3 .\" Manual page created by:
5 .\" Guus Sliepen <guus@tinc-vpn.org>
12 .Op Fl -config Ns = Ns Ar DIR
14 .Op Fl -debug Ns Op = Ns Ar LEVEL
15 .Op Fl -kill Ns Op = Ns Ar SIGNAL
16 .Op Fl -net Ns = Ns Ar NETNAME
17 .Op Fl -generate-keys Ns Op = Ns Ar BITS
19 .Op Fl -logfile Ns Op = Ns Ar FILE
20 .Op Fl -pidfile Ns = Ns Ar FILE
21 .Op Fl -bypass-security
23 .Op Fl -user Ns = Ns Ar USER
27 This is the daemon of tinc, a secure virtual private network (VPN) project.
30 will read it's configuration file to determine what virtual subnets it has to serve
31 and to what other tinc daemons it should connect.
32 It will connect to the ethertap or tun/tap device
33 and set up a socket for incoming connections.
34 Optionally a script will be executed to further configure the virtual device.
36 it will detach from the controlling terminal and continue in the background,
37 accepting and setting up connections to other tinc daemons
38 that are part of the virtual private network.
39 Under Windows (not Cygwin) tinc will install itself as a service,
40 which will be restarted automatically after reboots.
42 .Bl -tag -width indent
43 .It Fl c, -config Ns = Ns Ar DIR
44 Read configuration files from
47 .Pa @sysconfdir@/tinc/ .
49 Don't fork and detach.
50 This will also disable the automatic restart mechanism for fatal errors.
51 If not mentioned otherwise, this will show log messages on the standard error output.
52 .It Fl d, -debug Ns Op = Ns Ar LEVEL
53 Increase debug level or set it to
56 .It Fl k, -kill Ns Op = Ns Ar SIGNAL
57 Attempt to kill a running
59 (optionally with the specified
61 instead of SIGTERM) and exit.
62 Under Windows (not Cygwin) the optional argument is ignored,
63 the service will always be stopped and removed.
64 .It Fl n, -net Ns = Ns Ar NETNAME
67 .It Fl K, -generate-keys Ns Op = Ns Ar BITS
68 Generate public/private RSA keypair and exit.
71 is omitted, the default length will be 2048 bits.
72 When saving keys to existing files, tinc will not delete the old keys,
73 you have to remove them manually.
75 Lock tinc into main memory.
76 This will prevent sensitive data like shared private keys to be written to the system swap files/partitions.
77 .It Fl -logfile Ns Op = Ns Ar FILE
78 Write log entries to a file instead of to the system logging facility.
81 is omitted, the default is
82 .Pa @localstatedir@/log/tinc. Ns Ar NETNAME Ns Pa .log.
83 .It Fl -pidfile Ns = Ns Ar FILE
87 .Pa @localstatedir@/run/tinc. Ns Ar NETNAME Ns Pa .pid.
88 Under Windows this option will be ignored.
89 .It Fl -bypass-security
90 Disables encryption and authentication of the meta protocol.
91 Only useful for debugging.
93 With this option tinc chroots into the directory where network
94 config is located (@sysconfdir@/tinc/NETNAME if -n option is used,
95 or to the directory specified with -c option) after initialization.
96 .It Fl -user Ns = Ns Ar USER
97 setuid to the specified
101 Display short list of options.
103 Output version information and exit.
106 .Bl -tag -width indent
110 to try to connect to all uplinks immediately.
113 attempts to do this itself,
114 but increases the time it waits between the attempts each time it failed,
117 didn't succeed to connect to an uplink the first time after it started,
118 it defaults to the maximum time of 15 minutes.
120 Partially rereads configuration files.
121 Connections to hosts whose host config file are removed are closed.
122 New outgoing connections specified in
126 Temporarily increases debug level to 5.
127 Send this signal again to revert to the original level.
129 Dumps the connection list to syslog.
131 Dumps virtual network device statistics, all known nodes, edges and subnets to syslog.
133 Purges all information remembered about unreachable nodes.
136 The tinc daemon can send a lot of messages to the syslog.
137 The higher the debug level,
138 the more messages it will log.
139 Each level inherits all messages of the previous level:
140 .Bl -tag -width indent
142 This will log a message indicating
144 has started along with a version number.
145 It will also log any serious error.
147 This will log all connections that are made with other tinc daemons.
149 This will log status and error messages from scripts and other tinc daemons.
151 This will log all requests that are exchanged with other tinc daemons. These include
152 authentication, key exchange and connection list updates.
154 This will log a copy of everything received on the meta socket.
156 This will log all network traffic over the virtual private network.
159 .Bl -tag -width indent
160 .It Pa @sysconfdir@/tinc/
161 Directory containing the configuration files tinc uses.
162 For more information, see
164 .It Pa @localstatedir@/run/tinc. Ns Ar NETNAME Ns Pa .pid
165 The PID of the currently running
167 is stored in this file.
172 option may not work correctly.
174 .Sy The cryptography in tinc is not well tested yet. Use it at your own risk!
176 If you find any bugs, report them to tinc@tinc-vpn.org.
178 A lot, especially security auditing.
181 .Pa http://www.tinc-vpn.org/ ,
182 .Pa http://www.cabal.org/ .
184 The full documentation for tinc is maintained as a Texinfo manual.
185 If the info and tinc programs are properly installed at your site,
188 should give you access to the complete manual.
190 tinc comes with ABSOLUTELY NO WARRANTY.
191 This is free software, and you are welcome to redistribute it under certain conditions;
192 see the file COPYING for details.
195 .An "Guus Sliepen" Aq guus@tinc-vpn.org
197 And thanks to many others for their contributions to tinc!