2 Options for the charon IKE daemon.
4 Options for the charon IKE daemon.
6 **Note**: Many of the options in this section also apply to **charon-cmd**
7 and other **charon** derivatives. Just use their respective name (e.g.
8 **charon-cmd** instead of **charon**). For many options defaults can be
9 defined in the **libstrongswan** section.
11 charon.accept_unencrypted_mainmode_messages = no
12 Accept unencrypted ID and HASH payloads in IKEv1 Main Mode.
14 Accept unencrypted ID and HASH payloads in IKEv1 Main Mode.
16 Some implementations send the third Main Mode message unencrypted, probably
17 to find the PSKs for the specified ID for authentication. This is very
18 similar to Aggressive Mode, and has the same security implications: A
19 passive attacker can sniff the negotiated Identity, and start brute forcing
20 the PSK using the HASH payload.
22 It is recommended to keep this option to no, unless you know exactly
23 what the implications are and require compatibility to such devices (for
24 example, some SonicWall boxes).
26 charon.block_threshold = 5
27 Maximum number of half-open IKE_SAs for a single peer IP.
29 charon.cert_cache = yes
30 Whether relations in validated certificate chains should be cached in
33 charon.cisco_unity = no
34 Send Cisco Unity vendor ID payload (IKEv1 only).
36 charon.close_ike_on_child_failure = no
37 Close the IKE_SA if setup of the CHILD_SA along with IKE_AUTH failed.
39 charon.cookie_threshold = 10
40 Number of half-open IKE_SAs that activate the cookie mechanism.
42 charon.crypto_test.bench = no
43 Benchmark crypto algorithms and order them by efficiency.
45 charon.crypto_test.bench_size = 1024
46 Buffer size used for crypto benchmark.
48 charon.crypto_test.bench_time = 50
49 Number of iterations to test each algorithm.
51 charon.crypto_test.on_add = no
52 Test crypto algorithms during registration (requires test vectors provided
53 by the _test-vectors_ plugin).
55 charon.crypto_test.on_create = no
56 Test crypto algorithms on each crypto primitive instantiation.
58 charon.crypto_test.required = no
59 Strictly require at least one test vector to enable an algorithm.
61 charon.crypto_test.rng_true = no
62 Whether to test RNG with TRUE quality; requires a lot of entropy.
64 charon.dh_exponent_ansi_x9_42 = yes
65 Use ANSI X9.42 DH exponent size or optimum size matched to cryptographic
69 DNS server assigned to peer via configuration payload (CP).
72 DNS server assigned to peer via configuration payload (CP).
74 charon.dos_protection = yes
75 Enable Denial of Service protection using cookies and aggressiveness checks.
77 charon.ecp_x_coordinate_only = yes
78 Compliance with the errata for RFC 4753.
80 charon.flush_auth_cfg = no
81 Free objects during authentication (might conflict with plugins).
83 If enabled objects used during authentication (certificates, identities
84 etc.) are released to free memory once an IKE_SA is established. Enabling
85 this might conflict with plugins that later need access to e.g. the used
88 charon.fragment_size = 512
89 Maximum size (in bytes) of a sent fragment when using the proprietary IKEv1
90 fragmentation extension.
93 Name of the group the daemon changes to after startup.
95 charon.half_open_timeout = 30
96 Timeout in seconds for connecting IKE_SAs (also see IKE_SA_INIT DROPPING).
98 charon.hash_and_url = no
99 Enable hash and URL support.
101 charon.host_resolver.max_threads = 3
102 Maximum number of concurrent resolver threads (they are terminated if
105 charon.host_resolver.min_threads = 0
106 Minimum number of resolver threads to keep around.
108 charon.i_dont_care_about_security_and_use_aggressive_mode_psk = no
109 Allow IKEv1 Aggressive Mode with pre-shared keys as responder.
111 If enabled responders are allowed to use IKEv1 Aggressive Mode with
112 pre-shared keys, which is discouraged due to security concerns (offline
113 attacks on the openly transmitted hash of the PSK).
115 charon.ignore_routing_tables
116 A space-separated list of routing tables to be excluded from route lookups.
118 charon.ikesa_limit = 0
119 Maximum number of IKE_SAs that can be established at the same time before
120 new connection attempts are blocked.
122 charon.ikesa_table_segments = 1
123 Number of exclusively locked segments in the hash table.
125 charon.ikesa_table_size = 1
126 Size of the IKE_SA hash table.
128 charon.inactivity_close_ike = no
129 Whether to close IKE_SA if the only CHILD_SA closed due to inactivity.
131 charon.init_limit_half_open = 0
132 Limit new connections based on the current number of half open IKE_SAs, see
133 IKE_SA_INIT DROPPING in **strongswan.conf**(5).
135 charon.init_limit_job_load = 0
136 Limit new connections based on the number of queued jobs.
138 Limit new connections based on the number of jobs currently queued for
139 processing (see IKE_SA_INIT DROPPING).
141 charon.initiator_only = no
142 Causes charon daemon to ignore IKE initiation requests.
144 charon.install_routes = yes
145 Install routes into a separate routing table for established IPsec tunnels.
147 charon.install_virtual_ip = yes
148 Install virtual IP addresses.
150 charon.install_virtual_ip_on
151 The name of the interface on which virtual IP addresses should be installed.
153 The name of the interface on which virtual IP addresses should be installed.
154 If not specified the addresses will be installed on the outbound interface.
156 charon.integrity_test = no
157 Check daemon, libstrongswan and plugin integrity at startup.
159 charon.interfaces_ignore
160 A comma-separated list of network interfaces that should be ignored, if
161 **interfaces_use** is specified this option has no effect.
163 charon.interfaces_use
164 A comma-separated list of network interfaces that should be used by charon.
165 All other interfaces are ignored.
167 charon.keep_alive = 20s
168 NAT keep alive interval.
170 charon.leak_detective.detailed = yes
171 Includes source file names and line numbers in leak detective output.
173 charon.leak_detective.usage_threshold = 10240
174 Threshold in bytes for leaks to be reported (0 to report all).
176 charon.leak_detective.usage_threshold_count = 0
177 Threshold in number of allocations for leaks to be reported (0 to report
181 Plugins to load in the IKE daemon charon.
183 charon.load_modular = no
184 Determine plugins to load via each plugin's load option.
186 If enabled, the list of plugins to load is determined via the value of the
187 _charon.plugins.<name>.load_ options. In addition to a simple boolean flag
188 that option may take an integer value indicating the priority of a plugin,
189 which would influence the order of a plugin in the plugin list (the default
190 is 1). If two plugins have the same priority their order in the default
191 plugin list is preserved. Enabled plugins not found in that list are ordered
192 alphabetically before other plugins with the same priority.
194 charon.max_packet = 10000
195 Maximum packet size accepted by charon.
197 charon.multiple_authentication = yes
198 Enable multiple authentication exchanges (RFC 4739).
201 WINS servers assigned to peer via configuration payload (CP).
204 WINS servers assigned to peer via configuration payload (CP).
207 UDP port used locally. If set to 0 a random port will be allocated.
209 charon.port_nat_t = 4500
210 UDP port used locally in case of NAT-T. If set to 0 a random port will be
211 allocated. Has to be different from **charon.port**, otherwise a random
212 port will be allocated.
214 charon.prefer_temporary_addrs = no
215 By default public IPv6 addresses are preferred over temporary ones (RFC
216 4941), to make connections more stable. Enable this option to reverse this.
218 charon.process_route = yes
219 Process RTM_NEWROUTE and RTM_DELROUTE events.
221 charon.processor.priority_threads {}
222 Section to configure the number of reserved threads per priority class
223 see JOB PRIORITY MANAGEMENT in **strongswan.conf**(5).
225 charon.receive_delay = 0
226 Delay in ms for receiving packets, to simulate larger RTT.
228 charon.receive_delay_response = yes
229 Delay response messages.
231 charon.receive_delay_request = yes
232 Delay request messages.
234 charon.receive_delay_type = 0
235 Specific IKEv2 message type to delay, 0 for any.
237 charon.replay_window = 32
238 Size of the AH/ESP replay window, in packets.
240 charon.retransmit_base = 1.8
241 Base to use for calculating exponential back off, see IKEv2 RETRANSMISSION
242 in **strongswan.conf**(5).
244 charon.retransmit_timeout = 4.0
245 Timeout in seconds before sending first retransmit.
247 charon.retransmit_tries = 5
248 Number of times to retransmit a packet before giving up.
250 charon.retry_initiate_interval = 0
251 Interval to use when retrying to initiate an IKE_SA (e.g. if DNS resolution
252 failed), 0 to disable retries.
254 charon.reuse_ikesa = yes
255 Initiate CHILD_SA within existing IKE_SAs.
258 Numerical routing table to install routes to.
260 charon.routing_table_prio
261 Priority of the routing table.
263 charon.send_delay = 0
264 Delay in ms for sending packets, to simulate larger RTT.
266 charon.send_delay_response = yes
267 Delay response messages.
269 charon.send_delay_request = yes
270 Delay request messages.
272 charon.send_delay_type = 0
273 Specific IKEv2 message type to delay, 0 for any.
275 charon.send_vendor_id = no
276 Send strongSwan vendor ID payload
279 Number of worker threads in charon.
281 Number of worker threads in charon. Several of these are reserved for long
282 running tasks in internal modules and plugins. Therefore, make sure you
283 don't set this value too low. The number of idle worker threads listed in
284 _ipsec statusall_ might be used as indicator on the number of reserved
288 List of TLS encryption ciphers.
290 charon.tls.key_exchange
291 List of TLS key exchange methods.
294 List of TLS MAC algorithms.
297 List of TLS cipher suites.
300 Name of the user the daemon changes to after startup.
302 charon.x509.enforce_critical = yes
303 Discard certificates with unsupported or unknown critical extensions.