source: postlfs/security/heimdal.xml@ 4a64560a

10.0 10.1 11.0 11.1 11.2 11.3 12.0 12.1 7.10 7.4 7.5 7.6 7.6-blfs 7.6-systemd 7.7 7.8 7.9 8.0 8.1 8.2 8.3 8.4 9.0 9.1 basic bdubbs/svn elogind gnome kde5-13430 kde5-14269 kde5-14686 kea ken/TL2024 ken/inkscape-core-mods ken/tuningfonts krejzi/svn lazarus lxqt nosym perl-modules plabs/newcss plabs/python-mods python3.11 qt5new rahul/power-profiles-daemon renodr/vulkan-addition systemd-11177 systemd-13485 trunk upgradedb xry111/intltool xry111/llvm18 xry111/soup3 xry111/test-20220226 xry111/xf86-video-removal
Last change on this file since 4a64560a was 4a64560a, checked in by Randy McMurchy <randy@…>, 14 years ago

Updated all instances of the dependency package 'libcap' to the current 'libcap2' version maintained at kernel.org

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@8353 af4574ff-66df-0310-9fd7-8a98e5e911e0

  • Property mode set to 100644
File size: 46.5 KB
Line 
1<?xml version="1.0" encoding="ISO-8859-1"?>
2<!DOCTYPE sect1 PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
3 "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
4 <!ENTITY % general-entities SYSTEM "../../general.ent">
5 %general-entities;
6
7 <!ENTITY heimdal-download-http "http://www.h5l.org/dist/src/heimdal-&heimdal-version;.tar.gz">
8 <!ENTITY heimdal-download-ftp "ftp://ftp.pdc.kth.se/pub/heimdal/src/heimdal-&heimdal-version;.tar.gz">
9 <!ENTITY heimdal-md5sum "4ce17deae040a3519e542f48fd901f21">
10 <!ENTITY heimdal-size "5.6 MB">
11 <!ENTITY heimdal-buildsize "200 MB">
12 <!ENTITY heimdal-time "4.0 SBU (additional 2.5 SBU to run the test suite)">
13]>
14
15<sect1 id="heimdal" xreflabel="Heimdal-&heimdal-version;">
16 <?dbhtml filename="heimdal.html"?>
17
18 <sect1info>
19 <othername>$LastChangedBy$</othername>
20 <date>$Date$</date>
21 </sect1info>
22
23 <title>Heimdal-&heimdal-version;</title>
24
25 <indexterm zone="heimdal">
26 <primary sortas="a-Heimdal">Heimdal</primary>
27 </indexterm>
28
29 <sect2 role="package">
30 <title>Introduction to Heimdal</title>
31
32 <warning>
33 <para>If you are using an LFS-&lfs-version; based system, building
34 <application>Heimdal</application> will overwrite <filename
35 class='libraryfile'>/usr/lib/libcom_err.so</filename> and install an
36 additional <filename class='libraryfile'>libcom_err</filename> library in
37 <filename class='directory'>/usr/lib</filename>. This will directly
38 conflict with the <filename class='libraryfile'>/lib/libcom_err</filename>
39 library installed by the <application>E2fsprogs</application> package in LFS.
40 Both upstream maintainers have taken steps to eliminate this condition.
41 However, the combination that currently exists causes this problem.</para>
42
43 <para>There is a fix for the problem, but it will require you to recompile
44 the LFS-&lfs-version; <application>E2fsprogs</application> package to a
45 newer version than the &lfs-e2fsprogs-version; version used in that book.
46 Any version equal to or greater than the one used in the
47 <ulink url="&lfs-dev;">LFS-Development</ulink> book will do. After
48 recompiling <application>E2fsprogs</application>, you are now ready to
49 install <application>Heimdal</application>.</para>
50 </warning>
51
52 <para><application>Heimdal</application> is a free implementation
53 of Kerberos 5 that aims to be compatible with MIT Kerberos 5 and is
54 backward compatible with Kerberos 4. Kerberos is a network authentication
55 protocol. Basically it preserves the integrity of passwords in any
56 untrusted network (like the Internet). Kerberized applications work
57 hand-in-hand with sites that support Kerberos to ensure that passwords
58 cannot be stolen or compromised. A Kerberos installation will make changes
59 to the authentication mechanisms on your network and will overwrite several
60 programs and daemons from the <application>Shadow</application>,
61 <application>Inetutils</application> and
62 <application>Qpopper</application> packages. See
63 <ulink url="&files-anduin;/heimdal-overwrites"/> for a complete list of
64 all the files and commands to rename each of them.</para>
65
66 <bridgehead renderas="sect3">Package Information</bridgehead>
67 <itemizedlist spacing="compact">
68 <listitem>
69 <para>Download (HTTP): <ulink url="&heimdal-download-http;"/></para>
70 </listitem>
71 <listitem>
72 <para>Download (FTP): <ulink url="&heimdal-download-ftp;"/></para>
73 </listitem>
74 <listitem>
75 <para>Download MD5 sum: &heimdal-md5sum;</para>
76 </listitem>
77 <listitem>
78 <para>Download size: &heimdal-size;</para>
79 </listitem>
80 <listitem>
81 <para>Estimated disk space required: &heimdal-buildsize;</para>
82 </listitem>
83 <listitem>
84 <para>Estimated build time: &heimdal-time;</para>
85 </listitem>
86 </itemizedlist>
87
88 <bridgehead renderas="sect3">Additional Downloads</bridgehead>
89 <itemizedlist spacing='compact'>
90 <listitem>
91 <para>Required Patch: <ulink
92 url="&patch-root;/heimdal-&heimdal-version;-blfs_docs-1.patch"/></para>
93 </listitem>
94 <!-- <listitem>
95 <para>Required Patch: <ulink
96 url="&patch-root;/heimdal-&heimdal-version;-libss-1.patch"/></para>
97 </listitem> -->
98 </itemizedlist>
99
100 <bridgehead renderas="sect3">Heimdal Dependencies</bridgehead>
101
102 <bridgehead renderas="sect4">Required to Build the Server-Side Tools</bridgehead>
103 <para role="required">
104 <xref linkend="db"/> (recommended) or GDBM (GDBM is installed in LFS)</para>
105 <!-- <xref linkend="db"/> is recommended (installed in LFS)
106 or <xref linkend="gdbm"/></para> -->
107
108 <bridgehead renderas="sect4">Recommended</bridgehead>
109 <para role="recommended"><xref linkend="openssl"/></para>
110
111 <bridgehead renderas="sect4">Optional</bridgehead>
112 <para role="optional"><xref linkend="linux-pam"/>,
113 <xref linkend="openldap"/>,
114 <xref linkend="x-window-system"/>, and
115 <ulink url="http://www.kernel.org/pub/linux/libs/security/linux-privs/libcap2/">libcap2</ulink></para>
116
117 <note>
118 <para>Some sort of time synchronization facility on your system
119 (like <xref linkend="ntp"/>) is required since Kerberos won't
120 authenticate if the time differential between a kerberized client
121 and the KDC server is more than 5 minutes.</para>
122 </note>
123
124 <para condition="html" role="usernotes">User Notes:
125 <ulink url="&blfs-wiki;/heimdal"/></para>
126
127 </sect2>
128
129 <sect2 role="installation">
130 <title>Installation of Heimdal</title>
131
132 <warning>
133 <para>Ensure you really need a Kerberos installation before you decide
134 to install this package. Failure to install and configure the package
135 correctly can alter your system so that users cannot log in.</para>
136 </warning>
137
138 <para>Install <application>Heimdal</application> by running the following
139 commands:</para>
140
141<screen><userinput>patch -Np1 -i ../heimdal-&heimdal-version;-blfs_docs-1.patch &amp;&amp;
142sed -i.bak 's/struct krb5_cccol_cursor/&amp;_data/' \
143 lib/krb5/{krb5.h,cache.c}
144
145./configure --prefix=/usr \
146 --sysconfdir=/etc/heimdal \
147 --libexecdir=/usr/sbin \
148 --localstatedir=/var/lib/heimdal \
149 --datadir=/var/lib/heimdal \
150 --with-hdbdir=/var/lib/heimdal \
151 --with-readline=/usr \
152 --enable-kcm &amp;&amp;
153make</userinput></screen>
154
155 <para>If you have <xref linkend="tetex"/> installed and wish to create
156 alternate forms of the documentation, change into the
157 <filename class='directory'>doc</filename> directory and issue any or all
158 of the following commands (the <command>makeinfo</command> commands do not
159 require a <application>teTex</application> installation:</para>
160
161<screen><userinput>pushd doc &amp;&amp;
162
163make html &amp;&amp;
164
165texi2pdf heimdal.texi &amp;&amp;
166texi2dvi heimdal.texi &amp;&amp;
167dvips -o heimdal.ps heimdal.dvi &amp;&amp;
168makeinfo --plaintext -o heimdal.txt heimdal.texi &amp;&amp;
169
170texi2pdf hx509.texi &amp;&amp;
171texi2dvi hx509.texi &amp;&amp;
172dvips -o hx509.ps hx509.dvi &amp;&amp;
173makeinfo --plaintext -o hx509.txt hx509.texi &amp;&amp;
174
175popd</userinput></screen>
176
177 <para>To test the results, issue: <command>make -k check</command>. The
178 <command>check-ipropd</command> test is known to fail but all others should
179 pass.</para>
180
181 <para>Now, as the <systemitem class="username">root</systemitem> user:</para>
182
183<!-- <screen role="root"><?dbfo keep-together="auto"?><userinput>mv -v /usr/include/ss/ss.h /usr/include/ss/ss.h.e2fsprogs &amp;&amp;
184mv -v /usr/lib/libss.a /usr/lib/libss.a.e2fsprogs &amp;&amp;
185mv -v /usr/lib/libss.so /usr/lib/libss.so.e2fsprogs &amp;&amp;
186mv -v /usr/bin/mk_cmds /usr/bin/mk_cmds.e2fsprogs &amp;&amp;
187-->
188
189<screen role="root"><userinput>make install &amp;&amp;
190
191install -v -m755 -d /usr/share/doc/heimdal-&heimdal-version; &amp;&amp;
192install -v -m644 doc/{init-creds,layman.asc} \
193 /usr/share/doc/heimdal-&heimdal-version; &amp;&amp;
194
195ln -sfv mech.5 /usr/share/man/man5/qop.5 &amp;&amp;
196ln -sfv ../man5/mech.5 /usr/share/man/cat5/qop.5 &amp;&amp;
197ln -sfv ../man5/mech.5 /usr/share/man/cat5 &amp;&amp;
198
199mv -v /bin/login /bin/login.SHADOW &amp;&amp;
200mv -v /bin/su /bin/su.SHADOW &amp;&amp;
201mv -v /usr/bin/{login,su} /bin &amp;&amp;
202ln -v -sf ../../bin/login /usr/bin &amp;&amp;
203
204for LINK in \
205 lib{otp,kafs,krb5,hx509,asn1,roken,crypto,heimsqlite,wind}; do
206 mv -v /usr/lib/${LINK}.so.* /lib &amp;&amp;
207 ln -v -sf ../../lib/$(readlink /usr/lib/${LINK}.so) \
208 /usr/lib/${LINK}.so
209done &amp;&amp;
210
211mv -v /usr/lib/$(readlink /usr/lib/libdb.so) \
212 /usr/lib/libdb-?.so \
213 /lib &amp;&amp;
214ln -v -sf ../../lib/$(readlink /usr/lib/libdb.so) \
215 /usr/lib/libdb.so &amp;&amp;
216
217ldconfig</userinput></screen>
218
219<!-- mv -v /usr/include/ss/ss.h /usr/include/ss/ss.h.heimdal &amp;&amp;
220mv -v /usr/include/ss/ss.h.e2fsprogs /usr/include/ss/ss.h &amp;&amp;
221mv -v /usr/lib/libss.a /usr/lib/libss.a.heimdal &amp;&amp;
222mv -v /usr/lib/libss.a.e2fsprogs /usr/lib/libss.a &amp;&amp;
223mv -v /usr/lib/libss.so /usr/lib/libss.so.heimdal &amp;&amp;
224mv -v /usr/lib/libss.so.e2fsprogs /usr/lib/libss.so &amp;&amp;
225mv -v /usr/lib/libss.la /usr/lib/libss.la.heimdal &amp;&amp;
226mv -v /usr/bin/mk_cmds /usr/bin/mk_cmds.heimdal &amp;&amp;
227mv -v /usr/bin/mk_cmds.e2fsprogs /usr/bin/mk_cmds &amp;&amp; -->
228
229 <para>If you built any of the alternate forms of documentation, install it
230 using the following commands as the
231 <systemitem class="username">root</systemitem> user:</para>
232
233<screen role="root"><userinput>install -v -m644 doc/{heimdal,hx509}.{dvi,ps,pdf,html,txt} \
234 /usr/share/doc/heimdal-&heimdal-version;</userinput></screen>
235
236 <para>If you wish to use the <xref linkend="cracklib"/> library to enforce
237 strong passwords in the KDC database, issue the following commands as the
238 <systemitem class="username">root</systemitem> user:</para>
239
240<screen role="root"><userinput>sed -e 's|/usr/pkg|/usr|' \
241 -e 's|/usr/lib/cracklib_dict|/lib/cracklib/pw_dict|' \
242 -e 's|/var/heimdal|/var/lib/heimdal|' \
243 lib/kadm5/check-cracklib.pl \
244 > /bin/krb5-check-cracklib.pl &amp;&amp;
245
246chmod -v 755 /bin/krb5-check-cracklib.pl</userinput></screen>
247
248 </sect2>
249
250 <sect2 role="commands">
251 <title>Command Explanations</title>
252
253 <!-- <para><command>mv -v /usr/include/...</command>,
254 <command>mv -v /usr/lib/libss.* ...</command> and
255 <command>mv -v /usr/bin/mk_cmds ...</command>: The
256 <application>Heimdal</application> installation will overwrite an
257 interface header, static library, library symbolic link and a
258 shell script from the
259 <application>E2fsprogs</application> package. These commands rename the
260 original files before the installation, and then restore them (after
261 renaming the new <application>Heimdal</application> files) after the
262 installation.</para> -->
263
264 <para><command>sed -i.bak ... lib/krb5/{krb5.h,cache.c}</command>: This
265 command is an upstream fix for a multiple declaration.</para>
266
267 <para><parameter>--libexecdir=/usr/sbin</parameter>: This switch causes
268 the daemon programs to be installed into
269 <filename class="directory">/usr/sbin</filename>.</para>
270
271 <tip>
272 <para>If you want to preserve all your existing
273 <application>Inetutils</application> package daemons, install the
274 <application>Heimdal</application> daemons into
275 <filename class="directory">/usr/sbin/heimdal</filename> (or wherever
276 you want). Since these programs will be called from
277 <command>(x)inetd</command> or <filename>rc</filename> scripts, it
278 really doesn't matter where they are installed, as long as they are
279 correctly specified in the <filename>/etc/(x)inetd.conf</filename> file
280 and <filename>rc</filename> scripts. If you choose something other than
281 <filename class="directory">/usr/sbin</filename>, you may want to move
282 some of the user programs (such as <command>kadmin</command>) to
283 <filename class="directory">/usr/sbin</filename> manually so they'll be
284 in the privileged user's default <envar>PATH</envar>.</para>
285 </tip>
286
287 <para><parameter>--localstatedir=/var/lib/heimdal</parameter>,
288 <parameter>--datadir=/var/lib/heimdal</parameter> and
289 <parameter>--with-hdbdir=/var/lib/heimdal</parameter>: These parameters
290 are used so that the KDC database and associated files will all reside
291 in <filename class='directory'>/var/lib/heimdal</filename>.</para>
292
293 <para><parameter>--with-readline=/usr</parameter>: This parameter must be
294 used so that the <command>configure</command> script properly locates the
295 installed <application>Readline</application> package.</para>
296
297 <para><parameter>--enable-kcm</parameter>: This parameter enables building
298 the Kerberos Credentials Manager.</para>
299
300 <para><command>ln -sfv .../mech.5 /usr/share/man/...</command>: These
301 commands are used to fix some broken symbolic links.</para>
302
303 <para><command>mv ... ...SHADOW</command>, <command>mv ... /bin</command>
304 and <command> ln ... /usr/bin</command>: The <command>login</command>
305 and <command>su</command> programs installed by
306 <application>Heimdal</application> belong in the
307 <filename class="directory">/bin</filename> directory. The
308 <command>login</command> program is symlinked because
309 <application>Heimdal</application> is expecting to find it in
310 <filename class="directory">/usr/bin</filename>. The old executables from
311 the <application>Shadow</application> package are preserved before the move
312 so that they can be restored if you experience problems logging into the
313 system after the <application>Heimdal</application> package is installed
314 and configured.</para>
315
316 <para><command>for LINK in ...; do ...; done</command>,
317 <command>mv ... /lib</command> and
318 <command>ln ... /usr/lib/libdb.so</command>: The <command>login</command>
319 and <command>su</command> programs previously moved into the
320 <filename class='directory'>/lib</filename> directory link against
321 <application>Heimdal</application> libraries as well as libraries provided
322 by the <application>OpenSSL</application> and
323 <application>Berkeley DB</application> packages. These
324 libraries are also moved to <filename class="directory">/lib</filename>
325 so they are FHS compliant and also in case
326 <filename class="directory">/usr</filename> is located on a separate
327 partition which may not always be mounted.</para>
328
329 </sect2>
330
331 <sect2 role="configuration">
332 <title>Configuring Heimdal</title>
333
334 <sect3 id="heimdal-config">
335 <title>Config Files</title>
336
337 <para><filename>/etc/heimdal/*</filename></para>
338
339 <indexterm zone="heimdal heimdal-config">
340 <primary sortas="e-etc-heimdal">/etc/heimdal/*</primary>
341 </indexterm>
342
343 </sect3>
344
345 <sect3>
346 <title>Configuration Information</title>
347
348 <note>
349 <para>All the configuration steps shown below must be accomplished
350 by the <systemitem class='username'>root</systemitem> user unless
351 otherwise noted.</para>
352 </note>
353
354 <sect4>
355 <title>Master KDC Server Configuration</title>
356
357 <para>Many of the commands below use
358 <replaceable>&lt;replaceable&gt;</replaceable> tags to identify places
359 where you need to substitute information specific to your network.
360 Ensure you replace everything in these tags (there will be no angle
361 brackets when you are done) with your site-specific information.</para>
362
363 <para>Create the Kerberos configuration file with the following
364 commands:</para>
365
366<screen role="root"><userinput>install -v -m755 -d /etc/heimdal &amp;&amp;
367cat &gt; /etc/heimdal/krb5.conf &lt;&lt; "EOF" &amp;&amp;
368<literal># Begin /etc/heimdal/krb5.conf
369
370[libdefaults]
371 default_realm = <replaceable>&lt;EXAMPLE.COM&gt;</replaceable>
372 encrypt = true
373
374[realms]
375 <replaceable>&lt;EXAMPLE.COM&gt;</replaceable> = {
376 kdc = <replaceable>&lt;hostname.example.com&gt;</replaceable>
377 admin_server = <replaceable>&lt;hostname.example.com&gt;</replaceable>
378 kpasswd_server = <replaceable>&lt;hostname.example.com&gt;</replaceable>
379 }
380
381[domain_realm]
382 .<replaceable>&lt;example.com&gt;</replaceable> = <replaceable>&lt;EXAMPLE.COM&gt;</replaceable>
383
384[logging]
385 kdc = FILE:/var/log/kdc.log
386 admin_server = FILE:/var/log/kadmin.log
387 default = FILE:/var/log/krb.log
388
389# End /etc/heimdal/krb5.conf</literal>
390EOF
391chmod -v 644 /etc/heimdal/krb5.conf</userinput></screen>
392
393 <para>You will need to substitute your domain and proper hostname
394 for the occurrences of the <replaceable>&lt;hostname&gt;</replaceable>
395 and <replaceable>&lt;EXAMPLE.COM&gt;</replaceable> names.</para>
396
397 <para><option>default_realm</option> should be the name of your
398 domain changed to ALL CAPS. This isn't required, but both
399 <application>Heimdal</application> and <application>MIT
400 Kerberos</application> recommend it.</para>
401
402 <para><option>encrypt = true</option> provides encryption of all
403 traffic between kerberized clients and servers. It's not necessary
404 and can be left off. If you leave it off, you can encrypt all traffic
405 from the client to the server using a switch on the client program
406 instead. The <option>[realms]</option> parameters tell the client
407 programs where to look for the KDC authentication services. The
408 <option>[domain_realm]</option> section maps a domain
409 to a realm.</para>
410
411 <para>Store the master password in a key file using the following
412 commands:</para>
413
414<screen role="root"><userinput>install -v -m755 -d /var/lib/heimdal &amp;&amp;
415kstash</userinput></screen>
416
417 <para>Create the KDC database:</para>
418
419<screen role="root"><userinput>kadmin -l</userinput></screen>
420
421 <para>The commands below will prompt you for information about the
422 principles. Choose the defaults for now unless you know what you are
423 doing and need to specify different values. You can go in later and
424 change the defaults, should you feel the need. You may use the up and
425 down arrow keys to use the history feature of <command>kadmin</command>
426 in a similar manner as the <command>bash</command> history
427 feature.</para>
428
429 <para>At the <prompt>kadmin&gt;</prompt> prompt, issue the following
430 statement:</para>
431
432<screen role="root"><userinput>init <replaceable>&lt;EXAMPLE.COM&gt;</replaceable></userinput></screen>
433
434 <para>The database must now be populated with at least one principle
435 (user). For now, just use your regular login name or root. You may
436 create as few, or as many principles as you wish using the following
437 statement:</para>
438
439<screen role="root"><userinput>add <replaceable>&lt;loginname&gt;</replaceable></userinput></screen>
440
441 <para>The KDC server and any machine running kerberized
442 server daemons must have a host key installed:</para>
443
444<screen role="root"><userinput>add --random-key host/<replaceable>&lt;hostname.example.com&gt;</replaceable></userinput></screen>
445
446 <para>After choosing the defaults when prompted, you will have to
447 export the data to a keytab file:</para>
448
449<screen role="root"><userinput>ext host/<replaceable>&lt;hostname.example.com&gt;</replaceable></userinput></screen>
450
451 <para>This should have created two files in
452 <filename class="directory">/etc/heimdal</filename>:
453 <filename>krb5.keytab</filename> (Kerberos 5) and
454 <filename>srvtab</filename> (Kerberos 4). Both files should have 600
455 (root rw only) permissions. Keeping the keytab files from public access
456 is crucial to the overall security of the Kerberos installation.</para>
457
458 <para>Eventually, you'll want to add server daemon principles to the
459 database and extract them to the keytab file. You do this in the same
460 way you created the host principles. Below is an example:</para>
461
462<screen role="root"><userinput>add --random-key ftp/<replaceable>&lt;hostname.example.com&gt;</replaceable></userinput></screen>
463
464 <para>(choose the defaults)</para>
465
466<screen role="root"><userinput>ext ftp/<replaceable>&lt;hostname.example.com&gt;</replaceable></userinput></screen>
467
468 <para>Exit the <command>kadmin</command> program (use
469 <command>quit</command> or <command>exit</command>) and return back
470 to the shell prompt. Start the KDC daemon manually, just to test out
471 the installation:</para>
472
473<screen role="root"><userinput>/usr/sbin/kdc &amp;</userinput></screen>
474
475 <para>Attempt to get a TGT (ticket granting ticket) with
476 the following command:</para>
477
478<screen><userinput>kinit <replaceable>&lt;loginname&gt;</replaceable></userinput></screen>
479
480 <para>You will be prompted for the password you created. After you get
481 your ticket, you should list it with the following command:</para>
482
483<screen><userinput>klist</userinput></screen>
484
485 <para>Information about the ticket should be displayed on
486 the screen.</para>
487
488 <para>To test the functionality of the <filename>keytab</filename> file,
489 issue the following command:</para>
490
491<screen><userinput>ktutil list</userinput></screen>
492
493 <para>This should dump a list of the host principals, along with the
494 encryption methods used to access the principals.</para>
495
496 <para>At this point, if everything has been successful so far, you
497 can feel fairly confident in the installation, setup and configuration
498 of your new <application>Heimdal</application> Kerberos 5
499 installation.</para>
500
501 <para>If you wish to use the <xref linkend="cracklib"/> library to
502 enforce strong passwords in the KDC database, you must do two things.
503 First, add the following lines to the
504 <filename>/etc/heimdal/krb5.conf</filename> configuration file:</para>
505
506<screen><literal>[password_quality]
507 policies = builtin:external-check
508 external_program = /bin/krb5-check-cracklib.pl</literal></screen>
509
510 <para>Next you must install the
511 <application>Crypt::Cracklib</application>
512 <application>Perl</application> module. Download it from the CPAN
513 site. The URL at the time of this writing is <ulink
514 url="http://cpan.org/authors/id/D/DA/DANIEL/Crypt-Cracklib-1.2.tar.gz"/>.
515 After unpacking the tarball and changing into the newly created
516 directory, issue the following command to add the BLFS
517 <application>Cracklib</application> dictionary location to one of the
518 source files:</para>
519
520<screen><userinput>sed -i 's|pw_dict|&amp;\n\t\t/lib/cracklib/pw_dict|' Cracklib.pm</userinput></screen>
521
522 <para>Then use the standard <command>perl Makefile.PL</command>;
523 <command>make</command>; <command>make test</command>;
524 <command>make install</command> commands. Note that one test fails
525 due to an unknown reason.</para>
526
527 <para id="heimdal-init">Install the
528 <filename>/etc/rc.d/init.d/heimdal</filename> init script included
529 in the <xref linkend="bootscripts"/> package:</para>
530
531 <indexterm zone="heimdal heimdal-init">
532 <primary sortas="f-heimdal">heimdal</primary>
533 </indexterm>
534
535<screen role="root"><userinput>make install-heimdal</userinput></screen>
536
537 </sect4>
538
539 <sect4>
540 <title>Using Kerberized Client Programs</title>
541
542 <para>To use the kerberized client programs (<command>telnet</command>,
543 <command>ftp</command>, <command>rsh</command>,
544 <command>rxterm</command>, <command>rxtelnet</command>,
545 <command>rcp</command>, <command>xnlock</command>), you first must get
546 a TGT. Use the <command>kinit</command> program to get the ticket.
547 After you've acquired the ticket, you can use the kerberized programs
548 to connect to any kerberized server on the network. You will not be
549 prompted for authentication until your ticket expires (default is one
550 day), unless you specify a different user as a command line argument
551 to the program.</para>
552
553 <para>The kerberized programs will connect to non-kerberized daemons,
554 warning you that authentication is not encrypted.</para>
555
556 <para>In order to use the <application>Heimdal</application>
557 <application>X</application> programs, you'll need to add a service
558 port entry to the <filename>/etc/services</filename> file for the
559 <command>kxd</command> server. There is no 'standardized port number'
560 for the 'kx' service in the IANA database, so you'll have to pick an
561 unused port number. Add an entry to the <filename>services</filename>
562 file similar to the entry below (substitute your chosen port number
563 for <replaceable>&lt;49150&gt;</replaceable>):</para>
564
565<screen><literal>kx <replaceable>&lt;49150&gt;</replaceable>/tcp # Heimdal kerberos X
566kx <replaceable>&lt;49150&gt;</replaceable>/udp # Heimdal kerberos X</literal></screen>
567
568 <para>For additional information consult <ulink
569 url="&hints-root;/downloads/files/heimdal.txt">the
570 Heimdal hint</ulink> on which the above instructions are based.</para>
571
572 </sect4>
573
574 </sect3>
575
576 </sect2>
577
578 <sect2 role="content">
579 <title>Contents</title>
580
581 <segmentedlist>
582 <segtitle>Installed Programs</segtitle>
583 <segtitle>Installed Libraries</segtitle>
584 <segtitle>Installed Directories</segtitle>
585
586 <seglistitem>
587 <seg>afslog, ftp, ftpd, gss, hprop, hpropd, hxtool, iprop-log,
588 ipropd-master, ipropd-slave, kadmin, kadmind, kauth, kcm, kdc,
589 kdestroy, kdigest, kf, kfd, kgetcred, kimpersonate, kinit, klist,
590 kpasswd, kpasswdd, krb5-check-cracklib.pl, krb5-config, kstash,
591 ktutil, kx, kxd, login, mk_cmds-krb5, otp, otpprint, pagsh, pfrom,
592 popper, push, rcp, rsh, rshd, rxtelnet, rxterm, string2key, su,
593 telnet, telnetd, tenletxr, verify_krb5_conf and xnlock</seg>
594
595 <seg>hdb_ldap.{so,a}, libasn1.{so,a}, libeditline.{so,a},
596 libgssapi.{so,a}, libhdb.{so,a}, libheimntlm.{so,a}, libhx509.{so,a},
597 libkadm5clnt.{so,a}, libkadm5srv.{so,a}, libkafs.{so,a},
598 libkdc.{so,a}, libkrb5.{so,a}, libotp.{so,a}, libroken.{so,a},
599 libsl.{so,a}, libss-krb5.{so,a} and windc.{so,a}</seg>
600
601 <seg>/etc/heimdal, /usr/include/gssapi, /usr/include/kadm5,
602 /usr/include/krb5, /usr/include/roken, /usr/include/ss,
603 /usr/share/doc/heimdal-&heimdal-version; and /var/lib/heimdal</seg>
604 </seglistitem>
605 </segmentedlist>
606
607 <variablelist>
608 <bridgehead renderas="sect3">Short Descriptions</bridgehead>
609 <?dbfo list-presentation="list"?>
610 <?dbhtml list-presentation="table"?>
611
612 <varlistentry id="afslog">
613 <term><command>afslog</command></term>
614 <listitem>
615 <para>obtains AFS tokens for a number of cells.</para>
616 <indexterm zone="heimdal afslog">
617 <primary sortas="b-afslog">afslog</primary>
618 </indexterm>
619 </listitem>
620 </varlistentry>
621
622 <varlistentry id="ftp">
623 <term><command>ftp</command></term>
624 <listitem>
625 <para>is a kerberized FTP client.</para>
626 <indexterm zone="heimdal ftp">
627 <primary sortas="b-ftp">ftp</primary>
628 </indexterm>
629 </listitem>
630 </varlistentry>
631
632 <varlistentry id="ftpd">
633 <term><command>ftpd</command></term>
634 <listitem>
635 <para>is a kerberized FTP daemon.</para>
636 <indexterm zone="heimdal ftpd">
637 <primary sortas="b-ftpd">ftpd</primary>
638 </indexterm>
639 </listitem>
640 </varlistentry>
641
642 <varlistentry id="hprop">
643 <term><command>hprop</command></term>
644 <listitem>
645 <para> takes a principal database in a specified format and converts
646 it into a stream of <application>Heimdal</application> database
647 records.</para>
648 <indexterm zone="heimdal hprop">
649 <primary sortas="b-hprop">hprop</primary>
650 </indexterm>
651 </listitem>
652 </varlistentry>
653
654 <varlistentry id="hpropd">
655 <term><command>hpropd</command></term>
656 <listitem>
657 <para>is a server that receives a database sent by
658 <command>hprop</command> and writes it as a local database.</para>
659 <indexterm zone="heimdal hpropd">
660 <primary sortas="b-hpropd">hpropd</primary>
661 </indexterm>
662 </listitem>
663 </varlistentry>
664
665 <varlistentry id="iprop-log">
666 <term><command>iprop-log</command></term>
667 <listitem>
668 <para>is used to maintain the iprop log file.</para>
669 <indexterm zone="heimdal iprop-log">
670 <primary sortas="b-iprop-log">iprop-log</primary>
671 </indexterm>
672 </listitem>
673 </varlistentry>
674
675 <varlistentry id="ipropd-master">
676 <term><command>ipropd-master</command></term>
677 <listitem>
678 <para>is a daemon which runs on the master KDC
679 server which incrementally propagates changes to the KDC
680 database to the slave KDC servers.</para>
681 <indexterm zone="heimdal ipropd-master">
682 <primary sortas="b-ipropd-master">ipropd-master</primary>
683 </indexterm>
684 </listitem>
685 </varlistentry>
686
687 <varlistentry id="ipropd-slave">
688 <term><command>ipropd-slave</command></term>
689 <listitem>
690 <para>is a daemon which runs on the slave KDC
691 servers which incrementally propagates changes to the KDC
692 database from the master KDC server.</para>
693 <indexterm zone="heimdal ipropd-slave">
694 <primary sortas="b-ipropd-slave">ipropd-slave</primary>
695 </indexterm>
696 </listitem>
697 </varlistentry>
698
699 <varlistentry id="kadmin">
700 <term><command>kadmin</command></term>
701 <listitem>
702 <para>is a utility used to make modifications to the Kerberos
703 database.</para>
704 <indexterm zone="heimdal kadmin">
705 <primary sortas="b-kadmin">kadmin</primary>
706 </indexterm>
707 </listitem>
708 </varlistentry>
709
710 <varlistentry id="kadmind">
711 <term><command>kadmind</command></term>
712 <listitem>
713 <para>is a server for administrative access to the Kerberos
714 database.</para>
715 <indexterm zone="heimdal kadmind">
716 <primary sortas="b-kadmind">kadmind</primary>
717 </indexterm>
718 </listitem>
719 </varlistentry>
720
721 <varlistentry id="kauth">
722 <term><command>kauth</command></term>
723 <listitem>
724 <para>is a symbolic link to the <command>kinit</command>
725 program.</para>
726 <indexterm zone="heimdal kauth">
727 <primary sortas="g-kauth">kauth</primary>
728 </indexterm>
729 </listitem>
730 </varlistentry>
731
732 <varlistentry id="kcm">
733 <term><command>kcm</command></term>
734 <listitem>
735 <para>is a process based credential cache for Kerberos
736 tickets.</para>
737 <indexterm zone="heimdal kcm">
738 <primary sortas="b-kcm">kcm</primary>
739 </indexterm>
740 </listitem>
741 </varlistentry>
742
743 <varlistentry id="kdc">
744 <term><command>kdc</command></term>
745 <listitem>
746 <para>is a Kerberos 5 server.</para>
747 <indexterm zone="heimdal kdc">
748 <primary sortas="b-kdc">kdc</primary>
749 </indexterm>
750 </listitem>
751 </varlistentry>
752
753 <varlistentry id="kdestroy">
754 <term><command>kdestroy</command></term>
755 <listitem>
756 <para>removes a principle's current set of tickets.</para>
757 <indexterm zone="heimdal kdestroy">
758 <primary sortas="b-kdestroy">kdestroy</primary>
759 </indexterm>
760 </listitem>
761 </varlistentry>
762
763 <varlistentry id="kf">
764 <term><command>kf</command></term>
765 <listitem>
766 <para>is a program which forwards tickets to a remote host through
767 an authenticated and encrypted stream.</para>
768 <indexterm zone="heimdal kf">
769 <primary sortas="b-kf">kf</primary>
770 </indexterm>
771 </listitem>
772 </varlistentry>
773
774 <varlistentry id="kfd">
775 <term><command>kfd</command></term>
776 <listitem>
777 <para>is a server used to receive forwarded tickets.</para>
778 <indexterm zone="heimdal kfd">
779 <primary sortas="b-kfd">kfd</primary>
780 </indexterm>
781 </listitem>
782 </varlistentry>
783
784 <varlistentry id="kgetcred">
785 <term><command>kgetcred</command></term>
786 <listitem>
787 <para>obtains a ticket for a service.</para>
788 <indexterm zone="heimdal kgetcred">
789 <primary sortas="b-kgetcred">kgetcred</primary>
790 </indexterm>
791 </listitem>
792 </varlistentry>
793
794 <varlistentry id="kinit">
795 <term><command>kinit</command></term>
796 <listitem>
797 <para>is used to authenticate to the Kerberos server as a principal
798 and acquire a ticket granting ticket that can later be used to obtain
799 tickets for other services.</para>
800 <indexterm zone="heimdal kinit">
801 <primary sortas="b-kinit">kinit</primary>
802 </indexterm>
803 </listitem>
804 </varlistentry>
805
806 <varlistentry id="klist">
807 <term><command>klist</command></term>
808 <listitem>
809 <para>reads and displays the current tickets in the credential
810 cache.</para>
811 <indexterm zone="heimdal klist">
812 <primary sortas="b-klist">klist</primary>
813 </indexterm>
814 </listitem>
815 </varlistentry>
816
817 <varlistentry id="kpasswd">
818 <term><command>kpasswd</command></term>
819 <listitem>
820 <para>is a program for changing Kerberos 5 passwords.</para>
821 <indexterm zone="heimdal kpasswd">
822 <primary sortas="b-kpasswd">kpasswd</primary>
823 </indexterm>
824 </listitem>
825 </varlistentry>
826
827 <varlistentry id="kpasswdd">
828 <term><command>kpasswdd</command></term>
829 <listitem>
830 <para>is a Kerberos 5 password changing server.</para>
831 <indexterm zone="heimdal kpasswdd">
832 <primary sortas="b-kpasswdd">kpasswdd</primary>
833 </indexterm>
834 </listitem>
835 </varlistentry>
836
837 <varlistentry id="krb5-config-prog">
838 <term><command>krb5-config</command></term>
839 <listitem>
840 <para>gives information on how to link programs against
841 <application>Heimdal</application> libraries.</para>
842 <indexterm zone="heimdal krb5-config-prog">
843 <primary sortas="b-krb5-config">krb5-config</primary>
844 </indexterm>
845 </listitem>
846 </varlistentry>
847
848 <varlistentry id="kstash">
849 <term><command>kstash</command></term>
850 <listitem>
851 <para>stores the KDC master password in a file.</para>
852 <indexterm zone="heimdal kstash">
853 <primary sortas="b-kstash">kstash</primary>
854 </indexterm>
855 </listitem>
856 </varlistentry>
857
858 <varlistentry id="ktutil">
859 <term><command>ktutil</command></term>
860 <listitem>
861 <para>is a program for managing Kerberos keytabs.</para>
862 <indexterm zone="heimdal ktutil">
863 <primary sortas="b-ktutil">ktutil</primary>
864 </indexterm>
865 </listitem>
866 </varlistentry>
867
868 <varlistentry id="kx">
869 <term><command>kx</command></term>
870 <listitem>
871 <para>is a program which securely forwards
872 <application>X</application> connections.</para>
873 <indexterm zone="heimdal kx">
874 <primary sortas="b-kx">kx</primary>
875 </indexterm>
876 </listitem>
877 </varlistentry>
878
879 <varlistentry id="kxd">
880 <term><command>kxd</command></term>
881 <listitem>
882 <para>is the daemon for <command>kx</command>.</para>
883 <indexterm zone="heimdal kxd">
884 <primary sortas="b-kxd">kxd</primary>
885 </indexterm>
886 </listitem>
887 </varlistentry>
888
889 <varlistentry id="login">
890 <term><command>login</command></term>
891 <listitem>
892 <para>is a kerberized login program.</para>
893 <indexterm zone="heimdal login">
894 <primary sortas="b-login">login</primary>
895 </indexterm>
896 </listitem>
897 </varlistentry>
898
899 <varlistentry id="otp">
900 <term><command>otp</command></term>
901 <listitem>
902 <para>manages one-time passwords.</para>
903 <indexterm zone="heimdal otp">
904 <primary sortas="b-otp">otp</primary>
905 </indexterm>
906 </listitem>
907 </varlistentry>
908
909 <varlistentry id="otpprint">
910 <term><command>otpprint</command></term>
911 <listitem>
912 <para>prints lists of one-time passwords.</para>
913 <indexterm zone="heimdal otpprint">
914 <primary sortas="b-otpprint">otpprint</primary>
915 </indexterm>
916 </listitem>
917 </varlistentry>
918
919 <varlistentry id="pfrom">
920 <term><command>pfrom</command></term>
921 <listitem>
922 <para>is a script that runs <command>push --from</command>.</para>
923 <indexterm zone="heimdal pfrom">
924 <primary sortas="b-pfrom">pfrom</primary>
925 </indexterm>
926 </listitem>
927 </varlistentry>
928
929 <varlistentry id="popper">
930 <term><command>popper</command></term>
931 <listitem>
932 <para>is a kerberized POP-3 server.</para>
933 <indexterm zone="heimdal popper">
934 <primary sortas="b-popper">popper</primary>
935 </indexterm>
936 </listitem>
937 </varlistentry>
938
939 <varlistentry id="push">
940 <term><command>push</command></term>
941 <listitem>
942 <para>is a kerberized POP mail retrieval client.</para>
943 <indexterm zone="heimdal push">
944 <primary sortas="b-push">push</primary>
945 </indexterm>
946 </listitem>
947 </varlistentry>
948
949 <varlistentry id="rcp">
950 <term><command>rcp</command></term>
951 <listitem>
952 <para>is a kerberized rcp client program.</para>
953 <indexterm zone="heimdal rcp">
954 <primary sortas="b-rcp">rcp</primary>
955 </indexterm>
956 </listitem>
957 </varlistentry>
958
959 <varlistentry id="rsh">
960 <term><command>rsh</command></term>
961 <listitem>
962 <para>is a kerberized rsh client program.</para>
963 <indexterm zone="heimdal rsh">
964 <primary sortas="b-rsh">rsh</primary>
965 </indexterm>
966 </listitem>
967 </varlistentry>
968
969 <varlistentry id="rshd">
970 <term><command>rshd</command></term>
971 <listitem>
972 <para>is a kerberized rsh server.</para>
973 <indexterm zone="heimdal rshd">
974 <primary sortas="b-rshd">rshd</primary>
975 </indexterm>
976 </listitem>
977 </varlistentry>
978
979 <varlistentry id="rxtelnet">
980 <term><command>rxtelnet</command></term>
981 <listitem>
982 <para>starts a secure <command>xterm</command> window with a
983 <command>telnet</command> to a given host and forwards
984 <application>X</application> connections.</para>
985 <indexterm zone="heimdal rxtelnet">
986 <primary sortas="b-rxtelnet">rxtelnet</primary>
987 </indexterm>
988 </listitem>
989 </varlistentry>
990
991 <varlistentry id="rxterm">
992 <term><command>rxterm</command></term>
993 <listitem>
994 <para>starts a secure remote <command>xterm</command>.</para>
995 <indexterm zone="heimdal rxterm">
996 <primary sortas="b-rxterm">rxterm</primary>
997 </indexterm>
998 </listitem>
999 </varlistentry>
1000
1001 <varlistentry id="string2key">
1002 <term><command>string2key</command></term>
1003 <listitem>
1004 <para>maps a password into a key.</para>
1005 <indexterm zone="heimdal string2key">
1006 <primary sortas="b-string2key">string2key</primary>
1007 </indexterm>
1008 </listitem>
1009 </varlistentry>
1010
1011 <varlistentry id="su">
1012 <term><command>su</command></term>
1013 <listitem>
1014 <para>is a kerberized su client program.</para>
1015 <indexterm zone="heimdal su">
1016 <primary sortas="b-su">su</primary>
1017 </indexterm>
1018 </listitem>
1019 </varlistentry>
1020
1021 <varlistentry id="telnet">
1022 <term><command>telnet</command></term>
1023 <listitem>
1024 <para>is a kerberized telnet client program.</para>
1025 <indexterm zone="heimdal telnet">
1026 <primary sortas="b-telnet">telnet</primary>
1027 </indexterm>
1028 </listitem>
1029 </varlistentry>
1030
1031 <varlistentry id="telnetd">
1032 <term><command>telnetd</command></term>
1033 <listitem>
1034 <para>is a kerberized telnet server.</para>
1035 <indexterm zone="heimdal telnetd">
1036 <primary sortas="b-telnetd">telnetd</primary>
1037 </indexterm>
1038 </listitem>
1039 </varlistentry>
1040
1041 <varlistentry id="tenletxr">
1042 <term><command>tenletxr</command></term>
1043 <listitem>
1044 <para>forwards <application>X</application> connections
1045 backwards.</para>
1046 <indexterm zone="heimdal tenletxr">
1047 <primary sortas="b-tenletxr">tenletxr</primary>
1048 </indexterm>
1049 </listitem>
1050 </varlistentry>
1051
1052 <varlistentry id="verify_krb5_conf">
1053 <term><command>verify_krb5_conf</command></term>
1054 <listitem>
1055 <para>checks <filename>krb5.conf</filename> file for obvious
1056 errors.</para>
1057 <indexterm zone="heimdal verify_krb5_conf">
1058 <primary sortas="b-verify_krb5_conf">verify_krb5_conf</primary>
1059 </indexterm>
1060 </listitem>
1061 </varlistentry>
1062
1063 <varlistentry id="xnlock">
1064 <term><command>xnlock</command></term>
1065 <listitem>
1066 <para>is a program that acts as a secure screen saver for
1067 workstations running <application>X</application>.</para>
1068 <indexterm zone="heimdal xnlock">
1069 <primary sortas="b-xnlock">xnlock</primary>
1070 </indexterm>
1071 </listitem>
1072 </varlistentry>
1073
1074 <varlistentry id="libasn1">
1075 <term><filename class='libraryfile'>libasn1.{so,a}</filename></term>
1076 <listitem>
1077 <para>provides the ASN.1 and DER functions to encode and decode
1078 the Kerberos TGTs.</para>
1079 <indexterm zone="heimdal libasn1">
1080 <primary sortas="c-libasn1">libasn1.{so,a}</primary>
1081 </indexterm>
1082 </listitem>
1083 </varlistentry>
1084
1085 <varlistentry id="libeditline">
1086 <term><filename class='libraryfile'>libeditline.a</filename></term>
1087 <listitem>
1088 <para>is a command-line editing library with history.</para>
1089 <indexterm zone="heimdal libeditline">
1090 <primary sortas="c-libeditline">libeditline.a</primary>
1091 </indexterm>
1092 </listitem>
1093 </varlistentry>
1094
1095 <varlistentry id="libgssapi">
1096 <term><filename class='libraryfile'>libgssapi.{so,a}</filename></term>
1097 <listitem>
1098 <para>contain the Generic Security Service Application Programming
1099 Interface (GSSAPI) functions which provides security
1100 services to callers in a generic fashion, supportable with a range of
1101 underlying mechanisms and technologies and hence allowing source-level
1102 portability of applications to different environments.</para>
1103 <indexterm zone="heimdal libgssapi">
1104 <primary sortas="c-libgssapi">libgssapi.{so,a}</primary>
1105 </indexterm>
1106 </listitem>
1107 </varlistentry>
1108
1109 <varlistentry id="libhdb">
1110 <term><filename class='libraryfile'>libhdb.{so,a}</filename></term>
1111 <listitem>
1112 <para>is a <application>Heimdal</application> Kerberos 5
1113 authentication/authorization database access library.</para>
1114 <indexterm zone="heimdal libhdb">
1115 <primary sortas="c-libhdb">libhdb.{so,a}</primary>
1116 </indexterm>
1117 </listitem>
1118 </varlistentry>
1119
1120 <varlistentry id="libkadm5clnt">
1121 <term><filename class='libraryfile'>libkadm5clnt.{so,a}</filename></term>
1122 <listitem>
1123 <para>contains the administrative authentication and password
1124 checking functions required by Kerberos 5 client-side programs.</para>
1125 <indexterm zone="heimdal libkadm5clnt">
1126 <primary sortas="c-libkadm5clnt">libkadm5clnt.{so,a}</primary>
1127 </indexterm>
1128 </listitem>
1129 </varlistentry>
1130
1131 <varlistentry id="libkadm5srv">
1132 <term><filename class='libraryfile'>libkadm5srv.{so,a}</filename></term>
1133 <listitem>
1134 <para>contain the administrative authentication and password
1135 checking functions required by Kerberos 5 servers.</para>
1136 <indexterm zone="heimdal libkadm5srv">
1137 <primary sortas="c-libkadm5srv">libkadm5srv.{so,a}</primary>
1138 </indexterm>
1139 </listitem>
1140 </varlistentry>
1141
1142 <varlistentry id="libkafs">
1143 <term><filename class='libraryfile'>libkafs.{so,a}</filename></term>
1144 <listitem>
1145 <para>contains the functions required to authenticated to AFS.</para>
1146 <indexterm zone="heimdal libkafs">
1147 <primary sortas="c-libkafs">libkafs.{so,a}</primary>
1148 </indexterm>
1149 </listitem>
1150 </varlistentry>
1151
1152 <varlistentry id="libkrb5">
1153 <term><filename class='libraryfile'>libkrb5.{so,a}</filename></term>
1154 <listitem>
1155 <para>is an all-purpose Kerberos 5 library.</para>
1156 <indexterm zone="heimdal libkrb5">
1157 <primary sortas="c-libkrb5">libkrb5.{so,a}</primary>
1158 </indexterm>
1159 </listitem>
1160 </varlistentry>
1161
1162 <varlistentry id="libotp">
1163 <term><filename class='libraryfile'>libotp.{so,a}</filename></term>
1164 <listitem>
1165 <para>contains the functions required to handle authenticating
1166 one time passwords.</para>
1167 <indexterm zone="heimdal libotp">
1168 <primary sortas="c-libotp">libotp.{so,a}</primary>
1169 </indexterm>
1170 </listitem>
1171 </varlistentry>
1172
1173 <varlistentry id="libroken">
1174 <term><filename class='libraryfile'>libroken.{so,a}</filename></term>
1175 <listitem>
1176 <para>is a library containing Kerberos 5 compatibility
1177 functions.</para>
1178 <indexterm zone="heimdal libroken">
1179 <primary sortas="c-libroken">libroken.{so,a}</primary>
1180 </indexterm>
1181 </listitem>
1182 </varlistentry>
1183
1184 </variablelist>
1185
1186 </sect2>
1187
1188</sect1>
Note: See TracBrowser for help on using the repository browser.