summaryrefslogtreecommitdiff
path: root/libexec
diff options
context:
space:
mode:
Diffstat (limited to 'libexec')
-rw-r--r--libexec/rlogind/rlogind.813
-rw-r--r--libexec/rshd/rshd.818
2 files changed, 20 insertions, 11 deletions
diff --git a/libexec/rlogind/rlogind.8 b/libexec/rlogind/rlogind.8
index dcd8c5da0ff..0a7c023d2bd 100644
--- a/libexec/rlogind/rlogind.8
+++ b/libexec/rlogind/rlogind.8
@@ -1,4 +1,4 @@
-.\" $OpenBSD: rlogind.8,v 1.7 2001/01/28 19:34:31 niklas Exp $
+.\" $OpenBSD: rlogind.8,v 1.8 2001/06/23 22:14:31 hin Exp $
.\" Copyright (c) 1983, 1989, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
.\"
@@ -40,7 +40,7 @@
.Nd remote login server
.Sh SYNOPSIS
.Nm rlogind
-.Op Fl aln
+.Op Fl alnk
.Sh DESCRIPTION
.Nm
is the server for the
@@ -54,6 +54,8 @@ The options are as follows:
.It Fl a
Ask hostname for verification.
This flag is ignored; this feature is always enabled.
+.It Fl k
+Use Kerberos authentication
.It Fl l
Prevent any authentication based on the user's
.Pa .rhosts
@@ -163,8 +165,9 @@ command appeared in
.Sh BUGS
The authentication procedure used here assumes the integrity
of each client machine and the connecting medium.
-This is insecure, but is useful in an ``open'' environment.
-.Pp
-A facility to allow all data exchanges to be encrypted should be present.
.Pp
A more extensible protocol should be used.
+.Pp
+.Nm
+does currently not support encryption of the datastream when Kerberos
+authentication is used.
diff --git a/libexec/rshd/rshd.8 b/libexec/rshd/rshd.8
index 51c4d1ad404..f1856612326 100644
--- a/libexec/rshd/rshd.8
+++ b/libexec/rshd/rshd.8
@@ -1,4 +1,4 @@
-.\" $OpenBSD: rshd.8,v 1.10 2001/01/28 19:34:32 niklas Exp $
+.\" $OpenBSD: rshd.8,v 1.11 2001/06/23 22:14:29 hin Exp $
.\" Copyright (c) 1983, 1989, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
.\"
@@ -40,7 +40,7 @@
.Nd remote shell server
.Sh SYNOPSIS
.Nm rshd
-.Op Fl alnL
+.Op Fl aklnL
.Sh DESCRIPTION
The
.Nm
@@ -56,6 +56,8 @@ The options are as follows:
.Bl -tag -width Ds
.It Fl a
Ask hostname for verification.
+.It Fl k
+Use Kerberos authentication
.It Fl l
Prevent any authentication based on the user's
.Dq Pa .rhosts
@@ -216,11 +218,15 @@ and is not preceded by a flag byte.
.Sh BUGS
The authentication procedure used here assumes the integrity
of each client machine and the connecting medium.
-This is insecure, but is useful in an
-.Dq open
-environment.
+This is insecure, so
+.Xr ssh 1
+or
+.Xr kerberos 1
+should be used instead.
.Pp
-A facility to allow all data exchanges to be encrypted should be present.
+.Nm
+does currently not support encryption of the datastream when Kerberos
+authentication is used.
.Pp
A more extensible protocol (such as
.Xr ssh 1 )