[svn-upgrade] Integrating new upstream version, shadow (4.0.10)

This commit is contained in:
nekral-guest
2007-10-07 11:46:25 +00:00
parent 7c47e0fde3
commit 8c50e06102
243 changed files with 17723 additions and 20142 deletions

View File

@@ -24,7 +24,6 @@ man_XMANS = \
login.access.5.xml \
login.defs.5.xml \
logoutd.8.xml \
mkpasswd.8.xml \
newusers.8.xml \
passwd.1.xml \
passwd.5.xml \
@@ -64,7 +63,6 @@ man_MANS = \
login.access.5 \
login.defs.5 \
logoutd.8 \
mkpasswd.8 \
newgrp.1 \
newusers.8 \
passwd.1 \
@@ -86,14 +84,15 @@ man_MANS = \
EXTRA_DIST = $(man_MANS) \
$(man_XMANS) \
id.1.xml \
pw_auth.3.xml \
shadowconfig.8.xml \
sulogin.8.xml \
id.1 \
id.1.xml \
pw_auth.3 \
pw_auth.3.xml \
shadowconfig.8 \
sulogin.8
shadowconfig.8.xml \
sulogin.8 \
sulogin.8.xml \
sulogin.8.xml
all:

View File

@@ -38,11 +38,7 @@ host_triplet = @host@
subdir = man
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
am__aclocal_m4_deps = $(top_srcdir)/configure.in
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
$(ACLOCAL_M4)
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
@@ -211,7 +207,6 @@ man_XMANS = \
login.access.5.xml \
login.defs.5.xml \
logoutd.8.xml \
mkpasswd.8.xml \
newusers.8.xml \
passwd.1.xml \
passwd.5.xml \
@@ -251,7 +246,6 @@ man_MANS = \
login.access.5 \
login.defs.5 \
logoutd.8 \
mkpasswd.8 \
newgrp.1 \
newusers.8 \
passwd.1 \
@@ -273,14 +267,15 @@ man_MANS = \
EXTRA_DIST = $(man_MANS) \
$(man_XMANS) \
id.1.xml \
pw_auth.3.xml \
shadowconfig.8.xml \
sulogin.8.xml \
id.1 \
id.1.xml \
pw_auth.3 \
pw_auth.3.xml \
shadowconfig.8 \
sulogin.8
shadowconfig.8.xml \
sulogin.8 \
sulogin.8.xml \
sulogin.8.xml
all: all-recursive
@@ -294,9 +289,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
exit 1;; \
esac; \
done; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/Makefile'; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/Makefile'; \
cd $(top_srcdir) && \
$(AUTOMAKE) --foreign man/Makefile
$(AUTOMAKE) --gnu man/Makefile
.PRECIOUS: Makefile
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
@case '$?' in \

View File

@@ -1,96 +1,97 @@
.\"$Id: chage.1,v 1.25 2005/04/26 12:22:08 kloczek Exp $
.\" Copyright 1990 - 1994 Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH CHAGE 1
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "CHAGE" 1 "" "" ""
.SH NAME
chage \- change user password expiry information
.SH SYNOPSIS
.TP 6
\fBchage\fR [\fB\-m\fR \fImindays\fR] [\fB\-M\fR \fImaxdays\fR] [\fB\-d\fR \fIlastday\fR] [\fB\-I\fR \fIinactive\fR]
[\fB\-E\fR \fIexpiredate\fR] [\fB\-W\fR \fIwarndays\fR] \fIuser\fR
.TP 6
\fBchage\fR \fB\-l\fR \fIuser\fR
.SH DESCRIPTION
\fBchage\fR command changes the number of days between password changes and
the date of the last password change. This information is used by the system
to determine when a user must change her password.
.SH "SYNOPSIS"
.ad l
.hy 0
.HP 6
\fBchage\fR [\fIoptions\fR] \fIuser\fR
.ad
.hy
.SH "DESCRIPTION"
.PP
\fBchage\fR command changes the number of days between passwordchanges and the date of the last password change\&. This information is used by the system to determine when a user must change her password\&.
.SH "OPTIONS"
.PP
The \fBchage\fR command is restricted to the root user, except for the
\fB\-l\fR option, which may be used by an unprivileged user to determine
when her password or account is due to expire.
.SH OPTIONS
The options which apply to the \fBchage\fR command are:
.IP "\fB\-d\fR \fIlastday\fR"
Set the number of days since January 1st, 1970 when the password was last
changed. The date may also be expressed in the format YYYY\-MM\-DD (or the
format more commonly used in your area).
.IP "\fB\-E\fR \fIexpiredate\fR"
Set the date on which the user's account will no longer be accessible. The
\fIexpiredate\fR option is the number of days since January 1, 1970 on which
the accounted is locked. The date may also be expressed in the format
YYYY\-MM\-DD (or the format more commonly used in your area). A user whose
account is locked must contact the system administrator before being able to
use the system again. Passing the number \fI-1\fR as the \fIexpiredate\fR will
remove an accounts expiration date.
.IP "\fB\-I\fR \fIinactive\fR"
Set the number of days of inactivity after a password has expired before the
account is locked. The \fIinactive\fR option is the number of days of
inactivity. A value of 0 disables this feature. A user whose account is
locked must contact the system administrator before being able to use the
system again.
.IP "\fB\-m\fR \fImindays\fR"
Set the minimum number of days between password changes. A value of zero for
this field indicates that the user may change her password at any time.
.IP "\fB\-M\fR \fImaxdays\fR"
Set maximum number of days during which a password is valid. When
\fImaxdays\fR plus \fIlastday\fR is less than the current day, the user will
be required to change her password before being able to use her account.
This occurrence can be planned for in advance by use of the \fB\-W\fR option,
which provides the user with advance warning.
.IP "\fB\-W\fR \fIwarndays\fR"
Set the number of days of warning before a password change is required. The
\fIwarndays\fR option is the number of days prior to the password expiring
that a user will be warned her password is about to expire.
.TP
\fB\-d\fR, \fB\-\-lastday\fR \fILAST_DAY\fR
Set the number of days since January 1st, 1970 when the password was last changed\&. The date may also be expressed in the format YYYY\-MM\-DD (or the format more commonly used in your area)\&.
.TP
\fB\-E\fR, \fB\-\-expiredate\fR \fIEXPIRE_DATE\fR
Set the date on which the user's account will no longer be accessible\&. The \fIEXPIRE_DATE\fR option is the number of days since January 1, 1970 on which the accounted is locked\&. The date may also be expressed in the format YYYY\-MM\-DD (or the format more commonly used in your area)\&. A user whose account is locked must contact the system administrator before being able to use the system again\&. Passing the number \fI\-1\fR as the \fIEXPIRE_DATE\fR will remove an accounts expiration date\&.
.TP
\fB\-I\fR, \fB\-\-inactive\fR \fIINACTIVE\fR
Set the number of days of inactivity after a password has expired before the account is locked\&. The \fIINACTIVE\fR option is the number of days of inactivity\&. A value of 0 disables this feature\&. A user whose account is locked must contact the system administrator before being able to use the system again\&.
.TP
\fB\-l\fR, \fB\-\-list\fR
Show account aging information\&.
.TP
\fB\-m\fR, \fB\-\-mindays\fR \fIMIN_DAYS\fR
Set the minimum number of days between password changes\&. A value of zero for this field indicates that the user may change her password at any time\&.
.TP
\fB\-M\fR, \fB\-\-maxdays\fR \fIMAX_DAYS\fR
Set maximum number of days during which a password is valid\&. When \fIMAX_DAYS\fR plus \fILAST_DAY\fR is less than the current day, the user will be required to change her password before being able to use her account\&. This occurrence can be planned for in advance by use of the \fB\-W\fR option, which provides the user with advance warning\&.
.TP
\fB\-W\fR, \fBwarndays\fR \fIWARN_DAYS\fR
Set the number of days of warning before a password change is required\&. The \fIWARN_DAYS\fR option is the number of days prior to the password expiring that a user will be warned her password is about to expire\&.
.PP
If none of the options are selected, \fBchage\fR operates in an interactive
fashion, prompting the user with the current values for all of the fields.
Enter the new value to change the field, or leave the line blank to use the
current value. The current value is displayed between a pair of \fB[ ]\fR
marks.
.SH NOTE
The \fBchage\fR program requires shadow password file to be available.
Its functionality is not available when passwords are stored in the
passwd file.
.SH FILES
\fI/etc/passwd\fR \- user account information
.br
\fI/etc/shadow\fR \- secure user account information
.SH SEE ALSO
.BR passwd (5),
.BR shadow (5)
.SH AUTHOR
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
If none of the options are selected, \fBchage\fR operates in an interactive fashion, prompting the user with the current values for all of the fields\&. Enter the new value to change the field, or leave the line blank to use the current value\&. The current value is displayed between a pair of \fI[ ]\fR marks\&.
.SH "NOTE"
.PP
The \fBchage\fR program requires shadow password file to be available\&. Its functionality is not available when passwords are stored in the passwd file\&.
.PP
The \fBchage\fR command is restricted to the root user, except for the \fB\-l\fR option, which may be used by an unprivileged user to determine when her password or account is due to expire\&.
.SH "FILES"
.TP
\fI/etc/passwd\fR
user account information
.TP
\fI/etc/shadow\fR
secure user account information
.SH "SEE ALSO"
.PP
\fBpasswd\fR(5), \fBshadow\fR(5)\&.
.SH "AUTHOR"
.PP
Julianne Frances Haugh <jockgrrl@ix\&.netcom\&.com>

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='chage.1'>
<!-- $Id: chage.1.xml,v 1.7 2005/04/26 12:31:14 kloczek Exp $ -->
<!-- $Id: chage.1.xml,v 1.10 2005/06/15 12:39:27 kloczek Exp $ -->
<refmeta>
<refentrytitle>chage</refentrytitle>
<manvolnum>1</manvolnum>
@@ -14,20 +14,11 @@
</refnamediv>
<refsynopsisdiv id='synopsis'>
<cmdsynopsis>
<command>chage</command>
<arg choice='opt'>-m <replaceable>mindays</replaceable></arg>
<arg choice='opt'>-M <replaceable>maxdays</replaceable></arg>
<arg choice='opt'>-d <replaceable>lastday</replaceable></arg>
<arg choice='opt'>-I <replaceable>inactive</replaceable></arg>
<sbr/>
<arg choice='opt'>-E <replaceable>expiredate</replaceable></arg>
<arg choice='opt'>-W <replaceable>warndays</replaceable></arg>
<arg choice='plain'><replaceable>user</replaceable></arg>
</cmdsynopsis>
<cmdsynopsis>
<command>chage</command>
<arg choice='plain'>-l <replaceable>user</replaceable>
<command>chage</command>
<arg choice='opt'>
<replaceable>options</replaceable>
</arg>
<arg choice='plain'><replaceable>user</replaceable></arg>
</cmdsynopsis>
</refsynopsisdiv>
@@ -38,11 +29,6 @@
This information is used by the system to determine when a user must
change her password.
</para>
<para>The <command>chage</command> command is restricted to the root
user, except for the <option>-l</option> option, which may be used by
an unprivileged user to determine when her password or account is due
to expire.
</para>
</refsect1>
<refsect1 id='options'>
@@ -53,7 +39,7 @@
<variablelist remap='IP'>
<varlistentry>
<term>
<option>-d</option> <replaceable>lastday</replaceable>
<option>-d</option>, <option>--lastday</option> <replaceable>LAST_DAY</replaceable>
</term>
<listitem>
<para>
@@ -65,31 +51,31 @@
</varlistentry>
<varlistentry>
<term>
<option>-E</option> <replaceable>expiredate</replaceable>
<option>-E</option>, <option>--expiredate</option> <replaceable>EXPIRE_DATE</replaceable>
</term>
<listitem>
<para>Set the date on which the user's account will no longer be
accessible. The <emphasis remap='I'>expiredate</emphasis> option
accessible. The <emphasis remap='I'>EXPIRE_DATE</emphasis> option
is the number of days since January 1, 1970 on which the
accounted is locked. The date may also be expressed in the
format YYYY-MM-DD (or the format more commonly used in your
area). A user whose account is locked must contact the system
administrator before being able to use the system again. Passing
the number <emphasis remap='I'>-1</emphasis> as the <emphasis
remap='I'>expiredate</emphasis> will remove an accounts
remap='I'>EXPIRE_DATE</emphasis> will remove an accounts
expiration date.
</para>
</listitem>
</varlistentry>
<varlistentry>
<term>
<option>-I</option> <replaceable>inactive</replaceable>
<option>-I</option>, <option>--inactive</option> <replaceable>INACTIVE</replaceable>
</term>
<listitem>
<para>
Set the number of days of inactivity after a password has
expired before the account is locked. The <emphasis
remap='I'>inactive</emphasis> option is the number of days of
remap='I'>INACTIVE</emphasis> option is the number of days of
inactivity. A value of 0 disables this feature. A user whose
account is locked must contact the system administrator before
being able to use the system again.
@@ -98,7 +84,17 @@
</varlistentry>
<varlistentry>
<term>
<option>-m</option> <replaceable>mindays</replaceable>
<option>-l</option>, <option>--list</option>
</term>
<listitem>
<para>
Show account aging information.
</para>
</listitem>
</varlistentry>
<varlistentry>
<term>
<option>-m</option>, <option>--mindays</option> <replaceable>MIN_DAYS</replaceable>
</term>
<listitem>
<para>
@@ -110,15 +106,15 @@
</varlistentry>
<varlistentry>
<term>
<option>-M</option> <replaceable>maxdays</replaceable>
<option>-M</option>, <option>--maxdays</option> <replaceable>MAX_DAYS</replaceable>
</term>
<listitem>
<para>
Set maximum number of days during which a password is valid.
When <emphasis remap='I'>maxdays</emphasis> plus <emphasis
remap='I'>lastday</emphasis> is less than the current day, the
Set maximum number of days during which a password is valid.
When <emphasis remap='I'>MAX_DAYS</emphasis> plus <emphasis
remap='I'>LAST_DAY</emphasis> is less than the current day, the
user will be required to change her password before being able
to use her account. This occurrence can be planned for in
to use her account. This occurrence can be planned for in
advance by use of the <option>-W</option> option, which provides
the user with advance warning.
</para>
@@ -126,12 +122,12 @@
</varlistentry>
<varlistentry>
<term>
<option>-W</option> <replaceable>warndays</replaceable>
<option>-W</option>, <option>warndays</option> <replaceable>WARN_DAYS</replaceable>
</term>
<listitem>
<para>
Set the number of days of warning before a password change is
required. The <emphasis remap='I'>warndays</emphasis> option is
required. The <emphasis remap='I'>WARN_DAYS</emphasis> option is
the number of days prior to the password expiring that a user
will be warned her password is about to expire.
</para>
@@ -141,7 +137,7 @@
<para>
If none of the options are selected, <command>chage</command> operates
in an interactive fashion, prompting the user with the current values
for all of the fields. Enter the new value to change the field, or
for all of the fields. Enter the new value to change the field, or
leave the line blank to use the current value. The current value is
displayed between a pair of <emphasis remap='B'>[ ]</emphasis> marks.
</para>
@@ -150,9 +146,14 @@
<title>NOTE</title>
<para>
The <command>chage</command> program requires shadow password file to
be available. Its functionality is not available when passwords are
be available. Its functionality is not available when passwords are
stored in the passwd file.
</para>
<para>The <command>chage</command> command is restricted to the root
user, except for the <option>-l</option> option, which may be used by
an unprivileged user to determine when her password or account is due
to expire.
</para>
</refsect1>
<refsect1 id='files'>
@@ -176,8 +177,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>passwd</refentrytitle><manvolnum>5</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -1,59 +1,59 @@
.\"$Id: chfn.1,v 1.15 2005/04/05 18:47:50 kloczek Exp $
.\" Copyright 1990 - 1994 Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH CHFN 1
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "CHFN" 1 "" "" ""
.SH NAME
chfn \- change real user name and information
.SH SYNOPSIS
.TP 5
\fBchfn\fR
[\fB\-f\fR \fIfull_name\fR] [\fB\-r\fR \fIroom_no\fR] [\fB\-w\fR \fIwork_ph\fR] [\fB\-h\fR \fIhome_ph\fR] [\fB\-o\fR \fIother\fR]
[\fIuser\fR]
.SH DESCRIPTION
\fBchfn\fR changes user fullname, office number, office extension, and home
phone number information for a user's account. This information is
typically printed by \fBfinger\fR(1) and similar programs. A normal user
may only change the fields for her own account, the super user may change
the fields for any account. Also, only the super user may use the \fB\-o\fR
option to change the undefined portions of the GECOS field.
.SH "SYNOPSIS"
.ad l
.hy 0
.HP 5
\fBchfn\fR [\-f\ \fIfull_name\fR] [\-r\ \fIroom_no\fR] [\-w\ \fIwork_ph\fR] [\-h\ \fIhome_ph\fR] [\-o\ \fIother\fR] [\fIuser\fR]
.ad
.hy
.SH "DESCRIPTION"
.PP
The only restriction placed on the contents of the fields is that no control
characters may be present, nor any of comma, colon, or equal sign. The
\fIother\fR field does not have this restriction, and is used to store
accounting information used by other applications.
\fBchfn\fR changes user fullname, office number, office extension, and home phone number information for a user's account\&. This information is typically printed by \fBfinger\fR(1) and similar programs\&. A normal user may only change may only change the fields for her own account, subject to the restrictions in \fI/etc/login\&.defs\fR\&. (The default configuration is to prevent users from changing their fullname\&.) The super user may change any field for any account\&. Additionally, only the super user may use the \fB\-o\fR option to change the undefined portions of the GECOS field\&.
.PP
If none of the options are selected, \fBchfn\fR operates in an interactive
fashion, prompting the user with the current values for all of the fields.
Enter the new value to change the field, or leave the line blank to use the
current value. The current value is displayed between a pair of \fB[ ]\fR
marks. Without options, chfn prompts for the current user account.
.SH FILES
\fI/etc/passwd\fR \- user account information
.SH SEE ALSO
.BR passwd (5)
.SH AUTHOR
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
The only restriction placed on the contents of the fields is that no control characters may be present, nor any of comma, colon, or equal sign\&. The \fIother\fR field does not have this restriction, and is used to store accounting information used by other applications\&.
.PP
If none of the options are selected, \fBchfn\fR operates in an interactive fashion, prompting the user with the current values for all of the fields\&. Enter the new value to change the field, or leave the line blank to use the current value\&. The current value is displayed between a pair of \fI[ ]\fR marks\&. Without options, chfn prompts for the current user account\&.
.SH "FILES"
.TP
\fI/etc/passwd\fR
user account information
.TP
\fI/etc/login\&.defs\fR
runtime configuration
.SH "SEE ALSO"
.PP
\fBpasswd\fR(5)
.SH "AUTHOR"
.PP
Julianne Frances Haugh <jockgrrl@ix\&.netcom\&.com>

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='chfn.1'>
<!-- $Id: chfn.1.xml,v 1.8 2005/04/27 16:19:48 kloczek Exp $ -->
<!-- $Id: chfn.1.xml,v 1.11 2005/06/14 20:18:17 kloczek Exp $ -->
<refmeta>
<refentrytitle>chfn</refentrytitle>
<manvolnum>1</manvolnum>
@@ -30,12 +30,14 @@
<para><command>chfn</command> changes user fullname, office number,
office extension, and home phone number information for a user's
account. This information is typically printed by <citerefentry>
<refentrytitle>finger</refentrytitle><manvolnum>1</manvolnum>
<refentrytitle>finger</refentrytitle><manvolnum>1</manvolnum>
</citerefentry> and similar programs. A normal user may only change
the fields for her own account, the super user may change the fields
for any account. Also, only the super user may use the
<option>-o</option> option to change the undefined portions of the
GECOS field.
may only change the fields for her own account, subject to the
restrictions in <filename>/etc/login.defs</filename>. (The default
configuration is to prevent users from changing their fullname.) The
super user may change any field for any account. Additionally, only
the super user may use the <option>-o</option> option to change the
undefined portions of the GECOS field.
</para>
<para>The only restriction placed on the contents of the fields is that
@@ -62,13 +64,16 @@
<term><filename>/etc/passwd</filename></term>
<listitem>user account information</listitem>
</varlistentry>
<varlistentry>
<term><filename>/etc/login.defs</filename></term>
<listitem>runtime configuration</listitem>
</varlistentry>
</variablelist>
</refsect1>
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>passwd</refentrytitle><manvolnum>5</manvolnum>
</citerefentry>
</para>

View File

@@ -1,61 +1,76 @@
.\"$Id: chpasswd.8,v 1.18 2005/04/02 16:10:23 kloczek Exp $
.\" Copyright 1991, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH CHPASSWD 8
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "CHPASSWD" 8 "" "" ""
.SH NAME
chpasswd \- update passwords in batch mode
.SH SYNOPSIS
\fBchpasswd\fR [\fBoptions\fR]
.SH DESCRIPTION
\fBchpasswd\fR reads a list of user name and password pairs from standard
input and uses this information to update a group of existing users. Each
line is of the format:
.sp 1
\fIuser_name\fR:\fIpassword\fR
.sp 1
By default the supplied password must be in clear\-text. Default encription
algoritm is DES. Also the password age will be updated, if present.
.SH "SYNOPSIS"
.ad l
.hy 0
.HP 9
\fBchpasswd\fR [\fIoptions\fR]
.ad
.hy
.SH "DESCRIPTION"
.PP
\fBchpasswd\fR reads a list of user name and password pairs from standard input and uses this information to update a group of existing users\&. Each line is of the format:
.PP
\fIuser_name\fR:\fIpassword\fR
.PP
By default the supplied password must be in clear\-text\&. Default encription algoritm is DES\&. Also the password age will be updated, if present\&.
.PP
This command is intended to be used in a large system environment where many accounts are created at a single time\&.
.SH "OPTIONS"
.PP
This command is intended to be used in a large system environment where many
accounts are created at a single time.
.SH OPTIONS
The options which apply to the \fBchpasswd\fR command are:
.IP "\fB\-e\fR, \fB\-\-encrypted\fR"
Supplied passwords are in encrypted form.
.IP "\fB\-h\fR, \fB\-\-help\fR"
Display help message and exit.
.IP "\fB\-m\fR, \fB\-\-md5\fR"
Use MD5 encryption instead DES when the supplied passwords are not encrypted.
.SH CAVEATS
Remember keep protected for reading by others fille passed to standard input
\fBchpasswd\fR command if it contains unencrypted passwords.
.SH SEE ALSO
.BR passwd (1),
.BR newusers (8),
.BR useradd (8)
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
.TP
\fB\-e\fR, \fB\-\-encrypted\fR
Supplied passwords are in encrypted form\&.
.TP
\fB\-h\fR, \fB\-\-help\fR
Display help message and exit\&.
.TP
\fB\-m\fR, \fB\-\-md5\fR
Use MD5 encryption instead DES when the supplied passwords are not encrypted\&.
.SH "CAVEATS"
.PP
Remember keep protected for reading by others fille passed to standard input \fBchpasswd\fR command if it contains unencrypted passwords\&.
.SH "SEE ALSO"
.PP
\fBpasswd\fR(1), \fBnewusers\fR(8), \fBuseradd\fR(8)
.SH "AUTHOR"
.PP
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='chpasswd.8'>
<!-- $Id: chpasswd.8.xml,v 1.6 2005/04/27 16:22:25 kloczek Exp $ -->
<!-- $Id: chpasswd.8.xml,v 1.8 2005/06/16 15:42:19 kloczek Exp $ -->
<refmeta>
<refentrytitle>chpasswd</refentrytitle>
<manvolnum>8</manvolnum>
@@ -23,8 +23,7 @@
<refsect1 id='description'>
<title>DESCRIPTION</title>
<para>
<command>chpasswd</command> reads a list of user name and password
<para><command>chpasswd</command> reads a list of user name and password
pairs from standard input and uses this information to update a group
of existing users. Each line is of the format:
</para>
@@ -81,8 +80,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>passwd</refentrytitle><manvolnum>1</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -1,62 +1,61 @@
.\"$Id: chsh.1,v 1.13 2005/04/02 16:10:23 kloczek Exp $
.\" Copyright 1990, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH CHSH 1
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "CHSH" 1 "" "" ""
.SH NAME
chsh \- change login shell
.SH SYNOPSIS
.TP 5
\fBchsh\fR [\fB\-s\fR \fIlogin_shell\fR] [\fIuser\fR]
.SH DESCRIPTION
\fBchsh\fR changes the user login shell. This determines the name of the
user's initial login command. A normal user may only change the login shell
for her own account, the super user may change the login shell for any
account.
.SH "SYNOPSIS"
.ad l
.hy 0
.HP 5
\fBchsh\fR [\-s\ \fIlogin_shell\fR] [\fIuser\fR]
.ad
.hy
.SH "DESCRIPTION"
.PP
The only restrictions placed on the login shell is that the command name
must be listed in \fI/etc/shells\fR, unless the invoker is the super\-user,
and then any value may be added. An account with a restricted login shell
may not change her login shell. For this reason, placing \fB/bin/rsh\fR in
\fI/etc/shells\fR is discouraged since accidentally changing to a restricted
shell would prevent the user from every changing her login shell back to its
original value.
\fBchsh\fR changes the user login shell\&. This determines the name of the user's initial login command\&. A normal user may only change the login shell for her own account, the super user may change the login shell for any account\&.
.PP
.SH OPTIONS
If the \fB\-s\fR option is not selected, \fBchsh\fR operates in an
interactive fashion, prompting the user with the current login shell. Enter
the new value to change the shell, or leave the line blank to use the
current one. The current shell is displayed between a pair of \fB[ ]\fR
marks.
.SH FILES
\fI/etc/passwd\fR \- user account information
.br
\fI/etc/shells\fR \- list of valid login shells
.SH SEE ALSO
.BR chfn (1),
.BR passwd (5)
.SH AUTHOR
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
The only restrictions placed on the login shell is that the command name must be listed in \fI/etc/shells\fR, unless the invoker is the super\-user, and then any value may be added\&. An account with a restricted login shell may not change her login shell\&. For this reason, placing \fI/bin/rsh\fR in \fI/etc/shells\fR is discouraged since accidentally changing to a restricted shell would prevent the user from every changing her login shell back to its original value\&.
.SH "OPTIONS"
.PP
If the \fB\-s\fR option is not selected, \fBchsh\fR operates in an interactive fashion, prompting the user with the current login shell\&. Enter the new value to change the shell, or leave the line blank to use the current one\&. The current shell is displayed between a pair of \fI[ ]\fR marks\&.
.SH "FILES"
.TP
\fI/etc/passwd\fR
user account information
.TP
\fI/etc/shells\fR
list of valid login shells
.SH "SEE ALSO"
.PP
\fBchfn\fR(1), \fBpasswd\fR(5)
.SH "AUTHOR"
.PP
Julianne Frances Haugh <jockgrrl@ix\&.netcom\&.com>

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='chsh1'>
<!-- $Id: chsh.1.xml,v 1.6 2005/04/27 16:24:09 kloczek Exp $ -->
<!-- $Id: chsh.1.xml,v 1.8 2005/06/16 15:43:48 kloczek Exp $ -->
<refmeta>
<refentrytitle>chsh</refentrytitle>
<manvolnum>1</manvolnum>
@@ -24,8 +24,7 @@
<refsect1 id='description'>
<title>DESCRIPTION</title>
<para>
<command>chsh</command> changes the user login shell. This determines
<para><command>chsh</command> changes the user login shell. This determines
the name of the user's initial login command. A normal user may only
change the login shell for her own account, the super user may change
the login shell for any account.
@@ -69,8 +68,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>chfn</refentrytitle><manvolnum>1</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -38,11 +38,7 @@ host_triplet = @host@
subdir = man/cs
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
am__aclocal_m4_deps = $(top_srcdir)/configure.in
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
$(ACLOCAL_M4)
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
@@ -197,9 +193,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
exit 1;; \
esac; \
done; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/cs/Makefile'; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/cs/Makefile'; \
cd $(top_srcdir) && \
$(AUTOMAKE) --foreign man/cs/Makefile
$(AUTOMAKE) --gnu man/cs/Makefile
.PRECIOUS: Makefile
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
@case '$?' in \

View File

@@ -38,11 +38,7 @@ host_triplet = @host@
subdir = man/de
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
am__aclocal_m4_deps = $(top_srcdir)/configure.in
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
$(ACLOCAL_M4)
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
@@ -199,9 +195,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
exit 1;; \
esac; \
done; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/de/Makefile'; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/de/Makefile'; \
cd $(top_srcdir) && \
$(AUTOMAKE) --foreign man/de/Makefile
$(AUTOMAKE) --gnu man/de/Makefile
.PRECIOUS: Makefile
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
@case '$?' in \

View File

@@ -1,4 +1,4 @@
.\" $Id: passwd.1,v 1.7 2005/04/18 12:29:07 kloczek Exp $
.\" $Id: passwd.1,v 1.8 2005/06/02 09:48:14 kloczek Exp $
.\" Copyright 1989 - 1994, Julianne Frances Haugh
.\" All rights reserved.
.\"
@@ -25,6 +25,9 @@
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" Translation based on http://cvs.pld.org.pl/shadow/man/passwd.1
.\" (Version 1.25)
.TH PASSWD 1
.SH BEZEICHNUNG
passwd \- <20>ndert das Passwort eines Nutzers

View File

@@ -38,11 +38,7 @@ host_triplet = @host@
subdir = man/es
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
am__aclocal_m4_deps = $(top_srcdir)/configure.in
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
$(ACLOCAL_M4)
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
@@ -191,9 +187,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
exit 1;; \
esac; \
done; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/es/Makefile'; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/es/Makefile'; \
cd $(top_srcdir) && \
$(AUTOMAKE) --foreign man/es/Makefile
$(AUTOMAKE) --gnu man/es/Makefile
.PRECIOUS: Makefile
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
@case '$?' in \

View File

@@ -1,47 +1,53 @@
.\"$Id: expiry.1,v 1.8 2005/04/12 16:31:06 kloczek Exp $
.\" Copyright 1990 - 1994 Julianne Frances Haugh
.\" All rights reserved.
.\" Modified for expiry by Ben Collins <bcollins@debian.org>, 1999
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.TH EXPIRY 1
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "EXPIRY" 1 "" "" ""
.SH NAME
expiry \- check and enforce password expiration policy
.SH SYNOPSIS
.TP 6
\fBexpiry\fR [\fB\-c\fR] [\fB\-f\fR]
.SH DESCRIPTION
\fBexpiry\fR checks (\fB\-c\fR) the current password expiration and forces
(\fB\-f\fR) changes when required. It is callable as a normal user command.
.SH FILES
\fI/etc/passwd\fR \- user account information
.br
\fI/etc/shadow\fR \- secure user account information
.SH SEE ALSO
.BR passwd (5),
.BR shadow (5)
.SH AUTHOR
Ben Collins <bcollins@debian.org>
.SH "SYNOPSIS"
.ad l
.hy 0
.HP 7
\fBexpiry\fR [\-c] [\-f]
.ad
.hy
.SH "DESCRIPTION"
.PP
\fBexpiry\fR checks (\fB\-c\fR) the current password expiration and forces (\fB\-f\fR) changes when required\&. It is callable as a normal user command\&.
.SH "FILES"
.TP
\fI/etc/passwd\fR
user account information
.TP
\fI/etc/shadow\fR
secure user account information
.SH "SEE ALSO"
.PP
\fBpasswd\fR(5), \fBshadow\fR(5)
.SH "AUTHOR"
.PP
Ben Collins <bcollins@debian\&.org>

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='expiry.1'>
<!-- $Id: expiry.1.xml,v 1.6 2005/04/27 16:25:27 kloczek Exp $ -->
<!-- $Id: expiry.1.xml,v 1.8 2005/06/14 20:18:17 kloczek Exp $ -->
<refmeta>
<refentrytitle>expiry</refentrytitle>
<manvolnum>1</manvolnum>
@@ -23,8 +23,7 @@
<refsect1 id='description'>
<title>DESCRIPTION</title>
<para>
<command>expiry</command> checks (<option>-c</option>) the current
<para><command>expiry</command> checks (<option>-c</option>) the current
password expiration and forces (<option>-f</option>) changes when
required. It is callable as a normal user command.
</para>
@@ -46,8 +45,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>passwd</refentrytitle><manvolnum>5</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -1,54 +1,55 @@
.\"$Id: faillog.5,v 1.10 2005/04/02 16:10:23 kloczek Exp $
.\" Copyright 1989 - 1994, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH FAILLOG 5
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "FAILLOG" 5 "" "" ""
.SH NAME
faillog \- Login failure logging file
.SH DESCRIPTION
\fI/var/log/faillog\fR maintains a count of login failures and the limits
for each account. The file is fixed length record, indexed by numerical UID.
Each record contains the count of login failures since the last successful
login; the maximum number of failures before the account is disabled; the
line the last login failure occured on; and the date the last login failure
occured.
.PP
The structure of the file is
.DS
.SH "DESCRIPTION"
.PP
\fI/var/log/faillog\fR maintains a count of login failures and the limits for each account\&. The file is fixed length record, indexed by numerical UID\&. Each record contains the count of login failures since the last successful login; the maximum number of failures before the account is disabled; the line the last login failure occured on; and the date the last login failure occured\&.
.PP
The structure of the file is:
.nf
struct faillog {
short fail_cnt;
short fail_max;
char fail_line[12];
time_t fail_time;
};
.fi
.SH "FILES"
.TP
\fI/var/log/faillog\fR
login failure log
.SH "SEE ALSO"
.PP
\fBfaillog\fR(8)
.SH "AUTHOR"
.PP
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
struct faillog {
short fail_cnt;
short fail_max;
char fail_line[12];
time_t fail_time;
};
.DE
.SH FILES
\fI/var/log/faillog\fR \- login failure log
.SH SEE ALSO
.BR faillog (8)
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='faillog.5'>
<!-- $Id: faillog.5.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
<!-- $Id: faillog.5.xml,v 1.7 2005/06/16 15:49:42 kloczek Exp $ -->
<refmeta>
<refentrytitle>faillog</refentrytitle>
<manvolnum>5</manvolnum>
@@ -14,8 +14,7 @@
<refsect1 id='description'>
<title>DESCRIPTION</title>
<para>
<filename>/var/log/faillog</filename> maintains a count of login
<para><filename>/var/log/faillog</filename> maintains a count of login
failures and the limits for each account. The file is fixed length
record, indexed by numerical UID. Each record contains the count of
login failures since the last successful login; the maximum number of
@@ -23,15 +22,14 @@
failure occured on; and the date the last login failure occured.
</para>
<para>The structure of the file is</para>
<literallayout remap='DS'>
struct faillog {
short fail_cnt;
short fail_max;
char fail_line[12];
time_t fail_time;
};
</literallayout>
<para>The structure of the file is:</para>
<programlisting>
struct faillog {
short fail_cnt;
short fail_max;
char fail_line[12];
time_t fail_time;
};</programlisting>
</refsect1>
<refsect1 id='files'>
@@ -46,8 +44,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>faillog</refentrytitle><manvolnum>8</manvolnum>
</citerefentry>
</para>

View File

@@ -1,74 +1,88 @@
.\" $Id: faillog.8,v 1.19 2005/04/09 17:09:56 kloczek Exp $
.\" Copyright 1989 - 1994, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH FAILLOG 8
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "FAILLOG" 8 "" "" ""
.SH NAME
faillog \- display faillog records or set login failure limits
.SH SYNOPSIS
.TP 6
\fBfaillog\fR [\fBoptions\fR]
.SH DESCRIPTION
\fBfaillog\fR formats the contents of the failure log from \fI/var/log/faillog\fR
database. It also can be used for maintains failure counters and limits.
Run \fBfaillog\fR without arguments display only list of user faillog records
who have ever had a login failure.
.SH OPTIONS
.SH "SYNOPSIS"
.ad l
.hy 0
.HP 8
\fBfaillog\fR [\fIoptions\fR]
.ad
.hy
.SH "DESCRIPTION"
.PP
\fBfaillog\fR formats the contents of the failure log from \fI/var/log/faillog\fR database\&. It also can be used for maintains failure counters and limits\&. Run \fBfaillog\fR without arguments display only list of user faillog records who have ever had a login failure\&.
.SH "OPTIONS"
.PP
The options which apply to the \fBfaillog\fR command are:
.IP "\fB\-a\fR, \fB\-\-all\fR"
Display faillog records for all users.
.IP "\fB\-h\fR, \fB\-\-help\fR"
Display help message and exit.
.IP "\fB\-l\fR, \fB\-\-lock\-time\fR \fISEC\fR"
Lock accout to \fISEC\fR seconds after failed login.
.IP "\fB\-m\fR, \fB\-\-maximum\fR \fIMAX\fR"
Set maiximum number of login failures after the account is disabled to
\fIMAX\fR. Selecting \fIMAX\fR value of 0 has the effect of not placing a
limit on the number of failed logins. The maximum failure count should
always be 0 for \fBroot\fR to prevent a denial of services attack against
the system.
.IP "\fB\-r\fR, \fB\-\-reset\fR"
Reset the counters of login failures or one recor if used with \-u
\fILOGIN\fR option. Write access to \fI/var/log/faillog\fR is required for
this option.
.IP "\fB\-t\fR, \fB\-\-time\fR \fIDAYS\fR"
Display faillog records more recent than \fIDAYS\fR. The \fB\-t\fR flag
overrides the use of \fB\-u\fR.
.IP "\fB\-u\fR, \fB\-\-user\fR \fILOGIN\fR"
Display faillog record or maintains failure counters and limits (if used
with \fB\-l\fR, \fB\-m\fR or \fB\-r\fR options) only for user with \fILOGIN\fR.
.SH CAVEATS
\fBfaillog\fR only prints out users with no successful login since the last
failure. To print out a user who has had a successful login since their last
failure, you must explicitly request the user with the \fB\-u\fR flag, or
print out all users with the \fB\-a\fR flag.
.SH FILES
\fI/var/log/faillog\fR \- failure logging file
.SH SEE ALSO
.BR login (1),
.BR faillog (5)
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
.TP
\fB\-a\fR, \fB\-\-all\fR
Display faillog records for all users\&.
.TP
\fB\-h\fR, \fB\-\-help\fR
Display help message and exit\&.
.TP
\fB\-l\fR, \fB\-\-lock\-time\fR \fISEC\fR
Lock accout to \fISEC\fR seconds after failed login\&.
.TP
\fB\-m\fR, \fB\-\-maximum\fR \fIMAX\fR
Set maiximum number of login failures after the account is disabled to \fIMAX\fR\&. Selecting \fIMAX\fR value of 0 has the effect of not placing a limit on the number of failed logins\&. The maximum failure count should always be 0 for \fIroot\fR to prevent a denial of services attack against the system\&.
.TP
\fB\-r\fR, \fB\-\-reset\fR
Reset the counters of login failures or one recor if used with \-u \fILOGIN\fR option\&. Write access to \fI/var/log/faillog\fR is required for this option\&.
.TP
\fB\-t\fR, \fB\-\-time\fR \fIDAYS\fR
Display faillog records more recent than \fIDAYS\fR\&. The \fB\-t\fR flag overrides the use of \fB\-u\fR\&.
.TP
\fB\-u\fR, \fB\-\-user\fR \fILOGIN\fR
Display faillog record or maintains failure counters and limits (if used with \fB\-l\fR, \fB\-m\fR or \fB\-r\fR options) only for user with \fILOGIN\fR\&.
.SH "CAVEATS"
.PP
\fBfaillog\fR only prints out users with no successful login since the last failure\&. To print out a user who has had a successful login since their last failure, you must explicitly request the user with the \fB\-u\fR flag, or print out all users with the \fB\-a\fR flag\&.
.SH "FILES"
.TP
\fI/var/log/faillog\fR
failure logging file
.SH "SEE ALSO"
.PP
\fBlogin\fR(1), \fBfaillog\fR(5)
.SH "AUTHOR"
.PP
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='faillog.8'>
<!-- $Id: faillog.8.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
<!-- $Id: faillog.8.xml,v 1.9 2005/06/16 15:50:30 kloczek Exp $ -->
<refmeta>
<refentrytitle>faillog</refentrytitle>
<manvolnum>8</manvolnum>
@@ -23,10 +23,9 @@
<refsect1 id='description'>
<title>DESCRIPTION</title>
<para>
<command>faillog</command> formats the contents of the failure log
<para><command>faillog</command> formats the contents of the failure log
from <filename>/var/log/faillog</filename> database. It also can be
used for maintains failure counters and limits. Run
used for maintains failure counters and limits. Run
<command>faillog</command> without arguments display only list of user
faillog records who have ever had a login failure.
</para>
@@ -119,8 +118,7 @@
<refsect1 id='caveats'>
<title>CAVEATS</title>
<para>
<command>faillog</command> only prints out users with no successful
<para><command>faillog</command> only prints out users with no successful
login since the last failure. To print out a user who has had a
successful login since their last failure, you must explicitly request
the user with the <option>-u</option> flag, or print out all users
@@ -140,8 +138,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>login</refentrytitle><manvolnum>1</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -38,11 +38,7 @@ host_triplet = @host@
subdir = man/fr
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
am__aclocal_m4_deps = $(top_srcdir)/configure.in
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
$(ACLOCAL_M4)
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
@@ -204,9 +200,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
exit 1;; \
esac; \
done; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/fr/Makefile'; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/fr/Makefile'; \
cd $(top_srcdir) && \
$(AUTOMAKE) --foreign man/fr/Makefile
$(AUTOMAKE) --gnu man/fr/Makefile
.PRECIOUS: Makefile
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
@case '$?' in \

View File

@@ -1,56 +1,91 @@
.\"$Id: gpasswd.1,v 1.17 2005/04/12 17:55:55 kloczek Exp $
.\" Copyright 1996, Rafal Maszkowski <rzm@pdi.net>
.\" All rights reserved. You can redistribute this man page and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of the
.\" License, or (at your option) any later version.
.\"
.TH GPASSWD 1
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "GPASSWD" 1 "" "" ""
.SH NAME
gpasswd \- administer the /etc/group file
.br
.SH SYNOPSIS
.TP 6
.SH "SYNOPSIS"
.ad l
.hy 0
.HP 8
\fBgpasswd\fR \fIgroup\fR
.br
\fBgpasswd \-a\fR \fIuser\fR \fIgroup\fR
.br
\fBgpasswd \-d\fR \fIuser\fR \fIgroup\fR
.br
\fBgpasswd \-R\fR \fIgroup\fR
.br
\fBgpasswd \-r\fR \fIgroup\fR
.br
\fBgpasswd\fR [\fB\-A\fR \fIuser\fR,...] [\fB\-M\fR \fIuser\fR,...] \fIgroup\fR
.SH DESCRIPTION
\fBgpasswd\fR is used to administer the \fI/etc/group\fR file (and
\fI/etc/gshadow\fR file if compiled with SHADOWGRP defined). Every group can
have administrators, members and a password. System administrator can use
\fB\-A\fR option to define group administrator(s) and \fB\-M\fR option to
define members and has all rights of group administrators and members.
.SH OPTIONS
.ad
.hy
.ad l
.hy 0
.HP 8
\fBgpasswd\fR \-a\ \fIuser\fR \fIgroup\fR
.ad
.hy
.ad l
.hy 0
.HP 8
\fBgpasswd\fR \-d\ \fIuser\fR \fIgroup\fR
.ad
.hy
.ad l
.hy 0
.HP 8
\fBgpasswd\fR \-R\ \fIgroup\fR
.ad
.hy
.ad l
.hy 0
.HP 8
\fBgpasswd\fR \-r\ \fIgroup\fR
.ad
.hy
.ad l
.hy 0
.HP 8
\fBgpasswd\fR [\-A\ \fIuser,\fR...] [\-M\ \fIuser,\fR...] \fIgroup\fR
.ad
.hy
.SH "DESCRIPTION"
.PP
Group administrator can add and delete users using \fB\-a\fR and \fB\-d\fR
options respectively. Administrators can use \fB\-r\fR option to remove group
password. When no password is set only group members can use \fBnewgrp\fR to
join the group. Option \fB\-R\fR disables access via a password to the group
through \fBnewgrp\fR command (however members will still be able to switch to
this group).
\fBgpasswd\fR is used to administer the \fI/etc/group\fR file (and \fI/etc/gshadow\fR file if compiled with SHADOWGRP defined)\&. Every group can have administrators, members and a password\&. System administrator can use \fB\-A\fR option to define group administrator(s) and \fB\-M\fR option to define members and has all rights of group administrators and members\&.
.SH "OPTIONS"
.PP
\fBgpasswd\fR called by a group administrator with group name only prompts
for the group password. If password is set the members can still
\fBnewgrp\fR(1) without a password, non\-members must supply the password.
.SH FILES
\fI/etc/group\fR \- group account information
.br
\fI/etc/gshadow\fR \- shadow group information
.SH SEE ALSO
.BR newgrp (1),
.BR groupadd (8),
.BR groupdel (8),
.BR groupmod (8),
.BR grpck (8),
.BR group (5),
.BR gshadow (5)
.SH AUTHOR
Rafal Maszkowski <rzm@pdi.net>
Group administrator can add and delete users using \fB\-a\fR and \fB\-d\fR options respectively\&. Administrators can use \fB\-r\fR option to remove group password\&. When no password is set only group members can use \fBnewgrp\fR to join the group\&. Option \fB\-R\fR disables access via a password to the group through \fBnewgrp\fR command (however members will still be able to switch to this group)\&.
.PP
\fBgpasswd\fR called by a group administrator with group name only prompts for the group password\&. If password is set the members can still \fBnewgrp\fR(1) without a password, non\-members must supply the password\&.
.SH "FILES"
.TP
\fI/etc/group\fR
group account information
.TP
\fI/etc/gshadow\fR
secure group account information
.SH "SEE ALSO"
.PP
\fBnewgrp\fR(1), \fBgroupadd\fR(8), \fBgroupdel\fR(8), \fBgroupmod\fR(8), \fBgrpck\fR(8), \fBgroup\fR(5), \fBgshadow\fR(5)
.SH "AUTHOR"
.PP
Rafal Maszkowski <rzm@pdi\&.net>

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='gpasswd1'>
<!-- $Id: gpasswd.1.xml,v 1.7 2005/04/27 18:20:35 kloczek Exp $ -->
<!-- $Id: gpasswd.1.xml,v 1.9 2005/06/14 20:18:17 kloczek Exp $ -->
<refmeta>
<refentrytitle>gpasswd</refentrytitle>
<manvolnum>1</manvolnum>
@@ -48,8 +48,7 @@
<refsect1 id='description'>
<title>DESCRIPTION</title>
<para>
<command>gpasswd</command> is used to administer the
<para><command>gpasswd</command> is used to administer the
<filename>/etc/group</filename> file (and
<filename>/etc/gshadow</filename> file if compiled with SHADOWGRP
defined). Every group can have administrators, members and a password.
@@ -67,7 +66,7 @@
<option>-r</option> option to remove group password. When no password
is set only group members can use <command>newgrp</command> to join
the group. Option <option>-R</option> disables access via a password
to the group through <command>newgrp</coamand> command (however
to the group through <command>newgrp</command> command (however
members will still be able to switch to this group).
</para>
@@ -95,8 +94,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>newgrp</refentrytitle><manvolnum>1</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -1,78 +1,90 @@
.\"$Id: groupadd.8,v 1.24 2005/04/05 18:47:50 kloczek Exp $
.\" Copyright 1991, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH GROUPADD 8
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "GROUPADD" 8 "" "" ""
.SH NAME
groupadd \- Create a new group
.SH SYNOPSIS
.TP 6
\fBgroupadd\fR [\fB\-g\fR \fIgid \fR[\fB\-o\fR]] [\fB\-f\fR] \fIgroup\fR
.SH DESCRIPTION
The \fBgroupadd\fR command creates a new group account using the values
specified on the command line and the default values from the system. The
new group will be entered into the system files as needed.
.SH OPTIONS
.SH "SYNOPSIS"
.ad l
.hy 0
.HP 9
\fBgroupadd\fR [\-g\ \fIgid\fR\ [\-o]] [\-f] \fIgroup\fR
.ad
.hy
.SH "DESCRIPTION"
.PP
The \fBgroupadd\fR command creates a new group account using the values specified on the command line and the default values from the system\&. The new group will be entered into the system files as needed\&.
.SH "OPTIONS"
.PP
The options which apply to the \fBgroupadd\fR command are:
.IP "\fB\-f\fR"
This option causes to just exit with success status if the specified
group already exists. With \fB\-g\fR, if specified gid already exists,
other (unique) gid is chosen (i.e. \fB\-g\fR is turned off).
.IP "\fB\-g\fR \fIgid\fR"
The numerical value of the group's ID. This value must be unique, unless the
\fB\-o\fR option is used. The value must be non\-negative. The default is to
use the smallest ID value greater than 999 and greater than every other
group. Values between 0 and 999 are typically reserved for system accounts.
.SH FILES
\fI/etc/group\fR \- group account information
.br
\fI/etc/gshadow\fR \- secure group account information
.SH EXIT VALUES
.TP 2
The \fBgroupadd\fR command exits with the following values:
.br
\fB0\fR \- success
.br
\fB2\fR \- invalid command syntax
.br
\fB3\fR \- invalid argument to option
.br
\fB4\fR \- gid not unique (when \-o not used)
.br
\fB9\fR \- group name not unique
.br
\fB10\fR \- can't update group file
.SH SEE ALSO
.BR chfn (1),
.BR chsh (1),
.BR passwd (1),
.BR groupdel (8),
.BR groupmod (8),
.BR useradd (8),
.BR userdel (8),
.BR usermod (8)
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
.TP
\fB\-f\fR
This option causes to just exit with success status if the specified group already exists\&. With \fB\-g\fR, if specified gid already exists, other (unique) gid is chosen (i\&.e\&. \fB\-g\fR is turned off)\&.
.TP
\fB\-g\fR \fIgid\fR
The numerical value of the group's ID\&. This value must be unique, unless the \fB\-o\fR option is used\&. The value must be non\-negative\&. The default is to use the smallest ID value greater than 999 and greater than every other group\&. Values between 0 and 999 are typically reserved for system accounts\&.
.SH "FILES"
.TP
\fI/etc/group\fR
group account information
.TP
\fI/etc/gshadow\fR
secure group account information
.SH "EXIT VALUES"
.PP
The \fBgroupadd\fR command exits with the following values:
.TP
\fI0\fR
success
.TP
\fI2\fR
invalid command syntax
.TP
\fI3\fR
invalid argument to option
.TP
\fI4\fR
gid not unique (when \-o not used)
.TP
\fI9\fR
group name not unique
.TP
\fI10\fR
can't update group file
.SH "SEE ALSO"
.PP
\fBchfn\fR(1), \fBchsh\fR(1), \fBpasswd\fR(1), \fBgroupdel\fR(8), \fBgroupmod\fR(8), \fBuseradd\fR(8), \fBuserdel\fR(8), \fBusermod\fR(8)
.SH "AUTHOR"
.PP
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='groupadd.8'>
<!-- $Id: groupadd.8.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
<!-- $Id: groupadd.8.xml,v 1.8 2005/06/16 16:18:27 kloczek Exp $ -->
<refmeta>
<refentrytitle>groupadd</refentrytitle>
<manvolnum>8</manvolnum>
@@ -87,36 +87,40 @@
<refsect1 id='exit_values'>
<title>EXIT VALUES</title>
<variablelist remap='TP'>
<varlistentry>
<term>
The <command>groupadd</command> command exits with the
following values:
</term>
<listitem>
<!-- .br -->
<para>
<literal>0</literal> - success
<!-- .br -->
<literal>2</literal> - invalid command syntax
<!-- .br -->
<literal>3</literal> - invalid argument to option
<!-- .br -->
<literal>4</literal> - gid not unique (when -o not
used) <!-- .br -->
<literal>9</literal> - group name not unique
<!-- .br -->
<literal>10</literal> - can't update group file
</para>
</listitem>
</varlistentry>
</variablelist>
<para>
The <command>groupadd</command> command exits with the following values:
<variablelist>
<varlistentry>
<term><replaceable>0</replaceable></term>
<listitem>success</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>2</replaceable></term>
<listitem>invalid command syntax</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>3</replaceable></term>
<listitem>invalid argument to option</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>4</replaceable></term>
<listitem>gid not unique (when -o not used)</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>9</replaceable></term>
<listitem>group name not unique</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>10</replaceable></term>
<listitem>can't update group file</listitem>
</varlistentry>
</variablelist>
</para>
</refsect1>
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>chfn</refentrytitle><manvolnum>1</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -1,69 +1,79 @@
.\"$Id: groupdel.8,v 1.14 2005/04/12 17:55:55 kloczek Exp $
.\" Copyright 1991 - 1993, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH GROUPDEL 8
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "GROUPDEL" 8 "" "" ""
.SH NAME
groupdel \- Delete a group
.SH SYNOPSIS
.SH "SYNOPSIS"
.ad l
.hy 0
.HP 9
\fBgroupdel\fR \fIgroup\fR
.SH DESCRIPTION
The \fBgroupdel\fR command modifies the system account files, deleting all
entries that refer to \fIgroup\fR. The named group must exist.
.ad
.hy
.SH "DESCRIPTION"
.PP
You must manually check all filesystems to insure that no files remain with
the named group as the file group ID.
.SH CAVEATS
You may not remove the primary group of any existing user. You must remove
the user before you remove the group.
.SH FILES
\fI/etc/group\fR \- group account information
.br
\fI/etc/gshadow\fR \- secure group information
.SH EXIT VALUES
.TP 2
The \fBgroupdel\fR command exits with the following values:
.br
\fB0\fR \- success
.br
\fB2\fR \- invalid command syntax
.br
\fB6\fR \- specified group doesn't exist
.br
\fB8\fR \- can't remove user's primary group
.br
\fB10\fR \- can't update group file
.SH SEE ALSO
.BR chfn (1),
.BR chsh (1),
.BR passwd (1),
.BR groupadd (8),
.BR groupmod (8),
.BR useradd (8),
.BR userdel (8),
.BR usermod (8)
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
The \fBgroupdel\fR command modifies the system account files, deleting all entries that refer to \fIgroup\fR\&. The named group must exist\&.
.PP
You must manually check all filesystems to insure that no files remain with the named group as the file group ID\&.
.SH "CAVEATS"
.PP
You may not remove the primary group of any existing user\&. You must remove the user before you remove the group\&.
.SH "FILES"
.TP
\fI/etc/group\fR
group account information
.TP
\fI/etc/gshadow\fR
secure group account information
.SH "EXIT VALUES"
.PP
The \fBgroupdel\fR command exits with the following values:
.TP
\fI0\fR
success
.TP
\fI2\fR
invalid command syntax
.TP
\fI8\fR
can't remove user's primary group
.TP
\fI10\fR
can't update group file
.SH "SEE ALSO"
.PP
\fBchfn\fR(1), \fBchsh\fR(1), \fBpasswd\fR(1), \fBgroupadd\fR(8), \fBgroupmod\fR(8), \fBuseradd\fR(8), \fBuserdel\fR(8), \fBusermod\fR(8)
.SH "AUTHOR"
.PP
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='groupdel.8'>
<!-- $Id: groupdel.8.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
<!-- $Id: groupdel.8.xml,v 1.7 2005/06/16 16:26:19 kloczek Exp $ -->
<refmeta>
<refentrytitle>groupdel</refentrytitle>
<manvolnum>8</manvolnum>
@@ -53,37 +53,35 @@
</varlistentry>
</variablelist>
</refsect1>
<refsect1 id='exit_values'>
<title>EXIT VALUES</title>
<variablelist remap='TP'>
<varlistentry>
<term>
The <command>groupdel</command> command exits with the
following values:
</term>
<listitem>
<!-- .br -->
<para>
<literal>0</literal> - success
<!-- .br -->
<literal>2</literal> - invalid command syntax
<!-- .br -->
<literal>6</literal> - specified group doesn't exist
<!-- .br -->
<literal>8</literal> - can't remove user's primary
group <!-- .br -->
<literal>10</literal> - can't update group file
</para>
</listitem>
</varlistentry>
</variablelist>
<para>
The <command>groupdel</command> command exits with the following values:
<variablelist>
<varlistentry>
<term><replaceable>0</replaceable></term>
<listitem>success</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>2</replaceable></term>
<listitem>invalid command syntax</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>8</replaceable></term>
<listitem>can't remove user's primary group</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>10</replaceable></term>
<listitem>can't update group file</listitem>
</varlistentry>
</variablelist>
</para>
</refsect1>
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>chfn</refentrytitle><manvolnum>1</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='groupmems.8'>
<!-- $Id: groupmems.8.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
<!-- $Id: groupmems.8.xml,v 1.7 2005/06/15 12:39:27 kloczek Exp $ -->
<refmeta>
<refentrytitle>groupmems</refentrytitle>
<manvolnum>8</manvolnum>
@@ -29,7 +29,7 @@
<para>
The <command>groupmems</command> utility allows a user to administer
his/her own group membership list without the requirement of super
user privileges. The <command>groupmems</command> utility is for
user privileges. The <command>groupmems</command> utility is for
systems that configure its users to be in their own name sake primary
group (i.e., guest / guest).
</para>
@@ -118,8 +118,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>chfn</refentrytitle><manvolnum>1</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -1,77 +1,93 @@
.\"$Id: groupmod.8,v 1.20 2005/04/12 17:55:55 kloczek Exp $
.\" Copyright 1991, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH GROUPMOD 8
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "GROUPMOD" 8 "" "" ""
.SH NAME
groupmod \- modify a group
.SH SYNOPSIS
\fBgroupmod\fR [\fB\-g\fR \fIgid\fR [\fB\-o\fR]] [\fB\-n\fR \fInew_group_name\fR]
\fIgroup\fR
.SH DESCRIPTION
The \fBgroupmod\fR command modifies the system account files to reflect the
changes that are specified on the command line.
.SH OPTIONS
.SH "SYNOPSIS"
.ad l
.hy 0
.HP 9
\fBgroupmod\fR [\-g\ \fIgid\fR\ [\-o]] [\-n\ \fInew_group_name\fR] \fIgroup\fR
.ad
.hy
.SH "DESCRIPTION"
.PP
The \fBgroupmod\fR command modifies the system account files to reflect the changes that are specified on the command line\&.
.SH "OPTIONS"
.PP
The options which apply to the \fBgroupmod\fR command are:
.IP "\fB\-g\fR \fIgid\fR"
The numerical value of the group's ID. This value must be unique, unless the
\fB\-o\fR option is used. The value must be non\-negative. Values between 0
and 999 are typically reserved for system groups. Any files which the old
group ID is the file group ID must have the file group ID changed manually.
.IP "\fB\-n\fR \fInew_group_name\fR"
The name of the group will be changed from \fIgroup\fR to \fInew_group_name\fR.
.SH FILES
\fI/etc/group\fR \- group account information
.br
\fI/etc/gshadow\fR \- secure group information
.SH EXIT VALUES
.TP 2
The \fBgroupmod\fR command exits with the following values:
.br
\fB0\fR \- success
.br
\fB2\fR \- bad command syntax
.br
\fB3\fR \- invalid argument to option
.br
\fB4\fR \- gid already in use (and no \-o)
.br
\fB6\fR \- specified group doesn't exist
.br
\fB9\fR \- group name already in use
.br
\fB10\fR \- can't update group file
.SH SEE ALSO
.BR chfn (1),
.BR chsh (1),
.BR passwd (1),
.BR groupadd (8),
.BR groupdel (8),
.BR useradd (8),
.BR userdel (8),
.BR usermod (8)
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
.TP
\fB\-g\fR \fIgid\fR
The numerical value of the group's ID\&. This value must be unique, unless the \fB\-o\fR option is used\&. The value must be non\-negative\&. Values between 0 and 999 are typically reserved for system groups\&. Any files which the old group ID is the file group ID must have the file group ID changed manually\&.
.TP
\fB\-n\fR \fInew_group_name\fR
The name of the group will be changed from \fIgroup\fR to \fInew_group_name\fR\&.
.SH "FILES"
.TP
\fI/etc/group\fR
group account information
.TP
\fI/etc/gshadow\fR
secure group account information
.SH "EXIT VALUES"
.PP
The \fBgroupmod\fR command exits with the following values:
.TP
\fI0\fR
success
.TP
\fI2\fR
invalid command syntax
.TP
\fI3\fR
invalid argument to option
.TP
\fI4\fR
specified group doesn't exist
.TP
\fI6\fR
specified group doesn't exist
.TP
\fI9\fR
group name already in use
.TP
\fI10\fR
can't update group file
.SH "SEE ALSO"
.PP
\fBchfn\fR(1), \fBchsh\fR(1), \fBpasswd\fR(1), \fBgroupadd\fR(8), \fBgroupdel\fR(8), \fBuseradd\fR(8), \fBuserdel\fR(8), \fBusermod\fR(8)
.SH "AUTHOR"
.PP
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='groupmod.8'>
<!-- $Id: groupmod.8.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
<!-- $Id: groupmod.8.xml,v 1.7 2005/06/16 16:26:19 kloczek Exp $ -->
<refmeta>
<refentrytitle>groupmod</refentrytitle>
<manvolnum>8</manvolnum>
@@ -80,38 +80,44 @@
<refsect1 id='exit_values'>
<title>EXIT VALUES</title>
<variablelist remap='TP'>
<varlistentry>
<term>
The <command>groupmod</command> command exits with the
following values:
</term>
<listitem>
<!-- .br -->
<para>
<literal>0</literal> - success
<!-- .br -->
<literal>2</literal> - bad command syntax
<!-- .br -->
<literal>3</literal> - invalid argument to option
<!-- .br -->
<literal>4</literal> - gid already in use (and no -o)
<!-- .br -->
<literal>6</literal> - specified group doesn't exist
<!-- .br -->
<literal>9</literal> - group name already in use
<!-- .br -->
<literal>10</literal> - can't update group file
</para>
</listitem>
</varlistentry>
</variablelist>
<para>
The <command>groupmod</command> command exits with the following values:
<variablelist>
<varlistentry>
<term><replaceable>0</replaceable></term>
<listitem>success</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>2</replaceable></term>
<listitem>invalid command syntax</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>3</replaceable></term>
<listitem>invalid argument to option</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>4</replaceable></term>
<listitem>specified group doesn't exist</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>6</replaceable></term>
<listitem>specified group doesn't exist</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>9</replaceable></term>
<listitem>group name already in use</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>10</replaceable></term>
<listitem>can't update group file</listitem>
</varlistentry>
</variablelist>
</para>
</refsect1>
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>chfn</refentrytitle><manvolnum>1</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -1,52 +1,55 @@
.\"$Id: groups.1,v 1.14 2005/04/12 17:55:55 kloczek Exp $
.\" Copyright 1991 - 1994, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH GROUPS 1
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "GROUPS" 1 "" "" ""
.SH NAME
groups \- display current group names
.SH SYNOPSIS
\fBgroups\fR
[\fIuser\fR]
.SH DESCRIPTION
\fBgroups\fR displays the current group names or ID values. If the value
does not have a corresponding entry in \fI/etc/group\fR, the value will be
displayed as the numerical group value. The optional \fIuser\fR parameter
will display the groups for the named \fIuser\fR.
.SH NOTE
Systems which do not support concurrent group sets will have the information
from \fI/etc/group\fR reported.
The user must use \fBnewgrp\fR or \fBsg\fR to change their current real and
effective group ID.
.SH FILES
\fI/etc/group\fR \- group account information
.SH SEE ALSO
.BR newgrp (1),
.BR getgid (2),
.BR getgroups (2),
.BR getuid (2)
.SH AUTHOR
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
.SH "SYNOPSIS"
.ad l
.hy 0
.HP 7
\fBgroups\fR [\fIuser\fR]
.ad
.hy
.SH "DESCRIPTION"
.PP
\fBgroups\fR displays the current group names or ID values\&. If the value does not have a corresponding entry in \fI/etc/group\fR, the value will be displayed as the numerical group value\&. The optional \fIuser\fR parameter will display the groups for the named \fIuser\fR\&.
.SH "NOTE"
.PP
Systems which do not support concurrent group sets will have the information from \fI/etc/group\fR reported\&. The user must use \fBnewgrp\fR or \fBsg\fR to change their current real and effective group ID\&.
.SH "FILES"
.TP
\fI/etc/group\fR
group account information
.SH "SEE ALSO"
.PP
\fBnewgrp\fR(1), \fBgetgid\fR(2), \fBgetgroups\fR(2), \fBgetuid\fR(2)
.SH "AUTHOR"
.PP
Julianne Frances Haugh <jockgrrl@ix\&.netcom\&.com>

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='groups.1'>
<!-- $Id: groups.1.xml,v 1.7 2005/04/27 18:20:35 kloczek Exp $ -->
<!-- $Id: groups.1.xml,v 1.9 2005/06/14 20:18:17 kloczek Exp $ -->
<refmeta>
<refentrytitle>groups</refentrytitle>
<manvolnum>1</manvolnum>
@@ -24,8 +24,7 @@
<refsect1 id='description'>
<title>DESCRIPTION</title>
<para>
<command>groups</command> displays the current group names or ID
<para><command>groups</command> displays the current group names or ID
values. If the value does not have a corresponding entry in
<filename>/etc/group</filename>, the value will be displayed as the
numerical group value. The optional <emphasis
@@ -38,7 +37,7 @@
<title>NOTE</title>
<para>Systems which do not support concurrent group sets will have the
information from <filename>/etc/group</filename> reported. The user
must use <command>newgrp</coamand> or <command>sg</coamand> to change
must use <command>newgrp</command> or <command>sg</command> to change
their current real and effective group ID.
</para>
</refsect1>
@@ -55,8 +54,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>newgrp</refentrytitle><manvolnum>1</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -1,98 +1,105 @@
.\"$Id: grpck.8,v 1.17 2005/04/12 17:53:21 kloczek Exp $
.\" Copyright 1992 - 1993, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH GRPCK 8
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "GRPCK" 8 "" "" ""
.SH NAME
grpck \- verify integrity of group files
.SH SYNOPSIS
\fBgrpck\fR [\fB\-r\fR] [\fIgroup\fR \fIshadow\fR]
.SH DESCRIPTION
\fBgrpck\fR verifies the integrity of the system authentication information.
All entries in the \fI/etc/group\fR and \fI/etc/gshadow\fR are checked to
see that the entry has the proper format and valid data in each field. The
user is prompted to delete entries that are improperly formatted or which
have other incorrectable errors.
.SH "SYNOPSIS"
.ad l
.hy 0
.HP 6
\fBgrpck\fR [\-r] [\fIgroup\fR\ \fIshadow\fR]
.ad
.hy
.SH "DESCRIPTION"
.PP
\fBgrpck\fR verifies the integrity of the system authentication information\&. All entries in the \fI/etc/group\fR and \fI/etc/gshadow\fR are checked to see that the entry has the proper format and valid data in each field\&. The user is prompted to delete entries that are improperly formatted or which have other uncorrectable errors\&.
.PP
Checks are made to verify that each entry has:
.sp
.in +.5i
\- the correct number of fields
.br
\- a unique group name
.br
\- a valid list of members and administrators
.in \-.5i
.sp
.TP 3
\(bu
the correct number of fields
.TP
\(bu
a unique group name
.TP
\(bu
a valid list of members and administrators
.LP
.PP
The checks for correct number of fields and unique group name are fatal. If
the entry has the wrong number of fields, the user will be prompted to
delete the entire line. If the user does not answer affirmatively, all
further checks are bypassed. An entry with a duplicated group name is
prompted for deletion, but the remaining checks will still be made. All
other errors are warnings and the user is encouraged to run the
\fBgroupmod\fR command to correct the error.
The checks for correct number of fields and unique group name are fatal\&. If the entry has the wrong number of fields, the user will be prompted to delete the entire line\&. If the user does not answer affirmatively, all further checks are bypassed\&. An entry with a duplicated group name is prompted for deletion, but the remaining checks will still be made\&. All other errors are warnings and the user is encouraged to run the \fBgroupmod\fR command to correct the error\&.
.PP
The commands which operate on the \fI/etc/group\fR file are not able to
alter corrupted or duplicated entries. \fBgrpck\fR should be used in those
circumstances to remove the offending entry.
.SH OPTIONS
By default, \fBgrpck\fR operates on the files \fI/etc/group\fR and
\fI/etc/gshadow\fR. The user may select alternate files with the \fIgroup\fR
and \fIshadow\fR parameters. Additionally, the user may execute the command
in read\-only mode by specifying the \fB\-r\fR flag. This causes all questions
regarding changes to be answered \fBno\fR without user intervention.
\fBgrpck\fR can also sort entries in \fI/etc/group\fR and \fI/etc/gshadow\fR
by GID. To run it in sort mode pass it \fB\-s\fR flag. No checks are
performed then, it just sorts.
.SH FILES
\fI/etc/group\fR \- group account information
.br
\fI/etc/gshadow\fR \- encrypted passwords and group administrator information
.br
\fI/etc/passwd\fR \- user account information
.SH SEE ALSO
.BR group (5),
.BR passwd (5),
.BR shadow (5),
.BR groupmod (8)
.SH EXIT VALUES
.TP 2
The \fBgrpck\fR command exits with the following values:
.br
\fB0\fR \- success
.br
\fB1\fR \- syntax Error
.br
\fB2\fR \- one or more bad group entries
.br
\fB3\fR \- can't open group files
.br
\fB4\fR \- can't lock group files
.br
\fB5\fR \- can't update group files
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
The commands which operate on the \fI/etc/group\fR file are not able to alter corrupted or duplicated entries\&. \fBgrpck\fR should be used in those circumstances to remove the offending entry\&.
.SH "OPTIONS"
.PP
By default, \fBgrpck\fR operates on the files \fI/etc/group\fR and \fI/etc/gshadow\fR\&. The user may select alternate files with the \fIgroup\fR and \fIshadow\fR parameters\&. Additionally, the user may execute the command in read\-only mode by specifying the \fB\-r\fR flag\&. This causes all questions regarding changes to be answered \fIno\fR without user intervention\&. \fBgrpck\fR can also sort entries in \fI/etc/group\fR and \fI/etc/gshadow\fR by GID\&. To run it in sort mode pass it \fB\-s\fR flag\&. No checks are performed then, it just sorts\&.
.SH "FILES"
.TP
\fI/etc/group\fR
group account information
.TP
\fI/etc/gshadow\fR
secure group account information
.TP
\fI/etc/passwd\fR
user account information
.SH "SEE ALSO"
.PP
\fBgroup\fR(5), \fBpasswd\fR(5), \fBshadow\fR(5), \fBgroupmod\fR(8)
.SH "EXIT VALUES"
.PP
The \fBgrpck\fR command exits with the following values:
.TP
\fI0\fR
success
.TP
\fI1\fR
invalid command syntax
.TP
\fI2\fR
one or more bad group entries
.TP
\fI3\fR
can't open group files
.TP
\fI4\fR
can't lock group files
.TP
\fI5\fR
can't update group files
.SH "AUTHOR"
.PP
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='grpck.8'>
<!-- $Id: grpck.8.xml,v 1.6 2005/04/27 18:20:35 kloczek Exp $ -->
<!-- $Id: grpck.8.xml,v 1.9 2005/06/20 08:57:34 kloczek Exp $ -->
<refmeta>
<refentrytitle>grpck</refentrytitle>
<manvolnum>8</manvolnum>
@@ -30,19 +30,22 @@
<filename>/etc/group</filename> and <filename>/etc/gshadow</filename>
are checked to see that the entry has the proper format and valid data
in each field. The user is prompted to delete entries that are
improperly formatted or which have other incorrectable errors.
improperly formatted or which have other uncorrectable errors.
</para>
<para>Checks are made to verify that each entry has:</para>
<!-- .in +.5i -->
<para>- the correct number of fields
<!-- .br -->
- a unique group name
<!-- .br -->
- a valid list of members and administrators
</para>
<!-- .in \-.5i -->
<itemizedlist mark='bullet'>
<listitem>
<para>the correct number of fields</para>
</listitem>
<listitem>
<para>a unique group name</para>
</listitem>
<listitem>
<para>a valid list of members and administrators</para>
</listitem>
</itemizedlist>
<para>The checks for correct number of fields and unique group name are
fatal. If the entry has the wrong number of fields, the user will be
@@ -50,7 +53,7 @@
affirmatively, all further checks are bypassed. An entry with a
duplicated group name is prompted for deletion, but the remaining
checks will still be made. All other errors are warnings and the user
is encouraged to run the <command>groupmod</coamand> command to
is encouraged to run the <command>groupmod</command> command to
correct the error.
</para>
@@ -99,8 +102,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>group</refentrytitle><manvolnum>5</manvolnum>
</citerefentry>,
<citerefentry>
@@ -117,30 +119,35 @@
<refsect1 id='exit_values'>
<title>EXIT VALUES</title>
<variablelist remap='TP'>
<varlistentry>
<term>
The <command>grpck</command> command exits with the
following values:
</term>
<listitem>
<!-- .br -->
<para>
<literal>0</literal> - success
<!-- .br -->
<literal>1</literal> - syntax Error
<!-- .br -->
<literal>2</literal> - one or more bad group entries
<!-- .br -->
<literal>3</literal> - can't open group files
<!-- .br -->
<literal>4</literal> - can't lock group files
<!-- .br -->
<literal>5</literal> - can't update group files
</para>
</listitem>
</varlistentry>
</variablelist>
<para>
The <command>grpck</command> command exits with the following values:
<variablelist>
<varlistentry>
<term><replaceable>0</replaceable></term>
<listitem>success</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>1</replaceable></term>
<listitem>invalid command syntax</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>2</replaceable></term>
<listitem>one or more bad group entries</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>3</replaceable></term>
<listitem>can't open group files</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>4</replaceable></term>
<listitem>can't lock group files</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>5</replaceable></term>
<listitem>can't update group files</listitem>
</varlistentry>
</variablelist>
</para>
</refsect1>
<refsect1 id='author'>

View File

@@ -1,65 +1,68 @@
.\"$Id: gshadow.5,v 1.2 2005/04/02 16:10:23 kloczek Exp $
.\" Copyright 2005, Nicolas FRANCOIS
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Nicolas FRANCOIS nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY NICOLAS FRANCOIS AND CONTRIBUTORS ``AS IS''
.\" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL NICOLAS FRANCOIS OR CONTRIBUTORS BE
.\" LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
.\" CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
.\" SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
.\" INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
.\" THE POSSIBILITY OF SUCH DAMAGE.
.TH GSHADOW 5
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "GSHADOW" 5 "" "" ""
.SH NAME
gshadow \- shadowed group file
.SH DESCRIPTION
.I gshadow
contains the shadowed information for group accounts.
It contains lines with the folowing colon\-separated fields:
.IP "" .5i
Group name
.IP "" .5i
Encrypted password
.IP "" .5i
Comma\-separated list of group administrators
.IP "" .5i
Comma\-separated list of group members.
.SH "DESCRIPTION"
.PP
The group name and password fields must be filled.
The encryped password consists of 13 characters from the 64\-character
alphabet a thru z, A thru Z, 0 thru 9, \. and /.
Refer to \fBcrypt\fR(3) for details on how this string is interpreted.
If the password field contains some string that is not valid result
of \fBcrypt\fR(3), for instance ! or *, the user will not be able to use
a unix password to log in, subject to \fBpam\fR(7).
\fI/etc/gshadow\fR contains the shadowed information for group accounts\&. It contains lines with the following colon\-separated fields:
.TP 3
\(bu
group name
.TP
\(bu
encrypted password
.TP
\(bu
comma\-separated list of group administrators
.TP
\(bu
comma\-separated list of group members
.LP
.PP
This information supercedes any password present in \fI/etc/group\fR.
The group name and password fields must be filled\&. The encrypted password consists of 13 characters from the 64\-character alphabet a thru z, A thru Z, 0 thru 9, \\\&. and /\&. Refer to \fBcrypt\fR(3) for details on how this string is interpreted\&. If the password field contains some string that is not valid result of \fBcrypt\fR(3), for instance ! or *, the user will not be able to use a unix password to log in, subject to \fBpam\fR(7)\&.
.PP
This information supersedes any password present in \fI/etc/group\fR\&.
.PP
This file must not be readable by regular users if password security is to be maintained\&.
.SH "FILES"
.TP
\fI/etc/group\fR
group account information
.TP
\fI/etc/gshadow\fR
secure group account information
.SH "SEE ALSO"
.PP
\fBgroup\fR(5), \fBgpasswd\fR(5), \fBnewgrp\fR(5)
.SH "AUTHOR"
.PP
This file must not be readable by regular users if password
security is to be maintained.
.SH FILES
\fI/etc/group\fR \- user group file
.br
\fI/etc/gshadow\fR \- shadowed group file
.SH SEE ALSO
.BR group (5),
.BR gpasswd (5),
.BR newgrp (5)
.SH AUTHOR
Nicolas FRANCOIS

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='gshadow.5'>
<!-- $Id: gshadow.5.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
<!-- $Id: gshadow.5.xml,v 1.10 2005/06/16 17:35:43 kloczek Exp $ -->
<refmeta>
<refentrytitle>gshadow</refentrytitle>
<manvolnum>5</manvolnum>
@@ -14,36 +14,39 @@
<refsect1 id='description'>
<title>DESCRIPTION</title>
<para>
<emphasis remap='I'>gshadow</emphasis> contains the shadowed
information for group accounts. It contains lines with the folowing
<para><filename>/etc/gshadow</filename> contains the shadowed
information for group accounts. It contains lines with the following
colon-separated fields:
</para>
<itemizedlist mark='bullet'>
<listitem>
<para>group name</para>
</listitem>
<listitem>
<para>encrypted password</para>
</listitem>
<listitem>
<para>comma-separated list of group administrators</para>
</listitem>
<listitem>
<para>comma-separated list of group members</para>
</listitem>
</itemizedlist>
<para>Group name</para>
<para>Encrypted password</para>
<para>Comma-separated list of group administrators</para>
<para>Comma-separated list of group members.</para>
<para>The group name and password fields must be filled. The encryped
<para>The group name and password fields must be filled. The encrypted
password consists of 13 characters from the 64-character alphabet a
thru z, A thru Z, 0 thru 9, \. and /. Refer to <citerefentry>
<refentrytitle>crypt</refentrytitle><manvolnum>3</manvolnum>
</citerefentry> for details on how this string is interpreted. If the
password field contains some string that is not valid result of
<citerefentry>
thru z, A thru Z, 0 thru 9, \. and /. Refer to <citerefentry>
<refentrytitle>crypt</refentrytitle><manvolnum>3</manvolnum>
</citerefentry> for details on how this string is interpreted. If the
password field contains some string that is not valid result of
<citerefentry><refentrytitle>crypt</refentrytitle><manvolnum>3</manvolnum>
</citerefentry>, for instance ! or *, the user will not be able to use
a unix password to log in, subject to <citerefentry>
<refentrytitle>pam</refentrytitle><manvolnum>7</manvolnum>
</citerefentry>.
<refentrytitle>pam</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
</para>
<para>This information supercedes any password present in
<filename>/etc/group</filename>.
<para>This information supersedes any password present in
<filename>/etc/group</filename>.
</para>
<para>This file must not be readable by regular users if password
@@ -67,8 +70,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>group</refentrytitle><manvolnum>5</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -38,11 +38,7 @@ host_triplet = @host@
subdir = man/hu
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
am__aclocal_m4_deps = $(top_srcdir)/configure.in
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
$(ACLOCAL_M4)
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
@@ -196,9 +192,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
exit 1;; \
esac; \
done; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/hu/Makefile'; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/hu/Makefile'; \
cd $(top_srcdir) && \
$(AUTOMAKE) --foreign man/hu/Makefile
$(AUTOMAKE) --gnu man/hu/Makefile
.PRECIOUS: Makefile
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
@case '$?' in \

View File

@@ -1,48 +1,53 @@
.\"$Id: id.1,v 1.16 2005/04/12 17:55:55 kloczek Exp $
.\" Copyright 1991, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH ID 1
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "ID" 1 "" "" ""
.SH NAME
id \- Display current user and group ID names
.SH SYNOPSIS
\fBid\fR [\fB\-a\fR]
.SH DESCRIPTION
\fBid\fR displays the current real and effective user and group ID names or
values. If the value does not have a corresponding entry in
\fI/etc/passwd\fR or \fI/etc/group\fR, the value will be displayed without
the corresponding name. The optional \fB\-a\fR flag will display the group
set on systems which support multiple concurrent group membership.
.SH FILES
\fI/etc/passwd\fR \- user account information
.br
\fI/etc/group\fR \- group account information
.SH SEE ALSO
.BR getgid (2),
.BR getgroups (2),
.BR getuid (2)
.SH AUTHOR
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
.SH "SYNOPSIS"
.ad l
.hy 0
.HP 3
\fBid\fR [\-a]
.ad
.hy
.SH "DESCRIPTION"
.PP
\fBid\fR displays the current real and effective user and group ID names or values\&. If the value does not have a corresponding entry in \fI/etc/passwd\fR or \fI/etc/group\fR, the value will be displayed without the corresponding name\&. The optional \fB\-a\fR flag will display the group set on systems which support multiple concurrent group membership\&.
.SH "FILES"
.TP
\fI/etc/group\fR
group account information
.TP
\fI/etc/passwd\fR
user account information
.SH "SEE ALSO"
.PP
\fBgetgid\fR(2), \fBgetgroups\fR(2), \fBgetuid\fR(2)
.SH "AUTHOR"
.PP
Julianne Frances Haugh <jockgrrl@ix\&.netcom\&.com>

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='id.1'>
<!-- $Id: id.1.xml,v 1.6 2005/04/27 16:44:12 kloczek Exp $ -->
<!-- $Id: id.1.xml,v 1.8 2005/06/14 20:18:17 kloczek Exp $ -->
<refmeta>
<refentrytitle>id</refentrytitle>
<manvolnum>1</manvolnum>
@@ -21,10 +21,9 @@
<refsect1 id='description'>
<title>DESCRIPTION</title>
<para>
<command>id</command> displays the current real and effective user and
group ID names or values. If the value does not have a corresponding
entry in <filename>/etc/passwd</filename> or
<para><command>id</command> displays the current real and effective user
and group ID names or values. If the value does not have a
corresponding entry in <filename>/etc/passwd</filename> or
<filename>/etc/group</filename>, the value will be displayed without
the corresponding name. The optional <option>-a</option> flag will
display the group set on systems which support multiple concurrent
@@ -48,8 +47,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>getgid</refentrytitle><manvolnum>2</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -38,11 +38,7 @@ host_triplet = @host@
subdir = man/id
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
am__aclocal_m4_deps = $(top_srcdir)/configure.in
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
$(ACLOCAL_M4)
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
@@ -192,9 +188,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
exit 1;; \
esac; \
done; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/id/Makefile'; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/id/Makefile'; \
cd $(top_srcdir) && \
$(AUTOMAKE) --foreign man/id/Makefile
$(AUTOMAKE) --gnu man/id/Makefile
.PRECIOUS: Makefile
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
@case '$?' in \

View File

@@ -38,11 +38,7 @@ host_triplet = @host@
subdir = man/it
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
am__aclocal_m4_deps = $(top_srcdir)/configure.in
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
$(ACLOCAL_M4)
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
@@ -212,9 +208,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
exit 1;; \
esac; \
done; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/it/Makefile'; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/it/Makefile'; \
cd $(top_srcdir) && \
$(AUTOMAKE) --foreign man/it/Makefile
$(AUTOMAKE) --gnu man/it/Makefile
.PRECIOUS: Makefile
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
@case '$?' in \

View File

@@ -23,7 +23,6 @@ man_MANS = \
login.access.5 \
login.defs.5 \
logoutd.8 \
mkpasswd.8 \
newgrp.1 \
newusers.8 \
passwd.1 \

View File

@@ -38,11 +38,7 @@ host_triplet = @host@
subdir = man/ja
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
am__aclocal_m4_deps = $(top_srcdir)/configure.in
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
$(ACLOCAL_M4)
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
@@ -198,7 +194,6 @@ man_MANS = \
login.access.5 \
login.defs.5 \
logoutd.8 \
mkpasswd.8 \
newgrp.1 \
newusers.8 \
passwd.1 \
@@ -236,9 +231,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
exit 1;; \
esac; \
done; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/ja/Makefile'; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/ja/Makefile'; \
cd $(top_srcdir) && \
$(AUTOMAKE) --foreign man/ja/Makefile
$(AUTOMAKE) --gnu man/ja/Makefile
.PRECIOUS: Makefile
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
@case '$?' in \

View File

@@ -1,90 +0,0 @@
.\"$Id: mkpasswd.8,v 1.6 2005/04/05 19:08:55 kloczek Exp $
.\" Copyright 1991, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" Japanese Version Copyright (c) 1997 Kazuyoshi Furutaka
.\" all rights reserved.
.\" Translated Fri Feb 14 23:06:00 JST 1997
.\" by Kazuyoshi Furutaka <furutaka@Flux.tokai.jaeri.go.jp>
.\" Updated & Modified Sat 21 Sep 2002 by NAKANO Takeo <nakano@apm.seikei.ac.jp>
.\"
.TH MKPASSWD 8
.SH ̾<EFBFBD><EFBFBD>
mkpasswd \- passwd <20><> group <20>Υǡ<CEA5><C7A1><EFBFBD><EFBFBD>١<EFBFBD><D9A1><EFBFBD><EFBFBD>ե<EFBFBD><D5A5><EFBFBD><EFBFBD><EFBFBD><EFBFBD>򹹿<EFBFBD><F2B9B9BF><EFBFBD><EFBFBD><EFBFBD>
.SH <EFBFBD><EFBFBD><EFBFBD><EFBFBD>
\fBmkpasswd\fR [\fB\-fvgps\fR] \fIfile\fR
.SH <EFBFBD><EFBFBD><EFBFBD><EFBFBD>
.B mkpasswd
<EFBFBD>ϥե饰<EFBFBD><EFBFBD>Ϳ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>줿<EFBFBD>񼰤ˤ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>äƥե<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ɤ߹<EFBFBD><EFBFBD>ߡ<EFBFBD>
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ǡ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>١<EFBFBD><EFBFBD><EFBFBD><EFBFBD>ե<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ѵ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>줿<EFBFBD>ǡ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>١<EFBFBD><EFBFBD><EFBFBD><EFBFBD>ե<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ϡ<EFBFBD>
¿<EFBFBD><EFBFBD><EFBFBD>Υ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ƥ<EFBFBD><EFBFBD>ǤΥ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ǽ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>뤿<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ѥ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
<EFBFBD><EFBFBD><EFBFBD>ϥե<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>̾<EFBFBD><EFBFBD><EFBFBD><EFBFBD>
\fIfile\fR.dir <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> \fIfile\fR.pag<61>Ȥʤ롣
.PP
\fB\-f\fR <20><><EFBFBD>ץ<EFBFBD><D7A5><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EAA4B9><EFBFBD>ȡ<EFBFBD>
\fBmkpasswd\fR <20>Ͻ<EFBFBD><CFBD>ϥե<CFA5><D5A5><EFBFBD><EFBFBD>¸<EBA4AC>ߤ<EFBFBD><DFA4>Ƥ<EFBFBD><C6A4>Ƥ<EFBFBD>̵<EFBFBD><EFBFBD>ƾ<EFBFBD><C6BE>񤭤<EFBFBD><F1A4ADA4>
<EFBFBD>̾<EFBFBD><EFBFBD>ϡ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>ϥե<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>¸<EFBFBD>ߤ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>ݤηٹ<EFBFBD><EFBFBD><EFBFBD>ȯ<EFBFBD><EFBFBD><EFBFBD>ƽ<EFBFBD>λ<EFBFBD><EFBFBD><EFBFBD>
.PP
\fB\-v\fR <20><><EFBFBD>ץ<EFBFBD><D7A5><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EAA4B9><EFBFBD>ȡ<EFBFBD>
\fBmkpasswd\fR <20><><EFBFBD>Ѵ<EFBFBD><D1B4><EFBFBD><EFBFBD>Ԥʤ<D4A4><CAA4><EFBFBD><EFBFBD>˳ƥ쥳<C6A5><ECA5B3><EFBFBD>ɤξ<C9A4><CEBE><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ϥ<EFBFBD><CFA4><EFBFBD>
<EFBFBD>Ǹ<EFBFBD><EFBFBD>˽<EFBFBD>λ<EFBFBD><EFBFBD><EFBFBD>å<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ɽ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
.PP
\fB\-g\fR <20><><EFBFBD>ץ<EFBFBD><D7A5><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EAA4B9><EFBFBD>ȡ<EFBFBD>
<EFBFBD><EFBFBD><EFBFBD>ϥե<EFBFBD><EFBFBD><EFBFBD><EFBFBD>\fI/etc/group\fR
<EFBFBD>ե<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ν񼰤Ǥ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ȥߤʤ<EFBFBD><EFBFBD>ƽ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ԥʤ<EFBFBD><EFBFBD><EFBFBD>
\fB\-s\fR <20><><EFBFBD>ץ<EFBFBD><D7A5><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ʊ<EFBFBD><C6B1><EFBFBD><EFBFBD><EFBFBD>Ѥ<EFBFBD><D1A4><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ϡ<EFBFBD>
\fI/etc/gshadow\fR <20>ե<EFBFBD><D5A5><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ν񼰤<CEBD><F1BCB0A4>Ѥ<EFBFBD><D1A4><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
.PP
\fB\-p\fR <20><><EFBFBD>ץ<EFBFBD><D7A5><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EAA4B9><EFBFBD>ȡ<EFBFBD>
<EFBFBD><EFBFBD><EFBFBD>ϥե<EFBFBD><EFBFBD><EFBFBD><EFBFBD>\fB/etc/passwd\fR
<EFBFBD>ե<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ν񼰤Ǥ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ȥߤʤ<EFBFBD><EFBFBD>ƽ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ԥ<EFBFBD><EFBFBD><EFBFBD>
<EFBFBD><EFBFBD><EFBFBD><EFBFBD>ǥե<EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ȥ<EFBFBD>ư<EFBFBD><EFBFBD><EFBFBD>Ǥ<EFBFBD><EFBFBD>
\fB\-s\fR <20><><EFBFBD>ץ<EFBFBD><D7A5><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ʊ<EFBFBD><C6B1><EFBFBD><EFBFBD><EFBFBD>Ѥ<EFBFBD><D1A4><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ϡ<EFBFBD>
\fI/etc/shadow\fR <20>ե<EFBFBD><D5A5><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ν񼰤<CEBD><F1BCB0A4>Ѥ<EFBFBD><D1A4><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
.SH <EFBFBD>ٹ<EFBFBD>
ʣ<EFBFBD><EFBFBD><EFBFBD>Υǡ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>١<EFBFBD><EFBFBD><EFBFBD><EFBFBD>ե<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ȥ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>Τϡ<EFBFBD>
NDBM <20>ǡ<EFBFBD><C7A1><EFBFBD><EFBFBD>١<EFBFBD><D9A1><EFBFBD><EFBFBD><EFBFBD>֥<EFBFBD><D6A5><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ƥ<EFBFBD><C6A5>ΤߤǤ<DFA4><C7A4>
<EFBFBD>ɤ<EFBFBD><EFBFBD>ʥ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>ƥ<EFBFBD><EFBFBD>Ǥ<EFBFBD><EFBFBD><EFBFBD>ǽ<EFBFBD>ʤ櫓<EFBFBD>ǤϤʤ<EFBFBD><EFBFBD><EFBFBD>
.SH <EFBFBD><EFBFBD><EFBFBD><EFBFBD>
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Υ<EFBFBD><EFBFBD>ޥ<EFBFBD><EFBFBD>ɤ<EFBFBD><EFBFBD>ѹ<EFBFBD><EFBFBD>κݤ˥ǡ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>١<EFBFBD><EFBFBD><EFBFBD><EFBFBD>ե<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>򹹿<EFBFBD><EFBFBD><EFBFBD><EFBFBD>뵡ǽ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ƥ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>Τǡ<EFBFBD>
<EFBFBD><EFBFBD><EFBFBD>Υ<EFBFBD><EFBFBD>ޥ<EFBFBD><EFBFBD>ɤ<EFBFBD>ɬ<EFBFBD>פˤʤ<EFBFBD><EFBFBD>Τϡ<EFBFBD><EFBFBD>ǡ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>١<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ƥ<EFBFBD><EFBFBD>ޤä<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
<EFBFBD>ǡ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>١<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>줿<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ʤɤˡ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ȥ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ǥ<EFBFBD><EFBFBD>
.SH <EFBFBD>ե<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
\fI/etc/passwd\fR \ \- <20><EFBFBD><E6A1BC><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ⱦ<EFBFBD><C8BE><EFBFBD>
.br
\fI/etc/shadow\fR \ \- shadow <20><><EFBFBD><EFBFBD><EFBFBD>줿<EFBFBD><EFBFBD><E6A1BC><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
.br
\fI/etc/group\fR \ \- <20><><EFBFBD><EFBFBD>׾<EFBFBD><D7BE><EFBFBD>
.br
\fI/etc/gshadow\fR \- shadow <20><><EFBFBD><EFBFBD><EFBFBD>줿<EFBFBD><ECA4BF><EFBFBD><EFBFBD>׾<EFBFBD><D7BE><EFBFBD>
.SH <EFBFBD><EFBFBD>Ϣ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>
.BR group (5),
.BR passwd (5),
.BR shadow (5)
.SH <EFBFBD><EFBFBD><EFBFBD><EFBFBD>
Julianne Frances Haugh (jockgrrl@ix.netcom.com)

View File

@@ -38,11 +38,7 @@ host_triplet = @host@
subdir = man/ko
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
am__aclocal_m4_deps = $(top_srcdir)/configure.in
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
$(ACLOCAL_M4)
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
@@ -195,9 +191,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
exit 1;; \
esac; \
done; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/ko/Makefile'; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/ko/Makefile'; \
cd $(top_srcdir) && \
$(AUTOMAKE) --foreign man/ko/Makefile
$(AUTOMAKE) --gnu man/ko/Makefile
.PRECIOUS: Makefile
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
@case '$?' in \

View File

@@ -1,64 +1,73 @@
.\"$Id: lastlog.8,v 1.21 2005/04/05 18:47:50 kloczek Exp $
.\" Copyright 1992, Phillip Street and Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\" @(#)lastlog.8 3.3 08:24:58 29 Sep 1993 (National Guard Release)
.TH LASTLOG 8
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "LASTLOG" 8 "" "" ""
.SH NAME
lastlog \- examine lastlog file
.SH SYNOPSIS
.TP 8
\fBlastlog\fR [\fBoptions\fR]
.SH DESCRIPTION
.SH "SYNOPSIS"
.ad l
.hy 0
.HP 8
\fBlastlog\fR [\fIoptions\fR]
.ad
.hy
.SH "DESCRIPTION"
.PP
\fBlastlog\fR formats and prints the contents of the last login log
\fI/var/log/lastlog\fR file. The \fBlogin\-name\fR, \fBport\fR, and \fBlast
login time\fR will be printed. The default (no flags) causes lastlog entries
to be printed, sorted by their order in \fB/etc/passwd\fR.
.SH OPTIONS
\fBlastlog\fR formats and prints the contents of the last login log \fI/var/log/lastlog\fR file\&. The \fI login\-name\fR, \fIport\fR, and \fIlast login time\fR will be printed\&. The default (no flags) causes lastlog entries to be printed, sorted by their order in \fI/etc/passwd\fR\&.
.SH "OPTIONS"
.TP
The options which apply to the \fBlastlog\fR command are:
.IP "\fB\-h\fR, \fB\-\-help\fR"
Print help message and exit.
.IP "\fB\-t\fR, \fB\-\-time\fR \fIDAYS\fR"
Print the lastlog records more recent than \fIDAYS\fR.
.IP "\fB\-u\fR, \fB\-\-user\fR \fILOGIN\fR"
Print the lastlog record for user with specified \fILOGIN\fR only.
.TP
The \fB\-t\fR flag overrides the use of \fB\-u\fR.
\fB\-h\fR, \fB\-\-help\fR
Print help message and exit\&.
.TP
\fB\-t\fR, \fB\-\-time\fR \fIDAYS\fR
Print the lastlog records more recent than \fIDAYS\fR\&.
.TP
\fB\-u\fR, \fB\-\-user\fR \fILOGIN\fR
Print the lastlog record for user with specified \fILOGIN\fR only\&.
.TP
The \fB\-t\fR flag overrides the use of \fB\-u\fR\&.
.PP
If the user has never logged in the message \fB"**Never logged in**"\fR will
be displayed instead of the port and time.
.SH FILES
\fI/var/log/lastlog\fR \- lastlog logging file
.SH CAVEATS
Large gaps in uid numbers will cause the lastlog program to run longer with
no output to the screen (i.e. if mmdf=800 and last uid=170, program will
appear to hang as it processes uid 171\-799).
.SH AUTHORS
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
.br
Phillip Street
If the user has never logged in the message \fI **Never logged in**\fR will be displayed instead of the port and time\&.
.SH "FILES"
.TP
\fI/var/log/lastlog\fR
lastlog logging file
.SH "CAVEATS"
.PP
Large gaps in uid numbers will cause the lastlog program to run longer with no output to the screen (i\&.e\&. if mmdf=800 and last uid=170, program will appear to hang as it processes uid 171\-799)\&.
.SH "AUTHORS"
.PP
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com) Phillip Street

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='lastlog.8'>
<!-- $Id: lastlog.8.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
<!-- $Id: lastlog.8.xml,v 1.6 2005/06/14 16:54:20 kloczek Exp $ -->
<refmeta>
<refentrytitle>lastlog</refentrytitle>
<manvolnum>8</manvolnum>
@@ -23,8 +23,7 @@
<refsect1 id='description'>
<title>DESCRIPTION</title>
<para>
<command>lastlog</command> formats and prints the contents of the last
<para><command>lastlog</command> formats and prints the contents of the last
login log <filename>/var/log/lastlog</filename> file. The <emphasis
remap='B'> login-name</emphasis>, <emphasis remap='B'>port</emphasis>,
and <emphasis remap='B'>last login time</emphasis> will be printed.
@@ -54,28 +53,24 @@
</varlistentry>
<varlistentry>
<term>
<option>-t</option>, <option>--time</option> <replaceable>
DAYS
</replaceable>
<option>-t</option>, <option>--time</option>
<replaceable>DAYS</replaceable>
</term>
<listitem>
<para>
Print the lastlog records more recent than <emphasis remap='I'>
DAYS
</emphasis>
.
Print the lastlog records more recent than
<emphasis remap='I'>DAYS</emphasis>.
</para>
</listitem>
</varlistentry>
<varlistentry>
<term>
<option>-u</option>, <option>--user</option> <replaceable>
LOGIN
</replaceable>
<option>-u</option>, <option>--user</option>
<replaceable>LOGIN</replaceable>
</term>
<listitem>
<para> Print the lastlog record for user with specified <emphasis
remap='I'> LOGIN</emphasis>only.
<para>Print the lastlog record for user with specified
<emphasis remap='I'>LOGIN</emphasis> only.
</para>
</listitem>
</varlistentry>
@@ -86,14 +81,14 @@
The <option>-t</option> flag overrides the use of <option>-u</option>.
</term>
<listitem>
<para></para> <!-- FIXME: blank list item -->
<para></para>
</listitem>
</varlistentry>
</variablelist>
<para> If the user has never logged in the message <emphasis
remap='B'>"**Never logged in**" </emphasis> will be displayed instead
of the port and time.
<para>If the user has never logged in the message <emphasis remap='B'>
**Never logged in**</emphasis> will be displayed instead of the port and
time.
</para>
</refsect1>
@@ -118,7 +113,6 @@
<refsect1 id='authors'>
<title>AUTHORS</title>
<para>Julianne Frances Haugh (jockgrrl@ix.netcom.com)
<!-- .br -->
Phillip Street
</para>
</refsect1>

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='limits5'>
<!-- $Id: limits.5.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
<!-- $Id: limits.5.xml,v 1.6 2005/06/14 20:18:17 kloczek Exp $ -->
<refmeta>
<refentrytitle>LIMITS</refentrytitle>
<manvolnum>5</manvolnum>
@@ -124,8 +124,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>login</refentrytitle><manvolnum>1</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -1,128 +1,133 @@
.\" $Id: login.1,v 1.24 2005/04/26 12:38:53 kloczek Exp $
.\" Copyright 1989 - 1994, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH LOGIN 1
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "LOGIN" 1 "" "" ""
.SH NAME
login \- begin session on the system
.SH SYNOPSIS
\fBlogin\fR [\fB\-p\fR] [\fIusername\fR] [\fIENV=VAR\fR ...]
.br
\fBlogin\fR [\fB\-p\fR] [\fB\-h\fR \fIhost\fR] [\fB\-f\fR \fIusername\fR]
.br
\fBlogin\fR [\fB\-p\fR] \fB\-r\fR \fIhost\fR
.SH DESCRIPTION
\fBlogin\fR is used to establish a new session with the system. It is
normally invoked automatically by responding to the \fIlogin:\fR prompt on
the user\'s terminal. \fBlogin\fR may be special to the shell and may not be
invoked as a sub\-process. Typically, \fBlogin\fR is treated by the shell as
\fBexec login\fR which causes the user to exit from the current shell.
Attempting to execute \fBlogin\fR from any shell but the login shell will
produce an error message.
.PP
The user is then prompted for a password, where appropriate. Echoing is
disabled to prevent revealing the password. Only a small number of password
failures are permitted before \fBlogin\fR exits and the communications link
is severed.
.PP
If password aging has been enabled for your account, you may be prompted for
a new password before proceeding. You will be forced to provide your old
password and the new password before continuing. Please refer to
\fBpasswd\fR(1) for more information.
.PP
.SH "SYNOPSIS"
.ad l
.hy 0
.HP 6
\fBlogin\fR [\-p] [\fIusername\fR] [\fIENV=VAR\fR...]
.ad
.hy
.ad l
.hy 0
.HP 6
\fBlogin\fR [\-p] [\-h\ \fIhost\fR] [\-f\ \fIusername\fR]
.ad
.hy
.ad l
.hy 0
.HP 6
\fBlogin\fR [\-p] \-r\ \fIhost\fR
.ad
.hy
After a successful login, you will be informed of any system messages and
the presence of mail. You may turn off the printing of the system message
file, \fI/etc/motd\fR, by creating a zero\-length file \fI.hushlogin\fR in
your login directory. The mail message will be one of "\fBYou have new
mail.\fR", "\fBYou have mail.\fR", or "\fBNo Mail.\fR" according to the
condition of your mailbox.
.SH "DESCRIPTION"
.PP
Your user and group ID will be set according to their values in
the \fI/etc/passwd\fR file.
The value for \fB$HOME\fR, \fB$SHELL\fR, \fB$PATH\fR, \fB$LOGNAME\fR,
and \fB$MAIL\fR are set according to the appropriate fields in the
password entry.
Ulimit, umask and nice values may also be set according to
entries in the GECOS field.
\fBlogin\fR is used to establish a new session with the system\&. It is normally invoked automatically by responding to the \fIlogin:\fR prompt on the user<65>s terminal\&. \fBlogin\fR may be special to the shell and may not be invoked as a sub\-process\&. Typically, \fBlogin\fR is treated by the shell as \fIexec login\fR which causes the user to exit from the current shell\&. Attempting to execute \fBlogin\fR from any shell but the login shell will produce an error message\&.
.PP
On some installations, the environmental variable \fB$TERM\fR will be
initialized to the terminal type on your tty line, as specified in
\fI/etc/ttytype\fR.
The user is then prompted for a password, where appropriate\&. Echoing is disabled to prevent revealing the password\&. Only a small number of password failures are permitted before \fBlogin\fR exits and the communications link is severed\&.
.PP
An initialization script for your command interpreter may also be
executed.
Please see the appropriate manual section for more information on
this function.
If password aging has been enabled for your account, you may be prompted for a new password before proceeding\&. You will be forced to provide your old password and the new password before continuing\&. Please refer to \fBpasswd\fR(1) for more information\&.
.PP
A subsystem login is indicated by the presence of a "*" as the first
character of the login shell. The given home directory will be used as
the root of a new file system which the user is actually logged into.
.SH OPTIONS
.IP "\fB\-f\fR"
Do not perform authentication, user is preauthenticated.
.IP "\fB\-h\fR"
Name of the remote host for this login.
.IP "\fB\-p\fR"
Preserve environment.
.IP "\fB\-r\fR"
Perform autologin protocol for rlogin.
After a successful login, you will be informed of any system messages and the presence of mail\&. You may turn off the printing of the system message file, \fI/etc/motd\fR, by creating a zero\-length file \&.hushlogin in your login directory\&. The mail message will be one of "\fIYou have new mail\&.\fR ", "\fIYou have mail\&.\fR", or "\fINo Mail\&.\fR "according to the condition of your mailbox\&.
.PP
The \fB\-r\fP, \fB\-h\fP and \fB\-f\fP options are only used when \fBlogin\fP is
invoked by root.
.SH CAVEATS
This version of \fBlogin\fR has many compilation options, only some of which
may be in use at any particular site.
Your user and group ID will be set according to their values in the \fI/etc/passwd\fR file\&. The value for \fI$HOME\fR, \fI$SHELL\fR, \fI$PATH\fR, \fI$LOGNAME\fR, and \fI$MAIL\fR are set according to the appropriate fields in the password entry\&. Ulimit, umask and nice values may also be set according to entries in the GECOS field\&.
.PP
The location of files is subject to differences in system configuration.
.SH FILES
\fI/var/run/utmp\fR \- list of current login sessions
.br
\fI/var/log/wtmp\fR \- list of previous login sessions
.br
\fI/etc/passwd\fR \- user account information
.br
\fI/etc/shadow\fR \- secure user account information
.br
\fI/etc/motd\fR \- system message file
.br
\fI/etc/nologin\fR \- prevent non\-root users from logging in
.br
\fI/etc/ttytype\fR \- list of terminal types
.br
\fI$HOME/.hushlogin\fR \- suppress printing of system messages
.SH SEE ALSO
.BR mail (1),
.BR passwd (1),
.BR sh (1),
.BR su (1),
.BR login.defs (5),
.BR nologin (5),
.BR passwd (5),
.BR getty (8)
.SH AUTHOR
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
On some installations, the environmental variable \fI$TERM\fR will be initialized to the terminal type on your tty line, as specified in \fI/etc/ttytype\fR\&.
.PP
An initialization script for your command interpreter may also be executed\&. Please see the appropriate manual section for more information on this function\&.
.PP
A subsystem login is indicated by the presence of a "*" as the first character of the login shell\&. The given home directory will be used as the root of a new file system which the user is actually logged into\&.
.SH "OPTIONS"
.TP
\fB\-f\fR
Do not perform authentication, user is preauthenticated\&.
.TP
\fB\-h\fR
Name of the remote host for this login\&.
.TP
\fB\-p\fR
Preserve environment\&.
.TP
\fB\-r\fR
Perform autologin protocol for rlogin\&.
.PP
The \fB\-r\fR, \fB\-h\fR and \fB\-f\fR options are only used when \fBlogin\fR is invoked by root\&.
.SH "CAVEATS"
.PP
This version of \fBlogin\fR has many compilation options, only some of which may be in use at any particular site\&.
.PP
The location of files is subject to differences in system configuration\&.
.SH "FILES"
.TP
\fI/var/run/utmp\fR
list of current login sessions
.TP
\fI/var/log/wtmp\fR
list of previous login sessions
.TP
\fI/etc/passwd\fR
user account information
.TP
\fI/etc/shadow\fR
secure user account information
.TP
\fI/etc/motd\fR
system message of the day file
.TP
\fI/etc/nologin\fR
prevent non\-root users from logging in
.TP
\fI/etc/ttytype\fR
list of terminal types
.TP
\fI$HOME/\&.hushlogin\fR
suppress printing of system messages
.SH "SEE ALSO"
.PP
\fBmail\fR(1), \fBpasswd\fR(1), \fBsh\fR(1), \fBsu\fR(1), \fBlogin\&.defs\fR(5), \fBnologin\fR(5), \fBpasswd\fR(5), \fBgetty\fR(8)
.SH "AUTHOR"
.PP
Julianne Frances Haugh <jockgrrl@ix\&.netcom\&.com>

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='login.1'>
<!-- $Id: login.1.xml,v 1.6 2005/04/26 12:45:50 kloczek Exp $ -->
<!-- $Id: login.1.xml,v 1.9 2005/06/15 12:39:27 kloczek Exp $ -->
<refmeta>
<refentrytitle>LOGIN</refentrytitle>
<manvolnum>1</manvolnum>
@@ -36,14 +36,13 @@
<refsect1 id='description'>
<title>DESCRIPTION</title>
<para>
<command>login</command> is used to establish a new session with the
<para><command>login</command> is used to establish a new session with the
system. It is normally invoked automatically by responding to the
<emphasis remap='I'>login:</emphasis> prompt on the user&acute;s
terminal. <command>login</command> may be special to the shell and may
not be invoked as a sub-process. Typically, <command>login</command>
is treated by the shell as <emphasis remap='B'>exec login</emphasis>
which causes the user to exit from the current shell. Attempting to
which causes the user to exit from the current shell. Attempting to
execute <command>login</command> from any shell but the login shell
will produce an error message.
</para>
@@ -157,32 +156,45 @@
<refsect1 id='files'>
<title>FILES</title>
<para>
<filename>/var/run/utmp</filename> - list of current login
sessions <!-- .br -->
<filename>/var/log/wtmp</filename> - list of previous login
sessions
<!-- .br -->
<filename>/etc/passwd</filename> - user account information
<!-- .br -->
<filename>/etc/shadow</filename> - secure user account information
<!-- .br -->
<filename>/etc/motd</filename> - system message file
<!-- .br -->
<filename>/etc/nologin</filename> - prevent non-root users from
logging in
<!-- .br -->
<filename>/etc/ttytype</filename> - list of terminal types
<!-- .br -->
<emphasis remap='I'>$HOME/.hushlogin</emphasis> - suppress printing
of system messages
</para>
<variablelist>
<varlistentry>
<term><filename>/var/run/utmp</filename></term>
<listitem>list of current login sessions</listitem>
</varlistentry>
<varlistentry>
<term><filename>/var/log/wtmp</filename></term>
<listitem>list of previous login sessions</listitem>
</varlistentry>
<varlistentry>
<term><filename>/etc/passwd</filename></term>
<listitem>user account information</listitem>
</varlistentry>
<varlistentry>
<term><filename>/etc/shadow</filename></term>
<listitem>secure user account information</listitem>
</varlistentry>
<varlistentry>
<term><filename>/etc/motd</filename></term>
<listitem>system message of the day file</listitem>
</varlistentry>
<varlistentry>
<term><filename>/etc/nologin</filename></term>
<listitem>prevent non-root users from logging in</listitem>
</varlistentry>
<varlistentry>
<term><filename>/etc/ttytype</filename></term>
<listitem>list of terminal types</listitem>
</varlistentry>
<varlistentry>
<term><filename>$HOME/.hushlogin</filename></term>
<listitem>suppress printing of system messages</listitem>
</varlistentry>
</variablelist>
</refsect1>
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>mail</refentrytitle><manvolnum>1</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='loginaccess5'>
<!-- $Id: login.access.5.xml,v 1.4 2005/04/22 07:00:57 kloczek Exp $ -->
<!-- $Id: login.access.5.xml,v 1.5 2005/06/14 20:18:17 kloczek Exp $ -->
<!-- this is comment -->
<refmeta>
<refentrytitle>LOGIN.ACCESS</refentrytitle>
@@ -90,8 +90,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>login</refentrytitle><manvolnum>1</manvolnum>
</citerefentry>
</para>

View File

@@ -1,159 +1,135 @@
.\" $Id: login.defs.5,v 1.17 2005/04/26 12:16:36 kloczek Exp $
.\" Copyright 1991 - 1993, Julianne Frances Haugh and Chip Rosenthal
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH LOGIN.DEFS 5
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "LOGIN.DEFS" 5 "" "" ""
.SH NAME
/etc/login.defs \- shadow password suite configuration
.SH DESCRIPTION
The
\fI/etc/login.defs\fR file defines the site\-specific configuration for the
shadow password suite. This file is required. Absence of this file will
not prevent system operation, but will probably result in undesirable
operation.
login.defs \- shadow password suite configuration
.SH "DESCRIPTION"
.PP
This file is a readable text file, each line of the file describing one
configuration parameter. The lines consist of a configuration name and
value, separated by whitespace. Blank lines and comment lines are ignored.
Comments are introduced with a `#' pound sign and the pound sign must be the
first non\-white character of the line.
The \fI/etc/login\&.defs\fR file defines the site\-specific configuration for the shadow password suite\&. This file is required\&. Absence of this file will not prevent system operation, but will probably result in undesirable operation\&.
.PP
Parameter values may be of four types: strings, booleans, numbers, and long
numbers. A string is comprised of any printable characters. A boolean should
be either the value ``yes'' or ``no''. An undefined boolean parameter or one
with a value other than these will be given a ``no'' value. Numbers (both
regular and long) may be either decimal values, octal values (precede the
value with ``0'') or hexadecimal values (precede the value with ``0x'').
The maximum value of the regular and long numeric parameters is
machine\-dependent.
This file is a readable text file, each line of the file describing one configuration parameter\&. The lines consist of a configuration name and value, separated by whitespace\&. Blank lines and comment lines are ignored\&. Comments are introduced with a `#' pound sign and the pound sign must be the first non\-white character of the line\&.
.PP
Parameter values may be of four types: strings, booleans, numbers, and long numbers\&. A string is comprised of any printable characters\&. A boolean should be either the value &#8220;yes&#8221; or &#8220;no&#8221;\&. An undefined boolean parameter or one with a value other than these will be given a &#8220;no&#8221; value\&. Numbers (both regular and long) may be either decimal values, octal values (precede the value with &#8220;0&#8221;) or hexadecimal values (precede the value with &#8220;0x&#8221;)\&. The maximum value of the regular and long numeric parameters is machine\-dependent\&.
.PP
The following configuration items are provided:
.\"
.IP "CHFN_AUTH (boolean)"
If \fIyes\fR, the \fBchfn\fR and \fBchsh\fR programs will require
authentication before making any changes, unless run by the superuser.
.\"
.IP "CHFN_RESTRICT (string)"
This parameter specifies which values in the \fIgecos\fR field of the
\fI/etc/passwd\fR file may be changed by regular users using the \fBchfn\fR
program. It can be any combination of letters \fIf\fR, \fIr\fR, \fIw\fR,
\fIh\fR, for Full name, Room number, Work phone, and Home phone,
respectively. For backward compatibility, "yes" is equivalent to "rwh" and
"no" is equivalent to "frwh". If not specified, only the superuser can make
any changes. The most restrictive setting is better achieved by not
installing chfn SUID.
.\"
.IP "CREATE_HOME (boolean)"
This defines whether useradd should create home directories for users by
default. This option is OR'ed with the \fI\-m\fR flag on useradd command line.
.\"
.IP "GID_MAX (number)"
.IP "GID_MIN (number)"
Range of group IDs to choose from for the \fBuseradd\fR and \fBgroupadd\fR
programs.
.\"
.IP "MAIL_DIR (string)"
The mail spool directory. This is needed to manipulate the mailbox when its
corresponding user account is modified or deleted. If not specified, a
compile\-time default is used.
.\"
.IP "PASS_MAX_DAYS (number)"
The maximum number of days a password may be used. If the password is older
than this, a password change will be forced. If not specified, \-1 will be
assumed (which disables the restriction).
.IP "PASS_MIN_DAYS (number)"
The minimum number of days allowed between password changes. Any password
changes attempted sooner than this will be rejected. If not specified, \-1
will be assumed (which disables the restriction).
.IP "PASS_WARN_AGE (number)"
The number of days warning given before a password expires. A zero means
warning is given only upon the day of expiration, a negative value means no
warning is given. If not specified, no warning will be provided.
.TP
CHFN_AUTH (boolean)
If \fIyes\fR, the \fBchfn\fR and \fBchsh\fR programs will require authentication before making any changes, unless run by the superuser\&.
.TP
CHFN_RESTRICT (string)
This parameter specifies which values in the \fIgecos\fR field of the \fI/etc/passwd\fR file may be changed by regular users using the \fBchfn\fR program\&. It can be any combination of letters \fIf\fR ,\fIr\fR, \fIw\fR, \fIh\fR, for Full name, Room number, Work phone, and Home phone, respectively\&. For backward compatibility, "yes" is equivalent to "rwh" and "no" is equivalent to "frwh"\&. If not specified, only the superuser can make any changes\&. The most restrictive setting is better achieved by not installing chfn SUID\&.
.TP
CREATE_HOME (boolean)
This defines whether useradd should create home directories for users by default\&. This option is OR'ed with the \fB\-m\fR flag on useradd command line\&.
.TP
GID_MAX (number), GID_MIN (number)
Range of group IDs to choose from for the \fBuseradd\fR and \fBgroupadd\fRprograms\&.
.TP
MAIL_DIR (string)
The mail spool directory\&. This is needed to manipulate the mailbox when its corresponding user account is modified or deleted\&. If not specified, a compile\-time default is used\&.
.TP
PASS_MAX_DAYS (number)
The maximum number of days a password may be used\&. If the password is older than this, a password change will be forced\&. If not specified, \-1 will be assumed (which disables the restriction)\&.
.TP
PASS_MIN_DAYS (number)
The minimum number of days allowed between password changes\&. Any password changes attempted sooner than this will be rejected\&. If not specified, \-1 will be assumed (which disables the restriction)\&.
.TP
PASS_WARN_AGE (number)
The number of days warning given before a password expires\&. A zero means warning is given only upon the day of expiration, a negative value means no warning is given\&. If not specified, no warning will be provided\&.
.PP
PASS_MAX_DAYS, PASS_MIN_DAYS and PASS_WARN_AGE
are only used at the time of account creation. Any changes to these
settings won't affect existing accounts.
.\"
.IP "UID_MAX (number)"
.IP "UID_MIN (number)"
Range of user IDs to choose from for the \fBuseradd\fR program.
.\"
.IP "UMASK (number)"
The permission mask is initialized to this value. If not specified,
the permission mask will be initialized to 077.
.\"
.IP "USERDEL_CMD (string)"
If defined, this command is run when removing a user.
It should remove any at/cron/print jobs etc. owned by
the user to be removed (passed as the first argument).
.\"
.SH CROSS REFERENCE
The following cross reference shows which programs in the shadow password
suite use which parameters.
.na
.IP chfn 12
PASS_MAX_DAYS, PASS_MIN_DAYS and PASS_WARN_AGE are only used at the time of account creation\&. Any changes to these settings won't affect existing accounts\&.
.TP
UID_MAX (number), UID_MIN (number)
Range of user IDs to choose from for the \fBuseradd\fR program\&.
.TP
UMASK (number)
The permission mask is initialized to this value\&. If not specified, the permission mask will be initialized to 077\&.
.TP
USERDEL_CMD (string)
If defined, this command is run when removing a user\&. It should remove any at/cron/print jobs etc\&. owned by the user to be removed (passed as the first argument)\&.
.SH "CROSS REFERENCE"
.PP
The following cross reference shows which programs in the shadow password suite use which parameters\&.
.TP
chfn
CHFN_AUTH CHFN_RESTRICT
.IP chsh 12
.TP
chsh
CHFN_AUTH
.IP groupadd 12
.TP
groupadd
GID_MAX GID_MIN
.IP newusers 12
.TP
newusers
PASS_MAX_DAYS PASS_MIN_DAYS PASS_WARN_AGE UMASK
.TP
pwconv
PASS_MAX_DAYS PASS_MIN_DAYS PASS_WARN_AGE
UMASK
.IP pwconv 12
PASS_MAX_DAYS PASS_MIN_DAYS PASS_WARN_AGE
.IP useradd 12
CREATE_HOME
GID_MAX GID_MIN
PASS_MAX_DAYS PASS_MIN_DAYS PASS_WARN_AGE
UID_MAX UID_MIN
UMASK
.IP userdel 12
.TP
useradd
CREATE_HOME GID_MAX GID_MIN PASS_MAX_DAYS PASS_MIN_DAYS PASS_WARN_AGE UID_MAX UID_MIN UMASK
.TP
userdel
MAIL_DIR USERDEL_CMD
.TP
usermod
MAIL_DIR
USERDEL_CMD
.IP usermod 12
MAIL_DIR
.ad
.SH BUGS
Much of the functionality that used to be provided by the shadow password
suite is now handled by PAM. Thus, \fI/etc/login.defs\fR is no longer used
by programs such as
.BR login (1),
.BR passwd (1)
and
.BR su (1).
Please refer to the corresponding PAM configuration files instead.
.SH SEE ALSO
.BR login (1),
.BR passwd (1),
.BR su (1),
.BR passwd (5),
.BR shadow (5),
.BR pam (8)
.SH AUTHORS
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
.br
Chip Rosenthal (chip@unicom.com)
.SH "BUGS"
.PP
Much of the functionality that used to be provided by the shadow password suite is now handled by PAM\&. Thus, \fI/etc/login\&.defs\fR is no longer used by programs such as: \fBlogin\fR(1), \fBpasswd\fR(1), \fBsu\fR(1)\&. Please refer to the corresponding PAM configuration files instead\&.
.SH "SEE ALSO"
.PP
\fBlogin\fR(1), \fBpasswd\fR(1), \fBsu\fR(1), \fBpasswd\fR(5), \fBshadow\fR(5), \fBpam\fR(8)
.SH "AUTHORS"
.PP
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com) Chip Rosenthal (chip@unicom\&.com)

View File

@@ -2,13 +2,13 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='login.defs.5'>
<!-- $Id: login.defs.5.xml,v 1.6 2005/04/27 18:20:35 kloczek Exp $ -->
<!-- $Id: login.defs.5.xml,v 1.8 2005/06/15 12:39:27 kloczek Exp $ -->
<refmeta>
<refentrytitle>login.defs</refentrytitle>
<manvolnum>5</manvolnum>
</refmeta>
<refnamediv id='name'>
<refname>/etc/login.defs</refname>
<refname>login.defs</refname>
<refpurpose>shadow password suite configuration</refpurpose>
</refnamediv>
@@ -35,7 +35,7 @@
other than these will be given a &ldquo;no&rdquo; value. Numbers (both
regular and long) may be either decimal values, octal values (precede
the value with &ldquo;0&rdquo;) or hexadecimal values (precede the
value with &ldquo;0x&rdquo;). The maximum value of the regular and
value with &ldquo;0x&rdquo;). The maximum value of the regular and
long numeric parameters is machine-dependent.
</para>
@@ -46,7 +46,7 @@
<term>CHFN_AUTH (boolean)</term>
<listitem>
<para> If <emphasis remap='I'>yes</emphasis>, the
<command>chfn</coamand> and <command>chsh</coamand> programs
<command>chfn</command> and <command>chsh</command> programs
will require authentication before making any changes, unless
run by the superuser.
</para>
@@ -85,8 +85,8 @@
<listitem>
<para>
Range of group IDs to choose from for the
<command>useradd</coamand> and
<command>groupadd</coamand>programs.
<command>useradd</command> and
<command>groupadd</command>programs.
</para>
</listitem>
</varlistentry>
@@ -142,7 +142,7 @@
<listitem>
<para>
Range of user IDs to choose from for the
<command>useradd</coamand> program.
<command>useradd</command> program.
</para>
</listitem>
</varlistentry>
@@ -255,8 +255,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>login</refentrytitle><manvolnum>1</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -2,33 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='logoutd8'>
<!-- $Id: logoutd.8.xml,v 1.4 2005/04/22 07:00:57 kloczek Exp $ -->
<!-- Copyright 1991, Julianne Frances Haugh -->
<!-- All rights reserved. -->
<!-- Redistribution and use in source and binary forms, with or without -->
<!-- modification, are permitted provided that the following conditions -->
<!-- are met: -->
<!-- 1. Redistributions of source code must retain the above copyright -->
<!-- notice, this list of conditions and the following disclaimer. -->
<!-- 2. Redistributions in binary form must reproduce the above copyright -->
<!-- notice, this list of conditions and the following disclaimer in the -->
<!-- documentation and/or other materials provided with the distribution. -->
<!-- 3. Neither the name of Julianne F. Haugh nor the names of its contributors -->
<!-- may be used to endorse or promote products derived from this software -->
<!-- without specific prior written permission. -->
<!-- THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND -->
<!-- ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE -->
<!-- IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE -->
<!-- ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE -->
<!-- FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL -->
<!-- DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS -->
<!-- OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) -->
<!-- HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT -->
<!-- LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY -->
<!-- OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF -->
<!-- SUCH DAMAGE. -->
<!-- $Id: logoutd.8.xml,v 1.6 2005/06/15 12:39:27 kloczek Exp $ -->
<refmeta>
<refentrytitle>LOGOUTD</refentrytitle>
<manvolnum>8</manvolnum>
@@ -46,29 +20,29 @@
<refsect1 id='description'>
<title>DESCRIPTION</title>
<para>
<command>logoutd</command> enforces the login time and port
restrictions specified in
<filename>/etc/porttime</filename>. <command>logoutd</command>
should be started from <filename>/etc/rc</filename>.
The <filename>/var/run/utmp</filename> file is scanned periodically
and each user name
is checked to see if the named user is permitted on the named port
at the current time.
<para><command>logoutd</command> enforces the login time and port
restrictions specified in <filename>/etc/porttime</filename>.
<command>logoutd</command> should be started from
<filename>/etc/rc</filename>. The <filename>/var/run/utmp</filename>
file is scanned periodically and each user name is checked to see if
the named user is permitted on the named port at the current time.
Any login session which is violating the restrictions in <filename>
/etc/porttime
</filename>
is terminated.
/etc/porttime</filename> is terminated.
</para>
</refsect1>
<refsect1 id='files'>
<title>FILES</title>
<para>
<filename>/etc/porttime</filename> - login and port permissions
<!-- .br -->
<filename>/var/run/utmp</filename> - current login sessions
</para>
<variablelist>
<varlistentry>
<term><filename>/etc/porttime</filename></term>
<listitem>login and port permissions</listitem>
</varlistentry>
<varlistentry>
<term><filename>/var/run/utmp</filename></term>
<listitem>list of current login sessions</listitem>
</varlistentry>
</variablelist>
</refsect1>
<refsect1 id='author'>

View File

@@ -1,74 +0,0 @@
.\"$Id: mkpasswd.8,v 1.14 2005/04/12 17:55:55 kloczek Exp $
.\" Copyright 1991, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH MKPASSWD 8
.SH NAME
mkpasswd \- Update passwd and group database files
.SH SYNOPSIS
\fBmkpasswd\fR [\fB\-fvgps\fR] \fIfile\fR
.SH DESCRIPTION
\fBmkpasswd\fR reads the file in the format given by the flags and converts
it to the corresponding database file format. These database files are used
to improve access performance on systems with large numbers of users. The
output files will be named \fIfile\fR.dir and \fIfile\fR.pag.
.PP
The \fB\-f\fR option causes \fBmkpasswd\fR to ignore any existing output
files and overwrite them. Normally \fBmkpasswd\fR complains about existing
output files and quits.
.PP
The \fB\-v\fR option causes \fBmkpasswd\fR to output information about each
record as it is converted, with a final message at the very end.
.PP
The \fB\-g\fR option treats the input file as though it were in
\fI/etc/group\fR file format. When combined with the \fB\-s\fR option, the
\fI/etc/gshadow\fR file format is used instead.
.PP
The \fB\-p\fR option treats the input file as though it were in
\fI/etc/passwd\fR file format. This is the default. When combined with the
\fB\-s\fR option, the \fI/etc/shadow\fR file format is used instead.
.SH CAVEATS
The use of more than one database file is limited to systems which include
the NDBM database library and therefore may not be available on every
system.
.SH NOTE
Since most commands are capable of updating the database files as changes
are made, this command need only be used when re\-creating a deleted or
corrupted database file.
.SH FILES
\fI/etc/passwd\fR \- user account information
.br
\fI/etc/shadow\fR \- secure user account information
.br
\fI/etc/group\fR \- group account information
.br
\fI/etc/gshadow\fR \- shadow group information
.SH SEE ALSO
.BR group (5),
.BR passwd (5),
.BR shadow (5)
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)

View File

@@ -1,114 +0,0 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='mkpasswd8'>
<!-- $Id: mkpasswd.8.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
<refmeta>
<refentrytitle>mkpasswd</refentrytitle>
<manvolnum>8</manvolnum>
</refmeta>
<refnamediv id='name'>
<refname>mkpasswd</refname>
<refpurpose>Update passwd and group database files</refpurpose>
</refnamediv>
<refsynopsisdiv id='synopsis'>
<cmdsynopsis>
<command>mkpasswd</command>
<arg choice='opt'>-fvgps </arg>
<arg choice='plain'><replaceable>file</replaceable></arg>
</cmdsynopsis>
</refsynopsisdiv>
<refsect1 id='description'>
<title>DESCRIPTION</title>
<para>
<command>mkpasswd</command> reads the file in the format given by the
flags and converts it to the corresponding database file format. These
database files are used to improve access performance on systems with
large numbers of users. The output files will be named <emphasis
remap='I'>file</emphasis>.dir and <emphasis
remap='I'>file</emphasis>.pag.
</para>
<para>The <option>-f</option> option causes <command>mkpasswd</command>
to ignore any existing output files and overwrite them. Normally
<command>mkpasswd</command> complains about existing output files and
quits.
</para>
<para>The <option>-v</option> option causes <command>mkpasswd</command>
to output information about each record as it is converted, with a
final message at the very end.
</para>
<para>The <option>-g</option> option treats the input file as though it
were in <filename>/etc/group</filename> file format. When combined
with the <option>-s</option> option, the
<filename>/etc/gshadow</filename> file format is used instead.
</para>
<para>The <option>-p</option> option treats the input file as though it
were in <filename>/etc/passwd</filename> file format. This is the
default. When combined with the <option>-s</option> option, the
<filename>/etc/shadow</filename> file format is used instead.
</para>
</refsect1>
<refsect1 id='caveats'>
<title>CAVEATS</title>
<para>The use of more than one database file is limited to systems which
include the NDBM database library and therefore may not be available
on every system.
</para>
</refsect1>
<refsect1 id='note'>
<title>NOTE</title>
<para>Since most commands are capable of updating the database files as
changes are made, this command need only be used when re-creating a
deleted or corrupted database file.
</para>
</refsect1>
<refsect1 id='files'>
<title>FILES</title>
<varlistentry>
<term><filename>/etc/passwd</filename></term>
<listitem>user account information</listitem>
</varlistentry>
<varlistentry>
<term><filename>/etc/shadow</filename></term>
<listitem>secure user account information</listitem>
</varlistentry>
<varlistentry>
<term><filename>/etc/group</filename></term>
<listitem>group account information</listitem>
</varlistentry>
<varlistentry>
<term><filename>/etc/gshadow</filename></term>
<listitem>group account information</listitem>
</varlistentry>
</variablelist>
</refsect1>
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<refentrytitle>group</refentrytitle><manvolnum>5</manvolnum>
</citerefentry>,
<citerefentry>
<refentrytitle>passwd</refentrytitle><manvolnum>5</manvolnum>
</citerefentry>,
<citerefentry>
<refentrytitle>shadow</refentrytitle><manvolnum>5</manvolnum>
</citerefentry>
</para>
</refsect1>
<refsect1 id='author'>
<title>AUTHOR</title>
<para>Julianne Frances Haugh (jockgrrl@ix.netcom.com)</para>
</refsect1>
</refentry>

View File

@@ -1,61 +1,69 @@
.\"$Id: newusers.8,v 1.14 2005/04/02 16:10:24 kloczek Exp $
.\" Copyright 1991 - 1994, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH NEWUSERS 8
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "NEWUSERS" 8 "" "" ""
.SH NAME
newusers \- update and create new users in batch
.SH SYNOPSIS
.SH "SYNOPSIS"
.ad l
.hy 0
.HP 9
\fBnewusers\fR [\fInew_users\fR]
.SH DESCRIPTION
\fBnewusers\fR reads a file of user name and clear\-text password pairs and
uses this information to update a group of existing users or to create new
users. Each line is in the same format as the standard password file (see
\fBpasswd\fR(5)) with the following exceptions.
.IP "\fIpw_passwd\fR" 10
This field will be encrypted and used as the new value of the encrypted
password.
.IP "\fIpw_age\fR"
This field will be ignored for shadow passwords if the user already exists.
.IP "\fIpw_gid\fR"
This field may be the name of an existing group, in which case the named
user will be added as a member. If a non\-existent numerical group is given,
a new group will be created having this number.
.IP "\fIpw_dir\fR"
This field will be checked for existence as a directory and a new directory
with the same name will be created if it does not already exist. The
ownership of the directory will be set to be that of the user being created
or updated.
.ad
.hy
.SH "DESCRIPTION"
.PP
This command is intended to be used in a large system environment where many
accounts are updated at a single time.
.SH CAVEATS
The input file must be protected since it contains unencrypted passwords.
.SH SEE ALSO
.BR passwd (1),
.BR useradd (8)
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
\fBnewusers\fR reads a file of user name and clear\-text password pairs and uses this information to update a group of existing users or to create new users\&. Each line is in the same format as the standard password file (see \fBpasswd\fR(5)) with the following exceptions:
.TP
\fIpw_passwd\fR
This field will be encrypted and used as the new value of the encrypted password\&.
.TP
\fIpw_age\fR
This field will be ignored for shadow passwords if the user already exists\&.
.TP
\fIpw_gid\fR
This field may be the name of an existing group, in which case the named user will be added as a member\&. If a non\-existent numerical group is given, a new group will be created having this number\&.
.TP
\fIpw_dir\fR
This field will be checked for existence as a directory and a new directory with the same name will be created if it does not already exist\&. The ownership of the directory will be set to be that of the user being created or updated\&.
.PP
This command is intended to be used in a large system environment where many accounts are updated at a single time\&.
.SH "CAVEATS"
.PP
The input file must be protected since it contains unencrypted passwords\&.
.SH "SEE ALSO"
.PP
\fBpasswd\fR(1), \fBuseradd\fR(8)
.SH "AUTHOR"
.PP
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)

View File

@@ -2,33 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='newusers8'>
<!-- $Id: newusers.8.xml,v 1.4 2005/04/22 07:00:57 kloczek Exp $ -->
<!-- Copyright 1991 \- 1994, Julianne Frances Haugh -->
<!-- All rights reserved. -->
<!-- Redistribution and use in source and binary forms, with or without -->
<!-- modification, are permitted provided that the following conditions -->
<!-- are met: -->
<!-- 1. Redistributions of source code must retain the above copyright -->
<!-- notice, this list of conditions and the following disclaimer. -->
<!-- 2. Redistributions in binary form must reproduce the above copyright -->
<!-- notice, this list of conditions and the following disclaimer in the -->
<!-- documentation and/or other materials provided with the distribution. -->
<!-- 3. Neither the name of Julianne F. Haugh nor the names of its contributors -->
<!-- may be used to endorse or promote products derived from this software -->
<!-- without specific prior written permission. -->
<!-- THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND -->
<!-- ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE -->
<!-- IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE -->
<!-- ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE -->
<!-- FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL -->
<!-- DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS -->
<!-- OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) -->
<!-- HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT -->
<!-- LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY -->
<!-- OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF -->
<!-- SUCH DAMAGE. -->
<!-- $Id: newusers.8.xml,v 1.6 2005/06/16 17:37:58 kloczek Exp $ -->
<refmeta>
<refentrytitle>NEWUSERS</refentrytitle>
<manvolnum>8</manvolnum>
@@ -49,27 +23,22 @@
<refsect1 id='description'>
<title>DESCRIPTION</title>
<para>
<command>newusers</command> reads a file of user name and
clear-text password pairs and
uses this information to update a group of existing users or to
create new
users. Each line is in the same format as the standard password
file (see
<citerefentry>
<refentrytitle>passwd</refentrytitle><manvolnum>5</manvolnum>
</citerefentry>
)with the following exceptions.
<para><command>newusers</command> reads a file of user name and
clear-text password pairs and uses this information to update a group
of existing users or to create new users. Each line is in the same
format as the standard password file (see
<citerefentry><refentrytitle>passwd</refentrytitle><manvolnum>5</manvolnum>
</citerefentry>) with the following exceptions:
</para>
<variablelist remap='IP'>
<varlistentry>
<term>
<emphasis remap='I'>pw_passwd</emphasis>
</term>
<listitem>
<para>This field will be encrypted and used as the new
value of the encrypted
password.
<para>This field will be encrypted and used as the new value of
the encrypted password.
</para>
</listitem>
</varlistentry>
@@ -78,8 +47,8 @@
<emphasis remap='I'>pw_age</emphasis>
</term>
<listitem>
<para>This field will be ignored for shadow passwords if
the user already exists.
<para>This field will be ignored for shadow passwords if the user
already exists.
</para>
</listitem>
</varlistentry>
@@ -88,11 +57,10 @@
<emphasis remap='I'>pw_gid</emphasis>
</term>
<listitem>
<para>This field may be the name of an existing group, in
which case the named
user will be added as a member. If a non-existent
numerical group is given,
a new group will be created having this number.
<para>This field may be the name of an existing group, in which
case the named user will be added as a member. If a non-existent
numerical group is given, a new group will be created having
this number.
</para>
</listitem>
</varlistentry>
@@ -101,21 +69,17 @@
<emphasis remap='I'>pw_dir</emphasis>
</term>
<listitem>
<para>This field will be checked for existence as a
directory and a new directory
with the same name will be created if it does not
already exist. The
ownership of the directory will be set to be that of
the user being created
or updated.
<para>This field will be checked for existence as a directory and
a new directory with the same name will be created if it does
not already exist. The ownership of the directory will be set to
be that of the user being created or updated.
</para>
</listitem>
</varlistentry>
</variablelist>
<para>This command is intended to be used in a large system environment
where many
accounts are updated at a single time.
where many accounts are updated at a single time.
</para>
</refsect1>
@@ -128,11 +92,9 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>passwd</refentrytitle><manvolnum>1</manvolnum>
</citerefentry>
,
</citerefentry>,
<citerefentry>
<refentrytitle>useradd</refentrytitle><manvolnum>8</manvolnum>
</citerefentry>

View File

@@ -1,198 +1,188 @@
.\" $Id: passwd.1,v 1.25 2005/05/09 10:14:40 kloczek Exp $
.\" Copyright 1989 - 1994, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH PASSWD 1
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "PASSWD" 1 "" "" ""
.SH NAME
passwd \- change user password
.SH SYNOPSIS
\fBpasswd\fR [\fB\-f\fR|\fB\-s\fR] [\fIname\fR]
.br
\fBpasswd\fR [\fB\-g\fR] [\fB\-r\fR|\fB\-R\fR] \fIgroup\fR
.br
\fBpasswd\fR [\fB\-x\fR \fImax\fR] [\fB\-n\fR \fImin\fR]
[\fB\-w\fR \fIwarn\fR] [\fB\-i\fR \fIinact\fR] \fIlogin\fR
.br
\fBpasswd\fR {\fB\-l\fR|\fB\-u\fR|\fB\-d\fR|\fB\-S\fR|\fB\-e\fR} \fIlogin\fR
.SH DESCRIPTION
\fBpasswd\fR changes passwords for user and group accounts. A normal user
may only change the password for his/her own account, the super user may
change the password for any account. The administrator of a group may change
the password for the group. \fBpasswd\fR also changes account information,
such as the full name of the user, user's login shell, or password expiry
date and interval.
.SH "SYNOPSIS"
.ad l
.hy 0
.HP 7
\fBpasswd\fR [\fB\-f\fR | \fB\-s\fR] [\fIname\fR]
.ad
.hy
.ad l
.hy 0
.HP 7
\fBpasswd\fR [\-g] [\fB\-r\fR | \fB\-R\fR] \fIgroup\fR
.ad
.hy
.ad l
.hy 0
.HP 7
\fBpasswd\fR [\-x\ \fImax\fR] [\-n\ \fImin\fR] [\-w\ \fIwarn\fR] [\-i\ \fIinact\fR] \fIlogin\fR
.ad
.hy
.ad l
.hy 0
.HP 7
\fBpasswd\fR [\fB\-l\fR | \fB\-u\fR | \fB\-d\fR | \fB\-S\fR | \fB\-e\fR] \fIlogin\fR
.ad
.hy
.SH "DESCRIPTION"
.PP
The \fB\-s\fR option makes \fBpasswd\fR call \fBchsh\fR to change the user's
shell. The \fB\-f\fR option makes \fBpasswd\fR call \fBchfn\fR to change the user's
gecos information. These two options are only meant for compatiblity, since
the other programs can be called directly.
.SS Password Changes
The user is first prompted for his/her old password, if one is present. This
password is then encrypted and compared against the stored password. The
user has only one chance to enter the correct password. The super user is
permitted to bypass this step so that forgotten passwords may be changed.
\fBpasswd\fR changes passwords for user and group accounts\&. A normal user may only change the password for his/her own account, the super user may change the password for any account\&. The administrator of a group may change the password for the group\&. \fBpasswd\fR also changes account information, such as the full name of the user, user's login shell, or password expiry date and interval\&.
.PP
After the password has been entered, password aging information is checked
to see if the user is permitted to change the password at this time. If not,
\fBpasswd\fR refuses to change the password and exits.
The \fB\-s\fR option makes \fBpasswd\fR call \fBchsh\fR to change the user's shell\&. The \fB\-f\fR option makes \fBpasswd\fR call \fBchfn\fR to change the user's gecos information\&. These two options are only meant for compatibility, since the other programs can be called directly\&.
.SS "Password Changes"
.PP
The user is then prompted for a replacement password. This password is
tested for complexity. As a general guideline, passwords should consist of 6
to 8 characters including one or more from each of following sets:
.IP "" .5i
Lower case alphabetics
.IP "" .5i
Upper case alphabetics
.IP "" .5i
Digits 0 thru 9
.IP "" .5i
Punctuation marks
The user is first prompted for his/her old password, if one is present\&. This password is then encrypted and compared against the stored password\&. The user has only one chance to enter the correct password\&. The super user is permitted to bypass this step so that forgotten passwords may be changed\&.
.PP
Care must be taken not to include the system default erase or kill
characters. \fBpasswd\fR will reject any password which is not suitably
complex.
After the password has been entered, password aging information is checked to see if the user is permitted to change the password at this time\&. If not, \fBpasswd\fR refuses to change the password and exits\&.
.PP
If the password is accepted, \fBpasswd\fR will prompt again and compare the
second entry against the first. Both entries are required to match in order
for the password to be changed.
.SS Group passwords
When the \fB\-g\fR option is used, the password for the named group is
changed. The user must either be the super user, or a group administrator
for the named group. The current group password is not prompted for. The
\fB\-r\fR option is used with the \fB\-g\fR option to remove the current
password from the named group. This allows group access to all members. The
\fB\-R\fR option is used with the \fB\-g\fR option to restrict the named group
for all users.
.SS Password expiry information
The password aging information may be changed by the super user with the
\fB\-x\fR, \fB\-n\fR, \fB\-w\fR, and \fB\-i\fR options. The \fB\-x\fR option is
used to set the maximum number of days a password remains valid. After
\fImax\fR days, the password is required to be changed. The \fB\-n\fR option
is used to set the minimum number of days before a password may be changed.
The user will not be permitted to change the password until \fImin\fR days
have elapsed. The \fB\-w\fR option is used to set the number of days of
warning the user will receive before his/her password will expire. The
warning occurs \fIwarn\fR days before the expiration, telling the user how
many days remain until the password is set to expire. The \fB\-i\fR option is
used to disable an account after the password has been expired for a number
of days. After a user account has had an expired password for \fIinact\fR
days, the user may no longer sign on to the account.
The user is then prompted for a replacement password\&. This password is tested for complexity\&. As a general guideline, passwords should consist of 6 to 8 characters including one or more from each of following sets:
.TP 3
\(bu
lower case alphabetics
.TP
\(bu
digits 0 thru 9
.TP
\(bu
punctuation marks
.LP
.PP
If you wish to immediately expire an account's password, you can use the
\fB\-e\fR option. This in effect can force a user to change his/her password at
the user's next login. You can also use the \fB\-d\fR option to delete a user's
password (make it empty). Use caution with this option since it can make an
account not require a password at all to login, leaving your system open to
intruders.
.SS Account maintenance
User accounts may be locked and unlocked with the \fB\-l\fR and \fB\-u\fR
flags. The \fB\-l\fR option disables an account by changing the password to
a value which matches no possible encrypted value. The \fB\-u\fR option
re\-enables an account by changing the password back to its previous value.
Care must be taken not to include the system default erase or kill characters\&. \fBpasswd\fR will reject any password which is not suitably complex\&.
.PP
The account status may be viewed with the \fB-S\fR option.
The status information consists of 7 fields.
The first field is the user's login name.
The second field indicates if the user account is locked (L), has no
password (NP), or has a usable password (P).
The third field gives the date of the last password change.
The next four fields are the minimum age, maximum age, warning period,
and inactivity period for the password.
These ages are expressed in days.
See \fBPassword expiry information\fR above for a discussion of these fields.
.SS Hints for user passwords
The security of a password depends upon the strength of the
encryption algorithm and the size of the key space.
The \fB\s\-2UNIX\s+2\fR System encryption method is based on
the NBS DES algorithm and is very secure.
The size of the key space depends upon the randomness of the
password which is selected.
If the password is accepted, \fBpasswd\fR will prompt again and compare the second entry against the first\&. Both entries are required to match in order for the password to be changed\&.
.SS "Group passwords"
.PP
Compromises in password security normally result from careless
password selection or handling.
For this reason, you should not select a password which appears in
a dictionary or which must be written down.
The password should also not be a proper name, your license
number, birth date, or street address.
Any of these may be used as guesses to violate system security.
When the \fB\-g\fR option is used, the password for the named group is changed\&. The user must either be the super user, or a group administrator for the named group\&. The current group password is not prompted for\&. The \fB\-r\fR option is used with the \fB\-g\fR option to remove the current password from the named group\&. This allows group access to all members\&. The \fB\-R\fR option is used with the \fB\-g\fR option to restrict the named group for all users\&.
.SS "Password expiry information"
.PP
Your password must easily remembered so that you will not
be forced to write it on a piece of paper.
This can be accomplished by appending two small words together
and separating each with a special character or digit.
For example, Pass%word.
The password aging information may be changed by the super user with the \fB\-x\fR, \fB\-n\fR, \fB\-w\fR, and \fB\-i\fR options\&. The \fB\-x\fR option is used to set the maximum number of days a password remains valid\&. After \fImax\fR days, the password is required to be changed\&. The \fB\-n\fR option is used to set the minimum number of days before a password may be changed\&. The user will not be permitted to change the password until \fImin\fR days have elapsed\&. The \fB\-w\fR option is used to set the number of days of warning the user will receive before his/her password will expire\&. The warning occurs \fIwarn\fR days before the expiration, telling the user how many days remain until the password is set to expire\&. The \fB\-i\fR option is used to disable an account after the password has been expired for a number of days\&. After a user account has had an expired password for \fIinact\fR days, the user may no longer sign on to the account\&.
.PP
Other methods of construction involve selecting an easily
remembered phrase from literature and selecting the first
or last letter from each word.
An example of this is
.IP "" .5i
Ask not for whom the bell tolls.
If you wish to immediately expire an account's password, you can use the \fB\-e\fR option\&. This in effect can force a user to change his/her password at the user's next login\&. You can also use the \fB\-d\fR option to delete a user's password (make it empty)\&. Use caution with this option since it can make an account not require a password at all to login, leaving your system open to intruders\&.
.SS "Account maintenance"
.PP
User accounts may be locked and unlocked with the \fB\-l\fR and \fB\-u\fR flags\&. The \fB\-l\fR option disables an account by changing the password to a value which matches no possible encrypted value\&. The \fB\-u\fR option re\-enables an account by changing the password back to its previous value\&.
.PP
The account status may be viewed with the \fB\-S\fR option\&. The status information consists of 7 fields\&. The first field is the user's login name\&. The second field indicates if the user account is locked (L), has no password (NP), or has a usable password (P)\&. The third field gives the date of the last password change\&. The next four fields are the minimum age, maximum age, warning period, and inactivity period for the password\&. These ages are expressed in days\&. See \fIPassword expiry information\fR above for a discussion of these fields\&.
.SS "Hints for user passwords"
.PP
The security of a password depends upon the strength of the encryption algorithm and the size of the key space\&. The \fI\\s\-2UNIX\fR System encryption method is based on the NBS DES algorithm and is very secure\&. The size of the key space depends upon the randomness of the password which is selected\&.
.PP
Compromises in password security normally result from careless password selection or handling\&. For this reason, you should not select a password which appears in a dictionary or which must be written down\&. The password should also not be a proper name, your license number, birth date, or street address\&. Any of these may be used as guesses to violate system security\&.
.PP
Your password must easily remembered so that you will not be forced to write it on a piece of paper\&. This can be accomplished by appending two small words together and separating each with a special character or digit\&. For example, Pass%word\&.
.PP
Other methods of construction involve selecting an easily remembered phrase from literature and selecting the first or last letter from each word\&. An example of this is:
.TP 3
\(bu
Ask not for whom the bell tolls
.TP
\(bu
which produces
.IP "" .5i
An4wtbt.
.TP
\(bu
An4wtbt
.LP
.PP
You may be reasonably sure few crackers will have included this in their
dictionaries. You should, however, select your own methods for constructing
passwords and not rely exclusively on the methods given here.
.SS Notes about group passwords
Group passwords are an inherent security problem since more than one person
is permitted to know the password. However, groups are a useful tool for
permitting co\-operation between different users.
.SH CAVEATS
Not all options may be supported.
Password complexity checking may vary from site to site.
The user is urged to select a password as complex as he
feels comfortable with.
Users may not be able to change their password on a system if NIS
is enabled and they are not logged into the NIS server.
.SH FILES
\fI/etc/passwd\fR \- user account information
.br
\fI/etc/shadow\fR \- secure user account information
.SH EXIT VALUES
.TP 2
The \fBpasswd\fR command exits with the following values:
\fB0\fR \- success
.br
\fB1\fR \- permission denied
.br
\fB2\fR \- invalid combination of options
.br
\fB3\fR \- unexpected failure, nothing done
.br
\fB4\fR \- unexpected failure, passwd file missing
.br
\fB5\fR \- passwd file busy, try again later
.br
\fB6\fR \- invalid argument to option
You may be reasonably sure few crackers will have included this in their dictionaries\&. You should, however, select your own methods for constructing passwords and not rely exclusively on the methods given here\&.
.SS "Notes about group passwords"
.PP
Group passwords are an inherent security problem since more than one person is permitted to know the password\&. However, groups are a useful tool for permitting co\-operation between different users\&.
.SH "CAVEATS"
.PP
Not all options may be supported\&. Password complexity checking may vary from site to site\&. The user is urged to select a password as complex as he feels comfortable with\&. Users may not be able to change their password on a system if NIS is enabled and they are not logged into the NIS server\&.
.SH "FILES"
.TP
\fI/etc/passwd\fR
user account information
.TP
\fI/etc/shadow\fR
secure user account information
.SH "EXIT VALUES"
.PP
The \fBpasswd\fR command exits with the following values:
.TP
\fI0\fR
success
.TP
\fI1\fR
permission denied
.TP
\fI2\fR
invalid combination of options
.TP
\fI3\fR
unexpected failure, nothing done
.TP
\fI4\fR
unexpected failure, passwd file missing
.TP
\fI5\fR
passwd file busy, try again
.TP
\fI6\fR
invalid argument to option
.SH "SEE ALSO"
.BR group (5),
.BR passwd (5),
.BR shadow (5)
.SH AUTHOR
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
.PP
\fBgroup\fR(5), \fBpasswd\fR(5), \fBshadow\fR(5)
.SH "AUTHOR"
.PP
Julianne Frances Haugh <jockgrrl@ix\&.netcom\&.com>

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='passwd.1'>
<!-- $Id: passwd.1.xml,v 1.8 2005/05/09 10:14:39 kloczek Exp $ -->
<!-- $Id: passwd.1.xml,v 1.11 2005/06/20 08:47:36 kloczek Exp $ -->
<refmeta>
<refentrytitle>passwd</refentrytitle>
<manvolnum>1</manvolnum>
@@ -58,8 +58,7 @@
<refsect1 id='description'>
<title>DESCRIPTION</title>
<para>
<command>passwd</command> changes passwords for user and group
<para><command>passwd</command> changes passwords for user and group
accounts. A normal user may only change the password for his/her own
account, the super user may change the password for any account. The
administrator of a group may change the password for the group.
@@ -68,11 +67,12 @@
and interval.
</para>
<para>The <option>-s</option> option makes <command>passwd</command>
call <command>chsh</coamand> to change the user's shell. The
<para>
The <option>-s</option> option makes <command>passwd</command> call
<command>chsh</command> to change the user's shell. The
<option>-f</option> option makes <command>passwd</command> call
<command>chfn</command> to change the user's gecos information. These
two options are only meant for compatiblity, since the other programs
two options are only meant for compatibility, since the other programs
can be called directly.
</para>
@@ -97,13 +97,17 @@
of following sets:
</para>
<para>Lower case alphabetics</para>
<para>Upper case alphabetics</para>
<para>Digits 0 thru 9</para>
<para>Punctuation marks</para>
<itemizedlist mark='bullet'>
<listitem>
<para>lower case alphabetics</para>
</listitem>
<listitem>
<para>digits 0 thru 9</para>
</listitem>
<listitem>
<para>punctuation marks</para>
</listitem>
</itemizedlist>
<para>Care must be taken not to include the system default erase or
kill characters. <command>passwd</command> will reject any password
@@ -140,7 +144,7 @@
a password remains valid. After <emphasis remap='I'>max</emphasis>
days, the password is required to be changed. The
<option>-n</option> option is used to set the minimum number of days
before a password may be changed. The user will not be permitted to
before a password may be changed. The user will not be permitted to
change the password until <emphasis remap='I'>min</emphasis> days
have elapsed. The <option>-w</option> option is used to set the
number of days of warning the user will receive before his/her
@@ -179,7 +183,7 @@
user account is locked (L), has no password (NP), or has a usable
password (P). The third field gives the date of the last password
change. The next four fields are the minimum age, maximum age,
warning period, and inactivity period for the password. These ages
warning period, and inactivity period for the password. These ages
are expressed in days. See <emphasis remap='B'>Password expiry
information</emphasis> above for a discussion of these fields.
</para>
@@ -210,14 +214,20 @@
<para>Other methods of construction involve selecting an easily
remembered phrase from literature and selecting the first or last
letter from each word. An example of this is
letter from each word. An example of this is:
</para>
<para>Ask not for whom the bell tolls.</para>
<para>which produces</para>
<para>An4wtbt.</para>
<itemizedlist mark='bullet'>
<listitem>
<para>Ask not for whom the bell tolls</para>
</listitem>
<listitem>
<para>which produces</para>
</listitem>
<listitem>
<para>An4wtbt</para>
</listitem>
</itemizedlist>
<para>You may be reasonably sure few crackers will have included this
in their dictionaries. You should, however, select your own methods
@@ -261,38 +271,44 @@
<refsect1 id='exit_values'>
<title>EXIT VALUES</title>
<variablelist remap='TP'>
<varlistentry>
<term>
The <command>passwd</command> command exits with the
following values:
</term>
<listitem>
<para>
<literal>0</literal> - success
<!-- .br -->
<literal>1</literal> - permission denied
<!-- .br -->
<literal>2</literal> - invalid combination of options
<!-- .br -->
<literal>3</literal> - unexpected failure, nothing done
<!-- .br -->
<literal>4</literal> - unexpected failure, passwd file
missing
<!-- .br -->
<literal>5</literal> - passwd file busy, try again
later <!-- .br -->
<literal>6</literal> - invalid argument to option
</para>
</listitem>
</varlistentry>
</variablelist>
<para>
The <command>passwd</command> command exits with the following values:
<variablelist>
<varlistentry>
<term><replaceable>0</replaceable></term>
<listitem>success</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>1</replaceable></term>
<listitem>permission denied</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>2</replaceable></term>
<listitem>invalid combination of options</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>3</replaceable></term>
<listitem>unexpected failure, nothing done</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>4</replaceable></term>
<listitem>unexpected failure, passwd file missing</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>5</replaceable></term>
<listitem>passwd file busy, try again</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>6</replaceable></term>
<listitem>invalid argument to option</listitem>
</varlistentry>
</variablelist>
</para>
</refsect1>
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>group</refentrytitle><manvolnum>5</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -1,93 +1,77 @@
.\"$Id: passwd.5,v 1.15 2005/04/02 16:10:24 kloczek Exp $
.\" Copyright 1989 - 1990, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH PASSWD 5
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "PASSWD" 5 "" "" ""
.SH NAME
passwd \- The password file
.SH DESCRIPTION
\fI/etc/passwd\fR contains various pieces of information for each user
account. Included is:
.IP "" .5i
Login name
.IP "" .5i
Optional encrypted password
.IP "" .5i
Numerical user ID
.IP "" .5i
Numerical group ID
.IP "" .5i
User name or comment field
.IP "" .5i
User home directory
.IP "" .5i
User command interpreter
.SH "DESCRIPTION"
.PP
The password field may not be filled if shadow passwords have been enabled.
If shadow passwords are being used, the encrypted password will be found in
\fI/etc/shadow\fR. The encrypted password consists of characters from the
64 characters alphabet a thru z, A thru Z, 0 thru 9, \. and /. Optionally it
can start with a "$" character. This means the encrypted password was generated
using another (not DES) algorithm. For example if it starts with "$1$" it means
the MD5\-based algorithm was used.
\fI/etc/passwd\fR contains various pieces of information for each user account\&. Included is:
.TP 3
\(bu
login name
.TP
\(bu
optional encrypted password
.TP
\(bu
numerical user ID
.TP
\(bu
numerical group ID
.TP
\(bu
user name or comment field
.TP
\(bu
user home directory
.TP
\(bu
user command interpreter
.LP
.PP
Refer to \fBcrypt\fR(3) for details on how this string is interpreted.
The password field may not be filled if shadow passwords have been enabled\&. If shadow passwords are being used, the encrypted password will be found in \fI/etc/shadow\fR\&. The encrypted password consists of characters from the 64 characters alphabet a thru z, A thru Z, 0 thru 9, \\\&. and /\&. Optionally it can start with a "$" character\&. This means the encrypted password was generated using another (not DES) algorithm\&. For example if it starts with "$1$" it means the MD5\-based algorithm was used\&. Refer to \fBcrypt\fR(3) for details on how this string is interpreted\&.
.PP
The comment field is used by various system utilities, such as
\fBfinger\fR(1). Three additional values may be present in the comment
field.
They are:
.IP "" .5i
pri= \- set initial value of nice
.IP "" .5i
umask= \- set initial value of umask
.IP "" .5i
ulimit= \- set initial value of ulimit
The comment field is used by various system utilities, such as \fBfinger\fR(1)\&.
.PP
These fields are separated from each other and from any other comment field
by a comma.
The home directory field provides the name of the initial working directory\&. \fILogin\fR uses this information to set the value of the \fB$HOME\fR environmental variable\&.
.PP
The home directory field provides the name of the initial working directory.
\fBLogin\fR uses this information to set the value of
the \fBHOME\fR environmental variable.
The command interpreter field provides the name of the user's command language interpreter, or the name of the initial program to execute\&. \fILogin\fR uses this information to set the value of the \fB$SHELL\fR environmental variable\&. If this field is empty, it defaults to the value \fI/bin/sh\fR\&.
.SH "FILES"
.TP
\fI/etc/passwd\fR
user account information
.SH "SEE ALSO"
.PP
The command interpreter field provides the name of the user's command
language interpreter, or the name of the initial program to execute.
\fBLogin\fR uses this information to set the value of the
\fBSHELL\fR environmental variable.
If this field is empty, it defaults to the value \fB/bin/sh\fR.
.SH FILES
\fI/etc/passwd\fR \- user account information
.SH SEE ALSO
.BR login (1),
.BR passwd (1),
.BR su (1),
.BR shadow (5),
.BR pwconv (8),
.BR pwunconv (8),
.BR sulogin (8)
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
\fBlogin\fR(1), \fBpasswd\fR(1), \fBsu\fR(1), \fBshadow\fR(5), \fBpwconv\fR(8), \fBpwunconv\fR(8), \fBsulogin\fR(8)
.SH "AUTHOR"
.PP
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='passwd.5'>
<!-- $Id: passwd.5.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
<!-- $Id: passwd.5.xml,v 1.7 2005/06/16 17:59:21 kloczek Exp $ -->
<refmeta>
<refentrytitle>passwd</refentrytitle>
<manvolnum>5</manvolnum>
@@ -14,55 +14,50 @@
<refsect1 id='description'>
<title>DESCRIPTION</title>
<para>
<filename>/etc/passwd</filename> contains various pieces of
<para><filename>/etc/passwd</filename> contains various pieces of
information for each user account. Included is:
</para>
<para>Login name</para>
<para>Optional encrypted password</para>
<para>Numerical user ID</para>
<para>Numerical group ID</para>
<para>User name or comment field</para>
<para>User home directory</para>
<para>User command interpreter</para>
<para>The password field may not be filled if shadow passwords have been
<itemizedlist mark='bullet'>
<listitem>
<para>login name</para>
</listitem>
<listitem>
<para>optional encrypted password</para>
</listitem>
<listitem>
<para>numerical user ID</para>
</listitem>
<listitem>
<para>numerical group ID</para>
</listitem>
<listitem>
<para>user name or comment field</para>
</listitem>
<listitem>
<para>user home directory</para>
</listitem>
<listitem>
<para>user command interpreter</para>
</listitem>
</itemizedlist>
<para>
The password field may not be filled if shadow passwords have been
enabled. If shadow passwords are being used, the encrypted password
will be found in <filename>/etc/shadow</filename>. The encrypted
password consists of characters from the 64 characters alphabet a thru
z, A thru Z, 0 thru 9, \. and /. Optionally it can start with a "$"
character. This means the encrypted password was generated using
another (not DES) algorithm. For example if it starts with "$1$" it
means the MD5-based algorithm was used.
means the MD5-based algorithm was used. Refer to
<citerefentry><refentrytitle>crypt</refentrytitle>
<manvolnum>3</manvolnum></citerefentry> for details on how this string
is interpreted.
</para>
<para> Refer to <citerefentry>
<refentrytitle>crypt</refentrytitle><manvolnum>3</manvolnum>
</citerefentry> for details on how this string is interpreted.
</para>
<para>The comment field is used by various system utilities, such as
<citerefentry>
<refentrytitle>finger</refentrytitle><manvolnum>1</manvolnum>
</citerefentry>. Three additional values may be present in the comment
field. They are:
</para>
<para>pri= - set initial value of nice</para>
<para>umask= - set initial value of umask</para>
<para>ulimit= - set initial value of ulimit</para>
<para>These fields are separated from each other and from any other
comment field by a comma.
<citerefentry><refentrytitle>finger</refentrytitle>
<manvolnum>1</manvolnum></citerefentry>.
</para>
<para>The home directory field provides the name of the initial working
@@ -70,7 +65,8 @@
to set the value of the <envar>$HOME</envar> environmental variable.
</para>
<para>The command interpreter field provides the name of the user's
<para>
The command interpreter field provides the name of the user's
command language interpreter, or the name of the initial program to
execute. <emphasis remap='B'>Login</emphasis> uses this information
to set the value of the <envar>$SHELL</envar> environmental variable.
@@ -91,8 +87,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>login</refentrytitle><manvolnum>1</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -23,7 +23,6 @@ man_MANS = \
login.access.5 \
login.defs.5 \
logoutd.8 \
mkpasswd.8 \
newgrp.1 \
newusers.8 \
passwd.1 \

View File

@@ -38,11 +38,7 @@ host_triplet = @host@
subdir = man/pl
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
am__aclocal_m4_deps = $(top_srcdir)/configure.in
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
$(ACLOCAL_M4)
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
@@ -198,7 +194,6 @@ man_MANS = \
login.access.5 \
login.defs.5 \
logoutd.8 \
mkpasswd.8 \
newgrp.1 \
newusers.8 \
passwd.1 \
@@ -236,9 +231,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
exit 1;; \
esac; \
done; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/pl/Makefile'; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/pl/Makefile'; \
cd $(top_srcdir) && \
$(AUTOMAKE) --foreign man/pl/Makefile
$(AUTOMAKE) --gnu man/pl/Makefile
.PRECIOUS: Makefile
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
@case '$?' in \

View File

@@ -1,77 +0,0 @@
.\" $Id: mkpasswd.8,v 1.7 2005/04/05 18:47:51 kloczek Exp $
.\" Copyright 1991, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH MKPASSWD 8
.SH NAZWA
mkpasswd \- aktualizuj pliki baz passwd i group
.SH SK<EFBFBD>ADNIA
\fBmkpasswd\fR [\fB\-fvgps\fR] \fIplik\fR
.SH OPIS
.B mkpasswd
czyta plik w formacie okre<72>lonym przez flagi i konwertuje go postaci
odpowiedniego pliku bazy danych.
Wymienione pliki baz danych u<>ywane s<> do poprawienia wydajno<6E>ci dost<73>pu
w systemach o du<64>ej liczbie u<>ytkownik<69>w.
Pliki wynikowe otrzymaj<61> nazwy \fIplik\fR.dir i \fIplik\fR.pag.
.SH OPCJE
Opcja \fB\-f\fR powoduje, <20>e \fBmkpasswd\fR ignoruje istnienie plik<69>w
wynikowych i nadpisuje je.
Normalnie \fBmkpasswd\fR skar<61>y si<73> na istnienie plik<69>w wynikowych
i ko<6B>czy prac<61>.
.PP
Opcja \fB\-v\fR powoduje wy<77>wietlanie informacji o ka<6B>dym konwertowanym
rekordzie oraz komunikatu ko<6B>cowego.
.PP
Opcja \fB\-g\fR traktuje plik <20>r<EFBFBD>d<EFBFBD>owy tak, jak gdyby by<62> on w formacie
pliku \fI/etc/group\fR.
Przy po<70><6F>czeniu z opcj<63> \fB\-s\fR u<>ywany jest format pliku \fI/etc/gshadow\fR.
.PP
Opcja \fB\-p\fR traktuje plik <20>r<EFBFBD>d<EFBFBD>owy tak, jak gdyby by<62> on w formacie
pliku \fI/etc/passwd\fR.
Jest to opcja domy<6D>lna.
Przy po<70><6F>czeniu z opcj<63> \fB\-s\fR u<>ywany jest format pliku \fI/etc/shadow\fR.
.SH PRZESTROGI
U<EFBFBD>ycie wi<77>cej ni<6E> jednego pliku bazy ogranicza si<73> do system<65>w posiadaj<61>cych
bibliotek<EFBFBD> baz danych NDBM. Mo<4D>e zatem nie by<62> dost<73>pne w ka<6B>dym systemie.
.SH UWAGA
Poniewa<EFBFBD> wi<77>kszo<7A><6F> polece<63> jest w stanie aktualizowa<77> pliki bazy danych
podczas dokonywania zmian, \fBmkpasswd\fR potrzebne jest jedynie
do ponownego utworzenia usuni<6E>tego lub zepsutego pliku bazy.
.SH PLIKI
\fI/etc/passwd\fR \- informacja o kontach u<>ytkownik<69>w
.br
\fI/etc/shadow\fR \- chroniona informacja o u<>ytkownikach
.br
\fI/etc/group\fR \- informacja o grupach
.br
\fI/etc/gshadow\fR \- chroniona informacja o grupach
.SH ZOBACZ TAK<EFBFBD>E
.BR group (5),
.BR passwd (5),
.BR shadow (5)
.SH AUTOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)

View File

@@ -38,11 +38,7 @@ host_triplet = @host@
subdir = man/pt_BR
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
am__aclocal_m4_deps = $(top_srcdir)/configure.in
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
$(ACLOCAL_M4)
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
@@ -196,9 +192,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
exit 1;; \
esac; \
done; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/pt_BR/Makefile'; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/pt_BR/Makefile'; \
cd $(top_srcdir) && \
$(AUTOMAKE) --foreign man/pt_BR/Makefile
$(AUTOMAKE) --gnu man/pt_BR/Makefile
.PRECIOUS: Makefile
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
@case '$?' in \

View File

@@ -1,157 +1,106 @@
.\"$Id: pw_auth.3,v 1.10 2005/04/02 16:10:24 kloczek Exp $
.\" Copyright 1992 - 1993, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH PWAUTH 3
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "PW_AUTH" 3 "" "" ""
.SH NAME
pwauth \- administrator defined password authentication routines
.SH SYNTAX
.B #include <pwauth.h>
pw_auth \- administrator defined password authentication routines
.SH "SYNTAX"
.PP
.B int pw_auth (char
.I *command,
.B char
.I *user,
.B int
.I reason,
.B char
.IB *input) ;
.SH DESCRIPTION
.B pw_auth
invokes the administrator defined functions for a given user.
\fI#include <pwauth\&.h>\fR
.PP
\fIcommand\fR is the name of the authentication program.
It is retrieved from the user's password file information.
The string contains one or more executable file names, delimited by
semi\-colons.
Each program will be executed in the order given.
The command line arguments are given for each of the reasons listed
below.
\fIint pw_auth (char\fR \fI*command,\fR \fIchar\fR \fI*user,\fR \fIint\fR \fIreason,\fR \fIchar\fR \fI*input)\fR\fI;\fR
.SH "DESCRIPTION"
.PP
\fIuser\fR is the name of the user to be authenticated, as given
in the \fI/etc/passwd\fR file.
User entries are indexed by username.
This allows non\-unique user IDs to be present and for each different
username associated with that user ID to have a different
authentication program and information.
\fIpw_auth\fR invokes the administrator defined functions for a given user\&.
.PP
Each of the permissible authentication reasons is handled in a
potentially differenent manner.
Unless otherwise mentioned, the standard file descriptors 0, 1, and
2 are available for communicating with the user.
The real user ID may be used to determine the identity of the user
making the authentication request.
\fIreason\fR is one of
.IP \fBPW_SU\fR 1i
Perform authentication for the current real user ID attempting to
switch real user ID to the named user.
The authentication program will be invoked with a \fB\-s\fR option, followed
by the username.
.IP \fBPW_LOGIN\fR 1i
Perform authentication for the named user creating a new login session.
The authentication program will be invoked with a \fB\-l\fR option, followed
by the username.
.IP \fBPW_ADD\fR 1i
Create a new entry for the named user.
This allows an authentication program to initialize storage for a new
user.
The authentication program will be invoked with a \fB\-a\fR option, followed
by the username.
.IP \fBPW_CHANGE\fR 1i
Alter an existing entry for the named user.
This allows an authentication program to alter the authentication
information for an existing user.
The authentication program will be invoked with a \fB\-c\fR option, followed
by the username.
.IP \fBPW_DELETE\fR 1i
Delete authentication information for the named user.
This allows an authentication program to reclaim storage for a user which
is no longer authenticated using the authentication program.
The authentication program will be invoked with a \fB\-d\fR option, followed
by the username.
.IP \fBPW_TELNET\fR 1i
Authenticate a user who is connecting to the system using the
\fBtelnet\fR command.
The authentication program will be invoked with a \fB\-t\fR option, followed
by the username.
.IP \fBPW_RLOGIN\fR 1i
Authenticate a user who is connecting to the system using the \fBrlogin\fR
command.
The authentication program will be invoked with a \fB\-r\fR option, followed
by the username.
.IP \fBPW_FTP\fR 1i
Authenticate a user who is connecting to the system using the \fBftp\fR
command.
The authentication program will be invoked with a \fB\-f\fR option, followed
by the username.
The standard file descriptors are not available for communicating with the
user.
The standard input file descriptor will be connected to the parent process,
while the other two output file descriptors will be connected to
\fI/dev/null\fR.
The \fBpw_auth\fR function will pipe a single line of data to the
authentication program using file descriptor 0.
.IP \fBPW_REXEC\fR 1i
Authenticate a user who is connecting to the system using the \fIrexec\fR
command.
The authentication program will be invoked with a \fB\-x\fR option, followed
by the username.
The standard file descriptors are not available for communicating with the
remote user.
The standard input file descriptor will be connected to the parent process,
while the other two output file descriptors will be connected to
\fI/dev/null\fR.
The \fBpw_auth\fR function will pipe a single line of data to the
authentication program using file descriptor 0.
\fIcommand\fR is the name of the authentication program\&. It is retrieved from the user's password file information\&. The string contains one or more executable file names, delimited by semi\-colons\&. Each program will be executed in the order given\&. The command line arguments are given for each of the reasons listed below\&.
.PP
The last argument is the authentication data which is used by the
.B PW_FTP
and
.B PW_REXEC
reasons.
It is treated as a single line of text which is piped to the authentication
program.
When the reason is
.BR PW_CHANGE,
the value of \fIinput\fR is the value of
previous user name if the user name is being changed.
.SH CAVEATS
This function does not create the actual session.
It only indicates if the user should be allowed to create the session.
\fIuser\fR is the name of the user to be authenticated, as given in the \fI/etc/passwd\fR file\&. User entries are indexed by username\&. This allows non\-unique user IDs to be present and for each different username associated with that user ID to have a different authentication program and information\&.
.PP
The network options are untested at this time.
.SH DIAGNOSTICS
The \fBpw_auth\fR function returns 0 if the authentication program exited
with a 0 exit code, and a non\-zero value otherwise.
.SH SEE ALSO
.BR login (1),
.BR passwd (1),
.BR su (1),
.BR useradd (8),
.BR userdel (8),
.BR usermod (8)
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
Each of the permissible authentication reasons is handled in a potentially differenent manner\&. Unless otherwise mentioned, the standard file descriptors 0, 1, and 2 are available for communicating with the user\&. The real user ID may be used to determine the identity of the user making the authentication request\&. \fIreason\fR is one of:
.TP
\fIPW_SU\fR
Perform authentication for the current real user ID attempting to switch real user ID to the named user\&. The authentication program will be invoked with a \fB\-s\fR option, followed by the username\&.
.TP
\fIPW_LOGIN\fR
Perform authentication for the named user creating a new login session\&. The authentication program will be invoked with a \fB\-l\fR option, followed by the username\&.
.TP
\fIPW_ADD\fR
Create a new entry for the named user\&. This allows an authentication program to initialize storage for a new user\&. The authentication program will be invoked with a \fB\-a\fR option, followed by the username\&.
.TP
\fIPW_CHANGE\fR
Alter an existing entry for the named user\&. This allows an authentication program to alter the authentication information for an existing user\&. The authentication program will be invoked with a \fB\-c\fR option, followed by the username\&.
.TP
\fIPW_DELETE\fR
Delete authentication information for the named user\&. This allows an authentication program to reclaim storage for a user which is no longer authenticated using the authentication program\&. The authentication program will be invoked with a \fB\-d\fR option, followed by the username\&.
.TP
\fIPW_TELNET\fR
Authenticate a user who is connecting to the system using the \fItelnet\fR command\&. The authentication program will be invoked with a \fB\-t\fR option, followed by the username\&.
.TP
\fIPW_RLOGIN\fR
Authenticate a user who is connecting to the system using the \fIrlogin\fR command\&. The authentication program will be invoked with a \fB\-r\fR option, followed by the username\&.
.TP
\fIPW_FTP\fR
Authenticate a user who is connecting to the system using the \fIftp\fR command\&. The authentication program will be invoked with a \fB\-f\fR option, followed by the username\&. The standard file descriptors are not available for communicating with the user\&. The standard input file descriptor will be connected to the parent process, while the other two output file descriptors will be connected to \fI/dev/null\fR\&. The \fIpw_auth\fR function will pipe a single line of data to the authentication program using file descriptor 0\&.
.TP
\fIPW_REXEC\fR
Authenticate a user who is connecting to the system using the \fIrexec\fR command\&. The authentication program will be invoked with a \fB\-x\fR option, followed by the username\&. The standard file descriptors are not available for communicating with the remote user\&. The standard input file descriptor will be connected to the parent process, while the other two output file descriptors will be connected to \fI/dev/null\fR\&. The \fIpw_auth\fR function will pipe a single line of data to the authentication program using file descriptor 0\&.
.PP
The last argument is the authentication data which is used by the \fIPW_FTP\fR and \fIPW_REXEC\fR reasons\&. It is treated as a single line of text which is piped to the authentication program\&. When the reason is \fIPW_CHANGE,\fR the value of \fIinput\fR is the value of previous user name if the user name is being changed\&.
.SH "CAVEATS"
.PP
This function does not create the actual session\&. It only indicates if the user should be allowed to create the session\&.
.PP
The network options are untested at this time\&.
.SH "DIAGNOSTICS"
.PP
The \fIpw_auth\fR function returns 0 if the authentication program exited with a 0 exit code, and a non\-zero value otherwise\&.
.SH "SEE ALSO"
.PP
\fBlogin\fR(1), \fBpasswd\fR(1), \fBsu\fR(1), \fBuseradd\fR(8), \fBuserdel\fR(8), \fBusermod\fR(8)
.SH "AUTHOR"
.PP
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)

View File

@@ -2,24 +2,22 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='pw_auth.3'>
<!-- $Id: pw_auth.3.xml,v 1.5 2005/04/27 15:43:25 kloczek Exp $ -->
<!-- $Id: pw_auth.3.xml,v 1.10 2005/06/20 09:00:06 kloczek Exp $ -->
<refmeta>
<refentrytitle>pw_auth</refentrytitle>
<manvolnum>3</manvolnum>
</refmeta>
<refnamediv id='name'>
<refname>pwauth</refname>
<refname>pw_auth</refname>
<refpurpose>administrator defined password authentication routines</refpurpose>
</refnamediv>
<refsect1 id='syntax'>
<title>SYNTAX</title>
<para>
<emphasis remap='B'>#include &lt;pwauth.h&gt;</emphasis>
<para><emphasis remap='B'>#include &lt;pwauth.h&gt;</emphasis>
</para>
<para>
<emphasis remap='B'>int pw_auth (char</emphasis>
<para><emphasis remap='B'>int pw_auth (char</emphasis>
<emphasis remap='I'>*command,</emphasis>
<emphasis remap='B'>char</emphasis>
<emphasis remap='I'>*user,</emphasis>
@@ -32,8 +30,7 @@
<refsect1 id='description'>
<title>DESCRIPTION</title>
<para>
<emphasis remap='B'>pw_auth</emphasis>
<para><emphasis remap='B'>pw_auth</emphasis>
invokes the administrator defined functions for a given user.
</para>
@@ -45,7 +42,7 @@
listed below.
</para>
<para> <emphasis remap='I'>user</emphasis> is the name of the user to be
<para><emphasis remap='I'>user</emphasis> is the name of the user to be
authenticated, as given in the <filename>/etc/passwd</filename> file.
User entries are indexed by username. This allows non-unique user IDs
to be present and for each different username associated with that
@@ -53,11 +50,11 @@
</para>
<para>Each of the permissible authentication reasons is handled in a
potentially differenent manner. Unless otherwise mentioned, the
potentially differenent manner. Unless otherwise mentioned, the
standard file descriptors 0, 1, and 2 are available for communicating
with the user. The real user ID may be used to determine the identity
with the user. The real user ID may be used to determine the identity
of the user making the authentication request. <emphasis
remap='I'>reason</emphasis> is one of
remap='I'>reason</emphasis> is one of:
</para>
<variablelist remap='IP'>
<varlistentry>
@@ -66,7 +63,7 @@
</term>
<listitem>
<para>Perform authentication for the current real user ID
attempting to switch real user ID to the named user. The
attempting to switch real user ID to the named user. The
authentication program will be invoked with a
<option>-s</option> option, followed by the username.
</para>
@@ -88,7 +85,7 @@
<emphasis remap='B'>PW_ADD</emphasis>
</term>
<listitem>
<para>Create a new entry for the named user. This allows an
<para>Create a new entry for the named user. This allows an
authentication program to initialize storage for a new user. The
authentication program will be invoked with a
<option>-a</option> option, followed by the username.
@@ -197,7 +194,7 @@
<refsect1 id='caveats'>
<title>CAVEATS</title>
<para>This function does not create the actual session. It only
<para>This function does not create the actual session. It only
indicates if the user should be allowed to create the session.
</para>
@@ -215,8 +212,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>login</refentrytitle><manvolnum>1</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -1,104 +1,114 @@
.\"$Id: pwck.8,v 1.18 2005/04/12 17:55:55 kloczek Exp $
.\" Copyright 1992, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH PWCK 8
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "PWCK" 8 "" "" ""
.SH NAME
pwck \- verify integrity of password files
.SH SYNOPSIS
\fBpwck\fR [\fB\-sr\fR] [\fIpasswd\fR \fIshadow\fR]
.SH DESCRIPTION
\fBpwck\fR verifies the integrity of the system authentication information.
All entries in the \fI/etc/passwd\fR and \fI/etc/shadow\fR are checked to
see that the entry has the proper format and valid data in each field.
The user is prompted to delete entries that are improperly formatted or
which have other uncorrectable errors.
.P
Checks are made to verify that each entry has
.sp
.in +.5i
\- the correct number of fields
.br
\- a unique user name
.br
\- a valid user and group identifier
.br
\- a valid primary group
.br
\- a valid home directory
.br
\- a valid login shell
.in \-.5i
.sp
.SH "SYNOPSIS"
.ad l
.hy 0
.HP 5
\fBpwck\fR [\-sr] [\fIpasswd\fR\ \fIshadow\fR]
.ad
.hy
.SH "DESCRIPTION"
.PP
The checks for correct number of fields and unique user name are fatal. If
the entry has the wrong number of fields, the user will be prompted to
delete the entire line. If the user does not answer affirmatively, all
further checks are bypassed. An entry with a duplicated user name is
prompted for deletion, but the remaining checks will still be made. All
other errors are warning and the user is encouraged to run the
\fBusermod\fR command to correct the error.
\fBpwck\fR verifies the integrity of the system authentication information\&. All entries in the \fI/etc/passwd\fR and \fI/etc/shadow\fR are checked to see that the entry has the proper format and valid data in each field\&. The user is prompted to delete entries that are improperly formatted or which have other uncorrectable errors\&.
.PP
The commands which operate on the \fI/etc/passwd\fR file are not able to
alter corrupted or duplicated entries.
\fBpwck\fR should be used in those circumstances to remove the offending
entry.
.SH OPTIONS
By default, \fBpwck\fR operates on the files \fI/etc/passwd\fR and
\fI/etc/shadow\fR. The user may select alternate files with the \fIpasswd\fR
and \fIshadow\fR parameters. Additionally, the user may execute the command
in read\-only mode by specifying the \fB\-r\fR flag. This causes all questions
regarding changes to be answered \fBno\fR without user intervention.
\fBpwck\fR can also sort entries in \fI/etc/passwd\fR and \fI/etc/shadow\fR
by UID. To run it in sort mode pass it \fB\-s\fR flag. No checks are
performed then, it just sorts.
.SH FILES
\fI/etc/passwd\fR \- user account information
.br
\fI/etc/shadow\fR \- secure user account information
.br
\fI/etc/group\fR \- group account information
.SH SEE ALSO
.BR group (5),
.BR passwd (5),
.BR shadow (5),
.BR usermod (8)
.SH EXIT VALUES
.TP 2
The \fBpwck\fR command exits with the following values:
\fB0\fR \- success
.br
\fB1\fR \- invalid command syntax
.br
\fB2\fR \- one or more bad password entries
.br
\fB3\fR \- can't open password files
.br
\fB4\fR \- can't lock password files
.br
\fB5\fR \- can't update password files
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
Checks are made to verify that each entry has:
.TP 3
\(bu
the correct number of fields
.TP
\(bu
a unique user name
.TP
\(bu
a valid user and group identifier
.TP
\(bu
a valid primary group
.TP
\(bu
a valid home directory
.TP
\(bu
a valid login shell
.LP
.PP
The checks for correct number of fields and unique user name are fatal\&. If the entry has the wrong number of fields, the user will be prompted to delete the entire line\&. If the user does not answer affirmatively, all further checks are bypassed\&. An entry with a duplicated user name is prompted for deletion, but the remaining checks will still be made\&. All other errors are warning and the user is encouraged to run the \fBusermod\fR command to correct the error\&.
.PP
The commands which operate on the \fI/etc/passwd\fR file are not able to alter corrupted or duplicated entries\&. \fBpwck\fR should be used in those circumstances to remove the offending entry\&.
.SH "OPTIONS"
.PP
By default, \fBpwck\fR operates on the files \fI/etc/passwd\fR and \fI/etc/shadow\fR\&. The user may select alternate files with the \fIpasswd\fR and \fIshadow\fR parameters\&. Additionally, the user may execute the command in read\-only mode by specifying the \fB\-r\fR flag\&. This causes all questions regarding changes to be answered \fIno\fR without user intervention\&. \fBpwck\fR can also sort entries in \fI/etc/passwd\fR and \fI/etc/shadow\fR by UID\&. To run it in sort mode pass it \fB\-s\fR flag\&. No checks are performed then, it just sorts\&.
.SH "FILES"
.TP
\fI/etc/group\fR
group account information
.TP
\fI/etc/passwd\fR
user account information
.TP
\fI/etc/shadow\fR
secure user account information
.SH "SEE ALSO"
.PP
\fBgroup\fR(5), \fBpasswd\fR(5), \fBshadow\fR(5), \fBusermod\fR(8)
.SH "EXIT VALUES"
.PP
The \fBpwck\fR command exits with the following values:
.TP
\fI0\fR
success
.TP
\fI1\fR
invalid command syntax
.TP
\fI2\fR
one or more bad password entries
.TP
\fI3\fR
can't open password files
.TP
\fI4\fR
can't lock password files
.TP
\fI5\fR
can't update password files
.SH "AUTHOR"
.PP
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='pwck.8'>
<!-- $Id: pwck.8.xml,v 1.6 2005/04/27 18:20:35 kloczek Exp $ -->
<!-- $Id: pwck.8.xml,v 1.8 2005/06/16 20:09:08 kloczek Exp $ -->
<refmeta>
<refentrytitle>pwck</refentrytitle>
<manvolnum>8</manvolnum>
@@ -14,7 +14,8 @@
<!-- body begins here -->
<refsynopsisdiv id='synopsis'>
<cmdsynopsis>
<command>pwck</command> <arg choice='opt'>-sr </arg>
<command>pwck</command>
<arg choice='opt'>-sr </arg>
<arg choice='opt'>
<arg choice='plain'>
<replaceable>passwd</replaceable>
@@ -28,31 +29,35 @@
<refsect1 id='description'>
<title>DESCRIPTION</title>
<para>
<command>pwck</command> verifies the integrity of the system
authentication information. All entries in the
<para><command>pwck</command> verifies the integrity of the system
authentication information. All entries in the
<filename>/etc/passwd</filename> and <filename>/etc/shadow</filename>
are checked to see that the entry has the proper format and valid data
in each field. The user is prompted to delete entries that are
in each field. The user is prompted to delete entries that are
improperly formatted or which have other uncorrectable errors.
</para>
<para>Checks are made to verify that each entry has</para>
<!-- .in +.5i -->
<para>- the correct number of fields
<!-- .br -->
- a unique user name
<!-- .br -->
- a valid user and group identifier
<!-- .br -->
- a valid primary group
<!-- .br -->
- a valid home directory
<!-- .br -->
- a valid login shell
</para>
<!-- .in \-.5i -->
<para>Checks are made to verify that each entry has:</para>
<itemizedlist mark='bullet'>
<listitem>
<para>the correct number of fields</para>
</listitem>
<listitem>
<para>a unique user name</para>
</listitem>
<listitem>
<para>a valid user and group identifier</para>
</listitem>
<listitem>
<para>a valid primary group</para>
</listitem>
<listitem>
<para> a valid home directory</para>
</listitem>
<listitem>
<para>a valid login shell</para>
</listitem>
</itemizedlist>
<para>The checks for correct number of fields and unique user name are
fatal. If the entry has the wrong number of fields, the user will be
@@ -60,7 +65,7 @@
affirmatively, all further checks are bypassed. An entry with a
duplicated user name is prompted for deletion, but the remaining
checks will still be made. All other errors are warning and the user
is encouraged to run the <command>usermod</coamand> command to correct
is encouraged to run the <command>usermod</command> command to correct
the error.
</para>
@@ -109,8 +114,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>group</refentrytitle><manvolnum>5</manvolnum>
</citerefentry>,
<citerefentry>
@@ -127,29 +131,35 @@
<refsect1 id='exit_values'>
<title>EXIT VALUES</title>
<variablelist remap='TP'>
<varlistentry>
<term>
The <command>pwck</command> command exits with the
following values:
</term>
<listitem>
<para>
<literal>0</literal> - success
<!-- .br -->
<literal>1</literal> - invalid command syntax
<!-- .br -->
<literal>2</literal> - one or more bad password entries
<!-- .br -->
<literal>3</literal> - can't open password files
<!-- .br -->
<literal>4</literal> - can't lock password files
<!-- .br -->
<literal>5</literal> - can't update password files
</para>
</listitem>
</varlistentry>
</variablelist>
<para>
The <command>pwck</command> command exits with the following values:
<variablelist>
<varlistentry>
<term><replaceable>0</replaceable></term>
<listitem>success</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>1</replaceable></term>
<listitem>invalid command syntax</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>2</replaceable></term>
<listitem>one or more bad password entries</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>3</replaceable></term>
<listitem>can't open password files</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>4</replaceable></term>
<listitem>can't lock password files</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>5</replaceable></term>
<listitem>can't update password files</listitem>
</varlistentry>
</variablelist>
</para>
</refsect1>
<refsect1 id='author'>

View File

@@ -1,56 +1,84 @@
.\"$Id: pwconv.8,v 1.17 2005/05/19 10:34:59 kloczek Exp $
.TH PWCONV 8 "26 Sep 1997"
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "PWCONV" 8 "26 Sep 1997" "" ""
.SH NAME
pwconv, pwunconv, grpconv, grpunconv \- convert to and from shadow passwords and groups.
.SH SYNOPSIS
.SH "SYNOPSIS"
.ad l
.hy 0
.HP 7
\fBpwconv\fR
.br
.ad
.hy
.ad l
.hy 0
.HP 9
\fBpwunconv\fR
.br
.ad
.hy
.ad l
.hy 0
.HP 8
\fBgrpconv\fR
.br
.ad
.hy
.ad l
.hy 0
.HP 10
\fBgrpunconv\fR
.SH DESCRIPTION
\fBpwconv\fR creates \fIshadow\fR from \fIpasswd\fR and an optionally existing
\fIshadow\fR.
.ad
.hy
.SH "DESCRIPTION"
.PP
\fBpwunconv\fR creates \fIpasswd\fR from \fIpasswd\fR and \fIshadow\fR and then
removes \fIshadow\fR.
\fBpwconv\fR creates \fIshadow\fR from \fIpasswd\fR and an optionally existing \fIshadow\fR\&.
.PP
\fBgrpconv\fR creates \fIgshadow\fR from \fIgroup\fR and an optionally existing
\fIgshadow\fR.
\fBpwunconv\fR creates \fIpasswd\fR from \fIpasswd\fR and \fIshadow\fR and then removes \fIshadow\fR\&.
.PP
\fBgrpunconv\fR creates \fIgroup\fR from \fIgroup\fR and \fIgshadow\fR and then
removes \fIgshadow\fR.
\fBgrpconv\fR creates \fIgshadow\fR from \fIgroup\fR and an optionally existing \fIgshadow\fR\&.
.PP
These four programs all operate on the normal and shadow password and group
files: \fI/etc/passwd\fR, \fI/etc/group\fR, \fI/etc/shadow\fR, and
\fI/etc/gshadow\fR.
\fBgrpunconv\fR creates \fIgroup\fR from \fIgroup\fR and \fIgshadow\fR and then removes \fIgshadow\fR\&.
.PP
.PP
Each program acquires the necessary locks before conversion. \fBpwconv\fR and
\fBgrpconv\fR are similar. First, entries in the shadowed file which don't
exist in the main file are removed. Then, shadowed entries which don't have
`x' as the password in the main file are updated. Any missing shadowed
entries are added. Finally, passwords in the main file are replaced with
`x'. These programs can be used for initial conversion as well to update the
shadowed file if the main file is edited by hand.
These four programs all operate on the normal and shadow password and group files: \fI/etc/passwd\fR, \fI/etc/group\fR, \fI/etc/shadow\fR, and \fI/etc/gshadow\fR\&.
.PP
\fBpwconv\fR will use the values of \fIPASS_MIN_DAYS\fR, \fIPASS_MAX_DAYS\fR,
and \fIPASS_WARN_AGE\fR from \fI/etc/login.defs\fR when adding new entries
to \fI/etc/shadow\fR.
Each program acquires the necessary locks before conversion\&. \fBpwconv\fR and \fBgrpconv\fR are similar\&. First, entries in the shadowed file which don't exist in the main file are removed\&. Then, shadowed entries which don't have `x' as the password in the main file are updated\&. Any missing shadowed entries are added\&. Finally, passwords in the main file are replaced with `x'\&. These programs can be used for initial conversion as well to update the shadowed file if the main file is edited by hand\&.
.PP
Likewise \fBpwunconv\fR and \fBgrpunconv\fR are similar. Passwords in the
main file are updated from the shadowed file. Entries which exist in the
main file but not in the shadowed file are left alone. Finally, the shadowed
file is removed. Some password aging information is lost by \fBpwunconv\fR.
It will convert what it can.
\fBpwconv\fR will use the values of \fIPASS_MIN_DAYS\fR, \fIPASS_MAX_DAYS\fR, and \fIPASS_WARN_AGE\fR from \fI/etc/login\&.defs\fR when adding new entries to \fI/etc/shadow\fR\&.
.PP
Likewise \fBpwunconv\fR and \fBgrpunconv\fR are similar\&. Passwords in the main file are updated from the shadowed file\&. Entries which exist in the main file but not in the shadowed file are left alone\&. Finally, the shadowed file is removed\&. Some password aging information is lost by \fBpwunconv\fR\&. It will convert what it can\&.
.SH "BUGS"
Errors in the password or group files (such as invalid or duplicate entries)
may cause these programs to loop forever or fail in other strange ways.
Please run \fBpwck\fR and \fBgrpck\fR to correct any such errors before
converting to or from shadow passwords or groups.
.PP
Errors in the password or group files (such as invalid or duplicate entries) may cause these programs to loop forever or fail in other strange ways\&. Please run \fBpwck\fR and \fBgrpck\fR to correct any such errors before converting to or from shadow passwords or groups\&.
.SH "SEE ALSO"
.BR login.defs (5),
.BR grpck (8),
.BR pwck (8)
.PP
\fBlogin\&.defs\fR(5), \fBgrpck\fR(8), \fBpwck\fR(8)

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='pwconv.8'>
<!-- $Id: pwconv.8.xml,v 1.6 2005/05/19 10:35:00 kloczek Exp $ -->
<!-- $Id: pwconv.8.xml,v 1.7 2005/06/15 12:39:27 kloczek Exp $ -->
<refentryinfo>
<date>26 Sep 1997</date>
</refentryinfo>
@@ -87,7 +87,7 @@
are updated from the shadowed file. Entries which exist in the main
file but not in the shadowed file are left alone. Finally, the
shadowed file is removed. Some password aging information is lost by
<command>pwunconv</command>. It will convert what it can.
<command>pwunconv</command>. It will convert what it can.
</para>
</refsect1>
@@ -95,7 +95,7 @@
<title>BUGS</title>
<para>Errors in the password or group files (such as invalid or
duplicate entries) may cause these programs to loop forever or fail in
other strange ways. Please run <command>pwck</command> and
other strange ways. Please run <command>pwck</command> and
<command>grpck</command> to correct any such errors before converting
to or from shadow passwords or groups.
</para>
@@ -103,8 +103,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>login.defs</refentrytitle><manvolnum>5</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -38,11 +38,7 @@ host_triplet = @host@
subdir = man/ru
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
am__aclocal_m4_deps = $(top_srcdir)/configure.in
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
$(ACLOCAL_M4)
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
@@ -189,9 +185,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
exit 1;; \
esac; \
done; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/ru/Makefile'; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/ru/Makefile'; \
cd $(top_srcdir) && \
$(AUTOMAKE) --foreign man/ru/Makefile
$(AUTOMAKE) --gnu man/ru/Makefile
.PRECIOUS: Makefile
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
@case '$?' in \

View File

@@ -1,140 +1,142 @@
.\" $Id: shadow.3,v 1.13 2005/04/12 16:31:06 kloczek Exp $
.\" Copyright 1989 - 1993, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH SHADOW 3
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "SHADOW" 3 "" "" ""
.SH NAME
shadow \- encrypted password file routines
.SH SYNTAX
.B #include <shadow.h>
.SH "SYNTAX"
.PP
.B struct spwd *getspent();
\fI#include <shadow\&.h>\fR
.PP
.B struct spwd *getspnam(char
.IB *name );
\fIstruct spwd *getspent();\fR
.PP
.B void setspent();
\fIstruct spwd *getspnam(char\fR \fI*name\fR\fI);\fR
.PP
.B void endspent();
\fIvoid setspent();\fR
.PP
.B struct spwd *fgetspent(FILE
.IB *fp );
\fIvoid endspent();\fR
.PP
.B struct spwd *sgetspent(char
.IB *cp );
\fIstruct spwd *fgetspent(FILE\fR \fI*fp\fR\fI);\fR
.PP
.B int putspent(struct spwd
.I *p,
.B FILE
.IB *fp );
\fIstruct spwd *sgetspent(char\fR \fI*cp\fR\fI);\fR
.PP
.B int lckpwdf();
\fIint putspent(struct spwd\fR \fI*p,\fR \fIFILE\fR \fI*fp\fR\fI);\fR
.PP
.B int ulckpwdf();
.SH DESCRIPTION
.I shadow
manipulates the contents of the shadow password file,
\fI/etc/shadow\fR.
The structure in the \fI#include\fR file is
.sp
\fIint lckpwdf();\fR
.PP
\fIint ulckpwdf();\fR
.SH "DESCRIPTION"
.PP
\fIshadow\fR manipulates the contents of the shadow password file, \fI/etc/shadow\fR\&. The structure in the \fI#include\fR file is:
.nf
struct spwd {
.in +.5i
.br
char *sp_namp; /* user login name */
.br
char *sp_pwdp; /* encrypted password */
.br
long int sp_lstchg; /* last password change */
.br
long int sp_min; /* days until change allowed. */
.br
long int sp_max; /* days before change required */
.br
long int sp_warn; /* days warning for expiration */
.br
long int sp_inact; /* days before account inactive */
.br
long int sp_expire; /* date when account expires */
.br
unsigned long int sp_flag; /* reserved for future use */
.br
.in \-.5i
char *sp_namp; /* user login name */
char *sp_pwdp; /* encrypted password */
long int sp_lstchg; /* last password change */
long int sp_min; /* days until change allowed\&. */
long int sp_max; /* days before change required */
long int sp_warn; /* days warning for expiration */
long int sp_inact; /* days before account inactive */
long int sp_expire; /* date when account expires */
unsigned long int sp_flag; /* reserved for future use */
}
.fi
.PP
The meanings of each field are
.sp
sp_namp \- pointer to null\-terminated user name.
.br
sp_pwdp \- pointer to null\-terminated password.
.br
sp_lstchg \- days since Jan 1, 1970 password was last changed.
.br
sp_min \- days before which password may not be changed.
.br
sp_max \- days after which password must be changed.
.br
sp_warn \- days before password is to expire that user is warned
of pending password expiration.
.br
sp_inact \- days after password expires that account is considered
inactive and disabled.
.br
sp_expire \- days since Jan 1, 1970 when account will be disabled.
.br
sp_flag \- reserved for future use.
.SH DESCRIPTION
\fBgetspent\fR, \fBgetspname\fR, \fBfgetspent\fR, and \fBsgetspent\fR each
return a pointer to a \fBstruct spwd\fR. \fBgetspent\fR returns the next
entry from the file, and \fBfgetspent\fR returns the next entry from the
given stream, which is assumed to be a file of the proper format.
\fBsgetspent\fR returns a pointer to a \fBstruct spwd\fR using the
provided string as input. \fBgetspnam\fR searches from the current position
in the file for an entry matching \fBname\fR.
The meanings of each field are:
.TP 3
\(bu
sp_namp \- pointer to null\-terminated user name
.TP
\(bu
sp_pwdp \- pointer to null\-terminated password
.TP
\(bu
sp_lstchg \- days since Jan 1, 1970 password was last changed
.TP
\(bu
sp_min \- days before which password may not be changed
.TP
\(bu
sp_max \- days after which password must be changed
.TP
\(bu
sp_warn \- days before password is to expire that user is warned of pending password expiration
.TP
\(bu
sp_inact \- days after password expires that account is considered inactive and disabled
.TP
\(bu
sp_expire \- days since Jan 1, 1970 when account will be disabled
.TP
\(bu
sp_flag \- reserved for future use
.LP
.SH "DESCRIPTION"
.PP
\fBsetspent\fR and \fBendspent\fR may be used to begin and end,
respectively, access to the shadow password file.
\fIgetspent\fR, \fIgetspname\fR \fIfgetspent\fR, and \fIsgetspent\fR each return a pointer to a \fIstruct spwd\fR\&. \fIgetspent\fR returns the next entry from the file, and \fIfgetspent\fR returns the next entry from the given stream, which is assumed to be a file of the proper format\&. \fIsgetspent\fR returns a pointer to a \fIstruct spwd\fR using the provided string as input\&. \fIgetspnam\fR searches from the current position in the file for an entry matching \fIname\fR\&.
.PP
The \fBlckpwdf\fR and \fBulckpwdf\fR routines should be used to insure
exclusive access to the \fI/etc/shadow\fR file. \fBlckpwdf\fR attempts to
acquire a lock using \fBpw_lock\fR for up to 15 seconds. It continues by
attempting to acquire a second lock using \fBspw_lock\fR for the remainder
of the initial 15 seconds. Should either attempt fail after a total of 15
seconds, \fBlckpwdf\fR returns \-1. When both locks are acquired 0 is
returned.
.SH DIAGNOSTICS
Routines return NULL if no more entries are available or if an error occurs
during processing. Routines which have \fBint\fR as the return value return
0 for success and \-1 for failure.
.SH CAVEATS
These routines may only be used by the super user as access to the shadow
password file is restricted.
.SH FILES
\fI/etc/shadow\fR \- secure user account information
.SH SEE ALSO
.BR getpwent (3),
.BR shadow (5)
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
\fIsetspent\fR and \fIendspent\fR may be used to begin and end, respectively, access to the shadow password file\&.
.PP
The \fIlckpwdf\fR and \fIulckpwdf\fR routines should be used to insure exclusive access to the \fI/etc/shadow\fR file\&. \fIlckpwdf\fR attempts to acquire a lock using \fIpw_lock\fR for up to 15 seconds\&. It continues by attempting to acquire a second lock using \fIspw_lock\fR for the remainder of the initial 15 seconds\&. Should either attempt fail after a total of 15 seconds, \fIlckpwdf\fR returns \-1\&. When both locks are acquired 0 is returned\&.
.SH "DIAGNOSTICS"
.PP
Routines return NULL if no more entries are available or if an error occurs during processing\&. Routines which have \fIint\fR as the return value return 0 for success and \-1 for failure\&.
.SH "CAVEATS"
.PP
These routines may only be used by the super user as access to the shadow password file is restricted\&.
.SH "FILES"
.TP
\fI/etc/shadow\fR
secure user account information
.SH "SEE ALSO"
.PP
\fBgetpwent\fR(3), \fBshadow\fR(5)
.SH "AUTHOR"
.PP
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='shadow.3'>
<!-- $Id: shadow.3.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
<!-- $Id: shadow.3.xml,v 1.9 2005/06/20 08:42:12 kloczek Exp $ -->
<refmeta>
<refentrytitle>shadow</refentrytitle>
<manvolnum>3</manvolnum>
@@ -14,116 +14,101 @@
<refsect1 id='syntax'>
<title>SYNTAX</title>
<para>
<emphasis remap='B'>#include &lt;shadow.h&gt;</emphasis>
<para><emphasis remap='B'>#include &lt;shadow.h&gt;</emphasis>
</para>
<para>
<emphasis remap='B'>struct spwd *getspent();</emphasis>
<para><emphasis remap='B'>struct spwd *getspent();</emphasis>
</para>
<para>
<emphasis remap='B'>struct spwd *getspnam(char</emphasis>
<para><emphasis remap='B'>struct spwd *getspnam(char</emphasis>
<emphasis remap='I'>*name</emphasis><emphasis remap='B'>);</emphasis>
</para>
<para>
<emphasis remap='B'>void setspent();</emphasis>
<para><emphasis remap='B'>void setspent();</emphasis>
</para>
<para>
<emphasis remap='B'>void endspent();</emphasis>
<para><emphasis remap='B'>void endspent();</emphasis>
</para>
<para>
<emphasis remap='B'>struct spwd *fgetspent(FILE</emphasis>
<para><emphasis remap='B'>struct spwd *fgetspent(FILE</emphasis>
<emphasis remap='I'>*fp</emphasis><emphasis remap='B'>);</emphasis>
</para>
<para>
<emphasis remap='B'>struct spwd *sgetspent(char</emphasis>
<para><emphasis remap='B'>struct spwd *sgetspent(char</emphasis>
<emphasis remap='I'>*cp</emphasis><emphasis remap='B'>);</emphasis>
</para>
<para>
<emphasis remap='B'>int putspent(struct spwd</emphasis>
<para><emphasis remap='B'>int putspent(struct spwd</emphasis>
<emphasis remap='I'>*p,</emphasis>
<emphasis remap='B'>FILE</emphasis>
<emphasis remap='I'>*fp</emphasis><emphasis remap='B'>);</emphasis>
</para>
<para>
<emphasis remap='B'>int lckpwdf();</emphasis>
<para><emphasis remap='B'>int lckpwdf();</emphasis>
</para>
<para>
<emphasis remap='B'>int ulckpwdf();</emphasis>
<para><emphasis remap='B'>int ulckpwdf();</emphasis>
</para>
</refsect1>
<refsect1 id='description'>
<title>DESCRIPTION</title>
<para>
<emphasis remap='I'>shadow</emphasis>
manipulates the contents of the shadow password file,
<filename>/etc/shadow</filename>.
The structure in the <emphasis remap='I'>#include</emphasis> file
is
<para><emphasis remap='I'>shadow</emphasis> manipulates the contents of
the shadow password file, <filename>/etc/shadow</filename>.
The structure in the <emphasis remap='I'>#include</emphasis> file is:
</para>
<para>struct spwd {
<!-- .in +.5i -->
<!-- .br -->
<programlisting>struct spwd {
char *sp_namp; /* user login name */
<!-- .br -->
char *sp_pwdp; /* encrypted password */
<!-- .br -->
long int sp_lstchg; /* last password change */
<!-- .br -->
long int sp_min; /* days until change allowed. */
<!-- .br -->
long int sp_max; /* days before change required */
<!-- .br -->
long int sp_warn; /* days warning for expiration */
<!-- .br -->
long int sp_inact; /* days before account inactive */
<!-- .br -->
long int sp_expire; /* date when account expires */
<!-- .br -->
unsigned long int sp_flag; /* reserved for future use */
<!-- .br -->
<!-- .in \-.5i -->
}
</para>
<para>The meanings of each field are</para>
<para>sp_namp - pointer to null-terminated user name.
<!-- .br -->
sp_pwdp - pointer to null-terminated password.
<!-- .br -->
sp_lstchg - days since Jan 1, 1970 password was last changed.
<!-- .br -->
sp_min - days before which password may not be changed.
<!-- .br -->
sp_max - days after which password must be changed.
<!-- .br -->
sp_warn - days before password is to expire that user is warned
of pending password expiration.
<!-- .br -->
sp_inact - days after password expires that account is considered
inactive and disabled.
<!-- .br -->
sp_expire - days since Jan 1, 1970 when account will be disabled.
<!-- .br -->
sp_flag - reserved for future use.
</para>
}
</programlisting>
<para>The meanings of each field are:</para>
<itemizedlist mark='bullet'>
<listitem>
<para>sp_namp - pointer to null-terminated user name</para>
</listitem>
<listitem>
<para>sp_pwdp - pointer to null-terminated password</para>
</listitem>
<listitem>
<para>sp_lstchg - days since Jan 1, 1970 password was last changed</para>
</listitem>
<listitem>
<para>sp_min - days before which password may not be changed</para>
</listitem>
<listitem>
<para>sp_max - days after which password must be changed</para>
</listitem>
<listitem>
<para>sp_warn - days before password is to expire that user is warned of
pending password expiration
</para>
</listitem>
<listitem>
<para>sp_inact - days after password expires that account is considered
inactive and disabled
</para>
</listitem>
<listitem>
<para>sp_expire - days since Jan 1, 1970 when account will be disabled</para>
</listitem>
<listitem>
<para>sp_flag - reserved for future use</para>
</listitem>
</itemizedlist>
</refsect1>
<refsect1 id='description2'>
<title>DESCRIPTION</title>
<para>
<emphasis remap='B'>getspent</emphasis>, <emphasis
<para><emphasis remap='B'>getspent</emphasis>, <emphasis
remap='B'>getspname</emphasis> <emphasis
remap='B'>fgetspent</emphasis>, and <emphasis
remap='B'>sgetspent</emphasis> each return a pointer to a <emphasis
@@ -182,8 +167,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>getpwent</refentrytitle><manvolnum>3</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -1,91 +1,92 @@
.\"$Id: shadow.5,v 1.15 2005/04/12 16:31:06 kloczek Exp $
.\" Copyright 1989 - 1990, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH SHADOW 5
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "SHADOW" 5 "" "" ""
.SH NAME
shadow \- encrypted password file
.SH DESCRIPTION
\fIshadow\fR contains the encrypted password information for user's accounts
and optional the password aging information. Included is
.IP "" .5i
Login name
.IP "" .5i
Encrypted password
.IP "" .5i
Days since Jan 1, 1970 that password was last changed
.IP "" .5i
Days before password may be changed
.IP "" .5i
Days after which password must be changed
.IP "" .5i
Days before password is to expire that user is warned
.IP "" .5i
Days after password expires that account is disabled
.IP "" .5i
Days since Jan 1, 1970 that account is disabled
.IP "" .5i
A reserved field
.SH "DESCRIPTION"
.PP
The password field must be filled. The encryped password consists of 13 to
24 characters from the 64 characters alphabet a thru z, A thru Z, 0 thru 9,
\&\. and /. Optionally it can start with a "$" character. This means the
encrypted password was generated using another (not DES) algorithm. For
example if it starts with "$1$" it means the MD5\-based algorithm was used.
\fIshadow\fR contains the encrypted password information for user's accounts and optional the password aging information\&. Included is:
.TP 3
\(bu
login name
.TP
\(bu
encrypted password
.TP
\(bu
days since Jan 1, 1970 that password was last changed
.TP
\(bu
days before password may be changed
.TP
\(bu
days after which password must be changed
.TP
\(bu
days before password is to expire that user is warned
.TP
\(bu
days after password expires that account is disabled
.TP
\(bu
days since Jan 1, 1970 that account is disabled
.TP
\(bu
a reserved field
.LP
.PP
Refer to \fBcrypt\fR(3) for details on how this string is interpreted.
The password field must be filled\&. The encrypted password consists of 13 to 24 characters from the 64 characters alphabet a thru z, A thru Z, 0 thru 9, \\\&. and /\&. Optionally it can start with a "$" character\&. This means the encrypted password was generated using another (not DES) algorithm\&. For example if it starts with "$1$" it means the MD5\-based algorithm was used\&.
.PP
The date of the last password change is given as the number of days since
Jan 1, 1970. The password may not be changed again until the proper number
of days have passed, and must be changed after the maximum number of days.
If the minimum number of days required is greater than the maximum number of
day allowed, this password may not be changed by the user.
Refer to \fBcrypt\fR(3) for details on how this string is interpreted\&.
.PP
An account is considered to be inactive and is disabled if the password is
not changed within the specified number of days after the password expires.
An account will also be disabled on the specified day regardless of other
password expiration information.
The date of the last password change is given as the number of days since Jan 1, 1970\&. The password may not be changed again until the proper number of days have passed, and must be changed after the maximum number of days\&. If the minimum number of days required is greater than the maximum number of day allowed, this password may not be changed by the user\&.
.PP
This information supercedes any password or password age information present
in \fI/etc/passwd\fR.
An account is considered to be inactive and is disabled if the password is not changed within the specified number of days after the password expires\&. An account will also be disabled on the specified day regardless of other password expiration information\&.
.PP
This file must not be readable by regular users if password security is to
be maintained.
.SH FILES
\fI/etc/passwd\fR \- user account information
.br
\fI/etc/shadow\fR \- secure user account information
.SH SEE ALSO
.BR chage (1),
.BR login (1),
.BR passwd (1),
.BR su (1),
.BR passwd (5),
.BR pwconv (8),
.BR pwunconv (8),
.BR sulogin (8)
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
This information supersedes any password or password age information present in \fI/etc/passwd\fR\&.
.PP
This file must not be readable by regular users if password security is to be maintained\&.
.SH "FILES"
.TP
\fI/etc/passwd\fR
user account information
.TP
\fI/etc/shadow\fR
secure user account information
.SH "SEE ALSO"
.PP
\fBchage\fR(1), \fBlogin\fR(1), \fBpasswd\fR(1), \fBsu\fR(1), \fBpasswd\fR(5), \fBpwconv\fR(8), \fBpwunconv\fR(8), \fBsulogin\fR(8)
.SH "AUTHOR"
.PP
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='shadow.5'>
<!-- $Id: shadow.5.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
<!-- $Id: shadow.5.xml,v 1.9 2005/06/16 17:27:33 kloczek Exp $ -->
<refmeta>
<refentrytitle>shadow</refentrytitle>
<manvolnum>5</manvolnum>
@@ -14,31 +14,41 @@
<refsect1 id='description'>
<title>DESCRIPTION</title>
<para>
<emphasis remap='I'>shadow</emphasis> contains the encrypted
<para><emphasis remap='I'>shadow</emphasis> contains the encrypted
password information for user's accounts
and optional the password aging information. Included is
and optional the password aging information. Included is:
</para>
<itemizedlist mark='bullet'>
<listitem>
<para>login name</para>
</listitem>
<listitem>
<para>encrypted password</para>
</listitem>
<listitem>
<para>days since Jan 1, 1970 that password was last changed</para>
</listitem>
<listitem>
<para>days before password may be changed</para>
</listitem>
<listitem>
<para>days after which password must be changed</para>
</listitem>
<listitem>
<para>days before password is to expire that user is warned</para>
</listitem>
<listitem>
<para>days after password expires that account is disabled</para>
</listitem>
<listitem>
<para>days since Jan 1, 1970 that account is disabled</para>
</listitem>
<listitem>
<para>a reserved field</para>
</listitem>
</itemizedlist>
<para>Login name</para>
<para>Encrypted password</para>
<para>Days since Jan 1, 1970 that password was last changed</para>
<para>Days before password may be changed</para>
<para>Days after which password must be changed</para>
<para>Days before password is to expire that user is warned</para>
<para>Days after password expires that account is disabled</para>
<para>Days since Jan 1, 1970 that account is disabled</para>
<para>A reserved field</para>
<para>The password field must be filled. The encryped password consists
<para>The password field must be filled. The encrypted password consists
of 13 to 24 characters from the 64 characters alphabet a thru z, A
thru Z, 0 thru 9, \. and /. Optionally it can start with a "$"
character. This means the encrypted password was generated using
@@ -64,11 +74,11 @@
<para>An account is considered to be inactive and is disabled if the
password is not changed within the specified number of days after the
password expires. An account will also be disabled on the specified
password expires. An account will also be disabled on the specified
day regardless of other password expiration information.
</para>
<para>This information supercedes any password or password age
<para>This information supersedes any password or password age
information present in <filename>/etc/passwd</filename>.
</para>
@@ -93,8 +103,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>chage</refentrytitle><manvolnum>1</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -1,22 +1,41 @@
.\"$Id: shadowconfig.8,v 1.7 2004/12/11 20:05:01 kloczek Exp $
.TH SHADOWCONFIG 8 "19 Apr 1997" "Debian GNU/Linux"
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "SHADOWCONFIG" 8 "19 Apr 1997" "" ""
.SH NAME
shadowconfig \- toggle shadow passwords on and off
.SH SYNOPSIS
.B "shadowconfig"
.IR on " | " off
.SH DESCRIPTION
.PP
.SH "SYNOPSIS"
.ad l
.hy 0
.HP 13
\fBshadowconfig\fR \fB\fIon\fR\fR | \fB\fIoff\fR\fR
.ad
.hy
.SH "DESCRIPTION"
.PP
\fBshadowconfig\fR on will turn shadow passwords on; \fIshadowconfig off\fR will turn shadow passwords off\&. \fBshadowconfig\fR will print an error message and exit with a nonzero code if it finds anything awry\&. If that happens, you should correct the error and run it again\&. Turning shadow passwords on when they are already on, or off when they are already off, is harmless\&.
.PP
Read \fI/usr/share/doc/passwd/README\&.debian\fR for a brief introduction to shadow passwords and related features\&.
.PP
Note that turning shadow passwords off and on again will lose all password aging information\&.
\fBshadowconfig on\fR will turn shadow passwords on; \fBshadowconfig off\fR
will turn shadow passwords off. \fBshadowconfig\fR will print an error
message and exit with a nonzero code if it finds anything awry. If that
happens, you should correct the error and run it again. Turning shadow
passwords on when they are already on, or off when they are already off, is
harmless.
.P
Read \fI/usr/share/doc/passwd/README.debian\fR for a brief introduction
to shadow passwords and related features.
.P
Note that turning shadow passwords off and on again will lose all password
aging information.

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='shadowconfig.8'>
<!-- $Id: shadowconfig.8.xml,v 1.5 2005/04/27 18:20:35 kloczek Exp $ -->
<!-- $Id: shadowconfig.8.xml,v 1.6 2005/06/15 12:39:27 kloczek Exp $ -->
<refentryinfo>
<date>19 Apr 1997</date>
</refentryinfo>
@@ -29,8 +29,7 @@
<refsect1 id='description'>
<title>DESCRIPTION</title>
<para>
<command>shadowconfig</coamand> on will turn shadow passwords on;
<para><command>shadowconfig</command> on will turn shadow passwords on;
<emphasis remap='B'>shadowconfig off</emphasis> will turn shadow
passwords off. <command>shadowconfig</command> will print an error
message and exit with a nonzero code if it finds anything awry. If

139
man/su.1
View File

@@ -1,71 +1,70 @@
.\" $Id: su.1,v 1.18 2005/05/19 10:35:00 kloczek Exp $
.\" Copyright 1989 - 1990, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH SU 1
.SH NAME
su \- change user ID or become super\-user
.SH SYNOPSIS
\fBsu\fR [\fB\-\fR] [\fIusername\fR [\fIargs\fR]]
.SH DESCRIPTION
\fBsu\fR is used to become another user during a login session. Invoked
without a username, \fBsu\fR defaults to becoming the super user. The
optional argument \fB\-\fR may be used to provide an environment similar to
what the user would expect had the user logged in directly.
.PP
Additional arguments may be provided after the username, in which case they
are supplied to the user\'s login shell. In particular, an argument of
\fB\-c\fR will cause the next argument to be treated as a command by most
command interpreters. The command will be executed by the shell specified in
\fI/etc/passwd\fR for the target user.
.PP
The user will be prompted for a password, if appropriate. Invalid passwords
will produce an error message. All attempts, both valid and invalid, are
logged to detect abuses of the system.
.PP
The current environment is passed to the new shell. The value of \fB$PATH\fR
\is reset to \fB/bin:/usr/bin\fR for normal users, or
\fB/sbin:/bin:/usr/sbin:/usr/bin\fR for the super user. This may be changed
with the \fBENV_PATH\fR and \fBENV_SUPATH\fR definitions in
\fI/etc/login.defs\fR.
.PP
A subsystem login is indicated by the presense of a "*" as the first
character of the login shell. The given home directory will be used as
the root of a new filesystem which the user is actually logged into.
.SH CAVEATS
This version of \fBsu\fR has many compilation options, only some of which
may be in use at any particular site.
.SH FILES
\fI/etc/passwd\fR \- user account information
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
\fI/etc/shadow\fR \- secure user account information
.SH SEE ALSO
.BR login (1),
.BR sh (1),
.BR login.defs (5),
.BR suauth (5)
.SH AUTHOR
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "SU" 1 "" "" ""
.SH NAME
su \- change user ID or become super-user
.SH "SYNOPSIS"
.ad l
.hy 0
.HP 3
\fBsu\fR [\-] [\fIusername\fR\ [\fIargs\fR]]
.ad
.hy
.SH "DESCRIPTION"
.PP
\fBsu\fR is used to become another user during a login session\&. Invoked without a username, \fBsu\fR defaults to becoming the super user\&. The optional argument \fB\-\fR may be used to provide an environment similar to what the user would expect had the user logged in directly\&.
.PP
Additional arguments may be provided after the username, in which case they are supplied to the user<65>s login shell\&. In particular, an argument of \fB\-c\fR will cause the next argument to be treated as a command by most command interpreters\&. The command will be executed by the shell specified in \fI/etc/passwd\fR for the target user\&.
.PP
The user will be prompted for a password, if appropriate\&. Invalid passwords will produce an error message\&. All attempts, both valid and invalid, are logged to detect abuses of the system\&.
.PP
The current environment is passed to the new shell\&. The value of \fI$PATH\fR is reset to \fI/bin:/usr/bin\fR for normal users, or \fI/sbin:/bin:/usr/sbin:/usr/bin\fR for the super user\&. This may be changed with the \fIENV_PATH\fR and \fIENV_SUPATH\fR definitions in \fI/etc/login\&.defs\fR\&.
.PP
A subsystem login is indicated by the presense of a "*" as the first character of the login shell\&. The given home directory will be used as the root of a new filesystem which the user is actually logged into\&.
.SH "CAVEATS"
.PP
This version of \fBsu\fR has many compilation options, only some of which may be in use at any particular site\&.
.SH "FILES"
.TP
\fI/etc/passwd\fR
user account information
.TP
\fI/etc/shadow\fR
secure user account information
.SH "SEE ALSO"
.PP
\fBlogin\fR(1), \fBsh\fR(1), \fBlogin\&.defs\fR(5), \fBsuauth\fR(5)
.SH "AUTHOR"
.PP
Julianne Frances Haugh <jockgrrl@ix\&.netcom\&.com>

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='su.1'>
<!-- $Id: su.1.xml,v 1.8 2005/05/19 10:35:00 kloczek Exp $ -->
<!-- $Id: su.1.xml,v 1.9 2005/06/15 12:39:27 kloczek Exp $ -->
<refmeta>
<refentrytitle>su</refentrytitle>
<manvolnum>1</manvolnum>
@@ -29,8 +29,7 @@
<refsect1 id='description'>
<title>DESCRIPTION</title>
<para>
<command>su</command> is used to become another user during a login
<para><command>su</command> is used to become another user during a login
session. Invoked without a username, <command>su</command> defaults to
becoming the super user. The optional argument <option>-</option> may
be used to provide an environment similar to what the user would
@@ -90,8 +89,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>login</refentrytitle><manvolnum>1</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='suauth.5'>
<!-- $Id: suauth.5.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
<!-- $Id: suauth.5.xml,v 1.6 2005/06/15 12:39:27 kloczek Exp $ -->
<refmeta>
<refentrytitle>suauth</refentrytitle>
<manvolnum>5</manvolnum>
@@ -177,8 +177,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>su</refentrytitle><manvolnum>1</manvolnum>
</citerefentry>
</para>

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='sulogin.8'>
<!-- $Id: sulogin.8.xml,v 1.6 2005/04/27 18:20:35 kloczek Exp $ -->
<!-- $Id: sulogin.8.xml,v 1.7 2005/06/15 12:39:27 kloczek Exp $ -->
<refmeta>
<refentrytitle>sulogin</refentrytitle>
<manvolnum>8</manvolnum>
@@ -15,7 +15,7 @@
<refsect1 id='syntax'>
<title>SYNTAX</title>
<para>
<command>sulogin</coamand> [<emphasis remap='I'>
<command>sulogin</command> [<emphasis remap='I'>
tty-device
</emphasis>
]
@@ -25,10 +25,10 @@
<refsect1 id='description'>
<title>DESCRIPTION</title>
<para>
<command>sulogin</coamand> is invoked by <command>init</coamand> prior
<command>sulogin</command> is invoked by <command>init</command> prior
to allowing the user access to the system when in single user mode.
This feature may only be available on certain systems where
<command>init</coamand> has been modified accordingly, or where the
<command>init</command> has been modified accordingly, or where the
<filename>/etc/inittab</filename> has an entry for a single user
login.
</para>
@@ -60,8 +60,8 @@
<refsect1 id='caveats'>
<title>CAVEATS</title>
<para>
This command can only be used if <command>init</coamand> has been
modified to call <command>sulogin</coamand> instead of
This command can only be used if <command>init</command> has been
modified to call <command>sulogin</command> instead of
<filename>/bin/sh</filename>, or if the user has set the <emphasis
remap='I'>inittab</emphasis> to support a single user login. For
example, the line:
@@ -97,8 +97,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>login</refentrytitle><manvolnum>1</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -1,177 +1,199 @@
.\" $Id: useradd.8,v 1.29 2005/04/18 19:21:33 kloczek Exp $
.\" Copyright 1991 - 1994, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH USERADD 8
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "USERADD" 8 "" "" ""
.SH NAME
useradd \- Create a new user or update default new user information
.SH SYNOPSIS
.TP 8
\fBuseradd\fR [\fB\-c\fR \fIcomment\fR] [\fB\-d\fR \fIhome_dir\fR] [\fB\-e\fR \fIexpire_date\fR] [\fB\-f\fR \fIinactive_days\fR]
.SH "SYNOPSIS"
.ad l
.hy 0
.HP 8
\fBuseradd\fR [\-c\ \fIcomment\fR] [\-d\ \fIhome_dir\fR] [\-e\ \fIexpire_date\fR] [\-f\ \fIinactive_days\fR]
.br
[\fB\-g\fR \fIinitial_group\fR] [\fB\-G\fR \fIgroup1\fR[\fI,group2,...,\fR[\fIgroupN\fR]\fR]]
[\-g\ \fIinitial_group\fR] [\-G\ \fIgroup1\fR\ [\fI,group2,\fR...\ \fI,\fR\ [\fIgroupN\fR]]]
.br
[[\fB\-M\fR] \fB\-m\fR [\fB\-k\fR \fIskeleton_dir\fR]] [\fB\-o\fR] [\fB\-p\fR \fIpasswd\fR] [\fB\-s\fR \fIshell\fR]
[[\-M]\ \-m\ [\-k\ \fIskeleton_dir\fR]] [\-o] [\-p\ \fIpasswd\fR] [\-s\ \fIshell\fR]
.br
[\fB\-u\fR \fIuid\fR] \fIlogin\fR
.TP 8
\fBuseradd\fR \fB\-D\fR [\fB\-g\fR \fIgroup\fR] [\fB\-b\fR \fIhome_dir\fR] [\fB\-e\fR \fIexpire_date\fR]
[\-u\ \fIuid\fR] \fIlogin\fR \fIuseradd\fR \-D [\-g\ \fIgroup\fR] [\-b\ \fIhome_dir\fR] [\-e\ \fIexpire_date\fR]
.br
[\fB\-f\fR \fIinactive_days\fR] [\fB\-s\fR \fIshell\fR]
.SH DESCRIPTION
.SS Creating New Users
When invoked without the \fB\-D\fR option, the \fBuseradd\fR command creates
a new user account using the values specified on the command line and the
default values from the system. Depending on command line options, the
useradd command will update system files and may also create the new user's
home directory and copy initial files.
.SH OPTIONS
The options which apply to the
\fBuseradd\fR command are:
.IP "\fB\-c\fR \fIcomment\fR"
The new user's password file comment field.
.IP "\fB\-d\fR \fIhome_dir\fR"
The new user will be created using \fIhome_dir\fR as the value for the
user's login directory. The default is to append the \fIlogin\fR name to
\fIhome\fR and use that as the login directory name.
.IP "\fB\-e\fR \fIexpire_date\fR"
The date on which the user account will be disabled. The date is specified
in the format \fIYYYY\-MM\-DD\fR.
.IP "\fB\-f\fR \fIinactive_days\fR"
The number of days after a password expires until the account is permanently
disabled. A value of 0 disables the account as soon as the password has
expired, and a value of \-1 disables the feature. The default value is \-1.
.IP "\fB\-g\fR \fIinitial_group\fR"
The group name or number of the user's initial login group. The group name
must exist. A group number must refer to an already existing group. The
default group number is 1 or whatever is specified in
\fI/etc/default/useradd\fR.
.IP "\fB\-G\fR \fIgroup1\fR[\fI,group2,...,\fR[\fIgroupN\fR]\fR]]"
A list of supplementary groups which the user is also a member of. Each
group is separated from the next by a comma, with no intervening whitespace.
The groups are subject to the same restrictions as the group given with the
\fB\-g\fR option. The default is for the user to belong only to the initial
group.
.IP \fB\-M\fR
RedHat added the CREATE_HOME option in login.defs in their version of
shadow\-utils (which makes \-m the default, with new \-M option to turn it
off). Unfortunately, this changes the way useradd works (it can be run by
scripts expecting some standard behaviour), compared to other Unices and
other Linux distributions, and also adds a lot of confusion.
.IP \fB\-m\fR
The user's home directory will be created if it does not exist. The files
contained in \fIskeleton_dir\fR will be copied to the home directory if the
\fB\-k\fR option is used, otherwise the files contained in \fI/etc/skel\fR
will be used instead. Any directories contained in \fIskeleton_dir\fR or
\fI/etc/skel\fR will be created in the user's home directory as well. The
\fB\-k\fR option is only valid in conjunction with the \fB\-m\fR option. The
default is to not create the directory and to not copy any files.
.IP "\fB\-o\fR"
Allow create user with duplicate (non\-unique) UID.
.IP "\fB\-p\fR \fIpasswd\fR"
The encrypted password, as returned by \fBcrypt\fR(3). The default is to
disable the account.
.IP "\fB\-s\fR \fIshell\fR"
The name of the user's login shell. The default is to leave this field
blank, which causes the system to select the default login shell.
.IP "\fB\-u\fR \fIuid\fR"
The numerical value of the user's ID. This value must be unique, unless the
\fI\-o\fR option is used. The value must be non\-negative. The default is to
use the smallest ID value greater than 999 and greater than every other user.
Values between 0 and 999 are typically reserved for system accounts.
.SS Changing the default values
When invoked with the \fB\-D\fR option, \fBuseradd\fR will either display the
current default values, or update the default values from the command line.
The valid options are
.IP "\fB\-b\fR \fIhome_dir\fR"
The initial path prefix for a new user's home directory. The user's name
will be affixed to the end of \fIhome\fR to create the new directory
name if the \fB\-d\fR option is not used when creating a new account.
.IP "\fB\-e\fR \fIexpire_date\fR"
The date on which the user account is disabled.
.IP "\fB\-f\fR \fIinactive\fR"
The number of days after a password has expired before the account will be
disabled.
.IP "\fB\-g\fR \fIgroup\fR"
The group name or ID for a new user's initial group. The named group must
exist, and a numerical group ID must have an existing entry .
.IP "\fB\-s\fR \fIshell\fR"
The name of the new user's login shell. The named program will be used for
all future new user accounts.
[\-f\ \fIinactive_days\fR] [\-s\ \fIshell\fR]
.ad
.hy
.SH "DESCRIPTION"
.SS "Creating New Users"
.PP
If no options are specified, \fBuseradd\fR displays the current default
values.
.SH NOTES
The system administrator is responsible for placing the default user files
in the \fI/etc/skel/\fR directory.
.SH CAVEATS
You may not add a user to an NIS group. This must be performed on the NIS
server.
.SH FILES
\fI/etc/passwd\fR \- user account information
.br
\fI/etc/shadow\fR \- secure user account information
.br
\fI/etc/group\fR \- group account information
.br
\fI/etc/default/useradd\fR \- default information
.br
\fI/etc/skel/\fR \- directory containing default files
.SH EXIT VALUES
.TP 2
The \fBuseadd\fR command exits with the following values:
.br
\fB0\fR \- success
.br
\fB1\fR \- can't update password file
.br
\fB2\fR \- invalid command syntax
.br
\fB3\fR \- invalid argument to option
.br
\fB4\fR \- uid already in use (and no \-o)
.br
\fB6\fR \- specified group doesn't exist
.br
\fB9\fR \- username already in use
.br
\fB10\fR \- can't update group file
.br
\fB12\fR \- can't create home directory
.br
\fB13\fR \- can't create mail spool
.SH SEE ALSO
.BR chfn (1),
.BR chsh (1),
.BR passwd (1),
.BR crypt (3),
.BR groupadd (8),
.BR groupdel (8),
.BR groupmod (8),
.BR userdel (8),
.BR usermod (8)
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
When invoked without the \fB\-D\fR option, the \fBuseradd\fR command creates a new user account using the values specified on the command line and the default values from the system\&. Depending on command line options, the useradd command will update system files and may also create the new user's home directory and copy initial files\&.
.SH "OPTIONS"
.PP
The options which apply to the \fBuseradd\fR command are:
.TP
\fB\-c\fR \fIcomment\fR
The new user's password file comment field\&.
.TP
\fB\-d\fR \fIhome_dir\fR
The new user will be created using \fI home_dir \fRas the value for the user's login directory\&. The default is to append the \fIlogin\fR name to \fIhome\fR and use that as the login directory name\&.
.TP
\fB\-e\fR \fIexpire_date\fR
The date on which the user account will be disabled\&. The date is specified in the format \fIYYYY\-MM\-DD\fR\&.
.TP
\fB\-f\fR \fIinactive_days\fR
The number of days after a password expires until the account is permanently disabled\&. A value of 0 disables the account as soon as the password has expired, and a value of \-1 disables the feature\&. The default value is \-1\&.
.TP
\fB\-g\fR \fIinitial_group\fR
The group name or number of the user's initial login group\&. The group name must exist\&. A group number must refer to an already existing group\&. The default group number is 1 or whatever is specified in \fI/etc/default/useradd\fR\&.
.TP
\fB\-G\fR \fIgroup1\fR[\fI ,group2,\&.\&.\&., \fR [\fIgroupN\fR]]]
A list of supplementary groups which the user is also a member of\&. Each group is separated from the next by a comma, with no intervening whitespace\&. The groups are subject to the same restrictions as the group given with the \fB\-g\fR option\&. The default is for the user to belong only to the initial group\&.
.TP
\fB\-M\fR
RedHat added the CREATE_HOME option in login\&.defs in their version of shadow\-utils (which makes \-m the default, with new \-M option to turn it off)\&. Unfortunately, this changes the way useradd works (it can be run by scripts expecting some standard behaviour), compared to other Unices and other Linux distributions, and also adds a lot of confusion\&.
.TP
\fB\-m\fR
The user's home directory will be created if it does not exist\&. The files contained in \fIskeleton_dir\fR will be copied to the home directory if the \fB\-k\fR option is used, otherwise the files contained in \fI/etc/skel\fR will be used instead\&. Any directories contained in \fI skeleton_dir\fR or \fI/etc/skel\fR will be created in the user's home directory as well\&. The \fB\-k\fR option is only valid in conjunction with the \fB\-m\fR option\&. The default is to not create the directory and to not copy any files\&.
.TP
\fB\-o\fR
Allow create user with duplicate (non\-unique) UID\&.
.TP
\fB\-p\fR \fIpasswd\fR
The encrypted password, as returned by \fBcrypt\fR(3)\&. The default is to disable the account\&.
.TP
\fB\-s\fR \fIshell\fR
The name of the user's login shell\&. The default is to leave this field blank, which causes the system to select the default login shell\&.
.TP
\fB\-u\fR \fIuid\fR
The numerical value of the user's ID\&. This value must be unique, unless the \fB\-o\fR option is used\&. The value must be non\-negative\&. The default is to use the smallest ID value greater than 999 and greater than every other user\&. Values between 0 and 999 are typically reserved for system accounts\&.
.SS "Changing the default values"
.PP
When invoked with the \fB\-D\fR option, \fBuseradd\fR will either display the current default values, or update the default values from the command line\&. The valid options are
.TP
\fB\-b\fR \fIhome_dir\fR
The initial path prefix for a new user's home directory\&. The user's name will be affixed to the end of \fIhome\fR to create the new directory name if the \fB\-d\fR option is not used when creating a new account\&.
.TP
\fB\-e\fR \fIexpire_date\fR
The date on which the user account is disabled\&.
.TP
\fB\-f\fR \fIinactive\fR
The number of days after a password has expired before the account will be disabled\&.
.TP
\fB\-g\fR \fIgroup\fR
The group name or ID for a new user's initial group\&. The named group must exist, and a numerical group ID must have an existing entry \&.
.TP
\fB\-s\fR \fIshell\fR
The name of the new user's login shell\&. The named program will be used for all future new user accounts\&.
.PP
If no options are specified, \fBuseradd\fR displays the current default values\&.
.SH "NOTES"
.PP
The system administrator is responsible for placing the default user files in the \fI/etc/skel/\fR directory\&.
.SH "CAVEATS"
.PP
You may not add a user to an NIS group\&. This must be performed on the NIS server\&.
.SH "FILES"
.TP
\fI/etc/passwd\fR
user account information
.TP
\fI/etc/shadow\fR
secure user account information
.TP
\fI/etc/group\fR
group account information
.TP
\fI/etc/default/useradd\fR
default information
.TP
\fI/etc/skel/\fR
directory containing default files
.SH "EXIT VALUES"
.PP
The \fBuseadd\fR command exits with the following values:
.TP
\fI0\fR
success
.TP
\fI1\fR
can't update password file
.TP
\fI2\fR
invalid command syntax
.TP
\fI3\fR
invalid argument to option
.TP
\fI4\fR
uid already in use (and no \-o)
.TP
\fI6\fR
specified group doesn't exist
.TP
\fI9\fR
username already in use
.TP
\fI10\fR
can't update group file
.TP
\fI12\fR
can't create home directory
.TP
\fI13\fR
can't create mail spool
.SH "SEE ALSO"
.PP
\fBchfn\fR(1), \fBchsh\fR(1), \fBpasswd\fR(1), \fBcrypt\fR(3), \fBgroupadd\fR(8), \fBgroupdel\fR(8), \fBgroupmod\fR(8), \fBuserdel\fR(8), \fBusermod\fR(8)
.SH "AUTHOR"
.PP
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='useradd.8'>
<!-- $Id: useradd.8.xml,v 1.6 2005/04/27 18:20:35 kloczek Exp $ -->
<!-- $Id: useradd.8.xml,v 1.8 2005/06/16 18:58:43 kloczek Exp $ -->
<refmeta>
<refentrytitle>useradd</refentrytitle>
<manvolnum>8</manvolnum>
@@ -127,7 +127,7 @@
</term>
<listitem>
<para>The group name or number of the user's initial login group.
The group name must exist. A group number must refer to an
The group name must exist. A group number must refer to an
already existing group. The default group number is 1 or
whatever is specified in
<filename>/etc/default/useradd</filename>.
@@ -343,44 +343,56 @@
<refsect1 id='exit_values'>
<title>EXIT VALUES</title>
<variablelist remap='TP'>
<varlistentry>
<term>
The <command>useadd</coamand> command exits with the following
values:
</term>
<listitem>
<!-- .br -->
<para>
<literal>0</literal> - success
<!-- .br -->
<literal>1</literal> - can't update password file
<!-- .br -->
<literal>2</literal> - invalid command syntax
<!-- .br -->
<literal>3</literal> - invalid argument to option
<!-- .br -->
<literal>4</literal> - uid already in use (and no -o)
<!-- .br -->
<literal>6</literal> - specified group doesn't exist
<!-- .br -->
<literal>9</literal> - username already in use
<!-- .br -->
<literal>10</literal> - can't update group file
<!-- .br -->
<literal>12</literal> - can't create home directory
<!-- .br -->
<literal>13</literal> - can't create mail spool
</para>
</listitem>
</varlistentry>
</variablelist>
<para>
The <command>useadd</command> command exits with the following values:
<variablelist>
<varlistentry>
<term><replaceable>0</replaceable></term>
<listitem>success</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>1</replaceable></term>
<listitem>can't update password file</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>2</replaceable></term>
<listitem>invalid command syntax</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>3</replaceable></term>
<listitem>invalid argument to option</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>4</replaceable></term>
<listitem>uid already in use (and no -o)</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>6</replaceable></term>
<listitem>specified group doesn't exist</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>9</replaceable></term>
<listitem>username already in use</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>10</replaceable></term>
<listitem>can't update group file</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>12</replaceable></term>
<listitem>can't create home directory</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>13</replaceable></term>
<listitem>can't create mail spool</listitem>
</varlistentry>
</variablelist>
</para>
</refsect1>
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>chfn</refentrytitle><manvolnum>1</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -1,82 +1,97 @@
.\"$Id: userdel.8,v 1.14 2005/04/12 17:55:55 kloczek Exp $
.\" Copyright 1991 - 1994, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH USERDEL 8
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "USERDEL" 8 "" "" ""
.SH NAME
userdel \- Delete a user account and related files
.SH SYNOPSIS
.B userdel
[\fB\-r\fR]
.I login
.SH DESCRIPTION
The \fBuserdel\fR command modifies the system account files, deleting all
entries that refer to \fIlogin\fR. The named user must exist.
.SH OPTIONS
.SH "SYNOPSIS"
.ad l
.hy 0
.HP 8
\fBuserdel\fR [\-r] \fIlogin\fR
.ad
.hy
.SH "DESCRIPTION"
.PP
The \fBuserdel\fR command modifies the system account files, deleting all entries that refer to \fIlogin\fR\&. The named user must exist\&.
.SH "OPTIONS"
.PP
The options which apply to the \fBuserdel\fR command are:
.IP \fB\-r\fR
Files in the user's home directory will be removed along with the home
directory itself and the user's mail spool. Files located in other file
systems will have to be searched for and deleted manually.
.SH FILES
\fI/etc/passwd\fR \- user account information
.br
\fI/etc/shadow\fR \- secure user account information
.br
\fI/etc/group\fR \- group account information
.SH EXIT VALUES
.TP 2
The \fBuserdel\fR command exits with the following values:
.br
\fB0\fR \- success
.br
\fB1\fR \- can't update password file
.br
\fB2\fR \- invalid command syntax
.br
\fB6\fR \- specified user doesn't exist
.br
\fB8\fR \- user currently logged in
.br
\fB10\fR \- can't update group file
.br
\fB12\fR \- can't remove home directory
.SH CAVEATS
\fBuserdel\fR will not allow you to remove an account if the user is
currently logged in. You must kill any running processes which belong to an
account that you are deleting. You may not remove any NIS attributes on an
NIS client. This must be performed on the NIS server.
.SH SEE ALSO
.BR chfn (1),
.BR chsh (1),
.BR passwd (1),
.BR groupadd (8),
.BR groupdel (8),
.BR groupmod (8),
.BR useradd (8),
.BR usermod (8)
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
.TP
\fB\-r\fR
Files in the user's home directory will be removed along with the home directory itself and the user's mail spool\&. Files located in other file systems will have to be searched for and deleted manually\&.
.SH "FILES"
.TP
\fI/etc/group\fR
group account information
.TP
\fI/etc/passwd\fR
user account information
.TP
\fI/etc/shadow\fR
secure user account information
.SH "EXIT VALUES"
.PP
The \fBuserdel\fR command exits with the following values:
.TP
\fI0\fR
success
.TP
\fI1\fR
can't update password file
.TP
\fI2\fR
invalid command syntax
.TP
\fI6\fR
specified user doesn't exist
.TP
\fI8\fR
user currently logged in
.TP
\fI10\fR
can't update group file
.TP
\fI12\fR
can't remove home directory
.SH "CAVEATS"
.PP
\fBuserdel\fR will not allow you to remove an account if the user is currently logged in\&. You must kill any running processes which belong to an account that you are deleting\&. You may not remove any NIS attributes on an NIS client\&. This must be performed on the NIS server\&.
.SH "SEE ALSO"
.PP
\fBchfn\fR(1), \fBchsh\fR(1), \fBpasswd\fR(1), \fBgroupadd\fR(8), \fBgroupdel\fR(8), \fBgroupmod\fR(8), \fBuseradd\fR(8), \fBusermod\fR(8)
.SH "AUTHOR"
.PP
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='userdel.8'>
<!-- $Id: userdel.8.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
<!-- $Id: userdel.8.xml,v 1.7 2005/06/16 18:58:43 kloczek Exp $ -->
<refmeta>
<refentrytitle>USERDEL</refentrytitle>
<manvolnum>8</manvolnum>
@@ -71,38 +71,44 @@
<refsect1 id='exit_values'>
<title>EXIT VALUES</title>
<variablelist remap='TP'>
<varlistentry>
<term>
The <command>userdel</command> command exits with the following
values:
</term>
<listitem>
<!-- .br -->
<para>
<literal>0</literal> - success
<!-- .br -->
<literal>1</literal> - can't update password file
<!-- .br -->
<literal>2</literal> - invalid command syntax
<!-- .br -->
<literal>6</literal> - specified user doesn't exist
<!-- .br -->
<literal>8</literal> - user currently logged in
<!-- .br -->
<literal>10</literal> - can't update group file
<!-- .br -->
<literal>12</literal> - can't remove home directory
</para>
</listitem>
</varlistentry>
</variablelist>
<para>
The <command>userdel</command> command exits with the following values:
<variablelist>
<varlistentry>
<term><replaceable>0</replaceable></term>
<listitem>success</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>1</replaceable></term>
<listitem>can't update password file</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>2</replaceable></term>
<listitem>invalid command syntax</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>6</replaceable></term>
<listitem>specified user doesn't exist</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>8</replaceable></term>
<listitem>user currently logged in</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>10</replaceable></term>
<listitem>can't update group file</listitem>
</varlistentry>
<varlistentry>
<term><replaceable>12</replaceable></term>
<listitem>can't remove home directory</listitem>
</varlistentry>
</variablelist>
</para>
</refsect1>
<refsect1 id='caveats'>
<title>CAVEATS</title>
<para>
<command>userdel</command> will not allow you to remove an account if
<para><command>userdel</command> will not allow you to remove an account if
the user is currently logged in. You must kill any running processes
which belong to an account that you are deleting. You may not remove
any NIS attributes on an NIS client. This must be performed on the NIS
@@ -112,8 +118,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>chfn</refentrytitle><manvolnum>1</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -1,120 +1,118 @@
.\" $Id: usermod.8,v 1.24 2005/04/18 17:57:03 kloczek Exp $
.\" Copyright 1991 - 1994, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.TH USERMOD 8
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "USERMOD" 8 "" "" ""
.SH NAME
usermod \- Modify a user account
.SH SYNOPSIS
.TP 8
\fBusermod\fR [\fB\-c\fR \fIcomment\fR] [\fB\-d\fR \fIhome_dir\fR [\fB\-m\fR]] [\fB\-e\fR \fIexpire_date\fR]
[\fB\-f\fR \fIinactive_time\fR] [\fB\-g\fR \fIinitial_group\fR]
.br
[\fB\-G\fR \fIgroup1\fR[\fI,group2,...,\fR[\fIgroupN\fR]\fR]]
.br
[\fB\-l\fR \fIlogin_name\fR] [\fB\-p\fR \fIpasswd\fR] [\fB\-s\fR \fIshell\fR] [\fB\-u\fR \fIuid\fR [\fB\-o\fR]]
.br
[\fB\-L\fR|\fB\-U\fR] \fIlogin\fR
.SH DESCRIPTION
The \fBusermod\fR command modifies the system account files to reflect the
changes that are specified on the command line.
.SH OPTIONS
.SH "SYNOPSIS"
.ad l
.hy 0
.HP 8
\fBusermod\fR [\-c\ \fIcomment\fR] [\-d\ \fIhome_dir\fR\ [\-m]] [\-e\ \fIexpire_date\fR] [\-f\ \fIinactive_days\fR] [\-g\ \fIinitial_group\fR] [\-G\ \fIgroup1\fR\ [\fI,group2,\fR...\ \fI,\fR\ [\fIgroupN\fR]]] [\-l\ \fIlogin_name\fR] [\-p\ \fIpasswd\fR] [\-s\ \fIshell\fR] [\-u\ \fIuid\fR\ [\-o]] [\fB\-L\fR | \fB\-U\fR] \fIlogin\fR
.ad
.hy
.SH "DESCRIPTION"
.PP
The \fBusermod\fR command modifies the system account files to reflect the changes that are specified on the command line\&.
.SH "OPTIONS"
.PP
The options which apply to the \fBusermod\fR command are:
.IP "\fB\-c\fR \fIcomment\fR"
The new value of the user's password file comment field. It is normally
modified using the \fBchfn\fR(1) utility.
.IP "\fB\-d\fR \fIhome_dir\fR"
The user's new login directory. If the \fB\-m\fR option is given the contents
of the current home directory will be moved to the new home directory, which
is created if it does not already exist.
.IP "\fB\-e\fR \fIexpire_date\fR"
The date on which the user account will be disabled. The date is specified
in the format \fIYYYY\-MM\-DD\fR.
.IP "\fB\-f\fR \fIinactive_days\fR"
The number of days after a password expires until the account is permanently
disabled. A value of 0 disables the account as soon as the password has
expired, and a value of \-1 disables the feature. The default value is \-1.
.IP "\fB\-g\fR \fIinitial_group\fR"
The group name or number of the user's new initial login group. The group
name must exist. A group number must refer to an already existing group.
The default group number is 1.
.IP "\fB\-G\fR \fIgroup1\fR[\fI,group2,...,\fR[\fIgroupN\fR]\fR]]"
A list of supplementary groups which the user is also a member of. Each
group is separated from the next by a comma, with no intervening whitespace.
The groups are subject to the same restrictions as the group given with the
\fB\-g\fR option. If the user is currently a member of a group which is not
listed, the user will be removed from the group.
.IP "\fB\-l\fR \fIlogin_name\fR"
The name of the user will be changed from \fIlogin\fR to \fIlogin_name\fR.
Nothing else is changed. In particular, the user's home directory name
should probably be changed to reflect the new login name.
.IP "\fB\-L\fR"
Lock a user's password. This puts a '!' in front of the encrypted password,
effectively disabling the password. You can't use this option with \fI\-p\fR
or \fI\-U\fR.
.IP "\fB\-o\fR"
When used with the \fI-u\fR option, this option allows to change the user ID
to a non-unique value.
.IP "\fB\-p\fR \fIpasswd\fR"
The encrypted password, as returned by \fBcrypt\fR(3).
.IP "\fB\-s\fR \fIshell\fR"
The name of the user's new login shell. Setting this field to blank causes
the system to select the default login shell.
.IP "\fB\-u\fR \fIuid\fR"
The numerical value of the user's ID. This value must be unique, unless the
\fI\-o\fR option is used. The value must be non\-negative. Values between 0
and 99 are typically reserved for system accounts. Any files which the user
owns and which are located in the directory tree rooted at the user's home
directory will have the file user ID changed automatically. Files outside of
the user's home directory must be altered manually.
.IP "\fB\-U\fR"
Unlock a user's password. This removes the '!' in front of the encrypted
password. You can't use this option with \fI\-p\fR or \fI\-L\fR.
.SH CAVEATS
\fBusermod\fR will not allow you to change the name of a user who is
logged in. You must make certain that the named user is not executing any
processes when this command is being executed if the user's numerical user
ID is being changed. You must change the owner of any crontab files
manually. You must change the owner of any at jobs manually. You must make
any changes involving NIS on the NIS server.
.SH FILES
\fI/etc/passwd\fR \- user account information
.br
\fI/etc/shadow\fR \- secure user account information
.br
\fI/etc/group\fR \- group account information
.SH SEE ALSO
.BR chfn (1),
.BR chsh (1),
.BR passwd (1),
.BR crypt (3),
.BR groupadd (8),
.BR groupdel (8),
.BR groupmod (8),
.BR useradd (8),
.BR userdel (8)
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
.TP
\fB\-c\fR \fIcomment\fR
The new value of the user's password file comment field\&. It is normally modified using the \fBchfn\fR(1)utility\&.
.TP
\fB\-d\fR \fIhome_dir\fR
The user's new login directory\&. If the \fB\-m\fR option is given the contents of the current home directory will be moved to the new home directory, which is created if it does not already exist\&.
.TP
\fB\-e\fR \fIexpire_date\fR
The date on which the user account will be disabled\&. The date is specified in the format \fIYYYY\-MM\-DD \fR\&.
.TP
\fB\-f\fR \fIinactive_days\fR
The number of days after a password expires until the account is permanently disabled\&. A value of 0 disables the account as soon as the password has expired, and a value of \-1 disables the feature\&. The default value is \-1\&.
.TP
\fB\-g\fR \fIinitial_group\fR
The group name or number of the user's new initial login group\&. The group name must exist\&. A group number must refer to an already existing group\&. The default group number is 1\&.
.TP
\fB\-G\fR \fIgroup1\fR[\fI ,group2,\&.\&.\&., \fR [\fIgroupN\fR]]]
A list of supplementary groups which the user is also a member of\&. Each group is separated from the next by a comma, with no intervening whitespace\&. The groups are subject to the same restrictions as the group given with the \fB\-g\fR option\&. If the user is currently a member of a group which is not listed, the user will be removed from the group\&.
.TP
\fB\-l\fR \fIlogin_name\fR
The name of the user will be changed from \fIlogin \fR to \fIlogin_name\fR\&. Nothing else is changed\&. In particular, the user's home directory name should probably be changed to reflect the new login name\&.
.TP
\fB\-L\fR
Lock a user's password\&. This puts a '!' in front of the encrypted password, effectively disabling the password\&. You can't use this option with \fB\-p\fR or \fB\-U\fR\&.
.TP
\fB\-o\fR
When used with the \fB\-u\fR option, this option allows to change the user ID to a non\-unique value\&.
.TP
\fB\-p\fR \fIpasswd\fR
The encrypted password, as returned by \fBcrypt\fR(3)\&.
.TP
\fB\-s\fR \fIshell\fR
The name of the user's new login shell\&. Setting this field to blank causes the system to select the default login shell\&.
.TP
\fB\-u\fR \fIuid\fR
The numerical value of the user's ID\&. This value must be unique, unless the \fB\-o\fR option is used\&. The value must be non\-negative\&. Values between 0 and 99 are typically reserved for system accounts\&. Any files which the user owns and which are located in the directory tree rooted at the user's home directory will have the file user ID changed automatically\&. Files outside of the user's home directory must be altered manually\&.
.TP
\fB\-U\fR
Unlock a user's password\&. This removes the '!' in front of the encrypted password\&. You can't use this option with \fB\-p\fR or \fB\-L\fR\&.
.SH "CAVEATS"
.PP
\fBusermod\fR will not allow you to change the name of a user who is logged in\&. You must make certain that the named user is not executing any processes when this command is being executed if the user's numerical user ID is being changed\&. You must change the owner of any crontab files manually\&. You must change the owner of any at jobs manually\&. You must make any changes involving NIS on the NIS server\&.
.SH "FILES"
.TP
\fI/etc/passwd\fR
user account information
.TP
\fI/etc/shadow\fR
secure user account information
.TP
\fI/etc/group\fR
group account information
.SH "SEE ALSO"
.PP
\fBchfn\fR(1), \fBchsh\fR(1), \fBpasswd\fR(1), \fBcrypt\fR(3), \fBgroupadd\fR(8), \fBgroupdel\fR(8), \fBgroupmod\fR(8), \fBuseradd\fR(8), \fBuserdel\fR(8)\&.
.SH "AUTHOR"
.PP
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='usermod.8'>
<!-- $Id: usermod.8.xml,v 1.5 2005/04/28 13:57:45 kloczek Exp $ -->
<!-- $Id: usermod.8.xml,v 1.9 2005/06/16 16:01:21 kloczek Exp $ -->
<refmeta>
<refentrytitle>usermod</refentrytitle>
<manvolnum>8</manvolnum>
@@ -21,9 +21,8 @@
<arg choice='opt'>-m </arg>
</arg>
<arg choice='opt'>-e <replaceable>expire_date</replaceable></arg>
<arg choice='opt'>-f <replaceable>inactive_time</replaceable></arg>
<arg choice='opt'>-f <replaceable>inactive_days</replaceable></arg>
<arg choice='opt'>-g <replaceable>initial_group</replaceable></arg>
<sbr/>
<arg choice='opt'>
<arg choice='plain'>-G <replaceable>group1</replaceable></arg>
<arg choice='opt'>
@@ -32,7 +31,6 @@
<arg choice='opt'><replaceable>groupN</replaceable></arg>
</arg>
</arg>
<sbr/>
<arg choice='opt'>-l <replaceable>login_name</replaceable></arg>
<arg choice='opt'>-p <replaceable>passwd</replaceable></arg>
<arg choice='opt'>-s <replaceable>shell</replaceable></arg>
@@ -40,9 +38,9 @@
<arg choice='plain'>-u <replaceable>uid</replaceable></arg>
<arg choice='opt'>-o </arg>
</arg>
<sbr/>
<group choice='opt'>
<arg choice='plain'>-L </arg><arg choice='plain'>-U </arg>
<arg choice='plain'>-L </arg>
<arg choice='plain'>-U </arg>
</group>
<arg choice='plain'><replaceable>login</replaceable></arg>
</cmdsynopsis>
@@ -93,7 +91,7 @@
<option>-e</option> <replaceable>expire_date</replaceable>
</term>
<listitem>
<para>The date on which the user account will be disabled. The
<para>The date on which the user account will be disabled. The
date is specified in the format <emphasis remap='I'>YYYY-MM-DD
</emphasis>.
</para>
@@ -148,7 +146,7 @@
<para>
The name of the user will be changed from <emphasis
remap='I'>login </emphasis> to <emphasis
remap='I'>login_name</emphasis>. Nothing else is changed. In
remap='I'>login_name</emphasis>. Nothing else is changed. In
particular, the user's home directory name should probably be
changed to reflect the new login name.
</para>
@@ -231,8 +229,7 @@
<refsect1 id='caveats'>
<title>CAVEATS</title>
<para>
<command>usermod</command> will not allow you to change the name of a
<para><command>usermod</command> will not allow you to change the name of a
user who is logged in. You must make certain that the named user is
not executing any processes when this command is being executed if the
user's numerical user ID is being changed. You must change the owner
@@ -262,8 +259,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>chfn</refentrytitle><manvolnum>1</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -1,20 +1,46 @@
.\"$Id: vipw.8,v 1.10 2005/04/27 08:29:36 kloczek Exp $
.TH VIPW 8 "26 Sep 1997"
.SH NAME
vipw, vigr \- edit the password, group, shadow\-password, or shadow\-group file.
.SH SYNOPSIS
\fBvipw\fR [\fB\-s\fR]
.\"Generated by db2man.xsl. Don't modify this, modify the source.
.de Sh \" Subsection
.br
\fBvigr\fR [\fB\-s\fR]
.SH DESCRIPTION
\fBvipw\fR and \fBvigr\fR will edit the files \fI/etc/passwd\fR and
\fI/etc/group\fR, respectively. With the \fB\-s\fR flag, they will edit the
shadow versions of those files, \fI/etc/shadow\fR and \fI/etc/gshadow\fR,
respectively. The programs will set the appropriate locks to prevent file
corruption. When looking for an editor, the programs will first try the
environment variable \fB$VISUAL\fR, then the environment variable
\fB$EDITOR\fR, and finally the default editor, \fBvi\fR(1).
.if t .Sp
.ne 5
.PP
\fB\\$1\fR
.PP
..
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Ip \" List item
.br
.ie \\n(.$>=3 .ne \\$3
.el .ne 3
.IP "\\$1" \\$2
..
.TH "VIPW" 8 "26 Sep 1997" "" ""
.SH NAME
vipw, vigr \- edit the password, group, shadow-password, or shadow-group file.
.SH "SYNOPSIS"
.ad l
.hy 0
.HP 5
\fBvipw\fR [\-s]
.ad
.hy
.ad l
.hy 0
.HP 5
\fBvigr\fR [\-s]
.ad
.hy
.SH "DESCRIPTION"
.PP
\fBvipw\fR and \fBvigr\fR will edit the files \fI/etc/passwd\fR and \fI/etc/group\fR, respectively\&. With the \fB\-s\fR flag, they will edit the shadow versions of those files, \fI/etc/shadow\fR and \fI/etc/gshadow\fR, respectively\&. The programs will set the appropriate locks to prevent file corruption\&. When looking for an editor, the programs will first try the environment variable \fB$VISUAL\fR, then the environment variable \fI$EDITOR\fR, and finally the default editor, \fBvi\fR(1)\&.
.SH "SEE ALSO"
.BR group (5),
.BR passwd (5),
.BR shadow (5)
.PP
\fBgroup\fR(5), \fBpasswd\fR(5), \fBshadow\fR(5)

View File

@@ -2,7 +2,7 @@
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
<refentry id='vipw.8'>
<!-- $Id: vipw.8.xml,v 1.6 2005/04/28 13:54:06 kloczek Exp $ -->
<!-- $Id: vipw.8.xml,v 1.7 2005/06/15 12:39:27 kloczek Exp $ -->
<refentryinfo>
<date>26 Sep 1997</date>
</refentryinfo>
@@ -30,8 +30,7 @@
<refsect1 id='description'>
<title>DESCRIPTION</title>
<para>
<command>vipw</command> and <command>vigr</command> will edit the
<para><command>vipw</command> and <command>vigr</command> will edit the
files <filename>/etc/passwd</filename> and
<filename>/etc/group</filename>, respectively. With the
<option>-s</option> flag, they will edit the shadow versions of those
@@ -48,8 +47,7 @@
<refsect1 id='see_also'>
<title>SEE ALSO</title>
<para>
<citerefentry>
<para><citerefentry>
<refentrytitle>group</refentrytitle><manvolnum>5</manvolnum>
</citerefentry>,
<citerefentry>

View File

@@ -38,11 +38,7 @@ host_triplet = @host@
subdir = man/zh_CN
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
am__aclocal_m4_deps = $(top_srcdir)/configure.in
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
$(ACLOCAL_M4)
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
@@ -200,9 +196,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
exit 1;; \
esac; \
done; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/zh_CN/Makefile'; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/zh_CN/Makefile'; \
cd $(top_srcdir) && \
$(AUTOMAKE) --foreign man/zh_CN/Makefile
$(AUTOMAKE) --gnu man/zh_CN/Makefile
.PRECIOUS: Makefile
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
@case '$?' in \

View File

@@ -38,11 +38,7 @@ host_triplet = @host@
subdir = man/zh_TW
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
am__aclocal_m4_deps = $(top_srcdir)/configure.in
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
$(ACLOCAL_M4)
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
@@ -199,9 +195,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
exit 1;; \
esac; \
done; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/zh_TW/Makefile'; \
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/zh_TW/Makefile'; \
cd $(top_srcdir) && \
$(AUTOMAKE) --foreign man/zh_TW/Makefile
$(AUTOMAKE) --gnu man/zh_TW/Makefile
.PRECIOUS: Makefile
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
@case '$?' in \