Magellan Linux

Annotation of /trunk/netkit-rsh/patches/netkit-rsh-0.17-nokrb.patch

Parent Directory Parent Directory | Revision Log Revision Log


Revision 153 - (hide annotations) (download)
Tue May 8 20:52:56 2007 UTC (17 years, 1 month ago) by niro
File size: 5117 byte(s)
-import

1 niro 153 diff -uNr netkit-rsh-0.16/rcp/rcp.1 netkit-rsh-0.16/rcp/rcp.1
2     --- netkit-rsh-0.16/rcp/rcp.1 Tue Dec 14 07:52:57 1999
3     +++ netkit-rsh-0.16/rcp/rcp.1 Mon May 29 22:52:34 2000
4     @@ -41,12 +41,10 @@
5     .Sh SYNOPSIS
6     .Nm rcp
7     .Op Fl px
8     -.Op Fl k Ar realm
9     .Ar file1 file2
10     .Nm rcp
11     .Op Fl px
12     .Op Fl r
13     -.Op Fl k Ar realm
14     .Ar file ...
15     .Ar directory
16     .Sh DESCRIPTION
17     @@ -79,27 +77,6 @@
18     modified by the
19     .Xr umask 2
20     on the destination host is used.
21     -.It Fl k
22     -The
23     -.Fl k
24     -option requests
25     -.Nm rcp
26     -to obtain tickets
27     -for the remote host in realm
28     -.Ar realm
29     -instead of the remote host's realm as determined by
30     -.Xr krb_realmofhost 3 .
31     -.It Fl x
32     -The
33     -.Fl x
34     -option turns on
35     -.Tn DES
36     -encryption for all data passed by
37     -.Nm rcp .
38     -This may impact response time and
39     -.Tn CPU
40     -utilization, but provides
41     -increased security.
42     .El
43     .Pp
44     If
45     @@ -134,11 +111,6 @@
46     .Nm rcp
47     command appeared in
48     .Bx 4.2 .
49     -The version of
50     -.Nm rcp
51     -described here
52     -has been reimplemented with Kerberos in
53     -.Bx 4.3 Reno .
54     .Sh BUGS
55     Doesn't detect all cases where the target of a copy might
56     be a file in cases where only a directory should be legal.
57     diff -uNr netkit-rsh-0.16/rlogin/rlogin.1 netkit-rsh-0.16/rlogin/rlogin.1
58     --- netkit-rsh-0.16/rlogin/rlogin.1 Tue Dec 14 07:52:57 1999
59     +++ netkit-rsh-0.16/rlogin/rlogin.1 Mon May 29 22:51:42 2000
60     @@ -42,7 +42,6 @@
61     .Ar rlogin
62     .Op Fl 8EKLdx
63     .Op Fl e Ar char
64     -.Op Fl k Ar realm
65     .Op Fl l Ar username
66     .Ar host
67     .Sh DESCRIPTION
68     @@ -50,9 +49,7 @@
69     starts a terminal session on a remote host
70     .Ar host .
71     .Pp
72     -.Nm Rlogin
73     -first attempts to use the Kerberos authorization mechanism, described below.
74     -If the remote host does not supporting Kerberos the standard Berkeley
75     +The standard Berkeley
76     .Pa rhosts
77     authorization mechanism is used.
78     The options are as follows:
79     @@ -71,10 +68,6 @@
80     When used with the
81     .Fl 8
82     option, this provides a completely transparent connection.
83     -.It Fl K
84     -The
85     -.Fl K
86     -option turns off all Kerberos authentication.
87     .It Fl L
88     The
89     .Fl L
90     @@ -94,25 +87,6 @@
91     ``~'' by default.
92     This specification may be as a literal character, or as an octal
93     value in the form \ennn.
94     -.It Fl k
95     -The
96     -.FL k
97     -option requests rlogin to obtain tickets for the remote host
98     -in realm
99     -.Ar realm
100     -instead of the remote host's realm as determined by
101     -.Xr krb_realmofhost 3 .
102     -.It Fl x
103     -The
104     -.Fl x
105     -option turns on
106     -.Tn DES
107     -encryption for all data passed via the
108     -rlogin session.
109     -This may impact response time and
110     -.Tn CPU
111     -utilization, but provides
112     -increased security.
113     .El
114     .Pp
115     A line of the form ``<escape char>.'' disconnects from the remote host.
116     @@ -129,35 +103,6 @@
117     is transparent.
118     Flow control via ^S/^Q and flushing of input and output on interrupts
119     are handled properly.
120     -.Sh KERBEROS AUTHENTICATION
121     -Each user may have a private authorization list in the file
122     -.Pa .klogin
123     -in their home directory.
124     -Each line in this file should contain a Kerberos principal name of the
125     -form
126     -.Ar principal.instance@realm .
127     -If the originating user is authenticated to one of the principals named
128     -in
129     -.Pa .klogin ,
130     -access is granted to the account.
131     -The principal
132     -.Ar accountname.@localrealm
133     -is granted access if
134     -there is no
135     -.Pa .klogin
136     -file.
137     -Otherwise a login and password will be prompted for on the remote machine
138     -as in
139     -.Xr login 1 .
140     -To avoid certain security problems, the
141     -.Pa .klogin
142     -file must be owned by
143     -the remote user.
144     -.Pp
145     -If Kerberos authentication fails, a warning message is printed and the
146     -standard Berkeley
147     -.Nm rlogin
148     -is used instead.
149     .Sh ENVIRONMENT
150     The following environment variable is utilized by
151     .Nm rlogin :
152     @@ -167,9 +112,6 @@
153     .El
154     .Sh SEE ALSO
155     .Xr rsh 1 ,
156     -.Xr kerberos 3 ,
157     -.Xr krb_sendauth 3 ,
158     -.Xr krb_realmofhost 3
159     .Sh HISTORY
160     The
161     .Nm rlogin
162     diff -uNr netkit-rsh-0.16/rsh/rsh.1 netkit-rsh-0.16/rsh/rsh.1
163     --- netkit-rsh-0.16/rsh/rsh.1 Tue Dec 14 07:52:58 1999
164     +++ netkit-rsh-0.16/rsh/rsh.1 Mon May 29 22:51:29 2000
165     @@ -41,7 +41,6 @@
166     .Sh SYNOPSIS
167     .Nm rsh
168     .Op Fl Kdnx
169     -.Op Fl k Ar realm
170     .Op Fl l Ar username
171     .Ar host
172     .Op command
173     @@ -62,10 +61,6 @@
174     normally terminates when the remote command does.
175     The options are as follows:
176     .Bl -tag -width flag
177     -.It Fl K
178     -The
179     -.Fl K
180     -option turns off all Kerberos authentication.
181     .It Fl d
182     The
183     .Fl d
184     @@ -74,23 +69,11 @@
185     on the
186     .Tn TCP
187     sockets used for communication with the remote host.
188     -.It Fl k
189     -The
190     -.Fl k
191     -option causes
192     -.Nm rsh
193     -to obtain tickets for the remote host in
194     -.Ar realm
195     -instead of the remote host's realm as determined by
196     -.Xr krb_realmofhost 3 .
197     .It Fl l
198     By default, the remote username is the same as the local username.
199     The
200     .Fl l
201     option allows the remote name to be specified.
202     -Kerberos authentication is used, and authorization is determined
203     -as in
204     -.Xr rlogin 1 .
205     .It Fl n
206     The
207     .Fl n
208     @@ -99,13 +82,6 @@
209     (see the
210     .Sx BUGS
211     section of this manual page).
212     -.It Fl x
213     -The
214     -.Fl x
215     -option turns on
216     -.Tn DES
217     -encryption for all data exchange.
218     -This may introduce a significant delay in response time.
219     .El
220     .Pp
221     If no
222     @@ -142,9 +118,6 @@
223     .El
224     .Sh SEE ALSO
225     .Xr rlogin 1 ,
226     -.Xr kerberos 3 ,
227     -.Xr krb_sendauth 3 ,
228     -.Xr krb_realmofhost 3
229     .Sh HISTORY
230     The
231     .Nm rsh