rvsd
Command
Syntax
rvsd -store filename
[-http [ip_address:]http_port]
[-https [ip_address:]https_port]
[-http-only]
[-https-only]
[-no-http]
[-license url]
[-no-permanent]
[-listen [socket_protocol:|ip_address:]tcp_port]
[-no-lead-wc | -lead-wc]
[-no-multicast]
[-reliability time]
[-max-consumer-buffer size]
[-rxc-max-loss loss]
[-rxc-recv-threshold bps]
[-rxc-send-threshold bps]
[-reuse-port inbox_port]
[-logfile log_filename]
[-log-max-size size]
[-log-max-rotations n]
[-log-config config_log_filename]
[-foreground]
[-udp-ttl hops]
[-tls-min-proto-version version]
[-tls-max-proto-version version]
[-tls-ciphers string1:string2:stringN]
[-tls-ciphersuites name1:name2:nameN]
[-no-wc]
Purpose
The command rvsd starts the Rendezvous secure communications daemon process—the secure counterpart to rvd.
Remarks
This section describes only those aspects where rvsd differs from rvd. For details that both daemons share, see rvd.
Although rvd usually starts automatically, administrators must start rvsd by explicit command.
Command Line Parameters
|
Parameter |
Description |
|
|
This file contains the security parameters that configure
The secure daemon store file contains very sensitive information. Store it on the local file system of the secure daemon’s host computer, with tight file access, in a physically secure environment. Ensure timely backup to secure media. See also Store Files. |
|
|
The browser administration interface accepts connections on this HTTP or HTTPS port. Permit administration access only through the network interface specified by this IP address. To limit access to a browser on the When the IP address is absent, the daemon accepts connections through any network interface on the specified HTTP or HTTPS port. If the explicitly specified HTTP port is already occupied, the program exits. If the explicitly specified HTTPS port is already occupied, the program selects an ephemeral port. When the When the In all cases, the program prints (in its start banner and log file) the actual HTTP and HTTPS ports where it accepts browser administration interface connections. |
|
|
Disable HTTPS (secure) connections, leaving only an HTTP (non-secure) connection. |
|
|
Disable HTTP (non-secure) connections, leaving only an HTTPS (secure) connection. |
|
|
Disable all HTTP and HTTPS connections, overriding |
-license url
|
The URL to a TIBCO Activation Service in the form of Note:
Production environments must use a TIBCO Activation Service for TIBCO product activation. Using a license file to configure the Rendezvous daemon is only supported for development environments. The URL format for a license file is
file://pathname.
|
|
|
The IP address specifies the network interface through which this daemon accepts TLS connections. To bar connections from remote programs, specify IP address When the IP address is absent, the daemon accepts connections from any computer on the specified TLS port. When this parameter is entirely absent, the default behavior is to accept connections from any computer on TLS port 7500. For more detail about the choreography that establishes conduits, see Daemon Client Socket—Establishing Connections. Warning This parameter does not correspond to the |
|
|
If present (or when If not present, This parameter is not available with IPM. |
|
|
Sending to subjects with lead wildcards (for example, When When This parameter is not available with IPM. |
|
|
Send duplicate log output to this file for log items that record configuration changes. The daemon never rotates nor removes this special log file. Instead, this file remains as a record of all configuration changes. When absent, the default is |
|
|
These parameters are the same as for rvd. For details, see Command Line Parameters. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Set the minimum or maximum supported protocol versions for the ctx using OpenSSL calls |
|
|
Set the list of available ciphers (TLSv1.2 and earlier) using OpenSSL call |
|
|
Configure the available TLSv1.3 ciphersuites using OpenSSL call |
|
|
Silently drop any messages published by clients that contain any wild card tokens. |
-pwd-hash password-string
|
Takes the password-string, prints a base64 encoded PBKDF2 hash, and then exits. Rendezvous daemons do not store passwords, they convert the user-supplied plain text passwords into a secure hash first. By supplying a secure hash instead of a plain-text Administrator password in XML/JSON configuration, users remove Rendezvous daemons from the chain of custody of the password. Secure hashes are one-way, and passwords cannot be recovered from the secure hash. You are responsible for securely storing the original password. |