|
NAMEsc_remoted —
interact with a collection of remotely controlled scamper
instances
SYNOPSIS
DESCRIPTIONThesc_remoted utility provides the ability to connect
to a
scamper(1)
instance running remotely and interact with it by issuing commands and
receiving results in warts format. The options are as follows:
EXAMPLESThe intended use of the remote control socket built into scamper(1) is as follows. A central server with IP addresses 192.0.2.1 and 2001:db8::1 runs asc_remoted process listening on a port for
remote scamper process, placing control sockets in a specified directory:
sc_remoted -P 31337 -U
scamper-remote-sockets Then, a remote host with IP address 198.51.100.55 runs scamper and connects to the remote controller: scamper -R
192.0.2.1:31337 The scamper-remote-sockets/198.51.100.55:1025 If a second remote host with IP address 2001:db8:1234::1 runs scamper and connects to the remote controller: scamper -R
[2001:db8::1]:31337 The same scamper-remote-sockets/2001:db8:1234::1.1026 USING TRANSPORT LAYER SECURITYsc_remoted and scamper support the use of transport
layer security (TLS) using OpenSSL to authenticate and encrypt communications
between sc_remoted and scamper. To use this support
requires a public certificate signed by a certificate authority. Scamper will
verify the certificate presented by sc_remoted and
disconnect if the certificate presented by sc_remoted
cannot be validated.
Generating a certificate that will be accepted by scamper requires you to create a certificate request and pass it for signing to a certificate authority. To generate a private key in file remotepriv.pem, and a request to sign the key in remotereq.pem: openssl req -new -keyout
remotepriv.pem -out remotereq.pem and then send the remotereq.pem file to the certificate authority
for signing. Do not send remotepriv.pem; that key must remain private to
you. When openssl prompts for a passphrase, choose a passphrase that is
unique and keep the passphrase secret. When your chosen certificate
authority signs your private key, it will return a file which we will call
remotecert.pem. Both remotecert.pem and remotepriv.pem are required
parameters to sc_remoted -P 31337 -U
scamper-remote-sockets -c remotecert.pem -p remotepriv.pem and then passing the -O tls option to scamper: scamper -R example.com:31337 -O
tls SIGNAL HANDLERSsc_remoted installs handlers for two signals: SIGINT and
SIGHUP. SIGINT causes sc_remoted to exit gracefully.
SIGHUP causes sc_remoted to reload the TLS certificate
and private key, without interrupting existing TLS connections.
SEE ALSOscamper(1), sc_attach(1), sc_wartsdump(1), warts(5), openssl(1)AUTHORSsc_remoted was written by Matthew Luckie
<mjl@luckie.org.nz>.
Visit the GSP FreeBSD Man Page Interface. |