1
0

tlssrv 1.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115
  1. .TH TLSSRV 8
  2. .SH NAME
  3. tlssrv, tlsclient, tlssrvtunnel, tlsclienttunnel \- TLS server and client
  4. .SH SYNOPSIS
  5. .PP
  6. .B tlssrv
  7. [
  8. .B -c
  9. .I cert.pem
  10. ]
  11. [
  12. .B -l
  13. .I
  14. logfile
  15. ]
  16. [
  17. .B -r
  18. .I remotesys
  19. ]
  20. .I cmd
  21. [
  22. .I args ...
  23. ]
  24. .PP
  25. .B tlsclient
  26. [
  27. .B -t
  28. .I trustedkeys
  29. ]
  30. [
  31. .B -x
  32. .I excludedkeys
  33. ]
  34. .I address
  35. .PP
  36. .B tlssrvtunnel
  37. .I plain-addr
  38. .I crypt-addr
  39. .I cert.pem
  40. .PP
  41. .B tlsclienttunnel
  42. .I crypt-addr
  43. .I plain-addr
  44. .I trustedkeys
  45. .SH DESCRIPTION
  46. .I Tlssrv
  47. is a helper program, typically exec'd in a
  48. .B /bin/service
  49. file to establish an SSL or TLS connection before launching
  50. .I cmd
  51. .IR args ;
  52. a typical command might start the IMAP or HTTP server.
  53. .I Cert.pem
  54. is the server certificate;
  55. .IR factotum (4)
  56. should hold the corresponding private key.
  57. The specified
  58. .I logfile
  59. is by convention the same as for the target server.
  60. .I Remotesys
  61. is mainly used for logging.
  62. .PP
  63. .I Tlsclient
  64. is the reverse of
  65. .IR tlssrv :
  66. it dials
  67. .IR address ,
  68. starts TLS,
  69. and then relays
  70. between the network connection
  71. and standard input and output.
  72. If the
  73. .B -t
  74. flag
  75. (and, optionally, the
  76. .B -x
  77. flag)
  78. is given, the remote server must present a key
  79. whose SHA1 hash is listed in
  80. the file
  81. .I trustedkeys
  82. but not in the file
  83. .IR excludedkeys .
  84. See
  85. .IR thumbprint (6)
  86. for more information.
  87. .PP
  88. .I Tlssrvtunnel
  89. and
  90. .I tlsclienttunnel
  91. use these tools and
  92. .I listen1
  93. (see
  94. .IR listen (8))
  95. to provide TLS network tunnels, allowing legacy
  96. application to take advantage of TLS encryption.
  97. .SH EXAMPLES
  98. .SH FILES
  99. .TP
  100. .B /sys/lib/tls
  101. .SH SOURCE
  102. .B /sys/src/cmd/tlssrv.c
  103. .br
  104. .B /sys/src/cmd/tlsclient.c
  105. .br
  106. .B /rc/bin/tlssrvtunnel
  107. .br
  108. .B /rc/bin/tlsclienttunnel
  109. .SH "SEE ALSO"
  110. .IR factotum (4),
  111. .IR listen (8),
  112. .IR rsa (8)
  113. .br
  114. Unix's
  115. .I stunnel