File: gssapi.cat3

package info (click to toggle)
heimdal 0.7.2.dfsg.1-10
  • links: PTS
  • area: main
  • in suites: etch, etch-m68k
  • size: 15,440 kB
  • ctags: 10,698
  • sloc: ansic: 141,900; sh: 11,358; yacc: 2,351; makefile: 2,015; perl: 851; lex: 597; awk: 35
file content (116 lines) | stat: -rw-r--r-- 4,770 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116

GSSAPI(3)                  UNIX Programmer's Manual                  GSSAPI(3)

NNAAMMEE
     ggssssaappii - Generic Security Service Application Program Interface library

LLIIBBRRAARRYY
     GSS-API Library (libgssapi, -lgssapi)

DDEESSCCRRIIPPTTIIOONN
     The Generic Security Service Application Program Interface (GSS-API) pro-
     vides security services to callers in a generic fashion, supportable with
     a range of underlying mechanisms and technologies and hence allowing
     source-level portability of applications to different environments.

     The GSS-API implementation in Heimdal implements the Kerberos 5 and the
     SPNEGO GSS-API security mechanisms.

LLIISSTT OOFF FFUUNNCCTTIIOONNSS
     These functions constitute the gssapi library, _l_i_b_g_s_s_a_p_i. Declarations
     for these functions may be obtained from the include file _g_s_s_a_p_i_._h.


     _N_a_m_e_/_P_a_g_e                   _D_e_s_c_r_i_p_t_i_o_n
     gss_accept_sec_context.3
     gss_acquire_cred.3
     gss_add_cred.3
     gss_add_oid_set_member.3
     gss_canonicalize_name.3
     gss_compare_name.3
     gss_context_time.3
     gss_create_empty_oid_set.3
     gss_delete_sec_context.3
     gss_display_name.3
     gss_display_status.3
     gss_duplicate_name.3
     gss_export_name.3
     gss_export_sec_context.3
     gss_get_mic.3
     gss_import_name.3
     gss_import_sec_context.3
     gss_indicate_mechs.3
     gss_init_sec_context.3
     gss_inquire_context.3
     gss_inquire_cred.3
     gss_inquire_cred_by_mech.3
     gss_inquire_mechs_for_name.3
     gss_inquire_names_for_mech.3
     gss_krb5_ccache_name.3
     gss_krb5_copy_ccache.3
     gss_krb5_compat_des3_mic.3
     gss_krb5_extract_authz_data_from_sec_context.3
     gss_process_context_token.3
     gss_release_buffer.3
     gss_release_cred.3
     gss_release_name.3
     gss_release_oid_set.3
     gss_seal.3
     gss_sign.3
     gss_test_oid_set_member.3
     gss_unseal.3
     gss_unwrap.3
     gss_verify.3
     gss_verify_mic.3
     gss_wrap.3
     gss_wrap_size_limit.3

CCOOMMPPAATTIIBBIILLIITTYY
     The HHeeiimmddaall GSS-API implementation had a bug in releases before 0.6 that
     made it fail to inter-operate when using DES3 with other GSS-API imple-
     mentations when using ggssss__ggeett__mmiicc() / ggssss__vveerriiffyy__mmiicc().  It is possible
     to modify the behavior of the generator of the MIC with the _k_r_b_5_._c_o_n_f
     configuration file so that old clients/servers will still work.

     New clients/servers will try both the old and new MIC in Heimdal 0.6.  In
     0.7 it will check only if configured - the compatibility code will be re-
     moved in 0.8.

     Heimdal 0.6 still generates by default the broken GSS-API DES3 mic, this
     will change in 0.7 to generate correct des3 mic.

     To turn on compatibility with older clients and servers, change the
     [[ggssssaappii]] _b_r_o_k_e_n___d_e_s_3___m_i_c in _k_r_b_5_._c_o_n_f that contains a list of globbing
     expressions that will be matched against the server name.  To turn off
     generation of the old (incompatible) mic of the MIC use [[ggssssaappii]]
     _c_o_r_r_e_c_t___d_e_s_3___m_i_c.

     If a match for a entry is in both [[ggssssaappii]] _c_o_r_r_e_c_t___d_e_s_3___m_i_c and [[ggssssaappii]]
     _b_r_o_k_e_n___d_e_s_3___m_i_c, the later will override.

     This config option modifies behaviour for both clients and servers.

     Microsoft implemented SPNEGO to Windows2000, however, they manage to get
     it wrong, their implementation didn't fill in the MechListMIC in the re-
     ply token with the right content.  There is a work around for this prob-
     lem, but not all implementation support it.

     Heimdal defaults to correct SPNEGO when the the kerberos implementation
     uses CFX, or when its configured by the user.  To turn on compatibility
     with peers, use option [[ggssssaappii]] _r_e_q_u_i_r_e___m_e_c_h_l_i_s_t___m_i_c.

EEXXAAMMPPLLEESS
           [gssapi]
                   broken_des3_mic = cvs/*@SU.SE
                   broken_des3_mic = host/*@E.KTH.SE
                   correct_des3_mic = host/*@SU.SE
                   require_mechlist_mic = host/*@SU.SE

BBUUGGSS
     All of 0.5.x versions of hheeiimmddaall had broken token delegations in the
     client side, the server side was correct.

SSEEEE AALLSSOO
     krb5(3),  krb5.conf(5),  kerberos(8)

BSD Experimental                April 20, 2005                               2