IRC bouncer
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

calico.1 2.2KB

CALICO(1)               FreeBSD General Commands Manual              CALICO(1)

NAME
     calico – dispatches cat

SYNOPSIS
     calico [-H host] [-P port] [-t timeout] directory

DESCRIPTION
     The calico daemon dispatches incoming TLS connections to instances of
     pounce(1) by Server Name Indication (SNI).  Instances of pounce(1) should
     be configured with -U to bind to UNIX-domain sockets named by the host
     they wish to accept connections for in the directory passed to calico.

     The arguments are as follows:

     -H host
             Bind to host.  The default host is localhost.

     -P port
             Bind to port.  The default port is 6697.

     -t timeout
             Set the timeout in milliseconds after which a connection will be
             closed if it has not sent the ClientHello message.  The default
             timeout is 1000 milliseconds.

     directory
             The path to the directory containing pounce(1) UNIX-domain
             sockets.

   Service Configuration
     Add the following to /etc/rc.conf to enable the calico daemon:

           calico_enable="YES"

     The default socket directory is /var/run/calico.  It can be changed by
     setting calico_path.  The pounce(1) service can be configured to listen
     in this directory with the following:

           pounce_flags="-U /var/run/calico"

     The calico and pounce(1) services can be started and stopped completely
     independently of each other.

EXAMPLES
           pounce -U sockets/foo.example.org foo.conf
           pounce -U sockets/bar.example.org bar.conf
           calico -H example.org sockets/

SEE ALSO
     pounce(1)

STANDARDS
     The calico daemon implements the following:

     E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.3,
     IETF, RFC 8446, https://tools.ietf.org/html/rfc8446, Mozilla, August
     2018.

     D. Eastlake 3rd, Transport Layer Security (TLS) Extensions: Extension
     Definitions, IETF, RFC 6066, https://tools.ietf.org/html/rfc6066, Huawei,
     January 2011.

AUTHORS
     June Bug <june@causal.agency>

BUGS
     Send mail to <june@causal.agency> or join #ascii.town on
     chat.freenode.net.

FreeBSD 12.0-RELEASE-p10       November 6, 2019       FreeBSD 12.0-RELEASE-p10