1ROOTD(1) General Commands Manual ROOTD(1)
2
3
4
6 rootd - The ROOT file server daemon
7
9 rootd [options]
10
12 This manual page documents briefly the rootd program.
13
14 rootd is a ROOT remote file server daemon.
15
16 This small server is started either by inetd(8) (or xinetd(8)) when a
17 client requests a connection to a rootd server or by hand (i.e. from
18 the command line). The rootd server works with the ROOT TNetFile, TFTP
19 and TNetSystem classes. It allows access to remote directories and ROOT
20 files in either read or write mode from any ROOT interactive session.
21 By default rootd listens on port 1094, assigned to it by IANA.
22
24 To run rootd via inetd(8) or xinetd(8) the port 1094 must be assigned
25 to rootd in /etc/services; the following line should be added, if not
26 present:
27
28 rootd 1094/tcp
29
30 If the system uses inetd, add the following line to /etc/inetd.conf:
31
32 rootd stream tcp nowait root <bindir>/rootd rootd -i
33
34 where <bindir> is the directory you have installed rootd in.
35
36 The inetd(8) daemon must re-read its configuration file to become aware
37 of the new service. This can be done either by killing and restarting
38 it manually
39
40 kill -HUP <pid inetd>
41
42 or, if SYSV [22minit(8) scripts are used, by restarting it, e.g.
43
44 /etc/init.d/inetd restart
45
46
47 If the system uses xinetd(8) instead, a file named 'rootd' should be
48 created under /etc/xinetd.d with content:
49
50 # default: off
51 # description: The rootd daemon
52 #
53 service rootd
54 {
55 disable = no
56 flags = REUSE
57 socket_type = stream
58 wait = no
59 user = root
60 server = <bindir>/rootd
61 server_args = -i
62 }
63
64 where, again, <bindir> is the directory you have installed rootd in.
65
66 The xinetd(8) daemon must be restarted:
67
68 /sbin/service xinetd restart
69
70 If you installed ROOT using some pre-compiled package (for example a
71 Redhat Linux or a Debian GNU/Linux package), this may already be done
72 for you.
73
74 The above configuration examples start the daemon with superuser privi‐
75 leges. Please refer to the inetd(8) or xinetd(8) documentation for ways
76 of limiting the privileges.
77
79 You can also start rootd by hand running directly under your private
80 account (no root system privileges needed). For example to start rootd
81 listening on port 5151 just type:
82
83 rootd -p 5151
84
85 Notice: no & is needed rootd will go in background by itself.
86
88 rootd can also be configured for anonymous usage (like anonymous ftp).
89 To setup rootd to accept anonymous logins do the following (while being
90 logged in as root):
91
92 1 Add the following line to /etc/passwd:
93
94 rootd:*:71:72:Anonymous rootd:/var/spool/rootd:/bin/false
95
96 where you may modify the uid, gid (71, 72) and the home direc‐
97 tory to suite your system.
98
99 2 Add the following line to /etc/group:
100
101 rootd:*:72:rootd
102
103 where the gid must match the gid in /etc/passwd
104
105 3
106 Create the directories:
107
108 /var/spool/rootd
109 mkdir /var/spool/rootd/tmp
110 chmod 777 /var/spool/rootd/tmp
111
112 Where /var/spool/rootd must match the rootd home directory as
113 specified in the rootd /etc/passwd entry.
114
115 4 To make writable directories for anonymous do, for example:
116
117 mkdir /var/spool/rootd/pub
118 chown rootd:rootd /var/spool/rootd/pub
119
120
121 That's all.
122
123 If you installed ROOT using some pre-compiled package (for example a
124 Redhat Linux or a Debian GNU/Linux package), this may already be done
125 for you.
126
127 Several remarks:
128
129 * You can login to an anonymous server either with the names
130 anonymous or rootd.
131
132 * The passwd should be of type user@host.domain Only the @ is
133 enforced for the time being.
134
135 * In anonymous mode the top of the file tree is set to the rootd
136 home directory, therefore only files below the home directory
137 can be accessed.
138
139 * Anonymous mode only works when the server is started via
140 inetd(8) or xinetd(8).
141
143 In system using shadow passwords, full access to the password field of
144 the user information structure requires special privileges; this is
145 typically granted if rootd is started by inetd(8) or xinetd(8), as the
146 in above examples. If the daemon is started in unprivileged mode,
147 either from a regular account or by (x)inetd with reduced privileges,
148 password-based authentication require users to create a file
149 $HOME/.rootdpass containing an encrypted password (using crypt(3)). The
150 system tests the existence of this file before checking the system
151 password files. An encrypted password can be created in the following
152 way:
153
154 perl -e '$pw = crypt("<secretpasswd>","salt"); print "$pw0'
155
156 storing the output string in $HOME/.rootdpass .
157
158 If the $HOME/.rootdpass does not exists and the system password file
159 cannot be accessed, rootd attempts to run the authentication via an
160 sshd(8) daemon.
161
163 -b <tcpwindowsize>
164 specifies the tcp window size in bytes (e.g. see
165 http://www.psc.edu/networking/perf_tune.html). Default is 65535.
166 Only change default for pipes with a high bandwidth*delay prod‐
167 uct.
168
169 -d <level>
170 level of debug info written to syslogd 0 = no debug (default), 1
171 = minimum, 2 = medium, 3 = maximum.
172
173 -D <rootdaemonrc>
174 read access rules from file <rootdaemonrc>. By default
175 <root_etc_dir>/system.rootdaemonrc is used for access rules; for
176 privately started daemons $HOME/.rootdaemonrc (if present) is
177 read first.
178
179 -f run in the foreground (output on the window); useful for debug‐
180 ging purposes.
181
182 -i indicates that rootd was started by inetd(8) or xinetd(8).
183
184 -noauth
185 do not require client authentication
186
187 -p <port#>[-<port2#>]
188 specifies the port number to listen on. Use port-port2 to find
189 the first available port in the indicated range. Use 0-N for
190 range relative to default service port.
191
192 -r files can only be opened in read-only mode
193
194 -s <sshd_port#>
195 specifies the port number for the sshd daemon used for authenti‐
196 cation (default is 22).
197
198 -T <tmpdir>
199 specifies the directory path to be used to place temporary
200 files; default is /usr/tmp. Useful when running with limited
201 privileges.
202
203 -w do not check /etc/hosts.equiv, $HOME/.rhosts for password-based
204 authentication; by default these files are checked first by
205 calling ruserok(...); if this option is specified a password is
206 always required.
207
209 root(1), proofd(1), system.rootdaemonrc(1)
210
211 For more information on the ROOT system, please refer to
212 http://root.cern.ch
213
215 The ROOT team (see web page above):
216 Rene Brun and Fons Rademakers
217
219 This library is free software; you can redistribute it and/or modify it
220 under the terms of the GNU Lesser General Public License as published
221 by the Free Software Foundation; either version 2.1 of the License, or
222 (at your option) any later version.
223
224 This library is distributed in the hope that it will be useful, but
225 WITHOUT ANY WARRANTY; without even the implied warranty of MER‐
226 CHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser
227 General Public License for more details.
228
229 You should have received a copy of the GNU Lesser General Public
230 License along with this library; if not, write to the Free Software
231 Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301
232 USA
233
235 This manual page was originally written by Christian Holm Christensen
236 <cholm@nbi.dk>, for the Debian GNU/Linux system and ROOT version 3. It
237 has been modified by G. Ganis <g.ganis@cern.ch> to document new fea‐
238 tures included in ROOT version 4.
239
240
241
242ROOT Version 4 ROOTD(1)