Import Upstream version 1.8.5
[hcoop/debian/openafs.git] / doc / man-pages / pod8 / kaserver.pod
CommitLineData
805e021f
CE
1=head1 NAME
2
3kaserver - Initializes the Authentication Server
4
5=head1 SYNOPSIS
6
7=for html
8<div class="synopsis">
9
10B<kaserver> [B<-noAuth>] [B<-database> <I<dbpath>>]
11 S<<< [B<-auditlog> <I<log path>>] >>>
12 S<<< [B<-audit-interface> (file | sysvmq)] >>>
13 S<<< [B<-localfiles> <I<lclpath>>] >>> S<<< [B<-minhours> <I<n>>] >>>
14 S<<< [B<-servers> <I<serverlist>>] >>> [B<-enable_peer_stats>]
15 [B<-enable_process_stats>] [B<-rxbind>] [B<-crossrealm>] [B<-help>]
16
17=for html
18</div>
19
20=head1 DESCRIPTION
21
22The B<kaserver> command initializes the Authentication Server, an obsolete
23way of providing authentication services to an AFS cell. It should no
24longer be used; instead, it should be replaced with a Kerberos version 5
25KDC. It is provided only for support of sites already running the
26Authentication Server and that have not yet migrated to Kerberos version
275.
28
29For a cell using the Authentication Server, it runs on every database
30server machine. In the conventional configuration, its binary file is
31located in the F</usr/afs/bin> directory on a file server machine.
32
33The B<kaserver> command is not normally issued at the command shell prompt
34but rather placed into a file server machine's F</usr/afs/local/BosConfig>
35file with the B<bos create> command. If it is ever issued at the command
36shell prompt, the issuer must be logged onto a database server machine as
37the local superuser C<root>.
38
39As it initializes, the Authentication Server process creates the two files
40that constitute the Authentication Database, F<kaserver.DB0> and
41F<kaserver.DBSYS1>, in the F</usr/afs/db> directory if they do not already
42exist. Use the commands in the B<kas> suite to administer the database.
43
44The Authentication Server is responsible for several aspects of AFS
45security, including:
46
47=over 4
48
49=item *
50
51Maintenance of all AFS server encryption keys and user passwords in the
52Authentication Database.
53
54=item *
55
56Creation of the tickets and tokens that users and servers use to establish
57secure connections. Its Ticket Granting Service (TGS) component performs
58this function.
59
60=back
61
62The Authentication Server records a trace of its activity in the
63F</usr/afs/logs/AuthLog> file. Use the B<bos getlog> command to display
64the contents of the file. Use the B<kdb> command to read the protected
65files associated with the F<AuthLog> file, F<AuthLog.dir> and
66F<AuthLog.pag>.
67
68This command does not use the syntax conventions of the AFS command
69suites. Provide the command name and all option names in full.
70
71=head1 CAUTIONS
72
73The Authentication Server provides only Kerberos version 4, which is no
74longer considered sufficiently secure. It can only use DES encryption for
75user keys, is vulnerable to known flaws in the Kerberos version 4
76protocol, and is based on protocols that are obsolete and no longer
77developed. The Authentication Server is also not widely tested and is
78known to have problems on some platforms OpenAFS otherwise supports.
79
80The Authentication Server should not be used for any new deployment. It is
81provided only for sites that need to use it while preparing for a
82migration to Kerberos KDC. No significant updates to the Authentication
83Server will be developed, and it will be removed from a future version of
84OpenAFS.
85
86=head1 OPTIONS
87
88=over 4
89
90=item B<-noAuth>
91
92Assigns the unprivileged identity C<anonymous> to the issuer. Thus, it
93establishes an unauthenticated connection between the issuer and the
94Authentication Server. It is useful only when authorization checking is
95disabled on the database server machine. In normal circumstances, the
96Authentication Server allows only authorized (privileged) users to issue
97commands that affect or contact the Authentication Database and will
98refuse to perform such an action even if the B<-noAuth> flag is used.
99
100=item B<-database> <I<dbpath>>
101
102Specifies the pathname of an alternate directory in which the
103Authentication Database files reside. Provide the complete pathname,
104ending in the base filename to which the C<.DB0> and C<.DBSYS1> extensions
105are appended. For example, the appropriate value for the default database
106files is F</usr/afs/db/kaserver>.
107
108Provide the B<-localfiles> argument along with this one; otherwise, the
109B<-localfiles> argument is also set to the value of this argument, which
110is probably inappropriate.
111
112=item B<-auditlog> <I<log path>>
113
114Turns on audit logging, and sets the path for the audit log. The audit
115log records information about RPC calls, including the name of the RPC
116call, the host that submitted the call, the authenticated entity (user)
117that issued the call, the parameters for the call, and if the call
118succeeded or failed.
119
120=item B<-audit-interface> (file | sysvmq)
121
122Specifies what audit interface to use. Defaults to C<file>. See
123L<fileserver(8)> for an explanation of each interface.
124
125=item B<-localfiles> <I<lclpath>>
126
127Specifies the pathname of an alternate directory in which the auxiliary
128Authentication Database file resides. Provide the complete pathname,
129ending in the base filename to which the C<auxdb> suffix is appended. For
130example, the appropriate value for the default auxiliary database file is
131F</usr/afs/local/kaserver>.
132
133=item B<-minhours> <I<n>>
134
135Specifies the minimum number of hours that must pass between password
136changes made by any regular user. System administrators (with the C<ADMIN>
137flag in their Authentication Database entry) can change passwords as often
138as desired. Setting a minimum time between password changes is not
139recommended.
140
141=item B<-servers> <I<authentication servers>>+
142
143Names each database server machine running an Authentication Server with
144which the local Authentication Server is to synchronize its copy of the
145Authentication Database, rather than with the machines listed in the local
146F</usr/afs/etc/CellServDB> file.
147
148=item B<-enable_peer_stats>
149
150Activates the collection of Rx statistics and allocates memory for their
151storage. For each connection with a specific UDP port on another machine,
152a separate record is kept for each type of RPC (FetchFile, GetStatus, and
153so on) sent or received. To display or otherwise access the records, use
154the Rx Monitoring API.
155
156=item B<-enable_process_stats>
157
158Activates the collection of Rx statistics and allocates memory for their
159storage. A separate record is kept for each type of RPC (FetchFile,
160GetStatus, and so on) sent or received, aggregated over all connections to
161other machines. To display or otherwise access the records, use the Rx
162Monitoring API.
163
164=item B<-rxbind>
165
166Bind the Rx socket to the primary interface only. (If not specified, the Rx
167socket will listen on all interfaces.)
168
169=item B<-crossrealm>
170
171Enable cross-realm authentication. The use of this option is considered
172insecure, and thus strongly discouraged. See OPENAFS-SA-2003-001.
173
174=item B<-help>
175
176Prints the online help for this command. All other valid options are
177ignored.
178
179=back
180
181=head1 EXAMPLES
182
183The following B<bos create> command creates a C<kaserver> process on
184C<fs3.example.com> (the command appears on two lines here only for
185legibility):
186
187 % bos create -server fs3.example.com -instance kaserver \
188 -type simple -cmd /usr/afs/bin/kaserver
189
190=head1 PRIVILEGE REQUIRED
191
192The issuer must be logged in as the superuser C<root> on a file server
193machine to issue the command at a command shell prompt. It is conventional
194instead to create and start the process by issuing the B<bos create>
195command.
196
197=head1 SEE ALSO
198
199L<AuthLog(5)>,
200L<BosConfig(5)>,
201L<CellServDB(5)>,
202L<kaserver.DB0(5)>,
203L<kaserverauxdb(5)>,
204L<bos(8)>,
205L<bos_create(8)>,
206L<bos_getlog(8)>,
207L<kas(8)>,
208L<kdb(8)>
209
210=head1 COPYRIGHT
211
212IBM Corporation 2000. <http://www.ibm.com/> All Rights Reserved.
213
214This documentation is covered by the IBM Public License Version 1.0. It was
215converted from HTML to POD by software written by Chas Williams and Russ
216Allbery, based on work by Alf Wachsmann and Elizabeth Cassell.