PORTMAP
Section: Maintenance Commands (8)
Index
Return to Main Contents
Copyright (c) 1987 Sun Microsystems
Copyright (c) 1990, 1991 The Regents of the University of California. All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
-
Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
-
Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
-
All advertising materials mentioning features or use of this software
must display the following acknowledgement:
This product includes software developed by the University of
California, Berkeley and its contributors.
-
Neither the name of the University nor the names of its contributors
may be used to endorse or promote products derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
SUCH DAMAGE.
BSD mandoc
BSD 4.3
NAME
portmap
-
DARPA
port to
RPC
program number mapper
SYNOPSIS
portmap
[-
dv
]
DESCRIPTION
Portmap
is a server that converts
RPC
program numbers into
DARPA
protocol port numbers.
It must be running in order to make
RPC
calls.
When an
RPC
server is started, it will tell
portmap
what port number it is listening to, and what
RPC
program numbers it is prepared to serve.
When a client wishes to make an
RPC
call to a given program number,
it will first contact
portmap
on the server machine to determine
the port number where
RPC
packets should be sent.
Portmap
must be started before any
RPC
servers are invoked.
Normally
portmap
forks and dissociates itself from the terminal
like any other daemon.
Portmap
then logs errors using
syslog(3).
Option available:
- -d
-
(debug) prevents
portmap
from running as a daemon,
and causes errors and debugging information
to be printed to the standard error output.
- -v
-
(verbose) causes
portmap
to give more logging information to
syslogd(8).
Access control
By default, host access control is enabled. However, the host that runs
the portmapper is always considered authorized. The host access control
tables are never consulted with requests from the local system itself;
they are always consulted with requests from other hosts.
In order to avoid deadlocks, the portmap program does not attempt to
look up the remote host name or user name, nor will it try to match NIS
netgroups. The upshot of all this is that only network number patterns
will work for portmap access control.
Sample entries for the host access-control files are:
/etc/hosts.allow:
portmap: your.sub.net.number/your.sub.net.mask
portmap: 255.255.255.255 0.0.0.0
/etc/hosts.deny
portmap: ALL
The syntax of the access-control files is described in the
hosts_access5
and
hosts_options5
manual page that comes with the tcp wrapper (log_tcp)
sources. The safe_finger command comes with later wrapper releases.
The first line in the hosts.allow file permits access from all systems
within your own subnet. Some rpc services rely on broadcasts and will
contact your portmapper anyway; and once an intruder has access to your
local network segment you're already in deep trouble.
The second line in the hosts.allow file may be needed if there are
any PC-NFS systems on your network segment.
For security reasons, the portmap process drops root privilegs after
initialization. The access control files should therefore be readable
for group or world.
SEE ALSO
inetd.conf5,
rpcinfo(8),
inetd(8),
syslogd(8),
hosts_access5,
hosts_options5
BUGS
If
portmap
crashes, all servers must be restarted.
HISTORY
The
portmap
command appeared in
BSD 4.3
Index
- NAME
-
- SYNOPSIS
-
- DESCRIPTION
-
- Access control
-
- SEE ALSO
-
- BUGS
-
- HISTORY
-