tcpproxy man page on DragonFly

Man page or keyword search:  
man Server   44335 pages
apropos Keyword Search (all sections)
Output format
DragonFly logo
[printable version]

TCPPROXY(8)							   TCPPROXY(8)

NAME
       tcpproxy - IPv4/IPv6 tcp connection proxy

SYNOPSIS
       tcpproxy
	 [ -h|--help ]
	 [ -D|--nodaemonize ]
	 [ -u|--username <username> ]
	 [ -g|--groupname <groupname> ]
	 [ -C|--chroot <path> ]
	 [ -P|--write-pid <filename> ]
	 [ -L|--log <target>:<level>[,<param1>[,<param2>[..]]] ]
	 [ -U|--debug ]
	 [ -l|--local-addr <host> ]
	 [ -t|--local-resolv (ipv4|4|ipv6|6) ]
	 [ -p|--local-port <service> ]
	 [ -r|--remote-addr <host> ]
	 [ -R|--remote-resolv (ipv4|4|ipv6|6) ]
	 [ -o|--remote-port <service> ]
	 [ -s|--source-addr <host> ]
	 [ -b|--buffer-size <size> ]
	 [ -c|--config <file> ]

DESCRIPTION
       tcpproxy is a simple tcp connection proxy which combines the features
       of rinetd and 6tunnel. tcpproxy supports IPv4 and IPv6 and also
       supports connections from IPv6 to IPv4 endpoints and vice versa.

OPTIONS
       The following options can be passed to the tcpproxy daemon:

       -D, --nodaemonize
	   This option instructs tcpproxy to run in foreground instead of
	   becoming a daemon which is the default.

       -u, --username <username>
	   run as this user. If no group is specified (-g) the default group
	   of the user is used. The default is to not drop privileges.

       -g, --groupname <groupname>
	   run as this group. If no username is specified (-u) this gets
	   ignored. The default is to not drop privileges.

       -C, --chroot <path>
	   Instruct tcpproxy to run in a chroot jail. The default is to not
	   run in chroot.

       -P, --write-pid <filename>
	   Instruct tcpproxy to write it’s pid to this file. The default is to
	   not create a pid file.

       -L, --log <target>:<level>[,<param1>[,<param2>[..]]]
	   add log target to logging system. This can be invoked several times
	   in order to log to different targets at the same time. Every target
	   has its own log level which is a number between 0 and 5. Where 0
	   means disabling log and 5 means debug messages are enabled.

	   The file target can be used more than once with different levels.
	   If no target is provided at the command line a single target with
	   the config syslog:3,tcpproxy,daemon is added.

	   The following targets are supported:

	   syslog
	       log to syslog daemon, parameters
	       <level>[,<logname>[,<facility>]]

	   file
	       log to file, parameters <level>[,<path>]

	   stdout
	       log to standard output, parameters <level>

	   stderr
	       log to standard error, parameters <level>

       -U, --debug
	   This option instructs tcpproxy to run in debug mode. It implicits
	   -D (don’t daemonize) and adds a log target with the configuration
	   stdout:5 (logging with maximum level). In future releases there
	   might be additional output when this option is supplied.

       -l, --local-addr <host>
	   The local address to bind to. By default tcpproxy will listen on
	   any interface (IPv6 and IPv4).

       -t|--local-resolv (ipv4|4|ipv6|6)
	   When resolving the local address (see above) use only IPv4 or IPv6.
	   The default is to resolv both.

       -p, --local-port <service>
	   The local port to bind to. By default there is no port defined in
	   which case tcpproxy will try to read the configuration file.

       -r, --remote-addr <host>
	   The remote address to connect to. Unless the configuration file
	   should be used this must be set to a valid address or hostname.

       -R|--remote-resolv (ipv4|4|ipv6|6)
	   When resolving the remote address (see above) use only IPv4 or
	   IPv6. The default is to resolv both. Mind that this also effects
	   resolving of the source address (see below) as the remote and
	   source addresses must be of the same protocol familiy.

       -o, --remote-port <service>
	   The remote port to connect to. Unless the configuration file should
	   be used this must be set to a valid port or servicename.

       -s, --source-addr <host>
	   Instruct tcpproxy to use this source address for connections to
	   -R|--remote-address. By default tcpproxy uses the default source
	   address for the defined remote host.

       -b, --buffer-size <size>
	   The size of the transmit buffers to use.  tcpproxy will allocate
	   two buffers of this size for any client which is connected. By
	   default a value of 10Kbytes is used.

       -c, --config <file>
	   The path to the configuration file to be used. This is only
	   evaluated if the local port is omitted.

CONFIGURATION FILE
       If the configuratin file is used it should contain one or more of the
       following stanzas:

	   listen (*|address|hostname) (port-number|service-name)
	   {
	     resolv: (ipv4|ipv6)
	     remote: (address|hostname) (port-number|service-name);
	     remote-resolv: (ipv4|ipv6);
	     source: (address|hostname);
	   };

       Everything between the curly brackets except for the remote parameter
       may be omitted.

SIGNALS
       After receiving the HUP signal tcpproxy tries to reload the
       configuration file. It only reopens a listen socket if the local
       address and or port has changed. Therefore reloading the configuration
       after the daemon has dropped privileges is safe as long as there are no
       changes in the local address and port. However this is only of concern
       if any of the listen ports is a privileged port (<1024). If there is a
       syntax error at the configuration file all changes are discarded. On
       SIGUSR1 tcpproxy prints some information about the listening sockets
       and after SIGUSR2 information about open client connections is printed.
       This is sent to all configured log targets at a level of 3.

BUGS
       Most likely there are some bugs in tcpproxy. If you find a bug, please
       let the developers know at tcpproxy@spreadspace.org. Of course, patches
       are preferred.

SEE ALSO
       rinetd(8)

AUTHORS
       Christian Pointner <equinox@spreadspace.org>

RESOURCES
       Main web site: http://www.spreadspace.org/tcpproxy/

COPYING
       Copyright (C) 2010-2015 Christian Pointner. This program is free
       software: you can redistribute it and/or modify it under the terms of
       the GNU General Public License as published by the Free Software
       Foundation, either version 3 of the License, or any later version.

				  05/13/2015			   TCPPROXY(8)
[top]

List of man pages available for DragonFly

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net