ipsec.secrets

2023-11-13

IPSEC.SECRETS(5)		  strongSwan		      IPSEC.SECRETS(5)

NAME
       ipsec.secrets - secrets for IKE/IPsec authentication

DESCRIPTION
       The  file  ipsec.secrets	 holds	a table	of secrets.  These secrets are
       used by the  strongSwan	Internet  Key  Exchange	 (IKE)	daemons	 pluto
       (IKEv1) and charon (IKEv2) to authenticate other	hosts.

       It  is vital that these secrets be protected.  The file should be owned
       by the super-user, and its permissions  should  be  set	to  block  all
       access by others.

       The  file  is a sequence	of entries and include directives.  Here is an
       example.

	      #	/etc/ipsec.secrets - strongSwan	IPsec secrets file
	      192.168.0.1 %any : PSK "v+NkxY9LLZvwj4qCC2o/gGrWDF2d21jL"

	      :	RSA moonKey.pem

	      alice@strongswan.org : EAP "x3.dEhgN"

	      carol : XAUTH "4iChxLT3"

	      dave  : XAUTH "ryftzG4A"

	      #	get secrets from other files
	      include ipsec.*.secrets

       Each entry in the file is a list	of optional ID selectors, followed  by
       a  secret.   The	 two  parts  are separated by a	colon (:) that is sur-
       rounded by whitespace. If no ID selectors are specified the  line  must
       start with a colon.

       A  selector is an IP address, a Fully Qualified Domain Name, user@FQDN,
       %any or %any6 (other kinds may come).  An IP address may	be written  in
       the  familiar dotted quad form or as a domain name to be	looked up when
       the file	is loaded.  In many cases it is	a bad idea to use domain names
       because	the  name  server  may	not be running or may be insecure.  To
       denote a	Fully Qualified	Domain Name  (as  opposed  to  an  IP  address
       denoted by its domain name), precede the	name with an at	sign (@).

       Matching	 IDs with selectors is fairly straightforward: they have to be
       equal.  In the case of a	``Road Warrior'' connection, if	an equal match
       is not found for	the Peer's ID, and it is in the	form of	an IP address,
       a selector of %any will match the peer's	IP address if IPV4  and	 %any6
       will  match  a  the peer's IP address if	IPV6.  Currently, the obsolete
       notation	0.0.0.0	may be used in place of	%any.

       In IKEv1	an additional complexity arises	in the case of	authentication
       by  preshared  secret:  the  responder  will need to look up the	secret
       before the Peer's ID payload has	been decoded, so the ID	used  will  be
       the IP address.

       To  authenticate	 a  connection	between	two hosts, the entry that most
       specifically matches the	host and peer IDs is used.  An entry  with  no
       selectors  will	match  any host	and peer.  More	specifically, an entry
       with one	selector will match a host and peer if	the  selector  matches
       the host's ID (the peer isn't considered).  Still more specifically, an
       entry with multiple selectors will match	a host and peer	if the host ID
       and  peer  ID  each  match  one of the selectors.  If the key is	for an
       asymmetric authentication technique (i.e. a public key system  such  as
       RSA),  an entry with multiple selectors will match a host and peer even
       if only the host	ID matches a selector (it is presumed that the	selec-
       tors are	all identities of the host).  It is acceptable for two entries
       to be the best match as long as they agree about	the secret or  private
       key.

       Authentication  by preshared secret requires that both systems find the
       identical secret	(the secret is not actually  transmitted  by  the  IKE
       protocol).   If both the	host and peer appear in	the selector list, the
       same entry will be  suitable  for  both	systems	 so  verbatim  copying
       between	systems	 can be	used.  This naturally extends to larger	groups
       sharing the same	secret.	 Thus multiple-selector	entries	are  best  for
       PSK authentication.

       Authentication  by  public  key	systems	such as	RSA requires that each
       host have its own private key.  A host could reasonably use a different
       private	keys for different interfaces and for different	peers.	But it
       would not be normal to share entries between systems.   Thus  thus  no-
       selector	 and  one-selector  forms of entry often make sense for	public
       key authentication.

       The key part of an entry	must start with	a token	indicating the kind of
       key.  The following types of secrets are	currently supported:

       PSK    defines a	pre-shared key

       RSA    defines an RSA private key

       ECDSA  defines an ECDSA private key

       EAP    defines EAP credentials

       XAUTH  defines XAUTH credentials

       PIN    defines a	smartcard PIN

       Details on each type of secret are given	below.

       Whitespace  at  the end of a line is ignored. At	the start of a line or
       after whitespace, # and the following text up to	the end	of the line is
       treated as a comment.

       An  include  directive causes the contents of the named file to be pro-
       cessed before continuing	with the current file.	The filename  is  sub-
       ject to ``globbing'' as in sh(1), so every file with a matching name is
       processed.  Includes may	be nested to a modest depth  (10,  currently).
       If  the	filename  doesn't start	with a /, the directory	containing the
       current file is prepended to the	name.  The include directive is	a line
       that  starts with the word include, followed by whitespace, followed by
       the filename (which must	not contain whitespace).

   TYPES OF SECRETS
       [ <selectors> ] : PSK <secret>
	      A	 preshared  secret  is	most  conveniently  represented	 as  a
	      sequence	of  characters,	 delimited  by double-quote characters
	      (").  The	sequence cannot	contain	 a  newline  or	 double-quote.
	      Strictly	speaking, the secret is	actually the sequence of bytes
	      that is used in the file to represent the	sequence of characters
	      (excluding the delimiters).

       [ <selectors> ] : RSA <private key file>	[ <passphrase> | %prompt ]
	      [	 <selectors>  ]	 :  ECDSA  <private key	file> [	<passphrase> |
	      %prompt ]	For the	private	key file both absolute paths or	 paths
	      relative	to  /etc/ipsec.d/private  are accepted.	If the private
	      key file is encrypted, the passphrase must be  defined.  Instead
	      of  a  passphrase	%prompt	can be used which then causes the dae-
	      mons to ask the user for the password whenever it	is required to
	      decrypt the key.

       <user id> : EAP <secret>
	      As  with	PSK  secrets  the  secret is a sequence	of characters,
	      delimited	by double-quote	characters (").
	      EAP secrets are IKEv2 only.

       [ <servername> ]	<username> : XAUTH <password>
	      XAUTH secrets are	IKEv1 only.

       : PIN <smartcard	selector> <pin code> | %prompt
	      IKEv1 uses the format %smartcard[<slot nr>[:<key id>]] to	 spec-
	      ify  the	smartcard  selector  (e.g. %smartcard1:50).  The IKEv2
	      daemon  supports	multiple  modules  with	 the  format   %smart-
	      card[<slot nr>[@<module>]]:<keyid> , but always requires a keyid
	      to uniquely select the correct key. Instead  of  specifying  the
	      pin  code	statically, %prompt can	be specified, which causes the
	      daemons to ask the user for the pin code.

FILES
       /etc/ipsec.secrets

SEE ALSO
       ipsec.conf(5), strongswan.conf(5), ipsec(8)

HISTORY
       Originally written for the FreeS/WAN project  by	 D.  Hugh  Redelmeier.
       Updated	   and	   extended	for	the	strongSwan     project
       <http://www.strongswan.org> by Tobias Brunner and Andreas Steffen.

BUGS
       If an ID	is 0.0.0.0, it will match %any;	if it is 0::0, it  will	 match
       %any6.

http://www.freebsd.org/cgi/man.cgi?query=ipsec.secrets&sektion=5&apropos=0&manpath=FreeBSD+Ports+9.0-RELEASE


本文内容由网友自发贡献,版权归原作者所有,本站不承担相应法律责任。如您发现有涉嫌抄袭侵权的内容,请联系:hwhale#tublm.com(使用前将#替换为@)

ipsec.secrets 的相关文章

随机推荐

  • JavaScript DOM和BOM

    目录 查找html元素 1 通过id 2 通过标签名 3 通过类名 DOM 1 创建动态的HTML内容 2 修改元素内容 3 改变HTML属性 4 改变css样式 DOM事件 DOM节点 1 添加HTML元素 2 删除HTML元素 浏览器对
  • nginx学习记录(一) 认识、了解

    本文记录个人学习nginx的学习笔记 方便自己日后查看 也希望各位大佬看到有什么不对可以指点一二 一 什么是nginx 基本介绍 Nginx 是一款轻量级的 Web 服务器 反向代理服务器 电子邮件 IMAP POP3 代理服务器 在BSD
  • 使用SVG绘制带箭头的线

  • 小程序实现小窗功能

    效果图 正常情况下 正常退出直播间后 可添加官方支持的小窗展示功能 小窗使用过程中 不会影响其他界面的使用 共存状态 用户端 主播段 异常情况下 1 当长时间悬挂小窗后 或者主播网络出问题的情况下 小窗会有加载loadding 点击进入直播
  • word中插入公式实现换行和对齐

    一 准备阶段 默认Unicode模式 进入公式编辑模式 输入 eqarray 紧接着按下空格键输入空格 如下 二 实现换行和对齐 将要编辑的公式输入到括号内 实现位置对齐 实现换行 三 结束公式编辑 输入完所有公式后 输入右括号 紧接着按下
  • 漂亮的表格样式(使用CSS样式表控制表格样式)

    依照WEB2 0风格 设计了几个表格样式 希望大家喜欢 WEB2 0提倡使用div开布局 但不是要完全放弃使用表格 表格在数据展现方面还是不错的选择 现在使用介绍使用CSS样式表来控制 美化表格的方法 lt html xmlns http
  • 蓝桥杯嵌入式创建第一个工程(点亮led灯)

    蓝桥杯嵌入式创建第一个工程 点亮led灯 一 keil导入stm32G431RX板级芯片包 1 1 下载板级芯片包 1 2 导入芯片包 1 2 1 我们首先打开keil 点击Pack installer 如图 1 2 2 然后选中file
  • arm基础知识

    目录 arm基础知识 谈谈对嵌入式的理解 计算机基本理论 计算机的组成 指令的解析 编译原理 ARM相关知识介绍 1 认识ARM ARM含义 架构 内核 SOC ARM的发展历史 指令集 ARM公司产品分布 ARM体系结构 ARM v8 A
  • 机器学习笔记:李宏毅ChatGPT Finetune VS Prompt

    1 两种大语言模型 GPT VS BERT 2 对于大语言模型的两种不同期待 2 1 专才 2 1 1 成为专才的好处 Is ChatGPT A Good Translator A Preliminary Study 2023 Arxiv
  • 华为OD机试 - 英文输入法(Java)

    题目描述 主管期望你来实现英文输入法单词联想功能 需求如下 依据用户输入的单词前缀 从已输入的英文语句中联想出用户想输入的单词 按字典序输出联想到的单词序列 如果联想不到 请输出用户输入的单词前缀 注意 英文单词联想时 区分大小写 缩略形式
  • requests库学习

    requests库学习 requests快速上手 http 2 python requests org zh CN latest user quickstart html Requests库是用来发送HTTP请求 接收HTTP响应的一个Py
  • ES使用中遇到的坑

    1 ES分页超过10000条报错 es 默认采用的分页方式是 from size 的形式 是一种逻辑上的分页 在深度分页的情况下 采用from to方式进行分页效率会非常的低 例如以下查询 1 GET student doc search
  • 记一次在k8s集群搭建的Harbor私有仓库无法提供服务之镜像迁移恢复实践

    本章目录 记一次在k8s集群搭建的Harbor私有仓库无法提供服务之镜像迁移恢复实践 描述 Harbor 是一个用于存储和分发Docker镜像的企业级Registry服务器 通过添加一些企业必需的功能特性 例如安全 标识和管理等 扩展了开源
  • 内网隧道代理技术(十七)之 NPS的使用

    NPS的介绍和使用 NPS介绍 nps是一款轻量级 高性能 功能强大的内网穿透代理服务器 目前支持tcp udp流量转发 可支持任何tcp udp上层协议 访问内网网站 本地支付接口调试 ssh访问 远程桌面 内网dns解析等等 此外还支持
  • [752]压力测试工具-ab工具

    在学习ab工具之前 我们需了解几个关于压力测试的概念 吞吐率 Requests per second 概念 服务器并发处理能力的量化描述 单位是reqs s 指的是某个并发用户数下单位时间内处理的请求数 某个并发用户数下单位时间内能处理的最
  • JS进阶第三篇:开发中对数组及对象的判断方法

    系列文章传送门 JS进阶第一篇 手写call apply bind JS进阶第二篇 函数参数按值传递 文章目录 JS判断数组 1 通过instanceof运算符判断 2 通过constructor判断 3 通过数组自带的isArray方法判
  • ESP32-C3 应用 篇(实例二、通过蓝牙将传感器数据发送给手机,手机端控制 SK6812 LED)

    ESP32 C3 蓝牙部分我们学习了GATT 本文尝试使用蓝牙做一个简单的小应用 目录 前言 一 整体框架 二 数据传输部分 2 1 添加温湿度驱动组件 2 2 传感器数据传输程序 再次说明 ESP GATTS READ EVT 事件 2
  • Git版本控制器的基本使用

    摘要 Git 是一个分布式版本控制软件 最初本是为了更好的管理Linux内核开发而被林纳斯 托瓦兹开发 后来因为项目开发中版本控制的强烈需求 而git也日趋成熟 最终成为了一个独立的版本控制软件 git 分布式 版本控制 目录 关于git
  • 正则表达式匹配第一个单个字符

    匹配单字符 数字 d表示0 9的数字 只匹配一个 import re result re match r d 3python print result result re match r d python3 print result 运行结
  • ipsec.secrets

    IPSEC SECRETS 5 strongSwan IPSEC SECRETS 5 NAME ipsec secrets secrets for IKE IPsec authentication DESCRIPTION The file