remove Ns before comma (from Thomas Klausner)
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@11175 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
@@ -139,7 +139,7 @@ revert to the old behavior.
|
||||
.It Fl v
|
||||
Verbose mode.
|
||||
.It Xo
|
||||
.Fl B Ns ,
|
||||
.Fl B ,
|
||||
.Fl -builtin-ls
|
||||
.Xc
|
||||
use built-in ls to list files
|
||||
|
@@ -35,7 +35,7 @@ port to listen to
|
||||
.It Fl i , -inetd
|
||||
not started from inetd
|
||||
.It Xo
|
||||
.Fl R Ar regpag Ns ,
|
||||
.Fl R Ar regpag ,
|
||||
.Fl -regpag= Ns Ar regpag
|
||||
.Xc
|
||||
path to regpag binary
|
||||
|
@@ -22,7 +22,7 @@ POP3 server
|
||||
serves mail via the Post Office Protocol. Supported options include:
|
||||
.Bl -tag -width Ds
|
||||
.It Xo
|
||||
.Fl a Ar none Ns \*(Ba Ns otp Ns ,
|
||||
.Fl a Ar none Ns \*(Ba Ns otp ,
|
||||
.Fl -auth-mode= Ns Ar none Ns \*(Ba Ns otp
|
||||
.Xc
|
||||
tells
|
||||
@@ -36,37 +36,37 @@ Kerberos authentication.
|
||||
.Xc
|
||||
logs the addresses of all clients to the specified file
|
||||
.It Xo
|
||||
.Fl d Ns ,
|
||||
.Fl d ,
|
||||
.Fl -debug
|
||||
.Xc
|
||||
enables more verbose log messages
|
||||
.It Xo
|
||||
.Fl i Ns ,
|
||||
.Fl i ,
|
||||
.Fl -interactive
|
||||
.Xc
|
||||
when not started by inetd, this flag tells
|
||||
.Nm
|
||||
that it has to create a socket by itself
|
||||
.It Xo
|
||||
.Fl k Ns ,
|
||||
.Fl k ,
|
||||
.Fl -kerberos
|
||||
.Xc
|
||||
tells
|
||||
.Nm
|
||||
to use the Kerberos for authentication.
|
||||
.It Xo
|
||||
.Fl p Ar port Ns ,
|
||||
.Fl p Ar port ,
|
||||
.Fl -port= Ns Ar port
|
||||
.Xc
|
||||
port to listen to, in combination with
|
||||
.Fl i
|
||||
.It Xo
|
||||
.Fl t Ar file Ns ,
|
||||
.Fl t Ar file ,
|
||||
.Fl -trace-file= Ns Ar file
|
||||
.Xc
|
||||
trace all command to file
|
||||
.It Xo
|
||||
.Fl T Ar seconds Ns ,
|
||||
.Fl T Ar seconds ,
|
||||
.Fl -timeout= Ns Ar seconds
|
||||
.Xc
|
||||
set timeout to something other than the default of 120 seconds
|
||||
|
@@ -51,22 +51,22 @@ environment variable.
|
||||
Supported options:
|
||||
.Bl -tag -width Ds
|
||||
.It Xo
|
||||
.Fl 4 Ns ,
|
||||
.Fl 4 ,
|
||||
.Fl -krb4
|
||||
.Xc
|
||||
use Kerberos 4 (if compiled with support for Kerberos 4)
|
||||
.It Xo
|
||||
.Fl 5 Ns ,
|
||||
.Fl 5 ,
|
||||
.Fl -krb5
|
||||
.Xc
|
||||
use Kerberos 5 (if compiled with support for Kerberos 5)
|
||||
.It Xo
|
||||
.Fl f Ns ,
|
||||
.Fl f ,
|
||||
.Fl -fork
|
||||
.Xc
|
||||
fork before starting to delete messages
|
||||
.It Xo
|
||||
.Fl l Ns ,
|
||||
.Fl l ,
|
||||
.Fl -leave
|
||||
.Xc
|
||||
don't delete fetched mail
|
||||
@@ -75,7 +75,7 @@ don't delete fetched mail
|
||||
.Xc
|
||||
behave like from.
|
||||
.It Xo
|
||||
.Fl c Ns ,
|
||||
.Fl c ,
|
||||
.Fl -count
|
||||
.Xc
|
||||
first print how many messages and bytes there are.
|
||||
@@ -84,7 +84,7 @@ first print how many messages and bytes there are.
|
||||
.Xc
|
||||
a list of comma-separated headers that should get printed.
|
||||
.It Xo
|
||||
.Fl p Ar port-spec Ns ,
|
||||
.Fl p Ar port-spec ,
|
||||
.Fl -port Ns = Ns Ar port-spec
|
||||
.Xc
|
||||
use this port instead of the default
|
||||
|
@@ -30,7 +30,7 @@ output and error of the remote command to its own.
|
||||
Valid options are:
|
||||
.Bl -tag -width Ds
|
||||
.It Xo
|
||||
.Fl 4 Ns ,
|
||||
.Fl 4 ,
|
||||
.Fl -krb4
|
||||
.Xc
|
||||
The
|
||||
@@ -39,7 +39,7 @@ option requests Kerberos 4 authentication. Normally all supported
|
||||
authentication mechanisms will be tried, but in some cases more
|
||||
explicit control is desired.
|
||||
.It Xo
|
||||
.Fl 5 Ns ,
|
||||
.Fl 5 ,
|
||||
.Fl -krb5
|
||||
.Xc
|
||||
The
|
||||
@@ -48,7 +48,7 @@ option requests Kerberos 5 authentication. This is analogous to the
|
||||
.Fl 4
|
||||
option.
|
||||
.It Xo
|
||||
.Fl K Ns ,
|
||||
.Fl K ,
|
||||
.Fl -broken
|
||||
.Xc
|
||||
The
|
||||
@@ -57,7 +57,7 @@ option turns off all Kerberos authentication. The long name implies
|
||||
that this is more or less totally unsecure. The security in this mode
|
||||
relies on reserved ports, which is not very secure.
|
||||
.It Xo
|
||||
.Fl n Ns ,
|
||||
.Fl n ,
|
||||
.Fl -no-input
|
||||
.Xc
|
||||
The
|
||||
@@ -68,13 +68,13 @@ device (see the
|
||||
.Sx BUGS
|
||||
section of this manual page).
|
||||
.It Xo
|
||||
.Fl e Ns ,
|
||||
.Fl e ,
|
||||
.Fl -no-stderr
|
||||
.Xc
|
||||
Don't use a separate socket for the stderr stream. This can be
|
||||
necessary if rsh-ing through a NAT bridge.
|
||||
.It Xo
|
||||
.Fl x Ns ,
|
||||
.Fl x ,
|
||||
.Fl -encrypt
|
||||
.Xc
|
||||
The
|
||||
@@ -94,7 +94,7 @@ Kerberos 5, by setting the
|
||||
option in
|
||||
.Xr krb5.conf 5 .
|
||||
.It Xo
|
||||
.Fl f Ns ,
|
||||
.Fl f ,
|
||||
.Fl -forward
|
||||
.Xc
|
||||
Forward Kerberos 5 credentials to the remote host. Also controlled by
|
||||
@@ -107,7 +107,7 @@ in
|
||||
The opposite of
|
||||
.Fl f .
|
||||
.It Xo
|
||||
.Fl F Ns ,
|
||||
.Fl F ,
|
||||
.Fl -forwardable
|
||||
.Xc
|
||||
Make the forwarded credentials re-forwardable. Also controlled by
|
||||
@@ -115,20 +115,20 @@ Make the forwarded credentials re-forwardable. Also controlled by
|
||||
in
|
||||
.Xr krb5.conf 5 .
|
||||
.It Xo
|
||||
.Fl u Ns ,
|
||||
.Fl u ,
|
||||
.Fl -unique
|
||||
.Xc
|
||||
Make sure the remote credentials cache is unique, that is, don't reuse
|
||||
any existing cache. Mutually exclusive to
|
||||
.Fl U .
|
||||
.It Xo
|
||||
.Fl U Pa string Ns ,
|
||||
.Fl U Pa string ,
|
||||
.Fl -tkfile= Ns Pa string
|
||||
.Xc
|
||||
Name of the remote credentials cache. Mutually exclusive to
|
||||
.Fl u .
|
||||
.It Xo
|
||||
.Fl p Ar number-or-service Ns ,
|
||||
.Fl p Ar number-or-service ,
|
||||
.Fl -port= Ns Ar number-or-service
|
||||
.Xc
|
||||
Connect to this port instead of the default (which is 514 when using
|
||||
@@ -137,7 +137,7 @@ Kerberos 4, and 545 for encrytpted Kerberos 4; subject of course to
|
||||
the contents of
|
||||
.Pa /etc/services ) .
|
||||
.It Xo
|
||||
.Fl l Ar string Ns ,
|
||||
.Fl l Ar string ,
|
||||
.Fl -user= Ns Ar string
|
||||
.Xc
|
||||
By default the remote username is the same as the local. The
|
||||
|
@@ -22,14 +22,14 @@ program. It provides an authenticated remote command execution
|
||||
service. Supported options are:
|
||||
.Bl -tag -width Ds
|
||||
.It Xo
|
||||
.Fl n Ns ,
|
||||
.Fl n ,
|
||||
.Fl -no-keepalive
|
||||
.Xc
|
||||
Disables keep-alive messages. Keep-alives are packets sent a certain
|
||||
interval to make sure that the client is still there, even when it
|
||||
doesn't send any data.
|
||||
.It Xo
|
||||
.Fl k Ns ,
|
||||
.Fl k ,
|
||||
.Fl -kerberos
|
||||
.Xc
|
||||
Assume that clients connecting to this server will use some form of
|
||||
@@ -39,21 +39,21 @@ section for a sample
|
||||
.Xr inetd.conf 5
|
||||
configuration.
|
||||
.It Xo
|
||||
.Fl x Ns ,
|
||||
.Fl x ,
|
||||
.Fl -encrypt
|
||||
.Xc
|
||||
For Kerberos 4 this means that the connections are encrypted. Kerberos
|
||||
5 will negotiate encryption inline. This option implies
|
||||
.Fl k .
|
||||
.\".It Xo
|
||||
.\".Fl l Ns ,
|
||||
.\".Fl l ,
|
||||
.\".Fl -no-rhosts
|
||||
.\".Xc
|
||||
.\"When using old port-based authentication, the user's
|
||||
.\".Pa .rhosts
|
||||
.\"files are normally checked. This options disables this.
|
||||
.It Xo
|
||||
.Fl v Ns ,
|
||||
.Fl v ,
|
||||
.Fl -vacuous
|
||||
.Xc
|
||||
If the connecting client does not use any Kerberised authentication,
|
||||
@@ -71,7 +71,7 @@ call, so all tokens will be put in the default (uid-based) PAG, making
|
||||
it possible to share tokens between sessions. This is only useful in
|
||||
peculiar environments, such as some batch systems.
|
||||
.It Xo
|
||||
.Fl i Ns ,
|
||||
.Fl i ,
|
||||
.Fl -no-inetd
|
||||
.Xc
|
||||
The
|
||||
@@ -82,7 +82,7 @@ to create a socket, instead of assuming that its stdin came from
|
||||
.Xr inetd 8 .
|
||||
This is mostly useful for debugging.
|
||||
.It Xo
|
||||
.Fl p Ar port Ns ,
|
||||
.Fl p Ar port ,
|
||||
.Fl -port= Ns Ar port
|
||||
.Xc
|
||||
Port to use with
|
||||
|
Reference in New Issue
Block a user