1TINCD(8)                  BSD System Manager's Manual                 TINCD(8)
2

NAME

4     tincd — tinc VPN daemon
5

SYNOPSIS

7     tincd [-cdDkKnLRU] [--config=DIR] [--no-detach] [--debug[=LEVEL]]
8           [--kill[=SIGNAL]] [--net=NETNAME] [--generate-keys[=BITS]]
9           [--mlock] [--logfile[=FILE]] [--pidfile=FILE] [--bypass-security]
10           [--chroot] [--user=USER] [--help] [--version]
11

DESCRIPTION

13     This is the daemon of tinc, a secure virtual private network (VPN)
14     project.  When started, tincd will read it's configuration file to deter‐
15     mine what virtual subnets it has to serve and to what other tinc daemons
16     it should connect.  It will connect to the ethertap or tun/tap device and
17     set up a socket for incoming connections.  Optionally a script will be
18     executed to further configure the virtual device.  If that succeeds, it
19     will detach from the controlling terminal and continue in the background,
20     accepting and setting up connections to other tinc daemons that are part
21     of the virtual private network.  Under Windows (not Cygwin) tinc will
22     install itself as a service, which will be restarted automatically after
23     reboots.
24

OPTIONS

26     -c, --config=DIR
27             Read configuration files from DIR instead of /etc/tinc/.
28
29     -D, --no-detach
30             Don't fork and detach.  This will also disable the automatic
31             restart mechanism for fatal errors.  If not mentioned otherwise,
32             this will show log messages on the standard error output.
33
34     -d, --debug[=LEVEL]
35             Increase debug level or set it to LEVEL (see below).
36
37     -k, --kill[=SIGNAL]
38             Attempt to kill a running tincd (optionally with the specified
39             SIGNAL instead of SIGTERM) and exit.  Under Windows (not Cygwin)
40             the optional argument is ignored, the service will always be
41             stopped and removed.
42
43     -n, --net=NETNAME
44             Connect to net NETNAME.  This will let tinc read all configura‐
45             tion files from /etc/tinc/ NETNAME.  Specifying .  for NETNAME is
46             the same as not specifying any NETNAME.
47
48     -K, --generate-keys[=BITS]
49             Generate public/private RSA keypair and exit.  If BITS is omit‐
50             ted, the default length will be 2048 bits.  When saving keys to
51             existing files, tinc will not delete the old keys, you have to
52             remove them manually.
53
54     -L, --mlock
55             Lock tinc into main memory.  This will prevent sensitive data
56             like shared private keys to be written to the system swap
57             files/partitions.
58
59     --logfile[=FILE]
60             Write log entries to a file instead of to the system logging
61             facility.  If FILE is omitted, the default is
62             /var/log/tinc.NETNAME.log.
63
64     --pidfile=FILE
65             Write PID to FILE instead of /var/run/tinc.NETNAME.pid. Under
66             Windows this option will be ignored.
67
68     --bypass-security
69             Disables encryption and authentication of the meta protocol.
70             Only useful for debugging.
71
72     -R, --chroot
73             With this option tinc chroots into the directory where network
74             config is located (/etc/tinc/NETNAME if -n option is used, or to
75             the directory specified with -c option) after initialization.
76
77     -U, --user=USER
78             setuid to the specified USER after initialization.
79
80     --help  Display short list of options.
81
82     --version
83             Output version information and exit.
84

SIGNALS

86     ALRM    Forces tincd to try to connect to all uplinks immediately.  Usu‐
87             ally tincd attempts to do this itself, but increases the time it
88             waits between the attempts each time it failed, and if tincd
89             didn't succeed to connect to an uplink the first time after it
90             started, it defaults to the maximum time of 15 minutes.
91
92     HUP     Partially rereads configuration files.  Connections to hosts
93             whose host config file are removed are closed.  New outgoing con‐
94             nections specified in tinc.conf will be made.  If the --logfile
95             option is used, this will also close and reopen the log file,
96             useful when log rotation is used.
97
98     INT     Temporarily increases debug level to 5.  Send this signal again
99             to revert to the original level.
100
101     USR1    Dumps the connection list to syslog.
102
103     USR2    Dumps virtual network device statistics, all known nodes, edges
104             and subnets to syslog.
105
106     WINCH   Purges all information remembered about unreachable nodes.
107

DEBUG LEVELS

109     The tinc daemon can send a lot of messages to the syslog.  The higher the
110     debug level, the more messages it will log.  Each level inherits all mes‐
111     sages of the previous level:
112
113     0       This will log a message indicating tincd has started along with a
114             version number.  It will also log any serious error.
115
116     1       This will log all connections that are made with other tinc dae‐
117             mons.
118
119     2       This will log status and error messages from scripts and other
120             tinc daemons.
121
122     3       This will log all requests that are exchanged with other tinc
123             daemons. These include authentication, key exchange and connec‐
124             tion list updates.
125
126     4       This will log a copy of everything received on the meta socket.
127
128     5       This will log all network traffic over the virtual private net‐
129             work.
130

FILES

132     /etc/tinc/
133             Directory containing the configuration files tinc uses.  For more
134             information, see tinc.conf(5).
135
136     /var/run/tinc.NETNAME.pid
137             The PID of the currently running tincd is stored in this file.
138

BUGS

140     The BindToInterface option may not work correctly.
141
142     The cryptography in tinc is not well tested yet. Use it at your own risk!
143
144     If you find any bugs, report them to tinc@tinc-vpn.org.
145

TODO

147     A lot, especially security auditing.
148

SEE ALSO

150     tinc.conf(5), http://www.tinc-vpn.org/, http://www.cabal.org/.
151
152     The full documentation for tinc is maintained as a Texinfo manual.  If
153     the info and tinc programs are properly installed at your site, the com‐
154     mand info tinc should give you access to the complete manual.
155
156     tinc comes with ABSOLUTELY NO WARRANTY.  This is free software, and you
157     are welcome to redistribute it under certain conditions; see the file
158     COPYING for details.
159

AUTHORS

161     Ivo Timmermans
162     Guus Sliepen <guus@tinc-vpn.org>
163
164     And thanks to many others for their contributions to tinc!
165
166                                 June 22, 2019
Impressum