IBM Books

Command and Technical Reference, Volume 1

ifconfig

Purpose

ifconfig - Configures or displays network interface parameters for a network using TCP/IP.

Syntax

ifconfig
interface [address_family [address
 
[destination_address]] [parameter...]]

Flags

None.

Operands

address
Specifies the network address for the network interface. For the inet family, the address operand is either a host name, or an Internet address in the standard dotted decimal notation.

address_family
Specifies which network address family to change. The inet and ns address families are currently supported. This operand defaults to the inet address family.

destination_address
Specifies the address of the correspondent on the remote end of a point-to-point link.

interface
Specifies the network interface configuration values to show or change. You must specify an interface with the interface operand when you use the ifconfig command. Abbreviations for the interfaces include:

en
Standard Ethernet (inet, xns)

et
IEEE 802.3 Ethernet (inet, xns)

tr
Token ring (inet, xns)

xt
X.25 (inet)

sl
Serial line IP (inet)

lo
Loopback (inet)

op
Serial (inet)

css
Scalable POWERparallel Switch (SP Switch)

Include a numeral after the abbreviation to identify the specific interface (for example, tr0).

parameter
Allows the following parameter values:

alias
Establishes an additional network address for the interface. When changing network numbers, this is useful for accepting packets addressed to the old interface.

allcast
Sets the token-ring interface to broadcast to all rings on the network.

-allcast
Confines the token-ring interface to broadcast only to the local ring.

arp
Enables the ifconfig command to use the Address Resolution Protocol (ARP) in mapping between network-level addresses and link-level addresses. This flag is in effect by default.

-arp
Disables the use of the Address Resolution Protocol.

authority
Reserved.

bridge
Reserved.

-bridge
Reserved.

broadcast_address
(inet only). Specifies the address to use to broadcast to the network. The default broadcast address has a host part of all 1's (ones).

debug
Enables driver-dependent debug code.

-debug
Disables driver-dependent debug code.

delete
Removes the specified network address. This is used when an alias is incorrectly specified or when it is no longer needed. Incorrectly setting ns addresses have the side effect of specifying the host portion of the network address. Removing all ns addresses allows you to respecify the host portion.

detach
Removes an interface from the network interface list. If the last interface is detached, the network interface driver code is unloaded.

down
Marks an interface as inactive (down), which keeps the system from trying to transmit messages through that interface. If possible, the ifconfig command also resets the interface to disable reception of messages. Routes that use the interface, however, are not automatically disabled.

hwloop
Enables hardware loopback. The hardware loopback specifies that locally-addressed packets handled by an interface should be sent out using the associated adapter.

-hwloop
Disables hardware loopback. The hardware loopback specifies that locally-addressed packets handled by an interface should be sent out using the associated adapter.

ipdst
Specifies an Internet host willing to receive IP packets encapsulating ns packets bound for a remote network. An apparent point-to-point link is constructed, and the specified address is taken as the ns address and network of the destination.

metric_number
Sets the routing metric of the interface to the value specified by the number variable. The default is 0. The routing metric is used by the routing protocol (the routed daemon). Higher metrics have the effect of making a route less favorable. Metrics are counted as addition hops to the destination network or host.

mtu_value
Sets the maximum IP packet size for this system. The value variable can be any number from 60 through 65520, depending on the network interface. See "Understanding Automatic Configuration of Network Interfaces" in AIX System Management Guide: Communications and Networks for maximum transmission unit (MTU) values by interface.

netmask_mask
Specifies how much of the address to reserve for subdividing networks into subnetworks. This parameter can only be used with an address family of inet.

The mask variable includes both the network part of the local address and the subnet part, which is taken from the host field of the address. The mask can be specified as a single hexadecimal number beginning with 0x, in standard Internet dotted decimal notation, or beginning with a name or alias that is listed in the /etc/networks file.

The mask contains 1's (ones) for the bit positions in the 32-bit address that are reserved for the network and subnet parts, and 0's (zeros) for the bit positions that specify the host. The mask should contain at least the standard network portion, and the subnet segment should be contiguous with the network segment.

offset
Used by the CSS/IP for static IP address translation only.
Note:
If the ARP is enable, offset is not used.

TB0/TB2
Indicates to the CSS/IP whether it is running over TB0 or TB2 adapter interface. The default is TB2 adapter.

security
Reserved.

snap
Reserved.

-snap
Reserved.

up
Marks an interface as active (up). This parameter is used automatically when setting the first address for an interface. It can also be used to enable an interface after an ifconfig down command.

Description

The ifconfig command has been modified to add support for the switch. This command is valid only on an SP system.

The ifconfig command can be used from the command line either to assign an address to a network interface, or to configure or display the current network interface configuration information. The ifconfig command must be used at system start up to define the network address of each interface present on a machine. It can also be used at a later time to redefine an interface's address or other operating parameters. The network interface configuration is held on the running system and must be reset at each system restart.

An interface can receive transmissions in differing protocols, each of which may require separate naming schemes. It is necessary to specify the address_family parameter, which can change the interpretation of the remaining parameters. The address families currently supported are inet and ns.

For the DARPA Internet family, inet, the address is either a host name present in the host name database, that is, the /etc/hosts file, or a DARPA Internet address expressed in the Internet standard dotted decimal notation.

For the Xerox Network Systems (XNS) family, ns, addresses are net:a.b.c.d.e.f., where net is the assigned network number (in decimal), and each of the six bytes of the host number, a through f, are specified in hexadecimal. The host number can be omitted on 10-Mbps Ethernet interfaces, which use the hardware physical address, and on interfaces other than the first interface.

While any user can query the status of a network interface, only a user who has administrative authority can modify the configuration of those interfaces.

Related Information

AIX commands: netstat

AIX files: /etc/host, /etc/networks

Refer to PSSP: Administration Guide for additional information on the SP Switch.

Refer to AIX System Management Guide: Communications and Networks for additional information on TCP/IP protocols.

Refer to AIX General Programming Concepts: Writing and Debugging Programs for an overview on Xerox Network Systems (XNS).

Location

/usr/lpp/ssp/css/ifconfig

Examples

The following are examples using the ifconfig command on a TCP/IP network and an XNS network, respectively:

Inet Examples

  1. To query the status of a serial line IP interface, enter:
    ifconfig sl1
    

    In this example, the interface to be queried is sl1. The result of the command looks similar to the following:

    sl1: flags=51<UP,POINTOPOINT,RUNNING>
         inet 192.9.201.3 --> 192.9.354.7 netmask ffffff00
    
  2. To configure the local loopback interface, enter:
    ifconfig lo0 inet 127.0.0.1 up
    
  3. To mark the local token-ring interface as down, enter:
    ifconfig tr0 inet down
    

    In this example, the interface to be marked is token0.

    Note:
    Only a user with root user authority can modify the configuration of a network interface.
  4. To specify an alias, enter:
    ifconfig css0 inet 127.0.0.1 netmask 255.255.255.0 alias
    

XNS Examples

  1. To configure a standard Ethernet-type interface for XNS, enter:
    ifconfig en0 ns 110:02.60.8c.2c.a4.98 up
    

    In this example, ns is the XNS address family, 110 is the network number and 02.60.8c.2c.a4.98 is the host number, which is the Ethernet address unique to each individual interface. Specify the host number when there are multiple Ethernet hardware interfaces, as the default may not correspond to the proper interface. The Ethernet address can be obtained by the commands:

    ifconfig en0 netstat -v
    

    The XNS address can be represented by several means, as can be seen in the following examples:

    123#9.89.3c.90.45.56
    5-124#123-456-900-455-749
    0x45:0x9893c9045569:90
    0456:9893c9045569H
    

    The first example is in decimal format, and the second example, using minus signs, is separated into groups of three digits each. The 0x and H examples are in hexadecimal format. Finally, the 0 in front of the last example indicates that the number is in octal format.

  2. To configure an IEEE Ethernet 802.3-type interface for XNS, enter:
    ifconfig et0 ns 120:02.60.8c.2c.a4.98 up
    

    The en0 and et0 interfaces are considered as separate interfaces even though the same Ethernet adapter is used. Two separate networks can be defined and used at the same time as long as they have separate network numbers. Multiple Ethernet adapters are supported.

    Note:
    The host number should correspond to the Ethernet address on the hardware adapter. A system can have multiple host numbers.

  3. To configure an Internet encapsulation XNS interface, enter:
    ifconfig en0 inet 11.0.0.1 up
    ifconfig en0 ns 110:02.60.8c.2c.a4.98 up
    ifconfig en0 ns 130:02.60.8c.34.56.78 ipdst 11.0.0.10
    

    The first command brings up the Internet with the inet address 11.0.0.1. The second command configures the en0 interface to be network 110 and host number 02.60.8c.2c.a4.98 in the ns address family. This defines the host number for use when the XNS packet is encapsulated within the Internet packet. The last command defines network 130, host number 02.60.8c.34.56.78, and destination Internet address 11.0.0.10. This last entry creates a new network interface, nsip. Use the netstat -i command for information about this interface.

install_cw

Purpose

install_cw - Completes the installation of system support programs in the control workstation.

Syntax

install_cw

Flags

None.

Operands

None.

Description

Use this command at installation to perform the following tasks:

Security

You must have root privilege to run this command. You must also have SDR administrator and write access to run this command.

Location

/usr/lpp/ssp/bin/install_cw

Examples

To complete system support programs installation on the control workstation, enter:

install_cw

install_hacws

Purpose

install_hacws - Creates and configures a High Availability Control Workstation (HACWS) configuration from a regular control workstation configuration.

Syntax

install_hacws -p host_name -b host_name [-s]

Flags

-p
Specifies the host name of the primary control workstation. The host name is the name that is set in the kernel and identifies the physical machine. It is also required that this name have a route defined to a network adapter on the primary control workstation. This option is required.

-b
Specifies the host name of the backup control workstation. The host name is the name that is set in the kernel and identifies the physical machine. It is also required that this name have a route defined to a network adapter on the backup control workstation. This option is required.

-s
Invokes the command on both the primary and the backup control workstations.

Operands

None.

Description

Use this command to perform configuration and installation tasks on HACWS. This command is used instead of install_cw once the configuration has been made an HACWS configuration. This command is valid only when issued on the control workstation. When the command is executed and the calling process is not on a control workstation, an error occurs.

Note:
The install_hacws command permanently alters a control workstation to an HACWS. The only way to go back to a single control workstation is to have a mksysb image of the primary control workstation before the install_hacws command is executed.

Both the primary and backup control workstations must be running and capable of executing remote commands.

Exit Values

0
Indicates the successful completion of the command.

1
Indicates that an error occurred. Diagnostic information is written to standard output and standard error.

Standard output consists of messages indicating the progress of the command as it configures the control workstations.

Security

You must have root privilege to run this command. You must also have SDR administrator and write access to run this command.
Restricted Root Access

As of PSSP 3.2, you have the option of running your SP system with an enhanced level of security. With the restricted root access (RRA) option enabled, PSSP does not internally issue rsh and rcp commands as a root user from a node. Also, PSSP does not automatically grant authorization for a root user to issue rsh and rcp commands from a node. If you enable this option, some procedures might not work as documented. For example, to run HACMP, an administrator must grant the authorizations for a root user to issue rsh and rcp commands that PSSP otherwise grants automatically. See the "Planning for security" chapter in IBM RS/6000 SP: Planning, Volume 2, Control Workstation and Software Environment for a description of this function and a complete list of limitations.

Prerequisite Information

Refer to PSSP: Administration Guide for information on the HACWS option.

Location

/usr/sbin/hacws/install_hacws

Related Information

PSSP commands: install_cw, setup_logd

AIX commands: rsh

Examples

  1. To configure both control workstations on an SP system, enter the following:
    install_hacws -p primary_cw -b backup_cw -s
    
  2. To configure the control workstations separately, enter the following.

    On the primary control workstation, enter:

    install_hacws -p primary_cw -b backup_cw
    

    After the preceding command completes on the primary control workstation, enter the following on the backup control workstation:

    install_hacws -p primary_cw -b backup_cw
    

kadmin

Purpose

kadmin - Provides network access to Kerberos Version 4 authentication database administration functions.

Syntax

kadmin [-u admin_name] [-r default_realm] [-m]

Flags

-u
Specifies a Kerberos Version 4 principal name to use instead of your AIX login name. This admin_name must be a valid AIX login name.

-r
Specify if you want a realm other than the local realm to be the default.

-m
Allows multiple requests without Kerberos Version 4 reauthentication (reentry of your administrative password).

Operands

None.

Description

This command provides an interactive interface to the primary Kerberos Version 4 authentication database. Administrators use kadmin to add new users and services to the database, and to change information about existing database entries. For example, an administrator can use kadmin to change a user's password. An administrator is a user with an admin instance whose name appears in at least one of the authentication administration Access Control Lists (ACLs).

The kadmin program communicates over the network with the kadmind program, which runs on the machine housing the primary authentication database. The kadmind program creates new entries and makes modifications to the database.

When you enter the kadmin command, the program displays a message that welcomes you and explains how to ask for help. Then kadmin waits for you to enter commands. After you enter a command, you are prompted to enter your admin password. If the -m option is used, you are prompted for your admin password only for the first command entered. You do not need to issue the k4init command prior to running this command because the necessary tickets are obtained automatically.

When using the kadmin command, the principal's expiration date and maximum ticket lifetime are set to the default values. To override the defaults, the root user must run the kdb_edit command to modify those attributes.

Use the add_new_key (or ank for short) command to add a new principal to the authentication database. The command requires the principal identifier as an argument. The identifier given can be fully qualified using the standard name.instance@realm convention. You are asked to enter your admin password and are then prompted twice to enter the principal's new password. If a realm is not specified, the local realm is used unless another was given on the command line with the r flag. If no instance is specified, a null instance is used. If a realm other than the default realm is specified, you need to supply your admin password for the specified realm.

Use change_password to change a principal's password. The command requires the principal identifier as an argument. You are asked to enter your admin password and are then prompted twice to enter the principal's new password. The identifier given can be fully qualified using the standard name.instance@realm convention.

Use the change_admin_password to change your admin instance password. This command requires no arguments. It prompts you for your old admin password, then prompts you twice to enter the new admin password. If this is your first command, the default realm is used. Otherwise, the realm used in the last command is used.

Use destroy_tickets to destroy any admin tickets obtained by the kadmin command.

Use list_requests to get a list of possible commands.

Use help to display various kadmin help messages. If entered without an argument, help displays a general help message. You can get detailed information on specific kadmin commands by entering help command_name.

To quit the program, type quit.

To invoke a shell command, precede the command with an exclamation point.

Files

/var/kerberos/database/admin_acl.{add,get,mod}
Access Control List files.

Location

/usr/kerberos/bin/kadmin

Related Information

Commands: add_principal, kadmind, kpasswd, ksrvutil

Refer to the "RS/6000 SP files and other technical information" section of PSSP: Command and Technical Reference for additional Kerberos information.

Examples

The following contains an example of adding a user. To add a user, enter:

kadmin
 
Welcome to the Kerberos Administration Program, version 4
Type "help" if you need it.
 
admin:  help
 
Welcome to the Kerberos administration program.Type "?" to get
a list of requests that are available. You can get help on each of
the commands by typing "help command_name". Some functions of this
program requires an "admin" password from you. This is a password
private to you, that is used to authenticate requests from this
program. You can change this password with the "change_admin_password"
(or short form "cap") command. Good Luck!
 
admin:  ?
 
Available admin requests:
change_password, cpw        Change a user's password
change_admin_password, cap  Change your admin password
add_new_key, ank            Add new user to kerberos database
get_entry, get              Get entry from kerberos database
destroy_tickets, dest       Destroy admin tickets
help                        Request help with this program
list_requests, lr, ?        List available requests.
quit, exit, q               Exit program.
 
admin:  ank mroz
 
Admin password:
Password for mroz:
Verifying, please re-enter Password for mroz:
mroz added to database.
 
admin:  q
 
Cleaning up and exiting.
Note:
Passwords are not echoed back to the user.

kadmind daemon

Purpose

kadmind - Contains the daemon for Kerberos Version 4 authentication database administration.

Syntax

kadmind [-h] [-n] [-r realm] [-d db_name] [-f file_name] [ -a acldir]

Flags

-h
Specifies that the kadmind command list the available subcommands and exit.

-n
Specifies that the master key from the master key cache file be obtained. Otherwise, it prompts the user to enter the master key interactively.

-r
Specifies that the kadmind command is to service a realm other than the local realm. realm is the authentication realm name.

-d
Specifies an authentication database name other than the default. db_name is a directory path.

-f
Specifies the log file in which the daemon records status and error messages.

-a
Specifies a directory other than the default that contains the Access Control Lists. acldir is a directory path.

Note:
Use of the -r, -d, and -a flags with values other than the system defaults is not supported on the SP system.

Operands

None.

Description

The kadmind daemon is the Kerberos Version 4 authentication database server for the password-changing and administration tools. It uses the master key for authorization.

The kadmind daemon listens for requests on the kerberos_master/tcp port. If this port is not defined in the /etc/services file, it uses port 751.

When performing requests on behalf of clients, kadmind checks access control lists (ACLs) to determine the authorization of the client to perform the requested action. Currently three distinct access types are supported:

Principals are always granted authorization to change their own password.

Files

/.k
Master key cache file.

/var/kerberos/database/admin_acl.{add,get,mod}
Access Control List files.

/var/kerberos/database/principal.pag, /kerberos/database/principal.dir
Default files containing the authentication database.

/var/adm/SPlogs/kerberos/admin_server.syslog
Default log file.

Location

/usr/lpp/ssp/kerberos/etc/kadmind

Related Information

Commands: add_principal, kadmin, kpasswd

Refer to the "RS/6000 SP files and other technical information" section of PSSP: Command and Technical Reference for additional Kerberos information.

Examples

To see how kadmind is started, display the subsystem definition by issuing:

odmget -q subsysname=kadmind SRCsubsys

Output will resemble:

 SRCsubsys:
        subsysname = "kadmind"
        synonym = ""
        cmdargs = "-n"
        path = "/usr/lpp/ssp/kerberos/etc/kadmind"
        uid = 0
        auditid = 0
        standin = "/dev/null"
        standout = "/dev/console"
        standerr = "/dev/console"
        action = 1
        multi = 0
        contact = 2
        svrkey = 0
        svrmtype = 0
        priority = 20
        signorm = 15
        sigforce = 15
        display = 1
        waittime = 20
        grpname = ""

kdb_destroy

Purpose

kdb_destroy - Destroys the Kerberos Version 4 authentication database.

Syntax

kdb_destroy

Flags

None.

Operands

None.

Description

The kdb_destroy command removes the Kerberos Version 4 authentication database.

You first must reply y or Y to a prompt to confirm the request, or kdb_destroy exits without removing the database files.

This command can only be issued on the system on which the authentication database resides.

Note:
This command does not remove database backup files created by the kdb_util command nor the /.k file created by the kstash command.

Files

/var/kerberos/database/principal.pag, /usr/kerberos/database/principal.dir
Files containing the Kerberos Version 4 authentication database.

Security

You must have root privilege to run this command.

Location

/usr/lpp/ssp/kerberos/etc/kdb_destroy

Related Information

Commands: kdb_init

Examples

To destroy the Kerberos Version 4 authentication database, enter:

kdb_destroy

kdb_edit

Purpose

kdb_edit - Edits the Kerberos Version 4 authentication database.

Syntax

kdb_edit [-n]

Flags

-n
Specifies that the master key is obtained from the master key cache file. Otherwise, kdb_edit prompts the user to enter the master key interactively.

Operands

None.

Description

The kdb_edit command is used to create or change principals in the Kerberos Version 4 authentication database. It uses the master key for authorization.

After the master key is verified, kdb_edit begins a prompt loop. The user is prompted for the principal name and instance to be modified. If the entry is not found, the user can create it. After an entry is found or created, the user can set the password, expiration date, maximum ticket lifetime, and attributes. Default expiration dates, maximum ticket lifetimes, and attributes are presented in brackets. If the user presses return, the default is selected. There is no default password. The password RANDOM is interpreted specially, and if entered, the program selects a random key for the principal.

You should use random key generation only if you use the kdb_edit command to replace a deleted service principal (for example, rcmd.host_name).

If you enter a ticket lifetime value, it must be a number between 0 and 255. The actual maximum lifetime value that you choose will be between five minutes and 30 days. Refer to PSSP: Administration Guide for a complete list of the possible Kerberos Version 4 ticket lifetime values you can enter and the corresponding durations in days, hours, and minutes. The following list shows a representative sample with approximate durations:

Response to kdb_edit          Approximate Duration
       141                           1 day
       151                           2 days
       170                           1 week
       180                           2 weeks
       191                           1 month

After the entry has been created or changed, "Edit O.K." is printed.

Files

/.k
Master key cache file.

/var/kerberos/database/principal.pag, /usr/kerberos/database/principal.dir
Files containing the Kerberos Version 4 authentication database.

Security

You must have root privilege to run this command.

Location

/usr/lpp/ssp/kerberos/etc/kdb_edit

Related Information

Commands: kadmin, kdb_init

Refer to the "RS/6000 SP files and other technical information" section of PSSP: Command and Technical Reference for additional Kerberos information.

Examples

To add a service from host mroz, enter:

kdb_edit -n

Opening database...
Previous or default values are in [brackets],
enter return to leave the same, or new value.
 
Principal name: rcmd
 
Instance: mroz
 
<Not found>, Create [y] ? Y
 
Principal: rcmd, Instance: mroz, kdc_key_ver: 1
New Password:
Verifying, please re-enter
New Password:
Principal's new key version = 1
Expiration date (enter yyyy-mm-dd) [1999-12-31] ?
Max ticket lifetime [255] ?
Attributes [0] ?
Edit O.K.
Program re-prompts for another principal "principal name:"
 
Principal name:
The program exits when no principal name is entered.
Note:
Passwords are not echoed back to the user.

kdb_init

Purpose

kdb_init - Initializes the Kerberos Version 4 authentication database.

Attention

This command is normally used internally by the setup_authent script, and should not be needed otherwise.

Syntax

kdb_init [realm]

Flags

None.

Operands

realm
Specifies the realm name. If realm is not specified, the realm name is set to the local system's network domain name converted to uppercase characters.

Description

Use this command to initialize the Kerberos Version 4 authentication database, creating the necessary initial system principals.

After determining the realm to be created, the command prompts for a master key password. The user should choose a nontrivial, not easily-guessable password. The user must remember this password because it is used for other commands. The master key password is used to encrypt every encryption key stored in the database.

Files

/var/kerberos/database/principal.pag, /usr/kerberos/database/principal.dir
Files containing the Kerberos Version 4 authentication database.

Security

You must have root privilege to run this command.

Location

/usr/lpp/ssp/kerberos/etc/kdb_init

Related Information

Commands: kdb_destroy, kdb_edit, kdb_util

Refer to the "RS/6000 SP files and other technical information" section of PSSP: Command and Technical Reference for additional Kerberos information.

Examples

To initialize a Kerberos Version 4 database for realm "ABC.ORG", enter:

kdb_init ABC.ORG

kdb_util

Purpose

kdb_util - The utility program for managing the Kerberos Version 4 authentication database.

Syntax

kdb_util operation file_name

Flags

None.

Operands

operation
The operation must be one of the following:

load
Initializes the database with the records described by the text contained in the file file_name. Any existing database is overwritten.

dump
Dumps the database into a text representation in the file file_name.

slave_dump
Performs a database dump similar to the dump operation and creates a semaphore file to indicate to the propagation software that an update is available for distribution to secondary authentication servers.

new_master_key
Prompts for the old and new master key strings, and then dumps the database into a text representation in the file file_name. The keys in the text representation are encrypted in the new master key.

file_name
Specifies the name of the file.

Description

The kdb_util command allows the user to perform various utility operations on the Kerberos Version 4 authentication database.

Files

/var/kerberos/database/principal.pag, /usr/kerberos/database/principal.dir
Files containing the Kerberos Version 4 authentication database.

<data_file>.ok
Semaphore file created by the slave_dump operation.

Security

You must have root privilege to run this command.

Location

/usr/lpp/ssp/kerberos/etc/kdb_util

Related Information

Commands: kdb_init, kprop, kpropd

Refer to the "RS/6000 SP files and other technical information" section of PSSP: Command and Technical Reference for additional Kerberos information.

Examples

To dump the contents of the Kerberos Version 4 database in readable ASCII, enter:

kdb_util dump /tmp/KerbDump

k4destroy, kdestroy

Purpose

k4destroy - Destroys Kerberos Version 4 authentication tickets.

Syntax

k4destroy [-f] [-q]

Flags

-f
Indicates that k4destroy should not display a status message.

-q
Indicates that k4destroy should display a status message, but should not beep the terminal on an error.

Operands

None.

Description

IBM strongly suggests using the k4destroy form. DCE includes the kdestroy command, so using kdestroy instead of k4destroy may produce unexpected results if DCE is installed.

The k4destroy command destroys the user's Kerberos Version 4 authentication tickets. The command writes zeros to the user's current ticket cache file and then removes the file from the file system. If the file does not exist or if an error occurs, a message is displayed. The current ticket file is determined by the KRBTKFILE environment variable. If the KRBTKFILE environment variable is undefined, the current ticket file is /tmp/tktuid, where uid specifies your user identification number. If k4destroy cannot destroy the ticket file, the command warns you by making your terminal beep. You can place the k4destroy command in your .logout file (C shell only) so that your tickets are destroyed automatically when you log out.

Files

/tmp/tktuid
The default ticket file (uid is the decimal UID of the user).

Location

/usr/bin/k4destroy

/usr/lpp/ssp/kerberos/bin/kdestroy

Related Information

Commands: k4init, k4list

Refer to the "RS/6000 SP files and other technical information" section of PSSP: Command and Technical Reference for additional Kerberos information.

Examples

This example shows destroying cached Kerberos Version 4 tickets:

$k4destroy
 
Tickets destroyed.

kerberos daemon

Purpose

kerberos - The Kerberos Version 4 authentication ticket-granting service daemon.

Syntax

kerberos
[-a max_age] [-l log_file] [ -m] [-n] [-p pause_seconds]
 
[-r realm] [-s] [database]

Flags

-a
Specifies the maximum database age. Its value must be between one hour and three days, in seconds. For slave servers, the default is one day. For the primary server, the default is not to check the age of the database.

-l
Specifies the log file path name. (This is lowercase l, as in list.)

-m
Prompts for the master key. If the -m option is not specified, the master key is obtained from the master key cache file.

-n
Specifies that the age of the database against maximum not be checked. If desired, this option can override the default for secondary servers.

-p
Specifies the pause interval. It must be between 5 and 3600 seconds. The default is to hang indefinitely on an error.

-r
Allows the realm to be specified instead of assuming the local realm.

-s
Indicates that this server is a secondary (backup) server.

Operands

database
Contains the path name of the authentication database.
Note:
Specification of a database path name other than the default, /var/kerberos/database/principal, is not supported on the SP system.

Description

kerberos is the daemon program that provides the Authentication Service and the Ticket Granting Service to client programs that want to obtain tickets for authenticated services.

The kerberos daemon listens for requests on the kerberos4/upd port. If this port is not defined in the /etc/services file, it uses port 750.

When you start the server (normally from init), you can specify a maximum age for the database files. This can be used to ensure that you do not start a secondary server with out-of-date information. This could occur in a situation where a secondary server system was down when a database update was scheduled.

Files

/var/kerberos/database/principal.pag, /var/kerberos/database/principal.dir
Files containing the authentication database.

/.k
Master key cache file.

/var/adm/SPlogs/kerberos/kerberos.log, /var/adm/SPlogs/kerberos/kerberos.slave_log
Log files.

Location

/usr/lpp/ssp/kerberos/etc/kerberos

Related Information

Commands: kdb_init, kprop, kpropd

Refer to the "RS/6000 SP files and other technical information" section of PSSP: Command and Technical Reference for additional Kerberos information.

Examples

To see how kerberos is started, display the subsystem definition by issuing:

odmget -q subsysname=kerberos SRCsubsys

Output should resemble:

SRCsubsys:
  subsysname = "kerberos"
  synonym = ""
  cmdargs = ""
  path = "/usr/lpp/ssp/kerberos/etc/kerberos"
  uid = 0
  auditid = 0
  standin = "/dev/null"
  standout = "/dev/console"
  standerr = "/dev/console"
  action = 1
  multi = 0
  contact = 2
  svrkey = 0
  svrmtype = 0
  priority = 20
  signorm = 15
  sigforce = 15
  display = 1
  waittime = 20
  grpname = ""

kfserver

Purpose

kfserver - Sends keyfiles to requesting node over the s1term.

Syntax

kfserver

Flags

None.

Operands

None.

Description

The kfserver script is run from inetd.conf upon request from a node for its Kerberos V4 srvtab file. When the client connects to the server, kfserver queries the socket for the node's IP address requesting its srvtab file. kfserver locates the srvtab file and sends it over the s1term in write mode.

Files

The log file /var/adm/SPlogs/kfserver/kfserver.log.pid is created.

Exit Values

0
Indicates the successful completion of the command.

1
Indicates that an error or errors occurred. Review the log file.

An unsuccessful run of this command, depending on where an error occurred, will result in the keyfile transfer being unsuccessful.

Security

You must have root privilege to run this command.

Restrictions

This command runs only on the control workstation. This command is not intended to be run manually; it requires a socket opened to it.

This command uses the s1term in write mode. Only one s1term session in write mode is allowed per node, at a time.

Location

/usr/lpp/ssp/install/bin/kfserver

k4init, kinit

Purpose

k4init - Obtains a Kerberos Version 4 authentication ticket.

Syntax

k4init [-i] [-l] [-r] [-v] [name]

Flags

-i
Requests the command to prompt you for an instance, unless one is specified in the name operand.

-l
Requests the command to prompt you for the ticket lifetime. If not specified, the ticket will have the maximum time allowed for the user. (This is lowercase l, as in list.)

-r
Requests the command to prompt you for an authentication realm, unless one is specified in the name operand. This option lets you authenticate yourself within an authentication realm other than the local realm.

-v
Specifies verbose mode. The name of the ticket file used is printed and a status message indicating whether or not your authentication attempt was successful.

Operands

name
Specifies your user principal identifier. The principal name can be qualified with either an instance or a realm name.instance@realm, or both. Refer to the Kerberos command for details.

Description

IBM strongly suggests using the k4init form. DCE includes the kinit command, so using kinit instead of k4init may produce unexpected results if DCE is installed.

The k4init command is used to authenticate the user's identify to the SP authentication service. All previous tickets are discarded.

When you use the k4init command without options, it prompts for your principal name and password, and tries to authenticate your identity within the local realm. If the specified principal name and password are correct, k4init retrieves your initial ticket and puts it in the ticket file specified by your KRBTKFILE environment variable. If the KRBTKFILE variable is undefined, your ticket is stored in the /tmp/tktuid file, where uid specifies your user identification number.

Note:
These tickets are shared by all processes running under the user's IDs. The KRBTKFILE environment variable can be set to change the location of the ticket cache file.

If you specify the -l flag, the command prompts you to enter a ticket lifetime, in minutes. The actual value you enter will differ somewhat from the actual lifetime, because lifetimes are set to one of a discrete set of values ranging from five minutes to 30 days. k4init rounds the value you enter up to the next higher limit, and applies the maximum that is defined for your Kerberos principal. If you enter a value higher than your allowed limit, k4init does not indicate an error, but simply assigns your maximum lifetime in the ticket it creates. Refer to PSSP: Administration Guide for the complete list of maximum lifetime values that the administrator can set. The following list shows a representative sample of lifetimes you can request:

Response to k4init prompt          Approximate duration
       1500                             1 day
       3000                             2 days
      10000                             1 week
      20000                             2 weeks
      43000                             1 month

Depending on your security policy, you may want to use the k4destroy command to destroy any active tickets before you end your login session. You can place the k4destroy command in your .logout file (C shell only) so that your tickets are destroyed automatically when you logout.

The KRBTKFILE environment variable is used to specify the ticket cache file used by k4init to store authentication tickets.

Files

/tmp/tktuid
The default ticket file (uid is the decimal UID of the user).

Location

/usr/bin/k4init

/usr/lpp/ssp/kerberos/bin/kinit

Related Information

Commands: k4destroy, k4list

Refer to the "RS/6000 SP files and other technical information" section of PSSP: Command and Technical Reference for additional Kerberos information.

Examples

This example shows logging into Kerberos Version 4 as the principal "richard":

$k4init richard
kerberos Initialization for "richard"
Password:
$

k4list, klist

Purpose

k4list - Lists currently held Kerberos Version 4 authentication tickets.

Syntax

k4list [-s | -t] [-file name] [-srvtab]

Operands

-s
Indicates silent mode. The k4list command does not print the issue and expire times, the name of the tickets file, or the identity of the principal. This flag is ignored if srvtab is specified.

-t
Indicates test mode. The k4list command just checks for the existence of a nonexpired ticket-granting-ticket. If one is present, it exits with a status of 0. Otherwise, it exits with a status of 1. No output is displayed.

-file
Specifies the name of a ticket cache file. When the -file option is not specified, the k4list command uses the KRBTKFILE environment variable to determine the location of the ticket cache file. If KRBTKFILE is not set, /tmp/tktuid file is used, where uid is the AIX user ID. When srvtab is also specified, this flag specifies the name of the server key file whose contents are to be displayed.

-srvtab
Specifies that the k4list command is to list the contents of a server key file instead of a ticket cache file. If the file option is not specified, the default key file is /etc/krb-srvtab.

Operands

None.

Description

IBM strongly suggests using the k4list form. DCE includes the klist command, so using klist instead of k4list may produce unexpected results if DCE is installed.

The k4list command prints the principal name and the name of the file containing the user's tickets. It also lists the principal name, issue time, and expiration time for each service ticket held by the user. Principal names are listed in the form name.instance@realm. The period (.) is omitted if the instance is null and the at sign (@) is omitted if the realm is null.

Files

/etc/krb.conf
Contains the name of the local realm.

/etc/krb-srvtab
The default service key file.

/tmp/tktuid
The default ticket file (uid is the decimal UID of the user).

Location

/usr/bin/k4list

/usr/lpp/ssp/kerberos/bin/klist

Related Information

Commands: k4destroy, kerberos, k4init

Examples

  1. This example shows a listing of the default ticket cache file for the root user (uid 0):
    # k4list
    Ticket file:    /tmp/tkt0
    Principal:  root.admin@XYZ.ABC.COM
     
      Issued           Expires          Principal
    Nov 12 16:26:11  Dec 12 16:26:11  krbtgt.XYZ.ABC.COM@XYZ.ABC.COM
    Nov 12 16:26:46  Dec 12 16:26:46  hardmon.cwksta@XYZ.ABC.COM
    Nov 12 16:45:15  Dec 12 16:45:15  rcmd.cwksta@XYZ.ABC.COM
    #
    

    The second line shows the Kerberos principal acting as client, to whom the tickets belong. This is the user principal you supplied to the k4init command, or the rcmd.instance service principal used by rcmdtgt. The list of tickets always begins with the ticket-granting-ticket. The others are service tickets; in this case for the System Monitor service on the control workstation (hardmon) and the SP Remote Command service also on the control workstation (rcmd).

  2. This example shows the use of k4list to display the key versions for service principals on an SP node:
    #  
    k4list -srvtab
    Server key file:   /etc/krb-srvtab
    Service         Instance        Realm      Key Version
    ------------------------------------------------------
    rcmd            node3fi         XYZ.ABC.COM       1
    rcmd            node3tr         XYZ.ABC.COM       1
    rcmd            node3sw         XYZ.ABC.COM       1
    rcmd            node3en         XYZ.ABC.COM       1
    #
    

    You can determine the versions of service keys in the authentication database by locating the entry for the target service principal in a dump of the SP authentication database. If you have secondary authentication servers, or if you use the procedure for backing up your database that IBM suggests using in PSSP: Administration Guide, the database dump can be found in file /var/kerberos/database/slavesave on the primary server host.

kpasswd

Purpose

kpasswd - Changes the Kerberos Version 4 principal's password.

Syntax

kpasswd [-h] [-n user] [-i instance] [-r realm] [-u full_name]

Flags

-h
Specifies that kpasswd is to print a brief summary of the options and then exit.

-n
Specifies the name to be used as the principal name rather than the user name of the user running kpasswd. (This is determined from the ticket file if it exists; otherwise, it is determined from the AIX login name.)

-i
Specifies the instance to be used as the instance of the user principal, rather than a null instance.

-r
Specifies the realm to be used as the realm rather than the local realm.

-u
Specifies a fully qualified principal identifier in the form name.instance@realm.

Operands

None.

Description

The kpasswd command changes a principal's password.

It prompts for the principal's current password. If the old password is correct, the user is prompted twice for a new password. A message is printed indicating whether or not the password changing operation was successful.

Location

/usr/kerberos/bin/kpasswd

Related Information

Commands: kadmin, k4init, passwd

Refer to the "RS/6000 SP files and other technical information" section of PSSP: Command and Technical Reference for additional Kerberos information.

kprop

Purpose

kprop - The network utility to propagate the Kerberos Version 4 authentication database to secondary servers.

Syntax

kprop [-force] [-realm realm_name] data_file hosts_file

Flags

-force
Overrides the timestamp checking, forcing transmittal even if the database was not modified since last sent.

-realm
Allows the realm to be specified instead of assuming the local realm.

Operands

data_file
Specifies the file containing the dumped image of the Kerberos Version 4 authentication database produced by the kdb_util slave_dump command.

hosts_file
Contains a list of secondary server hosts that provide backup to this server.

Description

The kprop command reads a list of secondary host names and connects to each one in turn using the kprop service provided by the kpropd program. The data_file (the Kerberos Version 4 authentication database) is transferred if it has been modified since it was last sent successfully.

Files

<data_file>.ok
Semaphore file created by the kdb_util slave_dump operation.

Security

You must have root privilege to run this command.

Location

/usr/lpp/ssp/kerberos/etc/kprop

Related Information

Commands: kdb_util, kerberos, kpropd

Examples

To force propagation from the primary server to a backup, enter:

rm /var/kerberos/database/slavesave.dump_ok
kdb_util slave_dump /var/kerberos/database/slavesave
kprop /var/kerberos/database/slavesave /var/kerberos/database/slavelist

kpropd daemon

Purpose

kpropd - The daemon that receives updates for a secondary Kerberos Version 4 authentication database.

Syntax

kpropd [-r realm] [-s srvtab] [-l log_file] [ -d database_name] file_name

Flags

-r
Overrides the default local realm.

-s
Overrides the default srvtab name /etc/krb-srvtab.

-l
Specifies a log file name to be used instead of the default. (This is lowercase l, as in list.)

-d
Specifies the path name of the database.
Note:
Use of the -r, -s, and -d flags with values other than the system defaults is not supported on the SP system.

Operands

file_name
Specifies the name of the file to receive from the transmitting host, and then to input to a kdb_util load command.

Description

kpropd runs as a daemon on secondary Kerberos Version 4 authentication database server hosts, listening for a TCP connection on the krb_prop service.

The kpropd daemon listens for requests on the krb_prop/tcp port. If this port is not defined in the /etc/services file, it uses port 754. It validates the connection, which must be from an administrative host as defined in the krb.conf file for the local realm. The service name used for mutual authentication is rcmd.

Files

/etc/krb.conf
Contains the name of the local realm.

/etc/krb-srvtab
Default server key file.

/var/kerberos/database/principal.pag, /var/kerberos/database/principal.dir
Default location of database files.

/var/adm/SPlogs/kerberos/kpropd.log
Log file.

Location

/usr/lpp/ssp/kerberos/etc/kpropd

Related Information

Commands: kdb_util, kerberos, kprop

Examples

To see how kpropd is started, display the subsystem definition by issuing:

odmget -q subsysname=kerberos SRCsubsys

Ouput should resemble:

SRCsubsys:
  subsysname = "kpropd"
  synonym = ""
  cmdargs = "/var/kerberos/database/slavesave"
  path = "/usr/lpp/ssp/kerberos/etc/kpropd"
  uid = 0
  auditid = 0
  standin = "/dev/null"
  standout = "/dev/console"
  standerr = "/dev/console"
  action = 1
  multi = 0
  contact = 2
  svrkey = 0
  svrmtype = 0
  priority = 20
  signorm = 15
  sigforce = 15
  display = 1
  waittime = 20
  grpname = ""

ksrvtgt

Purpose

ksrvtgt - Obtains a Kerberos Version 4 authentication ticket with a maximum allowed lifetime.

Syntax

ksrvtgt name instance [[ realm] srvtab]

Flags

None.

Operands

name
 
instance
 
realm
Specifies the principal as name.instance@realm (where realm defaults to the local realm defined in /etc/krb.conf).

srvtab
Specifies the service key file to use (defaults to /etc/krb-srvtab).

Description

The ksrvtgt command retrieves Kerberos Version 4 authentication with a maximum lifetime, decrypts the response using the service key found in the service key file, and stores the ticket in the ticket cache file. |When using SP authentication services, these tickets have an |unlimited lifetime.

This command is intended primarily for use in shell scripts and other batch-type facilities.

The KRBTKFILE environment variable is used to specify the ticket cache file used by ksrvtgt to store authentication tickets.

If Kerberos Version 4 is not an active authentication method for AIX remote commands, and Compatibility is not an active authentication method for SP trusted services, this command performs no function but returns successfully.

Environment Variables

KRBTKFILE
The pathname of the ticket cache file to use.

Files

/etc/krb.conf
Contains the name of the local realm and the names of the servers.

/etc/krb-srvtab
The default service key file.

Standard Error

Output consists of error messages, when the command cannot complete successfully.

Exit Values

0
Indicates the successful completion of the command.

1
Indicates that an error occurred.

Security

The ksrvtgt command can be run by any user who owns a service key file.

Location

/usr/kerberos/bin/ksrvtgt

Related Information

Commands: ksrvutil, k4destroy , k4init

Refer to the "RS/6000 SP files and other technical information" section of PSSP: Command and Technical Reference for additional Kerberos information.

ksrvutil

Purpose

ksrvutil - Manipulates a server Kerberos Version 4 key file.

Syntax

ksrvutil [-afs | -krb] [-k ] [ -i] [-f file_name] operation

Flags

-afs
Indicates that the Kerberos Version 4 authentication database is being managed by AFS, and that the key file should be constructed to work with AFS.

-krb
Indicates that the Kerberos Version 4 authentication database is being managed by a server compatible with the MIT version of Kerberos, and that the key file should be constructed to work with that version.

If neither -afs nor -krb are specified, the value of the System Data Repository (SDR) authent_server attribute is used. If the value of the SDR authent_server attribute cannot be obtained, the default is -krb.

-k
When specified for the list operation, keys are also displayed. For the change operation, the old and new keys are displayed. For the add operation, the key is displayed.

-i
Prompts for yes or no before changing each key.

-f
For all operations, specifies the server key file to update. The default is /etc/krb-srvtab.
Note:
Specification of a srvtab file other than the system default is not supported on the SP system.

Operands

operation
The operation must be one of the following:

list
Lists the version number and principal name in the server key file.

change
Changes all the keys in the server key file.

add
Adds a server principal name and key to the server key file. The command prompts for name, instance, realm, and key version number, and asks for a password. The ksrvutil command then converts the password to a key and appends the key file with the new information.

delete
Deletes keys in the key file. The user is prompted before deleting each key.

Description

The ksrvutil command allows an administrator to list or change keys currently in the key file or to add new keys to the key file.

The ksrvutil command always backs up the key file before making any changes. If ksrvutil is unsuccessful during a change or add operation, you can recover a usable key file by appending the workfile containing the new and changed keys, file_name.work to the backup copy or the original, file_name.old, and replacing the key file file_name with the result, for example:

cat /etc/krb-srvtab.old /etc/krb-srvtab.work >/etc/krb-srvtab

The recovered key file can be used, but it may contain some out-of-date keys.

Files

/etc/krb-srvtab
Default server key file.

Security

You must have root privilege to run this command.

Location

/usr/kerberos/bin/ksrvutil

Related Information

Commands: kadmin, ksrvtgt, rcmdtgt

kstash

Purpose

kstash - Saves the system's Kerberos Version 4 authentication master key.

Syntax

kstash

Flags

None.

Operands

None.

Description

The kstash command saves the system's Kerberos Version 4 authentication database master key in the master key cache file. The user is prompted to enter the master key (the same one as specified to kdb_init) to verify the authenticity of the key and authorize caching it.

Files

/.k
Master key cache file.

/var/kerberos/database/principal.pag, /var/kerberos/database/principal.dir
Files containing the authentication database.

Security

You must have root privilege to run this command.

Related Information

Command: kdb_init


[ Top of Page | Previous Page | Next Page | Table of Contents | Index ]