diff options
Diffstat (limited to 'doc/html/mitK5features.html')
| -rw-r--r-- | doc/html/mitK5features.html | 459 |
1 files changed, 459 insertions, 0 deletions
diff --git a/doc/html/mitK5features.html b/doc/html/mitK5features.html new file mode 100644 index 000000000000..7fa633c6c643 --- /dev/null +++ b/doc/html/mitK5features.html @@ -0,0 +1,459 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> + + +<html xmlns="http://www.w3.org/1999/xhtml"> + <head> + <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> + + <title>MIT Kerberos features — MIT Kerberos Documentation</title> + + <link rel="stylesheet" href="_static/agogo.css" type="text/css" /> + <link rel="stylesheet" href="_static/pygments.css" type="text/css" /> + <link rel="stylesheet" href="_static/kerb.css" type="text/css" /> + + <script type="text/javascript"> + var DOCUMENTATION_OPTIONS = { + URL_ROOT: './', + VERSION: '1.15.1', + COLLAPSE_INDEX: false, + FILE_SUFFIX: '.html', + HAS_SOURCE: true + }; + </script> + <script type="text/javascript" src="_static/jquery.js"></script> + <script type="text/javascript" src="_static/underscore.js"></script> + <script type="text/javascript" src="_static/doctools.js"></script> + <link rel="author" title="About these documents" href="about.html" /> + <link rel="copyright" title="Copyright" href="copyright.html" /> + <link rel="top" title="MIT Kerberos Documentation" href="index.html" /> + <link rel="next" title="MIT Kerberos License information" href="mitK5license.html" /> + <link rel="prev" title="KDC cookie format" href="formats/cookie.html" /> + </head> + <body> + <div class="header-wrapper"> + <div class="header"> + + + <h1><a href="index.html">MIT Kerberos Documentation</a></h1> + + <div class="rel"> + + <a href="index.html" title="Full Table of Contents" + accesskey="C">Contents</a> | + <a href="formats/cookie.html" title="KDC cookie format" + accesskey="P">previous</a> | + <a href="mitK5license.html" title="MIT Kerberos License information" + accesskey="N">next</a> | + <a href="genindex.html" title="General Index" + accesskey="I">index</a> | + <a href="search.html" title="Enter search criteria" + accesskey="S">Search</a> | + <a href="mailto:krb5-bugs@mit.edu?subject=Documentation__MIT Kerberos features">feedback</a> + </div> + </div> + </div> + + <div class="content-wrapper"> + <div class="content"> + <div class="document"> + + <div class="documentwrapper"> + <div class="bodywrapper"> + <div class="body"> + + <div class="toctree-wrapper compound"> +</div> +<div class="section" id="mit-kerberos-features"> +<span id="mitk5features"></span><h1>MIT Kerberos features<a class="headerlink" href="#mit-kerberos-features" title="Permalink to this headline">¶</a></h1> +<p><a class="reference external" href="http://web.mit.edu/kerberos">http://web.mit.edu/kerberos</a></p> +<div class="section" id="quick-facts"> +<h2>Quick facts<a class="headerlink" href="#quick-facts" title="Permalink to this headline">¶</a></h2> +<p>License - <a class="reference internal" href="mitK5license.html#mitk5license"><em>MIT Kerberos License information</em></a></p> +<dl class="docutils"> +<dt>Releases:</dt> +<dd><ul class="first last simple"> +<li>Latest stable: <a class="reference external" href="http://web.mit.edu/kerberos/krb5-1.15/">http://web.mit.edu/kerberos/krb5-1.15/</a></li> +<li>Supported: <a class="reference external" href="http://web.mit.edu/kerberos/krb5-1.14/">http://web.mit.edu/kerberos/krb5-1.14/</a></li> +<li>Release cycle: 9 – 12 months</li> +</ul> +</dd> +<dt>Supported platforms / OS distributions:</dt> +<dd><ul class="first last simple"> +<li>Windows (KfW 4.0): Windows 7, Vista, XP</li> +<li>Solaris: SPARC, x86_64/x86</li> +<li>GNU/Linux: Debian x86_64/x86, Ubuntu x86_64/x86, RedHat x86_64/x86</li> +<li>BSD: NetBSD x86_64/x86</li> +</ul> +</dd> +<dt>Crypto backends:</dt> +<dd><ul class="first last simple"> +<li>builtin - MIT Kerberos native crypto library</li> +<li>OpenSSL (1.0+) - <a class="reference external" href="http://www.openssl.org">http://www.openssl.org</a></li> +</ul> +</dd> +</dl> +<p>Database backends: LDAP, DB2</p> +<p>krb4 support: Kerberos 5 release < 1.8</p> +<p>DES support: configurable (See <a class="reference internal" href="admin/advanced/retiring-des.html#retiring-des"><em>Retiring DES</em></a>)</p> +</div> +<div class="section" id="interoperability"> +<h2>Interoperability<a class="headerlink" href="#interoperability" title="Permalink to this headline">¶</a></h2> +<p><cite>Microsoft</cite></p> +<p>Starting from release 1.7:</p> +<ul class="simple"> +<li>Follow client principal referrals in the client library when +obtaining initial tickets.</li> +<li>KDC can issue realm referrals for service principals based on domain names.</li> +<li>Extensions supporting DCE RPC, including three-leg GSS context setup +and unencapsulated GSS tokens inside SPNEGO.</li> +<li>Microsoft GSS_WrapEX, implemented using the gss_iov API, which is +similar to the equivalent SSPI functionality. This is needed to +support some instances of DCE RPC.</li> +<li>NTLM recognition support in GSS-API, to facilitate dropping in an +NTLM implementation for improved compatibility with older releases +of Microsoft Windows.</li> +<li>KDC support for principal aliases, if the back end supports them. +Currently, only the LDAP back end supports aliases.</li> +<li>Support Microsoft set/change password (<span class="target" id="index-0"></span><a class="rfc reference external" href="http://tools.ietf.org/html/rfc3244.html"><strong>RFC 3244</strong></a>) protocol in +kadmind.</li> +<li>Implement client and KDC support for GSS_C_DELEG_POLICY_FLAG, which +allows a GSS application to request credential delegation only if +permitted by KDC policy.</li> +</ul> +<p>Starting from release 1.8:</p> +<ul class="simple"> +<li>Microsoft Services for User (S4U) compatibility</li> +</ul> +<p><cite>Heimdal</cite></p> +<ul class="simple"> +<li>Support for KCM credential cache starting from release 1.13</li> +</ul> +</div> +<div class="section" id="feature-list"> +<h2>Feature list<a class="headerlink" href="#feature-list" title="Permalink to this headline">¶</a></h2> +<p>For more information on the specific project see <a class="reference external" href="http://k5wiki.kerberos.org/wiki/Projects">http://k5wiki.kerberos.org/wiki/Projects</a></p> +<dl class="docutils"> +<dt>Release 1.7</dt> +<dd><ul class="first last simple"> +<li>Credentials delegation <span class="target" id="index-1"></span><a class="rfc reference external" href="http://tools.ietf.org/html/rfc5896.html"><strong>RFC 5896</strong></a></li> +<li>Cross-realm authentication and referrals <span class="target" id="index-2"></span><a class="rfc reference external" href="http://tools.ietf.org/html/rfc6806.html"><strong>RFC 6806</strong></a></li> +<li>Master key migration</li> +<li>PKINIT <span class="target" id="index-3"></span><a class="rfc reference external" href="http://tools.ietf.org/html/rfc4556.html"><strong>RFC 4556</strong></a> <a class="reference internal" href="admin/pkinit.html#pkinit"><em>PKINIT configuration</em></a></li> +</ul> +</dd> +<dt>Release 1.8</dt> +<dd><ul class="first last simple"> +<li>Anonymous PKINIT <span class="target" id="index-4"></span><a class="rfc reference external" href="http://tools.ietf.org/html/rfc6112.html"><strong>RFC 6112</strong></a> <a class="reference internal" href="admin/pkinit.html#anonymous-pkinit"><em>Anonymous PKINIT</em></a></li> +<li>Constrained delegation</li> +<li>IAKERB <a class="reference external" href="http://tools.ietf.org/html/draft-ietf-krb-wg-iakerb-02">http://tools.ietf.org/html/draft-ietf-krb-wg-iakerb-02</a></li> +<li>Heimdal bridge plugin for KDC backend</li> +<li>GSS-API S4U extensions <a class="reference external" href="http://msdn.microsoft.com/en-us/library/cc246071">http://msdn.microsoft.com/en-us/library/cc246071</a></li> +<li>GSS-API naming extensions <span class="target" id="index-5"></span><a class="rfc reference external" href="http://tools.ietf.org/html/rfc6680.html"><strong>RFC 6680</strong></a></li> +<li>GSS-API extensions for storing delegated credentials <span class="target" id="index-6"></span><a class="rfc reference external" href="http://tools.ietf.org/html/rfc5588.html"><strong>RFC 5588</strong></a></li> +</ul> +</dd> +<dt>Release 1.9</dt> +<dd><ul class="first last simple"> +<li>Advance warning on password expiry</li> +<li>Camellia encryption (CTS-CMAC mode) <span class="target" id="index-7"></span><a class="rfc reference external" href="http://tools.ietf.org/html/rfc6803.html"><strong>RFC 6803</strong></a></li> +<li>KDC support for SecurID preauthentication</li> +<li>kadmin over IPv6</li> +<li>Trace logging <a class="reference internal" href="admin/troubleshoot.html#trace-logging"><em>Trace logging</em></a></li> +<li>GSSAPI/KRB5 multi-realm support</li> +<li>Plugin to test password quality <a class="reference internal" href="plugindev/pwqual.html#pwqual-plugin"><em>Password quality interface (pwqual)</em></a></li> +<li>Plugin to synchronize password changes <a class="reference internal" href="plugindev/kadm5_hook.html#kadm5-hook-plugin"><em>KADM5 hook interface (kadm5_hook)</em></a></li> +<li>Parallel KDC</li> +<li>GSS-API extentions for SASL GS2 bridge <span class="target" id="index-8"></span><a class="rfc reference external" href="http://tools.ietf.org/html/rfc5801.html"><strong>RFC 5801</strong></a> <span class="target" id="index-9"></span><a class="rfc reference external" href="http://tools.ietf.org/html/rfc5587.html"><strong>RFC 5587</strong></a></li> +<li>Purging old keys</li> +<li>Naming extensions for delegation chain</li> +<li>Password expiration API</li> +<li>Windows client support (build-only)</li> +<li>IPv6 support in iprop</li> +</ul> +</dd> +<dt>Release 1.10</dt> +<dd><ul class="first last simple"> +<li>Plugin interface for configuration <a class="reference internal" href="plugindev/profile.html#profile-plugin"><em>Configuration interface (profile)</em></a></li> +<li>Credentials for multiple identities <a class="reference internal" href="plugindev/ccselect.html#ccselect-plugin"><em>Credential cache selection interface (ccselect)</em></a></li> +</ul> +</dd> +<dt>Release 1.11</dt> +<dd><ul class="first last simple"> +<li>Client support for FAST OTP <span class="target" id="index-10"></span><a class="rfc reference external" href="http://tools.ietf.org/html/rfc6560.html"><strong>RFC 6560</strong></a></li> +<li>GSS-API extensions for credential locations</li> +<li>Responder mechanism</li> +</ul> +</dd> +<dt>Release 1.12</dt> +<dd><ul class="first last simple"> +<li>Plugin to control krb5_aname_to_localname and krb5_kuserok behavior <a class="reference internal" href="plugindev/localauth.html#localauth-plugin"><em>Local authorization interface (localauth)</em></a></li> +<li>Plugin to control hostname-to-realm mappings and the default realm <a class="reference internal" href="plugindev/hostrealm.html#hostrealm-plugin"><em>Host-to-realm interface (hostrealm)</em></a></li> +<li>GSSAPI extensions for constructing MIC tokens using IOV lists <a class="reference internal" href="appdev/gssapi.html#gssapi-mic-token"><em>IOV MIC tokens</em></a></li> +<li>Principal may refer to nonexistent policies <a class="reference external" href="http://k5wiki.kerberos.org/wiki/Projects/Policy_refcount_elimination">Policy Refcount project</a></li> +<li>Support for having no long-term keys for a principal <a class="reference external" href="http://k5wiki.kerberos.org/wiki/Projects/Principals_without_keys">Principals Without Keys project</a></li> +<li>Collection support to the KEYRING credential cache type on Linux <a class="reference internal" href="basic/ccache_def.html#ccache-definition"><em>Credential cache</em></a></li> +<li>FAST OTP preauthentication module for the KDC which uses RADIUS to validate OTP token values <a class="reference internal" href="admin/otp.html#otp-preauth"><em>OTP Preauthentication</em></a></li> +<li>Experimental Audit plugin for KDC processing <a class="reference external" href="http://k5wiki.kerberos.org/wiki/Projects/Audit">Audit project</a></li> +</ul> +</dd> +</dl> +<p>Release 1.13</p> +<blockquote> +<div><ul class="simple"> +<li>Add support for accessing KDCs via an HTTPS proxy server using +the <a class="reference external" href="http://msdn.microsoft.com/en-us/library/hh553774.aspx">MS-KKDCP</a> +protocol.</li> +<li>Add support for <a class="reference external" href="http://k5wiki.kerberos.org/wiki/Projects/Hierarchical_iprop">hierarchical incremental propagation</a>, +where slaves can act as intermediates between an upstream master +and other downstream slaves.</li> +<li>Add support for configuring GSS mechanisms using +<tt class="docutils literal"><span class="pre">/etc/gss/mech.d/*.conf</span></tt> files in addition to +<tt class="docutils literal"><span class="pre">/etc/gss/mech</span></tt>.</li> +<li>Add support to the LDAP KDB module for <a class="reference external" href="http://k5wiki.kerberos.org/wiki/Projects/LDAP_SASL_support">binding to the LDAP +server using SASL</a>.</li> +<li>The KDC listens for TCP connections by default.</li> +<li>Fix a minor key disclosure vulnerability where using the +“keepold” option to the kadmin randkey operation could return the +old keys. <a class="reference external" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351">[CVE-2014-5351]</a></li> +<li>Add client support for the Kerberos Cache Manager protocol. If +the host is running a Heimdal kcm daemon, caches served by the +daemon can be accessed with the KCM: cache type.</li> +<li>When built on OS X 10.7 and higher, use “KCM:” as the default +cachetype, unless overridden by command-line options or +krb5-config values.</li> +<li>Add support for doing unlocked database dumps for the DB2 KDC +back end, which would allow the KDC and kadmind to continue +accessing the database during lengthy database dumps.</li> +</ul> +</div></blockquote> +<p>Release 1.14</p> +<blockquote> +<div><ul class="simple"> +<li>Administrator experience<ul> +<li>Add a new kdb5_util tabdump command to provide reporting-friendly +tabular dump formats (tab-separated or CSV) for the KDC database. +Unlike the normal dump format, each output table has a fixed number +of fields. Some tables include human-readable forms of data that +are opaque in ordinary dump files. This format is also suitable for +importing into relational databases for complex queries.</li> +<li>Add support to kadmin and kadmin.local for specifying a single +command line following any global options, where the command +arguments are split by the shell–for example, “kadmin getprinc +principalname”. Commands issued this way do not prompt for +confirmation or display warning messages, and exit with non-zero +status if the operation fails.</li> +<li>Accept the same principal flag names in kadmin as we do for the +default_principal_flags kdc.conf variable, and vice versa. Also +accept flag specifiers in the form that kadmin prints, as well as +hexadecimal numbers.</li> +<li>Remove the triple-DES and RC4 encryption types from the default +value of supported_enctypes, which determines the default key and +salt types for new password-derived keys. By default, keys will +only created only for AES128 and AES256. This mitigates some types +of password guessing attacks.</li> +<li>Add support for directory names in the KRB5_CONFIG and +KRB5_KDC_PROFILE environment variables.</li> +<li>Add support for authentication indicators, which are ticket +annotations to indicate the strength of the initial authentication. +Add support for the “require_auth” string attribute, which can be +set on server principal entries to require an indicator when +authenticating to the server.</li> +<li>Add support for key version numbers larger than 255 in keytab files, +and for version numbers up to 65535 in KDC databases.</li> +<li>Transmit only one ETYPE-INFO and/or ETYPE-INFO2 entry from the KDC +during pre-authentication, corresponding to the client’s most +preferred encryption type.</li> +<li>Add support for server name identification (SNI) when proxying KDC +requests over HTTPS.</li> +<li>Add support for the err_fmt profile parameter, which can be used to +generate custom-formatted error messages.</li> +</ul> +</li> +<li>Developer experience:<ul> +<li>Change gss_acquire_cred_with_password() to acquire credentials into +a private memory credential cache. Applications can use +gss_store_cred() to make the resulting credentials visible to other +processes.</li> +<li>Change gss_acquire_cred() and SPNEGO not to acquire credentials for +IAKERB or for non-standard variants of the krb5 mechanism OID unless +explicitly requested. (SPNEGO will still accept the Microsoft +variant of the krb5 mechanism OID during negotiation.)</li> +<li>Change gss_accept_sec_context() not to accept tokens for IAKERB or +for non-standard variants of the krb5 mechanism OID unless an +acceptor credential is acquired for those mechanisms.</li> +<li>Change gss_acquire_cred() to immediately resolve credentials if the +time_rec parameter is not NULL, so that a correct expiration time +can be returned. Normally credential resolution is delayed until +the target name is known.</li> +<li>Add krb5_prepend_error_message() and krb5_wrap_error_message() APIs, +which can be used by plugin modules or applications to add prefixes +to existing detailed error messages.</li> +<li>Add krb5_c_prfplus() and krb5_c_derive_prfplus() APIs, which +implement the RFC 6113 PRF+ operation and key derivation using PRF+.</li> +<li>Add support for pre-authentication mechanisms which use multiple +round trips, using the the KDC_ERR_MORE_PREAUTH_DATA_REQUIRED error +code. Add get_cookie() and set_cookie() callbacks to the kdcpreauth +interface; these callbacks can be used to save marshalled state +information in an encrypted cookie for the next request.</li> +<li>Add a client_key() callback to the kdcpreauth interface to retrieve +the chosen client key, corresponding to the ETYPE-INFO2 entry sent +by the KDC.</li> +<li>Add an add_auth_indicator() callback to the kdcpreauth interface, +allowing pre-authentication modules to assert authentication +indicators.</li> +<li>Add support for the GSS_KRB5_CRED_NO_CI_FLAGS_X cred option to +suppress sending the confidentiality and integrity flags in GSS +initiator tokens unless they are requested by the caller. These +flags control the negotiated SASL security layer for the Microsoft +GSS-SPNEGO SASL mechanism.</li> +<li>Make the FILE credential cache implementation less prone to +corruption issues in multi-threaded programs, especially on +platforms with support for open file description locks.</li> +</ul> +</li> +<li>Performance:<ul> +<li>On slave KDCs, poll the master KDC immediately after processing a +full resync, and do not require two full resyncs after the master +KDC’s log file is reset.</li> +</ul> +</li> +</ul> +</div></blockquote> +<p>Release 1.15</p> +<ul class="simple"> +<li>Administrator experience:<ul> +<li>Add support to kadmin for remote extraction of current keys +without changing them (requires a special kadmin permission that +is excluded from the wildcard permission), with the exception of +highly protected keys.</li> +<li>Add a lockdown_keys principal attribute to prevent retrieval of +the principal’s keys (old or new) via the kadmin protocol. In +newly created databases, this attribute is set on the krbtgt and +kadmin principals.</li> +<li>Restore recursive dump capability for DB2 back end, so sites can +more easily recover from database corruption resulting from power +failure events.</li> +<li>Add DNS auto-discovery of KDC and kpasswd servers from URI +records, in addition to SRV records. URI records can convey TCP +and UDP servers and master KDC status in a single DNS lookup, and +can also point to HTTPS proxy servers.</li> +<li>Add support for password history to the LDAP back end.</li> +<li>Add support for principal renaming to the LDAP back end.</li> +<li>Use the getrandom system call on supported Linux kernels to avoid +blocking problems when getting entropy from the operating system.</li> +</ul> +</li> +<li>Code quality:<ul> +<li>Clean up numerous compilation warnings.</li> +<li>Remove various infrequently built modules, including some preauth +modules that were not built by default.</li> +</ul> +</li> +<li>Developer experience:<ul> +<li>Add support for building with OpenSSL 1.1.</li> +<li>Use SHA-256 instead of MD5 for (non-cryptographic) hashing of +authenticators in the replay cache. This helps sites that must +build with FIPS 140 conformant libraries that lack MD5.</li> +</ul> +</li> +<li>Protocol evolution:<ul> +<li>Add support for the AES-SHA2 enctypes, which allows sites to +conform to Suite B crypto requirements.</li> +</ul> +</li> +</ul> +<p><cite>Pre-authentication mechanisms</cite></p> +<ul class="simple"> +<li>PW-SALT <span class="target" id="index-11"></span><a class="rfc reference external" href="http://tools.ietf.org/html/rfc4120.html#section-5.2.7.3"><strong>RFC 4120</strong></a></li> +<li>ENC-TIMESTAMP <span class="target" id="index-12"></span><a class="rfc reference external" href="http://tools.ietf.org/html/rfc4120.html#section-5.2.7.2"><strong>RFC 4120</strong></a></li> +<li>SAM-2</li> +<li>FAST negotiation framework (release 1.8) <span class="target" id="index-13"></span><a class="rfc reference external" href="http://tools.ietf.org/html/rfc6113.html"><strong>RFC 6113</strong></a></li> +<li>PKINIT with FAST on client (release 1.10) <span class="target" id="index-14"></span><a class="rfc reference external" href="http://tools.ietf.org/html/rfc6113.html"><strong>RFC 6113</strong></a></li> +<li>PKINIT <span class="target" id="index-15"></span><a class="rfc reference external" href="http://tools.ietf.org/html/rfc4556.html"><strong>RFC 4556</strong></a></li> +<li>FX-COOKIE <span class="target" id="index-16"></span><a class="rfc reference external" href="http://tools.ietf.org/html/rfc6113.html#section-5.2"><strong>RFC 6113</strong></a></li> +<li>S4U-X509-USER (release 1.8) <a class="reference external" href="http://msdn.microsoft.com/en-us/library/cc246091">http://msdn.microsoft.com/en-us/library/cc246091</a></li> +<li>OTP (release 1.12) <a class="reference internal" href="admin/otp.html#otp-preauth"><em>OTP Preauthentication</em></a></li> +</ul> +<p><cite>PRNG</cite></p> +<ul class="simple"> +<li>modularity (release 1.9)</li> +<li>Yarrow PRNG (release < 1.10)</li> +<li>Fortuna PRNG (release 1.9) <a class="reference external" href="http://www.schneier.com/book-practical.html">http://www.schneier.com/book-practical.html</a></li> +<li>OS PRNG (release 1.10) OS’s native PRNG</li> +</ul> +</div> +</div> + + + </div> + </div> + </div> + </div> + <div class="sidebar"> + <h2>On this page</h2> + <ul> +<li><a class="reference internal" href="#">MIT Kerberos features</a><ul> +<li><a class="reference internal" href="#quick-facts">Quick facts</a></li> +<li><a class="reference internal" href="#interoperability">Interoperability</a></li> +<li><a class="reference internal" href="#feature-list">Feature list</a></li> +</ul> +</li> +</ul> + + <br/> + <h2>Table of contents</h2> + <ul class="current"> +<li class="toctree-l1"><a class="reference internal" href="user/index.html">For users</a></li> +<li class="toctree-l1"><a class="reference internal" href="admin/index.html">For administrators</a></li> +<li class="toctree-l1"><a class="reference internal" href="appdev/index.html">For application developers</a></li> +<li class="toctree-l1"><a class="reference internal" href="plugindev/index.html">For plugin module developers</a></li> +<li class="toctree-l1"><a class="reference internal" href="build/index.html">Building Kerberos V5</a></li> +<li class="toctree-l1"><a class="reference internal" href="basic/index.html">Kerberos V5 concepts</a></li> +<li class="toctree-l1"><a class="reference internal" href="formats/index.html">Protocols and file formats</a></li> +<li class="toctree-l1 current"><a class="current reference internal" href="">MIT Kerberos features</a><ul class="simple"> +</ul> +</li> +<li class="toctree-l1"><a class="reference internal" href="build_this.html">How to build this documentation from the source</a></li> +<li class="toctree-l1"><a class="reference internal" href="about.html">Contributing to the MIT Kerberos Documentation</a></li> +<li class="toctree-l1"><a class="reference internal" href="resources.html">Resources</a></li> +</ul> + + <br/> + <h4><a href="index.html">Full Table of Contents</a></h4> + <h4>Search</h4> + <form class="search" action="search.html" method="get"> + <input type="text" name="q" size="18" /> + <input type="submit" value="Go" /> + <input type="hidden" name="check_keywords" value="yes" /> + <input type="hidden" name="area" value="default" /> + </form> + </div> + <div class="clearer"></div> + </div> + </div> + + <div class="footer-wrapper"> + <div class="footer" > + <div class="right" ><i>Release: 1.15.1</i><br /> + © <a href="copyright.html">Copyright</a> 1985-2017, MIT. + </div> + <div class="left"> + + <a href="index.html" title="Full Table of Contents" + >Contents</a> | + <a href="formats/cookie.html" title="KDC cookie format" + >previous</a> | + <a href="mitK5license.html" title="MIT Kerberos License information" + >next</a> | + <a href="genindex.html" title="General Index" + >index</a> | + <a href="search.html" title="Enter search criteria" + >Search</a> | + <a href="mailto:krb5-bugs@mit.edu?subject=Documentation__MIT Kerberos features">feedback</a> + </div> + </div> + </div> + + </body> +</html>
\ No newline at end of file |
