rarpd - Reverse address resolution protocol (RARP) daemon
/usr/sbin/rarpd [interface] [-v] [-n] [-f filename]
Specifies the system's network interface.
-v Causes rarpd to operate in verbose mode. This option logs details of
RARP to syslog. The instance of a RARP request and its response are
-n Disables checking of the ethers(4) file. By default, rarpd checks the
ethers file once every ten minutes, and, if the file was modified,
rarpd rereads the file. If you specify the -n option rarpd scans the
/etc/ethers file once at startup time.
Reads an alternate Ethernet address file.
The rarpd daemon maps the Ethernet address of a machine to the machine's
Internet Protocol (IP) address.
When rarpd is invoked, it reads the /etc/ethers file (by default) and waits
to process a RARP request. The /etc/ethers file is checked every ten
minutes for any changes. If the file has been modified, rarpd reads it
again. You can disable this feature with the -n option. You can force a
scan of the /etc/ethers file by sending the rarpd daemon a SIGHUP signal.
See signal(2) for more information on SIGHUP.
The format of the /etc/ethers file is described in ethers(4). You can
specify a file other than /etc/ethers with the -f option. The interface is
the network interface on which the rarpd daemon should listen. The command
netstat -i shows the correct interface or interfaces for your system. The
rarpd daemon uses the first interface it finds, if you do not specify an
interface. See the netstat(1) reference page for more information.
Because the rarpd daemon has been implemented with the Ethernet Packet
Filter (see packetfilter(7)), you must configure your kernel with the
packet filter option in order for rarpd to function properly. The packet
filter detects RARP broadcast packets and passes them to rarpd for process-
ing. The filter priority for rarpd is set to 28.
All messages from the rarpd daemon are directed to syslog.
The rarpd daemon ignores all ARP requests sent encapsulated within a RARP
packet. ARP requests are handled directly by the kernel.
The machine for which an IP address is being requested must be present in
the server's /etc/hosts file.
If the Packet Filter is not configured in your kernel, the following mes-
sage is displayed on the console window and logged to syslog:
PACKETFILTER is not configured in /vmunix
Database that maps Ethernet addresses to hostnames
Commands: arp(8), ifconfig(8), syslogd(8)
Files: ethers(4), hosts(4), packetfilter(7)