1c0b9f4feSDoug Rabson.\" -*- nroff -*- 2c0b9f4feSDoug Rabson.\" 3c0b9f4feSDoug Rabson.\" Copyright (c) 2005 Doug Rabson 4c0b9f4feSDoug Rabson.\" All rights reserved. 5c0b9f4feSDoug Rabson.\" 6c0b9f4feSDoug Rabson.\" Redistribution and use in source and binary forms, with or without 7c0b9f4feSDoug Rabson.\" modification, are permitted provided that the following conditions 8c0b9f4feSDoug Rabson.\" are met: 9c0b9f4feSDoug Rabson.\" 1. Redistributions of source code must retain the above copyright 10c0b9f4feSDoug Rabson.\" notice, this list of conditions and the following disclaimer. 11c0b9f4feSDoug Rabson.\" 2. Redistributions in binary form must reproduce the above copyright 12c0b9f4feSDoug Rabson.\" notice, this list of conditions and the following disclaimer in the 13c0b9f4feSDoug Rabson.\" documentation and/or other materials provided with the distribution. 14c0b9f4feSDoug Rabson.\" 15c0b9f4feSDoug Rabson.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 16c0b9f4feSDoug Rabson.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 17c0b9f4feSDoug Rabson.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 18c0b9f4feSDoug Rabson.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 19c0b9f4feSDoug Rabson.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 20c0b9f4feSDoug Rabson.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 21c0b9f4feSDoug Rabson.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 22c0b9f4feSDoug Rabson.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 23c0b9f4feSDoug Rabson.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 24c0b9f4feSDoug Rabson.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 25c0b9f4feSDoug Rabson.\" SUCH DAMAGE. 26c0b9f4feSDoug Rabson.\" 27d76ba3efSGavin Atkinson.Dd January 26, 2010 28c0b9f4feSDoug Rabson.Dt GSSAPI 3 29c0b9f4feSDoug Rabson.Os 30c0b9f4feSDoug Rabson.Sh NAME 31c0b9f4feSDoug Rabson.Nm gssapi 32c0b9f4feSDoug Rabson.Nd "Generic Security Services API" 33c0b9f4feSDoug Rabson.Sh LIBRARY 34c0b9f4feSDoug RabsonGSS-API Library (libgssapi, -lgssapi) 35c0b9f4feSDoug Rabson.Sh SYNOPSIS 36c0b9f4feSDoug Rabson.In gssapi/gssapi.h 37c0b9f4feSDoug Rabson.Sh DESCRIPTION 38c0b9f4feSDoug RabsonThe Generic Security Service Application Programming Interface 39c0b9f4feSDoug Rabsonprovides security services to its callers, 40c0b9f4feSDoug Rabsonand is intended for implementation atop a variety of underlying 41c0b9f4feSDoug Rabsoncryptographic mechanisms. 42c0b9f4feSDoug RabsonTypically, GSS-API callers will be application protocols into which 43c0b9f4feSDoug Rabsonsecurity enhancements are integrated through invocation of services 44c0b9f4feSDoug Rabsonprovided by the GSS-API. 45c0b9f4feSDoug RabsonThe GSS-API allows a caller application to authenticate a principal 46c0b9f4feSDoug Rabsonidentity associated with a peer application, to delegate rights to a 47c0b9f4feSDoug Rabsonpeer, 48c0b9f4feSDoug Rabsonand to apply security services such as confidentiality and integrity 49c0b9f4feSDoug Rabsonon a per-message basis. 50c0b9f4feSDoug Rabson.Pp 51c0b9f4feSDoug RabsonThere are four stages to using the GSS-API: 52c0b9f4feSDoug Rabson.Bl -tag -width "a)" 53c0b9f4feSDoug Rabson.It a) 54c0b9f4feSDoug RabsonThe application acquires a set of credentials with which it may prove 55c0b9f4feSDoug Rabsonits identity to other processes. 56c0b9f4feSDoug RabsonThe application's credentials vouch for its global identity, 57c0b9f4feSDoug Rabsonwhich may or may not be related to any local username under which it 58c0b9f4feSDoug Rabsonmay be running. 59c0b9f4feSDoug Rabson.It b) 60c0b9f4feSDoug RabsonA pair of communicating applications establish a joint security 61c0b9f4feSDoug Rabsoncontext using their credentials. 62c0b9f4feSDoug RabsonThe security context is a pair of GSS-API data structures that contain 63c0b9f4feSDoug Rabsonshared state information, which is required in order that per-message 64c0b9f4feSDoug Rabsonsecurity services may be provided. 65c0b9f4feSDoug RabsonExamples of state that might be shared between applications as part of 66c0b9f4feSDoug Rabsona security context are cryptographic keys, 67c0b9f4feSDoug Rabsonand message sequence numbers. 68c0b9f4feSDoug RabsonAs part of the establishment of a security context, 69c0b9f4feSDoug Rabsonthe context initiator is authenticated to the responder, 70c0b9f4feSDoug Rabsonand may require that the responder is authenticated in turn. 71c0b9f4feSDoug RabsonThe initiator may optionally give the responder the right to initiate 72c0b9f4feSDoug Rabsonfurther security contexts, 73c0b9f4feSDoug Rabsonacting as an agent or delegate of the initiator. 74c0b9f4feSDoug RabsonThis transfer of rights is termed delegation, 75c0b9f4feSDoug Rabsonand is achieved by creating a set of credentials, 76c0b9f4feSDoug Rabsonsimilar to those used by the initiating application, 77c0b9f4feSDoug Rabsonbut which may be used by the responder. 78c0b9f4feSDoug Rabson.Pp 79c0b9f4feSDoug RabsonTo establish and maintain the shared information that makes up the 80c0b9f4feSDoug Rabsonsecurity context, 81c0b9f4feSDoug Rabsoncertain GSS-API calls will return a token data structure, 82c0b9f4feSDoug Rabsonwhich is an opaque data type that may contain cryptographically 83c0b9f4feSDoug Rabsonprotected data. 84c0b9f4feSDoug RabsonThe caller of such a GSS-API routine is responsible for transferring 85c0b9f4feSDoug Rabsonthe token to the peer application, 86c0b9f4feSDoug Rabsonencapsulated if necessary in an application protocol. 87c0b9f4feSDoug RabsonOn receipt of such a token, the peer application should pass it to a 88c0b9f4feSDoug Rabsoncorresponding GSS-API routine which will decode the token and extract 89c0b9f4feSDoug Rabsonthe information, 90c0b9f4feSDoug Rabsonupdating the security context state information accordingly. 91c0b9f4feSDoug Rabson.It c) 92c0b9f4feSDoug RabsonPer-message services are invoked to apply either: 93c0b9f4feSDoug Rabson.Pp 94c0b9f4feSDoug Rabsonintegrity and data origin authentication, or confidentiality, 95c0b9f4feSDoug Rabsonintegrity and data origin authentication to application data, 96c0b9f4feSDoug Rabsonwhich are treated by GSS-API as arbitrary octet-strings. 97c0b9f4feSDoug RabsonAn application transmitting a message that it wishes to protect will 98c0b9f4feSDoug Rabsoncall the appropriate GSS-API routine (gss_get_mic or gss_wrap) to 99c0b9f4feSDoug Rabsonapply protection, 100c0b9f4feSDoug Rabsonspecifying the appropriate security context, 101c0b9f4feSDoug Rabsonand send the resulting token to the receiving application. 102c0b9f4feSDoug RabsonThe receiver will pass the received token (and, in the case of data 103c0b9f4feSDoug Rabsonprotected by gss_get_mic, the accompanying message-data) to the 104c0b9f4feSDoug Rabsoncorresponding decoding routine (gss_verify_mic or gss_unwrap) to 105c0b9f4feSDoug Rabsonremove the protection and validate the data. 106c0b9f4feSDoug Rabson.It d) 107c0b9f4feSDoug RabsonAt the completion of a communications session (which may extend across 108c0b9f4feSDoug Rabsonseveral transport connections), 109c0b9f4feSDoug Rabsoneach application calls a GSS-API routine to delete the security 110c0b9f4feSDoug Rabsoncontext. 111c0b9f4feSDoug RabsonMultiple contexts may also be used (either successively or 112c0b9f4feSDoug Rabsonsimultaneously) within a single communications association, at the 113c0b9f4feSDoug Rabsonoption of the applications. 114c0b9f4feSDoug Rabson.El 115c0b9f4feSDoug Rabson.Sh GSS-API ROUTINES 116c0b9f4feSDoug RabsonThis section lists the routines that make up the GSS-API, 117c0b9f4feSDoug Rabsonand offers a brief description of the purpose of each routine. 118c0b9f4feSDoug Rabson.Pp 119c0b9f4feSDoug RabsonGSS-API Credential-management Routines: 120c0b9f4feSDoug Rabson.Bl -tag -width "gss_inquire_cred_by_mech" 121c0b9f4feSDoug Rabson.It gss_acquire_cred 122c0b9f4feSDoug RabsonAssume a global identity; Obtain a GSS-API credential handle for 123c0b9f4feSDoug Rabsonpre-existing credentials. 124c0b9f4feSDoug Rabson.It gss_add_cred 125c0b9f4feSDoug RabsonConstruct credentials incrementally 126c0b9f4feSDoug Rabson.It gss_inquire_cred 127c0b9f4feSDoug RabsonObtain information about a credential 128c0b9f4feSDoug Rabson.It gss_inquire_cred_by_mech 129c0b9f4feSDoug RabsonObtain per-mechanism information about a credential. 130c0b9f4feSDoug Rabson.It gss_release_cred 131c0b9f4feSDoug RabsonDiscard a credential handle. 132c0b9f4feSDoug Rabson.El 133c0b9f4feSDoug Rabson.Pp 134c0b9f4feSDoug RabsonGSS-API Context-Level Routines: 135c0b9f4feSDoug Rabson.Bl -tag -width "gss_inquire_cred_by_mech" 136c0b9f4feSDoug Rabson.It gss_init_sec_context 137c0b9f4feSDoug RabsonInitiate a security context with a peer application 138c0b9f4feSDoug Rabson.It gss_accept_sec_context 139c0b9f4feSDoug RabsonAccept a security context initiated by a peer application 140c0b9f4feSDoug Rabson.It gss_delete_sec_context 141c0b9f4feSDoug RabsonDiscard a security context 142c0b9f4feSDoug Rabson.It gss_process_context_token 143c0b9f4feSDoug RabsonProcess a token on a security context from a peer application 144c0b9f4feSDoug Rabson.It gss_context_time 145c0b9f4feSDoug RabsonDetermine for how long a context will remain valid 146c0b9f4feSDoug Rabson.It gss_inquire_context 147c0b9f4feSDoug RabsonObtain information about a security context 148c0b9f4feSDoug Rabson.It gss_wrap_size_limit 149c0b9f4feSDoug RabsonDetermine token-size limit for 150c0b9f4feSDoug Rabson.Xr gss_wrap 3 151c0b9f4feSDoug Rabsonon a context 152c0b9f4feSDoug Rabson.It gss_export_sec_context 153c0b9f4feSDoug RabsonTransfer a security context to another process 154c0b9f4feSDoug Rabson.It gss_import_sec_context 155c0b9f4feSDoug RabsonImport a transferred context 156c0b9f4feSDoug Rabson.El 157c0b9f4feSDoug Rabson.Pp 158c0b9f4feSDoug RabsonGSS-API Per-message Routines: 159c0b9f4feSDoug Rabson.Bl -tag -width "gss_inquire_cred_by_mech" 160c0b9f4feSDoug Rabson.It gss_get_mic 161c0b9f4feSDoug RabsonCalculate a cryptographic message integrity code (MIC) for a message; 162c0b9f4feSDoug Rabsonintegrity service 163c0b9f4feSDoug Rabson.It gss_verify_mic 164c0b9f4feSDoug RabsonCheck a MIC against a message; 165c0b9f4feSDoug Rabsonverify integrity of a received message 166c0b9f4feSDoug Rabson.It gss_wrap 167c0b9f4feSDoug RabsonAttach a MIC to a message, and optionally encrypt the message content; 168c0b9f4feSDoug Rabsonconfidentiality service 169c0b9f4feSDoug Rabson.It gss_unwrap 170c0b9f4feSDoug RabsonVerify a message with attached MIC, and decrypt message content if 171c0b9f4feSDoug Rabsonnecessary. 172c0b9f4feSDoug Rabson.El 173c0b9f4feSDoug Rabson.Pp 174c0b9f4feSDoug RabsonGSS-API Name manipulation Routines: 175c0b9f4feSDoug Rabson.Bl -tag -width "gss_inquire_cred_by_mech" 176c0b9f4feSDoug Rabson.It gss_import_name 177c0b9f4feSDoug RabsonConvert a contiguous string name to internal-form 178c0b9f4feSDoug Rabson.It gss_display_name 179c0b9f4feSDoug RabsonConvert internal-form name to text 180c0b9f4feSDoug Rabson.It gss_compare_name 181c0b9f4feSDoug RabsonCompare two internal-form names 182c0b9f4feSDoug Rabson.It gss_release_name 183c0b9f4feSDoug RabsonDiscard an internal-form name 184c0b9f4feSDoug Rabson.It gss_inquire_names_for_mech 185c0b9f4feSDoug RabsonList the name-types supported by the specified mechanism 186c0b9f4feSDoug Rabson.It gss_inquire_mechs_for_name 187c0b9f4feSDoug RabsonList mechanisms that support the specified name-type 188c0b9f4feSDoug Rabson.It gss_canonicalize_name 189c0b9f4feSDoug RabsonConvert an internal name to an MN 190c0b9f4feSDoug Rabson.It gss_export_name 191c0b9f4feSDoug RabsonConvert an MN to export form 192c0b9f4feSDoug Rabson.It gss_duplicate_name 193c0b9f4feSDoug RabsonCreate a copy of an internal name 194c0b9f4feSDoug Rabson.El 195c0b9f4feSDoug Rabson.Pp 196c0b9f4feSDoug RabsonGSS-API Miscellaneous Routines 197c0b9f4feSDoug Rabson.Bl -tag -width "gss_inquire_cred_by_mech" 198c0b9f4feSDoug Rabson.It gss_add_oid_set_member 199c0b9f4feSDoug RabsonAdd an object identifier to a set 200c0b9f4feSDoug Rabson.It gss_display_status 201c0b9f4feSDoug RabsonConvert a GSS-API status code to text 202c0b9f4feSDoug Rabson.It gss_indicate_mechs 203c0b9f4feSDoug RabsonDetermine available underlying authentication mechanisms 204c0b9f4feSDoug Rabson.It gss_release_buffer 205c0b9f4feSDoug RabsonDiscard a buffer 206c0b9f4feSDoug Rabson.It gss_release_oid_set 207c0b9f4feSDoug RabsonDiscard a set of object identifiers 208c0b9f4feSDoug Rabson.It gss_create_empty_oid_set 209c0b9f4feSDoug RabsonCreate a set containing no object identifiers 210c0b9f4feSDoug Rabson.It gss_test_oid_set_member 211c0b9f4feSDoug RabsonDetermines whether an object identifier is a member of a set. 212c0b9f4feSDoug Rabson.El 213c0b9f4feSDoug Rabson.Pp 214c0b9f4feSDoug RabsonIndividual GSS-API implementations may augment these routines by 215c0b9f4feSDoug Rabsonproviding additional mechanism-specific routines if required 216c0b9f4feSDoug Rabsonfunctionality is not available from the generic forms. 217c0b9f4feSDoug RabsonApplications are encouraged to use the generic routines wherever 218c0b9f4feSDoug Rabsonpossible on portability grounds. 219c0b9f4feSDoug Rabson.Sh STANDARDS 220*6a557179SJoel Dahl.Bl -tag -width ".It RFC 2743" 221c0b9f4feSDoug Rabson.It RFC 2743 222c0b9f4feSDoug RabsonGeneric Security Service Application Program Interface Version 2, Update 1 223c0b9f4feSDoug Rabson.It RFC 2744 224c0b9f4feSDoug RabsonGeneric Security Service API Version 2 : C-bindings 225c0b9f4feSDoug Rabson.El 226c0b9f4feSDoug Rabson.Sh HISTORY 227c0b9f4feSDoug RabsonThe 228c0b9f4feSDoug Rabson.Nm 229d76ba3efSGavin Atkinsonlibrary first appeared in 230c0b9f4feSDoug Rabson.Fx 7.0 . 231c0b9f4feSDoug Rabson.Sh AUTHORS 232c0b9f4feSDoug RabsonJohn Wray, Iris Associates 23360b9f20aSDoug Rabson.Sh COPYRIGHT 23460b9f20aSDoug RabsonCopyright (C) The Internet Society (2000). All Rights Reserved. 23560b9f20aSDoug Rabson.Pp 23660b9f20aSDoug RabsonThis document and translations of it may be copied and furnished to 23760b9f20aSDoug Rabsonothers, and derivative works that comment on or otherwise explain it 23860b9f20aSDoug Rabsonor assist in its implementation may be prepared, copied, published 23960b9f20aSDoug Rabsonand distributed, in whole or in part, without restriction of any 24060b9f20aSDoug Rabsonkind, provided that the above copyright notice and this paragraph are 24160b9f20aSDoug Rabsonincluded on all such copies and derivative works. However, this 24260b9f20aSDoug Rabsondocument itself may not be modified in any way, such as by removing 24360b9f20aSDoug Rabsonthe copyright notice or references to the Internet Society or other 24460b9f20aSDoug RabsonInternet organizations, except as needed for the purpose of 24560b9f20aSDoug Rabsondeveloping Internet standards in which case the procedures for 24660b9f20aSDoug Rabsoncopyrights defined in the Internet Standards process must be 24760b9f20aSDoug Rabsonfollowed, or as required to translate it into languages other than 24860b9f20aSDoug RabsonEnglish. 24960b9f20aSDoug Rabson.Pp 25060b9f20aSDoug RabsonThe limited permissions granted above are perpetual and will not be 25160b9f20aSDoug Rabsonrevoked by the Internet Society or its successors or assigns. 25260b9f20aSDoug Rabson.Pp 25360b9f20aSDoug RabsonThis document and the information contained herein is provided on an 25460b9f20aSDoug Rabson"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING 25560b9f20aSDoug RabsonTASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING 25660b9f20aSDoug RabsonBUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION 25760b9f20aSDoug RabsonHEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF 25860b9f20aSDoug RabsonMERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 259