374 In these sections it is enough to redefine only the changed parameters.
376 The following are valid statements.
378 .Bl -tag -width Ds -compact
380 .It Ic exchange_mode ( main | aggressive | base ) ;
381 defines the exchange mode for phase 1 when racoon is the initiator.
382 It also means the acceptable exchange mode when racoon is responder.
383 More than one mode can be specified by separating them with a comma.
384 All of the modes are acceptable.
385 The first exchange mode is what racoon uses when it is the initiator.
387 .It Ic doi Ic ipsec_doi ;
388 means to use IPsec DOI as specified in RFC 2407.
389 You can omit this statement.
391 .It Ic situation Ic identity_only ;
392 means to use SIT_IDENTITY_ONLY as specified in RFC 2407.
393 You can omit this statement.
395 .It Ic identifier Ar idtype ;
400 .It Ic my_identifier Ar idtype ... ;
401 specifies the identifier sent to the remote host
402 and the type to use in the phase 1 negotiation.
403 .Ic address, fqdn , user_fqdn , keyid ,
408 Use them in the following way:
409 .Bl -tag -width Ds -compact
410 .It Ic my_identifier Ic address Bq Ar address ;
411 the type is the IP address.
412 This is the default type if you do not specify an identifier to use.
413 .It Ic my_identifier Ic user_fqdn Ar string ;
414 the type is a USER_FQDN (user fully-qualified domain name).
415 .It Ic my_identifier Ic fqdn Ar string ;
416 the type is a FQDN (fully-qualified domain name).
417 .It Ic my_identifier Ic keyid Ar file ;
418 the type is a KEY_ID.
419 .It Ic my_identifier Ic asn1dn Bq Ar string ;
420 the type is an ASN.1 distinguished name.
425 will get the DN from the Subject field in the certificate.
428 .It Ic xauth_login Bq Ar string ;
429 specifies the login to use in client-side Hybrid authentication.
430 It is available only if
432 has been built with this option.
433 The associated password is looked up in the pre-shared key files,
438 .It Ic peers_identifier Ar idtype ... ;
439 specifies the peer's identifier to be received.
440 If it is not defined then
442 will not verify the peer's identifier in ID payload transmitted from the peer.
443 If it is defined, the behavior of the verification depends on the flag of
444 .Ic verify_identifier .
449 except that the individual component values of an
451 identifier may specified as
453 to match any value (e.g. "C=XX, O=MyOrg, OU=*, CN=Mine").
454 Alternative acceptable peer identifiers may be specified by repeating the
458 .It Ic verify_identifier (on \(ba off) ;
459 If you want to verify the peer's identifier,
461 In this case, if the value defined by
463 is not the same as the peer's identifier in the ID payload,
464 the negotiation will failed.
467 .It Ic certificate_type Ar certspec ;
468 specifies a certificate specification.
470 is one of followings:
471 .Bl -tag -width Ds -compact
472 .It Ic x509 Ar certfile Ar privkeyfile ;
474 means a file name of a certificate.
476 means a file name of a secret key.
478 .It Ic ca_type Ar cacertspec ;
479 specifies a root certificate authority specification.
481 is one of followings:
482 .Bl -tag -width Ds -compact
483 .It Ic x509 Ar cacertfile ;
485 means a file name of the root certificate authority.
487 .Pa /etc/openssl/cert.pem
490 .It Ic mode_cfg (on \(ba off) ;
491 Gather network information through ISAKMP mode configuration.
494 .It Ic peers_certfile ( dnssec | Ar certfile ) ;
499 will ignore the CERT payload from the peer,
500 and try to get the peer's certificate from DNS instead.
505 will ignore the CERT payload from the peer,
506 and will use this certificate as the peer's certificate.
508 .It Ic script Ar script Ic phase1_up
509 .It Ic script Ar script Ic phase1_down
510 Shell scripts that get executed when a phase 1 SA goes up or down.
511 Both scripts get either
515 as first argument, and the following
516 variables are set in their environment:
517 .Bl -tag -width Ds -compact
519 The local address of the phase 1 SA.
521 The local port used for IKE for the phase 1 SA.
523 The remote address of the phase 1 SA.
525 The remote port used for IKE for the phase 1 SA.
527 The following variables are only set if
530 .Bl -tag -width Ds -compact
532 An IPv4 internal address obtained by ISAKMP mode config.
533 .It INTERNAL_NETMASK4
534 An IPv4 internal netmask obtained by ISAKMP mode config.
536 Internal DNS server IPv4 address obtained by ISAKMP mode config.
538 Internal WINS server IPv4 address obtained by ISAKMP mode config.
542 .It Ic send_cert (on \(ba off) ;
543 If you do not want to send a certificate for some reason, set this to off.
546 .It Ic send_cr (on \(ba off) ;
547 If you do not want to send a certificate request for some reason, set this to off.
550 .It Ic verify_cert (on \(ba off) ;
551 If you do not want to verify the peer's certificate for some reason,
555 .It Ic lifetime time Ar number Ar timeunit ;
556 Define a lifetime of a certain time
557 which will be proposed in the phase 1 negotiations.
558 Any proposal will be accepted, and the attribute(s) will be not proposed to
559 the peer if you do not specify it (them).
560 They can be individually specified in each proposal.
562 .It Ic ike_frag (on \(ba off) ;
563 Enable receiver-side IKE fragmentation, if
565 has been built with this feature.
566 This extension is there to work around
567 broken firewalls that do not work with fragmented UDP packets.
568 IKE fragmentation is always enabled on the sender-side, and
569 it is used if the peer advertises itself as IKE fragmentation capable.
571 .It Ic esp_frag Ar fraglen ;
572 This option is only relevant if you use NAT traversal in tunnel mode.
573 Its purpose is to work around broken DSL routers that reject UDP
574 fragments, by fragmenting the IP packets before ESP encapsulation.
575 The result is ESP over UDP of fragmented packets instead of fragmented
576 ESP over UDP packets (i.e., IP:UDP:ESP:frag(IP) instead of
577 frag(IP:UDP:ESP:IP)).
579 is the maximum size of the fragments.
580 552 should work anywhere,
583 is, the better is the performance.
585 Note that because PMTU discovery is broken on many sites, you will
586 have to use MSS clamping if you want TCP to work correctly.
588 .It Ic initial_contact (on \(ba off) ;
589 enable this to send an INITIAL-CONTACT message.
592 This message is useful only when
593 the implementation of the responder chooses an old SA when there are multiple
594 SAs with different established time, and the initiator reboots.
595 If racoon did not send the message,
596 the responder would use an old SA even when a new SA was established.
597 The KAME stack has the switch in the system wide value
598 net.key.preferred_oldsa.
599 when the value is zero, the stack always uses a new SA.
601 .It Ic passive (on \(ba off) ;
602 If you do not want to initiate the negotiation, set this to on.
605 It is useful for a server.
607 .It Ic proposal_check Ar level ;
608 specifies the action of lifetime length and PFS of the phase 2
609 selection on the responder side, and the action of lifetime check in
616 .Bl -tag -width Ds -compact
618 the responder will obey the initiator anytime.
620 If the responder's length is longer than the initiator's one, the
621 responder uses the initiator's one.
622 Otherwise it rejects the proposal.
623 If PFS is not required by the responder, the responder will obey the proposal.
624 If PFS is required by both sides and if the responder's group is not equal to
625 the initiator's one, then the responder will reject the proposal.
627 If the responder's length is longer than the initiator's one, the
628 responder will use the initiator's one.
629 If the responder's length is
630 shorter than the initiator's one, the responder uses its own length
631 AND sends a RESPONDER-LIFETIME notify message to an initiator in the
632 case of lifetime (phase 2 only).
633 For PFS, this directive behaves the same as
636 If the initiator's length is not equal to the responder's one, the
637 responder will reject the proposal.
638 If PFS is required by both sides and if the responder's group is not equal to
639 the initiator's one, then the responder will reject the proposal.
642 .It Ic support_proxy (on \(ba off) ;
643 If this value is set to on, then both values of ID payloads in the
644 phase 2 exchange are always used as the addresses of end-point of
648 .It Ic generate_policy (on \(ba off) ;
649 This directive is for the responder.
650 Therefore you should set
654 only becomes a responder.
655 If the responder does not have any policy in SPD during phase 2
656 negotiation, and the directive is set to on, then
658 will choose the first proposal in the
659 SA payload from the initiator, and generate policy entries from the proposal.
660 It is useful to negotiate with clients whose IP address is allocated
662 Note that an inappropriate policy might be installed into the responder's SPD
664 so other communications might fail if such policies are installed
665 due to a policy mismatch between the initiator and the responder.
666 This directive is ignored in the initiator case.
671 .It Ic nat_traversal (on \(ba off \(ba force) ;
672 This directive enables use of the NAT-Traversal IPsec extension
674 NAT-T allows one or both peers to reside behind a NAT gateway (i.e.,
675 doing address- or port-translation).
676 Presence of NAT gateways along the path
677 is discovered during phase 1 handshake and if found, NAT-T is negotiated.
678 When NAT-T is in charge, all ESP and AH packets of a given connection
679 are encapsulated into UDP datagrams (port 4500, by default).
681 .Bl -tag -width Ds -compact
683 NAT-T is used when a NAT gateway is detected between the peers.
685 NAT-T is not proposed/accepted.
688 NAT-T is used regardless if a NAT is detected between the peers or not.
690 Please note that NAT-T support is a compile-time option.
691 Although it is enabled in the source distribution by default, it
692 may not be available in your particular build.
693 In that case you will get a
694 warning when using any NAT-T related config options.
696 .It Ic dpd_delay Ar delay ;
697 This option activates the DPD and sets the time (in seconds) allowed
698 between 2 proof of liveness requests.
701 which disables DPD monitoring, but still negotiates DPD support.
703 .It Ic dpd_retry Ar delay ;
706 is set, this sets the delay (in seconds) to wait for a proof of
707 liveness before considering it as failed and send another request.
711 .It Ic dpd_maxfail Ar number ;
714 is set, this sets the maximum number of proof of liveness to request
715 (without reply) before considering the peer is dead.
719 .It Ic nonce_size Ar number ;
720 define the byte size of nonce value.
721 Racoon can send any value although
722 RFC2409 specifies that the value MUST be between 8 and 256 bytes.
723 The default size is 16 bytes.
726 .Ic proposal { Ar sub-substatements Ic }
728 .Bl -tag -width Ds -compact
730 .It Ic encryption_algorithm Ar algorithm ;
731 specify the encryption algorithm used for the phase 1 negotiation.
732 This directive must be defined.
735 .Ic des , 3des , blowfish , cast128 , aes
738 For other transforms, this statement should not be used.
740 .It Ic hash_algorithm Ar algorithm ;
741 define the hash algorithm used for the phase 1 negotiation.
742 This directive must be defined.
745 .Ic md5, sha1, sha256, sha384, sha512
748 .It Ic authentication_method Ar type ;
749 defines the authentication method used for the phase 1 negotiation.
750 This directive must be defined.
753 .Ic pre_shared_key , rsasig , gssapi_krb , hybrid_rsa_server ,
755 .Ic hybrid_rsa_client .
757 .It Ic dh_group Ar group ;
758 define the group used for the Diffie-Hellman exponentiations.
759 This directive must be defined.
762 .Ic modp768 , modp1024 , modp1536 ,
763 .Ic modp2048 , modp3072 , modp4096 ,
764 .Ic modp6144 , modp8192 .
765 Or you can define 1, 2, 5, 14, 15, 16, 17, or 18 as the DH group number.
766 When you want to use aggressive mode,
767 you must define the same DH group in each proposal.
768 .It Ic lifetime time Ar number Ar timeunit ;
769 define lifetime of the phase 1 SA proposal.
770 Refer to the description of the
772 directive defined in the
775 .It Ic gss_id Ar string ;
776 define the GSS-API endpoint name, to be included as an attribute in the SA,
779 authentication method is used.
780 If this is not defined, the default value of
782 is used, where hostname is the value returned by the
789 .Ss Policy Specifications
790 The policy directive is obsolete, policies are now in the SPD.
792 will obey the policy configured into the kernel by
794 and will construct phase 2 proposals by combining
798 and policies in the kernel.
800 .Ss Sainfo Specifications
801 .Bl -tag -width Ds -compact
803 .Ic sainfo ( Ar source_id destination_id | Ic anonymous ) [ from Ar idtype [ Ar string ] ]
804 .Ic { Ar statements Ic }
806 defines the parameters of the IKE phase 2 (IPsec-SA establishment).
810 are constructed like:
812 .Ic address Ar address
819 .Ic subnet Ar address
828 It means exactly the content of ID payload.
829 This is not like a filter rule.
830 For example, if you define 3ffe:501:4819::/48 as
832 3ffe:501:4819:1000:/64 will not match.
834 In case of longest prefix (selecting single host)
836 instructs to send ID type of ADDRESS, while
838 instructs to send ID type of SUBNET.
839 Otherwise these instructions are identical.
841 .Bl -tag -width Ds -compact
843 .It Ic pfs_group Ar group ;
844 define the group of Diffie-Hellman exponentiations.
845 If you do not require PFS then you can omit this directive.
846 Any proposal will be accepted if you do not specify one.
849 .Ic modp768 , modp1024 , modp1536 ,
850 .Ic modp2048 , modp3072 , modp4096 ,
851 .Ic modp6144 , modp8192 .
852 Or you can define 1, 2, 5, 14, 15, 16, 17, or 18 as the DH group number.
854 .It Ic lifetime time Ar number Ar timeunit ;
855 define how long an IPsec-SA will be used, in timeunits.
856 Any proposal will be accepted, and no attribute(s) will be proposed to
857 the peer if you do not specify it(them).
862 .It Ic my_identifier Ar idtype ... ;
864 It does not make sense to specify an identifier in the phase 2.
869 does not have a list of security protocols to be negotiated.
870 The list of security protocols are passed by SPD in the kernel.
871 Therefore you have to define all of the potential algorithms
872 in the phase 2 proposals even if there are algorithms which will not be used.
873 These algorithms are define by using the following three directives,
874 with a single comma as the separator.
875 For algorithms that can take variable-length keys, algorithm names
876 can be followed by a key length, like
877 .Dq Li blowfish 448 .
879 will compute the actual phase 2 proposals by computing
880 the permutation of the specified algorithms,
881 and then combining them with the security protocol specified by the SPD.
883 .Ic des , 3des , hmac_md5 ,
886 are specified as algorithms, we have four combinations for use with ESP,
888 Then, based on the SPD settings,
890 will construct the actual proposals.
891 If the SPD entry asks for ESP only, there will be 4 proposals.
892 If it asks for both AH and ESP, there will be 8 proposals.
893 Note that the kernel may not support the algorithm you have specified.
895 .Bl -tag -width Ds -compact
896 .It Ic encryption_algorithm Ar algorithms ;
897 .Ic des , 3des , des_iv64 , des_iv32 ,
898 .Ic rc5 , rc4 , idea , 3idea ,
899 .Ic cast128 , blowfish , null_enc ,
900 .Ic twofish , rijndael , aes
903 .It Ic authentication_algorithm Ar algorithms ;
904 .Ic des , 3des , des_iv64 , des_iv32 ,
905 .Ic hmac_md5 , hmac_sha1 , hmac_sha256, hmac_sha384, hmac_sha512, non_auth
906 .Pq used with ESP authentication and AH
908 .It Ic compression_algorithm Ar algorithms ;
915 .Bl -tag -width Ds -compact
916 .It Ic log Ar level ;
917 define logging level.
925 If you set the logging level too high on slower machines,
926 IKE negotiation can fail due to timing constraint changes.
929 .Ss Specifying the way to pad
930 .Bl -tag -width Ds -compact
931 .It Ic padding { Ar statements Ic }
932 specified padding format.
933 The following are valid statements:
934 .Bl -tag -width Ds -compact
935 .It Ic randomize (on \(ba off) ;
936 enable using a randomized value for padding.
938 .It Ic randomize_length (on \(ba off) ;
939 the pad length is random.
941 .It Ic maximum_length Ar number ;
942 define a maximum padding length.
945 is off, this is ignored.
946 The default is 20 bytes.
947 .It Ic exclusive_tail (on \(ba off) ;
948 means to put the number of pad bytes minus one into the last part
951 .It Ic strict_check (on \(ba off) ;
952 means to constrain the peer to set the number of pad bytes.
956 .Ss ISAKMP mode configuration settings
957 .Bl -tag -width Ds -compact
958 .It Ic mode_cfg { Ar statements Ic }
959 Defines the information to return for remote hosts' ISAKMP mode config
961 Also defines the authentication source for remote peers
962 authenticating through hybrid auth.
964 The following are valid statements:
965 .Bl -tag -width Ds -compact
966 .It Ic auth_source (system \(ba radius \(ba pam) ;
967 Specify the source for authentication of users through hybrid auth.
969 means to use the Unix user database.
972 means to use a RADIUS server.
975 was built with libradius support, and the configuration is done in
981 was built with libpam support.
982 .It Ic conf_source (local \(ba radius) ;
983 Specify the source for IP addresses and netmask allocated through ISAKMP
986 means to use the local IP pool defined by the
993 means to use a RADIUS server.
996 was built with libradius support, and the configuration is done in
998 RADIUS configuration requires RADIUS authentication.
999 .It Ic accounting (none \(ba radius \(ba pam) ;
1000 Enable or disable accounting for Xauth logins and logouts.
1003 which disable accounting.
1005 enable RADIUS accounting.
1008 was built with libradius support, and the configuration is done in
1010 RADIUS accounting require RADIUS authentication.
1012 enable PAM accounting.
1015 was built with libpam support.
1016 PAM accounting requires PAM authentication.
1017 .It Ic pool_size Ar size
1018 Specify the size of the IP address pool, either local or allocated
1021 selects the local pool or the RADIUS configuration, but in both
1022 configurations, you cannot have more than
1024 users connected at the same time.
1026 .It Ic network4 Ar address ;
1027 .It Ic netmask4 Ar address ;
1028 The local IP pool base address and network mask from which dynamically
1029 allocated IPv4 addresses should be taken.
1034 or if the RADIUS server returned
1035 .Ar 255.255.255.254 .
1037 .Ar 0.0.0.0/0.0.0.0 .
1038 .It Ic dns4 Ar address ;
1039 The IPv4 address for a DNS server.
1040 .It Ic nbns4 Ar address ;
1041 The IPv4 address for a WINS server.
1042 .It Ic banner Ar path ;
1043 The path of a file displayed on the client at connection time.
1046 .It Ic auth_throttle Ar delay ;
1047 On each failed Xauth authentication attempt, refuse new attempts for
1050 This is to avoid dictionary attacks on Xauth passwords.
1051 Default is one second.
1052 Set to zero to disable authentication delay.
1053 .It Ic pfs_group Ar group ;
1054 Sets the PFS group used in the client proposal (Cisco VPN client only).
1056 .It Ic save_passwd (on | off) ;
1057 Allow the client to save the Xauth password (Cisco VPN client only).
1061 .Ss Special directives
1062 .Bl -tag -width Ds -compact
1063 .It Ic complex_bundle (on \(ba off) ;
1064 defines the interpretation of proposal in the case of SA bundle.
1066 .Dq IP AH ESP IP payload
1068 .Dq AH tunnel and ESP tunnel .
1069 The interpretation is more common to other IKE implementations, however,
1070 it allows very limited set of combinations for proposals.
1071 With the option enabled, it will be proposed as
1072 .Dq AH transport and ESP tunnel .
1073 The default value is
1077 .Ss Pre-shared key File
1078 The pre-shared key file defines pairs of identifiers and corresponding
1079 shared secret keys which are used in the pre-shared key authentication
1081 The pair in each line is separated by some number of blanks and/or tab
1082 characters like in the
1085 Key can include blanks because everything after the first blanks
1086 is interpreted as the secret key.
1090 Keys which start with
1092 are interpreted as hexadecimal strings.
1093 Note that the file must be owned by the user ID running
1095 .Pq usually the privileged user ,
1096 and must not be accessible by others.
1099 The following shows how the remote directive should be configured.
1100 .Bd -literal -offset
1101 path pre_shared_key "/usr/local/v6/etc/psk.txt" ;
1104 exchange_mode aggressive,main,base;
1105 lifetime time 24 hour;
1107 encryption_algorithm 3des;
1108 hash_algorithm sha1;
1109 authentication_method pre_shared_key;
1117 lifetime time 12 hour ;
1118 encryption_algorithm 3des, blowfish 448, twofish, rijndael ;
1119 authentication_algorithm hmac_sha1, hmac_md5 ;
1120 compression_algorithm deflate ;
1124 The following is a sample for the pre-shared key file.
1125 .Bd -literal -offset
1126 10.160.94.3 mekmitasdigoat
1127 172.16.1.133 0x12345678
1128 194.100.55.1 whatcertificatereally
1129 3ffe:501:410:ffff:200:86ff:fe05:80fa mekmitasdigoat
1130 3ffe:501:410:ffff:210:4bff:fea2:8baa mekmitasdigoat
1131 foo@kame.net mekmitasdigoat
1143 configuration file first appeared in the
1145 Yokogawa IPsec implementation.
1148 Some statements may not be handled by
1152 Diffie-Hellman computation can take a very long time, and may cause
1153 unwanted timeouts, specifically when a large D-H group is used.
1155 .Sh SECURITY CONSIDERATIONS
1156 The use of IKE phase 1 aggressive mode is not recommended,
1158 .Li http://www.kb.cert.org/vuls/id/886601 .