| SC_REMOTED(1) | General Commands Manual | SC_REMOTED(1) |
sc_remoted —
interact with a collection of remotely controlled scamper
instances
sc_remoted |
[-?46D]
[-O options]
[-P port]
[-U directory]
[-c tls-certificate]
[-p tls-privatekey] |
The sc_remoted utility provides the
ability to connect to a scamper(1) instance running
remotely and interact with it by issuing commands and receiving results in
warts format. The options are as follows:
-?-Dsc_remoted to operate as a daemon.-4sc_remoted to only listen for IPv4-based
connections.-6sc_remoted to only listen for IPv6-based
connections.-O
optionssc_remoted to be further
tailored. The current choices for this option are:
sc_remotedsc_remoted-P
portsc_remoted should listen for incoming
connections.-U
directory-c
tls-certificate-p
tls-privatekeysc_remoted will prompt for the passphrase when
starting up.The intended use of the remote control socket built into
scamper(1) is as follows. A central server with IP
addresses 192.0.2.1 and 2001:db8::1 runs a
sc_remoted process listening on a port for remote
scamper process, placing control sockets in a specified directory:
sc_remoted -P 31337 -U
scamper-remote-socketsThen, a remote host with IP address 198.51.100.55 runs scamper and connects to the remote controller:
scamper -R
192.0.2.1:31337The sc_remoted process places a unix
domain socket in the directory corresponding to the remote process. The name
corresponds to the source IP address and port the remote scamper process
connected to controller with. If the scamper process used source port 1025,
then the unix domain socket's name will be
scamper-remote-sockets/198.51.100.55:1025If a second remote host with IP address 2001:db8:1234::1 runs scamper and connects to the remote controller:
scamper -R
[2001:db8::1]:31337The same sc_remoted process will place
another unix domain socket in the directory corresponding to the remote
process. If the scamper process used source port 1026, then the unix domain
socket's name will be
scamper-remote-sockets/2001:db8:1234::1.1026sc_remoted and scamper support the use of
transport layer security (TLS) using OpenSSL to authenticate and encrypt
communications between sc_remoted and scamper. To
use this support requires a public certificate signed by a certificate
authority. Scamper will verify the certificate presented by
sc_remoted and disconnect if the certificate
presented by sc_remoted cannot be validated.
Generating a certificate that will be accepted by scamper requires you to create a certificate request and pass it for signing to a certificate authority. To generate a private key in file remotepriv.pem, and a request to sign the key in remotereq.pem:
openssl req -new -keyout
remotepriv.pem -out remotereq.pemand then send the remotereq.pem file to the certificate authority
for signing. Do not send remotepriv.pem; that key must remain private to
you. When openssl prompts for a passphrase, choose a passphrase that is
unique and keep the passphrase secret. When your chosen certificate
authority signs your private key, it will return a file which we will call
remotecert.pem. Both remotecert.pem and remotepriv.pem are required
parameters to sc_remoted to enable TLS support:
sc_remoted -P 31337 -U
scamper-remote-sockets -c remotecert.pem -p remotepriv.pemand then passing the -O tls option to scamper:
scamper -R example.com:31337 -O
tlsscamper(1), sc_attach(1), sc_wartsdump(1), warts(5), openssl(1)
sc_remoted was written by Matthew Luckie
<mjl@luckie.org.nz>.
| September 21, 2014 | Debian |