summaryrefslogtreecommitdiff
path: root/sbin/iked/iked.conf.5
AgeCommit message (Collapse)Author
2024-11-04add a "natt" option that forces negotiation of nat-t (and udpencap).David Gwynne
this is like the -t command line option on iked itself, but you get to keep the ike listener on port 500 and you can enable this on specific policies instead of all of them. this is useful if you're dealing with an org that can't firewall ESP traffic well and so you need to force the traffic to be udp encapsulated even if there's no NAT involved. ok markus@ tobhe@
2024-07-13grammar/macro fixes for the radius text;Jason McIntyre
2024-07-13Add RADIUS support. Authentication, accounting, and "DynamicYASUOKA Masahiko
Authorization Extensions"(DAE) are supported. feedback markus stu ok tobhe
2024-04-13document "psk file path" notation; from josh rickmarJason McIntyre
ok tobhe
2022-07-22add missing full stop;Jason McIntyre
2022-07-22Include an OpenIKED Vendor ID payload in the initial handshake. This willTobias Heider
make it easier to handle interoperability problems with older versions in the future. The ID is constructed from the string "OpenIKED-" followed by the version number. Sending of the vendor ID payload can be disabled by specifying "set novendorid" in iked.conf(5). ok markus@ bluhm@
2022-04-13Document sntrup761x25519 key exchange.Tobias Heider
2022-02-06remove please from manual pagesJonathan Gray
ok jmc@ sthen@ millert@
2021-11-13The key/nonce disclaimers were copied from ipsec.conf.5 but aren't relevantTobias Heider
to iked. Encryption keys and nonces are generated by the handshake and don't have to be supplied in the config.
2021-11-09Use more sensible transforms in example config.Tobias Heider
2021-11-05Clarify iface option.Tobias Heider
2021-11-04Clarify "aes" will accept keys which length is in 128:256 bits. AlsoYASUOKA Masahiko
correct "cast" in ipsec.conf.5 to "cast128", add missing "chacha20-poly1305", and sync iked.conf.5 and ipsec.conf.5 some places. ok jmc sthen
2021-10-26Make proto config option accept a list to allow specifying multipleTobias Heider
protocols for a single policy, e.g. "proto { ipencap, ipv6 }". feedback and ok benno@ ok patrick@
2021-08-03Increase default data bytes limit for Child SAs to 4 GB.tobhe
Lower limits lead to excessive rekeying and lost data in high performance setups without much benefit. Brought up by mvs@ ok patrick@ sthen@
2021-04-11Document 'request' option to request additional configuration payloads.tobhe
ok patrick@
2021-02-13Add dynamic address configuration for roadwarrior clients.tobhe
The new 'iface' config option can be used to specify an interface for the virtual addresses received from the peer. Routes are automatically added based on the configured flows. Input from sthen@ and claudio@ ok patrick@
2021-01-24hmac-sha2-384 and hmac-sha2-512 are enabled by default.tobhe
2021-01-23Fix typos.tobhe
From Ryan Kavanagh ok patrick@
2020-12-28Add back keyword "any" to match any IP address, which actually workstobhe
after recent fixes.
2020-12-11The keyword "any" does not actually work properly for traffic selectors.tobhe
To match all traffic use 0.0.0.0/0 or ::/0. ok patrick@
2020-11-15Document new 'dynamic' keyword to create flows from or to a dynamicallytobhe
assigned address.
2020-09-23Add new 'set cert_partial_chain' config option to allow verification oftobhe
partial certificate chains if a trusted intermediate CA is found in /etc/iked/ca/. ok patrick@
2020-08-26Allow disabling DPD liveness checks by setting dpd_check_interval to 0.tobhe
ok patrick@
2020-08-25Add dpd_check_interval configuration option. If for any IKE SA no IPsectobhe
or IKE message has been received within the specified time interval, iked will start sending DPD messages. ok patrick@
2020-08-23Add a new configuration option to limit the number of connections fortobhe
each peer (identified by their 'dstid'). When 'set enforcesingleikesa' is enabled, each peer can only have one active IKE SA at a time. On successful authentication of a new connection, the old IKE SA is automatically deleted. ok patrick@
2020-08-21Use trusted CA from /etc/iked/ca/ as OCSP issuer to get rid oftobhe
/etc/iked/ocsp/issuer.crt. Try to get the OCSP url from the CA/issuer certificate, otherwise use the URL configured in 'set ocsp' in iked.conf. ok patrick@
2020-08-18Add optional time-stamp validaten for ocsp. The new optional 'tolerate'tobhe
parameter specifies how many seconds leeway are allowed in the check. The optional maxage parameter indicates the allowed maximum age of the `thisUpdate' OCSP attribute value. ok patrick@
2020-07-21Provide GRE over transport mode examplekn
First transport mode for child SAs was implemented, then a few interoperability issues have been identified with peers other than iked, now tobhe fixed pubkey (`rsa' ikeauth, default) usage based on this so this "just works". Feedback tobhe deraadt sthen OK tobhe
2020-07-10table fix;Jason McIntyre
2020-07-10Document which crypto transforms are enabled by default.tobhe
2020-05-26Add AES-GCM mode ciphers (IANA IDs 19 and 20) for IKEv2.tobhe
They can be configured with the new ikesa enc options aes-128-gcm, aes-256-gcm, aes-128-gcm-12 and aes-256-gcm-12. Tested with Strongswan by Stephan Mendling and myself Tested with Juniper SRX by remi@ ok sthen@, patrick@
2020-05-01Clarify global 'set active' and 'set passive' options and how theytobhe
interact with the per-policy active/passive options. ok kn@
2020-04-28Remove support for insecure EC2N groups. Clarify which Diffie-Hellmantobhe
groups are not recommended to use and are only supported for backwards compatibility. Feedback from sthen@ ok kn@
2020-04-27Add curve25519 IANA group number.tobhe
2020-04-23 ce examples of "Ar arg Ar arg" with "Ar arg arg" and stop the spread;Jason McIntyre
2020-04-23Add support for switching rdomain on IPsec encryption/decryption.tobhe
It can be configured per policy with the new 'rdomain' option (see iked.conf(5)). Only the unencrypted (inner) rdomain has to be configured, the encrypted rdomain is always the one the responsible iked instance is running in. The configured rdomain must exist before iked activates the IPsec SAs, otherwise pfkey will return an error. ok markus@, patrick@
2020-02-21Add transport mode for child SAs. This is useful for GRE over IPsec andtobhe
similar settings to prevent double encapsulation. ok kn@
2020-02-16Quote variables in pf tag stringskn
Macros are expanded by the parser at parse time, whereas variables are read as ordinary strings and left unmodified; hence, quoted `"$domain"' gets passed to the daemon as is, which substitutes proper values before passing it to the kernel. `$domain' without quotes never makes it to the daemon, that is with `domain = foo' somewhere else "foo" is being eventually passed unmodified to the kernel. jmc prompted for a proper explanation and provided the final wording. OK tobhe jmc
2020-02-10briefly mention /etc/examples/ in the FILES section of all theIngo Schwarze
manual pages that document the corresponding configuration files; OK jmc@, and general direction discussed with many
2019-12-01Explain how ipcomp can be enabled.tobhe
ok reyk@
2019-11-12fix a formatting warning;Jason McIntyre
2019-11-12Add configuration options to explicitly specify ESN support for child SAs.tobhe
The default behaviour remains unchanged. ok mikeb@ bluhm@
2019-08-24Clarify "protected-subnet" option.tobhe
Explain the use of the option (according to the RFC) and make clear it is not usually needed for subnets specified in "from" and "to" options. ok sthen@
2019-08-16Add explanation for the [IKE/ESP only] column of the transform table.tobhe
Ok kn@
2019-05-11Add support for IKEv2 Message Fragmentation as defined in RFC 7383.Patrick Wildt
ok sthen@
2019-04-02When curve25519 was added to iked, it was based on the internet-draft andStuart Henderson
used a private-use group number. Switch to the group number assigned in RFC8031 as used in other implementations. "this is the right time" deraadt@ "I like the idea" reyk@ If you use iked<>iked and have configured curve25519 in iked.conf (this is not the default), you can switch to another PFS group before updating then switch back. OpenBSD 6.3+ allows multiple "ikesa" lines so the initiator can choose which to use.
2018-01-31Add support for specifying multiple transforms within a single proposal.Patrick Wildt
This gives us more flexibilty for negotiating with other IKEv2 setups. Tested by and ok sthen@
2018-01-24Implement support for specifying multiple proposals. This means we canPatrick Wildt
have a higher flexibility in negotiating with other peers, or even ease migration from one proposal to a more secure one. ok sthen@
2017-11-27Implement MOBIKE (RFC 4555) support in iked(8), with us acting asPatrick Wildt
responder. In practice this support means that clients like iPhones can roam in different networks (LTE, WiFi) and change their external addresses without having to re-do the whole handshake. It allows the client to choose how and when to change the external tunnel endpoint addresses on demand, depending on which network is better or even is connected at all. ok sthen@ tweaks from jmc@ tested by a handful
2017-06-01Expand $eapid in iked tags, allowing PF rules to be written based on EAPStuart Henderson
identity (username). OK mikeb@