NIO CommKit Host Interface Installation and System Administration Manual
SRVTAB(4) SRVTAB(4)
E-81 CommKit Host Interface, Release 4.0
%z The module type flag will return the module type of the originating
device if the data switch includes this information in the dialstring (field
1 of the fifth line of the dialstring).
%C The name of the srvtab control directory being used.
%H The originating group name truncated to the length of the host field of an
/var/adm/utmp entry.
%U The name of the user ID mapping file [see dkuidtab(4)].
EXAMPLES
The following samples exemplify valid entries in the file /etc/opt/dk/srvtab/rl, the control file for remote
login.
# System Service Flag User Program Initial Parms
#
ar1/exch2/grp? rl U/vx *n %s –Dsh
ar1/??ch2/* rl U/vx *n>10 %s –Dsh
* rl T/vx *n<10 – 7:Privileged (%u)
ar1/* rl U/vx & %s –Dsh
* rl I/vx root /bin/login login
The first line matches calls from groups of the form grp followed by any single character in exchange exch2
and area ar1. The user making the call must have the same user ID locally and remotely to match the table
entry. The second line matches calls from any group whose exchange begins with any 2 characters followed
by ch2 in area ar1. In addition, these calls must be originated from “non-administrative” logins (for example,
numeric user IDs greater than ten) also using the same user ID locally. The third line traps remote login
requests from any users with numerical user IDs less than ten. Their calls are rejected with an ACCESS
DENIED code and their user ID is logged in the server log file. The fourth line allows calls from users in any
exchange in area ar1 who have pre-established authorization via authorize(1M). The last entry will invoke
the normal login(1) program for callers from any area/exchange/group pattern that does not match any of the
preceding /etc/opt/dk/srvtab/rl entries.
This example, from a control file named /etc/opt/dk/srvtab/whoami, just prints interesting information about
the caller:
* whoami /b adm /bin/echo echo:You are:%u:from:%f:(%n.%m.%c).\n\r
The following example, from the control file /etc/opt/dk/srvtab/uucp, illustrates how to choose different user
IDs for UUCP based on the caller:
# System Service Flag User Program Initial Parms
#
my/mynode/*.5 uucp /b luucp %s uucico
*.? uucp /b euucp %s uucico
*.5 uucp /b ouucp %s uucico
The first line only accepts calls from user ID five (hopefully a UUCP process) from hosts in the exchange
(my/mynode) and maps them to the secure login luucp. The second line accepts calls from modem-pools
(user ?) and maps them to the “external” login euucp. The last line accepts calls from all other multiplexed
hosts and maps them to the login ouucp.
FILES
/etc/opt/dk/srvtab default srvtab directory
/etc/opt/dk/dkuidtab default user ID mapping file
/var/adm/utmp Connection accounting