From 0fccfdb82cfe6fb7dd3102e9a4e16dd557ef5d77 Mon Sep 17 00:00:00 2001 From: "Cynthia A. E. Livingston" Date: Sun, 17 Mar 1991 01:07:36 -0800 Subject: [PATCH] macro and text revision (-mdoc version 3) SCCS-vsn: bin/sync/sync.8 6.3 SCCS-vsn: games/dm/dm.8 5.10 SCCS-vsn: games/fortune/strfile/strfile.8 5.9 SCCS-vsn: local/kerberosIV/make_keypair/make_keypair.8 1.2 SCCS-vsn: local/kerberosIV/registerd/registerd.8 5.2 SCCS-vsn: libexec/bugfiler/bugfiler.8 6.11 SCCS-vsn: libexec/comsat/comsat.8 6.5 SCCS-vsn: libexec/fingerd/fingerd.8 6.4 SCCS-vsn: libexec/ftpd/ftpd.8 6.9 SCCS-vsn: libexec/kpasswdd/kpasswdd.8 1.3 SCCS-vsn: libexec/makekey/makekey.8 6.4 SCCS-vsn: libexec/rexecd/rexecd.8 6.5 SCCS-vsn: libexec/rlogind/rlogind.8 6.12 SCCS-vsn: libexec/talkd/talkd.8 6.5 SCCS-vsn: libexec/tftpd/tftpd.8 6.6 SCCS-vsn: sbin/XNSrouted/XNSrouted.8 6.4 SCCS-vsn: sbin/badsect/badsect.8 6.4 SCCS-vsn: sbin/dmesg/dmesg.8 6.4 SCCS-vsn: sbin/dump/dump.8 6.6 SCCS-vsn: sbin/dumpfs/dumpfs.8 6.2 SCCS-vsn: old/enpload/enpload.8 5.4 SCCS-vsn: sbin/fastboot/fastboot.8 6.3 SCCS-vsn: sbin/reboot/halt.8 6.5 SCCS-vsn: sbin/ifconfig/ifconfig.8 6.13 --- usr/src/bin/sync/sync.8 | 62 +-- usr/src/games/dm/dm.8 | 100 +++-- usr/src/games/fortune/strfile/strfile.8 | 131 ++++--- usr/src/libexec/bugfiler/bugfiler.8 | 364 ++++++++++++------ usr/src/libexec/comsat/comsat.8 | 82 ++-- usr/src/libexec/fingerd/fingerd.8 | 99 +++-- usr/src/libexec/ftpd/ftpd.8 | 321 ++++++++------- usr/src/libexec/kpasswdd/kpasswdd.8 | 40 +- usr/src/libexec/makekey/makekey.8 | 42 +- usr/src/libexec/rexecd/rexecd.8 | 124 +++--- usr/src/libexec/rlogind/rlogind.8 | 133 ++++--- usr/src/libexec/talkd/talkd.8 | 48 ++- usr/src/libexec/tftpd/tftpd.8 | 78 ++-- .../kerberosIV/make_keypair/make_keypair.8 | 74 ++-- .../local/kerberosIV/registerd/registerd.8 | 56 ++- usr/src/old/enpload/enpload.8 | 85 ++-- usr/src/sbin/XNSrouted/XNSrouted.8 | 178 +++++---- usr/src/sbin/badsect/badsect.8 | 100 +++-- usr/src/sbin/dmesg/dmesg.8 | 66 ++-- usr/src/sbin/dump/dump.8 | 350 +++++++++-------- usr/src/sbin/dumpfs/dumpfs.8 | 47 ++- usr/src/sbin/fastboot/fastboot.8 | 62 +-- usr/src/sbin/ifconfig/ifconfig.8 | 326 +++++++++------- usr/src/sbin/reboot/halt.8 | 83 ++-- 24 files changed, 1778 insertions(+), 1273 deletions(-) diff --git a/usr/src/bin/sync/sync.8 b/usr/src/bin/sync/sync.8 index d8905161c0..27106a7a4f 100644 --- a/usr/src/bin/sync/sync.8 +++ b/usr/src/bin/sync/sync.8 @@ -1,38 +1,46 @@ -.\" Copyright (c) 1980 Regents of the University of California. -.\" All rights reserved. The Berkeley software License Agreement -.\" specifies the terms and conditions for redistribution. +.\" Copyright (c) 1980, 1991 Regents of the University of California. +.\" All rights reserved. .\" -.\" @(#)sync.8 6.2 (Berkeley) %G% +.\" %sccs.include.redist.man% .\" -.TH SYNC 8 "" -.UC 4 -.SH NAME -sync \- update the super block -.SH SYNOPSIS -.B /etc/sync -.SH DESCRIPTION -.I Sync -executes the -.I sync -system primitive. -.I Sync +.\" @(#)sync.8 6.3 (Berkeley) %G% +.\" +.Dd +.Dt SYNC 8 +.Os BSD 4 +.Sh NAME +.Nm sync +.Nd synchronize internal filesystem information with that on the disk +.Sh SYNOPSIS +.Nm /etc/sync +.Sh DESCRIPTION +.Xr Sync can be called to insure that all disk writes have been completed before the processor is halted in a way not suitably done by -.IR reboot (8) +.Xr reboot 8 or -.IR halt (8). +.Xr halt 8 . Generally, it is preferable to use -.I reboot +.Xr reboot or -.I halt +.Xr halt to shut down the system, as they may perform additional actions such as resynchronizing the hardware clock and flushing internal caches before performing a final -.IR sync . -.PP -See -.IR sync (2) -for details on the system primitive. -.SH "SEE ALSO" -sync(2), fsync(2), halt(8), reboot(8), update(8) +.Xr sync . +.Pp +.Nm sync +utilizes the +.Xr sync 2 +function call. +.Sh SEE ALSO +.Xr sync 2 , +.Xr fsync 2 , +.Xr halt 8 , +.Xr reboot 8 , +.Xr update 8 +.Sh HISTORY +A +.Nm +command appeared in Version 6 AT&T UNIX. diff --git a/usr/src/games/dm/dm.8 b/usr/src/games/dm/dm.8 index bd58cca6cc..ac6123bd37 100644 --- a/usr/src/games/dm/dm.8 +++ b/usr/src/games/dm/dm.8 @@ -1,51 +1,83 @@ -.\" Copyright (c) 1987 Regents of the University of California. +.\" Copyright (c) 1987, 1991 Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)dm.8 5.9 (Berkeley) %G% +.\" @(#)dm.8 5.10 (Berkeley) %G% .\" -.TH DM 8 "" -.UC 8 -.SH NAME -dm \- dungeon master -.SH SYNOPSIS -.B ln -s dm game -.SH DESCRIPTION -.I Dm +.Dd +.Dt DM 8 +.Os BSD ??? +.Sh NAME +.Nm dm +.Nd dungeon master +.Sh SYNOPSIS +.Nm ln +.Fl s Cm dm Ar game +.Sh DESCRIPTION +.Nm Dm is a program used to regulate game playing. -.I Dm +.Nm Dm expects to be invoked with the name of a game that a user wishes to play. This is done by creating symbolic links to -.IR dm , -in the directory ``/usr/games'' for all of the regulated games. -The actual binaries for these games should be placed in a ``hidden'' -directory, ``/usr/games/hide'', that may only be accessed by the -.I dm +.Nm dm , +in the directory +.Pa /usr/games +for all of the regulated games. +The actual binaries for these games should be placed in a +.Dq hidden +directory, +.Pa /usr/games/hide , +that may only be accessed by the +.Nm dm program. -.I Dm +.Nm Dm determines if the requested game is available and, if so, runs it. -The file ``/etc/dm.conf'' controls the conditions under which games may +The file +.Pa /etc/dm.conf +controls the conditions under which games may be run. -.PP -The file ``/etc/nogames'' may be used to ``turn off'' game playing. +.Pp +The file +.Pa /etc/nogames +may be used to +.Dq turn off +game playing. If the file exists, no game playing is allowed; the contents of the file will be displayed to any user requesting a game. -.SH FILES -.nf -.ta \w'/var/log/games.log 'u -/etc/dm.conf \- configuration file -/etc/nogames \- turns off game playing -/usr/games/hide \- directory of ``real'' binaries -/var/log/games.log \- game logging file -.SH SEE ALSO -dm.conf(5) -.SH BUGS -Two problems result from \fIdm\fP running the games setuid ``games''. -First, all games that allow users to run UNIX commands should carefully +.Sh FILES +.Bl -tag -width /var/log/games.log -compact +.It Pa /etc/dm.conf +configuration file +.It Pa /etc/nogames +turns off game playing +.It Pa /usr/games/hide +directory of ``real'' binaries +.It Pa /var/log/games.log +game logging file +.El +.Sh SEE ALSO +.Xr dm.conf 5 +.Sh BUGS +Two problems result from +.Nm dm +running the games setuid +.Dq games . +First, all games that allow users to run +.Tn UNIX +commands should carefully set both the real and effective user id's immediately before executing -those commands. Probably more important is that \fIdm\fP never be setuid -anything but ``games'' so that compromising a game will result only in +those commands. Probably more important is that +.Nm dm +never be setuid +anything but +.Dq games +so that compromising a game will result only in the user's ability to play games at will. Secondly, games which previously had no reason to run setuid and which accessed user files may have to be modified. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.3 tahoe . diff --git a/usr/src/games/fortune/strfile/strfile.8 b/usr/src/games/fortune/strfile/strfile.8 index dcbe455c5d..5b37430283 100644 --- a/usr/src/games/fortune/strfile/strfile.8 +++ b/usr/src/games/fortune/strfile/strfile.8 @@ -1,78 +1,80 @@ -.\" Copyright (c) 1989 The Regents of the University of California. +.\" Copyright (c) 1989, 1991 The Regents of the University of California. .\" All rights reserved. +.\" .\" .\" This code is derived from software contributed to Berkeley by .\" Ken Arnold. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)strfile.8 5.8 (Berkeley) %G% +.\" @(#)strfile.8 5.9 (Berkeley) %G% .\" -.TH STRFILE 8 "" -.UC 4 -.SH NAME -strfile, unstr \- create a random access file for storing strings -.SH SYNOPSIS -.B strfile [ -.I \-iorsx -.B ] [ -.I \-c char -.B ] -.I source_file -.B [ -.I output_file -.B ] -.br -.B unstr -.I source_file -.SH DESCRIPTION -.I Strfile +.Dd +.Dt STRFILE 8 +.Os BSD 4 +.Sh NAME +.Nm strfile , +.Nm unstr +.Nd "create a random access file for storing strings" +.Sh SYNOPSIS +.Nm strfile +.Op Fl iorsx +.Op Fl c Ar char +.Ar source_file +.Op Ar output_file +.Nm unstr +.Ar source_file +.Sh DESCRIPTION +.Nm Strfile reads a file containing groups of lines separated by a line containing -a single percent (``%'') sign and creates a data file which contains +a single percent +.Ql \&% +sign and creates a data file which contains a header structure and a table of file offsets for each group of lines. This allows random access of the strings. -.PP +.Pp The output file, if not specified on the command line, is named -\fIsource_file\fB.out\fR. -.PP +.Ar source_file Ns Sy .out . +.Pp The options are as follows: -.TP -.BI \-c \ char +.Bl -tag -width "-c char" +.It Fl c Ar char Change the delimiting character from the percent sign to -.IR char . -.TP -.B \-i +.Ar char . +.It Fl i Ignore case when ordering the strings. -.TP -.B \-o +.It Fl o Order the strings in alphabetical order. The offset table will be sorted in the alphabetical order of the groups of lines referenced. Any initial non-alphanumeric characters are ignored. -This option causes the STR_ORDERED bit in the header -.I str_flags +This option causes the +.Dv STR_ORDERED +bit in the header +.Ar str_flags field to be set. -.TP -.B \-r +.It Fl r Randomize access to the strings. Entries in the offset table will be randomly ordered. -This option causes the STR_RANDOM bit in the header -.I str_flags +This option causes the +.Dv STR_RANDOM +bit in the header +.Ar str_flags field to be set. -.TP -.B \-s +.It Fl s Run silently; don't give a summary message when finished. -.TP -.B \-x +.It Fl x Note that each alphabetic character in the groups of lines is rotated 13 positions in a simple caesar cypher. -This option causes the STR_ROTATED bit in the header -.I str_flags +This option causes the +.Dv STR_ROTATED +bit in the header +.Ar str_flags field to be set. -.PP +.El +.Pp The format of the header is: -.in +5 -.nf +.Bd -literal #define VERSION 1 unsigned long str_version; /* version number */ unsigned long str_numstr; /* # of strings in the file */ @@ -83,26 +85,37 @@ unsigned long str_shortlen; /* length of shortest string */ #define STR_ROTATED 0x4 /* rot-13'd text */ unsigned long str_flags; /* bit field for flags */ char str_delim; /* delimiting character */ -.fi -.PP +.Ed +.Pp All fields are written in network byte order. -.PP +.Pp The purpose of -.I unstr +.Nm unstr is to undo the work of -.IR strfile . +.Nm strfile . It prints out the strings contained in the file -.I source_file +.Ar source_file in the order that they are listed in the header file -.IB source_file .dat +.Ar source_file Ns Pa .dat to standard output. It is possible to create sorted versions of input files by using -.B \-o +.Fl o when -.I strfile +.Nm strfile is run and then using -.I unstr +.Nm unstr to dump them out in the table order. -.SH "SEE ALSO" -byteorder(3), fortune(6) +.Sh SEE ALSO +.Xr byteorder 3 , +.Xr fortune 6 +.Sh FILES +.Bl -tag -width strfile.out -compact +.It Pa strfile.out +default output file. +.El +.Sh HISTORY +The +.Nm +command +.Ud diff --git a/usr/src/libexec/bugfiler/bugfiler.8 b/usr/src/libexec/bugfiler/bugfiler.8 index 64ec51134d..ae7e7a364b 100644 --- a/usr/src/libexec/bugfiler/bugfiler.8 +++ b/usr/src/libexec/bugfiler/bugfiler.8 @@ -1,156 +1,268 @@ -.\" Copyright (c) 1983 The Regents of the University of California. +.\" Copyright (c) 1983, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)bugfiler.8 6.10 (Berkeley) %G% +.\" @(#)bugfiler.8 6.11 (Berkeley) %G% .\" -.TH BUGFILER 8 "" -.UC 5 -.SH NAME -bugfiler \- file bug reports in folders automatically -.SH SYNOPSIS -.B bugfiler -[ -ar ] [-v version] -.SH DESCRIPTION -\fIBugfiler\fP is a program to automatically intercept, acknowledge, -redistribute and store bug reports. \fIBugfiler\fP is normally invoked +.Dd +.Dt BUGFILER 8 +.Os BSD 4.2 +.Sh NAME +.Nm bugfiler +.Nd file bug reports in folders automatically +.Sh SYNOPSIS +.Nm bugfiler +.Op Fl ar +.Op Fl v Ar version +.Sh DESCRIPTION +.Nm Bugfiler +is a program to automatically intercept, acknowledge, +redistribute and store bug reports. +.Nm Bugfiler +is normally invoked by the mail delivery program with a line similar to the following in -/etc/aliases. -.PP -.DT - bugs: "|bugfiler" -.br -.PP -It should be noted that the login ``bugs'' must exist for the bugfiler -to run. Unless otherwise noted all paths used by \fIbugfiler\fP are -relative to the home directory of this login. \fIBugfiler\fP also -expects all of its files and directories to be owned by ``bugs''. -.PP +.Pa /etc/aliases . +.Bd -literal -offset indent +bugs: "|bugfiler" +.Ed +.Pp +It should be noted that the login +.Dq bugs +must exist for the bugfiler +to run. Unless otherwise noted all paths used by +.Nm bugfiler +are +relative to the home directory of this login. +.Nm Bugfiler +also +expects all of its files and directories to be owned by +.Dq bugs . +.Pp +Available options. +.Bl -tag -width Ds +.It Fl a +Do not send automatic mail acknowledgement to the bug report filer. +(The default is to send the acknowledgement with the file +.Pa ~bugs/version/bug:ack +appended). +.It Fl r +Do not redistribute. +.It Fl v Ar version +Override the +.Ar version +provided within the bug report itself. +.El +.Pp For the bug report to be correctly filed, it must contain a line in the following format: -.PP -.DT - Index: \fIfolder\fP \fIversion\fP -.br -.PP -The directories ~bugs/\fIversion\fP and ~bugs/\fIversion\fP/\fIfolder\fP -must exist before \fIbugfiler\fP attempts to store the bug report. Bug -reports will be stored in files named by the concatenation of \fIversion, -folder,\fP and sequential numbers, i.e. if \fIversion\fP is ``4.3BSD'' and -\fIfolder\fP is ``ucb'' the first bug report will be placed in -~bugs/4.3BSD/ucb/1. If \fIfolder\fP contains more than one component only -the first one will be used, e.g. if \fIfolder\fP is ``bin/from.c'' or -``bin/adb/con.c'' it will be treated as if it were simply ``bin''. The -\fI-v\fP flag is provided as a means to override the \fIversion\fP -provided within the bug report itself. -.PP -A mail acknowledgement is automatically sent to the bug report filer unless -the \fB-a\fP flag is supplied. The file ~bugs/\fIversion\fP/bug:ack is -appended to this acknowledgement. -.PP -If the \fB-r\fP flag is not supplied, redistribution of the bug reports -is done as specified in the file ~bugs/\fIversion\fP/bug:redist. This file -is in the format of the \fIaliases\fP(5) file, including comments and +.Pp +.Bd -filled -offset indent -compact +.Bl -column Index folder +.It Index: Ta Em folder Ta Ar version +.El +.Ed +.Pp +The directories +.Pa ~bugs/ Ns Ar version +and +.Pa ~bugs/ Ns Ar version/ Ns Em folder +must exist before +.Nm bugfiler +attempts to store the bug report. Bug +reports will be stored in files named by the concatenation of +.Ar version , +.Em folder , +and sequential numbers, i.e. if +.Ar version +is +.Dq 4.3 Tn BSD +and +.Em folder +is +.Dq ucb +the first bug report will be placed in +.Pa ~bugs/4.3BSD/ucb/1 . +If +.Em folder +contains more than one component only +the first one will be used, e.g. if +.Em folder +is +.Dq bin/from.c +or +.Dq bin/adb/con.c +it will be treated as if it were simply +.Dq bin . +.Pp +.Pp +If the +.Fl r +flag is not supplied, redistribution of the bug reports +is done as specified in the file +.Pa ~bugs/version/bug:redist . +This file +is in the format of the +.Xr aliases 5 +file, including comments and entries requiring multiple lines, with the single exception that the -\fIfolder\fP component of the ``Index:'' line replaces the name to alias. -The special folder ``all:'' receives a redistribution of all bug reports -sent to this \fIversion\fP. For example, the \fIbug:redist\fP file -.PP -.DT - # bigbug gets a copy of everything -.br - all: bigbug -.br - # ucb folder redistribution list -.br - ucb: karels, kjd@coke.berkeley.edu -.br - ra@beno.css.gov -.br -.PP -will send copies of all bug reports with ``ucb'' as the \fIfolder\fP +.Em folder +component of the +.Dq Index: +line replaces the name to alias. +The special folder +.Dq all: +receives a redistribution of all bug reports +sent to this +.Ar version . +For example, the +.Pa bug:redist +file +.Pp +.Bd -literal -offset indent -compact +# bigbug gets a copy of everything +all: bigbug +# ucb folder redistribution list +ucb: karels, kjd@coke.berkeley.edu + ra@beno.css.gov +.Ed +.Pp +will send copies of all bug reports with +.Dq ucb +as the +.Em folder to bigbug, karels, kjd, and ra. -.PP -Reports that cannot be filed, due to an invalid ``Index:'' line or -some other error, are placed in the directory ~bugs/errors. The -\fIbugfiler\fP maintainer should correct these bug reports and then -run \fIbugfiler\fP, with the corrected report as its standard input, +.Pp +Reports that cannot be filed, due to an invalid +.Dq Index: +line or +some other error, are placed in the directory +.Pa ~bugs/errors . +The +.Nm bugfiler +maintainer should correct these bug reports and then +run +.Nm bugfiler , +with the corrected report as its standard input, as bug reports with errors are neither acknowledged or redistributed. -All reports that \fIbugfiler\fP handles are logged in ~bugs/log. -.PP -Valid bugs are also logged in the file ~bugs/\fIversion\fP/summary. -This file has an entry for each bug report for \fIversion\fP in the +All reports that +.Nm bugfiler +handles are logged in +.Pa ~bugs/log. +.Pp +Valid bugs are also logged in the file +.Pa ~bugs/version/summary. +This file has an entry for each bug report for +.Ar version +in the format: -.PP -.DT - Filename Date -.br - Subject: -.br - Index: -.br - Owner: Bugs Bunny -.br - Status: Received -.br -.PP -\fIFilename\fP is the concatenation of \fIversion, folder,\fP and a number -as described above. \fIDate\fP is the date as reported by the system -clock, using ctime(3). The \fISubject:\fP and \fIIndex:\fP lines are -copies of the ``Subject:'' and ``Index:'' lines contained in the bug -report. The \fIOwner\fP and \fIStatus\fP fields are intended to provide a +.Pp +.Bd -literal -offset indent -compact +Filename Date + Subject: + Index: + Owner: Bugs Bunny + Status: Received +.Ed +.Pp +.Li Filename +is the concatenation of +.Ar version , +.Em folder , +and a number +as described above. +.Xr Date +is the date as reported by the system +clock, using +.Xr ctime 3 . +.Li The Subject: +and +.Li Index: +lines are +The +.Dq Subject: +and +.Dq Index: +lines are +copies of the +.Dq Subject: +and +.Dq index: +lines contained in the bug +report. The +.Li Owner +and +.Li Status +fields are intended to provide a rudimentary method of tracking the status of bug reports. -.PP -The file ~bugs/bug:lock is the focus of all locking for \fIbugfiler.\fP +.Pp +The file +.Pa ~bugs/bug:lock +is the focus of all locking for +.Nm bugfiler . If you wish to manipulate any of the log or error files, rename or remove -it and \fIbugfiler\fP will treat all bug reports that it receives as if +it and +.Nm bugfiler +will treat all bug reports that it receives as if they were incorrectly formatted, i.e. it will place them in the directory -~bugs/errors, for later recovery by the \fIbugfiler\fP maintainer. -Obviously, this file must be created when you first install \fIbugfiler\fP. -.PP -All errors that occur before ~bugs/log is found are logged into the system +.Pa ~bugs/errors , +for later recovery by the +.Nm bugfiler +maintainer. +Obviously, this file must be created when you first install +.Nm bugfiler . +.Pp +All errors that occur before +.Pa ~bugs/log +is found are logged into the system log file, using -.IR syslog (8). -.SH FILES -.br -.TP 25 -~bugs/bug:ack +.Xr syslog 8 . +.Sh FILES +.Bl -tag -width /usr/share/misc/bugformatxx -compact +.It Pa ~bugs/bug:ack the acknowledgement message -.TP 25 -~bugs/bug:redist +.It Pa ~bugs/bug:redist the redistribution list -.TP 25 -~bugs/bug:lock +.It Pa ~bugs/bug:lock the locking file -.TP 25 -~bugs/errors/BUG_?????? +.It Pa ~bugs/errors/BUG_?????? bug reports with format errors -.TP 25 -~bugs/log +.It Pa ~bugs/log the log file -.TP 25 -~bugs/folder/summary +.It Pa ~bugs/folder/summary the summary files -.TP 25 -/usr/sbin/sendmail +.It Pa /usr/sbin/sendmail the mail delivery program -.TP 25 -/usr/share/misc/bugformat +.It Pa /usr/share/misc/bugformat a sample bug report format -.SH "SEE ALSO" -sendbug(1), aliases(5), syslog(8) -.SH BUGS -Since mail can be forwarded in a number of different ways, \fIbugfiler\fP +.El +.Sh SEE ALSO +.Xr sendbug 1 , +.Xr aliases 5 , +.Xr syslog 8 +.Sh BUGS +Since mail can be forwarded in a number of different ways, +.Nm bugfiler does not recognize forwarded mail and will acknowledge to the forwarder -instead of the original sender unless there is a `Reply-To' field in the +instead of the original sender unless there is a +.Dq Reply-To +field in the header. -.PP -This version of the bugfiler is not compatible with the version -released with 4.3BSD in that it doesn't complain to the sender about +.Pp +This version of +.Nm bugfiler +is not compatible with the version +released with +.Bx 4.3 +in that it doesn't complain to the sender about incorrectly formatted bug reports. Frankly, we got tired of the profanity, not to mention the extended conversations -.I bugfiler +.Nm bugfiler was holding with -.IR vacation (1). +.Xr vacation 1 . +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/libexec/comsat/comsat.8 b/usr/src/libexec/comsat/comsat.8 index f45802c4a3..3e05304bf6 100644 --- a/usr/src/libexec/comsat/comsat.8 +++ b/usr/src/libexec/comsat/comsat.8 @@ -1,52 +1,70 @@ -.\" Copyright (c) 1983 The Regents of the University of California. +.\" Copyright (c) 1983, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)comsat.8 6.4 (Berkeley) %G% +.\" @(#)comsat.8 6.5 (Berkeley) %G% .\" -.TH COMSAT 8 "" -.UC 5 -.SH NAME -comsat \- biff server -.SH SYNOPSIS -.B comsat -.SH DESCRIPTION -.I Comsat +.Dd +.Dt COMSAT 8 +.Os BSD 4.2 +.Sh NAME +.Nm comsat +.Nd biff server +.Sh SYNOPSIS +.Nm comsat +.Sh DESCRIPTION +.Nm Comsat is the server process which receives reports of incoming mail and notifies users if they have requested this service. -.I Comsat -receives messages on a datagram port associated with the ``biff'' service +.Nm Comsat +receives messages on a datagram port associated with the +.Dq biff +service specification (see -.IR services (5) +.Xr services 5 and -.IR inetd (8)). -The one line messages are of the form -.PP -.ti +0.5i -user@mailbox-offset -.PP +.Xr inetd 8 ) . +The one line messages are of the form: +.Pp +.Dl user@mailbox-offset +.Pp If the -.I user +.Em user specified is logged in to the system and the associated terminal has -the owner execute bit turned on (by a ``biff y''), the -.I offset +the owner execute bit turned on (by a +.Dq Li biff y ) , +the +.Em offset is used as a seek offset into the appropriate mailbox file and the first 7 lines or 560 characters of the message are printed on the user's terminal. Lines which appear to be part of -the message header other than the ``From'', ``To'', ``Date'', -or ``Subject'' lines are not included in the displayed message. -.SH FILES -.DT -/var/run/utmp to find out who's logged on and on what terminals -.SH "SEE ALSO" -biff(1), inetd(8) -.SH BUGS +the message header other than the +.Dq From , +.Dq \&To , +.Dq Date , +or +.Dq Subject +lines are not included in the displayed message. +.Sh FILES +.Bl -tag -width /var/run/utmp -compact +.It Pa /var/run/utmp +to find out who's logged on and on what terminals +.El +.Sh SEE ALSO +.Xr biff 1 , +.Xr inetd 8 +.Sh BUGS The message header filtering is prone to error. The density of the information presented is near the theoretical minimum. -.PP +.Pp Users should be notified of mail which arrives on other machines than the one to which they are currently logged in. -.PP +.Pp The notification should appear in a separate window so it does not mess up the screen. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/libexec/fingerd/fingerd.8 b/usr/src/libexec/fingerd/fingerd.8 index 72fe70347f..7f38f360e4 100644 --- a/usr/src/libexec/fingerd/fingerd.8 +++ b/usr/src/libexec/fingerd/fingerd.8 @@ -1,52 +1,83 @@ -.\" Copyright (c) 1980 The Regents of the University of California. +.\" Copyright (c) 1980, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)fingerd.8 6.3 (Berkeley) %G% +.\" @(#)fingerd.8 6.4 (Berkeley) %G% .\" -.TH FINGERD 8 "" -.UC 6 -.SH NAME -fingerd \- remote user information server -.SH SYNOPSIS -.B fingerd -.SH DESCRIPTION -.I Fingerd -is a simple protocol based on RFC742 that provides an interface to the +.Dd +.Dt FINGERD 8 +.Os BSD 4.3 +.Sh NAME +.Nm fingerd +.Nd remote user information server +.Sh SYNOPSIS +.Nm fingerd +.Sh DESCRIPTION +.Nm Fingerd +is a simple protocol based on +.%T RFC742 +that provides an interface to the Name and Finger programs at several network sites. The program is supposed to return a friendly, human-oriented status report on either the system at the moment or a particular person in depth. There is no required format and the -protocol consists mostly of specifying a single ``command line''. -.PP -.I Fingerd -listens for TCP requests at port 79. +protocol consists mostly of specifying a single +.Dq command line . +.Pp +.Nm Fingerd +listens for +.Tn TCP +requests at port 79. Once connected it reads a single command line -terminated by a which is passed to -.IR finger (1). -.I Fingerd +terminated by a +.Aq Tn CRLF +which is passed to +.Xr finger 1 . +.Nm Fingerd closes its connections as soon as the output is finished. -.PP -If the line is null (i.e. just a is sent) then -.I finger -returns a ``default'' report that lists all people logged into +.Pp +If the line is null (i.e. just a +.Aq Tn CRLF +is sent) then +.Xr finger +returns a +.Dq default +report that lists all people logged into the system at that moment. -.PP -If a user name is specified (e.g. eric) then the +.Pp +If a user name is specified (e.g. +.Pf eric Aq Tn CRLF ) +then the response lists more extended information for only that particular user, whether logged in or not. -Allowable ``names'' in the command line include both ``login names'' -and ``user names''. +Allowable +.Dq names +in the command line include both +.Dq login names +and +.Dq user names . If a name is ambiguous, all possible derivations are returned. -.SH SEE ALSO -finger(1) -.SH BUGS -Connecting directly to the server from a TIP -or an equally narrow-minded TELNET-protocol user program can result +.Sh SEE ALSO +.Xr finger 1 +.Sh BUGS +Connecting directly to the server from a +.Tn TIP +or an equally narrow-minded +.Tn TELNET Ns \-protocol +user program can result in meaningless attempts at option negotiation being sent to the server, which will foul up the command line interpretation. -.I Fingerd -should be taught to filter out IAC's and perhaps even respond -negatively (IAC WON'T) to all option commands received. +.Nm Fingerd +should be taught to filter out +.Tn IAC Ns \'s +and perhaps even respond +negatively +.Pq Tn IAC WON'T +to all option commands received. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.3 . diff --git a/usr/src/libexec/ftpd/ftpd.8 b/usr/src/libexec/ftpd/ftpd.8 index 547c830b7a..6a089a0c12 100644 --- a/usr/src/libexec/ftpd/ftpd.8 +++ b/usr/src/libexec/ftpd/ftpd.8 @@ -1,198 +1,235 @@ -.\" Copyright (c) 1985, 1988 The Regents of the University of California. +.\" Copyright (c) 1985, 1988, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)ftpd.8 6.8 (Berkeley) %G% +.\" @(#)ftpd.8 6.9 (Berkeley) %G% .\" -.TH FTPD 8 "February 23, 1989" -.UC 5 -.SH NAME -ftpd \- DARPA Internet File Transfer Protocol server -.SH SYNOPSIS -.B ftpd -[ -.B \-d -] [ -.B \-l -] [ -.BR \-t timeout -] [ -.BR \-T maxtimeout -] -.SH DESCRIPTION -.I Ftpd -is the DARPA Internet File Transfer Protocol -server process. The server uses the TCP protocol -and listens at the port specified in the ``ftp'' +.Dd +.Dt FTPD 8 +.Os BSD 4.2 +.Sh NAME +.Nm ftpd +.Nd +.Tn DARPA +Internet File Transfer Protocol server +.Sh SYNOPSIS +.Nm ftpd +.Op Fl d +.Op Fl l +.Op Fl t Ar timeout +.Op Fl T Ar maxtimeout +.Sh DESCRIPTION +.Nm Ftpd +is the +.Tn DARPA +Internet File Transfer Protocol +server process. The server uses the +.Tn TCP +protocol +and listens at the port specified in the +.Dq ftp service specification; see -.IR services (5). -.PP -If the -.B \-d -option is specified, -debugging information is written to the syslog. -.PP -If the -.B \-l -option is specified, -each ftp session is logged in the syslog. -.PP -The ftp server -will timeout an inactive session after 15 minutes. -If the -.B \-t -option is specified, -the inactivity timeout period will be set to -.I timeout -seconds. +.Xr services 5 . +.Pp +Available options: +.Bl -tag -width Ds +.It Fl d +Debugging information is written to the syslog. +.It Fl l +Each +.Xr ftp 1 +session is logged in the syslog. +.It Fl t +The inactivity timeout period is set to +.Ar timeout +seconds (the default is 15 minutes). +.It Fl T A client may also request a different timeout period; the maximum period allowed may be set to -.I timeout +.Ar timeout seconds with the -.B \-T +.Fl T option. The default limit is 2 hours. -.PP +.El +.Pp The ftp server currently supports the following ftp requests; case is not distinguished. -.PP -.nf -.ta \w'Request 'u -\fBRequest Description\fP -ABOR abort previous command -ACCT specify account (ignored) -ALLO allocate storage (vacuously) -APPE append to a file -CDUP change to parent of current working directory -CWD change working directory -DELE delete a file -HELP give help information -LIST give list files in a directory (``ls -lgA'') -MKD make a directory -MDTM show last modification time of file -MODE specify data transfer \fImode\fP -NLST give name list of files in directory -NOOP do nothing -PASS specify password -PASV prepare for server-to-server transfer -PORT specify data connection port -PWD print the current working directory -QUIT terminate session -RETR retrieve a file -RMD remove a directory -RNFR specify rename-from file name -RNTO specify rename-to file name -SITE non-standard commands (see next section) -SIZE return size of file -STAT return status of server -STOR store a file -STOU store a file with a unique name -STRU specify data transfer \fIstructure\fP -SYST show operating system type of server system -TYPE specify data transfer \fItype\fP -USER specify user name -XCUP change to parent of current working directory (deprecated) -XCWD change working directory (deprecated) -XMKD make a directory (deprecated) -XPWD print the current working directory (deprecated) -XRMD remove a directory (deprecated) -.fi -.PP -The following non-standard or UNIX specific commands are supported -by the SITE request. -.PP -.nf -.ta \w'Request 'u -\fBRequest Description\fP -UMASK change umask. \fIE.g.\fP SITE UMASK 002 -IDLE set idle-timer. \fIE.g.\fP SITE IDLE 60 -CHMOD change mode of a file. \fIE.g.\fP SITE CHMOD 755 filename -HELP give help information. \fIE.g.\fP SITE HELP -.fi -.PP -The remaining ftp requests specified in Internet RFC 959 are +.Bl -column "Request" -offset indent +.It Request Ta "Description" +.It ABOR Ta "abort previous command" +.It ACCT Ta "specify account (ignored)" +.It ALLO Ta "allocate storage (vacuously)" +.It APPE Ta "append to a file" +.It CDUP Ta "change to parent of current working directory" +.It CWD Ta "change working directory" +.It DELE Ta "delete a file" +.It HELP Ta "give help information" +.It LIST Ta "give list files in a directory" Pq Dq Li "ls -lgA" +.It MKD Ta "make a directory" +.It MDTM Ta "show last modification time of file" +.It MODE Ta "specify data transfer" Em mode +.It NLST Ta "give name list of files in directory" +.It NOOP Ta "do nothing" +.It PASS Ta "specify password" +.It PASV Ta "prepare for server-to-server transfer" +.It PORT Ta "specify data connection port" +.It PWD Ta "print the current working directory" +.It QUIT Ta "terminate session" +.It REST Ta "restart incomplete transfer" +.It RETR Ta "retrieve a file" +.It RMD Ta "remove a directory" +.It RNFR Ta "specify rename-from file name" +.It RNTO Ta "specify rename-to file name" +.It SITE Ta "non-standard commands (see next section)" +.It SIZE Ta "return size of file" +.It STAT Ta "return status of server" +.It STOR Ta "store a file" +.It STOU Ta "store a file with a unique name" +.It STRU Ta "specify data transfer" Em structure +.It SYST Ta "show operating system type of server system" +.It TYPE Ta "specify data transfer" Em type +.It USER Ta "specify user name" +.It XCUP Ta "change to parent of current working directory (deprecated)" +.It XCWD Ta "change working directory (deprecated)" +.It XMKD Ta "make a directory (deprecated)" +.It XPWD Ta "print the current working directory (deprecated)" +.It XRMD Ta "remove a directory (deprecated)" +.El +.Pp +The following non-standard or +.Tn UNIX +specific commands are supported +by the +SITE request. +.Pp +.Bl -column Request -offset indent +.It Sy Request Ta Sy Description +.It UMASK Ta change umask. Em E.g. SITE UMASK 002 +.It IDLE Ta set idle-timer. Em E.g. SITE IDLE 60 +.It CHMOD Ta change mode of a file. Em E.g. +SITE CHMOD 755 filename +.It HELP Ta give help information. Em E.g. SITE HELP +.El +.Pp +The remaining ftp requests specified in Internet +.%T "RFC 959" +are recognized, but not implemented. MDTM and SIZE are not specified in -RFC 959, but will appear in the next updated FTP RFC. -.PP +.%T "RFC 959" , +but will appear in the next updated FTP RFC. +.Pp The ftp server will abort an active file transfer only when the -ABOR command is preceded by a Telnet "Interrupt Process" (IP) +ABOR +command is preceded by a Telnet "Interrupt Process" (IP) signal and a Telnet "Synch" signal in the command Telnet stream, -as described in Internet RFC 959. -If a STAT command is received during a data transfer, preceded by a Telnet IP +as described in Internet +.%T "RFC 959" . +If a +STAT +command is received during a data transfer, preceded by a Telnet IP and Synch, transfer status will be returned. -.PP -.I Ftpd -interprets file names according to the ``globbing'' +.Pp +.Nm Ftpd +interprets file names according to the +.Dq globbing conventions used by -.IR csh (1). -This allows users to utilize the metacharacters ``*?[]{}~''. -.PP -.I Ftpd +.Xr csh 1 . +This allows users to utilize the metacharacters +.Dq Li \&*?[]{}~ . +.Pp +.Nm Ftpd authenticates users according to three rules. -.IP 1) +.Pp +.Bl -enum -offset indent +.It The user name must be in the password data base, -.IR /etc/passwd , +.Pa /etc/passwd , and not have a null password. In this case a password must be provided by the client before any file operations may be performed. -.IP 2) +.It The user name must not appear in the file -.IR /etc/ftpusers . -.IP 3) +.Pa /etc/ftpusers . +.It The user must have a standard shell returned by -.IR getusershell (3). -.IP 4) -If the user name is ``anonymous'' or ``ftp'', an +.Xr getusershell 3 . +.It +If the user name is +.Dq anonymous +or +.Dq ftp , +an anonymous ftp account must be present in the password -file (user ``ftp''). In this case the user is allowed +file (user +.Dq ftp ) . +In this case the user is allowed to log in by specifying any password (by convention this is given as the client host's name). -.PP +.El +.Pp In the last case, -.I ftpd +.Nm ftpd takes special measures to restrict the client's access privileges. The server performs a -.IR chroot (2) -command to the home directory of the ``ftp'' user. +.Xr chroot 2 +command to the home directory of the +.Dq ftp +user. In order that system security is not breached, it is recommended -that the ``ftp'' subtree be constructed with care; the following +that the +.Dq ftp +subtree be constructed with care; the following rules are recommended. -.IP ~ftp) -Make the home directory owned by ``ftp'' and unwritable by anyone. -.IP ~ftp/bin) +.Bl -tag -width "~ftp/pub" -offset indent +.It Pa ~ftp +Make the home directory owned by +.Dq ftp +and unwritable by anyone. +.It Pa ~ftp/bin Make this directory owned by the super-user and unwritable by anyone. The program -.IR ls (1) +.Xr ls 1 must be present to support the list command. This program should have mode 111. -.IP ~ftp/etc) +.It Pa ~ftp/etc Make this directory owned by the super-user and unwritable by anyone. The files -.IR passwd (5) +.Xr passwd 5 and -.IR group (5) +.Xr group 5 must be present for the -.I ls +.Xr ls command to be able to produce owner names rather than numbers. The password field in -.I passwd +.Xr passwd is not used, and should not contain real encrypted passwords. These files should be mode 444. -.IP ~ftp/pub) -Make this directory mode 777 and owned by ``ftp''. Users +.It Pa ~ftp/pub +Make this directory mode 777 and owned by +.Dq ftp . +Users should then place files which are to be accessible via the anonymous account in this directory. -.SH "SEE ALSO" -ftp(1), getusershell(3), syslogd(8) -.SH BUGS +.El +.Sh SEE ALSO +.Xr ftp 1 , +.Xr getusershell 3 , +.Xr syslogd 8 +.Sh BUGS The anonymous account is inherently dangerous and should avoided when possible. -.PP +.Pp The server must run as the super-user to create sockets with privileged port numbers. It maintains an effective user id of the logged in user, reverting to the super-user only when binding addresses to sockets. The possible security holes have been extensively scrutinized, but are possibly incomplete. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/libexec/kpasswdd/kpasswdd.8 b/usr/src/libexec/kpasswdd/kpasswdd.8 index 0db5e83b98..427a8ff981 100644 --- a/usr/src/libexec/kpasswdd/kpasswdd.8 +++ b/usr/src/libexec/kpasswdd/kpasswdd.8 @@ -1,27 +1,39 @@ -.\" $Source: /mit/kerberos/src/man/RCS/kpasswd.1,v $ -.\" $Author: steiner $ -.\" $Header: kpasswd.1,v 4.1 89/01/24 09:21:13 steiner Exp $ .\" Copyright 1989 by the Massachusetts Institute of Technology. +.\" Copyright (c) 1987, 1988, 1991 Regents of the University of California. +.\" All rights reserved. .\" .\" For copying and distribution information, .\" please see the file . .\" -.TH KPASSWDD 8 -.SH NAME -kpasswdd \- Kerberos password changing daemon -.SH SYNOPSIS -.B kpasswdd -.SH DESCRIPTION -.I Kpasswdd +.\" %sccs.include.redist.man% +.\" +.\" @(#)kpasswdd.8 1.3 (Berkeley) %G% +.\" +.Dd +.Dt KPASSWDD 8 +.Os +.Sh NAME +.Nm kpasswdd +.Nd Kerberos password changing daemon +.Sh SYNOPSIS +.Nm kpasswdd +.Sh DESCRIPTION +.Nm Kpasswdd is the server for the -.IR passwd (1) +.Xr passwd 1 program. The server provides a remote password changing facility with Kerberos authentication. A user must provide the old Kerberos password, encrypted in a random session key, to the server. -.I Kpasswdd +.Nm Kpasswdd runs only on the Kerberos server, as it directly updates the Kerberos database. -.SH SEE ALSO -kerberos(1), passwd(1) +.Sh SEE ALSO +.Xr kerberos 1 , +.Xr passwd 1 +.Sh HISTORY +The +.Nm +command +.Ud diff --git a/usr/src/libexec/makekey/makekey.8 b/usr/src/libexec/makekey/makekey.8 index e64fb7d32a..1a215259e6 100644 --- a/usr/src/libexec/makekey/makekey.8 +++ b/usr/src/libexec/makekey/makekey.8 @@ -1,25 +1,33 @@ -.\" Copyright (c) 1990 The Regents of the University of California. +.\" Copyright (c) 1990, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)makekey.8 6.3 (Berkeley) %G% +.\" @(#)makekey.8 6.4 (Berkeley) %G% .\" -.TH MAKEKEY 8 "" -.AT 3 -.SH NAME -makekey \- encrypt a key -.SH SYNOPSIS -.B makekey -.SH DESCRIPTION -.I Makekey -reads a key (10 bytes) and a salt (2 bytes) from the standard input -and writes the string returned by -.IR crypt (3) -to the standard output. +.Dd +.Dt MAKEKEY 8 +.Os ATT 7th +.Sh NAME +.Nm makekey +.Nd make encrypted keys or passwords +.Sh SYNOPSIS +.Nm makekey +.Sh DESCRIPTION +.Nm Makekey +encypts a key and salt which it reads from the standard input +and writes the result to the standard output. +The key is expected to be +ten bytes; the salt is expected to be two bytes. See -.IR crypt (3) +.Xr crypt 3 for more information on what characters the key and salt can contain and how the encrypted value is calculated. -.SH SEE ALSO -login(1), crypt(1), crypt(3) +.Sh SEE ALSO +.Xr login 1 , +.Xr crypt 1 , +.Xr crypt 3 +.Sh HISTORY +A +.Nm +command appeared in Version 7 AT&T UNIX. diff --git a/usr/src/libexec/rexecd/rexecd.8 b/usr/src/libexec/rexecd/rexecd.8 index 54c440215b..becbe385d7 100644 --- a/usr/src/libexec/rexecd/rexecd.8 +++ b/usr/src/libexec/rexecd/rexecd.8 @@ -1,122 +1,122 @@ -.\" Copyright (c) 1983 The Regents of the University of California. +.\" Copyright (c) 1983, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)rexecd.8 6.4 (Berkeley) %G% +.\" @(#)rexecd.8 6.5 (Berkeley) %G% .\" -.TH REXECD 8 "" -.UC 5 -.SH NAME -rexecd \- remote execution server -.SH SYNOPSIS -.B rexecd -.SH DESCRIPTION -.I Rexecd +.Dd +.Dt REXECD 8 +.Os BSD 4.2 +.Sh NAME +.Nm rexecd +.Nd remote execution server +.Sh SYNOPSIS +.Nm rexecd +.Sh DESCRIPTION +.Nm Rexecd is the server for the -.IR rexec (3) +.Xr rexec 3 routine. The server provides remote execution facilities with authentication based on user names and passwords. -.PP -.I Rexecd +.Pp +.Nm Rexecd listens for service requests at the port indicated in the ``exec'' service specification; see -.IR services (5). +.Xr services 5 . When a service request is received the following protocol is initiated: -.IP 1) +.Bl -enum +.It The server reads characters from the socket up -to a null (`\e0') byte. The resultant string is -interpreted as an ASCII number, base 10. -.IP 2) +to a NUL +.Pq Ql \e0 +byte. The resultant string is +interpreted as an +.Tn ASCII +number, base 10. +.It If the number received in step 1 is non-zero, it is interpreted as the port number of a secondary stream to be used for the -.BR stderr . +.Em stderr . A second connection is then created to the specified port on the client's machine. -.IP 3) -A null terminated user name of at most 16 characters +.It +A NUL terminated user name of at most 16 characters is retrieved on the initial socket. -.IP 4) -A null terminated, unencrypted password of at most +.It +A NUL terminated, unencrypted password of at most 16 characters is retrieved on the initial socket. -.IP 5) -A null terminated command to be passed to a +.It +A NUL terminated command to be passed to a shell is retrieved on the initial socket. The length of the command is limited by the upper bound on the size of the system's argument list. -.IP 6) -.I Rexecd +.It +.Nm Rexecd then validates the user as is done at login time and, if the authentication was successful, changes to the user's home directory, and establishes the user and group protections of the user. If any of these steps fail the connection is aborted with a diagnostic message returned. -.IP 7) -A null byte is returned on the initial socket +.It +A NUL byte is returned on the initial socket and the command line is passed to the normal login shell of the user. The shell inherits the network connections established by -.IR rexecd . -.SH DIAGNOSTICS +.Nm rexecd . +.El +.Sh DIAGNOSTICS Except for the last one listed below, all diagnostic messages are returned on the initial socket, after which any network connections are closed. An error is indicated by a leading byte with a value of 1 (0 is returned in step 7 above upon successful completion of all the steps prior to the command execution). -.PP -.B ``username too long'' -.br +.Pp +.Bl -tag -width Ds +.It Sy username too long The name is longer than 16 characters. -.PP -.B ``password too long'' -.br +.It Sy password too long The password is longer than 16 characters. -.PP -.B ``command too long '' -.br +.It Sy command too long The command line passed exceeds the size of the argument list (as configured into the system). -.PP -.B ``Login incorrect.'' -.br +.It Sy Login incorrect. No password file entry for the user name existed. -.PP -.B ``Password incorrect.'' -.br +.It Sy Password incorrect. The wrong was password supplied. -.PP -.B ``No remote directory.'' -.br +.It Sy \&No remote directory. The -.I chdir +.Xr chdir command to the home directory failed. -.PP -.B ``Try again.'' -.br +.It Sy Try again. A -.I fork +.Xr fork by the server failed. -.PP -.B ``: ...'' -.br +.It Sy : ... The user's login shell could not be started. This message is returned on the connection associated with the -.BR stderr , +.Em stderr , and is not preceded by a flag byte. -.SH SEE ALSO -rexec(3) -.SH BUGS +.El +.Sh SEE ALSO +.Xr rexec 3 +.Sh BUGS Indicating ``Login incorrect'' as opposed to ``Password incorrect'' is a security breach which allows people to probe a system for users with null passwords. -.PP +.Pp A facility to allow all data and password exchanges to be encrypted should be present. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/libexec/rlogind/rlogind.8 b/usr/src/libexec/rlogind/rlogind.8 index 5adfb5d7dc..796cf6be62 100644 --- a/usr/src/libexec/rlogind/rlogind.8 +++ b/usr/src/libexec/rlogind/rlogind.8 @@ -1,119 +1,142 @@ -.\" Copyright (c) 1983, 1989 The Regents of the University of California. +.\" Copyright (c) 1983, 1989, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)rlogind.8 6.11 (Berkeley) %G% +.\" @(#)rlogind.8 6.12 (Berkeley) %G% .\" -.TH RLOGIND 8 "" -.UC 5 -.SH NAME -rlogind \- remote login server -.SH SYNOPSIS -.B rlogind -[ -.B \-aln -] -.SH DESCRIPTION -.I Rlogind +.Dd +.Dt RLOGIND 8 +.Os BSD 4.2 +.Sh NAME +.Nm rlogind +.Nd remote login server +.Sh SYNOPSIS +.Nm rlogind +.Op Fl aln +.Sh DESCRIPTION +.Nm Rlogind is the server for the -.IR rlogin (1) +.Xr rlogin 1 program. The server provides a remote login facility with authentication based on privileged port numbers from trusted hosts. -.PP -.I Rlogind +.Pp +Options supported by +.Nm rlogind : +.Bl -tag -width Ds +.It Fl a +Ask hostname for verification. +.It Fl l +Prevent any authentication based on the user's +.Dq Pa .rhosts +file, unless the user is logging in as the superuser. +.It Fl n +Disable keep-alive messages. +.El +.Pp +.Nm Rlogind listens for service requests at the port indicated in the ``login'' service specification; see -.IR services (5). +.Xr services 5 . When a service request is received the following protocol is initiated: -.IP 1) +.Bl -enum +.It The server checks the client's source port. If the port is not in the range 512-1023, the server aborts the connection. -.IP 2) +.It The server checks the client's source address and requests the corresponding host name (see -IR gethostbyaddr (3), -.IR hosts (5) +.Xr gethostbyaddr 3 , +.Xr hosts 5 and -.IR named (8)). +.Xr named 8 ) . If the hostname cannot be determined, the dot-notation representation of the host address is used. If the hostname is in the same domain as the server (according to the last two components of the domain name), or if the -.B \-a +.Fl a option is given, the addresses for the hostname are requested, verifying that the name and address correspond. Normal authentication is bypassed if the address verification fails. -.PP +.El +.Pp Once the source port and address have been checked, -.I rlogind +.Nm rlogind proceeds with the authentication process described in -.IR rshd (8). +.Xr rshd 8 . It then allocates a pseudo terminal (see -.IR pty (4)), +.Xr pty 4 ) , and manipulates file descriptors so that the slave half of the pseudo terminal becomes the -.B stdin , -.B stdout , +.Em stdin , +.Em stdout , and -.B stderr +.Em stderr for a login process. The login process is an instance of the -.IR login (1) +.Xr login 1 program, invoked with the -.B \-f +.Fl f option if authentication has succeeded. If automatic authentication fails, the user is -prompted to log in as if on a standard terminal line. The -.B \-l -option prevents any authentication based on the user's -``.rhosts'' file, unless the user is logging in as the superuser. -.PP +prompted to log in as if on a standard terminal line. +.Pp The parent of the login process manipulates the master side of the pseudo terminal, operating as an intermediary between the login process and the client instance of the -.I rlogin +.Xr rlogin program. In normal operation, the packet protocol described in -.IR pty (4) -is invoked to provide ^S/^Q type facilities and propagate +.Xr pty 4 +is invoked to provide +.Ql ^S/^Q +type facilities and propagate interrupt signals to the remote programs. The login process propagates the client terminal's baud rate and terminal type, -as found in the environment variable, ``TERM''; see -.IR environ (7). +as found in the environment variable, +.Ql Ev TERM ; +see +.Xr environ 7 . The screen or window size of the terminal is requested from the client, and window size changes from the client are propagated to the pseudo terminal. -.PP +.Pp Transport-level keepalive messages are enabled unless the -.B \-n +.Fl n option is present. The use of keepalive messages allows sessions to be timed out if the client crashes or becomes unreachable. -.SH DIAGNOSTICS +.Sh DIAGNOSTICS All initial diagnostic messages are indicated by a leading byte with a value of 1, after which any network connections are closed. If there are no errors before -.I login +.Xr login is invoked, a null byte is returned as in indication of success. -.PP -.B ``Try again.'' -.br +.Bl -tag -width Ds +.It Sy Try again. A -.I fork +.Xr fork by the server failed. -.SH "SEE ALSO" -login(1), ruserok(3), rshd(8) -.SH BUGS +.El +.Sh SEE ALSO +.Xr login 1 , +.Xr ruserok 3 , +.Xr rshd 8 +.Sh BUGS The authentication procedure used here assumes the integrity of each client machine and the connecting medium. This is insecure, but is useful in an ``open'' environment. -.PP +.Pp A facility to allow all data exchanges to be encrypted should be present. -.PP +.Pp A more extensible protocol should be used. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/libexec/talkd/talkd.8 b/usr/src/libexec/talkd/talkd.8 index 28b2fe9bdf..65e02db109 100644 --- a/usr/src/libexec/talkd/talkd.8 +++ b/usr/src/libexec/talkd/talkd.8 @@ -1,35 +1,49 @@ -.\" Copyright (c) 1983 The Regents of the University of California. +.\" Copyright (c) 1983, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)talkd.8 6.4 (Berkeley) %G% +.\" @(#)talkd.8 6.5 (Berkeley) %G% .\" -.TH TALKD 8 "" -.UC 6 -.SH NAME -talkd \- remote user communication server -.SH SYNOPSIS -.B talkd -.SH DESCRIPTION -.I Talkd -is the server that notifies a user that somebody else wants to +.Dd +.Dt TALKD 8 +.Os BSD 4.3 +.Sh NAME +.Nm talkd +.Nd remote user communication server +.Sh SYNOPSIS +.Nm talkd +.Sh DESCRIPTION +.Nm Talkd +is the server that notifies a user that someone else wants to initiate a conversation. It acts a repository of invitations, responding to requests by clients wishing to rendezvous to hold a conversation. In normal operation, a client, the caller, -initiates a rendezvous by sending a CTL_MSG to the server of -type LOOK_UP (see -.RI < protocols/talkd.h >). +initiates a rendezvous by sending a +.Tn CTL_MSG +to the server of +type +.Tn LOOK_UP +(see +.Aq Pa protocols/talkd.h ) . This causes the server to search its invitation tables to check if an invitation currently exists for the caller (to speak to the callee specified in the message). If the lookup fails, -the caller then sends an ANNOUNCE message causing the server to +the caller then sends an +.Tn ANNOUNCE +message causing the server to broadcast an announcement on the callee's login ports requesting contact. When the callee responds, the local server uses the recorded invitation to respond with the appropriate rendezvous address and the caller and callee client programs establish a stream connection through which the conversation takes place. -.SH SEE ALSO -talk(1), write(1) +.Sh SEE ALSO +.Xr talk 1 , +.Xr write 1 +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.3 . diff --git a/usr/src/libexec/tftpd/tftpd.8 b/usr/src/libexec/tftpd/tftpd.8 index d84d01f513..269beee262 100644 --- a/usr/src/libexec/tftpd/tftpd.8 +++ b/usr/src/libexec/tftpd/tftpd.8 @@ -1,48 +1,76 @@ -.\" Copyright (c) 1983 The Regents of the University of California. +.\" Copyright (c) 1983, 1991 The Regents of the University of California. .\" All rights reserved. .\" +.\" provided that the above copyright notice and this paragraph are +.\" duplicated in all such forms and that any documentation, +.\" advertising materials, and other materials related to such +.\" distribution and use acknowledge that the software was developed +.\" by the University of California, Berkeley. The name of the +.\" University may not be used to endorse or promote products derived +.\" from this software without specific prior written permission. +.\" IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED +.\" WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. +.\" @(#)tftpd.8 6.6 (Berkeley) %G% .\" %sccs.include.redist.man% .\" -.\" @(#)tftpd.8 6.5 (Berkeley) %G% +.\" @(#)tftpd.8 6.6 (Berkeley) %G% .\" -.TH TFTPD 8 "" -.UC 5 -.SH NAME -tftpd \- DARPA Trivial File Transfer Protocol server -.SH SYNOPSIS -.B tftpd -[ directory ... ] -.SH DESCRIPTION -.I Tftpd -is a server which supports the DARPA Trivial File Transfer +.Dd +.Dt TFTPD 8 +.Os BSD 4.2 +.Sh NAME +.Nm tftpd +.Nd +.Tn DARPA +Trivial File Transfer Protocol server +.Sh SYNOPSIS +.Nm tftpd +.Op Ar directory ... +.Sh DESCRIPTION +.Nm Tftpd +is a server which supports the +.Tn DARPA +Trivial File Transfer Protocol. -The TFTP server operates -at the port indicated in the ``tftp'' service description; +The +.Tn TFTP +server operates +at the port indicated in the +.Ql tftp +service description; see -.IR services (5). +.Xr services 5 . The server is normally started by -.IR inetd (8). -.PP +.Xr inetd 8 . +.Pp The use of -.I tftp +.Xr tftp 1 does not require an account or password on the remote system. Due to the lack of authentication information, -.I tftpd +.Nm tftpd will allow only publicly readable files to be accessed. Files may be written only if they already exist and are publicly writable. -Note that this extends the concept of ``public'' to include +Note that this extends the concept of +.Dq public +to include all users on all hosts that can be reached through the network; this may not be appropriate on all systems, and its implications should be considered before enabling tftp service. The server should have the user ID with the lowest possible privilege. -.PP +.Pp Access to files may be restricted by invoking -.I tftpd +.Nm tftpd with a list of directories by including pathnames as server program arguments in -.IR /etc/inetd.conf . +.Pa /etc/inetd.conf . In this case access is restricted to files whose names are prefixed by the one of the given directories. -.SH "SEE ALSO" -tftp(1), inetd(8) +.Sh SEE ALSO +.Xr tftp 1 , +.Xr inetd 8 +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/local/kerberosIV/make_keypair/make_keypair.8 b/usr/src/local/kerberosIV/make_keypair/make_keypair.8 index 4e429db107..f10c6ff5ba 100644 --- a/usr/src/local/kerberosIV/make_keypair/make_keypair.8 +++ b/usr/src/local/kerberosIV/make_keypair/make_keypair.8 @@ -1,38 +1,62 @@ -.\" Copyright (c) 1980 Regents of the University of California. -.\" All rights reserved. The Berkeley software License Agreement -.\" specifies the terms and conditions for redistribution. +.\" Copyright (c) 1980, 1991 Regents of the University of California. +.\" All rights reserved. .\" -.\" @%G +.\" %sccs.include.redist.man% .\" -.TH MAKE_KEYPAIR 8 -.UC 4 -.SH NAME -make_keypair -.SH SYNOPSIS -.B make_keypair hostname [ hostname ... ] \- generate Kerberos host key pair -.SH DESCRIPTION +.\" @(#)make_keypair.8 1.2 (Berkeley) %G% +.\" +.Dd +.Dt MAKE_KEYPAIR 8 +.Os +.Sh NAME +.Nm make_keypair +.Nd generate Kerberos host key pair +.Sh SYNOPSIS +.Nm make_keypair +.Ar hostname +.Op Ar hostname ... +.Sh DESCRIPTION The -.I make_keypair +.Nm make_keypair command -is used to create pairs of DES keys for -each host. +is used to create pairs of +.Tn DES +keys for +each +.Ar hostname . The keys are used by priviledged programs such as -.IR register (1) +.Xr register 1 to make remote updates to the Kerberos database without -having to have first acquired a Kerberos ticket granting ticket (TGT). +having to have first acquired a Kerberos ticket granting ticket +.Pq Tn TGT . The keys created by -.I make_keypair +.Nm make_keypair are placed (by hand) in the filesystems of the -kerberos server in /etc/kerberosIV/register_keys, +kerberos server in +.Pa /etc/kerberosIV/register_keys , and in the root directory on the clients. -For example, the file /.update.key128.32.130.3 would +For example, the file +.Pa /.update.key128.32.130.3 +would contain a copy of the key on the client with IP address 128.32.130.3. These keys provide a shared secret which may be used to establish a secure channel between the client hosts and the Kerberos server. -.SH FILES -.br -/.update.keyxx.xx.xx.xx shared DES key with server -/etc/kerberosIV/register_keys server's key storage directory -.SH "SEE ALSO" -register(1), registerd(8), kerberos(1) +.Sh FILES +.Bl -tag -width /etc/kerberosIV/register_keysxx -compact +.It Pa /.update.keyxx.xx.xx.xx +shared +.Tn DES +key with server +.It Pa /etc/kerberosIV/register_keys +server's key storage directory +.El +.Sh SEE ALSO +.Xr register 1 , +.Xr registerd 8 , +.Xr kerberos 1 +.Sh HISTORY +The +.Nm +command +.Ud diff --git a/usr/src/local/kerberosIV/registerd/registerd.8 b/usr/src/local/kerberosIV/registerd/registerd.8 index bfc3d503c7..c71c4c0aaa 100644 --- a/usr/src/local/kerberosIV/registerd/registerd.8 +++ b/usr/src/local/kerberosIV/registerd/registerd.8 @@ -1,30 +1,44 @@ -.\" Copyright (c) 1990 The Regents of the University of California. +.\" Copyright (c) 1990, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)registerd.8 5.1 (Berkeley) %G% +.\" @(#)registerd.8 5.2 (Berkeley) %G% .\" -.TH REGISTERD 8 "" -.UC 7 -.SH NAME -registerd \- Kerberos registration daemon -.SH SYNOPSIS -.B registerd -.SH DESCRIPTION +.Dd +.Dt REGISTERD 8 +.Os +.Sh NAME +.Nm registerd +.Nd Kerberos registration daemon +.Sh SYNOPSIS +.Nm registerd +.Sh DESCRIPTION (filler for now) -.SH FILES -.br -/.update.keyxx.xx.xx.xx shared DES key with server -/etc/kerberosIV/principal* Kerberos database -/etc/kerberosIV/register_keys directory containing keys for trusted hosts -.SH "SEE ALSO" -registerd(8), kerberos(1) -.SH DIAGNOSTICS -\*(lqAlready exists,\*(rq +.Sh FILES +.Bl -tag -width /etc/kerberosIV/register_keys -compact +.It Pa /.update.keyxx.xx.xx.xx +shared +.Tn DES +key with server +.It Pa /etc/kerberosIV/principal* +Kerberos database +.It Pa /etc/kerberosIV/register_keys +directory containing keys for trusted hosts +.El +.Sh SEE ALSO +.Xr registerd 8 , +.Xr kerberos 1 +.Sh DIAGNOSTICS +.Dq Already exists , if the user already exists in the Kerberos database. -.br -\*(lqPermission Denied,\*(rq +.Pp +.Dq Permission Denied , if the host on which register is being run is untrusted. -.SH AUTHOR +.Sh AUTHOR Kevin Fall +.Sh HISTORY +The +.Nm +command +.Ud diff --git a/usr/src/old/enpload/enpload.8 b/usr/src/old/enpload/enpload.8 index 16c300f660..97a4b62723 100644 --- a/usr/src/old/enpload/enpload.8 +++ b/usr/src/old/enpload/enpload.8 @@ -1,45 +1,68 @@ -.\" Copyright (c) 1987 The Regents of the University of California. +.\" Copyright (c) 1987, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" This code is derived from software contributed to Berkeley by .\" Computer Consoles Inc. -.\" .\" %sccs.include.redist.man% .\" -.\" @(#)enpload.8 5.3 (Berkeley) %G% +.\" @(#)enpload.8 5.4 (Berkeley) %G% .\" -.TH ENPLOAD 8 "" -.UC 5 -.SH NAME -enpload \- download firmware and initialize a CMC Ethernet controller -.SH SYOPNSIS -.B enpload -.I device -[ -.I files -] -.SH DESCRIPTION -.I Enpload -is used to download firmware and initialize a CMC -ENP-20 Ethernet controller. +.Dd +.Dt ENPLOAD 8 +.Os BSD 4.2 +.Sh NAME +.Nm enpload +.Nd download firmware and initialize a +.Tn CMC +Ethernet controller +.Sh SYOPNSIS +.Nm enpload +.Ar device +.Op Ar files +.Sh DESCRIPTION +.Nm Enpload +is used to download firmware and initialize a +.Tn CMC ENP-20 +Ethernet controller. +.Pp +Operands available: +.Bl -tag -width Fl +.It Ar device The -.I device +.Ar device specified is a character device used to access the on-board -RAM which hosts the controllers operating firmware; -the -.I files +.Tn RAM +which hosts the controllers operating firmware; +.It Ar files +The +.Ar files arguments specify the firmware file(s) to load into this memory. After -.I enpload +.Nm enpload deposits the specified firmware it starts the board running. +.El +.Pp If no firmware is specified the board is just restarted. -.I Enpload -must be run before a CMC controller can be used by the +.Nm Enpload +must be run before a +.Tn CMC +controller can be used by the system. -.SH FILES -.ta \w'/dev/enp?ram 'u -/dev/enp?ram special files for accessing ENP-20 memory -.br -/etc/enpcode link-level firmware -.SH "SEE ALSO" -enp(4), ifconfig(8C), rc(8) +.Sh FILES +.Bl -tag -width /dev/enp?ram -compact +.It Pa /dev/enp?ram +special files for accessing +.Tn ENP-20 +memory +.It Pa /etc/enpcode +link-level firmware +.El +.Sh SEE ALSO +.Xr enp 4 , +.Xr ifconfig 8 , +.Xr rc 8 +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.3 tahoe . diff --git a/usr/src/sbin/XNSrouted/XNSrouted.8 b/usr/src/sbin/XNSrouted/XNSrouted.8 index 134fcd2994..9eca8b6e77 100644 --- a/usr/src/sbin/XNSrouted/XNSrouted.8 +++ b/usr/src/sbin/XNSrouted/XNSrouted.8 @@ -1,150 +1,160 @@ -.\" Copyright (c) 1986 The Regents of the University of California. +.\" Copyright (c) 1986, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)XNSrouted.8 6.3 (Berkeley) %G% +.\" @(#)XNSrouted.8 6.4 (Berkeley) %G% .\" -.TH XNSROUTED 8 "" -.UC 6 -.SH NAME -XNSrouted \- NS Routing Information Protocol daemon -.SH SYNOPSIS -.B XNSrouted -[ -.B \-s -] [ -.B \-q -] [ -.B \-t -] [ -.I logfile -] -.SH DESCRIPTION -.I XNSrouted +.Dd +.Dt XNSROUTED 8 +.Os BSD 4.3 +.Sh NAME +.Nm XNSrouted +.Nd NS Routing Information Protocol daemon +.Sh SYNOPSIS +.Nm XNSrouted +.Op Fl q +.Op Fl s +.Op Fl t +.Op Ar logfile +.Sh DESCRIPTION +.Nm XNSrouted is invoked at boot time to manage the Xerox NS routing tables. The NS routing daemon uses the Xerox NS Routing Information Protocol in maintaining up to date kernel routing table entries. -.PP +.Pp +Available options: +.Bl -tag -width logfile +.It Fl q +Do not supply routing information (opposite of +.Fl s +option below). +.It Fl s +Forces +.Nm XNSrouted +to supply routing information whether it is acting as an internetwork +router or not. +.It Fl t +All packets sent or received are +printed on the standard output. In addition, +.Nm XNSrouted +will not divorce itself from the controlling terminal +so that interrupts from the keyboard will kill the process. +.It Ar logfile +Name of file in which +.Nm XNSrouted Ns 's +actions should be logged. This log contains information +about any changes to the routing tables and a history of +recent messages sent and received which are related to +the changed route. +.El +.Pp In normal operation -.I XNSrouted +.Nm XNSrouted listens for routing information packets. If the host is connected to multiple NS networks, it periodically supplies copies of its routing tables to any directly connected hosts and networks. -.PP +.Pp When -.I XNSrouted -is started, it uses the SIOCGIFCONF -.I ioctl +.Nm XNSrouted +is started, it uses the +.Dv SIOCGIFCONF +.Xr ioctl 2 to find those directly connected interfaces configured into the -system and marked ``up'' (the software loopback interface +system and marked +.Dq up +(the software loopback interface is ignored). If multiple interfaces are present, it is assumed the host will forward packets between networks. -.I XNSrouted +.Nm XNSrouted then transmits a -.I request +.Em request packet on each interface (using a broadcast packet if the interface supports it) and enters a loop, listening for -.I request +.Em request and -.I response +.Em response packets from other hosts. -.PP +.Pp When a -.I request +.Em request packet is received, -.I XNSrouted +.Nm XNSrouted formulates a reply based on the information maintained in its internal tables. The -.I response +.Em response packet generated contains a list of known routes, each marked -with a ``hop count'' metric (a count of 16, or greater, is -considered ``infinite''). The metric associated with each +with a +.Dq hop count +metric (a count of 16, or greater, is +considered +.Dq infinite ) . +The metric associated with each route returned provides a metric -.IR "relative to the sender" . -.PP -.I Response +.Em relative to the sender . +.Pp +.Em Response packets received by -.I XNSrouted +.Nm XNSrouted are used to update the routing tables if one of the following conditions is satisfied: -.TP -(1) +.Bl -bullet +.It No routing table entry exists for the destination network or host, and the metric indicates the destination is ``reachable'' (i.e. the hop count is not infinite). -.TP -(2) +.It The source host of the packet is the same as the router in the existing routing table entry. That is, updated information is being received from the very internetwork router through which packets for the destination are being routed. -.TP -(3) +.It The existing entry in the routing table has not been updated for some time (defined to be 90 seconds) and the route is at least as cost effective as the current route. -.TP -(4) +.It The new route describes a shorter route to the destination than the one currently stored in the routing tables; the metric of the new route is compared against the one stored in the table to decide this. -.PP +.El +.Pp When an update is applied, -.I XNSrouted +.Nm XNSrouted records the change in its internal tables and generates a -.I response +.Em response packet to all directly connected hosts and networks. -.I Routed +.Xr Routed 8 waits a short period of time (no more than 30 seconds) before modifying the kernel's routing tables to allow possible unstable situations to settle. -.PP +.Pp In addition to processing incoming packets, -.I XNSrouted +.Nm XNSrouted also periodically checks the routing table entries. If an entry has not been updated for 3 minutes, the entry's metric is set to infinity and marked for deletion. Deletions are delayed an additional 60 seconds to insure the invalidation is propagated to other routers. -.PP +.Pp Hosts acting as internetwork routers gratuitously supply their routing tables every 30 seconds to all directly connected hosts and networks. -.PP -Supplying the -.B \-s -option forces -.I XNSrouted -to supply routing information whether it is acting as an internetwork -router or not. +.Sh SEE ALSO +.Xr idp 4 +.Rs +.%T "Internet Transport Protocols" +.%R "XSIS 028112" +.%Q "Xerox System Integration Standard" +.Re +.Sh HISTORY The -.B \-q -option is the opposite of the -.B \-s -option. If the -.B \-t -option is specified, all packets sent or received are -printed on the standard output. In addition, -.I XNSrouted -will not divorce itself from the controlling terminal -so that interrupts from the keyboard will kill the process. -Any other argument supplied is interpreted as the name -of file in which -.IR XNSrouted 's -actions should be logged. This log contains information -about any changes to the routing tables and a history of -recent messages sent and received which are related to -the changed route. -.SH "SEE ALSO" -``Internet Transport Protocols'', XSIS 028112, Xerox System Integration -Standard. -.br -idp(4) +.Nm +command appeared in +.Bx 4.3 . diff --git a/usr/src/sbin/badsect/badsect.8 b/usr/src/sbin/badsect/badsect.8 index 58c99eda42..ce72f7ce2e 100644 --- a/usr/src/sbin/badsect/badsect.8 +++ b/usr/src/sbin/badsect/badsect.8 @@ -1,88 +1,106 @@ -.\" Copyright (c) 1985 The Regents of the University of California. +.\" Copyright (c) 1985, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)badsect.8 6.3 (Berkeley) %G% +.\" @(#)badsect.8 6.4 (Berkeley) %G% .\" -.TH BADSECT 8 "" -.UC 4 -.SH NAME -badsect \- create files to contain bad sectors -.SH SYNOPSIS -.B /etc/badsect -bbdir sector ... -.SH DESCRIPTION -.I Badsect +.Dd +.Dt BADSECT 8 +.Os BSD 4 +.Sh NAME +.Nm badsect +.Nd create files to contain bad sectors +.Sh SYNOPSIS +.Nm /etc/badsect +.Ar bbdir sector ... +.Sh DESCRIPTION +.Nm Badsect makes a file to contain a bad sector. Normally, bad sectors are made inaccessible by the standard formatter, which provides a forwarding table for bad sectors to the driver; see -.IR bad144 (8) +.Xr bad144 8 for details. If a driver supports the bad blocking standard it is much preferable to use that method to isolate bad blocks, since the bad block forwarding makes the pack appear perfect, and such packs can then be copied with -.IR dd (1). +.Xr dd 1 . The technique used by this program is also less general than bad block forwarding, as -.I badsect +.Nm badsect can't make amends for bad blocks in the i-list of file systems or in swap areas. -.PP +.Pp On some disks, adding a sector which is suddenly bad to the bad sector table -currently requires the running of the standard DEC formatter. +currently requires the running of the standard +.Tn DEC +formatter. Thus to deal with a newly bad block or on disks where the drivers do not support the bad-blocking standard -.I badsect +.Nm badsect may be used to good effect. -.PP -.I Badsect +.Pp +.Nm Badsect is used on a quiet file system in the following way: First mount the file system, and change to its root directory. -Make a directory BAD there. Run -.I badsect -giving as argument the BAD directory followed by +Make a directory +.Li BAD +there. Run +.Nm badsect +giving as argument the +.Ar BAD +directory followed by all the bad sectors you wish to add. (The sector numbers must be relative to the beginning of the file system, but this is not hard as the system reports relative sector numbers in its console error messages.) Then change back to the root directory, unmount the file system and run -.IR fsck (8) +.Xr fsck 8 on the file system. The bad sectors should show up in two files or in the bad sector files and the free list. Have -.I fsck +.Xr fsck remove files containing the offending bad sectors, but -.B "do not" -have it remove the BAD/\fInnnnn\fR files. -This will leave the bad sectors in only the BAD files. -.PP -.I Badsect +.Em do not +have it remove the +.Pa BAD/ Ns Em nnnnn +files. +This will leave the bad sectors in only the +.Li BAD +files. +.Pp +.Nm Badsect works by giving the specified sector numbers in a -.IR mknod (2) +.Xr mknod 2 system call, creating an illegal file whose first block address is the block containing bad sector and whose name is the bad sector number. When it is discovered by -.I fsck -it will ask ``HOLD BAD BLOCK''? +.Xr fsck +it will ask +.Dq Li "HOLD BAD BLOCK ?" A positive response will cause -.I fsck +.Xr fsck to convert the inode to a regular file containing the bad block. -.SH SEE ALSO -bad144(8), -fsck(8), -format(8V) -.SH DIAGNOSTICS -.I Badsect +.Sh SEE ALSO +.Xr bad144 8 , +.Xr fsck 8 , +.Xr format 8 +.Sh DIAGNOSTICS +.Nm Badsect refuses to attach a block that resides in a critical area or is out of range of the file system. A warning is issued if the block is already in use. -.SH BUGS +.Sh BUGS If more than one sector which comprise a file system fragment are bad, you should specify only one of them to -.I badsect, +.Nm badsect , as the blocks in the bad sector files actually cover all the sectors in a file system fragment. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.1 . diff --git a/usr/src/sbin/dmesg/dmesg.8 b/usr/src/sbin/dmesg/dmesg.8 index 658e2ca9b9..a93cceb0ef 100644 --- a/usr/src/sbin/dmesg/dmesg.8 +++ b/usr/src/sbin/dmesg/dmesg.8 @@ -1,36 +1,50 @@ -.\" Copyright (c) 1980 Regents of the University of California. -.\" All rights reserved. The Berkeley software License Agreement -.\" specifies the terms and conditions for redistribution. +.\" Copyright (c) 1980, 1991 Regents of the University of California. +.\" All rights reserved. .\" -.\" @(#)dmesg.8 6.3 (Berkeley) %G% +.\" %sccs.include.redist.man% .\" -.TH DMESG 8 "" -.UC 4 -.SH NAME -dmesg \- collect system diagnostic messages to form error log -.SH SYNOPSIS -.B dmesg -[ \- ] -.SH DESCRIPTION -.B N.B.: -.I Dmesg +.\" @(#)dmesg.8 6.4 (Berkeley) %G% +.\" +.Dd +.Dt DMESG 8 +.Os BSD 4 +.Sh NAME +.Nm dmesg +.Nd "collect system diagnostic messages to form error log" +.Sh SYNOPSIS +.Nm dmesg +.Op Fl +.Sh DESCRIPTION +.Sy N.B.: +.Nm Dmesg is obsoleted by -.IR syslogd (8) +.Xr syslogd 8 for maintenance of the system error log. -.PP -.I Dmesg +.Pp +.Nm Dmesg looks in a system buffer for recently printed diagnostic messages and prints them on the standard output. The messages are those printed or logged by the system when errors occur. -If the -.B \- -flag is given, then -.I dmesg +.Pp +Available option: +.Bl -tag -width Ds +.It Fl +.Nm Dmesg computes (incrementally) the new messages since the last time it was run and places these on the standard output. -.SH FILES -.ta 2i -/var/log/msgbuf scratch file for memory of \- option -.SH SEE ALSO -syslogd(8) +.El +.Sh FILES +.Bl -tag -width /var/log/msgbuf -compact +.It Pa /var/log/msgbuf +scratch file for memory of +.Ql Fl +option +.El +.Sh SEE ALSO +.Xr syslogd 8 +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.0 . diff --git a/usr/src/sbin/dump/dump.8 b/usr/src/sbin/dump/dump.8 index b56e706f0f..8e318a84b1 100644 --- a/usr/src/sbin/dump/dump.8 +++ b/usr/src/sbin/dump/dump.8 @@ -1,138 +1,128 @@ -.\" Copyright (c) 1980 Regents of the University of California. -.\" All rights reserved. The Berkeley software License Agreement -.\" specifies the terms and conditions for redistribution. +.\" Copyright (c) 1980, 1991 Regents of the University of California. +.\" All rights reserved. .\" -.\" @(#)dump.8 6.5 (Berkeley) %G% +.\" %sccs.include.redist.man% .\" -.TH DUMP 8 "" -.UC 4 -.SH NAME -dump \- incremental file system dump -.SH SYNOPSIS -.B dump -[ key [ -.I argument -\&... ] filesystem ] -.SH DESCRIPTION -.I Dump -copies to magnetic tape all files -changed after a certain date -in the -.I filesystem. -The -.I key -specifies the date and other options about the dump. -.I Key -consists of characters from -the set -.B 0123456789fusdWn. -.TP 5 -.B 0\-9 -This number is the `dump level'. -All files modified since the last date stored -in the file -.I /etc/dumpdates -for the same filesystem at lesser levels -will be dumped. -If no date is determined by the level, -the beginning of time is assumed; -thus the option -.B 0 -causes the entire filesystem to be dumped. -.TP 5 -.B f -Place the dump on the next -.I argument -file -instead of the tape. -If the name of the file is ``\-'', -.I dump -writes to standard output. -.TP 5 -.B u -If the dump completes successfully, -write the date of the beginning of the dump on -file -.I /etc/dumpdates. -This file records a separate date for -each filesystem and each dump level. +.\" @(#)dump.8 6.6 (Berkeley) %G% +.\" +.Dd +.Dt DUMP 8 +.Os BSD 4 +.Sh NAME +.Nm dump +.Nd filesystem backup +.Sh SYNOPSIS +.Nm dump +.Op Cm 0123456789fusdWn Op Ar argument ... +.Op Ar filesystem +.Sh DESCRIPTION +.Nm Dump +examines files +on a filesystem +and determines which files +need to be backed up. These files +are copied to the given disk, tape or other +storage medium for safe keeping (see +.Xr rdump 8 +for +remote backups) . +.Pp +The following options are supported by +.Nm dump: +.Bl -tag -width 4n +.It Cm 0\-9 +Dump levels. +A level 0, full backup, +guarantees the entire file system is copied. +A level number above 0, +incremental backup, +tells dump to +copy all files new or modified since the +last dump of the same or lower level. The default +level is 9. +.It Cm f Op Ar file +Write the backup to +.Ar file ; +.Ar file +may be a special device file +like +.Pa /dev/rmt12 +(a tape drive), +.Pa /dev/rsd1c +(an optical drive), +an ordinary file, +or +.Ql Fl +(the standard output). +.It Cm d Ar density +Set tape density to +.Ar density . +The default is 1600BPI. +.It Cm n +Whenever +.Nm dump +requires operator attention, +notify all operators in the group +.Dq operator +by means similar to a +.Xr wall 1 . +.It Cm s Ar feet +Attempt to caluculate the amount of tape needed +at a particular density. +If this amount is exceeded, +.Nm dump +prompts for a new tape. It is recommended to be a bit conservative +on this option. +The default size is 2300 feet. +.It Cm u +Update the file +.Pa /etc/dumpdates +after a successful dump. The format of -.I /etc/dumpdates +.Pa /etc/dumpdates is readable by people, consisting of one free format record per line: -filesystem name, increment level +filesystem name, +increment level and -.I ctime(3) +.Xr ctime 3 format dump date. -.I /etc/dumpdates +There may be only one entry per filesystem at each level. +The file +.Pa /etc/dumpdates may be edited to change any of the fields, if necessary. -.TP 5 -.B s -The size of the dump tape is specified in feet. -The number of feet is taken from the next -.I argument. -When the specified size is reached, -.I dump -will wait for reels to be changed. -The default tape size is 2300 feet. -.TP 5 -.B d -The density of the tape, expressed in BPI, -is taken from the next -.I argument. -This is used in calculating the amount of tape -used per reel. The default is 1600. -.TP 5 -.B b -The number of kilobytes per dump record. -.TP 5 -.B B -The number of dump records per volume. -This option overrides the calculation of tape size -based on length and density. -.TP 5 -.B W -.I Dump +.It Cm W +.Nm Dump tells the operator what file systems need to be dumped. This information is gleaned from the files -.I /etc/dumpdates +.Pa /etc/dumpdates and -.I /etc/fstab. +.Pa /etc/fstab . The -.B W +.Cm W option causes -.I dump +.Nm dump to print out, for each file system in -.I /etc/dumpdates +.Pa /etc/dumpdates the most recent dump date and level, and highlights those file systems that should be dumped. If the -.B W +.Cm W option is set, all other options are ignored, and -.I dump +.Nm dump exits immediately. -.TP 5 -.B w +.It Cm w Is like W, but prints only those filesystems which need to be dumped. -.TP 5 -.B n -Whenever -.I dump -requires operator attention, -notify by means similar to a -.IR wall (1) -all of the operators in the group \*(lqoperator\*(rq. -.PP -If no arguments are given, -the -.I key -is assumed to be -.B 9u -and a default file system is dumped -to the default tape. -.PP -.I Dump +.El +.Pp +If no options are specified, +.Nm dump +does a level +.Cm 9u +to the system's default tape device. +.Pp +.Nm Dump requires operator intervention on these conditions: end of tape, end of dump, @@ -140,34 +130,34 @@ tape write error, tape open error or disk read error (if there are more than a threshold of 32). In addition to alerting all operators implied by the -.B n +.Cm n key, -.I dump +.Nm dump interacts with the operator on -.I dump's +.Em dump's control terminal at times when -.I dump +.Nm dump can no longer proceed, or if something is grossly wrong. All questions -.I dump +.Nm dump poses -.B must +.Em must be answered by typing \*(lqyes\*(rq or \*(lqno\*(rq, appropriately. -.PP +.Pp Since making a dump involves a lot of time and effort for full dumps, -.I dump +.Nm dump checkpoints itself at the start of each tape volume. If writing that volume fails for some reason, -.I dump +.Nm dump will, with operator permission, restart itself from the checkpoint after the old tape has been rewound and removed, and a new tape has been mounted. -.PP -.I Dump +.Pp +.Nm Dump tells the operator what is going on at periodic intervals, including usually low estimates of the number of blocks to write, the number of tapes it will take, the time to completion, and @@ -175,71 +165,95 @@ the time to the tape change. The output is verbose, so that others know that the terminal controlling -.I dump +.Nm dump is busy, and will be for some time. -.PP -Now a short suggestion on how to -perform dumps. -Start with a full level 0 dump -.PP - dump 0un -.PP -Next, dumps of active file +.Pp +In the event of a catastrophic disk event, the time required +to restore all the necessary backup tapes or files to disk +can be kept to a minimum by staggering the incremental dumps. +An efficient method of staggering incremental dumps +to minimize the number of tapes follows: +.Bl -bullet -offset indent +.It +Always start with a level 0 backup, for example: +.Bd -literal -offset indent +/etc/dump 0ufds /dev/nrst1 54000 6000 /usr/src +.Ed +.Pp +This should be done at set intervals, say once a month or once every two months, +and on a set of fresh tapes that is saved forever. +.It +After a level 0, dumps of active file systems are taken on a daily basis, using a modified Tower of Hanoi algorithm, with this sequence of dump levels: -.ce 1 +.Bd -literal -offset indent 3 2 5 4 7 6 9 8 9 9 ... -For the daily dumps, a set of 10 tapes per dumped file system -is used on a cyclical basis. +.Ed +.Pp +For the daily dumps, it should be possible to use a fixed number of tapes +for each day, used on a weekly basis. Each week, a level 1 dump is taken, and -the daily Hanoi sequence repeats with 3. -For weekly dumps, a set of 5 tapes per dumped file system is +the daily Hanoi sequence repeats beginning with 3. +For weekly dumps, another fixed set of tapes per dumped file system is used, also on a cyclical basis. -Each month, a level 0 dump is taken -on a set of fresh tapes that is saved forever. -.SH FILES -.nf -.ta \w'/etc/dumpdates\ \ 'u -/dev/rrp1g default filesystem to dump from -/dev/rmt8 default tape unit to dump to -/etc/dumpdates new format dump date record -/etc/fstab dump table: file systems and frequency -/etc/group to find group \fIoperator\fP -.fi -.DT -.br -.SH "SEE ALSO" -restore(8), -dump(5), -fstab(5) -.SH DIAGNOSTICS +.El +.Pp +After several months or so, the daily and weekly tapes should get +rotated out of the dump cycle and fresh tapes brought in. +.Sh FILES +.Bl -tag -width /etc/dumpdates -compact +.It Pa /dev/rrp1g +default filesystem to dump from (system dependent). +.It Pa /dev/rmt8 +default tape unit to dump to +.It Pa /etc/dumpdates +new format dump date record +.It Pa /etc/fstab +dump table: file systems and frequency +.It Pa /etc/group +to find group +.Em operator +.El +.Sh SEE ALSO +.Xr rdump 8 , +.Xr restore 8 , +.Xr dump 5 , +.Xr fstab 5 +.Sh DIAGNOSTICS Many, and verbose. -.PP +.Pp Dump exits with zero status on success. Startup errors are indicated with an exit code of 1; abnormal termination is indicated with an exit code of 3. -.SH BUGS -.PP +.Sh BUGS +.Pp Fewer than 32 read errors on the filesystem are ignored. Each reel requires a new process, so parent processes for reels already written just hang around until the entire tape is written. -.PP -.I Dump +.Pp +.Nm Dump with the -.B W +.Cm W or -.B w +.Cm w options does not report filesystems that have never been recorded -in /etc/dumpdates, even if listed in /etc/fstab. -.PP +in +.Pa /etc/dumpdates , +even if listed in +.Pa /etc/fstab . +.Pp It would be nice if -.I dump +.Nm dump knew about the dump sequence, kept track of the tapes scribbled on, told the operator which tape to mount when, and provided more assistance for the operator running -.IR restore . +.Xr restore . +.Sh HISTORY +A +.Nm +command appeared in Version 6 AT&T UNIX. diff --git a/usr/src/sbin/dumpfs/dumpfs.8 b/usr/src/sbin/dumpfs/dumpfs.8 index 0e94f9a049..cc4d96ddaf 100644 --- a/usr/src/sbin/dumpfs/dumpfs.8 +++ b/usr/src/sbin/dumpfs/dumpfs.8 @@ -1,27 +1,36 @@ -.\" Copyright (c) 1983 Regents of the University of California. -.\" All rights reserved. The Berkeley software License Agreement -.\" specifies the terms and conditions for redistribution. +.\" Copyright (c) 1983, 1991 Regents of the University of California. +.\" All rights reserved. .\" -.\" @(#)dumpfs.8 6.1 (Berkeley) %G% +.\" %sccs.include.redist.man% .\" -.TH DUMPFS 8 "" -.UC 5 -.SH NAME -dumpfs \- dump file system information -.SH SYNOPSIS -.B dumpfs -.IR filesys | device -.SH DESCRIPTION -.I Dumpfs +.\" @(#)dumpfs.8 6.2 (Berkeley) %G% +.\" +.Dd +.Dt DUMPFS 8 +.Os BSD 4.2 +.Sh NAME +.Nm dumpfs +.Nd dump file system information +.Sh SYNOPSIS +.Nm dumpfs +.Op Ar filesys No \&| Ar device +.Sh DESCRIPTION +.Nm Dumpfs prints out the super block and cylinder group information for the file system or special device specified. The listing is very long and detailed. This command is useful mostly for finding out certain file system information such as the file system block size and minimum free space percentage. -.SH "SEE ALSO" -fs(5), -disktab(5), -tunefs(8), -newfs(8), -fsck(8) +.Sh SEE ALSO +.Xr fs 5 , +.Xr disktab 5 , +.Xr disklabel 8 , +.Xr tunefs 8 , +.Xr newfs 8 , +.Xr fsck 8 +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/sbin/fastboot/fastboot.8 b/usr/src/sbin/fastboot/fastboot.8 index b188f309f6..20d35049c4 100644 --- a/usr/src/sbin/fastboot/fastboot.8 +++ b/usr/src/sbin/fastboot/fastboot.8 @@ -1,39 +1,43 @@ -.\" Copyright (c) 1983 Regents of the University of California. -.\" All rights reserved. The Berkeley software License Agreement -.\" specifies the terms and conditions for redistribution. +.\" Copyright (c) 1983, 1991 Regents of the University of California. +.\" All rights reserved. .\" -.\" @(#)fastboot.8 6.2 (Berkeley) %G% +.\" %sccs.include.redist.man% .\" -.TH FASTBOOT 8 "" -.UC 5 -.SH NAME -fastboot, fasthalt \- reboot/halt the system without checking the disks -.SH SYNOPSIS -.B fastboot -[ -.I boot-options -] -.br -.B fasthalt -[ -.I halt-options -] -.SH DESCRIPTION -.I Fastboot +.\" @(#)fastboot.8 6.3 (Berkeley) %G% +.\" +.Dd +.Dt FASTBOOT 8 +.Os BSD 4.2 +.Sh NAME +.Nm fastboot , +.Nm fasthalt +.Nd "reboot/halt the system without checking the disks" +.Sh SYNOPSIS +.Nm fastboot +.Op Ar boot-options +.Nm fasthalt +.Op Ar halt-options +.Sh DESCRIPTION +.Nm Fastboot and -.I fasthalt +.Nm fasthalt are shell scripts which reboot and halt the system without checking the file systems. This is done by creating a file -.IR /fastboot , +.Pa /fastboot , then invoking the -.I reboot +.Xr reboot program. The system startup script, -.IR /etc/rc , +.Pa /etc/rc , looks for this file and, if present, skips the normal invocation of -.IR fsck (8). -.SH "SEE ALSO" -halt(8), -reboot(8), -rc(8) +.Xr fsck 8 . +.Sh SEE ALSO +.Xr halt 8 , +.Xr reboot 8 , +.Xr rc 8 +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/sbin/ifconfig/ifconfig.8 b/usr/src/sbin/ifconfig/ifconfig.8 index 91a2c58492..c46f5e357c 100644 --- a/usr/src/sbin/ifconfig/ifconfig.8 +++ b/usr/src/sbin/ifconfig/ifconfig.8 @@ -1,139 +1,154 @@ -.\" Copyright (c) 1983 The Regents of the University of California. +.\" Copyright (c) 1983, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)ifconfig.8 6.12 (Berkeley) %G% +.\" @(#)ifconfig.8 6.13 (Berkeley) %G% .\" -.TH IFCONFIG 8 "" -.UC 5 -.SH NAME -ifconfig \- configure network interface parameters -.SH SYNOPSIS -.B ifconfig -interface address_family -[ -.I address -[ -.I dest_address -] ] [ -.I parameters -] -.br -.B ifconfig -interface -[ -protocol_family -] -.SH DESCRIPTION -.I Ifconfig +.Dd +.Dt IFCONFIG 8 +.Os BSD 4.2 +.Sh NAME +.Nm ifconfig +.Nd configure network interface parameters +.Sh SYNOPSIS +.Nm ifconfig +.Ar interface address_family +.Oo +.Ar address +.Op Ar dest_address +.Oc +.Op Ar parameters +.Nm ifconfig +.Ar interface +.Op Ar protocol_family +.Sh DESCRIPTION +.Nm Ifconfig is used to assign an address to a network interface and/or configure network interface parameters. -.I Ifconfig +.Nm Ifconfig must be used at boot time to define the network address of each interface present on a machine; it may also be used at a later time to redefine an interface's address -or other operating parameters. The -.I interface -parameter is a string of the form ``name unit'', e.g. ``en0''. -.LP -Since an interface may receive transmissions in differing protocols, -each of which may require separate naming schemes, it is necessary -to specify the -.IR address_family , -which may change the interpretation of the remaining parameters. -The address families currently supported are ``inet'', ``iso'', and ``ns''. -.LP -For the DARPA-Internet family, +or other operating parameters. +.Pp +Available operands for +.Nm ifconfig: +.Bl -tag -width Ds +.It Ar Address +For the +.Tn DARPA-Internet +family, the address is either a host name present in the host name data base, -.IR hosts (5), -or a DARPA Internet address expressed in the Internet standard -``dot notation''. +.Xr hosts 5 , +or a +.Tn DARPA +Internet address expressed in the Internet standard +.Dq dot notation . For the Xerox Network Systems(tm) family, addresses are -.IR net:a.b.c.d.e.f , +.Ar net:a.b.c.d.e.f , where -.I net +.Ar net is the assigned network number (in decimal), and each of the six bytes of the host number, -.I a +.Ar a through -.IR f , +.Ar f , are specified in hexadecimal. The host number may be omitted on 10Mb/s Ethernet interfaces, which use the hardware physical address, and on interfaces other than the first. -For the ISO family, addresses are specified as a long hexadecimal string, +For the +.Tn ISO +family, addresses are specified as a long hexadecimal string, as in the Xerox family. However, two consecutive dots imply a zero byte, and the dots are optional, if the user wishes to (carefully) count out long strings of digits in network byte order. -.PP +.It Ar address_family +Specifies the +.Ar address family +which affects interpretation of the remaining parameters. +Since an interface can receive transmissions in differing protocols +with different naming schemes, specifying the address family is recommeded. +The address or protocol families currently +supported are +.Dq inet , +.Dq iso , +and +.Dq ns . +.It Ar Interface +The +.Ar interface +parameter is a string of the form +.Dq name unit , +for example, +.Dq en0 +.El +.Pp The following parameters may be set with -.IR ifconfig : -.TP 15 -.B up -Mark an interface ``up''. -This may be used to enable an interface after an ``ifconfig down.'' -It happens automatically when setting the first address on an interface. -If the interface was reset when previously marked down, -the hardware will be re-initialized. -.TP 15 -.B down +.Nm ifconfig : +.Bl -tag -width dest_addressxx +.It Cm alias +Establish an additional network address for this interface. +This is sometimes useful when changing network numbers, and +one wishes to accept packets addressed to the old interface. +.It Cm arp +Enable the use of the Address Resolution Protocol in mapping +between network level addresses and link level addresses (default). +This is currently implemented for mapping between +.Tn DARPA +Internet +addresses and 10Mb/s Ethernet addresses. +.It Fl arp +Disable the use of the Address Resolution Protocol. +.It Cm broadcast +(Inet only) +Specify the address to use to represent broadcasts to the +network. +The default broadcast address is the address with a host part of all 1's. +.It Cm debug +Enable driver dependent debugging code; usually, this turns on +extra console error logging. +.It Fl debug +Disable driver dependent debugging code. +.It Cm delete +Remove the network address specified. +This would be used if you incorrectly specified an alias, or it +was no longer needed. +If you have incorrectly set an NS address having the side effect +of specifying the host portion, removing all NS addresses will +allow you to respecify the host portion. +.It Cm dest_address +Specify the address of the correspondent on the other end +of a point to point link. +.It Cm down Mark an interface ``down''. When an interface is marked ``down'', the system will not attempt to transmit messages through that interface. If possible, the interface will be reset to disable reception as well. This action does not automatically disable routes using the interface. -.TP 15 -.B trailers -Request the use of a ``trailer'' link level encapsulation when -sending (default). -If a network interface supports -.IR trailers , -the system will, when possible, encapsulate outgoing -messages in a manner which minimizes the number of -memory to memory copy operations performed by the receiver. -On networks that support the Address Resolution Protocol (see -.IR arp (4P); -currently, only 10 Mb/s Ethernet), -this flag indicates that the system should request that other -systems use trailers when sending to this host. -Similarly, trailer encapsulations will be sent to other -hosts that have made such requests. -Currently used by Internet protocols only. -.TP 15 -.B \-trailers -Disable the use of a ``trailer'' link level encapsulation. -.TP 15 -.B arp -Enable the use of the Address Resolution Protocol in mapping -between network level addresses and link level addresses (default). -This is currently implemented for mapping between DARPA Internet -addresses and 10Mb/s Ethernet addresses. -.TP 15 -.B \-arp -Disable the use of the Address Resolution Protocol. -.TP 15 -.BI metric " n" +.It Cm ipdst +This is used to specify an Internet host who is willing to receive +ip packets encapsulating NS packets bound for a remote network. +An apparent point to point link is constructed, and +the address specified will be taken as the NS address and network +of the destination. +IP encapsulation of +.Tn CLNP +packets is done differently. +.It Cm metric Ar n Set the routing metric of the interface to -.IR n , +.Ar n , default 0. The routing metric is used by the routing protocol -.RI ( routed (8c)). +.Pq Xr routed 8 . Higher metrics have the effect of making a route less favorable; metrics are counted as addition hops to the destination network or host. -.TP 15 -.B debug -Enable driver dependent debugging code; usually, this turns on -extra console error logging. -.TP 15 -.B \-debug -Disable driver dependent debugging code. -.TP 15 -.BI netmask " mask" +.It Cm netmask Ar mask (Inet and Iso) Specify how much of the address to reserve for subdividing networks into sub-networks. @@ -142,69 +157,86 @@ and the subnet part, which is taken from the host field of the address. The mask can be specified as a single hexadecimal number with a leading 0x, with a dot-notation Internet address, or with a pseudo-network name listed in the network table -.IR networks (5). +.Xr networks 5 . The mask contains 1's for the bit positions in the 32-bit address which are to be used for the network and subnet parts, and 0's for the host part. The mask should contain at least the standard network portion, and the subnet field should be contiguous with the network portion. -.TP 15 -.B dest_address -Specify the address of the correspondent on the other end -of a point to point link. -.TP 15 -.B broadcast -(Inet only) -Specify the address to use to represent broadcasts to the -network. -The default broadcast address is the address with a host part of all 1's. -.TP 15 -.B ipdst -This is used to specify an Internet host who is willing to receive -ip packets encapsulating NS packets bound for a remote network. -An apparent point to point link is constructed, and -the address specified will be taken as the NS address and network -of the destination. -IP encapsulation of CLNP packets is done differently, see -.IR eon (5). -.TP 15 -.B alias -Establish an additional network address for this interface. -This is sometimes useful when changing network numbers, and -one wishes to accept packets addressed to the old interface. -.TP 15 -.B delete -Remove the network address specified. -This would be used if you incorrectly specified an alias, or it -was no longer needed. -If you have incorrectly set an NS address having the side effect -of specifying the host portion, removing all NS addresses will -allow you to respecify the host portion. -.TP 15 -.BI nsellength " n" -(ISO only) -This specifies a trailing number of bytes for a received NSAP +.\" see +.\" Xr eon 5 . +.It Cm nsellength Ar n +.Pf ( Tn ISO +only) +This specifies a trailing number of bytes for a received +.Tn NSAP used for local identification, the remaining leading part of which is -taken to be the NET (Network Entity Title). -The default value is 1, which is conformant to US GOSIP. +taken to be the +.Tn NET +(Network Entity Title). +The default value is 1, which is conformant to US +.Tn GOSIP . When an iso address is set in an ifconfig command, -it is really the NSAP which is being specified. -For example, in US GOSIP, 20 hex digits should be -specified in the ISO NSAP to be assigned to the interface. +it is really the +.Tn NSAP +which is being specified. +For example, in +.Tn US GOSIP , +20 hex digits should be +specified in the +.Tn ISO NSAP +to be assigned to the interface. There is some evidence that a number different 1 may be useful -for AFI 37 type addresses. -.PP -.I Ifconfig +for +.Tn AFI +37 type addresses. +.It Cm trailers +Request the use of a ``trailer'' link level encapsulation when +sending (default). +If a network interface supports +.Cm trailers , +the system will, when possible, encapsulate outgoing +messages in a manner which minimizes the number of +memory to memory copy operations performed by the receiver. +On networks that support the Address Resolution Protocol (see +.Xr arp 4 ; +currently, only 10 Mb/s Ethernet), +this flag indicates that the system should request that other +systems use trailers when sending to this host. +Similarly, trailer encapsulations will be sent to other +hosts that have made such requests. +Currently used by Internet protocols only. +.It Fl trailers +Disable the use of a ``trailer'' link level encapsulation. +.It Cm up +Mark an interface ``up''. +This may be used to enable an interface after an ``ifconfig down.'' +It happens automatically when setting the first address on an interface. +If the interface was reset when previously marked down, +the hardware will be re-initialized. +.El +.Pp +.Pp +.Nm Ifconfig displays the current configuration for a network interface when no optional parameters are supplied. If a protocol family is specified, Ifconfig will report only the details specific to that protocol family. -.PP +.Pp Only the super-user may modify the configuration of a network interface. -.SH DIAGNOSTICS +.Sh DIAGNOSTICS Messages indicating the specified interface does not exit, the requested address is unknown, or the user is not privileged and tried to alter an interface's configuration. -.SH "SEE ALSO" -netstat(1), netintro(4), rc(8), routed(8), eon(5) +.Sh SEE ALSO +.Xr netstat 1 , +.Xr netintro 4 , +.Xr rc 8 , +.Xr routed 8 , +.\" .Xr eon 5 +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.2 . diff --git a/usr/src/sbin/reboot/halt.8 b/usr/src/sbin/reboot/halt.8 index eb477ce9c3..22b862b911 100644 --- a/usr/src/sbin/reboot/halt.8 +++ b/usr/src/sbin/reboot/halt.8 @@ -1,52 +1,59 @@ -.\" Copyright (c) 1980 The Regents of the University of California. +.\" Copyright (c) 1980, 1991 The Regents of the University of California. .\" All rights reserved. .\" .\" %sccs.include.redist.man% .\" -.\" @(#)halt.8 6.4 (Berkeley) %G% +.\" @(#)halt.8 6.5 (Berkeley) %G% .\" -.TH
"" -.TH HALT 8 "" -.UC 4 -.SH NAME -halt \- stop the processor -.SH SYNOPSIS -.B halt -[ -.B \-n -] -[ -.B \-q -] -[ -.B \-y -] -.SH DESCRIPTION -.I Halt +.Dd +.Dt HALT 8 +.Os BSD 4 +.Sh NAME +.Nm halt +.Nd stop the processor +.Sh SYNOPSIS +.Nm halt +.Op Fl n +.Op Fl q +.Op Fl y +.Sh DESCRIPTION +.Nm Halt writes out sandbagged information to the disks and then stops the processor. The machine does not reboot, even if the auto-reboot switch is set on the console. -.PP -The -.B \-n -option prevents the sync before stopping. The -.B \-q -option causes a quick halt, no graceful shutdown is attempted. The -.B \-y -option is needed if you are trying to halt the system from a dialup. -.PP -.I Halt +.Pp +Available options for +.Nm halt : +.Bl -tag -width Ds +.It Fl n +No sync before stopping. +.It Fl q +Quick halt, no graceful shutdown is attempted. +.It Fl y +This option is needed if you are trying to halt the system from a dialup. +.El +.Pp +.Nm Halt normally logs the shutdown using -.IR syslog (8) +.Xr syslog 8 and places a shutdown record in the login accounting file -/var/log/wtmp. +.Pa /var/log/wtmp. These actions are inhibited if the -.B \-n +.Fl n or -.B \-q +.Fl q options are present. -.SH SEE ALSO -reboot(8), shutdown(8), syslogd(8) -.SH BUGS -It is very difficult to halt a VAX, as the machine wants to then +.Sh SEE ALSO +.Xr reboot 8 , +.Xr shutdown 8 , +.Xr syslogd 8 +.Sh BUGS +It is very difficult to halt a +.Tn VAX , +as the machine wants to then reboot itself. A rather tight loop suffices. +.Sh HISTORY +The +.Nm +command appeared in +.Bx 4.0 . -- 2.20.1