From: Jen Selby Date: Wed, 7 Aug 2002 20:45:54 +0000 (+0000) Subject: * klogind.M, kshd.M, login.M: changed manual sections 8c, 1c, and X-Git-Tag: krb5-1.3-alpha1~536 X-Git-Url: http://git.tremily.us/?a=commitdiff_plain;h=974c122572ec056a3ba2a8f2c7e962fcf821d2d3;p=krb5.git * klogind.M, kshd.M, login.M: changed manual sections 8c, 1c, and 3x to 8, 1, and 3, respectively * rcp.M, rlogin.M, rsh.M: added references to the server manpages git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@14683 dc483132-0cff-0310-8789-dd5450dbe970 --- diff --git a/src/appl/bsd/ChangeLog b/src/appl/bsd/ChangeLog index 4266d4c46..c0ac62abe 100644 --- a/src/appl/bsd/ChangeLog +++ b/src/appl/bsd/ChangeLog @@ -1,3 +1,9 @@ +2002-08-07 Jen Selby + + * klogind.M, kshd.M, login.M: changed manual sections 8c, 1c, and + 3x to 8, 1, and 3, respectively + * rcp.M, rlogin.M, rsh.M: added references to the server manpages + 2002-07-12 Ken Raeburn * v4rcp.c: Include port-sockets.h. diff --git a/src/appl/bsd/klogind.M b/src/appl/bsd/klogind.M index b4e88f873..a05406a74 100644 --- a/src/appl/bsd/klogind.M +++ b/src/appl/bsd/klogind.M @@ -2,9 +2,9 @@ .\" All rights reserved. The Berkeley software License Agreement .\" specifies the terms and conditions for redistribution. .\" -.\" @(#)rlogind.8c 6.3 (Berkeley) 5/24/86 +.\" @(#)rlogind.8 6.3 (Berkeley) 5/24/86 .\" -.TH KLOGIND 8C +.TH KLOGIND 8 .SH NAME klogind \- remote login server .SH SYNOPSIS @@ -17,13 +17,13 @@ klogind \- remote login server .SH DESCRIPTION .I Klogind is the server for the -.IR rlogin (1C) +.IR rlogin (1) program. The server is -based on rlogind(8C) but uses Kerberos authentication. +based on rlogind(8) but uses Kerberos authentication. .PP The .I klogind -server is invoked by \fIinetd(8c)\fP when it receives a connection on +server is invoked by \fIinetd(8)\fP when it receives a connection on the port indicated in /etc/inetd.conf. A typical /etc/inetd.conf configuration line for \fIklogind\fP might be: @@ -117,7 +117,7 @@ client is connecting from a privileged port, before allowing login. The parent of the login process manipulates the master side of the pseduo terminal, operating as an intermediary between the login process and the client instance of the -.I rlogin(1C) +.I rlogin(1) program. In normal operation, the packet protocol described in .IR pty (4) is invoked to provide ^S/^Q type facilities and propagate interrupt @@ -191,6 +191,6 @@ by the server failed. .br The user's login shell could not be started. .SH SEE ALSO -rlogind(8C), rlogin(1C) +rlogind(8), rlogin(1) .SH BUGS A more extensible protocol should be used. diff --git a/src/appl/bsd/kshd.M b/src/appl/bsd/kshd.M index ac418e6a1..6e2efdb2b 100644 --- a/src/appl/bsd/kshd.M +++ b/src/appl/bsd/kshd.M @@ -2,9 +2,9 @@ .\" All rights reserved. The Berkeley software License Agreement .\" specifies the terms and conditions for redistribution. .\" -.\" @(#)rshd.8c 6.3 (Berkeley) 5/24/86 +.\" @(#)rshd.8 6.3 (Berkeley) 5/24/86 .\" -.TH KRSHD 8C +.TH KRSHD 8 .SH NAME kshd \- kerberized remote shell server .SH SYNOPSIS @@ -17,9 +17,9 @@ kshd \- kerberized remote shell server .SH DESCRIPTION .I Krshd is the server for the -.IR rcmd (3X) +.IR rcmd (3) routine and, consequently, for the -.IR rsh (1C) +.IR rsh (1) program. The server provides remote execution facilities with authentication based on privileged port numbers from trusted hosts or the Kerberos authentication system. @@ -200,8 +200,8 @@ on the connection associated with the .BR stderr , and is not preceded by a flag byte. .SH SEE ALSO -rshd(8C), rsh(1C), -rcmd(3X) +rshd(8), rsh(1), +rcmd(3) .SH BUGS A facility to allow all data exchanges to be encrypted should be present. diff --git a/src/appl/bsd/login.M b/src/appl/bsd/login.M index 09d213e60..0fceb3529 100644 --- a/src/appl/bsd/login.M +++ b/src/appl/bsd/login.M @@ -1,6 +1,6 @@ .\" login.1 .\" -.TH LOGIN 8C +.TH LOGIN 8 .SH NAME login.krb5 \- kerberos enhanced login program .SH SYNOPSIS @@ -91,7 +91,7 @@ associated with .BR stderr. .PP .SH SEE ALSO -rlogind(8C), rlogin(1C), telnetd(8c) +rlogind(8), rlogin(1), telnetd(8) .SH BUGS Should use a config file to select use of V5, V4, and AFS, as well as policy for startup. diff --git a/src/appl/bsd/rcp.M b/src/appl/bsd/rcp.M index 05c3a72c5..a388e80ed 100644 --- a/src/appl/bsd/rcp.M +++ b/src/appl/bsd/rcp.M @@ -145,7 +145,7 @@ rather than the current user name on the remote host. (on remote host) - file containing Kerberos principals that are allowed access. .SH SEE ALSO -cp(1), ftp(1), rsh(1), rlogin(1), kerberos(3), krb_getrealm(3), rcp(1) +cp(1), ftp(1), rsh(1), rlogin(1), kerberos(3), krb_getrealm(3), kshd(8), rcp(1) [UCB version] .SH BUGS .B Rcp diff --git a/src/appl/bsd/rlogin.M b/src/appl/bsd/rlogin.M index da0e8d724..97b2a8e7d 100644 --- a/src/appl/bsd/rlogin.M +++ b/src/appl/bsd/rlogin.M @@ -150,7 +150,7 @@ simple heuristics are used to guess which to try. Use Kerberos V4 authentication only; don't try Kerberos V5. .SH SEE ALSO rsh(1), kerberos(3), krb_sendauth(3), krb_realmofhost(3), rlogin(1) [UCB -version] +version], klogind(8) .SH FILES .TP "\w'~/\&.k5login\ \ 'u" ~/\&.k5login diff --git a/src/appl/bsd/rsh.M b/src/appl/bsd/rsh.M index cefd00384..ce0ebfb20 100644 --- a/src/appl/bsd/rsh.M +++ b/src/appl/bsd/rsh.M @@ -17,7 +17,7 @@ .\" .\" @(#)rsh.1 6.2 (Berkeley) 9/20/88 .\" " -.TH RSH +.TH RSH 1 .SH NAME rsh \- remote shell .SH SYNOPSIS @@ -147,7 +147,7 @@ to (on remote host) - file containing Kerberos principals that are allowed access. .SH SEE ALSO -rlogin(1), kerberos(3), krb_sendauth(3), krb_realmofhost(3) +rlogin(1), kerberos(3), krb_sendauth(3), krb_realmofhost(3), kshd(8) .SH BUGS If you are using .IR csh (1)