4 Currently @command{tofuproxy} uses:
5 GnuTLS'es @url{https://www.gnutls.org/manual/html_node/certtool-Invocation.html, certtool},
6 @url{http://cr.yp.to/redo.html, redo} build system,
7 @url{https://www.tcl.tk/, Tcl/Tk}'s @command{wish} shell for GUI dialogues,
8 @command{dwebp}, @command{djxl}, @command{avifdec} for images transcoding,
9 @url{https://github.com/halturin/multitail, multitail} for logs viewing.
13 @item Download and build @command{tofuproxy}:
16 $ git clone git://git.stargrave.org/tofuproxy.git
22 If build fails because of untrusted @code{ca.cypherpunks.ru} certificate, then:
25 $ [fetch|wget] http://www.ca.cypherpunks.ru/cert.pem
26 $ [fetch|wget] http://www.ca.cypherpunks.ru/cert.pem.asc
27 $ gpg --auto-key-locate dane --locate-keys stargrave at stargrave dot org
28 $ gpg --auto-key-locate wkd --locate-keys stargrave at gnupg dot net
29 $ gpg --verify cert.pem.asc
30 $ SSL_CERT_FILE=`pwd`/cert.pem GIT_SSL_CAINFO=`pwd`/cert.pem redo all
34 Run @command{tofuproxy} itself. By default it will bind to
35 @code{[::1]:8080} and use @code{[::1]:53} DNS server for DANE requests
36 (set to an empty string to disable DANE lookups):
40 main.go:70: listening: [::1]:8080 dns: [::1]:53 certs: ./certs ccerts: ./ccerts
43 @item Trust your newly generated CA:
46 # cat cert.pem >> /etc/ssl/cert.pem
49 @item Point you HTTP/HTTPS clients to @code{http://localhost:8080} proxy.
54 $ ( cd fifos ; ./multitail.sh )
57 @image{logs,,,Example logs,.webp}