Mercurial > notdcc
comparison cdcc.8.in @ 0:c7f6b056b673
First import of vendor version
author | Peter Gervai <grin@grin.hu> |
---|---|
date | Tue, 10 Mar 2009 13:49:58 +0100 |
parents | |
children |
comparison
equal
deleted
inserted
replaced
-1:000000000000 | 0:c7f6b056b673 |
---|---|
1 .\" Copyright (c) 2008 by Rhyolite Software, LLC | |
2 .\" | |
3 .\" This agreement is not applicable to any entity which sells anti-spam | |
4 .\" solutions to others or provides an anti-spam solution as part of a | |
5 .\" security solution sold to other entities, or to a private network | |
6 .\" which employs the DCC or uses data provided by operation of the DCC | |
7 .\" but does not provide corresponding data to other users. | |
8 .\" | |
9 .\" Permission to use, copy, modify, and distribute this software without | |
10 .\" changes for any purpose with or without fee is hereby granted, provided | |
11 .\" that the above copyright notice and this permission notice appear in all | |
12 .\" copies and any distributed versions or copies are either unchanged | |
13 .\" or not called anything similar to "DCC" or "Distributed Checksum | |
14 .\" Clearinghouse". | |
15 .\" | |
16 .\" Parties not eligible to receive a license under this agreement can | |
17 .\" obtain a commercial license to use DCC by contacting Rhyolite Software | |
18 .\" at sales@rhyolite.com. | |
19 .\" | |
20 .\" A commercial license would be for Distributed Checksum and Reputation | |
21 .\" Clearinghouse software. That software includes additional features. This | |
22 .\" free license for Distributed ChecksumClearinghouse Software does not in any | |
23 .\" way grant permision to use Distributed Checksum and Reputation Clearinghouse | |
24 .\" software | |
25 .\" | |
26 .\" THE SOFTWARE IS PROVIDED "AS IS" AND RHYOLITE SOFTWARE, LLC DISCLAIMS ALL | |
27 .\" WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES | |
28 .\" OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL RHYOLITE SOFTWARE, LLC | |
29 .\" BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES | |
30 .\" OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, | |
31 .\" WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, | |
32 .\" ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS | |
33 .\" SOFTWARE. | |
34 .\" | |
35 .\" Rhyolite Software DCC 1.3.103-1.95 $Revision$ | |
36 .\" | |
37 .Dd February 26, 2009 | |
38 .ds volume-ds-DCC Distributed Checksum Clearinghouse | |
39 .Dt cdcc 8 DCC | |
40 .Os " " | |
41 .Sh NAME | |
42 .Nm cdcc | |
43 .Nd Control Distributed Checksum Clearinghouse | |
44 .Sh SYNOPSIS | |
45 .Nm cdcc | |
46 .Op Fl Vdq | |
47 .Op Fl h Ar homedir | |
48 .Op Fl c Ar ids | |
49 .Op Ar op1 op2 ... Op Ar - | |
50 .Sh DESCRIPTION | |
51 .Nm Cdcc | |
52 is used to clear, control, and query the control file used | |
53 by Distributed Checksum Clearinghouse | |
54 clients such as | |
55 .Xr dccm 8 . | |
56 The host names, UDP port numbers, IDs, and passwords local clients use | |
57 to talk to servers as well as IP addresses, round trip times, and other | |
58 information are contained in the | |
59 .Pa map | |
60 file. | |
61 While | |
62 .Nm | |
63 is set-UID, it uses the real UID only when accessing the | |
64 .Pa map | |
65 file. | |
66 It refuses to display sensitive information such as passwords | |
67 unless the real UID is the same as the effective UID. | |
68 Note that | |
69 .Nm | |
70 needs to be set to a UID that can read and write the | |
71 .Pa map | |
72 file, but that UID need not be 0. | |
73 .Pp | |
74 .Nm Cdcc | |
75 is also used to send commands to DCC servers to tell them | |
76 to stop, reload their lists of DCC IDs, turn on tracing, and so forth. | |
77 .Pp | |
78 Many commands sent to DCC servers require a numeric DCC ID | |
79 and a password recognized by the server. | |
80 A DCC password is a 1-32 character string that does not contain | |
81 blank, tab, newline or carriage return characters. | |
82 The ID is specified with the | |
83 .Ic id | |
84 operation. | |
85 If | |
86 .Nm cdcc | |
87 is run with a real UID that can read the | |
88 .Pa ids | |
89 file and a password is not specified | |
90 (see the | |
91 .Ic password | |
92 operation), | |
93 then the current password for the specified ID in the | |
94 .Pa ids | |
95 file will be used. | |
96 If no | |
97 .Pa ids | |
98 file is available and a password and DCC ID are not specified, | |
99 .Nm | |
100 uses the anonymous DCC client-ID. | |
101 DCC servers do not expect a password from clients using the | |
102 anonymous client-ID, | |
103 but they also won't honor control requests. | |
104 .Pp | |
105 Operations that modify the | |
106 .Pa map | |
107 file can only be performed when | |
108 the real UID is sufficient to modify the file directly. | |
109 Trying to perform an operation that requires a password without | |
110 specifying a server-ID or without using a UID that can access the | |
111 .Pa ids | |
112 file produces an error message complaining | |
113 about a "privileged operation." | |
114 .Pp | |
115 Commands and operations are read from the command line or from stdin. | |
116 A series of | |
117 .Ar op1 op2 ... | |
118 operations followed a | |
119 .Ar - | |
120 (a dash) causes operations to be read from stdin after the command line | |
121 operations are processed. | |
122 Semi-colons or newlines separate commands in UNIX command-line "words," | |
123 as well as when commands are read from stdin. | |
124 Since each command line operation must be a shell "word," quotes are | |
125 often required as in | |
126 .Bd -ragged -offset indent | |
127 % cdcc | |
128 .Qq load map.txt | |
129 .Ed | |
130 or | |
131 .Bd -ragged -offset indent | |
132 % cdcc | |
133 .Qq host localhost;info | |
134 stats | |
135 .Ed | |
136 .Ss OPTIONS | |
137 The following options are available: | |
138 .Bl -tag -width 3n | |
139 .It Fl V | |
140 displays the version of the DCC controller. | |
141 .It Fl d | |
142 enables debugging output from the DCC client software. | |
143 Additional | |
144 .Fl d | |
145 options increase the number of messages. | |
146 See the | |
147 .Ic debug | |
148 command. | |
149 .It Fl q | |
150 quiets initial complaints about the map file | |
151 and some messages about successful commands. | |
152 See the | |
153 .Ic quiet | |
154 command. | |
155 .It Fl h Ar homedir | |
156 overrides the default DCC home directory, | |
157 .Pa @prefix@ . | |
158 See the | |
159 .Ic homedir | |
160 operation. | |
161 .It Fl c Ar ids | |
162 specifies file containing DCC IDs and passwords known by the local DCC server. | |
163 An | |
164 .Pa ids | |
165 file that can be read by others cannot be used. | |
166 The format of the | |
167 .Pa ids | |
168 file is described in | |
169 .Xr dccd 8 . | |
170 .It Ar op1 op2 ... | |
171 are operations or commands such as "id\ 100;\ stop". | |
172 Commands or operations specified on the command line are performed | |
173 before the first interactive request. | |
174 The last command can be | |
175 .Ar "-" | |
176 to specify that additional commands should be read from stdin. | |
177 .El | |
178 .Ss OPERATIONS | |
179 Local operations include the following: | |
180 .Bl -tag -width info | |
181 .It Ic help Op Ar command | |
182 lists information about one or all available commands and operations. | |
183 .It Ic exit | |
184 stops | |
185 .Nm | |
186 .It Ic grey Op Ar on | off | |
187 switches between DCC and greylist servers. | |
188 .It Ic homedir Op Ar path | |
189 displays or specifies the DCC home directory. | |
190 .It Ic file Op Ar map | |
191 displays or specifies the name or path of the map file. | |
192 The string "-" specifies the default file | |
193 .Pa map | |
194 in the DCC home directory. | |
195 .It Ic new map Op Ar map | |
196 creates a new, empty file for DCC server host names, | |
197 port numbers, passwords, and so forth. | |
198 There must not already be a file of the same name. | |
199 The default is | |
200 .Pa map | |
201 in the DCC home directory. | |
202 .It Ic delete Ar host Ns Xo | |
203 .Ns Op , Ns Ar port | |
204 .Xc | |
205 deletes the entry in the | |
206 .Pa map | |
207 file for | |
208 .Ar host | |
209 and UDP | |
210 .Ar port. | |
211 If greylist mode has been set with the | |
212 .Ic grey\ on | |
213 command, | |
214 the entry for the grelist server at | |
215 .Ar host | |
216 is deleted. | |
217 .It Ic add Ar host Ns Xo | |
218 .Ns Op , Ns Ar port | |
219 .Op Ar RTT+adj Ns | Ns Ar RTT-adj | |
220 .Op Ar Greylist | |
221 .Op Ar client-ID Op password | |
222 .Xc | |
223 adds an entry to the | |
224 .Pa map | |
225 file. | |
226 The | |
227 .Ar port | |
228 can be "-" to specify the default DCC server port number. | |
229 .Pp | |
230 An adjustment to the round trip time is a multiple of 10 milliseconds | |
231 between -4000 and +4000 following the string | |
232 .Ar RTT . | |
233 The adjustment is added to the average measured round trip time when | |
234 the DCC client software picks the "nearest" DCC server, or the server | |
235 with the smallest RTT. | |
236 If an IP address is mentioned more than once in the list of servers, | |
237 for example because it is among the addresses for more than one server name, | |
238 conflicts among RTT adjustments are resolved by picking | |
239 the adjustment with the largest absolute value. | |
240 .Pp | |
241 .Ar Greylist | |
242 marks an entry for a greylist servers. | |
243 .Ar Greylist | |
244 is assumed if greylist mode has been set with | |
245 the | |
246 .Ic grey\ on | |
247 command, | |
248 See | |
249 .Xr dccd 8 . | |
250 .Pp | |
251 If both the client-ID and the password are absent, | |
252 the anonymous client-ID, 1, is used. | |
253 The string | |
254 .Ar anon | |
255 is equivalent to the anonymous client-ID. | |
256 A null password string is assumed if the password is missing | |
257 and the client-ID is 1 or also missing. | |
258 .It Ic load Ar info-file | |
259 loads the current parameter file with the host names, port numbers, IDs, and | |
260 passwords in | |
261 .Ar info-file . | |
262 Standard input is understood if | |
263 .Ar info-file | |
264 is "-". | |
265 .Pp | |
266 A suitable file can be created with the | |
267 .Ic info | |
268 operation. | |
269 It consists of ignored blank or comment lines starting with '#' and | |
270 other lines in the same format as the arguments to the | |
271 .Ic add | |
272 operation. | |
273 Note that output of the | |
274 .Ic info | |
275 command will lack passwords unless it is run by a privileged user. | |
276 .It Ic host Op Ar hostname | |
277 specifies the host name of the DCC server to which commands should be sent. | |
278 If | |
279 .Ar hostname | |
280 is "-", the current default DCC server is chosen. | |
281 .It Ic port Op Ar port | |
282 specifies the UDP port number of the DCC server to which commands should | |
283 be sent. | |
284 The default is 6277 or 6276 depending on the setting of the greylist | |
285 mode controlled with the | |
286 .Ic grey | |
287 command. | |
288 .It Ic password Ar secret | |
289 specifies the password with which to sign commands sent to the DCC | |
290 server specified with the | |
291 .Ic server | |
292 and | |
293 .Ic port | |
294 operations. | |
295 .It Ic id Op Ar ID | |
296 specifies or displays the numeric DCC ID for commands sent to the DCC | |
297 server specified with the | |
298 .Ic server | |
299 and | |
300 .Ic port | |
301 operations. | |
302 If no password is specified with the | |
303 .Ic password | |
304 command, | |
305 the password is sought in the local | |
306 .Pa ids . | |
307 .It Ic info Op Fl N | |
308 displays information about the connections to DCC servers. | |
309 It starts with the current date and name of the current | |
310 .Ar map | |
311 file or | |
312 says that | |
313 .Nm | |
314 is using the implicit file created with the | |
315 .Ic server | |
316 and | |
317 .Ic port | |
318 operations. | |
319 It then says when host names will next be resolved into IP addresses, | |
320 the smallest round trip time to the IP addresses of known DCC servers. | |
321 The host name, UDP port number (or dash if it is the default), | |
322 DCC client-ID, and password (if | |
323 .Nm | |
324 is used by a privileged user) | |
325 are shown in one line per configured DCC server. | |
326 .Pp | |
327 The currently preferred IP address is indicated by an asterisk. | |
328 The "brand" of the server, its DCC ID, and its IP address | |
329 are displayed in one line per IP address. | |
330 The performance of the server at each IP address in the most recent | |
331 32 operations is displayed in a second line. | |
332 The second line ends with the measured delay imposed by the server on requests | |
333 with this client's ID. | |
334 .Pp | |
335 .Fl N | |
336 displays the reverse DNS name of each server. | |
337 .It Ic RTT Op Fl N | |
338 measures the round trip time to the DCC servers. | |
339 It does this by discarding accumulated information and forcing | |
340 a probe of all listed server IP addresses. | |
341 .Pp | |
342 .Em Beware | |
343 that when run with sufficient privilege, the | |
344 .Ic RTT | |
345 operation is like the | |
346 .Ic info | |
347 and | |
348 .Ic load | |
349 operations and displays cleartext passwords. | |
350 .Pp | |
351 .Fl N | |
352 displays the reverse DNS name of each server. | |
353 .It Ic debug Xo | |
354 Op Ar on | off | TTL=x | |
355 .Xc | |
356 increases or decreases debugging information from the DCC client software | |
357 or sets the IP TTL on queries to the server. | |
358 See | |
359 .Fl d . | |
360 .Pp | |
361 Some operating systems do not include the functions required to change the | |
362 IP TTL. | |
363 Others include the required functions | |
364 but have no apparent effect. | |
365 .It Ic quiet Op Ar on | off | |
366 makes commands more quiet or more verbose. | |
367 .It Ic IPv6 Op Ar on | off | |
368 sets a switch to cause clients using the map file to try to use IPv6. | |
369 .It Ic SOCKS Op Ar on off | |
370 sets a switch to cause DCC clients using the map to use the SOCKS5 | |
371 protocol, if they have been built with a SOCKS library. | |
372 The socks library linked with the DCC client must be configured appropriately, | |
373 often including knowing which DCC servers must be connected via the | |
374 SOCKS proxy and which can be reached directly. | |
375 DCC clients use SOCKS functions such as Rsendto() with all or no servers | |
376 depending on the setting of this switch. | |
377 .It Ic src Op Ar - | IPaddress | |
378 displays or configures the source address of DCC client requests. | |
379 .Ar - | |
380 removes the explicit configuration of the source, while | |
381 .Ar IPaddress | |
382 sets it. | |
383 This makes sense only on multi-homed hosts. | |
384 It can be useful for passing firewalls. | |
385 .El | |
386 .Pp | |
387 .Ss DCC SERVER COMMANDS | |
388 Commands that can be sent to a DCC server include the following. | |
389 Most of the commands must be used with the server's | |
390 .Ar ID | |
391 specified with the | |
392 .Ic id | |
393 command. | |
394 The specified ID is included in the commands sent to the server | |
395 The command itself is digitally signed with the first password associated | |
396 with the ID in the | |
397 .Pa ids | |
398 file. | |
399 The server requires that the signature match one of the passwords associated | |
400 with the ID in its | |
401 .Pa ids | |
402 file. | |
403 .Bl -tag -width xxx | |
404 .It Ic delck type hex1 hex2 hex3 hex4 | |
405 asks the server to delete the | |
406 .Ar type | |
407 checksum with value | |
408 .Ar hex1 hex2 hex3 hex4 . | |
409 The type and checksum values can be found in | |
410 .Xr dccproc 8 | |
411 and | |
412 .Xr dccm 8 | |
413 log files | |
414 or computed with | |
415 .Em dccproc Fl QC . | |
416 .Pp | |
417 There are very few situations where it makes sense to bother to delete | |
418 checksums. | |
419 For example, mail that was accidentally reported with a target | |
420 count of "MANY" is either private and so will not be seen by other | |
421 people and so will not be affected, or it is bulk and its source | |
422 so must have already been whitelisted by recipients. | |
423 .It Ic stats Op Ar all | clear | |
424 displays current status and statistics from the current DCC server | |
425 or for | |
426 .Ar all | |
427 known DCC servers. | |
428 The server's counters will be cleared after they are displayed | |
429 when the server's ID has been specified with the | |
430 .Ic id Ar ID | |
431 operation. | |
432 .It Ic clients Xo | |
433 .Op Fl nsiaVAK | |
434 .Op Ar max Op Ar thold | |
435 .Op Ar addr Ns Op Ar /prefix | |
436 .Xc | |
437 displays some of the clients recently seen by the server. | |
438 .Bl -hang -compact -width xxx | |
439 .It Fl n | |
440 displays only the IP addresses and not the names of clients. | |
441 .It Fl s | |
442 sorts the clients by the number of requests they have made. | |
443 .It Fl i | |
444 counts clients with the same client-ID as single entities. | |
445 .It Fl a | |
446 produces 24 hour average numbers of requests. | |
447 .It Fl A | |
448 displays only anonymous clients. | |
449 .It Fl K | |
450 displays only clients using client-IDs. | |
451 .It Fl V | |
452 includes the DCC protocol versions used by clients. | |
453 .It Ar max | |
454 displays only the | |
455 .Ar max | |
456 most recent clients. | |
457 .It Ar max Ar thold | |
458 displays the most recent | |
459 .Ar max | |
460 clients that have made at least | |
461 .Ar thold | |
462 requests. | |
463 .It Ar addr Ns Op Ar /prefix | |
464 restricts the results to the DCC client with that IP address or | |
465 clients with addresses in that CIDR block. | |
466 .El | |
467 .Pp | |
468 The mechanism that implements this command involves | |
469 asking the DCC server for the first approximately 100 clients, then | |
470 the second about 100, and so on, | |
471 If entries change position in the complete list maintained by the server | |
472 between requests, | |
473 the displayed list will have duplicate or missing entries. | |
474 Only clients heard from since | |
475 .Ic stats clear | |
476 was last used are displayed. | |
477 .It Ic stop | |
478 tells the DCC server to exit. | |
479 .It Ic system stop | |
480 tells the DCC server to exit so that the operating system can be shut down. | |
481 This tells the DCC server on some systems to delete the dcc_db.hash file | |
482 to speed system shut down. | |
483 The file will be rebuilt automatically by | |
484 .Nm dbclean | |
485 when the DCC server is restarted. | |
486 .It Ic clean stop | |
487 tells the DCC server to exit after applying fsync() to the database. | |
488 .It Ic reload IDs | |
489 tells the local DCC server to reload its DCC | |
490 .Pa ids | |
491 file immediately. | |
492 This command is not strictly needed. | |
493 Every several minutes, the DCC server notices if the file has been changed | |
494 and automatically reads it. | |
495 .It Ic flood check | |
496 tells the DCC server to check for changes in the | |
497 .Pa flod | |
498 file and try to restart any of the streams to peers that are broken. | |
499 .It Ic flood shutdown | |
500 tells the DCC server to cleanly stop flooding checksums to and from peers. | |
501 The server will wait for sending and receiving peers to agree to stop. | |
502 Each | |
503 .Ic flood shutdown | |
504 or | |
505 .Ic flood halt | |
506 request increases a count of reasons why the server should not | |
507 flood checksums. | |
508 .It Ic flood halt | |
509 tells the DCC server to abruptly stop flooding checksums to and from peers. | |
510 .It Ic flood rewind Ar server-ID | |
511 tells the DCC server to ask its peer with | |
512 .Ar server-ID | |
513 to rewind and resend its stream of checksums. | |
514 .It Ic flood ffwd in Ar server-ID | |
515 tells the DCC server to ask its peer to "fast forward" or skip to | |
516 the end of the incoming flood. | |
517 .It Ic flood ffwd out Ar server-ID | |
518 tells the DCC server to "fast forward" or skip to the current end | |
519 of the flood to its peer. | |
520 .It Ic flood resume | |
521 tells the DCC server to reduce the number of reasons to | |
522 not flood checksums increased by | |
523 .Ic flood shutdown | |
524 and | |
525 .Ic flood halt. | |
526 When the number of reasons reaches zero, | |
527 the server tries to resume flooding. | |
528 .It Ic flood list | |
529 displays the list of current incoming and outgoing floods. | |
530 Each line contains the server-ID of the peer, | |
531 the IP address and port used for the outgoing flood, | |
532 the address for the incoming flood if different, | |
533 and the host name. | |
534 Only the server-IDs of flooding peers are disclosed with the server's ID. | |
535 .It Ic flood stats Xo | |
536 .Op Ic clear | |
537 .No { | |
538 .Ar server-ID | all | |
539 .No } | |
540 .Xc | |
541 displays counts of checksum reports sent and received by the current | |
542 flooding connections to and from | |
543 .Ar server-ID | |
544 or | |
545 .Ar all | |
546 flooding connections | |
547 and then optionally clears the counts. | |
548 .It Ic DB clean | |
549 is used by | |
550 .Nm dbclean | |
551 to tell the server that the database expiration has begun. | |
552 .It Ic DB new | |
553 is used by | |
554 .Nm dbclean | |
555 to tell the server that the database cleaning is complete. | |
556 .It Ic flush cache | |
557 tells the server to flush its cache and to keep it clean. | |
558 .It Ic cache ok | |
559 tells the server to resume normal operations after | |
560 .Ic flush cache . | |
561 .It Ic clock check | |
562 asks the DCC server to say how much its clock differs from the local clock. | |
563 .It Ic clock kludge +/-seconds | |
564 adjusts the timestamps in server commands to make it possible to | |
565 control servers with inaccurate clocks. | |
566 .It Ic trace Ar default | |
567 turns on | |
568 .Ar ANON | |
569 and | |
570 .Ar CLNT | |
571 tracing | |
572 and turns off all others. | |
573 .It Ic trace Ar mode {on|off} | |
574 turns the server's tracing | |
575 .Ar mode | |
576 on or off. | |
577 .Ar Mode | |
578 must be one of: | |
579 .Bl -tag -width FLOOD2 -offset 2n -compact | |
580 .It Ar ADMN | |
581 administrative requests from | |
582 .Nm | |
583 .It Ar ANON | |
584 errors by anonymous clients | |
585 .It Ar CLNT | |
586 errors by authenticated clients | |
587 .It Ar RLIM | |
588 rate-limited messages | |
589 .It Ar QUERY | |
590 all queries and reports | |
591 .It Ar RIDC | |
592 messages concerning the report-ID cache that is used | |
593 to detect duplicate reports from clients | |
594 .It Ar FLOOD | |
595 messages about inter-server flooding connections | |
596 .It Ar FLOOD2 | |
597 messages about flooded reports | |
598 .It Ar IDS | |
599 unknown server-IDs in flooded reports | |
600 .It Ar BL | |
601 blacklisted clients | |
602 .It Ar DB | |
603 odd database events | |
604 .It Ar WLIST | |
605 reports of whitelisted checksums from authenticated, not anonymous DCC clients | |
606 .El | |
607 .El | |
608 .Pp | |
609 .Nm | |
610 exits with 0 on success, | |
611 and >0 if an error occurs in operations specified on the command line. | |
612 .Sh FILES | |
613 .Bl -tag -width @prefix@ -compact | |
614 .It Pa @prefix@ | |
615 DCC home directory | |
616 .It Pa map | |
617 memory mapped file in the home DCC home directory of server host names, | |
618 port numbers, | |
619 passwords, measured round trip times (RTT), and so forth. | |
620 .It Pa ids | |
621 list of IDs and passwords, as described in | |
622 .Xr dccd 8 . | |
623 It is only required by systems running the DCC server, | |
624 but is used by | |
625 .Nm | |
626 if available. | |
627 .El | |
628 .Sh SEE ALSO | |
629 .Xr dbclean 8 , | |
630 .Xr dcc 8 , | |
631 .Xr dccd 8 , | |
632 .Xr dblist 8 , | |
633 .Xr dccifd 8 , | |
634 .Xr dccm 8 , | |
635 .Xr dccproc 8 , | |
636 .Xr dccsight 8 . | |
637 .Sh HISTORY | |
638 Implementation of | |
639 .Nm | |
640 was started at Rhyolite Software in 2000. | |
641 This document describes version 1.3.103. |