1.\" @(#)rpcbind.1m 1.19 92/09/14 SMI; from SVr4 2.\" Copyright 1989 AT&T 3.\" Copyright 1991 Sun Microsystems, Inc. 4.Dd Sep 14, 1992 5.Dt RPCBIND 8 6.Sh NAME 7.Nm rpcbind 8.Nd universal addresses to RPC program number mapper 9.Sh SYNOPSIS 10.Nm 11.Op Fl dilLs 12.Sh DESCRIPTION 13.Nm 14is a server that converts 15.Tn RPC 16program numbers into 17universal addresses. 18It must be running on the host to be able to make 19.Tn RPC 20calls 21on a server on that machine. 22.Pp 23When an 24.Tn RPC 25service is started, 26it tells 27.Nm 28the address at which it is listening, 29and the 30.Tn RPC 31program numbers it is prepared to serve. 32When a client wishes to make an 33.Tn RPC 34call to a given program number, 35it first contacts 36.Nm 37on the server machine to determine 38the address where 39.Tn RPC 40requests should be sent. 41.Pp 42.Nm 43should be started before any other RPC service. 44Normally, standard 45.Tn RPC 46servers are started by port monitors, so 47.Nm 48must be started before port monitors are invoked. 49.Pp 50When 51.Nm 52is started, it checks that certain name-to-address 53translation-calls function correctly. 54If they fail, the network configuration databases may be corrupt. 55Since 56.Tn RPC 57services cannot function correctly in this situation, 58.Nm 59reports the condition and terminates. 60.Pp 61.Nm 62can only be started by the super-user. 63.Sh OPTIONS 64.Bl -tag -width Ds 65.It Fl d 66Run in debug mode. 67In this mode, 68.Nm 69will not fork when it starts, will print additional information 70during operation, and will abort on certain errors. 71With this option, the name-to-address translation consistency 72checks are shown in detail. 73.It Fl i 74.Dq insecure 75mode. 76Allows calls to SET and UNSET from any host. 77Normally 78.Nm 79accepts these requests only from the loopback interface for security reasons. 80This change is necessary for programs that were compiled with earlier 81versions of the rpc library and do not make those requests using the 82loopback interface. 83.It Fl l 84Turns on libwrap connection logging. 85.It Fl s 86causes 87.Nm 88to change to the user daemon as soon as possible. 89This causes 90.Nm 91to use non-privileged ports for outgoing connections, preventing non-privileged 92clients from using 93.Nm 94to connect to services from a privileged port. 95.It Fl L 96Allow old-style local connections over the loopback interface. 97Without this flag, local connections are only allowed over a local socket, 98.Pa /var/run/rpcbind.sock 99.El 100.Sh NOTES 101.Pp 102All RPC servers must be restarted if 103.Nm 104is restarted. 105.Sh SEE ALSO 106.Xr rpcinfo 1 , 107.Xr rpcbind 3 108.Sh FILES 109.Pa /var/run/rpcbind.sock 110