summaryrefslogtreecommitdiff
path: root/usr.sbin/rpc.bootparamd/rpc.bootparamd.8
blob: c93c578d5b25491fa0c9032bb66e22f7ea61ad8f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
.\" $Id: rpc.bootparamd.8,v 1.5 1997/08/18 04:50:35 deraadt Exp $
.\" @(#)bootparamd.8
.Dd Jan 8, 1994
.Dt BOOTPARAMD 8
.Os
.Sh NAME
.Nm bootparamd ,
.Nm rpc.bootparamd
.Nd boot parameter server
.Sh SYNOPSIS
.Nm /usr/sbin/rpc.bootparamd
.Op Fl d
.Op Fl s
.Op Fl r Ar router
.Op Fl f Ar file
.Sh DESCRIPTION
.Nm \&Bootparamd
is a server process that provides information to diskless clients
necessary for booting. It consults the file
.Dq Pa /etc/bootparams .
It should normally be started from
.Dq Pa /etc/rc .
.Pp
This version will allow the use of aliases on the hostname in the
.Dq Pa /etc/bootparams
file. The hostname returned in response to the booting client's whoami request
will be the name that appears in the config file, not the canonical name.
In this way you can keep the answer short enough
so that machines that cannot handle long hostnames won't fail during boot.
.Pp
While parsing, if a line containing just ``+'' is found, and
the YP subsystem is active, the YP map
.Pa bootparams
will be searched immediately.
.Sh OPTIONS
.Bl -tag -width indent
.It Fl d
Display the debugging information. The daemon does not fork in this
case.
.It Fl s
Log the debugging information with syslog. 
.It Fl r
Set the default router (a hostname or IP-address).
This defaults to the machine running the server.
.It Fl f
Specify the file to use as boot parameter file instead of
.Dq Pa /etc/bootparams .
.El
.Pp
.Sh FILES
.Bl -tag -width /etc/bootparams -compact
.It Pa /etc/bootparams
default configuration file
.El
.Sh "SEE ALSO"
.Xr bootparams 5
.Xr diskless 8 ,
.Sh WARNINGS
If rpc.bootparams is run on a system which is also running YP, your YP
domainname will be made public information.
.Sh BUGS
You may find the syslog loggings too verbose.
.Pp
It's not clear if the non-cannonical hack mentioned above is a good idea.
.Sh AUTHOR
Originally written by Klas Heggemann <klas@nada.kth.se>