1.\" $NetBSD: rarpd.8,v 1.14 2016/12/21 12:03:48 abhinav Exp $ 2.\" 3.\" Copyright (c) 1988-1990 The Regents of the University of California. 4.\" All rights reserved. 5.\" 6.\" Redistribution and use in source and binary forms, with or without 7.\" modification, are permitted provided that: (1) source code distributions 8.\" retain the above copyright notice and this paragraph in its entirety, (2) 9.\" distributions including binary code include the above copyright notice and 10.\" this paragraph in its entirety in the documentation or other materials 11.\" provided with the distribution. Neither the name of 12.\" the University nor the names of its contributors may be used to endorse 13.\" or promote products derived from this software without specific prior 14.\" written permission. 15.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED 16.\" WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF 17.\" MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. 18.\" 19.Dd October 17, 2002 20.Dt RARPD 8 21.Os 22.Sh NAME 23.Nm rarpd 24.Nd Reverse ARP Daemon 25.Sh SYNOPSIS 26.Nm 27.Op Fl adfl 28.Oo 29.Ar interface 30.Op Ar ... 31.Oc 32.Sh DESCRIPTION 33.Nm 34services Reverse ARP requests on the Ethernet connected to 35.Ar interface . 36Upon receiving a request, 37.Nm 38maps the target hardware address to an IP address via its name, which 39must be present in both the 40.Xr ethers 5 41and 42.Xr hosts 5 43databases. 44If a host does not exist in both databases the translation cannot 45proceed and a reply will not be sent. 46.\" .Pp 47.\" Additionally, a request is honored only if the server 48.\" (the host that rarpd is running on) 49.\" can `boot' the target. 50.\" .Pp 51.\" To be considered able to boot the target the server must have 52.\" a file or directory 53.\" .Pa /tftpboot/ Ns Em ipaddr 54.\" where 55.\" .Pa ipaddr 56.\" is the target IP address as an eight digit hexadecimal string. 57.\" For example, the IP address 203.8.3.18 is represented as 58.\" .Sq CB080312 . 59.Pp 60In normal operation, 61.Nm 62forks a copy of itself and runs in 63the background. Anomalies and errors are reported via 64.Xr syslog 3 . 65.Sh OPTIONS 66.Bl -tag -width indent 67.It Fl a 68Listen on all the Ethernets attached to the system. 69If 70.Sq Fl a 71is omitted, an interface must be specified. 72.It Fl d 73Run in debug mode, with all the output to stderr. 74This option implies the 75.Fl f 76option. 77.It Fl f 78Run in the foreground. 79.It Fl l 80Log all requests to syslog. 81.El 82.Sh FILES 83.Bl -tag -width Pa -compact 84.It Pa /etc/ethers 85.It Pa /etc/hosts 86.\" .It Pa /tftpboot 87.El 88.Sh SEE ALSO 89.Xr bpf 4 , 90.Xr ethers 5 , 91.Xr hosts 5 92.Rs 93.%R A Reverse Address Resolution Protocol 94.%N RFC 903 95.%A Finlayson, R. 96.%A Mann, T. 97.%A Mogul, J.C. 98.%A Theimer, M. 99.Re 100.Sh AUTHORS 101.An -nosplit 102.An Craig Leres Aq Mt leres@ee.lbl.gov 103and 104.An Steven McCanne Aq Mt mccanne@ee.lbl.gov . 105Lawrence Berkeley Laboratory, University of California, Berkeley, CA. 106