summaryrefslogtreecommitdiff
path: root/server/zephyrd.8
blob: 048b7e98877fcba7cea87c838aa8ef13a20b68b3 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
.\"	$Id$
.\"
.\" Copyright 1987 by the Massachusetts Institute of Technology
.\" All rights reserved.  The file /usr/include/zephyr/mit-copyright.h
.\" specifies the terms and conditions for redistribution.
.\"
.TH ZEPHYRD 8 "July 1, 1988" "MIT Project Athena"
.ds ]W MIT Project Athena
.SH NAME
zephyrd \- Zephyr server daemon
.SH SYNOPSIS
.I /usr/etc/zephyrd
[
.BI \-d
]
.SH DESCRIPTION
.I zephyrd
is the central server for the Zephyr Notification System.
It maintains a location database of all currently logged-in users, and a
subscription database for each user's Zephyr clients.
.PP
.I zephyrd 
communicates with daemons running on other Zephyr server hosts, to
provide a reliable service.
.PP
While running, any unusual conditions are recorded via 
.I syslog(3)
to facility local6 at various levels.
The
.BI \-d
option enables logging of additional debugging information.
.PP
When a
.B zephyrd
is executed, it requests a list of server machines from Hesiod and
initializes its state from any
\fIzephyrd\fRs executing on the other known servers.  This initialization
is only performed after the \fIzephyrd\fRs have authenticated themselves
to each other via Kerberos.
The server then enters a dispatch loop, servicing requests from clients and
other servers.
.SH SIGNALS
.B SIGUSR1
enables logging of additional debugging information.
.br
.B SIGUSR2
disables the logging of additional debugging information.
.br
.B SIGHUP
causes
.I zephyrd
to re-read the default subscription file and to re-query Hesiod about
valid peers.  Any peers which are not responding and no longer
mentioned in Hesiod are flushed; any peers not previously named by
Hesiod are added.
.br
.B SIGINT \fRand\fB SIGTERM
cause
.I zephyrd
to gracefully shut down.
.br
.B SIGFPE
causes
.I zephyrd
to dump the location and subscription databases to
.I /var/tmp/zephyr.db
in an ASCII format.
.SH ACCESS CONTROL
Certain notice classes are restricted by the Zephyr server.  Each such
class has access control lists enumerating who may transmit (xmt-*.acl) or
subscribe to that particular class.  Subscriptions may be
restricted either absolutely (sub-*.acl files), or by instance restrictions.
iws-*.acl files control subscriptions to wildcarded instances.
iui-*.acl files control subscriptions to instances which are not the
Kerberos principal identity of the subscriber.
If an access control list of a given type is absent, there is no
restriction of that type on the class, except that any notices of the
class must be authenticated.
The class registry lists all classes which are restricted.
.SH FILES
.TP 10
.I /usr/athena/lib/zephyr/class-registry.acl:
List of classes which are restricted
.TP
.I /usr/athena/lib/zephyr/iws-*.acl:
Access Control Lists for instance-wildcard restrictions
.TP
.I /usr/athena/lib/zephyr/iui-*.acl:
Access Control Lists for instance-identity restrictions
.TP
.I /usr/athena/lib/zephyr/sub-*.acl:
Access Control Lists for subscribing
.TP
.I /usr/athena/lib/zephyr/xmt-*.acl:
Access Control Lists for transmitting
.TP
.I /usr/athena/lib/zephyr/srvtab:
Kerberos Service keys
.TP
.I /usr/athena/lib/zephyr/ztkts:
Current Kerberos tickets for exchange with other servers 
.TP
.I /usr/tmp/zephyr.db:
File containing an ASCII dump of the database.
.SH BUGS
The current implementation of the Zephyr server (\fIzephyrd(8)\fR) makes
no distinction between realm-announced, net-visible and net-announced
exposure levels.
.SH SEE ALSO
zephyr(1), zhm(8), kerberosintro(1), hesiod(3), access_control_lists(?),
syslog(3)
.br
Athena Technical Plan, Sections E.4.1 (Zephyr Notification Service) and
E.2.1 (Kerberos Authentication and Authorization System)
.SH AUTHOR
.PP
John T. Kohl, MIT Project Athena and Digital Equipment Corporation
.SH RESTRICTIONS
Copyright (c) 1987,1988 by the Massachusetts Institute of Technology.
All Rights Reserved.
.br
.I zephyr(1)
specifies the terms and conditions for redistribution.