summaryrefslogtreecommitdiffstats
path: root/src/config-files
diff options
context:
space:
mode:
authorBen Kaduk <kaduk@mit.edu>2012-10-16 16:03:10 -0400
committerBen Kaduk <kaduk@mit.edu>2012-10-16 17:08:08 -0400
commit0bb69fbcc306a3bf28370ac57d7e79120ccc7ce1 (patch)
treeb726fc059a2775fb966667d17ee3e04c412da712 /src/config-files
parent0f81e372a2830c9170f6e08dfa956841d0ebdfb1 (diff)
downloadkrb5-0bb69fbcc306a3bf28370ac57d7e79120ccc7ce1.tar.gz
krb5-0bb69fbcc306a3bf28370ac57d7e79120ccc7ce1.tar.xz
krb5-0bb69fbcc306a3bf28370ac57d7e79120ccc7ce1.zip
Remove nroff man pages
We generate man pages from RST sources now; they are checked into the tree in src/man/. The gen-manpages directory is no longer needed.
Diffstat (limited to 'src/config-files')
-rw-r--r--src/config-files/kdc.conf.M273
-rw-r--r--src/config-files/krb5.conf.M813
2 files changed, 0 insertions, 1086 deletions
diff --git a/src/config-files/kdc.conf.M b/src/config-files/kdc.conf.M
deleted file mode 100644
index 5e2e6506ed..0000000000
--- a/src/config-files/kdc.conf.M
+++ /dev/null
@@ -1,273 +0,0 @@
-.\" Copyright 1995, 2008 by the Massachusetts Institute of Technology.
-.\"
-.\" Export of this software from the United States of America may
-.\" require a specific license from the United States Government.
-.\" It is the responsibility of any person or organization contemplating
-.\" export to obtain such a license before exporting.
-.\"
-.\" WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
-.\" distribute this software and its documentation for any purpose and
-.\" without fee is hereby granted, provided that the above copyright
-.\" notice appear in all copies and that both that copyright notice and
-.\" this permission notice appear in supporting documentation, and that
-.\" the name of M.I.T. not be used in advertising or publicity pertaining
-.\" to distribution of the software without specific, written prior
-.\" permission. Furthermore if you modify this software you must label
-.\" your software as modified software and not distribute it in such a
-.\" fashion that it might be confused with the original M.I.T. software.
-.\" M.I.T. makes no representations about the suitability of
-.\" this software for any purpose. It is provided "as is" without express
-.\" or implied warranty.
-.\"
-.TH KDC.CONF 5
-.SH NAME
-kdc.conf \- Kerberos V5 KDC configuration file
-.SH DESCRIPTION
-.I kdc.conf
-specifies per-realm configuration data to be used by the Kerberos V5
-Authentication Service and Key Distribution Center (AS/KDC). This
-includes database, key and per-realm defaults.
-.PP
-The
-.I kdc.conf
-file uses the same format as the
-.I krb5.conf
-file. For a basic description of the syntax, please refer to the
-.I krb5.conf
-description.
-.PP
-The following sections are currently used in the
-.I kdc.conf
-file:
-.IP [kdcdefaults]
-Contains parameters which control the overall behaviour of the KDC.
-.IP [realms]
-Contains subsections keyed by Kerberos realm names which describe per-realm
-KDC parameters.
-.SH KDCDEFAULTS SECTION
-The following relations are defined in the
-.I [kdcdefaults]
-section:
-.IP kdc_ports
-This relation lists the ports which the Kerberos server should listen
-on, by default. This list is a comma separated list of integers. If
-this relation is not specified, the compiled-in default is usually
-port 88 and port 750.
-.IP kdc_tcp_ports
-This relation lists the ports on which the Kerberos server should
-listen for TCP connections by default. This list is a comma separated
-list of integers.
-If this relation is not specified, the compiled-in default is not to
-listen for TCP connections at all.
-
-If you wish to change this (which we do not recommend, because the
-current implementation has little protection against denial-of-service
-attacks), the standard port number assigned for Kerberos TCP traffic
-is port 88.
-.IP v4_mode
-This
-.B string
-specifies how the KDC should respond to Kerberos IV packets. Valid
-values for this relation are the same as the valid arguments to the
-.B -4
-flag to
-.BR krb5kdc .
-If this relation is not specified, the compiled-in default of
-.I none
-is used.
-
-.SH REALMS SECTION
-Each tag in the
-.I [realms]
-section of the file names a Kerberos realm. The value of the tag is a
-subsection where the relations in that subsection define KDC parameters for
-that particular realm.
-.PP
-For each realm, the following tags may be specified in the
-.I [realms]
-subsection:
-
-.IP acl_file
-This
-.B string
-specifies the location of the access control list (acl) file that
-kadmin uses to determine which principals are allowed which permissions
-on the database. The default value is /usr/local/var/krb5kdc/kadm5.acl.
-
-.IP database_name
-This
-.B string
-specifies the location of the Kerberos database for this realm.
-
-.IP default_principal_expiration
-This
-.B absolute time string
-specifies the default expiration date of principals created in this realm.
-
-.IP default_principal_flags
-This
-.B flag string
-specifies the default attributes of principals created in this realm.
-The format for the string is a comma-separated list of flags, with '+'
-before each flag to be enabled and '-' before each flag to be
-disabled. The default is for postdateable, forwardable, tgt-based,
-renewable, proxiable, dup-skey, allow-tickets, and service to be
-enabled, and all others to be disabled.
-
-There are a number of possible flags:
-.RS
-.TP
-.B postdateable
-Enabling this flag allows the principal to obtain postdateable tickets.
-.TP
-.B forwardable
-Enabling this flag allows the principal to obtain forwardable tickets.
-.TP
-.B tgt-based
-Enabling this flag allows a principal to obtain tickets based on a
-ticket-granting-ticket, rather than repeating the authentication
-process that was used to obtain the TGT.
-.TP
-.B renewable
-Enabling this flag allows the principal to obtain renewable tickets.
-.TP
-.B proxiable
-Enabling this flag allows the principal to obtain proxy tickets.
-.TP
-.B dup-skey
-Enabling this flag allows the principal to obtain a session key for
-another user, permitting user-to-user authentication for this principal.
-.TP
-.B allow-tickets
-Enabling this flag means that the KDC will issue tickets for this
-principal. Disabling this flag essentially deactivates the principal
-within this realm.
-.TP
-.B preauth
-If this flag is enabled on a client principal, then that principal is
-required to preauthenticate to the KDC before receiving any tickets.
-On a service principal, enabling this flag means that service tickets
-for this principal will only be issued to clients with a TGT that has
-the preauthenticated ticket set.
-.TP
-.B hwauth
-If this flag is enabled, then the principal is required to
-preauthenticate using a hardware device before receiving any tickets.
-.TP
-.B pwchange
-Enabling this flag forces a password change for this principal.
-.TP
-.B service
-Enabling this flag allows the the KDC to issue service tickets for this
-principal.
-.TP
-.B pwservice
-If this flag is enabled, it marks this principal as a password change
-service. This should only be used in special cases, for example, if a
-user's password has expired, the user has to get tickets for that
-principal to be able to change it without going through the normal
-password authentication.
-.RE
-
-.IP dict_file
-This
-.B string
-location of the dictionary file containing strings that are not allowed
-as passwords. If this tag is not set or if there is no policy assigned
-to the principal, then no check will be done.
-
-.IP kadmind_port
-This
-.B port number
-specifies the port on which the kadmind daemon is to listen for this
-realm.
-
-.IP kpasswd_port
-This
-.B port number
-specifies the port on which the kadmind daemon is to listen for this
-realm.
-
-.IP key_stash_file
-This
-.B string
-specifies the location where the master key has been stored with
-.I kdb5_stash.
-
-.IP kdc_ports
-This
-.B string
-specifies the list of ports that the KDC is to listen to for this realm.
-By default, the value of
-.I kdc_ports
-as specified in the
-.I [kdcdefaults]
-section is used.
-
-.IP kdc_tcp_ports
-This
-.B string
-specifies the list of ports that the KDC is to listen to
-for TCP requests for this realm. By default, the value of
-.I kdc_tcp_ports
-as specified in the
-.I [kdcdefaults]
-section is used.
-
-.IP master_key_name
-This
-.B string
-specifies the name of the principal associated with the master key.
-The default value is K/M.
-
-.IP master_key_type
-This
-.B key type string
-represents the master key's key type.
-
-.IP max_life
-This
-.B delta time string
-specifies the maximum time period that a ticket may be valid for in
-this realm.
-
-.IP max_renewable_life
-This
-.B delta time string
-specifies the maximum time period that a ticket may be renewed for in
-this realm.
-
-.IP iprop_enable
-This
-.B boolean
-("true" or "false") specifies whether incremental database propagation
-is enabled. The default is "false".
-
-.IP iprop_master_ulogsize
-This
-.B numeric value
-specifies the maximum number of log entries to be retained for
-incremental propagation. The maximum value is 2500; default is 1000.
-
-.IP iprop_slave_poll
-This
-.B delta time string
-specifies how often the slave KDC polls for new updates from the
-master. Default is "2m" (that is, two minutes).
-
-.IP supported_enctypes
-list of key:salt strings that specifies the default key/salt
-combinations of principals for this realm
-
-.IP reject_bad_transit
-this
-.B boolean
-specifies whether or not the list of transited realms for cross-realm
-tickets should be checked against the transit path computed from the
-realm names and the [capaths] section of its krb5.conf file
-
-.SH FILES
-/usr/local/var/krb5kdc/kdc.conf
-
-.SH SEE ALSO
-krb5.conf(5), krb5kdc(8)
diff --git a/src/config-files/krb5.conf.M b/src/config-files/krb5.conf.M
deleted file mode 100644
index af4200c3ba..0000000000
--- a/src/config-files/krb5.conf.M
+++ /dev/null
@@ -1,813 +0,0 @@
-.\" Copyright 1995 by the Massachusetts Institute of Technology.
-.\"
-.\" Export of this software from the United States of America may
-.\" require a specific license from the United States Government.
-.\" It is the responsibility of any person or organization contemplating
-.\" export to obtain such a license before exporting.
-.\"
-.\" WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
-.\" distribute this software and its documentation for any purpose and
-.\" without fee is hereby granted, provided that the above copyright
-.\" notice appear in all copies and that both that copyright notice and
-.\" this permission notice appear in supporting documentation, and that
-.\" the name of M.I.T. not be used in advertising or publicity pertaining
-.\" to distribution of the software without specific, written prior
-.\" permission. Furthermore if you modify this software you must label
-.\" your software as modified software and not distribute it in such a
-.\" fashion that it might be confused with the original M.I.T. software.
-.\" M.I.T. makes no representations about the suitability of
-.\" this software for any purpose. It is provided "as is" without express
-.\" or implied warranty.
-.\"
-.TH KRB5.CONF 5
-.SH NAME
-krb5.conf \- Kerberos configuration file
-.SH DESCRIPTION
-.I krb5.conf
-contains configuration information needed by the Kerberos V5 library.
-This includes information describing the default Kerberos realm, and the
-location of the Kerberos key distribution centers for known realms.
-.PP
-The
-.I krb5.conf
-file uses an INI-style format. Sections are delimited by square braces;
-within each section, there are relations where tags can be assigned to
-have specific values. Tags can also contain a subsection, which
-contains further relations or subsections. A tag can be assigned to
-multiple values. Here is an example of the INI-style format used by
-.IR krb5.conf :
-
-.sp
-.nf
-.in +1i
-[section1]
- tag1 = value_a
- tag1 = value_b
- tag2 = value_c
-
-[section 2]
- tag3 = {
- subtag1 = subtag_value_a
- subtag1 = subtag_value_b
- subtag2 = subtag_value_c
- }
- tag4 = {
- subtag1 = subtag_value_d
- subtag2 = subtag_value_e
- }
-.in -1i
-.fi
-.sp
-
-.PP
-.I krb5.conf
-can include other files using the directives "include FILENAME" or
-"includedir DIRNAME", which must occur at the beginning of a line.
-FILENAME or DIRNAME should be an absolute path. The named file or
-directory must exist and be readable. Including a directory includes
-all files within the directory whose names consist solely of
-alphanumeric characters, dashes, or underscores. Included profile
-files are syntactically independent of their parents, so each included
-file must begin with a section header.
-
-.PP
-.I krb5.conf
-can cause configuration to be obtained from a loadable profile module
-by placing the directive "module MODULEPATH:RESIDUAL" at the beginning
-of a line before any section headers. MODULEPATH may be relative to
-the library path of the krb5 installation, or it may be an absolute
-path. RESIDUAL is provided to the module at initialization time. If
-.I krb5.conf
-uses a module directive,
-.I kdc.conf
-should also use one if it exists.
-
-.PP
-The following sections are currently used in the
-.I krb5.conf
-file:
-.IP [libdefaults]
-Contains various default values used by the Kerberos V5 library.
-
-.IP [login]
-Contains default values used by the Kerberos V5 login program,
-.IR login.krb5 (8).
-
-.IP [appdefaults]
-Contains default values that can be used by Kerberos V5 applications.
-
-.IP [realms]
-Contains subsections keyed by Kerberos realm names which describe where
-to find the Kerberos servers for a particular realm, and other
-realm-specific information.
-
-.IP [domain_realm]
-Contains relations which map subdomains and domain names to Kerberos
-realm names. This is used by programs to determine what realm a host
-should be in, given its fully qualified domain name.
-
-.IP [logging]
-Contains relations which determine how Kerberos entities are to perform
-their logging.
-
-.IP [capaths]
-Contains the authentication paths used with non-hierarchical
-cross-realm. Entries in the section are used by the client to determine
-the intermediate realms which may be used in cross-realm
-authentication. It is also used by the end-service when checking the
-transited field for trusted intermediate realms.
-
-.IP [dbdefaults]
-Contains default values for database specific parameters.
-
-.IP [dbmodules]
-Contains database specific parameters used by the database library.
-
-.IP [plugins]
-Contains plugin module registration and filtering parameters.
-.PP
-Each of these sections will be covered in more details in the following
-sections.
-.SH LIBDEFAULTS SECTION
-The following relations are defined in the [libdefaults] section:
-
-.IP default_keytab_name
-This relation specifies the default keytab name to be used by
-application severs such as telnetd and rlogind. The default is
-"/etc/krb5.keytab". This formerly defaulted to "/etc/v5srvtab", but
-was changed to the current value.
-
-.IP default_realm
-This relation identifies the default realm to be used in a client host's
-Kerberos activity.
-
-.IP default_tgs_enctypes
-This relation identifies the supported list of session key encryption
-types that should be returned by the KDC. The list may be delimited with
-commas or whitespace.
-
-.IP default_tkt_enctypes
-This relation identifies the supported list of session key encryption
-types that should be requested by the client, in the same format.
-
-.IP permitted_enctypes
-This relation identifies the permitted list of session key encryption
-types.
-
-.IP allow_weak_crypto
-If this is set to 0 (for false), then weak encryption types will be
-filtered out of the previous three lists. The default value for this
-tag is false, which may cause authentication failures in existing
-Kerberos infrastructures that do not support strong crypto. Users in
-affected environments should set this tag to true until their
-infrastructure adopts stronger ciphers.
-
-.IP clockskew
-This relation sets the maximum allowable amount of clockskew in seconds
-that the library will tolerate before assuming that a Kerberos message
-is invalid. The default value is 300 seconds, or five minutes.
-
-.IP ignore_acceptor_hostname
-When accepting GSSAPI or krb5 security contexts for host-based service
-principals, ignore any hostname passed by the calling application and
-allow any service principal present in the keytab which matches the
-service name and realm name (if given). This option can improve the
-administrative flexibility of server applications on multi-homed
-hosts, but can compromise the security of virtual hosting
-environments. The default value is false.
-
-.IP k5login_authoritative
-If the value of this relation is true (the default), principals must
-be listed in a local user's k5login file to be granted login access,
-if a k5login file exists. If the value of this relation is false, a
-principal may still be granted login access through other mechanisms
-even if a k5login file exists but does not list the principal.
-
-.IP k5login_directory
-If set, the library will look for a local user's k5login file within
-the named directory, with a filename corresponding to the local
-username. If not set, the library will look for k5login files in the
-user's home directory, with the filename .k5login. For security
-reasons, k5login files must be owned by the local user or by root.
-
-.IP kdc_timesync
-If the value of this relation is non-zero (the default), the library
-will compute the difference between the system clock and the time
-returned by the KDC and in order to correct for an inaccurate system
-clock. This corrective factor is only used by the Kerberos library.
-
-.IP kdc_req_checksum_type
-For compatibility with DCE security servers which do not support the
-default CKSUMTYPE_RSA_MD5 used by this version of Kerberos. Use a value
-of 2 to use the CKSUMTYPE_RSA_MD4 instead. This applies to DCE 1.1 and
-earlier. This value is only used for DES keys; other keys use the
-preferred checksum type for those keys.
-
-.IP ap_req_checksum_type
-If set this variable controls what ap-req checksum will be used in authenticators. This variable should be unset so the appropriate checksum for the encryption key in use will be used. This can be set if backward compatibility requires a specific checksum type.
-
-.IP safe_checksum_type
-This allows you to set the preferred keyed-checksum type for use in KRB_SAFE
-messages. The default value for this type is CKSUMTYPE_RSA_MD5_DES.
-For compatibility with applications linked against DCE version 1.1 or
-earlier Kerberos
-libraries, use a value of 3 to use the CKSUMTYPE_RSA_MD4_DES
-instead. This field is ignored when its value is incompatible with
-the session key type.
-
-.IP preferred_preauth_types
-This allows you to set the preferred preauthentication types which the
-client will attempt before others which may be advertised by a KDC. The
-default value for this setting is "17, 16, 15, 14", which forces libkrb5
-to attempt to use PKINIT if it is supported.
-
-.IP ccache_type
-User this parameter on systems which are DCE clients, to specify the
-type of cache to be created by kinit, or when forwarded tickets are
-received. DCE and Kerberos can share the cache, but some versions of DCE
-do not support the default cache as created by this version of
-Kerberos. Use a value of 1 on DCE 1.0.3a systems, and a value of 2 on
-DCE 1.1 systems.
-
-.IP dns_lookup_kdc
-Indicate whether DNS SRV records should be used to locate the KDCs and
-other servers for a realm, if they are not listed in the information
-for the realm. The default is to use these records.
-
-.IP dns_lookup_realm
-Indicate whether DNS TXT records should be used to determine the Kerberos
-realm of a host. The default is not to use these records.
-
-.IP dns_fallback
-General flag controlling the use of DNS for Kerberos information. If both
-of the preceding options are specified, this option has no effect.
-
-.IP realm_try_domains
-Indicate whether a host's domain components should be used to
-determine the Kerberos realm of the host. The value of this variable
-is an integer: \-1 means not to search, 0 means to try the host's
-domain itself, 1 means to also try the domain's immediate parent, and
-so forth. The library's usual mechanism for locating Kerberos realms
-is used to determine whether a domain is a valid realm--which may
-involve consulting DNS if dns_lookup_kdc is set. The default is not
-to search domain components.
-
-.IP extra_addresses
-This allows a computer to use multiple local addresses, in order to
-allow Kerberos to work in a network that uses NATs. The addresses should
-be in a comma-separated list.
-
-.IP udp_preference_limit
-When sending a message to the KDC, the library will try using TCP
-before UDP if the size of the message is above "udp_preference_limit".
-If the message is smaller than "udp_preference_limit", then UDP will be
-tried before TCP. Regardless of the size, both protocols will be
-tried if the first attempt fails.
-
-.IP verify_ap_req_nofail
-If this flag is set, then an attempt to get initial credentials will
-fail if the client machine does not have a keytab. The default for the
-flag is false.
-
-.IP ticket_lifetime
-The value of this tag is the default lifetime for initial tickets. The
-default value for the tag is 1 day (1d).
-
-.IP renew_lifetime
-The value of this tag is the default renewable lifetime for initial
-tickets. The default value for the tag is 0.
-
-.IP noaddresses
-Setting this flag causes the initial Kerberos ticket to be addressless.
-The default for the flag is true.
-
-.IP forwardable
-If this flag is set, initial tickets by default will be forwardable.
-The default value for this flag is false.
-
-.IP proxiable
-If this flag is set, initial tickets by default will be proxiable.
-The default value for this flag is false.
-
-.IP rdns
-If set to false, prevent the use of reverse DNS resolution when
-translating hostnames into service principal names. Defaults to
-true. Setting this flag to false is more secure, but may force
-users to exclusively use fully qualified domain names when
-authenticating to services.
-
-.IP plugin_base_dir
-If set, determines the base directory where krb5 plugins are located.
-The default value is the "krb5/plugins" subdirectory of the krb5
-library directory.
-
-.SH APPDEFAULTS SECTION
-
-Each tag in the [appdefaults] section names a Kerberos V5 application
-or an option that is used by some Kerberos V5 application[s]. The
-four ways that you can set values for options are as follows, in
-decreasing order of precedence:
-
-.sp
-.nf
-.in +1i
-#1)
- application = {
- realm1 = {
- option = value
- }
- realm2 = {
- option = value
- }
- }
-#2)
- application = {
- option1 = value
- option2 = value
- }
-#3)
- realm = {
- option = value
- }
-#4)
- option = value
-.in -1in
-.fi
-.sp
-
-.SH LOGIN SECTION
-The [login] section is used to configure the behavior of the Kerberos V5
-login program,
-.IR login.krb5 (8).
-Refer to the manual entry for
-.I login.krb5
-for a description of the relations allowed in this section.
-.SH REALMS SECTION
-Each tag in the [realms] section of the file names a Kerberos realm.
-The value of the tag is a subsection where the relations in that
-subsection define the properties of that particular realm. For example:
-
-.sp
-.nf
-.in +1i
-[realms]
- ATHENA.MIT.EDU = {
- admin_server = KERBEROS.MIT.EDU
- default_domain = MIT.EDU
- database_module = ldapconf
- v4_instance_convert = {
- mit = mit.edu
- lithium = lithium.lcs.mit.edu
- }
- v4_realm = LCS.MIT.EDU
- }
-.in -1i
-.fi
-.sp
-
-For each realm, the following tags may be specified in the realm's
-subsection:
-
-.IP kdc
-The value of this relation is the name of a host running a KDC for that
-realm. An optional port number (preceded by a colon) may be appended to
-the hostname. This tag should generally be used only if the realm
-administrator has not made the information available through DNS.
-
-.IP admin_server
-This relation identifies the host where the administration server is
-running. Typically this is the Master Kerberos server.
-
-.IP database_module
-This relation indicates the name of the configuration section under dbmodules
-for database specific parameters used by the loadable database library.
-
-.IP default_domain
-This relation identifies the default domain for which hosts in this
-realm are assumed to be in. This is needed for translating V4 principal
-names (which do not contain a domain name) to V5 principal names (which
-do).
-
-.IP v4_instance_convert
-This subsection allows the administrator to configure exceptions to the
-default_domain mapping rule. It contains V4 instances (the tag name)
-which should be translated to some specific hostname (the tag value) as
-the second component in a Kerberos V5 principal name.
-
-.IP v4_realm
-This relation is used by the krb524 library routines when converting
-a V5 principal name to a V4 principal name. It is used when V4 realm
-name and the V5 realm are not the same, but still share the same
-principal names and passwords. The tag value is the Kerberos V4 realm
-name.
-
-.IP auth_to_local_names
-This subsection allows you to set explicit mappings from principal
-names to local user names. The tag is the mapping name, and the value
-is the corresponding local user name.
-
-.IP auth_to_local
-This tag allows you to set a general rule for mapping principal names
-to local user names. It will be used if there is not an explicit
-mapping for the principal name that is being translated. The possible
-values are:
-
-.in +.5i
-DB:<filename>
-.in +.5i
-The principal will be looked up in the database <filename>.
-Support for this is not currently compiled in by default.
-.in -.5in
-RULE:<exp>
-.in +.5i
-The local name will be formulated from <exp>.
-.in -.5i
-DEFAULT
-.in +.5i
-The principal name will be used as the local name. If the
-principal has more than one component or is not in the default
-realm, this rule is not applicable and the conversion will fail.
-.in -1i
-
-.SH DOMAIN_REALM SECTION
-
-The [domain_realm] section provides a translation from a hostname to the
-Kerberos realm name for the services provided by that host.
-.PP
-The tag name can be a hostname, or a domain name, where domain names are
-indicated by a prefix of a period ('.') character. The value of the
-relation is the Kerberos realm name for that particular host or domain.
-Host names and domain names should be in lower case.
-.PP
-If no translation entry applies, the host's realm is considered to be
-the hostname's domain portion converted to upper case. For example, the
-following [domain_realm] section:
-
-.sp
-.nf
-.in +1i
-[domain_realm]
- .mit.edu = ATHENA.MIT.EDU
- mit.edu = ATHENA.MIT.EDU
- dodo.mit.edu = SMS_TEST.MIT.EDU
- .ucsc.edu = CATS.UCSC.EDU
-.in -1i
-.fi
-.sp
-maps dodo.mit.edu into the SMS_TEST.MIT.EDU realm, all other hosts in
-the MIT.EDU domain to the ATHENA.MIT.EDU realm, and all hosts in the
-UCSC.EDU domain into the CATS.UCSC.EDU realm. ucbvax.berkeley.edu would
-be mapped by the default rules to the BERKELEY.EDU realm, while
-sage.lcs.mit.edu would be mapped to the LCS.MIT.EDU realm.
-
-.SH LOGGING SECTION
-
-The [logging] section indicates how a particular entity is to perform
-its logging. The relations specified in this section assign one or more
-values to the entity name.
-.PP
-Currently, the following entities are used:
-.IP kdc
-These entries specify how the KDC is to perform its logging.
-.IP admin_server
-These entries specify how the administrative server is to perform its logging.
-.IP default
-These entries specify how to perform logging in the absence of explicit
-specifications otherwise.
-.PP
-Values are of the following forms:
-.IP FILE=<filename>
-.IP FILE:<filename>
-This value causes the entity's logging messages to go to the specified
-file. If the
-.B =
-form is used, then the file is overwritten. Otherwise, the file is
-appended to.
-.IP STDERR
-This value causes the entity's logging messages to go to its standard
-error stream.
-.IP CONSOLE
-This value causes the entity's logging messages to go to the console, if
-the system supports it.
-.IP DEVICE=<devicename>
-This causes the entity's logging messages to go to the specified device.
-.IP SYSLOG[:<severity>[:<facility>]]
-This causes the entity's logging messages to go to the system log.
-
-The
-.B severity
-argument specifies the default severity of system log messages. This
-may be any of the following severities supported by the
-.I syslog(3)
-call minus the LOG_ prefix: LOG_EMERG, LOG_ALERT, LOG_CRIT, LOG_ERR,
-LOG_WARNING, LOG_NOTICE, LOG_INFO, and LOG_DEBUG. For example, to
-specify LOG_CRIT severity, one would use CRIT for
-.B severity.
-
-The
-.B facility
-argument specifies the facility under which the messages are logged.
-This may be any of the following facilities supported by the
-.I syslog(3)
-call minus the LOG_ prefix: LOG_KERN, LOG_USER, LOG_MAIL, LOG_DAEMON,
-LOG_AUTH, LOG_LPR, LOG_NEWS, LOG_UUCP, LOG_CRON, and LOG_LOCAL0 through
-LOG_LOCAL7.
-
-If no
-.B severity
-is specified, the default is ERR, and if no
-.B facility
-is specified, the default is AUTH.
-.PP
-In the following example, the logging messages from the KDC will go to
-the console and to the system log under the facility LOG_DAEMON with
-default severity of LOG_INFO; and the logging messages from the
-administrative server will be appended to the file /var/adm/kadmin.log
-and sent to the device /dev/tty04.
-.sp
-.nf
-.in +1i
-[logging]
- kdc = CONSOLE
- kdc = SYSLOG:INFO:DAEMON
- admin_server = FILE:/var/adm/kadmin.log
- admin_server = DEVICE=/dev/tty04
-.in -1i
-.fi
-.sp
-
-.SH CAPATHS SECTION
-
-Cross-realm authentication is typically organized hierarchically. This
-hierarchy is based on the name of the realm, which thus imposes
-restrictions on the choice of realm names, and on who may participate in
-a cross-realm authentication. A non hierarchical organization may be used,
-but requires a database to construct the authentication paths between
-the realms. This section defines that database.
-.PP
-A client will use this section to find the authentication path between
-its realm and the realm of the server. The server will use this section
-to verify the authentication path used be the client, by checking the
-transited field of the received ticket.
-.PP
-There is a tag name for each participating realm, and each tag has
-subtags for each of the realms. The value of the subtags is an
-intermediate realm which may participate in the cross-realm
-authentication. The subtags may be repeated if there is more then one
-intermediate realm. A value of "." means that the two realms share keys
-directly, and no intermediate realms should be allowed to participate.
-.PP
-There are n**2 possible entries in this table, but only those entries
-which will be needed on the client or the server need to be present. The
-client needs a tag for its local realm, with subtags for all the realms
-of servers it will need to authenticate with. A server needs a tag for
-each realm of the clients it will serve.
-.PP
-For example, ANL.GOV, PNL.GOV, and NERSC.GOV all wish to use the ES.NET
-realm as an intermediate realm. ANL has a sub realm of TEST.ANL.GOV
-which will authenticate with NERSC.GOV but not PNL.GOV. The [capath]
-section for ANL.GOV systems would look like this:
-.sp
-.nf
-.in +1i
-[capaths]
- ANL.GOV = {
- TEST.ANL.GOV = .
- PNL.GOV = ES.NET
- NERSC.GOV = ES.NET
- ES.NET = .
- }
- TEST.ANL.GOV = {
- ANL.GOV = .
- }
- PNL.GOV = {
- ANL.GOV = ES.NET
- }
- NERSC.GOV = {
- ANL.GOV = ES.NET
- }
- ES.NET = {
- ANL.GOV = .
- }
-.in -1i
-.fi
-.sp
-The [capath] section of the configuration file used on NERSC.GOV systems
-would look like this:
-.sp
-.nf
-.in +1i
-[capaths]
- NERSC.GOV = {
- ANL.GOV = ES.NET
- TEST.ANL.GOV = ES.NET
- TEST.ANL.GOV = ANL.GOV
- PNL.GOV = ES.NET
- ES.NET = .
- }
- ANL.GOV = {
- NERSC.GOV = ES.NET
- }
- PNL.GOV = {
- NERSC.GOV = ES.NET
- }
- ES.NET = {
- NERSC.GOV = .
- }
- TEST.ANL.GOV = {
- NERSC.GOV = ANL.GOV
- NERSC.GOV = ES.NET
- }
-.in -1i
-.fi
-.sp
-In the above examples, the ordering is not important, except when the
-same subtag name is used more then once. The client will use this to
-determine the path. (It is not important to the server, since the
-transited field is not sorted.)
-.PP
-If this section is not present, or if the client or server cannot find a
-client/server path, then normal hierarchical organization is assumed.
-.PP
-This feature is not currently supported by DCE. DCE security servers can
-be used with Kerberized clients and servers, but versions prior to DCE
-1.1 did not fill in the transited field, and should be used with
-caution.
-
-.SH DATABASE DEFAULT SECTION
-
-The [dbdefaults] section indicates default values for the database specific parameters.
-It can also specify the configuration section under dbmodules for database
-specific parameters used by the loadable database library.
-
-.PP
-The following tags are used in this section:
-.IP database_module
-This relation indicates the name of the configuration section under dbmodules
-for database specific parameters used by the loadable database library.
-
-.IP ldap_kerberos_container_dn
-This LDAP specific tag indicates the DN of the container object where the realm
-objects will be located. This value is used if no object DN is mentioned in the
-configuration section under dbmodules.
-
-.IP ldap_kdc_dn
-This LDAP specific tag indicates the default bind DN for the KDC server.
-The KDC server does a login to the directory as this object. This value is used if
-no object DN is mentioned in the configuration section under dbmodules.
-
-.IP ldap_kadmind_dn
-This LDAP specific tag indicates the default bind DN for the
-Administration server. The Administration server does a login to the directory
-as this object. This value is used if no object DN is mentioned in
-the configuration section under dbmodules.
-
-.IP ldap_service_password_file
-This LDAP specific tag indicates the file containing the stashed passwords for the
-objects used for starting the Kerberos servers. This value is used if no
-service password file is mentioned in the configuration section under dbmodules.
-
-.IP ldap_servers
-This LDAP specific tag indicates the list of LDAP servers. The list of LDAP servers
-is whitespace-separated. The LDAP server is specified by a LDAP URI.
-This value is used if no LDAP servers are mentioned in the configuration
-section under dbmodules.
-
-.IP ldap_conns_per_server
-This LDAP specific tag indicates the number of connections to be maintained per
-LDAP server. This value is used if the number of connections per LDAP server are not
-mentioned in the configuration section under dbmodules. The default value is 5.
-
-.SH DATABASE MODULE SECTION
-Each tag in the [dbmodules] section of the file names a configuration section
-for database specific parameters that can be referred to by a realm.
-The value of the tag is a subsection where the relations in that subsection
-define the database specific parameters.
-
-.PP
-For each section, the following tags may be specified in the subsection:
-
-.IP database_name
-This DB2-specific tag indicates the location of the database in the
-filesystem.
-
-.IP db_library
-This tag indicates the name of the loadable database library.
-The value should be db2 for db2 database and kldap for LDAP database.
-
-.IP disable_last_success
-If set to true, suppresses KDC updates to the "Last successful
-authentication" field of principal entries requiring
-preauthentication. Setting this flag may improve performance.
-(Principal entries which do not require preauthentication never update
-the "Last successful authentication" field.)
-
-.IP disable_lockout
-If set to true, suppresses KDC updates to the "Last failed
-authentication" and "Failed password attempts" fields of principal
-entries requiring preauthentication. Setting this flag may improve
-performance, but also disables account lockout.
-
-.IP ldap_kerberos_container_dn
-This LDAP specific tag indicates the DN of the container object where the realm
-objects will be located.
-
-.IP ldap_kdc_dn
-This LDAP specific tag indicates the bind DN for the KDC server.
-The KDC does a login to the directory as this object.
-
-.IP ldap_kadmind_dn
-This LDAP specific tag indicates the bind DN for the Administration server.
-The Administration server does a login to the directory
-as this object.
-
-.IP ldap_service_password_file
-This LDAP specific tag indicates the file containing the stashed passwords for the
-objects used for starting the Kerberos servers.
-
-.IP ldap_servers
-This LDAP specific tag indicates the list of LDAP servers. The list of LDAP servers
-is whitespace-separated. The LDAP server is specified by a LDAP URI.
-
-.IP ldap_conns_per_server
-This LDAP specific tag indicates the number of connections to be maintained per
-LDAP server.
-
-.SH PLUGINS SECTION
-
-Tags in the [plugins] section can be used to register dynamic plugin
-modules and to turn modules on and off. Not every krb5 pluggable
-interface uses the [plugins] section; the ones that do are documented
-here.
-
-.PP
-Each pluggable interface corresponds to a subsection of [plugins].
-All subsections support the same tags:
-
-.IP module
-This tag may have multiple values. Each value is a string of the form
-"modulename:pathname", which causes the shared object located at
-pathname to be registered as a dynamic module named modulename for the
-pluggable interface. If pathname is not an absolute path, it will be
-treated as relative to the plugin base directory.
-
-.IP enable_only
-This tag may have multiple values. If there are values for this tag,
-then only the named modules will be enabled for the pluggable
-interface.
-
-.IP disable
-This tag may have multiple values. If there are values for this tag,
-then the named modules will be disabled for the pluggable interface.
-
-.PP
-The following subsections are currently supported within the [plugins]
-section:
-
-.SS pwqual interface
-
-The pwqual subsection controls modules for the password quality
-interface, which is used to reject weak passwords when passwords are
-changed. In addition to any registered dynamic modules, the following
-built-in modules exist (and may be disabled with the disable tag):
-
-.IP dict
-Checks against the realm dictionary file
-
-.IP empty
-Rejects empty passwords
-
-.IP hesiod
-Checks against user information stored in Hesiod (only if Kerberos was
-built with Hesiod support)
-
-.IP princ
-Checks against components of the principal name
-
-.SS kadm5_hook interface
-
-The kadm5_hook interface provides plugins with information on
-principal creation, modification, password changes and deletion. This
-interface can be used to write a plugin to synchronize MIT Kerberos
-with another database such as Active Directory. No plugins are built
-in for this interface.
-
-.SS clpreauth and kdcpreauth interfaces
-
-The clpreauth and kdcpreauth interfaces allow plugin modules to
-provide client and KDC preauthentication mechanisms. The following
-built-in modules exist for these interfaces:
-
-.IP pkinit
-This module implements the PKINIT preauthentication mechanism.
-
-.IP encrypted_challenge
-This module implements the encrypted challenge FAST factor.
-
-.IP encrypted_timestamp
-This module implements the encrypted timestamp mechanism.
-
-.SH FILES
-/etc/krb5.conf
-.SH SEE ALSO
-syslog(3)