diff options
author | Tobias Brunner <tobias@strongswan.org> | 2015-02-27 19:11:53 +0100 |
---|---|---|
committer | Tobias Brunner <tobias@strongswan.org> | 2015-03-04 13:54:12 +0100 |
commit | 276cf3b725449b8027cdd5c093eb6cf644273c3c (patch) | |
tree | db448ec55d509cb12fa83c2567a7509f721ea8fc | |
parent | 26ebe5fea8e8783bc4c401cac4530c24bdd6e570 (diff) | |
download | strongswan-276cf3b725449b8027cdd5c093eb6cf644273c3c.tar.bz2 strongswan-276cf3b725449b8027cdd5c093eb6cf644273c3c.tar.xz |
man: Add documentation about IKEv2 signature schemes
-rw-r--r-- | man/ipsec.conf.5.in | 15 |
1 files changed, 15 insertions, 0 deletions
diff --git a/man/ipsec.conf.5.in b/man/ipsec.conf.5.in index 696c6a12f..23092005b 100644 --- a/man/ipsec.conf.5.in +++ b/man/ipsec.conf.5.in @@ -584,6 +584,7 @@ for pre-shared key authentication, to (require the) use of the Extensible Authentication Protocol in IKEv2, and .B xauth for IKEv1 eXtended Authentication. + To require a trustchain public key strength for the remote side, specify the key type followed by the minimum strength in bits (for example .BR ecdsa-384 @@ -596,6 +597,20 @@ or a key strength definition (for example .BR pubkey-sha1-sha256 or .BR rsa-2048-ecdsa-256-sha256-sha384-sha512 ). +Unless disabled in +.BR strongswan.conf (5) +such key types and hash algorithms are also applied as constraints against IKEv2 +signature authentication schemes used by the remote side. + +If both peers support RFC 7427 ("Signature Authentication in IKEv2") specific +hash algorithms to be used during IKEv2 authentication may be configured. +The syntax is the same as above. For example, with +.B pubkey-sha384-sha256 +a public key signature scheme with either SHA-384 or SHA-256 would get used for +authentication, in that order and depending on the hash algorithms supported by +the peer. If no specific hash algorithms are configured, the default is to +prefer an algorithm that matches or exceeds the strength of the signature key. + For .BR eap , an optional EAP method can be appended. Currently defined methods are |