]>
Commit | Line | Data |
---|---|---|
5da20b3d TB |
1 | charon {} |
2 | Options for the charon IKE daemon. | |
3 | ||
4 | Options for the charon IKE daemon. | |
5 | ||
6 | **Note**: Many of the options in this section also apply to **charon-cmd** | |
7 | and other **charon** derivatives. Just use their respective name (e.g. | |
8 | **charon-cmd** instead of **charon**). For many options defaults can be | |
9 | defined in the **libstrongswan** section. | |
10 | ||
05e373ae TE |
11 | charon.accept_private_algs = no |
12 | Deliberately violate the IKE standard's requirement and allow the use of | |
13 | private algorithm identifiers, even if the peer implementation is unknown. | |
14 | ||
c4c9d291 MW |
15 | charon.accept_unencrypted_mainmode_messages = no |
16 | Accept unencrypted ID and HASH payloads in IKEv1 Main Mode. | |
17 | ||
18 | Accept unencrypted ID and HASH payloads in IKEv1 Main Mode. | |
19 | ||
20 | Some implementations send the third Main Mode message unencrypted, probably | |
21 | to find the PSKs for the specified ID for authentication. This is very | |
22 | similar to Aggressive Mode, and has the same security implications: A | |
23 | passive attacker can sniff the negotiated Identity, and start brute forcing | |
24 | the PSK using the HASH payload. | |
25 | ||
26 | It is recommended to keep this option to no, unless you know exactly | |
27 | what the implications are and require compatibility to such devices (for | |
28 | example, some SonicWall boxes). | |
29 | ||
5da20b3d | 30 | charon.block_threshold = 5 |
b866ee88 TB |
31 | Maximum number of half-open IKE_SAs (including unprocessed IKE_SA_INITs) |
32 | for a single peer IP. | |
5da20b3d TB |
33 | |
34 | charon.cert_cache = yes | |
35 | Whether relations in validated certificate chains should be cached in | |
36 | memory. | |
37 | ||
2a2669ee | 38 | charon.cache_crls = no |
2db6d5b8 | 39 | Whether Certificate Revocation Lists (CRLs) fetched via HTTP or LDAP should |
2a2669ee AS |
40 | be saved under a unique file name derived from the public key of the |
41 | Certification Authority (CA) to **/etc/ipsec.d/crls** (stroke) or | |
42 | **/etc/swanctl/x509crl** (vici), respectively. | |
43 | ||
6524bd3c TB |
44 | charon.check_current_path = no |
45 | Whether to use DPD to check if the current path still works after any | |
46 | changes to interfaces/addresses. | |
47 | ||
48 | By default, after detecting any changes to interfaces and/or addresses no | |
49 | action is taken if the current path to the remote peer still looks usable. | |
50 | Enabling this option will use DPD to check if the path actually still works, | |
51 | or, for instance, the peer removed the state after a longer phase without | |
52 | connectivity. It will also trigger a MOBIKE update if NAT mappings were | |
53 | removed during the downtime. | |
54 | ||
d1d5659e NK |
55 | charon.cisco_flexvpn = no |
56 | Send the Cisco FlexVPN vendor ID payload (IKEv2 only). | |
57 | ||
58 | Send the Cisco FlexVPN vendor ID payload, which is required in order to make | |
59 | Cisco brand devices allow negotiating a local traffic selector (from | |
60 | strongSwan's point of view) that is not the assigned virtual IP address if | |
61 | such an address is requested by strongSwan. Sending the Cisco FlexVPN | |
62 | vendor ID prevents the peer from narrowing the initiator's local traffic | |
63 | selector and allows it to e.g. negotiate a TS of 0.0.0.0/0 == 0.0.0.0/0 | |
64 | instead. This has been tested with a "tunnel mode ipsec ipv4" Cisco | |
65 | template but should also work for GRE encapsulation. | |
66 | ||
5da20b3d TB |
67 | charon.cisco_unity = no |
68 | Send Cisco Unity vendor ID payload (IKEv1 only). | |
69 | ||
70 | charon.close_ike_on_child_failure = no | |
71 | Close the IKE_SA if setup of the CHILD_SA along with IKE_AUTH failed. | |
72 | ||
d8104b7c | 73 | charon.cookie_threshold = 30 |
b866ee88 TB |
74 | Number of half-open IKE_SAs (including unprocessed IKE_SA_INITs) that |
75 | activate the cookie mechanism. | |
5da20b3d | 76 | |
d8104b7c | 77 | charon.cookie_threshold_ip = 3 |
b866ee88 TB |
78 | Number of half-open IKE_SAs (including unprocessed IKE_SA_INITs) for a |
79 | single peer IP that activate the cookie mechanism. | |
d8104b7c | 80 | |
5da20b3d TB |
81 | charon.crypto_test.bench = no |
82 | Benchmark crypto algorithms and order them by efficiency. | |
83 | ||
84 | charon.crypto_test.bench_size = 1024 | |
85 | Buffer size used for crypto benchmark. | |
86 | ||
87 | charon.crypto_test.bench_time = 50 | |
a4617539 | 88 | Time in ms during which crypto algorithm performance is measured. |
5da20b3d TB |
89 | |
90 | charon.crypto_test.on_add = no | |
91 | Test crypto algorithms during registration (requires test vectors provided | |
92 | by the _test-vectors_ plugin). | |
93 | ||
94 | charon.crypto_test.on_create = no | |
95 | Test crypto algorithms on each crypto primitive instantiation. | |
96 | ||
97 | charon.crypto_test.required = no | |
98 | Strictly require at least one test vector to enable an algorithm. | |
99 | ||
100 | charon.crypto_test.rng_true = no | |
101 | Whether to test RNG with TRUE quality; requires a lot of entropy. | |
102 | ||
2f3c08d2 TB |
103 | charon.delete_rekeyed = no |
104 | Delete CHILD_SAs right after they got successfully rekeyed (IKEv1 only). | |
105 | ||
106 | Delete CHILD_SAs right after they got successfully rekeyed (IKEv1 only). | |
107 | Reduces the number of stale CHILD_SAs in scenarios with a lot of rekeyings. | |
108 | However, this might cause problems with implementations that continue to | |
109 | use rekeyed SAs until they expire. | |
110 | ||
44107cb7 TB |
111 | charon.delete_rekeyed_delay = 5 |
112 | Delay in seconds until inbound IPsec SAs are deleted after rekeyings (IKEv2 | |
113 | only). | |
114 | ||
115 | Delay in seconds until inbound IPsec SAs are deleted after rekeyings (IKEv2 | |
116 | only). To process delayed packets the inbound part of a CHILD_SA is kept | |
117 | installed up to the configured number of seconds after it got replaced | |
118 | during a rekeying. If set to 0 the CHILD_SA will be kept installed until it | |
119 | expires (if no lifetime is set it will be destroyed immediately). | |
120 | ||
5da20b3d TB |
121 | charon.dh_exponent_ansi_x9_42 = yes |
122 | Use ANSI X9.42 DH exponent size or optimum size matched to cryptographic | |
123 | strength. | |
124 | ||
305c4aa8 | 125 | charon.dlopen_use_rtld_now = no |
50e4aeb2 TB |
126 | Use RTLD_NOW with dlopen when loading plugins and IMV/IMCs to reveal missing |
127 | symbols immediately. | |
305c4aa8 | 128 | |
5da20b3d TB |
129 | charon.dns1 |
130 | DNS server assigned to peer via configuration payload (CP). | |
131 | ||
132 | charon.dns2 | |
133 | DNS server assigned to peer via configuration payload (CP). | |
134 | ||
135 | charon.dos_protection = yes | |
136 | Enable Denial of Service protection using cookies and aggressiveness checks. | |
137 | ||
5da20b3d TB |
138 | charon.flush_auth_cfg = no |
139 | Free objects during authentication (might conflict with plugins). | |
140 | ||
141 | If enabled objects used during authentication (certificates, identities | |
142 | etc.) are released to free memory once an IKE_SA is established. Enabling | |
143 | this might conflict with plugins that later need access to e.g. the used | |
144 | certificates. | |
145 | ||
489d154e TB |
146 | charon.follow_redirects = yes |
147 | Whether to follow IKEv2 redirects (RFC 5685). | |
148 | ||
066fa42f TB |
149 | charon.force_eap_only_authentication = no |
150 | Violate RFC 5998 and use EAP-only authentication even if the peer did not | |
151 | send an EAP_ONLY_AUTHENTICATION notify during IKE_AUTH. | |
152 | ||
0642f42b | 153 | charon.fragment_size = 1280 |
9d75a288 | 154 | Maximum size (complete IP datagram size in bytes) of a sent IKE fragment |
0642f42b TB |
155 | when using proprietary IKEv1 or standardized IKEv2 fragmentation, defaults |
156 | to 1280 (use 0 for address family specific default values, which uses a | |
157 | lower value for IPv4). If specified this limit is used for both IPv4 and | |
158 | IPv6. | |
5da20b3d TB |
159 | |
160 | charon.group | |
161 | Name of the group the daemon changes to after startup. | |
162 | ||
163 | charon.half_open_timeout = 30 | |
164 | Timeout in seconds for connecting IKE_SAs (also see IKE_SA_INIT DROPPING). | |
165 | ||
166 | charon.hash_and_url = no | |
167 | Enable hash and URL support. | |
168 | ||
169 | charon.host_resolver.max_threads = 3 | |
170 | Maximum number of concurrent resolver threads (they are terminated if | |
171 | unused). | |
172 | ||
173 | charon.host_resolver.min_threads = 0 | |
174 | Minimum number of resolver threads to keep around. | |
175 | ||
176 | charon.i_dont_care_about_security_and_use_aggressive_mode_psk = no | |
177 | Allow IKEv1 Aggressive Mode with pre-shared keys as responder. | |
178 | ||
179 | If enabled responders are allowed to use IKEv1 Aggressive Mode with | |
180 | pre-shared keys, which is discouraged due to security concerns (offline | |
181 | attacks on the openly transmitted hash of the PSK). | |
182 | ||
183 | charon.ignore_routing_tables | |
184 | A space-separated list of routing tables to be excluded from route lookups. | |
185 | ||
7fa03b30 TB |
186 | charon.ignore_acquire_ts = no |
187 | Whether to ignore the traffic selectors from the kernel's acquire events for | |
188 | IKEv2 connections (they are not used for IKEv1). | |
189 | ||
190 | If this is disabled the traffic selectors from the kernel's acquire events, | |
191 | which are derived from the triggering packet, are prepended to the traffic | |
192 | selectors from the configuration for IKEv2 connection. By enabling this, | |
193 | such specific traffic selectors will be ignored and only the ones in the | |
194 | config will be sent. This always happens for IKEv1 connections as the | |
195 | protocol only supports one set of traffic selectors per CHILD_SA. | |
196 | ||
5da20b3d TB |
197 | charon.ikesa_limit = 0 |
198 | Maximum number of IKE_SAs that can be established at the same time before | |
199 | new connection attempts are blocked. | |
200 | ||
201 | charon.ikesa_table_segments = 1 | |
202 | Number of exclusively locked segments in the hash table. | |
203 | ||
204 | charon.ikesa_table_size = 1 | |
205 | Size of the IKE_SA hash table. | |
206 | ||
207 | charon.inactivity_close_ike = no | |
208 | Whether to close IKE_SA if the only CHILD_SA closed due to inactivity. | |
209 | ||
210 | charon.init_limit_half_open = 0 | |
211 | Limit new connections based on the current number of half open IKE_SAs, see | |
212 | IKE_SA_INIT DROPPING in **strongswan.conf**(5). | |
213 | ||
214 | charon.init_limit_job_load = 0 | |
215 | Limit new connections based on the number of queued jobs. | |
216 | ||
217 | Limit new connections based on the number of jobs currently queued for | |
218 | processing (see IKE_SA_INIT DROPPING). | |
219 | ||
220 | charon.initiator_only = no | |
221 | Causes charon daemon to ignore IKE initiation requests. | |
222 | ||
223 | charon.install_routes = yes | |
224 | Install routes into a separate routing table for established IPsec tunnels. | |
225 | ||
226 | charon.install_virtual_ip = yes | |
227 | Install virtual IP addresses. | |
228 | ||
229 | charon.install_virtual_ip_on | |
230 | The name of the interface on which virtual IP addresses should be installed. | |
231 | ||
232 | The name of the interface on which virtual IP addresses should be installed. | |
233 | If not specified the addresses will be installed on the outbound interface. | |
234 | ||
235 | charon.integrity_test = no | |
236 | Check daemon, libstrongswan and plugin integrity at startup. | |
237 | ||
238 | charon.interfaces_ignore | |
239 | A comma-separated list of network interfaces that should be ignored, if | |
240 | **interfaces_use** is specified this option has no effect. | |
241 | ||
242 | charon.interfaces_use | |
243 | A comma-separated list of network interfaces that should be used by charon. | |
244 | All other interfaces are ignored. | |
245 | ||
246 | charon.keep_alive = 20s | |
247 | NAT keep alive interval. | |
248 | ||
0d4a5f6a TB |
249 | charon.keep_alive_dpd_margin = 0s |
250 | Number of seconds the keep alive interval may be exceeded before a DPD is | |
251 | sent instead of a NAT keep alive (0 to disable). This is only useful if a | |
252 | clock is used that includes time spent suspended (e.g. CLOCK_BOOTTIME). | |
253 | ||
5da20b3d TB |
254 | charon.leak_detective.detailed = yes |
255 | Includes source file names and line numbers in leak detective output. | |
256 | ||
257 | charon.leak_detective.usage_threshold = 10240 | |
cc1d78b0 TB |
258 | Threshold in bytes for allocations to be included in usage reports (0 to |
259 | include all). | |
5da20b3d TB |
260 | |
261 | charon.leak_detective.usage_threshold_count = 0 | |
cc1d78b0 TB |
262 | Threshold in number of allocations for allocations to be included in usage |
263 | reports (0 to include all). | |
5da20b3d TB |
264 | |
265 | charon.load | |
266 | Plugins to load in the IKE daemon charon. | |
267 | ||
268 | charon.load_modular = no | |
269 | Determine plugins to load via each plugin's load option. | |
270 | ||
271 | If enabled, the list of plugins to load is determined via the value of the | |
272 | _charon.plugins.<name>.load_ options. In addition to a simple boolean flag | |
273 | that option may take an integer value indicating the priority of a plugin, | |
274 | which would influence the order of a plugin in the plugin list (the default | |
275 | is 1). If two plugins have the same priority their order in the default | |
276 | plugin list is preserved. Enabled plugins not found in that list are ordered | |
277 | alphabetically before other plugins with the same priority. | |
278 | ||
0cb8752b TB |
279 | charon.max_ikev1_exchanges = 3 |
280 | Maximum number of IKEv1 phase 2 exchanges per IKE_SA to keep state about and | |
281 | track concurrently. | |
282 | ||
5da20b3d TB |
283 | charon.max_packet = 10000 |
284 | Maximum packet size accepted by charon. | |
285 | ||
349f7f24 MW |
286 | charon.make_before_break = no |
287 | Initiate IKEv2 reauthentication with a make-before-break scheme. | |
288 | ||
289 | Initiate IKEv2 reauthentication with a make-before-break instead of a | |
290 | break-before-make scheme. Make-before-break uses overlapping IKE and | |
291 | CHILD_SA during reauthentication by first recreating all new SAs before | |
292 | deleting the old ones. This behavior can be beneficial to avoid connectivity | |
293 | gaps during reauthentication, but requires support for overlapping SAs by | |
294 | the peer. strongSwan can handle such overlapping SAs since version 5.3.0. | |
295 | ||
5da20b3d TB |
296 | charon.multiple_authentication = yes |
297 | Enable multiple authentication exchanges (RFC 4739). | |
298 | ||
299 | charon.nbns1 | |
300 | WINS servers assigned to peer via configuration payload (CP). | |
301 | ||
302 | charon.nbns2 | |
303 | WINS servers assigned to peer via configuration payload (CP). | |
304 | ||
305 | charon.port = 500 | |
306 | UDP port used locally. If set to 0 a random port will be allocated. | |
307 | ||
308 | charon.port_nat_t = 4500 | |
309 | UDP port used locally in case of NAT-T. If set to 0 a random port will be | |
310 | allocated. Has to be different from **charon.port**, otherwise a random | |
311 | port will be allocated. | |
312 | ||
597e8c9e | 313 | charon.prefer_best_path = no |
ca280574 | 314 | Whether to prefer updating SAs to the path with the best route. |
597e8c9e MW |
315 | |
316 | By default, charon keeps SAs on the routing path with addresses it | |
317 | previously used if that path is still usable. By setting this option to | |
318 | yes, it tries more aggressively to update SAs with MOBIKE on routing | |
319 | priority changes using the cheapest path. This adds more noise, but allows | |
320 | to dynamically adapt SAs to routing priority changes. This option has no | |
321 | effect if MOBIKE is not supported or disabled. | |
322 | ||
0a954d67 TB |
323 | charon.prefer_configured_proposals = yes |
324 | Prefer locally configured proposals for IKE/IPsec over supplied ones as | |
325 | responder (disabling this can avoid keying retries due to INVALID_KE_PAYLOAD | |
326 | notifies). | |
327 | ||
3bf98189 | 328 | charon.prefer_temporary_addrs = no |
9f12b8a6 TB |
329 | Controls whether permanent or temporary IPv6 addresses are used as source, |
330 | or announced as additional addresses if MOBIKE is used. | |
331 | ||
332 | By default, permanent IPv6 source addresses are preferred over temporary | |
333 | ones (RFC 4941), to make connections more stable. Enable this option to | |
334 | reverse this. | |
335 | ||
336 | It also affects which IPv6 addresses are announced as additional addresses | |
337 | if MOBIKE is used. If the option is disabled, only permanent addresses are | |
338 | sent, and only temporary ones if it is enabled. | |
3bf98189 | 339 | |
5da20b3d TB |
340 | charon.process_route = yes |
341 | Process RTM_NEWROUTE and RTM_DELROUTE events. | |
342 | ||
343 | charon.processor.priority_threads {} | |
344 | Section to configure the number of reserved threads per priority class | |
345 | see JOB PRIORITY MANAGEMENT in **strongswan.conf**(5). | |
346 | ||
770f4cce TB |
347 | charon.rdn_matching = strict |
348 | How RDNs in subject DNs of certificates are matched against configured | |
349 | identities (_strict_, _reordered_, or _relaxed_). | |
350 | ||
351 | How RDNs in subject DNs of certificates are matched against configured | |
352 | identities. Possible values are _strict_ (the default), _reordered_, and | |
353 | _relaxed_. With _strict_ the number, type and order of all RDNs has to | |
354 | match, wildcards (*) for the values of RDNs are allowed (that's the case | |
355 | for all three variants). Using _reordered_ also matches DNs if the RDNs | |
356 | appear in a different order, the number and type still has to match. | |
357 | Finally, _relaxed_ also allows matches of DNs that contain more RDNs than | |
358 | the configured identity (missing RDNs are treated like a wildcard match). | |
359 | ||
360 | Note that _reordered_ and _relaxed_ impose a considerable overhead on memory | |
a9fcf280 | 361 | usage and runtime, in particular, for mismatches, compared to _strict_. |
770f4cce | 362 | |
5da20b3d TB |
363 | charon.receive_delay = 0 |
364 | Delay in ms for receiving packets, to simulate larger RTT. | |
365 | ||
366 | charon.receive_delay_response = yes | |
367 | Delay response messages. | |
368 | ||
369 | charon.receive_delay_request = yes | |
370 | Delay request messages. | |
371 | ||
372 | charon.receive_delay_type = 0 | |
373 | Specific IKEv2 message type to delay, 0 for any. | |
374 | ||
375 | charon.replay_window = 32 | |
376 | Size of the AH/ESP replay window, in packets. | |
377 | ||
378 | charon.retransmit_base = 1.8 | |
379 | Base to use for calculating exponential back off, see IKEv2 RETRANSMISSION | |
380 | in **strongswan.conf**(5). | |
381 | ||
382 | charon.retransmit_timeout = 4.0 | |
383 | Timeout in seconds before sending first retransmit. | |
384 | ||
385 | charon.retransmit_tries = 5 | |
386 | Number of times to retransmit a packet before giving up. | |
387 | ||
389e4b8e TB |
388 | charon.retransmit_jitter = 0 |
389 | Maximum jitter in percent to apply randomly to calculated retransmission | |
390 | timeout (0 to disable). | |
391 | ||
392 | charon.retransmit_limit = 0 | |
393 | Upper limit in seconds for calculated retransmission timeout (0 to disable). | |
394 | ||
5da20b3d | 395 | charon.retry_initiate_interval = 0 |
99b1a1a1 TB |
396 | Interval in seconds to use when retrying to initiate an IKE_SA (e.g. if DNS |
397 | resolution failed), 0 to disable retries. | |
5da20b3d TB |
398 | |
399 | charon.reuse_ikesa = yes | |
24ab8530 | 400 | Initiate CHILD_SA within existing IKE_SAs (always enabled for IKEv1). |
5da20b3d TB |
401 | |
402 | charon.routing_table | |
403 | Numerical routing table to install routes to. | |
404 | ||
405 | charon.routing_table_prio | |
406 | Priority of the routing table. | |
407 | ||
4ea61dcb TE |
408 | charon.reqid_base = 1 |
409 | Value of the first reqid to be automatically assigned to a CHILD_SA. | |
410 | ||
6f97c0d5 TB |
411 | charon.rsa_pss = no |
412 | Whether to use RSA with PSS padding instead of PKCS#1 padding by default. | |
413 | ||
747e8409 AS |
414 | charon.rsa_pss_trailerfield = no |
415 | Whether to encode an explicit trailerField value of 0x01 in the RSA-PSS | |
416 | algorithmIdentifier (CONTEXT3) or using the DEFAULT value by omitting it. | |
417 | ||
5da20b3d TB |
418 | charon.send_delay = 0 |
419 | Delay in ms for sending packets, to simulate larger RTT. | |
420 | ||
421 | charon.send_delay_response = yes | |
422 | Delay response messages. | |
423 | ||
424 | charon.send_delay_request = yes | |
425 | Delay request messages. | |
426 | ||
427 | charon.send_delay_type = 0 | |
428 | Specific IKEv2 message type to delay, 0 for any. | |
429 | ||
430 | charon.send_vendor_id = no | |
431 | Send strongSwan vendor ID payload | |
432 | ||
fff3576b TB |
433 | charon.signature_authentication = yes |
434 | Whether to enable Signature Authentication as per RFC 7427. | |
435 | ||
b67ae0f8 TB |
436 | charon.signature_authentication_constraints = yes |
437 | Whether to enable constraints against IKEv2 signature schemes. | |
438 | ||
439 | If enabled, signature schemes configured in _rightauth_, in addition to | |
440 | getting used as constraints against signature schemes employed in the | |
441 | certificate chain, are also used as constraints against the signature scheme | |
442 | used by peers during IKEv2. | |
443 | ||
62d43ea6 TB |
444 | charon.spi_label = 0x0000000000000000 |
445 | Value mixed into the local IKE SPIs after applying _spi_mask_. | |
446 | ||
447 | charon.spi_mask = 0x0000000000000000 | |
448 | Mask applied to local IKE SPIs before mixing in _spi_label_ (bits set will | |
449 | be replaced with _spi_label_). | |
450 | ||
6d86d0f5 TB |
451 | charon.spi_min = 0xc0000000 |
452 | The lower limit for SPIs requested from the kernel for IPsec SAs. | |
453 | ||
db12675e TB |
454 | The lower limit for SPIs requested from the kernel for IPsec SAs. Should not |
455 | be set lower than 0x00000100 (256), as SPIs between 1 and 255 are reserved | |
456 | by IANA. | |
457 | ||
6d86d0f5 TB |
458 | charon.spi_max = 0xcfffffff |
459 | The upper limit for SPIs requested from the kernel for IPsec SAs. | |
460 | ||
da7cb769 TB |
461 | charon.start-scripts {} |
462 | Section containing a list of scripts (name = path) that are executed when | |
463 | the daemon is started. | |
464 | ||
465 | charon.stop-scripts {} | |
466 | Section containing a list of scripts (name = path) that are executed when | |
467 | the daemon is terminated. | |
468 | ||
1b98f858 | 469 | charon.threads = 16 |
5da20b3d TB |
470 | Number of worker threads in charon. |
471 | ||
472 | Number of worker threads in charon. Several of these are reserved for long | |
473 | running tasks in internal modules and plugins. Therefore, make sure you | |
474 | don't set this value too low. The number of idle worker threads listed in | |
475 | _ipsec statusall_ might be used as indicator on the number of reserved | |
476 | threads. | |
477 | ||
478 | charon.tls.cipher | |
479 | List of TLS encryption ciphers. | |
480 | ||
481 | charon.tls.key_exchange | |
482 | List of TLS key exchange methods. | |
483 | ||
484 | charon.tls.mac | |
485 | List of TLS MAC algorithms. | |
486 | ||
487 | charon.tls.suites | |
488 | List of TLS cipher suites. | |
489 | ||
e5b65657 PK |
490 | charon.tls.ke_group |
491 | List of TLS key exchange groups. | |
492 | ||
e3757300 PK |
493 | charon.tls.signature |
494 | List of TLS signature schemes. | |
495 | ||
a4a128bd SL |
496 | charon.tls.send_certreq_authorities = yes |
497 | Whether to include CAs in a server's CertificateRequest message. | |
498 | ||
499 | Whether to include CAs in a server's CertificateRequest message. May be | |
500 | disabled if clients can't handle a long list of CAs. | |
501 | ||
a60e248b | 502 | charon.tls.version_min = 1.2 |
663969dd TB |
503 | Minimum TLS version to negotiate. |
504 | ||
92aef122 | 505 | charon.tls.version_max = 1.2 |
663969dd TB |
506 | Maximum TLS version to negotiate. |
507 | ||
5da20b3d TB |
508 | charon.user |
509 | Name of the user the daemon changes to after startup. | |
510 | ||
511 | charon.x509.enforce_critical = yes | |
512 | Discard certificates with unsupported or unknown critical extensions. |