1in.uucpd(1M) System Administration Commands in.uucpd(1M)
2
3
4
6 in.uucpd, uucpd - UUCP server
7
9 /usr/sbin/in.uucpd [-n]
10
11
13 in.uucpd is the server for supporting UUCP connections over networks.
14
15
16 in.uucpd is invoked by inetd(1M) when a UUCP connection is established,
17 that is, a connection to the port indicated in the "uucp" service spec‐
18 ification, and executes the following protocol. See services(4):
19
20 1. The server prompts with login:. The uucico(1M) process at
21 the other end must supply a username.
22
23 2. Unless the username refers to an account without a password,
24 the server then prompts with Password:. The uucico process
25 at the other end must supply the password for that account.
26
27
28 If the username is not valid, or is valid but refers to an account that
29 does not have /usr/lib/uucp/uucico as its login shell, or if the pass‐
30 word is not the correct password for that account, the connection is
31 dropped. Otherwise, uucico is run, with the user ID, group ID, group
32 set, and home directory for that account, with the environment vari‐
33 ables USER and LOGNAME set to the specified username, and with a -u
34 flag specifying the username. Unless the -n flag is specified, entries
35 are made in /var/adm/utmpx, /var/adm/wtmpx, and /var/adm/lastlog for
36 the username. in.uucpd must be invoked by a user with appropriate priv‐
37 ilege (usually root) in order to be able to verify that the password is
38 correct.
39
41 in.uucpd uses pam(3PAM) for authentication, account management, and
42 session management. The PAM configuration policy, listed through
43 /etc/pam.conf, specifies the modules to be used for in.uucpd. Here is a
44 partial pam.conf file with entries for uucp using the UNIX authentica‐
45 tion, account management, and session management module.
46
47 uucp auth requisite pam_authtok_get.so.1
48 uucp auth required pam_dhkeys.so.1
49 uucp auth required pam_unix_auth.so.1
50
51 uucp account requisite pam_roles.so.1
52 uucp account required pam_projects.so.1
53 uucp account required pam_unix_account.so.1
54
55 uucp session required pam_unix_session.so.1
56
57
58
59 If there are no entries for the uucp service, then the entries for the
60 "other" service will be used. If multiple authentication modules are
61 listed, then the peer may be prompted for multiple passwords.
62
64 /var/adm/utmpx accounting
65
66
67 /var/adm/wtmpx accounting
68
69
70 /var/adm/lastlog time of last login
71
72
74 See attributes(5) for descriptions of the following attributes:
75
76
77
78
79 ┌─────────────────────────────┬─────────────────────────────┐
80 │ ATTRIBUTE TYPE │ ATTRIBUTE VALUE │
81 ├─────────────────────────────┼─────────────────────────────┤
82 │Availability │SUNWbnuu │
83 └─────────────────────────────┴─────────────────────────────┘
84
86 svcs(1), inetadm(1M), inetd(1M), svcadm(1M), uucico(1M), pam(3PAM),
87 pam.conf(4), services(4), attributes(5), pam_authtok_check(5),
88 pam_authtok_get(5), pam_authtok_store(5), pam_dhkeys(5),
89 pam_passwd_auth(5), pam_unix_account(5), pam_unix_auth(5),
90 pam_unix_session(5), smf(5)
91
93 All diagnostic messages are returned on the connection, after which the
94 connection is closed.
95
96 user read An error occurred while reading the username.
97
98
99 passwd read An error occurred while reading the password.
100
101
102 Login incorrect. The username is invalid or refers to an account
103 with a login shell other than /usr/lib/uucp/uucico,
104 or the password is not the correct password for the
105 account.
106
107
109 The in.uucpd service is managed by the service management facility,
110 smf(5), under the service identifier:
111
112 svc:/network/uucp
113
114
115
116
117 Administrative actions on this service, such as enabling, disabling, or
118 requesting restart, can be performed using svcadm(1M). Responsibility
119 for initiating and restarting this service is delegated to inetd(1M).
120 Use inetadm(1M) to make configuration changes and to view configuration
121 information for this service. The service's status can be queried using
122 the svcs(1) command.
123
124
125 The pam_unix(5) module is no longer supported. Similar functionality is
126 provided by pam_authtok_check(5), pam_authtok_get(5), pam_auth‐
127 tok_store(5), pam_dhkeys(5), pam_passwd_auth(5), pam_unix_account(5),
128 pam_unix_auth(5), and pam_unix_session(5).
129
130
131
132SunOS 5.11 12 Aug 2004 in.uucpd(1M)