strongswan_pt-tls-client - Man Page

Simple client using PT-TLS to collect integrity information

Synopsis

pt-tls-client--connect hostname|address[--port port] [--certid hex|--cert file]+ [--keyid hex|--key file] [--key-type rsa|ecdsa][--client client-id] [--secret password] [--mutual] [--options filename] [--quiet] [--debug level]
pt-tls-client-h | --help

Description

pt-tls-client is a simple client using the PT-TLS (RFC 6876) transport protocol to collect integrity measurements on the client platform. PT-TLS does an initial TLS handshake with certificate-based server authentication and optional certificate-based client authentication.  Alternatively simple password-based SASL client authentication protected by TLS can be used.

Attribute requests and integrity measurements are exchanged via the PA-TNC (RFC 5792) message protocol between any number of Integrity Measurement Verifiers (IMVs) residing on the remote PT-TLS server and multiple Integrity Measurement Collectors (IMCs) loaded dynamically by the PT-TLS client according to a list defined by /etc/tnc_config. PA-TNC messages that contain one or several PA-TNC attributes are multiplexed into PB-TNC (RFC 5793) client or server data batches which in turn are transported via PT-TLS.

Options

-h,  --help

Prints usage information and a short summary of the available commands.

-c,  --connect hostname|address

Set the hostname or IP address of the PT-TLS server.

-p,  --port port

Set the port of the PT-TLS server, default: 271.

-x,  --cert file

Set the path to an X.509 certificate file. This option can be repeated to load multiple client and CA certificates.

-X,  --certid hex

Set the handle of the certificate stored in a smartcard or a TPM 2.0 Trusted Platform Module.

-k,  --key file

Set the path to the client's PKCS#1 or PKCS#8 private key file

-t,  --key-type type

Define the type of the private key if stored in PKCS#1 format. Can be omitted with PKCS#8 keys.

-K,  --keyid hex

Set the keyid of the private key stored in a smartcard or a TPM 2.0 Trusted Platform Module.

-i,  --client client-id

Set the username or client ID of the client required for password-based SASL authentication.

-s,  --secret password

Set the preshared secret or client password required for password-based SASL authentication.

-q,  --mutual

Enable mutual attestation between PT-TLS client and PT-TLS server.

-v,  --debug level

Set debug level, default: 1.

-q,  --quiet

Disable debug output to stderr.

-+,  --options file

Read command line options from file.

Examples

Connect to a PT-TLS server using certificate-based authentication, storing the private ECDSA key in a file:

  pt-tls-client --connect pdp.example.com --cert ca.crt \
                --cert client.crt --key client.key --key-type ecdsa

Connect to a PT-TLS server using certificate-based authentication, storing the private key in a smartcard or a TPM 2.0 Trusted Platform Module:

  pt-tls-client --connect pdp.example.com --cert ca.crt \
                --cert client.crt --keyid 0x81010002

Connect to a PT-TLS server listening on port 443, using SASL password-based authentication:

  pt-tls-client --connect pdp.example.com --port 443 --cert ca.crt \
                --client jane --password p2Nl9trKlb

Files

/etc/tnc_config

See Also

strongswan.conf(5)

Info

2018-11-20 5.9.14 strongSwan