table of contents
other versions
- wheezy 1:1.0.1-4
| KLOGIND(8) | System Manager's Manual | KLOGIND(8) |
NAME¶
klogind - remote login serverSYNOPSIS¶
klogind [ -rcpPef ] [[ -w[ip|maxhostlen[,[ no]striplocal ]] ] [ -D port ]DESCRIPTION¶
Klogind is the server for the rlogin(1) program. The server is based on rlogind(8) but uses Kerberos authentication. The klogind server is invoked by inetd(8) when it receives a connection on the port indicated in /etc/inetd.conf. A typical /etc/inetd.conf configuration line for klogind might be:- 1)
- Check authentication.
- 2)
- Check authorization via the access-control files .k5login and .klogin in the user's home directory.
- 3)
- Prompt for password if any checks fail and the -p option was supplied.
- -P
- Prompt the user for a password. If the -P option is passed,
then the password is verified in addition to all other checks.
- -e
- Create an encrypted session.
- -c
- Require Kerberos V5 clients to present a cryptographic
checksum of initial connection information like the name of the user that
the client is trying to access in the initial authenticator. This checksum
provides additionl security by preventing an attacker from changing the
initial connection information. If this option is specified, older
Kerberos V5 clients that do not send a checksum in the authenticator will
not be able to authenticate to this server. This option is mutually
exclusive with the -i option.
If neither the -c or -i options are specified,then checksums are validated if presented. Since it is difficult to remove a checksum from an authenticator without making the authenticator invalid, this default mode is almost as significant of a security improvement as -c if new clients are used. It has the additional advantage of backwards compatibility with some clients. Unfortunately, clients before Kerberos V5, Beta5, generate invalid checksums; if these clients are used, the -i option must be used.
- -i
- Ignore authenticator checksums if provided. This option
ignore authenticator checksusm presented by current Kerberos clients to
protect initial connection information; it is the opposite of -c.
This option is provided because some older clients -- particularly clients
predating the release of Kerberos V5 Beta5 (May 1995) -- present bogus
checksums that prevent Kerberos authentication from succeeding in the
default mode.
- -w [ip|maxhostlen[,[no]striplocal]]
- Controls the form of the remote hostname passed to
login(1). Specifying ip results in the numeric IP address always
being passed to login(1). Specifying a number, maxhostlen, sets the
maximum length of the hostname passed to login(1) before it will be passed
as a numeric IP address. If maxhostlen is 0, then the system
default, as determined by the utmp or utmpx structures, is used. The
nostriplocal and striplocal options, which must be preceded
by a comma, control whether or not the local host domain is stripped from
the remote hostname. By default, the equivalent of striplocal is in
effect.
- -S keytab
- Set the keytab file to use.
- -M realm
- Set the Kerberos realm to use.
- -L login
- Set the login program to use. This option only has an
effect if DO_NOT_USE_K_LOGIN was not defined when klogind was
compiled.
- -D port
- Run in standalone mode, listening on port. The
daemon will exit after one connection and will not background itself.
- -f
- Allows for standalone daemon operation. A new child is
started for each incoming connection and waits for it to finish before
accepting the next connection. This automagically figures out which port
to bind to if no port is specified.