freebsd-nq/usr.sbin/keyserv/keyserv.8
Bill Paul 51251b2b3b Import of the keyserv daemon needed for Secure RPC.
This version supports both the keyserv v1 and v2 protocols. It uses the
new AF_LOCAL transport so that only local processes can use it for
storing/retrieving keys, and it uses the SCM_CREDS kernel hack for
authentication. With these two modifications, we don't need the keyenvoy
program normally used with RPC 4.0.

Note that if libdes.so.3.x is present on the system when keyserv
is started, Secure RPC will run with normal DES encryption. If not,
everything falls back to RC4 with a 40 bit key.
1997-05-28 15:44:22 +00:00

78 lines
1.8 KiB
Groff

.\" @(#)keyserv.1m 1.21 93/07/14 SMI; from SVr4
'\"macro stdmacro
.\" Copyright 1989 AT&T
.\" @(#)keyserv.8c 1.8 89/03/29 SMI;
.\".TH KEYSERV 8C "9 September 1987"
.nr X
.TH keyserv 1M "14 Sep 1992"
.SH NAME
keyserv \- server for storing private encryption keys
.SH SYNOPSIS
.B keyserv
[
.B \-d
] [
.B \-D
] [
.B \-n
]
.SH AVAILABILITY
.LP
SUNWcsu
.SH DESCRIPTION
.IX "keyserv" "" "\fLkeyserv\fP \(em server for storing private encryption keys"
.IX "NFS security" "server for storing private encryption keys" "" "server for storing private encryption keys \(em \fLkeyserv\fP"
.IX "encryption keys" "server for storing private keys" "" "server for storing private keys \(em \fLkeyserv\fP"
.LP
.B keyserv
is a daemon that is used for storing the
private encryption keys of each
user logged into the system.
These encryption keys are used for accessing
secure network services such as secure NFS.
.P
Normally, root's key is read from the file
.B /etc/.rootkey
when the daemon is started.
This is useful during power-fail reboots
when no one is around to type a password.
.P
If a client with no secret key calls
.BR keyserv ,
then the key of user
.B nobody
is used instead as the default key.
.SH OPTIONS
.TP 10
.B \-d
Disable the use of default keys for
.BR nobody .
.TP
.B \-D
Run in debugging mode and log all requests to
.BR keyserv .
.TP
.B \-n
Root's secret key is not read from
.BR /etc/.rootkey .
Instead,
.B keyserv
prompts the user for the password to decrypt
root's key stored in the
.B /etc/publickey
database and then stores the decrypted key in
.B /etc/.rootkey
for future use.
This option is useful if the
.B /etc/.rootkey
file ever gets out of date or corrupted.
.SH FILES
.PD 0
.TP 20
.B /etc/.rootkey
.PD
.SH "SEE ALSO"
.BR keylogin (1),
.BR keylogout (1),
.BR publickey (4)