3 .\" Manual page created by:
5 .\" Guus Sliepen <guus@tinc-vpn.org>
12 .Op Fl -config Ns = Ns Ar DIR
14 .Op Fl -debug Ns Op = Ns Ar LEVEL
15 .Op Fl -net Ns = Ns Ar NETNAME
16 .Op Fl -option Ns = Ns Ar [HOST.]KEY=VALUE
18 .Op Fl -logfile Ns Op = Ns Ar FILE
20 .Op Fl -bypass-security
22 .Op Fl -user Ns = Ns Ar USER
26 This is the daemon of tinc, a secure virtual private network (VPN) project.
29 will read it's configuration file to determine what virtual subnets it has to serve
30 and to what other tinc daemons it should connect.
31 It will connect to the ethertap or tun/tap device
32 and set up a socket for incoming connections.
33 Optionally a script will be executed to further configure the virtual device.
35 it will detach from the controlling terminal and continue in the background,
36 accepting and setting up connections to other tinc daemons
37 that are part of the virtual private network.
38 Under Windows (not Cygwin) tinc will install itself as a service,
39 which will be restarted automatically after reboots.
41 .Bl -tag -width indent
42 .It Fl c, -config Ns = Ns Ar DIR
43 Read configuration files from
46 .Pa @sysconfdir@/tinc/ .
48 Don't fork and detach.
49 This will also disable the automatic restart mechanism for fatal errors.
50 If not mentioned otherwise, this will show log messages on the standard error output.
51 .It Fl d, -debug Ns Op = Ns Ar LEVEL
52 Increase debug level or set it to
55 .It Fl n, -net Ns = Ns Ar NETNAME
58 This will let tinc read all configuration files from
59 .Pa @sysconfdir@/tinc/ Ar NETNAME .
64 is the same as not specifying any
66 .It Fl o, -option Ns = Ns Ar [HOST.]KEY=VALUE
69 this will set server configuration variable
75 this will set the host configuration variable
81 This option can be used more than once to specify multiple configuration variables.
83 Lock tinc into main memory.
84 This will prevent sensitive data like shared private keys to be written to the system swap files/partitions.
85 This option is not supported on all platforms.
86 .It Fl -logfile Ns Op = Ns Ar FILE
87 Write log entries to a file instead of to the system logging facility.
90 is omitted, the default is
91 .Pa @localstatedir@/log/tinc. Ns Ar NETNAME Ns Pa .log.
93 When this option is is set, tinc uses syslog instead of stderr in --no-detach mode.
94 .It Fl -pidfile Ns = Ns Ar FILENAME
102 is omitted, the default is
103 .Pa @localstatedir@/run/tinc. Ns Ar NETNAME Ns Pa .pid.
104 .It Fl -bypass-security
105 Disables encryption and authentication of the meta protocol.
106 Only useful for debugging.
108 With this option tinc chroots into the directory where network
109 config is located (@sysconfdir@/tinc/NETNAME if -n option is used,
110 or to the directory specified with -c option) after initialization.
111 This option is not supported on all platforms.
112 .It Fl U, -user Ns = Ns Ar USER
113 setuid to the specified
115 after initialization.
116 This option is not supported on all platforms.
118 Display short list of options.
120 Output version information and exit.
123 .Bl -tag -width indent
127 to try to connect to all uplinks immediately.
130 attempts to do this itself,
131 but increases the time it waits between the attempts each time it failed,
134 didn't succeed to connect to an uplink the first time after it started,
135 it defaults to the maximum time of 15 minutes.
137 Partially rereads configuration files.
138 Connections to hosts whose host config file are removed are closed.
139 New outgoing connections specified in
144 option is used, this will also close and reopen the log file,
145 useful when log rotation is used.
148 The tinc daemon can send a lot of messages to the syslog.
149 The higher the debug level,
150 the more messages it will log.
151 Each level inherits all messages of the previous level:
152 .Bl -tag -width indent
154 This will log a message indicating
156 has started along with a version number.
157 It will also log any serious error.
159 This will log all connections that are made with other tinc daemons.
161 This will log status and error messages from scripts and other tinc daemons.
163 This will log all requests that are exchanged with other tinc daemons. These include
164 authentication, key exchange and connection list updates.
166 This will log a copy of everything received on the meta socket.
168 This will log all network traffic over the virtual private network.
171 .Bl -tag -width indent
172 .It Pa @sysconfdir@/tinc/
173 Directory containing the configuration files tinc uses.
174 For more information, see
176 .It Pa @localstatedir@/run/tinc. Ns Ar NETNAME Ns Pa .pid
177 The PID of the currently running
179 is stored in this file.
184 option may not work correctly.
186 .Sy The cryptography in tinc is not well tested yet. Use it at your own risk!
188 If you find any bugs, report them to tinc@tinc-vpn.org.
190 A lot, especially security auditing.
194 .Pa http://www.tinc-vpn.org/ ,
195 .Pa http://www.cabal.org/ .
197 The full documentation for tinc is maintained as a Texinfo manual.
198 If the info and tinc programs are properly installed at your site,
201 should give you access to the complete manual.
203 tinc comes with ABSOLUTELY NO WARRANTY.
204 This is free software, and you are welcome to redistribute it under certain conditions;
205 see the file COPYING for details.
208 .An "Guus Sliepen" Aq guus@tinc-vpn.org
210 And thanks to many others for their contributions to tinc!