source: postlfs/security/heimdal.xml@ 041b4249

10.0 10.1 11.0 11.1 11.2 11.3 12.0 12.1 12.2 6.3 6.3-rc1 6.3-rc2 6.3-rc3 7.10 7.4 7.5 7.6 7.6-blfs 7.6-systemd 7.7 7.8 7.9 8.0 8.1 8.2 8.3 8.4 9.0 9.1 basic bdubbs/svn elogind gimp3 gnome kde5-13430 kde5-14269 kde5-14686 kea ken/TL2024 ken/inkscape-core-mods ken/tuningfonts krejzi/svn lazarus lxqt nosym perl-modules plabs/newcss plabs/python-mods python3.11 qt5new rahul/power-profiles-daemon renodr/vulkan-addition systemd-11177 systemd-13485 trunk upgradedb xry111/for-12.3 xry111/intltool xry111/llvm18 xry111/soup3 xry111/spidermonkey128 xry111/test-20220226 xry111/xf86-video-removal
Last change on this file since 041b4249 was cf4877f, checked in by Randy McMurchy <randy@…>, 16 years ago

Updated the Heimdal instructions to preserve the mk_cmds script from the e2fsprogs package. Thanks DJ

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@7262 af4574ff-66df-0310-9fd7-8a98e5e911e0

  • Property mode set to 100644
File size: 42.7 KB
Line 
1<?xml version="1.0" encoding="ISO-8859-1"?>
2<!DOCTYPE sect1 PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
3 "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
4 <!ENTITY % general-entities SYSTEM "../../general.ent">
5 %general-entities;
6
7 <!ENTITY heimdal-download-http "http://ftp.vc-graz.ac.at/mirror/crypto/kerberos/heimdal/heimdal-&heimdal-version;.tar.gz">
8 <!ENTITY heimdal-download-ftp "ftp://ftp.pdc.kth.se/pub/heimdal/src/heimdal-&heimdal-version;.tar.gz">
9 <!ENTITY heimdal-md5sum "7ff8c4850bce9702d9d3cf9eff05abaa">
10 <!ENTITY heimdal-size "3.1 MB">
11 <!ENTITY heimdal-buildsize "127 MB">
12 <!ENTITY heimdal-time "3.7 SBU (additional 1.5 SBU to run the test suite)">
13]>
14
15<sect1 id="heimdal" xreflabel="Heimdal-&heimdal-version;">
16 <?dbhtml filename="heimdal.html"?>
17
18 <sect1info>
19 <othername>$LastChangedBy$</othername>
20 <date>$Date$</date>
21 </sect1info>
22
23 <title>Heimdal-&heimdal-version;</title>
24
25 <indexterm zone="heimdal">
26 <primary sortas="a-Heimdal">Heimdal</primary>
27 </indexterm>
28
29 <sect2 role="package">
30 <title>Introduction to Heimdal</title>
31
32 <para><application>Heimdal</application> is a free implementation
33 of Kerberos 5 that aims to be compatible with MIT krb5 and is
34 backward compatible with krb4. Kerberos is a network authentication
35 protocol. Basically it preserves the integrity of passwords in any
36 untrusted network (like the Internet). Kerberized applications work
37 hand-in-hand with sites that support Kerberos to ensure that passwords
38 cannot be stolen or compromised. A Kerberos installation will make changes
39 to the authentication mechanisms on your network and will overwrite several
40 programs and daemons from the <application>Coreutils</application>,
41 <application>Inetutils</application>, <application>Qpopper</application>
42 and <application>Shadow</application> packages.</para>
43
44 <bridgehead renderas="sect3">Package Information</bridgehead>
45 <itemizedlist spacing="compact">
46 <listitem>
47 <para>Download (HTTP): <ulink url="&heimdal-download-http;"/></para>
48 </listitem>
49 <listitem>
50 <para>Download (FTP): <ulink url="&heimdal-download-ftp;"/></para>
51 </listitem>
52 <listitem>
53 <para>Download MD5 sum: &heimdal-md5sum;</para>
54 </listitem>
55 <listitem>
56 <para>Download size: &heimdal-size;</para>
57 </listitem>
58 <listitem>
59 <para>Estimated disk space required: &heimdal-buildsize;</para>
60 </listitem>
61 <listitem>
62 <para>Estimated build time: &heimdal-time;</para>
63 </listitem>
64 </itemizedlist>
65
66 <bridgehead renderas="sect3">Additional Downloads</bridgehead>
67 <itemizedlist spacing='compact'>
68 <!-- <listitem>
69 <para>Required Patch: <ulink
70 url="ftp://ftp.pdc.kth.se/pub/heimdal/src/heimdal-0.7.2-setuid-patch.txt"/></para>
71 </listitem>
72 <listitem>
73 <para>Required Patch: <ulink
74 url="&patch-root;/heimdal-&heimdal-version;-fhs_compliance-1.patch"/></para>
75 </listitem> -->
76 <listitem>
77 <para>Required patch for <application>CrackLib</application> support: <ulink
78 url="&patch-root;/heimdal-&heimdal-version;-cracklib-1.patch"/></para>
79 </listitem>
80 </itemizedlist>
81
82 <bridgehead renderas="sect3">Heimdal Dependencies</bridgehead>
83
84 <bridgehead renderas="sect4">Required to Build the Server-Side Tools</bridgehead>
85 <para role="required">
86 <!-- <xref linkend="db"/> -->
87 <xref linkend="db"/> is recommended (installed in LFS)
88 or <xref linkend="gdbm"/></para>
89
90 <bridgehead renderas="sect4">Recommended</bridgehead>
91 <para role="recommended"><xref linkend="openssl"/></para>
92
93 <bridgehead renderas="sect4">Optional</bridgehead>
94 <para role="optional"><xref linkend="linux-pam"/>,
95 <xref linkend="openldap"/>,
96 <xref linkend="x-window-system"/>,
97 <xref linkend="cracklib"/> (compiled with the <filename>heimdal</filename> patch),
98 <ulink url="http://packages.debian.org/stable/source/libcap">libcap</ulink>, and
99 <ulink url="http://www.pdc.kth.se/kth-krb/">krb4</ulink></para>
100
101 <note>
102 <para>Some sort of time synchronization facility on your system
103 (like <xref linkend="ntp"/>) is required since Kerberos won't
104 authenticate if the time differential between a kerberized client
105 and the KDC server is more than 5 minutes.</para>
106 </note>
107
108 <para condition="html" role="usernotes">User Notes:
109 <ulink url="&blfs-wiki;/heimdal"/></para>
110
111 </sect2>
112
113 <sect2 role="installation">
114 <title>Installation of Heimdal</title>
115
116 <!-- This doesn't appear to be needed any longer as testing has
117 shown that the ftp client now works without issues
118
119 <para>Before installing the package, you may want to preserve the
120 <command>ftp</command> program from the <application>Inetutils</application>
121 package. This is because using the <application>Heimdal</application>
122 <command>ftp</command> program to connect to non-kerberized ftp servers may
123 not work properly. It will allow you to connect (letting you know that
124 transmission of the password is clear text) but will have problems doing
125 puts and gets. Issue the following command as the
126 <systemitem class="username">root</systemitem> user.</para>
127
128<screen role="root"><userinput>mv -v /usr/bin/ftp /usr/bin/ftpn</userinput></screen>
129 -->
130
131 <warning>
132 <para>Ensure you really need a Kerberos installation before you decide
133 to install this package. Failure to install and configure the package
134 correctly can alter your system so that users cannot log in.</para>
135 </warning>
136
137 <para>If you wish the <application>Heimdal</application> package to
138 link against the <application>CrackLib</application> library to provide
139 enforcement of strong passwords (requires <xref linkend="cracklib"/>
140 installed with the <filename>heimdal</filename> patch), you must apply a
141 patch:</para>
142
143<screen><userinput>patch -Np1 -i ../heimdal-&heimdal-version;-cracklib-1.patch</userinput></screen>
144
145 <para>Install <application>Heimdal</application> by running the following
146 commands:</para>
147
148<screen><userinput>sed -i 's|/var/heimdal|/var/lib/heimdal|' $(grep -lr /var/heimdal *) &amp;&amp;
149./configure --prefix=/usr \
150 --sysconfdir=/etc/heimdal \
151 --libexecdir=/usr/sbin \
152 --datadir=/var/lib/heimdal \
153 --localstatedir=/var/lib/heimdal \
154 --with-readline=/usr \
155 --enable-kcm &amp;&amp;
156make</userinput></screen>
157
158 <!-- Docs building is broken - when fixec, insert hyphens in the makeinfo commands
159 <para>If you have <xref linkend="tetex"/> installed and wish to create
160 alternate forms of the documentation, issue any or all of the following
161 commands:</para>
162
163<screen><userinput>make -C doc html &amp;&amp;
164mv doc/heimdal.html doc/html &amp;&amp;
165make -C doc pdf &amp;&amp;
166make -C doc ps &amp;&amp;
167makeinfo -html -no-split -o doc/heimdal.html doc/heimdal.texi &amp;&amp;
168makeinfo -plaintext -o doc/heimdal.txt doc/heimdal.texi</userinput></screen>
169 -->
170
171 <para>To test the results, issue: <command>make check</command>.</para>
172
173 <para>Now, as the <systemitem class="username">root</systemitem> user:</para>
174
175<screen role="root"><?dbfo keep-together="auto"?><userinput>mv -v /usr/include/ss/ss.h /usr/include/ss/ss.h.e2fsprogs &amp;&amp;
176mv -v /usr/lib/libss.a /usr/lib/libss.a.e2fsprogs &amp;&amp;
177mv -v /usr/lib/libss.so /usr/lib/libss.so.e2fsprogs &amp;&amp;
178mv -v /usr/bin/mk_cmds /usr/bin/mk_cmds.e2fsprogs &amp;&amp;
179
180make install &amp;&amp;
181
182mv -v /usr/include/ss/ss.h /usr/include/ss/ss.h.heimdal &amp;&amp;
183mv -v /usr/include/ss/ss.h.e2fsprogs /usr/include/ss/ss.h &amp;&amp;
184mv -v /usr/lib/libss.a /usr/lib/libss.a.heimdal &amp;&amp;
185mv -v /usr/lib/libss.a.e2fsprogs /usr/lib/libss.a &amp;&amp;
186mv -v /usr/lib/libss.so /usr/lib/libss.so.heimdal &amp;&amp;
187mv -v /usr/lib/libss.so.e2fsprogs /usr/lib/libss.so &amp;&amp;
188mv -v /usr/lib/libss.la /usr/lib/libss.la.heimdal &amp;&amp;
189mv -v /usr/bin/mk_cmds /usr/bin/mk_cmds.heimdal &amp;&amp;
190mv -v /usr/bin/mk_cmds.e2fsprogs /usr/bin/mk_cmds &amp;&amp;
191
192mv -v /bin/login /bin/login.shadow &amp;&amp;
193mv -v /bin/su /bin/su.shadow &amp;&amp;
194mv -v /usr/bin/{login,su} /bin &amp;&amp;
195ln -v -sf ../../bin/login /usr/bin &amp;&amp;
196
197for LINK in lib{otp,kafs,krb5,hx509,asn1,roken,crypto}; do
198 mv -v /usr/lib/${LINK}.so.* /lib &amp;&amp;
199 ln -v -sf ../../lib/$(readlink /usr/lib/${LINK}.so) \
200 /usr/lib/${LINK}.so
201done &amp;&amp;
202
203mv -v /usr/lib/$(readlink /usr/lib/libdb.so) \
204 /usr/lib/libdb-?.so \
205 /lib &amp;&amp;
206ln -v -sf ../../lib/$(readlink /usr/lib/libdb.so) \
207 /usr/lib/libdb.so &amp;&amp;
208
209ldconfig</userinput></screen>
210
211 <!-- <para>If you built any of the alternate forms of documentation, install it
212 using the following commands as the
213 <systemitem class="username">root</systemitem> user:</para>
214
215<screen role="root"><userinput>install -v -m755 -d /usr/share/doc/heimdal-&heimdal-version;/html &amp;&amp;
216install -v -m644 doc/html/* \
217 /usr/share/doc/heimdal-&heimdal-version;/html &amp;&amp;
218install -v -m644 doc/heimdal.{dvi,ps,pdf,html,txt} \
219 /usr/share/doc/heimdal-&heimdal-version;</userinput></screen> -->
220
221 </sect2>
222
223 <sect2 role="commands">
224 <title>Command Explanations</title>
225
226 <para><command>sed -i '...' $(grep -lr /var/heimdal *)</command>:
227 This command is used to change all occurances of hard-coded
228 <filename class='directory'>/var/heimdal</filename> to
229 <filename class='directory'>/var/lib/heimdal</filename> so the
230 installation will be FHS compliant.</para>
231
232 <para><command>mv -v /usr/include/...</command>,
233 <command>mv -v /usr/lib/libss.* ...</command> and
234 <command>mv -v /usr/bin/mk_cmds ...</command>: The
235 <application>Heimdal</application> installation will overwrite an
236 interface header, static library, library symbolic link and a
237 shell script from the
238 <application>E2fsprogs</application> package. These commands rename the
239 original files before the installation, and then restore them (after
240 renaming the new <application>Heimdal</application> files) after the
241 installation.</para>
242
243 <para><parameter>--libexecdir=/usr/sbin</parameter>: This switch causes
244 the daemon programs to be installed into
245 <filename class="directory">/usr/sbin</filename>.</para>
246
247 <tip>
248 <para>If you want to preserve all your existing
249 <application>Inetutils</application> package daemons, install the
250 <application>Heimdal</application> daemons into
251 <filename class="directory">/usr/sbin/heimdal</filename> (or wherever
252 you want). Since these programs will be called from
253 <command>(x)inetd</command> or <filename>rc</filename> scripts, it
254 really doesn't matter where they are installed, as long as they are
255 correctly specified in the <filename>/etc/(x)inetd.conf</filename> file
256 and <filename>rc</filename> scripts. If you choose something other than
257 <filename class="directory">/usr/sbin</filename>, you may want to move
258 some of the user programs (such as <command>kadmin</command>) to
259 <filename class="directory">/usr/sbin</filename> manually so they'll be
260 in the privileged user's default <envar>PATH</envar>.</para>
261 </tip>
262
263 <para><command>mv ... .shadow; mv ... /bin; ln -v -sf ../../bin...</command>:
264 The <command>login</command> and <command>su</command> programs installed by
265 <application>Heimdal</application> belong in the
266 <filename class="directory">/bin</filename> directory. The
267 <command>login</command> program is symlinked because
268 <application>Heimdal</application> is expecting to find it in
269 <filename class="directory">/usr/bin</filename>. The old executables are
270 preserved before the move so that they can be restored if you experience
271 problems logging into the system after the
272 <application>Heimdal</application> package is installed and
273 configured.</para>
274
275 <para><command>mv ... /lib; ln -v -sf ../../lib/lib... /usr/lib...</command>:
276 The <command>login</command> and <command>su</command> programs installed
277 by <application>Heimdal</application> link against
278 <application>Heimdal</application> libraries as well as libraries provided
279 by the <application>OpenSSL</application> and
280 <application>Berkeley DB</application> packages. These
281 libraries are moved to <filename class="directory">/lib</filename> to be
282 FHS compliant and also in case
283 <filename class="directory">/usr</filename> is located on a separate
284 partition which may not always be mounted.</para>
285
286 </sect2>
287
288 <sect2 role="configuration">
289 <title>Configuring Heimdal</title>
290
291 <sect3 id="heimdal-config">
292 <title>Config Files</title>
293
294 <para><filename>/etc/heimdal/*</filename></para>
295
296 <indexterm zone="heimdal heimdal-config">
297 <primary sortas="e-etc-heimdal">/etc/heimdal/*</primary>
298 </indexterm>
299
300 </sect3>
301
302 <sect3>
303 <title>Configuration Information</title>
304
305 <note>
306 <para>All the configuration steps shown below must be accomplished
307 by the <systemitem class='username'>root</systemitem> user unless
308 otherwise noted.</para>
309 </note>
310
311 <sect4>
312 <title>Master KDC Server Configuration</title>
313
314 <para>Create the Kerberos configuration file with the
315 following commands:</para>
316
317<screen role="root"><userinput>install -v -m755 -d /etc/heimdal &amp;&amp;
318cat &gt; /etc/heimdal/krb5.conf &lt;&lt; "EOF"
319<literal># Begin /etc/heimdal/krb5.conf
320
321[libdefaults]
322 default_realm = <replaceable>&lt;EXAMPLE.COM&gt;</replaceable>
323 encrypt = true
324
325[realms]
326 <replaceable>&lt;EXAMPLE.COM&gt;</replaceable> = {
327 kdc = <replaceable>&lt;hostname.example.com&gt;</replaceable>
328 admin_server = <replaceable>&lt;hostname.example.com&gt;</replaceable>
329 kpasswd_server = <replaceable>&lt;hostname.example.com&gt;</replaceable>
330 }
331
332[domain_realm]
333 .<replaceable>&lt;example.com&gt;</replaceable> = <replaceable>&lt;EXAMPLE.COM&gt;</replaceable>
334
335[logging]
336 kdc = FILE:/var/log/kdc.log
337 admin_server = FILE:/var/log/kadmin.log
338 default = FILE:/var/log/krb.log
339
340# End /etc/heimdal/krb5.conf</literal>
341EOF
342chmod -v 644 /etc/heimdal/krb5.conf</userinput></screen>
343
344 <para>You will need to substitute your domain and proper hostname
345 for the occurrences of the <replaceable>&lt;hostname&gt;</replaceable>
346 and <replaceable>&lt;EXAMPLE.COM&gt;</replaceable> names.</para>
347
348 <para><option>default_realm</option> should be the name of your
349 domain changed to ALL CAPS. This isn't required, but both
350 <application>Heimdal</application> and <application>MIT
351 krb5</application> recommend it.</para>
352
353 <para><option>encrypt = true</option> provides encryption of all
354 traffic between kerberized clients and servers. It's not necessary
355 and can be left off. If you leave it off, you can encrypt all traffic
356 from the client to the server using a switch on the client program
357 instead.</para>
358
359 <para>The <option>[realms]</option> parameters tell the client
360 programs where to look for the KDC authentication services.</para>
361
362 <para>The <option>[domain_realm]</option> section maps a domain
363 to a realm.</para>
364
365 <para>Store the master password in a key file using the following
366 commands:</para>
367
368<screen role="root"><userinput>install -v -m755 -d /var/lib/heimdal &amp;&amp;
369kstash</userinput></screen>
370
371 <para>Create the KDC database:</para>
372
373<screen role="root"><userinput>kadmin -l</userinput></screen>
374
375 <para>The commands below will prompt you for information about the
376 principles. Choose the defaults for now unless you know what you are
377 doing and need to specify different values. You can go in later and
378 change the defaults, should you feel the need. You may use the up and
379 down arrow keys to use the history feature of <command>kadmin</command>
380 in a similar manner as the <command>bash</command> history
381 feature.</para>
382
383 <para>At the <prompt>kadmin&gt;</prompt> prompt, issue the following
384 statement:</para>
385
386<screen role="root"><userinput>init <replaceable>&lt;EXAMPLE.COM&gt;</replaceable></userinput></screen>
387
388 <para>The database must now be populated with at least one principle
389 (user). For now, just use your regular login name or root. You may
390 create as few, or as many principles as you wish using the following
391 statement:</para>
392
393<screen role="root"><userinput>add <replaceable>&lt;loginname&gt;</replaceable></userinput></screen>
394
395 <para>The KDC server and any machine running kerberized
396 server daemons must have a host key installed:</para>
397
398<screen role="root"><userinput>add --random-key host/<replaceable>&lt;hostname.example.com&gt;</replaceable></userinput></screen>
399
400 <para>After choosing the defaults when prompted, you will have to
401 export the data to a keytab file:</para>
402
403<screen role="root"><userinput>ext host/<replaceable>&lt;hostname.example.com&gt;</replaceable></userinput></screen>
404
405 <para>This should have created two files in
406 <filename class="directory">/etc/heimdal</filename>:
407 <filename>krb5.keytab</filename> (Kerberos 5) and
408 <filename>srvtab</filename> (Kerberos 4). Both files should have 600
409 (root rw only) permissions. Keeping the keytab files from public access
410 is crucial to the overall security of the Kerberos installation.</para>
411
412 <para>Eventually, you'll want to add server daemon principles to the
413 database and extract them to the keytab file. You do this in the same
414 way you created the host principles. Below is an example:</para>
415
416<screen role="root"><userinput>add --random-key ftp/<replaceable>&lt;hostname.example.com&gt;</replaceable></userinput></screen>
417
418 <para>(choose the defaults)</para>
419
420<screen role="root"><userinput>ext ftp/<replaceable>&lt;hostname.example.com&gt;</replaceable></userinput></screen>
421
422 <para>Exit the <command>kadmin</command> program (use
423 <command>quit</command> or <command>exit</command>) and return back
424 to the shell prompt. Start the KDC daemon manually, just to test out
425 the installation:</para>
426
427<screen role="root"><userinput>/usr/sbin/kdc &amp;</userinput></screen>
428
429 <para>Attempt to get a TGT (ticket granting ticket) with
430 the following command:</para>
431
432<screen><userinput>kinit <replaceable>&lt;loginname&gt;</replaceable></userinput></screen>
433
434 <para>You will be prompted for the password you created. After you get
435 your ticket, you should list it with the following command:</para>
436
437<screen><userinput>klist</userinput></screen>
438
439 <para>Information about the ticket should be displayed on
440 the screen.</para>
441
442 <para>To test the functionality of the <filename>keytab</filename> file,
443 issue the following command:</para>
444
445<screen><userinput>ktutil list</userinput></screen>
446
447 <para>This should dump a list of the host principals, along with the
448 encryption methods used to access the principals.</para>
449
450 <para>At this point, if everything has been successful so far, you
451 can feel fairly confident in the installation, setup and configuration
452 of your new <application>Heimdal</application> Kerberos 5
453 installation.</para>
454
455 <para id="heimdal-init">Install the
456 <filename>/etc/rc.d/init.d/heimdal</filename> init script included
457 in the <xref linkend="bootscripts"/> package:</para>
458
459 <indexterm zone="heimdal heimdal-init">
460 <primary sortas="f-heimdal">heimdal</primary>
461 </indexterm>
462
463<screen role="root"><userinput>make install-heimdal</userinput></screen>
464
465 </sect4>
466
467 <sect4>
468 <title>Using Kerberized Client Programs</title>
469
470 <para>To use the kerberized client programs (<command>telnet</command>,
471 <command>ftp</command>, <command>rsh</command>,
472 <command>rxterm</command>, <command>rxtelnet</command>,
473 <command>rcp</command>, <command>xnlock</command>), you first must get
474 a TGT. Use the <command>kinit</command> program to get the ticket.
475 After you've acquired the ticket, you can use the kerberized programs
476 to connect to any kerberized server on the network. You will not be
477 prompted for authentication until your ticket expires (default is one
478 day), unless you specify a different user as a command line argument
479 to the program.</para>
480
481 <para>The kerberized programs will connect to non-kerberized daemons,
482 warning you that authentication is not encrypted.</para>
483
484 <para>In order to use the <application>Heimdal</application>
485 <application>X</application> programs, you'll need to add a service
486 port entry to the <filename>/etc/services</filename> file for the
487 <command>kxd</command> server. There is no 'standardized port number'
488 for the 'kx' service in the IANA database, so you'll have to pick an
489 unused port number. Add an entry to the <filename>services</filename>
490 file similar to the entry below (substitute your chosen port number
491 for <replaceable>&lt;49150&gt;</replaceable>):</para>
492
493<screen><literal>kx <replaceable>&lt;49150&gt;</replaceable>/tcp # Heimdal kerberos X
494kx <replaceable>&lt;49150&gt;</replaceable>/udp # Heimdal kerberos X</literal></screen>
495
496 <para>For additional information consult <ulink
497 url="&hints-root;/downloads/files/heimdal.txt">the
498 Heimdal hint</ulink> on which the above instructions are based.</para>
499
500 </sect4>
501
502 </sect3>
503
504 </sect2>
505
506 <sect2 role="content">
507 <title>Contents</title>
508
509 <segmentedlist>
510 <segtitle>Installed Programs</segtitle>
511 <segtitle>Installed Libraries</segtitle>
512 <segtitle>Installed Directories</segtitle>
513
514 <seglistitem>
515 <seg>afslog, ftp, ftpd, gss, hprop, hpropd, hxtool, iprop-log,
516 ipropd-master, ipropd-slave, kadmin, kadmind, kauth, kcm, kdc,
517 kdestroy, kdigest, kf, kfd, kgetcred, kimpersonate, kinit, klist,
518 kpasswd, kpasswdd, krb5-config, kstash, ktutil, kx, kxd, login,
519 mk_cmds, otp, otpprint, pagsh, pfrom, popper, push, rcp, rsh, rshd,
520 rxtelnet, rxterm, string2key, su, telnet, telnetd, tenletxr,
521 verify_krb5_conf and xnlock</seg>
522 <seg>libasn1.{so,a}, libeditline.{so,a}, libgssapi.{so,a},
523 libhdb.{so,a}, libheimntlm.{so,a}, libhx509.{so,a},
524 libkadm5clnt.{so,a}, libkadm5srv.{so,a}, libkafs.{so,a},
525 libkdc.{so,a}, libkrb5.{so,a}, libotp.{so,a}, libroken.{so,a},
526 libsl.{so,a}, libss.{so,a} and windc.{so,a}</seg>
527 <seg>/etc/heimdal, /usr/include/gssapi, /usr/include/kadm5,
528 /usr/include/krb5, /usr/include/roken, /usr/include/ss,
529 /usr/share/doc/heimdal-&heimdal-version; and /var/lib/heimdal</seg>
530 </seglistitem>
531 </segmentedlist>
532
533 <variablelist>
534 <bridgehead renderas="sect3">Short Descriptions</bridgehead>
535 <?dbfo list-presentation="list"?>
536 <?dbhtml list-presentation="table"?>
537
538 <varlistentry id="afslog">
539 <term><command>afslog</command></term>
540 <listitem>
541 <para>obtains AFS tokens for a number of cells.</para>
542 <indexterm zone="heimdal afslog">
543 <primary sortas="b-afslog">afslog</primary>
544 </indexterm>
545 </listitem>
546 </varlistentry>
547
548 <varlistentry id="ftp">
549 <term><command>ftp</command></term>
550 <listitem>
551 <para>is a kerberized FTP client.</para>
552 <indexterm zone="heimdal ftp">
553 <primary sortas="b-ftp">ftp</primary>
554 </indexterm>
555 </listitem>
556 </varlistentry>
557
558 <varlistentry id="ftpd">
559 <term><command>ftpd</command></term>
560 <listitem>
561 <para>is a kerberized FTP daemon.</para>
562 <indexterm zone="heimdal ftpd">
563 <primary sortas="b-ftpd">ftpd</primary>
564 </indexterm>
565 </listitem>
566 </varlistentry>
567
568 <varlistentry id="hprop">
569 <term><command>hprop</command></term>
570 <listitem>
571 <para> takes a principal database in a specified format and converts
572 it into a stream of <application>Heimdal</application> database
573 records.</para>
574 <indexterm zone="heimdal hprop">
575 <primary sortas="b-hprop">hprop</primary>
576 </indexterm>
577 </listitem>
578 </varlistentry>
579
580 <varlistentry id="hpropd">
581 <term><command>hpropd</command></term>
582 <listitem>
583 <para>is a server that receives a database sent by
584 <command>hprop</command> and writes it as a local database.</para>
585 <indexterm zone="heimdal hpropd">
586 <primary sortas="b-hpropd">hpropd</primary>
587 </indexterm>
588 </listitem>
589 </varlistentry>
590
591 <varlistentry id="iprop-log">
592 <term><command>iprop-log</command></term>
593 <listitem>
594 <para>is used to maintain the iprop log file.</para>
595 <indexterm zone="heimdal iprop-log">
596 <primary sortas="b-iprop-log">iprop-log</primary>
597 </indexterm>
598 </listitem>
599 </varlistentry>
600
601 <varlistentry id="ipropd-master">
602 <term><command>ipropd-master</command></term>
603 <listitem>
604 <para>is a daemon which runs on the master KDC
605 server which incrementally propagates changes to the KDC
606 database to the slave KDC servers.</para>
607 <indexterm zone="heimdal ipropd-master">
608 <primary sortas="b-ipropd-master">ipropd-master</primary>
609 </indexterm>
610 </listitem>
611 </varlistentry>
612
613 <varlistentry id="ipropd-slave">
614 <term><command>ipropd-slave</command></term>
615 <listitem>
616 <para>is a daemon which runs on the slave KDC
617 servers which incrementally propagates changes to the KDC
618 database from the master KDC server.</para>
619 <indexterm zone="heimdal ipropd-slave">
620 <primary sortas="b-ipropd-slave">ipropd-slave</primary>
621 </indexterm>
622 </listitem>
623 </varlistentry>
624
625 <varlistentry id="kadmin">
626 <term><command>kadmin</command></term>
627 <listitem>
628 <para>is a utility used to make modifications to the Kerberos
629 database.</para>
630 <indexterm zone="heimdal kadmin">
631 <primary sortas="b-kadmin">kadmin</primary>
632 </indexterm>
633 </listitem>
634 </varlistentry>
635
636 <varlistentry id="kadmind">
637 <term><command>kadmind</command></term>
638 <listitem>
639 <para>is a server for administrative access to the Kerberos
640 database.</para>
641 <indexterm zone="heimdal kadmind">
642 <primary sortas="b-kadmind">kadmind</primary>
643 </indexterm>
644 </listitem>
645 </varlistentry>
646
647 <varlistentry id="kauth">
648 <term><command>kauth</command></term>
649 <listitem>
650 <para>is a symbolic link to the <command>kinit</command>
651 program.</para>
652 <indexterm zone="heimdal kauth">
653 <primary sortas="g-kauth">kauth</primary>
654 </indexterm>
655 </listitem>
656 </varlistentry>
657
658 <varlistentry id="kcm">
659 <term><command>kcm</command></term>
660 <listitem>
661 <para>is a process based credential cache for Kerberos
662 tickets.</para>
663 <indexterm zone="heimdal kcm">
664 <primary sortas="b-kcm">kcm</primary>
665 </indexterm>
666 </listitem>
667 </varlistentry>
668
669 <varlistentry id="kdc">
670 <term><command>kdc</command></term>
671 <listitem>
672 <para>is a Kerberos 5 server.</para>
673 <indexterm zone="heimdal kdc">
674 <primary sortas="b-kdc">kdc</primary>
675 </indexterm>
676 </listitem>
677 </varlistentry>
678
679 <varlistentry id="kdestroy">
680 <term><command>kdestroy</command></term>
681 <listitem>
682 <para>removes a principle's current set of tickets.</para>
683 <indexterm zone="heimdal kdestroy">
684 <primary sortas="b-kdestroy">kdestroy</primary>
685 </indexterm>
686 </listitem>
687 </varlistentry>
688
689 <varlistentry id="kf">
690 <term><command>kf</command></term>
691 <listitem>
692 <para>is a program which forwards tickets to a remote host through
693 an authenticated and encrypted stream.</para>
694 <indexterm zone="heimdal kf">
695 <primary sortas="b-kf">kf</primary>
696 </indexterm>
697 </listitem>
698 </varlistentry>
699
700 <varlistentry id="kfd">
701 <term><command>kfd</command></term>
702 <listitem>
703 <para>is a server used to receive forwarded tickets.</para>
704 <indexterm zone="heimdal kfd">
705 <primary sortas="b-kfd">kfd</primary>
706 </indexterm>
707 </listitem>
708 </varlistentry>
709
710 <varlistentry id="kgetcred">
711 <term><command>kgetcred</command></term>
712 <listitem>
713 <para>obtains a ticket for a service.</para>
714 <indexterm zone="heimdal kgetcred">
715 <primary sortas="b-kgetcred">kgetcred</primary>
716 </indexterm>
717 </listitem>
718 </varlistentry>
719
720 <varlistentry id="kinit">
721 <term><command>kinit</command></term>
722 <listitem>
723 <para>is used to authenticate to the Kerberos server as a principal
724 and acquire a ticket granting ticket that can later be used to obtain
725 tickets for other services.</para>
726 <indexterm zone="heimdal kinit">
727 <primary sortas="b-kinit">kinit</primary>
728 </indexterm>
729 </listitem>
730 </varlistentry>
731
732 <varlistentry id="klist">
733 <term><command>klist</command></term>
734 <listitem>
735 <para>reads and displays the current tickets in the credential
736 cache.</para>
737 <indexterm zone="heimdal klist">
738 <primary sortas="b-klist">klist</primary>
739 </indexterm>
740 </listitem>
741 </varlistentry>
742
743 <varlistentry id="kpasswd">
744 <term><command>kpasswd</command></term>
745 <listitem>
746 <para>is a program for changing Kerberos 5 passwords.</para>
747 <indexterm zone="heimdal kpasswd">
748 <primary sortas="b-kpasswd">kpasswd</primary>
749 </indexterm>
750 </listitem>
751 </varlistentry>
752
753 <varlistentry id="kpasswdd">
754 <term><command>kpasswdd</command></term>
755 <listitem>
756 <para>is a Kerberos 5 password changing server.</para>
757 <indexterm zone="heimdal kpasswdd">
758 <primary sortas="b-kpasswdd">kpasswdd</primary>
759 </indexterm>
760 </listitem>
761 </varlistentry>
762
763 <varlistentry id="krb5-config-prog">
764 <term><command>krb5-config</command></term>
765 <listitem>
766 <para>gives information on how to link programs against
767 <application>Heimdal</application> libraries.</para>
768 <indexterm zone="heimdal krb5-config-prog">
769 <primary sortas="b-krb5-config">krb5-config</primary>
770 </indexterm>
771 </listitem>
772 </varlistentry>
773
774 <varlistentry id="kstash">
775 <term><command>kstash</command></term>
776 <listitem>
777 <para>stores the KDC master password in a file.</para>
778 <indexterm zone="heimdal kstash">
779 <primary sortas="b-kstash">kstash</primary>
780 </indexterm>
781 </listitem>
782 </varlistentry>
783
784 <varlistentry id="ktutil">
785 <term><command>ktutil</command></term>
786 <listitem>
787 <para>is a program for managing Kerberos keytabs.</para>
788 <indexterm zone="heimdal ktutil">
789 <primary sortas="b-ktutil">ktutil</primary>
790 </indexterm>
791 </listitem>
792 </varlistentry>
793
794 <varlistentry id="kx">
795 <term><command>kx</command></term>
796 <listitem>
797 <para>is a program which securely forwards
798 <application>X</application> connections.</para>
799 <indexterm zone="heimdal kx">
800 <primary sortas="b-kx">kx</primary>
801 </indexterm>
802 </listitem>
803 </varlistentry>
804
805 <varlistentry id="kxd">
806 <term><command>kxd</command></term>
807 <listitem>
808 <para>is the daemon for <command>kx</command>.</para>
809 <indexterm zone="heimdal kxd">
810 <primary sortas="b-kxd">kxd</primary>
811 </indexterm>
812 </listitem>
813 </varlistentry>
814
815 <varlistentry id="login">
816 <term><command>login</command></term>
817 <listitem>
818 <para>is a kerberized login program.</para>
819 <indexterm zone="heimdal login">
820 <primary sortas="b-login">login</primary>
821 </indexterm>
822 </listitem>
823 </varlistentry>
824
825 <varlistentry id="otp">
826 <term><command>otp</command></term>
827 <listitem>
828 <para>manages one-time passwords.</para>
829 <indexterm zone="heimdal otp">
830 <primary sortas="b-otp">otp</primary>
831 </indexterm>
832 </listitem>
833 </varlistentry>
834
835 <varlistentry id="otpprint">
836 <term><command>otpprint</command></term>
837 <listitem>
838 <para>prints lists of one-time passwords.</para>
839 <indexterm zone="heimdal otpprint">
840 <primary sortas="b-otpprint">otpprint</primary>
841 </indexterm>
842 </listitem>
843 </varlistentry>
844
845 <varlistentry id="pfrom">
846 <term><command>pfrom</command></term>
847 <listitem>
848 <para>is a script that runs <command>push --from</command>.</para>
849 <indexterm zone="heimdal pfrom">
850 <primary sortas="b-pfrom">pfrom</primary>
851 </indexterm>
852 </listitem>
853 </varlistentry>
854
855 <varlistentry id="popper">
856 <term><command>popper</command></term>
857 <listitem>
858 <para>is a kerberized POP-3 server.</para>
859 <indexterm zone="heimdal popper">
860 <primary sortas="b-popper">popper</primary>
861 </indexterm>
862 </listitem>
863 </varlistentry>
864
865 <varlistentry id="push">
866 <term><command>push</command></term>
867 <listitem>
868 <para>is a kerberized POP mail retrieval client.</para>
869 <indexterm zone="heimdal push">
870 <primary sortas="b-push">push</primary>
871 </indexterm>
872 </listitem>
873 </varlistentry>
874
875 <varlistentry id="rcp">
876 <term><command>rcp</command></term>
877 <listitem>
878 <para>is a kerberized rcp client program.</para>
879 <indexterm zone="heimdal rcp">
880 <primary sortas="b-rcp">rcp</primary>
881 </indexterm>
882 </listitem>
883 </varlistentry>
884
885 <varlistentry id="rsh">
886 <term><command>rsh</command></term>
887 <listitem>
888 <para>is a kerberized rsh client program.</para>
889 <indexterm zone="heimdal rsh">
890 <primary sortas="b-rsh">rsh</primary>
891 </indexterm>
892 </listitem>
893 </varlistentry>
894
895 <varlistentry id="rshd">
896 <term><command>rshd</command></term>
897 <listitem>
898 <para>is a kerberized rsh server.</para>
899 <indexterm zone="heimdal rshd">
900 <primary sortas="b-rshd">rshd</primary>
901 </indexterm>
902 </listitem>
903 </varlistentry>
904
905 <varlistentry id="rxtelnet">
906 <term><command>rxtelnet</command></term>
907 <listitem>
908 <para>starts a secure <command>xterm</command> window with a
909 <command>telnet</command> to a given host and forwards
910 <application>X</application> connections.</para>
911 <indexterm zone="heimdal rxtelnet">
912 <primary sortas="b-rxtelnet">rxtelnet</primary>
913 </indexterm>
914 </listitem>
915 </varlistentry>
916
917 <varlistentry id="rxterm">
918 <term><command>rxterm</command></term>
919 <listitem>
920 <para>starts a secure remote <command>xterm</command>.</para>
921 <indexterm zone="heimdal rxterm">
922 <primary sortas="b-rxterm">rxterm</primary>
923 </indexterm>
924 </listitem>
925 </varlistentry>
926
927 <varlistentry id="string2key">
928 <term><command>string2key</command></term>
929 <listitem>
930 <para>maps a password into a key.</para>
931 <indexterm zone="heimdal string2key">
932 <primary sortas="b-string2key">string2key</primary>
933 </indexterm>
934 </listitem>
935 </varlistentry>
936
937 <varlistentry id="su">
938 <term><command>su</command></term>
939 <listitem>
940 <para>is a kerberized su client program.</para>
941 <indexterm zone="heimdal su">
942 <primary sortas="b-su">su</primary>
943 </indexterm>
944 </listitem>
945 </varlistentry>
946
947 <varlistentry id="telnet">
948 <term><command>telnet</command></term>
949 <listitem>
950 <para>is a kerberized telnet client program.</para>
951 <indexterm zone="heimdal telnet">
952 <primary sortas="b-telnet">telnet</primary>
953 </indexterm>
954 </listitem>
955 </varlistentry>
956
957 <varlistentry id="telnetd">
958 <term><command>telnetd</command></term>
959 <listitem>
960 <para>is a kerberized telnet server.</para>
961 <indexterm zone="heimdal telnetd">
962 <primary sortas="b-telnetd">telnetd</primary>
963 </indexterm>
964 </listitem>
965 </varlistentry>
966
967 <varlistentry id="tenletxr">
968 <term><command>tenletxr</command></term>
969 <listitem>
970 <para>forwards <application>X</application> connections
971 backwards.</para>
972 <indexterm zone="heimdal tenletxr">
973 <primary sortas="b-tenletxr">tenletxr</primary>
974 </indexterm>
975 </listitem>
976 </varlistentry>
977
978 <varlistentry id="verify_krb5_conf">
979 <term><command>verify_krb5_conf</command></term>
980 <listitem>
981 <para>checks <filename>krb5.conf</filename> file for obvious
982 errors.</para>
983 <indexterm zone="heimdal verify_krb5_conf">
984 <primary sortas="b-verify_krb5_conf">verify_krb5_conf</primary>
985 </indexterm>
986 </listitem>
987 </varlistentry>
988
989 <varlistentry id="xnlock">
990 <term><command>xnlock</command></term>
991 <listitem>
992 <para>is a program that acts as a secure screen saver for
993 workstations running <application>X</application>.</para>
994 <indexterm zone="heimdal xnlock">
995 <primary sortas="b-xnlock">xnlock</primary>
996 </indexterm>
997 </listitem>
998 </varlistentry>
999
1000 <varlistentry id="libasn1">
1001 <term><filename class='libraryfile'>libasn1.{so,a}</filename></term>
1002 <listitem>
1003 <para>provides the ASN.1 and DER functions to encode and decode
1004 the Kerberos TGTs.</para>
1005 <indexterm zone="heimdal libasn1">
1006 <primary sortas="c-libasn1">libasn1.{so,a}</primary>
1007 </indexterm>
1008 </listitem>
1009 </varlistentry>
1010
1011 <varlistentry id="libeditline">
1012 <term><filename class='libraryfile'>libeditline.a</filename></term>
1013 <listitem>
1014 <para>is a command-line editing library with history.</para>
1015 <indexterm zone="heimdal libeditline">
1016 <primary sortas="c-libeditline">libeditline.a</primary>
1017 </indexterm>
1018 </listitem>
1019 </varlistentry>
1020
1021 <varlistentry id="libgssapi">
1022 <term><filename class='libraryfile'>libgssapi.{so,a}</filename></term>
1023 <listitem>
1024 <para>contain the Generic Security Service Application Programming
1025 Interface (GSSAPI) functions which provides security
1026 services to callers in a generic fashion, supportable with a range of
1027 underlying mechanisms and technologies and hence allowing source-level
1028 portability of applications to different environments.</para>
1029 <indexterm zone="heimdal libgssapi">
1030 <primary sortas="c-libgssapi">libgssapi.{so,a}</primary>
1031 </indexterm>
1032 </listitem>
1033 </varlistentry>
1034
1035 <varlistentry id="libhdb">
1036 <term><filename class='libraryfile'>libhdb.{so,a}</filename></term>
1037 <listitem>
1038 <para>is a <application>Heimdal</application> Kerberos 5
1039 authentication/authorization database access library.</para>
1040 <indexterm zone="heimdal libhdb">
1041 <primary sortas="c-libhdb">libhdb.{so,a}</primary>
1042 </indexterm>
1043 </listitem>
1044 </varlistentry>
1045
1046 <varlistentry id="libkadm5clnt">
1047 <term><filename class='libraryfile'>libkadm5clnt.{so,a}</filename></term>
1048 <listitem>
1049 <para>contains the administrative authentication and password
1050 checking functions required by Kerberos 5 client-side programs.</para>
1051 <indexterm zone="heimdal libkadm5clnt">
1052 <primary sortas="c-libkadm5clnt">libkadm5clnt.{so,a}</primary>
1053 </indexterm>
1054 </listitem>
1055 </varlistentry>
1056
1057 <varlistentry id="libkadm5srv">
1058 <term><filename class='libraryfile'>libkadm5srv.{so,a}</filename></term>
1059 <listitem>
1060 <para>contain the administrative authentication and password
1061 checking functions required by Kerberos 5 servers.</para>
1062 <indexterm zone="heimdal libkadm5srv">
1063 <primary sortas="c-libkadm5srv">libkadm5srv.{so,a}</primary>
1064 </indexterm>
1065 </listitem>
1066 </varlistentry>
1067
1068 <varlistentry id="libkafs">
1069 <term><filename class='libraryfile'>libkafs.{so,a}</filename></term>
1070 <listitem>
1071 <para>contains the functions required to authenticated to AFS.</para>
1072 <indexterm zone="heimdal libkafs">
1073 <primary sortas="c-libkafs">libkafs.{so,a}</primary>
1074 </indexterm>
1075 </listitem>
1076 </varlistentry>
1077
1078 <varlistentry id="libkrb5">
1079 <term><filename class='libraryfile'>libkrb5.{so,a}</filename></term>
1080 <listitem>
1081 <para>is an all-purpose Kerberos 5 library.</para>
1082 <indexterm zone="heimdal libkrb5">
1083 <primary sortas="c-libkrb5">libkrb5.{so,a}</primary>
1084 </indexterm>
1085 </listitem>
1086 </varlistentry>
1087
1088 <varlistentry id="libotp">
1089 <term><filename class='libraryfile'>libotp.{so,a}</filename></term>
1090 <listitem>
1091 <para>contains the functions required to handle authenticating
1092 one time passwords.</para>
1093 <indexterm zone="heimdal libotp">
1094 <primary sortas="c-libotp">libotp.{so,a}</primary>
1095 </indexterm>
1096 </listitem>
1097 </varlistentry>
1098
1099 <varlistentry id="libroken">
1100 <term><filename class='libraryfile'>libroken.{so,a}</filename></term>
1101 <listitem>
1102 <para>is a library containing Kerberos 5 compatibility
1103 functions.</para>
1104 <indexterm zone="heimdal libroken">
1105 <primary sortas="c-libroken">libroken.{so,a}</primary>
1106 </indexterm>
1107 </listitem>
1108 </varlistentry>
1109
1110 </variablelist>
1111
1112 </sect2>
1113
1114</sect1>
Note: See TracBrowser for help on using the repository browser.