1.\" 2.\" Copyright (c) 1988-1990 The Regents of the University of California. 3.\" All rights reserved. 4.\" 5.\" Redistribution and use in source and binary forms, with or without 6.\" modification, are permitted provided that: (1) source code distributions 7.\" retain the above copyright notice and this paragraph in its entirety, (2) 8.\" distributions including binary code include the above copyright notice and 9.\" this paragraph in its entirety in the documentation or other materials 10.\" provided with the distribution, and (3) all advertising materials mentioning 11.\" features or use of this software display the following acknowledgement: 12.\" ``This product includes software developed by the University of California, 13.\" Lawrence Berkeley Laboratory and its contributors.'' Neither the name of 14.\" the University nor the names of its contributors may be used to endorse 15.\" or promote products derived from this software without specific prior 16.\" written permission. 17.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED 18.\" WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF 19.\" MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. 20.\" @(#) $Id: rarpd.8,v 1.2 1994/01/14 16:22:58 jtc Exp $ 21.\" 22.Dd October 26, 1990 23.Dt RARPD 8 24.Sh NAME 25.Nm rarpd 26.Nd Reverse ARP Daemon 27.Sh SYNOPSIS 28.Nm rarpd 29.Op Fl adf 30.Op Ar interface 31.Sh DESCRIPTION 32.Nm Rarpd 33services Reverse ARP requests on the Ethernet connected to 34.Ar interface. 35Upon receiving a request, 36.Nm rarpd 37maps the target hardware address to an IP address via its name, which 38must be present in both the 39.Xr ethers 5 40and 41.Xr hosts 5 42databases. 43If a host does not exist in both databases, the translation cannot 44proceed and a reply will not be sent. 45.Pp 46Additionally, a request is honored only if the server 47(i.e., the host that rarpd is running on) 48can "boot" the target; that is, if the directory 49.Pa /tftpboot/ Ns Em ipaddr 50exists, where 51.Rm ipaddr 52is the target IP address. 53.Pp 54In normal operation, 55.Nm rarpd 56forks a copy of itself and runs in 57the background. Anomalies and errors are reported via 58.Xr syslog 3 . 59.Sh OPTIONS 60.Bl -tag -width indent 61.It Fl a 62Listen on all the Ethernets attached to the system. 63If 64.Sq Fl a 65is omitted, an interface must be specified. 66.It Fl d 67Run in debug mode, with all the output to stderr. 68This option implies the 69.Fl f 70option. 71.It Fl f 72Run in the foreground. 73.El 74.Sh FILES 75.Bl -tag -width Pa -compact 76.It Pa /etc/ethers 77.It Pa /etc/hosts 78.It Pa /tftpboot 79.El 80.Sh SEE ALSO 81.Xr bpf 4 , 82.Rs 83.%R A Reverse Address Resolution Protocol 84.%N RFC 903 85.%A Finlayson, R. 86.%A Mann, T. 87.%A Mogul, J.C. 88.%A Theimer, M. 89.Re 90.Sh AUTHORS 91Craig Leres (leres@ee.lbl.gov) and Steven McCanne (mccanne@ee.lbl.gov). 92Lawrence Berkeley Laboratory, University of California, Berkeley, CA. 93