1 .\" $Id: zephyrd.8,v 1.9 1999/11/29 19:46:11 ghudson Exp $
3 .\" Copyright 1987 by the Massachusetts Institute of Technology
4 .\" All rights reserved. The file /usr/include/zephyr/mit-copyright.h
5 .\" specifies the terms and conditions for redistribution.
7 .TH ZEPHYRD 8 "July 1, 1988" "MIT Project Athena"
8 .ds ]W MIT Project Athena
10 zephyrd \- Zephyr server daemon
18 is the central server for the Zephyr Notification System.
19 It maintains a location database of all currently logged-in users, and a
20 subscription database for each user's Zephyr clients.
23 communicates with daemons running on other Zephyr server hosts, to
24 provide a reliable service.
26 While running, any unusual conditions are recorded via
28 to facility local6 at various levels.
31 option enables logging of additional debugging information.
35 is executed, it requests a list of server machines from Hesiod and
36 initializes its state from any
37 \fIzephyrd\fRs executing on the other known servers. This initialization
38 is only performed after the \fIzephyrd\fRs have authenticated themselves
39 to each other via Kerberos.
40 The server then enters a dispatch loop, servicing requests from clients and
44 enables logging of additional debugging information.
47 disables the logging of additional debugging information.
52 to re-read the default subscription file and to re-query Hesiod about
53 valid peers. Any peers which are not responding and no longer
54 mentioned in Hesiod are flushed; any peers not previously named by
57 .B SIGINT \fRand\fB SIGTERM
60 to gracefully shut down.
65 to dump the location and subscription databases to
69 Certain notice classes are restricted by the Zephyr server. Each such
70 class has access control lists enumerating who may transmit (xmt-*.acl) or
71 subscribe to that particular class. Subscriptions may be
72 restricted either absolutely (sub-*.acl files), or by instance restrictions.
73 iws-*.acl files control subscriptions to wildcarded instances.
74 iui-*.acl files control subscriptions to instances which are not the
75 Kerberos principal identity of the subscriber.
76 If an access control list of a given type is absent, there is no
77 restriction of that type on the class, except that any notices of the
78 class must be authenticated.
79 The class registry lists all classes which are restricted.
82 .I /usr/athena/lib/zephyr/class-registry.acl:
83 List of classes which are restricted
85 .I /usr/athena/lib/zephyr/iws-*.acl:
86 Access Control Lists for instance-wildcard restrictions
88 .I /usr/athena/lib/zephyr/iui-*.acl:
89 Access Control Lists for instance-identity restrictions
91 .I /usr/athena/lib/zephyr/sub-*.acl:
92 Access Control Lists for subscribing
94 .I /usr/athena/lib/zephyr/xmt-*.acl:
95 Access Control Lists for transmitting
97 .I /usr/athena/lib/zephyr/srvtab:
100 .I /usr/athena/lib/zephyr/ztkts:
101 Current Kerberos tickets for exchange with other servers
103 .I /usr/tmp/zephyr.db:
104 File containing an ASCII dump of the database.
106 The current implementation of the Zephyr server (\fIzephyrd(8)\fR) makes
107 no distinction between realm-announced, net-visible and net-announced
110 zephyr(1), zhm(8), kerberosintro(1), hesiod(3), access_control_lists(?),
113 Athena Technical Plan, Sections E.4.1 (Zephyr Notification Service) and
114 E.2.1 (Kerberos Authentication and Authorization System)
117 John T. Kohl, MIT Project Athena and Digital Equipment Corporation
119 Copyright (c) 1987,1988 by the Massachusetts Institute of Technology.
123 specifies the terms and conditions for redistribution.