]> git.ipfire.org Git - thirdparty/strongswan.git/blame - conf/options/charon.opt
kernel-interface: Make first reqid configurable
[thirdparty/strongswan.git] / conf / options / charon.opt
CommitLineData
5da20b3d
TB
1charon {}
2 Options for the charon IKE daemon.
3
4 Options for the charon IKE daemon.
5
6 **Note**: Many of the options in this section also apply to **charon-cmd**
7 and other **charon** derivatives. Just use their respective name (e.g.
8 **charon-cmd** instead of **charon**). For many options defaults can be
9 defined in the **libstrongswan** section.
10
05e373ae
TE
11charon.accept_private_algs = no
12 Deliberately violate the IKE standard's requirement and allow the use of
13 private algorithm identifiers, even if the peer implementation is unknown.
14
c4c9d291
MW
15charon.accept_unencrypted_mainmode_messages = no
16 Accept unencrypted ID and HASH payloads in IKEv1 Main Mode.
17
18 Accept unencrypted ID and HASH payloads in IKEv1 Main Mode.
19
20 Some implementations send the third Main Mode message unencrypted, probably
21 to find the PSKs for the specified ID for authentication. This is very
22 similar to Aggressive Mode, and has the same security implications: A
23 passive attacker can sniff the negotiated Identity, and start brute forcing
24 the PSK using the HASH payload.
25
26 It is recommended to keep this option to no, unless you know exactly
27 what the implications are and require compatibility to such devices (for
28 example, some SonicWall boxes).
29
5da20b3d 30charon.block_threshold = 5
b866ee88
TB
31 Maximum number of half-open IKE_SAs (including unprocessed IKE_SA_INITs)
32 for a single peer IP.
5da20b3d
TB
33
34charon.cert_cache = yes
35 Whether relations in validated certificate chains should be cached in
36 memory.
37
2a2669ee 38charon.cache_crls = no
2db6d5b8 39 Whether Certificate Revocation Lists (CRLs) fetched via HTTP or LDAP should
2a2669ee
AS
40 be saved under a unique file name derived from the public key of the
41 Certification Authority (CA) to **/etc/ipsec.d/crls** (stroke) or
42 **/etc/swanctl/x509crl** (vici), respectively.
43
6524bd3c
TB
44charon.check_current_path = no
45 Whether to use DPD to check if the current path still works after any
46 changes to interfaces/addresses.
47
48 By default, after detecting any changes to interfaces and/or addresses no
49 action is taken if the current path to the remote peer still looks usable.
50 Enabling this option will use DPD to check if the path actually still works,
51 or, for instance, the peer removed the state after a longer phase without
52 connectivity. It will also trigger a MOBIKE update if NAT mappings were
53 removed during the downtime.
54
d1d5659e
NK
55charon.cisco_flexvpn = no
56 Send the Cisco FlexVPN vendor ID payload (IKEv2 only).
57
58 Send the Cisco FlexVPN vendor ID payload, which is required in order to make
59 Cisco brand devices allow negotiating a local traffic selector (from
60 strongSwan's point of view) that is not the assigned virtual IP address if
61 such an address is requested by strongSwan. Sending the Cisco FlexVPN
62 vendor ID prevents the peer from narrowing the initiator's local traffic
63 selector and allows it to e.g. negotiate a TS of 0.0.0.0/0 == 0.0.0.0/0
64 instead. This has been tested with a "tunnel mode ipsec ipv4" Cisco
65 template but should also work for GRE encapsulation.
66
5da20b3d
TB
67charon.cisco_unity = no
68 Send Cisco Unity vendor ID payload (IKEv1 only).
69
70charon.close_ike_on_child_failure = no
71 Close the IKE_SA if setup of the CHILD_SA along with IKE_AUTH failed.
72
d8104b7c 73charon.cookie_threshold = 30
b866ee88
TB
74 Number of half-open IKE_SAs (including unprocessed IKE_SA_INITs) that
75 activate the cookie mechanism.
5da20b3d 76
d8104b7c 77charon.cookie_threshold_ip = 3
b866ee88
TB
78 Number of half-open IKE_SAs (including unprocessed IKE_SA_INITs) for a
79 single peer IP that activate the cookie mechanism.
d8104b7c 80
5da20b3d
TB
81charon.crypto_test.bench = no
82 Benchmark crypto algorithms and order them by efficiency.
83
84charon.crypto_test.bench_size = 1024
85 Buffer size used for crypto benchmark.
86
87charon.crypto_test.bench_time = 50
a4617539 88 Time in ms during which crypto algorithm performance is measured.
5da20b3d
TB
89
90charon.crypto_test.on_add = no
91 Test crypto algorithms during registration (requires test vectors provided
92 by the _test-vectors_ plugin).
93
94charon.crypto_test.on_create = no
95 Test crypto algorithms on each crypto primitive instantiation.
96
97charon.crypto_test.required = no
98 Strictly require at least one test vector to enable an algorithm.
99
100charon.crypto_test.rng_true = no
101 Whether to test RNG with TRUE quality; requires a lot of entropy.
102
2f3c08d2
TB
103charon.delete_rekeyed = no
104 Delete CHILD_SAs right after they got successfully rekeyed (IKEv1 only).
105
106 Delete CHILD_SAs right after they got successfully rekeyed (IKEv1 only).
107 Reduces the number of stale CHILD_SAs in scenarios with a lot of rekeyings.
108 However, this might cause problems with implementations that continue to
109 use rekeyed SAs until they expire.
110
44107cb7
TB
111charon.delete_rekeyed_delay = 5
112 Delay in seconds until inbound IPsec SAs are deleted after rekeyings (IKEv2
113 only).
114
115 Delay in seconds until inbound IPsec SAs are deleted after rekeyings (IKEv2
116 only). To process delayed packets the inbound part of a CHILD_SA is kept
117 installed up to the configured number of seconds after it got replaced
118 during a rekeying. If set to 0 the CHILD_SA will be kept installed until it
119 expires (if no lifetime is set it will be destroyed immediately).
120
5da20b3d
TB
121charon.dh_exponent_ansi_x9_42 = yes
122 Use ANSI X9.42 DH exponent size or optimum size matched to cryptographic
123 strength.
124
305c4aa8 125charon.dlopen_use_rtld_now = no
50e4aeb2
TB
126 Use RTLD_NOW with dlopen when loading plugins and IMV/IMCs to reveal missing
127 symbols immediately.
305c4aa8 128
5da20b3d
TB
129charon.dns1
130 DNS server assigned to peer via configuration payload (CP).
131
132charon.dns2
133 DNS server assigned to peer via configuration payload (CP).
134
135charon.dos_protection = yes
136 Enable Denial of Service protection using cookies and aggressiveness checks.
137
5da20b3d
TB
138charon.flush_auth_cfg = no
139 Free objects during authentication (might conflict with plugins).
140
141 If enabled objects used during authentication (certificates, identities
142 etc.) are released to free memory once an IKE_SA is established. Enabling
143 this might conflict with plugins that later need access to e.g. the used
144 certificates.
145
489d154e
TB
146charon.follow_redirects = yes
147 Whether to follow IKEv2 redirects (RFC 5685).
148
066fa42f
TB
149charon.force_eap_only_authentication = no
150 Violate RFC 5998 and use EAP-only authentication even if the peer did not
151 send an EAP_ONLY_AUTHENTICATION notify during IKE_AUTH.
152
0642f42b 153charon.fragment_size = 1280
9d75a288 154 Maximum size (complete IP datagram size in bytes) of a sent IKE fragment
0642f42b
TB
155 when using proprietary IKEv1 or standardized IKEv2 fragmentation, defaults
156 to 1280 (use 0 for address family specific default values, which uses a
157 lower value for IPv4). If specified this limit is used for both IPv4 and
158 IPv6.
5da20b3d
TB
159
160charon.group
161 Name of the group the daemon changes to after startup.
162
163charon.half_open_timeout = 30
164 Timeout in seconds for connecting IKE_SAs (also see IKE_SA_INIT DROPPING).
165
166charon.hash_and_url = no
167 Enable hash and URL support.
168
169charon.host_resolver.max_threads = 3
170 Maximum number of concurrent resolver threads (they are terminated if
171 unused).
172
173charon.host_resolver.min_threads = 0
174 Minimum number of resolver threads to keep around.
175
176charon.i_dont_care_about_security_and_use_aggressive_mode_psk = no
177 Allow IKEv1 Aggressive Mode with pre-shared keys as responder.
178
179 If enabled responders are allowed to use IKEv1 Aggressive Mode with
180 pre-shared keys, which is discouraged due to security concerns (offline
181 attacks on the openly transmitted hash of the PSK).
182
183charon.ignore_routing_tables
184 A space-separated list of routing tables to be excluded from route lookups.
185
7fa03b30
TB
186charon.ignore_acquire_ts = no
187 Whether to ignore the traffic selectors from the kernel's acquire events for
188 IKEv2 connections (they are not used for IKEv1).
189
190 If this is disabled the traffic selectors from the kernel's acquire events,
191 which are derived from the triggering packet, are prepended to the traffic
192 selectors from the configuration for IKEv2 connection. By enabling this,
193 such specific traffic selectors will be ignored and only the ones in the
194 config will be sent. This always happens for IKEv1 connections as the
195 protocol only supports one set of traffic selectors per CHILD_SA.
196
5da20b3d
TB
197charon.ikesa_limit = 0
198 Maximum number of IKE_SAs that can be established at the same time before
199 new connection attempts are blocked.
200
201charon.ikesa_table_segments = 1
202 Number of exclusively locked segments in the hash table.
203
204charon.ikesa_table_size = 1
205 Size of the IKE_SA hash table.
206
207charon.inactivity_close_ike = no
208 Whether to close IKE_SA if the only CHILD_SA closed due to inactivity.
209
210charon.init_limit_half_open = 0
211 Limit new connections based on the current number of half open IKE_SAs, see
212 IKE_SA_INIT DROPPING in **strongswan.conf**(5).
213
214charon.init_limit_job_load = 0
215 Limit new connections based on the number of queued jobs.
216
217 Limit new connections based on the number of jobs currently queued for
218 processing (see IKE_SA_INIT DROPPING).
219
220charon.initiator_only = no
221 Causes charon daemon to ignore IKE initiation requests.
222
223charon.install_routes = yes
224 Install routes into a separate routing table for established IPsec tunnels.
225
226charon.install_virtual_ip = yes
227 Install virtual IP addresses.
228
229charon.install_virtual_ip_on
230 The name of the interface on which virtual IP addresses should be installed.
231
232 The name of the interface on which virtual IP addresses should be installed.
233 If not specified the addresses will be installed on the outbound interface.
234
235charon.integrity_test = no
236 Check daemon, libstrongswan and plugin integrity at startup.
237
238charon.interfaces_ignore
239 A comma-separated list of network interfaces that should be ignored, if
240 **interfaces_use** is specified this option has no effect.
241
242charon.interfaces_use
243 A comma-separated list of network interfaces that should be used by charon.
244 All other interfaces are ignored.
245
246charon.keep_alive = 20s
247 NAT keep alive interval.
248
0d4a5f6a
TB
249charon.keep_alive_dpd_margin = 0s
250 Number of seconds the keep alive interval may be exceeded before a DPD is
251 sent instead of a NAT keep alive (0 to disable). This is only useful if a
252 clock is used that includes time spent suspended (e.g. CLOCK_BOOTTIME).
253
5da20b3d
TB
254charon.leak_detective.detailed = yes
255 Includes source file names and line numbers in leak detective output.
256
257charon.leak_detective.usage_threshold = 10240
cc1d78b0
TB
258 Threshold in bytes for allocations to be included in usage reports (0 to
259 include all).
5da20b3d
TB
260
261charon.leak_detective.usage_threshold_count = 0
cc1d78b0
TB
262 Threshold in number of allocations for allocations to be included in usage
263 reports (0 to include all).
5da20b3d
TB
264
265charon.load
266 Plugins to load in the IKE daemon charon.
267
268charon.load_modular = no
269 Determine plugins to load via each plugin's load option.
270
271 If enabled, the list of plugins to load is determined via the value of the
272 _charon.plugins.<name>.load_ options. In addition to a simple boolean flag
273 that option may take an integer value indicating the priority of a plugin,
274 which would influence the order of a plugin in the plugin list (the default
275 is 1). If two plugins have the same priority their order in the default
276 plugin list is preserved. Enabled plugins not found in that list are ordered
277 alphabetically before other plugins with the same priority.
278
0cb8752b
TB
279charon.max_ikev1_exchanges = 3
280 Maximum number of IKEv1 phase 2 exchanges per IKE_SA to keep state about and
281 track concurrently.
282
5da20b3d
TB
283charon.max_packet = 10000
284 Maximum packet size accepted by charon.
285
349f7f24
MW
286charon.make_before_break = no
287 Initiate IKEv2 reauthentication with a make-before-break scheme.
288
289 Initiate IKEv2 reauthentication with a make-before-break instead of a
290 break-before-make scheme. Make-before-break uses overlapping IKE and
291 CHILD_SA during reauthentication by first recreating all new SAs before
292 deleting the old ones. This behavior can be beneficial to avoid connectivity
293 gaps during reauthentication, but requires support for overlapping SAs by
294 the peer. strongSwan can handle such overlapping SAs since version 5.3.0.
295
5da20b3d
TB
296charon.multiple_authentication = yes
297 Enable multiple authentication exchanges (RFC 4739).
298
299charon.nbns1
300 WINS servers assigned to peer via configuration payload (CP).
301
302charon.nbns2
303 WINS servers assigned to peer via configuration payload (CP).
304
305charon.port = 500
306 UDP port used locally. If set to 0 a random port will be allocated.
307
308charon.port_nat_t = 4500
309 UDP port used locally in case of NAT-T. If set to 0 a random port will be
310 allocated. Has to be different from **charon.port**, otherwise a random
311 port will be allocated.
312
597e8c9e 313charon.prefer_best_path = no
ca280574 314 Whether to prefer updating SAs to the path with the best route.
597e8c9e
MW
315
316 By default, charon keeps SAs on the routing path with addresses it
317 previously used if that path is still usable. By setting this option to
318 yes, it tries more aggressively to update SAs with MOBIKE on routing
319 priority changes using the cheapest path. This adds more noise, but allows
320 to dynamically adapt SAs to routing priority changes. This option has no
321 effect if MOBIKE is not supported or disabled.
322
0a954d67
TB
323charon.prefer_configured_proposals = yes
324 Prefer locally configured proposals for IKE/IPsec over supplied ones as
325 responder (disabling this can avoid keying retries due to INVALID_KE_PAYLOAD
326 notifies).
327
3bf98189 328charon.prefer_temporary_addrs = no
9f12b8a6
TB
329 Controls whether permanent or temporary IPv6 addresses are used as source,
330 or announced as additional addresses if MOBIKE is used.
331
332 By default, permanent IPv6 source addresses are preferred over temporary
333 ones (RFC 4941), to make connections more stable. Enable this option to
334 reverse this.
335
336 It also affects which IPv6 addresses are announced as additional addresses
337 if MOBIKE is used. If the option is disabled, only permanent addresses are
338 sent, and only temporary ones if it is enabled.
3bf98189 339
5da20b3d
TB
340charon.process_route = yes
341 Process RTM_NEWROUTE and RTM_DELROUTE events.
342
343charon.processor.priority_threads {}
344 Section to configure the number of reserved threads per priority class
345 see JOB PRIORITY MANAGEMENT in **strongswan.conf**(5).
346
770f4cce
TB
347charon.rdn_matching = strict
348 How RDNs in subject DNs of certificates are matched against configured
349 identities (_strict_, _reordered_, or _relaxed_).
350
351 How RDNs in subject DNs of certificates are matched against configured
352 identities. Possible values are _strict_ (the default), _reordered_, and
353 _relaxed_. With _strict_ the number, type and order of all RDNs has to
354 match, wildcards (*) for the values of RDNs are allowed (that's the case
355 for all three variants). Using _reordered_ also matches DNs if the RDNs
356 appear in a different order, the number and type still has to match.
357 Finally, _relaxed_ also allows matches of DNs that contain more RDNs than
358 the configured identity (missing RDNs are treated like a wildcard match).
359
360 Note that _reordered_ and _relaxed_ impose a considerable overhead on memory
a9fcf280 361 usage and runtime, in particular, for mismatches, compared to _strict_.
770f4cce 362
5da20b3d
TB
363charon.receive_delay = 0
364 Delay in ms for receiving packets, to simulate larger RTT.
365
366charon.receive_delay_response = yes
367 Delay response messages.
368
369charon.receive_delay_request = yes
370 Delay request messages.
371
372charon.receive_delay_type = 0
373 Specific IKEv2 message type to delay, 0 for any.
374
375charon.replay_window = 32
376 Size of the AH/ESP replay window, in packets.
377
378charon.retransmit_base = 1.8
379 Base to use for calculating exponential back off, see IKEv2 RETRANSMISSION
380 in **strongswan.conf**(5).
381
382charon.retransmit_timeout = 4.0
383 Timeout in seconds before sending first retransmit.
384
385charon.retransmit_tries = 5
386 Number of times to retransmit a packet before giving up.
387
389e4b8e
TB
388charon.retransmit_jitter = 0
389 Maximum jitter in percent to apply randomly to calculated retransmission
390 timeout (0 to disable).
391
392charon.retransmit_limit = 0
393 Upper limit in seconds for calculated retransmission timeout (0 to disable).
394
5da20b3d 395charon.retry_initiate_interval = 0
99b1a1a1
TB
396 Interval in seconds to use when retrying to initiate an IKE_SA (e.g. if DNS
397 resolution failed), 0 to disable retries.
5da20b3d
TB
398
399charon.reuse_ikesa = yes
24ab8530 400 Initiate CHILD_SA within existing IKE_SAs (always enabled for IKEv1).
5da20b3d
TB
401
402charon.routing_table
403 Numerical routing table to install routes to.
404
405charon.routing_table_prio
406 Priority of the routing table.
407
4ea61dcb
TE
408charon.reqid_base = 1
409 Value of the first reqid to be automatically assigned to a CHILD_SA.
410
6f97c0d5
TB
411charon.rsa_pss = no
412 Whether to use RSA with PSS padding instead of PKCS#1 padding by default.
413
747e8409
AS
414charon.rsa_pss_trailerfield = no
415 Whether to encode an explicit trailerField value of 0x01 in the RSA-PSS
416 algorithmIdentifier (CONTEXT3) or using the DEFAULT value by omitting it.
417
5da20b3d
TB
418charon.send_delay = 0
419 Delay in ms for sending packets, to simulate larger RTT.
420
421charon.send_delay_response = yes
422 Delay response messages.
423
424charon.send_delay_request = yes
425 Delay request messages.
426
427charon.send_delay_type = 0
428 Specific IKEv2 message type to delay, 0 for any.
429
430charon.send_vendor_id = no
431 Send strongSwan vendor ID payload
432
fff3576b
TB
433charon.signature_authentication = yes
434 Whether to enable Signature Authentication as per RFC 7427.
435
b67ae0f8
TB
436charon.signature_authentication_constraints = yes
437 Whether to enable constraints against IKEv2 signature schemes.
438
439 If enabled, signature schemes configured in _rightauth_, in addition to
440 getting used as constraints against signature schemes employed in the
441 certificate chain, are also used as constraints against the signature scheme
442 used by peers during IKEv2.
443
62d43ea6
TB
444charon.spi_label = 0x0000000000000000
445 Value mixed into the local IKE SPIs after applying _spi_mask_.
446
447charon.spi_mask = 0x0000000000000000
448 Mask applied to local IKE SPIs before mixing in _spi_label_ (bits set will
449 be replaced with _spi_label_).
450
6d86d0f5
TB
451charon.spi_min = 0xc0000000
452 The lower limit for SPIs requested from the kernel for IPsec SAs.
453
db12675e
TB
454 The lower limit for SPIs requested from the kernel for IPsec SAs. Should not
455 be set lower than 0x00000100 (256), as SPIs between 1 and 255 are reserved
456 by IANA.
457
6d86d0f5
TB
458charon.spi_max = 0xcfffffff
459 The upper limit for SPIs requested from the kernel for IPsec SAs.
460
da7cb769
TB
461charon.start-scripts {}
462 Section containing a list of scripts (name = path) that are executed when
463 the daemon is started.
464
465charon.stop-scripts {}
466 Section containing a list of scripts (name = path) that are executed when
467 the daemon is terminated.
468
1b98f858 469charon.threads = 16
5da20b3d
TB
470 Number of worker threads in charon.
471
472 Number of worker threads in charon. Several of these are reserved for long
473 running tasks in internal modules and plugins. Therefore, make sure you
474 don't set this value too low. The number of idle worker threads listed in
475 _ipsec statusall_ might be used as indicator on the number of reserved
476 threads.
477
478charon.tls.cipher
479 List of TLS encryption ciphers.
480
481charon.tls.key_exchange
482 List of TLS key exchange methods.
483
484charon.tls.mac
485 List of TLS MAC algorithms.
486
487charon.tls.suites
488 List of TLS cipher suites.
489
e5b65657
PK
490charon.tls.ke_group
491 List of TLS key exchange groups.
492
e3757300
PK
493charon.tls.signature
494 List of TLS signature schemes.
495
a4a128bd
SL
496charon.tls.send_certreq_authorities = yes
497 Whether to include CAs in a server's CertificateRequest message.
498
499 Whether to include CAs in a server's CertificateRequest message. May be
500 disabled if clients can't handle a long list of CAs.
501
a60e248b 502charon.tls.version_min = 1.2
663969dd
TB
503 Minimum TLS version to negotiate.
504
92aef122 505charon.tls.version_max = 1.2
663969dd
TB
506 Maximum TLS version to negotiate.
507
5da20b3d
TB
508charon.user
509 Name of the user the daemon changes to after startup.
510
511charon.x509.enforce_critical = yes
512 Discard certificates with unsupported or unknown critical extensions.