1.\" $NetBSD: rarpd.8,v 1.7 1998/04/15 15:06:06 mrg Exp $ 2.\" 3.\" Copyright (c) 1988-1990 The Regents of the University of California. 4.\" All rights reserved. 5.\" 6.\" Redistribution and use in source and binary forms, with or without 7.\" modification, are permitted provided that: (1) source code distributions 8.\" retain the above copyright notice and this paragraph in its entirety, (2) 9.\" distributions including binary code include the above copyright notice and 10.\" this paragraph in its entirety in the documentation or other materials 11.\" provided with the distribution, and (3) all advertising materials mentioning 12.\" features or use of this software display the following acknowledgement: 13.\" ``This product includes software developed by the University of California, 14.\" Lawrence Berkeley Laboratory and its contributors.'' Neither the name of 15.\" the University nor the names of its contributors may be used to endorse 16.\" or promote products derived from this software without specific prior 17.\" written permission. 18.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED 19.\" WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF 20.\" MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. 21.\" 22.Dd October 26, 1990 23.Dt RARPD 8 24.Sh NAME 25.Nm rarpd 26.Nd Reverse ARP Daemon 27.Sh SYNOPSIS 28.Nm 29.Op Fl adfl 30.Op Ar interface 31.Sh DESCRIPTION 32.Nm 33services Reverse ARP requests on the Ethernet connected to 34.Ar interface . 35Upon receiving a request, 36.Nm 37maps the target hardware address to an IP address via its name, which 38must be present in both the 39.Xr ethers 5 40and 41.Xr hosts 5 42databases. 43If a host does not exist in both databases the translation cannot 44proceed and a reply will not be sent. 45.\" .Pp 46.\" Additionally, a request is honored only if the server 47.\" (the host that rarpd is running on) 48.\" can `boot' the target. 49.\" .Pp 50.\" To be considered able to boot the target the server must have 51.\" a file or directory 52.\" .Pa /tftpboot/ Ns Em ipaddr 53.\" where 54.\" .Pa ipaddr 55.\" is the target IP address as an eight digit hexadecimal string. 56.\" For example, the IP address 203.8.3.18 is represented as 57.\" .Sq CB080312 . 58.Pp 59In normal operation, 60.Nm 61forks a copy of itself and runs in 62the background. Anomalies and errors are reported via 63.Xr syslog 3 . 64.Sh OPTIONS 65.Bl -tag -width indent 66.It Fl a 67Listen on all the Ethernets attached to the system. 68If 69.Sq Fl a 70is omitted, an interface must be specified. 71.It Fl d 72Run in debug mode, with all the output to stderr. 73This option implies the 74.Fl f 75option. 76.It Fl f 77Run in the foreground. 78.It Fl l 79Log all requests to syslog. 80.El 81.Sh FILES 82.Bl -tag -width Pa -compact 83.It Pa /etc/ethers 84.It Pa /etc/hosts 85.\" .It Pa /tftpboot 86.El 87.Sh SEE ALSO 88.Xr bpf 4 , 89.Rs 90.%R A Reverse Address Resolution Protocol 91.%N RFC 903 92.%A Finlayson, R. 93.%A Mann, T. 94.%A Mogul, J.C. 95.%A Theimer, M. 96.Re 97.Sh AUTHORS 98Craig Leres (leres@ee.lbl.gov) and Steven McCanne (mccanne@ee.lbl.gov). 99Lawrence Berkeley Laboratory, University of California, Berkeley, CA. 100