rarpd - Reverse address resolution protocol (RARP) daemon
/usr/sbin/rarpd [ interface ] [ -v ] [ -n ] [ -f filename ]
Specifies the system's network interface. Causes rarpd to operate in verbose mode. This option logs details of RARP to syslog. The instance of a RARP request and its response are also logged. Disables checking of the ethers(4) file. By default, rarpd checks the ethers file once every ten minutes, and, if the file was modified, rarpd rereads the file. If you specify the -n option rarpd scans the /etc/ethers file once at startup time. Reads an alternate Ethernet address file.
The rarpd daemon maps the Ethernet address of a machine to the machine's Internet Protocol (IP) address.
When rarpd is invoked, it reads the /etc/ethers file (by default) and waits to process a RARP request. The /etc/ethers file is checked every ten minutes for any changes. If the file has been modified, rarpd reads it again. You can disable this feature with the -n option. You can force a scan of the /etc/ethers file by sending the rarpd daemon a SIGHUP signal. See signal(2) for more information on SIGHUP.
The format of the /etc/ethers file is described in ethers(4). You can specify a file other than /etc/ethers with the -f option. The interface is the network interface on which the rarpd daemon should listen. The command netstat -i shows the correct interface or interfaces for your system. The rarpd daemon uses the first interface it finds, if you do not specify an interface. See the netstat(1) reference page for more information.
Because the rarpd daemon has been implemented with the Ethernet Packet Filter (see packetfilter(7)), you must configure your kernel with the packet filter option in order for rarpd to function properly. The packet filter detects RARP broadcast packets and passes them to rarpd for processing. The filter priority for rarpd is set to 28.
All messages from the rarpd daemon are directed to syslog.
The rarpd daemon ignores all ARP requests sent encapsulated within a RARP packet. ARP requests are handled directly by the kernel.
The machine for which an IP address is being requested must be present in the server's /etc/hosts file.
If the Packet Filter is not configured in your kernel, the following message is displayed on the console window and logged to syslog:
PACKETFILTER is not configured in /vmunix
Database that maps Ethernet addresses to hostnames
Commands: arp(8), ifconfig(8), syslogd(8)
Files: ethers(4), hosts(4), packetfilter(7)
Routines: ethers(3) delim off