NoPaste

/etc/strongswan.d/charon.conf

von thunder11

SNIPPET_TEXT:
  1. # Options for the charon IKE daemon.
  2. charon {
  3.  
  4.     # Deliberately violate the IKE standard's requirement and allow the use of
  5.     # private algorithm identifiers, even if the peer implementation is unknown.
  6.     # accept_private_algs = no
  7.  
  8.     # Accept unencrypted ID and HASH payloads in IKEv1 Main Mode.
  9.     # accept_unencrypted_mainmode_messages = no
  10.  
  11.     # Maximum number of half-open IKE_SAs (including unprocessed IKE_SA_INITs)
  12.     # for a single peer IP.
  13.     # block_threshold = 5
  14.  
  15.     # Whether Certificate Revocation Lists (CRLs) fetched via HTTP or LDAP
  16.     # should be saved under a unique file name derived from the public key of
  17.     # the Certification Authority (CA) to /etc/ipsec.d/crls (stroke) or
  18.     # /etc/swanctl/x509crl (vici), respectively.
  19.     # cache_crls = no
  20.  
  21.     # Whether relations in validated certificate chains should be cached in
  22.     # memory.
  23.     # cert_cache = yes
  24.  
  25.     # Whether to use DPD to check if the current path still works after any
  26.     # changes to interfaces/addresses.
  27.     # check_current_path = no
  28.  
  29.     # Send the Cisco FlexVPN vendor ID payload (IKEv2 only).
  30.     # cisco_flexvpn = no
  31.  
  32.     # Send Cisco Unity vendor ID payload (IKEv1 only).
  33.     # cisco_unity = no
  34.  
  35.     # Close the IKE_SA if setup of the CHILD_SA along with IKE_AUTH failed.
  36.     # close_ike_on_child_failure = no
  37.  
  38.     # Number of half-open IKE_SAs (including unprocessed IKE_SA_INITs) that
  39.     # activate the cookie mechanism.
  40.     # cookie_threshold = 30
  41.  
  42.     # Number of half-open IKE_SAs (including unprocessed IKE_SA_INITs) for a
  43.     # single peer IP that activate the cookie  mechanism.
  44.     # cookie_threshold_ip = 3
  45.  
  46.     # Delete CHILD_SAs right after they got successfully rekeyed (IKEv1 only).
  47.     # delete_rekeyed = no
  48.  
  49.     # Delay in seconds until inbound IPsec SAs are deleted after rekeyings
  50.     # (IKEv2 only).
  51.     # delete_rekeyed_delay = 5
  52.  
  53.     # Use ANSI X9.42 DH exponent size or optimum size matched to cryptographic
  54.     # strength.
  55.     # dh_exponent_ansi_x9_42 = yes
  56.  
  57.     # Use RTLD_NOW with dlopen when loading plugins and IMV/IMCs to reveal
  58.     # missing symbols immediately.
  59.     # dlopen_use_rtld_now = no
  60.  
  61.     # DNS server assigned to peer via configuration payload (CP).
  62.     # dns1 =
  63.  
  64.     # DNS server assigned to peer via configuration payload (CP).
  65.     # dns2 =
  66.  
  67.     # Enable Denial of Service protection using cookies and aggressiveness
  68.     # checks.
  69.     # dos_protection = yes
  70.  
  71.     # Free objects during authentication (might conflict with plugins).
  72.     # flush_auth_cfg = no
  73.  
  74.     # Whether to follow IKEv2 redirects (RFC 5685).
  75.     # follow_redirects = yes
  76.  
  77.     # Violate RFC 5998 and use EAP-only authentication even if the peer did not
  78.     # send an EAP_ONLY_AUTHENTICATION notify during IKE_AUTH.
  79.     # force_eap_only_authentication = no
  80.  
  81.     # Maximum size (complete IP datagram size in bytes) of a sent IKE fragment
  82.     # when using proprietary IKEv1 or standardized IKEv2 fragmentation, defaults
  83.     # to 1280 (use 0 for address family specific default values, which uses a
  84.     # lower value for IPv4).  If specified this limit is used for both IPv4 and
  85.     # IPv6.
  86.     # fragment_size = 1280
  87.  
  88.     # Name of the group the daemon changes to after startup.
  89.     # group =
  90.  
  91.     # Timeout in seconds for connecting IKE_SAs (also see IKE_SA_INIT DROPPING).
  92.     # half_open_timeout = 30
  93.  
  94.     # Enable hash and URL support.
  95.     # hash_and_url = no
  96.  
  97.     # Allow IKEv1 Aggressive Mode with pre-shared keys as responder.
  98.     # i_dont_care_about_security_and_use_aggressive_mode_psk = no
  99.  
  100.     # Whether to ignore the traffic selectors from the kernel's acquire events
  101.     # for IKEv2 connections (they are not used for IKEv1).
  102.     # ignore_acquire_ts = no
  103.  
  104.     # A space-separated list of routing tables to be excluded from route
  105.     # lookups.
  106.     # ignore_routing_tables =
  107.  
  108.     # Maximum number of IKE_SAs that can be established at the same time before
  109.     # new connection attempts are blocked.
  110.     # ikesa_limit = 0
  111.  
  112.     # Number of exclusively locked segments in the hash table.
  113.     # ikesa_table_segments = 1
  114.  
  115.     # Size of the IKE_SA hash table.
  116.     # ikesa_table_size = 1
  117.  
  118.     # Whether to close IKE_SA if the only CHILD_SA closed due to inactivity.
  119.     # inactivity_close_ike = no
  120.  
  121.     # Limit new connections based on the current number of half open IKE_SAs,
  122.     # see IKE_SA_INIT DROPPING in strongswan.conf(5).
  123.     # init_limit_half_open = 0
  124.  
  125.     # Limit new connections based on the number of queued jobs.
  126.     # init_limit_job_load = 0
  127.  
  128.     # Causes charon daemon to ignore IKE initiation requests.
  129.     # initiator_only = no
  130.  
  131.     # Install routes into a separate routing table for established IPsec
  132.     # tunnels.
  133.     # install_routes = yes
  134.  
  135.     # Install virtual IP addresses.
  136.     # install_virtual_ip = yes
  137.  
  138.     # The name of the interface on which virtual IP addresses should be
  139.     # installed.
  140.     # install_virtual_ip_on =
  141.  
  142.     # Check daemon, libstrongswan and plugin integrity at startup.
  143.     # integrity_test = no
  144.  
  145.     # A comma-separated list of network interfaces that should be ignored, if
  146.     # interfaces_use is specified this option has no effect.
  147.     # interfaces_ignore =
  148.  
  149.     # A comma-separated list of network interfaces that should be used by
  150.     # charon. All other interfaces are ignored.
  151.     # interfaces_use =
  152.  
  153.     # NAT keep alive interval.
  154.     # keep_alive = 20s
  155.  
  156.     # Number of seconds the keep alive interval may be exceeded before a DPD is
  157.     # sent instead of a NAT keep alive (0 to disable).  This is only useful if a
  158.     # clock is used that includes time spent suspended (e.g. CLOCK_BOOTTIME).
  159.     # keep_alive_dpd_margin = 0s
  160.  
  161.     # Plugins to load in the IKE daemon charon.
  162.     # load =
  163.  
  164.     # Determine plugins to load via each plugin's load option.
  165.     # load_modular = no
  166.  
  167.     # Initiate IKEv2 reauthentication with a make-before-break scheme.
  168.     # make_before_break = no
  169.  
  170.     # Maximum number of IKEv1 phase 2 exchanges per IKE_SA to keep state about
  171.     # and track concurrently.
  172.     # max_ikev1_exchanges = 3
  173.  
  174.     # Maximum packet size accepted by charon.
  175.     # max_packet = 10000
  176.  
  177.     # Enable multiple authentication exchanges (RFC 4739).
  178.     # multiple_authentication = yes
  179.  
  180.     # WINS servers assigned to peer via configuration payload (CP).
  181.     # nbns1 =
  182.  
  183.     # WINS servers assigned to peer via configuration payload (CP).
  184.     # nbns2 =
  185.  
  186.     # UDP port used locally. If set to 0 a random port will be allocated.
  187.     # port = 500
  188.  
  189.     # UDP port used locally in case of NAT-T. If set to 0 a random port will be
  190.     # allocated.  Has to be different from charon.port, otherwise a random port
  191.     # will be allocated.
  192.     # port_nat_t = 4500
  193.  
  194.     # Whether to prefer updating SAs to the path with the best route.
  195.     # prefer_best_path = no
  196.  
  197.     # Prefer locally configured proposals for IKE/IPsec over supplied ones as
  198.     # responder (disabling this can avoid keying retries due to
  199.     # INVALID_KE_PAYLOAD notifies).
  200.     # prefer_configured_proposals = yes
  201.  
  202.     # Controls whether permanent or temporary IPv6 addresses are used as source,
  203.     # or announced as additional addresses if MOBIKE is used.
  204.     # prefer_temporary_addrs = no
  205.  
  206.     # Process RTM_NEWROUTE and RTM_DELROUTE events.
  207.     # process_route = yes
  208.  
  209.     # How RDNs in subject DNs of certificates are matched against configured
  210.     # identities (strict, reordered, or relaxed).
  211.     # rdn_matching = strict
  212.  
  213.     # Delay in ms for receiving packets, to simulate larger RTT.
  214.     # receive_delay = 0
  215.  
  216.     # Delay request messages.
  217.     # receive_delay_request = yes
  218.  
  219.     # Delay response messages.
  220.     # receive_delay_response = yes
  221.  
  222.     # Specific IKEv2 message type to delay, 0 for any.
  223.     # receive_delay_type = 0
  224.  
  225.     # Size of the AH/ESP replay window, in packets.
  226.     # replay_window = 32
  227.  
  228.     # Base to use for calculating exponential back off, see IKEv2 RETRANSMISSION
  229.     # in strongswan.conf(5).
  230.     # retransmit_base = 1.8
  231.  
  232.     # Maximum jitter in percent to apply randomly to calculated retransmission
  233.     # timeout (0 to disable).
  234.     # retransmit_jitter = 0
  235.  
  236.     # Upper limit in seconds for calculated retransmission timeout (0 to
  237.     # disable).
  238.     # retransmit_limit = 0
  239.  
  240.     # Timeout in seconds before sending first retransmit.
  241.     # retransmit_timeout = 4.0
  242.  
  243.     # Number of times to retransmit a packet before giving up.
  244.     # retransmit_tries = 5
  245.  
  246.     # Interval in seconds to use when retrying to initiate an IKE_SA (e.g. if
  247.     # DNS resolution failed), 0 to disable retries.
  248.     # retry_initiate_interval = 0
  249.  
  250.     # Initiate CHILD_SA within existing IKE_SAs (always enabled for IKEv1).
  251.     # reuse_ikesa = yes
  252.  
  253.     # Numerical routing table to install routes to.
  254.     # routing_table =
  255.  
  256.     # Priority of the routing table.
  257.     # routing_table_prio =
  258.  
  259.     # Whether to use RSA with PSS padding instead of PKCS#1 padding by default.
  260.     # rsa_pss = no
  261.  
  262.     # Whether to encode an explicit trailerField value of 0x01 in the RSA-PSS
  263.     # algorithmIdentifier (CONTEXT3) or using the DEFAULT value by omitting it.
  264.     # rsa_pss_trailerfield = no
  265.  
  266.     # Delay in ms for sending packets, to simulate larger RTT.
  267.     # send_delay = 0
  268.  
  269.     # Delay request messages.
  270.     # send_delay_request = yes
  271.  
  272.     # Delay response messages.
  273.     # send_delay_response = yes
  274.  
  275.     # Specific IKEv2 message type to delay, 0 for any.
  276.     # send_delay_type = 0
  277.  
  278.     # Send strongSwan vendor ID payload
  279.     # send_vendor_id = no
  280.  
  281.     # Whether to enable Signature Authentication as per RFC 7427.
  282.     # signature_authentication = yes
  283.  
  284.     # Whether to enable constraints against IKEv2 signature schemes.
  285.     # signature_authentication_constraints = yes
  286.  
  287.     # Value mixed into the local IKE SPIs after applying spi_mask.
  288.     # spi_label = 0x0000000000000000
  289.  
  290.     # Mask applied to local IKE SPIs before mixing in spi_label (bits set will
  291.     # be replaced with spi_label).
  292.     # spi_mask = 0x0000000000000000
  293.  
  294.     # The upper limit for SPIs requested from the kernel for IPsec SAs.
  295.     # spi_max = 0xcfffffff
  296.  
  297.     # The lower limit for SPIs requested from the kernel for IPsec SAs.
  298.     # spi_min = 0xc0000000
  299.  
  300.     # Number of worker threads in charon.
  301.     # threads = 16
  302.  
  303.     # Name of the user the daemon changes to after startup.
  304.     # user =
  305.  
  306.     crypto_test {
  307.  
  308.         # Benchmark crypto algorithms and order them by efficiency.
  309.         # bench = no
  310.  
  311.         # Buffer size used for crypto benchmark.
  312.         # bench_size = 1024
  313.  
  314.         # Time in ms during which crypto algorithm performance is measured.
  315.         # bench_time = 50
  316.  
  317.         # Test crypto algorithms during registration (requires test vectors
  318.         # provided by the test-vectors plugin).
  319.         # on_add = no
  320.  
  321.         # Test crypto algorithms on each crypto primitive instantiation.
  322.         # on_create = no
  323.  
  324.         # Strictly require at least one test vector to enable an algorithm.
  325.         # required = no
  326.  
  327.         # Whether to test RNG with TRUE quality; requires a lot of entropy.
  328.         # rng_true = no
  329.  
  330.     }
  331.  
  332.     host_resolver {
  333.  
  334.         # Maximum number of concurrent resolver threads (they are terminated if
  335.         # unused).
  336.         # max_threads = 3
  337.  
  338.         # Minimum number of resolver threads to keep around.
  339.         # min_threads = 0
  340.  
  341.     }
  342.  
  343.     leak_detective {
  344.  
  345.         # Includes source file names and line numbers in leak detective output.
  346.         # detailed = yes
  347.  
  348.         # Threshold in bytes for allocations to be included in usage reports (0
  349.         # to include all).
  350.         # usage_threshold = 10240
  351.  
  352.         # Threshold in number of allocations for allocations to be included in
  353.         # usage reports (0 to include all).
  354.         # usage_threshold_count = 0
  355.  
  356.     }
  357.  
  358.     processor {
  359.  
  360.         # Section to configure the number of reserved threads per priority class
  361.         # see JOB PRIORITY MANAGEMENT in strongswan.conf(5).
  362.         priority_threads {
  363.  
  364.         }
  365.  
  366.     }
  367.  
  368.     # Section containing a list of scripts (name = path) that are executed when
  369.     # the daemon is started.
  370.     start-scripts {
  371.  
  372.     }
  373.  
  374.     # Section containing a list of scripts (name = path) that are executed when
  375.     # the daemon is terminated.
  376.     stop-scripts {
  377.  
  378.     }
  379.  
  380.     tls {
  381.  
  382.         # List of TLS encryption ciphers.
  383.         # cipher =
  384.  
  385.         # List of TLS key exchange groups.
  386.         # ke_group =
  387.  
  388.         # List of TLS key exchange methods.
  389.         # key_exchange =
  390.  
  391.         # List of TLS MAC algorithms.
  392.         # mac =
  393.  
  394.         # Whether to include CAs in a server's CertificateRequest message.
  395.         # send_certreq_authorities = yes
  396.  
  397.         # List of TLS signature schemes.
  398.         # signature =
  399.  
  400.         # List of TLS cipher suites.
  401.         # suites =
  402.  
  403.         # Maximum TLS version to negotiate.
  404.         # version_max = 1.2
  405.  
  406.         # Minimum TLS version to negotiate.
  407.         # version_min = 1.2
  408.  
  409.     }
  410.  
  411.     x509 {
  412.  
  413.         # Discard certificates with unsupported or unknown critical extensions.
  414.         # enforce_critical = yes
  415.  
  416.     }
  417.  
  418. }

Quellcode

Hier kannst du den Code kopieren und ihn in deinen bevorzugten Editor einfügen. PASTEBIN_DOWNLOAD_SNIPPET_EXPLAIN