1.\" $NetBSD: rarpd.8,v 1.11 2002/10/21 13:55:11 grant Exp $ 2.\" 3.\" Copyright (c) 1988-1990 The Regents of the University of California. 4.\" All rights reserved. 5.\" 6.\" Redistribution and use in source and binary forms, with or without 7.\" modification, are permitted provided that: (1) source code distributions 8.\" retain the above copyright notice and this paragraph in its entirety, (2) 9.\" distributions including binary code include the above copyright notice and 10.\" this paragraph in its entirety in the documentation or other materials 11.\" provided with the distribution, and (3) all advertising materials mentioning 12.\" features or use of this software display the following acknowledgement: 13.\" ``This product includes software developed by the University of California, 14.\" Lawrence Berkeley Laboratory and its contributors.'' Neither the name of 15.\" the University nor the names of its contributors may be used to endorse 16.\" or promote products derived from this software without specific prior 17.\" written permission. 18.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED 19.\" WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF 20.\" MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. 21.\" 22.Dd October 17, 2002 23.Dt RARPD 8 24.Sh NAME 25.Nm rarpd 26.Nd Reverse ARP Daemon 27.Sh SYNOPSIS 28.Nm 29.Op Fl adfl 30.Oo 31.Ar interface 32.Op Ar ... 33.Oc 34.Sh DESCRIPTION 35.Nm 36services Reverse ARP requests on the Ethernet connected to 37.Ar interface . 38Upon receiving a request, 39.Nm 40maps the target hardware address to an IP address via its name, which 41must be present in both the 42.Xr ethers 5 43and 44.Xr hosts 5 45databases. 46If a host does not exist in both databases the translation cannot 47proceed and a reply will not be sent. 48.\" .Pp 49.\" Additionally, a request is honored only if the server 50.\" (the host that rarpd is running on) 51.\" can `boot' the target. 52.\" .Pp 53.\" To be considered able to boot the target the server must have 54.\" a file or directory 55.\" .Pa /tftpboot/ Ns Em ipaddr 56.\" where 57.\" .Pa ipaddr 58.\" is the target IP address as an eight digit hexadecimal string. 59.\" For example, the IP address 203.8.3.18 is represented as 60.\" .Sq CB080312 . 61.Pp 62In normal operation, 63.Nm 64forks a copy of itself and runs in 65the background. Anomalies and errors are reported via 66.Xr syslog 3 . 67.Sh OPTIONS 68.Bl -tag -width indent 69.It Fl a 70Listen on all the Ethernets attached to the system. 71If 72.Sq Fl a 73is omitted, an interface must be specified. 74.It Fl d 75Run in debug mode, with all the output to stderr. 76This option implies the 77.Fl f 78option. 79.It Fl f 80Run in the foreground. 81.It Fl l 82Log all requests to syslog. 83.El 84.Sh FILES 85.Bl -tag -width Pa -compact 86.It Pa /etc/ethers 87.It Pa /etc/hosts 88.\" .It Pa /tftpboot 89.El 90.Sh SEE ALSO 91.Xr bpf 4 92.Rs 93.%R A Reverse Address Resolution Protocol 94.%N RFC 903 95.%A Finlayson, R. 96.%A Mann, T. 97.%A Mogul, J.C. 98.%A Theimer, M. 99.Re 100.Sh AUTHORS 101Craig Leres (leres@ee.lbl.gov) and Steven McCanne (mccanne@ee.lbl.gov). 102Lawrence Berkeley Laboratory, University of California, Berkeley, CA. 103