xref: /freebsd/lib/libgssapi/gssapi.3 (revision fa9896e082a1046ff4fbc75fcba4d18d1f2efc19)
1c0b9f4feSDoug Rabson.\" -*- nroff -*-
2c0b9f4feSDoug Rabson.\"
3c0b9f4feSDoug Rabson.\" Copyright (c) 2005 Doug Rabson
4c0b9f4feSDoug Rabson.\" All rights reserved.
5c0b9f4feSDoug Rabson.\"
6c0b9f4feSDoug Rabson.\" Redistribution and use in source and binary forms, with or without
7c0b9f4feSDoug Rabson.\" modification, are permitted provided that the following conditions
8c0b9f4feSDoug Rabson.\" are met:
9c0b9f4feSDoug Rabson.\" 1. Redistributions of source code must retain the above copyright
10c0b9f4feSDoug Rabson.\"    notice, this list of conditions and the following disclaimer.
11c0b9f4feSDoug Rabson.\" 2. Redistributions in binary form must reproduce the above copyright
12c0b9f4feSDoug Rabson.\"    notice, this list of conditions and the following disclaimer in the
13c0b9f4feSDoug Rabson.\"    documentation and/or other materials provided with the distribution.
14c0b9f4feSDoug Rabson.\"
15c0b9f4feSDoug Rabson.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
16c0b9f4feSDoug Rabson.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17c0b9f4feSDoug Rabson.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18c0b9f4feSDoug Rabson.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
19c0b9f4feSDoug Rabson.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20c0b9f4feSDoug Rabson.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21c0b9f4feSDoug Rabson.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22c0b9f4feSDoug Rabson.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23c0b9f4feSDoug Rabson.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24c0b9f4feSDoug Rabson.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
25c0b9f4feSDoug Rabson.\" SUCH DAMAGE.
26c0b9f4feSDoug Rabson.\"
27d76ba3efSGavin Atkinson.Dd January 26, 2010
28c0b9f4feSDoug Rabson.Dt GSSAPI 3
29c0b9f4feSDoug Rabson.Os
30c0b9f4feSDoug Rabson.Sh NAME
31c0b9f4feSDoug Rabson.Nm gssapi
32c0b9f4feSDoug Rabson.Nd "Generic Security Services API"
33c0b9f4feSDoug Rabson.Sh LIBRARY
34c0b9f4feSDoug RabsonGSS-API Library (libgssapi, -lgssapi)
35c0b9f4feSDoug Rabson.Sh SYNOPSIS
36c0b9f4feSDoug Rabson.In gssapi/gssapi.h
37c0b9f4feSDoug Rabson.Sh DESCRIPTION
38c0b9f4feSDoug RabsonThe Generic Security Service Application Programming Interface
39c0b9f4feSDoug Rabsonprovides security services to its callers,
40c0b9f4feSDoug Rabsonand is intended for implementation atop a variety of underlying
41c0b9f4feSDoug Rabsoncryptographic mechanisms.
42c0b9f4feSDoug RabsonTypically, GSS-API callers will be application protocols into which
43c0b9f4feSDoug Rabsonsecurity enhancements are integrated through invocation of services
44c0b9f4feSDoug Rabsonprovided by the GSS-API.
45c0b9f4feSDoug RabsonThe GSS-API allows a caller application to authenticate a principal
46c0b9f4feSDoug Rabsonidentity associated with a peer application, to delegate rights to a
47c0b9f4feSDoug Rabsonpeer,
48c0b9f4feSDoug Rabsonand to apply security services such as confidentiality and integrity
49c0b9f4feSDoug Rabsonon a per-message basis.
50c0b9f4feSDoug Rabson.Pp
51c0b9f4feSDoug RabsonThere are four stages to using the GSS-API:
52c0b9f4feSDoug Rabson.Bl -tag -width "a)"
53c0b9f4feSDoug Rabson.It a)
54c0b9f4feSDoug RabsonThe application acquires a set of credentials with which it may prove
55c0b9f4feSDoug Rabsonits identity to other processes.
56c0b9f4feSDoug RabsonThe application's credentials vouch for its global identity,
57c0b9f4feSDoug Rabsonwhich may or may not be related to any local username under which it
58c0b9f4feSDoug Rabsonmay be running.
59c0b9f4feSDoug Rabson.It b)
60c0b9f4feSDoug RabsonA pair of communicating applications establish a joint security
61c0b9f4feSDoug Rabsoncontext using their credentials.
62c0b9f4feSDoug RabsonThe security context is a pair of GSS-API data structures that contain
63c0b9f4feSDoug Rabsonshared state information, which is required in order that per-message
64c0b9f4feSDoug Rabsonsecurity services may be provided.
65c0b9f4feSDoug RabsonExamples of state that might be shared between applications as part of
66c0b9f4feSDoug Rabsona security context are cryptographic keys,
67c0b9f4feSDoug Rabsonand message sequence numbers.
68c0b9f4feSDoug RabsonAs part of the establishment of a security context,
69c0b9f4feSDoug Rabsonthe context initiator is authenticated to the responder,
70c0b9f4feSDoug Rabsonand may require that the responder is authenticated in turn.
71c0b9f4feSDoug RabsonThe initiator may optionally give the responder the right to initiate
72c0b9f4feSDoug Rabsonfurther security contexts,
73c0b9f4feSDoug Rabsonacting as an agent or delegate of the initiator.
74c0b9f4feSDoug RabsonThis transfer of rights is termed delegation,
75c0b9f4feSDoug Rabsonand is achieved by creating a set of credentials,
76c0b9f4feSDoug Rabsonsimilar to those used by the initiating application,
77c0b9f4feSDoug Rabsonbut which may be used by the responder.
78c0b9f4feSDoug Rabson.Pp
79c0b9f4feSDoug RabsonTo establish and maintain the shared information that makes up the
80c0b9f4feSDoug Rabsonsecurity context,
81c0b9f4feSDoug Rabsoncertain GSS-API calls will return a token data structure,
82c0b9f4feSDoug Rabsonwhich is an opaque data type that may contain cryptographically
83c0b9f4feSDoug Rabsonprotected data.
84c0b9f4feSDoug RabsonThe caller of such a GSS-API routine is responsible for transferring
85c0b9f4feSDoug Rabsonthe token to the peer application,
86c0b9f4feSDoug Rabsonencapsulated if necessary in an application protocol.
87c0b9f4feSDoug RabsonOn receipt of such a token, the peer application should pass it to a
88c0b9f4feSDoug Rabsoncorresponding GSS-API routine which will decode the token and extract
89c0b9f4feSDoug Rabsonthe information,
90c0b9f4feSDoug Rabsonupdating the security context state information accordingly.
91c0b9f4feSDoug Rabson.It c)
92c0b9f4feSDoug RabsonPer-message services are invoked to apply either:
93c0b9f4feSDoug Rabson.Pp
94c0b9f4feSDoug Rabsonintegrity and data origin authentication, or confidentiality,
95c0b9f4feSDoug Rabsonintegrity and data origin authentication to application data,
96c0b9f4feSDoug Rabsonwhich are treated by GSS-API as arbitrary octet-strings.
97c0b9f4feSDoug RabsonAn application transmitting a message that it wishes to protect will
98c0b9f4feSDoug Rabsoncall the appropriate GSS-API routine (gss_get_mic or gss_wrap) to
99c0b9f4feSDoug Rabsonapply protection,
100c0b9f4feSDoug Rabsonspecifying the appropriate security context,
101c0b9f4feSDoug Rabsonand send the resulting token to the receiving application.
102c0b9f4feSDoug RabsonThe receiver will pass the received token (and, in the case of data
103c0b9f4feSDoug Rabsonprotected by gss_get_mic, the accompanying message-data) to the
104c0b9f4feSDoug Rabsoncorresponding decoding routine (gss_verify_mic or gss_unwrap) to
105c0b9f4feSDoug Rabsonremove the protection and validate the data.
106c0b9f4feSDoug Rabson.It d)
107c0b9f4feSDoug RabsonAt the completion of a communications session (which may extend across
108c0b9f4feSDoug Rabsonseveral transport connections),
109c0b9f4feSDoug Rabsoneach application calls a GSS-API routine to delete the security
110c0b9f4feSDoug Rabsoncontext.
111c0b9f4feSDoug RabsonMultiple contexts may also be used (either successively or
112c0b9f4feSDoug Rabsonsimultaneously) within a single communications association, at the
113c0b9f4feSDoug Rabsonoption of the applications.
114c0b9f4feSDoug Rabson.El
115c0b9f4feSDoug Rabson.Sh GSS-API ROUTINES
116c0b9f4feSDoug RabsonThis section lists the routines that make up the GSS-API,
117c0b9f4feSDoug Rabsonand offers a brief description of the purpose of each routine.
118c0b9f4feSDoug Rabson.Pp
119c0b9f4feSDoug RabsonGSS-API Credential-management Routines:
120c0b9f4feSDoug Rabson.Bl -tag -width "gss_inquire_cred_by_mech"
121c0b9f4feSDoug Rabson.It gss_acquire_cred
122c0b9f4feSDoug RabsonAssume a global identity; Obtain a GSS-API credential handle for
123c0b9f4feSDoug Rabsonpre-existing credentials.
124c0b9f4feSDoug Rabson.It gss_add_cred
125c0b9f4feSDoug RabsonConstruct credentials incrementally
126c0b9f4feSDoug Rabson.It gss_inquire_cred
127c0b9f4feSDoug RabsonObtain information about a credential
128c0b9f4feSDoug Rabson.It gss_inquire_cred_by_mech
129c0b9f4feSDoug RabsonObtain per-mechanism information about a credential.
130c0b9f4feSDoug Rabson.It gss_release_cred
131c0b9f4feSDoug RabsonDiscard a credential handle.
132c0b9f4feSDoug Rabson.El
133c0b9f4feSDoug Rabson.Pp
134c0b9f4feSDoug RabsonGSS-API Context-Level Routines:
135c0b9f4feSDoug Rabson.Bl -tag -width "gss_inquire_cred_by_mech"
136c0b9f4feSDoug Rabson.It gss_init_sec_context
137c0b9f4feSDoug RabsonInitiate a security context with a peer application
138c0b9f4feSDoug Rabson.It gss_accept_sec_context
139c0b9f4feSDoug RabsonAccept a security context initiated by a peer application
140c0b9f4feSDoug Rabson.It gss_delete_sec_context
141c0b9f4feSDoug RabsonDiscard a security context
142c0b9f4feSDoug Rabson.It gss_process_context_token
143c0b9f4feSDoug RabsonProcess a token on a security context from a peer application
144c0b9f4feSDoug Rabson.It gss_context_time
145c0b9f4feSDoug RabsonDetermine for how long a context will remain valid
146c0b9f4feSDoug Rabson.It gss_inquire_context
147c0b9f4feSDoug RabsonObtain information about a security context
148c0b9f4feSDoug Rabson.It gss_wrap_size_limit
149c0b9f4feSDoug RabsonDetermine token-size limit for
150c0b9f4feSDoug Rabson.Xr gss_wrap 3
151c0b9f4feSDoug Rabsonon a context
152c0b9f4feSDoug Rabson.It gss_export_sec_context
153c0b9f4feSDoug RabsonTransfer a security context to another process
154c0b9f4feSDoug Rabson.It gss_import_sec_context
155c0b9f4feSDoug RabsonImport a transferred context
156c0b9f4feSDoug Rabson.El
157c0b9f4feSDoug Rabson.Pp
158c0b9f4feSDoug RabsonGSS-API Per-message Routines:
159c0b9f4feSDoug Rabson.Bl -tag -width "gss_inquire_cred_by_mech"
160c0b9f4feSDoug Rabson.It gss_get_mic
161c0b9f4feSDoug RabsonCalculate a cryptographic message integrity code (MIC) for a message;
162c0b9f4feSDoug Rabsonintegrity service
163c0b9f4feSDoug Rabson.It gss_verify_mic
164c0b9f4feSDoug RabsonCheck a MIC against a message;
165c0b9f4feSDoug Rabsonverify integrity of a received message
166c0b9f4feSDoug Rabson.It gss_wrap
167c0b9f4feSDoug RabsonAttach a MIC to a message, and optionally encrypt the message content;
168c0b9f4feSDoug Rabsonconfidentiality service
169c0b9f4feSDoug Rabson.It gss_unwrap
170c0b9f4feSDoug RabsonVerify a message with attached MIC, and decrypt message content if
171c0b9f4feSDoug Rabsonnecessary.
172c0b9f4feSDoug Rabson.El
173c0b9f4feSDoug Rabson.Pp
174c0b9f4feSDoug RabsonGSS-API Name manipulation Routines:
175c0b9f4feSDoug Rabson.Bl -tag -width "gss_inquire_cred_by_mech"
176c0b9f4feSDoug Rabson.It gss_import_name
177c0b9f4feSDoug RabsonConvert a contiguous string name to internal-form
178c0b9f4feSDoug Rabson.It gss_display_name
179c0b9f4feSDoug RabsonConvert internal-form name to text
180c0b9f4feSDoug Rabson.It gss_compare_name
181c0b9f4feSDoug RabsonCompare two internal-form names
182c0b9f4feSDoug Rabson.It gss_release_name
183c0b9f4feSDoug RabsonDiscard an internal-form name
184c0b9f4feSDoug Rabson.It gss_inquire_names_for_mech
185c0b9f4feSDoug RabsonList the name-types supported by the specified mechanism
186c0b9f4feSDoug Rabson.It gss_inquire_mechs_for_name
187c0b9f4feSDoug RabsonList mechanisms that support the specified name-type
188c0b9f4feSDoug Rabson.It gss_canonicalize_name
189c0b9f4feSDoug RabsonConvert an internal name to an MN
190c0b9f4feSDoug Rabson.It gss_export_name
191c0b9f4feSDoug RabsonConvert an MN to export form
192c0b9f4feSDoug Rabson.It gss_duplicate_name
193c0b9f4feSDoug RabsonCreate a copy of an internal name
194c0b9f4feSDoug Rabson.El
195c0b9f4feSDoug Rabson.Pp
196c0b9f4feSDoug RabsonGSS-API Miscellaneous Routines
197c0b9f4feSDoug Rabson.Bl -tag -width "gss_inquire_cred_by_mech"
198c0b9f4feSDoug Rabson.It gss_add_oid_set_member
199c0b9f4feSDoug RabsonAdd an object identifier to a set
200c0b9f4feSDoug Rabson.It gss_display_status
201c0b9f4feSDoug RabsonConvert a GSS-API status code to text
202c0b9f4feSDoug Rabson.It gss_indicate_mechs
203c0b9f4feSDoug RabsonDetermine available underlying authentication mechanisms
204c0b9f4feSDoug Rabson.It gss_release_buffer
205c0b9f4feSDoug RabsonDiscard a buffer
206c0b9f4feSDoug Rabson.It gss_release_oid_set
207c0b9f4feSDoug RabsonDiscard a set of object identifiers
208c0b9f4feSDoug Rabson.It gss_create_empty_oid_set
209c0b9f4feSDoug RabsonCreate a set containing no object identifiers
210c0b9f4feSDoug Rabson.It gss_test_oid_set_member
211c0b9f4feSDoug RabsonDetermines whether an object identifier is a member of a set.
212c0b9f4feSDoug Rabson.El
213c0b9f4feSDoug Rabson.Pp
214c0b9f4feSDoug RabsonIndividual GSS-API implementations may augment these routines by
215c0b9f4feSDoug Rabsonproviding additional mechanism-specific routines if required
216c0b9f4feSDoug Rabsonfunctionality is not available from the generic forms.
217c0b9f4feSDoug RabsonApplications are encouraged to use the generic routines wherever
218c0b9f4feSDoug Rabsonpossible on portability grounds.
219c0b9f4feSDoug Rabson.Sh STANDARDS
220*6a557179SJoel Dahl.Bl -tag -width ".It RFC 2743"
221c0b9f4feSDoug Rabson.It RFC 2743
222c0b9f4feSDoug RabsonGeneric Security Service Application Program Interface Version 2, Update 1
223c0b9f4feSDoug Rabson.It RFC 2744
224c0b9f4feSDoug RabsonGeneric Security Service API Version 2 : C-bindings
225c0b9f4feSDoug Rabson.El
226c0b9f4feSDoug Rabson.Sh HISTORY
227c0b9f4feSDoug RabsonThe
228c0b9f4feSDoug Rabson.Nm
229d76ba3efSGavin Atkinsonlibrary first appeared in
230c0b9f4feSDoug Rabson.Fx 7.0 .
231c0b9f4feSDoug Rabson.Sh AUTHORS
232c0b9f4feSDoug RabsonJohn Wray, Iris Associates
23360b9f20aSDoug Rabson.Sh COPYRIGHT
23460b9f20aSDoug RabsonCopyright (C) The Internet Society (2000).  All Rights Reserved.
23560b9f20aSDoug Rabson.Pp
23660b9f20aSDoug RabsonThis document and translations of it may be copied and furnished to
23760b9f20aSDoug Rabsonothers, and derivative works that comment on or otherwise explain it
23860b9f20aSDoug Rabsonor assist in its implementation may be prepared, copied, published
23960b9f20aSDoug Rabsonand distributed, in whole or in part, without restriction of any
24060b9f20aSDoug Rabsonkind, provided that the above copyright notice and this paragraph are
24160b9f20aSDoug Rabsonincluded on all such copies and derivative works.  However, this
24260b9f20aSDoug Rabsondocument itself may not be modified in any way, such as by removing
24360b9f20aSDoug Rabsonthe copyright notice or references to the Internet Society or other
24460b9f20aSDoug RabsonInternet organizations, except as needed for the purpose of
24560b9f20aSDoug Rabsondeveloping Internet standards in which case the procedures for
24660b9f20aSDoug Rabsoncopyrights defined in the Internet Standards process must be
24760b9f20aSDoug Rabsonfollowed, or as required to translate it into languages other than
24860b9f20aSDoug RabsonEnglish.
24960b9f20aSDoug Rabson.Pp
25060b9f20aSDoug RabsonThe limited permissions granted above are perpetual and will not be
25160b9f20aSDoug Rabsonrevoked by the Internet Society or its successors or assigns.
25260b9f20aSDoug Rabson.Pp
25360b9f20aSDoug RabsonThis document and the information contained herein is provided on an
25460b9f20aSDoug Rabson"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
25560b9f20aSDoug RabsonTASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
25660b9f20aSDoug RabsonBUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
25760b9f20aSDoug RabsonHEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
25860b9f20aSDoug RabsonMERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
259