inetd.conf revision 84767
150472Speter# $FreeBSD: head/etc/inetd.conf 84767 2001-10-10 17:26:27Z obrien $ 237Srgrimes# 337Srgrimes# Internet server configuration database 437Srgrimes# 581020Srwatson# Define *both* IPv4 and IPv6 entries for dual-stack support. 681020Srwatson# To disable a service, comment it out by prefixing the line with '#'. 781020Srwatson# To enable a service, remove the '#' at the beginning of the line. 837Srgrimes# 981020Srwatson#ftp stream tcp nowait root /usr/libexec/ftpd ftpd -l 1081020Srwatson#ftp stream tcp6 nowait root /usr/libexec/ftpd ftpd -l 1181020Srwatson#telnet stream tcp nowait root /usr/libexec/telnetd telnetd 1281020Srwatson#telnet stream tcp6 nowait root /usr/libexec/telnetd telnetd 1366621Skris#shell stream tcp nowait root /usr/libexec/rshd rshd 1475017Speter#shell stream tcp6 nowait root /usr/libexec/rshd rshd 1566621Skris#login stream tcp nowait root /usr/libexec/rlogind rlogind 1675017Speter#login stream tcp6 nowait root /usr/libexec/rlogind rlogind 1766568Sjkh#finger stream tcp nowait/3/10 nobody /usr/libexec/fingerd fingerd -s 1875017Speter#finger stream tcp6 nowait/3/10 nobody /usr/libexec/fingerd fingerd -s 193190Spst#exec stream tcp nowait root /usr/libexec/rexecd rexecd 2037Srgrimes#nntp stream tcp nowait usenet /usr/libexec/nntpd nntpd 2181020Srwatson# 2241444Sdillon# run comsat as root to be able to print partial mailbox contents w/ biff, 2341444Sdillon# or use the safer tty:tty to just print that new mail has been received. 2481020Srwatson#comsat dgram udp wait tty:tty /usr/libexec/comsat comsat 2581020Srwatson# 2681020Srwatson# ntalk is required for the 'talk' utility to work correctly 2781020Srwatson#ntalk dgram udp wait tty:tty /usr/libexec/ntalkd ntalkd 2818639Spst#tftp dgram udp wait nobody /usr/libexec/tftpd tftpd /tftpboot 2918639Spst#bootps dgram udp wait root /usr/libexec/bootpd bootpd 3018639Spst# 3118639Spst# "Small servers" -- used to be standard on, but we're more conservative 3218639Spst# about things due to Internet security concerns. Only turn on what you 3318639Spst# need. 3418639Spst# 3518639Spst#daytime stream tcp nowait root internal 3675017Speter#daytime stream tcp6 nowait root internal 3718639Spst#daytime dgram udp wait root internal 3875017Speter#daytime dgram udp6 wait root internal 3918639Spst#time stream tcp nowait root internal 4075017Speter#time stream tcp6 nowait root internal 4118639Spst#time dgram udp wait root internal 4275017Speter#time dgram udp6 wait root internal 4318639Spst#echo stream tcp nowait root internal 4475017Speter#echo dgram udp6 wait root internal 455183Swollman#echo dgram udp wait root internal 4675017Speter#echo stream tcp6 nowait root internal 4718639Spst#discard stream tcp nowait root internal 4875017Speter#discard stream tcp6 nowait root internal 4918639Spst#discard dgram udp wait root internal 5075017Speter#discard dgram udp6 wait root internal 5118639Spst#chargen stream tcp nowait root internal 5275017Speter#chargen stream tcp6 nowait root internal 5318639Spst#chargen dgram udp wait root internal 5475017Speter#chargen dgram udp6 wait root internal 5518639Spst# 5637Srgrimes# Kerberos authenticated services 5718639Spst# 5819607Speter#klogin stream tcp nowait root /usr/libexec/rlogind rlogind -k 5919607Speter#eklogin stream tcp nowait root /usr/libexec/rlogind rlogind -k -x 6019607Speter#kshell stream tcp nowait root /usr/libexec/rshd rshd -k 6138337Smarkm#kip stream tcp nowait root /usr/libexec/kipd kipd 6218639Spst# 6355115Speter# CVS servers - for master CVS repositories only! You must set the 6455115Speter# --allow-root path correctly or you open a trivial to exploit but 6555115Speter# deadly security hole. 6618639Spst# 6755115Speter#cvspserver stream tcp nowait root /usr/bin/cvs cvs --allow-root=/your/cvsroot/here pserver 6855115Speter#cvs stream tcp nowait root /usr/bin/cvs cvs --allow-root=/your/cvsroot/here kserver 69591Srgrimes# 7018639Spst# RPC based services (you MUST have portmapper running to use these) 71831Sats# 7218639Spst#rstatd/1-3 dgram rpc/udp wait root /usr/libexec/rpc.rstatd rpc.rstatd 7318639Spst#rusersd/1-2 dgram rpc/udp wait root /usr/libexec/rpc.rusersd rpc.rusersd 7418639Spst#walld/1 dgram rpc/udp wait root /usr/libexec/rpc.rwalld rpc.rwalld 7518639Spst#pcnfsd/1-2 dgram rpc/udp wait root /usr/libexec/rpc.pcnfsd rpc.pcnfsd 7618639Spst#rquotad/1 dgram rpc/udp wait root /usr/libexec/rpc.rquotad rpc.rquotad 7718639Spst#sprayd/1 dgram rpc/udp wait root /usr/libexec/rpc.sprayd rpc.sprayd 7818639Spst# 7918639Spst# example entry for the optional pop3 server 8018639Spst# 814652Sats#pop3 stream tcp nowait root /usr/local/libexec/popper popper 82831Sats# 8321613Sache# example entry for the optional imap4 server 8421613Sache# 8521613Sache#imap4 stream tcp nowait root /usr/local/libexec/imapd imapd 8621613Sache# 8784265Skris# example entry for the optional uucpd server 8884265Skris#uucpd stream tcp nowait root /usr/local/libexec/uucpd uucpd 8984265Skris# 9048845Ssheldonh# Return error for all "ident" requests 9140911Sphk# 9248845Ssheldonh#auth stream tcp nowait root internal 9375017Speter#auth stream tcp6 nowait root internal 9440911Sphk# 9549034Ssheldonh# Provide internally a real "ident" service which provides ~/.fakeid support, 9649059Sgreen# provides ~/.noident support, reports UNKNOWN as the operating system type 9749059Sgreen# and times out after 30 seconds. 9818639Spst# 9949059Sgreen#auth stream tcp nowait root internal auth -r -f -n -o UNKNOWN -t 30 10075017Speter#auth stream tcp6 nowait root internal auth -r -f -n -o UNKNOWN -t 30 10129951Sjkh# 10248845Ssheldonh# Example entry for an external ident server 10348845Ssheldonh# 10448846Sgreen#auth stream tcp wait root /usr/local/sbin/identd identd -w -t120 10548845Ssheldonh# 10655779Sdbaker# Example entry for the optional qmail MTA 10755779Sdbaker# NOTE: This is no longer the correct way to handle incoming SMTP 10855779Sdbaker# connections for qmail. Use tcpserver (http://cr.yp.to/ucspi-tcp.html) 10955779Sdbaker# instead. 11037741Shoek# 11137741Shoek#smtp stream tcp nowait qmaild /var/qmail/bin/tcp-env tcp-env /var/qmail/bin/qmail-smtpd 11237741Shoek# 11329951Sjkh# Enable the following two entries to enable samba startup from inetd 11484400Sjkh# (from the Samba documentation). Enable the third entry to enable the swat 11584400Sjkh# samba configuration tool. 11629951Sjkh# 11784767Sobrien#netbios-ssn stream tcp nowait root /usr/local/sbin/smbd smbd 11884767Sobrien#netbios-ns dgram udp wait root /usr/local/sbin/nmbd nmbd 11984767Sobrien#swat stream tcp nowait.400 root /usr/local/sbin/swat swat 120