IPSERV(8)                                               IPSERV(8)

          telnetd, rlogind, rexexec, ftpd, socksd, hproxy - Internet
          remote access daemons

          ip/telnetd [-adnptN] [-u user]



          ip/ftpd [-aAde] [-n namepace-file]

          ip/socksd [ -x inside ] [ -o outside ]


          These programs support remote access across the Internet.
          All expect the network connection to be standard input, out-
          put, and error.  They are normally started from scripts in
          /rc/bin/service (see listen(8)).

          Telnetd allows login from a remote client.  There are three
          types of login:

          normal   Normal users log in by encrypting and returning a
                   challenge printed by telnetd. The user can use
                   either the netkey program (see passwd(1)) or a
                   SecureNet handheld authenticator to encrypt the
                   challenge.  /lib/namespace defines the namespace.
          noworld  Users in group noworld in /adm/users authenticate
                   with a password in the clear.
                   /lib/namespace.noworld defines the namespace.
                   User none requires no authentication.
                   /lib/namespace defines the namespace.

          Telnetd's options are:

          a   allow anonymous login by none

          d   print debugging to standard error

          p   don't originate any telnet control codes

          n   turn on local character echoing and imply the p option

          t   trusted, that is, don't authenticate

     IPSERV(8)                                               IPSERV(8)

          u   use user as the local account name

          N   permit connections by `noworld' users only.

          Rlogind logs in using the BSD remote login protocol.
          Rlogind execs telnetd -nu after completing its initial hand-

          Rexexec executes a command locally for a remote client.  It
          uses the standard Plan 9 authentication (see authsrv(6)).

          Ftpd runs the Internet file transfer protocol.  Users may
          transfer files in either direction between the local and
          remote machines.  As for telnetd, there are three types of

          normal   Normal users authenticate via the same
                   challenge/response as for telnetd.
                   /usr/username/lib/namespace.ftp or, if that file
                   does not exist, /lib/namespace defines the names-
          noworld  Users in group noworld in /adm/users login using a
                   password in the clear.  /lib/namespace.noworld
                   defines the namespace.
                   Users anonymous and none require no authentication.
                   The argument to the -n option (default
                   /lib/namespace.ftp) defines the namespace.  Anony-
                   mous users may only store files in the subtree
                   below /incoming.

          Ftpd's options are:

          a   allow anonymous access

          A   allow only anonymous access

          d   write debugging output to standard error

          e   treat any user as anonymous

          n   the namespace for anonymous users (default

          To preserve intended protections in shared file trees, any
          directory containing a file .httplogin is locked by ftpd;
          see httpd(8).

          Socksd is a SOCKS4 and SOCKS5 proxy server allowing non
          Plan9 machines to access the outside network.  The net to
          use for outgoing calls can be specified with the -o outside
          and the internal network is specified with -x inside (for

     IPSERV(8)                                               IPSERV(8)

          UDP relay).  If not specified, inside and outside will
          default to /net.

          Hproxy is a simple HTTP proxy server.



          ftpfs(4), pop3(8)

          Hproxy first appeared in 9front (July, 2012).  Socksd first
          appeared in 9front (March, 2012).