source: postlfs/security/mitkrb.xml@ 51eb0bf

11.1 11.2 11.3 12.0 12.1 gimp3 kea ken/TL2024 ken/inkscape-core-mods ken/tuningfonts lazarus lxqt plabs/newcss plabs/python-mods python3.11 qt5new rahul/power-profiles-daemon renodr/vulkan-addition trunk xry111/intltool xry111/llvm18 xry111/soup3 xry111/test-20220226 xry111/xf86-video-removal
Last change on this file since 51eb0bf was ca783379, checked in by Douglas R. Reno <renodr@…>, 2 years ago

Package Updates and Tags:

Update to tree-2.0.2
Update to scons-4.3.0

  • Property mode set to 100644
File size: 32.4 KB
RevLine 
[b4b71892]1<?xml version="1.0" encoding="ISO-8859-1"?>
[6732c094]2<!DOCTYPE sect1 PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
3 "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
[b4b71892]4 <!ENTITY % general-entities SYSTEM "../../general.ent">
5 %general-entities;
6
[c82398b2]7 <!ENTITY mitkrb-download-http "https://kerberos.org/dist/krb5/&mitkrb-major-version;/krb5-&mitkrb-version;.tar.gz">
[fa47d680]8 <!ENTITY mitkrb-download-ftp " ">
[44d67a6f]9 <!ENTITY mitkrb-md5sum "eb51b7724111e1a458a8c9a261d45a31">
[fa50ece]10 <!ENTITY mitkrb-size "8.3 MB">
[44d67a6f]11 <!ENTITY mitkrb-buildsize "95 MB (add 24 MB for tests)">
12 <!ENTITY mitkrb-time "0.4 SBU (Using parallelism=4; add 1.6 SBU for tests)">
[b4b71892]13]>
14
[f91ceaa]15<sect1 id="mitkrb" xreflabel="MIT Kerberos V5-&mitkrb-version;">
[93c27d5]16 <?dbhtml filename="mitkrb.html"?>
17
18 <sect1info>
19 <date>$Date$</date>
20 </sect1info>
21
[f91ceaa]22 <title>MIT Kerberos V5-&mitkrb-version;</title>
[93c27d5]23
24 <indexterm zone="mitkrb">
[f91ceaa]25 <primary sortas="a-MIT-Kerberos">MIT Kerberos V5</primary>
[93c27d5]26 </indexterm>
27
28 <sect2 role="package">
[f91ceaa]29 <title>Introduction to MIT Kerberos V5</title>
[93c27d5]30
[fa47d680]31 <para>
32 <application>MIT Kerberos V5</application> is a free implementation
33 of Kerberos 5. Kerberos is a network authentication protocol. It
34 centralizes the authentication database and uses kerberized
35 applications to work with servers or services that support Kerberos
36 allowing single logins and encrypted communication over internal
37 networks or the Internet.
38 </para>
[93c27d5]39
[ca783379]40 &lfs111_checked;
[597a2890]41
[93c27d5]42 <bridgehead renderas="sect3">Package Information</bridgehead>
43 <itemizedlist spacing="compact">
44 <listitem>
[fa47d680]45 <para>
46 Download (HTTP): <ulink url="&mitkrb-download-http;"/>
47 </para>
[93c27d5]48 </listitem>
[29d1c248]49 <listitem>
[fa47d680]50 <para>
51 Download (FTP): <ulink url="&mitkrb-download-ftp;"/>
52 </para>
[29d1c248]53 </listitem>
[93c27d5]54 <listitem>
[fa47d680]55 <para>
56 Download MD5 sum: &mitkrb-md5sum;
57 </para>
[93c27d5]58 </listitem>
59 <listitem>
[fa47d680]60 <para>
61 Download size: &mitkrb-size;
62 </para>
[93c27d5]63 </listitem>
64 <listitem>
[fa47d680]65 <para>
66 Estimated disk space required: &mitkrb-buildsize;
67 </para>
[93c27d5]68 </listitem>
69 <listitem>
[fa47d680]70 <para>
71 Estimated build time: &mitkrb-time;
72 </para>
[93c27d5]73 </listitem>
74 </itemizedlist>
[af22057]75
[2189c53]76 <bridgehead renderas="sect3">Additional Downloads</bridgehead>
[afe14ff]77 <itemizedlist spacing="compact">
78 <listitem>
79 <para>
80 Required patch:
81 <ulink url="&patch-root;/mitkrb-&mitkrb-version;-openssl3_fixes-1.patch"/>
82 </para>
83 </listitem>
84 </itemizedlist>
85
[f91ceaa]86 <bridgehead renderas="sect3">MIT Kerberos V5 Dependencies</bridgehead>
[93c27d5]87
88 <bridgehead renderas="sect4">Optional</bridgehead>
[fa47d680]89 <para role="optional">
[f4002c5]90 <!-- <xref linkend="dejagnu"/> (for full test coverage), -->
[5c4a616]91 <xref linkend="bind-utils"/>,
[bf7a21dd]92 <xref linkend="gnupg2"/> (to authenticate the package),
[fa47d680]93 <xref linkend="keyutils"/>,
[294e6bd]94 <xref linkend="openldap"/>,<!-- Seems so that mit has its own
95 implementation of rpc now.
96 <xref linkend="rpcbind"/> (used during the testsuite),-->
[fa50ece]97 <xref linkend="valgrind"/> (used during the testsuite),
[5c4a616]98 <xref linkend="yasm"/>,
[f99ea56]99 <ulink url="http://thrysoee.dk/editline/">libedit</ulink>,
[fa50ece]100 <ulink url="https://cmocka.org/">cmocka</ulink>,
101 <ulink url="https://pypi.org/project/pyrad/">pyrad</ulink>, and
102 <ulink url="https://cwrap.org/resolv_wrapper.html">resolv_wrapper</ulink>
[fa47d680]103 </para>
[93c27d5]104
105 <note>
[fa47d680]106 <para>
107 Some sort of time synchronization facility on your system (like
108 <xref linkend="ntp"/>) is required since Kerberos won't authenticate
109 if there is a time difference between a kerberized client and the
110 KDC server.
111 </para>
[93c27d5]112 </note>
[af22057]113
[3597eb6]114 <para condition="html" role="usernotes">User Notes:
[fa47d680]115 <ulink url="&blfs-wiki;/mitkrb"/>
116 </para>
[93c27d5]117 </sect2>
118
119 <sect2 role="installation">
[f91ceaa]120 <title>Installation of MIT Kerberos V5</title>
[93c27d5]121
[29e27d02]122 <para>
123 First, fix a denial-of-service security vulnerability:
124 <!-- CVE-2021-37750, mentioned in Samba release notes for 4.15.0. -->
125 </para>
126
127<screen><userinput remap="pre">sed -i '210a if (sprinc == NULL) {\
128 status = "NULL_SERVER";\
129 errcode = KRB5KDC_ERR_S_PRINCIPAL_UNKNOWN;\
130 goto cleanup;\
131 }' src/kdc/do_tgs_req.c</userinput></screen>
132
[afe14ff]133 <para>
134 Next, fix several issues identified by OpenSSL-3:
135 </para>
136
137<screen><userinput remap="pre">patch -Np1 -i ../mitkrb-1.19.2-openssl3_fixes-1.patch</userinput></screen>
138
[fa47d680]139 <para>
140 Build <application>MIT Kerberos V5</application> by running the
141 following commands:
142 </para>
[93c27d5]143
[af21cbe2]144<screen><userinput>cd src &amp;&amp;
[5c4a616]145
[f22b905]146sed -i -e 's@\^u}@^u cols 300}@' tests/dejagnu/config/default.exp &amp;&amp;
147sed -i -e '/eq 0/{N;s/12 //}' plugins/kdb/db2/libdb2/test/run.test &amp;&amp;
[5c4a616]148sed -i '/t_iprop.py/d' tests/Makefile.in &amp;&amp;
[096aa70]149
[afe14ff]150autoreconf -fiv &amp;&amp;
151
[bf7a21dd]152./configure --prefix=/usr \
153 --sysconfdir=/etc \
154 --localstatedir=/var/lib \
[5c4a616]155 --runstatedir=/run \
[256e1e84]156 --with-system-et \
157 --with-system-ss \
[6e08e9c0]158 --with-system-verto=no \
[597a2890]159 --enable-dns-for-realm &amp;&amp;
[93c27d5]160make</userinput></screen>
161
[fa47d680]162 <para>
[096aa70]163 To test the build, issue as the <systemitem
[6332a8ad]164 class="username">root</systemitem> user: <command>make -k -j1 check</command>.
[f4002c5]165 <!-- You need at least <xref link end="tcl"/>, which is used to drive the
166 testsuite. Furthermore, <xref link end="dejagnu"/> must be available for
167 some of the tests to run.--> If you have a former version of MIT Kerberos V5
168 installed, it may happen that the test suite may pick up the installed
[096aa70]169 versions of the libraries, rather than the newly built ones. If so, it is
[3d6fbea9]170 better to run the tests after the installation. Some tests may fail with
171 the latest version of dejagnu and glibc.
[6332a8ad]172 <!-- Note: on my laptop -j8 fails but -j1 passes -->
[fa47d680]173 </para>
[f91ceaa]174
[fa47d680]175 <para>
176 Now, as the <systemitem class="username">root</systemitem> user:
177 </para>
[93c27d5]178
179<screen role="root"><userinput>make install &amp;&amp;
[f91ceaa]180
[98dd5b8]181install -v -dm755 /usr/share/doc/krb5-&mitkrb-version; &amp;&amp;
[ea6894f]182cp -vfr ../doc/* /usr/share/doc/krb5-&mitkrb-version;</userinput></screen>
[af22057]183
[93c27d5]184 </sect2>
185
186 <sect2 role="commands">
187 <title>Command Explanations</title>
[af22057]188
[debb0893]189 <para>
[8558044]190 The first <command>sed</command> increases the width of the virtual
[5c4a616]191 terminal used for some tests to prevent some spurious text in the output
192 which is taken as a failure. The second <command>sed</command> removes a
193 test that is known to fail. The third <command>sed</command> removes a
194 test that is known to hang.
[debb0893]195 </para>
196
[fa47d680]197 <para>
[f1d7196]198 <parameter>--localstatedir=/var/lib</parameter>: This option is
[5c4a616]199 used so that the Kerberos variable runtime data is located in
[4453848]200 <filename class="directory">/var/lib</filename> instead of
201 <filename class="directory">/usr/var</filename>.
[fa47d680]202 </para>
[256e1e84]203
[5c4a616]204 <para>
205 <parameter>--runstatedir=/run</parameter>: This option is used so that
206 the Kerberos runtime state information is located in
207 <filename class="directory">/run</filename> instead of the deprecated
208 <filename class="directory">/var/run</filename>.
209 </para>
210
[fa47d680]211 <para>
[256e1e84]212 <parameter>--with-system-et</parameter>: This switch causes the build
[fa47d680]213 to use the system-installed versions of the error-table support
214 software.
215 </para>
216
217 <para>
[256e1e84]218 <parameter>--with-system-ss</parameter>: This switch causes the build
[fa47d680]219 to use the system-installed versions of the subsystem command-line
220 interface software.
221 </para>
222
[6e08e9c0]223 <para>
[f1d7196]224 <parameter>--with-system-verto=no</parameter>: This switch fixes a bug in
[6e08e9c0]225 the package: it does not recognize its own verto library installed
226 previously. This is not a problem, if reinstalling the same version,
227 but if you are updating, the old library is used as system's one,
228 instead of installing the new version.
229 </para>
230
[fa47d680]231 <para>
[f1d7196]232 <parameter>--enable-dns-for-realm</parameter>: This switch allows
[4453848]233 realms to be resolved using the DNS server.
[fa47d680]234 </para>
235
236 <para>
[2f12da13]237 <option>--with-ldap</option>: Use this switch if you want to compile the
[096aa70]238 <application>OpenLDAP</application> database backend module.
239 </para>
240
[f5f17d5]241 <!-- FIXME: Removed due to merged-/usr setup
[096aa70]242 <para>
[8558044]243 <command>mv -v /usr/lib/libk... /lib </command> and
244 <command>ln -v -sf ../../lib/libk... /usr/lib/libk...</command>:
[096aa70]245 Move critical libraries to the
246 <filename class="directory">/lib</filename> directory so that they are
[fa47d680]247 available when the <filename class="directory">/usr</filename>
248 filesystem is not mounted.
249 </para>
250
251 <para>
[8558044]252 <command>find /usr/lib -type f -name "lib$f*.so*" -exec chmod -v 755 {} \;</command>:
[2c87187]253 This command changes the permissions of installed libraries.
[096aa70]254 </para>
255
256 <para>
257 <command>mv -v /usr/bin/ksu /bin</command>: Moves the
258 <command>ksu</command> program to the
259 <filename class="directory">/bin</filename> directory so that it is
260 available when the <filename class="directory">/usr</filename>
261 filesystem is not mounted.
[fa47d680]262 </para>
[f5f17d5]263 -->
[93c27d5]264
265 </sect2>
266
267 <sect2 role="configuration">
[f91ceaa]268 <title>Configuring MIT Kerberos V5</title>
[af22057]269
[93c27d5]270 <sect3 id="krb5-config">
271 <title>Config Files</title>
272
[fa47d680]273 <para>
274 <filename>/etc/krb5.conf</filename> and
275 <filename>/var/lib/krb5kdc/kdc.conf</filename>
276 </para>
[93c27d5]277
278 <indexterm zone="mitkrb krb5-config">
[597a2890]279 <primary sortas="e-etc-krb5.conf">/etc/krb5.conf</primary>
[93c27d5]280 </indexterm>
281
282 <indexterm zone="mitkrb krb5-config">
283 <primary sortas="e-var-lib-krb5kdc-kdc.conf">/var/lib/krb5kdc/kdc.conf</primary>
284 </indexterm>
285
286 </sect3>
287
288 <sect3>
289 <title>Configuration Information</title>
290
291 <sect4>
292 <title>Kerberos Configuration</title>
293
[f91ceaa]294 <tip>
[fa47d680]295 <para>
296 You should consider installing some sort of password checking
297 dictionary so that you can configure the installation to only
298 accept strong passwords. A suitable dictionary to use is shown in
299 the <xref linkend="cracklib"/> instructions. Note that only one
300 file can be used, but you can concatenate many files into one. The
301 configuration file shown below assumes you have installed a
302 dictionary to <filename>/usr/share/dict/words</filename>.
303 </para>
[f91ceaa]304 </tip>
305
[fa47d680]306 <para>
307 Create the Kerberos configuration file with the following
308 commands issued by the <systemitem class="username">root</systemitem>
309 user:
310 </para>
[93c27d5]311
[597a2890]312<screen role="root"><userinput>cat &gt; /etc/krb5.conf &lt;&lt; "EOF"
313<literal># Begin /etc/krb5.conf
[dc04b84]314
[b4b71892]315[libdefaults]
[ea6bb02]316 default_realm = <replaceable>&lt;EXAMPLE.ORG&gt;</replaceable>
[b4b71892]317 encrypt = true
318
319[realms]
[ea6bb02]320 <replaceable>&lt;EXAMPLE.ORG&gt;</replaceable> = {
321 kdc = <replaceable>&lt;belgarath.example.org&gt;</replaceable>
322 admin_server = <replaceable>&lt;belgarath.example.org&gt;</replaceable>
[f91ceaa]323 dict_file = /usr/share/dict/words
[b4b71892]324 }
325
326[domain_realm]
[ea6bb02]327 .<replaceable>&lt;example.org&gt;</replaceable> = <replaceable>&lt;EXAMPLE.ORG&gt;</replaceable>
[b4b71892]328
329[logging]
[d24ce70c]330 kdc = SYSLOG:INFO:AUTH
331 admin_server = SYSLOG:INFO:AUTH
332 default = SYSLOG:DEBUG:DAEMON
[b4b71892]333
[597a2890]334# End /etc/krb5.conf</literal>
[93c27d5]335EOF</userinput></screen>
336
[fa47d680]337 <para>
338 You will need to substitute your domain and proper hostname for the
339 occurrences of the <replaceable>&lt;belgarath&gt;</replaceable> and
[ea6bb02]340 <replaceable>&lt;example.org&gt;</replaceable> names.
[fa47d680]341 </para>
342
343 <para>
344 <option>default_realm</option> should be the name of your
345 domain changed to ALL CAPS. This isn't required, but both
346 <application>Heimdal</application> and MIT recommend it.
347 </para>
348
349 <para>
350 <option>encrypt = true</option> provides encryption of all traffic
351 between kerberized clients and servers. It's not necessary and can
352 be left off. If you leave it off, you can encrypt all traffic from
353 the client to the server using a switch on the client program
354 instead.
355 </para>
356
357 <para>
358 The <option>[realms]</option> parameters tell the client programs
359 where to look for the KDC authentication services.
360 </para>
361
362 <para>
363 The <option>[domain_realm]</option> section maps a domain to a realm.
364 </para>
365
366 <para>
367 Create the KDC database:
368 </para>
[93c27d5]369
[ea6bb02]370<screen role="root"><userinput>kdb5_util create -r <replaceable>&lt;EXAMPLE.ORG&gt;</replaceable> -s</userinput></screen>
[93c27d5]371
[fa47d680]372 <para>
[601a838]373 Now you should populate the database with principals
[fa47d680]374 (users). For now, just use your regular login name or
375 <systemitem class="username">root</systemitem>.
376 </para>
[93c27d5]377
378<screen role="root"><userinput>kadmin.local
[bf7a21dd]379<prompt>kadmin.local:</prompt> add_policy dict-only
380<prompt>kadmin.local:</prompt> addprinc -policy dict-only <replaceable>&lt;loginname&gt;</replaceable></userinput></screen>
[93c27d5]381
[fa47d680]382 <para>
383 The KDC server and any machine running kerberized
384 server daemons must have a host key installed:
385 </para>
[93c27d5]386
[ea6bb02]387<screen role="root"><userinput><prompt>kadmin.local:</prompt> addprinc -randkey host/<replaceable>&lt;belgarath.example.org&gt;</replaceable></userinput></screen>
[93c27d5]388
[fa47d680]389 <para>
390 After choosing the defaults when prompted, you will have to
391 export the data to a keytab file:
392 </para>
[93c27d5]393
[ea6bb02]394<screen role="root"><userinput><prompt>kadmin.local:</prompt> ktadd host/<replaceable>&lt;belgarath.example.org&gt;</replaceable></userinput></screen>
[93c27d5]395
[fa47d680]396 <para>
397 This should have created a file in
398 <filename class="directory">/etc</filename> named
399 <filename>krb5.keytab</filename> (Kerberos 5). This file should
400 have 600 (<systemitem class="username">root</systemitem> rw only)
401 permissions. Keeping the keytab files from public access is crucial
402 to the overall security of the Kerberos installation.
403 </para>
[93c27d5]404
[fa47d680]405 <para>
406 Exit the <command>kadmin</command> program (use
407 <command>quit</command> or <command>exit</command>) and return
408 back to the shell prompt. Start the KDC daemon manually, just to
409 test out the installation:
410 </para>
[93c27d5]411
[fa47d680]412<screen role="root"><userinput>/usr/sbin/krb5kdc</userinput></screen>
[93c27d5]413
[fa47d680]414 <para>
415 Attempt to get a ticket with the following command:
416 </para>
[93c27d5]417
[3597eb6]418<screen><userinput>kinit <replaceable>&lt;loginname&gt;</replaceable></userinput></screen>
[93c27d5]419
[fa47d680]420 <para>
421 You will be prompted for the password you created. After you
422 get your ticket, you can list it with the following command:
423 </para>
[93c27d5]424
425<screen><userinput>klist</userinput></screen>
426
[fa47d680]427 <para>
428 Information about the ticket should be displayed on the
429 screen.
430 </para>
[93c27d5]431
[fa47d680]432 <para>
433 To test the functionality of the keytab file, issue the
[fa50ece]434 following command as the
435 <systemitem class="username">root</systemitem> user:
[fa47d680]436 </para>
[93c27d5]437
[fa50ece]438<screen role="root"><userinput>ktutil
[597a2890]439<prompt>ktutil:</prompt> rkt /etc/krb5.keytab
[93c27d5]440<prompt>ktutil:</prompt> l</userinput></screen>
441
[fa47d680]442 <para>
443 This should dump a list of the host principal, along with
444 the encryption methods used to access the principal.
445 </para>
[93c27d5]446
[f8359b8]447 <para>
448 Create an empty ACL file that can be modified later:
449 </para>
450
451<screen role="root"><userinput>touch /var/lib/krb5kdc/kadm5.acl</userinput></screen>
452
[fa47d680]453 <para>
454 At this point, if everything has been successful so far, you
455 can feel fairly confident in the installation and configuration of
456 the package.
457 </para>
[93c27d5]458
459 </sect4>
[b4b71892]460
[93c27d5]461 <sect4>
462 <title>Additional Information</title>
463
[fa47d680]464 <para>
[bf7a21dd]465 For additional information consult the <ulink
466 url="http://web.mit.edu/kerberos/www/krb5-&mitkrb-major-version;/#documentation">
467 documentation for krb5-&mitkrb-version;</ulink> on which the above
[fa47d680]468 instructions are based.
469 </para>
[93c27d5]470
471 </sect4>
472
473 </sect3>
[6aeeb90]474
[d9d26317]475 <sect3 id="mitkrb-init">
[f586237]476 <title><phrase revision="sysv">Init Script</phrase>
477 <phrase revision="systemd">Systemd Unit</phrase></title>
[d9d26317]478
[f586237]479 <para revision="sysv">
[d9d26317]480 If you want to start <application>Kerberos</application> services
481 at boot, install the <filename>/etc/rc.d/init.d/krb5</filename> init
[f586237]482 script included in the <xref linkend="bootscripts"/> package using
[d9d26317]483 the following command:
484 </para>
485
[f586237]486 <para revision="systemd">
487 If you want to start <application>Kerberos</application> services
488 at boot, install the <filename>krb5.service</filename> unit included in
489 the <xref linkend="systemd-units"/> package using the following command:
490 </para>
491
[d9d26317]492 <indexterm zone="mitkrb mitkrb-init">
493 <primary sortas="f-krb5">krb5</primary>
494 </indexterm>
495
496<screen role="root"><userinput>make install-krb5</userinput></screen>
497
498 </sect3>
499
[93c27d5]500 </sect2>
501
502 <sect2 role="content">
[fa47d680]503
[93c27d5]504 <title>Contents</title>
[af22057]505
[93c27d5]506 <segmentedlist>
507 <segtitle>Installed Programs</segtitle>
508 <segtitle>Installed Libraries</segtitle>
509 <segtitle>Installed Directories</segtitle>
510
511 <seglistitem>
[fa47d680]512 <seg>
[0d7900a]513 gss-client, gss-server, k5srvutil, kadmin, kadmin.local,
[bf7a21dd]514 kadmind, kdb5_ldap_util (optional), kdb5_util, kdestroy, kinit, klist,
[e10e1a8e]515 kpasswd, kprop, kpropd, kproplog, krb5-config, krb5-send-pr, krb5kdc,
[0d7900a]516 ksu, kswitch, ktutil, kvno, sclient, sim_client, sim_server,
[b7a300f7]517 sserver, uuclient, and uuserver
[fa47d680]518 </seg>
519 <seg>
[af21cbe2]520 libgssapi_krb5.so, libgssrpc.so, libk5crypto.so, libkadm5clnt_mit.so,
521 libkadm5clnt.so, libkadm5srv_mit.so, libkadm5srv.so, libkdb_ldap.so
522 (optional), libkdb5.so, libkrad.so, libkrb5.so, libkrb5support.so,
[6e08e9c0]523 libverto.so, and some plugins under the /usr/lib/krb5 tree
[fa47d680]524 </seg>
525 <seg>
[ad22690]526 /usr/include/{gssapi,gssrpc,kadm5,krb5},
[0d7900a]527 /usr/lib/krb5,
[096aa70]528 /usr/share/{doc/krb5-&mitkrb-version;,examples/krb5},
[8558044]529 /var/lib/krb5kdc, and
530 /run/krb5kdc
[fa47d680]531 </seg>
[93c27d5]532 </seglistitem>
533 </segmentedlist>
534
535 <variablelist>
536 <bridgehead renderas="sect3">Short Descriptions</bridgehead>
537 <?dbfo list-presentation="list"?>
538 <?dbhtml list-presentation="table"?>
539
[73fe507]540 <varlistentry id="gss-client">
541 <term><command>gss-client</command></term>
542 <listitem>
543 <para>
[4c24eb0a]544 is a GSSAPI test client
[73fe507]545 </para>
546 <indexterm zone="mitkrb gss-client">
547 <primary sortas="b-gss-client">gss-client</primary>
548 </indexterm>
549 </listitem>
550 </varlistentry>
551
552 <varlistentry id="gss-server">
553 <term><command>gss-server</command></term>
554 <listitem>
555 <para>
[4c24eb0a]556 is a GSSAPI test server
[73fe507]557 </para>
558 <indexterm zone="mitkrb gss-server">
559 <primary sortas="b-gss-server">gss-server</primary>
560 </indexterm>
561 </listitem>
562 </varlistentry>
563
[93c27d5]564 <varlistentry id="k5srvutil">
565 <term><command>k5srvutil</command></term>
566 <listitem>
[fa47d680]567 <para>
[4c24eb0a]568 is a host keytable manipulation utility
[fa47d680]569 </para>
[93c27d5]570 <indexterm zone="mitkrb k5srvutil">
571 <primary sortas="b-k5srvutil">k5srvutil</primary>
572 </indexterm>
573 </listitem>
574 </varlistentry>
575
[fa47d680]576 <varlistentry id="kadmin">
[93c27d5]577 <term><command>kadmin</command></term>
578 <listitem>
[fa47d680]579 <para>
[0f46f6c]580 is an utility used to make modifications
[4c24eb0a]581 to the Kerberos database
[fa47d680]582 </para>
583 <indexterm zone="mitkrb kadmin">
[93c27d5]584 <primary sortas="b-kadmin">kadmin</primary>
585 </indexterm>
586 </listitem>
587 </varlistentry>
588
[28370fe]589 <varlistentry id="kadmin.local">
590 <term><command>kadmin.local</command></term>
591 <listitem>
592 <para>
[0f46f6c]593 is an utility similar to <command>kadmin</command>, but if the
[28370fe]594 database is db2, the local client <command>kadmin.local</command>,
595 is intended to run directly on the master KDC without Kerberos
[4c24eb0a]596 authentication
[28370fe]597 </para>
598 <indexterm zone="mitkrb kadmin.local">
599 <primary sortas="b-kadmin.local">kadmin.local</primary>
600 </indexterm>
601 </listitem>
602 </varlistentry>
603
[fa47d680]604 <varlistentry id="kadmind">
[93c27d5]605 <term><command>kadmind</command></term>
606 <listitem>
[fa47d680]607 <para>
608 is a server for administrative access
[4c24eb0a]609 to a Kerberos database
[fa47d680]610 </para>
611 <indexterm zone="mitkrb kadmind">
[93c27d5]612 <primary sortas="b-kadmind">kadmind</primary>
613 </indexterm>
614 </listitem>
615 </varlistentry>
616
[73fe507]617 <varlistentry id="kdb5_ldap_util">
618 <term><command>kdb5_ldap_util (optional)</command></term>
619 <listitem>
620 <para>
621 allows an administrator to manage realms, Kerberos services
[4c24eb0a]622 and ticket policies
[73fe507]623 </para>
624 <indexterm zone="mitkrb kdb5_ldap_util">
625 <primary sortas="b-kdb5_ldap_util">kdb5_ldap_util</primary>
626 </indexterm>
627 </listitem>
628 </varlistentry>
629
[93c27d5]630 <varlistentry id="kdb5_util">
631 <term><command>kdb5_util</command></term>
632 <listitem>
[fa47d680]633 <para>
[4c24eb0a]634 is the KDC database utility
[fa47d680]635 </para>
[93c27d5]636 <indexterm zone="mitkrb kdb5_util">
637 <primary sortas="b-kdb5_util">kdb5_util</primary>
638 </indexterm>
639 </listitem>
640 </varlistentry>
641
[fa47d680]642 <varlistentry id="kdestroy">
[93c27d5]643 <term><command>kdestroy</command></term>
644 <listitem>
[fa47d680]645 <para>
[4c24eb0a]646 removes the current set of tickets
[fa47d680]647 </para>
648 <indexterm zone="mitkrb kdestroy">
[93c27d5]649 <primary sortas="b-kdestroy">kdestroy</primary>
650 </indexterm>
651 </listitem>
652 </varlistentry>
653
[fa47d680]654 <varlistentry id="kinit">
[93c27d5]655 <term><command>kinit</command></term>
656 <listitem>
[fa47d680]657 <para>
658 is used to authenticate to the Kerberos server as a
659 principal and acquire a ticket granting ticket that can
[4c24eb0a]660 later be used to obtain tickets for other services
[fa47d680]661 </para>
662 <indexterm zone="mitkrb kinit">
[93c27d5]663 <primary sortas="b-kinit">kinit</primary>
664 </indexterm>
665 </listitem>
666 </varlistentry>
667
[fa47d680]668 <varlistentry id="klist">
[93c27d5]669 <term><command>klist</command></term>
670 <listitem>
[fa47d680]671 <para>
672 reads and displays the current tickets in
[4c24eb0a]673 the credential cache
[fa47d680]674 </para>
675 <indexterm zone="mitkrb klist">
[93c27d5]676 <primary sortas="b-klist">klist</primary>
677 </indexterm>
678 </listitem>
679 </varlistentry>
680
[fa47d680]681 <varlistentry id="kpasswd">
[93c27d5]682 <term><command>kpasswd</command></term>
683 <listitem>
[fa47d680]684 <para>
[4c24eb0a]685 is a program for changing Kerberos 5 passwords
[fa47d680]686 </para>
687 <indexterm zone="mitkrb kpasswd">
[93c27d5]688 <primary sortas="b-kpasswd">kpasswd</primary>
689 </indexterm>
690 </listitem>
691 </varlistentry>
692
693 <varlistentry id="kprop">
694 <term><command>kprop</command></term>
695 <listitem>
[fa47d680]696 <para>
697 takes a principal database in a specified format and
[4c24eb0a]698 converts it into a stream of database records
[fa47d680]699 </para>
[93c27d5]700 <indexterm zone="mitkrb kprop">
701 <primary sortas="b-kprop">kprop</primary>
702 </indexterm>
703 </listitem>
704 </varlistentry>
705
706 <varlistentry id="kpropd">
707 <term><command>kpropd</command></term>
708 <listitem>
[fa47d680]709 <para>
710 receives a database sent by <command>kprop</command>
[4c24eb0a]711 and writes it as a local database
[fa47d680]712 </para>
[93c27d5]713 <indexterm zone="mitkrb kpropd">
714 <primary sortas="b-kpropd">kpropd</primary>
715 </indexterm>
716 </listitem>
717 </varlistentry>
718
[73fe507]719 <varlistentry id="kproplog">
720 <term><command>kproplog</command></term>
721 <listitem>
722 <para>
723 displays the contents of the KDC database update log to standard
[4c24eb0a]724 output
[73fe507]725 </para>
726 <indexterm zone="mitkrb kproplog">
727 <primary sortas="b-kproplog">kproplog</primary>
728 </indexterm>
729 </listitem>
730 </varlistentry>
731
[f91ceaa]732 <varlistentry id="krb5-config-prog2">
[93c27d5]733 <term><command>krb5-config</command></term>
734 <listitem>
[fa47d680]735 <para>
736 gives information on how to link programs against
[4c24eb0a]737 libraries
[fa47d680]738 </para>
[f91ceaa]739 <indexterm zone="mitkrb krb5-config-prog2">
740 <primary sortas="b-krb5-config">krb5-config</primary>
[93c27d5]741 </indexterm>
742 </listitem>
743 </varlistentry>
744
745 <varlistentry id="krb5kdc">
746 <term><command>krb5kdc</command></term>
747 <listitem>
[fa47d680]748 <para>
[4c24eb0a]749 is the <application>Kerberos 5</application> server
[fa47d680]750 </para>
[93c27d5]751 <indexterm zone="mitkrb krb5kdc">
752 <primary sortas="b-krb5kdc">krb5kdc</primary>
753 </indexterm>
754 </listitem>
755 </varlistentry>
756
[28370fe]757 <varlistentry id="krb5-send-pr">
758 <term><command>krb5-send-pr</command></term>
[73fe507]759 <listitem>
760 <para>
[4c24eb0a]761 sends a problem report (PR) to a central support site
[73fe507]762 </para>
[28370fe]763 <indexterm zone="mitkrb krb5-send-pr">
764 <primary sortas="b-krb-send-pr">krb5-send-pr</primary>
[73fe507]765 </indexterm>
766 </listitem>
767 </varlistentry>
768
[93c27d5]769 <varlistentry id="ksu">
770 <term><command>ksu</command></term>
771 <listitem>
[fa47d680]772 <para>
773 is the super user program using Kerberos protocol.
774 Requires a properly configured
775 <filename>/etc/shells</filename> and
776 <filename>~/.k5login</filename> containing principals
[4c24eb0a]777 authorized to become super users
[fa47d680]778 </para>
[93c27d5]779 <indexterm zone="mitkrb ksu">
780 <primary sortas="b-ksu">ksu</primary>
781 </indexterm>
782 </listitem>
783 </varlistentry>
784
[597a2890]785 <varlistentry id="kswitch">
786 <term><command>kswitch</command></term>
787 <listitem>
[fa47d680]788 <para>
[0d7900a]789 makes the specified credential cache the
790 primary cache for the collection, if a cache
[4c24eb0a]791 collection is available
[fa47d680]792 </para>
[597a2890]793 <indexterm zone="mitkrb kswitch">
794 <primary sortas="b-kswitch">kswitch</primary>
795 </indexterm>
796 </listitem>
797 </varlistentry>
798
[fa47d680]799 <varlistentry id="ktutil">
[93c27d5]800 <term><command>ktutil</command></term>
801 <listitem>
[fa47d680]802 <para>
[4c24eb0a]803 is a program for managing Kerberos keytabs
[fa47d680]804 </para>
805 <indexterm zone="mitkrb ktutil">
[93c27d5]806 <primary sortas="b-ktutil">ktutil</primary>
807 </indexterm>
808 </listitem>
809 </varlistentry>
810
811 <varlistentry id="kvno">
812 <term><command>kvno</command></term>
813 <listitem>
[fa47d680]814 <para>
[4c24eb0a]815 prints keyversion numbers of Kerberos principals
[fa47d680]816 </para>
[93c27d5]817 <indexterm zone="mitkrb kvno">
818 <primary sortas="b-kvno">kvno</primary>
819 </indexterm>
820 </listitem>
821 </varlistentry>
822
[597a2890]823 <varlistentry id="sclient">
824 <term><command>sclient</command></term>
[93c27d5]825 <listitem>
[fa47d680]826 <para>
[2f12da13]827 is used to contact a sample server and authenticate to it
[fa47d680]828 using Kerberos 5 tickets, then display the server's
[4c24eb0a]829 response
[fa47d680]830 </para>
[597a2890]831 <indexterm zone="mitkrb sclient">
832 <primary sortas="b-sclient">sclient</primary>
[93c27d5]833 </indexterm>
834 </listitem>
835 </varlistentry>
836
[73fe507]837 <varlistentry id="sim_client">
838 <term><command>sim_client</command></term>
839 <listitem>
840 <para>
841 is a simple UDP-based sample client program, for
[4c24eb0a]842 demonstration
[73fe507]843 </para>
844 <indexterm zone="mitkrb sim_client">
845 <primary sortas="b-sim_client">sim_client</primary>
846 </indexterm>
847 </listitem>
848 </varlistentry>
849
850 <varlistentry id="sim_server">
851 <term><command>sim_server</command></term>
852 <listitem>
853 <para>
854 is a simple UDP-based server application, for
[4c24eb0a]855 demonstration
[73fe507]856 </para>
857 <indexterm zone="mitkrb sim_server">
858 <primary sortas="b-sim_server">sim_server</primary>
859 </indexterm>
860 </listitem>
861 </varlistentry>
862
[597a2890]863 <varlistentry id="sserver">
864 <term><command>sserver</command></term>
[93c27d5]865 <listitem>
[fa47d680]866 <para>
[4c24eb0a]867 is the sample Kerberos 5 server
[fa47d680]868 </para>
[597a2890]869 <indexterm zone="mitkrb sserver">
870 <primary sortas="b-sserver">sserver</primary>
[93c27d5]871 </indexterm>
872 </listitem>
873 </varlistentry>
874
[73fe507]875 <varlistentry id="uuclient">
876 <term><command>uuclient</command></term>
877 <listitem>
878 <para>
[4c24eb0a]879 is another sample client
[73fe507]880 </para>
881 <indexterm zone="mitkrb uuclient">
882 <primary sortas="b-uuclient">uuclient</primary>
883 </indexterm>
884 </listitem>
885 </varlistentry>
886
887 <varlistentry id="uuserver">
888 <term><command>uuserver</command></term>
889 <listitem>
890 <para>
[4c24eb0a]891 is another sample server
[73fe507]892 </para>
893 <indexterm zone="mitkrb uuserver">
894 <primary sortas="b-uuserver">uuserver</primary>
895 </indexterm>
896 </listitem>
897 </varlistentry>
898
899
[fa47d680]900 <varlistentry id="libgssapi_krb5">
[3ff3b9b]901 <term><filename class="libraryfile">libgssapi_krb5.so</filename></term>
[93c27d5]902 <listitem>
[fa47d680]903 <para>
[2f12da13]904 contains the Generic Security Service Application Programming
[fa47d680]905 Interface (GSSAPI) functions which provides security services
906 to callers in a generic fashion, supportable with a range of
907 underlying mechanisms and technologies and hence allowing
908 source-level portability of applications to different
[4c24eb0a]909 environments
[fa47d680]910 </para>
911 <indexterm zone="mitkrb libgssapi_krb5">
[f91ceaa]912 <primary sortas="c-libgssapi_krb5">libgssapi_krb5.so</primary>
[93c27d5]913 </indexterm>
914 </listitem>
915 </varlistentry>
916
[fa47d680]917 <varlistentry id="libkadm5clnt">
[3ff3b9b]918 <term><filename class="libraryfile">libkadm5clnt.so</filename></term>
[93c27d5]919 <listitem>
[fa47d680]920 <para>
921 contains the administrative authentication and password checking
[4c24eb0a]922 functions required by Kerberos 5 client-side programs
[fa47d680]923 </para>
924 <indexterm zone="mitkrb libkadm5clnt">
[f91ceaa]925 <primary sortas="c-libkadm5clnt">libkadm5clnt.so</primary>
[93c27d5]926 </indexterm>
927 </listitem>
928 </varlistentry>
929
[fa47d680]930 <varlistentry id="libkadm5srv">
[3ff3b9b]931 <term><filename class="libraryfile">libkadm5srv.so</filename></term>
[93c27d5]932 <listitem>
[fa47d680]933 <para>
[2f12da13]934 contains the administrative authentication and password
[4c24eb0a]935 checking functions required by Kerberos 5 servers
[fa47d680]936 </para>
937 <indexterm zone="mitkrb libkadm5srv">
[f91ceaa]938 <primary sortas="c-libkadm5srv">libkadm5srv.so</primary>
[93c27d5]939 </indexterm>
940 </listitem>
941 </varlistentry>
942
943 <varlistentry id="libkdb5">
[3ff3b9b]944 <term><filename class="libraryfile">libkdb5.so</filename></term>
[93c27d5]945 <listitem>
[fa47d680]946 <para>
947 is a Kerberos 5 authentication/authorization database
[4c24eb0a]948 access library
[fa47d680]949 </para>
[93c27d5]950 <indexterm zone="mitkrb libkdb5">
[f91ceaa]951 <primary sortas="c-libkdb5">libkdb5.so</primary>
[93c27d5]952 </indexterm>
953 </listitem>
954 </varlistentry>
955
[bf7a21dd]956 <varlistentry id="libkrad">
957 <term><filename class="libraryfile">libkrad.so</filename></term>
958 <listitem>
959 <para>
[4c24eb0a]960 contains the internal support library for RADIUS functionality
[bf7a21dd]961 </para>
962 <indexterm zone="mitkrb libkrad">
963 <primary sortas="c-libkrad">libkrad.so</primary>
964 </indexterm>
965 </listitem>
966 </varlistentry>
967
[fa47d680]968 <varlistentry id="libkrb5">
[3ff3b9b]969 <term><filename class="libraryfile">libkrb5.so</filename></term>
[93c27d5]970 <listitem>
[fa47d680]971 <para>
[4c24eb0a]972 is an all-purpose <application>Kerberos 5</application> library
[fa47d680]973 </para>
974 <indexterm zone="mitkrb libkrb5">
[f91ceaa]975 <primary sortas="c-libkrb5">libkrb5.so</primary>
[93c27d5]976 </indexterm>
977 </listitem>
978 </varlistentry>
979
980 </variablelist>
[af22057]981
[93c27d5]982 </sect2>
[1dce143]983
984</sect1>
Note: See TracBrowser for help on using the repository browser.