source: postlfs/security/mitkrb.xml@ af8b2d9

systemd-13485
Last change on this file since af8b2d9 was d7bee48, checked in by Douglas R. Reno <renodr@…>, 8 years ago

Sync to trunk r17332

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/branches/systemd@17335 af4574ff-66df-0310-9fd7-8a98e5e911e0

  • Property mode set to 100644
File size: 32.7 KB
RevLine 
[b4b71892]1<?xml version="1.0" encoding="ISO-8859-1"?>
[6732c094]2<!DOCTYPE sect1 PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
3 "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
[b4b71892]4 <!ENTITY % general-entities SYSTEM "../../general.ent">
5 %general-entities;
6
[295ca00]7 <!ENTITY mitkrb-download-http "http://web.mit.edu/kerberos/dist/krb5/&mitkrb-major-version;/krb5-&mitkrb-version;.tar.gz">
[fa47d680]8 <!ENTITY mitkrb-download-ftp " ">
[d7bee48]9 <!ENTITY mitkrb-md5sum "2e35f0af0344d68aba99cef616d3a64f">
[37191af]10 <!ENTITY mitkrb-size "17.1 MB">
[d7bee48]11 <!ENTITY mitkrb-buildsize "128 MB (Additional 36 MB for the testsuite)">
12 <!ENTITY mitkrb-time "1.0 SBU (additional 2.0 SBU for the testsuite)">
[b4b71892]13]>
14
[f91ceaa]15<sect1 id="mitkrb" xreflabel="MIT Kerberos V5-&mitkrb-version;">
[93c27d5]16 <?dbhtml filename="mitkrb.html"?>
17
18 <sect1info>
19 <othername>$LastChangedBy$</othername>
20 <date>$Date$</date>
21 </sect1info>
22
[f91ceaa]23 <title>MIT Kerberos V5-&mitkrb-version;</title>
[93c27d5]24
25 <indexterm zone="mitkrb">
[f91ceaa]26 <primary sortas="a-MIT-Kerberos">MIT Kerberos V5</primary>
[93c27d5]27 </indexterm>
28
29 <sect2 role="package">
[f91ceaa]30 <title>Introduction to MIT Kerberos V5</title>
[93c27d5]31
[fa47d680]32 <para>
33 <application>MIT Kerberos V5</application> is a free implementation
34 of Kerberos 5. Kerberos is a network authentication protocol. It
35 centralizes the authentication database and uses kerberized
36 applications to work with servers or services that support Kerberos
37 allowing single logins and encrypted communication over internal
38 networks or the Internet.
39 </para>
[93c27d5]40
[ac38e9dc]41 &lfs77_checked;
[597a2890]42
[93c27d5]43 <bridgehead renderas="sect3">Package Information</bridgehead>
44 <itemizedlist spacing="compact">
45 <listitem>
[fa47d680]46 <para>
47 Download (HTTP): <ulink url="&mitkrb-download-http;"/>
48 </para>
[93c27d5]49 </listitem>
[29d1c248]50 <listitem>
[fa47d680]51 <para>
52 Download (FTP): <ulink url="&mitkrb-download-ftp;"/>
53 </para>
[29d1c248]54 </listitem>
[93c27d5]55 <listitem>
[fa47d680]56 <para>
57 Download MD5 sum: &mitkrb-md5sum;
58 </para>
[93c27d5]59 </listitem>
60 <listitem>
[fa47d680]61 <para>
62 Download size: &mitkrb-size;
63 </para>
[93c27d5]64 </listitem>
65 <listitem>
[fa47d680]66 <para>
67 Estimated disk space required: &mitkrb-buildsize;
68 </para>
[93c27d5]69 </listitem>
70 <listitem>
[fa47d680]71 <para>
72 Estimated build time: &mitkrb-time;
73 </para>
[93c27d5]74 </listitem>
75 </itemizedlist>
[af22057]76
[f91ceaa]77 <bridgehead renderas="sect3">MIT Kerberos V5 Dependencies</bridgehead>
[93c27d5]78
79 <bridgehead renderas="sect4">Optional</bridgehead>
[fa47d680]80 <para role="optional">
[5d14c5a]81 <xref linkend="dejagnu"/> (for full test coverage),
82 <xref linkend="gnupg2"/> (to authenticate the package),
[fa47d680]83 <xref linkend="keyutils"/>,
[debb0893]84 <xref linkend="openldap"/>,
[295ca00]85 <xref linkend="python2"/> (used during the testsuite), and
[debb0893]86 <xref linkend="rpcbind"/> (used during the testsuite)
[fa47d680]87 </para>
[93c27d5]88
89 <note>
[fa47d680]90 <para>
91 Some sort of time synchronization facility on your system (like
92 <xref linkend="ntp"/>) is required since Kerberos won't authenticate
93 if there is a time difference between a kerberized client and the
94 KDC server.
95 </para>
[93c27d5]96 </note>
[af22057]97
[3597eb6]98 <para condition="html" role="usernotes">User Notes:
[fa47d680]99 <ulink url="&blfs-wiki;/mitkrb"/>
100 </para>
[93c27d5]101 </sect2>
102
103 <sect2 role="installation">
[f91ceaa]104 <title>Installation of MIT Kerberos V5</title>
[bccbdaea]105
[295ca00]106<!--
[fa47d680]107 <para>
108 <application>MIT Kerberos V5</application> is distributed in a
[295ca00]109 TAR file containing a compressed TAR package and a detached PGP2
[fa47d680]110 <filename class="extension">ASC</filename> file. You'll need to unpack
111 the distribution tar file, then unpack the compressed tar file before
112 starting the build.
113 </para>
[93c27d5]114
[fa47d680]115 <para>
116 After unpacking the distribution tarball and if you have
[f82ac3f]117 <xref linkend="gnupg2"/> installed, you can
[ac38e9dc]118 authenticate the package. First, check the contents of the file
[debb0893]119 <filename>krb5-&mitkrb-version;.tar.gz.asc</filename>.
[fa47d680]120 </para>
[93c27d5]121
[295ca00]122<screen><userinput>gpg2 -\-verify krb5-&mitkrb-version;.tar.gz.asc krb5-&mitkrb-version;.tar.gz</userinput></screen>
[a61cf51]123
124 <para>You will probably see output similar to:</para>
125
[ac38e9dc]126<screen><literal>gpg: Signature made Fri May 8 23:40:13 2015 utc using RSA key ID 0055C305
127gpg: Can't check signature: No public key</literal></screen>
[a61cf51]128
[3ff3b9b]129 <para>
130 You can import the public key with:
131 </para>
[a61cf51]132
[295ca00]133<screen><userinput>gpg2 -\-keyserver pgp.mit.edu -\-recv-keys 0055C305</userinput></screen>
[a61cf51]134
[3ff3b9b]135 <para>
[ac38e9dc]136 Now re-verify the package with the first command above. You should get a
[0d7900a]137 indication of a good signature, but the key will still not be certified
[ac38e9dc]138 with a trusted signature. Trusting the downloaded key is a separate
[3ff3b9b]139 operation but it is up to you to determine the level of trust.
[295ca00]140 </para>-->
[93c27d5]141
[fa47d680]142 <para>
143 Build <application>MIT Kerberos V5</application> by running the
144 following commands:
145 </para>
[93c27d5]146
[45fc171c]147<screen><userinput>cd src &amp;&amp;
[debb0893]148sed -e "s@python2.5/Python.h@&amp; python2.7/Python.h@g" \
149 -e "s@-lpython2.5]@&amp;,\n AC_CHECK_LIB(python2.7,main,[PYTHON_LIB=-lpython2.7])@g" \
[ac38e9dc]150 -i configure.in &amp;&amp;
[295ca00]151
152sed -e 's@\^u}@^u cols 300}@' \
153 -i tests/dejagnu/config/default.exp &amp;&amp;
154
[37191af]155sed -e '/eq 0/{n;s/12 //}' \
156 -i plugins/kdb/db2/libdb2/test/run.test &amp;&amp;
157
[debb0893]158autoconf &amp;&amp;
[bf7a21dd]159./configure --prefix=/usr \
160 --sysconfdir=/etc \
161 --localstatedir=/var/lib \
162 --with-system-et \
163 --with-system-ss \
[295ca00]164 --with-system-verto=no \
[607c1e67]165 --enable-dns-for-realm &amp;&amp;
[93c27d5]166make</userinput></screen>
167
[fa47d680]168 <para>
[37191af]169 To test the build, issue as the <systemitem
170 class="username">root</systemitem> user: <command>make check</command>.
171 You need at least <xref linkend="tcl"/>, which is used to drive the
172 testsuite. Furthermore, <xref linkend="dejagnu"/> must be available for
173 some of the tests to run. If you have a former version of MIT Kerberos V5
[bf7a21dd]174 installed, it may happen that the test suite pick up the installed
[37191af]175 versions of the libraries, rather than the newly built ones. If so, it is
176 better to run the tests after the installation.
[fa47d680]177 </para>
[f91ceaa]178
[fa47d680]179 <para>
180 Now, as the <systemitem class="username">root</systemitem> user:
181 </para>
[93c27d5]182
183<screen role="root"><userinput>make install &amp;&amp;
[f91ceaa]184
[37191af]185for f in gssapi_krb5 gssrpc k5crypto kadm5clnt kadm5srv \
[bf7a21dd]186 kdb5 kdb_ldap krad krb5 krb5support verto ; do
[37191af]187
188 find /usr/lib -type f -name "lib$f*.so*" -exec chmod -v 755 {} \;
[98dd5b8]189done &amp;&amp;
190
[295ca00]191mv -v /usr/lib/libkrb5.so.3* /lib &amp;&amp;
192mv -v /usr/lib/libk5crypto.so.3* /lib &amp;&amp;
193mv -v /usr/lib/libkrb5support.so.0* /lib &amp;&amp;
[f91ceaa]194
[295ca00]195ln -sfv ../../lib/libkrb5.so.3.3 /usr/lib/libkrb5.so &amp;&amp;
196ln -sfv ../../lib/libk5crypto.so.3.1 /usr/lib/libk5crypto.so &amp;&amp;
197ln -sfv ../../lib/libkrb5support.so.0.1 /usr/lib/libkrb5support.so &amp;&amp;
[f91ceaa]198
[98dd5b8]199mv -v /usr/bin/ksu /bin &amp;&amp;
200chmod -v 755 /bin/ksu &amp;&amp;
201
202install -v -dm755 /usr/share/doc/krb5-&mitkrb-version; &amp;&amp;
[ac38e9dc]203cp -rfv ../doc/* /usr/share/doc/krb5-&mitkrb-version;</userinput></screen>
[af22057]204
[93c27d5]205 </sect2>
206
207 <sect2 role="commands">
208 <title>Command Explanations</title>
[af22057]209
[debb0893]210 <para>
[295ca00]211 <command>sed -e ...</command>: The first <command>sed</command> fixes
212 <application>Python</application> detection. The second one increases
[37191af]213 the width of the virtual terminal used for some tests to prevent
214 some spurious characters in the output which is taken as a failure. The
215 third <command>sed</command> removes a test that is known to fail.
[debb0893]216 </para>
217
[fa47d680]218 <para>
[37191af]219 <option>--localstatedir=/var/lib</option>: This option is
[4453848]220 used so that the Kerberos variable run-time data is located in
221 <filename class="directory">/var/lib</filename> instead of
222 <filename class="directory">/usr/var</filename>.
[fa47d680]223 </para>
224
225 <para>
[37191af]226 <option>--with-system-et</option>: This switch causes the build
[fa47d680]227 to use the system-installed versions of the error-table support
228 software.
229 </para>
230
231 <para>
[37191af]232 <option>--with-system-ss</option>: This switch causes the build
[fa47d680]233 to use the system-installed versions of the subsystem command-line
234 interface software.
235 </para>
236
[bbc2600]237 <para>
[37191af]238 <option>--with-system-verto=no</option>: This switch fixes a bug in
[295ca00]239 the package: it does not recognize its own verto library installed
240 previously. This is not a problem if you are reinstalling the same version.
241 However, if you are updating, the old library is used as the system library,
242 instead of installing the new version.
[bbc2600]243 </para>
244
[fa47d680]245 <para>
[37191af]246 <option>--enable-dns-for-realm</option>: This switch allows
[4453848]247 realms to be resolved using the DNS server.
[fa47d680]248 </para>
249
250 <para>
[37191af]251 <option>--with-ldap</option>: Use this switch if you want to compile
252 <application>OpenLDAP</application> database backend module.
253 </para>
254
255 <para>
256 <command>mv -v /usr/lib/libk... /lib</command> and
257 <command>ln -v -sf ../../lib/libk... /usr/lib/libk...</command>:
258 Move critical libraries to the
259 <filename class="directory">/lib</filename> directory so that they are
[fa47d680]260 available when the <filename class="directory">/usr</filename>
261 filesystem is not mounted.
262 </para>
263
264 <para>
[37191af]265 <command>find /usr/lib -type f -name "lib$f*.so*" -exec chmod -v 755 {} \;</command>:
266 This command changes the permissions of installed libraries.
267 </para>
268
269 <para>
270 <command>mv -v /usr/bin/ksu /bin</command>: Moves the
271 <command>ksu</command> program to the
272 <filename class="directory">/bin</filename> directory so that it is
273 available when the <filename class="directory">/usr</filename>
274 filesystem is not mounted.
[fa47d680]275 </para>
[93c27d5]276
277 </sect2>
278
279 <sect2 role="configuration">
[f91ceaa]280 <title>Configuring MIT Kerberos V5</title>
[af22057]281
[93c27d5]282 <sect3 id="krb5-config">
283 <title>Config Files</title>
284
[fa47d680]285 <para>
286 <filename>/etc/krb5.conf</filename> and
287 <filename>/var/lib/krb5kdc/kdc.conf</filename>
288 </para>
[93c27d5]289
290 <indexterm zone="mitkrb krb5-config">
[597a2890]291 <primary sortas="e-etc-krb5.conf">/etc/krb5.conf</primary>
[93c27d5]292 </indexterm>
293
294 <indexterm zone="mitkrb krb5-config">
295 <primary sortas="e-var-lib-krb5kdc-kdc.conf">/var/lib/krb5kdc/kdc.conf</primary>
296 </indexterm>
297
298 </sect3>
299
300 <sect3>
301 <title>Configuration Information</title>
302
303 <sect4>
304 <title>Kerberos Configuration</title>
305
[f91ceaa]306 <tip>
[fa47d680]307 <para>
308 You should consider installing some sort of password checking
309 dictionary so that you can configure the installation to only
310 accept strong passwords. A suitable dictionary to use is shown in
311 the <xref linkend="cracklib"/> instructions. Note that only one
312 file can be used, but you can concatenate many files into one. The
313 configuration file shown below assumes you have installed a
314 dictionary to <filename>/usr/share/dict/words</filename>.
315 </para>
[f91ceaa]316 </tip>
317
[fa47d680]318 <para>
319 Create the Kerberos configuration file with the following
320 commands issued by the <systemitem class="username">root</systemitem>
321 user:
322 </para>
[93c27d5]323
[597a2890]324<screen role="root"><userinput>cat &gt; /etc/krb5.conf &lt;&lt; "EOF"
325<literal># Begin /etc/krb5.conf
[dc04b84]326
[b4b71892]327[libdefaults]
[3597eb6]328 default_realm = <replaceable>&lt;LFS.ORG&gt;</replaceable>
[b4b71892]329 encrypt = true
330
331[realms]
[3597eb6]332 <replaceable>&lt;LFS.ORG&gt;</replaceable> = {
333 kdc = <replaceable>&lt;belgarath.lfs.org&gt;</replaceable>
334 admin_server = <replaceable>&lt;belgarath.lfs.org&gt;</replaceable>
[f91ceaa]335 dict_file = /usr/share/dict/words
[b4b71892]336 }
337
338[domain_realm]
[3597eb6]339 .<replaceable>&lt;lfs.org&gt;</replaceable> = <replaceable>&lt;LFS.ORG&gt;</replaceable>
[b4b71892]340
341[logging]
342 kdc = SYSLOG[:INFO[:AUTH]]
343 admin_server = SYSLOG[INFO[:AUTH]]
344 default = SYSLOG[[:SYS]]
345
[597a2890]346# End /etc/krb5.conf</literal>
[93c27d5]347EOF</userinput></screen>
348
[fa47d680]349 <para>
350 You will need to substitute your domain and proper hostname for the
351 occurrences of the <replaceable>&lt;belgarath&gt;</replaceable> and
352 <replaceable>&lt;lfs.org&gt;</replaceable> names.
353 </para>
354
355 <para>
356 <option>default_realm</option> should be the name of your
357 domain changed to ALL CAPS. This isn't required, but both
358 <application>Heimdal</application> and MIT recommend it.
359 </para>
360
361 <para>
362 <option>encrypt = true</option> provides encryption of all traffic
363 between kerberized clients and servers. It's not necessary and can
364 be left off. If you leave it off, you can encrypt all traffic from
365 the client to the server using a switch on the client program
366 instead.
367 </para>
368
369 <para>
370 The <option>[realms]</option> parameters tell the client programs
371 where to look for the KDC authentication services.
372 </para>
373
374 <para>
375 The <option>[domain_realm]</option> section maps a domain to a realm.
376 </para>
377
378 <para>
379 Create the KDC database:
380 </para>
[93c27d5]381
[3597eb6]382<screen role="root"><userinput>kdb5_util create -r <replaceable>&lt;LFS.ORG&gt;</replaceable> -s</userinput></screen>
[93c27d5]383
[fa47d680]384 <para>
[601a838]385 Now you should populate the database with principals
[fa47d680]386 (users). For now, just use your regular login name or
387 <systemitem class="username">root</systemitem>.
388 </para>
[93c27d5]389
390<screen role="root"><userinput>kadmin.local
[bf7a21dd]391<prompt>kadmin.local:</prompt> add_policy dict-only
392<prompt>kadmin.local:</prompt> addprinc -policy dict-only <replaceable>&lt;loginname&gt;</replaceable></userinput></screen>
[93c27d5]393
[fa47d680]394 <para>
395 The KDC server and any machine running kerberized
396 server daemons must have a host key installed:
397 </para>
[93c27d5]398
[bf7a21dd]399<screen role="root"><userinput><prompt>kadmin.local:</prompt> addprinc -randkey host/<replaceable>&lt;belgarath.lfs.org&gt;</replaceable></userinput></screen>
[93c27d5]400
[fa47d680]401 <para>
402 After choosing the defaults when prompted, you will have to
403 export the data to a keytab file:
404 </para>
[93c27d5]405
[bf7a21dd]406<screen role="root"><userinput><prompt>kadmin.local:</prompt> ktadd host/<replaceable>&lt;belgarath.lfs.org&gt;</replaceable></userinput></screen>
[93c27d5]407
[fa47d680]408 <para>
409 This should have created a file in
410 <filename class="directory">/etc</filename> named
411 <filename>krb5.keytab</filename> (Kerberos 5). This file should
412 have 600 (<systemitem class="username">root</systemitem> rw only)
413 permissions. Keeping the keytab files from public access is crucial
414 to the overall security of the Kerberos installation.
415 </para>
[93c27d5]416
[fa47d680]417 <para>
418 Exit the <command>kadmin</command> program (use
419 <command>quit</command> or <command>exit</command>) and return
420 back to the shell prompt. Start the KDC daemon manually, just to
421 test out the installation:
422 </para>
[93c27d5]423
[fa47d680]424<screen role="root"><userinput>/usr/sbin/krb5kdc</userinput></screen>
[93c27d5]425
[fa47d680]426 <para>
427 Attempt to get a ticket with the following command:
428 </para>
[93c27d5]429
[3597eb6]430<screen><userinput>kinit <replaceable>&lt;loginname&gt;</replaceable></userinput></screen>
[93c27d5]431
[fa47d680]432 <para>
433 You will be prompted for the password you created. After you
434 get your ticket, you can list it with the following command:
435 </para>
[93c27d5]436
437<screen><userinput>klist</userinput></screen>
438
[fa47d680]439 <para>
440 Information about the ticket should be displayed on the
441 screen.
442 </para>
[93c27d5]443
[fa47d680]444 <para>
445 To test the functionality of the keytab file, issue the
446 following command:
447 </para>
[93c27d5]448
449<screen><userinput>ktutil
[597a2890]450<prompt>ktutil:</prompt> rkt /etc/krb5.keytab
[93c27d5]451<prompt>ktutil:</prompt> l</userinput></screen>
452
[fa47d680]453 <para>
454 This should dump a list of the host principal, along with
455 the encryption methods used to access the principal.
456 </para>
[93c27d5]457
[fa47d680]458 <para>
459 At this point, if everything has been successful so far, you
460 can feel fairly confident in the installation and configuration of
461 the package.
462 </para>
[93c27d5]463
464 </sect4>
[b4b71892]465
[93c27d5]466 <sect4>
467 <title>Additional Information</title>
468
[fa47d680]469 <para>
[bf7a21dd]470 For additional information consult the <ulink
471 url="http://web.mit.edu/kerberos/www/krb5-&mitkrb-major-version;/#documentation">
472 documentation for krb5-&mitkrb-version;</ulink> on which the above
[fa47d680]473 instructions are based.
474 </para>
[93c27d5]475
476 </sect4>
477
478 </sect3>
[6aeeb90]479
[d9d26317]480 <sect3 id="mitkrb-init">
[4da2d9f]481 <title>Systemd Units</title>
[d9d26317]482
483 <para>
[932240d]484 To start the Kerberos services at boot,
485 install the systemd units from the <xref linkend="bootscripts"/>
[96733af]486 package by running the following command as the
487 <systemitem class="username">root</systemitem> user:
[d9d26317]488 </para>
489
490 <indexterm zone="mitkrb mitkrb-init">
491 <primary sortas="f-krb5">krb5</primary>
492 </indexterm>
493
494<screen role="root"><userinput>make install-krb5</userinput></screen>
495
496 </sect3>
497
[93c27d5]498 </sect2>
499
500 <sect2 role="content">
[fa47d680]501
[93c27d5]502 <title>Contents</title>
[ec578e6]503 <para></para>
[af22057]504
[93c27d5]505 <segmentedlist>
506 <segtitle>Installed Programs</segtitle>
507 <segtitle>Installed Libraries</segtitle>
508 <segtitle>Installed Directories</segtitle>
509
510 <seglistitem>
[fa47d680]511 <seg>
[295ca00]512 gss-client,
513 gss-server,
514 k5srvutil,
515 kadmin,
516 kadmin.local,
517 kadmind,
518 kdb5_ldap_util (optional),
519 kdb5_util,
520 kdestroy,
521 kinit,
522 klist,
523 kpasswd,
524 kprop,
525 kpropd,
526 kproplog,
527 krb5-config,
528 krb5kdc,
529 krb5-send-pr,
530 ksu,
531 kswitch,
532 ktutil,
533 kvno,
534 sclient,
535 sim_client,
536 sim_server,
537 sserver,
538 uuclient,
539 and uuserver
[fa47d680]540 </seg>
541 <seg>
[295ca00]542 libgssapi_krb5.so,
543 libgssrpc.so,
544 libk5crypto.so,
545 libkadm5clnt_mit.so,
546 libkadm5clnt.so,
547 libkadm5srv_mit.so,
548 libkadm5srv.so,
549 libkdb_ldap.so
550 (optional),
551 libkdb5.so,
552 libkrad.so,
553 libkrb5.so,
554 libkrb5support.so,
555 libverto.so,
556 and some plugins under the /usr/lib/krb5 tree
[fa47d680]557 </seg>
558 <seg>
[3ff3b9b]559 /usr/include/gssapi,
560 /usr/include/gssrpc,
561 /usr/include/kadm5,
562 /usr/include/krb5,
[0d7900a]563 /usr/lib/krb5,
[37191af]564 /usr/share/{doc/krb5-&mitkrb-version;,examples/krb5},
565 /var/lib/krb5kdc, and
566 /var/lib/run/krb5kdc
[fa47d680]567 </seg>
[93c27d5]568 </seglistitem>
569 </segmentedlist>
570
571 <variablelist>
572 <bridgehead renderas="sect3">Short Descriptions</bridgehead>
573 <?dbfo list-presentation="list"?>
574 <?dbhtml list-presentation="table"?>
575
[cb0bbd2]576 <varlistentry id="gss-client">
577 <term><command>gss-client</command></term>
578 <listitem>
579 <para>
580 is a GSSAPI test client.
581 </para>
582 <indexterm zone="mitkrb gss-client">
583 <primary sortas="b-gss-client">gss-client</primary>
584 </indexterm>
585 </listitem>
586 </varlistentry>
587
588 <varlistentry id="gss-server">
589 <term><command>gss-server</command></term>
590 <listitem>
591 <para>
592 is a GSSAPI test server.
593 </para>
594 <indexterm zone="mitkrb gss-server">
595 <primary sortas="b-gss-server">gss-server</primary>
596 </indexterm>
597 </listitem>
598 </varlistentry>
599
[93c27d5]600 <varlistentry id="k5srvutil">
601 <term><command>k5srvutil</command></term>
602 <listitem>
[fa47d680]603 <para>
604 is a host keytable manipulation utility.
605 </para>
[93c27d5]606 <indexterm zone="mitkrb k5srvutil">
607 <primary sortas="b-k5srvutil">k5srvutil</primary>
608 </indexterm>
609 </listitem>
610 </varlistentry>
611
[fa47d680]612 <varlistentry id="kadmin">
[93c27d5]613 <term><command>kadmin</command></term>
614 <listitem>
[fa47d680]615 <para>
[cb0bbd2]616 is a utility used to make modifications
[fa47d680]617 to the Kerberos database.
618 </para>
619 <indexterm zone="mitkrb kadmin">
[93c27d5]620 <primary sortas="b-kadmin">kadmin</primary>
621 </indexterm>
622 </listitem>
623 </varlistentry>
624
[77aeb6b]625 <varlistentry id="kadmin.local">
626 <term><command>kadmin.local</command></term>
627 <listitem>
628 <para>
629 is a utility similar at <command>kadmin</command>, but if the
630 database is db2, the local client <command>kadmin.local</command>,
631 is intended to run directly on the master KDC without Kerberos
632 authentication.
633 </para>
634 <indexterm zone="mitkrb kadmin.local">
635 <primary sortas="b-kadmin.local">kadmin.local</primary>
636 </indexterm>
637 </listitem>
638 </varlistentry>
639
[fa47d680]640 <varlistentry id="kadmind">
[93c27d5]641 <term><command>kadmind</command></term>
642 <listitem>
[fa47d680]643 <para>
644 is a server for administrative access
645 to a Kerberos database.
646 </para>
647 <indexterm zone="mitkrb kadmind">
[93c27d5]648 <primary sortas="b-kadmind">kadmind</primary>
649 </indexterm>
650 </listitem>
651 </varlistentry>
652
[cb0bbd2]653 <varlistentry id="kdb5_ldap_util">
654 <term><command>kdb5_ldap_util (optional)</command></term>
655 <listitem>
656 <para>
657 allows an administrator to manage realms, Kerberos services
658 and ticket policies.
659 </para>
660 <indexterm zone="mitkrb kdb5_ldap_util">
661 <primary sortas="b-kdb5_ldap_util">kdb5_ldap_util</primary>
662 </indexterm>
663 </listitem>
664 </varlistentry>
665
[93c27d5]666 <varlistentry id="kdb5_util">
667 <term><command>kdb5_util</command></term>
668 <listitem>
[fa47d680]669 <para>
670 is the KDC database utility.
671 </para>
[93c27d5]672 <indexterm zone="mitkrb kdb5_util">
673 <primary sortas="b-kdb5_util">kdb5_util</primary>
674 </indexterm>
675 </listitem>
676 </varlistentry>
677
[fa47d680]678 <varlistentry id="kdestroy">
[93c27d5]679 <term><command>kdestroy</command></term>
680 <listitem>
[fa47d680]681 <para>
682 removes the current set of tickets.
683 </para>
684 <indexterm zone="mitkrb kdestroy">
[93c27d5]685 <primary sortas="b-kdestroy">kdestroy</primary>
686 </indexterm>
687 </listitem>
688 </varlistentry>
689
[fa47d680]690 <varlistentry id="kinit">
[93c27d5]691 <term><command>kinit</command></term>
692 <listitem>
[fa47d680]693 <para>
694 is used to authenticate to the Kerberos server as a
695 principal and acquire a ticket granting ticket that can
696 later be used to obtain tickets for other services.
697 </para>
698 <indexterm zone="mitkrb kinit">
[93c27d5]699 <primary sortas="b-kinit">kinit</primary>
700 </indexterm>
701 </listitem>
702 </varlistentry>
703
[fa47d680]704 <varlistentry id="klist">
[93c27d5]705 <term><command>klist</command></term>
706 <listitem>
[fa47d680]707 <para>
708 reads and displays the current tickets in
709 the credential cache.
710 </para>
711 <indexterm zone="mitkrb klist">
[93c27d5]712 <primary sortas="b-klist">klist</primary>
713 </indexterm>
714 </listitem>
715 </varlistentry>
716
[fa47d680]717 <varlistentry id="kpasswd">
[93c27d5]718 <term><command>kpasswd</command></term>
719 <listitem>
[fa47d680]720 <para>
721 is a program for changing Kerberos 5 passwords.
722 </para>
723 <indexterm zone="mitkrb kpasswd">
[93c27d5]724 <primary sortas="b-kpasswd">kpasswd</primary>
725 </indexterm>
726 </listitem>
727 </varlistentry>
728
729 <varlistentry id="kprop">
730 <term><command>kprop</command></term>
731 <listitem>
[fa47d680]732 <para>
733 takes a principal database in a specified format and
734 converts it into a stream of database records.
735 </para>
[93c27d5]736 <indexterm zone="mitkrb kprop">
737 <primary sortas="b-kprop">kprop</primary>
738 </indexterm>
739 </listitem>
740 </varlistentry>
741
742 <varlistentry id="kpropd">
743 <term><command>kpropd</command></term>
744 <listitem>
[fa47d680]745 <para>
746 receives a database sent by <command>kprop</command>
747 and writes it as a local database.
748 </para>
[93c27d5]749 <indexterm zone="mitkrb kpropd">
750 <primary sortas="b-kpropd">kpropd</primary>
751 </indexterm>
752 </listitem>
753 </varlistentry>
754
[cb0bbd2]755 <varlistentry id="kproplog">
756 <term><command>kproplog</command></term>
757 <listitem>
758 <para>
759 displays the contents of the KDC database update log to standard
760 output.
761 </para>
762 <indexterm zone="mitkrb kproplog">
763 <primary sortas="b-kproplog">kproplog</primary>
764 </indexterm>
765 </listitem>
766 </varlistentry>
767
[f91ceaa]768 <varlistentry id="krb5-config-prog2">
[93c27d5]769 <term><command>krb5-config</command></term>
770 <listitem>
[fa47d680]771 <para>
772 gives information on how to link programs against
773 libraries.
774 </para>
[f91ceaa]775 <indexterm zone="mitkrb krb5-config-prog2">
776 <primary sortas="b-krb5-config">krb5-config</primary>
[93c27d5]777 </indexterm>
778 </listitem>
779 </varlistentry>
780
781 <varlistentry id="krb5kdc">
782 <term><command>krb5kdc</command></term>
783 <listitem>
[fa47d680]784 <para>
785 is the <application>Kerberos 5</application> server.
786 </para>
[93c27d5]787 <indexterm zone="mitkrb krb5kdc">
788 <primary sortas="b-krb5kdc">krb5kdc</primary>
789 </indexterm>
790 </listitem>
791 </varlistentry>
792
[77aeb6b]793 <varlistentry id="krb5-send-pr">
794 <term><command>krb5-send-pr</command></term>
[cb0bbd2]795 <listitem>
796 <para>
797 send problem report (PR) to a central support site.
798 </para>
[77aeb6b]799 <indexterm zone="mitkrb krb5-send-pr">
800 <primary sortas="b-krb-send-pr">krb5-send-pr</primary>
[cb0bbd2]801 </indexterm>
802 </listitem>
803 </varlistentry>
804
[93c27d5]805 <varlistentry id="ksu">
806 <term><command>ksu</command></term>
807 <listitem>
[fa47d680]808 <para>
809 is the super user program using Kerberos protocol.
810 Requires a properly configured
811 <filename>/etc/shells</filename> and
812 <filename>~/.k5login</filename> containing principals
813 authorized to become super users.
814 </para>
[93c27d5]815 <indexterm zone="mitkrb ksu">
816 <primary sortas="b-ksu">ksu</primary>
817 </indexterm>
818 </listitem>
819 </varlistentry>
820
[597a2890]821 <varlistentry id="kswitch">
822 <term><command>kswitch</command></term>
823 <listitem>
[fa47d680]824 <para>
[0d7900a]825 makes the specified credential cache the
826 primary cache for the collection, if a cache
[fa47d680]827 collection is available.
828 </para>
[597a2890]829 <indexterm zone="mitkrb kswitch">
830 <primary sortas="b-kswitch">kswitch</primary>
831 </indexterm>
832 </listitem>
833 </varlistentry>
834
[fa47d680]835 <varlistentry id="ktutil">
[93c27d5]836 <term><command>ktutil</command></term>
837 <listitem>
[fa47d680]838 <para>
839 is a program for managing Kerberos keytabs.
840 </para>
841 <indexterm zone="mitkrb ktutil">
[93c27d5]842 <primary sortas="b-ktutil">ktutil</primary>
843 </indexterm>
844 </listitem>
845 </varlistentry>
846
847 <varlistentry id="kvno">
848 <term><command>kvno</command></term>
849 <listitem>
[fa47d680]850 <para>
851 prints keyversion numbers of Kerberos principals.
852 </para>
[93c27d5]853 <indexterm zone="mitkrb kvno">
854 <primary sortas="b-kvno">kvno</primary>
855 </indexterm>
856 </listitem>
857 </varlistentry>
858
[597a2890]859 <varlistentry id="sclient">
860 <term><command>sclient</command></term>
[93c27d5]861 <listitem>
[fa47d680]862 <para>
863 used to contact a sample server and authenticate to it
864 using Kerberos 5 tickets, then display the server's
865 response.
866 </para>
[597a2890]867 <indexterm zone="mitkrb sclient">
868 <primary sortas="b-sclient">sclient</primary>
[93c27d5]869 </indexterm>
870 </listitem>
871 </varlistentry>
872
[cb0bbd2]873 <varlistentry id="sim_client">
874 <term><command>sim_client</command></term>
875 <listitem>
876 <para>
877 is a simple UDP-based sample client program, for
878 demonstration.
879 </para>
880 <indexterm zone="mitkrb sim_client">
881 <primary sortas="b-sim_client">sim_client</primary>
882 </indexterm>
883 </listitem>
884 </varlistentry>
885
886 <varlistentry id="sim_server">
887 <term><command>sim_server</command></term>
888 <listitem>
889 <para>
890 is a simple UDP-based server application, for
891 demonstration.
892 </para>
893 <indexterm zone="mitkrb sim_server">
894 <primary sortas="b-sim_server">sim_server</primary>
895 </indexterm>
896 </listitem>
897 </varlistentry>
898
[597a2890]899 <varlistentry id="sserver">
900 <term><command>sserver</command></term>
[93c27d5]901 <listitem>
[fa47d680]902 <para>
903 is the sample Kerberos 5 server.
904 </para>
[597a2890]905 <indexterm zone="mitkrb sserver">
906 <primary sortas="b-sserver">sserver</primary>
[93c27d5]907 </indexterm>
908 </listitem>
909 </varlistentry>
910
[cb0bbd2]911 <varlistentry id="uuclient">
912 <term><command>uuclient</command></term>
913 <listitem>
914 <para>
915 is an another sample client.
916 </para>
917 <indexterm zone="mitkrb uuclient">
918 <primary sortas="b-uuclient">uuclient</primary>
919 </indexterm>
920 </listitem>
921 </varlistentry>
922
923 <varlistentry id="uuserver">
924 <term><command>uuserver</command></term>
925 <listitem>
926 <para>
927 is an another sample server.
928 </para>
929 <indexterm zone="mitkrb uuserver">
930 <primary sortas="b-uuserver">uuserver</primary>
931 </indexterm>
932 </listitem>
933 </varlistentry>
934
935
[fa47d680]936 <varlistentry id="libgssapi_krb5">
[3ff3b9b]937 <term><filename class="libraryfile">libgssapi_krb5.so</filename></term>
[93c27d5]938 <listitem>
[fa47d680]939 <para>
940 contain the Generic Security Service Application Programming
941 Interface (GSSAPI) functions which provides security services
942 to callers in a generic fashion, supportable with a range of
943 underlying mechanisms and technologies and hence allowing
944 source-level portability of applications to different
945 environments.
946 </para>
947 <indexterm zone="mitkrb libgssapi_krb5">
[f91ceaa]948 <primary sortas="c-libgssapi_krb5">libgssapi_krb5.so</primary>
[93c27d5]949 </indexterm>
950 </listitem>
951 </varlistentry>
952
[fa47d680]953 <varlistentry id="libkadm5clnt">
[3ff3b9b]954 <term><filename class="libraryfile">libkadm5clnt.so</filename></term>
[93c27d5]955 <listitem>
[fa47d680]956 <para>
957 contains the administrative authentication and password checking
958 functions required by Kerberos 5 client-side programs.
959 </para>
960 <indexterm zone="mitkrb libkadm5clnt">
[f91ceaa]961 <primary sortas="c-libkadm5clnt">libkadm5clnt.so</primary>
[93c27d5]962 </indexterm>
963 </listitem>
964 </varlistentry>
965
[fa47d680]966 <varlistentry id="libkadm5srv">
[3ff3b9b]967 <term><filename class="libraryfile">libkadm5srv.so</filename></term>
[93c27d5]968 <listitem>
[fa47d680]969 <para>
970 contain the administrative authentication and password
971 checking functions required by Kerberos 5 servers.
972 </para>
973 <indexterm zone="mitkrb libkadm5srv">
[f91ceaa]974 <primary sortas="c-libkadm5srv">libkadm5srv.so</primary>
[93c27d5]975 </indexterm>
976 </listitem>
977 </varlistentry>
978
979 <varlistentry id="libkdb5">
[3ff3b9b]980 <term><filename class="libraryfile">libkdb5.so</filename></term>
[93c27d5]981 <listitem>
[fa47d680]982 <para>
983 is a Kerberos 5 authentication/authorization database
984 access library.
985 </para>
[93c27d5]986 <indexterm zone="mitkrb libkdb5">
[f91ceaa]987 <primary sortas="c-libkdb5">libkdb5.so</primary>
[93c27d5]988 </indexterm>
989 </listitem>
990 </varlistentry>
991
[bf7a21dd]992 <varlistentry id="libkrad">
993 <term><filename class="libraryfile">libkrad.so</filename></term>
994 <listitem>
995 <para>
996 contains the internal support library for RADIUS functionality.
997 </para>
998 <indexterm zone="mitkrb libkrad">
999 <primary sortas="c-libkrad">libkrad.so</primary>
1000 </indexterm>
1001 </listitem>
1002 </varlistentry>
1003
[fa47d680]1004 <varlistentry id="libkrb5">
[3ff3b9b]1005 <term><filename class="libraryfile">libkrb5.so</filename></term>
[93c27d5]1006 <listitem>
[fa47d680]1007 <para>
1008 is an all-purpose <application>Kerberos 5</application> library.
1009 </para>
1010 <indexterm zone="mitkrb libkrb5">
[f91ceaa]1011 <primary sortas="c-libkrb5">libkrb5.so</primary>
[93c27d5]1012 </indexterm>
1013 </listitem>
1014 </varlistentry>
1015
1016 </variablelist>
[af22057]1017
[93c27d5]1018 </sect2>
[1dce143]1019
1020</sect1>
Note: See TracBrowser for help on using the repository browser.