xref: /freebsd/usr.sbin/rpcbind/rpcbind.8 (revision 3ff369fed2a08f32dda232c10470b949bef9489f)
1.\" @(#)rpcbind.1m 1.19 92/09/14 SMI; from SVr4
2.\" Copyright 1989 AT&T
3.\" Copyright 1991 Sun Microsystems, Inc.
4.\" $FreeBSD$
5.Dd September 14, 1992
6.Dt RPCBIND 8
7.Os
8.Sh NAME
9.Nm rpcbind
10.Nd universal addresses to RPC program number mapper
11.Sh SYNOPSIS
12.Nm
13.Op Fl dilLs
14.Sh DESCRIPTION
15.Nm
16is a server that converts
17.Tn RPC
18program numbers into
19universal addresses.
20It must be running on the host to be able to make
21.Tn RPC
22calls
23on a server on that machine.
24.Pp
25When an
26.Tn RPC
27service is started,
28it tells
29.Nm
30the address at which it is listening,
31and the
32.Tn RPC
33program numbers it is prepared to serve.
34When a client wishes to make an
35.Tn RPC
36call to a given program number,
37it first contacts
38.Nm
39on the server machine to determine
40the address where
41.Tn RPC
42requests should be sent.
43.Pp
44.Nm
45should be started before any other RPC service.
46Normally, standard
47.Tn RPC
48servers are started by port monitors, so
49.Nm
50must be started before port monitors are invoked.
51.Pp
52When
53.Nm
54is started, it checks that certain name-to-address
55translation-calls function correctly.
56If they fail, the network configuration databases may be corrupt.
57Since
58.Tn RPC
59services cannot function correctly in this situation,
60.Nm
61reports the condition and terminates.
62.Pp
63.Nm
64can only be started by the super-user.
65.Sh OPTIONS
66.Bl -tag -width indent
67.It Fl d
68Run in debug mode.
69In this mode,
70.Nm
71will not fork when it starts, will print additional information
72during operation, and will abort on certain errors.
73With this option, the name-to-address translation consistency
74checks are shown in detail.
75.It Fl i
76.Dq Insecure
77mode.
78Allows calls to SET and UNSET from any host.
79Normally
80.Nm
81accepts these requests only from the loopback interface for security reasons.
82This change is necessary for programs that were compiled with earlier
83versions of the rpc library and do not make those requests using the
84loopback interface.
85.It Fl l
86Turns on libwrap connection logging.
87.It Fl s
88Causes
89.Nm
90to change to the user daemon as soon as possible.
91This causes
92.Nm
93to use non-privileged ports for outgoing connections, preventing non-privileged
94clients from using
95.Nm
96to connect to services from a privileged port.
97.It Fl L
98Allow old-style local connections over the loopback interface.
99Without this flag, local connections are only allowed over a local socket,
100.Pa /var/run/rpcbind.sock .
101.El
102.Sh NOTES
103All RPC servers must be restarted if
104.Nm
105is restarted.
106.Sh SEE ALSO
107.Xr rpcbind 3 ,
108.Xr rpcinfo 8
109.Sh FILES
110.Bl -tag -width /var/run/rpcbind.sock -compact
111.It Pa /var/run/rpcbind.sock
112.El
113