diff --git a/man/ipsec.conf.5.in b/man/ipsec.conf.5.in index 2f914b0c8..f6e2c227f 100644 --- a/man/ipsec.conf.5.in +++ b/man/ipsec.conf.5.in @@ -172,9 +172,9 @@ keying, rekeying, and general control. The path to control the connection is called 'ISAKMP SA' in IKEv1 and 'IKE SA' in the IKEv2 protocol. That what is being negotiated, the kernel level data path, is called 'IPsec SA' or 'Child SA'. -strongSwan currently uses two separate keying daemons. \fIpluto\fP handles -all IKEv1 connections, \fIcharon\fP is the daemon handling the IKEv2 -protocol. +strongSwan previously used two separate keying daemons, \fIpluto\fP and +\fIcharon\fP. This manual does not discuss \fIpluto\fP options anymore, but +only \fIcharon\fP that since strongSwan 5.0 supports both IKEv1 and IKEv2. .PP To avoid trivial editing of the configuration file to suit it to each system involved in a connection, @@ -237,16 +237,6 @@ identity (such as EAP-TLS), but it does not match the IKEv2 gateway identity. includes conn section .BR . .TP -.BR auth " = " esp " | ah" -whether authentication should be done as part of -ESP encryption, or separately using the AH protocol; -acceptable values are -.B esp -(the default) and -.BR ah . -.br -The IKEv2 daemon currently supports ESP only. -.TP .BR authby " = " pubkey " | rsasig | ecdsasig | psk | never | xauthpsk | xauthrsasig" how the two security gateways should authenticate each other; acceptable values are @@ -270,10 +260,10 @@ and .B xauthrsasig that will enable eXtended AUTHentication (XAUTH) in addition to IKEv1 main mode based on shared secrets or digital RSA signatures, respectively. -This parameter is deprecated for IKEv2 connections, as two peers do not need -to agree on an authentication method. Use the +This parameter is deprecated, as two peers do not need to agree on an +authentication method in IKEv2. Use the .B leftauth -parameter instead to define authentication methods in IKEv2. +parameter instead to define authentication methods. .TP .BR auto " = " ignore " | add | route | start" what operation, if any, should be done automatically at IPsec startup; @@ -318,7 +308,8 @@ and prefer compressed. A value of .B no prevents IPsec from proposing compression; -a proposal to compress will still be accepted. +a proposal to compress will still be accepted. IPComp is currently not supported +with IKEv1. .TP .BR dpdaction " = " none " | clear | hold | restart" controls the use of the Dead Peer Detection protocol (DPD, RFC 3706) where @@ -336,16 +327,9 @@ put in the hold state .RB ( hold ) or restarted .RB ( restart ). -For IKEv1, the default is +The default is .B none -which disables the active sending of R_U_THERE notifications. -Nevertheless pluto will always send the DPD Vendor ID during connection set up -in order to signal the readiness to act passively as a responder if the peer -wants to use DPD. For IKEv2, -.B none -does't make sense, since all messages are used to detect dead peers. If specified, -it has the same meaning as the default -.RB ( clear ). +which disables the active sending of DPD messages. .TP .BR dpddelay " = " 30s " |