aboutsummaryrefslogtreecommitdiff
path: root/doc/man/gnunet-gns-proxy.1
blob: 9b9f603bd288b0f3ae7af5ae2cd52f945e49ea42 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
.TH GNUNET\-GNS\-PROXY 1 "Oct 25, 2012" "GNUnet"

.SH NAME
gnunet\-gns\-proxy \- run a client side GNS SOCKS proxy

.SH SYNOPSIS
.B gnunet\-gns\-proxy
.RI [ options ]
.br

.SH DESCRIPTION
Most users will want to run this SOCKS proxy. It can be used in combination with browsers that support the SOCKS 4a protocol.

The proxy will perform SSL authentication of GNS names and rewrite GNS enabled HTML content. To assert the validity of GNS names a local root CA certificate has to be generated that is used by the proxy. Thus "gnunet-gns-proxy-setup-ca" should be executed before the first launch of this proxy or the \-\-authority switch is used to specify an appropriate CA certificate that is already trusted by the browser.

.SH OPTIONS
.B
.IP "\-c FILENAME,  \-\-config=FILENAME"
Use the configuration file FILENAME.
.B
.IP "\-a AUTHORITY,  \-\-authority=AUTHORITY"
Path to a PEM CA file that contains the certificate and private key of the CA to use to assert the validity of GNS names. The default port is specified in the configuration file for the gns service under "[gns-proxy]" PROXY_CACERT.
.B
.IP "\-p PORT,  \-\-port=PORT"
The port this proxy should listen on. Default is 7777.
.B
.IP "\-h, \-\-help"
Print short help on options.
.B
.IP "\-L LOGLEVEL, \-\-loglevel=LOGLEVEL"
Use LOGLEVEL for logging.  Valid values are DEBUG, INFO, WARNING and ERROR.
.B
.IP "\-v, \-\-version"
Print GNUnet version number.


.SH BUGS
Report bugs by using Mantis <https://gnunet.org/bugs/> or by sending electronic mail to <bug\-gnunet@gnu.org>

.SH SEE ALSO
gnunet\-gns(1)