Deleted Added
full compact
fingerd.8 (98897) fingerd.8 (99500)
1.\" Copyright (c) 1980, 1991, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 16 unchanged lines hidden (view full) ---

25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)fingerd.8 8.1 (Berkeley) 6/4/93
1.\" Copyright (c) 1980, 1991, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 16 unchanged lines hidden (view full) ---

25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)fingerd.8 8.1 (Berkeley) 6/4/93
33.\" $FreeBSD: head/libexec/fingerd/fingerd.8 98897 2002-06-26 21:46:56Z wollman $
33.\" $FreeBSD: head/libexec/fingerd/fingerd.8 99500 2002-07-06 19:19:48Z charnier $
34.\"
35.Dd June 4, 1993
36.Dt FINGERD 8
37.Os
38.Sh NAME
39.Nm fingerd
40.Nd remote user information server
41.Sh SYNOPSIS
42.Nm
43.Op Fl s
44.Op Fl l
45.Op Fl p Ar filename
46.Sh DESCRIPTION
34.\"
35.Dd June 4, 1993
36.Dt FINGERD 8
37.Os
38.Sh NAME
39.Nm fingerd
40.Nd remote user information server
41.Sh SYNOPSIS
42.Nm
43.Op Fl s
44.Op Fl l
45.Op Fl p Ar filename
46.Sh DESCRIPTION
47.Nm Fingerd
48is a simple protocol based on
47The
48.Nm
49utility is a simple protocol based on
49.%T RFC1196
50that provides an interface to the
51Name and Finger programs at several network sites.
52The program is supposed to return a friendly,
53human-oriented status report on either the system at the moment
54or a particular person in depth.
55There is no required format and the
56protocol consists mostly of specifying a single
57.Dq command line .
58.Pp
50.%T RFC1196
51that provides an interface to the
52Name and Finger programs at several network sites.
53The program is supposed to return a friendly,
54human-oriented status report on either the system at the moment
55or a particular person in depth.
56There is no required format and the
57protocol consists mostly of specifying a single
58.Dq command line .
59.Pp
59.Nm Fingerd
60is started by
60The
61.Nm
62utility is started by
61.Xr inetd 8 ,
62which listens for
63.Tn TCP
64requests at port 79.
65Once connected it reads a single command line
66terminated by a
67.Aq Tn CRLF
68which is passed to
69.Xr finger 1 .
63.Xr inetd 8 ,
64which listens for
65.Tn TCP
66requests at port 79.
67Once connected it reads a single command line
68terminated by a
69.Aq Tn CRLF
70which is passed to
71.Xr finger 1 .
70.Nm Fingerd
71closes its connections as soon as the output is finished.
72The
73.Nm
74utility closes its connections as soon as the output is finished.
72.Pp
73If the line is null (i.e. just a
74.Aq Tn CRLF
75is sent) then
75.Pp
76If the line is null (i.e. just a
77.Aq Tn CRLF
78is sent) then
76.Xr finger
79.Xr finger 1
77returns a
78.Dq default
79report that lists all people logged into
80the system at that moment.
81.Pp
82If a user name is specified (e.g.\&
83.Pf eric Aq Tn CRLF )
84then the

--- 46 unchanged lines hidden (view full) ---

131.Sh BUGS
132Connecting directly to the server from a
133.Tn TIP
134or an equally narrow-minded
135.Tn TELNET Ns \-protocol
136user program can result
137in meaningless attempts at option negotiation being sent to the
138server, which will foul up the command line interpretation.
80returns a
81.Dq default
82report that lists all people logged into
83the system at that moment.
84.Pp
85If a user name is specified (e.g.\&
86.Pf eric Aq Tn CRLF )
87then the

--- 46 unchanged lines hidden (view full) ---

134.Sh BUGS
135Connecting directly to the server from a
136.Tn TIP
137or an equally narrow-minded
138.Tn TELNET Ns \-protocol
139user program can result
140in meaningless attempts at option negotiation being sent to the
141server, which will foul up the command line interpretation.
139.Nm Fingerd
140should be taught to filter out
142The
143.Nm
144utility should be taught to filter out
141.Tn IAC Ns \'s
142and perhaps even respond
143negatively
144.Pq Tn IAC WON'T
145to all option commands received.
146.Sh HISTORY
147The
148.Nm
145.Tn IAC Ns \'s
146and perhaps even respond
147negatively
148.Pq Tn IAC WON'T
149to all option commands received.
150.Sh HISTORY
151The
152.Nm
149command appeared in
153utility appeared in
150.Bx 4.3 .
154.Bx 4.3 .