1 .TH IPSEC.CONF 5 "20 Jan 2006"
2 .\" RCSID $Id: ipsec.conf.5,v 1.2 2006/01/22 15:33:46 as Exp $
4 ipsec.conf \- IPsec configuration and connections
9 specifies most configuration and control information for the
10 strongSwan IPsec subsystem.
11 (The major exception is secrets for authentication;
13 .IR ipsec.secrets (5).)
14 Its contents are not security-sensitive
16 manual keying is being done for more than just testing,
17 in which case the encryption/authentication keys in the
18 descriptions for the manually-keyed connections are very sensitive
19 (and those connection descriptions
20 are probably best kept in a separate file,
21 via the include facility described below).
23 The file is a text file, consisting of one or more
25 White space followed by
27 followed by anything to the end of the line
28 is a comment and is ignored,
29 as are empty lines which are not within a section.
33 and a file name, separated by white space,
34 is replaced by the contents of that file,
35 preceded and followed by empty lines.
36 If the file name is not a full pathname,
37 it is considered to be relative to the directory containing the
39 Such inclusions can be nested.
40 Only a single filename may be supplied, and it may not contain white space,
41 but it may include shell wildcards (see
48 The intention of the include facility is mostly to permit keeping
49 information on connections, or sets of connections,
50 separate from the main configuration file.
51 This permits such connection descriptions to be changed,
52 copied to the other security gateways involved, etc.,
53 without having to constantly extract them from the configuration
54 file and then insert them back into it.
57 parameter (described below) which permits splitting a single logical
58 section (e.g. a connection description) into several actual sections.
60 The first significant line of the file must specify the version
61 of this specification that it conforms to:
66 begins with a line of the form:
73 indicates what type of section follows, and
75 is an arbitrary name which distinguishes the section from others
77 (Names must start with a letter and may contain only
78 letters, digits, periods, underscores, and hyphens.)
79 All subsequent non-empty lines
80 which begin with white space are part of the section;
81 comments within a section must begin with white space too.
82 There may be only one section of a given type with a given name.
84 Lines within the section are generally of the form
86 \ \ \ \ \ \fIparameter\fB=\fIvalue\fR
88 (note the mandatory preceding white space).
89 There can be white space on either side of the
91 Parameter names follow the same syntax as section names,
92 and are specific to a section type.
93 Unless otherwise explicitly specified,
94 no parameter name may appear more than once in a section.
98 stands for the system default value (if any) of the parameter,
99 i.e. it is roughly equivalent to omitting the parameter line entirely.
102 may contain white space only if the entire
104 is enclosed in double quotes (\fB"\fR);
107 cannot itself contain a double quote,
108 nor may it be continued across more than one line.
110 Numeric values are specified to be either an ``integer''
111 (a sequence of digits) or a ``decimal number''
112 (sequence of digits optionally followed by `.' and another sequence of digits).
114 There is currently one parameter which is available in any type of
118 the value is a section name;
119 the parameters of that section are appended to this section,
120 as if they had been written as part of it.
121 The specified section must exist, must follow the current one,
122 and must have the same section type.
123 (Nesting is permitted,
124 and there may be more than one
127 although it is forbidden to append the same section more than once.)
128 This allows, for example, keeping the encryption keys
129 for a connection in a separate file
130 from the rest of the description, by using both an
136 Parameter names beginning with
144 are reserved for user extensions and will never be assigned meanings
146 Parameters with such names must still observe the syntax rules
147 (limits on characters used in the name;
148 no white space in a non-quoted value;
149 no newlines or double quotes within the value).
150 All other as-yet-unused parameter names are reserved for future IPsec
155 specifies defaults for sections of the same type.
156 For each parameter in it,
157 any section of that type which does not have a parameter of the same name
158 gets a copy of the one from the
161 There may be multiple
163 sections of a given type,
164 but only one default may be supplied for any specific parameter name,
167 sections of a given type must precede all non-\c
169 sections of that type.
171 sections may not contain the
175 Currently there are three types of sections:
178 section specifies general configuration information for IPsec, a
180 section specifies an IPsec connection, while a
182 section specifies special properties a certification authority.
187 .IR "connection specification" ,
188 defining a network connection to be made using IPsec.
189 The name given is arbitrary, and is used to identify the connection to
192 .IR ipsec_manual (8).
193 Here's a simple example:
201 leftsubnet=10.0.1.0/24
202 leftnexthop=172.16.55.66
204 rightsubnet=10.0.2.0/24
205 rightnexthop=172.16.88.99
210 A note on terminology...
211 In automatic keying, there are two kinds of communications going on:
212 transmission of user IP packets, and gateway-to-gateway negotiations for
213 keying, rekeying, and general control.
214 The data path (a set of ``IPsec SAs'') used for user packets is herein
215 referred to as the ``connection'';
216 the path used for negotiations (built with ``ISAKMP SAs'') is referred to as
217 the ``keying channel''.
219 To avoid trivial editing of the configuration file to suit it to each system
220 involved in a connection,
221 connection specifications are written in terms of
226 rather than in terms of local and remote.
227 Which participant is considered
232 IPsec figures out which one it is being run on based on internal information.
233 This permits using identical connection specifications on both ends.
234 There are cases where there is no symmetry; a good convention is to
237 for the local side and
239 for the remote side (the first letters are a good mnemonic).
241 Many of the parameters relate to one participant or the other;
244 are listed here, but every parameter whose name begins with
249 whose description is the same but with
255 Parameters are optional unless marked ``(required)'';
256 a parameter required for manual keying need not be included for
257 a connection which will use only automatic keying, and vice versa.
258 .SS "CONN PARAMETERS: GENERAL"
259 The following parameters are relevant to both automatic and manual keying.
260 Unless otherwise noted,
261 for a connection to work,
262 in general it is necessary for the two ends to agree exactly
263 on the values of these parameters.
266 the type of the connection; currently the accepted values
270 signifying a host-to-host, host-to-subnet, or subnet-to-subnet tunnel;
272 signifying host-to-host transport mode;
274 signifying that no IPsec processing should be done at all;
276 signifying that packets should be discarded; and
278 signifying that packets should be discarded and a diagnostic ICMP returned.
282 the IP address of the left participant's public-network interface,
283 in any form accepted by
284 .IR ipsec_ttoaddr (3)
285 or one of several magic values.
294 specification contains
297 will be filled in automatically with the local address
298 of the default-route interface (as determined at IPsec startup time);
299 this also overrides any value supplied for
310 signifies an address to be filled in (by automatic keying) during
318 are to be filled in (by automatic keying) from DNS data for
324 .B %opportunisticgroup
325 makes this a policy group conn: one that will be instantiated
326 into a regular or opportunistic conn for each CIDR block listed in the
327 policy group file with the same name as the conn.
330 private subnet behind the left participant, expressed as
331 \fInetwork\fB/\fInetmask\fR
332 (actually, any form acceptable to
333 .IR ipsec_ttosubnet (3));
334 if omitted, essentially assumed to be \fIleft\fB/32\fR,
335 signifying that the left end of the connection goes to the left participant only
338 next-hop gateway IP address for the left participant's connection
339 to the public network;
344 If the value is to be overridden by the
345 .B left=%defaultroute
347 an explicit value must
350 If that method is not being used,
356 .B interfaces=%defaultroute
361 the next-hop gateway address of the default-route interface
365 signifies a value to be filled in (by automatic keying)
366 with the peer's address.
367 Relevant only locally, other end need not agree on it.
370 what ``updown'' script to run to adjust routing and/or firewalling
371 when the status of the connection
373 .BR "ipsec _updown" ).
374 May include positional parameters separated by white space
375 (although this requires enclosing the whole string in quotes);
376 including shell metacharacters is unwise.
380 Relevant only locally, other end need not agree on it.
383 whether the left participant is doing forwarding-firewalling
384 (including masquerading) for traffic from \fIleftsubnet\fR,
385 which should be turned off (for traffic to the other subnet)
386 once the connection is established;
387 acceptable values are
391 May not be used in the same connection description with
393 Implemented as a parameter to the default
397 Relevant only locally, other end need not agree on it.
399 If one or both security gateways are doing forwarding firewalling
400 (possibly including masquerading),
401 and this is specified using the firewall parameters,
402 tunnels established with IPsec are exempted from it
403 so that packets can flow unchanged through the tunnels.
404 (This means that all subnets connected in this manner must have
405 distinct, non-overlapping subnet address blocks.)
406 This is done by the default
409 .IR ipsec_pluto (8)).
411 The implementation of this makes certain assumptions about firewall setup,
412 notably the use of the old
414 interface to the firewall.
415 In situations calling for more control,
416 it may be preferable for the user to supply his own
419 which makes the appropriate adjustments for his system.
420 .SS "CONN PARAMETERS: AUTOMATIC KEYING"
421 The following parameters are relevant only to automatic keying,
422 and are ignored in manual keying.
423 Unless otherwise noted,
424 for a connection to work,
425 in general it is necessary for the two ends to agree exactly
426 on the values of these parameters.
429 what operation, if any, should be done automatically at IPsec startup;
430 currently-accepted values are
436 (signifying that plus an
440 (signifying that plus an
450 (also the default) (signifying no automatic startup operation).
455 Relevant only locally, other end need not agree on it
456 (but in general, for an intended-to-be-permanent connection,
459 to ensure that any reboot causes immediate renegotiation).
462 whether authentication should be done as part of
463 ESP encryption, or separately using the AH protocol;
464 acceptable values are
470 how the two security gateways should authenticate each other;
471 acceptable values are
475 for RSA digital signatures (the default),
479 if negotiation is never to be attempted or accepted (useful for shunt-only conns).
480 Digital signatures are superior in every way to shared secrets.
483 whether IPComp compression of content is proposed on the connection
484 (link-level compression does not work on encrypted data,
485 so to be effective, compression must be done \fIbefore\fR encryption);
486 acceptable values are
491 The two ends need not agree.
494 causes IPsec to propose both compressed and uncompressed,
495 and prefer compressed.
498 prevents IPsec from proposing compression;
499 a proposal to compress will still be accepted.
502 controls the use of the Dead Peer Detection protocol (DPD, RFC 3706) where
503 R_U_THERE notification messages (IKEv1) or empty INFORMATIONAL messages (IKEv2)
504 are periodically sent in order to check the
505 liveliness of the IPsec peer. The values
509 both activate DPD. If no activity is detected, all connections with a dead peer
510 are stopped and unrouted (
512 ) or put in the hold state (
518 which disables the active sending of R_U_THERE notifications.
519 Nevertheless pluto will always send the DPD Vendor ID during connection set up
520 in order to signal the readiness to act passively as a responder if the peer
521 wants to use DPD. For
523 does't make sense, as all messages are used to detect dead peers. If specified,
524 it has the same meaning as the default (
529 defines the period time interval with which R_U_THERE messages/INFORMATIONAL
530 exchanges are sent to the peer. These are only sent if no other traffic is
531 received. In IKEv2, a value of 0 sends no additional INFORMATIONAL
532 messages and uses only standard messages (such as those to rekey) to detect
536 defines the timeout interval, after which all connections to a peer are deleted
537 in case of inactivity. This only applies to IKEv1, in IKEv2 the default
538 retransmission timeout applies, as every exchange is used to detect dead peers.
541 what to do with packets when negotiation fails.
549 have the obvious meanings.
552 how long the keying channel of a connection (buzzphrase: ``ISAKMP SA'')
553 should last before being renegotiated.
556 method of key exchange;
557 which protocol should be used to initialize the connection. Connections marked with
559 are initiated with pluto, those marked with
561 with charon. An incoming request from the remote peer is handled by the correct
562 daemon, unaffected from the
564 setting. The default value
566 currently behaves exactly as
576 The two-ends-disagree case is similar to that of
580 how many attempts (a whole number or \fB%forever\fP) should be made to
581 negotiate a connection, or a replacement for one, before giving up
584 The value \fB%forever\fP
585 means ``never give up'' (obsolete: this can be written \fB0\fP).
586 Relevant only locally, other end need not agree on it.
589 how long a particular instance of a connection
590 (a set of encryption/authentication keys for user packets) should last,
591 from successful negotiation to expiry;
592 acceptable values are an integer optionally followed by
595 or a decimal number followed by
601 in minutes, hours, or days respectively)
606 Normally, the connection is renegotiated (via the keying channel)
608 The two ends need not exactly agree on
610 although if they do not,
611 there will be some clutter of superseded connections on the end
612 which thinks the lifetime is longer.
615 the distinguished name of a certificate authority which is required to
616 lie in the trust path going from the left participant's certificate up
617 to the root certification authority.
620 the path to the left participant's X.509 certificate. The file can be coded either in
621 PEM or DER format. OpenPGP certificates are supported as well.
622 Both absolute paths or paths relative to
623 .B /etc/ipsec.d/certs
624 are accepted. By default
628 to the distinguished name of the certificate's subject and
630 to the distinguished name of the certificate's issuer.
631 The left participant's ID can be overriden by specifying a
633 value which must be certified by the certificate, though.
636 a comma separated list of group names. If the
638 parameter is present then the peer must be a member of at least one
639 of the groups defined by the parameter. Group membership must be certified
640 by a valid attribute certificate stored in \fI/etc/ipsec.d/acerts\fP thas has been
641 issued to the peer by a trusted Authorization Authority stored in
642 \fI/etc/ipsec.d/aacerts\fP.
647 should be identified for authentication;
650 Can be an IP address (in any
651 .IR ipsec_ttoaddr (3)
653 or a fully-qualified domain name preceded by
655 (which is used as a literal string and not resolved).
658 stands for the current setting of \fImyid\fP.
659 This is set in \fBconfig setup\fP or by \fIipsec_whack\fP(8)), or, if not set,
660 it is the IP address in \fB%defaultroute\fP (if that is supported by a TXT record in its reverse domain), or otherwise
661 it is the system's hostname (if that is supported by a TXT record in its forward domain), or otherwise it is undefined.
664 the left participant's
665 public key for RSA signature authentication,
666 in RFC 2537 format using
667 .IR ipsec_ttodata (3)
671 means the same as not specifying a value (useful to override a default).
675 means that the key is extracted from a certificate.
678 means the key is to be fetched from DNS at the time it is needed.
681 means the key is to be fetched from DNS at the time
682 the connection description is read from
684 currently this will be treated as
689 .BR right=%opportunistic .
692 is currently treated as
697 The identity used for the left participant
698 must be a specific host, not
700 or another magic value.
702 if two connection descriptions
703 specify different public keys for the same
705 confusion and madness will ensue.
708 if present, a second public key.
709 Either key can authenticate the signature, allowing for key rollover.
716 whether Perfect Forward Secrecy of keys is desired on the connection's
718 (with PFS, penetration of the key-exchange protocol
719 does not compromise keys negotiated earlier);
720 acceptable values are
727 whether a connection should be renegotiated when it is about to expire;
728 acceptable values are
733 The two ends need not agree,
736 prevents Pluto from requesting renegotiation,
737 it does not prevent responding to renegotiation requested from the other end,
740 will be largely ineffective unless both ends agree on it.
743 maximum percentage by which
745 should be randomly increased to randomize rekeying intervals
746 (important for hosts with many connections);
747 acceptable values are an integer,
748 which may exceed 100,
756 after this random increase,
761 will suppress time randomization.
762 Relevant only locally, other end need not agree on it.
765 how long before connection expiry or keying-channel expiry
767 negotiate a replacement
768 begin; acceptable values as for
772 Relevant only locally, other end need not agree on it.
773 .SS "CONN PARAMETERS: MANUAL KEYING"
774 The following parameters are relevant only to manual keying,
775 and are ignored in automatic keying.
776 Unless otherwise noted,
777 for a connection to work,
778 in general it is necessary for the two ends to agree exactly
779 on the values of these parameters.
781 connection must specify at least one of AH or ESP.
786 required for manual keying)
787 the SPI number to be used for the connection (see
788 .IR ipsec_manual (8));
789 must be of the form \fB0x\fIhex\fB\fR,
792 is one or more hexadecimal digits
793 (note, it will generally be necessary to make
797 to be acceptable to KLIPS,
798 and use of SPIs in the range
805 required for manual keying)
806 the base number for the SPIs to be used for the connection (see
807 .IR ipsec_manual (8));
808 must be of the form \fB0x\fIhex\fB0\fR,
811 is one or more hexadecimal digits
812 (note, it will generally be necessary to make
816 for the resulting SPIs
817 to be acceptable to KLIPS,
818 and use of numbers in the range
823 ESP encryption/authentication algorithm to be used
824 for the connection, e.g.
826 (must be suitable as a value of
830 default is not to use ESP
834 (must be suitable as a value of
838 (may be specified separately for each direction using
846 ESP authentication key
847 (must be suitable as a value of
851 (may be specified separately for each direction using
859 ESP replay-window setting,
864 default, which turns off replay protection) to
866 relevant only if ESP authentication is being used
869 SPI to be used for the leftward ESP SA, overriding
870 automatic assignment using
874 typically a hexadecimal number beginning with
878 AH authentication algorithm to be used
879 for the connection, e.g.
881 (must be suitable as a value of
885 default is not to use AH
890 is present) AH authentication key
891 (must be suitable as a value of
895 (may be specified separately for each direction using
903 AH replay-window setting,
908 default, which turns off replay protection) to
912 SPI to be used for the leftward AH SA, overriding
913 automatic assignment using
917 typically a hexadecimal number beginning with
920 This are optional sections that can be used to assign special
921 parameters to a Certification Authority (CA).
924 currently can have either the value
931 defines a path to the CA certificate either relative to
932 \fI/etc/ipsec.d/cacerts\fP or as an absolute path.
935 defines a CRL distribution point (ldap, http, or file URI)
938 defines an alternative CRL distribution point (ldap, http, or file URI)
941 defines an ldap host.
945 .SH "CONFIG SECTIONS"
948 section known to the IPsec software is the one named
950 which contains information used when the software is being started
952 .IR ipsec_setup (8)).
960 interfaces="ipsec0=eth1 ipsec1=ppp0"
967 Parameters are optional unless marked ``(required)''.
968 The currently-accepted
976 the identity to be used for
979 is used in the implicit policy group conns and can be used as
980 an identity in explicit conns.
983 is set to the IP address in \fB%defaultroute\fP (if that is supported by a TXT record in its reverse domain), or otherwise
984 the system's hostname (if that is supported by a TXT record in its forward domain), or otherwise it is undefined.
985 An explicit value generally starts with ``\fB@\fP''.
988 virtual and physical interfaces for IPsec to use:
990 \fIvirtual\fB=\fIphysical\fR pair, a (quoted!) list of pairs separated
993 One of the pairs may be written as
995 which means: find the interface \fId\fR that the default route points to,
996 and then act as if the value was ``\fBipsec0=\fId\fR''.
1000 must be used to denote no interfaces.
1003 is used (implicitly or explicitly)
1004 information about the default route and its interface is noted for
1006 .IR ipsec_manual (8)
1008 .IR ipsec_auto (8).)
1013 should turn IP forwarding on
1014 (if it's not already on) as IPsec is started,
1015 and turn it off again (if it was off) as IPsec is stopped;
1016 acceptable values are
1020 For this to have full effect, forwarding must be
1021 disabled before the hardware interfaces are brought
1023 .B "net.ipv4.ip_forward\ =\ 0"
1025 .IR /etc/sysctl.conf ),
1026 because IPsec doesn't get control early enough to do that.
1031 should adjust the reverse path filtering mechanism for the
1032 physical devices to be used.
1033 Values are \fB%unchanged\fP (to leave it alone)
1034 or \fB0\fP, \fB1\fP, \fB2\fP (values to set it to).
1035 \fI/proc/sys/net/ipv4/conf/PHYS/rp_filter\fP
1036 is badly documented; it must be \fB0\fP in many cases
1037 for ipsec to function.
1038 The default value for the parameter is \fB0\fP.
1043 ``facility'' name and priority to use for
1044 startup/shutdown log messages,
1049 how much KLIPS debugging output should be logged.
1053 means no debugging output (the default).
1057 Otherwise only the specified types of output
1058 (a quoted list, names separated by white space) are enabled;
1059 for details on available debugging types, see
1060 .IR ipsec_klipsdebug (8).
1063 how much Pluto debugging output should be logged.
1067 means no debugging output (the default).
1071 Otherwise only the specified types of output
1072 (a quoted list, names without the
1075 separated by white space) are enabled;
1076 for details on available debugging types, see
1077 .IR ipsec_pluto (8).
1080 how much Charon debugging output should be logged.
1081 A comma separated list containing type level/pairs may
1083 .B dmn 3, ike 1, net -1.
1084 Acceptable values for types are
1085 .B dmn, mgr, ike, chd, job, cfg, knl, net, enc, lib
1086 and the level is one of
1087 .B -1, 0, 1, 2, 3, 4
1088 (for silent, audit, control, controlmore, raw, private)
1091 additional options to pass to pluto upon startup. See
1092 .IR ipsec_pluto (8).
1095 do not use syslog, but rather log to stderr, and direct stderr to the
1099 in what directory should things started by
1101 (notably the Pluto daemon) be allowed to
1103 The empty value (the default) means they are not
1107 which manually-keyed connections to set up at startup
1108 (empty, a name, or a quoted list of names separated by white space);
1110 .IR ipsec_manual (8).
1114 whether to start Pluto or not;
1120 (useful only in special circumstances).
1123 should Pluto wait for each
1124 negotiation attempt that is part of startup to
1125 finish before proceeding with the next?
1133 shell command to run before starting Pluto
1134 (e.g., to decrypt an encrypted copy of the
1137 It's run in a very simple way;
1138 complexities like I/O redirection are best hidden within a script.
1139 Any output is redirected for logging,
1140 so running interactive commands is difficult unless they use
1142 or equivalent for their interaction.
1146 shell command to run after starting Pluto
1147 (e.g., to remove a decrypted copy of the
1150 It's run in a very simple way;
1151 complexities like I/O redirection are best hidden within a script.
1152 Any output is redirected for logging,
1153 so running interactive commands is difficult unless they use
1155 or equivalent for their interaction.
1159 whether a tunnel's need to fragment a packet should be reported
1160 back with an ICMP message,
1161 in an attempt to make the sender lower his PMTU estimate;
1162 acceptable values are
1169 whether a tunnel packet's TOS field should be set to
1171 rather than copied from the user packet inside;
1172 acceptable values are
1179 whether a particular participant ID should be kept unique,
1180 with any new (automatically keyed)
1181 connection using an ID from a different IP address
1182 deemed to replace all old ones using that ID;
1183 acceptable values are
1188 Participant IDs normally \fIare\fR unique,
1189 so a new (automatically-keyed) connection using the same ID is
1190 almost invariably intended to replace an old one.
1193 value that the MTU of the ipsec\fIn\fR interface(s) should be set to,
1194 overriding IPsec's (large) default.
1195 This parameter is needed only in special situations.
1207 .SH CHOOSING A CONNECTION
1209 When choosing a connection to apply to an outbound packet caught with a
1211 the system prefers the one with the most specific eroute that
1212 includes the packet's source and destination IP addresses.
1213 Source subnets are examined before destination subnets.
1214 For initiating, only routed connections are considered. For responding,
1215 unrouted but added connections are considered.
1217 When choosing a connection to use to respond to a negotiation which
1218 doesn't match an ordinary conn, an opportunistic connection
1219 may be instantiated. Eventually, its instance will be /32 -> /32, but
1220 for earlier stages of the negotiation, there will not be enough
1221 information about the client subnets to complete the instantiation.
1225 /etc/ipsec.d/cacerts
1228 /etc/ipsec.d/aacerts
1232 ipsec(8), ipsec_ttoaddr(8), ipsec_auto(8), ipsec_manual(8), ipsec_rsasigkey(8)
1234 Written for the FreeS/WAN project
1235 <http://www.freeswan.org>
1236 by Henry Spencer. Extended for the strongSwan project
1237 <http://www.strongswan.org>
1249 strongSwan blocks outbound packets using eroutes, but assumes inbound
1250 blocking is handled by the firewall. strongSwan offers firewall hooks
1251 via an ``updown'' script. However, the default
1253 provides no help in controlling a modern firewall.
1255 Including attributes of the keying channel
1256 (authentication methods,
1259 as an attribute of a connection,
1260 rather than of a participant pair, is dubious and incurs limitations.
1263 is not nearly as generous about the syntax of subnets,
1264 addresses, etc. as the usual strongSwan user interfaces.
1265 Four-component dotted-decimal must be used for all addresses.
1268 smart enough to translate bit-count netmasks to dotted-decimal form.
1270 It would be good to have a line-continuation syntax,
1271 especially for the very long lines involved in
1274 The ability to specify different identities,
1276 and public keys for different automatic-keyed connections
1277 between the same participants is misleading;
1278 this doesn't work dependably because the identity of the participants
1279 is not known early enough.
1280 This is especially awkward for the ``Road Warrior'' case,
1281 where the remote IP address is specified as
1283 and that is considered to be the ``participant'' for such connections.
1285 In principle it might be necessary to control MTU on an
1286 interface-by-interface basis,
1287 rather than with the single global override that
1291 A number of features which \fIcould\fR be implemented in
1292 both manual and automatic keying
1293 actually are not yet implemented for manual keying.
1294 This is unlikely to be fixed any time soon.
1296 If conns are to be added before DNS is available,
1297 \fBleft=\fP\fIFQDN\fP,
1298 \fBleftnextop=\fP\fIFQDN\fP,
1300 .B leftrsasigkey=%dnsonload
1303 does not actually use the public key for our side of a conn but it
1304 isn't generally known at a add-time which side is ours (Road Warrior
1305 and Opportunistic conns are currently exceptions).
1307 The \fBmyid\fP option does not affect explicit \fB ipsec auto \-\-add\fP or \fBipsec auto \-\-replace\fP commands for implicit conns.