IPnom Home • Manuals • FreeBSD

 FreeBSD Man Pages

Man Sections:Commands (1)System Calls (2)Library Functions (3)Device Drivers (4)File Formats (5)Miscellaneous (7)System Utilities (8)
Keyword Live Search (10 results max):
 Type in part of a command in the search box.
 
Index:
  IPXrouted(8)
  MAKEDEV(8)
  ac(8)
  accton(8)
  acpiconf(8)
  acpidb(8)
  acpidump(8)
  adding_user(8)
  adduser(8)
  adjkerntz(8)
  amd(8)
  amq(8)
  ancontrol(8)
  apm(8)
  apmconf(8)
  apmd(8)
  arlcontrol(8)
  arp(8)
  asf(8)
  atacontrol(8)
  atm(8)
  atmarpd(8)
  atmconfig(8)
  atrun(8)
  authpf(8)
  badsect(8)
  bcmfw(8)
  boot(8)
  boot0cfg(8)
  boot_i386(8)
  bootparamd(8)
  bootpd(8)
  bootpef(8)
  bootpgw(8)
  bootptest(8)
  bsdlabel(8)
  bt3cfw(8)
  btxld(8)
  burncd(8)
  camcontrol(8)
  catman.local(8)
  ccdconfig(8)
  chat(8)
  chkgrp(8)
  chkprintcap(8)
  chown(8)
  chroot(8)
  clri(8)
  comcontrol(8)
  comsat(8)
  config(8)
  conscontrol(8)
  crash(8)
  cron(8)
  cvsbug(8)
  daemon(8)
  dconschat(8)
  devd(8)
  devfs(8)
  devinfo(8)
  dhclient-script(8)
  dhclient(8)
  digictl(8)
  diskinfo(8)
  disklabel(8)
  diskless(8)
  dmesg(8)
  dnssec-keygen(8)
  dnssec-signzone(8)
  dump(8)
  dumpfs(8)
  dumpon(8)
  editmap(8)
  edquota(8)
  extattrctl(8)
  faithd(8)
  fastboot(8)
  fasthalt(8)
  fdcontrol(8)
  fdisk(8)
  ffsinfo(8)
  fingerd(8)
  fixmount(8)
  flowctl(8)
  fore_dnld(8)
  fsck(8)
  fsck_4.2bsd(8)
  fsck_ffs(8)
  fsck_msdosfs(8)
  fsck_ufs(8)
  fsdb(8)
  fsinfo(8)
  fsirand(8)
  ftp-proxy(8)
  ftpd(8)
  fwcontrol(8)
  gbde(8)
  gconcat(8)
  geom(8)
  getextattr(8)
  getfmac(8)
  getpmac(8)
  getty(8)
  ggatec(8)
  ggated(8)
  ggatel(8)
  glabel(8)
  gmirror(8)
  gnop(8)
  gpt(8)
  graid3(8)
  growfs(8)
  gshsec(8)
  gstat(8)
  gstripe(8)
  halt(8)
  hccontrol(8)
  hcsecd(8)
  hcseriald(8)
  hlfsd(8)
  hprop(8)
  hpropd(8)
  iasl(8)
  ifconfig(8)
  ifmcstat(8)
  ilmid(8)
  inetd(8)
  init(8)
  intro(8)
  iostat(8)
  ip6addrctl(8)
  ip6fw(8)
  ipf(8)
  ipfs(8)
  ipfstat(8)
  ipfw(8)
  ipmon(8)
  isdnd(8)
  isdndebug(8)
  isdndecode(8)
  isdnmonitor(8)
  isdnphone(8)
  isdntel(8)
  isdntelctl(8)
  isdntrace(8)
  ispcvt(8)
  jail(8)
  jexec(8)
  jls(8)
  kadmin(8)
  kadmind(8)
  kdc(8)
  kerberos(8)
  keyserv(8)
  kgmon(8)
  kgzip(8)
  kldconfig(8)
  kldload(8)
  kldstat(8)
  kldunload(8)
  kldxref(8)
  kpasswdd(8)
  kstash(8)
  ktrdump(8)
  ktutil(8)
  l2control(8)
  l2ping(8)
  lastlogin(8)
  ldconfig(8)
  loader.4th(8)
  loader(8)
  locate.updatedb(8)
  lockd(8)
  lpc(8)
  lpd(8)
  lptcontrol(8)
  lsextattr(8)
  lwresd(8)
  mail.local(8)
  mailstats(8)
  mailwrapper(8)
  makekey(8)
  makemap(8)
  makewhatis.local(8)
  manctl(8)
  map-mbone(8)
  mdconfig(8)
  mdmfs(8)
  memcontrol(8)
  mergemaster(8)
  mixer(8)
  mk-amd-map(8)
  mknetid(8)
  mknod(8)
  mksnap_ffs(8)
  mkuzip(8)
  mld6query(8)
  mlxcontrol(8)
  mount(8)
  mount_cd9660(8)
  mount_devfs(8)
  mount_ext2fs(8)
  mount_fdescfs(8)
  mount_linprocfs(8)
  mount_mfs(8)
  mount_msdosfs(8)
  mount_nfs(8)
  mount_nfs4(8)
  mount_ntfs(8)
  mount_nullfs(8)
  mount_nwfs(8)
  mount_portalfs(8)
  mount_procfs(8)
  mount_smbfs(8)
  mount_std(8)
  mount_udf(8)
  mount_umapfs(8)
  mount_unionfs(8)
  mountd(8)
  moused(8)
  mrinfo(8)
  mrouted(8)
  mtest(8)
  mtrace(8)
  mtree(8)
  named-checkconf(8)
  named-checkzone(8)
  named(8)
  named.reconfig(8)
  named.reload(8)
  natd(8)
  ndiscvt(8)
  ndp(8)
  newfs(8)
  newfs_msdos(8)
  newkey(8)
  newsyslog(8)
  nextboot(8)
  nfsd(8)
  nfsiod(8)
  ngctl(8)
  nghook(8)
  nis(8)
  nologin(8)
  nos-tun(8)
  nsupdate(8)
  ntpd(8)
  ntpdate(8)
  ntpdc(8)
  ntpq(8)
  ntptime(8)
  ntptrace(8)
  pac(8)
  pam_chroot(8)
  pam_deny(8)
  pam_echo(8)
  pam_exec(8)
  pam_ftpusers(8)
  pam_group(8)
  pam_guest(8)
  pam_krb5(8)
  pam_ksu(8)
  pam_lastlog(8)
  pam_login_access(8)
  pam_nologin(8)
  pam_opie(8)
  pam_opieaccess(8)
  pam_passwdqc(8)
  pam_permit(8)
  pam_radius(8)
  pam_rhosts(8)
  pam_rootok(8)
  pam_securetty(8)
  pam_self(8)
  pam_ssh(8)
  pam_tacplus(8)
  pam_unix(8)
  pccardc(8)
  pccardd(8)
  pciconf(8)
  periodic(8)
  pfctl(8)
  pflogd(8)
  picobsd(8)
  ping(8)
  ping6(8)
  pnpinfo(8)
  ppp(8)
  pppctl(8)
  pppd(8)
  pppoed(8)
  pppstats(8)
  praliases(8)
  procctl(8)
  pstat(8)
  pw(8)
  pwd_mkdb(8)
  pxeboot(8)
  quot(8)
  quotacheck(8)
  quotaoff(8)
  quotaon(8)
  rarpd(8)
  raycontrol(8)
  rbootd(8)
  rc(8)
  rc.atm(8)
  rc.d(8)
  rc.early(8)
  rc.firewall(8)
  rc.local(8)
  rc.network(8)
  rc.pccard(8)
  rc.sendmail(8)
  rc.serial(8)
  rc.shutdown(8)
  rc.subr(8)
  rcorder(8)
  rdump(8)
  reboot(8)
  renice(8)
  repquota(8)
  rescue(8)
  restore(8)
  revnetgroup(8)
  rexecd(8)
  rfcomm_pppd(8)
  rip6query(8)
  rlogind(8)
  rmail(8)
  rmextattr(8)
  rmt(8)
  rmuser(8)
  rndc-confgen(8)
  rndc(8)
  route(8)
  route6d(8)
  routed(8)
  rpc.lockd(8)
  rpc.rquotad(8)
  rpc.rstatd(8)
  rpc.rusersd(8)
  rpc.rwalld(8)
  rpc.sprayd(8)
  rpc.statd(8)
  rpc.umntall(8)
  rpc.yppasswdd(8)
  rpc.ypxfrd(8)
  rpcbind(8)
  rpcinfo(8)
  rrenumd(8)
  rrestore(8)
  rshd(8)
  rtadvd(8)
  rtquery(8)
  rtsol(8)
  rtsold(8)
  rwhod(8)
  sa(8)
  savecore(8)
  sconfig(8)
  scspd(8)
  sdpcontrol(8)
  sdpd(8)
  securelevel(8)
  sendmail(8)
  setextattr(8)
  setfmac(8)
  setfsmac(8)
  setkey(8)
  setpmac(8)
  sftp-server(8)
  showmount(8)
  shutdown(8)
  sicontrol(8)
  slattach(8)
  slip(8)
  sliplogin(8)
  slstat(8)
  smbmsg(8)
  smrsh(8)
  spkrtest(8)
  spppcontrol(8)
  spray(8)
  ssh-keysign(8)
  sshd(8)
  sticky(8)
  strfile(8)
  sunlabel(8)
  swapctl(8)
  swapinfo(8)
  swapoff(8)
  swapon(8)
  sync(8)
  sysctl(8)
  sysinstall(8)
  syslogd(8)
  talkd(8)
  tcpd(8)
  tcpdchk(8)
  tcpdmatch(8)
  tcpdrop(8)
  telnetd(8)
  tftpd(8)
  timed(8)
  timedc(8)
  traceroute(8)
  traceroute6(8)
  trpt(8)
  tunefs(8)
  tzsetup(8)
  ugidfw(8)
  umount(8)
  unstr(8)
  updatedb(8)
  usbd(8)
  usbdevs(8)
  verify_krb5_conf(8)
  vinum(8)
  vipw(8)
  vmstat(8)
  vnconfig(8)
  watch(8)
  watchdog(8)
  watchdogd(8)
  wicontrol(8)
  wire-test(8)
  wlconfig(8)
  yp(8)
  yp_mkdb(8)
  ypbind(8)
  ypinit(8)
  yppoll(8)
  yppush(8)
  ypserv(8)
  ypset(8)
  ypxfr(8)
  zdump(8)
  zic(8)
  zzz(8)

inetd(8)

NAME

     inetd -- internet ``super-server''


SYNOPSIS

     inetd [-d] [-l] [-w] [-W] [-c maximum] [-C rate] [-a address | hostname]
	   [-p filename] [-R rate] [-s maximum] [configuration file]


DESCRIPTION

     The inetd utility should be run at boot time by /etc/rc (see rc(8)).  It
     then listens for connections on certain internet sockets.	When a connec-
     tion is found on one of its sockets, it decides what service the socket
     corresponds to, and invokes a program to service the request.  The server
     program is invoked with the service socket as its standard input, output
     and error descriptors.  After the program is finished, inetd continues to
     listen on the socket (except in some cases which will be described
     below).  Essentially, inetd allows running one daemon to invoke several
     others, reducing load on the system.

     The following options are available:

     -d      Turn on debugging.

     -l      Turn on logging of successful connections.

     -w      Turn on TCP Wrapping for external services.  See the
	     IMPLEMENTATION NOTES section for more information on TCP Wrappers
	     support.

     -W      Turn on TCP Wrapping for internal services which are built in to
	     inetd.

     -c maximum
	     Specify the default maximum number of simultaneous invocations of
	     each service; the default is unlimited.  May be overridden on a
	     per-service basis with the "max-child" parameter.

     -C rate
	     Specify the default maximum number of times a service can be
	     invoked from a single IP address in one minute; the default is
	     unlimited.  May be overridden on a per-service basis with the
	     "max-connections-per-ip-per-minute" parameter.

     -R rate
	     Specify the maximum number of times a service can be invoked in
	     one minute; the default is 256.  A rate of 0 allows an unlimited
	     number of invocations.

     -s maximum
	     Specify the default maximum number of simultaneous invocations of
	     each service from a single IP address; the default is unlimited.
	     May be overridden on a per-service basis with the "max-child-per-
	     ip" parameter.

     -a      Specify one specific IP address to bind to.  Alternatively, a
	     hostname can be specified, in which case the IPv4 or IPv6 address
	     which corresponds to that hostname is used.  Usually a hostname
	     is specified when inetd is run inside a jail(8), in which case

     -p      Specify an alternate file in which to store the process ID.

     Upon execution, inetd reads its configuration information from a configu-
     ration file which, by default, is /etc/inetd.conf.  There must be an
     entry for each field of the configuration file, with entries for each
     field separated by a tab or a space.  Comments are denoted by a ``#'' at
     the beginning of a line.  There must be an entry for each field.  The
     fields of the configuration file are as follows:

	   service name
	   socket type
	   protocol
	   {wait|nowait}[/max-child[/max-connections-per-ip-per-minute[/max-child-per-ip]]]
	   user[:group][/login-class]
	   server program
	   server program arguments

     To specify an ONC RPC-based service, the entry would contain these
     fields:

	   service name/version
	   socket type
	   rpc/protocol
	   user[:group][/login-class]
	   server program
	   server program arguments

     There are two types of services that inetd can start: standard and TCP-
     MUX.  A standard service has a well-known port assigned to it; it may be
     a service that implements an official Internet standard or is a
     BSD-specific service.  As described in RFC 1078, TCPMUX services are non-
     standard services that do not have a well-known port assigned to them.
     They are invoked from inetd when a program connects to the ``tcpmux''
     well-known port and specifies the service name.  This feature is useful
     for adding locally-developed servers.  TCPMUX requests are only accepted
     when the multiplexor service itself is enabled, above and beyond and spe-
     cific TCPMUX-based servers; see the discussion of internal services
     below.

     The service-name entry is the name of a valid service in the file
     /etc/services, or the specification of a UNIX domain socket (see below).
     For ``internal'' services (discussed below), the service name should be
     the official name of the service (that is, the first entry in
     /etc/services).  When used to specify an ONC RPC-based service, this
     field is a valid RPC service name in the file /etc/rpc.  The part on the
     right of the ``/'' is the RPC version number.  This can simply be a sin-
     gle numeric argument or a range of versions.  A range is bounded by the
     low version to the high version - ``rusers/1-3''.	For TCPMUX services,
     the value of the service-name field consists of the string ``tcpmux''
     followed by a slash and the locally-chosen service name.  The service
     names listed in /etc/services and the name ``help'' are reserved.	Try to
     choose unique names for your TCPMUX services by prefixing them with your
     organization's name and suffixing them with a version number.

     The socket-type should be one of ``stream'', ``dgram'', ``raw'', ``rdm'',
     or ``seqpacket'', depending on whether the socket is a stream, datagram,
     raw, reliably delivered message, or sequenced packet socket.  TCPMUX ser-
     T/TCP, one should specify ``tcp/ttcp'', which implies IPv4 for backward
     compatibility.  The name ``tcp4/ttcp'' specifies IPv4 only, while
     ``tcp6/ttcp'' specifies IPv6 only.  The name ``tcp46/ttcp'' specify that
     the entry accepts both IPv6 and IPv6 connections via a wildcard AF_INET6
     socket.  Rpc based services are specified with the ``rpc/tcp'' or
     ``rpc/udp'' service type.	One can use specify IPv4 and/or IPv6 with the
     4, 6 or 46 suffix, for example ``rpc/tcp6'' or ``rpc/udp46''.  TCPMUX
     services must use ``tcp'', ``tcp4'', ``tcp6'' or ``tcp46''.

     The wait/nowait entry specifies whether the server that is invoked by
     inetd will take over the socket associated with the service access point,
     and thus whether inetd should wait for the server to exit before listen-
     ing for new service requests.  Datagram servers must use ``wait'', as
     they are always invoked with the original datagram socket bound to the
     specified service address.  These servers must read at least one datagram
     from the socket before exiting.  If a datagram server connects to its
     peer, freeing the socket so inetd can receive further messages on the
     socket, it is said to be a ``multi-threaded'' server; it should read one
     datagram from the socket and create a new socket connected to the peer.
     It should fork, and the parent should then exit to allow inetd to check
     for new service requests to spawn new servers.  Datagram servers which
     process all incoming datagrams on a socket and eventually time out are
     said to be ``single-threaded''.  The comsat(8), (biff(1)) and talkd(8)
     utilities are both examples of the latter type of datagram server.  The
     tftpd(8) utility is an example of a multi-threaded datagram server.

     Servers using stream sockets generally are multi-threaded and use the
     ``nowait'' entry.	Connection requests for these services are accepted by
     inetd, and the server is given only the newly-accepted socket connected
     to a client of the service.  Most stream-based services operate in this
     manner.  Stream-based servers that use ``wait'' are started with the lis-
     tening service socket, and must accept at least one connection request
     before exiting.  Such a server would normally accept and process incoming
     connection requests until a timeout.  TCPMUX services must use
     ``nowait''.

     The maximum number of outstanding child processes (or ``threads'') for a
     ``nowait'' service may be explicitly specified by appending a ``/'' fol-
     lowed by the number to the ``nowait'' keyword.  Normally (or if a value
     of zero is specified) there is no maximum.  Otherwise, once the maximum
     is reached, further connection attempts will be queued up until an exist-
     ing child process exits.  This also works in the case of ``wait'' mode,
     although a value other than one (the default) might not make sense in
     some cases.  You can also specify the maximum number of connections per
     minute for a given IP address by appending a ``/'' followed by the number
     to the maximum number of outstanding child processes.  Once the maximum
     is reached, further connections from this IP address will be dropped
     until the end of the minute.  In addition, you can specify the maximum
     number of simultaneous invocations of each service from a single IP
     address by appending a ``/'' followed by the number to the maximum number
     of outstanding child processes.  Once the maximum is reached, further
     connections from this IP address will be dropped.

     The user entry should contain the user name of the user as whom the
     server should run.  This allows for servers to be given less permission
     than root.  Optional group part separated by ``:'' allows to specify
     group name different than default group for this user.  Optional
     login-class part separated by ``/'' allows to specify login class differ-
     starting with argv[0], which is the name of the program.  If the service
     is provided internally, the service-name of the service (and any argu-
     ments to it) or the word ``internal'' should take the place of this
     entry.

     Currently, the only internal service to take arguments is ``auth''.
     Without options, the service will always return ``ERROR : HIDDEN-USER''.
     The available arguments to this service that alter its behavior are:

     -d fallback
	     Provide a fallback username.  If the real ``auth'' service is
	     enabled (with the -r option discussed below), return this user-
	     name instead of an error when lookups fail for either socket cre-
	     dentials or the username.	If the real ``auth'' service is dis-
	     abled, return this username for every request.  This is primarily
	     useful when running this service on a NAT machine.

     -g      Instead of returning the user's name to the ident requester,
	     report a username made up of random alphanumeric characters, e.g.
	     ``c0c993''.  The -g flag overrides not only the user names, but
	     also any fallback name, .fakeid or .noident files.

     -t sec[.usec]
	     Specify a timeout for the service.  The default timeout is 10.0
	     seconds.

     -r      Offer a real ``auth'' service, as per RFC 1413.  All the remain-
	     ing flags apply only in this case.

     -i      Return numeric user IDs instead of usernames.

     -f      If the file .fakeid exists in the home directory of the identi-
	     fied user, report the username found in that file instead of the
	     real username.  If the username found in .fakeid is that of an
	     existing user, then the real username is reported.  If the -i
	     flag is also given then the username in .fakeid is checked
	     against existing user IDs instead.

     -F      same as -f but without the restriction that the username in
	     .fakeid must not match an existing user.

     -n      If the file .noident exists in the home directory of the identi-
	     fied user, return ``ERROR : HIDDEN-USER''.  This overrides any
	     fakeid file which might exist.

     -o osname
	     Use osname instead of the name of the system as reported by
	     uname(3).

     The inetd utility also provides several other ``trivial'' services inter-
     nally by use of routines within itself.  These services are ``echo'',
     ``discard'', ``chargen'' (character generator), ``daytime'' (human read-
     able time), and ``time'' (machine readable time, in the form of the num-
     ber of seconds since midnight, January 1, 1900).  All of these services
     are available in both TCP and UDP versions; the UDP versions will refuse
     service if the request specifies a reply port corresponding to any inter-
     nal service.  (This is done as a defense against looping attacks; the
     remote IP address is logged.)  For details of these services, consult the
     When given the -l option inetd will log an entry to syslog each time a
     connection is accepted, noting the service selected and the IP-number of
     the remote requester if available.  Unless otherwise specified in the
     configuration file, and in the absence of the -W and -w options, inetd
     will log to the ``daemon'' facility.

     The inetd utility rereads its configuration file when it receives a
     hangup signal, SIGHUP.  Services may be added, deleted or modified when
     the configuration file is reread.	Except when started in debugging mode,
     inetd records its process ID in the file /var/run/inetd.pid to assist in
     reconfiguration.


IMPLEMENTATION NOTES

   TCP Wrappers
     When given the -w option, inetd will wrap all services specified as
     ``stream nowait'' or ``dgram'' except for ``internal'' services.  If the
     -W option is given, such ``internal'' services will be wrapped.  If both
     options are given, wrapping for both internal and external services will
     be enabled.  Either wrapping option will cause failed connections to be
     logged to the ``auth'' syslog facility.  Adding the -l flag to the wrap-
     ping options will include successful connections in the logging to the
     ``auth'' facility.

     Note that inetd only wraps requests for a ``wait'' service while no
     servers are available to service requests.  Once a connection to such a
     service has been allowed, inetd has no control over subsequent connec-
     tions to the service until no more servers are left listening for connec-
     tion requests.

     When wrapping is enabled, the tcpd daemon is not required, as that func-
     tionality is builtin.  For more information on TCP Wrappers, see the rel-
     evant documentation (hosts_access(5)).  When reading that document, keep
     in mind that ``internal'' services have no associated daemon name.
     Therefore, the service name as specified in inetd.conf should be used as
     the daemon name for ``internal'' services.

   TCPMUX
     RFC 1078 describes the TCPMUX protocol: ``A TCP client connects to a for-
     eign host on TCP port 1.  It sends the service name followed by a car-
     riage-return line-feed <CRLF>.  The service name is never case sensitive.
     The server replies with a single character indicating positive (+) or
     negative (-) acknowledgment, immediately followed by an optional message
     of explanation, terminated with a <CRLF>.	If the reply was positive, the
     selected protocol begins; otherwise the connection is closed.''  The pro-
     gram is passed the TCP connection as file descriptors 0 and 1.

     If the TCPMUX service name begins with a ``+'', inetd returns the posi-
     tive reply for the program.  This allows you to invoke programs that use
     stdin/stdout without putting any special server code in them.

     The special service name ``help'' causes inetd to list TCPMUX services in
     inetd.conf.

   IPsec
     The implementation includes a tiny hack to support IPsec policy settings
     for each socket.  A special form of comment line, starting with ``#@'',
     is interpreted as a policy specifier.  Everything after the ``#@'' will
     be used as an IPsec policy string, as described in ipsec_set_policy(3).
     In addition to running services on IP sockets, inetd can also manage UNIX
     domain sockets.  To do this you specify a protocol of ``unix'' and spec-
     ify the UNIX domain socket as the service-name.  The service-type may be
     ``stream'' or ``dgram''.  The specification of the socket must be an
     absolute path name, optionally prefixed by an owner and mode of the form
     :user:group:mode:.  The specification:

	   :news:daemon:220:/var/run/sock

     creates a socket owned by user ``news'' in group ``daemon'' with permis-
     sions allowing only that user and group to connect.  The default owner is
     the user that inetd is running as.  The default mode only allows the
     socket's owner to connect.

     WARNING: while creating UNIX domain socket, inetd must change the owner-
     ship and permissions on the socket.  This can only be done securely if
     the directory in which the socket is created is writable only by root.
     Do NOT use inetd to create sockets in world writable directories, such as
     /tmp, instead use /var/run or a similar directory.

     Internal services may be run on UNIX domain sockets, in the usual way.
     In this case the name of the internal service is determined using the
     last component of the socket's pathname.


FILES

     /etc/inetd.conf	 configuration file
     /etc/rpc		 translation of service names to RPC program numbers
     /etc/services	 translation of service names to port numbers
     /var/run/inetd.pid  the pid of the currently running inetd


EXAMPLES

     Here are several example service entries for the various types of ser-
     vices:

     ftp	  stream  tcp	nowait root  /usr/libexec/ftpd	      ftpd -l
     ntalk	  dgram   udp	wait   root  /usr/libexec/ntalkd      ntalkd
     telnet	  stream  tcp6	nowait root  /usr/libexec/telnetd  telnetd
     shell	  stream  tcp46  nowait root  /usr/libexec/rshd rshd
     tcpmux/+date stream  tcp	nowait guest /bin/date		      date
     tcpmux/phonebook stream tcp nowait guest /usr/local/bin/phonebook phonebook
     rstatd/1-3   dgram   rpc/udp wait root  /usr/libexec/rpc.rstatd  rpc.rstatd
     /var/run/echo stream unix	nowait root  internal
     #@ ipsec ah/require
     chargen	  stream  tcp	nowait root  internal
     #@


ERROR MESSAGES

     The inetd server logs error messages using syslog(3).  Important error
     messages and their explanations are:

     service/protocol server failing (looping), service terminated.
     The number of requests for the specified service in the past minute
     exceeded the limit.  The limit exists to prevent a broken program or a
     malicious user from swamping the system.  This message may occur for sev-
     eral reasons:

	   1.	There are many hosts requesting the service within a short
		time period.
		to retry quickly.

     Use the -R rate option, as described above, to change the rate limit.
     Once the limit is reached, the service will be reenabled automatically in
     10 minutes.

     service/protocol: No such user user, service ignored
     service/protocol: getpwnam: user: No such user
     No entry for user exists in the passwd(5) database.  The first message
     occurs when inetd (re)reads the configuration file.  The second message
     occurs when the service is invoked.

     service: can't set uid uid
     service: can't set gid gid
     The user or group ID for the entry's user field is invalid.

     setsockopt(SO_PRIVSTATE): Operation not supported
     The inetd utility attempted to renounce the privileged state associated
     with a socket but was unable to.


SEE ALSO

     ipsec_set_policy(3), hosts_access(5), hosts_options(5), login.conf(5),
     passwd(5), rpc(5), services(5), comsat(8), fingerd(8), ftpd(8),
     rexecd(8), rlogind(8), rpcbind(8), rshd(8), telnetd(8), tftpd(8)

     Michael C. St. Johns, Identification Protocol, RFC1413.


HISTORY

     The inetd utility appeared in 4.3BSD.  TCPMUX is based on code and docu-
     mentation by Mark Lottor.	Support for ONC RPC based services is modeled
     after that provided by SunOS 4.1.	The IPsec hack was contributed by the
     KAME project in 1999.  The FreeBSD TCP Wrappers support first appeared in
     FreeBSD 3.2.

FreeBSD 5.4		       February 7, 1996 		   FreeBSD 5.4

SPONSORED LINKS




Man(1) output converted with man2html , sed , awk