1.\" Copyright (c) 1980, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. 9.\" 2. Redistributions in binary form must reproduce the above copyright 10.\" notice, this list of conditions and the following disclaimer in the 11.\" documentation and/or other materials provided with the distribution. 12.\" 3. All advertising materials mentioning features or use of this software 13.\" must display the following acknowledgement: 14.\" This product includes software developed by the University of 15.\" California, Berkeley and its contributors. 16.\" 4. Neither the name of the University nor the names of its contributors 17.\" may be used to endorse or promote products derived from this software 18.\" without specific prior written permission. 19.\" 20.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 21.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" @(#)fingerd.8 8.1 (Berkeley) 6/4/93 33.\" $FreeBSD$ 34.\" 35.Dd April 1, 2010 36.Dt FINGERD 8 37.Os 38.Sh NAME 39.Nm fingerd 40.Nd remote user information server 41.Sh SYNOPSIS 42.Nm 43.Op Fl d 44.Op Fl k 45.Op Fl s 46.Op Fl l 47.Op Fl p Ar filename 48.Sh DESCRIPTION 49The 50.Nm 51utility uses a simple protocol based on 52.%T RFC1196 53that provides an interface to 54.Xr finger 1 55at several network sites. 56It is supposed to return a friendly, 57human-oriented status report on either the system at the moment 58or a particular person in depth. 59There is no required format and the 60protocol consists mostly of specifying a single 61.Dq "command line" , 62thus, 63.Nm 64can also be used to implement other protocols in conjunction with the 65.Fl p 66flag. 67.Pp 68The 69.Nm 70utility is started by 71.Xr inetd 8 , 72which listens for 73.Tn TCP 74requests at port 79. 75Once connected it reads a single command line 76terminated by a 77.Aq Tn CRLF 78which is passed to 79.Xr finger 1 . 80The 81.Nm 82utility closes its connections as soon as the output is finished. 83.Pp 84If the line is null (i.e., just a 85.Aq Tn CRLF 86is sent) then 87.Xr finger 1 88returns a 89.Dq default 90report that lists all people logged into 91the system at that moment. 92.Pp 93If a user name is specified (e.g.\& 94.Pf eric Aq Tn CRLF ) 95then the 96response lists more extended information for only that particular user, 97whether logged in or not. 98Allowable 99.Dq names 100in the command line include both 101.Dq login names 102and 103.Dq user names . 104If a name is ambiguous, all possible derivations are returned. 105.Pp 106The following options may be passed to 107.Nm 108as server program arguments in 109.Pa /etc/inetd.conf : 110.Bl -tag -width indent 111.It Fl d 112Enable debugging mode. 113In debugging mode, 114.Nm 115will not attempt any network-related operations on 116.Va stdin , 117and it will print the full 118.Nm finger 119command line 120to 121.Va stderr 122before executing it. 123.It Fl k 124Suppress login information. 125See the description of the 126.Fl k 127option in 128.Xr finger 1 129for details. 130.It Fl s 131Enable secure mode. 132Queries without a user name are rejected and 133forwarding of queries to other remote hosts is denied. 134.It Fl l 135Enable logging. 136The name of the host originating the query is reported via 137.Xr syslog 3 138at LOG_NOTICE priority. 139.It Fl p 140Use an alternate program as the local information provider. 141The default local program 142executed by 143.Nm 144is 145.Xr finger 1 . 146By specifying a customized local server, 147this option allows a system manager 148to have more control over what information is 149provided to remote sites. 150If 151.Fl p 152is specified, 153.Nm 154will also set the environment variable 155.Ev FINGERD_REMOTE_HOST 156to the name of the host making the request. 157.El 158.Sh SEE ALSO 159.Xr finger 1 , 160.Xr inetd 8 161.Sh HISTORY 162The 163.Nm 164utility appeared in 165.Bx 4.3 . 166.Sh BUGS 167Connecting directly to the server from a 168.Tn TIP 169or an equally narrow-minded 170.Tn TELNET Ns \-protocol 171user program can result 172in meaningless attempts at option negotiation being sent to the 173server, which will foul up the command line interpretation. 174The 175.Nm 176utility should be taught to filter out 177.Tn IAC Ns \'s 178and perhaps even respond 179negatively 180.Pq Tn IAC WON'T 181to all option commands received. 182