|  | 
   
 |   |  |   
  
    | sratool(1) | FreeBSD General Commands Manual (axa) | sratool(1) |  
sratool— SIE
    Remote Access (SRA) tool
 [-dhINV] [-ccfile] [-nconfig] [-Eciphers] [-Ffields] [commands] sratoolconnects and sends Advanced
    Exchange Access (AXA) protocol messages to SIE Remote Access (SRA) servers
    and displays the responses. It can also tunnel SIE data like
    sratunnel(1).
 sratoolis a programming example for the
    Advanced Exchange Access (AXA) applications programming interface to SRA
    servers, the AXA protocol. It also demonstrates the use of the AXA helper
    library, libaxa.a.
 Start using sratoolwith theconnectcommand described below. Use one or morewatchcommands to specify interesting patterns of
    SIE messages or IP packets. Limit the number of packets or messages
    transmitted from the SRA server or displayed with therate
    limitandcountcommands. Turn on one or more
    channels of messages or packets with thechannelcommand. Unless more output is enabled with the
    verbosecommand, most messages or packets are
    displayed in two lines. The first line includes the channel number on which
    it was received, the SIE message vendor of the message, the name of the
    field that caused the message to be selected, and the contents of the field.
    The second line is a summary of the message or packet. When more verbose output is enabled or when
    sratooldoes not understand the message, IP packets
    are printed in ASCII and SIE messages are printed in the standardnmsgpresentation format also seen from
    nmsgtool(1). The following arguments are available: 
  -ccfilereads commands from cfile as if the first command
      string on the command line were "source
      cfile".-dturns on tracing and debugging reports. Additional
      -dturn on more messages.-Eciphersspecifies the TLS encryption ciphers to use with apikey connections.-Ienables insecure mode for apikey authentication. When enabled, client
      connections will not be performed via TLS.-nconfigoverrides the default location of the config file
      that contains AXA client configuration data. Details are below. The
      default is ~/.axa/config.-Ffieldsoverrides the default location of the fields file
      that defines relationships among and semantics among SIE message fields.
      The default is $AXACONF/fields,
      ~/.axa/fields, or
      /usr/local/etc/axa/fields.-hdisplay options summary.-Ninstructs sratoolto not display a command line
      prompt.-Vdisplays the version of sratooland its preferred
      version of the AXA protocol.commandsare optional commands strings that are executed before
      sratoolstarts accepting commands from the use.
      There can be more than one string of commands. Multiple commands within a
      string are separated by semicolons. sratoolexecutes commands read from the
    standard input. Command history is available if the standard input is a
    terminal. Multiple commands can be specified at once by separating them with
    semicolons. The following commands are available:
 
  accountingTell the server to report counts of packets seen, missed, sent, and
    lost.aliasList the available connection aliases (culled from the axa client config
      file).bufferToggle NMSG output buffering. By default, this is enabled, which buffers
      network writes until the container is full. If disabled, NMSG payloads are
      emitted as quickly as possible.ciphers[cipher-list]set the list of ciphers for the next TLS connection or show the current
      contents of the list.connect[AraliasSmon|Arapikey:Ar<apikey>@Arhost,portSmon|Artcp:OoAruser@OcArhost,portSmon|Arunix:OoAruser@OcAr/ud/socketSmon]By itselfconnectshows the current
      connection.Otherwise connect to the specified SRA server.alias:use a connection alias specified
        in the AXA config file (see FILES).
 apikey:identify and authenticate the
        user via a Farsight Security provided apikey.
 tcp:identify the user for clear text
        communication via the TCP/IP host,port pair.
 unix:identify the user for
        communication over a local UNIX domain socket.
count[N|off]sets terminal output to stop displaying packets after anumber of packets
      (including immediately with a number of 0),show the currently remaining
      count,or turn off the packet count limit.debug[on|off|quiet|N]increases, decreases or shows the level of debugging and tracing
      messagesthat is also controlled
      by-d.Debug quietturns
      off reports of successful AXA commands.disconnectdisconnects from the SRA server.errormode[disconnect|off]disconnects from the SRA server and exitswhen the server reports an error
      or the connection breaks.In the default modeerror mode
      off,errors are only reported.exitEnds the program.goTell the SRA server to resume sending
      data.sratool.help[command]lists all commands or describes a single command.mode[SRA|RAD]Show the current command mode orexpect to connect to an SRA or RAD
      server.The default command mode is set by the name of the program.nopsends a command to the server that does nothing but test the
    connection.forwardStart, stop or show the state of forwarding packets received from the
      server.Received NMSG messages and IP packets can be forwarded as NMSG
      messages toa TCP or UDP port.Received IP packets can be forwarded as a
      pcap stream to a file,to a FIFO created with separately
      withmkfifo(1),or
      in Ethernet frames on a named network interface to a 48-bit address.
    
      nmsg:[tcp:|udp:]host,port
        Op Ar countsends nmsg messages to the UDP or optional TCP host name and port
          number host,port. UDP is the default. IP packets
          are converted to NMSG messages.nmsg:file:path Op Ar
        countsends binary nmsg messages to the file named
          path. IP packets are converted to nmsg
        messages.nmsg:file_json:path Op
        Ar countsends nmsg newline-delimited json blobs to the file named
          path. Note that newline-delimited json outputs
          can incur a slight performance penalty versus binary nmsg outputs for
          "high-velocity" outputs. This is because the underlying nmsg
          json output object is unbuffered and results a filesystem write for
          every forwarded nmsg.pcap[-fifo]:path
        Op Ar countsends IP packets to a file or FIFO named path
          for examination with
          tcpdump(1)
          or another packet tracing tool. An ordinary file is the default. Only
          IP packets but not nmsg messages are sent.pcap-if:[dst/]ifname
        Op Ar counttransmits IP packets on the network interface named
          ifname for examination with
          tcpdump(1)
          or another packet tracing tool. dst optionally
          specifies a destination 48-bit Ethernet address other than all
          0:0:0:0:0:0 default. This output usually requires that
          sratoolbe run by root. Only IP packets but
          not nmsg messages are sent. If count is present, forwarding stops
        after that many packets.pauseTell the SRA server to stop sending data.rate
    limit[[-|MAX|per-sec]
    [-|NEVER|report-secs]]Tell the SRA server to report its per-second packet rate limit or set the
      rate limit and the minimum interval between rate limit reports. Hits in
      excess of the rate limit are discarded by the server.raddChange to RAD mode.sample[X%]Get and optionally set the percentage of hits that the SRA servers
    sends.sleep
    x.yDo nothing for x.y seconds.source
    filenamereads and executes commands from a file.sradChange to SRA mode.statusShow information about the current connection state including time
      connected.traceNSet the server trace level to N.usernamesends a username to the server.verbose[on | off | N]controls the length of SIE message and IP packet descriptions. The
      default, verbose off, generally displays one line
      summaries.versiondisplays the version of sratooland its version of
      the AXA protocol.window[bufsize]Get and optionally set the TCP output buffer size or maximum send window
      used by the server.zlibToggle NMSG zlib container compression.channel{list | {on|off}
    {all|chN}}List available SRA channels or enable or disable one or all SIE
    channels.[tag] delete[watches [all]]With a tag (numeric label), stop or delete the specified watch. Without a
      tag (or with the keyword "all"), delete all watches.get
    channelsList all SIE channels available to the user on the SRA server.[tag] get watchesWith a tag (numeric label), get (list) the specified watch. Without a tag
      (or with the keyword "all"), list all watches.tag watch{ip=IP[/n] | dns=[*.]dom |
    ch=chN | errors}Tell the SRA server to send NMSG messages or IP packets that are to, from,
      or contain the specified IP addresses, that contain the specified domain
      name, that arrived at the server on the specified SIE channel, or are SIE
      messages or IP packets that could not be decoded.
      Tag is a number labeling the watch.
    
      
       ip=IP[/n]The IPv4 or IPv6 address IP specifies a host
          address unless a prefix length is specified. dns=[*.]domwatches for the domain anywhere in the IP packets or SIE messages on
          the enabled channels. A wild card watches for occurrences of the
          domain and all sub-domains. ch=all Sm off ch=ch N Sm
        onselects SIE messages or IP packets on the specified channel number or
          all channels. errorsselects SIE messages or IP packets that could not be decoded. Errors
          can also include nmsg processing/field decoding errors, malformed or
          excessively long DNS names, errors encountered at the datalink level,
          and unexpected address family types.[tag] list watchesSynonym for the get watches command.[tag] stop[watch [all]]Synonym for the
      delete
    command. The following captures and displays one SIE
    newdomainmessage. The "dns=*." watch or
    pattern was matched by the "nflxso.net" domain in DNS NS
  rdata. 
$ sratool
sra> connect apikey:<yourapikey>@axa-sie.domaintools.com,49500
* HELLO srad v3.0.1 prod-sie-axa-1 supporting AXA protocols v1 to v2; currently using v1
* Using AXA protocol 2
* OK USER mschiffm authorized
sra> count 1
sra> channel 213 on
* OK CHANNEL ON/OFF channel ch213 on
sra> 1 watch dns=*.
1 OK WATCH started
1 ch213  SIE newdomain
 ad6uq65jvhekifbbgu36u.r.nflxso.net/CNAME: nflxso.net
packet count limit exceeded
sra> exit 
  ~/.axa/configcontains AXA client configuration data. Currently supported are connection
      aliases that provide the user with a facility to create shortcut mnemonics
      to specify the SRA server connection string. For example:
    
    $ cat ~/.axa/config
# SRA
alias:sra-apikey=apikey:<elided>@axa-sie.domaintools.com,49500
     If the user wanted to connect to SRA, she would only have to
        remember "sra-apikey" and could do: 
    $ sratool
sra> connect sra-apikey This config file is shared for
        sratool, radtool, sratunnel, and radtunnel.
        Because this file can contain sensitive information such as apikeys, it
        must not be readable or writeable to anybody other than
        "owner" orsratoolwill not load.~/.sratool_historycontains the command history from previous sratooland/orradtoolinvocations If set, AXACONF specifies the AXA configuration directory instead
    of the default, ~/.axa or
    /usr/local/etc/axa. 
  Visit the GSP FreeBSD Man Page Interface. Output converted with ManDoc.
 |