.TH IPSERV 8 .SH NAME telnetd, rlogind, rexexec, ftpd, socksd, hproxy \- Internet remote access daemons .SH SYNOPSIS .B ip/telnetd .RB [ -adnptN ] .RB [ -u .IR user ] .PP .B ip/rlogind .PP .B ip/rexexec .PP .B ip/ftpd .RB [ -aAdei ] .RB [ -n .IR namepace-file ] .RB [ -c .IR cert-path ] .PP .B ip/socksd [ .B -x .I inside ] [ .B -o .I outside ] .PP .B ip/hproxy .SH DESCRIPTION These programs support remote access across the Internet. All expect the network connection to be standard input, output, and error. They are normally started from scripts in .B /rc/bin/service (see .IR listen (8)). .PP .I Telnetd allows login from a remote client. There are three types of login: .TF anonymo .TP .I normal Normal users log in by encrypting and returning a challenge printed by .IR telnetd . The user can use either the .IR netkey program (see .IR passwd (1)) or a SecureNet handheld authenticator to encrypt the challenge. .B /lib/namespace defines the namespace. .TP .I noworld Users in group .B noworld in .BR /adm/users authenticate with a password in the clear. .B /lib/namespace.noworld defines the namespace. .TP .I anonymous User .B none requires no authentication. .B /lib/namespace defines the namespace. .PD .PP .IR Telnetd 's options are: .TP 4 .B a allow anonymous login by .B none .TP .B d print debugging to standard error .TP .B p don't originate any telnet control codes .TP .B n turn on local character echoing and imply the .B p option .TP .B t trusted, that is, don't authenticate .TP .B u use .I user as the local account name .TP .B N permit connections by `noworld' users only. .PD .PP .I Rlogind logs in using the BSD remote login protocol. .I Rlogind execs .I telnetd .B -nu after completing its initial handshake. .PP .I Rexexec executes a command locally for a remote client. It uses the standard Plan 9 authentication (see .IR authsrv (6)). .PP .I Ftpd runs the Internet file transfer protocol. It supports both implicit and explicit ftps. Users may transfer files in either direction between the local and remote machines. There are two types of login: .TF anonymous .TP .I normal Normal users authenticate with their username and password when using tls. .BI /usr/ username /lib/namespace.ftp or, if that file does not exist, .B /lib/namespace defines the namespace. .TP .I anonymous Users .B anonymous and .B none require no authentication. The argument to the .B \-n option (default .IR /lib/namespace.ftp ) defines the namespace. Anonymous users may not store files. .PD .PP .IR Ftpd 's options are: .TP 4 .B a allow anonymous access .TP .B A allow .I only anonymous access .TP .B d write debugging output to the log .TP .B e treat any user as anonymous .TP .B c the certificate to use for serving ftps. The key must be stored in factotum. .TP .B n the namespace for anonymous users (default .BR /lib/namespace.ftp ) .PP .I Socksd is a SOCKS4 and SOCKS5 proxy server allowing non Plan9 machines to access the outside network. The net to use for outgoing calls can be specified with the .B -o .I outside and the internal network is specified with .B -x .I inside (for UDP relay). If not specified, .I inside and .I outside will default to .BR /net . .PP .I Hproxy is a simple HTTP proxy server. .SH FILES .B /lib/namepace .br .BI /usr/ username /lib/namespace.ftp .br .B /lib/namespace.world .br .B /lib/namespace.ftp .SH SOURCE .B /sys/src/cmd/ip/telnetd.c .br .B /sys/src/cmd/ip/rlogind.c .br .B /sys/src/cmd/ip/rexexec.c .br .B /sys/src/cmd/ip/ftpd.c .br .B /sys/src/cmd/ip/socksd.c .br .B /sys/src/cmd/ip/hproxy.c .SH "SEE ALSO" .IR ftpfs (4), .IR pop3 (8) .SH HISTORY .I Hproxy first appeared in 9front (July, 2012). .I Socksd first appeared in 9front (March, 2012).