aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--src/swanctl/Makefile.am2
-rw-r--r--src/swanctl/swanctl.conf122
2 files changed, 124 insertions, 0 deletions
diff --git a/src/swanctl/Makefile.am b/src/swanctl/Makefile.am
index c951b1587..d731c0467 100644
--- a/src/swanctl/Makefile.am
+++ b/src/swanctl/Makefile.am
@@ -20,6 +20,8 @@ swanctl_LDADD = \
swanctl.o : $(top_builddir)/config.status
+EXTRA_DIST = swanctl.conf
+
AM_CPPFLAGS = \
-I$(top_srcdir)/src/libstrongswan \
-I$(top_srcdir)/src/libcharon/plugins/vici \
diff --git a/src/swanctl/swanctl.conf b/src/swanctl/swanctl.conf
new file mode 100644
index 000000000..7580740b1
--- /dev/null
+++ b/src/swanctl/swanctl.conf
@@ -0,0 +1,122 @@
+connections {
+
+# # an IKE configuration named conn1
+# conn1 {
+# # IKE version to use
+# version = 2
+# # list of acceptable local addresses/subnets
+# local_addrs = 0.0.0.0
+# # peer address, additional addresses/subnets as responder
+# remote_addrs = 192.168.5.1
+# # local UPD port for IKE
+# local_port = 500
+# # remote UDP port for IKE
+# remote_port = 500
+# # Proposals for IKE, "default" is the default proposal
+# proposals = aes128gcm16-prfsha256-modp2048, default
+# # virtual IPs to request, such as 0.0.0.0 or ::
+# vips =
+# # IKEv1 aggressive mode
+# aggressive = no
+# # use of pull/push in IKEv1 mode config
+# pull = yes
+# # enforce UDP encapsulation by faking NAT-D payloads
+# encap = no
+# # enable IKEv2 MOBIKE
+# mobike = yes
+# # interval of liveness checks
+# dpd_delay = 10s
+# # timeout for DPD checks (IKEV1 only)
+# dpd_timeout = 30s
+# # use IKEv1 UDP packet fragmentation
+# fragmentation = force
+# # send certificate requests
+# send_certreq = yes
+# # send certificate payloads
+# send_cert = ifasked
+# # number of retransmission sequences to do before givin up
+# keyingtries = 0
+# # uniquness policy, never|no|keep|replace|
+# unique = no
+# # time to schedule IKE reauthentication
+# reauth_time = 3h
+# # time to schedule IKE rekeying
+# rekey_time = 2h
+# # hard IKE_SA lifetime if rekey/reauth does not complete
+# over_time = 10m
+# # range of random time to subtract from rekey/rauth times
+# rand_time = 10m
+#
+# # local authentication, first round
+# local {
+# # additional certificates to load
+# certs = a.pem, xy.der
+# # authentication to perform locally
+# auth = pubkey
+# # IKE identity for local
+# id = win@strongswan.org
+# # Client EAP-Identity to use
+# eap_id = moon
+# # Server side EAP identity to use, EAP-TTLS etc.
+# aaa_identity = srv
+# # IKEv1 XAuth username
+# xauth_id = moon
+# }
+# # remote authentication, first round
+# remote {
+# # IKE identity for peer
+# id = %any
+# # list of acceptable peer certificates
+# certs = client.pem
+# # list of acceptable CA certificates
+# cacert = ca.der
+# # revocation policy, strict|ifuri
+# revocation = ifuri
+# # authentication to expect from remote
+# auth = pubkey
+# }
+# children {
+# # First CHILD_SA configuration
+# child1 {
+# # AH proposals to offer
+# ah_proposals = default
+# # ESP proposals to offer
+# esp_proposals = aes128gcm16-modp2048, default
+# # local subnets to tunnel
+# local_ts = 192.168.3.0/24
+# # remote subnets to tunnel
+# remote_ts = 192.168.1.0/24
+# # updown script to invoke
+# updown = path-to-script
+# # hostaccess variable to pass to updown
+# hostaccess = yes
+# # IPsec mode, tunnel|transport|pass|drop
+# mode = tunnel
+# # action to perform on DPD timeout
+# dpd_action = restart
+# # enable IPComp
+# ipcomp = no
+# # inactivity timeout before closing CHILD_SA
+# inactivity = 2m
+# # fixed reqid to use for this CHILD_SA
+# reqid = 5
+# # Netfilter mark for input traffic
+# mark_in = 1
+# # Netfilter mark for output traffic
+# mark_out = 5/0xffffffff
+# # Traffic Flow Confidentiality padding
+# tfc_padding = 1500
+# }
+# }
+# }
+
+}
+
+secrets {
+ eap {
+# tester = testpassword
+ }
+ ike {
+# sun.strongswan.org = 0x12345678901234
+ }
+}