| /OK3568_Linux_fs/buildroot/package/libkrb5/ |
| H A D | Config.in | 10 Kerberos is a system for authenticating users and services 11 on a network. Kerberos is a trusted third-party service. 12 That means that there is a third party (the Kerberos server) 15 reference implementation of Kerberos V5.
|
| /OK3568_Linux_fs/buildroot/system/skeleton/etc/ |
| H A D | services | 57 kerberos 88/tcp kerberos5 krb5 # Kerberos v5 58 kerberos 88/udp kerberos5 krb5 # Kerberos v5 166 kerberos-adm 749/tcp # Kerberos `kadmin' (v5) 213 # Kerberos (Project Athena/MIT) services 214 # Note that these are for Kerberos v4, and are unofficial. Sites running 217 kerberos4 750/udp kerberos-iv kdc # Kerberos (server) udp 218 kerberos4 750/tcp kerberos-iv kdc # Kerberos (server) tcp 219 kerberos_master 751/udp # Kerberos authentication 220 kerberos_master 751/tcp # Kerberos authentication 221 passwd_server 752/udp # Kerberos passwd server [all …]
|
| /OK3568_Linux_fs/kernel/net/sunrpc/ |
| H A D | Kconfig | 20 tristate "Secure RPC: Kerberos V mechanism" 27 Choose Y here to enable Secure RPC using the Kerberos version 5 30 Secure RPC calls with Kerberos require an auxiliary user-space 33 Kerberos support should be installed. 38 bool "Secure RPC: Disable insecure Kerberos encryption types" 43 with the Kerberos version 5 GSS-API mechanism (RFC 1964). The
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-connectivity/krb5/ |
| H A D | krb5_1.17.2.bb | 2 DESCRIPTION = "Kerberos is a system for authenticating users and services on a network. \ 3 Kerberos is a trusted third-party service. That means that there is a \ 4 third party (the Kerberos server) that is trusted by all the entities on \ 7 This is the MIT reference implementation of Kerberos V5. \ 9 This package contains the Kerberos key server (KDC). The KDC manages all \ 10 authentication credentials for a Kerberos realm, holds the master keys \ 14 HOMEPAGE = "http://web.mit.edu/Kerberos/"
|
| /OK3568_Linux_fs/kernel/fs/cifs/ |
| H A D | Kconfig | 42 session establishment via Kerberos or NTLM or NTLMv2, RDMA 90 (since 1997) support stronger NTLM (and even NTLMv2 and Kerberos) 113 bool "Kerberos/SPNEGO advanced session setup" 118 utilities to provide SPNEGO packaged (RFC 4178) Kerberos tickets 120 secure Kerberos authentication is required). If unsure, say Y.
|
| H A D | fs_context.c | 135 vol->sectype = Kerberos; in cifs_parse_security_flavors()
|
| H A D | sess.c | 799 case Kerberos: in cifs_select_sectype() 808 return Kerberos; in cifs_select_sectype() 1708 case Kerberos: in select_sec()
|
| H A D | cifsglob.h | 126 Kerberos, /* Kerberos via SPNEGO */ enumerator 2016 case Kerberos: in get_security_type_str()
|
| H A D | cifsfs.c | 424 case Kerberos: in cifs_show_security() 439 if (ses->sectype == Kerberos) in cifs_show_security()
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-connectivity/krb5/krb5/ |
| H A D | krb5-kdc.service | 2 Description=MIT Kerberos KDC
|
| H A D | krb5-admin-server.service | 2 Description=MIT Kerberos KDC administrative daemon
|
| H A D | CVE-2022-42898.patch | 16 privileged attacker may similarly be able to cause a Kerberos or GSS 20 or Kerberos application server process. An attacker with the
|
| H A D | debian-suppress-usr-lib-in-krb5-config.patch | 25 echo " krb5 Kerberos 5 application"
|
| /OK3568_Linux_fs/kernel/Documentation/filesystems/nfs/ |
| H A D | rpc-server-gss.rst | 57 In some Kerberos deployment GSSAPI tokens can be quite big, up and 59 the Kerberos tickets, that needs to be sent through the GSS layer in
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/pam/libpam/pam.d/ |
| H A D | common-auth | 7 # (e.g., /etc/shadow, LDAP, Kerberos, etc.). The default is to use the
|
| /OK3568_Linux_fs/kernel/security/keys/ |
| H A D | Kconfig | 47 primarily aimed at Kerberos key storage. The keyrings are persistent 66 (for example Kerberos ticket caches). The data may be stored out to
|
| /OK3568_Linux_fs/kernel/net/rxrpc/ |
| H A D | Kconfig | 48 bool "RxRPC Kerberos security"
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-dbs/postgresql/files/ |
| H A D | 0001-Properly-NULL-terminate-GSS-receive-buffer-on-error-.patch | 17 completed yet, this could be abused by an attacker without Kerberos
|
| /OK3568_Linux_fs/buildroot/board/forlinx/ok3568/fs-overlay/etc/ssh/ |
| H A D | sshd_config | 63 # Kerberos options
|
| /OK3568_Linux_fs/buildroot/board/rockchip/rk3566_rk3568/fs-overlay/etc/ssh/ |
| H A D | sshd_config | 63 # Kerberos options
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-connectivity/openssh/openssh/ |
| H A D | sshd_config | 64 # Kerberos options
|
| /OK3568_Linux_fs/kernel/Documentation/security/keys/ |
| H A D | request-key.rst | 104 Kerberos TGT key). It just requests the appropriate key, and the keyring 113 Kerberos server using the TGT) and then instantiates key U.
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/cifs/ |
| H A D | authors.rst | 47 - Jeff Layton (many, many fixes, as well as great work on the cifs Kerberos code)
|
| H A D | usage.rst | 671 Use Kerberos version 5 authentication 673 Use Kerberos authentication and packet signing 752 may use Kerberos security 0x00008 753 must use Kerberos 0x08008 830 Enabling Kerberos (extended security) works but requires version 1.2 or later 835 cifs.upcall helper program), instead of using Kerberos, is sufficient for 847 To use cifs Kerberos and DFS support, the Linux keyutils package should be
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-connectivity/openssh/ |
| H A D | openssh_8.9p1.bb | 36 # and when running in a Kerberos environment. As such it is not relevant to OpenEmbedded
|