svn rev #25073: trunk/doc/rst_source/ krb_admins/admin_commands/ krb_users/user_commands/

tsitkova@MIT.EDU tsitkova at MIT.EDU
Fri Aug 5 12:59:52 EDT 2011


http://src.mit.edu/fisheye/changelog/krb5/?cs=25073
Commit By: tsitkova
Log Message:
Added .k5login, k5srvutil, ktutil, kadmind manual documnets to Sphins doc tree



Changed Files:
U   trunk/doc/rst_source/conf.py
U   trunk/doc/rst_source/krb_admins/admin_commands/index.rst
A   trunk/doc/rst_source/krb_admins/admin_commands/k5srvutil.rst
U   trunk/doc/rst_source/krb_admins/admin_commands/kadmin_local.rst
A   trunk/doc/rst_source/krb_admins/admin_commands/kadmind.rst
A   trunk/doc/rst_source/krb_admins/admin_commands/ktutil.rst
U   trunk/doc/rst_source/krb_users/user_commands/index.rst
A   trunk/doc/rst_source/krb_users/user_commands/k5login.rst
Modified: trunk/doc/rst_source/conf.py
===================================================================
--- trunk/doc/rst_source/conf.py	2011-08-05 13:10:33 UTC (rev 25072)
+++ trunk/doc/rst_source/conf.py	2011-08-05 16:59:52 UTC (rev 25073)
@@ -224,6 +224,7 @@
     ('krb_users/user_commands/kpasswd', 'kpasswd', u'change a user\'s Kerberos password', [u'MIT'], 1),
     ('krb_users/user_commands/kvno', 'kvno', u'print key version numbers of Kerberos principals', [u'MIT'], 1),
     ('krb_users/user_commands/ksu', 'ksu', u'Kerberized super-user', [u'MIT'], 1),
+    ('krb_users/user_commands/k5login', '.k5login', u'Kerberos V5 acl file for host access', [u'MIT'], 5),
     ('krb_admins/admin_commands/krb5kdc', 'krb5kdc', u'Kerberos V5 KDC', [u'MIT'], 8),
     ('krb_admins/admin_commands/kadmin_local', 'kadmin.local', u'Kerberos V5 database administration program', [u'MIT'], 8),
     ('krb_admins/admin_commands/kadmin_local', 'kadmin', u'Kerberos V5 database administration program', [u'MIT'], 1),
@@ -231,4 +232,7 @@
     ('krb_admins/admin_commands/kproplog', 'kproplog', u'display the contents of the Kerberos principal update log', [u'MIT'], 8),
     ('krb_admins/admin_commands/kpropd', 'kpropd', u'Kerberos V5 slave KDC update server', [u'MIT'], 8),
     ('krb_admins/admin_commands/kdb5_util', 'kdb5_util', u'Kerberos database maintenance utility', [u'MIT'], 8),
+    ('krb_admins/admin_commands/ktutil', 'ktutil', u'Kerberos keytab file maintenance utility', [u'MIT'], 1),
+    ('krb_admins/admin_commands/k5srvutil', 'k5srvutil', u'host key table (keytab) manipulation utility', [u'MIT'], 1),
+    ('krb_admins/admin_commands/kadmind', 'kadmind', u'KADM5 administration server', [u'MIT'], 8),
 ]

Modified: trunk/doc/rst_source/krb_admins/admin_commands/index.rst
===================================================================
--- trunk/doc/rst_source/krb_admins/admin_commands/index.rst	2011-08-05 13:10:33 UTC (rev 25072)
+++ trunk/doc/rst_source/krb_admins/admin_commands/index.rst	2011-08-05 16:59:52 UTC (rev 25073)
@@ -13,6 +13,9 @@
    kpropd.rst
    kproplog.rst
    kdb5_util.rst
+   ktutil.rst
+   k5srvutil.rst
+   kadmind.rst
 
 ------------
 

Added: trunk/doc/rst_source/krb_admins/admin_commands/k5srvutil.rst
===================================================================
--- trunk/doc/rst_source/krb_admins/admin_commands/k5srvutil.rst	                        (rev 0)
+++ trunk/doc/rst_source/krb_admins/admin_commands/k5srvutil.rst	2011-08-05 16:59:52 UTC (rev 25073)
@@ -0,0 +1,49 @@
+k5srvutil - host key table (keytab) manipulation utility
+=============================================================
+
+SYNOPSIS
+----------
+
+**k5srvutil** *operation* [ **-i** ] [ **-f** *filename* ]
+
+DESCRIPTION
+-------------
+
+*k5srvutil* allows a system manager to list or change keys currently in his keytab or to add new keys to the keytab.
+
+Operation must be one of the following:
+
+       **list**
+                 Lists the keys in a keytab showing version number and principal name.
+
+       **change**
+                 Changes all the keys in the keytab to new randomly-generated keys,
+                 updating the keys in the Kerberos server's database to match by using the kadmin protocol.
+                 If a key's version number doesn't match the version number stored in the Kerberos server's database,
+                 then the operation will fail. The old keys are retained so that existing tickets continue to work.
+                 If the *-i* flag is given, *k5srvutil* will prompt for yes or no before changing each key.
+                 If the *-k* option is used, the old and new keys will be displayed.
+
+       **delold**
+                 Deletes keys that are not the most recent version from the keytab.
+                 This operation should be used some time after a change operation to remove old keys.
+                 If the *-i* flag is used, then the program prompts the user whether the old keys associated
+                 with each principal should be removed.
+
+       **delete**
+                 Deletes particular keys in the keytab, interactively prompting for each key.
+
+
+In all cases, the default file used is /etc/krb5.keytab file unless this is overridden by the **-f** option.
+
+
+*k5srvutil*  uses the kadmin program to edit the keytab in place.
+However, old keys are retained, so they are available in case of failure.
+
+
+SEE ALSO
+-------------
+
+kadmin(8), ktutil(8)
+
+

Modified: trunk/doc/rst_source/krb_admins/admin_commands/kadmin_local.rst
===================================================================
--- trunk/doc/rst_source/krb_admins/admin_commands/kadmin_local.rst	2011-08-05 13:10:33 UTC (rev 25072)
+++ trunk/doc/rst_source/krb_admins/admin_commands/kadmin_local.rst	2011-08-05 16:59:52 UTC (rev 25073)
@@ -685,7 +685,7 @@
 NOTE: The above three files are specific to db2 database.
 
 ====================== =================================================
-kadm5.acl               File containing list of principals and their *kadmin* administrative privileges.  See kadmind(8) for a description.
+kadm5.acl               File containing list of principals and their *kadmin* administrative privileges.  See :ref:`kadmind(8)` for a description.
 kadm5.keytab            *keytab* file for *kadmin/admin* principal.
 kadm5.dict              file containing dictionary of strings explicitly disallowed as passwords.
 ====================== =================================================

Added: trunk/doc/rst_source/krb_admins/admin_commands/kadmind.rst
===================================================================
--- trunk/doc/rst_source/krb_admins/admin_commands/kadmind.rst	                        (rev 0)
+++ trunk/doc/rst_source/krb_admins/admin_commands/kadmind.rst	2011-08-05 16:59:52 UTC (rev 25073)
@@ -0,0 +1,188 @@
+.. _kadmind(8):
+
+kadmind
+==========
+
+SYNOPSIS
+-----------
+       
+**kadmind** [**-x** *db_args*] [**-r** *realm*] [**-m**] [**-nofork**] [**-port** *port-number*] [**-P** *pid_file*]
+
+DESCRIPTION
+-----------
+
+This command starts the KADM5 administration server. If the database is db2, the administration server runs on the master Kerberos server, 
+which stores the KDC prinicpal database and the KADM5 policy database. If the database is LDAP, the administration server and
+the KDC server need not run on the same machine.  *kadmind* accepts remote requests to administer the information in these databases.
+Remote requests are sent, for example, by kadmin(8) and the kpasswd(1) command, both of which are clients of *kadmind*.
+
+*kadmind* requires a number of configuration files to be set up in order for it to work:
+
+:ref:`kdc.conf`  
+            The KDC configuration file contains configuration informatin for the KDC and the KADM5 system.  *kadmind* understands a number
+            of  variable  settings in this file, some of whch are mandatory and some of which are optional.
+            See the CONFIGURATION VALUES section below.
+
+*keytab*    
+            Kadmind requires a keytab containing correct entries for the kadmin/admin and kadmin/changepw principals for every realm that
+            *kadmind* will answer requests for.  The keytab can be created with the kadmin(8) client.
+            The location of the keytab is determined by the *admin_keytab* configuration variable (see CONFIGURATION VALUES).
+
+*ACL* file 
+            *kadmind*'s *ACL* (access control list) tells it which principals are allowed to perform KADM5 administration actions.
+            The  path of  the *ACL* file is specified via the acl_file configuration variable (see CONFIGURATION VALUES).
+            The syntax of the *ACL* file is specified in the *ACL* FILE SYNTAX section below.
+
+After the server begins running, it puts itself in the background and disassociates itself from its controlling terminal.
+
+*kadmind* can be configured for incremental database propagation.  Incremental propagation allows slave KDC servers to receive  principal
+and  policy  updates  incrementally instead of receiving full dumps of the database.  This facility can be enabled in the :ref:`kdc.conf` file
+with the *iprop_enable* option.  See the :ref:`kdc.conf` documentation for other options for tuning incremental propagation parameters.
+Incremental propagation requires the principal "kiprop/MASTER\@REALM" i
+(where MASTER is the master KDC's canonical host name, and REALM the realm name) to be registered in the database.
+
+
+OPTIONS
+-----------
+
+       **-x** *db_args*
+              specifies the database specific arguments.
+
+              Options supported for LDAP database are:
+
+                   **-x** *nconns* =<number_of_connections>
+                          specifies the number of connections to be maintained per LDAP server.
+
+                   **-x** *host* =<ldapuri>
+                          specifies the LDAP server to connect to by a LDAP URI.
+
+                   **-x** *binddn* =<binddn>
+                          specifies the DN of the object used by the administration server to bind to the LDAP server.  This object should have the
+                          read and write rights on the realm container, principal container and the subtree that is referenced by the realm.
+
+                   **-x** *bindpwd* =<bind_password>
+                          specifies the password for the above mentioned binddn. It is recommended not to use this option.
+                          Instead, the password can be stashed using the stashsrvpw command of kdb5_ldap_util.
+
+       **-r** *realm*
+              specifies the default realm that *kadmind* will serve; if it is not specified, the default realm of the host is used.
+              *kadmind* will answer requests for any realm that exists in the local KDC database and for which the appropriate principals are in its keytab.
+
+       **-m**
+              specifies that the master database password should be fetched from the keyboard rather than from a file on disk.
+              Note that the server gets the password prior to putting itself in the background; 
+              in combination with the *-nofork* option, you must place it in the background by hand.
+
+       **-nofork**
+              specifies that the server does not put itself in the background and does not disassociate itself from the terminal.
+              In normal operation, you should always allow the server place itself in the background.
+
+       **-port** *port-number*
+              specifies the port on which the administration server listens for connections.  The default is is controlled by the *kadmind_port*
+              configuration variable (see below).
+
+       **-P** *pid_file*
+              specifies the file to which the PID of *kadmind* process should be written to after it starts up.  This can be used to identify
+              whether *kadmind* is still running and to allow init scripts to stop the correct process.
+
+CONFIGURATION VALUES
+---------------------------
+
+In addition to the relations defined in kdc.conf(5), *kadmind* understands the following relations, 
+all of which should appear in the [realms] section:
+
+       **acl_file**
+              The path of *kadmind*'s *ACL* file.  **Mandatory**.  No default.
+
+       **admin_keytab**
+              The  name  of  the keytab containing entries for the principals kadmin/admin and kadmin/changepw in each realm that *kadmind* will
+              serve.  The default is the value of the KRB5_KTNAME environment variable, if defined.  **Mandatory**.
+
+       **dict_file**
+              The path of *kadmind*'s password dictionary.  A principal with any password policy will not be allowed to select any  password  in
+              the dictionary.  Optional.  No default.
+
+       **kadmind_port**
+              The TCP port on which *kadmind* will listen.  The default is 749.
+
+*ACL* FILE SYNTAX
+-------------------
+
+The *ACL* file controls which principals can or cannot perform which administrative functions.  For operations  that  affect  principals,
+the  *ACL* file also controls which principals can operate on which other principals.  This file can contain comment lines, null lines or
+lines which contain *ACL* entries.  Comment lines start with the sharp sign (#) and continue until the end of the line.  
+Lines containing *ACL* entries have the format of principal whitespace *operation-mask* [whitespace *operation-target*]
+
+Ordering  is important.  The first matching entry is the one which will control access for a particular principal on a particular principal.
+
+       **principal**
+              may specify a partially or fully qualified Kerberos version 5 principal name.  Each component of  the  name  may  be  wildcarded
+              using the asterisk ( * ) character.
+
+       **operation-target**
+              [Optional]  may specify a partially or fully qualified Kerberos version 5 principal name.  Each component of the name may be
+              wildcarded using the asterisk ( \* ) character.
+
+       **operation-mask**
+              Specifies what operations may or may not be peformed by a principal matching a particular entry.  This is a string of one or
+              more of the following list of characters or their upper-case counterparts.  If the character is upper-case, then the operation
+              is disallowed.  If the character is lower-case, then the operation is permitted.
+
+              ::
+
+                  a    [Dis]allows the addition of principals or policies in the database.
+                  d    [Dis]allows the deletion of principals or policies in the database.
+                  m    [Dis]allows the modification of principals or policies in the database.
+                  c    [Dis]allows the changing of passwords for principals in the database.
+                  i    [Dis]allows inquiries to the database.
+                  l    [Dis]allows the listing of principals or policies in the database.
+                  p    [Dis]allows the propagation of the principal database.
+                  x    Short for admcil.
+                  *    Same as x.
+       
+Some examples of valid entries here are:
+
+*user/instance at realm adm*
+              A standard fully qualified name.  The *operation-mask* only applies to this principal and specifies that [s]he may add, delete  or
+              modify principals and policies, but not change anybody else's password.
+
+*user/instance at realm cim service/instance at realm*
+              A  standard fully qualified name and a standard fully qualified target.  The *operation-mask* only applies to this principal oper‐
+              ating on this target and specifies that [s]he may change the target's password, request information about the target and  modify
+              it.
+
+*user/\*@realm ac*
+              A  wildcarded name.  The *operation-mask* applies to all principals in realm "realm" whose first component is "user" and specifies
+              that [s]he may add principals and change anybody's password.
+
+*user/\*@realm i \*/instance at realm*
+              A wildcarded name and target.  The *operation-mask* applies to all principals in realm "realm" whose first component is "user" and
+              specifies that [s]he may perform inquiries on principals whose second component is "instance" and realm is "realm".
+
+FILES
+-----------
+
+=================== ===================================================================
+principal.db        default name for Kerberos principal database
+
+<dbname>.kadm5      KADM5  administrative database.  (This would be "principal.kadm5", if you use the default database name.)  Contains policy information.
+
+<dbname>.kadm5.lock lock file for the KADM5 administrative database.  This file works backwards from most other lock files.  I.e., kadmin will exit with an error if this file does not exist.
+=================== ===================================================================
+
+Note: The above three files are specific to db2 database.
+
+=================== ===================================================================
+kadm5.acl           file containing list of principals and their kadmin administrative privileges.  See above for a description.
+
+kadm5.keytab        keytab file for *kadmin/admin* principal.
+
+kadm5.dict          file containing dictionary of strings explicitly disallowed as passwords.
+=================== ===================================================================
+
+SEE ALSO
+-----------
+
+kpasswd(1), kadmin(8), kdb5_util(8), kadm5_export(8), kadm5_import(8), kdb5_ldap_util(8)
+
+

Added: trunk/doc/rst_source/krb_admins/admin_commands/ktutil.rst
===================================================================
--- trunk/doc/rst_source/krb_admins/admin_commands/ktutil.rst	                        (rev 0)
+++ trunk/doc/rst_source/krb_admins/admin_commands/ktutil.rst	2011-08-05 16:59:52 UTC (rev 25073)
@@ -0,0 +1,72 @@
+ktutil
+=============
+
+
+SYNOPSIS
+-------------
+
+**ktutil**
+
+DESCRIPTION
+-------------
+
+The *ktutil* command invokes a subshell from which an administrator can read, write, or edit entries in a Kerberos V5 keytab or V4 srvtab file.
+
+COMMANDS
+-------------
+
+       **list**   
+              Displays the current keylist.
+
+              Alias: **l**
+
+       **read_kt** *keytab*
+              Read the Kerberos V5 keytab file *keytab* into the current keylist.
+
+              Alias: **rkt**
+
+       **read_st** *srvtab*
+              Read the Kerberos V4 srvtab file *srvtab* into the current keylist.
+
+              Alias: **rst**
+
+       **write_kt** *keytab*
+              Write the current keylist into the Kerberos V5 keytab file *keytab*.
+
+              Alias: **wkt**
+
+       **write_st** *srvtab*
+              Write the current keylist into the Kerberos V4 srvtab file *srvtab*.
+
+              Alias: **wst**
+
+       **clear_list**
+              Clear the current keylist.
+
+              Alias: **clear**
+
+       **delete_entry** *slot*
+              Delete the entry in slot number *slot* from the current keylist.
+
+              Alias: *delent*
+
+       **add_entry** (**-key | -password)** **-p** *principal* **-k** *kvno* **-e** *enctype*
+              Add *principal* to keylist using key or password.
+
+              Alias: **addent**
+
+       **list_requests**
+              Displays a listing of available commands.
+
+              Aliases: **lr**, **?**
+
+       **quit**
+              Quits ktutil.
+
+              Aliases: **exit**, **q**
+
+SEE ALSO
+-------------
+
+       kadmin(8), kdb5_util(8)
+

Modified: trunk/doc/rst_source/krb_users/user_commands/index.rst
===================================================================
--- trunk/doc/rst_source/krb_users/user_commands/index.rst	2011-08-05 13:10:33 UTC (rev 25072)
+++ trunk/doc/rst_source/krb_users/user_commands/index.rst	2011-08-05 16:59:52 UTC (rev 25073)
@@ -13,7 +13,9 @@
    kpasswd.rst
    kvno.rst
    ksu.rst
+   k5login.rst
    ../../krb_admins/admin_commands/kadmin_local.rst
+   ../../krb_admins/admin_commands/k5srvutil.rst
 
 
 ------------------

Added: trunk/doc/rst_source/krb_users/user_commands/k5login.rst
===================================================================
--- trunk/doc/rst_source/krb_users/user_commands/k5login.rst	                        (rev 0)
+++ trunk/doc/rst_source/krb_users/user_commands/k5login.rst	2011-08-05 16:59:52 UTC (rev 25073)
@@ -0,0 +1,37 @@
+.k5login - Kerberos V5 acl file for host access
+===================================================
+
+DESCRIPTION
+--------------
+
+The *.k5login* file, which resides in a user's home directory, contains a list of the Kerberos principals.
+Anyone with valid tickets for a principal in the file is allowed host access with the UID of the user in whose home directory the file resides.  
+One common use is to place a *.k5login* file in root's home directory, thereby granting system administrators remote root access to the host via Kerberos.
+
+EXAMPLES
+-----------
+
+Suppose the user "alice" had a *.k5login* file in her home directory containing the following line:
+
+                 bob\@FUBAR.ORG
+
+This  would  allow  "bob"  to use any of the Kerberos network applications, such as telnet(1), rlogin(1), rsh(1), and rcp(1), 
+to access alice's account, using bob's Kerberos tickets.
+
+Let us further suppose that "alice" is a system administrator.  
+Alice and the other system administrators would have  their  principals in root's *.k5login* file on each host:
+
+                 alice\@BLEEP.COM
+
+                 joeadmin/root\@BLEEP.COM
+
+This  would  allow either system administrator to log in to these hosts using their Kerberos tickets instead of having to type the root password.  
+Note that because "bob" retains the Kerberos tickets for his own principal, "bob\@FUBAR.ORG", 
+he would not have  any  of  the privileges that require alice's tickets, such as root access to any of the site's hosts, 
+or the ability to change alice's password.
+
+SEE ALSO
+-----------
+
+telnet(1), rlogin(1), rsh(1), rcp(1), ksu(1), telnetd(8), klogind(8)
+




More information about the cvs-krb5 mailing list