|GNUNET-GNS-PROXY(1)||General Commands Manual||GNUNET-GNS-PROXY(1)|
DESCRIPTION¶Most users will want to run this SOCKS proxy. It can be used in combination with browsers that support the SOCKS 4a protocol.
The proxy will perform SSL authentication of GNS names and rewrite GNS enabled HTML content. To assert the validity of GNS names a local root CA certificate has to be generated that is used by the proxy. Thus "gnunet-gns-proxy-setup-ca" should be executed before the first launch of this proxy or the --authority switch is used to specify an appropriate CA certificate that is already trusted by the browser.
- Use the configuration file FILENAME.
- Path to a PEM CA file that contains the certificate and private key of the CA to use to assert the validity of GNS names. The default port is specified in the configuration file for the gns service under "[gns-proxy]": "[gns-proxy]" PROXY_CACERT
- The port this proxy should listen on. Default is 7777.
- Print short help on options.
- Use LOGLEVEL for logging. Valid values are DEBUG, INFO, WARNING and ERROR.
- Print GNUnet version number.
The full documentation for gnunet is maintained as a Texinfo manual. If the info(1) and gnunet programs are properly installed at your site, the command
should give you access to the complete handbook,
will give you access to a tutorial for developers.
BUGS¶Report bugs by using https://bugs.gnunet.org or by sending electronic mail to <firstname.lastname@example.org>.
|October 25, 2012||Linux 4.19.0-14-amd64|