xref: /openbsd/usr.sbin/rarpd/rarpd.8 (revision 8fc42664)
1.\"	$OpenBSD: rarpd.8,v 1.21 2015/10/28 10:02:59 jmc Exp $
2.\"	$NetBSD: rarpd.8,v 1.7 1998/04/15 15:06:06 mrg Exp $
3.\"
4.\" Copyright (c) 1988-1990 The Regents of the University of California.
5.\" All rights reserved.
6.\"
7.\" Redistribution and use in source and binary forms, with or without
8.\" modification, are permitted provided that: (1) source code distributions
9.\" retain the above copyright notice and this paragraph in its entirety, (2)
10.\" distributions including binary code include the above copyright notice and
11.\" this paragraph in its entirety in the documentation or other materials
12.\" provided with the distribution, and (3) all advertising materials mentioning
13.\" features or use of this software display the following acknowledgement:
14.\" ``This product includes software developed by the University of California,
15.\" Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
16.\" the University nor the names of its contributors may be used to endorse
17.\" or promote products derived from this software without specific prior
18.\" written permission.
19.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
20.\" WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
21.\" MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
22.\" @(#) $Id: rarpd.8,v 1.21 2015/10/28 10:02:59 jmc Exp $
23.\"
24.Dd $Mdocdate: October 28 2015 $
25.Dt RARPD 8
26.Os
27.Sh NAME
28.Nm rarpd
29.Nd reverse ARP daemon
30.Sh SYNOPSIS
31.Nm rarpd
32.Op Fl adflt
33.Ar if0 Op Ar ... ifN
34.Sh DESCRIPTION
35.Nm
36services Reverse ARP requests on the Ethernet connected to
37the specified interfaces.
38Upon receiving a request,
39.Nm
40maps the target hardware address to an IP address via its name, which
41must be present in both the
42.Xr ethers 5
43and
44.Xr hosts 5
45databases.
46If a host does not exist in both databases, the translation cannot
47proceed and a reply will not be sent.
48.Pp
49In normal operation,
50.Nm
51forks a copy of itself and runs in the background.
52Anomalies and errors are reported via
53.Xr syslog 3 .
54.Pp
55The options are as follows:
56.Bl -tag -width Ds
57.It Fl a
58Listen on all the Ethernets attached to the system.
59If
60.Fl a
61is omitted, a list of interfaces must be specified.
62.It Fl d
63Run in debug mode, with all the output to stderr.
64This option implies the
65.Fl f
66option.
67.It Fl f
68Run in the foreground.
69.It Fl l
70Log all requests to
71.Xr syslog 3 .
72.It Fl t
73Only honour a request if the server
74(the host that
75.Nm
76is running on)
77can "boot" the target; that is, if a file or directory called
78.Pa /tftpboot/ipaddr
79exists, where
80.Pa ipaddr
81is the target IP address expressed in uppercase hexadecimal
82(only the first 8 characters of filenames are checked).
83.El
84.Sh FILES
85.Bl -tag -width /etc/ethers -compact
86.It Pa /etc/ethers
87Ethernet host name database.
88.It Pa /etc/hosts
89Host name database.
90.\" .It Pa /tftpboot
91.El
92.Sh SEE ALSO
93.Xr bpf 4 ,
94.Xr diskless 8
95.Sh STANDARDS
96.Rs
97.%A R. Finlayson
98.%A T. Mann
99.%A J. Mogul
100.%A M. Theimer
101.%D June 1984
102.%R RFC 903
103.%T A Reverse Address Resolution Protocol
104.Re
105.Sh AUTHORS
106.An -nosplit
107.An Craig Leres Aq Mt leres@ee.lbl.gov
108and
109.An Steven McCanne Aq Mt mccanne@ee.lbl.gov ,
110Lawrence Berkeley Laboratory, University of California, Berkeley, CA.
111