1.\" Copyright (c) 1980, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. 9.\" 2. Redistributions in binary form must reproduce the above copyright 10.\" notice, this list of conditions and the following disclaimer in the 11.\" documentation and/or other materials provided with the distribution. 12.\" 3. All advertising materials mentioning features or use of this software 13.\" must display the following acknowledgement: 14.\" This product includes software developed by the University of 15.\" California, Berkeley and its contributors. 16.\" 4. Neither the name of the University nor the names of its contributors 17.\" may be used to endorse or promote products derived from this software 18.\" without specific prior written permission. 19.\" 20.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 21.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" @(#)fingerd.8 8.1 (Berkeley) 6/4/93 33.\" $FreeBSD$ 34.\" 35.Dd June 4, 1993 36.Dt FINGERD 8 37.Os 38.Sh NAME 39.Nm fingerd 40.Nd remote user information server 41.Sh SYNOPSIS 42.Nm 43.Op Fl s 44.Op Fl l 45.Op Fl p Ar filename 46.Sh DESCRIPTION 47The 48.Nm 49utility is a simple protocol based on 50.%T RFC1196 51that provides an interface to the 52Name and Finger programs at several network sites. 53The program is supposed to return a friendly, 54human-oriented status report on either the system at the moment 55or a particular person in depth. 56There is no required format and the 57protocol consists mostly of specifying a single 58.Dq command line . 59.Pp 60The 61.Nm 62utility is started by 63.Xr inetd 8 , 64which listens for 65.Tn TCP 66requests at port 79. 67Once connected it reads a single command line 68terminated by a 69.Aq Tn CRLF 70which is passed to 71.Xr finger 1 . 72The 73.Nm 74utility closes its connections as soon as the output is finished. 75.Pp 76If the line is null (i.e. just a 77.Aq Tn CRLF 78is sent) then 79.Xr finger 1 80returns a 81.Dq default 82report that lists all people logged into 83the system at that moment. 84.Pp 85If a user name is specified (e.g.\& 86.Pf eric Aq Tn CRLF ) 87then the 88response lists more extended information for only that particular user, 89whether logged in or not. 90Allowable 91.Dq names 92in the command line include both 93.Dq login names 94and 95.Dq user names . 96If a name is ambiguous, all possible derivations are returned. 97.Pp 98The following options may be passed to 99.Nm 100as server program arguments in 101.Pa /etc/inetd.conf : 102.Bl -tag -width indent 103.It Fl s 104Enable secure mode. 105Queries without a user name are rejected and 106forwarding of queries to other remote hosts is denied. 107.It Fl l 108Enable logging. 109The name of the host originating the query is reported via 110.Xr syslog 3 111at LOG_NOTICE priority. 112.It Fl p 113Use an alternate program as the local information provider. 114The default local program 115executed by 116.Nm 117is 118.Xr finger 1 . 119By specifying a customized local server, 120this option allows a system manager 121to have more control over what information is 122provided to remote sites. 123If 124.Fl p 125is specified, 126.Nm 127will also set the environment variable 128.Ev FINGERD_REMOTE_HOST 129to the name of the host making the request. 130.El 131.Sh SEE ALSO 132.Xr finger 1 , 133.Xr inetd 8 134.Sh BUGS 135Connecting directly to the server from a 136.Tn TIP 137or an equally narrow-minded 138.Tn TELNET Ns \-protocol 139user program can result 140in meaningless attempts at option negotiation being sent to the 141server, which will foul up the command line interpretation. 142The 143.Nm 144utility should be taught to filter out 145.Tn IAC Ns \'s 146and perhaps even respond 147negatively 148.Pq Tn IAC WON'T 149to all option commands received. 150.Sh HISTORY 151The 152.Nm 153utility appeared in 154.Bx 4.3 . 155