diff options
Diffstat (limited to 'src/appl/bsd/klogind.M')
-rw-r--r-- | src/appl/bsd/klogind.M | 174 |
1 files changed, 0 insertions, 174 deletions
diff --git a/src/appl/bsd/klogind.M b/src/appl/bsd/klogind.M deleted file mode 100644 index 574ae67b17..0000000000 --- a/src/appl/bsd/klogind.M +++ /dev/null @@ -1,174 +0,0 @@ -.\" Copyright (c) 1983 Regents of the University of California. -.\" All rights reserved. The Berkeley software License Agreement -.\" specifies the terms and conditions for redistribution. -.\" -.\" @(#)rlogind.8 6.3 (Berkeley) 5/24/86 -.\" -.TH KLOGIND 8 -.SH NAME -klogind \- remote login server -.SH SYNOPSIS -.B klogind -[ -.B \-rcpPef -] -[[ \fB\-w\fP[\fBip\fP|\fImaxhostlen\fP[\fB,\fP[\fBno\fP]\fBstriplocal\fP ]] ] -[ \fB\-D\fP \fIport\fP ] -.SH DESCRIPTION -.I Klogind -is the server for the -.IR rlogin (1) -program. The server is -based on rlogind(8) but uses Kerberos authentication. -.PP -The -.I klogind -server is invoked by \fIinetd(8)\fP when it receives a connection on -the port indicated in /etc/inetd.conf. A typical /etc/inetd.conf -configuration line for \fIklogind\fP might be: - -klogin stream tcp nowait root /usr/cygnus/sbin/klogind klogind -e5c - -When a service request is received, the following protocol is initiated: - -.IP 1) -Check authentication. -.IP 2) -Check authorization via the access-control files \fI.k5login\fP and -\fI.klogin\fP in the user's home directory. -.IP 3) -Prompt for password if any checks fail and the \fI-p\fP option was supplied. -.PP -If the authentication succeeds, login the user by calling the accompanying -login.krb5. -.PP -klogind allows Kerberos V5 authentication with the \fI.k5login\fP -access control file to be trusted. If this authorization check is -passed, then the user is allowed to log in. If the user has no -\fI.k5login\fP file, the login will be authorized if the results of -krb5_aname_to_localname conversion matches the account name. Unless -special rules are configured, this will be true if and only if the -Kerberos principal of the connecting user is in the default local -realm and the principal portion matches the account name. -.PP -The configuration of \fIklogind\fP is done -by command line arguments passed by inetd. The options are: - -.IP \fB\-P\fP -Prompt the user for a password. -If the -P option is passed, then the password is verified in addition -to all other checks. - -.IP \fB\-e\fP -Create an encrypted session. - -.IP \fB\-c\fP -Require Kerberos V5 clients to present a cryptographic checksum of -initial connection information like the name of the user that the -client is trying to access in the initial authenticator. This -checksum provides additionl security by preventing an attacker from -changing the initial connection information. If this option is -specified, older Kerberos V5 clients that do not send a checksum in -the authenticator will not be able to authenticate to this server. -This option is mutually exclusive with the \fB-i\fP option. - - If neither the \fB-c\fP or \fB-i\fP options are specified,then -checksums are validated if presented. Since it is difficult to remove -a checksum from an authenticator without making the authenticator -invalid, this default mode is almost as significant of a security -improvement as \fB-c\fP if new clients are used. It has the additional -advantage of backwards compatability with some clients. -Unfortunately, clients before Kerberos V5, Beta5, generate invalid -checksums; if these clients are used, the \fB-i\fP option must be -used. - -.IP \fB\-i\fP -Ignore authenticator checksums if provided. This option -ignore authenticator checksusm presented by current Kerberos clients -to protect initial connection information; it is the opposite of -\fB-c\fP. This option is provided because some older -clients--particularly clients predating the release of Kerberos V5 -Beta5 (May 1995)--present bogus checksums that prevent Kerberos -authentication from succeeding in the default mode. - -.PP -The parent of the login process manipulates the master side of the -pseduo terminal, operating as an intermediary between the login -process and the client instance of the -.I rlogin(1) -program. In normal operation, the packet protocol described in -.IR pty (4) -is invoked to provide ^S/^Q type facilities and propagate interrupt -signals to the remote programs. The login process propagates the -client terminal's baud rate and terminal type, as found in the -environment variable, ``TERM''; see -.IR environ (7). -The screen or -window size of the terminal is requested from the client, and window -size changes from the client are propagated to the pseudo terminal. - -.PP -.I Klogind -supports the following options to control the form of the hostname -passed to login(1): - -.TP -\fB\-w \fP[\fBip\fP|\fImaxhostlen\fP[\fB,\fP[\fBno\fP]\fBstriplocal\fP]] -Controls the form of the remote hostname passed to login(1). -Specifying \fBip\fP results in the numeric IP address always being -passed to login(1). Specifying a number, \fImaxhostlen\fP, sets the -maximum length of the hostname passed to login(1) before it will be -passed as a numeric IP address. If \fImaxhostlen\fP is 0, then the -system default, as determined by the utmp or utmpx structures, is -used. The \fBnostriplocal\fP and \fBstriplocal\fP options, which must -be preceded by a comma, control whether or not the local host domain -is stripped from the remote hostname. By default, the equivalent of -\fBstriplocal\fP is in effect. - -.PP -.I Klogind -supports five options which are used for testing -purposes: - -.IP \fB\-S\ keytab\fP 10 -Set the \fIkeytab\fP file to use. - -.IP \fB\-M\ realm\fP -Set the Kerberos realm to use. - -.IP \fB\-L\ login\fP -Set the login program to use. This option only has an effect if -DO_NOT_USE_K_LOGIN was not defined when -.I klogind -was compiled. - -.IP \fB\-D\ port\fP -Run in standalone mode, listening on \fBport\fP. The daemon will exit -after one connection and will not background itself. - -.IP \fB\-f\fP -Allows for standalone daemon operation. A new child is started for -each incoming connection and waits for it to finish before accepting -the next connection. This automagically figures out which port to bind -to if no port is specified. - -.SH DIAGNOSTICS -All diagnostic messages are returned on the connection -associated with the -.BR stderr , -after which any network connections are closed. -An error is indicated by a leading byte with a value of 1. -.PP -.B ``Try again.'' -.br -A -.I fork -by the server failed. -.PP -.B ``/bin/sh: ...'' -.br -The user's login shell could not be started. -.SH SEE ALSO -rlogind(8), rlogin(1) -.SH BUGS -A more extensible protocol should be used. |