0
|
1 dccd(8) Distributed Checksum Clearinghouse dccd(8)
|
|
2
|
|
3 NNAAMMEE
|
|
4 ddccccdd -- Distributed Checksum Clearinghouse Daemon
|
|
5
|
|
6 SSYYNNOOPPSSIISS
|
|
7 ddccccdd [--6644ddVVbbffFFQQ] --ii _s_e_r_v_e_r_-_I_D [--nn _b_r_a_n_d] [--hh _h_o_m_e_d_i_r] --II [_h_o_s_t_-_I_D][_,_u_s_e_r]
|
|
8 [--aa [_s_e_r_v_e_r_-_a_d_d_r][_,_s_e_r_v_e_r_-_p_o_r_t]] [--qq _q_s_i_z_e]
|
|
9 [--GG [_o_n_,][_w_e_a_k_-_b_o_d_y_,][_w_e_a_k_-_I_P_,][_e_m_b_a_r_g_o][_,_w_i_n_d_o_w][_,_w_h_i_t_e]]
|
|
10 [--WW [_r_a_t_e][_,_c_h_g][_,_d_b_s_i_z_e]] [--KK [_n_o_-]_t_y_p_e] [--TT _t_r_a_c_e_m_o_d_e]
|
|
11 [--uu _a_n_o_n_-_d_e_l_a_y[_*_i_n_f_l_a_t_e]] [--CC _d_b_c_l_e_a_n] [--LL _l_t_y_p_e_,_f_a_c_i_l_i_t_y_._l_e_v_e_l]
|
|
12 [--RR [_R_L___S_U_B],[_R_L___A_N_O_N],[_R_L___A_L_L___A_N_O_N],[_R_L___B_U_G_S]]
|
|
13
|
|
14 DDEESSCCRRIIPPTTIIOONN
|
|
15 DDccccdd receives reports of checksums related to mail received by DCC
|
|
16 clients and queries about the total number of reports of particular
|
|
17 checksums. A DCC server never receives mail, address, headers, or other
|
|
18 information from clients, but only cryptographically secure checksums of
|
|
19 such information. A DCC server cannot determine the text or other infor-
|
|
20 mation that corresponds to the checksums it receives. It only acts as a
|
|
21 clearinghouse of total counts of checksums computed by clients.
|
|
22
|
|
23 Each DCC server or close cluster of DCC servers is identified by a
|
|
24 numeric _s_e_r_v_e_r_-_I_D. Each DCC client is identified by a _c_l_i_e_n_t_-_I_D, either
|
|
25 explicitly listed in the _i_d_s file or the special anonymous client-ID.
|
|
26 Many computers are expected to share a single _c_l_i_e_n_t_-_I_D. A _s_e_r_v_e_r_-_I_D is
|
|
27 less than 32768 while a _c_l_i_e_n_t_-_I_D is between 32768 and 16777215. DCC
|
|
28 server-IDs need be known only to DCC servers and the people running them.
|
|
29 The passwords associated with DCC server-IDs should be protected, because
|
|
30 DCC servers listen to commands authenticated with server-IDs and their
|
|
31 associated passwords. Each client that does not use the anonymous ID
|
|
32 must know the client-ID and password used by each of its servers. A sin-
|
|
33 gle client computer can use different passwords with different server
|
|
34 computers. See the _i_d_s file.
|
|
35
|
|
36 A whitelist of known good (or bad) sources of email prevents legitimate
|
|
37 mailing lists from being seen as unsolicited bulk email by DCC clients.
|
|
38 The whitelist used by a DCC server is built into the database when old
|
|
39 entries are removed by dbclean(8). Each DCC client has its own, local
|
|
40 whitelist, and in general, whitelists work better in DCC clients than
|
|
41 servers.
|
|
42
|
|
43 The effectiveness of a Distributed Checksum Clearinghouse increases as
|
|
44 the number of subscribers increases. Flooding reports of checksums among
|
|
45 DCC servers increases the effective number of subscribers to each server.
|
|
46 Each ddccccdd daemon tries to maintain TCP/IP connections to the other
|
|
47 servers listed in the _f_l_o_d file, and send them reports containing check-
|
|
48 sums with total counts exceeding thresholds. Changes in the _f_l_o_d file
|
|
49 are noticed automatically within minutes.
|
|
50
|
|
51 Controls on report flooding are specified in the _f_l_o_d file. Each line
|
|
52 specifies a hostname and port number to which reports should be flooded,
|
|
53 a server-ID to identify and authenticate the output stream, a server-ID
|
|
54 to identify and authenticate an input stream from the same server, and
|
|
55 flags with each ID. The ability to delete reports of checksums is handy,
|
|
56 but could be abused. If _d_e_l is not present among the _i_n_-_o_p_t_s options for
|
|
57 the incoming ID, incoming delete requests are logged and then ignored.
|
|
58 Floods from DCC "brands" that count only mail to spam traps and whose
|
|
59 servers use the --QQ option to count extremely bulk mail should be marked
|
|
60 with _t_r_a_p_s. They can be seen as counting millions of targets, so the
|
|
61 _t_r_a_p_s flag on their _f_l_o_d file entry changes their incoming flooded
|
|
62 reports counts to _m_a_n_y_.
|
|
63
|
|
64 DDccccdd automatically checks its _f_l_o_d and _i_d_s files periodically. Cdcc(8)
|
|
65 has the commands nneeww iiddss and fflloooodd cchheecckk to tell ddccccdd to check those two
|
|
66 files immediately. Both files are also checked for changes after the
|
|
67 SIGHUP signal.
|
|
68
|
|
69 OOPPTTIIOONNSS
|
|
70 The following options are available:
|
|
71
|
|
72 --66 enable IPv6. The default is equivalent to --44. See also the IPv4
|
|
73 and IPv6 options in the _f_l_o_d file description below and the _I_P_v_6 _o_n
|
|
74 cdcc(8) command.
|
|
75
|
|
76 --44 disable IPv6. See also --66.
|
|
77
|
|
78 --dd enables debugging output. Additional --dd options increase the number
|
|
79 of messages.
|
|
80
|
|
81 --VV displays the version of the DCC server daemon.
|
|
82
|
|
83 --bb causes the server to not detach itself from the controlling tty or
|
|
84 put itself into the background.
|
|
85
|
|
86 --FF uses write() instead of mmap() in some cases to modify the DCC data-
|
|
87 base. It is the default on Solaris.
|
|
88
|
|
89 --ff turns off --FF.
|
|
90
|
|
91 --QQ causes the server to treat reports of checksums as queries except
|
|
92 from DCC clients marked trusted in the _i_d_s file with _r_p_t_-_o_k. See --uu
|
|
93 to turn off access by anonymous or unauthenticated clients
|
|
94
|
|
95 --ii _s_e_r_v_e_r_-_I_D
|
|
96 specifies the ID of this DCC server. Each server identifies itself
|
|
97 as responsible for checksums that it forwards to other servers.
|
|
98
|
|
99 --nn _b_r_a_n_d
|
|
100 is an arbitrary string of letters and numbers that identifies the
|
|
101 organization running the DCC server. The brand is required, and
|
|
102 appears in the SMTP _X_-_D_C_C headers generated by the DCC.
|
|
103
|
|
104 --hh _h_o_m_e_d_i_r
|
|
105 overrides the default DCC home directory, _/_v_a_r_/_d_c_c.
|
|
106
|
|
107 --II [_h_o_s_t_-_I_D][_,_u_s_e_r]
|
|
108 changes the server's globally unique identity for flooding from the
|
|
109 default value consisting of the first 16 characters of the host
|
|
110 name. or changes the UID and GID of the process _H_o_s_t_-_I_D is a string
|
|
111 of up to 16 characters that replaces the first 16 characters of the
|
|
112 system's hostname in assertions of the server-ID that are flooded to
|
|
113 peers. _U_s_e_r must be valid user name.
|
|
114
|
|
115 --aa [_s_e_r_v_e_r_-_a_d_d_r][_,_s_e_r_v_e_r_-_p_o_r_t]
|
|
116 adds an hostname or IP address to the list of local IP addresses
|
|
117 that the server answers. Multiple --aa options can be used to specify
|
|
118 a subset of the available network interfaces or to use more than one
|
|
119 port number. The default without any --aa options is to listen on all
|
|
120 local IP addresses. It can be useful to list some of the IP
|
|
121 addresses of multi-homed hosts to deal with firewalls. By default
|
|
122 _s_e_r_v_e_r_-_p_o_r_t is 6277 for DCC servers and 6276 for Greylist servers.
|
|
123 It is the UDP port at which DCC requests are received and the TCP
|
|
124 port for incoming floods of reports.
|
|
125
|
|
126 If _s_e_r_v_e_r_-_a_d_d_r is absent and if the getifaddrs(8) function is sup-
|
|
127 ported, separate UDP sockets are bound to each configured network
|
|
128 interface so that each DCC clients receives replies from the IP
|
|
129 addresses to which corresponding request are sent. If ddccccdd is
|
|
130 started before all network interfaces are turned on or there are
|
|
131 interfaces that are turned on and off or change their addresses such
|
|
132 as PPP interfaces, then the special string _@ should be used to tell
|
|
133 ddccccdd to bind to an IN_ADDRANY UDP socket.
|
|
134
|
|
135 Outgoing TCP connections to flood checksum reports to other DCC
|
|
136 servers used the IP address of a single --aa option, but only if there
|
|
137 is single option that is not localhost. See also the _f_l_o_d file.
|
|
138
|
|
139 --qq _q_s_i_z_e
|
|
140 specifies the maximum size of the queue of requests from anonymous
|
|
141 or unauthenticated clients. The default value is the maximum DCC
|
|
142 RTT in seconds times 200 or 1000.
|
|
143
|
|
144 --GG [_o_n_,][_w_e_a_k_-_b_o_d_y_,][_w_e_a_k_-_I_P_,][_e_m_b_a_r_g_o][_,_w_i_n_d_o_w][_,_w_h_i_t_e]
|
|
145 changes ddccccdd to a Greylist server for dccm(8) or dccifd(8).
|
|
146 Greylisting consists of temporarily rejecting or embargoing mail
|
|
147 from unfamiliar combinations of SMTP client IP address, SMTP enve-
|
|
148 lope sender, and SMTP envelope recipient. If the SMTP client per-
|
|
149 sists for _e_m_b_a_r_g_o _s_e_c_o_n_d_s and so is probably not an open proxy,
|
|
150 worm-infected personal computer, or other transient source of spam,
|
|
151 the triple of _(_I_P _a_d_d_r_e_s_s_,_s_e_n_d_e_r_,_r_e_c_i_p_i_e_n_t_) is added to a database
|
|
152 similar to the usual DCC database. If the SMTP client does not try
|
|
153 again after _e_m_b_a_r_g_o seconds and before _w_i_n_d_o_w seconds after the
|
|
154 first attempt, the triple is forgotten. If the SMTP client persists
|
|
155 past the embargo, the triple is added to the database and becomes
|
|
156 familiar and the message is accepted. Familiar triples are remem-
|
|
157 bered for _w_h_i_t_e seconds after the last accepted mail message. The
|
|
158 triple is forgotten if it is ever associated with unsolicited bulk
|
|
159 email.
|
|
160
|
|
161 All three durations can be a number of minutes, hours, days, or
|
|
162 weeks followed by _M_I_N_U_T_E_S, _M, _H_O_U_R_S, _H, _D_A_Y_S, _D, _W_E_E_K_S or _W. The
|
|
163 default is --GG _2_7_0_s_e_c_o_n_d_s_,_7_d_a_y_s_,_6_3_d_a_y_s. The first duration or the
|
|
164 _e_m_b_a_r_g_o should be longer than open proxies can linger retransmit-
|
|
165 ting. The second _w_i_n_d_o_w time should be as long as legitimate mail
|
|
166 servers persist in retransmitting to recognize embargoed messages
|
|
167 whose retransmissions were not received because of network or other
|
|
168 problems. The _w_h_i_t_e time should be long enough to recognize and not
|
|
169 embargo messages from regular senders.
|
|
170
|
|
171 Usually the DCC greylist system requires that an almost identical
|
|
172 copy of the message be retransmitted during the _e_m_b_a_r_g_o. If
|
|
173 _w_e_a_k_-_b_o_d_y is present, any message with the same triple of sender IP
|
|
174 address, sender mail address, and target mail address ends the
|
|
175 embargo, even if the body of the message differs.
|
|
176
|
|
177 If _w_e_a_k_-_I_P is present, all mail from an SMTP client at an IP address
|
|
178 is accept after any message from the same IP address has been
|
|
179 accepted.
|
|
180
|
|
181 Unlike DCC checksums, the contents of greylist databases are private
|
|
182 and do not benefit from broad sharing. However, large installations
|
|
183 can use more two or more greylist servers flooding triples among
|
|
184 themselves. Flooding among greylist servers is controlled by the
|
|
185 _g_r_e_y___f_l_o_d file.
|
|
186
|
|
187 All greylist cooperating or flooding greylist servers _m_u_s_t use the
|
|
188 same --GG values.
|
|
189
|
|
190 Clients of greylist servers cannot be anonymous and must have
|
|
191 client-IDs and passwords assigned in the _i_d_s file. This implies
|
|
192 that cdcc commands directed to greylist servers must specify the
|
|
193 server-ID.
|
|
194
|
|
195 White- and blacklists are honored by the DCC clients. whitelisted
|
|
196 messages are embargoed or checked with a greylist server. The
|
|
197 greylist triples of blacklisted messages, messages whose DCC counts
|
|
198 make them spam, and other messages known to be spam are sent to a
|
|
199 greylist server to be removed from the greylist database and cause
|
|
200 an embargo on the next messages with those triples.
|
|
201
|
|
202 Messages whose checksums match greylist server whitelists are not
|
|
203 embargoed and the checksums of their triples are not added to the
|
|
204 greylist database.
|
|
205
|
|
206 The target counts of embargoed messages are reported to the DCC net-
|
|
207 work to improve the detection of bulk mail.
|
|
208
|
|
209 --WW [_r_a_t_e][_,_c_h_g][_,_d_b_s_i_z_e]
|
|
210 controls quick database cleaning. If the database is larger than
|
|
211 _d_b_s_i_z_e, it seems that the database has not recently and is not about
|
|
212 to be cleaned, ddccccdd is receiving fewer than _r_a_t_e requests per sec-
|
|
213 ond, and if telling DCC clients that the database is about to be
|
|
214 cleaned reduces that rate by _c_h_g%, then ddccccdd starts dbclean(8) for a
|
|
215 quick database cleaning. The cleaning is abandoned if it takes too
|
|
216 long. The default values are equivalent to --WW _1_._0_,_4_0_._0_,_R_S_S where
|
|
217 _R_S_S is the maximum dccd resident set displayed the system log by --dd
|
|
218 when ssttaarrttss.
|
|
219
|
|
220 --KK [_n_o_-]_t_y_p_e
|
|
221 marks checksums of _t_y_p_e (not) be kept or counted in the database
|
|
222 unless they appear in the whitelist. Explicit settings add to or
|
|
223 remove from the initial contents of the list, which is equivalent to
|
|
224 --KK _B_o_d_y --KK _F_u_z_1 --KK _F_u_z_2.
|
|
225
|
|
226 --TT _t_r_a_c_e_m_o_d_e
|
|
227 causes the server to trace or record some operations. _t_r_a_c_e_m_o_d_e
|
|
228 must be one of the following:
|
|
229 _A_D_M_N administrative requests from the control program, cdcc(8)
|
|
230 _A_N_O_N errors by anonymous clients
|
|
231 _C_L_N_T errors by authenticated clients
|
|
232 _R_L_I_M rate-limited messages
|
|
233 _Q_U_E_R_Y all queries and reports
|
|
234 _R_I_D_C some messages concerning the report-ID cache that is used
|
|
235 to detect duplicate reports from clients
|
|
236 _F_L_O_O_D messages about inter-server flooding connections
|
|
237 _F_L_O_O_D_2 messages about flooded reports
|
|
238 _I_D_S unknown server-IDs in flooded reports
|
|
239 _B_L requests from clients in the _b_l_a_c_k_l_i_s_t file.
|
|
240 _D_B odd database events including long chains of duplicate
|
|
241 checksums
|
|
242 _W_L_I_S_T reports of whitelisted checksums from authenticated, not
|
|
243 anonymous DCC clients
|
|
244 The default is _A_N_O_N _C_L_N_T.
|
|
245
|
|
246 --uu _a_n_o_n_-_d_e_l_a_y[_*_i_n_f_l_a_t_e]
|
|
247 changes the number of milliseconds anonymous or unauthenticated
|
|
248 clients must wait for answers to their queries and reports. The
|
|
249 purpose of this delay is to discourage large anonymous clients. The
|
|
250 _a_n_o_n_-_d_e_l_a_y is multiplied by 1 plus the number of recent anonymous
|
|
251 requests from an IP address divided by the _i_n_f_l_a_t_e value.
|
|
252
|
|
253 The string _F_O_R_E_V_E_R turns off all anonymous or unauthenticated access
|
|
254 not only for checksum queries and reports but also cdcc(8) ssttaattss
|
|
255 requests. A missing value for _i_n_f_l_a_t_e turns off inflation.
|
|
256
|
|
257 The default value is _5_0_,_n_o_n_e, except when --GG is used in which case
|
|
258 _F_O_R_E_V_E_R is assumed and required.
|
|
259
|
|
260 --CC _d_b_c_l_e_a_n
|
|
261 changes the default name or path of the program used to rebuild the
|
|
262 hash table when it becomes too full. The default value is
|
|
263 _/_v_a_r_/_d_c_c_/_l_i_b_e_x_e_c_/_d_b_c_l_e_a_n in the _/_v_a_r_/_d_c_c_/_l_i_b_e_x_e_c directory. The
|
|
264 value can include arguments as in _-_C _'_$_D_C_C___L_I_B_E_X_E_C_/_d_b_c_l_e_a_n _-_F_'.
|
|
265
|
|
266 Dbclean _s_h_o_u_l_d _n_o_t be run by ddccccdd except in emergencies such as
|
|
267 database corruption or hash table overflow. Dbclean(8) should be
|
|
268 run daily with the /var/dcc/libexec/cron-dccd cron script
|
|
269
|
|
270 --LL _l_t_y_p_e_,_f_a_c_i_l_i_t_y_._l_e_v_e_l
|
|
271 specifies how messages should be logged. _L_t_y_p_e must be _e_r_r_o_r, _i_n_f_o,
|
|
272 or _o_f_f to indicate which of the two types of messages are being con-
|
|
273 trolled or to turn off all syslog(3) messages from ddccccdd. _L_e_v_e_l must
|
|
274 be a syslog(3) level among _E_M_E_R_G, _A_L_E_R_T, _C_R_I_T, _E_R_R, _W_A_R_N_I_N_G, _N_O_T_I_C_E,
|
|
275 _I_N_F_O, and _D_E_B_U_G. _F_a_c_i_l_i_t_y must be among _A_U_T_H, _A_U_T_H_P_R_I_V, _C_R_O_N,
|
|
276 _D_A_E_M_O_N, _F_T_P, _K_E_R_N, _L_P_R, _M_A_I_L, _N_E_W_S, _U_S_E_R, _U_U_C_P, and _L_O_C_A_L_0 through
|
|
277 _L_O_C_A_L_7. The default is equivalent to
|
|
278 --LL _i_n_f_o_,_M_A_I_L_._N_O_T_I_C_E --LL _e_r_r_o_r_,_M_A_I_L_._E_R_R
|
|
279
|
|
280 --RR [_R_L___S_U_B],[_R_L___A_N_O_N],[_R_L___A_L_L___A_N_O_N],[_R_L___B_U_G_S]
|
|
281 sets one or more of the four rate-limits. _R_L___S_U_B limits the number
|
|
282 of DCC transactions per second from subscribers or DCC clients with
|
|
283 known client-IDs and passwords. This limit applies to each IP
|
|
284 address independently.
|
|
285
|
|
286 _R_L___A_N_O_N limits the number of DCC transactions per second from anony-
|
|
287 mous DCC clients. This limit applies to each IP address indepen-
|
|
288 dently. It is better to use --uu than to change this value to exclude
|
|
289 anonymous clients.
|
|
290
|
|
291 _R_L___A_L_L___A_N_O_N limits the number of DCC transactions per second from
|
|
292 all anonymous DCC clients. This limit applies to all anonymous
|
|
293 clients as a group, regardless of their IP addresses.
|
|
294
|
|
295 _R_L___B_U_G_S limits the number of complaints or error messages per second
|
|
296 for all anonymous DCC clients as a group as well as for each DCC
|
|
297 client by IP address.
|
|
298
|
|
299 The default is equivalent to --RR _4_0_0_,_5_0_,_6_0_0_,_0_._1
|
|
300
|
|
301 FFIILLEESS
|
|
302 /var/dcc is the DCC home directory containing data and control files.
|
|
303 dcc_db is the database of mail checksums.
|
|
304 dcc_db.hash is the mail checksum database hash table.
|
|
305 grey_db is the database of greylist checksums.
|
|
306 grey_db.hash is the greylist database hash table.
|
|
307 flod contains lines controlling DCC flooding of the form:
|
|
308 _h_o_s_t[_,_r_p_o_r_t][_;_s_r_c[_,_l_p_o_r_t]] _r_e_m_-_I_D [_p_a_s_s_w_d_-_I_D [_o_-_o_p_t [_i_-_o_p_t]]]
|
|
309 where absent optional values are signaled with "-" and
|
|
310 _h_o_s_t is the IP address or name of a DCC server and _r_p_o_r_t is
|
|
311 the name or number of the TCP port used by the remote
|
|
312 server.
|
|
313 _s_r_c and _l_p_o_r_t are the IP address or host name and TCP port
|
|
314 from which the outgoing flooding connection should come.
|
|
315 Incoming flooding connections must arrive at an address
|
|
316 and port specified with --aa.
|
|
317 _r_e_m_-_i_d is the server-ID of the remote DCC server.
|
|
318 _p_a_s_s_w_d_-_I_D is a server-ID that is not assigned to a server, but
|
|
319 whose first password is used to sign checksum reports sent
|
|
320 to the remote system. Either of its passwords are
|
|
321 required with incoming reports. If it is absent or "-",
|
|
322 outgoing floods are signed with the first password of the
|
|
323 local server in the _i_d_s file and incoming floods must be
|
|
324 signed with either password of the remote server-ID.
|
|
325 _i_-_o_p_t and _o_-_o_p_t are comma separated lists of
|
|
326 _o_f_f turns off flooding to the remote or local system.
|
|
327 _t_r_a_p_s indicates that the remote sending or local receiv-
|
|
328 ing system has only spam traps.
|
|
329 _n_o_-_d_e_l says checksum delete requests are refused by the
|
|
330 remote or local server and so turns off sending or
|
|
331 accepting delete requests, respectively. By default,
|
|
332 delete requests are sent to remote servers and
|
|
333 accepted in incoming floods if and only if the peers
|
|
334 are exchanging DCC reputations.
|
|
335 _d_e_l says delete requests are accepted by the remote or
|
|
336 local server.
|
|
337 _n_o_-_l_o_g_-_d_e_l turns off logging of incoming requests to
|
|
338 delete checksums.
|
|
339 _p_a_s_s_i_v_e is used to tell a server outside a firewall to
|
|
340 expect a peer inside to create both of the pair of
|
|
341 input and output TCP connections used for flooding.
|
|
342 The peer inside the firewall should use _S_O_C_K_S or _N_A_T
|
|
343 on its _f_l_o_d file entry for this system.
|
|
344 _S_O_C_K_S is used to tell a server inside a firewall that it
|
|
345 should create both of the TCP connections used for
|
|
346 flooding and that SOCKS protocol should be used. The
|
|
347 peer outside the firewall should use _p_a_s_s_i_v_e on its
|
|
348 _f_l_o_d file entry for this system.
|
|
349 _N_A_T differs from _S_O_C_K_S only by not using the SOCKS proto-
|
|
350 col.
|
|
351 _I_D_1_-_>_I_D_2 converts server-ID _I_D_1 in flooded reports to
|
|
352 server-ID _I_D_2. Either _I_D_1 or _I_D_2 may be the string
|
|
353 `self' to specify the server's own ID. _I_D_1 can be
|
|
354 the string `all' to specify all server-IDs or a pair
|
|
355 of server-IDs separated by a dash to specify an
|
|
356 inclusive range. _I_D_2 can be the string `ok' to send
|
|
357 or receive reports without translation or the string
|
|
358 `reject' to not send outgoing or refuse incoming
|
|
359 reports. Only the first matching conversion is
|
|
360 applied. For example, when `self->ok,all->reject' is
|
|
361 applied to a locally generated report, the first con-
|
|
362 version is applied and the second is ignored.
|
|
363 _l_e_a_f_=_p_a_t_h_-_l_e_n does not send reports with paths longer
|
|
364 than _p_a_t_h_-_l_e_n server-IDs.
|
|
365 _I_P_v_4 overrides a --66 setting for this flooding peer.
|
|
366 _I_P_v_6 overrides the default or an explicit --44 setting.
|
|
367 _v_e_r_s specifies the version of the DCC flooding protocol
|
|
368 used by the remote DCC server with a string such as
|
|
369 `version2'.
|
|
370 _t_r_a_c_e sends information about a single peer like the
|
|
371 cdcc(8) command ttrraaccee FFLLOOOODD oonn does for all peers.
|
|
372 _t_r_a_c_e_2 sends information about individual flooded reports
|
|
373 like the cdcc(8) command ttrraaccee FFLLOOOODD22 oonn does for all
|
|
374 peers.
|
|
375 grey_flod is the equivalent of _f_l_o_d used by ddccccdd when it is a greylist
|
|
376 server.
|
|
377 flod.map is an automatically generated file in which ddccccdd records its
|
|
378 progress sending or flooding reports to DCC peers.
|
|
379 grey_flod.map is the equivalent of _f_l_o_d_._m_a_p _u_s_e_d _b_y ddccccdd when it is a
|
|
380 greylist server.
|
|
381 ids contains the IDs and passwords known by the DCC server. An _i_d_s
|
|
382 file that can be read by others cannot be used. It contains
|
|
383 blank lines, comments starting with "#" and lines of the form:
|
|
384 _i_d[_,_r_p_t_-_o_k][_,_d_e_l_a_y_=_m_s[_*_i_n_f_l_a_t_e]] _p_a_s_s_w_d_1 [_p_a_s_s_w_d_2]
|
|
385 where
|
|
386 _i_d is a DCC _c_l_i_e_n_t_-_I_D or _s_e_r_v_e_r_-_I_D.
|
|
387 _R_p_t_-_o_k if present overrides --QQ by saying that this client is
|
|
388 trusted to report only checksums for unsolicited bulk
|
|
389 mail.
|
|
390 _d_e_l_a_y_=_m_s[_*_i_n_f_l_a_t_e] delays answers to systems using the client
|
|
391 _i_d. The _d_e_l_a_y in milliseconds is multiplied by 1 plus the
|
|
392 number of recent requests from an IP address using _i_d
|
|
393 divided by the _i_n_f_l_a_t_e value. See --uu.
|
|
394 _p_a_s_s_w_d_1 is the password currently used by clients with identi-
|
|
395 fier _i_d. It is a 1 to 32 character string that does not
|
|
396 contain blank, tab, newline or carriage return characters.
|
|
397 _p_a_s_s_w_d_2 is the optional next password that those clients will
|
|
398 use. A DCC server accepts either password if both are
|
|
399 present in the file.
|
|
400 Both passwords can be absent if the entry not used except to
|
|
401 tell ddccccdd that server-IDs in the flooded reports are valid.
|
|
402 The string _u_n_k_n_o_w_n is equivalent to the null string.
|
|
403 whitelist contains the DCC server whitelist. It is not used directly but
|
|
404 is loaded into the database when dbclean(8) is run.
|
|
405 grey_whitelist contains the greylist server whitelist. It is not used
|
|
406 directly but is loaded into the database when dbclean(8) is run
|
|
407 with --GG.
|
|
408 blacklist if present, contains a list of IP addresses and blocks of IP
|
|
409 addresses DCC clients that are ignored. Each line in the file
|
|
410 should be blank, a comment starting with '#', or an IP address
|
|
411 or block of IP addresses in the form
|
|
412 [_t_r_a_c_e_,] [_o_k_,] [_b_a_d] xxx.xxx.xxx.xxx[/yy]
|
|
413 Changes to the file are automatically noticed and acted upon
|
|
414 within a few minutes. Addresses or blocks of addresses can be
|
|
415 preceded with _o_k to "punch holes" in blacklisted blocks or with
|
|
416 _t_r_a_c_e to log activity. This mechanism is intended for no more
|
|
417 than a few dozen blocks of addresses.
|
|
418 dccd_clients contains client IP addresses and activity counts.
|
|
419 grey_clients contains greylist client IP addresses and activity counts.
|
|
420
|
|
421 EEXXAAMMPPLLEESS
|
|
422 ddccccdd is usually started with other system daemons with something like the
|
|
423 script _/_v_a_r_/_d_c_c_/_l_i_b_e_x_e_c_/_r_c_D_C_C. That scripts uses values in
|
|
424 /var/dcc/dcc_conf to start the server. With the argument _s_t_o_p,
|
|
425 _/_v_a_r_/_d_c_c_/_l_i_b_e_x_e_c_/_r_c_D_C_C can be used to stop the daemon.
|
|
426
|
|
427 The database grows too large unless old reports are removed. dbclean(8)
|
|
428 should be run daily with the /var/dcc/libexec/cron-dccd cron script
|
|
429
|
|
430 SSEEEE AALLSSOO
|
|
431 cdcc(8), dcc(8), dbclean(8), dblist(8), dccifd(8), dccm(8), dccproc(8).
|
|
432 dccsight(8),
|
|
433
|
|
434 HHIISSTTOORRYY
|
|
435 ddccccdd is based on an idea from Paul Vixie. It was designed and written at
|
|
436 Rhyolite Software, starting in 2000. This document describes version
|
|
437 1.3.103.
|
|
438
|
|
439 February 26, 2009
|