2007-10-07 17:14:51 +05:30
|
|
|
.\"$Id: login.defs.5,v 1.10 2001/06/23 08:50:25 marekm Exp $
|
2007-10-07 17:14:44 +05:30
|
|
|
.\" Copyright 1991 - 1993, Julianne Frances Haugh and Chip Rosenthal
|
|
|
|
.\" All rights reserved.
|
|
|
|
.\"
|
|
|
|
.\" Redistribution and use in source and binary forms, with or without
|
|
|
|
.\" modification, are permitted provided that the following conditions
|
|
|
|
.\" are met:
|
|
|
|
.\" 1. Redistributions of source code must retain the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer.
|
|
|
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer in the
|
|
|
|
.\" documentation and/or other materials provided with the distribution.
|
|
|
|
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
|
|
|
.\" may be used to endorse or promote products derived from this software
|
|
|
|
.\" without specific prior written permission.
|
|
|
|
.\"
|
|
|
|
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
|
|
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
.\" SUCH DAMAGE.
|
|
|
|
.TH LOGIN 5
|
|
|
|
.SH NAME
|
|
|
|
/etc/login.defs \- Login configuration
|
|
|
|
.SH DESCRIPTION
|
|
|
|
The
|
|
|
|
.I /etc/login.defs
|
|
|
|
file defines the site-specific configuration for the shadow login
|
|
|
|
suite. This file is required. Absence of this file will not prevent
|
|
|
|
system operation, but will probably result in undesirable operation.
|
|
|
|
.PP
|
|
|
|
This file is a readable text file, each line of the file describing
|
|
|
|
one configuration parameter. The lines consist of a configuration
|
|
|
|
name and value, seperated by whitespace. Blank lines and comment
|
|
|
|
lines are ignored. Comments are introduced with a `#' pound sign and
|
|
|
|
the pound sign must be the first non-white character of the line.
|
|
|
|
.PP
|
|
|
|
Parameter values may be of four types: strings, booleans, numbers,
|
|
|
|
and long numbers. A string is comprised of any printable characters.
|
|
|
|
A boolean should be either the value ``yes'' or ``no''. An undefined
|
|
|
|
boolean parameter or one with a value other than these will be given
|
|
|
|
a ``no'' value. Numbers (both regular and long) may be either decimal
|
|
|
|
values, octal values (precede the value with ``0'') or hexadecimal
|
|
|
|
values (precede the value with ``0x''). The maximum value of the
|
|
|
|
regular and long numeric parameters is machine-dependant.
|
|
|
|
.PP
|
|
|
|
The following configuration items are provided:
|
|
|
|
.\"
|
|
|
|
.IP "CHFN_AUTH (boolean)"
|
|
|
|
If
|
|
|
|
.IR yes ,
|
|
|
|
the
|
|
|
|
.B chfn
|
|
|
|
and
|
|
|
|
.B chsh
|
|
|
|
programs will ask for password before making any changes, unless
|
|
|
|
run by the superuser.
|
|
|
|
.\"
|
|
|
|
.IP "CHFN_RESTRICT (string)"
|
|
|
|
This parameter specifies which values in the
|
|
|
|
.I gecos
|
|
|
|
field of the
|
|
|
|
.I passwd
|
|
|
|
file may be changed by regular users using the
|
|
|
|
.B chfn
|
|
|
|
program. It can be any combination of letters
|
|
|
|
.IR f ,
|
|
|
|
.IR r ,
|
|
|
|
.IR w ,
|
|
|
|
.IR h ,
|
|
|
|
for Full name, Room number, Work phone, and Home phone, respectively.
|
|
|
|
If not specified, only the superuser can make any changes.
|
|
|
|
.\"
|
|
|
|
.IP "CLOSE_SESSIONS (boolean)"
|
|
|
|
Enable pam_close_session() calling. When using normal (pam_unix.so)
|
|
|
|
session handling modules, this is not needed. However with modules
|
|
|
|
(such as kerberos or other persistent session models),
|
|
|
|
.B login
|
|
|
|
needs to fork and wait for the shell to exit, so that sessions can be
|
|
|
|
cleaned up.
|
|
|
|
.\"
|
|
|
|
.IP "CONSOLE (string)"
|
|
|
|
If specified, this definition provides for a restricted set of lines
|
|
|
|
on which root logins will be allowed. An attempted root login which
|
|
|
|
does not meet the criteria established here will be rejected. The
|
|
|
|
value of this field may be one of two forms, either a fully-rooted
|
|
|
|
pathname such as
|
|
|
|
.sp
|
|
|
|
.ft I
|
|
|
|
CONSOLE /etc/consoles
|
|
|
|
.ft R
|
|
|
|
.sp
|
|
|
|
or a colon-delimited list of terminal lines such as:
|
|
|
|
.sp
|
|
|
|
.ft I
|
|
|
|
CONSOLE console:tty01:tty02:tty03:tty04
|
|
|
|
.ft R
|
|
|
|
.sp
|
|
|
|
If a pathname is given, each line of the file should specify one
|
|
|
|
terminal line. If this parameter is not defined or the specified file
|
|
|
|
does not exist, then root logins will be allowed from any terminal
|
|
|
|
line. Because the removal of this file, or its truncation, could
|
|
|
|
result in unauthorized root logins, this file must be protected.
|
|
|
|
Where security is critical, the colon-separated form should be used
|
|
|
|
to prevent this potential method of attack.
|
|
|
|
.\"
|
|
|
|
.IP "CONSOLE_GROUPS (string)"
|
|
|
|
XXX needs to be documented.
|
|
|
|
.\"
|
|
|
|
.IP "CRACKLIB_DICTPATH (string)"
|
|
|
|
XXX needs to be documented.
|
|
|
|
.\"
|
|
|
|
.IP "DEFAULT_HOME (boolean)"
|
|
|
|
XXX needs to be documented.
|
|
|
|
.\"
|
|
|
|
.IP "DIALUPS_CHECK_ENAB (boolean)"
|
|
|
|
If
|
|
|
|
.I yes
|
|
|
|
and an
|
|
|
|
.I /etc/dialups
|
|
|
|
file exists, then secondary passwords are enabled upon the dialup
|
|
|
|
lines specified in this file. This file should contain a list of
|
|
|
|
dialups, one per line, for example:
|
|
|
|
.nf
|
|
|
|
.sp
|
|
|
|
.ft I
|
|
|
|
ttyfm01
|
|
|
|
ttyfm02
|
|
|
|
\0\0.
|
|
|
|
\0\0.
|
|
|
|
\0\0.
|
|
|
|
.ft R
|
|
|
|
.sp
|
|
|
|
.fi
|
|
|
|
.\"
|
|
|
|
.IP "ENVIRON_FILE (string)"
|
|
|
|
File containing a list of environment variables (one per line) to set
|
|
|
|
when logging in or su'ing.
|
|
|
|
.\"
|
|
|
|
.IP "ENV_HZ (string)"
|
|
|
|
This parameter specifies a value for an HZ environment parameter.
|
|
|
|
Example usage is:
|
|
|
|
.sp
|
|
|
|
\fIENV_HZ HZ=50\fR
|
|
|
|
.sp
|
|
|
|
If this parameter is not defined then no HZ value will be established.
|
|
|
|
.\"
|
|
|
|
.IP "ENV_PATH (string)"
|
|
|
|
This parameter must be defined as the search path for regular users.
|
|
|
|
When a login with UID other than zero occurs, the PATH environment
|
|
|
|
parameter is initialized to this value. This parameter is required;
|
|
|
|
if undefined a possibly incorrect default value will be provided.
|
|
|
|
.\"
|
|
|
|
.IP "ENV_SUPATH (string)"
|
|
|
|
This parameter must be defined as the search path for the superuser.
|
|
|
|
When a login with UID zero occurs, the PATH environment parameter is
|
|
|
|
initialized to this value. This parameter is required; if undefined
|
|
|
|
a possibly incorrect default value will be provided.
|
|
|
|
.\"
|
|
|
|
.IP "ENV_TZ (string)"
|
|
|
|
This parameter specifies information for generating a TZ environment
|
|
|
|
parameter. The value must either be the desired contents of TZ, or
|
|
|
|
the full pathname of a file which contains this information. Example
|
|
|
|
usage is:
|
|
|
|
.sp
|
|
|
|
\fIENV_TZ\0\0\0\0TZ=CST6CDT\fP
|
|
|
|
.sp
|
|
|
|
or
|
|
|
|
.sp
|
|
|
|
\fIENV_TZ\0\0\0\0/etc/tzname\fP
|
|
|
|
.sp
|
|
|
|
If a nonexistent file is named, then TZ will be initialized to some
|
|
|
|
default value. If this parameter is not defined then no TZ value will
|
|
|
|
be established.
|
|
|
|
.\"
|
|
|
|
.IP "ERASECHAR (number)"
|
|
|
|
The terminal
|
|
|
|
.I erase
|
|
|
|
character is initialized to this value. This is supported only on
|
|
|
|
systems with the
|
|
|
|
.I termio
|
|
|
|
interface, e.g. System V. If not specified, the erase character will
|
|
|
|
be initialized to a backspace. See KILLCHAR for related information.
|
|
|
|
.\"
|
|
|
|
.IP "FAILLOG_ENAB (boolean)"
|
|
|
|
If
|
|
|
|
.I yes
|
|
|
|
then login failures will be accumulated in
|
|
|
|
.I /var/log/faillog
|
|
|
|
in a
|
|
|
|
.BR faillog (8)
|
|
|
|
format.
|
|
|
|
.\"
|
|
|
|
.IP "FAIL_DELAY (number)"
|
|
|
|
Delay time in seconds after each failed login attempt.
|
|
|
|
.\"
|
|
|
|
.IP "FAKE_SHELL (string)"
|
|
|
|
Instead of the real user shell, the program specified by this
|
|
|
|
parameter will be launched, although its visible name (argv[0]) will
|
|
|
|
be the shell's. The program may do whatever it wants (logging,
|
|
|
|
additional authentification, banner, ...) before running the actual
|
|
|
|
shell.
|
|
|
|
.\"
|
|
|
|
.IP "FTMP_FILE (string)"
|
|
|
|
This parameter specifies the full pathname to a file to which login
|
|
|
|
failures are recorded. When a login failure occurs, a
|
|
|
|
.I utmp
|
|
|
|
format record will be appended to this file. Note that this differs
|
|
|
|
from the
|
|
|
|
.I /var/log/faillog
|
|
|
|
failure logging in that this facility logs every failure whereas the
|
|
|
|
``faillog'' facility accumulates failure information per user. If
|
|
|
|
this parameter is not specified then logging will be inhibited. See
|
|
|
|
FAILLOG_ENAB and LOG_UNKFAIL_ENAB for related information.
|
|
|
|
.\"
|
|
|
|
.IP "GID_MAX (number)"
|
|
|
|
.IP "GID_MIN (number)"
|
|
|
|
Range of group IDs to choose from for the
|
|
|
|
.B groupadd
|
|
|
|
program.
|
|
|
|
.\"
|
|
|
|
.IP "HUSHLOGIN_FILE (string)"
|
|
|
|
This parameter is used to establish ``hushlogin'' conditions. There
|
|
|
|
are two possible ways to establish these conditions. First, if the
|
|
|
|
value of this parameter is a filename and that file exists in the
|
|
|
|
user's home directory then ``hushlogin'' conditions will be in effect.
|
|
|
|
The contents of this file are ignored; its mere presence triggers
|
|
|
|
``hushlogin'' conditions. Second, if the value of this parameter is
|
|
|
|
a full pathname and either the user's login name or the user's shell
|
|
|
|
is found in this file, then ``hushlogin'' conditions will be in effect.
|
|
|
|
In this case, the file should be in a format similar to:
|
|
|
|
.nf
|
|
|
|
.sp
|
|
|
|
.ft I
|
|
|
|
demo
|
|
|
|
/usr/lib/uucp/uucico
|
|
|
|
\0\0.
|
|
|
|
\0\0.
|
|
|
|
\0\0.
|
|
|
|
.ft R
|
|
|
|
.sp
|
|
|
|
.fi
|
|
|
|
If this parameter is not defined, then ``hushlogin'' conditions will
|
|
|
|
never occur. When ``hushlogin'' conditions are established, the
|
|
|
|
message of the day, last successful and unsuccessful login display,
|
|
|
|
mail status display, and password aging checks are suppressed. Note
|
|
|
|
that allowing hushlogin files in user home directories allows the user
|
|
|
|
to disable password aging checks. See MOTD_FILE, FAILLOG_ENAB,
|
|
|
|
LASTLOG_ENAB, and MAIL_CHECK_ENAB for related information.
|
|
|
|
.\"
|
|
|
|
.IP "ISSUE_FILE (string)"
|
|
|
|
Full pathname of the file to display before each login prompt.
|
|
|
|
.\"
|
|
|
|
.IP "KILLCHAR (number)"
|
|
|
|
The terminal
|
|
|
|
.I kill
|
|
|
|
character is initialized to this value. This is supported only on
|
|
|
|
systems with the
|
|
|
|
.I termio
|
|
|
|
interface, e.g. System V. If not specified, the kill character will
|
|
|
|
be initialized to a \s-2CTRL/U\s0.
|
|
|
|
See ERASECHAR for related information.
|
|
|
|
.\"
|
|
|
|
.IP "LASTLOG_ENAB (boolean)"
|
|
|
|
If
|
|
|
|
.IR yes ,
|
|
|
|
and if the
|
|
|
|
.I /var/log/lastlog
|
|
|
|
file exists, then a successful user login will be recorded to this
|
|
|
|
file. Furthermore, if this option is enabled then the times of the
|
|
|
|
most recent successful and unsuccessful logins will be displayed to
|
|
|
|
the user upon login. The unsuccessful login display will be suppressed
|
|
|
|
if FAILLOG_ENAB is not enabled. If ``hushlogin'' conditions are in
|
|
|
|
effect, then both the successful and unsuccessful login information
|
|
|
|
will be suppressed.
|
|
|
|
.\"
|
|
|
|
.IP "LOGIN_RETRIES (number)"
|
|
|
|
Number of login attempts allowed before the
|
|
|
|
.B login
|
|
|
|
program exits.
|
|
|
|
.\"
|
|
|
|
.IP "LOGIN_STRING (string)"
|
|
|
|
XXX needs to be documented.
|
|
|
|
.IP "LOGIN_TIMEOUT (number)"
|
|
|
|
XXX needs to be documented.
|
|
|
|
.IP "LOG_OK_LOGINS (boolean)"
|
|
|
|
XXX needs to be documented.
|
|
|
|
.IP "LOG_UNKFAIL_ENAB (boolean)"
|
|
|
|
If
|
|
|
|
.I yes
|
|
|
|
then unknown usernames will be included when a login failure is
|
|
|
|
recorded. Note that this is a potential security risk; a common login
|
|
|
|
failure mode is transposition of the user name and password, thus this
|
|
|
|
mode will often cause passwords to accumulate in the failure logs.
|
|
|
|
If this option is disabled then unknown usernames will be suppressed
|
|
|
|
in login failure messages.
|
|
|
|
.\"
|
|
|
|
.IP "MAIL_CHECK_ENAB (boolean)"
|
|
|
|
If
|
|
|
|
.IR yes ,
|
|
|
|
the user will be notified of his or her mailbox status upon login.
|
|
|
|
See MAIL_DIR for related information.
|
|
|
|
.\"
|
|
|
|
.IP "MAIL_DIR (string)"
|
|
|
|
This parameter specifies the full pathname to the directory which
|
|
|
|
contains the user mailbox files. The user's login name is appended
|
|
|
|
to this path to form the MAIL environment parameter \- the path to
|
|
|
|
the user's mailbox. Either this parameter or MAIL_FILE must be defined;
|
|
|
|
if undefined some possibly incorrect default value will be assumed.
|
|
|
|
See MAIL_CHECK_ENAB for related information.
|
|
|
|
.\"
|
|
|
|
.IP "MAIL_FILE (string)"
|
|
|
|
This parameter specifies the name of the user's mailbox file. This
|
|
|
|
name is appended to the name of the user's home directory to form the
|
|
|
|
MAIL environment parameter \- the path to the user's mailbox. Either
|
|
|
|
this parameter or MAIL_DIR must be defined; if undefined some possibly
|
|
|
|
incorrect default value will be assumed. See MAIL_CHECK_ENAB for
|
|
|
|
related information.
|
|
|
|
.\"
|
|
|
|
.IP "MD5_CRYPT_ENAB (boolean)"
|
|
|
|
If
|
|
|
|
.IR yes ,
|
|
|
|
the
|
|
|
|
.B passwd
|
|
|
|
program will encrypt newly changed passwords using a new MD5-based
|
|
|
|
.BR crypt (3)
|
|
|
|
password hashing algorithm, which originally appeared in FreeBSD, and
|
|
|
|
is also supported by libc-5.4.38 and glibc-2.0 (or higher) on Linux.
|
|
|
|
This algorithm allows passwords longer than 8 characters (limited by
|
|
|
|
.BR getpass (3)
|
|
|
|
to 127 characters), but is incompatible with traditional
|
|
|
|
.BR crypt (3)
|
|
|
|
implementations.
|
|
|
|
.\"
|
|
|
|
.IP "MOTD_FILE (string)"
|
|
|
|
This parameter specifies a colon-delimited list of pathnames to ``message
|
|
|
|
of the day'' files.
|
|
|
|
If a specified file exists, then its contents are displayed to the user
|
|
|
|
upon login.
|
|
|
|
If this parameter is not defined or ``hushlogin'' login conditions are
|
|
|
|
in effect, this information will be suppressed.
|
|
|
|
.\"
|
|
|
|
.IP "NOLOGINS_FILE (string)"
|
|
|
|
This parameter specifies the full pathname to a file which inhibits
|
|
|
|
non-root logins. If this file exists and a user other than root
|
|
|
|
attempts to log in, the contents of the file will be displayed and
|
|
|
|
the user will be disconnected. If this parameter is not specified
|
|
|
|
then this feature will be inhibited.
|
|
|
|
.\"
|
|
|
|
.IP "NOLOGIN_STR (string)"
|
|
|
|
XXX needs to be documented.
|
|
|
|
.\"
|
|
|
|
.IP "OBSCURE_CHECKS_ENAB (boolean)"
|
|
|
|
If
|
|
|
|
.IR yes ,
|
|
|
|
the
|
|
|
|
.B passwd
|
|
|
|
program will perform additional checks before accepting a password change.
|
|
|
|
The checks performed are fairly simple, and their use is recommended.
|
|
|
|
These obscurity checks are bypassed if
|
|
|
|
.B passwd
|
|
|
|
is run by
|
|
|
|
.IR root .
|
|
|
|
See PASS_MIN_LEN for related information.
|
|
|
|
.\"
|
|
|
|
.IP "PASS_ALWAYS_WARN (boolean)"
|
|
|
|
XXX needs to be documented.
|
|
|
|
.\"
|
|
|
|
.IP "PASS_CHANGE_TRIES (number)"
|
|
|
|
XXX needs to be documented.
|
|
|
|
.\"
|
|
|
|
.IP "PASS_MIN_DAYS (number)"
|
|
|
|
The minimum number of days allowed between password changes. Any password
|
|
|
|
changes attempted sooner than this will be rejected. If not specified, a
|
|
|
|
zero value will be assumed.
|
|
|
|
.\"
|
|
|
|
.IP "PASS_MIN_LEN (number)"
|
|
|
|
The minimum number of characters in an acceptable password. An attempt to
|
|
|
|
assign a password with fewer characters will be rejected. A zero value
|
|
|
|
suppresses this check. If not specified, a zero value will be assumed.
|
|
|
|
.\"
|
|
|
|
.IP "PASS_MAX_DAYS (number)"
|
|
|
|
The maximum number of days a password may be used. If the password is
|
|
|
|
older than this, then the account will be locked. If not specified,
|
|
|
|
a large value will be assumed.
|
|
|
|
.\"
|
|
|
|
.IP "PASS_MAX_LEN (number)"
|
|
|
|
XXX needs to be documented.
|
|
|
|
.\"
|
|
|
|
.IP "PASS_WARN_AGE (number)"
|
|
|
|
The number of days warning given before a password expires. A zero means
|
|
|
|
warning is given only upon the day of expiration, a negative value means
|
|
|
|
no warning is given. If not specified, no warning will be provided.
|
|
|
|
.\"
|
|
|
|
.IP "PORTTIME_CHECKS_ENAB (boolean)"
|
|
|
|
If
|
|
|
|
.I yes
|
|
|
|
and an
|
|
|
|
.I /etc/porttime
|
|
|
|
file exists, that file will be consulted to ensure the user may login
|
|
|
|
at this time on the given line.
|
|
|
|
c.f.
|
|
|
|
.BR porttime (5)
|
|
|
|
.\"
|
|
|
|
.IP "QMAIL_DIR (string)"
|
|
|
|
For Qmail users, this parameter specifies a directory where a Maildir
|
|
|
|
hierarchy is stored.
|
|
|
|
See MAIL_CHECK_ENAB for related information.
|
|
|
|
.\"
|
|
|
|
.IP "QUOTAS_ENAB (boolean)"
|
|
|
|
If
|
|
|
|
.I yes ,
|
|
|
|
then the user's ``ulimit,'' ``umask,'' and ``niceness'' will be
|
|
|
|
initialized to the values if specified in the
|
|
|
|
.I gecos
|
|
|
|
field of the
|
|
|
|
.I passwd
|
|
|
|
file.
|
|
|
|
c.f.
|
|
|
|
.BR passwd (5).
|
|
|
|
.\"
|
|
|
|
.IP "SU_NAME (string)"
|
|
|
|
This parameter assigns a command name when ``su -'' is run. For
|
|
|
|
example, if the parameter is defined as ``su'', then a
|
|
|
|
.BR ps (1)
|
|
|
|
listing would show the command running as ``-su''. If this parameter
|
|
|
|
is undefined, then a
|
|
|
|
.BR ps (1)
|
|
|
|
listing would show the name of the actual shell being run, e.g.
|
|
|
|
something like ``-sh''.
|
|
|
|
.\"
|
|
|
|
.IP "SULOG_FILE (string)"
|
|
|
|
This parameter specifies a full pathname of a file in which
|
|
|
|
.B su
|
|
|
|
activity is logged.
|
|
|
|
If this parameter is not specified, the logging is suppressed.
|
|
|
|
Because the
|
|
|
|
.B su
|
|
|
|
command may be used when attempting to authenticate a password,
|
|
|
|
either this option, or
|
|
|
|
.I syslog
|
|
|
|
should be used to note
|
|
|
|
.B su
|
|
|
|
activity. See the SYSLOG_SU_ENAB option for related information.
|
|
|
|
.\"
|
|
|
|
.IP "SU_WHEEL_ONLY (boolean)"
|
|
|
|
XXX needs to be documented.
|
|
|
|
.\"
|
|
|
|
.IP "SYSLOG_SG_ENAB (boolean)"
|
|
|
|
XXX needs to be documented.
|
|
|
|
.\"
|
|
|
|
.IP "SYSLOG_SU_ENAB (boolean)"
|
|
|
|
If
|
|
|
|
.I yes
|
|
|
|
and
|
|
|
|
.B login
|
|
|
|
was compiled with
|
|
|
|
.I syslog
|
|
|
|
support, then all
|
|
|
|
.B su
|
|
|
|
activity will be noted through the
|
|
|
|
.I syslog
|
|
|
|
facility.
|
|
|
|
See SULOG_FILE for related information.
|
|
|
|
.\"
|
|
|
|
.IP "TTYGROUP (string or number)"
|
|
|
|
The group ownership of the terminal is initialized to this group
|
|
|
|
name or number. One well-known security attack involves forcing terminal
|
|
|
|
control sequences upon another user's terminal line. This problem
|
|
|
|
can be averted by disabling permissions which allow other users to
|
|
|
|
access the terminal line, but this unfortunately prevents programs
|
|
|
|
such as
|
|
|
|
.B write
|
|
|
|
from operating. Another solution is to use a version of the
|
|
|
|
.B write
|
|
|
|
program which filters out potentially dangerous character sequences,
|
|
|
|
make this program ``setgid'' to a special group, assign group ownership
|
|
|
|
of the terminal line to this special group, and assign permissions of
|
|
|
|
\fI0620\fR to the terminal line. The TTYGROUP definition has been
|
|
|
|
provided for just this situation. If this item is not defined, then
|
|
|
|
the group ownership of the terminal is initialized to the user's group
|
|
|
|
number. See TTYPERMS for related information.
|
|
|
|
.\"
|
|
|
|
.IP "TTYPERM (number)"
|
|
|
|
The login terminal permissions are initialized to this value. Typical
|
|
|
|
values will be \fI0622\fR to permit others write access to the line
|
|
|
|
or \fI0600\fR to secure the line from other users. If not specified,
|
|
|
|
the terminal permissions will be initialized to \fI0622\fR. See
|
|
|
|
TTYGROUP for related information.
|
|
|
|
.\"
|
|
|
|
.IP "TTYTYPE_FILE (string)"
|
|
|
|
This parameter specifies the full pathname to a file which maps terminal
|
|
|
|
lines to terminal types. Each line of the file contains a terminal
|
|
|
|
type and a terminal line, seperated by whitespace, for example:
|
|
|
|
.nf
|
|
|
|
.sp
|
|
|
|
.ft I
|
|
|
|
vt100\0 tty01
|
|
|
|
wyse60 tty02
|
|
|
|
\0\0.\0\0\0 \0\0.
|
|
|
|
\0\0.\0\0\0 \0\0.
|
|
|
|
\0\0.\0\0\0 \0\0.
|
|
|
|
.ft R
|
|
|
|
.sp
|
|
|
|
.fi
|
|
|
|
This information is only used to initialize the TERM environment parameter
|
|
|
|
when it does not already exist.
|
|
|
|
A line starting with a ``#'' pound sign will be treated as a comment.
|
|
|
|
If this paramter is not specified, the file does not exist, or the terminal
|
|
|
|
line is not found in the file, then the TERM environment parameter will not
|
|
|
|
be set.
|
|
|
|
.\"
|
|
|
|
.IP "UID_MAX (number)"
|
|
|
|
XXX needs to be documented.
|
|
|
|
.IP "UID_MIN (number)"
|
|
|
|
XXX needs to be documented.
|
|
|
|
.\"
|
|
|
|
.IP "ULIMIT (long number)"
|
|
|
|
The file size limit is initialized to this value. This is supported
|
|
|
|
only on systems with a
|
|
|
|
.IR ulimit ,
|
|
|
|
e.g. System V. If not specified, the file size limit will be initialized
|
|
|
|
to some large value.
|
|
|
|
.\"
|
|
|
|
.IP "UMASK (number)"
|
|
|
|
The permission mask is initialized to this value. If not specified,
|
2007-10-07 17:14:51 +05:30
|
|
|
the permission mask will be initialized to 077.
|
2007-10-07 17:14:44 +05:30
|
|
|
.\"
|
|
|
|
.IP "USERDEL_CMD (string)"
|
|
|
|
XXX needs to be documented.
|
|
|
|
.\"
|
|
|
|
.SH CROSS REFERENCE
|
|
|
|
The following cross reference shows which programs in the shadow login
|
|
|
|
suite use which parameters.
|
|
|
|
.na
|
|
|
|
.IP login 12
|
|
|
|
CONSOLE DIALUPS_CHECK_ENAB ENV_HZ ENV_SUPATH ENV_TZ ERASECHAR FAILLOG_ENAB
|
|
|
|
FTMP_FILE HUSHLOGIN_FILE KILLCHAR LASTLOG_ENAB LOG_UNKFAIL_ENAB
|
|
|
|
MAIL_CHECK_ENAB MAIL_DIR MOTD_FILE NOLOGINS_FILE PORTTIME_CHECKS_ENAB
|
|
|
|
QUOTAS_ENAB TTYPERM TTYTYPE_FILE ULIMIT UMASK
|
|
|
|
.IP newusers 12
|
|
|
|
PASS_MAX_DAYS PASS_MIN_DAYS PASS_WARN_AGE UMASK
|
|
|
|
.IP passwd 12
|
|
|
|
OBSCURE_CHECKS_ENAB PASS_MIN_LEN
|
|
|
|
.IP pwconv 12
|
|
|
|
PASS_MAX_DAYS PASS_MIN_DAYS PASS_WARN_AGE
|
|
|
|
.IP su 12
|
|
|
|
ENV_HZ ENV_SUPATH ENV_TZ HUSHLOGIN_FILE MAIL_CHECK_ENAB MAIL_DIR
|
|
|
|
MOTD_FILE NOLOGIN_STR QUOTAS_ENAB SULOG_FILE SYSLOG_SU_ENAB
|
|
|
|
.IP sulogin 12
|
|
|
|
ENV_HZ ENV_SUPATH ENV_TZ MAIL_DIR QUOTAS_ENAB TTYPERM
|
|
|
|
.ad
|
|
|
|
.SH BUGS
|
|
|
|
Some of the supported configuration parameters are not documented in this
|
|
|
|
manual page.
|
|
|
|
.SH SEE ALSO
|
|
|
|
.BR login (1),
|
|
|
|
.BR passwd (5),
|
|
|
|
.BR faillog (5),
|
|
|
|
.BR porttime (5),
|
|
|
|
.BR faillog (8)
|
|
|
|
.SH AUTHORS
|
|
|
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
|
|
|
.br
|
|
|
|
Chip Rosenthal (chip@unicom.com)
|