sprayd(1M)sprayd(1M)NAME
rpc.sprayd, sprayd - spray server
SYNOPSIS
log_file]
DESCRIPTION
is an RPC server that records the packets sent by from another system (see spray(1M)).
daemon may be started by or through the command line. The service provided by is not useful as a networking benchmark as it uses unreli-
able connectionless transports, UDP, for example. It can report a large number of packets dropped when the drops were caused by the pro-
gram sending packets faster than they can be buffered locally, that is, before the packets get to the network medium.
Options
recognizes the following options and command-line arguments:
Log any errors to the named log file,
log_file. Errors are not logged if the option is not specified.
Information logged to the file includes date and time of the error, host name, process id and name of the function gen-
erating the error, and the error message. Note that different services can share a single log file since enough infor-
mation is included to uniquely identify each error.
Exit after serving each RPC request.
Using the option, the security file can control access to RPC services.
Exit only if
o dies (see rpcbind(1M)),
o Another registers with or
o becomes unregistered with
The option is more efficient because a new process is not launched for each RPC request. is the default.
AUTHOR
was developed by Sun Microsystems, Inc.
SEE ALSO inetd(1M), rpcbind(1M), spray(1M), inetd.conf(4), inetd.sec(4), services(4).
sprayd(1M)
Check Out this Related Man Page
rpc.sprayd(1M) System Administration Commands rpc.sprayd(1M)NAME
rpc.sprayd, sprayd - spray server
SYNOPSIS
/usr/lib/netsvc/spray/rpc.sprayd
DESCRIPTION
rpc.sprayd is a server that records the packets sent by spray(1M). The rpc.sprayd daemon may be started by inetd(1M) or listen(1M).
The service provided by rpc.sprayd is not useful as a networking benchmark as it uses unreliable connectionless transports, (udp for exam-
ple). It can report a large number of packets dropped when the drops were caused by the program sending packets faster than they can be
buffered locally (before the packets get to the network medium).
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWrcmds |
+-----------------------------+-----------------------------+
SEE ALSO svcs(1), inetadm(1M), inetd(1M)listen(1M), pmadm(1M), sacadm(1M), spray(1M), svcadm(1M), attributes(5), smf(5)NOTES
The rpc.sprayd service is managed by the service management facility, smf(5), under the service identifier:
svc:/network/rpc/spray:default
Administrative actions on this service, such as enabling, disabling, or requesting restart, can be performed using svcadm(1M). Responsibil-
ity for initiating and restarting this service is delegated to inetd(1M). Use inetadm(1M) to make configuration changes and to view config-
uration information for this service. The service's status can be queried using the svcs(1) command.
SunOS 5.11 4 Nov 2004 rpc.sprayd(1M)
this id the message i get with a suggestions to check those files:
/etc/src.sh
/etc/hosts
/usr/adm/inetd.sec
i have little knowledge of hoe to edit those files/
i went to the etc library and didn't found src.sh file.
what should i do?
also didn't find the inetd.sec file
In the host... (3 Replies)
Hi All,
How can I find out who is connect to a server, like if you use the "who" you will be able to know who is logged in. Can this be done remotely to check a server?
Joe (3 Replies)
So I am attempting to implement a UDP server on an older Solaris 9 box; the server will be handling packets at a rate of about 12/sec and will be constructing acknowledgment messages on the fly.
I've found snippets of sample code here and there on the net... should I be writing this from scratch... (1 Reply)
Inside a script, I defind a log file.
log_file -a $x.log
My question is :
Shown for illustration - this doesnt actually work -- Is there a way to
puts "this is appended text" $x.log
Thanks regards
Pop (1 Reply)
How to make a log that will log all ips that connect to the server or send packets? And how to block an ip that make packets flood and try to DDoS? Thanks. (1 Reply)
Hi there,
I am trying to understand the how is it possible to enumerate RPC services and the common RPC services and the most-commonly found RPC vulnerability. (1 Reply)