racoon(8) does not have a list of security protocols to be nego-
tiated. The list of security protocols are passed by SPD in the
kernel. Therefore you have to define all of the potential algo-
rithms in the phase 2 proposals even if there are algorithms
which will not be used. These algorithms are define by using the
following three directives, with a single comma as the separator.
For algorithms that can take variable-length keys, algorithm
names can be followed by a key length, like ``blowfish 448''.
racoon(8) will compute the actual phase 2 proposals by computing
the permutation of the specified algorithms, and then combining
them with the security protocol specified by the SPD. For exam-
ple, if des, 3des, hmac_md5, and hmac_sha1 are specified as algo-
rithms, we have four combinations for use with ESP, and two for
AH. Then, based on the SPD settings, racoon(8) will construct
the actual proposals. If the SPD entry asks for ESP only, there
will be 4 proposals. If it asks for both AH and ESP, there will
be 8 proposals. Note that the kernel may not support the algo-
rithm you have specified.
encryption_algorithm algorithms;
des, 3des, des_iv64, des_iv32, rc5, rc4, idea, 3idea,
cast128, blowfish, null_enc, twofish, rijndael, aes (used
with ESP)
authentication_algorithm algorithms;
des, 3des, des_iv64, des_iv32, hmac_md5, hmac_sha1,
hmac_sha256, hmac_sha384, hmac_sha512, non_auth (used
with ESP authentication and AH)
compression_algorithm algorithms;
deflate (used with IPComp)