Home
last modified time | relevance | path

Searched refs:Kerberos (Results 1 – 25 of 34) sorted by relevance

12

/OK3568_Linux_fs/buildroot/package/libkrb5/
H A DConfig.in10 Kerberos is a system for authenticating users and services
11 on a network. Kerberos is a trusted third-party service.
12 That means that there is a third party (the Kerberos server)
15 reference implementation of Kerberos V5.
/OK3568_Linux_fs/buildroot/system/skeleton/etc/
H A Dservices57 kerberos 88/tcp kerberos5 krb5 # Kerberos v5
58 kerberos 88/udp kerberos5 krb5 # Kerberos v5
166 kerberos-adm 749/tcp # Kerberos `kadmin' (v5)
213 # Kerberos (Project Athena/MIT) services
214 # Note that these are for Kerberos v4, and are unofficial. Sites running
217 kerberos4 750/udp kerberos-iv kdc # Kerberos (server) udp
218 kerberos4 750/tcp kerberos-iv kdc # Kerberos (server) tcp
219 kerberos_master 751/udp # Kerberos authentication
220 kerberos_master 751/tcp # Kerberos authentication
221 passwd_server 752/udp # Kerberos passwd server
[all …]
/OK3568_Linux_fs/kernel/net/sunrpc/
H A DKconfig20 tristate "Secure RPC: Kerberos V mechanism"
27 Choose Y here to enable Secure RPC using the Kerberos version 5
30 Secure RPC calls with Kerberos require an auxiliary user-space
33 Kerberos support should be installed.
38 bool "Secure RPC: Disable insecure Kerberos encryption types"
43 with the Kerberos version 5 GSS-API mechanism (RFC 1964). The
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-connectivity/krb5/
H A Dkrb5_1.17.2.bb2 DESCRIPTION = "Kerberos is a system for authenticating users and services on a network. \
3 Kerberos is a trusted third-party service. That means that there is a \
4 third party (the Kerberos server) that is trusted by all the entities on \
7 This is the MIT reference implementation of Kerberos V5. \
9 This package contains the Kerberos key server (KDC). The KDC manages all \
10 authentication credentials for a Kerberos realm, holds the master keys \
14 HOMEPAGE = "http://web.mit.edu/Kerberos/"
/OK3568_Linux_fs/kernel/fs/cifs/
H A DKconfig42 session establishment via Kerberos or NTLM or NTLMv2, RDMA
90 (since 1997) support stronger NTLM (and even NTLMv2 and Kerberos)
113 bool "Kerberos/SPNEGO advanced session setup"
118 utilities to provide SPNEGO packaged (RFC 4178) Kerberos tickets
120 secure Kerberos authentication is required). If unsure, say Y.
H A Dfs_context.c135 vol->sectype = Kerberos; in cifs_parse_security_flavors()
H A Dsess.c799 case Kerberos: in cifs_select_sectype()
808 return Kerberos; in cifs_select_sectype()
1708 case Kerberos: in select_sec()
H A Dcifsglob.h126 Kerberos, /* Kerberos via SPNEGO */ enumerator
2016 case Kerberos: in get_security_type_str()
H A Dcifsfs.c424 case Kerberos: in cifs_show_security()
439 if (ses->sectype == Kerberos) in cifs_show_security()
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-connectivity/krb5/krb5/
H A Dkrb5-kdc.service2 Description=MIT Kerberos KDC
H A Dkrb5-admin-server.service2 Description=MIT Kerberos KDC administrative daemon
H A DCVE-2022-42898.patch16 privileged attacker may similarly be able to cause a Kerberos or GSS
20 or Kerberos application server process. An attacker with the
H A Ddebian-suppress-usr-lib-in-krb5-config.patch25 echo " krb5 Kerberos 5 application"
/OK3568_Linux_fs/kernel/Documentation/filesystems/nfs/
H A Drpc-server-gss.rst57 In some Kerberos deployment GSSAPI tokens can be quite big, up and
59 the Kerberos tickets, that needs to be sent through the GSS layer in
/OK3568_Linux_fs/yocto/poky/meta/recipes-extended/pam/libpam/pam.d/
H A Dcommon-auth7 # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the
/OK3568_Linux_fs/kernel/security/keys/
H A DKconfig47 primarily aimed at Kerberos key storage. The keyrings are persistent
66 (for example Kerberos ticket caches). The data may be stored out to
/OK3568_Linux_fs/kernel/net/rxrpc/
H A DKconfig48 bool "RxRPC Kerberos security"
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-dbs/postgresql/files/
H A D0001-Properly-NULL-terminate-GSS-receive-buffer-on-error-.patch17 completed yet, this could be abused by an attacker without Kerberos
/OK3568_Linux_fs/buildroot/board/forlinx/ok3568/fs-overlay/etc/ssh/
H A Dsshd_config63 # Kerberos options
/OK3568_Linux_fs/buildroot/board/rockchip/rk3566_rk3568/fs-overlay/etc/ssh/
H A Dsshd_config63 # Kerberos options
/OK3568_Linux_fs/yocto/poky/meta/recipes-connectivity/openssh/openssh/
H A Dsshd_config64 # Kerberos options
/OK3568_Linux_fs/kernel/Documentation/security/keys/
H A Drequest-key.rst104 Kerberos TGT key). It just requests the appropriate key, and the keyring
113 Kerberos server using the TGT) and then instantiates key U.
/OK3568_Linux_fs/kernel/Documentation/admin-guide/cifs/
H A Dauthors.rst47 - Jeff Layton (many, many fixes, as well as great work on the cifs Kerberos code)
H A Dusage.rst671 Use Kerberos version 5 authentication
673 Use Kerberos authentication and packet signing
752 may use Kerberos security 0x00008
753 must use Kerberos 0x08008
830 Enabling Kerberos (extended security) works but requires version 1.2 or later
835 cifs.upcall helper program), instead of using Kerberos, is sufficient for
847 To use cifs Kerberos and DFS support, the Linux keyutils package should be
/OK3568_Linux_fs/yocto/poky/meta/recipes-connectivity/openssh/
H A Dopenssh_8.9p1.bb36 # and when running in a Kerberos environment. As such it is not relevant to OpenEmbedded

12