1ROOTD(1)                    General Commands Manual                   ROOTD(1)
2
3
4

NAME

6       rootd - The ROOT file server daemon
7

SYNOPSIS

9       rootd [options]
10

DESCRIPTION

12       This manual page documents briefly the rootd program.
13
14       rootd is a ROOT remote file server daemon.
15
16       This  small  server is started either by inetd(8) (or xinetd(8)) when a
17       client requests a connection to a  rootd server or by hand  (i.e.  from
18       the command line). The  rootd server works with the ROOT TNetFile, TFTP
19       and TNetSystem classes. It allows access to remote directories and ROOT
20       files  in  either read or write mode from any ROOT interactive session.
21       By default rootd listens on port 1094, assigned to it by IANA.
22

STARTING VIA (X)INETD

24       To run rootd via inetd(8) or xinetd(8) the port 1094 must  be  assigned
25       to  rootd  in /etc/services; the following line should be added, if not
26       present:
27
28              rootd     1094/tcp
29
30       If the system uses inetd, add the following line to /etc/inetd.conf:
31
32              rootd stream tcp nowait root <bindir>/rootd rootd -i
33
34       where <bindir> is the directory you have installed rootd in.
35
36       The inetd(8) daemon must re-read its configuration file to become aware
37       of  the  new service. This can be done either by killing and restarting
38       it manually
39
40              kill -HUP <pid inetd>
41
42       or, if SYSV init(8) scripts are used, by restarting it, e.g.
43
44              /etc/init.d/inetd restart
45
46
47       If the system uses xinetd(8) instead, a file named  'rootd'  should  be
48       created under /etc/xinetd.d with content:
49
50              # default: off
51              # description: The rootd daemon
52              #
53              service rootd
54              {
55                   disable         = no
56                   flags           = REUSE
57                   socket_type     = stream
58                   wait            = no
59                   user            = root
60                   server          = <bindir>/rootd
61                   server_args     = -i
62              }
63
64       where, again, <bindir> is the directory you have installed rootd in.
65
66       The xinetd(8) daemon must be restarted:
67
68              /sbin/service xinetd restart
69
70       If  you  installed  ROOT using some pre-compiled package (for example a
71       Redhat Linux or a Debian GNU/Linux package), this may already  be  done
72       for you.
73
74       The above configuration examples start the daemon with superuser privi‐
75       leges. Please refer to the inetd(8) or xinetd(8) documentation for ways
76       of limiting the privileges.
77

STARTING BY HAND

79       You  can  also  start rootd by hand running directly under your private
80       account (no root system privileges needed). For example to start  rootd
81       listening on port 5151 just type:
82
83              rootd -p 5151
84
85       Notice: no & is needed rootd will go in background by itself.
86

ANONYMOUS LOGINS

88       rootd  can also be configured for anonymous usage (like anonymous ftp).
89       To setup rootd to accept anonymous logins do the following (while being
90       logged in as root):
91
92       1      Add the following line to /etc/passwd:
93
94                 rootd:*:71:72:Anonymous rootd:/var/spool/rootd:/bin/false
95
96              where  you  may modify the uid, gid (71, 72) and the home direc‐
97              tory to suite your system.
98
99       2      Add the following line to /etc/group:
100
101                 rootd:*:72:rootd
102
103              where the gid must match the gid in /etc/passwd
104
105       3
106               Create the directories:
107
108                 /var/spool/rootd
109                 mkdir /var/spool/rootd/tmp
110                 chmod 777 /var/spool/rootd/tmp
111
112              Where /var/spool/rootd must match the rootd  home  directory  as
113              specified in the rootd /etc/passwd entry.
114
115       4      To make writable directories for anonymous do, for example:
116
117                 mkdir /var/spool/rootd/pub
118                 chown rootd:rootd /var/spool/rootd/pub
119
120
121              That's all.
122
123       If  you  installed  ROOT using some pre-compiled package (for example a
124       Redhat Linux or a Debian GNU/Linux package), this may already  be  done
125       for you.
126
127       Several remarks:
128
129       *      You  can  login  to  an  anonymous  server either with the names
130              anonymous or rootd.
131
132       *      The passwd should be of type  user@host.domain  Only  the  @  is
133              enforced for the time being.
134
135       *      In  anonymous  mode the top of the file tree is set to the rootd
136              home directory, therefore only files below  the  home  directory
137              can be accessed.
138
139       *      Anonymous  mode  only  works  when  the  server  is  started via
140              inetd(8) or xinetd(8).
141

ABOUT PASSWORD AUTHENTICATION

143       In system using shadow passwords, full access to the password field  of
144       the  user  information  structure  requires special privileges; this is
145       typically granted if rootd is started by inetd(8) or xinetd(8), as  the
146       in  above  examples.  If  the  daemon  is started in unprivileged mode,
147       either from a regular account or by (x)inetd with  reduced  privileges,
148       password-based   authentication   require   users   to  create  a  file
149       $HOME/.rootdpass containing an encrypted password (using crypt(3)). The
150       system  tests  the  existence  of  this file before checking the system
151       password files. An encrypted password can be created in  the  following
152       way:
153
154              perl -e '$pw = crypt("<secretpasswd>","salt"); print "$pw0'
155
156       storing the output string in $HOME/.rootdpass .
157
158       If  the  $HOME/.rootdpass  does not exists and the system password file
159       cannot be accessed, rootd attempts to run  the  authentication  via  an
160       sshd(8) daemon.
161

OPTIONS

163       -b <tcpwindowsize>
164              specifies   the   tcp   window   size   in   bytes   (e.g.   see
165              http://www.psc.edu/networking/perf_tune.html). Default is 65535.
166              Only  change default for pipes with a high bandwidth*delay prod‐
167              uct.
168
169       -d <level>
170              level of debug info written to syslogd 0 = no debug (default), 1
171              = minimum, 2 = medium, 3 = maximum.
172
173       -D <rootdaemonrc>
174              read   access   rules   from  file  <rootdaemonrc>.  By  default
175              <root_etc_dir>/system.rootdaemonrc is used for access rules; for
176              privately  started  daemons  $HOME/.rootdaemonrc (if present) is
177              read first.
178
179       -f     run in the foreground (output on the window); useful for  debug‐
180              ging purposes.
181
182       -i     indicates that rootd was started by inetd(8) or xinetd(8).
183
184       -noauth
185              do not require client authentication
186
187       -p <port#>[-<port2#>]
188              specifies  the  port number to listen on. Use port-port2 to find
189              the first available port in the indicated  range.  Use  0-N  for
190              range relative to default service port.
191
192       -r     files can only be opened in read-only mode
193
194       -s <sshd_port#>
195              specifies the port number for the sshd daemon used for authenti‐
196              cation (default is 22).
197
198       -T <tmpdir>
199              specifies the directory path  to  be  used  to  place  temporary
200              files;  default  is  /usr/tmp.  Useful when running with limited
201              privileges.
202
203       -w     do not check /etc/hosts.equiv, $HOME/.rhosts for  password-based
204              authentication;  by  default  these  files  are checked first by
205              calling ruserok(...); if this option is specified a password  is
206              always required.
207

SEE ALSO

209       root(1), proofd(1), system.rootdaemonrc(1)
210
211       For   more   information   on   the   ROOT   system,  please  refer  to
212       http://root.cern.ch
213

ORIGINAL AUTHORS

215       The ROOT team (see web page above):
216              Rene Brun and Fons Rademakers
217
219       This library is free software; you can redistribute it and/or modify it
220       under  the  terms of the GNU Lesser General Public License as published
221       by the Free Software Foundation; either version 2.1 of the License,  or
222       (at your option) any later version.
223
224       This  library  is  distributed  in the hope that it will be useful, but
225       WITHOUT ANY  WARRANTY;  without  even  the  implied  warranty  of  MER‐
226       CHANTABILITY  or  FITNESS FOR A PARTICULAR PURPOSE.  See the GNU Lesser
227       General Public License for more details.
228
229       You should have received a  copy  of  the  GNU  Lesser  General  Public
230       License  along  with  this  library; if not, write to the Free Software
231       Foundation, Inc., 51 Franklin St, Fifth Floor, Boston,  MA   02110-1301
232       USA
233

AUTHOR

235       This  manual  page was originally written by Christian Holm Christensen
236       <cholm@nbi.dk>, for the Debian GNU/Linux system and ROOT version 3.  It
237       has  been  modified  by G. Ganis <g.ganis@cern.ch> to document new fea‐
238       tures included in ROOT version 4.
239
240
241
242ROOT                               Version 4                          ROOTD(1)
Impressum