+2002-06-17 Jen Selby <jenselby@mit.edu>
+
+ * klogind.M: documented the -D and -f options
+ * ksh.M: documented the -D and -L options
+ * rcp.M: documented the -c and -C options
+
2002-05-22 Ken Raeburn <raeburn@mit.edu>
* krlogin.c (oob): Loop reading data until we actually reach the
.SH SYNOPSIS
.B klogind
[
-.B \-kr54cpPe
+.B \-kr54cpPef
]
-[
-[ \fB\-w\fP[\fBip\fP|\fImaxhostlen\fP[\fB,\fP[\fBno\fP]\fBstriplocal\fP]] ]
+[[ \fB\-w\fP[\fBip\fP|\fImaxhostlen\fP[\fB,\fP[\fBno\fP]\fBstriplocal\fP ]] ]
+[ \fB\-D\fP \fIport\fP ]
.SH DESCRIPTION
.I Klogind
is the server for the
.PP
.I Klogind
-supports three options which are used for testing
+supports five options which are used for testing
purposes:
.IP \fB\-S\ keytab\fP 10
DO_NOT_USE_K_LOGIN was not defined when
.I klogind
was compiled.
+
+.IP \fB\-D\ port\fP
+Run in standalone mode, listening on \fBport\fP. The daemon will exit
+after one connection and will not background itself.
+
+.IP \fB\-f\fP
+Allows for standalone daemon operation. A new child is started for
+each incoming connection and waits for it to finish before accepting
+the next connection. This automagically figures out which port to bind
+to if no port is specified.
+
.SH DIAGNOSTICS
All diagnostic messages are returned on the connection
associated with the
.SH NAME
kshd \- kerberized remote shell server
.SH SYNOPSIS
-.B /usr/local/sbin/kshd -kr45ec
+.B /usr/local/sbin/kshd
+[
+.B \-kr45ec
+]
+[\fB\-D\fP \fIport\fP]
+[\fB\-L\fP \fIvariable\fP]
.SH DESCRIPTION
.I Krshd
is the server for the
Require the client to encrypt the connection. Only Kerberos5 clients
support encryption.
+.IP \fB\-L\ variable\fP
+Carry through the current value of the specified variable into the
+environment of the child. This option can be used to preserve up to
+four variables.
+
+
.IP \fB\-c\fP
Require Kerberos5 clients to present a cryptographic
checksum of initial connection information like the name of the user
If the \fB\-r\fP or \fB\-R\fP options are used, the client must
connect from a privileged port.
.PP
-\fIKrshd\fP supports four options which may be used for testing:
+\fIKrshd\fP supports six options which may be used for testing:
.IP \fB\-S\ keytab\fP 10
Set the \fIkeytab\fP file to use.
Use the argument to find the Kerberos binaries. Normally a compiled
in argument is used.
+.IP \fB\-D\ port \fP
+Run in standalone mode, listening on \fBport\fP. The daemon will exit
+after one connection and will not background itself.
+
.TP
\fB\-w \fP[\fBip\fP|\fImaxhostlen\fP[\fB,\fP[\fBno\fP]\fBstriplocal\fP]]
Controls the form of the remote hostname passed to login(1).
rcp \- remote file copy
.SH SYNOPSIS
.B rcp
-[\fB\-p\fP] [\fB\-x\fP] [\fB\-k\fP \fIrealm\fP ] [\fB\-D\fP \fIport\fP]
+[\fB\-p\fP] [\fB\-x\fP] [\fB\-k\fP \fIrealm\fP ] [\fB-c\fP \fIccachefile\fP] [\fB-C\fP \fIconfigfile\fP] [\fB\-D\fP \fIport\fP]
[\fB\-N\fP]
[\fB\-PN | \-PO\fP]
.I file1 file2
instead of the remote host's realm as determined by
.IR krb_realmofhost (3).
.TP
+\fB\-c\fP \fIccachefile\fP
+change the default credentials cache file to
+.I ccachefile
+.TP
+\fB\-C\fP \fIconfigfile\fP
+change the default configuation file to
+.I configfile
+.TP
.B \-r
if any of the source files are directories, copy each subtree rooted at
that name; in this case the destination must be a directory.