1 .\" Copyright (c) 2021, 2022 Omar Polo <op@omarpolo.com>
3 .\" Permission to use, copy, modify, and distribute this software for any
4 .\" purpose with or without fee is hereby granted, provided that the above
5 .\" copyright notice and this permission notice appear in all copies.
7 .\" THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
8 .\" WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
9 .\" MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
10 .\" ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
11 .\" WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
12 .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
13 .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
14 .Dd $Mdocdate: January 30 2022$
19 .Nd simple and secure Gemini server
25 .Op Fl D Ar macro Ns = Ns Ar value
39 is a simple and minimal gemini server that can serve static files,
40 execute CGI scripts and talk to FastCGI applications.
41 It can run without a configuration file with a limited set of features
45 rereads the configuration file when it receives
48 The options are as follows:
51 Specify the configuration file.
52 .It Fl D Ar macro Ns = Ns Ar value
58 Overrides the definition of
60 in the config file if present.
62 Stays and logs on the foreground.
64 Check that the configuration is valid, but don't start the server.
65 If specified two or more time, dump the configuration in addition to
68 Write daemon's pid to the given location.
70 will also act as lock: if another process is holding a lock on that
76 If no configuration file is given,
80 .Pq i.e. runs in the foreground to serve a directory from the shell
81 and looks for the following options
85 .It Fl d Ar certs-path
86 Directory where certificates for the config-less mode are stored.
88 .Pa $XDG_DATA_HOME/gmid ,
90 .Pa ~/.local/share/gmid .
97 Certificates for the given
99 are searched inside the
101 directory given with the
105 .Pa hostname.cert.pem
107 .Pa hostname.key.pem .
108 If a certificate or a key doesn't exist for a given hostname, they
109 will be generated automatically.
111 Print the usage and exit.
113 The port to listen on, by default 1965.
114 .It Fl V , Fl -version
115 Print the version and exit.
120 options increase the verbosity.
125 See the description of the
129 section below to learn how
132 Cannot be provided more than once.
134 The root directory to serve.
135 By default the current working directory is assumed.
137 .Sh CONFIGURATION FILE
138 The configuration file is divided into three sections:
141 User-defined variables may be defined and used later, simplifying the
143 .It Sy Global Options
147 Virtual hosts definition.
150 Within the sections, empty lines are ignored and comments can be put
151 anywhere in the file using a hash mark
153 and extend to the end of the current line.
154 A boolean is either the symbol
158 A string is a sequence of characters wrapped in double quotes,
160 Multiple strings one next to the other are joined into a single
162 .Bd -literal -offset indent
163 # equivalent to "temporary-failure"
164 block return 40 "temporary" "-" "failure"
167 Furthermore, quoting is necessary only when a string needs to contain
169 .Pq like spaces or punctuation ,
170 something that looks like a number or a reserved keyword.
171 The last example could have been written also as:
172 .Bd -literal -offset indent
173 block return 40 temporary "-" failure
176 Strict ordering of the sections is not enforced, so that is possible
177 to mix macros, options and
180 However, defining all the
182 blocks after the macros and the global options is recommended.
184 Newlines are often optional, except around top-level instructions, and
187 can also be optionally used to separate options.
189 Additional configuration files can be included with the
191 keyword, for example:
192 .Bd -literal -offset indent
193 include "/etc/gmid.conf.local"
196 Macros can be defined that will later be expanded in context.
197 Macro names must start with a letter, digit or underscore and may
198 contain any of those characters.
199 Macros names may not be reserved words.
200 Macros are not expanded inside quotes.
202 Two kinds of macros are supported: variable-like and proper macros.
203 When a macro is invoked with a
205 before its name its expanded as a string, whereas when it's invoked
208 its expanded in-place.
211 .Bd -literal -offset indent
213 certdir = "/etc/keys"
214 common = "lang it; auto index on"
217 root $dir "/foo" # -> /var/gemini/foo
218 cert $certdir "/foo.crt" # -> /etc/keys/foo.crt
219 key $certdir "/foo.pem" # -> /etc/keys/foo.pem
225 .It Ic chroot Ar path
227 the process to the given
229 The daemon has to be run with root privileges and thus the option
231 needs to be provided, so privileges can be dropped.
234 will enter the chroot after loading the TLS keys, but before opening
235 the virtual host root directories.
236 It's recommended to keep the TLS keys outside the chroot.
241 Enable or disable IPv6 support, off by default.
242 .It Ic map Ar mime-type Cm to-ext Ar file-extension
247 Both argument are strings.
248 .It Ic port Ar portno
249 The port to listen on.
251 .It Ic prefork Ar number
252 Run the specified number of server processes.
253 This increases the performance and prevents delays when connecting to
255 When not in config-less mode,
257 runs 3 server processes by default.
258 The maximum number allowed is 16.
259 .It Ic protocols Ar string
260 Specify the TLS protocols to enable.
262 .Xr tls_config_parse_protocols 3
263 for the valid protocol string values.
264 By default, both TLSv1.3 and TLSv1.2 are enabled.
267 to enable only TLSv1.3.
268 .It Ic user Ar string
269 Run the daemon as the given user.
272 Every virtual host is defined by a
276 .It Ic server Ar hostname Brq ...
277 Match the server name using shell globbing rules.
278 It can be an explicit name,
279 .Ar www.example.com ,
280 or a name including a wildcards,
284 Followed by a block of options that is enclosed in curly brackets:
287 Specify an additional alias
290 .It Ic auto Ic index Ar bool
291 If no index file is found, automatically generate a directory listing.
293 .It Ic block Op Ic return Ar code Op Ar meta
294 Send a reply and close the connection;
301 .Dq temporary failure .
304 is in the 3x range, then
309 the following special sequences are supported:
310 .Bl -tag -width Ds -compact
312 is replaced with a single
315 is replaced with the request path.
317 is replaced with the query string of the request.
319 is replaced with the server port.
321 is replaced with the server name.
324 Path to the certificate to use for this server.
326 should contain a PEM encoded certificate.
327 This option is mandatory.
333 using shell globbing rules.
334 .It Ic default type Ar string
335 Set the default media type that is used if the media type for a
336 specified extension is not found.
337 If not specified, the
340 .Dq application/octet-stream .
341 .It Ic entrypoint Ar path
342 Handle all the requests for the current virtual host using the
346 relative to the current document root.
347 .It Ic env Ar name Cm = Ar value
348 Set the environment variable
352 when executing CGI scripts.
353 Can be provided more than once.
354 .\" don't document the "spawn <prog>" form because it probably won't
356 .It Ic fastcgi Oo Ic tcp Oc Ar socket Oo Cm port Ar port Oc
359 instead of serving files.
362 can either be a UNIX-domain socket or a TCP socket.
363 If the FastCGI application is listening on a UNIX domain socket,
365 is a local path name within the
371 keyword must be provided and
373 is interpreted as a hostname or an IP address.
375 can be either a port number or the name of a service enclosed in
377 If not specified defaults to 9000.
378 .It Ic index Ar string
379 Set the directory index file.
380 If not specified, it defaults to
383 Specify the private key to use for this server.
385 should contain a PEM encoded private key.
386 This option is mandatory.
387 .It Ic lang Ar string
388 Specify the language tag for the text/gemini content served.
391 parameter will be added in the response.
392 .It Ic location Ar path Brq ...
393 Specify server configuration rules for a specific location.
395 argument will be matched against the request path with shell globbing
397 In case of multiple location statements in the same context, the first
398 matching location will be put into effect and the later ones ignored.
399 Therefore is advisable to match for more specific paths first and for
400 generic ones later on.
403 section may include most of the server configuration rules
405 .Ic alias , Ic cert , Ic cgi , Ic entrypoint , Ic env , Ic key ,
406 .Ic location , Ic param No and Ic proxy .
408 Enable or disable the logging for the current server or location block.
409 .It Ic param Ar name Cm = Ar value
416 Specify an OCSP response to be stapled during TLS handshakes
420 should contain a DER-format OCSP response retrieved from an
424 If the OCSP response in
426 is empty, OCSP stapling will not be used.
427 The default is to not use OCSP stapling.
428 .It Ic proxy Oo Cm proto Ar name Oc Oo Cm for-host Ar host : Ns Oo Ar port Oc Oc Brq ...
429 Set up a reverse proxy.
430 The optional matching rules
434 can be used to enable proxying only for protocols matching
439 and/or whose request IRI matches
443 .Pq 1965 by default .
444 Matching happens using shell globbing rules.
446 In case of multiple matching proxy blocks in the same context, the
447 first matching proxy will be put into effect and the later ones
453 Specify the client certificate to use when making requests.
455 Specify the client certificate key to use when making requests.
456 .It Ic protocols Ar string
457 Specify the TLS protocols allowed when making remote requests.
459 .Xr tls_config_parse_protocols 3
460 function for the valid protocol string values.
461 By default, both TLSv1.2 and TLSv1.3 are enabled.
462 .It Ic relay-to Ar host : Ns Op Ar port
463 Relay the request to the given
468 This is the only mandatory option in a
471 .It Ic require Ic client Ic ca Ar file
472 Allow the proxying only from clients that provide a certificate
473 signed by the CA certificate in
475 .It Ic sni Ar hostname
478 instead of the one extracted from the
480 rule for the TLS handshake with the proxied gemini server.
481 .It Ic use-tls Ar bool
482 Specify whether to use TLS when connecting to the proxied host.
484 .It Ic verifyname Ar bool
485 Enable or disable the TLS server name verification.
488 .It Ic root Ar directory
489 Specify the root directory for this server
490 .Pq alas the current Dq document root .
491 It's relative to the chroot if enabled.
492 .It Ic require Ic client Ic ca Ar path
493 Allow requests only from clients that provide a certificate signed by
494 the CA certificate in
496 It needs to be a PEM-encoded certificate and it's not relative to the
498 .It Ic strip Ar number
501 components from the beginning of the path before doing a lookup in the
503 It's also considered for the
505 parameter in the scope of a
509 When a request for an executable file matches the
511 rule, that file will be executed and its output fed to the client.
513 The CGI scripts are executed in the directory they reside and inherit
516 with these additional variables set:
518 .It Ev GATEWAY_INTERFACE
520 .It Ev GEMINI_DOCUMENT_ROOT
521 The root directory of the virtual host.
522 .It Ev GEMINI_SCRIPT_FILENAME
523 Full path to the CGI script being executed.
525 The full IRI of the request.
526 .It Ev GEMINI_URL_PATH
527 The path of the request.
529 The portion of the requested path that is derived from the the IRI
530 path hierarchy following the part that identifies the script itself.
532 .It Ev PATH_TRANSLATED
533 Present if and only if
536 It represent the translation of the
539 builds this by appending the
541 to the virtual host directory root.
543 The decoded query string.
544 .It Ev REMOTE_ADDR , Ev REMOTE_HOST
545 Textual representation of the client IP.
546 .It Ev REQUEST_METHOD
547 This is present only for RFC3875 (CGI) compliance.
548 It's always set to the empty string.
552 that identifies the current CGI script.
554 The name of the server
556 The port the server is listening on.
557 .It Ev SERVER_PROTOCOL
559 .It Ev SERVER_SOFTWARE
560 The name and version of the server, i.e.
563 The string "Certificate" if the client used a certificate, otherwise
566 The subject of the client certificate if provided, otherwise unset.
567 .It Ev TLS_CLIENT_ISSUER
568 The is the issuer of the client certificate if provided, otherwise
570 .It Ev TLS_CLIENT_HASH
571 The hash of the client certificate if provided, otherwise unset.
575 The TLS version negotiated with the peer.
577 The cipher suite negotiated with the peer.
578 .It Ev TLS_CIPHER_STRENGTH
579 The strength in bits for the symmetric cipher that is being used with
581 .It Ev TLS_CLIENT_NOT_AFTER
582 The time corresponding to the end of the validity period of the peer
583 certificate in the ISO 8601 format
584 .Pq e.g. Dq 2021-02-07T20:17:41Z .
585 .It Ev TLS_CLIENT_NOT_BEFORE
586 The time corresponding to the start of the validity period of the peer
587 certificate in the ISO 8601 format.
591 optionally supports FastCGI.
594 rule must be present in a server or location block.
595 Then, all requests matching that server or location will be handled
596 via the specified FastCGI backend.
598 By default the following variables
600 are sent, and carry the same semantics as with CGI.
601 More parameters can be added with the
639 TLS_CLIENT_NOT_BEFORE
644 To auto-detect the MIME type of the response
646 looks at the file extension and consults its internal table.
647 By default the following mappings are loaded, but they can be
648 overridden or extended using the
650 configuration option.
651 If no MIME is found, the value of
655 will be used, which is
656 .Dq application/octet-stream
659 .Bl -tag -offset indent -width 14m -compact
686 Messages and requests are logged by
690 facility or printed on
693 Requests are logged with the
696 Each request log entry has the following fields, separated by
701 Client IP address and the source port number, separated by a colon
713 Serve the current directory
714 .Bd -literal -offset indent
718 To serve the directory
720 and enable CGI scripts inside
722 .Bd -literal -offset indent
724 $ cat <<EOF > docs/cgi/hello
726 printf "20 text/plain\er\en"
729 $ chmod +x docs/cgi/hello
730 $ gmid -x '/cgi/*' docs
733 An X.509 certificate must be provided to run
735 using a configuration file.
736 First, the RSA certificate is created using a wildcard common name:
737 .Bd -literal -offset indent
738 # openssl genrsa \-out /etc/ssl/private/example.com.key 4096
739 # openssl req \-new \-x509 \e
740 \-key /etc/ssl/private/example.com.key \e
741 \-out /etc/ssl/example.com.crt \e
742 \-days 36500 \-nodes \e
743 \-subj "/CN=example.com"
744 # chmod 600 /etc/ssl/example.com.crt
745 # chmod 600 /etc/ssl/private/example.com.key
748 In the example above, a certificate is valid for one hundred years from
749 the date it was created, which is normal for TOFU.
751 The following is an example of a possible configuration for a site
752 that enables only TLSv1.3, adds a mime type for the file extension
754 and defines two virtual host:
755 .Bd -literal -offset indent
756 ipv6 on # enable ipv6
760 map "application/rtf" to-ext "rtf"
762 server "example.com" {
763 cert "/etc/ssl/example.com.crt"
764 key "/etc/ssl/private/example.com.key"
765 root "/var/gemini/example.com"
768 server "it.example.com" {
769 cert "/etc/ssl/example.com.crt"
770 key "/etc/ssl/private/example.com.key"
771 root "/var/gemini/it.example.com"
773 # enable cgi scripts inside "cgi-bin"
776 # set the language for text/gemini files
781 Yet another example, showing how to enable a
786 .Bd -literal -offset indent
790 server "example.com" {
791 cert "/path/to/cert.pem" # absolute path
792 key "/path/to/key.pem" # also absolute
793 root "/example.com" # relative to the chroot
795 location "/static/*" {
796 # load the following rules only for
797 # requests that matches "/static/*"
807 .Dq Flexible and Economical
808 UTF-8 decoder written by
809 .An Bjoern Hoehrmann .
814 program was written by
815 .An Omar Polo Aq Mt op@omarpolo.com .
819 All the root directories are opened during the daemon startup; if a
820 root directory is deleted and then re-created,
822 won't be able to serve files inside that directory until a restart.
823 This restriction only applies to the root directories and not their
826 a %2F sequence is indistinguishable from a literal slash: this is not
829 a %00 sequence is treated as invalid character and thus rejected.