retire-cat-pages-20051213

These can go now that we have POD versions of, in most cases, newer
versions of the same documentation.
This commit is contained in:
Russ Allbery 2005-12-14 01:36:05 +00:00
parent f64a78e701
commit 5d2b5780c4
119 changed files with 0 additions and 15478 deletions

View File

@ -1,69 +0,0 @@
ftpd (AFS version) AFS Commands ftpd (AFS version)
NAME
ftpd (AFS version) -- initialize Internet File Transfer
Protocol server.
/usr/etc/ftpd [-d] [-l] [-ttimeout]
DESCRIPTION
Functions like the standard UNIX ftpd, except that it also
authenticates the issuer of the ftp command (who is
presumably working on a remote machine) with the
Authentication Server in the local cell (the home cell of
the machine where ftpd is running). The authentication is
based on the user name and password provided at the ftp
prompts on the remote machine. The Cache Manager on the
machine running ftpd stores the newly created token,
identifying it by PAG rather than by the user's UNIX UID.
The issuer of ftp may be working in a foreign cell, as long
as the user name and password provided are valid in the cell
where ftpd is running.
If the user name under which ftp is issued does not exist in
the Authentication Database for the cell where ftpd is
running, or the issuer provides the wrong password, then
ftpd logs the user into the UNIX file system of the machine
where ftpd is running. The success of this local login
depends on the user name appearing in the local password
file and on the user providing the correct local password.
In the case of a local login, AFS server processes consider
the issuer of ftp to be anonymous.
In the configuration recommended by Transarc Corporation,
the AFS version of ftpd is substituted for the standard
version (only one of the versions can run at a time). The
administrator then has two choices:
- name the binary for the AFS version something like
ftpd.afs, leaving the standard version as ftpd.
Change inetd.conf to refer to ftpd.afs; the
standard version is not referenced.
- name the binary for the AFS version ftpd and
rename the binary for the standard version to
something like ftpd.old. No change to inetd.conf
is necessary, but it is not as obvious that the
standard version of ftpd is no longer in use.
ARGUMENTS
See the UNIX manual page for ftpd.
PRIVILEGE REQUIRED
See the UNIX manual page for ftpd.
MORE INFORMATION
UNIX manual page for ftp
UNIX manual page for ftpd

View File

@ -1,163 +0,0 @@
inetd (AFS version) AFS Commands inetd (AFS version)
NAME
inetd (AFS version) -- initialize Internet service daemon.
/etc/inetd [-d] [<configfile>]
DESCRIPTION
Functions like the standard UNIX inetd in invoking an
Internet service daemon (itself called "inetd") that handles
remotely-issued commands. The AFS inetd enables users of
the remote services it supports to access those services as
authenticated AFS users, provided that the supported
services are also AFS versions capable of passing AFS tokens
(authentication information). Examples of supported
services are rcp and rsh.
AFS inetd can service the standard UNIX versions of the
remote services, but it is instead recommended that the
standard UNIX version of inetd be run in parallel with the
AFS version. Name the AFS version something like inetd.afs
and use it to service requests from AFS-modified programs;
use standard inetd to service requests from standard UNIX
programs. This separation requires using two different
inetd.conf files, as described in the
REQUIREMENTS/RESTRICTIONS section.
REQUIREMENTS/RESTRICTIONS
Several configuration changes are necessary for token
passing to work correctly with the AFS version of inetd.
There may be other UNIX-based requirements/restrictions not
mentioned here; consult the UNIX manual page. (One
important restriction is that there can be no blank lines in
the configuration file other than at the end.)
The requirements/restrictions include the following. They
assume that inetd.afs is running in parallel with standard
inetd.
- For token passing to work, the request must come
from the AFS version of the remote service (such
as AFS rcp or AFS rsh). If the remote service is
the standard UNIX version, it will not pass
tokens. The issuer of the remote command is
authenticated only in the local UNIX file system,
not with AFS, so the AFS server processes in the
local cell consider the issuer to be anonymous.
- The machine's reboot configuration file (/etc/rc
or equivalent) should be altered so that it starts
both standard inetd and inetd.afs.
- An AFS-specific inetd.conf file, perhaps called
inetd.conf.afs, should exist alongside the
standard one. When initializing inetd.afs,
specify this configuration file rather than the
standard one.
Each line in the inetd.conf.afs file must include
an additional field, fifth from the left, to
specify the identity under which the program is to
run. The normal choice is "root." The following
sample shows the only lines that should appear in
this file:
ta-rauth stream tcp nowait root internal
shell stream tcp nowait root /usr/etc/r
login stream tcp nowait root /usr/etc/r
Substitute appropriate values for the binary
locations and names on the shell and login lines.
Include the login line only if the AFS version of
login is also in use in the cell; otherwise, refer
to login in the standard inetd.conf instead. In
addition, if the inetd.cond.afs file is used on a
machine with a Sun system type, change rshd to
in.rshd and change rlogind.afs to in.rlogind.afs
on the shell and login lines, respectively.
- The standard inetd.conf (referred to by the
standard inetd) should be altered: comment out the
shell line and, if the AFS version of login is in
use in the cell, the login line. References to
these programs appear in inetd.conf.afs instead.
Retain the login line if AFS login is not being
used. Alter the ftp line to refer to the AFS
version of ftpd, if it was substituted for the
standard version. Do not insert the extra fifth
column into standard inetd.conf if it does not
already appear there. See the EXAMPLE section
below for an illustration.
- The following two lines must appear in the
/etc/services file on the machine running inetd
(as well as on the machine running modified rcp or
rsh). On NeXT machines, this information must
appear in the NetInfo database rather than in
/etc/services.
auth 113/tcp authentication
ta-rauth 601/tcp rauth
ARGUMENTS
See the UNIX manual page for inetd.
EXAMPLE
The following are sample inetd.conf.afs and inetd.conf
files, appropriate for use when inetd.afs is running in
parallel with standard inetd and AFS login is being used in
the cell. Changes to standard inetd.conf include
referencing the AFS version of the ftpd binary and
commenting out shell and login. The example inetd.conf does
not include the extra fifth column. Do not use these
examples without modifying them appropriately for the local
machine type or cell.
# AFS version of Internet server configuration datab
#(EXAMPLE ONLY)
#
ta-rauth stream tcp nowait root internal
shell stream tcp nowait root /usr/etc/rshd
login stream tcp nowait root /usr/etc/rlogind.afs
# Standard version of Internet server configuration
#(EXAMPLE ONLY)
#
ftp stream tcp nowait /etc/ftpd.afs ftpd
telnet stream tcp nowait /etc/telnetd teln
#shell stream tcp nowait /etc/rshd rshd
#login stream tcp nowait /etc/rlogind rlog
finger stream tcp nowait /usr/etc/fingd fing
uucp stream tcp nowait /etc/uucpd uucp
exec stream tcp nowait /etc/rexecd rexe
comsat dgram udp wait /etc/comsat coms
talk dgram udp wait /etc/talkd talk
ntalk dgram udp wait /usr/etc/ntalkd talk
time dgram udp wait /etc/miscd time
PRIVILEGE REQUIRED
See the UNIX manual page for inetd.
MORE INFORMATION
rcp (AFS version)
rsh (AFS version)
UNIX manual page for inetd

View File

@ -1,204 +0,0 @@
login (AFS version) AFS Commands login (AFS version)
NAME
login (AFS version) -- login to AFS and UNIX file systems.
login [<user name>]
Authenticates the issuer with the AFS Authentication Server
in the local cell and logs him or her into the local
machine's UNIX file system. More precisely, AFS login:
- creates a new "process authentication group" (PAG)
associated with the issuer and the command shell
where the command is issued. A PAG is a number
guaranteed to identify the issuer uniquely to the
local Cache Manager. The Cache Manager uses the
PAG, instead of the issuer's UNIX UID, to identify
him or her in the credential structure that it
creates to track each user.
- authenticates the user with the AFS Authentication
Server and obtains a "token"; the other AFS server
processes in the cell accept the token as partial
proof that the user is a legitimate AFS user. The
Cache Manager stores the token in the credential
structure along with the PAG, and presents it to
AFS server processes as necessary.
- logs the user into the local UNIX file system
The lifetime of the token resulting from this command is the
smallest of the following:
- the "maximum ticket lifetime" recorded in the
"afs" entry in the Authentication Database. The
default is 100 hours. Administrators can inspect
this value using kas examine, and change it using
kas setfields.
- the "maximum ticket lifetime" recorded in the
issuer's Authentication Database entry. The
default is 25 hours for user entries created by
the AFS 3.1 or later version of the Authentication
Server, and 100 hours for user entries created by
the AFS 3.0 version of the Authentication Server.
Administrators and the user himself/herself can
inspect this value using kas examine, and
administrators can change it using kas setfields.
- the "maximum ticket lifetime" recorded in the
"krbtgt.CELLNAME" entry in the Authentication
Database; this entry corresponds to the ticket-
granting ticket used internally in generating the
token. The default is 720 hours (30 days).
If none of these defaults have been changed, then the
standard token lifetime is 25 hours for users whose
Authentication Database entries were created by the AFS 3.1
or later version of the Authentication Server, and 100 hours
for users whose Authentication Database entries were created
by the AFS 3.0 version of the Authentication Server. The
user can issue klog to request a token with a different
lifetime.
Using a PAG instead of the UNIX UID to distinguish users has
two advantages.
- It means that processes spawned by the user
inherit the PAG and so share the token; thus they
gain access to AFS as the authenticated user.
This is important in many environments where, for
example, printer and other daemons run under
identities (such as "root") that the AFS server
processes recognize only as anonymous. Unless
PAGs are used, such daemons cannot access
information in directories protected against
system:anyuser.
- It closes a potential security loophole: UNIX
allows anyone already logged in as "root" on a
machine to assume any other identity by issuing
su. If the credential structure were identified
by a UNIX UID rather than a PAG, then assuming the
same UID would mean being able to use the token,
too. Use of a PAG as an identifier eliminates
that possibility.
The process of authenticating with the AFS Authentication
Server is as follows:
1. The login program checks the user's entry in the
local /etc/passwd file.
If no entry exists, or if an asterisk ( * )
appears in the password field, the login attempt
fails.
If the entry exists, the attempt proceeds to step
LOGIN.PAG.
2. The login program invokes the command that
creates a PAG.
3. The login program converts the password provided
by the user into an encryption key and encrypts a
packet of data with the key. It sends the packet
to an AFS Authentication Server. The
Authentication Server decrypts the packet and,
depending on the success of the decryption,
judges the password to be correct or incorrect.
(Consult the AFS System Administrator's Guide for
more information on the "mutual authentication"
procedure used to verify the password in this
step.)
If the Authentication Server judges the password
incorrect, the user does not receive an AFS
token. The attempt proceeds to step LOGIN.LOCAL.
If the Authentication Server judges the password
correct, it issues a token to the user as proof
of AFS authentication. The login program also
logs the user into the local UNIX file system.
Step LOGIN.LOCAL is skipped.
4. If no AFS token was granted in step 3, the login
programattempts to log the user into the local
UNIX file system, by comparing the password
provided to the local password file (/etc/passwd,
for instance).
If the provided password is incorrect, or the
password field in the local password file
contains anything other than a 13-character
UNIX-encrypted password string, then the login
attempt fails.
If the password is correct, the user is logged
into the local UNIX file system only. (The
success of this attempt and the failure of the
AFS authentication implies that the AFS and local
passwords are different and that the issuer
provided the latter.)
WARNINGS
Each PAG uses two of the memory slots that the kernel uses
to record the UNIX groups associated with a user. If none
of these slots are available, the PAG creation fails. The
use of two group slots per PAG does not present a problem
with most operating systems, which make at least 16 slots
available.
The AFS version of login is based on the Berkeley 4.3
Distribution and does not include the modified features
included in some proprietary versions of login.
The AFS version of login works only on machines that have
run afsd.
ARGUMENTS
See the UNIX manual page for login. The AFS version does
not impose any stronger restrictions on acceptable user
names than does the UNIX file system.
OUTPUT
To distinguish the AFS version of login from other versions,
one of the following banners appears on standard out
(stdout) when the command executes successfully.
AFS 3.0 Login
or
AFS 3.2 (R) Login
Various error messages appear if the login attempt is not
successful. The "login:" prompt normally returns following
the error messages, giving the user another chance to type
the password correctly.
PRIVILEGE REQUIRED
None.
MORE INFORMATION
rlogind (AFS version)
UNIX manual page for login

View File

@ -1,134 +0,0 @@
rcp (AFS version) AFS Commands rcp (AFS version)
NAME
rcp (AFS version) -- copy file on remote machine.
+
rcp [-p] <file1> <file2> rcp [-r] [-p] <file> <directory>
DESCRIPTION
Functions like the standard UNIX rcp, except it allows the
issuer to use the remote machine's Cache Manager to access
AFS files as an authenticated AFS user. The command passes
a copy of the AFS token which the issuer obtained on the
local machine to the remote machine's Cache Manager. The
remote Cache Manager can use the token to gain authenticated
access to AFS.
Token passing is most effective if both the remote machine
and local machine belong to the same cell, because rcp can
pass only one token even if the user has several tokensMit
passes the token that is marked [1] in the output from the
tokens command. If the remote and local machine are not in
the same cell, the possibilities are:
- the token passed is for the cell to which the
remote machine belongs. The issuer accesses the
remote cell's AFS file tree as an authenticated
AFS user, but is considered anonymous in the local
cell. This means that the issuer can only
exercise the access rights granted to
system:anyuser in the local AFS file tree. For
instance, a file being copied into the local cell
can only be copied into a UNIX directory or an AFS
directory where system:anyuser has the INSERT
right.
- the token passed is for the cell to which the
local machine belongs. The issuer accesses the
remote cell's AFS file tree as anonymous, and so
can only exercise the access rights granted to
system:anyuser.
In addition to running the AFS version of the rcp binary on
the machine where the rcp command is issued, other
configuration changes are necessary for token passing to
work properly. See the REQUIREMENTS/RESTRICTIONS section
for a list.
The AFS version of rcp is compatible with the standard
inetd, but token passing works only if the AFS versions of
both programs are being used. If only one of them is
modified, the issuer will access AFS files through the
remote machine as anonymous.
WARNINGS
AFS rcp does not allow "third party copies", in which
neither source nor target file is on the current machine.
Standard UNIX rcp claims to provide this functionality.
The protections required on the .rhosts file in order for
token passing to work with this command (see the
REQUIREMENTS/RESTRICTIONS section) are the opposite of those
necessary for token creation to work with the AFS version of
rlogind.
For security's sake, use the AFS version of rcp only in
conjunction with PAGs, either by using the AFS version of
login or always issuing pagsh before obtaining tokens.
REQUIREMENTS/RESTRICTIONS
Several configuration requirements and restrictions are
necessary for token passing to work correctly with the AFS
version of rcp. Some of these are also necessary with the
standard UNIX version, but are included here because the
issuer accustomed to AFS protections may not consider them.
There may be other UNIX-based requirements/restrictions not
mentioned here; consult the UNIX manual page. (One
important one is that no stty commands may appear in the
issuer's shell initialization file, such as .cshrc.)
The requirements/restrictions for token passing include the
following.
- The local machine must be running the AFS version
of rcp, with the rcp binary file locally installed
to grant setuid privilege to the owner, "root".
- The remote machine must be running the AFS version
of inetd.
- The following two lines must appear in the
/etc/services file on the local machine (as well
as on the remote machine running modified inetd).
On NeXT machines, this information must appear in
the NetInfo database rather than in /etc/services.
auth 113/tcp authentication
ta-rauth 601/tcp rauth
- If rcp is to consult an .rhosts file on the remote
machine, the file must have UNIX protections no
more liberal than -rw-r--r--. If .rhosts resides
in a user home directory in AFS, the home
directory must also grant the LOOKUP and READ
rights to system:anyuser.
ARGUMENTS
Consult the UNIX manual page for rcp.
PRIVILEGE REQUIRED
None.
MORE INFORMATION
inetd (AFS version)
UNIX manual page for rcp
rlogind (AFS version)
tokens

View File

@ -1,91 +0,0 @@
rlogind (AFS version) AFS Commands rlogind (AFS version)
NAME
rlogind (AFS version) -- initialize remote login server.
/etc/rlogind
DESCRIPTION
Functions like the standard UNIX rlogind, except that it is
appropriate only for cells using the AFS version of the
login program supplied by Transarc Corporation.
The AFS modifications to rlogind are strictly internal and
are necessary so that remote AFS authentication is possible
with the rlogin command. When a user issues rlogin, the AFS
version of rlogind running on the remote machine invokes the
AFS version of login; the user therefore obtains AFS tokens
on the remote machine.
In the configuration recommended by Transarc Corporation,
the AFS version of rlogind is substituted for the standard
versionMbut only if the AFS version of login is also being
used in the cell. (Only one version of rlogind can run on a
machine at a time.) The administrator then has two choices:
- name the binary for the AFS version something like
rlogind.afs, leaving the standard version as
rlogind. Refer to rlogind.afs in inetd.conf.afs
(the AFS version of inetd.conf), and comment out
the reference to standard rlogind in standard
inetd.conf.
- name the binary for the AFS version rlogind and
rename the binary for the standard version to
something like rlogind.old. Refer to rlogind in
inetd.conf.afs (the AFS version of inetd.conf),
and comment out the reference to rlogind in
standard inetd.conf.
WARNINGS
The AFS version of rlogind is not available for the AIX
2.2.1 operating system. (AIX 2.2.1 does not include the
standard rlogind either.)
Do not install the AFS version of rlogind if the AFS version
of login is not being used in the cell.
Remote AFS authentication is possible with rlogin only if
EITHER no .rhosts file exists on the machine where rlogind
is running
OR .rhosts exists on the machine where rlogind is running, b
has mode bits more liberal than -rw-r--r--. If .rhosts has
mode bits as restrictive as -rw-r--r--, then rlogind logs th
issuer of the remote rlogin command into the local UNIX file
system without prompting for a password. The issuer does no
tokens (authenticate with AFS), because that requires provid
password. The user can, however, obtain tokens by issuing p
and klog after establishing the connection.
The protection required on .rhosts for token creation to
work properly are exactly opposite those necessary for the
AFS versions of rcp and rsh to handle tokens properly. The
recommended solution is to configure .rhosts so that rcp and
rsh work properly and to use telnet instead of rlogin.
No modifications to rlogin itself are necessary for AFS
authentication to work.
PRIVILEGE REQUIRED
See the UNIX manual page for rlogind.
MORE INFORMATION
login (AFS version)
rcp (AFS version)
UNIX manual page for rlogind
rsh (AFS version)

View File

@ -1,109 +0,0 @@
rsh (AFS version) AFS Commands rsh (AFS version)
NAME
rsh (AFS version) -- open shell on remote machine.
rsh host [-l <username>] [-n] <command> host [-l
<username>] [-n] <command>
DESCRIPTION
Functions like the standard UNIX rsh, except that it allows
the issuer to execute commands on the remote machine as an
authenticated AFS user. The command passes a copy of the
AFS token that the issuer has obtained on the local machine
to the remote machine's Cache Manager. The remote Cache
Manager can use the token to have the issuer recognized as
an authenticated AFS user.
Token passing is most effective if both the remote machine
and local machine belong to the same cell, because rsh can
pass only one token even if the user has severalMit passes
the token that is marked [1] in the output from the tokens
command. If the remote and local machine are not in the
same cell, the token should be for the cell to which the
remote machine belongs, so that the remote cell's server
processes will recognize the issuer as authenticated.
In addition to running the AFS version of the rsh binary on
the machine where the rsh command is issued, other
configuration changes are necessary for token passing to
work properly. See the REQUIREMENTS/RESTRICTIONS section
for a list.
The AFS version of rsh is compatible with the standard
inetd, but token passing only works if the AFS versions of
both programs are being used. If only one of them is
modified, the issuer will access AFS files through the
remote machine as anonymous.
WARNINGS
The protections required on the .rhosts file for token
passing to work correctly with this command (see the
REQUIREMENTS/RESTRICTIONS section) are the opposite of those
necessary for token creation to work correctly with the AFS
version of rlogind.
For security's sake, use the AFS version of rsh only in
conjunction with PAGs, either by using the AFS version of
login or always issuing pagsh before obtaining tokens.
REQUIREMENTS/RESTRICTIONS
Several configuration requirements and restrictions are
necessary for token passing to work correctly with the AFS
version of rsh. Some of these are also necessary with the
standard UNIX version, but are included here because the
issuer used to AFS protections may not be inclined to think
of them. There may be other UNIX-based
requirements/restrictions not mentioned here; consult the
UNIX manual page. (One important one is that no stty
commands may appear in the issuer's shell initialization
file, such as .cshrc.)
The requirements/restrictions for token passing include the
following.
- The local machine must be running the AFS version
of rsh, with the binary file locally installed to
grant setuid privilege to the owner, "root".
- The remote machine must be running the AFS version
of inetd.
- The following two lines must appear in the
/etc/services file on the local machine (as well
as on the remote machine running modified inetd).
On NeXT machines, this information must appear in
the NetInfo database rather than in /etc/services.
auth 113/tcp authentication
ta-rauth 601/tcp rauth
- If rsh is to consult an .rhosts file on the remote
machine, the file must have UNIX protections no
more liberal than -rw-r--r--. If .rhosts resides
in a user home directory in AFS, the home
directory must also grant the LOOKUP and READ
rights to system:anyuser.
ARGUMENTS
Consult the UNIX manual page for rsh.
MORE INFORMATION
inetd (AFS version)
UNIX manual page for rsh
rlogind (AFS version)
tokens

View File

@ -1,462 +0,0 @@
afsd AFS Commands afsd
NAME
afsd -- initialize Cache Manager and start related
daemons.
afsd [-blocks <number of cache blocks>] [-files <number of
cache files>]
[-stat <number of status cache entries>] [-rootvol <root
volume>]
[-cachedir <cache directory>] [-mountdir <AFS mount
directory>]
[-verbose] [-debug] [-nosettime]
[-daemons <number of background daemons>] [-rmtsys]
[-memcache] [-dcache <# entries>] [-chunksize <chunk
exponent>]
ACCEPTABLE ABBREVIATIONS
This command does not use the syntax conventions of the AFS
command suites. Therefore, "afsd" and all switches and
flags must be typed in full.
DESCRIPTION
Initializes the Cache Manager on an AFS client machine by
transferring AFS-related configuration information into
kernel memory and starting several daemons. More
specifically, afsd
- sets a field in kernel memory that defines which
cell the machine belongs to. Some Cache
Manager-internal operations and system calls
consult this field to learn which cell to execute
in. (The AFS command interpreters refer to
/usr/vice/etc/ThisCell instead.)
This information is transferred into the kernel
from the file /usr/vice/etc/ThisCell and cannot be
changed until afsd runs again.
- places in kernel memory the names and Internet
addresses of the database server machines in the
local cell and (optionally) foreign cells. The
appearance of a cell's database server machines in
this list enables the Cache Manager to contact
them and so to access files in the cell. Omission
of a cell from this list, or incorrect information
about its database server machines, prevents the
Cache Manager from accessing files in it.
This information is transferred into the kernel
from the file /usr/vice/etc/CellServDB. After
initialization, use the fs newcell command to
change the kernel-resident list without having to
reboot.
- determines whether the cache is on disk or in
machine memory. The default is to use a disk
cache. If the -memcache argument is provided,
space is allocated in machine memory for caching,
and disk space is not used even if the machine has
a disk.
- defines the name of the local disk directory
devoted to caching, when -memcache is not used.
If necessary, afsd creates the directory (as long
as its parent directory exists). It does not
remove from the disk the directory that formerly
served this function, if any.
The second field in the file
/usr/vice/etc/cacheinfo is the source for this
name, and the standard value is /usr/vice/cache.
Use the -cachedir argument to override the value
from cacheinfo.
- sets the size of the cache, for both disk and
memory caches.
The afsd program consults the third field in the
file /usr/vice/etc/cacheinfo to learn the default
cache size in kilobyte blocks. The value should
not exceed 90% to 95% of the disk space available
on the cache partition (with a disk cache) or of
the machine's memory (with a memory cache). This
is because the cache implementation itself
requires a small amount of disk or machine memory.
For either a disk or memory cache, use the -blocks
argument to override the value from cacheinfo.
For a memory cache, the issuer can also override
the cacheinfo value by providing either
* both -dcache and -chunksize, to set both
number of dcache entries and chunk size (see
below for definition of these parameters).
In this case, afsd derives cache size
(overriding the cacheinfo value) by
multiplying the two values. Using this
combination is not recommended, as it
requires the issuer to perform the
calculation beforehand to determine the
resulting cache size.
* -dcache by itself. In this case, afsd derives
cache size (overriding the cacheinfo value)
by multiplying -dcache by the default chunk
size of 8 kilobytes. Using this argument is
not recommended, as it requires the issuer to
perform the calculation beforehand to
determine the resulting cache size.
For a disk cache, the value defined in cacheinfo
or with -blocks is an absolute upper limit on
cache size; values provided for other arguments
cannot result in a larger cache.
After initialization, use fs setcachesize to
change the size of a disk cache without having to
reboot; the value set with that command is
overridden the next time afsd runs. The
fs setcachesize command does not work for memory
caches. Instead, the machine must be rebooted.
- sets the size of each "chunk" of data in the
cache, and by implication the amount of data that
the Cache Manager requests at a time from the File
Server (how much data per "fetch" RPC, since AFS
uses partial file transfer).
For a disk cache, each chunk is called a "V file",
so this parameter sets the maximum size of each V
file; the default is 64 kilobytes. See below for
more on V files.
For a memory cache, each chunk is a collection of
memory blocks allocated together, so this sets the
size of each collection; the default is 8
kilobytes.
For both types of cache, use the -chunksize
argument to change the default chunk size. To
guarantee proper chunk sizes, the integer provided
is used as an exponent on the number 2; see the
ARGUMENTS section for details. For a memory
cache, if total cache size divided by chunk size
leaves a remainder, afsd rounds down the number of
dcache entries. resulting in a slightly smaller
cache (see below for more on dcache entries).
- sets the number of empty "V files" created in the
cache directory for a disk cache. Each file is a
cache chunk, and the Cache Manager caches data in
them as needed. By default, each "V" file can
accommodate up to 64 kilobytes of data, since 64
kilobytes is the default size of a disk cache
chunk.
A memory cache cannot use V files because it does
not use disk memory; instead the number of chunks
is equivalent to the number of "dcache entries"
(see below).
The default number of V files is 1000; use the
-files argument to override it. Since by default
each V file can accommodate 64 kilobytes, the only
reason to increase from the default of 1000 is if
the cache size is greater than about 64 megabytes
(or the chunk size has been changed with the
-chunksize argument discussed above).
- sets the number of "dcache entries" allocated in
machine memory for storing information about the
chunks in the cache.
With a disk cache, the file
/usr/vice/cache/CacheItems on disk contains one
entry for each V file. Some of the CacheItems
entries, by default 100, are duplicated as dcache
entries in machine memory for quicker access.
With a memory cache, there is no CacheItems file,
so all information about cache chunks must be in
memory as dcache entries. There must be one
dcache entry for each cache chunk, so for a memory
cache number of dcache entries equals number of
cache chunks. There is no default number of
dcache entries for a memory cache; instead, afsd
derives it by dividing cache size by chunk size.
Use the -dcache argument to set the number of
dcache entries. This is not recommended for
either type of cache. Increasing the number of
dcache entries for a disk cache may improve
performance marginally because more entries are
retrieved from memory rather than from disk, but
is not generally necessary. Using this argument
is not recommended for a memory cache because it
requires the issuer to pre-calculate cache size by
multiplying this value times chunk size (either
the default 8 kilobytes or the value of
-chunksize).
- sets the number of "stat" entries available in
machine memory for caching status information
about cached AFS files.
The default is 300; use the -stat argument to
override the default.
- defines the directory in the machine's file name
space at which the AFS file tree is mounted.
The first field in the file
/usr/vice/etc/cacheinfo is the source for the
default directory name. The standard value is
/afs. Use the -mountdir argument to override the
value from cacheinfo.
- defines which volume corresponds to the root of
the AFS file tree.
The default is root.afs; use the -rootvol argument
to override it. Note that although the volume
name should be given in the "base" (ReadWrite)
form, the Cache Manager retains its bias for
accessing the ReadOnly version of the volumeMin
the default case, root.afs.readonlyMif it is
available.
- randomly selects a file server machine in the
local cell as the source for the "correct" time.
Every five minutes thereafter, the local clock is
adjusted (if necessary) to match the file server
machine's clock.
Use the -nosettime flag to prevent afsd from
selecting a time standard. This is recommended
only on file server machines that are also acting
as clients. File server machines maintain the
correct time using the Network Time Protocol
Daemon instead.
In addition to setting cache configuration parameters, afsd
starts up the following three types of daemons. On most
system types, these daemons appear as nameless entries in
the output of the ps command:
- a "callback" daemon that handles callbacks. It
also responds to the File Server's periodic
probes, which check that the client machine is
still alive.
- a "maintenance" daemon that performs routine
periodic maintenance tasks, including
* performing garbage collection
* synchronizing files
* probing the fileserver process on file server
machines every few minutes
* refreshing information from ReadOnly volumes
once per hour
* doing delayed writes for NFS clients if the
machine is running the NFS/AFS Translator
* keeping the machine's clock synchronized with
the chosen file server machine's
- "background" daemons that improve performance by
pre-fetching files and performing background
(delayed) writes of saved data into AFS.
The default number of background daemons is 2,
usually enough to handle up to 5 simultaneous
users of the machine. Use the -daemons argument
to increase the number of background daemons, if
the machine serves more users. No more than 6
background daemons should ever be necessary.
The default number of daemons is four (one callback daemon,
one maintenance daemon, and two background daemons). The
issuer can alter only the number of background daemons; afsd
always initializes one callback daemon and one maintenance
daemon.
AFS includes three configuration scripts that can be used to
modify some Cache Manager parameters on a client machine
that uses a disk cache. Named rc.afsd.small, rc.afsd.med,
and rc.afsd.large, the configuration scripts specify
suitable, predefined values for the afsd command's -stat,
-dcache, -daemons, and -volumes switches. They define
increasingly greater values for these switches according to
the configuration and usage patterns of the client machine
on which the afsd command is run. Refer to the AFS System
Administrator's Guide for more information about the scripts
and how to use them.
ARGUMENTS
-blocks specifies the number of kilobyte blocks to be made
available for caching in the machine's cache
directory (for a disk cache) or memory (for a
memory cache), overriding the default defined in
the third field of /usr/vice/etc/cacheinfo. It
should not exceed 90% to 95% of the actual space
available. If using a memory cache, do not
combine this argument with -dcache, since doing so
could result in a chunk size that was not an
exponent of 2.
-files specifies the number of V files to be created in
the cache directory for a disk cache, overriding
the default of 1000. Each V file can accommodate
a "chunk" of data, which for a disk cache is 64
kilobytes by default. Thus the default of 1000 is
adequate for any cache smaller than 64 megabytes
(unless chunk size is changed with -chunksize).
Do not combine this argument with -memcache.
-stat specifies the number of entries in the machine's
memory for recording status information about the
AFS files in the cache. This value overrides the
default of 300.
-rootvol names the Read Write volume corresponding to the
root directory for the AFS file tree (which is
usually /afs). This value overrides the default
of root.afs.
-cachedir names the local disk directory to be used as the
cache. This value overrides the default defined
in the second field of /usr/vice/etc/cacheinfo
(typically, /usr/vice/cache).
-mountdir names the local disk directory on which to mount
the AFS file tree. This value overrides the
default defined in the first field of
/usr/vice/etc/cacheinfo (typically, /afs). If
/afs is not used, the machine cannot access the
AFS global name space.
-daemons specifies the number of "background" daemons to
run on the machine. These daemons improve
efficiency by doing pre-fetching and background
writing of saved data. This value overrides the
default of 2, which is adequate for a machine
serving up to five users. It does not change the
number of "callback" or "maintenance" daemons,
which is always one each.
-verbose causes afsd to produce a more detailed trace of
its activities than the default one. The trace
displays on standard out (stdout) unless it is
piped into a file.
-debug causes afsd to produce a highly detailed trace of
its activities, potentially useful to a developer
for debugging purposes. The trace goes to
standard output (stdout) by default.
-nosettime
prevents the machine from selecting at random a
local file server machine to act as a source for
the "correct" time. If this flag is omitted, the
machine selects a file server machine as a time
standard, and every five minutes thereafter
adjusts its clock to avoid drifting from the
standard.
-rmtsys initializes an additional "remote-system" daemon
to execute AFS-specific system calls on behalf of
NFS client machines. This flag is necessary only
if the machine is an NFS/AFS translator machine,
and if users on its NFS clients want to execute
AFS commands.
-memcache causes afsd to initialize a memory cache rather
than a disk cache. Do not combine this flag with
-files.
-dcache sets the number of "dcache entries" in memory,
which are used to store information about cache
chunks. For a disk cache, this overrides the
default of 100. For a memory cache, this argument
effectively sets the number of cache chunks. Use
of this argument is not recommended for a memory
cache, because it requires the issuer to
pre-calculate the resulting total cache size
(derived by multiplying this value by chunk size).
Do not combine this argument with -blocks, since
doing so could result in a chunk size that was not
an exponent of 2.
-chunksize
sets the size of each cache chunk. The integer
provided, which should be between 0 and 20, is
used as an exponent on the number 2. It overrides
16
the default of 16 for a disk cache (2 is 64
13
kilobytes) and 13 for a memory cache (2 is 8
kilobytes). A value of 0 or less, or greater than
20, sets chunk size to the appropriate default.
Values less than 10 (which sets chunk size to a
10
kilobyte, 2 ) are not recommended. Combining
this argument with -dcache is not recommended
because it requires that the issuer pre-calculate
the cache size that results.
EXAMPLE
This command is normally included in an initialization file
such as /etc/rc, rather than typed at the command shell
prompt. For most disk caches, the appropriate form is
/usr/vice/etc/afsd
The following is appropriate when enabling a machine to act
as an NFS/AFS Translator machine serving more than five
users.
/usr/vice/etc/afsd -daemons 4 -rmtsys
The following initializes a memory cache and sets chunk size
14
to 16 kilobytes (2 ).
/usr/vice/etc/afsd -memcache -chunksize 14
PRIVILEGE REQUIRED
Issuer must be logged into the machine's UNIX file system as
"root."

View File

@ -1,198 +0,0 @@
dkload AFS Commands dkload
NAME
dkload -- incorporate external libraries into kernel
without rebooting.
dkload [-readonly] [-quiet] [-verbose] [-syscallResult
<number>]
[-path <object path>] [-ld_cmd <loader path>]
[-as_cmd <assembler path>] [-nm_cmd <nm path>]
[-libcommon <path>] [-kernel_alloc <path>]
+
[-name <library name>] [<library to incorporate> ]
ACCEPTABLE ABBREVIATIONS
This command does not use the syntax conventions of the AFS
command suites. Therefore, "dkload" must be typed in full
and switches must always be included, though they may be
shortened as indicated.
dkload [-r] [-q] [-v] [-s <number>] [-p <object path>]
[-ld <loader path>]
[-a <assembler path>] [-nm <nm path>] [-li <path>] [-k
<path>]
+
[-na <library name>] [<library to incorporate> ]
DESCRIPTION
Loads one or more libraries into the memory version of the
local machine's kernel. It does not alter the disk version
of the kernel (/vmunix or equivalent). Its intended use is
loading the AFS routine library, lib.afs, into the kernel on
client machines.
The dynamic loader begins by requesting (from a low-level
kernel routine) allocation of a certain amount of memory in
which to load the libraries. It resolves cross-references
between procedures in the existing kernel and in the
libraries (referred to as "linking" the two). The result is
a list of memory addresses for the cross-referenced
procedures, which the dynamic loader stores in a table. It
generates an executable version of the libraries with
correct addresses inserted for all of the necessary kernel
variables and procedures, and loads the executable into the
memory space allocated in the first phase.
REQUIREMENTS
The dkload binary file should be available in the current
working directory, or the issuer must specify a pathname in
the command name. The standard directory is
/usr/vice/etc/dkload on client machines and
/usr/afs/bin/dkload on file server machines.
The file kalloc.o should be available in the current working
directory, or the issuer must specify a pathname with either
the -kernel_alloc or -path argument. This file helps in the
first phase of dynamic loading: allocating kernel memory
for the libraries. It is generated automatically during the
compilation of the dkload program.
The file libcommon.a should be available in the current
working directory, or the issuer must specify a pathname
with either the -libcommon or -path argument. This file
helps in the second phase of dynamic loading: resolving
cross-references. It is generated automatically during the
compilation of the dkload program.
The library file(s) to be loaded (such as lib.afs) should be
available in the current working directory, or the issuer
must use the -path argument to specify the correct path.
The binary files for the standard UNIX commands ld, as and
nm should be available in a local disk directory included in
the issuer's $PATH environment variable. Otherwise, the
issuer needs to use the -ld_cmd, -as_cmd and/or -nm_cmd
arguments to specify the correct pathname.
ARGUMENTS
-readonly directs the command interpreter to report
the actions it would perform if executing
the command, rather than actually performing
it.
-quiet suppresses the trace of actions that by
default appears on standard output (stdout).
-verbose increases the amount of information in the
trace that appears on standard output
(stdout). Multiple instances of this flag
may be provided, resulting (up to a certain
point) in a increasing level of detail in
the trace.
-syscallResult specifies the memory address at which
allocation begins when the -readonly flag is
provided. This is useful when the issuer
wants to specify a memory address obtained
during a previous aborted run of dkload.
Provide this argument only when using
-readonly. The value may be either a large
decimal or hexidecimal number (the latter
beginning with 0x). If this flag is not
provided, the value defaults to 0xc1456780,
which may not be acceptable on all machine
types but has the advantage that it causes
allocation to begin well above the addresses
used by standard libraries.
-path specifies the directory in which the command
interpreter can find kalloc.o, libcommon.a
and each library to be loaded, if they are
not in the current working directory. The
value of this argument is overridden by
-kernel_alloc and -libcommon, or the
pathnames given for each library to
incorporate.
-ld_cmd specifies the pathname to the binary for the
UNIX ld command, which the kernel dynamic
loader uses during the linking phase.
This argument is necessary only if the
issuer's $PATH environment variable will not
lead to the correct binary file. The binary
file cannot be in AFS, for instance, since
the dynamic loader runs before the machine
can access AFS.
-as_cmd specifies the pathname to the binary for the
UNIX as command, which the kernel dynamic
loader uses during the linking phase.
This argument is necessary only in the
conditions specified under -ld_cmd.
-nm_cmd specifies the pathname to the binary for the
UNIX nm command, which the kernel dynamic
loader uses during the linking phase.
This argument is necessary only in the
conditions specified under -ld_cmd.
-libcommon specifies the pathname of the libcommon.a
file.
This argument is necessary only if the file
does not reside in the current working
directory or if the -path argument does not
indicate the correct directory for it.
-kernel_alloc specifies the pathname of the kalloc.o file.
This argument is necessary only in the
conditions specified under -libcommon.
-name specifies the variable part of the library
name to be loaded: the command interpreter
loads the library called
"lib<library name>.a". For example, if
<library name> is afs, then libafs.a gets
loaded.
Provide this argument OR library to
incorporate.
library to incorporate names each library to be incorporated
into the kernel.
Provide this argument OR -name.
EXAMPLE
The following loads in the AFS libraries. It assumes that
all files can be found in the current directory or other
expected place. The issuer desires extra trace information.
% dkload -verbose -name afs
PRIVILEGE REQUIRED
Issuer must be logged into the machine's UNIX file system as
"root" or at least have w access to /dev/mem and /dev/kmem.

View File

@ -1,177 +0,0 @@
fileserver AFS Commands fileserver
NAME
fileserver -- initialize File Server component of fs
process.
/usr/afs/bin/fileserver [-b <buffers>] [-banner] [-cb
<callbacks>]
[-d <debug level>] [-k <stack size>] [-l <large vnodes>]
[-oldvldb] [-pctspare <percent>] [-rxdbg]
[-rxdbge] [-rxpck]
[-s <small vnodes>] [-spare <kilobyte blocks>]
[-w <callback wait interval>]
[-c <check interval>] [-ftpck <r ftp packets>] [-noauth]
[-p <LWPs>] [-r <r retry count>] [-rpck <r
packets
DESCRIPTION
Initializes the File Server component of the fs process.
The arguments on fileserver allow the issuer to control many
aspects of its behavior, as detailed in the ARGUMENTS
section.
Perhaps the most important aspect to control from an
administrative standpoint is that by default the File Server
allows users to store up to a megabyte (1024 kilobytes) of
data in a volume after the volume's quota is exceeded. The
user still cannot create new files after quota is exceeded.
The issuer of this command can change the default with the
-spare or -pctspare arguments:
- -spare specifies the number of kilobytes over
quota the File Server will allow. To make users
unable to store files after the quota is exceeded,
specify a value of 0.
- -pctspare expresses the amount of excess the File
Server will allow as a percentage of the volume's
quota.
WARNING
This command is not normally issued at the command shell
prompt, but rather placed into a file server machine's
/usr/afs/local/BosConfig with the bos create command. If it
is ever issued at the command shell prompt, the issuer must
be working on a file server machine.
Several of this command's arguments are intended for use by
AFS developers only. Changing them from their default
values is strongly discouraged and may result in
unpredictable File Server behavior. The relevant arguments
are marked in the ARGUMENTS section.
This command does not use the syntax conventions of the AFS
command suites, so the command and switch names must be
typed in full.
Do not specify both -spare and -pctspare. Doing so causes
the File Server to exit, leaving an error message in
/usr/afs/logs/FileLog.
ARGUMENTS
-b sets the number of directory buffers, which are
2 kilobytes each. Provide a positive integer.
The default is 70.
-banner causes the File Server to prints the following
banner to /dev/console about every 10 minutes.
File Server is running at time.
-cb sets the number of callbacks the File Server
can track. Provide a positive integer. The
default is 20,000.
-d sets the detail level for the debugging trace
the File Server produces in
/usr/afs/logs/FileLog. Provide a positive
integer; higher values (up to a point) produce
greater detail. The default level of 0
produces no trace.
-k sets the LWP stack size in units of 1 kilobyte.
Provide a positive integer. The default is 24
(kilobytes). Do not set this argument lower
than the default.
-l sets the number of large vnodes to use (for
tracking directory elements). Provide a
positive integer. The default is 200.
-oldvldb directs the File Server to use the pre-AFS 3
volume location facility rather than the VLDB
and VL Server.
-pctspare specifies the amount by which the File Server
will allow a volume to exceed its quota, as a
percentage of the quota. Provide an integer
between 0 and 99. A value of 0 prevents the
volume from ever exceeding its quota. Do not
combine this argument with -spare.
-rxdbg sends an Rx debugging trace to the rx_dbg file
in the current working directory.
-rxdbge sends an Rx event debugging trace to the rx_dbg
file in the current working directory.
-rxpck sets the number of extra Rx packets to reserve.
Provide a positive integer. The default is
100. Do not use this argument; changing its
default may cause unpredictable behavior.
-s sets the number of small vnodes to use (for
tracking file elements). Provide a positive
integer. The default is 200.
-spare specifies the number of extra kilobytes the
File Server will allow users to store in a
volume after its quota is exceeded. Provide a
positive integer. A value of 0 prevents the
volume from ever exceeding its quota. Do not
combine this argument with -pctspare.
-w sets the interval at which daemons spawned by
the File Server perform their maintenance
tasks. The default is 300 seconds (5 minutes).
Do not use this argument; changing its default
may cause unpredictable behavior.
-c is not implemented.
-ftpck is obsolete.
-noauth is obsolete.
-p is obsolete.
-r is obsolete.
-rpck is obsolete.
EXAMPLES
The following bos create command creates an fs process on
fs2.transarc.com that allows volumes to exceed their quota
by 10%.
Type the command on a single line.
% bos create fs2.transarc.com fs fs "/usr/afs/bin/fileserver
-pctspare 10"
/usr/afs/bin/volserver /usr/afs/bin/salvager
PRIVILEGE REQUIRED
Issuer must be listed in /usr/afs/etc/UserList to place this
command in /usr/afs/local/BosConfig, because that is the
privilege required to issue bos create.
MORE INFORMATION
bos create

View File

@ -1,68 +0,0 @@
AFS Commands
1. The fs Commands
------------------------------------------------------------
This command defines the fs commands that users and system
administrators employ to contact the File Server and to
configure the Cache Manager. It assumes the reader is
familiar with the concepts described in the AFS System
Administrator's Guide.
Some fs commands extend UNIX file system semantics by
invoking file-related functions that UNIX does not provide
(setting access control lists, for example). Other fs
commands help users control the performance of the Cache
Manager running on their local client workstation. When
using fs commands, pay particular attention to the kind of
privilege required, as it varies from command to command.
Refer to the Command Summary at the end of this document for
a complete list of fs commands and their syntax.
1.1 Common Arguments and Flags
All fs commands accept the following optional flag. It is
listed in the command descriptions and is described in
detail here:
[-help]
This flag has the same function as the fs help command: It
prints a command's online help message on the screen. No
other arguments or flags should be provided at the same time
as this flag. If they are, this flag overrides them, and
the only effect of issuing the command is that the help
message appears.
AFS Command Reference Manual The fs Commands 2
1.2 The Privileges Required for fs Commands
The privileges required for fs commands vary more than those
required for commands in other suites. Pay special
attention to the PRIVILEGE REQUIRED section of each command
description.
The various types of necessary privilege include
- Having certain rights on a directory's access
control list. For example, creating and removing
mount points requires ADMINISTER, INSERT, and
DELETE rights for the directory in which the mount
point resides. Setting a directory's access
control list requires certain rights, too.
- Being logged in as the super-user "root" in the
UNIX file system of the machine on which the
command is being issued. This is necessary when
issuing commands that affect Cache Manager
configuration.
- Belonging to the system:administrators group in
the Protection Database. See the fs setvol
command for an example.
- No privilege. Many fs commands simply list
information and so do not require any special
privilege.

View File

@ -1,66 +0,0 @@
fs apropos AFS Commands fs apropos
NAME
fs apropos -- show each help entry containing keyword.
fs apropos -topic <help string> [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
fs ap -t <help string> [-h]
DESCRIPTION
Displays the first line of the online help entry for any fs
command that has help string in its name or short
description.
ARGUMENTS
-topic
specifies the keyword string for which to search. If
it is more than a single word, surround it with double
quotes or other delimiters. This argument is
case-sensitive; type help strings for fs commands in
lowercase letters.
-help prints the online help entry for this command. Do not
provide any other arguments or flags with this one.
See section 3.1 in the Reference Manual for more
details.
OUTPUT
The first line of a command's online help entry names the
command and briefly describes what it does. The fs apropos
command displays that first line for any fs command where
help string is part of the command name or first line.
To see the remaining lines in a help entry, which provide
the command's alias (if any) and syntax, use the fs help
command.
EXAMPLES
The following lists all fs commands that have the word
"cache" in their operation codes or short online
descriptions:
% fs apropos -topic cache
setcachesize: set cache size
flush: flush file from cache
getcacheparms: get cache usage info
monitor: set cache monitor host address
PRIVILEGE REQUIRED
None.
MORE INFORMATION
fs help

View File

@ -1,153 +0,0 @@
fs checkservers AFS Commands fs checkservers
NAME
fs checkservers -- check status of file server machines.
fs checkservers [-cell <cell to check>] [-all] [-fast]
[-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
fs checks [-c <cell to check>] [-a] [-f] [-h]
DESCRIPTION
Lists any file server machines in the indicated cell(s) that
meet two conditions:
1. The Cache Manager has been in contact with the
fileserver process running on the machine, and/or
may need to contact it in future. (Reasons for
wanting to contact a file server machine might
include holding a callback from that machine or
having locked files on it.)
2. The fileserver process on the machine is not
currently responding to Cache Manager probes
(implying that it is not responding to Cache
Manager file requests either).
The Cache Manager constantly maintains a list of file server
machines that meet the first condition, updating it every
four to ten minutes by attempting to contact the fileserver
process on each machine in the list. When a process does
not respond to the probe, the Cache Manager marks it as
non-functioning. If a machine that previously did not
respond begins to respond again, the Cache Manager erases
the "not functioning" mark.
This command forces the Cache Manager to update its
information immediately (rather than waiting the standard
interval). The Cache Manager probes the fileserver process
on the machines in the specified cell that meet the first
condition above, records those that do not respond, and
reports the result. If the issuer includes the -fast flag,
the Cache Manager outputs the list it already has at the
time the command is issued instead of probing the machines
again.
By default, the Cache Manager probes machines in the local
cell only. If the -all flag is used, it probes all machines
(from all cells) that meet the first condition. If a cell
name is specified with -cell, The Cache Manager probes the
machines in that cell only.
WARNING
It can take quite a while for this command to produce its
entire output if a number of machines in the Cache Manager's
list are in fact down when the command is issued. The delay
is because after issuing the probe the Cache Manager waits a
standard timeout period before concluding that the
fileserver is not responding; this allows for the
possibility of slow cross-network communication. If it is
important that the command shell prompt return quickly, the
issuer may wish to put this command in the background. It
is harmless to interrupt the command (with Ctrl-C or another
interrupt signal).
This command is not guaranteed to check the status of all
file server machines in a cell. The Cache Manager probes
only those machines that meet the first condition mentioned
above.
ARGUMENTS
-cell specifies the complete name of the cell whose file
server machines the Cache manager should probe
(shortened forms are not acceptable). Provide this
argument OR -all; it may be combined with -fast.
-all causes the Cache Manager to probe all machines that
meet the first condition mentioned above. Provide
this argument OR -cell; it may be combined with -fast.
-fast tells the Cache Manager to display its current list of
down machines, rather than probing any machines. The
displayed output may be up to 10 minutes old.
-dir is obsolete, but can still be provided on the
command-line. Previous versions of this command
required a directory argument. If the issuer includes
it by accident, a warning message appears, but the
command still executes correctly.
-help prints the online help entry for this command. Do not
provide any other arguments or flags with this one.
See section 3.1 in the Reference Manual for more
details.
OUTPUT
If the Cache Manager gets a response from all of the
machines that it probes (i.e., all such machines are
functioning normally), the output is
All servers are running.
(Remember that this message does not imply that all file
server machines in the cell are running. It reports the
status of only those that the Cache Manager tries to probe.)
If a machine fails to respond to the Cache Manager's probe
within the timeout period, the output displays its name.
The format of a machine name (name in uppercase, name in
lowercase, or Internet address in four-field decimal form)
depends on the state of the local cell's name server at the
time the command is issued.
EXAMPLES
In the following example, the issuer chooses to see the
Cache Manager's current list of down machines that belong to
the local cell, rather than waiting for it to probe them
again. The output indicates that all machines responded to
the previous probe.
% fs checks -f All servers are running.
The following example checks file server machines in all
cells that the Cache Manager has previously contacted. It
reports that the machines fs1.transarc.com and
vice3.andrew.cmu.edu did not respond to the machine's probe.
% fs checkservers -all & These servers are still down:
fs1.transarc.com VICE3.ANDREW.CMU.EDU
The following example checks machines in the athena.mit.edu
cell only:
% fs checks athena.mit.edu & %All servers are running.
PRIVILEGE REQUIRED
None.

View File

@ -1,44 +0,0 @@
fs checkvolumes AFS Commands fs checkvolumes
NAME
fs checkvolumes -- force Cache Manager to update volume-
related information.
fs checkvolumes [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
fs checkv [-h]
DESCRIPTION
Forces the Cache Manager to discard its table of mappings
between volume names and volumeID numbers. The Cache
Manager needs the information in the table to fetch files,
so this command will force it to fetch the most current
information available at the File Server about a volume's
contents before it can fetch any more files.
This command is most useful if the issuer knows that a
volume's name has changed, or that there has been a release
of new ReadOnly replicas, because issuing it forces the
Cache Manager to reference the volume with the new name, or
the new ReadOnly replica.
Normally the Cache Manager flushes the table and constructs
a new one once per hour anyway.
ARGUMENTS
-help prints the online help entry for this command. Do not
provide any other arguments or flags with this one.
See section 3.1 in the Reference Manual for more
details.
PRIVILEGE REQUIRED
None.

View File

@ -1,83 +0,0 @@
fs cleanacl AFS Commands fs cleanacl
NAME
fs cleanacl -- remove obsolete entries from access control
list.
+
fs cleanacl [-path <dir/file path> ] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
+
fs cl [-p <dir/file path> ] [-h]
DESCRIPTION
Removes from the access control list of each specified
directory or file any entries that specify a user or group
no longer found in the Protection Database. When a
user/group is removed from the Protection Database, its AFS
UID appears on access control lists rather than its name.
This command removes such "abandoned" AFS UIDs from access
control lists.
Cleaning access control lists in this way not only keeps
them from becoming crowded with irrelevant information, but
also prevents the new possessor of a recycled AFS UID from
obtaining access intended for the former possessor of the
ID. (Note that recycling IDs is not recommended in any
case.)
ARGUMENTS
-path specifies a file or directory for which the associated
access control list is to be cleaned. If a filename
is specified, the ACL of the file's parent directory
is cleaned. If the issuer omits this switch, the
current working directory is assumed.
-help prints the online help entry for this command. Do not
provide any other arguments or flags with this one.
See section 3.1 in the Reference Manual for more
details.
OUTPUT
If there are no obsolete AFS UIDs on the ACL, the following
message appears:
Access list for directory is fine.
Otherwise, the output reports the resulting state of the
ACL, following the header
Access list for directory is now
EXAMPLES
In the following example, the user pat cleans the ACL on the
current directory and its subdirectories called reports and
sources. The ACLs for the first two have no obsolete AFS
UIDs on them, but sources does.
% fs cl . ./reports ./sources Access list for . is fine.
Access list for ./reports is fine. Access list for
./sources is now Normal rights: system:authuser rl
pat rlidwka
PRIVILEGE REQUIRED
Issuer must have ADMINISTER rights to the directory; by
default, the owner of the directory and members of
system:administrators do.
MORE INFORMATION
fs listacl

View File

@ -1,137 +0,0 @@
fs copyacl AFS Commands fs copyacl
NAME
fs copyacl -- copy access control list from one directory
to one or more other directories.
fs copyacl -fromdir <source directory>
+
-todir <destination directory>
[-clear] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
+
fs co -f <source directory> -t <destination directory>
[-c] [-h]
DESCRIPTION
Copies the access control list (ACL) from the source
directory to each destination directory. The command does
not affect entries on the ACL of the source directory. It
affects entries on the ACL of each destination directory as
follows:
- If an entry is unique to the ACL of the source
directory, it is copied to the ACL of the
destination directory.
- If an entry exists on the ACLs of both
directories, it is changed on the ACL of the
destination directory to match the rights granted
on the ACL of the source directory.
- If an entry is unique to the ACL of the
destination directory and the -clear flag is
omitted, the entry is not affected.
- If an entry is unique to the ACL of the
destination directory and the -clear flag is
included, the entry is removed.
Use the -clear flag to completely replace the ACL of each
destination directory with that of the source directory.
ARGUMENTS
-fromdir
specifies the source directory whose ACL is to be
copied to each destination directory. Abbreviated
pathnames are interpreted relative to the directory in
which the command is issued. If a filename is
provided, the file's parent directory is used as the
source directory.
-todir
specifies one or more destination directories to
receive the ACL from the source directory.
Abbreviated pathnames are interpreted relative to the
directory in which the command is issued. A filename
cannot be specified with this switch.
-clear
removes all existing entries from the ACL of each
destination directory before copying the ACL from the
source directory. The ACL of each destination
directory is thus completely replaced with the ACL of
the source directory. If the issuer omits this flag,
entries that exist on the ACL of a destination
directory but not on the ACL of the source directory
are not affected.
-help prints the online help entry for this command. Do not
provide any other arguments or flags with this one.
See section 3.1 in the Reference Manual for more
details.
EXAMPLES
The following example uses the fs copyacl command to copy
the ACL from the current directory to the subdirectory named
reports. Entries on the ACL of the current directory are
not affected. Because the -clear option is not used,
entries on the ACL of the reports directory that are not on
the ACL of the current directory remain unaffected as well.
% fs la . reports
Access list for . is
Normal rights:
pat rlidwka
smith rlidwk
Access list for reports is
Normal rights:
pat rl
pat:friends rl
Negative rights
jones rlidwka
% fs co . reports
% fs la . reports
Access list for . is
Normal rights:
pat rlidwka
smith rlidwk
Access list for reports is
Normal rights:
pat rlidwka
pat:friends rl
smith rlidwk
Negative rights
jones rlidwka
PRIVILEGE REQUIRED
Issuer must have LOOKUP right to the source directory and
ADMINISTER right to each destination directory. To issue
the command with a filename used for source directory, the
issuer must have both the LOOKUP and READ rights on the ACL
of the file's parent directory.
MORE INFORMATION
fs listacl
fs setacl

View File

@ -1,110 +0,0 @@
fs debug AFS Commands fs debug
NAME
fs debug -- enable/disable Cache Manager debugging trace.
fs debug -debug <'on' or 'off'> [-dafs <afs debug level>]
[-dnet <network debug level>] [-syslog] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
fs de -de <on> or <off> [-da <afs debug level>]
[-dn <network debug level>] [-s] [-h]
DESCRIPTION
Determines whether the Cache Manager records information
about its activities that may prove helpful in debugging or
other trouble-shooting. The output goes into the file
/usr/vice/etc/AFSLog (unless an alternate directory or name
is specified for the file with the -logfile switch of the
afsd command). See the ARGUMENTS section for information
about the different types of debugging output that can be
written to the file.
You can use the more command (or an equivalent command such
as the pg command on AIX systems) to read the debugging
output recorded in the AFSLog file. You must be logged in
as root on the machine on which the AFSLog file resides to
read the file. Interpreting the output requires familiarity
with the AFS source code.
ARGUMENTS
-debug
controls whether debugging information is produced.
The legal values are on, which directs debugging
information into the AFSLog file, and off, which stops
the recording of information in the file.
-dafs determines the types of debugging information the
Cache Manager produces about its activities. The
following list describes the legal values for this
switch and the type of debugging output each causes
the Cache Manager to write to the AFSLog file:
- 1, which causes the Cache Manager to write
standard debugging information. Using this
value provides a good deal of general
output.
- 2, which causes the Cache Manager to write
low-level debugging information about the
AFS network. Use this value only if you are
convinced that network problems exist.
- 4, which causes the Cache Manager to write
debugging information about the RX protocol.
- 8, which causes the Cache Manager to write
debugging information about the interface
layer to AFS. This value is not useful on
machines running a Sun operating system.
In addition, if a value of 1, 4, or 8 is specified,
the Cache Manager also records in the AFSLog file the
AFS UID of each user who accesses data from a file
server machine. It records the appropriate AFS UID
with each operation that accesses data.
The legal values can be added to specify different
combinations of output. For example, a value of 15
specifies that all possible types of output are to be
provided. The default value of 1 is used if no value
is specified.
Note: The AFSLog file also records the type of volume
(ReadWrite, ReadOnly, or Backup) accessed from a file
server machine. The type of the volume is displayed
along with the volumeID in the "state" flag in bitmap
form. If a ReadWrite volume is accessed, the bits are
clear; if a ReadOnly volume is accessed, the 1 bit is
set; if a Backup volume is accessed, the 4 bit is set.
-dnet is not currently implemented and should not be used.
-syslog
specifies that debugging output is to be redirected to
the syslogd daemon. This flag can be used only on
machines running Sun OS 4.1 or higher.
EXAMPLES
The following turns on debugging using the default debugging
level of 1:
% fs de on
PRIVILEGE REQUIRED
None.
MORE INFORMATION
afsd

View File

@ -1,88 +0,0 @@
fs diskfree AFS Commands fs diskfree
NAME
fs diskfree -- show information about the partition housing
a directory/file.
+
fs diskfree [-path <dir/file path> ] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
+
fs df [-p <dir/file path> ] [-h]
DESCRIPTION
Provides information about the partition that houses the
volume containing the specified directory or file. See the
OUTPUT section for a complete explanation of the information
provided. To learn more about the volume itself, use the fs
examine command.
ARGUMENTS
-path specifies a file or directory about whose host
partition information is desired. If the issuer omits
this argument, the current working directory is
assumed.
-help prints the online help entry for this command. Do not
provide any other arguments or flags with this one.
See section 3.1 in the Reference Manual for more
details.
OUTPUT
Note: The numbers that appear in this output may not always
agree with the corresponding numbers in the output of the
standard UNIX df command. The main reason is that the df
output reflects the state of partitions exactly when the
command is issued. The numbers in this command's output may
be up to 5 minutes old, as the Cache Manager polls the File
Server for partition information at that frequency. Another
potential difference: the partition size reported by the
UNIX df command includes some reserved space that does not
show up in this report of partition size, and so is likely
to be about 10% larger.
The output reports the following information about each
partition that houses a specified directory or file:
- the name of the volume that contains the directory
or file
- the total size in kilobyte blocks of the partition
that stores the named volume
- the number of kilobyte blocks used on the
partition
- the number of kilobyte blocks available on the
partition
- the percentage of the partition's total space used
EXAMPLES
The following shows the output for the partition housing the
volume user.smith in the Transarc Corporation cell:
% fs df /afs/transarc.com/usr/smith
Volume Name kbytes used avail %used
user.smith 333305 286710 46595 86%
PRIVILEGE REQUIRED
None.
MORE INFORMATION
fs examine

View File

@ -1,109 +0,0 @@
fs examine AFS Commands fs examine
NAME
fs examine -- show information about volume containing
specified directory.
+
fs examine [-path <dir/file path> ] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
+
fs exa [-p <dir/file path> ] [-h]
+
fs listvol [-p <dir/file path> ] [-h]
+
fs lv [-p <dir/file path> ] [-h]
DESCRIPTION
Displays information about the volume containing each
specified directory or file. The information includes the
file's quota and current size. See the OUTPUT section for a
complete explanation of the information provided. While
this command provides the most information about a volume,
the fs listquota and fs quota commands are also available to
display information about a volume.
ARGUMENTS
-path specifies each file and/or directory for which
information about the host volume is desired. Omit
this switch to display information about the volume
that contains the current working directory.
-help prints the online help entry for this command. Do not
provide any other arguments or flags with this one.
See section 3.1 in the Reference Manual for more
details.
OUTPUT
Note: The partition-related numbers that appear in this
output may not always agree with the corresponding numbers
in the output of the standard UNIX df command. The main
reason is that the df output reflects the state of
partitions exactly when the command is issued. The numbers
in this command's output may be up to 5 minutes old, as the
Cache Manager polls the File Server for partition
information at that frequency. Another potential
difference: the partition size reported by the UNIX df
command includes some reserved space that does not show up
in this report of partition size, and so is likely to be
about 10% larger.
The output reports the following information about each
volume that contains a specified directory or file:
- the volumeID number (abbreviated in the output as
"vid") of the volume
- the volume's name
- the current "offline" message associated with the
volume, as set by a system administrator using the
fs setvol command
- the current "message of the day" associated with
the volume, as set by a system administrator using
the fs setvol command
- the volume's maximum size quota, in kilobyte
blocks
- its current size, in kilobyte blocks
- the number of kilobyte blocks still available on
the disk partition that houses the volume and the
partition's total size
EXAMPLES
The following shows the output for the volume user.smith
(and the partition housing it) in the Transarc Corporation
cell:
% fs exa /afs/transarc.com/usr/smith
Volume status for vid = 50489902 named user.smith
Current maximum quota is 15000
Current blocks used are 5073
The partition has 46383 blocks available out of 333305
PRIVILEGE REQUIRED
None.
MORE INFORMATION
fs listquota
fs quota
fs setquota

View File

@ -1,93 +0,0 @@
fs exportafs AFS Commands fs exportafs
NAME
fs exportafs -- report or set whether machine can export
AFS to clients of alternate file
systems.
fs exportafs -type <exporter name> [-state <'on' or
'off'>] [-noconvert] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
fs exp -t <exporter name> [-s <'on' or 'off'>] [-n] [-h]
DESCRIPTION
This command performs one of the following, depending on
whether the issuer provides the -state argument:
- It sets whether the machine is accessible as a
server of the non-AFS file system exporter name,
able to be mounted by clients of that file system.
- It reports on the current status of the machine.
The command's -noconvert flag can be used to indicate
whether mode bits of exported directories and files are to
be converted. By default, the group and other mode bits of
exported directories and files are changed to match the user
bits.
ARGUMENTS
-type names the alternate file system for which the setting
is to be changed or reported. Only lowercase letters
are acceptable. The only legal value is nfs.
-state
controls whether the workstation is accessible as a
server of the non-AFS file system or not. The legal
values are on, which enables the workstation as a
server, and off, which makes it inaccessible as a
server. If the issuer omits this argument, the output
reports the current setting.
-noconvert
determines whether the group and other bits on
exported files and directories are converted to match
the user bits. By default, the group and other bits
on exported files and directories are made to match
the user bits. Specify this flag to leave the bits as
they are in AFS.
-help prints the online help entry for this command. Do not
provide any other arguments or flags with this one.
See section 3.1 in the Reference Manual for more
details.
OUTPUT
When the -state argument is omitted, the output reports the
name of the non-AFS file system and whether the workstation
is enabled as a server of it.
EXAMPLES
The following shows that this machine is enabled as an NFS
server (i.e., it is running the AFS/NFS Translator):
% fs exportafs nfs Exporter type: nfs is currently enabled
for AFS
The following shows that the machine is not enabled as an
NFS server:
% fs exportafs nfs Sorry, the nfs-exporter type is
currently not supported on this AFS client
The following prevents the machine from acting as an NFS
server:
% fs exp nfs off
PRIVILEGE REQUIRED
Issuer must be logged in as "root" in the UNIX file system
of the machine on which the command is being issued.

View File

@ -1,63 +0,0 @@
fs flush AFS Commands fs flush
NAME
fs flush -- force Cache Manager to discard a cached
file/directory.
+
fs flush [-path <dir/file path> ] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
+
fs flush [-p <dir/file path> ] [-h]
DESCRIPTION
Forces the Cache Manager to remove each specified directory
or file from its caches of data and status information. The
result is that the next time data from a flushed directory
or file is requested, the Cache Manager contacts the File
Server for the most current version, along with a new
callback (if necessary) and associated status information.
This command does not discard data from application program
buffers or data that has been altered in the cache but not
yet written back to the central copy maintained by the File
Server.
The fs flushvolume command can be used to flush all data
that resides in the same volume as a specified file or
directory.
ARGUMENTS
-path specifies each file or directory to be flushed. In
the case of a directory element, only the element
itself is flushed, not data cached from files or
subdirectories that reside in it. If this argument is
omitted, the current directory is flushed.
-help prints the online help entry for this command. Do not
provide any other arguments or flags with this one.
See section 3.1 in the Reference Manual for more
details.
EXAMPLES
The following flushes from the cache the file projectnotes
in the current working directory and all data from the
subdirectory plans:
% fs flush projectnotes ./plans/*
PRIVILEGE REQUIRED
None.
MORE INFORMATION
fs flushvolume

View File

@ -1,65 +0,0 @@
fs flushvolume AFS Commands fs flushvolume
NAME
fs flushvolume -- force Cache Manager to discard any cached
data from the volume containing
specified file/directory.
+
fs flushvolume [-path <dir/file path> ] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
+
fs flushv [-p <dir/file path> ] [-h]
DESCRIPTION
Forces the Cache Manager to remove cached data (but not the
cached status information) for all files and directories
that reside in the same volume as each specified directory
or file. The result is that the next time the Cache Manager
needs anything from a flushed volume, it contacts the File
Server for the most current version, along with a new
callback (if necessary). This command does not discard data
from application program buffers or data that has been
altered in the cache but not yet written back to the central
copy maintained by the File Server.
The fs flush command can be used to flush individual files
and directories.
ARGUMENTS
-path specifies one file or directory from each volume that
the Cache Manager is to flush completely from its
cache. If this argument is omitted, all data from the
volume that contains the current directory is flushed.
-help prints the online help entry for this command. Do not
provide any other arguments or flags with this one.
See section 3.1 in the Reference Manual for more
details.
EXAMPLES
The following flushes from the cache all data that comes
from the volume that contains the current working directory
and the directory reports at the same level in the file
tree:
% fs flushv . ../reports
PRIVILEGE REQUIRED
None.
MORE INFORMATION
fs flush

View File

@ -1,67 +0,0 @@
fs getcacheparms AFS Commands fs getcacheparms
NAME
fs getcacheparms -- show current size of data cache and
amount being used.
fs getcacheparms [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
fs getca [-h]
DESCRIPTION
Displays the current size of the cache that the Cache
Manager has at its disposal, and the amount it is using at
the moment the command is issued. The command works both on
machines using a memory cache and on machines using a disk
cache.
This information comes from the kernel of the workstation on
which the command is issued. On machines using a disk
cache, the current cache size may disagree with the default
setting specified in the file /usr/vice/etc/cacheinfo, if
someone has set it with the fs setcachesize command.
ARGUMENTS
-help prints the online help entry for this
command. Do not provide any other arguments
or flags with this one. See section 3.1 in
the Reference Manual for more details.
OUTPUT
The output is of the form
AFS using <amount> of the cache's available <size> 1
blocks.
where <amount> is the number of 1K byte blocks the Cache
Manager is currently using, and <size> the total number of
blocks available to the Cache Manager (the current cache
size).
EXAMPLES
The following shows the output on a machine with a 25000
kilobyte cache.
% fs getca
AFS using 22876 of the cache's available 25000 1K by
blocks.
PRIVILEGE REQUIRED
None.
MORE INFORMATION
fs setcachesize

View File

@ -1,74 +0,0 @@
fs getcellstatus AFS Commands fs getcellstatus
NAME
fs getcellstatus -- show whether workstation can run setuid
programs
from specified cell(s), and whether cell
is using the old VLDB.
+
fs getcellstatus -cell <cell name> [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
+
fs getce -c <cell name> [-h]
DESCRIPTION
Reports whether the workstation allows programs fetched from
the specified cell(s) to run with setuid privilege. System
administrators set a cell's setuid status on a
per-workstation basis with the fs setcell command.
If a cell is using the AFS 2.0 method for tracking volume
location rather than the VLDB, the output reports this also
(see the OUTPUT section).
ARGUMENTS
-cell names the cell(s) for which setuid status is desired.
Provide the complete Internet-style name for each cell
(unlike the common -cell argument in other command
suites, it is not possible to abbreviate this one).
-help prints the online help entry for this command. Do not
provide any other arguments or flags with this one.
See section 3.1 in the Reference Manual for more
details.
OUTPUT
Possible output values are
- no setuid allowed, indicating that programs from
the cell may not run with setuid privilege.
- setuid allowed, indicating that programs from the
cell may run with setuid privilege.
- using old VLDB, indicating that the cell is still
using the AFS 2.0 volume location method.
EXAMPLES
The following indicates that programs from the cell
oldcell.com may not run with setuid privilege and that the
cell is still using the old volume location method:
% fs getce oldcell.com Cell oldcell.com status: no setuid
allowed, using old VLDB
PRIVILEGE REQUIRED
None.
MORE INFORMATION
fs setcell

View File

@ -1,147 +0,0 @@
fs getserverprefs AFS Commands fs getserverprefs
NAME
fs getserverprefs -- display Cache Manager's preferences
for file server machines.
fs getserverprefs [-file <dir/file path>] [-numeric]
[-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
fs gets [-f <dir/file path>] [-n] [-h]
fs gp [-f <dir/file path>] [-n] [-h]
DESCRIPTION
Displays the Cache Manager's preferences for file server
machines. A preference consists of the name or IP address
of a file server machine followed by its "rank." The rank
is a positive integer in the range from 1 to 65,534.
A file server machine's rank determines the Cache Manager's
preference for selecting it when the Cache Manager must
access a ReadOnly replica that resides on it. The Cache
Manager compares the rank of the server machine with the
ranks of other server machines that house the replica. It
then attempts to access the replica on the server machine
that has the lowest integer rank.
If it cannot access the replica on the machine with the
lowest rank (possibly because the machine or the network on
which the machine is located is down), the Cache Manager
attempts to access the replica from the server machine with
the next lowest rank. It continues in this manner until it
either accesses the replica or determines that all of the
file server machines on which the replica resides are
unavailable.
The Cache Manager records addresses and ranks for all local
file server machines. It also records addresses and ranks
for all foreign file server machines that house a volume it
has accessed or for which a rank has been specified with the
fs setserverprefs command. It stores the addresses and
ranks in the kernel of the client machine.
Information displayed with this command is sent to stdout by
default. The -file switch can be used to direct the output
to a file.
ARGUMENTS
-file specifies the pathname of a file to which
the file server machine names and ranks are
to be written. Omit this switch to display
the machine names and ranks on stdout.
-numeric specifies that the IP addresses of the file
server machines are to be displayed. Omit
this flag to display the names of the file
server machines. Because including this
flag skips the resolution of IP addresses to
machine names, information is displayed more
quickly than if the option is omitted.
(This flag is especially useful if the
output is intended to be used as input to
the fs setserverprefs command, in which case
it does not matter whether names or
addresses are used.)
-help prints the online help entry for this
command. Do not provide any other arguments
or flags with this one. See section 3.1 in
the Reference Manual for more details.
OUTPUT
The output displays a separate line for each file server
machine that has a rank in the kernel of the machine on
which the command is issued. Each line displays the name of
a file server machine followed by its rank, as follows:
first machine name rank
second machine name rank
. . . . . .
If the -numeric flag is included with the command, the
output displays the IP addresses of the file server machines
instead of their names. The address of a machine is also
displayed if the Cache Manager cannot resolve a file server
machine's name based on the machine's address at the time
the command is issued.
EXAMPLES
The following displays the preferences (the list of file
server machines and their respective ranks) associated with
a Cache Manager. The output in the example truncates the
complete list of server machine names and ranks. Note that
the IP addresses, not the names, of some machines are
displayed because their addresses cannot be resolved.
% fs gets
fs5.transarc.com 20000
fs1.transarc.com 40000
fs3.transarc.com 20001
fs4.transarc.com 40001
fs2.transarc.com 25000
121.86.3.37 40002
fserver1.andrew.cmu.edu 40000
121.86.3.34 40001
server1.athena.mit.edu 1000
. . . . . . .
The following displays the same Cache Manager's preferences,
but the -numeric flag is included to display only the IP
addresses of the file server machines, not their names. The
example output again truncates the complete list of server
machine names and ranks.
% fs gets -n
128.21.6.214 20000
128.2.11.9 40000
128.2.11.12 20001
128.2.11.13 40001
128.2.11.11 25000
121.86.3.37 40002
121.86.3.31 40000
121.86.3.34 40001
145.2.50.121 1000
. . . . .
PRIVILEGE REQUIRED
None.
MORE INFORMATION
fs setserverprefs

View File

@ -1,80 +0,0 @@
fs help AFS Commands fs help
NAME
fs help -- show syntax of specified fs commands or list
functional descriptions of all fs
commands.
+
fs help [-topic <help string> ] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
+
fs h [-t <help string> ] [-h]
DESCRIPTION
Displays the first line (name and short description) of
every fs command's online help entry if no help string is
provided. For each operation code specified with -topic, it
outputs the entire help entry. See the OUTPUT section.
ARGUMENTS
-topic specifies the operation codes for which
syntax is to be provided. If the issuer
omits this argument, the output instead
provides a short description of all fs
commands.
-help prints the online help entry for this
command. Do not provide any other arguments
or flags with this one. See section 3.1 in
the Reference Manual for more details.
OUTPUT
The online help entry for each fs command consists of two or
three lines:
- The first line names the command and briefly
describes what it does.
- The second line displays any aliases the command
has (this line does not appear for every command).
- The final line, which begins with "Usage:", lists
the command's arguments and flags in the
prescribed order. Online help entries use the
same symbols (for example, brackets) as the
command definitions in this manual. For an
explanation of their meaning, see page v of the
introductory About This Manual chapter.
EXAMPLES
The following displays the online help entry for the
fs setacl command:
% fs help setacl
fs setacl: set access control list
aliases: sa
+
Usage: fs setacl -dir <directory>
+
-acl <access list entries> [-clear] [-negative] [-help]
PRIVILEGE REQUIRED
None.
MORE INFORMATION
fs apropos

View File

@ -1,128 +0,0 @@
fs listacl AFS Commands fs listacl
NAME
fs listacl -- show access control list.
+
fs listacl [-path <dir/file path> ] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
+
fs la [-p <dir/file path> ] [-h]
DESCRIPTION
Displays the access control list (ACL) associated with each
directory. It is legal to provide a filename rather than a
directory name for directory, in which case the ACL of the
file's parent directory is displayed (because it is not
possible to set an ACL for an individual file, the file is
inheriting the ACL from its parent directory). Omit this
switch to display the ACL of the current working directory.
Users who possess the ADMINISTER right on an ACL may change
the ACL with the fs setacl command or copy the ACL from a
different directory to it with the fs copyacl command.
WARNING
The appearance of a user/group on the Negative rights list
does not guarantee that the person is denied those rights.
If system:anyuser is granted any rights on the Normal rights
list, a user need only unlog to obtain those rights.
ARGUMENTS
-path specifies each file and/or directory for
which to display the associated ACL. If
this argument is omitted, the output
displays the ACL associated with the current
working directory. If it is a filename, the
ACL displayed is associated with the file's
parent directory.
-help prints the online help entry for this
command. Do not provide any other arguments
or flags with this one. See section 3.1 in
the Reference Manual for more details.
OUTPUT
The first line of the output names the directory associated
with the access control list. If the issuer used shorthand
notation (such as "." for the current directory) when
indicating the directory, it may appear here rather than the
full pathname of the directory.
The "Normal rights:" header indicates the list of users who
have normal rights to the directory. Each following line
lists a user/group name and the set of rights the user/group
may exercise. The possible rights and their meanings are
- r = READ the contents of files in the directory
- w = WRITE (modify) the contents of files in the
directory
- l = LOOKUP status information about the files in
the directory
- d = DELETE files from the directory
- i = INSERT new files into the directory
- k = LOCK; set read or write locks on the files in
the directory
- a = ADMINISTER; change the rights on the access
control list
- A, B, C, D, E, F, G, H; by default, these have no
meaning to AFS server processes. Administrators
and application programs may assign meanings to
them and place them on ACLs to control access to
the directory's contents in new ways. The letters
must be uppercase.
A "Negative rights:" header may appear next, if any negative
rights have been specified for this directory. The format
of this list is the same as that of the Normal rights list.
The difference is that the user(s)/group(s) listed are
denied rather than granted the specified rights.
EXAMPLES
The following displays the ACL associated with user pat's
home directory and its private subdirectory when the
fs listacl command is issued in the home directory:
% fs la . private Access list for . is Normal rights:
system:authuser rl pat rlidwka pat:friends rlid
Negative rights: smith rlidwka
Access list for private is Normal rights: pat rlidwka
PRIVILEGE REQUIRED
To issue this command with a directory name argument, issuer
must have the LOOKUP right on the directory's ACL. To issue
command with a filename argument, the issuer must have both
the LOOKUP and READ rights on the ACL of the file's parent
directory.
MORE INFORMATION
fs cleanacl
fs copyacl
fs setacl

View File

@ -1,64 +0,0 @@
fs listcells AFS Commands fs listcells
NAME
fs listcells -- show database server machines in cell(s)
known to Cache Manager.
fs listcells [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
fs listc [-h]
DESCRIPTION
Formats and displays the Cache Manager's kernel-resident
list of the database server machines in its home cell and
foreign cells.
At each reboot of the workstation, the Cache Manager copies
the contents of /usr/vice/etc/CellServDB into the kernel. It
is possible to modify the kernel-resident list between
reboots using fs newcell.
ARGUMENTS
-help prints the online help entry for this command. Do not
provide any other arguments or flags with this one.
See section 3.1 in the Reference Manual for more
details.
OUTPUT
The output contains a line for each cell for which the
kernel has a list of database server machines. The cell
name is followed by a list of its database server machines
(referred to as "hosts").
The format of each machine name (name in uppercase, name in
lowercase, or Internet address in four-field decimal form)
depends on the state of the local cell's name server at the
time the command is issued.
EXAMPLES
The following shows output for several cells as
illustrations of the different formats for machine names:
% fs listc
Cell transarc.com on hosts fs1.transarc.com fs2.transarc
Cell andrew.cmu.edu on hosts VICE11.FS.ANDREW.CMU.EDU
VICE2.FS.ANDREW.CMU.EDU VICE7.FS.ANDREW.CMU.EDU.
Cell athena.mit.edu on hosts 18.80.0.2 orf.mit.edu
PRIVILEGE REQUIRED
None.
MORE INFORMATION
fs newcell

View File

@ -1,84 +0,0 @@
fs listquota AFS Commands fs listquota
NAME
fs listquota -- show quota information for the volume
containing a file/directory.
+
fs listquota [-path <dir/file path> ] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
+
fs lq [-p <dir/file path> ] [-h]
DESCRIPTION
Displays information about the size and quota of the volume
containing each specified directory or file. See the OUTPUT
section for a complete explanation of the information
provided.
ARGUMENTS
-path specifies each file and/or directory for which
information about the host volume is desired. If the
issuer omits this argument, the current directory is
assumed.
-help prints the online help entry for this command. Do not
provide any other arguments or flags with this one.
See section 3.1 in the Reference Manual for more
details.
OUTPUT
The output reports the following information about each
volume that contains a specified directory or file:
- the name of the volume
- its maximum size quota, in kilobytes
- its current size, in kilobytes
- the percentage of its quota that its current size
represents
- the percentage of the volume's disk partition that
is full. This is usually unrelated to how much of
the user's quota is used, since it depends on all
the volumes on the partition. A large value may
nevertheless prevent a user from being able to
store more data on the partition.
EXAMPLES
The following shows the output for the volume user.smith in
the Transarc Corporation cell:
% fs lq /afs/transarc.com/usr/smith
Volume Name Quota Used % Used Partition
user.smith 15000 5071 34% 86%
PRIVILEGE REQUIRED
None.
MORE INFORMATION
fs diskfree
fs examine
fs quota
fs setquota
fs setvol

View File

@ -1,96 +0,0 @@
fs lsmount AFS Commands fs lsmount
NAME
fs lsmount -- show volume for which directory is a mount
point.
+
fs lsmount -dir <directory> [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
+
fs ls -d <directory> [-h]
DESCRIPTION
Outputs the name of the volume(s) for which each directory
is the root directory. If directory is not a mount point or
is not in AFS, an error message appears.
The association between directory and a volume name was
created with the fs mkmount command.
ARGUMENTS
-dir names the directory that serves as a mount point for a
volume. The last element in the pathname that the
issuer provides must be an actual name, not "dot" (.)
or "dot dot" (. .), which the fs command interpreter
does not understand in this case.
-help prints the online help entry for this command. Do not
provide any other arguments or flags with this one.
See section 3.1 in the Reference Manual for more
details.
OUTPUT
The output is of the form:
'directory' is a mount point for volume 'volume name'
A hash sign (#) preceding volume name indicates that
directory is a regular mount point.
A percent sign (%) preceding volume name indicates that
directory is a ReadWrite mount point.
If directory is a cellular mount point, then a cell name and
colon precede volume name in addition to the hash sign or
percent sign.
If directory is not a mount point, the output reads:
'directory' is not a mount point.
EXAMPLES
The following shows the mount point for the home directory
of user smith in the Transarc Corporation cell:
% fs ls /afs/transarc.com/usr/smith
'/afs/transarc.com/usr/smith' is a mount point for
volume '#user.smith'
The following shows both the regular and ReadWrite mount
points for the Transarc Corporation cell's root.cell volume.
% fs ls /afs/transarc.com
'/afs/transarc.com' is a mount point for volume '#ro
% fs ls /afs/.transarc.com
'/afs/.transarc.com' is a mount point for volume
'%root.cell'
The following shows a cellular mount point: the Andrew
cell's root.cell volume as mounted in the Transarc
Corporation cell's tree.
% fs ls /afs/andrew.cmu.edu
'/afs/andrew.cmu.edu' is a mount point for volume
'#andrew.cmu.edu:root.cell'
PRIVILEGE REQUIRED
None.
MORE INFORMATION
fs mkmount fs rmmount

View File

@ -1,297 +0,0 @@
fs mkmount AFS Commands fs mkmount
NAME
fs mkmount -- create a mount point for a volume.
fs mkmount -dir <directory> -vol <volume name> [-cell <cell
name>] [-rw] [-fast] [-root] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
fs mk -d <directory> -v <volume name> [-c <cell name>]
[-rw] [-f] [-ro] [-h]
DESCRIPTION
Creates a mount point called directory for the volume volume
name. The volume's root directory is also named directory.
Mount points look and act just like standard UNIX directory
structures, because when the Cache Manager encounters a
mount point directory in a pathname, it knows to look in the
indicated volume for the elements listed under directory.
It is possible, although not recommended, to create more
than one mount point to a volume.
Types of mount points
There are several types of mount points, because mount
points can vary along three dimensions. The following will
discuss the three dimensions in turn, explaining how they
affect the Cache Manager's interpretation of the mount
point.
Dimension 1: Volume Type
The first dimension concerns which type of volume
(ReadWrite, ReadOnly or Backup) is named in the mount point.
ReadOnly and Backup volumes are distinguished by a .readonly
or .backup extension, respectively. When a mount point
names a volume with either extension, the Cache Manager
accesses the specified volume only, ignoring Dimension 2
(the mount point's type). In other words, the Cache Manager
will never access the ReadWrite version of a volume if the
mount point explicitly names the ReadOnly or Backup version.
If the named ReadOnly or Backup volume is inaccessible, the
Cache Manager reports an error.
If the volume name does not include a .backup or .readonly
extension, then the volume is ReadWrite. The Cache Manager
considers Dimension 2.
Dimension 2: Mount Point Type
Note: This dimension is relevant only if the volume
indicated in the mount point is ReadWrite. Only Dimension 1
is relevant if the named volume is ReadOnly or Backup.
The second dimension concerns whether the mount point itself
is "regular" or "ReadWrite":
- When the Cache Manager encounters a regular mount
point (one naming a ReadWrite volume), it tries to
access a copy of the volume that is of same type
(ReadWrite or ReadOnly) as the volume which houses
the mount point. If there is no volume of the
same type, it will access the type that is
available.
Almost all mount points are of this type. Its
advantage is that the Cache Manager is free to
access the most readily available form of the
volume. When the Cache Manager starts in a
ReadOnly volume, this type of mount point means
that it traverses a "ReadOnly path," which can be
efficient because no callbacks are necessary.
The issuer creates a regular mount point by
providing only the required -dir and -vol
arguments.
- When the Cache Manager encounters a ReadWrite
mount point, it accesses only the ReadWrite
version of the indicated volume. (This assumes
that the volume does not have a .backup or
.readonly extension. Mounting a Backup or
ReadOnly volume with a ReadWrite mount point is
possible but unnecessary, as the Cache Manager
handles those volume types in the same way whether
their mount point is regular or ReadWrite. See
Dimension 1.)
A ReadWrite mount point is generally used to mount
only one volume in a cell: its root.cell volume at
the second level in the file tree, just below
/afs. Conventionally, root.cell is also mounted
with a regular mount point at the same level. The
two mount points are distinguished by the
placement of a period at the start of the
ReadWrite mount point's name (see the EXAMPLES
section). The existence of a ReadWrite mount
point for root.cell allows the system
administrator to switch onto a "ReadWrite" path
and thus be sure he or she is accessing the
ReadWrite version of a volume when that is
important.
The issuer creates a ReadWrite mount point by
adding the -rw flag.
Dimension 3: Cellular versus Local
The third dimension concerns which cell the volume resides
in. A cellular mount point indicates to the Cache Manager
that the volume resides in a foreign cell (and specifies
which one). If the mount point is not cellular, then the
Cache Manager assumes that the volume resides in the same
cell as the mount point does.
Normally, cellular mount points are used only at the second
level in a cell's file tree (i.e., at the "cell" level just
below /afs), to mount the root.cell volumes for foreign
cells that are to be visible in the local cell. It is
possible to create cellular mount points (mount foreign
volumes) at other levels in the tree. Doing so is not
recommended, however, as it can make it difficult to
determine which cell a given pathname leads to.
Cellular mount points can be either regular or ReadWrite:
- A regular cellular mount point not only tells the
Cache Manager to cross into a foreign cell, but
also to access the ReadOnly version of the
indicated volume if possible. The advantage is
that the Cache Manager traverses a "ReadOnly path"
in the foreign cell, even if the mount point for
the indicated volume resides in a ReadWrite
volume. This is particularly useful when crossing
into foreign cells that are too small to replicate
their root.afs volume.
To create a regular cellular mount point, the
issuer uses the -cell argument to specify the cell
name, and adds the -root flag.
- A ReadWrite cellular mount point tells the Cache
Manager to cross into a foreign cell and access
the ReadWrite version of the volume (assuming that
the volume does not have a .backup or .readonly
extension). Use of this type of mount point is
discouraged, because accessing ReadWrite volumes
means the File Server has to issue callbacks, an
extra load it is not fair to impose from outside
the cell. In general, only a cell's own
administrators need to access the ReadWrite
version of a volume.
To create a ReadWrite cellular mount point, the
issuer uses the -cell argument to specify the cell
name, and adds both the -root and -rw flags.
Because this is not recommended, no example of it
appears below.
Mounting foreign volumes in foreign cells
In addition to mounting volumes in the local cell, the
fs mkmount allows a user who possesses the necessary access
rights in a foreign cell to create a regular, non-cellular
mount point in a foreign cell's file tree while working on a
machine in his or her local cell. In other words, the
issuer can mount a volume from a foreign cell in that cell's
file space as though he or she were working at a machine in
that cell.
To mount a foreign volume in foreign cell, specify the cell
name with -cell, but do not use the -root flag.
Distinguishing the types of mount points
The output of fs lsmount uses various symbols to distinguish
the different types of mount points. See the Output section
of that command's description.
ARGUMENTS
-dir names the directory to be created as a mount point to
the named volume. It should not already exist. If
the issuer does not specify a pathname, the mount
point is created as a subdirectory of the current
working directory.
-vol names the volume to be mounted. Add the .readonly or
.backup extension if appropriate. The volumeID is
also acceptable.
Note: When creating a cellular mount point, do not
specify the cell name as part of this argument, as was
necessary in previous versions of AFS that did not
have the -root flag. Instead, include the -root flag
and use the -cell argument to specify the cell name;
the command interpreter will automatically prepend the
cell name to the volume name, separating them with a
colon.
-cell names the cell in which the volume resides. When
creating a cellular mount point, combine this argument
with the -root flag. When mounting a foreign volume
in a foreign cell, use this argument alone.
-rw designates the mount point as ReadWrite, which forces
the Cache Manager to access only the ReadWrite copy of
a volume that does not have a .backup or .readonly
extension. Without this flag, the mount point is
regular.
-fast indicates that the VL Server should not check that
there is a VLDB entry for the volume to be mounted.
By default, the VL Server does check and prints a
warning message if there is no VLDB entry; the mount
point is created in any case.
-root creates a cellular mount point.
-help prints the online help entry for this command. Do not
provide any other arguments or flags with this one.
See section 3.1 in the Reference Manual for more
details.
EXAMPLES
Note: These examples illustrate only the recommended
combinations and use of arguments. The OUTPUT section of
fs lsmount's description shows what each mount point looks
like.
The following creates a regular mount point. It mounts
user.smith at /afs/transarc.com/usr/smith.
% cd /afs/transarc.com/usr % fs mk smith user.smith
The following creates both a ReadWrite and regular mount
point for the Transarc Corporation cell's root.cell volume,
in that cell's file tree. It follows the convention of
putting a period at the beginning of the ReadWrite mount
point's name.
% fs mk /afs/transarc.com root.cell % fs mk
/afs/.transarc.com root.cell -rw
The following mounts the root.cell volume belonging to
Carnegie Mellon University's Andrew cell in the Transarc
Corporation cell's file tree, creating a regular, cellular
mount point called andrew.cmu.edu. When a Transarc
Corporation Cache Manager encounters this mount point, it
will cross into the Andrew cell on a ReadOnly path.
% fs mk /afs/andrew.cmu.edu root.cell -c andrew.cmu.edu
-root
The following illustrates the creation of a mount point in a
foreign cell, using Transarc Corporation's regular cell
(transarc.com) as the local cell and its test cell
(test.transarc.com) as the foreign cell. Suppose that while
working on a machine belonging to the transarc.com cell, a
Transarc Corporation user wants to mount a test.transarc.com
volume called user.test5 at
/afs/test.transarc.com/usr/test5. She has the INSERT and
ADMINISTER rights for /afs/test.transarc.com/usr. Note that
the effect is just the same as if the issuer were working on
a machine belonging to the test.transarc.com cell and
omitted the -c test.transarc.com part of the command.
% cd /afs/test.transarc.com/usr % fs mk test5 user.test5 -c
test.transarc.com
PRIVILEGE REQUIRED
Issuer must have INSERT and ADMINISTER access for the
directory that is to contain the mount point.
MORE INFORMATION
fs lsmount fs rmmount

View File

@ -1,125 +0,0 @@
fs monitor AFS Commands fs monitor
NAME
fs monitor -- direct reports on file system activity to
specified machine, or report current
monitoring machine.
fs monitor [-server <host name> or <off>] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
fs mo [-s <host name> or <off>] [-h]
DESCRIPTION
Depending on whether the issuer provides the -server
argument, and its value when provided:
EITHER sets where the Cache Manager sends messages about
file system activity (including its transactions with the Fi
OR disables message sending
OR reports the current destination for messages.
The messages are of a less technical nature than those
generated by the fs debug command. They are at the level of
file fetches and stores.
In order for the messages to be displayed, the specified
destination machine must be running a monitoring program
that "listens" to the correct UDP socket. If the destination
machine is not running such a program, then the messages are
lost.
WARNING
The effect of this command endures even after the issuer
logs out. See the EXAMPLE section below.
Transarc Corporation does not provide a monitoring program
appropriate for use with this command, but such a program,
called "Console", is available as part of the Andrew Toolkit
developed at Carnegie Mellon University's Information
Technology Center.
If no monitoring program is available, it is best to provide
a value of off for -server.
ARGUMENTS
-server has two legal values: off or a machine name host
name.
If set to off, then the Cache Manager does not
generate any reports on its role in file system
activities. This setting is recommended if the
machine is not running a monitoring program capable
of intercepting and displaying the messages
produced.
The issuer may otherwise specify a machine name host
name to which the Cache Manager will send messages.
The host name must be a complete Internet-style
machine name, and a monitoring program should be
running on the machine. If no such program is
running, the messages will simply be lost.
If the issuer does not provide this argument, the
current monitor setting is displayed.
-help prints the online help entry for this command. Do
not provide any other arguments or flags with this
one. See section 3.1 in the Reference Manual for
more details.
OUTPUT
When no arguments are provided, the output will report the
name of the machine to which monitoring messages are being
sent:
Using host machine for monitor services.
If monitoring is disabled, the output reports
Cache monitoring is currently disabled.
EXAMPLES
The following shows that monitoring messages are being sent
to machineQ.transarc.com.
% fs mo
Using host machineQ.transarc.com for monitor service
The following sets the machine's monitoring machine to
machineB.transarc.com.
% fs monitor machineB.transarc.com
fs: new monitor host set.
As an example of the "lingering" effect of this command,
suppose that a user working on machineA.transarc.com issues
the example command, and then logs out. When another user
logs on to machineA, he or she will not see any messages
about file system activity; instead, users of machineB will
continue to see messages from both machineB (their local
machine) and machineA (the remote machine). To avoid this,
the original user on machineA should issue the fs monitor
command again before logging out, specifying host name to be
machineA.transarc.com.
PRIVILEGE REQUIRED
None.

View File

@ -1,87 +0,0 @@
fs newcell AFS Commands fs newcell
NAME
fs newcell -- change list of cell's database server
machines in kernel.
+
fs newcell -name <cell name> -servers <primary servers>
[-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
+
fs n -n <cell name> -s <primary servers> [-h]
DESCRIPTION
Removes the Cache Manager's kernel-resident list of database
server machines for the cell cell name, replacing it with
primary servers.
This command does not make permanent changes in the
workstation's /afs/vice/etc/CellServDB file, the contents of
which are transferred into the kernel at each reboot. In
other words, rebooting the workstation will overwrite the
changes made with this command, unless the issuer changes
CellServDB in the same way.
Changes made with this command do appear in the output of
fs listcells, since that command consults the in-kernel list
rather than CellServDB.
This command may be used to introduce a completely new cell
into the kernel-resident list, but it is not possible to
make a cell inaccessible with this command (i.e., remove it
from the kernel-resident list by not providing any instances
for -server). To do that, the user must alter CellServDB
and reboot the machine.
WARNING
Some commands work correctly only when both CellServDB and
the kernel-resident list correctly list a cell's database
server machines. The need of such commands for correct
information in CellServDB precludes use of this command.
The klog command is a prominent example.
ARGUMENTS
-name is the complete Internet-style name of the cell for
which the in-kernel list of database server machines
will change. It may be the local cell or a foreign
cell.
-servers
names the database server machine(s) for the cell in
question. Provide the complete Internet-style
machine name for each machine.
-help prints the online help entry for this command. Do
not provide any other arguments or flags with this
one. See section 3.1 in the Reference Manual for
more details.
EXAMPLES
The following changes the machine's kernel-resident list of
database server machines for the Transarc Corporation cell
to include fs1.transarc.com and fs2.transarc.com.
% fs n transarc.com fs1.transarc.com fs2.transarc.com
PRIVILEGE REQUIRED
Issuer must be logged in as "root" in the UNIX file system
of the machine on which the command is being issued.
MORE INFORMATION
fs listcells

View File

@ -1,78 +0,0 @@
fs quota AFS Commands fs quota
NAME
fs quota -- show percent of quota used for volume
containing directory/file.
+
fs quota [-path <dir/file path> ] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
+
fs q [-p <dir/file path> ] [-h]
DESCRIPTION
Displays the percent of maximum quota currently used by the
volume that contains each specified directory or file. This
is the least informative but quickest fs command that
provides quota information about a volume. The fs examine
and fs listquota commands provide more complete information.
The system administrator may set quota with the fs setquota
or fs setvol command.
ARGUMENTS
-path specifies each file and/or directory for which quota
information about the host volume is desired. If the
issuer omits this argument, the current directory is
assumed.
-help prints the online help entry for this command. Do not
provide any other arguments or flags with this one.
See section 3.1 in the Reference Manual for more
details.
OUTPUT
The output reports the percent of quota used. It does not
name the host volume.
EXAMPLES
The following lists the percent quota used of the volume
housing the current working directory:
% fs quota
17% of quota used.
The following lists the percent quota used of both the
volume housing the current working directory's parent
directory and the volume housing the directory named
/afs/transarc.com/usr/smith:
% fs quota .. /afs/transarc.com/usr/smith
43% of quota used.
92% of quota used.
PRIVILEGE REQUIRED
None.
MORE INFORMATION
fs examine
fs listquota
fs setquota
fs setvol

View File

@ -1,52 +0,0 @@
fs rmmount AFS Commands fs rmmount
NAME
fs rmmount -- destroy mount point.
+
fs rmmount -dir <directory> [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
+
fs rm -d <directory> [-h]
DESCRIPTION
Removes the mount point called directory from the file
system. The corresponding volume remains in the system, but
will be inaccessible if there are no other mount points for
it.
ARGUMENTS
-dir names the mount point to be deleted from the file
system. The last element in the pathname that the
issuer provides must be an actual name, not "dot" (.)
or "dot dot" (. .), which the fs command interpreter
does not understand in this case.
-help prints the online help entry for this command. Do not
provide any other arguments or flags with this one.
See section 3.1 in the Reference Manual for more
details.
EXAMPLES
The following removes the mount points jones and terry from
the current working directory (assume it is
/afs/transarc.com/usr).
% fs rm jones terry
PRIVILEGE REQUIRED
Issuer must have DELETE access for the directory containing
the mount point.
MORE INFORMATION
fs lsmount fs mkmount

View File

@ -1,204 +0,0 @@
fs setacl AFS Commands fs setacl
NAME
fs setacl -- sets access control list for a directory.
+ +
fs setacl -dir <directory> -acl <access list entries>
[-clear]
[-negative] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
+ +
fs sa -d <directory> -a <access list entries> [-c] [-n]
[-h]
DESCRIPTION
Puts the specified access list entries on the access control
list (ACL) of each specified directory.
WARNING
If the ACL already grants certain rights to a user or group,
the rights specified with access list entries replace them,
rather than just being added to them.
Setting negative rights is generally unnecessary and not
recommended. Simply omitting a user or group from the
Normal rights list is normally adequate to prevent access.
In particular, note that it is futile to deny rights that
are granted to system:anyuser on the same ACL; all the user
needs to do is issue the unlog command to receive the denied
rights.
ARGUMENTS
-dir specifies each directory for which the
access control list is to change.
Abbreviated pathnames are interpreted
relative to the directory in which the
command is issued.
-acl defines a list of one or more entries, each
of which specifies
- a user name or group name (letters
all lowercase)
- the access right(s) to be
associated with the user/group
in that order, separated by a space. This
argument is unusual in requiring two parts
for each instance. The accepted
abbreviation of each right and the meaning
of the right follows:
r READ. Allows the possessor to read the
contents of files in the directory and
to "stat" (issue ls -l for) file and
subdirectory elements in the directory.
w WRITE. Allows the possessor to modify
the contents of files in the directory
and to change their UNIX mode bits with
chmod.
l LOOKUP. Allows the possessor to list
the names of files and subdirectories
in the directory (for example, by
issuing ls). The possessor may "stat"
(issue ls -l for) the directory itself
(but not for files and subdirectories
in it) and may examine the directory's
ACL.
d DELETE. Allows the possessor to remove
files from the directory.
i INSERT. Allows the possessor to create
new files in the directory or move
existing files into it.
k LOCK. Allows the possessor to run
programs that need to issue the "flock"
system call on files in the directory.
a ADMINISTER. Allows the possessor to
change the directory's ACL.
A, B, C, D, E, F, G, H; by default, these
have no meaning to AFS server
processes. Administrators and
application programs may assign
meanings to them and place them on ACLs
to control access to the directory's
contents in new ways. The letters must
be uppercase.
all all seven standard rights (rlidwka).
none no rights. Removes the user/group from
the ACL, but may not guarantee they
have no rights if they belong to groups
that remain on the ACL.
read both r and l.
write
all rights except ADMINISTER (rlidwk).
It is legal to mix the individual letters
and the words within access list entries,
but not within an individual pairing of
user/group and rights.
-clear removes all existing entries on each access
control list before placing access list
entries on it. This should be used with
caution: if access list entries does not
grant all rights to the owner of the
directory, it can become awkward for the
owner to access items in the directory. In
particular, not having the LOOKUP right
makes it impossible to resolve the "dot" ( .
) and "dot dot" ( . . ) shorthand from
within the directory.
-negative puts the specified access list entries in
the Negative rights section of each access
control list. The user/group is thus
explicitly denied the indicated rights, even
if entries on the accompanying Normal rights
section of the access control list grant
them rights. However, it is possible to
unlog to obtain rights granted to
system:anyuser on the Normal rights section
of the same ACL; see the WARNING above.
This flag affects all directories and access
list entries specified. Its use is not
recommended; see the WARNING section above.
If the issuer omits this flag, the access
list entries go into the Normal rights
section of the access control list.
-help prints the online help entry for this
command. Do not provide any other arguments
or flags with this one. See section 3.1 in
the Reference Manual for more details.
EXAMPLES
The following example adds two entries to the Normal rights
part of the current working directory's ACL: the first entry
grants READ and LOOKUP rights to pat:friends, while the
other (using the write shorthand) gives all rights except
ADMINISTER to smith.
% fs sa . pat:friends rl smith write
The following shows the effect of the -clear flag on the ACL
of the subdirectory reports by showing the ACL before and
after the command is issued:
% fs la reports Access list for reports is Normal rights:
system:authuser rl pat:friends rlid smith rlidwk
pat rlidwka Negative rights: terry rl
% fs sa -clear reports pat all smith write system:anyuser rl
% fs la reports Access list for reports is Normal rights:
system:anyuser rl smith rlidwk pat rlidwka
The following shows how the -dir and -acl switches are
necessary when more than one directory is specified. The
new entry granting READ, LOOKUP, and INSERT rights to
pat:friends is added to the ACL for both the current
directory and its public subdirectory.
% fs sa -d . public -a pat:friends rli
PRIVILEGE REQUIRED
Issuer must have ADMINISTER rights to the directory; the
directory's owner and members of system:administrators
always do.
MORE INFORMATION
fs copyacl
fs listacl

View File

@ -1,97 +0,0 @@
fs setcachesize AFS Commands fs setcachesize
NAME
fs setcachesize -- set size of disk cache.
fs setcachesize [-blocks <size in 1K byte blocks>] [-reset]
[-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
fs setca [-b <size in 1K byte blocks>] [-r] [-h]
fs cachesize [-b <size in 1K byte blocks>] [-r] [-h]
DESCRIPTION
On machines using a disk cache, changes the amount of local
disk space that the Cache Manager may use for its data
cache. Specify the number in kilobyte blocks. This command
is not operative on machines using memory caching.
To return the cache size to the default value specified in
/usr/vice/etc/cacheinfo on the client's local disk, specify
0 as the number of kilobyte blocks. The cacheinfo file is
human-readable and visible with the cat command. The third
and final field is the number of kilobyte blocks allocated
to the cache at reboot. The chapter in the AFS System
Administrator's Guide on client machine configuration
further describes the contents of cacheinfo.
To return the cache size to the value set when the machine
was last booted, use the -reset flag instead of the -blocks
argument. This is normally the amount specified in
cacheinfo, unless the -blocks argument was used on afsd to
override the cacheinfo value.
The fs getcacheparms command displays the current actual
cache size and the amount of space in use, both for disk and
memory caches.
WARNINGS
This command is not operative on machines using memory
caching, and will result in an error message.
On machines using a disk cache, do not set the cache size to
exceed 90% of the actual disk space available for the cache
directory. The cache implementation itself requires a small
amount of room on the partition.
ARGUMENTS
-blocks
specifies the number of 1 kilobyte blocks the Cache
Manager may devote to the cache. Specifying a value
of "0" sets cache size to the default specified in
cacheinfo. This implies that the smallest possible
cache size is 1 kilobyte, not 0.
-reset
returns the cache size to the value set when the
machine was last booted. This agrees with the value
in cacheinfo unless the -blocks argument was used on
afsd.
-help prints the online help entry for this command. Do not
provide any other arguments or flags with this one.
See section 3.1 in the Reference Manual for more
details.
EXAMPLES
The following sets the disk cache size to 25000 kilobyte
blocks.
% fs setca 25000
Both of the following reset the disk cache size to the value
in cacheinfo, assuming that the -blocks argument on afsd was
not used.
% fs setcachesize 0 % fs setca -r
PRIVILEGE REQUIRED
Issuer must be logged in as "root" in the UNIX file system
of the machine on which the command is being issued.
MORE INFORMATION
fs getcacheparms

View File

@ -1,81 +0,0 @@
fs setcell AFS Commands fs setcell
NAME
fs setcell -- allow or disallow running of setuid programs
from specified cells.
+
fs setcell -cell <cell name> [-suid] [-nosuid] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
+
fs setce -c <cell name> [-s] [-n] [-h]
DESCRIPTION
Determines whether the workstation allows programs whose
binary files reside in the indicated cells to execute with
setuid privilege. By default, programs originating in the
local cell (as determined by /usr/vice/etc/ThisCell) may run
with setuid privilege, but programs originating in foreign
cells may not. Use the fs getcellstatus command to displays
a cell's current status in this respect.
Include the -suid flag with the command to allow programs
from the specified cells to execute with setuid privilege;
include the -nosuid flag with the command to prohibit
programs from the specified cells from executing with setuid
privilege. Use either the -suid flag or the -nosuid flag.
Omit both flags to prevent programs from the specified cells
from executing with setuid privilege.
ARGUMENTS
-cell names each cell from which to allow or
disallow programs to execute with setuid
privilege. Provide the complete Internet-
style cell name of each cell (unlike the
-cell argument common to many commands, the
cell argument of this command does not
accept abbreviated cell names).
-suid allows programs from cell name to execute
with setuid privilege. Provide it or
provide -nosuid. Omit both flags to prevent
programs from cell name from executing with
setuid privilege.
-nosuid prevents programs from cell name from
executing with setuid privilege. Provide it
or provide -suid. Omit both flags to
prevent programs from cell name from
executing with setuid privilege.
-help prints the online help entry for this
command. Do not provide any other arguments
or flags with this one. See section 3.1 in
the Reference Manual for more details.
EXAMPLES
The following enables programs whose binary files reside in
the Transarc Cell to execute with setuid privilege in the
local cell:
% fs setc transarc.com -s
PRIVILEGE REQUIRED
Issuer must be logged in as "root" in the UNIX file system
of the machine on which the command is issued.
MORE INFORMATION
fs getcellstatus

View File

@ -1,73 +0,0 @@
fs setquota AFS Commands fs setquota
NAME
fs setquota -- sets maximum quota for volume containing
specified directory.
fs setquota [-path <dir/file path>] -max <max quota in
kbytes> [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
fs sq [-p <dir/file path>] -m <max quota in kbytes> [-h]
DESCRIPTION
Sets the maximum size quota for the volume that contains the
specified directory or file. The fs examine and fs
listquota commands show the current maximum quota. The fs
quota command shows the percent of maximum quota used.
The fs setvol command can be used to set the quota on
multiple volumes at once. It can also be used to create
messages associated with the volumes.
ARGUMENTS
-path names the directory or file for which quota
on the host volume is to be set. If this
argument is omitted, the current working
directory is used; in this case, the -max
switch must be used.
-max specifies the maximum amount of disk space
the volume can use. Express it in kilobyte
blocks (a value of 1024 is one megabyte). A
value of 0 grants an unlimited quota, but
the size of the disk partition that houses
the volume places an absolute limit on the
volume's maximum size.
-help prints the online help entry for this
command. Do not provide any other arguments
or flags with this one. See section 3.1 in
the Reference Manual for more details.
EXAMPLES
The following imposes a maximum quota of 3000 kilobytes on
the volume that houses the directory
/afs/transarc.com/usr/smith:
% fs sq /afs/transarc.com/usr/smith 3000
PRIVILEGE REQUIRED
Issuer must belong to the system:administrators group in the
Protection Database.
MORE INFORMATION
fs examine
fs listquota
fs quota
fs setvol

View File

@ -1,232 +0,0 @@
fs setserverprefs AFS Commands fs setserverprefs
NAME
fs setserverprefs -- set Cache Manager's preferences for
file server machines.
+
fs setserverprefs [-servers <machine name and rank> ]
[-file <dir/file path>] [-stdin] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
+
fs sets [-se <machine name and rank> ] [-f <dir/file
path>]
[-st] [-h]
+
fs sp [-se <machine name and rank> ] [-f <dir/file path>]
[-st] [-h]
DESCRIPTION
Sets the Cache Manager's preference for one or more file
server machines. Each Cache Manager stores a table of file
server machines and their respective "ranks." A file server
machine's rank is an integer in the range from 1 to 65,534
that determines the Cache Manager's preference for selecting
the server machine when the Cache Manager must access a
ReadOnly replica that resides on it. Ranks bias the Cache
Manager to prefer to access replicas on "near" server
machines rather than those on "distant" server machines.
When the Cache Manager needs to access a ReadOnly replica,
it first contacts the Volume Location (VL) Server to
ascertain the names of the file server machines on which the
replica resides. It then checks its internal table to
determine the rank associated with each of the file server
machines. After comparing the ranks of the machines, it
attempts to access the replica on the server machine that
has the lowest integer rank.
If the Cache Manager cannot access the replica on the
machine with the lowest rank (possibly because of a server
process, machine, or network outage), it attempts to access
the replica on the machine with the next lowest rank. It
continues in this way until it either accesses the replica
or determines that all of the file server machines on which
the replica is housed are unavailable.
Each time it is initialized with the afsd command, the Cache
Manager assigns preferences to any database server machines
listed in the local /usr/vice/etc/CellServDB file that are
also file server machines. It stores the preferences as
machine IP addresses and associated ranks in the kernel of
the client machine. (See the DETERMINING PREFERENCES
section for more information about how the Cache Manager
determines actual file server machine ranks.) Because they
are stored in the kernel, the preferences are recalculated
when the client machine is rebooted.
The Cache Manager assigns ranks to file server machines in
the local cell and from foreign cells as necessary. When it
needs to access a ReadOnly volume, it first determines the
machines on which the replica resides. It then assigns
ranks to any of the machines that do not already have them
and stores the ranks in the kernel, after which it uses the
ranks as the basis of its selection of the file server
machine from which to access the replica.
The fs setserverprefs command can be used to define or
change the rank associated with a local or foreign file
server machine. If the Cache Manager has no rank for the
machine, the command defines the machine's initial rank. If
the Cache Manager already has a rank for the machine, the
command changes the rank to match the one specified by the
issuer; the old rank is overwritten.
Preferences are specified as pairs of values. The first
value is the file server machine, the second the machine's
rank. File server machines can be specified by name or by
IP address. Depending on the naming service available at
the time the command is issued, abbreviated forms of machine
names may be allowed. See the introductory About This
Manual chapter for more information.
Pairs of file server machines and their ranks can be
specified
- on the command line with the -servers switch
- from a file with the -file switch
- from stdin with the -stdin flag
The -file switch and -stdin flag are especially useful for
configuring multiple Cache Managers in a cell with the same
preferences. The -file switch can be used to indicate a
file created manually or generated automatically with the fs
getserverprefs command. Similarly, the -stdin flag can be
used to accept preferences piped directly from another
process (possibly from another Cache Manager with the fs
getserverprefs command). The -servers, -file, and -stdin
switches and flag are not mutually exclusive, so multiple
sources of preferences are permitted.
It is possible for the Cache Manager or a user to assign the
same rank to multiple file server machines housing a replica
of the same volume. In this case, the Cache Manager uses
methods described in the following section, ASSIGNING
PREFERENCES, to break the tie. It then increments the ranks
of the file server machines from which it does not access
the replica.
ASSIGNING PREFERENCES
When initially assigning preferences, the Cache Manager
bases the ranks on IP addresses, rather than on actual
physical considerations such as location or distance. It
calculates file server machine ranks according to the
following heuristic:
- If the client machine is also a file server
machine, the machine receives a rank of 5000.
- If the client machine is in a subnet, all file
server machines in the same subnet as the client
machine receive an initial rank of 20000.
- All file server machines in the same network as
the client machine receive an initial rank of
30000.
- All file server machines on the distant ends of
point-to-point links from the client machine
receive an initial rank of 30000.
- All file server machines on networks not directly
connected to the client machine receive a rank of
40000.
- All file server machines for which no network
locality information can be determined receive a
default rank of 40000.
The Cache Manager also considers additional metrics
associated with networks, subnets, and interfaces when it
determines ranks.
If the same ReadOnly replica is stored on multiple file
server machines that have the same rank, the Cache Manager
employs the metrics mentioned previously to resolve the
duplicate rank collisions. If necessary, the Cache Manager
randomizes its ranking of the tied machines. It resolves
the ties internally by incrementing by one the ranks of the
machines from which it chooses not to access the replica.
NOTE
The Cache Manager consults preferences only when accessing
ReadOnly replicas of volumes. It does not consider the
preferences when contacting the VL Server on a database
server machine to determine the location of a volume. Its
access of database server machines is still random.
ARGUMENTS
-servers specifies one or more pairs of file server
machines and their respective ranks.
Identify file server machines by name or by
IP address. See the DESCRIPTION section for
more information on specifying file server
machines and their ranks.
-file specifies the pathname of a file that
contains pairs of file server machines and
their respective ranks. Identify file
server machines by name or by IP address.
See the DESCRIPTION section for more
information on specifying file server
machines and their ranks.
-stdin indicates that pairs of file server machines
and their respective ranks are to be read
from stdin. Identify file server machines
by name or by IP address. See the
DESCRIPTION section for more information on
specifying file server machines and their
ranks.
-help prints the online help entry for this
command. Do not provide any other arguments
or flags with this one. See section 3.1 in
the Reference Manual for more details.
EXAMPLES
The following sets preference ranks for three file server
machines. In this example, the server machines have no
replicas in common, so no potential collisions are
associated with their all having the same rank.
% fs sets -se fs1.transarc.com 10000 fs2.transarc.com 10000
\ 128.2.11.12 10000
The following defines a rank for one file server machine
from the command line and reads ranks for additional file
server machines from a file named prefs.txt in the current
directory:
% fs sets -se fs4.transarc.com 10010 -f prefs.txt
PRIVILEGE REQUIRED
Issuer must be logged in as "root" in the UNIX file system
of the machine on which the command is issued.
MORE INFORMATION
fs getserverprefs

View File

@ -1,94 +0,0 @@
fs setvol AFS Commands fs setvol
NAME
fs setvol -- set maximum quota and messages for each volume
containing specified directory.
+
fs setvol [-path <dir/file path> [-max <disk space quota
in 1K units>]
[-motd <message of the day>] [-offlinemsg <offline
message>]
[-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
+
fs sv [-p <dir/file path> ] [-ma <disk space quota in 1K
units>]
[-mo <message of the day>] [-o <offline message>] [-h]
DESCRIPTION
Sets maximum quota for the volumes that contain each
specified directory or file. It is also possible to use
-motd and -offlinemsg to create messages associated with the
volume, which appear when the fs examine command is issued.
The fs examine command displays all the information that can
be altered with this command. The fs listquota command
displays maximum quota, and the fs quota command displays
the percent quota used.
The fs setquota command sets maximum quota on one volume at
a time.
ARGUMENTS
-path names each file and/or directory for which
quota and messages on the host volumes are
to be set. Omit this switch to affect the
volume that contains the current working
directory.
-max specifies the maximum amount of disk space
the volume can use. Express it in kilobyte
blocks (a value of 1024 is one megabyte). A
value of 0 grants an unlimited quota, but
the size of the disk partition housing the
volume places an absolute limit on the
volume's maximum size.
-motd specifies a "message of the day" displayed
with the fs examine command. It can be used
to alert users to anything of interest
concerning the volume.
-offlinemsg specifies a message displayed with the fs
examine command. It can be used to explain
why the volume is currently offline.
-help prints the online help entry for this
command. Do not provide any other arguments
or flags with this one. See section 3.1 in
the Reference Manual for more details.
EXAMPLES
The following imposes a 6500 kilobyte quota on the volumes
housing the /afs/transarc.com/usr/smith and
/afs/transarc.com/usr/pat home directories:
% cd /afs/transarc.com/usr % fs sv -p smith pat -ma 6500
PRIVILEGE REQUIRED
Issuer must belong to the system:administrators group in the
Protection Database.
MORE INFORMATION
fs examine
fs listquota
fs quota
fs setquota

View File

@ -1,112 +0,0 @@
fs sysname AFS Commands fs sysname
NAME
fs sysname -- report or set CPU/operating system type.
fs sysname [-newsys <new sysname>] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
fs sy [-n <new sysname>] [-h]
DESCRIPTION
Depending on whether the issuer provides the -newsys
argument,
EITHER sets the indicator of CPU/operating system type in th
the machine on which the command is issued
OR reports the current setting.
If the command is issued on an AFS client machine, the value
is set/reported for the machine itself.
If the command is issued on an NFS client machine accessing
AFS via the NFS/AFS Translator, then the specified CPU/OS
value is set/reported for the NFS client machine. The
information is in a record maintained by the AFS client
machine serving as the NFS client's NFS/AFS translator
machine. The translator machine maintains a separate record
for each user logged into the NFS client. This implies that
if a user adopts a new identity (UNIX UID) during a login
session on the NFS clientMperhaps using suMhe or she must
issue this command again. Setting this indicator allows the
translator machine to provide the NFS client with the proper
version of program binaries when the user issues commands
for which the binaries are kept in the AFS file tree.
The Cache Manager's main use of this indicator is as a value
for the "@sys" variable which can occur in AFS pathnames.
As the Cache Manager interprets pathnames, it substitutes
the indicator's value for any occurrence of @sys. See the
EXAMPLES section for an example. (Note that @sys should be
used sparingly, as it can make the effect of changing
directories unpredictable; see the AFS System
Administrator's Guide for further information.)
ARGUMENTS
-newsys specifies the new setting of the CPU/operating
system indicator for the machine on which it is
issued. If the issuer omits it, the output shows
the current setting. Consult the AFS System
Administrator's Guide for a complete list of the
legal values and the CPU/OS types they represent.
-help prints the online help entry for this command. Do
not provide any other arguments or flags with this
one. See section 3.1 in the Reference Manual for
more details.
OUTPUT
The output reports the machine's system type in the format
Current sysname is 'system type'
EXAMPLES
The following shows the output produced on a Sun
SPARCStation running SunOS 4.1:
% fs sy Current sysname is 'sun4c_41'
The following defines a machine to be a DECStation running
Ultrix 4.1:
% fs sysname pmax_ul4
When the Cache Manager on the machine encounters a pathname
with the @sys variable in it, it substitutes pmax_ul4 for
the variable. For instance, this machine would interpret
the pathname
/afs/transarc.com/@sys/usr/bin
as
/afs/transarc.com/pmax_ul4/usr/bin
and would access the volume corresponding to that directory.
A machine whose CPU/OS type was rt_aos4 would interpret the
same pathname as
/afs/transarc.com/rt_aos4/usr/bin
and so would access a volume different from that accessed by
the DECStation.
PRIVILEGE REQUIRED
None, if the machine is an NFS client. If the machine is an
AFS client, the issuer must be logged into the local UNIX
file system as "root."
MORE INFORMATION
fs exportafs

View File

@ -1,69 +0,0 @@
fs whereis AFS Commands fs whereis
NAME
fs whereis -- report name of file server machine(s) housing
specified file/directory.
+
fs whereis [-path <dir/file path> ] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
+
fs whe [-p <dir/file path> ] [-h]
DESCRIPTION
Returns the name of the file server machines that house each
specified directory or file. See the OUTPUT section for a
description of the information displayed.
ARGUMENTS
-path specifies each file or directory whose location is to
be returned. Each specified file or directory must
reside in AFS (not on a local disk). If the issuer
omits this argument, the location of the working
directory is returned.
-help prints the online help entry for this command. Do not
provide any other arguments or flags with this one.
See section 3.1 in the Reference Manual for more
details.
OUTPUT
The output includes a line for each specified directory or
file. It names the file server machine on which the volume
that houses the specified directory or file resides. A list
of multiple machines indicates that the directory or file is
in a replicated volume.
Machine names usually have a suffix indicating their cell
membership. If some question remains, the fs whichcell
command names the cell in which a directory or file resides.
EXAMPLES
The following indicates that the directory /afs/transarc.com
resides in a replicated volume located on both
fs1.transarc.com and fs3.transarc.com:
% fs whe /afs/transarc.com File /afs/transarc.com is on
hosts fs1.transarc.com fs3.transarc.com
PRIVILEGE REQUIRED
None.
MORE INFORMATION
fs whichcell
fs wscell

View File

@ -1,61 +0,0 @@
fs whichcell AFS Commands fs whichcell
NAME
fs whichcell -- return name of cell to which specified
file/directory belongs.
+
fs whichcell [-path <dir/file path> ] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
+
fs whi [-p <dir/file path> ] [-h]
DESCRIPTION
Returns the name of the cell in which the volume that houses
each indicated directory or file resides. See the OUTPUT
section for a description of the information displayed.
ARGUMENTS
-path specifies each file and/or directory whose cell
membership is to be returned. Each specified
directory or file must reside in AFS (not on a local
disk). If the issuer omits this argument, the cell of
the working directory is returned.
-help prints the online help entry for this command. Do not
provide any other arguments or flags with this one.
See section 3.1 in the Reference Manual for more
details.
OUTPUT
The output includes a line for each specified directory or
file, naming the cell in which the directory or file
resides.
EXAMPLES
The following shows that the current directory resides in a
volume in the Transarc Corporation cell:
% fs whi File . lives in cell 'transarc.com'
PRIVILEGE REQUIRED
None.
MORE INFORMATION
fs whereis
fs wscell

View File

@ -1,50 +0,0 @@
fs wscell AFS Commands fs wscell
NAME
fs wscell -- return name of cell to which workstation
belongs.
fs wscell [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
fs ws [-h]
DESCRIPTION
Returns the name of the home cell for the workstation from
which the command is issued.
ARGUMENTS
-help prints the online help entry for this
command. Do not provide any other arguments
or flags with this one. See section 3.1 in
the Reference Manual for more details.
OUTPUT
The reported cell name comes from the file
/usr/vice/etc/ThisCell on the workstation's local disk.
EXAMPLES
The following results when the fs wscell is issued on a
machine in the Transarc Corporation cell:
% fs wscell
This workstation belongs to cell 'transarc.com'
PRIVILEGE REQUIRED
None.
MORE INFORMATION
fs whereis
fs whichcell

View File

@ -1,207 +0,0 @@
AFS Commands
NAME
AFS Commands
1. The kas Commands
------------------------------------------------------------
This chapter defines the kas commands that system
administrators use to contact the Authentication Server. It
assumes the reader is familiar with the concepts described
in the AFS System Administrator's Guide.
The kas command interface allows system administrators to
create, modify, examine and delete entries in the
Authentication Database maintained by the Authentication
Server. Individual users may use the kas setpassword
command to change their own password (as well as the more
standard, non-kas command, kpasswd).
Refer to the Command Summary at the end of this document for
a complete list of kas commands and their syntax.
AFS Command Reference Manual The kas Commands 2
1.1 The kas Interface
The kas command interface differs slightly from the others
described in this manual. The Authentication Server
authenticates issuers of kas commands directly rather than
accepting a ticket from the Ticket Granting Service as most
other servers do. Thus most commands require that the
issuer provide his or her password at the time of issue.
1.1.1 Interactive Mode
Providing the password each time could get tedious if the
user needed to execute a whole set of commands, so kas
provides an "interactive" mode in which it is not necessary
to provide a password repeatedly.
1.1.1.1 Entering Interactive Mode
There are several ways to enter interactive mode:
- Use the kas interactive command.
- Type kas without any operation code. By default,
the command interpreter establishes a connection
with each Authentication Server in the local cell.
They attempt to authenticate the user logged into
the machine from which the command is issued,
based on the password the issuer provides at the
prompt. The issuer may specify an alternate
identity, password, cell name and/or list of
Authentication Servers by using the first four
common arguments described in section 4.3 in the
Reference Manual . Type kas followed by a user
name and cell name, separated by an "@" sign
(example: kas smith@transarc.com). The
Authentication Server attempts to authenticate the
specified user in the specified cell, and prompts
for his or her password in the specified cell.
This method is most useful when the issuer wishes
to enter interactive mode with a different
identity in a different cell.
1.1.1.2 Effects of Entering Interactive Mode
While in interactive mode:
- The "ka>" prompt replaces the issuer's regular
prompt.
- It is no longer necessary or legal to type kas at
the beginning of a command. Type the operation
code as the first part of the command.
- The Authentication Server does not prompt for the
issuer's password at each command. This is the
mode's main advantage.
- The issuer's identity and cell are set and cannot
be changed without leaving interactive mode, so it
is not legal to provide any of the common
AFS Command Reference Manual The kas Commands 3
arguments described fully in section 4.3 in the
Reference Manual , except for -help.
1.2 Information in the Authentication Database
Both individual users and servers have entries in the
Authentication Database. The two most important fields in
an entry are:
- the name
- the key (a scrambled form of name's password,
suitable for use as an encryption key)
For individual users, the name field holds the user name as
typed at login, and key holds a scrambled form of the
password the user has created.
Server entries are the same as user entries. The entry name
for the AFS server processes is "afs". A server entry's key
field contains the server encryption key that the Ticket
Granting Service (TGS) uses to seal the tickets it gives to
clients so that they may contact the server processes.
1.3 Common Arguments and Flags
When not in interactive mode, most kas commands accept the
following optional arguments and flags. Some of these are
unavailable in interactive mode because the information they
provide is established while entering interactive mode, and
cannot be changed from within interactive mode. They are
listed in the command descriptions where they apply, and are
described in detail below:
[-admin_username <admin principal to use for
authentication>]
This argument allows the issuer to assume the identity of
the specified user name (which is referred to as an "admin
principal"). By default, the Authentication Server attempts
to authenticate the user logged into the local workstation.
[-password_for_admin <admin password>]
This argument provides the Authentication Server with the
password needed to prove that the issuer of the command (the
admin principal) is legitimate (which it will if it matches
the password stored in the Authentication Database for the
issuer). Note that providing this argument on the command
line reveals the password on the screen. Issuers may prefer
to respond to the prompt that will appear if this argument
is not provided, as the password does not echo visibly in
that case.
[-cell <cell name>]
This argument specifies that the command should be run in a
different cell, specified by cell name. By default,
commands are executed in the local cell, as defined in
/usr/vice/etc/ThisCell on the client machine on which the
command is issued. The issuer may abbreviate cell name to
the shortest form that distinguishes it from the other cells
listed in /usr/vice/etc/CellServDB on the client machine on
AFS Command Reference Manual The kas Commands 4
which the command is issued.
+
[-servers <explicit list of authentication servers> ]
This argument causes the kas command interpreter to
establish a connection with the Authentication Server
running on each specified database server machine. It then
chooses one of these at random to execute each subsequent
command. The issuer may abbreviate the machine name to the
extent the cell's name server will accept.
By default, the kas command interpreter establishes a
connection with each machine listed in the local
workstation's copy of /usr/vice/etc/CellServDB, and then
chooses one of those at random for command execution.
This option is useful for testing specific servers if
problems are encountered.
[-noauth]
This flag instructs indicated Authentication Server(s) not
to authenticate the issuer of the command, and thus
establishes an unauthenticated connection between the issuer
and the Authentication Server (he or she is recognized as
the unprivileged user anonymous). It is useful only when
authorization checking is disabled on the file server
machine (during the installation of a file server machine or
when bos setauth has been used during other unusual
circumstances). In normal circumstances, the Authentication
Server allows only authorized (privileged) users to issue
most kas commands, and will refuse to execute the requested
actions even if the -noauth flag is used.
[-help]
This flag has the same function as the kas help command: it
prints the command's online help message on the screen. No
other arguments or flags should be provided at the same
time. Even if they are, this flag overrides them, and the
only effect of issuing the command is that the help message
appears.
1.4 The Privilege Required for kas Commands
The Authentication Server considers privileged those users
who have the ADMIN flag turned on in their Authentication
Database entry. See the kas setfields command to learn how
to turn on the ADMIN flag. Most kas commands require that
the issuer be privileged. All commands will prompt for a
password, unless the issuer has entered interactive mode.

View File

@ -1,64 +0,0 @@
kas apropos AFS Commands kas apropos
NAME
kas apropos -- show each help entry containing keyword.
kas apropos -topic <help string> [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
kas a -t <help string> [-h]
DESCRIPTION
Displays the first line of the help entry for any kas
command that has help string in its name or short
description.
ARGUMENTS
-topic
specifies the keyword string to search for. If it is
more than a single word, surround it with double
quotes or other delimiters. Type all help strings for
kas commands in all lowercase letters, except the word
"AuthServer."
-help prints the online help for this command. Do not
provide any other arguments or flags with this one.
See section 4.3 in the Reference Manual for more
details.
OUTPUT
The first line of a command's online help entry names the
command and briefly describes what it does. The kas apropos
command displays that first line for any kas command where
help string is part of the command name or first line.
To see the remaining lines in a help entry, which provide
the command's alias (if any) and syntax, use the kas help
command.
EXAMPLE
The following lists all kas commands that have the word
"key" in their operation code or short online description.
% kas a key
getrandomkey: get a random key
setkey: set a user's key
stringtokey: convert a string to a key
PRIVILEGE REQUIRED
None. No password will be prompted for.
MORE INFORMATION
kas help

View File

@ -1,107 +0,0 @@
kas create AFS Commands kas create
NAME
kas create -- create an entry in the Authentication
Database.
kas create -name <name of user> [-initial_password
<initial password>]
[-admin_username <admin principal to use for
authentication>]
[-password_for_admin <admin password>] [-cell <cell name>]
[-servers <explicit list of authentication
+
servers> ] [-noauth]
[-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
kas c -na <name of user> [-i <initial password>]
[-a <admin principal to use for authentication>] [-p <admin
password>]
[-c <cell name>] [-s <explicit list of authentication
+
servers> ] [-no] [-h]
DESCRIPTION
Creates an entry in Authentication Database for name of
user. The Authentication Server converts initial password
into a form suitable for use as an encryption key, and
places it in the entry's key field.
ARGUMENTS
-name specifies the name of the new
Authentication Database entry. It will be
the user name under which the user logs in
to the system.
-initial_password specifies a character string that will
become the user's password. The
Authentication Server scrambles it into an
octal key and places it in the key field
of the Database entry. If the issuer does
not provide it, it will be prompted for
(if it is not provided at the prompt the
create operation fails). The advantage of
waiting for the prompt is that the
password does not echo on the screen.
-admin_username specifies the user name under which the
issuer wishes to perform the command. See
section 4.3 in the Reference Manual for
more details. -password_for_admin
specifies the issuer's password. If
provided here, the password is visible on
the screen. If the issuer does not
provide it, it will be prompted for and
not be visible on the screen. See section
4.3 in the Reference Manual for more
details. -cell
specifies the cell in which to run the
command, if not the local cell. See
section 4.3 in the Reference Manual for
more details. -servers
specifies the database server machine(s)
with which to establish a connection. See
section 4.3 in the Reference Manual for
more details. -noauth
establishes an unauthenticated connection
between the Authentication Servers and
issuer, whom they assign the unprivileged
identity anonymous rather than attempting
mutual authentication. See section 4.3 in
the Reference Manual for more details.
-help
prints the online help for this command.
Do not provide any other arguments or
flags with this one. See section 4.3 in
the Reference Manual for more details.
EXAMPLE
The following shows the prompts that appear when someone
authenticated as admin creates an Authentication Database
entry for the user smith, and does not specify smith's
initial password on the command line. The passwords typed
at the prompts do not echo visibly.
% kas cr smith Password for admin: initial_password:
Verifying, please re-enter initial_password:
PRIVILEGE REQUIRED
Issuer must have the ADMIN flag set in his or her
Authentication Database entry.
MORE INFORMATION
kas examine

View File

@ -1,88 +0,0 @@
kas debuginfo AFS Commands kas debuginfo
NAME
kas debuginfo -- produce debugging trace for the
Authentication Server.
kas debuginfo [-hostname <authentication server host name>]
[-admin_username <admin principal to use for
authentication>]
[-password_for_admin <admin password>] [-cell <cell name>]
+
[-servers <explicit list of authentication servers> ]
[-noauth]
[-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
kas deb [-ho <authentication server host name>]
[-a <admin principal to use for authentication>]
[-p <admin password>] [-c <cell name>]
+
[-s <explicit list of authentication servers> ] [-n] [-he]
DESCRIPTION
Displays information on the standard output device (stdout)
which is helpful in debugging the Authentication Server.
This information is useful only for someone familiar with
the implementation of the Authentication Server and the
internal structure of the Authentication Database. Most
system administrators will not find it helpful.
ARGUMENTS
-hostname names the database server machine for
which to display debugging information
about the Authentication Server instance
it is running.
-admin_username specifies the user name under which the
issuer wishes to perform the command. See
section 4.3 in the Reference Manual for
more details. -password_for_admin
specifies the issuer's password. If
provided here, the password is visible on
the screen. If the issuer does not
provide it, it will be prompted for and
not be visible on the screen. See section
4.3 in the Reference Manual for more
details. -cell
specifies the cell in which to run the
command, if not the local cell. See
section 4.3 in the Reference Manual for
more details. -servers
specifies the database server machine(s)
with which to establish a connection. See
section 4.3 in the Reference Manual for
more details. -noauth
establishes an unauthenticated connection
between the Authentication Servers and
issuer, whom they assign the unprivileged
identity anonymous rather than attempting
mutual authentication. See section 4.3 in
the Reference Manual for more details.
-help
prints the online help for this command.
Do not provide any other arguments or
flags with this one. See section 4.3 in
the Reference Manual for more details.
PRIVILEGE REQUIRED
None. A password will be prompted for unless the -noauth
flag is provided. The issuer must type some character
string at the prompt, but even providing the wrong one does
not prevent the command from being executed, despite
possible error messages.
MORE INFORMATION
kas statistics

View File

@ -1,97 +0,0 @@
kas delete AFS Commands kas delete
NAME
kas delete -- delete entry from the Authentication
Database.
kas delete -name <name of user>
[-admin_username <admin principal to use for
authentication>]
[-password_for_admin <admin password>] [-cell <cell name>]
[-servers <explicit list of authentication
+
servers> ] [-noauth]
[-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
kas del -na <name> [-a <admin principal to use for
authentication>]
[-p <admin password>] [-c <cell name>]
+
[-s <explicit list of authentication servers> ] [-no] [-h]
kas rm -na <name> [-a <admin principal to use for
authentication>]
[-p <admin password>] [-c <cell name>]
+
[-s <explicit list of authentication servers> ] [-no] [-h]
DESCRIPTION
Removes the entry name of user from the Authentication
Database. If name of user is a user, he or she becomes
unable to log in. If name of user is a server, it becomes
unreachable, because the TGS can no longer has anything with
which to seal tickets for the server.
ARGUMENTS
-name specifies the name of the Database entry
to delete
-admin_username specifies the user name under which the
issuer wishes to perform the command. See
section 4.3 in the Reference Manual for
more details. -password_for_admin
specifies the issuer's password. If
provided here, the password is visible on
the screen. If the issuer does not
provide it, it will be prompted for and
not be visible on the screen. See section
4.3 in the Reference Manual for more
details.
-cell specifies the cell in which to run the
command, if not the local cell. See
section 4.3 in the Reference Manual for
more details. -servers
specifies the database server machine(s)
with which to establish a connection. See
section 4.3 in the Reference Manual for
more details. -noauth
establishes an unauthenticated connection
between the Authentication Servers and
issuer, whom they assign the unprivileged
identity anonymous rather than attempting
mutual authentication. See section 4.3 in
the Reference Manual for more details.
-help
prints the online help for this command.
Do not provide any other arguments or
flags with this one. See section 4.3 in
the Reference Manual for more details.
EXAMPLE
In the following the issuer admin enters interactive mode in
order to make it more convenient to delete three accounts at
once. The password typed at the prompt does not echo
visibly.
% kas Password for admin: ka> del smith ka> del pat ka>
del terry
PRIVILEGE REQUIRED
Issuer must have the ADMIN flag set in his or her
Authentication Database entry.
MORE INFORMATION

View File

@ -1,220 +0,0 @@
kas examine AFS Commands kas examine
NAME
kas examine -- display information from an Authentication
Database entry.
kas examine -name <name of user>
[-admin_username <admin principal to use for
authentication>]
[-password_for_admin <admin password>] [-cell <cell name>]
[-servers <explicit list of authentication
+
servers> ] [-noauth]
[-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
kas e -na <name of user> [-a <admin principal to use for
authentication>]
[-p <admin password>] [-c <cell name>]
+
[-s <explicit list of authentication servers> ] [-no] [-h]
DESCRIPTION
Formats and displays information from the Authentication
Database entry for name. See the OUTPUT section for
details.
ARGUMENTS
-name specifies the Database entry from which to
display information.
-admin_username specifies the user name under which the
issuer wishes to perform the command. If
the issuer does not provide it, the
current identity is used. See section 4.3
in the Reference Manual for more details.
-password_for_admin
specifies the issuer's password. If
provided here, the password is visible on
the screen. If the issuer does not
provide it, it will be prompted for and
not be visible on the screen. See section
4.3 in the Reference Manual for more
details. -cell
specifies the cell in which to run the
command, if not the local cell. See
section 4.3 in the Reference Manual for
more details. -servers
specifies the database server machine(s)
with which to establish a connection. See
section 4.3 in the Reference Manual for
more details. -noauth
establishes an unauthenticated connection
between the Authentication Servers and
issuer, whom they assign the unprivileged
identity anonymous rather than attempting
mutual authentication. See section 4.3 in
the Reference Manual for more details.
-help
prints the online help for this command.
Do not provide any other arguments or
flags with this one. See section 4.3 in
the Reference Manual for more details.
OUTPUT
The output reports, in this order:
- the name of the entry
- one or more status flags, which will only appear
if a system administrator has used the
kas setfields command to change a flag from its
default value. A plus sign (+) will separate the
flags if more than one appears. The non-default
values which may appear, and their meanings, are:
* ADMIN. the user is allowed to issue
privileged kas commands (Default: NOADMIN.)
* NOTGS. the Ticket Granting Service will
refuse to issue tickets to the user (Default:
TGS.)
* NOSEAL. the Ticket Granting Service cannot
use the contents of this entry's key field as
an encryption key (Default: SEAL.)
* NOCPW. the user or server cannot change
his/her/its own password or key (Default:
CPW.)
- the word "key" followed by the key version number
in parentheses.
The octal key itself appears only if authorization
checking is disabled on the database server
machine to which the kas examine command is
directed with the -servers argument (see the
EXAMPLES section). The reasoning behind this
requirement is two-fold. First, it implies that
only someone authorized to issue the bos setauth
command or with "root" access to the database
server machine's local disk is able to see actual
keys from the Authentication Database. Second, it
makes it clear that the system is in a compromised
state of security while keys are being displayed
on the screen. Both turning off authorization
checking and displaying keys on a screen are
serious security risks.
In the normal cases when authorization checking is
enabled on the database server machine, a
"checksum" appears instead of the key. This is a
decimal number derived by encrypting a constant
with the key. In the case of the "afs" key, this
number can be compared to the checksum with the
corresponding key version number in the output of
the bos listkeys command.
- the date that the user changed his/her own
password, indicated as "last cpw" (which stands
for "last change of password")
- the date on which the entry expires. If this is a
user entry, the user will be unable to
authenticate with the Authentication Server after
this date.
- the maximum length of time that tickets issued for
this entry may be valid
- the date of the last modification to the entry,
indicated as "last mod," and the user name of the
person who issued the modifying command. Password
changes made by the user himself/herself are
recorded as "last cpw" instead.
EXAMPLES
In each of the examples, the password typed at the prompt
does not echo visibly.
The following shows the privileged user smith examining her
own Authentication Database entry. Note the ADMIN flag,
which shows that smith is privileged.
% kas e smith
Password for smith:
User data for smith (ADMIN)
key (0) cksum is 3414844392, last cpw: Wed Jan 3 16:05:44
entry expires on never. Max ticket lifetime 100.00 hours.
last mod on Thu Dec 21 08:22:29 1989 by admin
In the following the regular user terry examines her own
entry and tries to examine pat's.
% kas
Password for terry:
ka> ex terry
User data for terry
key (0) cksum is 529538018, last cpw: Fri Jan 19 9
entry expires on never. Max ticket lifetime 100.00
last mod on Thu Dec 21 08:43:29 1989 by admin
ka> ex pat
kas:examine: caller not authorized getting informati
In the following an administrator logged in as the
privileged user admin uses bos setauth to turn off
authorization checking on the database server machine
db1.transarc.com so that he can look at the key in the afs
entry. He enters interactive mode to open a connection with
the Authentication Server on db1.transarc.com only and uses
the -noauth flag to prevent that server from attempting to
authenticate him.
% bos setauth db1.transarc.com off
% kas i -servers db1.transarc.com -noauth
ka> examine afs -servers db1.transarc.com
User data for afs
key (12): \357\253\304\352a\236\253\352, last cpw:
entry expires on never. Max ticket lifetime 100.00
last mod on Thu Jan 11 14:53:29 1990 by admin
PRIVILEGE REQUIRED
A user may examine his or her own entry. To examine others'
entries, the issuer must have the ADMIN flag set in his or
her Authentication Database entry.
To look at actual keys, authorization checking must be
disabled on the database server machine with bos setauth,
which implies being listed in /usr/afs/etc/UserList; it is
not necessary to have the ADMIN flag in addition.
MORE INFORMATION
bos listkeys
bos setauth
kas setfields

View File

@ -1,57 +0,0 @@
kas forgetticket AFS Commands kas forgetticket
NAME
kas forgetticket -- discard all tickets for the issuer.
kas forgetticket [-name <name of server>] [-all] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
kas f [-h]
DESCRIPTION
Discards all tickets that the Authentication Server has
registered for the issuer. This includes the AFS server
ticket from each cell in which the user has authenticated,
and any tickets that the user may have acquired during this
kas session (either by virtue of entering the session or
using kas getticket).
ARGUMENTS
-name specifies which ticket should be discarded. Provide
this argument OR the -all flag.
Note:This argument is not currently implemented: all
tickets are discarded no matter which ticket which
ticket name is specified here.
-all indicates that all tickets should be discarded.
Provide this flag OR the -name argument. In the
current implementation, this flag is more sensible
because it matches what actually happens no matter
which option the issuer chooses.
-help prints the online help for this command. Do not
provide any other arguments or flags with this one.
See section 4.3 in the Reference Manual for more
details.
EXAMPLES
Both of the following discard all tickets for the issuer.
% kas forgetticket -all % kas f
PRIVILEGE REQUIRED
None. There is no prompt for a password, and the issuer
does not have to have the ADMIN flag set in his or her
Database entry. The deletion can affect only the issuer
anyway.
MORE INFORMATION

View File

@ -1,80 +0,0 @@
kas getpassword AFS Commands kas getpassword
NAME
kas getpassword -- display octal key from an Authentication
Database entry.
kas getpassword -name <name of user> [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
kas getp -n <name of user> [-h]
DESCRIPTION
Prints out the contents (an octal-format encryption key) of
the key field for the Database entry name of user.
WARNING
This command works only if the Authentication Server has
been compiled with a special flag; this is normally done
only for cells in the process of converting from use of AFS
2.0-style authentication to AFS 3.0 authentication.
Moreover, this command does not work if issued on an AFS
client. The issuer must be logged into a machine running
the specially-compiled Authentication Server (a database
server machine or other machine running an isolated
Authentication Server).
The recommended way to examine the octal form of keys is
with kas examine when authorization checking is disabled.
That command shows a "checksum" when authorization checking
is enabled, which may be suitable for some purposes.
Even when the other conditions are met, this command does
not work for entries where the name includes a period (these
entries are generally for the Authentication Server's
internal use anyway).
ARGUMENTS
-name names the entry from which the key field should be
printed out.
-help prints the online help for this command. Do not
provide any other arguments or flags with this one.
See section 4.3 in the Reference Manual for more
details.
OUTPUT
The output simply prints the key after a "Key:" header. It
does not report the key version number, but that is
available from kas examine.
EXAMPLE
The following shows a user using this command to examine
afs's password.
% kas getp afs
Key: \020\354\315\310\313\023W\370
PRIVILEGE REQUIRED
None. There is no prompt for a password, and the issuer
does not have to have the ADMIN flag set in his or her
Database entry. It is assumed that any machine running the
Authentication Server is secured by having only a limited
number of people in its local /etc/passwd file.
MORE INFORMATION
kas examine

View File

@ -1,102 +0,0 @@
kas getrandomkey AFS Commands kas getrandomkey
NAME
kas getrandomkey -- generate an encryption key at random.
kas getrandomkey
[-admin_username <admin principal to use for
authentication>]
[-password_for_admin <admin password>] [-cell <cell name>]
+
[-servers <explicit list of authentication servers> ]
[-noauth]
[-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
kas getr [-a <admin principal to use for authentication>]
[-p <admin password>] [-c <cell name>]
+
[-s <explicit list of authentication servers> ] [-n] [-h]
DESCRIPTION
Returns a key generated at random (i.e., not derived from
any known password). This is useful mainly for testing and
debugging the Authentication Server.
WARNINGS
The output of this command is visible on the issuer's
screen, making it a potential security risk to use the key
in an actual Authentication Database entry (such as the
"afs" entry).
If the -noauth flag is used, the connection to the
Authentication Server is not authenticated, so the randomly
generated key crosses the network unencrypted. The
potential security risk in using the key as an actual
encryption key is even greater in this case.
ARGUMENTS
-admin_username specifies the user name under which the
issuer wishes to perform the command. If
the issuer does not provide it, the
current identity is used. See section 4.3
in the Reference Manual for more details.
-password_for_admin
specifies the issuer's password. If
provided here, the password is visible on
the screen. If the issuer does not
provide it, it will be prompted for and
not be visible on the screen. See section
4.3 in the Reference Manual for more
details. -cell
specifies the cell in which to run the
command, if not the local cell. See
section 4.3 in the Reference Manual for
more details. -servers
specifies the database server machine(s)
with which to establish a connection. See
section 4.3 in the Reference Manual for
more details. -noauth
establishes an unauthenticated connection
between the Authentication Servers and
issuer, whom they assign the unprivileged
identity anonymous rather than attempting
mutual authentication. See section 4.3 in
the Reference Manual for more details.
-help
prints the online help for this command.
Do not provide any other arguments or
flags with this one. See section 4.3 in
the Reference Manual for more details.
OUTPUT
Following a "Key:" header, the output displays the octal and
hexadecimal forms of the key.
EXAMPLE
The following shows terry issuing this command.
% kas getr
Password for terry:
Key: \230\206\370v1\334\373\346 (98.86.f8.76 31.dc.f
PRIVILEGE REQUIRED
None, but the correct password must be provided at the
prompt if the key is to be encrypted while crossing the
network. If the -noauth flag is used, a password is not
prompted for.
MORE INFORMATION

View File

@ -1,101 +0,0 @@
kas getticket AFS Commands kas getticket
NAME
kas getticket -- create a ticket valid for the specified
server.
kas getticket -name <name of server>
[-admin_username <admin principal to use for
authentication>]
[-password_for_admin <admin password>] [-cell <cell name>]
+
[-servers <explicit list of authentication servers> ]
[-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
kas gett -na <name of server> [-a <admin principal to use
for authentication>]
[-p <admin password>] [-c <cell name>]
+
[-s <explicit list of authentication servers> ] [-no] [-h]
DESCRIPTION
Instructs the Ticket Granting Service to create a ticket for
the issuer of the command, which he or she can use for
secured communication with name of server. The ticket is
sealed with the contents of the key field in name of
server's Database entry.
This command is functionally similar to klog. It is useful
primarily for debugging purposes, and is not recommended as
the normal way to obtain tickets. Also, while it is
possible to make name of server an individual user as well
as a server process, such a ticket is useless because the
user's workstation will not know what to do with it.
ARGUMENTS
-name specifies the Database entry from which to
use the key. It may include a cell
specification (example:
kas getticket afs@transarc.com
gets a ticket good for all AFS servers in
the Transarc Corporation cell).
-admin_username specifies the user name under which the
issuer wishes to perform the command. If
the issuer does not provide it, the
current identity is used. See section 4.3
in the Reference Manual for more details.
-password_for_admin
specifies the issuer's password. If
provided here, the password is visible on
the screen. If the issuer does not
provide it, it will be prompted for and
not be visible on the screen. See section
4.3 in the Reference Manual for more
details. -cell
specifies the cell in which to run the
command, if not the local cell. See
section 4.3 in the Reference Manual for
more details. -servers
specifies the database server machine(s)
with which to establish a connection. See
section 4.3 in the Reference Manual for
more details. -noauth
establishes an unauthenticated connection
between the Authentication Servers and
issuer, whom they assign the unprivileged
identity anonymous rather than attempting
mutual authentication. See section 4.3 in
the Reference Manual for more details.
-help
prints the online help for this command.
Do not provide any other arguments or
flags with this one. See section 4.3 in
the Reference Manual for more details.
EXAMPLE
The following shows the regular user terry obtaining a
ticket for the AFS server processes in her home cell.
% kas gett afs Password for terry:
PRIVILEGE REQUIRED
None. However, the issuer must provide his or her correct
password.
MORE INFORMATION

View File

@ -1,82 +0,0 @@
kas help AFS Commands kas help
NAME
kas help -- show syntax of specified kas command(s) or list
functional description for all of them.
+
kas help [-topic <help string> ] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
+
kas h [-t <help string> ] [-h]
DESCRIPTION
Displays the first line (name and short description) of
every kas command's help entry, if no help string is
provided. For each operation code specified with -topic, it
outputs the entire help entry. See the Output section
below.
ARGUMENTS
-topic
specifies the operation code(s) for which syntax is to
be provided. If the issuer omits it, the output
instead provides a short description of all kas
commands.
-help prints the online help for this command. Do not
provide any other arguments or flags with this one.
See section 4.3 in the Reference Manual for more
details.
OUTPUT
The online help entry for each kas command consists of two
or three lines:
- The first line names the command and briefly
describes what it does
- If the command has aliases, they will appear on
the next line
- The final line, which begins with "Usage:", lists
the command's arguments and flags in the
prescribed order. Online help entries use the
same symbols (brackets, etc.) as the command
definitions in this manual. For an explanation of
their meaning, see page v of the introductory
About This Manual chapter.
EXAMPLE
The following displays the online help entry for the
kas setpassword command.
% kas help setpassword
kas setpassword: set a user's password
aliases: sp
Usage: kas setpassword -name <name of user> [-new_passwo
<new password>] [-kvno <key version number>]
[-admin_username <admin principal to use for authenticat
[-password_for_admin <password>] [-cell <cell name>]
+
[-servers <explicit list of authentication servers> ] [-
PRIVILEGE REQUIRED
None. No password will be prompted for.
MORE INFORMATION
kas apropos

View File

@ -1,168 +0,0 @@
kas interactive AFS Commands kas interactive
NAME
kas interactive -- enter interactive mode for
Authentication Server.
kas interactive
[-admin_username <admin principal to use for
authentication>]
[-password_for_admin <admin password>] [-cell <cell name>]
[-servers <explicit list of authentication
+
servers> ] [-noauth]
[-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
kas i [-a <admin principal to use for authentication>] [-p
<admin password>]
[-c <cell name>] [-s <explicit list of authentication
+
servers> ]
[-n] [-h]
DESCRIPTION
Enters interactive mode. By establishing an authenticated
connection in this way, the issuer will not have to type his
or her password at each command as would be necessary in
regular mode. The authenticated connection lasts for one
hour unless the maximum ticket lifetime for the issuer or
the Authentication Server is shorter.
It is also possible to establish an unauthenticated
connection under the identity anonymous by using the -noauth
flag. During normal operation, there is no point to doing
so, because the Authentication Server still does
authorization checking and will not allow anonymous, who is
unprivileged by definition, to perform privileged commands.
A possible situation in which an issuer might wish to enter
interactive mode unauthenticated is if he or she knows that
attempting to authenticate will cause a problem, but wants
to list some unprivileged information. Attempting to
authenticate could cause a problem, for instance, if the
Authentication Server no longer knows the key used to seal
the ticket the user has (perhaps it is no longer in
/usr/afs/etc/KeyFile).
The other repercussions of entering interactive mode are:
- A "ka>" prompt replaces the issuer's regular
prompt
- It is no longer necessary or legal to type kas at
the beginning of a command. Type the operation
code as the first part of the command
- It is not useful to include the common arguments
described in section 4.3 in the Reference Manual :
-admin_username, -password_for_admin, -cell,
-servers. They are ignored, because the variables
corresponding to them are set as the issuer enters
interactive mode, and cannot be changed without
leaving interactive mode. It is legal to provide
the -help flag.
There are two additional ways to enter interactive mode:
1. Type kas without any operation code. By default,
the command interpreter establishes a connection
with all of the Authentication Servers in the
local cell. They attempt to authenticate the
user logged into the machine from which the
command is issued, based on the password the
issuer provides at the prompt. The issuer may
specify an alternate identity, password, cell
name and/or list of Authentication Servers by
using the first four common arguments described
in section 4.3 in the Reference Manual . Type
kas followed by a user name and cell name,
separated by an "@" sign (example: kas
smith@transarc.com). The Authentication Server
attempts to authenticate the specified user in
the specified cell, and prompts for his or her
password in the specified cell. This method is
most useful when the issuer wishes to enter
interactive mode with a different identity than
the one under which he or she is currently logged
on.
ARGUMENTS
-admin_username specifies the user name under which the
issuer wishes to perform the command. If
the issuer does not provide it, the
current identity is used. See section 4.3
in the Reference Manual for more details.
-password_for_admin
specifies the issuer's password. If
provided here, the password is visible on
the screen. If the issuer does not
provide it, it will be prompted for and
not be visible on the screen. See section
4.3 in the Reference Manual for more
details. -cell
specifies the cell in which to run the
command, if not the local cell. See
section 4.3 in the Reference Manual for
more details. -servers
specifies the database server machine(s)
with which to establish a connection. See
section 4.3 in the Reference Manual for
more details. -noauth
establishes an unauthenticated connection
between the Authentication Servers and
issuer, whom they assign the unprivileged
identity anonymous rather than attempting
mutual authentication. Using this
argument on this command is useful only
when authorization checking is disabled on
the file server machine (during the
installation of a file server machine or
when bos setauth has been used during
other unusual circumstances). Under
normal authorization checking
circumstances, the Authentication Servers
will allow only authorized (privileged)
users to issue commands that change the
status of a server or configuration file,
even if the -noauth flag was used when
entering interactive mode. See section
4.3 in the Reference Manual for more
details. -help
prints the online help for this command.
Do not provide any other arguments or
flags with this one. See section 4.3 in
the Reference Manual for more details.
EXAMPLE
The following shows a user entering interactive mode as the
privileged user admin.
% kas i admin Password for admin: ka>
PRIVILEGE REQUIRED
None. A password will be prompted for, and something must
be typed in response, but the issuer needs to provide the
correct password only if he or she wishes to issue
privileged commands while in interactive mode. If he or she
provides an wrong character string, the Authentication
Server assigns the unprivileged identity anonymous.
MORE INFORMATION
(kas) noauthentication (kas) quit

View File

@ -1,88 +0,0 @@
kas list AFS Commands kas list
NAME
kas list -- list all entries in the Authentication
Database.
kas list [-admin_username <admin principal to use for
authentication>]
[-password_for_admin <admin password>] [-cell <cell name>]
[-servers <explicit list of authentication
+
servers> ]
[-noauth] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
kas ls [-a <admin principal to use for authentication>]
[-p <admin password>] [-c <cell name>]
+
[-s <explicit list of authentication servers> ] [-n] [-h]
DESCRIPTION
Lists the names of all the entries (server and individual
user) in the Authentication Database.
ARGUMENTS
-admin_username specifies the user name under which the
issuer wishes to perform the command. If
the issuer does not provide it, the
current identity is used. See section 4.3
in the Reference Manual for more details.
-password_for_admin
specifies the issuer's password. Note
that provided here the password is visible
on the screen. If the issuer does not
provide it, it will be prompted for and
not be visible on the screen. See section
4.3 in the Reference Manual for more
details. -cell
specifies the cell in which to run the
command, if not the local cell. See
section 4.3 in the Reference Manual for
more details. -servers
specifies the database server machine(s)
with which to establish a connection. See
section 4.3 in the Reference Manual for
more details. -noauth
establishes an unauthenticated connection
between the Authentication Servers and
issuer, whom they assign the unprivileged
identity anonymous rather than attempting
mutual authentication. See section 4.3 in
the Reference Manual for more details.
-help
prints the online help for this command.
Do not provide any other arguments or
flags with this one. See section 4.3 in
the Reference Manual for more details.
OUTPUT
Each entry appears on its own line. Some entries have been
created by the Authentication Server for its own internal
use (for instance, AuthServer.Admin).
EXAMPLE
The following example is for the cell small.edu, which has
five users in it (the other entries are for the
Authentication Server's internal use).
% kas list AuthServer.Admin krbtgt.SMALL.EDU afs admin
pat smith jones terry
PRIVILEGE REQUIRED
Issuer must have the ADMIN flag set in his or her
Authentication Database entry.
MORE INFORMATION

View File

@ -1,80 +0,0 @@
kas listtickets AFS Commands kas listtickets
NAME
kas listtickets -- list all tickets (tokens) for issuer.
kas listtickets [-name <name of server>] [-long] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
kas listt [-n <name of server>] [-l] [-h]
DESCRIPTION
Lists all the tickets (tokens) for the issuer, if no
arguments are provided. If name of server is provided,
lists only the ticket good for that server process ("afs" is
the most common server). If the -long switch is provided,
the output shows octal strings representing the session key
and ticket itself.
ARGUMENTS
-name specifies the server name for which to list the
ticket.
-long specifies that the output should display the octal
number strings constituting the session key and
ticket, along with other information (see the OUTPUT
section). The session key is the one also found
within the ticket.
-help prints the online help for this command. Do not
provide any other arguments or flags with this one.
See section 4.3 in the Reference Manual for more
details.
OUTPUT
The output reports for whom the ticket is valid and the
ticket's expiration date. If no cell specification appears,
then the ticket is valid in the local cell.
If the -long flag is used, the output displays the octal
numbers making up the session key and ticket, along with the
key version number and the number of bytes in the ticket
(this should always be 56). If a "[>> POSTDATED <<]" marker
appears where the expiration date normally does, the ticket
does not become valid until the indicated time. (Only
internal calls can create a postdated ticket; there is no
standard interface that allows users to do this.)
EXAMPLES
The following two examples are for a user with AFS UID 1020
in the transarc.com cell and AFS UID 35 in the
test.transarc.com cell. He is working on a machine in the
former cell and is authenticated in both cells.
% kas listtickets
User's (AFS ID 1020) tokens for afs [Expires Wed Jan
User's (AFS ID 35@test.transarc.com) tokens for afs@
[Expires Wed Jan 3 13:54:26 1990]
% kas listtickets afs -l
User's (AFS ID 1020) tokens for afs [Expires Wed Jan
SessionKey: \375\205\351\227\032\310\263\013
Ticket: (kvno = 0, len = 56): \033\005\221S\203d\312
PRIVILEGE REQUIRED
None. A password is not prompted for.
MORE INFORMATION

View File

@ -1,62 +0,0 @@
kas noauthentication AFS Commands kas noauthentication
NAME
kas noauthentication -- discard authenticated identity in
interactive mode.
(kas) noauthentication [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
(kas) n [-h]
DESCRIPTION
Instructs the Authentication Server to close the (presumably
authenticated) connection established when the issuer
entered interactive mode. It opens a new unauthenticated
connection, assigning the issuer the unprivileged identity
anonymous. It does not actually flush the user's tokens
from the Cache Manager's memory (as unlog or
kas forgetticket do).
This command is useful only in interactive mode, in which
case the issuer should omit the kas command suite name. If
issued in non-interactive mode, it has no effect.
Like the -noauth flag available on a few kas commands (e.g.,
kas interactive) this command is only useful in unusual
circumstances. During normal operation, there is no point
to throwing away an authenticated identity (becoming
anonymous). The Authentication Server still does
authorization checking and will not allow anonymous, who is
unprivileged by definition, to perform privileged commands.
ARGUMENTS
-help prints the online help for this command. Do
not provide any other arguments or flags
with this one. See section 4.3 in the
Reference Manual for more details.
EXAMPLE
The following discards the authentication information with
which the user entered interactive mode.
kas> no
PRIVILEGE REQUIRED
None. Because this command may be issued only while in
interactive mode, no password is prompted for.
MORE INFORMATION
kas interactive

View File

@ -1,46 +0,0 @@
kas quit AFS Commands kas quit
NAME
kas quit -- leave interactive mode.
(kas) quit [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
(kas) q [-h]
DESCRIPTION
Leaves interactive mode. This command terminates the
authenticated connection, so the Authentication Server will
again require a password when another kas command is issued.
This command is useful only in interactive mode, in which
case the issuer should omit the kas command suite name. If
issued in non-interactive mode, it has no effect.
ARGUMENTS
-help prints the online help for this command. Do
not provide any other arguments or flags
with this one. See section 4.3 in the
Reference Manual for more details.
EXAMPLE
The following shows the return of the normal command shell
prompt when the issuer leaves interactive mode.
ka> quit %
PRIVILEGE REQUIRED
None. Because this command may be issued only while in
interactive mode, no password is prompted for.
MORE INFORMATION
kas interactive

View File

@ -1,190 +0,0 @@
kas setfields AFS Commands kas setfields
NAME
kas setfields -- set various flags, expiration date and
ticket lifetime for Authentication
Database entry.
kas setfields -name <name of user>
[-flags <hex flag value or flag name expression>]
[-expiration <date of account expiration>]
[-lifetime <maximum ticket lifetime>]
[-admin_username <admin principal to use for
authentication>]
[-password_for_admin <admin password>] [-cell <cell name>]
[-servers <explicit list of authentication
+
servers> ]
[-noauth] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
kas sf -na <name of user> [-f <hex flag value or flag name
expression>]
[-e <date of account expiration>]
[-l <maximum ticket lifetime>]
[-ad <admin principal to use for authentication>]
[-p <admin password>] [-c <cell name>]
+
[-s <explicit list of authentication servers> ] [-no] [-h]
DESCRIPTION
Changes the Authentication Database entry for name of user
in the manner specified by the various optional arguments,
which may occur singly or in combination. See the ARGUMENTS
section for a description of the values that may be set.
The results of this command are visible in the output of the
kas examine command.
ARGUMENTS
-name specifies the entry to be affected.
-flags sets any one of four toggling flags in name's
entry. The default is for none of the flags to be
set. A value of 0 returns all four flags to their
defaults. The following explains the four
non-default values to set, their meanings and the
associated defaults:
- ADMIN (Hex equivalent: 0x004). The name of
user is allowed to issue privileged kas
commands (Default: NOADMIN).
- NOTGS (Hex equivalent: 0x008). The Ticket
Granting Service will refuse to issue tickets
to name of user (Default: TGS).
- NOSEAL (Hex equivalent: 0x020). The Ticket
Granting Service cannot use the contents of
this entry's key field as an encryption key
(Default: SEAL).
- NOCPW (Hex equivalent: 0x040). The name of
user cannot change his/her/its own password
or key (Default: CPW).
Both upper and lower-case letters are acceptable
in specifying values for the flags.
To restore the ADMIN flag to its default, specify
NOADMIN. To restore the other flags to their
defaults, omit the NO (i.e., type TGS, SEAL or
CPW).
To set more than one flag at once, connect them
with plus signs (example: NOTGS+ADMIN+CPW). To
remove all the current flag settings before
setting new ones, precede the whole list with an
equal sign (example: =NOTGS+ADMIN+CPW).
-expiration
determines when the entry itself expires, which
will render an individual user unable to log in to
the system, and a server unreachable. The default
is never.
There are three types of legal values:
- never, which allows the issuer to return
the expiration time to its default after
having set it to a date.
- mm/dd/yy specifies 12:00 a.m. on the
indicated date (month/day/year).
Examples : 1/23/90, 10/7/89.
- "mm/dd/yy hh:mm" specifies a time
"hh:mm" (hour:minutes) on the indicated
date (month/day/year). The time should
be in 24-hour format (for example, 20:30
is 8:30 p.m.) Date format is the same
as for a date alone. Surround the
entire instance with quotes because it
contains a space. Examples : "1/23/90
22:30", "10/7/89 3:45".
Legal values for yy run from 00 to 37, which are
interpreted as the years 2000-2037, and from 70 to
99 which are interpreted as 1970-1999. (This
restriction is because the Authentication Server
converts the date into the number of seconds
elapsed since 1 February 1970, to comply with the
standard UNIX date representation; dates later
than sometime in February 2038 exceed the
representation's capacity.)
-lifetime specifies the upper limit on the validity lifetime
that the TGS may stamp on a ticket issued to an
individual or for a server. That is, if name of
user is an individual, this value is the maximum
lifetime of a ticket issued to the user. If name
of user is a server such as "afs," this value is
the maximum lifetime of a ticket that the TGS
issues to clients in order to contact the server.
To specify a number of hours, include a colon in
the number (example: 1:00 means one hour).
Otherwise, the number is assumed to be in seconds
(so 3600 means one hour). If this argument is not
provided, the default setting is 100:00 hours
(360000 seconds).
-admin_username
specifies the user name under which the issuer
wishes to perform the command. If the issuer does
not provide it, the current identity is used. See
section 4.3 in the Reference Manual for more
details. -password_for_admin
specifies the issuer's password. If provided
here, the password is visible on the screen. If
the issuer does not provide it, it will be
prompted for and not be visible on the screen.
See section 4.3 in the Reference Manual for more
details. -cell
specifies the cell in which to run the command, if
not the local cell. See section 4.3 in the
Reference Manual for more details. -servers
specifies the database server machine(s) with
which to establish a connection. See section 4.3
in the Reference Manual for more details. -noauth
establishes an unauthenticated connection between
the Authentication Servers and issuer, whom they
assign the unprivileged identity anonymous rather
than attempting mutual authentication. See
section 4.3 in the Reference Manual for more
details.
-help prints the online help for this command. Do not
provide any other arguments or flags with this
one. See section 4.3 in the Reference Manual for
more details.
EXAMPLE
In the following, admin grants administrative privilege to
smith, and makes smith's entry expire at midnight on 31
December 1995.
% kas sf smith ADMIN 12/31/95 Password for admin:
PRIVILEGE REQUIRED
Issuer must have the ADMIN flag set in his or her
Authentication Database entry.
MORE INFORMATION
kas examine

View File

@ -1,159 +0,0 @@
kas setkey AFS Commands kas setkey
NAME
kas setkey -- insert octal key directly into key field of
Database entry.
kas setkey -name <name of user> -new_key <eight byte new
key> [-kvno <keyversion number>]
[-admin_username <admin principal to use for
authentication>]
[-password_for_admin <admin password>] [-cell <cell name>]
+
[-servers <explicit list of authentication servers> ]
[-noauth] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
kas setk -na <name of user> -ne <eight byte new key>
[-k <key version number>]
[-a <admin principal to use for authentication>] [-p <admin
password>]
[-c <cell name>] [-s <explicit list of authentication
+
servers> ] [-no] [-h]
DESCRIPTION
Accepts the octal number string eight byte new key, places
it in the key field of the Database entry for name of user
and marks it with key version number key version number.
This command makes most sense when name of user is a server
process (such as "afs") rather than an individual user, as
discussed in the Warning section. For individual users, use
the kas setpassword command instead.
When changing the key in a server entry, remember to alter
the /usr/afs/etc/KeyFile with the bos addkey command and use
the same key version number in both places.
WARNING
Using this command to change user passwords is needlessly
complicating, for the following reason. The Authentication
Database stores both user passwords and server keys as octal
strings, never as character strings. When a character
string is provided in the kas setpassword command (see
above), the Authentication Server calls an algorithm to
convert the string into an octal-form encryption key, then
stores the key in the key field of the appropriate entry.
The kas setkey command (this one) bypasses the conversion
algorithm, entering eight byte new key directly into the key
field. If an octal string is simply invented, there is no
way to discover which character string it corresponds to.
To use this command to change a user password, the issuer
would need to translate the password character string into
an octal key using kas stringtokey and specify the
resulting string as eight byte new key here. Otherwise, the
user would not know what password to type at login.
The main use for this command is to set server encryption
keys, if the system administrator first executes the bos
addkey command to add a new key to /usr/afs/etc/KeyFile.
That command accepts only strings and converts them into
octal keys, just like kas setpassword, but the output from
the bos listkeys command will then reveal the converted
octal form of the string, which is the eight byte new key
that should be specified here.
ARGUMENTS
-name specifies the entry for which to replace
the key field.
-new_key specifies a string of eight bytes, each
consisting of EITHER a three-digit octal
number preceded by a backslash OR a single
ASCII character. The issuer must provide
it on the command line where it is
visible, as there is no prompt for it.
Outside interactive mode, surround
octalkey with single quotes, or the shell
will throw away the backslashes. When in
interactive mode, do not include the
single quotes.
-kvno specifies the key version number
associated with the new key. It must be
an integer in the range 0 through 255. In
addition, 999 is reserved for the "bcrypt"
key used in AFS 2.0 authentication. If
the issuer does not provide this argument,
it defaults to 0, which is probably not
desirable for server keys.
-admin_username specifies the user name under which the
issuer wishes to perform the command. If
the issuer does not provide it, the
current identity is used. See section 4.3
in the Reference Manual for more details.
-password_for_admin
specifies the issuer's password. If
provided here, the password is visible on
the screen. If the issuer does not
provide it, it will be prompted for and
not be visible on the screen. See section
4.3 in the Reference Manual for more
details. -cell
specifies the cell in which to run the
command, if not the local cell. See
section 4.3 in the Reference Manual for
more details. -servers
specifies the database server machine(s)
with which to establish a connection. See
section 4.3 in the Reference Manual for
more details. -noauth
establishes an unauthenticated connection
between the Authentication Servers and
issuer, whom they assign the unprivileged
identity anonymous rather than attempting
mutual authentication. See section 4.3 in
the Reference Manual for more details.
-help
prints the online help for this command.
Do not provide any other arguments or
flags with this one. See section 4.3 in
the Reference Manual for more details.
EXAMPLE
The following shows admin setting the "afs" key with key
version number 15.
% kas setk afs \222\260\334\241c\212\274W 15 Password for
admin:
PRIVILEGE REQUIRED
Individual users may use this command to change their own
keys, though this is not advised for the reasons stated in
the WARNING section. To change server encryption keys or
the key field in another user's entry, issuer must have the
ADMIN flag set in his or her Authentication Database entry.
MORE INFORMATION
bos addkey bos listkeys kas setpassword

View File

@ -1,137 +0,0 @@
kas setpassword AFS Commands kas setpassword
NAME
kas setpassword -- change key field in Database entry.
kas setpassword -name <name of user>
[-new_password <new password>]
[-kvno <key version number>]
[-admin_username <admin principal to use for
authentication>]
[-password_for_admin <admin password>] [-cell <cell name>]
[-servers <explicit list of authentication
+
servers> ]
[-noauth] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
kas sp -na <name of user> [-ne <new password>]
[-k <key version number>]
[-a <admin principal to use for authentication>]
[-p <admin password>] [-c <cell name>]
+
[-s <explicit list of authentication servers> ] [-no] [-h]
DESCRIPTION
Accepts a character string new password of unlimited length,
scrambles it into a form suitable for use as an encryption
key, and places it in the key field of name's Authentication
Database entry.
There is little reason to type new password on the command
line, where it is visible. If the issuer does not provide
the password on the command line, a
new_password:
prompt appears, followed by a second prompt requesting a
repetition of the new password. In both cases the password
does not echo visibly. The second prompt guarantees that
the issuer did not make a typing mistake when responding to
the first prompt.
When adding server keys (such as "afs"), remember to add the
new key to the /usr/afs/etc/KeyFile using the bos addkey
command and to use the same key version number there as
here. See the AFS System Administrator's Guide for
instructions.
ARGUMENTS
-name specifies the entry for which to replace
the key field.
-new_password is the character string the user will type
when logging in. It should be 8
characters or less, as some non-AFS
programs cannot handle longer passwords.
The Authentication Server scrambles it
into a string of octal numbers before
storing it in the key field.
-kvno specifies the key version number
associated with the new key. It must be
an integer between 0 and 255. In
addition, 999 is reserved for the "bcrypt"
key used in AFS 2.0 authentication. If
the issuer does not provide this argument,
it defaults to 0, which is probably not
desirable for server keys.
-admin_username specifies the user name under which the
issuer wishes to perform the command. If
the issuer does not provide it, the
current identity is used. See section 4.3
in the Reference Manual for more details.
-password_for_admin
specifies the issuer's password. If
provided here, the password is visible on
the screen. If the issuer does not
provide it, it will be prompted for and
not be visible on the screen. See section
4.3 in the Reference Manual for more
details. -cell
specifies the cell in which to run the
command, if not the local cell. See
section 4.3 in the Reference Manual for
more details. -servers
specifies the database server machine(s)
with which to establish a connection. See
section 4.3 in the Reference Manual for
more details. -noauth
establishes an unauthenticated connection
between the Authentication Servers and
issuer, whom they assign the unprivileged
identity anonymous rather than attempting
mutual authentication. See section 4.3 in
the Reference Manual for more details.
-help
prints the online help for this command.
Do not provide any other arguments or
flags with this one. See section 4.3 in
the Reference Manual for more details.
EXAMPLE
The following shows privileged user admin changing pat's
password (presumably because pat forgot the former password
or got locked out of his account in some other way.
% kas sp pat
Password for admin:
new_password:
Verifying, please re-enter new_password:
PRIVILEGE REQUIRED
An individual user may change his or her own password,
although use of the kpasswd command is recommended instead.
To change another user's password or the password (server
encryption key) for server processes such as "afs", issuer
must have the ADMIN flag set in his or her Authentication
Database entry.
MORE INFORMATION
bos addkey kas setkey

View File

@ -1,124 +0,0 @@
kas statistics AFS Commands kas statistics
NAME
kas statistics -- display statistics from one
Authentication Server process.
kas statistics
[-admin_username <admin principal to use for
authentication>]
[-password_for_admin <admin password>] [-cell <cell name>]
[-servers <explicit list of authentication
+
servers> ]
[-noauth] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
kas sta [-a <admin principal to use for authentication>]
[-p <admin password>] [-c <cell name>]
+
[-s <explicit list of authentication servers> ] [-n] [-h]
DESCRIPTION
Displays statistics from one of the cell's database server
machines. It is recommended that the issuer use -servers to
specify one machine name. Otherwise, the command
interpreter displays statistics for a machine chosen at
random from all the database server machines with which it
has established connections.
WARNING
If this command is issued in interactive mode, it is not
possible to specify a file server machine because the
-servers argument is inoperative. If the issuer is
interested in a particular file server machine, it is best
to leave interactive mode.
ARGUMENTS
-admin_username specifies the user name under which the
issuer wishes to perform the command. If
the issuer does not provide it, the current
identity is used. See section 4.3 in the
Reference Manual for more details.
-password_for_admin
specifies the issuer's password. Note that
provided here the password is visible on the
screen. If the issuer does not provide it,
it will be prompted for and not be visible
on the screen. See section 4.3 in the
Reference Manual for more details. -cell
specifies the cell in which to run the
command, if not the local cell. See section
4.3 in the Reference Manual for more
details. -servers
specifies the database server machine(s)
with which to establish a connection. It is
recommended that the issuer use this
argument and specify a single machine.
-noauth establishes an unauthenticated connection
between the Authentication Servers and
issuer, whom they assign the unprivileged
identity anonymous rather than attempting
mutual authentication. See section 4.3 in
the Reference Manual for more details.
-help
prints the online help for this command. Do
not provide any other arguments or flags
with this one. See section 4.3 in the
Reference Manual for more details.
OUTPUT
The information includes:
- server's network address number and last startup
date
- number of requests and aborted requests for
various services: authentication, ticket
granting, password setting, entry listing, etc
- number of entries with ADMIN flag
EXAMPLE
The following show the output when someone authenticated as
the privileged user admin issues this command about
fs1.transarc.com.
% kas stat -s fs1.transarc.com
56 allocs, 46 frees, 0 password changes
Hash table utilization = 0.100000%
From host c037cf05 started at Tue Mar 20 12:42:02 19
of 88 requests for Authenticate, 18 were aborted.
of 14 requests for GetTicket, 0 were aborted.
of 4 requests for CreateUser, 1 were aborted.
of 12 requests for SetFields, 4 were aborted.
of 3 requests for DeleteUser, 0 were aborted.
of 23 requests for GetEntry, 4 were aborted.
of 18 requests for ListEntry, 0 were aborted.
of 2 requests for GetStats, 1 were aborted.
of 2 requests for GetRandomKey, 0 were aborted.
Used 6.015 seconds of CPU time.
1 admin accounts
PRIVILEGE REQUIRED
Issuer must have the ADMIN flag set in his or her
Authentication Database entry.
MORE INFORMATION
kas debuginfo

View File

@ -1,70 +0,0 @@
kas stringtokey AFS Commands kas stringtokey
NAME
kas stringtokey -- convert a character string into an octal
string.
kas stringtokey -string <password string> [-cell <cell
name>] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
kas str -s <password string> [-c <cell name>] [-h]
DESCRIPTION
Converts the character string password string into an octal
string suitable for use as an encryption key. This is
useful for showing what form a given password would take in
the cell.
The algorithm that the Authentication Server uses to
generate keys combines password string with the cell's name
during the generation, so use of cell name allows the issuer
to see what a string would look like when scrambled into a
key in a certain cell.
ARGUMENTS
-string specifies the password-like character string
to be converted into a key.
-cell specifies the cell name to be used in
converting password string into a key. If
the issuer does not provide it, the default
is the cell in which the command is issued.
Provide a complete Internet-style name.
-help prints the online help for this command. Do
not provide any other arguments or flags
with this one. See section 4.3 in the
Reference Manual for more details.
OUTPUT
The output is of the form:
Converting password string in realm 'cell name yield
EXAMPLE
The following shows a user in the Transarc Corporation cell
deriving the octal key equivalent of the string "new_pswd".
% kas str new_pswd
Converting new_pswd in realm 'TRANSARC.COM' yields
key='\255\364b\354\221s\235\313'.
PRIVILEGE REQUIRED
None.
MORE INFORMATION
kas getrandomkey kas setkey

View File

@ -1,319 +0,0 @@
klog AFS Commands klog
NAME
klog -- authenticate with Authentication Server to obtain
token.
klog [-x] [-principal <user name>] [-password <user's
password>]
[-tmp] [-cell <cell name>] [-servers <explicit list of
+
servers> ]
[-pipe] [-lifetime <ticket lifetime in hh[:mm[:ss]]>]
[-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
klog [-x] [-pr <user name>] [-pa <user's password>] [-t]
[-c <cell name>]
+
[-s <explicit list of servers> ] [-pi]
[-l <ticket lifetime in hh[:mm[:ss]]>] [-h]
DESCRIPTION
Authenticates the issuer in the indicated cell. The issuer
obtains a token accepted by the AFS server processes in that
cell. The Cache Manager stores the token in a credential
structure associated with the issuer. If the issuer already
has a token for the cell, the token resulting from this
command replaces it in the credential structure.
By default, the token generated is appropriate for the local
cell (the one to which the local machine belongs): the
command interpreter contacts an Authentication Server in the
local cell, chosen at random from the list in
/usr/vice/etc/CellServDB, and requests a token for the
issuer logged into the local machine. Use the -principal,
-cell and/or -servers arguments to specify a different
identity, cell or set of Authentication Servers
respectively. See the ARGUMENTS section for further
explanation.
This command does not change the identity under which the
issuer is logged into the local UNIX file system.
The issuer (or user indicated with -principal) does not have
to appear in the local password file (/etc/passwd or
equivalent) to issue this command; in previous versions of
this command, users had to add the -x flag if they did not
appear in that file.
During a single login on a given machine, a user can be
authenticated in multiple cells simultaneously, but can have
only one token at a time for each cell (i.e., can only
authenticate under one identity per cell).
The lifetime of the token resulting from this command is the
smallest of the following:
- the lifetime requested by the issuer with the
-lifetime argument. If the issuer does not
include this argument, the value defaults to 720
hours (30 days).
- the "maximum ticket lifetime" recorded in the
"afs" entry in the Authentication Database. The
default is 100 hours. Administrators can inspect
this value using kas examine, and change it using
kas setfields.
- the "maximum ticket lifetime" recorded in the
issuer's Authentication Database entry. The
default is 25 hours for user entries created by
the AFS 3.1 or later version of the Authentication
Server, and 100 hours for user entries created by
the AFS 3.0 version of the Authentication Server.
Administrators and the user himself/herself can
inspect this value using kas examine, and
administrators can change it using kas setfields.
- the "maximum ticket lifetime" recorded in the
"krbtgt.CELLNAME" entry in the Authentication
Database; this entry corresponds to the ticket-
granting ticket used internally in generating the
token. The default is 720 hours (30 days).
If none of these defaults have been changed, then the
standard token lifetime is 25 hours for users whose
Authentication Database entries were created by the AFS 3.1
or later version of the Authentication Server, and 100 hours
for users whose Authentication Database entries were created
by the AFS 3.0 version of the Authentication Server. The
user can issue klog to request a token with a different
lifetime.
The maximum lifetime for any token is 720 hours (30 days),
and the minimum is 5 minutes. Between these values, token
lifetimes are not granted on a linear scale; only certain
values are possible.
Lifetimes between 5 minutes and 10 hours 40 minutes are
granted at 5 minute intervals, rounding up. For example, if
the issuer requests a lifetime of 12 minutes, the token's
actual lifetime is 15 minutes.
For token lifetimes greater than 10 hours 40 minutes,
consult the following table, which presents the possible
times in units of hours:minutes:seconds. The number in
parentheses is a translation to daysd hoursh; the minutes
and seconds are the same as in the corresponding hourly
time. For example, 282:22:17 means 282 hours, 22 minutes
and 17 seconds, which translates to 11d 18h (11 days and 18
hours, etc.). If the issuer requests a lifetime between two
values, the token's lifetime is rounded up to the higher
value.
11:24:15 (0d 11h) 33:14:21 (1d 09h)
12:11:34 (0d 12h) 35:32:15 (1d 11h)
13:02:09 (0d 13h) 37:59:41 (1d 13h)
13:56:14 (0d 13h) 40:37:19 (1d 16h)
14:54:03 (0d 14h) 43:25:50 (1d 19h)
15:55:52 (0d 15h) 46:26:01 (1d 22h)
17:01:58 (0d 17h) 49:38:40 (2d 01h)
18:12:38 (0d 18h) 53:04:37 (2d 05h)
19:28:11 (0d 19h) 56:44:49 (2d 08h)
20:48:57 (0d 20h) 60:40:15 (2d 12h)
22:15:19 (0d 22h) 64:51:57 (2d 16h)
23:47:38 (0d 23h) 69:21:04 (2d 21h)
25:26:21 (1d 01h) 74:08:46 (3d 02h)
27:11:54 (1d 03h) 79:16:23 (3d 07h)
29:04:44 (1d 05h) 84:45:16 (3d 12h)
31:05:22 (1d 07h) 90:36:53 (3d 18h)
WARNING
This command does not create a new "process authentication
group" (commonly abbreviated PAG; see the description of the
pagsh command in this chapter to learn about PAGs). Users
in cells not using the AFS version of login should issue
pagsh before issuing this command, so that the tokens get
stored in a credential structure that is identified by PAG
rather than UNIX UID. The potential security problem with a
credential structure identified by UID is that anyone
already logged in as "root" on a machine is allowed to
assume any other identity by issuing su. If the credential
structure is identified by UID rather than PAG, then when
"root" assumes another UID it can use the token, too. Use
of a PAG as an identifier eliminates that possibility.
If the issuer entered the current session by issuing the AFS
login command, his or her credential structure is already
identified by a PAG. Issuing klog during the same session
creates a new token associated with the existing PAG.
ARGUMENTS
-x appears only for backwards compatibility. Its
former function is now the default behavior of
this command, as mentioned in the DESCRIPTION
section.
-principal
is the user name under which the issuer wishes to
authenticate. By default, the Authentication
Server attempts to authenticate the user logged
into the local machine's UNIX file system. This
argument allows the issuer to specify a different
user name.
-password specifies the issuer's password (or that of user
name if principal is provided). Use of this
argument is STRONGLY DISCOURAGED, as it makes the
password visible on the command line. If the
issuer omits this argument, klog prompts for the
password and does not echo it visibly:
Password: <user's password>
-tmp indicates that a copy of the "ticket-granting
ticket" should be placed in a file on the local
machine's /tmp directory. The file is called
/tmp/tktUnix_UID (example for user with UNIX UID
1000: /tmp/tkt1000).
The ticket-granting ticket is an intermediate
ticket that the Ticket Granting Service requires
of clients who desire server tickets (the extra
level of indirection increases security). Putting
the ticket-granting ticket into /tmp allows
standard Kerberos applications to access it and
use it for obtaining server tickets. If this flag
is omitted, the Cache Manager discards the
ticket-granting ticket after it obtains the AFS
server ticket.
-cell specifies the cell in which the issuer wishes to
authenticate, by directing the command to that
cell's Authentication Servers. During a single
login on a given machine, a user may be
authenticated in multiple cells simultaneously,
but can have only one token at a time for each of
them (i.e., can only authenticate under one
identity per cell per machine).
If this argument is omitted, the command is
executed in the local cell, as defined in
/usr/vice/etc/ThisCell on the client machine on
which the command is issued. The issuer may
abbreviate cell name to the shortest form that
distinguishes it from the other cells listed in
/usr/vice/etc/CellServDB on the client machine on
which the command is issued.
-servers causes the command interpreter to establish a
connection with the Authentication Server running
on each specified database server machine. It
then chooses one of these at random to execute the
command. The command accepts shortened machine
names, but exactly which abbreviations are
acceptable depends on the state of the cell's name
server at the time the command is issued.
If this argument is omitted, the command
interpreter establishes a connection with each
machine listed for the indicated cell in the local
workstation's copy of /usr/vice/etc/CellServDB,
and then chooses one of those at random for
command execution.
This option is useful for testing specific servers
if problems are encountered.
-pipe indicates that the command should run without
printing anything on the screen, including prompts
or error messages. The klog command interpreter
Server expects to receive the password from
standard input (stdin). The issuer is discouraged
from using this argument; it is for use by
application programs rather than human users.
-lifetime indicates the lifetime that the issuer wishes the
token to have. The value provided is considered
in the lifetime calculation described in the
DESCRIPTION section above, along with the maximum
ticket lifetimes mentioned there. The DESCRIPTION
section also explains how the actual lifetime of
the token is determined, since not all times are
possible. If this argument is not provided, it
defaults to 720 hours. The format for specifying
the lifetime is
hh[:mm[:ss]]
Legal values for hh (hours) range from 00 through
720. Legal values for mm and ss (minutes and
seconds) range from 00 through 59.
-help prints the online help for this command. Do not
provide any other arguments or flags with this
one.
EXAMPLES
Most often, this command is issued without arguments. The
appropriate password is for the person currently logged into
the local UNIX file system. The ticket's lifetime is
calculated as described in the DESCRIPTION section above (if
no defaults have been changed, it is 25 hours for a user
whose Authentication Database entry was created by the AFS
3.1 or later version of the Authentication Server, 100 hours
for a user whose Authentication Database entry was created
with the AFS 3.0 version).
% klog Password:
The following allows the issuer working on a machine in the
Transarc cell to authenticate as admin in the Transarc test
cell, even though he or she is logged into the Transarc
machine under a different name.
% klog admin -c test.transarc.com Password: <admin's
password>
In the following, the issuer requests a ticket lifetime of
104 hours 30 minutes (4 days 8 hours 30 minutes). Presuming
that this lifetime is allowed by the maximum ticket
lifetimes and other factors described in the DESCRIPTION
section, the token will have an actual lifetime of
110:44:28, which the next largest possible value.
% klog -life 104:30 Password:
PRIVILEGE REQUIRED
None. An entry for the issuer must exist in the
Authentication Database, and the issuer must supply the
correct password.
MORE INFORMATION
pagsh

View File

@ -1,178 +0,0 @@
knfs AFS Commands knfs
NAME
knfs -- enable authenticated access to AFS from non-
supported NFS client using NFS/AFS
Translator.
knfs -host <host name> [-id <user ID (decimal)>]
[-unlog] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
knfs [-ho <host name>] [-i <user ID (decimal)>] [-u]
[-he]
DESCRIPTION
When issued on an NFS/AFS Translator machine, creates a PAG
associated with the indicated NFS client machine (host
name), and optionally, the user ID (user ID) that the issuer
is using on host name. It associates the issuer's existing
AFS token(s) with a new credential structure identified by
the new PAG.
Issue this command only over a connection (perhaps
established at the console or via telnet) to the AFS client
machine serving as the NFS/AFS translator machine for host
name, never on the NFS client machine itself. Before
issuing it, obtain AFS tokens on the translator machine for
every cell to be contacted during the login session on host
name. The Cache Manager on the translator machine then uses
the credential structure identified by the new PAG when
accessing AFS on behalf of the issuer working on the NFS
client machine. (If the issuer dos not use the -id
argument, he or she may actually be sharing the credential
structure with other users on the NFS client machine; see
the WARNINGS section for details.)
This command allows the issuer to obtain authenticated
access to AFS (via the NFS/AFS Translator) while working on
an NFS client machine (host name) of a system type for which
AFS is not available. Users working on NFS client machines
of system types for which AFS is available (and for which
the cell has purchased a license) do not need this command,
because the klog command is available for those machine
types.
The -unlog flag discards the tokens in the credential
structure identified by the PAG, but does not destroy the
credential structure itself. The Cache Manager on the
translator machine retains the credential structure until
the next reboot, and uses it each time the issuer accesses
AFS through the translator machine. The credential
structure only has tokens in it if the issuer re-issues knfs
on the translator machine each time he or she logs into the
NFS client machine.
WARNINGS
Although the -id argument is optional, not using it can
create potential security problems and confusion about which
users are using which tokens, as described in the following.
The security problems arise because if the issuer does not
use -id, then his or her tokens are associated with a
"generic" credential structure identified by a PAG that is
associated only with host name, not with the specific
issuer. Every user working on host name who also does not
use the -id argument shares the same generic credential
structure and so uses the issuer's tokens. This includes
users on host name who do not issue knfs at all. If another
user subsequently issues knfs without -id, his or her tokens
replace the previous issuer's tokens in the credential
structure, and everyone shares the new tokens instead.
Similarly, when an issuer discards tokens with the -unlog
flag and does not use -id, then everyone using the generic
credential structure becomes unauthenticated at the same
time.
The sharing of tokens that result from not using -id is
acceptable from a security standpoint only if
- host name is used by only one person
- it is acceptable that all of host name's users who
do not have their own credential structure (do not
use -id) have the same access to AFS files. They
should be aware that they are subject to token
sharing.
The DESCRIPTION section mentioned that using the -unlog flag
does not destroy the credential structure, but only discards
the tokens associated with it. The Cache Manager on the
translator machine retains the credential structure until
the next reboot and uses it whenever the issuer accesses AFS
through the translator machine. One implication is that
once the issuer issues knfs using the -id argument, he or
she cannot use the generic credential structure until the
machine is rebooted.
This command does not make it possible for users working on
non-supported machine types to issue AFS commands. This is
possible only on NFS clients of a system type for which AFS
is available (and for which the cell has purchased AFS).
ARGUMENTS
-host names the NFS client machine the issuer is
working on. A full name is safest, but
abbreviated forms are acceptable depending
on the state of the cell's name server at
the time the command is issued.
-id specifies the issuer's user ID on the NFS
client (a UNIX UID or equivalent), which NFS
passes to the translator machine to identify
the user.
-unlog discards the tokens in the credential
structure identified by the PAG associated
with -host and, optionally, -id.
-help prints the online help for this command. Do
not provide any other arguments or flags
with this one.
EXAMPLE
The following shows a typical use of this command. The
issuer smith is working on nfs-client1.transarc.com and has
user ID 1020 on that machine. He is accessing AFS through
the translator machine called translator4.transarc.com. He
telnets to translator4 and uses AFS login as smith in the
Transarc cell. He the uses klog to obtain tokens in the
Transarc test cell (test.transarc.com) as admin. The knfs
command instructs the Cache Manager on translator4 to
associate both tokens with the PAG identified by nfs-client1
and user ID 1020. He exits the telnet connection and works
normally on nfs-client1.
% telnet translator4.transarc.com
. . .
login: smith
Password:
AFS 3.2 (R) login
% klog admin -c test.transarc.com
Password:
% knfs nfs-client1.transarc.com 1020
% exit
The following shows smith telnetting again to translator4
and discarding his tokens.
% telnet translator4.transarc.com
. . .
login: smith
Password:
AFS 3.2 (R) login
% knfs nfs-client1.transarc.com 1020 -unlog
% exit
PRIVILEGE REQUIRED
None, but issuer must provide correct password(s) when
obtaining tokens on translator machine.
MORE INFORMATION
klog login (AFS version) pagsh

View File

@ -1,151 +0,0 @@
kpasswd AFS Commands kpasswd
NAME
kpasswd -- change password in Authentication Database.
kpasswd [-x] [-principal <user name>]
[-password <user's current password>]
[-newpassword <user's new password>] [-cell <cell name>]
+
[-servers <explicit list of servers> ] [-pipe] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
kpasswd [-x] [-pr <user name>] [-pa <user's password>]
[-n <user's new password>] [-c <cell name>] [-s <explicit
+
list of servers> ]
[-pi] [-h]
DESCRIPTION
Changes password for indicated user in Authentication
Database. By default, the change occurs in the local cell's
Authentication Database for the user logged into the local
machine's UNIX file system.
The issuer (or user indicated with -principal) does not have
to appear in the local password file (/etc/passwd or
equivalent) to issue this command; in previous versions of
this command, users had to add the -x flag if they did not
appear in that file.
ARGUMENTS
-x appears only for backwards compatibility.
Its former function is now the default
behavior of this command, as mentioned in
the DESCRIPTION section.
-principal names the Authentication Database entry in
which to change the password. If this
argument is omitted, the change is in the
entry of the person logged into the local
machine's UNIX file system.
-password specifies the current password. It is NOT
recommended that the issuer provide this
argument on the command line. If it is
omitted, the new password is prompted for
and does not echo visibly:
Old password: <user's password>
-newpassword specifies the new password, which the
kpasswd command interpreter converts into an
encryption key (string of octal numbers)
before sending it to the Authentication
Server for storage in the user's
Authentication Database entry. Unlike the
UNIX passwd command, kpasswd does not
restrict passwords to 8 characters; it
accepts passwords of virtually any length.
All AFS commands that require passwords
(klog, the kas suite, kpasswd, and the AFS
version of login) can handle passwords
longer than 8 characters, but some non-AFS
programs cannot. This is a consideration if
non-AFS programs handle AFS passwords in the
local environment.
It is NOT recommended that the issuer
provide this argument on the command line.
If it is omitted, it is prompted for and
does not echo visibly:
New password (RETURN to abort): <new pas
Retype new password: <new password>
-cell specifies the cell in which to change the
password, by directing the command to that
cell's Authentication Servers. By default,
the command is executed in the local cell,
as defined in /usr/vice/etc/ThisCell on the
client machine on which the command is
issued. The issuer may abbreviate cell name
to the shortest form that distinguishes it
from the other cells listed in
/usr/vice/etc/CellServDB on the client
machine on which the command is issued.
-servers causes the command interpreter to establish
a connection with the Authentication Server
running on each specified database server
machine. It then chooses one of these at
random to execute the command. The issuer
may abbreviate the machine name to the
extent the cell's name server will accept.
By default, the command interpreter
establishes a connection with each machine
listed for the indicated cell in the local
workstation's copy of
/usr/vice/etc/CellServDB, and then chooses
one of those at random for command
execution.
This option is useful for testing specific
servers if problems are encountered.
-pipe indicates that the command should run
without printing anything on the screen,
including prompts or error messages. The
kpasswd command interpreter expects to
receive all necessary arguments, each on a
separate line, from standard input (stdin).
The issuer is discouraged from including
this argument; it is for use by application
programs rather than human users.
-help prints the online help for this command. Do
not provide any other arguments or flags
with this one.
EXAMPLE
The following shows the typical use of this command, when
the issuer wishes to change his or her own password.
% kpasswd
Changing password for 'user' in cell 'cellname'.
Old password:
New password (RETURN to abort):
Verifying, please re-enter new_password:
PRIVILEGE REQUIRED
Issuer must provide correct current password.
MORE INFORMATION
klog
kas setpassword

View File

@ -1,926 +0,0 @@
package AFS Commands package
NAME
package -- configure local disk.
package [-config <base name of configuration file>]
[-fullconfig <full name of config file> OR stdin for
standard input]
[-overwrite] [-noaction] [-silent] [-verbose]
[-rebootfiles]
[-debug] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
package [-c <base name of configuration file>]
[-f <full name of config file> OR stdin for standard input]
[-o] [-n] [-s] [-v] [-r] [-d] [-h]
DESCRIPTION
Configures the machine's local disk to comply with the
indicated configuration file. By default, package does
nothing to elements on disk that have no counterpart in the
configuration file, but the issuer can have package remove
any element found in a directory on disk that is not also
found in that directory in the configuration file. See the
"R" update code in the definition of the "D" line.
If an element named in the configuration file already exists
on disk but is not identical to the configuration file
element, then package updates the existing disk version.
For example, if an element exists on disk as a symbolic link
but is defined as a directory or file in the configuration
file, then package will replace the symbolic link with a
directory or file. The same holds for directory or file
elements on disk that appear in the configuration file as a
symbolic link. Similarly, if the contents of a file do not
match those in the "source" file referred to in the
configuration file, then package overwrites the existing
file with the contents of the source file. The issuer can
specify different updating behavior through the use of
"update codes" on the lines in the configuration file. See
the definition of the "F" line.
ARGUMENTS
-config specifies the pathname of the configuration
file to use, ending in the file's "base
name", which omits the suffix that indicates
the machine type. Package can determine a
machine's type and automatically select the
appropriate version of the base file name.
An example of the proper value for this
argument is staff rather than
staff.rt_aix221.
If only a file name is provided, package
looks for it in the current working
directory. It also interprets partial
pathnames relative to that directory.
Provide this argument OR -fullconfig.
-fullconfig specifies the configuration file to use. It
accepts two types of values:
- the full pathname of the
configuration file to use,
complete with an extension
indicating the machine-type
(examples: staff.rt_aos4,
staff.dkload.pmax_ul3)
- the string stdin, which indicates
that the issuer will provide
configuration information via
standard input (stdin), either as
a piped file or by typing the
configuration file at the
keyboard. Type ^D (Control-D) to
conclude the input.
Provide this argument OR -config.
-overwrite tells package to overwrite elements on the
local disk with the source version indicated
in the configuration file, even if the disk
version's "user" w mode bit is turned off.
Files protected by the I update code are not
overwritten; see the "F" line definition.
-noaction indicates that package should not actually
perform the command, but instead should
print a list (at standard out) of any
problems it would encounter in executing the
command. If the -verbose flag is added,
package produces a trace of all the actions
it would perform in executing the command,
but does not actually perform them.
-silent suppresses some of the trace messages that
package produces at standard out by default.
It still reports on major problems
encountered.
-verbose indicates that package should produce a more
detailed trace of its actions (at standard
out). The trace records on the transfer and
ownership/mode bit setting of each element
in the configuration file.
-rebootfiles indicates that package should not overwrite
any element marked with the Q update-mode
code in the configuration file. This
effectively prevents the machine from
rebooting automatically again when package
is invoked from /etc/rc.
-debug enables debugging output, which is directed
to standard out (stdout) unless the issuer
directs it into a file. By default, no
debugging output is produced.
-help prints the online help for this command. Do
not provide any other arguments or flags
with this one.
EXAMPLES
This command is usually invoked in an initialization file
such as /etc/rc, rather than typed at the command shell
prompt.
The following invokes the version of the staff configuration
file appropriate for this machine's system type, and
produces verbose output.
/etc/package -c staff -v
The following tells package to use the configuration file
whose basename is stored in /.package on the local machine.
This can be convenient because the administrator can put it
(the same command) in every machine's /etc/rc file and still
configure machines differently, by putting the appropriate
basename in /.package.
/etc/package -c `cat /.package` -v
PRIVILEGE REQUIRED
Issuer must be logged into the machine's UNIX file system as
the super user "root."
Configuration File "B" Line -- define block special device.
B <device name> <major device number> <minor device
number>
<owner name> <group name> <mode bits>
DESCRIPTION
Defines a block special device, such as a disk, that deals
with input in units of multi-byte blocks.
ARGUMENTS
B should be a capital letter and tells the
command interpreter that this line defines a
block special device.
device name names the block special device being defined.
major device number
specifies the device's major device number.
To learn the correct value, consult
documentation provided by the machine and/or
operating system's manufacturer.
minor device number
specifies the device's minor device number.
To learn the correct value, consult
documentation provided by the
machine/operating system's manufacturer.
owner name names the owner for the device in the UNIX
file system (the user who will appear in the
device's "owner" field in the output from
ls -l).
group name names the group for the device in the UNIX
file system (the group that will appear in
the device's group field in the output from
ls -lg).
mode bits defines the mode bits that protect the device
in the UNIX file system. Legal values are
the standard three- or four-digit decimal
numbers corresponding to combinations of
rights. Example: 755 corresponds to
rwxr-xr-x.
EXAMPLE
The following defines disk /dev/hd0a with major and minor
device numbers 1 and 0.
B /dev/hd0a 1 0 root wheel 644
Configuration File "C" Line -- define character special
device.
C <device name> <major device number> <minor device
number>
<owner name> <group name> <mode bits>
DESCRIPTION
Defines a character special device, such as a terminal or
tty, that deals with input in single character units.
ARGUMENTS
C should be a capital letter and tells the
command interpreter that this line defines a
character special device.
device name names the character special device being
defined.
major device number
specifies the device's major device number.
To learn the correct value, consult
documentation provided by the
machine/operating system's manufacturer.
minor device number
specifies the device's minor device number.
To learn the correct value, consult
documentation provided by the
machine/operating system's manufacturer.
owner name names the owner for the device in the UNIX
file (the user who will appear in the
device's "owner" field in the output from
ls -l).
group name names the group for the device in the UNIX
file system (the group that will appear in
the device's group field in the output from
ls -lg).
mode bits defines the mode bits that protect the device
in the UNIX file system. Legal values are
the standard three- or four-digit decimal
numbers corresponding to combinations of
rights. Example: 644 corresponds to rw-r--
r--.
EXAMPLE
The following defines tty /dev/ttyp5 with major and minor
device numbers 6 and 5.
C /dev/ttyp5 6 5 root wheel 666
Configuration File "D" Line -- define directory.
D[<update code>] <directory> <owner name> <group name> <mode
bits>
DESCRIPTION
Names a directory to be created on the local disk. If a
directory of this name already exists, package does nothing.
However, if an element of the same name exists on disk as a
symbolic link, package replaces the symbolic link with an
actual directory.
ARGUMENTS
D should be a capital letter and tells the command
interpreter that this line creates a directory.
update code
is optional and if provided should follow the
letter D directly, without an intervening space.
Choose one of the two legal values:
- X, which indicates that the directory is a
lost+found directory (used by the fsck
program).
- R, which indicates that package should
remove any files from the local disk
directory that do not appear in the
configuration file. It will also remove any
subdirectories of the directory, and files
in them, that do not appear in the
configuration file.
owner name
names the owner for the directory in the UNIX file
system (the user who will appear in the
directory's "owner" field in the output from
ls -l).
group name
names the group for the directory in the UNIX file
system (the group that will appear in the
directory's group field in the output from
ls -lg).
mode bits defines the mode bits that protect the directory
in the UNIX file system. Legal values are the
standard three- or four-digit decimal numbers
corresponding to combinations of rights. Example:
755 corresponds to rwxr-xr-x.
EXAMPLE
The following defines the /usr directory.
DR /usr root wheel 755
Configuration File "F" Line -- create/update file.
F[<update code>] <file> <source file> [<owner name> <group
name>
<mode bits>]
DESCRIPTION
Names a file to be created on the local disk. Its contents
come from the indicated source file, which may reside either
in AFS or on the local disk itself. If package cannot
locate the source file, it aborts.
If a file of this name already exists on disk, then its
contents are updated with (overwritten by) the contents of
the source file, unless the I update code is used to prevent
that. Other update codes also modify the way in which the
update takes place; see the ARGUMENTS section.
If a symbolic link or directory exists on disk under this
name, package replaces it with the indicated file.
ARGUMENTS
F should be a capital letter and tells the command
interpreter that this line creates/updates a file.
update code
determines the manner in which the source file is
used to update the contents of the file, if the
latter already exists on the local disk. This
argument is optional and if provided should follow
the letter F directly, without an intervening
space. Any number of the update-mode codes may
combined with one another, in any order. The
legal values are:
- A, which indicates that the pathname in the
source file slot is the complete pathname of
the source file, including the filename. By
default, the source file pathname does not
include a file name at the endMinstead,
package appends the name in the file slot to
the source file pathname in order to
determine the source file's full name.
Thus, this code allows the name of the file
being created to differ from the name of the
source file. See also the EXAMPLE(S)
section.
- I, which indicates that the file should not
be overwritten if it already exists on the
local disk. If it does not exist, then
package creates it, and copies the contents
of the source file into it.
- O, which indicates that package should save
the existing local disk version of the file
with a .old extension, before overwriting
its contents with the source file's.
- Q, which indicates that if package
overwrites the file, then it should exit
with status code 4. If the standard
package-related changes have been made to
/etc/rc, then status code 4 will cause an
automatic reboot of the machine. This is
useful in cases where the machine must
reboot in order for updates to the file to
have any effect (/vmunix is a common
example).
file specifies the complete pathname of the file to be
created or updated on the local disk.
source file
specifies the file (in AFS or on the local disk)
whose contents should be used to create or update
the disk file.
If the A update code appears on the line, this
slot should specify the source file's complete
pathname. Otherwise, this slot should specify
only the part of the pathname that precedes the
name of the local disk file. As an example,
suppose that the configuration file is for a
Transarc cell machine running AIX 2.2.1, so that
the source for the local disk file called
/bin/grep is /afs/transarc.com/rt_aix221/bin/grep.
If the A does not appear, then the proper filler
for the source file slot is
/afs/transarc.com/rt_aix221. See also the
EXAMPLE(S) section.
owner name
names the owner for the file in the UNIX file
system (the user who will appear in the file's
"owner" field in the output from ls -l).
This slot may be left empty, in which case the
file's owner is set to match the source file's
owner. If this slot is empty, the group name and
mode bits slots must also be empty.
group name
names the group for the file in the UNIX file
system (the group that will appear in the file's
group field in the output from ls -lg).
This slot may be left empty, in which case the
file's group is set to match the source file's
group. If this slot is empty, the owner name and
mode bits slots must also be empty.
mode bits defines the mode bits that protect the file in the
UNIX file system. Legal values are the standard
three- or four-digit decimal numbers corresponding
to combinations of rights. Example: 755
corresponds to rwxr-xr-x.
This slot may be left empty, in which case the
file's mode bits are set to match the source
file's mode bits. If this slot is empty, the
owner name and group name slots must also be
empty.
EXAMPLES
The following, appropriate for a machine running AIX 2.2.1
in the Transarc cell, creates/updates the file /bin/grep on
the local disk, using /afs/transarc.com/rt_aix221/bin/grep
as the source.
F /bin/grep /afs/transarc.com/rt_aix221 root wheel 7
The next example specifies an absolute pathname for the
source file, as indicated by the A update code. The Q code
makes package return status code 4 as it exits, prompting a
reboot of the machine if the standard package-related
changes have been made to /etc/rc. This example also leaves
the owner name, group name and mode bits slots empty, so
that the disk file adopts the source file's values for those
slots.
FAQ /usr/vice/etc/ThisCell /afs/transarc.com/common/
Configuration File "L" Line -- create symbolic link.
L[<update code>] <link> <actual file> [<owner name>
<group name> <mode bits>]
DESCRIPTION
Creates a symbolic link to a directory or file that exists
either in AFS or elsewhere on the local disk. If package
cannot access the actual directory/file, it aborts.
If a file or directory currently exists on the local disk
under this name, package replaces it with a symbolic link.
ARGUMENTS
L should be a capital letter and tells the command
interpreter that this is a symbolic link
definition.
update code
modulates the way that package creates the
symbolic link, as discussed for each code. It is
optional and if provided should follow the letter
L directly, without an intervening space. The two
legal update-mode codes may combined with one
another, in either order. The legal values are:
- A, which indicates that the pathname in the
actual file slot is the complete pathname of
the actual file, including the filename. By
default, the actual file pathname does not
include a file name at the endMinstead,
package appends the name in the link slot to
the actual file pathname in order to
determine the actual file's full name.
Thus, this code allows the name of the
symbolic link being created to differ from
the name of the actual file. See also the
EXAMPLE(S) section.
- I, which indicates that the symbolic link
should not be overwritten if it already
exists on the local disk. If it does not
exist, then package creates it.
link specifies the complete pathname of the symbolic
link to be created on the local disk.
actual file
specifies the file (in AFS or on the local disk)
to which the symbolic link refers.
If the A update code appears on the line, this
slot should specify the actual file's complete
pathname. Otherwise, this slot should specify
only the part of the pathname that precedes the
name of the local disk link. As an example,
suppose that the configuration file is for a
Transarc cell machine running Ultrix 3.0, so that
/etc/ftpd is a symbolic link to
/afs/transarc.com/vax_ul3/etc/ftpd. If the A does
not appear, then the proper filler for this slot
is /afs/transarc.com/vax_ul3, not
/afs/transarc.com/vax_ul3/etc/ftpd. See also the
EXAMPLE(S) section.
owner name
names the owner for the symbolic link in the UNIX
file system (the user who will appear in the
symbolic link's "owner" field in the output from
ls -l).
This slot may be left empty, in which case the
symbolic link's owner is set to match the UNIX
user name of the issuer of the package command
(i.e., "root"). If this slot is empty, the group
name and mode bits slots must also be empty.
group name
names the group for the symbolic link in the UNIX
file system (the group that will appear in the
symbolic link's group field in the output from
ls -lg).
This slot may be left empty, in which case the
symbolic link's group is set to match the group
for the issuer of the package command (defined in
the issuer's /etc/rc entry. If this slot is
empty, the owner name and mode bits slots must
also be empty.
mode bits defines the mode bits that protect the symbolic
link in the UNIX file system. Legal values are
the standard three- or four-digit decimal numbers
corresponding to combinations of rights. Example:
755 corresponds to rwxr-xr-x.
This slot may be left empty, in which case the
symbolic link's mode bits are set to 777
(rwxrwxrwx). If this slot is empty, the owner
name and group name slots must also be empty.
EXAMPLES
The following, appropriate for a machine running Ultrix 3.0
in the Transarc cell, creates a symbolic link from /etc/ftpd
on the local disk to the file
/afs/transarc.com/vax_ul3/etc/ftpd in AFS.
L /etc/ftpd /afs/transarc.com/vax_ul3 root wheel 644
The next example uses an absolute pathname (as indicated by
the A update code), because the symbolic link and actual
file names differ. This example also leaves the owner name,
group name and mode bits slots empty, so that the symbolic
link adopts values for those slots from the actual file.
LA /etc/printcap /afs/transarc.com/common/etc/printca
Configuration File "S" Line -- define socket.
S <socket name> [<owner name> <group name> <mode bits>]
DESCRIPTION
Defines a socket (a communications device for UDP and TCP/IP
connections).
ARGUMENTS
S should be a capital letter and tells the command
interpreter that this is a socket definition.
socket name
names the socket being defined.
owner name
names the owner for the socket in the UNIX file
system (the user who will appear in the socket's
"owner" field in the output from ls -l).
This slot may be left empty, in which case the
socket's owner is set to match the UNIX user name
of the issuer of the package command (i.e.,
"root"). If this slot is empty, the group name
and mode bits slots must also be empty.
group name
names the group for the socket in the UNIX file
system (the group that will appear in the socket's
group field in the output from ls -lg).
This slot may be left empty, in which case the
socket's group is set to match the group for the
issuer of the package command (defined in the
issuer's /etc/rc entry. If this slot is empty,
the owner name and mode bits slots must also be
empty.
mode bits defines the mode bits that protect the socket in
the UNIX file system. Legal values are the
standard three- or four-digit decimal numbers
corresponding to combinations of rights. Example:
755 corresponds to rwxr-xr-x.
This slot may be left empty, in which case the
socket's mode bits are set to 777 (rwxrwxrwx), as
modulated by the cell's umask. If this slot is
empty, the owner name and group name slots must
also be empty.
EXAMPLE
The following defines the socket /dev/printer:
S /dev/printer root wheel 777
Configuration File %define -- define variable or declare
string.
%define <variable> <value> %define <declaration>
DESCRIPTION
If followed by two arguments, defines the second argument as
the value of the first, which may appear as a variable (in
the form ${variable}) in the same or other prototype/library
files. The second argument is substituted for occurrences
of the variable wherever it occurs.
If followed by a single argument, declares the argument to
be defined, making it available for use as a controller in
%ifdef and %ifndef statements. That is, %ifdef statements
mentioning this variable will resolve as "true," %ifndef
statements as "false."
ARGUMENTS
variable as the first of two arguments, specifies the
name of the variable for which a value is
defined. This argument may appear in
variable form (i.e., as ${variable}) in this
or other prototype/library files.
value as the second of two arguments, specifies
the value to be assigned to variable-form
occurrences of the first argument.
declaration as the single argument, declares the
indicated string to be defined.
EXAMPLES
The following defines the value for the variable
${diskmode}. This variable is used elsewhere in the
template to fill the <owner name>, <group name> and
<mode bit> slots on a "D", "F" or "L" line.
%define diskmode root wheel 644
The following declares the string "afsd" to be defined.
%define afsd
Configuration File %ifdef -- specify action to perform if
value is declared or defined.
%ifdef <declaration>
+
<action> [%else [<declaration>]
+
<alternate action> ] %endif <declaration>
DESCRIPTION
Specifies the action(s) to perform if the indicated
declaration has been made with a single-argument %define
statement, or if the indicated variable has a value.
The optional %else statement specifies alternate action(s)
to perform if the indicated declaration has never been made,
or has been undone with %undef.
It is possible to nest any number of %ifdef and %ifndef
statements.
ARGUMENTS
declaration specifies the string that must be declared,
or variable that must be defined, if the
action is to be performed. Its second
occurrence (following %else) is optional,
serving only to clarify which %ifdef the
%else belongs to. The first and third
occurrences (the latter following %endif)
are required.
action specifies each action to perform if the
%ifdef statement resolves to "true." Each
action should appear on a separate line.
Both "%-statements" and definition lines are
acceptable actions.
alternate action
specifies each action to perform if the
%ifdef statement resolves to "false." Each
action should appear on a separate line.
Both "%-statements" and definition lines are
acceptable actions.
EXAMPLE
The following specifies that if the string rt_aos4 is
currently declared, then the three indicated library files
will be included in the configuration file resulting from
compilation of this prototype file.
%ifdef rt_aos4
%include ${wsadmin}/lib/rt_aos4.readonly
%include ${wsadmin}/lib/rt_aos4.generic
%include ${wsadmin}/lib/rt_aos4.generic.dev
%endif rt_aos4
Configuration File %ifndef -- specify action to perform if
value is not declared or defined.
%ifndef <declaration>
+
<action> [%else [<declaration>]
+
<alternate action> ] %endif <declaration>
DESCRIPTION
Specifies the action(s) to perform if the indicated
declaration has never been made or has been undone with an
%undef statement, or if the indicated variable does not have
a value.
The optional %else statement specifies alternate action(s)
to perform if the indicated declaration/definition has been
made, or if the variable does have a value.
It is possible to nest any number of %ifdef and %ifndef
statements.
ARGUMENTS
declaration specifies which string must not be declared,
or which variable must not be defined, in
order for action to be performed. Its
second occurrence (following %else) is
optional, serving only to clarify which
%ifdef the %else belongs to. The first and
third occurrences (the latter following
%endif) are required.
action specifies each action to perform if the
%ifndef statement resolves to "true" (i.e.,
the string is not declared or variable is
not defined). Each action should appear on
a separate line. Both "%-statements" and
definition lines are acceptable actions.
alternate action
specifies each action to perform if the
%ifndef statement resolves to "false" (i.e.,
the string is declared or variable does have
a defined value). Each action should appear
on a separate line. Both "%-statements" and
definition lines are acceptable actions.
EXAMPLE
The following, appropriate for the Transarc Corporation
cell, defines "transarc.com" as the value of the ${cell}
variable if it does not already have a value.
%ifndef cell
%define cell transarc.com
%endif cell
Configuration File %include -- include library file.
%include <file pathname>
DESCRIPTION
Causes contents of indicated library file to be included in
configuration file resulting from compilation of this
prototype file.
ARGUMENTS
file pathname specifies the complete pathname of the
library file to be included. The pathname
may include variables.
EXAMPLE
The following includes the file base.generic from the lib
subdirectory of the directory in which the cell keeps
package related files. The ${wsadmin} variable will be
resolved to an actual pathname (such as
/afs/transarc.com/wsadmin) during compilation.
%include ${wsadmin}/lib/base.generic
Configuration File %undef -- declare value to be defined no
longer.
%undef <declaration>
DESCRIPTION
Specifies that the indicated string is no longer defined.
Any %ifndef statements involving this string will then
resolve as "true," %ifdef statements as "false."
ARGUMENTS
declaration specifies the string that should no longer
is no longer defined.
EXAMPLE
The following declares the string "afsd" not to be defined.
%undef afsd

View File

@ -1,85 +0,0 @@
pagsh AFS Commands pagsh
NAME
pagsh -- create new process authentication group (PAG).
pagsh
DESCRIPTION
Creates a new command shell (owned by the issuer of the
command) and associates a new "process authentication group"
(PAG) with the shell and the user. A PAG is a number
guaranteed to identify the issuer of commands in the new
shell uniquely to the local Cache Manager. The PAG is used,
instead of the issuer's UNIX UID, to identify him or her in
the credential structure that the Cache Manager creates to
track each user.
Any additional tokens issued to the user (presumably for
other cells) become associated with the PAG, rather than
with the user's UNIX UID. This method for distinguishing
users has two advantages.
- It means that processes spawned by the user
inherit the PAG and so share the token; thus they
gain access to AFS as the authenticated user. In
many environments, for example, printer and other
daemons run under identities (such as "root") that
the AFS server processes recognize only as
anonymous. Unless PAGs are used, such daemons
cannot access files protected against
system:anyuser.
- It closes a potential security loophole: UNIX
allows anyone already logged in as "root" on a
machine to assume any other identity by issuing
su. If the credential structure were identified
by a UNIX UID rather than a PAG, then assuming the
same UID would mean being able to use the token,
too. Use of a PAG as an identifier eliminates
that possibility.
WARNINGS AND REQUIREMENTS
Each PAG created uses two of the memory slots that the
kernel uses to record the UNIX groups associated with a
user. If none of these slots are available, the pagsh
command fails. This is not a problem with most operating
systems, which make at least 16 slots available per user.
Users in cells not using the AFS version of login should
issue this command before issuing klog. If they do not,
then the Cache Manager stores the token in a credential
structure identified by UNIX UID rather than PAG. This
creates the potential security loophole described in the
DESCRIPTION section.
If the command is to be issued on NFS client machines for
which AFS is available, the pagsh binary accessed by the NFS
client must be owned by, and grant setuid privilege to,
"root." The complete set of mode bits should be -rwsr-xr-x.
This is not a requirement when the command is issued on AFS
client machines.
EXAMPLE
The following shows the only possible use of the command.
% pagsh
PRIVILEGE REQUIRED
None.
MORE INFORMATION
klog
login (AFS version)

View File

@ -1,117 +0,0 @@
runntp AFS Commands runntp
NAME
runntp -- initialize Network Time Protocol Daemon.
/usr/afs/bin/runntp [-localclock] [-precision <small
negative integer>]
+
[-logfile <pathname>] [<machine name> ]
DESCRIPTION
Initializes the Network Time Protocol Daemon and related
programs on the local machine. It also constructs the
ntp.conf configuration file.
This command is intended as a convenient interface to the
standard ntpd program, to be used on AFS file server
machines.
WARNING
A cell in which the NTPD was running before the introduction
of AFS does not need to use runntp. It is an error to run
two NTPDs on one machine.
This command is not normally issued at the command shell
prompt, but rather placed into a file server machine's
/usr/afs/local/BosConfig with the bos create command.
This command does not use the syntax conventions of the AFS
command suites, so the command and switch names must be
typed in full.
ARGUMENTS
-localclock
tells NTPD to use the local machine's internal
clock as a possible source of the correct time in
case a network partition separates the machine
from the specified machine name(s). Cells
connected to the Internet should not normally use
this flag. In cells that experience frequent
separations from the network (voluntary or
otherwise), it should be used only on the system
control machine.
-precision
specifies the precision of the local clock. This
argument is not normally provided. As ntpd
initializes, it determines the precision of the
local clock on its own. If the argument is
provided, it should be a small integer preceded by
a hyphen to show that it is negative. The value
is used as an exponent on the number 2, and the
result interpreted as the frequency, in fractions
of a second, at which the local clock tics
(advances).
For example, a value of -6, which translates to
-6
2 or 1/64, means that the local clock tics once
every 1/64th of a second, or has a precision of
about 60 tics per second. A value of -7
translates to about 100 tics per second. A value
of -10 translates to about 1000 tics per second (a
millisecond clock).
-logfile indicates the pathname of the file in which to
store log output from NTPD. Indicate a location
on the file server machine's local disk, not in
AFS; a suitable location might be
/usr/afs/logs/ntp.log. The log records
information about which machines are serving as
time sources and peers, what adjustments have been
made to reduce drift, and so on. Use ntpd's
debugging mechanism to control the amount of
information produced. If this argument is
omitted, the information is discarded.
machine name
is the complete Internet-style host name of each
machine the local machine should consult for the
correct time. Preferably the machines are outside
the cell.
In general, this argument is necessary only on the
system control machine. If the issuer omits it,
then the local machine consults its
/usr/afs/etc/CellServDB file and uses the machines
listed there as time sources.
See the AFS Installation Guide or consult AFS
Product Support at Transarc for advice on
selecting appropriate time sources.
PRIVILEGE REQUIRED
Issuer must be listed in /usr/afs/etc/UserList to place this
command in /usr/afs/local/BosConfig, because that is the
privilege required to issue bos create.
MORE INFORMATION
bos create
UNIX manual page for ntp
UNIX manual page for ntpd
UNIX manual page for ntpdc

View File

@ -1,101 +0,0 @@
salvager AFS Commands salvager
NAME
salvager -- initialize Salvager in BosConfig or manually.
/usr/afs/bin/salvager [-f] [-o] [<partition name>
[<volumeID>]]
DESCRIPTION
Initializes the Salvager component of the fs process, which
corrects corruption in ReadWrite volumes where possible.
Unlike most other AFS file server processes, this process
can also be started from the command line. It produces a
trace of its actions in /usr/afs/logs/SalvageLog.
If the Salvager detects corruption in ReadOnly or Backup
volumes, it removes them rather than attempting to correct
the corruption; it records the removal in SalvageLog. If
desired, the issuer can recreate the ReadOnly or Backup
version by issuing vos release or vos backup, respectively.
The Salvager normally salvages only those ReadWrite volumes
that are marked as having been active when a crash occurred.
To have it salvage all relevant ReadWrite volumes, add the
-f flag.
The number of volumes the Salvager attempts to salvage
depends on the combination of arguments and flags used. To
salvage:
- volumes on all /vicepx partitions on a file server
machine, provide no arguments
- volumes on a certain partition, specify the
partition's full (/vicepx-style) name as partition
name
- one particular ReadWrite volume, specify its
partition as partition name and its volumeID
number as volumeID
WARNING
This command does not use the syntax conventions of the AFS
command suites, so the command and switch names must be
typed in full.
ARGUMENTS
-f inspects all volumes for corruption, not just
those that are marked as having been active
when a crash occurred.
-o enables the Salvager to remove volumes that are
too damaged to be removed in the normal manner.
Do not Use this argument unless a member of the
AFS Product Support staff has directed its use.
In normal cases, use the -force flag on the
vos zap command instead. If this flag is
provided, it should be combined with partition
name and volumeID.
partition name
specifies which partition the Salvager should
inspect for corruption. If it is omitted,
every /vicepx partition on the file server
machine is inspected.
volumeID number
specifies the volumeID number of the Read Write
volume to salvage.
EXAMPLES
The following command instructs the Salvager to attempt to
salvage the volume with volume ID 258347486 on /vicepg on
the local machine.
% /usr/afs/bin/salvager /vicepg 258347486
PRIVILEGE REQUIRED
Issuer must be logged into the local UNIX file system as
"root" to issue this command to the shell.
Issuer must be listed in /usr/afs/etc/UserList to place this
command in /usr/afs/local/BosConfig, because that is the
privilege required to issue bos create.
MORE INFORMATION
bos create
bos salvage

View File

@ -1,363 +0,0 @@
scout AFS Commands scout
NAME
scout -- monitor File Server process on one or more file
server machines.
+
scout -server <File Server name(s) to monitor>
[-basename <base server name>]
[-frequency <poll frequency, in seconds>] [-host]
+
[-attention <specify attention (highlighting) level> ]
[-debug <turn debugging on to the named file>] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
+
scout -s <File Server name(s) to monitor>
[-b <base server name>]
[-f <poll frequency, in seconds>] [-ho]
+
[-a <specify attention (highlighting) level> ]
[-d <turn debugging on to the named file>] [-he]
DESCRIPTION
Displays statistics gathered from the File Server process
running on each machine specified with -server. The OUTPUT
section explains the meaning of the statistics and describes
how they appear on the screen.
REQUIREMENTS
In addition to the scout binary, the machine must be able to
access the "curses" graphics package, since scout's display
abilities rely on it. Most UNIX distributions include
curses as a standard utility.
Both "dumb" terminals and windowing systems that emulate
terminals can display scout's statistics. The scout display
makes use of reverse video and cursor addressing, so for the
display to look its best, the display environment should
support those features (most windowing systems do, most dumb
terminals do not). To let scout know what type of
environment is being used, the user should set the
environment variable TERM to the correct terminal type, or
one with characteristics similar to the actual ones. For
machines running AIX, the recommended setting for TERM is
vt100, as long as the terminal is similar to that. For
other operating systems, the wider range of acceptable
values includes xterm, xterms, vt100, vt200 and wyse85.
ARGUMENTS
-server names each File Server process to monitor, by
identifying the file server machine it is running
on. Complete Internet-style host names are best,
unless the -basename argument is used. In that
case, specify only the unique initial part of each
machine name, omitting the domain/cell name suffix
(or "basename") common to all the names.
Shortened unambiguous names are legal when the
-basename argument is not used, but in that case
their correct resolution depends on the state of
the cell's naming service at the time the command
is issued.
-basename specifies the basename (domain/cell name) suffix
common to all of the file server machine names
specified with -server, and is automatically
appended to them. This argument is normally the
name of the cell to which the machines belong. Do
not include the period that separates this suffix
from the distinguishing part of each file server
machine name, but do include any periods that
occur within the suffix itself. (For example, in
the Transarc Corporation cell, the proper value
would be "transarc.com", not ".transarc.com".)
-frequency
indicates how often scout should probe the File
Server processes. Specify a number of seconds
greater than 0. The default is 60 seconds.
-host causes the banner line to display the name of the
machine that is running scout. The default is not
to display the machine name in the banner.
-attention
defines a list of one or more entries, each of
which pairs a type of statistic and a threshold
value. When the value of the statistic exceeds
the indicated threshold value, scout highlights
the value. The pairs may appear in any order.
Legal values for the pairs are
- conn <connections>. Indicates the maximum
number of connections that the File Server
may have open to client machines before the
value is highlighted. Highlighting goes
away when the value goes back below the
threshold. By default, no threshold is set.
Example of a legal value: conn 300
- fetch <bytes fetched>. Indicates the
maximum number of bytes of data that clients
can have fetched from the File Server before
the value is highlighted. Highlighting goes
away when the value goes back below the
threshold, but this is possible only if the
File Server is restarted, at which time the
value returns to 0. By default, no
threshold is set.
Example of a legal value: fetch 45000
- store <bytes stored>. Indicates the maximum
number of bytes of data that clients can
have sent to the File Server for storage
before the value is highlighted.
Highlighting goes away when the value goes
back below the threshold, but this is
possible only if the File Server is
restarted, at which time the value returns
to 0. By default, no threshold is set.
Example of a legal value: store 120000
- ws <number of active client machines>.
Indicates the maximum number of "active"
client machines the File Server can be
serving before the value is highlighted.
"Active" machines are defined as those that
have communicated with the File Server in
the last 15 minutes. Highlighting goes away
when the value goes back below the
threshold. By default, no threshold is set.
Example of a legal value: ws 65
- disk <percent full>%. Indicates the maximum
percentage of the disk that can be full
before the value is highlighted; in that
case legal values are the integers between 0
and 99.
Examples of legal values: disk 90% and disk
72%.
OR
disk <minimum blocks free>. Indicates the
minimum number of kilobyte blocks that must
be available on the partition if the value
is not to be highlighted.
Examples of legal values: disk 1500 and
disk 5000.
Specify one type of value or the other.
Highlighting goes away when the value goes
back below the percent threshold or above
the blocks-free threshold. By default, the
threshold is 95%.
-debug enables debugging output and directs it into the
specified file. Providing a complete pathname is
best; otherwise it is interpreted relative to the
current working directory. By default, no
debugging output is produced.
-help prints the online help for this command. Do not
provide any other arguments or flags with this
one.
OUTPUT
Scout can display statistics either in a dedicated window or
on a plain screen if a windowing environment is not
available. For best results, the window or screen should
have the ability to print in reverse video.
The scout screen has three main parts: the banner line, the
statistics display region and the message/probe line.
The Banner Line
The word "Scout" appears in the banner line at the top of
the window or screen, to indicate that scout is running.
Additional information may appear in the banner line if the
system administrator includes the appropriate
flags/arguments on the command line. By default, this
information does not appear.
- The name of the machine executing scout. The
-hostname flag causes scout to display this
machine name in the banner line. This is useful
in cases where the administrator wants to run
scout on several machines, but view the output on
only one machine (to achieve this, he or she could
open several windows on a machine, then telnet to
a different machine in each one in order to run
scout there).
An example: if a user runs scout on the machine
client1.transarc.com and use the -hostname flag,
the banner line will read
[client1.transarc.com] Scout
- The ``basename'' of the file server machines being
monitored. Scout identifies a File Server process
by the name of the file server machine it is
running on. If all of the machine names in a
scout window end in the same string (share the
same basename), then it is useful to display the
basename in one place rather than on every machine
name. The -basename argument causes scout to
display the indicated basename on the banner line.
The issuer then leaves the basename off of each
file server machine name provided, specifying only
the distinguishing prefix rather than the complete
machine name.
An example, if a user specifies a value of
transarc.com for -basename, the banner line will
read
Scout for transarc.com
The Statistics Display Region
In this region, which takes up the majority of the window,
Scout displays the statistics gathered for each File Server
process. Each process appears on its own line.
The region is divided into six columns, labeled as indicated
and displaying the following information:
- Conn: number of connections with clients. The
first column displays the number of RPC
connections open between the File Server process
and client machines. This number should equal or
exceed the number in the Ws column (explained
below). It can exceed it because each process
access group (PAG) requires a separate RPC
connection, and one client machine can handle
several PAGs. The administrator can use the
-attention argument to specify the value at which
entries in the column should be highlighted.
- Fetch: bytes fetched from File Server. The second
column displays the number of bytes of data that
client machines have fetched from the File Server
process. This number is reset to zero each time
the File Server process restarts. The
administrator can use the -attention argument to
specify the value at which entries in the column
should be highlighted.
- Store: bytes stored by the File Server. The third
column displays the number of bytes of data that
client machines have sent to the File Server
process for storage. This number is reset to zero
each time the File Server process restarts. The
administrator can use the -attention argument to
specify the value at which entries in the column
should be highlighted.
- Ws: number of "active" client machines. The
fourth column displays the number of client
machines (workstations) that have communicated
with the File Server process within the last 15
minutes. This number is likely to be smaller than
the number in the Conn column, because a single
client machine can have several connections open
to one File Server. The administrator can use the
-attention argument to specify the value at which
entries in the column should be highlighted.
- File server machine name. The fifth, unlabeled,
column displays the name of the file server
machine on which the File Server process is
running. If a name is too long to fit in the
field, it is truncated and an asterisk (*) appears
as the last character in the name. Using the
-basename argument is a good way to avoid
truncation, but only if all machine names end in a
common string. Entries in this column become
highlighted if the File Server process does not
respond to scout's probes.
- Disk attn: disk usage. The sixth column displays
how many kilobyte blocks are available on each AFS
disk partition on the file server machine. The
display for each partition has the form
x:free_blocks
where x indicates the partition name. For
example, a:8949 specifies that partition /vicepa
has 8,949 free kilobyte blocks. The available
space may be displayed for up to 10 partitions.
If the window is not wide enough for all of the
partition entries to appear on a single line,
scout automatically creates multiple lines,
"stacking" the partition entries into sub-columns
within the Disk attn column.
The label on the Disk attn column indicates the
threshold at which values are highlighted. By
default, the label is
Disk attn: > 95% used
because by default scout highlights the entry for
any partition that is over 95% full. The
administrator may use the -attention argument to
change this default to either another percentage
or a minimum number of free blocks.
The Message/Probe Line
The bottom line of the scout screen indicates how many times
scout has "probed" the File Server processes for statistics.
The columns in the Statistics Display region above this line
display the result of the latest probe. By default, scout
probes the File Servers every 60 seconds, but the
administrator can use the -frequency argument to specify a
different number of seconds.
EXAMPLE
See the chapter on scout in the AFS System Administrator's
Guide, which illustrates the on-screen displays that result
from different combinations of switches and flags.
PRIVILEGE REQUIRED
None.

View File

@ -1,85 +0,0 @@
tokens AFS Commands tokens
NAME
tokens -- display all tokens.
tokens
DESCRIPTION
Instructs the Cache Manager on the local machine to display
all tokens (tickets) it has for the issuer. AFS server
processes require that their clients present a token as
evidence that they have authenticated in the server's local
cell.
OUTPUT
The output lists one token for each cell in which the user
is authenticated. The output indicates:
- the user's AFS UID, if it is available for display
- the server for which the token is valid (normally,
"afs"). This includes a cell specification.
- the day and time the token expires
An --End of list-- message appears at the end of the output.
If the user is not authenticated in any cell, this message
is all that appears.
EXAMPLES
The following shows the output when the issuer is not
authenticated in any cell.
% tokens
Tokens held by the Cache Manager:
[ 1] --End of list--
The following shows the output when the issuer is
authenticated in Transarc Corporation cell, where he or she
has AFS UID 1000.
% tokens
Tokens held by the Cache Manager:
[ 1]User's (AFS ID 1000) tokens for afs@transarc.co
[Expires Jan 2 10:
[ 2] --End of list--
The following shows the output when the issuer is
authenticated in Transarc Corporation cell, Andrew cell at
Carnegie Mellon University and Athena cell at MIT. The user
has different AFS UIDs in the three cells. Tokens for last
cell are expired:
% tokens
Tokens held by the Cache Manager:
[ 1]User's (AFS ID 1000) tokens for afs@transarc.co
[Expires Jan 3 10:00]
[ 2]User's (AFS ID 4286) tokens for afs@andrew.cmu.
[Expires Jan 3 1:34]
[ 3]User's (AFS ID 22) tokens for afs@athena.mit.ed
[>>Expired<<]
[ 4] --End of list--
PRIVILEGE REQUIRED
None.
MORE INFORMATION
klog
unlog

View File

@ -1,70 +0,0 @@
unlog AFS Commands unlog
NAME
unlog -- discard all tokens.
+
unlog [<cell name> ] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
This command does not use the conventions of the AFS command
suites. Therefore "unlog" and "-help" must be typed in
full.
DESCRIPTION
Instructs the Cache Manager on the local machine to discard
the specified token(s) currently held for the issuer. If no
cell names are provided, the Cache Manager discards the
token for the local cell and all tokens for foreign cells.
WARNINGS
Specifying one or more cell names may cause brief
"authentication outages," during which the issuer has no
valid tokens in any cell. This is because the command
actually discards all tokens and then restores those that
the issuer did not specify with cell name (and so presumably
wishes to retain). The authentication outage may interrupt
the operation of jobs that require authentication.
ARGUMENTS
cellname specifies each cell for which the Cache
Manager should discard the token. If
omitted, all tokens are discarded.
Abbreviated cell names are acceptable, but
which abbreviations are legal depends on the
naming service available in the cell at the
time the command is issued.
-help prints the online help for this command. Do
not provide any other arguments or flags
with this one.
EXAMPLE
The following discards all tokens.
% unlog
The following discards only the tokens for the transarc.com
and athena.mit.edu cells.
% unlog transarc.com athena
PRIVILEGE REQUIRED
None.
MORE INFORMATION
klog
tokens

View File

@ -1,182 +0,0 @@
upclient AFS Commands upclient
NAME
upclient -- initialize client portion of Update Server.
/usr/afs/bin/upclient <source machine> [-t <checking
frequency>] [-clear] [-crypt] <directory to
+
check>
DESCRIPTION
Initializes the client portion of the Update Server. It
checks periodically that the files in the specified
directories on the local machine match those files in the
corresponding directory on the source machine. If a file
does not match, this process overwrites the local file with
the file from the source machine.
The -clear and -crypt flags determine whether or not
upclient requests that upserver encrypt the contents of the
files it is distributing before transferring them across the
network. The request applies to the files in all
directories requested by upclient (whereas upserver supports
different levels of encryption for different directories).
The upserver will comply with a request only if it protects
the directory to the same extent as specified in its
initialization command (i.e., will not fill an upclient's
request for -clear transfer if the upserver is set for
-crypt).
By default, the upclient in the United States edition of AFS
requests encryption. The upclient in the international
edition of AFS does not request encryption, because the
international edition does not provide encryption
capability. The -crypt flag is not available in the
international edition of this command.
WARNING
This command is not normally issued at the command shell
prompt, but rather placed into a file server machine's
/usr/afs/local/BosConfig with the bos create command. If it
is ever issued at the command shell prompt, the issuer must
be working on a file server machine. The upclient process
uses the local KeyFile when generating a key for mutually
authenticating with the upserver process; they always
mutually authenticate, whether or not the data they pass is
encrypted.
This command does not use the syntax conventions of the AFS
command suites, so the command and switch names must be
typed in full.
The -crypt flag is not available in the international
edition of AFS.
Cells using the international edition of AFS should not use
the Update Server to distribute the contents of
/usr/afs/etc. The contents of this directory are sensitive,
and the international edition of AFS does not provide any
facility for encrypting files before transfer across the
network.
ARGUMENTS
source machine
names either the cell's system control machine
(if directory to check is /usr/afs/etc) or the
binary distribution machine for the local
machine's CPU/operating system type (if
directory to check is /usr/afs/bin).
-t specifies how often the upclient process should
check directory to check, in number of seconds.
If omitted, this argument default to 300 (5
minutes). This number effectively determines
how long it will take for changes made on
source machine to propagate to this machine.
-clear indicates that upclient requests upserver to
transfer information in unencrypted form. Use
this flag to change the default for the United
States edition of AFS.
-crypt indicates that upclient requests upserver to
transfer information in encrypted form. With
the United States edition of AFS, use this flag
to set the default explicitly. This flag is
not available with the international edition of
AFS.
directory to check
names each directory to check for modified
files. The usual choices are:
- /usr/afs/bin, in which case the
recommended name for the process
(assigned with the -instance argument
on bos create) is upclientbin. The
source machine should be the binary
distribution machine for the local
machine's CPU/operating system type.
It is recommended that the -clear
flag be used for /usr/afs/bin, since
binaries are not particularly
sensitive and encrypting them can
take a long time.
- /usr/afs/etc, in which case the
recommended name for the process
(assigned with the -instance argument
on bos create) is upclientetc. The
source machine should be the system
control machine.
Note: This option is discouraged for
the international edition of AFS.
See the WARNING above.
- both /usr/afs/bin and /usr/afs/etc,
in which case the recommended name
for the process (assigned with the
-instance argument on bos create) is
upclient. The source machine should
be the system control machine and
also the binary distribution machine
for this machine's CPU/operating
system type.
Note: This option is discouraged for
the international edition of AFS.
See the WARNING above.
EXAMPLES
The following bos create command creates an upclient process
on fs4.transarc.com that refers to fs1.transarc.com as the
source for both /usr/afs/bin and /usr/afs/etc (thus
fs1.transarc.com is both the system control machine and the
binary distribution machine of fs4.transarc.com's type).
The updates are transferred every 120 seconds. The command
requests /usr/afs/bin in unencrypted form. It does not
specify a level of encryption for /usr/afs/etc, so the
default is used:
- with the United States edition of AFS, upclient
requests /usr/afs/etc in encrypted form.
- with the international edition of AFS, upclient
requests /usr/afs/etc in unencrypted form, because
encryption of user-level data is not possible.
Thus, this command is not suitable with the
international editionMthe Update Server should not
be used to update /usr/afs/etc.
Type the command on a single line.
% bos create fs4.transarc.com upclient simple
"/usr/afs/bin/upclient fs1.transarc.com -t 120
/usr/afs/etc -clear /usr/afs/bin"
PRIVILEGE REQUIRED
Issuer must be listed in /usr/afs/etc/UserList to place this
command in /usr/afs/local/BosConfig, because that is the
privilege required to issue bos create.
MORE INFORMATION
bos create
upserver

View File

@ -1,107 +0,0 @@
upserver AFS Commands upserver
NAME
upserver -- initialize server portion of Update Server.
+ +
/usr/afs/bin/upserver [<directory> ] [-crypt <directory> ]
+
[-clear <directory> ]
DESCRIPTION
Initializes the server portion of the Update Server
(upserver process), specifying which of its local disk
directories the process is willing to distribute in response
to requests from the client portion of the Update Server
(upclient process) running on other machines. If no
directories are specified, the server portion can distribute
the contents of any directory on its local disk.
The command also determines whether the upserver is willing
to distribute a directory's contents in unencrypted form or
not. By default, the encryption level is -clear, meaning
that upserver transfers the directory's contents in
unencrypted form unless an upclient requests encryption.
When -crypt is specified for a directory, the upserver will
refuse an upclient's request for unencrypted transfer. With
the United States edition of AFS, the effect of -crypt is to
guarantee that upserver transfers a directory's contents
only in encrypted form. With the international edition, the
effect of -crypt is to prevent upserver from ever
transferring the directory's contents, because the upclient
has no way to comply with the requirement that it request
the contents in encrypted form (the -crypt flag on upclient
is not available in the international edition). Use -crypt
and -clear to toggle the level of encryption for directories
as appropriate (the EXAMPLES section illustrates their use).
WARNING
This command is not normally issued at the command shell
prompt, but rather placed into a file server machine's
/usr/afs/local/BosConfig with the bos create command. If it
is ever issued at the command shell prompt, the issuer must
be working on a file server machine. The upserver process
uses the local KeyFile when handling keys for mutually
authenticating with the upclient process and encrypting
data. The two processes always mutually authenticate,
whether or not data is encrypted.
This command does not use the syntax conventions of the AFS
command suites, so the command and switch names must be
typed in full.
Cells using the international edition of AFS should not use
the Update Server to distribute the contents of
/usr/afs/etc. The contents of this directory are sensitive,
and the international edition of AFS does not provide any
facility for encrypting them before transfer across the
network. One way to prevent this distribution is to mark
/usr/afs/etc with -crypt.
ARGUMENTS
directory names each directory to be distributed in
unencrypted form (because they appear before the
first -crypt or -clear flag). If omitted, all
directories on the machine's local disk are
eligible for distribution.
-crypt precedes a list of one or more directories which
upserver will distribute only in encrypted form.
-clear precedes a list of one or more directories which
upserver may distribute in unencrypted form (but
if upclient requests them in encrypted form, then
upserver encrypts them). This argument is
necessary only if the issuer has previously used
-crypt on the command line and wishes to switch
back to unencrypted form.
EXAMPLES
The last parameter (enclosed in quotes) in the following
bos create command causes the upserver to distribute
/usr/afs/bin in unencrypted form and /usr/afs/etc in
encrypted form.
% bos create fs1.transarc.com upserver simple
"/usr/afs/bin/upserver /usr/afs/bin -crypt /usr/afs/etc"
PRIVILEGE REQUIRED
Issuer must be listed in /usr/afs/etc/UserList to place this
command in /usr/afs/local/BosConfig, because that is the
privilege required to issue bos create.
MORE INFORMATION
bos create
upclient

View File

@ -1,79 +0,0 @@
AFS Commands
1. The uss Commands and Template Lines
------------------------------------------------------------
The uss commands help administrators create user accounts in
their system more easily and efficiently. Without them,
administering accounts can become time consuming. Creating
an account "by hand" requires issuing at least six separate
commands to five different AFS servers, whereas a single
uss add command can accomplish all the equivalent actions
once the issuer sets up the necessary template. Even
better, a single issue of the the uss bulk command can
create multiple accounts at once, after the necessary
preparations have been made.
Refer to chapter 11 in the Reference Manual for a complete
summary list of uss commands and their syntax.
1.1 Common Arguments and Flags
Most uss commands accept the following optional arguments
and flags. They are listed in the command descriptions
where they apply, and are described here in detail:
[-cell <cell name>]
This argument specifies that the command should be run in
the cell specified by cell name. By default, commands are
executed in the local cell, as defined in
/usr/vice/etc/ThisCell on the client machine on which the
command is issued. The issuer may abbreviate cell name to
the shortest form that distinguishes it from the other cells
listed in /usr/vice/etc/CellServDB on the client machine on
which the command is issued.
[-admin <administrator to authenticate>]
This argument names the user name whom the Authentication
Servers should authenticate for purposes of creating an
Authentication Database entry. If the issuer does not
provide it, the authentication is attempted for the
effective user name (the one under which the issuer is
logged into the local machine's UNIX file system). With or
without this argument, UNIX commands invoked by this command
(for instance, /etc/chown) are executed under the effective
user name.
l
AFS Command Reference ManuaThe uss Commands and Template Li
[-dryrun]
This flag indicates that the command interpreter should not
actually execute the command, but should report all the
actions it would perform if executing it. This flag is
useful for verifying that the account will be configured as
the issuer wishes. It does not, however, necessarily reveal
failures that will result if the uss command interpreter
encounters any circumstances that make it impossible to
carry out a requested action. Combining this flag with
-verbose yields more information.
[-help]
This flag has the same function as the bos help command: it
prints the command's online help message on the screen. No
other arguments or flags should be provided at the same
time. Even if they are, this flag overrides them, and the
only effect of issuing the command is that the help message
appears.
1.1.1 The Privilege Required for uss Commands
The issuer of a uss command must have all the rights
required for performing the equivalent actions individually.
See the PRIVILEGE REQUIRED section of each command
description for details.

View File

@ -1,286 +0,0 @@
uss add AFS Commands uss add
NAME
uss add -- create user account.
uss add -user <login name> [-realname <full name in
quotes>]
[-pass <initial passwd>] [-server <file server for home
volume>]
[-partition <file server's disk partition for home volume>]
[-mount <home directory mount point>]
[-uid <uid to assign the user>]
[-template <pathname of template file>]
+
[-verbose] [-var <auxiliary argument pairs (num val)> ]
[-cell <cell name>] [-admin <administrator to
authenticate>]
[-dryrun] [-overwrite] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
uss ad -us <login name> [-r <full name in quotes>]
[-pas <initial passwd>] [-s <file server for home volume>]
[-par <file server's disk partition for home volume>]
[-m <home directory mount point>] [-ui <uid to assign the
user>]
[-t <pathname of template file>] [-ve] [-va <auxiliary
+
argument pairs (num val)> ]
[-c <cell name>] [-a <administrator to authenticate>] [-d]
[-o] [-h]
DESCRIPTION
Creates entries in the Protection Database and
Authentication Database for the user name login name. If
initial passwd is provided, it is stored as the user's
password in the Authentication Database after conversion
into a form suitable for use as an encryption key. , or the
By default, the Protection Server automatically allocates an
AFS UID for the new user; the issuer may specify an
alternate with the -uid argument.
The other results of the command depend on what appears in
the template file specified with pathname of template file.
The issuer must provide any argument whose corresponding
variable appears in the template (the ARGUMENTS section
below maps the arguments and variables). If the issuer
provides an argument for which the corresponding variable
does not appear in the template, the value is ignored.
Failure to provide a value for a variable causes the account
creation to fail at the point where the command interpreter
first encounters the variable in the template.
Syntax definitions for the lines in the template follow
descriptions of the uss commands.
WARNING
If this command is issued on a machine running Ultrix and
the template file being used is not 0-length, the user must
use the -admin argument to adopt a privileged AFS identity
while remaining "root" in the local machine's UNIX file
system. Ultrix allows only "root" to issue the /etc/chown
command that uss add invokes to set the owner of files and
directories created by template lines. At the same time,
AFS allows only a privileged administrator to issue the AFS
commands invoked; "root" is not normally a privileged AFS
administrator.
Other operating systems allow users other than "root" to
issue /etc/chown, but users may still find it convenient to
adopt different identities in the AFS and UNIX file systems.
Being authenticated in AFS as a privileged user is required
under all operating systems.
ARGUMENTS
-user specifies the user name that the user will type at
the login prompt. It also becomes the name of the
user's Protection and Authentication Database
entries.
Corresponding variable in template: $USER.
-realname specifies the user's real name. Surround it with
double quotes as delimiters, since it contains
spaces and possibly punctuation. If not provided,
it defaults to the user name provided with -user.
Corresponding variable in template: $NAME. The
most common use for this variable is when creating
a file to be incorporated as an entry in the
cell's /etc/passwd file.
-pass defines the user's initial password. Many UNIX
applications and utilities require that this be no
longer than eight characters; the AFS commands
that handle passwords accept strings of virtually
unlimited length. If not provided, this argument
defaults to the string changeme.
Corresponding variable in the template: none.
-server specifies the file server machine on which the
user's volume will reside.
Corresponding variable in template: $SERVER.
-partition
specifies the partition on file server for home
volume on which the user's volume will reside.
Corresponding variable in template: $PART.
-mount specifies the pathname to the user's home
directory. If the issuer does not provide a full
pathname, it is interpreted relative to the
working directory.
Corresponding variable in template: $MTPT, but on
the "V" line only. Occurrences of $MTPT on lines
following the "V" line take their value from the
"V" line's <mount point> field. Thus the exact
value of this command line argument becomes the
value for post-"V" line occurrences of $MTPT only
if $MTPT appears alone in the <mount point> field.
-uid specifies the AFS UID to be assigned to the new
user. It should be a positive integer. The
issuer may wish to pre-verify with pts listmax
that the intended number is greater than the
current largest AFS UID: if the requested AFS UID
is already in use, the account creation will
terminate with an error. If the issuer does not
provide this argument, the Protection Server
assigns an AFS UID automatically; as with manual
account creation, automatic allocation is
preferred.
Corresponding variable in template: $UID.
-template specifies which template the command interpreter
should consult. If the issuer does not provide
this argument, the command interpreter looks for a
template called uss.template in the following
directories, which it searches in this order:
1. the working directory
2. /afs/cellname/common/uss, where
cellname names the local cell
3. /etc
If the issuer provides a name other than
uss.template without a pathname, the command
interpreter looks for it in the directories just
listed, in the same order. If the issuer provides
a full or partial pathname, the command
interpreter consults the specified file without
consulting the directories just listed; it
interprets partial pathnames relative to the
working directory.
If the template is 0-length, the new account will
consist solely of Protection and Authentication
Database entries.
-verbose causes the command interpreter to produce a more
detailed trace of the actions it is executing. By
default, only warnings and error messages appear.
-var specifies values for each of the number variables
$1 through $9 found in the template. The number
variables allow the issuer to provide values for
variables not built-in to the uss add command.
Corresponding variables in template: $1 through
$9.
Each instance of this argument has two parts,
separated by a space:
- an integer between 1 and 9, not preceded
by the dollar sign. Each number matches
the variable in the template.
- a value
See the chapter on uss in the AFS System
Administrator's Guide for further explanation.
-cell specifies the cell in which to run the command.
See section 7.1 in the Reference Manual for more
details. -admin
names the user whom the Authentication Servers
should authenticate for purposes of creating an
Authentication Database entry. See section 7.1 in
the Reference Manual for more details. Note:
Issuers of this command on machines running Ultrix
must use this argument in order to adopt an
privileged AFS identity while remaining "root" in
the local machine's UNIX file system. See the
preceding WARNING.
-dryrun indicates that the command interpreter should not
actually execute the command, but should report
all the actions it would perform if executing it.
See section 7.1 in the Reference Manual for more
details.
-overwrite
instructs the command interpreter to overwrite any
directories, files and links that exist in the
file system and for which it also finds
definitions on template "D", "E", "F", "L" and "S"
lines. If this flag is omitted, the command
interpreter prompts once for confirmation that the
issuer really wants to overwrite all such
elements.
-help prints the online help for this command. Do not
provide any other arguments or flags with this
one. See section 7.1 in the Reference Manual for
more details.
EXAMPLES
When the template is 0-length, the following creates a
"dummy" account called admin with entries in the Protection
and Authentication Databases only.
% uss add admin
The combination of the following "V" line in the template
uss.tpl and uss add command creates Protection and
Authentication Database entries for user name smith. It
would also create a volume called user.smith with a quota of
2500 kilobyte blocks, mounted at
/afs/transarc.com/usr/smith, the ACL for which gives smith
all rights. See the description of the "V" line for an
explanation of its fields. Note that only the template's
name is provided, not its pathname, as it is assumed it
resides in one of the three expected directories.
V user.$USER $SERVER.transarc.com /vice$PART $1
/afs/transarc.com/usr/$USER $UID $USER all
% uss add smith "John Smith" js_pswd fs2 b -t uss.tpl -v 1
2500
The chapter on uss in the AFS System Administrator's Guide
presents more extended examples of template lines and
commands.
PRIVILEGE REQUIRED
Issuer (or person named with -admin flag) must belong to the
system:administrators group in the Protection Database and
must have the ADMIN flag in his or her Authentication
Database entry. If the template contains a "V" line, the
issuer must be listed in /usr/afs/etc/UserList and must have
at least ADMINISTER and INSERT rights in the directory where
the mount point is to be created. If the template includes
lines that create other types of objects (directories, files
or links), the issuer must have the privilege(s) necessary
to create them.
Under Ultrix, only "root" can issue the /etc/chown command
invoked when a file or directory is created. See the
WARNING section.

View File

@ -1,59 +0,0 @@
uss apropos AFS Commands uss apropos
NAME
uss apropos -- show each help entry containing keyword.
uss apropos -topic <help string> [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
uss ap -t <help string> [-h]
DESCRIPTION
Displays the first line of the help entry for any uss
command that has help string in its name or short
description.
ARGUMENTS
-topic specifies the keyword string to search for. If it
is more than a single word, surround it with
double quotes or other delimiters. Type all help
strings for uss commands in all lowercase letters.
-help prints the online help for this command. Do not
provide any other arguments or flags with this
one. See section 7.1 in the Reference Manual for
more details.
OUTPUT
The first line of a command's online help entry names the
command and briefly describes what it does. The uss apropos
command displays that first line for any uss command where
help string is part of the command name or first line.
To see the remaining lines in a help entry, which provide
the command's alias (if any) and syntax, use the uss help
command.
EXAMPLE
The following lists all uss commands that have the word
"create" in their operation code or short online
description.
% uss apropos create
add: create a new user
PRIVILEGE REQUIRED
None.
MORE INFORMATION
uss help

View File

@ -1,325 +0,0 @@
uss bulk AFS Commands uss bulk
NAME
uss bulk -- execute multiple uss commands.
uss bulk -file <bulk input file> [-template <pathname of
template file>]
[-verbose] [-cell <cell name>]
[-admin <administrator to authenticate>] [-dryrun]
[-overwrite]
[-help]
uss b -f <bulk input file> [-t <pathname of template
file>] [-v] [-c <cell name>]
[-a <administrator to authenticate>] [-d] [-o] [-h]
DESCRIPTION
Executes the uss commands listed in bulk input file, which
must already exist. If bulk input file has add commands in
it that create complete (rather than authentication-only)
accounts, then the issuer must also specify a template using
pathname of template file.
WARNING
The following warning applies when all of the following are
true:
- this command is issued on machines running Ultrix
- the bulk file contains add lines
- the template file used for the account creations
is not 0-length.
In this set of circumstances, the issuer must use the -admin
argument to adopt a privileged AFS identity while remaining
"root" in the local machine's UNIX file system. Ultrix
allows only "root" to issue the /etc/chown command that the
add command invokes to set the owner of files and
directories created by template lines. At the same time,
AFS allows only a privileged administrator to issue the AFS
commands invoked; "root" is not normally a privileged AFS
administrator.
Other operating systems allow users other than "root" to
issue /etc/chown, but users may still find it convenient to
adopt different identities in the AFS and UNIX file systems.
Being authenticated in AFS as a privileged user is required
under all operating systems.
ARGUMENTS
-file names the file containing the uss commands to
execute. If the issuer does not provide a
pathname, the command interpreter assumes the file
is in the working directory. The BULK FILE FORMAT
section details the proper format for command
lines in the bulk file.
-template names the template file for any add commands that
appear in the bulk input file. If the issuer does
not provide a pathname, the command interpreter
assumes the template file is in the working
directory. See the AFS System Administrator's
Guide for a definition of template format.
-verbose causes the command interpreter to produce (on
stdout) a more detailed trace of the actions it is
executing. By default, only warnings and error
messages appear.
-cell specifies the cell in which to run the command.
See section 7.1 in the Reference Manual for more
details. -admin
names the user whom the Authentication Servers
should authenticate for purposes of creating an
Authentication Database entry. See section 7.1 in
the Reference Manual for more details. Note: When
the bulk file contains add lines, issuers of the
uss bulk command on machines running Ultrix must
use this argument in order to adopt an privileged
AFS identity while remaining "root" in the local
machine's UNIX file system. See the preceding
WARNING.
-dryrun indicates that the command interpreter should not
actually execute the command, but should report
all the actions it would perform if executing it.
See section 7.1 in the Reference Manual for more
details.
-overwrite
instructs the command interpreter (when add lines
appear in the bulk file) to overwrite any
directories, files and links that exist in the
file system related to the user for which it also
finds definitions on template "D", "E", "F", "L"
and "S" lines. If this flag is omitted, the
command interpreter prompts, once for each add
line in the bulk file, for confirmation that the
issuer really wants to overwrite those elements.
This flag should not be used if the bulk file does
not contain add lines.
-help prints the online help for this command. Do not
provide any other arguments or flags with this
one. See section 7.1 in the Reference Manual for
more details.
BULK FILE FORMAT
Five types of command lines can appear in the bulk file:
add, delete, exec, savevolume, and delvolume. Each command
line should have a carriage return only at the end, even
though it may cover several lines on the screen.
The add line
Each add line is the equivalent of a uss add command issued
on the command line. Begin the line with "add" only, not
"uss add", and provide the arguments in the same order they
would appear on the uss add command line, separating each
with a colon. Only the first argument, corresponding to the
command line argument -user, is required. To omit a value
for an argument (presumably because it is optional or the
template specifies a constant value for it), type nothing
between two colons. After the last argument provided, end
the line with either a colon and carriage return, or a
carriage return alone.
The eighth through seventeenth fields are for assigning
values to the number variables, with the fields listed in
increasing numerical order. The issuer must indicate either
a value or an empty field (nothing between two colons) for
every variable that precedes the last one being assigned an
actual value. It is acceptable, but not necessary, to
indicate empty fields for any number variables following the
last one actually assigned a value.
The following concrete representation uses the same
identifiers for arguments as the uss add definition. The "{
}" notation indicates that each entry between vertical bars
is one possible choice. Remember that an instruction like
this would appear on a single line in the actual bulk file.
add <login name>[:<full name>][:<initial passwd>][:<file
[:<file server's disk partition for home volume>][:<home
[:<uid to assign the user>][:{<var1> | :<var1>:<var2> | :
. . . . et cetera through. . . .
| :<var1>:<var2>:<var3>:<var4>:<var5>:<var6>:<var7>:<var8
Do not surround full name with double quotes in the bulk
file, even though its counterpart on the regular uss add
command line must be so surrounded.
The EXAMPLES section below may help to clarify the format of
the add line.
The delete line
Each delete line is the equivalent of a uss delete command
issued on the command line. Begin the line with "delete"
only, not "uss delete", and provide the arguments in the
same order they would appear on the uss delete command line,
separating each with a colon. Provide values for at least
the first two arguments (corresponding to -user and
-mountpoint on the command line). The third field,
corresponding to -savevolume, is optional; there are three
possible values:
- if the word savevolume appears, the volume and
VLDB entry will not be removed
- if the word delvolume appears, the volume and VLDB
entry will be removed
- if the field is blank, then the volume will be
treated according to the prevailing default (see
the following description of the savevolume and
delvolume lines to learn how to set the default).
After the last argument provided, end the line with either a
colon and carriage return or a carriage return alone.
The following concrete representation uses the same
identifiers for arguments as does the uss delete definition.
The "{ }" notation indicates that each entry between a
vertical line is one possible choice. Remember that an
instruction like this would appear on a single line in the
actual bulk file. The EXAMPLES section illustrates use of
this line.
delete <account name>:<full mount point pathname>
[:{savevolume | delvolume | }]
The exec line
This line causes the indicated UNIX shell command to be
executed. Its format is
exec <command string to execute>
The savevolume and delvolume lines
The savevolume and delvolume lines set the default treatment
of volumes in delete lines that follow them in the bulk
file. The savevolume line prevents the removal of volume
and VLDB entry for all subsequent delete lines. The
delvolume line causes the removal of volume and VLDB entry
for all subsequent delete lines. The default treatment if
neither line appears in a bulk file is to remove the volume
and VLDB; delete lines that appear before the first
savevolume line are also treated this way.
An explicit savevolume or delvolume instruction in the third
field of an individual delete line overrides the default in
effect at the time. If nothing appears in the third field,
the default is obeyed.
Neither command takes arguments (the word savevolume or
delvolume should appear by itself on the line). The effect
of either line lasts until the end of the bulk file, or
until its opposite appears in the file. Multiple instances
of each command can be used to toggle back and forth between
removal and non-removal of volumes.
EXAMPLES
The following shows the proper format for an add line in the
bulk file when only the first (required) argument is
provided, and when the first three arguments are provided.
In the first case, the user's "real name" is set to anderson
and password to changeme (the defaults).
add anderson
add smith:John Smith:js_pswd
The following add line example supposes that the Transarc
Corporation cell uses a template with the following "V" line
in it:
V user.$USER $SERVER.transarc.com /vicep$PART 2000
/afs/transarc.com/usr/$3/$USER $UID $USER all
To create an account for users John Smith from the Marketing
Department and Pat Jones from the Finance Department, the
appropriate add commands in the bulk file might be:
add smith:John Smith::fs1:a:::::marketing
add jones:Pat Jones::fs3:c:::::finance
The effect would be to establish an account called smith in
the Protection and Authentication Databases, with an initial
password changeme and a value for $UID provided by the
Protection Server. His volume, user.smith, would reside on
partition "/vicepa" of file server machine
"fs1.transarc.com" and would be mounted at
/afs/transarc.com/usr/marketing/smith. He would own his
home directory and have full access to it. The account for
jones would be similar, except that it would reside on
partition "/vicepc" of file server machine
"fs3.transarc.com" and would be mounted at
/afs/transarc.com/usr/finance/jones.
Notice that the fields corresponding to <home directory
mount point>, <uid to assign the user>, <var1> and <var2>
are empty (between a and marketing on the first example
line) since their corresponding variables do not appear in
the template file. The <initial passwd> field is also
empty.
The issuer could, if he or she choose, specify values/empty
fields for all nine number variables. In this case, the
bulk file lines shown above would look like:
add smith:John Smith::fs1:a:::::marketing::::::
add jones:Pat Jones::fs3:c:::::finance::::::
The following shows a complete bulk file containing a set of
delete lines combined with a savevolume line. Because
smith, pat, and rogers appear before the savevolume command
and their third field is blank, the volume will be removed.
The volume for terry will not be removed, but johnson's will
be because the delvolume in the third field overrides the
current default.
delete smith:/afs/transarc.com/usr/smith
delete pat:/afs/transarc.com/usr/pat
delete rogers:/afs/transarc.com/usr/rogers
savevolume
delete terry:/afs/transarc.com/usr/terry
delete johnson:/afs/transarc.com/usr/johnson:delvolu
The following exec example supposes that the bulk file
contains a set of add lines followed by delete lines. The
operator places this line between the two sets to flag when
the additions are finished and the deletions beginning.
exec echo "Additions completed; beginning deletions.
PRIVILEGE REQUIRED
Issuer (or person named by -admin argument) must have the
privileges necessary to run all of the commands in the bulk
file individually.
MORE INFORMATION

View File

@ -1,116 +0,0 @@
Template "D" line AFS Commands Template "D" line
NAME
Template "D" line -- create a directory.
D <pathname> <mode> <owner> <access list>
DESCRIPTION
Creates a directory anywhere in the file system. It
intended use is to create a subdirectory in the home
directory defined on the preceding "V" line.
The "D" line should appear after the "V" line if any
variables in it take their values from the "V" line
(notably, $MTPT). Any number of "D" lines may appear in a
template.
WARNING
Using the "D" line to create directories outside AFS (e.g.,
in the UNIX file system of the workstation where the uss
command is being issued) introduces two complications:
- The first complication arises if the issuer wishes
to set the <owner> field to something other than
his or her own user name or UNIX UID. The default
owner of a UNIX file system directory is the user
who created it (in this case, the issuer of the
uss command). Changing this default, which uss
will attempt if anything other than the issuer's
name appears in the <owner> field, requires
issuing the chown command, which in turn requires
being the super-user "root". If the issuer wishes
to specify an alternate owner, he or she must be
"root" in the UNIX file system and use the -admin
flag in order to be recognized in AFS as a
privileged administrator. See the description of
the -admin argument for uss add and uss bulk.
- The second complication is that it is not possible
to associate an ACL with a non-AFS directory, so
uss will always print a warning message about
that. It will create the directory nonetheless,
and the <access list> field must always be
provided.
The preferred method for automatic placement of directories
on the local disk is the package program, which runs as
"root".
ARGUMENTS
D should be a capital letter and tells the command
interpreter that this is a directory-creation
instruction.
pathname is the full pathname of the directory.
mode sets the UNIX mode bits for the directory.
Provide a four-digit decimal number in this field,
such as 0755 or 0744. Keep in mind that the
"user" x bit must be turned on for a directory.
owner names the directory's owner (in the UNIX file
system sense). If the directory is being placed
in AFS, the $UID variable should appear in this
field. If the directory is being placed into the
UNIX file system rather than AFS, this field must
contain the user name or UNIX UID of the uss
command's issuer, or the account creation will
abort at that point.
access list
defines the access control list for the new home
directory. It must be included for non-AFS
directories, even though it is ignored in that
case. The list may define one or more pairs, each
consisting of
- a user name or Protection Database group
name
- the access rights
separated by a space. See the fs setacl command
to learn about the access rights available with
AFS.
At the least, the new user needs to be given all
access rights. This could be achieved with
$USER all
Unlike the "V" line, there are no default pairs on
the ACL of a directory created with a "D" line.
However, as with the "V" line it is not possible
to grant any rights to the issuer of the uss
command. As the last step in account creation,
the uss command interpreter automatically deletes
that person from any access control lists set
during the creation process.
EXAMPLE
The following creates a public directory in the user's home
directory, makes the user own the directory and gives
him/her all access rights.
D $MTPT/public 0755 $UID $USER all

View File

@ -1,98 +0,0 @@
uss delete AFS Commands uss delete
NAME
uss delete -- delete user account from system.
uss delete -user <login name>
-mountpoint <mount point for user's volume> [-savevolume]
[-verbose] [-cell <cell name>]
[-admin <administrator to authenticate>] [-dryrun] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
uss d -u <login name> -m <mount point for user's volume>
[-s] [-v] [-c <cell name>]
[-a <administrator to authenticate>] [-d] [-h]
DESCRIPTION
Deletes an AFS user account from the system by deleting the
user's
- Protection Database entry
- Authentication Database entry
- volume and VLDB entry, unless the issuer includes
the -savevolume flag to prevent the deletion. If
the volume is to be deleted, the issuer may first
wish to transfer its contents to tape for possible
restoration.
- the home directory mount point from the file tree.
This happens even if the -savevolume flag is
provided.
ARGUMENTS
-user specifies the user name to remove from the
Protection and Authentication Databases.
-mountpoint
specifies the pathname to the user's home
directory. The volume mounted at that location is
deleted from the system. If the issuer does not
provide a full pathname, it is interpreted
relative to the working directory.
-savevolume
prevents the user's volume and VLDB entry from
being deleted from the system.
-verbose causes the command interpreter to produce on
standard output (stdout) a more detailed trace of
the actions it is executing. By default, only
warnings and error messages appear.
-cell specifies the cell in which to run the command.
See section 7.1 in the Reference Manual for more
details. -admin
names the user whom the Authentication Servers
should authenticate for purposes of creating an
Authentication Database entry. See section 7.1 in
the Reference Manual for more details. -dryrun
indicates that the command interpreter should not
actually execute the command, but should report
all the actions it would perform if executing it.
See section 7.1 in the Reference Manual for more
details.
-help prints the online help for this command. Do not
provide any other arguments or flags with this
one. See section 7.1 in the Reference Manual for
more details.
EXAMPLES
The following removes smith's user account from the
transarc.com cell, but prevents deletion of the user.smith
volume.
% uss del smith /afs/transarc.com/usr/smith -save
PRIVILEGE REQUIRED
Issuer (or person named by -admin argument) must belong to
the system:administrators group in the Protection Database,
must have the ADMIN flag in his or her Authentication
Database entry, and must have at least ADMINISTER and DELETE
rights in the directory from which the mount point is to be
removed. To remove volumes (i.e., if the -savevolume flag
is not used), the issuer must be listed in
/usr/afs/etc/UserList.

View File

@ -1,88 +0,0 @@
Template "E" line AFS Commands Template "E" line
NAME
Template "E" line -- create a single-line file.
E <pathname> <mode> <owner> "<contents>"
DESCRIPTION
Creates a file anywhere in the file system by echoing what
appears in the <contents> field into the new file. Its
intended use is the creation of files in the new user home
directory or its subdirectories.
The "E" line's advantage over the "F" line is that variables
may appear in the <contents> field. The command interpreter
replaces the variables with appropriate values before
creating the file. (In contrast, the contents of a file
created using the "F" line are the same for everyone.)
However, the "E" line restricts the contents of the new file
to a single line, since no carriage returns (newline
characters) can occur in the <contents> field.
An "E" line should appear in the template after the "D" line
that creates the directory the file is to reside in. Any
number of "E" lines may appear in a template.
WARNING
Using the "E" line to create a file outside AFS (e.g., in
the UNIX file system of the client machine where the uss
command is being issued) introduces a potential complication
if the issuer wishes to set the <owner> field to something
other than his or her own user name or UNIX UID. The
default owner of a UNIX file system directory is the user
who created it (in this case, the issuer of the uss
command). Changing this default, which uss will attempt if
anything other than the issuer's name appears in the <owner>
field, requires issuing the chown command, which in turn
requires being the super-user "root". If the issuer wishes
to specify an alternate owner, he or she must be "root" in
the UNIX file system and use the -admin flag in order to be
recognized in AFS as a privileged administrator. See the
description of the -admin argument for uss add and uss bulk.
The preferred method for automatic placement of files on the
local disk is the package program, which runs as "root".
ARGUMENTS
E should be a capital letter and tells the command
interpreter that this is a file-creation
instruction.
pathname is the full pathname of the file to be created.
mode sets the UNIX mode bits for the file. Provide a
four-digit decimal number in this field, such as
0666 or 0644.
owner names the file's owner (in the UNIX file system
sense). If the file is being placed in AFS, the
$UID variable should appear in this field. If the
file is being placed into the UNIX file system
rather than AFS, this field must contain the user
name or UNIX UID of the uss command's issuer, or
the account creation will abort at that point.
contents defines the one-line string that is to become the
contents of the new file. Surround it with double
quotes in case it contains spaces. It may contain
variables, which the command interpreter will
resolve before creating the file, but may not
contain carriage returns (newline characters).
EXAMPLE
The following creates an file in the current working
directory called user_name.etcp containing an entry suitable
for incorporating into the cell's global /etc/passwd file.
E $USER.etcp 0644 root "$USER:X:$UID:10:$NAME:$MTP

View File

@ -1,82 +0,0 @@
Template "F" line AFS Commands Template "F" line
NAME
Template "F" line -- create a file by copying a prototype.
F <pathname> <mode> <owner> <prototype>
DESCRIPTION
Creates a file anywhere in the file system by copying the
contents of an existing "prototype" file into the new file.
Its intended use is creation of standard files in the new
user's home directory or a subdirectory of it. Include one
"F" line for each file to be created.
"F" lines should appear in the template after the "D" lines
that define the subdirectories they go in. Any number of
"F" lines may appear in a template.
WARNING
Using the "F" line to create a file outside AFS (e.g., in
the UNIX file system of the client machine where the uss
command is being issued) introduces a potential complication
if the issuer wishes to set the <owner> field to something
other than his or her own user name or UNIX UID. The
default owner of a UNIX file system directory is the user
who created it (in this case, the issuer of the uss
command). Changing this default, which uss will attempt if
anything other than the issuer's name appears in the <owner>
field, requires issuing the chown command, which in turn
requires being the super-user "root". If the issuer wishes
to specify an alternate owner, he or she must be "root" in
the UNIX file system and use the -admin flag in order to be
recognized in AFS as a privileged administrator. See the
description of the -admin argument for uss add and uss bulk.
The preferred method for automatic placement of files on the
local disk is the package program, which runs as "root".
ARGUMENTS
F should be a capital letter and tells the command
interpreter that this is a file-creation
instruction.
pathname is the full pathname of the file to be created.
mode sets the UNIX mode bits for the file. Provide a
four-digit decimal number in this field, such as
0666 or 0644.
owner names the file's owner (in the UNIX file system
sense). If the directory is being placed in AFS,
the $UID variable should appear in this field. If
the directory is being placed into the UNIX file
system rather than AFS, this field must contain
the user name or UNIX UID of the uss command's
issuer, or the account creation will abort at that
point.
prototype specifies the complete pathname of the file whose
contents are to be copied into the new file. It
may reside in either AFS or the local UNIX file
system.
EXAMPLE
The following, appropriate for the Transarc Corporation
cell, copies a standard .login file (kept in
/afs/transarc.com/common/uss/skel) into user home
directories. This would appear on a single line in the
actual template.
F $MTPT/.login 0644 $UID
/afs/transarc.com/common/uss/skel/.login

View File

@ -1,78 +0,0 @@
Template "G" line AFS Commands Template "G" line
NAME
Template "G" line -- define directory for even distribution
of home directories.
G <directory>
DESCRIPTION
Defines a directory to be considered as a value for the
$AUTO variable. Define a separate "G" line for each
directory to be considered. All "G" lines, and there may be
any number, must appear in the template before any
occurrences of the $AUTO variable.
The intended use of the "G" line is to distribute user
accounts randomly among several directories, rather than
using divisions that reflect real-world divisions (such as
departmental affiliation).
Creating multiple "usr" directories in this fashion (perhaps
numbered as usr1, usr2 and so on) is useful mostly in a very
large cell where having all user home directories together
in one usr directory could cause slow lookup. In such a
case, the $AUTO variable goes in the <mount point> field in
the "V" line. The command interpreter then selects from
among the directories defined on "G" lines the one with the
fewest entries. See the chapter on uss in the AFS System
Administrator's Guide for more information.
ARGUMENTS
G should be a capital letter and tells the
command interpreter that this line defines a
directory to be considered as a value for
the $AUTO variable.
directory defines a pathname. It may be either a
complete pathname or only the final element
(the directory itself). The choice affects
the form of the "V" line <mount-point>
field's value, as shown in the EXAMPLES
section.
EXAMPLES
If the Transarc Corporation cell's administrators decided to
distribute user home directories evenly into three
directories, they would define three "G" lines:
G usr1
G usr2
G usr3
and then put
/afs/transarc.com/$AUTO/$USER
in the "V" line <mount-point> field.
Alternatively, they could put the entire pathname for the
usr directories on the "G" line:
G /afs/transarc.com/usr1
G /afs/transarc.com/usr2
G /afs/transarc.com/usr3
in which case the "V" line <mount-point> field would specify
simply
$AUTO/$USER

View File

@ -1,77 +0,0 @@
uss help AFS Commands uss help
NAME
uss help -- show syntax of specified uss command(s) or list
functional description for all of them.
+
uss help [-topic <help string> ] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
+
uss h [-t <help string> ] [-h]
DESCRIPTION
Displays the first line (name and short description) of
every uss command's help entry, if no help string is
provided. For each operation code specified with -topic, it
outputs the entire help entry. See the Output section
below.
ARGUMENTS
-topic specifies the operation code(s) for which syntax
is to be provided. If it is omitted, the output
instead provides a short description of all uss
commands.
-help prints the online help for this command. Do not
provide any other arguments or flags with this
one. See section 7.1 in the Reference Manual for
more details.
OUTPUT
The online help entry for each uss command consists of two
or three lines.
- The first line names the command and briefly
describes what it does.
- If the command has aliases, they will appear on
the next line.
- The final line, which begins with "Usage:", lists
the command's arguments and flags in the
prescribed order. Online help entries use the
same symbols (brackets, etc.) as the command
definitions in this manual. For an explanation of
their meaning, see page v of the introductory
About This Manual chapter.
EXAMPLE
The following displays the online help entry for the
uss bulk command.
% uss help bulk
uss bulk: bulk input mode
Usage: uss bulk -file <bulk input file> [-template <path
of template file>] [-verbose] [-cell <cell name>] [-dryr
[-help]
PRIVILEGE REQUIRED
None.
MORE INFORMATION
uss apropos

View File

@ -1,50 +0,0 @@
Template "L" line AFS Commands Template "L" line
NAME
Template "L" line -- create hard link.
L <existing-file> <link>
DESCRIPTION
Creates a "hard link" between two files, as achieved by the
standard Unix ln command. An explanation of links is beyond
the scope of this document, but the basic effect is to
create a second name for an existing file, so that it can be
accessed via either name. It does not create a second copy
of the file.
AFS allows hard links only between files that reside in the
same directory. This restriction is necessary to eliminate
the confusion that would result from associating two
potentially different ACLs (those of the two directories)
with the same file. However, symbolic links are legal
between two files that reside in different directories and
even volumes (see the section on the template "S" line).
"L" lines should appear in the template after "D" lines;
they should also appear after "F" and "E" lines if either of
the files being linked were created on such a line. Any
number of "L" lines may appear in a template.
ARGUMENTS
L should be a capital letter and tells the
command interpreter that this instruction
creates a hard link.
existing-file is the complete pathname of the existing
file.
link is the complete pathname of the second name
for the file.
EXAMPLE
The following links the file mail to the file mbox in the
home directory.
L $MTPT/mbox $MTPT/mail

View File

@ -1,46 +0,0 @@
Template "S" line AFS Commands Template "S" line
NAME
Template "S" line -- create symbolic link.
S <existing-file> <link>
DESCRIPTION
Creates a "symbolic link" between two files, as achieved by
the standard Unix ln -s command. An explanation of links is
beyond the scope of this document, but the basic effect is
to create a second name for an existing file, so that it can
be accessed via either name. It does not create a second
copy of the file.
AFS allows symbolic links to cross mount points (that is,
the linked files may reside in different volumes).
"S" lines should appear in the template after "D" lines;
they should also appear after "F" and "E" lines if either of
the files being linked were created on such a line. Any
number of "S" lines may appear in a template.
ARGUMENTS
S should be a capital letter and tells the
command interpreter that this instruction
creates a symbolic link.
existing-file is the complete pathname of the existing
file.
link is the complete pathname of the second name
for the file.
EXAMPLE
The following, appropriate for the Transarc Corporation
cell, links the file outgoing in the Mail subdirectory to
the file /afs/transarc.com/common/mail/outgoing.
S /afs/transarc.com/common/mail/outgoing $MTPT/Mail/o

View File

@ -1,145 +0,0 @@
Template "V" line AFS Commands Template "V" line
NAME
Template "V" line -- create a volume.
V <volume name> <server> <partition> <quota> <mount point>
<owner>
<access list>
DESCRIPTION
Has several effects:
- creates a volume
- creates a VLDB entry for the volume
- mounts the volume in the file system at the
indicated place in the file tree, effectively
creating the user's home directory
- sets the owner of the home directory
- sets the home directory's access control list
A template file may contain only one "V" line, and must
contain one unless the file is 0-length. No other lines are
necessary. (This does not imply that the "V" line must be
the first line in the template when there are others. If
the $AUTO variable appears on the "V" line, then the "G"
lines that provide values for it must appear above the "V"
line.)
ARGUMENTS
V should be a capital letter and tells the command
interpreter that this is a volume-creation
instruction.
volume name
is the volume's name, under which it will be
listed in the VLDB.
By convention, AFS user volume names have a user.
prefix followed by the user name. This is achieved
by specifying
user.$USER
in this field.
server is the file server machine that will house the
volume. It is safest to provide a complete
Internet-style host name in this field. The
interpretation of a shortened form depends on the
state of the cell's name server when the uss add
command is executed.
partition defines which partition on server will house the
volume.
Acceptable variants of the standard /vicepx-style
name are:
/vicepa = vicepa = a =
/vicepb = vicepb = b =
and so on up to
/vicepz = vicepz = z =
quota defines the maximum amount of disk space the
volume will be able to take up. Specify a number
of kilobyte blocks (so a value of 1024 means a
megabyte).
mount point
defines the directory to be created as a mount
point for the volume. The specified directory
serves as the root directory for the volume named
in the <volume name> field.
By convention, AFS cells call home directories by
the user's user name, so the $USER variable may be
part of this field.
Note: This field defines the value of any
occurrences of the $MTPT variable on subsequent
lines in the template.
owner names the owner (in the UNIX file system sense) of
the home directory named in the <mount point>
field. This field should contain the $UID
variable.
access list
defines the access control list for the new home
directory. The list may define one or more pairs,
each consisting of
- a user name or Protection Database group
name
- the access rights
separated by a space. See the fs setacl command
to learn about the access rights available with
AFS.
At the least, the new user needs to be given all
access rights. This could be achieved with
$USER all
The pairs specified are added to a default pair
that grants system:anyuser the READ and LOOKUP
rights. Do not attempt to grant any rights to the
issuer of the uss command. As the last step in
account creation, the uss command interpreter
automatically deletes that person from any access
control lists set during the creation process.
EXAMPLE
The following, appropriate for the Transarc Corporation
cell, creates a volume called user.user name on the /vicepa
partition of the specified file server machine, assigning it
a quota of 3000 kilobyte blocks. The volume is mounted in
/afs/transarc.com/usr as the value of $USER. The user owns
the home directory and has all access rights to it. This
line would appear on a single line in the actual template.
V user.$USER $SERVER.transarc.com /vicepa 3000
/afs/transarc.com/usr/$USER $UID $USER all

View File

@ -1,44 +0,0 @@
Template "X" line AFS Commands Template "X" line
NAME
Template "X" line -- execute command.
X <command>
DESCRIPTION
Executes the indicated command, which may be a standard UNIX
or AFS command. The command may include any standard
template variables, which the uss command interpreter will
resolve before passing the command on to the appropriate
other command interpreter.
"X" lines should appear in the template after the definition
of any elements they affect or variables they refer to. Any
number of "X" lines may appear in a template. Each line
must be a single line only (cannot contain carriage returns
or new line characters within the <command> field).
ARGUMENTS
X should be a capital letter and tells the
command interpreter that this instruction
executes a command.
command is the command to be executed. Surround it
with double quotes in case it contains
spaces. It may contain variables, which the
command interpreter will resolve before
executing the command, but may not contain
carriage returns (newline characters).
EXAMPLE
The following, appropriate for the Transarc Corporation
cell, mounts the Backup version of the user's volume at the
OldFiles subdirectory.
X "fs mkm /afs/transarc.com/usr/$USER/OldFiles user.$

View File

@ -1,264 +0,0 @@
vldb_convert AFS Commands vldb_convert
NAME
vldb_convert -- convert Volume Location Database from AFS
3.1 to AFS 3.2.
vldb_convert [initcmd] [-to <goal version>] [-from
<current version>]
[-path <pathname>] [-showversion] [-help]
ACCEPTABLE ABBREVIATIONS
The name of this command must be typed in full. However,
its switches can be omitted (if appropriate) or abbreviated
as follows:
vldb_convert [-t <goal version>] [-f <current version>]
[-p <pathname>] [-s] [-h]
DESCRIPTION
Converts a Volume Location Database (VLDB) from AFS 3.1
format to AFS 3.2 format. Due to a limitation in the VLDB
in prior versions of AFS, a cell could have no more than 31
file server machines. With the AFS 3.2 version of the VLDB,
a cell can have as many as 255 file server machines.
The vldb_convert command converts an existing AFS 3.1 VLDB
for use as an AFS 3.2 VLDB. It reads the
/usr/afs/db/vldb.DB0 database file for the old VLDB and
writes a new, converted version of the database into a
temporary file in the /usr/afs/db directory. If successful,
it then removes the old vldb.DB0 file from the directory and
replaces it with the new version from the temporary file.
After the conversion, the database functions as it did
before, with the exception that it can accommodate the
entries for the additional file server machines. The binary
file for the vldb_convert command resides in /usr/afsws/etc.
The command requires the file system in which the VLDB
resides to have free space at least equivalent to the size
of the old VLDB plus 9 kilobytes. Because the command
removes the old VLDB and replaces it with the new version of
the database, the additional space is required only while
the command executes. (The new version of the database
requires a small amount of additional space, but the
difference is inconsequential.)
Begin the conversion of the VLDB by shutting down the Volume
Location (VL) Servers on all three database server machines.
(The instructions assume the cell has three database server
machines; adjust the steps accordingly if it has fewer.)
This causes a service outage in the cell, but the outage for
the entire conversion procedure should last no more than 15
to 20 minutes.
Replace the AFS 3.1 version of the /usr/afs/bin/vlserver
file on all three database server machines with the AFS 3.2
version of the file. The new VL Server understands the
format of the new version of the VLDB. The old version of
the VL Server cannot be run with the new version of the
VLDB, and vice versa. Make sure you replace the vlserver
binary files on each binary distribution machine; otherwise,
the Update Servers overwrite the version stored on the
database server machines by automatically propagating the
old version of the binary file to the machines.
Determine which database server machine has the lowest IP
address; Ubik will use this machine as the synchronization
site when the VL Servers are restarted. Remove the VLDB
from the other two database server machines by deleting the
/usr/afs/db/vldb.DB0 database and /usr/afs/db/vldb.DBSYS1
log files from the other machines. Remove only the
/usr/afs/db/vldb.DBSYS1 log file from the database server
machine with the lowest IP address. Do not remove the
/usr/afs/db/vldb.DB0 database file from the machine with the
lowest IP address.
Copy the /usr/afs/db/vldb.DB0 file on the database server
machine with the lowest IP address to a different directory.
Then execute the vldb_convert command on that machine. The
command takes no more than a few minutes to complete.
However, it displays no messages while it executes.
When the command is finished, restart the VL Server on the
machine with the lowest IP address. Then restart the VL
Servers on the remaining two database server machines. Ubik
elects the database server machine with the lowest IP
address as the synchronization site and distributes the copy
of the new VLDB from that machine to the other two database
server machines. The VLDB is then available.
The vldb_convert command can be also used to convert the
VLDB from AFS 3.2 format back to AFS 3.1 format. The
command's -to and -from switches are used to specify the
direction of the conversion. The -to switch specifies the
version to which the database is to be converted; the -from
switch indicates the version from which the database is to
be converted.
Both switches accept a 1, to indicate 3.1, or a 2, to
indicate 3.2. When converting from 3.1 to 3.2, specify -to
as 2 and -from as 1. Should the need to revert to 3.1
arise, specify -to as 1 and -from as 2. When converting
from 3.1 to 3.2, you can omit both options; the command
automatically converts the database to the next higher
version.
Finally, the command can be used to display the version of
the current VLDB. The -showversion flag directs the command
to display the version number (3.1 or 3.2) of the VLDB at
the time the command is issued. Do not specify the -to or
-from switch if the -showversion flag is used.
NOTE
The vldb_convert command is also useful as a means of
removing from the VLDB entries for server machines that
house no volumes. When a file server machine name or its IP
address is changed, the VLDB still contains an entry for the
previous name or address. This becomes a problem only when
the administrators in a large cell must change the names or
IP addresses of a significant number of machines, in which
case it is conceivable (though highly unlikely) that all 255
possible file server machine entries will be taken.
If this problem occurs in a cell, the administrators can
execute vldb_convert with a value of 2 for both its -to and
-from switches. The command removes the entries for all
unreferenced servers from the VLDB. The steps described
previously for executing the command (shutting down the
servers, removing the copies of the VLDB) must be executed
as they are for initially upgrading the database.
WARNING
Copy the /usr/afs/db/vldb.DB0 file to a different directory
after the VL Servers are shut down but before the
vldb_convert command is run. The command should perform the
conversion without problems. Also, it does not remove the
old database file until it has successfully completed the
conversion. However, if anything happens to disrupt the
conversion or if the operation fails for any reason, copying
the database beforehand allows the VLDB to be restored from
the copy.
Leave no VL Servers running while the conversion is in
progress. If a number of VL Servers sufficient for Ubik to
attain a quorum are available while the conversion is in
progress, changes made while the conversion is underway are
lost when the new version of the VLDB is distributed.
Ensure that all VL Servers are referencing the same version
of the VLDB at all times. The 3.1 version of the VL Server
can reference only the 3.1 version of the VLDB, and the 3.2
version of the VL Server can use only the 3.2 version of the
VLDB. The 3.1 version of the VL Server is not compatible
with the 3.2 version of the VLDB, and vice versa. For this
reason, the vldb_convert command must be used to convert the
existing VLDB to the new format before the new version of
the VL Server distributed from the cell's binary
distribution machines via the Update Server can be used.
Specify only valid, correct values for the -to and -from
switches. Specifying invalid or incorrect values for these
switches can result in damage to the VLDB. This is another
reason to copy the vldb.DB0 database file to a different
directory before using the vldb_convert command.
Finally, the entire procedure takes no more than a few
minutes to complete. However, because volumes are
inaccessible while the procedure is underway, it is best to
perform the operation over a weekend or overnight to disrupt
the fewest users.
ARGUMENTS
initcmd is an optional string that accommodates the
command's use of the AFS command parser. It
can be omitted and ignored.
-to indicates the version of the VLDB to which
the current version of the database is to be
converted. Valid values are 1, indicating
that the existing version of the database is
to be converted to AFS 3.1 format, or 2,
indicating that the existing version of the
database is to be converted to AFS 3.2
format. See the DESCRIPTION section for
information about the possible combinations
of the -to and -from switches and the
effects of omitting the switches.
-from indicates the version of the current VLDB.
Valid values are 1, indicating that the
existing version of the database is in AFS
3.1 format, or 2, indicating that the
existing version of the database is in AFS
3.2 format. See the DESCRIPTION section for
information about the possible combinations
of the -to and -from switches and the
effects of omitting the switches.
-path provides the complete pathname of the
vldb.DB0 database file if the file is kept
in an alternate directory (or has a
different name). Always include the name of
the file, even if it is vldb.DB0. By
default, the command converts the vldb.DB0
database file in the /usr/afs/db directory.
Use this switch only if the database is
stored in a different directory (or has a
different name).
-showversion displays the version (3.1 or 3.2) of the
current VLDB. Include the -path switch if
the VLDB is stored in a directory other than
/usr/afs/db. If you use this flag, the -to
and -from switches are ignored.
-help prints the online help for this command. Do
not provide any other arguments or flags
with this one.
EXAMPLE
The following, issued on the database server machine with
the lowest IP address, executes the vldb_convert command to
convert the VLDB from AFS 3.1 format to AFS 3.2 format:
% vldb_convert
PRIVILEGE REQUIRED
The issuer must be able to read, delete, and write to the
/usr/afs/db/vldb.DB0 and /usr/afs/db/vldb.DBSYS1 files on
all database server machines. The issuer must also be able
to insert, write to, and delete files in the /usr/afs/db
directories on the machines.
In addition, to install the new version of the VL Server,
the issuer must be able to delete the /usr/afs/bin/vlserver
file on all database server machines (or on all binary
distribution machines). The issuer must also be able to
insert files in the /usr/afs/bin directories on the
machines.
An issuer who is logged into the UNIX file systems of the
database server machines as "root" has the necessary rights
to perform the entire conversion procedure.

View File

@ -1,322 +0,0 @@
AFS Commands
1. The vos Commands
------------------------------------------------------------
This command defines the vos commands that system
administrators use to contact the Volume Server and Volume
Location (VL) Server. It assumes the reader is familiar
with the concepts described in AFS System Administrator's
Guide.
System administrators use vos commands to instruct the
Volume Server to create, move, delete, replicate and backup
volumes. The Volume Location (VL) Server automatically
records in the Volume Location Database (VLDB) any changes
in volume status and location that result from vos commands.
Operators can use other vos commands to obtain information
from VLDB records. Vos commands also help operators dump
copies of volumes to disk and restore them to the file
system if necessary.
Note that vos commands are "idempotent." This means that if
execution of a certain command is interrupted in the middle
by a server or process failure, then a subsequent execution
of the same command picks up at the interruption point,
rather than at the very beginning of the operation. (This
does not apply if the issuer explicitly interrupts the
operation with ^C or another interrupt signal. In that
case, the volume is left locked and the issuer must unlock
it with vos unlock before proceeding.) Idempotency implies
that before executing a command, the Volume and VL Servers
check to see if running it will have any effect (i.e.,
whether the state that will result from running the command
already holds). If the desired end-state already holds,
there is no need to run the command again, no matter how
many times it is subsequently issued. If the end-state does
not yet hold, the command should pick up where necessary to
achieve it.
Refer to the Command Summary at the end of this document for
a complete list of vos commands and their syntax.
1.1 The Information in VLDB Entries
The Volume Location Database (VLDB), maintained by the
Volume Location (VL) Server, records a large range of
information about all the volumes in a cell. A separate
copy of the VLDB resides on each database server machine. To
keep the copies synchronized, the VL Server uses the AFS's
library of database management facilities, called Ubik.
It is important that the information in the VLDB correspond
to the status of the actual volumes on the servers as much
of the time as possible. For this reason, any vos command
that affects volume status also changes the corresponding
VLDB entry automatically, as noted in the command
descriptions below. (It is possible for the VLDB and
servers to disagree if vos operations are interrupted before
completion; see the vos syncserv and vos syncvldb commands.)
There is an entry in the VLDB for each ReadWrite volume.
The entry also records information about the ReadOnly and
Backup version of the volume; ReadOnly and Backup volumes do
AFS Command Reference Manual The vos Commands 2
not have their own VLDB entries. (The one exception to this
rule is that a ReadOnly volume may have its own VLDB entry
if its ReadWrite source has been removed.)
The following information is available from a VLDB entry:
- the name of the ReadWrite version of the volume.
The ReadOnly version automatically has the same
name with a .readonly extension, the Backup
version with a .backup extension
- the ReadWrite volumeID number. A volumeID number
is simply an identification number guaranteed to
be unique within a cell. In almost all cases, the
VL Server allocates volumeID numbers
automatically, but some commands allow the issuer
to assign volumeIDs explicitly. Each of the three
versions of a volume has a different volumeID
number; they often run consecutively, especially
if the VL Server assigned them, but this is not a
requirement.
- the ReadOnly volumeID number. All copies of the
ReadOnly version share the same ID.
- the Backup volumeID number
- the ReleaseClone volumeID number, if a
ReleaseClone exists. See the description of
vos release for more about the ReleaseClone.
- one or more site definitions, each of which
specifies a file server machine name and partition
name. Site definitions specify the location of
the ReadWrite version and each copy of the
ReadOnly version (if any). No site definition is
necessary for the Backup version, if any, because
it always resides at the same site as its
ReadWrite source. There can be one ReadWrite
definition and up to six ReadOnly definitions.
- one or more site flags associated with each site
One site flag tells what type of volume resides at
the site, and has value RW for ReadWrite or RO for
ReadOnly.
The other possible site flag marks the copy at
that site as NEW or OLD. Normally, this type of
flag will not appear; its presence indicates that
an error occurred as new ReadOnly clones were
being distributed to their sites. See the
description of the vos release command for further
explanation.
- one status flag for each of the three versions--
ReadWrite, ReadOnly and Backup. This flag
indicates whether the version actually exists at
at least one site: valid indicates that it does,
invalid that it does not. Note that there is not
a separate status flag for each site.
AFS Command Reference Manual The vos Commands 3
- a site count, which tells how many copies exist of
the ReadWrite and ReadOnly versions of the volume.
There is only one ReadWrite copy, but as many as
six ReadOnly copies may exist.
- an indication if the VLDB entry is locked. Since
being unlocked is the default state, there is no
explicit indicator if the VLDB entry is unlocked.
See the descriptions of the vos lock and
vos unlock commands.
The vos listvldb command displays much of the information
from the VLDB described above. The vos examine command also
displays VLDB information, in combination with volume header
information.
1.2 The Information in Volume Headers
The previous section explained that there is a single VLDB
entry for each ReadWrite volume and all of its (ReadOnly and
Backup) clones. In contrast, there is a separate volume
header at the site of each copy of the volume, no matter its
version. The volume header is the volume in a senseMit is a
data structure that records which physical memory addresses
on the partition are storing the files in the volume. The
volume header binds all the files into a logical unit
without requiring that they be stored in contiguous memory
blocks.
In addition to data location, the volume header records
other information about the volume, some of it redundant
with the VLDB so that the Volume Server can access the
information even when the VLDB is unavailable.
The information in the volume header includes:
- the name of this copy of the volume, with
.readonly or .backup extension if appropriate
- its volumeID number
- its type (RW for ReadWrite, RO for ReadOnly, BK
for Backup)
- its size in kilobytes (so 1024 means a megabyte)
- its status at the site, which is unrelated to the
locked/unlocked status of the VLDB entry. There
are three possibilities:
* On-line means that the volume is fully
accessible through the file system
* needs salvage means that the volume is
probably corrupted. Run the Salvager using
the bos salvage command.
* Off-line means that the volume is not
accessible, but there is no reason to suspect
that it is corrupted
- a Parent ID number, which is the volumeID of this
AFS Command Reference Manual The vos Commands 4
volume's ReadWrite source. If this volume is the
ReadWrite version itself, this ID should match the
previously mentioned volumeID.
- a Clone ID number, which is the volumeID number of
the last clone made from this volume's ReadWrite
source for the purposes of replication. It may
match the ReadOnly volumeID or ReleaseClone ID,
dependingon whether or not the release was
successful.
- a Backup ID number, which is the volumeID of the
Backup version of this volume. If this volume is
the Backup version itself, this ID should match
the previously mentioned volumeID.
- a quota, which is the maximum amount of disk space
the ReadWrite version of the volume may occupy.
It does not apply sensibly to ReadOnly or Backup
volumes, but is reported for convenience anyway.
- its creation date, which is the day and time when
this copy of the volume was created (for ReadOnly
and Backup copies, this means cloned/released).
If the volume has been restored with
backup diskrestore, backup volrestore or vos
restore, this is the restore time.
- its date of last update, which is the day and time
when the contents of this volume last changed.
For ReadOnly and Backup volumes, this should match
the creation date, since they are not allowed to
change.
AFS Command Reference Manual The vos Commands 5
- the number of times the volume has been accessed
since the later of
* 12:00 a.m. on the day the command is issued
* the last time the volume changed location
An access is defined as a fetch or store operation
on any file system object stored in the volume.
The vos listvol command displays information from the volume
header (as does the vos examine command, in combination with
VLDB information).
1.3 Common Arguments and Flags
Most vos commands accept the following optional arguments
and flags. They are listed in the command descriptions
where they apply, and are described in detail below:
[-cell <cell name>]
This argument specifies that the command should be run in a
different cell, specified by cell name. By default,
commands are executed in the local cell, as defined in
/usr/vice/etc/ThisCell on the client machine on which the
command is issued. The issuer may abbreviate cell name to
the shortest form that distinguishes it from the other cells
listed in /usr/vice/etc/CellServDB on the client machine on
which the command is issued.
[-noauth]
This flag instructs the Volume and/or Volume Location Server
not to authenticate the user of the command, and thus
establishes an unauthenticated connection between the user
and the server (the user is recognized as the unprivileged
user anonymous). It is useful only when authorization
checking is disabled on the file server machine (during the
installation of a file server machine or when bos setauth
has been used during other unusual circumstances). In
normal circumstances, the Volume and VL Servers allow only
authorized (privileged) users to issue commands that change
the status of a volume or VLDB entry, and will refuse to
perform such an action even if the -noauth flag is used.
[-localauth]
This flag instructs the vos command interpreter running on
the local machine to construct a server ticket using the
server encryption key with the highest key version number in
/usr/afs/etc/KeyFile on the local machine. The command
interpreter presents the ticket to the Volume and/or Volume
Location Server to use in mutual authentication.
This argument is only useful for commands issued on file
server machines, since client workstations do not have a
KeyFile. It is intended for cron-type processes or jobs
included in the machine's /usr/afs/local/BosConfig file. An
example might be a command that automatically runs the
vos backup command on certain volumes in preparation for
archival backups. See the chapter in the AFS System
AFS Command Reference Manual The vos Commands 6
Administrator's Guide about backing up the system. The flag
can also be used if the user is unable to authenticate but
is logged into the local UNIX file system as "root".
[-verbose]
This flag tells the Volume Server and/or VL Server to
display messages about the operations they are performing
while executing the command. Useful mainly for debugging
and tracing purposes.
[-help]
This flag has the same function as the vos help command: it
prints the command's online help message on the screen. No
other arguments or flags should be provided at the same
time. Even if they are, this flag overrides them, and the
only effect of issuing the command is that the help message
appears.
1.4 The Privilege Required for vos Commands
The Volume and Volume Location Servers consider privileged
those users listed in the file /usr/afs/etc/UserList on a
file server machines' local disk. This list is maintained
on each file server machine's local disk using bos commands.
Most vos commands require privilege; only those that list
volume-related information do not.

View File

@ -1,108 +0,0 @@
vos addsite AFS Commands vos addsite
NAME
vos addsite -- add definition of ReadOnly site to VLDB
entry.
vos addsite -server <machine name for new site>
-partition <partition name for new site>
-id <volume name or ID> [-cell <cell name>] [-noauth]
[-localauth] [-verbose] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
vos ad -s <machine name for new site> -p <partition name
for new site>
-i <volume name or ID> [-c <cell name>] [-n] [-l] [-v]
[-h]
DESCRIPTION
Defines future sites that will receive copies of the
ReadOnly version of a volume, in preparation for actually
creating and distributing the ReadOnly version using
vos release. A site is defined as a certain file server
machine and partition.
The VLDB status flag for the ReadOnly version of the volume
remains invalid, since an actual copy of the ReadOnly volume
does not yet exist at the site.
If defining more than one replication site for a given
ReadWrite source, issue this command repeatedly.
WARNING
Do not define more than six ReadOnly sites with this
command. Each VLDB entry can store up to seven site entries
(the ReadWrite site counts as one).
No more that 3500 volumes should reside on one partition. A
greater number can cause the AFS Salvager process to
malfunction. It is the issuer's responsibility to check
that releasing a ReadOnly volume to a site defined with this
command will not cause the limit to be exceeded. The
vos listvol command reports the number of volumes on a
partition.
ARGUMENTS
-server names the file server machine where the copy
is to reside. Abbreviated forms of machine
names may be allowed depending on the naming
service available at the time the command is
issued; see page xii in the introductory
About This Manual chapter. -partition
names the particular partition on that file
server machine where the copy is to reside.
In addition to the full /vicepx form of a
partition name, three shorter forms are
acceptable; see page xii in the introductory
About This Manual chapter. -id
specifies either the complete name or
volumeID number of the ReadWrite source
volume.
-cell specifies the cell in which to run the
command. See section 8.3 in the Reference
Manual for more details. -noauth
tells the Volume and Volume Location Servers
to assign the identity anonymous to the
issuer. See section 8.3 in the Reference
Manual for more details. -localauth
constructs a server ticket using a key from
/usr/afs/etc/KeyFile. See section 8.3 in
the Reference Manual for more details.
-verbose
tells the Volume and Volume Location Servers
to report on what they are doing as they
execute the command. See section 8.3 in the
Reference Manual for more details. -help
prints the online help for this command. Do
not provide any other arguments or flags
with this one. See section 8.3 in the
Reference Manual for more details.
EXAMPLE
The following, appropriate in the Transarc Corporation cell,
defines a ReadOnly site for the cell's root.afs volume.
% vos ad fs7.transarc.com /vicepb root.afs
PRIVILEGE REQUIRED
Issuer must be listed in /usr/afs/etc/UserList on -server.
MORE INFORMATION
vos listvol
vos release

View File

@ -1,64 +0,0 @@
vos apropos AFS Commands vos apropos
NAME
vos apropos -- show each help entry containing keyword.
vos apropos -topic <help string> [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
vos ap -t <help string> [-h]
DESCRIPTION
Displays the first line of the help entry for any vos
command that has help string in its name or short
description.
ARGUMENTS
-topic specifies the keyword string to search for.
If it is more than a single word, surround
it with double quotes or other delimiters.
Type all help strings for vos commands in
all lowercase letters, except the word
"VLDB."
-help prints the online help for this command. Do
not provide any other arguments or flags
with this one. See section 8.3 in the
Reference Manual for more details.
OUTPUT
The first line of a command's online help entry names the
command and briefly describes what it does. The vos apropos
command displays that first line for any vos command where
help string is part of the command name or first line.
To see the remaining lines in a help entry, which provide
the command's alias (if any) and syntax, use the vos help
command.
EXAMPLE
The following lists all vos commands that have the word
"lock" in their operation code or short online description.
% vos ap lock
lock: lock VLDB entry for a volume
unlock: release lock on VLDB entry for a volume
unlockvldb: unlock all the locked entries in the VLD
PRIVILEGE REQUIRED
None.
MORE INFORMATION
vos help

View File

@ -1,72 +0,0 @@
vos backup AFS Commands vos backup
NAME
vos backup -- create Backup volume version of one ReadWrite
volume.
vos backup -id <volume name or ID> [-cell <cell name>]
[-noauth]
[-localauth] [-verbose] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
vos backup -i <volume name or ID> [-c <cell name>] [-n]
[-l] [-v] [-h]
DESCRIPTION
Clones the indicated ReadWrite volume to create a Backup
version. Names the Backup version by adding a .backup
extension to the ReadWrite source's name. It places the
Backup version at the same site as the ReadWrite, and
changes the VLDB status flag for the Backup to valid.
If a Backup version already exists, this new clone replaces
it. The status flag remains valid.
ARGUMENTS
-id specifies either the complete name or
volumeID number of the ReadWrite source
volume.
-cell specifies the cell in which to run the
command. See section 8.3 in the Reference
Manual for more details. -noauth
tells the Volume and Volume Location Servers
to assign the identity anonymous to the
issuer. See section 8.3 in the Reference
Manual for more details. -localauth
constructs a server ticket using a key from
/usr/afs/etc/KeyFile. See section 8.3 in
the Reference Manual for more details.
-verbose
tells the Volume and Volume Location Servers
to report on what they are doing as they
execute the command. See section 8.3 in the
Reference Manual for more details. -help
prints the online help for this command. Do
not provide any other arguments or flags
with this one. See section 8.3 in the
Reference Manual for more details.
EXAMPLE
The following creates a Backup version of the volume
user.smith.
% vos backup user.smith
PRIVILEGE REQUIRED
Issuer must be listed in /usr/afs/etc/UserList on -server.
MORE INFORMATION
vos backupsys

View File

@ -1,155 +0,0 @@
vos backupsys AFS Commands vos backupsys
NAME
vos backupsys -- create Backup volume version of all
indicated ReadWrite volumes.
vos backupsys [-prefix <common prefix on volume(s)>]
[-server <machine name>] [-partition <partition name>]
[-cell <cell name>] [-noauth] [-localauth] [-verbose]
[-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
vos backups [-pr <common prefix on volume(s)>] [-s
<machine name>]
[-pa <partition name>] [-c <cell name>] [-n] [-l] [-v]
[-h]
DESCRIPTION
Clones each indicated ReadWrite volume to make a Backup
version of it. Names each Backup version by adding a
.backup extension to the name of its ReadWrite source. It
places each Backup at the same site as its source, and
changes the VLDB status flag for each Backup to valid.
If a Backup version already exists for a volume, the new
clone replaces it. The status flag remains valid.
By combining the -prefix, -server and -partition arguments
in different ways, it is possible to create Backup copies of
varying numbers of volumes. The possibilities are listed
here from most to least inclusive
To create a Backup version of:
- every ReadWrite volume in the system, omit all
three arguments. This could take a rather long
time to execute, depending on the number of
volumes.
- every ReadWrite volume whose name begins with a
certain character string (for example, sys. or
user.), regardless of site, use -prefix.
- every ReadWrite volume on a file server machine,
specify the file server name with -server.
- every ReadWrite volume that resides on a partition
of the same name (for instance, on /vicepa on any
file server machine), specify the partition name
with -partition.
- every ReadWrite volume on a certain partition of a
file server machine, specify both -server and
-partition.
- every ReadWrite volume with a certain prefix that
resides on a file server machine, combine -prefix
and -server. The -prefix argument may also be
combined with -partition, or both -server and
-partition, in this way.
- a single ReadWrite volume, give its complete name
as -prefix. This is actually better done with the
vos backup command, which employs a more
streamlined technique for finding a single volume.
ARGUMENTS
-prefix specifies a character string of any length.
Every volume whose name begins with this
exact string will be cloned (subject to
modulations from -server and -partition).
Include field separators (such as periods)
if appropriate. This argument may be
combined with -server and/or -partition.
-server names the file server machine where the
ReadWrite source volume(s) reside.
Abbreviated forms of machine names may be
allowed depending on the naming service
available at the time the command is issued;
see page xii in the introductory About This
Manual chapter. This argument may be
combined with -prefix and/or -partition.
-partition names the particular partition where the
ReadWrite source volume(s) reside. In
addition to the full /vicepx form of a
partition name, three shorter forms are
acceptable; see page xii in the introductory
About This Manual chapter. This argument
may be combined with -prefix and/or -server.
-cell specifies the cell in which to run the
command. See section 8.3 in the Reference
Manual for more details. -noauth
tells the Volume and Volume Location Servers
to assign the identity anonymous to the
issuer. See section 8.3 in the Reference
Manual for more details. -localauth
constructs a server ticket using a key from
/usr/afs/etc/KeyFile. See section 8.3 in
the Reference Manual for more details.
-verbose
tells the Volume and Volume Location Servers
to report on what they are doing as they
execute the command. See section 8.3 in the
Reference Manual for more details. -help
prints the online help for this command. Do
not provide any other arguments or flags
with this one. See section 8.3 in the
Reference Manual for more details.
EXAMPLES
The following creates a Backup version of every volume in
the cell's file system whose name begins with "user".
% vos backups user
The following, appropriate in the Transarc Corporation cell,
creates a Backup version of every volume on the file server
machine fs3.transarc.com.
% vos backups -s fs3.transarc.com
The following, appropriate in the Transarc Corporation cell,
creates a Backup version of every volume on the /vicepc
partition of the file server machine fs5.transarc.com.
% vos backups -s fs5.transarc.com -p c
The following, appropriate in the Transarc Corporation cell,
creates a Backup version of every volume on the file server
machine db1.transarc.com whose name begins with "sys".
% vos backups sys db1.transarc.com
PRIVILEGE REQUIRED
Issuer must be listed in /usr/afs/etc/UserList on -server.
MORE INFORMATION
vos backup

View File

@ -1,115 +0,0 @@
vos create AFS Commands vos create
NAME
vos create -- create (empty) ReadWrite volume and
associated VLDB entry.
vos create -server <machine name> -partition <partition
name> -name <volume name> [-cell <cell name>]
[-noauth]
[-localauth] [-verbose] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
vos c -s <machine name> -p <partition name> -na <volume
name>
[-c <cell name>] [-no] [-l] [-v] [-h]
DESCRIPTION
Creates a ReadWrite volume, names it volume name and places
it at the site specified by machine name and partition name.
The volume automatically receives a volumeID number,
recorded in both the VLDB and the volume header. The VLDB
status flag for the ReadWrite site is set to valid.
If this command succeeds, then the volume is available for
use, though it must be mounted in the file system before its
contents are accessible. Use the fs mkmount command to
mount a volume.
This command creates a default ACL associated with the
volume's "root directory" (which takes the same name as
volume's mount point when the volume is mounted with
fs mkmount). The ACL grants all seven access rights to
system:administrators. The volume's space quota is set to
5000 kilobyte blocks by default.
The Volume Location Server also pre-allocates, and records
in the VLDB, volumeID numbers for the ReadOnly and Backup
versions that may be created later. It does not actually
create those types of volumes or place anything at a
ReadOnly or Backup site, so the status flags for ReadOnly
and Backup are set to invalid.
WARNING
No more that 3500 volumes should reside on one partition. A
greater number can cause the AFS Salvager process to
malfunction. It is the issuer's responsibility to check
that issuing this command will not cause the limit to be
exceeded. The vos listvol command reports the number of
volumes on a partition.
ARGUMENTS
-server names the file server machine on which to
create the new ReadWrite volume.
Abbreviated forms of machine names may be
allowed depending on the naming service
available at the time the command is issued;
see page xii in the introductory About This
Manual chapter. -partition
names the particular partition where the
ReadWrite volume is to reside. In addition
to the full /vicepx form of a partition
name, three shorter forms are acceptable;
see page xii in the introductory About This
Manual chapter. -name
specifies a name for the ReadWrite volume,
preferably descriptive of its contents. It
may be no longer than 22 characters, but may
contain upper- and lowercase letters,
numbers and punctuation. By convention,
periods separate the fields in a name. Do
not use the extension .backup or .readonly
on ReadWrite volume names; the Volume Server
automatically adds these extensions when
creating those volume types.
-cell specifies the cell in which to run the
command. See section 8.3 in the Reference
Manual for more details. -noauth
tells the Volume and Volume Location Servers
to assign the identity anonymous to the
issuer. See section 8.3 in the Reference
Manual for more details. -localauth
constructs a server ticket using a key from
/usr/afs/etc/KeyFile. See section 8.3 in
the Reference Manual for more details.
-verbose
tells the Volume and Volume Location Servers
to report on what they are doing as they
execute the command. See section 8.3 in the
Reference Manual for more details. -help
prints the online help for this command. Do
not provide any other arguments or flags
with this one. See section 8.3 in the
Reference Manual for more details.
EXAMPLE
The following creates the ReadWrite volume user.pat on the
/vicepf partition of fs4.transarc.com.
% vos c fs4.transarc.com /vicepf user.pat
PRIVILEGE REQUIRED
Issuer must be listed in /usr/afs/etc/UserList on -server.

View File

@ -1,159 +0,0 @@
vos delentry AFS Commands vos delentry
NAME
vos delentry -- remove specified entry from VLDB.
vos delentry -id <volume name or ID>
[-prefix <prefix of volume whose VLDB entry is to be
deleted>]
[-server <machine name>] [-partition <partition name>]
[-cell <cell name>] [-noauth] [-localauth] [-verbose]
[-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
vos de -i <volume name or ID>
[-pr <prefix of volume whose VLDB entry is to be deleted>]
[-s <machine name>] [-pa <partition name>] [-c <cell
name>]
[-n] [-l] [-v] [-h]
DESCRIPTION
Removes the VLDB entry for the indicated volume(s) from the
VLDB. Each volume may be any of the three types (ReadWrite,
ReadOnly or Backup), but the entire entry is removed no
matter which type is provided. The command has no effect on
the actual volumes on file server machines, if they exist.
This command is useful if the system administrator is
certain that a volume removal was not recorded in the VLDB
(perhaps the vos zap command was used), and does not want to
take the time to use vos syncserv and vos syncvldb to
synchronize an entire file server machine.
By using the -id argument alone, or combining the -prefix,
-server and -partition arguments in different ways, it is
possible to remove the VLDB entry for varying numbers of
volumes. To remove the VLDB entry for:
- a single volume, provide its complete name or
volumeID number as -id.
- every volume whose name begins with a certain
character string (for example, sys. or user.),
regardless of site, use -prefix.
- every volume listed as residing on a certain file
server machine, specify the file server name with
-server.
- every volume listed as residing on a partition of
the same name (for instance, on /vicepa on any
file server machine), specify the partition name
with -partition.
- every volume on a certain partition of a file
server machine, specify both -server and
-partition.
- every volume with a certain prefix that resides on
a file server machine, combine -prefix and
-server. The -prefix argument may also be
combined with -partition, or both -server and
-partition, in this way.
WARNING
This command should not be used as the standard way to
remove a volume, as it is likely to put the VLDB out of sync
with the volumes on servers. Use vos remove instead.
ARGUMENTS
-id specifies either the complete name or
volumeID number of the volume, which may be
ReadWrite, ReadOnly or Backup. The entire
entry is removed, no matter which type is
provided. Provide this argument OR some
combination of -prefix, -server and
-partition.
-prefix specifies a character string of any length.
Every VLDB listing a volume whose name
begins with this exact string will be
removed (subject to modulations from -server
and -partition). Include field separators
(such as periods) if appropriate. This
argument may be combined with -server and/or
-partition.
-server names a file server machine. If the VLDB
entry mentions this file server machine as
the site for a volume, the entry will be
removed. Abbreviated forms of machine names
may be allowed depending on the naming
service available at the time the command is
issued; see page xii in the introductory
About This Manual chapter. This argument
may be combined with -prefix and/or
-partition.
-partition names a partition. If the VLDB entry
mentions this partition as the site for a
volume, the entry will be removed. In
addition to the full /vicepx form of a
partition name, three shorter forms are
acceptable; see page xii in the introductory
About This Manual chapter. This argument
may be combined with -prefix and/or -server.
-cell specifies the cell in which to run the
command. See section 8.3 in the Reference
Manual for more details. -noauth
tells the Volume and Volume Location Servers
to assign the identity anonymous to the
issuer. See section 8.3 in the Reference
Manual for more details. -localauth
constructs a server ticket using a key from
/usr/afs/etc/KeyFile. See section 8.3 in
the Reference Manual for more details.
-verbose
tells the Volume and Volume Location Servers
to report on what they are doing as they
execute the command. See section 8.3 in the
Reference Manual for more details. -help
prints the online help for this command. Do
not provide any other arguments or flags
with this one. See section 8.3 in the
Reference Manual for more details.
EXAMPLES
The following removes the VLDB entry for the volume
user.temp.
% vos del user.temp
The following removes all VLDB entries that describe volumes
stored on fs3.transarc.com whose names begin with the string
"test".
% vos del -pr test -s fs3.transarc.com
PRIVILEGE REQUIRED
Issuer must be listed in /usr/afs/etc/UserList on -server.
MORE INFORMATION
vos remove vos remsite vos syncserv vos syncvldb vos zap

View File

@ -1,126 +0,0 @@
vos dump AFS Commands vos dump
NAME
vos dump -- convert volume into ASCII format and place in a
file.
vos dump -id <volume name or ID> -time <dump from time>
[-file <dump file>] [-cell <cell name>] [-noauth]
[-localauth]
[-verbose] [-help]
ACCEPTABLE ABBREVIATIONS/ALIASES
vos du -i <volume name or ID> -t <dump from time> [-f
<dump file>]
[-c <cell name>] [-n] [-l] [-v] [-h]
DESCRIPTION
Converts the contents of the indicated volume, which may be
of any type, into ASCII format. If the -file argument is
provided, the converted volume contents are placed in it.
If the argument is not provided, the contents are directed
to standard output (stdout), from which the issuer may pipe
them elsewhere if desired.
It is possible to dump either the entire volume, or only
those files in it modified since a specified time (the
latter is referred to as a "incremental" dump), by
specifying the proper value for -time.
Dumping does not affect any status or site flags in the
volume header or VLDB. It does, however, make the volume
inaccessible during the duration of the dump.
ARGUMENTS
-id specifies either the complete name or
volumeID number of the volume, which may be
ReadWrite, ReadOnly or Backup.
-time determines whether the dump is full or
incremental, and in the latter case, from
what date the dump is done. There are three
types of legal values:
- 0 creates a full dump.
- mm/dd/yy specifies 12:00 a.m. on the
indicated date (month/day/year) and
creates an incremental dump including
only elements with modification time
stamps later than this date. Examples
: 1/23/90, 10/7/89.
- "mm/dd/yy hh:mm" specifies a time
"hour:minutes" on the indicated date
(month/day/year) and creates an
incremental dump including only
elements with modification time stamps
later than this time. The time should
be in 24-hour format (for example,
20:30 is 8:30 p.m.) Surround the
entire instance with quotes because it
contains a space. Examples : "1/23/90
22:30", "10/7/89 3:45".
-file directs the dump into the indicated file,
which is created in the current working
directory if no full or relative pathname is
provided. If the issuer does not provide
this argument, the dump is directed to
standard output (stdout).
-cell specifies the cell in which to run the
command. See section 8.3 in the Reference
Manual for more details. -noauth
tells the Volume and Volume Location Servers
to assign the identity anonymous to the
issuer. See section 8.3 in the Reference
Manual for more details. -localauth
constructs a server ticket using a key from
/usr/afs/etc/KeyFile. See section 8.3 in
the Reference Manual for more details.
-verbose
tells the Volume and Volume Location Servers
to trace their execution of the command.
See section 8.3 in the Reference Manual for
more details. -help
prints the online help for this command. Do
not provide any other arguments or flags
with this one. See section 8.3 in the
Reference Manual for more details.
EXAMPLES
The following executes a full dump of the volume user.terry
into the file /afs/transarc.com/common/dumps/terry.dump in
the current working directory.
% vos dump user.terry 0 terry.dump
The following executes an incremental dump of the volume
user.smith into the file smith.900131.dump in the current
working directory. Only those files in the volume with
modification time stamps later than 6:00 p.m. on 31 February
1990 are included in the dump.
% vos dump user.smith "1/31/90 18:00" smith.090131.dump
PRIVILEGE REQUIRED
Issuer must be listed in /usr/afs/etc/UserList on -server,
and must have WRITE access in the directory where the dump
file is to reside.
MORE INFORMATION
vos restore

Some files were not shown because too many files have changed in this diff Show More