1NODE.PERMS(5)              Linux Programmer's Manual             NODE.PERMS(5)
2
3
4

NAME

6       node.perms - LinuxNode permissions file.
7

DESCRIPTION

9       Node.perms  file is read at program startup with the knowledge of users
10       username (call), connection type (AX.25, NET/ROM, ROSE, TCP/IP),  peers
11       IP  address  (for  TCP/IP)  and  port name (for AX.25). The first entry
12       matching this information is taken and user is asked for  password  and
13       given permissions according to it.
14
15       The lines within node.perms must either be a comment line, which starts
16       with a # in the first column, or a permission entry  in  the  following
17       format, each field being delimited by white space:
18
19              username type portname password permissions
20
21       The field descriptions are:
22
23
24       username      This  is  matched  against  users username (call) without
25                     SSID. An asterisk (*) matches any username.
26
27       type          This is matched against the type  of  the  connection  to
28                     user.  Possible values for this field are:
29
30                     *      matches any type of connection.
31
32                     ax25   matches users coming in with AX.25.
33
34                     netrom matches users coming in with NET/ROM.
35
36                     rose   matches users coming in with ROSE.
37
38                     local  matches  TCP/IP connections where users host is in
39                            "local" network as defined in node.conf(5).
40
41                     ampr   matches TCP/IP connections where users host is  in
42                            amprnet (44.0.0.0/8).
43
44                     inet   matches  TCP/IP  connections  where  users host is
45                            neither in "local" network nor in amprnet.
46
47                     host   matches users starting LinuxNode from shell.
48
49       portname      If user is coming in with AX.25  this  field  is  matched
50                     against the local port name the user is coming in via. An
51                     asterisk (*) matches any port name.
52
53       password      If the previous tree fields match and this field is not a
54                     single asterisk (*) the user is asked for a password. The
55                     password is then matched against this field.
56
57       permissions   This field represents a a bitmask of operations the  user
58                     is  permitted  to  do.  It  is a sum of the values listed
59                     here:
60
61                     1      permits logging in even if  no  other  permissions
62                            are given.
63
64                     2      permits outgoing AX.25 connects.
65
66                     4      permits outgoing NET/ROM connects.
67
68                     8      permits  telneting to hosts in the "local" network
69                            as defined in node.conf(5).
70
71                     16     permits telneting to hosts in amprnet.
72
73                     32     permits telneting to hosts neither in the  "local"
74                            network nor in amprnet.
75
76                     64     permits  using hidden ports in outgoing AX.25 con‐
77                            nections.     (See    HiddenPorts    command    in
78                            node.conf(5).)
79
80                     128    permits outgoing ROSE connects.
81
82                     256    The  no-escape flag. Disables the escape mechanism
83                            for this user.
84

FILES

86       /etc/ax25/node.perms
87

SEE ALSO

89       node(8), node.conf(5), axports(5), ax25(4).
90
91
92
93Linux                            16 June 1999                    NODE.PERMS(5)
Impressum