NAME
ttauth - TT authority file utility
SYNOPSIS
ttauth [ -f authfile ] [ -vqib ] [ command arg ... ]
DESCRIPTION
The ttauth program is used to edit and display the authori-
zation information used in connecting with Tooltalk. This
program is usually used to extract authorization records
from one machine and merge them in on another (as is the
case when using remote logins or granting access to other
users). Commands (described below) may be entered interac-
tively, on the ttauth command line, or in scripts.
OPTIONS
The following options may be used with ttauth. They may be
given individually (e.g. -q -i) or may combined (e.g. -qi):
-f authfile
This option specifies the name of the authority file
to use. By default, ttauth will use the file speci-
fied by the TTAUTHORITY environment variable or
.TTauthority in the user's home directory.
-q This option indicates that ttauth should operate
quietly and not print unsolicited status messages.
This is the default if an ttauth command is is given
on the command line or if the standard output is not
directed to a terminal.
-v This option indicates that ttauth should operate
verbosely and print status messages indicating the
results of various operations (e.g. how many records
have been read in or written out). This is the
default if ttauth is reading commands from its stan-
dard input and its standard output is directed to a
terminal.
-i This option indicates that ttauth should ignore any
authority file locks. Normally, ttauth will refuse
to read or edit any authority files that have been
locked by other programs (usually xdm(1) or another
ttauth).
-b This option indicates that ttauth should attempt to
break any authority file locks before proceeding and
should only be used to clean up stale locks.
COMMANDS
The following commands may be used to manipulate authority
files:
add displayname protocolname hexkey
An authorization entry for the indicated display
using the given protocol and key data is added to
the authorization file. The data is specified as an
even-lengthed string of hexadecimal digits, each
pair representing one octet. The first digit of
each pair gives the most significant 4 bits of the
octet and the second digit of the pairgives the
least significant 4 bits. For example, a 32 charac-
ter hexkey would represent a 128-bit value. A pro-
tocol name consisting of just a single period is
treated as an abbreviation for MIT-MAGIC-COOKIE-1.
add displayname protocolname 'string'
An authorization entry for the indicated display
using the given protocol and the protocolname is
specified by 'string'. If the authorization name is
UN_DE-1, then the data field contains an ASCII net-
name.
[n]extract filename displayname...
Authorization entries for each of the specified
displays are written to the indicated file. If the
nextract command is used, the entries are written in
a numeric format suitable for non-binary transmis-
sion (such as secure electronic mail). The
extracted entries can be read back in using the
merge and nmerge commands. If the the filename con-
sists of just a single dash, the entries will be
written to the standard output.
[n]list [displayname...]
Authorization entries for each of the specified
displays (or all if no displays are named) are
printed on the standard output. If the nlist com-
mand is used, entries will be shown in the numeric
format used by the nextract command; otherwise, they
are shown in a textual format. Key data is always
displayed in the hexadecimal format given in the
description of the add command.
[n]merge [filename...]
Authorization entries are read from the specified
files and are merged into the authorization data-
base, superceding any matching existing entries. If
the nmerge command is used, the numeric format given
in the description of the extract command is used.
If a filename consists of just a single dash, the
standard input will be read if it hasn't been read
before.
remove displayname...
Authorization entries matching the specified
displays are removed from the authority file.
source filename
The specified file is treated as a script containing
ttauth commands to execute. Blank lines and lines
beginning with a sharp sign (#) are ignored. A sin-
gle dash may be used to indicate the standard input,
if it hasn't already been read.
info Information describing the authorization file,
whether or not any changes have been made, and from
where ttauth commands are being read is printed on
the standard output.
exit If any modifications have been made, the authority
file is written out (if allowed), and the program
exits. An end of file is treated as an implicit
exit command.
quit The program exits, ignoring any modifications. This
may also be accomplished by pressing the interrupt
character.
help [string]
A description of all commands that begin with the
given string (or all commands if no string is given)
is printed on the standard output.
? A short list of the valid commands is printed on the
standard output.
DISPLAY NAMES
Display names for the add, [n]extract, [n]list, [n]merge,
and remove commands use the same format as the DISPLAY
environment variable and the common -display command line
argument. Display-specific information (such as the screen
number) is unnecessary and will be ignored. Same-machine
connections (such as local-host sockets, shared memory, and
the Internet Protocol hostname localhost) are referred to as
hostname/unix:displaynumber so that local entries for dif-
ferent machines may be stored in one authority file.
ENVIRONMENT
This ttauth program uses the following environment vari-
ables:
TTAUTHORITY
to get the name of the authority file to use if the
-f option isn't used. If this variable is not set,
ttauth will use .TTauthority in the user's home
directory.
HOME to get the user's home directory if TTAUTHORITY
isn't defined.
BUGS
Users that have unsecure networks should take care to use
encrypted file transfer mechanisms to copy authorization
entries between machines. Similarly, the MIT-MAGIC-COOKIE-1
protocol is not very useful in unsecure environments. Sites
that are interested in additional security may need to use
encrypted authorization mechanisms such as Kerberos.
Spaces are currently not allowed in the protocol name.
Quoting could be added for the truly perverse.
EXAMPLES
None.
AUTHOR
Mitchell Greess, Solutions Atlantic
|
Закладки на сайте Проследить за страницей |
Created 1996-2025 by Maxim Chirkov Добавить, Поддержать, Вебмастеру |