xref: /freebsd/usr.sbin/inetd/inetd.8 (revision b52b9d56d4e96089873a75f9e29062eec19fabba)
1.\" Copyright (c) 1985, 1991, 1993, 1994
2.\"	The Regents of the University of California.  All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\"    notice, this list of conditions and the following disclaimer.
9.\" 2. Redistributions in binary form must reproduce the above copyright
10.\"    notice, this list of conditions and the following disclaimer in the
11.\"    documentation and/or other materials provided with the distribution.
12.\" 3. All advertising materials mentioning features or use of this software
13.\"    must display the following acknowledgement:
14.\"	This product includes software developed by the University of
15.\"	California, Berkeley and its contributors.
16.\" 4. Neither the name of the University nor the names of its contributors
17.\"    may be used to endorse or promote products derived from this software
18.\"    without specific prior written permission.
19.\"
20.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\"     from: @(#)inetd.8	8.3 (Berkeley) 4/13/94
33.\" $FreeBSD$
34.\"
35.Dd February 7, 1996
36.Dt INETD 8
37.Os
38.Sh NAME
39.Nm inetd
40.Nd internet
41.Dq super-server
42.Sh SYNOPSIS
43.Nm
44.Op Fl d
45.Op Fl l
46.Op Fl w
47.Op Fl W
48.Op Fl c Ar maximum
49.Op Fl C Ar rate
50.Op Fl a Ar address | hostname
51.Op Fl p Ar filename
52.Op Fl R Ar rate
53.Op Ar configuration file
54.Sh DESCRIPTION
55The
56.Nm
57utility should be run at boot time by
58.Pa /etc/rc
59(see
60.Xr rc 8 ) .
61It then listens for connections on certain
62internet sockets.  When a connection is found on one
63of its sockets, it decides what service the socket
64corresponds to, and invokes a program to service the request.
65The server program is invoked with the service socket
66as its standard input, output and error descriptors.
67After the program is
68finished,
69.Nm
70continues to listen on the socket (except in some cases which
71will be described below).  Essentially,
72.Nm
73allows running one daemon to invoke several others,
74reducing load on the system.
75.Pp
76The following options are available:
77.Bl -tag -width indent
78.It Fl d
79Turn on debugging.
80.It Fl l
81Turn on logging of successful connections.
82.It Fl w
83Turn on TCP Wrapping for external services.
84See the
85.Sx "IMPLEMENTATION NOTES"
86section for more information on TCP Wrappers support.
87.It Fl W
88Turn on TCP Wrapping for internal services which are built in to
89.Nm .
90.It Fl c Ar maximum
91Specify the default maximum number of
92simultaneous invocations of each service;
93the default is unlimited.
94May be overridden on a per-service basis with the "max-child"
95parameter.
96.It Fl C Ar rate
97Specify the default maximum number of times a service can be invoked
98from a single IP address in one minute; the default is unlimited.
99May be overridden on a per-service basis with the
100"max-connections-per-ip-per-minute" parameter.
101.It Fl R Ar rate
102Specify the maximum number of times a service can be invoked
103in one minute; the default is 256.
104A rate of 0 allows an unlimited number of invocations.
105.It Fl a
106Specify one specific IP address to bind to.
107Alternatively, a hostname can be specified,
108in which case the IPv4 or IPv6 address
109which corresponds to that hostname is used.
110Usually a hostname is specified when
111.Nm
112is run inside a
113.Xr jail 8 ,
114in which case the hostname corresponds to the
115.Xr jail 8
116environment.
117.Pp
118When hostname specification is used
119and both IPv4 and IPv6 bindings are desired,
120one entry with the appropriate
121.Em protocol
122type for each binding
123is required for each service in
124.Pa /etc/inetd.conf .
125For example,
126a TCP-based service would need two entries,
127one using
128.Dq tcp4
129for the
130.Em protocol
131and the other using
132.Dq tcp6 .
133See the explanation of the
134.Pa /etc/inetd.conf
135.Em protocol
136field below.
137.It Fl p
138Specify an alternate file in which to store the process ID.
139.El
140.Pp
141Upon execution,
142.Nm
143reads its configuration information from a configuration
144file which, by default, is
145.Pa /etc/inetd.conf .
146There must be an entry for each field of the configuration
147file, with entries for each field separated by a tab or
148a space.  Comments are denoted by a
149.Dq #
150at the beginning
151of a line.  There must be an entry for each field.  The
152fields of the configuration file are as follows:
153.Pp
154.Bd -unfilled -offset indent -compact
155service name
156socket type
157protocol
158{wait|nowait}[/max-child[/max-connections-per-ip-per-minute]]
159user[:group][/login-class]
160server program
161server program arguments
162.Ed
163.Pp
164To specify an
165.Tn "ONC RPC" Ns -based
166service, the entry would contain these fields:
167.Pp
168.Bd -unfilled -offset indent -compact
169service name/version
170socket type
171rpc/protocol
172user[:group][/login-class]
173server program
174server program arguments
175.Ed
176.Pp
177There are two types of services that
178.Nm
179can start: standard and TCPMUX.
180A standard service has a well-known port assigned to it;
181it may be a service that implements an official Internet standard or is a
182.Bx Ns -specific
183service.
184As described in
185.Tn RFC 1078 ,
186TCPMUX services are nonstandard services that do not have a
187well-known port assigned to them.
188They are invoked from
189.Nm
190when a program connects to the
191.Dq tcpmux
192well-known port and specifies
193the service name.
194This feature is useful for adding locally-developed servers.
195TCPMUX requests are only accepted when the multiplexor service itself
196is enabled, above and beyond and specific TCPMUX-based servers; see the
197discussion of internal services below.
198.Pp
199The
200.Em service-name
201entry is the name of a valid service in
202the file
203.Pa /etc/services ,
204or the specification of a
205.Ux
206domain socket (see below).
207For
208.Dq internal
209services (discussed below), the service
210name
211should
212be the official name of the service (that is, the first entry in
213.Pa /etc/services ) .
214When used to specify an
215.Tn "ONC RPC" Ns -based
216service, this field is a valid RPC service name in
217the file
218.Pa /etc/rpc .
219The part on the right of the
220.Dq /
221is the RPC version number.
222This
223can simply be a single numeric argument or a range of versions.
224A range is bounded by the low version to the high version -
225.Dq rusers/1-3 .
226For TCPMUX services, the value of the
227.Em service-name
228field consists of the string
229.Dq tcpmux
230followed by a slash and the
231locally-chosen service name.
232The service names listed in
233.Pa /etc/services
234and the name
235.Dq help
236are reserved.
237Try to choose unique names for your TCPMUX services by prefixing them with
238your organization's name and suffixing them with a version number.
239.Pp
240The
241.Em socket-type
242should be one of
243.Dq stream ,
244.Dq dgram ,
245.Dq raw ,
246.Dq rdm ,
247or
248.Dq seqpacket ,
249depending on whether the socket is a stream, datagram, raw,
250reliably delivered message, or sequenced packet socket.
251TCPMUX services must use
252.Dq stream .
253.Pp
254The
255.Em protocol
256must be a valid protocol or
257.Dq unix .
258Examples are
259.Dq tcp
260or
261.Dq udp ,
262both of which imply IPv4 for backward compatibility.
263The names
264.Dq tcp4
265and
266.Dq udp4
267specify IPv4 only.
268The names
269.Dq tcp6
270and
271.Dq udp6
272specify IPv6 only.
273The names
274.Dq tcp46
275and
276.Dq udp46
277specify that the entry accepts both IPv4 and IPv6 connections
278via a wildcard
279.Dv AF_INET6
280socket.
281If it is desired that the service is reachable via T/TCP, one should
282specify
283.Dq tcp/ttcp ,
284which implies IPv4 for backward compatibility.
285The name
286.Dq tcp4/ttcp
287specifies IPv4 only, while
288.Dq tcp6/ttcp
289specifies IPv6 only.
290The name
291.Dq tcp46/ttcp
292specify that the entry accepts both IPv6 and IPv6 connections
293via a wildcard
294.Dv AF_INET6
295socket.
296Rpc based services
297are specified with the
298.Dq rpc/tcp
299or
300.Dq rpc/udp
301service type.
302One can use specify IPv4 and/or IPv6 with the 4, 6 or 46 suffix, for example
303.Dq rpc/tcp6
304or
305.Dq rpc/udp46 .
306TCPMUX services must use
307.Dq tcp ,
308.Dq tcp4 ,
309.Dq tcp6
310or
311.Dq tcp46 .
312.Pp
313The
314.Em wait/nowait
315entry specifies whether the server that is invoked by
316.Nm
317will take over
318the socket associated with the service access point, and thus whether
319.Nm
320should wait for the server to exit before listening for new service
321requests.
322Datagram servers must use
323.Dq wait ,
324as they are always invoked with the original datagram socket bound
325to the specified service address.
326These servers must read at least one datagram from the socket
327before exiting.
328If a datagram server connects
329to its peer, freeing the socket so
330.Nm
331can receive further messages on the socket, it is said to be
332a
333.Dq multi-threaded
334server;
335it should read one datagram from the socket and create a new socket
336connected to the peer.
337It should fork, and the parent should then exit
338to allow
339.Nm
340to check for new service requests to spawn new servers.
341Datagram servers which process all incoming datagrams
342on a socket and eventually time out are said to be
343.Dq single-threaded .
344.Xr Comsat 8 ,
345.Pq Xr biff 1
346and
347.Xr talkd 8
348are both examples of the latter type of
349datagram server.
350.Xr Tftpd 8
351is an example of a multi-threaded datagram server.
352.Pp
353Servers using stream sockets generally are multi-threaded and
354use the
355.Dq nowait
356entry.
357Connection requests for these services are accepted by
358.Nm Ns ,
359and the server is given only the newly-accepted socket connected
360to a client of the service.
361Most stream-based services operate in this manner.
362Stream-based servers that use
363.Dq wait
364are started with the listening service socket, and must accept
365at least one connection request before exiting.
366Such a server would normally accept and process incoming connection
367requests until a timeout.
368TCPMUX services must use
369.Dq nowait .
370.Pp
371The maximum number of outstanding child processes (or
372.Dq threads )
373for a
374.Dq nowait
375service may be explicitly specified by appending a
376.Dq /
377followed by the number to the
378.Dq nowait
379keyword.
380Normally
381(or if a value of zero is specified) there is no maximum.
382Otherwise,
383once the maximum is reached, further connection attempts will be
384queued up until an existing child process exits.
385This also works
386in the case of
387.Dq wait
388mode, although a value other than one (the
389default) might not make sense in some cases.
390You can also specify the maximum number of connections per minute
391for a given IP address by appending
392a
393.Dq /
394followed by the number to the maximum number of
395outstanding child processes.
396Once the maximum is reached, further
397connections from this IP address will be dropped until the end of the
398minute.
399.Pp
400The
401.Em user
402entry should contain the user name of the user as whom the server
403should run.  This allows for servers to be given less permission
404than root.
405Optional
406.Em group
407part separated by
408.Dq \&:
409allows to specify group name different
410than default group for this user.
411Optional
412.Em login-class
413part separated by
414.Dq /
415allows to specify login class different
416than default
417.Dq daemon
418login class.
419.Pp
420The
421.Em server-program
422entry should contain the pathname of the program which is to be
423executed by
424.Nm
425when a request is found on its socket.  If
426.Nm
427provides this service internally, this entry should
428be
429.Dq internal .
430.Pp
431The
432.Em server program arguments
433should be just as arguments
434normally are, starting with argv[0], which is the name of
435the program.  If the service is provided internally, the
436.Em service-name
437of the service (and any arguments to it) or the word
438.Dq internal
439should take the place of this entry.
440.Pp
441Currently, the only internal service to take arguments is
442.Dq auth .
443Without options, the service will always return
444.Dq ERROR\ : HIDDEN-USER .
445The available arguments to this service that alter its behavior are:
446.Bl -tag -width indent
447.It Fl d Ar fallback
448Provide a
449.Ar fallback
450username.
451If the real
452.Dq auth
453service is enabled
454(with the
455.Fl r
456option discussed below),
457return this username instead of an error
458when lookups fail
459for either socket credentials or the username.
460If the real
461.Dq auth
462service is disabled,
463return this username for every request.
464This is primarily useful when running this service on a NAT machine.
465.It Fl g
466Instead of returning
467the user's name to the ident requester,
468report a
469username made up of random alphanumeric characters,
470e.g.\&
471.Dq c0c993 .
472The
473.Fl g
474flag overrides not only the user names,
475but also any fallback name,
476.Pa .fakeid
477or
478.Pa .noident
479files.
480.It Fl t Xo
481.Ar sec Ns Op . Ns Ar usec
482.Xc
483Specify a timeout for the service.
484The default timeout is 10.0 seconds.
485.It Fl r
486Offer a real
487.Dq auth
488service, as per RFC 1413.
489All the remaining flags apply only in this case.
490.It Fl i
491Return numeric user IDs instead of usernames.
492.It Fl f
493If the file
494.Pa .fakeid
495exists in the home directory of the identified user, report the username
496found in that file instead of the real username.
497If the username found in
498.Pa .fakeid
499is that of an existing user,
500then the real username is reported.
501If the
502.Fl i
503flag is also given then the username in
504.Pa .fakeid
505is checked against existing user IDs instead.
506.It Fl F
507same as
508.Fl f
509but without the restriction that the username in
510.Pa .fakeid
511must not match an existing user.
512.It Fl n
513If the file
514.Pa .noident
515exists in the home directory of the identified user, return
516.Dq ERROR\ : HIDDEN-USER .
517This overrides any
518.Pa fakeid
519file which might exist.
520.It Fl o Ar osname
521Use
522.Ar osname
523instead of the name of the system as reported by
524.Xr uname 3 .
525.El
526.Pp
527The
528.Nm
529utility also provides several other
530.Dq trivial
531services internally by use of
532routines within itself.  These services are
533.Dq echo ,
534.Dq discard ,
535.Dq chargen
536(character generator),
537.Dq daytime
538(human readable time), and
539.Dq time
540(machine readable time, in the form of the number of seconds since
541midnight, January 1, 1900).  All of these services are available in
542both TCP and UDP versions; the UDP versions will refuse service if the
543request specifies a reply port corresponding to any internal service.
544(This is done as a defense against looping attacks; the remote IP address
545is logged.)
546For details of these services, consult the
547appropriate
548.Tn RFC
549document.
550.Pp
551The TCPMUX-demultiplexing service is also implemented as an internal service.
552For any TCPMUX-based service to function, the following line must be included
553in
554.Pa inetd.conf :
555.Bd -literal -offset indent
556tcpmux	stream	tcp	nowait	root	internal
557.Ed
558.Pp
559When given the
560.Fl l
561option
562.Nm
563will log an entry to syslog each time a connection is accepted, noting the
564service selected and the IP-number of the remote requester if available.
565Unless otherwise specified in the configuration file,
566and in the absence of the
567.Fl W
568and
569.Fl w
570options,
571.Nm
572will log to the
573.Dq daemon
574facility.
575.Pp
576The
577.Nm
578utility rereads its configuration file when it receives a hangup signal,
579.Dv SIGHUP .
580Services may be added, deleted or modified when the configuration file
581is reread.
582Except when started in debugging mode,
583.Nm
584records its process ID in the file
585.Pa /var/run/inetd.pid
586to assist in reconfiguration.
587.Sh IMPLEMENTATION NOTES
588.Ss TCP Wrappers
589When given the
590.Fl w
591option,
592.Nm
593will wrap all services specified as
594.Dq stream nowait
595or
596.Dq dgram
597except for
598.Dq internal
599services.
600If the
601.Fl W
602option is given, such
603.Dq internal
604services will be wrapped.
605If both options are given, wrapping for both
606internal and external services will be enabled.
607Either wrapping option
608will cause failed connections to be logged to the
609.Dq auth
610syslog facility.
611Adding the
612.Fl l
613flag to the wrapping options will include successful connections in the
614logging to the
615.Dq auth
616facility.
617.Pp
618Note that
619.Nm
620only wraps requests for a
621.Dq wait
622service while no servers are available to service requests.
623Once a
624connection to such a service has been allowed,
625.Nm
626has no control
627over subsequent connections to the service until no more servers
628are left listening for connection requests.
629.Pp
630When wrapping is enabled, the
631.Pa tcpd
632daemon is not required, as that functionality is builtin.
633For more information on TCP Wrappers, see the relevant documentation
634.Pq Xr hosts_access 5 .
635When reading that document, keep in mind that
636.Dq internal
637services have no associated daemon name.
638Therefore, the service name
639as specified in
640.Pa inetd.conf
641should be used as the daemon name for
642.Dq internal
643services.
644.Ss TCPMUX
645.Tn RFC 1078
646describes the TCPMUX protocol:
647``A TCP client connects to a foreign host on TCP port 1.  It sends the
648service name followed by a carriage-return line-feed <CRLF>.  The
649service name is never case sensitive.  The server replies with a
650single character indicating positive (+) or negative (\-)
651acknowledgment, immediately followed by an optional message of
652explanation, terminated with a <CRLF>.  If the reply was positive,
653the selected protocol begins; otherwise the connection is closed.''
654The program is passed the TCP connection as file descriptors 0 and 1.
655.Pp
656If the TCPMUX service name begins with a
657.Dq + ,
658.Nm
659returns the positive reply for the program.
660This allows you to invoke programs that use stdin/stdout
661without putting any special server code in them.
662.Pp
663The special service name
664.Dq help
665causes
666.Nm
667to list TCPMUX services in
668.Pa inetd.conf .
669.Ss IPsec
670The implementation includes a tiny hack
671to support IPsec policy settings for each socket.
672A special form of comment line, starting with
673.Dq Li #@ ,
674is interpreted as a policy specifier.
675Everything after the
676.Dq Li #@
677will be used as an IPsec policy string,
678as described in
679.Xr ipsec_set_policy 3 .
680Each
681policy specifier is applied to all the following lines in
682.Pa inetd.conf
683until the next policy specifier.
684An empty policy specifier resets the IPsec policy.
685.Pp
686If an invalid IPsec policy specifier appears in
687.Pa inetd.conf ,
688.Nm
689will provide an error message via the
690.Xr syslog 3
691interface and abort execution.
692.Ss Ux Domain Sockets
693In addition to running services on IP sockets,
694.Nm
695can also manage
696.Ux
697domain sockets.
698To do this you specify a
699.Em protocol
700of
701.Dq unix
702and specify the
703.Ux
704domain socket as the
705.Em service-name .
706The
707.Em service-type
708may be
709.Dq stream
710or
711.Dq dgram .
712The specification of the socket must be
713an absolute path name,
714optionally prefixed by an owner and mode
715of the form
716.Em :user:group:mode: .
717The specification:
718.Pp
719.Dl ":news:daemon:220:/var/run/sock"
720.Pp
721creates a socket owned
722by user
723.Dq news
724in group
725.Dq daemon
726with permissions allowing only that user and group to connect.
727The default owner is the user that
728.Nm
729is running as.
730The default mode only allows the socket's owner to connect.
731.Pp
732.Sy WARNING :
733while creating
734.Ux
735domain socket,
736.Nm
737must change the ownership and permissions on the socket.
738This can only be done securely if
739the directory in which the socket is created
740is writable only by root.
741Do
742.Em NOT
743use
744.Nm
745to create sockets in world writable directories,
746such as
747.Pa /tmp ,
748instead use
749.Pa /var/run
750or a similar directory.
751.Pp
752Internal services may be run on
753.Ux
754domain sockets, in the usual way.
755In this case
756the name of the internal service
757is determined using
758the last component of the socket's pathname.
759.Sh "FILES"
760.Bl -tag -width /var/run/inetd.pid -compact
761.It Pa /etc/inetd.conf
762configuration file
763.It Pa /etc/rpc
764translation of service names to RPC program numbers
765.It Pa /etc/services
766translation of service names to port numbers
767.It Pa /var/run/inetd.pid
768the pid of the currently running
769.Nm
770.El
771.Sh "EXAMPLES"
772Here are several example service entries for the various types of services:
773.Bd -literal
774ftp          stream  tcp   nowait root  /usr/libexec/ftpd        ftpd -l
775ntalk        dgram   udp   wait   root  /usr/libexec/ntalkd      ntalkd
776telnet       stream  tcp6  nowait root  /usr/libexec/telnetd  telnetd
777shell        stream  tcp46  nowait root  /usr/libexec/rshd rshd
778tcpmux/+date stream  tcp   nowait guest /bin/date                date
779tcpmux/phonebook stream tcp nowait guest /usr/local/bin/phonebook phonebook
780rstatd/1-3   dgram   rpc/udp wait root  /usr/libexec/rpc.rstatd  rpc.rstatd
781/var/run/echo stream unix  nowait root	internal
782#@ ipsec ah/require
783chargen      stream  tcp   nowait root  internal
784#@
785.Ed
786.Sh "ERROR MESSAGES"
787The
788.Nm
789server
790logs error messages using
791.Xr syslog 3 .
792Important error messages and their explanations are:
793.Pp
794.Bl -ohang -compact
795.It Xo
796.Ar service Ns / Ns Ar protocol
797.No "server failing (looping), service terminated."
798.Xc
799The number of requests for the specified service in the past minute
800exceeded the limit.
801The limit exists to prevent a broken program
802or a malicious user from swamping the system.
803This message may occur for several reasons:
804.Bl -enum -offset indent
805.It
806There are many hosts requesting the service within a short time period.
807.It
808A broken client program is requesting the service too frequently.
809.It
810A malicious user is running a program to invoke the service in
811a denial-of-service attack.
812.It
813The invoked service program has an error that causes clients
814to retry quickly.
815.El
816.Pp
817Use the
818.Fl R Ar rate
819option,
820as described above, to change the rate limit.
821Once the limit is reached, the service will be
822reenabled automatically in 10 minutes.
823.Pp
824.It Xo
825.Ar service Ns / Ns Ar protocol :
826.No \&No such user
827.Ar user ,
828.No service ignored
829.Xc
830.It Xo
831.Ar service Ns / Ns Ar protocol :
832.No getpwnam :
833.Ar user :
834.No \&No such user
835.Xc
836No entry for
837.Ar user
838exists in the
839.Xr passwd 5
840database.
841The first message
842occurs when
843.Nm
844(re)reads the configuration file.
845The second message occurs when the
846service is invoked.
847.Pp
848.It Xo
849.Ar service :
850.No can't set uid
851.Ar uid
852.Xc
853.It Xo
854.Ar service :
855.No can't set gid
856.Ar gid
857.Xc
858The user or group ID for the entry's
859.Ar user
860field is invalid.
861.Pp
862.It "setsockopt(SO_PRIVSTATE): Operation not supported"
863The
864.Nm
865utility attempted to renounce the privileged state associated with a
866socket but was unable to.
867.El
868.Sh SEE ALSO
869.Xr ipsec_set_policy 3 ,
870.Xr hosts_access 5 ,
871.Xr hosts_options 5 ,
872.Xr login.conf 5 ,
873.Xr passwd 5 ,
874.Xr rpc 5 ,
875.Xr services 5 ,
876.Xr comsat 8 ,
877.Xr fingerd 8 ,
878.Xr ftpd 8 ,
879.Xr rexecd 8 ,
880.Xr rlogind 8 ,
881.Xr rpcbind 8 ,
882.Xr rshd 8 ,
883.Xr telnetd 8 ,
884.Xr tftpd 8
885.Rs
886.%A Michael C. St. Johns
887.%T Identification Protocol
888.%O RFC1413
889.Re
890.Sh HISTORY
891The
892.Nm
893utility appeared in
894.Bx 4.3 .
895TCPMUX is based on code and documentation by Mark Lottor.
896Support for
897.Tn "ONC RPC"
898based services is modeled after that
899provided by
900.Tn SunOS
9014.1.
902The IPsec hack was contributed by the KAME project in 1999.
903The
904.Fx
905TCP Wrappers support first appeared in
906.Fx 3.2 .
907