xref: /netbsd-src/usr.sbin/rpcbind/rpcbind.8 (revision 481fca6e59249d8ffcf24fef7cfbe7b131bfb080)
1.\" @(#)rpcbind.1m 1.19 92/09/14 SMI; from SVr4
2.\" Copyright 1989 AT&T
3.\" Copyright 1991 Sun Microsystems, Inc.
4.Dd Sep 14, 1992
5.Dt RPCBIND 8
6.Sh NAME
7.Nm rpcbind
8.Nd universal addresses to RPC program number mapper
9.Sh SYNOPSIS
10.Nm
11.Op Fl dilLs
12.Sh DESCRIPTION
13.Nm
14is a server that converts
15.Tn RPC
16program numbers into
17universal addresses.
18It must be running on the host to be able to make
19.Tn RPC
20calls
21on a server on that machine.
22.Pp
23When an
24.Tn RPC
25service is started,
26it tells
27.Nm
28the address at which it is listening,
29and the
30.Tn RPC
31program numbers it is prepared to serve.
32When a client wishes to make an
33.Tn RPC
34call to a given program number,
35it first contacts
36.Nm
37on the server machine to determine
38the address where
39.Tn RPC
40requests should be sent.
41.Pp
42.Nm
43should be started before any other RPC service.
44Normally, standard
45.Tn RPC
46servers are started by port monitors, so
47.Nm
48must be started before port monitors are invoked.
49.Pp
50When
51.Nm
52is started, it checks that certain name-to-address
53translation-calls function correctly.
54If they fail, the network configuration databases may be corrupt.
55Since
56.Tn RPC
57services cannot function correctly in this situation,
58.Nm
59reports the condition and terminates.
60.Pp
61.Nm
62can only be started by the super-user.
63.Sh OPTIONS
64.Bl -tag -width Ds
65.It Fl d
66Run in debug mode.
67In this mode,
68.Nm
69will not fork when it starts, will print additional information
70during operation, and will abort on certain errors.
71With this option, the name-to-address translation consistency
72checks are shown in detail.
73.It Fl i
74.Dq insecure
75mode.
76Allows calls to SET and UNSET from any host.
77Normally
78.Nm
79accepts these requests only from the loopback interface for security reasons.
80This change is necessary for programs that were compiled with earlier
81versions of the rpc library and do not make those requests using the
82loopback interface.
83.It Fl l
84Turns on libwrap connection logging.
85.It Fl s
86causes
87.Nm
88to change to the user daemon as soon as possible.
89This causes
90.Nm
91to use non-privileged ports for outgoing connections, preventing non-privileged
92clients from using
93.Nm
94to connect to services from a privileged port.
95.It Fl L
96Allow old-style local connections over the loopback interface.
97Without this flag, local connections are only allowed over a local socket,
98.Pa /var/run/rpcbind.sock
99.El
100.Sh NOTES
101.Pp
102All RPC servers must be restarted if
103.Nm
104is restarted.
105.Sh SEE ALSO
106.Xr rpcinfo 1 ,
107.Xr rpcbind 3
108.Sh FILES
109.Pa /var/run/rpcbind.sock
110