Gnu Inetutils: Alain Magloire Et Al
Gnu Inetutils: Alain Magloire Et Al
Short Contents
1
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Common options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
4
5
8
9
ii
Table of Contents
1
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Common options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2.1
Exit status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
iii
10
10.1
10.2
10.3
10.4
10.5
10.6
10.7
11
Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
18.1
18.2
18.3
18.4
18.5
18.6
19
17.1
18
Invoking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
16.1
17
15.1
16
14.1
14.2
15
13.1
13.2
13.3
14
12.1
13
17
18
26
26
26
27
27
11.1
12
Invocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuration file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Built-in services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
TCPMUX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Inetd Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Error Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
42
42
44
45
45
46
19.1
Configuration file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
iv
20
20.1
20.2
20.3
20.4
21
Invoking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Modus operandi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Access control in talkd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
26.1
26.2
27
Invoking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
25.1
26
60
61
61
62
24.1
24.2
24.3
25
Invoking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Kerberos specific details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Protocol details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
23.1
23.2
24
Invoking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
22.1
22.2
22.3
22.4
23
54
56
56
57
21.1
21.2
22
Standards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuration files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
File format of ftpusers and ftpchroot. . . . . . . . . . . . . . . . . . . . . . . . .
Directory prefixes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Use cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
27.1
27.2
Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Authentication steps. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Chapter 1: Introduction
1 Introduction
The GNU Network Utilities is a distribution of common networking utilities and servers,
including for example ping, traceroute and ftp.
This manual is a work in progress: many sections make no attempt to explain basic
concepts in a way suitable for novices. Thus, if you are interested, please get involved in
improving this manual. The entire gnu community will benefit.
Please report bugs to [email protected]. Remember to include the version number, machine architecture, input files, and any other information needed to reproduce the
bug: your input, what you expected, what you got, and why it is wrong. Diffs are welcome,
but please include a description of the problem as well, since this is sometimes difficult to
infer.
The individual utilities were originally derived from the 4.4BSDLite2 distribution, although some of them have more or less been rewritten. What you are reading now is
the authoritative and complete documentation for these utilities; the man pages are now
automatically generated.
Many features were integrated from NetBSD, OpenBSD, FreeBSD and GNU/Linux, the
merges were done by a group of dedicated hackers (in no particular order): Jeff Bailey, Marcus Brinkmann, Michael Vogt, Bernhard Rosenkraenzer, Kaveh R. Ghazi, NIIBE Yutaka,
Nathan Neulinger, Jeff Smith, Dan Stromberg, David OShea, Frederic Goudal, Gerald
Combs, Joachim Gabler, Marco DItri, Sergey Poznyakoff, and many more.
2 Common options
Certain options are available in all these programs. Rather than writing identical descriptions for each of the programs, they are described here. (In fact, every gnu program accepts,
or should accept, these options.)
Many of these programs take arbitrary strings as arguments. In those cases, --help and
--version are taken as these options only if there is one and exactly one command line
argument.
--help
Print a usage message, listing all available options, then exit successfully.
--usage
Print a condensed usage message, displaying all available options formatted like
a command line call, then exit successfully.
--version
Print the version number, then exit successfully.
--
Delimit the option list. Later arguments, if any, are treated as operands even
if they begin with -.
-f
--fqdn
--long
-F file
--file=file
Set host name or NIS domain name from FILE.
-i
--ip-addresses
Get addresses for the host name.
-s
--short
-y
--yp
--nis
Use IPv4 as transport when logging to a host. The default behaviour is to use
whatever IP version that matches the host.
Use IPv6 as transport when logging to a host. The option is present also on
systems without support for IPv6, but will then issue a warning and then fall
back to IPv4 when delivering the message.
Both options are most influencial when the target host is named using a symbolic name, but numerical addresses for host or source must also match if either
of --ipv4 or --ipv6 is stated.
-f file
--file=file
Log the content of the specified file. If file is - then standard input is assumed.
-h host
--host=host
Send messages to the given host or socket. The host argument can be either a
local UNIX socket name (containing a slash /), or be of the form
host[:port]
where host is the remote host name or IP address, and the optional port is a
decimal port number or symbolic service name from /etc/services. If port is
not specified, the port number corresponding to the syslog service is used. If
a numerical IPv6 address is given without a port specification, then the address
must be enclosed within brackets (like [::1]).
-i[pid]
--id=[pid]
Add process ID to each message. If pid is not supplied, use the process ID of the
logger process with each line. Notice, that pid is an optional argument. When
supplied to the -i option, it must follow the i letter immediately, without any
separating whitespace. When supplied to the --id form, it must be separated
from it by exactly one equals sign.
-p priority
--priority=priority
Enter the message with the specified priority. The priority may be specified
numerically or as a facility.level pair. For example, -p local3.info logs
the message at the informational level in the local3 facility. The default is
user.notice.
The actual list of supported facilities and levels is system specific.
-s
--stderr
-S addr
--source=addr
Supply the source IP address for INET connections. This option is useful in
conjunction with --host (see above). The kind of address specified here (IPv4
or IPv6) will propagate to influence the resolution of the host address, if it is a
symbolic name.
-t tag
--tag=tag
Mark every line in the log with the specified tag.
-u socket
--unix=socket
Send messages to the given local UNIX socket. The socket argument can be
either an absolute path (starting with a slash /), or a relative path understood
relative to the current working directory.
The options are followed by the message which should be written to the log. If not
specified, and the -f flag is not provided, standard input is logged.
5.2 Examples
The following examples illustrate the usage of the logger command:
1. Log the message System rebooted to the local syslog. Use default facility and priority:
logger System rebooted
2. Run command and send its error output to the channel local0.err. Mark each
message with tag cmd:
command 2>&1 | logger -p local0.err -t cmd
3. Log each line from file warnings to channel daemon.warn on host
logger.runasimi.org, using the source IP 10.10.10.1:
logger -p daemon.warn -h logger.runasimi.org -S 10.10.10.1 \
--file warnings
--mask
Identical to --address.
--timestamp
Send ICMP TIMESTAMP packets, thereby requesting a timed response from
the targetted host.
In successful cases three time values are returned. All are expected to state the
number of milliseconds since midnight UTC. The first of these, icmp_otime,
contains the original time of sending the request. Then comes icmp_rtime,
the time of reception by the target, and finally, icmp_ttime, the time of
transmitting an answer back to the originator.
-t type
--type=type
Send type packets.
timestamp.
-i n
--interval=n
Wait n seconds until sending next packet. The default is to wait for one second
between packets. This option is incompatible with the option -f.
-n
--numeric
Numeric output only. No attempt will be made to resolve symbolic names for
host addresses.
-r
--ignore-routing
Bypass the normal routing tables and send directly to a host on an attached
network. If the host is not on a directly attached network, an error is returned.
This option can be used to ping a local host through an interface that has no
route through it (e.g., after the interface was dropped by routed).
-T num
--tos=num
Set type-of-service, TOS field, to num on transmitted packets.
--ttl=n
-v
--verbose
Produce more verbose output, giving more statistics.
-w n
--timeout=n
Stop after n seconds.
-W n
--linger=n
Maximum number of seconds n to wait for a response.
Finally, these last options are relevant only for sending echo requests, allowing many
variations in order to detect various peculiarities of the targeted host, or the intermediary
routers for that matter.
-f
--flood
Flood ping. Outputs packets as fast as they come back or one hundred times per
second, whichever is more. For every ECHO REQUEST packet sent, a period
. is printed, while for every ECHO REPLY received in reply, a backspace is
printed. This provides a rapid display of how many packets are being dropped.
Only the super-user may use this option. This can be very hard on a network
and should be used with caution.
--ip-timestamp=flag
Include IP option Timestamp in transmitted packets. The value flag is either
tsonly, which only records up to nine time stamps, or tsaddr, which records
IP addresses as well as time stamps, but for at most four hosts.
-l n
--preload=n
If n is specified, ping sends that many packets as fast as possible before falling
into its normal mode of operation.
-p pat
--pattern=pat
You may specify up to 16 pad bytes to fill out the packet you send. This is
useful for diagnosing data-dependent problems in a network. For example, -p
ff will cause the sent packet to be filled with all ones.
-q
--quiet
-R
--route
-s n
--size=n
10
This means that if you have a data-dependent problem you will probably have to do a
lot of testing to find it. If you are lucky, you may manage to find a file that either cant
be sent across your network or that takes much longer to transfer than other similar length
files. You can then examine this file for repeated patterns that you can test using the -p
option of ping.
11
--hoplimit=n
Limit maximal distance to n. Acceptable values are 1 to 255, inclusive.
-i n
--interval=n
Wait n seconds until sending next packet. The default is to wait for one second
between packets. This option is incompatible with the option -f.
-l n
--preload=n
Sends n packets as fast as possible before falling back to the normal mode of
operation.
12
-n
--numeric
Numeric output only. No attempt will be made to resolve symbolic names for
host addresses.
-p pattern
--pattern=pattern
Up to 16 hexadecimal pad bytes are given as pattern. These are use for filling
out the packets you send. This option is useful for diagnosing data-dependent
problems within a network. As an example, -p ff will cause the sent packets
to have payloads with every bit set to one.
-q
--quiet
-r
--ignore-routing
Bypass the normal routing tables and send directly to a host on an attached
network. If the host is not on a directly attached network, an error is returned.
This option can be used to ping a local host through an interface, for which
there is no assigned route, such as when the interface was dropped by routed.
-s n
--size=n
Specifies the number of data bytes to be sent. The default is 56, which translates
into 64 ICMP data bytes, taking the 8 bytes of ICMP header data into account.
-T num
--tos=num
Set the traffic class to num on transmitted packets.
--ttl=n
-v
--verbose
Produce more verbose output, giving more statistics.
-w n
--timeout=n
Stop after n seconds.
The documentation of ping provides several pieces of information, and discussions, relevant to the use of ping6. Keep in mind, though, that the differing address family causes
some discrepancy. See Chapter 6 [ping invocation], page 7.
13
-m num
--max-hop=num
Set the maximum time-to-live allowed for probing. In other words, stop probing
when the hop distance is in excess of num. The default limit is 64.
-M method
--type=method
Use method as carrier packets for traceroute operations. Supported choices are
icmp and udp, where udp is the default type.
-p port
--port=port
Set destination port of target to port. The default value is 33434.
-q num
--tries=num
Send a total of num probe packets per hop, defaulting to 3.
--resolve-hostnames
Attempt to resolve all addresses as hostnames.
-t num
--tos=num
Set type-of-service, TOS field, to num on transmitted packets.
14
-w num
--wait=num
Set timeout in seconds, within which a returning response packet is accepted
as such. Default waiting time is three seconds.
!H
!N
!P
!S
!T
!U
!X
15
-F
-g source:first-last
Find updates for an object from provider source, starting from the version with
serial key first, and ending with serial key last.
-h host
--server=host
Connect to server host.
-H
-i attr[,attr2...]
Do an inverse lookup for specified attributes. Use a comma separated list for
multiple attributes.
-l
-L
-m
-M
-p port
-q {version|sources}
Query specified server info. Applies to RPSL only.
-r
-R
Force output to show local copy of the domain object, even if it contains a
referral.
-s source[,source2...]
Search the data base at source.
providers.
-S
-t type
16
Request a template for objects of type type. Use the value all for a list of
possible types.
-T type[,type2...]
Search only for objects of type type. A comma separated list allows for multiple
types.
-V
--verbose
Verbosely explain all actions taken.
-x
WHOIS_HIDE
When set, the effect on whois is as if the option -H had been given.
WHOIS_SERVER
Data base server to query when internal hinting is inconclusive. When unset,
whois.internic.net is used as default server.
17
-6
--ipv6
-A
--active
-d
--debug
-e
--no-edit
Disables the editing of commands. This is default setting for batch mode,
without a TTY.
-g
--no-glob
Disables file name globbing.
-i
--no-prompt
Turns off interactive prompting during multiple file transfers.
-N netrc
--netrc=netrc
Set a preferred location of the .netrc file, thus overriding any environment
setting in NETRC, as well as the default location $HOME/.netrc, see Section 10.7
[The .netrc file], page 27.
18
-n
--no-login
Restrains ftp from attempting auto-login upon initial connection. If auto-login
is enabled, ftp will check the .netrc (see Section 10.7 [The .netrc file], page 27)
file in the users home directory for an entry describing an account on the remote
machine. If no entry exists, ftp will prompt for the remote machine login name
(default is the user identity on the local machine), and, if necessary, prompt for
a password and an account with which to login.
-p
--passive
Enable passive mode transfer. Default mode when invoked as pftp.
--prompt[=prompt]
Print a command-line prompt, even if not on a tty. If prompt is supplied,
its value is used instead of the default ftp> . Notice, that the argument is
optional.
-t
--trace
-v
--verbose
Start in verbose mode, printing informational messages. This is default for
interactive mode.
19
Set the file transfer type to network ASCII. This is the default type, except
when two unices are communicating.
bell
Arrange that a bell be sounded after each file transfer command is completed.
binary
Set the file transfer type to support binary image transfer. This transfer type is
selected during initial handshake, should the client on a Unix system recognize
that the server is also running on a Unix system.
bye
quit
case
Terminate the FTP session with the remote server and exit ftp. An end of file
will also terminate the session and exit.
Toggle the remote computers use of letter case mapping during mget commands. When case is on, a file name at the remote site whose every letter
appear in upper case, will be renamed in such a way that all letters are changed
to lower case for a local copy of the same file. The default setting is off,
cd remote-directory
Change the working directory on the remote machine to remote-directory.
cdup
Change the remote machines working directory to the parent of the current
working directory.
Toggle carriage return stripping during ASCII type file retrieval. Records are
denoted by a carriage return/linefeed sequence during ASCII type file transfer.
When cr is on (the default), carriage returns are stripped from this sequence to
conform with the UNIX single linefeed record delimiter. Records on non-UNIX
remote systems may contain single linefeeds; when an ASCII type transfer is
made, these linefeeds may be distinguished from a record delimiter only when
cr is off.
delete remote-file
Delete the file remote-file on the remote machine.
debug [debug-value]
Toggle debugging mode. If an optional debug-value is specified it is used to set
the debugging level. When debugging is on, ftp prints each command sent to
the remote machine, preceded by the string -->.
20
form format
Set the file transfer form to format. The only supported format is non-print.
get remote-file [local-file]
recv remote-file [local-file]
Retrieve the remote-file and store it on the local machine. If a local file name is
not specified, the local copy is given the same name as is stated for the remote
original, subject to alteration by the current case, ntrans, and nmap settings.
The current settings for type, form, mode, and structure are effective during
file transfer.
glob
Toggle file name expansion for mdelete, mget, and mput. If globbing is turned
off with glob, the file name arguments are taken literally and are not expanded.
Globbing for mput is done as in csh syntax. For mdelete and mget, each
remote file name is expanded separately on the remote machine and the lists
are not merged. Expansion of a directory name is likely to be different from
expansion of the name of an ordinary file: the exact result depends on the
remote operating system and on the FTP server, and can be previewed by
issuing mls remote-files -.
Note: mget and mput are not meant to transfer entire directory subtrees of files.
That can be achieved by transferring an already created tar or cpio archive of
the subtree, then making certain that ftp uses binary mode.
hash [size]
In the absence of an argument, toggle the state of hash-sign (#) printing after
each transferred data block. The optional argument selects the size of data
blocks, and unconditionally activates printing. The default size is 1024 bytes.
For convenience, the size can be written with postfix multipliers k, K, m,
M, and g, G, to specify kilobytes, Megabytes, and Gigabytes, respectively.
help [command]
? [command]
Print an informative message about the meaning of command. If no argument
is given, ftp prints a list of the known commands.
idle [seconds]
Set the inactivity timer on the remote server to seconds seconds. If seconds is
omitted, the current inactivity timer is printed.
ipv4
ipv6
ipany
21
lcd [directory]
Change the working directory on the local machine. If no directory is specified,
the users home directory is used.
lpwd
Print the name of the current working directory on the local machine.
ls [remote-directory] [local-file]
Print a listing of the contents of a directory on the remote machine. The listing
includes any system-dependent information that the server chooses to include;
for example, most UNIX systems will produce output like the command ls -l
does. Use nlist for a simple file listing.
If remote-directory is left unspecified, the current working directory is used.
With interactive prompting set, ftp will prompt the user to verify that the last
argument is indeed the intended local file for storing output. Should no local
file be specified, or if local-file is a dash -, then output is sent to the terminal.
macdef macro-name
Define a macro called macro-name, with subsequent lines as the macro definition. A null line (consecutive newline characters in a file, or carriage returns
at a terminal) terminates macro input mode. There is a limit of 16 macros
and a total of 4096 characters shared by all defined macros. Only the first
eight characters in macro-name are significant when determining which macro
to execute. Macros remain defined until a close command is executed.
The macro processor interprets $ and \ as special characters. A $ followed
by a number (one or more digits) is replaced by the corresponding argument
on the macros invocation command line. A $ followed by the letter i tells
the macro processor that the macro is to perform a loop. On the first pass,
$i is replaced by the first argument on the macros invocation command line,
while on the second pass it is replaced by the second argument, and so forth.
Iteration proceeds until all arguments have been consumed.
A backslash \ followed by any character is replaced by that character. Use
the backslash \ to prevent special treatment of the dollar sign $, as was just
explained.
mdelete [remote-files]
Delete all remote-files on the remote machine.
mdir remote-files local-file
Like dir, except multiple remote files may be specified. If interactive prompting
is on, ftp will prompt the user to verify that the last argument is indeed the
intended local file for storing any output from mdir.
mget remote-files
Expand the remote-files on the remote machine and execute a get for each file
name thus produced. Resulting file names will then be processed according to
case, ntrans, and nmap settings. Files are transferred to the local working
directory, which can be changed with lcd directory; new local directories can
be created with ! mkdir directory.
22
mkdir directory-name
Make a directory on the remote machine.
mls remote-files local-file
Like nlist, except multiple remote files may be specified, and the local-file
must be specified. If interactive prompting is on, ftp will prompt the user to
verify that the last argument is the intended local file for storing output. A
dash - is accepted as last argument without check!
mode [mode-name]
Set the file transfer mode to mode-name. The default mode is stream, and it
is also the only implemented mode.
modtime file-name
Show the last modification time of the file on the remote machine.
mput local-files
Consider the arguments to be local names and expand any wild card. Execute a
put for each file in the resulting list. The remote file names are then computed
by use of ntrans and nmap settings.
newer file-name
Get the file only if the modification time of the remote file is more recent than
the file on the current system. If the file does not exist on the current system,
the remote file is considered newer. In other respects, this command is identical
to get.
nlist [remote-directory] [local-file]
Print a list of the files in a directory on the remote machine. If remote-directory
is left unspecified, the current working directory is used. If interactive prompting is on, ftp will prompt the user to verify that the last argument is the
intended local file for storing output. If no local file is specified, or if local-file
is -, the output is sent to the terminal.
nmap [inpattern outpattern]
Set or unset the file name mapping mechanism. If no arguments are specified,
the file name mapping mechanism is unset. Name mapping is applied during
mput and put commands issued without a specified remote target filename. It as
also applied to local file names during mget and get commands issued without
local target file name. This command is useful when connecting to a non-UNIX
remote computer with different file naming conventions or practices.
The mapping follows the pattern set by inpattern and outpattern. The template inpattern is used on incoming filenames (which may have already been
processed according to the ntrans and case settings). Variable templating is
accomplished by including the sequences $1, $2, . . . , $9 in inpattern. Use
\ to prevent this special treatment of the character $. All other characters
are treated literally, and must be matched in a file name for inpattern to bind
substrings to variables.
For example, take a pattern $1.$2 and a file name mydata.data. Then $1
would have the value mydata, and $2 would be data.
23
Toggle passive mode. If passive mode is turned on (default is off), the ftp
client will send a PASV command for all data connections instead of the usual
PORT command. The PASV command requests that the remote server open a
port for the data connection and return the address of that port. The remote
server listens on that port and the client connects to it. When using the more
traditional PORT command, the client listens on a port and sends that address to
the remote server, who connects back to it. Passive mode is useful when using
ftp through a gateway router or host that controls the directionality of traffic.
(Note that though ftp servers are required to support the PASV command by
RFC 1123, some do not.) If epsv4 has been set to on, the client will attempt
EPSV before PASV for IPv4. As a last resort LPSV is attempted. With IPv6 only
EPSV and LPSV are possible.
prompt
24
is turned off (default is on), any mget or mput will transfer all files, and any
mdelete will delete all files.
proxy ftp-command
Execute an ftp command on a secondary control connection. This command
allows simultaneous connection to two remote FTP servers for transferring files
between the two servers. The first proxy command should be open, to establish the secondary control connection. Enter the command proxy ? to see
other commands usable for the secondary connection. The following commands
behave differently when prefaced by proxy: open will not define new macros
during the auto-login process, close will not erase existing macro definitions,
get and mget transfer files from the host on the primary control connection
to the host on the secondary control connection, and put, mput, and append
transfer files from the host on the secondary control connection to the host on
the primary control connection.
Note that the protocol command PASV must be understood by the server on
the secondary control connection for this kind of file transfer to succeed.
put local-file [remote-file]
send local-file [remote-file]
Store a local file on the remote machine. If remote-file is left unspecified,
the local file name is used after processing according to any ntrans or nmap
settings in naming the remote file. File transfer uses the current settings for
type, format, mode, and structure.
pwd
Print the name of the current working directory on the remote machine.
quote arg...
The arguments specified are sent, verbatim, to the remote FTP server.
reget remote-file [local-file]
reget acts like get, except that if local-file exists and is smaller than remotefile, then local-file is presumed to be a partially transferred copy of remote-file
and the transfer is continued from the apparent point of failure. This command
is useful when transferring very large files over networks that are prone to
dropping connections.
rhelp [command-name]
Request help from the remote FTP server. If command-name is specified it is
passed to the server as well.
rstatus [file-name]
With no arguments, show status of remote machine. If filename is specified,
show status of file-name on remote machine.
rename [from] [to]
Rename the file from on the remote machine as to. Name mapping takes effect
without to.
reset
25
restart marker
Restart the immediately following get or put at the indicated marker. On
UNIX systems, marker is usually a byte offset into the file.
rmdir directory-name
Delete a directory on the remote machine.
runique
Toggle the storing of files on the local system with unique filenames. If a file
already exists with a name equal to the inteded local file name for a get or
mget command, then a string .1 is appended to the name. If the resulting
name matches another existing file, .2 is appended to the original name. If
this process continues up to .99, an error message is printed, and the transfer
does not take place. The generated unique filename will be reported. Note that
runique will not affect local files generated from a shell command. The default
value is off.
sendport
Toggle the use of PORT commands. By default, ftp will attempt to use a PORT
command when establishing a connection for each data transfer. The use of
PORT commands can prevent delays when performing multiple file transfers. If
the PORT command fails, ftp will use the default data port. When the use of
PORT commands is disabled, no attempt will be made to use PORT commands
for each data transfer. This is useful for certain FTP implementations which
do ignore PORT commands but, incorrectly, indicate theyve been accepted.
site arg...
The arguments specified are sent, verbatim, to the remote FTP server as a SITE
command.
size file-name
Return size of file-name on remote machine.
status
struct [struct-name]
Set the file transfer structure to struct-name. By default file structure is
used, which also is the only supported value.
sunique
Toggle storing of files on remote machine under unique file names. Remote FTP
server must support FTP protocol STOU command for successful completion.
The remote server will report unique name. Default value is off.
system
tenex
Set the file transfer type to that needed to talk to TENEX machines.
trace
type [type-name]
Set the file transfer type to type-name. If no type is specified, the current type
is printed. The recognized type names are ascii, binary, ebcdic, image,
and tenex. The default type is network ASCII.
umask [newmask]
Set the default umask on the remote server to newmask. If newmask is omitted,
the current umask is printed.
26
Toggle verbose mode. In verbose mode, all responses from the FTP server
are displayed to the user. In addition, if verbose is on, when a file transfer
completes, statistics regarding the efficiency of the transfer are reported. By
default, verbose is on.
Command arguments which have embedded spaces may be inclosed within citation characters ".
NETRC
Alternate location of the .netrc file, taking precedence over the standard location.
SHELL
27
2. If the first character of the file name is |, the remainder of the argument is interpreted
as a shell command. ftp then forks a shell, using popen with the argument supplied,
and reads/writes from standard input/output. If the shell command includes spaces,
the argument must be quoted; e.g. "ls -lt".
A particularly useful example of this mechanism in action, is
ftp> dir . |less
which allows the user to scroll through a long directory listing.
3. Failing the above checks, if globbing is enabled, local file names are expanded according
to the rules used by csh; c.f. the glob command. If the ftp command expects a single
local file (e.g. put), only the first filename generated by the globbing operation is used.
4. For the commands mget and get with unspecified local file name, the local file name is
set to the remote file name, which may be altered by a case, ntrans, or nmap settings.
The resulting file name may then be modified if runique is set.
5. For the commands mput and put with unspecified remote file name, the remote file
name is copied from the local file name, which may be altered by a ntrans or nmap
settings. The resulting file name may also be modified by the remote server if sunique
is set.
default
28
This is the same as machine name except that default matches any name. There
can be only one default token, and it must be after all machine tokens. This is
normally used as:
default login anonymous password user@site
thereby giving the user automatic anonymous ftp login to machines not specified
in .netrc. This can be overridden by using the -n flag to disable auto-login.
login name
Identify a user on the remote machine. If this token is present, the auto-login
process will initiate a login using the specified name.
password string
Supply a password. If this token is present, the auto-login process will supply
the specified string if the remote server requires a password as part of the login
process. Note that if this token is present in the .netrc file for any user other
than anonymous, ftp will abort the auto-login process if the .netrc is readable
by anyone besides the user.
account string
Supply an additional account password. If this token is present, the auto-login
process will supply the specified string if the remote server requires an additional
account password, or the auto-login process will initiate an ACCT command if it
does not.
macdef name
Define a macro. This token functions like the ftp macdef command functions.
A macro is defined with the specified name; its contents begin with the next
.netrc line and continue until a null line (consecutive new-line characters) is
encountered. If a macro named init is defined, it is automatically executed as
the last step in the auto-login process.
29
-6
--ipv6
-d directory
--target-directory=directory
Copy all source arguments into directory.
-f
--from
-k realm
--realm=realm
The option requests rcp to obtain tickets for the remote host in realm realm
instead of the remote hosts realm.
-K
--kerberos
Turns off all Kerberos authentication.
-p
--preserve
Causes rcp to attempt to preserve (duplicate) in its copies the modification
times and modes of the source files, ignoring the umask. By default, the mode
and owner of the target file are preserved if the target itself already exists;
otherwise the mode of the source file is modified by the umask setting on the
destination host.
-r
--recursive
If any of the source files are directories, rcp copies each subtree rooted at that
name; in this case the destination must be a directory.
-t
--to
-x
--encrypt
Turns on encryption for all data passed via the rcp session. This may impact
response time and CPU utilization, but provides increased security.
30
rcp doesnt detect all cases where the target of a copy might be a file in cases where
only a directory should be legal.
rcp can be confused by any output generated by commands in a .login, .profile, or
.cshrc file on the remote host.
The destination user and hostname may have to be specified as rhost.rname when the
destination machine is running the 4.2BSD version of rcp.
31
-6
--ipv6
-a
--ipany
-e
--error=port
Specify the TCP port to use for stderr redirection, in case it is not specified a
random port will be used.
-h
--host=name
Specify the host with whom to connect: symbolic name or address.
-n
--noerr
-p
--password=passwd
Specify the password for logging-in. The special value consisting of a single
dash - will make rexec read a single line from stdin. This input is then used
as password and is passed as such to the remote server. Thus it is possible to
hide vital access information slightly better than the full disclosure implicit in
the text of a command line option.
-P
--port=num
Specify to which numerical port a connection shall be sought. If it is not
specified, then use port 512/tcp by default.
-u
--user=name
Specify the user with whom to log into the server.
32
-6
--ipv6
-8
--8-bit
-d
--debug
Allows an eight-bit input data path at all times; otherwise parity bits are
stripped except when the remote sides stop and start characters are other
than C-S/C-Q.
Turns on socket debugging on the TCP sockets used for communication with
the remote host.
-e char
--escape=char
Allows user specification of the escape character, which is ~ by default. This
specification may be as a literal character, or as an octal value in the form
\nnn.
-E
--no-escape
Stops any character from being recognized as an escape character. When used
with the -8 option, this provides a completely transparent connection.
-l user
--user=user
By default, the remote username is the same as the local username. This option,
and the user@host format, allow the remote user name to be made explicit,
or changed.
33
The next three options are available only if the program has been compiled with support
for Kerberos authentication.
-k realm
--realm=realm
The option requests rlogin to obtain tickets for the remote host in realm realm
instead of the remote hosts realm.
-K
--kerberos
Turns off all Kerberos authentication.
-x
--encrypt
Turns on encryption for all data passed via the rlogin session. This may impact
response time and CPU utilization, but provides increased security.
34
35
-6
--ipv6
-d
--debug
Turns on socket debugging used for communication with the remote host.
-l user
--user=user
By default, the remote username is the same as the local username. The -l
option and the username@host format allow the remote user name to be specified. Kerberos authentication is used, whenever available, and authorization is
determined as in rlogin (see Chapter 13 [rlogin invocation], page 32).
-n
--no-input
Use /dev/null for all input, telling the server side that we send no material.
This can prevent the remote process from blocking, should it optionally accept
more input. The option is void together with encryption.
The next three options are available only if the program has been compiled with support
for Kerberos authentication.
36
-k realm
--realm=realm
The option requests rsh to obtain tickets for the remote host in realm realm
instead of the remote hosts realm.
-K
--kerberos
Turns off all Kerberos authentication.
-x
--encrypt
Turns on encryption for all data passed via the rsh session. This may impact
response time and CPU utilization, but provides increased security.
Finally, some compatibility options are present:
-8
--8-bit
-e char
--escape=char
-E
--no-escape
Ignored during normal operation, but passed on to rlogin when rsh is invoked
without a command argument.
37
15.1 Invoking
The command line arguments are as follows:
person
If you wish to talk to someone on your own machine, then person is just the
other persons login name. If you wish to talk to a user on another host, then
person is of the form user@host.
ttyname
If you wish to talk to a local user who is logged in more than once, the argument
ttyname may be used to indicate the appropriate terminal name, where ttyname
typically is of the form ttyXX, or pts/X.
38
-6
--ipv6
-8
--binary
-a
--login
-c
--no-rc
-d
--debug
-e char
--escape=char
Use char as escape character.
-E
--no-escape
Do not use an escape character.
-k realm
--realm=realm
Request Kerberos realm realm instead of whatever is declared as default realm
in the systems or users settings.
-K
--no-login
Do not automatically login to the remote system.
-l user
--user=user
Attempt automatic login as user.
-L
--binary-output
Use an 8-bit data path for output only.
-n file
--trace=file
Record trace information into file.
-r
--rlogin
39
-x
--encrypt
If possible, encrypt the data stream.
-X atype
--disable-auth=atype
Disable authentication of type atype. Use this option multiple times if more
than one type is to be disabled. Standard choices are null, kerberos_v4,
and kerberos_v5.
40
17.1 Commands
Once tftp is running, it issues the prompt and recognizes the following commands:
? command-name
Print help information.
ascii
binary
41
a host and filename at the same time. If the latter form is used, the hostname
specified becomes the default for future transfers. If the remote-directory
form is used, the remote host is assumed to be a UNIX machine. The same
use of square brackets for enclosing numeric IPv6 addresses applies here, as was
mentioned for the command get.
quit
rexmt retransmission-timeout
Set the per-packet retransmission timeout, in seconds.
status
timeout total-transmission-timeout
Set the total transmission timeout, in seconds.
trace
verbose
Because there is no user-login or validation within the tftp protocol, the remote site will
probably have some sort of file-access restrictions in place. The exact methods are specific
to each site and therefore difficult to document here.
42
18.1 Invocation
Normally, inetd is invoked without any arguments. It does, however, support several
command line options. These are:
-d
--debug
Turns on debugging. With this option, inetd stays in foreground and prints
additional debugging information of stderr.
--environment
Pass local and remote socket information in environment variables.
Section 18.5 [Inetd Environment], page 45.
See
-p[file]
--pidfile[=file]
Use file as location to store process ID of the running server process, thus
overriding the default location. Setting an empty argument will disable the use
of a file for storing the process ID.
--resolve
Resolve IP addresses when setting environment variables. See Section 18.5
[Inetd Environment], page 45.
-R rate
--rate=rate
Specify the maximum number of times a service can be invoked in one minute;
the default is 1000.
43
read and interpreted like a configuration file. All of the configuration files are read and the
results are merged.
There must be an entry for each field in the configuration file, with entries for each field
separated by a tab or a space. Comments are denoted by a # at the beginning of a line.
The available fields of the configuration file are summarized in the table below (optional
parts are enclosed in square brackets):
[service node:]service name
The service-name entry is the name of a valid service in the file /etc/services.
For internal services (see Section 18.3 [Built-in services], page 44), the service name must be the official name of the service (that is, the first entry in
/etc/services), or a numeric representation thereof. For TCPMUX services,
the value of the service name field consists of the string tcpmux followed
by a slash and the locally-chosen service name (see Section 18.4 [TCPMUX],
page 45).
An optional service node prefix is allowed for internet services. When
present, it supplies the local addresses inetd should use when listening for
that service. Service node consists of a comma-separated list of addresses.
Both symbolic host names and numeric IP addresses are allowed. Symbolic
hostnames are looked up in DNS service. If a hostname has multiple address
mappings, inetd creates a socket to listen on each address.
To avoid repeating an address that occurs frequently, a line with a host address
specifier and colon, but no further fields is allowed, e.g.:
127.0.0.1,192.168.0.5:
The address specifier from such a line is remembered and used for all further
lines lacking an explicit host specifier. Such a default address remains in effect
until another such line or end of the configuration is encountered, whichever
occurs first.
A special hostname * stands for the wildcard address. When used in a normal
configuration line, it causes the default address specifier to be ignored for that
line. When used in a default address specification, e.g.:
*:
it causes any previous default address specifier to be forgotten.
socket type
The socket type should be one of stream, dgram, raw, rdm, or seqpacket,
depending on whether the socket is a stream, datagram, raw, reliably delivered
message, or sequenced packet socket. TCPMUX services must use stream.
protocol
44
wait/nowait[.max]
The wait/nowait entry specifies whether the server that is invoked by inetd
will take over the socket associated with the service access point, and thus
whether inetd should wait for the server to exit before listening for new service
requests. Datagram servers must use wait, as they are always invoked with
the original datagram socket bound to the specified service address. These
servers must read at least one datagram from the socket before exiting. If a
datagram server connects to its peer, freeing the socket so inetd can received
further messages on the socket, it is said to be a multi-threaded server; it
should read one datagram from the socket and create a new socket connected
to the peer. It should fork, and the parent should then exit to allow inetd to
check for new service requests to spawn new servers. Datagram servers which
process all incoming datagrams on a socket and eventually time out are said to
be single-threaded. comsat and talkd are both examples of the latter type
of datagram server. tftpd is an example of a multi-threaded datagram server.
Servers using stream sockets generally are multi-threaded and use the nowait
entry. Connection requests for these services are accepted by inetd, and the
server is given only the newly-accepted socket connected to a client of the service. Most stream-based services and all TCPMUX services operate in this
manner. For such services, the number of running instances of the server
can be limitied by specifying optional max suffix (a decimal number), e.g.:
nowait.15.
Stream-based servers that use wait are started with the listening service
socket, and must accept at least one connection request before exiting. Such a
server would normally accept and process incoming connection requests until a
timeout. Other services must use nowait.
user
The user entry should contain the user name of the user as whom the server
should run. This allows for servers to be given less permission than root. An
optional form includes also a group name as a suffix, separated from the user
name by colon or a period, i.e., user:group or user.group.
server program
The server-program entry should contain the pathname of the program which is
to be executed by inetd when a request is found on its socket. If inetd provides
this service internally, this entry should be internal.
It is common usage to specify /usr/sbin/tcpd in this field.
server program arguments
The server program arguments should be just as arguments normally are, starting with argv[0], which is the name of the program. If the service is provided
internally, this entry must contain the word internal, or be empty.
45
echo
Send back to the originating source any data received from it. This is a debugging and measurement tool.
discard
chargen
daytime
Send back the current date and time in a human readable form. Any input is
discarded.
time
Send back the current date and time as a 32-bit integer number, nrepresenting
the number of seconds since midnight, January 1, 1900.
18.4 TCPMUX
The TCPMUX protocol.
A TCP client connects to a foreign host on TCP port 1. It sends the service
name followed by a carriage-return line-feed <CRLF>. The service name is never
case sensitive. The server replies with a single character indicating positive (+)
or negative (-) acknowledgment, immediately followed by an optional message of
explanation, terminated with a <CRLF>. If the reply was positive, the selected
protocol begins; otherwise the connection is closed. The program is passed
the TCP connection as file descriptors 0 and 1.
If the TCPMUX service name begins with a +, inetd returns the positive reply for
the program. This allows you to invoke programs that use stdin/stdout without putting
any special server code in them.
The special service name help causes inetd to list TCPMUX services in inetd.conf.
To define TCPMUX services, the configuration file must contain a tcpmux internal
definition.
Here are several example service entries for the various types of services:
ftp
stream tcp
ntalk
dgram
udp
tcpmux
stream tcp
tcpmux/+date stream tcp
tcpmux/phonebook stream tcp
nowait
wait
nowait
nowait
nowait
root /usr/libexec/ftpd
ftpd -l
nobody:tty /usr/libexec/talkd talkd
root internal
guest /bin/date
date
guest /usr/bin/phonebook
phonebook
PROTO
46
Always TCP.
TCPLOCALIP
Local IP address of the interface which accepted the connection.
TCPLOCALPORT
Port number on which the TCP connection was established.
TCPREMOTEIP
IP address of the remote client.
TCPREMOTEPORT
Port number on the client side of the TCP connection.
Additionally, if given the --remote option, inetd sets the following environment variables:
TCPLOCALHOST
DNS name of TCPLOCALIP.
TCPREMOTEHOST
DNS name of TCPREMOTEIP.
47
48
-p file
--socket=file
Override default UNIX domain socket /dev/log.
-a socket Add UNIX socket to listen. An unlimited number of sockets is allowed.
-r
--inet
Receive remote messages via Internet domain socket. Without this option no
remote massages are received, since there is no listening socket. Yet sockets for
forwarding are created on the fly as needed, which might cause performance
issues on busy systems.
-b address
--bind=address
Restrict the listening Internet domain socket to a single address. The default
(given the use of -r) is a wildcard address, implying that the server listens at
every available address. Any name will be resolved, and the lookup result will
depend on the options -4, -6, and --ipany.
--no-unixaf
Do not listen on UNIX domain sockets (overrides -a and -p).
49
--no-klog
Do not listen to the kernel log device /dev/klog.
--ipany
-4
--ipv4
-6
--ipv6
--no-forward
Do not forward any messages (overrides -h). This disables even temporary
creation of forwarding sockets, an ability which is otherwise active when the
option -r is left out.
-h
--hop
-m interval
--mark=interval
Specify timestamp interval expressed in minutes (0 for no timestamping).
-l hostlist
Log hosts in hostlist by their hostname. Multiple lists are allowed.
-s domainlist
List of domains which should be stripped from the FQDN of hosts before logging
their name. Multiple lists are allowed.
-T
--local-time
Ignore any time contained in a received message. In its stead, record the time
of reception on the local system. This circumvents problems caused by remote
hosts with skewed clocks.
50
51
A named pipe, beginning with a vertical bar (|) followed by a pathname. The pipe
must be created with mkfifo before syslogd reads its configuration file. This feature
is especially useful for debugging.
A hostname (preceded by an at (@) sign). Selected messages are forwarded to syslogd
on the named host.
A comma separated list of users. Selected messages are written to those users if they
are logged in.
An asterisk. Selected messages are written to all logged-in users.
Blank lines and lines whose first non-blank character is a hash (#) character are
ignored.
A configuration file might appear as follows:
# Log all kernel messages, authentication messages of
# level notice or higher and anything of level err or
# higher to the console.
# Dont log private authentication messages!
*.err;kern.*;auth.notice;authpriv.none /dev/console
# Log anything (except mail) of level info or higher.
# Dont log private authentication messages!
*.info;mail.none;authpriv.none
/var/log/messages
# The authpriv file has restricted access.
authpriv.*
/var/log/secure
# Log all the mail messages in one place.
mail.*
/var/log/maillog
# Everybody gets emergency messages, plus log them on another
# machine.
*.emerg
*
*.emerg
@arpa.berkeley.edu
# Root and Eric get alert and higher messages.
*.alert
root,eric
# Simplify security auditing, by collecting sudo uses.
! sudo
*.info
/var/log/sudo
# Collect time server reports.
#! ntpd
*.*
# Stop selecting on message tags.
!*
/var/log/ntpd
52
53
-6
--ipv6
-A
--anonymous-only
Only anonymous login is allowed.
-a auth
--auth=auth
Specify what authentication mechanism to use for incoming connections. Possible values are: kerberos, kerberos5, opie, pam, and default.
Anonymous logins will continue to work when this option is used, unless the
user ftp is removed from the system.
-D
--daemon
-d
--debug
-l
--logging
Each successful and failed ftp session is logged using syslog with a facility
of LOG_FTP. If this option is specified twice, the retrieve (get), store (put),
append, delete, make directory, remove directory and rename operations and
their filename arguments are also logged.
--non-rfc2577
Do not follow the suggestion of RFC 2577 to suppress messages that could help
an attacker to conduct user name enumeration. This option allows the server
to return with an error message immediately upon receipt of a user name. Such
information includes non-existence claims and expiration claims. The ideal
mode would otherwise be to fake the relevance of asking for a password, and
only thereafter report an invalid login.
-p pidfile
--pidfile=pidfile
Change default location of pidfile.
-q
--no-version
Quiet mode. No information about the version of the ftpd is given to the client.
54
-T
--max-timeout
A client may also request a different timeout period; the maximum period
allowed may be set to timeout seconds with the -T option. The default limit is
2 hours.
-t timeout
--timeout=timeout
The inactivity timeout period is set to timeout seconds (the default is 15 minutes).
-u umask
--umask=umask
Set default umask, expressed in base 8.
The file /etc/nologin can be used to disable FTP access. If the file exists, ftpd displays
it and exits. If the file /etc/ftpwelcome exists, ftpd prints it before issuing the ready
message. If the file /etc/motd exists, ftpd prints it after a successful login.
If this server was compiled with PAM support, then any non-anonymous connection
request will also be checked for settings pertaining to the PAM service ftp, before finally
being accepted.
Linux-PAM is particular in that it also provides a module pam_ftp.so influencing even
anonymous access. By convention the present server relies on the functionality in that
module when built on relevant systems. However, the module is known to be partially
broken since ten years back, when one compares the claims in its manual page, so not all
claimed trickery is available!
20.1 Standards
The FTP server currently supports the following FTP requests. The letter case of any
request is ignored.
Request
ABOR
ACCT
ALLO
APPE
CDUP
CWD
DELE
EPSV
EPRT
HELP
LIST
LPRT
LPSV
MKD
MDTM
Description
abort previous command
specify account (ignored)
allocate storage (vacuously)
append to a file
change to parent of current working directory
change working directory
delete a file
extended passive transfer request
specify data connection port
give help information
give list files in a directory (ls -lgA)
specify data connection port
long passive transfer request
make a directory
show last modification time of file
MODE
NLST
NOOP
PASS
PASV
PORT
PWD
QUIT
REST
RETR
RMD
RNFR
RNTO
SITE
SIZE
STAT
STOR
STOU
STRU
SYST
TYPE
USER
XCUP
XCWD
XMKD
XPWD
XRMD
55
The following non-standard, or UNIX specific, commands are supported by the SITE
request.
Request
UMASK
IDLE
CHMOD
HELP
Description
change umask, e.g. SITE UMASK 002
set idle-timer, e.g. SITE IDLE 60
change mode of a file, e.g. SITE CHMOD0 0CHMOD1 1CHMOD2
give help information.
The remaining FTP requests specified in RFC 959 are recognized, but not implemented.
The extensions MDTM, REST, and SIZE are specified in RFC 3659, while EPRT and EPSV
appear in RFC 2428, LPRT and LPSV in RFC 1639.
The ftp server will abort an active file transfer only when the ABOR command is preceded
by a Telnet Interrupt Process (IP) signal and a Telnet Synch signal in the command
Telnet stream, as described in Internet RFC 959. If a STAT command is received during a
data transfer, preceded by a Telnet IP and Synch, transfer status will be returned.
ftpd interprets file names according to the globbing conventions used by csh. This
allows users to utilize the metacharacters *?[]{}~.
The server applies the suggestions in RFC 2577, but the legacy behaviour with informational content in denials can be restored using the option --non-rfc2577.
56
20.2 Authentication
ftpd authenticates users according to four rules.
1. The login name must be in the password data base, /etc/passwd, and must not have
a null password. In this case a password must be provided by the client before any file
operations can be performed.
2. The login name must not appear in the file /etc/ftpusers.
3. The user must have a standard shell.
4. If the user name is anonymous or ftp, an anonymous ftp account must be present in
the password file (user ftp). In this case the user is allowed to log in by specifying any
password (by convention an email address for the user should be used as the password).
A further access mechanism is provided by the file /etc/ftpchroot. A user mentioned
therein will have all access confined to the subtree rooted at the home directory specified
in /etc/passwd.
In the case of anonymous access, ftpd takes special measures to restrict the clients
access privileges. The server always performs a chroot to the home directory of the ftp
user.
In order that system security is not breached, it is recommended that the ftp subtree
be constructed with care, following these rules:
~ftp
Make the home directory owned by root and not writable by anyone.
~ftp/bin
Make this directory owned by root and not writable by anyone (mode 555).
The program ls must be present to support the list command, unless the server
was compiled with libls support. This program should be mode 111.
~ftp/etc
Make this directory owned by root and not writable by anyone (mode 555).
The files passwd and group must be present for the ls command to be able to
produce owner names rather than numbers. The password field in passwd is
not used, and should not contain real passwords. The file motd, if present, will
be printed after a successful login. These files should be mode 444.
~ftp/pub
Make this directory mode 777 and owned by ftp. Guests can then place files
which are to be accessible via the anonymous account in this directory.
57
/etc/nologin
If present, the contents are displayed and all further access is refused.
58
21.1 Invoking
The only option is as follows:
-l
--logging
Raise logging level for this service; use more than once for increased verbosity.
The syslog facility in use is LOG_DAEMON.
Should rexecd have been built with PAM support, it reads any setting specified for a
service named rexec.
21.2 Diagnostics
Except for the last one listed below, all diagnostic messages are returned on the initial
socket, after which any network connections are closed. An error is indicated by a leading
byte with a value of 1 (0 is returned in step 7 above upon successful completion of all the
steps prior to the command execution).
username too long
The name is longer than 16 characters.
59
60
22.1 Invoking
The available options are as follows:
-4
--ipv4
-6
--ipv6
-a
--verify-hostname
Ask hostname for verification.
-d[max]
--daemon[=max]
Run in background daemon mode, optionally setting the maximal number of
simultaneously running client sessions. The default limit is 10.
-D[level]
--debug[=level]
Set debug level, not implemented.
-l
--no-rhosts
Ignore clients .rhosts file.
-L name
--local-domain=name
Set local domain name, to which the server host belongs. By default the domain
is recovered from the canonical name of the host.
-n
--no-keepalive
Do not set SO KEEPALIVE on sockets. This decreases the ability to close lost
connections to once active clients.
61
-o
--allow-root
Allow the root user to login, which is disallowed by default.
-p port
--port=port
Listen on given port. Applicable only in daemon mode.
-r
--reverse-required
Require reverse resolvability of remote hosts numerical IP.
For sites requiring improved authentication, Kerberos authentication is a viable decision,
and possibly even with encryption for enhanced integrity. Three additional options are
available for an executable rlogind compiled with Kerberos support.
-k
--kerberos
Activate Kerberos authentication on all incoming requests.
-S name
--server-principal=name
Set Kerberos server name, overriding canonical hostname.
-x
--encrypt
Activate encryption of all data passed via the rlogind session. This may impact
response time and CPU utilization, but provides increased security. Only for
Kerberised mode of operation.
Should rlogind have been built with PAM support, it reads any setting specified for
a service named either rlogin or krlogin, the latter name for clients using Kerberised
authentication.
62
1. The server checks the clients source port. If the port is not in the range 512-1023, the
server aborts the connection.
2. The server next checks the clients source address and requests the corresponding host
name. If the hostname cannot be determined, the numerical representation of the host
address is used. If the hostname is in the same domain as the server (according to the
last two components of the domain name), or if the option -a is in effect, the address
for the hostname is requested, verifying that the name and address correspond. Normal
authentication is considered as failed, should this address verification fail.
Once the source port and address have been checked, rlogind proceeds with the authentication process as described in Chapter 23 [rshd invocation], page 63. The server then
allocates a pseudo terminal, and manipulates file descriptors so that the slave half of the
pseudo terminal becomes the stdin, stdout, and stderr for a login process. The login process is an instance of the login program, invoked with the option -f if authentication had
succeeded. If automatic authentication had failed, the user is prompted to log in as if on a
standard terminal line.
The parent of the login process manipulates the master side of the pseudo terminal,
operating as an intermediary between the login process and the client instance of the rlogin
program. In normal operation, the packet protocol described in PTY is invoked to provide
flow control using C-S/C-Q, and to propagate interrupt signals to the remote program. The
login process transmits the client terminals baud rate, and its terminal type, as found in
the environment variable TERM. The screen or window size of the terminal is requested from
the client, and any later window size changes at the clients side are propagated to the
pseudo terminal as well.
Transport-level keepalive messages are enabled unless the option -n was in effect when
starting rlogind. The use of keepalive messages allows sessions to be timed out, should
the client crash, or otherwise become unreachable.
See Section ruserok in The GNU C Library Reference Manual, for details.
22.4 Diagnostics
The exchange protocol states that a negotiation reaches a successful completion as soon as
the server rlogind transmits back to the client a single null byte, marking the completion
of all information exchange.
Error conditions are instead transmitted back to the client as a message containing an
initial byte value 1, followed by a C-string indicating the cause of failure. All network
connections are closed at the server side after this message. Some common messages follow:
Permission denied.
The client presented insufficient credentials, or the clients address is not sufficiently resolvable to pass the checks induced by options -a or -r.
Try again.
A fork by the server failed.
63
64
23.1 Invoking
The options are as follows:
-a
--verify-hostname
Ask hostname for verification.
-k
--kerberos
Use Kerberos authentication.
-l
--no-rhosts
Ignore .rhosts file.
-L
--log-sessions
Log successful logins.
-n
--no-keepalive
Do not set SO KEEPALIVE.
-S name
--servername=name
Set Kerberos server name, overriding canonical hostname.
-v
--vacuous
Fail any call asking for non-Kerberos authentication.
-r
--reverse-required
Demand that the clients IP address be resolvable as a host name.
Should rshd have been built with PAM support, it reads any setting specified for a service
named either rsh or krsh, the latter name for clients seeking Kerberised authentication.
23.2 Diagnostics
Except for the last one listed below, all diagnostic messages are returned on the initial
socket, after which any network connections are closed. An error is indicated by a leading
byte with a value of 1 (0 is returned in step 10 above upon successful completion of all the
steps prior to the execution of the login shell).
Locuser too long
The name of the user on the clients machine is longer than 16 characters.
Ruser too long
The name of the user on the remote machine is longer than 16 characters.
Command too long
The command line passed exceeds the size of the argument list (as configured
into the system).
65
Login incorrect
No password file entry for the user name existed.
Remote directory
The chdir command to the home directory failed.
Permission denied
The authentication procedure described above failed, or address resolution was
insufficient.
Cant make pipe.
The pipe needed for the stderr, wasnt created.
Cant fork; try again.
A fork by the server failed.
<shellname>: ...
The users login shell could not be started. This message is returned on the
connection associated with the stderr, and is not preceded by a flag byte.
The authentication procedure used here assumes the integrity of each client machine and
the connecting medium. This is insecure, but is useful in an open environment.
66
24.1 Invoking
The following switches and options are available.
-a file
--acl=file
Read site-wide ACLs from file.
-d
--debug
Enable debugging.
-i seconds
--idle-timeout=seconds
Set idle timeout length
-l
--logging
Enable a somewhat enhanced logging verbosity, reporting attempted and
dropped connections, as well as some more unexpected events that might arise.
-r seconds
--request-ttl=seconds
Set time-to-live length for requests.
-S
--strict-policy
Apply strict ACL policy on this system. This means that the site-wide ACL
must provide explicit allow rules for admitting traffic at all.
-t seconds
--timeout=seconds
Set timeout length.
67
68
regular file and must be owned by the very same user, have his primary group ownership,
and not be group or world writeable. Should any of these prerequisites be violated, the
users ACL is replaced by a single deny-all rule.
All rules in each set are evaluated, in the sense that whenever an expression net-exp
matches the incoming IPv4 address, then the regular expression user-exp is tested for a
match. That being the case, the corresponding action is recorded. The last match in each
set determines the outcome in its category.
In the most common case, a system wide deny is overridden if the local user has
specified at least one valid and applicable rule, admitting access. In the contrary case,
where no admitting user rule could be established at all, then a resulting deny, from a
system wide ACL, will be used as the final action.
In strict policy mode, a site-wide deny is always final, ignoring any users desire. The
administrator must explicitly arrange some admitting rule, with an action allow, and
some suitable net list. Still, the individual user can arrange his private file for an even
narrower selection of friends.
69
70
-X authtype
--disable-auth-type=authtype
Disable the use of the given authentication type. Use this option multiple
times if more than one type is to be disabled. Standard choices are null,
kerberos_v4, and kerberos_v5.
%t %U
The execution string must as its first part provide an absolute path to an executable file.
After that may follow arbitrary additional arguments. For this latter part, telnetd offers some replacement tokens that dynamically are replaced by content. All are of the
form %<var>, where <var> is a single letter from the following collection of selectors. A
valid letter is called variable. The mark conditional, appearing below, indicates that the
corresponding variable is conditionally assigned a value.
%a
%d
%h
%l
%L
%t
%T
%u
%U
Returns the user name passed as an environment variable USER by the remote
client software. The value is empty, should the environment not provide a value.
In addition, a conditional construct is able to take one action in case a variable has an
assigned value, and optionally to take another action in the opposite case. The contruct is
%?<var>{true-stmt}[{false-stmt}]
The braces are here mandatory, while the brackets enclose the optional else-clause and are
not included in actual use. The initial, motivating example, could thus be expanded to read
telnetd -h -E /usr/local/sbin/avrop
%t %?a{%u krb5}{%U}
In case authentication was completed as user sigge, the execution string would resolve to
/usr/local/sbin/avrop
71
72
73
A file request, if specified as a relative name, will only be searched for below the
acceptable prefixes, should at least one such prefix have been approved.
A request for a relatively named file, is denied in the absence of approved directory
prefixes.
The resulting file must be world readable, or world writable, for a read request, or a
write request, to succeed.
74
27.1 Options
There is a single, specific option available:
-u location
--uucico=location
Replace the hard coded location of uucico with the value specified as location.
75
76
under this License. If a section does not fit the above definition of Secondary then it is
not allowed to be designated as Invariant. The Document may contain zero Invariant
Sections. If the Document does not identify any Invariant Sections then there are none.
The Cover Texts are certain short passages of text that are listed, as Front-Cover
Texts or Back-Cover Texts, in the notice that says that the Document is released under
this License. A Front-Cover Text may be at most 5 words, and a Back-Cover Text may
be at most 25 words.
A Transparent copy of the Document means a machine-readable copy, represented
in a format whose specification is available to the general public, that is suitable for
revising the document straightforwardly with generic text editors or (for images composed of pixels) generic paint programs or (for drawings) some widely available drawing
editor, and that is suitable for input to text formatters or for automatic translation to
a variety of formats suitable for input to text formatters. A copy made in an otherwise
Transparent file format whose markup, or absence of markup, has been arranged to
thwart or discourage subsequent modification by readers is not Transparent. An image
format is not Transparent if used for any substantial amount of text. A copy that is
not Transparent is called Opaque.
Examples of suitable formats for Transparent copies include plain ASCII without
markup, Texinfo input format, LaTEX input format, SGML or XML using a publicly
available DTD, and standard-conforming simple HTML, PostScript or PDF designed
for human modification. Examples of transparent image formats include PNG, XCF
and JPG. Opaque formats include proprietary formats that can be read and edited
only by proprietary word processors, SGML or XML for which the DTD and/or processing tools are not generally available, and the machine-generated HTML, PostScript
or PDF produced by some word processors for output purposes only.
The Title Page means, for a printed book, the title page itself, plus such following
pages as are needed to hold, legibly, the material this License requires to appear in the
title page. For works in formats which do not have any title page as such, Title Page
means the text near the most prominent appearance of the works title, preceding the
beginning of the body of the text.
The publisher means any person or entity that distributes copies of the Document
to the public.
A section Entitled XYZ means a named subunit of the Document whose title either
is precisely XYZ or contains XYZ in parentheses following text that translates XYZ in
another language. (Here XYZ stands for a specific section name mentioned below, such
as Acknowledgements, Dedications, Endorsements, or History.) To Preserve
the Title of such a section when you modify the Document means that it remains a
section Entitled XYZ according to this definition.
The Document may include Warranty Disclaimers next to the notice which states that
this License applies to the Document. These Warranty Disclaimers are considered to
be included by reference in this License, but only as regards disclaiming warranties:
any other implication that these Warranty Disclaimers may have is void and has no
effect on the meaning of this License.
2. VERBATIM COPYING
77
You may copy and distribute the Document in any medium, either commercially or
noncommercially, provided that this License, the copyright notices, and the license
notice saying this License applies to the Document are reproduced in all copies, and
that you add no other conditions whatsoever to those of this License. You may not use
technical measures to obstruct or control the reading or further copying of the copies
you make or distribute. However, you may accept compensation in exchange for copies.
If you distribute a large enough number of copies you must also follow the conditions
in section 3.
You may also lend copies, under the same conditions stated above, and you may publicly
display copies.
3. COPYING IN QUANTITY
If you publish printed copies (or copies in media that commonly have printed covers) of
the Document, numbering more than 100, and the Documents license notice requires
Cover Texts, you must enclose the copies in covers that carry, clearly and legibly, all
these Cover Texts: Front-Cover Texts on the front cover, and Back-Cover Texts on
the back cover. Both covers must also clearly and legibly identify you as the publisher
of these copies. The front cover must present the full title with all words of the title
equally prominent and visible. You may add other material on the covers in addition.
Copying with changes limited to the covers, as long as they preserve the title of the
Document and satisfy these conditions, can be treated as verbatim copying in other
respects.
If the required texts for either cover are too voluminous to fit legibly, you should put
the first ones listed (as many as fit reasonably) on the actual cover, and continue the
rest onto adjacent pages.
If you publish or distribute Opaque copies of the Document numbering more than 100,
you must either include a machine-readable Transparent copy along with each Opaque
copy, or state in or with each Opaque copy a computer-network location from which
the general network-using public has access to download using public-standard network
protocols a complete Transparent copy of the Document, free of added material. If
you use the latter option, you must take reasonably prudent steps, when you begin
distribution of Opaque copies in quantity, to ensure that this Transparent copy will
remain thus accessible at the stated location until at least one year after the last time
you distribute an Opaque copy (directly or through your agents or retailers) of that
edition to the public.
It is requested, but not required, that you contact the authors of the Document well
before redistributing any large number of copies, to give them a chance to provide you
with an updated version of the Document.
4. MODIFICATIONS
You may copy and distribute a Modified Version of the Document under the conditions
of sections 2 and 3 above, provided that you release the Modified Version under precisely
this License, with the Modified Version filling the role of the Document, thus licensing
distribution and modification of the Modified Version to whoever possesses a copy of
it. In addition, you must do these things in the Modified Version:
A. Use in the Title Page (and on the covers, if any) a title distinct from that of the
Document, and from those of previous versions (which should, if there were any,
78
be listed in the History section of the Document). You may use the same title as
a previous version if the original publisher of that version gives permission.
B. List on the Title Page, as authors, one or more persons or entities responsible for
authorship of the modifications in the Modified Version, together with at least five
of the principal authors of the Document (all of its principal authors, if it has fewer
than five), unless they release you from this requirement.
C. State on the Title page the name of the publisher of the Modified Version, as the
publisher.
D. Preserve all the copyright notices of the Document.
E. Add an appropriate copyright notice for your modifications adjacent to the other
copyright notices.
F. Include, immediately after the copyright notices, a license notice giving the public
permission to use the Modified Version under the terms of this License, in the form
shown in the Addendum below.
G. Preserve in that license notice the full lists of Invariant Sections and required Cover
Texts given in the Documents license notice.
H. Include an unaltered copy of this License.
I. Preserve the section Entitled History, Preserve its Title, and add to it an item
stating at least the title, year, new authors, and publisher of the Modified Version
as given on the Title Page. If there is no section Entitled History in the Document, create one stating the title, year, authors, and publisher of the Document
as given on its Title Page, then add an item describing the Modified Version as
stated in the previous sentence.
J. Preserve the network location, if any, given in the Document for public access to
a Transparent copy of the Document, and likewise the network locations given in
the Document for previous versions it was based on. These may be placed in the
History section. You may omit a network location for a work that was published
at least four years before the Document itself, or if the original publisher of the
version it refers to gives permission.
K. For any section Entitled Acknowledgements or Dedications, Preserve the Title
of the section, and preserve in the section all the substance and tone of each of the
contributor acknowledgements and/or dedications given therein.
L. Preserve all the Invariant Sections of the Document, unaltered in their text and
in their titles. Section numbers or the equivalent are not considered part of the
section titles.
M. Delete any section Entitled Endorsements. Such a section may not be included
in the Modified Version.
N. Do not retitle any existing section to be Entitled Endorsements or to conflict in
title with any Invariant Section.
O. Preserve any Warranty Disclaimers.
If the Modified Version includes new front-matter sections or appendices that qualify
as Secondary Sections and contain no material copied from the Document, you may at
your option designate some or all of these sections as invariant. To do this, add their
79
titles to the list of Invariant Sections in the Modified Versions license notice. These
titles must be distinct from any other section titles.
You may add a section Entitled Endorsements, provided it contains nothing but
endorsements of your Modified Version by various partiesfor example, statements of
peer review or that the text has been approved by an organization as the authoritative
definition of a standard.
You may add a passage of up to five words as a Front-Cover Text, and a passage of up
to 25 words as a Back-Cover Text, to the end of the list of Cover Texts in the Modified
Version. Only one passage of Front-Cover Text and one of Back-Cover Text may be
added by (or through arrangements made by) any one entity. If the Document already
includes a cover text for the same cover, previously added by you or by arrangement
made by the same entity you are acting on behalf of, you may not add another; but
you may replace the old one, on explicit permission from the previous publisher that
added the old one.
The author(s) and publisher(s) of the Document do not by this License give permission
to use their names for publicity for or to assert or imply endorsement of any Modified
Version.
5. COMBINING DOCUMENTS
You may combine the Document with other documents released under this License,
under the terms defined in section 4 above for modified versions, provided that you
include in the combination all of the Invariant Sections of all of the original documents,
unmodified, and list them all as Invariant Sections of your combined work in its license
notice, and that you preserve all their Warranty Disclaimers.
The combined work need only contain one copy of this License, and multiple identical
Invariant Sections may be replaced with a single copy. If there are multiple Invariant
Sections with the same name but different contents, make the title of each such section
unique by adding at the end of it, in parentheses, the name of the original author or
publisher of that section if known, or else a unique number. Make the same adjustment
to the section titles in the list of Invariant Sections in the license notice of the combined
work.
In the combination, you must combine any sections Entitled History in the various original documents, forming one section Entitled History; likewise combine any
sections Entitled Acknowledgements, and any sections Entitled Dedications. You
must delete all sections Entitled Endorsements.
6. COLLECTIONS OF DOCUMENTS
You may make a collection consisting of the Document and other documents released
under this License, and replace the individual copies of this License in the various
documents with a single copy that is included in the collection, provided that you
follow the rules of this License for verbatim copying of each of the documents in all
other respects.
You may extract a single document from such a collection, and distribute it individually under this License, provided you insert a copy of this License into the extracted
document, and follow this License in all other respects regarding verbatim copying of
that document.
80
81
82
If you have Invariant Sections, Front-Cover Texts and Back-Cover Texts, replace the
with. . . Texts. line with this:
with the Invariant Sections being list their titles, with
the Front-Cover Texts being list, and with the Back-Cover Texts
being list.
If you have Invariant Sections without Cover Texts, or some other combination of the
three, merge those two alternatives to suit the situation.
If your document contains nontrivial examples of program code, we recommend releasing
these examples in parallel under your choice of free software license, such as the GNU
General Public License, to permit their use in free software.
Index
83
Index
%
%a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
%d . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
%h . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
%l . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
%L . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
%t . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
%T . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
%u . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
%U . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
70
70
70
70
70
70
70
70
70
-- . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
--8-bit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
--acl . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
--active . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
--address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
--aliases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
--allow-root . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
--anonymous-only . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
--auth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
--authmode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
--binary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
--binary-output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
--bind . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
--count. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7, 11
--d . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
--daemon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53, 60
--debug . . . . 7, 11, 17, 32, 35, 38, 42, 48, 53, 66, 69
--disable-auth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
--disable-auth-type . . . . . . . . . . . . . . . . . . . . . . . . . 70
--domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
--echo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
--encrypt . . . . . . . . . . . . . . . . . . . . . . 29, 33, 36, 39, 61
--environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
--error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
--escape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32, 38
--exec-login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
--file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4, 5
--first-hop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
--flood. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8, 11
--fqdn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
--from . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
--gateways. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
--group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
--help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
--hop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
--hoplimit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
--host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5, 6, 31
--icmp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
--id . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
--idle-timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
--ignore-routing-log. . . . . . . . . . . . . . . . . . . . . . 8, 12
--inet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
--interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7, 11
--ip-addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
--ip-timestamp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
--ipany . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31, 49
--ipv4 . . . . . . . . . 5, 17, 29, 31, 32, 35, 38, 49, 53, 60
--ipv6 . . . . . . . . . 5, 17, 29, 31, 32, 35, 38, 49, 53, 60
--kerberos . . . . . . . . . . . . . . . . . . . . . 29, 33, 36, 61, 64
--linemode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
--linger . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
--local-domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
--local-time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
--log-sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
--logging . . . . . . . . . . . . . . . . . . . . . . . . . . 53, 58, 66, 72
--login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
--long . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
--mark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
--mask . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
--max-hop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
--max-timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
--netrc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
--nis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
--no-detach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
--no-edit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
--no-escape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32, 38
--no-forward . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
--no-glob . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
--no-hostinfo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
--no-input. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
--no-keepalive . . . . . . . . . . . . . . . . . . . . . . . . 60, 64, 69
--no-klog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
--no-login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18, 38
--no-prompt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
--no-rc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
--no-rhosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60, 64
--no-unixaf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
--no-version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
--noerr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
--non-rfc2577 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
--nonexistent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
--numeric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8, 12
--passive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
--password. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
--pattern . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9, 12
--pidfile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42, 48, 53
--port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13, 31, 61
--preload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8, 11
--preserve. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
--priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
--prompt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
--quiet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9, 12
--r . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
--rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
--rcdir . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
--rcfile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Index
84
.
.netrc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
B
bug, reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
C
common options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
D
dnsdomainname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
F
ftp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
ftpd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
H
help, online . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
hostname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
I
inetd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Index
85
logger . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
syslogd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
O
option delimiter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
P
ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
ping6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
37
66
38
69
40
72
13
R
rcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
rexec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
rexecd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
rlogin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
rlogind . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
rsh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
rshd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
talk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
talkd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
telnetd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
tftp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
tftpd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
traceroute. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
29
31
58
32
60
35
63
usage, online. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
uucpd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
V
version number, finding . . . . . . . . . . . . . . . . . . . . . . . . . 2
W
whois . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15