1 # User configuration file for Shishi @VERSION@
2 # Copyright 2002, 2003 Simon Josefsson
4 # This file is free software; as a special exception the author gives
5 # unlimited permission to copy and/or distribute it, with or without
6 # modifications, as long as this notice is preserved.
8 # This file is distributed in the hope that it will be useful, but
9 # WITHOUT ANY WARRANTY, to the extent permitted by law; without even the
10 # implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
12 # Unless you you specify which configuration file to use (with the
13 # commandline option "--configuration-file filename"), Shishi uses the
14 # file $HOME/.shishi/config by default. Note that the system
15 # configuration file is read before this file. Settings specified
16 # here overrides those specified in the system configuration file.
18 # An option file can contain all long options which are
19 # available in Shishi. If the first non white space character of
20 # a line is a '#', this line is ignored. Empty lines are also
23 # See the manual for a list of options.
25 # Specify the default realm, by default the hostname of the host is used.
26 #default-realm JOSEFSSON.ORG
28 # Specify the default principal, by default the login username is used.
29 #default-principal jas
31 # Specify which encryption types client asks server to respond in
32 # during AS/TGS exchanges. List valid encryption types, in preference
33 # order. Supported algorithms include des3-hmac-sha1-kd, des-cbc-md5,
34 # des-cbc-md4, des-cbc-crc and null. This also indicates which
35 # encryption types are accepted by the client when receiving the response.
36 # Note that the preference order is not cryptographically protected,
37 # so a man in the middle can modify the order without being detected.
38 # Thus, only specify encryption types you trust completely here. If
39 # this is not specified, des3-cbc-sha1-kd and des-cbc-md5 is used.
40 #client-kdc-etypes=des-cbc-md5
42 # Enable verbose library messages.
45 # Also print ASN.1 dump of packets.
48 # And other rarely interesting information.
51 # Traces the crypto operations (really verbose!).