Mercurial > notdcc
comparison dccd.html.in @ 0:c7f6b056b673
First import of vendor version
author | Peter Gervai <grin@grin.hu> |
---|---|
date | Tue, 10 Mar 2009 13:49:58 +0100 |
parents | |
children |
comparison
equal
deleted
inserted
replaced
-1:000000000000 | 0:c7f6b056b673 |
---|---|
1 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN"> | |
2 <HTML> | |
3 <HEAD> | |
4 <META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1"> | |
5 <TITLE>dccd.0.8</TITLE> | |
6 <META http-equiv="Content-Style-Type" content="text/css"> | |
7 <STYLE type="text/css"> | |
8 BODY {background-color:white; color:black} | |
9 ADDRESS {font-size:smaller} | |
10 IMG.logo {width:6em; vertical-align:middle} | |
11 </STYLE> | |
12 </HEAD> | |
13 <BODY> | |
14 <PRE> | |
15 <!-- Manpage converted by man2html 3.0.1 --> | |
16 <B><A HREF="dccd.html">dccd(8)</A></B> Distributed Checksum Clearinghouse <B><A HREF="dccd.html">dccd(8)</A></B> | |
17 | |
18 | |
19 </PRE> | |
20 <H2><A NAME="NAME">NAME</A></H2><PRE> | |
21 <B>dccd</B> -- Distributed Checksum Clearinghouse Daemon | |
22 | |
23 | |
24 </PRE> | |
25 <H2><A NAME="SYNOPSIS">SYNOPSIS</A></H2><PRE> | |
26 <B>dccd</B> [<B>-64dVbfFQ</B>] <B>-i</B> <I>server-ID</I> [<B>-n</B> <I>brand</I>] [<B>-h</B> <I>homedir</I>] <B>-I</B> [<I>host-ID</I>][<I>,user</I>] | |
27 [<B>-a</B> [<I>server-addr</I>][<I>,server-port</I>]] [<B>-q</B> <I>qsize</I>] | |
28 [<B>-G</B> [<I>on,</I>][<I>weak-body,</I>][<I>weak-IP,</I>][<I>embargo</I>][<I>,window</I>][<I>,white</I>]] | |
29 [<B>-W</B> [<I>rate</I>][<I>,chg</I>][<I>,dbsize</I>]] [<B>-K</B> [<I>no-</I>]<I>type</I>] [<B>-T</B> <I>tracemode</I>] | |
30 [<B>-u</B> <I>anon-delay</I>[<I>*inflate</I>]] [<B>-C</B> <I>dbclean</I>] [<B>-L</B> <I>ltype,facility.level</I>] | |
31 [<B>-R</B> [<I>RL</I><B>_</B><I>SUB</I>],[<I>RL</I><B>_</B><I>ANON</I>],[<I>RL</I><B>_</B><I>ALL</I><B>_</B><I>ANON</I>],[<I>RL</I><B>_</B><I>BUGS</I>]] | |
32 | |
33 | |
34 </PRE> | |
35 <H2><A NAME="DESCRIPTION">DESCRIPTION</A></H2><PRE> | |
36 <B>Dccd</B> receives reports of checksums related to mail received by DCC | |
37 clients and queries about the total number of reports of particular | |
38 checksums. A DCC server never receives mail, address, headers, or other | |
39 information from clients, but only cryptographically secure checksums of | |
40 such information. A DCC server cannot determine the text or other infor- | |
41 mation that corresponds to the checksums it receives. It only acts as a | |
42 clearinghouse of total counts of checksums computed by clients. | |
43 | |
44 Each DCC server or close cluster of DCC servers is identified by a | |
45 numeric <I>server-ID</I>. Each DCC client is identified by a <I>client-ID</I>, either | |
46 explicitly listed in the <I>ids</I> file or the special anonymous client-ID. | |
47 Many computers are expected to share a single <I>client-ID</I>. A <I>server-ID</I> is | |
48 less than 32768 while a <I>client-ID</I> is between 32768 and 16777215. DCC | |
49 server-IDs need be known only to DCC servers and the people running them. | |
50 The passwords associated with DCC server-IDs should be protected, because | |
51 DCC servers listen to commands authenticated with server-IDs and their | |
52 associated passwords. Each client that does not use the anonymous ID | |
53 must know the client-ID and password used by each of its servers. A sin- | |
54 gle client computer can use different passwords with different server | |
55 computers. See the <I>ids</I> file. | |
56 | |
57 A whitelist of known good (or bad) sources of email prevents legitimate | |
58 mailing lists from being seen as unsolicited bulk email by DCC clients. | |
59 The whitelist used by a DCC server is built into the database when old | |
60 entries are removed by <B><A HREF="dbclean.html">dbclean(8)</A></B>. Each DCC client has its own, local | |
61 whitelist, and in general, whitelists work better in DCC clients than | |
62 servers. | |
63 | |
64 The effectiveness of a Distributed Checksum Clearinghouse increases as | |
65 the number of subscribers increases. Flooding reports of checksums among | |
66 DCC servers increases the effective number of subscribers to each server. | |
67 Each <B>dccd</B> daemon tries to maintain TCP/IP connections to the other | |
68 servers listed in the <I>flod</I> file, and send them reports containing check- | |
69 sums with total counts exceeding thresholds. Changes in the <I>flod</I> file | |
70 are noticed automatically within minutes. | |
71 | |
72 Controls on report flooding are specified in the <I>flod</I> file. Each line | |
73 specifies a hostname and port number to which reports should be flooded, | |
74 a server-ID to identify and authenticate the output stream, a server-ID | |
75 to identify and authenticate an input stream from the same server, and | |
76 flags with each ID. The ability to delete reports of checksums is handy, | |
77 but could be abused. If <I>del</I> is not present among the <I>in-opts</I> options for | |
78 the incoming ID, incoming delete requests are logged and then ignored. | |
79 Floods from DCC "brands" that count only mail to spam traps and whose | |
80 servers use the <B>-Q</B> option to count extremely bulk mail should be marked | |
81 with <I>traps</I>. They can be seen as counting millions of targets, so the | |
82 <I>traps</I> flag on their <I>flod</I> file entry changes their incoming flooded | |
83 reports counts to <I>many.</I> | |
84 | |
85 <B>Dccd</B> automatically checks its <I>flod</I> and <I>ids</I> files periodically. <B><A HREF="cdcc.html">Cdcc(8)</A></B> | |
86 has the commands <B>new ids</B> and <B>flood check</B> to tell <B>dccd</B> to check those two | |
87 files immediately. Both files are also checked for changes after the | |
88 SIGHUP signal. | |
89 | |
90 <A NAME="OPTIONS"><B>OPTIONS</B></A> | |
91 The following options are available: | |
92 | |
93 <A NAME="OPTION-6"><B>-6</B></A> enable IPv6. The default is equivalent to <B>-4</B>. See also the IPv4 | |
94 and IPv6 options in the <I>flod</I> file description below and the <I>IPv6</I> <I>on</I> | |
95 <B><A HREF="cdcc.html">cdcc(8)</A></B> command. | |
96 | |
97 <A NAME="OPTION-4"><B>-4</B></A> disable IPv6. See also <B>-6</B>. | |
98 | |
99 <A NAME="OPTION-d"><B>-d</B></A> enables debugging output. Additional <B>-d</B> options increase the number | |
100 of messages. | |
101 | |
102 <A NAME="OPTION-V"><B>-V</B></A> displays the version of the DCC server daemon. | |
103 | |
104 <A NAME="OPTION-b"><B>-b</B></A> causes the server to not detach itself from the controlling tty or | |
105 put itself into the background. | |
106 | |
107 <A NAME="OPTION-F"><B>-F</B></A> uses write() instead of mmap() in some cases to modify the DCC data- | |
108 base. It is the default on Solaris. | |
109 | |
110 <A NAME="OPTION-f"><B>-f</B></A> turns off <B>-F</B>. | |
111 | |
112 <A NAME="OPTION-Q"><B>-Q</B></A> causes the server to treat reports of checksums as queries except | |
113 from DCC clients marked trusted in the <I>ids</I> file with <I>rpt-ok</I>. See <B>-u</B> | |
114 to turn off access by anonymous or unauthenticated clients | |
115 | |
116 <A NAME="OPTION-i"><B>-i</B></A> <I>server-ID</I> | |
117 specifies the ID of this DCC server. Each server identifies itself | |
118 as responsible for checksums that it forwards to other servers. | |
119 | |
120 <A NAME="OPTION-n"><B>-n</B></A> <I>brand</I> | |
121 is an arbitrary string of letters and numbers that identifies the | |
122 organization running the DCC server. The brand is required, and | |
123 appears in the SMTP <I>X-DCC</I> headers generated by the DCC. | |
124 | |
125 <A NAME="OPTION-h"><B>-h</B></A> <I>homedir</I> | |
126 overrides the default DCC home directory, <I>@prefix@</I>. | |
127 | |
128 <A NAME="OPTION-I"><B>-I</B></A> [<I>host-ID</I>][<I>,user</I>] | |
129 changes the server's globally unique identity for flooding from the | |
130 default value consisting of the first 16 characters of the host | |
131 name. or changes the UID and GID of the process <I>Host-ID</I> is a string | |
132 of up to 16 characters that replaces the first 16 characters of the | |
133 system's hostname in assertions of the server-ID that are flooded to | |
134 peers. <I>User</I> must be valid user name. | |
135 | |
136 <A NAME="OPTION-a"><B>-a</B></A> [<I>server-addr</I>][<I>,server-port</I>] | |
137 adds an hostname or IP address to the list of local IP addresses | |
138 that the server answers. Multiple <B>-a</B> options can be used to specify | |
139 a subset of the available network interfaces or to use more than one | |
140 port number. The default without any <B>-a</B> options is to listen on all | |
141 local IP addresses. It can be useful to list some of the IP | |
142 addresses of multi-homed hosts to deal with firewalls. By default | |
143 <I>server-port</I> is 6277 for DCC servers and 6276 for Greylist servers. | |
144 It is the UDP port at which DCC requests are received and the TCP | |
145 port for incoming floods of reports. | |
146 | |
147 If <I>server-addr</I> is absent and if the <B>getifaddrs(8)</B> function is sup- | |
148 ported, separate UDP sockets are bound to each configured network | |
149 interface so that each DCC clients receives replies from the IP | |
150 addresses to which corresponding request are sent. If <B>dccd</B> is | |
151 started before all network interfaces are turned on or there are | |
152 interfaces that are turned on and off or change their addresses such | |
153 as PPP interfaces, then the special string <I>@</I> should be used to tell | |
154 <B>dccd</B> to bind to an IN_ADDRANY UDP socket. | |
155 | |
156 Outgoing TCP connections to flood checksum reports to other DCC | |
157 servers used the IP address of a single <B>-a</B> option, but only if there | |
158 is single option that is not localhost. See also the <I>flod</I> file. | |
159 | |
160 <A NAME="OPTION-q"><B>-q</B></A> <I>qsize</I> | |
161 specifies the maximum size of the queue of requests from anonymous | |
162 or unauthenticated clients. The default value is the maximum DCC | |
163 RTT in seconds times 200 or 1000. | |
164 | |
165 <A NAME="OPTION-G"><B>-G</B></A> [<I>on,</I>][<I>weak-body,</I>][<I>weak-IP,</I>][<I>embargo</I>][<I>,window</I>][<I>,white</I>] | |
166 changes <B>dccd</B> to a Greylist server for <B><A HREF="dccm.html">dccm(8)</A></B> or <B><A HREF="dccifd.html">dccifd(8)</A></B>. | |
167 Greylisting consists of temporarily rejecting or embargoing mail | |
168 from unfamiliar combinations of SMTP client IP address, SMTP enve- | |
169 lope sender, and SMTP envelope recipient. If the SMTP client per- | |
170 sists for <I>embargo</I> <I>seconds</I> and so is probably not an open proxy, | |
171 worm-infected personal computer, or other transient source of spam, | |
172 the triple of <I>(IP</I> <I>address,sender,recipient)</I> is added to a database | |
173 similar to the usual DCC database. If the SMTP client does not try | |
174 again after <I>embargo</I> seconds and before <I>window</I> seconds after the | |
175 first attempt, the triple is forgotten. If the SMTP client persists | |
176 past the embargo, the triple is added to the database and becomes | |
177 familiar and the message is accepted. Familiar triples are remem- | |
178 bered for <I>white</I> seconds after the last accepted mail message. The | |
179 triple is forgotten if it is ever associated with unsolicited bulk | |
180 email. | |
181 | |
182 All three durations can be a number of minutes, hours, days, or | |
183 weeks followed by <I>MINUTES</I>, <I>M</I>, <I>HOURS</I>, <I>H</I>, <I>DAYS</I>, <I>D</I>, <I>WEEKS</I> or <I>W</I>. The | |
184 default is <B>-G</B> <I>270seconds,7days,63days</I>. The first duration or the | |
185 <I>embargo</I> should be longer than open proxies can linger retransmit- | |
186 ting. The second <I>window</I> time should be as long as legitimate mail | |
187 servers persist in retransmitting to recognize embargoed messages | |
188 whose retransmissions were not received because of network or other | |
189 problems. The <I>white</I> time should be long enough to recognize and not | |
190 embargo messages from regular senders. | |
191 | |
192 Usually the DCC greylist system requires that an almost identical | |
193 copy of the message be retransmitted during the <I>embargo</I>. If | |
194 <I>weak-body</I> is present, any message with the same triple of sender IP | |
195 address, sender mail address, and target mail address ends the | |
196 embargo, even if the body of the message differs. | |
197 | |
198 If <I>weak-IP</I> is present, all mail from an SMTP client at an IP address | |
199 is accept after any message from the same IP address has been | |
200 accepted. | |
201 | |
202 Unlike DCC checksums, the contents of greylist databases are private | |
203 and do not benefit from broad sharing. However, large installations | |
204 can use more two or more greylist servers flooding triples among | |
205 themselves. Flooding among greylist servers is controlled by the | |
206 <I>grey</I><B>_</B><I>flod</I> file. | |
207 | |
208 All greylist cooperating or flooding greylist servers <I>must</I> use the | |
209 same <B>-G</B> values. | |
210 | |
211 Clients of greylist servers cannot be anonymous and must have | |
212 client-IDs and passwords assigned in the <I>ids</I> file. This implies | |
213 that cdcc commands directed to greylist servers must specify the | |
214 server-ID. | |
215 | |
216 White- and blacklists are honored by the DCC clients. whitelisted | |
217 messages are embargoed or checked with a greylist server. The | |
218 greylist triples of blacklisted messages, messages whose DCC counts | |
219 make them spam, and other messages known to be spam are sent to a | |
220 greylist server to be removed from the greylist database and cause | |
221 an embargo on the next messages with those triples. | |
222 | |
223 Messages whose checksums match greylist server whitelists are not | |
224 embargoed and the checksums of their triples are not added to the | |
225 greylist database. | |
226 | |
227 The target counts of embargoed messages are reported to the DCC net- | |
228 work to improve the detection of bulk mail. | |
229 | |
230 <A NAME="OPTION-W"><B>-W</B></A> [<I>rate</I>][<I>,chg</I>][<I>,dbsize</I>] | |
231 controls quick database cleaning. If the database is larger than | |
232 <I>dbsize</I>, it seems that the database has not recently and is not about | |
233 to be cleaned, <B>dccd</B> is receiving fewer than <I>rate</I> requests per sec- | |
234 ond, and if telling DCC clients that the database is about to be | |
235 cleaned reduces that rate by <I>chg</I>%, then <B>dccd</B> starts <B><A HREF="dbclean.html">dbclean(8)</A></B> for a | |
236 quick database cleaning. The cleaning is abandoned if it takes too | |
237 long. The default values are equivalent to <B>-W</B> <I>1.0,40.0,RSS</I> where | |
238 <I>RSS</I> is the maximum dccd resident set displayed the system log by <B>-d</B> | |
239 when <B>starts</B>. | |
240 | |
241 <A NAME="OPTION-K"><B>-K</B></A> [<I>no-</I>]<I>type</I> | |
242 marks checksums of <I>type</I> (not) be kept or counted in the database | |
243 unless they appear in the whitelist. Explicit settings add to or | |
244 remove from the initial contents of the list, which is equivalent to | |
245 <B>-K</B> <I>Body</I> <B>-K</B> <I>Fuz1</I> <B>-K</B> <I>Fuz2</I>. | |
246 | |
247 <A NAME="OPTION-T"><B>-T</B></A> <I>tracemode</I> | |
248 causes the server to trace or record some operations. <I>tracemode</I> | |
249 must be one of the following: | |
250 <I>ADMN</I> administrative requests from the control program, <B><A HREF="cdcc.html">cdcc(8)</A></B> | |
251 <I>ANON</I> errors by anonymous clients | |
252 <I>CLNT</I> errors by authenticated clients | |
253 <I>RLIM</I> rate-limited messages | |
254 <I>QUERY</I> all queries and reports | |
255 <I>RIDC</I> some messages concerning the report-ID cache that is used | |
256 to detect duplicate reports from clients | |
257 <I>FLOOD</I> messages about inter-server flooding connections | |
258 <I>FLOOD2</I> messages about flooded reports | |
259 <I>IDS</I> unknown server-IDs in flooded reports | |
260 <I>BL</I> requests from clients in the <I>blacklist</I> file. | |
261 <I>DB</I> odd database events including long chains of duplicate | |
262 checksums | |
263 <I>WLIST</I> reports of whitelisted checksums from authenticated, not | |
264 anonymous DCC clients | |
265 The default is <I>ANON</I> <I>CLNT</I>. | |
266 | |
267 <A NAME="OPTION-u"><B>-u</B></A> <I>anon-delay</I>[<I>*inflate</I>] | |
268 changes the number of milliseconds anonymous or unauthenticated | |
269 clients must wait for answers to their queries and reports. The | |
270 purpose of this delay is to discourage large anonymous clients. The | |
271 <I>anon-delay</I> is multiplied by 1 plus the number of recent anonymous | |
272 requests from an IP address divided by the <I>inflate</I> value. | |
273 | |
274 The string <I>FOREVER</I> turns off all anonymous or unauthenticated access | |
275 not only for checksum queries and reports but also <B><A HREF="cdcc.html">cdcc(8)</A> stats</B> | |
276 requests. A missing value for <I>inflate</I> turns off inflation. | |
277 | |
278 The default value is <I>50,none</I>, except when <B>-G</B> is used in which case | |
279 <I>FOREVER</I> is assumed and required. | |
280 | |
281 <A NAME="OPTION-C"><B>-C</B></A> <I>dbclean</I> | |
282 changes the default name or path of the program used to rebuild the | |
283 hash table when it becomes too full. The default value is | |
284 <I>@libexecdir@/dbclean</I> in the <I>@libexecdir@</I> directory. The | |
285 value can include arguments as in <I>-C</I> <I>'$DCC</I><B>_</B><I>LIBEXEC/dbclean</I> <I>-F'</I>. | |
286 | |
287 Dbclean <I>should</I> <I>not</I> be run by <B>dccd</B> except in emergencies such as | |
288 database corruption or hash table overflow. <B><A HREF="dbclean.html">Dbclean(8)</A></B> should be | |
289 run daily with the @libexecdir@/cron-dccd cron script | |
290 | |
291 <A NAME="OPTION-L"><B>-L</B></A> <I>ltype,facility.level</I> | |
292 specifies how messages should be logged. <I>Ltype</I> must be <I>error</I>, <I>info</I>, | |
293 or <I>off</I> to indicate which of the two types of messages are being con- | |
294 trolled or to turn off all <B>syslog(3)</B> messages from <B>dccd</B>. <I>Level</I> must | |
295 be a <B>syslog(3)</B> level among <I>EMERG</I>, <I>ALERT</I>, <I>CRIT</I>, <I>ERR</I>, <I>WARNING</I>, <I>NOTICE</I>, | |
296 <I>INFO</I>, and <I>DEBUG</I>. <I>Facility</I> must be among <I>AUTH</I>, <I>AUTHPRIV</I>, <I>CRON</I>, | |
297 <I>DAEMON</I>, <I>FTP</I>, <I>KERN</I>, <I>LPR</I>, <I>MAIL</I>, <I>NEWS</I>, <I>USER</I>, <I>UUCP</I>, and <I>LOCAL0</I> through | |
298 <I>LOCAL7</I>. The default is equivalent to | |
299 <B>-L</B> <I>info,MAIL.NOTICE</I> <B>-L</B> <I>error,MAIL.ERR</I> | |
300 | |
301 <A NAME="OPTION-R"><B>-R</B></A> [<I>RL</I><B>_</B><I>SUB</I>],[<I>RL</I><B>_</B><I>ANON</I>],[<I>RL</I><B>_</B><I>ALL</I><B>_</B><I>ANON</I>],[<I>RL</I><B>_</B><I>BUGS</I>] | |
302 sets one or more of the four rate-limits. <I>RL</I><B>_</B><I>SUB</I> limits the number | |
303 of DCC transactions per second from subscribers or DCC clients with | |
304 known client-IDs and passwords. This limit applies to each IP | |
305 address independently. | |
306 | |
307 <I>RL</I><B>_</B><I>ANON</I> limits the number of DCC transactions per second from anony- | |
308 mous DCC clients. This limit applies to each IP address indepen- | |
309 dently. It is better to use <B>-u</B> than to change this value to exclude | |
310 anonymous clients. | |
311 | |
312 <I>RL</I><B>_</B><I>ALL</I><B>_</B><I>ANON</I> limits the number of DCC transactions per second from | |
313 all anonymous DCC clients. This limit applies to all anonymous | |
314 clients as a group, regardless of their IP addresses. | |
315 | |
316 <I>RL</I><B>_</B><I>BUGS</I> limits the number of complaints or error messages per second | |
317 for all anonymous DCC clients as a group as well as for each DCC | |
318 client by IP address. | |
319 | |
320 The default is equivalent to <B>-R</B> <I>400,50,600,0.1</I> | |
321 | |
322 | |
323 </PRE> | |
324 <H2><A NAME="FILES">FILES</A></H2><PRE> | |
325 <A NAME="FILE-@prefix@">@prefix@</A> is the DCC home directory containing data and control files. | |
326 <A NAME="FILE-dcc_db">dcc_db</A> is the database of mail checksums. | |
327 <A NAME="FILE-dcc_db.hash">dcc_db.hash</A> is the mail checksum database hash table. | |
328 <A NAME="FILE-grey_db">grey_db</A> is the database of greylist checksums. | |
329 <A NAME="FILE-grey_db.hash">grey_db.hash</A> is the greylist database hash table. | |
330 <A NAME="FILE-flod">flod</A> contains lines controlling DCC flooding of the form: | |
331 <I>host</I>[<I>,rport</I>][<I>;src</I>[<I>,lport</I>]] <I>rem-ID</I> [<I>passwd-ID</I> [<I>o-opt</I> [<I>i-opt</I>]]] | |
332 where absent optional values are signaled with "-" and | |
333 <I>host</I> is the IP address or name of a DCC server and <I>rport</I> is | |
334 the name or number of the TCP port used by the remote | |
335 server. | |
336 <I>src</I> and <I>lport</I> are the IP address or host name and TCP port | |
337 from which the outgoing flooding connection should come. | |
338 Incoming flooding connections must arrive at an address | |
339 and port specified with <B>-a</B>. | |
340 <I>rem-id</I> is the server-ID of the remote DCC server. | |
341 <I>passwd-ID</I> is a server-ID that is not assigned to a server, but | |
342 whose first password is used to sign checksum reports sent | |
343 to the remote system. Either of its passwords are | |
344 required with incoming reports. If it is absent or "-", | |
345 outgoing floods are signed with the first password of the | |
346 local server in the <I>ids</I> file and incoming floods must be | |
347 signed with either password of the remote server-ID. | |
348 <I>i-opt</I> and <I>o-opt</I> are comma separated lists of | |
349 <I>off</I> turns off flooding to the remote or local system. | |
350 <I>traps</I> indicates that the remote sending or local receiv- | |
351 ing system has only spam traps. | |
352 <I>no-del</I> says checksum delete requests are refused by the | |
353 remote or local server and so turns off sending or | |
354 accepting delete requests, respectively. By default, | |
355 delete requests are sent to remote servers and | |
356 accepted in incoming floods if and only if the peers | |
357 are exchanging DCC reputations. | |
358 <I>del</I> says delete requests are accepted by the remote or | |
359 local server. | |
360 <I>no-log-del</I> turns off logging of incoming requests to | |
361 delete checksums. | |
362 <I>passive</I> is used to tell a server outside a firewall to | |
363 expect a peer inside to create both of the pair of | |
364 input and output TCP connections used for flooding. | |
365 The peer inside the firewall should use <I>SOCKS</I> or <I>NAT</I> | |
366 on its <I>flod</I> file entry for this system. | |
367 <I>SOCKS</I> is used to tell a server inside a firewall that it | |
368 should create both of the TCP connections used for | |
369 flooding and that SOCKS protocol should be used. The | |
370 peer outside the firewall should use <I>passive</I> on its | |
371 <I>flod</I> file entry for this system. | |
372 <I>NAT</I> differs from <I>SOCKS</I> only by not using the SOCKS proto- | |
373 col. | |
374 <I>ID1->ID2</I> converts server-ID <I>ID1</I> in flooded reports to | |
375 server-ID <I>ID2</I>. Either <I>ID1</I> or <I>ID2</I> may be the string | |
376 `self' to specify the server's own ID. <I>ID1</I> can be | |
377 the string `all' to specify all server-IDs or a pair | |
378 of server-IDs separated by a dash to specify an | |
379 inclusive range. <I>ID2</I> can be the string `ok' to send | |
380 or receive reports without translation or the string | |
381 `reject' to not send outgoing or refuse incoming | |
382 reports. Only the first matching conversion is | |
383 applied. For example, when `self->ok,all->reject' is | |
384 applied to a locally generated report, the first con- | |
385 version is applied and the second is ignored. | |
386 <I>leaf=path-len</I> does not send reports with paths longer | |
387 than <I>path-len</I> server-IDs. | |
388 <I>IPv4</I> overrides a <B>-6</B> setting for this flooding peer. | |
389 <I>IPv6</I> overrides the default or an explicit <B>-4</B> setting. | |
390 <I>vers</I> specifies the version of the DCC flooding protocol | |
391 used by the remote DCC server with a string such as | |
392 `version2'. | |
393 <I>trace</I> sends information about a single peer like the | |
394 <B><A HREF="cdcc.html">cdcc(8)</A></B> command <B>trace FLOOD on</B> does for all peers. | |
395 <I>trace2</I> sends information about individual flooded reports | |
396 like the <B><A HREF="cdcc.html">cdcc(8)</A></B> command <B>trace FLOOD2 on</B> does for all | |
397 peers. | |
398 <A NAME="FILE-grey_flod">grey_flod</A> is the equivalent of <I>flod</I> used by <B>dccd</B> when it is a greylist | |
399 server. | |
400 <A NAME="FILE-flod.map">flod.map</A> is an automatically generated file in which <B>dccd</B> records its | |
401 progress sending or flooding reports to DCC peers. | |
402 <A NAME="FILE-grey_flod.map">grey_flod.map</A> is the equivalent of <I>flod.map</I> <I>used</I> <I>by</I> <B>dccd</B> when it is a | |
403 greylist server. | |
404 <A NAME="FILE-ids">ids</A> contains the IDs and passwords known by the DCC server. An <I>ids</I> | |
405 file that can be read by others cannot be used. It contains | |
406 blank lines, comments starting with "#" and lines of the form: | |
407 <I>id</I>[<I>,rpt-ok</I>][<I>,delay=ms</I>[<I>*inflate</I>]] <I>passwd1</I> [<I>passwd2</I>] | |
408 where | |
409 <I>id</I> is a DCC <I>client-ID</I> or <I>server-ID</I>. | |
410 <I>Rpt-ok</I> if present overrides <B>-Q</B> by saying that this client is | |
411 trusted to report only checksums for unsolicited bulk | |
412 mail. | |
413 <I>delay=ms</I>[<I>*inflate</I>] delays answers to systems using the client | |
414 <I>id</I>. The <I>delay</I> in milliseconds is multiplied by 1 plus the | |
415 number of recent requests from an IP address using <I>id</I> | |
416 divided by the <I>inflate</I> value. See <B>-u</B>. | |
417 <I>passwd1</I> is the password currently used by clients with identi- | |
418 fier <I>id</I>. It is a 1 to 32 character string that does not | |
419 contain blank, tab, newline or carriage return characters. | |
420 | |
421 <I>passwd2</I> is the optional next password that those clients will | |
422 use. A DCC server accepts either password if both are | |
423 present in the file. | |
424 Both passwords can be absent if the entry not used except to | |
425 tell <B>dccd</B> that server-IDs in the flooded reports are valid. | |
426 The string <I>unknown</I> is equivalent to the null string. | |
427 <A NAME="FILE-whitelist">whitelist</A> contains the DCC server whitelist. It is not used directly but | |
428 is loaded into the database when <B><A HREF="dbclean.html">dbclean(8)</A></B> is run. | |
429 <A NAME="FILE-grey_whitelist">grey_whitelist</A> contains the greylist server whitelist. It is not used | |
430 directly but is loaded into the database when <B><A HREF="dbclean.html">dbclean(8)</A></B> is run | |
431 with <B>-G</B>. | |
432 <A NAME="FILE-blacklist">blacklist</A> if present, contains a list of IP addresses and blocks of IP | |
433 addresses DCC clients that are ignored. Each line in the file | |
434 should be blank, a comment starting with '#', or an IP address | |
435 or block of IP addresses in the form | |
436 [<I>trace,</I>] [<I>ok,</I>] [<I>bad</I>] xxx.xxx.xxx.xxx[/yy] | |
437 Changes to the file are automatically noticed and acted upon | |
438 within a few minutes. Addresses or blocks of addresses can be | |
439 preceded with <I>ok</I> to "punch holes" in blacklisted blocks or with | |
440 <I>trace</I> to log activity. This mechanism is intended for no more | |
441 than a few dozen blocks of addresses. | |
442 <A NAME="FILE-dccd_clients">dccd_clients</A> contains client IP addresses and activity counts. | |
443 <A NAME="FILE-grey_clients">grey_clients</A> contains greylist client IP addresses and activity counts. | |
444 | |
445 | |
446 </PRE> | |
447 <H2><A NAME="EXAMPLES">EXAMPLES</A></H2><PRE> | |
448 <B>dccd</B> is usually started with other system daemons with something like the | |
449 script <I>@libexecdir@/rcDCC</I>. That scripts uses values in | |
450 @prefix@/dcc_conf to start the server. With the argument <I>stop</I>, | |
451 <I>@libexecdir@/rcDCC</I> can be used to stop the daemon. | |
452 | |
453 The database grows too large unless old reports are removed. <B><A HREF="dbclean.html">dbclean(8)</A></B> | |
454 should be run daily with the @libexecdir@/cron-dccd cron script | |
455 | |
456 | |
457 </PRE> | |
458 <H2><A NAME="SEE-ALSO">SEE ALSO</A></H2><PRE> | |
459 <B><A HREF="cdcc.html">cdcc(8)</A></B>, <B><A HREF="dcc.html">dcc(8)</A></B>, <B><A HREF="dbclean.html">dbclean(8)</A></B>, <B><A HREF="dblist.html">dblist(8)</A></B>, <B><A HREF="dccifd.html">dccifd(8)</A></B>, <B><A HREF="dccm.html">dccm(8)</A></B>, <B><A HREF="dccproc.html">dccproc(8)</A></B>. | |
460 <B><A HREF="dccsight.html">dccsight(8)</A></B>, | |
461 | |
462 | |
463 </PRE> | |
464 <H2><A NAME="HISTORY">HISTORY</A></H2><PRE> | |
465 <B>dccd</B> is based on an idea from Paul Vixie. It was designed and written at | |
466 Rhyolite Software, starting in 2000. This document describes version | |
467 1.3.103. | |
468 | |
469 February 26, 2009 | |
470 </PRE> | |
471 <HR> | |
472 <ADDRESS> | |
473 Man(1) output converted with | |
474 <a href="http://www.oac.uci.edu/indiv/ehood/man2html.html">man2html</a> | |
475 modified for the DCC $Date 2001/04/29 03:22:18 $ | |
476 <BR> | |
477 <A HREF="http://www.dcc-servers.net/dcc/"> | |
478 <IMG SRC="http://logos.dcc-servers.net/border.png" | |
479 class=logo ALT="DCC logo"> | |
480 </A> | |
481 <A HREF="http://validator.w3.org/check?uri=referer"> | |
482 <IMG class=logo ALT="Valid HTML 4.01 Strict" | |
483 SRC="http://www.w3.org/Icons/valid-html401"> | |
484 </A> | |
485 </ADDRESS> | |
486 </BODY> | |
487 </HTML> |