1 .\" $NetBSD: lpd.8,v 1.32 2006/01/20 08:51:40 garbled Exp $
3 .\" Copyright (c) 1983, 1991, 1993
4 .\" The Regents of the University of California. All rights reserved.
6 .\" Redistribution and use in source and binary forms, with or without
7 .\" modification, are permitted provided that the following conditions
9 .\" 1. Redistributions of source code must retain the above copyright
10 .\" notice, this list of conditions and the following disclaimer.
11 .\" 2. Redistributions in binary form must reproduce the above copyright
12 .\" notice, this list of conditions and the following disclaimer in the
13 .\" documentation and/or other materials provided with the distribution.
14 .\" 3. Neither the name of the University nor the names of its contributors
15 .\" may be used to endorse or promote products derived from this software
16 .\" without specific prior written permission.
18 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
19 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
22 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 .\" @(#)lpd.8 8.3 (Berkeley) 4/19/94
37 .Nd line printer spooler daemon
41 .Op Fl b Ar bind-address
47 is the line printer daemon (spool area handler) and is normally invoked
51 It makes a single pass through the
53 file to find out about the existing printers and prints any files
55 It then uses the system calls
59 to receive requests to print files in the queue, transfer files to
60 the spooling area, display the queue, or remove jobs from the queue.
61 In each case, it forks a child to handle the request so the parent
62 can continue to listen for more requests.
69 option is not specified,
71 will listen on all network interfaces for incoming TCP connections.
78 should listen on that address instead of INADDR_ANY.
81 options are permitted, allowing a list of addresses to be specified.
82 Use of this option silently overrides the
84 option if it is also present on the command line.
86 can be a numeric host name in IPv4 or IPv6 notation, or a symbolic host
87 name which will be looked up in the normal way.
103 to log valid requests received from the network.
104 This can be useful for debugging purposes.
110 as the maximum number of child processes that
121 filters to be used if specified for a remote
125 would not use filters for remote printers.
133 does not listen on a TCP socket but only takes commands from a
136 This is valuable when the machine on which
138 runs is subject to attack over the network and it is desired that the
139 machine be protected from attempts to remotely fill spools and similar
146 as the wait time (in seconds) for dead remote server detection.
147 If no response is returned from a connected server within this period,
148 the connection is closed and a message logged.
149 The default is 120 seconds.
153 option will instruct lpd not to verify a remote tcp connection
154 comes from a reserved port (\*[Lt]1024).
161 listens on this port instead of the usual
166 Access control is provided by three means.
171 are consulted as described in
175 Second, all requests must come from one of the machines listed in
182 capability is specified in the
184 entry for the printer being accessed,
186 requests will only be honored for those users with accounts on the
187 machine with the printer.
188 Requests must pass all three tests.
192 in each spool directory contains the number of disk blocks to leave free
193 so that the line printer queue won't completely fill the disk.
196 file can be edited with your favorite text editor.
198 The daemon begins processing files
199 after it has successfully set the lock for exclusive
200 access (described a bit later),
201 and scans the spool directory
202 for files beginning with
206 file specify files to be printed or non-printing actions to be performed.
207 Each such line begins with a key character to specify what to do
208 with the remainder of the line.
212 String to be used for the job name on the burst page.
215 String to be used for the classification line
219 The line contains identification info from the password file and
220 causes the banner page to be printed.
223 String to be used as the title for
227 Name of the machine where
232 Login name of the person who invoked
234 This is used to verify ownership by
237 Send mail to the specified user when the current print job completes.
240 Name of a file to print which is already formatted.
244 but passes control characters and does not make page breaks.
246 Name of a file to print using
253 output (cat phototypesetter commands).
256 The file contains device independent troff
263 DVI format from Stanford.
266 The file contains data produced by
270 The file contains data produced by
273 The file contains a raster image.
275 The file contains PostScript data.
277 The file contains text data with
278 FORTRAN carriage control characters.
281 Name of the font file to use instead of the default.
284 Name of the font file to use instead of the default.
287 Name of the font file to use instead of the default.
290 Name of the font file to use instead of the default.
293 Changes the page width (in characters) used by
295 and the text filters.
298 The number of characters to indent the output by (in ascii).
301 Name of file to remove upon completion of printing.
304 The name of the file which is being printed, or a blank for the
307 is invoked in a pipeline).
310 If a file cannot be opened, a message will be logged via
316 will try up to 20 times to reopen a file it expects to be there,
317 after which it will skip the file to be printed.
322 to provide exclusive access to the lock file and to prevent multiple
323 daemons from becoming active simultaneously.
324 If the daemon should be killed or die unexpectedly, the lock file
326 The lock file is kept in a readable
328 form and contains two lines.
329 The first is the process id of the daemon and the second is the control
330 file name of the current job being printed.
331 The second line is updated to reflect the current status of
338 .Bl -tag -width "/var/spool/output/*/minfree" -compact
340 printer description file
341 .It Pa /var/spool/output/*
343 .It Pa /var/spool/output/*/minfree
344 minimum free space to leave
347 .It Pa /var/run/printer
348 socket for local requests
349 .It Pa /etc/hosts.allow
350 explicit remote host access list.
351 .It Pa /etc/hosts.deny
352 explicit remote host denial of service list.
353 .It Pa /etc/hosts.equiv
354 lists machine names allowed printer access
355 .It Pa /etc/hosts.lpd
356 lists machine names allowed printer access,
357 but not under same administrative control.
367 .Xr hosts_options 5 ,
372 .%T "4.3 BSD Line Printer Spooler Manual"
377 daemon appeared in Version 6 AT\*[Am]T UNIX.