. . .nr rst2man-indent-level 0 . \\$1 \\n[an-margin] level \\n[rst2man-indent-level] level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] - \\n[rst2man-indent0] \\n[rst2man-indent1] \\n[rst2man-indent2] .. .rstReportMargin pre:
. RS \\$1 . nr rst2man-indent\\n[rst2man-indent-level] \\n[an-margin] . nr rst2man-indent-level +1 .rstReportMargin post:
.. . RE indent \\n[an-margin]
old: \\n[rst2man-indent\\n[rst2man-indent-level]]
.nr rst2man-indent-level -1 new: \\n[rst2man-indent\\n[rst2man-indent-level]]
..
-r realm specifies the Kerberos realm of the database.
-d dbname specifies the name under which the principal database is stored; by default the database is that listed in kdc.conf(5). The password policy database and lock files are also derived from this value.
-k mkeytype specifies the key type of the master key in the database. The default is given by the master_key_type variable in kdc.conf(5).
-kv mkeyVNO Specifies the version number of the master key in the database; the default is 1. Note that 0 is not allowed.
-M mkeyname principal name for the master key in the database. If not specified, the name is determined by the master_key_name variable in kdc.conf(5).
-m specifies that the master database password should be read from the keyboard rather than fetched from a file on disk.
-sf stash_file specifies the stash filename of the master database password. If not specified, the filename is determined by the key_stash_file variable in kdc.conf(5).
-P password specifies the master database password. Using this option may expose the password to other users on the system via the process list.
-x db_args specifies database-specific options. See kadmin(1) for supported options. NINDENT
-b7 causes the dump to be in the Kerberos 5 Beta 7 format ("kdb5_util load_dump version 4"). This was the dump format produced on releases prior to 1.2.2.
-r13 causes the dump to be in the Kerberos 5 1.3 format ("kdb5_util load_dump version 5"). This was the dump format produced on releases prior to 1.8.
-r18 causes the dump to be in the Kerberos 5 1.8 format ("kdb5_util load_dump version 6"). This was the dump format produced on releases prior to 1.11.
-verbose causes the name of each principal and policy to be printed as it is dumped.
-mkey_convert prompts for a new master key. This new master key will be used to re-encrypt principal key data in the dumpfile. The principal keys themselves will not be changed.
-new_mkey_file mkey_file the filename of a stash file. The master key in this stash file will be used to re-encrypt the key data in the dumpfile. The key data in the database will not be changed.
-rev dumps in reverse order. This may recover principals that do not dump normally, in cases where database corruption has occurred.
-recurse causes the dump to walk the database recursively (btree only). This may recover principals that do not dump normally, in cases where database corruption has occurred. In cases of such corruption, this option will probably retrieve more principals than the -rev option will. Changed in version 1.15: Release 1.15 restored the functionality of the -recurse option. Changed in version 1.5: The -recurse option ceased working until release 1.15, doing a normal dump instead of a recursive traversal. NINDENT
-b7 requires the database to be in the Kerberos 5 Beta 7 format ("kdb5_util load_dump version 4"). This was the dump format produced on releases prior to 1.2.2.
-r13 requires the database to be in Kerberos 5 1.3 format ("kdb5_util load_dump version 5"). This was the dump format produced on releases prior to 1.8.
-r18 requires the database to be in Kerberos 5 1.8 format ("kdb5_util load_dump version 6"). This was the dump format produced on releases prior to 1.11.
-hash stores the database in hash format, if using the DB2 database type. If this option is not specified, the database will be stored in btree format. This option is not recommended, as databases stored in hash format are known to corrupt data and lose principals.
-verbose causes the name of each principal and policy to be printed as it is dumped.
-update records from the dump file are added to or updated in the existing database. Otherwise, a new database is created containing only what is in the dump file and the old one destroyed upon successful completion. NINDENT
-f does not prompt for confirmation.
-n performs a dry run, showing master keys that would be purged, but not actually purging any keys.
-v gives more verbose output. NINDENT
-H suppress writing the field names in a header line
-c use comma separated values (CSV) format, with minimal quoting, instead of the default tab-separated (unquoted, unescaped) format
-e write empty hexadecimal string fields as empty fields instead of as "-1".
-n produce numeric output for fields that normally have symbolic output, such as enctypes and flag names. Also requests output of time stamps as decimal POSIX time_t values.
-o outfile write the dump to the specified output file instead of to standard output NINDENT Dump types: NDENT 0.0
keydata principal encryption key information, including actual key data (which is still encrypted in the master key) NDENT 7.0
name principal name
keyindex index of this key in the principal\(aqs key list
kvno key version number
enctype encryption type
key key data as a hexadecimal string
salttype salt type
salt salt data as a hexadecimal string NINDENT
keyinfo principal encryption key information (as in keydata above), excluding actual key data
princ_flags principal boolean attributes. Flag names print as hexadecimal numbers if the -n option is specified, and all flag positions are printed regardless of whether or not they are set. If -n is not specified, print all known flag names for each principal, but only print hexadecimal flag names if the corresponding flag is set. NDENT 7.0
name principal name
flag flag name
value boolean value (0 for clear, or 1 for set) NINDENT
princ_lockout state information used for tracking repeated password failures NDENT 7.0
name principal name
last_success time stamp of most recent successful authentication
last_failed time stamp of most recent failed authentication
fail_count count of failed attempts NINDENT
princ_meta principal metadata NDENT 7.0
name principal name
modby name of last principal to modify this principal
modtime timestamp of last modification
lastpwd timestamp of last password change
policy policy object name
mkvno key version number of the master key that encrypts this principal\(aqs key data
hist_kvno key version number of the history key that encrypts the key history data for this principal NINDENT
princ_stringattrs string attributes (key/value pairs) NDENT 7.0
name principal name
key attribute name
value attribute value NINDENT
princ_tktpolicy per-principal ticket policy data, including maximum ticket lifetimes NDENT 7.0
name principal name
expiration principal expiration date
pw_expiration password expiration date
max_life maximum ticket lifetime
max_renew_life maximum renewable ticket lifetime NINDENT NINDENT Examples: NDENT 0.0 NDENT 3.5
$ kdb5_util tabdump -o keyinfo.txt keyinfo $ cat keyinfo.txt name keyindex kvno enctype salttype salt K/M@EXAMPLE.COM 0 1 aes256-cts-hmac-sha384-192 normal -1 foo@EXAMPLE.COM 0 1 aes128-cts-hmac-sha1-96 normal -1 bar@EXAMPLE.COM 0 1 aes128-cts-hmac-sha1-96 normal -1 $ sqlite3 sqlite> .mode tabs sqlite> .import keyinfo.txt keyinfo sqlite> select * from keyinfo where enctype like \(aqaes256-%\(aq; K/M@EXAMPLE.COM 1 1 aes256-cts-hmac-sha384-192 normal -1 sqlite> .quit $ awk -F\(aq\et\(aq \(aq$4 ~ /aes256-/ { print }\(aq keyinfo.txt K/M@EXAMPLE.COM 1 1 aes256-cts-hmac-sha384-192 normal -1NINDENT NINDENT
.