NAME
kdb5_util - Kerberos database maintenance utilitySYNOPSIS
kdb5_util [ -r realm] [ -d dbname] [ -k mkeytype] [ -kv mkeyVNO] [ -M mkeyname] [ -m] [ -sf stashfilename] [ -P password] [ -x db_args] command [command_options]DESCRIPTION
kdb5_util allows an administrator to perform maintenance procedures on the KDC database. Databases can be created, destroyed, and dumped to or loaded from ASCII files. kdb5_util can create a Kerberos master key stash file or perform live rollover of the master key.COMMAND-LINE OPTIONS
- -r realm
- specifies the Kerberos realm of the database.
- -d dbname
- specifies the name under which the principal database is stored; by default the database is that listed in kdc.conf(5). The password policy database and lock files are also derived from this value.
- -k mkeytype
- specifies the key type of the master key in the database. The default is given by the master_key_type variable in kdc.conf(5).
- -kv mkeyVNO
- Specifies the version number of the master key in the database; the default is 1. Note that 0 is not allowed.
- -M mkeyname
- principal name for the master key in the database. If not specified, the name is determined by the master_key_name variable in kdc.conf(5).
- -m
- specifies that the master database password should be read from the keyboard rather than fetched from a file on disk.
- -sf stash_file
- specifies the stash filename of the master database password. If not specified, the filename is determined by the key_stash_file variable in kdc.conf(5).
- -P password
- specifies the master database password. Using this option may expose the password to other users on the system via the process list.
- -x db_args
- specifies database-specific options. See kadmin(1) for supported options.
COMMANDS
create
create [-s]
destroy
destroy [-f]
stash
stash [-f keyfile]
dump
dump
[-b7|-r13|-r18] [ -verbose] [-mkey_convert]
[ -new_mkey_file mkey_file] [-rev] [-recurse]
[filename [ principals...]]
- -b7
- causes the dump to be in the Kerberos 5 Beta 7 format ("kdb5_util load_dump version 4"). This was the dump format produced on releases prior to 1.2.2.
- -r13
- causes the dump to be in the Kerberos 5 1.3 format ("kdb5_util load_dump version 5"). This was the dump format produced on releases prior to 1.8.
- -r18
- causes the dump to be in the Kerberos 5 1.8 format ("kdb5_util load_dump version 6"). This was the dump format produced on releases prior to 1.11.
- -verbose
- causes the name of each principal and policy to be printed as it is dumped.
- -mkey_convert
- prompts for a new master key. This new master key will be used to re-encrypt principal key data in the dumpfile. The principal keys themselves will not be changed.
- -new_mkey_file mkey_file
- the filename of a stash file. The master key in this stash file will be used to re-encrypt the key data in the dumpfile. The key data in the database will not be changed.
- -rev
- dumps in reverse order. This may recover principals that do not dump normally, in cases where database corruption has occurred.
- -recurse
- causes the dump to walk the database recursively (btree only). This may recover principals that do not dump normally, in cases where database corruption has occurred. In cases of such corruption, this option will probably retrieve more principals than the -rev option will. Changed in version 1.15: Release 1.15 restored the functionality of the -recurse option. Changed in version 1.5: The -recurse option ceased working until release 1.15, doing a normal dump instead of a recursive traversal.
load
load
[-b7|-r13|-r18] [ -hash] [ -verbose]
[-update] filename
- -b7
- requires the database to be in the Kerberos 5 Beta 7 format ("kdb5_util load_dump version 4"). This was the dump format produced on releases prior to 1.2.2.
- -r13
- requires the database to be in Kerberos 5 1.3 format ("kdb5_util load_dump version 5"). This was the dump format produced on releases prior to 1.8.
- -r18
- requires the database to be in Kerberos 5 1.8 format ("kdb5_util load_dump version 6"). This was the dump format produced on releases prior to 1.11.
- -hash
- stores the database in hash format, if using the DB2 database type. If this option is not specified, the database will be stored in btree format. This option is not recommended, as databases stored in hash format are known to corrupt data and lose principals.
- -verbose
- causes the name of each principal and policy to be printed as it is dumped.
- -update
- records from the dump file are added to or updated in the existing database. Otherwise, a new database is created containing only what is in the dump file and the old one destroyed upon successful completion.
ark
ark [-e
enc:salt,...] principal
add_mkey
add_mkey [-e etype]
[-s]
use_mkey
use_mkey mkeyVNO
[time]
list_mkeys
list_mkeys
purge_mkeys
purge_mkeys [-f] [-n]
[-v]
- -f
- does not prompt for confirmation.
- -n
- performs a dry run, showing master keys that would be purged, but not actually purging any keys.
- -v
- gives more verbose output.
update_princ_encryption
update_princ_encryption [-f]
[-n] [-v] [ princ-pattern]
tabdump
tabdump [-H] [-c]
[-e] [ -n] [-o outfile] dumptype
- -H
- suppress writing the field names in a header line
- -c
- use comma separated values (CSV) format, with minimal quoting, instead of the default tab-separated (unquoted, unescaped) format
- -e
- write empty hexadecimal string fields as empty fields instead of as "-1".
- -n
- produce numeric output for fields that normally have symbolic output, such as enctypes and flag names. Also requests output of time stamps as decimal POSIX time_t values.
- -o outfile
- write the dump to the specified output file instead of to standard output
- keydata
- principal encryption key information, including actual key data (which is still encrypted in the master key)
- name
- principal name
- keyindex
- index of this key in the principal's key list
- kvno
- key version number
- enctype
- encryption type
- key
- key data as a hexadecimal string
- salttype
- salt type
- salt
- salt data as a hexadecimal string
- keyinfo
- principal encryption key information (as in keydata above), excluding actual key data
- princ_flags
- principal boolean attributes. Flag names print as hexadecimal numbers if the -n option is specified, and all flag positions are printed regardless of whether or not they are set. If -n is not specified, print all known flag names for each principal, but only print hexadecimal flag names if the corresponding flag is set.
- name
- principal name
- flag
- flag name
- value
- boolean value (0 for clear, or 1 for set)
- princ_lockout
- state information used for tracking repeated password failures
- name
- principal name
- last_success
- time stamp of most recent successful authentication
- last_failed
- time stamp of most recent failed authentication
- fail_count
- count of failed attempts
- princ_meta
- principal metadata
- name
- principal name
- modby
- name of last principal to modify this principal
- modtime
- timestamp of last modification
- lastpwd
- timestamp of last password change
- policy
- policy object name
- mkvno
- key version number of the master key that encrypts this principal's key data
- hist_kvno
- key version number of the history key that encrypts the key history data for this principal
- princ_stringattrs
- string attributes (key/value pairs)
- name
- principal name
- key
- attribute name
- value
- attribute value
- princ_tktpolicy
- per-principal ticket policy data, including maximum ticket lifetimes
- name
- principal name
- expiration
- principal expiration date
- pw_expiration
- password expiration date
- max_life
- maximum ticket lifetime
- max_renew_life
- maximum renewable ticket lifetime
$ kdb5_util tabdump -o keyinfo.txt keyinfo $ cat keyinfo.txt name keyindex kvno enctype salttype salt K/[email protected] 0 1 aes256-cts-hmac-sha384-192 normal -1 [email protected] 0 1 aes128-cts-hmac-sha1-96 normal -1 [email protected] 0 1 aes128-cts-hmac-sha1-96 normal -1 $ sqlite3 sqlite> .mode tabs sqlite> .import keyinfo.txt keyinfo sqlite> select * from keyinfo where enctype like 'aes256-%'; K/[email protected] 1 1 aes256-cts-hmac-sha384-192 normal -1 sqlite> .quit $ awk -F'\t' '$4 ~ /aes256-/ { print }' keyinfo.txt K/[email protected] 1 1 aes256-cts-hmac-sha384-192 normal -1
ENVIRONMENT
See kerberos(7) for a description of Kerberos environment variables.SEE ALSO
kadmin(1), kerberos(7)AUTHOR
MITCOPYRIGHT
1985-2022, MIT1.20.1 |