xref: /freebsd/libexec/fingerd/fingerd.8 (revision d184218c)
1.\" Copyright (c) 1980, 1991, 1993
2.\"	The Regents of the University of California.  All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\"    notice, this list of conditions and the following disclaimer.
9.\" 2. Redistributions in binary form must reproduce the above copyright
10.\"    notice, this list of conditions and the following disclaimer in the
11.\"    documentation and/or other materials provided with the distribution.
12.\" 3. All advertising materials mentioning features or use of this software
13.\"    must display the following acknowledgement:
14.\"	This product includes software developed by the University of
15.\"	California, Berkeley and its contributors.
16.\" 4. Neither the name of the University nor the names of its contributors
17.\"    may be used to endorse or promote products derived from this software
18.\"    without specific prior written permission.
19.\"
20.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\"     @(#)fingerd.8	8.1 (Berkeley) 6/4/93
33.\" $FreeBSD$
34.\"
35.Dd April 1, 2010
36.Dt FINGERD 8
37.Os
38.Sh NAME
39.Nm fingerd
40.Nd remote user information server
41.Sh SYNOPSIS
42.Nm
43.Op Fl d
44.Op Fl k
45.Op Fl s
46.Op Fl l
47.Op Fl p Ar filename
48.Sh DESCRIPTION
49The
50.Nm
51utility uses a simple protocol based on
52.%T RFC1196
53that provides an interface to
54.Xr finger 1
55at several network sites.
56It is supposed to return a friendly,
57human-oriented status report on either the system at the moment
58or a particular person in depth.
59There is no required format and the
60protocol consists mostly of specifying a single
61.Dq "command line" ,
62thus,
63.Nm
64can also be used to implement other protocols in conjunction with the
65.Fl p
66flag.
67.Pp
68The
69.Nm
70utility is started by
71.Xr inetd 8 ,
72which listens for
73.Tn TCP
74requests at port 79.
75Once connected it reads a single command line
76terminated by a
77.Aq Tn CRLF
78which is passed to
79.Xr finger 1 .
80The
81.Nm
82utility closes its connections as soon as the output is finished.
83.Pp
84If the line is null (i.e., just a
85.Aq Tn CRLF
86is sent) then
87.Xr finger 1
88returns a
89.Dq default
90report that lists all people logged into
91the system at that moment.
92.Pp
93If a user name is specified (e.g.\&
94.Pf eric Aq Tn CRLF )
95then the
96response lists more extended information for only that particular user,
97whether logged in or not.
98Allowable
99.Dq names
100in the command line include both
101.Dq login names
102and
103.Dq user names .
104If a name is ambiguous, all possible derivations are returned.
105.Pp
106The following options may be passed to
107.Nm
108as server program arguments in
109.Pa /etc/inetd.conf :
110.Bl -tag -width indent
111.It Fl d
112Enable debugging mode.
113In debugging mode,
114.Nm
115will not attempt any network-related operations on
116.Va stdin ,
117and it will print the full
118.Nm finger
119command line
120to
121.Va stderr
122before executing it.
123.It Fl k
124Suppress login information.
125See the description of the
126.Fl k
127option in
128.Xr finger 1
129for details.
130.It Fl s
131Enable secure mode.
132Queries without a user name are rejected and
133forwarding of queries to other remote hosts is denied.
134.It Fl l
135Enable logging.
136The name of the host originating the query is reported via
137.Xr syslog 3
138at LOG_NOTICE priority.
139.It Fl p
140Use an alternate program as the local information provider.
141The default local program
142executed by
143.Nm
144is
145.Xr finger 1 .
146By specifying a customized local server,
147this option allows a system manager
148to have more control over what information is
149provided to remote sites.
150If
151.Fl p
152is specified,
153.Nm
154will also set the environment variable
155.Ev FINGERD_REMOTE_HOST
156to the name of the host making the request.
157.El
158.Sh SEE ALSO
159.Xr finger 1 ,
160.Xr inetd 8
161.Sh HISTORY
162The
163.Nm
164utility appeared in
165.Bx 4.3 .
166.Sh BUGS
167Connecting directly to the server from a
168.Tn TIP
169or an equally narrow-minded
170.Tn TELNET Ns \-protocol
171user program can result
172in meaningless attempts at option negotiation being sent to the
173server, which will foul up the command line interpretation.
174The
175.Nm
176utility should be taught to filter out
177.Tn IAC Ns \'s
178and perhaps even respond
179negatively
180.Pq Tn IAC WON'T
181to all option commands received.
182