Annotation of /trunk/netkit-rsh/patches/netkit-rsh-0.17-nokrb.patch
Parent Directory | Revision Log
Revision 153 -
(hide annotations)
(download)
Tue May 8 20:52:56 2007 UTC (17 years, 4 months ago) by niro
File size: 5117 byte(s)
Tue May 8 20:52:56 2007 UTC (17 years, 4 months ago) by niro
File size: 5117 byte(s)
-import
1 | niro | 153 | diff -uNr netkit-rsh-0.16/rcp/rcp.1 netkit-rsh-0.16/rcp/rcp.1 |
2 | --- netkit-rsh-0.16/rcp/rcp.1 Tue Dec 14 07:52:57 1999 | ||
3 | +++ netkit-rsh-0.16/rcp/rcp.1 Mon May 29 22:52:34 2000 | ||
4 | @@ -41,12 +41,10 @@ | ||
5 | .Sh SYNOPSIS | ||
6 | .Nm rcp | ||
7 | .Op Fl px | ||
8 | -.Op Fl k Ar realm | ||
9 | .Ar file1 file2 | ||
10 | .Nm rcp | ||
11 | .Op Fl px | ||
12 | .Op Fl r | ||
13 | -.Op Fl k Ar realm | ||
14 | .Ar file ... | ||
15 | .Ar directory | ||
16 | .Sh DESCRIPTION | ||
17 | @@ -79,27 +77,6 @@ | ||
18 | modified by the | ||
19 | .Xr umask 2 | ||
20 | on the destination host is used. | ||
21 | -.It Fl k | ||
22 | -The | ||
23 | -.Fl k | ||
24 | -option requests | ||
25 | -.Nm rcp | ||
26 | -to obtain tickets | ||
27 | -for the remote host in realm | ||
28 | -.Ar realm | ||
29 | -instead of the remote host's realm as determined by | ||
30 | -.Xr krb_realmofhost 3 . | ||
31 | -.It Fl x | ||
32 | -The | ||
33 | -.Fl x | ||
34 | -option turns on | ||
35 | -.Tn DES | ||
36 | -encryption for all data passed by | ||
37 | -.Nm rcp . | ||
38 | -This may impact response time and | ||
39 | -.Tn CPU | ||
40 | -utilization, but provides | ||
41 | -increased security. | ||
42 | .El | ||
43 | .Pp | ||
44 | If | ||
45 | @@ -134,11 +111,6 @@ | ||
46 | .Nm rcp | ||
47 | command appeared in | ||
48 | .Bx 4.2 . | ||
49 | -The version of | ||
50 | -.Nm rcp | ||
51 | -described here | ||
52 | -has been reimplemented with Kerberos in | ||
53 | -.Bx 4.3 Reno . | ||
54 | .Sh BUGS | ||
55 | Doesn't detect all cases where the target of a copy might | ||
56 | be a file in cases where only a directory should be legal. | ||
57 | diff -uNr netkit-rsh-0.16/rlogin/rlogin.1 netkit-rsh-0.16/rlogin/rlogin.1 | ||
58 | --- netkit-rsh-0.16/rlogin/rlogin.1 Tue Dec 14 07:52:57 1999 | ||
59 | +++ netkit-rsh-0.16/rlogin/rlogin.1 Mon May 29 22:51:42 2000 | ||
60 | @@ -42,7 +42,6 @@ | ||
61 | .Ar rlogin | ||
62 | .Op Fl 8EKLdx | ||
63 | .Op Fl e Ar char | ||
64 | -.Op Fl k Ar realm | ||
65 | .Op Fl l Ar username | ||
66 | .Ar host | ||
67 | .Sh DESCRIPTION | ||
68 | @@ -50,9 +49,7 @@ | ||
69 | starts a terminal session on a remote host | ||
70 | .Ar host . | ||
71 | .Pp | ||
72 | -.Nm Rlogin | ||
73 | -first attempts to use the Kerberos authorization mechanism, described below. | ||
74 | -If the remote host does not supporting Kerberos the standard Berkeley | ||
75 | +The standard Berkeley | ||
76 | .Pa rhosts | ||
77 | authorization mechanism is used. | ||
78 | The options are as follows: | ||
79 | @@ -71,10 +68,6 @@ | ||
80 | When used with the | ||
81 | .Fl 8 | ||
82 | option, this provides a completely transparent connection. | ||
83 | -.It Fl K | ||
84 | -The | ||
85 | -.Fl K | ||
86 | -option turns off all Kerberos authentication. | ||
87 | .It Fl L | ||
88 | The | ||
89 | .Fl L | ||
90 | @@ -94,25 +87,6 @@ | ||
91 | ``~'' by default. | ||
92 | This specification may be as a literal character, or as an octal | ||
93 | value in the form \ennn. | ||
94 | -.It Fl k | ||
95 | -The | ||
96 | -.FL k | ||
97 | -option requests rlogin to obtain tickets for the remote host | ||
98 | -in realm | ||
99 | -.Ar realm | ||
100 | -instead of the remote host's realm as determined by | ||
101 | -.Xr krb_realmofhost 3 . | ||
102 | -.It Fl x | ||
103 | -The | ||
104 | -.Fl x | ||
105 | -option turns on | ||
106 | -.Tn DES | ||
107 | -encryption for all data passed via the | ||
108 | -rlogin session. | ||
109 | -This may impact response time and | ||
110 | -.Tn CPU | ||
111 | -utilization, but provides | ||
112 | -increased security. | ||
113 | .El | ||
114 | .Pp | ||
115 | A line of the form ``<escape char>.'' disconnects from the remote host. | ||
116 | @@ -129,35 +103,6 @@ | ||
117 | is transparent. | ||
118 | Flow control via ^S/^Q and flushing of input and output on interrupts | ||
119 | are handled properly. | ||
120 | -.Sh KERBEROS AUTHENTICATION | ||
121 | -Each user may have a private authorization list in the file | ||
122 | -.Pa .klogin | ||
123 | -in their home directory. | ||
124 | -Each line in this file should contain a Kerberos principal name of the | ||
125 | -form | ||
126 | -.Ar principal.instance@realm . | ||
127 | -If the originating user is authenticated to one of the principals named | ||
128 | -in | ||
129 | -.Pa .klogin , | ||
130 | -access is granted to the account. | ||
131 | -The principal | ||
132 | -.Ar accountname.@localrealm | ||
133 | -is granted access if | ||
134 | -there is no | ||
135 | -.Pa .klogin | ||
136 | -file. | ||
137 | -Otherwise a login and password will be prompted for on the remote machine | ||
138 | -as in | ||
139 | -.Xr login 1 . | ||
140 | -To avoid certain security problems, the | ||
141 | -.Pa .klogin | ||
142 | -file must be owned by | ||
143 | -the remote user. | ||
144 | -.Pp | ||
145 | -If Kerberos authentication fails, a warning message is printed and the | ||
146 | -standard Berkeley | ||
147 | -.Nm rlogin | ||
148 | -is used instead. | ||
149 | .Sh ENVIRONMENT | ||
150 | The following environment variable is utilized by | ||
151 | .Nm rlogin : | ||
152 | @@ -167,9 +112,6 @@ | ||
153 | .El | ||
154 | .Sh SEE ALSO | ||
155 | .Xr rsh 1 , | ||
156 | -.Xr kerberos 3 , | ||
157 | -.Xr krb_sendauth 3 , | ||
158 | -.Xr krb_realmofhost 3 | ||
159 | .Sh HISTORY | ||
160 | The | ||
161 | .Nm rlogin | ||
162 | diff -uNr netkit-rsh-0.16/rsh/rsh.1 netkit-rsh-0.16/rsh/rsh.1 | ||
163 | --- netkit-rsh-0.16/rsh/rsh.1 Tue Dec 14 07:52:58 1999 | ||
164 | +++ netkit-rsh-0.16/rsh/rsh.1 Mon May 29 22:51:29 2000 | ||
165 | @@ -41,7 +41,6 @@ | ||
166 | .Sh SYNOPSIS | ||
167 | .Nm rsh | ||
168 | .Op Fl Kdnx | ||
169 | -.Op Fl k Ar realm | ||
170 | .Op Fl l Ar username | ||
171 | .Ar host | ||
172 | .Op command | ||
173 | @@ -62,10 +61,6 @@ | ||
174 | normally terminates when the remote command does. | ||
175 | The options are as follows: | ||
176 | .Bl -tag -width flag | ||
177 | -.It Fl K | ||
178 | -The | ||
179 | -.Fl K | ||
180 | -option turns off all Kerberos authentication. | ||
181 | .It Fl d | ||
182 | The | ||
183 | .Fl d | ||
184 | @@ -74,23 +69,11 @@ | ||
185 | on the | ||
186 | .Tn TCP | ||
187 | sockets used for communication with the remote host. | ||
188 | -.It Fl k | ||
189 | -The | ||
190 | -.Fl k | ||
191 | -option causes | ||
192 | -.Nm rsh | ||
193 | -to obtain tickets for the remote host in | ||
194 | -.Ar realm | ||
195 | -instead of the remote host's realm as determined by | ||
196 | -.Xr krb_realmofhost 3 . | ||
197 | .It Fl l | ||
198 | By default, the remote username is the same as the local username. | ||
199 | The | ||
200 | .Fl l | ||
201 | option allows the remote name to be specified. | ||
202 | -Kerberos authentication is used, and authorization is determined | ||
203 | -as in | ||
204 | -.Xr rlogin 1 . | ||
205 | .It Fl n | ||
206 | The | ||
207 | .Fl n | ||
208 | @@ -99,13 +82,6 @@ | ||
209 | (see the | ||
210 | .Sx BUGS | ||
211 | section of this manual page). | ||
212 | -.It Fl x | ||
213 | -The | ||
214 | -.Fl x | ||
215 | -option turns on | ||
216 | -.Tn DES | ||
217 | -encryption for all data exchange. | ||
218 | -This may introduce a significant delay in response time. | ||
219 | .El | ||
220 | .Pp | ||
221 | If no | ||
222 | @@ -142,9 +118,6 @@ | ||
223 | .El | ||
224 | .Sh SEE ALSO | ||
225 | .Xr rlogin 1 , | ||
226 | -.Xr kerberos 3 , | ||
227 | -.Xr krb_sendauth 3 , | ||
228 | -.Xr krb_realmofhost 3 | ||
229 | .Sh HISTORY | ||
230 | The | ||
231 | .Nm rsh |