pt-tls-client Tool
Synopsis
pt-tls-client --connect hostname|address [--port port] [--certid hex|--cert file]+
             [--keyid hex|--key file] [--key-type rsa|ecdsa] [--client client-id]
             [--secret password] [--mutual] [--optionsfrom filename] [--quiet]
             [--debug level]
pt-tls-client -h | --help
Description
pt-tls-client is a simple client using the PT-TLS (RFC 6876)
transport protocol to collect integrity measurements on the client platform.
PT-TLS does an initial TLS handshake with certificate-based server
authentication and optional certificate-based client authentication. Alternatively
simple password-based SASL client  authentication protected by TLS can be used.
Attribute requests and integrity measurements are exchanged via the PA-TNC
(RFC 5792) message protocol between any number of Integrity Measurement
Verifiers (IMVs) residing on the remote PT-TLS server and multiple Integrity
Measurement Collectors (IMCs) loaded dynamically by the PT-TLS client according
to a list defined by /etc/tnc_config. PA-TNC messages that contain one or
several PA-TNC attributes are multiplexed into PB-TNC (RFC 5793)
client or server data batches which in turn are transported via PT-TLS.
Options
  | 
  | 
Prints usage information and a short summary of the available commands  | 
  | 
  | 
Set the hostname or IP address of the PT-TLS server  | 
  | 
  | 
Set the port of the   | 
  | 
  | 
Set the path to an X.509 certificate file. This option can be repeated to load multiple client and CA certificates  | 
  | 
  | 
Set the handle of the certificate stored in a smartcard or a TPM 2.0 Trusted Platform Module  | 
  | 
  | 
Set the path to the client’s   | 
  | 
  | 
Set the keyid of the private key stored in a smartcard or a TPM 2.0 Trusted Platform Module  | 
  | 
  | 
Define the type of the private key if stored in   | 
  | 
  | 
Set the username or client ID of the client required for password-based   | 
  | 
  | 
Set the preshared secret or client password required for password-based    | 
  | 
  | 
Enable mutual attestation between   | 
  | 
  | 
Set debug level, default:   | 
  | 
  | 
Disable debug output to stderr  | 
  | 
  | 
Read command line options from file.  | 
TLS Options
The pt-tl-client command uses the strongSwan libtls library that can be
configured and fine-tuned with the following TLS options.
It is especially recommended to set version_max = 1.3 in order to profit from
the latest TLS 1.3 version.
Examples
- 
Connect to a
PT-TLSserver using certificate-based authentication, storing the privateECDSAkey in a file:pt-tls-client --connect pdp.example.com --cert ca.crt --cert client.crt \ --key client.key --key-type ecdsa - 
Connect to a
PT-TLSserver using certificate-based authentication, storing the private key in a smartcard or a TPM 2.0 Trusted Platform Module:pt-tls-client --connect pdp.example.com --cert ca.crt --cert client.crt \ --keyid 0x81010002 - 
Connect to a
PT-TLSserver listening on port443, using `SASL? password-based authentication:pt-tls-client --connect pdp.example.com --port 443 --cert ca.crt --client jane \ --password p2Nl9trKlb