changelog shortlog tags branches files raw gz bz2 help

Mercurial > hg > plan9front / changeset: authsrv(6): fix arrows

changeset 5063: fe7929b7ec01
parent 5062: 56b99b5922d9
child 5064: 846326544dbe
author: cinap_lenrek@felloff.net
date: Tue, 19 Jan 2016 11:08:29 +0100
files: sys/man/6/authsrv
description: authsrv(6): fix arrows
     1.1--- a/sys/man/6/authsrv
     1.2+++ b/sys/man/6/authsrv
     1.3@@ -94,16 +94,16 @@ client's desired ID on server
     1.4 .BR suid )
     1.5 .TP
     1.6 .I YAc
     1.7-client \(-> AS DH public key
     1.8+client → AS DH public key
     1.9 .TP
    1.10 .I YBc
    1.11-AS \(-> client DH public key
    1.12+AS → client DH public key
    1.13 .TP
    1.14 .I YAs
    1.15-server \(-> AS DH public key
    1.16+server → AS DH public key
    1.17 .TP
    1.18 .I YBs
    1.19-AS \(-> server DH public key
    1.20+AS → server DH public key
    1.21 .TP
    1.22 .I RNc
    1.23 client's 32-byte random string
    1.24@@ -155,7 +155,7 @@ is the client's responsibility.
    1.25 .PP
    1.26 The protocol to obtain a ticket pair is:
    1.27 .TP
    1.28-.IR C \(-> A
    1.29+.I C→A:
    1.30 .IR AuthTreq ,
    1.31 .IR IDs ,
    1.32 .IR DN ,
    1.33@@ -163,7 +163,7 @@ The protocol to obtain a ticket pair is:
    1.34 .IR IDc ,
    1.35 .IR IDr
    1.36 .TP
    1.37-.IR A \(-> C
    1.38+.I A→C:
    1.39 .IR AuthOK ,
    1.40 .IR Kc { AuthTc ,
    1.41 .IR CHs ,
    1.42@@ -228,12 +228,12 @@ The Plan 9 shared key protocol
    1.43 allows a client and server to authenticate each other.
    1.44 The protocol is:
    1.45 .TP
    1.46-.IR C \(-> S
    1.47+.I C→S:
    1.48 .I CHc
    1.49 .br
    1.50 The client starts by sending a random challenge to the server.
    1.51 .TP
    1.52-.IR S \(-> C
    1.53+.I S→C:
    1.54 .IR AuthTreq ,
    1.55 .IR IDs ,
    1.56 .IR DN ,
    1.57@@ -245,7 +245,7 @@ The server replies with a ticket request
    1.58 id and authentication domain along with its own 
    1.59 random challenge.
    1.60 .TP
    1.61-.IR C \(-> S
    1.62+.I C→S:
    1.63 .IR Ks { AuthTs ,
    1.64 .IR CHs ,
    1.65 .IR IDc ,
    1.66@@ -275,7 +275,7 @@ and is therefore allowed to authenticate
    1.67 .IR CHs
    1.68 in the authenticator avoids replay attacks.)
    1.69 .TP
    1.70-.IR S \(-> C
    1.71+.I S→C:
    1.72 .IR Kn { AuthAs ,
    1.73 .IR CHc }
    1.74 .br
    1.75@@ -353,7 +353,7 @@ and
    1.76 .I IDc
    1.77 is:
    1.78 .TP
    1.79-.IR C \(-> A
    1.80+.I C→A:
    1.81 .IR AuthPAK ,
    1.82 .IR IDs ,
    1.83 .IR DN ,
    1.84@@ -363,7 +363,7 @@ is:
    1.85 .IR YAs ,
    1.86 .I YAc
    1.87 .TP
    1.88-.IR A \(-> C
    1.89+.I A→C:
    1.90 .IR AuthOK ,
    1.91 .IR YBs ,
    1.92 .I YBc
    1.93@@ -376,7 +376,7 @@ to establish a single server key
    1.94 for
    1.95 .IR IDs :
    1.96 .TP
    1.97-.IR C \(-> A
    1.98+.I C→A:
    1.99 .IR AuthPAK ,
   1.100 .IR \- ,
   1.101 .IR DN ,
   1.102@@ -385,7 +385,7 @@ for
   1.103 .IR IDc ,
   1.104 .I YAs
   1.105 .TP
   1.106-.IR A \(-> C
   1.107+.I A→C:
   1.108 .IR AuthOK ,
   1.109 .I YBs
   1.110 .PP
   1.111@@ -396,7 +396,7 @@ to establish a single client key
   1.112 for
   1.113 .IR IDc :
   1.114 .TP
   1.115-.IR C \(-> A
   1.116+.I C→A:
   1.117 .IR AuthPAK ,
   1.118 .IR \- ,
   1.119 .IR \- ,
   1.120@@ -405,7 +405,7 @@ for
   1.121 .IR IDc ,
   1.122 .I YAc
   1.123 .TP
   1.124-.IR A \(-> C
   1.125+.I A→C:
   1.126 .IR AuthOK ,
   1.127 .I YBc
   1.128 .SS "Dp9ik"
   1.129@@ -426,12 +426,12 @@ to derive the ticket encryption keys
   1.130 and
   1.131 .IR Kc :
   1.132 .TP
   1.133-.IR C \(-> S
   1.134+.I C→S:
   1.135 .I CHc
   1.136 .br
   1.137 The client starts by sending a random challenge to the server.
   1.138 .TP
   1.139-.IR S \(-> C
   1.140+.I S→C:
   1.141 .IR AuthPAK ,
   1.142 .IR IDs ,
   1.143 .IR DN ,
   1.144@@ -453,7 +453,7 @@ along with its own random challenge
   1.145 and its public key
   1.146 .IR YAs .
   1.147 .TP
   1.148-.IR C \(-> S
   1.149+.I C→S:
   1.150 .IR YBs ,
   1.151 .IR Ks { AuthTs ,
   1.152 .IR CHs ,
   1.153@@ -515,7 +515,7 @@ The random string
   1.154 .I RNc
   1.155 is used in the derivation of the session secret.
   1.156 .TP
   1.157-.IR S \(-> C
   1.158+.I S→C:
   1.159 .IR Kn { AuthAs ,
   1.160 .IR CHc ,
   1.161 .IR RNs }
   1.162@@ -540,17 +540,17 @@ protocol, followed by the agreed-upon pr
   1.163 .PP
   1.164 The negotiation protocol is:
   1.165 .TP
   1.166-.IR S \(-> C
   1.167+.I S→C:
   1.168 .B v.2
   1.169 .IB proto@authdom
   1.170 .IB proto@authdom
   1.171 .I ...
   1.172 .TP
   1.173-.IR C \(-> S
   1.174+.I C→S:
   1.175 .I proto
   1.176 .I dom
   1.177 .TP
   1.178-.IR S \(-> C
   1.179+.I S→C:
   1.180 .B OK
   1.181 .PP
   1.182 Each message is a NUL-terminated UTF string.
   1.183@@ -602,7 +602,7 @@ Users connect directly to the AS
   1.184 to change their passwords.
   1.185 The protocol is:
   1.186 .TP
   1.187-.IR C \(-> A
   1.188+.I C→A:
   1.189 .IR AuthPass ,
   1.190 .IR \- ,
   1.191 .IR \- ,
   1.192@@ -612,7 +612,7 @@ The protocol is:
   1.193 .br
   1.194 The client sends a password change ticket request.
   1.195 .TP
   1.196-.IR A \(-> C
   1.197+.I A→C:
   1.198 .IR Kc { AuthTp ,
   1.199 .IR CHc ,
   1.200 .IR IDc ,
   1.201@@ -624,7 +624,7 @@ The server responds with a ticket contai
   1.202 encrypted with the client's key
   1.203 .IR Kc
   1.204 .TP
   1.205-.IR C \(-> A
   1.206+.I C→A:
   1.207 .IR Kn { AuthPass ,
   1.208 .IR old ,
   1.209 .IR new ,
   1.210@@ -643,7 +643,7 @@ the user's
   1.211 .IR secret ,
   1.212 the password used for non-Plan 9 authentications.
   1.213 .TP
   1.214-.IR A \(-> C
   1.215+.I A→C:
   1.216 .I AuthOK
   1.217 or
   1.218 .IR AuthErr ,
   1.219@@ -727,7 +727,7 @@ message is expected, a
   1.220 message may be substituted.
   1.221 .de Ok
   1.222 .TP
   1.223-.IR A \(-> S
   1.224+.I A→S:
   1.225 .IR AuthOK ,
   1.226 .IR Ks { AuthTs ,
   1.227 .IR CHs ,
   1.228@@ -739,7 +739,7 @@ message may be substituted.
   1.229 ..
   1.230 .PP
   1.231 .TP
   1.232-.IR S \(-> A
   1.233+.I S→A:
   1.234 .IR AuthChal ,
   1.235 .IR \- ,
   1.236 .IR DN ,
   1.237@@ -747,11 +747,11 @@ message may be substituted.
   1.238 .IR IDs ,
   1.239 .IR IDc
   1.240 .TP
   1.241-.IR A \(-> S
   1.242+.I A→S:
   1.243 .IR AuthOK ,
   1.244 .IR challenge
   1.245 .TP
   1.246-.IR S \(-> A
   1.247+.I S→A:
   1.248 .IR response
   1.249 .Ok
   1.250 .IP
   1.251@@ -811,7 +811,7 @@ lines map from Plan 9 user ids to RADIUS
   1.252 Users not listed are assumed to have the
   1.253 same id in both places.
   1.254 .TP
   1.255-.IR S \(-> A
   1.256+.I S→A:
   1.257 .IR AuthApop ,
   1.258 .IR \- ,
   1.259 .IR DN ,
   1.260@@ -819,11 +819,11 @@ same id in both places.
   1.261 .IR IDs ,
   1.262 .IR \-
   1.263 .TP
   1.264-.IR A \(-> S
   1.265+.I A→S:
   1.266 .IR AuthOKvar ,
   1.267 .IR challenge
   1.268 .TP
   1.269-.IR S \(-> A 
   1.270+.I S→A:
   1.271 .IR AuthApop ,
   1.272 .IR \- ,
   1.273 .IR DN ,
   1.274@@ -862,7 +862,7 @@ is the keyed MD5 hash using the user's s
   1.275 in
   1.276 .IR sechash (2)).
   1.277 .TP
   1.278-.IR S \(-> A
   1.279+.I S→A:
   1.280 .IR AuthChap ,
   1.281 .IR \- ,
   1.282 .IR DN ,
   1.283@@ -870,10 +870,10 @@ in
   1.284 .IR IDs ,
   1.285 .IR \-
   1.286 .TP
   1.287-.IR A \(-> S
   1.288+.I A→S:
   1.289 .I challenge
   1.290 .TP
   1.291-.IR S \(-> A
   1.292+.I S→A:
   1.293 .IR pktid ,
   1.294 .IR IDc ,
   1.295 .IR response
   1.296@@ -892,7 +892,7 @@ The reply packet is defined as
   1.297 in
   1.298 .BR <authsrv.h> .
   1.299 .TP
   1.300-.IR S \(-> A
   1.301+.I S→A:
   1.302 .IR AuthMSchap ,
   1.303 .IR \- ,
   1.304 .IR DN ,
   1.305@@ -900,10 +900,10 @@ in
   1.306 .IR IDs ,
   1.307 .IR \-
   1.308 .TP
   1.309-.IR A \(-> S
   1.310+.I A→S:
   1.311 .I challenge
   1.312 .TP
   1.313-.IR S \(-> A
   1.314+.I S→A:
   1.315 .IR IDc ,
   1.316 .IR lm-response ,
   1.317 .IR nt-response
   1.318@@ -924,7 +924,7 @@ The reply packet is defined as
   1.319 in
   1.320 .BR <authsrv.h> .
   1.321 .TP
   1.322-.IR S \(-> A
   1.323+.I S→A:
   1.324 .IR AuthVNC ,
   1.325 .IR \- ,
   1.326 .IR DN ,
   1.327@@ -932,11 +932,11 @@ in
   1.328 .IR IDs ,
   1.329 .IR IDc
   1.330 .TP
   1.331-.IR A \(-> S
   1.332+.I A→S:
   1.333 .IR AuthOKvar ,
   1.334 .I challenge
   1.335 .TP
   1.336-.IR S \(-> A
   1.337+.I S→A:
   1.338 .I response
   1.339 .Ok
   1.340 .IP