in.uucpd(1M)




NAME

     in.uucpd, uucpd - UUCP server


SYNOPSIS

     /usr/sbin/in.uucpd [-n]


DESCRIPTION

     in.uucpd is the server for supporting UUCP connections  over
     networks.

     in.uucpd is invoked by inetd(1M) when a UUCP  connection  is
     established  (that is, a connection to the port indicated in
     the "uucp" service specification)  and executes the  follow-
     ing protocol. See services(4):

     1. The server prompts with login:. The uucico(1M) process at
        the other end must supply a username.

     2. Unless the username refers to an account without a  pass-
        word,  the server then prompts with Password:. The uucico
        process at the other end must  supply  the  password  for
        that account.

     If the username is not valid, or is valid but refers  to  an
     account that does not have /usr/lib/uucp/uucico as its login
     shell, or if the password is not the  correct  password  for
     that  account, the connection is dropped.  Otherwise, uucico
     is run, with the user ID, group  ID,  group  set,  and  home
     directory  for  that account, with the environment variables
     USER and  LOGNAME set to the specified username, and with  a
     -u  flag  specifying  the  username.  Unless  the -n flag is
     specified,   entries    are    made    in    /var/adm/utmpx,
     /var/adm/wtmpx,   and  /var/adm/lastlog  for  the  username.
     in.uucpd  must  be  invoked  by  a  user  with   appropriate
     privilege  (usually root) in order to be able to verify that
     the password is correct.


SECURITY

     in.uucpd uses pam(3PAM) for authentication, account  manage-
     ment, and session management.  The PAM configuration policy,
     listed through /etc/pam.conf, specifies the  modules  to  be
     used  for  in.uucpd.  Here  is  a partial pam.conf file with
     entries for uucp  using  the  UNIX  authentication,  account
     management, and session management module.

     uucp    auth requisite          pam_authtok_get.so.1
     uucp    auth required           pam_dhkeys.so.1
     uucp    auth required           pam_unix_auth.so.1

     uucp    account requisite       pam_roles.so.1
     uucp    account required        pam_projects.so.1
     uucp    account required        pam_unix_account.so.1
     uucp      session required      pam_unix_session.so.1

     If there are no entries  for  the  uucp  service,  then  the
     entries  for  the  "other" service will be used. If multiple
     authentication modules are listed,  then  the  peer  may  be
     prompted for multiple passwords.


FILES

     /var/adm/utmpx
           accounting

     /var/adm/wtmpx
           accounting

     /var/adm/lastlog
           time of last login


ATTRIBUTES

     See attributes(5) for descriptions of the  following  attri-
     butes:

     ____________________________________________________________
    |       ATTRIBUTE TYPE        |       ATTRIBUTE VALUE       |
    |_____________________________|_____________________________|
    | Availability                | SUNWbnuu                    |
    |_____________________________|_____________________________|


SEE ALSO

     inetd(1M), uucico(1M), pam(3PAM), pam.conf(4),  services(4),
     attributes(5),   pam_authtok_check(5),   pam_authtok_get(5),
     pam_authtok_store(5),   pam_dhkeys(5),   pam_passwd_auth(5),
     pam_unix(5),      pam_unix_account(5),     pam_unix_auth(5),
     pam_unix_session(5)


DIAGNOSTICS

     All diagnostic messages  are  returned  on  the  connection,
     after which the connection is closed.

          user read
                An error occurred while reading the username.

          passwd read
                An error occurred while reading the password.

          Login incorrect.
                The username is invalid or refers to  an  account
                with     a     login     shell     other     than
                /usr/lib/uucp/uucico, or the password is not  the
                correct password for the account.


NOTES

     The pam_unix(5) module might not be supported  in  a  future
     release.    Similar    functionality    is    provided    by
     pam_authtok_check(5),                    pam_authtok_get(5),
     pam_authtok_store(5),   pam_dhkeys(5),   pam_passwd_auth(5),
     pam_unix_account(5),          pam_unix_auth(5),          and
     pam_unix_session(5).


Man(1) output converted with man2html