1 .\" $NetBSD: tftpd.8,v 1.21 2003/08/07 09:46:53 agc Exp $
3 .\" Copyright (c) 1983, 1991, 1993
4 .\" The Regents of the University of California. All rights reserved.
6 .\" Redistribution and use in source and binary forms, with or without
7 .\" modification, are permitted provided that the following conditions
9 .\" 1. Redistributions of source code must retain the above copyright
10 .\" notice, this list of conditions and the following disclaimer.
11 .\" 2. Redistributions in binary form must reproduce the above copyright
12 .\" notice, this list of conditions and the following disclaimer in the
13 .\" documentation and/or other materials provided with the distribution.
14 .\" 3. Neither the name of the University nor the names of its contributors
15 .\" may be used to endorse or promote products derived from this software
16 .\" without specific prior written permission.
18 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
19 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
22 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 .\" from: @(#)tftpd.8 8.1 (Berkeley) 6/4/93
39 Internet Trivial File Transfer Protocol server
52 is a server which supports the
54 Trivial File Transfer Protocol.
57 server operates at the port indicated in the
59 service description; see
61 The server is normally started by
66 does not require an account or password on the remote system.
67 Due to the lack of authentication information,
69 will allow only publicly readable files to be accessed.
70 Filenames beginning in ``\|\fB.\|.\fP\|/'' or
71 containing ``/\|\fB.\|.\fP\|/'' are not allowed.
72 Files may be written to only if they already exist and are publicly writable.
74 Note that this extends the concept of
77 all users on all hosts that can be reached through the network;
78 this may not be appropriate on all systems, and its implications
79 should be considered before enabling tftp service.
80 The server should have the user ID with the lowest possible privilege.
82 Access to files may be restricted by invoking
84 with a list of directories by including up to 20 pathnames
85 as server program arguments in
87 In this case access is restricted to files whose
88 names are prefixed by the one of the given directories.
89 The given directories are also treated as a search path for
90 relative filename requests.
93 .Bl -tag -width "directory"
95 Enable verbose debugging messages to
101 If this isn't specified, the gid is set to that of the
106 Enable insecure mode, no
109 Logs all requests using
112 Suppresses negative acknowledgement of requests for nonexistent
114 .It Fl s Ar directory
121 This is recommended for security reasons (so that files other than
124 directory aren't accessible).
125 If the remote host passes the directory name as part of the
126 file name to transfer, you may have to create a symbolic link
134 Change uid to that of
145 isn't also given, change the gid to that of
156 .%T "The TFTP Protocol (Revision 2)"
162 .%T "TFTP Option Extension"
168 .%T "TFTP Blocksize Option"
174 .%T "TFTP Timeout Interval and Transfer Size Options"
194 IPv6 support was implemented by WIDE/KAME project in 1999.
196 TFTP options were implemented by Wasabi Systems, Inc., in 2003,
197 and first appeared in
200 Files larger than 33488896 octets (65535 blocks) cannot be transferred
201 without client and server supporting blocksize negotiation (RFCs
204 Many tftp clients will not transfer files over 16744448 octets (32767 blocks).
205 .Sh SECURITY CONSIDERATIONS
212 flag in conjunction with the name of the directory that
213 contains the files that
215 will serve to remote hosts (e.g.,
217 This ensures that only the files that should be served
218 to remote hosts can be accessed by them.
220 Because there is no user-login or validation within
223 protocol, the remote site will probably have some
224 sort of file-access restrictions in place.
225 The exact methods are specific to each site and therefore
226 difficult to document here.