ypserv man page on HP-UX

Printed from http://www.polarhome.com/service/man/?qf=ypserv&af=0&tf=2&of=HP-UX

ypserv(1M)							    ypserv(1M)

NAME
       ypserv,	ypbind,	 ypxfrd	 -  Network  Information Service (NIS) server,
       binder, and transfer processes

SYNOPSIS
       log_file]

       log_file]

   Remarks
       The Network Information Service (NIS)  was  formerly  known  as	Yellow
       Pages  (YP).   The  functionality  remains  the same; only the name has
       changed.

DESCRIPTION
       The Network Information Service (NIS) provides a simple network	lookup
       service	consisting of databases and processes.	The databases are ndbm
       files in a directory tree rooted at (see ndbm(3X)).   These  files  are
       described  in  ypfiles(4).  The processes are which is the NIS database
       lookup server, and which is the NIS binder.  Both and are  daemon  pro‐
       cesses  activated at system startup time when the or variable is set to
       1, for and the variable is set to 1, for in the file.

       The NIS programmatic interface is described in ypclnt(3C).  Administra‐
       tive   tools  are  described  in	 ypwhich(1),  yppoll(1M),  yppush(1M),
       ypset(1M) and ypxfr(1M).	 Tools to see the contents of NIS maps	(data‐
       bases)  are  described in ypcat(1) and ypmatch(1).  Database generation
       and maintenance tools are described  in	makedbm(1M),  ypinit(1M),  and
       ypmake(1M).  The command to set or show the default NIS domain is which
       is described in domainname(1).

       The daemon transfers entire NIS maps in an efficient manner.  For  sys‐
       tems  that  use this daemon, map transfers will be faster, depending on
       the map.	 should be run on the master  server.	(see  ypxfr(1M))  will
       attempt	to  use	 first.	 If that fails, it will use the older transfer
       method.	The daemon is activated at system startup  time	 when  the  or
       variable is set to 1 in the file.

       The  daemon's  primary  function is to look up information in its local
       database of NIS maps.  It runs only on NIS  server  machines  providing
       data from NIS databases.

       The  operations	performed by are defined for the implementor by the YP
       Protocol Specification, and for the programmer by the header file  Com‐
       munication  to  and  from  is  by  means	 of RPC.  Lookup functions are
       described in ypclnt(3C) and are supplied as C-callable functions in the
       TI-RPC library

       These  four  functions: and perform a lookup on a specific map within a
       NIS domain.  The operation matches a key to a record  in	 the  database
       and returns its associated value.  The operation returns the first key-
       value pair (record) from the map, and can be used to enumerate (sequen‐
       tially  retrieve) the remainder of the records.	returns all records in
       the map to the requester as the response to a single RPC request.

       A number of special keys in the DBM files can alter the	way  in	 which
       operates.  The keys of interest are:

	      The presence of this key makes
		     forward  host lookups that cannot be satisfied by the DBM
		     files to a DNS server.

	      This key makes
		     answer only questions coming  from	 clients  on  reserved
		     ports.

	      This is a special key in the form
		     "YP_MULTI_hostname addr1, ..., addrN".
		     A	client	looking	 for  hostname	receives  the  closest
		     address.

       Two functions supply information about the map itself and not  the  map
       entries.	  These functions are and The order number is the time of last
       modification of a map.  The master name is the host name of the machine
       on  which  the master map is stored.  Both order number and master name
       exist in the map as special key-value pairs, but the  server  does  not
       return  these  through the normal lookup functions.  If you examine the
       map with or they are visible (see makedbm(1M)  or  yppoll(1M)).	 Other
       functions  are  used  within  the  NIS subsystem and are not of general
       interest to NIS clients.	 These include:

       The daemon remembers information that  lets  client  processes  on  its
       machine	communicate  with  a  process.	 The  daemon must run on every
       machine using NIS services, both NIS servers and clients.   The	daemon
       may  or may not be running on a NIS client machine, but it must be run‐
       ning somewhere on the network or be available through a gateway.

       The information that remembers is called a binding:  the association of
       a  NIS  domain name with the NIS server.	 This information is cached in
       the directory in the file called For example, if	 domain_name  is  then
       the information is cached in

       Client requests drive the binding process.  As a request for an unbound
       domain comes in, the process broadcasts on the  network,	 if  the  file
       does  not  exist, trying to find a process serving maps within that NIS
       domain.	If the binding should be established by broadcasting, at least
       one  process must exist on every network.  If the file is present, then
       will try to bind to one of the NIS servers in the order of its  listing
       in  the file. If was unable to bind to any one of the servers available
       in the list, it will try establishing a binding by  broadcasting.   The
       file,  containing  the  list of NIS servers is created by invoking with
       the option (see ypinit(1M)).  If is invoked with a option, will try  to
       establish  a binding by broadcast immaterial of the availability of the
       file that is, the option overrides the existence of  the	 file  Once  a
       binding	is  established for a client, it is given to subsequent client
       requests.  Execute to query the process (local and remote) for its cur‐
       rent binding (see ypwhich(1)).

       Bindings are verified before they are given to a client process.	 If is
       unable to transact with the process it is bound to, it marks the domain
       as  unbound,  tells  the client process that the domain is unbound, and
       tries to bind again.  Requests received	for  an	 unbound  domain  fail
       immediately.   Generally,  a bound domain is marked as unbound when the
       node running crashes or is overloaded.  In such a case,	binds  to  any
       NIS  server  (typically one that is less heavily loaded) that is avail‐
       able on the network.

       The daemon also accepts requests to set its binding  for	 a  particular
       domain.	 accesses the facility; it is for unsnarling messes and is not
       for casual use.

   Options
       recognizes the following options:

	      Log diagnostic and error messages to the file,
			     log_file.

			     If is started without the option, writes its mes‐
			     sages to if that file exists.

			     If is started without the option, writes its mes‐
			     sages directly to the system console,

			     Information logged to the file includes the  date
			     and  time	of  the	 message,  the	host name, the
			     process id and name of  the  function  generating
			     the  message,  and the message itself.  Note that
			     different services can share a  single  log  file
			     since  enough information is included to uniquely
			     identify each message.

	      The NIS service must approach the DNS for more host
			     information.  This requires the  existence	 of  a
			     correct  file  pointing at a machine running This
			     option  enables  DNS  forwarding  regardless   of
			     whether or not the flag is set in the hosts maps.
			     See makedbm(1M).  In the absence of an file, com‐
			     plains, but ignores the option.

	      Operate in the verbose mode, printing diagnostic
			     messages to stderr.

       recognizes the following options:

	      Log diagnostic and error messages to the file,
			     log_file.	See the description above.

	      Enable secure mode in
			     When  specified,  only  NIS  servers  bound  to a
			     reserved port are used.  This allows for a slight
			     increase  in  security  in	 completely controlled
			     environments, where there are no computers	 oper‐
			     ated by untrusted individuals.  It offers no sig‐
			     nificant  increase	 in  security.	 This	option
			     should  be used in conjunction with the broadcast
			     mode and is transport specific.

	      Allow	     to be used to change the binding (see ypset(1M)).
			     For  maximum security, this option should be used
			     only when debugging the  network  from  a	remote
			     machine.

	      Allow	     to	 be  issued from this machine (see ypset(1M)).
			     Security is based on IP address  checking,	 which
			     can be defeated on networks where untrusted indi‐
			     viduals may inject packets.  This option  is  not
			     recommended.

	      When	     is	 invoked  with this option, will try to estab‐
			     lish a binding by broadcast even though the  file
			     exists.  That  is, the option overrides the exis‐
			     tence of this file.

			     If is used in conjunction	with  the  or  option,
			     then  the	binds using the method and the binding
			     can be changed  by	 using	the  command.	If  is
			     invoked  with the or option, the NIS servers list
			     in the file is used for initial binding  and  the
			     binding can be changed by using the command.

WARNINGS
       NIS uses ndbm files to store maps. Therefore, it is subject to the 1024
       byte limitations described in the section of the ndbm(3X) man page.

       Starting with ONCplus version B.11.31.02, the NIS Version 1 protocol is
       no longer available.

AUTHOR
       and were developed by Sun Microsystems, Inc.

FILES
       This  file  caches  the	last  successful binding created for the given
       domain, domain_name, in order to to speed up the binding process.  When
       a  binding  is  requested,  this	 file is checked for validity and then
       used.

       This file is read by both
	      and at startup time.  It defines the hosts  and  networks	 which
	      are granted access to information in the served domain.

       This file is read by
	      It  contains  a list of IP addresses that will receive a binding
	      from.

       This file is read by
	      It contains the list of NIS servers that will  attempt  to  bind
	      to, if is not invoked with a option.

SEE ALSO
       domainname(1),	 ypcat(1),    ypmatch(1),   yppasswd(1),   ypwhich(1),
       makedbm(1M),  rpcinfo(1M),   ypinit(1M),	  ypmake(1M),	yppasswdd(1M),
       yppoll(1M), yppush(1M), ypset(1M), ypxfr(1M), ypclnt(3C), yppasswd(3N),
       ndbm(3X), ypfiles(4).

								    ypserv(1M)
[top]

List of man pages available for HP-UX

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net