summaryrefslogtreecommitdiff
path: root/sbin/iked/iked.conf.5
diff options
context:
space:
mode:
authorReyk Floeter <reyk@cvs.openbsd.org>2017-03-27 10:06:42 +0000
committerReyk Floeter <reyk@cvs.openbsd.org>2017-03-27 10:06:42 +0000
commite3affe111fdf78b3b570254f4a8bcac92e8e2264 (patch)
tree73ccda4a2c611b5451af51e88ec416c476c3f7fd /sbin/iked/iked.conf.5
parent650ec76b079154b185c886970968e2cc614b4e65 (diff)
Add support for RFC4754 (ECDSA) and RFC7427 authentication.
These modes provide stronger and more flexible ways for authentication: while RSA public key auth relies on SHA-1 hashes, the news modes use SHA2-256 and up to SHA2-512 hashes. Original diff from markus@ with patches from mikeb@ and me. OK mikeb@ patrick@
Diffstat (limited to 'sbin/iked/iked.conf.5')
-rw-r--r--sbin/iked/iked.conf.529
1 files changed, 22 insertions, 7 deletions
diff --git a/sbin/iked/iked.conf.5 b/sbin/iked/iked.conf.5
index a4b60844e78..68784f45161 100644
--- a/sbin/iked/iked.conf.5
+++ b/sbin/iked/iked.conf.5
@@ -1,4 +1,4 @@
-.\" $OpenBSD: iked.conf.5,v 1.47 2017/03/13 15:07:51 patrick Exp $
+.\" $OpenBSD: iked.conf.5,v 1.48 2017/03/27 10:06:41 reyk Exp $
.\"
.\" Copyright (c) 2010 - 2014 Reyk Floeter <reyk@openbsd.org>
.\" Copyright (c) 2004 Mathieu Sauve-Frankel All rights reserved.
@@ -15,7 +15,7 @@
.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\"
-.Dd $Mdocdate: March 13 2017 $
+.Dd $Mdocdate: March 27 2017 $
.Dt IKED.CONF 5
.Os
.Sh NAME
@@ -477,9 +477,14 @@ for kilo-, mega- and gigabytes accordingly.
Please note that rekeying must happen at least several times a day as
IPsec security heavily depends on frequent key renewals.
.It Op Ar ikeauth
-Specify the mode to mutually authenticate the peers.
-Non-psk modes will require to set up certificates and RSA public keys;
-see
+Specify a method to be used to authenticate the remote peer.
+.Xr iked 8
+will automatically determine a method based on public keys or certificates
+configured for the peer.
+.Ar ikeauth
+can be used to override this behaviour.
+Non-psk modes will require to set up certificates and RSA or ECDSA public
+keys; see
.Xr iked 8
for more information.
.Pp
@@ -491,14 +496,24 @@ The only supported EAP
is currently
.Ar MSCHAP-V2 .
The responder will use RSA public key authentication.
+.It Ic ecdsa256
+Use ECDSA with a 256-bit elliptic curve key and SHA2-256 for authentication.
+.It Ic ecdsa384
+Use ECDSA with a 384-bit elliptic curve key and SHA2-384 for authentication.
+.It Ic ecdsa521
+Use ECDSA with a 521-bit elliptic curve key and SHA2-512 for authentication.
.It Ic psk Ar string
Use a pre-shared key
.Ar string
or hex value (starting with 0x) for authentication.
+.It Ic rfc7427
+Only use RFC 7427 signatures for authentication.
+RFC 7427 signatures currently only support SHA2-256 as the hash.
.It Ic rsa
-Use RSA public key authentication.
-This is the default mode if no option is specified.
+Use RSA public key authentication with SHA1 as the hash.
.El
+.Pp
+The default is to allow any signature authentication.
.It Ic config Ar option address
Send one or more optional configuration payloads (CP) to the peer.
The configuration