summaryrefslogtreecommitdiffstats
path: root/src/appl/bsd
diff options
context:
space:
mode:
authorRuss Allbery <rra@stanford.edu>2006-06-12 18:19:26 +0000
committerRuss Allbery <rra@stanford.edu>2006-06-12 18:19:26 +0000
commite52cd0c4da8586bed7325b56d50a1f0adf0130d9 (patch)
treee9ffae33e5ff3950f3dfe33ee0b202bcf3377354 /src/appl/bsd
parentd838a541588b4235eea323b8894c96205641329f (diff)
downloadkrb5-e52cd0c4da8586bed7325b56d50a1f0adf0130d9.tar.gz
krb5-e52cd0c4da8586bed7325b56d50a1f0adf0130d9.tar.xz
krb5-e52cd0c4da8586bed7325b56d50a1f0adf0130d9.zip
Document the authorization logic used in the absence of .k5login files.
Remove all remaining references to .rhosts authentication; the code to implement this was already removed. Ticket: 2577 Version_Reported: 1.3.3 git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18112 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/appl/bsd')
-rw-r--r--src/appl/bsd/klogind.M20
-rw-r--r--src/appl/bsd/kshd.M16
2 files changed, 18 insertions, 18 deletions
diff --git a/src/appl/bsd/klogind.M b/src/appl/bsd/klogind.M
index a05406a747..de4cd342e9 100644
--- a/src/appl/bsd/klogind.M
+++ b/src/appl/bsd/klogind.M
@@ -34,22 +34,26 @@ When a service request is received, the following protocol is initiated:
.IP 1)
Check authentication.
.IP 2)
-Check authorization via the access-control files \fI.k5login\fP, \fI.klogin\fP
-and \fI.rhosts\fP in the user's home directory.
+Check authorization via the access-control files \fI.k5login\fP and
+\fI.klogin\fP in the user's home directory.
.IP 3)
Prompt for password if any checks fail and the \fI-p\fP option was supplied.
.PP
If the authentication succeeds, login the user by calling the accompanying
login.krb5 or /bin/login, according to the definition of
-DO_NOT_USE_K_LOGIN.
+DO_NOT_USE_K_LOGIN.
.PP
The configuration of \fIklogind\fP is done
by command line arguments passed by inetd. The options are:
.IP \fB\-5\fP 10
Allow Kerberos V5 authentication with the \fI.k5login\fP access control
file to be trusted. If this authentication system is used by the client
-and the authorization check is passed, then the user is allowed to log
-in.
+and the authorization check is passed, then the user is allowed to log in.
+If the user has no \fI.k5login\fP file, the login will be authorized if
+the results of krb5_aname_to_localname conversion matches the account
+name. Unless special rules are configured, this will be true if and only
+if the Kerberos principal of the connecting user is in the default local
+realm and the principal portion matches the account name.
.IP \fB\-4\fP
Allow Kerberos V4 authentication with the \fI.klogin\fP access control
@@ -107,12 +111,6 @@ clients--particularly clients predating the release of Kerberos V5
Beta5 (May 1995)--present bogus checksums that prevent Kerberos
authentication from succeeding in the default mode.
-
-.PP
-If the
-~/.rhosts check is to be used, then the program verifies that the
-client is connecting from a privileged port, before allowing login.
-
.PP
The parent of the login process manipulates the master side of the
pseduo terminal, operating as an intermediary between the login
diff --git a/src/appl/bsd/kshd.M b/src/appl/bsd/kshd.M
index 049660ee1f..b6d50390a7 100644
--- a/src/appl/bsd/kshd.M
+++ b/src/appl/bsd/kshd.M
@@ -37,8 +37,8 @@ When a service request is received, the following protocol is initiated:
.IP 1)
Authentication is checked
.IP 2)
-Check authorization via the access-control files \fI.k5login\fP, \fI.klogin\fP
-and \fI.rhosts\fP in the user's home directory.
+Check authorization via the access-control files \fI.k5login\fP and
+\fI.klogin\fP in the user's home directory.
.IP 3)
A null byte is returned on the initial socket
and the command line is passed to the normal login
@@ -53,8 +53,13 @@ by \fIinetd(8)\fP.
.IP \fB\-5\fP 10
Allow Kerberos5 authentication with the \fI.k5login\fP access control file
-to be trusted. If this authentication system is used by the client and the
-authorization check is passed, then the user is allowed to log in.
+to be trusted. If this authentication system is used by the client and
+the authorization check is passed, then the user is allowed to log in. If
+the user has no \fI.k5login\fP file, the login will be authorized if the
+results of krb5_aname_to_localname conversion matches the account name.
+Unless special rules are configured, this will be true if and only if the
+Kerberos principal of the connecting user is in the default local realm
+and the principal portion matches the account name.
.IP \fB\-4\fP
Allow Kerberos4 authentication with the \fI.klogin\fP access control file
@@ -108,9 +113,6 @@ authentication from succeeding in the default mode.
.PP
-If the \fB\-r\fP or \fB\-R\fP options are used, the client must
-connect from a privileged port.
-.PP
\fIKrshd\fP supports six options which may be used for testing:
.IP \fB\-S\ keytab\fP 10