blob: 6686f1a1538d6aa71f8e195ee231b25a0fdd2361 [file] [log] [blame]
Brian Waters13d96012017-12-08 16:53:31 -06001# Configuration file for the peer whitelist extension.
2#
3# This extension is meant to allow connection from remote peers, without actively
4# maintaining this connection ourselves (as it would be the case by declaring the
5# peer in a ConnectPeer directive).
6# The format of this file is very simple. It contains a list of peer names
7# separated by spaces or newlines.
8#
9# The peer name must be a fqdn. We allow also a special "*" character as the
10# first label of the fqdn, to allow all fqdn with the same domain name.
11# Example: *.example.net will allow host1.example.net and host2.example.net
12#
13# At the beginning of a line, the following flags are allowed (case sensitive) -- either or both can appear:
14# ALLOW_OLD_TLS : we accept unprotected CER/CEA exchange with Inband-Security-Id = TLS
15# ALLOW_IPSEC : we accept implicitly protected connection with with peer (Inband-Security-Id = IPSec)
16# It is specified for example as:
17# ALLOW_IPSEC vpn.example.net vpn2.example.net *.vpn.example.net
18# These flag take effect from their position, until the end of the line.
19