aboutsummaryrefslogtreecommitdiffstats
path: root/man
diff options
context:
space:
mode:
authorTobias Brunner <tobias@strongswan.org>2015-02-27 19:11:53 +0100
committerTobias Brunner <tobias@strongswan.org>2015-03-04 13:54:12 +0100
commit276cf3b725449b8027cdd5c093eb6cf644273c3c (patch)
treedb448ec55d509cb12fa83c2567a7509f721ea8fc /man
parent26ebe5fea8e8783bc4c401cac4530c24bdd6e570 (diff)
downloadstrongswan-276cf3b725449b8027cdd5c093eb6cf644273c3c.tar.bz2
strongswan-276cf3b725449b8027cdd5c093eb6cf644273c3c.tar.xz
man: Add documentation about IKEv2 signature schemes
Diffstat (limited to 'man')
-rw-r--r--man/ipsec.conf.5.in15
1 files changed, 15 insertions, 0 deletions
diff --git a/man/ipsec.conf.5.in b/man/ipsec.conf.5.in
index 696c6a12f..23092005b 100644
--- a/man/ipsec.conf.5.in
+++ b/man/ipsec.conf.5.in
@@ -584,6 +584,7 @@ for pre-shared key authentication,
to (require the) use of the Extensible Authentication Protocol in IKEv2, and
.B xauth
for IKEv1 eXtended Authentication.
+
To require a trustchain public key strength for the remote side, specify the
key type followed by the minimum strength in bits (for example
.BR ecdsa-384
@@ -596,6 +597,20 @@ or a key strength definition (for example
.BR pubkey-sha1-sha256
or
.BR rsa-2048-ecdsa-256-sha256-sha384-sha512 ).
+Unless disabled in
+.BR strongswan.conf (5)
+such key types and hash algorithms are also applied as constraints against IKEv2
+signature authentication schemes used by the remote side.
+
+If both peers support RFC 7427 ("Signature Authentication in IKEv2") specific
+hash algorithms to be used during IKEv2 authentication may be configured.
+The syntax is the same as above. For example, with
+.B pubkey-sha384-sha256
+a public key signature scheme with either SHA-384 or SHA-256 would get used for
+authentication, in that order and depending on the hash algorithms supported by
+the peer. If no specific hash algorithms are configured, the default is to
+prefer an algorithm that matches or exceeds the strength of the signature key.
+
For
.BR eap ,
an optional EAP method can be appended. Currently defined methods are