Mechanically kill hard sentence breaks.

This commit is contained in:
Ruslan Ermilov 2004-07-02 21:28:50 +00:00
parent 248ad594ab
commit c481aa05e8
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=131487
12 changed files with 195 additions and 100 deletions

View file

@ -37,7 +37,8 @@ utility implements a simple BOOTP gateway which can be used to forward
requests and responses between clients on one subnet and a requests and responses between clients on one subnet and a
BOOTP server (i.e.\& BOOTP server (i.e.\&
.Nm ) .Nm )
on another subnet. While either on another subnet.
While either
.Nm .Nm
or or
.Nm bootpgw .Nm bootpgw
@ -61,9 +62,11 @@ This mode of operation is referred to as "inetd mode" and causes
.Nm .Nm
(or (or
.Nm bootpgw ) .Nm bootpgw )
to be started only when a boot request arrives. If it does not to be started only when a boot request arrives.
If it does not
receive another packet within fifteen minutes of the last one receive another packet within fifteen minutes of the last one
it received, it will exit to conserve system resources. The it received, it will exit to conserve system resources.
The
.Fl t .Fl t
option controls this timeout (see OPTIONS). option controls this timeout (see OPTIONS).
.Pp .Pp
@ -124,13 +127,14 @@ or
4 will set the debugging level to 4. 4 will set the debugging level to 4.
For compatibility with older versions of For compatibility with older versions of
.Nm , .Nm ,
omitting the numeric parameter (i.e. just omitting the numeric parameter (i.e., just
.Fl d ) .Fl d )
will simply increment the debug level by one. will simply increment the debug level by one.
.It Fl c Ar chdir-path .It Fl c Ar chdir-path
Set the current directory used by Set the current directory used by
.Nm .Nm
while checking the existence and size of client boot files. This is while checking the existence and size of client boot files.
This is
useful when client boot files are specified as relative pathnames, and useful when client boot files are specified as relative pathnames, and
.Nm .Nm
needs to use the same current directory as the TFTP server needs to use the same current directory as the TFTP server
@ -146,11 +150,13 @@ listens on the IP address corresponding to the machine's hostname, as
returned by returned by
.Xr gethostname 3 . .Xr gethostname 3 .
.It Fl i .It Fl i
Force inetd mode. This option is obsolete, but remains for Force inetd mode.
This option is obsolete, but remains for
compatibility with older versions of compatibility with older versions of
.Nm . .Nm .
.It Fl s .It Fl s
Force standalone mode. This option is obsolete, but remains for Force standalone mode.
This option is obsolete, but remains for
compatibility with older versions of compatibility with older versions of
.Nm . .Nm .
.It Ar bootptab .It Ar bootptab
@ -165,7 +171,8 @@ Specify the name of the file that
will dump its internal database into when it receives a will dump its internal database into when it receives a
SIGUSR1 signal SIGUSR1 signal
.No ( Nm .No ( Nm
only). This option is only recognized if only).
This option is only recognized if
.Nm .Nm
was compiled with the -DDEBUG flag. was compiled with the -DDEBUG flag.
.It Ar server .It Ar server
@ -188,7 +195,8 @@ They differ in their handling of BOOTREQUEST packets.
When When
.Nm bootpgw .Nm bootpgw
is started, it determines the address of a BOOTP server is started, it determines the address of a BOOTP server
whose name is provided as a command line parameter. When whose name is provided as a command line parameter.
When
.Nm bootpgw .Nm bootpgw
receives a BOOTREQUEST packet, it sets the "gateway address" receives a BOOTREQUEST packet, it sets the "gateway address"
and "hop count" fields in the packet and forwards the packet and "hop count" fields in the packet and forwards the packet
@ -201,7 +209,8 @@ When
is started it reads a configuration file, (normally is started it reads a configuration file, (normally
.Pa /etc/bootptab ) .Pa /etc/bootptab )
that initializes the internal database of known clients and client that initializes the internal database of known clients and client
options. This internal database is reloaded options.
This internal database is reloaded
from the configuration file when from the configuration file when
.Nm .Nm
receives a hangup signal (SIGHUP) or when it discovers that the receives a hangup signal (SIGHUP) or when it discovers that the

View file

@ -17,7 +17,8 @@ the Internet Bootstrap Protocol server.
Its format is similar to that of Its format is similar to that of
.Xr termcap 5 .Xr termcap 5
in which two-character case-sensitive tag symbols are used to in which two-character case-sensitive tag symbols are used to
represent host parameters. These parameter declarations are separated by represent host parameters.
These parameter declarations are separated by
colons (:), with a general format of: colons (:), with a general format of:
.Pp .Pp
.Dl "hostname:tg=value. . . :tg=value. . . :tg=value. . . ." .Dl "hostname:tg=value. . . :tg=value. . . :tg=value. . . ."
@ -26,12 +27,15 @@ where
.Em hostname .Em hostname
is the actual name of a bootp client (or a "dummy entry"), and is the actual name of a bootp client (or a "dummy entry"), and
.Em tg .Em tg
is a two-character tag symbol. Dummy entries have an invalid hostname is a two-character tag symbol.
Dummy entries have an invalid hostname
(one with a "." as the first character) and are used to provide (one with a "." as the first character) and are used to provide
default values used by other entries via the default values used by other entries via the
.Em tc=.dummy-entry .Em tc=.dummy-entry
mechanism. Most tags must be followed by an equals-sign mechanism.
and a value as above. Some may also appear in a boolean form with no Most tags must be followed by an equals-sign
and a value as above.
Some may also appear in a boolean form with no
value (i.e.\& value (i.e.\&
.Em :tg: ) . .Em :tg: ) .
The currently recognized tags are: The currently recognized tags are:
@ -105,13 +109,16 @@ There is also a generic tag,
.Pf T Em n , .Pf T Em n ,
where where
.Em n .Em n
is an RFC1084 vendor field tag number. Thus it is possible to immediately is an RFC1084 vendor field tag number.
Thus it is possible to immediately
take advantage of future extensions to RFC1084 without being forced to modify take advantage of future extensions to RFC1084 without being forced to modify
.Nm bootpd .Nm bootpd
first. Generic data may be represented as either a stream of hexadecimal first.
Generic data may be represented as either a stream of hexadecimal
numbers or as a quoted string of numbers or as a quoted string of
.Tn ASCII .Tn ASCII
characters. The length of the generic characters.
The length of the generic
data is automatically determined and inserted into the proper field(s) of the data is automatically determined and inserted into the proper field(s) of the
RFC1084-style bootp reply. RFC1084-style bootp reply.
.Pp .Pp
@ -177,10 +184,12 @@ for Chaos, ARCNET, and AX.25 Amateur Radio networks, respectively.
The The
.Em ha .Em ha
tag takes a hardware address which may be specified as a host name tag takes a hardware address which may be specified as a host name
or in numeric form. Note that the numeric form or in numeric form.
Note that the numeric form
.Em must .Em must
be specified in hexadecimal; optional periods and/or a leading '0x' may be be specified in hexadecimal; optional periods and/or a leading '0x' may be
included for readability. The included for readability.
The
.Em ha .Em ha
tag must be preceded by the tag must be preceded by the
.Em ht .Em ht
@ -196,7 +205,8 @@ will try to determine the hardware address using
The hostname, home directory, and bootfile are The hostname, home directory, and bootfile are
.Tn ASCII .Tn ASCII
strings which may be strings which may be
optionally surrounded by double quotes ("). The client's request and the optionally surrounded by double quotes (").
The client's request and the
values of the values of the
.Em hd .Em hd
and and
@ -258,7 +268,8 @@ use:
The The
.Em sa .Em sa
tag may be used to specify the IP address of the particular TFTP server tag may be used to specify the IP address of the particular TFTP server
you wish the client to use. In the absence of this tag, you wish the client to use.
In the absence of this tag,
.Nm bootpd .Nm bootpd
will tell the client to perform TFTP to the same machine will tell the client to perform TFTP to the same machine
.Nm bootpd .Nm bootpd
@ -269,7 +280,8 @@ The time offset
may be either a signed decimal integer specifying the client's may be either a signed decimal integer specifying the client's
time zone offset in seconds from UTC, or the keyword time zone offset in seconds from UTC, or the keyword
.Em auto .Em auto
which uses the server's time zone offset. Specifying the which uses the server's time zone offset.
Specifying the
.Em to .Em to
symbol as a boolean has the same effect as specifying symbol as a boolean has the same effect as specifying
.Em auto .Em auto
@ -281,7 +293,8 @@ may be either a decimal, octal, or hexadecimal integer specifying the size of
the bootfile in 512-octet blocks, or the keyword the bootfile in 512-octet blocks, or the keyword
.Em auto .Em auto
which causes the server to automatically calculate the bootfile size at each which causes the server to automatically calculate the bootfile size at each
request. As with the time offset, specifying the request.
As with the time offset, specifying the
.Em bs .Em bs
symbol as a boolean has the same effect as specifying symbol as a boolean has the same effect as specifying
.Em auto .Em auto
@ -302,7 +315,8 @@ or
The The
.Em hn .Em hn
tag is strictly a boolean tag; it does not take the usual equals-sign and tag is strictly a boolean tag; it does not take the usual equals-sign and
value. Its presence indicates that the hostname should be sent to RFC1084 value.
Its presence indicates that the hostname should be sent to RFC1084
clients. clients.
.Nm Bootpd .Nm Bootpd
attempts to send the entire hostname as it is specified in the configuration attempts to send the entire hostname as it is specified in the configuration
@ -312,25 +326,30 @@ In no case is an arbitrarily-truncated hostname sent (if nothing reasonable
will fit, nothing is sent). will fit, nothing is sent).
.Pp .Pp
Often, many host entries share common values for certain tags (such as name Often, many host entries share common values for certain tags (such as name
servers, etc.). Rather than repeatedly specifying these tags, a full servers, etc.).
Rather than repeatedly specifying these tags, a full
specification can be listed for one host entry and shared by others via the specification can be listed for one host entry and shared by others via the
.Em tc .Em tc
(table continuation) mechanism. (table continuation) mechanism.
Often, the template entry is a dummy host which doesn't actually exist and Often, the template entry is a dummy host which doesn't actually exist and
never sends bootp requests. This feature is similar to the never sends bootp requests.
This feature is similar to the
.Em tc .Em tc
feature of feature of
.Xr termcap 5 .Xr termcap 5
for similar terminals. Note that for similar terminals.
Note that
.Nm bootpd .Nm bootpd
allows the allows the
.Em tc .Em tc
tag symbol to appear anywhere in the host entry, unlike tag symbol to appear anywhere in the host entry, unlike
.Pa termcap .Pa termcap
which requires it to be the last tag. Information explicitly specified for a which requires it to be the last tag.
Information explicitly specified for a
host always overrides information implied by a host always overrides information implied by a
.Em tc .Em tc
tag symbol, regardless of its location within the entry. The tag symbol, regardless of its location within the entry.
The
value of the value of the
.Em tc .Em tc
tag may be the hostname or IP address of any host entry tag may be the hostname or IP address of any host entry
@ -347,7 +366,8 @@ as in
.Xr termcap 5 . .Xr termcap 5 .
For example, to completely undo an IEN-116 name server specification, use For example, to completely undo an IEN-116 name server specification, use
.Em :ns@: .Em :ns@:
at an appropriate place in the configuration entry. After removal at an appropriate place in the configuration entry.
After removal
with with
.Em @ , .Em @ ,
a tag is eligible to be set again through the a tag is eligible to be set again through the
@ -355,9 +375,12 @@ a tag is eligible to be set again through the
mechanism. mechanism.
.Pp .Pp
Blank lines and lines beginning with "#" are ignored in the configuration Blank lines and lines beginning with "#" are ignored in the configuration
file. Host entries are separated from one another by newlines; a single host file.
Host entries are separated from one another by newlines; a single host
entry may be extended over multiple lines if the lines end with a backslash entry may be extended over multiple lines if the lines end with a backslash
(\\). It is also acceptable for lines to be longer than 80 characters. Tags (\\).
It is also acceptable for lines to be longer than 80 characters.
Tags
may appear in any order, with the following exceptions: the hostname must be may appear in any order, with the following exceptions: the hostname must be
the very first field in an entry, and the hardware type must precede the the very first field in an entry, and the hardware type must precede the
hardware address. hardware address.

View file

@ -79,7 +79,7 @@ The
.Nm .Nm
utility closes its connections as soon as the output is finished. utility closes its connections as soon as the output is finished.
.Pp .Pp
If the line is null (i.e. just a If the line is null (i.e., just a
.Aq Tn CRLF .Aq Tn CRLF
is sent) then is sent) then
.Xr finger 1 .Xr finger 1

View file

@ -53,7 +53,8 @@ The
.Nm .Nm
utility is the utility is the
Internet File Transfer Protocol Internet File Transfer Protocol
server process. The server uses the server process.
The server uses the
.Tn TCP .Tn TCP
protocol protocol
and listens at the port specified with the and listens at the port specified with the
@ -223,13 +224,16 @@ If the file
.Pa /etc/ftpmotd .Pa /etc/ftpmotd
exists, exists,
.Nm .Nm
prints it after a successful login. Note the motd file used is the one prints it after a successful login.
relative to the login environment. This means the one in Note the motd file used is the one
relative to the login environment.
This means the one in
.Pa ~ftp/etc .Pa ~ftp/etc
in the anonymous user's case. in the anonymous user's case.
.Pp .Pp
The ftp server currently supports the following ftp requests. The ftp server currently supports the following ftp requests.
The case of the requests is ignored. Requests marked [RW] are The case of the requests is ignored.
Requests marked [RW] are
disabled if disabled if
.Fl r .Fl r
is specified. is specified.
@ -360,7 +364,7 @@ The user must have a standard shell returned by
If the user name appears in the file If the user name appears in the file
.Pa /etc/ftpchroot , .Pa /etc/ftpchroot ,
or the user is a member of a group with a group entry in this file, or the user is a member of a group with a group entry in this file,
i.e. one prefixed with i.e., one prefixed with
.Ql \&@ , .Ql \&@ ,
the session's root will be changed to the directory specified the session's root will be changed to the directory specified
in this file or to the user's login directory by in this file or to the user's login directory by
@ -508,7 +512,8 @@ The
utility has internal support for handling remote requests to list utility has internal support for handling remote requests to list
files, and will not execute files, and will not execute
.Pa /bin/ls .Pa /bin/ls
in either a chrooted or non-chrooted environment. The in either a chrooted or non-chrooted environment.
The
.Pa ~/bin/ls .Pa ~/bin/ls
executable need not be placed into the chrooted tree, nor need the executable need not be placed into the chrooted tree, nor need the
.Pa ~/bin .Pa ~/bin
@ -543,9 +548,11 @@ Default place for session logs.
.Xr syslogd 8 .Xr syslogd 8
.Sh BUGS .Sh BUGS
The server must run as the super-user The server must run as the super-user
to create sockets with privileged port numbers. It maintains to create sockets with privileged port numbers.
It maintains
an effective user id of the logged in user, reverting to an effective user id of the logged in user, reverting to
the super-user only when binding addresses to sockets. The the super-user only when binding addresses to sockets.
The
possible security holes have been extensively possible security holes have been extensively
scrutinized, but are possibly incomplete. scrutinized, but are possibly incomplete.
.Sh HISTORY .Sh HISTORY

View file

@ -119,7 +119,7 @@ utility logs status and error messages via
A startup message is always logged, and in the case of fatal errors (or A startup message is always logged, and in the case of fatal errors (or
deadly signals) a message is logged announcing the server's termination. deadly signals) a message is logged announcing the server's termination.
In general, a non-fatal error is handled by ignoring the event that caused In general, a non-fatal error is handled by ignoring the event that caused
it (e.g. an invalid Ethernet address in the config file causes that line it (e.g.\& an invalid Ethernet address in the config file causes that line
to be invalidated). to be invalidated).
.Pp .Pp
The following signals have the specified effect when sent to the server The following signals have the specified effect when sent to the server

View file

@ -50,22 +50,26 @@ utility processes the contents of a file in
.Xr netgroup 5 .Xr netgroup 5
format into what is called format into what is called
.Pa reverse netgroup .Pa reverse netgroup
form. That is, where the original file shows form.
That is, where the original file shows
netgroup memberships in terms of which members reside in a particular netgroup memberships in terms of which members reside in a particular
group, the reverse netgroup format specifies what groups are associated group, the reverse netgroup format specifies what groups are associated
with a particular member. This information is used to generate the with a particular member.
This information is used to generate the
.Pa netgroup.byuser .Pa netgroup.byuser
and and
.Pa netgroup.byhosts .Pa netgroup.byhosts
.Tn NIS .Tn NIS
maps. These reverse netgroup maps are used to help speed up maps.
These reverse netgroup maps are used to help speed up
netgroup lookups, particularly for the netgroup lookups, particularly for the
.Fn innetgr .Fn innetgr
library function. library function.
.Pp .Pp
For example, the standard For example, the standard
.Pa /etc/netgroup .Pa /etc/netgroup
file may list a netgroup and a list of its members. Here, the file may list a netgroup and a list of its members.
Here, the
netgroup is considered the netgroup is considered the
.Em key .Em key
and the member names are the and the member names are the
@ -74,7 +78,8 @@ By contrast, the reverse
.Pa netgroup.byusers .Pa netgroup.byusers
database lists each unique database lists each unique
member as the key and the netgroups to which the members belong become member as the key and the netgroups to which the members belong become
the data. Separate databases are created to hold information pertaining the data.
Separate databases are created to hold information pertaining
to users and hosts; this allows netgroup username lookups to users and hosts; this allows netgroup username lookups
and netgroup hostname lookups to be performed using independent keyspaces. and netgroup hostname lookups to be performed using independent keyspaces.
.Pp .Pp
@ -83,13 +88,15 @@ By constructing these reverse netgroup databases (and the corresponding
maps) in advance, the maps) in advance, the
.Xr getnetgrent 3 .Xr getnetgrent 3
library functions are spared from having to work out the dependencies library functions are spared from having to work out the dependencies
themselves on the fly. This is important on networks with large numbers themselves on the fly.
This is important on networks with large numbers
of users and hosts, since it can take a considerable amount of time of users and hosts, since it can take a considerable amount of time
to process very large netgroup databases. to process very large netgroup databases.
.Pp .Pp
The The
.Nm .Nm
utility prints its results on the standard output. It is usually called utility prints its results on the standard output.
It is usually called
only by only by
.Pa /var/yp/Makefile .Pa /var/yp/Makefile
when rebuilding the when rebuilding the
@ -109,7 +116,8 @@ original netgroup file is processed.
Generate Generate
.Pa netgroup.byhost .Pa netgroup.byhost
output; only hostname information in the output; only hostname information in the
original netgroup file is processed. (Note at least one of the original netgroup file is processed.
(Note at least one of the
.Fl u .Fl u
or or
.Fl h .Fl h
@ -119,9 +127,11 @@ The
.Nm .Nm
utility uses utility uses
.Pa /etc/netgroup .Pa /etc/netgroup
as its default input file. The as its default input file.
The
.Fl f .Fl f
flag allows the user to specify an alternate input file. Specifying ``-'' flag allows the user to specify an alternate input file.
Specifying ``-''
as the input file causes as the input file causes
.Nm .Nm
to read from the standard input. to read from the standard input.
@ -137,7 +147,8 @@ to build the
.Tn NIS .Tn NIS
databases databases
.It Pa /etc/netgroup .It Pa /etc/netgroup
the default netgroup database file. This file is most often found the default netgroup database file.
This file is most often found
only on the only on the
.Tn NIS .Tn NIS
master server master server

View file

@ -46,7 +46,8 @@ The
.Nm .Nm
utility is the server for the utility is the server for the
.Xr rexec 3 .Xr rexec 3
routine. The server provides remote execution facilities routine.
The server provides remote execution facilities
with authentication based on user names and with authentication based on user names and
passwords. passwords.
.Pp .Pp
@ -62,7 +63,8 @@ is initiated:
The server reads characters from the socket up The server reads characters from the socket up
to a NUL to a NUL
.Pq Ql \e0 .Pq Ql \e0
byte. The resultant string is byte.
The resultant string is
interpreted as an interpreted as an
.Tn ASCII .Tn ASCII
number, base 10. number, base 10.
@ -81,7 +83,8 @@ A NUL terminated, unencrypted password of at most
16 characters is retrieved on the initial socket. 16 characters is retrieved on the initial socket.
.It .It
A NUL terminated command to be passed to a A NUL terminated command to be passed to a
shell is retrieved on the initial socket. The length of shell is retrieved on the initial socket.
The length of
the command is limited by the upper bound on the size of the command is limited by the upper bound on the size of
the system's argument list. the system's argument list.
.It .It
@ -96,7 +99,8 @@ aborted with a diagnostic message returned.
.It .It
A NUL byte is returned on the initial socket A NUL byte is returned on the initial socket
and the command line is passed to the normal login and the command line is passed to the normal login
shell of the user. The shell of the user.
The
shell inherits the network connections established shell inherits the network connections established
by by
.Nm . .Nm .

View file

@ -46,14 +46,16 @@ The
.Nm .Nm
utility is the server for the utility is the server for the
.Xr rlogin 1 .Xr rlogin 1
program. The server provides a remote login facility program.
The server provides a remote login facility
with authentication based on privileged port numbers from trusted hosts. with authentication based on privileged port numbers from trusted hosts.
.Pp .Pp
Options supported by Options supported by
.Nm : .Nm :
.Bl -tag -width indent .Bl -tag -width indent
.It Fl D .It Fl D
Set TCP_NODELAY socket option. This improves responsiveness at the expense of Set TCP_NODELAY socket option.
This improves responsiveness at the expense of
some additional network traffic. some additional network traffic.
.It Fl a .It Fl a
Ask hostname for verification. Ask hostname for verification.
@ -75,7 +77,8 @@ Enable vacuous mode.
Enable Enable
.Tn DES .Tn DES
encryption for all data passed via the rlogin encryption for all data passed via the rlogin
session. This may impact response time session.
This may impact response time
and and
.Tn CPU .Tn CPU
utilization, but provides increased security. utilization, but provides increased security.
@ -139,13 +142,15 @@ The parent of the login process manipulates the master side of
the pseudo terminal, operating as an intermediary the pseudo terminal, operating as an intermediary
between the login process and the client instance of the between the login process and the client instance of the
.Xr rlogin 1 .Xr rlogin 1
program. In normal operation, the packet protocol described program.
In normal operation, the packet protocol described
in in
.Xr pty 4 .Xr pty 4
is invoked to provide is invoked to provide
.Ql ^S/^Q .Ql ^S/^Q
type facilities and propagate type facilities and propagate
interrupt signals to the remote programs. The login process interrupt signals to the remote programs.
The login process
propagates the client terminal's baud rate and terminal type, propagates the client terminal's baud rate and terminal type,
as found in the environment variable, as found in the environment variable,
.Ev TERM ; .Ev TERM ;
@ -190,7 +195,8 @@ by the server failed.
.El .El
.Sh BUGS .Sh BUGS
The authentication procedure used here assumes the integrity The authentication procedure used here assumes the integrity
of each client machine and the connecting medium. This is of each client machine and the connecting medium.
This is
insecure, but is useful in an insecure, but is useful in an
.Dq open .Dq open
environment. environment.

View file

@ -46,7 +46,8 @@
The The
.Nm .Nm
utility is a server which will send a message to users utility is a server which will send a message to users
currently logged in to the system. This server currently logged in to the system.
This server
invokes the invokes the
.Xr wall 1 .Xr wall 1
command to actually write the messages to the command to actually write the messages to the
@ -55,7 +56,8 @@ system.
The following option is available: The following option is available:
.Bl -tag -width indent .Bl -tag -width indent
.It Fl n .It Fl n
Do not become a daemon. This option is only available when Do not become a daemon.
This option is only available when
.Nm .Nm
is not invoked by is not invoked by
.Xr inetd 8 . .Xr inetd 8 .

View file

@ -49,7 +49,8 @@ is the server for the
.Xr rcmd 3 .Xr rcmd 3
routine and, consequently, for the routine and, consequently, for the
.Xr rsh 1 .Xr rsh 1
utility. The server provides remote execution facilities utility.
The server provides remote execution facilities
with authentication based on privileged port numbers from trusted hosts. with authentication based on privileged port numbers from trusted hosts.
.Pp .Pp
The The
@ -70,7 +71,8 @@ aborts the connection.
The server reads characters from the socket up The server reads characters from the socket up
to a to a
.Tn NUL .Tn NUL
(`\e0') byte. The resultant string is (`\e0') byte.
The resultant string is
interpreted as an interpreted as an
.Tn ASCII .Tn ASCII
number, base 10. number, base 10.
@ -80,7 +82,8 @@ it is interpreted as the port number of a secondary
stream to be used for the stream to be used for the
.Em stderr . .Em stderr .
A second connection is then created to the specified A second connection is then created to the specified
port on the client's machine. The source port of this port on the client's machine.
The source port of this
second connection is also in the range 512-1023. second connection is also in the range 512-1023.
.It .It
The server checks the client's source address The server checks the client's source address
@ -94,19 +97,22 @@ not match after verification,
the dot-notation representation of the host address is used. the dot-notation representation of the host address is used.
.It .It
A null terminated user name of at most 16 characters A null terminated user name of at most 16 characters
is retrieved on the initial socket. This user name is retrieved on the initial socket.
This user name
is interpreted as the user identity on the is interpreted as the user identity on the
.Em client Ns 's .Em client Ns 's
machine. machine.
.It .It
A null terminated user name of at most 16 characters A null terminated user name of at most 16 characters
is retrieved on the initial socket. This user name is retrieved on the initial socket.
This user name
is interpreted as a user identity to use on the is interpreted as a user identity to use on the
.Em server Ns 's .Em server Ns 's
machine. machine.
.It .It
A null terminated command to be passed to a A null terminated command to be passed to a
shell is retrieved on the initial socket. The length of shell is retrieved on the initial socket.
The length of
the command is limited by the upper bound on the size of the command is limited by the upper bound on the size of
the system's argument list. the system's argument list.
.It .It
@ -118,7 +124,8 @@ which uses the file
.Pa /etc/hosts.equiv .Pa /etc/hosts.equiv
and the and the
.Pa .rhosts .Pa .rhosts
file found in the user's home directory. The file found in the user's home directory.
The
.Fl l .Fl l
option prevents option prevents
.Xr ruserok 3 .Xr ruserok 3
@ -131,7 +138,8 @@ A
.Tn NUL .Tn NUL
byte is returned on the initial socket byte is returned on the initial socket
and the command line is passed to the normal login and the command line is passed to the normal login
shell of the user. The shell of the user.
The
shell inherits the network connections established shell inherits the network connections established
by by
.Nm . .Nm .
@ -158,7 +166,8 @@ Do not use the user's
.Pa .rhosts .Pa .rhosts
file for authentication, unless the user is the superuser. file for authentication, unless the user is the superuser.
.It Fl n .It Fl n
Turn off transport level keepalive messages. This will prevent sessions Turn off transport level keepalive messages.
This will prevent sessions
from timing out if the client crashes or becomes unreachable. from timing out if the client crashes or becomes unreachable.
.El .El
.Sh DIAGNOSTICS .Sh DIAGNOSTICS
@ -201,7 +210,8 @@ A
.Xr fork 2 .Xr fork 2
by the server failed. by the server failed.
.It Sy <shellname>: ... .It Sy <shellname>: ...
The user's login shell could not be started. This message is returned The user's login shell could not be started.
This message is returned
on the connection associated with the on the connection associated with the
.Em stderr , .Em stderr ,
and is not preceded by a flag byte. and is not preceded by a flag byte.
@ -239,7 +249,8 @@ are not supported.
.El .El
.Sh BUGS .Sh BUGS
The authentication procedure used here assumes the integrity The authentication procedure used here assumes the integrity
of each client machine and the connecting medium. This is of each client machine and the connecting medium.
This is
insecure, but is useful in an insecure, but is useful in an
.Dq open .Dq open
environment. environment.

View file

@ -39,7 +39,8 @@
.Nm .Nm
is a self-contained, position independent program image providing run-time is a self-contained, position independent program image providing run-time
support for loading and link-editing shared objects into a process' support for loading and link-editing shared objects into a process'
address space. It uses the data structures address space.
It uses the data structures
(see (see
.Xr link 5 ) .Xr link 5 )
contained within dynamically linked programs to determine which shared contained within dynamically linked programs to determine which shared
@ -51,7 +52,8 @@ system call.
After all shared libraries have been successfully loaded, After all shared libraries have been successfully loaded,
.Nm .Nm
proceeds to resolve external references from both the main program and proceeds to resolve external references from both the main program and
all objects loaded. A mechanism is provided for initialization routines all objects loaded.
A mechanism is provided for initialization routines
to be called, on a per-object basis, giving a shared object an opportunity to be called, on a per-object basis, giving a shared object an opportunity
to perform any extra set-up, before execution of the program proper begins. to perform any extra set-up, before execution of the program proper begins.
This is useful for C++ libraries that contain static constructors. This is useful for C++ libraries that contain static constructors.
@ -66,7 +68,8 @@ process,
.Em crt0 .Em crt0
uses the special symbol uses the special symbol
.Va _DYNAMIC .Va _DYNAMIC
to determine whether a program is in fact dynamically linked or not. Whenever to determine whether a program is in fact dynamically linked or not.
Whenever
the linker the linker
.Xr ld 1 .Xr ld 1
has relocated this symbol to a location other than 0, has relocated this symbol to a location other than 0,
@ -82,7 +85,8 @@ passes control to
.Nm Ns 's .Nm Ns 's
entry point before the program's entry point before the program's
.Fn main .Fn main
routine is called. Thus, routine is called.
Thus,
.Nm .Nm
can complete the link-editing process before the dynamic program calls upon can complete the link-editing process before the dynamic program calls upon
services of any dynamic library. services of any dynamic library.
@ -108,7 +112,8 @@ for shared libraries.
This is ignored for set-user-ID and set-group-ID programs. This is ignored for set-user-ID and set-group-ID programs.
.It Ev LD_PRELOAD .It Ev LD_PRELOAD
A colon separated list of shared libraries, to be linked in before any A colon separated list of shared libraries, to be linked in before any
other shared libraries. If the directory is not specified then other shared libraries.
If the directory is not specified then
the directories specified by LD_LIBRARY_PATH will be searched first the directories specified by LD_LIBRARY_PATH will be searched first
followed by the set of built-in standard directories. followed by the set of built-in standard directories.
This is ignored for set-user-ID and set-group-ID programs. This is ignored for set-user-ID and set-group-ID programs.
@ -116,7 +121,8 @@ This is ignored for set-user-ID and set-group-ID programs.
When set to a nonempty string, causes When set to a nonempty string, causes
.Nm .Nm
to relocate all external function calls before starting execution of the to relocate all external function calls before starting execution of the
program. Normally, function calls are bound lazily, at the first call program.
Normally, function calls are bound lazily, at the first call
of each function. of each function.
.Ev LD_BIND_NOW .Ev LD_BIND_NOW
increases the start-up time of a program, but it avoids run-time increases the start-up time of a program, but it avoids run-time
@ -124,10 +130,12 @@ surprises caused by unexpectedly undefined functions.
.It Ev LD_WARN_NON_PURE_CODE .It Ev LD_WARN_NON_PURE_CODE
When set to a nonempty string, issue a warning whenever a link-editing When set to a nonempty string, issue a warning whenever a link-editing
operation requires modification of the text segment of some loaded operation requires modification of the text segment of some loaded
object. This is usually indicative of an incorrectly built library. object.
This is usually indicative of an incorrectly built library.
.It Ev LD_SUPPRESS_WARNINGS .It Ev LD_SUPPRESS_WARNINGS
When set to a nonempty string, no warning messages of any kind are When set to a nonempty string, no warning messages of any kind are
issued. Normally, a warning is given if satisfactorily versioned issued.
Normally, a warning is given if satisfactorily versioned
library could not be found. library could not be found.
.It Ev LD_IGNORE_MISSING_OBJECTS .It Ev LD_IGNORE_MISSING_OBJECTS
When set to a nonempty string, makes it a nonfatal condition if When set to a nonempty string, makes it a nonfatal condition if

View file

@ -57,7 +57,8 @@ from one
.Tn NIS .Tn NIS
server to another using server to another using
.Tn NIS .Tn NIS
services. In services.
In
.Fx , .Fx ,
.Nm .Nm
is generally invoked by is generally invoked by
@ -68,7 +69,8 @@ The
.Nm .Nm
utility is used primarily in environments where several utility is used primarily in environments where several
.Tn NIS .Tn NIS
servers are in use in a single domain. One server, the servers are in use in a single domain.
One server, the
.Tn NIS .Tn NIS
master, maintains master, maintains
the canonical copies of all the canonical copies of all
@ -77,7 +79,7 @@ maps, and all the other servers,
the the
.Tn NIS .Tn NIS
slaves, copy new versions of the maps from the master whenever slaves, copy new versions of the maps from the master whenever
any updates are made (i.e. when a user updates their password via any updates are made (i.e., when a user updates their password via
.Xr yppasswd 1 ) . .Xr yppasswd 1 ) .
.Pp .Pp
When run, When run,
@ -92,7 +94,8 @@ When the entire map has been transfered,
.Nm .Nm
deletes the original copy of deletes the original copy of
.Ar mapname .Ar mapname
and moves the temporary copy into its place. When the transfer is and moves the temporary copy into its place.
When the transfer is
complete, complete,
.Nm .Nm
will attempt to send a 'clear current map' request to the local will attempt to send a 'clear current map' request to the local
@ -102,7 +105,8 @@ stale map.
.Pp .Pp
Note that all files created by Note that all files created by
.Nm .Nm
are owner readable and writable only for security reasons. Since the are owner readable and writable only for security reasons.
Since the
.Tn NIS .Tn NIS
maps and the directory in which they reside are normally owned by maps and the directory in which they reside are normally owned by
root, this prevents non-privileged users from making unauthorized root, this prevents non-privileged users from making unauthorized
@ -114,14 +118,16 @@ servers,
.Nm .Nm
can be run periodically in a can be run periodically in a
.Xr cron 8 .Xr cron 8
job. Maps which change infrequently job.
Maps which change infrequently
need only be updated once a day (preferably late at night when system need only be updated once a day (preferably late at night when system
usage is lowest), whereas those that are subject to frequent changes usage is lowest), whereas those that are subject to frequent changes
(such a (such a
.Pa passwd.byname .Pa passwd.byname
and and
.Pa passwd.byuid ) .Pa passwd.byuid )
should be updated perhaps once every hour. Using should be updated perhaps once every hour.
Using
.Xr cron 8 .Xr cron 8
to automatically to automatically
update the update the
@ -140,7 +146,7 @@ servers to fall out of sync with each other.
.Pp .Pp
When When
.Nm .Nm
is invoked without a controlling terminal, e.g. from inside is invoked without a controlling terminal, e.g.\& from inside
.Xr ypserv 8 , .Xr ypserv 8 ,
it logs all its output using the it logs all its output using the
.Xr syslog 3 .Xr syslog 3
@ -154,20 +160,23 @@ has support for a special map transfer protocol which works in
conjunction with the conjunction with the
.Fx .Fx
.Xr rpc.ypxfrd 8 .Xr rpc.ypxfrd 8
server. This protocol allows it to transfer raw map database files from server.
This protocol allows it to transfer raw map database files from
the the
.Tn NIS .Tn NIS
master server and can be many times faster than the standard master server and can be many times faster than the standard
transfer method, particularly for very large transfer method, particularly for very large
.Tn NIS .Tn NIS
maps. The maps.
The
.Nm .Nm
utility will check to see if the utility will check to see if the
.Xr rpc.ypxfrd 8 .Xr rpc.ypxfrd 8
server is registered on the server is registered on the
.Tn NIS .Tn NIS
master server and attempt to use master server and attempt to use
it if it is present. If it isn't it will fall back to the standard it if it is present.
If it isn't it will fall back to the standard
transfer method, copying the map contents from transfer method, copying the map contents from
.Xr ypserv 8 .Xr ypserv 8
and creating new maps instead. and creating new maps instead.
@ -193,7 +202,8 @@ The following options and flags are supported by
.Nm : .Nm :
.Bl -tag -width indent .Bl -tag -width indent
.It Fl f .It Fl f
Force a map transfer. Normally, Force a map transfer.
Normally,
.Nm .Nm
will not transfer a map if it determines that the will not transfer a map if it determines that the
.Tn NIS .Tn NIS
@ -204,7 +214,8 @@ flag forces a transfer regardless of which server's version is more recent.
.It Fl c .It Fl c
Do not send a 'clear current map' request to the Do not send a 'clear current map' request to the
.Xr ypserv 8 .Xr ypserv 8
process running on the local host. This flag is normally used when process running on the local host.
This flag is normally used when
invoking invoking
.Nm .Nm
manually on a machine that is not yet running manually on a machine that is not yet running
@ -221,7 +232,8 @@ domain.
.It Fl h Ar source host .It Fl h Ar source host
Specify the name of the host from which to copy the Specify the name of the host from which to copy the
.Tn NIS .Tn NIS
maps. This option maps.
This option
is used to insure that is used to insure that
.Nm .Nm
only copies maps from the only copies maps from the
@ -235,7 +247,8 @@ domains.
.It Fl p Ar path .It Fl p Ar path
Specify the top level directory containing the Specify the top level directory containing the
.Tn NIS .Tn NIS
maps. By maps.
By
default, this path is default, this path is
.Pa /var/yp . .Pa /var/yp .
The The
@ -243,7 +256,8 @@ The
flag allows you to specify an alternate path should you wish to flag allows you to specify an alternate path should you wish to
store your store your
.Tn NIS .Tn NIS
maps in a different part of the file system. The maps in a different part of the file system.
The
.Tn NIS .Tn NIS
server, server,
.Xr ypserv 8 , .Xr ypserv 8 ,