Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

ext_srvtab(8krb) [ultrix man page]

ext_srvtab(8krb)														  ext_srvtab(8krb)

Name
       ext_srvtab - extracts service key files.

Syntax
       /var/dss/kerberos/bin/ext_srvtab [-n] [hostname ...]

Arguments
       hostname Name of the service key file.

Description
       The  utility  extracts  service	key files from the Kerberos database.  When you invoke the utility, it prompts you to enter the master key
       string for the database.  If the -n option is specified, ext_srvtab fetches the master key from the master key cache file, produced by

       For each hostname that you specify in the command line, ext_srvtab creates the service key file hostname-new-srvtab. This file contains all
       the  entries in the Kerberos database with an instance field that matches hostname.  In addition, the hostname-new-srvtab file contains all
       the keys registered for Kerberos services that can run on the host specified in hostname.

Options
       -n     Causes ext_srvtab utility to fetch the master key from the master key cache file.

Files
See Also
       kdb_edit(8krb), kdb_init(8krb), kdb_util(8krb), kdb_destroy(8krb)

																  ext_srvtab(8krb)

Check Out this Related Man Page

kdb_util(8krb)															    kdb_util(8krb)

Name
       kdb_util - Kerberos database utility

Syntax
       /var/dss/kerberos/bin/kdb_util operation filename [ database ]

Arguments
       operation
		Function to perform on the database. The operation argument must be one of the following values:

		load   Converts the database in file filename, to format and overwrites the database specified.

		dump   Converts the database into form, and writes the result to file, filename.

		slave_dump
		       Performs  the same function as dump, and creates the file when finished.  The is used by to determine if a slave_dump is in
		       progress, or if it did not complete successfully.

		new_master_key
		       Prompts you for the old key of the Kerberos database as well as a new master key.  It converts  the  database  into  format
		       and,  at the same time, decrypts those sections of the database encrypted with the old master key and re-encrypts them with
		       the new master key.  The result is written to the file, filename.

       filename The name of the source file for the load operation or the destination file for the  operations:  dump,	slave_dump,  and  new_mas-
		ter_key.

       database The name of the database.  If the argument is not included, the Kerberos database is stored in files and by default.

Description
       The  command  allows  the Kerberos administrator to perform several functions on the entire Kerberos database of a master or slave Kerberos
       server in one operation.  The database argument specifies the name of the Kerberos database.  The Kerberos database utility reads from  and
       writes to the Kerberos database and, in addition, it reads from and writes to a file in format:	 filename.  A file is an ASCII representa-
       tion of a Kerberos database.  The functions that can be specified by the operation argument are listed in the Arguments section.

       Whenever the Kerberos database is changed by the modification time of is updated.  The file indicates the age of the database.

Files
       See Also
	      krb_dbase(5krb), kdb_init(8krb), kdb_edit(8krb), kdb_destroy(8krb), kstash(8krb)

																    kdb_util(8krb)
Man Page

5 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

A short history of UNIX by l.madden@ic.ac.uk

<h1>A short history of UNIX</h1> <p>In the late 1960's Ken Thompsom joined the computing-science research group at Bell Laboratories, which is the research arm of the giant American corporation ATT. He and many colleagues had been collaborating with MIT and GE on the development of an... (0 Replies)
Discussion started by: Neo
0 Replies

2. Answers to Frequently Asked Questions

Lost root password / Can't login as root

We have quite a few threads about this subject. I have collected some of them and arranged them by the OS which is primarily discussed in the thread. That is because the exact procedure depends on the OS involved. What's more, since you often need to interact with the boot process, the... (0 Replies)
Discussion started by: Perderabo
0 Replies

3. Programming

How do you detect keystrokes in canonical mode?

I'm writing a command shell, and I want to be able to detect when the user presses an arrow key (otherwise it just prints [[A, [[B, etc.). I know it's relatively easy (although somewhat more time-consuming) to detect keystrokes in noncanonical mode, but I've noticed that the bash shell detects... (4 Replies)
Discussion started by: Ultrix
4 Replies

4. UNIX for Dummies Questions & Answers

Linux (Ubuntu) = Unix (NOT IMPORTANT - NO RUSH)

I'm learning off Linux (Ubuntu) right now. I want to move up to Unix, but I don't want to rush like I did when it came to Windows --> to Linux. What is the best Unix OS that fits in pretty well with Ubuntu. In other words is there kind of an equal Linux with Unix? Also what do I need to... (10 Replies)
Discussion started by: Linux_Guy
10 Replies

5. IP Networking

Can I change my hostname without messing things up?

I noticed my hostname is <my-full-name>s-macbook.local. I'm not sure exactly what information leaves the local network, and whether the hostname is included, but if it is, this would mean people on the Internet can look at my hostname and see who I am. Before anyone says that's not possible,... (4 Replies)
Discussion started by: Ultrix
4 Replies