Blame SOURCES/Modernize-kerberos-7.patch

749169
From 2319336ac1f52e56d2549bd83ff40a3e7b2f281a Mon Sep 17 00:00:00 2001
749169
From: Robbie Harwood <rharwood@redhat.com>
749169
Date: Mon, 15 Oct 2018 13:20:30 -0400
749169
Subject: [PATCH] Modernize kerberos(7)
749169
749169
Update environment variable descriptions, using env_variables.rst as a
749169
guide.  Replace the content in env_variables.rst with a pointer to
749169
documentation at kerberos(7) so that we don't break external links and
749169
don't duplicate content.
749169
749169
Replace references to rlogin.  Clarify and modernize other language.
749169
749169
ticket: 8755
749169
(cherry picked from commit cdccdefa2d74d3abf5a8ae126e423af9d467d34f)
749169
---
749169
 doc/admin/env_variables.rst       |  44 +------------
749169
 doc/user/user_config/kerberos.rst | 106 ++++++++++++++++++------------
749169
 src/man/kerberos.man              | 104 +++++++++++++++++------------
749169
 3 files changed, 128 insertions(+), 126 deletions(-)
749169
749169
diff --git a/doc/admin/env_variables.rst b/doc/admin/env_variables.rst
749169
index 0c146d3e3..a2d15bea8 100644
749169
--- a/doc/admin/env_variables.rst
749169
+++ b/doc/admin/env_variables.rst
749169
@@ -1,46 +1,4 @@
749169
 Environment variables
749169
 =====================
749169
 
749169
-The following environment variables can be used during runtime:
749169
-
749169
-**KRB5_CONFIG**
749169
-    Main Kerberos configuration file.  Multiple filenames can be
749169
-    specified, separated by a colon; all files which are present will
749169
-    be read.  (See :ref:`mitK5defaults` for the default path.)
749169
-
749169
-**KRB5_KDC_PROFILE**
749169
-    KDC configuration file.  (See :ref:`mitK5defaults` for the default
749169
-    name.)
749169
-
749169
-**KRB5_KTNAME**
749169
-    Default keytab file name.  (See :ref:`mitK5defaults` for the
749169
-    default name.)
749169
-
749169
-**KRB5_CLIENT_KTNAME**
749169
-    Default client keytab file name.  (See :ref:`mitK5defaults` for
749169
-    the default name.)
749169
-
749169
-**KRB5CCNAME**
749169
-    Default name for the credentials cache file, in the form *type*\:\
749169
-    *residual*.  The type of the default cache may determine the
749169
-    availability of a cache collection.  For instance, a default cache
749169
-    of type ``DIR`` causes caches within the directory to be present
749169
-    in the global cache collection.
749169
-
749169
-**KRB5RCACHETYPE**
749169
-    Default replay cache type.  Defaults to ``dfl``.  A value of
749169
-    ``none`` disables the replay cache.
749169
-
749169
-**KRB5RCACHEDIR**
749169
-    Default replay cache directory.  (See :ref:`mitK5defaults` for the
749169
-    default location.)
749169
-
749169
-**KPROP_PORT**
749169
-    :ref:`kprop(8)` port to use.  Defaults to 754.
749169
-
749169
-**KRB5_TRACE**
749169
-    Filename for trace-logging output (introduced in release 1.9).
749169
-    For example, ``env KRB5_TRACE=/dev/stdout kinit`` would send
749169
-    tracing information for kinit to ``/dev/stdout``.  Some programs
749169
-    may ignore this variable (particularly setuid or login system
749169
-    programs).
749169
+This content has moved to :ref:`kerberos(7)`.
749169
diff --git a/doc/user/user_config/kerberos.rst b/doc/user/user_config/kerberos.rst
749169
index 6c4453b3b..56412f099 100644
749169
--- a/doc/user/user_config/kerberos.rst
749169
+++ b/doc/user/user_config/kerberos.rst
749169
@@ -8,12 +8,12 @@ DESCRIPTION
749169
 
749169
 The Kerberos system authenticates individual users in a network
749169
 environment.  After authenticating yourself to Kerberos, you can use
749169
-Kerberos-enabled programs without having to present passwords.
749169
+Kerberos-enabled programs without having to present passwords or
749169
+certificates to those programs.
749169
 
749169
-If you enter your username and :ref:`kinit(1)` responds with this
749169
-message:
749169
+If you receive the following response from :ref:`kinit(1)`:
749169
 
749169
-kinit(v5): Client not found in Kerberos database while getting initial
749169
+kinit: Client not found in Kerberos database while getting initial
749169
 credentials
749169
 
749169
 you haven't been registered as a Kerberos user.  See your system
749169
@@ -25,10 +25,13 @@ is the **instance**, which in the case of a user is usually null.
749169
 Some users may have privileged instances, however, such as ``root`` or
749169
 ``admin``.  In the case of a service, the instance is the fully
749169
 qualified name of the machine on which it runs; i.e. there can be an
749169
-rlogin service running on the machine ABC, which is different from the
749169
-rlogin service running on the machine XYZ.  The third part of a
749169
-Kerberos name is the **realm**.  The realm corresponds to the Kerberos
749169
-service providing authentication for the principal.
749169
+ssh service running on the machine ABC (ssh/ABC@REALM), which is
749169
+different from the ssh service running on the machine XYZ
749169
+(ssh/XYZ@REALM).  The third part of a Kerberos name is the **realm**.
749169
+The realm corresponds to the Kerberos service providing authentication
749169
+for the principal.  Realms are conventionally all-uppercase, and often
749169
+match the end of hostnames in the realm (for instance, host01.example.com
749169
+might be in realm EXAMPLE.COM).
749169
 
749169
 When writing a Kerberos name, the principal name is separated from the
749169
 instance (if not null) by a slash, and the realm (if not the local
749169
@@ -43,64 +46,72 @@ of valid Kerberos names::
749169
 When you authenticate yourself with Kerberos you get an initial
749169
 Kerberos **ticket**.  (A Kerberos ticket is an encrypted protocol
749169
 message that provides authentication.)  Kerberos uses this ticket for
749169
-network utilities such as rlogin and rcp.  The ticket transactions are
749169
-done transparently, so you don't have to worry about their management.
749169
+network utilities such as ssh.  The ticket transactions are done
749169
+transparently, so you don't have to worry about their management.
749169
 
749169
-Note, however, that tickets expire.  Privileged tickets, such as those
749169
-with the instance ``root``, expire in a few minutes, while tickets
749169
-that carry more ordinary privileges may be good for several hours or a
749169
-day, depending on the installation's policy.  If your login session
749169
-extends beyond the time limit, you will have to re-authenticate
749169
-yourself to Kerberos to get new tickets.  Use the :ref:`kinit(1)`
749169
-command to re-authenticate yourself.
749169
+Note, however, that tickets expire.  Administrators may configure more
749169
+privileged tickets, such as those with service or instance of ``root``
749169
+or ``admin``, to expire in a few minutes, while tickets that carry
749169
+more ordinary privileges may be good for several hours or a day.  If
749169
+your login session extends beyond the time limit, you will have to
749169
+re-authenticate yourself to Kerberos to get new tickets using the
749169
+:ref:`kinit(1)` command.
749169
 
749169
-If you use the kinit command to get your tickets, make sure you use
749169
-the kdestroy command to destroy your tickets before you end your login
749169
-session.  You should put the kdestroy command in your ``.logout`` file
749169
-so that your tickets will be destroyed automatically when you logout.
749169
-For more information about the kinit and kdestroy commands, see the
749169
-:ref:`kinit(1)` and :ref:`kdestroy(1)` manual pages.
749169
+Some tickets are **renewable** beyond their initial lifetime.  This
749169
+means that ``kinit -R`` can extend their lifetime without requiring
749169
+you to re-authenticate.
749169
+
749169
+If you wish to delete your local tickets, use the :ref:`kdestroy(1)`
749169
+command.
749169
 
749169
 Kerberos tickets can be forwarded.  In order to forward tickets, you
749169
 must request **forwardable** tickets when you kinit.  Once you have
749169
 forwardable tickets, most Kerberos programs have a command line option
749169
-to forward them to the remote host.
749169
+to forward them to the remote host.  This can be useful for, e.g.,
749169
+running kinit on your local machine and then sshing into another to do
749169
+work.  Note that this should not be done on untrusted machines since
749169
+they will then have your tickets.
749169
 
749169
 ENVIRONMENT VARIABLES
749169
 ---------------------
749169
 
749169
 Several environment variables affect the operation of Kerberos-enabled
749169
-programs.  These inclide:
749169
+programs.  These include:
749169
 
749169
 **KRB5CCNAME**
749169
-    Specifies the location of the credential cache, in the form
749169
-    *TYPE*:*residual*.  If no *type* prefix is present, the **FILE**
749169
-    type is assumed and *residual* is the pathname of the cache file.
749169
-    A collection of multiple caches may be used by specifying the
749169
-    **dir** type and the pathname of a private directory (which must
749169
-    already exist).  The default cache file is /tmp/krb5cc_*uid*,
749169
-    where *uid* is the decimal user ID of the user.
749169
+    Default name for the credentials cache file, in the form
749169
+    *TYPE*:*residual*.  The type of the default cache may determine
749169
+    the availability of a cache collection.  ``FILE`` is not a
749169
+    collection type; ``KEYRING``, ``DIR``, and ``KCM`` are.
749169
+
749169
+    If not set, the value of **default_ccache_name** from
749169
+    configuration files (see **KRB5_CONFIG**) will be used.  If that
749169
+    is also not set, the default *type* is ``FILE``, and the
749169
+    *residual* is the path /tmp/krb5cc_*uid*, where *uid* is the
749169
+    decimal user ID of the user.
749169
 
749169
 **KRB5_KTNAME**
749169
-    Specifies the location of the keytab file, in the form
749169
+    Specifies the location of the default keytab file, in the form
749169
     *TYPE*:*residual*.  If no *type* is present, the **FILE** type is
749169
-    assumed and *residual* is the pathname of the keytab file.  The
749169
-    default keytab file is ``/etc/krb5.keytab``.
749169
+    assumed and *residual* is the pathname of the keytab file.  If
749169
+    unset, |keytab| will be used.
749169
 
749169
 **KRB5_CONFIG**
749169
     Specifies the location of the Kerberos configuration file.  The
749169
-    default is ``/etc/krb5.conf``.
749169
+    default is |sysconfdir|\ ``/krb5.conf``.  Multiple filenames can
749169
+    be specified, separated by a colon; all files which are present
749169
+    will be read.
749169
 
749169
 **KRB5_KDC_PROFILE**
749169
     Specifies the location of the KDC configuration file, which
749169
     contains additional configuration directives for the Key
749169
     Distribution Center daemon and associated programs.  The default
749169
-    is ``/usr/local/var/krb5kdc/kdc.conf``.
749169
+    is |kdcdir|\ ``/kdc.conf``.
749169
 
749169
 **KRB5RCACHETYPE**
749169
     Specifies the default type of replay cache to use for servers.
749169
-    Valid types include **dfl** for the normal file type and **none**
749169
-    for no replay cache.
749169
+    Valid types include ``dfl`` for the normal file type and ``none``
749169
+    for no replay cache.  The default is ``dfl``.
749169
 
749169
 **KRB5RCACHEDIR**
749169
     Specifies the default directory for replay caches used by servers.
749169
@@ -110,7 +121,17 @@ programs.  These inclide:
749169
 **KRB5_TRACE**
749169
     Specifies a filename to write trace log output to.  Trace logs can
749169
     help illuminate decisions made internally by the Kerberos
749169
-    libraries.  The default is not to write trace log output anywhere.
749169
+    libraries.  For example, ``env KRB5_TRACE=/dev/stderr kinit``
749169
+    would send tracing information for :ref:`kinit(1)` to
749169
+    ``/dev/stderr``.  The default is not to write trace log output
749169
+    anywhere.
749169
+
749169
+**KRB5_CLIENT_KTNAME**
749169
+    Default client keytab file name.  If unset, |ckeytab| will be
749169
+    used).
749169
+
749169
+**KPROP_PORT**
749169
+    :ref:`kprop(8)` port to use.  Defaults to 754.
749169
 
749169
 Most environment variables are disabled for certain programs, such as
749169
 login system programs and setuid programs, which are designed to be
749169
@@ -133,6 +154,7 @@ AUTHORS
749169
 | Steve Miller, MIT Project Athena/Digital Equipment Corporation
749169
 | Clifford Neuman, MIT Project Athena
749169
 | Greg Hudson, MIT Kerberos Consortium
749169
+| Robbie Harwood, Red Hat, Inc.
749169
 
749169
 HISTORY
749169
 -------
749169
@@ -144,5 +166,5 @@ by the MIT Kerberos Consortium.
749169
 RESTRICTIONS
749169
 ------------
749169
 
749169
-Copyright 1985, 1986, 1989-1996, 2002, 2011 Masachusetts Institute of
749169
-Technology
749169
+Copyright 1985, 1986, 1989-1996, 2002, 2011, 2018 Masachusetts
749169
+Institute of Technology
749169
diff --git a/src/man/kerberos.man b/src/man/kerberos.man
749169
index 7b2b5d932..026f4604a 100644
749169
--- a/src/man/kerberos.man
749169
+++ b/src/man/kerberos.man
749169
@@ -34,12 +34,12 @@ level margin: \\n[rst2man-indent\\n[rst2man-indent-level]]
749169
 .sp
749169
 The Kerberos system authenticates individual users in a network
749169
 environment.  After authenticating yourself to Kerberos, you can use
749169
-Kerberos\-enabled programs without having to present passwords.
749169
+Kerberos\-enabled programs without having to present passwords or
749169
+certificates to those programs.
749169
 .sp
749169
-If you enter your username and kinit(1) responds with this
749169
-message:
749169
+If you receive the following response from kinit(1):
749169
 .sp
749169
-kinit(v5): Client not found in Kerberos database while getting initial
749169
+kinit: Client not found in Kerberos database while getting initial
749169
 credentials
749169
 .sp
749169
 you haven\(aqt been registered as a Kerberos user.  See your system
749169
@@ -51,10 +51,13 @@ is the \fBinstance\fP, which in the case of a user is usually null.
749169
 Some users may have privileged instances, however, such as \fBroot\fP or
749169
 \fBadmin\fP\&.  In the case of a service, the instance is the fully
749169
 qualified name of the machine on which it runs; i.e. there can be an
749169
-rlogin service running on the machine ABC, which is different from the
749169
-rlogin service running on the machine XYZ.  The third part of a
749169
-Kerberos name is the \fBrealm\fP\&.  The realm corresponds to the Kerberos
749169
-service providing authentication for the principal.
749169
+ssh service running on the machine ABC (\fI\%ssh/ABC@REALM\fP), which is
749169
+different from the ssh service running on the machine XYZ
749169
+(\fI\%ssh/XYZ@REALM\fP).  The third part of a Kerberos name is the \fBrealm\fP\&.
749169
+The realm corresponds to the Kerberos service providing authentication
749169
+for the principal.  Realms are conventionally all\-uppercase, and often
749169
+match the end of hostnames in the realm (for instance, host01.example.com
749169
+might be in realm EXAMPLE.COM).
749169
 .sp
749169
 When writing a Kerberos name, the principal name is separated from the
749169
 instance (if not null) by a slash, and the realm (if not the local
749169
@@ -77,63 +80,71 @@ cbrown/root@FUBAR.ORG
749169
 When you authenticate yourself with Kerberos you get an initial
749169
 Kerberos \fBticket\fP\&.  (A Kerberos ticket is an encrypted protocol
749169
 message that provides authentication.)  Kerberos uses this ticket for
749169
-network utilities such as rlogin and rcp.  The ticket transactions are
749169
-done transparently, so you don\(aqt have to worry about their management.
749169
+network utilities such as ssh.  The ticket transactions are done
749169
+transparently, so you don\(aqt have to worry about their management.
749169
 .sp
749169
-Note, however, that tickets expire.  Privileged tickets, such as those
749169
-with the instance \fBroot\fP, expire in a few minutes, while tickets
749169
-that carry more ordinary privileges may be good for several hours or a
749169
-day, depending on the installation\(aqs policy.  If your login session
749169
-extends beyond the time limit, you will have to re\-authenticate
749169
-yourself to Kerberos to get new tickets.  Use the kinit(1)
749169
-command to re\-authenticate yourself.
749169
+Note, however, that tickets expire.  Administrators may configure more
749169
+privileged tickets, such as those with service or instance of \fBroot\fP
749169
+or \fBadmin\fP, to expire in a few minutes, while tickets that carry
749169
+more ordinary privileges may be good for several hours or a day.  If
749169
+your login session extends beyond the time limit, you will have to
749169
+re\-authenticate yourself to Kerberos to get new tickets using the
749169
+kinit(1) command.
749169
 .sp
749169
-If you use the kinit command to get your tickets, make sure you use
749169
-the kdestroy command to destroy your tickets before you end your login
749169
-session.  You should put the kdestroy command in your \fB\&.logout\fP file
749169
-so that your tickets will be destroyed automatically when you logout.
749169
-For more information about the kinit and kdestroy commands, see the
749169
-kinit(1) and kdestroy(1) manual pages.
749169
+Some tickets are \fBrenewable\fP beyond their initial lifetime.  This
749169
+means that \fBkinit \-R\fP can extend their lifetime without requiring
749169
+you to re\-authenticate.
749169
+.sp
749169
+If you wish to delete your local tickets, use the kdestroy(1)
749169
+command.
749169
 .sp
749169
 Kerberos tickets can be forwarded.  In order to forward tickets, you
749169
 must request \fBforwardable\fP tickets when you kinit.  Once you have
749169
 forwardable tickets, most Kerberos programs have a command line option
749169
-to forward them to the remote host.
749169
+to forward them to the remote host.  This can be useful for, e.g.,
749169
+running kinit on your local machine and then sshing into another to do
749169
+work.  Note that this should not be done on untrusted machines since
749169
+they will then have your tickets.
749169
 .SH ENVIRONMENT VARIABLES
749169
 .sp
749169
 Several environment variables affect the operation of Kerberos\-enabled
749169
-programs.  These inclide:
749169
+programs.  These include:
749169
 .INDENT 0.0
749169
 .TP
749169
 \fBKRB5CCNAME\fP
749169
-Specifies the location of the credential cache, in the form
749169
-\fITYPE\fP:\fIresidual\fP\&.  If no \fItype\fP prefix is present, the \fBFILE\fP
749169
-type is assumed and \fIresidual\fP is the pathname of the cache file.
749169
-A collection of multiple caches may be used by specifying the
749169
-\fBdir\fP type and the pathname of a private directory (which must
749169
-already exist).  The default cache file is /tmp/krb5cc_*uid*,
749169
-where \fIuid\fP is the decimal user ID of the user.
749169
+Default name for the credentials cache file, in the form
749169
+\fITYPE\fP:\fIresidual\fP\&.  The type of the default cache may determine
749169
+the availability of a cache collection.  \fBFILE\fP is not a
749169
+collection type; \fBKEYRING\fP, \fBDIR\fP, and \fBKCM\fP are.
749169
+.sp
749169
+If not set, the value of \fBdefault_ccache_name\fP from
749169
+configuration files (see \fBKRB5_CONFIG\fP) will be used.  If that
749169
+is also not set, the default \fItype\fP is \fBFILE\fP, and the
749169
+\fIresidual\fP is the path /tmp/krb5cc_*uid*, where \fIuid\fP is the
749169
+decimal user ID of the user.
749169
 .TP
749169
 \fBKRB5_KTNAME\fP
749169
-Specifies the location of the keytab file, in the form
749169
+Specifies the location of the default keytab file, in the form
749169
 \fITYPE\fP:\fIresidual\fP\&.  If no \fItype\fP is present, the \fBFILE\fP type is
749169
-assumed and \fIresidual\fP is the pathname of the keytab file.  The
749169
-default keytab file is \fB/etc/krb5.keytab\fP\&.
749169
+assumed and \fIresidual\fP is the pathname of the keytab file.  If
749169
+unset, \fB@KTNAME@\fP will be used.
749169
 .TP
749169
 \fBKRB5_CONFIG\fP
749169
 Specifies the location of the Kerberos configuration file.  The
749169
-default is \fB/etc/krb5.conf\fP\&.
749169
+default is \fB@SYSCONFDIR@\fP\fB/krb5.conf\fP\&.  Multiple filenames can
749169
+be specified, separated by a colon; all files which are present
749169
+will be read.
749169
 .TP
749169
 \fBKRB5_KDC_PROFILE\fP
749169
 Specifies the location of the KDC configuration file, which
749169
 contains additional configuration directives for the Key
749169
 Distribution Center daemon and associated programs.  The default
749169
-is \fB/usr/local/var/krb5kdc/kdc.conf\fP\&.
749169
+is \fB@LOCALSTATEDIR@\fP\fB/krb5kdc\fP\fB/kdc.conf\fP\&.
749169
 .TP
749169
 \fBKRB5RCACHETYPE\fP
749169
 Specifies the default type of replay cache to use for servers.
749169
 Valid types include \fBdfl\fP for the normal file type and \fBnone\fP
749169
-for no replay cache.
749169
+for no replay cache.  The default is \fBdfl\fP\&.
749169
 .TP
749169
 \fBKRB5RCACHEDIR\fP
749169
 Specifies the default directory for replay caches used by servers.
749169
@@ -143,7 +154,17 @@ or \fB/var/tmp\fP if \fBTMPDIR\fP is not set.
749169
 \fBKRB5_TRACE\fP
749169
 Specifies a filename to write trace log output to.  Trace logs can
749169
 help illuminate decisions made internally by the Kerberos
749169
-libraries.  The default is not to write trace log output anywhere.
749169
+libraries.  For example, \fBenv KRB5_TRACE=/dev/stderr kinit\fP
749169
+would send tracing information for kinit(1) to
749169
+\fB/dev/stderr\fP\&.  The default is not to write trace log output
749169
+anywhere.
749169
+.TP
749169
+\fBKRB5_CLIENT_KTNAME\fP
749169
+Default client keytab file name.  If unset, \fB@CKTNAME@\fP will be
749169
+used).
749169
+.TP
749169
+\fBKPROP_PORT\fP
749169
+kprop(8) port to use.  Defaults to 754.
749169
 .UNINDENT
749169
 .sp
749169
 Most environment variables are disabled for certain programs, such as
749169
@@ -161,6 +182,7 @@ kadmind(8), kdb5_util(8), krb5kdc(8)
749169
 Steve Miller, MIT Project Athena/Digital Equipment Corporation
749169
 Clifford Neuman, MIT Project Athena
749169
 Greg Hudson, MIT Kerberos Consortium
749169
+Robbie Harwood, Red Hat, Inc.
749169
 .fi
749169
 .sp
749169
 .SH HISTORY
749169
@@ -170,8 +192,8 @@ contributions from many outside parties.  It is currently maintained
749169
 by the MIT Kerberos Consortium.
749169
 .SH RESTRICTIONS
749169
 .sp
749169
-Copyright 1985, 1986, 1989\-1996, 2002, 2011 Masachusetts Institute of
749169
-Technology
749169
+Copyright 1985, 1986, 1989\-1996, 2002, 2011, 2018 Masachusetts
749169
+Institute of Technology
749169
 .SH AUTHOR
749169
 MIT
749169
 .SH COPYRIGHT