1 .\" Copyright (c) 1991, 1993, 1995
2 .\" The Regents of the University of California. All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
12 .\" 3. Neither the name of the University nor the names of its contributors
13 .\" may be used to endorse or promote products derived from this software
14 .\" without specific prior written permission.
16 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
17 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
20 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 .Nd "NIS domain binding daemon"
43 .Ar domainname , server1 , server2 , ...
49 utility is the process that maintains NIS binding information.
51 it searches for an NIS server responsible for serving the system's
52 default domain (as set by the
54 command) using network broadcasts.
55 Once it receives a reply,
56 it will store the address of the server and other
57 information in a special file located in
59 The NIS routines in the standard C library can then use this file
60 when processing NIS requests.
61 There may be several such files
62 since it is possible for an NIS client to be bound to more than
65 After a binding has been established,
67 will send DOMAIN_NONACK requests to the NIS server at one minute
69 If it fails to receive a reply to one of these requests,
71 assumes that the server is no longer running and resumes its network
72 broadcasts until another binding is established.
75 utility will also log warning messages using the
77 facility each time it detects that a server has stopped responding,
78 as well as when it has bound to a new server.
80 The following options are available:
81 .Bl -tag -width indent
83 It is possible to force
85 to bind to a particular NIS server host for a given domain by using the
90 refuses YPBINDPROC_SETDOM requests by default since it has no way of
91 knowing exactly who is sending them.
96 to accept YPBINDPROC_SETDOM requests from any host.
97 This option should only
98 be used for diagnostic purposes and only for limited periods since allowing
99 arbitrary users to reset the binding of an NIS client poses a severe
102 This is similar to the
104 flag, except that it only permits YPBINDPROC_SETDOM requests to be processed
105 if they originated from the local host.
109 to run in secure mode: it will refuse to bind to any NIS server
110 that is not running as root (i.e., that is not using privileged
114 .Ar domainname , server1 , server2 , server3 , ...
117 Allow the system administrator to lock
120 domain and group of NIS servers.
121 Up to ten servers can be specified.
122 There must not be any spaces between the commas in the domain/server
124 This option is used to ensure that the system binds
125 only to one domain and only to one of the specified servers, which
126 is useful for systems that are both NIS servers and NIS
127 clients: it provides a way to restrict what machines the system can
128 bind to without the need for specifying the
132 options, which are often considered to be security holes.
134 servers must have valid entries in the local
137 IP addresses may be specified in place of hostnames.
140 cannot make sense out of the arguments, it will ignore
143 flag and continue running normally.
147 will consider the domainname specified with the
149 flag to be the system default domain.
153 to use a 'many-cast' rather than a broadcast for choosing a server
154 from the restricted mode server list.
157 will transmit directly to the YPPROC_DOMAIN_NONACK procedure of the
158 servers specified in the restricted list and bind to the server that
159 responds the fastest.
160 This mode of operation is useful for NIS clients on remote subnets
161 where no local NIS servers are available.
164 flag can only be used in conjunction with the
166 flag above (if used without the
168 flag, it has no effect).
173 utility will not make continuous attempts to keep secondary domains bound.
174 If a server for a secondary domain fails to respond to a ping,
176 will broadcast for a new server only once before giving up.
178 client program attempts to reference the unbound domain,
180 will try broadcasting again.
183 will automatically maintain a binding for the default domain whether
184 client programs reference it or not.
186 .Bl -tag -width /etc/rc.conf -compact
187 .It Pa /var/yp/binding/[domainname].[version]
188 the files used to hold binding information for each NIS domain
190 system configuration file where the system default domain and
191 ypbind startup options are specified
200 .An Theo de Raadt Aq Mt deraadt@fsa.ca