xref: /freebsd/usr.sbin/inetd/inetd.8 (revision daf1cffce2e07931f27c6c6998652e90df6ba87e)
1.\" Copyright (c) 1985, 1991, 1993, 1994
2.\"	The Regents of the University of California.  All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\"    notice, this list of conditions and the following disclaimer.
9.\" 2. Redistributions in binary form must reproduce the above copyright
10.\"    notice, this list of conditions and the following disclaimer in the
11.\"    documentation and/or other materials provided with the distribution.
12.\" 3. All advertising materials mentioning features or use of this software
13.\"    must display the following acknowledgement:
14.\"	This product includes software developed by the University of
15.\"	California, Berkeley and its contributors.
16.\" 4. Neither the name of the University nor the names of its contributors
17.\"    may be used to endorse or promote products derived from this software
18.\"    without specific prior written permission.
19.\"
20.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\"     from: @(#)inetd.8	8.3 (Berkeley) 4/13/94
33.\" $FreeBSD$
34.\"
35.Dd February 7, 1996
36.Dt INETD 8
37.Os BSD 4.4
38.Sh NAME
39.Nm inetd
40.Nd internet
41.Dq super-server
42.Sh SYNOPSIS
43.Nm inetd
44.Op Fl d
45.Op Fl l
46.Op Fl w
47.Op Fl W
48.Op Fl c Ar maximum
49.Op Fl C Ar rate
50.Op Fl a Ar address|hostname
51.Op Fl p Ar filename
52.Op Fl R Ar rate
53.Op Ar configuration file
54.Sh DESCRIPTION
55The
56.Nm
57program
58should be run at boot time by
59.Pa /etc/rc
60(see
61.Xr rc 8 ) .
62It then listens for connections on certain
63internet sockets.  When a connection is found on one
64of its sockets, it decides what service the socket
65corresponds to, and invokes a program to service the request.
66The server program is invoked with the service socket
67as its standard input, output and error descriptors.
68After the program is
69finished,
70.Nm
71continues to listen on the socket (except in some cases which
72will be described below).  Essentially,
73.Nm
74allows running one daemon to invoke several others,
75reducing load on the system.
76.Pp
77The following options are available:
78.Bl -tag -width indent
79.It Fl d
80Turn on debugging.
81.It Fl l
82Turn on logging.
83.It Fl w
84Turn on TCP Wrapping for external services. See the
85.Sx "IMPLEMENTATION NOTES"
86section for more information on TCP Wrappers support.
87.It Fl W
88Turn on TCP Wrapping for internal services which are built in to
89.Nm inetd .
90.It Fl c Ar maximum
91Specify the default maximum number of services that can be invoked.
92May be overridden on a per-service basis with the "max-child"
93parameter.
94.It Fl C Ar rate
95Specify the default maximum number of times a service can be invoked
96from a single IP address in one minute; the default is unlimited.
97May be overridden on a per-service basis with the
98"max-connections-per-ip-per-minute" parameter.
99.It Fl R Ar rate
100Specify the maximum number of times a service can be invoked
101in one minute; the default is 256.
102.It Fl a
103Specify a specific IP address to bind to.
104Alternatively, a hostname can be specified,
105in which case the IPv4 or IPv6 address
106which corresponds to that hostname is used.
107Usually a hostname is specified when
108.Nm
109is run inside a
110.Xr jail 8 ,
111in which case the hostname corresponds to the
112.Xr jail 8
113environment.
114.Pp
115When hostname specification is used
116and both IPv4 and IPv6 bindings are desired,
117one entry with the appropriate
118.Em protocol
119type for each binding
120is required for each service in
121.Pa /etc/inetd.conf .
122For example,
123a TCP-based service would need two entries,
124one using
125.Dq tcp4
126for the
127.Em protocol
128and the other using
129.Dq tcp6 .
130See the explanation of the
131.Pa /etc/inetd.conf
132.Em protocol
133field below.
134.It Fl p
135Specify an alternate file in which to store the process ID.
136.El
137.Pp
138Upon execution,
139.Nm
140reads its configuration information from a configuration
141file which, by default, is
142.Pa /etc/inetd.conf .
143There must be an entry for each field of the configuration
144file, with entries for each field separated by a tab or
145a space.  Comments are denoted by a
146.Dq #
147at the beginning
148of a line.  There must be an entry for each field.  The
149fields of the configuration file are as follows:
150.Pp
151.Bd -unfilled -offset indent -compact
152service name
153socket type
154protocol
155{wait|nowait}[/max-child[/max-connections-per-ip-per-minute]]
156user[:group][/login-class]
157server program
158server program arguments
159.Ed
160.Pp
161To specify an
162.No Tn "ONC RPC" Ns -based
163service, the entry would contain these fields:
164.Pp
165.Bd -unfilled -offset indent -compact
166service name/version
167socket type
168rpc/protocol
169user[:group][/login-class]
170server program
171server program arguments
172.Ed
173.Pp
174There are two types of services that
175.Nm
176can start: standard and TCPMUX.
177A standard service has a well-known port assigned to it;
178it may be a service that implements an official Internet standard or is a
179BSD-specific service.
180As described in
181.Tn RFC 1078 ,
182TCPMUX services are nonstandard services that do not have a
183well-known port assigned to them.
184They are invoked from
185.Nm
186when a program connects to the
187.Dq tcpmux
188well-known port and specifies
189the service name.
190This feature is useful for adding locally-developed servers.
191TCPMUX requests are only accepted when the multiplexor service itself
192is enabled, above and beyond and specific TCPMUX-based servers; see the
193discussion of internal services below.
194.Pp
195The
196.Em service-name
197entry is the name of a valid service in
198the file
199.Pa /etc/services .
200For
201.Dq internal
202services (discussed below), the service
203name
204should
205be the official name of the service (that is, the first entry in
206.Pa /etc/services ) .
207When used to specify an
208.No Tn "ONC RPC" Ns -based
209service, this field is a valid RPC service name in
210the file
211.Pa /etc/rpc .
212The part on the right of the
213.Dq /
214is the RPC version number. This
215can simply be a single numeric argument or a range of versions.
216A range is bounded by the low version to the high version -
217.Dq rusers/1-3 .
218For TCPMUX services, the value of the
219.Em service-name
220field consists of the string
221.Dq tcpmux
222followed by a slash and the
223locally-chosen service name.
224The service names listed in
225.Pa /etc/services
226and the name
227.Dq help
228are reserved.
229Try to choose unique names for your TCPMUX services by prefixing them with
230your organization's name and suffixing them with a version number.
231.Pp
232The
233.Em socket-type
234should be one of
235.Dq stream ,
236.Dq dgram ,
237.Dq raw ,
238.Dq rdm ,
239or
240.Dq seqpacket ,
241depending on whether the socket is a stream, datagram, raw,
242reliably delivered message, or sequenced packet socket.
243TCPMUX services must use
244.Dq stream .
245.Pp
246The
247.Em protocol
248must be a valid protocol as given in
249.Pa /etc/protocols .
250Examples might be
251.Dq tcp
252or
253.Dq udp ,
254both of which imply IPv4 for backward compatibility.
255The names
256.Dq tcp4
257and
258.Dq udp4
259specify IPv4 only.
260The names
261.Dq tcp6
262and
263.Dq udp6
264specify IPv6 only.
265The names
266.Dq tcp46
267and
268.Dq udp46
269specify that the entry accepts both IPv6 and IPv6 connections
270via a wildcard
271.Dv AF_INET6
272socket.
273If it is desired that the service is reachable via T/TCP, one should
274specify
275.Dq tcp/ttcp ,
276which implies IPv4 for backward compatibility.
277The name
278.Dq tcp4/ttcp
279specifies IPv4 only, while
280.Dq tcp6/ttcp
281specifies IPv6 only.
282The name
283.Dq tcp46/ttcp
284specify that the entry accepts both IPv6 and IPv6 connections
285via a wildcard
286.Dv AF_INET6
287socket.
288Rpc based services
289(for which only IPv4 is supported at this time)
290are specified with the
291.Dq rpc/tcp
292or
293.Dq rpc/udp
294service type.
295TCPMUX services must use
296.Dq tcp ,
297.Dq tcp4 ,
298.Dq tcp6
299or
300.Dq tcp46 .
301.Pp
302The
303.Em wait/nowait
304entry specifies whether the server that is invoked by
305.Nm
306will take over
307the socket associated with the service access point, and thus whether
308.Nm
309should wait for the server to exit before listening for new service
310requests.
311Datagram servers must use
312.Dq wait ,
313as they are always invoked with the original datagram socket bound
314to the specified service address.
315These servers must read at least one datagram from the socket
316before exiting.
317If a datagram server connects
318to its peer, freeing the socket so
319.Nm
320can received further messages on the socket, it is said to be
321a
322.Dq multi-threaded
323server;
324it should read one datagram from the socket and create a new socket
325connected to the peer.
326It should fork, and the parent should then exit
327to allow
328.Nm
329to check for new service requests to spawn new servers.
330Datagram servers which process all incoming datagrams
331on a socket and eventually time out are said to be
332.Dq single-threaded .
333.Xr Comsat 8 ,
334.Pq Xr biff 1
335and
336.Xr talkd 8
337are both examples of the latter type of
338datagram server.
339.Xr Tftpd 8
340is an example of a multi-threaded datagram server.
341.Pp
342Servers using stream sockets generally are multi-threaded and
343use the
344.Dq nowait
345entry.
346Connection requests for these services are accepted by
347.Nm Ns ,
348and the server is given only the newly-accepted socket connected
349to a client of the service.
350Most stream-based services operate in this manner.
351Stream-based servers that use
352.Dq wait
353are started with the listening service socket, and must accept
354at least one connection request before exiting.
355Such a server would normally accept and process incoming connection
356requests until a timeout.
357TCPMUX services must use
358.Dq nowait .
359.Pp
360The maximum number of outstanding child processes (or
361.Dq threads )
362for a
363.Dq nowait
364service may be explicitly specified by appending a
365.Dq /
366followed by the number to the
367.Dq nowait
368keyword. Normally
369(or if a value of zero is specified) there is no maximum. Otherwise,
370once the maximum is reached, further connection attempts will be
371queued up until an existing child process exits. This also works
372in the case of
373.Dq wait
374mode, although a value other than one (the
375default) might not make sense in some cases.
376You can also specify the maximum number of connections per minute
377for a given IP address by appending
378a
379.Dq /
380followed by the number to the maximum number of
381outstanding child processes. Once the maximum is reached, further
382connections from this IP address will be dropped until the end of the
383minute.
384.Pp
385The
386.Em user
387entry should contain the user name of the user as whom the server
388should run.  This allows for servers to be given less permission
389than root.
390Optional
391.Em group
392part separated by
393.Dq \&:
394allows to specify group name different
395than default group for this user.
396Optional
397.Em login-class
398part separated by
399.Dq /
400allows to specify login class different
401than default
402.Dq daemon
403login class.
404.Pp
405The
406.Em server-program
407entry should contain the pathname of the program which is to be
408executed by
409.Nm
410when a request is found on its socket.  If
411.Nm
412provides this service internally, this entry should
413be
414.Dq internal .
415.Pp
416The
417.Em server program arguments
418should be just as arguments
419normally are, starting with argv[0], which is the name of
420the program.  If the service is provided internally, the
421.Em service-name
422of the service (and any arguments to it) or the word
423.Dq internal
424should take the place of this entry.
425.Pp
426Currently, the only internal service to take arguments is
427.Dq auth .
428Without options, the service will always return
429.Dq ERROR\ : HIDDEN-USER .
430The available arguments to this service that alter its behavior are:
431.Bl -tag -width indent
432.It Fl d Ar fallback
433Instead of returning an error if getting the socket credentials or
434looking up the user name fails, return a default
435.Ar fallback
436user name to the requesting ident client.  This is primarily useful
437when running this service on a NAT machine.
438.It Fl t Ar sec[.usec]
439Specify a timeout for the service. The default timeout is 10.0 seconds.
440.It Fl r
441Offer a real
442.Dq auth
443service, as per RFC 1413. All the remaining flags apply only in this case.
444.It Fl f
445If the file
446.Pa .fakeid
447exists in the home directory of the identified user, report the username
448found in that file instead of the real username.
449.It Fl g
450Instead of returning the user's name to the ident requester, report a
451username made up of random alphanumeric characters, e.g.
452.Dq c0c993 .
453The
454.Fl g
455flag overrides not only the user names, but also any
456.Pa .fakeid
457or
458.Pa .noident
459files.
460.It Fl n
461If the file
462.Pa .noident
463exists in the home directory of the identified user, return
464.Dq ERROR\ : HIDDEN-USER .
465instead.
466.It Fl o Ar osname
467Use
468.Ar osname
469instead of the name of the system as reported by
470.Xr uname 3 .
471.El
472.Pp
473The
474.Nm
475program
476also provides several other
477.Dq trivial
478services internally by use of
479routines within itself.  These services are
480.Dq echo ,
481.Dq discard ,
482.Dq chargen
483(character generator),
484.Dq daytime
485(human readable time), and
486.Dq time
487(machine readable time, in the form of the number of seconds since
488midnight, January 1, 1900).  All of these services are available in
489both TCP and UDP versions; the UDP versions will refuse service if the
490request specifies a reply port corresponding to any internal service.
491(This is done as a defense against looping attacks; the remote IP address
492is logged.)
493For details of these services, consult the
494appropriate
495.Tn RFC
496document.
497.Pp
498The TCPMUX-demultiplexing service is also implemented as an internal service.
499For any TCPMUX-based service to function, the following line must be included
500in
501.Pa inetd.conf :
502.Bd -literal -offset indent
503tcpmux	stream	tcp	nowait	root	internal
504.Ed
505.Pp
506When given the
507.Fl l
508option
509.Nm
510will log an entry to syslog each time a connection is accepted, noting the
511service selected and the IP-number of the remote requestor if available.
512.Pp
513The
514.Nm
515program
516rereads its configuration file when it receives a hangup signal,
517.Dv SIGHUP .
518Services may be added, deleted or modified when the configuration file
519is reread.
520Except when started in debugging mode,
521.Nm
522records its process ID in the file
523.Pa /var/run/inetd.pid
524to assist in reconfiguration.
525.Sh IMPLEMENTATION NOTES
526When given the
527.Fl w
528option,
529.Nm
530will wrap all services specified as
531.Dq stream nowait
532or
533.Dq dgram
534except for
535.Dq internal
536services. If the
537.Fl W
538option is given, such
539.Dq internal
540services will be wrapped. If both options are given, wrapping for both
541internal and external services will be enabled.
542.Pp
543If the
544.Fl l
545option is specified, all connection attempts are logged, whether they are
546allowed, denied or not wrapped at all. Otherwise, only denied requests will
547be logged.
548.Pp
549Note that
550.Nm
551only wraps requests for a
552.Dq wait
553service while no servers are available to service requests. Once a
554connection to such a service has been allowed, inetd has no control
555over subsequent connections to the service until no more servers
556are left listening for connection requests.
557.Pp
558When wrapping is enabled, the
559.Pa tcpd
560daemon is not required, as that functionality is builtin.
561For more information on TCP Wrappers; see the relevant documentation (
562.Xr hosts_access 5
563).
564When reading that document, keep in mind that
565.Dq internal
566services have no associated daemon name. Therefore, the service name
567as specified in
568.Pa inetd.conf
569should be used as the daemon name for
570.Dq internal
571services.
572.Ss TCPMUX
573.Tn RFC 1078
574describes the TCPMUX protocol:
575``A TCP client connects to a foreign host on TCP port 1.  It sends the
576service name followed by a carriage-return line-feed <CRLF>.  The
577service name is never case sensitive.  The server replies with a
578single character indicating positive (+) or negative (\-)
579acknowledgment, immediately followed by an optional message of
580explanation, terminated with a <CRLF>.  If the reply was positive,
581the selected protocol begins; otherwise the connection is closed.''
582The program is passed the TCP connection as file descriptors 0 and 1.
583.Pp
584If the TCPMUX service name begins with a
585.Dq + ,
586.Nm
587returns the positive reply for the program.
588This allows you to invoke programs that use stdin/stdout
589without putting any special server code in them.
590.Pp
591The special service name
592.Dq help
593causes
594.Nm
595to list TCPMUX services in
596.Pa inetd.conf .
597.Ss IPsec
598The implementation includes a tiny hack
599to support IPsec policy settings for each socket.
600A special form of comment line, starting with
601.Dq Li #@ ,
602is interpreted as a policy specifier.
603Everything after the
604.Dq Li #@
605will be used as an IPsec policy string,
606as described in
607.Xr ipsec_set_policy 3 .
608Each
609policy specifier is applied to all the following lines in
610.Pa inetd.conf
611until the next policy specifier.
612An empty policy specifer resets the IPsec policy.
613.Pp
614If an invalid IPsec policy specifier appears in
615.Pa inetd.conf ,
616.Nm
617will provide an error message via the
618.Xr syslog 3
619interface and abort execution.
620.Sh "FILES"
621.Bl -tag -width /var/run/inetd.pid -compact
622.It Pa /etc/inetd.conf
623configuration file
624.It Pa /etc/rpc
625translation of service names to RPC program numbers
626.It Pa /etc/services
627translation of service names to port numbers
628.It Pa /var/run/inetd.pid
629the pid of the currently running
630.Nm
631.El
632.Sh "EXAMPLES"
633.Pp
634Here are several example service entries for the various types of services:
635.Bd -literal
636ftp          stream  tcp   nowait root  /usr/libexec/ftpd        ftpd -l
637ntalk        dgram   udp   wait   root  /usr/libexec/ntalkd      ntalkd
638telnet       stream  tcp6  nowait root  /usr/libexec/telnetd  telnetd
639shell        stream  tcp46  nowait root  /usr/libexec/rshd rshd
640tcpmux/+date stream  tcp   nowait guest /bin/date                date
641tcpmux/phonebook stream tcp nowait guest /usr/local/bin/phonebook phonebook
642rstatd/1-3   dgram   rpc/udp wait root  /usr/libexec/rpc.rstatd  rpc.rstatd
643#@ ipsec ah/require
644chargen      stream  tcp   nowait root  internal
645#@
646.Ed
647.Sh "ERROR MESSAGES"
648The
649.Nm
650server
651logs error messages using
652.Xr syslog 3 .
653Important error messages and their explanations are:
654.Pp
655.Bl -ohang -compact
656.It Xo
657.Ar service Ns / Ns Ar protocol
658.No " server failing (looping), service terminated."
659.Xc
660The number of requests for the specified service in the past minute
661exceeded the limit. The limit exists to prevent a broken program
662or a malicious user from swamping the system.
663This message may occur for several reasons:
664.Bl -enum -offset indent
665.It
666There are many hosts requesting the service within a short time period.
667.It
668A broken client program is requesting the service too frequently.
669.It
670A malicious user is running a program to invoke the service in
671a denial-of-service attack.
672.It
673The invoked service program has an error that causes clients
674to retry quickly.
675.El
676.Pp
677Use the
678.Fl R Ar rate
679option,
680as described above, to change the rate limit.
681Once the limit is reached, the service will be
682reenabled automatically in 10 minutes.
683.Pp
684.It Xo
685.Ar service Ns / Ns Ar protocol :
686.No \&No such user
687.Ar user ,
688.No service ignored
689.Xc
690.It Xo
691.Ar service Ns / Ns Ar protocol :
692.No getpwnam :
693.Ar user :
694.No \&No such user
695.Xc
696No entry for
697.Ar user
698exists in the
699.Xr passwd 5
700database. The first message
701occurs when
702.Nm
703(re)reads the configuration file. The second message occurs when the
704service is invoked.
705.Pp
706.It Xo
707.Ar service :
708.No can't set uid
709.Ar uid
710.Xc
711.It Xo
712.Ar service :
713.No can't set gid
714.Ar gid
715.Xc
716The user or group ID for the entry's
717.Ar user
718field is invalid.
719.Pp
720.It "setsockopt(SO_PRIVSTATE): Operation not supported"
721The
722.Nm
723program attempted to renounce the privileged state associated with a
724socket but was unable to.
725.El
726.Sh SEE ALSO
727.Xr hosts_access 5 ,
728.Xr hosts_options 5 ,
729.Xr ipsec_set_policy 3 ,
730.Xr login.conf 5 ,
731.Xr passwd 5 ,
732.Xr rpc 5 ,
733.Xr services 5 ,
734.Xr comsat 8 ,
735.Xr fingerd 8 ,
736.Xr ftpd 8 ,
737.Xr portmap 8 ,
738.Xr rexecd 8 ,
739.Xr rlogind 8 ,
740.Xr rshd 8 ,
741.Xr telnetd 8 ,
742.Xr tftpd 8
743.Rs
744.%A Michael C. St. Johns
745.%T Identification Protocol
746.%O RFC1413
747.Re
748.Sh HISTORY
749The
750.Nm
751command appeared in
752.Bx 4.3 .
753TCPMUX is based on code and documentation by Mark Lottor.
754Support for
755.Tn "ONC RPC"
756based services is modeled after that
757provided by
758.Tn SunOS
7594.1.
760The IPsec hack was contributed by the KAME project in 1999.
761The
762.Fx
763TCP Wrappers support first appeared in
764.Fx 3.2 .
765