source: postlfs/security/mitkrb.xml@ bf1baa35

11.0 11.1 11.2 11.3 12.0 12.1 kea ken/TL2024 ken/inkscape-core-mods ken/tuningfonts lazarus lxqt plabs/newcss plabs/python-mods python3.11 qt5new rahul/power-profiles-daemon renodr/vulkan-addition trunk upgradedb xry111/intltool xry111/llvm18 xry111/soup3 xry111/test-20220226 xry111/xf86-video-removal
Last change on this file since bf1baa35 was 9f0a469, checked in by Xi Ruoyao <xry111@…>, 3 years ago

krb5: remove unneeded chmod commands

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@24321 af4574ff-66df-0310-9fd7-8a98e5e911e0

  • Property mode set to 100644
File size: 31.9 KB
RevLine 
[b4b71892]1<?xml version="1.0" encoding="ISO-8859-1"?>
[6732c094]2<!DOCTYPE sect1 PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
3 "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
[b4b71892]4 <!ENTITY % general-entities SYSTEM "../../general.ent">
5 %general-entities;
6
[c82398b2]7 <!ENTITY mitkrb-download-http "https://kerberos.org/dist/krb5/&mitkrb-major-version;/krb5-&mitkrb-version;.tar.gz">
[fa47d680]8 <!ENTITY mitkrb-download-ftp " ">
[50fd976e]9 <!ENTITY mitkrb-md5sum "81257292f8243f735654d4fd5d1fef6a">
[fa50ece]10 <!ENTITY mitkrb-size "8.3 MB">
[50fd976e]11 <!ENTITY mitkrb-buildsize "138 MB (add 24 MB for tests)">
12 <!ENTITY mitkrb-time "0.8 SBU (add 1.4 SBU for tests)">
[b4b71892]13]>
14
[f91ceaa]15<sect1 id="mitkrb" xreflabel="MIT Kerberos V5-&mitkrb-version;">
[93c27d5]16 <?dbhtml filename="mitkrb.html"?>
17
18 <sect1info>
19 <othername>$LastChangedBy$</othername>
20 <date>$Date$</date>
21 </sect1info>
22
[f91ceaa]23 <title>MIT Kerberos V5-&mitkrb-version;</title>
[93c27d5]24
25 <indexterm zone="mitkrb">
[f91ceaa]26 <primary sortas="a-MIT-Kerberos">MIT Kerberos V5</primary>
[93c27d5]27 </indexterm>
28
29 <sect2 role="package">
[f91ceaa]30 <title>Introduction to MIT Kerberos V5</title>
[93c27d5]31
[fa47d680]32 <para>
33 <application>MIT Kerberos V5</application> is a free implementation
34 of Kerberos 5. Kerberos is a network authentication protocol. It
35 centralizes the authentication database and uses kerberized
36 applications to work with servers or services that support Kerberos
37 allowing single logins and encrypted communication over internal
38 networks or the Internet.
39 </para>
[93c27d5]40
[3df8ea47]41 &lfs101_checked;
[597a2890]42
[93c27d5]43 <bridgehead renderas="sect3">Package Information</bridgehead>
44 <itemizedlist spacing="compact">
45 <listitem>
[fa47d680]46 <para>
47 Download (HTTP): <ulink url="&mitkrb-download-http;"/>
48 </para>
[93c27d5]49 </listitem>
[29d1c248]50 <listitem>
[fa47d680]51 <para>
52 Download (FTP): <ulink url="&mitkrb-download-ftp;"/>
53 </para>
[29d1c248]54 </listitem>
[93c27d5]55 <listitem>
[fa47d680]56 <para>
57 Download MD5 sum: &mitkrb-md5sum;
58 </para>
[93c27d5]59 </listitem>
60 <listitem>
[fa47d680]61 <para>
62 Download size: &mitkrb-size;
63 </para>
[93c27d5]64 </listitem>
65 <listitem>
[fa47d680]66 <para>
67 Estimated disk space required: &mitkrb-buildsize;
68 </para>
[93c27d5]69 </listitem>
70 <listitem>
[fa47d680]71 <para>
72 Estimated build time: &mitkrb-time;
73 </para>
[93c27d5]74 </listitem>
75 </itemizedlist>
[af22057]76
[f91ceaa]77 <bridgehead renderas="sect3">MIT Kerberos V5 Dependencies</bridgehead>
[93c27d5]78
79 <bridgehead renderas="sect4">Optional</bridgehead>
[fa47d680]80 <para role="optional">
[f4002c5]81 <!-- <xref linkend="dejagnu"/> (for full test coverage), -->
[5c4a616]82 <xref linkend="bind-utils"/>,
[bf7a21dd]83 <xref linkend="gnupg2"/> (to authenticate the package),
[fa47d680]84 <xref linkend="keyutils"/>,
[294e6bd]85 <xref linkend="openldap"/>,<!-- Seems so that mit has its own
86 implementation of rpc now.
87 <xref linkend="rpcbind"/> (used during the testsuite),-->
[fa50ece]88 <xref linkend="valgrind"/> (used during the testsuite),
[5c4a616]89 <xref linkend="yasm"/>,
[f99ea56]90 <ulink url="http://thrysoee.dk/editline/">libedit</ulink>,
[fa50ece]91 <ulink url="https://cmocka.org/">cmocka</ulink>,
92 <ulink url="https://pypi.org/project/pyrad/">pyrad</ulink>, and
93 <ulink url="https://cwrap.org/resolv_wrapper.html">resolv_wrapper</ulink>
[fa47d680]94 </para>
[93c27d5]95
96 <note>
[fa47d680]97 <para>
98 Some sort of time synchronization facility on your system (like
99 <xref linkend="ntp"/>) is required since Kerberos won't authenticate
100 if there is a time difference between a kerberized client and the
101 KDC server.
102 </para>
[93c27d5]103 </note>
[af22057]104
[3597eb6]105 <para condition="html" role="usernotes">User Notes:
[fa47d680]106 <ulink url="&blfs-wiki;/mitkrb"/>
107 </para>
[93c27d5]108 </sect2>
109
110 <sect2 role="installation">
[f91ceaa]111 <title>Installation of MIT Kerberos V5</title>
[93c27d5]112
[fa47d680]113 <para>
114 Build <application>MIT Kerberos V5</application> by running the
115 following commands:
116 </para>
[93c27d5]117
[af21cbe2]118<screen><userinput>cd src &amp;&amp;
[5c4a616]119
[f22b905]120sed -i -e 's@\^u}@^u cols 300}@' tests/dejagnu/config/default.exp &amp;&amp;
121sed -i -e '/eq 0/{N;s/12 //}' plugins/kdb/db2/libdb2/test/run.test &amp;&amp;
[5c4a616]122sed -i '/t_iprop.py/d' tests/Makefile.in &amp;&amp;
[096aa70]123
[bf7a21dd]124./configure --prefix=/usr \
125 --sysconfdir=/etc \
126 --localstatedir=/var/lib \
[5c4a616]127 --runstatedir=/run \
[256e1e84]128 --with-system-et \
129 --with-system-ss \
[6e08e9c0]130 --with-system-verto=no \
[597a2890]131 --enable-dns-for-realm &amp;&amp;
[93c27d5]132make</userinput></screen>
133
[fa47d680]134 <para>
[096aa70]135 To test the build, issue as the <systemitem
[6332a8ad]136 class="username">root</systemitem> user: <command>make -k -j1 check</command>.
[f4002c5]137 <!-- You need at least <xref link end="tcl"/>, which is used to drive the
138 testsuite. Furthermore, <xref link end="dejagnu"/> must be available for
139 some of the tests to run.--> If you have a former version of MIT Kerberos V5
140 installed, it may happen that the test suite may pick up the installed
[096aa70]141 versions of the libraries, rather than the newly built ones. If so, it is
[e10e1a8e]142 better to run the tests after the installation.
[6332a8ad]143 <!-- Note: on my laptop -j8 fails but -j1 passes -->
[fa47d680]144 </para>
[f91ceaa]145
[fa47d680]146 <para>
147 Now, as the <systemitem class="username">root</systemitem> user:
148 </para>
[93c27d5]149
150<screen role="root"><userinput>make install &amp;&amp;
[f91ceaa]151
[2799196]152mv -v /usr/lib/libkrb5.so.3* /lib &amp;&amp;
153mv -v /usr/lib/libk5crypto.so.3* /lib &amp;&amp;
[f91ceaa]154mv -v /usr/lib/libkrb5support.so.0* /lib &amp;&amp;
155
[2799196]156ln -v -sf ../../lib/libkrb5.so.3.3 /usr/lib/libkrb5.so &amp;&amp;
157ln -v -sf ../../lib/libk5crypto.so.3.1 /usr/lib/libk5crypto.so &amp;&amp;
[597a2890]158ln -v -sf ../../lib/libkrb5support.so.0.1 /usr/lib/libkrb5support.so &amp;&amp;
[f91ceaa]159
[98dd5b8]160mv -v /usr/bin/ksu /bin &amp;&amp;
161chmod -v 755 /bin/ksu &amp;&amp;
162
163install -v -dm755 /usr/share/doc/krb5-&mitkrb-version; &amp;&amp;
[ea6894f]164cp -vfr ../doc/* /usr/share/doc/krb5-&mitkrb-version;</userinput></screen>
[af22057]165
[93c27d5]166 </sect2>
167
168 <sect2 role="commands">
169 <title>Command Explanations</title>
[af22057]170
[debb0893]171 <para>
[5c4a616]172 The first <command>sed</command> increases the width of the virtual
173 terminal used for some tests to prevent some spurious text in the output
174 which is taken as a failure. The second <command>sed</command> removes a
175 test that is known to fail. The third <command>sed</command> removes a
176 test that is known to hang.
[debb0893]177 </para>
178
[fa47d680]179 <para>
[f1d7196]180 <parameter>--localstatedir=/var/lib</parameter>: This option is
[5c4a616]181 used so that the Kerberos variable runtime data is located in
[4453848]182 <filename class="directory">/var/lib</filename> instead of
183 <filename class="directory">/usr/var</filename>.
[fa47d680]184 </para>
[256e1e84]185
[5c4a616]186 <para>
187 <parameter>--runstatedir=/run</parameter>: This option is used so that
188 the Kerberos runtime state information is located in
189 <filename class="directory">/run</filename> instead of the deprecated
190 <filename class="directory">/var/run</filename>.
191 </para>
192
[fa47d680]193 <para>
[256e1e84]194 <parameter>--with-system-et</parameter>: This switch causes the build
[fa47d680]195 to use the system-installed versions of the error-table support
196 software.
197 </para>
198
199 <para>
[256e1e84]200 <parameter>--with-system-ss</parameter>: This switch causes the build
[fa47d680]201 to use the system-installed versions of the subsystem command-line
202 interface software.
203 </para>
204
[6e08e9c0]205 <para>
[f1d7196]206 <parameter>--with-system-verto=no</parameter>: This switch fixes a bug in
[6e08e9c0]207 the package: it does not recognize its own verto library installed
208 previously. This is not a problem, if reinstalling the same version,
209 but if you are updating, the old library is used as system's one,
210 instead of installing the new version.
211 </para>
212
[fa47d680]213 <para>
[f1d7196]214 <parameter>--enable-dns-for-realm</parameter>: This switch allows
[4453848]215 realms to be resolved using the DNS server.
[fa47d680]216 </para>
217
218 <para>
[2f12da13]219 <option>--with-ldap</option>: Use this switch if you want to compile the
[096aa70]220 <application>OpenLDAP</application> database backend module.
221 </para>
222
223 <para>
224 <command>mv -v /usr/lib/libk... /lib </command> and
225 <command>ln -v -sf ../../lib/libk... /usr/lib/libk...</command>:
226 Move critical libraries to the
227 <filename class="directory">/lib</filename> directory so that they are
[fa47d680]228 available when the <filename class="directory">/usr</filename>
229 filesystem is not mounted.
230 </para>
231
232 <para>
[096aa70]233 <command>find /usr/lib -type f -name "lib$f*.so*" -exec chmod -v 755 {} \;</command>:
234 This command changes the permisison of installed libraries.
235 </para>
236
237 <para>
238 <command>mv -v /usr/bin/ksu /bin</command>: Moves the
239 <command>ksu</command> program to the
240 <filename class="directory">/bin</filename> directory so that it is
241 available when the <filename class="directory">/usr</filename>
242 filesystem is not mounted.
[fa47d680]243 </para>
[93c27d5]244
245 </sect2>
246
247 <sect2 role="configuration">
[f91ceaa]248 <title>Configuring MIT Kerberos V5</title>
[af22057]249
[93c27d5]250 <sect3 id="krb5-config">
251 <title>Config Files</title>
252
[fa47d680]253 <para>
254 <filename>/etc/krb5.conf</filename> and
255 <filename>/var/lib/krb5kdc/kdc.conf</filename>
256 </para>
[93c27d5]257
258 <indexterm zone="mitkrb krb5-config">
[597a2890]259 <primary sortas="e-etc-krb5.conf">/etc/krb5.conf</primary>
[93c27d5]260 </indexterm>
261
262 <indexterm zone="mitkrb krb5-config">
263 <primary sortas="e-var-lib-krb5kdc-kdc.conf">/var/lib/krb5kdc/kdc.conf</primary>
264 </indexterm>
265
266 </sect3>
267
268 <sect3>
269 <title>Configuration Information</title>
270
271 <sect4>
272 <title>Kerberos Configuration</title>
273
[f91ceaa]274 <tip>
[fa47d680]275 <para>
276 You should consider installing some sort of password checking
277 dictionary so that you can configure the installation to only
278 accept strong passwords. A suitable dictionary to use is shown in
279 the <xref linkend="cracklib"/> instructions. Note that only one
280 file can be used, but you can concatenate many files into one. The
281 configuration file shown below assumes you have installed a
282 dictionary to <filename>/usr/share/dict/words</filename>.
283 </para>
[f91ceaa]284 </tip>
285
[fa47d680]286 <para>
287 Create the Kerberos configuration file with the following
288 commands issued by the <systemitem class="username">root</systemitem>
289 user:
290 </para>
[93c27d5]291
[597a2890]292<screen role="root"><userinput>cat &gt; /etc/krb5.conf &lt;&lt; "EOF"
293<literal># Begin /etc/krb5.conf
[dc04b84]294
[b4b71892]295[libdefaults]
[ea6bb02]296 default_realm = <replaceable>&lt;EXAMPLE.ORG&gt;</replaceable>
[b4b71892]297 encrypt = true
298
299[realms]
[ea6bb02]300 <replaceable>&lt;EXAMPLE.ORG&gt;</replaceable> = {
301 kdc = <replaceable>&lt;belgarath.example.org&gt;</replaceable>
302 admin_server = <replaceable>&lt;belgarath.example.org&gt;</replaceable>
[f91ceaa]303 dict_file = /usr/share/dict/words
[b4b71892]304 }
305
306[domain_realm]
[ea6bb02]307 .<replaceable>&lt;example.org&gt;</replaceable> = <replaceable>&lt;EXAMPLE.ORG&gt;</replaceable>
[b4b71892]308
309[logging]
[d24ce70c]310 kdc = SYSLOG:INFO:AUTH
311 admin_server = SYSLOG:INFO:AUTH
312 default = SYSLOG:DEBUG:DAEMON
[b4b71892]313
[597a2890]314# End /etc/krb5.conf</literal>
[93c27d5]315EOF</userinput></screen>
316
[fa47d680]317 <para>
318 You will need to substitute your domain and proper hostname for the
319 occurrences of the <replaceable>&lt;belgarath&gt;</replaceable> and
[ea6bb02]320 <replaceable>&lt;example.org&gt;</replaceable> names.
[fa47d680]321 </para>
322
323 <para>
324 <option>default_realm</option> should be the name of your
325 domain changed to ALL CAPS. This isn't required, but both
326 <application>Heimdal</application> and MIT recommend it.
327 </para>
328
329 <para>
330 <option>encrypt = true</option> provides encryption of all traffic
331 between kerberized clients and servers. It's not necessary and can
332 be left off. If you leave it off, you can encrypt all traffic from
333 the client to the server using a switch on the client program
334 instead.
335 </para>
336
337 <para>
338 The <option>[realms]</option> parameters tell the client programs
339 where to look for the KDC authentication services.
340 </para>
341
342 <para>
343 The <option>[domain_realm]</option> section maps a domain to a realm.
344 </para>
345
346 <para>
347 Create the KDC database:
348 </para>
[93c27d5]349
[ea6bb02]350<screen role="root"><userinput>kdb5_util create -r <replaceable>&lt;EXAMPLE.ORG&gt;</replaceable> -s</userinput></screen>
[93c27d5]351
[fa47d680]352 <para>
[601a838]353 Now you should populate the database with principals
[fa47d680]354 (users). For now, just use your regular login name or
355 <systemitem class="username">root</systemitem>.
356 </para>
[93c27d5]357
358<screen role="root"><userinput>kadmin.local
[bf7a21dd]359<prompt>kadmin.local:</prompt> add_policy dict-only
360<prompt>kadmin.local:</prompt> addprinc -policy dict-only <replaceable>&lt;loginname&gt;</replaceable></userinput></screen>
[93c27d5]361
[fa47d680]362 <para>
363 The KDC server and any machine running kerberized
364 server daemons must have a host key installed:
365 </para>
[93c27d5]366
[ea6bb02]367<screen role="root"><userinput><prompt>kadmin.local:</prompt> addprinc -randkey host/<replaceable>&lt;belgarath.example.org&gt;</replaceable></userinput></screen>
[93c27d5]368
[fa47d680]369 <para>
370 After choosing the defaults when prompted, you will have to
371 export the data to a keytab file:
372 </para>
[93c27d5]373
[ea6bb02]374<screen role="root"><userinput><prompt>kadmin.local:</prompt> ktadd host/<replaceable>&lt;belgarath.example.org&gt;</replaceable></userinput></screen>
[93c27d5]375
[fa47d680]376 <para>
377 This should have created a file in
378 <filename class="directory">/etc</filename> named
379 <filename>krb5.keytab</filename> (Kerberos 5). This file should
380 have 600 (<systemitem class="username">root</systemitem> rw only)
381 permissions. Keeping the keytab files from public access is crucial
382 to the overall security of the Kerberos installation.
383 </para>
[93c27d5]384
[fa47d680]385 <para>
386 Exit the <command>kadmin</command> program (use
387 <command>quit</command> or <command>exit</command>) and return
388 back to the shell prompt. Start the KDC daemon manually, just to
389 test out the installation:
390 </para>
[93c27d5]391
[fa47d680]392<screen role="root"><userinput>/usr/sbin/krb5kdc</userinput></screen>
[93c27d5]393
[fa47d680]394 <para>
395 Attempt to get a ticket with the following command:
396 </para>
[93c27d5]397
[3597eb6]398<screen><userinput>kinit <replaceable>&lt;loginname&gt;</replaceable></userinput></screen>
[93c27d5]399
[fa47d680]400 <para>
401 You will be prompted for the password you created. After you
402 get your ticket, you can list it with the following command:
403 </para>
[93c27d5]404
405<screen><userinput>klist</userinput></screen>
406
[fa47d680]407 <para>
408 Information about the ticket should be displayed on the
409 screen.
410 </para>
[93c27d5]411
[fa47d680]412 <para>
413 To test the functionality of the keytab file, issue the
[fa50ece]414 following command as the
415 <systemitem class="username">root</systemitem> user:
[fa47d680]416 </para>
[93c27d5]417
[fa50ece]418<screen role="root"><userinput>ktutil
[597a2890]419<prompt>ktutil:</prompt> rkt /etc/krb5.keytab
[93c27d5]420<prompt>ktutil:</prompt> l</userinput></screen>
421
[fa47d680]422 <para>
423 This should dump a list of the host principal, along with
424 the encryption methods used to access the principal.
425 </para>
[93c27d5]426
[f8359b8]427 <para>
428 Create an empty ACL file that can be modified later:
429 </para>
430
431<screen role="root"><userinput>touch /var/lib/krb5kdc/kadm5.acl</userinput></screen>
432
[fa47d680]433 <para>
434 At this point, if everything has been successful so far, you
435 can feel fairly confident in the installation and configuration of
436 the package.
437 </para>
[93c27d5]438
439 </sect4>
[b4b71892]440
[93c27d5]441 <sect4>
442 <title>Additional Information</title>
443
[fa47d680]444 <para>
[bf7a21dd]445 For additional information consult the <ulink
446 url="http://web.mit.edu/kerberos/www/krb5-&mitkrb-major-version;/#documentation">
447 documentation for krb5-&mitkrb-version;</ulink> on which the above
[fa47d680]448 instructions are based.
449 </para>
[93c27d5]450
451 </sect4>
452
453 </sect3>
[6aeeb90]454
[d9d26317]455 <sect3 id="mitkrb-init">
[f586237]456 <title><phrase revision="sysv">Init Script</phrase>
457 <phrase revision="systemd">Systemd Unit</phrase></title>
[d9d26317]458
[f586237]459 <para revision="sysv">
[d9d26317]460 If you want to start <application>Kerberos</application> services
461 at boot, install the <filename>/etc/rc.d/init.d/krb5</filename> init
[f586237]462 script included in the <xref linkend="bootscripts"/> package using
[d9d26317]463 the following command:
464 </para>
465
[f586237]466 <para revision="systemd">
467 If you want to start <application>Kerberos</application> services
468 at boot, install the <filename>krb5.service</filename> unit included in
469 the <xref linkend="systemd-units"/> package using the following command:
470 </para>
471
[d9d26317]472 <indexterm zone="mitkrb mitkrb-init">
473 <primary sortas="f-krb5">krb5</primary>
474 </indexterm>
475
476<screen role="root"><userinput>make install-krb5</userinput></screen>
477
478 </sect3>
479
[93c27d5]480 </sect2>
481
482 <sect2 role="content">
[fa47d680]483
[93c27d5]484 <title>Contents</title>
[af22057]485
[93c27d5]486 <segmentedlist>
487 <segtitle>Installed Programs</segtitle>
488 <segtitle>Installed Libraries</segtitle>
489 <segtitle>Installed Directories</segtitle>
490
491 <seglistitem>
[fa47d680]492 <seg>
[0d7900a]493 gss-client, gss-server, k5srvutil, kadmin, kadmin.local,
[bf7a21dd]494 kadmind, kdb5_ldap_util (optional), kdb5_util, kdestroy, kinit, klist,
[e10e1a8e]495 kpasswd, kprop, kpropd, kproplog, krb5-config, krb5-send-pr, krb5kdc,
[0d7900a]496 ksu, kswitch, ktutil, kvno, sclient, sim_client, sim_server,
[b7a300f7]497 sserver, uuclient, and uuserver
[fa47d680]498 </seg>
499 <seg>
[af21cbe2]500 libgssapi_krb5.so, libgssrpc.so, libk5crypto.so, libkadm5clnt_mit.so,
501 libkadm5clnt.so, libkadm5srv_mit.so, libkadm5srv.so, libkdb_ldap.so
502 (optional), libkdb5.so, libkrad.so, libkrb5.so, libkrb5support.so,
[6e08e9c0]503 libverto.so, and some plugins under the /usr/lib/krb5 tree
[fa47d680]504 </seg>
505 <seg>
[ad22690]506 /usr/include/{gssapi,gssrpc,kadm5,krb5},
[0d7900a]507 /usr/lib/krb5,
[096aa70]508 /usr/share/{doc/krb5-&mitkrb-version;,examples/krb5},
509 /var/lib/krb5kdc, and
[e10e1a8e]510 /run/krb5kdc
[fa47d680]511 </seg>
[93c27d5]512 </seglistitem>
513 </segmentedlist>
514
515 <variablelist>
516 <bridgehead renderas="sect3">Short Descriptions</bridgehead>
517 <?dbfo list-presentation="list"?>
518 <?dbhtml list-presentation="table"?>
519
[73fe507]520 <varlistentry id="gss-client">
521 <term><command>gss-client</command></term>
522 <listitem>
523 <para>
[4c24eb0a]524 is a GSSAPI test client
[73fe507]525 </para>
526 <indexterm zone="mitkrb gss-client">
527 <primary sortas="b-gss-client">gss-client</primary>
528 </indexterm>
529 </listitem>
530 </varlistentry>
531
532 <varlistentry id="gss-server">
533 <term><command>gss-server</command></term>
534 <listitem>
535 <para>
[4c24eb0a]536 is a GSSAPI test server
[73fe507]537 </para>
538 <indexterm zone="mitkrb gss-server">
539 <primary sortas="b-gss-server">gss-server</primary>
540 </indexterm>
541 </listitem>
542 </varlistentry>
543
[93c27d5]544 <varlistentry id="k5srvutil">
545 <term><command>k5srvutil</command></term>
546 <listitem>
[fa47d680]547 <para>
[4c24eb0a]548 is a host keytable manipulation utility
[fa47d680]549 </para>
[93c27d5]550 <indexterm zone="mitkrb k5srvutil">
551 <primary sortas="b-k5srvutil">k5srvutil</primary>
552 </indexterm>
553 </listitem>
554 </varlistentry>
555
[fa47d680]556 <varlistentry id="kadmin">
[93c27d5]557 <term><command>kadmin</command></term>
558 <listitem>
[fa47d680]559 <para>
[0f46f6c]560 is an utility used to make modifications
[4c24eb0a]561 to the Kerberos database
[fa47d680]562 </para>
563 <indexterm zone="mitkrb kadmin">
[93c27d5]564 <primary sortas="b-kadmin">kadmin</primary>
565 </indexterm>
566 </listitem>
567 </varlistentry>
568
[28370fe]569 <varlistentry id="kadmin.local">
570 <term><command>kadmin.local</command></term>
571 <listitem>
572 <para>
[0f46f6c]573 is an utility similar to <command>kadmin</command>, but if the
[28370fe]574 database is db2, the local client <command>kadmin.local</command>,
575 is intended to run directly on the master KDC without Kerberos
[4c24eb0a]576 authentication
[28370fe]577 </para>
578 <indexterm zone="mitkrb kadmin.local">
579 <primary sortas="b-kadmin.local">kadmin.local</primary>
580 </indexterm>
581 </listitem>
582 </varlistentry>
583
[fa47d680]584 <varlistentry id="kadmind">
[93c27d5]585 <term><command>kadmind</command></term>
586 <listitem>
[fa47d680]587 <para>
588 is a server for administrative access
[4c24eb0a]589 to a Kerberos database
[fa47d680]590 </para>
591 <indexterm zone="mitkrb kadmind">
[93c27d5]592 <primary sortas="b-kadmind">kadmind</primary>
593 </indexterm>
594 </listitem>
595 </varlistentry>
596
[73fe507]597 <varlistentry id="kdb5_ldap_util">
598 <term><command>kdb5_ldap_util (optional)</command></term>
599 <listitem>
600 <para>
601 allows an administrator to manage realms, Kerberos services
[4c24eb0a]602 and ticket policies
[73fe507]603 </para>
604 <indexterm zone="mitkrb kdb5_ldap_util">
605 <primary sortas="b-kdb5_ldap_util">kdb5_ldap_util</primary>
606 </indexterm>
607 </listitem>
608 </varlistentry>
609
[93c27d5]610 <varlistentry id="kdb5_util">
611 <term><command>kdb5_util</command></term>
612 <listitem>
[fa47d680]613 <para>
[4c24eb0a]614 is the KDC database utility
[fa47d680]615 </para>
[93c27d5]616 <indexterm zone="mitkrb kdb5_util">
617 <primary sortas="b-kdb5_util">kdb5_util</primary>
618 </indexterm>
619 </listitem>
620 </varlistentry>
621
[fa47d680]622 <varlistentry id="kdestroy">
[93c27d5]623 <term><command>kdestroy</command></term>
624 <listitem>
[fa47d680]625 <para>
[4c24eb0a]626 removes the current set of tickets
[fa47d680]627 </para>
628 <indexterm zone="mitkrb kdestroy">
[93c27d5]629 <primary sortas="b-kdestroy">kdestroy</primary>
630 </indexterm>
631 </listitem>
632 </varlistentry>
633
[fa47d680]634 <varlistentry id="kinit">
[93c27d5]635 <term><command>kinit</command></term>
636 <listitem>
[fa47d680]637 <para>
638 is used to authenticate to the Kerberos server as a
639 principal and acquire a ticket granting ticket that can
[4c24eb0a]640 later be used to obtain tickets for other services
[fa47d680]641 </para>
642 <indexterm zone="mitkrb kinit">
[93c27d5]643 <primary sortas="b-kinit">kinit</primary>
644 </indexterm>
645 </listitem>
646 </varlistentry>
647
[fa47d680]648 <varlistentry id="klist">
[93c27d5]649 <term><command>klist</command></term>
650 <listitem>
[fa47d680]651 <para>
652 reads and displays the current tickets in
[4c24eb0a]653 the credential cache
[fa47d680]654 </para>
655 <indexterm zone="mitkrb klist">
[93c27d5]656 <primary sortas="b-klist">klist</primary>
657 </indexterm>
658 </listitem>
659 </varlistentry>
660
[fa47d680]661 <varlistentry id="kpasswd">
[93c27d5]662 <term><command>kpasswd</command></term>
663 <listitem>
[fa47d680]664 <para>
[4c24eb0a]665 is a program for changing Kerberos 5 passwords
[fa47d680]666 </para>
667 <indexterm zone="mitkrb kpasswd">
[93c27d5]668 <primary sortas="b-kpasswd">kpasswd</primary>
669 </indexterm>
670 </listitem>
671 </varlistentry>
672
673 <varlistentry id="kprop">
674 <term><command>kprop</command></term>
675 <listitem>
[fa47d680]676 <para>
677 takes a principal database in a specified format and
[4c24eb0a]678 converts it into a stream of database records
[fa47d680]679 </para>
[93c27d5]680 <indexterm zone="mitkrb kprop">
681 <primary sortas="b-kprop">kprop</primary>
682 </indexterm>
683 </listitem>
684 </varlistentry>
685
686 <varlistentry id="kpropd">
687 <term><command>kpropd</command></term>
688 <listitem>
[fa47d680]689 <para>
690 receives a database sent by <command>kprop</command>
[4c24eb0a]691 and writes it as a local database
[fa47d680]692 </para>
[93c27d5]693 <indexterm zone="mitkrb kpropd">
694 <primary sortas="b-kpropd">kpropd</primary>
695 </indexterm>
696 </listitem>
697 </varlistentry>
698
[73fe507]699 <varlistentry id="kproplog">
700 <term><command>kproplog</command></term>
701 <listitem>
702 <para>
703 displays the contents of the KDC database update log to standard
[4c24eb0a]704 output
[73fe507]705 </para>
706 <indexterm zone="mitkrb kproplog">
707 <primary sortas="b-kproplog">kproplog</primary>
708 </indexterm>
709 </listitem>
710 </varlistentry>
711
[f91ceaa]712 <varlistentry id="krb5-config-prog2">
[93c27d5]713 <term><command>krb5-config</command></term>
714 <listitem>
[fa47d680]715 <para>
716 gives information on how to link programs against
[4c24eb0a]717 libraries
[fa47d680]718 </para>
[f91ceaa]719 <indexterm zone="mitkrb krb5-config-prog2">
720 <primary sortas="b-krb5-config">krb5-config</primary>
[93c27d5]721 </indexterm>
722 </listitem>
723 </varlistentry>
724
725 <varlistentry id="krb5kdc">
726 <term><command>krb5kdc</command></term>
727 <listitem>
[fa47d680]728 <para>
[4c24eb0a]729 is the <application>Kerberos 5</application> server
[fa47d680]730 </para>
[93c27d5]731 <indexterm zone="mitkrb krb5kdc">
732 <primary sortas="b-krb5kdc">krb5kdc</primary>
733 </indexterm>
734 </listitem>
735 </varlistentry>
736
[28370fe]737 <varlistentry id="krb5-send-pr">
738 <term><command>krb5-send-pr</command></term>
[73fe507]739 <listitem>
740 <para>
[4c24eb0a]741 sends a problem report (PR) to a central support site
[73fe507]742 </para>
[28370fe]743 <indexterm zone="mitkrb krb5-send-pr">
744 <primary sortas="b-krb-send-pr">krb5-send-pr</primary>
[73fe507]745 </indexterm>
746 </listitem>
747 </varlistentry>
748
[93c27d5]749 <varlistentry id="ksu">
750 <term><command>ksu</command></term>
751 <listitem>
[fa47d680]752 <para>
753 is the super user program using Kerberos protocol.
754 Requires a properly configured
755 <filename>/etc/shells</filename> and
756 <filename>~/.k5login</filename> containing principals
[4c24eb0a]757 authorized to become super users
[fa47d680]758 </para>
[93c27d5]759 <indexterm zone="mitkrb ksu">
760 <primary sortas="b-ksu">ksu</primary>
761 </indexterm>
762 </listitem>
763 </varlistentry>
764
[597a2890]765 <varlistentry id="kswitch">
766 <term><command>kswitch</command></term>
767 <listitem>
[fa47d680]768 <para>
[0d7900a]769 makes the specified credential cache the
770 primary cache for the collection, if a cache
[4c24eb0a]771 collection is available
[fa47d680]772 </para>
[597a2890]773 <indexterm zone="mitkrb kswitch">
774 <primary sortas="b-kswitch">kswitch</primary>
775 </indexterm>
776 </listitem>
777 </varlistentry>
778
[fa47d680]779 <varlistentry id="ktutil">
[93c27d5]780 <term><command>ktutil</command></term>
781 <listitem>
[fa47d680]782 <para>
[4c24eb0a]783 is a program for managing Kerberos keytabs
[fa47d680]784 </para>
785 <indexterm zone="mitkrb ktutil">
[93c27d5]786 <primary sortas="b-ktutil">ktutil</primary>
787 </indexterm>
788 </listitem>
789 </varlistentry>
790
791 <varlistentry id="kvno">
792 <term><command>kvno</command></term>
793 <listitem>
[fa47d680]794 <para>
[4c24eb0a]795 prints keyversion numbers of Kerberos principals
[fa47d680]796 </para>
[93c27d5]797 <indexterm zone="mitkrb kvno">
798 <primary sortas="b-kvno">kvno</primary>
799 </indexterm>
800 </listitem>
801 </varlistentry>
802
[597a2890]803 <varlistentry id="sclient">
804 <term><command>sclient</command></term>
[93c27d5]805 <listitem>
[fa47d680]806 <para>
[2f12da13]807 is used to contact a sample server and authenticate to it
[fa47d680]808 using Kerberos 5 tickets, then display the server's
[4c24eb0a]809 response
[fa47d680]810 </para>
[597a2890]811 <indexterm zone="mitkrb sclient">
812 <primary sortas="b-sclient">sclient</primary>
[93c27d5]813 </indexterm>
814 </listitem>
815 </varlistentry>
816
[73fe507]817 <varlistentry id="sim_client">
818 <term><command>sim_client</command></term>
819 <listitem>
820 <para>
821 is a simple UDP-based sample client program, for
[4c24eb0a]822 demonstration
[73fe507]823 </para>
824 <indexterm zone="mitkrb sim_client">
825 <primary sortas="b-sim_client">sim_client</primary>
826 </indexterm>
827 </listitem>
828 </varlistentry>
829
830 <varlistentry id="sim_server">
831 <term><command>sim_server</command></term>
832 <listitem>
833 <para>
834 is a simple UDP-based server application, for
[4c24eb0a]835 demonstration
[73fe507]836 </para>
837 <indexterm zone="mitkrb sim_server">
838 <primary sortas="b-sim_server">sim_server</primary>
839 </indexterm>
840 </listitem>
841 </varlistentry>
842
[597a2890]843 <varlistentry id="sserver">
844 <term><command>sserver</command></term>
[93c27d5]845 <listitem>
[fa47d680]846 <para>
[4c24eb0a]847 is the sample Kerberos 5 server
[fa47d680]848 </para>
[597a2890]849 <indexterm zone="mitkrb sserver">
850 <primary sortas="b-sserver">sserver</primary>
[93c27d5]851 </indexterm>
852 </listitem>
853 </varlistentry>
854
[73fe507]855 <varlistentry id="uuclient">
856 <term><command>uuclient</command></term>
857 <listitem>
858 <para>
[4c24eb0a]859 is another sample client
[73fe507]860 </para>
861 <indexterm zone="mitkrb uuclient">
862 <primary sortas="b-uuclient">uuclient</primary>
863 </indexterm>
864 </listitem>
865 </varlistentry>
866
867 <varlistentry id="uuserver">
868 <term><command>uuserver</command></term>
869 <listitem>
870 <para>
[4c24eb0a]871 is another sample server
[73fe507]872 </para>
873 <indexterm zone="mitkrb uuserver">
874 <primary sortas="b-uuserver">uuserver</primary>
875 </indexterm>
876 </listitem>
877 </varlistentry>
878
879
[fa47d680]880 <varlistentry id="libgssapi_krb5">
[3ff3b9b]881 <term><filename class="libraryfile">libgssapi_krb5.so</filename></term>
[93c27d5]882 <listitem>
[fa47d680]883 <para>
[2f12da13]884 contains the Generic Security Service Application Programming
[fa47d680]885 Interface (GSSAPI) functions which provides security services
886 to callers in a generic fashion, supportable with a range of
887 underlying mechanisms and technologies and hence allowing
888 source-level portability of applications to different
[4c24eb0a]889 environments
[fa47d680]890 </para>
891 <indexterm zone="mitkrb libgssapi_krb5">
[f91ceaa]892 <primary sortas="c-libgssapi_krb5">libgssapi_krb5.so</primary>
[93c27d5]893 </indexterm>
894 </listitem>
895 </varlistentry>
896
[fa47d680]897 <varlistentry id="libkadm5clnt">
[3ff3b9b]898 <term><filename class="libraryfile">libkadm5clnt.so</filename></term>
[93c27d5]899 <listitem>
[fa47d680]900 <para>
901 contains the administrative authentication and password checking
[4c24eb0a]902 functions required by Kerberos 5 client-side programs
[fa47d680]903 </para>
904 <indexterm zone="mitkrb libkadm5clnt">
[f91ceaa]905 <primary sortas="c-libkadm5clnt">libkadm5clnt.so</primary>
[93c27d5]906 </indexterm>
907 </listitem>
908 </varlistentry>
909
[fa47d680]910 <varlistentry id="libkadm5srv">
[3ff3b9b]911 <term><filename class="libraryfile">libkadm5srv.so</filename></term>
[93c27d5]912 <listitem>
[fa47d680]913 <para>
[2f12da13]914 contains the administrative authentication and password
[4c24eb0a]915 checking functions required by Kerberos 5 servers
[fa47d680]916 </para>
917 <indexterm zone="mitkrb libkadm5srv">
[f91ceaa]918 <primary sortas="c-libkadm5srv">libkadm5srv.so</primary>
[93c27d5]919 </indexterm>
920 </listitem>
921 </varlistentry>
922
923 <varlistentry id="libkdb5">
[3ff3b9b]924 <term><filename class="libraryfile">libkdb5.so</filename></term>
[93c27d5]925 <listitem>
[fa47d680]926 <para>
927 is a Kerberos 5 authentication/authorization database
[4c24eb0a]928 access library
[fa47d680]929 </para>
[93c27d5]930 <indexterm zone="mitkrb libkdb5">
[f91ceaa]931 <primary sortas="c-libkdb5">libkdb5.so</primary>
[93c27d5]932 </indexterm>
933 </listitem>
934 </varlistentry>
935
[bf7a21dd]936 <varlistentry id="libkrad">
937 <term><filename class="libraryfile">libkrad.so</filename></term>
938 <listitem>
939 <para>
[4c24eb0a]940 contains the internal support library for RADIUS functionality
[bf7a21dd]941 </para>
942 <indexterm zone="mitkrb libkrad">
943 <primary sortas="c-libkrad">libkrad.so</primary>
944 </indexterm>
945 </listitem>
946 </varlistentry>
947
[fa47d680]948 <varlistentry id="libkrb5">
[3ff3b9b]949 <term><filename class="libraryfile">libkrb5.so</filename></term>
[93c27d5]950 <listitem>
[fa47d680]951 <para>
[4c24eb0a]952 is an all-purpose <application>Kerberos 5</application> library
[fa47d680]953 </para>
954 <indexterm zone="mitkrb libkrb5">
[f91ceaa]955 <primary sortas="c-libkrb5">libkrb5.so</primary>
[93c27d5]956 </indexterm>
957 </listitem>
958 </varlistentry>
959
960 </variablelist>
[af22057]961
[93c27d5]962 </sect2>
[1dce143]963
964</sect1>
Note: See TracBrowser for help on using the repository browser.