1 .\" -*- nroff -*- --------------------------------------------------------- *
4 .\" Copyright (c) 1990, 1993, 1994
5 .\" The Regents of the University of California. All rights reserved.
7 .\" Copyright 2001 H. Peter Anvin - All Rights Reserved
9 .\" Redistribution and use in source and binary forms, with or without
10 .\" modification, are permitted provided that the following conditions
12 .\" 1. Redistributions of source code must retain the above copyright
13 .\" notice, this list of conditions and the following disclaimer.
14 .\" 2. Redistributions in binary form must reproduce the above copyright
15 .\" notice, this list of conditions and the following disclaimer in the
16 .\" documentation and/or other materials provided with the distribution.
17 .\" 3. Neither the name of the University nor the names of its contributors
18 .\" may be used to endorse or promote products derived from this software
19 .\" without specific prior written permission.
21 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 .\"----------------------------------------------------------------------- */
34 .TH TFTPD 8 "16 February 2006" "tftp-hpa @@VERSION@@" "System Manager's Manual"
37 \- IPv4 Trivial File Transfer Protocol server
44 is a server for the IPv4 Trivial File Transfer Protocol. The TFTP
45 protocol is extensively used to support remote booting of diskless
46 devices. The server is normally started by
48 but can also run standalone.
53 Run the server in standalone (listen) mode, rather than run from
57 option is ignored, and the
59 option can be used to specify a specific local address or port to
62 \fB\-a\fP \fI[address][:port]\fP
67 to listen to when called with the
69 option. The default is to listen to the
73 on all local addresses.
76 Allow new files to be created. By default,
78 will only allow upload of files that already exist. Files are created
79 with default permissions allowing anyone to read or write them, unless
84 options are specified.
87 Change root directory on startup. This means the remote host does not
88 need to pass along the directory as part of the transfer, and may add
91 is specified, exactly one
93 should be specified on the command line. The use of this option is
94 recommended for security as well as compatibility with some boot ROMs
95 which cannot be easily made to include a directory name in its request.
97 \fB\-u\fP \fIusername\fP
98 Specify the username which
100 will run as; the default is "nobody". The user ID, group ID, and (if
101 possible on the platform) the supplementary group IDs will be set to
102 the ones specified in the system permission database for this
105 \fB\-U\fP \fIumask\fP
106 Sets the \fIumask\fP for newly created files to the specified value.
107 The default is zero (anyone can read or write) if the
109 option is not specified, or inherited from the invoking process if
114 Perform no additional permissions checks above the normal
115 system-provided access controls for the user specified via the
119 \fB\-t\fP \fItimeout\fP
122 this specifies how long, in seconds, to wait for a second connection
123 before terminating the server.
125 will then respawn the server when another request comes in. The
126 default is 900 (15 minutes.)
128 \fB\-T\fP \fItimeout\fP
129 Determine the default timeout, in microseconds, before the first
130 packet is retransmitted. This can be modified by the client if the
134 option is negotiated. The default is 1000000 (1 second.)
136 \fB\-m\fP \fIremap-file\fP
137 Specify the use of filename remapping. The
139 is a file containing the remapping rules. See the section on filename
140 remapping below. This option may not be compiled in, see the output of
142 to verify whether or not it is available.
145 Increase the logging verbosity of
147 This flag can be specified multiple times for even higher verbosity.
149 \fB\-r\fP \fItftp-option\fP
150 Indicate that a specific RFC 2347 TFTP option should never be
153 \fB\-B\fP \fImax-block-size\fP
154 Specifies the maximum permitted block size. The permitted range for
155 this parameter is from 512 to 65464. Some embedded clients request
156 large block sizes and yet do not handle fragmented packets correctly;
157 for these clients, it is recommended to set this value to the smallest
158 MTU on your network minus 32 bytes (20 bytes for IP, 8 for UDP, and 4
159 for TFTP; less if you use IP options on your network.) For example,
160 on a standard Ethernet (MTU 1500) a value of 1468 is reasonable.
162 \fB\-R\fP \fIport:port\fP
163 Force the server port number (the Transaction ID) to be in the
164 specified range of port numbers.
167 Print the version number and configuration to standard output, then
169 .SH "RFC 2347 OPTION NEGOTIATION"
172 supports RFC 2347 option negotation. Currently implemented options
175 \fBblksize\fP (RFC 2348)
176 Set the transfer block size to anything less than or equal to the
177 specified option. This version of
179 can support any block size up to the theoretical maximum of 65464
182 \fBblksize2\fP (nonstandard)
183 Set the transfer block size to anything less than or equal to the
184 specified option, but restrict the possible responses to powers of 2.
185 The maximum is 32768 bytes (the largest power of 2 less than or equal
188 \fBtsize\fP (RFC 2349)
189 Report the size of the file that is about to be transferred. This
194 option for binary (octet) mode transfers.
196 \fBtimeout\fP (RFC 2349)
197 Set the time before the server retransmits a packet, in seconds.
199 \fButimeout\fP (nonstandard)
200 Set the time before the server retransmits a packet, in microseconds.
204 option can be used to disable specific options; this may be necessary
205 to work around bugs in specific TFTP client implementations. For
206 example, some TFTP clients have been found to request the
208 option, but crash with an error if they actually get the option
209 accepted by the server.
210 .SH "FILENAME REMAPPING"
213 option specifies a file which contains filename remapping rules. Each
214 non-comment line (comments begin with hash marks,
220 a regular expression in the style of
223 .IR "replacement pattern" .
224 The operation indicated by
228 matches all or part of the filename. Rules are processed from the top
229 down, and by default, all rules are processed even if there is a
234 can be any combination of the following letters:
237 Replace the substring matched by
240 .IR "replacement pattern" .
241 The replacement pattern may contain escape sequences; see below.
244 Repeat this rule until it no longer matches. This is always used with
250 case-insensitively. By default it is case sensitive.
253 If this rule matches, end rule processing after executing the rule.
256 If this rule matches, start rule processing over from the very first
257 rule after executing this rule.
260 If this rule matches, refuse the request and send an access denied
264 This rule applies to GET (RRQ) requests only.
267 This rule applies to PUT (WRQ) requests only.
270 Inverse the sense of this rule, i.e. execute the
275 match. Cannot used together with
278 The following escape sequences are recognized as part of the
279 .IR "replacement pattern" :
282 The entire string matched by the
285 \fB\\1\fP to \fB\\9\fP
286 The strings matched by each of the first nine parenthesized
287 subexpressions, \\( ... \\), of the
292 The IP address of the requesting host, in dotted-quad notation
296 The IP address of the requesting host, in hexadecimal notation
302 \fB\\\fP\fIwhitespace\fP
309 Turns all subsequent letters to upper case.
312 Turns all subsequent letters to lower case.
315 Cancels the effect of \fB\\U\fP or \fB\\L\fP.
317 If the mapping file is changed, you need to send
323 The use of TFTP services does not require an account or password on
324 the server system. Due to the lack of authentication information,
326 will allow only publicly readable files (o+r) to be accessed, unless the
328 option is specified. Files may be written only if they already exist
329 and are publicly writable, unless the
331 option is specified. Note that this extends the concept of ``public''
332 to include all users on all hosts that can be reached through the
333 network; this may not be appropriate on all systems, and its
334 implications should be considered before enabling TFTP service.
335 Typically, some kind of firewall or packet-filter solution should be
336 employed. If appropriately compiled (see the output of
341 database for access control information. This may be slow; sites
342 requiring maximum performance may want to compile without this option
343 and rely on firewalling or kernel-based packet filters instead.
345 The server should be set to run as the user with the lowest possible
346 privilege; please see the
348 flag. It is probably a good idea to set up a specific user account for
350 rather than letting it run as "nobody", to guard against privilege
351 leaks between applications.
353 Access to files can, and should, be restricted by invoking
355 with a list of directories by including pathnames as server program
356 arguments on the command line. In this case access is restricted to
357 files whole names are prefixed by one of the given directories. If
358 possible, it is recommended that the
360 flag is used to set up a chroot() environment for the server to run in
361 once a connection has been set up.
363 Finally, the filename remapping
365 flag) support can be used to provide a limited amount of additional
369 .IR "Requirements for Internet Hosts \- Application and Support" .
372 .IR "The TFTP Protocol (revision 2)" .
375 .IR "TFTP Option Extension" .
378 .IR "TFTP Blocksize Option" .
381 .IR "TFTP Timeout Interval and Transfer Size Options" .
385 is maintained by H. Peter Anvin <hpa@zytor.com>. It was derived from,
386 but has substantially diverged from, an OpenBSD source base, with
387 added patches by Markus Gutschke and Gero Kulhman.
392 .BR hosts_access (5),