X-Git-Url: https://git.distorted.org.uk/~mdw/tripe/blobdiff_plain/fc916a0942e6ef8f63aefb96119d0e4fd7c7efbb..405fc4dacbe6be6ae706217bf8489d0a872a88cd:/proxy/tripe-mitm.8.in diff --git a/proxy/tripe-mitm.8.in b/proxy/tripe-mitm.8.in index 5f970f24..cab0fb2b 100644 --- a/proxy/tripe-mitm.8.in +++ b/proxy/tripe-mitm.8.in @@ -9,25 +9,24 @@ .\" .\" This file is part of Trivial IP Encryption (TrIPE). .\" -.\" TrIPE is free software; you can redistribute it and/or modify -.\" it under the terms of the GNU General Public License as published by -.\" the Free Software Foundation; either version 2 of the License, or -.\" (at your option) any later version. +.\" TrIPE is free software: you can redistribute it and/or modify it under +.\" the terms of the GNU General Public License as published by the Free +.\" Software Foundation; either version 3 of the License, or (at your +.\" option) any later version. .\" -.\" TrIPE is distributed in the hope that it will be useful, -.\" but WITHOUT ANY WARRANTY; without even the implied warranty of -.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -.\" GNU General Public License for more details. +.\" TrIPE is distributed in the hope that it will be useful, but WITHOUT +.\" ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or +.\" FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License +.\" for more details. .\" .\" You should have received a copy of the GNU General Public License -.\" along with TrIPE; if not, write to the Free Software Foundation, -.\" Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. +.\" along with TrIPE. If not, see . . .\"-------------------------------------------------------------------------- -.so ../defs.man.in \" @@@PRE@@@ +.so ../common/defs.man \" @@@PRE@@@ . .\"-------------------------------------------------------------------------- -.TH tripe-mitm 8 "14 October 2003" "Straylight/Edgeware" "TrIPE: Trivial IP Encryption" +.TH tripe-mitm 8tripe "14 October 2003" "Straylight/Edgeware" "TrIPE: Trivial IP Encryption" . .\"-------------------------------------------------------------------------- .SH "NAME" @@ -98,6 +97,7 @@ on The .I name identifies the public key which that peer uses to authenticate itself. +(Currently this is checked, but not used for anything.) Both .I local-port and @@ -129,7 +129,7 @@ description of filters below for more details. .BI lfilt: filter : args : \fR... Apply a given filter to packets received from the left peer. .TP -.BI lfilt: filter : args :\fR... +.BI rfilt: filter : args :\fR... Apply a given filter to packets received from the right peer. .TP .BI next: tag :\fR... @@ -201,6 +201,11 @@ the queue) then it has a 1 in .I p-replay probability (default 1 in 20) of being left in the queue. .TP +.BI drop\fR[\fP: p-drop\fR] +Randomly drop messages. Each message has a 1 in +.I p-drop +probability (default 1 in 5) of being discarded. +.TP .BI corrupt\fR[\fP: p-corrupt\fR] Randomly corrupt messages. Each message has a 1 in .I p-corrupt