xref: /minix3/tests/fs/nfs/nfsservice/rpcbind/rpcbind.8 (revision 11be35a165022172ed3cea20f2b5df0307540b0e)
1.\" $NetBSD: rpcbind.8,v 1.1 2010/07/26 15:53:00 pooka Exp $
2.\" @(#)rpcbind.1m 1.19 92/09/14 SMI; from SVr4
3.\" Copyright 1989 AT&T
4.\" Copyright 1991 Sun Microsystems, Inc.
5.Dd October 19, 2008
6.Dt RPCBIND 8
7.Sh NAME
8.Nm rpcbind
9.Nd universal addresses to RPC program number mapper
10.Sh SYNOPSIS
11.Nm
12.Op Fl dilLs
13.Sh DESCRIPTION
14.Nm
15is a server that converts
16.Tn RPC
17program numbers into
18universal addresses.
19It must be running on the host to be able to make
20.Tn RPC
21calls
22on a server on that machine.
23.Pp
24When an
25.Tn RPC
26service is started,
27it tells
28.Nm
29the address at which it is listening,
30and the
31.Tn RPC
32program numbers it is prepared to serve.
33When a client wishes to make an
34.Tn RPC
35call to a given program number,
36it first contacts
37.Nm
38on the server machine to determine
39the address where
40.Tn RPC
41requests should be sent.
42.Pp
43.Nm
44should be started before any other RPC service.
45Normally, standard
46.Tn RPC
47servers are started by port monitors, so
48.Nm
49must be started before port monitors are invoked.
50.Pp
51When
52.Nm
53is started, it checks that certain name-to-address
54translation-calls function correctly.
55If they fail, the network configuration databases may be corrupt.
56Since
57.Tn RPC
58services cannot function correctly in this situation,
59.Nm
60reports the condition and terminates.
61.Pp
62.Nm
63can only be started by the super-user.
64.Pp
65Access control is provided by
66.Pa /etc/hosts.allow
67and
68.Pa /etc/hosts.deny ,
69as described in
70.Xr hosts_access 5
71with daemon name
72.Nm .
73.Sh OPTIONS
74.Bl -tag -width Ds
75.It Fl d
76Run in debug mode.
77In this mode,
78.Nm
79will not fork when it starts, will print additional information
80during operation, and will abort on certain errors.
81With this option, the name-to-address translation consistency
82checks are shown in detail.
83.It Fl i
84.Dq insecure
85mode.
86Allows calls to SET and UNSET from any host.
87Normally
88.Nm
89accepts these requests only from the loopback interface for security reasons.
90This change is necessary for programs that were compiled with earlier
91versions of the rpc library and do not make those requests using the
92loopback interface.
93.It Fl l
94Turns on libwrap connection logging.
95.It Fl s
96Causes
97.Nm
98to change to the user daemon as soon as possible.
99This causes
100.Nm
101to use non-privileged ports for outgoing connections, preventing non-privileged
102clients from using
103.Nm
104to connect to services from a privileged port.
105.It Fl L
106Allow old-style local connections over the loopback interface.
107Without this flag, local connections are only allowed over a local socket,
108.Pa /var/run/rpcbind.sock
109.El
110.Sh NOTES
111All RPC servers must be restarted if
112.Nm
113is restarted.
114.Sh FILES
115.Bl -tag -width "/var/run/rpcbind.sock" -compact
116.It Pa /var/run/rpcbind.sock
117.It Pa /etc/hosts.allow
118explicit remote host access list.
119.It Pa /etc/hosts.deny
120explicit remote host denial of service list.
121.El
122.Sh SEE ALSO
123.Xr rpcbind 3 ,
124.Xr hosts_access 5 ,
125.Xr hosts_options 5 ,
126.Xr netconfig 5 ,
127.Xr rpcinfo 8
128