rarpd(8)rarpd(8)NAMErarpd - Reverse address resolution protocol (RARP) daemon
/usr/sbin/rarpd [interface] [-v] [-n] [-f filename]
Specifies the system's network interface. Causes rarpd to operate in
verbose mode. This option logs details of RARP to syslog. The instance
of a RARP request and its response are also logged. Disables checking
of the ethers(4) file. By default, rarpd checks the ethers file once
every ten minutes, and, if the file was modified, rarpd rereads the
file. If you specify the -n option rarpd scans the /etc/ethers file
once at startup time. Reads an alternate Ethernet address file.
The rarpd daemon maps the Ethernet address of a machine to the
machine's Internet Protocol (IP) address.
When rarpd is invoked, it reads the /etc/ethers file (by default) and
waits to process a RARP request. The /etc/ethers file is checked every
ten minutes for any changes. If the file has been modified, rarpd
reads it again. You can disable this feature with the -n option. You
can force a scan of the /etc/ethers file by sending the rarpd daemon a
SIGHUP signal. See signal(2) for more information on SIGHUP.
The format of the /etc/ethers file is described in ethers(4). You can
specify a file other than /etc/ethers with the -f option. The inter‐
face is the network interface on which the rarpd daemon should listen.
The command netstat -i shows the correct interface or interfaces for
your system. The rarpd daemon uses the first interface it finds, if you
do not specify an interface. See the netstat(1) reference page for
Because the rarpd daemon has been implemented with the Ethernet Packet
Filter (see packetfilter(7)), you must configure your kernel with the
packet filter option in order for rarpd to function properly. The
packet filter detects RARP broadcast packets and passes them to rarpd
for processing. The filter priority for rarpd is set to 28.
All messages from the rarpd daemon are directed to syslog.
The rarpd daemon ignores all ARP requests sent encapsulated within a
RARP packet. ARP requests are handled directly by the kernel.
The machine for which an IP address is being requested must be present
in the server's /etc/hosts file.
If the Packet Filter is not configured in your kernel, the following
message is displayed on the console window and logged to syslog: PACK‐
ETFILTER is not configured in /vmunix
Database that maps Ethernet addresses to hostnames
Commands: arp(8), ifconfig(8), syslogd(8)
Files: ethers(4), hosts(4), packetfilter(7)rarpd(8)