1ROOTD(1)                    General Commands Manual                   ROOTD(1)
2
3
4

NOTA BENE

6       The rootd daemon deprecated and will be removed in ROOT v6.16/00.
7
8       Please  contact  the  ROOT  team at http://root.cern.ch in the unlikely
9       event this change is disruptive for your workflow.
10

NAME

12       rootd - The ROOT file server daemon
13

SYNOPSIS

15       rootd [options]
16

DESCRIPTION

18       This manual page documents briefly the rootd program.
19
20       rootd is a ROOT remote file server daemon.
21
22       This small server is started either by inetd(8) (or xinetd(8))  when  a
23       client  requests  a connection to a  rootd server or by hand (i.e. from
24       the command line). The  rootd server works with the ROOT TNetFile, TFTP
25       and TNetSystem classes. It allows access to remote directories and ROOT
26       files in either read or write mode from any ROOT  interactive  session.
27       By default rootd listens on port 1094, assigned to it by IANA.
28

STARTING VIA (X)INETD

30       To  run  rootd via inetd(8) or xinetd(8) the port 1094 must be assigned
31       to rootd in /etc/services; the following line should be added,  if  not
32       present:
33
34              rootd     1094/tcp
35
36       If the system uses inetd, add the following line to /etc/inetd.conf:
37
38              rootd stream tcp nowait root <bindir>/rootd rootd -i
39
40       where <bindir> is the directory you have installed rootd in.
41
42       The inetd(8) daemon must re-read its configuration file to become aware
43       of the new service. This can be done either by killing  and  restarting
44       it manually
45
46              kill -HUP <pid inetd>
47
48       or, if SYSV init(8) scripts are used, by restarting it, e.g.
49
50              /etc/init.d/inetd restart
51
52
53       If  the  system  uses xinetd(8) instead, a file named 'rootd' should be
54       created under /etc/xinetd.d with content:
55
56              # default: off
57              # description: The rootd daemon
58              #
59              service rootd
60              {
61                   disable         = no
62                   flags           = REUSE
63                   socket_type     = stream
64                   wait            = no
65                   user            = root
66                   server          = <bindir>/rootd
67                   server_args     = -i
68              }
69
70       where, again, <bindir> is the directory you have installed rootd in.
71
72       The xinetd(8) daemon must be restarted:
73
74              /sbin/service xinetd restart
75
76       If you installed ROOT using some pre-compiled package  (for  example  a
77       Redhat  Linux  or a Debian GNU/Linux package), this may already be done
78       for you.
79
80       The above configuration examples start the daemon with superuser privi‐
81       leges. Please refer to the inetd(8) or xinetd(8) documentation for ways
82       of limiting the privileges.
83

STARTING BY HAND

85       You can also start rootd by hand running directly  under  your  private
86       account  (no root system privileges needed). For example to start rootd
87       listening on port 5151 just type:
88
89              rootd -p 5151
90
91       Notice: no & is needed rootd will go in background by itself.
92

ANONYMOUS LOGINS

94       rootd can also be configured for anonymous usage (like anonymous  ftp).
95       To setup rootd to accept anonymous logins do the following (while being
96       logged in as root):
97
98       1      Add the following line to /etc/passwd:
99
100                 rootd:*:71:72:Anonymous rootd:/var/spool/rootd:/bin/false
101
102              where you may modify the uid, gid (71, 72) and the  home  direc‐
103              tory to suite your system.
104
105       2      Add the following line to /etc/group:
106
107                 rootd:*:72:rootd
108
109              where the gid must match the gid in /etc/passwd
110
111       3
112               Create the directories:
113
114                 /var/spool/rootd
115                 mkdir /var/spool/rootd/tmp
116                 chmod 777 /var/spool/rootd/tmp
117
118              Where  /var/spool/rootd  must  match the rootd home directory as
119              specified in the rootd /etc/passwd entry.
120
121       4      To make writable directories for anonymous do, for example:
122
123                 mkdir /var/spool/rootd/pub
124                 chown rootd:rootd /var/spool/rootd/pub
125
126
127              That's all.
128
129       If you installed ROOT using some pre-compiled package  (for  example  a
130       Redhat  Linux  or a Debian GNU/Linux package), this may already be done
131       for you.
132
133       Several remarks:
134
135       *      You can login to an  anonymous  server  either  with  the  names
136              anonymous or rootd.
137
138       *      The  passwd  should  be  of  type user@host.domain Only the @ is
139              enforced for the time being.
140
141       *      In anonymous mode the top of the file tree is set to  the  rootd
142              home  directory,  therefore  only files below the home directory
143              can be accessed.
144
145       *      Anonymous mode  only  works  when  the  server  is  started  via
146              inetd(8) or xinetd(8).
147

ABOUT PASSWORD AUTHENTICATION

149       In  system using shadow passwords, full access to the password field of
150       the user information structure requires  special  privileges;  this  is
151       typically  granted if rootd is started by inetd(8) or xinetd(8), as the
152       in above examples. If the  daemon  is  started  in  unprivileged  mode,
153       either  from  a regular account or by (x)inetd with reduced privileges,
154       password-based  authentication  require  users   to   create   a   file
155       $HOME/.rootdpass containing an encrypted password (using crypt(3)). The
156       system tests the existence of this  file  before  checking  the  system
157       password  files.  An encrypted password can be created in the following
158       way:
159
160              perl -e '$pw = crypt("<secretpasswd>","salt"); print "$pw0'
161
162       storing the output string in $HOME/.rootdpass .
163
164       If the $HOME/.rootdpass does not exists and the  system  password  file
165       cannot  be  accessed,  rootd  attempts to run the authentication via an
166       sshd(8) daemon.
167

OPTIONS

169       -b <tcpwindowsize>
170              specifies   the   tcp   window   size   in   bytes   (e.g.   see
171              http://www.psc.edu/networking/perf_tune.html). Default is 65535.
172              Only change default for pipes with a high bandwidth*delay  prod‐
173              uct.
174
175       -d <level>
176              level of debug info written to syslogd 0 = no debug (default), 1
177              = minimum, 2 = medium, 3 = maximum.
178
179       -D <rootdaemonrc>
180              read  access  rules  from  file   <rootdaemonrc>.   By   default
181              <root_etc_dir>/system.rootdaemonrc is used for access rules; for
182              privately started daemons $HOME/.rootdaemonrc  (if  present)  is
183              read first.
184
185       -f     run  in the foreground (output on the window); useful for debug‐
186              ging purposes.
187
188       -i     indicates that rootd was started by inetd(8) or xinetd(8).
189
190       -noauth
191              do not require client authentication
192
193       -p <port#>[-<port2#>]
194              specifies the port number to listen on. Use port-port2  to  find
195              the  first  available  port  in the indicated range. Use 0-N for
196              range relative to default service port.
197
198       -r     files can only be opened in read-only mode
199
200       -s <sshd_port#>
201              specifies the port number for the sshd daemon used for authenti‐
202              cation (default is 22).
203
204       -T <tmpdir>
205              specifies  the  directory  path  to  be  used to place temporary
206              files; default is /usr/tmp. Useful  when  running  with  limited
207              privileges.
208
209       -w     do  not check /etc/hosts.equiv, $HOME/.rhosts for password-based
210              authentication; by default these  files  are  checked  first  by
211              calling  ruserok(...); if this option is specified a password is
212              always required.
213

SEE ALSO

215       root(1), proofd(1), system.rootdaemonrc(1)
216
217       For  more  information  on   the   ROOT   system,   please   refer   to
218       http://root.cern.ch
219

ORIGINAL AUTHORS

221       The ROOT team (see web page above):
222              Rene Brun and Fons Rademakers
223
225       This library is free software; you can redistribute it and/or modify it
226       under the terms of the GNU Lesser General Public License  as  published
227       by  the Free Software Foundation; either version 2.1 of the License, or
228       (at your option) any later version.
229
230       This library is distributed in the hope that it  will  be  useful,  but
231       WITHOUT  ANY  WARRANTY;  without  even  the  implied  warranty  of MER‐
232       CHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the  GNU  Lesser
233       General Public License for more details.
234
235       You  should  have  received  a  copy  of  the GNU Lesser General Public
236       License along with this library; if not, write  to  the  Free  Software
237       Foundation,  Inc.,  51 Franklin St, Fifth Floor, Boston, MA  02110-1301
238       USA
239

AUTHOR

241       This manual page was originally written by Christian  Holm  Christensen
242       <cholm@nbi.dk>, for the Debian GNU/Linux system and ROOT version 3.  It
243       has been modified by G. Ganis <g.ganis@cern.ch> to  document  new  fea‐
244       tures included in ROOT version 4.
245
246
247
248ROOT                               Version 4                          ROOTD(1)
Impressum