NetBSD/usr.sbin/portmap/portmap.8
jwise 2badef4d79 Add four big changes:
* portmap is now tcp-wrapped (i.e. obeys hosts.{allow,deny})
	  both for lookups (as `portmap') and for forwarded calls to
	  specific services.

	* the new -l flag, analagous to inetd -l, logs all connections
	  to portmap.

	* the new -s flag causes portmap to suid to the user daemon
	  after binding it's port, so that outgoing connections do
	  not come from privileged ports.  This prevents users from
	  using portmap to get a free privileged port.

	* portmap now _only_ accepts SETs and UNSETs on the loopback
	  interface.  In the past, anyone in the world could do all
	  sorts of nasty things to your portmap tables.  Note that
	  our libc already_only_ uses the loopback interface to
	  register rpc ports.

This work is modeled after/partially taken from Wietse Venema's tcp-
wrapped version of the BSD 4.3 portmap.  It has benefitted greatly from my
discussions with Luke, Matt and many others.
1999-01-11 20:51:09 +00:00

145 lines
3.9 KiB
Groff

.\" $NetBSD: portmap.8,v 1.5 1999/01/11 20:51:09 jwise Exp $
.\"
.\" Copyright (c) 1987 Sun Microsystems
.\" Copyright (c) 1990, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. All advertising materials mentioning features or use of this software
.\" must display the following acknowledgement:
.\" This product includes software developed by the University of
.\" California, Berkeley and its contributors.
.\" 4. Neither the name of the University nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" from: @(#)portmap.8 8.1 (Berkeley) 6/6/93
.\"
.Dd June 6, 1993
.Dt PORTMAP 8
.Os BSD 4.3
.Sh NAME
.Nm portmap
.Nd
.Tn RPC
program number to
.Tn DARPA
port mapper
.Sh SYNOPSIS
.Nm
.Op Fl dls
.Sh DESCRIPTION
.Nm
is a server that converts
.Tn RPC
program numbers into
.Tn DARPA
protocol port numbers.
It must be running in order to make
.Tn RPC
calls.
.Pp
When an
.Tn RPC
server is started, it will tell
.Nm
what port number it is listening to, and what
.Tn RPC
program numbers it is prepared to serve.
When a client wishes to make an
.Tn RPC
call to a given program number,
it will first contact
.Nm
on the server machine to determine
the port number where
.Tn RPC
packets should be sent.
.Pp
.Nm
must be started before any
.Tn RPC
servers are invoked.
.Pp
Normally
.Nm
forks and dissociates itself from the terminal
like any other daemon.
.Nm
then logs errors using
.Xr syslog 3 .
.Pp
.Nm
uses
.Xr libwrap
style access control (the
.Pa /etc/hosts.allow
and
.Pa /etc/hosts.deny
files)
to control access to the portmapper itself and control forwarding
of requests. This prevents clients from using
.Nm
to circumvent host-based services in individual services.
.Pp
Option available:
.Bl -tag -width Ds
.It Fl d
prevents
.Nm
from running as a daemon,
and causes errors and debugging information
to be printed to the standard error output.
.It Fl l
Turns on libwrap connection logging.
.It Fl s
causes
.Nm
to change to the user daemon as soon as possible.
This causes
.Nm
to use non-privileged ports for outgoing connections, preventing non-privileged
clients from using
.Nm
to connect to services from a privileged port.
.El
.Sh SEE ALSO
.Xr inetd.conf 5 ,
.Xr rpcinfo 8 ,
.Xr inetd 8 ,
.Xr syslog 3 ,
.Xr hosts_access 3 ,
.Xr hosts_options 3
.Sh BUGS
If
.Nm
crashes, all servers must be restarted.
.Sh HISTORY
The
.Nm
command appeared in
.Bx 4.3 .
The security features documented herein derive from work by Wietse Venema
at Eindhoven University of Technology, The Netherlands, and first appeared
in
.Nx 1.4 .