shithub: riscv

ref: ad26b06c8f2bd574d39d74a3fc47cfadbd0bfca0
dir: /sys/man/8/ipserv/

View raw version
.TH IPSERV 8
.SH NAME
telnetd, rlogind, rexexec, ftpd, socksd, hproxy \- Internet remote access daemons
.SH SYNOPSIS
.B ip/telnetd
.RB [ -adnptN ]
.RB [ -u
.IR user ]
.PP
.B ip/rlogind
.PP
.B ip/rexexec
.PP
.B ip/ftpd
.RB [ -aAdei ]
.RB [ -n
.IR namepace-file ]
.RB [ -c
.IR cert-path ]
.PP
.B ip/socksd
[
.B -x
.I inside
] [
.B -o
.I outside
]
.PP
.B ip/hproxy
.SH DESCRIPTION
These programs support remote access across the Internet.  All expect the
network connection to be standard input, output, and error.  They are normally
started from scripts in
.B /rc/bin/service
(see
.IR listen (8)).
.PP
.I Telnetd
allows login from a remote client.
There are three types of login:
.TF anonymo
.TP
.I normal
Normal users log in by encrypting and returning a
challenge printed by
.IR telnetd .
The user can use either the
.IR netkey
program
(see
.IR passwd (1))
or a  SecureNet handheld authenticator to encrypt the challenge.
.B /lib/namespace
defines the namespace.
.TP
.I noworld
Users in group
.B noworld
in
.BR /adm/users
authenticate with a password in the clear.
.B /lib/namespace.noworld
defines the namespace.
.TP
.I anonymous
User
.B none
requires no authentication.
.B /lib/namespace
defines the namespace.
.PD
.PP
.IR Telnetd 's
options are:
.TP 4
.B a
allow anonymous login by
.B none
.TP
.B d
print debugging to standard error
.TP
.B p
don't originate any telnet control codes
.TP
.B n
turn on local character echoing and imply the
.B p
option
.TP
.B t
trusted, that is, don't authenticate
.TP
.B u
use
.I user
as the local account name
.TP
.B N
permit connections by `noworld' users only.
.PD
.PP
.I Rlogind
logs in using the BSD remote login protocol.
.I Rlogind
execs
.I telnetd
.B -nu
after completing its initial handshake.
.PP
.I Rexexec
executes a command locally for a remote client.  It uses the
standard Plan 9 authentication (see
.IR authsrv (6)).
.PP
.I Ftpd
runs the Internet file transfer protocol.  It supports both 
implicit and explicit ftps. Users may transfer
files in either direction between the local and
remote machines.
There are two types of login:
.TF anonymous
.TP
.I normal
Normal users authenticate with their username and password when using tls.
.BI /usr/ username /lib/namespace.ftp
or, if that file does not exist,
.B /lib/namespace
defines the namespace.
.TP
.I anonymous
Users
.B anonymous
and
.B none
require no authentication.
The argument to the
.B \-n
option (default
.IR /lib/namespace.ftp )
defines the namespace.
Anonymous users may not store files.
.PD
.PP
.IR Ftpd 's
options are:
.TP 4
.B a
allow anonymous access
.TP
.B A
allow
.I only
anonymous access
.TP
.B d
write debugging output to the log
.TP
.B e
treat any user as anonymous
.TP
.B c
the certificate to use for serving ftps. The key must be stored in factotum.
.TP
.B n
the namespace for anonymous users (default
.BR /lib/namespace.ftp )
.PP
.I Socksd
is a SOCKS4 and SOCKS5
proxy server allowing non-Plan 9 machines to access the
outside network.
The net to use for outgoing calls can be specified
with the
.B -o
.I outside
and the internal network is specified with
.B -x
.I inside
(for UDP relay).
If not specified,
.I inside
and
.I outside
will default to
.BR /net .
.PP
.I Hproxy
is a simple HTTP proxy server.
.SH FILES
.B /lib/namepace
.br
.BI /usr/ username /lib/namespace.ftp
.br
.B /lib/namespace.world
.br
.B /lib/namespace.ftp
.SH SOURCE
.B /sys/src/cmd/ip/telnetd.c
.br
.B /sys/src/cmd/ip/rlogind.c
.br
.B /sys/src/cmd/ip/rexexec.c
.br
.B /sys/src/cmd/ip/ftpd.c
.br
.B /sys/src/cmd/ip/socksd.c
.br
.B /sys/src/cmd/ip/hproxy.c
.SH "SEE ALSO"
.IR ftpfs (4),
.IR pop3 (8)
.SH HISTORY
.I Hproxy
first appeared in 9front (July, 2012).
.I Socksd
first appeared in 9front (March, 2012).