source: postlfs/security/mitkrb.xml@ ec578e6

10.0 10.1 11.0 11.1 11.2 11.3 12.0 12.1 6.1 6.2 6.2.0 6.2.0-rc1 6.2.0-rc2 6.3 6.3-rc1 6.3-rc2 6.3-rc3 7.10 7.4 7.5 7.6 7.6-blfs 7.6-systemd 7.7 7.8 7.9 8.0 8.1 8.2 8.3 8.4 9.0 9.1 basic bdubbs/svn elogind gnome kde5-13430 kde5-14269 kde5-14686 kea ken/TL2024 ken/inkscape-core-mods ken/tuningfonts krejzi/svn lazarus lxqt nosym perl-modules plabs/newcss plabs/python-mods python3.11 qt5new rahul/power-profiles-daemon renodr/vulkan-addition systemd-11177 systemd-13485 trunk upgradedb xry111/intltool xry111/llvm18 xry111/soup3 xry111/test-20220226 xry111/xf86-video-removal
Last change on this file since ec578e6 was ec578e6, checked in by Bruce Dubbs <bdubbs@…>, 19 years ago

Temporarily remove MIT Kerberos instructions

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@4873 af4574ff-66df-0310-9fd7-8a98e5e911e0

  • Property mode set to 100644
File size: 26.3 KB
Line 
1<?xml version="1.0" encoding="ISO-8859-1"?>
2<!DOCTYPE sect1 PUBLIC "-//OASIS//DTD DocBook XML V4.4//EN"
3 "http://www.oasis-open.org/docbook/xml/4.4/docbookx.dtd" [
4 <!ENTITY % general-entities SYSTEM "../../general.ent">
5 %general-entities;
6
7 <!ENTITY mitkrb-download-http "http://web.mit.edu/kerberos/www/dist/krb5/1.4/krb5-&mitkrb-version;-signed.tar">
8 <!ENTITY mitkrb-download-ftp " ">
9 <!ENTITY mitkrb-md5sum "617e0071fa5b74ab4116f064678af551">
10 <!ENTITY mitkrb-size "6.4 MB">
11 <!ENTITY mitkrb-buildsize "TBD MB">
12 <!ENTITY mitkrb-time "TBD SBU">
13]>
14
15<sect1 id="mitkrb" xreflabel="MIT krb5-&mitkrb-version;">
16 <?dbhtml filename="mitkrb.html"?>
17
18 <sect1info>
19 <othername>$LastChangedBy$</othername>
20 <date>$Date$</date>
21 </sect1info>
22
23 <title>MIT Krb5-&mitkrb-version;</title>
24
25 <indexterm zone="mitkrb">
26 <primary sortas="a-Kerberos-MIT">Kerberos5(MIT)</primary>
27 </indexterm>
28
29 <sect2 role="package">
30 <title>Introduction to MIT Krb5</title>
31
32 <para><application>MIT krb5</application> is a free implementation of
33 Kerberos 5. Kerberos is a network authentication protocol. It
34 centralizes the authentication database and uses kerberized
35 applications to work with servers or services that support Kerberos
36 allowing single logins and encrypted communication over internal
37 networks or the Internet.</para>
38
39 <bridgehead renderas="sect3">Package Information</bridgehead>
40 <itemizedlist spacing="compact">
41 <listitem>
42 <para>Download (HTTP): <ulink url="&mitkrb-download-http;"/></para>
43 </listitem>
44 <listitem>
45 <para>Download (FTP): <ulink url="&mitkrb-download-ftp;"/></para>
46 </listitem>
47 <listitem>
48 <para>Download MD5 sum: &mitkrb-md5sum;</para>
49 </listitem>
50 <listitem>
51 <para>Download size: &mitkrb-size;</para>
52 </listitem>
53 <listitem>
54 <para>Estimated disk space required: &mitkrb-buildsize;</para>
55 </listitem>
56 <listitem>
57 <para>Estimated build time: &mitkrb-time;</para>
58 </listitem>
59 </itemizedlist>
60<!--
61 <bridgehead renderas="sect3">MIT Krb5 Dependencies</bridgehead>
62
63 <bridgehead renderas="sect4">Optional</bridgehead>
64 <para><xref linkend="xinetd"/> (services servers only),
65 <xref linkend="Linux_PAM"/> (for <command>xdm</command> based logins) and
66 <xref linkend="openldap"/> (alternative for <command>krb5kdc</command>
67 password database)</para>
68
69 <note>
70 <para>Some sort of time synchronization facility on your system (like
71 <xref linkend="ntp"/>) is required since Kerberos won't authenticate if
72 there is a time difference between a kerberized client and the
73 KDC server.</para>
74 </note>
75-->
76 </sect2>
77
78 <sect2 role="installation">
79 <title>Installation of MIT Krb5</title>
80
81
82 <note><para>The instructions for MIT Krb5 have not yet been validated by
83 the BLFS Editors. Until this section is updated, the Editors reccomend
84 using <xref linkend='heimdal'/> to implement the functionality of this
85 package.</para></note>
86
87<!--
88 <para><application>MIT krb5</application> is distributed in a
89 TAR file containing a compressed TAR package and a detached PGP
90 <filename class="extension">ASC</filename> file.</para>
91
92 <para>If you have installed <xref linkend="gnupg"/>, you can
93 authenticate the package with the following command:</para>
94
95<screen><userinput>gpg - -verify krb5-&mitkrb-version;.tar.gz.asc</userinput></screen>
96
97 <para>Build <application>MIT krb5</application> by running the
98 following commands:</para>
99
100<screen><userinput>cd src &amp;&amp;
101./configure - -prefix=/usr - -sysconfdir=/etc \
102 - -localstatedir=/var/lib - -enable-dns \
103 - -enable-static - -mandir=/usr/share/man &amp;&amp;
104make</userinput></screen>
105
106 <para>Now, as the <systemitem class="username">root</systemitem> user:</para>
107
108<screen role="root"><userinput>make install &amp;&amp;
109mv -v /bin/login /bin/login.shadow &amp;&amp;
110cp -v /usr/sbin/login.krb5 /bin/login &amp;&amp;
111mv -v /usr/bin/ksu /bin &amp;&amp;
112mv -v /usr/lib/libkrb5.so.3* /lib &amp;&amp;
113mv -v /usr/lib/libkrb4.so.2* /lib &amp;&amp;
114mv -v /usr/lib/libdes425.so.3* /lib &amp;&amp;
115mv -v /usr/lib/libk5crypto.so.3* /lib &amp;&amp;
116mv -v /usr/lib/libcom_err.so.3* /lib &amp;&amp;
117ln -v -sf ../../lib/libkrb5.so.3 /usr/lib/libkrb5.so &amp;&amp;
118ln -v -sf ../../lib/libkrb4.so.2 /usr/lib/libkrb4.so &amp;&amp;
119ln -v -sf ../../lib/libdes425.so.3 /usr/lib/libdes425.so &amp;&amp;
120ln -v -sf ../../lib/libk5crypto.so.3 /usr/lib/libk5crypto.so &amp;&amp;
121ln -v -sf ../../lib/libcom_err.so.3 /usr/lib/libcom_err.so &amp;&amp;
122ldconfig</userinput></screen>
123-->
124 </sect2>
125
126 <sect2 role="commands">
127 <title>Command Explanations</title>
128 <para></para>
129<!--
130 <para><parameter>- -enable-dns</parameter>: This switch allows
131 realms to be resolved using the DNS server.</para>
132
133 <para><parameter>- -enable-static</parameter>: This switch builds static
134 libraries in addition to the shared libraries.</para>
135
136 <para><command>mv -v /bin/login /bin/login.shadow &amp;&amp;
137 cp -v /usr/sbin/login.krb5 /bin/login &amp;&amp;
138 mv -v /usr/bin/ksu /bin</command>: Preserves
139 <application>Shadow</application>'s <command>login</command>
140 command, moves <command>ksu</command> and <command>login</command> to
141 the <filename class="directory">/bin</filename> directory.</para>
142
143 <para><command>mv -v ... /lib &amp;&amp; ln -v -sf ...</command>:
144 The <command>login</command> and <command>ksu</command> programs
145 are linked against these libraries, therefore we move these libraries
146 to <filename class="directory">/lib</filename> to allow logins without
147 mounting <filename class="directory">/usr</filename>.</para>
148-->
149 </sect2>
150
151 <sect2 role="configuration">
152 <title>Configuring MIT Krb5</title>
153 <para></para>
154<!--
155 <sect3 id="krb5-config">
156 <title>Config Files</title>
157
158 <para><filename>/etc/krb5.conf</filename> and
159 <filename>/var/lib/krb5kdc/kdc.conf</filename></para>
160
161 <indexterm zone="mitkrb krb5-config">
162 <primary sortas="e-etc-krb5.conf">/etc/krb5.conf</primary>
163 </indexterm>
164
165 <indexterm zone="mitkrb krb5-config">
166 <primary sortas="e-var-lib-krb5kdc-kdc.conf">/var/lib/krb5kdc/kdc.conf</primary>
167 </indexterm>
168
169 </sect3>
170
171 <sect3>
172 <title>Configuration Information</title>
173
174 <sect4>
175 <title>Kerberos Configuration</title>
176
177 <para>Create the Kerberos configuration file with the following
178 command:</para>
179
180<screen role="root"><userinput>cat &gt; /etc/krb5.conf &lt;&lt; "EOF"
181<literal># Begin /etc/krb5.conf
182
183[libdefaults]
184 default_realm = <replaceable>[LFS.ORG]</replaceable>
185 encrypt = true
186
187[realms]
188 <replaceable>[LFS.ORG]</replaceable> = {
189 kdc = <replaceable>[belgarath.lfs.org]</replaceable>
190 admin_server = <replaceable>[belgarath.lfs.org]</replaceable>
191 }
192
193[domain_realm]
194 .<replaceable>[lfs.org]</replaceable> = <replaceable>[LFS.ORG]</replaceable>
195
196[logging]
197 kdc = SYSLOG[:INFO[:AUTH]]
198 admin_server = SYSLOG[INFO[:AUTH]]
199 default = SYSLOG[[:SYS]]
200
201# End /etc/krb5.conf</literal>
202EOF</userinput></screen>
203
204 <para>You will need to substitute your domain and proper hostname
205 for the occurances of the <replaceable>[belgarath]</replaceable> and
206 <replaceable>[lfs.org]</replaceable> names.</para>
207
208 <para><option>default_realm</option> should be the name of your
209 domain changed to ALL CAPS. This isn't required, but both
210 <application>Heimdal</application> and MIT recommend it.</para>
211
212 <para><option>encrypt = true</option> provides encryption of all
213 traffic between kerberized clients and servers. It's not necessary
214 and can be left off. If you leave it off, you can encrypt all traffic
215 from the client to the server using a switch on the client program
216 instead.</para>
217
218 <para>The <option>[realms]</option> parameters tell the client
219 programs where to look for the KDC authentication services.</para>
220
221 <para>The <option>[domain_realm]</option> section maps a domain to
222 a realm.</para>
223
224 <para>Create the KDC database:</para>
225
226<screen role="root"><userinput>kdb5_util create -r <replaceable>[LFS.ORG]</replaceable> -s</userinput></screen>
227
228 <para>Now you should populate the database with principles
229 (users). For now, just use your regular login name or
230 <systemitem class="username">root</systemitem>.</para>
231
232<screen role="root"><userinput>kadmin.local
233<prompt>kadmin:</prompt> addprinc <replaceable>[loginname]</replaceable></userinput></screen>
234
235 <para>The KDC server and any machine running kerberized
236 server daemons must have a host key installed:</para>
237
238<screen role='root'><userinput><prompt>kadmin:</prompt> addprinc -randkey host/<replaceable>[belgarath.lfs.org]</replaceable></userinput></screen>
239
240 <para>After choosing the defaults when prompted, you will have to
241 export the data to a keytab file:</para>
242
243<screen role='root'><userinput><prompt>kadmin:</prompt> ktadd host/<replaceable>[belgarath.lfs.org]</replaceable></userinput></screen>
244
245 <para>This should have created a file in
246 <filename class="directory">/etc</filename> named
247 <filename>krb5.keytab</filename> (Kerberos 5). This file should
248 have 600 (<systemitem class="username">root</systemitem> rw only)
249 permissions. Keeping the keytab files from public access is crucial
250 to the overall security of the Kerberos installation.</para>
251
252 <para>Eventually, you'll want to add server daemon principles to the
253 database and extract them to the keytab file. You do this in the same
254 way you created the host principles. Below is an example:</para>
255
256<screen role='root'><userinput><prompt>kadmin:</prompt> addprinc -randkey ftp/<replaceable>[belgarath.lfs.org]</replaceable>
257<prompt>kadmin:</prompt> ktadd ftp/<replaceable>[belgarath.lfs.org]</replaceable></userinput></screen>
258
259 <para>Exit the <command>kadmin</command> program (use
260 <command>quit</command> or <command>exit</command>) and return
261 back to the shell prompt. Start the KDC daemon manually, just to
262 test out the installation:</para>
263
264<screen role='root'><userinput>/usr/sbin/krb5kdc &amp;</userinput></screen>
265
266 <para>Attempt to get a ticket with the following command:</para>
267
268<screen><userinput>kinit <replaceable>[loginname]</replaceable></userinput></screen>
269
270 <para>You will be prompted for the password you created. After you
271 get your ticket, you can list it with the following command:</para>
272
273<screen><userinput>klist</userinput></screen>
274
275 <para>Information about the ticket should be displayed on the
276 screen.</para>
277
278 <para>To test the functionality of the keytab file, issue the
279 following command:</para>
280
281<screen><userinput>ktutil
282<prompt>ktutil:</prompt> rkt /etc/krb5.keytab
283<prompt>ktutil:</prompt> l</userinput></screen>
284
285 <para>This should dump a list of the host principal, along with
286 the encryption methods used to access the principal.</para>
287
288 <para>At this point, if everything has been successful so far, you
289 can feel fairly confident in the installation and configuration of
290 the package.</para>
291
292 <para>Install the <filename>/etc/rc.d/init.d/kerberos</filename> init
293 script included in the <xref linkend="intro-important-bootscripts"/>
294 package.</para>
295
296<screen role="root"><userinput>make install-kerberos</userinput></screen>
297
298 </sect4>
299
300 <sect4>
301 <title>Using Kerberized Client Programs</title>
302
303 <para>To use the kerberized client programs (<command>telnet</command>,
304 <command>ftp</command>, <command>rsh</command>, <command>rcp</command>,
305 <command>rlogin</command>), you first must get an authentication ticket.
306 Use the <command>kinit</command> program to get the ticket. After you've
307 acquired the ticket, you can use the kerberized programs to connect to
308 any kerberized server on the network. You will not be prompted for
309 authentication until your ticket expires (default is one day), unless
310 you specify a different user as a command line argument to the
311 program.</para>
312
313 <para>The kerberized programs will connect to non kerberized daemons,
314 warning you that authentication is not encrypted.</para>
315
316 </sect4>
317
318 <sect4>
319 <title>Using Kerberized Server Programs</title>
320
321 <para>Using kerberized server programs (<command>telnetd</command>,
322 <command>kpropd</command>, <command>klogind</command> and
323 <command>kshd</command>) requires two additional configuration steps.
324 First the <filename>/etc/services</filename> file must be updated to
325 include eklogin and krb5_prop. Second, the
326 <filename>inetd.conf</filename> or <filename>xinetd.conf</filename>
327 must be modified for each server that will be activated, usually
328 replacing the server from <xref linkend="inetutils"/>.</para>
329
330 </sect4>
331
332 <sect4>
333 <title>Additional Information</title>
334
335 <para>For additional information consult <ulink
336 url="http://web.mit.edu/kerberos/www/krb5-1.4/#documentation">
337 Documentation for krb-&mitkrb-version;</ulink> on which the above
338 instructions are based.</para>
339
340 </sect4>
341
342 </sect3>
343-->
344 </sect2>
345
346 <sect2 role="content">
347 <title>Contents</title>
348 <para></para>
349<!--
350 <segmentedlist>
351 <segtitle>Installed Programs</segtitle>
352 <segtitle>Installed Libraries</segtitle>
353 <segtitle>Installed Directories</segtitle>
354
355 <seglistitem>
356 <seg>compile-et, ftp, ftpd, gss-client, gss-server, k5srvutil, kadmin,
357 kadmin.local, kadmind, kadmind4, kdb5_util, kdestroy, kinit, klist,
358 klogind, kpasswd, kprop, kpropd, krb5-send-pr, krb5-config, krb524d,
359 krb524init, krb5kdc, kshd, ksu, ktutil, kvno, login.krb5, rcp, rlogin,
360 rsh, sclient, sim_client, sim_server, sserver, telnet, telnetd,
361 uuclient, uuserver, v5passwd, and v5passwdd</seg>
362 <seg>libcom_err.[so,a], libdes425.[so,a], libgssapi.[so,a],
363 libgssrpc.[so,a], libkadm5clnt.[so,a], libkadm5srv.[so,a],
364 libkdb5.[so,a], libkrb5.[so,a], and libkrb4.[so,a]</seg>
365 <seg>/usr/include/kerberosIV and /var/lib/krb5kdc</seg>
366 </seglistitem>
367 </segmentedlist>
368
369 <variablelist>
370 <bridgehead renderas="sect3">Short Descriptions</bridgehead>
371 <?dbfo list-presentation="list"?>
372 <?dbhtml list-presentation="table"?>
373
374 <varlistentry id="compile_et">
375 <term><command>compile_et</command></term>
376 <listitem>
377 <para>converts the table listing error-code names into a
378 C source file.</para>
379 <indexterm zone="mitkrb compile_et">
380 <primary sortas="b-compile_et">compile_et</primary>
381 </indexterm>
382 </listitem>
383 </varlistentry>
384
385 <varlistentry id="ftp-mitkrb">
386 <term><command>ftp</command></term>
387 <listitem>
388 <para>is a kerberized FTP client.</para>
389 <indexterm zone="mitkrb ftp">
390 <primary sortas="b-ftp">ftp</primary>
391 </indexterm>
392 </listitem>
393 </varlistentry>
394
395 <varlistentry id="ftpd-mitkrb">
396 <term><command>ftpd</command></term>
397 <listitem>
398 <para>is a kerberized FTP daemon.</para>
399 <indexterm zone="mitkrb ftpd">
400 <primary sortas="b-ftpd">ftpd</primary>
401 </indexterm>
402 </listitem>
403 </varlistentry>
404
405 <varlistentry id="k5srvutil">
406 <term><command>k5srvutil</command></term>
407 <listitem>
408 <para>is a host keytable manipulation utility.</para>
409 <indexterm zone="mitkrb k5srvutil">
410 <primary sortas="b-k5srvutil">k5srvutil</primary>
411 </indexterm>
412 </listitem>
413 </varlistentry>
414
415 <varlistentry id="kadmin-mitkrb">
416 <term><command>kadmin</command></term>
417 <listitem>
418 <para>is an utility used to make modifications
419 to the Kerberos database.</para>
420 <indexterm zone="mitkrb kadmin-mitkrb">
421 <primary sortas="b-kadmin">kadmin</primary>
422 </indexterm>
423 </listitem>
424 </varlistentry>
425
426 <varlistentry id="kadmind-mitkrb">
427 <term><command>kadmind</command></term>
428 <listitem>
429 <para>is a server for administrative access
430 to a Kerberos database.</para>
431 <indexterm zone="mitkrb kadmind-mitkrb">
432 <primary sortas="b-kadmind">kadmind</primary>
433 </indexterm>
434 </listitem>
435 </varlistentry>
436
437 <varlistentry id="kdb5_util">
438 <term><command>kdb5_util</command></term>
439 <listitem>
440 <para>is the KDC database utility.</para>
441 <indexterm zone="mitkrb kdb5_util">
442 <primary sortas="b-kdb5_util">kdb5_util</primary>
443 </indexterm>
444 </listitem>
445 </varlistentry>
446
447 <varlistentry id="kdestroy-mitkrb">
448 <term><command>kdestroy</command></term>
449 <listitem>
450 <para>removes the current set of tickets.</para>
451 <indexterm zone="mitkrb kdestroy-mitkrb">
452 <primary sortas="b-kdestroy">kdestroy</primary>
453 </indexterm>
454 </listitem>
455 </varlistentry>
456
457 <varlistentry id="kinit-mitkrb">
458 <term><command>kinit</command></term>
459 <listitem>
460 <para>is used to authenticate to the Kerberos server as a
461 principal and acquire a ticket granting ticket that can
462 later be used to obtain tickets for other services.</para>
463 <indexterm zone="mitkrb kinit-mitkrb">
464 <primary sortas="b-kinit">kinit</primary>
465 </indexterm>
466 </listitem>
467 </varlistentry>
468
469 <varlistentry id="klist-mitkrb">
470 <term><command>klist</command></term>
471 <listitem>
472 <para>reads and displays the current tickets in
473 the credential cache.</para>
474 <indexterm zone="mitkrb klist-mitkrb">
475 <primary sortas="b-klist">klist</primary>
476 </indexterm>
477 </listitem>
478 </varlistentry>
479
480 <varlistentry id="klogind">
481 <term><command>klogind</command></term>
482 <listitem>
483 <para>is the server that responds to <command>rlogin</command>
484 requests.</para>
485 <indexterm zone="mitkrb klogind">
486 <primary sortas="b-klogind">klogind</primary>
487 </indexterm>
488 </listitem>
489 </varlistentry>
490
491 <varlistentry id="kpasswd-mitkrb">
492 <term><command>kpasswd</command></term>
493 <listitem>
494 <para>is a program for changing Kerberos 5 passwords.</para>
495 <indexterm zone="mitkrb kpasswd-mitkrb">
496 <primary sortas="b-kpasswd">kpasswd</primary>
497 </indexterm>
498 </listitem>
499 </varlistentry>
500
501 <varlistentry id="kprop">
502 <term><command>kprop</command></term>
503 <listitem>
504 <para>takes a principal database in a specified format and
505 converts it into a stream of database records.</para>
506 <indexterm zone="mitkrb kprop">
507 <primary sortas="b-kprop">kprop</primary>
508 </indexterm>
509 </listitem>
510 </varlistentry>
511
512 <varlistentry id="kpropd">
513 <term><command>kpropd</command></term>
514 <listitem>
515 <para>receives a database sent by <command>kprop</command>
516 and writes it as a local database.</para>
517 <indexterm zone="mitkrb kpropd">
518 <primary sortas="b-kpropd">kpropd</primary>
519 </indexterm>
520 </listitem>
521 </varlistentry>
522
523 <varlistentry id="krb5-config-1">
524 <term><command>krb5-config</command></term>
525 <listitem>
526 <para>gives information on how to link programs against
527 libraries.</para>
528 <indexterm zone="mitkrb krb5-config-prog">
529 <primary sortas="b-krb5-config-1">krb5-config</primary>
530 </indexterm>
531 </listitem>
532 </varlistentry>
533
534 <varlistentry id="krb5kdc">
535 <term><command>krb5kdc</command></term>
536 <listitem>
537 <para>is a Kerberos 5 server.</para>
538 <indexterm zone="mitkrb krb5kdc">
539 <primary sortas="b-krb5kdc">krb5kdc</primary>
540 </indexterm>
541 </listitem>
542 </varlistentry>
543
544 <varlistentry id="kshd">
545 <term><command>kshd</command></term>
546 <listitem>
547 <para>is the server that responds to <command>rsh</command>
548 requests.</para>
549 <indexterm zone="mitkrb kshd">
550 <primary sortas="b-kshd">kshd</primary>
551 </indexterm>
552 </listitem>
553 </varlistentry>
554
555 <varlistentry id="ksu">
556 <term><command>ksu</command></term>
557 <listitem>
558 <para>is the super user program using Kerberos protocol.
559 Requires a properly configured
560 <filename class="directory">/etc/shells</filename> and
561 <filename>~/.k5login</filename> containing principals
562 authorized to become super users.</para>
563 <indexterm zone="mitkrb ksu">
564 <primary sortas="b-ksu">ksu</primary>
565 </indexterm>
566 </listitem>
567 </varlistentry>
568
569 <varlistentry id="ktutil-mitkrb">
570 <term><command>ktutil</command></term>
571 <listitem>
572 <para>is a program for managing Kerberos keytabs.</para>
573 <indexterm zone="mitkrb ktutil-mitkrb">
574 <primary sortas="b-ktutil">ktutil</primary>
575 </indexterm>
576 </listitem>
577 </varlistentry>
578
579 <varlistentry id="kvno">
580 <term><command>kvno</command></term>
581 <listitem>
582 <para>prints keyversion numbers of Kerberos principals.</para>
583 <indexterm zone="mitkrb kvno">
584 <primary sortas="b-kvno">kvno</primary>
585 </indexterm>
586 </listitem>
587 </varlistentry>
588
589 <varlistentry id="login.krb5">
590 <term><command>login.krb5</command></term>
591 <listitem>
592 <para>is a kerberized login program.</para>
593 <indexterm zone="mitkrb login">
594 <primary sortas="b-login.krb5">login.krb5</primary>
595 </indexterm>
596 </listitem>
597 </varlistentry>
598
599 <varlistentry id="rcp-mitkrb">
600 <term><command>rcp</command></term>
601 <listitem>
602 <para>is a kerberized rcp client program.</para>
603 <indexterm zone="mitkrb rcp">
604 <primary sortas="b-rcp">rcp</primary>
605 </indexterm>
606 </listitem>
607 </varlistentry>
608
609 <varlistentry id="rlogin">
610 <term><command>rlogin</command></term>
611 <listitem>
612 <para>is a kerberized rlogin client program.</para>
613 <indexterm zone="mitkrb rlogin">
614 <primary sortas="b-rlogin">rlogin</primary>
615 </indexterm>
616 </listitem>
617 </varlistentry>
618
619 <varlistentry id="rsh-mitkrb">
620 <term><command>rsh</command></term>
621 <listitem>
622 <para>is a kerberized rsh client program.</para>
623 <indexterm zone="mitkrb rsh">
624 <primary sortas="b-rsh">rsh</primary>
625 </indexterm>
626 </listitem>
627 </varlistentry>
628
629 <varlistentry id="telnet-mitkrb">
630 <term><command>telnet</command></term>
631 <listitem>
632 <para>is a kerberized telnet client program.</para>
633 <indexterm zone="mitkrb telnet">
634 <primary sortas="b-telnet">telnet</primary>
635 </indexterm>
636 </listitem>
637 </varlistentry>
638
639 <varlistentry id="telnetd-mitkrb">
640 <term><command>telnetd</command></term>
641 <listitem>
642 <para>is a kerberized telnet server.</para>
643 <indexterm zone="mitkrb telnetd">
644 <primary sortas="b-telnetd">telnetd</primary>
645 </indexterm>
646 </listitem>
647 </varlistentry>
648
649 <varlistentry id="libcom_err">
650 <term><filename class='libraryfile'>libcom_err.[so,a]</filename></term>
651 <listitem>
652 <para>implements the Kerberos library error code.</para>
653 <indexterm zone="mitkrb libcom_err">
654 <primary sortas="c-libcom_err">libcom_err.[so,a]</primary>
655 </indexterm>
656 </listitem>
657 </varlistentry>
658
659 <varlistentry id="libgssapi-mitkrb">
660 <term><filename class='libraryfile'>libgssapi.[so,a]</filename></term>
661 <listitem>
662 <para>contain the Generic Security Service Application
663 Programming Interface (GSSAPI) functions which provides security
664 services to callers in a generic fashion, supportable with a range of
665 underlying mechanisms and technologies and hence allowing source-level
666 portability of applications to different environments.</para>
667 <indexterm zone="mitkrb libgssapi">
668 <primary sortas="c-libgssapi">libgssapi.[so,a]</primary>
669 </indexterm>
670 </listitem>
671 </varlistentry>
672
673 <varlistentry id="libkadm5clnt-mitkrb">
674 <term><filename class='libraryfile'>libkadm5clnt.[so,a]</filename></term>
675 <listitem>
676 <para>contains the administrative authentication and password
677 checking functions required by Kerberos 5 client-side programs.</para>
678 <indexterm zone="mitkrb libkadm5clnt">
679 <primary sortas="c-libkadm5clnt">libkadm5clnt.[so,a]</primary>
680 </indexterm>
681 </listitem>
682 </varlistentry>
683
684 <varlistentry id="libkadm5srv-mitkrb">
685 <term><filename class='libraryfile'>libkadm5srv.[so,a]</filename></term>
686 <listitem>
687 <para>contain the administrative authentication and password
688 checking functions required by Kerberos 5 servers.</para>
689 <indexterm zone="mitkrb libkadm5srv">
690 <primary sortas="c-libkadm5srv">libkadm5srv.[so,a]</primary>
691 </indexterm>
692 </listitem>
693 </varlistentry>
694
695 <varlistentry id="libkdb5">
696 <term><filename class='libraryfile'>libkdb5.[so,a]</filename></term>
697 <listitem>
698 <para>is a Kerberos 5 authentication/authorization database
699 access library.</para>
700 <indexterm zone="mitkrb libkdb5">
701 <primary sortas="c-libkdb5">libkdb5.[so,a]</primary>
702 </indexterm>
703 </listitem>
704 </varlistentry>
705
706 <varlistentry id="libkrb5-mitkrb">
707 <term><filename class='libraryfile'>libkrb5.[so,a]</filename></term>
708 <listitem>
709 <para>is an all-purpose Kerberos 5 library.</para>
710 <indexterm zone="mitkrb libkrb5">
711 <primary sortas="c-libkrb5">libkrb5.[so,a]</primary>
712 </indexterm>
713 </listitem>
714 </varlistentry>
715
716 </variablelist>
717-->
718 </sect2>
719
720</sect1>
Note: See TracBrowser for help on using the repository browser.