Contents of /trunk/netkit-rsh/patches/netkit-rsh-0.17-nokrb.patch
Parent Directory | Revision Log
Revision 153 -
(show annotations)
(download)
Tue May 8 20:52:56 2007 UTC (17 years, 4 months ago) by niro
File size: 5117 byte(s)
Tue May 8 20:52:56 2007 UTC (17 years, 4 months ago) by niro
File size: 5117 byte(s)
-import
1 | diff -uNr netkit-rsh-0.16/rcp/rcp.1 netkit-rsh-0.16/rcp/rcp.1 |
2 | --- netkit-rsh-0.16/rcp/rcp.1 Tue Dec 14 07:52:57 1999 |
3 | +++ netkit-rsh-0.16/rcp/rcp.1 Mon May 29 22:52:34 2000 |
4 | @@ -41,12 +41,10 @@ |
5 | .Sh SYNOPSIS |
6 | .Nm rcp |
7 | .Op Fl px |
8 | -.Op Fl k Ar realm |
9 | .Ar file1 file2 |
10 | .Nm rcp |
11 | .Op Fl px |
12 | .Op Fl r |
13 | -.Op Fl k Ar realm |
14 | .Ar file ... |
15 | .Ar directory |
16 | .Sh DESCRIPTION |
17 | @@ -79,27 +77,6 @@ |
18 | modified by the |
19 | .Xr umask 2 |
20 | on the destination host is used. |
21 | -.It Fl k |
22 | -The |
23 | -.Fl k |
24 | -option requests |
25 | -.Nm rcp |
26 | -to obtain tickets |
27 | -for the remote host in realm |
28 | -.Ar realm |
29 | -instead of the remote host's realm as determined by |
30 | -.Xr krb_realmofhost 3 . |
31 | -.It Fl x |
32 | -The |
33 | -.Fl x |
34 | -option turns on |
35 | -.Tn DES |
36 | -encryption for all data passed by |
37 | -.Nm rcp . |
38 | -This may impact response time and |
39 | -.Tn CPU |
40 | -utilization, but provides |
41 | -increased security. |
42 | .El |
43 | .Pp |
44 | If |
45 | @@ -134,11 +111,6 @@ |
46 | .Nm rcp |
47 | command appeared in |
48 | .Bx 4.2 . |
49 | -The version of |
50 | -.Nm rcp |
51 | -described here |
52 | -has been reimplemented with Kerberos in |
53 | -.Bx 4.3 Reno . |
54 | .Sh BUGS |
55 | Doesn't detect all cases where the target of a copy might |
56 | be a file in cases where only a directory should be legal. |
57 | diff -uNr netkit-rsh-0.16/rlogin/rlogin.1 netkit-rsh-0.16/rlogin/rlogin.1 |
58 | --- netkit-rsh-0.16/rlogin/rlogin.1 Tue Dec 14 07:52:57 1999 |
59 | +++ netkit-rsh-0.16/rlogin/rlogin.1 Mon May 29 22:51:42 2000 |
60 | @@ -42,7 +42,6 @@ |
61 | .Ar rlogin |
62 | .Op Fl 8EKLdx |
63 | .Op Fl e Ar char |
64 | -.Op Fl k Ar realm |
65 | .Op Fl l Ar username |
66 | .Ar host |
67 | .Sh DESCRIPTION |
68 | @@ -50,9 +49,7 @@ |
69 | starts a terminal session on a remote host |
70 | .Ar host . |
71 | .Pp |
72 | -.Nm Rlogin |
73 | -first attempts to use the Kerberos authorization mechanism, described below. |
74 | -If the remote host does not supporting Kerberos the standard Berkeley |
75 | +The standard Berkeley |
76 | .Pa rhosts |
77 | authorization mechanism is used. |
78 | The options are as follows: |
79 | @@ -71,10 +68,6 @@ |
80 | When used with the |
81 | .Fl 8 |
82 | option, this provides a completely transparent connection. |
83 | -.It Fl K |
84 | -The |
85 | -.Fl K |
86 | -option turns off all Kerberos authentication. |
87 | .It Fl L |
88 | The |
89 | .Fl L |
90 | @@ -94,25 +87,6 @@ |
91 | ``~'' by default. |
92 | This specification may be as a literal character, or as an octal |
93 | value in the form \ennn. |
94 | -.It Fl k |
95 | -The |
96 | -.FL k |
97 | -option requests rlogin to obtain tickets for the remote host |
98 | -in realm |
99 | -.Ar realm |
100 | -instead of the remote host's realm as determined by |
101 | -.Xr krb_realmofhost 3 . |
102 | -.It Fl x |
103 | -The |
104 | -.Fl x |
105 | -option turns on |
106 | -.Tn DES |
107 | -encryption for all data passed via the |
108 | -rlogin session. |
109 | -This may impact response time and |
110 | -.Tn CPU |
111 | -utilization, but provides |
112 | -increased security. |
113 | .El |
114 | .Pp |
115 | A line of the form ``<escape char>.'' disconnects from the remote host. |
116 | @@ -129,35 +103,6 @@ |
117 | is transparent. |
118 | Flow control via ^S/^Q and flushing of input and output on interrupts |
119 | are handled properly. |
120 | -.Sh KERBEROS AUTHENTICATION |
121 | -Each user may have a private authorization list in the file |
122 | -.Pa .klogin |
123 | -in their home directory. |
124 | -Each line in this file should contain a Kerberos principal name of the |
125 | -form |
126 | -.Ar principal.instance@realm . |
127 | -If the originating user is authenticated to one of the principals named |
128 | -in |
129 | -.Pa .klogin , |
130 | -access is granted to the account. |
131 | -The principal |
132 | -.Ar accountname.@localrealm |
133 | -is granted access if |
134 | -there is no |
135 | -.Pa .klogin |
136 | -file. |
137 | -Otherwise a login and password will be prompted for on the remote machine |
138 | -as in |
139 | -.Xr login 1 . |
140 | -To avoid certain security problems, the |
141 | -.Pa .klogin |
142 | -file must be owned by |
143 | -the remote user. |
144 | -.Pp |
145 | -If Kerberos authentication fails, a warning message is printed and the |
146 | -standard Berkeley |
147 | -.Nm rlogin |
148 | -is used instead. |
149 | .Sh ENVIRONMENT |
150 | The following environment variable is utilized by |
151 | .Nm rlogin : |
152 | @@ -167,9 +112,6 @@ |
153 | .El |
154 | .Sh SEE ALSO |
155 | .Xr rsh 1 , |
156 | -.Xr kerberos 3 , |
157 | -.Xr krb_sendauth 3 , |
158 | -.Xr krb_realmofhost 3 |
159 | .Sh HISTORY |
160 | The |
161 | .Nm rlogin |
162 | diff -uNr netkit-rsh-0.16/rsh/rsh.1 netkit-rsh-0.16/rsh/rsh.1 |
163 | --- netkit-rsh-0.16/rsh/rsh.1 Tue Dec 14 07:52:58 1999 |
164 | +++ netkit-rsh-0.16/rsh/rsh.1 Mon May 29 22:51:29 2000 |
165 | @@ -41,7 +41,6 @@ |
166 | .Sh SYNOPSIS |
167 | .Nm rsh |
168 | .Op Fl Kdnx |
169 | -.Op Fl k Ar realm |
170 | .Op Fl l Ar username |
171 | .Ar host |
172 | .Op command |
173 | @@ -62,10 +61,6 @@ |
174 | normally terminates when the remote command does. |
175 | The options are as follows: |
176 | .Bl -tag -width flag |
177 | -.It Fl K |
178 | -The |
179 | -.Fl K |
180 | -option turns off all Kerberos authentication. |
181 | .It Fl d |
182 | The |
183 | .Fl d |
184 | @@ -74,23 +69,11 @@ |
185 | on the |
186 | .Tn TCP |
187 | sockets used for communication with the remote host. |
188 | -.It Fl k |
189 | -The |
190 | -.Fl k |
191 | -option causes |
192 | -.Nm rsh |
193 | -to obtain tickets for the remote host in |
194 | -.Ar realm |
195 | -instead of the remote host's realm as determined by |
196 | -.Xr krb_realmofhost 3 . |
197 | .It Fl l |
198 | By default, the remote username is the same as the local username. |
199 | The |
200 | .Fl l |
201 | option allows the remote name to be specified. |
202 | -Kerberos authentication is used, and authorization is determined |
203 | -as in |
204 | -.Xr rlogin 1 . |
205 | .It Fl n |
206 | The |
207 | .Fl n |
208 | @@ -99,13 +82,6 @@ |
209 | (see the |
210 | .Sx BUGS |
211 | section of this manual page). |
212 | -.It Fl x |
213 | -The |
214 | -.Fl x |
215 | -option turns on |
216 | -.Tn DES |
217 | -encryption for all data exchange. |
218 | -This may introduce a significant delay in response time. |
219 | .El |
220 | .Pp |
221 | If no |
222 | @@ -142,9 +118,6 @@ |
223 | .El |
224 | .Sh SEE ALSO |
225 | .Xr rlogin 1 , |
226 | -.Xr kerberos 3 , |
227 | -.Xr krb_sendauth 3 , |
228 | -.Xr krb_realmofhost 3 |
229 | .Sh HISTORY |
230 | The |
231 | .Nm rsh |