1socat(1) socat(1)
2
3
4
6 socat - Multipurpose relay (SOcket CAT)
7
9 socat [options] <address> <address>
10 socat -V
11 socat -h[h[h]] | -?[?[?]]
12 filan
13 procan
14
16 Socat is a command line based utility that establishes two bidirec‐
17 tional byte streams and transfers data between them. Because the
18 streams can be constructed from a large set of different types of data
19 sinks and sources (see address types), and because lots of address
20 options may be applied to the streams, socat can be used for many dif‐
21 ferent purposes.
22
23 Filan is a utility that prints information about its active file
24 descriptors to stdout. It has been written for debugging socat, but
25 might be useful for other purposes too. Use the -h option to find more
26 infos.
27
28 Procan is a utility that prints information about process parameters to
29 stdout. It has been written to better understand some UNIX process
30 properties and for debugging socat, but might be useful for other pur‐
31 poses too.
32
33 The life cycle of a socat instance typically consists of four phases.
34
35 In the init phase, the command line options are parsed and logging is
36 initialized.
37
38 During the open phase, socat opens the first address and afterwards the
39 second address. These steps are usually blocking; thus, especially for
40 complex address types like socks, connection requests or authentication
41 dialogs must be completed before the next step is started.
42
43 In the transfer phase, socat watches both streams’ read and write file
44 descriptors via select() , and, when data is available on one side and
45 can be written to the other side, socat reads it, performs newline
46 character conversions if required, and writes the data to the write
47 file descriptor of the other stream, then continues waiting for more
48 data in both directions.
49
50 When one of the streams effectively reaches EOF, the closing phase
51 begins. Socat transfers the EOF condition to the other stream, i.e.
52 tries to shutdown only its write stream, giving it a chance to termi‐
53 nate gracefully. For a defined time socat continues to transfer data in
54 the other direction, but then closes all remaining channels and termi‐
55 nates.
56
58 Socat provides some command line options that modify the behaviour of
59 the program. They have nothing to do with so called address options
60 that are used as parts of address specifications.
61
62 -V Print version and available feature information to stdout, and
63 exit.
64
65 -h | -?
66 Print a help text to stdout describing command line options and
67 available address types, and exit.
68
69 -hh | -??
70 Like -h, plus a list of the short names of all available address
71 options. Some options are platform dependend, so this output is
72 helpful for checking the particular implementation.
73
74 -hhh | -???
75 Like -hh, plus a list of all available address option names.
76
77 -d Without this option, only fatal and error messages are gener‐
78 ated; applying this option also prints warning messages. See
79 DIAGNOSTICS for more information.
80
81 -d -d Prints fatal, error, warning, and notice messages.
82
83 -d -d -d
84 Prints fatal, error, warning, notice, and info messages.
85
86 -d -d -d -d
87 Prints fatal, error, warning, notice, info, and debug messages.
88
89 -D Logs information about file descriptors before starting the
90 transfer phase.
91
92 -ly[<facility>]
93 Writes messages to syslog instead of stderr; severity as defined
94 with -d option. With optional <facility>, the syslog type can be
95 selected, default is "daemon". Third party libraries might not
96 obey this option.
97
98 -lf <logfile>
99 Writes messages to <logfile> [filename] instead of stderr. Some
100 third party libraries, in particular libwrap, might not obey
101 this option.
102
103 -ls Writes messages to stderr (this is the default). Some third
104 party libraries might not obey this option, in particular lib‐
105 wrap appears to only log to syslog.
106
107 -lp<progname>
108 Overrides the program name printed in error messages and used
109 for constructing environment variable names.
110
111 -lu Extends the timestamp of error messages to microsecond resolu‐
112 tion. Does not work when logging to syslog.
113
114 -lm[<facility>]
115 Mixed log mode. During startup messages are printed to stderr;
116 when socat starts the transfer phase loop or daemon mode (i.e.
117 after opening all streams and before starting data transfer, or,
118 with listening sockets with fork option, before the first accept
119 call), it switches logging to syslog. With optional <facility>,
120 the syslog type can be selected, default is "daemon".
121
122 -lh Adds hostname to log messages. Uses the value from environment
123 variable HOSTNAME or the value retrieved with uname() if HOST‐
124 NAME is not set.
125
126 -v Writes the transferred data not only to their target streams,
127 but also to stderr. The output format is text with some conver‐
128 sions for readability, and prefixed with "> " or "< " indicating
129 flow directions.
130
131 -x Writes the transferred data not only to their target streams,
132 but also to stderr. The output format is hexadecimal, prefixed
133 with "> " or "< " indicating flow directions. Can be combined
134 with -v .
135
136 -b<size>
137 Sets the data transfer block <size> [size_t]. At most <size>
138 bytes are transferred per step. Default is 8192 bytes.
139
140 -s By default, socat terminates when an error occurred to prevent
141 the process from running when some option could not be applied.
142 With this option, socat is sloppy with errors and tries to con‐
143 tinue. Even with this option, socat will exit on fatals, and
144 will abort connection attempts when security checks failed.
145
146 -t<timeout>
147 When one channel has reached EOF, the write part of the other
148 channel is shut down. Then, socat waits <timeout> [timeval] sec‐
149 onds before terminating. Default is 0.5 seconds. This timeout
150 only applies to addresses where write and read part can be
151 closed independently. When during the timeout interval the read
152 part gives EOF, socat terminates without awaiting the timeout.
153
154 -T<timeout>
155 Total inactivity timeout: when socat is already in the transfer
156 loop and nothing has happened for <timeout> [timeval] seconds
157 (no data arrived, no interrupt occurred...) then it terminates.
158 Useful with protocols like UDP that cannot transfer EOF.
159
160 -u Uses unidirectional mode. The first address is only used for
161 reading, and the second address is only used for writing (exam‐
162 ple).
163
164 -U Uses unidirectional mode in reverse direction. The first address
165 is only used for writing, and the second address is only used
166 for reading.
167
168 -g During address option parsing, don’t check if the option is con‐
169 sidered useful in the given address environment. Use it if you
170 want to force, e.g., appliance of a socket option to a serial
171 device.
172
173 -L<lockfile>
174 If lockfile exists, exits with error. If lockfile does not
175 exist, creates it and continues, unlinks lockfile on exit.
176
177 -W<lockfile>
178 If lockfile exists, waits until it disappears. When lockfile
179 does not exist, creates it and continues, unlinks lockfile on
180 exit.
181
182 -4 Use IP version 4 in case that the addresses do not implicitly or
183 explicitly specify a version; this is the default.
184
185 -6 Use IP version 6 in case that the addresses do not implicitly or
186 explicitly specify a version.
187
188
190 With the address command line arguments, the user gives socat instruc‐
191 tions and the necessary information for establishing the byte streams.
192
193 An address specification usually consists of an address type keyword,
194 zero or more required address parameters separated by ’:’ from the key‐
195 word and from each other, and zero or more address options separated by
196 ’,’.
197
198 The keyword specifies the address type (e.g., TCP4, OPEN, EXEC). For
199 some keywords there exist synonyms (’-’ for STDIO, TCP for TCP4). Key‐
200 words are case insensitive. For a few special address types, the key‐
201 word may be omitted: Address specifications starting with a number are
202 assumed to be FD (raw file descriptor) addresses; if a ’/’ is found
203 before the first ’:’ or ’,’, GOPEN (generic file open) is assumed.
204
205 The required number and type of address parameters depend on the
206 address type. E.g., TCP4 requires a server specification (name or
207 address), and a port specification (number or service name).
208
209 Zero or more address options may be given with each address. They
210 influence the address in some ways. Options consist of an option key‐
211 word or an option keyword and a value, separated by ’=’. Option key‐
212 words are case insensitive. For filtering the options that are useful
213 with an address type, each option is member of one option group. For
214 each address type there is a set of option groups allowed. Only options
215 belonging to one of these address groups may be used (except with
216 option -g).
217
218 Address specifications following the above schema are also called sin‐
219 gle address specifications. Two single addresses can be combined with
220 "!!" to form a dual type address for one channel. Here, the first
221 address is used by socat for reading data, and the second address for
222 writing data. There is no way to specify an option only once for being
223 applied to both single addresses.
224
225 Usually, addresses are opened in read/write mode. When an address is
226 part of a dual address specification, or when option -u or -U is used,
227 an address might be used only for reading or for writing. Considering
228 this is important with some address types.
229
230 With socat version 1.5.0 and higher, the lexical analysis tries to han‐
231 dle quotes and parenthesis meaningfully and allows escaping of special
232 characters. If one of the characters ( { [ ’ is found, the correspond‐
233 ing closing character - ) } ] ’ - is looked for; they may also be
234 nested. Within these constructs, socats special characters and strings
235 : , !! are not handled specially. All those characters and strings can
236 be escaped with \ or within ""
237
239 This section describes the available address types with their keywords,
240 parameters, and semantics.
241
242 CREATE:<filename>
243 Opens <filename> with creat() and uses the file descriptor for
244 writing. This address type requires write-only context, because
245 a file opened with creat cannot be read from.
246 Flags like O_LARGEFILE cannot be applied. If you need them use
247 OPEN with options create,create.
248 <filename> must be a valid existing or not existing path. If
249 <filename> is a named pipe, creat() might block; if <filename>
250 refers to a socket, this is an error.
251 Option groups: FD,REG,NAMED
252 Useful options: mode, user, group, unlink-early, unlink-late,
253 append
254 See also: OPEN, GOPEN
255
256 EXEC:<command-line>
257 Forks a sub process that establishes communication with its par‐
258 ent process and invokes the specified program with execvp() .
259 <command-line> is a simple command with arguments separated by
260 single spaces. If the program name contains a ’/’, the part
261 after the last ’/’ is taken as ARGV[0]. If the program name is a
262 relative path, the execvp() semantics for finding the program
263 via $PATH apply. After successful program start, socat writes
264 data to stdin of the process and reads from its stdout using a
265 UNIX domain socket generated by socketpair() per default. (exam‐
266 ple)
267 Option groups: FD,SOCKET,EXEC,FORK,TERMIOS
268 Useful options: path, fdin, fdout, chroot, su, su-d, nofork,
269 pty, stderr, ctty, setsid, pipes, login, sigint, sigquit
270 See also: SYSTEM
271
272 FD:<fdnum>
273 Uses the file descriptor <fdnum>. It must already exist as valid
274 UN*X file descriptor.
275 Option groups: FD (TERMIOS,REG,SOCKET)
276 See also: STDIO, STDIN, STDOUT, STDERR
277
278 GOPEN:<filename>
279 (Generic open) This address type tries to handle any file system
280 entry except directories usefully. <filename> may be a relative
281 or absolute path. If it already exists, its type is checked. In
282 case of a UNIX domain socket, socat connects; if connecting
283 fails, socat assumes a datagram socket and uses sendto() calls.
284 If the entry is not a socket, socat opens it applying the
285 O_APPEND flag. If it does not exist, it is opened with flag
286 O_CREAT as a regular file (example).
287 Option groups: FD,REG,SOCKET,NAMED,OPEN
288 See also: OPEN, CREATE, UNIX-CONNECT
289
290 IP-SENDTO:<host>:<protocol>
291 Opens a raw IP socket. Depending on host specification or option
292 pf, IP protocol version 4 or 6 is used. It uses <protocol> to
293 send packets to <host> [IP address] and receives packets from
294 host, ignores packets from other hosts. Protocol 255 uses the
295 raw socket with the IP header being part of the data.
296 Option groups: FD,SOCKET,IP4,IP6
297 Useful options: pf, ttl
298 See also: IP4-SENDTO, IP6-SENDTO, IP-RECVFROM, IP-RECV,
299 UDP-SENDTO, UNIX-SENDTO
300
301 INTERFACE:<interface>
302 Communicates with a network connected on an interface using raw
303 packets including link level data. <interface> is the name of
304 the network interface. Currently only available on Linux.
305 Option groups: FD,SOCKET
306 Useful options: pf, type
307 See also: ip-recv
308
309 IP4-SENDTO:<host>:<protocol>
310 Like IP-SENDTO, but always uses IPv4.
311 Option groups: FD,SOCKET,IP4
312
313 IP6-SENDTO:<host>:<protocol>
314 Like IP-SENDTO, but always uses IPv6.
315 Option groups: FD,SOCKET,IP6
316
317
318 IP-DATAGRAM:<address>:<protocol>
319 Sends outgoing data to the specified address which may in par‐
320 ticular be a broadcast or multicast address. Packets arriving on
321 the local socket are checked if their source addresses match
322 RANGE or TCPWRAP options. This address type can for example be
323 used for implementing symmetric or asymmetric broadcast or mul‐
324 ticast communications.
325 Option groups: FD, SOCKET, IP4, IP6, RANGE
326 Useful options: bind, range, tcpwrap, broadcast, ip-multi‐
327 cast-loop, ip-multicast-ttl, ip-multicast-if, ip-add-membership,
328 ttl, tos, pf
329 See also: IP4-DATAGRAM, IP6-DATAGRAM, IP-SENDTO, IP-RECVFROM,
330 IP-RECV, UDP-DATAGRAM
331
332 IP4-DATAGRAM:<host>:<protocol>
333 Like IP-DATAGRAM, but always uses IPv4. (example)
334 Option groups: FD,SOCKET,IP4,RANGE
335
336 IP6-DATAGRAM:<host>:<protocol>
337 Like IP-DATAGRAM, but always uses IPv6. Please note that IPv6
338 does not know broadcasts.
339 Option groups: FD,SOCKET,IP6,RANGE
340
341
342 IP-RECVFROM:<protocol>
343 Opens a raw IP socket of <protocol>. Depending on option pf, IP
344 protocol version 4 or 6 is used. It receives one packet from an
345 unspecified peer and may send one or more answer packets to that
346 peer. This mode is particularly useful with fork option where
347 each arriving packet - from arbitrary peers - is handled by its
348 own sub process. This allows a behaviour similar to typical UDP
349 based servers like ntpd or named.
350 Please note that the reply packets might be fetched as incoming
351 traffic when sender and receiver IP address are identical
352 because there is no port number to distinguish the sockets.
353 This address works well with IP-SENDTO address peers (see
354 above). Protocol 255 uses the raw socket with the IP header
355 being part of the data.
356 Option groups: FD,SOCKET,IP4,IP6,CHILD,RANGE
357 Useful options: pf, fork, range, ttl, broadcast
358 See also: IP4-RECVFROM, IP6-RECVFROM, IP-SENDTO, IP-RECV,
359 UDP-RECVFROM, UNIX-RECVFROM
360
361 IP4-RECVFROM:<protocol>
362 Like IP-RECVFROM, but always uses IPv4.
363 Option groups: FD,SOCKET,IP4,CHILD,RANGE
364
365 IP6-RECVFROM:<protocol>
366 Like IP-RECVFROM, but always uses IPv6.
367 Option groups: FD,SOCKET,IP6,CHILD,RANGE
368
369
370 IP-RECV:<protocol>
371 Opens a raw IP socket of <protocol>. Depending on option pf, IP
372 protocol version 4 or 6 is used. It receives packets from multi‐
373 ple unspecified peers and merges the data. No replies are pos‐
374 sible. It can be, e.g., addressed by socat IP-SENDTO address
375 peers. Protocol 255 uses the raw socket with the IP header
376 being part of the data.
377 Option groups: FD,SOCKET,IP4,IP6,RANGE
378 Useful options: pf, range
379 See also: IP4-RECV, IP6-RECV, IP-SENDTO, IP-RECVFROM, UDP-RECV,
380 UNIX-RECV
381
382 IP4-RECV:<protocol>
383 Like IP-RECV, but always uses IPv4.
384 Option groups: FD,SOCKET,IP4,RANGE
385
386 IP6-RECV:<protocol>
387 Like IP-RECV, but always uses IPv6.
388 Option groups: FD,SOCKET,IP6,RANGE
389
390
391 OPEN:<filename>
392 Opens <filename> using the open() system call (example). This
393 operation fails on UNIX domain sockets.
394 Note: This address type is rarely useful in bidirectional mode.
395 Option groups: FD,REG,NAMED,OPEN
396 Useful options: creat, excl, noatime, nofollow, append, rdonly,
397 wronly, lock, readbytes, ignoreeof
398 See also: CREATE, GOPEN, UNIX-CONNECT
399
400 OPENSSL:<host>:<port>
401 Tries to establish a SSL connection to <port> [TCP service] on
402 <host> [IP address] using TCP/IP version 4 or 6 depending on
403 address specification, name resolution, or option pf.
404 NOTE: Up to version 1.7.2.4 the server certificate was only
405 checked for validity against the system certificate store or
406 cafile or capath, but not for match with the server’s name or
407 its IP address. Since version 1.7.3.0 socat checks the peer
408 certificate for match with the <host> parameter or the value of
409 the openssl-commonname option. Socat tries to match it against
410 the certificates subject commonName, and the certifications
411 extension subjectAltName DNS names. Wildcards in the certificate
412 are supported.
413 Option groups: FD,SOCKET,IP4,IP6,TCP,OPENSSL,RETRY
414 Useful options: cipher, method, verify, commonname cafile, cap‐
415 ath, certificate, key, compress, bind, pf, connect-timeout,
416 sourceport, retry
417 See also: OPENSSL-LISTEN, TCP
418
419 OPENSSL-LISTEN:<port>
420 Listens on tcp <port> [TCP service]. The IP version is 4 or the
421 one specified with pf. When a connection is accepted, this
422 address behaves as SSL server.
423 Note: You probably want to use the certificate option with this
424 address.
425 NOTE: The client certificate is only checked for validity
426 against cafile or capath, but not for match with the client’s
427 name or its IP address!
428 Option groups: FD,SOCKET,IP4,IP6,TCP,LIS‐
429 TEN,OPENSSL,CHILD,RANGE,RETRY
430 Useful options: pf, cipher, method, verify, commonname cafile,
431 capath, certificate, key, compress, fork, bind, range, tcpwrap,
432 su, reuseaddr, retry
433 See also: OPENSSL, TCP-LISTEN
434
435 PIPE:<filename>
436 If <filename> already exists, it is opened. If it does not
437 exist, a named pipe is created and opened. Beginning with socat
438 version 1.4.3, the named pipe is removed when the address is
439 closed (but see option unlink-close
440 Note: When a pipe is used for both reading and writing, it works
441 as echo service.
442 Note: When a pipe is used for both reading and writing, and
443 socat tries to write more bytes than the pipe can buffer (Linux
444 2.4: 2048 bytes), socat might block. Consider using socat
445 option, e.g., -b 2048
446 Option groups: FD,NAMED,OPEN
447 Useful options: rdonly, nonblock, group, user, mode,
448 unlink-early
449 See also: unnamed pipe
450
451 PIPE Creates an unnamed pipe and uses it for reading and writing. It
452 works as an echo, because everything written to it appeares
453 immediately as read data.
454 Note: When socat tries to write more bytes than the pipe can
455 queue (Linux 2.4: 2048 bytes), socat might block. Consider,
456 e.g., using option -b 2048
457 Option groups: FD
458 See also: named pipe
459
460 PROXY:<proxy>:<hostname>:<port>
461 Connects to an HTTP proxy server on port 8080 using TCP/IP ver‐
462 sion 4 or 6 depending on address specification, name resolution,
463 or option pf, and sends a CONNECT request for hostname:port. If
464 the proxy grants access and succeeds to connect to the target,
465 data transfer between socat and the target can start. Note that
466 the traffic need not be HTTP but can be an arbitrary protocol.
467 Option groups: FD,SOCKET,IP4,IP6,TCP,HTTP,RETRY
468 Useful options: proxyport, ignorecr, proxyauth, resolve, crnl,
469 bind, connect-timeout, mss, sourceport, retry
470 See also: SOCKS, TCP
471
472 PTY Generates a pseudo terminal (pty) and uses its master side.
473 Another process may open the pty’s slave side using it like a
474 serial line or terminal. (example). If both the ptmx and the
475 openpty mechanisms are available, ptmx is used (POSIX).
476 Option groups: FD,NAMED,PTY,TERMIOS
477 Useful options: link, openpty, wait-slave, mode, user, group
478 See also: UNIX-LISTEN, PIPE, EXEC, SYSTEM
479
480 READLINE
481 Uses GNU readline and history on stdio to allow editing and
482 reusing input lines (example). This requires the GNU readline
483 and history libraries. Note that stdio should be a (pseudo) ter‐
484 minal device, otherwise readline does not seem to work.
485 Option groups: FD,READLINE,TERMIOS
486 Useful options: history, noecho
487 See also: STDIO
488
489 SCTP-CONNECT:<host>:<port>
490 Establishes an SCTP stream connection to the specified <host>
491 [IP address] and <port> [TCP service] using TCP/IP version 4 or
492 6 depending on address specification, name resolution, or option
493 pf.
494 Option groups: FD,SOCKET,IP4,IP6,SCTP,CHILD,RETRY
495 Useful options: bind, pf, connect-timeout, tos, mtudiscover,
496 sctp-maxseg, sctp-nodelay, nonblock, sourceport, retry, read‐
497 bytes
498 See also: SCTP4-CONNECT, SCTP6-CONNECT, SCTP-LISTEN, TCP-CONNECT
499
500 SCTP4-CONNECT:<host>:<port>
501 Like SCTP-CONNECT, but only supports IPv4 protocol.
502 Option groups: FD,SOCKET,IP4,SCTP,CHILD,RETRY
503
504 SCTP6-CONNECT:<host>:<port>
505 Like SCTP-CONNECT, but only supports IPv6 protocol.
506 Option groups: FD,SOCKET,IP6,SCTP,CHILD,RETRY
507
508 SCTP-LISTEN:<port>
509 Listens on <port> [TCP service] and accepts a TCP/IP connection.
510 The IP version is 4 or the one specified with address option pf,
511 socat option (-4, -6), or environment variable
512 SOCAT_DEFAULT_LISTEN_IP. Note that opening this address usually
513 blocks until a client connects.
514 Option groups: FD,SOCKET,LISTEN,CHILD,RANGE,IP4,IP6,SCTP,RETRY
515 Useful options: crnl, fork, bind, range, tcpwrap, pf, max-chil‐
516 dren, backlog, sctp-maxseg, sctp-nodelay, su, reuseaddr, retry,
517 cool-write
518 See also: SCTP4-LISTEN, SCTP6-LISTEN, TCP-LISTEN, SCTP-CONNECT
519
520 SCTP4-LISTEN:<port>
521 Like SCTP-LISTEN, but only supports IPv4 protocol.
522 Option groups: FD,SOCKET,LISTEN,CHILD,RANGE,IP4,SCTP,RETRY
523
524 SCTP6-LISTEN:<port>
525 Like SCTP-LISTEN, but only supports IPv6 protocol.
526 Option groups: FD,SOCKET,LISTEN,CHILD,RANGE,IP6,SCTP,RETRY
527
528 SOCKET-CONNECT:<domain>:<protocol>:<remote-address>
529 Creates a stream socket using the first and second given socket
530 parameters and SOCK_STREAM (see man socket(2)) and connects to
531 the remote-address. The two socket parameters have to be speci‐
532 fied by int numbers. Consult your OS documentation and include
533 files to find the appropriate values. The remote-address must be
534 the data representation of a sockaddr structure without sa_fam‐
535 ily and (BSD) sa_len components.
536 Please note that you can - beyond the options of the specified
537 groups - also use options of higher level protocols when you
538 apply socat option -g.
539 Option groups: FD,SOCKET,CHILD,RETRY
540 Useful options: bind, setsockopt-int, setsockopt-bin, setsock‐
541 opt-string
542 See also: TCP, UDP-CONNECT, UNIX-CONNECT, SOCKET-LISTEN,
543 SOCKET-SENDTO
544
545 SOCKET-DATAGRAM:<domain>:<type>:<protocol>:<remote-address>
546 Creates a datagram socket using the first three given socket
547 parameters (see man socket(2)) and sends outgoing data to the
548 remote-address. The three socket parameters have to be specified
549 by int numbers. Consult your OS documentation and include files
550 to find the appropriate values. The remote-address must be the
551 data representation of a sockaddr structure without sa_family
552 and (BSD) sa_len components.
553 Please note that you can - beyond the options of the specified
554 groups - also use options of higher level protocols when you
555 apply socat option -g.
556 Option groups: FD,SOCKET,RANGE
557 Useful options: bind, range, setsockopt-int, setsockopt-bin,
558 setsockopt-string
559 See also: UDP-DATAGRAM, IP-DATAGRAM, SOCKET-SENDTO, SOCKET-RECV,
560 SOCKET-RECVFROM
561
562 SOCKET-LISTEN:<domain>:<protocol>:<local-address>
563 Creates a stream socket using the first and second given socket
564 parameters and SOCK_STREAM (see man socket(2)) and waits for
565 incoming connections on local-address. The two socket parameters
566 have to be specified by int numbers. Consult your OS documenta‐
567 tion and include files to find the appropriate values. The
568 local-address must be the data representation of a sockaddr
569 structure without sa_family and (BSD) sa_len components.
570 Please note that you can - beyond the options of the specified
571 groups - also use options of higher level protocols when you
572 apply socat option -g.
573 Option groups: FD,SOCKET,LISTEN,RANGE,CHILD,RETRY
574 Useful options: setsockopt-int, setsockopt-bin, setsock‐
575 opt-string
576 See also: TCP, UDP-CONNECT, UNIX-CONNECT, SOCKET-LISTEN,
577 SOCKET-SENDTO, SOCKET-SENDTO
578
579 SOCKET-RECV:<domain>:<type>:<protocol>:<local-address>
580 Creates a socket using the three given socket parameters (see
581 man socket(2)) and binds it to <local-address>. Receives arriv‐
582 ing data. The three parameters have to be specified by int num‐
583 bers. Consult your OS documentation and include files to find
584 the appropriate values. The local-address must be the data rep‐
585 resentation of a sockaddr structure without sa_family and (BSD)
586 sa_len components.
587 Option groups: FD,SOCKET,RANGE
588 Useful options: range, setsockopt-int, setsockopt-bin, setsock‐
589 opt-string
590 See also: UDP-RECV, IP-RECV, UNIX-RECV, SOCKET-DATAGRAM,
591 SOCKET-SENDTO, SOCKET-RECVFROM
592
593 SOCKET-RECVFROM:<domain>:<type>:<protocol>:<local-address>
594 Creates a socket using the three given socket parameters (see
595 man socket(2)) and binds it to <local-address>. Receives arriv‐
596 ing data and sends replies back to the sender. The first three
597 parameters have to be specified as int numbers. Consult your OS
598 documentation and include files to find the appropriate values.
599 The local-address must be the data representation of a sockaddr
600 structure without sa_family and (BSD) sa_len components.
601 Option groups: FD,SOCKET,CHILD,RANGE
602 Useful options: fork, range, setsockopt-int, setsockopt-bin,
603 setsockopt-string
604 See also: UDP-RECVFROM, IP-RECVFROM, UNIX-RECVFROM, SOCKET-DATA‐
605 GRAM, SOCKET-SENDTO, SOCKET-RECV
606
607 SOCKET-SENDTO:<domain>:<type>:<protocol>:<remote-address>
608 Creates a socket using the three given socket parameters (see
609 man socket(2)). Sends outgoing data to the given address and
610 receives replies. The three parameters have to be specified as
611 int numbers. Consult your OS documentation and include files to
612 find the appropriate values. The remote-address must be the data
613 representation of a sockaddr structure without sa_family and
614 (BSD) sa_len components.
615 Option groups: FD,SOCKET
616 Useful options: bind, setsockopt-int, setsockopt-bin, setsock‐
617 opt-string
618 See also: UDP-SENDTO, IP-SENDTO, UNIX-SENDTO, SOCKET-DATAGRAM,
619 SOCKET-RECV SOCKET-RECVFROM
620
621 SOCKS4:<socks-server>:<host>:<port>
622 Connects via <socks-server> [IP address] to <host> [IPv4
623 address] on <port> [TCP service], using socks version 4 protocol
624 over IP version 4 or 6 depending on address specification, name
625 resolution, or option pf (example).
626 Option groups: FD,SOCKET,IP4,IP6,TCP,SOCKS4,RETRY
627 Useful options: socksuser, socksport, sourceport, pf, retry
628 See also: SOCKS4A, PROXY, TCP
629
630 SOCKS4A:<socks-server>:<host>:<port>
631 like SOCKS4, but uses socks protocol version 4a, thus leaving
632 host name resolution to the socks server.
633 Option groups: FD,SOCKET,IP4,IP6,TCP,SOCKS4,RETRY
634
635 STDERR Uses file descriptor 2.
636 Option groups: FD (TERMIOS,REG,SOCKET)
637 See also: FD
638
639 STDIN Uses file descriptor 0.
640 Option groups: FD (TERMIOS,REG,SOCKET)
641 Useful options: readbytes
642 See also: FD
643
644 STDIO Uses file descriptor 0 for reading, and 1 for writing.
645 Option groups: FD (TERMIOS,REG,SOCKET)
646 Useful options: readbytes
647 See also: FD
648
649 STDOUT Uses file descriptor 1.
650 Option groups: FD (TERMIOS,REG,SOCKET)
651 See also: FD
652
653 SYSTEM:<shell-command>
654 Forks a sub process that establishes communication with its par‐
655 ent process and invokes the specified program with system() .
656 Please note that <shell-command> [string] must not contain ’,’
657 or "!!", and that shell meta characters may have to be pro‐
658 tected. After successful program start, socat writes data to
659 stdin of the process and reads from its stdout.
660 Option groups: FD,SOCKET,EXEC,FORK,TERMIOS
661 Useful options: path, fdin, fdout, chroot, su, su-d, nofork,
662 pty, stderr, ctty, setsid, pipes, sigint, sigquit
663 See also: EXEC
664
665 TCP:<host>:<port>
666 Connects to <port> [TCP service] on <host> [IP address] using
667 TCP/IP version 4 or 6 depending on address specification, name
668 resolution, or option pf.
669 Option groups: FD,SOCKET,IP4,IP6,TCP,RETRY
670 Useful options: crnl, bind, pf, connect-timeout, tos, mtudis‐
671 cover, mss, nodelay, nonblock, sourceport, retry, readbytes
672 See also: TCP4, TCP6, TCP-LISTEN, UDP, SCTP-CONNECT, UNIX-CON‐
673 NECT
674
675 TCP4:<host>:<port>
676 Like TCP, but only supports IPv4 protocol (example).
677 Option groups: FD,SOCKET,IP4,TCP,RETRY
678
679 TCP6:<host>:<port>
680 Like TCP, but only supports IPv6 protocol.
681 Option groups: FD,SOCKET,IP6,TCP,RETRY
682
683 TCP-LISTEN:<port>
684 Listens on <port> [TCP service] and accepts a TCP/IP connection.
685 The IP version is 4 or the one specified with address option pf,
686 socat option (-4, -6), or environment variable
687 SOCAT_DEFAULT_LISTEN_IP. Note that opening this address usually
688 blocks until a client connects.
689 Option groups: FD,SOCKET,LISTEN,CHILD,RANGE,IP4,IP6,TCP,RETRY
690 Useful options: crnl, fork, bind, range, tcpwrap, pf, max-chil‐
691 dren, backlog, mss, su, reuseaddr, retry, cool-write
692 See also: TCP4-LISTEN, TCP6-LISTEN, UDP-LISTEN, SCTP-LISTEN,
693 UNIX-LISTEN, OPENSSL-LISTEN, TCP-CONNECT
694
695 TCP4-LISTEN:<port>
696 Like TCP-LISTEN, but only supports IPv4 protocol (example).
697 Option groups: FD,SOCKET,LISTEN,CHILD,RANGE,IP4,TCP,RETRY
698
699 TCP6-LISTEN:<port>
700 Like TCP-LISTEN, but only supports IPv6 protocol.
701 Additional useful option: ipv6only
702 Option groups: FD,SOCKET,LISTEN,CHILD,RANGE,IP6,TCP,RETRY
703
704 TUN[:<if-addr>/<bits>]
705 Creates a Linux TUN/TAP device and optionally assignes it the
706 address and netmask given by the parameters. The resulting net‐
707 work interface is almost ready for use by other processes; socat
708 serves its "wire side". This address requires read and write
709 access to the tunnel cloning device, usually /dev/net/tun , as
710 well as permission to set some ioctl()s. Option iff-up is
711 required to immediately activate the interface!
712 Option groups: FD,NAMED,OPEN,TUN
713 Useful options: iff-up, tun-device, tun-name, tun-type,
714 iff-no-pi
715 See also: ip-recv
716
717 UDP:<host>:<port>
718 Connects to <port> [UDP service] on <host> [IP address] using
719 UDP/IP version 4 or 6 depending on address specification, name
720 resolution, or option pf.
721 Please note that, due to UDP protocol properties, no real con‐
722 nection is established; data has to be sent for `connecting’ to
723 the server, and no end-of-file condition can be transported.
724 Option groups: FD,SOCKET,IP4,IP6
725 Useful options: ttl, tos, bind, sourceport, pf
726 See also: UDP4, UDP6, UDP-LISTEN, TCP, IP
727
728 UDP4:<host>:<port>
729 Like UDP, but only supports IPv4 protocol.
730 Option groups: FD,SOCKET,IP4
731
732 UDP6:<host>:<port>
733 Like UDP, but only supports IPv6 protocol.
734 Option groups: FD,SOCKET,IP6
735
736 UDP-DATAGRAM:<address>:<port>
737 Sends outgoing data to the specified address which may in par‐
738 ticular be a broadcast or multicast address. Packets arriving on
739 the local socket are checked for the correct remote port and if
740 their source addresses match RANGE or TCPWRAP options. This
741 address type can for example be used for implementing symmetric
742 or asymmetric broadcast or multicast communications.
743 Option groups: FD,SOCKET,IP4,IP6,RANGE
744 Useful options: bind, range, tcpwrap, broadcast, ip-multi‐
745 cast-loop, ip-multicast-ttl, ip-multicast-if, ip-add-membership,
746 ttl, tos, sourceport, pf
747 See also: UDP4-DATAGRAM, UDP6-DATAGRAM, UDP-SENDTO,
748 UDP-RECVFROM, UDP-RECV, UDP-CONNECT, UDP-LISTEN, IP-DATAGRAM
749
750 UDP4-DATAGRAM:<address>:<port>
751 Like UDP-DATAGRAM, but only supports IPv4 protocol (example1,
752 example2).
753 Option groups: FD,SOCKET,IP4, RANGE
754
755 UDP6-DATAGRAM:<address>:<port>
756 Like UDP-DATAGRAM, but only supports IPv6 protocol.
757 Option groups: FD,SOCKET,IP6,RANGE
758
759 UDP-LISTEN:<port>
760 Waits for a UDP/IP packet arriving on <port> [UDP service] and
761 `connects’ back to sender. The accepted IP version is 4 or the
762 one specified with option pf. Please note that, due to UDP pro‐
763 tocol properties, no real connection is established; data has to
764 arrive from the peer first, and no end-of-file condition can be
765 transported. Note that opening this address usually blocks until
766 a client connects.
767 Option groups: FD,SOCKET,LISTEN,CHILD,RANGE,IP4,IP6
768 Useful options: fork, bind, range, pf
769 See also: UDP, UDP4-LISTEN, UDP6-LISTEN, TCP-LISTEN
770
771 UDP4-LISTEN:<port>
772 Like UDP-LISTEN, but only support IPv4 protocol.
773 Option groups: FD,SOCKET,LISTEN,CHILD,RANGE,IP4
774
775 UDP6-LISTEN:<port>
776 Like UDP-LISTEN, but only support IPv6 protocol.
777 Option groups: FD,SOCKET,LISTEN,CHILD,RANGE,IP6
778
779 UDP-SENDTO:<host>:<port>
780 Communicates with the specified peer socket, defined by <port>
781 [UDP service] on <host> [IP address], using UDP/IP version 4 or
782 6 depending on address specification, name resolution, or option
783 pf. It sends packets to and receives packets from that peer
784 socket only. This address effectively implements a datagram
785 client. It works well with socat UDP-RECVFROM and UDP-RECV
786 address peers.
787 Option groups: FD,SOCKET,IP4,IP6
788 Useful options: ttl, tos, bind, sourceport, pf
789 See also: UDP4-SENDTO, UDP6-SENDTO, UDP-RECVFROM, UDP-RECV,
790 UDP-CONNECT, UDP-LISTEN, IP-SENDTO
791
792 UDP4-SENDTO:<host>:<port>
793 Like UDP-SENDTO, but only supports IPv4 protocol.
794 Option groups: FD,SOCKET,IP4
795
796 UDP6-SENDTO:<host>:<port>
797 Like UDP-SENDTO, but only supports IPv6 protocol.
798 Option groups: FD,SOCKET,IP6
799
800 UDP-RECVFROM:<port>
801 Creates a UDP socket on <port> [UDP service] using UDP/IP ver‐
802 sion 4 or 6 depending on option pf. It receives one packet from
803 an unspecified peer and may send one or more answer packets to
804 that peer. This mode is particularly useful with fork option
805 where each arriving packet - from arbitrary peers - is handled
806 by its own sub process. This allows a behaviour similar to typi‐
807 cal UDP based servers like ntpd or named. This address works
808 well with socat UDP-SENDTO address peers.
809 Option groups: FD,SOCKET,IP4,IP6,CHILD,RANGE
810 Useful options: fork, ttl, tos, bind, sourceport, pf
811 See also: UDP4-RECVFROM, UDP6-RECVFROM, UDP-SENDTO, UDP-RECV,
812 UDP-CONNECT, UDP-LISTEN, IP-RECVFROM, UNIX-RECVFROM
813
814 UDP4-RECVFROM:<port>
815 Like UDP-RECVFROM, but only supports IPv4 protocol.
816 Option groups: FD,SOCKET,IP4,CHILD,RANGE
817
818 UDP6-RECVFROM:<port>
819 Like UDP-RECVFROM, but only supports IPv6 protocol.
820 Option groups: FD,SOCKET,IP6,CHILD,RANGE
821
822 UDP-RECV:<port>
823 Creates a UDP socket on <port> [UDP service] using UDP/IP ver‐
824 sion 4 or 6 depending on option pf. It receives packets from
825 multiple unspecified peers and merges the data. No replies are
826 possible. It works well with, e.g., socat UDP-SENDTO address
827 peers; it behaves similar to a syslog server.
828 Option groups: FD,SOCKET,IP4,IP6,RANGE
829 Useful options: fork, pf, bind, sourceport, ttl, tos
830 See also: UDP4-RECV, UDP6-RECV, UDP-SENDTO, UDP-RECVFROM,
831 UDP-CONNECT, UDP-LISTEN, IP-RECV, UNIX-RECV
832
833 UDP4-RECV:<port>
834 Like UDP-RECV, but only supports IPv4 protocol.
835 Option groups: FD,SOCKET,IP4,RANGE
836
837 UDP6-RECV:<port>
838 Like UDP-RECV, but only supports IPv6 protocol.
839 Option groups: FD,SOCKET,IP6,RANGE
840
841 UNIX-CONNECT:<filename>
842 Connects to <filename> assuming it is a UNIX domain socket. If
843 <filename> does not exist, this is an error; if <filename> is
844 not a UNIX domain socket, this is an error; if <filename> is a
845 UNIX domain socket, but no process is listening, this is an
846 error.
847 Option groups: FD,SOCKET,NAMED,RETRY,UNIX
848 ) Useful options: bind
849 See also: UNIX-LISTEN, UNIX-SENDTO, TCP
850
851 UNIX-LISTEN:<filename>
852 Listens on <filename> using a UNIX domain stream socket and
853 accepts a connection. If <filename> exists and is not a socket,
854 this is an error. If <filename> exists and is a UNIX domain
855 socket, binding to the address fails (use option unlink-early!).
856 Note that opening this address usually blocks until a client
857 connects. Beginning with socat version 1.4.3, the file system
858 entry is removed when this address is closed (but see option
859 unlink-close) (example).
860 Option groups: FD,SOCKET,NAMED,LISTEN,CHILD,RETRY,UNIX
861 Useful options: fork, umask, mode, user, group, unlink-early
862 See also: UNIX-CONNECT, UNIX-RECVFROM, UNIX-RECV, TCP-LISTEN
863
864 UNIX-SENDTO:<filename>
865 Communicates with the specified peer socket, defined by [<file‐
866 name>] assuming it is a UNIX domain datagram socket. It sends
867 packets to and receives packets from that peer socket only.
868 Please note that it might be necessary to bind the local socket
869 to an address (e.g. /tmp/sock1, which must not exist before).
870 This address type works well with socat UNIX-RECVFROM and
871 UNIX-RECV address peers.
872 Option groups: FD,SOCKET,NAMED,UNIX
873 Useful options: bind
874 See also: UNIX-RECVFROM, UNIX-RECV, UNIX-CONNECT, UDP-SENDTO,
875 IP-SENDTO
876
877 UNIX-RECVFROM:<filename>
878 Creates a UNIX domain datagram socket [<filename>]. Receives
879 one packet and may send one or more answer packets to that peer.
880 This mode is particularly useful with fork option where each
881 arriving packet - from arbitrary peers - is handled by its own
882 sub process. This address works well with socat UNIX-SENDTO
883 address peers.
884 Option groups: FD,SOCKET,NAMED,CHILD,UNIX
885 Useful options: fork
886 See also: UNIX-SENDTO, UNIX-RECV, UNIX-LISTEN, UDP-RECVFROM,
887 IP-RECVFROM
888
889 UNIX-RECV:<filename>
890 Creates a UNIX domain datagram socket [<filename>]. Receives
891 packets from multiple unspecified peers and merges the data. No
892 replies are possible. It can be, e.g., addressed by socat
893 UNIX-SENDTO address peers. It behaves similar to a syslog
894 server. Option groups: FD,SOCKET,NAMED,UNIX
895 See also: UNIX-SENDTO, UNIX-RECVFROM, UNIX-LISTEN, UDP-RECV,
896 IP-RECV
897
898 UNIX-CLIENT:<filename>
899 Communicates with the specified peer socket, defined by [<file‐
900 name>] assuming it is a UNIX domain socket. It first tries to
901 connect and, if that fails, assumes it is a datagram socket,
902 thus supporting both types.
903 Option groups: FD,SOCKET,NAMED,UNIX
904 Useful options: bind
905 See also: UNIX-CONNECT, UNIX-SENDTO, GOPEN
906
907 ABSTRACT-CONNECT:<string>
908
909 ABSTRACT-LISTEN:<string>
910
911 ABSTRACT-SENDTO:<string>
912
913 ABSTRACT-RECVFROM:<string>
914
915 ABSTRACT-RECV:<string>
916
917 ABSTRACT-CLIENT:<string>
918 The ABSTRACT addresses are almost identical to the related UNIX
919 addresses except that they do not address file system based
920 sockets but an alternate UNIX domain address space. To archieve
921 this the socket address strings are prefixed with "\0" inter‐
922 nally. This feature is available (only?) on Linux. Option
923 groups are the same as with the related UNIX addresses, except
924 that the ABSTRACT addresses are not member of the NAMED group.
925
926
928 Address options can be applied to address specifications to influence
929 the process of opening the addresses and the properties of the result‐
930 ing data channels.
931
932 For technical reasons not every option can be applied to every address
933 type; e.g., applying a socket option to a regular file will fail. To
934 catch most useless combinations as early as in the open phase, the con‐
935 cept of option groups was introduced. Each option belongs to one or
936 more option groups. Options can be used only with address types that
937 support at least one of their option groups (but see option -g).
938
939 Address options have data types that their values must conform to.
940 Every address option consists of just a keyword or a keyword followed
941 by "=value", where value must conform to the options type. Some
942 address options manipulate parameters of system calls; e.g., option
943 sync sets the O_SYNC flag with the open() call. Other options cause a
944 system or library call; e.g., with option `ttl=value’ the setsock‐
945 opt(fd, SOL_IP, IP_TTL, value, sizeof(int)) call is applied. Other
946 options set internal socat variables that are used during data trans‐
947 fer; e.g., `crnl’ causes explicit character conversions. A few options
948 have more complex implementations; e.g., su-d (substuser-delayed)
949 inquires some user and group infos, stores them, and applies them later
950 after a possible chroot() call.
951
952 If multiple options are given to an address, their sequence in the
953 address specification has (almost) no effect on the sequence of their
954 execution/application. Instead, socat has built in an option phase
955 model that tries to bring the options in a useful order. Some options
956 exist in different forms (e.g., unlink, unlink-early, unlink-late) to
957 control the time of their execution.
958
959 If the same option is specified more than once within one address spec‐
960 ification, with equal or different values, the effect depends on the
961 kind of option. Options resulting in function calls like setsockopt()
962 cause multiple invocations. With options that set parameters for a
963 required call like open() or set internal flags, the value of the last
964 option occurrence is effective.
965
966 The existence or semantics of many options are system dependent. Socat
967 usually does NOT try to emulate missing libc or kernel features, it
968 just provides an interface to the underlying system. So, if an operat‐
969 ing system lacks a feature, the related option is simply not available
970 on this platform.
971
972 The following paragraphs introduce just the more common address
973 options. For a more comprehensive reference and to find information
974 about canonical option names, alias names, option phases, and platforms
975 see file xio.help.
976
977
978 FD option group
979
980 This option group contains options that are applied to a UN*X style
981 file descriptor, no matter how it was generated. Because all current
982 socat address types are file descriptor based, these options may be
983 applied to any address.
984 Note: Some of these options are also member of another option group,
985 that provides another, non-fd based mechanism. For these options, it
986 depends on the actual address type and its option groups which mecha‐
987 nism is used. The second, non-fd based mechanism is prioritized.
988
989 cloexec=<bool>
990 Sets the FD_CLOEXEC flag with the fcntl() system call to value
991 <bool>. If set, the file descriptor is closed on exec() family
992 function calls. Socat internally handles this flag for the fds
993 it controls, so in most cases there will be no need to apply
994 this option.
995
996 setlk Tries to set a discretionary write lock to the whole file using
997 the fcntl(fd, F_SETLK, ...) system call. If the file is already
998 locked, this call results in an error. On Linux, when the file
999 permissions for group are "S" (g-x,g+s), and the file system is
1000 locally mounted with the "mand" option, the lock is mandatory,
1001 i.e. prevents other processes from opening the file.
1002
1003 setlkw Tries to set a discretionary waiting write lock to the whole
1004 file using the fcntl(fd, F_SETLKW, ...) system call. If the
1005 file is already locked, this call blocks. See option setlk for
1006 information about making this lock mandatory.
1007
1008 setlk-rd
1009 Tries to set a discretionary read lock to the whole file using
1010 the fcntl(fd, F_SETLK, ...) system call. If the file is already
1011 write locked, this call results in an error. See option setlk
1012 for information about making this lock mandatory.
1013
1014 setlkw-rd
1015 Tries to set a discretionary waiting read lock to the whole file
1016 using the fcntl(fd, F_SETLKW, ...) system call. If the file is
1017 already write locked, this call blocks. See option setlk for
1018 information about making this lock mandatory.
1019
1020 flock-ex
1021 Tries to set a blocking exclusive advisory lock to the file
1022 using the flock(fd, LOCK_EX) system call. Socat hangs in this
1023 call if the file is locked by another process.
1024
1025 flock-ex-nb
1026 Tries to set a nonblocking exclusive advisory lock to the file
1027 using the flock(fd, LOCK_EX|LOCK_NB) system call. If the file is
1028 already locked, this option results in an error.
1029
1030 flock-sh
1031 Tries to set a blocking shared advisory lock to the file using
1032 the flock(fd, LOCK_SH) system call. Socat hangs in this call if
1033 the file is locked by another process.
1034
1035 flock-sh-nb
1036 Tries to set a nonblocking shared advisory lock to the file
1037 using the flock(fd, LOCK_SH|LOCK_NB) system call. If the file is
1038 already locked, this option results in an error.
1039
1040 lock Sets a blocking lock on the file. Uses the setlk or flock mecha‐
1041 nism depending on availability on the particular platform. If
1042 both are available, the POSIX variant (setlkw) is used.
1043
1044 user=<user>
1045 Sets the <user> (owner) of the stream. If the address is member
1046 of the NAMED option group, socat uses the chown() system call
1047 after opening the file or binding to the UNIX domain socket
1048 (race condition!). Without filesystem entry, socat sets the
1049 user of the stream using the fchown() system call. These calls
1050 might require root privilege.
1051
1052 user-late=<user>
1053 Sets the owner of the fd to <user> with the fchown() system call
1054 after opening or connecting the channel. This is useful only on
1055 file system entries.
1056
1057 group=<group>
1058 Sets the <group> of the stream. If the address is member of the
1059 NAMED option group, socat uses the chown() system call after
1060 opening the file or binding to the UNIX domain socket (race con‐
1061 dition!). Without filesystem entry, socat sets the group of the
1062 stream with the fchown() system call. These calls might require
1063 group membership or root privilege.
1064
1065 group-late=<group>
1066 Sets the group of the fd to <group> with the fchown() system
1067 call after opening or connecting the channel. This is useful
1068 only on file system entries.
1069
1070 mode=<mode>
1071 Sets the <mode> [mode_t] (permissions) of the stream. If the
1072 address is member of the NAMED option group and uses the open()
1073 or creat() call, the mode is applied with these. If the address
1074 is member of the NAMED option group without using these system
1075 calls, socat uses the chmod() system call after opening the
1076 filesystem entry or binding to the UNIX domain socket (race con‐
1077 dition!). Otherwise, socat sets the mode of the stream using
1078 fchmod() . These calls might require ownership or root privi‐
1079 lege.
1080
1081 perm-late=<mode>
1082 Sets the permissions of the fd to value <mode> [mode_t] using
1083 the fchmod() system call after opening or connecting the chan‐
1084 nel. This is useful only on file system entries.
1085
1086 append=<bool>
1087 Always writes data to the actual end of file. If the address is
1088 member of the OPEN option group, socat uses the O_APPEND flag
1089 with the open() system call (example). Otherwise, socat applies
1090 the fcntl(fd, F_SETFL, O_APPEND) call.
1091
1092 nonblock=<bool>
1093 Tries to open or use file in nonblocking mode. Its only effects
1094 are that the connect() call of TCP addresses does not block, and
1095 that opening a named pipe for reading does not block. If the
1096 address is member of the OPEN option group, socat uses the
1097 O_NONBLOCK flag with the open() system call. Otherwise, socat
1098 applies the fcntl(fd, F_SETFL, O_NONBLOCK) call.
1099
1100 binary Opens the file in binary mode to avoid implicit line terminator
1101 conversions (Cygwin).
1102
1103 text Opens the file in text mode to force implicit line terminator
1104 conversions (Cygwin).
1105
1106 noinherit
1107 Does not keep this file open in a spawned process (Cygwin).
1108
1109 cool-write
1110 Takes it easy when write fails with EPIPE or ECONNRESET and logs
1111 the message with notice level instead of error. This prevents
1112 the log file from being filled with useless error messages when
1113 socat is used as a high volume server or proxy where clients
1114 often abort the connection.
1115 This option is experimental.
1116
1117 end-close
1118 Changes the (address dependent) method of ending a connection to
1119 just close the file descriptors. This is useful when the connec‐
1120 tion is to be reused by or shared with other processes (exam‐
1121 ple).
1122 Normally, socket connections will be ended with shutdown(2)
1123 which terminates the socket even if it is shared by multiple
1124 processes. close(2) "unlinks" the socket from the process but
1125 keeps it active as long as there are still links from other pro‐
1126 cesses.
1127 Similarly, when an address of type EXEC or SYSTEM is ended,
1128 socat usually will explicitly kill the sub process. With this
1129 option, it will just close the file descriptors.
1130
1131 shut-none
1132 Changes the (address dependent) method of shutting down the
1133 write part of a connection to not do anything.
1134
1135 shut-down
1136 Changes the (address dependent) method of shutting down the
1137 write part of a connection to shutdown(fd, SHUT_WR). Is only
1138 useful with sockets.
1139
1140 shut-close
1141 Changes the (address dependent) method of shutting down the
1142 write part of a connection to close(fd).
1143
1144 shut-null
1145 When one address indicates EOF, socat will send a zero sized
1146 packet to the write channel of the other address to transfer the
1147 EOF condition. This is useful with UDP and other datagram proto‐
1148 cols. Has been tested against netcat and socat with option
1149 null-eof.
1150
1151 null-eof
1152 Normally socat will ignore empty (zero size payload) packets
1153 arriving on datagram sockets, so it survives port scans. With
1154 this option socat interprets empty datagram packets as EOF indi‐
1155 cator (see shut-null).
1156
1157 ioctl-void=<request>
1158 Calls ioctl() with the request value as second argument and NULL
1159 as third argument. This option allows utilizing ioctls that are
1160 not explicitly implemented in socat.
1161
1162 ioctl-int=<request>:<value>
1163 Calls ioctl() with the request value as second argument and the
1164 integer value as third argument.
1165
1166 ioctl-intp=<request>:<value>
1167 Calls ioctl() with the request value as second argument and a
1168 pointer to the integer value as third argument.
1169
1170 ioctl-bin=<request>:<value>
1171 Calls ioctl() with the request value as second argument and a
1172 pointer to the given data value as third argument. This data
1173 must be specified in <dalan> form.
1174
1175 ioctl-string=<request>:<value>
1176 Calls ioctl() with the request value as second argument and a
1177 pointer to the given string as third argument. <dalan> form.
1178
1179
1180 NAMED option group
1181
1182 These options work on file system entries.
1183 See also options user, group, and mode.
1184
1185 user-early=<user>
1186 Changes the <user> (owner) of the file system entry before
1187 accessing it, using the chown() system call. This call might
1188 require root privilege.
1189
1190 group-early=<group>
1191 Changes the <group> of the file system entry before accessing
1192 it, using the chown() system call. This call might require group
1193 membership or root privilege.
1194
1195 perm-early=<mode>
1196 Changes the <mode> [mode_t] of the file system entry before
1197 accessing it, using the chmod() system call. This call might
1198 require ownership or root privilege.
1199
1200 umask=<mode>
1201 Sets the umask of the process to <mode> [mode_t] before access‐
1202 ing the file system entry (useful with UNIX domain sockets!).
1203 This call might affect all further operations of the socat
1204 process!
1205
1206 unlink-early
1207 Unlinks (removes) the file before opening it and even before
1208 applying user-early etc.
1209
1210 unlink Unlinks (removes) the file before accessing it, but after
1211 user-early etc.
1212
1213 unlink-late
1214 Unlinks (removes) the file after opening it to make it inacces‐
1215 sible for other processes after a short race condition.
1216
1217 unlink-close
1218 Removes the addresses file system entry when closing the
1219 address. For named pipes, listening unix domain sockets, and
1220 the symbolic links of pty addresses, the default is 1; for cre‐
1221 ated files, opened files, generic opened files, and client unix
1222 domain sockets the default is 0.
1223
1224
1225 OPEN option group
1226
1227 The OPEN group options allow setting flags with the open() system call.
1228 E.g., option `creat’ sets the O_CREAT flag.
1229 See also options append and nonblock.
1230
1231 creat=<bool>
1232 Creates the file if it does not exist (example).
1233
1234 dsync=<bool>
1235 Blocks write() calls until metainfo is physically written to
1236 media.
1237
1238 excl=<bool>
1239 With option creat, if file exists this is an error.
1240
1241 largefile=<bool>
1242 On 32 bit systems, allows a file larger than 2^31 bytes.
1243
1244 noatime
1245 Sets the O_NOATIME options, so reads do not change the access
1246 timestamp.
1247
1248 noctty=<bool>
1249 Does not make this file the controlling terminal.
1250
1251 nofollow=<bool>
1252 Does not follow symbolic links.
1253
1254 nshare=<bool>
1255 Does not allow sharing this file with other processes.
1256
1257 rshare=<bool>
1258 Does not allow other processes to open this file for writing.
1259
1260 rsync=<bool>
1261 Blocks write() until metainfo is physically written to media.
1262
1263 sync=<bool>
1264 Blocks write() until data is physically written to media.
1265
1266 rdonly=<bool>
1267 Opens the file for reading only.
1268
1269 wronly=<bool>
1270 Opens the file for writing only.
1271
1272 trunc Truncates the file to size 0 during opening it.
1273
1274
1275 REG and BLK option group
1276
1277 These options are usually applied to a UN*X file descriptor, but their
1278 semantics make sense only on a file supporting random access.
1279
1280 seek=<offset>
1281 Applies the lseek(fd, <offset>, SEEK_SET) (or lseek64 ) system
1282 call, thus positioning the file pointer absolutely to <offset>
1283 [off_t or off64_t]. Please note that a missing value defaults to
1284 1, not 0.
1285
1286 seek-cur=<offset>
1287 Applies the lseek(fd, <offset>, SEEK_CUR) (or lseek64 ) system
1288 call, thus positioning the file pointer <offset> [off_t or
1289 off64_t] bytes relatively to its current position (which is usu‐
1290 ally 0). Please note that a missing value defaults to 1, not 0.
1291
1292 seek-end=<offset>
1293 Applies the lseek(fd, <offset>, SEEK_END) (or lseek64 ) system
1294 call, thus positioning the file pointer <offset> [off_t or
1295 off64_t] bytes relatively to the files current end. Please note
1296 that a missing value defaults to 1, not 0.
1297
1298 ftruncate=<offset>
1299 Applies the ftruncate(fd, <offset>) (or ftruncate64 if avail‐
1300 able) system call, thus truncating the file at the position
1301 <offset> [off_t or off64_t]. Please note that a missing value
1302 defaults to 1, not 0.
1303
1304 secrm=<bool>
1305
1306 unrm=<bool>
1307
1308 compr=<bool>
1309
1310 ext2-sync=<bool>
1311
1312 immutable=<bool>
1313
1314 ext2-append=<bool>
1315
1316 nodump=<bool>
1317
1318 ext2-noatime=<bool>
1319
1320 journal-data=<bool>
1321
1322 notail=<bool>
1323
1324 dirsync=<bool>
1325 These options change non standard file attributes on operating
1326 systems and file systems that support these features, like Linux
1327 with ext2fs, ext3fs, or reiserfs. See man 1 chattr for informa‐
1328 tion on these options. Please note that there might be a race
1329 condition between creating the file and applying these options.
1330
1331
1332 PROCESS option group
1333
1334 Options of this group change the process properties instead of just
1335 affecting one data channel. For EXEC and SYSTEM addresses and for LIS‐
1336 TEN and CONNECT type addresses with option FORK, these options apply to
1337 the child processes instead of the main socat process.
1338
1339 chroot=<directory>
1340 Performs a chroot() operation to <directory> after processing
1341 the address (example). This call might require root privilege.
1342
1343 chroot-early=<directory>
1344 Performs a chroot() operation to <directory> before opening the
1345 address. This call might require root privilege.
1346
1347 setgid=<group>
1348 Changes the primary <group> of the process after processing the
1349 address. This call might require root privilege. Please note
1350 that this option does not drop other group related privileges.
1351
1352 setgid-early=<group>
1353 Like setgit but is performed before opening the address.
1354
1355 setuid=<user>
1356 Changes the <user> (owner) of the process after processing the
1357 address. This call might require root privilege. Please note
1358 that this option does not drop group related privileges. Check
1359 if option su better fits your needs.
1360
1361 setuid-early=<user>
1362 Like setuid but is performed before opening the address.
1363
1364 su=<user>
1365 Changes the <user> (owner) and groups of the process after pro‐
1366 cessing the address (example). This call might require root
1367 privilege.
1368
1369 su-d=<user>
1370 Short name for substuser-delayed. Changes the <user> (owner)
1371 and groups of the process after processing the address (exam‐
1372 ple). The user and his groups are retrieved before a possible
1373 chroot() . This call might require root privilege.
1374
1375 setpgid=<pid_t>
1376 Makes the process a member of the specified process group
1377 <pid_t>. If no value is given, or if the value is 0 or 1, the
1378 process becomes leader of a new process group.
1379
1380 setsid Makes the process the leader of a new session (example).
1381
1382
1383 READLINE option group
1384
1385 These options apply to the readline address type.
1386
1387 history=<filename>
1388 Reads and writes history from/to <filename> (example).
1389
1390 noprompt
1391 Since version 1.4.0, socat per default tries to determine a
1392 prompt - that is then passed to the readline call - by remember‐
1393 ing the last incomplete line of the output. With this option,
1394 socat does not pass a prompt to readline, so it begins line
1395 editing in the first column of the terminal.
1396
1397 noecho=<pattern>
1398 Specifies a regular pattern for a prompt that prevents the fol‐
1399 lowing input line from being displayed on the screen and from
1400 being added to the history. The prompt is defined as the text
1401 that was output to the readline address after the lastest new‐
1402 line character and before an input character was typed. The pat‐
1403 tern is a regular expression, e.g. "^[Pp]assword:.*$" or
1404 "([Uu]ser:|[Pp]assword:)". See regex(7) for details. (example)
1405
1406 prompt=<string>
1407 Passes the string as prompt to the readline function. readline
1408 prints this prompt when stepping through the history. If this
1409 string matches a constant prompt issued by an interactive pro‐
1410 gram on the other socat address, consistent look and feel can be
1411 archieved.
1412
1413
1414 APPLICATION option group
1415
1416 This group contains options that work at data level. Note that these
1417 options only apply to the "raw" data transferred by socat, but not to
1418 protocol data used by addresses like PROXY.
1419
1420 cr Converts the default line termination character NL (’\n’, 0x0a)
1421 to/from CR (’\r’, 0x0d) when writing/reading on this channel.
1422
1423 crnl Converts the default line termination character NL (’\n’, 0x0a)
1424 to/from CRNL ("\r\n", 0x0d0a) when writing/reading on this chan‐
1425 nel (example). Note: socat simply strips all CR characters.
1426
1427 ignoreeof
1428 When EOF occurs on this channel, socat ignores it and tries to
1429 read more data (like "tail -f") (example).
1430
1431 readbytes=<bytes>
1432 socat reads only so many bytes from this address (the address
1433 provides only so many bytes for transfer and pretends to be at
1434 EOF afterwards). Must be greater than 0.
1435
1436 lockfile=<filename>
1437 If lockfile exists, exits with error. If lockfile does not
1438 exist, creates it and continues, unlinks lockfile on exit.
1439
1440 waitlock=<filename>
1441 If lockfile exists, waits until it disappears. When lockfile
1442 does not exist, creates it and continues, unlinks lockfile on
1443 exit.
1444
1445 escape=<int>
1446 Specifies the numeric code of a character that triggers EOF on
1447 the input stream. It is useful with a terminal in raw mode
1448 (example).
1449
1450
1451 SOCKET option group
1452
1453 These options are intended for all kinds of sockets, e.g. IP or UNIX
1454 domain. Most are applied with a setsockopt() call.
1455
1456 bind=<sockname>
1457 Binds the socket to the given socket address using the bind()
1458 system call. The form of <sockname> is socket domain dependent:
1459 IP4 and IP6 allow the form [hostname|hostaddress][:(ser‐
1460 vice|port)] (example), UNIX domain sockets require <filename>.
1461
1462 connect-timeout=<seconds>
1463 Abort the connection attempt after <seconds> [timeval] with
1464 error status.
1465
1466 so-bindtodevice=<interface>
1467 Binds the socket to the given <interface>. This option might
1468 require root privilege.
1469
1470 broadcast
1471 For datagram sockets, allows sending to broadcast addresses and
1472 receiving packets addressed to broadcast addresses.
1473
1474 debug Enables socket debugging.
1475
1476 dontroute
1477 Only communicates with directly connected peers, does not use
1478 routers.
1479
1480 keepalive
1481 Enables sending keepalives on the socket.
1482
1483 linger=<seconds>
1484 Blocks shutdown() or close() until data transfers have finished
1485 or the given timeout [int] expired.
1486
1487 oobinline
1488 Places out-of-band data in the input data stream.
1489
1490 priority=<priority>
1491 Sets the protocol defined <priority> [<int>] for outgoing pack‐
1492 ets.
1493
1494 rcvbuf=<bytes>
1495 Sets the size of the receive buffer after the socket() call to
1496 <bytes> [int]. With TCP sockets, this value corresponds to the
1497 socket’s maximal window size.
1498
1499 rcvbuf-late=<bytes>
1500 Sets the size of the receive buffer when the socket is already
1501 connected to <bytes> [int]. With TCP sockets, this value corre‐
1502 sponds to the socket’s maximal window size.
1503
1504 rcvlowat=<bytes>
1505 Specifies the minimum number of received bytes [int] until the
1506 socket layer will pass the buffered data to socat.
1507
1508 reuseaddr
1509 Allows other sockets to bind to an address even if parts of it
1510 (e.g. the local port) are already in use by socat (example).
1511
1512 sndbuf=<bytes>
1513 Sets the size of the send buffer after the socket() call to
1514 <bytes> [int].
1515
1516 sndbuf-late=<bytes>
1517 Sets the size of the send buffer when the socket is connected to
1518 <bytes> [int].
1519
1520 sndlowat=<bytes>
1521 Specifies the minimum number of bytes in the send buffer until
1522 the socket layer will send the data to <bytes> [int].
1523
1524 pf=<string>
1525 Forces the use of the specified IP version or protocol. <string>
1526 can be something like "ip4" or "ip6". The resulting value is
1527 used as first argument to the socket() or socketpair() calls.
1528 This option affects address resolution and the required syntax
1529 of bind and range options.
1530
1531 type=<type>
1532 Sets the type of the socket, specified as second argument to the
1533 socket() or socketpair() calls, to <type> [int]. Address resolu‐
1534 tion is not affected by this option. Under Linux, 1 means
1535 stream oriented socket, 2 means datagram socket, and 3 means raw
1536 socket.
1537
1538 prototype
1539 Sets the protocol of the socket, specified as third argument to
1540 the socket() or socketpair() calls, to <prototype> [int].
1541 Address resolution is not affected by this option. 6 means TCP,
1542 17 means UDP.
1543
1544 reuseport
1545 Set the SO_REUSEPORT socket option.
1546
1547 so-timestamp
1548 Sets the SO_TIMESTAMP socket option. This enables receiving and
1549 logging of timestamp ancillary messages.
1550
1551 setsockopt-int=<level>:<optname>:<optval>
1552 Invokes setsockopt() for the socket with the given parameters.
1553 level [int] is used as second argument to setsockopt() and spec‐
1554 ifies the layer, e.g. SOL_TCP for TCP (6 on Linux), or
1555 SOL_SOCKET for the socket layer (1 on Linux). optname [int] is
1556 the third argument to setsockopt() and tells which socket option
1557 is to be set. For the actual numbers you might have to look up
1558 the appropriate include files of your system. The 4th setsock‐
1559 opt() parameter, value [int], is passed to the function per
1560 pointer, and for the length parameter sizeof(int) is taken
1561 implicitely.
1562
1563 setsockopt-bin=<level>:<optname>:<optval>
1564 Like setsockopt-int, but <optval> must be provided in dalan for‐
1565 mat and specifies an arbitrary sequence of bytes; the length
1566 parameter is automatically derived from the data.
1567
1568 setsockopt-string=<level>:<optname>:<optval>
1569 Like setsockopt-int, but <optval> must be a string. This string
1570 is passed to the function with trailing null character, and the
1571 length parameter is automatically derived from the data.
1572
1573
1574 UNIX option group
1575
1576 These options apply to UNIX domain based addresses.
1577
1578 unix-tightsocklen=[0|1]
1579 On socket operations, pass a socket address length that does not
1580 include the whole struct sockaddr_un record but (besides other
1581 components) only the relevant part of the filename or abstract
1582 string. Default is 1.
1583
1584
1585 IP4 and IP6 option groups
1586
1587 These options can be used with IPv4 and IPv6 based sockets.
1588
1589 tos=<tos>
1590 Sets the TOS (type of service) field of outgoing packets to
1591 <tos> [byte] (see RFC 791).
1592
1593 ttl=<ttl>
1594 Sets the TTL (time to live) field of outgoing packets to <ttl>
1595 [byte].
1596
1597 ip-options=<data>
1598 Sets IP options like source routing. Must be given in binary
1599 form, recommended format is a leading "x" followed by an even
1600 number of hex digits. This option may be used multiple times,
1601 data are appended. E.g., to connect to host 10.0.0.1 via some
1602 gateway using a loose source route, use the gateway as address
1603 parameter and set a loose source route using the option
1604 ip-options=x8307040a000001 .
1605 IP options are defined in RFC 791.
1606
1607 mtudiscover=<0|1|2>
1608 Takes 0, 1, 2 to never, want, or always use path MTU discover on
1609 this socket.
1610
1611 ip-pktinfo
1612 Sets the IP_PKTINFO socket option. This enables receiving and
1613 logging of ancillary messages containing destination address and
1614 interface (Linux) (example).
1615
1616 ip-recverr
1617 Sets the IP_RECVERR socket option. This enables receiving and
1618 logging of ancillary messages containing detailed error informa‐
1619 tion.
1620
1621 ip-recvopts
1622 Sets the IP_RECVOPTS socket option. This enables receiving and
1623 logging of IP options ancillary messages (Linux, *BSD).
1624
1625 ip-recvtos
1626 Sets the IP_RECVTOS socket option. This enables receiving and
1627 logging of TOS (type of service) ancillary messages (Linux).
1628
1629 ip-recvttl
1630 Sets the IP_RECVTTL socket option. This enables receiving and
1631 logging of TTL (time to live) ancillary messages (Linux, *BSD).
1632
1633 ip-recvdstaddr
1634 Sets the IP_RECVDSTADDR socket option. This enables receiving
1635 and logging of ancillary messages containing destination address
1636 (*BSD) (example).
1637
1638 ip-recvif
1639 Sets the IP_RECVIF socket option. This enables receiving and
1640 logging of interface ancillary messages (*BSD) (example).
1641
1642 ip-add-membership=<multicast-address:interface-address>
1643
1644 ip-add-membership=<multicast-address:interface-name>
1645
1646 ip-add-membership=<multicast-address:interface-index>
1647
1648 ip-add-membership=<multicast-address:interface-address:interface-name>
1649
1650 ip-add-membership=<multicast-address:interface-address:interface-index>
1651 Makes the socket member of the specified multicast group. This
1652 is currently only implemented for IPv4. The option takes the IP
1653 address of the multicast group and info about the desired net‐
1654 work interface. The most common syntax is the first one, while
1655 the others are only available on systems that provide struct
1656 mreqn (Linux).
1657 The indices of active network interfaces can be shown using the
1658 utility procan.
1659
1660 ip-multicast-if=<hostname>
1661 Specifies hostname or address of the network interface to be
1662 used for multicast traffic.
1663
1664 ip-multicast-loop=<bool>
1665 Specifies if outgoing multicast traffic should loop back to the
1666 interface.
1667
1668 ip-multicast-ttl=<byte>
1669 Sets the TTL used for outgoing multicast traffic. Default is 1.
1670
1671 res-debug
1672
1673 res-aaonly
1674
1675 res-usevc
1676
1677 res-primary
1678
1679 res-igntc
1680
1681 res-recurse
1682
1683 res-defnames
1684
1685 res-stayopen
1686
1687 res-dnsrch
1688 These options set the corresponding resolver (name resolution)
1689 option flags. Append "=0" to clear a default option. See man
1690 resolver(5) for more information on these options. Note: these
1691 options are valid only for the address they are applied to.
1692
1693 IP6 option group
1694
1695 These options can only be used on IPv6 based sockets. See IP options
1696 for options that can be applied to both IPv4 and IPv6 sockets.
1697
1698 ipv6only=<bool>
1699 Sets the IPV6_V6ONLY socket option. If 0, the TCP stack will
1700 also accept connections using IPv4 protocol on the same port.
1701 The default is system dependent.
1702
1703 ipv6-recvdstopts
1704 Sets the IPV6_RECVDSTOPTS socket option. This enables receiving
1705 and logging of ancillary messages containing the destination
1706 options.
1707
1708 ipv6-recvhoplimit
1709 Sets the IPV6_RECVHOPLIMIT socket option. This enables receiving
1710 and logging of ancillary messages containing the hoplimit.
1711
1712 ipv6-recvhopopts
1713 Sets the IPV6_RECVHOPOPTS socket option. This enables receiving
1714 and logging of ancillary messages containing the hop options.
1715
1716 ipv6-recvpktinfo
1717 Sets the IPV6_RECVPKTINFO socket option. This enables receiving
1718 and logging of ancillary messages containing destination address
1719 and interface.
1720
1721 ipv6-unicast-hops=link(TYPE_INT)(<int>)
1722 Sets the IPV6_UNICAST_HOPS socket option. This sets the hop
1723 count limit (TTL) for outgoing unicast packets.
1724
1725 ipv6-recvrthdr
1726 Sets the IPV6_RECVRTHDR socket option. This enables receiving
1727 and logging of ancillary messages containing routing informa‐
1728 tion.
1729
1730 ipv6-tclass
1731 Sets the IPV6_TCLASS socket option. This sets the transfer class
1732 of outgoing packets.
1733
1734 ipv6-recvtclass
1735 Sets the IPV6_RECVTCLASS socket option. This enables receiving
1736 and logging of ancillary messages containing the transfer class.
1737
1738
1739 TCP option group
1740
1741 These options may be applied to TCP sockets. They work by invoking set‐
1742 sockopt() with the appropriate parameters.
1743
1744 cork Doesn’t send packets smaller than MSS (maximal segment size).
1745
1746 defer-accept
1747 While listening, accepts connections only when data from the
1748 peer arrived.
1749
1750 keepcnt=<count>
1751 Sets the number of keepalives before shutting down the socket to
1752 <count> [int].
1753
1754 keepidle=<seconds>
1755 Sets the idle time before sending the first keepalive to <sec‐
1756 onds> [int].
1757
1758 keepintvl=<seconds>
1759 Sets the interval between two keepalives to <seconds> [int].
1760
1761 linger2=<seconds>
1762 Sets the time to keep the socket in FIN-WAIT-2 state to <sec‐
1763 onds> [int].
1764
1765 mss=<bytes>
1766 Sets the MSS (maximum segment size) after the socket() call to
1767 <bytes> [int]. This value is then proposed to the peer with the
1768 SYN or SYN/ACK packet (example).
1769
1770 mss-late=<bytes>
1771 Sets the MSS of the socket after connection has been established
1772 to <bytes> [int].
1773
1774 nodelay
1775 Turns off the Nagle algorithm for measuring the RTT (round trip
1776 time).
1777
1778 rfc1323
1779 Enables RFC1323 TCP options: TCP window scale, round-trip time
1780 measurement (RTTM), and protect against wrapped sequence numbers
1781 (PAWS) (AIX).
1782
1783 stdurg Enables RFC1122 compliant urgent pointer handling (AIX).
1784
1785 syncnt=<count>
1786 Sets the maximal number of SYN retransmits during connect to
1787 <count> [int].
1788
1789 md5sig Enables generation of MD5 digests on the packets (FreeBSD).
1790
1791 noopt Disables use of TCP options (FreeBSD, MacOSX).
1792
1793 nopush sets the TCP_NOPUSH socket option (FreeBSD, MacOSX).
1794
1795 sack-disable
1796 Disables use the selective acknowledge feature (OpenBSD).
1797
1798 signature-enable
1799 Enables generation of MD5 digests on the packets (OpenBSD).
1800
1801 abort-threshold=<milliseconds>
1802 Sets the time to wait for an answer of the peer on an estab‐
1803 lished connection (HP-UX).
1804
1805 conn-abort-threshold=<milliseconds>
1806 Sets the time to wait for an answer of the server during the
1807 initial connect (HP-UX).
1808
1809 keepinit
1810 Sets the time to wait for an answer of the server during con‐
1811 nect() before giving up. Value in half seconds, default is 150
1812 (75s) (Tru64).
1813
1814 paws Enables the "protect against wrapped sequence numbers" feature
1815 (Tru64).
1816
1817 sackena
1818 Enables selective acknowledge (Tru64).
1819
1820 tsoptena
1821 Enables the time stamp option that allows RTT recalculation on
1822 existing connections (Tru64).
1823
1824
1825 SCTP option group
1826
1827 These options may be applied to SCTP stream sockets.
1828
1829 sctp-nodelay
1830 Sets the SCTP_NODELAY socket option that disables the Nagle
1831 algorithm.
1832
1833 sctp-maxseg=<bytes>
1834 Sets the SCTP_MAXSEG socket option to <bytes> [int]. This value
1835 is then proposed to the peer with the SYN or SYN/ACK packet.
1836
1837
1838 UDP, TCP, and SCTP option groups
1839
1840 Here we find options that are related to the network port mechanism and
1841 thus can be used with UDP, TCP, and SCTP client and server addresses.
1842
1843 sourceport=<port>
1844 For outgoing (client) TCP and UDP connections, it sets the
1845 source <port> using an extra bind() call. With TCP or UDP lis‐
1846 ten addresses, socat immediately shuts down the connection if
1847 the client does not use this sourceport (example).
1848
1849 lowport
1850 Outgoing (client) TCP and UDP connections with this option use
1851 an unused random source port between 640 and 1023 incl. On UNIX
1852 class operating systems, this requires root privilege, and thus
1853 indicates that the client process is authorized by local root.
1854 TCP and UDP listen addresses with this option immediately shut
1855 down the connection if the client does not use a sourceport <=
1856 1023. This mechanism can provide limited authorization under
1857 some circumstances.
1858
1859
1860 SOCKS option group
1861
1862 When using SOCKS type addresses, some socks specific options can be
1863 set.
1864
1865 socksport=<tcp service>
1866 Overrides the default "socks" service or port 1080 for the socks
1867 server port with <TCP service>.
1868
1869 socksuser=<user>
1870 Sends the <user> [string] in the username field to the socks
1871 server. Default is the actual user name ($LOGNAME or $USER)
1872 (example).
1873
1874
1875 HTTP option group
1876
1877 Options that can be provided with HTTP type addresses. The only HTTP
1878 address currently implemented is proxy-connect.
1879
1880 proxyport=<TCP service>
1881 Overrides the default HTTP proxy port 8080 with <TCP service>.
1882
1883 ignorecr
1884 The HTTP protocol requires the use of CR+NL as line terminator.
1885 When a proxy server violates this standard, socat might not
1886 understand its answer. This option directs socat to interprete
1887 NL as line terminator and to ignore CR in the answer. Neverthe‐
1888 less, socat sends CR+NL to the proxy.
1889
1890 proxyauth=<username>:<password>
1891 Provide "basic" authentication to the proxy server. The argument
1892 to the option is used with a "Proxy-Authorization: Base" header
1893 in base64 encoded form.
1894 Note: username and password are visible for every user on the
1895 local machine in the process list; username and password are
1896 transferred to the proxy server unencrypted (base64 encoded) and
1897 might be sniffed.
1898
1899 resolve
1900 Per default, socat sends to the proxy a CONNECT request contain‐
1901 ing the target hostname. With this option, socat resolves the
1902 hostname locally and sends the IP address. Please note that,
1903 according to RFC 2396, only name resolution to IPv4 addresses is
1904 implemented.
1905
1906
1907 RANGE option group
1908
1909 These options check if a connecting client should be granted access.
1910 They can be applied to listening and receiving network sockets.
1911 tcp-wrappers options fall into this group.
1912
1913 range=<address-range>
1914 After accepting a connection, tests if the peer is within range.
1915 For IPv4 addresses, address-range takes the form address/bits,
1916 e.g. 10.0.0.0/8, or address:mask, e.g. 10.0.0.0:255.0.0.0
1917 (example); for IPv6, it is [ip6-address/bits], e.g. [::1/128].
1918 If the client address does not match, socat issues a warning and
1919 keeps listening/receiving.
1920
1921 tcpwrap[=<name>]
1922 Uses Wietse Venema’s libwrap (tcpd) library to determine if the
1923 client is allowed to connect. The configuration files are
1924 /etc/hosts.allow and /etc/hosts.deny per default, see "man 5
1925 hosts_access" for more information. The optional <name> (type
1926 string) is passed to the wrapper functions as daemon process
1927 name (example). If omitted, the basename of socats invocation
1928 (argv[0]) is passed. If both tcpwrap and range options are
1929 applied to an address, both conditions must be fulfilled to
1930 allow the connection.
1931
1932 allow-table=<filename>
1933 Takes the specified file instead of /etc/hosts.allow.
1934
1935 deny-table=<filename>
1936 Takes the specified file instead of /etc/hosts.deny.
1937
1938 tcpwrap-etc=<directoryname>
1939 Looks for hosts.allow and hosts.deny in the specified directory.
1940 Is overridden by options hosts-allow and hosts-deny.
1941
1942
1943 LISTEN option group
1944
1945 Options specific to listening sockets.
1946
1947 backlog=<count>
1948 Sets the backlog value passed with the listen() system call to
1949 <count> [int]. Default is 5.
1950
1951 max-children=<count>
1952 Limits the number of concurrent child processes [int]. Default
1953 is no limit.
1954
1955
1956 CHILD option group
1957
1958 Options for addresses with multiple connections via child processes.
1959
1960 fork After establishing a connection, handles its channel in a child
1961 process and keeps the parent process attempting to produce more
1962 connections, either by listening or by connecting in a loop
1963 (example).
1964 OPENSSL-CONNECT and OPENSSL-LISTEN differ in when they actually
1965 fork off the child: OPENSSL-LISTEN forks before the SSL hand‐
1966 shake, while OPENSSL-CONNECT forks afterwards. RETRY and FOR‐
1967 EVER options are not inherited by the child process.
1968 On some operating systems (e.g. FreeBSD) this option does not
1969 work for UDP-LISTEN addresses.
1970
1971
1972 EXEC option group
1973
1974 Options for addresses that invoke a program.
1975
1976 path=<string>
1977 Overrides the PATH environment variable for searching the pro‐
1978 gram with <string>. This $PATH value is effective in the child
1979 process too.
1980
1981 login Prefixes argv[0] for the execvp() call with ’-’, thus making a
1982 shell behave as login shell.
1983
1984
1985 FORK option group
1986
1987 EXEC or SYSTEM addresses invoke a program using a child process and
1988 transfer data between socat and the program. The interprocess communi‐
1989 cation mechanism can be influenced with the following options. Per
1990 default, a socketpair() is created and assigned to stdin and stdout of
1991 the child process, while stderr is inherited from the socat process,
1992 and the child process uses file descriptors 0 and 1 for communicating
1993 with the main socat process.
1994
1995 nofork Does not fork a subprocess for executing the program, instead
1996 calls execvp() or system() directly from the actual socat
1997 instance. This avoids the overhead of another process between
1998 the program and its peer, but introduces a lot of restrictions:
1999
2000 o this option can only be applied to the second socat address.
2001
2002 o it cannot be applied to a part of a dual address.
2003
2004 o the first socat address cannot be OPENSSL or READLINE
2005
2006 o socat options -b, -t, -D, -l, -v, -x become useless
2007
2008 o for both addresses, options ignoreeof, cr, and crnl become use‐
2009 less
2010
2011 o for the second address (the one with option nofork), options
2012 append, cloexec, flock, user, group, mode, nonblock, perm-late,
2013 setlk, and setpgid cannot be applied. Some of these could be
2014 used on the first address though.
2015
2016 pipes Creates a pair of unnamed pipes for interprocess communication
2017 instead of a socket pair.
2018
2019 openpty
2020 Establishes communication with the sub process using a pseudo
2021 terminal created with openpty() instead of the default (socket‐
2022 pair or ptmx).
2023
2024 ptmx Establishes communication with the sub process using a pseudo
2025 terminal created by opening /dev/ptmx or /dev/ptc instead of the
2026 default (socketpair).
2027
2028 pty Establishes communication with the sub process using a pseudo
2029 terminal instead of a socket pair. Creates the pty with an
2030 available mechanism. If openpty and ptmx are both available, it
2031 uses ptmx because this is POSIX compliant (example).
2032
2033 ctty Makes the pty the controlling tty of the sub process (example).
2034
2035 stderr Directs stderr of the sub process to its output channel by mak‐
2036 ing stderr a dup() of stdout (example).
2037
2038 fdin=<fdnum>
2039 Assigns the sub processes input channel to its file descriptor
2040 <fdnum> instead of stdin (0). The program started from the sub‐
2041 process has to use this fd for reading data from socat (exam‐
2042 ple).
2043
2044 fdout=<fdnum>
2045 Assigns the sub processes output channel to its file descriptor
2046 <fdnum> instead of stdout (1). The program started from the sub‐
2047 process has to use this fd for writing data to socat (example).
2048
2049 sighup, sigint, sigquit
2050 Has socat pass signals of this type to the sub process. If no
2051 address has this option, socat terminates on these signals.
2052
2053
2054 TERMIOS option group
2055
2056 For addresses that work on a tty (e.g., stdio, file:/dev/tty,
2057 exec:...,pty), the terminal parameters defined in the UN*X termios
2058 mechanism are made available as address option parameters. Please note
2059 that changes of the parameters of your interactive terminal remain
2060 effective after socat’s termination, so you might have to enter "reset"
2061 or "stty sane" in your shell afterwards. For EXEC and SYSTEM addresses
2062 with option PTY, these options apply to the pty by the child processes.
2063
2064 b0 Disconnects the terminal.
2065
2066 b19200 Sets the serial line speed to 19200 baud. Some other rates are
2067 possible; use something like socat -hh |grep ’ b[1-9]’ to find
2068 all speeds supported by your implementation.
2069 Note: On some operating systems, these options may not be avail‐
2070 able. Use ispeed or ospeed instead.
2071
2072 echo=<bool>
2073 Enables or disables local echo.
2074
2075 icanon=<bool>
2076 Sets or clears canonical mode, enabling line buffering and some
2077 special characters.
2078
2079 raw Sets raw mode, thus passing input and output almost unprocessed.
2080 This option is obsolete, use option rawer or cfmakeraw instead.
2081
2082 rawer Makes terminal rawer than raw option. This option implicitly
2083 turns off echo. (example).
2084
2085 cfmakeraw
2086 Sets raw mode by invoking cfmakeraw() or by simulating this
2087 call. This option implicitly turns off echo.
2088
2089 ignbrk=<bool>
2090 Ignores or interpretes the BREAK character (e.g., ^C)
2091
2092 brkint=<bool>
2093
2094 bs0
2095
2096 bs1
2097
2098 bsdly=<0|1>
2099
2100 clocal=<bool>
2101
2102
2103 cr0
2104 cr1
2105 cr2
2106 cr3
2107
2108 Sets the carriage return delay to 0, 1, 2, or 3, respectively.
2109 0 means no delay, the other values are terminal dependent.
2110
2111 crdly=<0|1|2|3>
2112
2113 cread=<bool>
2114
2115 crtscts=<bool>
2116
2117
2118 cs5
2119 cs6
2120 cs7
2121 cs8
2122
2123 Sets the character size to 5, 6, 7, or 8 bits, respectively.
2124
2125 csize=<0|1|2|3>
2126
2127 cstopb=<bool>
2128 Sets two stop bits, rather than one.
2129
2130 dsusp=<byte>
2131 Sets the value for the VDSUSP character that suspends the cur‐
2132 rent foreground process and reactivates the shell (all except
2133 Linux).
2134
2135 echoctl=<bool>
2136 Echos control characters in hat notation (e.g. ^A)
2137
2138 echoe=<bool>
2139
2140 echok=<bool>
2141
2142 echoke=<bool>
2143
2144 echonl=<bool>
2145
2146 echoprt=<bool>
2147
2148 eof=<byte>
2149
2150 eol=<byte>
2151
2152 eol2=<byte>
2153
2154 erase=<byte>
2155
2156 discard=<byte>
2157
2158 ff0
2159
2160 ff1
2161
2162 ffdly=<bool>
2163
2164 flusho=<bool>
2165
2166 hupcl=<bool>
2167
2168 icrnl=<bool>
2169
2170 iexten=<bool>
2171
2172 igncr=<bool>
2173
2174 ignpar=<bool>
2175
2176 imaxbel=<bool>
2177
2178 inlcr=<bool>
2179
2180 inpck=<bool>
2181
2182 intr=<byte>
2183
2184 isig=<bool>
2185
2186 ispeed=<unsigned-int>
2187 Set the baud rate for incoming data on this line.
2188 See also: ospeed, b19200
2189
2190 istrip=<bool>
2191
2192 iuclc=<bool>
2193
2194 ixany=<bool>
2195
2196 ixoff=<bool>
2197
2198 ixon=<bool>
2199
2200 kill=<byte>
2201
2202 lnext=<byte>
2203
2204 min=<byte>
2205
2206 nl0 Sets the newline delay to 0.
2207
2208 nl1
2209
2210 nldly=<bool>
2211
2212 noflsh=<bool>
2213
2214 ocrnl=<bool>
2215
2216 ofdel=<bool>
2217
2218 ofill=<bool>
2219
2220 olcuc=<bool>
2221
2222 onlcr=<bool>
2223
2224 onlret=<bool>
2225
2226 onocr=<bool>
2227
2228 opost=<bool>
2229 Enables or disables output processing; e.g., converts NL to
2230 CR-NL.
2231
2232 ospeed=<unsigned-int>
2233 Set the baud rate for outgoing data on this line.
2234 See also: ispeed, b19200
2235
2236 parenb=<bool>
2237 Enable parity generation on output and parity checking for
2238 input.
2239
2240 parmrk=<bool>
2241
2242 parodd=<bool>
2243
2244 pendin=<bool>
2245
2246 quit=<byte>
2247
2248 reprint=<byte>
2249
2250 sane Brings the terminal to something like a useful default state.
2251
2252 start=<byte>
2253
2254 stop=<byte>
2255
2256 susp=<byte>
2257
2258 swtc=<byte>
2259
2260 tab0
2261
2262 tab1
2263
2264 tab2
2265
2266 tab3
2267
2268 tabdly=<unsigned-int>
2269
2270 time=<byte>
2271
2272 tostop=<bool>
2273
2274 vt0
2275
2276 vt1
2277
2278 vtdly=<bool>
2279
2280 werase=<byte>
2281
2282 xcase=<bool>
2283
2284 xtabs
2285
2286 i-pop-all
2287 With UNIX System V STREAMS, removes all drivers from the stack.
2288
2289 i-push=<string>
2290 With UNIX System V STREAMS, pushes the driver (module) with the
2291 given name (string) onto the stack. For example, to make sure
2292 that a character device on Solaris supports termios etc, use the
2293 following options:
2294 i-pop-all,i-push=ptem,i-push=ldterm,i-push=ttcompat
2295
2296
2297 PTY option group
2298
2299 These options are intended for use with the pty address type.
2300
2301 link=<filename>
2302 Generates a symbolic link that points to the actual pseudo ter‐
2303 minal (pty). This might help to solve the problem that ptys are
2304 generated with more or less unpredictable names, making it dif‐
2305 ficult to directly access the socat generated pty automatically.
2306 With this option, the user can specify a "fix" point in the file
2307 hierarchy that helps him to access the actual pty (example).
2308 Beginning with socat version 1.4.3, the symbolic link is removed
2309 when the address is closed (but see option unlink-close).
2310
2311 wait-slave
2312 Blocks the open phase until a process opens the slave side of
2313 the pty. Usually, socat continues after generating the pty with
2314 opening the next address or with entering the transfer loop.
2315 With the wait-slave option, socat waits until some process opens
2316 the slave side of the pty before continuing. This option only
2317 works if the operating system provides the poll() system call.
2318 And it depends on an undocumented behaviour of pty’s, so it does
2319 not work on all operating systems. It has successfully been
2320 tested on Linux, FreeBSD, NetBSD, and on Tru64 with openpty.
2321
2322 pty-interval=<seconds>
2323 When the wait-slave option is set, socat periodically checks the
2324 HUP condition using poll() to find if the pty’s slave side has
2325 been opened. The default polling interval is 1s. Use the
2326 pty-interval option [timeval] to change this value.
2327
2328
2329 OPENSSL option group
2330
2331 These options apply to the openssl and openssl-listen address types.
2332
2333 cipher=<cipherlist>
2334 Selects the list of ciphers that may be used for the connection.
2335 See the man page of ciphers , section CIPHER LIST FORMAT, for
2336 detailed information about syntax, values, and default of
2337 <cipherlist>.
2338 Several cipher strings may be given, separated by ’:’. Some
2339 simple cipher strings:
2340
2341 3DES Uses a cipher suite with triple DES.
2342
2343 MD5 Uses a cipher suite with MD5.
2344
2345 aNULL Uses a cipher suite without authentication.
2346
2347 NULL Does not use encryption.
2348
2349 HIGH Uses a cipher suite with "high" encryption. Note that the peer
2350 must support the selected property, or the negotiation will
2351 fail.
2352
2353 method=<ssl-method>
2354 Sets the protocol version to be used. Valid strings (not case
2355 sensitive) are:
2356
2357 SSL2 Select SSL protocol version 2.
2358
2359 SSL3 Select SSL protocol version 3.
2360
2361 SSL23 Select the best available SSL or TLS protocol. This is the
2362 default when this option is not provided.
2363
2364 TLS1 Select TLS protocol version 1.
2365
2366 TLS1.1 Select TLS protocol version 1.1.
2367
2368 TLS1.2 Select TLS protocol version 1.2.
2369
2370 DTLS1 Select DTLS protocol version 1.
2371
2372 verify=<bool>
2373 Controls check of the peer’s certificate. Default is 1 (true).
2374 Disabling verify might open your socket for everyone, making the
2375 encryption useless!
2376
2377 cert=<filename>
2378 Specifies the file with the certificate and private key for
2379 authentication. The certificate must be in OpenSSL format
2380 (*.pem). With openssl-listen, use of this option is strongly
2381 recommended. Except with cipher aNULL, "no shared ciphers" error
2382 will occur when no certificate is given.
2383
2384 key=<filename>
2385 Specifies the file with the private key. The private key may be
2386 in this file or in the file given with the cert option. The
2387 party that has to proof that it is the owner of a certificate
2388 needs the private key.
2389
2390 dhparams=<filename>
2391 Specifies the file with the Diffie Hellman parameters. These
2392 parameters may also be in the file given with the cert option in
2393 which case the dhparams option is not needed.
2394
2395 cafile=<filename>
2396 Specifies the file with the trusted (root) authority certifi‐
2397 cates. The file must be in PEM format and should contain one or
2398 more certificates. The party that checks the authentication of
2399 its peer trusts only certificates that are in this file.
2400
2401 capath=<dirname>
2402 Specifies the directory with the trusted (root) certificates.
2403 The directory must contain certificates in PEM format and their
2404 hashes (see OpenSSL documentation)
2405
2406 egd=<filename>
2407 On some systems, openssl requires an explicit source of random
2408 data. Specify the socket name where an entropy gathering daemon
2409 like egd provides random data, e.g. /dev/egd-pool.
2410
2411 pseudo On systems where openssl cannot find an entropy source and where
2412 no entropy gathering daemon can be utilized, this option acti‐
2413 vates a mechanism for providing pseudo entropy. This is
2414 archieved by taking the current time in microseconds for feeding
2415 the libc pseudo random number generator with an initial value.
2416 openssl is then feeded with output from random() calls.
2417 NOTE:This mechanism is not sufficient for generation of secure
2418 keys!
2419
2420 compress
2421 Enable or disable the use of compression for a connection. Set‐
2422 ting this to "none" disables compression, setting it to "auto"
2423 lets OpenSSL choose the best available algorithm supported by
2424 both parties. The default is to not touch any compres‐
2425 sion-related settings. NOTE: Requires OpenSSL 0.9.8 or higher
2426 and disabling compression with OpenSSL 0.9.8 affects all new
2427 connections in the process.
2428
2429 commonname=<string>
2430 Specify the commonname that the peer certificate must match.
2431 With OPENSSL-CONNECT address this overrides the given hostname
2432 or IP target address; with OPENSSL-LISTEN this turns on check of
2433 peer certificates commonname. This option has only meaning when
2434 option verify is not disabled and the chosen cipher provides a
2435 peer certificate.
2436
2437 fips Enables FIPS mode if compiled in. For info about the FIPS
2438 encryption implementation standard see http://oss-insti‐
2439 tute.org/fips-faq.html. This mode might require that the
2440 involved certificates are generated with a FIPS enabled version
2441 of openssl. Setting or clearing this option on one socat address
2442 affects all OpenSSL addresses of this process.
2443
2444
2445 RETRY option group
2446
2447 Options that control retry of some system calls, especially connection
2448 attempts.
2449
2450 retry=<num>
2451 Number of retries before the connection or listen attempt is
2452 aborted. Default is 0, which means just one attempt.
2453
2454 interval=<timespec>
2455 Time between consecutive attempts (seconds, [timespec]). Default
2456 is 1 second.
2457
2458 forever
2459 Performs an unlimited number of retry attempts.
2460
2461
2462 TUN option group
2463
2464 Options that control Linux TUN/TAP interface device addresses.
2465
2466 tun-device=<device-file>
2467 Instructs socat to take another path for the TUN clone device.
2468 Default is /dev/net/tun.
2469
2470 tun-name=<if-name>
2471 Gives the resulting network interface a specific name instead of
2472 the system generated (tun0, tun1, etc.)
2473
2474 tun-type=[tun|tap]
2475 Sets the type of the TUN device; use this option to generate a
2476 TAP device. See the Linux docu for the difference between these
2477 types. When you try to establish a tunnel between two TUN
2478 devices, their types should be the same.
2479
2480 iff-no-pi
2481 Sets the IFF_NO_PI flag which controls if the device includes
2482 additional packet information in the tunnel. When you try to
2483 establish a tunnel between two TUN devices, these flags should
2484 have the same values.
2485
2486 iff-up Sets the TUN network interface status UP. Strongly recommended.
2487
2488 iff-broadcast
2489 Sets the BROADCAST flag of the TUN network interface.
2490
2491 iff-debug
2492 Sets the DEBUG flag of the TUN network interface.
2493
2494 iff-loopback
2495 Sets the LOOPBACK flag of the TUN network interface.
2496
2497 iff-pointopoint
2498 Sets the POINTOPOINT flag of the TUN device.
2499
2500 iff-notrailers
2501 Sets the NOTRAILERS flag of the TUN device.
2502
2503 iff-running
2504 Sets the RUNNING flag of the TUN device.
2505
2506 iff-noarp
2507 Sets the NOARP flag of the TUN device.
2508
2509 iff-promisc
2510 Sets the PROMISC flag of the TUN device.
2511
2512 iff-allmulti
2513 Sets the ALLMULTI flag of the TUN device.
2514
2515 iff-master
2516 Sets the MASTER flag of the TUN device.
2517
2518 iff-slave
2519 Sets the SLAVE flag of the TUN device.
2520
2521 iff-multicast
2522 Sets the MULTICAST flag of the TUN device.
2523
2524 iff-portsel
2525 Sets the PORTSEL flag of the TUN device.
2526
2527 iff-automedia
2528 Sets the AUTOMEDIA flag of the TUN device.
2529
2530 iff-dynamic
2531 Sets the DYNAMIC flag of the TUN device.
2532
2533
2535 This section explains the different data types that address parameters
2536 and address options can take.
2537
2538 address-range
2539 Is currently only implemented for IPv4 and IPv6. See
2540 address-option `range’
2541
2542 bool "0" or "1"; if value is omitted, "1" is taken.
2543
2544 byte An unsigned int number, read with strtoul() , lower or equal to
2545 UCHAR_MAX .
2546
2547 command-line
2548 A string specifying a program name and its arguments, separated
2549 by single spaces.
2550
2551 data A raw data specification following dalan syntax. Currently the
2552 only valid form is a string starting with ’x’ followed by an
2553 even number of hex digits, specifying a sequence of bytes.
2554
2555 directory
2556 A string with usual UN*X directory name semantics.
2557
2558 facility
2559 The name of a syslog facility in lower case characters.
2560
2561 fdnum An unsigned int type, read with strtoul() , specifying a UN*X
2562 file descriptor.
2563
2564 filename
2565 A string with usual UN*X filename semantics.
2566
2567 group If the first character is a decimal digit, the value is read
2568 with strtoul() as unsigned integer specifying a group id. Other‐
2569 wise, it must be an existing group name.
2570
2571 int A number following the rules of the strtol() function with base
2572 "0", i.e. decimal number, octal number with leading "0", or
2573 hexadecimal number with leading "0x". The value must fit into a
2574 C int.
2575
2576 interface
2577 A string specifying the device name of a network interface as
2578 shown by ifconfig or procan, e.g. "eth0".
2579
2580 IP address
2581 An IPv4 address in numbers-and-dots notation, an IPv6 address in
2582 hex notation enclosed in brackets, or a hostname that resolves
2583 to an IPv4 or an IPv6 address.
2584 Examples: 127.0.0.1, [::1], www.dest-unreach.org, dns1
2585
2586 IPv4 address
2587 An IPv4 address in numbers-and-dots notation or a hostname that
2588 resolves to an IPv4 address.
2589 Examples: 127.0.0.1, www.dest-unreach.org, dns2
2590
2591 IPv6 address
2592 An iPv6 address in hexnumbers-and-colons notation enclosed in
2593 brackets, or a hostname that resolves to an IPv6 address.
2594 Examples: [::1], [1234:5678:9abc:def0:1234:5678:9abc:def0],
2595 ip6name.domain.org
2596
2597 long A number read with strtol() . The value must fit into a C long.
2598
2599 long long
2600 A number read with strtoll() . The value must fit into a C long
2601 long.
2602
2603 off_t An implementation dependend signed number, usually 32 bits, read
2604 with strtol or strtoll.
2605
2606 off64_t
2607 An implementation dependend signed number, usually 64 bits, read
2608 with strtol or strtoll.
2609
2610 mode_t An unsigned integer, read with strtoul() , specifying mode (per‐
2611 mission) bits.
2612
2613 pid_t A number, read with strtol() , specifying a process id.
2614
2615 port A uint16_t (16 bit unsigned number) specifying a TCP or UDP
2616 port, read with strtoul() .
2617
2618 protocol
2619 An unsigned 8 bit number, read with strtoul() .
2620
2621 size_t An unsigned number with size_t limitations, read with strtoul .
2622
2623 sockname
2624 A socket address. See address-option `bind’
2625
2626 string A sequence of characters, not containing ’\0’ and, depending on
2627 the position within the command line, ’:’, ’,’, or "!!". Note
2628 that you might have to escape shell meta characters in the com‐
2629 mand line.
2630
2631 TCP service
2632 A service name, not starting with a digit, that is resolved by
2633 getservbyname() , or an unsigned int 16 bit number read with
2634 strtoul() .
2635
2636 timeval
2637 A double float specifying seconds; the number is mapped into a
2638 struct timeval, consisting of seconds and microseconds.
2639
2640 timespec
2641 A double float specifying seconds; the number is mapped into a
2642 struct timespec, consisting of seconds and nanoseconds.
2643
2644 UDP service
2645 A service name, not starting with a digit, that is resolved by
2646 getservbyname() , or an unsigned int 16 bit number read with
2647 strtoul() .
2648
2649 unsigned int
2650 A number read with strtoul() . The value must fit into a C
2651 unsigned int.
2652
2653 user If the first character is a decimal digit, the value is read
2654 with strtoul() as unsigned integer specifying a user id. Other‐
2655 wise, it must be an existing user name.
2656
2657
2659 socat - TCP4:www.domain.org:80
2660
2661
2662 transfers data between STDIO (-) and a TCP4 connection to port
2663 80 of host www.domain.org. This example results in an interac‐
2664 tive connection similar to telnet or netcat. The stdin terminal
2665 parameters are not changed, so you may close the relay with ^D
2666 or abort it with ^C.
2667
2668 socat -d -d READLINE,history=$HOME/.http_history \
2669 TCP4:www.domain.org:www,crnl
2670
2671 this is similar to the previous example, but you can edit the
2672 current line in a bash like manner (READLINE) and use the his‐
2673 tory file .http_history; socat prints messages about progress
2674 (-d -d). The port is specified by service name (www), and cor‐
2675 rect network line termination characters (crnl) instead of NL
2676 are used.
2677
2678 socat TCP4-LISTEN:www TCP4:www.domain.org:www
2679
2680
2681 installs a simple TCP port forwarder. With TCP4-LISTEN it lis‐
2682 tens on local port "www" until a connection comes in, accepts
2683 it, then connects to the remote host (TCP4) and starts data
2684 transfer. It will not accept a econd connection.
2685
2686 socat -d -d -lmlocal2 \
2687 TCP4-LISTEN:80,bind=myaddr1,reuseaddr,fork,su=nobody,range=10.0.0.0/8 \
2688 TCP4:www.domain.org:80,bind=myaddr2
2689
2690 TCP port forwarder, each side bound to another local IP address
2691 (bind). This example handles an almost arbitrary number of par‐
2692 allel or consecutive connections by fork’ing a new process after
2693 each accept() . It provides a little security by su’ing to user
2694 nobody after forking; it only permits connections from the pri‐
2695 vate 10 network (range); due to reuseaddr, it allows immediate
2696 restart after master process’s termination, even if some child
2697 sockets are not completely shut down. With -lmlocal2, socat
2698 logs to stderr until successfully reaching the accept loop. Fur‐
2699 ther logging is directed to syslog with facility local2.
2700
2701 socat TCP4-LISTEN:5555,fork,tcpwrap=script \
2702 EXEC:/bin/myscript,chroot=/home/sandbox,su-d=sandbox,pty,stderr
2703
2704 a simple server that accepts connections (TCP4-LISTEN) and
2705 fork’s a new child process for each connection; every child acts
2706 as single relay. The client must match the rules for daemon
2707 process name "script" in /etc/hosts.allow and /etc/hosts.deny,
2708 otherwise it is refused access (see "man 5 hosts_access"). For
2709 EXEC’uting the program, the child process chroot’s to
2710 /home/sandbox, su’s to user sandbox, and then starts the program
2711 /home/sandbox/bin/myscript. Socat and myscript communicate via a
2712 pseudo tty (pty); myscript’s stderr is redirected to stdout, so
2713 its error messages are transferred via socat to the connected
2714 client.
2715
2716 socat EXEC:"mail.sh target@domain.com",fdin=3,fdout=4 \
2717 TCP4:mail.relay.org:25,crnl,bind=alias1.server.org,mss=512
2718
2719 mail.sh is a shell script, distributed with socat, that imple‐
2720 ments a simple SMTP client. It is programmed to "speak" SMTP on
2721 its FDs 3 (in) and 4 (out). The fdin and fdout options tell
2722 socat to use these FDs for communication with the program.
2723 Because mail.sh inherits stdin and stdout while socat does not
2724 use them, the script can read a mail body from stdin. Socat
2725 makes alias1 your local source address (bind), cares for correct
2726 network line termination (crnl) and sends at most 512 data bytes
2727 per packet (mss).
2728
2729 socat -,escape=0x0f /dev/ttyS0,rawer,crnl
2730
2731
2732 opens an interactive connection via the serial line, e.g. for
2733 talking with a modem. rawer sets the console’s and ttyS0’s ter‐
2734 minal parameters to practicable values, crnl converts to correct
2735 newline characters. escape allows terminating the socat process
2736 with character control-O. Consider using READLINE instead of
2737 the first address.
2738
2739 socat UNIX-LISTEN:/tmp/.X11-unix/X1,fork \
2740 SOCKS4:host.victim.org:127.0.0.1:6000,socksuser=nobody,sourceport=20
2741
2742 with UNIX-LISTEN, socat opens a listening UNIX domain socket
2743 /tmp/.X11-unix/X1. This path corresponds to local XWindow dis‐
2744 play :1 on your machine, so XWindow client connections to DIS‐
2745 PLAY=:1 are accepted. Socat then speaks with the SOCKS4 server
2746 host.victim.org that might permit sourceport 20 based connec‐
2747 tions due to an FTP related weakness in its static IP filters.
2748 Socat pretends to be invoked by socksuser nobody, and requests
2749 to be connected to loopback port 6000 (only weak sockd configu‐
2750 rations will allow this). So we get a connection to the victims
2751 XWindow server and, if it does not require MIT cookies or Ker‐
2752 beros authentication, we can start work. Please note that there
2753 can only be one connection at a time, because TCP can establish
2754 only one session with a given set of addresses and ports.
2755
2756 socat -u /tmp/readdata,seek-end=0,ignoreeof -
2757
2758
2759 this is an example for unidirectional data transfer (-u). Socat
2760 transfers data from file /tmp/readdata (implicit address GOPEN),
2761 starting at its current end (seek-end=0 lets socat start reading
2762 at current end of file; use seek=0 or no seek option to first
2763 read the existing data) in a "tail -f" like mode (ignoreeof).
2764 The "file" might also be a listening UNIX domain socket (do not
2765 use a seek option then).
2766
2767 (sleep 5; echo PASSWORD; sleep 5; echo ls; sleep 1) |
2768 socat - EXEC:'ssh -l user server',pty,setsid,ctty
2769
2770 EXEC’utes an ssh session to server. Uses a pty for communication
2771 between socat and ssh, makes it ssh’s controlling tty (ctty),
2772 and makes this pty the owner of a new process group (setsid), so
2773 ssh accepts the password from socat.
2774
2775 socat -u TCP4-LISTEN:3334,reuseaddr,fork \
2776 OPEN:/tmp/in.log,creat,append
2777
2778 implements a simple network based message collector. For each
2779 client connecting to port 3334, a new child process is generated
2780 (option fork). All data sent by the clients are append’ed to
2781 the file /tmp/in.log. If the file does not exist, socat creat’s
2782 it. Option reuseaddr allows immediate restart of the server
2783 process.
2784
2785 socat READLINE,noecho=’[Pp]assword:’ EXEC:’ftp ftp.server.com’,pty,set‐
2786 sid,ctty
2787
2788
2789 wraps a command line history (READLINE) around the EXEC’uted ftp
2790 client utility. This allows editing and reuse of FTP commands
2791 for relatively comfortable browsing through the ftp directory
2792 hierarchy. The password is echoed! pty is required to have ftp
2793 issue a prompt. Nevertheless, there may occur some confusion
2794 with the password and FTP prompts.
2795
2796 socat PTY,link=$HOME/dev/vmodem0,rawer,wait-slave \
2797 EXEC:"ssh modemserver.us.org socat - /dev/ttyS0,nonblock,rawer"
2798
2799 generates a pseudo terminal device (PTY) on the client that can
2800 be reached under the symbolic link $HOME/dev/vmodem0. An appli‐
2801 cation that expects a serial line or modem can be configured to
2802 use $HOME/dev/vmodem0; its traffic will be directed to a modem‐
2803 server via ssh where another socat instance links it to
2804 /dev/ttyS0.
2805
2806 socat TCP4-LISTEN:2022,reuseaddr,fork \
2807 PROXY:proxy:www.domain.org:22,proxyport=3128,proxyauth=user:pass
2808
2809 starts a forwarder that accepts connections on port 2022, and
2810 directs them through the proxy daemon listening on port 3128
2811 (proxyport) on host proxy, using the CONNECT method, where they
2812 are authenticated as "user" with "pass" (proxyauth). The proxy
2813 should establish connections to host www.domain.org on port 22
2814 then.
2815
2816 socat - SSL:server:4443,cafile=server.crt,cert=client.pem
2817
2818
2819 is an OpenSSL client that tries to establish a secure connection
2820 to an SSL server. Option cafile specifies a file that contains
2821 trust certificates: we trust the server only when it presents
2822 one of these certificates and proofs that it owns the related
2823 private key. Otherwise the connection is terminated. With cert
2824 a file containing the client certificate and the associated pri‐
2825 vate key is specified. This is required in case the server
2826 wishes a client authentication; many Internet servers do not.
2827 The first address (’-’) can be replaced by almost any other
2828 socat address.
2829
2830 socat OPENSSL-LISTEN:4443,reuse‐
2831 addr,pf=ip4,fork,cert=server.pem,cafile=client.crt PIPE
2832
2833
2834 is an OpenSSL server that accepts TCP connections, presents the
2835 certificate from the file server.pem and forces the client to
2836 present a certificate that is verified against cafile.crt.
2837 The second address (’PIPE’) can be replaced by almost any other
2838 socat address.
2839 For instructions on generating and distributing OpenSSL keys and
2840 certificates see the additional socat docu socat-openssl.txt.
2841
2842 echo |socat -u - file:/tmp/bigfile,create,largefile,seek=100000000000
2843
2844
2845 creates a 100GB sparse file; this requires a file system type
2846 that supports this (ext2, ext3, reiserfs, jfs; not minix, vfat).
2847 The operation of writing 1 byte might take long (reiserfs: some
2848 minutes; ext2: "no" time), and the resulting file can consume
2849 some disk space with just its inodes (reiserfs: 2MB; ext2:
2850 16KB).
2851
2852 socat tcp-l:7777,reuseaddr,fork system:’filan -i 0 -s >&2’,nofork
2853
2854
2855 listens for incoming TCP connections on port 7777. For each
2856 accepted connection, invokes a shell. This shell has its stdin
2857 and stdout directly connected to the TCP socket (nofork). The
2858 shell starts filan and lets it print the socket addresses to
2859 stderr (your terminal window).
2860
2861 echo -e "\0\14\0\0\c" |socat -u -
2862 file:/usr/bin/squid.exe,seek=0x00074420
2863
2864
2865 functions as primitive binary editor: it writes the 4 bytes 000
2866 014 000 000 to the executable /usr/bin/squid at offset
2867 0x00074420 (this is a real world patch to make the squid exe‐
2868 cutable from Cygwin run under Windows, actual per May 2004).
2869
2870 socat - tcp:www.blackhat.org:31337,readbytes=1000
2871
2872
2873 connects to an unknown service and prevents being flooded.
2874
2875 socat -U TCP:target:9999,end-close TCP-L:8888,reuseaddr,fork
2876
2877
2878 merges data arriving from different TCP streams on port 8888 to
2879 just one stream to target:9999. The end-close option prevents
2880 the child processes forked off by the second address from termi‐
2881 nating the shared connection to 9999 (close(2) just unlinks the
2882 inode which stays active as long as the parent process lives;
2883 shutdown(2) would actively terminate the connection).
2884
2885 socat - UDP4-DATAGRAM:192.168.1.0:123,sp=123,broad‐
2886 cast,range=192.168.1.0/24
2887
2888
2889 sends a broadcast to the network 192.168.1.0/24 and receives the
2890 replies of the timeservers there. Ignores NTP packets from hosts
2891 outside this network.
2892
2893 socat - SOCKET-DATA‐
2894 GRAM:2:2:17:x007bxc0a80100x0000000000000000,bind=x007bx00000000x0000000000000000,set‐
2895 sock‐
2896 opt-int=1:6:1,range=x0000xc0a80100x0000000000000000:x0000xffffff00x0000000000000000
2897
2898
2899 is semantically equivalent to the previous example, but all
2900 parameters are specified in generic form. the value 6 of set‐
2901 sockopt-int is the Linux value for SO_BROADCAST.
2902
2903 socat - IP4-DATAGRAM:255.255.255.255:44,broadcast,range=10.0.0.0/8
2904
2905
2906 sends a broadcast to the local network(s) using protocol 44.
2907 Accepts replies from the private address range only.
2908
2909 socat - UDP4-DATAGRAM:224.255.0.1:6666,bind=:6666,ip-add-member‐
2910 ship=224.255.0.1:eth0
2911
2912
2913 transfers data from stdin to the specified multicast address
2914 using UDP. Both local and remote ports are 6666. Tells the
2915 interface eth0 to also accept multicast packets of the given
2916 group. Multiple hosts on the local network can run this command,
2917 so all data sent by any of the hosts will be received by all the
2918 other ones. Note that there are many possible reasons for fail‐
2919 ure, including IP-filters, routing issues, wrong interface
2920 selection by the operating system, bridges, or a badly config‐
2921 ured switch.
2922
2923 socat TCP:host2:4443 TUN:192.168.255.1/24,up
2924
2925
2926 establishes one side of a virtual (but not private!) network
2927 with host2 where a similar process might run, with UDP-L and tun
2928 address 192.168.255.2. They can reach each other using the
2929 addresses 192.168.255.1 and 192.168.255.2. Note that streaming
2930 eg. via TCP or SSL does not guarantee to retain packet bound‐
2931 aries and may thus cause packet loss.
2932
2933 socat PTY,link=/var/run/ppp,rawer INTERFACE:hdlc0
2934
2935
2936 circumvents the problem that pppd requires a serial device and
2937 thus might not be able to work on a synchronous line that is
2938 represented by a network device. socat creates a PTY to make
2939 pppd happy, binds to the network interface hdlc0, and can trans‐
2940 fer data between both devices. Use pppd on device /var/run/ppp
2941 then.
2942
2943 socat -T 1 -d -d TCP-L:10081,reuseaddr,fork,crlf SYSTEM:"echo -e
2944 \"\\\"HTTP/1.0 200 OK\\\nDocumentType: text/plain\\\n\\\ndate:
2945 \$\(date\)\\\nserver:\$SOCAT_SOCKADDR:\$SOCAT_SOCKPORT\\\nclient:
2946 \$SOCAT_PEERADDR:\$SOCAT_PEERPORT\\\n\\\"\"; cat; echo -e
2947 \"\\\"\\\n\\\"\""
2948
2949
2950 creates a simple HTTP echo server: each HTTP client that con‐
2951 nects gets a valid HTTP reply that contains information about
2952 the client address and port as it is seen by the server host,
2953 the host address (which might vary on multihomed servers), and
2954 the original client request.
2955
2956 socat -d -d UDP4-RECVFROM:9999,so-broadcast,so-timestamp,ip-pkt‐
2957 info,ip-recverr,ip-recvopts,ip-recvtos,ip-recvttl!!- SYSTEM:’export;
2958 sleep 1’ |grep SOCAT
2959
2960
2961 waits for an incoming UDP packet on port 9999 and prints the
2962 environment variables provided by socat. On BSD based systems
2963 you have to replace ip-pktinfo with ip-recvdstaddr,ip-recvif.
2964 Especially interesting is SOCAT_IP_DSTADDR: it contains the tar‐
2965 get address of the packet which may be a unicast, multicast, or
2966 broadcast address.
2967
2968
2969
2970
2972 Socat uses a logging mechanism that allows filtering messages by sever‐
2973 ity. The severities provided are more or less compatible to the appro‐
2974 priate syslog priority. With one or up to four occurrences of the -d
2975 command line option, the lowest priority of messages that are issued
2976 can be selected. Each message contains a single uppercase character
2977 specifying the messages severity (one of F, E, W, N, I, or D)
2978
2979 FATAL: Conditions that require unconditional and immediate program ter‐
2980 mination.
2981
2982 ERROR: Conditions that prevent proper program processing. Usually the
2983 program is terminated (see option -s).
2984
2985 WARNING:
2986 Something did not function correctly or is in a state where cor‐
2987 rect further processing cannot be guaranteed, but might be pos‐
2988 sible.
2989
2990 NOTICE:
2991 Interesting actions of the program, e.g. for supervising socat
2992 in some kind of server mode.
2993
2994 INFO: Description of what the program does, and maybe why it happens.
2995 Allows monitoring the lifecycles of file descriptors.
2996
2997 DEBUG: Description of how the program works, all system or library
2998 calls and their results.
2999
3000
3001 Log messages can be written to stderr, to a file, or to syslog.
3002
3003 On exit, socat gives status 0 if it terminated due to EOF or inactivity
3004 timeout, with a positive value on error, and with a negative value on
3005 fatal error.
3006
3008 /usr/bin/socat
3009 /usr/bin/filan
3010 /usr/bin/procan
3011
3013 Input variables carry information from the environment to socat, output
3014 variables are set by socat for use in executed scripts and programs.
3015
3016 In the output variables beginning with "SOCAT" this prefix is actually
3017 replaced by the upper case name of the executable or the value of
3018 option -lp.
3019
3020 SOCAT_DEFAULT_LISTEN_IP (input)
3021 (Values 4 or 6) Sets the IP version to be used for listen, recv,
3022 and recvfrom addresses if no pf (protocol-family) option is
3023 given. Is overridden by socat options -4 or -6.
3024
3025 SOCAT_PREFERRED_RESOLVE_IP (input)
3026 (Values 0, 4, or 6) Sets the IP version to be used when resolv‐
3027 ing target host names when version is not specified by address
3028 type, option pf (protocol-family), or address format. If name
3029 resolution does not return a matching entry, the first result
3030 (with differing IP version) is taken. With value 0, socat always
3031 selects the first record and its IP version.
3032
3033 SOCAT_FORK_WAIT (input)
3034 Specifies the time (seconds) to sleep the parent and child pro‐
3035 cesses after successful fork(). Useful for debugging.
3036
3037 SOCAT_VERSION (output)
3038 Socat sets this variable to its version string, e.g. "1.7.0.0"
3039 for released versions or e.g. "1.6.0.1+envvar" for temporary
3040 versions; can be used in scripts invoked by socat.
3041
3042 SOCAT_PID (output)
3043 Socat sets this variable to its process id. In case of fork
3044 address option, SOCAT_PID gets the child processes id. Forking
3045 for exec and system does not change SOCAT_PID.
3046
3047 SOCAT_PPID (output)
3048 Socat sets this variable to its process id. In case of fork,
3049 SOCAT_PPID keeps the pid of the master process.
3050
3051 SOCAT_PEERADDR (output)
3052 With passive socket addresses (all LISTEN and RECVFROM
3053 addresses), this variable is set to a string describing the
3054 peers socket address. Port information is not included.
3055
3056 SOCAT_PEERPORT (output)
3057 With appropriate passive socket addresses (TCP, UDP, and SCTP -
3058 LISTEN and RECVFROM), this variable is set to a string contain‐
3059 ing the number of the peer port.
3060
3061 SOCAT_SOCKADDR (output)
3062 With all LISTEN addresses, this variable is set to a string
3063 describing the local socket address. Port information is not
3064 included example
3065
3066 SOCAT_SOCKPORT (output)
3067 With TCP-LISTEN, UDP-LISTEN, and SCTP-LISTEN addresses, this
3068 variable is set to the local port.
3069
3070 SOCAT_TIMESTAMP (output)
3071 With all RECVFROM addresses where address option so-timestamp is
3072 applied, socat sets this variable to the resulting timestamp.
3073
3074 SOCAT_IP_OPTIONS (output)
3075 With all IPv4 based RECVFROM addresses where address option
3076 ip-recvopts is applied, socat fills this variable with the IP
3077 options of the received packet.
3078
3079 SOCAT_IP_DSTADDR (output)
3080 With all IPv4 based RECVFROM addresses where address option
3081 ip-recvdstaddr (BSD) or ip-pktinfo (other platforms) is applied,
3082 socat sets this variable to the destination address of the
3083 received packet. This is particularly useful to identify broad‐
3084 cast and multicast addressed packets.
3085
3086 SOCAT_IP_IF (output)
3087 With all IPv4 based RECVFROM addresses where address option
3088 ip-recvif (BSD) or ip-pktinfo (other platforms) is applied,
3089 socat sets this variable to the name of the interface where the
3090 packet was received.
3091
3092 SOCAT_IP_LOCADDR (output)
3093 With all IPv4 based RECVFROM addresses where address option
3094 ip-pktinfo is applied, socat sets this variable to the address
3095 of the interface where the packet was received.
3096
3097 SOCAT_IP_TOS (output)
3098 With all IPv4 based RECVFROM addresses where address option
3099 ip-recvtos is applied, socat sets this variable to the TOS (type
3100 of service) of the received packet.
3101
3102 SOCAT_IP_TTL (output)
3103 With all IPv4 based RECVFROM addresses where address option
3104 ip-recvttl is applied, socat sets this variable to the TTL (time
3105 to live) of the received packet.
3106
3107 SOCAT_IPV6_HOPLIMIT (output)
3108 With all IPv6 based RECVFROM addresses where address option
3109 ipv6-recvhoplimit is applied, socat sets this variable to the
3110 hoplimit value of the received packet.
3111
3112 SOCAT_IPV6_DSTADDR (output)
3113 With all IPv6 based RECVFROM addresses where address option
3114 ipv6-recvpktinfo is applied, socat sets this variable to the
3115 destination address of the received packet.
3116
3117 SOCAT_IPV6_TCLASS (output)
3118 With all IPv6 based RECVFROM addresses where address option
3119 ipv6-recvtclass is applied, socat sets this variable to the
3120 transfer class of the received packet.
3121
3122 SOCAT_OPENSSL_X509_ISSUER (output)
3123 Issuer field from peer certificate
3124
3125 SOCAT_OPENSSL_X509_SUBJECT (output)
3126 Subject field from peer certificate
3127
3128 SOCAT_OPENSSL_X509_COMMONNAME (output)
3129 commonName entries from peer certificates subject. Multiple val‐
3130 ues are separated by " // ".
3131
3132 SOCAT_OPENSSL_X509_* (output)
3133 all other entries from peer certificates subject
3134
3135 SOCAT_OPENSSL_X509V3_DNS (output)
3136 DNS entries from peer certificates extensions - subjectAltName
3137 field. Multiple values are separated by " // ".
3138
3139 HOSTNAME (input)
3140 Is used to determine the hostname for logging (see -lh).
3141
3142 LOGNAME (input)
3143 Is used as name for the socks client user name if no socksuser
3144 is given.
3145 With options su and su-d, LOGNAME is set to the given user name.
3146
3147 USER (input)
3148 Is used as name for the socks client user name if no socksuser
3149 is given and LOGNAME is empty.
3150 With options su and su-d, USER is set to the given user name.
3151
3152 SHELL (output)
3153 With options su and su-d, SHELL is set to the login shell of the
3154 given user.
3155
3156 PATH (output)
3157 Can be set with option path for exec and system addresses.
3158
3159 HOME (output)
3160 With options su and su-d, HOME is set to the home directory of
3161 the given user.
3162
3164 The work of the following groups and organizations was invaluable for
3165 this project:
3166
3167 The FSF (GNU, http://www.fsf.org/ project with their free and portable
3168 development software and lots of other useful tools and libraries.
3169
3170 The Linux developers community (http://www.linux.org/) for providing a
3171 free, open source operating system.
3172
3173 The Open Group (http://www.unix-systems.org/) for making their standard
3174 specifications available on the Internet for free.
3175
3177 This man page describes version 1.7.3 of socat.
3178
3180 Addresses cannot be nested, so a single socat process cannot, e.g.,
3181 drive ssl over socks.
3182
3183 Address option ftruncate without value uses default 1 instead of 0.
3184
3185 Verbose modes (-x and/or -v) display line termination characters incon‐
3186 sistently when address options cr or crnl are used: They show the data
3187 after conversion in either direction.
3188
3189 The data transfer blocksize setting (-b) is ignored with address read‐
3190 line.
3191
3192 Send bug reports to <socat@dest-unreach.org>
3193
3195 nc(1), rinetd(8), openssl(1), stunnel(8), rlwrap(1), setsid(1)
3196
3197 Socat home page http://www.dest-unreach.org/socat/
3198
3200 Gerhard Rieger <rieger@dest-unreach.org>
3201
3202
3203
3204 socat(1)