3 This program is not installed setuid root be default. If you want to
4 install it setuid root, then you can override the package permissions
7 dpkg-statoverride --update --add root root 4755 /usr/bin/ksu
9 Note on ipropd and/or hpropd
10 ----------------------------
11 The following entries may be required in you /etc/services
12 file (see bug #139845):
14 krb_prop 754/tcp # Kerberos slave propagation
15 iprop 2121/tcp # incremental propagation
17 Note on kerberos.8 man page
18 ---------------------------
19 This man page is not currently included due to conflict with kerberos4kth-kdc
20 package. For more information on Kerberos, see:
21 http://www.nrl.navy.mil/CCS/people/kenh/kerberos-faq.html
23 Installing heimdal for Debian
24 -----------------------------
25 (Note: if you do not have a krb4 KDC, you may need to include
26 "krb4_get_tickets = no" in the [libdefaults] section of
27 kdc.conf; otherwise kinit will complain with an error).
29 Things you will have to do manually (see info documentation for
33 1. Add adminstrator keys using kadmin.
38 Max ticket life [unlimited]:
39 Max renewable life [unlimited]:
40 Principal expiration time [never]:
41 Password expiration time [never]:
43 bam/admin@CHOCBIT.ORG.AU's Password:
44 Verifying password - bam/admin@CHOCBIT.ORG.AU's Password:
46 2. Add kadmin/admin key to KDC:
50 kadmin> add -r kadmin/admin@CHOCBIT.ORG.AU
51 Max ticket life [unlimited]:
52 Max renewable life [unlimited]:
53 Principal expiration time [never]:
54 Password expiration time [never]:
57 (note: this key doesn't need to be extracted).
59 3. Enable remote admistration by creating /etc/heimdal-kdc/kadmind.acl
62 echo 'bam/admin@CHOCBIT.ORG.AU all' > /etc/heimdal-kdc/kadmind.acl
68 bam/admin@CHOCBIT.ORG.AU's Password:
70 [should list all keys]
76 bam/admin@CHOCBIT.ORG.AU's Password:
81 1. If you installed heimdal-clients-x or heimdal-servers-x,
82 then you will need to add the following entry to /etc/services
83 kx 2111/tcp # X over kerberos
84 (check to make sure this doesn't already exist).
85 2. edit /etc/krb5.conf
86 3. setup secret keys each computer, using kadmin and/or ktutil.
88 For example, on remote computer dewey.chocbit.org.au:
89 bam/admin@CHOCBIT.ORG.AU's Password:
90 kadmin> add -r host/dewey.chocbit.org.au
92 kadmin> ext host/dewey.chocbit.org.au
93 kadmin> add -r ftp/dewey.chocbit.org.au
95 kadmin> ext ftp/dewey.chocbit.org.au
97 The ext command extracts keys to /etc/krb5.keytab, where
98 they can be inspected with the "ktutil list" command at the
101 Tell me if any files conflict with any other package - do not
102 try to force the package to install, otherwise things may break...
103 In general, this package conflicts with kerberos4kth and
104 probably MIT Kerberos (not packaged as of potato). Local
105 installations under /usr/local should be OK.
107 Changes from upstream source:
108 1. popper checks for $HOME/Maildir, $HOME/Mailbox and /var/spool/mail/<user>
110 2. /var/lib/heimdal-kdc used instead of /var/heimdal
111 3. /usr/bin/login moved to /usr/lib/heimdal-servers
112 4. /usr/lib/heimdal-servers used instead of /usr/libexec
113 5. telnet and ftp have been renamed to ktelnet and kftp, and
114 use the update-alternatives mechanism. In the future, this
115 should allow heimdal-clients to exist at the same time
117 6. kdc config files kdc.conf and kadmind.acl stored in
118 /etc/heimdal-kdc instead of /usr/lib/heimdal-servers.
120 -- Brian May <bam@debian.org>, Wed, 8 Dec 1999 11:54:13 +1100