1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
|
.\" $OpenBSD: identd.8,v 1.3 1997/07/27 20:04:27 downsj Exp $
.\"
.\" Copyright (c) 1997, Jason Downs. All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. All advertising materials mentioning features or use of this software
.\" must display the following acknowledgement:
.\" This product includes software developed by Jason Downs for the
.\" OpenBSD system.
.\" 4. Neither the name(s) of the author(s) nor the name OpenBSD
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS
.\" OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
.\" WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
.\" DISCLAIMED. IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT,
.\" INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
.\" (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
.\" SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
.\" CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" @(#)identd.8 1.9 92/02/11 Lysator
.\" Copyright (c) 1992 Peter Eriksson, Lysator, Linkoping University.
.\" This software has been released into the public domain.
.\"
.Dd July 27, 1997
.Dt IDENTD 8
.Os OpenBSD
.Sh NAME
.Nm identd
.Nd TCP/IP IDENT protocol server
.Sh SYNOPSIS
.Nm
.Op Fl i | w | b
.Op Fl t Ar seconds
.Op Fl u Ar uid
.Op Fl g Ar gid
.Op Fl p Ar port
.Op Fl a Ar address
.Op Fl c Ar charset
.Op Fl noelVvmNd
.Op Ar kernelfile Op Ar kmemfile
.Sh DESCRIPTION
.Nm
is a server which implements the
.Tn TCP/IP
proposed standard
.Tn IDENT
user identification protocol as specified in the
.Tn RFC 1413
document.
.Pp
.Nm
operates by looking up specific
.Tn TCP/IP
connections and returning the user name of the
process owning the connection.
.Sh ARGUMENTS
The
.Fl i
flag, which is the default mode, should be used when starting the
daemon from
.Xr inetd 8
with the "nowait" option in the
.Pa /etc/inetd.conf
file. Use of this mode will make
.Xr inetd 8
start one
.Nm
daemon for each connection request.
.Pp
The
.Fl w
flag should be used when starting the daemon from
.Xr inetd 8
with the "wait" option in the
.Pa /etc/inetd.conf
file. This is the prefered mode of
operation since that will start a copy of
.Nm
at the first connection request and then
.Nm
will handle subsequent requests
without having to do the nlist lookup in the kernel file for
every request as in the
.Fl i
mode above. The
.Nm
daemon will run either forever, until a bug
makes it crash or a timeout, as specified by the
.Fl t
flag, occurs.
.Pp
The
.Fl b
flag can be used to make the daemon run in standalone mode without
the assistance from
.Xr inetd 8 .
This mode is the least prefered mode since
a bug or any other fatal condition in the server will make it terminate
and it will then have to be restarted manually. Other than that is has the
same advantage as the
.Fl w
mode in that it parses the nlist only once.
.Pp
The
.Fl t Ar seconds
option is used to specify the timeout limit. This is the number
of seconds a server started with the
.Fl w
flag will wait for new connections before terminating. The server is
automatically restarted by
.Xr inetd 8
whenever a new connection is requested
if it has terminated. A suitable value for this is 120 (2 minutes), if
used. It defaults to no timeout (ie, will wait forever, or until a
fatal condition occurs in the server).
.Pp
The
.Fl u Ar uid
option is used to specify a user id number which the
.Nm
server should
switch to after binding itself to the
.Tn TCP/IP
port if using the
.Fl b
mode of operation.
.Pp
The
.Fl g Ar gid
option is used to specify a group id number which the
.Nm
server should
switch to after binding itself to the
.Tn TCP/IP
port if using the
.Fl b
mode of operation.
.Pp
The
.Fl p Ar port
option is used to specify an alternative port number to bind to if using
the
.Fl b
mode of operation. It can be specified by name or by number. Defaults to the
.Tn IDENT
port (113).
.Pp
The
.Fl a Ar address
option is used to specify the local address to bind the socket to if using
the
.Fl b
mode of operation. Can only be specified by IP address and not by domain
name. Defaults to the
.Li INADDR_ANY
address which normally means all local addresses.
.Pp
The
.Fl V
flag makes
.Nm
display the version number and the exit.
.Pp
The
.Fl l
flag tells
.Nm
to use the system logging daemon
.Xr syslogd 8
for logging purposes.
.Pp
The
.Fl v
flag causes
.Nm
to log every request made, if the use of
.Xr syslogd 8
is enabled.
.Pp
The
.Fl o
flag tells
.Nm
to not reveal the operating system type it is run on and to instead
always return
.Dq OTHER .
.Pp
The
.Fl e
flag tells
.Nm
to always return
.Dq UNKNOWN-ERROR
instead of the
.Dq NO-USER
or
.Dq INVALID-PORT
errors.
.Pp
The
.Fl c Ar charset
flags tells
.Nm
to add the optional (according to the
.Tn IDENT
protocol) character set designator to the reply generated.
.Ar charset
should be a valid character set as described in the
.Tn MIME RFC
in upper case characters.
.Pp
The
.Fl n
flags tells
.Nm
to always return user numbers instead of user names if you wish to
keep the user names a secret.
.Pp
The
.Fl N
flag makes
.Nm
check for a file
.Pa .noident
in each homedirectory for a user which the daemon is about to return the user
name for. It that file exists then the daemon will give the error
.Dq HIDDEN-USER
instead of the normal USERID response.
.Pp
.Fl m
flag makes
.Nm
use a mode of operation that will allow multiple requests to be
processed per session. Each request is specified one per line and
the responses will be returned one per line. The connection will not
be closed until the connecting part closes it's end of the line.
PLEASE NOTE THAT THIS MODE VIOLATES THE PROTOCOL SPECIFICATION AS
IT CURRENTLY STANDS.
.Pp
The
.Fl d
flag enables some debugging code that normally should NOT
be enabled since that breaks the protocol and may reveal information
that should not be available to outsiders.
.Pp
.Ar kernelfile
defaults to the normally running kernel file.
.Pp
.Ar kmemfile
defaults to the memory space of the normally running kernel.
.Sh SEE ALSO
.Xr inetd.conf 5 .
.Sh NOTES
.Nm
uses the
.Li LOG_DAEMON
syslogd(8) facility to log messages. This is the correct thing to do
since
.Li LOG_AUTH
is supposed to be used by authorization related programs, not authentication
related ones such as
.Nm .
.Sh BUGS
The handling of fatal errors could be better.
.Pp
If the
.Fl N
flag is specified and a user's
.Pa .noident
file is not accessible, then ident information regarding that user will be
returned if requested.
|