Annotation of embedaddon/strongswan/src/pt-tls-client/pt-tls-client.1.in, revision 1.1.1.1

1.1       misho       1: .TH PT-TLS-CLIENT 1 "2018-11-20" "@PACKAGE_VERSION@" "strongSwan"
                      2: .
                      3: .SH "NAME"
                      4: .
                      5: pt-tls-client \- Simple client using PT-TLS to collect integrity information
                      6: .
                      7: .SH "SYNOPSIS"
                      8: .
                      9: .SY "pt-tls-client"
                     10: .BI \-\-connect
                     11: .IR hostname |\fIaddress
                     12: .OP \-\-port port
                     13: .RB [ \-\-certid
                     14: .IR hex |\fB\-\-cert
                     15: .IR file ]+
                     16: .RB [ \-\-keyid
                     17: .IR hex |\fB\-\-key
                     18: .IR file ]
                     19: .RB [ \-\-key-type
                     20: .BR rsa |\fBecdsa\fR]
                     21: .OP \-\-client client-id
                     22: .OP \-\-secret password
                     23: .OP \-\-mutual
                     24: .OP \-\-options filename
                     25: .OP \-\-quiet
                     26: .OP \-\-debug level
                     27: .YS
                     28: .
                     29: .SY "pt-tls-client"
                     30: .B \-h
                     31: |
                     32: .B \-\-help
                     33: .YS
                     34: .
                     35: .SH "DESCRIPTION"
                     36: .
                     37: .B pt-tls-client
                     38: is a simple client using the PT-TLS (RFC 6876) transport protocol to collect
                     39: integrity measurements on the client platform. PT-TLS does an initial TLS
                     40: handshake with certificate-based server authentication and optional
                     41: certificate-based client authentication.  Alternatively simple password-based
                     42: SASL client authentication protected by TLS can be used.
                     43: .P
                     44: Attribute requests and integrity measurements are exchanged via the PA-TNC (RFC
                     45: 5792) message protocol between any number of Integrity Measurement Verifiers
                     46: (IMVs) residing on the remote PT-TLS server and multiple Integrity Measurement
                     47: Collectors (IMCs) loaded dynamically by the PT-TLS client according to a list
                     48: defined by \fI/etc/tnc_config\fR. PA-TNC messages that contain one or several
                     49: PA-TNC attributes are multiplexed into PB-TNC (RFC 5793) client or server data
                     50: batches which in turn are transported via PT-TLS.
                     51: .
                     52: .SH "OPTIONS"
                     53: .
                     54: .TP
                     55: .B "\-h, \-\-help"
                     56: Prints usage information and a short summary of the available commands.
                     57: .TP
                     58: .BI "\-c, \-\-connect " hostname\fR|\fIaddress
                     59: Set the hostname or IP address of the PT-TLS server.
                     60: .TP
                     61: .BI "\-p, \-\-port " port
                     62: Set the port of the PT-TLS server, default: 271.
                     63: .TP
                     64: .BI "\-x, \-\-cert " file
                     65: Set the path to an X.509 certificate file. This option can be repeated to load
                     66: multiple client and CA certificates.
                     67: .TP
                     68: .BI "\-X, \-\-certid " hex
                     69: Set the handle of the certificate stored in a smartcard or a TPM 2.0 Trusted
                     70: Platform Module.
                     71: .TP
                     72: .BI "\-k, \-\-key " file
                     73: Set the path to the client's PKCS#1 or PKCS#8 private key file
                     74: .TP
                     75: .BI "\-t, \-\-key\-type " type
                     76: Define the type of the private key if stored in PKCS#1 format. Can be omitted
                     77: with PKCS#8 keys.
                     78: .TP
                     79: .BI "\-K, \-\-keyid " hex
                     80: Set the keyid of the private key stored in a smartcard or a TPM 2.0 Trusted
                     81: Platform Module.
                     82: .TP
                     83: .BI "\-i, \-\-client " client-id
                     84: Set the username or client ID of the client required for password-based SASL
                     85: authentication.
                     86: .TP
                     87: .BI "\-s, \-\-secret " password
                     88: Set the preshared secret or client password required for password-based SASL
                     89: authentication.
                     90: .TP
                     91: .B "\-q, \-\-mutual
                     92: Enable mutual attestation between PT-TLS client and PT-TLS server.
                     93: .TP
                     94: .BI "\-v, \-\-debug " level
                     95: Set debug level, default: 1.
                     96: .TP
                     97: .B "\-q, \-\-quiet
                     98: Disable debug output to stderr.
                     99: .TP
                    100: .BI "\-+, \-\-options " file
                    101: Read command line options from \fIfile\fR.
                    102: .
                    103: .SH "EXAMPLES"
                    104: .
                    105: Connect to a PT-TLS server using certificate-based authentication,
                    106: storing the private ECDSA key in a file:
                    107: .PP
                    108: .EX
                    109:   pt-tls-client \-\-connect pdp.example.com \-\-cert ca.crt \\
                    110:                 \-\-cert client.crt \-\-key client.key \-\-key\-type ecdsa
                    111: .EE
                    112: .PP
                    113: Connect to a PT-TLS server using certificate-based authentication,
                    114: storing the private key in a smartcard or a TPM 2.0 Trusted Platform Module:
                    115: .PP
                    116: .EX
                    117:   pt-tls-client \-\-connect pdp.example.com \-\-cert ca.crt \\
                    118:                 \-\-cert client.crt \-\-keyid 0x81010002
                    119: .EE
                    120: .PP
                    121: Connect to a PT-TLS server listening on port 443, using SASL password-based
                    122: authentication:
                    123: .PP
                    124: .EX
                    125:   pt-tls-client \-\-connect pdp.example.com --port 443 \-\-cert ca.crt \\
                    126:                 \-\-client jane \-\-password p2Nl9trKlb
                    127: .EE
                    128: .SH FILES
                    129: .TP
                    130: /etc/tnc_config
                    131: .
                    132: .SH "SEE ALSO"
                    133: .
                    134: .BR strongswan.conf (5)
                    135: 

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>