2 #ident "%Z%%M% %I% %E% SMI"
4 # Copyright 2005 Sun Microsystems, Inc. All rights reserved.
5 # Use is subject to license terms.
9 # The contents of this file are subject to the terms of the
10 # Common Development and Distribution License, Version 1.0 only
11 # (the "License"). You may not use this file except in compliance
14 # You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
15 # or http://www.opensolaris.org/os/licensing.
16 # See the License for the specific language governing permissions
17 # and limitations under the License.
19 # When distributing Covered Code, include this CDDL HEADER in each
20 # file and include the License file at usr/src/OPENSOLARIS.LICENSE.
21 # If applicable, add the following below this CDDL HEADER, with the
22 # fields enclosed by brackets "[]" replaced with your own identifying
23 # information: Portions Copyright [yyyy] [name of copyright owner]
29 ## This file should be copied into /etc/inet/ike/config to enable the
30 ## launch of the IKE daemon, in.iked(1m), at boot time. You can also
31 ## launch the IKE daemon after creating this file without rebooting by
32 ## invoking /usr/lib/inet/in.iked with a root shell.
35 # Consult the ike.config(4) man page for further details. Here is a small
36 # example from the man page.
40 ### First some global parameters...
42 ## Optional hardware acceleration parameters...
43 ## Use the pathname of a library that supports PKCS#11 in quotes.
44 ## The example path is for the Sun Crypto Accelerator 1000.
45 # pkcs11_path "/opt/SUNWconn/lib/libpkcs11.so"
47 ## certificate parameters...
49 # Root certificates. I SHOULD use a full Distinguished Name.
50 # I MUST have this certificate in my local filesystem, see ikecert(1m).
51 cert_root "C=US, O=Sun Microsystems\\, Inc., CN=Sun CA"
53 # Explicitly trusted certs that need no signatures, or perhaps self-signed
54 # ones. Like root certificates, use full DNs for them for now.
55 cert_trust "EMAIL=root@domain.org"
57 # Where do I send LDAP requests?
58 ldap_server "ldap1.domain.org,ldap2.domain.org:389"
60 # Some PKI-specific tweaks...
61 # If you wish to ignore CRLs, uncomment this:
63 # If you wish to use HTTP (with name resolution) for URLs inside certs,
66 # HTTP proxy and socks URLs should also be indicated if needed...
67 socks "socks://socks-relay.domain.org"
68 #proxy "http://http-proxy.domain.org:8080"
70 ## Phase 1 transform defaults...
72 p1_lifetime_secs 14400
75 ## Parameters that may also show up in rules.
77 p1_xform { auth_method preshared oakley_group 5 auth_alg sha encr_alg 3des }
83 label "simple inheritor"
90 # an index-only rule. If I'm a receiver, and all I
91 # have are index-only rules, what do I do about inbound IKE requests?
92 # Answer: Take them all!
95 # Use whatever "host" (e.g. IP address) identity is appropriate
103 # Now I'm going to have the p1_xforms
105 {auth_method preshared oakley_group 5 auth_alg md5 encr_alg blowfish }
107 {auth_method preshared oakley_group 5 auth_alg md5 encr_alg 3des }
109 # After said list, another keyword (or a '}') will stop xform parsing.
113 # Let's try something a little more conventional.
115 label "host to .80 subnet"
117 local_id "10.1.86.51"
119 remote_id "" # Take any, use remote_addr for access control.
121 local_addr 10.1.86.51
122 remote_addr 10.1.80.0/24
125 { auth_method rsa_sig oakley_group 5 auth_alg md5 encr_alg 3des }
127 { auth_method rsa_sig oakley_group 5 auth_alg md5 encr_alg blowfish }
129 { auth_method rsa_sig oakley_group 5 auth_alg sha1 encr_alg 3des }
131 { auth_method rsa_sig oakley_group 5 auth_alg sha1 encr_alg blowfish }