1 .\" $NetBSD: fingerd.8,v 1.19 2003/09/07 16:22:22 wiz Exp $
3 .\" Copyright (c) 1980, 1991, 1993
4 .\" The Regents of the University of California. All rights reserved.
6 .\" Redistribution and use in source and binary forms, with or without
7 .\" modification, are permitted provided that the following conditions
9 .\" 1. Redistributions of source code must retain the above copyright
10 .\" notice, this list of conditions and the following disclaimer.
11 .\" 2. Redistributions in binary form must reproduce the above copyright
12 .\" notice, this list of conditions and the following disclaimer in the
13 .\" documentation and/or other materials provided with the distribution.
14 .\" 3. Neither the name of the University nor the names of its contributors
15 .\" may be used to endorse or promote products derived from this software
16 .\" without specific prior written permission.
18 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
19 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
22 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 .\" from: @(#)fingerd.8 8.1 (Berkeley) 6/4/93
32 .Dd September 12, 2002
37 .Nd remote user information server
44 is a simple protocol based on RFC 1288
45 that provides an interface to the
46 Name and Finger programs at several network sites.
47 The program is supposed to return a friendly,
48 human-oriented status report on either the system at the moment
49 or a particular person in depth.
50 There is no required format and the
51 protocol consists mostly of specifying a single
60 Once handed a connection,
62 reads a single command line
65 which it then passes to
68 closes its connections as soon as the output is finished.
70 If the line is null (i.e., just a
76 report that lists all people logged into
77 the system at that moment.
79 If a user name is specified (e.g.,
82 response lists more extended information for only that particular user,
83 whether logged in or not.
86 in the command line include both
90 If a name is ambiguous, all possible derivations are returned.
92 The following options may be passed to
94 as server program arguments in
96 .Bl -tag -width XPXfilenameX
100 Do not show any gecos information besides the users' real names.
102 Display the name of the remote host in short mode,
103 instead of the office location and office phone.
106 The name of the host originating the query, and the actual request
109 at LOG_NOTICE priority.
110 A request of the form
114 will return long output.
115 Empty requests will return all currently logged in users.
116 All other requests look for specific users.
117 See RFC 1288 for details.
123 is usually a login name; however, matching will also be done on the
124 users' real names, unless the
128 Use an alternate program as the local information provider.
129 The default local program executed by
133 By specifying a customized local server, this option allows a system manager
134 to have more control over what information is provided to remote sites.
138 from displaying the contents of the
144 Prints user information in short mode, one line per user.
147 that may be passed in from the remote client.
149 Disable forwarding of queries to other remote hosts.
151 Queries without a user name are rejected.
162 Connecting directly to the server from a
164 or an equally narrow-minded
165 .Tn TELNET Ns -protocol
166 user program can result
167 in meaningless attempts at option negotiation being sent to the
168 server, which will foul up the command line interpretation.
170 should be taught to filter out
172 and perhaps even respond
175 to all option commands received.