1KDB5_UTIL(8) MIT Kerberos KDB5_UTIL(8)
2
3
4
6 kdb5_util - Kerberos database maintenance utility
7
9 kdb5_util [-r realm] [-d dbname] [-k mkeytype] [-kv mkeyVNO] [-M mkey‐
10 name] [-m] [-sf stashfilename] [-P password] [-x db_args] command [com‐
11 mand_options]
12
14 kdb5_util allows an administrator to perform maintenance procedures on
15 the KDC database. Databases can be created, destroyed, and dumped to
16 or loaded from ASCII files. kdb5_util can create a Kerberos master key
17 stash file or perform live rollover of the master key.
18
19 When kdb5_util is run, it attempts to acquire the master key and open
20 the database. However, execution continues regardless of whether or
21 not kdb5_util successfully opens the database, because the database may
22 not exist yet or the stash file may be corrupt.
23
24 Note that some KDC database modules may not support all kdb5_util com‐
25 mands.
26
28 -r realm
29 specifies the Kerberos realm of the database.
30
31 -d dbname
32 specifies the name under which the principal database is stored;
33 by default the database is that listed in kdc.conf(5). The
34 password policy database and lock files are also derived from
35 this value.
36
37 -k mkeytype
38 specifies the key type of the master key in the database. The
39 default is given by the master_key_type variable in kdc.conf(5).
40
41 -kv mkeyVNO
42 Specifies the version number of the master key in the database;
43 the default is 1. Note that 0 is not allowed.
44
45 -M mkeyname
46 principal name for the master key in the database. If not spec‐
47 ified, the name is determined by the master_key_name variable in
48 kdc.conf(5).
49
50 -m specifies that the master database password should be read from
51 the keyboard rather than fetched from a file on disk.
52
53 -sf stash_file
54 specifies the stash filename of the master database password.
55 If not specified, the filename is determined by the
56 key_stash_file variable in kdc.conf(5).
57
58 -P password
59 specifies the master database password. Using this option may
60 expose the password to other users on the system via the process
61 list.
62
63 -x db_args
64 specifies database-specific options. See kadmin(1) for sup‐
65 ported options.
66
68 create
69 create [-s]
70
71 Creates a new database. If the -s option is specified, the stash file
72 is also created. This command fails if the database already exists.
73 If the command is successful, the database is opened just as if it had
74 already existed when the program was first run.
75
76 destroy
77 destroy [-f]
78
79 Destroys the database, first overwriting the disk sectors and then
80 unlinking the files, after prompting the user for confirmation. With
81 the -f argument, does not prompt the user.
82
83 stash
84 stash [-f keyfile]
85
86 Stores the master principal's keys in a stash file. The -f argument
87 can be used to override the keyfile specified in kdc.conf(5).
88
89 dump
90 dump [-b7|-r13|-r18] [-verbose] [-mkey_convert] [-new_mkey_file
91 mkey_file] [-rev] [-recurse] [filename [principals...]]
92
93 Dumps the current Kerberos and KADM5 database into an ASCII file. By
94 default, the database is dumped in current format, "kdb5_util load_dump
95 version 7". If filename is not specified, or is the string "-", the
96 dump is sent to standard output. Options:
97
98 -b7 causes the dump to be in the Kerberos 5 Beta 7 format
99 ("kdb5_util load_dump version 4"). This was the dump format
100 produced on releases prior to 1.2.2.
101
102 -r13 causes the dump to be in the Kerberos 5 1.3 format ("kdb5_util
103 load_dump version 5"). This was the dump format produced on
104 releases prior to 1.8.
105
106 -r18 causes the dump to be in the Kerberos 5 1.8 format ("kdb5_util
107 load_dump version 6"). This was the dump format produced on
108 releases prior to 1.11.
109
110 -verbose
111 causes the name of each principal and policy to be printed as it
112 is dumped.
113
114 -mkey_convert
115 prompts for a new master key. This new master key will be used
116 to re-encrypt principal key data in the dumpfile. The principal
117 keys themselves will not be changed.
118
119 -new_mkey_file mkey_file
120 the filename of a stash file. The master key in this stash file
121 will be used to re-encrypt the key data in the dumpfile. The
122 key data in the database will not be changed.
123
124 -rev dumps in reverse order. This may recover principals that do not
125 dump normally, in cases where database corruption has occurred.
126
127 -recurse
128 causes the dump to walk the database recursively (btree only).
129 This may recover principals that do not dump normally, in cases
130 where database corruption has occurred. In cases of such cor‐
131 ruption, this option will probably retrieve more principals than
132 the -rev option will.
133
134 Changed in version 1.15: Release 1.15 restored the functionality
135 of the -recurse option.
136
137
138 Changed in version 1.5: The -recurse option ceased working until
139 release 1.15, doing a normal dump instead of a recursive traver‐
140 sal.
141
142
143 load
144 load [-b7|-r13|-r18] [-hash] [-verbose] [-update] filename
145
146 Loads a database dump from the named file into the named database. If
147 no option is given to determine the format of the dump file, the format
148 is detected automatically and handled as appropriate. Unless the
149 -update option is given, load creates a new database containing only
150 the data in the dump file, overwriting the contents of any previously
151 existing database. Note that when using the LDAP KDC database module,
152 the -update flag is required.
153
154 Options:
155
156 -b7 requires the database to be in the Kerberos 5 Beta 7 format
157 ("kdb5_util load_dump version 4"). This was the dump format
158 produced on releases prior to 1.2.2.
159
160 -r13 requires the database to be in Kerberos 5 1.3 format ("kdb5_util
161 load_dump version 5"). This was the dump format produced on
162 releases prior to 1.8.
163
164 -r18 requires the database to be in Kerberos 5 1.8 format ("kdb5_util
165 load_dump version 6"). This was the dump format produced on
166 releases prior to 1.11.
167
168 -hash stores the database in hash format, if using the DB2 database
169 type. If this option is not specified, the database will be
170 stored in btree format. This option is not recommended, as
171 databases stored in hash format are known to corrupt data and
172 lose principals.
173
174 -verbose
175 causes the name of each principal and policy to be printed as it
176 is dumped.
177
178 -update
179 records from the dump file are added to or updated in the exist‐
180 ing database. Otherwise, a new database is created containing
181 only what is in the dump file and the old one destroyed upon
182 successful completion.
183
184 ark
185 ark [-e enc:salt,...] principal
186
187 Adds new random keys to principal at the next available key version
188 number. Keys for the current highest key version number will be pre‐
189 served. The -e option specifies the list of encryption and salt types
190 to be used for the new keys.
191
192 add_mkey
193 add_mkey [-e etype] [-s]
194
195 Adds a new master key to the master key principal, but does not mark it
196 as active. Existing master keys will remain. The -e option specifies
197 the encryption type of the new master key; see Encryption_types in
198 kdc.conf(5) for a list of possible values. The -s option stashes the
199 new master key in the stash file, which will be created if it doesn't
200 already exist.
201
202 After a new master key is added, it should be propagated to replica
203 servers via a manual or periodic invocation of kprop(8). Then, the
204 stash files on the replica servers should be updated with the kdb5_util
205 stash command. Once those steps are complete, the key is ready to be
206 marked active with the kdb5_util use_mkey command.
207
208 use_mkey
209 use_mkey mkeyVNO [time]
210
211 Sets the activation time of the master key specified by mkeyVNO. Once
212 a master key becomes active, it will be used to encrypt newly created
213 principal keys. If no time argument is given, the current time is
214 used, causing the specified master key version to become active immedi‐
215 ately. The format for time is getdate string.
216
217 After a new master key becomes active, the kdb5_util
218 update_princ_encryption command can be used to update all principal
219 keys to be encrypted in the new master key.
220
221 list_mkeys
222 list_mkeys
223
224 List all master keys, from most recent to earliest, in the master key
225 principal. The output will show the kvno, enctype, and salt type for
226 each mkey, similar to the output of kadmin(1) getprinc. A * following
227 an mkey denotes the currently active master key.
228
229 purge_mkeys
230 purge_mkeys [-f] [-n] [-v]
231
232 Delete master keys from the master key principal that are not used to
233 protect any principals. This command can be used to remove old master
234 keys all principal keys are protected by a newer master key.
235
236 -f does not prompt for confirmation.
237
238 -n performs a dry run, showing master keys that would be purged,
239 but not actually purging any keys.
240
241 -v gives more verbose output.
242
243 update_princ_encryption
244 update_princ_encryption [-f] [-n] [-v] [princ-pattern]
245
246 Update all principal records (or only those matching the princ-pattern
247 glob pattern) to re-encrypt the key data using the active database mas‐
248 ter key, if they are encrypted using a different version, and give a
249 count at the end of the number of principals updated. If the -f option
250 is not given, ask for confirmation before starting to make changes.
251 The -v option causes each principal processed to be listed, with an
252 indication as to whether it needed updating or not. The -n option per‐
253 forms a dry run, only showing the actions which would have been taken.
254
255 tabdump
256 tabdump [-H] [-c] [-e] [-n] [-o outfile] dumptype
257
258 Dump selected fields of the database in a tabular format suitable for
259 reporting (e.g., using traditional Unix text processing tools) or
260 importing into relational databases. The data format is tab-separated
261 (default), or optionally comma-separated (CSV), with a fixed number of
262 columns. The output begins with a header line containing field names,
263 unless suppression is requested using the -H option.
264
265 The dumptype parameter specifies the name of an output table (see
266 below).
267
268 Options:
269
270 -H suppress writing the field names in a header line
271
272 -c use comma separated values (CSV) format, with minimal quoting,
273 instead of the default tab-separated (unquoted, unescaped) for‐
274 mat
275
276 -e write empty hexadecimal string fields as empty fields instead of
277 as "-1".
278
279 -n produce numeric output for fields that normally have symbolic
280 output, such as enctypes and flag names. Also requests output
281 of time stamps as decimal POSIX time_t values.
282
283 -o outfile
284 write the dump to the specified output file instead of to stan‐
285 dard output
286
287 Dump types:
288
289 keydata
290 principal encryption key information, including actual key data
291 (which is still encrypted in the master key)
292
293 name principal name
294
295 keyindex
296 index of this key in the principal's key list
297
298 kvno key version number
299
300 enctype
301 encryption type
302
303 key key data as a hexadecimal string
304
305 salttype
306 salt type
307
308 salt salt data as a hexadecimal string
309
310 keyinfo
311 principal encryption key information (as in keydata above),
312 excluding actual key data
313
314 princ_flags
315 principal boolean attributes. Flag names print as hexadecimal
316 numbers if the -n option is specified, and all flag positions
317 are printed regardless of whether or not they are set. If -n is
318 not specified, print all known flag names for each principal,
319 but only print hexadecimal flag names if the corresponding flag
320 is set.
321
322 name principal name
323
324 flag flag name
325
326 value boolean value (0 for clear, or 1 for set)
327
328 princ_lockout
329 state information used for tracking repeated password failures
330
331 name principal name
332
333 last_success
334 time stamp of most recent successful authentication
335
336 last_failed
337 time stamp of most recent failed authentication
338
339 fail_count
340 count of failed attempts
341
342 princ_meta
343 principal metadata
344
345 name principal name
346
347 modby name of last principal to modify this principal
348
349 modtime
350 timestamp of last modification
351
352 lastpwd
353 timestamp of last password change
354
355 policy policy object name
356
357 mkvno key version number of the master key that encrypts this
358 principal's key data
359
360 hist_kvno
361 key version number of the history key that encrypts the
362 key history data for this principal
363
364 princ_stringattrs
365 string attributes (key/value pairs)
366
367 name principal name
368
369 key attribute name
370
371 value attribute value
372
373 princ_tktpolicy
374 per-principal ticket policy data, including maximum ticket life‐
375 times
376
377 name principal name
378
379 expiration
380 principal expiration date
381
382 pw_expiration
383 password expiration date
384
385 max_life
386 maximum ticket lifetime
387
388 max_renew_life
389 maximum renewable ticket lifetime
390
391 Examples:
392
393 $ kdb5_util tabdump -o keyinfo.txt keyinfo
394 $ cat keyinfo.txt
395 name keyindex kvno enctype salttype salt
396 K/M@EXAMPLE.COM 0 1 aes256-cts-hmac-sha384-192 normal -1
397 foo@EXAMPLE.COM 0 1 aes128-cts-hmac-sha1-96 normal -1
398 bar@EXAMPLE.COM 0 1 aes128-cts-hmac-sha1-96 normal -1
399 $ sqlite3
400 sqlite> .mode tabs
401 sqlite> .import keyinfo.txt keyinfo
402 sqlite> select * from keyinfo where enctype like 'aes256-%';
403 K/M@EXAMPLE.COM 1 1 aes256-cts-hmac-sha384-192 normal -1
404 sqlite> .quit
405 $ awk -F'\t' '$4 ~ /aes256-/ { print }' keyinfo.txt
406 K/M@EXAMPLE.COM 1 1 aes256-cts-hmac-sha384-192 normal -1
407
409 See kerberos(7) for a description of Kerberos environment variables.
410
412 kadmin(1), kerberos(7)
413
415 MIT
416
418 1985-2020, MIT
419
420
421
422
4231.18.2 KDB5_UTIL(8)