TINCD(8) | System Manager's Manual | TINCD(8) |
tincd
— tinc VPN
daemon
tincd |
[-cdDkKnoLRU ]
[--config =DIR]
[--no-detach ]
[--debug [=LEVEL]]
[--kill [=SIGNAL]]
[--net =NETNAME]
[--generate-keys [=BITS]]
[--option =[HOST.]KEY=VALUE]
[--mlock ]
[--logfile [=FILE]]
[--pidfile =FILE]
[--bypass-security ]
[--chroot ]
[--user =USER]
[--help ] [--version ] |
This is the daemon of tinc, a secure virtual private network (VPN)
project. When started, tincd
will read it's
configuration file to determine what virtual subnets it has to serve and to
what other tinc daemons it should connect. It will connect to the ethertap
or tun/tap device and set up a socket for incoming connections. Optionally a
script will be executed to further configure the virtual device. If that
succeeds, it will detach from the controlling terminal and continue in the
background, accepting and setting up connections to other tinc daemons that
are part of the virtual private network. Under Windows (not Cygwin) tinc
will install itself as a service, which will be restarted automatically
after reboots.
-c,
--config
=DIR-D,
--no-detach
-d,
--debug
[=LEVEL]-k,
--kill
[=SIGNAL]tincd
(optionally with
the specified SIGNAL instead of SIGTERM) and exit.
Under Windows (not Cygwin) the optional argument is ignored, the service
will always be stopped and removed.-n,
--net
=NETNAME-K,
--generate-keys
[=BITS]-o,
--option
=[HOST.]KEY=VALUE-L,
--mlock
--logfile
[=FILE]--pidfile
=FILE--bypass-security
-R,
--chroot
-U,
--user
=USER--help
--version
tincd
to try to connect to all uplinks
immediately. Usually tincd
attempts to do this
itself, but increases the time it waits between the attempts each time it
failed, and if tincd
didn't succeed to connect to
an uplink the first time after it started, it defaults to the maximum time
of 15 minutes.--logfile
option is used, this will also close and
reopen the log file, useful when log rotation is used.The tinc daemon can send a lot of messages to the syslog. The higher the debug level, the more messages it will log. Each level inherits all messages of the previous level:
tincd
has
started along with a version number. It will also log any serious
error.tincd
is stored
in this file.The BindToInterface option may not work correctly.
The cryptography in tinc is not well tested yet. Use it at your own risk!
If you find any bugs, report them to tinc@tinc-vpn.org.
A lot, especially security auditing.
tinc.conf(5), https://www.tinc-vpn.org/, http://www.cabal.org/.
The full documentation for tinc is maintained as a Texinfo manual.
If the info and tinc programs are properly installed at your site, the
command info tinc
should give you access to the
complete manual.
tinc comes with ABSOLUTELY NO WARRANTY. This is free software, and you are welcome to redistribute it under certain conditions; see the file COPYING for details.
Ivo Timmermans
Guus Sliepen ⟨guus@tinc-vpn.org⟩
And thanks to many others for their contributions to tinc!
2014-05-11 |