2 .\" Copyright (c) 1997-2006 Erez Zadok
3 .\" Copyright (c) 1989 Jan-Simon Pendry
4 .\" Copyright (c) 1989 Imperial College of Science, Technology & Medicine
5 .\" Copyright (c) 1989 The Regents of the University of California.
6 .\" All rights reserved.
8 .\" This code is derived from software contributed to Berkeley by
9 .\" Jan-Simon Pendry at Imperial College, London.
11 .\" Redistribution and use in source and binary forms, with or without
12 .\" modification, are permitted provided that the following conditions
14 .\" 1. Redistributions of source code must retain the above copyright
15 .\" notice, this list of conditions and the following disclaimer.
16 .\" 2. Redistributions in binary form must reproduce the above copyright
17 .\" notice, this list of conditions and the following disclaimer in the
18 .\" documentation and/or other materials provided with the distribution.
19 .\" 3. All advertising materials mentioning features or use of this software
20 .\" must display the following acknowledgment:
21 .\" This product includes software developed by the University of
22 .\" California, Berkeley and its contributors.
23 .\" 4. Neither the name of the University nor the names of its contributors
24 .\" may be used to endorse or promote products derived from this software
25 .\" without specific prior written permission.
27 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
28 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
29 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
30 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
31 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
32 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
33 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
34 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
35 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
36 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
39 .\" $Id: hlfsd.8,v 1.11.2.1 2006/01/02 18:48:25 ezk Exp $
42 .\" HLFSD was written at Columbia University Computer Science Department, by
43 .\" Erez Zadok <ezk@cs.columbia.edu> and Alexander Dupuy <dupuy@smarts.com>
44 .\" It is distributed under the same terms and conditions as AMD.
51 .Nd home-link file system daemon
56 .Op Fl c Ar cache-interval
58 .Op Fl i Ar reload-interval
60 .Op Fl o Ar mount-options
61 .Op Fl x Ar log-options
62 .Op Fl D Ar debug-options
63 .Op Fl P Ar password-file
64 .Op Ar linkname Op Ar subdir
69 is a daemon which implements a file system containing a symbolic link to
70 subdirectory within a user's home directory, depending on the user
71 which accessed that link.
72 It was primarily designed to redirect
73 incoming mail to users' home directories, so that it can read from
79 operates by mounting itself as an
81 server for the directory containing
85 Lookups within that directory are handled by
87 which uses the password map to determine how to resolve the lookup.
88 The directory will be created if it does not already exist.
89 The symbolic link will be to the accessing user's home directory, with
96 This directory will also be created if it does not already exist.
102 will cause it to shutdown.
105 will flush the internal
106 caches, and reload the password map.
107 It will also close and
108 reopen the log file, to enable the original log file to be
112 will cause it to dump its internal
113 table of user IDs and home directories to the file
114 .Pa /usr/tmp/hlfsd.dump.XXXXXX .
116 .Bl -tag -width indent
119 The name of the directory to which
120 the symbolic link returned by
122 will point, if it cannot access the home directory of the user.
126 This directory will be created if it does not exist.
128 that either users will read these files, or the system administrators
129 will run a script to resend this
132 .It Fl c Ar cache-interval
137 will cache the validity of home directories for this interval, in
139 Entries which have been verified within the last
141 seconds will not be verified again, since the operation could
142 be expensive, and the entries are most likely still valid.
143 After the interval has expired,
145 will re-verify the validity of the user's home directory, and
146 reset the cache time-counter.
147 The default value for
149 is 300 seconds (5 minutes).
154 to skip startup-time consistency checks such as existence of mount
155 directory, alternate spool directory, symlink to be hidden under the
156 mount directory, their permissions and validity.
158 Set the special group
164 (which access the mailboxes of other users) must be setgid
169 If no group is provided,
170 and there is no group
172 this feature is disabled.
175 Print a brief help message, and exit.
176 .It Fl i Ar reload-interval
177 Map-reloading interval.
182 will reload the password map.
186 needs the password map for the UIDs and home directory pathnames.
191 to reload the password maps.
196 will force it to reload the maps immediately.
200 is 900 seconds (15 minutes).
202 Specify a log file to which
209 then the log messages will be sent to the system log daemon by
214 This is also the default.
220 will not verify the validity of the symbolic link it will be
221 returning, or that the user's home directory contains
222 sufficient disk-space for spooling.
225 at the cost of possibly returning symbolic links to home
226 directories which are not currently accessible or are full.
229 validates the symbolic-link in the background.
232 option overrides the meaning of the
234 option, since no caching is necessary.
235 .It Fl o Ar mount-options
239 will use to mount itself on top of
245 If the system supports symbolic-link caching, default
250 Outputs the process ID of
252 to standard output where it can be saved into a file.
255 Displays version information to standard error.
256 .It Fl x Ar log-options
257 Specify run-time logging options.
258 The options are a comma separated
260 .Li fatal , error , user , warn , info , map , stats , all .
264 to run on systems that cannot turn off the NFS attribute-cache.
266 this option on those systems is discouraged, as it may result in loss
267 or mis-delivery of mail.
268 The option is ignored on systems that can turn
269 off the attribute-cache.
270 .It Fl D Ar log-options
271 Select from a variety of debugging options.
273 option with the string
275 reverses the effect of that option.
276 Options are cumulative.
277 The most useful option is
279 Since this option is only used for debugging other options are not
281 A fuller description is available in the program
287 will cause it to dump its internal password map to the file
288 .Pa /usr/tmp/hlfsd.dump.XXXXXX .
289 .It Fl P Ar password-file
290 Read the user-name, user-id, and home directory information from the file
296 to read the password database.
297 This option allows you to override the
298 default database, and is useful if you want to map users' mail files to a
299 directory other than their home directory.
300 Only the username, uid, and
301 home-directory fields of the file
303 are read and checked.
304 All other fields are ignored.
307 must otherwise be compliant with
309 System 7 colon-delimited format
313 .Bl -tag -width ".Pa /var/hlfs"
315 directory under which
317 mounts itself and manages the symbolic link
320 default sub-directory in the user's home directory, to which the
322 symbolic link returned by
328 symbolic link returned by
330 points if it is unable to verify the that
331 user's home directory is accessible.
345 .%T HLFSD: Delivering Email to Your $HOME
346 .%B Proc. LISA-VII, The 7th Usenix System Administration Conference
355 .%B "Linux NFS and Automounter Administration"
356 .%O ISBN 0-7821-2739-8
361 .Pa http://www.am-utils.org/
368 .An Erez Zadok Aq ezk@cs.sunysb.edu ,
369 Computer Science Department, Stony Brook University, Stony Brook, New York, USA.
371 .An Alexander Dupuy Aq dupuy@smarts.com ,
372 System Management ARTS, White Plains, New York, USA.
374 Other authors and contributors to am-utils are listed in the
376 file distributed with am-utils.