1oidentd.conf(5) File Formats Manual oidentd.conf(5)
2
3
4
6 oidentd.conf - The oidentd configuration file.
7
8
10 The oidentd configuration file is used to specify the amount of control
11 users have over the responses oidentd returns upon successful lookups
12 for connections owned by them.
13
14 The $HOME/.oidentd.conf file allows a user to specify what ident
15 response will be returned for specific connections.
16
18 USER DIRECTIVE
19 The oidentd.conf file consists of 0 or more user directives. The
20 user directive is used to grant capabilities on a per-user
21 basis.
22
23 The user directive has the following syntax:
24
25 default {
26 <range directive>
27 }
28
29 OR
30
31 user <username> {
32 <range directive>
33 }
34
35 The default directive matches all users for whom rules are not
36 defined. There should only be one default directive, and it
37 should be the first statement in the file. All entries for users
38 defined after the default definition will inherit the capabili‐
39 ties of the default user. Capabilities can then be allowed,
40 denied, or forced on a per-user basis by way of the user state‐
41 ment followed by the username of the user to whom the properties
42 that follow will apply.
43
44 RANGE DIRECTIVE
45 The body of a user directive consists of 1 or more range direc‐
46 tives.
47
48 The range directive is used to specify a host/port range for
49 which a set of capabilities is binding. A range directive con‐
50 sists of 1 or more statements of the following form:
51
52 default {
53 <capability directive>
54 }
55
56 OR
57
58 to <host> lport <lport> from <host> fport <fport> {
59 <capability directive>
60 }
61
62 The default directive matches all host/port pairs for which
63 rules are not defined. There should only be one default direc‐
64 tive, and it should be the first statement in the block.
65
66 Anywhere from 1 to all 4 of the to, lport, from, and fport
67 parameters may be specified.
68
69 The to parameter is used to specify the address to which a con‐
70 nection is made.
71
72 The from parameter is used to specify the address from which a
73 connection originates. It may be useful to specify this address
74 when a system has more than 1 IP address.
75
76 The to and from parameters take either an IP address or a host‐
77 name argument.
78
79 The lport parameter is used to specify the local port from which
80 a connection originates.
81
82 The fport parameter is used to specify the destination port of a
83 connection.
84
85 The lport and fport parameters take either a port or a port
86 range. Ports can be specified numerically (e.g. 113) or by giv‐
87 ing a service name (e.g. "auth"). Ranges of ports take the form
88 <starting port>:<ending port>. The ending port is optional. If
89 the ending port is omitted, the range is taken to be any port
90 greater than or equal to the starting port.
91
92 The omission of any of the to, lport, from and fport parameters
93 acts like a wildcard for that parameter. For example, the state‐
94 ment "from localhost" matches all connections from localhost on
95 any port to any host on any port.
96
97 CAPABILITY DIRECTIVE
98 The body of a range directive consists of one or more capability
99 directives.
100
101 Capabilities are used to assign or deny privileges to specific
102 users. Valid capabilities inside user directives are allow,
103 deny, andforce.
104
105 The capability directive consists of one or more statements of
106 the form:
107
108 allow OR deny OR force <capability>.
109
110 The capability argument must be one of the capabilities
111 described in the capability section below.
112
113 The force action takes a third argument when the capability is
114 reply. For example, force reply "randomuser".
115
117 A user's .oidentd.conf configuration file may contain 0 or more of the
118 following statements:
119
120 global {
121 <capability>
122 }
123
124 OR
125
126 <range directive> {
127 <capability>
128 }
129
130 The global directive acts as a wildcard, matching all connections, so
131 if used at all, the global directive should be the first entry in the
132 file and should be used only once. Use is permitted anywhere in the
133 file and infinitely many times, however it doesn't make much sense to
134 use it in this manner.
135
136 The range directive has the same syntax and semantics as the range
137 directive in the /etc/oidentd.conf file. See above for a description.
138
139 Valid capabilities are reply, random, numeric, random_numeric, and
140 hide. Descriptions can be found below.
141
143 spoof Allow spoofed ident responses; allow the user to specify a
144 string of her choosing as the ident reply. The only restriction
145 on the spoofed response is that it must not be the username of
146 another user. When a user spoofs her ident reply, the login name
147 of the user is recorded along with the forged reply.
148 This capability does not apply to the force action.
149
150 spoof_all
151 Allow the usernames of other users to be used as ident
152 responses.
153 This capability does not apply to the force action.
154
155 spoof_privport
156 Allow ident replies to be spoofed on privileged ports (ports
157 lower than 1024).
158 This capability does not apply to the force action.
159
160 reply <string> [<string1> ... <stringN>]
161 Reply to successful ident lookups with the ident response speci‐
162 fied in <string>. If more than one string parameter is given,
163 one of the strings will be selected randomly.
164
165 In a user's $HOME/.oidentd.conf file, up to 20 strings may be
166 specified for a reply statement.
167
168 In the /etc/oidentd.conf file, there is no limitation on the
169 number of strings that may be specified.
170
171 The strings must be quoted strings (e.g. "string"). Strings may
172 contain the following escape characters:
173
174 \n new line
175 \t tab
176 \r carriage return
177 \b backspace
178 \v vertical tab
179 \f form feed
180 \a alert (bell)
181 \e escape
182 \\ backslash
183 \NNN The character with the ASCII code NNN in the octal base
184 system.
185 \xNNN The character with the ASCII code NNN in the hexadecimal
186 base system.
187 This capability only applies to the force action.
188
189 hide Hide the user; report a "HIDDEN-USER" error when an ident lookup
190 succeeds.
191
192 random Reply to successful ident lookups with a randomly generated
193 ident response of consisting of alphanumeric characters.
194
195 numeric
196 Reply to successful ident lookups with the UID of the user that
197 was looked up.
198
199 random_numeric
200 Reply to successful with a randomly generated ident response of
201 the form userN, where N is a random number between 0 and 100000.
202
204 default {
205 default {
206 deny spoof
207 deny spoof_all
208 deny spoof_privport
209 allow random_numeric
210 allow numeric
211 allow hide
212 }
213 }
214
215 Grant all users the ability to generate random numeric ident replies,
216 the ability to generate numeric ident replies and the ability to hide
217 their identities on all ident queries. Explicitly deny the ability to
218 spoof ident responses.
219
220 user root {
221 default {
222 force reply "UNKNOWN"
223 }
224 }
225
226 Reply with "UNKNOWN" for all successful ident queries for root.
227
228 user ryan {
229 default {
230 allow spoof
231 allow spoof_all
232 allow random
233 allow hide
234 }
235
236 from 127.0.0.1 {
237 allow spoof_privport
238 }
239 }
240
241 Grant the user "ryan" the capability to spoof ident replies, including
242 the ability to use other usernames as ident replies, generate random
243 replies and hide his ident for all connections, and grant the user
244 "ryan" the capability to spoof ident replies to privileged ports (<
245 1024) on connections originating from the host 127.0.0.1.
246
248 global {
249 reply "unknown"
250 }
251
252 Reply with "unknown" to all successful ident lookups.
253
254 to irc.example.org {
255 reply "example"
256 }
257
258 Reply with "example" to ident lookups for connections to irc.exam‐
259 ple.org.
260
261
263 Ryan McCabe <ryan@numb.org>
264 http://dev.ojnk.net
265
266
268 oidentd(8) oidentd_masq.conf(5)
269
270
271
272version 2.0.8 13 Jul 2003 oidentd.conf(5)