xref: /netbsd/usr.sbin/rarpd/rarpd.8 (revision c4a72b64)
1.\"	$NetBSD: rarpd.8,v 1.11 2002/10/21 13:55:11 grant Exp $
2.\"
3.\" Copyright (c) 1988-1990 The Regents of the University of California.
4.\" All rights reserved.
5.\"
6.\" Redistribution and use in source and binary forms, with or without
7.\" modification, are permitted provided that: (1) source code distributions
8.\" retain the above copyright notice and this paragraph in its entirety, (2)
9.\" distributions including binary code include the above copyright notice and
10.\" this paragraph in its entirety in the documentation or other materials
11.\" provided with the distribution, and (3) all advertising materials mentioning
12.\" features or use of this software display the following acknowledgement:
13.\" ``This product includes software developed by the University of California,
14.\" Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
15.\" the University nor the names of its contributors may be used to endorse
16.\" or promote products derived from this software without specific prior
17.\" written permission.
18.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
19.\" WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
20.\" MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
21.\"
22.Dd October 17, 2002
23.Dt RARPD 8
24.Sh NAME
25.Nm rarpd
26.Nd Reverse ARP Daemon
27.Sh SYNOPSIS
28.Nm
29.Op Fl adfl
30.Oo
31.Ar interface
32.Op Ar ...
33.Oc
34.Sh DESCRIPTION
35.Nm
36services Reverse ARP requests on the Ethernet connected to
37.Ar interface .
38Upon receiving a request,
39.Nm
40maps the target hardware address to an IP address via its name, which
41must be present in both the
42.Xr ethers 5
43and
44.Xr hosts 5
45databases.
46If a host does not exist in both databases the translation cannot
47proceed and a reply will not be sent.
48.\" .Pp
49.\" Additionally, a request is honored only if the server
50.\" (the host that rarpd is running on)
51.\" can `boot' the target.
52.\" .Pp
53.\" To be considered able to boot the target the server must have
54.\" a file or directory
55.\" .Pa /tftpboot/ Ns Em ipaddr
56.\" where
57.\" .Pa ipaddr
58.\" is the target IP address as an eight digit hexadecimal string.
59.\" For example, the IP address 203.8.3.18 is represented as
60.\" .Sq CB080312 .
61.Pp
62In normal operation,
63.Nm
64forks a copy of itself and runs in
65the background.  Anomalies and errors are reported via
66.Xr syslog 3 .
67.Sh OPTIONS
68.Bl -tag -width indent
69.It Fl a
70Listen on all the Ethernets attached to the system.
71If
72.Sq Fl a
73is omitted, an interface must be specified.
74.It Fl d
75Run in debug mode, with all the output to stderr.
76This option implies the
77.Fl f
78option.
79.It Fl f
80Run in the foreground.
81.It Fl l
82Log all requests to syslog.
83.El
84.Sh FILES
85.Bl -tag -width Pa -compact
86.It Pa /etc/ethers
87.It Pa /etc/hosts
88.\" .It Pa /tftpboot
89.El
90.Sh SEE ALSO
91.Xr bpf 4
92.Rs
93.%R A Reverse Address  Resolution Protocol
94.%N RFC 903
95.%A Finlayson, R.
96.%A Mann, T.
97.%A Mogul, J.C.
98.%A Theimer, M.
99.Re
100.Sh AUTHORS
101Craig Leres (leres@ee.lbl.gov) and Steven McCanne (mccanne@ee.lbl.gov).
102Lawrence Berkeley Laboratory, University of California, Berkeley, CA.
103