source: postlfs/security/mitkrb.xml@ a5c1131

10.0 10.1 11.0 11.1 11.2 11.3 12.0 12.1 8.1 8.2 8.3 8.4 9.0 9.1 basic bdubbs/svn elogind kea ken/TL2024 ken/inkscape-core-mods ken/tuningfonts lazarus lxqt perl-modules plabs/newcss plabs/python-mods python3.11 qt5new rahul/power-profiles-daemon renodr/vulkan-addition trunk upgradedb xry111/intltool xry111/llvm18 xry111/soup3 xry111/test-20220226 xry111/xf86-video-removal
Last change on this file since a5c1131 was 002a109, checked in by Douglas R. Reno <renodr@…>, 7 years ago

Update to krb5-1.15.1

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@18450 af4574ff-66df-0310-9fd7-8a98e5e911e0

  • Property mode set to 100644
File size: 32.1 KB
RevLine 
[b4b71892]1<?xml version="1.0" encoding="ISO-8859-1"?>
[6732c094]2<!DOCTYPE sect1 PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
3 "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
[b4b71892]4 <!ENTITY % general-entities SYSTEM "../../general.ent">
5 %general-entities;
6
[66dadf9]7<!-- <!ENTITY mitkrb-download-http "http://web.mit.edu/kerberos/www/dist/krb5/&mitkrb-major-version;/krb5-&mitkrb-version;-signed.tar">-->
8 <!ENTITY mitkrb-download-http "http://web.mit.edu/kerberos/dist/krb5/&mitkrb-major-version;/krb5-&mitkrb-version;.tar.gz">
[fa47d680]9 <!ENTITY mitkrb-download-ftp " ">
[002a109]10 <!ENTITY mitkrb-md5sum "8022f3a1cde8463e44fd35ef42731f85">
11 <!ENTITY mitkrb-size "9.0 MB">
12 <!ENTITY mitkrb-buildsize "136 MB (additional 24 MB for the testsuite)">
13 <!ENTITY mitkrb-time "0.9 SBU (additional 4.0 SBU for the testsuite)">
[b4b71892]14]>
15
[f91ceaa]16<sect1 id="mitkrb" xreflabel="MIT Kerberos V5-&mitkrb-version;">
[93c27d5]17 <?dbhtml filename="mitkrb.html"?>
18
19 <sect1info>
20 <othername>$LastChangedBy$</othername>
21 <date>$Date$</date>
22 </sect1info>
23
[f91ceaa]24 <title>MIT Kerberos V5-&mitkrb-version;</title>
[93c27d5]25
26 <indexterm zone="mitkrb">
[f91ceaa]27 <primary sortas="a-MIT-Kerberos">MIT Kerberos V5</primary>
[93c27d5]28 </indexterm>
29
30 <sect2 role="package">
[f91ceaa]31 <title>Introduction to MIT Kerberos V5</title>
[93c27d5]32
[fa47d680]33 <para>
34 <application>MIT Kerberos V5</application> is a free implementation
35 of Kerberos 5. Kerberos is a network authentication protocol. It
36 centralizes the authentication database and uses kerberized
37 applications to work with servers or services that support Kerberos
38 allowing single logins and encrypted communication over internal
39 networks or the Internet.
40 </para>
[93c27d5]41
[4ebade44]42 &lfs80_checked;
[597a2890]43
[93c27d5]44 <bridgehead renderas="sect3">Package Information</bridgehead>
45 <itemizedlist spacing="compact">
46 <listitem>
[fa47d680]47 <para>
48 Download (HTTP): <ulink url="&mitkrb-download-http;"/>
49 </para>
[93c27d5]50 </listitem>
[29d1c248]51 <listitem>
[fa47d680]52 <para>
53 Download (FTP): <ulink url="&mitkrb-download-ftp;"/>
54 </para>
[29d1c248]55 </listitem>
[93c27d5]56 <listitem>
[fa47d680]57 <para>
58 Download MD5 sum: &mitkrb-md5sum;
59 </para>
[93c27d5]60 </listitem>
61 <listitem>
[fa47d680]62 <para>
63 Download size: &mitkrb-size;
64 </para>
[93c27d5]65 </listitem>
66 <listitem>
[fa47d680]67 <para>
68 Estimated disk space required: &mitkrb-buildsize;
69 </para>
[93c27d5]70 </listitem>
71 <listitem>
[fa47d680]72 <para>
73 Estimated build time: &mitkrb-time;
74 </para>
[93c27d5]75 </listitem>
76 </itemizedlist>
[af22057]77
[002a109]78<!-- Patch is not needed for this version, but don't remove this.
[d24ce70c]79 <bridgehead renderas="sect3">Additional Downloads</bridgehead>
80 <itemizedlist spacing="compact">
81 <listitem>
82 <para>
83 Patch required on systems with IPv4 only enabled:
84 <ulink url="&patch-root;/mitkrb-&mitkrb-version;-fix_ipv4_only-1.patch"/>
85 </para>
86 </listitem>
87 </itemizedlist>
[002a109]88-->
[d24ce70c]89
[f91ceaa]90 <bridgehead renderas="sect3">MIT Kerberos V5 Dependencies</bridgehead>
[93c27d5]91
92 <bridgehead renderas="sect4">Optional</bridgehead>
[fa47d680]93 <para role="optional">
[bf7a21dd]94 <xref linkend="dejagnu"/> (for full test coverage),
95 <xref linkend="gnupg2"/> (to authenticate the package),
[fa47d680]96 <xref linkend="keyutils"/>,
[debb0893]97 <xref linkend="openldap"/>,
[0f46f6c]98 <xref linkend="python2"/> (used during the testsuite),
99 <xref linkend="rpcbind"/> (used during the testsuite), and
100 <xref linkend="valgrind"/> (used during the test suite)
[fa47d680]101 </para>
[93c27d5]102
103 <note>
[fa47d680]104 <para>
105 Some sort of time synchronization facility on your system (like
106 <xref linkend="ntp"/>) is required since Kerberos won't authenticate
107 if there is a time difference between a kerberized client and the
108 KDC server.
109 </para>
[93c27d5]110 </note>
[af22057]111
[3597eb6]112 <para condition="html" role="usernotes">User Notes:
[fa47d680]113 <ulink url="&blfs-wiki;/mitkrb"/>
114 </para>
[93c27d5]115 </sect2>
116
117 <sect2 role="installation">
[f91ceaa]118 <title>Installation of MIT Kerberos V5</title>
[93c27d5]119
[002a109]120<!-- PATCH IS REJECTED - ALREADY PATCHED
[d24ce70c]121 <para>
122 If your system is configured to support only IPv4, apply the following
123 patch:
124 </para>
125
126<screen><userinput>patch -p1 -i ../mitkrb-&mitkrb-version;-fix_ipv4_only-1.patch</userinput></screen>
[002a109]127-->
[d24ce70c]128
[fa47d680]129 <para>
130 Build <application>MIT Kerberos V5</application> by running the
131 following commands:
132 </para>
[93c27d5]133
[af21cbe2]134<screen><userinput>cd src &amp;&amp;
[90cb5d6]135
[debb0893]136sed -e "s@python2.5/Python.h@&amp; python2.7/Python.h@g" \
137 -e "s@-lpython2.5]@&amp;,\n AC_CHECK_LIB(python2.7,main,[PYTHON_LIB=-lpython2.7])@g" \
138 -i configure.in &amp;&amp;
[90cb5d6]139
[bf7a21dd]140sed -e 's@\^u}@^u cols 300}@' \
141 -i tests/dejagnu/config/default.exp &amp;&amp;
[90cb5d6]142
[096aa70]143sed -e '/eq 0/{N;s/12 //}' \
144 -i plugins/kdb/db2/libdb2/test/run.test &amp;&amp;
145
[debb0893]146autoconf &amp;&amp;
[bf7a21dd]147./configure --prefix=/usr \
148 --sysconfdir=/etc \
149 --localstatedir=/var/lib \
150 --with-system-et \
151 --with-system-ss \
[6e08e9c0]152 --with-system-verto=no \
[597a2890]153 --enable-dns-for-realm &amp;&amp;
[93c27d5]154make</userinput></screen>
155
[fa47d680]156 <para>
[096aa70]157 To test the build, issue as the <systemitem
158 class="username">root</systemitem> user: <command>make check</command>.
159 You need at least <xref linkend="tcl"/>, which is used to drive the
160 testsuite. Furthermore, <xref linkend="dejagnu"/> must be available for
161 some of the tests to run. If you have a former version of MIT Kerberos V5
[bf7a21dd]162 installed, it may happen that the test suite pick up the installed
[096aa70]163 versions of the libraries, rather than the newly built ones. If so, it is
164 better to run the tests after the installation.
[fa47d680]165 </para>
[f91ceaa]166
[fa47d680]167 <para>
168 Now, as the <systemitem class="username">root</systemitem> user:
169 </para>
[93c27d5]170
171<screen role="root"><userinput>make install &amp;&amp;
[f91ceaa]172
[096aa70]173for f in gssapi_krb5 gssrpc k5crypto kadm5clnt kadm5srv \
174 kdb5 kdb_ldap krad krb5 krb5support verto ; do
175
176 find /usr/lib -type f -name "lib$f*.so*" -exec chmod -v 755 {} \;
[ea6894f]177done &amp;&amp;
[98dd5b8]178
[2799196]179mv -v /usr/lib/libkrb5.so.3* /lib &amp;&amp;
180mv -v /usr/lib/libk5crypto.so.3* /lib &amp;&amp;
[f91ceaa]181mv -v /usr/lib/libkrb5support.so.0* /lib &amp;&amp;
182
[2799196]183ln -v -sf ../../lib/libkrb5.so.3.3 /usr/lib/libkrb5.so &amp;&amp;
184ln -v -sf ../../lib/libk5crypto.so.3.1 /usr/lib/libk5crypto.so &amp;&amp;
[597a2890]185ln -v -sf ../../lib/libkrb5support.so.0.1 /usr/lib/libkrb5support.so &amp;&amp;
[f91ceaa]186
[98dd5b8]187mv -v /usr/bin/ksu /bin &amp;&amp;
188chmod -v 755 /bin/ksu &amp;&amp;
189
190install -v -dm755 /usr/share/doc/krb5-&mitkrb-version; &amp;&amp;
[ea6894f]191cp -vfr ../doc/* /usr/share/doc/krb5-&mitkrb-version;</userinput></screen>
[af22057]192
[93c27d5]193 </sect2>
194
195 <sect2 role="commands">
196 <title>Command Explanations</title>
[af22057]197
[debb0893]198 <para>
[bf7a21dd]199 <command>sed -e ...</command>: The first <command>sed</command> fixes
[572862b]200 <application>Python</application> detection. The second one increases
[096aa70]201 the width of the virtual terminal used for some tests to prevent
202 some spurious text in the output which is taken as a failure. The
203 third <command>sed</command> removes a test that is known to fail.
[debb0893]204 </para>
205
[fa47d680]206 <para>
[f1d7196]207 <parameter>--localstatedir=/var/lib</parameter>: This option is
[4453848]208 used so that the Kerberos variable run-time data is located in
209 <filename class="directory">/var/lib</filename> instead of
210 <filename class="directory">/usr/var</filename>.
[fa47d680]211 </para>
212
213 <para>
[f1d7196]214 <parameter>--with-system-et</parameter>: This switch causes the build
[fa47d680]215 to use the system-installed versions of the error-table support
216 software.
217 </para>
218
219 <para>
[f1d7196]220 <parameter>--with-system-ss</parameter>: This switch causes the build
[fa47d680]221 to use the system-installed versions of the subsystem command-line
222 interface software.
223 </para>
224
[6e08e9c0]225 <para>
[f1d7196]226 <parameter>--with-system-verto=no</parameter>: This switch fixes a bug in
[6e08e9c0]227 the package: it does not recognize its own verto library installed
228 previously. This is not a problem, if reinstalling the same version,
229 but if you are updating, the old library is used as system's one,
230 instead of installing the new version.
231 </para>
232
[fa47d680]233 <para>
[f1d7196]234 <parameter>--enable-dns-for-realm</parameter>: This switch allows
[4453848]235 realms to be resolved using the DNS server.
[fa47d680]236 </para>
237
238 <para>
[2f12da13]239 <option>--with-ldap</option>: Use this switch if you want to compile the
[096aa70]240 <application>OpenLDAP</application> database backend module.
241 </para>
242
243 <para>
244 <command>mv -v /usr/lib/libk... /lib </command> and
245 <command>ln -v -sf ../../lib/libk... /usr/lib/libk...</command>:
246 Move critical libraries to the
247 <filename class="directory">/lib</filename> directory so that they are
[fa47d680]248 available when the <filename class="directory">/usr</filename>
249 filesystem is not mounted.
250 </para>
251
252 <para>
[096aa70]253 <command>find /usr/lib -type f -name "lib$f*.so*" -exec chmod -v 755 {} \;</command>:
254 This command changes the permisison of installed libraries.
255 </para>
256
257 <para>
258 <command>mv -v /usr/bin/ksu /bin</command>: Moves the
259 <command>ksu</command> program to the
260 <filename class="directory">/bin</filename> directory so that it is
261 available when the <filename class="directory">/usr</filename>
262 filesystem is not mounted.
[fa47d680]263 </para>
[93c27d5]264
265 </sect2>
266
267 <sect2 role="configuration">
[f91ceaa]268 <title>Configuring MIT Kerberos V5</title>
[af22057]269
[93c27d5]270 <sect3 id="krb5-config">
271 <title>Config Files</title>
272
[fa47d680]273 <para>
274 <filename>/etc/krb5.conf</filename> and
275 <filename>/var/lib/krb5kdc/kdc.conf</filename>
276 </para>
[93c27d5]277
278 <indexterm zone="mitkrb krb5-config">
[597a2890]279 <primary sortas="e-etc-krb5.conf">/etc/krb5.conf</primary>
[93c27d5]280 </indexterm>
281
282 <indexterm zone="mitkrb krb5-config">
283 <primary sortas="e-var-lib-krb5kdc-kdc.conf">/var/lib/krb5kdc/kdc.conf</primary>
284 </indexterm>
285
286 </sect3>
287
288 <sect3>
289 <title>Configuration Information</title>
290
291 <sect4>
292 <title>Kerberos Configuration</title>
293
[f91ceaa]294 <tip>
[fa47d680]295 <para>
296 You should consider installing some sort of password checking
297 dictionary so that you can configure the installation to only
298 accept strong passwords. A suitable dictionary to use is shown in
299 the <xref linkend="cracklib"/> instructions. Note that only one
300 file can be used, but you can concatenate many files into one. The
301 configuration file shown below assumes you have installed a
302 dictionary to <filename>/usr/share/dict/words</filename>.
303 </para>
[f91ceaa]304 </tip>
305
[fa47d680]306 <para>
307 Create the Kerberos configuration file with the following
308 commands issued by the <systemitem class="username">root</systemitem>
309 user:
310 </para>
[93c27d5]311
[597a2890]312<screen role="root"><userinput>cat &gt; /etc/krb5.conf &lt;&lt; "EOF"
313<literal># Begin /etc/krb5.conf
[dc04b84]314
[b4b71892]315[libdefaults]
[3597eb6]316 default_realm = <replaceable>&lt;LFS.ORG&gt;</replaceable>
[b4b71892]317 encrypt = true
318
319[realms]
[3597eb6]320 <replaceable>&lt;LFS.ORG&gt;</replaceable> = {
321 kdc = <replaceable>&lt;belgarath.lfs.org&gt;</replaceable>
322 admin_server = <replaceable>&lt;belgarath.lfs.org&gt;</replaceable>
[f91ceaa]323 dict_file = /usr/share/dict/words
[b4b71892]324 }
325
326[domain_realm]
[3597eb6]327 .<replaceable>&lt;lfs.org&gt;</replaceable> = <replaceable>&lt;LFS.ORG&gt;</replaceable>
[b4b71892]328
329[logging]
[d24ce70c]330 kdc = SYSLOG:INFO:AUTH
331 admin_server = SYSLOG:INFO:AUTH
332 default = SYSLOG:DEBUG:DAEMON
[b4b71892]333
[597a2890]334# End /etc/krb5.conf</literal>
[93c27d5]335EOF</userinput></screen>
336
[fa47d680]337 <para>
338 You will need to substitute your domain and proper hostname for the
339 occurrences of the <replaceable>&lt;belgarath&gt;</replaceable> and
340 <replaceable>&lt;lfs.org&gt;</replaceable> names.
341 </para>
342
343 <para>
344 <option>default_realm</option> should be the name of your
345 domain changed to ALL CAPS. This isn't required, but both
346 <application>Heimdal</application> and MIT recommend it.
347 </para>
348
349 <para>
350 <option>encrypt = true</option> provides encryption of all traffic
351 between kerberized clients and servers. It's not necessary and can
352 be left off. If you leave it off, you can encrypt all traffic from
353 the client to the server using a switch on the client program
354 instead.
355 </para>
356
357 <para>
358 The <option>[realms]</option> parameters tell the client programs
359 where to look for the KDC authentication services.
360 </para>
361
362 <para>
363 The <option>[domain_realm]</option> section maps a domain to a realm.
364 </para>
365
366 <para>
367 Create the KDC database:
368 </para>
[93c27d5]369
[3597eb6]370<screen role="root"><userinput>kdb5_util create -r <replaceable>&lt;LFS.ORG&gt;</replaceable> -s</userinput></screen>
[93c27d5]371
[fa47d680]372 <para>
[601a838]373 Now you should populate the database with principals
[fa47d680]374 (users). For now, just use your regular login name or
375 <systemitem class="username">root</systemitem>.
376 </para>
[93c27d5]377
378<screen role="root"><userinput>kadmin.local
[bf7a21dd]379<prompt>kadmin.local:</prompt> add_policy dict-only
380<prompt>kadmin.local:</prompt> addprinc -policy dict-only <replaceable>&lt;loginname&gt;</replaceable></userinput></screen>
[93c27d5]381
[fa47d680]382 <para>
383 The KDC server and any machine running kerberized
384 server daemons must have a host key installed:
385 </para>
[93c27d5]386
[bf7a21dd]387<screen role="root"><userinput><prompt>kadmin.local:</prompt> addprinc -randkey host/<replaceable>&lt;belgarath.lfs.org&gt;</replaceable></userinput></screen>
[93c27d5]388
[fa47d680]389 <para>
390 After choosing the defaults when prompted, you will have to
391 export the data to a keytab file:
392 </para>
[93c27d5]393
[bf7a21dd]394<screen role="root"><userinput><prompt>kadmin.local:</prompt> ktadd host/<replaceable>&lt;belgarath.lfs.org&gt;</replaceable></userinput></screen>
[93c27d5]395
[fa47d680]396 <para>
397 This should have created a file in
398 <filename class="directory">/etc</filename> named
399 <filename>krb5.keytab</filename> (Kerberos 5). This file should
400 have 600 (<systemitem class="username">root</systemitem> rw only)
401 permissions. Keeping the keytab files from public access is crucial
402 to the overall security of the Kerberos installation.
403 </para>
[93c27d5]404
[fa47d680]405 <para>
406 Exit the <command>kadmin</command> program (use
407 <command>quit</command> or <command>exit</command>) and return
408 back to the shell prompt. Start the KDC daemon manually, just to
409 test out the installation:
410 </para>
[93c27d5]411
[fa47d680]412<screen role="root"><userinput>/usr/sbin/krb5kdc</userinput></screen>
[93c27d5]413
[fa47d680]414 <para>
415 Attempt to get a ticket with the following command:
416 </para>
[93c27d5]417
[3597eb6]418<screen><userinput>kinit <replaceable>&lt;loginname&gt;</replaceable></userinput></screen>
[93c27d5]419
[fa47d680]420 <para>
421 You will be prompted for the password you created. After you
422 get your ticket, you can list it with the following command:
423 </para>
[93c27d5]424
425<screen><userinput>klist</userinput></screen>
426
[fa47d680]427 <para>
428 Information about the ticket should be displayed on the
429 screen.
430 </para>
[93c27d5]431
[fa47d680]432 <para>
433 To test the functionality of the keytab file, issue the
434 following command:
435 </para>
[93c27d5]436
437<screen><userinput>ktutil
[597a2890]438<prompt>ktutil:</prompt> rkt /etc/krb5.keytab
[93c27d5]439<prompt>ktutil:</prompt> l</userinput></screen>
440
[fa47d680]441 <para>
442 This should dump a list of the host principal, along with
443 the encryption methods used to access the principal.
444 </para>
[93c27d5]445
[fa47d680]446 <para>
447 At this point, if everything has been successful so far, you
448 can feel fairly confident in the installation and configuration of
449 the package.
450 </para>
[93c27d5]451
452 </sect4>
[b4b71892]453
[93c27d5]454 <sect4>
455 <title>Additional Information</title>
456
[fa47d680]457 <para>
[bf7a21dd]458 For additional information consult the <ulink
459 url="http://web.mit.edu/kerberos/www/krb5-&mitkrb-major-version;/#documentation">
460 documentation for krb5-&mitkrb-version;</ulink> on which the above
[fa47d680]461 instructions are based.
462 </para>
[93c27d5]463
464 </sect4>
465
466 </sect3>
[6aeeb90]467
[d9d26317]468 <sect3 id="mitkrb-init">
[f586237]469 <title><phrase revision="sysv">Init Script</phrase>
470 <phrase revision="systemd">Systemd Unit</phrase></title>
[d9d26317]471
[f586237]472 <para revision="sysv">
[d9d26317]473 If you want to start <application>Kerberos</application> services
474 at boot, install the <filename>/etc/rc.d/init.d/krb5</filename> init
[f586237]475 script included in the <xref linkend="bootscripts"/> package using
[d9d26317]476 the following command:
477 </para>
478
[f586237]479 <para revision="systemd">
480 If you want to start <application>Kerberos</application> services
481 at boot, install the <filename>krb5.service</filename> unit included in
482 the <xref linkend="systemd-units"/> package using the following command:
483 </para>
484
[d9d26317]485 <indexterm zone="mitkrb mitkrb-init">
486 <primary sortas="f-krb5">krb5</primary>
487 </indexterm>
488
489<screen role="root"><userinput>make install-krb5</userinput></screen>
490
491 </sect3>
492
[93c27d5]493 </sect2>
494
495 <sect2 role="content">
[fa47d680]496
[93c27d5]497 <title>Contents</title>
[ec578e6]498 <para></para>
[af22057]499
[93c27d5]500 <segmentedlist>
501 <segtitle>Installed Programs</segtitle>
502 <segtitle>Installed Libraries</segtitle>
503 <segtitle>Installed Directories</segtitle>
504
505 <seglistitem>
[fa47d680]506 <seg>
[0d7900a]507 gss-client, gss-server, k5srvutil, kadmin, kadmin.local,
[bf7a21dd]508 kadmind, kdb5_ldap_util (optional), kdb5_util, kdestroy, kinit, klist,
[4453848]509 kpasswd, kprop, kpropd, kproplog, krb5-config, krb5kdc, krb5-send-pr,
[0d7900a]510 ksu, kswitch, ktutil, kvno, sclient, sim_client, sim_server,
[fa47d680]511 sserver, uuclient and uuserver
512 </seg>
513 <seg>
[af21cbe2]514 libgssapi_krb5.so, libgssrpc.so, libk5crypto.so, libkadm5clnt_mit.so,
515 libkadm5clnt.so, libkadm5srv_mit.so, libkadm5srv.so, libkdb_ldap.so
516 (optional), libkdb5.so, libkrad.so, libkrb5.so, libkrb5support.so,
[6e08e9c0]517 libverto.so, and some plugins under the /usr/lib/krb5 tree
[fa47d680]518 </seg>
519 <seg>
[ad22690]520 /usr/include/{gssapi,gssrpc,kadm5,krb5},
[0d7900a]521 /usr/lib/krb5,
[096aa70]522 /usr/share/{doc/krb5-&mitkrb-version;,examples/krb5},
523 /var/lib/krb5kdc, and
524 /var/lib/run/krb5kdc
[fa47d680]525 </seg>
[93c27d5]526 </seglistitem>
527 </segmentedlist>
528
529 <variablelist>
530 <bridgehead renderas="sect3">Short Descriptions</bridgehead>
531 <?dbfo list-presentation="list"?>
532 <?dbhtml list-presentation="table"?>
533
[73fe507]534 <varlistentry id="gss-client">
535 <term><command>gss-client</command></term>
536 <listitem>
537 <para>
538 is a GSSAPI test client.
539 </para>
540 <indexterm zone="mitkrb gss-client">
541 <primary sortas="b-gss-client">gss-client</primary>
542 </indexterm>
543 </listitem>
544 </varlistentry>
545
546 <varlistentry id="gss-server">
547 <term><command>gss-server</command></term>
548 <listitem>
549 <para>
550 is a GSSAPI test server.
551 </para>
552 <indexterm zone="mitkrb gss-server">
553 <primary sortas="b-gss-server">gss-server</primary>
554 </indexterm>
555 </listitem>
556 </varlistentry>
557
[93c27d5]558 <varlistentry id="k5srvutil">
559 <term><command>k5srvutil</command></term>
560 <listitem>
[fa47d680]561 <para>
562 is a host keytable manipulation utility.
563 </para>
[93c27d5]564 <indexterm zone="mitkrb k5srvutil">
565 <primary sortas="b-k5srvutil">k5srvutil</primary>
566 </indexterm>
567 </listitem>
568 </varlistentry>
569
[fa47d680]570 <varlistentry id="kadmin">
[93c27d5]571 <term><command>kadmin</command></term>
572 <listitem>
[fa47d680]573 <para>
[0f46f6c]574 is an utility used to make modifications
[fa47d680]575 to the Kerberos database.
576 </para>
577 <indexterm zone="mitkrb kadmin">
[93c27d5]578 <primary sortas="b-kadmin">kadmin</primary>
579 </indexterm>
580 </listitem>
581 </varlistentry>
582
[28370fe]583 <varlistentry id="kadmin.local">
584 <term><command>kadmin.local</command></term>
585 <listitem>
586 <para>
[0f46f6c]587 is an utility similar to <command>kadmin</command>, but if the
[28370fe]588 database is db2, the local client <command>kadmin.local</command>,
589 is intended to run directly on the master KDC without Kerberos
590 authentication.
591 </para>
592 <indexterm zone="mitkrb kadmin.local">
593 <primary sortas="b-kadmin.local">kadmin.local</primary>
594 </indexterm>
595 </listitem>
596 </varlistentry>
597
[fa47d680]598 <varlistentry id="kadmind">
[93c27d5]599 <term><command>kadmind</command></term>
600 <listitem>
[fa47d680]601 <para>
602 is a server for administrative access
603 to a Kerberos database.
604 </para>
605 <indexterm zone="mitkrb kadmind">
[93c27d5]606 <primary sortas="b-kadmind">kadmind</primary>
607 </indexterm>
608 </listitem>
609 </varlistentry>
610
[73fe507]611 <varlistentry id="kdb5_ldap_util">
612 <term><command>kdb5_ldap_util (optional)</command></term>
613 <listitem>
614 <para>
615 allows an administrator to manage realms, Kerberos services
616 and ticket policies.
617 </para>
618 <indexterm zone="mitkrb kdb5_ldap_util">
619 <primary sortas="b-kdb5_ldap_util">kdb5_ldap_util</primary>
620 </indexterm>
621 </listitem>
622 </varlistentry>
623
[93c27d5]624 <varlistentry id="kdb5_util">
625 <term><command>kdb5_util</command></term>
626 <listitem>
[fa47d680]627 <para>
628 is the KDC database utility.
629 </para>
[93c27d5]630 <indexterm zone="mitkrb kdb5_util">
631 <primary sortas="b-kdb5_util">kdb5_util</primary>
632 </indexterm>
633 </listitem>
634 </varlistentry>
635
[fa47d680]636 <varlistentry id="kdestroy">
[93c27d5]637 <term><command>kdestroy</command></term>
638 <listitem>
[fa47d680]639 <para>
640 removes the current set of tickets.
641 </para>
642 <indexterm zone="mitkrb kdestroy">
[93c27d5]643 <primary sortas="b-kdestroy">kdestroy</primary>
644 </indexterm>
645 </listitem>
646 </varlistentry>
647
[fa47d680]648 <varlistentry id="kinit">
[93c27d5]649 <term><command>kinit</command></term>
650 <listitem>
[fa47d680]651 <para>
652 is used to authenticate to the Kerberos server as a
653 principal and acquire a ticket granting ticket that can
654 later be used to obtain tickets for other services.
655 </para>
656 <indexterm zone="mitkrb kinit">
[93c27d5]657 <primary sortas="b-kinit">kinit</primary>
658 </indexterm>
659 </listitem>
660 </varlistentry>
661
[fa47d680]662 <varlistentry id="klist">
[93c27d5]663 <term><command>klist</command></term>
664 <listitem>
[fa47d680]665 <para>
666 reads and displays the current tickets in
667 the credential cache.
668 </para>
669 <indexterm zone="mitkrb klist">
[93c27d5]670 <primary sortas="b-klist">klist</primary>
671 </indexterm>
672 </listitem>
673 </varlistentry>
674
[fa47d680]675 <varlistentry id="kpasswd">
[93c27d5]676 <term><command>kpasswd</command></term>
677 <listitem>
[fa47d680]678 <para>
679 is a program for changing Kerberos 5 passwords.
680 </para>
681 <indexterm zone="mitkrb kpasswd">
[93c27d5]682 <primary sortas="b-kpasswd">kpasswd</primary>
683 </indexterm>
684 </listitem>
685 </varlistentry>
686
687 <varlistentry id="kprop">
688 <term><command>kprop</command></term>
689 <listitem>
[fa47d680]690 <para>
691 takes a principal database in a specified format and
692 converts it into a stream of database records.
693 </para>
[93c27d5]694 <indexterm zone="mitkrb kprop">
695 <primary sortas="b-kprop">kprop</primary>
696 </indexterm>
697 </listitem>
698 </varlistentry>
699
700 <varlistentry id="kpropd">
701 <term><command>kpropd</command></term>
702 <listitem>
[fa47d680]703 <para>
704 receives a database sent by <command>kprop</command>
705 and writes it as a local database.
706 </para>
[93c27d5]707 <indexterm zone="mitkrb kpropd">
708 <primary sortas="b-kpropd">kpropd</primary>
709 </indexterm>
710 </listitem>
711 </varlistentry>
712
[73fe507]713 <varlistentry id="kproplog">
714 <term><command>kproplog</command></term>
715 <listitem>
716 <para>
717 displays the contents of the KDC database update log to standard
718 output.
719 </para>
720 <indexterm zone="mitkrb kproplog">
721 <primary sortas="b-kproplog">kproplog</primary>
722 </indexterm>
723 </listitem>
724 </varlistentry>
725
[f91ceaa]726 <varlistentry id="krb5-config-prog2">
[93c27d5]727 <term><command>krb5-config</command></term>
728 <listitem>
[fa47d680]729 <para>
730 gives information on how to link programs against
731 libraries.
732 </para>
[f91ceaa]733 <indexterm zone="mitkrb krb5-config-prog2">
734 <primary sortas="b-krb5-config">krb5-config</primary>
[93c27d5]735 </indexterm>
736 </listitem>
737 </varlistentry>
738
739 <varlistentry id="krb5kdc">
740 <term><command>krb5kdc</command></term>
741 <listitem>
[fa47d680]742 <para>
743 is the <application>Kerberos 5</application> server.
744 </para>
[93c27d5]745 <indexterm zone="mitkrb krb5kdc">
746 <primary sortas="b-krb5kdc">krb5kdc</primary>
747 </indexterm>
748 </listitem>
749 </varlistentry>
750
[28370fe]751 <varlistentry id="krb5-send-pr">
752 <term><command>krb5-send-pr</command></term>
[73fe507]753 <listitem>
754 <para>
[2f12da13]755 sends a problem report (PR) to a central support site.
[73fe507]756 </para>
[28370fe]757 <indexterm zone="mitkrb krb5-send-pr">
758 <primary sortas="b-krb-send-pr">krb5-send-pr</primary>
[73fe507]759 </indexterm>
760 </listitem>
761 </varlistentry>
762
[93c27d5]763 <varlistentry id="ksu">
764 <term><command>ksu</command></term>
765 <listitem>
[fa47d680]766 <para>
767 is the super user program using Kerberos protocol.
768 Requires a properly configured
769 <filename>/etc/shells</filename> and
770 <filename>~/.k5login</filename> containing principals
771 authorized to become super users.
772 </para>
[93c27d5]773 <indexterm zone="mitkrb ksu">
774 <primary sortas="b-ksu">ksu</primary>
775 </indexterm>
776 </listitem>
777 </varlistentry>
778
[597a2890]779 <varlistentry id="kswitch">
780 <term><command>kswitch</command></term>
781 <listitem>
[fa47d680]782 <para>
[0d7900a]783 makes the specified credential cache the
784 primary cache for the collection, if a cache
[fa47d680]785 collection is available.
786 </para>
[597a2890]787 <indexterm zone="mitkrb kswitch">
788 <primary sortas="b-kswitch">kswitch</primary>
789 </indexterm>
790 </listitem>
791 </varlistentry>
792
[fa47d680]793 <varlistentry id="ktutil">
[93c27d5]794 <term><command>ktutil</command></term>
795 <listitem>
[fa47d680]796 <para>
797 is a program for managing Kerberos keytabs.
798 </para>
799 <indexterm zone="mitkrb ktutil">
[93c27d5]800 <primary sortas="b-ktutil">ktutil</primary>
801 </indexterm>
802 </listitem>
803 </varlistentry>
804
805 <varlistentry id="kvno">
806 <term><command>kvno</command></term>
807 <listitem>
[fa47d680]808 <para>
809 prints keyversion numbers of Kerberos principals.
810 </para>
[93c27d5]811 <indexterm zone="mitkrb kvno">
812 <primary sortas="b-kvno">kvno</primary>
813 </indexterm>
814 </listitem>
815 </varlistentry>
816
[597a2890]817 <varlistentry id="sclient">
818 <term><command>sclient</command></term>
[93c27d5]819 <listitem>
[fa47d680]820 <para>
[2f12da13]821 is used to contact a sample server and authenticate to it
[fa47d680]822 using Kerberos 5 tickets, then display the server's
823 response.
824 </para>
[597a2890]825 <indexterm zone="mitkrb sclient">
826 <primary sortas="b-sclient">sclient</primary>
[93c27d5]827 </indexterm>
828 </listitem>
829 </varlistentry>
830
[73fe507]831 <varlistentry id="sim_client">
832 <term><command>sim_client</command></term>
833 <listitem>
834 <para>
835 is a simple UDP-based sample client program, for
836 demonstration.
837 </para>
838 <indexterm zone="mitkrb sim_client">
839 <primary sortas="b-sim_client">sim_client</primary>
840 </indexterm>
841 </listitem>
842 </varlistentry>
843
844 <varlistentry id="sim_server">
845 <term><command>sim_server</command></term>
846 <listitem>
847 <para>
848 is a simple UDP-based server application, for
849 demonstration.
850 </para>
851 <indexterm zone="mitkrb sim_server">
852 <primary sortas="b-sim_server">sim_server</primary>
853 </indexterm>
854 </listitem>
855 </varlistentry>
856
[597a2890]857 <varlistentry id="sserver">
858 <term><command>sserver</command></term>
[93c27d5]859 <listitem>
[fa47d680]860 <para>
861 is the sample Kerberos 5 server.
862 </para>
[597a2890]863 <indexterm zone="mitkrb sserver">
864 <primary sortas="b-sserver">sserver</primary>
[93c27d5]865 </indexterm>
866 </listitem>
867 </varlistentry>
868
[73fe507]869 <varlistentry id="uuclient">
870 <term><command>uuclient</command></term>
871 <listitem>
872 <para>
[2f12da13]873 is another sample client.
[73fe507]874 </para>
875 <indexterm zone="mitkrb uuclient">
876 <primary sortas="b-uuclient">uuclient</primary>
877 </indexterm>
878 </listitem>
879 </varlistentry>
880
881 <varlistentry id="uuserver">
882 <term><command>uuserver</command></term>
883 <listitem>
884 <para>
[2f12da13]885 is another sample server.
[73fe507]886 </para>
887 <indexterm zone="mitkrb uuserver">
888 <primary sortas="b-uuserver">uuserver</primary>
889 </indexterm>
890 </listitem>
891 </varlistentry>
892
893
[fa47d680]894 <varlistentry id="libgssapi_krb5">
[3ff3b9b]895 <term><filename class="libraryfile">libgssapi_krb5.so</filename></term>
[93c27d5]896 <listitem>
[fa47d680]897 <para>
[2f12da13]898 contains the Generic Security Service Application Programming
[fa47d680]899 Interface (GSSAPI) functions which provides security services
900 to callers in a generic fashion, supportable with a range of
901 underlying mechanisms and technologies and hence allowing
902 source-level portability of applications to different
903 environments.
904 </para>
905 <indexterm zone="mitkrb libgssapi_krb5">
[f91ceaa]906 <primary sortas="c-libgssapi_krb5">libgssapi_krb5.so</primary>
[93c27d5]907 </indexterm>
908 </listitem>
909 </varlistentry>
910
[fa47d680]911 <varlistentry id="libkadm5clnt">
[3ff3b9b]912 <term><filename class="libraryfile">libkadm5clnt.so</filename></term>
[93c27d5]913 <listitem>
[fa47d680]914 <para>
915 contains the administrative authentication and password checking
916 functions required by Kerberos 5 client-side programs.
917 </para>
918 <indexterm zone="mitkrb libkadm5clnt">
[f91ceaa]919 <primary sortas="c-libkadm5clnt">libkadm5clnt.so</primary>
[93c27d5]920 </indexterm>
921 </listitem>
922 </varlistentry>
923
[fa47d680]924 <varlistentry id="libkadm5srv">
[3ff3b9b]925 <term><filename class="libraryfile">libkadm5srv.so</filename></term>
[93c27d5]926 <listitem>
[fa47d680]927 <para>
[2f12da13]928 contains the administrative authentication and password
[fa47d680]929 checking functions required by Kerberos 5 servers.
930 </para>
931 <indexterm zone="mitkrb libkadm5srv">
[f91ceaa]932 <primary sortas="c-libkadm5srv">libkadm5srv.so</primary>
[93c27d5]933 </indexterm>
934 </listitem>
935 </varlistentry>
936
937 <varlistentry id="libkdb5">
[3ff3b9b]938 <term><filename class="libraryfile">libkdb5.so</filename></term>
[93c27d5]939 <listitem>
[fa47d680]940 <para>
941 is a Kerberos 5 authentication/authorization database
942 access library.
943 </para>
[93c27d5]944 <indexterm zone="mitkrb libkdb5">
[f91ceaa]945 <primary sortas="c-libkdb5">libkdb5.so</primary>
[93c27d5]946 </indexterm>
947 </listitem>
948 </varlistentry>
949
[bf7a21dd]950 <varlistentry id="libkrad">
951 <term><filename class="libraryfile">libkrad.so</filename></term>
952 <listitem>
953 <para>
954 contains the internal support library for RADIUS functionality.
955 </para>
956 <indexterm zone="mitkrb libkrad">
957 <primary sortas="c-libkrad">libkrad.so</primary>
958 </indexterm>
959 </listitem>
960 </varlistentry>
961
[fa47d680]962 <varlistentry id="libkrb5">
[3ff3b9b]963 <term><filename class="libraryfile">libkrb5.so</filename></term>
[93c27d5]964 <listitem>
[fa47d680]965 <para>
966 is an all-purpose <application>Kerberos 5</application> library.
967 </para>
968 <indexterm zone="mitkrb libkrb5">
[f91ceaa]969 <primary sortas="c-libkrb5">libkrb5.so</primary>
[93c27d5]970 </indexterm>
971 </listitem>
972 </varlistentry>
973
974 </variablelist>
[af22057]975
[93c27d5]976 </sect2>
[1dce143]977
978</sect1>
Note: See TracBrowser for help on using the repository browser.