Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

keyserv(1m) [hpux man page]

keyserv(1M)															       keyserv(1M)

NAME
keyserv - server for storing private encryption keys SYNOPSIS
[ ] [ ] [ ] DESCRIPTION
is a daemon that is used for storing the private encryption keys of each user logged into the system. These encryption keys are used for accessing secure network services such as secure NFS. Normally, root's key is read from the file when the daemon is started. This is useful during power-fail reboots when no one is around to type a password. will not start up if the system does not have a secure RPC domain configured. The domain name can be set up by using the command. Invok- ing the command without arguments will display whether the user has a domain set up. The file contains the following default parameter settings. Specifies whether default keys for are used. The default value is is equivalent to the command-line option. Options Disable the use of default keys for Enable the use of default keys for This is the default behavior. Run in debugging mode and log all requests to to Root's secret key is not read from Instead, prompts the user for the password to decrypt root's key stored in the database and then stores the decrypted key in for future use. This option is useful if the file ever gets out-of-date or corrupted. WARNINGS
HP-UX 11i Version 2 is the last HP-UX release on which NIS+ is supported. LDAP is the recommended replacement for NIS+. HP fully supports the industry standard naming services based on LDAP. AUTHOR
was developed by Sun Microsystems, Inc. FILES
Contains root's key. Contains default settings. You can use command-line options to override these settings. Log file SEE ALSO
keylogin(1), keylogout(1), publickey(4). keyserv(1M)

Check Out this Related Man Page

KEYSERV(8)						    BSD System Manager's Manual 						KEYSERV(8)

NAME
keyserv -- server for storing private encryption keys SYNOPSIS
keyserv [-d] [-D] [-n] [-p path] [-v] DESCRIPTION
The keyserv utility is a daemon that is used for storing the private encryption keys of each user logged into the system. These encryption keys are used for accessing secure network services such as secure NFS. Normally, root's key is read from the file /etc/.rootkey when the daemon is started. This is useful during power-fail reboots when no one is around to type a password. If a client with no secret key calls keyserv, then the key of user nobody is used instead as the default key. The following options are available: -d Disable the use of default keys for nobody. -D Run in debugging mode and log all requests to keyserv. -n Root's secret key is not read from /etc/.rootkey. Instead, keyserv prompts the user for the password to decrypt root's key stored in the /etc/publickey database and then stores the decrypted key in /etc/.rootkey for future use. This option is useful if the /etc/.rootkey file ever gets out of date or corrupted. -p path Specify where to search for libdes.so.3. Default is /usr/lib. -v Display status of DES support (enabled/disabled). FILES
/etc/.rootkey /usr/lib/libdes.so.3 SEE ALSO
keylogin(1), keylogout(1), publickey(5) BSD
September 14, 1992 BSD
Man Page