inetd.1m (2010 09)
i
inetd(1M) inetd(1M)
to the syslogd daemon facility.
-k Kill the current inetd. This option sends the signal
SIGTERM to the Internet daemon that is
currently running, causing it to exit gracefully. This option is the preferred method of killing
inetd.
-l By default, inetd starts with connection logging disabled. If no
inetd is running, the -l
option causes the inetd to start with connection logging enabled. Otherwise the
-l option
causes
inetd to send the signal SIGQUIT to the
inetd that is already running, which
causes it to toggle the state of connection logging.
-p proc_limit
By default, inetd spawns any number of child processes to serve incoming connections.
When inetd is started with the -p option,
inetd does not spawn a child process if the
number of child processes already running in the system has reached the proc_limit value.
inetd spawns a new child process only when the number of running child processes is less
than the proc_limit value. If an invalid value or zero is specified for the
-p option, inetd
spawns any number of child processes to serve incoming connections.
-r count [interval]
inetd identifies a UDP service as broken or in an infinite loop when it receives count number
of connections in interval seconds of time. When
inetd finds any such broken service, it dis-
cards the packet requesting the socket connection, and refuses access to that service.
inetd
tries enabling that service after 10 minutes and accepts connections for that service. This is
applicable to all UDP services other than
tftp, bootp and rpc. Using the -r
option, you
can specify the values for count and interval , which need to be decimal numbers. If you
invoke
inetd without this option or specify invalid values for this option, the default values
40 and 60 are taken for count and interval , respectively.
-s This option is similar to the -l option, but it suppresses the hostname while logging into the
syslog file. If inetd is not running, the -s option causes inetd to start with suppressed
hostname logging enabled. If inetd is running, the -s option causes inetd to send SIGFPE
signal to inetd that is already running. This causes inetd to toggle the state of suppressed
hostname logging.
When
inetd is running with either of -l or of -s logging enabled, the Internet daemon logs attempted
connections to services. It also logs connection attempts which fail the security check. This information
can be useful when trying to determine if someone is repeatedly trying to access your system from a par-
ticular remote system (in other words, trying to break into your system). Successful connection attempts
are logged to the syslogd daemon facility at the info log level. Connection attempts failing the security
check are logged at the notice log level. inetd also logs whether the connection logging has been
enabled or disabled at the info log level.
DIAGNOSTICS
The following diagnostics are returned by the Internet daemon before it disconnects from the terminal.
An inetd is already running
An attempt was made to start an Internet daemon when one was already running. It is
incorrect to call the Internet daemon a second time without the -c, -k, -l or -s option.
There is no inetd running
An attempt was made to reconfigure an Internet daemon when none was running.
Inetd not found
This message occurs if inetd is called with -c and another Internet daemon is running but
cannot be reconfigured. This occurs if the original Internet daemon died without removing its
semaphore.
Next step : Use the
inetd -k command to remove the semaphore left by the previous Inter-
net daemon; then restart the daemon.
The following diagnostics are logged to the
syslogd daemon facility. Unless otherwise indicated, mes-
sages are logged at the error log level.
/etc/inetd.conf: Unusable configuration file
2 Hewlett-Packard Company − 2 − HP-UX 11i Version 3: September 2010