[svn-upgrade] Integrating new upstream version, shadow (4.0.10)
This commit is contained in:
@@ -24,7 +24,6 @@ man_XMANS = \
|
||||
login.access.5.xml \
|
||||
login.defs.5.xml \
|
||||
logoutd.8.xml \
|
||||
mkpasswd.8.xml \
|
||||
newusers.8.xml \
|
||||
passwd.1.xml \
|
||||
passwd.5.xml \
|
||||
@@ -64,7 +63,6 @@ man_MANS = \
|
||||
login.access.5 \
|
||||
login.defs.5 \
|
||||
logoutd.8 \
|
||||
mkpasswd.8 \
|
||||
newgrp.1 \
|
||||
newusers.8 \
|
||||
passwd.1 \
|
||||
@@ -86,14 +84,15 @@ man_MANS = \
|
||||
|
||||
EXTRA_DIST = $(man_MANS) \
|
||||
$(man_XMANS) \
|
||||
id.1.xml \
|
||||
pw_auth.3.xml \
|
||||
shadowconfig.8.xml \
|
||||
sulogin.8.xml \
|
||||
id.1 \
|
||||
id.1.xml \
|
||||
pw_auth.3 \
|
||||
pw_auth.3.xml \
|
||||
shadowconfig.8 \
|
||||
sulogin.8
|
||||
shadowconfig.8.xml \
|
||||
sulogin.8 \
|
||||
sulogin.8.xml \
|
||||
sulogin.8.xml
|
||||
|
||||
all:
|
||||
|
||||
|
||||
@@ -38,11 +38,7 @@ host_triplet = @host@
|
||||
subdir = man
|
||||
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
|
||||
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
|
||||
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
|
||||
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
|
||||
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
|
||||
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
|
||||
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
|
||||
am__aclocal_m4_deps = $(top_srcdir)/configure.in
|
||||
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
|
||||
$(ACLOCAL_M4)
|
||||
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
|
||||
@@ -211,7 +207,6 @@ man_XMANS = \
|
||||
login.access.5.xml \
|
||||
login.defs.5.xml \
|
||||
logoutd.8.xml \
|
||||
mkpasswd.8.xml \
|
||||
newusers.8.xml \
|
||||
passwd.1.xml \
|
||||
passwd.5.xml \
|
||||
@@ -251,7 +246,6 @@ man_MANS = \
|
||||
login.access.5 \
|
||||
login.defs.5 \
|
||||
logoutd.8 \
|
||||
mkpasswd.8 \
|
||||
newgrp.1 \
|
||||
newusers.8 \
|
||||
passwd.1 \
|
||||
@@ -273,14 +267,15 @@ man_MANS = \
|
||||
|
||||
EXTRA_DIST = $(man_MANS) \
|
||||
$(man_XMANS) \
|
||||
id.1.xml \
|
||||
pw_auth.3.xml \
|
||||
shadowconfig.8.xml \
|
||||
sulogin.8.xml \
|
||||
id.1 \
|
||||
id.1.xml \
|
||||
pw_auth.3 \
|
||||
pw_auth.3.xml \
|
||||
shadowconfig.8 \
|
||||
sulogin.8
|
||||
shadowconfig.8.xml \
|
||||
sulogin.8 \
|
||||
sulogin.8.xml \
|
||||
sulogin.8.xml
|
||||
|
||||
all: all-recursive
|
||||
|
||||
@@ -294,9 +289,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
|
||||
exit 1;; \
|
||||
esac; \
|
||||
done; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/Makefile'; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/Makefile'; \
|
||||
cd $(top_srcdir) && \
|
||||
$(AUTOMAKE) --foreign man/Makefile
|
||||
$(AUTOMAKE) --gnu man/Makefile
|
||||
.PRECIOUS: Makefile
|
||||
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
|
||||
@case '$?' in \
|
||||
|
||||
183
man/chage.1
183
man/chage.1
@@ -1,96 +1,97 @@
|
||||
.\"$Id: chage.1,v 1.25 2005/04/26 12:22:08 kloczek Exp $
|
||||
.\" Copyright 1990 - 1994 Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH CHAGE 1
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "CHAGE" 1 "" "" ""
|
||||
.SH NAME
|
||||
chage \- change user password expiry information
|
||||
.SH SYNOPSIS
|
||||
.TP 6
|
||||
\fBchage\fR [\fB\-m\fR \fImindays\fR] [\fB\-M\fR \fImaxdays\fR] [\fB\-d\fR \fIlastday\fR] [\fB\-I\fR \fIinactive\fR]
|
||||
[\fB\-E\fR \fIexpiredate\fR] [\fB\-W\fR \fIwarndays\fR] \fIuser\fR
|
||||
.TP 6
|
||||
\fBchage\fR \fB\-l\fR \fIuser\fR
|
||||
.SH DESCRIPTION
|
||||
\fBchage\fR command changes the number of days between password changes and
|
||||
the date of the last password change. This information is used by the system
|
||||
to determine when a user must change her password.
|
||||
.SH "SYNOPSIS"
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 6
|
||||
\fBchage\fR [\fIoptions\fR] \fIuser\fR
|
||||
.ad
|
||||
.hy
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
\fBchage\fR command changes the number of days between passwordchanges and the date of the last password change\&. This information is used by the system to determine when a user must change her password\&.
|
||||
|
||||
.SH "OPTIONS"
|
||||
|
||||
.PP
|
||||
The \fBchage\fR command is restricted to the root user, except for the
|
||||
\fB\-l\fR option, which may be used by an unprivileged user to determine
|
||||
when her password or account is due to expire.
|
||||
.SH OPTIONS
|
||||
The options which apply to the \fBchage\fR command are:
|
||||
.IP "\fB\-d\fR \fIlastday\fR"
|
||||
Set the number of days since January 1st, 1970 when the password was last
|
||||
changed. The date may also be expressed in the format YYYY\-MM\-DD (or the
|
||||
format more commonly used in your area).
|
||||
.IP "\fB\-E\fR \fIexpiredate\fR"
|
||||
Set the date on which the user's account will no longer be accessible. The
|
||||
\fIexpiredate\fR option is the number of days since January 1, 1970 on which
|
||||
the accounted is locked. The date may also be expressed in the format
|
||||
YYYY\-MM\-DD (or the format more commonly used in your area). A user whose
|
||||
account is locked must contact the system administrator before being able to
|
||||
use the system again. Passing the number \fI-1\fR as the \fIexpiredate\fR will
|
||||
remove an accounts expiration date.
|
||||
.IP "\fB\-I\fR \fIinactive\fR"
|
||||
Set the number of days of inactivity after a password has expired before the
|
||||
account is locked. The \fIinactive\fR option is the number of days of
|
||||
inactivity. A value of 0 disables this feature. A user whose account is
|
||||
locked must contact the system administrator before being able to use the
|
||||
system again.
|
||||
.IP "\fB\-m\fR \fImindays\fR"
|
||||
Set the minimum number of days between password changes. A value of zero for
|
||||
this field indicates that the user may change her password at any time.
|
||||
.IP "\fB\-M\fR \fImaxdays\fR"
|
||||
Set maximum number of days during which a password is valid. When
|
||||
\fImaxdays\fR plus \fIlastday\fR is less than the current day, the user will
|
||||
be required to change her password before being able to use her account.
|
||||
This occurrence can be planned for in advance by use of the \fB\-W\fR option,
|
||||
which provides the user with advance warning.
|
||||
.IP "\fB\-W\fR \fIwarndays\fR"
|
||||
Set the number of days of warning before a password change is required. The
|
||||
\fIwarndays\fR option is the number of days prior to the password expiring
|
||||
that a user will be warned her password is about to expire.
|
||||
|
||||
.TP
|
||||
\fB\-d\fR, \fB\-\-lastday\fR \fILAST_DAY\fR
|
||||
Set the number of days since January 1st, 1970 when the password was last changed\&. The date may also be expressed in the format YYYY\-MM\-DD (or the format more commonly used in your area)\&.
|
||||
|
||||
.TP
|
||||
\fB\-E\fR, \fB\-\-expiredate\fR \fIEXPIRE_DATE\fR
|
||||
Set the date on which the user's account will no longer be accessible\&. The \fIEXPIRE_DATE\fR option is the number of days since January 1, 1970 on which the accounted is locked\&. The date may also be expressed in the format YYYY\-MM\-DD (or the format more commonly used in your area)\&. A user whose account is locked must contact the system administrator before being able to use the system again\&. Passing the number \fI\-1\fR as the \fIEXPIRE_DATE\fR will remove an accounts expiration date\&.
|
||||
|
||||
.TP
|
||||
\fB\-I\fR, \fB\-\-inactive\fR \fIINACTIVE\fR
|
||||
Set the number of days of inactivity after a password has expired before the account is locked\&. The \fIINACTIVE\fR option is the number of days of inactivity\&. A value of 0 disables this feature\&. A user whose account is locked must contact the system administrator before being able to use the system again\&.
|
||||
|
||||
.TP
|
||||
\fB\-l\fR, \fB\-\-list\fR
|
||||
Show account aging information\&.
|
||||
|
||||
.TP
|
||||
\fB\-m\fR, \fB\-\-mindays\fR \fIMIN_DAYS\fR
|
||||
Set the minimum number of days between password changes\&. A value of zero for this field indicates that the user may change her password at any time\&.
|
||||
|
||||
.TP
|
||||
\fB\-M\fR, \fB\-\-maxdays\fR \fIMAX_DAYS\fR
|
||||
Set maximum number of days during which a password is valid\&. When \fIMAX_DAYS\fR plus \fILAST_DAY\fR is less than the current day, the user will be required to change her password before being able to use her account\&. This occurrence can be planned for in advance by use of the \fB\-W\fR option, which provides the user with advance warning\&.
|
||||
|
||||
.TP
|
||||
\fB\-W\fR, \fBwarndays\fR \fIWARN_DAYS\fR
|
||||
Set the number of days of warning before a password change is required\&. The \fIWARN_DAYS\fR option is the number of days prior to the password expiring that a user will be warned her password is about to expire\&.
|
||||
|
||||
.PP
|
||||
If none of the options are selected, \fBchage\fR operates in an interactive
|
||||
fashion, prompting the user with the current values for all of the fields.
|
||||
Enter the new value to change the field, or leave the line blank to use the
|
||||
current value. The current value is displayed between a pair of \fB[ ]\fR
|
||||
marks.
|
||||
.SH NOTE
|
||||
The \fBchage\fR program requires shadow password file to be available.
|
||||
Its functionality is not available when passwords are stored in the
|
||||
passwd file.
|
||||
.SH FILES
|
||||
\fI/etc/passwd\fR \- user account information
|
||||
.br
|
||||
\fI/etc/shadow\fR \- secure user account information
|
||||
.SH SEE ALSO
|
||||
.BR passwd (5),
|
||||
.BR shadow (5)
|
||||
.SH AUTHOR
|
||||
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
|
||||
If none of the options are selected, \fBchage\fR operates in an interactive fashion, prompting the user with the current values for all of the fields\&. Enter the new value to change the field, or leave the line blank to use the current value\&. The current value is displayed between a pair of \fI[ ]\fR marks\&.
|
||||
|
||||
.SH "NOTE"
|
||||
|
||||
.PP
|
||||
The \fBchage\fR program requires shadow password file to be available\&. Its functionality is not available when passwords are stored in the passwd file\&.
|
||||
|
||||
.PP
|
||||
The \fBchage\fR command is restricted to the root user, except for the \fB\-l\fR option, which may be used by an unprivileged user to determine when her password or account is due to expire\&.
|
||||
|
||||
.SH "FILES"
|
||||
|
||||
.TP
|
||||
\fI/etc/passwd\fR
|
||||
user account information
|
||||
.TP
|
||||
\fI/etc/shadow\fR
|
||||
secure user account information
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
\fBpasswd\fR(5), \fBshadow\fR(5)\&.
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
Julianne Frances Haugh <jockgrrl@ix\&.netcom\&.com>
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='chage.1'>
|
||||
<!-- $Id: chage.1.xml,v 1.7 2005/04/26 12:31:14 kloczek Exp $ -->
|
||||
<!-- $Id: chage.1.xml,v 1.10 2005/06/15 12:39:27 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>chage</refentrytitle>
|
||||
<manvolnum>1</manvolnum>
|
||||
@@ -14,20 +14,11 @@
|
||||
</refnamediv>
|
||||
<refsynopsisdiv id='synopsis'>
|
||||
<cmdsynopsis>
|
||||
<command>chage</command>
|
||||
<arg choice='opt'>-m <replaceable>mindays</replaceable></arg>
|
||||
<arg choice='opt'>-M <replaceable>maxdays</replaceable></arg>
|
||||
<arg choice='opt'>-d <replaceable>lastday</replaceable></arg>
|
||||
<arg choice='opt'>-I <replaceable>inactive</replaceable></arg>
|
||||
<sbr/>
|
||||
<arg choice='opt'>-E <replaceable>expiredate</replaceable></arg>
|
||||
<arg choice='opt'>-W <replaceable>warndays</replaceable></arg>
|
||||
<arg choice='plain'><replaceable>user</replaceable></arg>
|
||||
</cmdsynopsis>
|
||||
<cmdsynopsis>
|
||||
<command>chage</command>
|
||||
<arg choice='plain'>-l <replaceable>user</replaceable>
|
||||
<command>chage</command>
|
||||
<arg choice='opt'>
|
||||
<replaceable>options</replaceable>
|
||||
</arg>
|
||||
<arg choice='plain'><replaceable>user</replaceable></arg>
|
||||
</cmdsynopsis>
|
||||
</refsynopsisdiv>
|
||||
|
||||
@@ -38,11 +29,6 @@
|
||||
This information is used by the system to determine when a user must
|
||||
change her password.
|
||||
</para>
|
||||
<para>The <command>chage</command> command is restricted to the root
|
||||
user, except for the <option>-l</option> option, which may be used by
|
||||
an unprivileged user to determine when her password or account is due
|
||||
to expire.
|
||||
</para>
|
||||
</refsect1>
|
||||
|
||||
<refsect1 id='options'>
|
||||
@@ -53,7 +39,7 @@
|
||||
<variablelist remap='IP'>
|
||||
<varlistentry>
|
||||
<term>
|
||||
<option>-d</option> <replaceable>lastday</replaceable>
|
||||
<option>-d</option>, <option>--lastday</option> <replaceable>LAST_DAY</replaceable>
|
||||
</term>
|
||||
<listitem>
|
||||
<para>
|
||||
@@ -65,31 +51,31 @@
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term>
|
||||
<option>-E</option> <replaceable>expiredate</replaceable>
|
||||
<option>-E</option>, <option>--expiredate</option> <replaceable>EXPIRE_DATE</replaceable>
|
||||
</term>
|
||||
<listitem>
|
||||
<para>Set the date on which the user's account will no longer be
|
||||
accessible. The <emphasis remap='I'>expiredate</emphasis> option
|
||||
accessible. The <emphasis remap='I'>EXPIRE_DATE</emphasis> option
|
||||
is the number of days since January 1, 1970 on which the
|
||||
accounted is locked. The date may also be expressed in the
|
||||
format YYYY-MM-DD (or the format more commonly used in your
|
||||
area). A user whose account is locked must contact the system
|
||||
administrator before being able to use the system again. Passing
|
||||
the number <emphasis remap='I'>-1</emphasis> as the <emphasis
|
||||
remap='I'>expiredate</emphasis> will remove an accounts
|
||||
remap='I'>EXPIRE_DATE</emphasis> will remove an accounts
|
||||
expiration date.
|
||||
</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term>
|
||||
<option>-I</option> <replaceable>inactive</replaceable>
|
||||
<option>-I</option>, <option>--inactive</option> <replaceable>INACTIVE</replaceable>
|
||||
</term>
|
||||
<listitem>
|
||||
<para>
|
||||
Set the number of days of inactivity after a password has
|
||||
expired before the account is locked. The <emphasis
|
||||
remap='I'>inactive</emphasis> option is the number of days of
|
||||
remap='I'>INACTIVE</emphasis> option is the number of days of
|
||||
inactivity. A value of 0 disables this feature. A user whose
|
||||
account is locked must contact the system administrator before
|
||||
being able to use the system again.
|
||||
@@ -98,7 +84,17 @@
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term>
|
||||
<option>-m</option> <replaceable>mindays</replaceable>
|
||||
<option>-l</option>, <option>--list</option>
|
||||
</term>
|
||||
<listitem>
|
||||
<para>
|
||||
Show account aging information.
|
||||
</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term>
|
||||
<option>-m</option>, <option>--mindays</option> <replaceable>MIN_DAYS</replaceable>
|
||||
</term>
|
||||
<listitem>
|
||||
<para>
|
||||
@@ -110,15 +106,15 @@
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term>
|
||||
<option>-M</option> <replaceable>maxdays</replaceable>
|
||||
<option>-M</option>, <option>--maxdays</option> <replaceable>MAX_DAYS</replaceable>
|
||||
</term>
|
||||
<listitem>
|
||||
<para>
|
||||
Set maximum number of days during which a password is valid.
|
||||
When <emphasis remap='I'>maxdays</emphasis> plus <emphasis
|
||||
remap='I'>lastday</emphasis> is less than the current day, the
|
||||
Set maximum number of days during which a password is valid.
|
||||
When <emphasis remap='I'>MAX_DAYS</emphasis> plus <emphasis
|
||||
remap='I'>LAST_DAY</emphasis> is less than the current day, the
|
||||
user will be required to change her password before being able
|
||||
to use her account. This occurrence can be planned for in
|
||||
to use her account. This occurrence can be planned for in
|
||||
advance by use of the <option>-W</option> option, which provides
|
||||
the user with advance warning.
|
||||
</para>
|
||||
@@ -126,12 +122,12 @@
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term>
|
||||
<option>-W</option> <replaceable>warndays</replaceable>
|
||||
<option>-W</option>, <option>warndays</option> <replaceable>WARN_DAYS</replaceable>
|
||||
</term>
|
||||
<listitem>
|
||||
<para>
|
||||
Set the number of days of warning before a password change is
|
||||
required. The <emphasis remap='I'>warndays</emphasis> option is
|
||||
required. The <emphasis remap='I'>WARN_DAYS</emphasis> option is
|
||||
the number of days prior to the password expiring that a user
|
||||
will be warned her password is about to expire.
|
||||
</para>
|
||||
@@ -141,7 +137,7 @@
|
||||
<para>
|
||||
If none of the options are selected, <command>chage</command> operates
|
||||
in an interactive fashion, prompting the user with the current values
|
||||
for all of the fields. Enter the new value to change the field, or
|
||||
for all of the fields. Enter the new value to change the field, or
|
||||
leave the line blank to use the current value. The current value is
|
||||
displayed between a pair of <emphasis remap='B'>[ ]</emphasis> marks.
|
||||
</para>
|
||||
@@ -150,9 +146,14 @@
|
||||
<title>NOTE</title>
|
||||
<para>
|
||||
The <command>chage</command> program requires shadow password file to
|
||||
be available. Its functionality is not available when passwords are
|
||||
be available. Its functionality is not available when passwords are
|
||||
stored in the passwd file.
|
||||
</para>
|
||||
<para>The <command>chage</command> command is restricted to the root
|
||||
user, except for the <option>-l</option> option, which may be used by
|
||||
an unprivileged user to determine when her password or account is due
|
||||
to expire.
|
||||
</para>
|
||||
</refsect1>
|
||||
|
||||
<refsect1 id='files'>
|
||||
@@ -176,8 +177,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>passwd</refentrytitle><manvolnum>5</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
110
man/chfn.1
110
man/chfn.1
@@ -1,59 +1,59 @@
|
||||
.\"$Id: chfn.1,v 1.15 2005/04/05 18:47:50 kloczek Exp $
|
||||
.\" Copyright 1990 - 1994 Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH CHFN 1
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "CHFN" 1 "" "" ""
|
||||
.SH NAME
|
||||
chfn \- change real user name and information
|
||||
.SH SYNOPSIS
|
||||
.TP 5
|
||||
\fBchfn\fR
|
||||
[\fB\-f\fR \fIfull_name\fR] [\fB\-r\fR \fIroom_no\fR] [\fB\-w\fR \fIwork_ph\fR] [\fB\-h\fR \fIhome_ph\fR] [\fB\-o\fR \fIother\fR]
|
||||
[\fIuser\fR]
|
||||
.SH DESCRIPTION
|
||||
\fBchfn\fR changes user fullname, office number, office extension, and home
|
||||
phone number information for a user's account. This information is
|
||||
typically printed by \fBfinger\fR(1) and similar programs. A normal user
|
||||
may only change the fields for her own account, the super user may change
|
||||
the fields for any account. Also, only the super user may use the \fB\-o\fR
|
||||
option to change the undefined portions of the GECOS field.
|
||||
.SH "SYNOPSIS"
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 5
|
||||
\fBchfn\fR [\-f\ \fIfull_name\fR] [\-r\ \fIroom_no\fR] [\-w\ \fIwork_ph\fR] [\-h\ \fIhome_ph\fR] [\-o\ \fIother\fR] [\fIuser\fR]
|
||||
.ad
|
||||
.hy
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
The only restriction placed on the contents of the fields is that no control
|
||||
characters may be present, nor any of comma, colon, or equal sign. The
|
||||
\fIother\fR field does not have this restriction, and is used to store
|
||||
accounting information used by other applications.
|
||||
\fBchfn\fR changes user fullname, office number, office extension, and home phone number information for a user's account\&. This information is typically printed by \fBfinger\fR(1) and similar programs\&. A normal user may only change may only change the fields for her own account, subject to the restrictions in \fI/etc/login\&.defs\fR\&. (The default configuration is to prevent users from changing their fullname\&.) The super user may change any field for any account\&. Additionally, only the super user may use the \fB\-o\fR option to change the undefined portions of the GECOS field\&.
|
||||
|
||||
.PP
|
||||
If none of the options are selected, \fBchfn\fR operates in an interactive
|
||||
fashion, prompting the user with the current values for all of the fields.
|
||||
Enter the new value to change the field, or leave the line blank to use the
|
||||
current value. The current value is displayed between a pair of \fB[ ]\fR
|
||||
marks. Without options, chfn prompts for the current user account.
|
||||
.SH FILES
|
||||
\fI/etc/passwd\fR \- user account information
|
||||
.SH SEE ALSO
|
||||
.BR passwd (5)
|
||||
.SH AUTHOR
|
||||
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
|
||||
The only restriction placed on the contents of the fields is that no control characters may be present, nor any of comma, colon, or equal sign\&. The \fIother\fR field does not have this restriction, and is used to store accounting information used by other applications\&.
|
||||
|
||||
.PP
|
||||
If none of the options are selected, \fBchfn\fR operates in an interactive fashion, prompting the user with the current values for all of the fields\&. Enter the new value to change the field, or leave the line blank to use the current value\&. The current value is displayed between a pair of \fI[ ]\fR marks\&. Without options, chfn prompts for the current user account\&.
|
||||
|
||||
.SH "FILES"
|
||||
|
||||
.TP
|
||||
\fI/etc/passwd\fR
|
||||
user account information
|
||||
.TP
|
||||
\fI/etc/login\&.defs\fR
|
||||
runtime configuration
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
\fBpasswd\fR(5)
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
Julianne Frances Haugh <jockgrrl@ix\&.netcom\&.com>
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='chfn.1'>
|
||||
<!-- $Id: chfn.1.xml,v 1.8 2005/04/27 16:19:48 kloczek Exp $ -->
|
||||
<!-- $Id: chfn.1.xml,v 1.11 2005/06/14 20:18:17 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>chfn</refentrytitle>
|
||||
<manvolnum>1</manvolnum>
|
||||
@@ -30,12 +30,14 @@
|
||||
<para><command>chfn</command> changes user fullname, office number,
|
||||
office extension, and home phone number information for a user's
|
||||
account. This information is typically printed by <citerefentry>
|
||||
<refentrytitle>finger</refentrytitle><manvolnum>1</manvolnum>
|
||||
<refentrytitle>finger</refentrytitle><manvolnum>1</manvolnum>
|
||||
</citerefentry> and similar programs. A normal user may only change
|
||||
the fields for her own account, the super user may change the fields
|
||||
for any account. Also, only the super user may use the
|
||||
<option>-o</option> option to change the undefined portions of the
|
||||
GECOS field.
|
||||
may only change the fields for her own account, subject to the
|
||||
restrictions in <filename>/etc/login.defs</filename>. (The default
|
||||
configuration is to prevent users from changing their fullname.) The
|
||||
super user may change any field for any account. Additionally, only
|
||||
the super user may use the <option>-o</option> option to change the
|
||||
undefined portions of the GECOS field.
|
||||
</para>
|
||||
|
||||
<para>The only restriction placed on the contents of the fields is that
|
||||
@@ -62,13 +64,16 @@
|
||||
<term><filename>/etc/passwd</filename></term>
|
||||
<listitem>user account information</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><filename>/etc/login.defs</filename></term>
|
||||
<listitem>runtime configuration</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
</refsect1>
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>passwd</refentrytitle><manvolnum>5</manvolnum>
|
||||
</citerefentry>
|
||||
</para>
|
||||
|
||||
129
man/chpasswd.8
129
man/chpasswd.8
@@ -1,61 +1,76 @@
|
||||
.\"$Id: chpasswd.8,v 1.18 2005/04/02 16:10:23 kloczek Exp $
|
||||
.\" Copyright 1991, Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH CHPASSWD 8
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "CHPASSWD" 8 "" "" ""
|
||||
.SH NAME
|
||||
chpasswd \- update passwords in batch mode
|
||||
.SH SYNOPSIS
|
||||
\fBchpasswd\fR [\fBoptions\fR]
|
||||
.SH DESCRIPTION
|
||||
\fBchpasswd\fR reads a list of user name and password pairs from standard
|
||||
input and uses this information to update a group of existing users. Each
|
||||
line is of the format:
|
||||
.sp 1
|
||||
\fIuser_name\fR:\fIpassword\fR
|
||||
.sp 1
|
||||
By default the supplied password must be in clear\-text. Default encription
|
||||
algoritm is DES. Also the password age will be updated, if present.
|
||||
.SH "SYNOPSIS"
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 9
|
||||
\fBchpasswd\fR [\fIoptions\fR]
|
||||
.ad
|
||||
.hy
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
\fBchpasswd\fR reads a list of user name and password pairs from standard input and uses this information to update a group of existing users\&. Each line is of the format:
|
||||
|
||||
.PP
|
||||
\fIuser_name\fR:\fIpassword\fR
|
||||
|
||||
.PP
|
||||
By default the supplied password must be in clear\-text\&. Default encription algoritm is DES\&. Also the password age will be updated, if present\&.
|
||||
|
||||
.PP
|
||||
This command is intended to be used in a large system environment where many accounts are created at a single time\&.
|
||||
|
||||
.SH "OPTIONS"
|
||||
|
||||
.PP
|
||||
This command is intended to be used in a large system environment where many
|
||||
accounts are created at a single time.
|
||||
.SH OPTIONS
|
||||
The options which apply to the \fBchpasswd\fR command are:
|
||||
.IP "\fB\-e\fR, \fB\-\-encrypted\fR"
|
||||
Supplied passwords are in encrypted form.
|
||||
.IP "\fB\-h\fR, \fB\-\-help\fR"
|
||||
Display help message and exit.
|
||||
.IP "\fB\-m\fR, \fB\-\-md5\fR"
|
||||
Use MD5 encryption instead DES when the supplied passwords are not encrypted.
|
||||
.SH CAVEATS
|
||||
Remember keep protected for reading by others fille passed to standard input
|
||||
\fBchpasswd\fR command if it contains unencrypted passwords.
|
||||
.SH SEE ALSO
|
||||
.BR passwd (1),
|
||||
.BR newusers (8),
|
||||
.BR useradd (8)
|
||||
.SH AUTHOR
|
||||
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||
|
||||
.TP
|
||||
\fB\-e\fR, \fB\-\-encrypted\fR
|
||||
Supplied passwords are in encrypted form\&.
|
||||
|
||||
.TP
|
||||
\fB\-h\fR, \fB\-\-help\fR
|
||||
Display help message and exit\&.
|
||||
|
||||
.TP
|
||||
\fB\-m\fR, \fB\-\-md5\fR
|
||||
Use MD5 encryption instead DES when the supplied passwords are not encrypted\&.
|
||||
|
||||
.SH "CAVEATS"
|
||||
|
||||
.PP
|
||||
Remember keep protected for reading by others fille passed to standard input \fBchpasswd\fR command if it contains unencrypted passwords\&.
|
||||
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
\fBpasswd\fR(1), \fBnewusers\fR(8), \fBuseradd\fR(8)
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='chpasswd.8'>
|
||||
<!-- $Id: chpasswd.8.xml,v 1.6 2005/04/27 16:22:25 kloczek Exp $ -->
|
||||
<!-- $Id: chpasswd.8.xml,v 1.8 2005/06/16 15:42:19 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>chpasswd</refentrytitle>
|
||||
<manvolnum>8</manvolnum>
|
||||
@@ -23,8 +23,7 @@
|
||||
|
||||
<refsect1 id='description'>
|
||||
<title>DESCRIPTION</title>
|
||||
<para>
|
||||
<command>chpasswd</command> reads a list of user name and password
|
||||
<para><command>chpasswd</command> reads a list of user name and password
|
||||
pairs from standard input and uses this information to update a group
|
||||
of existing users. Each line is of the format:
|
||||
</para>
|
||||
@@ -81,8 +80,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>passwd</refentrytitle><manvolnum>1</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
115
man/chsh.1
115
man/chsh.1
@@ -1,62 +1,61 @@
|
||||
.\"$Id: chsh.1,v 1.13 2005/04/02 16:10:23 kloczek Exp $
|
||||
.\" Copyright 1990, Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH CHSH 1
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "CHSH" 1 "" "" ""
|
||||
.SH NAME
|
||||
chsh \- change login shell
|
||||
.SH SYNOPSIS
|
||||
.TP 5
|
||||
\fBchsh\fR [\fB\-s\fR \fIlogin_shell\fR] [\fIuser\fR]
|
||||
.SH DESCRIPTION
|
||||
\fBchsh\fR changes the user login shell. This determines the name of the
|
||||
user's initial login command. A normal user may only change the login shell
|
||||
for her own account, the super user may change the login shell for any
|
||||
account.
|
||||
.SH "SYNOPSIS"
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 5
|
||||
\fBchsh\fR [\-s\ \fIlogin_shell\fR] [\fIuser\fR]
|
||||
.ad
|
||||
.hy
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
The only restrictions placed on the login shell is that the command name
|
||||
must be listed in \fI/etc/shells\fR, unless the invoker is the super\-user,
|
||||
and then any value may be added. An account with a restricted login shell
|
||||
may not change her login shell. For this reason, placing \fB/bin/rsh\fR in
|
||||
\fI/etc/shells\fR is discouraged since accidentally changing to a restricted
|
||||
shell would prevent the user from every changing her login shell back to its
|
||||
original value.
|
||||
\fBchsh\fR changes the user login shell\&. This determines the name of the user's initial login command\&. A normal user may only change the login shell for her own account, the super user may change the login shell for any account\&.
|
||||
|
||||
.PP
|
||||
.SH OPTIONS
|
||||
If the \fB\-s\fR option is not selected, \fBchsh\fR operates in an
|
||||
interactive fashion, prompting the user with the current login shell. Enter
|
||||
the new value to change the shell, or leave the line blank to use the
|
||||
current one. The current shell is displayed between a pair of \fB[ ]\fR
|
||||
marks.
|
||||
.SH FILES
|
||||
\fI/etc/passwd\fR \- user account information
|
||||
.br
|
||||
\fI/etc/shells\fR \- list of valid login shells
|
||||
.SH SEE ALSO
|
||||
.BR chfn (1),
|
||||
.BR passwd (5)
|
||||
.SH AUTHOR
|
||||
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
|
||||
The only restrictions placed on the login shell is that the command name must be listed in \fI/etc/shells\fR, unless the invoker is the super\-user, and then any value may be added\&. An account with a restricted login shell may not change her login shell\&. For this reason, placing \fI/bin/rsh\fR in \fI/etc/shells\fR is discouraged since accidentally changing to a restricted shell would prevent the user from every changing her login shell back to its original value\&.
|
||||
|
||||
.SH "OPTIONS"
|
||||
|
||||
.PP
|
||||
If the \fB\-s\fR option is not selected, \fBchsh\fR operates in an interactive fashion, prompting the user with the current login shell\&. Enter the new value to change the shell, or leave the line blank to use the current one\&. The current shell is displayed between a pair of \fI[ ]\fR marks\&.
|
||||
|
||||
.SH "FILES"
|
||||
|
||||
.TP
|
||||
\fI/etc/passwd\fR
|
||||
user account information
|
||||
.TP
|
||||
\fI/etc/shells\fR
|
||||
list of valid login shells
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
\fBchfn\fR(1), \fBpasswd\fR(5)
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
Julianne Frances Haugh <jockgrrl@ix\&.netcom\&.com>
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='chsh1'>
|
||||
<!-- $Id: chsh.1.xml,v 1.6 2005/04/27 16:24:09 kloczek Exp $ -->
|
||||
<!-- $Id: chsh.1.xml,v 1.8 2005/06/16 15:43:48 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>chsh</refentrytitle>
|
||||
<manvolnum>1</manvolnum>
|
||||
@@ -24,8 +24,7 @@
|
||||
|
||||
<refsect1 id='description'>
|
||||
<title>DESCRIPTION</title>
|
||||
<para>
|
||||
<command>chsh</command> changes the user login shell. This determines
|
||||
<para><command>chsh</command> changes the user login shell. This determines
|
||||
the name of the user's initial login command. A normal user may only
|
||||
change the login shell for her own account, the super user may change
|
||||
the login shell for any account.
|
||||
@@ -69,8 +68,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>chfn</refentrytitle><manvolnum>1</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
@@ -38,11 +38,7 @@ host_triplet = @host@
|
||||
subdir = man/cs
|
||||
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
|
||||
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
|
||||
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
|
||||
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
|
||||
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
|
||||
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
|
||||
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
|
||||
am__aclocal_m4_deps = $(top_srcdir)/configure.in
|
||||
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
|
||||
$(ACLOCAL_M4)
|
||||
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
|
||||
@@ -197,9 +193,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
|
||||
exit 1;; \
|
||||
esac; \
|
||||
done; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/cs/Makefile'; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/cs/Makefile'; \
|
||||
cd $(top_srcdir) && \
|
||||
$(AUTOMAKE) --foreign man/cs/Makefile
|
||||
$(AUTOMAKE) --gnu man/cs/Makefile
|
||||
.PRECIOUS: Makefile
|
||||
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
|
||||
@case '$?' in \
|
||||
|
||||
@@ -38,11 +38,7 @@ host_triplet = @host@
|
||||
subdir = man/de
|
||||
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
|
||||
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
|
||||
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
|
||||
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
|
||||
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
|
||||
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
|
||||
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
|
||||
am__aclocal_m4_deps = $(top_srcdir)/configure.in
|
||||
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
|
||||
$(ACLOCAL_M4)
|
||||
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
|
||||
@@ -199,9 +195,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
|
||||
exit 1;; \
|
||||
esac; \
|
||||
done; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/de/Makefile'; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/de/Makefile'; \
|
||||
cd $(top_srcdir) && \
|
||||
$(AUTOMAKE) --foreign man/de/Makefile
|
||||
$(AUTOMAKE) --gnu man/de/Makefile
|
||||
.PRECIOUS: Makefile
|
||||
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
|
||||
@case '$?' in \
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
.\" $Id: passwd.1,v 1.7 2005/04/18 12:29:07 kloczek Exp $
|
||||
.\" $Id: passwd.1,v 1.8 2005/06/02 09:48:14 kloczek Exp $
|
||||
.\" Copyright 1989 - 1994, Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
@@ -25,6 +25,9 @@
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" Translation based on http://cvs.pld.org.pl/shadow/man/passwd.1
|
||||
.\" (Version 1.25)
|
||||
.TH PASSWD 1
|
||||
.SH BEZEICHNUNG
|
||||
passwd \- <20>ndert das Passwort eines Nutzers
|
||||
|
||||
@@ -38,11 +38,7 @@ host_triplet = @host@
|
||||
subdir = man/es
|
||||
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
|
||||
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
|
||||
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
|
||||
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
|
||||
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
|
||||
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
|
||||
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
|
||||
am__aclocal_m4_deps = $(top_srcdir)/configure.in
|
||||
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
|
||||
$(ACLOCAL_M4)
|
||||
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
|
||||
@@ -191,9 +187,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
|
||||
exit 1;; \
|
||||
esac; \
|
||||
done; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/es/Makefile'; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/es/Makefile'; \
|
||||
cd $(top_srcdir) && \
|
||||
$(AUTOMAKE) --foreign man/es/Makefile
|
||||
$(AUTOMAKE) --gnu man/es/Makefile
|
||||
.PRECIOUS: Makefile
|
||||
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
|
||||
@case '$?' in \
|
||||
|
||||
96
man/expiry.1
96
man/expiry.1
@@ -1,47 +1,53 @@
|
||||
.\"$Id: expiry.1,v 1.8 2005/04/12 16:31:06 kloczek Exp $
|
||||
.\" Copyright 1990 - 1994 Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\" Modified for expiry by Ben Collins <bcollins@debian.org>, 1999
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.TH EXPIRY 1
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "EXPIRY" 1 "" "" ""
|
||||
.SH NAME
|
||||
expiry \- check and enforce password expiration policy
|
||||
.SH SYNOPSIS
|
||||
.TP 6
|
||||
\fBexpiry\fR [\fB\-c\fR] [\fB\-f\fR]
|
||||
.SH DESCRIPTION
|
||||
\fBexpiry\fR checks (\fB\-c\fR) the current password expiration and forces
|
||||
(\fB\-f\fR) changes when required. It is callable as a normal user command.
|
||||
.SH FILES
|
||||
\fI/etc/passwd\fR \- user account information
|
||||
.br
|
||||
\fI/etc/shadow\fR \- secure user account information
|
||||
.SH SEE ALSO
|
||||
.BR passwd (5),
|
||||
.BR shadow (5)
|
||||
.SH AUTHOR
|
||||
Ben Collins <bcollins@debian.org>
|
||||
.SH "SYNOPSIS"
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 7
|
||||
\fBexpiry\fR [\-c] [\-f]
|
||||
.ad
|
||||
.hy
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
\fBexpiry\fR checks (\fB\-c\fR) the current password expiration and forces (\fB\-f\fR) changes when required\&. It is callable as a normal user command\&.
|
||||
|
||||
.SH "FILES"
|
||||
|
||||
.TP
|
||||
\fI/etc/passwd\fR
|
||||
user account information
|
||||
.TP
|
||||
\fI/etc/shadow\fR
|
||||
secure user account information
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
\fBpasswd\fR(5), \fBshadow\fR(5)
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
Ben Collins <bcollins@debian\&.org>
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='expiry.1'>
|
||||
<!-- $Id: expiry.1.xml,v 1.6 2005/04/27 16:25:27 kloczek Exp $ -->
|
||||
<!-- $Id: expiry.1.xml,v 1.8 2005/06/14 20:18:17 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>expiry</refentrytitle>
|
||||
<manvolnum>1</manvolnum>
|
||||
@@ -23,8 +23,7 @@
|
||||
|
||||
<refsect1 id='description'>
|
||||
<title>DESCRIPTION</title>
|
||||
<para>
|
||||
<command>expiry</command> checks (<option>-c</option>) the current
|
||||
<para><command>expiry</command> checks (<option>-c</option>) the current
|
||||
password expiration and forces (<option>-f</option>) changes when
|
||||
required. It is callable as a normal user command.
|
||||
</para>
|
||||
@@ -46,8 +45,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>passwd</refentrytitle><manvolnum>5</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
103
man/faillog.5
103
man/faillog.5
@@ -1,54 +1,55 @@
|
||||
.\"$Id: faillog.5,v 1.10 2005/04/02 16:10:23 kloczek Exp $
|
||||
.\" Copyright 1989 - 1994, Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH FAILLOG 5
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "FAILLOG" 5 "" "" ""
|
||||
.SH NAME
|
||||
faillog \- Login failure logging file
|
||||
.SH DESCRIPTION
|
||||
\fI/var/log/faillog\fR maintains a count of login failures and the limits
|
||||
for each account. The file is fixed length record, indexed by numerical UID.
|
||||
Each record contains the count of login failures since the last successful
|
||||
login; the maximum number of failures before the account is disabled; the
|
||||
line the last login failure occured on; and the date the last login failure
|
||||
occured.
|
||||
.PP
|
||||
The structure of the file is
|
||||
.DS
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
\fI/var/log/faillog\fR maintains a count of login failures and the limits for each account\&. The file is fixed length record, indexed by numerical UID\&. Each record contains the count of login failures since the last successful login; the maximum number of failures before the account is disabled; the line the last login failure occured on; and the date the last login failure occured\&.
|
||||
|
||||
.PP
|
||||
The structure of the file is:
|
||||
|
||||
.nf
|
||||
|
||||
struct faillog {
|
||||
short fail_cnt;
|
||||
short fail_max;
|
||||
char fail_line[12];
|
||||
time_t fail_time;
|
||||
};
|
||||
.fi
|
||||
|
||||
.SH "FILES"
|
||||
|
||||
.TP
|
||||
\fI/var/log/faillog\fR
|
||||
login failure log
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
\fBfaillog\fR(8)
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
||||
|
||||
struct faillog {
|
||||
short fail_cnt;
|
||||
short fail_max;
|
||||
char fail_line[12];
|
||||
time_t fail_time;
|
||||
};
|
||||
.DE
|
||||
.SH FILES
|
||||
\fI/var/log/faillog\fR \- login failure log
|
||||
.SH SEE ALSO
|
||||
.BR faillog (8)
|
||||
.SH AUTHOR
|
||||
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='faillog.5'>
|
||||
<!-- $Id: faillog.5.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
|
||||
<!-- $Id: faillog.5.xml,v 1.7 2005/06/16 15:49:42 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>faillog</refentrytitle>
|
||||
<manvolnum>5</manvolnum>
|
||||
@@ -14,8 +14,7 @@
|
||||
|
||||
<refsect1 id='description'>
|
||||
<title>DESCRIPTION</title>
|
||||
<para>
|
||||
<filename>/var/log/faillog</filename> maintains a count of login
|
||||
<para><filename>/var/log/faillog</filename> maintains a count of login
|
||||
failures and the limits for each account. The file is fixed length
|
||||
record, indexed by numerical UID. Each record contains the count of
|
||||
login failures since the last successful login; the maximum number of
|
||||
@@ -23,15 +22,14 @@
|
||||
failure occured on; and the date the last login failure occured.
|
||||
</para>
|
||||
|
||||
<para>The structure of the file is</para>
|
||||
<literallayout remap='DS'>
|
||||
struct faillog {
|
||||
short fail_cnt;
|
||||
short fail_max;
|
||||
char fail_line[12];
|
||||
time_t fail_time;
|
||||
};
|
||||
</literallayout>
|
||||
<para>The structure of the file is:</para>
|
||||
<programlisting>
|
||||
struct faillog {
|
||||
short fail_cnt;
|
||||
short fail_max;
|
||||
char fail_line[12];
|
||||
time_t fail_time;
|
||||
};</programlisting>
|
||||
</refsect1>
|
||||
|
||||
<refsect1 id='files'>
|
||||
@@ -46,8 +44,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>faillog</refentrytitle><manvolnum>8</manvolnum>
|
||||
</citerefentry>
|
||||
</para>
|
||||
|
||||
156
man/faillog.8
156
man/faillog.8
@@ -1,74 +1,88 @@
|
||||
.\" $Id: faillog.8,v 1.19 2005/04/09 17:09:56 kloczek Exp $
|
||||
.\" Copyright 1989 - 1994, Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH FAILLOG 8
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "FAILLOG" 8 "" "" ""
|
||||
.SH NAME
|
||||
faillog \- display faillog records or set login failure limits
|
||||
.SH SYNOPSIS
|
||||
.TP 6
|
||||
\fBfaillog\fR [\fBoptions\fR]
|
||||
.SH DESCRIPTION
|
||||
\fBfaillog\fR formats the contents of the failure log from \fI/var/log/faillog\fR
|
||||
database. It also can be used for maintains failure counters and limits.
|
||||
Run \fBfaillog\fR without arguments display only list of user faillog records
|
||||
who have ever had a login failure.
|
||||
.SH OPTIONS
|
||||
.SH "SYNOPSIS"
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 8
|
||||
\fBfaillog\fR [\fIoptions\fR]
|
||||
.ad
|
||||
.hy
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
\fBfaillog\fR formats the contents of the failure log from \fI/var/log/faillog\fR database\&. It also can be used for maintains failure counters and limits\&. Run \fBfaillog\fR without arguments display only list of user faillog records who have ever had a login failure\&.
|
||||
|
||||
.SH "OPTIONS"
|
||||
|
||||
.PP
|
||||
The options which apply to the \fBfaillog\fR command are:
|
||||
.IP "\fB\-a\fR, \fB\-\-all\fR"
|
||||
Display faillog records for all users.
|
||||
.IP "\fB\-h\fR, \fB\-\-help\fR"
|
||||
Display help message and exit.
|
||||
.IP "\fB\-l\fR, \fB\-\-lock\-time\fR \fISEC\fR"
|
||||
Lock accout to \fISEC\fR seconds after failed login.
|
||||
.IP "\fB\-m\fR, \fB\-\-maximum\fR \fIMAX\fR"
|
||||
Set maiximum number of login failures after the account is disabled to
|
||||
\fIMAX\fR. Selecting \fIMAX\fR value of 0 has the effect of not placing a
|
||||
limit on the number of failed logins. The maximum failure count should
|
||||
always be 0 for \fBroot\fR to prevent a denial of services attack against
|
||||
the system.
|
||||
.IP "\fB\-r\fR, \fB\-\-reset\fR"
|
||||
Reset the counters of login failures or one recor if used with \-u
|
||||
\fILOGIN\fR option. Write access to \fI/var/log/faillog\fR is required for
|
||||
this option.
|
||||
.IP "\fB\-t\fR, \fB\-\-time\fR \fIDAYS\fR"
|
||||
Display faillog records more recent than \fIDAYS\fR. The \fB\-t\fR flag
|
||||
overrides the use of \fB\-u\fR.
|
||||
.IP "\fB\-u\fR, \fB\-\-user\fR \fILOGIN\fR"
|
||||
Display faillog record or maintains failure counters and limits (if used
|
||||
with \fB\-l\fR, \fB\-m\fR or \fB\-r\fR options) only for user with \fILOGIN\fR.
|
||||
.SH CAVEATS
|
||||
\fBfaillog\fR only prints out users with no successful login since the last
|
||||
failure. To print out a user who has had a successful login since their last
|
||||
failure, you must explicitly request the user with the \fB\-u\fR flag, or
|
||||
print out all users with the \fB\-a\fR flag.
|
||||
.SH FILES
|
||||
\fI/var/log/faillog\fR \- failure logging file
|
||||
.SH SEE ALSO
|
||||
.BR login (1),
|
||||
.BR faillog (5)
|
||||
.SH AUTHOR
|
||||
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||
|
||||
.TP
|
||||
\fB\-a\fR, \fB\-\-all\fR
|
||||
Display faillog records for all users\&.
|
||||
|
||||
.TP
|
||||
\fB\-h\fR, \fB\-\-help\fR
|
||||
Display help message and exit\&.
|
||||
|
||||
.TP
|
||||
\fB\-l\fR, \fB\-\-lock\-time\fR \fISEC\fR
|
||||
Lock accout to \fISEC\fR seconds after failed login\&.
|
||||
|
||||
.TP
|
||||
\fB\-m\fR, \fB\-\-maximum\fR \fIMAX\fR
|
||||
Set maiximum number of login failures after the account is disabled to \fIMAX\fR\&. Selecting \fIMAX\fR value of 0 has the effect of not placing a limit on the number of failed logins\&. The maximum failure count should always be 0 for \fIroot\fR to prevent a denial of services attack against the system\&.
|
||||
|
||||
.TP
|
||||
\fB\-r\fR, \fB\-\-reset\fR
|
||||
Reset the counters of login failures or one recor if used with \-u \fILOGIN\fR option\&. Write access to \fI/var/log/faillog\fR is required for this option\&.
|
||||
|
||||
.TP
|
||||
\fB\-t\fR, \fB\-\-time\fR \fIDAYS\fR
|
||||
Display faillog records more recent than \fIDAYS\fR\&. The \fB\-t\fR flag overrides the use of \fB\-u\fR\&.
|
||||
|
||||
.TP
|
||||
\fB\-u\fR, \fB\-\-user\fR \fILOGIN\fR
|
||||
Display faillog record or maintains failure counters and limits (if used with \fB\-l\fR, \fB\-m\fR or \fB\-r\fR options) only for user with \fILOGIN\fR\&.
|
||||
|
||||
.SH "CAVEATS"
|
||||
|
||||
.PP
|
||||
\fBfaillog\fR only prints out users with no successful login since the last failure\&. To print out a user who has had a successful login since their last failure, you must explicitly request the user with the \fB\-u\fR flag, or print out all users with the \fB\-a\fR flag\&.
|
||||
|
||||
.SH "FILES"
|
||||
|
||||
.TP
|
||||
\fI/var/log/faillog\fR
|
||||
failure logging file
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
\fBlogin\fR(1), \fBfaillog\fR(5)
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='faillog.8'>
|
||||
<!-- $Id: faillog.8.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
|
||||
<!-- $Id: faillog.8.xml,v 1.9 2005/06/16 15:50:30 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>faillog</refentrytitle>
|
||||
<manvolnum>8</manvolnum>
|
||||
@@ -23,10 +23,9 @@
|
||||
|
||||
<refsect1 id='description'>
|
||||
<title>DESCRIPTION</title>
|
||||
<para>
|
||||
<command>faillog</command> formats the contents of the failure log
|
||||
<para><command>faillog</command> formats the contents of the failure log
|
||||
from <filename>/var/log/faillog</filename> database. It also can be
|
||||
used for maintains failure counters and limits. Run
|
||||
used for maintains failure counters and limits. Run
|
||||
<command>faillog</command> without arguments display only list of user
|
||||
faillog records who have ever had a login failure.
|
||||
</para>
|
||||
@@ -119,8 +118,7 @@
|
||||
|
||||
<refsect1 id='caveats'>
|
||||
<title>CAVEATS</title>
|
||||
<para>
|
||||
<command>faillog</command> only prints out users with no successful
|
||||
<para><command>faillog</command> only prints out users with no successful
|
||||
login since the last failure. To print out a user who has had a
|
||||
successful login since their last failure, you must explicitly request
|
||||
the user with the <option>-u</option> flag, or print out all users
|
||||
@@ -140,8 +138,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>login</refentrytitle><manvolnum>1</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
@@ -38,11 +38,7 @@ host_triplet = @host@
|
||||
subdir = man/fr
|
||||
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
|
||||
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
|
||||
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
|
||||
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
|
||||
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
|
||||
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
|
||||
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
|
||||
am__aclocal_m4_deps = $(top_srcdir)/configure.in
|
||||
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
|
||||
$(ACLOCAL_M4)
|
||||
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
|
||||
@@ -204,9 +200,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
|
||||
exit 1;; \
|
||||
esac; \
|
||||
done; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/fr/Makefile'; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/fr/Makefile'; \
|
||||
cd $(top_srcdir) && \
|
||||
$(AUTOMAKE) --foreign man/fr/Makefile
|
||||
$(AUTOMAKE) --gnu man/fr/Makefile
|
||||
.PRECIOUS: Makefile
|
||||
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
|
||||
@case '$?' in \
|
||||
|
||||
137
man/gpasswd.1
137
man/gpasswd.1
@@ -1,56 +1,91 @@
|
||||
.\"$Id: gpasswd.1,v 1.17 2005/04/12 17:55:55 kloczek Exp $
|
||||
.\" Copyright 1996, Rafal Maszkowski <rzm@pdi.net>
|
||||
.\" All rights reserved. You can redistribute this man page and/or
|
||||
.\" modify it under the terms of the GNU General Public License as
|
||||
.\" published by the Free Software Foundation; either version 2 of the
|
||||
.\" License, or (at your option) any later version.
|
||||
.\"
|
||||
.TH GPASSWD 1
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "GPASSWD" 1 "" "" ""
|
||||
.SH NAME
|
||||
gpasswd \- administer the /etc/group file
|
||||
.br
|
||||
.SH SYNOPSIS
|
||||
.TP 6
|
||||
.SH "SYNOPSIS"
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 8
|
||||
\fBgpasswd\fR \fIgroup\fR
|
||||
.br
|
||||
\fBgpasswd \-a\fR \fIuser\fR \fIgroup\fR
|
||||
.br
|
||||
\fBgpasswd \-d\fR \fIuser\fR \fIgroup\fR
|
||||
.br
|
||||
\fBgpasswd \-R\fR \fIgroup\fR
|
||||
.br
|
||||
\fBgpasswd \-r\fR \fIgroup\fR
|
||||
.br
|
||||
\fBgpasswd\fR [\fB\-A\fR \fIuser\fR,...] [\fB\-M\fR \fIuser\fR,...] \fIgroup\fR
|
||||
.SH DESCRIPTION
|
||||
\fBgpasswd\fR is used to administer the \fI/etc/group\fR file (and
|
||||
\fI/etc/gshadow\fR file if compiled with SHADOWGRP defined). Every group can
|
||||
have administrators, members and a password. System administrator can use
|
||||
\fB\-A\fR option to define group administrator(s) and \fB\-M\fR option to
|
||||
define members and has all rights of group administrators and members.
|
||||
.SH OPTIONS
|
||||
.ad
|
||||
.hy
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 8
|
||||
\fBgpasswd\fR \-a\ \fIuser\fR \fIgroup\fR
|
||||
.ad
|
||||
.hy
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 8
|
||||
\fBgpasswd\fR \-d\ \fIuser\fR \fIgroup\fR
|
||||
.ad
|
||||
.hy
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 8
|
||||
\fBgpasswd\fR \-R\ \fIgroup\fR
|
||||
.ad
|
||||
.hy
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 8
|
||||
\fBgpasswd\fR \-r\ \fIgroup\fR
|
||||
.ad
|
||||
.hy
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 8
|
||||
\fBgpasswd\fR [\-A\ \fIuser,\fR...] [\-M\ \fIuser,\fR...] \fIgroup\fR
|
||||
.ad
|
||||
.hy
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
Group administrator can add and delete users using \fB\-a\fR and \fB\-d\fR
|
||||
options respectively. Administrators can use \fB\-r\fR option to remove group
|
||||
password. When no password is set only group members can use \fBnewgrp\fR to
|
||||
join the group. Option \fB\-R\fR disables access via a password to the group
|
||||
through \fBnewgrp\fR command (however members will still be able to switch to
|
||||
this group).
|
||||
\fBgpasswd\fR is used to administer the \fI/etc/group\fR file (and \fI/etc/gshadow\fR file if compiled with SHADOWGRP defined)\&. Every group can have administrators, members and a password\&. System administrator can use \fB\-A\fR option to define group administrator(s) and \fB\-M\fR option to define members and has all rights of group administrators and members\&.
|
||||
|
||||
.SH "OPTIONS"
|
||||
|
||||
.PP
|
||||
\fBgpasswd\fR called by a group administrator with group name only prompts
|
||||
for the group password. If password is set the members can still
|
||||
\fBnewgrp\fR(1) without a password, non\-members must supply the password.
|
||||
.SH FILES
|
||||
\fI/etc/group\fR \- group account information
|
||||
.br
|
||||
\fI/etc/gshadow\fR \- shadow group information
|
||||
.SH SEE ALSO
|
||||
.BR newgrp (1),
|
||||
.BR groupadd (8),
|
||||
.BR groupdel (8),
|
||||
.BR groupmod (8),
|
||||
.BR grpck (8),
|
||||
.BR group (5),
|
||||
.BR gshadow (5)
|
||||
.SH AUTHOR
|
||||
Rafal Maszkowski <rzm@pdi.net>
|
||||
Group administrator can add and delete users using \fB\-a\fR and \fB\-d\fR options respectively\&. Administrators can use \fB\-r\fR option to remove group password\&. When no password is set only group members can use \fBnewgrp\fR to join the group\&. Option \fB\-R\fR disables access via a password to the group through \fBnewgrp\fR command (however members will still be able to switch to this group)\&.
|
||||
|
||||
.PP
|
||||
\fBgpasswd\fR called by a group administrator with group name only prompts for the group password\&. If password is set the members can still \fBnewgrp\fR(1) without a password, non\-members must supply the password\&.
|
||||
|
||||
.SH "FILES"
|
||||
|
||||
.TP
|
||||
\fI/etc/group\fR
|
||||
group account information
|
||||
.TP
|
||||
\fI/etc/gshadow\fR
|
||||
secure group account information
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
\fBnewgrp\fR(1), \fBgroupadd\fR(8), \fBgroupdel\fR(8), \fBgroupmod\fR(8), \fBgrpck\fR(8), \fBgroup\fR(5), \fBgshadow\fR(5)
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
Rafal Maszkowski <rzm@pdi\&.net>
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='gpasswd1'>
|
||||
<!-- $Id: gpasswd.1.xml,v 1.7 2005/04/27 18:20:35 kloczek Exp $ -->
|
||||
<!-- $Id: gpasswd.1.xml,v 1.9 2005/06/14 20:18:17 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>gpasswd</refentrytitle>
|
||||
<manvolnum>1</manvolnum>
|
||||
@@ -48,8 +48,7 @@
|
||||
|
||||
<refsect1 id='description'>
|
||||
<title>DESCRIPTION</title>
|
||||
<para>
|
||||
<command>gpasswd</command> is used to administer the
|
||||
<para><command>gpasswd</command> is used to administer the
|
||||
<filename>/etc/group</filename> file (and
|
||||
<filename>/etc/gshadow</filename> file if compiled with SHADOWGRP
|
||||
defined). Every group can have administrators, members and a password.
|
||||
@@ -67,7 +66,7 @@
|
||||
<option>-r</option> option to remove group password. When no password
|
||||
is set only group members can use <command>newgrp</command> to join
|
||||
the group. Option <option>-R</option> disables access via a password
|
||||
to the group through <command>newgrp</coamand> command (however
|
||||
to the group through <command>newgrp</command> command (however
|
||||
members will still be able to switch to this group).
|
||||
</para>
|
||||
|
||||
@@ -95,8 +94,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>newgrp</refentrytitle><manvolnum>1</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
162
man/groupadd.8
162
man/groupadd.8
@@ -1,78 +1,90 @@
|
||||
.\"$Id: groupadd.8,v 1.24 2005/04/05 18:47:50 kloczek Exp $
|
||||
.\" Copyright 1991, Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH GROUPADD 8
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "GROUPADD" 8 "" "" ""
|
||||
.SH NAME
|
||||
groupadd \- Create a new group
|
||||
.SH SYNOPSIS
|
||||
.TP 6
|
||||
\fBgroupadd\fR [\fB\-g\fR \fIgid \fR[\fB\-o\fR]] [\fB\-f\fR] \fIgroup\fR
|
||||
.SH DESCRIPTION
|
||||
The \fBgroupadd\fR command creates a new group account using the values
|
||||
specified on the command line and the default values from the system. The
|
||||
new group will be entered into the system files as needed.
|
||||
.SH OPTIONS
|
||||
.SH "SYNOPSIS"
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 9
|
||||
\fBgroupadd\fR [\-g\ \fIgid\fR\ [\-o]] [\-f] \fIgroup\fR
|
||||
.ad
|
||||
.hy
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
The \fBgroupadd\fR command creates a new group account using the values specified on the command line and the default values from the system\&. The new group will be entered into the system files as needed\&.
|
||||
|
||||
.SH "OPTIONS"
|
||||
|
||||
.PP
|
||||
The options which apply to the \fBgroupadd\fR command are:
|
||||
.IP "\fB\-f\fR"
|
||||
This option causes to just exit with success status if the specified
|
||||
group already exists. With \fB\-g\fR, if specified gid already exists,
|
||||
other (unique) gid is chosen (i.e. \fB\-g\fR is turned off).
|
||||
.IP "\fB\-g\fR \fIgid\fR"
|
||||
The numerical value of the group's ID. This value must be unique, unless the
|
||||
\fB\-o\fR option is used. The value must be non\-negative. The default is to
|
||||
use the smallest ID value greater than 999 and greater than every other
|
||||
group. Values between 0 and 999 are typically reserved for system accounts.
|
||||
.SH FILES
|
||||
\fI/etc/group\fR \- group account information
|
||||
.br
|
||||
\fI/etc/gshadow\fR \- secure group account information
|
||||
.SH EXIT VALUES
|
||||
.TP 2
|
||||
The \fBgroupadd\fR command exits with the following values:
|
||||
.br
|
||||
\fB0\fR \- success
|
||||
.br
|
||||
\fB2\fR \- invalid command syntax
|
||||
.br
|
||||
\fB3\fR \- invalid argument to option
|
||||
.br
|
||||
\fB4\fR \- gid not unique (when \-o not used)
|
||||
.br
|
||||
\fB9\fR \- group name not unique
|
||||
.br
|
||||
\fB10\fR \- can't update group file
|
||||
.SH SEE ALSO
|
||||
.BR chfn (1),
|
||||
.BR chsh (1),
|
||||
.BR passwd (1),
|
||||
.BR groupdel (8),
|
||||
.BR groupmod (8),
|
||||
.BR useradd (8),
|
||||
.BR userdel (8),
|
||||
.BR usermod (8)
|
||||
.SH AUTHOR
|
||||
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||
|
||||
.TP
|
||||
\fB\-f\fR
|
||||
This option causes to just exit with success status if the specified group already exists\&. With \fB\-g\fR, if specified gid already exists, other (unique) gid is chosen (i\&.e\&. \fB\-g\fR is turned off)\&.
|
||||
|
||||
.TP
|
||||
\fB\-g\fR \fIgid\fR
|
||||
The numerical value of the group's ID\&. This value must be unique, unless the \fB\-o\fR option is used\&. The value must be non\-negative\&. The default is to use the smallest ID value greater than 999 and greater than every other group\&. Values between 0 and 999 are typically reserved for system accounts\&.
|
||||
|
||||
.SH "FILES"
|
||||
|
||||
.TP
|
||||
\fI/etc/group\fR
|
||||
group account information
|
||||
.TP
|
||||
\fI/etc/gshadow\fR
|
||||
secure group account information
|
||||
.SH "EXIT VALUES"
|
||||
|
||||
.PP
|
||||
The \fBgroupadd\fR command exits with the following values:
|
||||
|
||||
.TP
|
||||
\fI0\fR
|
||||
success
|
||||
.TP
|
||||
\fI2\fR
|
||||
invalid command syntax
|
||||
.TP
|
||||
\fI3\fR
|
||||
invalid argument to option
|
||||
.TP
|
||||
\fI4\fR
|
||||
gid not unique (when \-o not used)
|
||||
.TP
|
||||
\fI9\fR
|
||||
group name not unique
|
||||
.TP
|
||||
\fI10\fR
|
||||
can't update group file
|
||||
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
\fBchfn\fR(1), \fBchsh\fR(1), \fBpasswd\fR(1), \fBgroupdel\fR(8), \fBgroupmod\fR(8), \fBuseradd\fR(8), \fBuserdel\fR(8), \fBusermod\fR(8)
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='groupadd.8'>
|
||||
<!-- $Id: groupadd.8.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
|
||||
<!-- $Id: groupadd.8.xml,v 1.8 2005/06/16 16:18:27 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>groupadd</refentrytitle>
|
||||
<manvolnum>8</manvolnum>
|
||||
@@ -87,36 +87,40 @@
|
||||
|
||||
<refsect1 id='exit_values'>
|
||||
<title>EXIT VALUES</title>
|
||||
<variablelist remap='TP'>
|
||||
<varlistentry>
|
||||
<term>
|
||||
The <command>groupadd</command> command exits with the
|
||||
following values:
|
||||
</term>
|
||||
<listitem>
|
||||
<!-- .br -->
|
||||
<para>
|
||||
<literal>0</literal> - success
|
||||
<!-- .br -->
|
||||
<literal>2</literal> - invalid command syntax
|
||||
<!-- .br -->
|
||||
<literal>3</literal> - invalid argument to option
|
||||
<!-- .br -->
|
||||
<literal>4</literal> - gid not unique (when -o not
|
||||
used) <!-- .br -->
|
||||
<literal>9</literal> - group name not unique
|
||||
<!-- .br -->
|
||||
<literal>10</literal> - can't update group file
|
||||
</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
<para>
|
||||
The <command>groupadd</command> command exits with the following values:
|
||||
<variablelist>
|
||||
<varlistentry>
|
||||
<term><replaceable>0</replaceable></term>
|
||||
<listitem>success</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>2</replaceable></term>
|
||||
<listitem>invalid command syntax</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>3</replaceable></term>
|
||||
<listitem>invalid argument to option</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>4</replaceable></term>
|
||||
<listitem>gid not unique (when -o not used)</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>9</replaceable></term>
|
||||
<listitem>group name not unique</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>10</replaceable></term>
|
||||
<listitem>can't update group file</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
</para>
|
||||
</refsect1>
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>chfn</refentrytitle><manvolnum>1</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
140
man/groupdel.8
140
man/groupdel.8
@@ -1,69 +1,79 @@
|
||||
.\"$Id: groupdel.8,v 1.14 2005/04/12 17:55:55 kloczek Exp $
|
||||
.\" Copyright 1991 - 1993, Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH GROUPDEL 8
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "GROUPDEL" 8 "" "" ""
|
||||
.SH NAME
|
||||
groupdel \- Delete a group
|
||||
.SH SYNOPSIS
|
||||
.SH "SYNOPSIS"
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 9
|
||||
\fBgroupdel\fR \fIgroup\fR
|
||||
.SH DESCRIPTION
|
||||
The \fBgroupdel\fR command modifies the system account files, deleting all
|
||||
entries that refer to \fIgroup\fR. The named group must exist.
|
||||
.ad
|
||||
.hy
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
You must manually check all filesystems to insure that no files remain with
|
||||
the named group as the file group ID.
|
||||
.SH CAVEATS
|
||||
You may not remove the primary group of any existing user. You must remove
|
||||
the user before you remove the group.
|
||||
.SH FILES
|
||||
\fI/etc/group\fR \- group account information
|
||||
.br
|
||||
\fI/etc/gshadow\fR \- secure group information
|
||||
.SH EXIT VALUES
|
||||
.TP 2
|
||||
The \fBgroupdel\fR command exits with the following values:
|
||||
.br
|
||||
\fB0\fR \- success
|
||||
.br
|
||||
\fB2\fR \- invalid command syntax
|
||||
.br
|
||||
\fB6\fR \- specified group doesn't exist
|
||||
.br
|
||||
\fB8\fR \- can't remove user's primary group
|
||||
.br
|
||||
\fB10\fR \- can't update group file
|
||||
.SH SEE ALSO
|
||||
.BR chfn (1),
|
||||
.BR chsh (1),
|
||||
.BR passwd (1),
|
||||
.BR groupadd (8),
|
||||
.BR groupmod (8),
|
||||
.BR useradd (8),
|
||||
.BR userdel (8),
|
||||
.BR usermod (8)
|
||||
.SH AUTHOR
|
||||
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||
The \fBgroupdel\fR command modifies the system account files, deleting all entries that refer to \fIgroup\fR\&. The named group must exist\&.
|
||||
|
||||
.PP
|
||||
You must manually check all filesystems to insure that no files remain with the named group as the file group ID\&.
|
||||
|
||||
.SH "CAVEATS"
|
||||
|
||||
.PP
|
||||
You may not remove the primary group of any existing user\&. You must remove the user before you remove the group\&.
|
||||
|
||||
.SH "FILES"
|
||||
|
||||
.TP
|
||||
\fI/etc/group\fR
|
||||
group account information
|
||||
.TP
|
||||
\fI/etc/gshadow\fR
|
||||
secure group account information
|
||||
.SH "EXIT VALUES"
|
||||
|
||||
.PP
|
||||
The \fBgroupdel\fR command exits with the following values:
|
||||
|
||||
.TP
|
||||
\fI0\fR
|
||||
success
|
||||
.TP
|
||||
\fI2\fR
|
||||
invalid command syntax
|
||||
.TP
|
||||
\fI8\fR
|
||||
can't remove user's primary group
|
||||
.TP
|
||||
\fI10\fR
|
||||
can't update group file
|
||||
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
\fBchfn\fR(1), \fBchsh\fR(1), \fBpasswd\fR(1), \fBgroupadd\fR(8), \fBgroupmod\fR(8), \fBuseradd\fR(8), \fBuserdel\fR(8), \fBusermod\fR(8)
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='groupdel.8'>
|
||||
<!-- $Id: groupdel.8.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
|
||||
<!-- $Id: groupdel.8.xml,v 1.7 2005/06/16 16:26:19 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>groupdel</refentrytitle>
|
||||
<manvolnum>8</manvolnum>
|
||||
@@ -53,37 +53,35 @@
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
</refsect1>
|
||||
|
||||
|
||||
<refsect1 id='exit_values'>
|
||||
<title>EXIT VALUES</title>
|
||||
<variablelist remap='TP'>
|
||||
<varlistentry>
|
||||
<term>
|
||||
The <command>groupdel</command> command exits with the
|
||||
following values:
|
||||
</term>
|
||||
<listitem>
|
||||
<!-- .br -->
|
||||
<para>
|
||||
<literal>0</literal> - success
|
||||
<!-- .br -->
|
||||
<literal>2</literal> - invalid command syntax
|
||||
<!-- .br -->
|
||||
<literal>6</literal> - specified group doesn't exist
|
||||
<!-- .br -->
|
||||
<literal>8</literal> - can't remove user's primary
|
||||
group <!-- .br -->
|
||||
<literal>10</literal> - can't update group file
|
||||
</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
<para>
|
||||
The <command>groupdel</command> command exits with the following values:
|
||||
<variablelist>
|
||||
<varlistentry>
|
||||
<term><replaceable>0</replaceable></term>
|
||||
<listitem>success</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>2</replaceable></term>
|
||||
<listitem>invalid command syntax</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>8</replaceable></term>
|
||||
<listitem>can't remove user's primary group</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>10</replaceable></term>
|
||||
<listitem>can't update group file</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
</para>
|
||||
</refsect1>
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>chfn</refentrytitle><manvolnum>1</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='groupmems.8'>
|
||||
<!-- $Id: groupmems.8.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
|
||||
<!-- $Id: groupmems.8.xml,v 1.7 2005/06/15 12:39:27 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>groupmems</refentrytitle>
|
||||
<manvolnum>8</manvolnum>
|
||||
@@ -29,7 +29,7 @@
|
||||
<para>
|
||||
The <command>groupmems</command> utility allows a user to administer
|
||||
his/her own group membership list without the requirement of super
|
||||
user privileges. The <command>groupmems</command> utility is for
|
||||
user privileges. The <command>groupmems</command> utility is for
|
||||
systems that configure its users to be in their own name sake primary
|
||||
group (i.e., guest / guest).
|
||||
</para>
|
||||
@@ -118,8 +118,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>chfn</refentrytitle><manvolnum>1</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
164
man/groupmod.8
164
man/groupmod.8
@@ -1,77 +1,93 @@
|
||||
.\"$Id: groupmod.8,v 1.20 2005/04/12 17:55:55 kloczek Exp $
|
||||
.\" Copyright 1991, Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH GROUPMOD 8
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "GROUPMOD" 8 "" "" ""
|
||||
.SH NAME
|
||||
groupmod \- modify a group
|
||||
.SH SYNOPSIS
|
||||
\fBgroupmod\fR [\fB\-g\fR \fIgid\fR [\fB\-o\fR]] [\fB\-n\fR \fInew_group_name\fR]
|
||||
\fIgroup\fR
|
||||
.SH DESCRIPTION
|
||||
The \fBgroupmod\fR command modifies the system account files to reflect the
|
||||
changes that are specified on the command line.
|
||||
.SH OPTIONS
|
||||
.SH "SYNOPSIS"
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 9
|
||||
\fBgroupmod\fR [\-g\ \fIgid\fR\ [\-o]] [\-n\ \fInew_group_name\fR] \fIgroup\fR
|
||||
.ad
|
||||
.hy
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
The \fBgroupmod\fR command modifies the system account files to reflect the changes that are specified on the command line\&.
|
||||
|
||||
.SH "OPTIONS"
|
||||
|
||||
.PP
|
||||
The options which apply to the \fBgroupmod\fR command are:
|
||||
.IP "\fB\-g\fR \fIgid\fR"
|
||||
The numerical value of the group's ID. This value must be unique, unless the
|
||||
\fB\-o\fR option is used. The value must be non\-negative. Values between 0
|
||||
and 999 are typically reserved for system groups. Any files which the old
|
||||
group ID is the file group ID must have the file group ID changed manually.
|
||||
.IP "\fB\-n\fR \fInew_group_name\fR"
|
||||
The name of the group will be changed from \fIgroup\fR to \fInew_group_name\fR.
|
||||
.SH FILES
|
||||
\fI/etc/group\fR \- group account information
|
||||
.br
|
||||
\fI/etc/gshadow\fR \- secure group information
|
||||
.SH EXIT VALUES
|
||||
.TP 2
|
||||
The \fBgroupmod\fR command exits with the following values:
|
||||
.br
|
||||
\fB0\fR \- success
|
||||
.br
|
||||
\fB2\fR \- bad command syntax
|
||||
.br
|
||||
\fB3\fR \- invalid argument to option
|
||||
.br
|
||||
\fB4\fR \- gid already in use (and no \-o)
|
||||
.br
|
||||
\fB6\fR \- specified group doesn't exist
|
||||
.br
|
||||
\fB9\fR \- group name already in use
|
||||
.br
|
||||
\fB10\fR \- can't update group file
|
||||
.SH SEE ALSO
|
||||
.BR chfn (1),
|
||||
.BR chsh (1),
|
||||
.BR passwd (1),
|
||||
.BR groupadd (8),
|
||||
.BR groupdel (8),
|
||||
.BR useradd (8),
|
||||
.BR userdel (8),
|
||||
.BR usermod (8)
|
||||
.SH AUTHOR
|
||||
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||
|
||||
.TP
|
||||
\fB\-g\fR \fIgid\fR
|
||||
The numerical value of the group's ID\&. This value must be unique, unless the \fB\-o\fR option is used\&. The value must be non\-negative\&. Values between 0 and 999 are typically reserved for system groups\&. Any files which the old group ID is the file group ID must have the file group ID changed manually\&.
|
||||
|
||||
.TP
|
||||
\fB\-n\fR \fInew_group_name\fR
|
||||
The name of the group will be changed from \fIgroup\fR to \fInew_group_name\fR\&.
|
||||
|
||||
.SH "FILES"
|
||||
|
||||
.TP
|
||||
\fI/etc/group\fR
|
||||
group account information
|
||||
.TP
|
||||
\fI/etc/gshadow\fR
|
||||
secure group account information
|
||||
.SH "EXIT VALUES"
|
||||
|
||||
.PP
|
||||
The \fBgroupmod\fR command exits with the following values:
|
||||
|
||||
.TP
|
||||
\fI0\fR
|
||||
success
|
||||
.TP
|
||||
\fI2\fR
|
||||
invalid command syntax
|
||||
.TP
|
||||
\fI3\fR
|
||||
invalid argument to option
|
||||
.TP
|
||||
\fI4\fR
|
||||
specified group doesn't exist
|
||||
.TP
|
||||
\fI6\fR
|
||||
specified group doesn't exist
|
||||
.TP
|
||||
\fI9\fR
|
||||
group name already in use
|
||||
.TP
|
||||
\fI10\fR
|
||||
can't update group file
|
||||
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
\fBchfn\fR(1), \fBchsh\fR(1), \fBpasswd\fR(1), \fBgroupadd\fR(8), \fBgroupdel\fR(8), \fBuseradd\fR(8), \fBuserdel\fR(8), \fBusermod\fR(8)
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='groupmod.8'>
|
||||
<!-- $Id: groupmod.8.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
|
||||
<!-- $Id: groupmod.8.xml,v 1.7 2005/06/16 16:26:19 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>groupmod</refentrytitle>
|
||||
<manvolnum>8</manvolnum>
|
||||
@@ -80,38 +80,44 @@
|
||||
|
||||
<refsect1 id='exit_values'>
|
||||
<title>EXIT VALUES</title>
|
||||
<variablelist remap='TP'>
|
||||
<varlistentry>
|
||||
<term>
|
||||
The <command>groupmod</command> command exits with the
|
||||
following values:
|
||||
</term>
|
||||
<listitem>
|
||||
<!-- .br -->
|
||||
<para>
|
||||
<literal>0</literal> - success
|
||||
<!-- .br -->
|
||||
<literal>2</literal> - bad command syntax
|
||||
<!-- .br -->
|
||||
<literal>3</literal> - invalid argument to option
|
||||
<!-- .br -->
|
||||
<literal>4</literal> - gid already in use (and no -o)
|
||||
<!-- .br -->
|
||||
<literal>6</literal> - specified group doesn't exist
|
||||
<!-- .br -->
|
||||
<literal>9</literal> - group name already in use
|
||||
<!-- .br -->
|
||||
<literal>10</literal> - can't update group file
|
||||
</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
<para>
|
||||
The <command>groupmod</command> command exits with the following values:
|
||||
<variablelist>
|
||||
<varlistentry>
|
||||
<term><replaceable>0</replaceable></term>
|
||||
<listitem>success</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>2</replaceable></term>
|
||||
<listitem>invalid command syntax</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>3</replaceable></term>
|
||||
<listitem>invalid argument to option</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>4</replaceable></term>
|
||||
<listitem>specified group doesn't exist</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>6</replaceable></term>
|
||||
<listitem>specified group doesn't exist</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>9</replaceable></term>
|
||||
<listitem>group name already in use</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>10</replaceable></term>
|
||||
<listitem>can't update group file</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
</para>
|
||||
</refsect1>
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>chfn</refentrytitle><manvolnum>1</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
103
man/groups.1
103
man/groups.1
@@ -1,52 +1,55 @@
|
||||
.\"$Id: groups.1,v 1.14 2005/04/12 17:55:55 kloczek Exp $
|
||||
.\" Copyright 1991 - 1994, Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH GROUPS 1
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "GROUPS" 1 "" "" ""
|
||||
.SH NAME
|
||||
groups \- display current group names
|
||||
.SH SYNOPSIS
|
||||
\fBgroups\fR
|
||||
[\fIuser\fR]
|
||||
.SH DESCRIPTION
|
||||
\fBgroups\fR displays the current group names or ID values. If the value
|
||||
does not have a corresponding entry in \fI/etc/group\fR, the value will be
|
||||
displayed as the numerical group value. The optional \fIuser\fR parameter
|
||||
will display the groups for the named \fIuser\fR.
|
||||
.SH NOTE
|
||||
Systems which do not support concurrent group sets will have the information
|
||||
from \fI/etc/group\fR reported.
|
||||
The user must use \fBnewgrp\fR or \fBsg\fR to change their current real and
|
||||
effective group ID.
|
||||
.SH FILES
|
||||
\fI/etc/group\fR \- group account information
|
||||
.SH SEE ALSO
|
||||
.BR newgrp (1),
|
||||
.BR getgid (2),
|
||||
.BR getgroups (2),
|
||||
.BR getuid (2)
|
||||
.SH AUTHOR
|
||||
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
|
||||
.SH "SYNOPSIS"
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 7
|
||||
\fBgroups\fR [\fIuser\fR]
|
||||
.ad
|
||||
.hy
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
\fBgroups\fR displays the current group names or ID values\&. If the value does not have a corresponding entry in \fI/etc/group\fR, the value will be displayed as the numerical group value\&. The optional \fIuser\fR parameter will display the groups for the named \fIuser\fR\&.
|
||||
|
||||
.SH "NOTE"
|
||||
|
||||
.PP
|
||||
Systems which do not support concurrent group sets will have the information from \fI/etc/group\fR reported\&. The user must use \fBnewgrp\fR or \fBsg\fR to change their current real and effective group ID\&.
|
||||
|
||||
.SH "FILES"
|
||||
|
||||
.TP
|
||||
\fI/etc/group\fR
|
||||
group account information
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
\fBnewgrp\fR(1), \fBgetgid\fR(2), \fBgetgroups\fR(2), \fBgetuid\fR(2)
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
Julianne Frances Haugh <jockgrrl@ix\&.netcom\&.com>
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='groups.1'>
|
||||
<!-- $Id: groups.1.xml,v 1.7 2005/04/27 18:20:35 kloczek Exp $ -->
|
||||
<!-- $Id: groups.1.xml,v 1.9 2005/06/14 20:18:17 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>groups</refentrytitle>
|
||||
<manvolnum>1</manvolnum>
|
||||
@@ -24,8 +24,7 @@
|
||||
|
||||
<refsect1 id='description'>
|
||||
<title>DESCRIPTION</title>
|
||||
<para>
|
||||
<command>groups</command> displays the current group names or ID
|
||||
<para><command>groups</command> displays the current group names or ID
|
||||
values. If the value does not have a corresponding entry in
|
||||
<filename>/etc/group</filename>, the value will be displayed as the
|
||||
numerical group value. The optional <emphasis
|
||||
@@ -38,7 +37,7 @@
|
||||
<title>NOTE</title>
|
||||
<para>Systems which do not support concurrent group sets will have the
|
||||
information from <filename>/etc/group</filename> reported. The user
|
||||
must use <command>newgrp</coamand> or <command>sg</coamand> to change
|
||||
must use <command>newgrp</command> or <command>sg</command> to change
|
||||
their current real and effective group ID.
|
||||
</para>
|
||||
</refsect1>
|
||||
@@ -55,8 +54,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>newgrp</refentrytitle><manvolnum>1</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
191
man/grpck.8
191
man/grpck.8
@@ -1,98 +1,105 @@
|
||||
.\"$Id: grpck.8,v 1.17 2005/04/12 17:53:21 kloczek Exp $
|
||||
.\" Copyright 1992 - 1993, Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH GRPCK 8
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "GRPCK" 8 "" "" ""
|
||||
.SH NAME
|
||||
grpck \- verify integrity of group files
|
||||
.SH SYNOPSIS
|
||||
\fBgrpck\fR [\fB\-r\fR] [\fIgroup\fR \fIshadow\fR]
|
||||
.SH DESCRIPTION
|
||||
\fBgrpck\fR verifies the integrity of the system authentication information.
|
||||
All entries in the \fI/etc/group\fR and \fI/etc/gshadow\fR are checked to
|
||||
see that the entry has the proper format and valid data in each field. The
|
||||
user is prompted to delete entries that are improperly formatted or which
|
||||
have other incorrectable errors.
|
||||
.SH "SYNOPSIS"
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 6
|
||||
\fBgrpck\fR [\-r] [\fIgroup\fR\ \fIshadow\fR]
|
||||
.ad
|
||||
.hy
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
\fBgrpck\fR verifies the integrity of the system authentication information\&. All entries in the \fI/etc/group\fR and \fI/etc/gshadow\fR are checked to see that the entry has the proper format and valid data in each field\&. The user is prompted to delete entries that are improperly formatted or which have other uncorrectable errors\&.
|
||||
|
||||
.PP
|
||||
Checks are made to verify that each entry has:
|
||||
.sp
|
||||
.in +.5i
|
||||
\- the correct number of fields
|
||||
.br
|
||||
\- a unique group name
|
||||
.br
|
||||
\- a valid list of members and administrators
|
||||
.in \-.5i
|
||||
.sp
|
||||
|
||||
.TP 3
|
||||
\(bu
|
||||
the correct number of fields
|
||||
.TP
|
||||
\(bu
|
||||
a unique group name
|
||||
.TP
|
||||
\(bu
|
||||
a valid list of members and administrators
|
||||
.LP
|
||||
|
||||
.PP
|
||||
The checks for correct number of fields and unique group name are fatal. If
|
||||
the entry has the wrong number of fields, the user will be prompted to
|
||||
delete the entire line. If the user does not answer affirmatively, all
|
||||
further checks are bypassed. An entry with a duplicated group name is
|
||||
prompted for deletion, but the remaining checks will still be made. All
|
||||
other errors are warnings and the user is encouraged to run the
|
||||
\fBgroupmod\fR command to correct the error.
|
||||
The checks for correct number of fields and unique group name are fatal\&. If the entry has the wrong number of fields, the user will be prompted to delete the entire line\&. If the user does not answer affirmatively, all further checks are bypassed\&. An entry with a duplicated group name is prompted for deletion, but the remaining checks will still be made\&. All other errors are warnings and the user is encouraged to run the \fBgroupmod\fR command to correct the error\&.
|
||||
|
||||
.PP
|
||||
The commands which operate on the \fI/etc/group\fR file are not able to
|
||||
alter corrupted or duplicated entries. \fBgrpck\fR should be used in those
|
||||
circumstances to remove the offending entry.
|
||||
.SH OPTIONS
|
||||
By default, \fBgrpck\fR operates on the files \fI/etc/group\fR and
|
||||
\fI/etc/gshadow\fR. The user may select alternate files with the \fIgroup\fR
|
||||
and \fIshadow\fR parameters. Additionally, the user may execute the command
|
||||
in read\-only mode by specifying the \fB\-r\fR flag. This causes all questions
|
||||
regarding changes to be answered \fBno\fR without user intervention.
|
||||
\fBgrpck\fR can also sort entries in \fI/etc/group\fR and \fI/etc/gshadow\fR
|
||||
by GID. To run it in sort mode pass it \fB\-s\fR flag. No checks are
|
||||
performed then, it just sorts.
|
||||
.SH FILES
|
||||
\fI/etc/group\fR \- group account information
|
||||
.br
|
||||
\fI/etc/gshadow\fR \- encrypted passwords and group administrator information
|
||||
.br
|
||||
\fI/etc/passwd\fR \- user account information
|
||||
.SH SEE ALSO
|
||||
.BR group (5),
|
||||
.BR passwd (5),
|
||||
.BR shadow (5),
|
||||
.BR groupmod (8)
|
||||
.SH EXIT VALUES
|
||||
.TP 2
|
||||
The \fBgrpck\fR command exits with the following values:
|
||||
.br
|
||||
\fB0\fR \- success
|
||||
.br
|
||||
\fB1\fR \- syntax Error
|
||||
.br
|
||||
\fB2\fR \- one or more bad group entries
|
||||
.br
|
||||
\fB3\fR \- can't open group files
|
||||
.br
|
||||
\fB4\fR \- can't lock group files
|
||||
.br
|
||||
\fB5\fR \- can't update group files
|
||||
.SH AUTHOR
|
||||
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||
The commands which operate on the \fI/etc/group\fR file are not able to alter corrupted or duplicated entries\&. \fBgrpck\fR should be used in those circumstances to remove the offending entry\&.
|
||||
|
||||
.SH "OPTIONS"
|
||||
|
||||
.PP
|
||||
By default, \fBgrpck\fR operates on the files \fI/etc/group\fR and \fI/etc/gshadow\fR\&. The user may select alternate files with the \fIgroup\fR and \fIshadow\fR parameters\&. Additionally, the user may execute the command in read\-only mode by specifying the \fB\-r\fR flag\&. This causes all questions regarding changes to be answered \fIno\fR without user intervention\&. \fBgrpck\fR can also sort entries in \fI/etc/group\fR and \fI/etc/gshadow\fR by GID\&. To run it in sort mode pass it \fB\-s\fR flag\&. No checks are performed then, it just sorts\&.
|
||||
|
||||
.SH "FILES"
|
||||
|
||||
.TP
|
||||
\fI/etc/group\fR
|
||||
group account information
|
||||
.TP
|
||||
\fI/etc/gshadow\fR
|
||||
secure group account information
|
||||
.TP
|
||||
\fI/etc/passwd\fR
|
||||
user account information
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
\fBgroup\fR(5), \fBpasswd\fR(5), \fBshadow\fR(5), \fBgroupmod\fR(8)
|
||||
|
||||
.SH "EXIT VALUES"
|
||||
|
||||
.PP
|
||||
The \fBgrpck\fR command exits with the following values:
|
||||
|
||||
.TP
|
||||
\fI0\fR
|
||||
success
|
||||
.TP
|
||||
\fI1\fR
|
||||
invalid command syntax
|
||||
.TP
|
||||
\fI2\fR
|
||||
one or more bad group entries
|
||||
.TP
|
||||
\fI3\fR
|
||||
can't open group files
|
||||
.TP
|
||||
\fI4\fR
|
||||
can't lock group files
|
||||
.TP
|
||||
\fI5\fR
|
||||
can't update group files
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='grpck.8'>
|
||||
<!-- $Id: grpck.8.xml,v 1.6 2005/04/27 18:20:35 kloczek Exp $ -->
|
||||
<!-- $Id: grpck.8.xml,v 1.9 2005/06/20 08:57:34 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>grpck</refentrytitle>
|
||||
<manvolnum>8</manvolnum>
|
||||
@@ -30,19 +30,22 @@
|
||||
<filename>/etc/group</filename> and <filename>/etc/gshadow</filename>
|
||||
are checked to see that the entry has the proper format and valid data
|
||||
in each field. The user is prompted to delete entries that are
|
||||
improperly formatted or which have other incorrectable errors.
|
||||
improperly formatted or which have other uncorrectable errors.
|
||||
</para>
|
||||
|
||||
<para>Checks are made to verify that each entry has:</para>
|
||||
|
||||
<!-- .in +.5i -->
|
||||
<para>- the correct number of fields
|
||||
<!-- .br -->
|
||||
- a unique group name
|
||||
<!-- .br -->
|
||||
- a valid list of members and administrators
|
||||
</para>
|
||||
<!-- .in \-.5i -->
|
||||
|
||||
<itemizedlist mark='bullet'>
|
||||
<listitem>
|
||||
<para>the correct number of fields</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>a unique group name</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>a valid list of members and administrators</para>
|
||||
</listitem>
|
||||
</itemizedlist>
|
||||
|
||||
<para>The checks for correct number of fields and unique group name are
|
||||
fatal. If the entry has the wrong number of fields, the user will be
|
||||
@@ -50,7 +53,7 @@
|
||||
affirmatively, all further checks are bypassed. An entry with a
|
||||
duplicated group name is prompted for deletion, but the remaining
|
||||
checks will still be made. All other errors are warnings and the user
|
||||
is encouraged to run the <command>groupmod</coamand> command to
|
||||
is encouraged to run the <command>groupmod</command> command to
|
||||
correct the error.
|
||||
</para>
|
||||
|
||||
@@ -99,8 +102,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>group</refentrytitle><manvolnum>5</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
@@ -117,30 +119,35 @@
|
||||
|
||||
<refsect1 id='exit_values'>
|
||||
<title>EXIT VALUES</title>
|
||||
<variablelist remap='TP'>
|
||||
<varlistentry>
|
||||
<term>
|
||||
The <command>grpck</command> command exits with the
|
||||
following values:
|
||||
</term>
|
||||
<listitem>
|
||||
<!-- .br -->
|
||||
<para>
|
||||
<literal>0</literal> - success
|
||||
<!-- .br -->
|
||||
<literal>1</literal> - syntax Error
|
||||
<!-- .br -->
|
||||
<literal>2</literal> - one or more bad group entries
|
||||
<!-- .br -->
|
||||
<literal>3</literal> - can't open group files
|
||||
<!-- .br -->
|
||||
<literal>4</literal> - can't lock group files
|
||||
<!-- .br -->
|
||||
<literal>5</literal> - can't update group files
|
||||
</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
<para>
|
||||
The <command>grpck</command> command exits with the following values:
|
||||
<variablelist>
|
||||
<varlistentry>
|
||||
<term><replaceable>0</replaceable></term>
|
||||
<listitem>success</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>1</replaceable></term>
|
||||
<listitem>invalid command syntax</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>2</replaceable></term>
|
||||
<listitem>one or more bad group entries</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>3</replaceable></term>
|
||||
<listitem>can't open group files</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>4</replaceable></term>
|
||||
<listitem>can't lock group files</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>5</replaceable></term>
|
||||
<listitem>can't update group files</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
</para>
|
||||
</refsect1>
|
||||
|
||||
<refsect1 id='author'>
|
||||
|
||||
121
man/gshadow.5
121
man/gshadow.5
@@ -1,65 +1,68 @@
|
||||
.\"$Id: gshadow.5,v 1.2 2005/04/02 16:10:23 kloczek Exp $
|
||||
.\" Copyright 2005, Nicolas FRANCOIS
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Nicolas FRANCOIS nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY NICOLAS FRANCOIS AND CONTRIBUTORS ``AS IS''
|
||||
.\" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL NICOLAS FRANCOIS OR CONTRIBUTORS BE
|
||||
.\" LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
||||
.\" CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
||||
.\" SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
||||
.\" INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
||||
.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
|
||||
.\" THE POSSIBILITY OF SUCH DAMAGE.
|
||||
.TH GSHADOW 5
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "GSHADOW" 5 "" "" ""
|
||||
.SH NAME
|
||||
gshadow \- shadowed group file
|
||||
.SH DESCRIPTION
|
||||
.I gshadow
|
||||
contains the shadowed information for group accounts.
|
||||
It contains lines with the folowing colon\-separated fields:
|
||||
.IP "" .5i
|
||||
Group name
|
||||
.IP "" .5i
|
||||
Encrypted password
|
||||
.IP "" .5i
|
||||
Comma\-separated list of group administrators
|
||||
.IP "" .5i
|
||||
Comma\-separated list of group members.
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
The group name and password fields must be filled.
|
||||
The encryped password consists of 13 characters from the 64\-character
|
||||
alphabet a thru z, A thru Z, 0 thru 9, \. and /.
|
||||
Refer to \fBcrypt\fR(3) for details on how this string is interpreted.
|
||||
If the password field contains some string that is not valid result
|
||||
of \fBcrypt\fR(3), for instance ! or *, the user will not be able to use
|
||||
a unix password to log in, subject to \fBpam\fR(7).
|
||||
\fI/etc/gshadow\fR contains the shadowed information for group accounts\&. It contains lines with the following colon\-separated fields:
|
||||
|
||||
.TP 3
|
||||
\(bu
|
||||
group name
|
||||
.TP
|
||||
\(bu
|
||||
encrypted password
|
||||
.TP
|
||||
\(bu
|
||||
comma\-separated list of group administrators
|
||||
.TP
|
||||
\(bu
|
||||
comma\-separated list of group members
|
||||
.LP
|
||||
|
||||
.PP
|
||||
This information supercedes any password present in \fI/etc/group\fR.
|
||||
The group name and password fields must be filled\&. The encrypted password consists of 13 characters from the 64\-character alphabet a thru z, A thru Z, 0 thru 9, \\\&. and /\&. Refer to \fBcrypt\fR(3) for details on how this string is interpreted\&. If the password field contains some string that is not valid result of \fBcrypt\fR(3), for instance ! or *, the user will not be able to use a unix password to log in, subject to \fBpam\fR(7)\&.
|
||||
|
||||
.PP
|
||||
This information supersedes any password present in \fI/etc/group\fR\&.
|
||||
|
||||
.PP
|
||||
This file must not be readable by regular users if password security is to be maintained\&.
|
||||
|
||||
.SH "FILES"
|
||||
|
||||
.TP
|
||||
\fI/etc/group\fR
|
||||
group account information
|
||||
.TP
|
||||
\fI/etc/gshadow\fR
|
||||
secure group account information
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
\fBgroup\fR(5), \fBgpasswd\fR(5), \fBnewgrp\fR(5)
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
This file must not be readable by regular users if password
|
||||
security is to be maintained.
|
||||
.SH FILES
|
||||
\fI/etc/group\fR \- user group file
|
||||
.br
|
||||
\fI/etc/gshadow\fR \- shadowed group file
|
||||
.SH SEE ALSO
|
||||
.BR group (5),
|
||||
.BR gpasswd (5),
|
||||
.BR newgrp (5)
|
||||
.SH AUTHOR
|
||||
Nicolas FRANCOIS
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='gshadow.5'>
|
||||
<!-- $Id: gshadow.5.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
|
||||
<!-- $Id: gshadow.5.xml,v 1.10 2005/06/16 17:35:43 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>gshadow</refentrytitle>
|
||||
<manvolnum>5</manvolnum>
|
||||
@@ -14,36 +14,39 @@
|
||||
|
||||
<refsect1 id='description'>
|
||||
<title>DESCRIPTION</title>
|
||||
<para>
|
||||
<emphasis remap='I'>gshadow</emphasis> contains the shadowed
|
||||
information for group accounts. It contains lines with the folowing
|
||||
<para><filename>/etc/gshadow</filename> contains the shadowed
|
||||
information for group accounts. It contains lines with the following
|
||||
colon-separated fields:
|
||||
</para>
|
||||
<itemizedlist mark='bullet'>
|
||||
<listitem>
|
||||
<para>group name</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>encrypted password</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>comma-separated list of group administrators</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>comma-separated list of group members</para>
|
||||
</listitem>
|
||||
</itemizedlist>
|
||||
|
||||
<para>Group name</para>
|
||||
|
||||
<para>Encrypted password</para>
|
||||
|
||||
<para>Comma-separated list of group administrators</para>
|
||||
|
||||
<para>Comma-separated list of group members.</para>
|
||||
|
||||
<para>The group name and password fields must be filled. The encryped
|
||||
<para>The group name and password fields must be filled. The encrypted
|
||||
password consists of 13 characters from the 64-character alphabet a
|
||||
thru z, A thru Z, 0 thru 9, \. and /. Refer to <citerefentry>
|
||||
<refentrytitle>crypt</refentrytitle><manvolnum>3</manvolnum>
|
||||
</citerefentry> for details on how this string is interpreted. If the
|
||||
password field contains some string that is not valid result of
|
||||
<citerefentry>
|
||||
thru z, A thru Z, 0 thru 9, \. and /. Refer to <citerefentry>
|
||||
<refentrytitle>crypt</refentrytitle><manvolnum>3</manvolnum>
|
||||
</citerefentry> for details on how this string is interpreted. If the
|
||||
password field contains some string that is not valid result of
|
||||
<citerefentry><refentrytitle>crypt</refentrytitle><manvolnum>3</manvolnum>
|
||||
</citerefentry>, for instance ! or *, the user will not be able to use
|
||||
a unix password to log in, subject to <citerefentry>
|
||||
<refentrytitle>pam</refentrytitle><manvolnum>7</manvolnum>
|
||||
</citerefentry>.
|
||||
<refentrytitle>pam</refentrytitle><manvolnum>7</manvolnum></citerefentry>.
|
||||
</para>
|
||||
|
||||
<para>This information supercedes any password present in
|
||||
<filename>/etc/group</filename>.
|
||||
<para>This information supersedes any password present in
|
||||
<filename>/etc/group</filename>.
|
||||
</para>
|
||||
|
||||
<para>This file must not be readable by regular users if password
|
||||
@@ -67,8 +70,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>group</refentrytitle><manvolnum>5</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
@@ -38,11 +38,7 @@ host_triplet = @host@
|
||||
subdir = man/hu
|
||||
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
|
||||
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
|
||||
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
|
||||
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
|
||||
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
|
||||
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
|
||||
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
|
||||
am__aclocal_m4_deps = $(top_srcdir)/configure.in
|
||||
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
|
||||
$(ACLOCAL_M4)
|
||||
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
|
||||
@@ -196,9 +192,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
|
||||
exit 1;; \
|
||||
esac; \
|
||||
done; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/hu/Makefile'; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/hu/Makefile'; \
|
||||
cd $(top_srcdir) && \
|
||||
$(AUTOMAKE) --foreign man/hu/Makefile
|
||||
$(AUTOMAKE) --gnu man/hu/Makefile
|
||||
.PRECIOUS: Makefile
|
||||
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
|
||||
@case '$?' in \
|
||||
|
||||
97
man/id.1
97
man/id.1
@@ -1,48 +1,53 @@
|
||||
.\"$Id: id.1,v 1.16 2005/04/12 17:55:55 kloczek Exp $
|
||||
.\" Copyright 1991, Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH ID 1
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "ID" 1 "" "" ""
|
||||
.SH NAME
|
||||
id \- Display current user and group ID names
|
||||
.SH SYNOPSIS
|
||||
\fBid\fR [\fB\-a\fR]
|
||||
.SH DESCRIPTION
|
||||
\fBid\fR displays the current real and effective user and group ID names or
|
||||
values. If the value does not have a corresponding entry in
|
||||
\fI/etc/passwd\fR or \fI/etc/group\fR, the value will be displayed without
|
||||
the corresponding name. The optional \fB\-a\fR flag will display the group
|
||||
set on systems which support multiple concurrent group membership.
|
||||
.SH FILES
|
||||
\fI/etc/passwd\fR \- user account information
|
||||
.br
|
||||
\fI/etc/group\fR \- group account information
|
||||
.SH SEE ALSO
|
||||
.BR getgid (2),
|
||||
.BR getgroups (2),
|
||||
.BR getuid (2)
|
||||
.SH AUTHOR
|
||||
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
|
||||
.SH "SYNOPSIS"
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 3
|
||||
\fBid\fR [\-a]
|
||||
.ad
|
||||
.hy
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
\fBid\fR displays the current real and effective user and group ID names or values\&. If the value does not have a corresponding entry in \fI/etc/passwd\fR or \fI/etc/group\fR, the value will be displayed without the corresponding name\&. The optional \fB\-a\fR flag will display the group set on systems which support multiple concurrent group membership\&.
|
||||
|
||||
.SH "FILES"
|
||||
|
||||
.TP
|
||||
\fI/etc/group\fR
|
||||
group account information
|
||||
.TP
|
||||
\fI/etc/passwd\fR
|
||||
user account information
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
\fBgetgid\fR(2), \fBgetgroups\fR(2), \fBgetuid\fR(2)
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
Julianne Frances Haugh <jockgrrl@ix\&.netcom\&.com>
|
||||
|
||||
|
||||
12
man/id.1.xml
12
man/id.1.xml
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='id.1'>
|
||||
<!-- $Id: id.1.xml,v 1.6 2005/04/27 16:44:12 kloczek Exp $ -->
|
||||
<!-- $Id: id.1.xml,v 1.8 2005/06/14 20:18:17 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>id</refentrytitle>
|
||||
<manvolnum>1</manvolnum>
|
||||
@@ -21,10 +21,9 @@
|
||||
|
||||
<refsect1 id='description'>
|
||||
<title>DESCRIPTION</title>
|
||||
<para>
|
||||
<command>id</command> displays the current real and effective user and
|
||||
group ID names or values. If the value does not have a corresponding
|
||||
entry in <filename>/etc/passwd</filename> or
|
||||
<para><command>id</command> displays the current real and effective user
|
||||
and group ID names or values. If the value does not have a
|
||||
corresponding entry in <filename>/etc/passwd</filename> or
|
||||
<filename>/etc/group</filename>, the value will be displayed without
|
||||
the corresponding name. The optional <option>-a</option> flag will
|
||||
display the group set on systems which support multiple concurrent
|
||||
@@ -48,8 +47,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>getgid</refentrytitle><manvolnum>2</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
@@ -38,11 +38,7 @@ host_triplet = @host@
|
||||
subdir = man/id
|
||||
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
|
||||
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
|
||||
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
|
||||
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
|
||||
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
|
||||
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
|
||||
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
|
||||
am__aclocal_m4_deps = $(top_srcdir)/configure.in
|
||||
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
|
||||
$(ACLOCAL_M4)
|
||||
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
|
||||
@@ -192,9 +188,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
|
||||
exit 1;; \
|
||||
esac; \
|
||||
done; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/id/Makefile'; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/id/Makefile'; \
|
||||
cd $(top_srcdir) && \
|
||||
$(AUTOMAKE) --foreign man/id/Makefile
|
||||
$(AUTOMAKE) --gnu man/id/Makefile
|
||||
.PRECIOUS: Makefile
|
||||
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
|
||||
@case '$?' in \
|
||||
|
||||
@@ -38,11 +38,7 @@ host_triplet = @host@
|
||||
subdir = man/it
|
||||
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
|
||||
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
|
||||
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
|
||||
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
|
||||
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
|
||||
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
|
||||
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
|
||||
am__aclocal_m4_deps = $(top_srcdir)/configure.in
|
||||
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
|
||||
$(ACLOCAL_M4)
|
||||
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
|
||||
@@ -212,9 +208,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
|
||||
exit 1;; \
|
||||
esac; \
|
||||
done; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/it/Makefile'; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/it/Makefile'; \
|
||||
cd $(top_srcdir) && \
|
||||
$(AUTOMAKE) --foreign man/it/Makefile
|
||||
$(AUTOMAKE) --gnu man/it/Makefile
|
||||
.PRECIOUS: Makefile
|
||||
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
|
||||
@case '$?' in \
|
||||
|
||||
@@ -23,7 +23,6 @@ man_MANS = \
|
||||
login.access.5 \
|
||||
login.defs.5 \
|
||||
logoutd.8 \
|
||||
mkpasswd.8 \
|
||||
newgrp.1 \
|
||||
newusers.8 \
|
||||
passwd.1 \
|
||||
|
||||
@@ -38,11 +38,7 @@ host_triplet = @host@
|
||||
subdir = man/ja
|
||||
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
|
||||
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
|
||||
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
|
||||
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
|
||||
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
|
||||
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
|
||||
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
|
||||
am__aclocal_m4_deps = $(top_srcdir)/configure.in
|
||||
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
|
||||
$(ACLOCAL_M4)
|
||||
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
|
||||
@@ -198,7 +194,6 @@ man_MANS = \
|
||||
login.access.5 \
|
||||
login.defs.5 \
|
||||
logoutd.8 \
|
||||
mkpasswd.8 \
|
||||
newgrp.1 \
|
||||
newusers.8 \
|
||||
passwd.1 \
|
||||
@@ -236,9 +231,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
|
||||
exit 1;; \
|
||||
esac; \
|
||||
done; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/ja/Makefile'; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/ja/Makefile'; \
|
||||
cd $(top_srcdir) && \
|
||||
$(AUTOMAKE) --foreign man/ja/Makefile
|
||||
$(AUTOMAKE) --gnu man/ja/Makefile
|
||||
.PRECIOUS: Makefile
|
||||
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
|
||||
@case '$?' in \
|
||||
|
||||
@@ -1,90 +0,0 @@
|
||||
.\"$Id: mkpasswd.8,v 1.6 2005/04/05 19:08:55 kloczek Exp $
|
||||
.\" Copyright 1991, Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.\"
|
||||
.\" Japanese Version Copyright (c) 1997 Kazuyoshi Furutaka
|
||||
.\" all rights reserved.
|
||||
.\" Translated Fri Feb 14 23:06:00 JST 1997
|
||||
.\" by Kazuyoshi Furutaka <furutaka@Flux.tokai.jaeri.go.jp>
|
||||
.\" Updated & Modified Sat 21 Sep 2002 by NAKANO Takeo <nakano@apm.seikei.ac.jp>
|
||||
.\"
|
||||
.TH MKPASSWD 8
|
||||
.SH ̾<EFBFBD><EFBFBD>
|
||||
mkpasswd \- passwd <20><> group <20>Υǡ<CEA5><C7A1><EFBFBD><EFBFBD>١<EFBFBD><D9A1><EFBFBD><EFBFBD>ե<EFBFBD><D5A5><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><F2B9B9BF><EFBFBD><EFBFBD><EFBFBD>
|
||||
.SH <EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
\fBmkpasswd\fR [\fB\-fvgps\fR] \fIfile\fR
|
||||
.SH <EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
.B mkpasswd
|
||||
<EFBFBD>ϥե饰<EFBFBD><EFBFBD>Ϳ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>줿<EFBFBD>ˤ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>äƥե<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ɤ߹<EFBFBD><EFBFBD>ߡ<EFBFBD>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ǡ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>١<EFBFBD><EFBFBD><EFBFBD><EFBFBD>ե<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ѵ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>롣
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>줿<EFBFBD>ǡ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>١<EFBFBD><EFBFBD><EFBFBD><EFBFBD>ե<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ϡ<EFBFBD>
|
||||
¿<EFBFBD><EFBFBD><EFBFBD>Υ桼<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>륷<EFBFBD><EFBFBD><EFBFBD>ƥ<EFBFBD><EFBFBD>ǤΥ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ǽ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>뤿<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ѥ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>롣
|
||||
<EFBFBD><EFBFBD><EFBFBD>ϥե<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>̾<EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
\fIfile\fR.dir <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> \fIfile\fR.pag<61>Ȥʤ롣
|
||||
.PP
|
||||
\fB\-f\fR <20><><EFBFBD>ץ<EFBFBD><D7A5><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ꤹ<EFBFBD><EAA4B9><EFBFBD>ȡ<EFBFBD>
|
||||
\fBmkpasswd\fR <20>Ͻ<EFBFBD><CFBD>ϥե<CFA5><D5A5><EFBFBD><EFBFBD>뤬¸<EBA4AC>ߤ<EFBFBD><DFA4>Ƥ<EFBFBD><C6A4>Ƥ<EFBFBD>̵<EFBFBD>뤷<EFBFBD>ƾ<EFBFBD><C6BE><EFBFBD><F1A4ADA4>롣
|
||||
<EFBFBD>̾<EFBFBD><EFBFBD>ϡ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>ϥե<EFBFBD><EFBFBD><EFBFBD><EFBFBD>뤬<EFBFBD><EFBFBD><EFBFBD><EFBFBD>¸<EFBFBD>ߤ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>ݤηٹ<EFBFBD><EFBFBD><EFBFBD>ȯ<EFBFBD><EFBFBD><EFBFBD>ƽ<EFBFBD>λ<EFBFBD><EFBFBD><EFBFBD>롣
|
||||
.PP
|
||||
\fB\-v\fR <20><><EFBFBD>ץ<EFBFBD><D7A5><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ꤹ<EFBFBD><EAA4B9><EFBFBD>ȡ<EFBFBD>
|
||||
\fBmkpasswd\fR <20><><EFBFBD>Ѵ<EFBFBD><D1B4><EFBFBD><EFBFBD>Ԥʤ<D4A4><CAA4><EFBFBD><EFBFBD>˳ƥ쥳<C6A5><ECA5B3><EFBFBD>ɤξ<C9A4><CEBE><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ϥ<EFBFBD><CFA4><EFBFBD>
|
||||
<EFBFBD>Ǹ<EFBFBD><EFBFBD>˽<EFBFBD>λ<EFBFBD><EFBFBD><EFBFBD>å<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ɽ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>롣
|
||||
.PP
|
||||
\fB\-g\fR <20><><EFBFBD>ץ<EFBFBD><D7A5><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ꤹ<EFBFBD><EAA4B9><EFBFBD>ȡ<EFBFBD>
|
||||
<EFBFBD><EFBFBD><EFBFBD>ϥե<EFBFBD><EFBFBD><EFBFBD><EFBFBD>뤬 \fI/etc/group\fR
|
||||
<EFBFBD>ե<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>νǤ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ȥߤʤ<EFBFBD><EFBFBD>ƽ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ԥʤ<EFBFBD><EFBFBD><EFBFBD>
|
||||
\fB\-s\fR <20><><EFBFBD>ץ<EFBFBD><D7A5><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ʊ<EFBFBD><C6B1><EFBFBD><EFBFBD><EFBFBD>Ѥ<EFBFBD><D1A4><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ϡ<EFBFBD>
|
||||
\fI/etc/gshadow\fR <20>ե<EFBFBD><D5A5><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ν<CEBD><F1BCB0A4>Ѥ<EFBFBD><D1A4><EFBFBD><EFBFBD><EFBFBD><EFBFBD>롣
|
||||
.PP
|
||||
\fB\-p\fR <20><><EFBFBD>ץ<EFBFBD><D7A5><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ꤹ<EFBFBD><EAA4B9><EFBFBD>ȡ<EFBFBD>
|
||||
<EFBFBD><EFBFBD><EFBFBD>ϥե<EFBFBD><EFBFBD><EFBFBD><EFBFBD>뤬 \fB/etc/passwd\fR
|
||||
<EFBFBD>ե<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>νǤ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ȥߤʤ<EFBFBD><EFBFBD>ƽ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ԥ<EFBFBD><EFBFBD><EFBFBD>
|
||||
<EFBFBD><EFBFBD><EFBFBD>줬<EFBFBD>ǥե<EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ȥ<EFBFBD>ư<EFBFBD><EFBFBD><EFBFBD>Ǥ<EFBFBD><EFBFBD>롣
|
||||
\fB\-s\fR <20><><EFBFBD>ץ<EFBFBD><D7A5><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ʊ<EFBFBD><C6B1><EFBFBD><EFBFBD><EFBFBD>Ѥ<EFBFBD><D1A4><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ϡ<EFBFBD>
|
||||
\fI/etc/shadow\fR <20>ե<EFBFBD><D5A5><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ν<CEBD><F1BCB0A4>Ѥ<EFBFBD><D1A4><EFBFBD><EFBFBD><EFBFBD><EFBFBD>롣
|
||||
.SH <EFBFBD>ٹ<EFBFBD>
|
||||
ʣ<EFBFBD><EFBFBD><EFBFBD>Υǡ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>١<EFBFBD><EFBFBD><EFBFBD><EFBFBD>ե<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ȥ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>Τϡ<EFBFBD>
|
||||
NDBM <20>ǡ<EFBFBD><C7A1><EFBFBD><EFBFBD>١<EFBFBD><D9A1><EFBFBD><EFBFBD>饤<EFBFBD>֥<EFBFBD><D6A5><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ƥ<EFBFBD><C6A5>ΤߤǤ<DFA4><C7A4>ꡢ
|
||||
<EFBFBD>ɤ<EFBFBD><EFBFBD>ʥ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>ƥ<EFBFBD><EFBFBD>Ǥ<EFBFBD><EFBFBD><EFBFBD>ǽ<EFBFBD>ʤ櫓<EFBFBD>ǤϤʤ<EFBFBD><EFBFBD><EFBFBD>
|
||||
.SH <EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Υ<EFBFBD><EFBFBD>ޥ<EFBFBD><EFBFBD>ɤ<EFBFBD><EFBFBD>ѹ<EFBFBD><EFBFBD>κݤ˥ǡ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>١<EFBFBD><EFBFBD><EFBFBD><EFBFBD>ե<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>뵡ǽ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ƥ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>Τǡ<EFBFBD>
|
||||
<EFBFBD><EFBFBD><EFBFBD>Υ<EFBFBD><EFBFBD>ޥ<EFBFBD><EFBFBD>ɤ<EFBFBD>ɬ<EFBFBD>פˤʤ<EFBFBD><EFBFBD>Τϡ<EFBFBD><EFBFBD>ǡ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>١<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ƥ<EFBFBD><EFBFBD>ޤä<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>䡢
|
||||
<EFBFBD>ǡ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>١<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>줿<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ʤɤˡ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ȥ<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ǥ<EFBFBD><EFBFBD>롣
|
||||
.SH <EFBFBD>ե<EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
\fI/etc/passwd\fR \ \- <20>桼<EFBFBD><E6A1BC><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ⱦ<EFBFBD><C8BE><EFBFBD>
|
||||
.br
|
||||
\fI/etc/shadow\fR \ \- shadow <20><><EFBFBD><EFBFBD><EFBFBD>줿<EFBFBD>桼<EFBFBD><E6A1BC><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
.br
|
||||
\fI/etc/group\fR \ \- <20><><EFBFBD>롼<EFBFBD><EFBFBD><D7BE><EFBFBD>
|
||||
.br
|
||||
\fI/etc/gshadow\fR \- shadow <20><><EFBFBD><EFBFBD><EFBFBD>줿<EFBFBD><ECA4BF><EFBFBD>롼<EFBFBD><EFBFBD><D7BE><EFBFBD>
|
||||
.SH <EFBFBD><EFBFBD>Ϣ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
.BR group (5),
|
||||
.BR passwd (5),
|
||||
.BR shadow (5)
|
||||
.SH <EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||||
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||
@@ -38,11 +38,7 @@ host_triplet = @host@
|
||||
subdir = man/ko
|
||||
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
|
||||
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
|
||||
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
|
||||
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
|
||||
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
|
||||
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
|
||||
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
|
||||
am__aclocal_m4_deps = $(top_srcdir)/configure.in
|
||||
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
|
||||
$(ACLOCAL_M4)
|
||||
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
|
||||
@@ -195,9 +191,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
|
||||
exit 1;; \
|
||||
esac; \
|
||||
done; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/ko/Makefile'; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/ko/Makefile'; \
|
||||
cd $(top_srcdir) && \
|
||||
$(AUTOMAKE) --foreign man/ko/Makefile
|
||||
$(AUTOMAKE) --gnu man/ko/Makefile
|
||||
.PRECIOUS: Makefile
|
||||
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
|
||||
@case '$?' in \
|
||||
|
||||
123
man/lastlog.8
123
man/lastlog.8
@@ -1,64 +1,73 @@
|
||||
.\"$Id: lastlog.8,v 1.21 2005/04/05 18:47:50 kloczek Exp $
|
||||
.\" Copyright 1992, Phillip Street and Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.\" @(#)lastlog.8 3.3 08:24:58 29 Sep 1993 (National Guard Release)
|
||||
.TH LASTLOG 8
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "LASTLOG" 8 "" "" ""
|
||||
.SH NAME
|
||||
lastlog \- examine lastlog file
|
||||
.SH SYNOPSIS
|
||||
.TP 8
|
||||
\fBlastlog\fR [\fBoptions\fR]
|
||||
.SH DESCRIPTION
|
||||
.SH "SYNOPSIS"
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 8
|
||||
\fBlastlog\fR [\fIoptions\fR]
|
||||
.ad
|
||||
.hy
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
\fBlastlog\fR formats and prints the contents of the last login log
|
||||
\fI/var/log/lastlog\fR file. The \fBlogin\-name\fR, \fBport\fR, and \fBlast
|
||||
login time\fR will be printed. The default (no flags) causes lastlog entries
|
||||
to be printed, sorted by their order in \fB/etc/passwd\fR.
|
||||
.SH OPTIONS
|
||||
\fBlastlog\fR formats and prints the contents of the last login log \fI/var/log/lastlog\fR file\&. The \fI login\-name\fR, \fIport\fR, and \fIlast login time\fR will be printed\&. The default (no flags) causes lastlog entries to be printed, sorted by their order in \fI/etc/passwd\fR\&.
|
||||
|
||||
.SH "OPTIONS"
|
||||
|
||||
.TP
|
||||
The options which apply to the \fBlastlog\fR command are:
|
||||
.IP "\fB\-h\fR, \fB\-\-help\fR"
|
||||
Print help message and exit.
|
||||
.IP "\fB\-t\fR, \fB\-\-time\fR \fIDAYS\fR"
|
||||
Print the lastlog records more recent than \fIDAYS\fR.
|
||||
.IP "\fB\-u\fR, \fB\-\-user\fR \fILOGIN\fR"
|
||||
Print the lastlog record for user with specified \fILOGIN\fR only.
|
||||
.TP
|
||||
The \fB\-t\fR flag overrides the use of \fB\-u\fR.
|
||||
\fB\-h\fR, \fB\-\-help\fR
|
||||
Print help message and exit\&.
|
||||
|
||||
.TP
|
||||
\fB\-t\fR, \fB\-\-time\fR \fIDAYS\fR
|
||||
Print the lastlog records more recent than \fIDAYS\fR\&.
|
||||
|
||||
.TP
|
||||
\fB\-u\fR, \fB\-\-user\fR \fILOGIN\fR
|
||||
Print the lastlog record for user with specified \fILOGIN\fR only\&.
|
||||
|
||||
.TP
|
||||
The \fB\-t\fR flag overrides the use of \fB\-u\fR\&.
|
||||
|
||||
|
||||
.PP
|
||||
If the user has never logged in the message \fB"**Never logged in**"\fR will
|
||||
be displayed instead of the port and time.
|
||||
.SH FILES
|
||||
\fI/var/log/lastlog\fR \- lastlog logging file
|
||||
.SH CAVEATS
|
||||
Large gaps in uid numbers will cause the lastlog program to run longer with
|
||||
no output to the screen (i.e. if mmdf=800 and last uid=170, program will
|
||||
appear to hang as it processes uid 171\-799).
|
||||
.SH AUTHORS
|
||||
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||
.br
|
||||
Phillip Street
|
||||
If the user has never logged in the message \fI **Never logged in**\fR will be displayed instead of the port and time\&.
|
||||
|
||||
.SH "FILES"
|
||||
|
||||
.TP
|
||||
\fI/var/log/lastlog\fR
|
||||
lastlog logging file
|
||||
.SH "CAVEATS"
|
||||
|
||||
.PP
|
||||
Large gaps in uid numbers will cause the lastlog program to run longer with no output to the screen (i\&.e\&. if mmdf=800 and last uid=170, program will appear to hang as it processes uid 171\-799)\&.
|
||||
|
||||
.SH "AUTHORS"
|
||||
|
||||
.PP
|
||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com) Phillip Street
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='lastlog.8'>
|
||||
<!-- $Id: lastlog.8.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
|
||||
<!-- $Id: lastlog.8.xml,v 1.6 2005/06/14 16:54:20 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>lastlog</refentrytitle>
|
||||
<manvolnum>8</manvolnum>
|
||||
@@ -23,8 +23,7 @@
|
||||
|
||||
<refsect1 id='description'>
|
||||
<title>DESCRIPTION</title>
|
||||
<para>
|
||||
<command>lastlog</command> formats and prints the contents of the last
|
||||
<para><command>lastlog</command> formats and prints the contents of the last
|
||||
login log <filename>/var/log/lastlog</filename> file. The <emphasis
|
||||
remap='B'> login-name</emphasis>, <emphasis remap='B'>port</emphasis>,
|
||||
and <emphasis remap='B'>last login time</emphasis> will be printed.
|
||||
@@ -54,28 +53,24 @@
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term>
|
||||
<option>-t</option>, <option>--time</option> <replaceable>
|
||||
DAYS
|
||||
</replaceable>
|
||||
<option>-t</option>, <option>--time</option>
|
||||
<replaceable>DAYS</replaceable>
|
||||
</term>
|
||||
<listitem>
|
||||
<para>
|
||||
Print the lastlog records more recent than <emphasis remap='I'>
|
||||
DAYS
|
||||
</emphasis>
|
||||
.
|
||||
Print the lastlog records more recent than
|
||||
<emphasis remap='I'>DAYS</emphasis>.
|
||||
</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term>
|
||||
<option>-u</option>, <option>--user</option> <replaceable>
|
||||
LOGIN
|
||||
</replaceable>
|
||||
<option>-u</option>, <option>--user</option>
|
||||
<replaceable>LOGIN</replaceable>
|
||||
</term>
|
||||
<listitem>
|
||||
<para> Print the lastlog record for user with specified <emphasis
|
||||
remap='I'> LOGIN</emphasis>only.
|
||||
<para>Print the lastlog record for user with specified
|
||||
<emphasis remap='I'>LOGIN</emphasis> only.
|
||||
</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
@@ -86,14 +81,14 @@
|
||||
The <option>-t</option> flag overrides the use of <option>-u</option>.
|
||||
</term>
|
||||
<listitem>
|
||||
<para></para> <!-- FIXME: blank list item -->
|
||||
<para></para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
|
||||
<para> If the user has never logged in the message <emphasis
|
||||
remap='B'>"**Never logged in**" </emphasis> will be displayed instead
|
||||
of the port and time.
|
||||
<para>If the user has never logged in the message <emphasis remap='B'>
|
||||
**Never logged in**</emphasis> will be displayed instead of the port and
|
||||
time.
|
||||
</para>
|
||||
</refsect1>
|
||||
|
||||
@@ -118,7 +113,6 @@
|
||||
<refsect1 id='authors'>
|
||||
<title>AUTHORS</title>
|
||||
<para>Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||
<!-- .br -->
|
||||
Phillip Street
|
||||
</para>
|
||||
</refsect1>
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='limits5'>
|
||||
<!-- $Id: limits.5.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
|
||||
<!-- $Id: limits.5.xml,v 1.6 2005/06/14 20:18:17 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>LIMITS</refentrytitle>
|
||||
<manvolnum>5</manvolnum>
|
||||
@@ -124,8 +124,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>login</refentrytitle><manvolnum>1</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
241
man/login.1
241
man/login.1
@@ -1,128 +1,133 @@
|
||||
.\" $Id: login.1,v 1.24 2005/04/26 12:38:53 kloczek Exp $
|
||||
.\" Copyright 1989 - 1994, Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH LOGIN 1
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "LOGIN" 1 "" "" ""
|
||||
.SH NAME
|
||||
login \- begin session on the system
|
||||
.SH SYNOPSIS
|
||||
\fBlogin\fR [\fB\-p\fR] [\fIusername\fR] [\fIENV=VAR\fR ...]
|
||||
.br
|
||||
\fBlogin\fR [\fB\-p\fR] [\fB\-h\fR \fIhost\fR] [\fB\-f\fR \fIusername\fR]
|
||||
.br
|
||||
\fBlogin\fR [\fB\-p\fR] \fB\-r\fR \fIhost\fR
|
||||
.SH DESCRIPTION
|
||||
\fBlogin\fR is used to establish a new session with the system. It is
|
||||
normally invoked automatically by responding to the \fIlogin:\fR prompt on
|
||||
the user\'s terminal. \fBlogin\fR may be special to the shell and may not be
|
||||
invoked as a sub\-process. Typically, \fBlogin\fR is treated by the shell as
|
||||
\fBexec login\fR which causes the user to exit from the current shell.
|
||||
Attempting to execute \fBlogin\fR from any shell but the login shell will
|
||||
produce an error message.
|
||||
.PP
|
||||
The user is then prompted for a password, where appropriate. Echoing is
|
||||
disabled to prevent revealing the password. Only a small number of password
|
||||
failures are permitted before \fBlogin\fR exits and the communications link
|
||||
is severed.
|
||||
.PP
|
||||
If password aging has been enabled for your account, you may be prompted for
|
||||
a new password before proceeding. You will be forced to provide your old
|
||||
password and the new password before continuing. Please refer to
|
||||
\fBpasswd\fR(1) for more information.
|
||||
.PP
|
||||
.SH "SYNOPSIS"
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 6
|
||||
\fBlogin\fR [\-p] [\fIusername\fR] [\fIENV=VAR\fR...]
|
||||
.ad
|
||||
.hy
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 6
|
||||
\fBlogin\fR [\-p] [\-h\ \fIhost\fR] [\-f\ \fIusername\fR]
|
||||
.ad
|
||||
.hy
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 6
|
||||
\fBlogin\fR [\-p] \-r\ \fIhost\fR
|
||||
.ad
|
||||
.hy
|
||||
|
||||
After a successful login, you will be informed of any system messages and
|
||||
the presence of mail. You may turn off the printing of the system message
|
||||
file, \fI/etc/motd\fR, by creating a zero\-length file \fI.hushlogin\fR in
|
||||
your login directory. The mail message will be one of "\fBYou have new
|
||||
mail.\fR", "\fBYou have mail.\fR", or "\fBNo Mail.\fR" according to the
|
||||
condition of your mailbox.
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
Your user and group ID will be set according to their values in
|
||||
the \fI/etc/passwd\fR file.
|
||||
The value for \fB$HOME\fR, \fB$SHELL\fR, \fB$PATH\fR, \fB$LOGNAME\fR,
|
||||
and \fB$MAIL\fR are set according to the appropriate fields in the
|
||||
password entry.
|
||||
Ulimit, umask and nice values may also be set according to
|
||||
entries in the GECOS field.
|
||||
\fBlogin\fR is used to establish a new session with the system\&. It is normally invoked automatically by responding to the \fIlogin:\fR prompt on the user<65>s terminal\&. \fBlogin\fR may be special to the shell and may not be invoked as a sub\-process\&. Typically, \fBlogin\fR is treated by the shell as \fIexec login\fR which causes the user to exit from the current shell\&. Attempting to execute \fBlogin\fR from any shell but the login shell will produce an error message\&.
|
||||
|
||||
.PP
|
||||
On some installations, the environmental variable \fB$TERM\fR will be
|
||||
initialized to the terminal type on your tty line, as specified in
|
||||
\fI/etc/ttytype\fR.
|
||||
The user is then prompted for a password, where appropriate\&. Echoing is disabled to prevent revealing the password\&. Only a small number of password failures are permitted before \fBlogin\fR exits and the communications link is severed\&.
|
||||
|
||||
.PP
|
||||
An initialization script for your command interpreter may also be
|
||||
executed.
|
||||
Please see the appropriate manual section for more information on
|
||||
this function.
|
||||
If password aging has been enabled for your account, you may be prompted for a new password before proceeding\&. You will be forced to provide your old password and the new password before continuing\&. Please refer to \fBpasswd\fR(1) for more information\&.
|
||||
|
||||
.PP
|
||||
A subsystem login is indicated by the presence of a "*" as the first
|
||||
character of the login shell. The given home directory will be used as
|
||||
the root of a new file system which the user is actually logged into.
|
||||
.SH OPTIONS
|
||||
.IP "\fB\-f\fR"
|
||||
Do not perform authentication, user is preauthenticated.
|
||||
.IP "\fB\-h\fR"
|
||||
Name of the remote host for this login.
|
||||
.IP "\fB\-p\fR"
|
||||
Preserve environment.
|
||||
.IP "\fB\-r\fR"
|
||||
Perform autologin protocol for rlogin.
|
||||
After a successful login, you will be informed of any system messages and the presence of mail\&. You may turn off the printing of the system message file, \fI/etc/motd\fR, by creating a zero\-length file \&.hushlogin in your login directory\&. The mail message will be one of "\fIYou have new mail\&.\fR ", "\fIYou have mail\&.\fR", or "\fINo Mail\&.\fR "according to the condition of your mailbox\&.
|
||||
|
||||
.PP
|
||||
The \fB\-r\fP, \fB\-h\fP and \fB\-f\fP options are only used when \fBlogin\fP is
|
||||
invoked by root.
|
||||
.SH CAVEATS
|
||||
This version of \fBlogin\fR has many compilation options, only some of which
|
||||
may be in use at any particular site.
|
||||
Your user and group ID will be set according to their values in the \fI/etc/passwd\fR file\&. The value for \fI$HOME\fR, \fI$SHELL\fR, \fI$PATH\fR, \fI$LOGNAME\fR, and \fI$MAIL\fR are set according to the appropriate fields in the password entry\&. Ulimit, umask and nice values may also be set according to entries in the GECOS field\&.
|
||||
|
||||
.PP
|
||||
The location of files is subject to differences in system configuration.
|
||||
.SH FILES
|
||||
\fI/var/run/utmp\fR \- list of current login sessions
|
||||
.br
|
||||
\fI/var/log/wtmp\fR \- list of previous login sessions
|
||||
.br
|
||||
\fI/etc/passwd\fR \- user account information
|
||||
.br
|
||||
\fI/etc/shadow\fR \- secure user account information
|
||||
.br
|
||||
\fI/etc/motd\fR \- system message file
|
||||
.br
|
||||
\fI/etc/nologin\fR \- prevent non\-root users from logging in
|
||||
.br
|
||||
\fI/etc/ttytype\fR \- list of terminal types
|
||||
.br
|
||||
\fI$HOME/.hushlogin\fR \- suppress printing of system messages
|
||||
.SH SEE ALSO
|
||||
.BR mail (1),
|
||||
.BR passwd (1),
|
||||
.BR sh (1),
|
||||
.BR su (1),
|
||||
.BR login.defs (5),
|
||||
.BR nologin (5),
|
||||
.BR passwd (5),
|
||||
.BR getty (8)
|
||||
.SH AUTHOR
|
||||
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
|
||||
On some installations, the environmental variable \fI$TERM\fR will be initialized to the terminal type on your tty line, as specified in \fI/etc/ttytype\fR\&.
|
||||
|
||||
.PP
|
||||
An initialization script for your command interpreter may also be executed\&. Please see the appropriate manual section for more information on this function\&.
|
||||
|
||||
.PP
|
||||
A subsystem login is indicated by the presence of a "*" as the first character of the login shell\&. The given home directory will be used as the root of a new file system which the user is actually logged into\&.
|
||||
|
||||
.SH "OPTIONS"
|
||||
|
||||
.TP
|
||||
\fB\-f\fR
|
||||
Do not perform authentication, user is preauthenticated\&.
|
||||
|
||||
.TP
|
||||
\fB\-h\fR
|
||||
Name of the remote host for this login\&.
|
||||
|
||||
.TP
|
||||
\fB\-p\fR
|
||||
Preserve environment\&.
|
||||
|
||||
.TP
|
||||
\fB\-r\fR
|
||||
Perform autologin protocol for rlogin\&.
|
||||
|
||||
.PP
|
||||
The \fB\-r\fR, \fB\-h\fR and \fB\-f\fR options are only used when \fBlogin\fR is invoked by root\&.
|
||||
|
||||
.SH "CAVEATS"
|
||||
|
||||
.PP
|
||||
This version of \fBlogin\fR has many compilation options, only some of which may be in use at any particular site\&.
|
||||
|
||||
.PP
|
||||
The location of files is subject to differences in system configuration\&.
|
||||
|
||||
.SH "FILES"
|
||||
|
||||
.TP
|
||||
\fI/var/run/utmp\fR
|
||||
list of current login sessions
|
||||
.TP
|
||||
\fI/var/log/wtmp\fR
|
||||
list of previous login sessions
|
||||
.TP
|
||||
\fI/etc/passwd\fR
|
||||
user account information
|
||||
.TP
|
||||
\fI/etc/shadow\fR
|
||||
secure user account information
|
||||
.TP
|
||||
\fI/etc/motd\fR
|
||||
system message of the day file
|
||||
.TP
|
||||
\fI/etc/nologin\fR
|
||||
prevent non\-root users from logging in
|
||||
.TP
|
||||
\fI/etc/ttytype\fR
|
||||
list of terminal types
|
||||
.TP
|
||||
\fI$HOME/\&.hushlogin\fR
|
||||
suppress printing of system messages
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
\fBmail\fR(1), \fBpasswd\fR(1), \fBsh\fR(1), \fBsu\fR(1), \fBlogin\&.defs\fR(5), \fBnologin\fR(5), \fBpasswd\fR(5), \fBgetty\fR(8)
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
Julianne Frances Haugh <jockgrrl@ix\&.netcom\&.com>
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='login.1'>
|
||||
<!-- $Id: login.1.xml,v 1.6 2005/04/26 12:45:50 kloczek Exp $ -->
|
||||
<!-- $Id: login.1.xml,v 1.9 2005/06/15 12:39:27 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>LOGIN</refentrytitle>
|
||||
<manvolnum>1</manvolnum>
|
||||
@@ -36,14 +36,13 @@
|
||||
|
||||
<refsect1 id='description'>
|
||||
<title>DESCRIPTION</title>
|
||||
<para>
|
||||
<command>login</command> is used to establish a new session with the
|
||||
<para><command>login</command> is used to establish a new session with the
|
||||
system. It is normally invoked automatically by responding to the
|
||||
<emphasis remap='I'>login:</emphasis> prompt on the user´s
|
||||
terminal. <command>login</command> may be special to the shell and may
|
||||
not be invoked as a sub-process. Typically, <command>login</command>
|
||||
is treated by the shell as <emphasis remap='B'>exec login</emphasis>
|
||||
which causes the user to exit from the current shell. Attempting to
|
||||
which causes the user to exit from the current shell. Attempting to
|
||||
execute <command>login</command> from any shell but the login shell
|
||||
will produce an error message.
|
||||
</para>
|
||||
@@ -157,32 +156,45 @@
|
||||
|
||||
<refsect1 id='files'>
|
||||
<title>FILES</title>
|
||||
<para>
|
||||
<filename>/var/run/utmp</filename> - list of current login
|
||||
sessions <!-- .br -->
|
||||
<filename>/var/log/wtmp</filename> - list of previous login
|
||||
sessions
|
||||
<!-- .br -->
|
||||
<filename>/etc/passwd</filename> - user account information
|
||||
<!-- .br -->
|
||||
<filename>/etc/shadow</filename> - secure user account information
|
||||
<!-- .br -->
|
||||
<filename>/etc/motd</filename> - system message file
|
||||
<!-- .br -->
|
||||
<filename>/etc/nologin</filename> - prevent non-root users from
|
||||
logging in
|
||||
<!-- .br -->
|
||||
<filename>/etc/ttytype</filename> - list of terminal types
|
||||
<!-- .br -->
|
||||
<emphasis remap='I'>$HOME/.hushlogin</emphasis> - suppress printing
|
||||
of system messages
|
||||
</para>
|
||||
<variablelist>
|
||||
<varlistentry>
|
||||
<term><filename>/var/run/utmp</filename></term>
|
||||
<listitem>list of current login sessions</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><filename>/var/log/wtmp</filename></term>
|
||||
<listitem>list of previous login sessions</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><filename>/etc/passwd</filename></term>
|
||||
<listitem>user account information</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><filename>/etc/shadow</filename></term>
|
||||
<listitem>secure user account information</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><filename>/etc/motd</filename></term>
|
||||
<listitem>system message of the day file</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><filename>/etc/nologin</filename></term>
|
||||
<listitem>prevent non-root users from logging in</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><filename>/etc/ttytype</filename></term>
|
||||
<listitem>list of terminal types</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><filename>$HOME/.hushlogin</filename></term>
|
||||
<listitem>suppress printing of system messages</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
</refsect1>
|
||||
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>mail</refentrytitle><manvolnum>1</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='loginaccess5'>
|
||||
<!-- $Id: login.access.5.xml,v 1.4 2005/04/22 07:00:57 kloczek Exp $ -->
|
||||
<!-- $Id: login.access.5.xml,v 1.5 2005/06/14 20:18:17 kloczek Exp $ -->
|
||||
<!-- this is comment -->
|
||||
<refmeta>
|
||||
<refentrytitle>LOGIN.ACCESS</refentrytitle>
|
||||
@@ -90,8 +90,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>login</refentrytitle><manvolnum>1</manvolnum>
|
||||
</citerefentry>
|
||||
</para>
|
||||
|
||||
272
man/login.defs.5
272
man/login.defs.5
@@ -1,159 +1,135 @@
|
||||
.\" $Id: login.defs.5,v 1.17 2005/04/26 12:16:36 kloczek Exp $
|
||||
.\" Copyright 1991 - 1993, Julianne Frances Haugh and Chip Rosenthal
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH LOGIN.DEFS 5
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "LOGIN.DEFS" 5 "" "" ""
|
||||
.SH NAME
|
||||
/etc/login.defs \- shadow password suite configuration
|
||||
.SH DESCRIPTION
|
||||
The
|
||||
\fI/etc/login.defs\fR file defines the site\-specific configuration for the
|
||||
shadow password suite. This file is required. Absence of this file will
|
||||
not prevent system operation, but will probably result in undesirable
|
||||
operation.
|
||||
login.defs \- shadow password suite configuration
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
This file is a readable text file, each line of the file describing one
|
||||
configuration parameter. The lines consist of a configuration name and
|
||||
value, separated by whitespace. Blank lines and comment lines are ignored.
|
||||
Comments are introduced with a `#' pound sign and the pound sign must be the
|
||||
first non\-white character of the line.
|
||||
The \fI/etc/login\&.defs\fR file defines the site\-specific configuration for the shadow password suite\&. This file is required\&. Absence of this file will not prevent system operation, but will probably result in undesirable operation\&.
|
||||
|
||||
.PP
|
||||
Parameter values may be of four types: strings, booleans, numbers, and long
|
||||
numbers. A string is comprised of any printable characters. A boolean should
|
||||
be either the value ``yes'' or ``no''. An undefined boolean parameter or one
|
||||
with a value other than these will be given a ``no'' value. Numbers (both
|
||||
regular and long) may be either decimal values, octal values (precede the
|
||||
value with ``0'') or hexadecimal values (precede the value with ``0x'').
|
||||
The maximum value of the regular and long numeric parameters is
|
||||
machine\-dependent.
|
||||
This file is a readable text file, each line of the file describing one configuration parameter\&. The lines consist of a configuration name and value, separated by whitespace\&. Blank lines and comment lines are ignored\&. Comments are introduced with a `#' pound sign and the pound sign must be the first non\-white character of the line\&.
|
||||
|
||||
.PP
|
||||
Parameter values may be of four types: strings, booleans, numbers, and long numbers\&. A string is comprised of any printable characters\&. A boolean should be either the value “yes” or “no”\&. An undefined boolean parameter or one with a value other than these will be given a “no” value\&. Numbers (both regular and long) may be either decimal values, octal values (precede the value with “0”) or hexadecimal values (precede the value with “0x”)\&. The maximum value of the regular and long numeric parameters is machine\-dependent\&.
|
||||
|
||||
.PP
|
||||
The following configuration items are provided:
|
||||
.\"
|
||||
.IP "CHFN_AUTH (boolean)"
|
||||
If \fIyes\fR, the \fBchfn\fR and \fBchsh\fR programs will require
|
||||
authentication before making any changes, unless run by the superuser.
|
||||
.\"
|
||||
.IP "CHFN_RESTRICT (string)"
|
||||
This parameter specifies which values in the \fIgecos\fR field of the
|
||||
\fI/etc/passwd\fR file may be changed by regular users using the \fBchfn\fR
|
||||
program. It can be any combination of letters \fIf\fR, \fIr\fR, \fIw\fR,
|
||||
\fIh\fR, for Full name, Room number, Work phone, and Home phone,
|
||||
respectively. For backward compatibility, "yes" is equivalent to "rwh" and
|
||||
"no" is equivalent to "frwh". If not specified, only the superuser can make
|
||||
any changes. The most restrictive setting is better achieved by not
|
||||
installing chfn SUID.
|
||||
.\"
|
||||
.IP "CREATE_HOME (boolean)"
|
||||
This defines whether useradd should create home directories for users by
|
||||
default. This option is OR'ed with the \fI\-m\fR flag on useradd command line.
|
||||
.\"
|
||||
.IP "GID_MAX (number)"
|
||||
.IP "GID_MIN (number)"
|
||||
Range of group IDs to choose from for the \fBuseradd\fR and \fBgroupadd\fR
|
||||
programs.
|
||||
.\"
|
||||
.IP "MAIL_DIR (string)"
|
||||
The mail spool directory. This is needed to manipulate the mailbox when its
|
||||
corresponding user account is modified or deleted. If not specified, a
|
||||
compile\-time default is used.
|
||||
.\"
|
||||
.IP "PASS_MAX_DAYS (number)"
|
||||
The maximum number of days a password may be used. If the password is older
|
||||
than this, a password change will be forced. If not specified, \-1 will be
|
||||
assumed (which disables the restriction).
|
||||
.IP "PASS_MIN_DAYS (number)"
|
||||
The minimum number of days allowed between password changes. Any password
|
||||
changes attempted sooner than this will be rejected. If not specified, \-1
|
||||
will be assumed (which disables the restriction).
|
||||
.IP "PASS_WARN_AGE (number)"
|
||||
The number of days warning given before a password expires. A zero means
|
||||
warning is given only upon the day of expiration, a negative value means no
|
||||
warning is given. If not specified, no warning will be provided.
|
||||
|
||||
.TP
|
||||
CHFN_AUTH (boolean)
|
||||
If \fIyes\fR, the \fBchfn\fR and \fBchsh\fR programs will require authentication before making any changes, unless run by the superuser\&.
|
||||
|
||||
.TP
|
||||
CHFN_RESTRICT (string)
|
||||
This parameter specifies which values in the \fIgecos\fR field of the \fI/etc/passwd\fR file may be changed by regular users using the \fBchfn\fR program\&. It can be any combination of letters \fIf\fR ,\fIr\fR, \fIw\fR, \fIh\fR, for Full name, Room number, Work phone, and Home phone, respectively\&. For backward compatibility, "yes" is equivalent to "rwh" and "no" is equivalent to "frwh"\&. If not specified, only the superuser can make any changes\&. The most restrictive setting is better achieved by not installing chfn SUID\&.
|
||||
|
||||
.TP
|
||||
CREATE_HOME (boolean)
|
||||
This defines whether useradd should create home directories for users by default\&. This option is OR'ed with the \fB\-m\fR flag on useradd command line\&.
|
||||
|
||||
.TP
|
||||
GID_MAX (number), GID_MIN (number)
|
||||
Range of group IDs to choose from for the \fBuseradd\fR and \fBgroupadd\fRprograms\&.
|
||||
|
||||
.TP
|
||||
MAIL_DIR (string)
|
||||
The mail spool directory\&. This is needed to manipulate the mailbox when its corresponding user account is modified or deleted\&. If not specified, a compile\-time default is used\&.
|
||||
|
||||
.TP
|
||||
PASS_MAX_DAYS (number)
|
||||
The maximum number of days a password may be used\&. If the password is older than this, a password change will be forced\&. If not specified, \-1 will be assumed (which disables the restriction)\&.
|
||||
|
||||
.TP
|
||||
PASS_MIN_DAYS (number)
|
||||
The minimum number of days allowed between password changes\&. Any password changes attempted sooner than this will be rejected\&. If not specified, \-1 will be assumed (which disables the restriction)\&.
|
||||
|
||||
.TP
|
||||
PASS_WARN_AGE (number)
|
||||
The number of days warning given before a password expires\&. A zero means warning is given only upon the day of expiration, a negative value means no warning is given\&. If not specified, no warning will be provided\&.
|
||||
|
||||
.PP
|
||||
PASS_MAX_DAYS, PASS_MIN_DAYS and PASS_WARN_AGE
|
||||
are only used at the time of account creation. Any changes to these
|
||||
settings won't affect existing accounts.
|
||||
.\"
|
||||
.IP "UID_MAX (number)"
|
||||
.IP "UID_MIN (number)"
|
||||
Range of user IDs to choose from for the \fBuseradd\fR program.
|
||||
.\"
|
||||
.IP "UMASK (number)"
|
||||
The permission mask is initialized to this value. If not specified,
|
||||
the permission mask will be initialized to 077.
|
||||
.\"
|
||||
.IP "USERDEL_CMD (string)"
|
||||
If defined, this command is run when removing a user.
|
||||
It should remove any at/cron/print jobs etc. owned by
|
||||
the user to be removed (passed as the first argument).
|
||||
.\"
|
||||
.SH CROSS REFERENCE
|
||||
The following cross reference shows which programs in the shadow password
|
||||
suite use which parameters.
|
||||
.na
|
||||
.IP chfn 12
|
||||
PASS_MAX_DAYS, PASS_MIN_DAYS and PASS_WARN_AGE are only used at the time of account creation\&. Any changes to these settings won't affect existing accounts\&.
|
||||
|
||||
.TP
|
||||
UID_MAX (number), UID_MIN (number)
|
||||
Range of user IDs to choose from for the \fBuseradd\fR program\&.
|
||||
|
||||
.TP
|
||||
UMASK (number)
|
||||
The permission mask is initialized to this value\&. If not specified, the permission mask will be initialized to 077\&.
|
||||
|
||||
.TP
|
||||
USERDEL_CMD (string)
|
||||
If defined, this command is run when removing a user\&. It should remove any at/cron/print jobs etc\&. owned by the user to be removed (passed as the first argument)\&.
|
||||
|
||||
.SH "CROSS REFERENCE"
|
||||
|
||||
.PP
|
||||
The following cross reference shows which programs in the shadow password suite use which parameters\&.
|
||||
|
||||
.TP
|
||||
chfn
|
||||
CHFN_AUTH CHFN_RESTRICT
|
||||
.IP chsh 12
|
||||
|
||||
.TP
|
||||
chsh
|
||||
CHFN_AUTH
|
||||
.IP groupadd 12
|
||||
|
||||
.TP
|
||||
groupadd
|
||||
GID_MAX GID_MIN
|
||||
.IP newusers 12
|
||||
|
||||
.TP
|
||||
newusers
|
||||
PASS_MAX_DAYS PASS_MIN_DAYS PASS_WARN_AGE UMASK
|
||||
|
||||
.TP
|
||||
pwconv
|
||||
PASS_MAX_DAYS PASS_MIN_DAYS PASS_WARN_AGE
|
||||
UMASK
|
||||
.IP pwconv 12
|
||||
PASS_MAX_DAYS PASS_MIN_DAYS PASS_WARN_AGE
|
||||
.IP useradd 12
|
||||
CREATE_HOME
|
||||
GID_MAX GID_MIN
|
||||
PASS_MAX_DAYS PASS_MIN_DAYS PASS_WARN_AGE
|
||||
UID_MAX UID_MIN
|
||||
UMASK
|
||||
.IP userdel 12
|
||||
|
||||
.TP
|
||||
useradd
|
||||
CREATE_HOME GID_MAX GID_MIN PASS_MAX_DAYS PASS_MIN_DAYS PASS_WARN_AGE UID_MAX UID_MIN UMASK
|
||||
|
||||
.TP
|
||||
userdel
|
||||
MAIL_DIR USERDEL_CMD
|
||||
|
||||
.TP
|
||||
usermod
|
||||
MAIL_DIR
|
||||
USERDEL_CMD
|
||||
.IP usermod 12
|
||||
MAIL_DIR
|
||||
.ad
|
||||
.SH BUGS
|
||||
Much of the functionality that used to be provided by the shadow password
|
||||
suite is now handled by PAM. Thus, \fI/etc/login.defs\fR is no longer used
|
||||
by programs such as
|
||||
.BR login (1),
|
||||
.BR passwd (1)
|
||||
and
|
||||
.BR su (1).
|
||||
Please refer to the corresponding PAM configuration files instead.
|
||||
.SH SEE ALSO
|
||||
.BR login (1),
|
||||
.BR passwd (1),
|
||||
.BR su (1),
|
||||
.BR passwd (5),
|
||||
.BR shadow (5),
|
||||
.BR pam (8)
|
||||
.SH AUTHORS
|
||||
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||
.br
|
||||
Chip Rosenthal (chip@unicom.com)
|
||||
|
||||
.SH "BUGS"
|
||||
|
||||
.PP
|
||||
Much of the functionality that used to be provided by the shadow password suite is now handled by PAM\&. Thus, \fI/etc/login\&.defs\fR is no longer used by programs such as: \fBlogin\fR(1), \fBpasswd\fR(1), \fBsu\fR(1)\&. Please refer to the corresponding PAM configuration files instead\&.
|
||||
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
\fBlogin\fR(1), \fBpasswd\fR(1), \fBsu\fR(1), \fBpasswd\fR(5), \fBshadow\fR(5), \fBpam\fR(8)
|
||||
|
||||
.SH "AUTHORS"
|
||||
|
||||
.PP
|
||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com) Chip Rosenthal (chip@unicom\&.com)
|
||||
|
||||
|
||||
@@ -2,13 +2,13 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='login.defs.5'>
|
||||
<!-- $Id: login.defs.5.xml,v 1.6 2005/04/27 18:20:35 kloczek Exp $ -->
|
||||
<!-- $Id: login.defs.5.xml,v 1.8 2005/06/15 12:39:27 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>login.defs</refentrytitle>
|
||||
<manvolnum>5</manvolnum>
|
||||
</refmeta>
|
||||
<refnamediv id='name'>
|
||||
<refname>/etc/login.defs</refname>
|
||||
<refname>login.defs</refname>
|
||||
<refpurpose>shadow password suite configuration</refpurpose>
|
||||
</refnamediv>
|
||||
|
||||
@@ -35,7 +35,7 @@
|
||||
other than these will be given a “no” value. Numbers (both
|
||||
regular and long) may be either decimal values, octal values (precede
|
||||
the value with “0”) or hexadecimal values (precede the
|
||||
value with “0x”). The maximum value of the regular and
|
||||
value with “0x”). The maximum value of the regular and
|
||||
long numeric parameters is machine-dependent.
|
||||
</para>
|
||||
|
||||
@@ -46,7 +46,7 @@
|
||||
<term>CHFN_AUTH (boolean)</term>
|
||||
<listitem>
|
||||
<para> If <emphasis remap='I'>yes</emphasis>, the
|
||||
<command>chfn</coamand> and <command>chsh</coamand> programs
|
||||
<command>chfn</command> and <command>chsh</command> programs
|
||||
will require authentication before making any changes, unless
|
||||
run by the superuser.
|
||||
</para>
|
||||
@@ -85,8 +85,8 @@
|
||||
<listitem>
|
||||
<para>
|
||||
Range of group IDs to choose from for the
|
||||
<command>useradd</coamand> and
|
||||
<command>groupadd</coamand>programs.
|
||||
<command>useradd</command> and
|
||||
<command>groupadd</command>programs.
|
||||
</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
@@ -142,7 +142,7 @@
|
||||
<listitem>
|
||||
<para>
|
||||
Range of user IDs to choose from for the
|
||||
<command>useradd</coamand> program.
|
||||
<command>useradd</command> program.
|
||||
</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
@@ -255,8 +255,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>login</refentrytitle><manvolnum>1</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
@@ -2,33 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='logoutd8'>
|
||||
<!-- $Id: logoutd.8.xml,v 1.4 2005/04/22 07:00:57 kloczek Exp $ -->
|
||||
<!-- Copyright 1991, Julianne Frances Haugh -->
|
||||
<!-- All rights reserved. -->
|
||||
|
||||
<!-- Redistribution and use in source and binary forms, with or without -->
|
||||
<!-- modification, are permitted provided that the following conditions -->
|
||||
<!-- are met: -->
|
||||
<!-- 1. Redistributions of source code must retain the above copyright -->
|
||||
<!-- notice, this list of conditions and the following disclaimer. -->
|
||||
<!-- 2. Redistributions in binary form must reproduce the above copyright -->
|
||||
<!-- notice, this list of conditions and the following disclaimer in the -->
|
||||
<!-- documentation and/or other materials provided with the distribution. -->
|
||||
<!-- 3. Neither the name of Julianne F. Haugh nor the names of its contributors -->
|
||||
<!-- may be used to endorse or promote products derived from this software -->
|
||||
<!-- without specific prior written permission. -->
|
||||
|
||||
<!-- THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND -->
|
||||
<!-- ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE -->
|
||||
<!-- IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE -->
|
||||
<!-- ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE -->
|
||||
<!-- FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL -->
|
||||
<!-- DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS -->
|
||||
<!-- OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) -->
|
||||
<!-- HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT -->
|
||||
<!-- LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY -->
|
||||
<!-- OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF -->
|
||||
<!-- SUCH DAMAGE. -->
|
||||
<!-- $Id: logoutd.8.xml,v 1.6 2005/06/15 12:39:27 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>LOGOUTD</refentrytitle>
|
||||
<manvolnum>8</manvolnum>
|
||||
@@ -46,29 +20,29 @@
|
||||
|
||||
<refsect1 id='description'>
|
||||
<title>DESCRIPTION</title>
|
||||
<para>
|
||||
<command>logoutd</command> enforces the login time and port
|
||||
restrictions specified in
|
||||
<filename>/etc/porttime</filename>. <command>logoutd</command>
|
||||
should be started from <filename>/etc/rc</filename>.
|
||||
The <filename>/var/run/utmp</filename> file is scanned periodically
|
||||
and each user name
|
||||
is checked to see if the named user is permitted on the named port
|
||||
at the current time.
|
||||
<para><command>logoutd</command> enforces the login time and port
|
||||
restrictions specified in <filename>/etc/porttime</filename>.
|
||||
<command>logoutd</command> should be started from
|
||||
<filename>/etc/rc</filename>. The <filename>/var/run/utmp</filename>
|
||||
file is scanned periodically and each user name is checked to see if
|
||||
the named user is permitted on the named port at the current time.
|
||||
Any login session which is violating the restrictions in <filename>
|
||||
/etc/porttime
|
||||
</filename>
|
||||
is terminated.
|
||||
/etc/porttime</filename> is terminated.
|
||||
</para>
|
||||
</refsect1>
|
||||
|
||||
<refsect1 id='files'>
|
||||
<title>FILES</title>
|
||||
<para>
|
||||
<filename>/etc/porttime</filename> - login and port permissions
|
||||
<!-- .br -->
|
||||
<filename>/var/run/utmp</filename> - current login sessions
|
||||
</para>
|
||||
<variablelist>
|
||||
<varlistentry>
|
||||
<term><filename>/etc/porttime</filename></term>
|
||||
<listitem>login and port permissions</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><filename>/var/run/utmp</filename></term>
|
||||
<listitem>list of current login sessions</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
</refsect1>
|
||||
|
||||
<refsect1 id='author'>
|
||||
|
||||
@@ -1,74 +0,0 @@
|
||||
.\"$Id: mkpasswd.8,v 1.14 2005/04/12 17:55:55 kloczek Exp $
|
||||
.\" Copyright 1991, Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH MKPASSWD 8
|
||||
.SH NAME
|
||||
mkpasswd \- Update passwd and group database files
|
||||
.SH SYNOPSIS
|
||||
\fBmkpasswd\fR [\fB\-fvgps\fR] \fIfile\fR
|
||||
.SH DESCRIPTION
|
||||
\fBmkpasswd\fR reads the file in the format given by the flags and converts
|
||||
it to the corresponding database file format. These database files are used
|
||||
to improve access performance on systems with large numbers of users. The
|
||||
output files will be named \fIfile\fR.dir and \fIfile\fR.pag.
|
||||
.PP
|
||||
The \fB\-f\fR option causes \fBmkpasswd\fR to ignore any existing output
|
||||
files and overwrite them. Normally \fBmkpasswd\fR complains about existing
|
||||
output files and quits.
|
||||
.PP
|
||||
The \fB\-v\fR option causes \fBmkpasswd\fR to output information about each
|
||||
record as it is converted, with a final message at the very end.
|
||||
.PP
|
||||
The \fB\-g\fR option treats the input file as though it were in
|
||||
\fI/etc/group\fR file format. When combined with the \fB\-s\fR option, the
|
||||
\fI/etc/gshadow\fR file format is used instead.
|
||||
.PP
|
||||
The \fB\-p\fR option treats the input file as though it were in
|
||||
\fI/etc/passwd\fR file format. This is the default. When combined with the
|
||||
\fB\-s\fR option, the \fI/etc/shadow\fR file format is used instead.
|
||||
.SH CAVEATS
|
||||
The use of more than one database file is limited to systems which include
|
||||
the NDBM database library and therefore may not be available on every
|
||||
system.
|
||||
.SH NOTE
|
||||
Since most commands are capable of updating the database files as changes
|
||||
are made, this command need only be used when re\-creating a deleted or
|
||||
corrupted database file.
|
||||
.SH FILES
|
||||
\fI/etc/passwd\fR \- user account information
|
||||
.br
|
||||
\fI/etc/shadow\fR \- secure user account information
|
||||
.br
|
||||
\fI/etc/group\fR \- group account information
|
||||
.br
|
||||
\fI/etc/gshadow\fR \- shadow group information
|
||||
.SH SEE ALSO
|
||||
.BR group (5),
|
||||
.BR passwd (5),
|
||||
.BR shadow (5)
|
||||
.SH AUTHOR
|
||||
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||
@@ -1,114 +0,0 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='mkpasswd8'>
|
||||
<!-- $Id: mkpasswd.8.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>mkpasswd</refentrytitle>
|
||||
<manvolnum>8</manvolnum>
|
||||
</refmeta>
|
||||
<refnamediv id='name'>
|
||||
<refname>mkpasswd</refname>
|
||||
<refpurpose>Update passwd and group database files</refpurpose>
|
||||
</refnamediv>
|
||||
|
||||
<refsynopsisdiv id='synopsis'>
|
||||
<cmdsynopsis>
|
||||
<command>mkpasswd</command>
|
||||
<arg choice='opt'>-fvgps </arg>
|
||||
<arg choice='plain'><replaceable>file</replaceable></arg>
|
||||
</cmdsynopsis>
|
||||
</refsynopsisdiv>
|
||||
|
||||
<refsect1 id='description'>
|
||||
<title>DESCRIPTION</title>
|
||||
<para>
|
||||
<command>mkpasswd</command> reads the file in the format given by the
|
||||
flags and converts it to the corresponding database file format. These
|
||||
database files are used to improve access performance on systems with
|
||||
large numbers of users. The output files will be named <emphasis
|
||||
remap='I'>file</emphasis>.dir and <emphasis
|
||||
remap='I'>file</emphasis>.pag.
|
||||
</para>
|
||||
|
||||
<para>The <option>-f</option> option causes <command>mkpasswd</command>
|
||||
to ignore any existing output files and overwrite them. Normally
|
||||
<command>mkpasswd</command> complains about existing output files and
|
||||
quits.
|
||||
</para>
|
||||
|
||||
<para>The <option>-v</option> option causes <command>mkpasswd</command>
|
||||
to output information about each record as it is converted, with a
|
||||
final message at the very end.
|
||||
</para>
|
||||
|
||||
<para>The <option>-g</option> option treats the input file as though it
|
||||
were in <filename>/etc/group</filename> file format. When combined
|
||||
with the <option>-s</option> option, the
|
||||
<filename>/etc/gshadow</filename> file format is used instead.
|
||||
</para>
|
||||
|
||||
<para>The <option>-p</option> option treats the input file as though it
|
||||
were in <filename>/etc/passwd</filename> file format. This is the
|
||||
default. When combined with the <option>-s</option> option, the
|
||||
<filename>/etc/shadow</filename> file format is used instead.
|
||||
</para>
|
||||
</refsect1>
|
||||
|
||||
<refsect1 id='caveats'>
|
||||
<title>CAVEATS</title>
|
||||
<para>The use of more than one database file is limited to systems which
|
||||
include the NDBM database library and therefore may not be available
|
||||
on every system.
|
||||
</para>
|
||||
</refsect1>
|
||||
|
||||
<refsect1 id='note'>
|
||||
<title>NOTE</title>
|
||||
<para>Since most commands are capable of updating the database files as
|
||||
changes are made, this command need only be used when re-creating a
|
||||
deleted or corrupted database file.
|
||||
</para>
|
||||
</refsect1>
|
||||
|
||||
<refsect1 id='files'>
|
||||
<title>FILES</title>
|
||||
<varlistentry>
|
||||
<term><filename>/etc/passwd</filename></term>
|
||||
<listitem>user account information</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><filename>/etc/shadow</filename></term>
|
||||
<listitem>secure user account information</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><filename>/etc/group</filename></term>
|
||||
<listitem>group account information</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><filename>/etc/gshadow</filename></term>
|
||||
<listitem>group account information</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
</refsect1>
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<refentrytitle>group</refentrytitle><manvolnum>5</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
<refentrytitle>passwd</refentrytitle><manvolnum>5</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
<refentrytitle>shadow</refentrytitle><manvolnum>5</manvolnum>
|
||||
</citerefentry>
|
||||
</para>
|
||||
</refsect1>
|
||||
|
||||
<refsect1 id='author'>
|
||||
<title>AUTHOR</title>
|
||||
<para>Julianne Frances Haugh (jockgrrl@ix.netcom.com)</para>
|
||||
</refsect1>
|
||||
</refentry>
|
||||
122
man/newusers.8
122
man/newusers.8
@@ -1,61 +1,69 @@
|
||||
.\"$Id: newusers.8,v 1.14 2005/04/02 16:10:24 kloczek Exp $
|
||||
.\" Copyright 1991 - 1994, Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH NEWUSERS 8
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "NEWUSERS" 8 "" "" ""
|
||||
.SH NAME
|
||||
newusers \- update and create new users in batch
|
||||
.SH SYNOPSIS
|
||||
.SH "SYNOPSIS"
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 9
|
||||
\fBnewusers\fR [\fInew_users\fR]
|
||||
.SH DESCRIPTION
|
||||
\fBnewusers\fR reads a file of user name and clear\-text password pairs and
|
||||
uses this information to update a group of existing users or to create new
|
||||
users. Each line is in the same format as the standard password file (see
|
||||
\fBpasswd\fR(5)) with the following exceptions.
|
||||
.IP "\fIpw_passwd\fR" 10
|
||||
This field will be encrypted and used as the new value of the encrypted
|
||||
password.
|
||||
.IP "\fIpw_age\fR"
|
||||
This field will be ignored for shadow passwords if the user already exists.
|
||||
.IP "\fIpw_gid\fR"
|
||||
This field may be the name of an existing group, in which case the named
|
||||
user will be added as a member. If a non\-existent numerical group is given,
|
||||
a new group will be created having this number.
|
||||
.IP "\fIpw_dir\fR"
|
||||
This field will be checked for existence as a directory and a new directory
|
||||
with the same name will be created if it does not already exist. The
|
||||
ownership of the directory will be set to be that of the user being created
|
||||
or updated.
|
||||
.ad
|
||||
.hy
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
This command is intended to be used in a large system environment where many
|
||||
accounts are updated at a single time.
|
||||
.SH CAVEATS
|
||||
The input file must be protected since it contains unencrypted passwords.
|
||||
.SH SEE ALSO
|
||||
.BR passwd (1),
|
||||
.BR useradd (8)
|
||||
.SH AUTHOR
|
||||
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||
\fBnewusers\fR reads a file of user name and clear\-text password pairs and uses this information to update a group of existing users or to create new users\&. Each line is in the same format as the standard password file (see \fBpasswd\fR(5)) with the following exceptions:
|
||||
|
||||
.TP
|
||||
\fIpw_passwd\fR
|
||||
This field will be encrypted and used as the new value of the encrypted password\&.
|
||||
|
||||
.TP
|
||||
\fIpw_age\fR
|
||||
This field will be ignored for shadow passwords if the user already exists\&.
|
||||
|
||||
.TP
|
||||
\fIpw_gid\fR
|
||||
This field may be the name of an existing group, in which case the named user will be added as a member\&. If a non\-existent numerical group is given, a new group will be created having this number\&.
|
||||
|
||||
.TP
|
||||
\fIpw_dir\fR
|
||||
This field will be checked for existence as a directory and a new directory with the same name will be created if it does not already exist\&. The ownership of the directory will be set to be that of the user being created or updated\&.
|
||||
|
||||
.PP
|
||||
This command is intended to be used in a large system environment where many accounts are updated at a single time\&.
|
||||
|
||||
.SH "CAVEATS"
|
||||
|
||||
.PP
|
||||
The input file must be protected since it contains unencrypted passwords\&.
|
||||
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
\fBpasswd\fR(1), \fBuseradd\fR(8)
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
||||
|
||||
|
||||
@@ -2,33 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='newusers8'>
|
||||
<!-- $Id: newusers.8.xml,v 1.4 2005/04/22 07:00:57 kloczek Exp $ -->
|
||||
<!-- Copyright 1991 \- 1994, Julianne Frances Haugh -->
|
||||
<!-- All rights reserved. -->
|
||||
|
||||
<!-- Redistribution and use in source and binary forms, with or without -->
|
||||
<!-- modification, are permitted provided that the following conditions -->
|
||||
<!-- are met: -->
|
||||
<!-- 1. Redistributions of source code must retain the above copyright -->
|
||||
<!-- notice, this list of conditions and the following disclaimer. -->
|
||||
<!-- 2. Redistributions in binary form must reproduce the above copyright -->
|
||||
<!-- notice, this list of conditions and the following disclaimer in the -->
|
||||
<!-- documentation and/or other materials provided with the distribution. -->
|
||||
<!-- 3. Neither the name of Julianne F. Haugh nor the names of its contributors -->
|
||||
<!-- may be used to endorse or promote products derived from this software -->
|
||||
<!-- without specific prior written permission. -->
|
||||
|
||||
<!-- THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND -->
|
||||
<!-- ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE -->
|
||||
<!-- IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE -->
|
||||
<!-- ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE -->
|
||||
<!-- FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL -->
|
||||
<!-- DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS -->
|
||||
<!-- OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) -->
|
||||
<!-- HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT -->
|
||||
<!-- LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY -->
|
||||
<!-- OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF -->
|
||||
<!-- SUCH DAMAGE. -->
|
||||
<!-- $Id: newusers.8.xml,v 1.6 2005/06/16 17:37:58 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>NEWUSERS</refentrytitle>
|
||||
<manvolnum>8</manvolnum>
|
||||
@@ -49,27 +23,22 @@
|
||||
|
||||
<refsect1 id='description'>
|
||||
<title>DESCRIPTION</title>
|
||||
<para>
|
||||
<command>newusers</command> reads a file of user name and
|
||||
clear-text password pairs and
|
||||
uses this information to update a group of existing users or to
|
||||
create new
|
||||
users. Each line is in the same format as the standard password
|
||||
file (see
|
||||
<citerefentry>
|
||||
<refentrytitle>passwd</refentrytitle><manvolnum>5</manvolnum>
|
||||
</citerefentry>
|
||||
)with the following exceptions.
|
||||
<para><command>newusers</command> reads a file of user name and
|
||||
clear-text password pairs and uses this information to update a group
|
||||
of existing users or to create new users. Each line is in the same
|
||||
format as the standard password file (see
|
||||
<citerefentry><refentrytitle>passwd</refentrytitle><manvolnum>5</manvolnum>
|
||||
</citerefentry>) with the following exceptions:
|
||||
</para>
|
||||
|
||||
<variablelist remap='IP'>
|
||||
<varlistentry>
|
||||
<term>
|
||||
<emphasis remap='I'>pw_passwd</emphasis>
|
||||
</term>
|
||||
<listitem>
|
||||
<para>This field will be encrypted and used as the new
|
||||
value of the encrypted
|
||||
password.
|
||||
<para>This field will be encrypted and used as the new value of
|
||||
the encrypted password.
|
||||
</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
@@ -78,8 +47,8 @@
|
||||
<emphasis remap='I'>pw_age</emphasis>
|
||||
</term>
|
||||
<listitem>
|
||||
<para>This field will be ignored for shadow passwords if
|
||||
the user already exists.
|
||||
<para>This field will be ignored for shadow passwords if the user
|
||||
already exists.
|
||||
</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
@@ -88,11 +57,10 @@
|
||||
<emphasis remap='I'>pw_gid</emphasis>
|
||||
</term>
|
||||
<listitem>
|
||||
<para>This field may be the name of an existing group, in
|
||||
which case the named
|
||||
user will be added as a member. If a non-existent
|
||||
numerical group is given,
|
||||
a new group will be created having this number.
|
||||
<para>This field may be the name of an existing group, in which
|
||||
case the named user will be added as a member. If a non-existent
|
||||
numerical group is given, a new group will be created having
|
||||
this number.
|
||||
</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
@@ -101,21 +69,17 @@
|
||||
<emphasis remap='I'>pw_dir</emphasis>
|
||||
</term>
|
||||
<listitem>
|
||||
<para>This field will be checked for existence as a
|
||||
directory and a new directory
|
||||
with the same name will be created if it does not
|
||||
already exist. The
|
||||
ownership of the directory will be set to be that of
|
||||
the user being created
|
||||
or updated.
|
||||
<para>This field will be checked for existence as a directory and
|
||||
a new directory with the same name will be created if it does
|
||||
not already exist. The ownership of the directory will be set to
|
||||
be that of the user being created or updated.
|
||||
</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
|
||||
<para>This command is intended to be used in a large system environment
|
||||
where many
|
||||
accounts are updated at a single time.
|
||||
where many accounts are updated at a single time.
|
||||
</para>
|
||||
</refsect1>
|
||||
|
||||
@@ -128,11 +92,9 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>passwd</refentrytitle><manvolnum>1</manvolnum>
|
||||
</citerefentry>
|
||||
,
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
<refentrytitle>useradd</refentrytitle><manvolnum>8</manvolnum>
|
||||
</citerefentry>
|
||||
|
||||
354
man/passwd.1
354
man/passwd.1
@@ -1,198 +1,188 @@
|
||||
.\" $Id: passwd.1,v 1.25 2005/05/09 10:14:40 kloczek Exp $
|
||||
.\" Copyright 1989 - 1994, Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH PASSWD 1
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "PASSWD" 1 "" "" ""
|
||||
.SH NAME
|
||||
passwd \- change user password
|
||||
.SH SYNOPSIS
|
||||
\fBpasswd\fR [\fB\-f\fR|\fB\-s\fR] [\fIname\fR]
|
||||
.br
|
||||
\fBpasswd\fR [\fB\-g\fR] [\fB\-r\fR|\fB\-R\fR] \fIgroup\fR
|
||||
.br
|
||||
\fBpasswd\fR [\fB\-x\fR \fImax\fR] [\fB\-n\fR \fImin\fR]
|
||||
[\fB\-w\fR \fIwarn\fR] [\fB\-i\fR \fIinact\fR] \fIlogin\fR
|
||||
.br
|
||||
\fBpasswd\fR {\fB\-l\fR|\fB\-u\fR|\fB\-d\fR|\fB\-S\fR|\fB\-e\fR} \fIlogin\fR
|
||||
.SH DESCRIPTION
|
||||
\fBpasswd\fR changes passwords for user and group accounts. A normal user
|
||||
may only change the password for his/her own account, the super user may
|
||||
change the password for any account. The administrator of a group may change
|
||||
the password for the group. \fBpasswd\fR also changes account information,
|
||||
such as the full name of the user, user's login shell, or password expiry
|
||||
date and interval.
|
||||
.SH "SYNOPSIS"
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 7
|
||||
\fBpasswd\fR [\fB\-f\fR | \fB\-s\fR] [\fIname\fR]
|
||||
.ad
|
||||
.hy
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 7
|
||||
\fBpasswd\fR [\-g] [\fB\-r\fR | \fB\-R\fR] \fIgroup\fR
|
||||
.ad
|
||||
.hy
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 7
|
||||
\fBpasswd\fR [\-x\ \fImax\fR] [\-n\ \fImin\fR] [\-w\ \fIwarn\fR] [\-i\ \fIinact\fR] \fIlogin\fR
|
||||
.ad
|
||||
.hy
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 7
|
||||
\fBpasswd\fR [\fB\-l\fR | \fB\-u\fR | \fB\-d\fR | \fB\-S\fR | \fB\-e\fR] \fIlogin\fR
|
||||
.ad
|
||||
.hy
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
The \fB\-s\fR option makes \fBpasswd\fR call \fBchsh\fR to change the user's
|
||||
shell. The \fB\-f\fR option makes \fBpasswd\fR call \fBchfn\fR to change the user's
|
||||
gecos information. These two options are only meant for compatiblity, since
|
||||
the other programs can be called directly.
|
||||
.SS Password Changes
|
||||
The user is first prompted for his/her old password, if one is present. This
|
||||
password is then encrypted and compared against the stored password. The
|
||||
user has only one chance to enter the correct password. The super user is
|
||||
permitted to bypass this step so that forgotten passwords may be changed.
|
||||
\fBpasswd\fR changes passwords for user and group accounts\&. A normal user may only change the password for his/her own account, the super user may change the password for any account\&. The administrator of a group may change the password for the group\&. \fBpasswd\fR also changes account information, such as the full name of the user, user's login shell, or password expiry date and interval\&.
|
||||
|
||||
.PP
|
||||
After the password has been entered, password aging information is checked
|
||||
to see if the user is permitted to change the password at this time. If not,
|
||||
\fBpasswd\fR refuses to change the password and exits.
|
||||
The \fB\-s\fR option makes \fBpasswd\fR call \fBchsh\fR to change the user's shell\&. The \fB\-f\fR option makes \fBpasswd\fR call \fBchfn\fR to change the user's gecos information\&. These two options are only meant for compatibility, since the other programs can be called directly\&.
|
||||
|
||||
.SS "Password Changes"
|
||||
|
||||
.PP
|
||||
The user is then prompted for a replacement password. This password is
|
||||
tested for complexity. As a general guideline, passwords should consist of 6
|
||||
to 8 characters including one or more from each of following sets:
|
||||
.IP "" .5i
|
||||
Lower case alphabetics
|
||||
.IP "" .5i
|
||||
Upper case alphabetics
|
||||
.IP "" .5i
|
||||
Digits 0 thru 9
|
||||
.IP "" .5i
|
||||
Punctuation marks
|
||||
The user is first prompted for his/her old password, if one is present\&. This password is then encrypted and compared against the stored password\&. The user has only one chance to enter the correct password\&. The super user is permitted to bypass this step so that forgotten passwords may be changed\&.
|
||||
|
||||
.PP
|
||||
Care must be taken not to include the system default erase or kill
|
||||
characters. \fBpasswd\fR will reject any password which is not suitably
|
||||
complex.
|
||||
After the password has been entered, password aging information is checked to see if the user is permitted to change the password at this time\&. If not, \fBpasswd\fR refuses to change the password and exits\&.
|
||||
|
||||
.PP
|
||||
If the password is accepted, \fBpasswd\fR will prompt again and compare the
|
||||
second entry against the first. Both entries are required to match in order
|
||||
for the password to be changed.
|
||||
.SS Group passwords
|
||||
When the \fB\-g\fR option is used, the password for the named group is
|
||||
changed. The user must either be the super user, or a group administrator
|
||||
for the named group. The current group password is not prompted for. The
|
||||
\fB\-r\fR option is used with the \fB\-g\fR option to remove the current
|
||||
password from the named group. This allows group access to all members. The
|
||||
\fB\-R\fR option is used with the \fB\-g\fR option to restrict the named group
|
||||
for all users.
|
||||
.SS Password expiry information
|
||||
The password aging information may be changed by the super user with the
|
||||
\fB\-x\fR, \fB\-n\fR, \fB\-w\fR, and \fB\-i\fR options. The \fB\-x\fR option is
|
||||
used to set the maximum number of days a password remains valid. After
|
||||
\fImax\fR days, the password is required to be changed. The \fB\-n\fR option
|
||||
is used to set the minimum number of days before a password may be changed.
|
||||
The user will not be permitted to change the password until \fImin\fR days
|
||||
have elapsed. The \fB\-w\fR option is used to set the number of days of
|
||||
warning the user will receive before his/her password will expire. The
|
||||
warning occurs \fIwarn\fR days before the expiration, telling the user how
|
||||
many days remain until the password is set to expire. The \fB\-i\fR option is
|
||||
used to disable an account after the password has been expired for a number
|
||||
of days. After a user account has had an expired password for \fIinact\fR
|
||||
days, the user may no longer sign on to the account.
|
||||
The user is then prompted for a replacement password\&. This password is tested for complexity\&. As a general guideline, passwords should consist of 6 to 8 characters including one or more from each of following sets:
|
||||
|
||||
.TP 3
|
||||
\(bu
|
||||
lower case alphabetics
|
||||
.TP
|
||||
\(bu
|
||||
digits 0 thru 9
|
||||
.TP
|
||||
\(bu
|
||||
punctuation marks
|
||||
.LP
|
||||
|
||||
.PP
|
||||
If you wish to immediately expire an account's password, you can use the
|
||||
\fB\-e\fR option. This in effect can force a user to change his/her password at
|
||||
the user's next login. You can also use the \fB\-d\fR option to delete a user's
|
||||
password (make it empty). Use caution with this option since it can make an
|
||||
account not require a password at all to login, leaving your system open to
|
||||
intruders.
|
||||
.SS Account maintenance
|
||||
User accounts may be locked and unlocked with the \fB\-l\fR and \fB\-u\fR
|
||||
flags. The \fB\-l\fR option disables an account by changing the password to
|
||||
a value which matches no possible encrypted value. The \fB\-u\fR option
|
||||
re\-enables an account by changing the password back to its previous value.
|
||||
Care must be taken not to include the system default erase or kill characters\&. \fBpasswd\fR will reject any password which is not suitably complex\&.
|
||||
|
||||
.PP
|
||||
The account status may be viewed with the \fB-S\fR option.
|
||||
The status information consists of 7 fields.
|
||||
The first field is the user's login name.
|
||||
The second field indicates if the user account is locked (L), has no
|
||||
password (NP), or has a usable password (P).
|
||||
The third field gives the date of the last password change.
|
||||
The next four fields are the minimum age, maximum age, warning period,
|
||||
and inactivity period for the password.
|
||||
These ages are expressed in days.
|
||||
See \fBPassword expiry information\fR above for a discussion of these fields.
|
||||
.SS Hints for user passwords
|
||||
The security of a password depends upon the strength of the
|
||||
encryption algorithm and the size of the key space.
|
||||
The \fB\s\-2UNIX\s+2\fR System encryption method is based on
|
||||
the NBS DES algorithm and is very secure.
|
||||
The size of the key space depends upon the randomness of the
|
||||
password which is selected.
|
||||
If the password is accepted, \fBpasswd\fR will prompt again and compare the second entry against the first\&. Both entries are required to match in order for the password to be changed\&.
|
||||
|
||||
.SS "Group passwords"
|
||||
|
||||
.PP
|
||||
Compromises in password security normally result from careless
|
||||
password selection or handling.
|
||||
For this reason, you should not select a password which appears in
|
||||
a dictionary or which must be written down.
|
||||
The password should also not be a proper name, your license
|
||||
number, birth date, or street address.
|
||||
Any of these may be used as guesses to violate system security.
|
||||
When the \fB\-g\fR option is used, the password for the named group is changed\&. The user must either be the super user, or a group administrator for the named group\&. The current group password is not prompted for\&. The \fB\-r\fR option is used with the \fB\-g\fR option to remove the current password from the named group\&. This allows group access to all members\&. The \fB\-R\fR option is used with the \fB\-g\fR option to restrict the named group for all users\&.
|
||||
|
||||
.SS "Password expiry information"
|
||||
|
||||
.PP
|
||||
Your password must easily remembered so that you will not
|
||||
be forced to write it on a piece of paper.
|
||||
This can be accomplished by appending two small words together
|
||||
and separating each with a special character or digit.
|
||||
For example, Pass%word.
|
||||
The password aging information may be changed by the super user with the \fB\-x\fR, \fB\-n\fR, \fB\-w\fR, and \fB\-i\fR options\&. The \fB\-x\fR option is used to set the maximum number of days a password remains valid\&. After \fImax\fR days, the password is required to be changed\&. The \fB\-n\fR option is used to set the minimum number of days before a password may be changed\&. The user will not be permitted to change the password until \fImin\fR days have elapsed\&. The \fB\-w\fR option is used to set the number of days of warning the user will receive before his/her password will expire\&. The warning occurs \fIwarn\fR days before the expiration, telling the user how many days remain until the password is set to expire\&. The \fB\-i\fR option is used to disable an account after the password has been expired for a number of days\&. After a user account has had an expired password for \fIinact\fR days, the user may no longer sign on to the account\&.
|
||||
|
||||
.PP
|
||||
Other methods of construction involve selecting an easily
|
||||
remembered phrase from literature and selecting the first
|
||||
or last letter from each word.
|
||||
An example of this is
|
||||
.IP "" .5i
|
||||
Ask not for whom the bell tolls.
|
||||
If you wish to immediately expire an account's password, you can use the \fB\-e\fR option\&. This in effect can force a user to change his/her password at the user's next login\&. You can also use the \fB\-d\fR option to delete a user's password (make it empty)\&. Use caution with this option since it can make an account not require a password at all to login, leaving your system open to intruders\&.
|
||||
|
||||
.SS "Account maintenance"
|
||||
|
||||
.PP
|
||||
User accounts may be locked and unlocked with the \fB\-l\fR and \fB\-u\fR flags\&. The \fB\-l\fR option disables an account by changing the password to a value which matches no possible encrypted value\&. The \fB\-u\fR option re\-enables an account by changing the password back to its previous value\&.
|
||||
|
||||
.PP
|
||||
The account status may be viewed with the \fB\-S\fR option\&. The status information consists of 7 fields\&. The first field is the user's login name\&. The second field indicates if the user account is locked (L), has no password (NP), or has a usable password (P)\&. The third field gives the date of the last password change\&. The next four fields are the minimum age, maximum age, warning period, and inactivity period for the password\&. These ages are expressed in days\&. See \fIPassword expiry information\fR above for a discussion of these fields\&.
|
||||
|
||||
.SS "Hints for user passwords"
|
||||
|
||||
.PP
|
||||
The security of a password depends upon the strength of the encryption algorithm and the size of the key space\&. The \fI\\s\-2UNIX\fR System encryption method is based on the NBS DES algorithm and is very secure\&. The size of the key space depends upon the randomness of the password which is selected\&.
|
||||
|
||||
.PP
|
||||
Compromises in password security normally result from careless password selection or handling\&. For this reason, you should not select a password which appears in a dictionary or which must be written down\&. The password should also not be a proper name, your license number, birth date, or street address\&. Any of these may be used as guesses to violate system security\&.
|
||||
|
||||
.PP
|
||||
Your password must easily remembered so that you will not be forced to write it on a piece of paper\&. This can be accomplished by appending two small words together and separating each with a special character or digit\&. For example, Pass%word\&.
|
||||
|
||||
.PP
|
||||
Other methods of construction involve selecting an easily remembered phrase from literature and selecting the first or last letter from each word\&. An example of this is:
|
||||
|
||||
.TP 3
|
||||
\(bu
|
||||
Ask not for whom the bell tolls
|
||||
.TP
|
||||
\(bu
|
||||
which produces
|
||||
.IP "" .5i
|
||||
An4wtbt.
|
||||
.TP
|
||||
\(bu
|
||||
An4wtbt
|
||||
.LP
|
||||
|
||||
.PP
|
||||
You may be reasonably sure few crackers will have included this in their
|
||||
dictionaries. You should, however, select your own methods for constructing
|
||||
passwords and not rely exclusively on the methods given here.
|
||||
.SS Notes about group passwords
|
||||
Group passwords are an inherent security problem since more than one person
|
||||
is permitted to know the password. However, groups are a useful tool for
|
||||
permitting co\-operation between different users.
|
||||
.SH CAVEATS
|
||||
Not all options may be supported.
|
||||
Password complexity checking may vary from site to site.
|
||||
The user is urged to select a password as complex as he
|
||||
feels comfortable with.
|
||||
Users may not be able to change their password on a system if NIS
|
||||
is enabled and they are not logged into the NIS server.
|
||||
.SH FILES
|
||||
\fI/etc/passwd\fR \- user account information
|
||||
.br
|
||||
\fI/etc/shadow\fR \- secure user account information
|
||||
.SH EXIT VALUES
|
||||
.TP 2
|
||||
The \fBpasswd\fR command exits with the following values:
|
||||
\fB0\fR \- success
|
||||
.br
|
||||
\fB1\fR \- permission denied
|
||||
.br
|
||||
\fB2\fR \- invalid combination of options
|
||||
.br
|
||||
\fB3\fR \- unexpected failure, nothing done
|
||||
.br
|
||||
\fB4\fR \- unexpected failure, passwd file missing
|
||||
.br
|
||||
\fB5\fR \- passwd file busy, try again later
|
||||
.br
|
||||
\fB6\fR \- invalid argument to option
|
||||
You may be reasonably sure few crackers will have included this in their dictionaries\&. You should, however, select your own methods for constructing passwords and not rely exclusively on the methods given here\&.
|
||||
|
||||
.SS "Notes about group passwords"
|
||||
|
||||
.PP
|
||||
Group passwords are an inherent security problem since more than one person is permitted to know the password\&. However, groups are a useful tool for permitting co\-operation between different users\&.
|
||||
|
||||
.SH "CAVEATS"
|
||||
|
||||
.PP
|
||||
Not all options may be supported\&. Password complexity checking may vary from site to site\&. The user is urged to select a password as complex as he feels comfortable with\&. Users may not be able to change their password on a system if NIS is enabled and they are not logged into the NIS server\&.
|
||||
|
||||
.SH "FILES"
|
||||
|
||||
.TP
|
||||
\fI/etc/passwd\fR
|
||||
user account information
|
||||
.TP
|
||||
\fI/etc/shadow\fR
|
||||
secure user account information
|
||||
.SH "EXIT VALUES"
|
||||
|
||||
.PP
|
||||
The \fBpasswd\fR command exits with the following values:
|
||||
|
||||
.TP
|
||||
\fI0\fR
|
||||
success
|
||||
.TP
|
||||
\fI1\fR
|
||||
permission denied
|
||||
.TP
|
||||
\fI2\fR
|
||||
invalid combination of options
|
||||
.TP
|
||||
\fI3\fR
|
||||
unexpected failure, nothing done
|
||||
.TP
|
||||
\fI4\fR
|
||||
unexpected failure, passwd file missing
|
||||
.TP
|
||||
\fI5\fR
|
||||
passwd file busy, try again
|
||||
.TP
|
||||
\fI6\fR
|
||||
invalid argument to option
|
||||
|
||||
.SH "SEE ALSO"
|
||||
.BR group (5),
|
||||
.BR passwd (5),
|
||||
.BR shadow (5)
|
||||
.SH AUTHOR
|
||||
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
|
||||
|
||||
.PP
|
||||
\fBgroup\fR(5), \fBpasswd\fR(5), \fBshadow\fR(5)
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
Julianne Frances Haugh <jockgrrl@ix\&.netcom\&.com>
|
||||
|
||||
|
||||
116
man/passwd.1.xml
116
man/passwd.1.xml
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='passwd.1'>
|
||||
<!-- $Id: passwd.1.xml,v 1.8 2005/05/09 10:14:39 kloczek Exp $ -->
|
||||
<!-- $Id: passwd.1.xml,v 1.11 2005/06/20 08:47:36 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>passwd</refentrytitle>
|
||||
<manvolnum>1</manvolnum>
|
||||
@@ -58,8 +58,7 @@
|
||||
|
||||
<refsect1 id='description'>
|
||||
<title>DESCRIPTION</title>
|
||||
<para>
|
||||
<command>passwd</command> changes passwords for user and group
|
||||
<para><command>passwd</command> changes passwords for user and group
|
||||
accounts. A normal user may only change the password for his/her own
|
||||
account, the super user may change the password for any account. The
|
||||
administrator of a group may change the password for the group.
|
||||
@@ -68,11 +67,12 @@
|
||||
and interval.
|
||||
</para>
|
||||
|
||||
<para>The <option>-s</option> option makes <command>passwd</command>
|
||||
call <command>chsh</coamand> to change the user's shell. The
|
||||
<para>
|
||||
The <option>-s</option> option makes <command>passwd</command> call
|
||||
<command>chsh</command> to change the user's shell. The
|
||||
<option>-f</option> option makes <command>passwd</command> call
|
||||
<command>chfn</command> to change the user's gecos information. These
|
||||
two options are only meant for compatiblity, since the other programs
|
||||
two options are only meant for compatibility, since the other programs
|
||||
can be called directly.
|
||||
</para>
|
||||
|
||||
@@ -97,13 +97,17 @@
|
||||
of following sets:
|
||||
</para>
|
||||
|
||||
<para>Lower case alphabetics</para>
|
||||
|
||||
<para>Upper case alphabetics</para>
|
||||
|
||||
<para>Digits 0 thru 9</para>
|
||||
|
||||
<para>Punctuation marks</para>
|
||||
<itemizedlist mark='bullet'>
|
||||
<listitem>
|
||||
<para>lower case alphabetics</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>digits 0 thru 9</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>punctuation marks</para>
|
||||
</listitem>
|
||||
</itemizedlist>
|
||||
|
||||
<para>Care must be taken not to include the system default erase or
|
||||
kill characters. <command>passwd</command> will reject any password
|
||||
@@ -140,7 +144,7 @@
|
||||
a password remains valid. After <emphasis remap='I'>max</emphasis>
|
||||
days, the password is required to be changed. The
|
||||
<option>-n</option> option is used to set the minimum number of days
|
||||
before a password may be changed. The user will not be permitted to
|
||||
before a password may be changed. The user will not be permitted to
|
||||
change the password until <emphasis remap='I'>min</emphasis> days
|
||||
have elapsed. The <option>-w</option> option is used to set the
|
||||
number of days of warning the user will receive before his/her
|
||||
@@ -179,7 +183,7 @@
|
||||
user account is locked (L), has no password (NP), or has a usable
|
||||
password (P). The third field gives the date of the last password
|
||||
change. The next four fields are the minimum age, maximum age,
|
||||
warning period, and inactivity period for the password. These ages
|
||||
warning period, and inactivity period for the password. These ages
|
||||
are expressed in days. See <emphasis remap='B'>Password expiry
|
||||
information</emphasis> above for a discussion of these fields.
|
||||
</para>
|
||||
@@ -210,14 +214,20 @@
|
||||
|
||||
<para>Other methods of construction involve selecting an easily
|
||||
remembered phrase from literature and selecting the first or last
|
||||
letter from each word. An example of this is
|
||||
letter from each word. An example of this is:
|
||||
</para>
|
||||
|
||||
<para>Ask not for whom the bell tolls.</para>
|
||||
|
||||
<para>which produces</para>
|
||||
|
||||
<para>An4wtbt.</para>
|
||||
|
||||
<itemizedlist mark='bullet'>
|
||||
<listitem>
|
||||
<para>Ask not for whom the bell tolls</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>which produces</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>An4wtbt</para>
|
||||
</listitem>
|
||||
</itemizedlist>
|
||||
|
||||
<para>You may be reasonably sure few crackers will have included this
|
||||
in their dictionaries. You should, however, select your own methods
|
||||
@@ -261,38 +271,44 @@
|
||||
|
||||
<refsect1 id='exit_values'>
|
||||
<title>EXIT VALUES</title>
|
||||
<variablelist remap='TP'>
|
||||
<varlistentry>
|
||||
<term>
|
||||
The <command>passwd</command> command exits with the
|
||||
following values:
|
||||
</term>
|
||||
<listitem>
|
||||
<para>
|
||||
<literal>0</literal> - success
|
||||
<!-- .br -->
|
||||
<literal>1</literal> - permission denied
|
||||
<!-- .br -->
|
||||
<literal>2</literal> - invalid combination of options
|
||||
<!-- .br -->
|
||||
<literal>3</literal> - unexpected failure, nothing done
|
||||
<!-- .br -->
|
||||
<literal>4</literal> - unexpected failure, passwd file
|
||||
missing
|
||||
<!-- .br -->
|
||||
<literal>5</literal> - passwd file busy, try again
|
||||
later <!-- .br -->
|
||||
<literal>6</literal> - invalid argument to option
|
||||
</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
<para>
|
||||
The <command>passwd</command> command exits with the following values:
|
||||
<variablelist>
|
||||
<varlistentry>
|
||||
<term><replaceable>0</replaceable></term>
|
||||
<listitem>success</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>1</replaceable></term>
|
||||
<listitem>permission denied</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>2</replaceable></term>
|
||||
<listitem>invalid combination of options</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>3</replaceable></term>
|
||||
<listitem>unexpected failure, nothing done</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>4</replaceable></term>
|
||||
<listitem>unexpected failure, passwd file missing</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>5</replaceable></term>
|
||||
<listitem>passwd file busy, try again</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>6</replaceable></term>
|
||||
<listitem>invalid argument to option</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
</para>
|
||||
</refsect1>
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>group</refentrytitle><manvolnum>5</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
154
man/passwd.5
154
man/passwd.5
@@ -1,93 +1,77 @@
|
||||
.\"$Id: passwd.5,v 1.15 2005/04/02 16:10:24 kloczek Exp $
|
||||
.\" Copyright 1989 - 1990, Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH PASSWD 5
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "PASSWD" 5 "" "" ""
|
||||
.SH NAME
|
||||
passwd \- The password file
|
||||
.SH DESCRIPTION
|
||||
\fI/etc/passwd\fR contains various pieces of information for each user
|
||||
account. Included is:
|
||||
.IP "" .5i
|
||||
Login name
|
||||
.IP "" .5i
|
||||
Optional encrypted password
|
||||
.IP "" .5i
|
||||
Numerical user ID
|
||||
.IP "" .5i
|
||||
Numerical group ID
|
||||
.IP "" .5i
|
||||
User name or comment field
|
||||
.IP "" .5i
|
||||
User home directory
|
||||
.IP "" .5i
|
||||
User command interpreter
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
The password field may not be filled if shadow passwords have been enabled.
|
||||
If shadow passwords are being used, the encrypted password will be found in
|
||||
\fI/etc/shadow\fR. The encrypted password consists of characters from the
|
||||
64 characters alphabet a thru z, A thru Z, 0 thru 9, \. and /. Optionally it
|
||||
can start with a "$" character. This means the encrypted password was generated
|
||||
using another (not DES) algorithm. For example if it starts with "$1$" it means
|
||||
the MD5\-based algorithm was used.
|
||||
\fI/etc/passwd\fR contains various pieces of information for each user account\&. Included is:
|
||||
|
||||
.TP 3
|
||||
\(bu
|
||||
login name
|
||||
.TP
|
||||
\(bu
|
||||
optional encrypted password
|
||||
.TP
|
||||
\(bu
|
||||
numerical user ID
|
||||
.TP
|
||||
\(bu
|
||||
numerical group ID
|
||||
.TP
|
||||
\(bu
|
||||
user name or comment field
|
||||
.TP
|
||||
\(bu
|
||||
user home directory
|
||||
.TP
|
||||
\(bu
|
||||
user command interpreter
|
||||
.LP
|
||||
|
||||
.PP
|
||||
Refer to \fBcrypt\fR(3) for details on how this string is interpreted.
|
||||
The password field may not be filled if shadow passwords have been enabled\&. If shadow passwords are being used, the encrypted password will be found in \fI/etc/shadow\fR\&. The encrypted password consists of characters from the 64 characters alphabet a thru z, A thru Z, 0 thru 9, \\\&. and /\&. Optionally it can start with a "$" character\&. This means the encrypted password was generated using another (not DES) algorithm\&. For example if it starts with "$1$" it means the MD5\-based algorithm was used\&. Refer to \fBcrypt\fR(3) for details on how this string is interpreted\&.
|
||||
|
||||
.PP
|
||||
The comment field is used by various system utilities, such as
|
||||
\fBfinger\fR(1). Three additional values may be present in the comment
|
||||
field.
|
||||
They are:
|
||||
.IP "" .5i
|
||||
pri= \- set initial value of nice
|
||||
.IP "" .5i
|
||||
umask= \- set initial value of umask
|
||||
.IP "" .5i
|
||||
ulimit= \- set initial value of ulimit
|
||||
The comment field is used by various system utilities, such as \fBfinger\fR(1)\&.
|
||||
|
||||
.PP
|
||||
These fields are separated from each other and from any other comment field
|
||||
by a comma.
|
||||
The home directory field provides the name of the initial working directory\&. \fILogin\fR uses this information to set the value of the \fB$HOME\fR environmental variable\&.
|
||||
|
||||
.PP
|
||||
The home directory field provides the name of the initial working directory.
|
||||
\fBLogin\fR uses this information to set the value of
|
||||
the \fBHOME\fR environmental variable.
|
||||
The command interpreter field provides the name of the user's command language interpreter, or the name of the initial program to execute\&. \fILogin\fR uses this information to set the value of the \fB$SHELL\fR environmental variable\&. If this field is empty, it defaults to the value \fI/bin/sh\fR\&.
|
||||
|
||||
.SH "FILES"
|
||||
|
||||
.TP
|
||||
\fI/etc/passwd\fR
|
||||
user account information
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
The command interpreter field provides the name of the user's command
|
||||
language interpreter, or the name of the initial program to execute.
|
||||
\fBLogin\fR uses this information to set the value of the
|
||||
\fBSHELL\fR environmental variable.
|
||||
If this field is empty, it defaults to the value \fB/bin/sh\fR.
|
||||
.SH FILES
|
||||
\fI/etc/passwd\fR \- user account information
|
||||
.SH SEE ALSO
|
||||
.BR login (1),
|
||||
.BR passwd (1),
|
||||
.BR su (1),
|
||||
.BR shadow (5),
|
||||
.BR pwconv (8),
|
||||
.BR pwunconv (8),
|
||||
.BR sulogin (8)
|
||||
.SH AUTHOR
|
||||
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||
\fBlogin\fR(1), \fBpasswd\fR(1), \fBsu\fR(1), \fBshadow\fR(5), \fBpwconv\fR(8), \fBpwunconv\fR(8), \fBsulogin\fR(8)
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='passwd.5'>
|
||||
<!-- $Id: passwd.5.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
|
||||
<!-- $Id: passwd.5.xml,v 1.7 2005/06/16 17:59:21 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>passwd</refentrytitle>
|
||||
<manvolnum>5</manvolnum>
|
||||
@@ -14,55 +14,50 @@
|
||||
|
||||
<refsect1 id='description'>
|
||||
<title>DESCRIPTION</title>
|
||||
<para>
|
||||
<filename>/etc/passwd</filename> contains various pieces of
|
||||
<para><filename>/etc/passwd</filename> contains various pieces of
|
||||
information for each user account. Included is:
|
||||
</para>
|
||||
|
||||
<para>Login name</para>
|
||||
|
||||
<para>Optional encrypted password</para>
|
||||
|
||||
<para>Numerical user ID</para>
|
||||
|
||||
<para>Numerical group ID</para>
|
||||
|
||||
<para>User name or comment field</para>
|
||||
|
||||
<para>User home directory</para>
|
||||
|
||||
<para>User command interpreter</para>
|
||||
|
||||
<para>The password field may not be filled if shadow passwords have been
|
||||
<itemizedlist mark='bullet'>
|
||||
<listitem>
|
||||
<para>login name</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>optional encrypted password</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>numerical user ID</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>numerical group ID</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>user name or comment field</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>user home directory</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>user command interpreter</para>
|
||||
</listitem>
|
||||
</itemizedlist>
|
||||
|
||||
<para>
|
||||
The password field may not be filled if shadow passwords have been
|
||||
enabled. If shadow passwords are being used, the encrypted password
|
||||
will be found in <filename>/etc/shadow</filename>. The encrypted
|
||||
password consists of characters from the 64 characters alphabet a thru
|
||||
z, A thru Z, 0 thru 9, \. and /. Optionally it can start with a "$"
|
||||
character. This means the encrypted password was generated using
|
||||
another (not DES) algorithm. For example if it starts with "$1$" it
|
||||
means the MD5-based algorithm was used.
|
||||
means the MD5-based algorithm was used. Refer to
|
||||
<citerefentry><refentrytitle>crypt</refentrytitle>
|
||||
<manvolnum>3</manvolnum></citerefentry> for details on how this string
|
||||
is interpreted.
|
||||
</para>
|
||||
|
||||
<para> Refer to <citerefentry>
|
||||
<refentrytitle>crypt</refentrytitle><manvolnum>3</manvolnum>
|
||||
</citerefentry> for details on how this string is interpreted.
|
||||
</para>
|
||||
|
||||
|
||||
<para>The comment field is used by various system utilities, such as
|
||||
<citerefentry>
|
||||
<refentrytitle>finger</refentrytitle><manvolnum>1</manvolnum>
|
||||
</citerefentry>. Three additional values may be present in the comment
|
||||
field. They are:
|
||||
</para>
|
||||
|
||||
<para>pri= - set initial value of nice</para>
|
||||
|
||||
<para>umask= - set initial value of umask</para>
|
||||
|
||||
<para>ulimit= - set initial value of ulimit</para>
|
||||
|
||||
<para>These fields are separated from each other and from any other
|
||||
comment field by a comma.
|
||||
<citerefentry><refentrytitle>finger</refentrytitle>
|
||||
<manvolnum>1</manvolnum></citerefentry>.
|
||||
</para>
|
||||
|
||||
<para>The home directory field provides the name of the initial working
|
||||
@@ -70,7 +65,8 @@
|
||||
to set the value of the <envar>$HOME</envar> environmental variable.
|
||||
</para>
|
||||
|
||||
<para>The command interpreter field provides the name of the user's
|
||||
<para>
|
||||
The command interpreter field provides the name of the user's
|
||||
command language interpreter, or the name of the initial program to
|
||||
execute. <emphasis remap='B'>Login</emphasis> uses this information
|
||||
to set the value of the <envar>$SHELL</envar> environmental variable.
|
||||
@@ -91,8 +87,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>login</refentrytitle><manvolnum>1</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
@@ -23,7 +23,6 @@ man_MANS = \
|
||||
login.access.5 \
|
||||
login.defs.5 \
|
||||
logoutd.8 \
|
||||
mkpasswd.8 \
|
||||
newgrp.1 \
|
||||
newusers.8 \
|
||||
passwd.1 \
|
||||
|
||||
@@ -38,11 +38,7 @@ host_triplet = @host@
|
||||
subdir = man/pl
|
||||
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
|
||||
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
|
||||
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
|
||||
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
|
||||
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
|
||||
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
|
||||
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
|
||||
am__aclocal_m4_deps = $(top_srcdir)/configure.in
|
||||
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
|
||||
$(ACLOCAL_M4)
|
||||
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
|
||||
@@ -198,7 +194,6 @@ man_MANS = \
|
||||
login.access.5 \
|
||||
login.defs.5 \
|
||||
logoutd.8 \
|
||||
mkpasswd.8 \
|
||||
newgrp.1 \
|
||||
newusers.8 \
|
||||
passwd.1 \
|
||||
@@ -236,9 +231,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
|
||||
exit 1;; \
|
||||
esac; \
|
||||
done; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/pl/Makefile'; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/pl/Makefile'; \
|
||||
cd $(top_srcdir) && \
|
||||
$(AUTOMAKE) --foreign man/pl/Makefile
|
||||
$(AUTOMAKE) --gnu man/pl/Makefile
|
||||
.PRECIOUS: Makefile
|
||||
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
|
||||
@case '$?' in \
|
||||
|
||||
@@ -1,77 +0,0 @@
|
||||
.\" $Id: mkpasswd.8,v 1.7 2005/04/05 18:47:51 kloczek Exp $
|
||||
.\" Copyright 1991, Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH MKPASSWD 8
|
||||
.SH NAZWA
|
||||
mkpasswd \- aktualizuj pliki baz passwd i group
|
||||
.SH SK<EFBFBD>ADNIA
|
||||
\fBmkpasswd\fR [\fB\-fvgps\fR] \fIplik\fR
|
||||
.SH OPIS
|
||||
.B mkpasswd
|
||||
czyta plik w formacie okre<72>lonym przez flagi i konwertuje go postaci
|
||||
odpowiedniego pliku bazy danych.
|
||||
Wymienione pliki baz danych u<>ywane s<> do poprawienia wydajno<6E>ci dost<73>pu
|
||||
w systemach o du<64>ej liczbie u<>ytkownik<69>w.
|
||||
Pliki wynikowe otrzymaj<61> nazwy \fIplik\fR.dir i \fIplik\fR.pag.
|
||||
.SH OPCJE
|
||||
Opcja \fB\-f\fR powoduje, <20>e \fBmkpasswd\fR ignoruje istnienie plik<69>w
|
||||
wynikowych i nadpisuje je.
|
||||
Normalnie \fBmkpasswd\fR skar<61>y si<73> na istnienie plik<69>w wynikowych
|
||||
i ko<6B>czy prac<61>.
|
||||
.PP
|
||||
Opcja \fB\-v\fR powoduje wy<77>wietlanie informacji o ka<6B>dym konwertowanym
|
||||
rekordzie oraz komunikatu ko<6B>cowego.
|
||||
.PP
|
||||
Opcja \fB\-g\fR traktuje plik <20>r<EFBFBD>d<EFBFBD>owy tak, jak gdyby by<62> on w formacie
|
||||
pliku \fI/etc/group\fR.
|
||||
Przy po<70><6F>czeniu z opcj<63> \fB\-s\fR u<>ywany jest format pliku \fI/etc/gshadow\fR.
|
||||
.PP
|
||||
Opcja \fB\-p\fR traktuje plik <20>r<EFBFBD>d<EFBFBD>owy tak, jak gdyby by<62> on w formacie
|
||||
pliku \fI/etc/passwd\fR.
|
||||
Jest to opcja domy<6D>lna.
|
||||
Przy po<70><6F>czeniu z opcj<63> \fB\-s\fR u<>ywany jest format pliku \fI/etc/shadow\fR.
|
||||
.SH PRZESTROGI
|
||||
U<EFBFBD>ycie wi<77>cej ni<6E> jednego pliku bazy ogranicza si<73> do system<65>w posiadaj<61>cych
|
||||
bibliotek<EFBFBD> baz danych NDBM. Mo<4D>e zatem nie by<62> dost<73>pne w ka<6B>dym systemie.
|
||||
.SH UWAGA
|
||||
Poniewa<EFBFBD> wi<77>kszo<7A><6F> polece<63> jest w stanie aktualizowa<77> pliki bazy danych
|
||||
podczas dokonywania zmian, \fBmkpasswd\fR potrzebne jest jedynie
|
||||
do ponownego utworzenia usuni<6E>tego lub zepsutego pliku bazy.
|
||||
.SH PLIKI
|
||||
\fI/etc/passwd\fR \- informacja o kontach u<>ytkownik<69>w
|
||||
.br
|
||||
\fI/etc/shadow\fR \- chroniona informacja o u<>ytkownikach
|
||||
.br
|
||||
\fI/etc/group\fR \- informacja o grupach
|
||||
.br
|
||||
\fI/etc/gshadow\fR \- chroniona informacja o grupach
|
||||
.SH ZOBACZ TAK<EFBFBD>E
|
||||
.BR group (5),
|
||||
.BR passwd (5),
|
||||
.BR shadow (5)
|
||||
.SH AUTOR
|
||||
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||
@@ -38,11 +38,7 @@ host_triplet = @host@
|
||||
subdir = man/pt_BR
|
||||
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
|
||||
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
|
||||
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
|
||||
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
|
||||
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
|
||||
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
|
||||
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
|
||||
am__aclocal_m4_deps = $(top_srcdir)/configure.in
|
||||
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
|
||||
$(ACLOCAL_M4)
|
||||
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
|
||||
@@ -196,9 +192,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
|
||||
exit 1;; \
|
||||
esac; \
|
||||
done; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/pt_BR/Makefile'; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/pt_BR/Makefile'; \
|
||||
cd $(top_srcdir) && \
|
||||
$(AUTOMAKE) --foreign man/pt_BR/Makefile
|
||||
$(AUTOMAKE) --gnu man/pt_BR/Makefile
|
||||
.PRECIOUS: Makefile
|
||||
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
|
||||
@case '$?' in \
|
||||
|
||||
249
man/pw_auth.3
249
man/pw_auth.3
@@ -1,157 +1,106 @@
|
||||
.\"$Id: pw_auth.3,v 1.10 2005/04/02 16:10:24 kloczek Exp $
|
||||
.\" Copyright 1992 - 1993, Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH PWAUTH 3
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "PW_AUTH" 3 "" "" ""
|
||||
.SH NAME
|
||||
pwauth \- administrator defined password authentication routines
|
||||
.SH SYNTAX
|
||||
.B #include <pwauth.h>
|
||||
pw_auth \- administrator defined password authentication routines
|
||||
.SH "SYNTAX"
|
||||
|
||||
.PP
|
||||
.B int pw_auth (char
|
||||
.I *command,
|
||||
.B char
|
||||
.I *user,
|
||||
.B int
|
||||
.I reason,
|
||||
.B char
|
||||
.IB *input) ;
|
||||
.SH DESCRIPTION
|
||||
.B pw_auth
|
||||
invokes the administrator defined functions for a given user.
|
||||
\fI#include <pwauth\&.h>\fR
|
||||
|
||||
.PP
|
||||
\fIcommand\fR is the name of the authentication program.
|
||||
It is retrieved from the user's password file information.
|
||||
The string contains one or more executable file names, delimited by
|
||||
semi\-colons.
|
||||
Each program will be executed in the order given.
|
||||
The command line arguments are given for each of the reasons listed
|
||||
below.
|
||||
\fIint pw_auth (char\fR \fI*command,\fR \fIchar\fR \fI*user,\fR \fIint\fR \fIreason,\fR \fIchar\fR \fI*input)\fR\fI;\fR
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
\fIuser\fR is the name of the user to be authenticated, as given
|
||||
in the \fI/etc/passwd\fR file.
|
||||
User entries are indexed by username.
|
||||
This allows non\-unique user IDs to be present and for each different
|
||||
username associated with that user ID to have a different
|
||||
authentication program and information.
|
||||
\fIpw_auth\fR invokes the administrator defined functions for a given user\&.
|
||||
|
||||
.PP
|
||||
Each of the permissible authentication reasons is handled in a
|
||||
potentially differenent manner.
|
||||
Unless otherwise mentioned, the standard file descriptors 0, 1, and
|
||||
2 are available for communicating with the user.
|
||||
The real user ID may be used to determine the identity of the user
|
||||
making the authentication request.
|
||||
\fIreason\fR is one of
|
||||
.IP \fBPW_SU\fR 1i
|
||||
Perform authentication for the current real user ID attempting to
|
||||
switch real user ID to the named user.
|
||||
The authentication program will be invoked with a \fB\-s\fR option, followed
|
||||
by the username.
|
||||
.IP \fBPW_LOGIN\fR 1i
|
||||
Perform authentication for the named user creating a new login session.
|
||||
The authentication program will be invoked with a \fB\-l\fR option, followed
|
||||
by the username.
|
||||
.IP \fBPW_ADD\fR 1i
|
||||
Create a new entry for the named user.
|
||||
This allows an authentication program to initialize storage for a new
|
||||
user.
|
||||
The authentication program will be invoked with a \fB\-a\fR option, followed
|
||||
by the username.
|
||||
.IP \fBPW_CHANGE\fR 1i
|
||||
Alter an existing entry for the named user.
|
||||
This allows an authentication program to alter the authentication
|
||||
information for an existing user.
|
||||
The authentication program will be invoked with a \fB\-c\fR option, followed
|
||||
by the username.
|
||||
.IP \fBPW_DELETE\fR 1i
|
||||
Delete authentication information for the named user.
|
||||
This allows an authentication program to reclaim storage for a user which
|
||||
is no longer authenticated using the authentication program.
|
||||
The authentication program will be invoked with a \fB\-d\fR option, followed
|
||||
by the username.
|
||||
.IP \fBPW_TELNET\fR 1i
|
||||
Authenticate a user who is connecting to the system using the
|
||||
\fBtelnet\fR command.
|
||||
The authentication program will be invoked with a \fB\-t\fR option, followed
|
||||
by the username.
|
||||
.IP \fBPW_RLOGIN\fR 1i
|
||||
Authenticate a user who is connecting to the system using the \fBrlogin\fR
|
||||
command.
|
||||
The authentication program will be invoked with a \fB\-r\fR option, followed
|
||||
by the username.
|
||||
.IP \fBPW_FTP\fR 1i
|
||||
Authenticate a user who is connecting to the system using the \fBftp\fR
|
||||
command.
|
||||
The authentication program will be invoked with a \fB\-f\fR option, followed
|
||||
by the username.
|
||||
The standard file descriptors are not available for communicating with the
|
||||
user.
|
||||
The standard input file descriptor will be connected to the parent process,
|
||||
while the other two output file descriptors will be connected to
|
||||
\fI/dev/null\fR.
|
||||
The \fBpw_auth\fR function will pipe a single line of data to the
|
||||
authentication program using file descriptor 0.
|
||||
.IP \fBPW_REXEC\fR 1i
|
||||
Authenticate a user who is connecting to the system using the \fIrexec\fR
|
||||
command.
|
||||
The authentication program will be invoked with a \fB\-x\fR option, followed
|
||||
by the username.
|
||||
The standard file descriptors are not available for communicating with the
|
||||
remote user.
|
||||
The standard input file descriptor will be connected to the parent process,
|
||||
while the other two output file descriptors will be connected to
|
||||
\fI/dev/null\fR.
|
||||
The \fBpw_auth\fR function will pipe a single line of data to the
|
||||
authentication program using file descriptor 0.
|
||||
\fIcommand\fR is the name of the authentication program\&. It is retrieved from the user's password file information\&. The string contains one or more executable file names, delimited by semi\-colons\&. Each program will be executed in the order given\&. The command line arguments are given for each of the reasons listed below\&.
|
||||
|
||||
.PP
|
||||
The last argument is the authentication data which is used by the
|
||||
.B PW_FTP
|
||||
and
|
||||
.B PW_REXEC
|
||||
reasons.
|
||||
It is treated as a single line of text which is piped to the authentication
|
||||
program.
|
||||
When the reason is
|
||||
.BR PW_CHANGE,
|
||||
the value of \fIinput\fR is the value of
|
||||
previous user name if the user name is being changed.
|
||||
.SH CAVEATS
|
||||
This function does not create the actual session.
|
||||
It only indicates if the user should be allowed to create the session.
|
||||
\fIuser\fR is the name of the user to be authenticated, as given in the \fI/etc/passwd\fR file\&. User entries are indexed by username\&. This allows non\-unique user IDs to be present and for each different username associated with that user ID to have a different authentication program and information\&.
|
||||
|
||||
.PP
|
||||
The network options are untested at this time.
|
||||
.SH DIAGNOSTICS
|
||||
The \fBpw_auth\fR function returns 0 if the authentication program exited
|
||||
with a 0 exit code, and a non\-zero value otherwise.
|
||||
.SH SEE ALSO
|
||||
.BR login (1),
|
||||
.BR passwd (1),
|
||||
.BR su (1),
|
||||
.BR useradd (8),
|
||||
.BR userdel (8),
|
||||
.BR usermod (8)
|
||||
.SH AUTHOR
|
||||
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||
Each of the permissible authentication reasons is handled in a potentially differenent manner\&. Unless otherwise mentioned, the standard file descriptors 0, 1, and 2 are available for communicating with the user\&. The real user ID may be used to determine the identity of the user making the authentication request\&. \fIreason\fR is one of:
|
||||
|
||||
.TP
|
||||
\fIPW_SU\fR
|
||||
Perform authentication for the current real user ID attempting to switch real user ID to the named user\&. The authentication program will be invoked with a \fB\-s\fR option, followed by the username\&.
|
||||
|
||||
.TP
|
||||
\fIPW_LOGIN\fR
|
||||
Perform authentication for the named user creating a new login session\&. The authentication program will be invoked with a \fB\-l\fR option, followed by the username\&.
|
||||
|
||||
.TP
|
||||
\fIPW_ADD\fR
|
||||
Create a new entry for the named user\&. This allows an authentication program to initialize storage for a new user\&. The authentication program will be invoked with a \fB\-a\fR option, followed by the username\&.
|
||||
|
||||
.TP
|
||||
\fIPW_CHANGE\fR
|
||||
Alter an existing entry for the named user\&. This allows an authentication program to alter the authentication information for an existing user\&. The authentication program will be invoked with a \fB\-c\fR option, followed by the username\&.
|
||||
|
||||
.TP
|
||||
\fIPW_DELETE\fR
|
||||
Delete authentication information for the named user\&. This allows an authentication program to reclaim storage for a user which is no longer authenticated using the authentication program\&. The authentication program will be invoked with a \fB\-d\fR option, followed by the username\&.
|
||||
|
||||
.TP
|
||||
\fIPW_TELNET\fR
|
||||
Authenticate a user who is connecting to the system using the \fItelnet\fR command\&. The authentication program will be invoked with a \fB\-t\fR option, followed by the username\&.
|
||||
|
||||
.TP
|
||||
\fIPW_RLOGIN\fR
|
||||
Authenticate a user who is connecting to the system using the \fIrlogin\fR command\&. The authentication program will be invoked with a \fB\-r\fR option, followed by the username\&.
|
||||
|
||||
.TP
|
||||
\fIPW_FTP\fR
|
||||
Authenticate a user who is connecting to the system using the \fIftp\fR command\&. The authentication program will be invoked with a \fB\-f\fR option, followed by the username\&. The standard file descriptors are not available for communicating with the user\&. The standard input file descriptor will be connected to the parent process, while the other two output file descriptors will be connected to \fI/dev/null\fR\&. The \fIpw_auth\fR function will pipe a single line of data to the authentication program using file descriptor 0\&.
|
||||
|
||||
.TP
|
||||
\fIPW_REXEC\fR
|
||||
Authenticate a user who is connecting to the system using the \fIrexec\fR command\&. The authentication program will be invoked with a \fB\-x\fR option, followed by the username\&. The standard file descriptors are not available for communicating with the remote user\&. The standard input file descriptor will be connected to the parent process, while the other two output file descriptors will be connected to \fI/dev/null\fR\&. The \fIpw_auth\fR function will pipe a single line of data to the authentication program using file descriptor 0\&.
|
||||
|
||||
.PP
|
||||
The last argument is the authentication data which is used by the \fIPW_FTP\fR and \fIPW_REXEC\fR reasons\&. It is treated as a single line of text which is piped to the authentication program\&. When the reason is \fIPW_CHANGE,\fR the value of \fIinput\fR is the value of previous user name if the user name is being changed\&.
|
||||
|
||||
.SH "CAVEATS"
|
||||
|
||||
.PP
|
||||
This function does not create the actual session\&. It only indicates if the user should be allowed to create the session\&.
|
||||
|
||||
.PP
|
||||
The network options are untested at this time\&.
|
||||
|
||||
.SH "DIAGNOSTICS"
|
||||
|
||||
.PP
|
||||
The \fIpw_auth\fR function returns 0 if the authentication program exited with a 0 exit code, and a non\-zero value otherwise\&.
|
||||
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
\fBlogin\fR(1), \fBpasswd\fR(1), \fBsu\fR(1), \fBuseradd\fR(8), \fBuserdel\fR(8), \fBusermod\fR(8)
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
||||
|
||||
|
||||
@@ -2,24 +2,22 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='pw_auth.3'>
|
||||
<!-- $Id: pw_auth.3.xml,v 1.5 2005/04/27 15:43:25 kloczek Exp $ -->
|
||||
<!-- $Id: pw_auth.3.xml,v 1.10 2005/06/20 09:00:06 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>pw_auth</refentrytitle>
|
||||
<manvolnum>3</manvolnum>
|
||||
</refmeta>
|
||||
<refnamediv id='name'>
|
||||
<refname>pwauth</refname>
|
||||
<refname>pw_auth</refname>
|
||||
<refpurpose>administrator defined password authentication routines</refpurpose>
|
||||
</refnamediv>
|
||||
|
||||
<refsect1 id='syntax'>
|
||||
<title>SYNTAX</title>
|
||||
<para>
|
||||
<emphasis remap='B'>#include <pwauth.h></emphasis>
|
||||
<para><emphasis remap='B'>#include <pwauth.h></emphasis>
|
||||
</para>
|
||||
|
||||
<para>
|
||||
<emphasis remap='B'>int pw_auth (char</emphasis>
|
||||
<para><emphasis remap='B'>int pw_auth (char</emphasis>
|
||||
<emphasis remap='I'>*command,</emphasis>
|
||||
<emphasis remap='B'>char</emphasis>
|
||||
<emphasis remap='I'>*user,</emphasis>
|
||||
@@ -32,8 +30,7 @@
|
||||
|
||||
<refsect1 id='description'>
|
||||
<title>DESCRIPTION</title>
|
||||
<para>
|
||||
<emphasis remap='B'>pw_auth</emphasis>
|
||||
<para><emphasis remap='B'>pw_auth</emphasis>
|
||||
invokes the administrator defined functions for a given user.
|
||||
</para>
|
||||
|
||||
@@ -45,7 +42,7 @@
|
||||
listed below.
|
||||
</para>
|
||||
|
||||
<para> <emphasis remap='I'>user</emphasis> is the name of the user to be
|
||||
<para><emphasis remap='I'>user</emphasis> is the name of the user to be
|
||||
authenticated, as given in the <filename>/etc/passwd</filename> file.
|
||||
User entries are indexed by username. This allows non-unique user IDs
|
||||
to be present and for each different username associated with that
|
||||
@@ -53,11 +50,11 @@
|
||||
</para>
|
||||
|
||||
<para>Each of the permissible authentication reasons is handled in a
|
||||
potentially differenent manner. Unless otherwise mentioned, the
|
||||
potentially differenent manner. Unless otherwise mentioned, the
|
||||
standard file descriptors 0, 1, and 2 are available for communicating
|
||||
with the user. The real user ID may be used to determine the identity
|
||||
with the user. The real user ID may be used to determine the identity
|
||||
of the user making the authentication request. <emphasis
|
||||
remap='I'>reason</emphasis> is one of
|
||||
remap='I'>reason</emphasis> is one of:
|
||||
</para>
|
||||
<variablelist remap='IP'>
|
||||
<varlistentry>
|
||||
@@ -66,7 +63,7 @@
|
||||
</term>
|
||||
<listitem>
|
||||
<para>Perform authentication for the current real user ID
|
||||
attempting to switch real user ID to the named user. The
|
||||
attempting to switch real user ID to the named user. The
|
||||
authentication program will be invoked with a
|
||||
<option>-s</option> option, followed by the username.
|
||||
</para>
|
||||
@@ -88,7 +85,7 @@
|
||||
<emphasis remap='B'>PW_ADD</emphasis>
|
||||
</term>
|
||||
<listitem>
|
||||
<para>Create a new entry for the named user. This allows an
|
||||
<para>Create a new entry for the named user. This allows an
|
||||
authentication program to initialize storage for a new user. The
|
||||
authentication program will be invoked with a
|
||||
<option>-a</option> option, followed by the username.
|
||||
@@ -197,7 +194,7 @@
|
||||
|
||||
<refsect1 id='caveats'>
|
||||
<title>CAVEATS</title>
|
||||
<para>This function does not create the actual session. It only
|
||||
<para>This function does not create the actual session. It only
|
||||
indicates if the user should be allowed to create the session.
|
||||
</para>
|
||||
|
||||
@@ -215,8 +212,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>login</refentrytitle><manvolnum>1</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
210
man/pwck.8
210
man/pwck.8
@@ -1,104 +1,114 @@
|
||||
.\"$Id: pwck.8,v 1.18 2005/04/12 17:55:55 kloczek Exp $
|
||||
.\" Copyright 1992, Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH PWCK 8
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "PWCK" 8 "" "" ""
|
||||
.SH NAME
|
||||
pwck \- verify integrity of password files
|
||||
.SH SYNOPSIS
|
||||
\fBpwck\fR [\fB\-sr\fR] [\fIpasswd\fR \fIshadow\fR]
|
||||
.SH DESCRIPTION
|
||||
\fBpwck\fR verifies the integrity of the system authentication information.
|
||||
All entries in the \fI/etc/passwd\fR and \fI/etc/shadow\fR are checked to
|
||||
see that the entry has the proper format and valid data in each field.
|
||||
The user is prompted to delete entries that are improperly formatted or
|
||||
which have other uncorrectable errors.
|
||||
.P
|
||||
Checks are made to verify that each entry has
|
||||
.sp
|
||||
.in +.5i
|
||||
\- the correct number of fields
|
||||
.br
|
||||
\- a unique user name
|
||||
.br
|
||||
\- a valid user and group identifier
|
||||
.br
|
||||
\- a valid primary group
|
||||
.br
|
||||
\- a valid home directory
|
||||
.br
|
||||
\- a valid login shell
|
||||
.in \-.5i
|
||||
.sp
|
||||
.SH "SYNOPSIS"
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 5
|
||||
\fBpwck\fR [\-sr] [\fIpasswd\fR\ \fIshadow\fR]
|
||||
.ad
|
||||
.hy
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
The checks for correct number of fields and unique user name are fatal. If
|
||||
the entry has the wrong number of fields, the user will be prompted to
|
||||
delete the entire line. If the user does not answer affirmatively, all
|
||||
further checks are bypassed. An entry with a duplicated user name is
|
||||
prompted for deletion, but the remaining checks will still be made. All
|
||||
other errors are warning and the user is encouraged to run the
|
||||
\fBusermod\fR command to correct the error.
|
||||
\fBpwck\fR verifies the integrity of the system authentication information\&. All entries in the \fI/etc/passwd\fR and \fI/etc/shadow\fR are checked to see that the entry has the proper format and valid data in each field\&. The user is prompted to delete entries that are improperly formatted or which have other uncorrectable errors\&.
|
||||
|
||||
.PP
|
||||
The commands which operate on the \fI/etc/passwd\fR file are not able to
|
||||
alter corrupted or duplicated entries.
|
||||
\fBpwck\fR should be used in those circumstances to remove the offending
|
||||
entry.
|
||||
.SH OPTIONS
|
||||
By default, \fBpwck\fR operates on the files \fI/etc/passwd\fR and
|
||||
\fI/etc/shadow\fR. The user may select alternate files with the \fIpasswd\fR
|
||||
and \fIshadow\fR parameters. Additionally, the user may execute the command
|
||||
in read\-only mode by specifying the \fB\-r\fR flag. This causes all questions
|
||||
regarding changes to be answered \fBno\fR without user intervention.
|
||||
\fBpwck\fR can also sort entries in \fI/etc/passwd\fR and \fI/etc/shadow\fR
|
||||
by UID. To run it in sort mode pass it \fB\-s\fR flag. No checks are
|
||||
performed then, it just sorts.
|
||||
.SH FILES
|
||||
\fI/etc/passwd\fR \- user account information
|
||||
.br
|
||||
\fI/etc/shadow\fR \- secure user account information
|
||||
.br
|
||||
\fI/etc/group\fR \- group account information
|
||||
.SH SEE ALSO
|
||||
.BR group (5),
|
||||
.BR passwd (5),
|
||||
.BR shadow (5),
|
||||
.BR usermod (8)
|
||||
.SH EXIT VALUES
|
||||
.TP 2
|
||||
The \fBpwck\fR command exits with the following values:
|
||||
\fB0\fR \- success
|
||||
.br
|
||||
\fB1\fR \- invalid command syntax
|
||||
.br
|
||||
\fB2\fR \- one or more bad password entries
|
||||
.br
|
||||
\fB3\fR \- can't open password files
|
||||
.br
|
||||
\fB4\fR \- can't lock password files
|
||||
.br
|
||||
\fB5\fR \- can't update password files
|
||||
.SH AUTHOR
|
||||
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||
Checks are made to verify that each entry has:
|
||||
|
||||
.TP 3
|
||||
\(bu
|
||||
the correct number of fields
|
||||
.TP
|
||||
\(bu
|
||||
a unique user name
|
||||
.TP
|
||||
\(bu
|
||||
a valid user and group identifier
|
||||
.TP
|
||||
\(bu
|
||||
a valid primary group
|
||||
.TP
|
||||
\(bu
|
||||
a valid home directory
|
||||
.TP
|
||||
\(bu
|
||||
a valid login shell
|
||||
.LP
|
||||
|
||||
.PP
|
||||
The checks for correct number of fields and unique user name are fatal\&. If the entry has the wrong number of fields, the user will be prompted to delete the entire line\&. If the user does not answer affirmatively, all further checks are bypassed\&. An entry with a duplicated user name is prompted for deletion, but the remaining checks will still be made\&. All other errors are warning and the user is encouraged to run the \fBusermod\fR command to correct the error\&.
|
||||
|
||||
.PP
|
||||
The commands which operate on the \fI/etc/passwd\fR file are not able to alter corrupted or duplicated entries\&. \fBpwck\fR should be used in those circumstances to remove the offending entry\&.
|
||||
|
||||
.SH "OPTIONS"
|
||||
|
||||
.PP
|
||||
By default, \fBpwck\fR operates on the files \fI/etc/passwd\fR and \fI/etc/shadow\fR\&. The user may select alternate files with the \fIpasswd\fR and \fIshadow\fR parameters\&. Additionally, the user may execute the command in read\-only mode by specifying the \fB\-r\fR flag\&. This causes all questions regarding changes to be answered \fIno\fR without user intervention\&. \fBpwck\fR can also sort entries in \fI/etc/passwd\fR and \fI/etc/shadow\fR by UID\&. To run it in sort mode pass it \fB\-s\fR flag\&. No checks are performed then, it just sorts\&.
|
||||
|
||||
.SH "FILES"
|
||||
|
||||
.TP
|
||||
\fI/etc/group\fR
|
||||
group account information
|
||||
.TP
|
||||
\fI/etc/passwd\fR
|
||||
user account information
|
||||
.TP
|
||||
\fI/etc/shadow\fR
|
||||
secure user account information
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
\fBgroup\fR(5), \fBpasswd\fR(5), \fBshadow\fR(5), \fBusermod\fR(8)
|
||||
|
||||
.SH "EXIT VALUES"
|
||||
|
||||
.PP
|
||||
The \fBpwck\fR command exits with the following values:
|
||||
|
||||
.TP
|
||||
\fI0\fR
|
||||
success
|
||||
.TP
|
||||
\fI1\fR
|
||||
invalid command syntax
|
||||
.TP
|
||||
\fI2\fR
|
||||
one or more bad password entries
|
||||
.TP
|
||||
\fI3\fR
|
||||
can't open password files
|
||||
.TP
|
||||
\fI4\fR
|
||||
can't lock password files
|
||||
.TP
|
||||
\fI5\fR
|
||||
can't update password files
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
||||
|
||||
|
||||
106
man/pwck.8.xml
106
man/pwck.8.xml
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='pwck.8'>
|
||||
<!-- $Id: pwck.8.xml,v 1.6 2005/04/27 18:20:35 kloczek Exp $ -->
|
||||
<!-- $Id: pwck.8.xml,v 1.8 2005/06/16 20:09:08 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>pwck</refentrytitle>
|
||||
<manvolnum>8</manvolnum>
|
||||
@@ -14,7 +14,8 @@
|
||||
<!-- body begins here -->
|
||||
<refsynopsisdiv id='synopsis'>
|
||||
<cmdsynopsis>
|
||||
<command>pwck</command> <arg choice='opt'>-sr </arg>
|
||||
<command>pwck</command>
|
||||
<arg choice='opt'>-sr </arg>
|
||||
<arg choice='opt'>
|
||||
<arg choice='plain'>
|
||||
<replaceable>passwd</replaceable>
|
||||
@@ -28,31 +29,35 @@
|
||||
|
||||
<refsect1 id='description'>
|
||||
<title>DESCRIPTION</title>
|
||||
<para>
|
||||
<command>pwck</command> verifies the integrity of the system
|
||||
authentication information. All entries in the
|
||||
<para><command>pwck</command> verifies the integrity of the system
|
||||
authentication information. All entries in the
|
||||
<filename>/etc/passwd</filename> and <filename>/etc/shadow</filename>
|
||||
are checked to see that the entry has the proper format and valid data
|
||||
in each field. The user is prompted to delete entries that are
|
||||
in each field. The user is prompted to delete entries that are
|
||||
improperly formatted or which have other uncorrectable errors.
|
||||
</para>
|
||||
|
||||
<para>Checks are made to verify that each entry has</para>
|
||||
|
||||
<!-- .in +.5i -->
|
||||
<para>- the correct number of fields
|
||||
<!-- .br -->
|
||||
- a unique user name
|
||||
<!-- .br -->
|
||||
- a valid user and group identifier
|
||||
<!-- .br -->
|
||||
- a valid primary group
|
||||
<!-- .br -->
|
||||
- a valid home directory
|
||||
<!-- .br -->
|
||||
- a valid login shell
|
||||
</para>
|
||||
<!-- .in \-.5i -->
|
||||
<para>Checks are made to verify that each entry has:</para>
|
||||
<itemizedlist mark='bullet'>
|
||||
<listitem>
|
||||
<para>the correct number of fields</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>a unique user name</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>a valid user and group identifier</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>a valid primary group</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para> a valid home directory</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>a valid login shell</para>
|
||||
</listitem>
|
||||
</itemizedlist>
|
||||
|
||||
<para>The checks for correct number of fields and unique user name are
|
||||
fatal. If the entry has the wrong number of fields, the user will be
|
||||
@@ -60,7 +65,7 @@
|
||||
affirmatively, all further checks are bypassed. An entry with a
|
||||
duplicated user name is prompted for deletion, but the remaining
|
||||
checks will still be made. All other errors are warning and the user
|
||||
is encouraged to run the <command>usermod</coamand> command to correct
|
||||
is encouraged to run the <command>usermod</command> command to correct
|
||||
the error.
|
||||
</para>
|
||||
|
||||
@@ -109,8 +114,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>group</refentrytitle><manvolnum>5</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
@@ -127,29 +131,35 @@
|
||||
|
||||
<refsect1 id='exit_values'>
|
||||
<title>EXIT VALUES</title>
|
||||
<variablelist remap='TP'>
|
||||
<varlistentry>
|
||||
<term>
|
||||
The <command>pwck</command> command exits with the
|
||||
following values:
|
||||
</term>
|
||||
<listitem>
|
||||
<para>
|
||||
<literal>0</literal> - success
|
||||
<!-- .br -->
|
||||
<literal>1</literal> - invalid command syntax
|
||||
<!-- .br -->
|
||||
<literal>2</literal> - one or more bad password entries
|
||||
<!-- .br -->
|
||||
<literal>3</literal> - can't open password files
|
||||
<!-- .br -->
|
||||
<literal>4</literal> - can't lock password files
|
||||
<!-- .br -->
|
||||
<literal>5</literal> - can't update password files
|
||||
</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
<para>
|
||||
The <command>pwck</command> command exits with the following values:
|
||||
<variablelist>
|
||||
<varlistentry>
|
||||
<term><replaceable>0</replaceable></term>
|
||||
<listitem>success</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>1</replaceable></term>
|
||||
<listitem>invalid command syntax</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>2</replaceable></term>
|
||||
<listitem>one or more bad password entries</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>3</replaceable></term>
|
||||
<listitem>can't open password files</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>4</replaceable></term>
|
||||
<listitem>can't lock password files</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>5</replaceable></term>
|
||||
<listitem>can't update password files</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
</para>
|
||||
</refsect1>
|
||||
|
||||
<refsect1 id='author'>
|
||||
|
||||
110
man/pwconv.8
110
man/pwconv.8
@@ -1,56 +1,84 @@
|
||||
.\"$Id: pwconv.8,v 1.17 2005/05/19 10:34:59 kloczek Exp $
|
||||
.TH PWCONV 8 "26 Sep 1997"
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "PWCONV" 8 "26 Sep 1997" "" ""
|
||||
.SH NAME
|
||||
pwconv, pwunconv, grpconv, grpunconv \- convert to and from shadow passwords and groups.
|
||||
.SH SYNOPSIS
|
||||
.SH "SYNOPSIS"
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 7
|
||||
\fBpwconv\fR
|
||||
.br
|
||||
.ad
|
||||
.hy
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 9
|
||||
\fBpwunconv\fR
|
||||
.br
|
||||
.ad
|
||||
.hy
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 8
|
||||
\fBgrpconv\fR
|
||||
.br
|
||||
.ad
|
||||
.hy
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 10
|
||||
\fBgrpunconv\fR
|
||||
.SH DESCRIPTION
|
||||
\fBpwconv\fR creates \fIshadow\fR from \fIpasswd\fR and an optionally existing
|
||||
\fIshadow\fR.
|
||||
.ad
|
||||
.hy
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
\fBpwunconv\fR creates \fIpasswd\fR from \fIpasswd\fR and \fIshadow\fR and then
|
||||
removes \fIshadow\fR.
|
||||
\fBpwconv\fR creates \fIshadow\fR from \fIpasswd\fR and an optionally existing \fIshadow\fR\&.
|
||||
|
||||
.PP
|
||||
\fBgrpconv\fR creates \fIgshadow\fR from \fIgroup\fR and an optionally existing
|
||||
\fIgshadow\fR.
|
||||
\fBpwunconv\fR creates \fIpasswd\fR from \fIpasswd\fR and \fIshadow\fR and then removes \fIshadow\fR\&.
|
||||
|
||||
.PP
|
||||
\fBgrpunconv\fR creates \fIgroup\fR from \fIgroup\fR and \fIgshadow\fR and then
|
||||
removes \fIgshadow\fR.
|
||||
\fBgrpconv\fR creates \fIgshadow\fR from \fIgroup\fR and an optionally existing \fIgshadow\fR\&.
|
||||
|
||||
.PP
|
||||
These four programs all operate on the normal and shadow password and group
|
||||
files: \fI/etc/passwd\fR, \fI/etc/group\fR, \fI/etc/shadow\fR, and
|
||||
\fI/etc/gshadow\fR.
|
||||
\fBgrpunconv\fR creates \fIgroup\fR from \fIgroup\fR and \fIgshadow\fR and then removes \fIgshadow\fR\&.
|
||||
|
||||
.PP
|
||||
.PP
|
||||
Each program acquires the necessary locks before conversion. \fBpwconv\fR and
|
||||
\fBgrpconv\fR are similar. First, entries in the shadowed file which don't
|
||||
exist in the main file are removed. Then, shadowed entries which don't have
|
||||
`x' as the password in the main file are updated. Any missing shadowed
|
||||
entries are added. Finally, passwords in the main file are replaced with
|
||||
`x'. These programs can be used for initial conversion as well to update the
|
||||
shadowed file if the main file is edited by hand.
|
||||
These four programs all operate on the normal and shadow password and group files: \fI/etc/passwd\fR, \fI/etc/group\fR, \fI/etc/shadow\fR, and \fI/etc/gshadow\fR\&.
|
||||
|
||||
.PP
|
||||
\fBpwconv\fR will use the values of \fIPASS_MIN_DAYS\fR, \fIPASS_MAX_DAYS\fR,
|
||||
and \fIPASS_WARN_AGE\fR from \fI/etc/login.defs\fR when adding new entries
|
||||
to \fI/etc/shadow\fR.
|
||||
Each program acquires the necessary locks before conversion\&. \fBpwconv\fR and \fBgrpconv\fR are similar\&. First, entries in the shadowed file which don't exist in the main file are removed\&. Then, shadowed entries which don't have `x' as the password in the main file are updated\&. Any missing shadowed entries are added\&. Finally, passwords in the main file are replaced with `x'\&. These programs can be used for initial conversion as well to update the shadowed file if the main file is edited by hand\&.
|
||||
|
||||
.PP
|
||||
Likewise \fBpwunconv\fR and \fBgrpunconv\fR are similar. Passwords in the
|
||||
main file are updated from the shadowed file. Entries which exist in the
|
||||
main file but not in the shadowed file are left alone. Finally, the shadowed
|
||||
file is removed. Some password aging information is lost by \fBpwunconv\fR.
|
||||
It will convert what it can.
|
||||
\fBpwconv\fR will use the values of \fIPASS_MIN_DAYS\fR, \fIPASS_MAX_DAYS\fR, and \fIPASS_WARN_AGE\fR from \fI/etc/login\&.defs\fR when adding new entries to \fI/etc/shadow\fR\&.
|
||||
|
||||
.PP
|
||||
Likewise \fBpwunconv\fR and \fBgrpunconv\fR are similar\&. Passwords in the main file are updated from the shadowed file\&. Entries which exist in the main file but not in the shadowed file are left alone\&. Finally, the shadowed file is removed\&. Some password aging information is lost by \fBpwunconv\fR\&. It will convert what it can\&.
|
||||
|
||||
.SH "BUGS"
|
||||
Errors in the password or group files (such as invalid or duplicate entries)
|
||||
may cause these programs to loop forever or fail in other strange ways.
|
||||
Please run \fBpwck\fR and \fBgrpck\fR to correct any such errors before
|
||||
converting to or from shadow passwords or groups.
|
||||
|
||||
.PP
|
||||
Errors in the password or group files (such as invalid or duplicate entries) may cause these programs to loop forever or fail in other strange ways\&. Please run \fBpwck\fR and \fBgrpck\fR to correct any such errors before converting to or from shadow passwords or groups\&.
|
||||
|
||||
.SH "SEE ALSO"
|
||||
.BR login.defs (5),
|
||||
.BR grpck (8),
|
||||
.BR pwck (8)
|
||||
|
||||
.PP
|
||||
\fBlogin\&.defs\fR(5), \fBgrpck\fR(8), \fBpwck\fR(8)
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='pwconv.8'>
|
||||
<!-- $Id: pwconv.8.xml,v 1.6 2005/05/19 10:35:00 kloczek Exp $ -->
|
||||
<!-- $Id: pwconv.8.xml,v 1.7 2005/06/15 12:39:27 kloczek Exp $ -->
|
||||
<refentryinfo>
|
||||
<date>26 Sep 1997</date>
|
||||
</refentryinfo>
|
||||
@@ -87,7 +87,7 @@
|
||||
are updated from the shadowed file. Entries which exist in the main
|
||||
file but not in the shadowed file are left alone. Finally, the
|
||||
shadowed file is removed. Some password aging information is lost by
|
||||
<command>pwunconv</command>. It will convert what it can.
|
||||
<command>pwunconv</command>. It will convert what it can.
|
||||
</para>
|
||||
</refsect1>
|
||||
|
||||
@@ -95,7 +95,7 @@
|
||||
<title>BUGS</title>
|
||||
<para>Errors in the password or group files (such as invalid or
|
||||
duplicate entries) may cause these programs to loop forever or fail in
|
||||
other strange ways. Please run <command>pwck</command> and
|
||||
other strange ways. Please run <command>pwck</command> and
|
||||
<command>grpck</command> to correct any such errors before converting
|
||||
to or from shadow passwords or groups.
|
||||
</para>
|
||||
@@ -103,8 +103,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>login.defs</refentrytitle><manvolnum>5</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
@@ -38,11 +38,7 @@ host_triplet = @host@
|
||||
subdir = man/ru
|
||||
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
|
||||
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
|
||||
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
|
||||
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
|
||||
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
|
||||
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
|
||||
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
|
||||
am__aclocal_m4_deps = $(top_srcdir)/configure.in
|
||||
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
|
||||
$(ACLOCAL_M4)
|
||||
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
|
||||
@@ -189,9 +185,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
|
||||
exit 1;; \
|
||||
esac; \
|
||||
done; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/ru/Makefile'; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/ru/Makefile'; \
|
||||
cd $(top_srcdir) && \
|
||||
$(AUTOMAKE) --foreign man/ru/Makefile
|
||||
$(AUTOMAKE) --gnu man/ru/Makefile
|
||||
.PRECIOUS: Makefile
|
||||
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
|
||||
@case '$?' in \
|
||||
|
||||
250
man/shadow.3
250
man/shadow.3
@@ -1,140 +1,142 @@
|
||||
.\" $Id: shadow.3,v 1.13 2005/04/12 16:31:06 kloczek Exp $
|
||||
.\" Copyright 1989 - 1993, Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH SHADOW 3
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "SHADOW" 3 "" "" ""
|
||||
.SH NAME
|
||||
shadow \- encrypted password file routines
|
||||
.SH SYNTAX
|
||||
.B #include <shadow.h>
|
||||
.SH "SYNTAX"
|
||||
|
||||
.PP
|
||||
.B struct spwd *getspent();
|
||||
\fI#include <shadow\&.h>\fR
|
||||
|
||||
.PP
|
||||
.B struct spwd *getspnam(char
|
||||
.IB *name );
|
||||
\fIstruct spwd *getspent();\fR
|
||||
|
||||
.PP
|
||||
.B void setspent();
|
||||
\fIstruct spwd *getspnam(char\fR \fI*name\fR\fI);\fR
|
||||
|
||||
.PP
|
||||
.B void endspent();
|
||||
\fIvoid setspent();\fR
|
||||
|
||||
.PP
|
||||
.B struct spwd *fgetspent(FILE
|
||||
.IB *fp );
|
||||
\fIvoid endspent();\fR
|
||||
|
||||
.PP
|
||||
.B struct spwd *sgetspent(char
|
||||
.IB *cp );
|
||||
\fIstruct spwd *fgetspent(FILE\fR \fI*fp\fR\fI);\fR
|
||||
|
||||
.PP
|
||||
.B int putspent(struct spwd
|
||||
.I *p,
|
||||
.B FILE
|
||||
.IB *fp );
|
||||
\fIstruct spwd *sgetspent(char\fR \fI*cp\fR\fI);\fR
|
||||
|
||||
.PP
|
||||
.B int lckpwdf();
|
||||
\fIint putspent(struct spwd\fR \fI*p,\fR \fIFILE\fR \fI*fp\fR\fI);\fR
|
||||
|
||||
.PP
|
||||
.B int ulckpwdf();
|
||||
.SH DESCRIPTION
|
||||
.I shadow
|
||||
manipulates the contents of the shadow password file,
|
||||
\fI/etc/shadow\fR.
|
||||
The structure in the \fI#include\fR file is
|
||||
.sp
|
||||
\fIint lckpwdf();\fR
|
||||
|
||||
.PP
|
||||
\fIint ulckpwdf();\fR
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
\fIshadow\fR manipulates the contents of the shadow password file, \fI/etc/shadow\fR\&. The structure in the \fI#include\fR file is:
|
||||
|
||||
.nf
|
||||
struct spwd {
|
||||
.in +.5i
|
||||
.br
|
||||
char *sp_namp; /* user login name */
|
||||
.br
|
||||
char *sp_pwdp; /* encrypted password */
|
||||
.br
|
||||
long int sp_lstchg; /* last password change */
|
||||
.br
|
||||
long int sp_min; /* days until change allowed. */
|
||||
.br
|
||||
long int sp_max; /* days before change required */
|
||||
.br
|
||||
long int sp_warn; /* days warning for expiration */
|
||||
.br
|
||||
long int sp_inact; /* days before account inactive */
|
||||
.br
|
||||
long int sp_expire; /* date when account expires */
|
||||
.br
|
||||
unsigned long int sp_flag; /* reserved for future use */
|
||||
.br
|
||||
.in \-.5i
|
||||
char *sp_namp; /* user login name */
|
||||
char *sp_pwdp; /* encrypted password */
|
||||
long int sp_lstchg; /* last password change */
|
||||
long int sp_min; /* days until change allowed\&. */
|
||||
long int sp_max; /* days before change required */
|
||||
long int sp_warn; /* days warning for expiration */
|
||||
long int sp_inact; /* days before account inactive */
|
||||
long int sp_expire; /* date when account expires */
|
||||
unsigned long int sp_flag; /* reserved for future use */
|
||||
}
|
||||
|
||||
.fi
|
||||
|
||||
.PP
|
||||
The meanings of each field are
|
||||
.sp
|
||||
sp_namp \- pointer to null\-terminated user name.
|
||||
.br
|
||||
sp_pwdp \- pointer to null\-terminated password.
|
||||
.br
|
||||
sp_lstchg \- days since Jan 1, 1970 password was last changed.
|
||||
.br
|
||||
sp_min \- days before which password may not be changed.
|
||||
.br
|
||||
sp_max \- days after which password must be changed.
|
||||
.br
|
||||
sp_warn \- days before password is to expire that user is warned
|
||||
of pending password expiration.
|
||||
.br
|
||||
sp_inact \- days after password expires that account is considered
|
||||
inactive and disabled.
|
||||
.br
|
||||
sp_expire \- days since Jan 1, 1970 when account will be disabled.
|
||||
.br
|
||||
sp_flag \- reserved for future use.
|
||||
.SH DESCRIPTION
|
||||
\fBgetspent\fR, \fBgetspname\fR, \fBfgetspent\fR, and \fBsgetspent\fR each
|
||||
return a pointer to a \fBstruct spwd\fR. \fBgetspent\fR returns the next
|
||||
entry from the file, and \fBfgetspent\fR returns the next entry from the
|
||||
given stream, which is assumed to be a file of the proper format.
|
||||
\fBsgetspent\fR returns a pointer to a \fBstruct spwd\fR using the
|
||||
provided string as input. \fBgetspnam\fR searches from the current position
|
||||
in the file for an entry matching \fBname\fR.
|
||||
The meanings of each field are:
|
||||
|
||||
.TP 3
|
||||
\(bu
|
||||
sp_namp \- pointer to null\-terminated user name
|
||||
.TP
|
||||
\(bu
|
||||
sp_pwdp \- pointer to null\-terminated password
|
||||
.TP
|
||||
\(bu
|
||||
sp_lstchg \- days since Jan 1, 1970 password was last changed
|
||||
.TP
|
||||
\(bu
|
||||
sp_min \- days before which password may not be changed
|
||||
.TP
|
||||
\(bu
|
||||
sp_max \- days after which password must be changed
|
||||
.TP
|
||||
\(bu
|
||||
sp_warn \- days before password is to expire that user is warned of pending password expiration
|
||||
.TP
|
||||
\(bu
|
||||
sp_inact \- days after password expires that account is considered inactive and disabled
|
||||
.TP
|
||||
\(bu
|
||||
sp_expire \- days since Jan 1, 1970 when account will be disabled
|
||||
.TP
|
||||
\(bu
|
||||
sp_flag \- reserved for future use
|
||||
.LP
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
\fBsetspent\fR and \fBendspent\fR may be used to begin and end,
|
||||
respectively, access to the shadow password file.
|
||||
\fIgetspent\fR, \fIgetspname\fR \fIfgetspent\fR, and \fIsgetspent\fR each return a pointer to a \fIstruct spwd\fR\&. \fIgetspent\fR returns the next entry from the file, and \fIfgetspent\fR returns the next entry from the given stream, which is assumed to be a file of the proper format\&. \fIsgetspent\fR returns a pointer to a \fIstruct spwd\fR using the provided string as input\&. \fIgetspnam\fR searches from the current position in the file for an entry matching \fIname\fR\&.
|
||||
|
||||
.PP
|
||||
The \fBlckpwdf\fR and \fBulckpwdf\fR routines should be used to insure
|
||||
exclusive access to the \fI/etc/shadow\fR file. \fBlckpwdf\fR attempts to
|
||||
acquire a lock using \fBpw_lock\fR for up to 15 seconds. It continues by
|
||||
attempting to acquire a second lock using \fBspw_lock\fR for the remainder
|
||||
of the initial 15 seconds. Should either attempt fail after a total of 15
|
||||
seconds, \fBlckpwdf\fR returns \-1. When both locks are acquired 0 is
|
||||
returned.
|
||||
.SH DIAGNOSTICS
|
||||
Routines return NULL if no more entries are available or if an error occurs
|
||||
during processing. Routines which have \fBint\fR as the return value return
|
||||
0 for success and \-1 for failure.
|
||||
.SH CAVEATS
|
||||
These routines may only be used by the super user as access to the shadow
|
||||
password file is restricted.
|
||||
.SH FILES
|
||||
\fI/etc/shadow\fR \- secure user account information
|
||||
.SH SEE ALSO
|
||||
.BR getpwent (3),
|
||||
.BR shadow (5)
|
||||
.SH AUTHOR
|
||||
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||
\fIsetspent\fR and \fIendspent\fR may be used to begin and end, respectively, access to the shadow password file\&.
|
||||
|
||||
.PP
|
||||
The \fIlckpwdf\fR and \fIulckpwdf\fR routines should be used to insure exclusive access to the \fI/etc/shadow\fR file\&. \fIlckpwdf\fR attempts to acquire a lock using \fIpw_lock\fR for up to 15 seconds\&. It continues by attempting to acquire a second lock using \fIspw_lock\fR for the remainder of the initial 15 seconds\&. Should either attempt fail after a total of 15 seconds, \fIlckpwdf\fR returns \-1\&. When both locks are acquired 0 is returned\&.
|
||||
|
||||
.SH "DIAGNOSTICS"
|
||||
|
||||
.PP
|
||||
Routines return NULL if no more entries are available or if an error occurs during processing\&. Routines which have \fIint\fR as the return value return 0 for success and \-1 for failure\&.
|
||||
|
||||
.SH "CAVEATS"
|
||||
|
||||
.PP
|
||||
These routines may only be used by the super user as access to the shadow password file is restricted\&.
|
||||
|
||||
.SH "FILES"
|
||||
|
||||
.TP
|
||||
\fI/etc/shadow\fR
|
||||
secure user account information
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
\fBgetpwent\fR(3), \fBshadow\fR(5)
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
||||
|
||||
|
||||
124
man/shadow.3.xml
124
man/shadow.3.xml
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='shadow.3'>
|
||||
<!-- $Id: shadow.3.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
|
||||
<!-- $Id: shadow.3.xml,v 1.9 2005/06/20 08:42:12 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>shadow</refentrytitle>
|
||||
<manvolnum>3</manvolnum>
|
||||
@@ -14,116 +14,101 @@
|
||||
|
||||
<refsect1 id='syntax'>
|
||||
<title>SYNTAX</title>
|
||||
<para>
|
||||
<emphasis remap='B'>#include <shadow.h></emphasis>
|
||||
<para><emphasis remap='B'>#include <shadow.h></emphasis>
|
||||
</para>
|
||||
|
||||
<para>
|
||||
<emphasis remap='B'>struct spwd *getspent();</emphasis>
|
||||
<para><emphasis remap='B'>struct spwd *getspent();</emphasis>
|
||||
</para>
|
||||
|
||||
<para>
|
||||
<emphasis remap='B'>struct spwd *getspnam(char</emphasis>
|
||||
<para><emphasis remap='B'>struct spwd *getspnam(char</emphasis>
|
||||
<emphasis remap='I'>*name</emphasis><emphasis remap='B'>);</emphasis>
|
||||
</para>
|
||||
|
||||
<para>
|
||||
<emphasis remap='B'>void setspent();</emphasis>
|
||||
<para><emphasis remap='B'>void setspent();</emphasis>
|
||||
</para>
|
||||
|
||||
<para>
|
||||
<emphasis remap='B'>void endspent();</emphasis>
|
||||
<para><emphasis remap='B'>void endspent();</emphasis>
|
||||
</para>
|
||||
|
||||
<para>
|
||||
<emphasis remap='B'>struct spwd *fgetspent(FILE</emphasis>
|
||||
<para><emphasis remap='B'>struct spwd *fgetspent(FILE</emphasis>
|
||||
<emphasis remap='I'>*fp</emphasis><emphasis remap='B'>);</emphasis>
|
||||
</para>
|
||||
|
||||
<para>
|
||||
<emphasis remap='B'>struct spwd *sgetspent(char</emphasis>
|
||||
<para><emphasis remap='B'>struct spwd *sgetspent(char</emphasis>
|
||||
<emphasis remap='I'>*cp</emphasis><emphasis remap='B'>);</emphasis>
|
||||
</para>
|
||||
|
||||
<para>
|
||||
<emphasis remap='B'>int putspent(struct spwd</emphasis>
|
||||
<para><emphasis remap='B'>int putspent(struct spwd</emphasis>
|
||||
<emphasis remap='I'>*p,</emphasis>
|
||||
<emphasis remap='B'>FILE</emphasis>
|
||||
<emphasis remap='I'>*fp</emphasis><emphasis remap='B'>);</emphasis>
|
||||
</para>
|
||||
|
||||
<para>
|
||||
<emphasis remap='B'>int lckpwdf();</emphasis>
|
||||
<para><emphasis remap='B'>int lckpwdf();</emphasis>
|
||||
</para>
|
||||
|
||||
<para>
|
||||
<emphasis remap='B'>int ulckpwdf();</emphasis>
|
||||
<para><emphasis remap='B'>int ulckpwdf();</emphasis>
|
||||
</para>
|
||||
</refsect1>
|
||||
|
||||
<refsect1 id='description'>
|
||||
<title>DESCRIPTION</title>
|
||||
<para>
|
||||
<emphasis remap='I'>shadow</emphasis>
|
||||
manipulates the contents of the shadow password file,
|
||||
<filename>/etc/shadow</filename>.
|
||||
The structure in the <emphasis remap='I'>#include</emphasis> file
|
||||
is
|
||||
<para><emphasis remap='I'>shadow</emphasis> manipulates the contents of
|
||||
the shadow password file, <filename>/etc/shadow</filename>.
|
||||
The structure in the <emphasis remap='I'>#include</emphasis> file is:
|
||||
</para>
|
||||
|
||||
<para>struct spwd {
|
||||
<!-- .in +.5i -->
|
||||
<!-- .br -->
|
||||
<programlisting>struct spwd {
|
||||
char *sp_namp; /* user login name */
|
||||
<!-- .br -->
|
||||
char *sp_pwdp; /* encrypted password */
|
||||
<!-- .br -->
|
||||
long int sp_lstchg; /* last password change */
|
||||
<!-- .br -->
|
||||
long int sp_min; /* days until change allowed. */
|
||||
<!-- .br -->
|
||||
long int sp_max; /* days before change required */
|
||||
<!-- .br -->
|
||||
long int sp_warn; /* days warning for expiration */
|
||||
<!-- .br -->
|
||||
long int sp_inact; /* days before account inactive */
|
||||
<!-- .br -->
|
||||
long int sp_expire; /* date when account expires */
|
||||
<!-- .br -->
|
||||
unsigned long int sp_flag; /* reserved for future use */
|
||||
<!-- .br -->
|
||||
<!-- .in \-.5i -->
|
||||
}
|
||||
</para>
|
||||
|
||||
<para>The meanings of each field are</para>
|
||||
|
||||
<para>sp_namp - pointer to null-terminated user name.
|
||||
<!-- .br -->
|
||||
sp_pwdp - pointer to null-terminated password.
|
||||
<!-- .br -->
|
||||
sp_lstchg - days since Jan 1, 1970 password was last changed.
|
||||
<!-- .br -->
|
||||
sp_min - days before which password may not be changed.
|
||||
<!-- .br -->
|
||||
sp_max - days after which password must be changed.
|
||||
<!-- .br -->
|
||||
sp_warn - days before password is to expire that user is warned
|
||||
of pending password expiration.
|
||||
<!-- .br -->
|
||||
sp_inact - days after password expires that account is considered
|
||||
inactive and disabled.
|
||||
<!-- .br -->
|
||||
sp_expire - days since Jan 1, 1970 when account will be disabled.
|
||||
<!-- .br -->
|
||||
sp_flag - reserved for future use.
|
||||
</para>
|
||||
}
|
||||
</programlisting>
|
||||
<para>The meanings of each field are:</para>
|
||||
<itemizedlist mark='bullet'>
|
||||
<listitem>
|
||||
<para>sp_namp - pointer to null-terminated user name</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>sp_pwdp - pointer to null-terminated password</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>sp_lstchg - days since Jan 1, 1970 password was last changed</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>sp_min - days before which password may not be changed</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>sp_max - days after which password must be changed</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>sp_warn - days before password is to expire that user is warned of
|
||||
pending password expiration
|
||||
</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>sp_inact - days after password expires that account is considered
|
||||
inactive and disabled
|
||||
</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>sp_expire - days since Jan 1, 1970 when account will be disabled</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>sp_flag - reserved for future use</para>
|
||||
</listitem>
|
||||
</itemizedlist>
|
||||
|
||||
</refsect1>
|
||||
|
||||
<refsect1 id='description2'>
|
||||
<title>DESCRIPTION</title>
|
||||
<para>
|
||||
<emphasis remap='B'>getspent</emphasis>, <emphasis
|
||||
<para><emphasis remap='B'>getspent</emphasis>, <emphasis
|
||||
remap='B'>getspname</emphasis> <emphasis
|
||||
remap='B'>fgetspent</emphasis>, and <emphasis
|
||||
remap='B'>sgetspent</emphasis> each return a pointer to a <emphasis
|
||||
@@ -182,8 +167,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>getpwent</refentrytitle><manvolnum>3</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
167
man/shadow.5
167
man/shadow.5
@@ -1,91 +1,92 @@
|
||||
.\"$Id: shadow.5,v 1.15 2005/04/12 16:31:06 kloczek Exp $
|
||||
.\" Copyright 1989 - 1990, Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH SHADOW 5
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "SHADOW" 5 "" "" ""
|
||||
.SH NAME
|
||||
shadow \- encrypted password file
|
||||
.SH DESCRIPTION
|
||||
\fIshadow\fR contains the encrypted password information for user's accounts
|
||||
and optional the password aging information. Included is
|
||||
.IP "" .5i
|
||||
Login name
|
||||
.IP "" .5i
|
||||
Encrypted password
|
||||
.IP "" .5i
|
||||
Days since Jan 1, 1970 that password was last changed
|
||||
.IP "" .5i
|
||||
Days before password may be changed
|
||||
.IP "" .5i
|
||||
Days after which password must be changed
|
||||
.IP "" .5i
|
||||
Days before password is to expire that user is warned
|
||||
.IP "" .5i
|
||||
Days after password expires that account is disabled
|
||||
.IP "" .5i
|
||||
Days since Jan 1, 1970 that account is disabled
|
||||
.IP "" .5i
|
||||
A reserved field
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
The password field must be filled. The encryped password consists of 13 to
|
||||
24 characters from the 64 characters alphabet a thru z, A thru Z, 0 thru 9,
|
||||
\&\. and /. Optionally it can start with a "$" character. This means the
|
||||
encrypted password was generated using another (not DES) algorithm. For
|
||||
example if it starts with "$1$" it means the MD5\-based algorithm was used.
|
||||
\fIshadow\fR contains the encrypted password information for user's accounts and optional the password aging information\&. Included is:
|
||||
|
||||
.TP 3
|
||||
\(bu
|
||||
login name
|
||||
.TP
|
||||
\(bu
|
||||
encrypted password
|
||||
.TP
|
||||
\(bu
|
||||
days since Jan 1, 1970 that password was last changed
|
||||
.TP
|
||||
\(bu
|
||||
days before password may be changed
|
||||
.TP
|
||||
\(bu
|
||||
days after which password must be changed
|
||||
.TP
|
||||
\(bu
|
||||
days before password is to expire that user is warned
|
||||
.TP
|
||||
\(bu
|
||||
days after password expires that account is disabled
|
||||
.TP
|
||||
\(bu
|
||||
days since Jan 1, 1970 that account is disabled
|
||||
.TP
|
||||
\(bu
|
||||
a reserved field
|
||||
.LP
|
||||
|
||||
.PP
|
||||
Refer to \fBcrypt\fR(3) for details on how this string is interpreted.
|
||||
The password field must be filled\&. The encrypted password consists of 13 to 24 characters from the 64 characters alphabet a thru z, A thru Z, 0 thru 9, \\\&. and /\&. Optionally it can start with a "$" character\&. This means the encrypted password was generated using another (not DES) algorithm\&. For example if it starts with "$1$" it means the MD5\-based algorithm was used\&.
|
||||
|
||||
.PP
|
||||
The date of the last password change is given as the number of days since
|
||||
Jan 1, 1970. The password may not be changed again until the proper number
|
||||
of days have passed, and must be changed after the maximum number of days.
|
||||
If the minimum number of days required is greater than the maximum number of
|
||||
day allowed, this password may not be changed by the user.
|
||||
Refer to \fBcrypt\fR(3) for details on how this string is interpreted\&.
|
||||
|
||||
.PP
|
||||
An account is considered to be inactive and is disabled if the password is
|
||||
not changed within the specified number of days after the password expires.
|
||||
An account will also be disabled on the specified day regardless of other
|
||||
password expiration information.
|
||||
The date of the last password change is given as the number of days since Jan 1, 1970\&. The password may not be changed again until the proper number of days have passed, and must be changed after the maximum number of days\&. If the minimum number of days required is greater than the maximum number of day allowed, this password may not be changed by the user\&.
|
||||
|
||||
.PP
|
||||
This information supercedes any password or password age information present
|
||||
in \fI/etc/passwd\fR.
|
||||
An account is considered to be inactive and is disabled if the password is not changed within the specified number of days after the password expires\&. An account will also be disabled on the specified day regardless of other password expiration information\&.
|
||||
|
||||
.PP
|
||||
This file must not be readable by regular users if password security is to
|
||||
be maintained.
|
||||
.SH FILES
|
||||
\fI/etc/passwd\fR \- user account information
|
||||
.br
|
||||
\fI/etc/shadow\fR \- secure user account information
|
||||
.SH SEE ALSO
|
||||
.BR chage (1),
|
||||
.BR login (1),
|
||||
.BR passwd (1),
|
||||
.BR su (1),
|
||||
.BR passwd (5),
|
||||
.BR pwconv (8),
|
||||
.BR pwunconv (8),
|
||||
.BR sulogin (8)
|
||||
.SH AUTHOR
|
||||
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||
This information supersedes any password or password age information present in \fI/etc/passwd\fR\&.
|
||||
|
||||
.PP
|
||||
This file must not be readable by regular users if password security is to be maintained\&.
|
||||
|
||||
.SH "FILES"
|
||||
|
||||
.TP
|
||||
\fI/etc/passwd\fR
|
||||
user account information
|
||||
.TP
|
||||
\fI/etc/shadow\fR
|
||||
secure user account information
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
\fBchage\fR(1), \fBlogin\fR(1), \fBpasswd\fR(1), \fBsu\fR(1), \fBpasswd\fR(5), \fBpwconv\fR(8), \fBpwunconv\fR(8), \fBsulogin\fR(8)
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='shadow.5'>
|
||||
<!-- $Id: shadow.5.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
|
||||
<!-- $Id: shadow.5.xml,v 1.9 2005/06/16 17:27:33 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>shadow</refentrytitle>
|
||||
<manvolnum>5</manvolnum>
|
||||
@@ -14,31 +14,41 @@
|
||||
|
||||
<refsect1 id='description'>
|
||||
<title>DESCRIPTION</title>
|
||||
<para>
|
||||
<emphasis remap='I'>shadow</emphasis> contains the encrypted
|
||||
<para><emphasis remap='I'>shadow</emphasis> contains the encrypted
|
||||
password information for user's accounts
|
||||
and optional the password aging information. Included is
|
||||
and optional the password aging information. Included is:
|
||||
</para>
|
||||
<itemizedlist mark='bullet'>
|
||||
<listitem>
|
||||
<para>login name</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>encrypted password</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>days since Jan 1, 1970 that password was last changed</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>days before password may be changed</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>days after which password must be changed</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>days before password is to expire that user is warned</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>days after password expires that account is disabled</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>days since Jan 1, 1970 that account is disabled</para>
|
||||
</listitem>
|
||||
<listitem>
|
||||
<para>a reserved field</para>
|
||||
</listitem>
|
||||
</itemizedlist>
|
||||
|
||||
<para>Login name</para>
|
||||
|
||||
<para>Encrypted password</para>
|
||||
|
||||
<para>Days since Jan 1, 1970 that password was last changed</para>
|
||||
|
||||
<para>Days before password may be changed</para>
|
||||
|
||||
<para>Days after which password must be changed</para>
|
||||
|
||||
<para>Days before password is to expire that user is warned</para>
|
||||
|
||||
<para>Days after password expires that account is disabled</para>
|
||||
|
||||
<para>Days since Jan 1, 1970 that account is disabled</para>
|
||||
|
||||
<para>A reserved field</para>
|
||||
|
||||
<para>The password field must be filled. The encryped password consists
|
||||
<para>The password field must be filled. The encrypted password consists
|
||||
of 13 to 24 characters from the 64 characters alphabet a thru z, A
|
||||
thru Z, 0 thru 9, \. and /. Optionally it can start with a "$"
|
||||
character. This means the encrypted password was generated using
|
||||
@@ -64,11 +74,11 @@
|
||||
|
||||
<para>An account is considered to be inactive and is disabled if the
|
||||
password is not changed within the specified number of days after the
|
||||
password expires. An account will also be disabled on the specified
|
||||
password expires. An account will also be disabled on the specified
|
||||
day regardless of other password expiration information.
|
||||
</para>
|
||||
|
||||
<para>This information supercedes any password or password age
|
||||
<para>This information supersedes any password or password age
|
||||
information present in <filename>/etc/passwd</filename>.
|
||||
</para>
|
||||
|
||||
@@ -93,8 +103,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>chage</refentrytitle><manvolnum>1</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
@@ -1,22 +1,41 @@
|
||||
.\"$Id: shadowconfig.8,v 1.7 2004/12/11 20:05:01 kloczek Exp $
|
||||
.TH SHADOWCONFIG 8 "19 Apr 1997" "Debian GNU/Linux"
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "SHADOWCONFIG" 8 "19 Apr 1997" "" ""
|
||||
.SH NAME
|
||||
shadowconfig \- toggle shadow passwords on and off
|
||||
.SH SYNOPSIS
|
||||
.B "shadowconfig"
|
||||
.IR on " | " off
|
||||
.SH DESCRIPTION
|
||||
.PP
|
||||
.SH "SYNOPSIS"
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 13
|
||||
\fBshadowconfig\fR \fB\fIon\fR\fR | \fB\fIoff\fR\fR
|
||||
.ad
|
||||
.hy
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
\fBshadowconfig\fR on will turn shadow passwords on; \fIshadowconfig off\fR will turn shadow passwords off\&. \fBshadowconfig\fR will print an error message and exit with a nonzero code if it finds anything awry\&. If that happens, you should correct the error and run it again\&. Turning shadow passwords on when they are already on, or off when they are already off, is harmless\&.
|
||||
|
||||
.PP
|
||||
Read \fI/usr/share/doc/passwd/README\&.debian\fR for a brief introduction to shadow passwords and related features\&.
|
||||
|
||||
.PP
|
||||
Note that turning shadow passwords off and on again will lose all password aging information\&.
|
||||
|
||||
\fBshadowconfig on\fR will turn shadow passwords on; \fBshadowconfig off\fR
|
||||
will turn shadow passwords off. \fBshadowconfig\fR will print an error
|
||||
message and exit with a nonzero code if it finds anything awry. If that
|
||||
happens, you should correct the error and run it again. Turning shadow
|
||||
passwords on when they are already on, or off when they are already off, is
|
||||
harmless.
|
||||
.P
|
||||
Read \fI/usr/share/doc/passwd/README.debian\fR for a brief introduction
|
||||
to shadow passwords and related features.
|
||||
.P
|
||||
Note that turning shadow passwords off and on again will lose all password
|
||||
aging information.
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='shadowconfig.8'>
|
||||
<!-- $Id: shadowconfig.8.xml,v 1.5 2005/04/27 18:20:35 kloczek Exp $ -->
|
||||
<!-- $Id: shadowconfig.8.xml,v 1.6 2005/06/15 12:39:27 kloczek Exp $ -->
|
||||
<refentryinfo>
|
||||
<date>19 Apr 1997</date>
|
||||
</refentryinfo>
|
||||
@@ -29,8 +29,7 @@
|
||||
|
||||
<refsect1 id='description'>
|
||||
<title>DESCRIPTION</title>
|
||||
<para>
|
||||
<command>shadowconfig</coamand> on will turn shadow passwords on;
|
||||
<para><command>shadowconfig</command> on will turn shadow passwords on;
|
||||
<emphasis remap='B'>shadowconfig off</emphasis> will turn shadow
|
||||
passwords off. <command>shadowconfig</command> will print an error
|
||||
message and exit with a nonzero code if it finds anything awry. If
|
||||
|
||||
139
man/su.1
139
man/su.1
@@ -1,71 +1,70 @@
|
||||
.\" $Id: su.1,v 1.18 2005/05/19 10:35:00 kloczek Exp $
|
||||
.\" Copyright 1989 - 1990, Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH SU 1
|
||||
.SH NAME
|
||||
su \- change user ID or become super\-user
|
||||
.SH SYNOPSIS
|
||||
\fBsu\fR [\fB\-\fR] [\fIusername\fR [\fIargs\fR]]
|
||||
.SH DESCRIPTION
|
||||
\fBsu\fR is used to become another user during a login session. Invoked
|
||||
without a username, \fBsu\fR defaults to becoming the super user. The
|
||||
optional argument \fB\-\fR may be used to provide an environment similar to
|
||||
what the user would expect had the user logged in directly.
|
||||
.PP
|
||||
Additional arguments may be provided after the username, in which case they
|
||||
are supplied to the user\'s login shell. In particular, an argument of
|
||||
\fB\-c\fR will cause the next argument to be treated as a command by most
|
||||
command interpreters. The command will be executed by the shell specified in
|
||||
\fI/etc/passwd\fR for the target user.
|
||||
.PP
|
||||
The user will be prompted for a password, if appropriate. Invalid passwords
|
||||
will produce an error message. All attempts, both valid and invalid, are
|
||||
logged to detect abuses of the system.
|
||||
.PP
|
||||
The current environment is passed to the new shell. The value of \fB$PATH\fR
|
||||
\is reset to \fB/bin:/usr/bin\fR for normal users, or
|
||||
\fB/sbin:/bin:/usr/sbin:/usr/bin\fR for the super user. This may be changed
|
||||
with the \fBENV_PATH\fR and \fBENV_SUPATH\fR definitions in
|
||||
\fI/etc/login.defs\fR.
|
||||
.PP
|
||||
A subsystem login is indicated by the presense of a "*" as the first
|
||||
character of the login shell. The given home directory will be used as
|
||||
the root of a new filesystem which the user is actually logged into.
|
||||
.SH CAVEATS
|
||||
This version of \fBsu\fR has many compilation options, only some of which
|
||||
may be in use at any particular site.
|
||||
.SH FILES
|
||||
\fI/etc/passwd\fR \- user account information
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
\fI/etc/shadow\fR \- secure user account information
|
||||
.SH SEE ALSO
|
||||
.BR login (1),
|
||||
.BR sh (1),
|
||||
.BR login.defs (5),
|
||||
.BR suauth (5)
|
||||
.SH AUTHOR
|
||||
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "SU" 1 "" "" ""
|
||||
.SH NAME
|
||||
su \- change user ID or become super-user
|
||||
.SH "SYNOPSIS"
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 3
|
||||
\fBsu\fR [\-] [\fIusername\fR\ [\fIargs\fR]]
|
||||
.ad
|
||||
.hy
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
\fBsu\fR is used to become another user during a login session\&. Invoked without a username, \fBsu\fR defaults to becoming the super user\&. The optional argument \fB\-\fR may be used to provide an environment similar to what the user would expect had the user logged in directly\&.
|
||||
|
||||
.PP
|
||||
Additional arguments may be provided after the username, in which case they are supplied to the user<65>s login shell\&. In particular, an argument of \fB\-c\fR will cause the next argument to be treated as a command by most command interpreters\&. The command will be executed by the shell specified in \fI/etc/passwd\fR for the target user\&.
|
||||
|
||||
.PP
|
||||
The user will be prompted for a password, if appropriate\&. Invalid passwords will produce an error message\&. All attempts, both valid and invalid, are logged to detect abuses of the system\&.
|
||||
|
||||
.PP
|
||||
The current environment is passed to the new shell\&. The value of \fI$PATH\fR is reset to \fI/bin:/usr/bin\fR for normal users, or \fI/sbin:/bin:/usr/sbin:/usr/bin\fR for the super user\&. This may be changed with the \fIENV_PATH\fR and \fIENV_SUPATH\fR definitions in \fI/etc/login\&.defs\fR\&.
|
||||
|
||||
.PP
|
||||
A subsystem login is indicated by the presense of a "*" as the first character of the login shell\&. The given home directory will be used as the root of a new filesystem which the user is actually logged into\&.
|
||||
|
||||
.SH "CAVEATS"
|
||||
|
||||
.PP
|
||||
This version of \fBsu\fR has many compilation options, only some of which may be in use at any particular site\&.
|
||||
|
||||
.SH "FILES"
|
||||
|
||||
.TP
|
||||
\fI/etc/passwd\fR
|
||||
user account information
|
||||
.TP
|
||||
\fI/etc/shadow\fR
|
||||
secure user account information
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
\fBlogin\fR(1), \fBsh\fR(1), \fBlogin\&.defs\fR(5), \fBsuauth\fR(5)
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
Julianne Frances Haugh <jockgrrl@ix\&.netcom\&.com>
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='su.1'>
|
||||
<!-- $Id: su.1.xml,v 1.8 2005/05/19 10:35:00 kloczek Exp $ -->
|
||||
<!-- $Id: su.1.xml,v 1.9 2005/06/15 12:39:27 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>su</refentrytitle>
|
||||
<manvolnum>1</manvolnum>
|
||||
@@ -29,8 +29,7 @@
|
||||
|
||||
<refsect1 id='description'>
|
||||
<title>DESCRIPTION</title>
|
||||
<para>
|
||||
<command>su</command> is used to become another user during a login
|
||||
<para><command>su</command> is used to become another user during a login
|
||||
session. Invoked without a username, <command>su</command> defaults to
|
||||
becoming the super user. The optional argument <option>-</option> may
|
||||
be used to provide an environment similar to what the user would
|
||||
@@ -90,8 +89,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>login</refentrytitle><manvolnum>1</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='suauth.5'>
|
||||
<!-- $Id: suauth.5.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
|
||||
<!-- $Id: suauth.5.xml,v 1.6 2005/06/15 12:39:27 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>suauth</refentrytitle>
|
||||
<manvolnum>5</manvolnum>
|
||||
@@ -177,8 +177,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>su</refentrytitle><manvolnum>1</manvolnum>
|
||||
</citerefentry>
|
||||
</para>
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='sulogin.8'>
|
||||
<!-- $Id: sulogin.8.xml,v 1.6 2005/04/27 18:20:35 kloczek Exp $ -->
|
||||
<!-- $Id: sulogin.8.xml,v 1.7 2005/06/15 12:39:27 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>sulogin</refentrytitle>
|
||||
<manvolnum>8</manvolnum>
|
||||
@@ -15,7 +15,7 @@
|
||||
<refsect1 id='syntax'>
|
||||
<title>SYNTAX</title>
|
||||
<para>
|
||||
<command>sulogin</coamand> [<emphasis remap='I'>
|
||||
<command>sulogin</command> [<emphasis remap='I'>
|
||||
tty-device
|
||||
</emphasis>
|
||||
]
|
||||
@@ -25,10 +25,10 @@
|
||||
<refsect1 id='description'>
|
||||
<title>DESCRIPTION</title>
|
||||
<para>
|
||||
<command>sulogin</coamand> is invoked by <command>init</coamand> prior
|
||||
<command>sulogin</command> is invoked by <command>init</command> prior
|
||||
to allowing the user access to the system when in single user mode.
|
||||
This feature may only be available on certain systems where
|
||||
<command>init</coamand> has been modified accordingly, or where the
|
||||
<command>init</command> has been modified accordingly, or where the
|
||||
<filename>/etc/inittab</filename> has an entry for a single user
|
||||
login.
|
||||
</para>
|
||||
@@ -60,8 +60,8 @@
|
||||
<refsect1 id='caveats'>
|
||||
<title>CAVEATS</title>
|
||||
<para>
|
||||
This command can only be used if <command>init</coamand> has been
|
||||
modified to call <command>sulogin</coamand> instead of
|
||||
This command can only be used if <command>init</command> has been
|
||||
modified to call <command>sulogin</command> instead of
|
||||
<filename>/bin/sh</filename>, or if the user has set the <emphasis
|
||||
remap='I'>inittab</emphasis> to support a single user login. For
|
||||
example, the line:
|
||||
@@ -97,8 +97,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>login</refentrytitle><manvolnum>1</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
362
man/useradd.8
362
man/useradd.8
@@ -1,177 +1,199 @@
|
||||
.\" $Id: useradd.8,v 1.29 2005/04/18 19:21:33 kloczek Exp $
|
||||
.\" Copyright 1991 - 1994, Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH USERADD 8
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "USERADD" 8 "" "" ""
|
||||
.SH NAME
|
||||
useradd \- Create a new user or update default new user information
|
||||
.SH SYNOPSIS
|
||||
.TP 8
|
||||
\fBuseradd\fR [\fB\-c\fR \fIcomment\fR] [\fB\-d\fR \fIhome_dir\fR] [\fB\-e\fR \fIexpire_date\fR] [\fB\-f\fR \fIinactive_days\fR]
|
||||
.SH "SYNOPSIS"
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 8
|
||||
\fBuseradd\fR [\-c\ \fIcomment\fR] [\-d\ \fIhome_dir\fR] [\-e\ \fIexpire_date\fR] [\-f\ \fIinactive_days\fR]
|
||||
.br
|
||||
[\fB\-g\fR \fIinitial_group\fR] [\fB\-G\fR \fIgroup1\fR[\fI,group2,...,\fR[\fIgroupN\fR]\fR]]
|
||||
[\-g\ \fIinitial_group\fR] [\-G\ \fIgroup1\fR\ [\fI,group2,\fR...\ \fI,\fR\ [\fIgroupN\fR]]]
|
||||
.br
|
||||
[[\fB\-M\fR] \fB\-m\fR [\fB\-k\fR \fIskeleton_dir\fR]] [\fB\-o\fR] [\fB\-p\fR \fIpasswd\fR] [\fB\-s\fR \fIshell\fR]
|
||||
[[\-M]\ \-m\ [\-k\ \fIskeleton_dir\fR]] [\-o] [\-p\ \fIpasswd\fR] [\-s\ \fIshell\fR]
|
||||
.br
|
||||
[\fB\-u\fR \fIuid\fR] \fIlogin\fR
|
||||
.TP 8
|
||||
\fBuseradd\fR \fB\-D\fR [\fB\-g\fR \fIgroup\fR] [\fB\-b\fR \fIhome_dir\fR] [\fB\-e\fR \fIexpire_date\fR]
|
||||
[\-u\ \fIuid\fR] \fIlogin\fR \fIuseradd\fR \-D [\-g\ \fIgroup\fR] [\-b\ \fIhome_dir\fR] [\-e\ \fIexpire_date\fR]
|
||||
.br
|
||||
[\fB\-f\fR \fIinactive_days\fR] [\fB\-s\fR \fIshell\fR]
|
||||
.SH DESCRIPTION
|
||||
.SS Creating New Users
|
||||
When invoked without the \fB\-D\fR option, the \fBuseradd\fR command creates
|
||||
a new user account using the values specified on the command line and the
|
||||
default values from the system. Depending on command line options, the
|
||||
useradd command will update system files and may also create the new user's
|
||||
home directory and copy initial files.
|
||||
.SH OPTIONS
|
||||
The options which apply to the
|
||||
\fBuseradd\fR command are:
|
||||
.IP "\fB\-c\fR \fIcomment\fR"
|
||||
The new user's password file comment field.
|
||||
.IP "\fB\-d\fR \fIhome_dir\fR"
|
||||
The new user will be created using \fIhome_dir\fR as the value for the
|
||||
user's login directory. The default is to append the \fIlogin\fR name to
|
||||
\fIhome\fR and use that as the login directory name.
|
||||
.IP "\fB\-e\fR \fIexpire_date\fR"
|
||||
The date on which the user account will be disabled. The date is specified
|
||||
in the format \fIYYYY\-MM\-DD\fR.
|
||||
.IP "\fB\-f\fR \fIinactive_days\fR"
|
||||
The number of days after a password expires until the account is permanently
|
||||
disabled. A value of 0 disables the account as soon as the password has
|
||||
expired, and a value of \-1 disables the feature. The default value is \-1.
|
||||
.IP "\fB\-g\fR \fIinitial_group\fR"
|
||||
The group name or number of the user's initial login group. The group name
|
||||
must exist. A group number must refer to an already existing group. The
|
||||
default group number is 1 or whatever is specified in
|
||||
\fI/etc/default/useradd\fR.
|
||||
.IP "\fB\-G\fR \fIgroup1\fR[\fI,group2,...,\fR[\fIgroupN\fR]\fR]]"
|
||||
A list of supplementary groups which the user is also a member of. Each
|
||||
group is separated from the next by a comma, with no intervening whitespace.
|
||||
The groups are subject to the same restrictions as the group given with the
|
||||
\fB\-g\fR option. The default is for the user to belong only to the initial
|
||||
group.
|
||||
.IP \fB\-M\fR
|
||||
RedHat added the CREATE_HOME option in login.defs in their version of
|
||||
shadow\-utils (which makes \-m the default, with new \-M option to turn it
|
||||
off). Unfortunately, this changes the way useradd works (it can be run by
|
||||
scripts expecting some standard behaviour), compared to other Unices and
|
||||
other Linux distributions, and also adds a lot of confusion.
|
||||
.IP \fB\-m\fR
|
||||
The user's home directory will be created if it does not exist. The files
|
||||
contained in \fIskeleton_dir\fR will be copied to the home directory if the
|
||||
\fB\-k\fR option is used, otherwise the files contained in \fI/etc/skel\fR
|
||||
will be used instead. Any directories contained in \fIskeleton_dir\fR or
|
||||
\fI/etc/skel\fR will be created in the user's home directory as well. The
|
||||
\fB\-k\fR option is only valid in conjunction with the \fB\-m\fR option. The
|
||||
default is to not create the directory and to not copy any files.
|
||||
.IP "\fB\-o\fR"
|
||||
Allow create user with duplicate (non\-unique) UID.
|
||||
.IP "\fB\-p\fR \fIpasswd\fR"
|
||||
The encrypted password, as returned by \fBcrypt\fR(3). The default is to
|
||||
disable the account.
|
||||
.IP "\fB\-s\fR \fIshell\fR"
|
||||
The name of the user's login shell. The default is to leave this field
|
||||
blank, which causes the system to select the default login shell.
|
||||
.IP "\fB\-u\fR \fIuid\fR"
|
||||
The numerical value of the user's ID. This value must be unique, unless the
|
||||
\fI\-o\fR option is used. The value must be non\-negative. The default is to
|
||||
use the smallest ID value greater than 999 and greater than every other user.
|
||||
Values between 0 and 999 are typically reserved for system accounts.
|
||||
.SS Changing the default values
|
||||
When invoked with the \fB\-D\fR option, \fBuseradd\fR will either display the
|
||||
current default values, or update the default values from the command line.
|
||||
The valid options are
|
||||
.IP "\fB\-b\fR \fIhome_dir\fR"
|
||||
The initial path prefix for a new user's home directory. The user's name
|
||||
will be affixed to the end of \fIhome\fR to create the new directory
|
||||
name if the \fB\-d\fR option is not used when creating a new account.
|
||||
.IP "\fB\-e\fR \fIexpire_date\fR"
|
||||
The date on which the user account is disabled.
|
||||
.IP "\fB\-f\fR \fIinactive\fR"
|
||||
The number of days after a password has expired before the account will be
|
||||
disabled.
|
||||
.IP "\fB\-g\fR \fIgroup\fR"
|
||||
The group name or ID for a new user's initial group. The named group must
|
||||
exist, and a numerical group ID must have an existing entry .
|
||||
.IP "\fB\-s\fR \fIshell\fR"
|
||||
The name of the new user's login shell. The named program will be used for
|
||||
all future new user accounts.
|
||||
[\-f\ \fIinactive_days\fR] [\-s\ \fIshell\fR]
|
||||
.ad
|
||||
.hy
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.SS "Creating New Users"
|
||||
|
||||
.PP
|
||||
If no options are specified, \fBuseradd\fR displays the current default
|
||||
values.
|
||||
.SH NOTES
|
||||
The system administrator is responsible for placing the default user files
|
||||
in the \fI/etc/skel/\fR directory.
|
||||
.SH CAVEATS
|
||||
You may not add a user to an NIS group. This must be performed on the NIS
|
||||
server.
|
||||
.SH FILES
|
||||
\fI/etc/passwd\fR \- user account information
|
||||
.br
|
||||
\fI/etc/shadow\fR \- secure user account information
|
||||
.br
|
||||
\fI/etc/group\fR \- group account information
|
||||
.br
|
||||
\fI/etc/default/useradd\fR \- default information
|
||||
.br
|
||||
\fI/etc/skel/\fR \- directory containing default files
|
||||
.SH EXIT VALUES
|
||||
.TP 2
|
||||
The \fBuseadd\fR command exits with the following values:
|
||||
.br
|
||||
\fB0\fR \- success
|
||||
.br
|
||||
\fB1\fR \- can't update password file
|
||||
.br
|
||||
\fB2\fR \- invalid command syntax
|
||||
.br
|
||||
\fB3\fR \- invalid argument to option
|
||||
.br
|
||||
\fB4\fR \- uid already in use (and no \-o)
|
||||
.br
|
||||
\fB6\fR \- specified group doesn't exist
|
||||
.br
|
||||
\fB9\fR \- username already in use
|
||||
.br
|
||||
\fB10\fR \- can't update group file
|
||||
.br
|
||||
\fB12\fR \- can't create home directory
|
||||
.br
|
||||
\fB13\fR \- can't create mail spool
|
||||
.SH SEE ALSO
|
||||
.BR chfn (1),
|
||||
.BR chsh (1),
|
||||
.BR passwd (1),
|
||||
.BR crypt (3),
|
||||
.BR groupadd (8),
|
||||
.BR groupdel (8),
|
||||
.BR groupmod (8),
|
||||
.BR userdel (8),
|
||||
.BR usermod (8)
|
||||
.SH AUTHOR
|
||||
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||
When invoked without the \fB\-D\fR option, the \fBuseradd\fR command creates a new user account using the values specified on the command line and the default values from the system\&. Depending on command line options, the useradd command will update system files and may also create the new user's home directory and copy initial files\&.
|
||||
|
||||
.SH "OPTIONS"
|
||||
|
||||
.PP
|
||||
The options which apply to the \fBuseradd\fR command are:
|
||||
|
||||
.TP
|
||||
\fB\-c\fR \fIcomment\fR
|
||||
The new user's password file comment field\&.
|
||||
|
||||
.TP
|
||||
\fB\-d\fR \fIhome_dir\fR
|
||||
The new user will be created using \fI home_dir \fRas the value for the user's login directory\&. The default is to append the \fIlogin\fR name to \fIhome\fR and use that as the login directory name\&.
|
||||
|
||||
.TP
|
||||
\fB\-e\fR \fIexpire_date\fR
|
||||
The date on which the user account will be disabled\&. The date is specified in the format \fIYYYY\-MM\-DD\fR\&.
|
||||
|
||||
.TP
|
||||
\fB\-f\fR \fIinactive_days\fR
|
||||
The number of days after a password expires until the account is permanently disabled\&. A value of 0 disables the account as soon as the password has expired, and a value of \-1 disables the feature\&. The default value is \-1\&.
|
||||
|
||||
.TP
|
||||
\fB\-g\fR \fIinitial_group\fR
|
||||
The group name or number of the user's initial login group\&. The group name must exist\&. A group number must refer to an already existing group\&. The default group number is 1 or whatever is specified in \fI/etc/default/useradd\fR\&.
|
||||
|
||||
.TP
|
||||
\fB\-G\fR \fIgroup1\fR[\fI ,group2,\&.\&.\&., \fR [\fIgroupN\fR]]]
|
||||
A list of supplementary groups which the user is also a member of\&. Each group is separated from the next by a comma, with no intervening whitespace\&. The groups are subject to the same restrictions as the group given with the \fB\-g\fR option\&. The default is for the user to belong only to the initial group\&.
|
||||
|
||||
.TP
|
||||
\fB\-M\fR
|
||||
RedHat added the CREATE_HOME option in login\&.defs in their version of shadow\-utils (which makes \-m the default, with new \-M option to turn it off)\&. Unfortunately, this changes the way useradd works (it can be run by scripts expecting some standard behaviour), compared to other Unices and other Linux distributions, and also adds a lot of confusion\&.
|
||||
|
||||
.TP
|
||||
\fB\-m\fR
|
||||
The user's home directory will be created if it does not exist\&. The files contained in \fIskeleton_dir\fR will be copied to the home directory if the \fB\-k\fR option is used, otherwise the files contained in \fI/etc/skel\fR will be used instead\&. Any directories contained in \fI skeleton_dir\fR or \fI/etc/skel\fR will be created in the user's home directory as well\&. The \fB\-k\fR option is only valid in conjunction with the \fB\-m\fR option\&. The default is to not create the directory and to not copy any files\&.
|
||||
|
||||
.TP
|
||||
\fB\-o\fR
|
||||
Allow create user with duplicate (non\-unique) UID\&.
|
||||
|
||||
.TP
|
||||
\fB\-p\fR \fIpasswd\fR
|
||||
The encrypted password, as returned by \fBcrypt\fR(3)\&. The default is to disable the account\&.
|
||||
|
||||
.TP
|
||||
\fB\-s\fR \fIshell\fR
|
||||
The name of the user's login shell\&. The default is to leave this field blank, which causes the system to select the default login shell\&.
|
||||
|
||||
.TP
|
||||
\fB\-u\fR \fIuid\fR
|
||||
The numerical value of the user's ID\&. This value must be unique, unless the \fB\-o\fR option is used\&. The value must be non\-negative\&. The default is to use the smallest ID value greater than 999 and greater than every other user\&. Values between 0 and 999 are typically reserved for system accounts\&.
|
||||
|
||||
.SS "Changing the default values"
|
||||
|
||||
.PP
|
||||
When invoked with the \fB\-D\fR option, \fBuseradd\fR will either display the current default values, or update the default values from the command line\&. The valid options are
|
||||
|
||||
.TP
|
||||
\fB\-b\fR \fIhome_dir\fR
|
||||
The initial path prefix for a new user's home directory\&. The user's name will be affixed to the end of \fIhome\fR to create the new directory name if the \fB\-d\fR option is not used when creating a new account\&.
|
||||
|
||||
.TP
|
||||
\fB\-e\fR \fIexpire_date\fR
|
||||
The date on which the user account is disabled\&.
|
||||
|
||||
.TP
|
||||
\fB\-f\fR \fIinactive\fR
|
||||
The number of days after a password has expired before the account will be disabled\&.
|
||||
|
||||
.TP
|
||||
\fB\-g\fR \fIgroup\fR
|
||||
The group name or ID for a new user's initial group\&. The named group must exist, and a numerical group ID must have an existing entry \&.
|
||||
|
||||
.TP
|
||||
\fB\-s\fR \fIshell\fR
|
||||
The name of the new user's login shell\&. The named program will be used for all future new user accounts\&.
|
||||
|
||||
.PP
|
||||
If no options are specified, \fBuseradd\fR displays the current default values\&.
|
||||
|
||||
.SH "NOTES"
|
||||
|
||||
.PP
|
||||
The system administrator is responsible for placing the default user files in the \fI/etc/skel/\fR directory\&.
|
||||
|
||||
.SH "CAVEATS"
|
||||
|
||||
.PP
|
||||
You may not add a user to an NIS group\&. This must be performed on the NIS server\&.
|
||||
|
||||
.SH "FILES"
|
||||
|
||||
.TP
|
||||
\fI/etc/passwd\fR
|
||||
user account information
|
||||
.TP
|
||||
\fI/etc/shadow\fR
|
||||
secure user account information
|
||||
.TP
|
||||
\fI/etc/group\fR
|
||||
group account information
|
||||
.TP
|
||||
\fI/etc/default/useradd\fR
|
||||
default information
|
||||
.TP
|
||||
\fI/etc/skel/\fR
|
||||
directory containing default files
|
||||
.SH "EXIT VALUES"
|
||||
|
||||
.PP
|
||||
The \fBuseadd\fR command exits with the following values:
|
||||
|
||||
.TP
|
||||
\fI0\fR
|
||||
success
|
||||
.TP
|
||||
\fI1\fR
|
||||
can't update password file
|
||||
.TP
|
||||
\fI2\fR
|
||||
invalid command syntax
|
||||
.TP
|
||||
\fI3\fR
|
||||
invalid argument to option
|
||||
.TP
|
||||
\fI4\fR
|
||||
uid already in use (and no \-o)
|
||||
.TP
|
||||
\fI6\fR
|
||||
specified group doesn't exist
|
||||
.TP
|
||||
\fI9\fR
|
||||
username already in use
|
||||
.TP
|
||||
\fI10\fR
|
||||
can't update group file
|
||||
.TP
|
||||
\fI12\fR
|
||||
can't create home directory
|
||||
.TP
|
||||
\fI13\fR
|
||||
can't create mail spool
|
||||
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
\fBchfn\fR(1), \fBchsh\fR(1), \fBpasswd\fR(1), \fBcrypt\fR(3), \fBgroupadd\fR(8), \fBgroupdel\fR(8), \fBgroupmod\fR(8), \fBuserdel\fR(8), \fBusermod\fR(8)
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='useradd.8'>
|
||||
<!-- $Id: useradd.8.xml,v 1.6 2005/04/27 18:20:35 kloczek Exp $ -->
|
||||
<!-- $Id: useradd.8.xml,v 1.8 2005/06/16 18:58:43 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>useradd</refentrytitle>
|
||||
<manvolnum>8</manvolnum>
|
||||
@@ -127,7 +127,7 @@
|
||||
</term>
|
||||
<listitem>
|
||||
<para>The group name or number of the user's initial login group.
|
||||
The group name must exist. A group number must refer to an
|
||||
The group name must exist. A group number must refer to an
|
||||
already existing group. The default group number is 1 or
|
||||
whatever is specified in
|
||||
<filename>/etc/default/useradd</filename>.
|
||||
@@ -343,44 +343,56 @@
|
||||
|
||||
<refsect1 id='exit_values'>
|
||||
<title>EXIT VALUES</title>
|
||||
<variablelist remap='TP'>
|
||||
<varlistentry>
|
||||
<term>
|
||||
The <command>useadd</coamand> command exits with the following
|
||||
values:
|
||||
</term>
|
||||
<listitem>
|
||||
<!-- .br -->
|
||||
<para>
|
||||
<literal>0</literal> - success
|
||||
<!-- .br -->
|
||||
<literal>1</literal> - can't update password file
|
||||
<!-- .br -->
|
||||
<literal>2</literal> - invalid command syntax
|
||||
<!-- .br -->
|
||||
<literal>3</literal> - invalid argument to option
|
||||
<!-- .br -->
|
||||
<literal>4</literal> - uid already in use (and no -o)
|
||||
<!-- .br -->
|
||||
<literal>6</literal> - specified group doesn't exist
|
||||
<!-- .br -->
|
||||
<literal>9</literal> - username already in use
|
||||
<!-- .br -->
|
||||
<literal>10</literal> - can't update group file
|
||||
<!-- .br -->
|
||||
<literal>12</literal> - can't create home directory
|
||||
<!-- .br -->
|
||||
<literal>13</literal> - can't create mail spool
|
||||
</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
<para>
|
||||
The <command>useadd</command> command exits with the following values:
|
||||
<variablelist>
|
||||
<varlistentry>
|
||||
<term><replaceable>0</replaceable></term>
|
||||
<listitem>success</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>1</replaceable></term>
|
||||
<listitem>can't update password file</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>2</replaceable></term>
|
||||
<listitem>invalid command syntax</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>3</replaceable></term>
|
||||
<listitem>invalid argument to option</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>4</replaceable></term>
|
||||
<listitem>uid already in use (and no -o)</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>6</replaceable></term>
|
||||
<listitem>specified group doesn't exist</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>9</replaceable></term>
|
||||
<listitem>username already in use</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>10</replaceable></term>
|
||||
<listitem>can't update group file</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>12</replaceable></term>
|
||||
<listitem>can't create home directory</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>13</replaceable></term>
|
||||
<listitem>can't create mail spool</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
</para>
|
||||
</refsect1>
|
||||
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>chfn</refentrytitle><manvolnum>1</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
173
man/userdel.8
173
man/userdel.8
@@ -1,82 +1,97 @@
|
||||
.\"$Id: userdel.8,v 1.14 2005/04/12 17:55:55 kloczek Exp $
|
||||
.\" Copyright 1991 - 1994, Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH USERDEL 8
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "USERDEL" 8 "" "" ""
|
||||
.SH NAME
|
||||
userdel \- Delete a user account and related files
|
||||
.SH SYNOPSIS
|
||||
.B userdel
|
||||
[\fB\-r\fR]
|
||||
.I login
|
||||
.SH DESCRIPTION
|
||||
The \fBuserdel\fR command modifies the system account files, deleting all
|
||||
entries that refer to \fIlogin\fR. The named user must exist.
|
||||
.SH OPTIONS
|
||||
.SH "SYNOPSIS"
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 8
|
||||
\fBuserdel\fR [\-r] \fIlogin\fR
|
||||
.ad
|
||||
.hy
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
The \fBuserdel\fR command modifies the system account files, deleting all entries that refer to \fIlogin\fR\&. The named user must exist\&.
|
||||
|
||||
.SH "OPTIONS"
|
||||
|
||||
.PP
|
||||
The options which apply to the \fBuserdel\fR command are:
|
||||
.IP \fB\-r\fR
|
||||
Files in the user's home directory will be removed along with the home
|
||||
directory itself and the user's mail spool. Files located in other file
|
||||
systems will have to be searched for and deleted manually.
|
||||
.SH FILES
|
||||
\fI/etc/passwd\fR \- user account information
|
||||
.br
|
||||
\fI/etc/shadow\fR \- secure user account information
|
||||
.br
|
||||
\fI/etc/group\fR \- group account information
|
||||
.SH EXIT VALUES
|
||||
.TP 2
|
||||
The \fBuserdel\fR command exits with the following values:
|
||||
.br
|
||||
\fB0\fR \- success
|
||||
.br
|
||||
\fB1\fR \- can't update password file
|
||||
.br
|
||||
\fB2\fR \- invalid command syntax
|
||||
.br
|
||||
\fB6\fR \- specified user doesn't exist
|
||||
.br
|
||||
\fB8\fR \- user currently logged in
|
||||
.br
|
||||
\fB10\fR \- can't update group file
|
||||
.br
|
||||
\fB12\fR \- can't remove home directory
|
||||
.SH CAVEATS
|
||||
\fBuserdel\fR will not allow you to remove an account if the user is
|
||||
currently logged in. You must kill any running processes which belong to an
|
||||
account that you are deleting. You may not remove any NIS attributes on an
|
||||
NIS client. This must be performed on the NIS server.
|
||||
.SH SEE ALSO
|
||||
.BR chfn (1),
|
||||
.BR chsh (1),
|
||||
.BR passwd (1),
|
||||
.BR groupadd (8),
|
||||
.BR groupdel (8),
|
||||
.BR groupmod (8),
|
||||
.BR useradd (8),
|
||||
.BR usermod (8)
|
||||
.SH AUTHOR
|
||||
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||
|
||||
.TP
|
||||
\fB\-r\fR
|
||||
Files in the user's home directory will be removed along with the home directory itself and the user's mail spool\&. Files located in other file systems will have to be searched for and deleted manually\&.
|
||||
|
||||
.SH "FILES"
|
||||
|
||||
.TP
|
||||
\fI/etc/group\fR
|
||||
group account information
|
||||
.TP
|
||||
\fI/etc/passwd\fR
|
||||
user account information
|
||||
.TP
|
||||
\fI/etc/shadow\fR
|
||||
secure user account information
|
||||
.SH "EXIT VALUES"
|
||||
|
||||
.PP
|
||||
The \fBuserdel\fR command exits with the following values:
|
||||
|
||||
.TP
|
||||
\fI0\fR
|
||||
success
|
||||
.TP
|
||||
\fI1\fR
|
||||
can't update password file
|
||||
.TP
|
||||
\fI2\fR
|
||||
invalid command syntax
|
||||
.TP
|
||||
\fI6\fR
|
||||
specified user doesn't exist
|
||||
.TP
|
||||
\fI8\fR
|
||||
user currently logged in
|
||||
.TP
|
||||
\fI10\fR
|
||||
can't update group file
|
||||
.TP
|
||||
\fI12\fR
|
||||
can't remove home directory
|
||||
|
||||
.SH "CAVEATS"
|
||||
|
||||
.PP
|
||||
\fBuserdel\fR will not allow you to remove an account if the user is currently logged in\&. You must kill any running processes which belong to an account that you are deleting\&. You may not remove any NIS attributes on an NIS client\&. This must be performed on the NIS server\&.
|
||||
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
\fBchfn\fR(1), \fBchsh\fR(1), \fBpasswd\fR(1), \fBgroupadd\fR(8), \fBgroupdel\fR(8), \fBgroupmod\fR(8), \fBuseradd\fR(8), \fBusermod\fR(8)
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='userdel.8'>
|
||||
<!-- $Id: userdel.8.xml,v 1.5 2005/04/27 16:44:12 kloczek Exp $ -->
|
||||
<!-- $Id: userdel.8.xml,v 1.7 2005/06/16 18:58:43 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>USERDEL</refentrytitle>
|
||||
<manvolnum>8</manvolnum>
|
||||
@@ -71,38 +71,44 @@
|
||||
|
||||
<refsect1 id='exit_values'>
|
||||
<title>EXIT VALUES</title>
|
||||
<variablelist remap='TP'>
|
||||
<varlistentry>
|
||||
<term>
|
||||
The <command>userdel</command> command exits with the following
|
||||
values:
|
||||
</term>
|
||||
<listitem>
|
||||
<!-- .br -->
|
||||
<para>
|
||||
<literal>0</literal> - success
|
||||
<!-- .br -->
|
||||
<literal>1</literal> - can't update password file
|
||||
<!-- .br -->
|
||||
<literal>2</literal> - invalid command syntax
|
||||
<!-- .br -->
|
||||
<literal>6</literal> - specified user doesn't exist
|
||||
<!-- .br -->
|
||||
<literal>8</literal> - user currently logged in
|
||||
<!-- .br -->
|
||||
<literal>10</literal> - can't update group file
|
||||
<!-- .br -->
|
||||
<literal>12</literal> - can't remove home directory
|
||||
</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
<para>
|
||||
The <command>userdel</command> command exits with the following values:
|
||||
<variablelist>
|
||||
<varlistentry>
|
||||
<term><replaceable>0</replaceable></term>
|
||||
<listitem>success</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>1</replaceable></term>
|
||||
<listitem>can't update password file</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>2</replaceable></term>
|
||||
<listitem>invalid command syntax</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>6</replaceable></term>
|
||||
<listitem>specified user doesn't exist</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>8</replaceable></term>
|
||||
<listitem>user currently logged in</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>10</replaceable></term>
|
||||
<listitem>can't update group file</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><replaceable>12</replaceable></term>
|
||||
<listitem>can't remove home directory</listitem>
|
||||
</varlistentry>
|
||||
</variablelist>
|
||||
</para>
|
||||
</refsect1>
|
||||
|
||||
<refsect1 id='caveats'>
|
||||
<title>CAVEATS</title>
|
||||
<para>
|
||||
<command>userdel</command> will not allow you to remove an account if
|
||||
<para><command>userdel</command> will not allow you to remove an account if
|
||||
the user is currently logged in. You must kill any running processes
|
||||
which belong to an account that you are deleting. You may not remove
|
||||
any NIS attributes on an NIS client. This must be performed on the NIS
|
||||
@@ -112,8 +118,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>chfn</refentrytitle><manvolnum>1</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
232
man/usermod.8
232
man/usermod.8
@@ -1,120 +1,118 @@
|
||||
.\" $Id: usermod.8,v 1.24 2005/04/18 17:57:03 kloczek Exp $
|
||||
.\" Copyright 1991 - 1994, Julianne Frances Haugh
|
||||
.\" All rights reserved.
|
||||
.\"
|
||||
.\" Redistribution and use in source and binary forms, with or without
|
||||
.\" modification, are permitted provided that the following conditions
|
||||
.\" are met:
|
||||
.\" 1. Redistributions of source code must retain the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer.
|
||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||
.\" notice, this list of conditions and the following disclaimer in the
|
||||
.\" documentation and/or other materials provided with the distribution.
|
||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||
.\" may be used to endorse or promote products derived from this software
|
||||
.\" without specific prior written permission.
|
||||
.\"
|
||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
.\" SUCH DAMAGE.
|
||||
.TH USERMOD 8
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "USERMOD" 8 "" "" ""
|
||||
.SH NAME
|
||||
usermod \- Modify a user account
|
||||
.SH SYNOPSIS
|
||||
.TP 8
|
||||
\fBusermod\fR [\fB\-c\fR \fIcomment\fR] [\fB\-d\fR \fIhome_dir\fR [\fB\-m\fR]] [\fB\-e\fR \fIexpire_date\fR]
|
||||
[\fB\-f\fR \fIinactive_time\fR] [\fB\-g\fR \fIinitial_group\fR]
|
||||
.br
|
||||
[\fB\-G\fR \fIgroup1\fR[\fI,group2,...,\fR[\fIgroupN\fR]\fR]]
|
||||
.br
|
||||
[\fB\-l\fR \fIlogin_name\fR] [\fB\-p\fR \fIpasswd\fR] [\fB\-s\fR \fIshell\fR] [\fB\-u\fR \fIuid\fR [\fB\-o\fR]]
|
||||
.br
|
||||
[\fB\-L\fR|\fB\-U\fR] \fIlogin\fR
|
||||
.SH DESCRIPTION
|
||||
The \fBusermod\fR command modifies the system account files to reflect the
|
||||
changes that are specified on the command line.
|
||||
.SH OPTIONS
|
||||
.SH "SYNOPSIS"
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 8
|
||||
\fBusermod\fR [\-c\ \fIcomment\fR] [\-d\ \fIhome_dir\fR\ [\-m]] [\-e\ \fIexpire_date\fR] [\-f\ \fIinactive_days\fR] [\-g\ \fIinitial_group\fR] [\-G\ \fIgroup1\fR\ [\fI,group2,\fR...\ \fI,\fR\ [\fIgroupN\fR]]] [\-l\ \fIlogin_name\fR] [\-p\ \fIpasswd\fR] [\-s\ \fIshell\fR] [\-u\ \fIuid\fR\ [\-o]] [\fB\-L\fR | \fB\-U\fR] \fIlogin\fR
|
||||
.ad
|
||||
.hy
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
The \fBusermod\fR command modifies the system account files to reflect the changes that are specified on the command line\&.
|
||||
|
||||
.SH "OPTIONS"
|
||||
|
||||
.PP
|
||||
The options which apply to the \fBusermod\fR command are:
|
||||
.IP "\fB\-c\fR \fIcomment\fR"
|
||||
The new value of the user's password file comment field. It is normally
|
||||
modified using the \fBchfn\fR(1) utility.
|
||||
.IP "\fB\-d\fR \fIhome_dir\fR"
|
||||
The user's new login directory. If the \fB\-m\fR option is given the contents
|
||||
of the current home directory will be moved to the new home directory, which
|
||||
is created if it does not already exist.
|
||||
.IP "\fB\-e\fR \fIexpire_date\fR"
|
||||
The date on which the user account will be disabled. The date is specified
|
||||
in the format \fIYYYY\-MM\-DD\fR.
|
||||
.IP "\fB\-f\fR \fIinactive_days\fR"
|
||||
The number of days after a password expires until the account is permanently
|
||||
disabled. A value of 0 disables the account as soon as the password has
|
||||
expired, and a value of \-1 disables the feature. The default value is \-1.
|
||||
.IP "\fB\-g\fR \fIinitial_group\fR"
|
||||
The group name or number of the user's new initial login group. The group
|
||||
name must exist. A group number must refer to an already existing group.
|
||||
The default group number is 1.
|
||||
.IP "\fB\-G\fR \fIgroup1\fR[\fI,group2,...,\fR[\fIgroupN\fR]\fR]]"
|
||||
A list of supplementary groups which the user is also a member of. Each
|
||||
group is separated from the next by a comma, with no intervening whitespace.
|
||||
The groups are subject to the same restrictions as the group given with the
|
||||
\fB\-g\fR option. If the user is currently a member of a group which is not
|
||||
listed, the user will be removed from the group.
|
||||
.IP "\fB\-l\fR \fIlogin_name\fR"
|
||||
The name of the user will be changed from \fIlogin\fR to \fIlogin_name\fR.
|
||||
Nothing else is changed. In particular, the user's home directory name
|
||||
should probably be changed to reflect the new login name.
|
||||
.IP "\fB\-L\fR"
|
||||
Lock a user's password. This puts a '!' in front of the encrypted password,
|
||||
effectively disabling the password. You can't use this option with \fI\-p\fR
|
||||
or \fI\-U\fR.
|
||||
.IP "\fB\-o\fR"
|
||||
When used with the \fI-u\fR option, this option allows to change the user ID
|
||||
to a non-unique value.
|
||||
.IP "\fB\-p\fR \fIpasswd\fR"
|
||||
The encrypted password, as returned by \fBcrypt\fR(3).
|
||||
.IP "\fB\-s\fR \fIshell\fR"
|
||||
The name of the user's new login shell. Setting this field to blank causes
|
||||
the system to select the default login shell.
|
||||
.IP "\fB\-u\fR \fIuid\fR"
|
||||
The numerical value of the user's ID. This value must be unique, unless the
|
||||
\fI\-o\fR option is used. The value must be non\-negative. Values between 0
|
||||
and 99 are typically reserved for system accounts. Any files which the user
|
||||
owns and which are located in the directory tree rooted at the user's home
|
||||
directory will have the file user ID changed automatically. Files outside of
|
||||
the user's home directory must be altered manually.
|
||||
.IP "\fB\-U\fR"
|
||||
Unlock a user's password. This removes the '!' in front of the encrypted
|
||||
password. You can't use this option with \fI\-p\fR or \fI\-L\fR.
|
||||
.SH CAVEATS
|
||||
\fBusermod\fR will not allow you to change the name of a user who is
|
||||
logged in. You must make certain that the named user is not executing any
|
||||
processes when this command is being executed if the user's numerical user
|
||||
ID is being changed. You must change the owner of any crontab files
|
||||
manually. You must change the owner of any at jobs manually. You must make
|
||||
any changes involving NIS on the NIS server.
|
||||
.SH FILES
|
||||
\fI/etc/passwd\fR \- user account information
|
||||
.br
|
||||
\fI/etc/shadow\fR \- secure user account information
|
||||
.br
|
||||
\fI/etc/group\fR \- group account information
|
||||
.SH SEE ALSO
|
||||
.BR chfn (1),
|
||||
.BR chsh (1),
|
||||
.BR passwd (1),
|
||||
.BR crypt (3),
|
||||
.BR groupadd (8),
|
||||
.BR groupdel (8),
|
||||
.BR groupmod (8),
|
||||
.BR useradd (8),
|
||||
.BR userdel (8)
|
||||
.SH AUTHOR
|
||||
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||
|
||||
.TP
|
||||
\fB\-c\fR \fIcomment\fR
|
||||
The new value of the user's password file comment field\&. It is normally modified using the \fBchfn\fR(1)utility\&.
|
||||
|
||||
.TP
|
||||
\fB\-d\fR \fIhome_dir\fR
|
||||
The user's new login directory\&. If the \fB\-m\fR option is given the contents of the current home directory will be moved to the new home directory, which is created if it does not already exist\&.
|
||||
|
||||
.TP
|
||||
\fB\-e\fR \fIexpire_date\fR
|
||||
The date on which the user account will be disabled\&. The date is specified in the format \fIYYYY\-MM\-DD \fR\&.
|
||||
|
||||
.TP
|
||||
\fB\-f\fR \fIinactive_days\fR
|
||||
The number of days after a password expires until the account is permanently disabled\&. A value of 0 disables the account as soon as the password has expired, and a value of \-1 disables the feature\&. The default value is \-1\&.
|
||||
|
||||
.TP
|
||||
\fB\-g\fR \fIinitial_group\fR
|
||||
The group name or number of the user's new initial login group\&. The group name must exist\&. A group number must refer to an already existing group\&. The default group number is 1\&.
|
||||
|
||||
.TP
|
||||
\fB\-G\fR \fIgroup1\fR[\fI ,group2,\&.\&.\&., \fR [\fIgroupN\fR]]]
|
||||
A list of supplementary groups which the user is also a member of\&. Each group is separated from the next by a comma, with no intervening whitespace\&. The groups are subject to the same restrictions as the group given with the \fB\-g\fR option\&. If the user is currently a member of a group which is not listed, the user will be removed from the group\&.
|
||||
|
||||
.TP
|
||||
\fB\-l\fR \fIlogin_name\fR
|
||||
The name of the user will be changed from \fIlogin \fR to \fIlogin_name\fR\&. Nothing else is changed\&. In particular, the user's home directory name should probably be changed to reflect the new login name\&.
|
||||
|
||||
.TP
|
||||
\fB\-L\fR
|
||||
Lock a user's password\&. This puts a '!' in front of the encrypted password, effectively disabling the password\&. You can't use this option with \fB\-p\fR or \fB\-U\fR\&.
|
||||
|
||||
.TP
|
||||
\fB\-o\fR
|
||||
When used with the \fB\-u\fR option, this option allows to change the user ID to a non\-unique value\&.
|
||||
|
||||
.TP
|
||||
\fB\-p\fR \fIpasswd\fR
|
||||
The encrypted password, as returned by \fBcrypt\fR(3)\&.
|
||||
|
||||
.TP
|
||||
\fB\-s\fR \fIshell\fR
|
||||
The name of the user's new login shell\&. Setting this field to blank causes the system to select the default login shell\&.
|
||||
|
||||
.TP
|
||||
\fB\-u\fR \fIuid\fR
|
||||
The numerical value of the user's ID\&. This value must be unique, unless the \fB\-o\fR option is used\&. The value must be non\-negative\&. Values between 0 and 99 are typically reserved for system accounts\&. Any files which the user owns and which are located in the directory tree rooted at the user's home directory will have the file user ID changed automatically\&. Files outside of the user's home directory must be altered manually\&.
|
||||
|
||||
.TP
|
||||
\fB\-U\fR
|
||||
Unlock a user's password\&. This removes the '!' in front of the encrypted password\&. You can't use this option with \fB\-p\fR or \fB\-L\fR\&.
|
||||
|
||||
.SH "CAVEATS"
|
||||
|
||||
.PP
|
||||
\fBusermod\fR will not allow you to change the name of a user who is logged in\&. You must make certain that the named user is not executing any processes when this command is being executed if the user's numerical user ID is being changed\&. You must change the owner of any crontab files manually\&. You must change the owner of any at jobs manually\&. You must make any changes involving NIS on the NIS server\&.
|
||||
|
||||
.SH "FILES"
|
||||
|
||||
.TP
|
||||
\fI/etc/passwd\fR
|
||||
user account information
|
||||
.TP
|
||||
\fI/etc/shadow\fR
|
||||
secure user account information
|
||||
.TP
|
||||
\fI/etc/group\fR
|
||||
group account information
|
||||
.SH "SEE ALSO"
|
||||
|
||||
.PP
|
||||
\fBchfn\fR(1), \fBchsh\fR(1), \fBpasswd\fR(1), \fBcrypt\fR(3), \fBgroupadd\fR(8), \fBgroupdel\fR(8), \fBgroupmod\fR(8), \fBuseradd\fR(8), \fBuserdel\fR(8)\&.
|
||||
|
||||
.SH "AUTHOR"
|
||||
|
||||
.PP
|
||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='usermod.8'>
|
||||
<!-- $Id: usermod.8.xml,v 1.5 2005/04/28 13:57:45 kloczek Exp $ -->
|
||||
<!-- $Id: usermod.8.xml,v 1.9 2005/06/16 16:01:21 kloczek Exp $ -->
|
||||
<refmeta>
|
||||
<refentrytitle>usermod</refentrytitle>
|
||||
<manvolnum>8</manvolnum>
|
||||
@@ -21,9 +21,8 @@
|
||||
<arg choice='opt'>-m </arg>
|
||||
</arg>
|
||||
<arg choice='opt'>-e <replaceable>expire_date</replaceable></arg>
|
||||
<arg choice='opt'>-f <replaceable>inactive_time</replaceable></arg>
|
||||
<arg choice='opt'>-f <replaceable>inactive_days</replaceable></arg>
|
||||
<arg choice='opt'>-g <replaceable>initial_group</replaceable></arg>
|
||||
<sbr/>
|
||||
<arg choice='opt'>
|
||||
<arg choice='plain'>-G <replaceable>group1</replaceable></arg>
|
||||
<arg choice='opt'>
|
||||
@@ -32,7 +31,6 @@
|
||||
<arg choice='opt'><replaceable>groupN</replaceable></arg>
|
||||
</arg>
|
||||
</arg>
|
||||
<sbr/>
|
||||
<arg choice='opt'>-l <replaceable>login_name</replaceable></arg>
|
||||
<arg choice='opt'>-p <replaceable>passwd</replaceable></arg>
|
||||
<arg choice='opt'>-s <replaceable>shell</replaceable></arg>
|
||||
@@ -40,9 +38,9 @@
|
||||
<arg choice='plain'>-u <replaceable>uid</replaceable></arg>
|
||||
<arg choice='opt'>-o </arg>
|
||||
</arg>
|
||||
<sbr/>
|
||||
<group choice='opt'>
|
||||
<arg choice='plain'>-L </arg><arg choice='plain'>-U </arg>
|
||||
<arg choice='plain'>-L </arg>
|
||||
<arg choice='plain'>-U </arg>
|
||||
</group>
|
||||
<arg choice='plain'><replaceable>login</replaceable></arg>
|
||||
</cmdsynopsis>
|
||||
@@ -93,7 +91,7 @@
|
||||
<option>-e</option> <replaceable>expire_date</replaceable>
|
||||
</term>
|
||||
<listitem>
|
||||
<para>The date on which the user account will be disabled. The
|
||||
<para>The date on which the user account will be disabled. The
|
||||
date is specified in the format <emphasis remap='I'>YYYY-MM-DD
|
||||
</emphasis>.
|
||||
</para>
|
||||
@@ -148,7 +146,7 @@
|
||||
<para>
|
||||
The name of the user will be changed from <emphasis
|
||||
remap='I'>login </emphasis> to <emphasis
|
||||
remap='I'>login_name</emphasis>. Nothing else is changed. In
|
||||
remap='I'>login_name</emphasis>. Nothing else is changed. In
|
||||
particular, the user's home directory name should probably be
|
||||
changed to reflect the new login name.
|
||||
</para>
|
||||
@@ -231,8 +229,7 @@
|
||||
|
||||
<refsect1 id='caveats'>
|
||||
<title>CAVEATS</title>
|
||||
<para>
|
||||
<command>usermod</command> will not allow you to change the name of a
|
||||
<para><command>usermod</command> will not allow you to change the name of a
|
||||
user who is logged in. You must make certain that the named user is
|
||||
not executing any processes when this command is being executed if the
|
||||
user's numerical user ID is being changed. You must change the owner
|
||||
@@ -262,8 +259,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>chfn</refentrytitle><manvolnum>1</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
62
man/vipw.8
62
man/vipw.8
@@ -1,20 +1,46 @@
|
||||
.\"$Id: vipw.8,v 1.10 2005/04/27 08:29:36 kloczek Exp $
|
||||
.TH VIPW 8 "26 Sep 1997"
|
||||
.SH NAME
|
||||
vipw, vigr \- edit the password, group, shadow\-password, or shadow\-group file.
|
||||
.SH SYNOPSIS
|
||||
\fBvipw\fR [\fB\-s\fR]
|
||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
||||
.de Sh \" Subsection
|
||||
.br
|
||||
\fBvigr\fR [\fB\-s\fR]
|
||||
.SH DESCRIPTION
|
||||
\fBvipw\fR and \fBvigr\fR will edit the files \fI/etc/passwd\fR and
|
||||
\fI/etc/group\fR, respectively. With the \fB\-s\fR flag, they will edit the
|
||||
shadow versions of those files, \fI/etc/shadow\fR and \fI/etc/gshadow\fR,
|
||||
respectively. The programs will set the appropriate locks to prevent file
|
||||
corruption. When looking for an editor, the programs will first try the
|
||||
environment variable \fB$VISUAL\fR, then the environment variable
|
||||
\fB$EDITOR\fR, and finally the default editor, \fBvi\fR(1).
|
||||
.if t .Sp
|
||||
.ne 5
|
||||
.PP
|
||||
\fB\\$1\fR
|
||||
.PP
|
||||
..
|
||||
.de Sp \" Vertical space (when we can't use .PP)
|
||||
.if t .sp .5v
|
||||
.if n .sp
|
||||
..
|
||||
.de Ip \" List item
|
||||
.br
|
||||
.ie \\n(.$>=3 .ne \\$3
|
||||
.el .ne 3
|
||||
.IP "\\$1" \\$2
|
||||
..
|
||||
.TH "VIPW" 8 "26 Sep 1997" "" ""
|
||||
.SH NAME
|
||||
vipw, vigr \- edit the password, group, shadow-password, or shadow-group file.
|
||||
.SH "SYNOPSIS"
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 5
|
||||
\fBvipw\fR [\-s]
|
||||
.ad
|
||||
.hy
|
||||
.ad l
|
||||
.hy 0
|
||||
.HP 5
|
||||
\fBvigr\fR [\-s]
|
||||
.ad
|
||||
.hy
|
||||
|
||||
.SH "DESCRIPTION"
|
||||
|
||||
.PP
|
||||
\fBvipw\fR and \fBvigr\fR will edit the files \fI/etc/passwd\fR and \fI/etc/group\fR, respectively\&. With the \fB\-s\fR flag, they will edit the shadow versions of those files, \fI/etc/shadow\fR and \fI/etc/gshadow\fR, respectively\&. The programs will set the appropriate locks to prevent file corruption\&. When looking for an editor, the programs will first try the environment variable \fB$VISUAL\fR, then the environment variable \fI$EDITOR\fR, and finally the default editor, \fBvi\fR(1)\&.
|
||||
|
||||
.SH "SEE ALSO"
|
||||
.BR group (5),
|
||||
.BR passwd (5),
|
||||
.BR shadow (5)
|
||||
|
||||
.PP
|
||||
\fBgroup\fR(5), \fBpasswd\fR(5), \fBshadow\fR(5)
|
||||
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||
<refentry id='vipw.8'>
|
||||
<!-- $Id: vipw.8.xml,v 1.6 2005/04/28 13:54:06 kloczek Exp $ -->
|
||||
<!-- $Id: vipw.8.xml,v 1.7 2005/06/15 12:39:27 kloczek Exp $ -->
|
||||
<refentryinfo>
|
||||
<date>26 Sep 1997</date>
|
||||
</refentryinfo>
|
||||
@@ -30,8 +30,7 @@
|
||||
|
||||
<refsect1 id='description'>
|
||||
<title>DESCRIPTION</title>
|
||||
<para>
|
||||
<command>vipw</command> and <command>vigr</command> will edit the
|
||||
<para><command>vipw</command> and <command>vigr</command> will edit the
|
||||
files <filename>/etc/passwd</filename> and
|
||||
<filename>/etc/group</filename>, respectively. With the
|
||||
<option>-s</option> flag, they will edit the shadow versions of those
|
||||
@@ -48,8 +47,7 @@
|
||||
|
||||
<refsect1 id='see_also'>
|
||||
<title>SEE ALSO</title>
|
||||
<para>
|
||||
<citerefentry>
|
||||
<para><citerefentry>
|
||||
<refentrytitle>group</refentrytitle><manvolnum>5</manvolnum>
|
||||
</citerefentry>,
|
||||
<citerefentry>
|
||||
|
||||
@@ -38,11 +38,7 @@ host_triplet = @host@
|
||||
subdir = man/zh_CN
|
||||
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
|
||||
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
|
||||
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
|
||||
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
|
||||
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
|
||||
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
|
||||
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
|
||||
am__aclocal_m4_deps = $(top_srcdir)/configure.in
|
||||
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
|
||||
$(ACLOCAL_M4)
|
||||
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
|
||||
@@ -200,9 +196,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
|
||||
exit 1;; \
|
||||
esac; \
|
||||
done; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/zh_CN/Makefile'; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/zh_CN/Makefile'; \
|
||||
cd $(top_srcdir) && \
|
||||
$(AUTOMAKE) --foreign man/zh_CN/Makefile
|
||||
$(AUTOMAKE) --gnu man/zh_CN/Makefile
|
||||
.PRECIOUS: Makefile
|
||||
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
|
||||
@case '$?' in \
|
||||
|
||||
@@ -38,11 +38,7 @@ host_triplet = @host@
|
||||
subdir = man/zh_TW
|
||||
DIST_COMMON = $(srcdir)/Makefile.am $(srcdir)/Makefile.in
|
||||
ACLOCAL_M4 = $(top_srcdir)/aclocal.m4
|
||||
am__aclocal_m4_deps = $(top_srcdir)/m4/gettext.m4 \
|
||||
$(top_srcdir)/m4/iconv.m4 $(top_srcdir)/m4/lib-ld.m4 \
|
||||
$(top_srcdir)/m4/lib-link.m4 $(top_srcdir)/m4/lib-prefix.m4 \
|
||||
$(top_srcdir)/m4/nls.m4 $(top_srcdir)/m4/po.m4 \
|
||||
$(top_srcdir)/m4/progtest.m4 $(top_srcdir)/configure.in
|
||||
am__aclocal_m4_deps = $(top_srcdir)/configure.in
|
||||
am__configure_deps = $(am__aclocal_m4_deps) $(CONFIGURE_DEPENDENCIES) \
|
||||
$(ACLOCAL_M4)
|
||||
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
|
||||
@@ -199,9 +195,9 @@ $(srcdir)/Makefile.in: @MAINTAINER_MODE_TRUE@ $(srcdir)/Makefile.am $(am__confi
|
||||
exit 1;; \
|
||||
esac; \
|
||||
done; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --foreign man/zh_TW/Makefile'; \
|
||||
echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu man/zh_TW/Makefile'; \
|
||||
cd $(top_srcdir) && \
|
||||
$(AUTOMAKE) --foreign man/zh_TW/Makefile
|
||||
$(AUTOMAKE) --gnu man/zh_TW/Makefile
|
||||
.PRECIOUS: Makefile
|
||||
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
|
||||
@case '$?' in \
|
||||
|
||||
Reference in New Issue
Block a user