fingerd.8 (98897) | fingerd.8 (99500) |
---|---|
1.\" Copyright (c) 1980, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 16 unchanged lines hidden (view full) --- 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" @(#)fingerd.8 8.1 (Berkeley) 6/4/93 | 1.\" Copyright (c) 1980, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 16 unchanged lines hidden (view full) --- 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" @(#)fingerd.8 8.1 (Berkeley) 6/4/93 |
33.\" $FreeBSD: head/libexec/fingerd/fingerd.8 98897 2002-06-26 21:46:56Z wollman $ | 33.\" $FreeBSD: head/libexec/fingerd/fingerd.8 99500 2002-07-06 19:19:48Z charnier $ |
34.\" 35.Dd June 4, 1993 36.Dt FINGERD 8 37.Os 38.Sh NAME 39.Nm fingerd 40.Nd remote user information server 41.Sh SYNOPSIS 42.Nm 43.Op Fl s 44.Op Fl l 45.Op Fl p Ar filename 46.Sh DESCRIPTION | 34.\" 35.Dd June 4, 1993 36.Dt FINGERD 8 37.Os 38.Sh NAME 39.Nm fingerd 40.Nd remote user information server 41.Sh SYNOPSIS 42.Nm 43.Op Fl s 44.Op Fl l 45.Op Fl p Ar filename 46.Sh DESCRIPTION |
47.Nm Fingerd 48is a simple protocol based on | 47The 48.Nm 49utility is a simple protocol based on |
49.%T RFC1196 50that provides an interface to the 51Name and Finger programs at several network sites. 52The program is supposed to return a friendly, 53human-oriented status report on either the system at the moment 54or a particular person in depth. 55There is no required format and the 56protocol consists mostly of specifying a single 57.Dq command line . 58.Pp | 50.%T RFC1196 51that provides an interface to the 52Name and Finger programs at several network sites. 53The program is supposed to return a friendly, 54human-oriented status report on either the system at the moment 55or a particular person in depth. 56There is no required format and the 57protocol consists mostly of specifying a single 58.Dq command line . 59.Pp |
59.Nm Fingerd 60is started by | 60The 61.Nm 62utility is started by |
61.Xr inetd 8 , 62which listens for 63.Tn TCP 64requests at port 79. 65Once connected it reads a single command line 66terminated by a 67.Aq Tn CRLF 68which is passed to 69.Xr finger 1 . | 63.Xr inetd 8 , 64which listens for 65.Tn TCP 66requests at port 79. 67Once connected it reads a single command line 68terminated by a 69.Aq Tn CRLF 70which is passed to 71.Xr finger 1 . |
70.Nm Fingerd 71closes its connections as soon as the output is finished. | 72The 73.Nm 74utility closes its connections as soon as the output is finished. |
72.Pp 73If the line is null (i.e. just a 74.Aq Tn CRLF 75is sent) then | 75.Pp 76If the line is null (i.e. just a 77.Aq Tn CRLF 78is sent) then |
76.Xr finger | 79.Xr finger 1 |
77returns a 78.Dq default 79report that lists all people logged into 80the system at that moment. 81.Pp 82If a user name is specified (e.g.\& 83.Pf eric Aq Tn CRLF ) 84then the --- 46 unchanged lines hidden (view full) --- 131.Sh BUGS 132Connecting directly to the server from a 133.Tn TIP 134or an equally narrow-minded 135.Tn TELNET Ns \-protocol 136user program can result 137in meaningless attempts at option negotiation being sent to the 138server, which will foul up the command line interpretation. | 80returns a 81.Dq default 82report that lists all people logged into 83the system at that moment. 84.Pp 85If a user name is specified (e.g.\& 86.Pf eric Aq Tn CRLF ) 87then the --- 46 unchanged lines hidden (view full) --- 134.Sh BUGS 135Connecting directly to the server from a 136.Tn TIP 137or an equally narrow-minded 138.Tn TELNET Ns \-protocol 139user program can result 140in meaningless attempts at option negotiation being sent to the 141server, which will foul up the command line interpretation. |
139.Nm Fingerd 140should be taught to filter out | 142The 143.Nm 144utility should be taught to filter out |
141.Tn IAC Ns \'s 142and perhaps even respond 143negatively 144.Pq Tn IAC WON'T 145to all option commands received. 146.Sh HISTORY 147The 148.Nm | 145.Tn IAC Ns \'s 146and perhaps even respond 147negatively 148.Pq Tn IAC WON'T 149to all option commands received. 150.Sh HISTORY 151The 152.Nm |
149command appeared in | 153utility appeared in |
150.Bx 4.3 . | 154.Bx 4.3 . |