1 .\" $OpenBSD: routed.8,v 1.8 1997/01/28 07:16:41 deraadt Exp $
3 .\" Copyright (c) 1983, 1991, 1993
4 .\" The Regents of the University of California. All rights reserved.
6 .\" Redistribution and use in source and binary forms, with or without
7 .\" modification, are permitted provided that the following conditions
9 .\" 1. Redistributions of source code must retain the above copyright
10 .\" notice, this list of conditions and the following disclaimer.
11 .\" 2. Redistributions in binary form must reproduce the above copyright
12 .\" notice, this list of conditions and the following disclaimer in the
13 .\" documentation and/or other materials provided with the distribution.
14 .\" 3. All advertising materials mentioning features or use of this software
15 .\" must display the following acknowledgement:
16 .\" This product includes software developed by the University of
17 .\" California, Berkeley and its contributors.
18 .\" 4. Neither the name of the University nor the names of its contributors
19 .\" may be used to endorse or promote products derived from this software
20 .\" without specific prior written permission.
22 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 .\" @(#)routed.8 8.2 (Berkeley) 12/11/93
41 .Nd network RIP and router discovery routing daemon
48 .Ar net Ns Op /mask Ns Op ,metric
53 is a daemon invoked at boot time to manage the network
55 It uses Routing Information Protocol, RIPv1 (RFC\ 1058),
57 and Internet Router Discovery Protocol (RFC 1256)
58 to maintain the kernel routing table.
59 The RIPv1 protocol is based on the reference 4.3BSD daemon.
67 for Routing Information Protocol packets.
68 It also sends and receives multicast Router Discovery ICMP messages.
69 If the host is a router,
71 periodically supplies copies
72 of its routing tables to any directly connected hosts and networks.
73 It also advertise or solicits default routes using Router Discovery
76 When started (or when a network interface is later turned on),
78 uses an AF_ROUTE address family facility to find those
79 directly connected interfaces configured into the
80 system and marked "up".
81 It adds necessary routes for the interfaces
82 to the kernel routing table.
83 Soon after being first started, and provided there is at least one
84 interface on which RIP has not been disabled,
86 deletes all pre-existing
87 non-static routes in kernel table.
88 Static routes in the kernel table are preserved and
89 included in RIP responses if they have a valid RIP metric
93 If more than one interface is present (not counting the loopback interface),
94 it is assumed that the host should forward packets among the
96 After transmitting a RIP
99 Router Discovery Advertisements or Solicitations on a new interface,
100 the daemon enters a loop, listening for
101 RIP request and response and Router Discover packets from other hosts.
107 formulates a reply based on the information maintained in its
111 packet generated contains a list of known routes, each marked
112 with a "hop count" metric (a count of 16 or greater is
113 considered "infinite").
114 Advertised metrics reflect the metric associated with interface
117 so setting the metric on an interface
118 is an effective way to steer traffic.
120 Responses do not contain routes with a first hop on the requesting
121 network to implement in part
123 Requests from query programs
126 are answered with the complete table.
128 The routing table maintained by the daemon
129 includes space for several gateways for each destination
130 to speed recovery from a failing router.
133 packets received are used to update the routing tables provided they are
134 from one of the several currently recognized gateways or
135 advertise a better metric than at least one of the existing
138 When an update is applied,
140 records the change in its own tables and updates the kernel routing table
141 if the best route to the destination changes.
142 The change in the kernel routing table is reflected in the next batch of
145 If the next response is not scheduled for a while, a
147 response containing only recently changed routes is sent.
149 In addition to processing incoming packets,
151 also periodically checks the routing table entries.
152 If an entry has not been updated for 3 minutes, the entry's metric
153 is set to infinity and marked for deletion.
154 Deletions are delayed until the route has been advertised with
155 an infinite metric to insure the invalidation
156 is propagated throughout the local internet.
160 Routes in the kernel table that are added or changed as a result
161 of ICMP Redirect messages are deleted after a while to minimize
163 When a TCP connection suffers a timeout,
166 which deletes all redirected routes
167 through the gateway involved, advances the age of all RIP routes through
168 the gateway to allow an alternate to be chosen, and advances of the
169 age of any relevant Router Discovery Protocol default routes.
171 Hosts acting as internetwork routers gratuitously supply their
172 routing tables every 30 seconds to all directly connected hosts
174 These RIP responses are sent to the broadcast address on nets that support
176 to the destination address on point-to-point links, and to the router's
177 own address on other networks.
178 If RIPv2 is enabled, multicast packets are sent on interfaces that
179 support multicasting.
181 If no response is received on a remote interface, if there are errors
182 while sending responses,
183 or if there are more errors than input or output (see
185 then the cable or some other part of the interface is assumed to be
186 disconnected or broken, and routes are adjusted appropriately.
189 .Em Internet Router Discovery Protocol
190 is handled similarly.
191 When the daemon is supplying RIP routes, it also listens for
192 Router Discovery Solicitations and sends Advertisements.
193 When it is quiet and only listening to other RIP routers, it
194 sends Solicitations and listens for Advertisements.
196 a good Advertisement, it stops listening for broadcast or multicast
198 It tracks several advertising routers to speed recovery when the
199 currently chosen router dies.
200 If all discovered routers disappear,
201 the daemon resumes listening to RIP responses.
203 While using Router Discovery (which happens by default when
204 the system has a single network interface and a Router Discover Advertisement
205 is received), there is a single default route and a variable number of
206 redirected host routes in the kernel table.
208 The Router Discover standard requires that advertisements
209 have a default "lifetime" of 30 minutes. That means should
210 something happen, a client can be without a good route for
211 30 minutes. It is a good idea to reduce the default to 45
213 .Fl P Cm rdisc_interval=45
214 on the command line or
215 .Cm rdisc_interval=45
222 facility described below to support "legacy" systems
223 that can handle neither RIPv2 nor Router Discovery.
225 By default, neither Router Discovery advertisements nor solicitations
226 are sent over point to point links (e.g. PPP).
235 to supply routing information.
236 This is the default if multiple network interfaces are present on which
237 RIP or Router Discovery have not been disabled, and if the kernel switch
240 is the opposite of the
244 Do not run in the background.
245 This option is meant for interactive use.
247 This flag is used on internetwork routers to offer a route
248 to the "default" destination.
252 and is present mostly for historical reasons.
255 on the command line or
259 since a larger metric
260 will be used, reducing the spread of the potentially dangerous
262 This is typically used on a gateway to the Internet,
263 or on a gateway that uses another routing protocol whose routes
264 are not reported to other local routers.
265 Notice that because a metric of 1 is used, this feature is
266 dangerous. It is more commonly accidently used to create chaos with routing
267 loop than to solve problems.
269 This causes host or point-to-point routes to not be advertised,
270 provided there is a network route going the same direction.
271 That is a limited kind of aggregation.
272 This option is useful on gateways to ethernets that have other gateway
273 machines connected with point-to-point links such as SLIP.
275 This causes the machine to advertise a host or point-to-point route to
276 its primary interface.
277 It is useful on multi-homed machines such as NFS servers.
278 This option should not be used except when the cost of
279 the host routes it generates is justified by the popularity of
281 It is effective only when the machine is supplying
282 routing information, because there is more than one interface.
287 option to the limited extent of advertising the host route.
289 do not ignore RIPv2 authentication if we do not care about RIPv2
291 This option is required for conformance with RFC 1723.
292 However, it makes no sense and breaks using RIP as a discovery protocol
293 to ignore all RIPv2 packets that carry authentication when this machine
294 does not care about authentication.
295 .It Fl T Ar tracefile
296 increases the debugging level to at least 1 and
297 causes debugging information to be appended to the trace file.
298 Note that because of security concerns, it is wisest to not run
300 routinely with tracing directed to a file.
302 increases the debugging level, which causes more information to be logged
303 on the tracefile specified with
306 The debugging level can be increased or decreased
314 .It Fl F Ar net[/mask][,metric]
315 minimize routes in transmissions via interfaces with addresses that match
317 and synthesizes a default route to this machine with the
319 The intent is to reduce RIP traffic on slow, point-to-point links
320 such as PPP links by replacing many large UDP packets of RIP information
321 with a single, small packet containing a "fake" default route.
324 is absent, a value of 14 is assumed to limit
325 the spread of the "fake" default route.
327 This is a dangerous feature that when used carelessly can cause routing
329 Notice also that more than one interface can match the specified network
334 is equivalent to adding the parameter
342 Any other argument supplied is interpreted as the name
343 of a file in which the actions of
349 appending the name of the trace file to the command.
352 also supports the notion of
360 is started, it reads the file
362 to find such distant gateways which may not be located using
363 only information from a routing socket, to discover if some
364 of the local gateways are
366 and to obtain other parameters.
367 Gateways specified in this manner should be marked passive
368 if they are not expected to exchange routing information,
369 while gateways marked active
370 should be willing to exchange RIP packets.
373 gateways are installed in the
374 kernel's routing tables once upon startup and are not included in
375 transmitted RIP responses.
377 Distant active gateways are treated like network interfaces.
378 RIP responses are sent
382 If no responses are received, the associated route is deleted from
383 the kernel table and RIP responses advertised via other interfaces.
384 If the distant gateway resumes sending RIP responses, the associated
387 Such gateways can be useful on media that do not support broadcasts
388 or multicasts but otherwise act like classic shared media like
389 Ethernets such as some ATM networks.
390 One can list all RIP routers reachable on the ATM network in
397 are also passive, but are not placed in the kernel
398 routing table nor are they included in routing updates.
399 The function of external entries is to indicate
400 that another routing process
401 will install such a route if necessary,
402 and that alternate routes to that destination should not be installed
405 Such entries are only required when both routers may learn of routes
406 to the same destination.
410 file is comprised of a series of lines, each in
411 one of the following formats or consist of parameters described below:
420 .Pf < Cm passive No \&|
431 .Pf < Cm passive No \&|
439 is the name of the destination network or host.
440 It may be a symbolic network name or an Internet address
441 specified in "dot" notation (see
443 (If it is a name, then it must either be defined in
449 must have been started before
453 is an optional number between 1 and 32 indicating the netmask associated
458 is the name or address of the gateway to which RIP responses should
462 is the hop count to the destination host or network.
465 .Ar " net nname/32 ".
472 must be present to indicate whether the gateway should be treated as
476 (as described above),
477 or whether the gateway is
479 to the scope of the RIP protocol.
481 Lines that start with neither "net" nor "host" must consist of one
482 or more of the following parameter settings, separated by commas or
485 .It Cm if Ns \&= Ns Ar ifname
486 indicates that the other parameters on the line apply to the interface
489 .It Cm subnet Ns \&= Ns Ar nname[/mask][,metric]
490 advertises a route to network
494 and the supplied metric (default 1).
495 This is useful for filling "holes" in CIDR allocations.
496 This parameter must appear by itself on a line.
498 Do not use this feature unless necessary. It is dangerous.
499 .It Cm passwd Ns \&= Ns Ar XXX
500 specifies a RIPv2 password that will be included on all RIPv2
501 responses sent and checked on all RIPv2 responses received.
502 The password must not contain any blanks, tab characters, commas
505 turns off aggregation of subnets in RIPv1 and RIPv2 responses.
507 turns off aggregation of networks into supernets in RIPv2 responses.
510 .Cm no_rip Cm no_rdisc .
512 disables all RIP processing on the specified interface.
513 If no interfaces are allowed to process RIP packets,
515 acts purely as a router discovery daemon.
518 .Cm no_ripv1_in no_ripv2_in no_ripv1_out no_ripv2_out .
520 Note that turning off RIP without explicitly turning on router
521 discovery advertisements with
527 to act as a client router discovery daemon, not advertising.
529 causes RIPv1 received responses to be ignored.
531 causes RIPv2 received responses to be ignored.
533 turns off RIPv1 output and causes RIPv2 advertisements to be
534 multicast when possible.
536 disables the Internet Router Discovery Protocol.
538 disables the transmission of Router Discovery Solicitations.
540 specifies that Router Discovery solicitations should be sent,
541 even on point-to-point links,
542 which by default only listen to Router Discovery messages.
544 disables the transmission of Router Discovery Advertisements
546 specifies that Router Discovery advertisements should be sent,
547 even on point-to-point links,
548 which by default only listen to Router Discovery messages
550 specifies that Router Discovery packets should be broadcast instead of
552 .It Cm rdisc_pref Ns \&= Ns Ar N
553 sets the preference in Router Discovery Advertisements to the integer
555 .It Cm rdisc_interval Ns \&= Ns Ar N
556 sets the nominal interval with which Router Discovery Advertisements
557 are transmitted to N seconds and their lifetime to 3*N.
558 .It Cm fake_default Ns \&= Ns Ar metric
559 has an identical effect to
560 .Fl F Ar net[/mask][,metric]
561 with the network and mask coming from the specified interface.
565 When RIPv2 routes are multicast, so that RIPv1 listeners cannot
566 receive them, this feature causes a RIPv1 default route to be
567 broadcast to RIPv1 listeners.
570 the default route is broadcast with a metric of 14.
571 That serves as a "poor man's router discovery" protocol.
574 Note that the netmask associated with point-to-point links (such as SLIP
575 or PPP, with the IFF_POINTOPOINT flag) is used by
577 to infer the netmask used by the remote system when RIPv1 is used.
580 .Bl -tag -width /etc/gateways -compact
591 .%T Internet Transport Protocols
593 .%Q Xerox System Integration Standard
596 It does not always detect unidirectional failures in network interfaces
597 (e.g., when the output side fails).