keyserv(1M)




NAME

     keyserv - server for storing private encryption keys


SYNOPSIS

     keyserv [-c] [-d | -e]  [-D] [-n] [-s sizespec]


DESCRIPTION

     keyserv is a daemon that is used  for  storing  the  private
     encryption  keys  of each user logged into the system. These
     encryption keys are used for accessing secure  network  ser-
     vices such as secure NFS and NIS+.

     Normally, root's key is read  from  the  file  /etc/.rootkey
     when the daemon is started. This is useful during power-fail
     reboots when no one is around to type a password.

     keyserv will not start up if the  system  does  not  have  a
     secure  rpc  domain  configured.  Set  up the domain name by
     using   the   /usr/bin/domainname   command.   Usually   the
     /etc/init.d/inetinit    script   reads   the   domain   from
     /etc/defaultdomain. Invoking the domainname command  without
     arguments tells you if you have a domain set up.

     The /etc/default/keyserv file contains the following default
     parameter settings. See FILES.

     ENABLE_NOBODY_KEYS
           Specifies whether default keys for  nobody  are  used.
           ENABLE_NOBODY_KEYS=NO   is   equivalent   to   the  -d
           command-line   option.   The   default    value    for
           ENABLE_NOBODY_KEYS is YES.


OPTIONS

     -c    Do not use disk caches. This option overrides  any  -s
           option.

     -D    Run  in  debugging  mode  and  log  all  requests   to
           keyserv.

     -d    Disable the use of default keys for nobody. See FILES.

     -e    Enable the use of default keys for nobody. This is the
           default behavior. See FILES.

     -n    Root's secret key  is  not  read  from  /etc/.rootkey.
           Instead,  keyserv prompts the user for the password to
           decrypt root's key stored in  the  publickey  database
           and then stores the decrypted key in /etc/.rootkey for
           future use. This option is useful if the /etc/.rootkey
           file ever gets out of date or corrupted.

     -s sizespec
           Specify the size of the extended Diffie-Hellman common
           key  disk  caches. The sizespec can be one of the fol-
           lowing forms:

           mechtype=size
                 size is an integer specifying the maximum number
                 of  entries  in the cache, or an integer immedi-
                 ately followed by the  letter  M,  denoting  the
                 maximum size in MB.

           size  This form of sizespec applies to all caches.

           See nisauthconf(1M) for mechanism types. Note that the
           des mechanism, AUTH_DES, does not use a disk cache.


FILES

     /etc/.rootkey

     /etc/default/keyserv
           Contains default settings. You  can  use  command-line
           options to override these settings.


ATTRIBUTES

     See attributes(5) for descriptions of the  following  attri-
     butes:

     ____________________________________________________________
    |       ATTRIBUTE TYPE        |       ATTRIBUTE VALUE       |
    |_____________________________|_____________________________|
    | Availability                | SUNWcsu                     |
    |_____________________________|_____________________________|


SEE ALSO

     keylogin(1),  keylogout(1),  nisauthconf(1M),  publickey(4),
     attributes(5)


NOTES

     NIS+ might not  be  supported  in  future  releases  of  the
     SolarisTM  Operating Environment. Tools to aid the migration
     from NIS+ to LDAP are available in the Solaris  9  operating
     environment.      For      more      information,      visit
     http://www.sun.com/directory/nisplus/transition.html.


Man(1) output converted with man2html