1.\" $NetBSD: rpcbind.8,v 1.1 2010/07/26 15:53:00 pooka Exp $ 2.\" @(#)rpcbind.1m 1.19 92/09/14 SMI; from SVr4 3.\" Copyright 1989 AT&T 4.\" Copyright 1991 Sun Microsystems, Inc. 5.Dd October 19, 2008 6.Dt RPCBIND 8 7.Sh NAME 8.Nm rpcbind 9.Nd universal addresses to RPC program number mapper 10.Sh SYNOPSIS 11.Nm 12.Op Fl dilLs 13.Sh DESCRIPTION 14.Nm 15is a server that converts 16.Tn RPC 17program numbers into 18universal addresses. 19It must be running on the host to be able to make 20.Tn RPC 21calls 22on a server on that machine. 23.Pp 24When an 25.Tn RPC 26service is started, 27it tells 28.Nm 29the address at which it is listening, 30and the 31.Tn RPC 32program numbers it is prepared to serve. 33When a client wishes to make an 34.Tn RPC 35call to a given program number, 36it first contacts 37.Nm 38on the server machine to determine 39the address where 40.Tn RPC 41requests should be sent. 42.Pp 43.Nm 44should be started before any other RPC service. 45Normally, standard 46.Tn RPC 47servers are started by port monitors, so 48.Nm 49must be started before port monitors are invoked. 50.Pp 51When 52.Nm 53is started, it checks that certain name-to-address 54translation-calls function correctly. 55If they fail, the network configuration databases may be corrupt. 56Since 57.Tn RPC 58services cannot function correctly in this situation, 59.Nm 60reports the condition and terminates. 61.Pp 62.Nm 63can only be started by the super-user. 64.Pp 65Access control is provided by 66.Pa /etc/hosts.allow 67and 68.Pa /etc/hosts.deny , 69as described in 70.Xr hosts_access 5 71with daemon name 72.Nm . 73.Sh OPTIONS 74.Bl -tag -width Ds 75.It Fl d 76Run in debug mode. 77In this mode, 78.Nm 79will not fork when it starts, will print additional information 80during operation, and will abort on certain errors. 81With this option, the name-to-address translation consistency 82checks are shown in detail. 83.It Fl i 84.Dq insecure 85mode. 86Allows calls to SET and UNSET from any host. 87Normally 88.Nm 89accepts these requests only from the loopback interface for security reasons. 90This change is necessary for programs that were compiled with earlier 91versions of the rpc library and do not make those requests using the 92loopback interface. 93.It Fl l 94Turns on libwrap connection logging. 95.It Fl s 96Causes 97.Nm 98to change to the user daemon as soon as possible. 99This causes 100.Nm 101to use non-privileged ports for outgoing connections, preventing non-privileged 102clients from using 103.Nm 104to connect to services from a privileged port. 105.It Fl L 106Allow old-style local connections over the loopback interface. 107Without this flag, local connections are only allowed over a local socket, 108.Pa /var/run/rpcbind.sock 109.El 110.Sh NOTES 111All RPC servers must be restarted if 112.Nm 113is restarted. 114.Sh FILES 115.Bl -tag -width "/var/run/rpcbind.sock" -compact 116.It Pa /var/run/rpcbind.sock 117.It Pa /etc/hosts.allow 118explicit remote host access list. 119.It Pa /etc/hosts.deny 120explicit remote host denial of service list. 121.El 122.Sh SEE ALSO 123.Xr rpcbind 3 , 124.Xr hosts_access 5 , 125.Xr hosts_options 5 , 126.Xr netconfig 5 , 127.Xr rpcinfo 8 128