1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151
|
$Id: INSTALL,v 1.4 2000/01/01 02:11:33 odin Exp $
INSTALL file for oidentd version 1.6.4
-------------------
INSTALLING OIDENTD
-------------------
Issuing the commands "./configure", then "make", then "make install" will
(respectively) configure, compile and install the oidentd daemon and its
manual page. By default, the daemon is installed to /usr/local/sbin/oidentd,
and the uncompressed manual page is installed to /usr/local/man/man8.
A number of compile time values can be manipulated via the configure
script. For a summary, put "./configure --help".
After oidentd has been installed, an entry for it must be added in the
/etc/inetd.conf file, if you are running inetd. A generic example for
Linux is:
auth stream tcp nowait nobody /usr/local/sbin/oidentd oidentd -i
If you prefer not to use inetd, oidentd can be run as a stand-alone
daemon. For more information and complete a description of all options,
refer to the manual page.
Oidentd does not require superuser privileges and should not be run as
root. On OpenBSD 2.3 and earlier, and on FreeBSD, oidentd should be run
with group kmem. An example inetd line is:
auth stream tcp wait nobody:kmem /usr/local/sbin/oidentd oidentd -wi
----------------
IP-MASQUERADING
----------------
If you are using IP masquerading, oidentd can optionally return a
username for all masqueraded connections from other machines. Support for
this is specified by calling oidentd with the -m flag and by creating an
/etc/oidentd.users file. This file must be readable by the oidentd daemon
user and has the following format:
IP-ADDRESS[/<mask>] USER-NAME SYSTEM-TYPE
Example:
192.168.1.1 someone UNIX
192.168.1.2 noone WINDOWS
192.168.1.1/32 user1 UNIX
192.168.1.0/24 user3 UNIX
192.168.0.0/16 user4 UNIX
somehost user5 UNIX
10.0.0.0/8 user6 UNIX
192.168.1.0/255.255.255.0 user7 UNIX
(You get the point)
As of version 1.4 (1.6.0, successfully!), oidentd can forward requests
for an IP masqueraded connection to the machine from which connection
originates by way of the -f option. This will only work if the host to
which the connection is forwarded is running oidentd (with -P <proxy>)
or if the host's ident daemon will return a valid reply regardless of the
input supplied by and address of the host requesting the info (some ident
daemons for windows do this, maybe others).
You cannot run oidentd with the -P option on an OpenBSD host. As far as I
can tell, kernel modifications would be required to make it work.
---------------
IDENT SPOOFING
---------------
Oidentd can optionally return an ident other than the default (your
username or UID, depending on how oidentd is run). To enable identd
spoofing, observe the following procedure:
1. Add -s or -S to the flags with which oidentd is called. Consult the
manual page for a description of these options.
2. If the file /etc/identd.spoof does not exist, create it and
give the user as which oidentd runs read permission for it.
- In order for local users to spoof identd replies, their usernames must
be contained in the /etc/identd.spoof file. If oidentd was called with
-S instead of -s, their usernames must *not* be contained in this file
if they are to be able to spoof identd replies; with -S all users
except those users listed in /etc/identd.spoof may spoof identd
replies.
- The format of the /etc/identd.spoof file is one
entry per line. Lines beginning with '#' are considered
comments. An entry has the form user[:identd reply]. The
the "ident reply parameter is optional. For example:
user
#user2
nobody:UNKNOWN
3. When ident spoofing is enabled, oidentd first checks the /etc/identd.spoof
file to ensure the user owning the connection has permission to spoof
identd replies. If the username is found in the /etc/identd.spoof file,
if an identd reply is specified in that file, this reply is returned
immediately. If no reply is specified, oidentd looks for the string it
should return in an .ispoof file, which must be located in the home
directory of users. This file should only contain the reply that oidentd
will return upon a successful request for the user. The .ispoof file
must be owned by the user for which the request is made. Be sure this
file is readable by the daemon user (ie, be sure the user as which oidentd
runs has at least search permission for the home directory and read
permission for .ispoof). For example:
$ id
uid=500(user) gid=100(users)
$ echo response > ~/.ispoof && chmod o+x ~ && chmod o+r ~/.ispoof
------------------------------
OPTIONS (output of oidentd -h)
------------------------------
Usage: oidentd [options]
-a <address> Bind to <address>. (Defaults to INADDR_ANY)
-A When spoofing is enabled, enable users to spoof
ident on connections to privileged ports.
-c <charset> Specify an alternate charset. (Defaults to "US-ASCII")
-d Enable debugging.
-e Return "UNKNOWN-ERROR" for all errors.
-f <port> Forward requests for masqueraded hosts to the host on <port>
-F Same as -f, but always use the default port (113) by default
-g <gid> Run with specified gid.
-i Run from inetd.
-m Enable support for IP masquerading.
-n Return UIDs instead of usernames
-N Allow identd hiding via ".noident"
-o Return "OTHER" instead of the operating system.
-p <port> Listen for connections on specified port. (Defaults to auth)
-q Suppress normal logging.
-P <host> host acts as a proxy, forwarding connections to us.
-r Randomize identd replies.
Note: The -n and -r options are incompatible.
-s Allow identd spoofing.
-S Same as -s but allow all users but those listed in
/etc/identd.spoof to spoof replies.
-t <seconds> Wait for <seconds> before closing connection. (Defaults to 15)
-T <seconds> oidentd will remain accepting connections when run
with -w for <seconds>.
-u <uid> Run with specified uid.
-v/-V Display version information and exit.
-w Wait mode.
-x <string> If a query fails, pretend it succeeded, returning <string>
-W oidentd is wrapped. (tcp wrappers)
-h This help message.
|