summaryrefslogtreecommitdiff
path: root/kerberosIV/ksrvutil/ksrvutil.8
diff options
context:
space:
mode:
Diffstat (limited to 'kerberosIV/ksrvutil/ksrvutil.8')
-rw-r--r--kerberosIV/ksrvutil/ksrvutil.8124
1 files changed, 0 insertions, 124 deletions
diff --git a/kerberosIV/ksrvutil/ksrvutil.8 b/kerberosIV/ksrvutil/ksrvutil.8
deleted file mode 100644
index 65227821d84..00000000000
--- a/kerberosIV/ksrvutil/ksrvutil.8
+++ /dev/null
@@ -1,124 +0,0 @@
-.\"
-.\" This source code is no longer held under any constraint of USA
-.\" `cryptographic laws' since it was exported legally. The cryptographic
-.\" functions were removed from the code and a "Bones" distribution was
-.\" made. A Commodity Jurisdiction Request #012-94 was filed with the
-.\" USA State Department, who handed it to the Commerce department. The
-.\" code was determined to fall under General License GTDA under ECCN 5D96G,
-.\" and hence exportable. The cryptographic interfaces were re-added by Eric
-.\" Young, and then KTH proceeded to maintain the code in the free world.
-.\"
-.\"Copyright (C) 1989 by the Massachusetts Institute of Technology
-.\"
-.\"Export of this software from the United States of America is assumed
-.\"to require a specific license from the United States Government.
-.\"It is the responsibility of any person or organization contemplating
-.\"export to obtain such a license before exporting.
-.\"
-.\"WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
-.\"distribute this software and its documentation for any purpose and
-.\"without fee is hereby granted, provided that the above copyright
-.\"notice appear in all copies and that both that copyright notice and
-.\"this permission notice appear in supporting documentation, and that
-.\"the name of M.I.T. not be used in advertising or publicity pertaining
-.\"to distribution of the software without specific, written prior
-.\"permission. M.I.T. makes no representations about the suitability of
-.\"this software for any purpose. It is provided "as is" without express
-.\"or implied warranty.
-.\"
-.\" $OpenBSD: ksrvutil.8,v 1.5 1998/02/25 15:51:51 art Exp $
-.TH KSRVUTIL 8 "Kerberos Version 4.0" "MIT Project Athena"
-.SH NAME
-ksrvutil \- host kerberos keyfile (srvtab) manipulation utility
-.SH SYNOPSIS
-ksrvutil
-.B operation
-[
-.B \-k
-] [
-.B \-i
-] [
-.B \-a
-] [
-.B \-f filename
-]
-.SH DESCRIPTION
-.I ksrvutil
-allows a system manager to list or change keys currently in his
-keyfile or to add new keys to the keyfile.
-.PP
-
-Operation must be one of the following:
-.TP 10n
-.I list
-lists the keys in a keyfile showing version number and principal
-name. If the \-k option is given, keys will also be shown.
-.TP 10n
-.I change
-changes all the keys in the keyfile by using the regular admin
-protocol. If the \-i flag is given,
-.I ksrvutil
-will prompt for yes or no before changing each key. If the \-k
-option is used, the old and new keys will be displayed.
-.TP 10n
-.I add
-allows the user to add a key.
-.I add
-prompts for name, instance, realm, and key version number, asks
-for confirmation, and then asks for a password.
-.I ksrvutil
-then converts the password to a key and appends the keyfile with
-the new information. If the \-k option is used, the key is
-displayed.
-
-.PP
-In all cases, the default file used is KEY_FILE as defined in
-krb.h unless this is overridden by the \-f option.
-
-.PP
-A good use for
-.I ksrvutil
-would be for adding keys to a keyfile. A system manager could
-ask a kerberos administrator to create a new service key with
-.IR kadmin (8)
-and could supply an initial password. Then, he could use
-.I ksrvutil
-to add the key to the keyfile and then to change the key so that
-it will be random and unknown to either the system manager or
-the kerberos administrator.
-
-.PP
-If the \-a option is given,
-.I ksrvutil
-uses the AFS string-to-key function. Use this if you are running
-an AFS kaserver.
-
-.PP
-.I ksrvutil
-always makes a backup copy of the keyfile before making any
-changes.
-
-.SH DIAGNOSTICS
-If
-.I ksrvutil
-should exit on an error condition at any time during a change or
-add, a copy of the
-original keyfile can be found in
-.IR filename .old
-where
-.I filename
-is the name of the keyfile, and a copy of the file with all new
-keys changed or added so far can be found in
-.IR filename .work.
-The original keyfile is left unmodified until the program exits
-at which point it is removed and replaced it with the workfile.
-Appending the workfile to the backup copy and replacing the
-keyfile with the result should always give a usable keyfile,
-although the resulting keyfile will have some out of date keys
-in it.
-
-.SH SEE ALSO
-kadmin(8), ksrvtgt(1)
-
-.SH AUTHOR
-Emanuel Jay Berkenbilt, MIT Project Athena