remove Ns before comma (from Thomas Klausner)
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@11175 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
@@ -139,7 +139,7 @@ revert to the old behavior.
|
|||||||
.It Fl v
|
.It Fl v
|
||||||
Verbose mode.
|
Verbose mode.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl B Ns ,
|
.Fl B ,
|
||||||
.Fl -builtin-ls
|
.Fl -builtin-ls
|
||||||
.Xc
|
.Xc
|
||||||
use built-in ls to list files
|
use built-in ls to list files
|
||||||
|
@@ -35,7 +35,7 @@ port to listen to
|
|||||||
.It Fl i , -inetd
|
.It Fl i , -inetd
|
||||||
not started from inetd
|
not started from inetd
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl R Ar regpag Ns ,
|
.Fl R Ar regpag ,
|
||||||
.Fl -regpag= Ns Ar regpag
|
.Fl -regpag= Ns Ar regpag
|
||||||
.Xc
|
.Xc
|
||||||
path to regpag binary
|
path to regpag binary
|
||||||
|
@@ -22,7 +22,7 @@ POP3 server
|
|||||||
serves mail via the Post Office Protocol. Supported options include:
|
serves mail via the Post Office Protocol. Supported options include:
|
||||||
.Bl -tag -width Ds
|
.Bl -tag -width Ds
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl a Ar none Ns \*(Ba Ns otp Ns ,
|
.Fl a Ar none Ns \*(Ba Ns otp ,
|
||||||
.Fl -auth-mode= Ns Ar none Ns \*(Ba Ns otp
|
.Fl -auth-mode= Ns Ar none Ns \*(Ba Ns otp
|
||||||
.Xc
|
.Xc
|
||||||
tells
|
tells
|
||||||
@@ -36,37 +36,37 @@ Kerberos authentication.
|
|||||||
.Xc
|
.Xc
|
||||||
logs the addresses of all clients to the specified file
|
logs the addresses of all clients to the specified file
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl d Ns ,
|
.Fl d ,
|
||||||
.Fl -debug
|
.Fl -debug
|
||||||
.Xc
|
.Xc
|
||||||
enables more verbose log messages
|
enables more verbose log messages
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl i Ns ,
|
.Fl i ,
|
||||||
.Fl -interactive
|
.Fl -interactive
|
||||||
.Xc
|
.Xc
|
||||||
when not started by inetd, this flag tells
|
when not started by inetd, this flag tells
|
||||||
.Nm
|
.Nm
|
||||||
that it has to create a socket by itself
|
that it has to create a socket by itself
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl k Ns ,
|
.Fl k ,
|
||||||
.Fl -kerberos
|
.Fl -kerberos
|
||||||
.Xc
|
.Xc
|
||||||
tells
|
tells
|
||||||
.Nm
|
.Nm
|
||||||
to use the Kerberos for authentication.
|
to use the Kerberos for authentication.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl p Ar port Ns ,
|
.Fl p Ar port ,
|
||||||
.Fl -port= Ns Ar port
|
.Fl -port= Ns Ar port
|
||||||
.Xc
|
.Xc
|
||||||
port to listen to, in combination with
|
port to listen to, in combination with
|
||||||
.Fl i
|
.Fl i
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl t Ar file Ns ,
|
.Fl t Ar file ,
|
||||||
.Fl -trace-file= Ns Ar file
|
.Fl -trace-file= Ns Ar file
|
||||||
.Xc
|
.Xc
|
||||||
trace all command to file
|
trace all command to file
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl T Ar seconds Ns ,
|
.Fl T Ar seconds ,
|
||||||
.Fl -timeout= Ns Ar seconds
|
.Fl -timeout= Ns Ar seconds
|
||||||
.Xc
|
.Xc
|
||||||
set timeout to something other than the default of 120 seconds
|
set timeout to something other than the default of 120 seconds
|
||||||
|
@@ -51,22 +51,22 @@ environment variable.
|
|||||||
Supported options:
|
Supported options:
|
||||||
.Bl -tag -width Ds
|
.Bl -tag -width Ds
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl 4 Ns ,
|
.Fl 4 ,
|
||||||
.Fl -krb4
|
.Fl -krb4
|
||||||
.Xc
|
.Xc
|
||||||
use Kerberos 4 (if compiled with support for Kerberos 4)
|
use Kerberos 4 (if compiled with support for Kerberos 4)
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl 5 Ns ,
|
.Fl 5 ,
|
||||||
.Fl -krb5
|
.Fl -krb5
|
||||||
.Xc
|
.Xc
|
||||||
use Kerberos 5 (if compiled with support for Kerberos 5)
|
use Kerberos 5 (if compiled with support for Kerberos 5)
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl f Ns ,
|
.Fl f ,
|
||||||
.Fl -fork
|
.Fl -fork
|
||||||
.Xc
|
.Xc
|
||||||
fork before starting to delete messages
|
fork before starting to delete messages
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl l Ns ,
|
.Fl l ,
|
||||||
.Fl -leave
|
.Fl -leave
|
||||||
.Xc
|
.Xc
|
||||||
don't delete fetched mail
|
don't delete fetched mail
|
||||||
@@ -75,7 +75,7 @@ don't delete fetched mail
|
|||||||
.Xc
|
.Xc
|
||||||
behave like from.
|
behave like from.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl c Ns ,
|
.Fl c ,
|
||||||
.Fl -count
|
.Fl -count
|
||||||
.Xc
|
.Xc
|
||||||
first print how many messages and bytes there are.
|
first print how many messages and bytes there are.
|
||||||
@@ -84,7 +84,7 @@ first print how many messages and bytes there are.
|
|||||||
.Xc
|
.Xc
|
||||||
a list of comma-separated headers that should get printed.
|
a list of comma-separated headers that should get printed.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl p Ar port-spec Ns ,
|
.Fl p Ar port-spec ,
|
||||||
.Fl -port Ns = Ns Ar port-spec
|
.Fl -port Ns = Ns Ar port-spec
|
||||||
.Xc
|
.Xc
|
||||||
use this port instead of the default
|
use this port instead of the default
|
||||||
|
@@ -30,7 +30,7 @@ output and error of the remote command to its own.
|
|||||||
Valid options are:
|
Valid options are:
|
||||||
.Bl -tag -width Ds
|
.Bl -tag -width Ds
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl 4 Ns ,
|
.Fl 4 ,
|
||||||
.Fl -krb4
|
.Fl -krb4
|
||||||
.Xc
|
.Xc
|
||||||
The
|
The
|
||||||
@@ -39,7 +39,7 @@ option requests Kerberos 4 authentication. Normally all supported
|
|||||||
authentication mechanisms will be tried, but in some cases more
|
authentication mechanisms will be tried, but in some cases more
|
||||||
explicit control is desired.
|
explicit control is desired.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl 5 Ns ,
|
.Fl 5 ,
|
||||||
.Fl -krb5
|
.Fl -krb5
|
||||||
.Xc
|
.Xc
|
||||||
The
|
The
|
||||||
@@ -48,7 +48,7 @@ option requests Kerberos 5 authentication. This is analogous to the
|
|||||||
.Fl 4
|
.Fl 4
|
||||||
option.
|
option.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl K Ns ,
|
.Fl K ,
|
||||||
.Fl -broken
|
.Fl -broken
|
||||||
.Xc
|
.Xc
|
||||||
The
|
The
|
||||||
@@ -57,7 +57,7 @@ option turns off all Kerberos authentication. The long name implies
|
|||||||
that this is more or less totally unsecure. The security in this mode
|
that this is more or less totally unsecure. The security in this mode
|
||||||
relies on reserved ports, which is not very secure.
|
relies on reserved ports, which is not very secure.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl n Ns ,
|
.Fl n ,
|
||||||
.Fl -no-input
|
.Fl -no-input
|
||||||
.Xc
|
.Xc
|
||||||
The
|
The
|
||||||
@@ -68,13 +68,13 @@ device (see the
|
|||||||
.Sx BUGS
|
.Sx BUGS
|
||||||
section of this manual page).
|
section of this manual page).
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl e Ns ,
|
.Fl e ,
|
||||||
.Fl -no-stderr
|
.Fl -no-stderr
|
||||||
.Xc
|
.Xc
|
||||||
Don't use a separate socket for the stderr stream. This can be
|
Don't use a separate socket for the stderr stream. This can be
|
||||||
necessary if rsh-ing through a NAT bridge.
|
necessary if rsh-ing through a NAT bridge.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl x Ns ,
|
.Fl x ,
|
||||||
.Fl -encrypt
|
.Fl -encrypt
|
||||||
.Xc
|
.Xc
|
||||||
The
|
The
|
||||||
@@ -94,7 +94,7 @@ Kerberos 5, by setting the
|
|||||||
option in
|
option in
|
||||||
.Xr krb5.conf 5 .
|
.Xr krb5.conf 5 .
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl f Ns ,
|
.Fl f ,
|
||||||
.Fl -forward
|
.Fl -forward
|
||||||
.Xc
|
.Xc
|
||||||
Forward Kerberos 5 credentials to the remote host. Also controlled by
|
Forward Kerberos 5 credentials to the remote host. Also controlled by
|
||||||
@@ -107,7 +107,7 @@ in
|
|||||||
The opposite of
|
The opposite of
|
||||||
.Fl f .
|
.Fl f .
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl F Ns ,
|
.Fl F ,
|
||||||
.Fl -forwardable
|
.Fl -forwardable
|
||||||
.Xc
|
.Xc
|
||||||
Make the forwarded credentials re-forwardable. Also controlled by
|
Make the forwarded credentials re-forwardable. Also controlled by
|
||||||
@@ -115,20 +115,20 @@ Make the forwarded credentials re-forwardable. Also controlled by
|
|||||||
in
|
in
|
||||||
.Xr krb5.conf 5 .
|
.Xr krb5.conf 5 .
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl u Ns ,
|
.Fl u ,
|
||||||
.Fl -unique
|
.Fl -unique
|
||||||
.Xc
|
.Xc
|
||||||
Make sure the remote credentials cache is unique, that is, don't reuse
|
Make sure the remote credentials cache is unique, that is, don't reuse
|
||||||
any existing cache. Mutually exclusive to
|
any existing cache. Mutually exclusive to
|
||||||
.Fl U .
|
.Fl U .
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl U Pa string Ns ,
|
.Fl U Pa string ,
|
||||||
.Fl -tkfile= Ns Pa string
|
.Fl -tkfile= Ns Pa string
|
||||||
.Xc
|
.Xc
|
||||||
Name of the remote credentials cache. Mutually exclusive to
|
Name of the remote credentials cache. Mutually exclusive to
|
||||||
.Fl u .
|
.Fl u .
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl p Ar number-or-service Ns ,
|
.Fl p Ar number-or-service ,
|
||||||
.Fl -port= Ns Ar number-or-service
|
.Fl -port= Ns Ar number-or-service
|
||||||
.Xc
|
.Xc
|
||||||
Connect to this port instead of the default (which is 514 when using
|
Connect to this port instead of the default (which is 514 when using
|
||||||
@@ -137,7 +137,7 @@ Kerberos 4, and 545 for encrytpted Kerberos 4; subject of course to
|
|||||||
the contents of
|
the contents of
|
||||||
.Pa /etc/services ) .
|
.Pa /etc/services ) .
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl l Ar string Ns ,
|
.Fl l Ar string ,
|
||||||
.Fl -user= Ns Ar string
|
.Fl -user= Ns Ar string
|
||||||
.Xc
|
.Xc
|
||||||
By default the remote username is the same as the local. The
|
By default the remote username is the same as the local. The
|
||||||
|
@@ -22,14 +22,14 @@ program. It provides an authenticated remote command execution
|
|||||||
service. Supported options are:
|
service. Supported options are:
|
||||||
.Bl -tag -width Ds
|
.Bl -tag -width Ds
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl n Ns ,
|
.Fl n ,
|
||||||
.Fl -no-keepalive
|
.Fl -no-keepalive
|
||||||
.Xc
|
.Xc
|
||||||
Disables keep-alive messages. Keep-alives are packets sent a certain
|
Disables keep-alive messages. Keep-alives are packets sent a certain
|
||||||
interval to make sure that the client is still there, even when it
|
interval to make sure that the client is still there, even when it
|
||||||
doesn't send any data.
|
doesn't send any data.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl k Ns ,
|
.Fl k ,
|
||||||
.Fl -kerberos
|
.Fl -kerberos
|
||||||
.Xc
|
.Xc
|
||||||
Assume that clients connecting to this server will use some form of
|
Assume that clients connecting to this server will use some form of
|
||||||
@@ -39,21 +39,21 @@ section for a sample
|
|||||||
.Xr inetd.conf 5
|
.Xr inetd.conf 5
|
||||||
configuration.
|
configuration.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl x Ns ,
|
.Fl x ,
|
||||||
.Fl -encrypt
|
.Fl -encrypt
|
||||||
.Xc
|
.Xc
|
||||||
For Kerberos 4 this means that the connections are encrypted. Kerberos
|
For Kerberos 4 this means that the connections are encrypted. Kerberos
|
||||||
5 will negotiate encryption inline. This option implies
|
5 will negotiate encryption inline. This option implies
|
||||||
.Fl k .
|
.Fl k .
|
||||||
.\".It Xo
|
.\".It Xo
|
||||||
.\".Fl l Ns ,
|
.\".Fl l ,
|
||||||
.\".Fl -no-rhosts
|
.\".Fl -no-rhosts
|
||||||
.\".Xc
|
.\".Xc
|
||||||
.\"When using old port-based authentication, the user's
|
.\"When using old port-based authentication, the user's
|
||||||
.\".Pa .rhosts
|
.\".Pa .rhosts
|
||||||
.\"files are normally checked. This options disables this.
|
.\"files are normally checked. This options disables this.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl v Ns ,
|
.Fl v ,
|
||||||
.Fl -vacuous
|
.Fl -vacuous
|
||||||
.Xc
|
.Xc
|
||||||
If the connecting client does not use any Kerberised authentication,
|
If the connecting client does not use any Kerberised authentication,
|
||||||
@@ -71,7 +71,7 @@ call, so all tokens will be put in the default (uid-based) PAG, making
|
|||||||
it possible to share tokens between sessions. This is only useful in
|
it possible to share tokens between sessions. This is only useful in
|
||||||
peculiar environments, such as some batch systems.
|
peculiar environments, such as some batch systems.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl i Ns ,
|
.Fl i ,
|
||||||
.Fl -no-inetd
|
.Fl -no-inetd
|
||||||
.Xc
|
.Xc
|
||||||
The
|
The
|
||||||
@@ -82,7 +82,7 @@ to create a socket, instead of assuming that its stdin came from
|
|||||||
.Xr inetd 8 .
|
.Xr inetd 8 .
|
||||||
This is mostly useful for debugging.
|
This is mostly useful for debugging.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl p Ar port Ns ,
|
.Fl p Ar port ,
|
||||||
.Fl -port= Ns Ar port
|
.Fl -port= Ns Ar port
|
||||||
.Xc
|
.Xc
|
||||||
Port to use with
|
Port to use with
|
||||||
|
@@ -52,42 +52,42 @@ option).
|
|||||||
Supported options:
|
Supported options:
|
||||||
.Bl -tag -width Ds
|
.Bl -tag -width Ds
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl p Ar string Ns ,
|
.Fl p Ar string ,
|
||||||
.Fl -principal= Ns Ar string
|
.Fl -principal= Ns Ar string
|
||||||
.Xc
|
.Xc
|
||||||
principal to authenticate as
|
principal to authenticate as
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl K Ar string Ns ,
|
.Fl K Ar string ,
|
||||||
.Fl -keytab= Ns Ar string
|
.Fl -keytab= Ns Ar string
|
||||||
.Xc
|
.Xc
|
||||||
keytab for authentication pricipal
|
keytab for authentication pricipal
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl c Ar file Ns ,
|
.Fl c Ar file ,
|
||||||
.Fl -config-file= Ns Ar file
|
.Fl -config-file= Ns Ar file
|
||||||
.Xc
|
.Xc
|
||||||
location of config file
|
location of config file
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl k Ar file Ns ,
|
.Fl k Ar file ,
|
||||||
.Fl -key-file= Ns Ar file
|
.Fl -key-file= Ns Ar file
|
||||||
.Xc
|
.Xc
|
||||||
location of master key file
|
location of master key file
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl r Ar realm Ns ,
|
.Fl r Ar realm ,
|
||||||
.Fl -realm= Ns Ar realm
|
.Fl -realm= Ns Ar realm
|
||||||
.Xc
|
.Xc
|
||||||
realm to use
|
realm to use
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl a Ar host Ns ,
|
.Fl a Ar host ,
|
||||||
.Fl -admin-server= Ns Ar host
|
.Fl -admin-server= Ns Ar host
|
||||||
.Xc
|
.Xc
|
||||||
server to contact
|
server to contact
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl s Ar port number Ns ,
|
.Fl s Ar port number ,
|
||||||
.Fl -server-port= Ns Ar port number
|
.Fl -server-port= Ns Ar port number
|
||||||
.Xc
|
.Xc
|
||||||
port to use
|
port to use
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl l Ns ,
|
.Fl l ,
|
||||||
.Fl -local
|
.Fl -local
|
||||||
.Xc
|
.Xc
|
||||||
local admin mode
|
local admin mode
|
||||||
|
@@ -89,12 +89,12 @@ glob-style pattern.
|
|||||||
Supported options:
|
Supported options:
|
||||||
.Bl -tag -width Ds
|
.Bl -tag -width Ds
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl c Ar file Ns ,
|
.Fl c Ar file ,
|
||||||
.Fl -config-file= Ns Ar file
|
.Fl -config-file= Ns Ar file
|
||||||
.Xc
|
.Xc
|
||||||
location of config file
|
location of config file
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl k Ar file Ns ,
|
.Fl k Ar file ,
|
||||||
.Fl -key-file= Ns Ar file
|
.Fl -key-file= Ns Ar file
|
||||||
.Xc
|
.Xc
|
||||||
location of master key file
|
location of master key file
|
||||||
@@ -103,17 +103,17 @@ location of master key file
|
|||||||
.Xc
|
.Xc
|
||||||
what keytab to use
|
what keytab to use
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl r Ar realm Ns ,
|
.Fl r Ar realm ,
|
||||||
.Fl -realm= Ns Ar realm
|
.Fl -realm= Ns Ar realm
|
||||||
.Xc
|
.Xc
|
||||||
realm to use
|
realm to use
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl d Ns ,
|
.Fl d ,
|
||||||
.Fl -debug
|
.Fl -debug
|
||||||
.Xc
|
.Xc
|
||||||
enable debugging
|
enable debugging
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl p Ar port Ns ,
|
.Fl p Ar port ,
|
||||||
.Fl -ports= Ns Ar port
|
.Fl -ports= Ns Ar port
|
||||||
.Xc
|
.Xc
|
||||||
ports to listen to. By default, if run as a daemon, it listen to ports
|
ports to listen to. By default, if run as a daemon, it listen to ports
|
||||||
|
24
kdc/hprop.8
24
kdc/hprop.8
@@ -58,12 +58,12 @@ specified on the command by opening a TCP connection to port 754
|
|||||||
Supported options:
|
Supported options:
|
||||||
.Bl -tag -width Ds
|
.Bl -tag -width Ds
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl m Ar file Ns ,
|
.Fl m Ar file ,
|
||||||
.Fl -master-key= Ns Pa file
|
.Fl -master-key= Ns Pa file
|
||||||
.Xc
|
.Xc
|
||||||
Where to find the master key to encrypt or decrypt keys with.
|
Where to find the master key to encrypt or decrypt keys with.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl d Ar file Ns ,
|
.Fl d Ar file ,
|
||||||
.Fl -database= Ns Pa file
|
.Fl -database= Ns Pa file
|
||||||
.Xc
|
.Xc
|
||||||
The database to be propagated.
|
The database to be propagated.
|
||||||
@@ -85,7 +85,7 @@ a Kerberos 4 dump file
|
|||||||
an AFS kaserver database
|
an AFS kaserver database
|
||||||
.El
|
.El
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl k Ar keytab Ns ,
|
.Fl k Ar keytab ,
|
||||||
.Fl -keytab= Ns Ar keytab
|
.Fl -keytab= Ns Ar keytab
|
||||||
.Xc
|
.Xc
|
||||||
The keytab to use for fetching the key to be used for authenticating
|
The keytab to use for fetching the key to be used for authenticating
|
||||||
@@ -94,24 +94,24 @@ to the propagation daemon(s). The key
|
|||||||
is used from this keytab. The default is to fetch the key from the
|
is used from this keytab. The default is to fetch the key from the
|
||||||
KDC database.
|
KDC database.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl R Ar string Ns ,
|
.Fl R Ar string ,
|
||||||
.Fl -v5-realm= Ns Ar string
|
.Fl -v5-realm= Ns Ar string
|
||||||
.Xc
|
.Xc
|
||||||
Local realm override.
|
Local realm override.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl D Ns ,
|
.Fl D ,
|
||||||
.Fl -decrypt
|
.Fl -decrypt
|
||||||
.Xc
|
.Xc
|
||||||
The encryption keys in the database can either be in clear, or
|
The encryption keys in the database can either be in clear, or
|
||||||
encrypted with a master key. This option transmits the database with
|
encrypted with a master key. This option transmits the database with
|
||||||
unencrypted keys.
|
unencrypted keys.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl E Ns ,
|
.Fl E ,
|
||||||
.Fl -encrypt
|
.Fl -encrypt
|
||||||
.Xc
|
.Xc
|
||||||
This option transmits the database with encrypted keys.
|
This option transmits the database with encrypted keys.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl n Ns ,
|
.Fl n ,
|
||||||
.Fl -stdout
|
.Fl -stdout
|
||||||
.Xc
|
.Xc
|
||||||
Dump the database on stdout, in a format that can be fed to hpropd.
|
Dump the database on stdout, in a format that can be fed to hpropd.
|
||||||
@@ -122,28 +122,28 @@ The following options are only valid if
|
|||||||
is compiled with support for Kerberos 4 (kaserver).
|
is compiled with support for Kerberos 4 (kaserver).
|
||||||
.Bl -tag -width Ds
|
.Bl -tag -width Ds
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl r Ar string Ns ,
|
.Fl r Ar string ,
|
||||||
.Fl -v4-realm= Ns Ar string
|
.Fl -v4-realm= Ns Ar string
|
||||||
.Xc
|
.Xc
|
||||||
v4 realm to use
|
v4 realm to use
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl c Ar cell Ns ,
|
.Fl c Ar cell ,
|
||||||
.Fl -cell= Ns Ar cell
|
.Fl -cell= Ns Ar cell
|
||||||
.Xc
|
.Xc
|
||||||
The AFS cell name, used if reading a kaserver database.
|
The AFS cell name, used if reading a kaserver database.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl S Ns ,
|
.Fl S ,
|
||||||
.Fl -kaspecials
|
.Fl -kaspecials
|
||||||
.Xc
|
.Xc
|
||||||
Also dump the principals marked as special in the kaserver database.
|
Also dump the principals marked as special in the kaserver database.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl 4 Ns ,
|
.Fl 4 ,
|
||||||
.Fl -v4-db
|
.Fl -v4-db
|
||||||
.Xc
|
.Xc
|
||||||
Deprecated, identical to
|
Deprecated, identical to
|
||||||
.Sq --source=krb4-db .
|
.Sq --source=krb4-db .
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl K Ns ,
|
.Fl K ,
|
||||||
.Fl -ka-db
|
.Fl -ka-db
|
||||||
.Xc
|
.Xc
|
||||||
Deprecated, identical to
|
Deprecated, identical to
|
||||||
|
10
kdc/hpropd.8
10
kdc/hpropd.8
@@ -41,12 +41,12 @@ are accepted.
|
|||||||
Options supported:
|
Options supported:
|
||||||
.Bl -tag -width Ds
|
.Bl -tag -width Ds
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl d Ar file Ns ,
|
.Fl d Ar file ,
|
||||||
.Fl -database= Ns Ar file
|
.Fl -database= Ns Ar file
|
||||||
.Xc
|
.Xc
|
||||||
database
|
database
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl n Ns ,
|
.Fl n ,
|
||||||
.Fl -stdin
|
.Fl -stdin
|
||||||
.Xc
|
.Xc
|
||||||
read from stdin
|
read from stdin
|
||||||
@@ -55,17 +55,17 @@ read from stdin
|
|||||||
.Xc
|
.Xc
|
||||||
print dump to stdout
|
print dump to stdout
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl i Ns ,
|
.Fl i ,
|
||||||
.Fl -no-inetd
|
.Fl -no-inetd
|
||||||
.Xc
|
.Xc
|
||||||
Not started from inetd
|
Not started from inetd
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl k Ar keytab Ns ,
|
.Fl k Ar keytab ,
|
||||||
.Fl -keytab= Ns Ar keytab
|
.Fl -keytab= Ns Ar keytab
|
||||||
.Xc
|
.Xc
|
||||||
keytab to use for authentication
|
keytab to use for authentication
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl 4 Ns ,
|
.Fl 4 ,
|
||||||
.Fl -v4dump
|
.Fl -v4dump
|
||||||
.Xc
|
.Xc
|
||||||
create v4 type DB
|
create v4 type DB
|
||||||
|
@@ -57,12 +57,12 @@ flexible way of handling this.
|
|||||||
Gives an upper limit on the size of the requests that the kdc is
|
Gives an upper limit on the size of the requests that the kdc is
|
||||||
willing to handle.
|
willing to handle.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl H Ns ,
|
.Fl H ,
|
||||||
.Fl -enable-http
|
.Fl -enable-http
|
||||||
.Xc
|
.Xc
|
||||||
Makes the kdc listen on port 80 and handle requests encapsulated in HTTP.
|
Makes the kdc listen on port 80 and handle requests encapsulated in HTTP.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl K Ns ,
|
.Fl K ,
|
||||||
.Fl -no-kaserver
|
.Fl -no-kaserver
|
||||||
.Xc
|
.Xc
|
||||||
Disables kaserver emulation (in case it's compiled in).
|
Disables kaserver emulation (in case it's compiled in).
|
||||||
@@ -76,7 +76,7 @@ explicitly specified. The default is whatever is returned by
|
|||||||
This option is only availabe if the KDC has been compiled with version
|
This option is only availabe if the KDC has been compiled with version
|
||||||
4 support.
|
4 support.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl P Ar string Ns ,
|
.Fl P Ar string ,
|
||||||
.Fl -ports= Ns Ar string
|
.Fl -ports= Ns Ar string
|
||||||
.Xc
|
.Xc
|
||||||
Specifies the set of ports the KDC should listen on. It is given as a
|
Specifies the set of ports the KDC should listen on. It is given as a
|
||||||
|
@@ -28,12 +28,12 @@ used by the KDC.
|
|||||||
Supported options:
|
Supported options:
|
||||||
.Bl -tag -width Ds
|
.Bl -tag -width Ds
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl e Ar string Ns ,
|
.Fl e Ar string ,
|
||||||
.Fl -enctype= Ns Ar string
|
.Fl -enctype= Ns Ar string
|
||||||
.Xc
|
.Xc
|
||||||
the encryption type to use, defaults to DES3-CBC-SHA1
|
the encryption type to use, defaults to DES3-CBC-SHA1
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl k Ar file Ns ,
|
.Fl k Ar file ,
|
||||||
.Fl -key-file= Ns Ar file
|
.Fl -key-file= Ns Ar file
|
||||||
.Xc
|
.Xc
|
||||||
the name of the master key file
|
the name of the master key file
|
||||||
|
@@ -35,37 +35,37 @@ This is useful when you want to handle the raw key instead of the password.
|
|||||||
Supported options:
|
Supported options:
|
||||||
.Bl -tag -width Ds
|
.Bl -tag -width Ds
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl 5 Ns ,
|
.Fl 5 ,
|
||||||
.Fl -version5
|
.Fl -version5
|
||||||
.Xc
|
.Xc
|
||||||
Output Kerberos v5 string-to-key
|
Output Kerberos v5 string-to-key
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl 4 Ns ,
|
.Fl 4 ,
|
||||||
.Fl -version4
|
.Fl -version4
|
||||||
.Xc
|
.Xc
|
||||||
Output Kerberos v4 string-to-key
|
Output Kerberos v4 string-to-key
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl a Ns ,
|
.Fl a ,
|
||||||
.Fl -afs
|
.Fl -afs
|
||||||
.Xc
|
.Xc
|
||||||
Output AFS string-to-key
|
Output AFS string-to-key
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl c Ar cell Ns ,
|
.Fl c Ar cell ,
|
||||||
.Fl -cell= Ns Ar cell
|
.Fl -cell= Ns Ar cell
|
||||||
.Xc
|
.Xc
|
||||||
AFS cell to use
|
AFS cell to use
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl w Ar password Ns ,
|
.Fl w Ar password ,
|
||||||
.Fl -password= Ns Ar password
|
.Fl -password= Ns Ar password
|
||||||
.Xc
|
.Xc
|
||||||
Password to use
|
Password to use
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl p Ar principal Ns ,
|
.Fl p Ar principal ,
|
||||||
.Fl -principal= Ns Ar principal
|
.Fl -principal= Ns Ar principal
|
||||||
.Xc
|
.Xc
|
||||||
Kerberos v5 principal to use
|
Kerberos v5 principal to use
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl k Ar string Ns ,
|
.Fl k Ar string ,
|
||||||
.Fl -keytype= Ns Ar string
|
.Fl -keytype= Ns Ar string
|
||||||
.Xc
|
.Xc
|
||||||
Keytype
|
Keytype
|
||||||
|
@@ -56,17 +56,17 @@ is the new password. Note that the password (in
|
|||||||
.Fa password->data )
|
.Fa password->data )
|
||||||
is not zero terminated.
|
is not zero terminated.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl k Ar kspec Ns ,
|
.Fl k Ar kspec ,
|
||||||
.Fl -keytab= Ns Ar kspec
|
.Fl -keytab= Ns Ar kspec
|
||||||
.Xc
|
.Xc
|
||||||
keytab to get authentication key from
|
keytab to get authentication key from
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl r Ar realm Ns ,
|
.Fl r Ar realm ,
|
||||||
.Fl -realm= Ns Ar realm
|
.Fl -realm= Ns Ar realm
|
||||||
.Xc
|
.Xc
|
||||||
default realm
|
default realm
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl p Ar string Ns ,
|
.Fl p Ar string ,
|
||||||
.Fl -port= Ns Ar string
|
.Fl -port= Ns Ar string
|
||||||
.Xc
|
.Xc
|
||||||
port to listen on (default service kpasswd - 464).
|
port to listen on (default service kpasswd - 464).
|
||||||
|
@@ -25,7 +25,7 @@ ticket or of a special type.
|
|||||||
Supported options:
|
Supported options:
|
||||||
.Bl -tag -width Ds
|
.Bl -tag -width Ds
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl e Ar enctype Ns ,
|
.Fl e Ar enctype ,
|
||||||
.Fl -enctype= Ns Ar enctype
|
.Fl -enctype= Ns Ar enctype
|
||||||
.Xc
|
.Xc
|
||||||
encryption type to use
|
encryption type to use
|
||||||
|
@@ -80,12 +80,12 @@ Supported options:
|
|||||||
The credentials cache to put the acquired ticket in, if other than
|
The credentials cache to put the acquired ticket in, if other than
|
||||||
default.
|
default.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl f Ns ,
|
.Fl f ,
|
||||||
.Fl -forwardable
|
.Fl -forwardable
|
||||||
.Xc
|
.Xc
|
||||||
Get ticket that can be forwarded to another host.
|
Get ticket that can be forwarded to another host.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl t Ar keytabname Ns ,
|
.Fl t Ar keytabname ,
|
||||||
.Fl -keytab= Ns Ar keytabname
|
.Fl -keytab= Ns Ar keytabname
|
||||||
.Xc
|
.Xc
|
||||||
Don't ask for a password, but instead get the key from the specified
|
Don't ask for a password, but instead get the key from the specified
|
||||||
@@ -98,12 +98,12 @@ Specifies the lifetime of the ticket. The argument can either be in
|
|||||||
seconds, or a more human readable string like
|
seconds, or a more human readable string like
|
||||||
.Sq 1h .
|
.Sq 1h .
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl p Ns ,
|
.Fl p ,
|
||||||
.Fl -proxiable
|
.Fl -proxiable
|
||||||
.Xc
|
.Xc
|
||||||
Request tickets with the proxiable flag set.
|
Request tickets with the proxiable flag set.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl R Ns ,
|
.Fl R ,
|
||||||
.Fl -renew
|
.Fl -renew
|
||||||
.Xc
|
.Xc
|
||||||
Try to renew ticket. The ticket must have the
|
Try to renew ticket. The ticket must have the
|
||||||
@@ -114,17 +114,17 @@ The same as
|
|||||||
.Fl -renewable-life ,
|
.Fl -renewable-life ,
|
||||||
with an infinite time.
|
with an infinite time.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl r Ar time Ns ,
|
.Fl r Ar time ,
|
||||||
.Fl -renewable-life= Ns Ar time
|
.Fl -renewable-life= Ns Ar time
|
||||||
.Xc
|
.Xc
|
||||||
The max renewable ticket life.
|
The max renewable ticket life.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl S Ar principal Ns ,
|
.Fl S Ar principal ,
|
||||||
.Fl -server= Ns Ar principal
|
.Fl -server= Ns Ar principal
|
||||||
.Xc
|
.Xc
|
||||||
Get a ticket for a service other than krbtgt/LOCAL.REALM.
|
Get a ticket for a service other than krbtgt/LOCAL.REALM.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl s Ar time Ns ,
|
.Fl s Ar time ,
|
||||||
.Fl -start-time= Ns Ar time
|
.Fl -start-time= Ns Ar time
|
||||||
.Xc
|
.Xc
|
||||||
Obtain a ticket that starts to be valid
|
Obtain a ticket that starts to be valid
|
||||||
@@ -133,7 +133,7 @@ Obtain a ticket that starts to be valid
|
|||||||
.Sq 1h )
|
.Sq 1h )
|
||||||
seconds into the future.
|
seconds into the future.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl k Ns ,
|
.Fl k ,
|
||||||
.Fl -use-keytab
|
.Fl -use-keytab
|
||||||
.Xc
|
.Xc
|
||||||
The same as
|
The same as
|
||||||
@@ -141,7 +141,7 @@ The same as
|
|||||||
but with the default keytab name (normally
|
but with the default keytab name (normally
|
||||||
.Ar FILE:/etc/krb5.keytab ) .
|
.Ar FILE:/etc/krb5.keytab ) .
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl v Ns ,
|
.Fl v ,
|
||||||
.Fl -validate
|
.Fl -validate
|
||||||
.Xc
|
.Xc
|
||||||
Try to validate an invalid ticket.
|
Try to validate an invalid ticket.
|
||||||
@@ -183,14 +183,14 @@ The following options are only available if
|
|||||||
has been compiled with support for Kerberos 4.
|
has been compiled with support for Kerberos 4.
|
||||||
.Bl -tag -width Ds
|
.Bl -tag -width Ds
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl 4 Ns ,
|
.Fl 4 ,
|
||||||
.Fl -524init
|
.Fl -524init
|
||||||
.Xc
|
.Xc
|
||||||
Try to convert the obtained Kerberos 5 krbtgt to a version 4
|
Try to convert the obtained Kerberos 5 krbtgt to a version 4
|
||||||
compatible ticket. It will store this ticket in the default Kerberos 4
|
compatible ticket. It will store this ticket in the default Kerberos 4
|
||||||
ticket file.
|
ticket file.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl 9 Ns ,
|
.Fl 9 ,
|
||||||
.Fl -524convert
|
.Fl -524convert
|
||||||
.Xc
|
.Xc
|
||||||
only convert ticket to version 4
|
only convert ticket to version 4
|
||||||
|
@@ -28,29 +28,29 @@ known as the ticket file).
|
|||||||
Options supported:
|
Options supported:
|
||||||
.Bl -tag -width Ds
|
.Bl -tag -width Ds
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl c Ar cache Ns ,
|
.Fl c Ar cache ,
|
||||||
.Fl -cache= Ns Ar cache
|
.Fl -cache= Ns Ar cache
|
||||||
.Xc
|
.Xc
|
||||||
credentials cache to list
|
credentials cache to list
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl s Ns ,
|
.Fl s ,
|
||||||
.Fl t Ns ,
|
.Fl t ,
|
||||||
.Fl -test
|
.Fl -test
|
||||||
.Xc
|
.Xc
|
||||||
Test for there being an active and valid TGT for the local realm of
|
Test for there being an active and valid TGT for the local realm of
|
||||||
the user in the credential cache.
|
the user in the credential cache.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl 4 Ns ,
|
.Fl 4 ,
|
||||||
.Fl -v4
|
.Fl -v4
|
||||||
.Xc
|
.Xc
|
||||||
display v4 tickets
|
display v4 tickets
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl T Ns ,
|
.Fl T ,
|
||||||
.Fl -tokens
|
.Fl -tokens
|
||||||
.Xc
|
.Xc
|
||||||
display AFS tokens
|
display AFS tokens
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl 5 Ns ,
|
.Fl 5 ,
|
||||||
.Fl -v5
|
.Fl -v5
|
||||||
.Xc
|
.Xc
|
||||||
display v5 cred cache (this is the default)
|
display v5 cred cache (this is the default)
|
||||||
@@ -86,7 +86,7 @@ This information is also output with the
|
|||||||
.Fl -verbose
|
.Fl -verbose
|
||||||
option, but in a more verbose way.
|
option, but in a more verbose way.
|
||||||
.It Xo
|
.It Xo
|
||||||
.Fl v Ns ,
|
.Fl v ,
|
||||||
.Fl -verbose
|
.Fl -verbose
|
||||||
.Xc
|
.Xc
|
||||||
Verbose output. Include all possible information:
|
Verbose output. Include all possible information:
|
||||||
|
Reference in New Issue
Block a user