1 % HTALKAT(1) Version $VERSION | htalkat
3 htalkat - talkat client and server
6 talkat [OPTION]... COMMAND [ARG]...
9 htalkat is a client and server for the talkat real-time text protocol, with a
10 curses interactive client. Similar to talk(1) but running over a TLS
15 : Give detailed usage information.
17 i[dentity] [PUBLIC\_NAME]
18 : Create/show/modify cryptographic identity (public and secret keys, and
19 : certificates), setting public name to PUBLIC\_NAME if given.
21 c[onnect] ( [talkat:]FP@HOST | NAME[@HOST] )
22 : Connect to remote host, checking the public key agrees with the
23 : fingerprint provided. Waits for the connection to be "answered", then starts
24 : the interactive curses client (or a user-configured client)
26 n[ame] ( [talkat:]FP@HOST | NAME[@HOST] ) [NAME]
27 : Set short name ("petname") for fingerprint and optional host. This can be
28 : used with the c[onnect] command, and will be used when referring to the
29 : fingerprint. If the name to set is omitted, it will be prompted for.
32 : Start server process. This will listen for connections on the configured
33 : port (default: 5518), and notify by writing information to stdout and
34 : executing the ~/.htalkat/notify.sh script. If the public key provided on an
35 : incoming connection does not have a name associated, it will be assigned an
36 : automatic name +N where N is the next available positive integer.
38 a[nswer] [\-\-list|-l] [NAME]
39 : Answer incoming connection, starting the interactive curses client (or
40 : a user-configured client), or list pending unanswered connections.
42 a[nswer] [\-\-interactive-client|-i] NAME SOCKET\_PATH
43 : Directly spawn default (curses) client. NAME is the name of remote to
44 : display. SOCKET\_PATH is the path to a unix domain socket to interact with;
45 : characters read from this socket are displayed as coming from remote,
46 : and user input is written to the socket.
49 -d, \-\-datadir *PATH*
50 : Directory for data and configuration.
53 -S, \-\-socks-host *HOST*
54 : Use SOCKS5 proxy for all connections (including DNS resolution).
56 -P, \-\-socks-port *PORT*
57 : Port to use for SOCKS5 proxy.
61 : Show version information.
64 : Show usage information.
68 : Default *datadir*. The paths given below assume that this is used.
71 : Secret key used in certificates. The user hash is derived from the
72 : corresponding public key.
74 ~/.htalkat/id-connect.crt
75 : X509 certificate used for outgoing connections.
77 ~/.htalkat/id-listen.crt
78 : X509 certificate used for incoming connections.
79 : Unlike id-connect.crt, this will typically have empty Common Name field,
80 : for privacy reasons.
82 ~/.htalkat/htalkat.conf
86 : Executable script which is run when the server accepts an incoming
90 : Short names ("petnames") for user hashes, optionally with hosts, are stored
91 : here. These files may be manipulated directly.
94 : Information on unanswered incoming connections is stored here.
97 : Communication logs are optionally written here, one file per connection.
101 : Path to directory to use in place of ~/.htalkat/ (can be overridden by -d).
104 htalkat is free software, released under the terms of the GNU GPL v3 or later.
105 You should have obtained a copy of the licence as the file COPYING.
108 Martin Bays <mbays@sdf.org>