Magellan Linux

Contents of /trunk/netkit-rsh/netkit-rsh-0.17-nokrb.patch

Parent Directory Parent Directory | Revision Log Revision Log


Revision 97 - (show annotations) (download)
Fri Jan 19 23:50:26 2007 UTC (17 years, 3 months ago) by niro
File size: 5117 byte(s)
new files

1 diff -uNr netkit-rsh-0.16/rcp/rcp.1 netkit-rsh-0.16/rcp/rcp.1
2 --- netkit-rsh-0.16/rcp/rcp.1 Tue Dec 14 07:52:57 1999
3 +++ netkit-rsh-0.16/rcp/rcp.1 Mon May 29 22:52:34 2000
4 @@ -41,12 +41,10 @@
5 .Sh SYNOPSIS
6 .Nm rcp
7 .Op Fl px
8 -.Op Fl k Ar realm
9 .Ar file1 file2
10 .Nm rcp
11 .Op Fl px
12 .Op Fl r
13 -.Op Fl k Ar realm
14 .Ar file ...
15 .Ar directory
16 .Sh DESCRIPTION
17 @@ -79,27 +77,6 @@
18 modified by the
19 .Xr umask 2
20 on the destination host is used.
21 -.It Fl k
22 -The
23 -.Fl k
24 -option requests
25 -.Nm rcp
26 -to obtain tickets
27 -for the remote host in realm
28 -.Ar realm
29 -instead of the remote host's realm as determined by
30 -.Xr krb_realmofhost 3 .
31 -.It Fl x
32 -The
33 -.Fl x
34 -option turns on
35 -.Tn DES
36 -encryption for all data passed by
37 -.Nm rcp .
38 -This may impact response time and
39 -.Tn CPU
40 -utilization, but provides
41 -increased security.
42 .El
43 .Pp
44 If
45 @@ -134,11 +111,6 @@
46 .Nm rcp
47 command appeared in
48 .Bx 4.2 .
49 -The version of
50 -.Nm rcp
51 -described here
52 -has been reimplemented with Kerberos in
53 -.Bx 4.3 Reno .
54 .Sh BUGS
55 Doesn't detect all cases where the target of a copy might
56 be a file in cases where only a directory should be legal.
57 diff -uNr netkit-rsh-0.16/rlogin/rlogin.1 netkit-rsh-0.16/rlogin/rlogin.1
58 --- netkit-rsh-0.16/rlogin/rlogin.1 Tue Dec 14 07:52:57 1999
59 +++ netkit-rsh-0.16/rlogin/rlogin.1 Mon May 29 22:51:42 2000
60 @@ -42,7 +42,6 @@
61 .Ar rlogin
62 .Op Fl 8EKLdx
63 .Op Fl e Ar char
64 -.Op Fl k Ar realm
65 .Op Fl l Ar username
66 .Ar host
67 .Sh DESCRIPTION
68 @@ -50,9 +49,7 @@
69 starts a terminal session on a remote host
70 .Ar host .
71 .Pp
72 -.Nm Rlogin
73 -first attempts to use the Kerberos authorization mechanism, described below.
74 -If the remote host does not supporting Kerberos the standard Berkeley
75 +The standard Berkeley
76 .Pa rhosts
77 authorization mechanism is used.
78 The options are as follows:
79 @@ -71,10 +68,6 @@
80 When used with the
81 .Fl 8
82 option, this provides a completely transparent connection.
83 -.It Fl K
84 -The
85 -.Fl K
86 -option turns off all Kerberos authentication.
87 .It Fl L
88 The
89 .Fl L
90 @@ -94,25 +87,6 @@
91 ``~'' by default.
92 This specification may be as a literal character, or as an octal
93 value in the form \ennn.
94 -.It Fl k
95 -The
96 -.FL k
97 -option requests rlogin to obtain tickets for the remote host
98 -in realm
99 -.Ar realm
100 -instead of the remote host's realm as determined by
101 -.Xr krb_realmofhost 3 .
102 -.It Fl x
103 -The
104 -.Fl x
105 -option turns on
106 -.Tn DES
107 -encryption for all data passed via the
108 -rlogin session.
109 -This may impact response time and
110 -.Tn CPU
111 -utilization, but provides
112 -increased security.
113 .El
114 .Pp
115 A line of the form ``<escape char>.'' disconnects from the remote host.
116 @@ -129,35 +103,6 @@
117 is transparent.
118 Flow control via ^S/^Q and flushing of input and output on interrupts
119 are handled properly.
120 -.Sh KERBEROS AUTHENTICATION
121 -Each user may have a private authorization list in the file
122 -.Pa .klogin
123 -in their home directory.
124 -Each line in this file should contain a Kerberos principal name of the
125 -form
126 -.Ar principal.instance@realm .
127 -If the originating user is authenticated to one of the principals named
128 -in
129 -.Pa .klogin ,
130 -access is granted to the account.
131 -The principal
132 -.Ar accountname.@localrealm
133 -is granted access if
134 -there is no
135 -.Pa .klogin
136 -file.
137 -Otherwise a login and password will be prompted for on the remote machine
138 -as in
139 -.Xr login 1 .
140 -To avoid certain security problems, the
141 -.Pa .klogin
142 -file must be owned by
143 -the remote user.
144 -.Pp
145 -If Kerberos authentication fails, a warning message is printed and the
146 -standard Berkeley
147 -.Nm rlogin
148 -is used instead.
149 .Sh ENVIRONMENT
150 The following environment variable is utilized by
151 .Nm rlogin :
152 @@ -167,9 +112,6 @@
153 .El
154 .Sh SEE ALSO
155 .Xr rsh 1 ,
156 -.Xr kerberos 3 ,
157 -.Xr krb_sendauth 3 ,
158 -.Xr krb_realmofhost 3
159 .Sh HISTORY
160 The
161 .Nm rlogin
162 diff -uNr netkit-rsh-0.16/rsh/rsh.1 netkit-rsh-0.16/rsh/rsh.1
163 --- netkit-rsh-0.16/rsh/rsh.1 Tue Dec 14 07:52:58 1999
164 +++ netkit-rsh-0.16/rsh/rsh.1 Mon May 29 22:51:29 2000
165 @@ -41,7 +41,6 @@
166 .Sh SYNOPSIS
167 .Nm rsh
168 .Op Fl Kdnx
169 -.Op Fl k Ar realm
170 .Op Fl l Ar username
171 .Ar host
172 .Op command
173 @@ -62,10 +61,6 @@
174 normally terminates when the remote command does.
175 The options are as follows:
176 .Bl -tag -width flag
177 -.It Fl K
178 -The
179 -.Fl K
180 -option turns off all Kerberos authentication.
181 .It Fl d
182 The
183 .Fl d
184 @@ -74,23 +69,11 @@
185 on the
186 .Tn TCP
187 sockets used for communication with the remote host.
188 -.It Fl k
189 -The
190 -.Fl k
191 -option causes
192 -.Nm rsh
193 -to obtain tickets for the remote host in
194 -.Ar realm
195 -instead of the remote host's realm as determined by
196 -.Xr krb_realmofhost 3 .
197 .It Fl l
198 By default, the remote username is the same as the local username.
199 The
200 .Fl l
201 option allows the remote name to be specified.
202 -Kerberos authentication is used, and authorization is determined
203 -as in
204 -.Xr rlogin 1 .
205 .It Fl n
206 The
207 .Fl n
208 @@ -99,13 +82,6 @@
209 (see the
210 .Sx BUGS
211 section of this manual page).
212 -.It Fl x
213 -The
214 -.Fl x
215 -option turns on
216 -.Tn DES
217 -encryption for all data exchange.
218 -This may introduce a significant delay in response time.
219 .El
220 .Pp
221 If no
222 @@ -142,9 +118,6 @@
223 .El
224 .Sh SEE ALSO
225 .Xr rlogin 1 ,
226 -.Xr kerberos 3 ,
227 -.Xr krb_sendauth 3 ,
228 -.Xr krb_realmofhost 3
229 .Sh HISTORY
230 The
231 .Nm rsh