diff options
author | Christian Poessinger <christian@poessinger.com> | 2022-05-01 19:44:52 +0200 |
---|---|---|
committer | Christian Poessinger <christian@poessinger.com> | 2022-05-01 19:44:52 +0200 |
commit | 49b1afc25b73d9c5daae1c76edb88aab42afa83e (patch) | |
tree | 64d44eb5425ba0ebb0531f2cb60cef32830f0efa /data/templates/ipsec/charon.tmpl | |
parent | 992c847493665fd2119636d81582aa80e99e388a (diff) | |
download | vyos-1x-49b1afc25b73d9c5daae1c76edb88aab42afa83e.tar.gz vyos-1x-49b1afc25b73d9c5daae1c76edb88aab42afa83e.zip |
ipsec: T4353: fix Jinja2 linting errors
Diffstat (limited to 'data/templates/ipsec/charon.tmpl')
-rw-r--r-- | data/templates/ipsec/charon.tmpl | 353 |
1 files changed, 0 insertions, 353 deletions
diff --git a/data/templates/ipsec/charon.tmpl b/data/templates/ipsec/charon.tmpl deleted file mode 100644 index 2eac24eaa..000000000 --- a/data/templates/ipsec/charon.tmpl +++ /dev/null @@ -1,353 +0,0 @@ -# Options for the charon IKE daemon. -charon { - - # Accept unencrypted ID and HASH payloads in IKEv1 Main Mode. - # accept_unencrypted_mainmode_messages = no - - # Maximum number of half-open IKE_SAs for a single peer IP. - # block_threshold = 5 - - # Whether Certicate Revocation Lists (CRLs) fetched via HTTP or LDAP should - # be saved under a unique file name derived from the public key of the - # Certification Authority (CA) to /etc/ipsec.d/crls (stroke) or - # /etc/swanctl/x509crl (vici), respectively. - # cache_crls = no - - # Whether relations in validated certificate chains should be cached in - # memory. - # cert_cache = yes - - # Send Cisco Unity vendor ID payload (IKEv1 only). - # cisco_unity = no - - # Cisco FlexVPN -{% if options is vyos_defined %} - cisco_flexvpn = {{ 'yes' if options.flexvpn is vyos_defined else 'no' }} -{% if options.virtual_ip is vyos_defined %} - install_virtual_ip = yes -{% endif %} -{% if options.interface is vyos_defined %} - install_virtual_ip_on = {{ options.interface }} -{% endif %} -{% endif %} - - # Close the IKE_SA if setup of the CHILD_SA along with IKE_AUTH failed. - # close_ike_on_child_failure = no - - # Number of half-open IKE_SAs that activate the cookie mechanism. - # cookie_threshold = 10 - - # Delete CHILD_SAs right after they got successfully rekeyed (IKEv1 only). - # delete_rekeyed = no - - # Use ANSI X9.42 DH exponent size or optimum size matched to cryptographic - # strength. - # dh_exponent_ansi_x9_42 = yes - - # Use RTLD_NOW with dlopen when loading plugins and IMV/IMCs to reveal - # missing symbols immediately. - # dlopen_use_rtld_now = no - - # DNS server assigned to peer via configuration payload (CP). - # dns1 = - - # DNS server assigned to peer via configuration payload (CP). - # dns2 = - - # Enable Denial of Service protection using cookies and aggressiveness - # checks. - # dos_protection = yes - - # Compliance with the errata for RFC 4753. - # ecp_x_coordinate_only = yes - - # Free objects during authentication (might conflict with plugins). - # flush_auth_cfg = no - - # Whether to follow IKEv2 redirects (RFC 5685). - # follow_redirects = yes - - # Maximum size (complete IP datagram size in bytes) of a sent IKE fragment - # when using proprietary IKEv1 or standardized IKEv2 fragmentation, defaults - # to 1280 (use 0 for address family specific default values, which uses a - # lower value for IPv4). If specified this limit is used for both IPv4 and - # IPv6. - # fragment_size = 1280 - - # Name of the group the daemon changes to after startup. - # group = - - # Timeout in seconds for connecting IKE_SAs (also see IKE_SA_INIT DROPPING). - # half_open_timeout = 30 - - # Enable hash and URL support. - # hash_and_url = no - - # Allow IKEv1 Aggressive Mode with pre-shared keys as responder. - # i_dont_care_about_security_and_use_aggressive_mode_psk = no - - # Whether to ignore the traffic selectors from the kernel's acquire events - # for IKEv2 connections (they are not used for IKEv1). - # ignore_acquire_ts = no - - # A space-separated list of routing tables to be excluded from route - # lookups. - # ignore_routing_tables = - - # Maximum number of IKE_SAs that can be established at the same time before - # new connection attempts are blocked. - # ikesa_limit = 0 - - # Number of exclusively locked segments in the hash table. - # ikesa_table_segments = 1 - - # Size of the IKE_SA hash table. - # ikesa_table_size = 1 - - # Whether to close IKE_SA if the only CHILD_SA closed due to inactivity. - # inactivity_close_ike = no - - # Limit new connections based on the current number of half open IKE_SAs, - # see IKE_SA_INIT DROPPING in strongswan.conf(5). - # init_limit_half_open = 0 - - # Limit new connections based on the number of queued jobs. - # init_limit_job_load = 0 - - # Causes charon daemon to ignore IKE initiation requests. - # initiator_only = no - - # Install routes into a separate routing table for established IPsec - # tunnels. - install_routes = {{ install_routes }} - - # Install virtual IP addresses. - # install_virtual_ip = yes - - # The name of the interface on which virtual IP addresses should be - # installed. - # install_virtual_ip_on = - - # Check daemon, libstrongswan and plugin integrity at startup. - # integrity_test = no - - # A comma-separated list of network interfaces that should be ignored, if - # interfaces_use is specified this option has no effect. - # interfaces_ignore = - - # A comma-separated list of network interfaces that should be used by - # charon. All other interfaces are ignored. - # interfaces_use = - - # NAT keep alive interval. - # keep_alive = 20s - - # Plugins to load in the IKE daemon charon. - # load = - - # Determine plugins to load via each plugin's load option. - # load_modular = no - - # Initiate IKEv2 reauthentication with a make-before-break scheme. - # make_before_break = no - - # Maximum number of IKEv1 phase 2 exchanges per IKE_SA to keep state about - # and track concurrently. - # max_ikev1_exchanges = 3 - - # Maximum packet size accepted by charon. - # max_packet = 10000 - - # Enable multiple authentication exchanges (RFC 4739). - # multiple_authentication = yes - - # WINS servers assigned to peer via configuration payload (CP). - # nbns1 = - - # WINS servers assigned to peer via configuration payload (CP). - # nbns2 = - - # UDP port used locally. If set to 0 a random port will be allocated. - # port = 500 - - # UDP port used locally in case of NAT-T. If set to 0 a random port will be - # allocated. Has to be different from charon.port, otherwise a random port - # will be allocated. - # port_nat_t = 4500 - - # Prefer locally configured proposals for IKE/IPsec over supplied ones as - # responder (disabling this can avoid keying retries due to - # INVALID_KE_PAYLOAD notifies). - # prefer_configured_proposals = yes - - # By default public IPv6 addresses are preferred over temporary ones (RFC - # 4941), to make connections more stable. Enable this option to reverse - # this. - # prefer_temporary_addrs = no - - # Process RTM_NEWROUTE and RTM_DELROUTE events. - # process_route = yes - - # Delay in ms for receiving packets, to simulate larger RTT. - # receive_delay = 0 - - # Delay request messages. - # receive_delay_request = yes - - # Delay response messages. - # receive_delay_response = yes - - # Specific IKEv2 message type to delay, 0 for any. - # receive_delay_type = 0 - - # Size of the AH/ESP replay window, in packets. - # replay_window = 32 - - # Base to use for calculating exponential back off, see IKEv2 RETRANSMISSION - # in strongswan.conf(5). - # retransmit_base = 1.8 - - # Timeout in seconds before sending first retransmit. - # retransmit_timeout = 4.0 - - # Number of times to retransmit a packet before giving up. - # retransmit_tries = 5 - - # Interval in seconds to use when retrying to initiate an IKE_SA (e.g. if - # DNS resolution failed), 0 to disable retries. - # retry_initiate_interval = 0 - - # Initiate CHILD_SA within existing IKE_SAs (always enabled for IKEv1). - # reuse_ikesa = yes - - # Numerical routing table to install routes to. - # routing_table = - - # Priority of the routing table. - # routing_table_prio = - - # Delay in ms for sending packets, to simulate larger RTT. - # send_delay = 0 - - # Delay request messages. - # send_delay_request = yes - - # Delay response messages. - # send_delay_response = yes - - # Specific IKEv2 message type to delay, 0 for any. - # send_delay_type = 0 - - # Send strongSwan vendor ID payload - # send_vendor_id = no - - # Whether to enable Signature Authentication as per RFC 7427. - # signature_authentication = yes - - # Whether to enable constraints against IKEv2 signature schemes. - # signature_authentication_constraints = yes - - # Number of worker threads in charon. - # threads = 16 - - # Name of the user the daemon changes to after startup. - # user = - - crypto_test { - - # Benchmark crypto algorithms and order them by efficiency. - # bench = no - - # Buffer size used for crypto benchmark. - # bench_size = 1024 - - # Number of iterations to test each algorithm. - # bench_time = 50 - - # Test crypto algorithms during registration (requires test vectors - # provided by the test-vectors plugin). - # on_add = no - - # Test crypto algorithms on each crypto primitive instantiation. - # on_create = no - - # Strictly require at least one test vector to enable an algorithm. - # required = no - - # Whether to test RNG with TRUE quality; requires a lot of entropy. - # rng_true = no - - } - - host_resolver { - - # Maximum number of concurrent resolver threads (they are terminated if - # unused). - # max_threads = 3 - - # Minimum number of resolver threads to keep around. - # min_threads = 0 - - } - - leak_detective { - - # Includes source file names and line numbers in leak detective output. - # detailed = yes - - # Threshold in bytes for leaks to be reported (0 to report all). - # usage_threshold = 10240 - - # Threshold in number of allocations for leaks to be reported (0 to - # report all). - # usage_threshold_count = 0 - - } - - processor { - - # Section to configure the number of reserved threads per priority class - # see JOB PRIORITY MANAGEMENT in strongswan.conf(5). - priority_threads { - - } - - } - - # Section containing a list of scripts (name = path) that are executed when - # the daemon is started. - start-scripts { - - } - - # Section containing a list of scripts (name = path) that are executed when - # the daemon is terminated. - stop-scripts { - - } - - tls { - - # List of TLS encryption ciphers. - # cipher = - - # List of TLS key exchange methods. - # key_exchange = - - # List of TLS MAC algorithms. - # mac = - - # List of TLS cipher suites. - # suites = - - } - - x509 { - - # Discard certificates with unsupported or unknown critical extensions. - # enforce_critical = yes - - } - -} - |