1ROOTD(1) General Commands Manual ROOTD(1)
2
3
4
6 The rootd daemon deprecated and will be removed in ROOT v6.16/00.
7
8 Please contact the ROOT team at http://root.cern.ch in the unlikely
9 event this change is disruptive for your workflow.
10
12 rootd - The ROOT file server daemon
13
15 rootd [options]
16
18 This manual page documents briefly the rootd program.
19
20 rootd is a ROOT remote file server daemon.
21
22 This small server is started either by inetd(8) (or xinetd(8)) when a
23 client requests a connection to a rootd server or by hand (i.e. from
24 the command line). The rootd server works with the ROOT TNetFile, TFTP
25 and TNetSystem classes. It allows access to remote directories and ROOT
26 files in either read or write mode from any ROOT interactive session.
27 By default rootd listens on port 1094, assigned to it by IANA.
28
30 To run rootd via inetd(8) or xinetd(8) the port 1094 must be assigned
31 to rootd in /etc/services; the following line should be added, if not
32 present:
33
34 rootd 1094/tcp
35
36 If the system uses inetd, add the following line to /etc/inetd.conf:
37
38 rootd stream tcp nowait root <bindir>/rootd rootd -i
39
40 where <bindir> is the directory you have installed rootd in.
41
42 The inetd(8) daemon must re-read its configuration file to become aware
43 of the new service. This can be done either by killing and restarting
44 it manually
45
46 kill -HUP <pid inetd>
47
48 or, if SYSV [22minit(8) scripts are used, by restarting it, e.g.
49
50 /etc/init.d/inetd restart
51
52
53 If the system uses xinetd(8) instead, a file named 'rootd' should be
54 created under /etc/xinetd.d with content:
55
56 # default: off
57 # description: The rootd daemon
58 #
59 service rootd
60 {
61 disable = no
62 flags = REUSE
63 socket_type = stream
64 wait = no
65 user = root
66 server = <bindir>/rootd
67 server_args = -i
68 }
69
70 where, again, <bindir> is the directory you have installed rootd in.
71
72 The xinetd(8) daemon must be restarted:
73
74 /sbin/service xinetd restart
75
76 If you installed ROOT using some pre-compiled package (for example a
77 Redhat Linux or a Debian GNU/Linux package), this may already be done
78 for you.
79
80 The above configuration examples start the daemon with superuser privi‐
81 leges. Please refer to the inetd(8) or xinetd(8) documentation for ways
82 of limiting the privileges.
83
85 You can also start rootd by hand running directly under your private
86 account (no root system privileges needed). For example to start rootd
87 listening on port 5151 just type:
88
89 rootd -p 5151
90
91 Notice: no & is needed rootd will go in background by itself.
92
94 rootd can also be configured for anonymous usage (like anonymous ftp).
95 To setup rootd to accept anonymous logins do the following (while being
96 logged in as root):
97
98 1 Add the following line to /etc/passwd:
99
100 rootd:*:71:72:Anonymous rootd:/var/spool/rootd:/bin/false
101
102 where you may modify the uid, gid (71, 72) and the home direc‐
103 tory to suite your system.
104
105 2 Add the following line to /etc/group:
106
107 rootd:*:72:rootd
108
109 where the gid must match the gid in /etc/passwd
110
111 3
112 Create the directories:
113
114 /var/spool/rootd
115 mkdir /var/spool/rootd/tmp
116 chmod 777 /var/spool/rootd/tmp
117
118 Where /var/spool/rootd must match the rootd home directory as
119 specified in the rootd /etc/passwd entry.
120
121 4 To make writable directories for anonymous do, for example:
122
123 mkdir /var/spool/rootd/pub
124 chown rootd:rootd /var/spool/rootd/pub
125
126
127 That's all.
128
129 If you installed ROOT using some pre-compiled package (for example a
130 Redhat Linux or a Debian GNU/Linux package), this may already be done
131 for you.
132
133 Several remarks:
134
135 * You can login to an anonymous server either with the names
136 anonymous or rootd.
137
138 * The passwd should be of type user@host.domain Only the @ is
139 enforced for the time being.
140
141 * In anonymous mode the top of the file tree is set to the rootd
142 home directory, therefore only files below the home directory
143 can be accessed.
144
145 * Anonymous mode only works when the server is started via
146 inetd(8) or xinetd(8).
147
149 In system using shadow passwords, full access to the password field of
150 the user information structure requires special privileges; this is
151 typically granted if rootd is started by inetd(8) or xinetd(8), as the
152 in above examples. If the daemon is started in unprivileged mode,
153 either from a regular account or by (x)inetd with reduced privileges,
154 password-based authentication require users to create a file
155 $HOME/.rootdpass containing an encrypted password (using crypt(3)). The
156 system tests the existence of this file before checking the system
157 password files. An encrypted password can be created in the following
158 way:
159
160 perl -e '$pw = crypt("<secretpasswd>","salt"); print "$pw0'
161
162 storing the output string in $HOME/.rootdpass .
163
164 If the $HOME/.rootdpass does not exists and the system password file
165 cannot be accessed, rootd attempts to run the authentication via an
166 sshd(8) daemon.
167
169 -b <tcpwindowsize>
170 specifies the tcp window size in bytes (e.g. see
171 http://www.psc.edu/networking/perf_tune.html). Default is 65535.
172 Only change default for pipes with a high bandwidth*delay prod‐
173 uct.
174
175 -d <level>
176 level of debug info written to syslogd 0 = no debug (default), 1
177 = minimum, 2 = medium, 3 = maximum.
178
179 -D <rootdaemonrc>
180 read access rules from file <rootdaemonrc>. By default
181 <root_etc_dir>/system.rootdaemonrc is used for access rules; for
182 privately started daemons $HOME/.rootdaemonrc (if present) is
183 read first.
184
185 -f run in the foreground (output on the window); useful for debug‐
186 ging purposes.
187
188 -i indicates that rootd was started by inetd(8) or xinetd(8).
189
190 -noauth
191 do not require client authentication
192
193 -p <port#>[-<port2#>]
194 specifies the port number to listen on. Use port-port2 to find
195 the first available port in the indicated range. Use 0-N for
196 range relative to default service port.
197
198 -r files can only be opened in read-only mode
199
200 -s <sshd_port#>
201 specifies the port number for the sshd daemon used for authenti‐
202 cation (default is 22).
203
204 -T <tmpdir>
205 specifies the directory path to be used to place temporary
206 files; default is /usr/tmp. Useful when running with limited
207 privileges.
208
209 -w do not check /etc/hosts.equiv, $HOME/.rhosts for password-based
210 authentication; by default these files are checked first by
211 calling ruserok(...); if this option is specified a password is
212 always required.
213
215 root(1), proofd(1), system.rootdaemonrc(1)
216
217 For more information on the ROOT system, please refer to
218 http://root.cern.ch
219
221 The ROOT team (see web page above):
222 Rene Brun and Fons Rademakers
223
225 This library is free software; you can redistribute it and/or modify it
226 under the terms of the GNU Lesser General Public License as published
227 by the Free Software Foundation; either version 2.1 of the License, or
228 (at your option) any later version.
229
230 This library is distributed in the hope that it will be useful, but
231 WITHOUT ANY WARRANTY; without even the implied warranty of MER‐
232 CHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser
233 General Public License for more details.
234
235 You should have received a copy of the GNU Lesser General Public
236 License along with this library; if not, write to the Free Software
237 Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301
238 USA
239
241 This manual page was originally written by Christian Holm Christensen
242 <cholm@nbi.dk>, for the Debian GNU/Linux system and ROOT version 3. It
243 has been modified by G. Ganis <g.ganis@cern.ch> to document new fea‐
244 tures included in ROOT version 4.
245
246
247
248ROOT Version 4 ROOTD(1)