1.\" Copyright (c) 1985, 1991, 1993, 1994 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. 9.\" 2. Redistributions in binary form must reproduce the above copyright 10.\" notice, this list of conditions and the following disclaimer in the 11.\" documentation and/or other materials provided with the distribution. 12.\" 3. All advertising materials mentioning features or use of this software 13.\" must display the following acknowledgement: 14.\" This product includes software developed by the University of 15.\" California, Berkeley and its contributors. 16.\" 4. Neither the name of the University nor the names of its contributors 17.\" may be used to endorse or promote products derived from this software 18.\" without specific prior written permission. 19.\" 20.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 21.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" from: @(#)inetd.8 8.3 (Berkeley) 4/13/94 33.\" $FreeBSD$ 34.\" 35.Dd February 7, 1996 36.Dt INETD 8 37.Os BSD 4.4 38.Sh NAME 39.Nm inetd 40.Nd internet 41.Dq super-server 42.Sh SYNOPSIS 43.Nm inetd 44.Op Fl d 45.Op Fl l 46.Op Fl w 47.Op Fl W 48.Op Fl c Ar maximum 49.Op Fl C Ar rate 50.Op Fl a Ar address|hostname 51.Op Fl p Ar filename 52.Op Fl R Ar rate 53.Op Ar configuration file 54.Sh DESCRIPTION 55The 56.Nm 57program 58should be run at boot time by 59.Pa /etc/rc 60(see 61.Xr rc 8 ) . 62It then listens for connections on certain 63internet sockets. When a connection is found on one 64of its sockets, it decides what service the socket 65corresponds to, and invokes a program to service the request. 66The server program is invoked with the service socket 67as its standard input, output and error descriptors. 68After the program is 69finished, 70.Nm 71continues to listen on the socket (except in some cases which 72will be described below). Essentially, 73.Nm 74allows running one daemon to invoke several others, 75reducing load on the system. 76.Pp 77The following options are available: 78.Bl -tag -width indent 79.It Fl d 80Turn on debugging. 81.It Fl l 82Turn on logging. 83.It Fl w 84Turn on TCP Wrapping for external services. See the 85.Sx "IMPLEMENTATION NOTES" 86section for more information on TCP Wrappers support. 87.It Fl W 88Turn on TCP Wrapping for internal services which are built in to 89.Nm inetd . 90.It Fl c Ar maximum 91Specify the default maximum number of services that can be invoked. 92May be overridden on a per-service basis with the "max-child" 93parameter. 94.It Fl C Ar rate 95Specify the default maximum number of times a service can be invoked 96from a single IP address in one minute; the default is unlimited. 97May be overridden on a per-service basis with the 98"max-connections-per-ip-per-minute" parameter. 99.It Fl R Ar rate 100Specify the maximum number of times a service can be invoked 101in one minute; the default is 256. 102.It Fl a 103Specify a specific IP address to bind to. 104Alternatively, a hostname can be specified, 105in which case the IPv4 or IPv6 address 106which corresponds to that hostname is used. 107Usually a hostname is specified when 108.Nm 109is run inside a 110.Xr jail 8 , 111in which case the hostname corresponds to the 112.Xr jail 8 113environment. 114.Pp 115When hostname specification is used 116and both IPv4 and IPv6 bindings are desired, 117one entry with the appropriate 118.Em protocol 119type for each binding 120is required for each service in 121.Pa /etc/inetd.conf . 122For example, 123a TCP-based service would need two entries, 124one using 125.Dq tcp4 126for the 127.Em protocol 128and the other using 129.Dq tcp6 . 130See the explanation of the 131.Pa /etc/inetd.conf 132.Em protocol 133field below. 134.It Fl p 135Specify an alternate file in which to store the process ID. 136.El 137.Pp 138Upon execution, 139.Nm 140reads its configuration information from a configuration 141file which, by default, is 142.Pa /etc/inetd.conf . 143There must be an entry for each field of the configuration 144file, with entries for each field separated by a tab or 145a space. Comments are denoted by a 146.Dq # 147at the beginning 148of a line. There must be an entry for each field. The 149fields of the configuration file are as follows: 150.Pp 151.Bd -unfilled -offset indent -compact 152service name 153socket type 154protocol 155{wait|nowait}[/max-child[/max-connections-per-ip-per-minute]] 156user[:group][/login-class] 157server program 158server program arguments 159.Ed 160.Pp 161To specify an 162.No Tn "ONC RPC" Ns -based 163service, the entry would contain these fields: 164.Pp 165.Bd -unfilled -offset indent -compact 166service name/version 167socket type 168rpc/protocol 169user[:group][/login-class] 170server program 171server program arguments 172.Ed 173.Pp 174There are two types of services that 175.Nm 176can start: standard and TCPMUX. 177A standard service has a well-known port assigned to it; 178it may be a service that implements an official Internet standard or is a 179BSD-specific service. 180As described in 181.Tn RFC 1078 , 182TCPMUX services are nonstandard services that do not have a 183well-known port assigned to them. 184They are invoked from 185.Nm 186when a program connects to the 187.Dq tcpmux 188well-known port and specifies 189the service name. 190This feature is useful for adding locally-developed servers. 191TCPMUX requests are only accepted when the multiplexor service itself 192is enabled, above and beyond and specific TCPMUX-based servers; see the 193discussion of internal services below. 194.Pp 195The 196.Em service-name 197entry is the name of a valid service in 198the file 199.Pa /etc/services . 200For 201.Dq internal 202services (discussed below), the service 203name 204should 205be the official name of the service (that is, the first entry in 206.Pa /etc/services ) . 207When used to specify an 208.No Tn "ONC RPC" Ns -based 209service, this field is a valid RPC service name in 210the file 211.Pa /etc/rpc . 212The part on the right of the 213.Dq / 214is the RPC version number. This 215can simply be a single numeric argument or a range of versions. 216A range is bounded by the low version to the high version - 217.Dq rusers/1-3 . 218For TCPMUX services, the value of the 219.Em service-name 220field consists of the string 221.Dq tcpmux 222followed by a slash and the 223locally-chosen service name. 224The service names listed in 225.Pa /etc/services 226and the name 227.Dq help 228are reserved. 229Try to choose unique names for your TCPMUX services by prefixing them with 230your organization's name and suffixing them with a version number. 231.Pp 232The 233.Em socket-type 234should be one of 235.Dq stream , 236.Dq dgram , 237.Dq raw , 238.Dq rdm , 239or 240.Dq seqpacket , 241depending on whether the socket is a stream, datagram, raw, 242reliably delivered message, or sequenced packet socket. 243TCPMUX services must use 244.Dq stream . 245.Pp 246The 247.Em protocol 248must be a valid protocol as given in 249.Pa /etc/protocols . 250Examples might be 251.Dq tcp 252or 253.Dq udp , 254both of which imply IPv4 for backward compatibility. 255The names 256.Dq tcp4 257and 258.Dq udp4 259specify IPv4 only. 260The names 261.Dq tcp6 262and 263.Dq udp6 264specify IPv6 only. 265The names 266.Dq tcp46 267and 268.Dq udp46 269specify that the entry accepts both IPv6 and IPv6 connections 270via a wildcard 271.Dv AF_INET6 272socket. 273If it is desired that the service is reachable via T/TCP, one should 274specify 275.Dq tcp/ttcp , 276which implies IPv4 for backward compatibility. 277The name 278.Dq tcp4/ttcp 279specifies IPv4 only, while 280.Dq tcp6/ttcp 281specifies IPv6 only. 282The name 283.Dq tcp46/ttcp 284specify that the entry accepts both IPv6 and IPv6 connections 285via a wildcard 286.Dv AF_INET6 287socket. 288Rpc based services 289(for which only IPv4 is supported at this time) 290are specified with the 291.Dq rpc/tcp 292or 293.Dq rpc/udp 294service type. 295TCPMUX services must use 296.Dq tcp , 297.Dq tcp4 , 298.Dq tcp6 299or 300.Dq tcp46 . 301.Pp 302The 303.Em wait/nowait 304entry specifies whether the server that is invoked by 305.Nm 306will take over 307the socket associated with the service access point, and thus whether 308.Nm 309should wait for the server to exit before listening for new service 310requests. 311Datagram servers must use 312.Dq wait , 313as they are always invoked with the original datagram socket bound 314to the specified service address. 315These servers must read at least one datagram from the socket 316before exiting. 317If a datagram server connects 318to its peer, freeing the socket so 319.Nm 320can received further messages on the socket, it is said to be 321a 322.Dq multi-threaded 323server; 324it should read one datagram from the socket and create a new socket 325connected to the peer. 326It should fork, and the parent should then exit 327to allow 328.Nm 329to check for new service requests to spawn new servers. 330Datagram servers which process all incoming datagrams 331on a socket and eventually time out are said to be 332.Dq single-threaded . 333.Xr Comsat 8 , 334.Pq Xr biff 1 335and 336.Xr talkd 8 337are both examples of the latter type of 338datagram server. 339.Xr Tftpd 8 340is an example of a multi-threaded datagram server. 341.Pp 342Servers using stream sockets generally are multi-threaded and 343use the 344.Dq nowait 345entry. 346Connection requests for these services are accepted by 347.Nm Ns , 348and the server is given only the newly-accepted socket connected 349to a client of the service. 350Most stream-based services operate in this manner. 351Stream-based servers that use 352.Dq wait 353are started with the listening service socket, and must accept 354at least one connection request before exiting. 355Such a server would normally accept and process incoming connection 356requests until a timeout. 357TCPMUX services must use 358.Dq nowait . 359.Pp 360The maximum number of outstanding child processes (or 361.Dq threads ) 362for a 363.Dq nowait 364service may be explicitly specified by appending a 365.Dq / 366followed by the number to the 367.Dq nowait 368keyword. Normally 369(or if a value of zero is specified) there is no maximum. Otherwise, 370once the maximum is reached, further connection attempts will be 371queued up until an existing child process exits. This also works 372in the case of 373.Dq wait 374mode, although a value other than one (the 375default) might not make sense in some cases. 376You can also specify the maximum number of connections per minute 377for a given IP address by appending 378a 379.Dq / 380followed by the number to the maximum number of 381outstanding child processes. Once the maximum is reached, further 382connections from this IP address will be dropped until the end of the 383minute. 384.Pp 385The 386.Em user 387entry should contain the user name of the user as whom the server 388should run. This allows for servers to be given less permission 389than root. 390Optional 391.Em group 392part separated by 393.Dq \&: 394allows to specify group name different 395than default group for this user. 396Optional 397.Em login-class 398part separated by 399.Dq / 400allows to specify login class different 401than default 402.Dq daemon 403login class. 404.Pp 405The 406.Em server-program 407entry should contain the pathname of the program which is to be 408executed by 409.Nm 410when a request is found on its socket. If 411.Nm 412provides this service internally, this entry should 413be 414.Dq internal . 415.Pp 416The 417.Em server program arguments 418should be just as arguments 419normally are, starting with argv[0], which is the name of 420the program. If the service is provided internally, the 421.Em service-name 422of the service (and any arguments to it) or the word 423.Dq internal 424should take the place of this entry. 425.Pp 426Currently, the only internal service to take arguments is 427.Dq auth . 428Without options, the service will always return 429.Dq ERROR\ : HIDDEN-USER . 430The available arguments to this service that alter its behavior are: 431.Bl -tag -width indent 432.It Fl d Ar fallback 433Instead of returning an error if getting the socket credentials or 434looking up the user name fails, return a default 435.Ar fallback 436user name to the requesting ident client. This is primarily useful 437when running this service on a NAT machine. 438.It Fl t Ar sec[.usec] 439Specify a timeout for the service. The default timeout is 10.0 seconds. 440.It Fl r 441Offer a real 442.Dq auth 443service, as per RFC 1413. All the remaining flags apply only in this case. 444.It Fl f 445If the file 446.Pa .fakeid 447exists in the home directory of the identified user, report the username 448found in that file instead of the real username. 449.It Fl g 450Instead of returning the user's name to the ident requester, report a 451username made up of random alphanumeric characters, e.g. 452.Dq c0c993 . 453The 454.Fl g 455flag overrides not only the user names, but also any 456.Pa .fakeid 457or 458.Pa .noident 459files. 460.It Fl n 461If the file 462.Pa .noident 463exists in the home directory of the identified user, return 464.Dq ERROR\ : HIDDEN-USER . 465instead. 466.It Fl o Ar osname 467Use 468.Ar osname 469instead of the name of the system as reported by 470.Xr uname 3 . 471.El 472.Pp 473The 474.Nm 475program 476also provides several other 477.Dq trivial 478services internally by use of 479routines within itself. These services are 480.Dq echo , 481.Dq discard , 482.Dq chargen 483(character generator), 484.Dq daytime 485(human readable time), and 486.Dq time 487(machine readable time, in the form of the number of seconds since 488midnight, January 1, 1900). All of these services are available in 489both TCP and UDP versions; the UDP versions will refuse service if the 490request specifies a reply port corresponding to any internal service. 491(This is done as a defense against looping attacks; the remote IP address 492is logged.) 493For details of these services, consult the 494appropriate 495.Tn RFC 496document. 497.Pp 498The TCPMUX-demultiplexing service is also implemented as an internal service. 499For any TCPMUX-based service to function, the following line must be included 500in 501.Pa inetd.conf : 502.Bd -literal -offset indent 503tcpmux stream tcp nowait root internal 504.Ed 505.Pp 506When given the 507.Fl l 508option 509.Nm 510will log an entry to syslog each time a connection is accepted, noting the 511service selected and the IP-number of the remote requestor if available. 512.Pp 513The 514.Nm 515program 516rereads its configuration file when it receives a hangup signal, 517.Dv SIGHUP . 518Services may be added, deleted or modified when the configuration file 519is reread. 520Except when started in debugging mode, 521.Nm 522records its process ID in the file 523.Pa /var/run/inetd.pid 524to assist in reconfiguration. 525.Sh IMPLEMENTATION NOTES 526When given the 527.Fl w 528option, 529.Nm 530will wrap all services specified as 531.Dq stream nowait 532or 533.Dq dgram 534except for 535.Dq internal 536services. If the 537.Fl W 538option is given, such 539.Dq internal 540services will be wrapped. If both options are given, wrapping for both 541internal and external services will be enabled. 542.Pp 543If the 544.Fl l 545option is specified, all connection attempts are logged, whether they are 546allowed, denied or not wrapped at all. Otherwise, only denied requests will 547be logged. 548.Pp 549Note that 550.Nm 551only wraps requests for a 552.Dq wait 553service while no servers are available to service requests. Once a 554connection to such a service has been allowed, inetd has no control 555over subsequent connections to the service until no more servers 556are left listening for connection requests. 557.Pp 558When wrapping is enabled, the 559.Pa tcpd 560daemon is not required, as that functionality is builtin. 561For more information on TCP Wrappers; see the relevant documentation ( 562.Xr hosts_access 5 563). 564When reading that document, keep in mind that 565.Dq internal 566services have no associated daemon name. Therefore, the service name 567as specified in 568.Pa inetd.conf 569should be used as the daemon name for 570.Dq internal 571services. 572.Ss TCPMUX 573.Tn RFC 1078 574describes the TCPMUX protocol: 575``A TCP client connects to a foreign host on TCP port 1. It sends the 576service name followed by a carriage-return line-feed <CRLF>. The 577service name is never case sensitive. The server replies with a 578single character indicating positive (+) or negative (\-) 579acknowledgment, immediately followed by an optional message of 580explanation, terminated with a <CRLF>. If the reply was positive, 581the selected protocol begins; otherwise the connection is closed.'' 582The program is passed the TCP connection as file descriptors 0 and 1. 583.Pp 584If the TCPMUX service name begins with a 585.Dq + , 586.Nm 587returns the positive reply for the program. 588This allows you to invoke programs that use stdin/stdout 589without putting any special server code in them. 590.Pp 591The special service name 592.Dq help 593causes 594.Nm 595to list TCPMUX services in 596.Pa inetd.conf . 597.Ss IPsec 598The implementation includes a tiny hack 599to support IPsec policy settings for each socket. 600A special form of comment line, starting with 601.Dq Li #@ , 602is interpreted as a policy specifier. 603Everything after the 604.Dq Li #@ 605will be used as an IPsec policy string, 606as described in 607.Xr ipsec_set_policy 3 . 608Each 609policy specifier is applied to all the following lines in 610.Pa inetd.conf 611until the next policy specifier. 612An empty policy specifer resets the IPsec policy. 613.Pp 614If an invalid IPsec policy specifier appears in 615.Pa inetd.conf , 616.Nm 617will provide an error message via the 618.Xr syslog 3 619interface and abort execution. 620.Sh "FILES" 621.Bl -tag -width /var/run/inetd.pid -compact 622.It Pa /etc/inetd.conf 623configuration file 624.It Pa /etc/rpc 625translation of service names to RPC program numbers 626.It Pa /etc/services 627translation of service names to port numbers 628.It Pa /var/run/inetd.pid 629the pid of the currently running 630.Nm 631.El 632.Sh "EXAMPLES" 633.Pp 634Here are several example service entries for the various types of services: 635.Bd -literal 636ftp stream tcp nowait root /usr/libexec/ftpd ftpd -l 637ntalk dgram udp wait root /usr/libexec/ntalkd ntalkd 638telnet stream tcp6 nowait root /usr/libexec/telnetd telnetd 639shell stream tcp46 nowait root /usr/libexec/rshd rshd 640tcpmux/+date stream tcp nowait guest /bin/date date 641tcpmux/phonebook stream tcp nowait guest /usr/local/bin/phonebook phonebook 642rstatd/1-3 dgram rpc/udp wait root /usr/libexec/rpc.rstatd rpc.rstatd 643#@ ipsec ah/require 644chargen stream tcp nowait root internal 645#@ 646.Ed 647.Sh "ERROR MESSAGES" 648The 649.Nm 650server 651logs error messages using 652.Xr syslog 3 . 653Important error messages and their explanations are: 654.Pp 655.Bl -ohang -compact 656.It Xo 657.Ar service Ns / Ns Ar protocol 658.No " server failing (looping), service terminated." 659.Xc 660The number of requests for the specified service in the past minute 661exceeded the limit. The limit exists to prevent a broken program 662or a malicious user from swamping the system. 663This message may occur for several reasons: 664.Bl -enum -offset indent 665.It 666There are many hosts requesting the service within a short time period. 667.It 668A broken client program is requesting the service too frequently. 669.It 670A malicious user is running a program to invoke the service in 671a denial-of-service attack. 672.It 673The invoked service program has an error that causes clients 674to retry quickly. 675.El 676.Pp 677Use the 678.Fl R Ar rate 679option, 680as described above, to change the rate limit. 681Once the limit is reached, the service will be 682reenabled automatically in 10 minutes. 683.Pp 684.It Xo 685.Ar service Ns / Ns Ar protocol : 686.No \&No such user 687.Ar user , 688.No service ignored 689.Xc 690.It Xo 691.Ar service Ns / Ns Ar protocol : 692.No getpwnam : 693.Ar user : 694.No \&No such user 695.Xc 696No entry for 697.Ar user 698exists in the 699.Xr passwd 5 700database. The first message 701occurs when 702.Nm 703(re)reads the configuration file. The second message occurs when the 704service is invoked. 705.Pp 706.It Xo 707.Ar service : 708.No can't set uid 709.Ar uid 710.Xc 711.It Xo 712.Ar service : 713.No can't set gid 714.Ar gid 715.Xc 716The user or group ID for the entry's 717.Ar user 718field is invalid. 719.Pp 720.It "setsockopt(SO_PRIVSTATE): Operation not supported" 721The 722.Nm 723program attempted to renounce the privileged state associated with a 724socket but was unable to. 725.El 726.Sh SEE ALSO 727.Xr hosts_access 5 , 728.Xr hosts_options 5 , 729.Xr ipsec_set_policy 3 , 730.Xr login.conf 5 , 731.Xr passwd 5 , 732.Xr rpc 5 , 733.Xr services 5 , 734.Xr comsat 8 , 735.Xr fingerd 8 , 736.Xr ftpd 8 , 737.Xr portmap 8 , 738.Xr rexecd 8 , 739.Xr rlogind 8 , 740.Xr rshd 8 , 741.Xr telnetd 8 , 742.Xr tftpd 8 743.Rs 744.%A Michael C. St. Johns 745.%T Identification Protocol 746.%O RFC1413 747.Re 748.Sh HISTORY 749The 750.Nm 751command appeared in 752.Bx 4.3 . 753TCPMUX is based on code and documentation by Mark Lottor. 754Support for 755.Tn "ONC RPC" 756based services is modeled after that 757provided by 758.Tn SunOS 7594.1. 760The IPsec hack was contributed by the KAME project in 1999. 761The 762.Fx 763TCP Wrappers support first appeared in 764.Fx 3.2 . 765