head	1.5;
access;
symbols
	RELEASE_7_3_0:1.4
	RELEASE_8_0_0:1.4
	old_RELEASE_7_2_0:1.3
	old_RELEASE_7_1_0:1.3
	old_RELEASE_6_4_0:1.3
	old_RELEASE_5_EOL:1.3
	old_RELEASE_7_0_0:1.3
	old_RELEASE_6_3_0:1.3
	old_PRE_XORG_7:1.3
	old_RELEASE_4_EOL:1.3
	old_RELEASE_6_2_0:1.3
	old_RELEASE_6_1_0:1.3
	old_RELEASE_5_5_0:1.3
	old_RELEASE_6_0_0:1.3
	old_RELEASE_5_4_0:1.2
	old_RELEASE_4_11_0:1.2
	old_RELEASE_5_3_0:1.2
	old_RELEASE_4_10_0:1.2
	old_RELEASE_5_2_1:1.2
	old_RELEASE_5_2_0:1.2
	old_RELEASE_4_9_0:1.2
	old_RELEASE_5_1_0:1.2
	old_RELEASE_4_8_0:1.2
	old_RELEASE_5_0_0:1.2
	old_RELEASE_4_7_0:1.2
	old_RELEASE_4_6_2:1.2
	old_RELEASE_4_6_1:1.2
	old_RELEASE_4_6_0:1.2
	old_RELEASE_5_0_DP1:1.2
	old_RELEASE_4_5_0:1.2
	old_RELEASE_4_4_0:1.2
	old_RELEASE_4_3_0:1.2
	old_RELEASE_4_2_0:1.2
	old_RELEASE_4_1_1:1.2
	old_RELEASE_4_1_0:1.2
	old_krb5_1_2:1.2
	old_krb5_1_1_1:1.2
	old_RELEASE_3_5_0:1.2
	old_RELEASE_4_0_0:1.2
	old_RELEASE_3_4_0:1.2
	old_RELEASE_3_3_0:1.2
	old_krb5_1_0_6:1.2
	old_RELEASE_3_2_0:1.2
	old_RELEASE_3_1_0:1.1.1.1
	old_RELEASE_2_2_8:1.1.1.1
	old_RELEASE_3_0_0:1.1.1.1
	old_RELEASE_2_2_7:1.1.1.1
	old_krb5_1_0_5:1.2
	old_VIDRINE:1.1.1;
locks; strict;
comment	@# @;


1.5
date	2010.04.26.03.25.33;	author cy;	state dead;
branches;
next	1.4;

1.4
date	2009.06.09.04.16.35;	author cy;	state Exp;
branches;
next	1.3;

1.3
date	2005.04.13.03.09.14;	author cy;	state Exp;
branches;
next	1.2;

1.2
date	99.05.03.04.04.30;	author mharo;	state Exp;
branches;
next	1.1;

1.1
date	98.07.06.02.28.42;	author nectar;	state Exp;
branches
	1.1.1.1;
next	;

1.1.1.1
date	98.07.06.02.28.42;	author nectar;	state Exp;
branches;
next	;


desc
@@


1.5
log
@Remove krb5-17, which has been merged into the krb5 port.
@
text
@Kerberos V5 is an authentication system developed at MIT.  
WWW: http://web.mit.edu/kerberos/

Abridged from the User Guide:
       Under Kerberos, a client sends a request for a ticket to the 
   Key Distribution Center (KDC). The KDC creates a ticket-granting 
   ticket (TGT) for the client, encrypts it using the client's 
   password as the key, and sends the encrypted TGT back to the 
   client. The client then attempts to decrypt the TGT, using
   its password. If the client successfully decrypts the TGT, it 
   keeps the decrypted TGT, which indicates proof of the client's 
   identity. The TGT permits the client to obtain additional tickets, 
   which give permission for specific services.
       Since Kerberos negotiates authenticated, and optionally encrypted,   
   communications between two points anywhere on the internet, it
   provides a layer of security that is not dependent on which side of a
   firewall either client is on.
       The Kerberos V5 package is designed to be easy to use. Most of the  
   commands are nearly identical to UNIX network programs you are already
   used to. Kerberos V5 is a single-sign-on system, which means that you 
   have to type your password only once per session, and Kerberos does   
   the authenticating and encrypting transparently.  

Jacques Vidrine <n@@nectar.com>
@


1.4
log
@This forced commit documents the repocopy of security/krb5 to security/krb5-17
in preparation for inclusion of KRB5 1.7 in the ports collection.

PR:		135290
@
text
@@


1.3
log
@Update web page URL.
@
text
@@


1.2
log
@Add WWW: to DESCR files
@
text
@d2 1
a2 1
WWW: http://web.mit.edu/kerberos/www/
@


1.1
log
@Initial revision
@
text
@d2 1
a2 1
See also: http://web.mit.edu/kerberos/www/
@


1.1.1.1
log
@New port, KerberosV 1.0.5.
PR:		ports/6870
Submitted by:	Jacques Vidrine <n@@nectar.com>
@
text
@@
