Provided by: racoon_0.8.2+20140711-5_amd64 

NAME
racoon-tool.conf - configuration file for racoon-tool(8).
DESCRIPTION
This manual page documents briefly the racoon-tool.conf(5), configuration file format.
Please consult the racoon.conf(5) man-page first to better understand what is written about here.
SYNTAX
The racoon-tool.conf(5) file is laid out in sections.
Comments are delimited on the left by `#', and can be on a line by themselves, or at the end of a line.
The possible sections are global, connection, and peer. The possible templates are spdadd,
spdadd_transport_ip4, spdadd_transport_ip6, spdinit, sadinit, sadadd, remote, sainfo, and racooninit.
Sections start with section: and then continue with their properties (name terminated by `:' then value),
and templates ALWAYS have to have each line started with template: Sections and templates can be named,
with the name occurring in parenthesis between the last character of their type and the final colon.
SECTIONS
The possible sections are:
global:
Contains global parameters for the generated racoon.conf(5), and global settings used by racoon-
tool(8). Available settings are: path_pre_shared_key, path_certificate, path_racoon_conf,
privsep, privsep_chroot, privsep_user, privsep_group, racoon_command, racoon_pid_file, log,
listen[[0-9a-z]], and complex_bundle.
Apart from racoon_command, and racoon_pid_file, the setting map across to the similar names in
racoon.conf(5).
These items privsep, privsep_chroot, privsep_user, privsep_group, are related to the privsep
section in racoon.conf(5) Privsep is a boolean option to turn on privilege separation. The default
is to chroot to '/', as quite a bit of setup is required in the chroot directory.
The listen directive is a bit different from the man-page and takes multiple {ip-address} [[port]]
statements by attaching an index `0-9',`a-z' in square brackets immediately before the colon.
connection(%default|%anonymous|[-_a-z0-9]+):
Connection as described by the complementary SPD entries. Creates `sainfo' sections in the
generated racoon.conf(5), and associated SPD entries.
Directives and values are basically one for one with the relevant entries in racoon.conf(5).
Spdadd: can be used to override the template automatically selected. The templates that are
automatically selected depending om connection mode and IPv4 or IPv6 addresssing are spdadd,
spdadd_transport_ip4, and spdadd_transport_ip6. The supplied default transport mode templates do
not encrypt ICMP as this can easily result in SPD policy difficulties. Boolean parameters
auto_ah_on_esp, always_ah_on_esp can be used to add AH encapsulation to the `esp' mode transform
supplied by the default spdadd templates. The IKE phase 2 identifier type can be set with the
id_type option, either `address' or `subnet'. Compression can be added to the default transforms
by using the compression boolean.
Multiple SPD rule pairs can be entered in place of the pair supplied by the default spdadd
templates. They are signified by adding an index made up from the characters (case-insensitive) in
the regular expression `[-_0-9a-z]+' to the src_port, and/or dst_port entries, within square
brackets immediately before the colon. Only one port needs to be defined, with the other
defaulting to `[any]'. Additional properties for the rule pair can be given by encap, and policy
entries, with the appropriate index entry in square brackets before the colon.
Please note that on the FreeBSD kernel ( ipsec(4) ) nested ipsec policy transforms are not
supported, and that ipcomp is buggy.
The `%default' VPN connection fills in entries in other specified connections, unless they are
otherwise defined within the specific connection. The `%anonymous' connection is there for a
passive VPN server.
peer(%default|%anonymous|[a-f0-9:.]+):
Defines the phase 1 attributes associated with a peer. This creates `remote' entries in the
generated racoon.conf(5).
Directives and values are basically one for one with the relevant entries in racoon.conf(5).
Different proposals are signified by adding an index `0-9', `a-z', or made up from characters
(case-insensitive) in the regular expression `[-_0-9a-z]+' to the encryption_algorithm,
hash_algorithm, dh_group, and authentication_method entries, within square brackets immediately
before the colon.
The `%default' VPN connection fills in entries in other specified connections, unless they are
otherwise defined within the specific connection. The `%anonymous' connection is there for a
passive VPN server.
TEMPLATES
Templates are described briefly here. You will have to look inside the racoon-tool(8) perl script to see
exactly what you can do.
spdinit:
Portion that can be used to initialise the SPD. Uses setkey syntax. See setkey(8).
sadinit:
Portion that can be used to initialise the SAD. Uses setkey syntax. See setkey(8).
spdadd(%default|[-_a-z0-9]+):
Template for adding SPD entries. Different templates can be used. Keys for replacement are of the
form `___setkey_name___', with names found in setkey(8). The built in template is named
`%default'.
spdadd_transport_ip4(%transport_ip4_default|[-_a-z0-9]+):
Template for adding SPD entries for IPv4 when transport mode is desired. Different templates can
be used, but have to be selected with the spdadd connection property. Keys for replacement are of
the form `___setkey_name___', with names found in setkey(8). The built in template is named
`%transport_ip4_default'.
spdadd_transport_ip6(%transport_ip6_default|[-_a-z0-9]+):
Template for adding SPD entries for IPv6 when transport mode is desired. Different templates can
be used, but have to be selected with the spdadd connection property. Keys for replacement are of
the form `___setkey_name___', with names found in setkey(8). The built in template is named
`%transport_ip4_default'.
sadadd(%default|[-_a-z0-9]+):
Template for adding SAD entries. Different templates can be used. Keys for replacement are of the
form `___setkey_name___', with names found in setkey(8). The built in template is named
`%default'.
remote(%default|[-_a-z0-9]+):
Template for adding 'remote' entries to the generated racoon.conf(5). Different templates can be
used. Keys for replacement are of the form `___setkey_name___', with names found in setkey(8).
The built in template is named `%default'.
sainfo(%default|[-_a-z0-9]+):
Template for adding 'sainfo' entries to the generated racoon.conf(5). Different templates can be
used. Keys for replacement are of the form `___setkey_name___', with names found in setkey(8).
The built in template is named `%default'.
racooninit:
Template for adding your own section to the start of the generated racoon.conf(5).
EXAMPLES
Example of a simple configuration using PSK authentication.
#
# Configuration file for racoon-tool
#
# See racoon-tool.conf(5) for details
#
#
# Simple PSK - authentication defaults to pre_shared_key
#
connection(bacckdoor-doormat):
src_range: 192.168.223.1/32
dst_range: 192.168.200.0/24
src_ip: 172.31.1.1
dst_ip: 10.0.0.1
admin_status: enabled
compression: no
lifetime: time 20 min
authentication_algorithm: hmac_sha1
encryption_algorithm: 3des
peer(10.0.0.1):
verify_cert: on
passive: off
verify_identifier: off
lifetime: time 60 min
hash_algorithm[0]: sha1
encryption_algorithm[0]: 3des
Example of a complex configuration with multple networks betweenthe same endpoints, as well as use of
`%default' for common settings.
#
# Configuration file for racoon-tool
#
global:
log: notify
# default settings to save typing
peer(%default):
certificate_type: x509 blurke-ipsec.crt blurke-ipsec.key
my_identifier: fqdn blurke.bar.com
lifetime: time 60 min
verify_identifier: on
verify_cert: on
hash_algorithm[0]: sha1
encryption_algorithm[0]: 3des
authentication_method[0]: rsasig
connection(%default):
authentication_algorithm: hmac_sha1
encryption_algorithm: 3des
src_ip: 172.31.1.1
lifetime: time 20 min
# Connection to work
peer(10.0.0.1):
peers_identifier: fqdn blue.sky.com
connection(blurke-blue-sky-work):
src_range: 192.168.203.1/32
dst_range: 172.16.0.0/24
dst_ip: 10.0.0.1
admin_status: enabled
# Connection to telehoused servers
connection(blurke-mail):
src_range: 192.168.203.0/24
dst_range: 172.20.1.1
dst_ip: 10.100.0.1
encryption_algorithm: blowfish
compression: on
admin_status: yes
peer(10.100.0.1):
peers_identifier: fqdn mail.bar.com
connection(blurke-web1):
src_range: 192.168.203.0/24
dst_range: 172.20.1.23
dst_ip: 10.100.0.1
encryption_algorithm: blowfish
admin_status: yes
connection(blurke-web2):
src_range: 192.168.203.0/24
dst_range: 172.20.1.24
dst_ip: 10.100.0.1
encryption_algorithm: blowfish
admin_status: yes
# Test connection to Free S/WAN
connection(blurke-freeswan):
src_range: 192.168.203.0/24
dst_range: 172.17.100.0/24
dst_ip: 172.30.1.1
admin_status: yes
peer(172.30.1.1):
peers_identifier: fqdn banshee
FILES
/etc/racoon/racoon-tool.conf
(configuration header file)
/etc/racoon/racoon-tool.conf.d/*.conf
optional portions. The file(s) that this man page describes.
/var/lib/racoon/racoon.conf
The generated racoon.conf.
SEE ALSO
racoon.conf(5), racoon-tool(8), racoon(8), setkey(8), ipsec(4) on FreeBSD.
BUGS
This man page is by no means complete.
AUTHOR
This manual page was written by Matthew Grant <matthewgrant5@gmail.com> for the Debian GNU/Linux system
(but may be used by others).
RACOON-TOOL.CONF(5)