summaryrefslogtreecommitdiff
path: root/man/8/rstyxd
diff options
context:
space:
mode:
Diffstat (limited to 'man/8/rstyxd')
-rw-r--r--man/8/rstyxd74
1 files changed, 29 insertions, 45 deletions
diff --git a/man/8/rstyxd b/man/8/rstyxd
index 9ee6254b..17e94ba4 100644
--- a/man/8/rstyxd
+++ b/man/8/rstyxd
@@ -1,53 +1,11 @@
.TH RSTYXD 8
.SH NAME
-rstyxd, styxd \- Styx-based remote execution and file service
+rstyxd \- Styx-based remote execution and file service
.SH SYNOPSIS
.B auxi/rstyxd
.I alg
\&...
-.PP
-.B auxi/styxd
-.I alg
-\&...
.SH DESCRIPTION
-These services are normally started by
-.IR svc (8)
-in response to incoming network calls.
-Each expects the standard input to be connected to the client;
-unusually, it is both read and written.
-.PP
-Both commands first authenticate the incoming call using
-.IR keyring-auth (2)
-via
-.IR security-auth (2).
-On successful authorisation, the server sets
-its user identity to that of the caller,
-and the client can request that a digest and/or encryption
-algorithm be applied using
-.IR ssl (3)
-to protect the data exchanged with the server.
-Each
-.I alg
-names a digest or encryption algorithm that the server will allow
-the client to use,
-in any form accepted by
-.IR ssl ;
-the special name
-.B none
-is usually listed, to allow the client to choose not to use
-.IR ssl .
-.PP
-.I Styxd
-provides Styx file service to its client.
-Having authorised the client and optionally established
-.IR ssl ,
-as described above,
-it exports its name space (usually the name space inherited from
-.IR svc (8))
-on the connection using
-.B Sys->export
-(see
-.IR sys-dial (2)).
.PP
.I Rstyxd
provides a remote-execution service.
@@ -82,6 +40,34 @@ and opens the new
.BR /dev/cons )
on file descriptors 0, 1 and 2.
Finally, it executes the command.
+.PP
+.I Rstyxd
+is normally started by
+.IR svc (8)
+in response to incoming network calls.
+It expects the standard input to be connected to the client;
+unusually, it is both read and written.
+It
+first authenticates the incoming call using
+.IR keyring-auth (2)
+via
+.IR security-auth (2).
+On successful authorisation, the server sets
+its user identity to that of the caller,
+and the client can request that a digest and/or encryption
+algorithm be applied using
+.IR ssl (3)
+to protect the data exchanged with the server.
+Each
+.I alg
+names a digest or encryption algorithm that the server will allow
+the client to use,
+in any form accepted by
+.IR ssl ;
+the special name
+.B none
+is usually listed, to allow the client to choose not to use
+.IR ssl .
.SH FILES
.TF /usr/user/keyring/default
.TP
@@ -96,8 +82,6 @@ run as given
.I user
.SH SOURCE
.B /appl/cmd/auxi/rstyxd.b
-.br
-.B /appl/cmd/auxi/styxd.b
.SH SEE ALSO
.IR keyring-auth (2),
.IR security-auth (2),