1.\" Copyright (c) 1985, 1991, 1993, 1994 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. 9.\" 2. Redistributions in binary form must reproduce the above copyright 10.\" notice, this list of conditions and the following disclaimer in the 11.\" documentation and/or other materials provided with the distribution. 12.\" 3. All advertising materials mentioning features or use of this software 13.\" must display the following acknowledgement: 14.\" This product includes software developed by the University of 15.\" California, Berkeley and its contributors. 16.\" 4. Neither the name of the University nor the names of its contributors 17.\" may be used to endorse or promote products derived from this software 18.\" without specific prior written permission. 19.\" 20.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 21.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" from: @(#)inetd.8 8.3 (Berkeley) 4/13/94 33.\" $FreeBSD$ 34.\" 35.Dd February 7, 1996 36.Dt INETD 8 37.Os 38.Sh NAME 39.Nm inetd 40.Nd internet 41.Dq super-server 42.Sh SYNOPSIS 43.Nm 44.Op Fl d 45.Op Fl l 46.Op Fl w 47.Op Fl W 48.Op Fl c Ar maximum 49.Op Fl C Ar rate 50.Op Fl a Ar address | hostname 51.Op Fl p Ar filename 52.Op Fl R Ar rate 53.Op Ar configuration file 54.Sh DESCRIPTION 55The 56.Nm 57utility should be run at boot time by 58.Pa /etc/rc 59(see 60.Xr rc 8 ) . 61It then listens for connections on certain 62internet sockets. When a connection is found on one 63of its sockets, it decides what service the socket 64corresponds to, and invokes a program to service the request. 65The server program is invoked with the service socket 66as its standard input, output and error descriptors. 67After the program is 68finished, 69.Nm 70continues to listen on the socket (except in some cases which 71will be described below). Essentially, 72.Nm 73allows running one daemon to invoke several others, 74reducing load on the system. 75.Pp 76The following options are available: 77.Bl -tag -width indent 78.It Fl d 79Turn on debugging. 80.It Fl l 81Turn on logging of successful connections. 82.It Fl w 83Turn on TCP Wrapping for external services. 84See the 85.Sx "IMPLEMENTATION NOTES" 86section for more information on TCP Wrappers support. 87.It Fl W 88Turn on TCP Wrapping for internal services which are built in to 89.Nm . 90.It Fl c Ar maximum 91Specify the default maximum number of 92simultaneous invocations of each service; 93the default is unlimited. 94May be overridden on a per-service basis with the "max-child" 95parameter. 96.It Fl C Ar rate 97Specify the default maximum number of times a service can be invoked 98from a single IP address in one minute; the default is unlimited. 99May be overridden on a per-service basis with the 100"max-connections-per-ip-per-minute" parameter. 101.It Fl R Ar rate 102Specify the maximum number of times a service can be invoked 103in one minute; the default is 256. 104A rate of 0 allows an unlimited number of invocations. 105.It Fl a 106Specify one specific IP address to bind to. 107Alternatively, a hostname can be specified, 108in which case the IPv4 or IPv6 address 109which corresponds to that hostname is used. 110Usually a hostname is specified when 111.Nm 112is run inside a 113.Xr jail 8 , 114in which case the hostname corresponds to the 115.Xr jail 8 116environment. 117.Pp 118When hostname specification is used 119and both IPv4 and IPv6 bindings are desired, 120one entry with the appropriate 121.Em protocol 122type for each binding 123is required for each service in 124.Pa /etc/inetd.conf . 125For example, 126a TCP-based service would need two entries, 127one using 128.Dq tcp4 129for the 130.Em protocol 131and the other using 132.Dq tcp6 . 133See the explanation of the 134.Pa /etc/inetd.conf 135.Em protocol 136field below. 137.It Fl p 138Specify an alternate file in which to store the process ID. 139.El 140.Pp 141Upon execution, 142.Nm 143reads its configuration information from a configuration 144file which, by default, is 145.Pa /etc/inetd.conf . 146There must be an entry for each field of the configuration 147file, with entries for each field separated by a tab or 148a space. Comments are denoted by a 149.Dq # 150at the beginning 151of a line. There must be an entry for each field. The 152fields of the configuration file are as follows: 153.Pp 154.Bd -unfilled -offset indent -compact 155service name 156socket type 157protocol 158{wait|nowait}[/max-child[/max-connections-per-ip-per-minute]] 159user[:group][/login-class] 160server program 161server program arguments 162.Ed 163.Pp 164To specify an 165.Tn "ONC RPC" Ns -based 166service, the entry would contain these fields: 167.Pp 168.Bd -unfilled -offset indent -compact 169service name/version 170socket type 171rpc/protocol 172user[:group][/login-class] 173server program 174server program arguments 175.Ed 176.Pp 177There are two types of services that 178.Nm 179can start: standard and TCPMUX. 180A standard service has a well-known port assigned to it; 181it may be a service that implements an official Internet standard or is a 182.Bx Ns -specific 183service. 184As described in 185.Tn RFC 1078 , 186TCPMUX services are nonstandard services that do not have a 187well-known port assigned to them. 188They are invoked from 189.Nm 190when a program connects to the 191.Dq tcpmux 192well-known port and specifies 193the service name. 194This feature is useful for adding locally-developed servers. 195TCPMUX requests are only accepted when the multiplexor service itself 196is enabled, above and beyond and specific TCPMUX-based servers; see the 197discussion of internal services below. 198.Pp 199The 200.Em service-name 201entry is the name of a valid service in 202the file 203.Pa /etc/services , 204or the specification of a 205.Ux 206domain socket (see below). 207For 208.Dq internal 209services (discussed below), the service 210name 211should 212be the official name of the service (that is, the first entry in 213.Pa /etc/services ) . 214When used to specify an 215.Tn "ONC RPC" Ns -based 216service, this field is a valid RPC service name in 217the file 218.Pa /etc/rpc . 219The part on the right of the 220.Dq / 221is the RPC version number. 222This 223can simply be a single numeric argument or a range of versions. 224A range is bounded by the low version to the high version - 225.Dq rusers/1-3 . 226For TCPMUX services, the value of the 227.Em service-name 228field consists of the string 229.Dq tcpmux 230followed by a slash and the 231locally-chosen service name. 232The service names listed in 233.Pa /etc/services 234and the name 235.Dq help 236are reserved. 237Try to choose unique names for your TCPMUX services by prefixing them with 238your organization's name and suffixing them with a version number. 239.Pp 240The 241.Em socket-type 242should be one of 243.Dq stream , 244.Dq dgram , 245.Dq raw , 246.Dq rdm , 247or 248.Dq seqpacket , 249depending on whether the socket is a stream, datagram, raw, 250reliably delivered message, or sequenced packet socket. 251TCPMUX services must use 252.Dq stream . 253.Pp 254The 255.Em protocol 256must be a valid protocol or 257.Dq unix . 258Examples are 259.Dq tcp 260or 261.Dq udp , 262both of which imply IPv4 for backward compatibility. 263The names 264.Dq tcp4 265and 266.Dq udp4 267specify IPv4 only. 268The names 269.Dq tcp6 270and 271.Dq udp6 272specify IPv6 only. 273The names 274.Dq tcp46 275and 276.Dq udp46 277specify that the entry accepts both IPv4 and IPv6 connections 278via a wildcard 279.Dv AF_INET6 280socket. 281If it is desired that the service is reachable via T/TCP, one should 282specify 283.Dq tcp/ttcp , 284which implies IPv4 for backward compatibility. 285The name 286.Dq tcp4/ttcp 287specifies IPv4 only, while 288.Dq tcp6/ttcp 289specifies IPv6 only. 290The name 291.Dq tcp46/ttcp 292specify that the entry accepts both IPv6 and IPv6 connections 293via a wildcard 294.Dv AF_INET6 295socket. 296Rpc based services 297are specified with the 298.Dq rpc/tcp 299or 300.Dq rpc/udp 301service type. 302One can use specify IPv4 and/or IPv6 with the 4, 6 or 46 suffix, for example 303.Dq rpc/tcp6 304or 305.Dq rpc/udp46 . 306TCPMUX services must use 307.Dq tcp , 308.Dq tcp4 , 309.Dq tcp6 310or 311.Dq tcp46 . 312.Pp 313The 314.Em wait/nowait 315entry specifies whether the server that is invoked by 316.Nm 317will take over 318the socket associated with the service access point, and thus whether 319.Nm 320should wait for the server to exit before listening for new service 321requests. 322Datagram servers must use 323.Dq wait , 324as they are always invoked with the original datagram socket bound 325to the specified service address. 326These servers must read at least one datagram from the socket 327before exiting. 328If a datagram server connects 329to its peer, freeing the socket so 330.Nm 331can receive further messages on the socket, it is said to be 332a 333.Dq multi-threaded 334server; 335it should read one datagram from the socket and create a new socket 336connected to the peer. 337It should fork, and the parent should then exit 338to allow 339.Nm 340to check for new service requests to spawn new servers. 341Datagram servers which process all incoming datagrams 342on a socket and eventually time out are said to be 343.Dq single-threaded . 344.Xr Comsat 8 , 345.Pq Xr biff 1 346and 347.Xr talkd 8 348are both examples of the latter type of 349datagram server. 350.Xr Tftpd 8 351is an example of a multi-threaded datagram server. 352.Pp 353Servers using stream sockets generally are multi-threaded and 354use the 355.Dq nowait 356entry. 357Connection requests for these services are accepted by 358.Nm Ns , 359and the server is given only the newly-accepted socket connected 360to a client of the service. 361Most stream-based services operate in this manner. 362Stream-based servers that use 363.Dq wait 364are started with the listening service socket, and must accept 365at least one connection request before exiting. 366Such a server would normally accept and process incoming connection 367requests until a timeout. 368TCPMUX services must use 369.Dq nowait . 370.Pp 371The maximum number of outstanding child processes (or 372.Dq threads ) 373for a 374.Dq nowait 375service may be explicitly specified by appending a 376.Dq / 377followed by the number to the 378.Dq nowait 379keyword. 380Normally 381(or if a value of zero is specified) there is no maximum. 382Otherwise, 383once the maximum is reached, further connection attempts will be 384queued up until an existing child process exits. 385This also works 386in the case of 387.Dq wait 388mode, although a value other than one (the 389default) might not make sense in some cases. 390You can also specify the maximum number of connections per minute 391for a given IP address by appending 392a 393.Dq / 394followed by the number to the maximum number of 395outstanding child processes. 396Once the maximum is reached, further 397connections from this IP address will be dropped until the end of the 398minute. 399.Pp 400The 401.Em user 402entry should contain the user name of the user as whom the server 403should run. This allows for servers to be given less permission 404than root. 405Optional 406.Em group 407part separated by 408.Dq \&: 409allows to specify group name different 410than default group for this user. 411Optional 412.Em login-class 413part separated by 414.Dq / 415allows to specify login class different 416than default 417.Dq daemon 418login class. 419.Pp 420The 421.Em server-program 422entry should contain the pathname of the program which is to be 423executed by 424.Nm 425when a request is found on its socket. If 426.Nm 427provides this service internally, this entry should 428be 429.Dq internal . 430.Pp 431The 432.Em server program arguments 433should be just as arguments 434normally are, starting with argv[0], which is the name of 435the program. If the service is provided internally, the 436.Em service-name 437of the service (and any arguments to it) or the word 438.Dq internal 439should take the place of this entry. 440.Pp 441Currently, the only internal service to take arguments is 442.Dq auth . 443Without options, the service will always return 444.Dq ERROR\ : HIDDEN-USER . 445The available arguments to this service that alter its behavior are: 446.Bl -tag -width indent 447.It Fl d Ar fallback 448Provide a 449.Ar fallback 450username. 451If the real 452.Dq auth 453service is enabled 454(with the 455.Fl r 456option discussed below), 457return this username instead of an error 458when lookups fail 459for either socket credentials or the username. 460If the real 461.Dq auth 462service is disabled, 463return this username for every request. 464This is primarily useful when running this service on a NAT machine. 465.It Fl g 466Instead of returning 467the user's name to the ident requester, 468report a 469username made up of random alphanumeric characters, 470e.g.\& 471.Dq c0c993 . 472The 473.Fl g 474flag overrides not only the user names, 475but also any fallback name, 476.Pa .fakeid 477or 478.Pa .noident 479files. 480.It Fl t Xo 481.Ar sec Ns Op . Ns Ar usec 482.Xc 483Specify a timeout for the service. 484The default timeout is 10.0 seconds. 485.It Fl r 486Offer a real 487.Dq auth 488service, as per RFC 1413. 489All the remaining flags apply only in this case. 490.It Fl i 491Return numeric user IDs instead of usernames. 492.It Fl f 493If the file 494.Pa .fakeid 495exists in the home directory of the identified user, report the username 496found in that file instead of the real username. 497If the username found in 498.Pa .fakeid 499is that of an existing user, 500then the real username is reported. 501If the 502.Fl i 503flag is also given then the username in 504.Pa .fakeid 505is checked against existing user IDs instead. 506.It Fl F 507same as 508.Fl f 509but without the restriction that the username in 510.Pa .fakeid 511must not match an existing user. 512.It Fl n 513If the file 514.Pa .noident 515exists in the home directory of the identified user, return 516.Dq ERROR\ : HIDDEN-USER . 517This overrides any 518.Pa fakeid 519file which might exist. 520.It Fl o Ar osname 521Use 522.Ar osname 523instead of the name of the system as reported by 524.Xr uname 3 . 525.El 526.Pp 527The 528.Nm 529utility also provides several other 530.Dq trivial 531services internally by use of 532routines within itself. These services are 533.Dq echo , 534.Dq discard , 535.Dq chargen 536(character generator), 537.Dq daytime 538(human readable time), and 539.Dq time 540(machine readable time, in the form of the number of seconds since 541midnight, January 1, 1900). All of these services are available in 542both TCP and UDP versions; the UDP versions will refuse service if the 543request specifies a reply port corresponding to any internal service. 544(This is done as a defense against looping attacks; the remote IP address 545is logged.) 546For details of these services, consult the 547appropriate 548.Tn RFC 549document. 550.Pp 551The TCPMUX-demultiplexing service is also implemented as an internal service. 552For any TCPMUX-based service to function, the following line must be included 553in 554.Pa inetd.conf : 555.Bd -literal -offset indent 556tcpmux stream tcp nowait root internal 557.Ed 558.Pp 559When given the 560.Fl l 561option 562.Nm 563will log an entry to syslog each time a connection is accepted, noting the 564service selected and the IP-number of the remote requester if available. 565Unless otherwise specified in the configuration file, 566and in the absence of the 567.Fl W 568and 569.Fl w 570options, 571.Nm 572will log to the 573.Dq daemon 574facility. 575.Pp 576The 577.Nm 578utility rereads its configuration file when it receives a hangup signal, 579.Dv SIGHUP . 580Services may be added, deleted or modified when the configuration file 581is reread. 582Except when started in debugging mode, 583.Nm 584records its process ID in the file 585.Pa /var/run/inetd.pid 586to assist in reconfiguration. 587.Sh IMPLEMENTATION NOTES 588.Ss TCP Wrappers 589When given the 590.Fl w 591option, 592.Nm 593will wrap all services specified as 594.Dq stream nowait 595or 596.Dq dgram 597except for 598.Dq internal 599services. 600If the 601.Fl W 602option is given, such 603.Dq internal 604services will be wrapped. 605If both options are given, wrapping for both 606internal and external services will be enabled. 607Either wrapping option 608will cause failed connections to be logged to the 609.Dq auth 610syslog facility. 611Adding the 612.Fl l 613flag to the wrapping options will include successful connections in the 614logging to the 615.Dq auth 616facility. 617.Pp 618Note that 619.Nm 620only wraps requests for a 621.Dq wait 622service while no servers are available to service requests. 623Once a 624connection to such a service has been allowed, 625.Nm 626has no control 627over subsequent connections to the service until no more servers 628are left listening for connection requests. 629.Pp 630When wrapping is enabled, the 631.Pa tcpd 632daemon is not required, as that functionality is builtin. 633For more information on TCP Wrappers, see the relevant documentation 634.Pq Xr hosts_access 5 . 635When reading that document, keep in mind that 636.Dq internal 637services have no associated daemon name. 638Therefore, the service name 639as specified in 640.Pa inetd.conf 641should be used as the daemon name for 642.Dq internal 643services. 644.Ss TCPMUX 645.Tn RFC 1078 646describes the TCPMUX protocol: 647``A TCP client connects to a foreign host on TCP port 1. It sends the 648service name followed by a carriage-return line-feed <CRLF>. The 649service name is never case sensitive. The server replies with a 650single character indicating positive (+) or negative (\-) 651acknowledgment, immediately followed by an optional message of 652explanation, terminated with a <CRLF>. If the reply was positive, 653the selected protocol begins; otherwise the connection is closed.'' 654The program is passed the TCP connection as file descriptors 0 and 1. 655.Pp 656If the TCPMUX service name begins with a 657.Dq + , 658.Nm 659returns the positive reply for the program. 660This allows you to invoke programs that use stdin/stdout 661without putting any special server code in them. 662.Pp 663The special service name 664.Dq help 665causes 666.Nm 667to list TCPMUX services in 668.Pa inetd.conf . 669.Ss IPsec 670The implementation includes a tiny hack 671to support IPsec policy settings for each socket. 672A special form of comment line, starting with 673.Dq Li #@ , 674is interpreted as a policy specifier. 675Everything after the 676.Dq Li #@ 677will be used as an IPsec policy string, 678as described in 679.Xr ipsec_set_policy 3 . 680Each 681policy specifier is applied to all the following lines in 682.Pa inetd.conf 683until the next policy specifier. 684An empty policy specifier resets the IPsec policy. 685.Pp 686If an invalid IPsec policy specifier appears in 687.Pa inetd.conf , 688.Nm 689will provide an error message via the 690.Xr syslog 3 691interface and abort execution. 692.Ss Ux Domain Sockets 693In addition to running services on IP sockets, 694.Nm 695can also manage 696.Ux 697domain sockets. 698To do this you specify a 699.Em protocol 700of 701.Dq unix 702and specify the 703.Ux 704domain socket as the 705.Em service-name . 706The 707.Em service-type 708may be 709.Dq stream 710or 711.Dq dgram . 712The specification of the socket must be 713an absolute path name, 714optionally prefixed by an owner and mode 715of the form 716.Em :user:group:mode: . 717The specification: 718.Pp 719.Dl ":news:daemon:220:/var/run/sock" 720.Pp 721creates a socket owned 722by user 723.Dq news 724in group 725.Dq daemon 726with permissions allowing only that user and group to connect. 727The default owner is the user that 728.Nm 729is running as. 730The default mode only allows the socket's owner to connect. 731.Pp 732.Sy WARNING : 733while creating 734.Ux 735domain socket, 736.Nm 737must change the ownership and permissions on the socket. 738This can only be done securely if 739the directory in which the socket is created 740is writable only by root. 741Do 742.Em NOT 743use 744.Nm 745to create sockets in world writable directories, 746such as 747.Pa /tmp , 748instead use 749.Pa /var/run 750or a similar directory. 751.Pp 752Internal services may be run on 753.Ux 754domain sockets, in the usual way. 755In this case 756the name of the internal service 757is determined using 758the last component of the socket's pathname. 759.Sh "FILES" 760.Bl -tag -width /var/run/inetd.pid -compact 761.It Pa /etc/inetd.conf 762configuration file 763.It Pa /etc/rpc 764translation of service names to RPC program numbers 765.It Pa /etc/services 766translation of service names to port numbers 767.It Pa /var/run/inetd.pid 768the pid of the currently running 769.Nm 770.El 771.Sh "EXAMPLES" 772Here are several example service entries for the various types of services: 773.Bd -literal 774ftp stream tcp nowait root /usr/libexec/ftpd ftpd -l 775ntalk dgram udp wait root /usr/libexec/ntalkd ntalkd 776telnet stream tcp6 nowait root /usr/libexec/telnetd telnetd 777shell stream tcp46 nowait root /usr/libexec/rshd rshd 778tcpmux/+date stream tcp nowait guest /bin/date date 779tcpmux/phonebook stream tcp nowait guest /usr/local/bin/phonebook phonebook 780rstatd/1-3 dgram rpc/udp wait root /usr/libexec/rpc.rstatd rpc.rstatd 781/var/run/echo stream unix nowait root internal 782#@ ipsec ah/require 783chargen stream tcp nowait root internal 784#@ 785.Ed 786.Sh "ERROR MESSAGES" 787The 788.Nm 789server 790logs error messages using 791.Xr syslog 3 . 792Important error messages and their explanations are: 793.Pp 794.Bl -ohang -compact 795.It Xo 796.Ar service Ns / Ns Ar protocol 797.No "server failing (looping), service terminated." 798.Xc 799The number of requests for the specified service in the past minute 800exceeded the limit. 801The limit exists to prevent a broken program 802or a malicious user from swamping the system. 803This message may occur for several reasons: 804.Bl -enum -offset indent 805.It 806There are many hosts requesting the service within a short time period. 807.It 808A broken client program is requesting the service too frequently. 809.It 810A malicious user is running a program to invoke the service in 811a denial-of-service attack. 812.It 813The invoked service program has an error that causes clients 814to retry quickly. 815.El 816.Pp 817Use the 818.Fl R Ar rate 819option, 820as described above, to change the rate limit. 821Once the limit is reached, the service will be 822reenabled automatically in 10 minutes. 823.Pp 824.It Xo 825.Ar service Ns / Ns Ar protocol : 826.No \&No such user 827.Ar user , 828.No service ignored 829.Xc 830.It Xo 831.Ar service Ns / Ns Ar protocol : 832.No getpwnam : 833.Ar user : 834.No \&No such user 835.Xc 836No entry for 837.Ar user 838exists in the 839.Xr passwd 5 840database. 841The first message 842occurs when 843.Nm 844(re)reads the configuration file. 845The second message occurs when the 846service is invoked. 847.Pp 848.It Xo 849.Ar service : 850.No can't set uid 851.Ar uid 852.Xc 853.It Xo 854.Ar service : 855.No can't set gid 856.Ar gid 857.Xc 858The user or group ID for the entry's 859.Ar user 860field is invalid. 861.Pp 862.It "setsockopt(SO_PRIVSTATE): Operation not supported" 863The 864.Nm 865utility attempted to renounce the privileged state associated with a 866socket but was unable to. 867.El 868.Sh SEE ALSO 869.Xr ipsec_set_policy 3 , 870.Xr hosts_access 5 , 871.Xr hosts_options 5 , 872.Xr login.conf 5 , 873.Xr passwd 5 , 874.Xr rpc 5 , 875.Xr services 5 , 876.Xr comsat 8 , 877.Xr fingerd 8 , 878.Xr ftpd 8 , 879.Xr rexecd 8 , 880.Xr rlogind 8 , 881.Xr rpcbind 8 , 882.Xr rshd 8 , 883.Xr telnetd 8 , 884.Xr tftpd 8 885.Rs 886.%A Michael C. St. Johns 887.%T Identification Protocol 888.%O RFC1413 889.Re 890.Sh HISTORY 891The 892.Nm 893utility appeared in 894.Bx 4.3 . 895TCPMUX is based on code and documentation by Mark Lottor. 896Support for 897.Tn "ONC RPC" 898based services is modeled after that 899provided by 900.Tn SunOS 9014.1. 902The IPsec hack was contributed by the KAME project in 1999. 903The 904.Fx 905TCP Wrappers support first appeared in 906.Fx 3.2 . 907