[svn-upgrade] Integrating new upstream version, shadow (4.0.12)
This commit is contained in:
parent
1de90a599c
commit
e89f3546f2
58
NEWS
58
NEWS
@ -1,10 +1,64 @@
|
|||||||
$Id: NEWS,v 1.215 2005/07/20 20:27:21 kloczek Exp $
|
$Id: NEWS,v 1.249 2005/08/21 12:42:51 kloczek Exp $
|
||||||
|
|
||||||
|
shadow-4.0.11.1 -> shadow-4.0.12 22-08-2005
|
||||||
|
|
||||||
|
*** general:
|
||||||
|
- newgrp, login: remove using login.defs::CLOSE_SESSIONS variable and allways
|
||||||
|
close PAM session,
|
||||||
|
- fixed configure.in: realy enable shadow group support by default (pointed by
|
||||||
|
Greg Schafer <gschafer@zip.com.au> and Peter Vrabec <pvrabec@redhat.com>),
|
||||||
|
- login.defs: removed handle QMAIL_DIR variable,
|
||||||
|
- login: allow regular user to login on read-only root file system (not only for root)
|
||||||
|
Patch by Nicolas François <nicolas.francois@centraliens.net>
|
||||||
|
Fix for http://bugs.debian.org/52069
|
||||||
|
- gpasswd, grpck, grpconv, grpuconv: added flushing group nscd cache,
|
||||||
|
- pwck, pwconv: added flushing passwd nscd cache,
|
||||||
|
- usermod: fixed handle -p option (patch by Peter Vrabec <pvrabec@redhat.com>),
|
||||||
|
- chage: use -1 as value for disable password inactivity, expiration date and
|
||||||
|
checking an password validation.
|
||||||
|
Based on patch by Peter Vrabec <pvrabec@redhat.com> which fixes:
|
||||||
|
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=109499
|
||||||
|
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=137498
|
||||||
|
and on 427_chage_expiry_0 Debian patch (fix for http://bugs.debian.org/78961)
|
||||||
|
- useradd: do not copy files from skel directory if home directory exist and write
|
||||||
|
warning message about not copying skel files
|
||||||
|
Patch by Peter Vrabec <pvrabec@redhat.com> which fixes:
|
||||||
|
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=143150
|
||||||
|
https://bugzilla.redhat.com/beta/show_bug.cgi?id=158574
|
||||||
|
https://bugzilla.redhat.com/beta/show_bug.cgi?id=80242
|
||||||
|
- su: ignore SIGINT while authenticating. A ^C could defeat the waiting
|
||||||
|
period and permit brute-force attacks (fixed http://bugs.debian.org/288827),
|
||||||
|
- uClibc fixes (by Martin Schlemmer <azarah@nosferatu.za.org>):
|
||||||
|
added require ngettext (added [need-ngettext] to AM_GNU_GETTEXT() parameters)
|
||||||
|
and stub prototype for ngettext() in lib/prototypes.h (neccessary if shadow
|
||||||
|
compiled with disabled NLS support)
|
||||||
|
- groupadd: rewrited for use getopt_long(),
|
||||||
|
- groupadd, groupdel, groupmod, userdel: do OPENLOG() before pam_start(),
|
||||||
|
- groupadd: fixed double OPENLOG(),
|
||||||
|
- removed lib/{grpack,gspack,pwpack,sppack}.c and prototypes from lib/prototypes.h
|
||||||
|
(outdated),
|
||||||
|
- newusers: added flushing passwd and group nscd caches,
|
||||||
|
- passwd, pwunconv, userdel, vipw: remove flushing shadow nscd cache (nscd do not caches
|
||||||
|
shadow map),
|
||||||
|
- pwck: now pwck OPENLOG with correct name ("pwck" instead "pwsk")
|
||||||
|
(fix by Alexander Gattin <arg@online.com.ua>),
|
||||||
|
- pwck, grpck: replace all puts() with printf() - it fixes problems with extra blank
|
||||||
|
lines printed in some messages
|
||||||
|
(fix by Alexander Gattin <arg@online.com.ua>),
|
||||||
|
- passwd: use separated message "Password set to expire." instead "Password changed."
|
||||||
|
on "passwd -e" (fix by Christian Perrier <bubulle@debian.org),
|
||||||
|
- updated translations: cs, de, fi, fr, nl, pl, pt, ru, sk.
|
||||||
|
*** documentation:
|
||||||
|
- usermod(8): give the correct range for system users (0-999 instead of 0-99),
|
||||||
|
(http://bugs.debian.org/286258)
|
||||||
|
- chage(8): better description -1 value passwd in -E, -I and -M options,
|
||||||
|
- regenerate all roff man pages using DocBook XSL Stylesheets 1.69.0.
|
||||||
|
|
||||||
shadow-4.0.11 -> shadow-4.0.11.1 21-07-2005
|
shadow-4.0.11 -> shadow-4.0.11.1 21-07-2005
|
||||||
|
|
||||||
*** general:
|
*** general:
|
||||||
- fixed configure.in: now is possible build shadow with enabled/disabled shadow group
|
- fixed configure.in: now is possible build shadow with enabled/disabled shadow group
|
||||||
support (thanks for report sympotoms of the bug to Greg Schafer <gschafer@zip.com.au>),
|
support (thanks for report symptoms of the bug to Greg Schafer <gschafer@zip.com.au>),
|
||||||
- updated translations: sv.
|
- updated translations: sv.
|
||||||
|
|
||||||
shadow-4.0.10 -> shadow-4.0.11 18-07-2005
|
shadow-4.0.10 -> shadow-4.0.11 18-07-2005
|
||||||
|
44
configure
vendored
44
configure
vendored
@ -1815,7 +1815,7 @@ fi
|
|||||||
|
|
||||||
# Define the identity of the package.
|
# Define the identity of the package.
|
||||||
PACKAGE=shadow
|
PACKAGE=shadow
|
||||||
VERSION=4.0.11.1
|
VERSION=4.0.12
|
||||||
|
|
||||||
|
|
||||||
cat >>confdefs.h <<_ACEOF
|
cat >>confdefs.h <<_ACEOF
|
||||||
@ -23203,7 +23203,7 @@ echo "$as_me: error: bad value ${enableval} for --enable-shadowgrp" >&2;}
|
|||||||
{ (exit 1); exit 1; }; } ;;
|
{ (exit 1); exit 1; }; } ;;
|
||||||
esac
|
esac
|
||||||
else
|
else
|
||||||
enable_shadowgrp="no"
|
enable_shadowgrp="yes"
|
||||||
|
|
||||||
fi;
|
fi;
|
||||||
|
|
||||||
@ -25505,7 +25505,7 @@ echo "${ECHO_T}$USE_NLS" >&6
|
|||||||
|
|
||||||
echo "$as_me:$LINENO: checking for GNU gettext in libc" >&5
|
echo "$as_me:$LINENO: checking for GNU gettext in libc" >&5
|
||||||
echo $ECHO_N "checking for GNU gettext in libc... $ECHO_C" >&6
|
echo $ECHO_N "checking for GNU gettext in libc... $ECHO_C" >&6
|
||||||
if test "${gt_cv_func_gnugettext1_libc+set}" = set; then
|
if test "${gt_cv_func_gnugettext2_libc+set}" = set; then
|
||||||
echo $ECHO_N "(cached) $ECHO_C" >&6
|
echo $ECHO_N "(cached) $ECHO_C" >&6
|
||||||
else
|
else
|
||||||
cat >conftest.$ac_ext <<_ACEOF
|
cat >conftest.$ac_ext <<_ACEOF
|
||||||
@ -25521,7 +25521,7 @@ int
|
|||||||
main ()
|
main ()
|
||||||
{
|
{
|
||||||
bindtextdomain ("", "");
|
bindtextdomain ("", "");
|
||||||
return (int) gettext ("") + _nl_msg_cat_cntr + *_nl_domain_bindings
|
return (int) gettext ("") + (int) ngettext ("", "", 0) + _nl_msg_cat_cntr + *_nl_domain_bindings
|
||||||
;
|
;
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
@ -25548,20 +25548,20 @@ if { (eval echo "$as_me:$LINENO: \"$ac_link\"") >&5
|
|||||||
ac_status=$?
|
ac_status=$?
|
||||||
echo "$as_me:$LINENO: \$? = $ac_status" >&5
|
echo "$as_me:$LINENO: \$? = $ac_status" >&5
|
||||||
(exit $ac_status); }; }; then
|
(exit $ac_status); }; }; then
|
||||||
gt_cv_func_gnugettext1_libc=yes
|
gt_cv_func_gnugettext2_libc=yes
|
||||||
else
|
else
|
||||||
echo "$as_me: failed program was:" >&5
|
echo "$as_me: failed program was:" >&5
|
||||||
sed 's/^/| /' conftest.$ac_ext >&5
|
sed 's/^/| /' conftest.$ac_ext >&5
|
||||||
|
|
||||||
gt_cv_func_gnugettext1_libc=no
|
gt_cv_func_gnugettext2_libc=no
|
||||||
fi
|
fi
|
||||||
rm -f conftest.err conftest.$ac_objext \
|
rm -f conftest.err conftest.$ac_objext \
|
||||||
conftest$ac_exeext conftest.$ac_ext
|
conftest$ac_exeext conftest.$ac_ext
|
||||||
fi
|
fi
|
||||||
echo "$as_me:$LINENO: result: $gt_cv_func_gnugettext1_libc" >&5
|
echo "$as_me:$LINENO: result: $gt_cv_func_gnugettext2_libc" >&5
|
||||||
echo "${ECHO_T}$gt_cv_func_gnugettext1_libc" >&6
|
echo "${ECHO_T}$gt_cv_func_gnugettext2_libc" >&6
|
||||||
|
|
||||||
if test "$gt_cv_func_gnugettext1_libc" != "yes"; then
|
if test "$gt_cv_func_gnugettext2_libc" != "yes"; then
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -26107,7 +26107,7 @@ fi;
|
|||||||
|
|
||||||
echo "$as_me:$LINENO: checking for GNU gettext in libintl" >&5
|
echo "$as_me:$LINENO: checking for GNU gettext in libintl" >&5
|
||||||
echo $ECHO_N "checking for GNU gettext in libintl... $ECHO_C" >&6
|
echo $ECHO_N "checking for GNU gettext in libintl... $ECHO_C" >&6
|
||||||
if test "${gt_cv_func_gnugettext1_libintl+set}" = set; then
|
if test "${gt_cv_func_gnugettext2_libintl+set}" = set; then
|
||||||
echo $ECHO_N "(cached) $ECHO_C" >&6
|
echo $ECHO_N "(cached) $ECHO_C" >&6
|
||||||
else
|
else
|
||||||
gt_save_CPPFLAGS="$CPPFLAGS"
|
gt_save_CPPFLAGS="$CPPFLAGS"
|
||||||
@ -26131,7 +26131,7 @@ int
|
|||||||
main ()
|
main ()
|
||||||
{
|
{
|
||||||
bindtextdomain ("", "");
|
bindtextdomain ("", "");
|
||||||
return (int) gettext ("") + _nl_msg_cat_cntr + *_nl_expand_alias ("")
|
return (int) gettext ("") + (int) ngettext ("", "", 0) + _nl_msg_cat_cntr + *_nl_expand_alias ("")
|
||||||
;
|
;
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
@ -26158,16 +26158,16 @@ if { (eval echo "$as_me:$LINENO: \"$ac_link\"") >&5
|
|||||||
ac_status=$?
|
ac_status=$?
|
||||||
echo "$as_me:$LINENO: \$? = $ac_status" >&5
|
echo "$as_me:$LINENO: \$? = $ac_status" >&5
|
||||||
(exit $ac_status); }; }; then
|
(exit $ac_status); }; }; then
|
||||||
gt_cv_func_gnugettext1_libintl=yes
|
gt_cv_func_gnugettext2_libintl=yes
|
||||||
else
|
else
|
||||||
echo "$as_me: failed program was:" >&5
|
echo "$as_me: failed program was:" >&5
|
||||||
sed 's/^/| /' conftest.$ac_ext >&5
|
sed 's/^/| /' conftest.$ac_ext >&5
|
||||||
|
|
||||||
gt_cv_func_gnugettext1_libintl=no
|
gt_cv_func_gnugettext2_libintl=no
|
||||||
fi
|
fi
|
||||||
rm -f conftest.err conftest.$ac_objext \
|
rm -f conftest.err conftest.$ac_objext \
|
||||||
conftest$ac_exeext conftest.$ac_ext
|
conftest$ac_exeext conftest.$ac_ext
|
||||||
if test "$gt_cv_func_gnugettext1_libintl" != yes && test -n "$LIBICONV"; then
|
if test "$gt_cv_func_gnugettext2_libintl" != yes && test -n "$LIBICONV"; then
|
||||||
LIBS="$LIBS $LIBICONV"
|
LIBS="$LIBS $LIBICONV"
|
||||||
cat >conftest.$ac_ext <<_ACEOF
|
cat >conftest.$ac_ext <<_ACEOF
|
||||||
/* confdefs.h. */
|
/* confdefs.h. */
|
||||||
@ -26186,7 +26186,7 @@ int
|
|||||||
main ()
|
main ()
|
||||||
{
|
{
|
||||||
bindtextdomain ("", "");
|
bindtextdomain ("", "");
|
||||||
return (int) gettext ("") + _nl_msg_cat_cntr + *_nl_expand_alias ("")
|
return (int) gettext ("") + (int) ngettext ("", "", 0) + _nl_msg_cat_cntr + *_nl_expand_alias ("")
|
||||||
;
|
;
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
@ -26215,7 +26215,7 @@ if { (eval echo "$as_me:$LINENO: \"$ac_link\"") >&5
|
|||||||
(exit $ac_status); }; }; then
|
(exit $ac_status); }; }; then
|
||||||
LIBINTL="$LIBINTL $LIBICONV"
|
LIBINTL="$LIBINTL $LIBICONV"
|
||||||
LTLIBINTL="$LTLIBINTL $LTLIBICONV"
|
LTLIBINTL="$LTLIBINTL $LTLIBICONV"
|
||||||
gt_cv_func_gnugettext1_libintl=yes
|
gt_cv_func_gnugettext2_libintl=yes
|
||||||
|
|
||||||
else
|
else
|
||||||
echo "$as_me: failed program was:" >&5
|
echo "$as_me: failed program was:" >&5
|
||||||
@ -26228,12 +26228,12 @@ rm -f conftest.err conftest.$ac_objext \
|
|||||||
CPPFLAGS="$gt_save_CPPFLAGS"
|
CPPFLAGS="$gt_save_CPPFLAGS"
|
||||||
LIBS="$gt_save_LIBS"
|
LIBS="$gt_save_LIBS"
|
||||||
fi
|
fi
|
||||||
echo "$as_me:$LINENO: result: $gt_cv_func_gnugettext1_libintl" >&5
|
echo "$as_me:$LINENO: result: $gt_cv_func_gnugettext2_libintl" >&5
|
||||||
echo "${ECHO_T}$gt_cv_func_gnugettext1_libintl" >&6
|
echo "${ECHO_T}$gt_cv_func_gnugettext2_libintl" >&6
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if test "$gt_cv_func_gnugettext1_libc" = "yes" \
|
if test "$gt_cv_func_gnugettext2_libc" = "yes" \
|
||||||
|| { test "$gt_cv_func_gnugettext1_libintl" = "yes" \
|
|| { test "$gt_cv_func_gnugettext2_libintl" = "yes" \
|
||||||
&& test "$PACKAGE" != gettext-runtime \
|
&& test "$PACKAGE" != gettext-runtime \
|
||||||
&& test "$PACKAGE" != gettext-tools; }; then
|
&& test "$PACKAGE" != gettext-tools; }; then
|
||||||
gt_use_preinstalled_gnugettext=yes
|
gt_use_preinstalled_gnugettext=yes
|
||||||
@ -26273,7 +26273,7 @@ echo "${ECHO_T}$USE_NLS" >&6
|
|||||||
echo "$as_me:$LINENO: checking where the gettext function comes from" >&5
|
echo "$as_me:$LINENO: checking where the gettext function comes from" >&5
|
||||||
echo $ECHO_N "checking where the gettext function comes from... $ECHO_C" >&6
|
echo $ECHO_N "checking where the gettext function comes from... $ECHO_C" >&6
|
||||||
if test "$gt_use_preinstalled_gnugettext" = "yes"; then
|
if test "$gt_use_preinstalled_gnugettext" = "yes"; then
|
||||||
if test "$gt_cv_func_gnugettext1_libintl" = "yes"; then
|
if test "$gt_cv_func_gnugettext2_libintl" = "yes"; then
|
||||||
gt_source="external libintl"
|
gt_source="external libintl"
|
||||||
else
|
else
|
||||||
gt_source="libc"
|
gt_source="libc"
|
||||||
@ -26288,7 +26288,7 @@ echo "${ECHO_T}$gt_source" >&6
|
|||||||
if test "$USE_NLS" = "yes"; then
|
if test "$USE_NLS" = "yes"; then
|
||||||
|
|
||||||
if test "$gt_use_preinstalled_gnugettext" = "yes"; then
|
if test "$gt_use_preinstalled_gnugettext" = "yes"; then
|
||||||
if test "$gt_cv_func_gnugettext1_libintl" = "yes"; then
|
if test "$gt_cv_func_gnugettext2_libintl" = "yes"; then
|
||||||
echo "$as_me:$LINENO: checking how to link with libintl" >&5
|
echo "$as_me:$LINENO: checking how to link with libintl" >&5
|
||||||
echo $ECHO_N "checking how to link with libintl... $ECHO_C" >&6
|
echo $ECHO_N "checking how to link with libintl... $ECHO_C" >&6
|
||||||
echo "$as_me:$LINENO: result: $LIBINTL" >&5
|
echo "$as_me:$LINENO: result: $LIBINTL" >&5
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
dnl Process this file with autoconf to produce a configure script.
|
dnl Process this file with autoconf to produce a configure script.
|
||||||
AC_INIT
|
AC_INIT
|
||||||
AM_INIT_AUTOMAKE(shadow, 4.0.11.1)
|
AM_INIT_AUTOMAKE(shadow, 4.0.12)
|
||||||
AC_CONFIG_HEADERS([config.h])
|
AC_CONFIG_HEADERS([config.h])
|
||||||
|
|
||||||
dnl Some hacks...
|
dnl Some hacks...
|
||||||
@ -208,7 +208,7 @@ AC_ARG_ENABLE(shadowgrp,
|
|||||||
no) enable_shadowgrp="no" ;;
|
no) enable_shadowgrp="no" ;;
|
||||||
*) AC_MSG_ERROR(bad value ${enableval} for --enable-shadowgrp) ;;
|
*) AC_MSG_ERROR(bad value ${enableval} for --enable-shadowgrp) ;;
|
||||||
esac],
|
esac],
|
||||||
[enable_shadowgrp="no"]
|
[enable_shadowgrp="yes"]
|
||||||
)
|
)
|
||||||
|
|
||||||
AC_ARG_WITH(libcrack, [ --with-libcrack try to use libcrack (default if found)])
|
AC_ARG_WITH(libcrack, [ --with-libcrack try to use libcrack (default if found)])
|
||||||
@ -280,7 +280,7 @@ if test "$with_libskey" = "yes"; then
|
|||||||
fi
|
fi
|
||||||
|
|
||||||
AM_GNU_GETTEXT_VERSION(0.12.1)
|
AM_GNU_GETTEXT_VERSION(0.12.1)
|
||||||
AM_GNU_GETTEXT([external])
|
AM_GNU_GETTEXT([external], [need-ngettext])
|
||||||
|
|
||||||
AC_CONFIG_FILES([
|
AC_CONFIG_FILES([
|
||||||
Makefile
|
Makefile
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
#
|
#
|
||||||
# /etc/login.defs - Configuration control definitions for the login package.
|
# /etc/login.defs - Configuration control definitions for the login package.
|
||||||
#
|
#
|
||||||
# $Id: login.defs.hurd,v 1.2 2000/08/26 18:27:10 marekm Exp $
|
# $Id: login.defs.hurd,v 1.3 2005/08/09 18:09:41 kloczek Exp $
|
||||||
#
|
#
|
||||||
# One item must be defined: MAIL_DIR.
|
# One item must be defined: MAIL_DIR.
|
||||||
# If unspecified, some arbitrary (and possibly incorrect) value will
|
# If unspecified, some arbitrary (and possibly incorrect) value will
|
||||||
@ -21,9 +21,7 @@ OBSCURE_CHECKS_ENAB yes
|
|||||||
# *REQUIRED*
|
# *REQUIRED*
|
||||||
# Directory where mailboxes reside, _or_ name of file, relative to the
|
# Directory where mailboxes reside, _or_ name of file, relative to the
|
||||||
# home directory. If you _do_ define both, MAIL_DIR takes precedence.
|
# home directory. If you _do_ define both, MAIL_DIR takes precedence.
|
||||||
# QMAIL_DIR is for Qmail
|
|
||||||
#
|
#
|
||||||
#QMAIL_DIR Maildir
|
|
||||||
MAIL_DIR /var/spool/mail
|
MAIL_DIR /var/spool/mail
|
||||||
#MAIL_FILE .mail
|
#MAIL_FILE .mail
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
#
|
#
|
||||||
# /etc/login.defs - Configuration control definitions for the login package.
|
# /etc/login.defs - Configuration control definitions for the login package.
|
||||||
#
|
#
|
||||||
# $Id: login.defs.linux,v 1.15 2005/03/07 10:09:06 kloczek Exp $
|
# $Id: login.defs.linux,v 1.16 2005/08/09 18:09:41 kloczek Exp $
|
||||||
#
|
#
|
||||||
# Three items must be defined: MAIL_DIR, ENV_SUPATH, and ENV_PATH.
|
# Three items must be defined: MAIL_DIR, ENV_SUPATH, and ENV_PATH.
|
||||||
# If unspecified, some arbitrary (and possibly incorrect) value will
|
# If unspecified, some arbitrary (and possibly incorrect) value will
|
||||||
@ -123,9 +123,7 @@ SU_NAME su
|
|||||||
# *REQUIRED*
|
# *REQUIRED*
|
||||||
# Directory where mailboxes reside, _or_ name of file, relative to the
|
# Directory where mailboxes reside, _or_ name of file, relative to the
|
||||||
# home directory. If you _do_ define both, MAIL_DIR takes precedence.
|
# home directory. If you _do_ define both, MAIL_DIR takes precedence.
|
||||||
# QMAIL_DIR is for Qmail
|
|
||||||
#
|
#
|
||||||
#QMAIL_DIR Maildir
|
|
||||||
MAIL_DIR /var/spool/mail
|
MAIL_DIR /var/spool/mail
|
||||||
#MAIL_FILE .mail
|
#MAIL_FILE .mail
|
||||||
|
|
||||||
|
@ -13,6 +13,7 @@ libshadow_la_SOURCES = \
|
|||||||
commonio.h \
|
commonio.h \
|
||||||
defines.h \
|
defines.h \
|
||||||
encrypt.c \
|
encrypt.c \
|
||||||
|
exitcodes.h \
|
||||||
faillog.h \
|
faillog.h \
|
||||||
fputsx.c \
|
fputsx.c \
|
||||||
getdef.c \
|
getdef.c \
|
||||||
@ -49,5 +50,4 @@ libshadow_la_SOURCES = \
|
|||||||
|
|
||||||
EXTRA_DIST = \
|
EXTRA_DIST = \
|
||||||
.indent.pro \
|
.indent.pro \
|
||||||
grpack.c gspack.c pwpack.c sppack.c \
|
|
||||||
gshadow_.h
|
gshadow_.h
|
||||||
|
@ -208,6 +208,7 @@ libshadow_la_SOURCES = \
|
|||||||
commonio.h \
|
commonio.h \
|
||||||
defines.h \
|
defines.h \
|
||||||
encrypt.c \
|
encrypt.c \
|
||||||
|
exitcodes.h \
|
||||||
faillog.h \
|
faillog.h \
|
||||||
fputsx.c \
|
fputsx.c \
|
||||||
getdef.c \
|
getdef.c \
|
||||||
@ -244,7 +245,6 @@ libshadow_la_SOURCES = \
|
|||||||
# sources for dbm support (not yet used)
|
# sources for dbm support (not yet used)
|
||||||
EXTRA_DIST = \
|
EXTRA_DIST = \
|
||||||
.indent.pro \
|
.indent.pro \
|
||||||
grpack.c gspack.c pwpack.c sppack.c \
|
|
||||||
gshadow_.h
|
gshadow_.h
|
||||||
|
|
||||||
all: all-am
|
all: all-am
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
/* $Id: defines.h,v 1.26 2005/05/25 18:20:22 kloczek Exp $ */
|
/* $Id: defines.h,v 1.27 2005/08/03 18:11:27 kloczek Exp $ */
|
||||||
/* some useful defines */
|
/* some useful defines */
|
||||||
|
|
||||||
#ifndef _DEFINES_H_
|
#ifndef _DEFINES_H_
|
||||||
@ -24,6 +24,8 @@
|
|||||||
# undef textdomain
|
# undef textdomain
|
||||||
# define textdomain(Domain) /* empty */
|
# define textdomain(Domain) /* empty */
|
||||||
# define _(Text) Text
|
# define _(Text) Text
|
||||||
|
# define ngettext(Msgid1, Msgid2, N) \
|
||||||
|
((N) == 1 ? (const char *) (Msgid1) : (const char *) (Msgid2))
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if STDC_HEADERS
|
#if STDC_HEADERS
|
||||||
|
9
lib/exitcodes.h
Normal file
9
lib/exitcodes.h
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
/* $Id: exitcodes.h,v 1.3 2005/07/27 10:10:31 kloczek Exp $ */
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Exit codes used by shadow programs
|
||||||
|
*/
|
||||||
|
#define E_SUCCESS 0 /* success */
|
||||||
|
#define E_NOPERM 1 /* permission denied */
|
||||||
|
#define E_USAGE 2 /* invalid command syntax */
|
||||||
|
#define E_BAD_ARG 3 /* invalid argument to option */
|
60
lib/getdef.c
60
lib/getdef.c
@ -30,7 +30,7 @@
|
|||||||
#include <config.h>
|
#include <config.h>
|
||||||
|
|
||||||
#include "rcsid.h"
|
#include "rcsid.h"
|
||||||
RCSID ("$Id: getdef.c,v 1.31 2005/07/12 18:54:39 kloczek Exp $")
|
RCSID ("$Id: getdef.c,v 1.35 2005/08/11 11:26:11 kloczek Exp $")
|
||||||
#include "prototypes.h"
|
#include "prototypes.h"
|
||||||
#include "defines.h"
|
#include "defines.h"
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
@ -48,22 +48,43 @@ struct itemdef {
|
|||||||
#define NUMDEFS (sizeof(def_table)/sizeof(def_table[0]))
|
#define NUMDEFS (sizeof(def_table)/sizeof(def_table[0]))
|
||||||
static struct itemdef def_table[] = {
|
static struct itemdef def_table[] = {
|
||||||
{"CHFN_RESTRICT", NULL},
|
{"CHFN_RESTRICT", NULL},
|
||||||
|
{"CONSOLE_GROUPS", NULL},
|
||||||
|
{"CONSOLE", NULL},
|
||||||
|
{"CREATE_HOME", NULL},
|
||||||
{"DEFAULT_HOME", NULL},
|
{"DEFAULT_HOME", NULL},
|
||||||
|
{"ENV_PATH", NULL},
|
||||||
|
{"ENV_SUPATH", NULL},
|
||||||
|
{"ERASECHAR", NULL},
|
||||||
{"FAIL_DELAY", NULL},
|
{"FAIL_DELAY", NULL},
|
||||||
|
{"FAKE_SHELL", NULL},
|
||||||
|
{"GETPASS_ASTERISKS", NULL},
|
||||||
|
{"GID_MAX", NULL},
|
||||||
|
{"GID_MIN", NULL},
|
||||||
|
{"HUSHLOGIN_FILE", NULL},
|
||||||
|
{"KILLCHAR", NULL},
|
||||||
|
{"LOGIN_RETRIES", NULL},
|
||||||
|
{"LOGIN_TIMEOUT", NULL},
|
||||||
|
{"LOG_OK_LOGINS", NULL},
|
||||||
|
{"LOG_UNKFAIL_ENAB", NULL},
|
||||||
|
{"MAIL_DIR", NULL},
|
||||||
{"PASS_MAX_DAYS", NULL},
|
{"PASS_MAX_DAYS", NULL},
|
||||||
{"PASS_MIN_DAYS", NULL},
|
{"PASS_MIN_DAYS", NULL},
|
||||||
{"PASS_WARN_AGE", NULL},
|
{"PASS_WARN_AGE", NULL},
|
||||||
|
{"SULOG_FILE", NULL},
|
||||||
|
{"SU_NAME", NULL},
|
||||||
|
{"TTYGROUP", NULL},
|
||||||
|
{"TTYPERM", NULL},
|
||||||
|
{"TTYTYPE_FILE", NULL},
|
||||||
|
{"UID_MAX", NULL},
|
||||||
|
{"UID_MIN", NULL},
|
||||||
|
{"UMASK", NULL},
|
||||||
{"USERDEL_CMD", NULL},
|
{"USERDEL_CMD", NULL},
|
||||||
#ifdef USE_PAM
|
{"USERGROUPS_ENAB", NULL},
|
||||||
{"CLOSE_SESSIONS", NULL},
|
#ifndef USE_PAM
|
||||||
#else
|
|
||||||
{"CHFN_AUTH", NULL},
|
{"CHFN_AUTH", NULL},
|
||||||
{"CHSH_AUTH", NULL},
|
{"CHSH_AUTH", NULL},
|
||||||
{"CRACKLIB_DICTPATH", NULL},
|
{"CRACKLIB_DICTPATH", NULL},
|
||||||
{"ENV_HZ", NULL},
|
{"ENV_HZ", NULL},
|
||||||
{"ENV_PATH", NULL},
|
|
||||||
{"ENV_ROOTPATH", NULL}, /* SuSE compatibility? */
|
|
||||||
{"ENV_SUPATH", NULL},
|
|
||||||
{"ENV_TZ", NULL},
|
{"ENV_TZ", NULL},
|
||||||
{"ENVIRON_FILE", NULL},
|
{"ENVIRON_FILE", NULL},
|
||||||
{"FAILLOG_ENAB", NULL},
|
{"FAILLOG_ENAB", NULL},
|
||||||
@ -83,38 +104,13 @@ static struct itemdef def_table[] = {
|
|||||||
{"PASS_MIN_LEN", NULL},
|
{"PASS_MIN_LEN", NULL},
|
||||||
{"PORTTIME_CHECKS_ENAB", NULL},
|
{"PORTTIME_CHECKS_ENAB", NULL},
|
||||||
{"SU_WHEEL_ONLY", NULL},
|
{"SU_WHEEL_ONLY", NULL},
|
||||||
{"QMAIL_DIR", NULL},
|
|
||||||
{"QUOTAS_ENAB", NULL},
|
{"QUOTAS_ENAB", NULL},
|
||||||
{"ULIMIT", NULL},
|
{"ULIMIT", NULL},
|
||||||
#endif
|
#endif
|
||||||
{"CONSOLE_GROUPS", NULL},
|
|
||||||
{"CONSOLE", NULL},
|
|
||||||
{"CREATE_HOME", NULL},
|
|
||||||
{"ERASECHAR", NULL},
|
|
||||||
{"FAKE_SHELL", NULL},
|
|
||||||
{"GETPASS_ASTERISKS", NULL},
|
|
||||||
{"GID_MAX", NULL},
|
|
||||||
{"GID_MIN", NULL},
|
|
||||||
{"HUSHLOGIN_FILE", NULL},
|
|
||||||
{"KILLCHAR", NULL},
|
|
||||||
{"LOGIN_RETRIES", NULL},
|
|
||||||
{"LOGIN_TIMEOUT", NULL},
|
|
||||||
{"LOG_OK_LOGINS", NULL},
|
|
||||||
{"LOG_UNKFAIL_ENAB", NULL},
|
|
||||||
{"MAIL_DIR", NULL},
|
|
||||||
{"SULOG_FILE", NULL},
|
|
||||||
{"SU_NAME", NULL},
|
|
||||||
#ifdef USE_SYSLOG
|
#ifdef USE_SYSLOG
|
||||||
{"SYSLOG_SG_ENAB", NULL},
|
{"SYSLOG_SG_ENAB", NULL},
|
||||||
{"SYSLOG_SU_ENAB", NULL},
|
{"SYSLOG_SU_ENAB", NULL},
|
||||||
#endif
|
#endif
|
||||||
{"TTYGROUP", NULL},
|
|
||||||
{"TTYPERM", NULL},
|
|
||||||
{"TTYTYPE_FILE", NULL},
|
|
||||||
{"UID_MAX", NULL},
|
|
||||||
{"UID_MIN", NULL},
|
|
||||||
{"UMASK", NULL},
|
|
||||||
{"USERGROUPS_ENAB", NULL},
|
|
||||||
{NULL, NULL}
|
{NULL, NULL}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
90
lib/grpack.c
90
lib/grpack.c
@ -1,90 +0,0 @@
|
|||||||
/*
|
|
||||||
* Copyright 1990, Julianne Frances Haugh
|
|
||||||
* All rights reserved.
|
|
||||||
*
|
|
||||||
* Redistribution and use in source and binary forms, with or without
|
|
||||||
* modification, are permitted provided that the following conditions
|
|
||||||
* are met:
|
|
||||||
* 1. Redistributions of source code must retain the above copyright
|
|
||||||
* notice, this list of conditions and the following disclaimer.
|
|
||||||
* 2. Redistributions in binary form must reproduce the above copyright
|
|
||||||
* notice, this list of conditions and the following disclaimer in the
|
|
||||||
* documentation and/or other materials provided with the distribution.
|
|
||||||
* 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
|
||||||
* may be used to endorse or promote products derived from this software
|
|
||||||
* without specific prior written permission.
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
|
||||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
* ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
|
||||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
||||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
||||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
||||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
||||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
||||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
||||||
* SUCH DAMAGE.
|
|
||||||
*/
|
|
||||||
|
|
||||||
#include <config.h>
|
|
||||||
|
|
||||||
#include "rcsid.h"
|
|
||||||
RCSID ("$Id: grpack.c,v 1.4 2005/03/31 05:14:49 kloczek Exp $")
|
|
||||||
#include <stdio.h>
|
|
||||||
#include <grp.h>
|
|
||||||
#include "defines.h"
|
|
||||||
int gr_pack (const struct group *group, char *buf)
|
|
||||||
{
|
|
||||||
char *cp;
|
|
||||||
int i;
|
|
||||||
|
|
||||||
cp = buf;
|
|
||||||
strcpy (cp, group->gr_name);
|
|
||||||
cp += strlen (cp) + 1;
|
|
||||||
|
|
||||||
strcpy (cp, group->gr_passwd);
|
|
||||||
cp += strlen (cp) + 1;
|
|
||||||
|
|
||||||
memcpy (cp, (const char *) &group->gr_gid, sizeof group->gr_gid);
|
|
||||||
cp += sizeof group->gr_gid;
|
|
||||||
|
|
||||||
for (i = 0; group->gr_mem[i]; i++) {
|
|
||||||
strcpy (cp, group->gr_mem[i]);
|
|
||||||
cp += strlen (cp) + 1;
|
|
||||||
}
|
|
||||||
*cp++ = '\0';
|
|
||||||
|
|
||||||
return cp - buf;
|
|
||||||
}
|
|
||||||
|
|
||||||
int gr_unpack (char *buf, int len, struct group *group)
|
|
||||||
{
|
|
||||||
char *org = buf;
|
|
||||||
int i;
|
|
||||||
|
|
||||||
group->gr_name = buf;
|
|
||||||
buf += strlen (buf) + 1;
|
|
||||||
if (buf - org > len)
|
|
||||||
return -1;
|
|
||||||
|
|
||||||
group->gr_passwd = buf;
|
|
||||||
buf += strlen (buf) + 1;
|
|
||||||
if (buf - org > len)
|
|
||||||
return -1;
|
|
||||||
|
|
||||||
memcpy ((char *) &group->gr_gid, (char *) buf, sizeof group->gr_gid);
|
|
||||||
buf += sizeof group->gr_gid;
|
|
||||||
if (buf - org > len)
|
|
||||||
return -1;
|
|
||||||
|
|
||||||
for (i = 0; *buf && i < 1024; i++) {
|
|
||||||
group->gr_mem[i] = buf;
|
|
||||||
buf += strlen (buf) + 1;
|
|
||||||
|
|
||||||
if (buf - org > len)
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
group->gr_mem[i] = (char *) 0;
|
|
||||||
return 0;
|
|
||||||
}
|
|
145
lib/gspack.c
145
lib/gspack.c
@ -1,145 +0,0 @@
|
|||||||
/*
|
|
||||||
* Copyright 1990 - 1994, Julianne Frances Haugh
|
|
||||||
* All rights reserved.
|
|
||||||
*
|
|
||||||
* Redistribution and use in source and binary forms, with or without
|
|
||||||
* modification, are permitted provided that the following conditions
|
|
||||||
* are met:
|
|
||||||
* 1. Redistributions of source code must retain the above copyright
|
|
||||||
* notice, this list of conditions and the following disclaimer.
|
|
||||||
* 2. Redistributions in binary form must reproduce the above copyright
|
|
||||||
* notice, this list of conditions and the following disclaimer in the
|
|
||||||
* documentation and/or other materials provided with the distribution.
|
|
||||||
* 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
|
||||||
* may be used to endorse or promote products derived from this software
|
|
||||||
* without specific prior written permission.
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
|
||||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
* ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
|
||||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
||||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
||||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
||||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
||||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
||||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
||||||
* SUCH DAMAGE.
|
|
||||||
*/
|
|
||||||
|
|
||||||
#include <config.h>
|
|
||||||
|
|
||||||
#ifdef SHADOWGRP /*{ */
|
|
||||||
|
|
||||||
#include "rcsid.h"
|
|
||||||
RCSID ("$Id: gspack.c,v 1.4 2005/03/31 05:14:49 kloczek Exp $")
|
|
||||||
#include <stdio.h>
|
|
||||||
#include "defines.h"
|
|
||||||
/*
|
|
||||||
* sgr_pack - convert a shadow group structure to a packed
|
|
||||||
* shadow group record
|
|
||||||
*
|
|
||||||
* sgr_pack takes the shadow group structure and packs
|
|
||||||
* the components in a record. this record will be
|
|
||||||
* unpacked later by sgr_unpack.
|
|
||||||
*/
|
|
||||||
int sgr_pack (const struct sgrp *sgrp, char *buf)
|
|
||||||
{
|
|
||||||
char *cp;
|
|
||||||
int i;
|
|
||||||
|
|
||||||
/*
|
|
||||||
* The name and password are both easy - append each string
|
|
||||||
* to the buffer. These are always the first two strings
|
|
||||||
* in a record.
|
|
||||||
*/
|
|
||||||
|
|
||||||
cp = buf;
|
|
||||||
strcpy (cp, sgrp->sg_name);
|
|
||||||
cp += strlen (cp) + 1;
|
|
||||||
|
|
||||||
strcpy (cp, sgrp->sg_passwd);
|
|
||||||
cp += strlen (cp) + 1;
|
|
||||||
|
|
||||||
/*
|
|
||||||
* The arrays of administrators and members are slightly
|
|
||||||
* harder. Each element is appended as a string, with a
|
|
||||||
* final '\0' appended to serve as a blank string. The
|
|
||||||
* number of elements is not known in advance, so the
|
|
||||||
* entire collection of administrators must be scanned to
|
|
||||||
* find the start of the members.
|
|
||||||
*/
|
|
||||||
|
|
||||||
for (i = 0; sgrp->sg_adm[i]; i++) {
|
|
||||||
strcpy (cp, sgrp->sg_adm[i]);
|
|
||||||
cp += strlen (cp) + 1;
|
|
||||||
}
|
|
||||||
*cp++ = '\0';
|
|
||||||
|
|
||||||
for (i = 0; sgrp->sg_mem[i]; i++) {
|
|
||||||
strcpy (cp, sgrp->sg_mem[i]);
|
|
||||||
cp += strlen (cp) + 1;
|
|
||||||
}
|
|
||||||
*cp++ = '\0';
|
|
||||||
|
|
||||||
return cp - buf;
|
|
||||||
}
|
|
||||||
|
|
||||||
/*
|
|
||||||
* sgr_unpack - convert a packed shadow group record to an
|
|
||||||
* unpacked record
|
|
||||||
*
|
|
||||||
* sgr_unpack converts a record which was packed by sgr_pack
|
|
||||||
* into the normal shadow group structure format.
|
|
||||||
*/
|
|
||||||
|
|
||||||
int sgr_unpack (char *buf, int len, struct sgrp *sgrp)
|
|
||||||
{
|
|
||||||
char *org = buf;
|
|
||||||
int i;
|
|
||||||
|
|
||||||
/*
|
|
||||||
* The name and password are both easy - they are the first
|
|
||||||
* two strings in the record.
|
|
||||||
*/
|
|
||||||
|
|
||||||
sgrp->sg_name = buf;
|
|
||||||
buf += strlen (buf) + 1;
|
|
||||||
if (buf - org > len)
|
|
||||||
return -1;
|
|
||||||
|
|
||||||
sgrp->sg_passwd = buf;
|
|
||||||
buf += strlen (buf) + 1;
|
|
||||||
if (buf - org > len)
|
|
||||||
return -1;
|
|
||||||
|
|
||||||
/*
|
|
||||||
* The administrators and members are slightly more difficult.
|
|
||||||
* The arrays are lists of strings. Each list is terminated
|
|
||||||
* by a string of length zero. This string is detected by
|
|
||||||
* looking for an initial character of '\0'.
|
|
||||||
*/
|
|
||||||
|
|
||||||
for (i = 0; *buf && i < 1024; i++) {
|
|
||||||
sgrp->sg_adm[i] = buf;
|
|
||||||
buf += strlen (buf) + 1;
|
|
||||||
|
|
||||||
if (buf - org > len)
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
sgrp->sg_adm[i] = (char *) 0;
|
|
||||||
if (!*buf)
|
|
||||||
buf++;
|
|
||||||
|
|
||||||
for (i = 0; *buf && i < 1024; i++) {
|
|
||||||
sgrp->sg_mem[i] = buf;
|
|
||||||
buf += strlen (buf) + 1;
|
|
||||||
|
|
||||||
if (buf - org > len)
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
sgrp->sg_mem[i] = (char *) 0;
|
|
||||||
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
#endif /*} */
|
|
@ -6,7 +6,7 @@
|
|||||||
* Juha Virtanen, <jiivee@hut.fi>; November 1995
|
* Juha Virtanen, <jiivee@hut.fi>; November 1995
|
||||||
*/
|
*/
|
||||||
/*
|
/*
|
||||||
* $Id: prototypes.h,v 1.19 2005/05/25 18:20:22 kloczek Exp $
|
* $Id: prototypes.h,v 1.22 2005/08/02 10:50:51 kloczek Exp $
|
||||||
*
|
*
|
||||||
* Added a macro to work around ancient (non-ANSI) compilers, just in case
|
* Added a macro to work around ancient (non-ANSI) compilers, just in case
|
||||||
* someone ever tries to compile this with SunOS cc... --marekm
|
* someone ever tries to compile this with SunOS cc... --marekm
|
||||||
@ -84,21 +84,6 @@ extern int gr_dbm_present (void);
|
|||||||
/* grent.c */
|
/* grent.c */
|
||||||
extern int putgrent (const struct group *, FILE *);
|
extern int putgrent (const struct group *, FILE *);
|
||||||
|
|
||||||
/* grpack.c */
|
|
||||||
extern int gr_pack (const struct group *, char *);
|
|
||||||
extern int gr_unpack (char *, int, struct group *);
|
|
||||||
|
|
||||||
#ifdef SHADOWGRP
|
|
||||||
/* gsdbm.c */
|
|
||||||
extern int sg_dbm_remove (const char *);
|
|
||||||
extern int sg_dbm_update (const struct sgrp *);
|
|
||||||
extern int sg_dbm_present (void);
|
|
||||||
|
|
||||||
/* gspack.c */
|
|
||||||
extern int sgr_pack (const struct sgrp *, char *);
|
|
||||||
extern int sgr_unpack (char *, int, struct sgrp *);
|
|
||||||
#endif
|
|
||||||
|
|
||||||
/* hushed.c */
|
/* hushed.c */
|
||||||
extern int hushed (const struct passwd *);
|
extern int hushed (const struct passwd *);
|
||||||
|
|
||||||
@ -142,15 +127,6 @@ extern void passwd_check (const char *, const char *, const char *);
|
|||||||
/* pwd_init.c */
|
/* pwd_init.c */
|
||||||
extern void pwd_init (void);
|
extern void pwd_init (void);
|
||||||
|
|
||||||
/* pwdbm.c */
|
|
||||||
extern int pw_dbm_remove (const struct passwd *);
|
|
||||||
extern int pw_dbm_update (const struct passwd *);
|
|
||||||
extern int pw_dbm_present (void);
|
|
||||||
|
|
||||||
/* pwpack.c */
|
|
||||||
extern int pw_pack (const struct passwd *, char *);
|
|
||||||
extern int pw_unpack (char *, int, struct passwd *);
|
|
||||||
|
|
||||||
/* rlogin.c */
|
/* rlogin.c */
|
||||||
extern int do_rlogin (const char *, char *, int, char *, int);
|
extern int do_rlogin (const char *, char *, int, char *, int);
|
||||||
|
|
||||||
@ -171,10 +147,6 @@ extern void setup_env (struct passwd *);
|
|||||||
/* shell.c */
|
/* shell.c */
|
||||||
extern void shell (const char *, const char *);
|
extern void shell (const char *, const char *);
|
||||||
|
|
||||||
/* sppack.c */
|
|
||||||
extern int spw_pack (const struct spwd *, char *);
|
|
||||||
extern int spw_unpack (char *, int, struct spwd *);
|
|
||||||
|
|
||||||
/* strtoday.c */
|
/* strtoday.c */
|
||||||
extern long strtoday (const char *);
|
extern long strtoday (const char *);
|
||||||
|
|
||||||
|
117
lib/pwpack.c
117
lib/pwpack.c
@ -1,117 +0,0 @@
|
|||||||
/*
|
|
||||||
* Copyright 1990 - 1994, Julianne Frances Haugh
|
|
||||||
* All rights reserved.
|
|
||||||
*
|
|
||||||
* Redistribution and use in source and binary forms, with or without
|
|
||||||
* modification, are permitted provided that the following conditions
|
|
||||||
* are met:
|
|
||||||
* 1. Redistributions of source code must retain the above copyright
|
|
||||||
* notice, this list of conditions and the following disclaimer.
|
|
||||||
* 2. Redistributions in binary form must reproduce the above copyright
|
|
||||||
* notice, this list of conditions and the following disclaimer in the
|
|
||||||
* documentation and/or other materials provided with the distribution.
|
|
||||||
* 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
|
||||||
* may be used to endorse or promote products derived from this software
|
|
||||||
* without specific prior written permission.
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
|
||||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
* ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
|
||||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
||||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
||||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
||||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
||||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
||||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
||||||
* SUCH DAMAGE.
|
|
||||||
*/
|
|
||||||
|
|
||||||
#include <config.h>
|
|
||||||
|
|
||||||
#include "rcsid.h"
|
|
||||||
RCSID ("$Id: pwpack.c,v 1.7 2005/03/31 05:14:49 kloczek Exp $")
|
|
||||||
#include <sys/types.h>
|
|
||||||
#include "defines.h"
|
|
||||||
#include <stdio.h>
|
|
||||||
#include <pwd.h>
|
|
||||||
/*
|
|
||||||
* pw_pack - convert a (struct pwd) to a packed record
|
|
||||||
* WARNING: buf must be large enough, no check for overrun!
|
|
||||||
*/
|
|
||||||
int pw_pack (const struct passwd *passwd, char *buf)
|
|
||||||
{
|
|
||||||
char *cp;
|
|
||||||
|
|
||||||
cp = buf;
|
|
||||||
strcpy (cp, passwd->pw_name);
|
|
||||||
cp += strlen (cp) + 1;
|
|
||||||
|
|
||||||
strcpy (cp, passwd->pw_passwd);
|
|
||||||
cp += strlen (cp) + 1;
|
|
||||||
|
|
||||||
memcpy (cp, (const char *) &passwd->pw_uid, sizeof passwd->pw_uid);
|
|
||||||
cp += sizeof passwd->pw_uid;
|
|
||||||
|
|
||||||
memcpy (cp, (const char *) &passwd->pw_gid, sizeof passwd->pw_gid);
|
|
||||||
cp += sizeof passwd->pw_gid;
|
|
||||||
|
|
||||||
strcpy (cp, passwd->pw_gecos);
|
|
||||||
cp += strlen (cp) + 1;
|
|
||||||
|
|
||||||
strcpy (cp, passwd->pw_dir);
|
|
||||||
cp += strlen (cp) + 1;
|
|
||||||
|
|
||||||
strcpy (cp, passwd->pw_shell);
|
|
||||||
cp += strlen (cp) + 1;
|
|
||||||
|
|
||||||
return cp - buf;
|
|
||||||
}
|
|
||||||
|
|
||||||
/*
|
|
||||||
* pw_unpack - convert a packed (struct pwd) record to a (struct pwd)
|
|
||||||
*/
|
|
||||||
|
|
||||||
int pw_unpack (char *buf, int len, struct passwd *passwd)
|
|
||||||
{
|
|
||||||
char *org = buf;
|
|
||||||
|
|
||||||
memzero (passwd, sizeof *passwd);
|
|
||||||
|
|
||||||
passwd->pw_name = buf;
|
|
||||||
buf += strlen (buf) + 1;
|
|
||||||
if (buf - org > len)
|
|
||||||
return -1;
|
|
||||||
|
|
||||||
passwd->pw_passwd = buf;
|
|
||||||
buf += strlen (buf) + 1;
|
|
||||||
if (buf - org > len)
|
|
||||||
return -1;
|
|
||||||
|
|
||||||
memcpy ((void *) &passwd->pw_uid, (void *) buf, sizeof passwd->pw_uid);
|
|
||||||
buf += sizeof passwd->pw_uid;
|
|
||||||
if (buf - org > len)
|
|
||||||
return -1;
|
|
||||||
|
|
||||||
memcpy ((void *) &passwd->pw_gid, (void *) buf, sizeof passwd->pw_gid);
|
|
||||||
buf += sizeof passwd->pw_gid;
|
|
||||||
if (buf - org > len)
|
|
||||||
return -1;
|
|
||||||
|
|
||||||
passwd->pw_gecos = buf;
|
|
||||||
buf += strlen (buf) + 1;
|
|
||||||
if (buf - org > len)
|
|
||||||
return -1;
|
|
||||||
|
|
||||||
passwd->pw_dir = buf;
|
|
||||||
buf += strlen (buf) + 1;
|
|
||||||
if (buf - org > len)
|
|
||||||
return -1;
|
|
||||||
|
|
||||||
passwd->pw_shell = buf;
|
|
||||||
buf += strlen (buf) + 1;
|
|
||||||
if (buf - org > len)
|
|
||||||
return -1;
|
|
||||||
|
|
||||||
return 0;
|
|
||||||
}
|
|
107
lib/sppack.c
107
lib/sppack.c
@ -1,107 +0,0 @@
|
|||||||
/*
|
|
||||||
* Copyright 1990 - 1994, Julianne Frances Haugh
|
|
||||||
* All rights reserved.
|
|
||||||
*
|
|
||||||
* Redistribution and use in source and binary forms, with or without
|
|
||||||
* modification, are permitted provided that the following conditions
|
|
||||||
* are met:
|
|
||||||
* 1. Redistributions of source code must retain the above copyright
|
|
||||||
* notice, this list of conditions and the following disclaimer.
|
|
||||||
* 2. Redistributions in binary form must reproduce the above copyright
|
|
||||||
* notice, this list of conditions and the following disclaimer in the
|
|
||||||
* documentation and/or other materials provided with the distribution.
|
|
||||||
* 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
|
||||||
* may be used to endorse or promote products derived from this software
|
|
||||||
* without specific prior written permission.
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
|
||||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
* ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
|
||||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
||||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
||||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
||||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
||||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
||||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
||||||
* SUCH DAMAGE.
|
|
||||||
*/
|
|
||||||
|
|
||||||
#include <config.h>
|
|
||||||
|
|
||||||
#include "rcsid.h"
|
|
||||||
RCSID ("$Id: sppack.c,v 1.5 2005/05/25 18:20:22 kloczek Exp $")
|
|
||||||
#include <stdio.h>
|
|
||||||
#include <sys/types.h>
|
|
||||||
#include "defines.h"
|
|
||||||
int spw_pack (const struct spwd *spwd, char *buf)
|
|
||||||
{
|
|
||||||
char *cp;
|
|
||||||
|
|
||||||
cp = buf;
|
|
||||||
strcpy (cp, spwd->sp_namp);
|
|
||||||
cp += strlen (cp) + 1;
|
|
||||||
|
|
||||||
strcpy (cp, spwd->sp_pwdp);
|
|
||||||
cp += strlen (cp) + 1;
|
|
||||||
|
|
||||||
memcpy (cp, &spwd->sp_min, sizeof spwd->sp_min);
|
|
||||||
cp += sizeof spwd->sp_min;
|
|
||||||
|
|
||||||
memcpy (cp, &spwd->sp_max, sizeof spwd->sp_max);
|
|
||||||
cp += sizeof spwd->sp_max;
|
|
||||||
|
|
||||||
memcpy (cp, &spwd->sp_lstchg, sizeof spwd->sp_lstchg);
|
|
||||||
cp += sizeof spwd->sp_lstchg;
|
|
||||||
|
|
||||||
memcpy (cp, &spwd->sp_warn, sizeof spwd->sp_warn);
|
|
||||||
cp += sizeof spwd->sp_warn;
|
|
||||||
|
|
||||||
memcpy (cp, &spwd->sp_inact, sizeof spwd->sp_inact);
|
|
||||||
cp += sizeof spwd->sp_inact;
|
|
||||||
|
|
||||||
memcpy (cp, &spwd->sp_expire, sizeof spwd->sp_expire);
|
|
||||||
cp += sizeof spwd->sp_expire;
|
|
||||||
|
|
||||||
memcpy (cp, &spwd->sp_flag, sizeof spwd->sp_flag);
|
|
||||||
cp += sizeof spwd->sp_flag;
|
|
||||||
|
|
||||||
return cp - buf;
|
|
||||||
}
|
|
||||||
|
|
||||||
int spw_unpack (char *buf, int len, struct spwd *spwd)
|
|
||||||
{
|
|
||||||
char *org = buf;
|
|
||||||
|
|
||||||
spwd->sp_namp = buf;
|
|
||||||
buf += strlen (buf) + 1;
|
|
||||||
|
|
||||||
spwd->sp_pwdp = buf;
|
|
||||||
buf += strlen (buf) + 1;
|
|
||||||
|
|
||||||
memcpy (&spwd->sp_min, buf, sizeof spwd->sp_min);
|
|
||||||
buf += sizeof spwd->sp_min;
|
|
||||||
|
|
||||||
memcpy (&spwd->sp_max, buf, sizeof spwd->sp_max);
|
|
||||||
buf += sizeof spwd->sp_max;
|
|
||||||
|
|
||||||
memcpy (&spwd->sp_lstchg, buf, sizeof spwd->sp_lstchg);
|
|
||||||
buf += sizeof spwd->sp_lstchg;
|
|
||||||
|
|
||||||
memcpy (&spwd->sp_warn, buf, sizeof spwd->sp_warn);
|
|
||||||
buf += sizeof spwd->sp_warn;
|
|
||||||
|
|
||||||
memcpy (&spwd->sp_inact, buf, sizeof spwd->sp_inact);
|
|
||||||
buf += sizeof spwd->sp_inact;
|
|
||||||
|
|
||||||
memcpy (&spwd->sp_expire, buf, sizeof spwd->sp_expire);
|
|
||||||
buf += sizeof spwd->sp_expire;
|
|
||||||
|
|
||||||
memcpy (&spwd->sp_flag, buf, sizeof spwd->sp_flag);
|
|
||||||
buf += sizeof spwd->sp_flag;
|
|
||||||
|
|
||||||
if (buf - org > len)
|
|
||||||
return -1;
|
|
||||||
|
|
||||||
return 0;
|
|
||||||
}
|
|
@ -30,7 +30,7 @@
|
|||||||
#include <config.h>
|
#include <config.h>
|
||||||
|
|
||||||
#include "rcsid.h"
|
#include "rcsid.h"
|
||||||
RCSID ("$Id: chowntty.c,v 1.11 2005/03/31 05:14:50 kloczek Exp $")
|
RCSID ("$Id: chowntty.c,v 1.12 2005/08/09 18:03:15 kloczek Exp $")
|
||||||
#include <sys/types.h>
|
#include <sys/types.h>
|
||||||
#include <sys/stat.h>
|
#include <sys/stat.h>
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
@ -110,7 +110,7 @@ void chown_tty (const char *tty, const struct passwd *info)
|
|||||||
info->pw_name));
|
info->pw_name));
|
||||||
closelog ();
|
closelog ();
|
||||||
|
|
||||||
if (!(err == EROFS && info->pw_uid == 0))
|
if (err != EROFS)
|
||||||
exit (1);
|
exit (1);
|
||||||
}
|
}
|
||||||
#ifdef __linux__
|
#ifdef __linux__
|
||||||
|
@ -34,7 +34,7 @@
|
|||||||
#include <config.h>
|
#include <config.h>
|
||||||
|
|
||||||
#include "rcsid.h"
|
#include "rcsid.h"
|
||||||
RCSID ("$Id: setupenv.c,v 1.17 2005/07/06 11:49:21 kloczek Exp $")
|
RCSID ("$Id: setupenv.c,v 1.18 2005/08/09 18:09:42 kloczek Exp $")
|
||||||
#include <sys/types.h>
|
#include <sys/types.h>
|
||||||
#include <sys/stat.h>
|
#include <sys/stat.h>
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
@ -260,12 +260,6 @@ void setup_env (struct passwd *info)
|
|||||||
addenv ("PATH", cp);
|
addenv ("PATH", cp);
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
|
||||||
* MAILDIR environment variable for Qmail
|
|
||||||
*/
|
|
||||||
if ((cp = getdef_str ("QMAIL_DIR")))
|
|
||||||
addenv_path ("MAILDIR", info->pw_dir, cp);
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Create the MAIL environmental variable and export it. login.defs
|
* Create the MAIL environmental variable and export it. login.defs
|
||||||
* knows the prefix.
|
* knows the prefix.
|
||||||
|
122
man/chage.1
122
man/chage.1
@ -1,84 +1,95 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "CHAGE" "1" "08/09/2005" "User Commands" "User Commands"
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "CHAGE" 1 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
chage \- change user password expiry information
|
chage \- change user password expiry information
|
||||||
.SH "SYNOPSIS"
|
.SH "SYNOPSIS"
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 6
|
.HP 6
|
||||||
\fBchage\fR [\fIoptions\fR] \fIuser\fR
|
\fBchage\fR [\fIoptions\fR] \fIuser\fR
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
|
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBchage\fR command changes the number of days between passwordchanges and the date of the last password change\&. This information is used by the system to determine when a user must change her password\&.
|
\fBchage\fR
|
||||||
|
command changes the number of days between password changes and the date of the last password change. This information is used by the system to determine when a user must change her password.
|
||||||
.SH "OPTIONS"
|
.SH "OPTIONS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The options which apply to the \fBchage\fR command are:
|
The options which apply to the
|
||||||
|
\fBchage\fR
|
||||||
|
command are:
|
||||||
.TP
|
.TP
|
||||||
\fB\-d\fR, \fB\-\-lastday\fR \fILAST_DAY\fR
|
\fB\-d\fR, \fB\-\-lastday\fR \fILAST_DAY\fR
|
||||||
Set the number of days since January 1st, 1970 when the password was last changed\&. The date may also be expressed in the format YYYY\-MM\-DD (or the format more commonly used in your area)\&.
|
Set the number of days since January 1st, 1970 when the password was last changed. The date may also be expressed in the format YYYY\-MM\-DD (or the format more commonly used in your area).
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-E\fR, \fB\-\-expiredate\fR \fIEXPIRE_DATE\fR
|
\fB\-E\fR, \fB\-\-expiredate\fR \fIEXPIRE_DATE\fR
|
||||||
Set the date on which the user's account will no longer be accessible\&. The \fIEXPIRE_DATE\fR option is the number of days since January 1, 1970 on which the accounted is locked\&. The date may also be expressed in the format YYYY\-MM\-DD (or the format more commonly used in your area)\&. A user whose account is locked must contact the system administrator before being able to use the system again\&. Passing the number \fI\-1\fR as the \fIEXPIRE_DATE\fR will remove an accounts expiration date\&.
|
Set the date on which the user's account will no longer be accessible. The
|
||||||
|
\fIEXPIRE_DATE\fR
|
||||||
|
option is the number of days since January 1, 1970 on which the accounted is locked. The date may also be expressed in the format YYYY\-MM\-DD (or the format more commonly used in your area). A user whose account is locked must contact the system administrator before being able to use the system again.
|
||||||
|
|
||||||
|
Passing the number
|
||||||
|
\fI\-1\fR
|
||||||
|
as the
|
||||||
|
\fIEXPIRE_DATE\fR
|
||||||
|
will remove an account expiration date.
|
||||||
.TP
|
.TP
|
||||||
\fB\-I\fR, \fB\-\-inactive\fR \fIINACTIVE\fR
|
\fB\-I\fR, \fB\-\-inactive\fR \fIINACTIVE\fR
|
||||||
Set the number of days of inactivity after a password has expired before the account is locked\&. The \fIINACTIVE\fR option is the number of days of inactivity\&. A value of 0 disables this feature\&. A user whose account is locked must contact the system administrator before being able to use the system again\&.
|
Set the number of days of inactivity after a password has expired before the account is locked. The
|
||||||
|
\fIINACTIVE\fR
|
||||||
|
option is the number of days of inactivity. A user whose account is locked must contact the system administrator before being able to use the system again.
|
||||||
|
|
||||||
|
Passing the number
|
||||||
|
\fI\-1\fR
|
||||||
|
as the
|
||||||
|
\fIINACTIVE\fR
|
||||||
|
will remove an accounts inactivity.
|
||||||
.TP
|
.TP
|
||||||
\fB\-l\fR, \fB\-\-list\fR
|
\fB\-l\fR, \fB\-\-list\fR
|
||||||
Show account aging information\&.
|
Show account aging information.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-m\fR, \fB\-\-mindays\fR \fIMIN_DAYS\fR
|
\fB\-m\fR, \fB\-\-mindays\fR \fIMIN_DAYS\fR
|
||||||
Set the minimum number of days between password changes\&. A value of zero for this field indicates that the user may change her password at any time\&.
|
Set the minimum number of days between password changes. A value of zero for this field indicates that the user may change her password at any time.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-M\fR, \fB\-\-maxdays\fR \fIMAX_DAYS\fR
|
\fB\-M\fR, \fB\-\-maxdays\fR \fIMAX_DAYS\fR
|
||||||
Set maximum number of days during which a password is valid\&. When \fIMAX_DAYS\fR plus \fILAST_DAY\fR is less than the current day, the user will be required to change her password before being able to use her account\&. This occurrence can be planned for in advance by use of the \fB\-W\fR option, which provides the user with advance warning\&.
|
Set maximum number of days during which a password is valid. When
|
||||||
|
\fIMAX_DAYS\fR
|
||||||
|
plus
|
||||||
|
\fILAST_DAY\fR
|
||||||
|
is less than the current day, the user will be required to change her password before being able to use her account. This occurence can be planned for in advance by use of the
|
||||||
|
\fB\-W\fR
|
||||||
|
option, which provides the user with advance warning.
|
||||||
|
|
||||||
|
Passing the number
|
||||||
|
\fI\-1\fR
|
||||||
|
as the
|
||||||
|
\fIMAX_DAYS\fR
|
||||||
|
will remove checking a password validation.
|
||||||
.TP
|
.TP
|
||||||
\fB\-W\fR, \fBwarndays\fR \fIWARN_DAYS\fR
|
\fB\-W\fR, \fBwarndays\fR \fIWARN_DAYS\fR
|
||||||
Set the number of days of warning before a password change is required\&. The \fIWARN_DAYS\fR option is the number of days prior to the password expiring that a user will be warned her password is about to expire\&.
|
Set the number of days of warning before a password change is required. The
|
||||||
|
\fIWARN_DAYS\fR
|
||||||
|
option is the number of days prior to the password expiring that a user will be warned her password is about to expire.
|
||||||
.PP
|
.PP
|
||||||
If none of the options are selected, \fBchage\fR operates in an interactive fashion, prompting the user with the current values for all of the fields\&. Enter the new value to change the field, or leave the line blank to use the current value\&. The current value is displayed between a pair of \fI[ ]\fR marks\&.
|
If none of the options are selected,
|
||||||
|
\fBchage\fR
|
||||||
|
operates in an interactive fashion, prompting the user with the current values for all of the fields. Enter the new value to change the field, or leave the line blank to use the current value. The current value is displayed between a pair of
|
||||||
|
\fI[ ]\fR
|
||||||
|
marks.
|
||||||
.SH "NOTE"
|
.SH "NOTE"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The \fBchage\fR program requires shadow password file to be available\&. Its functionality is not available when passwords are stored in the passwd file\&.
|
The
|
||||||
|
\fBchage\fR
|
||||||
|
program requires shadow password file to be available. Its functionality is not available when passwords are stored in the passwd file.
|
||||||
.PP
|
.PP
|
||||||
The \fBchage\fR command is restricted to the root user, except for the \fB\-l\fR option, which may be used by an unprivileged user to determine when her password or account is due to expire\&.
|
The
|
||||||
|
\fBchage\fR
|
||||||
|
command is restricted to the root user, except for the
|
||||||
|
\fB\-l\fR
|
||||||
|
option, which may be used by an unprivileged user to determine when her password or account is due to expire.
|
||||||
.SH "FILES"
|
.SH "FILES"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fI/etc/passwd\fR
|
\fI/etc/passwd\fR
|
||||||
user account information
|
user account information
|
||||||
@ -86,12 +97,9 @@ user account information
|
|||||||
\fI/etc/shadow\fR
|
\fI/etc/shadow\fR
|
||||||
secure user account information
|
secure user account information
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBpasswd\fR(5), \fBshadow\fR(5)\&.
|
\fBpasswd\fR(5),
|
||||||
|
\fBshadow\fR(5).
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Julianne Frances Haugh <jockgrrl@ix\&.netcom\&.com>
|
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||||
<refentry id='chage.1'>
|
<refentry id='chage.1'>
|
||||||
<!-- $Id: chage.1.xml,v 1.10 2005/06/15 12:39:27 kloczek Exp $ -->
|
<!-- $Id: chage.1.xml,v 1.15 2005/08/10 08:25:00 kloczek Exp $ -->
|
||||||
<refmeta>
|
<refmeta>
|
||||||
<refentrytitle>chage</refentrytitle>
|
<refentrytitle>chage</refentrytitle>
|
||||||
<manvolnum>1</manvolnum>
|
<manvolnum>1</manvolnum>
|
||||||
@ -60,10 +60,11 @@
|
|||||||
accounted is locked. The date may also be expressed in the
|
accounted is locked. The date may also be expressed in the
|
||||||
format YYYY-MM-DD (or the format more commonly used in your
|
format YYYY-MM-DD (or the format more commonly used in your
|
||||||
area). A user whose account is locked must contact the system
|
area). A user whose account is locked must contact the system
|
||||||
administrator before being able to use the system again. Passing
|
administrator before being able to use the system again.
|
||||||
the number <emphasis remap='I'>-1</emphasis> as the <emphasis
|
</para>
|
||||||
remap='I'>EXPIRE_DATE</emphasis> will remove an accounts
|
<para>
|
||||||
expiration date.
|
Passing the number <emphasis remap='I'>-1</emphasis> as the <emphasis
|
||||||
|
remap='I'>EXPIRE_DATE</emphasis> will remove an account expiration date.
|
||||||
</para>
|
</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -76,9 +77,12 @@
|
|||||||
Set the number of days of inactivity after a password has
|
Set the number of days of inactivity after a password has
|
||||||
expired before the account is locked. The <emphasis
|
expired before the account is locked. The <emphasis
|
||||||
remap='I'>INACTIVE</emphasis> option is the number of days of
|
remap='I'>INACTIVE</emphasis> option is the number of days of
|
||||||
inactivity. A value of 0 disables this feature. A user whose
|
inactivity. A user whose account is locked must contact the system
|
||||||
account is locked must contact the system administrator before
|
administrator before being able to use the system again.
|
||||||
being able to use the system again.
|
</para>
|
||||||
|
<para>
|
||||||
|
Passing the number <emphasis remap='I'>-1</emphasis> as the <emphasis
|
||||||
|
remap='I'>INACTIVE</emphasis> will remove an accounts inactivity.
|
||||||
</para>
|
</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
@ -114,10 +118,14 @@
|
|||||||
When <emphasis remap='I'>MAX_DAYS</emphasis> plus <emphasis
|
When <emphasis remap='I'>MAX_DAYS</emphasis> plus <emphasis
|
||||||
remap='I'>LAST_DAY</emphasis> is less than the current day, the
|
remap='I'>LAST_DAY</emphasis> is less than the current day, the
|
||||||
user will be required to change her password before being able
|
user will be required to change her password before being able
|
||||||
to use her account. This occurrence can be planned for in
|
to use her account. This occurence can be planned for in
|
||||||
advance by use of the <option>-W</option> option, which provides
|
advance by use of the <option>-W</option> option, which provides
|
||||||
the user with advance warning.
|
the user with advance warning.
|
||||||
</para>
|
</para>
|
||||||
|
<para>
|
||||||
|
Passing the number <emphasis remap='I'>-1</emphasis> as the <emphasis
|
||||||
|
remap='I'>MAX_DAYS</emphasis> will remove checking a password validation.
|
||||||
|
</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</varlistentry>
|
</varlistentry>
|
||||||
<varlistentry>
|
<varlistentry>
|
||||||
|
67
man/chfn.1
67
man/chfn.1
@ -1,59 +1,46 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "CHFN" "1" "08/10/2005" "User Commands" "User Commands"
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "CHFN" 1 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
chfn \- change real user name and information
|
chfn \- change real user name and information
|
||||||
.SH "SYNOPSIS"
|
.SH "SYNOPSIS"
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 5
|
.HP 5
|
||||||
\fBchfn\fR [\-f\ \fIfull_name\fR] [\-r\ \fIroom_no\fR] [\-w\ \fIwork_ph\fR] [\-h\ \fIhome_ph\fR] [\-o\ \fIother\fR] [\fIuser\fR]
|
\fBchfn\fR [\-f\ \fIfull_name\fR] [\-r\ \fIroom_no\fR] [\-w\ \fIwork_ph\fR] [\-h\ \fIhome_ph\fR] [\-o\ \fIother\fR] [\fIuser\fR]
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
|
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBchfn\fR changes user fullname, office number, office extension, and home phone number information for a user's account\&. This information is typically printed by \fBfinger\fR(1) and similar programs\&. A normal user may only change may only change the fields for her own account, subject to the restrictions in \fI/etc/login\&.defs\fR\&. (The default configuration is to prevent users from changing their fullname\&.) The super user may change any field for any account\&. Additionally, only the super user may use the \fB\-o\fR option to change the undefined portions of the GECOS field\&.
|
\fBchfn\fR
|
||||||
|
changes user fullname, office number, office extension, and home phone number information for a user's account. This information is typically printed by
|
||||||
|
\fBfinger\fR(1)
|
||||||
|
and similar programs. A normal user may only change the fields for her own account, subject to the restrictions in
|
||||||
|
\fI/etc/login.defs\fR. (The default configuration is to prevent users from changing their fullname.) The super user may change any field for any account. Additionally, only the super user may use the
|
||||||
|
\fB\-o\fR
|
||||||
|
option to change the undefined portions of the GECOS field.
|
||||||
.PP
|
.PP
|
||||||
The only restriction placed on the contents of the fields is that no control characters may be present, nor any of comma, colon, or equal sign\&. The \fIother\fR field does not have this restriction, and is used to store accounting information used by other applications\&.
|
The only restriction placed on the contents of the fields is that no control characters may be present, nor any of comma, colon, or equal sign. The
|
||||||
|
\fIother\fR
|
||||||
|
field does not have this restriction, and is used to store accounting information used by other applications.
|
||||||
.PP
|
.PP
|
||||||
If none of the options are selected, \fBchfn\fR operates in an interactive fashion, prompting the user with the current values for all of the fields\&. Enter the new value to change the field, or leave the line blank to use the current value\&. The current value is displayed between a pair of \fI[ ]\fR marks\&. Without options, chfn prompts for the current user account\&.
|
If none of the options are selected,
|
||||||
|
\fBchfn\fR
|
||||||
|
operates in an interactive fashion, prompting the user with the current values for all of the fields. Enter the new value to change the field, or leave the line blank to use the current value. The current value is displayed between a pair of
|
||||||
|
\fI[ ]\fR
|
||||||
|
marks. Without options, chfn prompts for the current user account.
|
||||||
.SH "FILES"
|
.SH "FILES"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fI/etc/passwd\fR
|
\fI/etc/passwd\fR
|
||||||
user account information
|
user account information
|
||||||
.TP
|
.TP
|
||||||
\fI/etc/login\&.defs\fR
|
\fI/etc/login.defs\fR
|
||||||
runtime configuration
|
runtime configuration
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBpasswd\fR(5)
|
\fBpasswd\fR(5)
|
||||||
|
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Julianne Frances Haugh <jockgrrl@ix\&.netcom\&.com>
|
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||||
<refentry id='chfn.1'>
|
<refentry id='chfn.1'>
|
||||||
<!-- $Id: chfn.1.xml,v 1.11 2005/06/14 20:18:17 kloczek Exp $ -->
|
<!-- $Id: chfn.1.xml,v 1.12 2005/08/10 08:23:18 kloczek Exp $ -->
|
||||||
<refmeta>
|
<refmeta>
|
||||||
<refentrytitle>chfn</refentrytitle>
|
<refentrytitle>chfn</refentrytitle>
|
||||||
<manvolnum>1</manvolnum>
|
<manvolnum>1</manvolnum>
|
||||||
@ -32,12 +32,12 @@
|
|||||||
account. This information is typically printed by <citerefentry>
|
account. This information is typically printed by <citerefentry>
|
||||||
<refentrytitle>finger</refentrytitle><manvolnum>1</manvolnum>
|
<refentrytitle>finger</refentrytitle><manvolnum>1</manvolnum>
|
||||||
</citerefentry> and similar programs. A normal user may only change
|
</citerefentry> and similar programs. A normal user may only change
|
||||||
may only change the fields for her own account, subject to the
|
the fields for her own account, subject to the restrictions in
|
||||||
restrictions in <filename>/etc/login.defs</filename>. (The default
|
<filename>/etc/login.defs</filename>. (The default configuration is to
|
||||||
configuration is to prevent users from changing their fullname.) The
|
prevent users from changing their fullname.) The super user may change
|
||||||
super user may change any field for any account. Additionally, only
|
any field for any account. Additionally, only the super user may use
|
||||||
the super user may use the <option>-o</option> option to change the
|
the <option>-o</option> option to change the undefined portions of the
|
||||||
undefined portions of the GECOS field.
|
GECOS field.
|
||||||
</para>
|
</para>
|
||||||
|
|
||||||
<para>The only restriction placed on the contents of the fields is that
|
<para>The only restriction placed on the contents of the fields is that
|
||||||
|
@ -1,76 +1,51 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "CHPASSWD" "8" "08/03/2005" "" ""
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "CHPASSWD" 8 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
chpasswd \- update passwords in batch mode
|
chpasswd \- update passwords in batch mode
|
||||||
.SH "SYNOPSIS"
|
.SH "SYNOPSIS"
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 9
|
.HP 9
|
||||||
\fBchpasswd\fR [\fIoptions\fR]
|
\fBchpasswd\fR [\fIoptions\fR]
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
|
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBchpasswd\fR reads a list of user name and password pairs from standard input and uses this information to update a group of existing users\&. Each line is of the format:
|
\fBchpasswd\fR
|
||||||
|
reads a list of user name and password pairs from standard input and uses this information to update a group of existing users. Each line is of the format:
|
||||||
.PP
|
.PP
|
||||||
\fIuser_name\fR:\fIpassword\fR
|
\fIuser_name\fR:\fIpassword\fR
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
By default the supplied password must be in clear\-text\&. Default encription algoritm is DES\&. Also the password age will be updated, if present\&.
|
By default the supplied password must be in clear\-text. Default encription algoritm is DES. Also the password age will be updated, if present.
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
This command is intended to be used in a large system environment where many accounts are created at a single time\&.
|
This command is intended to be used in a large system environment where many accounts are created at a single time.
|
||||||
|
|
||||||
.SH "OPTIONS"
|
.SH "OPTIONS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The options which apply to the \fBchpasswd\fR command are:
|
The options which apply to the
|
||||||
|
\fBchpasswd\fR
|
||||||
|
command are:
|
||||||
.TP
|
.TP
|
||||||
\fB\-e\fR, \fB\-\-encrypted\fR
|
\fB\-e\fR, \fB\-\-encrypted\fR
|
||||||
Supplied passwords are in encrypted form\&.
|
Supplied passwords are in encrypted form.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-h\fR, \fB\-\-help\fR
|
\fB\-h\fR, \fB\-\-help\fR
|
||||||
Display help message and exit\&.
|
Display help message and exit.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-m\fR, \fB\-\-md5\fR
|
\fB\-m\fR, \fB\-\-md5\fR
|
||||||
Use MD5 encryption instead DES when the supplied passwords are not encrypted\&.
|
Use MD5 encryption instead DES when the supplied passwords are not encrypted.
|
||||||
|
|
||||||
.SH "CAVEATS"
|
.SH "CAVEATS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Remember keep protected for reading by others fille passed to standard input \fBchpasswd\fR command if it contains unencrypted passwords\&.
|
Remember keep protected for reading by others fille passed to standard input
|
||||||
|
\fBchpasswd\fR
|
||||||
|
command if it contains unencrypted passwords.
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBpasswd\fR(1), \fBnewusers\fR(8), \fBuseradd\fR(8)
|
\fBpasswd\fR(1),
|
||||||
|
\fBnewusers\fR(8),
|
||||||
|
\fBuseradd\fR(8)
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
|
||||||
|
69
man/chsh.1
69
man/chsh.1
@ -1,48 +1,38 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "CHSH" "1" "08/03/2005" "User Commands" "User Commands"
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "CHSH" 1 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
chsh \- change login shell
|
chsh \- change login shell
|
||||||
.SH "SYNOPSIS"
|
.SH "SYNOPSIS"
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 5
|
.HP 5
|
||||||
\fBchsh\fR [\-s\ \fIlogin_shell\fR] [\fIuser\fR]
|
\fBchsh\fR [\-s\ \fIlogin_shell\fR] [\fIuser\fR]
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
|
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBchsh\fR changes the user login shell\&. This determines the name of the user's initial login command\&. A normal user may only change the login shell for her own account, the super user may change the login shell for any account\&.
|
\fBchsh\fR
|
||||||
|
changes the user login shell. This determines the name of the user's initial login command. A normal user may only change the login shell for her own account, the super user may change the login shell for any account.
|
||||||
.PP
|
.PP
|
||||||
The only restrictions placed on the login shell is that the command name must be listed in \fI/etc/shells\fR, unless the invoker is the super\-user, and then any value may be added\&. An account with a restricted login shell may not change her login shell\&. For this reason, placing \fI/bin/rsh\fR in \fI/etc/shells\fR is discouraged since accidentally changing to a restricted shell would prevent the user from every changing her login shell back to its original value\&.
|
The only restrictions placed on the login shell is that the command name must be listed in
|
||||||
|
\fI/etc/shells\fR, unless the invoker is the super\-user, and then any value may be added. An account with a restricted login shell may not change her login shell. For this reason, placing
|
||||||
|
\fI/bin/rsh\fR
|
||||||
|
in
|
||||||
|
\fI/etc/shells\fR
|
||||||
|
is discouraged since accidentally changing to a restricted shell would prevent the user from every changing her login shell back to its original value.
|
||||||
.SH "OPTIONS"
|
.SH "OPTIONS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
If the \fB\-s\fR option is not selected, \fBchsh\fR operates in an interactive fashion, prompting the user with the current login shell\&. Enter the new value to change the shell, or leave the line blank to use the current one\&. The current shell is displayed between a pair of \fI[ ]\fR marks\&.
|
If the
|
||||||
|
\fB\-s\fR
|
||||||
|
option is not selected,
|
||||||
|
\fBchsh\fR
|
||||||
|
operates in an interactive fashion, prompting the user with the current login shell. Enter the new value to change the shell, or leave the line blank to use the current one. The current shell is displayed between a pair of
|
||||||
|
\fI[ ]\fR
|
||||||
|
marks.
|
||||||
.SH "FILES"
|
.SH "FILES"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fI/etc/passwd\fR
|
\fI/etc/passwd\fR
|
||||||
user account information
|
user account information
|
||||||
@ -50,12 +40,9 @@ user account information
|
|||||||
\fI/etc/shells\fR
|
\fI/etc/shells\fR
|
||||||
list of valid login shells
|
list of valid login shells
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBchfn\fR(1), \fBpasswd\fR(5)
|
\fBchfn\fR(1),
|
||||||
|
\fBpasswd\fR(5)
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Julianne Frances Haugh <jockgrrl@ix\&.netcom\&.com>
|
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
|
||||||
|
|
||||||
|
51
man/expiry.1
51
man/expiry.1
@ -1,40 +1,22 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "EXPIRY" "1" "08/03/2005" "User Commands" "User Commands"
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "EXPIRY" 1 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
expiry \- check and enforce password expiration policy
|
expiry \- check and enforce password expiration policy
|
||||||
.SH "SYNOPSIS"
|
.SH "SYNOPSIS"
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 7
|
.HP 7
|
||||||
\fBexpiry\fR [\-c] [\-f]
|
\fBexpiry\fR [\-c] [\-f]
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
|
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBexpiry\fR checks (\fB\-c\fR) the current password expiration and forces (\fB\-f\fR) changes when required\&. It is callable as a normal user command\&.
|
\fBexpiry\fR
|
||||||
|
checks (\fB\-c\fR) the current password expiration and forces (\fB\-f\fR) changes when required. It is callable as a normal user command.
|
||||||
.SH "FILES"
|
.SH "FILES"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fI/etc/passwd\fR
|
\fI/etc/passwd\fR
|
||||||
user account information
|
user account information
|
||||||
@ -42,12 +24,9 @@ user account information
|
|||||||
\fI/etc/shadow\fR
|
\fI/etc/shadow\fR
|
||||||
secure user account information
|
secure user account information
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBpasswd\fR(5), \fBshadow\fR(5)
|
\fBpasswd\fR(5),
|
||||||
|
\fBshadow\fR(5)
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Ben Collins <bcollins@debian\&.org>
|
Ben Collins <bcollins@debian.org>
|
||||||
|
|
||||||
|
@ -1,30 +1,18 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "FAILLOG" "5" "08/03/2005" "" ""
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "FAILLOG" 5 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
faillog \- Login failure logging file
|
faillog \- Login failure logging file
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fI/var/log/faillog\fR maintains a count of login failures and the limits for each account\&. The file is fixed length record, indexed by numerical UID\&. Each record contains the count of login failures since the last successful login; the maximum number of failures before the account is disabled; the line the last login failure occured on; and the date the last login failure occured\&.
|
\fI/var/log/faillog\fR
|
||||||
|
maintains a count of login failures and the limits for each account. The file is fixed length record, indexed by numerical UID. Each record contains the count of login failures since the last successful login; the maximum number of failures before the account is disabled; the line the last login failure occured on; and the date the last login failure occured.
|
||||||
.PP
|
.PP
|
||||||
The structure of the file is:
|
The structure of the file is:
|
||||||
|
|
||||||
@ -37,19 +25,13 @@ struct faillog {
|
|||||||
time_t fail_time;
|
time_t fail_time;
|
||||||
};
|
};
|
||||||
.fi
|
.fi
|
||||||
|
|
||||||
.SH "FILES"
|
.SH "FILES"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fI/var/log/faillog\fR
|
\fI/var/log/faillog\fR
|
||||||
login failure log
|
login failure log
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBfaillog\fR(8)
|
\fBfaillog\fR(8)
|
||||||
|
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
|
||||||
|
112
man/faillog.8
112
man/faillog.8
@ -1,88 +1,88 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "FAILLOG" "8" "08/03/2005" "" ""
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "FAILLOG" 8 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
faillog \- display faillog records or set login failure limits
|
faillog \- display faillog records or set login failure limits
|
||||||
.SH "SYNOPSIS"
|
.SH "SYNOPSIS"
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 8
|
.HP 8
|
||||||
\fBfaillog\fR [\fIoptions\fR]
|
\fBfaillog\fR [\fIoptions\fR]
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
|
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBfaillog\fR formats the contents of the failure log from \fI/var/log/faillog\fR database\&. It also can be used for maintains failure counters and limits\&. Run \fBfaillog\fR without arguments display only list of user faillog records who have ever had a login failure\&.
|
\fBfaillog\fR
|
||||||
|
formats the contents of the failure log from
|
||||||
|
\fI/var/log/faillog\fR
|
||||||
|
database. It also can be used for maintains failure counters and limits. Run
|
||||||
|
\fBfaillog\fR
|
||||||
|
without arguments display only list of user faillog records who have ever had a login failure.
|
||||||
.SH "OPTIONS"
|
.SH "OPTIONS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The options which apply to the \fBfaillog\fR command are:
|
The options which apply to the
|
||||||
|
\fBfaillog\fR
|
||||||
|
command are:
|
||||||
.TP
|
.TP
|
||||||
\fB\-a\fR, \fB\-\-all\fR
|
\fB\-a\fR, \fB\-\-all\fR
|
||||||
Display faillog records for all users\&.
|
Display faillog records for all users.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-h\fR, \fB\-\-help\fR
|
\fB\-h\fR, \fB\-\-help\fR
|
||||||
Display help message and exit\&.
|
Display help message and exit.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-l\fR, \fB\-\-lock\-time\fR \fISEC\fR
|
\fB\-l\fR, \fB\-\-lock\-time\fR \fISEC\fR
|
||||||
Lock accout to \fISEC\fR seconds after failed login\&.
|
Lock accout to
|
||||||
|
\fISEC\fR
|
||||||
|
seconds after failed login.
|
||||||
.TP
|
.TP
|
||||||
\fB\-m\fR, \fB\-\-maximum\fR \fIMAX\fR
|
\fB\-m\fR, \fB\-\-maximum\fR \fIMAX\fR
|
||||||
Set maiximum number of login failures after the account is disabled to \fIMAX\fR\&. Selecting \fIMAX\fR value of 0 has the effect of not placing a limit on the number of failed logins\&. The maximum failure count should always be 0 for \fIroot\fR to prevent a denial of services attack against the system\&.
|
Set maiximum number of login failures after the account is disabled to
|
||||||
|
\fIMAX\fR. Selecting
|
||||||
|
\fIMAX\fR
|
||||||
|
value of 0 has the effect of not placing a limit on the number of failed logins. The maximum failure count should always be 0 for
|
||||||
|
\fIroot\fR
|
||||||
|
to prevent a denial of services attack against the system.
|
||||||
.TP
|
.TP
|
||||||
\fB\-r\fR, \fB\-\-reset\fR
|
\fB\-r\fR, \fB\-\-reset\fR
|
||||||
Reset the counters of login failures or one recor if used with \-u \fILOGIN\fR option\&. Write access to \fI/var/log/faillog\fR is required for this option\&.
|
Reset the counters of login failures or one recor if used with \-u
|
||||||
|
\fILOGIN\fR
|
||||||
|
option. Write access to
|
||||||
|
\fI/var/log/faillog\fR
|
||||||
|
is required for this option.
|
||||||
.TP
|
.TP
|
||||||
\fB\-t\fR, \fB\-\-time\fR \fIDAYS\fR
|
\fB\-t\fR, \fB\-\-time\fR \fIDAYS\fR
|
||||||
Display faillog records more recent than \fIDAYS\fR\&. The \fB\-t\fR flag overrides the use of \fB\-u\fR\&.
|
Display faillog records more recent than
|
||||||
|
\fIDAYS\fR. The
|
||||||
|
\fB\-t\fR
|
||||||
|
flag overrides the use of
|
||||||
|
\fB\-u\fR.
|
||||||
.TP
|
.TP
|
||||||
\fB\-u\fR, \fB\-\-user\fR \fILOGIN\fR
|
\fB\-u\fR, \fB\-\-user\fR \fILOGIN\fR
|
||||||
Display faillog record or maintains failure counters and limits (if used with \fB\-l\fR, \fB\-m\fR or \fB\-r\fR options) only for user with \fILOGIN\fR\&.
|
Display faillog record or maintains failure counters and limits (if used with
|
||||||
|
\fB\-l\fR,
|
||||||
|
\fB\-m\fR
|
||||||
|
or
|
||||||
|
\fB\-r\fR
|
||||||
|
options) only for user with
|
||||||
|
\fILOGIN\fR.
|
||||||
.SH "CAVEATS"
|
.SH "CAVEATS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBfaillog\fR only prints out users with no successful login since the last failure\&. To print out a user who has had a successful login since their last failure, you must explicitly request the user with the \fB\-u\fR flag, or print out all users with the \fB\-a\fR flag\&.
|
\fBfaillog\fR
|
||||||
|
only prints out users with no successful login since the last failure. To print out a user who has had a successful login since their last failure, you must explicitly request the user with the
|
||||||
|
\fB\-u\fR
|
||||||
|
flag, or print out all users with the
|
||||||
|
\fB\-a\fR
|
||||||
|
flag.
|
||||||
.SH "FILES"
|
.SH "FILES"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fI/var/log/faillog\fR
|
\fI/var/log/faillog\fR
|
||||||
failure logging file
|
failure logging file
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBlogin\fR(1), \fBfaillog\fR(5)
|
\fBlogin\fR(1),
|
||||||
|
\fBfaillog\fR(5)
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
|
||||||
|
106
man/gpasswd.1
106
man/gpasswd.1
@ -1,78 +1,60 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "GPASSWD" "1" "08/03/2005" "User Commands" "User Commands"
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "GPASSWD" 1 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
gpasswd \- administer the /etc/group file
|
gpasswd \- administer the /etc/group file
|
||||||
.SH "SYNOPSIS"
|
.SH "SYNOPSIS"
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 8
|
.HP 8
|
||||||
\fBgpasswd\fR \fIgroup\fR
|
\fBgpasswd\fR \fIgroup\fR
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 8
|
.HP 8
|
||||||
\fBgpasswd\fR \-a\ \fIuser\fR \fIgroup\fR
|
\fBgpasswd\fR \-a\ \fIuser\fR \fIgroup\fR
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 8
|
.HP 8
|
||||||
\fBgpasswd\fR \-d\ \fIuser\fR \fIgroup\fR
|
\fBgpasswd\fR \-d\ \fIuser\fR \fIgroup\fR
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 8
|
.HP 8
|
||||||
\fBgpasswd\fR \-R\ \fIgroup\fR
|
\fBgpasswd\fR \-R\ \fIgroup\fR
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 8
|
.HP 8
|
||||||
\fBgpasswd\fR \-r\ \fIgroup\fR
|
\fBgpasswd\fR \-r\ \fIgroup\fR
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 8
|
.HP 8
|
||||||
\fBgpasswd\fR [\-A\ \fIuser,\fR...] [\-M\ \fIuser,\fR...] \fIgroup\fR
|
\fBgpasswd\fR [\-A\ \fIuser,\fR...] [\-M\ \fIuser,\fR...] \fIgroup\fR
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
|
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBgpasswd\fR is used to administer the \fI/etc/group\fR file (and \fI/etc/gshadow\fR file if compiled with SHADOWGRP defined)\&. Every group can have administrators, members and a password\&. System administrator can use \fB\-A\fR option to define group administrator(s) and \fB\-M\fR option to define members and has all rights of group administrators and members\&.
|
\fBgpasswd\fR
|
||||||
|
is used to administer the
|
||||||
|
\fI/etc/group\fR
|
||||||
|
file (and
|
||||||
|
\fI/etc/gshadow\fR
|
||||||
|
file if compiled with SHADOWGRP defined). Every group can have administrators, members and a password. System administrator can use
|
||||||
|
\fB\-A\fR
|
||||||
|
option to define group administrator(s) and
|
||||||
|
\fB\-M\fR
|
||||||
|
option to define members and has all rights of group administrators and members.
|
||||||
.SH "OPTIONS"
|
.SH "OPTIONS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Group administrator can add and delete users using \fB\-a\fR and \fB\-d\fR options respectively\&. Administrators can use \fB\-r\fR option to remove group password\&. When no password is set only group members can use \fBnewgrp\fR to join the group\&. Option \fB\-R\fR disables access via a password to the group through \fBnewgrp\fR command (however members will still be able to switch to this group)\&.
|
Group administrator can add and delete users using
|
||||||
|
\fB\-a\fR
|
||||||
|
and
|
||||||
|
\fB\-d\fR
|
||||||
|
options respectively. Administrators can use
|
||||||
|
\fB\-r\fR
|
||||||
|
option to remove group password. When no password is set only group members can use
|
||||||
|
\fBnewgrp\fR
|
||||||
|
to join the group. Option
|
||||||
|
\fB\-R\fR
|
||||||
|
disables access via a password to the group through
|
||||||
|
\fBnewgrp\fR
|
||||||
|
command (however members will still be able to switch to this group).
|
||||||
.PP
|
.PP
|
||||||
\fBgpasswd\fR called by a group administrator with group name only prompts for the group password\&. If password is set the members can still \fBnewgrp\fR(1) without a password, non\-members must supply the password\&.
|
\fBgpasswd\fR
|
||||||
|
called by a group administrator with group name only prompts for the group password. If password is set the members can still
|
||||||
|
\fBnewgrp\fR(1)
|
||||||
|
without a password, non\-members must supply the password.
|
||||||
.SH "FILES"
|
.SH "FILES"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fI/etc/group\fR
|
\fI/etc/group\fR
|
||||||
group account information
|
group account information
|
||||||
@ -80,12 +62,14 @@ group account information
|
|||||||
\fI/etc/gshadow\fR
|
\fI/etc/gshadow\fR
|
||||||
secure group account information
|
secure group account information
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBnewgrp\fR(1), \fBgroupadd\fR(8), \fBgroupdel\fR(8), \fBgroupmod\fR(8), \fBgrpck\fR(8), \fBgroup\fR(5), \fBgshadow\fR(5)
|
\fBnewgrp\fR(1),
|
||||||
|
\fBgroupadd\fR(8),
|
||||||
|
\fBgroupdel\fR(8),
|
||||||
|
\fBgroupmod\fR(8),
|
||||||
|
\fBgrpck\fR(8),
|
||||||
|
\fBgroup\fR(5),
|
||||||
|
\fBgshadow\fR(5)
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Rafal Maszkowski <rzm@pdi\&.net>
|
Rafal Maszkowski <rzm@pdi.net>
|
||||||
|
|
||||||
|
100
man/groupadd.8
100
man/groupadd.8
@ -1,63 +1,52 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "GROUPADD" "8" "08/03/2005" "" ""
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "GROUPADD" 8 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
groupadd \- Create a new group
|
groupadd \- Create a new group
|
||||||
.SH "SYNOPSIS"
|
.SH "SYNOPSIS"
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 9
|
.HP 9
|
||||||
\fBgroupadd\fR [\-g\ \fIgid\fR\ [\-o]] [\-f] [\-K\ \fIKEY\fR=\fIVALUE\fR] \fIgroup\fR
|
\fBgroupadd\fR [\-g\ \fIgid\fR\ [\-o\ ]] [\-f] [\-K\ \fIKEY\fR=\fIVALUE\fR] \fIgroup\fR
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
|
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The \fBgroupadd\fR command creates a new group account using the values specified on the command line and the default values from the system\&. The new group will be entered into the system files as needed\&.
|
The
|
||||||
|
\fBgroupadd\fR
|
||||||
|
command creates a new group account using the values specified on the command line and the default values from the system. The new group will be entered into the system files as needed.
|
||||||
.SH "OPTIONS"
|
.SH "OPTIONS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The options which apply to the \fBgroupadd\fR command are:
|
The options which apply to the
|
||||||
|
\fBgroupadd\fR
|
||||||
|
command are:
|
||||||
.TP
|
.TP
|
||||||
\fB\-f\fR
|
\fB\-f\fR
|
||||||
This option causes to just exit with success status if the specified group already exists\&. With \fB\-g\fR, if specified gid already exists, other (unique) gid is chosen (i\&.e\&. \fB\-g\fR is turned off)\&.
|
This option causes to just exit with success status if the specified group already exists. With
|
||||||
|
\fB\-g\fR, if specified gid already exists, other (unique) gid is chosen (i.e.
|
||||||
|
\fB\-g\fR
|
||||||
|
is turned off).
|
||||||
.TP
|
.TP
|
||||||
\fB\-g\fR \fIgid\fR
|
\fB\-g\fR \fIgid\fR
|
||||||
The numerical value of the group's ID\&. This value must be unique, unless the \fB\-o\fR option is used\&. The value must be non\-negative\&. The default is to use the smallest ID value greater than 999 and greater than every other group\&. Values between 0 and 999 are typically reserved for system accounts\&.
|
The numerical value of the group's ID. This value must be unique, unless the
|
||||||
|
\fB\-o\fR
|
||||||
|
option is used. The value must be non\-negative. The default is to use the smallest ID value greater than 999 and greater than every other group. Values between 0 and 999 are typically reserved for system accounts.
|
||||||
.TP
|
.TP
|
||||||
\fB\-K \fIKEY\fR=\fIVALUE\fR\fR
|
\fB\-K \fR\fB\fIKEY\fR\fR\fB=\fR\fB\fIVALUE\fR\fR
|
||||||
Overrides /etc/login\&.defs defaults (GID_MIN, GID_MAX and others)\&. Multiple \fB\-K\fR options can be specified, e\&.g\&.: \fB\-K\fR \fIGID_MIN\fR=\fI100\fR \fB\-K\fR \fIGID_MAX\fR=\fI499\fR
|
Overrides /etc/login.defs defaults (GID_MIN, GID_MAX and others). Multiple
|
||||||
|
\fB\-K\fR
|
||||||
Note: \fB\-K\fR \fIGID_MIN\fR=\fI10\fR,\fIGID_MAX\fR=\fI499\fR doesn't work yet\&.
|
options can be specified, e.g.:
|
||||||
|
\fB\-K\fR \fIGID_MIN\fR=\fI100\fR \fB\-K\fR \fIGID_MAX\fR=\fI499\fR
|
||||||
|
|
||||||
|
Note:
|
||||||
|
\fB\-K\fR \fIGID_MIN\fR=\fI10\fR,\fIGID_MAX\fR=\fI499\fR
|
||||||
|
doesn't work yet.
|
||||||
.TP
|
.TP
|
||||||
\fB\-o\fR
|
\fB\-o\fR
|
||||||
Allow add group wit non\-unique GID\&.
|
Allow add group wit non\-unique GID.
|
||||||
|
|
||||||
.SH "FILES"
|
.SH "FILES"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fI/etc/group\fR
|
\fI/etc/group\fR
|
||||||
group account information
|
group account information
|
||||||
@ -65,10 +54,10 @@ group account information
|
|||||||
\fI/etc/gshadow\fR
|
\fI/etc/gshadow\fR
|
||||||
secure group account information
|
secure group account information
|
||||||
.SH "EXIT VALUES"
|
.SH "EXIT VALUES"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The \fBgroupadd\fR command exits with the following values:
|
The
|
||||||
|
\fBgroupadd\fR
|
||||||
|
command exits with the following values:
|
||||||
.TP
|
.TP
|
||||||
\fI0\fR
|
\fI0\fR
|
||||||
success
|
success
|
||||||
@ -87,14 +76,17 @@ group name not unique
|
|||||||
.TP
|
.TP
|
||||||
\fI10\fR
|
\fI10\fR
|
||||||
can't update group file
|
can't update group file
|
||||||
|
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBchfn\fR(1), \fBchsh\fR(1), \fBpasswd\fR(1), \fBgpasswd\fR(8), \fBgroupdel\fR(8), \fBgroupmod\fR(8), \fBuseradd\fR(8), \fBuserdel\fR(8), \fBusermod\fR(8)
|
\fBchfn\fR(1),
|
||||||
|
\fBchsh\fR(1),
|
||||||
|
\fBpasswd\fR(1),
|
||||||
|
\fBgpasswd\fR(8),
|
||||||
|
\fBgroupdel\fR(8),
|
||||||
|
\fBgroupmod\fR(8),
|
||||||
|
\fBuseradd\fR(8),
|
||||||
|
\fBuserdel\fR(8),
|
||||||
|
\fBusermod\fR(8)
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
|
||||||
|
@ -1,48 +1,29 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "GROUPDEL" "8" "08/03/2005" "" ""
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "GROUPDEL" 8 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
groupdel \- Delete a group
|
groupdel \- Delete a group
|
||||||
.SH "SYNOPSIS"
|
.SH "SYNOPSIS"
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 9
|
.HP 9
|
||||||
\fBgroupdel\fR \fIgroup\fR
|
\fBgroupdel\fR \fIgroup\fR
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
|
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The \fBgroupdel\fR command modifies the system account files, deleting all entries that refer to \fIgroup\fR\&. The named group must exist\&.
|
The
|
||||||
|
\fBgroupdel\fR
|
||||||
|
command modifies the system account files, deleting all entries that refer to
|
||||||
|
\fIgroup\fR. The named group must exist.
|
||||||
.PP
|
.PP
|
||||||
You must manually check all file systems to insure that no files remain with the named group as the file group ID\&.
|
You must manually check all file systems to insure that no files remain with the named group as the file group ID.
|
||||||
|
|
||||||
.SH "CAVEATS"
|
.SH "CAVEATS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
You may not remove the primary group of any existing user\&. You must remove the user before you remove the group\&.
|
You may not remove the primary group of any existing user. You must remove the user before you remove the group.
|
||||||
|
|
||||||
.SH "FILES"
|
.SH "FILES"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fI/etc/group\fR
|
\fI/etc/group\fR
|
||||||
group account information
|
group account information
|
||||||
@ -50,10 +31,10 @@ group account information
|
|||||||
\fI/etc/gshadow\fR
|
\fI/etc/gshadow\fR
|
||||||
secure group account information
|
secure group account information
|
||||||
.SH "EXIT VALUES"
|
.SH "EXIT VALUES"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The \fBgroupdel\fR command exits with the following values:
|
The
|
||||||
|
\fBgroupdel\fR
|
||||||
|
command exits with the following values:
|
||||||
.TP
|
.TP
|
||||||
\fI0\fR
|
\fI0\fR
|
||||||
success
|
success
|
||||||
@ -66,14 +47,17 @@ can't remove user's primary group
|
|||||||
.TP
|
.TP
|
||||||
\fI10\fR
|
\fI10\fR
|
||||||
can't update group file
|
can't update group file
|
||||||
|
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBchfn\fR(1), \fBchsh\fR(1), \fBpasswd\fR(1), \fBgpasswd\fR(8), \fBgroupadd\fR(8), \fBgroupmod\fR(8), \fBuseradd\fR(8), \fBuserdel\fR(8), \fBusermod\fR(8)
|
\fBchfn\fR(1),
|
||||||
|
\fBchsh\fR(1),
|
||||||
|
\fBpasswd\fR(1),
|
||||||
|
\fBgpasswd\fR(8),
|
||||||
|
\fBgroupadd\fR(8),
|
||||||
|
\fBgroupmod\fR(8),
|
||||||
|
\fBuseradd\fR(8),
|
||||||
|
\fBuserdel\fR(8),
|
||||||
|
\fBusermod\fR(8)
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
|
||||||
|
@ -1,53 +1,39 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "GROUPMOD" "8" "08/03/2005" "" ""
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "GROUPMOD" 8 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
groupmod \- modify a group
|
groupmod \- modify a group
|
||||||
.SH "SYNOPSIS"
|
.SH "SYNOPSIS"
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 9
|
.HP 9
|
||||||
\fBgroupmod\fR [\-g\ \fIgid\fR\ [\-o]] [\-n\ \fInew_group_name\fR] \fIgroup\fR
|
\fBgroupmod\fR [\-g\ \fIgid\fR\ [\-o\ ]] [\-n\ \fInew_group_name\fR] \fIgroup\fR
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
|
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The \fBgroupmod\fR command modifies the system account files to reflect the changes that are specified on the command line\&.
|
The
|
||||||
|
\fBgroupmod\fR
|
||||||
|
command modifies the system account files to reflect the changes that are specified on the command line.
|
||||||
.SH "OPTIONS"
|
.SH "OPTIONS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The options which apply to the \fBgroupmod\fR command are:
|
The options which apply to the
|
||||||
|
\fBgroupmod\fR
|
||||||
|
command are:
|
||||||
.TP
|
.TP
|
||||||
\fB\-g\fR \fIgid\fR
|
\fB\-g\fR \fIgid\fR
|
||||||
The numerical value of the group's ID\&. This value must be unique, unless the \fB\-o\fR option is used\&. The value must be non\-negative\&. Values between 0 and 999 are typically reserved for system groups\&. Any files which the old group ID is the file group ID must have the file group ID changed manually\&.
|
The numerical value of the group's ID. This value must be unique, unless the
|
||||||
|
\fB\-o\fR
|
||||||
|
option is used. The value must be non\-negative. Values between 0 and 999 are typically reserved for system groups. Any files which the old group ID is the file group ID must have the file group ID changed manually.
|
||||||
.TP
|
.TP
|
||||||
\fB\-n\fR \fInew_group_name\fR
|
\fB\-n\fR \fInew_group_name\fR
|
||||||
The name of the group will be changed from \fIgroup\fR to \fInew_group_name\fR\&.
|
The name of the group will be changed from
|
||||||
|
\fIgroup\fR
|
||||||
|
to
|
||||||
|
\fInew_group_name\fR.
|
||||||
.SH "FILES"
|
.SH "FILES"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fI/etc/group\fR
|
\fI/etc/group\fR
|
||||||
group account information
|
group account information
|
||||||
@ -55,10 +41,10 @@ group account information
|
|||||||
\fI/etc/gshadow\fR
|
\fI/etc/gshadow\fR
|
||||||
secure group account information
|
secure group account information
|
||||||
.SH "EXIT VALUES"
|
.SH "EXIT VALUES"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The \fBgroupmod\fR command exits with the following values:
|
The
|
||||||
|
\fBgroupmod\fR
|
||||||
|
command exits with the following values:
|
||||||
.TP
|
.TP
|
||||||
\fI0\fR
|
\fI0\fR
|
||||||
success
|
success
|
||||||
@ -80,14 +66,17 @@ group name already in use
|
|||||||
.TP
|
.TP
|
||||||
\fI10\fR
|
\fI10\fR
|
||||||
can't update group file
|
can't update group file
|
||||||
|
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBchfn\fR(1), \fBchsh\fR(1), \fBpasswd\fR(1), \fBgpasswd\fR(8), \fBgroupadd\fR(8), \fBgroupdel\fR(8), \fBuseradd\fR(8), \fBuserdel\fR(8), \fBusermod\fR(8)
|
\fBchfn\fR(1),
|
||||||
|
\fBchsh\fR(1),
|
||||||
|
\fBpasswd\fR(1),
|
||||||
|
\fBgpasswd\fR(8),
|
||||||
|
\fBgroupadd\fR(8),
|
||||||
|
\fBgroupdel\fR(8),
|
||||||
|
\fBuseradd\fR(8),
|
||||||
|
\fBuserdel\fR(8),
|
||||||
|
\fBusermod\fR(8)
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
|
||||||
|
67
man/groups.1
67
man/groups.1
@ -1,55 +1,44 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "GROUPS" "1" "08/03/2005" "User Commands" "User Commands"
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "GROUPS" 1 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
groups \- display current group names
|
groups \- display current group names
|
||||||
.SH "SYNOPSIS"
|
.SH "SYNOPSIS"
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 7
|
.HP 7
|
||||||
\fBgroups\fR [\fIuser\fR]
|
\fBgroups\fR [\fIuser\fR]
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
|
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBgroups\fR displays the current group names or ID values\&. If the value does not have a corresponding entry in \fI/etc/group\fR, the value will be displayed as the numerical group value\&. The optional \fIuser\fR parameter will display the groups for the named \fIuser\fR\&.
|
\fBgroups\fR
|
||||||
|
displays the current group names or ID values. If the value does not have a corresponding entry in
|
||||||
|
\fI/etc/group\fR, the value will be displayed as the numerical group value. The optional
|
||||||
|
\fIuser\fR
|
||||||
|
parameter will display the groups for the named
|
||||||
|
\fIuser\fR.
|
||||||
.SH "NOTE"
|
.SH "NOTE"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Systems which do not support concurrent group sets will have the information from \fI/etc/group\fR reported\&. The user must use \fBnewgrp\fR or \fBsg\fR to change their current real and effective group ID\&.
|
Systems which do not support concurrent group sets will have the information from
|
||||||
|
\fI/etc/group\fR
|
||||||
|
reported. The user must use
|
||||||
|
\fBnewgrp\fR
|
||||||
|
or
|
||||||
|
\fBsg\fR
|
||||||
|
to change their current real and effective group ID.
|
||||||
.SH "FILES"
|
.SH "FILES"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fI/etc/group\fR
|
\fI/etc/group\fR
|
||||||
group account information
|
group account information
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBnewgrp\fR(1), \fBgetgid\fR(2), \fBgetgroups\fR(2), \fBgetuid\fR(2)
|
\fBnewgrp\fR(1),
|
||||||
|
\fBgetgid\fR(2),
|
||||||
|
\fBgetgroups\fR(2),
|
||||||
|
\fBgetuid\fR(2)
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Julianne Frances Haugh <jockgrrl@ix\&.netcom\&.com>
|
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
|
||||||
|
|
||||||
|
104
man/grpck.8
104
man/grpck.8
@ -1,41 +1,27 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "GRPCK" "8" "08/03/2005" "" ""
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "GRPCK" 8 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
grpck \- verify integrity of group files
|
grpck \- verify integrity of group files
|
||||||
.SH "SYNOPSIS"
|
.SH "SYNOPSIS"
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 6
|
.HP 6
|
||||||
\fBgrpck\fR [\-r] [\fIgroup\fR\ \fIshadow\fR]
|
\fBgrpck\fR [\-r] [\fIgroup\fR\ \fIshadow\fR]
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
|
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBgrpck\fR verifies the integrity of the system authentication information\&. All entries in the \fI/etc/group\fR and \fI/etc/gshadow\fR are checked to see that the entry has the proper format and valid data in each field\&. The user is prompted to delete entries that are improperly formatted or which have other uncorrectable errors\&.
|
\fBgrpck\fR
|
||||||
|
verifies the integrity of the system authentication information. All entries in the
|
||||||
|
\fI/etc/group\fR
|
||||||
|
and
|
||||||
|
\fI/etc/gshadow\fR
|
||||||
|
are checked to see that the entry has the proper format and valid data in each field. The user is prompted to delete entries that are improperly formatted or which have other uncorrectable errors.
|
||||||
.PP
|
.PP
|
||||||
Checks are made to verify that each entry has:
|
Checks are made to verify that each entry has:
|
||||||
|
|
||||||
.TP 3
|
.TP 3
|
||||||
\(bu
|
\(bu
|
||||||
the correct number of fields
|
the correct number of fields
|
||||||
@ -45,21 +31,41 @@ a unique group name
|
|||||||
.TP
|
.TP
|
||||||
\(bu
|
\(bu
|
||||||
a valid list of members and administrators
|
a valid list of members and administrators
|
||||||
.LP
|
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The checks for correct number of fields and unique group name are fatal\&. If the entry has the wrong number of fields, the user will be prompted to delete the entire line\&. If the user does not answer affirmatively, all further checks are bypassed\&. An entry with a duplicated group name is prompted for deletion, but the remaining checks will still be made\&. All other errors are warnings and the user is encouraged to run the \fBgroupmod\fR command to correct the error\&.
|
The checks for correct number of fields and unique group name are fatal. If the entry has the wrong number of fields, the user will be prompted to delete the entire line. If the user does not answer affirmatively, all further checks are bypassed. An entry with a duplicated group name is prompted for deletion, but the remaining checks will still be made. All other errors are warnings and the user is encouraged to run the
|
||||||
|
\fBgroupmod\fR
|
||||||
|
command to correct the error.
|
||||||
.PP
|
.PP
|
||||||
The commands which operate on the \fI/etc/group\fR file are not able to alter corrupted or duplicated entries\&. \fBgrpck\fR should be used in those circumstances to remove the offending entry\&.
|
The commands which operate on the
|
||||||
|
\fI/etc/group\fR
|
||||||
|
file are not able to alter corrupted or duplicated entries.
|
||||||
|
\fBgrpck\fR
|
||||||
|
should be used in those circumstances to remove the offending entry.
|
||||||
.SH "OPTIONS"
|
.SH "OPTIONS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
By default, \fBgrpck\fR operates on the files \fI/etc/group\fR and \fI/etc/gshadow\fR\&. The user may select alternate files with the \fIgroup\fR and \fIshadow\fR parameters\&. Additionally, the user may execute the command in read\-only mode by specifying the \fB\-r\fR flag\&. This causes all questions regarding changes to be answered \fIno\fR without user intervention\&. \fBgrpck\fR can also sort entries in \fI/etc/group\fR and \fI/etc/gshadow\fR by GID\&. To run it in sort mode pass it \fB\-s\fR flag\&. No checks are performed then, it just sorts\&.
|
By default,
|
||||||
|
\fBgrpck\fR
|
||||||
|
operates on the files
|
||||||
|
\fI/etc/group\fR
|
||||||
|
and
|
||||||
|
\fI/etc/gshadow\fR. The user may select alternate files with the
|
||||||
|
\fIgroup\fR
|
||||||
|
and
|
||||||
|
\fIshadow\fR
|
||||||
|
parameters. Additionally, the user may execute the command in read\-only mode by specifying the
|
||||||
|
\fB\-r\fR
|
||||||
|
flag. This causes all questions regarding changes to be answered
|
||||||
|
\fIno\fR
|
||||||
|
without user intervention.
|
||||||
|
\fBgrpck\fR
|
||||||
|
can also sort entries in
|
||||||
|
\fI/etc/group\fR
|
||||||
|
and
|
||||||
|
\fI/etc/gshadow\fR
|
||||||
|
by GID. To run it in sort mode pass it
|
||||||
|
\fB\-s\fR
|
||||||
|
flag. No checks are performed then, it just sorts.
|
||||||
.SH "FILES"
|
.SH "FILES"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fI/etc/group\fR
|
\fI/etc/group\fR
|
||||||
group account information
|
group account information
|
||||||
@ -70,15 +76,16 @@ secure group account information
|
|||||||
\fI/etc/passwd\fR
|
\fI/etc/passwd\fR
|
||||||
user account information
|
user account information
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBgroup\fR(5), \fBpasswd\fR(5), \fBshadow\fR(5), \fBgroupmod\fR(8)
|
\fBgroup\fR(5),
|
||||||
|
\fBpasswd\fR(5),
|
||||||
|
\fBshadow\fR(5),
|
||||||
|
\fBgroupmod\fR(8)
|
||||||
.SH "EXIT VALUES"
|
.SH "EXIT VALUES"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The \fBgrpck\fR command exits with the following values:
|
The
|
||||||
|
\fBgrpck\fR
|
||||||
|
command exits with the following values:
|
||||||
.TP
|
.TP
|
||||||
\fI0\fR
|
\fI0\fR
|
||||||
success
|
success
|
||||||
@ -97,9 +104,6 @@ can't lock group files
|
|||||||
.TP
|
.TP
|
||||||
\fI5\fR
|
\fI5\fR
|
||||||
can't update group files
|
can't update group files
|
||||||
|
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
|
||||||
|
@ -1,30 +1,18 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "GSHADOW" "5" "08/03/2005" "" ""
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "GSHADOW" 5 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
gshadow \- shadowed group file
|
gshadow \- shadowed group file
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fI/etc/gshadow\fR contains the shadowed information for group accounts\&. It contains lines with the following colon\-separated fields:
|
\fI/etc/gshadow\fR
|
||||||
|
contains the shadowed information for group accounts. It contains lines with the following colon\-separated fields:
|
||||||
.TP 3
|
.TP 3
|
||||||
\(bu
|
\(bu
|
||||||
group name
|
group name
|
||||||
@ -37,19 +25,18 @@ comma\-separated list of group administrators
|
|||||||
.TP
|
.TP
|
||||||
\(bu
|
\(bu
|
||||||
comma\-separated list of group members
|
comma\-separated list of group members
|
||||||
.LP
|
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The group name and password fields must be filled\&. The encrypted password consists of 13 characters from the 64\-character alphabet a thru z, A thru Z, 0 thru 9, \\\&. and /\&. Refer to \fBcrypt\fR(3) for details on how this string is interpreted\&. If the password field contains some string that is not valid result of \fBcrypt\fR(3), for instance ! or *, the user will not be able to use a unix password to log in, subject to \fBpam\fR(7)\&.
|
The group name and password fields must be filled. The encrypted password consists of 13 characters from the 64\-character alphabet a thru z, A thru Z, 0 thru 9, \\. and /. Refer to
|
||||||
|
\fBcrypt\fR(3)
|
||||||
|
for details on how this string is interpreted. If the password field contains some string that is not valid result of
|
||||||
|
\fBcrypt\fR(3), for instance ! or *, the user will not be able to use a unix password to log in, subject to
|
||||||
|
\fBpam\fR(7).
|
||||||
.PP
|
.PP
|
||||||
This information supersedes any password present in \fI/etc/group\fR\&.
|
This information supersedes any password present in
|
||||||
|
\fI/etc/group\fR.
|
||||||
.PP
|
.PP
|
||||||
This file must not be readable by regular users if password security is to be maintained\&.
|
This file must not be readable by regular users if password security is to be maintained.
|
||||||
|
|
||||||
.SH "FILES"
|
.SH "FILES"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fI/etc/group\fR
|
\fI/etc/group\fR
|
||||||
group account information
|
group account information
|
||||||
@ -57,12 +44,10 @@ group account information
|
|||||||
\fI/etc/gshadow\fR
|
\fI/etc/gshadow\fR
|
||||||
secure group account information
|
secure group account information
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBgroup\fR(5), \fBgpasswd\fR(5), \fBnewgrp\fR(5)
|
\fBgroup\fR(5),
|
||||||
|
\fBgpasswd\fR(5),
|
||||||
|
\fBnewgrp\fR(5)
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Nicolas FRANCOIS
|
Nicolas FRANCOIS
|
||||||
|
|
||||||
|
57
man/id.1
57
man/id.1
@ -1,40 +1,27 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "ID" "1" "08/03/2005" "User Commands" "User Commands"
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "ID" 1 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
id \- Display current user and group ID names
|
id \- Display current user and group ID names
|
||||||
.SH "SYNOPSIS"
|
.SH "SYNOPSIS"
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 3
|
.HP 3
|
||||||
\fBid\fR [\-a]
|
\fBid\fR [\-a]
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
|
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBid\fR displays the current real and effective user and group ID names or values\&. If the value does not have a corresponding entry in \fI/etc/passwd\fR or \fI/etc/group\fR, the value will be displayed without the corresponding name\&. The optional \fB\-a\fR flag will display the group set on systems which support multiple concurrent group membership\&.
|
\fBid\fR
|
||||||
|
displays the current real and effective user and group ID names or values. If the value does not have a corresponding entry in
|
||||||
|
\fI/etc/passwd\fR
|
||||||
|
or
|
||||||
|
\fI/etc/group\fR, the value will be displayed without the corresponding name. The optional
|
||||||
|
\fB\-a\fR
|
||||||
|
flag will display the group set on systems which support multiple concurrent group membership.
|
||||||
.SH "FILES"
|
.SH "FILES"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fI/etc/group\fR
|
\fI/etc/group\fR
|
||||||
group account information
|
group account information
|
||||||
@ -42,12 +29,10 @@ group account information
|
|||||||
\fI/etc/passwd\fR
|
\fI/etc/passwd\fR
|
||||||
user account information
|
user account information
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBgetgid\fR(2), \fBgetgroups\fR(2), \fBgetuid\fR(2)
|
\fBgetgid\fR(2),
|
||||||
|
\fBgetgroups\fR(2),
|
||||||
|
\fBgetuid\fR(2)
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Julianne Frances Haugh <jockgrrl@ix\&.netcom\&.com>
|
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
|
||||||
|
|
||||||
|
@ -1,9 +1,6 @@
|
|||||||
|
|
||||||
mandir = @mandir@/it
|
mandir = @mandir@/it
|
||||||
|
|
||||||
# Links to missing pages:
|
|
||||||
# grpconv.8 \
|
|
||||||
# grpunconv.8 \
|
|
||||||
man_MANS = \
|
man_MANS = \
|
||||||
chage.1 \
|
chage.1 \
|
||||||
chfn.1 \
|
chfn.1 \
|
||||||
|
@ -46,6 +46,14 @@ CONFIG_HEADER = $(top_builddir)/config.h
|
|||||||
CONFIG_CLEAN_FILES =
|
CONFIG_CLEAN_FILES =
|
||||||
SOURCES =
|
SOURCES =
|
||||||
DIST_SOURCES =
|
DIST_SOURCES =
|
||||||
|
man1dir = $(mandir)/man1
|
||||||
|
am__installdirs = "$(DESTDIR)$(man1dir)" "$(DESTDIR)$(man3dir)" \
|
||||||
|
"$(DESTDIR)$(man5dir)" "$(DESTDIR)$(man8dir)"
|
||||||
|
man3dir = $(mandir)/man3
|
||||||
|
man5dir = $(mandir)/man5
|
||||||
|
man8dir = $(mandir)/man8
|
||||||
|
NROFF = nroff
|
||||||
|
MANS = $(man_MANS)
|
||||||
DISTFILES = $(DIST_COMMON) $(DIST_SOURCES) $(TEXINFOS) $(EXTRA_DIST)
|
DISTFILES = $(DIST_COMMON) $(DIST_SOURCES) $(TEXINFOS) $(EXTRA_DIST)
|
||||||
ACLOCAL = @ACLOCAL@
|
ACLOCAL = @ACLOCAL@
|
||||||
AMDEP_FALSE = @AMDEP_FALSE@
|
AMDEP_FALSE = @AMDEP_FALSE@
|
||||||
@ -167,46 +175,43 @@ sbindir = @sbindir@
|
|||||||
sharedstatedir = @sharedstatedir@
|
sharedstatedir = @sharedstatedir@
|
||||||
sysconfdir = @sysconfdir@
|
sysconfdir = @sysconfdir@
|
||||||
target_alias = @target_alias@
|
target_alias = @target_alias@
|
||||||
|
man_MANS = \
|
||||||
|
chage.1 \
|
||||||
|
chfn.1 \
|
||||||
|
chpasswd.8 \
|
||||||
|
chsh.1 \
|
||||||
|
expiry.1 \
|
||||||
|
faillog.5 \
|
||||||
|
faillog.8 \
|
||||||
|
getspnam.3 \
|
||||||
|
gpasswd.1 \
|
||||||
|
groupadd.8 \
|
||||||
|
groupdel.8 \
|
||||||
|
groupmod.8 \
|
||||||
|
groups.1 \
|
||||||
|
grpck.8 \
|
||||||
|
grpconv.8 \
|
||||||
|
grpunconv.8 \
|
||||||
|
id.1 \
|
||||||
|
lastlog.8 \
|
||||||
|
login.1 \
|
||||||
|
newgrp.1 \
|
||||||
|
passwd.1 \
|
||||||
|
passwd.5 \
|
||||||
|
porttime.5 \
|
||||||
|
pwck.8 \
|
||||||
|
pwconv.8 \
|
||||||
|
pwunconv.8 \
|
||||||
|
sg.1 \
|
||||||
|
shadow.3 \
|
||||||
|
shadow.5 \
|
||||||
|
su.1 \
|
||||||
|
useradd.8 \
|
||||||
|
userdel.8 \
|
||||||
|
usermod.8 \
|
||||||
|
vigr.8 \
|
||||||
|
vipw.8
|
||||||
|
|
||||||
# Links to missing pages:
|
|
||||||
# grpconv.8 \
|
|
||||||
# grpunconv.8 \
|
|
||||||
#man_MANS = \
|
|
||||||
# chage.1 \
|
|
||||||
# chfn.1 \
|
|
||||||
# chpasswd.8 \
|
|
||||||
# chsh.1 \
|
|
||||||
# expiry.1 \
|
|
||||||
# faillog.5 \
|
|
||||||
# faillog.8 \
|
|
||||||
# getspnam.3 \
|
|
||||||
# gpasswd.1 \
|
|
||||||
# groupadd.8 \
|
|
||||||
# groupdel.8 \
|
|
||||||
# groupmod.8 \
|
|
||||||
# groups.1 \
|
|
||||||
# grpck.8 \
|
|
||||||
# grpconv.8 \
|
|
||||||
# grpunconv.8 \
|
|
||||||
# id.1 \
|
|
||||||
# lastlog.8 \
|
|
||||||
# login.1 \
|
|
||||||
# newgrp.1 \
|
|
||||||
# passwd.1 \
|
|
||||||
# passwd.5 \
|
|
||||||
# porttime.5 \
|
|
||||||
# pwck.8 \
|
|
||||||
# pwconv.8 \
|
|
||||||
# pwunconv.8 \
|
|
||||||
# sg.1 \
|
|
||||||
# shadow.3 \
|
|
||||||
# shadow.5 \
|
|
||||||
# su.1 \
|
|
||||||
# useradd.8 \
|
|
||||||
# userdel.8 \
|
|
||||||
# usermod.8 \
|
|
||||||
# vigr.8 \
|
|
||||||
# vipw.8
|
|
||||||
EXTRA_DIST = $(man_MANS)
|
EXTRA_DIST = $(man_MANS)
|
||||||
all: all-am
|
all: all-am
|
||||||
|
|
||||||
@ -250,6 +255,186 @@ clean-libtool:
|
|||||||
distclean-libtool:
|
distclean-libtool:
|
||||||
-rm -f libtool
|
-rm -f libtool
|
||||||
uninstall-info-am:
|
uninstall-info-am:
|
||||||
|
install-man1: $(man1_MANS) $(man_MANS)
|
||||||
|
@$(NORMAL_INSTALL)
|
||||||
|
test -z "$(man1dir)" || $(mkdir_p) "$(DESTDIR)$(man1dir)"
|
||||||
|
@list='$(man1_MANS) $(dist_man1_MANS) $(nodist_man1_MANS)'; \
|
||||||
|
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
|
||||||
|
for i in $$l2; do \
|
||||||
|
case "$$i" in \
|
||||||
|
*.1*) list="$$list $$i" ;; \
|
||||||
|
esac; \
|
||||||
|
done; \
|
||||||
|
for i in $$list; do \
|
||||||
|
if test -f $(srcdir)/$$i; then file=$(srcdir)/$$i; \
|
||||||
|
else file=$$i; fi; \
|
||||||
|
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
|
||||||
|
case "$$ext" in \
|
||||||
|
1*) ;; \
|
||||||
|
*) ext='1' ;; \
|
||||||
|
esac; \
|
||||||
|
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
|
||||||
|
inst=`echo $$inst | sed -e 's/^.*\///'`; \
|
||||||
|
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
|
||||||
|
echo " $(INSTALL_DATA) '$$file' '$(DESTDIR)$(man1dir)/$$inst'"; \
|
||||||
|
$(INSTALL_DATA) "$$file" "$(DESTDIR)$(man1dir)/$$inst"; \
|
||||||
|
done
|
||||||
|
uninstall-man1:
|
||||||
|
@$(NORMAL_UNINSTALL)
|
||||||
|
@list='$(man1_MANS) $(dist_man1_MANS) $(nodist_man1_MANS)'; \
|
||||||
|
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
|
||||||
|
for i in $$l2; do \
|
||||||
|
case "$$i" in \
|
||||||
|
*.1*) list="$$list $$i" ;; \
|
||||||
|
esac; \
|
||||||
|
done; \
|
||||||
|
for i in $$list; do \
|
||||||
|
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
|
||||||
|
case "$$ext" in \
|
||||||
|
1*) ;; \
|
||||||
|
*) ext='1' ;; \
|
||||||
|
esac; \
|
||||||
|
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
|
||||||
|
inst=`echo $$inst | sed -e 's/^.*\///'`; \
|
||||||
|
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
|
||||||
|
echo " rm -f '$(DESTDIR)$(man1dir)/$$inst'"; \
|
||||||
|
rm -f "$(DESTDIR)$(man1dir)/$$inst"; \
|
||||||
|
done
|
||||||
|
install-man3: $(man3_MANS) $(man_MANS)
|
||||||
|
@$(NORMAL_INSTALL)
|
||||||
|
test -z "$(man3dir)" || $(mkdir_p) "$(DESTDIR)$(man3dir)"
|
||||||
|
@list='$(man3_MANS) $(dist_man3_MANS) $(nodist_man3_MANS)'; \
|
||||||
|
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
|
||||||
|
for i in $$l2; do \
|
||||||
|
case "$$i" in \
|
||||||
|
*.3*) list="$$list $$i" ;; \
|
||||||
|
esac; \
|
||||||
|
done; \
|
||||||
|
for i in $$list; do \
|
||||||
|
if test -f $(srcdir)/$$i; then file=$(srcdir)/$$i; \
|
||||||
|
else file=$$i; fi; \
|
||||||
|
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
|
||||||
|
case "$$ext" in \
|
||||||
|
3*) ;; \
|
||||||
|
*) ext='3' ;; \
|
||||||
|
esac; \
|
||||||
|
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
|
||||||
|
inst=`echo $$inst | sed -e 's/^.*\///'`; \
|
||||||
|
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
|
||||||
|
echo " $(INSTALL_DATA) '$$file' '$(DESTDIR)$(man3dir)/$$inst'"; \
|
||||||
|
$(INSTALL_DATA) "$$file" "$(DESTDIR)$(man3dir)/$$inst"; \
|
||||||
|
done
|
||||||
|
uninstall-man3:
|
||||||
|
@$(NORMAL_UNINSTALL)
|
||||||
|
@list='$(man3_MANS) $(dist_man3_MANS) $(nodist_man3_MANS)'; \
|
||||||
|
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
|
||||||
|
for i in $$l2; do \
|
||||||
|
case "$$i" in \
|
||||||
|
*.3*) list="$$list $$i" ;; \
|
||||||
|
esac; \
|
||||||
|
done; \
|
||||||
|
for i in $$list; do \
|
||||||
|
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
|
||||||
|
case "$$ext" in \
|
||||||
|
3*) ;; \
|
||||||
|
*) ext='3' ;; \
|
||||||
|
esac; \
|
||||||
|
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
|
||||||
|
inst=`echo $$inst | sed -e 's/^.*\///'`; \
|
||||||
|
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
|
||||||
|
echo " rm -f '$(DESTDIR)$(man3dir)/$$inst'"; \
|
||||||
|
rm -f "$(DESTDIR)$(man3dir)/$$inst"; \
|
||||||
|
done
|
||||||
|
install-man5: $(man5_MANS) $(man_MANS)
|
||||||
|
@$(NORMAL_INSTALL)
|
||||||
|
test -z "$(man5dir)" || $(mkdir_p) "$(DESTDIR)$(man5dir)"
|
||||||
|
@list='$(man5_MANS) $(dist_man5_MANS) $(nodist_man5_MANS)'; \
|
||||||
|
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
|
||||||
|
for i in $$l2; do \
|
||||||
|
case "$$i" in \
|
||||||
|
*.5*) list="$$list $$i" ;; \
|
||||||
|
esac; \
|
||||||
|
done; \
|
||||||
|
for i in $$list; do \
|
||||||
|
if test -f $(srcdir)/$$i; then file=$(srcdir)/$$i; \
|
||||||
|
else file=$$i; fi; \
|
||||||
|
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
|
||||||
|
case "$$ext" in \
|
||||||
|
5*) ;; \
|
||||||
|
*) ext='5' ;; \
|
||||||
|
esac; \
|
||||||
|
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
|
||||||
|
inst=`echo $$inst | sed -e 's/^.*\///'`; \
|
||||||
|
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
|
||||||
|
echo " $(INSTALL_DATA) '$$file' '$(DESTDIR)$(man5dir)/$$inst'"; \
|
||||||
|
$(INSTALL_DATA) "$$file" "$(DESTDIR)$(man5dir)/$$inst"; \
|
||||||
|
done
|
||||||
|
uninstall-man5:
|
||||||
|
@$(NORMAL_UNINSTALL)
|
||||||
|
@list='$(man5_MANS) $(dist_man5_MANS) $(nodist_man5_MANS)'; \
|
||||||
|
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
|
||||||
|
for i in $$l2; do \
|
||||||
|
case "$$i" in \
|
||||||
|
*.5*) list="$$list $$i" ;; \
|
||||||
|
esac; \
|
||||||
|
done; \
|
||||||
|
for i in $$list; do \
|
||||||
|
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
|
||||||
|
case "$$ext" in \
|
||||||
|
5*) ;; \
|
||||||
|
*) ext='5' ;; \
|
||||||
|
esac; \
|
||||||
|
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
|
||||||
|
inst=`echo $$inst | sed -e 's/^.*\///'`; \
|
||||||
|
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
|
||||||
|
echo " rm -f '$(DESTDIR)$(man5dir)/$$inst'"; \
|
||||||
|
rm -f "$(DESTDIR)$(man5dir)/$$inst"; \
|
||||||
|
done
|
||||||
|
install-man8: $(man8_MANS) $(man_MANS)
|
||||||
|
@$(NORMAL_INSTALL)
|
||||||
|
test -z "$(man8dir)" || $(mkdir_p) "$(DESTDIR)$(man8dir)"
|
||||||
|
@list='$(man8_MANS) $(dist_man8_MANS) $(nodist_man8_MANS)'; \
|
||||||
|
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
|
||||||
|
for i in $$l2; do \
|
||||||
|
case "$$i" in \
|
||||||
|
*.8*) list="$$list $$i" ;; \
|
||||||
|
esac; \
|
||||||
|
done; \
|
||||||
|
for i in $$list; do \
|
||||||
|
if test -f $(srcdir)/$$i; then file=$(srcdir)/$$i; \
|
||||||
|
else file=$$i; fi; \
|
||||||
|
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
|
||||||
|
case "$$ext" in \
|
||||||
|
8*) ;; \
|
||||||
|
*) ext='8' ;; \
|
||||||
|
esac; \
|
||||||
|
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
|
||||||
|
inst=`echo $$inst | sed -e 's/^.*\///'`; \
|
||||||
|
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
|
||||||
|
echo " $(INSTALL_DATA) '$$file' '$(DESTDIR)$(man8dir)/$$inst'"; \
|
||||||
|
$(INSTALL_DATA) "$$file" "$(DESTDIR)$(man8dir)/$$inst"; \
|
||||||
|
done
|
||||||
|
uninstall-man8:
|
||||||
|
@$(NORMAL_UNINSTALL)
|
||||||
|
@list='$(man8_MANS) $(dist_man8_MANS) $(nodist_man8_MANS)'; \
|
||||||
|
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
|
||||||
|
for i in $$l2; do \
|
||||||
|
case "$$i" in \
|
||||||
|
*.8*) list="$$list $$i" ;; \
|
||||||
|
esac; \
|
||||||
|
done; \
|
||||||
|
for i in $$list; do \
|
||||||
|
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
|
||||||
|
case "$$ext" in \
|
||||||
|
8*) ;; \
|
||||||
|
*) ext='8' ;; \
|
||||||
|
esac; \
|
||||||
|
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
|
||||||
|
inst=`echo $$inst | sed -e 's/^.*\///'`; \
|
||||||
|
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
|
||||||
|
echo " rm -f '$(DESTDIR)$(man8dir)/$$inst'"; \
|
||||||
|
rm -f "$(DESTDIR)$(man8dir)/$$inst"; \
|
||||||
|
done
|
||||||
tags: TAGS
|
tags: TAGS
|
||||||
TAGS:
|
TAGS:
|
||||||
|
|
||||||
@ -286,8 +471,11 @@ distdir: $(DISTFILES)
|
|||||||
done
|
done
|
||||||
check-am: all-am
|
check-am: all-am
|
||||||
check: check-am
|
check: check-am
|
||||||
all-am: Makefile
|
all-am: Makefile $(MANS)
|
||||||
installdirs:
|
installdirs:
|
||||||
|
for dir in "$(DESTDIR)$(man1dir)" "$(DESTDIR)$(man3dir)" "$(DESTDIR)$(man5dir)" "$(DESTDIR)$(man8dir)"; do \
|
||||||
|
test -z "$$dir" || $(mkdir_p) "$$dir"; \
|
||||||
|
done
|
||||||
install: install-am
|
install: install-am
|
||||||
install-exec: install-exec-am
|
install-exec: install-exec-am
|
||||||
install-data: install-data-am
|
install-data: install-data-am
|
||||||
@ -330,13 +518,13 @@ info: info-am
|
|||||||
|
|
||||||
info-am:
|
info-am:
|
||||||
|
|
||||||
install-data-am:
|
install-data-am: install-man
|
||||||
|
|
||||||
install-exec-am:
|
install-exec-am:
|
||||||
|
|
||||||
install-info: install-info-am
|
install-info: install-info-am
|
||||||
|
|
||||||
install-man:
|
install-man: install-man1 install-man3 install-man5 install-man8
|
||||||
|
|
||||||
installcheck-am:
|
installcheck-am:
|
||||||
|
|
||||||
@ -356,17 +544,22 @@ ps: ps-am
|
|||||||
|
|
||||||
ps-am:
|
ps-am:
|
||||||
|
|
||||||
uninstall-am: uninstall-info-am
|
uninstall-am: uninstall-info-am uninstall-man
|
||||||
|
|
||||||
|
uninstall-man: uninstall-man1 uninstall-man3 uninstall-man5 \
|
||||||
|
uninstall-man8
|
||||||
|
|
||||||
.PHONY: all all-am check check-am clean clean-generic clean-libtool \
|
.PHONY: all all-am check check-am clean clean-generic clean-libtool \
|
||||||
distclean distclean-generic distclean-libtool distdir dvi \
|
distclean distclean-generic distclean-libtool distdir dvi \
|
||||||
dvi-am html html-am info info-am install install-am \
|
dvi-am html html-am info info-am install install-am \
|
||||||
install-data install-data-am install-exec install-exec-am \
|
install-data install-data-am install-exec install-exec-am \
|
||||||
install-info install-info-am install-man install-strip \
|
install-info install-info-am install-man install-man1 \
|
||||||
|
install-man3 install-man5 install-man8 install-strip \
|
||||||
installcheck installcheck-am installdirs maintainer-clean \
|
installcheck installcheck-am installdirs maintainer-clean \
|
||||||
maintainer-clean-generic mostlyclean mostlyclean-generic \
|
maintainer-clean-generic mostlyclean mostlyclean-generic \
|
||||||
mostlyclean-libtool pdf pdf-am ps ps-am uninstall uninstall-am \
|
mostlyclean-libtool pdf pdf-am ps ps-am uninstall uninstall-am \
|
||||||
uninstall-info-am
|
uninstall-info-am uninstall-man uninstall-man1 uninstall-man3 \
|
||||||
|
uninstall-man5 uninstall-man8
|
||||||
|
|
||||||
# Tell versions [3.59,3.63) of GNU make to not export all variables.
|
# Tell versions [3.59,3.63) of GNU make to not export all variables.
|
||||||
# Otherwise a system limit (for SysV at least) may be exceeded.
|
# Otherwise a system limit (for SysV at least) may be exceeded.
|
||||||
|
105
man/it/chage.1
Normal file
105
man/it/chage.1
Normal file
@ -0,0 +1,105 @@
|
|||||||
|
.\" This file was generated with po4a. Translate the source file.
|
||||||
|
.\"
|
||||||
|
.\"$Id: chage.1,v 1.1 2005/04/21 21:03:15 kloczek Exp $
|
||||||
|
.\" Copyright 1990 - 1994 Julianne Frances Haugh
|
||||||
|
.\" All rights reserved.
|
||||||
|
.\"
|
||||||
|
.\" Redistribution and use in source and binary forms, with or without
|
||||||
|
.\" modification, are permitted provided that the following conditions
|
||||||
|
.\" are met:
|
||||||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer.
|
||||||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||||||
|
.\" documentation and/or other materials provided with the distribution.
|
||||||
|
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||||
|
.\" may be used to endorse or promote products derived from this software
|
||||||
|
.\" without specific prior written permission.
|
||||||
|
.\"
|
||||||
|
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||||
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||||
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||||
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
|
.\" SUCH DAMAGE.
|
||||||
|
.TH CHAGE 1
|
||||||
|
.SH NOME
|
||||||
|
chage \- cambia le informazioni sulla scadenza della password
|
||||||
|
.SH SINTASSI
|
||||||
|
.TP 6
|
||||||
|
\fBchage\fP [\fB\-m\fP \fIgg_min\fP] [\fB\-M\fP \fIgg_max\fP] [\fB\-d\fP \fIultimo_giorno\fP] [\fB\-I\fP \fIinattività\fP]
|
||||||
|
[\fB\-E\fP \fIdata_scadenza\fP] [\fB\-W\fP \fIgg_avviso\fP] \fIutente\fP
|
||||||
|
.TP 6
|
||||||
|
\fBchage\fP \fB\-l\fP \fIutente\fP
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
\fBchage\fP modifica il numero minimo di giorni tra i cambi di password e la
|
||||||
|
data dell'ultimo cambio. Queste informazioni sono usate dal sistema per
|
||||||
|
determinare quando un utente deve cambiare la propria password.
|
||||||
|
.PP
|
||||||
|
L'uso del comando \fBchage\fP è permesso solo all'utente root, tranne per
|
||||||
|
l'opzione \fB\-l\fP, che può essere usata da un utente non privilegiato per
|
||||||
|
conoscere la scadenza della propria password o dell'account.
|
||||||
|
.SH OPZIONI
|
||||||
|
Il comando \fBchage\fP accetta le seguenti opzioni:
|
||||||
|
.IP "\fB\-d\fP \fIultimo_giorno\fP"
|
||||||
|
Imposta la data dell'ultimo cambio della password, espressa come il numero
|
||||||
|
di giorni trascorsi dal 1 gennaio 1970. La data può anche essere
|
||||||
|
specificata nel formato AAAA\-MM\-GG o nella notazione comunemente usata nel
|
||||||
|
proprio paese.
|
||||||
|
.IP "\fB\-E\fP \fIdata_scadenza\fP"
|
||||||
|
Imposta la data in cui l'account dell'utente non sarà più
|
||||||
|
accessibile. L'opzione \fIdata_scadenza\fP indica la data in cui l'account
|
||||||
|
viene bloccato, espressa come il numero di giorni trascorsi dal 1 gennaio
|
||||||
|
1970. La data può anche essere specificata nel formato AAAA\-MM\-GG o nella
|
||||||
|
notazione comunemente usata nel proprio paese. Un utente con l'account
|
||||||
|
bloccato deve contattare l'amministratore prima di poter usare ancora il
|
||||||
|
sistema.
|
||||||
|
.IP "\fB\-I\fP \fIinattività\fP"
|
||||||
|
Imposta il numero di giorni di inattività dopo la scadenza della password
|
||||||
|
dopo i quali l'account viene bloccato. L'opzione \fIinattività\fP indica il
|
||||||
|
numero di giorni di inattività; un valore pari a zero disabilita questa
|
||||||
|
funzione. Un utente con l'account bloccato deve contattare l'amministratore
|
||||||
|
prima di poter usare ancora il sistema.
|
||||||
|
.IP "\fB\-m\fP \fIgg_min\fP"
|
||||||
|
Imposta il numero minimo di giorni tra i cambi di password. Un valore pari a
|
||||||
|
zero indica che l'utente può cambiare la propria password in qualsiasi
|
||||||
|
momento.
|
||||||
|
.IP "\fB\-M\fP \fIgg_max\fP"
|
||||||
|
Imposta il numero massimo di giorni di validità di una password. Quando la
|
||||||
|
somma di \fIgg_max\fP e \fIgg_min\fP è inferiore ai giorni attualmente trascorsi,
|
||||||
|
l'utente è obbligato a cambiare la password prima di poter usare ancora il
|
||||||
|
proprio account. Questo evento può essere reso noto in anticipo usando
|
||||||
|
l'opzione \fB\-W\fP, che fornisce un preavviso all'utente.
|
||||||
|
.IP "\fB\-W\fP \fIgg_avviso\fP"
|
||||||
|
Imposta il numero di giorni di preavviso prima che sia obbligatorio cambiare
|
||||||
|
la password. L'opzione \fIgg_avviso\fP indica il numero di giorni prima della
|
||||||
|
scadenza della password in cui l'utente viene avvertito dell'imminente
|
||||||
|
scadenza.
|
||||||
|
.PP
|
||||||
|
Se non viene specificata nessuna opzione, \fBchage\fP opera in modalità
|
||||||
|
interattiva, mostrando tra parentesi quadre il valore attuale di ciascun
|
||||||
|
campo e chiedendo il nuovo valore all'utente. Inserire un nuovo valore per
|
||||||
|
modificare il campo, oppure lasciare la riga vuota per continuare a usare il
|
||||||
|
valore attuale.
|
||||||
|
.SH NOTA
|
||||||
|
\fBchage\fP richiede che il file delle shadow password sia disponibile. Non è
|
||||||
|
possibile usare questo programma se le password sono memorizzate nel file
|
||||||
|
passwd.
|
||||||
|
.SH FILE
|
||||||
|
\fI/etc/passwd\fP \- informazioni sugli account degli utenti
|
||||||
|
.br
|
||||||
|
\fI/etc/shadow\fP \- informazioni sicure sugli account degli utenti
|
||||||
|
.SH "VEDERE ANCHE"
|
||||||
|
\fBpasswd\fP(5), \fBshadow\fP(5)
|
||||||
|
.SH AUTORE
|
||||||
|
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
|
||||||
|
.SH TRADUZIONE
|
||||||
|
.nf
|
||||||
|
Giuseppe Sacco <eppesuig@debian.org>, 2005
|
||||||
|
Danilo Piazzalunga <danilopiazza@libero.it>, 2005
|
||||||
|
.fi
|
68
man/it/chfn.1
Normal file
68
man/it/chfn.1
Normal file
@ -0,0 +1,68 @@
|
|||||||
|
.\" This file was generated with po4a. Translate the source file.
|
||||||
|
.\"
|
||||||
|
.\"$Id: chfn.1,v 1.5 2005/04/21 21:03:15 kloczek Exp $
|
||||||
|
.\" Copyright 1990 - 1994 Julianne Frances Haugh
|
||||||
|
.\" All rights reserved.
|
||||||
|
.\"
|
||||||
|
.\" Redistribution and use in source and binary forms, with or without
|
||||||
|
.\" modification, are permitted provided that the following conditions
|
||||||
|
.\" are met:
|
||||||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer.
|
||||||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||||||
|
.\" documentation and/or other materials provided with the distribution.
|
||||||
|
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||||
|
.\" may be used to endorse or promote products derived from this software
|
||||||
|
.\" without specific prior written permission.
|
||||||
|
.\"
|
||||||
|
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||||
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||||
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||||
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
|
.\" SUCH DAMAGE.
|
||||||
|
.TH CHFN 1
|
||||||
|
.SH NOME
|
||||||
|
chfn \- cambia le informazioni personali dell'utente
|
||||||
|
.SH SINTASSI
|
||||||
|
.TP 5
|
||||||
|
\fBchfn\fP
|
||||||
|
[\fB\-f\fP \fInome_completo\fP] [\fB\-r\fP \fInumero_stanza\fP] [\fB\-w\fP \fItel_lavoro\fP]
|
||||||
|
[\fB\-h\fP \fItel_casa\fP] [\fB\-o\fP \fIaltro\fP] [\fIutente\fP]
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
\fBchfn\fP permette di cambiare informazioni quali il nome completo, il numero
|
||||||
|
dell'ufficio, il telefono dell'ufficio e il numero telefonico di casa
|
||||||
|
dell'utente. Queste informazioni sono generalmente mostrate da \fBfinger\fP(1)
|
||||||
|
e programmi simili. Un utente qualsiasi può modificare solo i propri dati,
|
||||||
|
mentre l'amministratore può cambiare i dati di ogni account. Inoltre,
|
||||||
|
soltatnto all'amministratore è permesso usare l'opzione \fB\-o\fP per cambiare
|
||||||
|
le parti non definite del campo GECOS.
|
||||||
|
.PP
|
||||||
|
L'unica limitazione sul contenuto dei campi è che non possono essere
|
||||||
|
presenti virgole, due punti o segni di uguaglianza, né altri caratteri di
|
||||||
|
controllo. Fa eccezione il campo \fIaltro\fP, in cui sono memorizzare
|
||||||
|
informazioni di accounting usate da altre applicazioni.
|
||||||
|
.PP
|
||||||
|
Se non viene specificata nessuna opzione, \fBchfn\fP opera in modalità
|
||||||
|
interattiva, mostrando tra parentesi quadre il valore attuale di ciascun
|
||||||
|
campo e chiedendo il nuovo valore all'utente. Inserire un nuovo valore per
|
||||||
|
modificare il campo, oppure lasciare la riga vuota per continuare a usare il
|
||||||
|
valore attuale. Le informazioni modificate sono quelle relative all'utente
|
||||||
|
corrente.
|
||||||
|
.SH FILE
|
||||||
|
\fI/etc/passwd\fP \- informazioni sugli account degli utenti
|
||||||
|
.SH "VEDERE ANCHE"
|
||||||
|
\fBpasswd\fP(5)
|
||||||
|
.SH AUTORE
|
||||||
|
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
|
||||||
|
.SH TRADUZIONE
|
||||||
|
.nf
|
||||||
|
Giuseppe Sacco <eppesuig@debian.org>, 2005
|
||||||
|
Danilo Piazzalunga <danilopiazza@libero.it>, 2005
|
||||||
|
.fi
|
68
man/it/chpasswd.8
Normal file
68
man/it/chpasswd.8
Normal file
@ -0,0 +1,68 @@
|
|||||||
|
.\" This file was generated with po4a. Translate the source file.
|
||||||
|
.\"
|
||||||
|
.\"$Id: chpasswd.8,v 1.1 2005/04/21 21:03:15 kloczek Exp $
|
||||||
|
.\" Copyright 1991, Julianne Frances Haugh
|
||||||
|
.\" All rights reserved.
|
||||||
|
.\"
|
||||||
|
.\" Redistribution and use in source and binary forms, with or without
|
||||||
|
.\" modification, are permitted provided that the following conditions
|
||||||
|
.\" are met:
|
||||||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer.
|
||||||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||||||
|
.\" documentation and/or other materials provided with the distribution.
|
||||||
|
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||||
|
.\" may be used to endorse or promote products derived from this software
|
||||||
|
.\" without specific prior written permission.
|
||||||
|
.\"
|
||||||
|
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||||
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||||
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||||
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
|
.\" SUCH DAMAGE.
|
||||||
|
.TH CHPASSWD 8
|
||||||
|
.SH NOME
|
||||||
|
chpasswd \- aggiorna le password in modo non interattivo
|
||||||
|
.SH SINTASSI
|
||||||
|
\fBchpasswd\fP [\fBopzioni\fP]
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
\fBchpasswd\fP legge da standard input un elenco di coppie di nomi utente e
|
||||||
|
password e usa queste informazioni per aggiornare un gruppo di utenti
|
||||||
|
esistenti. Ciascuna riga usa il formato:
|
||||||
|
.sp 1
|
||||||
|
\fInome_utente\fP:\fIpassword\fP
|
||||||
|
.sp 1
|
||||||
|
Come impostazione predefinita, si devono fornire password in
|
||||||
|
chiaro. L'algoritmo di cifratura predefinito è DES. Se sono presenti,
|
||||||
|
vengono aggiornate anche le informazioni sulla durata delle password.
|
||||||
|
.PP
|
||||||
|
Questo comando è appositamente pensato per grossi sistemi in cui si abbia
|
||||||
|
la necessità di creare molti account nello stesso momento.
|
||||||
|
.SH OPZIONI
|
||||||
|
Il comando \fBchpasswd\fP accetta le seguenti opzioni:
|
||||||
|
.IP "\fB\-e\fP, \fB\-\-encrypted\fP"
|
||||||
|
Le password fornite sono in forma cifrata.
|
||||||
|
.IP "\fB\-h\fP, \fB\-\-help\fP"
|
||||||
|
Mostra un messaggio di aiuto ed esce.
|
||||||
|
.IP "\fB\-m\fP, \fB\-\-md5\fP"
|
||||||
|
Usa la cifratura MD5 anziché DES quando le password fornite non sono
|
||||||
|
cifrate.
|
||||||
|
.SH AVVISI/CAVEAT
|
||||||
|
Evitare che il file usato come input per il comando \fBchpasswd\fP sia
|
||||||
|
accessibile in lettura se contiene password non cifrate.
|
||||||
|
.SH "VEDERE ANCHE"
|
||||||
|
\fBpasswd\fP(1), \fBnewusers\fP(8), \fBuseradd\fP(8)
|
||||||
|
.SH AUTORE
|
||||||
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
.SH TRADUZIONE
|
||||||
|
.nf
|
||||||
|
Giuseppe Sacco <eppesuig@debian.org>, 2005
|
||||||
|
Danilo Piazzalunga <danilopiazza@libero.it>, 2005
|
||||||
|
.fi
|
69
man/it/chsh.1
Normal file
69
man/it/chsh.1
Normal file
@ -0,0 +1,69 @@
|
|||||||
|
.\" This file was generated with po4a. Translate the source file.
|
||||||
|
.\"
|
||||||
|
.\"$Id: chsh.1,v 1.3 2005/04/21 21:03:16 kloczek Exp $
|
||||||
|
.\" Copyright 1990, Julianne Frances Haugh
|
||||||
|
.\" All rights reserved.
|
||||||
|
.\"
|
||||||
|
.\" Redistribution and use in source and binary forms, with or without
|
||||||
|
.\" modification, are permitted provided that the following conditions
|
||||||
|
.\" are met:
|
||||||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer.
|
||||||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||||||
|
.\" documentation and/or other materials provided with the distribution.
|
||||||
|
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||||
|
.\" may be used to endorse or promote products derived from this software
|
||||||
|
.\" without specific prior written permission.
|
||||||
|
.\"
|
||||||
|
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||||
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||||
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||||
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
|
.\" SUCH DAMAGE.
|
||||||
|
.TH CHSH 1
|
||||||
|
.SH NOME
|
||||||
|
chsh \- cambia la shell di login
|
||||||
|
.SH SINTASSI
|
||||||
|
.TP 5
|
||||||
|
\fBchsh\fP [\fB\-s\fP \fIshell_di_login\fP] [\fIutente\fP]
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
\fBchsh\fP cambia la shell di login dell'utente, in altre parole determina il
|
||||||
|
comando iniziale eseguito quando un utente fa il login. Un utente qualsiasi
|
||||||
|
può cambiare la shell di login solo per il proprio account, mentre
|
||||||
|
l'amministratore può cambiare la shell di login per ogni account.
|
||||||
|
.PP
|
||||||
|
L'unica limitazione sulla scelta della shell di login è che il nome del
|
||||||
|
comando deve essere presente in \fI/etc/shells\fP; fa eccezione
|
||||||
|
l'amministratore di sistema, che è libero di scegliere qualsiasi valore. Un
|
||||||
|
account con una shell di login limitata non può cambiare la propria shell
|
||||||
|
di login. Per questo motivo è sconsigliato includere \fB/bin/rsh\fP in
|
||||||
|
\fI/etc/shells\fP: se accidentalmente un utente selezionasse una shell
|
||||||
|
limitata, non potrebbe più tornare alla shell di login che usava
|
||||||
|
originariamente.
|
||||||
|
.PP
|
||||||
|
.SH OPZIONI
|
||||||
|
Se non viene specificata l'opzione \fB\-s\fP, \fBchsh\fP opera in modalità
|
||||||
|
interattiva, mostrando tra parentesi quadre la shell di login attuale e
|
||||||
|
chiedendo all'utente di selezionarne una nuova. Inserire un nuovo valore per
|
||||||
|
cambiare la shell, oppure lasciare la riga vuota per continuare a usare
|
||||||
|
quella attuale.
|
||||||
|
.SH FILE
|
||||||
|
\fI/etc/passwd\fP \- informazioni sugli account degli utenti
|
||||||
|
.br
|
||||||
|
\fI/etc/shells\fP \- elenco delle shell di login ammesse
|
||||||
|
.SH "VEDERE ANCHE"
|
||||||
|
\fBchfn\fP(1), \fBpasswd\fP(5)
|
||||||
|
.SH AUTORE
|
||||||
|
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
|
||||||
|
.SH TRADUZIONE
|
||||||
|
.nf
|
||||||
|
Giuseppe Sacco <eppesuig@debian.org>, 2005
|
||||||
|
Danilo Piazzalunga <danilopiazza@libero.it>, 2005
|
||||||
|
.fi
|
54
man/it/expiry.1
Normal file
54
man/it/expiry.1
Normal file
@ -0,0 +1,54 @@
|
|||||||
|
.\" This file was generated with po4a. Translate the source file.
|
||||||
|
.\"
|
||||||
|
.\"$Id: expiry.1,v 1.1 2005/04/21 21:03:16 kloczek Exp $
|
||||||
|
.\" Copyright 1990 - 1994 Julianne Frances Haugh
|
||||||
|
.\" All rights reserved.
|
||||||
|
.\" Modified for expiry by Ben Collins <bcollins@debian.org>, 1999
|
||||||
|
.\"
|
||||||
|
.\" Redistribution and use in source and binary forms, with or without
|
||||||
|
.\" modification, are permitted provided that the following conditions
|
||||||
|
.\" are met:
|
||||||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer.
|
||||||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||||||
|
.\" documentation and/or other materials provided with the distribution.
|
||||||
|
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||||
|
.\" may be used to endorse or promote products derived from this software
|
||||||
|
.\" without specific prior written permission.
|
||||||
|
.\"
|
||||||
|
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||||
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||||
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||||
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
|
.\" SUCH DAMAGE.
|
||||||
|
.\"
|
||||||
|
.TH EXPIRY 1
|
||||||
|
.SH NOME
|
||||||
|
expiry \- controlla e fa rispettare la scadenza della password
|
||||||
|
.SH SINTASSI
|
||||||
|
.TP 6
|
||||||
|
\fBexpiry\fP [\fB\-c\fP] [\fB\-f\fP]
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
\fBexpiry\fP controlla (\fB\-c\fP) la scadenza della password in uso e, se
|
||||||
|
necessario, richiede (\fB\-f\fP) che venga cambiata. Questo comando può essere
|
||||||
|
eseguito da un utente qualsiasi.
|
||||||
|
.SH FILE
|
||||||
|
\fI/etc/passwd\fP \- informazioni sugli account degli utenti
|
||||||
|
.br
|
||||||
|
\fI/etc/shadow\fP \- informazioni sicure sugli account degli utenti
|
||||||
|
.SH "VEDERE ANCHE"
|
||||||
|
\fBpasswd\fP(5), \fBshadow\fP(5)
|
||||||
|
.SH AUTORE
|
||||||
|
Ben Collins <bcollins@debian.org>
|
||||||
|
.SH TRADUZIONE
|
||||||
|
.nf
|
||||||
|
Giuseppe Sacco <eppesuig@debian.org>, 2005
|
||||||
|
Danilo Piazzalunga <danilopiazza@libero.it>, 2005
|
||||||
|
.fi
|
62
man/it/faillog.5
Normal file
62
man/it/faillog.5
Normal file
@ -0,0 +1,62 @@
|
|||||||
|
.\" This file was generated with po4a. Translate the source file.
|
||||||
|
.\"
|
||||||
|
.\"$Id: faillog.5,v 1.1 2005/04/21 21:03:16 kloczek Exp $
|
||||||
|
.\" Copyright 1989 - 1994, Julianne Frances Haugh
|
||||||
|
.\" All rights reserved.
|
||||||
|
.\"
|
||||||
|
.\" Redistribution and use in source and binary forms, with or without
|
||||||
|
.\" modification, are permitted provided that the following conditions
|
||||||
|
.\" are met:
|
||||||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer.
|
||||||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||||||
|
.\" documentation and/or other materials provided with the distribution.
|
||||||
|
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||||
|
.\" may be used to endorse or promote products derived from this software
|
||||||
|
.\" without specific prior written permission.
|
||||||
|
.\"
|
||||||
|
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||||
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||||
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||||
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
|
.\" SUCH DAMAGE.
|
||||||
|
.TH FAILLOG 5
|
||||||
|
.SH NOME
|
||||||
|
faillog \- file di log degli accessi falliti
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
\fI/var/log/faillog\fP mantiene i conteggi e i limiti dei tentativi di accesso
|
||||||
|
falliti per ciascun account. Il file è composto da record di lunghezza
|
||||||
|
fissa, indicizzati dal valore numerico di UID. Ciascun record contiene il
|
||||||
|
conteggio degli accessi falliti a partire dall'ultimo login corretto, il
|
||||||
|
numero massimo di tentativi permessi prima che l'account venga disabilitato,
|
||||||
|
il terminale sul quale l'ultimo tentativo fallito è avvenuto e infine la
|
||||||
|
data in cui è avvenuto.
|
||||||
|
.PP
|
||||||
|
La struttura del file è la seguente:
|
||||||
|
.DS
|
||||||
|
|
||||||
|
struct faillog {
|
||||||
|
short fail_cnt;
|
||||||
|
short fail_max;
|
||||||
|
char fail_line[12];
|
||||||
|
time_t fail_time;
|
||||||
|
};
|
||||||
|
.DE
|
||||||
|
.SH FILE
|
||||||
|
\fI/var/log/faillog\fP \- log degli accessi falliti
|
||||||
|
.SH "VEDERE ANCHE"
|
||||||
|
\fBfaillog\fP(8)
|
||||||
|
.SH AUTORE
|
||||||
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
.SH TRADUZIONE
|
||||||
|
.nf
|
||||||
|
Giuseppe Sacco <eppesuig@debian.org>, 2005
|
||||||
|
Danilo Piazzalunga <danilopiazza@libero.it>, 2005
|
||||||
|
.fi
|
83
man/it/faillog.8
Normal file
83
man/it/faillog.8
Normal file
@ -0,0 +1,83 @@
|
|||||||
|
.\" This file was generated with po4a. Translate the source file.
|
||||||
|
.\"
|
||||||
|
.\" $Id: faillog.8,v 1.1 2005/04/21 21:03:16 kloczek Exp $
|
||||||
|
.\" Copyright 1989 - 1994, Julianne Frances Haugh
|
||||||
|
.\" All rights reserved.
|
||||||
|
.\"
|
||||||
|
.\" Redistribution and use in source and binary forms, with or without
|
||||||
|
.\" modification, are permitted provided that the following conditions
|
||||||
|
.\" are met:
|
||||||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer.
|
||||||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||||||
|
.\" documentation and/or other materials provided with the distribution.
|
||||||
|
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||||
|
.\" may be used to endorse or promote products derived from this software
|
||||||
|
.\" without specific prior written permission.
|
||||||
|
.\"
|
||||||
|
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||||
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||||
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||||
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
|
.\" SUCH DAMAGE.
|
||||||
|
.TH FAILLOG 8
|
||||||
|
.SH NOME
|
||||||
|
faillog \- mostra i conteggi e imposta i limiti degli accessi falliti
|
||||||
|
.SH SINTASSI
|
||||||
|
.TP 6
|
||||||
|
\fBfaillog\fP [\fBopzioni\fP]
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
\fBfaillog\fP mostra il log degli accessi falliti, contenuto nel file
|
||||||
|
\fI/var/log/faillog\fP; può anche essere usato per impostare i conteggi e i
|
||||||
|
limiti dei tentativi falliti. Eseguire \fBfaillog\fP senza argomenti per
|
||||||
|
ottenere un elenco degli utenti che hanno fallito almeno un tentativo di
|
||||||
|
accesso.
|
||||||
|
.SH OPZIONI
|
||||||
|
Il comando \fBfaillog\fP accetta le seguenti opzioni:
|
||||||
|
.IP "\fB\-a\fP, \fB\-\-all\fP"
|
||||||
|
Mostra i record degli accessi falliti per tutti gli utenti.
|
||||||
|
.IP "\fB\-h\fP, \fB\-\-help\fP"
|
||||||
|
Mostra un messaggio di aiuto ed esce.
|
||||||
|
.IP "\fB\-l\fP, \fB\-\-lock\-time\fP \fISEC\fP"
|
||||||
|
Blocca l'account per \fISEC\fP secondi dopo un tentativo di accesso fallito.
|
||||||
|
.IP "\fB\-m\fP, \fB\-\-maximum\fP \fIMAX\fP"
|
||||||
|
Imposta a \fIMAX\fP il numero massimo di tentativi permessi prima che l'account
|
||||||
|
venga disabilitato. Un valore pari a zero significa che non viene posto
|
||||||
|
nessun limite sul numero di tentativi falliti. Per impedire un possibile
|
||||||
|
attacco di tipo Denial of Service al sistema, si consiglia di impostare
|
||||||
|
questo valore a 0 per \fBroot\fP.
|
||||||
|
.IP "\fB\-r\fP, \fB\-\-reset\fP"
|
||||||
|
Azzera i conteggi degli accessi falliti per tutti gli utenti, o per un
|
||||||
|
utente solo se usato con l'opzione \fB\-u\fP \fILOGIN\fP. Per usare questa opzione
|
||||||
|
è richiesto l'accesso in scrittura a \fI/var/log/faillog\fP.
|
||||||
|
.IP "\fB\-t\fP, \fB\-\-time\fP \fIGIORNI\fP"
|
||||||
|
Mostra i record degli accessi falliti più recenti di un numero di
|
||||||
|
\fIGIORNI\fP. L'opzione \fB\-t\fP ha la precedenza sull'uso di \fB\-u\fP.
|
||||||
|
.IP "\fB\-u\fP, \fB\-\-user\fP \fILOGIN\fP"
|
||||||
|
Mostra il record degli accessi falliti o, se sono state usate con le opzioni
|
||||||
|
\fB\-r\fP, \fB\-m\fP o \fB\-l\fP, imposta conteggi e limiti solo per l'utente
|
||||||
|
specificato da \fILOGIN\fP.
|
||||||
|
.SH AVVISI/CAVEAT
|
||||||
|
\fBfaillog\fP mostra solo gli utenti che non hanno effettuato nessun accesso
|
||||||
|
corretto dopo l'ultimo tentativo fallito. Un utente che abbia completato
|
||||||
|
correttamente un accesso dopo l'ultimo tentativo fallito è mostrato solo se
|
||||||
|
viene richiesto esplicitamente con l'opzione \fB\-u\fP o se viene richiesto di
|
||||||
|
mostrare tutti gli utenti con l'opzione \fB\-a\fP.
|
||||||
|
.SH FILE
|
||||||
|
\fI/var/log/faillog\fP \- file di log degli accessi falliti
|
||||||
|
.SH "VEDERE ANCHE"
|
||||||
|
\fBlogin\fP(1), \fBfaillog\fP(5)
|
||||||
|
.SH AUTORE
|
||||||
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
.SH TRADUZIONE
|
||||||
|
.nf
|
||||||
|
Giuseppe Sacco <eppesuig@debian.org>, 2005
|
||||||
|
Danilo Piazzalunga <danilopiazza@libero.it>, 2005
|
||||||
|
.fi
|
1
man/it/getspnam.3
Normal file
1
man/it/getspnam.3
Normal file
@ -0,0 +1 @@
|
|||||||
|
.so shadow.3
|
76
man/it/gpasswd.1
Normal file
76
man/it/gpasswd.1
Normal file
@ -0,0 +1,76 @@
|
|||||||
|
.\" Copyright 1996, Rafal Maszkowski, rzm@pdi.net
|
||||||
|
.\" All rights reserved. You can redistribute this man page and/or
|
||||||
|
.\" modify it under the terms of the GNU General Public License as
|
||||||
|
.\" published by the Free Software Foundation; either version 2 of the
|
||||||
|
.\" License, or (at your option) any later version.
|
||||||
|
.\"
|
||||||
|
.\" $Id: gpasswd.1,v 1.4 2005/04/05 19:08:54 kloczek Exp $
|
||||||
|
.\"
|
||||||
|
.\" Traduzione in italiano a cura di Isabella Ruocco <isacher@nettaxi.com>
|
||||||
|
.\" luglio 1999
|
||||||
|
.\"
|
||||||
|
.TH GPASSWD 1
|
||||||
|
.SH NOME
|
||||||
|
gpasswd \- amministra il file /etc/group
|
||||||
|
.br
|
||||||
|
.SH SINTASSI
|
||||||
|
.B gpasswd \fIgruppo\fR
|
||||||
|
.br
|
||||||
|
.B gpasswd
|
||||||
|
.B \-a
|
||||||
|
\fIutente\fR \fIgruppo\fR
|
||||||
|
.br
|
||||||
|
.B gpasswd
|
||||||
|
.B \-d
|
||||||
|
\fIutente\fR \fIgruppo\fR
|
||||||
|
.br
|
||||||
|
.B gpasswd
|
||||||
|
.B \-R
|
||||||
|
\fIgruppo\fR
|
||||||
|
.br
|
||||||
|
.B gpasswd
|
||||||
|
.B \-r
|
||||||
|
\fIgruppo\fR
|
||||||
|
.br
|
||||||
|
.B gpasswd
|
||||||
|
.RB [ \-A
|
||||||
|
\fIutente\fR,...]
|
||||||
|
.RB [ \-M
|
||||||
|
\fIutente\fR,...]
|
||||||
|
\fIgruppo\fR
|
||||||
|
.br
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
.B gpasswd
|
||||||
|
viene usato per amministrare il file /etc/group (ed il file /etc/gshadow
|
||||||
|
se compilato con SHADOWGRP definito). Ogni gruppo può avere amministratori,
|
||||||
|
membri ed una password. L'amministratore di sistema può usare l'opzione \fB\-A\fR
|
||||||
|
per definire l'amministratore/gli amministratori di gruppo e l'opzione \fB\-M\fR
|
||||||
|
per definire i membri ed ha tutti i diritti degli amministratori di gruppo e
|
||||||
|
dei membri.
|
||||||
|
.PP
|
||||||
|
L'amministratore di gruppo può aggiungere e rimuovere utenti usando
|
||||||
|
rispettivamente le opzioni \fB\-a\fR e \fB\-d\fR. Gli amministratori possono usare
|
||||||
|
l'opzione \fB\-r\fR per rimuovere la password di gruppo. Quando non è
|
||||||
|
impostata alcuna password solo i membri del gruppo possono usare
|
||||||
|
.BR newgrp (1)
|
||||||
|
per unirsi al gruppo. L'opzione \fB\-R\fR disabilita l'accesso al gruppo tramite
|
||||||
|
il comando
|
||||||
|
.BR newgrp (1).
|
||||||
|
.PP
|
||||||
|
.B gpasswd
|
||||||
|
invocata da un amministratore di gruppo con il solo nome del gruppo richiede
|
||||||
|
solamente la password di gruppo. Se la password è impostata i membri possono ancora
|
||||||
|
usare
|
||||||
|
.BR newgrp (1)
|
||||||
|
senza la password, i non\-membri devono fornire la password.
|
||||||
|
|
||||||
|
.SH FILE
|
||||||
|
\fI/etc/group\fR \- informazioni sui gruppi
|
||||||
|
.br
|
||||||
|
\fI/etc/gshadow\fR \- informazioni sul gruppo shadow
|
||||||
|
.SH VEDERE ANCHE
|
||||||
|
.BR newgrp (1),
|
||||||
|
.BR groupadd (8),
|
||||||
|
.BR groupdel (8),
|
||||||
|
.BR groupmod (8),
|
||||||
|
.BR grpck (8)
|
65
man/it/groupadd.8
Normal file
65
man/it/groupadd.8
Normal file
@ -0,0 +1,65 @@
|
|||||||
|
.\" Copyright 1991, Julianne Frances Haugh
|
||||||
|
.\" All rights reserved.
|
||||||
|
.\"
|
||||||
|
.\" Redistribution and use in source and binary forms, with or without
|
||||||
|
.\" modification, are permitted provided that the following conditions
|
||||||
|
.\" are met:
|
||||||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer.
|
||||||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||||||
|
.\" documentation and/or other materials provided with the distribution.
|
||||||
|
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||||
|
.\" may be used to endorse or promote products derived from this software
|
||||||
|
.\" without specific prior written permission.
|
||||||
|
.\"
|
||||||
|
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||||
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||||
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||||
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
|
.\" SUCH DAMAGE.
|
||||||
|
.\"
|
||||||
|
.\" $Id: groupadd.8,v 1.9 2005/04/05 19:08:54 kloczek Exp $
|
||||||
|
.\"
|
||||||
|
.\" Traduzione in italiano a cura di Isabella Ruocco <isacher@nettaxi.com>
|
||||||
|
.\" luglio 1999
|
||||||
|
.\"
|
||||||
|
.TH GROUPADD 8
|
||||||
|
.SH NOME
|
||||||
|
groupadd \- Crea un nuovo gruppo
|
||||||
|
.SH SINTASSI
|
||||||
|
\fBgroupadd\fR [\fB\-g\fR \fIgid\fR [\fB\-o\fR]] [\fB\-f\fR] \fIgruppo\fR
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
Il comando \fBgroupadd\fR crea un nuovo account di gruppo usando i valori
|
||||||
|
specificati sulla linea di comando ed i valori predefiniti dal sistema.
|
||||||
|
Il nuovo gruppo verrà aggiunto ai file di sistema che lo necessitano.
|
||||||
|
.SH OPZIONI
|
||||||
|
Le opzioni che si applicano al comando \fBgroupadd\fR sono:
|
||||||
|
.IP "\fB\-g\fR \fIgid\fR"
|
||||||
|
Il valore numerico dell'identificatore (ID) del gruppo.
|
||||||
|
Questo valore deve essere univoco, a meno che non venga usata l'opzione \fB\-o\fR.
|
||||||
|
Il valore deve essere non\-negativo.
|
||||||
|
La scelta predefinita è quella di usare il minimo valore di ID superiore a 999
|
||||||
|
e superiore a qualunque altro gruppo.
|
||||||
|
Valori tra 0 e 999 sono tipicamente riservati per account di sistema.
|
||||||
|
.SH FILE
|
||||||
|
\fI/etc/group\fR \- informazioni sugli account di gruppo
|
||||||
|
.br
|
||||||
|
\fI/etc/gshadow\fR \- informazioni sicure sugli account di gruppo
|
||||||
|
.SH VEDERE ANCHE
|
||||||
|
.BR chfn (1),
|
||||||
|
.BR chsh (1),
|
||||||
|
.BR useradd (8),
|
||||||
|
.BR userdel (8),
|
||||||
|
.BR usermod (8),
|
||||||
|
.BR passwd (1),
|
||||||
|
.BR groupdel (8),
|
||||||
|
.BR groupmod (8)
|
||||||
|
.SH AUTORE
|
||||||
|
Julianne Frances Haugh (jfh@tab.com)
|
63
man/it/groupdel.8
Normal file
63
man/it/groupdel.8
Normal file
@ -0,0 +1,63 @@
|
|||||||
|
.\" Copyright 1991 \- 1993, Julianne Frances Haugh
|
||||||
|
.\" All rights reserved.
|
||||||
|
.\"
|
||||||
|
.\" Redistribution and use in source and binary forms, with or without
|
||||||
|
.\" modification, are permitted provided that the following conditions
|
||||||
|
.\" are met:
|
||||||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer.
|
||||||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||||||
|
.\" documentation and/or other materials provided with the distribution.
|
||||||
|
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||||
|
.\" may be used to endorse or promote products derived from this software
|
||||||
|
.\" without specific prior written permission.
|
||||||
|
.\"
|
||||||
|
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||||
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||||
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||||
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
|
.\" SUCH DAMAGE.
|
||||||
|
.\"
|
||||||
|
.\" $Id: groupdel.8,v 1.4 2005/04/05 19:08:54 kloczek Exp $
|
||||||
|
.\"
|
||||||
|
.\" Traduzione in italiano a cura di Isabella Ruocco <isacher@nettaxi.com>
|
||||||
|
.\" luglio 1999
|
||||||
|
.\"
|
||||||
|
.TH GROUPDEL 8
|
||||||
|
.SH NOME
|
||||||
|
groupdel \- Rimuove un gruppo
|
||||||
|
.SH SINTASSI
|
||||||
|
.B groupdel
|
||||||
|
.I gruppo
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
Il comando \fBgroupdel\fR modifica i file di account di sistema, rimuovendo
|
||||||
|
tutte le voci che si riferiscono a \fIgruppo\fR.
|
||||||
|
Il gruppo nominato deve esistere.
|
||||||
|
.PP
|
||||||
|
Occorre controllare manualmente tutti i filesystem per assicurarsi che non
|
||||||
|
rimanga alcun file avente come ID di gruppo del file il gruppo specificato.
|
||||||
|
.SH CAVEAT
|
||||||
|
Non si può rimuovere il gruppo primario di qualche utente esistente.
|
||||||
|
Occorre rimuovere l'utente prima di rimuovere il gruppo.
|
||||||
|
.SH FILE
|
||||||
|
\fI/etc/group\fR \- informazioni sui gruppi
|
||||||
|
.br
|
||||||
|
\fI/etc/gshadow\fR \- informazioni sicure sui gruppi
|
||||||
|
.SH VEDERE ANCHE
|
||||||
|
.BR chfn (1),
|
||||||
|
.BR chsh (1),
|
||||||
|
.BR useradd (8),
|
||||||
|
.BR userdel (8),
|
||||||
|
.BR usermod (8),
|
||||||
|
.BR passwd (1),
|
||||||
|
.BR groupadd (8),
|
||||||
|
.BR groupmod (8)
|
||||||
|
.SH AUTORE
|
||||||
|
Julianne Frances Haugh (jfh@tab.com)
|
67
man/it/groupmod.8
Normal file
67
man/it/groupmod.8
Normal file
@ -0,0 +1,67 @@
|
|||||||
|
.\" Copyright 1991, Julianne Frances Haugh
|
||||||
|
.\" All rights reserved.
|
||||||
|
.\"
|
||||||
|
.\" Redistribution and use in source and binary forms, with or without
|
||||||
|
.\" modification, are permitted provided that the following conditions
|
||||||
|
.\" are met:
|
||||||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer.
|
||||||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||||||
|
.\" documentation and/or other materials provided with the distribution.
|
||||||
|
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||||
|
.\" may be used to endorse or promote products derived from this software
|
||||||
|
.\" without specific prior written permission.
|
||||||
|
.\"
|
||||||
|
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||||
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||||
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||||
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
|
.\" SUCH DAMAGE.
|
||||||
|
.\"
|
||||||
|
.\" $Id: groupmod.8,v 1.7 2005/04/05 19:08:54 kloczek Exp $
|
||||||
|
.\"
|
||||||
|
.\" Traduzione in italiano a cura di Isabella Ruocco <isacher@nettaxi.com>
|
||||||
|
.\" luglio 1999
|
||||||
|
.\"
|
||||||
|
.TH GROUPMOD 8
|
||||||
|
.SH NOME
|
||||||
|
groupmod \- Modifica un gruppo
|
||||||
|
.SH SINTASSI
|
||||||
|
\fBgroupmod\fR [\fB\-g\fR \fIgid\fR [\fB\-o\fR]] [\fB\-n\fR \fInome_gruppo\fR]
|
||||||
|
.I gruppo
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
Il comando \fBgroupmod\fR modifica i file di account del sistema in modo
|
||||||
|
da riflettere i cambiamenti che sono specificati sulla linea di comando.
|
||||||
|
Le opzioni che si applicano al comando \fIgroupmod\fR sono
|
||||||
|
.IP "\fB\-g \fIgid\fR"
|
||||||
|
Il valore numerico dell'identificatore (ID) del gruppo.
|
||||||
|
Questo valore deve essere univoco, a meno che non venga usata l'opzione
|
||||||
|
\fB\-o\fR.
|
||||||
|
Il valore deve essere non\-negativo.
|
||||||
|
Valori tra 0 e 999 sono tipicamente riservati per gruppi di sistema.
|
||||||
|
Occorre modificare manualmente l'ID di gruppo di tutti i file
|
||||||
|
il cui ID di gruppo è quello vecchio.
|
||||||
|
.IP "\fB\-n \fInome_gruppo\fR"
|
||||||
|
Il nome del gruppo verrà modificato da \fIgruppo\fR a \fInome_gruppo\fR.
|
||||||
|
.SH FILE
|
||||||
|
\fI/etc/group\fR \- informazioni sui gruppi
|
||||||
|
.br
|
||||||
|
\fI/etc/gshadow\fR \- informazioni sicure sui gruppi
|
||||||
|
.SH VEDERE ANCHE
|
||||||
|
.BR chfn (1),
|
||||||
|
.BR chsh (1),
|
||||||
|
.BR useradd (8),
|
||||||
|
.BR userdel (8),
|
||||||
|
.BR usermod (8),
|
||||||
|
.BR passwd (1),
|
||||||
|
.BR groupadd (8),
|
||||||
|
.BR groupdel (8)
|
||||||
|
.SH AUTORE
|
||||||
|
Julianne Frances Haugh (jfh@tab.com)
|
55
man/it/groups.1
Normal file
55
man/it/groups.1
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
.\" This file was generated with po4a. Translate the source file.
|
||||||
|
.\"
|
||||||
|
.\"$Id: groups.1,v 1.3 2005/04/21 21:03:16 kloczek Exp $
|
||||||
|
.\" Copyright 1991 - 1994, Julianne Frances Haugh
|
||||||
|
.\" All rights reserved.
|
||||||
|
.\"
|
||||||
|
.\" Redistribution and use in source and binary forms, with or without
|
||||||
|
.\" modification, are permitted provided that the following conditions
|
||||||
|
.\" are met:
|
||||||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer.
|
||||||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||||||
|
.\" documentation and/or other materials provided with the distribution.
|
||||||
|
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||||
|
.\" may be used to endorse or promote products derived from this software
|
||||||
|
.\" without specific prior written permission.
|
||||||
|
.\"
|
||||||
|
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||||
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||||
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||||
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
|
.\" SUCH DAMAGE.
|
||||||
|
.TH GROUPS 1
|
||||||
|
.SH NOME
|
||||||
|
groups \- mostra i nomi dei gruppi correnti
|
||||||
|
.SH SINTASSI
|
||||||
|
\fBgroups\fP [\fIutente\fP]
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
Per ciascuno dei gruppi correnti, \fBgroups\fP mostra i nomi o i valori ID. Se
|
||||||
|
un valore non ha nessuna voce corrispondente in \fI/etc/group\fP, esso viene
|
||||||
|
mostrato in forma numerica. Se viene specificato un \fIutente\fP, vengono
|
||||||
|
mostrati i gruppi a cui appartiene quel determinato \fIutente\fP.
|
||||||
|
.SH NOTA
|
||||||
|
Sui sistemi che non supportano l'appartenenza a più gruppi
|
||||||
|
contemporaneamente, vengono riportate le informazioni da
|
||||||
|
\fI/etc/group\fP. L'utente deve usare \fBnewgrp\fP o \fBsg\fP per cambiare gli ID dei
|
||||||
|
gruppi reale ed efficace.
|
||||||
|
.SH FILE
|
||||||
|
\fI/etc/group\fP \- informazioni sugli account dei gruppi
|
||||||
|
.SH "VEDERE ANCHE"
|
||||||
|
\fBnewgrp\fP(1), \fBgetgid\fP(2), \fBgetgroups\fP(2), \fBgetuid\fP(2)
|
||||||
|
.SH AUTORE
|
||||||
|
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
|
||||||
|
.SH TRADUZIONE
|
||||||
|
.nf
|
||||||
|
Giuseppe Sacco <eppesuig@debian.org>, 2005
|
||||||
|
Danilo Piazzalunga <danilopiazza@libero.it>, 2005
|
||||||
|
.fi
|
106
man/it/grpck.8
Normal file
106
man/it/grpck.8
Normal file
@ -0,0 +1,106 @@
|
|||||||
|
.\" This file was generated with po4a. Translate the source file.
|
||||||
|
.\"
|
||||||
|
.\"$Id: grpck.8,v 1.5 2005/04/21 21:03:16 kloczek Exp $
|
||||||
|
.\" Copyright 1992 - 1993, Julianne Frances Haugh
|
||||||
|
.\" All rights reserved.
|
||||||
|
.\"
|
||||||
|
.\" Redistribution and use in source and binary forms, with or without
|
||||||
|
.\" modification, are permitted provided that the following conditions
|
||||||
|
.\" are met:
|
||||||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer.
|
||||||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||||||
|
.\" documentation and/or other materials provided with the distribution.
|
||||||
|
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||||
|
.\" may be used to endorse or promote products derived from this software
|
||||||
|
.\" without specific prior written permission.
|
||||||
|
.\"
|
||||||
|
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||||
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||||
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||||
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
|
.\" SUCH DAMAGE.
|
||||||
|
.TH GRPCK 8
|
||||||
|
.SH NOME
|
||||||
|
grpck \- verifica l'integrità dei file di gruppo
|
||||||
|
.SH SINTASSI
|
||||||
|
\fBgrpck\fP [\fB\-r\fP] [\fIgroup\fP \fIshadow\fP]
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
\fBgrpck\fP verifica l'integrità delle informazioni di autenticazione del
|
||||||
|
sistema. Ogni voce in \fI/etc/group\fP e in \fI/etc/gshadow\fP viene controllata
|
||||||
|
per verificare che abbia il formato corretto e dati validi in ciascun
|
||||||
|
campo. Viene richiesto all'utente di rimuovere le voci che non hanno un
|
||||||
|
formato appropriato o che hanno altri errori impossibili da correggere.
|
||||||
|
.PP
|
||||||
|
Vengono fatti controlli per verificare che ogni voce abbia:
|
||||||
|
.sp
|
||||||
|
.in +.5i
|
||||||
|
\- il corretto numero di campi
|
||||||
|
.br
|
||||||
|
\- un nome univoco di gruppo
|
||||||
|
.br
|
||||||
|
\- una lista valida di membri e amministratori
|
||||||
|
.in \-.5i
|
||||||
|
.sp
|
||||||
|
.PP
|
||||||
|
Gli errori nelle verifiche sul corretto numero di campi e sull'univocità
|
||||||
|
del nome del gruppo sono irrimediabili. Se una voce ha un numero errato di
|
||||||
|
campi, all'utente viene chiesto di cancellare l'intera riga; se l'utente non
|
||||||
|
risponde affermativamente, vengono omessi tutti gli ulteriori
|
||||||
|
controlli. Viene richiesta la cancellazione anche per le voci aventi il nome
|
||||||
|
del gruppo duplicato, ma i rimanenti controlli vengono ugualmente
|
||||||
|
effettuati. Tutti gli altri errori non sono gravi e l'utente è invitato a
|
||||||
|
eseguire il comando \fBgroupmod\fP per correggerli.
|
||||||
|
.PP
|
||||||
|
I comandi che operano sul file \fI/etc/group\fP non sono in grado di modificare
|
||||||
|
voci corrotte o duplicate; in tali circostanze va usato \fBgrpck\fP per
|
||||||
|
rimuovere la voce scorretta.
|
||||||
|
.SH OPZIONI
|
||||||
|
Come impostazione predefinita, \fBgrpck\fP opera sui file \fI/etc/group\fP e in
|
||||||
|
\fI/etc/gshadow\fP. L'utente può selezionare file alternativi con i parametri
|
||||||
|
\fIgroup\fP e \fIshadow\fP. Inoltre, il comando può essere eseguito in modalità
|
||||||
|
di sola lettura specificando l'opzione \fB\-r\fP: questo fa in modo che, senza
|
||||||
|
l'intervento dell'utente, venga risposto \fBno\fP a tutte le domande che
|
||||||
|
riguardano i cambiamenti. Con \fBgrpck\fP si possono anche ordinare per GID le
|
||||||
|
voci in \fI/etc/group\fP e in \fI/etc/gshadow\fP, è sufficiente fornire l'opzione
|
||||||
|
\fB\-s\fP. Non viene effettuato nessun controllo, il programma si limita a
|
||||||
|
ordinare i file.
|
||||||
|
.SH FILE
|
||||||
|
\fI/etc/group\fP \- informazioni sugli account dei gruppi
|
||||||
|
.br
|
||||||
|
\fI/etc/gshadow\fP \- password cifrate e informazioni sugli amministratori dei
|
||||||
|
gruppi
|
||||||
|
.br
|
||||||
|
\fI/etc/passwd\fP \- informazioni sugli account degli utenti
|
||||||
|
.SH "VEDERE ANCHE"
|
||||||
|
\fBgroup\fP(5), \fBpasswd\fP(5), \fBshadow\fP(5), \fBgroupmod\fP(8)
|
||||||
|
.SH "VALORI RESTITUITI"
|
||||||
|
.TP 2
|
||||||
|
Il comando \fBgrpck\fP restituisce i seguenti valori:
|
||||||
|
.br
|
||||||
|
\fB0\fP \- successo
|
||||||
|
.br
|
||||||
|
\fB1\fP \- errore di sintassi
|
||||||
|
.br
|
||||||
|
\fB2\fP \- una o più voci di gruppo contengono errori
|
||||||
|
.br
|
||||||
|
\fB3\fP \- impossibile aprire i file dei gruppi
|
||||||
|
.br
|
||||||
|
\fB4\fP \- impossibile fare il lock dei file dei gruppi
|
||||||
|
.br
|
||||||
|
\fB5\fP \- impossibile aggiornare i file dei gruppi
|
||||||
|
.SH AUTORE
|
||||||
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
.SH TRADUZIONE
|
||||||
|
.nf
|
||||||
|
Isabella Ruocco <isacher@nettaxi.com>, 1999
|
||||||
|
Giuseppe Sacco <eppesuig@debian.org>, 2005
|
||||||
|
Danilo Piazzalunga <danilopiazza@libero.it>, 2005
|
||||||
|
.fi
|
1
man/it/grpconv.8
Normal file
1
man/it/grpconv.8
Normal file
@ -0,0 +1 @@
|
|||||||
|
.so man8/pwconv.8
|
1
man/it/grpunconv.8
Normal file
1
man/it/grpunconv.8
Normal file
@ -0,0 +1 @@
|
|||||||
|
.so man8/pwconv.8
|
54
man/it/id.1
Normal file
54
man/it/id.1
Normal file
@ -0,0 +1,54 @@
|
|||||||
|
.\" This file was generated with po4a. Translate the source file.
|
||||||
|
.\"
|
||||||
|
.\"$Id: id.1,v 1.3 2005/04/21 21:03:16 kloczek Exp $
|
||||||
|
.\" Copyright 1991, Julianne Frances Haugh
|
||||||
|
.\" All rights reserved.
|
||||||
|
.\"
|
||||||
|
.\" Redistribution and use in source and binary forms, with or without
|
||||||
|
.\" modification, are permitted provided that the following conditions
|
||||||
|
.\" are met:
|
||||||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer.
|
||||||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||||||
|
.\" documentation and/or other materials provided with the distribution.
|
||||||
|
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||||
|
.\" may be used to endorse or promote products derived from this software
|
||||||
|
.\" without specific prior written permission.
|
||||||
|
.\"
|
||||||
|
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||||
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||||
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||||
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
|
.\" SUCH DAMAGE.
|
||||||
|
.TH ID 1
|
||||||
|
.SH NOME
|
||||||
|
id \- mostra i nomi e gli ID dell'utente e del gruppo
|
||||||
|
.SH SINTASSI
|
||||||
|
\fBid\fP [\fB\-a\fP]
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
\fBid\fP mostra i nomi o i valori degli ID reale ed efficace, sia dell'utente
|
||||||
|
che del gruppo corrente. Se non è presente in \fI/etc/passwd\fP o in
|
||||||
|
\fI/etc/group\fP una voce relativa al valore numerico, esso viene mostrato
|
||||||
|
senza il nome corrispondente. L'opzione facoltativa \fB\-a\fP mostra l'insieme
|
||||||
|
dei gruppi sui sistemi che supportano l'appartenenza a più gruppi
|
||||||
|
contemporaneamente.
|
||||||
|
.SH FILE
|
||||||
|
\fI/etc/passwd\fP \- informazioni sugli account degli utenti
|
||||||
|
.br
|
||||||
|
\fI/etc/group\fP \- informazioni sugli account dei gruppi
|
||||||
|
.SH "VEDERE ANCHE"
|
||||||
|
\fBgetgid\fP(2), \fBgetgroups\fP(2), \fBgetuid\fP(2)
|
||||||
|
.SH AUTORE
|
||||||
|
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
|
||||||
|
.SH TRADUZIONE
|
||||||
|
.nf
|
||||||
|
Giuseppe Sacco <eppesuig@debian.org>, 2005
|
||||||
|
Danilo Piazzalunga <danilopiazza@libero.it>, 2005
|
||||||
|
.fi
|
76
man/it/lastlog.8
Normal file
76
man/it/lastlog.8
Normal file
@ -0,0 +1,76 @@
|
|||||||
|
.\" This file was generated with po4a. Translate the source file.
|
||||||
|
.\"
|
||||||
|
.\"$Id: lastlog.8,v 1.7 2005/04/21 21:03:16 kloczek Exp $
|
||||||
|
.\" Copyright 1992, Phillip Street and Julianne Frances Haugh
|
||||||
|
.\" All rights reserved.
|
||||||
|
.\"
|
||||||
|
.\" Redistribution and use in source and binary forms, with or without
|
||||||
|
.\" modification, are permitted provided that the following conditions
|
||||||
|
.\" are met:
|
||||||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer.
|
||||||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||||||
|
.\" documentation and/or other materials provided with the distribution.
|
||||||
|
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||||
|
.\" may be used to endorse or promote products derived from this software
|
||||||
|
.\" without specific prior written permission.
|
||||||
|
.\"
|
||||||
|
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||||
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||||
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||||
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
|
.\" SUCH DAMAGE.
|
||||||
|
.\" @(#)lastlog.8 3.3 08:24:58 29 Sep 1993 (National Guard Release)
|
||||||
|
.TH LASTLOG 8
|
||||||
|
.SH NOME
|
||||||
|
lastlog \- esamina il file degli ultimi accessi
|
||||||
|
.SH SINTASSI
|
||||||
|
.TP 8
|
||||||
|
\fBlastlog\fP [\fBopzioni\fP]
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
.PP
|
||||||
|
\fBlastlog\fP mostra il log degli ultimi accessi, contenuto nel file
|
||||||
|
\fI/var/log/lastlog\fP. Le informazioni mostrate sono il \fBnome utente\fP, la
|
||||||
|
\fBporta\fP, e la \fBdata dell'ultimo accesso\fP. Il comportamento predefinito
|
||||||
|
(nessuna opzione specificata) è di mostrare i record di ultimo accesso per
|
||||||
|
tutti gli utenti, nell'ordine in cui compaiono in \fB/etc/passwd\fP.
|
||||||
|
.SH OPZIONI
|
||||||
|
.TP
|
||||||
|
Il comando \fBlastlog\fP accetta le seguenti opzioni:
|
||||||
|
.IP "\fB\-h\fP, \fB\-\-help\fP"
|
||||||
|
Mostra un messaggio di aiuto ed esce.
|
||||||
|
.IP "\fB\-t\fP, \fB\-\-time\fP \fIGIORNI\fP"
|
||||||
|
Mostra solo i record di ultimo accesso più recenti di un numero di
|
||||||
|
\fIGIORNI\fP.
|
||||||
|
.IP "\fB\-u\fP, \fB\-\-user\fP \fILOGIN\fP"
|
||||||
|
Mostra il record di ultimo accesso per l'utente specificato da \fILOGIN\fP.
|
||||||
|
.TP
|
||||||
|
L'opzione \fB\-t\fP ha la precedenza sull'uso di \fB\-u\fP.
|
||||||
|
.PP
|
||||||
|
Se l'utente non ha mai effettuato accessi al sistema viene mostrato, al
|
||||||
|
posto della porta e della data, il messaggio \fB"**Nessun accesso
|
||||||
|
effettuato**"\fP.
|
||||||
|
.SH FILE
|
||||||
|
\fI/var/log/lastlog\fP \- file di log degli ultimi accessi
|
||||||
|
.SH AVVISI/CAVEAT
|
||||||
|
Se ci sono dei grossi scarti tra i valori di UID, il programma lastlog può
|
||||||
|
restare in esecuzione per un tempo prolungato senza produrre output sullo
|
||||||
|
schermo (ad es. se mmdf=800 e l'ultimo UID vale 170, il programma sembrerà
|
||||||
|
bloccato come se esaminasse gli UID tra 171 e 799).
|
||||||
|
.SH AUTORI
|
||||||
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
.br
|
||||||
|
Phillip Street
|
||||||
|
.SH TRADUZIONE
|
||||||
|
.nf
|
||||||
|
Isabella Ruocco <isacher@nettaxi.com>, 1999
|
||||||
|
Giuseppe Sacco <eppesuig@debian.org>, 2005
|
||||||
|
Danilo Piazzalunga <danilopiazza@libero.it>, 2005
|
||||||
|
.fi
|
129
man/it/login.1
Normal file
129
man/it/login.1
Normal file
@ -0,0 +1,129 @@
|
|||||||
|
.\" This file was generated with po4a. Translate the source file.
|
||||||
|
.\"
|
||||||
|
.\" $Id: login.1,v 1.3 2005/04/21 21:03:16 kloczek Exp $
|
||||||
|
.\" Copyright 1989 - 1994, Julianne Frances Haugh
|
||||||
|
.\" All rights reserved.
|
||||||
|
.\"
|
||||||
|
.\" Redistribution and use in source and binary forms, with or without
|
||||||
|
.\" modification, are permitted provided that the following conditions
|
||||||
|
.\" are met:
|
||||||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer.
|
||||||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||||||
|
.\" documentation and/or other materials provided with the distribution.
|
||||||
|
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||||
|
.\" may be used to endorse or promote products derived from this software
|
||||||
|
.\" without specific prior written permission.
|
||||||
|
.\"
|
||||||
|
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||||
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||||
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||||
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
|
.\" SUCH DAMAGE.
|
||||||
|
.TH LOGIN 1
|
||||||
|
.SH NOME
|
||||||
|
login \- apre una sessione sul sistema
|
||||||
|
.SH SINTASSI
|
||||||
|
\fBlogin\fP [\fB\-p\fP] [\fInome_utente\fP] [\fIENV=VAR\fP ...]
|
||||||
|
.br
|
||||||
|
\fBlogin\fP [\fB\-p\fP] [\fB\-h\fP \fIhost\fP] [\fB\-f\fP \fInome_utente\fP]
|
||||||
|
.br
|
||||||
|
\fBlogin\fP [\fB\-p\fP] \fB\-r\fP \fIhost\fP
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
\fBlogin\fP viene utilizzato per aprire una sessione sul sistema. Normalmente
|
||||||
|
viene invocato automaticamente rispondendo al prompt \fIlogin:\fP del
|
||||||
|
terminale. \fBlogin\fP può essere trattato in maniera speciale dalla shell e
|
||||||
|
non può essere invocato come sottoprocesso. Normalmente \fBlogin\fP è
|
||||||
|
trattato dalla shell come \fBexec login\fP che termina la shell utente
|
||||||
|
attuale. L'esecuzione di \fBlogin\fP da una shell che non sia quella di login
|
||||||
|
produce un messaggio d'errore.
|
||||||
|
.PP
|
||||||
|
All'utente viene quindi chiesta la password, se necessario. Durante questa
|
||||||
|
operazione l'eco sul terminale è disabilitato per non rivelare la
|
||||||
|
password. Solo un basso numero di tentativi falliti è permesso prima che
|
||||||
|
\fBlogin\fP termini e che la connessione sia rallentata.
|
||||||
|
.PP
|
||||||
|
Se la scadenza delle password è abilitata per il proprio account, prima di
|
||||||
|
proseguire ci può essere la richiesta di una nuova password. Il programma
|
||||||
|
chiederà prima la vecchia password e poi la nuova per poter continuare. Per
|
||||||
|
maggiori informazioni si faccia riferimento a \fBpasswd\fP(1).
|
||||||
|
.PP
|
||||||
|
|
||||||
|
Dopo aver completato correttamente l'accesso, vengono mostrati eventuali
|
||||||
|
messaggi di sistema e si viene informati della presenza di nuova posta. Si
|
||||||
|
può evitare di visualizzare i messaggi in \fI/etc/motd\fP creando un file
|
||||||
|
vuoto chiamato \fI.hushlogin\fP nella propria directory di login. Il messaggio
|
||||||
|
relativo alla presenza di posta è "\fBC'è nuova posta.\fP", "\fBC'è la solita
|
||||||
|
posta.\fP" o "\fBNessun messaggio di posta.\fP" a seconda dello stato della
|
||||||
|
propria casella di posta.
|
||||||
|
|
||||||
|
.PP
|
||||||
|
I propri ID di utente e gruppo vengono poi impostati in base ai valori
|
||||||
|
definiti nel file \fI/etc/passwd\fP. I valori di \fB$HOME\fP, \fB$SHELL\fP, \fB$PATH\fP,
|
||||||
|
\fB$LOGNAME\fP e \fB$MAIL\fP sono impostati in base ai corrispettivi valori nel
|
||||||
|
file delle password. I valori per ulimit, umask e nice possono essere
|
||||||
|
impostati in base al campo GECOS.
|
||||||
|
.PP
|
||||||
|
In alcune installazioni la variabile d'ambiente \fB$TERM\fP può essere
|
||||||
|
impostata in base al tipo di terminale della propria connessione, come
|
||||||
|
specificato in \fI/etc/ttytype\fP.
|
||||||
|
.PP
|
||||||
|
Può anche essere eseguito uno script di inizializzazione per il proprio
|
||||||
|
interprete dei comandi. Fare riferimento alla relativa pagina di manuale per
|
||||||
|
maggiori informazioni su questa funzione.
|
||||||
|
.PP
|
||||||
|
Un accesso a un sottosistema è indicato dalla presenza del carattere "*"
|
||||||
|
all'inizio della shell di login. La home directory impostata diventa la root
|
||||||
|
di un nuovo file system al quale l'utente accede.
|
||||||
|
.SH OPZIONI
|
||||||
|
.IP \fB\-f\fP
|
||||||
|
Non effettua l'autenticazione, l'utente è già autenticato
|
||||||
|
.IP \fB\-h\fP
|
||||||
|
Nome dell'host remoto per questo login.
|
||||||
|
.IP \fB\-p\fP
|
||||||
|
Non modifica l'ambiente.
|
||||||
|
.IP \fB\-r\fP
|
||||||
|
Attiva il protocollo autologin di rlogin.
|
||||||
|
.PP
|
||||||
|
Le opzioni \fB\-r\fP, \fB\-h\fP e \fB\-f\fP possono essere utilizzate solo quando
|
||||||
|
\fBlogin\fP viene invocato da root.
|
||||||
|
.SH AVVISI/CAVEAT
|
||||||
|
Questa versione di \fBlogin\fP ha molte opzioni di compilazione; solo una parte
|
||||||
|
di esse potrebbe essere in uso su un determinato sistema.
|
||||||
|
.PP
|
||||||
|
La posizione dei file è soggetta a differenze in base alla configurazione
|
||||||
|
del sistema.
|
||||||
|
.SH FILE
|
||||||
|
\fI/var/run/utmp\fP \t\- elenco delle sessioni di login attive
|
||||||
|
.br
|
||||||
|
\fI/var/log/wtmp\fP \t\- elenco delle sessioni di login precedenti
|
||||||
|
.br
|
||||||
|
\fI/etc/passwd\fP \t\- informazioni sugli account degli utenti
|
||||||
|
.br
|
||||||
|
\fI/etc/shadow\fP \t\- informazioni sicure sugli account degli utenti
|
||||||
|
.br
|
||||||
|
\fI/etc/motd\fP \t \- file dei messaggi di sistema
|
||||||
|
.br
|
||||||
|
\fI/etc/nologin\fP \t\- inibisce l'accesso al sistema a tutti gli utenti tranne
|
||||||
|
root
|
||||||
|
.br
|
||||||
|
\fI/etc/ttytype\fP \t\- elenco di tipi di terminale
|
||||||
|
.br
|
||||||
|
\fI$HOME/.hushlogin\fP \- impedisce che vengano mostrati i messaggi di sistema
|
||||||
|
.SH "VEDERE ANCHE"
|
||||||
|
\fBmail\fP(1), \fBpasswd\fP(1), \fBsh\fP(1), \fBsu\fP(1), \fBlogin.defs\fP(5),
|
||||||
|
\fBnologin\fP(5), \fBpasswd\fP(5), \fBgetty\fP(8)
|
||||||
|
.SH AUTORE
|
||||||
|
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
|
||||||
|
.SH TRADUZIONE
|
||||||
|
.nf
|
||||||
|
Giuseppe Sacco <eppesuig@debian.org>, 2005
|
||||||
|
Danilo Piazzalunga <danilopiazza@libero.it>, 2005
|
||||||
|
.fi
|
80
man/it/newgrp.1
Normal file
80
man/it/newgrp.1
Normal file
@ -0,0 +1,80 @@
|
|||||||
|
.\" This file was generated with po4a. Translate the source file.
|
||||||
|
.\"
|
||||||
|
.\"$Id: newgrp.1,v 1.2 2005/04/21 21:03:16 kloczek Exp $
|
||||||
|
.\" Copyright 1991, Julianne Frances Haugh
|
||||||
|
.\" All rights reserved.
|
||||||
|
.\"
|
||||||
|
.\" Redistribution and use in source and binary forms, with or without
|
||||||
|
.\" modification, are permitted provided that the following conditions
|
||||||
|
.\" are met:
|
||||||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer.
|
||||||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||||||
|
.\" documentation and/or other materials provided with the distribution.
|
||||||
|
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||||
|
.\" may be used to endorse or promote products derived from this software
|
||||||
|
.\" without specific prior written permission.
|
||||||
|
.\"
|
||||||
|
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||||
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||||
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||||
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
|
.\" SUCH DAMAGE.
|
||||||
|
.TH NEWGRP 1
|
||||||
|
.SH NOME
|
||||||
|
newgrp \- effettua l'accesso a un nuovo gruppo
|
||||||
|
.br
|
||||||
|
sg \- esegue un comando con un diverso ID di gruppo
|
||||||
|
.SH SINTASSI
|
||||||
|
\fBnewgrp\fP [\fB\-\fP] [\fIgruppo\fP]
|
||||||
|
.br
|
||||||
|
\fBsg\fP [\fB\-\fP] [\fIgruppo\fP [[\fB\-c\fP] \fIcommndo\fP]]
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
\fBnewgrp\fP permette di cambiare il proprio ID di gruppo durante una sessione
|
||||||
|
di login. Se viene specificato il flag \fB\-\fP, l'ambiente dell'utente viene
|
||||||
|
reinizializzato come se l'utente stesse effettuando il login, altrimenti
|
||||||
|
l'ambiente non viene modificato e la directory corrente non viene cambiata.
|
||||||
|
.PP
|
||||||
|
\fBnewgrp\fP changes the current real group ID to the named group, or to the
|
||||||
|
default group listed in \fI/etc/passwd\fP if no group name is given. \fBnewgrp\fP
|
||||||
|
also tries to add the group to the user groupset. If not root, the user will
|
||||||
|
be prompted for a password if she do not have a password and the group does,
|
||||||
|
or if the user is not listed as a member and the group has a password. The
|
||||||
|
user will be denied access if the group password is empty and the user is
|
||||||
|
not listed as a member. If compiled with SHADOWPWD (respectively SHADOWGRP)
|
||||||
|
defined, the password of the user (respectively, the password and the
|
||||||
|
members of the group) will be overwritten by the value defined in
|
||||||
|
\fI/etc/shadow\fP (respectively in \fI/etc/gshadow\fP) if an entry exists for this
|
||||||
|
user (resp. group).
|
||||||
|
.PP
|
||||||
|
Il comando \fBsg\fP funziona in maniera analoga a \fBnewgrp\fP, ma accetta un
|
||||||
|
comando che viene eseguito con la shell \fB/bin/sh\fP. La maggior parte delle
|
||||||
|
shell che permettono l'uso di \fBsg\fP richiede che i comandi composti da più
|
||||||
|
parole siano inclusi tra apici. Un'altra differenza tra \fBnewgrp\fP e \fBsg\fP è
|
||||||
|
che alcune shell trattano \fBnewgrp\fP in maniera speciale, sostituendo se
|
||||||
|
stesse con la shell creata da \fBnewgrp\fP. Questo non accade con \fBsg\fP, per
|
||||||
|
cui all'uscita del comando \fBsg\fP si ritorna al precedente ID di gruppo.
|
||||||
|
.SH FILE
|
||||||
|
\fI/etc/passwd\fP \- informazioni sugli account degli utenti
|
||||||
|
.br
|
||||||
|
\fI/etc/shadow\fP \- informazioni sicure sugli account degli utenti
|
||||||
|
.br
|
||||||
|
\fI/etc/group\fP \- informazioni sugli account dei gruppi
|
||||||
|
.br
|
||||||
|
\fI/etc/gshadow\fP \- informazioni sicure sui gruppi
|
||||||
|
.SH "VEDERE ANCHE"
|
||||||
|
\fBid\fP(1), \fBlogin\fP(1), \fBsu\fP(1), \fBgpasswd\fP(1), \fBgroup\fP(5), \fBgshadow\fP(5)
|
||||||
|
.SH AUTORE
|
||||||
|
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
|
||||||
|
.SH TRADUZIONE
|
||||||
|
.nf
|
||||||
|
Giuseppe Sacco <eppesuig@debian.org>, 2005
|
||||||
|
Danilo Piazzalunga <danilopiazza@libero.it>, 2005
|
||||||
|
.fi
|
58
man/it/passwd.1
Normal file
58
man/it/passwd.1
Normal file
@ -0,0 +1,58 @@
|
|||||||
|
.\" $Id: passwd.1,v 1.2 2005/04/13 10:02:27 kloczek Exp $
|
||||||
|
.\" Copyright 1992 Rickard E. Faith (faith@cs.unc.edu)
|
||||||
|
.\" May be distributed under the GNU General Public License
|
||||||
|
.\"
|
||||||
|
.\" Traduzione in italiano di Giovanni Bortolozzo <borto@dei.unipd.it>
|
||||||
|
.\" Agosto 1996
|
||||||
|
.\"
|
||||||
|
.\" " for hilit19
|
||||||
|
.TH PASSWD 1 "22 giugno 1994" "Linux 1.2" "Linux Programmer's Manual"
|
||||||
|
.SH NOME
|
||||||
|
passwd \- cambia la password
|
||||||
|
.SH SINTASSI
|
||||||
|
.BR "passwd [ " utente " [ " password " ] ]"
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
Senza alcun argomento
|
||||||
|
.B passwd
|
||||||
|
cambierà la password per l'attuale utente. Per prima cosa all'utente è chiesta
|
||||||
|
la vecchia password, dopo di che, per evitare errori di battitura, va immessa
|
||||||
|
per due volte la nuova password. La nuova password deve essere lunga almeno
|
||||||
|
sei caratteri ed essere composta sia da maiuscole che da minuscole o da
|
||||||
|
caratteri non alfabetici. La nuova password non deve essere uguale alla
|
||||||
|
vecchia password, e non deve coincidere con il nome dell'utente.
|
||||||
|
|
||||||
|
Le forme a uno e due argomenti possono essere usate solo dal superuser. Usando
|
||||||
|
la forma ad un argomento, il superuser può cambiare la password per
|
||||||
|
quell'utente. Al superuser non è chiesta la vecchia password, e non sono
|
||||||
|
applicate le regole per le password valide, poiché il superuser potrebbe
|
||||||
|
avere valide ragioni per scegliere una password che non ne sia conforme.
|
||||||
|
|
||||||
|
La forma a due argomenti assegna ad
|
||||||
|
.I utente
|
||||||
|
la password passata come secondo argomento. Ciò può essere utile quando
|
||||||
|
si deve assegnare a molti utenti una password iniziale.
|
||||||
|
|
||||||
|
Passando una stringa vuota come secondo argomento si cancella la password
|
||||||
|
dell'utente.
|
||||||
|
|
||||||
|
.SH FILE
|
||||||
|
.I /etc/passwd
|
||||||
|
.br
|
||||||
|
.I /etc/shells
|
||||||
|
.SH BACHI
|
||||||
|
Sono permesse password composte solo da numeri.
|
||||||
|
.br
|
||||||
|
Non viene prodotto nessun messaggio d'avviso se il superuser sceglie una
|
||||||
|
password ``scadente''.
|
||||||
|
.br
|
||||||
|
Le opzioni
|
||||||
|
.B \-f
|
||||||
|
e
|
||||||
|
.B \-s
|
||||||
|
non sono supportare.
|
||||||
|
.SH "VEDERE ANCHE"
|
||||||
|
.BR group (5),
|
||||||
|
.BR passwd (5),
|
||||||
|
.BR shadow (5)
|
||||||
|
.SH AUTORE
|
||||||
|
Peter Orbaek (poe@daimi.aau.dk)
|
136
man/it/passwd.5
Normal file
136
man/it/passwd.5
Normal file
@ -0,0 +1,136 @@
|
|||||||
|
.\" $Id: passwd.5,v 1.2 2005/04/05 19:08:54 kloczek Exp $
|
||||||
|
.\" Copyright (c) 1993 Michael Haardt (u31b3hs@pool.informatik.rwth\-aachen.de)
|
||||||
|
.\" Fri Apr 2 11:32:09 MET DST 1993
|
||||||
|
.\"
|
||||||
|
.\" Traduzione in italiano di Giovanni Bortolozzo <borto@dei.unipd.it>
|
||||||
|
.\" Agosto 1996
|
||||||
|
.\"
|
||||||
|
.\" This is free documentation; you can redistribute it and/or
|
||||||
|
.\" modify it under the terms of the GNU General Public License as
|
||||||
|
.\" published by the Free Software Foundation; either version 2 of
|
||||||
|
.\" the License, or (at your option) any later version.
|
||||||
|
.\"
|
||||||
|
.\" The GNU General Public License's references to "object code"
|
||||||
|
.\" and "executables" are to be interpreted as the output of any
|
||||||
|
.\" document formatting or typesetting system, including
|
||||||
|
.\" intermediate and printed output.
|
||||||
|
.\"
|
||||||
|
.\" This manual is distributed in the hope that it will be useful,
|
||||||
|
.\" but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
.\" GNU General Public License for more details.
|
||||||
|
.\"
|
||||||
|
.\" You should have received a copy of the GNU General Public
|
||||||
|
.\" License along with this manual; if not, write to the Free
|
||||||
|
.\" Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139,
|
||||||
|
.\" USA.
|
||||||
|
.\"
|
||||||
|
.\" Modified Sun Jul 25 10:46:28 1993 by Rik Faith (faith@cs.unc.edu)
|
||||||
|
.\" Modified Sun Aug 21 18:12:27 1994 by Rik Faith (faith@cs.unc.edu)
|
||||||
|
.\" Modified Sun Jun 18 01:53:57 1995 by Andries Brouwer (aeb@cwi.nl)
|
||||||
|
.\" Modified Mon Jan 5 20:24:40 MET 1998 by Michael Haardt
|
||||||
|
.\" (michael@cantor.informatik.rwth\-aachen.de)
|
||||||
|
.TH PASSWD 5 "5 gennaio 1988" "Linux" "Linux Programmer's Manual"
|
||||||
|
.SH NOME
|
||||||
|
passwd \- file delle password
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
.B Passwd
|
||||||
|
è un file di testo che contiene un elenco degli account sul sistema, e
|
||||||
|
per ciascuno di questi riporta alcune informazioni utili come user ID,
|
||||||
|
group ID, home directory, ecc. Spesso contiene anche le password
|
||||||
|
criptate di ciascun account. Il file delle password dovrebbe avere
|
||||||
|
permessi di lettura per tutti (molte utility, come
|
||||||
|
.BR ls (1),
|
||||||
|
ne fanno uso per associare lo user ID allo user name), ma permesso di
|
||||||
|
scrittura solo per il superuser.
|
||||||
|
.PP
|
||||||
|
Nei buoni tempi andati, il permesso di lettura per tutti non era un
|
||||||
|
grosso problema: chiunque poteva leggere le password criptate, ma i
|
||||||
|
calcolatori erano troppo lenti per decifrare una password scelta
|
||||||
|
bene. Soprattutto, si supponeva di lavorare fra amici. Oggigiorno,
|
||||||
|
molti usano una qualche versione di shadow password (chiavi ombra), in
|
||||||
|
cui
|
||||||
|
.I /etc/passwd
|
||||||
|
contiene degli * al posto delle password criptate, che a loro volta
|
||||||
|
sono nel file \fI/etc/shadow\fP, che solo il superuser può leggere.
|
||||||
|
.PP
|
||||||
|
Sia che si utilizzino o meno le shadow password, molti amministratori di
|
||||||
|
sistema usano un asterisco nel campo della password per far sì che un
|
||||||
|
utente non possa autenticarsi con una password (vedi le note più
|
||||||
|
sotto).
|
||||||
|
.PP
|
||||||
|
Se si crea una nuova login, si metta un asterisco nel campo della
|
||||||
|
password, e poi si usi il programma
|
||||||
|
.BR passwd (1)
|
||||||
|
per riempirlo.
|
||||||
|
.PP
|
||||||
|
C'è una voce per riga, ed ogni riga ha il formato:
|
||||||
|
.sp
|
||||||
|
.RS
|
||||||
|
account:passwd:UID:GID:GECOS:directory:shell
|
||||||
|
.RE
|
||||||
|
.sp
|
||||||
|
Il significato dei campi è il seguente:
|
||||||
|
.sp
|
||||||
|
.RS
|
||||||
|
.TP 1.0in
|
||||||
|
.I account
|
||||||
|
il nome dell'utente nel sistema. Non dovrebbe contenere maiuscole.
|
||||||
|
.TP
|
||||||
|
.I password
|
||||||
|
la password criptata o un asterisco.
|
||||||
|
.TP
|
||||||
|
.I UID
|
||||||
|
l'identificativo numerico dell'utente (UID = User IDentifier).
|
||||||
|
.TP
|
||||||
|
.I GID
|
||||||
|
l'identificativo numerico del gruppo principale per l'utente (GID =
|
||||||
|
Group IDentifier).
|
||||||
|
.TP
|
||||||
|
.I GECOS
|
||||||
|
Questo campo è opzionale e viene usato solo per fornire
|
||||||
|
informazioni. Di solito contiene il nome per esteso dell'utente. GECOS
|
||||||
|
sta per General Electric Comprehensive Operating System, (sistema
|
||||||
|
operativo comprensivo della General Electric), ribattezzato GCOS
|
||||||
|
quando la divisione grandi sistemi della GE fu venduta alla
|
||||||
|
Honeywell. Dennis Ritchie riferì: «A volte dovevamo spedire una stampa
|
||||||
|
o un gruppo di lavori alla macchina GCOS. Il campo del gcos nel file
|
||||||
|
delle password era un posto in cui sbattere le informazioni per la
|
||||||
|
$IDENTcard. Per niente elegante.»
|
||||||
|
.TP
|
||||||
|
.I directory
|
||||||
|
la $HOME directory dell'utente.
|
||||||
|
.TP
|
||||||
|
.I shell
|
||||||
|
il programma lanciato al login (se è vuoto, viene usato
|
||||||
|
.BR /bin/sh ).
|
||||||
|
Se punta ad un programma che non esiste, l'utente non potrà avere
|
||||||
|
accesso tramite
|
||||||
|
.BR login (1).
|
||||||
|
.RE
|
||||||
|
.SH NOTE
|
||||||
|
Se si vuole creare un gruppo di utenti, il loro GID deve
|
||||||
|
essere uguale e ci deve essere una voce nel file \fI/etc/group\fP, o il
|
||||||
|
gruppo non esisterà.
|
||||||
|
.PP
|
||||||
|
Se la password criptata è un asterisco, l'utente non potrà fare login
|
||||||
|
tramite
|
||||||
|
.BR login (1).
|
||||||
|
ma potrà ugualmente accedere al suo account usando
|
||||||
|
.BR rlogin (1),
|
||||||
|
far girare processi esistenti o iniziarne nuovi con
|
||||||
|
.BR rsh (1),
|
||||||
|
.BR cron (1),
|
||||||
|
.BR at (1)
|
||||||
|
o filtri per la posta, ecc. Bloccare un account semplicemente
|
||||||
|
modificando il campo della shell ha lo stesso effetto e in più
|
||||||
|
permette l'uso di
|
||||||
|
.BR su (1).
|
||||||
|
.SH FILE
|
||||||
|
.I /etc/passwd
|
||||||
|
.SH "VEDERE ANCHE"
|
||||||
|
.BR passwd (1),
|
||||||
|
.BR login (1),
|
||||||
|
.BR su (1),
|
||||||
|
.BR group (5),
|
||||||
|
.BR shadow (5)
|
87
man/it/porttime.5
Normal file
87
man/it/porttime.5
Normal file
@ -0,0 +1,87 @@
|
|||||||
|
.\" This file was generated with po4a. Translate the source file.
|
||||||
|
.\"
|
||||||
|
.\" $Id: porttime.5,v 1.1 2005/04/21 21:03:16 kloczek Exp $
|
||||||
|
.\" Copyright 1989 - 1990, Julianne Frances Haugh
|
||||||
|
.\" All rights reserved.
|
||||||
|
.\"
|
||||||
|
.\" Redistribution and use in source and binary forms, with or without
|
||||||
|
.\" modification, are permitted provided that the following conditions
|
||||||
|
.\" are met:
|
||||||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer.
|
||||||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||||||
|
.\" documentation and/or other materials provided with the distribution.
|
||||||
|
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||||
|
.\" may be used to endorse or promote products derived from this software
|
||||||
|
.\" without specific prior written permission.
|
||||||
|
.\"
|
||||||
|
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||||
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||||
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||||
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
|
.\" SUCH DAMAGE.
|
||||||
|
.TH PORTTIME 5
|
||||||
|
.SH NOME
|
||||||
|
porttime \- file delle porte e degli orari d'accesso
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
\fIporttime\fP contiene un elenco di device tty, nomi utente e orari di accesso
|
||||||
|
permessi.
|
||||||
|
.PP
|
||||||
|
Ciascuna voce è composta da tre campi separati da due punti. Il primo è un
|
||||||
|
elenco di device tty, separati da virgole, oppure un asterisco per indicare
|
||||||
|
che la voce corrisponde a qualsiasi device. Il secondo campo è un elenco di
|
||||||
|
nomi utente, separati da virgole, oppure un asterisco per indicare che la
|
||||||
|
voce corrisponde ad ogni utente. Il terzo campo è un elenco degli orari,
|
||||||
|
separati da virgole, in cui è consentito l'accesso.
|
||||||
|
.PP
|
||||||
|
Un orario di accesso consiste in zero o più giorni della settimana
|
||||||
|
abbreviati in \fBMo\fP (lunedì), \fBTu\fP, \fBWe\fP, \fBTh\fP, \fBFr\fP, \fBSa\fP e \fBSu\fP
|
||||||
|
(domenica), seguiti da una coppia di orari, separate da un
|
||||||
|
trattino. L'abbreviazione \fBWk\fP rappresenta tutti i giorni da lunedì a
|
||||||
|
venerdì, mentre \fBAl\fP indica tutti i giorni della settimana. Se non si
|
||||||
|
specifica alcun giorno, viene usato implicitamente \fBAl\fP.
|
||||||
|
.SH ESEMPI
|
||||||
|
La voce seguente permette l'accesso all'utente \fBjfh\fP da qualsiasi porta
|
||||||
|
durante i giorni lavorativi dalle 9 alle 17.
|
||||||
|
.br
|
||||||
|
.sp 1
|
||||||
|
*:jfh:Wk0900\-1700
|
||||||
|
.br
|
||||||
|
.sp 1
|
||||||
|
Le voci seguenti permettono l'accesso solo agli utenti \fBroot\fP e \fBoper\fP da
|
||||||
|
/dev/console a qualsiasi ora. Qui viene mostrato come il file
|
||||||
|
\fI/etc/porttime\fP sia una lista ordinata di orari d'accesso: ogni altro
|
||||||
|
utente corrisponderebbe alla seconda voce, che impedisce l'accesso in
|
||||||
|
qualsiasi orario.
|
||||||
|
.br
|
||||||
|
.sp 1
|
||||||
|
console:root,oper:Al0000\-2400
|
||||||
|
.br
|
||||||
|
console:*:
|
||||||
|
.br
|
||||||
|
.sp 1
|
||||||
|
La voce seguente permette l'accesso all'utente \fBgames\fP da qualsiasi porta
|
||||||
|
durante gli orari non lavorativi.
|
||||||
|
.br
|
||||||
|
.sp 1
|
||||||
|
*:games:Wk1700\-0900,SaSu0000\-2400
|
||||||
|
.br
|
||||||
|
.sp 1
|
||||||
|
.SH FILE
|
||||||
|
\fI/etc/porttime\fP \- file contenente le porte e gli orari di accesso
|
||||||
|
.SH "VEDERE ANCHE"
|
||||||
|
\fBlogin\fP(1)
|
||||||
|
.SH AUTORE
|
||||||
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
.SH TRADUZIONE
|
||||||
|
.nf
|
||||||
|
Giuseppe Sacco <eppesuig@debian.org>, 2005
|
||||||
|
Danilo Piazzalunga <danilopiazza@libero.it>, 2005
|
||||||
|
.fi
|
109
man/it/pwck.8
Normal file
109
man/it/pwck.8
Normal file
@ -0,0 +1,109 @@
|
|||||||
|
.\" This file was generated with po4a. Translate the source file.
|
||||||
|
.\"
|
||||||
|
.\"$Id: pwck.8,v 1.1 2005/04/21 21:03:16 kloczek Exp $
|
||||||
|
.\" Copyright 1992, Julianne Frances Haugh
|
||||||
|
.\" All rights reserved.
|
||||||
|
.\"
|
||||||
|
.\" Redistribution and use in source and binary forms, with or without
|
||||||
|
.\" modification, are permitted provided that the following conditions
|
||||||
|
.\" are met:
|
||||||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer.
|
||||||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||||||
|
.\" documentation and/or other materials provided with the distribution.
|
||||||
|
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||||
|
.\" may be used to endorse or promote products derived from this software
|
||||||
|
.\" without specific prior written permission.
|
||||||
|
.\"
|
||||||
|
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||||
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||||
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||||
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
|
.\" SUCH DAMAGE.
|
||||||
|
.TH PWCK 8
|
||||||
|
.SH NOME
|
||||||
|
pwck \- verifica l'integrità dei file delle password
|
||||||
|
.SH SINTASSI
|
||||||
|
\fBpwck\fP [\fB\-sr\fP] [\fIpasswd\fP \fIshadow\fP]
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
\fBgrpck\fP verifica l'integrità delle informazioni di autenticazione del
|
||||||
|
sistema. Ogni voce in \fI/etc/passwd\fP e in \fI/etc/shadow\fP viene controllata
|
||||||
|
per verificare che abbia il formato corretto e dati validi in ciascun
|
||||||
|
campo. Viene richiesto all'utente di rimuovere le voci che non hanno un
|
||||||
|
formato appropriato o che hanno altri errori impossibili da correggere.
|
||||||
|
.P
|
||||||
|
Vengono fatti controlli per verificare che ogni voce abbia:
|
||||||
|
.sp
|
||||||
|
.in +.5i
|
||||||
|
\- il corretto numero di campi
|
||||||
|
.br
|
||||||
|
\- un nome utente univoco
|
||||||
|
.br
|
||||||
|
\- identificatori validi dell'utente e del gruppo
|
||||||
|
.br
|
||||||
|
\- un gruppo primario valido
|
||||||
|
.br
|
||||||
|
\- una home directory valida
|
||||||
|
.br
|
||||||
|
\- una shell di login valida
|
||||||
|
.in \-.5i
|
||||||
|
.sp
|
||||||
|
.PP
|
||||||
|
Gli errori nelle verifiche sul corretto numero di campi e sull'univocità
|
||||||
|
del nome utente sono irrimediabili. Se una voce ha un numero errato di
|
||||||
|
campi, all'utente viene chiesto di cancellare l'intera riga; se l'utente non
|
||||||
|
risponde affermativamente, vengono omessi tutti gli ulteriori
|
||||||
|
controlli. Viene richiesta la cancellazione anche per le voci aventi il nome
|
||||||
|
utente duplicato, ma i rimanenti controlli vengono ugualmente
|
||||||
|
effettuati. Tutti gli altri errori non sono gravi e l'utente è invitato a
|
||||||
|
eseguire il comando \fBusermod\fP per correggerli.
|
||||||
|
.PP
|
||||||
|
I comandi che operano sul file \fI/etc/passwd\fP non sono in grado di
|
||||||
|
modificare voci corrotte o duplicate; in tali circostanze va usato \fBpwck\fP
|
||||||
|
per rimuovere la voce scorretta.
|
||||||
|
.SH OPZIONI
|
||||||
|
Come impostazione predefinita, \fBpwck\fP opera sui file \fI/etc/passwd\fP e in
|
||||||
|
\fI/etc/shadow\fP. L'utente può selezionare file alternativi con i parametri
|
||||||
|
\fIpasswd\fP e \fIshadow\fP. Inoltre, il comando può essere eseguito in modalità
|
||||||
|
di sola lettura specificando l'opzione \fB\-r\fP: questo fa in modo che, senza
|
||||||
|
l'intervento dell'utente, venga risposto \fBno\fP a tutte le domande che
|
||||||
|
riguardano i cambiamenti. Con \fBpwck\fP si possono anche ordinare per UID le
|
||||||
|
voci in \fI/etc/passwd\fP e in \fI/etc/shadow\fP, è sufficiente fornire l'opzione
|
||||||
|
\fB\-s\fP. Non viene effettuato nessun controllo, il programma si limita a
|
||||||
|
ordinare i file.
|
||||||
|
.SH FILE
|
||||||
|
\fI/etc/passwd\fP \- informazioni sugli account degli utenti
|
||||||
|
.br
|
||||||
|
\fI/etc/shadow\fP \- informazioni sicure sugli account degli utenti
|
||||||
|
.br
|
||||||
|
\fI/etc/group\fP \- informazioni sugli account dei gruppi
|
||||||
|
.SH "VEDERE ANCHE"
|
||||||
|
\fBgroup\fP(5), \fBpasswd\fP(5), \fBshadow\fP(5), \fBusermod\fP(8)
|
||||||
|
.SH "VALORI RESTITUITI"
|
||||||
|
.TP 2
|
||||||
|
Il comando \fBpwck\fP restituisce i seguenti valori:
|
||||||
|
\fB0\fP \- successo
|
||||||
|
.br
|
||||||
|
\fB1\fP \- sintassi del comando errata
|
||||||
|
.br
|
||||||
|
\fB2\fP \- una o più voci di password conengono errori
|
||||||
|
.br
|
||||||
|
\fB3\fP \- impossibile aprire i file delle password
|
||||||
|
.br
|
||||||
|
\fB4\fP \- impossibile fare il lock dei file delle password
|
||||||
|
.br
|
||||||
|
\fB5\fP \- impossibile aggiornare i file delle password
|
||||||
|
.SH AUTORE
|
||||||
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
.SH TRADUZIONE
|
||||||
|
.nf
|
||||||
|
Giuseppe Sacco <eppesuig@debian.org>, 2005
|
||||||
|
Danilo Piazzalunga <danilopiazza@libero.it>, 2005
|
||||||
|
.fi
|
58
man/it/pwconv.8
Normal file
58
man/it/pwconv.8
Normal file
@ -0,0 +1,58 @@
|
|||||||
|
.\" $Id: pwconv.8,v 1.1 2002/03/10 07:41:06 kloczek Exp $
|
||||||
|
.\" Traduzione in italiano di Isabella Ruocco <isacher@nettaxi.com>
|
||||||
|
.\" Giugno 1999
|
||||||
|
.TH PWCONV 8 "26 sep 1997"
|
||||||
|
.SH NOME
|
||||||
|
pwconv, pwunconv, grpconv, grpunconv \- convertono a e da password e gruppi shadow.
|
||||||
|
.SH SINTASSI
|
||||||
|
.B pwconv
|
||||||
|
.br
|
||||||
|
.B pwunconv
|
||||||
|
.br
|
||||||
|
.B grpconv
|
||||||
|
.br
|
||||||
|
.B grpunconv
|
||||||
|
.SH DESCRIPTION
|
||||||
|
Questi quattro programmi agiscono tutti sui file normali e e oscurati (shadow)
|
||||||
|
delle password e dei gruppi:
|
||||||
|
.IR /etc/passwd ", " /etc/group ", " /etc/shadow ", e " /etc/gshadow .
|
||||||
|
|
||||||
|
.B pwconv
|
||||||
|
.RI "crea " shadow " da " passwd " e, in modo opzionale, da un preesistente " shadow .
|
||||||
|
.B pwunconv
|
||||||
|
.RI "crea " passwd " da " passwd " e " shadow " e quindi rimuove " shadow .
|
||||||
|
.B grpconv
|
||||||
|
.RI "crea " gshadow " da " group " e, in modo opzionale, da un preesistente " gshadow .
|
||||||
|
.B grpunconv
|
||||||
|
.RI "crea " group " da " group " e " gshadow " e quindi rimuove " gshadow .
|
||||||
|
|
||||||
|
Ciascun programma, prima della conversione, acquisisce i lock necessari.
|
||||||
|
|
||||||
|
.BR pwconv " e " grpconv
|
||||||
|
sono simili. Per prima cosa vengono rimosse le voci nel file oscurato che non esistono
|
||||||
|
nel file principale. Quindi vengono aggiornate le voci oscurate che
|
||||||
|
non hanno `x' come password nel file principale. Vengono aggiunte le eventuali voci
|
||||||
|
oscurate mancanti. Infine, le password nel file principale vengono
|
||||||
|
sostituite con `x'. Questi programmi possono essere usati per le conversioni iniziali
|
||||||
|
così come per aggiornare il file oscurato se il file principale viene editato
|
||||||
|
a mano.
|
||||||
|
|
||||||
|
.B pwconv
|
||||||
|
userà i valori di
|
||||||
|
.BR PASS_MIN_GIORNI ", " PASS_MAX_GIORNI ", e " PASS_GIORNI_PREAVVISO
|
||||||
|
da
|
||||||
|
.I /etc/login.defs
|
||||||
|
quando si aggiungono nuove voci a
|
||||||
|
.IR /etc/shadow .
|
||||||
|
|
||||||
|
.RB "Analogamente, " pwunconv " e " grpunconv
|
||||||
|
sono simili. Le password nel file principale vengono aggiornate
|
||||||
|
dal file oscurato. Voci che esistono nel file principale ma non
|
||||||
|
nel file oscurato vengono lasciate stare. Infine, viene rimosso il file oscurato.
|
||||||
|
|
||||||
|
Alcune informazioni sull'invecchiamento delle password vengono perse da
|
||||||
|
.BR pwunconv .
|
||||||
|
Questo convertirà quello che potrà.
|
||||||
|
.SH "VEDERE ANCHE"
|
||||||
|
.BR login.defs (5),
|
||||||
|
.BR shadowconfig (8)
|
1
man/it/pwunconv.8
Normal file
1
man/it/pwunconv.8
Normal file
@ -0,0 +1 @@
|
|||||||
|
.so man8/pwconv.8
|
1
man/it/sg.1
Normal file
1
man/it/sg.1
Normal file
@ -0,0 +1 @@
|
|||||||
|
.so man1/newgrp.1
|
141
man/it/shadow.3
Normal file
141
man/it/shadow.3
Normal file
@ -0,0 +1,141 @@
|
|||||||
|
.\" This file was generated with po4a. Translate the source file.
|
||||||
|
.\"
|
||||||
|
.\" $Id: shadow.3,v 1.1 2005/04/21 21:03:16 kloczek Exp $
|
||||||
|
.\" Copyright 1989 - 1993, Julianne Frances Haugh
|
||||||
|
.\" All rights reserved.
|
||||||
|
.\"
|
||||||
|
.\" Redistribution and use in source and binary forms, with or without
|
||||||
|
.\" modification, are permitted provided that the following conditions
|
||||||
|
.\" are met:
|
||||||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer.
|
||||||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||||||
|
.\" documentation and/or other materials provided with the distribution.
|
||||||
|
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||||
|
.\" may be used to endorse or promote products derived from this software
|
||||||
|
.\" without specific prior written permission.
|
||||||
|
.\"
|
||||||
|
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||||
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||||
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||||
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
|
.\" SUCH DAMAGE.
|
||||||
|
.TH SHADOW 3
|
||||||
|
.SH NOME
|
||||||
|
shadow \- gestione del file delle password cifrate
|
||||||
|
.SH SINTASSI
|
||||||
|
\fB#include <shadow.h>\fP
|
||||||
|
.PP
|
||||||
|
\fBstruct spwd *getspent();\fP
|
||||||
|
.PP
|
||||||
|
\fBstruct spwd *getspnam(char\fP \fI*name\fP\fB);\fP
|
||||||
|
.PP
|
||||||
|
\fBvoid setspent();\fP
|
||||||
|
.PP
|
||||||
|
\fBvoid endspent();\fP
|
||||||
|
.PP
|
||||||
|
\fBstruct spwd *fgetspent(FILE\fP \fI*fp\fP\fB);\fP
|
||||||
|
.PP
|
||||||
|
\fBstruct spwd *sgetspent(char\fP \fI*cp\fP\fB);\fP
|
||||||
|
.PP
|
||||||
|
\fBint putspent(struct spwd\fP \fI*p,\fP \fBFILE\fP \fI*fp\fP\fB);\fP
|
||||||
|
.PP
|
||||||
|
\fBint lckpwdf();\fP
|
||||||
|
.PP
|
||||||
|
\fBint ulckpwdf();\fP
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
\fIshadow\fP manipola il contenuto del file delle shadow password,
|
||||||
|
\fI/etc/shadow\fP. La struttura nel file \fI#include\fP è la seguente:
|
||||||
|
.sp
|
||||||
|
struct spwd {
|
||||||
|
.in +.5i
|
||||||
|
.br
|
||||||
|
char \t *sp_namp; /* login dell'utente */
|
||||||
|
.br
|
||||||
|
char \t *sp_pwdp; /* password cifrata */
|
||||||
|
.br
|
||||||
|
long int \tsp_lstchg; /* ultimo cambio della password */
|
||||||
|
.br
|
||||||
|
long int \tsp_min; /* giorni minimi tra i cambi */
|
||||||
|
.br
|
||||||
|
long int \tsp_max; /* giorni massimi tra i cambi */
|
||||||
|
.br
|
||||||
|
long int \tsp_warn; /* giorni di preavviso */
|
||||||
|
.br
|
||||||
|
long int \tsp_inact; /* giorni di inattività */
|
||||||
|
.br
|
||||||
|
long int \tsp_expire; /* data di scadenza dell'account */
|
||||||
|
.br
|
||||||
|
unsigned long int sp_flag; /* riservato per uso futuro */
|
||||||
|
.br
|
||||||
|
.in \-.5i
|
||||||
|
}
|
||||||
|
.PP
|
||||||
|
Ciascun campo significa:
|
||||||
|
.sp
|
||||||
|
sp_namp \- puntatore a una stringa null\-terminated che contiene il nome
|
||||||
|
utente.
|
||||||
|
.br
|
||||||
|
sp_pwdp \- puntatore a una stringa null\-terminated che contiene la password.
|
||||||
|
.br
|
||||||
|
sp_lstchg \- giorni a partire dal 1 gennaio 1970 in cui la password è stata
|
||||||
|
cambiata l'ultima volta.
|
||||||
|
.br
|
||||||
|
sp_min \- giorni prima dei quali la password non può essere cambiata.
|
||||||
|
.br
|
||||||
|
sp_max \- giorni dopo i quali la password deve essere cambiata.
|
||||||
|
.br
|
||||||
|
sp_warn \- giorni prima della scadenza della password in cui l'utente viene
|
||||||
|
avvertito.
|
||||||
|
.br
|
||||||
|
sp_inact \- giorni dopo la scadenza della password in cui l'account viene
|
||||||
|
considerato inattivo e disabilitato.
|
||||||
|
.br
|
||||||
|
sp_expire \- giorni a partire dal 1 gennaio 1970 dopo i quali l'account viene
|
||||||
|
disabilitato.
|
||||||
|
.br
|
||||||
|
sp_flag \- riservato per uso futuro.
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
\fBgetspent\fP, \fBgetspname\fP, \fBfgetspent\fP e \fBsgetspent\fP restituiscono un
|
||||||
|
puntatore a uno \fBstruct spwd\fP. \fBgetspent\fP restituisce la voce successiva
|
||||||
|
nel file, \fBfgetspent\fP la voce successiva nello stream specificato, che si
|
||||||
|
suppone sia un file nel formato corretto. \fBsgetspent\fP restituisce un
|
||||||
|
puntatore a uno \fBstruct spwd\fP usando come input la stringa
|
||||||
|
fornita. \fBgetspnam\fP cerca una voce che corrisponde a \fBname\fP partendo dalla
|
||||||
|
posizione corrente nel file.
|
||||||
|
.PP
|
||||||
|
\fBsetspent\fP e \fBendspent\fP sono usate rispettivamente per iniziare e
|
||||||
|
terminare l'accesso al file delle shadow password.
|
||||||
|
.PP
|
||||||
|
Le funzioni \fBlckpwdf\fP e \fBulckpwdf\fP si usano per garantire l'accesso
|
||||||
|
esclusivo al file \fI/etc/shadow\fP. \fBlckpwdf\fP prova ad acquisire il lock
|
||||||
|
tramite \fBpw_lock\fP per un massimo di 15 secondi, dopodiché tenta di
|
||||||
|
ottenere un secondo lock usando \fBspw_lock\fP per il tempo che rimane dei 15
|
||||||
|
secondi iniziali. Se anche uno solo dei due tentativi fallisce dopo un
|
||||||
|
totale di 15 secondi, \fBlckpwdf\fP restituisce \-1, mentre restituisce 0 se
|
||||||
|
riesce ad acquisire entrambi i lock.
|
||||||
|
.SH DIAGNOSTICA
|
||||||
|
Le funzioni restituiscono NULL se non ci sono altre voci disponibili o se si
|
||||||
|
verifica un errore durante l'elaborazione. Le funzioni di tipo \fBint\fP
|
||||||
|
restituiscono 0 in caso di successo e \-1 in caso di errore.
|
||||||
|
.SH AVVISI/CAVEAT
|
||||||
|
Queste funzioni possono essere usate solo dall'amministratore, perché
|
||||||
|
l'accesso al file delle shadow password è riservato.
|
||||||
|
.SH FILE
|
||||||
|
\fI/etc/shadow\fP \- informazioni sicure sugli account degli utenti
|
||||||
|
.SH "VEDERE ANCHE"
|
||||||
|
\fBgetpwent\fP(3), \fBshadow\fP(5)
|
||||||
|
.SH AUTORE
|
||||||
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
.SH TRADUZIONE
|
||||||
|
.nf
|
||||||
|
Giuseppe Sacco <eppesuig@debian.org>, 2005
|
||||||
|
Danilo Piazzalunga <danilopiazza@libero.it>, 2005
|
||||||
|
.fi
|
99
man/it/shadow.5
Normal file
99
man/it/shadow.5
Normal file
@ -0,0 +1,99 @@
|
|||||||
|
.\" This file was generated with po4a. Translate the source file.
|
||||||
|
.\"
|
||||||
|
.\"$Id: shadow.5,v 1.4 2005/04/21 21:03:16 kloczek Exp $
|
||||||
|
.\" Copyright 1989 - 1990, Julianne Frances Haugh
|
||||||
|
.\" All rights reserved.
|
||||||
|
.\"
|
||||||
|
.\" Redistribution and use in source and binary forms, with or without
|
||||||
|
.\" modification, are permitted provided that the following conditions
|
||||||
|
.\" are met:
|
||||||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer.
|
||||||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||||||
|
.\" documentation and/or other materials provided with the distribution.
|
||||||
|
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||||
|
.\" may be used to endorse or promote products derived from this software
|
||||||
|
.\" without specific prior written permission.
|
||||||
|
.\"
|
||||||
|
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||||
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||||
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||||
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
|
.\" SUCH DAMAGE.
|
||||||
|
.TH SHADOW 5
|
||||||
|
.SH NOME
|
||||||
|
shadow \- file delle password cifrate
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
\fIshadow\fP contiene le informazioni sulle password cifrate per gli account
|
||||||
|
degli utenti e, opzionalmente, le informazioni sulla durata delle
|
||||||
|
password. Sono inclusi:
|
||||||
|
.IP "" .5i
|
||||||
|
Nome di login
|
||||||
|
.IP "" .5i
|
||||||
|
Password cifrata
|
||||||
|
.IP "" .5i
|
||||||
|
Giorni a partire dal 1 gennaio 1970 in cui la password è stata cambiata
|
||||||
|
l'ultima volta
|
||||||
|
.IP "" .5i
|
||||||
|
Giorni prima dei quali la password non può essere cambiata
|
||||||
|
.IP "" .5i
|
||||||
|
Giorni dopo i quali la password deve essere cambiata
|
||||||
|
.IP "" .5i
|
||||||
|
Giorni prima della scadenza della password in cui l'utente viene avvertito
|
||||||
|
.IP "" .5i
|
||||||
|
Giorni dopo la scadenza della password in cui l'account viene disabilitato
|
||||||
|
.IP "" .5i
|
||||||
|
Giorni a partire dal 1 gennaio 1970 dopo i quali l'account viene
|
||||||
|
disabilitato
|
||||||
|
.IP "" .5i
|
||||||
|
Campo riservato
|
||||||
|
.PP
|
||||||
|
Il campo password non può essere vuoto. La password cifrata è composta da
|
||||||
|
un numero compreso tra 13 a 24 di caratteri scelti da un alfabeto di 64
|
||||||
|
caratteri: da a fino a z, da A a Z, da 0 a 9, . e /. Facoltativamente, la
|
||||||
|
password può iniziare con il carattere "$"; questo sta a indicare che la
|
||||||
|
password cifrata è stata generata usando un algoritmo diverso da DES. Ad
|
||||||
|
esempio, "$1$" significa che è stato usato un algoritmo basato su MD5.
|
||||||
|
.PP
|
||||||
|
Fare riferimento a \fBcrypt\fP(3) per dettagli sul modo in cui questa stringa
|
||||||
|
viene interpretata.
|
||||||
|
.PP
|
||||||
|
La data dell'ultimo cambio della password è espressa come il numero di
|
||||||
|
giorni trascorsi dal 1 gennaio 1970. La passowrd non può essere cambiata
|
||||||
|
nuovamente prima che sia passato il numero di giorni previsti, ma deve
|
||||||
|
obbligatoriamente essere cambiata dopo il massimo numero di giorni. Se il
|
||||||
|
numero minimo di giorni richiesti è superiore al numero massimo di giorni
|
||||||
|
concessi, all'utente non è permesso cambiare la password.
|
||||||
|
.PP
|
||||||
|
Un account viene considerato inattivo e viene disabilitato se, dopo la
|
||||||
|
scadenza, la password non viene cambiata entro il numero di giorni
|
||||||
|
specificato. Inoltre, un account viene disabilitato il giorno specificato,
|
||||||
|
senza tener conto di altre informazioni sulla scadenza della password.
|
||||||
|
.PP
|
||||||
|
Queste informazioni hanno la precedenza su qualunque informazione sulle
|
||||||
|
password o sulla loro durata presente in \fI/etc/passwd\fP.
|
||||||
|
.PP
|
||||||
|
Questo file non deve essere leggibile dagli utenti se si vuole mantenere la
|
||||||
|
sicurezza delle password.
|
||||||
|
.SH FILE
|
||||||
|
\fI/etc/passwd\fP \- informazioni sugli account degli utenti
|
||||||
|
.br
|
||||||
|
\fI/etc/shadow\fP \- informazioni sicure sugli account degli utenti
|
||||||
|
.SH "VEDERE ANCHE"
|
||||||
|
\fBchage\fP(1), \fBlogin\fP(1), \fBpasswd\fP(1), \fBsu\fP(1), \fBpasswd\fP(5),
|
||||||
|
\fBpwconv\fP(8), \fBpwunconv\fP(8), \fBsulogin\fP(8)
|
||||||
|
.SH AUTORE
|
||||||
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
.SH TRADUZIONE
|
||||||
|
.nf
|
||||||
|
Isabella Ruocco <isacher@nettaxi.com>, 1999
|
||||||
|
Giuseppe Sacco <eppesuig@debian.org>, 2005
|
||||||
|
Danilo Piazzalunga <danilopiazza@libero.it>, 2005
|
||||||
|
.fi
|
78
man/it/su.1
Normal file
78
man/it/su.1
Normal file
@ -0,0 +1,78 @@
|
|||||||
|
.\" This file was generated with po4a. Translate the source file.
|
||||||
|
.\"
|
||||||
|
.\" $Id: su.1,v 1.1 2005/04/21 21:03:16 kloczek Exp $
|
||||||
|
.\" Copyright 1989 - 1990, Julianne Frances Haugh
|
||||||
|
.\" All rights reserved.
|
||||||
|
.\"
|
||||||
|
.\" Redistribution and use in source and binary forms, with or without
|
||||||
|
.\" modification, are permitted provided that the following conditions
|
||||||
|
.\" are met:
|
||||||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer.
|
||||||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||||||
|
.\" documentation and/or other materials provided with the distribution.
|
||||||
|
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||||
|
.\" may be used to endorse or promote products derived from this software
|
||||||
|
.\" without specific prior written permission.
|
||||||
|
.\"
|
||||||
|
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||||
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||||
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||||
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
|
.\" SUCH DAMAGE.
|
||||||
|
.TH SU 1
|
||||||
|
.SH NOME
|
||||||
|
su \- cambia ID utente o diventa amministratore
|
||||||
|
.SH SINTASSI
|
||||||
|
\fBsu\fP [\fB\-\fP] [\fInome_utente\fP [\fIargomenti\fP]]
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
\fBsu\fP permette di diventare un altro utente durante una sessione di
|
||||||
|
login. Se nessun nome utente viene specificato, \fBsu\fP acquisice i privilegi
|
||||||
|
di amministratore. L'opzione \fB\-\fP può essere usata per fornire un ambiente
|
||||||
|
simile a quello che l'utente troverebbe se effettuasse il login
|
||||||
|
direttamente.
|
||||||
|
.PP
|
||||||
|
Dopo il nome utente, è possibile specificare argomenti aggiuntivi da
|
||||||
|
passare alla shell di login dell'utente. In particolare, molti interpreti di
|
||||||
|
comando adottano la convenzione per cui l'opzione \fB\-c\fP seguita da un
|
||||||
|
argomento fa sì che quest'ultimo sia considerato un comando.Il comando
|
||||||
|
viene eseguito dalla shell specificata in \fI/etc/passwd\fP per l'utente di
|
||||||
|
destinazione.
|
||||||
|
.PP
|
||||||
|
All'utente viene quindi chiesta la password, se necessario. Una password
|
||||||
|
errata viene segnalata da un messaggio d'errore. Viene effettuato il log di
|
||||||
|
tutti i tentativi, siano essi riusciti o meno, al fine di rilevare ogni
|
||||||
|
abuso del sistema.
|
||||||
|
.PP
|
||||||
|
Le variabili d'ambiente in uso vengono passate alla nuova shell, eccetto il
|
||||||
|
valore di \fB$PATH\fP che viene impostato a \fB/bin:/usr/bin\fP per gli utenti
|
||||||
|
qualsiasi e a \fB/sbin:/bin:/usr/sbin:/usr/bin\fP per l'amministratore. Questa
|
||||||
|
impostazione è controllata dalle definizioni \fBENV_PATH\fP ed \fBENV_SUPATH\fP
|
||||||
|
in \fI/etc/login.defs\fP.
|
||||||
|
.PP
|
||||||
|
Un accesso a un sottosistema è indicato dalla presenza del carattere "*"
|
||||||
|
all'inizio della shell di login. La home directory impostata diventa la root
|
||||||
|
di un nuovo file system al quale l'utente accede.
|
||||||
|
.SH AVVISI/CAVEAT
|
||||||
|
Questa versione di \fBsu\fP ha molte opzioni di compilazione; solo una parte di
|
||||||
|
esse potrebbe essere in uso su un determinato sistema.
|
||||||
|
.SH FILE
|
||||||
|
\fI/etc/passwd\fP \- informazioni sugli account degli utenti
|
||||||
|
.br
|
||||||
|
\fI/etc/shadow\fP \- informazioni sicure sugli account degli utenti
|
||||||
|
.SH "VEDERE ANCHE"
|
||||||
|
\fBlogin\fP(1), \fBsh\fP(1), \fBlogin.defs\fP(5), \fBsuauth\fP(5)
|
||||||
|
.SH AUTORE
|
||||||
|
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
|
||||||
|
.SH TRADUZIONE
|
||||||
|
.nf
|
||||||
|
Giuseppe Sacco <eppesuig@debian.org>, 2005
|
||||||
|
Danilo Piazzalunga <danilopiazza@libero.it>, 2005
|
||||||
|
.fi
|
198
man/it/useradd.8
Normal file
198
man/it/useradd.8
Normal file
@ -0,0 +1,198 @@
|
|||||||
|
.\" Copyright 1991 \- 1994, Julianne Frances Haugh
|
||||||
|
.\" All rights reserved.
|
||||||
|
.\"
|
||||||
|
.\" Redistribution and use in source and binary forms, with or without
|
||||||
|
.\" modification, are permitted provided that the following conditions
|
||||||
|
.\" are met:
|
||||||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer.
|
||||||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||||||
|
.\" documentation and/or other materials provided with the distribution.
|
||||||
|
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||||
|
.\" may be used to endorse or promote products derived from this software
|
||||||
|
.\" without specific prior written permission.
|
||||||
|
.\"
|
||||||
|
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||||
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||||
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||||
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
|
.\" SUCH DAMAGE.
|
||||||
|
.\"
|
||||||
|
.\" $Id: useradd.8,v 1.7 2005/04/05 19:08:54 kloczek Exp $
|
||||||
|
.\"
|
||||||
|
.\" Traduzione in italiano a cura di Isabella Ruocco <isacher@nettaxi.com>
|
||||||
|
.\" luglio 1999
|
||||||
|
.\"
|
||||||
|
.TH USERADD 8
|
||||||
|
.SH NOME
|
||||||
|
useradd \- Crea un nuovo utente o aggiorna le informazioni predefinite per
|
||||||
|
i nuovi utenti
|
||||||
|
.SH SINTASSI
|
||||||
|
.TP 8
|
||||||
|
.B useradd
|
||||||
|
.\" .RB [ \-A
|
||||||
|
.\" .RI { metodo | \fBPREDEFINITO\fR "},... ]"
|
||||||
|
.RB [ \-c
|
||||||
|
.IR commento ]
|
||||||
|
.RB [ \-d
|
||||||
|
.IR home_dir ]
|
||||||
|
.br
|
||||||
|
.RB [ \-e
|
||||||
|
.IR data_scadenza ]
|
||||||
|
.RB [ \-f
|
||||||
|
.IR tempo_inattività ]
|
||||||
|
.br
|
||||||
|
.RB [ \-g
|
||||||
|
.IR gruppo_iniziale ]
|
||||||
|
.RB [ \-G
|
||||||
|
.IR gruppo [,...]]
|
||||||
|
.br
|
||||||
|
.RB [ \-m " [" \-k
|
||||||
|
.IR dir_scheletro ]]
|
||||||
|
.RB [ \-s
|
||||||
|
.IR shell ]
|
||||||
|
.br
|
||||||
|
.RB [ \-u
|
||||||
|
.IR uid " ["
|
||||||
|
.BR \-o ]]
|
||||||
|
.I login
|
||||||
|
.TP 8
|
||||||
|
.B useradd
|
||||||
|
\fB\-D\fR
|
||||||
|
[\fB\-g\fI gruppo_predefinito\fR]
|
||||||
|
[\fB\-b\fI home_predefinita\fR]
|
||||||
|
.br
|
||||||
|
[\fB\-f\fI inattività_predefinita\fR]
|
||||||
|
[\fB\-e\fI data_scadenza_predefinita\fR]
|
||||||
|
.br
|
||||||
|
[\fB\-s\fI shell_predefinita\fR]
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
.SS Creare Nuovi Utenti
|
||||||
|
Quando viene invocato senza l'opzione \fB\-D\fR, il comando \fBuseradd\fR
|
||||||
|
crea un nuovo account di utente usando i valori specificati sulla linea di
|
||||||
|
comando ed i valori predefiniti dal sistema.
|
||||||
|
Il nuovo account di utente verrà aggiunto ai file di sistema che lo necessitano,
|
||||||
|
verrà creata la home directory, e lì verranno copiati i file iniziali, a seconda
|
||||||
|
delle opzioni sulla linea di comando.
|
||||||
|
.SH OPZIONI
|
||||||
|
Le opzioni che si applicano al comando \fBuseradd\fR sono:
|
||||||
|
.\" .IP "\fB\-A {\fImetodo\fR|\fBPREDEFINITO\fR},..."
|
||||||
|
.\" Il valore del metodo di autenticazione dell'utente.
|
||||||
|
.\" Il metodo di autenticazione è il nome di un programma che è responsabile
|
||||||
|
.\" della validazione dell'identità dell'utente.
|
||||||
|
.\" La stringa \fBPREDEFINITO\fR può essere usata per cambiare il metodo di
|
||||||
|
.\" autenticazione dell'utente con il metodo standard di sistema delle
|
||||||
|
.\" password.
|
||||||
|
.\" Questa è una lista di nomi di programmi separati da virgole.
|
||||||
|
.\" Può includere \fBPREDEFINITO\fR esattamente una volta.
|
||||||
|
.IP "\fB\-c \fIcommento\fR"
|
||||||
|
Il campo commento del nuovo utente nel file password.
|
||||||
|
.IP "\fB\-d \fIhome_dir\fR"
|
||||||
|
Il nuovo utente verrà creato usando \fIhome_dir\fR come valore per la
|
||||||
|
directory di login dell'utente.
|
||||||
|
Il comportamento predefinito è di appendere il nome \fIlogin\fR a
|
||||||
|
\fIhome_predefinita\fR ed usare quella come nome di directory di login.
|
||||||
|
.IP "\fB\-e \fIdata_scadenza\fR"
|
||||||
|
La data in cui verrà disabilitato l'account dell'utente.
|
||||||
|
La data è specificata nel formato \fIMM/GG/AA\fR.
|
||||||
|
.IP "\fB\-f \fIgiorni_inattività\fR"
|
||||||
|
Il numero di giorni dopo la scadenza della password fino a quando l'account
|
||||||
|
verrà permanentemente disabilitato.
|
||||||
|
Un valore pari a 0 disabilita l'account non appena è scaduta la password,
|
||||||
|
ed un valore pari a \-1 disabilita questa caratteristica.
|
||||||
|
Il valore predefinito è \-1.
|
||||||
|
.IP "\fB\-g \fIgruppo_iniziale\fR"
|
||||||
|
IL nome o numero del gruppo iniziale di login dell'utente.
|
||||||
|
Il nome del gruppo deve esistere. Un numero di gruppo deve fare riferimento
|
||||||
|
ad un gruppo già esistente.
|
||||||
|
Il numero di gruppo predefinito è 1.
|
||||||
|
.IP "\fB\-G \fIgruppo,[...]\fR"
|
||||||
|
Una lista di gruppi supplementari di cui l'utente è altresì membro.
|
||||||
|
Ciascun gruppo è separato dal successivo da una virgola, senza spazi
|
||||||
|
bianchi intermedi.
|
||||||
|
I gruppi sono soggetti alle stesse restrizioni del gruppo dato con
|
||||||
|
l'opzione \fB\-g\fR.
|
||||||
|
Il comportamento predefinito è che l'utente appartenga solo al gruppo
|
||||||
|
iniziale.
|
||||||
|
.IP \fB\-m\fR
|
||||||
|
La home directory dell'utente verrà creata se non esiste.
|
||||||
|
I file contenuti in \fIdir_scheletro\fR saranno copiati nella home directory
|
||||||
|
se viene usata l'opzione \fB\-k\fR, altrimenti verranno usati i file
|
||||||
|
contenuti in \fI/etc/skel\fR.
|
||||||
|
Anche tutte le directory contenute in \fIdir_scheletro\fR o \fI/etc/skel\fR
|
||||||
|
verranno create nella home directory dell'utente.
|
||||||
|
L'opzione \fB\-k\fR è valida solo in congiunzione con l'opzione \fB\-m\fR.
|
||||||
|
Il comportamento predefinito è di non creare la directory e di non copiarvi
|
||||||
|
alcun file.
|
||||||
|
.IP "\fB\-s \fIshell\fR"
|
||||||
|
Il nome della shell di login dell'utente.
|
||||||
|
Il comportamento predefinito è di lasciare vuoto questo campo, che fa sì che
|
||||||
|
il sistema selezioni la shell di connessione predefinita.
|
||||||
|
.IP "\fB\-u \fIuid\fR"
|
||||||
|
Il valore numerico dell'ID dell'utente.
|
||||||
|
Questo valore deve essere univoco, a meno che non venga usata l'opzione
|
||||||
|
\fI\-o\fR.
|
||||||
|
Il valore deve essere non\-negativo.
|
||||||
|
Il comportamento predefinito è di usare il minimo valore di ID superiore a 999
|
||||||
|
e superiore a quello di ogni altro utente.
|
||||||
|
Valori tra 0 e 999 sono tipicamente riservati per account di sistema.
|
||||||
|
.SS Cambiare i valori predefiniti
|
||||||
|
Quando invocato con l'opzione \fB\-D\fR, \fBuseradd\fR o mostrerà i valori
|
||||||
|
predefiniti correnti, oppure aggiornerà i valori predefiniti dalla linea
|
||||||
|
di comando.
|
||||||
|
Le opzioni valide sono
|
||||||
|
.IP "\fB\-b \fIhome_predefinita\fR"
|
||||||
|
Il prefisso del percorso per la home directory del nuovo utente.
|
||||||
|
Il nome dell'utente verrà aggiunto alla fine di \fIhome_predefinita\fR
|
||||||
|
per creare il nome della nuova directory se non viene usata l'opzione \fB\-d\fI
|
||||||
|
quando si crea un nuovo account.
|
||||||
|
.IP "\fB\-e \fIdata_scadenza_predefinita\fR"
|
||||||
|
La data in cui l'account dell'utente verrà disabilitato.
|
||||||
|
.IP "\fB\-f \fIinattività_predefinita\fR"
|
||||||
|
Il numero di giorni dopo la scadenza di una password prima che l'account
|
||||||
|
venga disabilitato.
|
||||||
|
.IP "\fB\-g \fIgruppo_predefinito\fR"
|
||||||
|
Il nome o ID del gruppo iniziale per un nuovo utente.
|
||||||
|
Il gruppo nominato deve esistere, ed un ID numerico di gruppo deve avere una
|
||||||
|
voce esistente.
|
||||||
|
.IP "\fB\-s \fIshell_predifinita\fR"
|
||||||
|
Il nome della shell di login per un nuovo utente.
|
||||||
|
Il programma nominato verrà usato per tutti gli account dei futuri nuovi
|
||||||
|
utenti.
|
||||||
|
.PP
|
||||||
|
Se non è specificata alcuna opzione, \fBuseradd\fR mostra i valori predefiniti
|
||||||
|
correnti.
|
||||||
|
.SH NOTE
|
||||||
|
L'amministratore di sistema è responsabile del posizionamento dei file
|
||||||
|
predefiniti degli utenti nella directory \fI/etc/skel\fR.
|
||||||
|
.SH CAVEAT
|
||||||
|
Non è possibile aggiungere un utente ad un gruppo NIS.
|
||||||
|
Questo deve essere fatto sul server NIS.
|
||||||
|
.SH FILE
|
||||||
|
\fI/etc/passwd\fR \- informazioni sugli account di utenti
|
||||||
|
.br
|
||||||
|
\fI/etc/shadow\fR \- informazioni sicure sugli account di utenti
|
||||||
|
.br
|
||||||
|
\fI/etc/group\fR \- informazioni sui gruppi
|
||||||
|
.br
|
||||||
|
\fI/etc/default/useradd\fR \- informazioni predefinite
|
||||||
|
.br
|
||||||
|
\fI/etc/skel/ \fR\- directory contenente i file predefiniti
|
||||||
|
.SH VEDERE ANCHE
|
||||||
|
.BR chfn (1),
|
||||||
|
.BR chsh (1),
|
||||||
|
.BR groupadd (8),
|
||||||
|
.BR groupdel (8),
|
||||||
|
.BR groupmod (8),
|
||||||
|
.BR passwd (1),
|
||||||
|
.BR userdel (8),
|
||||||
|
.BR usermod (8)
|
||||||
|
.SH AUTORE
|
||||||
|
Julianne Frances Haugh (jfh@tab.com)
|
72
man/it/userdel.8
Normal file
72
man/it/userdel.8
Normal file
@ -0,0 +1,72 @@
|
|||||||
|
.\" Copyright 1991 \- 1994, Julianne Frances Haugh
|
||||||
|
.\" All rights reserved.
|
||||||
|
.\"
|
||||||
|
.\" Redistribution and use in source and binary forms, with or without
|
||||||
|
.\" modification, are permitted provided that the following conditions
|
||||||
|
.\" are met:
|
||||||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer.
|
||||||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||||||
|
.\" documentation and/or other materials provided with the distribution.
|
||||||
|
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||||
|
.\" may be used to endorse or promote products derived from this software
|
||||||
|
.\" without specific prior written permission.
|
||||||
|
.\"
|
||||||
|
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||||
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||||
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||||
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
|
.\" SUCH DAMAGE.
|
||||||
|
.\"
|
||||||
|
.\" $Id: userdel.8,v 1.4 2005/04/05 19:08:54 kloczek Exp $
|
||||||
|
.\"
|
||||||
|
.\" Traduzione in italiano a cura di Isabella Ruocco <isacher@nettaxi.com>
|
||||||
|
.\" luglio 1999
|
||||||
|
.\"
|
||||||
|
.TH USERDEL 8
|
||||||
|
.SH NOME
|
||||||
|
userdel \- Rimuove l'account di un utente ed i file relativi
|
||||||
|
.SH SINTASSI
|
||||||
|
.B userdel
|
||||||
|
[\fB\-r\fR]
|
||||||
|
.I login
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
Il comando \fBuserdel\fR modifica i file di account del sistema, rimuovendo
|
||||||
|
tutte le voci che si riferiscono a \fIlogin\fR.
|
||||||
|
L'utente nominato deve esistere.
|
||||||
|
.IP \fB\-r\fR
|
||||||
|
I file nella home directory dell'utente verranno rimossi insieme alla home
|
||||||
|
directory stessa.
|
||||||
|
I file collocati in altri file system dovranno essere ricercati e rimossi
|
||||||
|
manualmente.
|
||||||
|
.SH FILE
|
||||||
|
\fI/etc/passwd\fR \- informazioni sugli account di utenti
|
||||||
|
.br
|
||||||
|
\fI/etc/shadow\fR \- informazioni sicure sugli account di utenti
|
||||||
|
.br
|
||||||
|
\fI/etc/group\fR \- informazioni sui gruppi
|
||||||
|
.SH CAVEAT
|
||||||
|
\fBuserdel\fR non permetterà di rimuovere alcun account se l'utente è
|
||||||
|
attualmente connesso.
|
||||||
|
Occorre uccidere qualunque processo in esecuzione che appartenga ad un account
|
||||||
|
che si sta rimuovendo.
|
||||||
|
Non è possibile rimuovere nessun attributo NIS su un client NIS.
|
||||||
|
Questo deve essere fatto sul server NIS.
|
||||||
|
.SH VEDERE ANCHE
|
||||||
|
.BR chfn (1),
|
||||||
|
.BR chsh (1),
|
||||||
|
.BR groupadd (8),
|
||||||
|
.BR groupdel (8),
|
||||||
|
.BR groupmod (8),
|
||||||
|
.BR passwd (1),
|
||||||
|
.BR useradd (8),
|
||||||
|
.BR usermod (8)
|
||||||
|
.SH AUTORE
|
||||||
|
Julianne Frances Haugh (jfh@tab.com)
|
142
man/it/usermod.8
Normal file
142
man/it/usermod.8
Normal file
@ -0,0 +1,142 @@
|
|||||||
|
.\" Copyright 1991 \- 1994, Julianne Frances Haugh
|
||||||
|
.\" All rights reserved.
|
||||||
|
.\"
|
||||||
|
.\" Redistribution and use in source and binary forms, with or without
|
||||||
|
.\" modification, are permitted provided that the following conditions
|
||||||
|
.\" are met:
|
||||||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer.
|
||||||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||||||
|
.\" documentation and/or other materials provided with the distribution.
|
||||||
|
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
||||||
|
.\" may be used to endorse or promote products derived from this software
|
||||||
|
.\" without specific prior written permission.
|
||||||
|
.\"
|
||||||
|
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
||||||
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
||||||
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||||
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
|
.\" SUCH DAMAGE.
|
||||||
|
.\"
|
||||||
|
.\" $Id: usermod.8,v 1.7 2005/04/05 19:08:54 kloczek Exp $
|
||||||
|
.\"
|
||||||
|
.\" Traduzione in italiano a cura di Isabella Ruocco <isacher@nettaxi.com>
|
||||||
|
.\" luglio 1999
|
||||||
|
.\"
|
||||||
|
.TH USERMOD 8
|
||||||
|
.SH NOME
|
||||||
|
usermod \- Modifica l'account di un utente
|
||||||
|
.SH SINTASSI
|
||||||
|
.TP 8
|
||||||
|
.B usermod
|
||||||
|
.RB [ \-c
|
||||||
|
.IR commento ]
|
||||||
|
.RB [ \-d
|
||||||
|
.IR home_dir " ["
|
||||||
|
.BR \-m ]]
|
||||||
|
.br
|
||||||
|
.RB [ \-e
|
||||||
|
.IR data_scadenza ]
|
||||||
|
.RB [ \-f
|
||||||
|
.IR tempo_inattività ]
|
||||||
|
.br
|
||||||
|
.RB [ \-g
|
||||||
|
.IR gruppo_iniziale ]
|
||||||
|
.RB [ \-G
|
||||||
|
.IR gruppo [,...]]
|
||||||
|
.br
|
||||||
|
.RB [ \-l
|
||||||
|
.IR nome_login ]
|
||||||
|
.RB [ \-s
|
||||||
|
.IR shell ]
|
||||||
|
.br
|
||||||
|
.RB [ \-u
|
||||||
|
.IR uid " ["
|
||||||
|
.BR \-o ]]
|
||||||
|
.I login
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
Il comando \fBusermod\fR modifica i file di account di sistema in modo da
|
||||||
|
riflettere le modifiche specificate sulla linea di comando.
|
||||||
|
Le opzioni che si applicano al comando \fBusermod\fR sono
|
||||||
|
.IP "\fB\-c\fR \fIcommento\fR"
|
||||||
|
Il campo commento del nuovo utente nel file password.
|
||||||
|
Normalmente viene modificato usando l'utilità \fBchfn\fR(1).
|
||||||
|
.IP "\fB\-d\fR \fIhome_dir\fR"
|
||||||
|
La nuova directory di login dell'utente.
|
||||||
|
Se è data l'opzione \fB\-m\fR il contenuto della home directory corrente
|
||||||
|
sarà spostato nella nuova home directory, che viene creata se non esiste già.
|
||||||
|
.IP "\fB\-e\fR \fIdata_scadenza\fR"
|
||||||
|
La data in cui l'account dell'utente verrà disabilitato.
|
||||||
|
La data è specificata nel formato \fIMM/GG/AA\fR.
|
||||||
|
.IP "\fB\-f\fR \fIgiorni_inattività\fR"
|
||||||
|
Il numero di giorni dopo la scadenza di una password prima che l'account
|
||||||
|
venga permanentemente disabilitato.
|
||||||
|
Un valore pari a 0 disabilita l'account non appena la password è scaduta,
|
||||||
|
ed un valore pari a \-1 disabilita la caratteristica.
|
||||||
|
Il valore predefinito è \-1.
|
||||||
|
.IP "\fB\-g\fR \fIgruppo_iniziale\fR"
|
||||||
|
Il nuome o numero del nuovo gruppo di connessione dell'utente.
|
||||||
|
Il nome del gruppo deve esistere. Un numero di gruppo deve riferirsi ad un
|
||||||
|
gruppo già esistente.
|
||||||
|
Il numero di gruppo predefinito è 1.
|
||||||
|
.IP "\fB\-G\fR \fIgruppo,[...]\fR"
|
||||||
|
Una lista di gruppi supplementari di cui l'utente è altresì membro.
|
||||||
|
Ciascun gruppo è separato dal successivo da una virgola, senza spazi bianchi
|
||||||
|
intermedi.
|
||||||
|
I gruppi sono soggetti alle stesse restrizioni del gruppo dato con l'opzione
|
||||||
|
\fB\-g\fR.
|
||||||
|
Se l'utente è attualmente membro di un gruppo che non è elencato, l'utente
|
||||||
|
verrà rimosso dal gruppo.
|
||||||
|
.IP "\fB\-l\fR \fInome_login\fR"
|
||||||
|
Il nome dell'utente verrà cambiato da \fIlogin\fR a \fInome_login\fR.
|
||||||
|
Niente altro viene cambiato.
|
||||||
|
In particolare, la home directory dell'utente dovrebbe probabilmente
|
||||||
|
essere modificata in modo da riflettere il nuovo nome di login.
|
||||||
|
.IP "\fB\-s\fR \fIshell\fR"
|
||||||
|
Il nome della nuova shell di login dell'utente.
|
||||||
|
Lasciando questo campo vuoto si fa in modo che il sistema selezioni la shell
|
||||||
|
di connessione predefinita.
|
||||||
|
.IP "\fB\-u\fR \fIuid\fR"
|
||||||
|
Il valore numerico dell'ID dell'utente.
|
||||||
|
Questo valore deve essere univoco, a meno che non venga usata l'opzione
|
||||||
|
\fB\-o\fR.
|
||||||
|
Questo valore deve essere non\-negativo.
|
||||||
|
Valori tra 0 e 999 sono tipicamente riservati ad account di sistema.
|
||||||
|
Tutti i file che l'utente possiede e che sono posiszionati nell'albero di
|
||||||
|
directory avente come radice la home directory dell'utente avranno l'ID utente del
|
||||||
|
file cambiato automaticamente.
|
||||||
|
I file fuori della home directory dell'utente devono essere modificati
|
||||||
|
manualmente.
|
||||||
|
.SH CAVEAT
|
||||||
|
\fBusermod\fR non permetterà di modificare il nome di un utente che è
|
||||||
|
attualmente connesso.
|
||||||
|
Occorre essere certi che l'utente nominato non sta eseguendo alcun processo
|
||||||
|
quando questo comando viene eseguito se l'ID numerico dell'utente sta per
|
||||||
|
essere cambiato.
|
||||||
|
Occorre cambiare il proprietario di ogni file crontab manualmente.
|
||||||
|
Occorre cambiare il proprietario di ogni job manualmente.
|
||||||
|
Occorre fare qualunque cambiamento che riguarda NIS sul server NIS.
|
||||||
|
.SH FILE
|
||||||
|
\fI/etc/passwd\fR \- informazioni sugli account di utenti
|
||||||
|
.br
|
||||||
|
\fI/etc/shadow\fR \- informazioni sicure sugli account di utenti
|
||||||
|
.br
|
||||||
|
\fI/etc/group\fR \- informazioni sui gruppi
|
||||||
|
.SH VEDERE ANCHE
|
||||||
|
.BR chfn (1),
|
||||||
|
.BR chsh (1),
|
||||||
|
.BR groupadd (8),
|
||||||
|
.BR groupdel (8),
|
||||||
|
.BR groupmod (8),
|
||||||
|
.BR passwd (1),
|
||||||
|
.BR useradd (8),
|
||||||
|
.BR userdel (8)
|
||||||
|
.SH AUTORE
|
||||||
|
Julianne Frances Haugh (jfh@tab.com)
|
1
man/it/vigr.8
Normal file
1
man/it/vigr.8
Normal file
@ -0,0 +1 @@
|
|||||||
|
.so man8/vipw.8
|
27
man/it/vipw.8
Normal file
27
man/it/vipw.8
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
.\" This file was generated with po4a. Translate the source file.
|
||||||
|
.\"
|
||||||
|
.\"$Id: vipw.8,v 1.3 2005/04/21 21:03:16 kloczek Exp $
|
||||||
|
.TH VIPW 8 26/09/1997
|
||||||
|
.SH NOME
|
||||||
|
vipw, vigr \- modificano i file delle password, dei gruppi, delle shadow
|
||||||
|
password o dei gruppi shadow
|
||||||
|
.SH SINTASSI
|
||||||
|
\fBvipw\fP [\fB\-s\fP]
|
||||||
|
.br
|
||||||
|
\fBvigr\fP [\fB\-s\fP]
|
||||||
|
.SH DESCRIZIONE
|
||||||
|
\fBvipw\fP e \fBvigr\fP permettono di modificare rispettivamente i file
|
||||||
|
\fI/etc/passwd\fP e \fI/etc/group\fP. Con l'opzione \fB\-s\fP, vengono aperte le
|
||||||
|
versioni shadow di quei file, rispettivamente \fI/etc/shadow\fP e
|
||||||
|
\fI/etc/gshadow\fP. I programmi si occupano di impostare i lock necessari per
|
||||||
|
evitare la corruzione dei file. Per determinare l'editor da usare, i
|
||||||
|
programmi prima provano con la variabile d'ambiente \fBVISUAL\fP, poi con la
|
||||||
|
variabile d'ambiente \fBEDITOR\fP e infine con l'editor predefinito, \fBvi\fP.
|
||||||
|
.SH "VEDERE ANCHE"
|
||||||
|
\fBgroup\fP(5), \fBpasswd\fP(5), \fBshadow\fP(5)
|
||||||
|
.SH TRADUZIONE
|
||||||
|
.nf
|
||||||
|
Isabella Ruocco <isacher@nettaxi.com>, 1999
|
||||||
|
Giuseppe Sacco <eppesuig@debian.org>, 2005
|
||||||
|
Danilo Piazzalunga <danilopiazza@libero.it>, 2005
|
||||||
|
.fi
|
@ -1,78 +1,67 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "LASTLOG" "8" "08/10/2005" "" ""
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "LASTLOG" 8 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
lastlog \- examine lastlog file
|
lastlog \- examine lastlog file
|
||||||
.SH "SYNOPSIS"
|
.SH "SYNOPSIS"
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 8
|
.HP 8
|
||||||
\fBlastlog\fR [\fIoptions\fR]
|
\fBlastlog\fR [\fIoptions\fR]
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
|
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBlastlog\fR formats and prints the contents of the last login log \fI/var/log/lastlog\fR file\&. The \fI login\-name\fR, \fIport\fR, and \fIlast login time\fR will be printed\&. The default (no flags) causes lastlog entries to be printed, sorted by their order in \fI/etc/passwd\fR\&.
|
\fBlastlog\fR
|
||||||
|
formats and prints the contents of the last login log
|
||||||
|
\fI/var/log/lastlog\fR
|
||||||
|
file. The
|
||||||
|
\fI login\-name\fR,
|
||||||
|
\fIport\fR, and
|
||||||
|
\fIlast login time\fR
|
||||||
|
will be printed. The default (no flags) causes lastlog entries to be printed, sorted by their order in
|
||||||
|
\fI/etc/passwd\fR.
|
||||||
.SH "OPTIONS"
|
.SH "OPTIONS"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
The options which apply to the \fBlastlog\fR command are:
|
The options which apply to the \fBlastlog\fR command are:
|
||||||
.TP
|
.TP
|
||||||
\fB\-h\fR, \fB\-\-help\fR
|
\fB\-h\fR, \fB\-\-help\fR
|
||||||
Print help message and exit\&.
|
Print help message and exit.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-t\fR, \fB\-\-time\fR \fIDAYS\fR
|
\fB\-t\fR, \fB\-\-time\fR \fIDAYS\fR
|
||||||
Print the lastlog records more recent than \fIDAYS\fR\&.
|
Print the lastlog records more recent than
|
||||||
|
\fIDAYS\fR.
|
||||||
.TP
|
.TP
|
||||||
\fB\-u\fR, \fB\-\-user\fR \fILOGIN\fR
|
\fB\-u\fR, \fB\-\-user\fR \fILOGIN\fR
|
||||||
Print the lastlog record for user with specified \fILOGIN\fR only\&.
|
Print the lastlog record for user with specified
|
||||||
|
\fILOGIN\fR
|
||||||
|
only.
|
||||||
.TP
|
.TP
|
||||||
The \fB\-t\fR flag overrides the use of \fB\-u\fR\&.
|
The \fB\-t\fR flag overrides the use of \fB\-u\fR.
|
||||||
|
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
If the user has never logged in the message \fI **Never logged in**\fR will be displayed instead of the port and time\&.
|
If the user has never logged in the message
|
||||||
|
\fI **Never logged in**\fR
|
||||||
|
will be displayed instead of the port and time.
|
||||||
.SH "NOTE"
|
.SH "NOTE"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The \fBlastlog\fR file is a database which contains info on the last login of each user\&. You should not rotate it\&. It is a sparse file, so its size on the disk is much smaller than the one shown by \fBls \-l\fR (which can indicate a really big file if you have an high UID)\&. You can display its real size with \fBls \-s\fR\&.
|
The
|
||||||
|
\fBlastlog\fR
|
||||||
|
file is a database which contains info on the last login of each user. You should not rotate it. It is a sparse file, so its size on the disk is much smaller than the one shown by
|
||||||
|
\fBls \-l\fR
|
||||||
|
(which can indicate a really big file if you have a high UID). You can display its real size with
|
||||||
|
\fBls \-s\fR.
|
||||||
.SH "FILES"
|
.SH "FILES"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fI/var/log/lastlog\fR
|
\fI/var/log/lastlog\fR
|
||||||
lastlog logging file
|
lastlog logging file
|
||||||
.SH "CAVEATS"
|
.SH "CAVEATS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Large gaps in uid numbers will cause the lastlog program to run longer with no output to the screen (i\&.e\&. if mmdf=800 and last uid=170, program will appear to hang as it processes uid 171\-799)\&.
|
Large gaps in uid numbers will cause the lastlog program to run longer with no output to the screen (i.e. if mmdf=800 and last uid=170, program will appear to hang as it processes uid 171\-799).
|
||||||
|
|
||||||
.SH "AUTHORS"
|
.SH "AUTHORS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com) Phillip Street
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
.PP
|
||||||
|
Phillip Street
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||||
<refentry id='lastlog.8'>
|
<refentry id='lastlog.8'>
|
||||||
<!-- $Id: lastlog.8.xml,v 1.7 2005/07/11 16:33:21 kloczek Exp $ -->
|
<!-- $Id: lastlog.8.xml,v 1.9 2005/08/10 07:41:27 kloczek Exp $ -->
|
||||||
<refmeta>
|
<refmeta>
|
||||||
<refentrytitle>lastlog</refentrytitle>
|
<refentrytitle>lastlog</refentrytitle>
|
||||||
<manvolnum>8</manvolnum>
|
<manvolnum>8</manvolnum>
|
||||||
@ -99,7 +99,7 @@
|
|||||||
on the last login of each user. You should not rotate it. It is a sparse
|
on the last login of each user. You should not rotate it. It is a sparse
|
||||||
file, so its size on the disk is much smaller than the one shown by
|
file, so its size on the disk is much smaller than the one shown by
|
||||||
<command>ls -l</command> (which can indicate a really big file if
|
<command>ls -l</command> (which can indicate a really big file if
|
||||||
you have an high UID). You can display its real size with
|
you have a high UID). You can display its real size with
|
||||||
<command>ls -s</command>.
|
<command>ls -s</command>.
|
||||||
</para>
|
</para>
|
||||||
</refsect1>
|
</refsect1>
|
||||||
@ -124,8 +124,7 @@
|
|||||||
|
|
||||||
<refsect1 id='authors'>
|
<refsect1 id='authors'>
|
||||||
<title>AUTHORS</title>
|
<title>AUTHORS</title>
|
||||||
<para>Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
<para>Julianne Frances Haugh (jockgrrl@ix.netcom.com)</para>
|
||||||
Phillip Street
|
<para>Phillip Street</para>
|
||||||
</para>
|
|
||||||
</refsect1>
|
</refsect1>
|
||||||
</refentry>
|
</refentry>
|
||||||
|
162
man/login.1
162
man/login.1
@ -1,105 +1,110 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "LOGIN" "1" "08/03/2005" "User Commands" "User Commands"
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "LOGIN" 1 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
login \- begin session on the system
|
login \- begin session on the system
|
||||||
.SH "SYNOPSIS"
|
.SH "SYNOPSIS"
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 6
|
.HP 6
|
||||||
\fBlogin\fR [\-p] [\fIusername\fR] [\fIENV=VAR\fR...]
|
\fBlogin\fR [\-p] [\fIusername\fR] [\fIENV=VAR\fR...]
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 6
|
.HP 6
|
||||||
\fBlogin\fR [\-p] [\-h\ \fIhost\fR] [\-f\ \fIusername\fR]
|
\fBlogin\fR [\-p] [\-h\ \fIhost\fR] [\-f\ \fIusername\fR]
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 6
|
.HP 6
|
||||||
\fBlogin\fR [\-p] \-r\ \fIhost\fR
|
\fBlogin\fR [\-p] \-r\ \fIhost\fR
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
|
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBlogin\fR is used to establish a new session with the system\&. It is normally invoked automatically by responding to the \fIlogin:\fR prompt on the user´s terminal\&. \fBlogin\fR may be special to the shell and may not be invoked as a sub\-process\&. Typically, \fBlogin\fR is treated by the shell as \fIexec login\fR which causes the user to exit from the current shell\&. Attempting to execute \fBlogin\fR from any shell but the login shell will produce an error message\&.
|
\fBlogin\fR
|
||||||
|
is used to establish a new session with the system. It is normally invoked automatically by responding to the
|
||||||
|
\fIlogin:\fR
|
||||||
|
prompt on the user\(aas terminal.
|
||||||
|
\fBlogin\fR
|
||||||
|
may be special to the shell and may not be invoked as a sub\-process. Typically,
|
||||||
|
\fBlogin\fR
|
||||||
|
is treated by the shell as
|
||||||
|
\fIexec login\fR
|
||||||
|
which causes the user to exit from the current shell. Attempting to execute
|
||||||
|
\fBlogin\fR
|
||||||
|
from any shell but the login shell will produce an error message.
|
||||||
.PP
|
.PP
|
||||||
The user is then prompted for a password, where appropriate\&. Echoing is disabled to prevent revealing the password\&. Only a small number of password failures are permitted before \fBlogin\fR exits and the communications link is severed\&.
|
The user is then prompted for a password, where appropriate. Echoing is disabled to prevent revealing the password. Only a small number of password failures are permitted before
|
||||||
|
\fBlogin\fR
|
||||||
|
exits and the communications link is severed.
|
||||||
.PP
|
.PP
|
||||||
If password aging has been enabled for your account, you may be prompted for a new password before proceeding\&. You will be forced to provide your old password and the new password before continuing\&. Please refer to \fBpasswd\fR(1) for more information\&.
|
If password aging has been enabled for your account, you may be prompted for a new password before proceeding. You will be forced to provide your old password and the new password before continuing. Please refer to
|
||||||
|
\fBpasswd\fR(1)
|
||||||
|
for more information.
|
||||||
.PP
|
.PP
|
||||||
After a successful login, you will be informed of any system messages and the presence of mail\&. You may turn off the printing of the system message file, \fI/etc/motd\fR, by creating a zero\-length file \&.hushlogin in your login directory\&. The mail message will be one of "\fIYou have new mail\&.\fR ", "\fIYou have mail\&.\fR", or "\fINo Mail\&.\fR "according to the condition of your mailbox\&.
|
After a successful login, you will be informed of any system messages and the presence of mail. You may turn off the printing of the system message file,
|
||||||
|
\fI/etc/motd\fR, by creating a zero\-length file
|
||||||
|
.hushlogin
|
||||||
|
in your login directory. The mail message will be one of "\fIYou have new mail.\fR
|
||||||
|
", "\fIYou have mail.\fR", or "\fINo Mail.\fR
|
||||||
|
"according to the condition of your mailbox.
|
||||||
.PP
|
.PP
|
||||||
Your user and group ID will be set according to their values in the \fI/etc/passwd\fR file\&. The value for \fI$HOME\fR, \fI$SHELL\fR, \fI$PATH\fR, \fI$LOGNAME\fR, and \fI$MAIL\fR are set according to the appropriate fields in the password entry\&. Ulimit, umask and nice values may also be set according to entries in the GECOS field\&.
|
Your user and group ID will be set according to their values in the
|
||||||
|
\fI/etc/passwd\fR
|
||||||
|
file. The value for
|
||||||
|
\fI$HOME\fR,
|
||||||
|
\fI$SHELL\fR,
|
||||||
|
\fI$PATH\fR,
|
||||||
|
\fI$LOGNAME\fR, and
|
||||||
|
\fI$MAIL\fR
|
||||||
|
are set according to the appropriate fields in the password entry. Ulimit, umask and nice values may also be set according to entries in the GECOS field.
|
||||||
.PP
|
.PP
|
||||||
On some installations, the environmental variable \fI$TERM\fR will be initialized to the terminal type on your tty line, as specified in \fI/etc/ttytype\fR\&.
|
On some installations, the environmental variable
|
||||||
|
\fI$TERM\fR
|
||||||
|
will be initialized to the terminal type on your tty line, as specified in
|
||||||
|
\fI/etc/ttytype\fR.
|
||||||
.PP
|
.PP
|
||||||
An initialization script for your command interpreter may also be executed\&. Please see the appropriate manual section for more information on this function\&.
|
An initialization script for your command interpreter may also be executed. Please see the appropriate manual section for more information on this function.
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
A subsystem login is indicated by the presence of a "*" as the first character of the login shell\&. The given home directory will be used as the root of a new file system which the user is actually logged into\&.
|
A subsystem login is indicated by the presence of a "*" as the first character of the login shell. The given home directory will be used as the root of a new file system which the user is actually logged into.
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The \fBlogin\fR program is NOT responsible for removing users from the utmp file\&. It is the responsibility of getty(8) and init(8) to clean up apparent ownership of a terminal session\&. If you use \fBlogin\fR from the shell prompt without \fBexec\fR, the user you use will continue to appear to be logged in even after you log out of the "subsession"\&.
|
The
|
||||||
|
\fBlogin\fR
|
||||||
|
program is NOT responsible for removing users from the utmp file. It is the responsibility of
|
||||||
|
getty(8)
|
||||||
|
and
|
||||||
|
init(8)
|
||||||
|
to clean up apparent ownership of a terminal session. If you use
|
||||||
|
\fBlogin\fR
|
||||||
|
from the shell prompt without
|
||||||
|
\fBexec\fR, the user you use will continue to appear to be logged in even after you log out of the "subsession".
|
||||||
.SH "OPTIONS"
|
.SH "OPTIONS"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-f\fR
|
\fB\-f\fR
|
||||||
Do not perform authentication, user is preauthenticated\&.
|
Do not perform authentication, user is preauthenticated.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-h\fR
|
\fB\-h\fR
|
||||||
Name of the remote host for this login\&.
|
Name of the remote host for this login.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-p\fR
|
\fB\-p\fR
|
||||||
Preserve environment\&.
|
Preserve environment.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-r\fR
|
\fB\-r\fR
|
||||||
Perform autologin protocol for rlogin\&.
|
Perform autologin protocol for rlogin.
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The \fB\-r\fR, \fB\-h\fR and \fB\-f\fR options are only used when \fBlogin\fR is invoked by root\&.
|
The
|
||||||
|
\fB\-r\fR,
|
||||||
|
\fB\-h\fR
|
||||||
|
and
|
||||||
|
\fB\-f\fR
|
||||||
|
options are only used when
|
||||||
|
\fBlogin\fR
|
||||||
|
is invoked by root.
|
||||||
.SH "CAVEATS"
|
.SH "CAVEATS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
This version of \fBlogin\fR has many compilation options, only some of which may be in use at any particular site\&.
|
This version of
|
||||||
|
\fBlogin\fR
|
||||||
|
has many compilation options, only some of which may be in use at any particular site.
|
||||||
.PP
|
.PP
|
||||||
The location of files is subject to differences in system configuration\&.
|
The location of files is subject to differences in system configuration.
|
||||||
|
|
||||||
.SH "FILES"
|
.SH "FILES"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fI/var/run/utmp\fR
|
\fI/var/run/utmp\fR
|
||||||
list of current login sessions
|
list of current login sessions
|
||||||
@ -122,15 +127,18 @@ prevent non\-root users from logging in
|
|||||||
\fI/etc/ttytype\fR
|
\fI/etc/ttytype\fR
|
||||||
list of terminal types
|
list of terminal types
|
||||||
.TP
|
.TP
|
||||||
\fI$HOME/\&.hushlogin\fR
|
\fI$HOME/.hushlogin\fR
|
||||||
suppress printing of system messages
|
suppress printing of system messages
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBmail\fR(1), \fBpasswd\fR(1), \fBsh\fR(1), \fBsu\fR(1), \fBlogin\&.defs\fR(5), \fBnologin\fR(5), \fBpasswd\fR(5), \fBgetty\fR(8)
|
\fBmail\fR(1),
|
||||||
|
\fBpasswd\fR(1),
|
||||||
|
\fBsh\fR(1),
|
||||||
|
\fBsu\fR(1),
|
||||||
|
\fBlogin.defs\fR(5),
|
||||||
|
\fBnologin\fR(5),
|
||||||
|
\fBpasswd\fR(5),
|
||||||
|
\fBgetty\fR(8)
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Julianne Frances Haugh <jockgrrl@ix\&.netcom\&.com>
|
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
|
||||||
|
|
||||||
|
@ -1,43 +1,48 @@
|
|||||||
.\"$Id: login.access.5,v 1.6 2005/04/02 16:10:24 kloczek Exp $
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.\" this is comment
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.TH LOGIN.ACCESS 5
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.\" .Dt SKEY.ACCESS 5
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.\" .Os FreeBSD 1.2
|
.TH "LOGIN.ACCESS" "5" "08/03/2005" "" ""
|
||||||
.SH NAME
|
.\" disable hyphenation
|
||||||
|
.nh
|
||||||
|
.\" disable justification (adjust text to left margin only)
|
||||||
|
.ad l
|
||||||
|
.SH "NAME"
|
||||||
login.access \- Login access control table
|
login.access \- Login access control table
|
||||||
.SH DESCRIPTION
|
.SH "DESCRIPTION"
|
||||||
The \fIlogin.access\fR file specifies (user, host) combinations and/or
|
|
||||||
(user, tty) combinations for which a login will be either accepted or
|
|
||||||
refused.
|
|
||||||
.PP
|
.PP
|
||||||
When someone logs in, the \fIlogin.access\fR is scanned for the first entry
|
The
|
||||||
that matches the (user, host) combination, or, in case of non\-networked
|
\fIlogin.access\fR
|
||||||
logins, the first entry that matches the (user, tty) combination. The
|
file specifies (user, host) combinations and/or (user, tty) combinations for which a login will be either accepted or refused.
|
||||||
permissions field of that table entry determines whether the login will be
|
|
||||||
accepted or refused.
|
|
||||||
.PP
|
.PP
|
||||||
Each line of the login access control table has three fields separated by a
|
When someone logs in, the
|
||||||
":" character:
|
\fIlogin.access\fR
|
||||||
.sp 1
|
is scanned for the first entry that matches the (user, host) combination, or, in case of non\-networked logins, the first entry that matches the (user, tty) combination. The permissions field of that table entry determines whether the login will be accepted or refused.
|
||||||
.IR permission : users : origins
|
|
||||||
.sp 1
|
|
||||||
The first field should be a "\fB+\fR" (access granted) or "\fB\-\fR" (access
|
|
||||||
denied) character. The second field should be a list of one or more login
|
|
||||||
names, group names, or \fBALL\fR (always matches). The third field should be
|
|
||||||
a list of one or more tty names (for non\-networked logins), host names,
|
|
||||||
domain names (begin with "\fB.\fR"), host addresses, internet network
|
|
||||||
numbers (end with "\fB.\fR"), \fBALL\fR (always matches) or \fBLOCAL\fR
|
|
||||||
(matches any string that does not contain a "\fB.\fR" character). If you run
|
|
||||||
NIS you can use @netgroupname in host or user patterns.
|
|
||||||
.PP
|
.PP
|
||||||
The \fBEXCEPT\fR operator makes it possible to write very compact rules.
|
Each line of the login access control table has three fields separated by a ":" character:
|
||||||
|
.PP
|
||||||
|
\fIpermission\fR:\fIusers\fR:\fI origins \fR
|
||||||
|
.PP
|
||||||
|
The first field should be a "\fI+\fR" (access granted) or "\fI\-\fR" (access denied) character. The second field should be a list of one or more login names, group names, or
|
||||||
|
\fIALL\fR
|
||||||
|
(always matches). The third field should be a list of one or more tty names (for non\-networked logins), host names, domain names (begin with "."), host addresses, internet network numbers (end with "."),
|
||||||
|
\fIALL\fR
|
||||||
|
(always matches) or
|
||||||
|
\fI LOCAL \fR
|
||||||
|
(matches any string that does not contain a "." character). If you run NIS you can use @netgroupname in host or user patterns.
|
||||||
|
.PP
|
||||||
|
The
|
||||||
|
\fIEXCEPT\fR
|
||||||
|
operator makes it possible to write very compact rules.
|
||||||
|
.PP
|
||||||
|
The group file is searched only when a name does not match that of the logged\-in user. Only groups are matched in which users are explicitly listed: the program does not look at a user's primary group id value.
|
||||||
|
.SH "FILES"
|
||||||
|
.PP
|
||||||
|
\fI/etc/loginn.defs\fR
|
||||||
|
\- shadow password suite configuration
|
||||||
|
.SH "SEE ALSO"
|
||||||
|
.PP
|
||||||
|
\fBlogin\fR(1)
|
||||||
|
.SH "AUTHOR"
|
||||||
.PP
|
.PP
|
||||||
The group file is searched only when a name does not match that of the
|
|
||||||
logged\-in user. Only groups are matched in which users are explicitly
|
|
||||||
listed: the program does not look at a user's primary group id value.
|
|
||||||
.SH FILES
|
|
||||||
\fI/etc/loginn.defs\fR \- shadow password suite configuration
|
|
||||||
.SH SEE ALSO
|
|
||||||
.BR login (1)
|
|
||||||
.SH AUTHOR
|
|
||||||
Guido van Rooij
|
Guido van Rooij
|
||||||
|
136
man/login.defs.5
136
man/login.defs.5
@ -1,135 +1,125 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "LOGIN.DEFS" "5" "08/03/2005" "" ""
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "LOGIN.DEFS" 5 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
login.defs \- shadow password suite configuration
|
login.defs \- shadow password suite configuration
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The \fI/etc/login\&.defs\fR file defines the site\-specific configuration for the shadow password suite\&. This file is required\&. Absence of this file will not prevent system operation, but will probably result in undesirable operation\&.
|
The
|
||||||
|
\fI/etc/login.defs\fR
|
||||||
|
file defines the site\-specific configuration for the shadow password suite. This file is required. Absence of this file will not prevent system operation, but will probably result in undesirable operation.
|
||||||
.PP
|
.PP
|
||||||
This file is a readable text file, each line of the file describing one configuration parameter\&. The lines consist of a configuration name and value, separated by whitespace\&. Blank lines and comment lines are ignored\&. Comments are introduced with a `#' pound sign and the pound sign must be the first non\-white character of the line\&.
|
This file is a readable text file, each line of the file describing one configuration parameter. The lines consist of a configuration name and value, separated by whitespace. Blank lines and comment lines are ignored. Comments are introduced with a `#' pound sign and the pound sign must be the first non\-white character of the line.
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Parameter values may be of four types: strings, booleans, numbers, and long numbers\&. A string is comprised of any printable characters\&. A boolean should be either the value “yes” or “no”\&. An undefined boolean parameter or one with a value other than these will be given a “no” value\&. Numbers (both regular and long) may be either decimal values, octal values (precede the value with “0”) or hexadecimal values (precede the value with “0x”)\&. The maximum value of the regular and long numeric parameters is machine\-dependent\&.
|
Parameter values may be of four types: strings, booleans, numbers, and long numbers. A string is comprised of any printable characters. A boolean should be either the value \(lqyes\(rq or \(lqno\(rq. An undefined boolean parameter or one with a value other than these will be given a \(lqno\(rq value. Numbers (both regular and long) may be either decimal values, octal values (precede the value with \(lq0\(rq) or hexadecimal values (precede the value with \(lq0x\(rq). The maximum value of the regular and long numeric parameters is machine\-dependent.
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The following configuration items are provided:
|
The following configuration items are provided:
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
CHFN_AUTH (boolean)
|
CHFN_AUTH (boolean)
|
||||||
If \fIyes\fR, the \fBchfn\fR and \fBchsh\fR programs will require authentication before making any changes, unless run by the superuser\&.
|
If
|
||||||
|
\fIyes\fR, the
|
||||||
|
\fBchfn\fR
|
||||||
|
and
|
||||||
|
\fBchsh\fR
|
||||||
|
programs will require authentication before making any changes, unless run by the superuser.
|
||||||
.TP
|
.TP
|
||||||
CHFN_RESTRICT (string)
|
CHFN_RESTRICT (string)
|
||||||
This parameter specifies which values in the \fIgecos\fR field of the \fI/etc/passwd\fR file may be changed by regular users using the \fBchfn\fR program\&. It can be any combination of letters \fIf\fR ,\fIr\fR, \fIw\fR, \fIh\fR, for Full name, Room number, Work phone, and Home phone, respectively\&. For backward compatibility, "yes" is equivalent to "rwh" and "no" is equivalent to "frwh"\&. If not specified, only the superuser can make any changes\&. The most restrictive setting is better achieved by not installing chfn SUID\&.
|
This parameter specifies which values in the
|
||||||
|
\fIgecos\fR
|
||||||
|
field of the
|
||||||
|
\fI/etc/passwd\fR
|
||||||
|
file may be changed by regular users using the
|
||||||
|
\fBchfn\fR
|
||||||
|
program. It can be any combination of letters
|
||||||
|
\fIf\fR
|
||||||
|
,\fIr\fR,
|
||||||
|
\fIw\fR,
|
||||||
|
\fIh\fR, for Full name, Room number, Work phone, and Home phone, respectively. For backward compatibility, "yes" is equivalent to "rwh" and "no" is equivalent to "frwh". If not specified, only the superuser can make any changes. The most restrictive setting is better achieved by not installing chfn SUID.
|
||||||
.TP
|
.TP
|
||||||
CREATE_HOME (boolean)
|
CREATE_HOME (boolean)
|
||||||
This defines whether useradd should create home directories for users by default\&. This option is OR'ed with the \fB\-m\fR flag on useradd command line\&.
|
This defines whether useradd should create home directories for users by default. This option is OR'ed with the
|
||||||
|
\fB\-m\fR
|
||||||
|
flag on useradd command line.
|
||||||
.TP
|
.TP
|
||||||
GID_MAX (number), GID_MIN (number)
|
GID_MAX (number), GID_MIN (number)
|
||||||
Range of group IDs to choose from for the \fBuseradd\fR and \fBgroupadd\fRprograms\&.
|
Range of group IDs to choose from for the
|
||||||
|
\fBuseradd\fR
|
||||||
|
and
|
||||||
|
\fBgroupadd\fRprograms.
|
||||||
.TP
|
.TP
|
||||||
MAIL_DIR (string)
|
MAIL_DIR (string)
|
||||||
The mail spool directory\&. This is needed to manipulate the mailbox when its corresponding user account is modified or deleted\&. If not specified, a compile\-time default is used\&.
|
The mail spool directory. This is needed to manipulate the mailbox when its corresponding user account is modified or deleted. If not specified, a compile\-time default is used.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
PASS_MAX_DAYS (number)
|
PASS_MAX_DAYS (number)
|
||||||
The maximum number of days a password may be used\&. If the password is older than this, a password change will be forced\&. If not specified, \-1 will be assumed (which disables the restriction)\&.
|
The maximum number of days a password may be used. If the password is older than this, a password change will be forced. If not specified, \-1 will be assumed (which disables the restriction).
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
PASS_MIN_DAYS (number)
|
PASS_MIN_DAYS (number)
|
||||||
The minimum number of days allowed between password changes\&. Any password changes attempted sooner than this will be rejected\&. If not specified, \-1 will be assumed (which disables the restriction)\&.
|
The minimum number of days allowed between password changes. Any password changes attempted sooner than this will be rejected. If not specified, \-1 will be assumed (which disables the restriction).
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
PASS_WARN_AGE (number)
|
PASS_WARN_AGE (number)
|
||||||
The number of days warning given before a password expires\&. A zero means warning is given only upon the day of expiration, a negative value means no warning is given\&. If not specified, no warning will be provided\&.
|
The number of days warning given before a password expires. A zero means warning is given only upon the day of expiration, a negative value means no warning is given. If not specified, no warning will be provided.
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
PASS_MAX_DAYS, PASS_MIN_DAYS and PASS_WARN_AGE are only used at the time of account creation\&. Any changes to these settings won't affect existing accounts\&.
|
PASS_MAX_DAYS, PASS_MIN_DAYS and PASS_WARN_AGE are only used at the time of account creation. Any changes to these settings won't affect existing accounts.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
UID_MAX (number), UID_MIN (number)
|
UID_MAX (number), UID_MIN (number)
|
||||||
Range of user IDs to choose from for the \fBuseradd\fR program\&.
|
Range of user IDs to choose from for the
|
||||||
|
\fBuseradd\fR
|
||||||
|
program.
|
||||||
.TP
|
.TP
|
||||||
UMASK (number)
|
UMASK (number)
|
||||||
The permission mask is initialized to this value\&. If not specified, the permission mask will be initialized to 077\&.
|
The permission mask is initialized to this value. If not specified, the permission mask will be initialized to 077.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
USERDEL_CMD (string)
|
USERDEL_CMD (string)
|
||||||
If defined, this command is run when removing a user\&. It should remove any at/cron/print jobs etc\&. owned by the user to be removed (passed as the first argument)\&.
|
If defined, this command is run when removing a user. It should remove any at/cron/print jobs etc. owned by the user to be removed (passed as the first argument).
|
||||||
|
|
||||||
.SH "CROSS REFERENCE"
|
.SH "CROSS REFERENCE"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The following cross reference shows which programs in the shadow password suite use which parameters\&.
|
The following cross reference shows which programs in the shadow password suite use which parameters.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
chfn
|
chfn
|
||||||
CHFN_AUTH CHFN_RESTRICT
|
CHFN_AUTH CHFN_RESTRICT
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
chsh
|
chsh
|
||||||
CHFN_AUTH
|
CHFN_AUTH
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
groupadd
|
groupadd
|
||||||
GID_MAX GID_MIN
|
GID_MAX GID_MIN
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
newusers
|
newusers
|
||||||
PASS_MAX_DAYS PASS_MIN_DAYS PASS_WARN_AGE UMASK
|
PASS_MAX_DAYS PASS_MIN_DAYS PASS_WARN_AGE UMASK
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
pwconv
|
pwconv
|
||||||
PASS_MAX_DAYS PASS_MIN_DAYS PASS_WARN_AGE
|
PASS_MAX_DAYS PASS_MIN_DAYS PASS_WARN_AGE
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
useradd
|
useradd
|
||||||
CREATE_HOME GID_MAX GID_MIN PASS_MAX_DAYS PASS_MIN_DAYS PASS_WARN_AGE UID_MAX UID_MIN UMASK
|
CREATE_HOME GID_MAX GID_MIN PASS_MAX_DAYS PASS_MIN_DAYS PASS_WARN_AGE UID_MAX UID_MIN UMASK
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
userdel
|
userdel
|
||||||
MAIL_DIR USERDEL_CMD
|
MAIL_DIR USERDEL_CMD
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
usermod
|
usermod
|
||||||
MAIL_DIR
|
MAIL_DIR
|
||||||
|
|
||||||
.SH "BUGS"
|
.SH "BUGS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Much of the functionality that used to be provided by the shadow password suite is now handled by PAM\&. Thus, \fI/etc/login\&.defs\fR is no longer used by programs such as: \fBlogin\fR(1), \fBpasswd\fR(1), \fBsu\fR(1)\&. Please refer to the corresponding PAM configuration files instead\&.
|
Much of the functionality that used to be provided by the shadow password suite is now handled by PAM. Thus,
|
||||||
|
\fI/etc/login.defs\fR
|
||||||
|
is no longer used by programs such as:
|
||||||
|
\fBlogin\fR(1),
|
||||||
|
\fBpasswd\fR(1),
|
||||||
|
\fBsu\fR(1). Please refer to the corresponding PAM configuration files instead.
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBlogin\fR(1), \fBpasswd\fR(1), \fBsu\fR(1), \fBpasswd\fR(5), \fBshadow\fR(5), \fBpam\fR(8)
|
\fBlogin\fR(1),
|
||||||
|
\fBpasswd\fR(1),
|
||||||
|
\fBsu\fR(1),
|
||||||
|
\fBpasswd\fR(5),
|
||||||
|
\fBshadow\fR(5),
|
||||||
|
\fBpam\fR(8)
|
||||||
.SH "AUTHORS"
|
.SH "AUTHORS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com) Chip Rosenthal (chip@unicom\&.com)
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com) Chip Rosenthal (chip@unicom.com)
|
||||||
|
|
||||||
|
@ -1,46 +1,36 @@
|
|||||||
.\"$Id: logoutd.8,v 1.11 2005/04/02 16:10:24 kloczek Exp $
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.\" Copyright 1991, Julianne Frances Haugh
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.\" All rights reserved.
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.\"
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.\" Redistribution and use in source and binary forms, with or without
|
.TH "LOGOUTD" "8" "08/03/2005" "" ""
|
||||||
.\" modification, are permitted provided that the following conditions
|
.\" disable hyphenation
|
||||||
.\" are met:
|
.nh
|
||||||
.\" 1. Redistributions of source code must retain the above copyright
|
.\" disable justification (adjust text to left margin only)
|
||||||
.\" notice, this list of conditions and the following disclaimer.
|
.ad l
|
||||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
.SH "NAME"
|
||||||
.\" notice, this list of conditions and the following disclaimer in the
|
|
||||||
.\" documentation and/or other materials provided with the distribution.
|
|
||||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
|
||||||
.\" may be used to endorse or promote products derived from this software
|
|
||||||
.\" without specific prior written permission.
|
|
||||||
.\"
|
|
||||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
|
||||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
||||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
|
||||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
||||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
||||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
||||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
||||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
||||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
||||||
.\" SUCH DAMAGE.
|
|
||||||
.TH LOGOUTD 8
|
|
||||||
.SH NAME
|
|
||||||
logoutd \- Enforce login time restrictions
|
logoutd \- Enforce login time restrictions
|
||||||
.SH SYNOPSIS
|
.SH "SYNOPSIS"
|
||||||
.B logoutd
|
.HP 8
|
||||||
.SH DESCRIPTION
|
\fBlogoutd\fR
|
||||||
\fBlogoutd\fR enforces the login time and port restrictions specified in
|
.SH "DESCRIPTION"
|
||||||
\fI/etc/porttime\fR. \fBlogoutd\fR should be started from \fI/etc/rc\fR.
|
.PP
|
||||||
The \fI/var/run/utmp\fR file is scanned periodically and each user name
|
\fBlogoutd\fR
|
||||||
is checked to see if the named user is permitted on the named port
|
enforces the login time and port restrictions specified in
|
||||||
at the current time.
|
\fI/etc/porttime\fR.
|
||||||
Any login session which is violating the restrictions in \fI/etc/porttime\fR
|
\fBlogoutd\fR
|
||||||
|
should be started from
|
||||||
|
\fI/etc/rc\fR. The
|
||||||
|
\fI/var/run/utmp\fR
|
||||||
|
file is scanned periodically and each user name is checked to see if the named user is permitted on the named port at the current time. Any login session which is violating the restrictions in
|
||||||
|
\fI/etc/porttime\fR
|
||||||
is terminated.
|
is terminated.
|
||||||
.SH FILES
|
.SH "FILES"
|
||||||
\fI/etc/porttime\fR \- login and port permissions
|
.TP
|
||||||
.br
|
\fI/etc/porttime\fR
|
||||||
\fI/var/run/utmp\fR \- current login sessions
|
login and port permissions
|
||||||
.SH AUTHOR
|
.TP
|
||||||
|
\fI/var/run/utmp\fR
|
||||||
|
list of current login sessions
|
||||||
|
.SH "AUTHOR"
|
||||||
|
.PP
|
||||||
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||||
<refentry id='logoutd8'>
|
<refentry id='logoutd8'>
|
||||||
<!-- $Id: logoutd.8.xml,v 1.6 2005/06/15 12:39:27 kloczek Exp $ -->
|
<!-- $Id: logoutd.8.xml,v 1.7 2005/08/03 16:29:14 kloczek Exp $ -->
|
||||||
<refmeta>
|
<refmeta>
|
||||||
<refentrytitle>LOGOUTD</refentrytitle>
|
<refentrytitle>LOGOUTD</refentrytitle>
|
||||||
<manvolnum>8</manvolnum>
|
<manvolnum>8</manvolnum>
|
||||||
@ -26,8 +26,8 @@
|
|||||||
<filename>/etc/rc</filename>. The <filename>/var/run/utmp</filename>
|
<filename>/etc/rc</filename>. The <filename>/var/run/utmp</filename>
|
||||||
file is scanned periodically and each user name is checked to see if
|
file is scanned periodically and each user name is checked to see if
|
||||||
the named user is permitted on the named port at the current time.
|
the named user is permitted on the named port at the current time.
|
||||||
Any login session which is violating the restrictions in <filename>
|
Any login session which is violating the restrictions in
|
||||||
/etc/porttime</filename> is terminated.
|
<filename>/etc/porttime</filename> is terminated.
|
||||||
</para>
|
</para>
|
||||||
</refsect1>
|
</refsect1>
|
||||||
|
|
||||||
|
@ -1,69 +1,43 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "NEWUSERS" "8" "08/03/2005" "" ""
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "NEWUSERS" 8 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
newusers \- update and create new users in batch
|
newusers \- update and create new users in batch
|
||||||
.SH "SYNOPSIS"
|
.SH "SYNOPSIS"
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 9
|
.HP 9
|
||||||
\fBnewusers\fR [\fInew_users\fR]
|
\fBnewusers\fR [\fInew_users\fR]
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
|
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBnewusers\fR reads a file of user name and clear\-text password pairs and uses this information to update a group of existing users or to create new users\&. Each line is in the same format as the standard password file (see \fBpasswd\fR(5)) with the following exceptions:
|
\fBnewusers\fR
|
||||||
|
reads a file of user name and clear\-text password pairs and uses this information to update a group of existing users or to create new users. Each line is in the same format as the standard password file (see
|
||||||
|
\fBpasswd\fR(5)) with the following exceptions:
|
||||||
.TP
|
.TP
|
||||||
\fIpw_passwd\fR
|
\fIpw_passwd\fR
|
||||||
This field will be encrypted and used as the new value of the encrypted password\&.
|
This field will be encrypted and used as the new value of the encrypted password.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fIpw_age\fR
|
\fIpw_age\fR
|
||||||
This field will be ignored for shadow passwords if the user already exists\&.
|
This field will be ignored for shadow passwords if the user already exists.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fIpw_gid\fR
|
\fIpw_gid\fR
|
||||||
This field may be the name of an existing group, in which case the named user will be added as a member\&. If a non\-existent numerical group is given, a new group will be created having this number\&.
|
This field may be the name of an existing group, in which case the named user will be added as a member. If a non\-existent numerical group is given, a new group will be created having this number.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fIpw_dir\fR
|
\fIpw_dir\fR
|
||||||
This field will be checked for existence as a directory and a new directory with the same name will be created if it does not already exist\&. The ownership of the directory will be set to be that of the user being created or updated\&.
|
This field will be checked for existence as a directory and a new directory with the same name will be created if it does not already exist. The ownership of the directory will be set to be that of the user being created or updated.
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
This command is intended to be used in a large system environment where many accounts are updated at a single time\&.
|
This command is intended to be used in a large system environment where many accounts are updated at a single time.
|
||||||
|
|
||||||
.SH "CAVEATS"
|
.SH "CAVEATS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The input file must be protected since it contains unencrypted passwords\&.
|
The input file must be protected since it contains unencrypted passwords.
|
||||||
|
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBpasswd\fR(1), \fBuseradd\fR(8)
|
\fBpasswd\fR(1),
|
||||||
|
\fBuseradd\fR(8)
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
|
||||||
|
211
man/passwd.1
211
man/passwd.1
@ -1,70 +1,52 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "PASSWD" "1" "08/03/2005" "User Commands" "User Commands"
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "PASSWD" 1 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
passwd \- change user password
|
passwd \- change user password
|
||||||
.SH "SYNOPSIS"
|
.SH "SYNOPSIS"
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 7
|
.HP 7
|
||||||
\fBpasswd\fR [\fB\-f\fR | \fB\-s\fR] [\fIname\fR]
|
\fBpasswd\fR [\-f \-s] [\fIname\fR]
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 7
|
.HP 7
|
||||||
\fBpasswd\fR [\-g] [\fB\-r\fR | \fB\-R\fR] \fIgroup\fR
|
\fBpasswd\fR [\-g] [\-r \-R] \fIgroup\fR
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 7
|
.HP 7
|
||||||
\fBpasswd\fR [\-x\ \fImax\fR] [\-n\ \fImin\fR] [\-w\ \fIwarn\fR] [\-i\ \fIinact\fR] \fIlogin\fR
|
\fBpasswd\fR [\-x\ \fImax\fR] [\-n\ \fImin\fR] [\-w\ \fIwarn\fR] [\-i\ \fIinact\fR] \fIlogin\fR
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 7
|
.HP 7
|
||||||
\fBpasswd\fR [\fB\-l\fR | \fB\-u\fR | \fB\-d\fR | \fB\-S\fR | \fB\-e\fR] \fIlogin\fR
|
\fBpasswd\fR [\-l \-u \-d \-S \-e] \fIlogin\fR
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
|
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBpasswd\fR changes passwords for user and group accounts\&. A normal user may only change the password for his/her own account, the super user may change the password for any account\&. The administrator of a group may change the password for the group\&. \fBpasswd\fR also changes account information, such as the full name of the user, user's login shell, or password expiry date and interval\&.
|
\fBpasswd\fR
|
||||||
|
changes passwords for user and group accounts. A normal user may only change the password for his/her own account, the super user may change the password for any account. The administrator of a group may change the password for the group.
|
||||||
|
\fBpasswd\fR
|
||||||
|
also changes account information, such as the full name of the user, user's login shell, or password expiry date and interval.
|
||||||
.PP
|
.PP
|
||||||
The \fB\-s\fR option makes \fBpasswd\fR call \fBchsh\fR to change the user's shell\&. The \fB\-f\fR option makes \fBpasswd\fR call \fBchfn\fR to change the user's gecos information\&. These two options are only meant for compatibility, since the other programs can be called directly\&.
|
The
|
||||||
|
\fB\-s\fR
|
||||||
|
option makes
|
||||||
|
\fBpasswd\fR
|
||||||
|
call
|
||||||
|
\fBchsh\fR
|
||||||
|
to change the user's shell. The
|
||||||
|
\fB\-f\fR
|
||||||
|
option makes
|
||||||
|
\fBpasswd\fR
|
||||||
|
call
|
||||||
|
\fBchfn\fR
|
||||||
|
to change the user's gecos information. These two options are only meant for compatibility, since the other programs can be called directly.
|
||||||
.SS "Password Changes"
|
.SS "Password Changes"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The user is first prompted for his/her old password, if one is present\&. This password is then encrypted and compared against the stored password\&. The user has only one chance to enter the correct password\&. The super user is permitted to bypass this step so that forgotten passwords may be changed\&.
|
The user is first prompted for his/her old password, if one is present. This password is then encrypted and compared against the stored password. The user has only one chance to enter the correct password. The super user is permitted to bypass this step so that forgotten passwords may be changed.
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
After the password has been entered, password aging information is checked to see if the user is permitted to change the password at this time\&. If not, \fBpasswd\fR refuses to change the password and exits\&.
|
After the password has been entered, password aging information is checked to see if the user is permitted to change the password at this time. If not,
|
||||||
|
\fBpasswd\fR
|
||||||
|
refuses to change the password and exits.
|
||||||
.PP
|
.PP
|
||||||
The user is then prompted for a replacement password\&. This password is tested for complexity\&. As a general guideline, passwords should consist of 6 to 8 characters including one or more from each of following sets:
|
The user is then prompted for a replacement password. This password is tested for complexity. As a general guideline, passwords should consist of 6 to 8 characters including one or more from each of following sets:
|
||||||
|
|
||||||
.TP 3
|
.TP 3
|
||||||
\(bu
|
\(bu
|
||||||
lower case alphabetics
|
lower case alphabetics
|
||||||
@ -74,49 +56,85 @@ digits 0 thru 9
|
|||||||
.TP
|
.TP
|
||||||
\(bu
|
\(bu
|
||||||
punctuation marks
|
punctuation marks
|
||||||
.LP
|
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Care must be taken not to include the system default erase or kill characters\&. \fBpasswd\fR will reject any password which is not suitably complex\&.
|
Care must be taken not to include the system default erase or kill characters.
|
||||||
|
\fBpasswd\fR
|
||||||
|
will reject any password which is not suitably complex.
|
||||||
.PP
|
.PP
|
||||||
If the password is accepted, \fBpasswd\fR will prompt again and compare the second entry against the first\&. Both entries are required to match in order for the password to be changed\&.
|
If the password is accepted,
|
||||||
|
\fBpasswd\fR
|
||||||
|
will prompt again and compare the second entry against the first. Both entries are required to match in order for the password to be changed.
|
||||||
.SS "Group passwords"
|
.SS "Group passwords"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
When the \fB\-g\fR option is used, the password for the named group is changed\&. The user must either be the super user, or a group administrator for the named group\&. The current group password is not prompted for\&. The \fB\-r\fR option is used with the \fB\-g\fR option to remove the current password from the named group\&. This allows group access to all members\&. The \fB\-R\fR option is used with the \fB\-g\fR option to restrict the named group for all users\&.
|
When the
|
||||||
|
\fB\-g\fR
|
||||||
|
option is used, the password for the named group is changed. The user must either be the super user, or a group administrator for the named group. The current group password is not prompted for. The
|
||||||
|
\fB\-r\fR
|
||||||
|
option is used with the
|
||||||
|
\fB\-g\fR
|
||||||
|
option to remove the current password from the named group. This allows group access to all members. The
|
||||||
|
\fB\-R\fR
|
||||||
|
option is used with the
|
||||||
|
\fB\-g\fR
|
||||||
|
option to restrict the named group for all users.
|
||||||
.SS "Password expiry information"
|
.SS "Password expiry information"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The password aging information may be changed by the super user with the \fB\-x\fR, \fB\-n\fR, \fB\-w\fR, and \fB\-i\fR options\&. The \fB\-x\fR option is used to set the maximum number of days a password remains valid\&. After \fImax\fR days, the password is required to be changed\&. The \fB\-n\fR option is used to set the minimum number of days before a password may be changed\&. The user will not be permitted to change the password until \fImin\fR days have elapsed\&. The \fB\-w\fR option is used to set the number of days of warning the user will receive before his/her password will expire\&. The warning occurs \fIwarn\fR days before the expiration, telling the user how many days remain until the password is set to expire\&. The \fB\-i\fR option is used to disable an account after the password has been expired for a number of days\&. After a user account has had an expired password for \fIinact\fR days, the user may no longer sign on to the account\&.
|
The password aging information may be changed by the super user with the
|
||||||
|
\fB\-x\fR,
|
||||||
|
\fB\-n\fR,
|
||||||
|
\fB\-w\fR, and
|
||||||
|
\fB\-i\fR
|
||||||
|
options. The
|
||||||
|
\fB\-x\fR
|
||||||
|
option is used to set the maximum number of days a password remains valid. After
|
||||||
|
\fImax\fR
|
||||||
|
days, the password is required to be changed. The
|
||||||
|
\fB\-n\fR
|
||||||
|
option is used to set the minimum number of days before a password may be changed. The user will not be permitted to change the password until
|
||||||
|
\fImin\fR
|
||||||
|
days have elapsed. The
|
||||||
|
\fB\-w\fR
|
||||||
|
option is used to set the number of days of warning the user will receive before his/her password will expire. The warning occurs
|
||||||
|
\fIwarn\fR
|
||||||
|
days before the expiration, telling the user how many days remain until the password is set to expire. The
|
||||||
|
\fB\-i\fR
|
||||||
|
option is used to disable an account after the password has been expired for a number of days. After a user account has had an expired password for
|
||||||
|
\fIinact\fR
|
||||||
|
days, the user may no longer sign on to the account.
|
||||||
.PP
|
.PP
|
||||||
If you wish to immediately expire an account's password, you can use the \fB\-e\fR option\&. This in effect can force a user to change his/her password at the user's next login\&. You can also use the \fB\-d\fR option to delete a user's password (make it empty)\&. Use caution with this option since it can make an account not require a password at all to login, leaving your system open to intruders\&.
|
If you wish to immediately expire an account's password, you can use the
|
||||||
|
\fB\-e\fR
|
||||||
|
option. This in effect can force a user to change his/her password at the user's next login. You can also use the
|
||||||
|
\fB\-d\fR
|
||||||
|
option to delete a user's password (make it empty). Use caution with this option since it can make an account not require a password at all to login, leaving your system open to intruders.
|
||||||
.SS "Account maintenance"
|
.SS "Account maintenance"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
User accounts may be locked and unlocked with the \fB\-l\fR and \fB\-u\fR flags\&. The \fB\-l\fR option disables an account by changing the password to a value which matches no possible encrypted value\&. The \fB\-u\fR option re\-enables an account by changing the password back to its previous value\&.
|
User accounts may be locked and unlocked with the
|
||||||
|
\fB\-l\fR
|
||||||
|
and
|
||||||
|
\fB\-u\fR
|
||||||
|
flags. The
|
||||||
|
\fB\-l\fR
|
||||||
|
option disables an account by changing the password to a value which matches no possible encrypted value. The
|
||||||
|
\fB\-u\fR
|
||||||
|
option re\-enables an account by changing the password back to its previous value.
|
||||||
.PP
|
.PP
|
||||||
The account status may be viewed with the \fB\-S\fR option\&. The status information consists of 7 fields\&. The first field is the user's login name\&. The second field indicates if the user account is locked (L), has no password (NP), or has a usable password (P)\&. The third field gives the date of the last password change\&. The next four fields are the minimum age, maximum age, warning period, and inactivity period for the password\&. These ages are expressed in days\&. See \fIPassword expiry information\fR above for a discussion of these fields\&.
|
The account status may be viewed with the
|
||||||
|
\fB\-S\fR
|
||||||
|
option. The status information consists of 7 fields. The first field is the user's login name. The second field indicates if the user account is locked (L), has no password (NP), or has a usable password (P). The third field gives the date of the last password change. The next four fields are the minimum age, maximum age, warning period, and inactivity period for the password. These ages are expressed in days. See
|
||||||
|
\fIPassword expiry information\fR
|
||||||
|
above for a discussion of these fields.
|
||||||
.SS "Hints for user passwords"
|
.SS "Hints for user passwords"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The security of a password depends upon the strength of the encryption algorithm and the size of the key space\&. The \fI\\s\-2UNIX\fR System encryption method is based on the NBS DES algorithm and is very secure\&. The size of the key space depends upon the randomness of the password which is selected\&.
|
The security of a password depends upon the strength of the encryption algorithm and the size of the key space. The
|
||||||
|
\fI\\s\-2UNIX\fR
|
||||||
|
System encryption method is based on the NBS DES algorithm and is very secure. The size of the key space depends upon the randomness of the password which is selected.
|
||||||
.PP
|
.PP
|
||||||
Compromises in password security normally result from careless password selection or handling\&. For this reason, you should not select a password which appears in a dictionary or which must be written down\&. The password should also not be a proper name, your license number, birth date, or street address\&. Any of these may be used as guesses to violate system security\&.
|
Compromises in password security normally result from careless password selection or handling. For this reason, you should not select a password which appears in a dictionary or which must be written down. The password should also not be a proper name, your license number, birth date, or street address. Any of these may be used as guesses to violate system security.
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Your password must easily remembered so that you will not be forced to write it on a piece of paper\&. This can be accomplished by appending two small words together and separating each with a special character or digit\&. For example, Pass%word\&.
|
Your password must easily remembered so that you will not be forced to write it on a piece of paper. This can be accomplished by appending two small words together and separating each with a special character or digit. For example, Pass%word.
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Other methods of construction involve selecting an easily remembered phrase from literature and selecting the first or last letter from each word\&. An example of this is:
|
Other methods of construction involve selecting an easily remembered phrase from literature and selecting the first or last letter from each word. An example of this is:
|
||||||
|
|
||||||
.TP 3
|
.TP 3
|
||||||
\(bu
|
\(bu
|
||||||
Ask not for whom the bell tolls
|
Ask not for whom the bell tolls
|
||||||
@ -126,23 +144,15 @@ which produces
|
|||||||
.TP
|
.TP
|
||||||
\(bu
|
\(bu
|
||||||
An4wtbt
|
An4wtbt
|
||||||
.LP
|
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
You may be reasonably sure few crackers will have included this in their dictionaries\&. You should, however, select your own methods for constructing passwords and not rely exclusively on the methods given here\&.
|
You may be reasonably sure few crackers will have included this in their dictionaries. You should, however, select your own methods for constructing passwords and not rely exclusively on the methods given here.
|
||||||
|
|
||||||
.SS "Notes about group passwords"
|
.SS "Notes about group passwords"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Group passwords are an inherent security problem since more than one person is permitted to know the password\&. However, groups are a useful tool for permitting co\-operation between different users\&.
|
Group passwords are an inherent security problem since more than one person is permitted to know the password. However, groups are a useful tool for permitting co\-operation between different users.
|
||||||
|
|
||||||
.SH "CAVEATS"
|
.SH "CAVEATS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Not all options may be supported\&. Password complexity checking may vary from site to site\&. The user is urged to select a password as complex as he feels comfortable with\&. Users may not be able to change their password on a system if NIS is enabled and they are not logged into the NIS server\&.
|
Not all options may be supported. Password complexity checking may vary from site to site. The user is urged to select a password as complex as he feels comfortable with. Users may not be able to change their password on a system if NIS is enabled and they are not logged into the NIS server.
|
||||||
|
|
||||||
.SH "FILES"
|
.SH "FILES"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fI/etc/passwd\fR
|
\fI/etc/passwd\fR
|
||||||
user account information
|
user account information
|
||||||
@ -150,10 +160,10 @@ user account information
|
|||||||
\fI/etc/shadow\fR
|
\fI/etc/shadow\fR
|
||||||
secure user account information
|
secure user account information
|
||||||
.SH "EXIT VALUES"
|
.SH "EXIT VALUES"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The \fBpasswd\fR command exits with the following values:
|
The
|
||||||
|
\fBpasswd\fR
|
||||||
|
command exits with the following values:
|
||||||
.TP
|
.TP
|
||||||
\fI0\fR
|
\fI0\fR
|
||||||
success
|
success
|
||||||
@ -175,14 +185,11 @@ passwd file busy, try again
|
|||||||
.TP
|
.TP
|
||||||
\fI6\fR
|
\fI6\fR
|
||||||
invalid argument to option
|
invalid argument to option
|
||||||
|
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBgroup\fR(5), \fBpasswd\fR(5), \fBshadow\fR(5)
|
\fBgroup\fR(5),
|
||||||
|
\fBpasswd\fR(5),
|
||||||
|
\fBshadow\fR(5)
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Julianne Frances Haugh <jockgrrl@ix\&.netcom\&.com>
|
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
|
||||||
|
|
||||||
|
78
man/passwd.5
78
man/passwd.5
@ -1,30 +1,18 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "PASSWD" "5" "08/03/2005" "" ""
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "PASSWD" 5 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
passwd \- The password file
|
passwd \- The password file
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fI/etc/passwd\fR contains various pieces of information for each user account\&. Included is:
|
\fI/etc/passwd\fR
|
||||||
|
contains various pieces of information for each user account. Included is:
|
||||||
.TP 3
|
.TP 3
|
||||||
\(bu
|
\(bu
|
||||||
login name
|
login name
|
||||||
@ -46,32 +34,40 @@ user home directory
|
|||||||
.TP
|
.TP
|
||||||
\(bu
|
\(bu
|
||||||
user command interpreter
|
user command interpreter
|
||||||
.LP
|
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The password field may not be filled if shadow passwords have been enabled\&. If shadow passwords are being used, the encrypted password will be found in \fI/etc/shadow\fR\&. The encrypted password consists of characters from the 64 characters alphabet a thru z, A thru Z, 0 thru 9, \\\&. and /\&. Optionally it can start with a "$" character\&. This means the encrypted password was generated using another (not DES) algorithm\&. For example if it starts with "$1$" it means the MD5\-based algorithm was used\&. Refer to \fBcrypt\fR(3) for details on how this string is interpreted\&.
|
The password field may not be filled if shadow passwords have been enabled. If shadow passwords are being used, the encrypted password will be found in
|
||||||
|
\fI/etc/shadow\fR. The encrypted password consists of characters from the 64 characters alphabet a thru z, A thru Z, 0 thru 9, \\. and /. Optionally it can start with a "$" character. This means the encrypted password was generated using another (not DES) algorithm. For example if it starts with "$1$" it means the MD5\-based algorithm was used. Refer to
|
||||||
|
\fBcrypt\fR(3)
|
||||||
|
for details on how this string is interpreted.
|
||||||
.PP
|
.PP
|
||||||
The comment field is used by various system utilities, such as \fBfinger\fR(1)\&.
|
The comment field is used by various system utilities, such as
|
||||||
|
\fBfinger\fR(1).
|
||||||
.PP
|
.PP
|
||||||
The home directory field provides the name of the initial working directory\&. \fILogin\fR uses this information to set the value of the \fB$HOME\fR environmental variable\&.
|
The home directory field provides the name of the initial working directory.
|
||||||
|
\fILogin\fR
|
||||||
|
uses this information to set the value of the
|
||||||
|
\fB$HOME\fR
|
||||||
|
environmental variable.
|
||||||
.PP
|
.PP
|
||||||
The command interpreter field provides the name of the user's command language interpreter, or the name of the initial program to execute\&. \fILogin\fR uses this information to set the value of the \fB$SHELL\fR environmental variable\&. If this field is empty, it defaults to the value \fI/bin/sh\fR\&.
|
The command interpreter field provides the name of the user's command language interpreter, or the name of the initial program to execute.
|
||||||
|
\fILogin\fR
|
||||||
|
uses this information to set the value of the
|
||||||
|
\fB$SHELL\fR
|
||||||
|
environmental variable. If this field is empty, it defaults to the value
|
||||||
|
\fI/bin/sh\fR.
|
||||||
.SH "FILES"
|
.SH "FILES"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fI/etc/passwd\fR
|
\fI/etc/passwd\fR
|
||||||
user account information
|
user account information
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBlogin\fR(1), \fBpasswd\fR(1), \fBsu\fR(1), \fBshadow\fR(5), \fBpwconv\fR(8), \fBpwunconv\fR(8), \fBsulogin\fR(8)
|
\fBlogin\fR(1),
|
||||||
|
\fBpasswd\fR(1),
|
||||||
|
\fBsu\fR(1),
|
||||||
|
\fBshadow\fR(5),
|
||||||
|
\fBpwconv\fR(8),
|
||||||
|
\fBpwunconv\fR(8),
|
||||||
|
\fBsulogin\fR(8)
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
.\" $Id: login.defs.5,v 1.7 2005/04/05 18:47:51 kloczek Exp $
|
.\" $Id: login.defs.5,v 1.8 2005/08/09 18:09:42 kloczek Exp $
|
||||||
.\" Copyright 1991 \- 1993, Julianne Frances Haugh and Chip Rosenthal
|
.\" Copyright 1991 \- 1993, Julianne Frances Haugh and Chip Rosenthal
|
||||||
.\" All rights reserved.
|
.\" All rights reserved.
|
||||||
.\"
|
.\"
|
||||||
@ -394,11 +394,6 @@ istnieje, to b
|
|||||||
w danej chwili zalogowaæ na danej linii. Patrz tak¿e podrêcznik
|
w danej chwili zalogowaæ na danej linii. Patrz tak¿e podrêcznik
|
||||||
.BR porttime (5)
|
.BR porttime (5)
|
||||||
.\"
|
.\"
|
||||||
.IP "QMAIL_DIR (napis)"
|
|
||||||
Dla u¿ytkowników Qmail, parametr ten okre¶la katalog, w którym przechowywana
|
|
||||||
jest hierarchia Maildir.
|
|
||||||
Zobacz te¿ MAIL_CHECK_ENAB.
|
|
||||||
.\"
|
|
||||||
.IP "QUOTAS_ENAB (logiczna)"
|
.IP "QUOTAS_ENAB (logiczna)"
|
||||||
Je¶li ma warto¶æ
|
Je¶li ma warto¶æ
|
||||||
.I yes ,
|
.I yes ,
|
||||||
|
131
man/porttime.5
131
man/porttime.5
@ -1,79 +1,64 @@
|
|||||||
.\" $Id: porttime.5,v 1.11 2005/04/05 18:47:50 kloczek Exp $
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.\" Copyright 1989 - 1990, Julianne Frances Haugh
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.\" All rights reserved.
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.\"
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.\" Redistribution and use in source and binary forms, with or without
|
.TH "PORTTIME" "5" "08/03/2005" "" ""
|
||||||
.\" modification, are permitted provided that the following conditions
|
.\" disable hyphenation
|
||||||
.\" are met:
|
.nh
|
||||||
.\" 1. Redistributions of source code must retain the above copyright
|
.\" disable justification (adjust text to left margin only)
|
||||||
.\" notice, this list of conditions and the following disclaimer.
|
.ad l
|
||||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
.SH "NAME"
|
||||||
.\" notice, this list of conditions and the following disclaimer in the
|
|
||||||
.\" documentation and/or other materials provided with the distribution.
|
|
||||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
|
||||||
.\" may be used to endorse or promote products derived from this software
|
|
||||||
.\" without specific prior written permission.
|
|
||||||
.\"
|
|
||||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
|
||||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
||||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
|
||||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
||||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
||||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
||||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
||||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
||||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
||||||
.\" SUCH DAMAGE.
|
|
||||||
.TH PORTTIME 5
|
|
||||||
.SH NAME
|
|
||||||
porttime \- port access time file
|
porttime \- port access time file
|
||||||
.SH DESCRIPTION
|
.SH "DESCRIPTION"
|
||||||
\fIporttime\fR contains a list of tty devices, user names, and permitted
|
|
||||||
login times.
|
|
||||||
.PP
|
.PP
|
||||||
Each entry consists of three colon separated fields. The first field is a
|
\fIporttime\fR
|
||||||
comma separated list of tty devices, or an asterisk to indicate that all tty
|
contains a list of tty devices, user names, and permitted login times.
|
||||||
devices are matched by this entry. The second field is a comma separated
|
.PP
|
||||||
list of user names, or an asterisk to indicated that all user names are
|
Each entry consists of three colon separated fields. The first field is a comma separated list of tty devices, or an asterisk to indicate that all tty devices are matched by this entry. The second field is a comma separated list of user names, or an asterisk to indicated that all user names are matched by this entry. The third field is a comma separated list of permitted access times.
|
||||||
matched by this entry. The third field is a comma separated list of
|
.PP
|
||||||
permitted access times.
|
Each access time entry consists of zero or more days of the week, abbreviated
|
||||||
|
\fISu\fR,
|
||||||
|
\fIMo\fR,\fITu\fR,
|
||||||
|
\fIWe\fR,
|
||||||
|
\fITh\fR,
|
||||||
|
\fIFr\fR, and
|
||||||
|
\fISa\fR, followed by a pair of times separated by a hyphen. The abbreviation
|
||||||
|
\fIWk\fR
|
||||||
|
may be used to represent Monday thru Friday, and
|
||||||
|
\fIAl\fR
|
||||||
|
may be used to indicate every day. If no days are given,
|
||||||
|
\fIAl\fR
|
||||||
|
is assumed.
|
||||||
|
.SH "EXAMPLES"
|
||||||
|
.PP
|
||||||
|
The following entry allows access to user
|
||||||
|
\fIjfh\fR
|
||||||
|
on every port during weekdays from 9am to 5pm.
|
||||||
.PP
|
.PP
|
||||||
Each access time entry consists of zero or more days of the week,
|
|
||||||
abbreviated \fBSu\fR, \fBMo\fR, \fBTu\fR, \fBWe\fR, \fBTh\fR,
|
|
||||||
\fBFr\fR, and \fBSa\fR, followed by a pair of times separated by
|
|
||||||
a hyphen. The abbreviation \fBWk\fR may be used to represent Monday thru
|
|
||||||
Friday, and \fBAl\fR may be used to indicate every day. If no days are
|
|
||||||
given, \fBAl\fR is assumed.
|
|
||||||
.SH EXAMPLES
|
|
||||||
The following entry allows access to user \fBjfh\fR on every port
|
|
||||||
during weekdays from 9am to 5pm.
|
|
||||||
.br
|
|
||||||
.sp 1
|
|
||||||
*:jfh:Wk0900\-1700
|
*:jfh:Wk0900\-1700
|
||||||
.br
|
.PP
|
||||||
.sp 1
|
The following entries allow access only to the users
|
||||||
The following entries allow access only to the users \fBroot\fR and
|
\fIroot\fR
|
||||||
\fBoper\fR on /dev/console at any time. This illustrates how the
|
and
|
||||||
\fI/etc/porttime\fR file is an ordered list of access times. Any other user
|
\fIoper\fR
|
||||||
would match the second entry which does not permit access at any time.
|
on /dev/console at any time. This illustrates how the
|
||||||
.br
|
\fI/etc/porttime\fR
|
||||||
.sp 1
|
file is an ordered list of access times. Any other user would match the second entry which does not permit access at any time.
|
||||||
console:root,oper:Al0000\-2400
|
.PP
|
||||||
.br
|
console:root,oper:Al0000\-2400console:*:
|
||||||
console:*:
|
.PP
|
||||||
.br
|
The following entry allows access for the user
|
||||||
.sp 1
|
\fIgames\fR
|
||||||
The following entry allows access for the user \fBgames\fR on any port
|
on any port during non\-working hours.
|
||||||
during non\-working hours.
|
.PP
|
||||||
.br
|
|
||||||
.sp 1
|
|
||||||
*:games:Wk1700\-0900,SaSu0000\-2400
|
*:games:Wk1700\-0900,SaSu0000\-2400
|
||||||
.br
|
.SH "FILES"
|
||||||
.sp 1
|
.TP
|
||||||
.SH FILES
|
\fI/etc/porttime\fR
|
||||||
\fI/etc/porttime\fR \- file containing port access times
|
file containing port access
|
||||||
.SH SEE ALSO
|
.SH "SEE ALSO"
|
||||||
.BR login (1)
|
.PP
|
||||||
.SH AUTHOR
|
\fBlogin\fR(1)
|
||||||
|
.SH "AUTHOR"
|
||||||
|
.PP
|
||||||
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
152
man/pw_auth.3
152
man/pw_auth.3
@ -1,106 +1,122 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "PW_AUTH" "3" "08/03/2005" "" ""
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "PW_AUTH" 3 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
pw_auth \- administrator defined password authentication routines
|
pw_auth \- administrator defined password authentication routines
|
||||||
.SH "SYNTAX"
|
.SH "SYNTAX"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fI#include <pwauth\&.h>\fR
|
\fI#include <pwauth.h>\fR
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fIint pw_auth (char\fR \fI*command,\fR \fIchar\fR \fI*user,\fR \fIint\fR \fIreason,\fR \fIchar\fR \fI*input)\fR\fI;\fR
|
\fIint pw_auth (char\fR \fI*command,\fR \fIchar\fR \fI*user,\fR \fIint\fR \fIreason,\fR \fIchar\fR \fI*input)\fR\fI;\fR
|
||||||
|
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fIpw_auth\fR invokes the administrator defined functions for a given user\&.
|
\fIpw_auth\fR
|
||||||
|
invokes the administrator defined functions for a given user.
|
||||||
.PP
|
.PP
|
||||||
\fIcommand\fR is the name of the authentication program\&. It is retrieved from the user's password file information\&. The string contains one or more executable file names, delimited by semi\-colons\&. Each program will be executed in the order given\&. The command line arguments are given for each of the reasons listed below\&.
|
\fIcommand\fR
|
||||||
|
is the name of the authentication program. It is retrieved from the user's password file information. The string contains one or more executable file names, delimited by semi\-colons. Each program will be executed in the order given. The command line arguments are given for each of the reasons listed below.
|
||||||
.PP
|
.PP
|
||||||
\fIuser\fR is the name of the user to be authenticated, as given in the \fI/etc/passwd\fR file\&. User entries are indexed by username\&. This allows non\-unique user IDs to be present and for each different username associated with that user ID to have a different authentication program and information\&.
|
\fIuser\fR
|
||||||
|
is the name of the user to be authenticated, as given in the
|
||||||
|
\fI/etc/passwd\fR
|
||||||
|
file. User entries are indexed by username. This allows non\-unique user IDs to be present and for each different username associated with that user ID to have a different authentication program and information.
|
||||||
.PP
|
.PP
|
||||||
Each of the permissible authentication reasons is handled in a potentially differenent manner\&. Unless otherwise mentioned, the standard file descriptors 0, 1, and 2 are available for communicating with the user\&. The real user ID may be used to determine the identity of the user making the authentication request\&. \fIreason\fR is one of:
|
Each of the permissible authentication reasons is handled in a potentially differenent manner. Unless otherwise mentioned, the standard file descriptors 0, 1, and 2 are available for communicating with the user. The real user ID may be used to determine the identity of the user making the authentication request.
|
||||||
|
\fIreason\fR
|
||||||
|
is one of:
|
||||||
.TP
|
.TP
|
||||||
\fIPW_SU\fR
|
\fIPW_SU\fR
|
||||||
Perform authentication for the current real user ID attempting to switch real user ID to the named user\&. The authentication program will be invoked with a \fB\-s\fR option, followed by the username\&.
|
Perform authentication for the current real user ID attempting to switch real user ID to the named user. The authentication program will be invoked with a
|
||||||
|
\fB\-s\fR
|
||||||
|
option, followed by the username.
|
||||||
.TP
|
.TP
|
||||||
\fIPW_LOGIN\fR
|
\fIPW_LOGIN\fR
|
||||||
Perform authentication for the named user creating a new login session\&. The authentication program will be invoked with a \fB\-l\fR option, followed by the username\&.
|
Perform authentication for the named user creating a new login session. The authentication program will be invoked with a
|
||||||
|
\fB\-l\fR
|
||||||
|
option, followed by the username.
|
||||||
.TP
|
.TP
|
||||||
\fIPW_ADD\fR
|
\fIPW_ADD\fR
|
||||||
Create a new entry for the named user\&. This allows an authentication program to initialize storage for a new user\&. The authentication program will be invoked with a \fB\-a\fR option, followed by the username\&.
|
Create a new entry for the named user. This allows an authentication program to initialize storage for a new user. The authentication program will be invoked with a
|
||||||
|
\fB\-a\fR
|
||||||
|
option, followed by the username.
|
||||||
.TP
|
.TP
|
||||||
\fIPW_CHANGE\fR
|
\fIPW_CHANGE\fR
|
||||||
Alter an existing entry for the named user\&. This allows an authentication program to alter the authentication information for an existing user\&. The authentication program will be invoked with a \fB\-c\fR option, followed by the username\&.
|
Alter an existing entry for the named user. This allows an authentication program to alter the authentication information for an existing user. The authentication program will be invoked with a
|
||||||
|
\fB\-c\fR
|
||||||
|
option, followed by the username.
|
||||||
.TP
|
.TP
|
||||||
\fIPW_DELETE\fR
|
\fIPW_DELETE\fR
|
||||||
Delete authentication information for the named user\&. This allows an authentication program to reclaim storage for a user which is no longer authenticated using the authentication program\&. The authentication program will be invoked with a \fB\-d\fR option, followed by the username\&.
|
Delete authentication information for the named user. This allows an authentication program to reclaim storage for a user which is no longer authenticated using the authentication program. The authentication program will be invoked with a
|
||||||
|
\fB\-d\fR
|
||||||
|
option, followed by the username.
|
||||||
.TP
|
.TP
|
||||||
\fIPW_TELNET\fR
|
\fIPW_TELNET\fR
|
||||||
Authenticate a user who is connecting to the system using the \fItelnet\fR command\&. The authentication program will be invoked with a \fB\-t\fR option, followed by the username\&.
|
Authenticate a user who is connecting to the system using the
|
||||||
|
\fItelnet\fR
|
||||||
|
command. The authentication program will be invoked with a
|
||||||
|
\fB\-t\fR
|
||||||
|
option, followed by the username.
|
||||||
.TP
|
.TP
|
||||||
\fIPW_RLOGIN\fR
|
\fIPW_RLOGIN\fR
|
||||||
Authenticate a user who is connecting to the system using the \fIrlogin\fR command\&. The authentication program will be invoked with a \fB\-r\fR option, followed by the username\&.
|
Authenticate a user who is connecting to the system using the
|
||||||
|
\fIrlogin\fR
|
||||||
|
command. The authentication program will be invoked with a
|
||||||
|
\fB\-r\fR
|
||||||
|
option, followed by the username.
|
||||||
.TP
|
.TP
|
||||||
\fIPW_FTP\fR
|
\fIPW_FTP\fR
|
||||||
Authenticate a user who is connecting to the system using the \fIftp\fR command\&. The authentication program will be invoked with a \fB\-f\fR option, followed by the username\&. The standard file descriptors are not available for communicating with the user\&. The standard input file descriptor will be connected to the parent process, while the other two output file descriptors will be connected to \fI/dev/null\fR\&. The \fIpw_auth\fR function will pipe a single line of data to the authentication program using file descriptor 0\&.
|
Authenticate a user who is connecting to the system using the
|
||||||
|
\fIftp\fR
|
||||||
|
command. The authentication program will be invoked with a
|
||||||
|
\fB\-f\fR
|
||||||
|
option, followed by the username. The standard file descriptors are not available for communicating with the user. The standard input file descriptor will be connected to the parent process, while the other two output file descriptors will be connected to
|
||||||
|
\fI/dev/null\fR. The
|
||||||
|
\fIpw_auth\fR
|
||||||
|
function will pipe a single line of data to the authentication program using file descriptor 0.
|
||||||
.TP
|
.TP
|
||||||
\fIPW_REXEC\fR
|
\fIPW_REXEC\fR
|
||||||
Authenticate a user who is connecting to the system using the \fIrexec\fR command\&. The authentication program will be invoked with a \fB\-x\fR option, followed by the username\&. The standard file descriptors are not available for communicating with the remote user\&. The standard input file descriptor will be connected to the parent process, while the other two output file descriptors will be connected to \fI/dev/null\fR\&. The \fIpw_auth\fR function will pipe a single line of data to the authentication program using file descriptor 0\&.
|
Authenticate a user who is connecting to the system using the
|
||||||
|
\fIrexec\fR
|
||||||
|
command. The authentication program will be invoked with a
|
||||||
|
\fB\-x\fR
|
||||||
|
option, followed by the username. The standard file descriptors are not available for communicating with the remote user. The standard input file descriptor will be connected to the parent process, while the other two output file descriptors will be connected to
|
||||||
|
\fI/dev/null\fR. The
|
||||||
|
\fIpw_auth\fR
|
||||||
|
function will pipe a single line of data to the authentication program using file descriptor 0.
|
||||||
.PP
|
.PP
|
||||||
The last argument is the authentication data which is used by the \fIPW_FTP\fR and \fIPW_REXEC\fR reasons\&. It is treated as a single line of text which is piped to the authentication program\&. When the reason is \fIPW_CHANGE,\fR the value of \fIinput\fR is the value of previous user name if the user name is being changed\&.
|
The last argument is the authentication data which is used by the
|
||||||
|
\fIPW_FTP\fR
|
||||||
|
and
|
||||||
|
\fIPW_REXEC\fR
|
||||||
|
reasons. It is treated as a single line of text which is piped to the authentication program. When the reason is
|
||||||
|
\fIPW_CHANGE,\fR
|
||||||
|
the value of
|
||||||
|
\fIinput\fR
|
||||||
|
is the value of previous user name if the user name is being changed.
|
||||||
.SH "CAVEATS"
|
.SH "CAVEATS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
This function does not create the actual session\&. It only indicates if the user should be allowed to create the session\&.
|
This function does not create the actual session. It only indicates if the user should be allowed to create the session.
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The network options are untested at this time\&.
|
The network options are untested at this time.
|
||||||
|
|
||||||
.SH "DIAGNOSTICS"
|
.SH "DIAGNOSTICS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The \fIpw_auth\fR function returns 0 if the authentication program exited with a 0 exit code, and a non\-zero value otherwise\&.
|
The
|
||||||
|
\fIpw_auth\fR
|
||||||
|
function returns 0 if the authentication program exited with a 0 exit code, and a non\-zero value otherwise.
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBlogin\fR(1), \fBpasswd\fR(1), \fBsu\fR(1), \fBuseradd\fR(8), \fBuserdel\fR(8), \fBusermod\fR(8)
|
\fBlogin\fR(1),
|
||||||
|
\fBpasswd\fR(1),
|
||||||
|
\fBsu\fR(1),
|
||||||
|
\fBuseradd\fR(8),
|
||||||
|
\fBuserdel\fR(8),
|
||||||
|
\fBusermod\fR(8)
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
|
||||||
|
116
man/pwck.8
116
man/pwck.8
@ -1,47 +1,29 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "PWCK" "8" "08/03/2005" "" ""
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "PWCK" 8 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
pwck \- verify integrity of password files
|
pwck \- verify integrity of password files
|
||||||
.SH "SYNOPSIS"
|
.SH "SYNOPSIS"
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 5
|
.HP 5
|
||||||
\fBpwck\fR [\-q] [\-s] [\fIpasswd\fR\ \fIshadow\fR]
|
\fBpwck\fR [\-q] [\-s] [\fIpasswd\fR\ \fIshadow\fR]
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 5
|
.HP 5
|
||||||
\fBpwck\fR [\-r] [\fIpasswd\fR\ \fIshadow\fR]
|
\fBpwck\fR [\-r] [\fIpasswd\fR\ \fIshadow\fR]
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
|
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBpwck\fR verifies the integrity of the system authentication information\&. All entries in the \fI/etc/passwd\fR and \fI/etc/shadow\fR are checked to see that the entry has the proper format and valid data in each field\&. The user is prompted to delete entries that are improperly formatted or which have other uncorrectable errors\&.
|
\fBpwck\fR
|
||||||
|
verifies the integrity of the system authentication information. All entries in the
|
||||||
|
\fI/etc/passwd\fR
|
||||||
|
and
|
||||||
|
\fI/etc/shadow\fR
|
||||||
|
are checked to see that the entry has the proper format and valid data in each field. The user is prompted to delete entries that are improperly formatted or which have other uncorrectable errors.
|
||||||
.PP
|
.PP
|
||||||
Checks are made to verify that each entry has:
|
Checks are made to verify that each entry has:
|
||||||
|
|
||||||
.TP 3
|
.TP 3
|
||||||
\(bu
|
\(bu
|
||||||
the correct number of fields
|
the correct number of fields
|
||||||
@ -60,36 +42,48 @@ a valid home directory
|
|||||||
.TP
|
.TP
|
||||||
\(bu
|
\(bu
|
||||||
a valid login shell
|
a valid login shell
|
||||||
.LP
|
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The checks for correct number of fields and unique user name are fatal\&. If the entry has the wrong number of fields, the user will be prompted to delete the entire line\&. If the user does not answer affirmatively, all further checks are bypassed\&. An entry with a duplicated user name is prompted for deletion, but the remaining checks will still be made\&. All other errors are warning and the user is encouraged to run the \fBusermod\fR command to correct the error\&.
|
The checks for correct number of fields and unique user name are fatal. If the entry has the wrong number of fields, the user will be prompted to delete the entire line. If the user does not answer affirmatively, all further checks are bypassed. An entry with a duplicated user name is prompted for deletion, but the remaining checks will still be made. All other errors are warning and the user is encouraged to run the
|
||||||
|
\fBusermod\fR
|
||||||
|
command to correct the error.
|
||||||
.PP
|
.PP
|
||||||
The commands which operate on the \fI/etc/passwd\fR file are not able to alter corrupted or duplicated entries\&. \fBpwck\fR should be used in those circumstances to remove the offending entry\&.
|
The commands which operate on the
|
||||||
|
\fI/etc/passwd\fR
|
||||||
|
file are not able to alter corrupted or duplicated entries.
|
||||||
|
\fBpwck\fR
|
||||||
|
should be used in those circumstances to remove the offending entry.
|
||||||
.SH "OPTIONS"
|
.SH "OPTIONS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The options which apply to the \fBpwck\fR command are:
|
The options which apply to the
|
||||||
|
\fBpwck\fR
|
||||||
|
command are:
|
||||||
.TP
|
.TP
|
||||||
\fB\-q\fR
|
\fB\-q\fR
|
||||||
Report errors only\&. Using this option will not require an action from the user\&.
|
Report errors only. Using this option will not require an action from the user.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-r\fR
|
\fB\-r\fR
|
||||||
Execute the \fBpwck\fR command in read\-only mode\&.
|
Execute the
|
||||||
|
\fBpwck\fR
|
||||||
|
command in read\-only mode.
|
||||||
.TP
|
.TP
|
||||||
\fB\-s\fR
|
\fB\-s\fR
|
||||||
Sort entries in \fI/etc/passwd\fR and \fI/etc/shadow\fR by UID\&.
|
Sort entries in
|
||||||
|
\fI/etc/passwd\fR
|
||||||
|
and
|
||||||
|
\fI/etc/shadow\fR
|
||||||
|
by UID.
|
||||||
.PP
|
.PP
|
||||||
By default, \fBpwck\fR operates on the files \fI/etc/passwd\fR and \fI/etc/shadow\fR\&. The user may select alternate files with the \fIpasswd\fR and \fIshadow\fR parameters\&.
|
By default,
|
||||||
|
\fBpwck\fR
|
||||||
|
operates on the files
|
||||||
|
\fI/etc/passwd\fR
|
||||||
|
and
|
||||||
|
\fI/etc/shadow\fR. The user may select alternate files with the
|
||||||
|
\fIpasswd\fR
|
||||||
|
and
|
||||||
|
\fIshadow\fR
|
||||||
|
parameters.
|
||||||
.SH "FILES"
|
.SH "FILES"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fI/etc/group\fR
|
\fI/etc/group\fR
|
||||||
group account information
|
group account information
|
||||||
@ -100,15 +94,16 @@ user account information
|
|||||||
\fI/etc/shadow\fR
|
\fI/etc/shadow\fR
|
||||||
secure user account information
|
secure user account information
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBgroup\fR(5), \fBpasswd\fR(5), \fBshadow\fR(5), \fBusermod\fR(8)
|
\fBgroup\fR(5),
|
||||||
|
\fBpasswd\fR(5),
|
||||||
|
\fBshadow\fR(5),
|
||||||
|
\fBusermod\fR(8)
|
||||||
.SH "EXIT VALUES"
|
.SH "EXIT VALUES"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The \fBpwck\fR command exits with the following values:
|
The
|
||||||
|
\fBpwck\fR
|
||||||
|
command exits with the following values:
|
||||||
.TP
|
.TP
|
||||||
\fI0\fR
|
\fI0\fR
|
||||||
success
|
success
|
||||||
@ -127,9 +122,6 @@ can't lock password files
|
|||||||
.TP
|
.TP
|
||||||
\fI5\fR
|
\fI5\fR
|
||||||
can't update password files
|
can't update password files
|
||||||
|
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
|
||||||
|
136
man/pwconv.8
136
man/pwconv.8
@ -1,84 +1,98 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "PWCONV" "8" "26 Sep 1997" "26 Sep 1997" "26 Sep 1997"
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "PWCONV" 8 "26 Sep 1997" "" ""
|
|
||||||
.SH NAME
|
|
||||||
pwconv, pwunconv, grpconv, grpunconv \- convert to and from shadow passwords and groups.
|
pwconv, pwunconv, grpconv, grpunconv \- convert to and from shadow passwords and groups.
|
||||||
.SH "SYNOPSIS"
|
.SH "SYNOPSIS"
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 7
|
.HP 7
|
||||||
\fBpwconv\fR
|
\fBpwconv\fR
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 9
|
.HP 9
|
||||||
\fBpwunconv\fR
|
\fBpwunconv\fR
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 8
|
.HP 8
|
||||||
\fBgrpconv\fR
|
\fBgrpconv\fR
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 10
|
.HP 10
|
||||||
\fBgrpunconv\fR
|
\fBgrpunconv\fR
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
|
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBpwconv\fR creates \fIshadow\fR from \fIpasswd\fR and an optionally existing \fIshadow\fR\&.
|
\fBpwconv\fR
|
||||||
|
creates
|
||||||
|
\fIshadow\fR
|
||||||
|
from
|
||||||
|
\fIpasswd\fR
|
||||||
|
and an optionally existing
|
||||||
|
\fIshadow\fR.
|
||||||
.PP
|
.PP
|
||||||
\fBpwunconv\fR creates \fIpasswd\fR from \fIpasswd\fR and \fIshadow\fR and then removes \fIshadow\fR\&.
|
\fBpwunconv\fR
|
||||||
|
creates
|
||||||
|
\fIpasswd\fR
|
||||||
|
from
|
||||||
|
\fIpasswd\fR
|
||||||
|
and
|
||||||
|
\fIshadow\fR
|
||||||
|
and then removes
|
||||||
|
\fIshadow\fR.
|
||||||
.PP
|
.PP
|
||||||
\fBgrpconv\fR creates \fIgshadow\fR from \fIgroup\fR and an optionally existing \fIgshadow\fR\&.
|
\fBgrpconv\fR
|
||||||
|
creates
|
||||||
|
\fIgshadow\fR
|
||||||
|
from
|
||||||
|
\fIgroup\fR
|
||||||
|
and an optionally existing
|
||||||
|
\fIgshadow\fR.
|
||||||
.PP
|
.PP
|
||||||
\fBgrpunconv\fR creates \fIgroup\fR from \fIgroup\fR and \fIgshadow\fR and then removes \fIgshadow\fR\&.
|
\fBgrpunconv\fR
|
||||||
|
creates
|
||||||
|
\fIgroup\fR
|
||||||
|
from
|
||||||
|
\fIgroup\fR
|
||||||
|
and
|
||||||
|
\fIgshadow\fR
|
||||||
|
and then removes
|
||||||
|
\fIgshadow\fR.
|
||||||
.PP
|
.PP
|
||||||
These four programs all operate on the normal and shadow password and group files: \fI/etc/passwd\fR, \fI/etc/group\fR, \fI/etc/shadow\fR, and \fI/etc/gshadow\fR\&.
|
These four programs all operate on the normal and shadow password and group files:
|
||||||
|
\fI/etc/passwd\fR,
|
||||||
|
\fI/etc/group\fR,
|
||||||
|
\fI/etc/shadow\fR, and
|
||||||
|
\fI/etc/gshadow\fR.
|
||||||
.PP
|
.PP
|
||||||
Each program acquires the necessary locks before conversion\&. \fBpwconv\fR and \fBgrpconv\fR are similar\&. First, entries in the shadowed file which don't exist in the main file are removed\&. Then, shadowed entries which don't have `x' as the password in the main file are updated\&. Any missing shadowed entries are added\&. Finally, passwords in the main file are replaced with `x'\&. These programs can be used for initial conversion as well to update the shadowed file if the main file is edited by hand\&.
|
Each program acquires the necessary locks before conversion.
|
||||||
|
\fBpwconv\fR
|
||||||
|
and
|
||||||
|
\fBgrpconv\fR
|
||||||
|
are similar. First, entries in the shadowed file which don't exist in the main file are removed. Then, shadowed entries which don't have `x' as the password in the main file are updated. Any missing shadowed entries are added. Finally, passwords in the main file are replaced with `x'. These programs can be used for initial conversion as well to update the shadowed file if the main file is edited by hand.
|
||||||
.PP
|
.PP
|
||||||
\fBpwconv\fR will use the values of \fIPASS_MIN_DAYS\fR, \fIPASS_MAX_DAYS\fR, and \fIPASS_WARN_AGE\fR from \fI/etc/login\&.defs\fR when adding new entries to \fI/etc/shadow\fR\&.
|
\fBpwconv\fR
|
||||||
|
will use the values of
|
||||||
|
\fIPASS_MIN_DAYS\fR,
|
||||||
|
\fIPASS_MAX_DAYS\fR, and
|
||||||
|
\fIPASS_WARN_AGE\fR
|
||||||
|
from
|
||||||
|
\fI/etc/login.defs\fR
|
||||||
|
when adding new entries to
|
||||||
|
\fI/etc/shadow\fR.
|
||||||
.PP
|
.PP
|
||||||
Likewise \fBpwunconv\fR and \fBgrpunconv\fR are similar\&. Passwords in the main file are updated from the shadowed file\&. Entries which exist in the main file but not in the shadowed file are left alone\&. Finally, the shadowed file is removed\&. Some password aging information is lost by \fBpwunconv\fR\&. It will convert what it can\&.
|
Likewise
|
||||||
|
\fBpwunconv\fR
|
||||||
|
and
|
||||||
|
\fBgrpunconv\fR
|
||||||
|
are similar. Passwords in the main file are updated from the shadowed file. Entries which exist in the main file but not in the shadowed file are left alone. Finally, the shadowed file is removed. Some password aging information is lost by
|
||||||
|
\fBpwunconv\fR. It will convert what it can.
|
||||||
.SH "BUGS"
|
.SH "BUGS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Errors in the password or group files (such as invalid or duplicate entries) may cause these programs to loop forever or fail in other strange ways\&. Please run \fBpwck\fR and \fBgrpck\fR to correct any such errors before converting to or from shadow passwords or groups\&.
|
Errors in the password or group files (such as invalid or duplicate entries) may cause these programs to loop forever or fail in other strange ways. Please run
|
||||||
|
\fBpwck\fR
|
||||||
|
and
|
||||||
|
\fBgrpck\fR
|
||||||
|
to correct any such errors before converting to or from shadow passwords or groups.
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBlogin\&.defs\fR(5), \fBgrpck\fR(8), \fBpwck\fR(8)
|
\fBlogin.defs\fR(5),
|
||||||
|
\fBgrpck\fR(8),
|
||||||
|
\fBpwck\fR(8)
|
||||||
|
119
man/shadow.3
119
man/shadow.3
@ -1,68 +1,49 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "SHADOW" "3" "08/03/2005" "" ""
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "SHADOW" 3 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
shadow \- encrypted password file routines
|
shadow \- encrypted password file routines
|
||||||
.SH "SYNTAX"
|
.SH "SYNTAX"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fI#include <shadow\&.h>\fR
|
\fI#include <shadow.h>\fR
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fIstruct spwd *getspent();\fR
|
\fIstruct spwd *getspent();\fR
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fIstruct spwd *getspnam(char\fR \fI*name\fR\fI);\fR
|
\fIstruct spwd *getspnam(char\fR \fI*name\fR\fI);\fR
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fIvoid setspent();\fR
|
\fIvoid setspent();\fR
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fIvoid endspent();\fR
|
\fIvoid endspent();\fR
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fIstruct spwd *fgetspent(FILE\fR \fI*fp\fR\fI);\fR
|
\fIstruct spwd *fgetspent(FILE\fR \fI*fp\fR\fI);\fR
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fIstruct spwd *sgetspent(char\fR \fI*cp\fR\fI);\fR
|
\fIstruct spwd *sgetspent(char\fR \fI*cp\fR\fI);\fR
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fIint putspent(struct spwd\fR \fI*p,\fR \fIFILE\fR \fI*fp\fR\fI);\fR
|
\fIint putspent(struct spwd\fR \fI*p,\fR \fIFILE\fR \fI*fp\fR\fI);\fR
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fIint lckpwdf();\fR
|
\fIint lckpwdf();\fR
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fIint ulckpwdf();\fR
|
\fIint ulckpwdf();\fR
|
||||||
|
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fIshadow\fR manipulates the contents of the shadow password file, \fI/etc/shadow\fR\&. The structure in the \fI#include\fR file is:
|
\fIshadow\fR
|
||||||
|
manipulates the contents of the shadow password file,
|
||||||
|
\fI/etc/shadow\fR. The structure in the
|
||||||
|
\fI#include\fR
|
||||||
|
file is:
|
||||||
|
|
||||||
.nf
|
.nf
|
||||||
struct spwd {
|
struct spwd {
|
||||||
char *sp_namp; /* user login name */
|
char *sp_namp; /* user login name */
|
||||||
char *sp_pwdp; /* encrypted password */
|
char *sp_pwdp; /* encrypted password */
|
||||||
long int sp_lstchg; /* last password change */
|
long int sp_lstchg; /* last password change */
|
||||||
long int sp_min; /* days until change allowed\&. */
|
long int sp_min; /* days until change allowed. */
|
||||||
long int sp_max; /* days before change required */
|
long int sp_max; /* days before change required */
|
||||||
long int sp_warn; /* days warning for expiration */
|
long int sp_warn; /* days warning for expiration */
|
||||||
long int sp_inact; /* days before account inactive */
|
long int sp_inact; /* days before account inactive */
|
||||||
@ -71,10 +52,8 @@ struct spwd {
|
|||||||
}
|
}
|
||||||
|
|
||||||
.fi
|
.fi
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The meanings of each field are:
|
The meanings of each field are:
|
||||||
|
|
||||||
.TP 3
|
.TP 3
|
||||||
\(bu
|
\(bu
|
||||||
sp_namp \- pointer to null\-terminated user name
|
sp_namp \- pointer to null\-terminated user name
|
||||||
@ -102,41 +81,61 @@ sp_expire \- days since Jan 1, 1970 when account will be disabled
|
|||||||
.TP
|
.TP
|
||||||
\(bu
|
\(bu
|
||||||
sp_flag \- reserved for future use
|
sp_flag \- reserved for future use
|
||||||
.LP
|
|
||||||
|
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fIgetspent\fR, \fIgetspname\fR \fIfgetspent\fR, and \fIsgetspent\fR each return a pointer to a \fIstruct spwd\fR\&. \fIgetspent\fR returns the next entry from the file, and \fIfgetspent\fR returns the next entry from the given stream, which is assumed to be a file of the proper format\&. \fIsgetspent\fR returns a pointer to a \fIstruct spwd\fR using the provided string as input\&. \fIgetspnam\fR searches from the current position in the file for an entry matching \fIname\fR\&.
|
\fIgetspent\fR,
|
||||||
|
\fIgetspname\fR \fIfgetspent\fR, and
|
||||||
|
\fIsgetspent\fR
|
||||||
|
each return a pointer to a
|
||||||
|
\fIstruct spwd\fR.
|
||||||
|
\fIgetspent\fR
|
||||||
|
returns the next entry from the file, and
|
||||||
|
\fIfgetspent\fR
|
||||||
|
returns the next entry from the given stream, which is assumed to be a file of the proper format.
|
||||||
|
\fIsgetspent\fR
|
||||||
|
returns a pointer to a
|
||||||
|
\fIstruct spwd\fR
|
||||||
|
using the provided string as input.
|
||||||
|
\fIgetspnam\fR
|
||||||
|
searches from the current position in the file for an entry matching
|
||||||
|
\fIname\fR.
|
||||||
.PP
|
.PP
|
||||||
\fIsetspent\fR and \fIendspent\fR may be used to begin and end, respectively, access to the shadow password file\&.
|
\fIsetspent\fR
|
||||||
|
and
|
||||||
|
\fIendspent\fR
|
||||||
|
may be used to begin and end, respectively, access to the shadow password file.
|
||||||
.PP
|
.PP
|
||||||
The \fIlckpwdf\fR and \fIulckpwdf\fR routines should be used to insure exclusive access to the \fI/etc/shadow\fR file\&. \fIlckpwdf\fR attempts to acquire a lock using \fIpw_lock\fR for up to 15 seconds\&. It continues by attempting to acquire a second lock using \fIspw_lock\fR for the remainder of the initial 15 seconds\&. Should either attempt fail after a total of 15 seconds, \fIlckpwdf\fR returns \-1\&. When both locks are acquired 0 is returned\&.
|
The
|
||||||
|
\fIlckpwdf\fR
|
||||||
|
and
|
||||||
|
\fIulckpwdf\fR
|
||||||
|
routines should be used to insure exclusive access to the
|
||||||
|
\fI/etc/shadow\fR
|
||||||
|
file.
|
||||||
|
\fIlckpwdf\fR
|
||||||
|
attempts to acquire a lock using
|
||||||
|
\fIpw_lock\fR
|
||||||
|
for up to 15 seconds. It continues by attempting to acquire a second lock using
|
||||||
|
\fIspw_lock\fR
|
||||||
|
for the remainder of the initial 15 seconds. Should either attempt fail after a total of 15 seconds,
|
||||||
|
\fIlckpwdf\fR
|
||||||
|
returns \-1. When both locks are acquired 0 is returned.
|
||||||
.SH "DIAGNOSTICS"
|
.SH "DIAGNOSTICS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Routines return NULL if no more entries are available or if an error occurs during processing\&. Routines which have \fIint\fR as the return value return 0 for success and \-1 for failure\&.
|
Routines return NULL if no more entries are available or if an error occurs during processing. Routines which have
|
||||||
|
\fIint\fR
|
||||||
|
as the return value return 0 for success and \-1 for failure.
|
||||||
.SH "CAVEATS"
|
.SH "CAVEATS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
These routines may only be used by the super user as access to the shadow password file is restricted\&.
|
These routines may only be used by the super user as access to the shadow password file is restricted.
|
||||||
|
|
||||||
.SH "FILES"
|
.SH "FILES"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fI/etc/shadow\fR
|
\fI/etc/shadow\fR
|
||||||
secure user account information
|
secure user account information
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBgetpwent\fR(3), \fBshadow\fR(5)
|
\fBgetpwent\fR(3),
|
||||||
|
\fBshadow\fR(5)
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||||
<refentry id='shadow.3'>
|
<refentry id='shadow.3'>
|
||||||
<!-- $Id: shadow.3.xml,v 1.9 2005/06/20 08:42:12 kloczek Exp $ -->
|
<!-- $Id: shadow.3.xml,v 1.10 2005/08/03 16:29:14 kloczek Exp $ -->
|
||||||
<refmeta>
|
<refmeta>
|
||||||
<refentrytitle>shadow</refentrytitle>
|
<refentrytitle>shadow</refentrytitle>
|
||||||
<manvolnum>3</manvolnum>
|
<manvolnum>3</manvolnum>
|
||||||
|
75
man/shadow.5
75
man/shadow.5
@ -1,30 +1,18 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "SHADOW" "5" "08/03/2005" "" ""
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "SHADOW" 5 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
shadow \- encrypted password file
|
shadow \- encrypted password file
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fIshadow\fR contains the encrypted password information for user's accounts and optional the password aging information\&. Included is:
|
\fIshadow\fR
|
||||||
|
contains the encrypted password information for user's accounts and optional the password aging information. Included is:
|
||||||
.TP 3
|
.TP 3
|
||||||
\(bu
|
\(bu
|
||||||
login name
|
login name
|
||||||
@ -52,28 +40,22 @@ days since Jan 1, 1970 that account is disabled
|
|||||||
.TP
|
.TP
|
||||||
\(bu
|
\(bu
|
||||||
a reserved field
|
a reserved field
|
||||||
.LP
|
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The password field must be filled\&. The encrypted password consists of 13 to 24 characters from the 64 characters alphabet a thru z, A thru Z, 0 thru 9, \\\&. and /\&. Optionally it can start with a "$" character\&. This means the encrypted password was generated using another (not DES) algorithm\&. For example if it starts with "$1$" it means the MD5\-based algorithm was used\&.
|
The password field must be filled. The encrypted password consists of 13 to 24 characters from the 64 characters alphabet a thru z, A thru Z, 0 thru 9, \\. and /. Optionally it can start with a "$" character. This means the encrypted password was generated using another (not DES) algorithm. For example if it starts with "$1$" it means the MD5\-based algorithm was used.
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Refer to \fBcrypt\fR(3) for details on how this string is interpreted\&.
|
Refer to
|
||||||
|
\fBcrypt\fR(3)
|
||||||
|
for details on how this string is interpreted.
|
||||||
.PP
|
.PP
|
||||||
The date of the last password change is given as the number of days since Jan 1, 1970\&. The password may not be changed again until the proper number of days have passed, and must be changed after the maximum number of days\&. If the minimum number of days required is greater than the maximum number of day allowed, this password may not be changed by the user\&.
|
The date of the last password change is given as the number of days since Jan 1, 1970. The password may not be changed again until the proper number of days have passed, and must be changed after the maximum number of days. If the minimum number of days required is greater than the maximum number of day allowed, this password may not be changed by the user.
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
An account is considered to be inactive and is disabled if the password is not changed within the specified number of days after the password expires\&. An account will also be disabled on the specified day regardless of other password expiration information\&.
|
An account is considered to be inactive and is disabled if the password is not changed within the specified number of days after the password expires. An account will also be disabled on the specified day regardless of other password expiration information.
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
This information supersedes any password or password age information present in \fI/etc/passwd\fR\&.
|
This information supersedes any password or password age information present in
|
||||||
|
\fI/etc/passwd\fR.
|
||||||
.PP
|
.PP
|
||||||
This file must not be readable by regular users if password security is to be maintained\&.
|
This file must not be readable by regular users if password security is to be maintained.
|
||||||
|
|
||||||
.SH "FILES"
|
.SH "FILES"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fI/etc/passwd\fR
|
\fI/etc/passwd\fR
|
||||||
user account information
|
user account information
|
||||||
@ -81,12 +63,15 @@ user account information
|
|||||||
\fI/etc/shadow\fR
|
\fI/etc/shadow\fR
|
||||||
secure user account information
|
secure user account information
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBchage\fR(1), \fBlogin\fR(1), \fBpasswd\fR(1), \fBsu\fR(1), \fBpasswd\fR(5), \fBpwconv\fR(8), \fBpwunconv\fR(8), \fBsulogin\fR(8)
|
\fBchage\fR(1),
|
||||||
|
\fBlogin\fR(1),
|
||||||
|
\fBpasswd\fR(1),
|
||||||
|
\fBsu\fR(1),
|
||||||
|
\fBpasswd\fR(5),
|
||||||
|
\fBpwconv\fR(8),
|
||||||
|
\fBpwunconv\fR(8),
|
||||||
|
\fBsulogin\fR(8)
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
|
||||||
|
94
man/su.1
94
man/su.1
@ -1,57 +1,54 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "SU" "1" "08/03/2005" "User Commands" "User Commands"
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "SU" 1 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
su \- change user ID or become super-user
|
|
||||||
.SH "SYNOPSIS"
|
|
||||||
.ad l
|
.ad l
|
||||||
.hy 0
|
.SH "NAME"
|
||||||
|
su \- change user ID or become super\-user
|
||||||
|
.SH "SYNOPSIS"
|
||||||
.HP 3
|
.HP 3
|
||||||
\fBsu\fR [\-] [\fIusername\fR\ [\fIargs\fR]]
|
\fBsu\fR [\-] [\fIusername\fR\ [\ \fIargs\fR\ ]]
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
|
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBsu\fR is used to become another user during a login session\&. Invoked without a username, \fBsu\fR defaults to becoming the super user\&. The optional argument \fB\-\fR may be used to provide an environment similar to what the user would expect had the user logged in directly\&.
|
\fBsu\fR
|
||||||
|
is used to become another user during a login session. Invoked without a username,
|
||||||
|
\fBsu\fR
|
||||||
|
defaults to becoming the super user. The optional argument
|
||||||
|
\fB\-\fR
|
||||||
|
may be used to provide an environment similar to what the user would expect had the user logged in directly.
|
||||||
.PP
|
.PP
|
||||||
Additional arguments may be provided after the username, in which case they are supplied to the user´s login shell\&. In particular, an argument of \fB\-c\fR will cause the next argument to be treated as a command by most command interpreters\&. The command will be executed by the shell specified in \fI/etc/passwd\fR for the target user\&.
|
Additional arguments may be provided after the username, in which case they are supplied to the user\(aas login shell. In particular, an argument of
|
||||||
|
\fB\-c\fR
|
||||||
|
will cause the next argument to be treated as a command by most command interpreters. The command will be executed by the shell specified in
|
||||||
|
\fI/etc/passwd\fR
|
||||||
|
for the target user.
|
||||||
.PP
|
.PP
|
||||||
The user will be prompted for a password, if appropriate\&. Invalid passwords will produce an error message\&. All attempts, both valid and invalid, are logged to detect abuses of the system\&.
|
The user will be prompted for a password, if appropriate. Invalid passwords will produce an error message. All attempts, both valid and invalid, are logged to detect abuses of the system.
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The current environment is passed to the new shell\&. The value of \fI$PATH\fR is reset to \fI/bin:/usr/bin\fR for normal users, or \fI/sbin:/bin:/usr/sbin:/usr/bin\fR for the super user\&. This may be changed with the \fIENV_PATH\fR and \fIENV_SUPATH\fR definitions in \fI/etc/login\&.defs\fR\&.
|
The current environment is passed to the new shell. The value of
|
||||||
|
\fI$PATH\fR
|
||||||
|
is reset to
|
||||||
|
\fI/bin:/usr/bin\fR
|
||||||
|
for normal users, or
|
||||||
|
\fI/sbin:/bin:/usr/sbin:/usr/bin\fR
|
||||||
|
for the super user. This may be changed with the
|
||||||
|
\fIENV_PATH\fR
|
||||||
|
and
|
||||||
|
\fIENV_SUPATH\fR
|
||||||
|
definitions in
|
||||||
|
\fI/etc/login.defs\fR.
|
||||||
.PP
|
.PP
|
||||||
A subsystem login is indicated by the presence of a "*" as the first character of the login shell\&. The given home directory will be used as the root of a new file system which the user is actually logged into\&.
|
A subsystem login is indicated by the presence of a "*" as the first character of the login shell. The given home directory will be used as the root of a new file system which the user is actually logged into.
|
||||||
|
|
||||||
.SH "CAVEATS"
|
.SH "CAVEATS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
This version of \fBsu\fR has many compilation options, only some of which may be in use at any particular site\&.
|
This version of
|
||||||
|
\fBsu\fR
|
||||||
|
has many compilation options, only some of which may be in use at any particular site.
|
||||||
.SH "FILES"
|
.SH "FILES"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fI/etc/passwd\fR
|
\fI/etc/passwd\fR
|
||||||
user account information
|
user account information
|
||||||
@ -59,12 +56,11 @@ user account information
|
|||||||
\fI/etc/shadow\fR
|
\fI/etc/shadow\fR
|
||||||
secure user account information
|
secure user account information
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBlogin\fR(1), \fBsh\fR(1), \fBlogin\&.defs\fR(5), \fBsuauth\fR(5)
|
\fBlogin\fR(1),
|
||||||
|
\fBsh\fR(1),
|
||||||
|
\fBlogin.defs\fR(5),
|
||||||
|
\fBsuauth\fR(5)
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Julianne Frances Haugh <jockgrrl@ix\&.netcom\&.com>
|
Julianne Frances Haugh <jockgrrl@ix.netcom.com>
|
||||||
|
|
||||||
|
134
man/suauth.5
134
man/suauth.5
@ -1,75 +1,70 @@
|
|||||||
.\"$Id: suauth.5,v 1.7 2005/04/05 18:47:50 kloczek Exp $
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.TH SUAUTH 5 "Feb 14, 1996"
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.UC 5
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.SH NAME
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
|
.TH "SUAUTH" "5" "08/03/2005" "Feb 14, 1996" "Feb 14, 1996"
|
||||||
|
.\" disable hyphenation
|
||||||
|
.nh
|
||||||
|
.\" disable justification (adjust text to left margin only)
|
||||||
|
.ad l
|
||||||
|
.SH "NAME"
|
||||||
suauth \- Detailed su control file
|
suauth \- Detailed su control file
|
||||||
.SH SYNOPSIS
|
.SH "SYNOPSIS"
|
||||||
.B /etc/suauth
|
.HP 12
|
||||||
.SH DESCRIPTION
|
\fB/etc/suauth\fR
|
||||||
|
.SH "DESCRIPTION"
|
||||||
|
.PP
|
||||||
The file
|
The file
|
||||||
.I /etc/suauth
|
\fI/etc/suauth\fR
|
||||||
is referenced whenever the su command is called. It can change the
|
is referenced whenever the su command is called. It can change the behaviour of the su command, based upon
|
||||||
behaviour of the su command, based upon
|
|
||||||
.PP
|
|
||||||
.RS
|
|
||||||
.nf
|
.nf
|
||||||
|
|
||||||
1) the user su is targetting
|
1) the user su is targetting
|
||||||
|
|
||||||
.fi
|
.fi
|
||||||
2) the user executing the su command (or any groups he might be
|
|
||||||
a member of)
|
|
||||||
.RE
|
|
||||||
.PP
|
.PP
|
||||||
The file is formatted like this, with lines starting with a #
|
2) the user executing the su command (or any groups he might be a member of)
|
||||||
being treated as comment lines and ignored;
|
|
||||||
.PP
|
.PP
|
||||||
.RS
|
The file is formatted like this, with lines starting with a # being treated as comment lines and ignored;
|
||||||
|
|
||||||
|
.nf
|
||||||
|
|
||||||
to\-id:from\-id:ACTION
|
to\-id:from\-id:ACTION
|
||||||
.RE
|
|
||||||
|
.fi
|
||||||
.PP
|
.PP
|
||||||
Where to\-id is either the word
|
Where to\-id is either the word
|
||||||
.BR ALL ,
|
\fIALL\fR, a list of usernames delimited by "," or the words
|
||||||
a list of usernames
|
\fIALL EXCEPT\fR
|
||||||
delimited by "," or the words
|
followed by a list of usernames delimited by ","
|
||||||
.B ALL EXCEPT
|
|
||||||
followed by a list
|
|
||||||
of usernames delimited by ","
|
|
||||||
.PP
|
.PP
|
||||||
from\-id is formatted the same as to\-id except the extra word
|
from\-id is formatted the same as to\-id except the extra word
|
||||||
.B GROUP
|
\fIGROUP\fR
|
||||||
is recognised.
|
is recognised.
|
||||||
.B ALL EXCEPT GROUP
|
\fIALL EXCEPT GROUP\fR
|
||||||
is perfectly valid too.
|
is perfectly valid too. Following
|
||||||
Following
|
\fIGROUP\fR
|
||||||
.B GROUP
|
appears one or more group names, delimited by ",". It is not sufficient to have primary group id of the relevant group, an entry in
|
||||||
appears one or more group names, delimited by
|
\fB/etc/group\fR(5)
|
||||||
",". It is not sufficient to have primary group id of the
|
|
||||||
relevant group, an entry in
|
|
||||||
.BR /etc/group (5)
|
|
||||||
is neccessary.
|
is neccessary.
|
||||||
.PP
|
.PP
|
||||||
Action can be one only of the following currently supported
|
Action can be one only of the following currently supported options.
|
||||||
options.
|
.TP
|
||||||
.TP 20
|
\fIDENY\fR
|
||||||
.B DENY
|
|
||||||
The attempt to su is stopped before a password is even asked for.
|
The attempt to su is stopped before a password is even asked for.
|
||||||
.TP 20
|
.TP
|
||||||
.B NOPASS
|
\fINOPASS\fR
|
||||||
The attempt to su is automatically successful; no password is
|
The attempt to su is automatically successful; no password is asked for.
|
||||||
asked for.
|
.TP
|
||||||
.TP 20
|
\fIOWNPASS\fR
|
||||||
.B OWNPASS
|
For the su command to be successful, the user must enter his or her own password. They are told this.
|
||||||
For the su command to be successful, the user must enter
|
|
||||||
his or her own password. They are told this.
|
|
||||||
.PP
|
|
||||||
Note there are three separate fields delimited by a colon. No
|
|
||||||
whitespace must surround this colon. Also note that the file
|
|
||||||
is examined sequentially line by line, and the first applicable
|
|
||||||
rule is used without examining the file further. This makes it
|
|
||||||
possible for a system administrator to exercise as fine control
|
|
||||||
as he or she wishes.
|
|
||||||
.SH EXAMPLE
|
|
||||||
.PP
|
.PP
|
||||||
|
Note there are three separate fields delimited by a colon. No whitespace must surround this colon. Also note that the file is examined sequentially line by line, and the first applicable rule is used without examining the file further. This makes it possible for a system administrator to exercise as fine control as he or she wishes.
|
||||||
|
.SH "EXAMPLE"
|
||||||
|
|
||||||
.nf
|
.nf
|
||||||
|
|
||||||
# sample /etc/suauth file
|
# sample /etc/suauth file
|
||||||
#
|
#
|
||||||
# A couple of privileged usernames may
|
# A couple of privileged usernames may
|
||||||
@ -90,24 +85,29 @@ root:ALL EXCEPT GROUP wheel:DENY
|
|||||||
terry:birddog:NOPASS
|
terry:birddog:NOPASS
|
||||||
birddog:terry:NOPASS
|
birddog:terry:NOPASS
|
||||||
#
|
#
|
||||||
|
|
||||||
.fi
|
.fi
|
||||||
.SH FILES
|
.SH "FILES"
|
||||||
|
.TP
|
||||||
\fI/etc/suauth\fR
|
\fI/etc/suauth\fR
|
||||||
.SH BUGS
|
.SH "BUGS"
|
||||||
There could be plenty lurking. The file parser is particularly
|
.PP
|
||||||
unforgiving about syntax errors, expecting no spurious whitespace
|
There could be plenty lurking. The file parser is particularly unforgiving about syntax errors, expecting no spurious whitespace (apart from beginning and end of lines), and a specific token delimiting different things.
|
||||||
(apart from beginning and end of lines), and a specific token
|
.SH "DIAGNOSTICS"
|
||||||
delimiting different things.
|
.PP
|
||||||
.SH DIAGNOSTICS
|
|
||||||
An error parsing the file is reported using
|
An error parsing the file is reported using
|
||||||
.BR syslogd (8)
|
\fBsyslogd\fR(8)
|
||||||
as level ERR on
|
as level ERR on facility AUTH.
|
||||||
facility AUTH.
|
.SH "SEE ALSO"
|
||||||
.SH SEE ALSO
|
.PP
|
||||||
.BR su (1)
|
\fBsu\fR(1)
|
||||||
.SH AUTHOR
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.nf
|
.nf
|
||||||
|
|
||||||
Chris Evans (lady0110@sable.ox.ac.uk)
|
Chris Evans (lady0110@sable.ox.ac.uk)
|
||||||
Lady Margaret Hall
|
Lady Margaret Hall
|
||||||
Oxford University
|
Oxford University
|
||||||
England
|
England
|
||||||
|
|
||||||
|
.fi
|
||||||
|
125
man/sulogin.8
125
man/sulogin.8
@ -1,78 +1,69 @@
|
|||||||
.\" $Id: sulogin.8,v 1.13 2005/04/12 16:31:06 kloczek Exp $
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.\" Copyright 1989 - 1992, Julianne Frances Haugh
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.\" All rights reserved.
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.\"
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.\" Redistribution and use in source and binary forms, with or without
|
.TH "SULOGIN" "8" "08/03/2005" "" ""
|
||||||
.\" modification, are permitted provided that the following conditions
|
.\" disable hyphenation
|
||||||
.\" are met:
|
.nh
|
||||||
.\" 1. Redistributions of source code must retain the above copyright
|
.\" disable justification (adjust text to left margin only)
|
||||||
.\" notice, this list of conditions and the following disclaimer.
|
.ad l
|
||||||
.\" 2. Redistributions in binary form must reproduce the above copyright
|
.SH "NAME"
|
||||||
.\" notice, this list of conditions and the following disclaimer in the
|
|
||||||
.\" documentation and/or other materials provided with the distribution.
|
|
||||||
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
|
|
||||||
.\" may be used to endorse or promote products derived from this software
|
|
||||||
.\" without specific prior written permission.
|
|
||||||
.\"
|
|
||||||
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
|
|
||||||
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
||||||
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
|
|
||||||
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
||||||
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
||||||
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
||||||
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
||||||
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
||||||
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
||||||
.\" SUCH DAMAGE.
|
|
||||||
.TH SULOGIN 8
|
|
||||||
.SH NAME
|
|
||||||
sulogin \- Single\-user login
|
sulogin \- Single\-user login
|
||||||
.SH SYNTAX
|
.SH "SYNTAX"
|
||||||
\fBsulogin\fR [\fItty\-device\fR]
|
.PP
|
||||||
.SH DESCRIPTION
|
\fBsulogin\fR
|
||||||
\fBsulogin\fR is invoked by \fBinit\fR prior to allowing the user access to
|
[\fItty\-device\fR]
|
||||||
the system when in single user mode. This feature may only be available on
|
.SH "DESCRIPTION"
|
||||||
certain systems where \fBinit\fR has been modified accordingly, or where the
|
.PP
|
||||||
\fB/etc/inittab\fR has an entry for a single user login.
|
\fBsulogin\fR
|
||||||
|
is invoked by
|
||||||
|
\fBinit\fR
|
||||||
|
prior to allowing the user access to the system when in single user mode. This feature may only be available on certain systems where
|
||||||
|
\fBinit\fR
|
||||||
|
has been modified accordingly, or where the
|
||||||
|
\fI/etc/inittab\fR
|
||||||
|
has an entry for a single user login.
|
||||||
.PP
|
.PP
|
||||||
The user is prompted
|
The user is prompted
|
||||||
.IP "" .5i
|
|
||||||
Type control\-d to proceed with normal startup,
|
|
||||||
.br
|
|
||||||
(or give root password for system maintenance):
|
|
||||||
.PP
|
.PP
|
||||||
Input and output will be performed with the standard file descriptors unless
|
Type control\-d to proceed with normal startup,(or give root password for system maintenance):
|
||||||
the optional device name argument is provided.
|
|
||||||
.PP
|
.PP
|
||||||
If the user enters the correct root password, a login session is initiated.
|
Input and output will be performed with the standard file descriptors unless the optional device name argument is provided.
|
||||||
When \fBEOF\fR is pressed instead, the system enters multi\-user mode.
|
|
||||||
.PP
|
.PP
|
||||||
After the user exits the single\-user shell, or presses \fBEOF\fR,
|
If the user enters the correct root password, a login session is initiated. When
|
||||||
the system begins the initialization process required to enter
|
\fIEOF\fR
|
||||||
multi\-user mode.
|
is pressed instead, the system enters multi\-user mode.
|
||||||
.SH CAVEATS
|
.PP
|
||||||
|
After the user exits the single\-user shell, or presses
|
||||||
|
\fIEOF\fR, the system begins the initialization process required to enter multi\-user mode.
|
||||||
|
.SH "CAVEATS"
|
||||||
|
.PP
|
||||||
|
This command can only be used if
|
||||||
|
\fBinit\fR
|
||||||
|
has been modified to call
|
||||||
|
\fBsulogin\fR
|
||||||
|
instead of
|
||||||
|
\fI/bin/sh\fR, or if the user has set the
|
||||||
|
\fIinittab\fR
|
||||||
|
to support a single user login. For example, the line:
|
||||||
.PP
|
.PP
|
||||||
This command can only be used if \fBinit\fR has been modified to call
|
|
||||||
\fBsulogin\fR instead of \fB/bin/sh\fR, or if the user has set the
|
|
||||||
\fIinittab\fR to support a single user login. For example, the line
|
|
||||||
.br
|
|
||||||
.sp 1
|
|
||||||
co:s:respawn:/etc/sulogin /dev/console
|
co:s:respawn:/etc/sulogin /dev/console
|
||||||
.br
|
.PP
|
||||||
.sp 1
|
|
||||||
should execute the sulogin command in single user mode.
|
should execute the sulogin command in single user mode.
|
||||||
.PP
|
.PP
|
||||||
As complete an environment as possible is created. However, various devices
|
As complete an environment as possible is created. However, various devices may be unmounted or uninitialized and many of the user commands may be unavailable or nonfunctional as a result.
|
||||||
may be unmounted or uninitialized and many of the user commands may be
|
.SH "FILES"
|
||||||
unavailable or nonfunctional as a result.
|
.TP
|
||||||
.SH FILES
|
\fI/etc/passwd\fR
|
||||||
\fI/etc/passwd\fR \- user account information
|
user account information
|
||||||
.br
|
.TP
|
||||||
\fI/etc/shadow\fR \- secure user account information
|
\fI/etc/shadow\fR
|
||||||
.SH SEE ALSO
|
secure user account information
|
||||||
.BR login (1),
|
.SH "SEE ALSO"
|
||||||
.BR sh (1),
|
.PP
|
||||||
.BR init (8)
|
\fBlogin\fR(1),
|
||||||
.SH AUTHOR
|
\fBsh\fR(1),
|
||||||
|
\fBinit\fR(8)
|
||||||
|
.SH "AUTHOR"
|
||||||
|
.PP
|
||||||
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||||
<refentry id='sulogin.8'>
|
<refentry id='sulogin.8'>
|
||||||
<!-- $Id: sulogin.8.xml,v 1.7 2005/06/15 12:39:27 kloczek Exp $ -->
|
<!-- $Id: sulogin.8.xml,v 1.8 2005/08/03 16:29:14 kloczek Exp $ -->
|
||||||
<refmeta>
|
<refmeta>
|
||||||
<refentrytitle>sulogin</refentrytitle>
|
<refentrytitle>sulogin</refentrytitle>
|
||||||
<manvolnum>8</manvolnum>
|
<manvolnum>8</manvolnum>
|
||||||
@ -14,18 +14,13 @@
|
|||||||
|
|
||||||
<refsect1 id='syntax'>
|
<refsect1 id='syntax'>
|
||||||
<title>SYNTAX</title>
|
<title>SYNTAX</title>
|
||||||
<para>
|
<para><command>sulogin</command> [<emphasis remap='I'>tty-device</emphasis>]
|
||||||
<command>sulogin</command> [<emphasis remap='I'>
|
|
||||||
tty-device
|
|
||||||
</emphasis>
|
|
||||||
]
|
|
||||||
</para>
|
</para>
|
||||||
</refsect1>
|
</refsect1>
|
||||||
|
|
||||||
<refsect1 id='description'>
|
<refsect1 id='description'>
|
||||||
<title>DESCRIPTION</title>
|
<title>DESCRIPTION</title>
|
||||||
<para>
|
<para><command>sulogin</command> is invoked by <command>init</command> prior
|
||||||
<command>sulogin</command> is invoked by <command>init</command> prior
|
|
||||||
to allowing the user access to the system when in single user mode.
|
to allowing the user access to the system when in single user mode.
|
||||||
This feature may only be available on certain systems where
|
This feature may only be available on certain systems where
|
||||||
<command>init</command> has been modified accordingly, or where the
|
<command>init</command> has been modified accordingly, or where the
|
||||||
|
211
man/useradd.8
211
man/useradd.8
@ -1,155 +1,157 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "USERADD" "8" "08/03/2005" "" ""
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "USERADD" 8 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
useradd \- Create a new user or update default new user information
|
useradd \- Create a new user or update default new user information
|
||||||
.SH "SYNOPSIS"
|
.SH "SYNOPSIS"
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 8
|
.HP 8
|
||||||
\fBuseradd\fR [\fIoptions\fR] \fILOGIN\fR
|
\fBuseradd\fR [\fIoptions\fR] \fILOGIN\fR
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 8
|
.HP 8
|
||||||
\fBuseradd\fR \-D
|
\fBuseradd\fR \-D
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 8
|
.HP 8
|
||||||
\fBuseradd\fR \-D [\fIoptions\fR]
|
\fBuseradd\fR \-D [\fIoptions\fR]
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
|
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.SS "Creating New Users"
|
.SS "Creating New Users"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
When invoked without the \fB\-D\fR option, the \fBuseradd\fR command creates a new user account using the values specified on the command line and the default values from the system\&. Depending on command line options, the useradd command will update system files and may also create the new user's home directory and copy initial files\&.
|
When invoked without the
|
||||||
|
\fB\-D\fR
|
||||||
|
option, the
|
||||||
|
\fBuseradd\fR
|
||||||
|
command creates a new user account using the values specified on the command line and the default values from the system. Depending on command line options, the useradd command will update system files and may also create the new user's home directory and copy initial files.
|
||||||
.SH "OPTIONS"
|
.SH "OPTIONS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The options which apply to the \fBuseradd\fR command are:
|
The options which apply to the
|
||||||
|
\fBuseradd\fR
|
||||||
|
command are:
|
||||||
.TP
|
.TP
|
||||||
\fB\-c\fR, \fB\-\-comment\fR \fICOMMENT\fR
|
\fB\-c\fR, \fB\-\-comment\fR \fICOMMENT\fR
|
||||||
Any text string\&. It is generally a short description of the login, and is currently used as the field for the user's full name\&.
|
Any text string. It is generally a short description of the login, and is currently used as the field for the user's full name.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-b\fR, \fB\-\-base\-dir\fR \fIBASE_DIR\fR
|
\fB\-b\fR, \fB\-\-base\-dir\fR \fIBASE_DIR\fR
|
||||||
The default base directory for the system if \fB\-d\fR dir is not specified\&. \fIBASE_DIR\fR is concatenated with the account name to define the home directory\&. If the \fB\-m\fR option is not used, base_dir must exist\&.
|
The default base directory for the system if
|
||||||
|
\fB\-d\fR
|
||||||
|
dir is not specified.
|
||||||
|
\fIBASE_DIR\fR
|
||||||
|
is concatenated with the account name to define the home directory. If the
|
||||||
|
\fB\-m\fR
|
||||||
|
option is not used, base_dir must exist.
|
||||||
.TP
|
.TP
|
||||||
\fB\-d\fR, \fB\-\-home\fR \fIHOME_DIR\fR
|
\fB\-d\fR, \fB\-\-home\fR \fIHOME_DIR\fR
|
||||||
The new user will be created using \fIHOME_DIR\fR as the value for the user's login directory\&. The default is to append the \fILOGIN\fR name to \fIBASE_DIR\fR and use that as the login directory name\&.
|
The new user will be created using
|
||||||
|
\fIHOME_DIR\fR
|
||||||
|
as the value for the user's login directory. The default is to append the
|
||||||
|
\fILOGIN\fR
|
||||||
|
name to
|
||||||
|
\fIBASE_DIR\fR
|
||||||
|
and use that as the login directory name.
|
||||||
.TP
|
.TP
|
||||||
\fB\-e\fR, \fB\-\-expiredate\fR \fIEXPIRE_DATE\fR
|
\fB\-e\fR, \fB\-\-expiredate\fR \fIEXPIRE_DATE\fR
|
||||||
The date on which the user account will be disabled\&. The date is specified in the format \fIYYYY\-MM\-DD\fR\&.
|
The date on which the user account will be disabled. The date is specified in the format
|
||||||
|
\fIYYYY\-MM\-DD\fR.
|
||||||
.TP
|
.TP
|
||||||
\fB\-f\fR, \fB\-\-inactive\fR \fIINACTIVE\fR
|
\fB\-f\fR, \fB\-\-inactive\fR \fIINACTIVE\fR
|
||||||
The number of days after a password expires until the account is permanently disabled\&. A value of 0 disables the account as soon as the password has expired, and a value of \-1 disables the feature\&. The default value is \-1\&.
|
The number of days after a password expires until the account is permanently disabled. A value of 0 disables the account as soon as the password has expired, and a value of \-1 disables the feature. The default value is \-1.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-g\fR, \fB\-\-gid\fR \fIGROUP\fR
|
\fB\-g\fR, \fB\-\-gid\fR \fIGROUP\fR
|
||||||
The group name or number of the user's initial login group\&. The group name must exist\&. A group number must refer to an already existing group\&. The default group number is 1 or whatever is specified in \fI/etc/default/useradd\fR\&.
|
The group name or number of the user's initial login group. The group name must exist. A group number must refer to an already existing group. The default group number is 1 or whatever is specified in
|
||||||
|
\fI/etc/default/useradd\fR.
|
||||||
.TP
|
.TP
|
||||||
\fB\-G\fR, \fB\-\-groups\fR \fIGROUP1\fR[\fI,GROUP2,\&.\&.\&.\fR[\fI,GROUPN\fR]]]
|
\fB\-G\fR, \fB\-\-groups\fR \fIGROUP1\fR[\fI,GROUP2,...\fR[\fI,GROUPN\fR]]]
|
||||||
A list of supplementary groups which the user is also a member of\&. Each group is separated from the next by a comma, with no intervening whitespace\&. The groups are subject to the same restrictions as the group given with the \fB\-g\fR option\&. The default is for the user to belong only to the initial group\&.
|
A list of supplementary groups which the user is also a member of. Each group is separated from the next by a comma, with no intervening whitespace. The groups are subject to the same restrictions as the group given with the
|
||||||
|
\fB\-g\fR
|
||||||
|
option. The default is for the user to belong only to the initial group.
|
||||||
.TP
|
.TP
|
||||||
\fB\-h\fR, \fB\-\-help\fR
|
\fB\-h\fR, \fB\-\-help\fR
|
||||||
Display help message and exit\&.
|
Display help message and exit.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-m\fR, \fB\-\-create\-home\fR
|
\fB\-m\fR, \fB\-\-create\-home\fR
|
||||||
The user's home directory will be created if it does not exist\&. The files contained in \fIskeleton_dir\fR will be copied to the home directory if the \fB\-k\fR option is used, otherwise the files contained in \fI/etc/skel\fR will be used instead\&. Any directories contained in \fI skeleton_dir\fR or \fI/etc/skel\fR will be created in the user's home directory as well\&. The \fB\-k\fR option is only valid in conjunction with the \fB\-m\fR option\&. The default is to not create the directory and to not copy any files\&.
|
The user's home directory will be created if it does not exist. The files contained in
|
||||||
|
\fIskeleton_dir\fR
|
||||||
|
will be copied to the home directory if the
|
||||||
|
\fB\-k\fR
|
||||||
|
option is used, otherwise the files contained in
|
||||||
|
\fI/etc/skel\fR
|
||||||
|
will be used instead. Any directories contained in
|
||||||
|
\fI skeleton_dir\fR
|
||||||
|
or
|
||||||
|
\fI/etc/skel\fR
|
||||||
|
will be created in the user's home directory as well. The
|
||||||
|
\fB\-k\fR
|
||||||
|
option is only valid in conjunction with the
|
||||||
|
\fB\-m\fR
|
||||||
|
option. The default is to not create the directory and to not copy any files.
|
||||||
.TP
|
.TP
|
||||||
\fB\-K\fR, \fB\-\-key\fR \fIKEY\fR=\fIVALUE\fR
|
\fB\-K\fR, \fB\-\-key\fR \fIKEY\fR=\fIVALUE\fR
|
||||||
Overrides /etc/login\&.defs defaults (UID_MIN, UID_MAX, UMASK, PASS_MAX_DAYS and others)\&. For example: \fB\-K\fR \fIPASS_MAX_DAYS\fR=\fI\-1\fR can be used when creating system account to turn off password ageing, even though system account has no password at all\&. Multiple \fB\-K\fR options can be specified, e\&.g\&.: \fB\-K\fR \fIUID_MIN\fR=\fI100\fR \fB\-K\fR \fIUID_MAX\fR=\fI499\fR
|
Overrides /etc/login.defs defaults (UID_MIN, UID_MAX, UMASK, PASS_MAX_DAYS and others). For example:
|
||||||
|
\fB\-K\fR \fIPASS_MAX_DAYS\fR=\fI\-1\fR
|
||||||
Note: \fB\-K\fR \fIUID_MIN\fR=\fI10\fR,\fIUID_MAX\fR=\fI499\fR doesn't work yet\&.
|
can be used when creating system account to turn off password ageing, even though system account has no password at all. Multiple
|
||||||
|
\fB\-K\fR
|
||||||
|
options can be specified, e.g.:
|
||||||
|
\fB\-K\fR \fIUID_MIN\fR=\fI100\fR \fB\-K\fR \fIUID_MAX\fR=\fI499\fR
|
||||||
|
|
||||||
|
Note:
|
||||||
|
\fB\-K\fR \fIUID_MIN\fR=\fI10\fR,\fIUID_MAX\fR=\fI499\fR
|
||||||
|
doesn't work yet.
|
||||||
.TP
|
.TP
|
||||||
\fB\-o\fR, \fB\-\-non\-unique\fR
|
\fB\-o\fR, \fB\-\-non\-unique\fR
|
||||||
Allow create user account with duplicate (non\-unique) UID\&.
|
Allow create user account with duplicate (non\-unique) UID.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-p\fR, \fB\-\-password\fR \fIPASSWORD\fR
|
\fB\-p\fR, \fB\-\-password\fR \fIPASSWORD\fR
|
||||||
The encrypted password, as returned by \fBcrypt\fR(3)\&. The default is to disable the account\&.
|
The encrypted password, as returned by
|
||||||
|
\fBcrypt\fR(3). The default is to disable the account.
|
||||||
.TP
|
.TP
|
||||||
\fB\-s\fR, \fB\-\-shell\fR \fISHELL\fR
|
\fB\-s\fR, \fB\-\-shell\fR \fISHELL\fR
|
||||||
The name of the user's login shell\&. The default is to leave this field blank, which causes the system to select the default login shell\&.
|
The name of the user's login shell. The default is to leave this field blank, which causes the system to select the default login shell.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-u\fR, \fB\-\-uid\fR \fIUID\fR
|
\fB\-u\fR, \fB\-\-uid\fR \fIUID\fR
|
||||||
The numerical value of the user's ID\&. This value must be unique, unless the \fB\-o\fR option is used\&. The value must be non\-negative\&. The default is to use the smallest ID value greater than 999 and greater than every other user\&. Values between 0 and 999 are typically reserved for system accounts\&.
|
The numerical value of the user's ID. This value must be unique, unless the
|
||||||
|
\fB\-o\fR
|
||||||
|
option is used. The value must be non\-negative. The default is to use the smallest ID value greater than 999 and greater than every other user. Values between 0 and 999 are typically reserved for system accounts.
|
||||||
.SS "Changing the default values"
|
.SS "Changing the default values"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
When invoked with the \fB\-D\fR option, \fBuseradd\fR will either display the current default values, or update the default values from the command line\&. The valid options are
|
When invoked with the
|
||||||
|
\fB\-D\fR
|
||||||
|
option,
|
||||||
|
\fBuseradd\fR
|
||||||
|
will either display the current default values, or update the default values from the command line. The valid options are
|
||||||
.TP
|
.TP
|
||||||
\fB\-b\fR \fIhome_dir\fR
|
\fB\-b\fR \fIhome_dir\fR
|
||||||
The initial path prefix for a new user's home directory\&. The user's name will be affixed to the end of \fIhome\fR to create the new directory name if the \fB\-d\fR option is not used when creating a new account\&.
|
The initial path prefix for a new user's home directory. The user's name will be affixed to the end of
|
||||||
|
\fIhome\fR
|
||||||
|
to create the new directory name if the
|
||||||
|
\fB\-d\fR
|
||||||
|
option is not used when creating a new account.
|
||||||
.TP
|
.TP
|
||||||
\fB\-e\fR \fIexpire_date\fR
|
\fB\-e\fR \fIexpire_date\fR
|
||||||
The date on which the user account is disabled\&.
|
The date on which the user account is disabled.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-f\fR \fIinactive\fR
|
\fB\-f\fR \fIinactive\fR
|
||||||
The number of days after a password has expired before the account will be disabled\&.
|
The number of days after a password has expired before the account will be disabled.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-g\fR, \fB\-\-gid\fR \fIGROUP\fR
|
\fB\-g\fR, \fB\-\-gid\fR \fIGROUP\fR
|
||||||
The group name or ID for a new user's initial group\&. The named group must exist, and a numerical group ID must have an existing entry \&.
|
The group name or ID for a new user's initial group. The named group must exist, and a numerical group ID must have an existing entry .
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-s\fR, \fB\-\-shell\fR \fISHELL\fR
|
\fB\-s\fR, \fB\-\-shell\fR \fISHELL\fR
|
||||||
The name of the new user's login shell\&. The named program will be used for all future new user accounts\&.
|
The name of the new user's login shell. The named program will be used for all future new user accounts.
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
If no options are specified, \fBuseradd\fR displays the current default values\&.
|
If no options are specified,
|
||||||
|
\fBuseradd\fR
|
||||||
|
displays the current default values.
|
||||||
.SH "NOTES"
|
.SH "NOTES"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The system administrator is responsible for placing the default user files in the \fI/etc/skel/\fR directory\&.
|
The system administrator is responsible for placing the default user files in the
|
||||||
|
\fI/etc/skel/\fR
|
||||||
|
directory.
|
||||||
.SH "CAVEATS"
|
.SH "CAVEATS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
You may not add a user to an NIS group\&. This must be performed on the NIS server\&.
|
You may not add a user to a NIS group. This must be performed on the NIS server.
|
||||||
|
|
||||||
.SH "FILES"
|
.SH "FILES"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fI/etc/passwd\fR
|
\fI/etc/passwd\fR
|
||||||
user account information
|
user account information
|
||||||
@ -166,10 +168,10 @@ default information
|
|||||||
\fI/etc/skel/\fR
|
\fI/etc/skel/\fR
|
||||||
directory containing default files
|
directory containing default files
|
||||||
.SH "EXIT VALUES"
|
.SH "EXIT VALUES"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The \fBuseadd\fR command exits with the following values:
|
The
|
||||||
|
\fBuseadd\fR
|
||||||
|
command exits with the following values:
|
||||||
.TP
|
.TP
|
||||||
\fI0\fR
|
\fI0\fR
|
||||||
success
|
success
|
||||||
@ -200,14 +202,17 @@ can't create home directory
|
|||||||
.TP
|
.TP
|
||||||
\fI13\fR
|
\fI13\fR
|
||||||
can't create mail spool
|
can't create mail spool
|
||||||
|
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBchfn\fR(1), \fBchsh\fR(1), \fBpasswd\fR(1), \fBcrypt\fR(3), \fBgroupadd\fR(8), \fBgroupdel\fR(8), \fBgroupmod\fR(8), \fBuserdel\fR(8), \fBusermod\fR(8)
|
\fBchfn\fR(1),
|
||||||
|
\fBchsh\fR(1),
|
||||||
|
\fBpasswd\fR(1),
|
||||||
|
\fBcrypt\fR(3),
|
||||||
|
\fBgroupadd\fR(8),
|
||||||
|
\fBgroupdel\fR(8),
|
||||||
|
\fBgroupmod\fR(8),
|
||||||
|
\fBuserdel\fR(8),
|
||||||
|
\fBusermod\fR(8)
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||||
<refentry id='useradd.8'>
|
<refentry id='useradd.8'>
|
||||||
<!-- $Id: useradd.8.xml,v 1.13 2005/07/10 17:17:38 kloczek Exp $ -->
|
<!-- $Id: useradd.8.xml,v 1.14 2005/08/10 07:43:51 kloczek Exp $ -->
|
||||||
<refmeta>
|
<refmeta>
|
||||||
<refentrytitle>useradd</refentrytitle>
|
<refentrytitle>useradd</refentrytitle>
|
||||||
<manvolnum>8</manvolnum>
|
<manvolnum>8</manvolnum>
|
||||||
@ -326,7 +326,7 @@
|
|||||||
|
|
||||||
<refsect1 id='caveats'>
|
<refsect1 id='caveats'>
|
||||||
<title>CAVEATS</title>
|
<title>CAVEATS</title>
|
||||||
<para>You may not add a user to an NIS group. This must be performed on
|
<para>You may not add a user to a NIS group. This must be performed on
|
||||||
the NIS server.
|
the NIS server.
|
||||||
</para>
|
</para>
|
||||||
</refsect1>
|
</refsect1>
|
||||||
|
@ -1,49 +1,32 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "USERDEL" "8" "08/03/2005" "" ""
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "USERDEL" 8 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
userdel \- Delete a user account and related files
|
userdel \- Delete a user account and related files
|
||||||
.SH "SYNOPSIS"
|
.SH "SYNOPSIS"
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 8
|
.HP 8
|
||||||
\fBuserdel\fR [\-r] \fIlogin\fR
|
\fBuserdel\fR [\-r] \fIlogin\fR
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
|
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The \fBuserdel\fR command modifies the system account files, deleting all entries that refer to \fIlogin\fR\&. The named user must exist\&.
|
The
|
||||||
|
\fBuserdel\fR
|
||||||
|
command modifies the system account files, deleting all entries that refer to
|
||||||
|
\fIlogin\fR. The named user must exist.
|
||||||
.SH "OPTIONS"
|
.SH "OPTIONS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The options which apply to the \fBuserdel\fR command are:
|
The options which apply to the
|
||||||
|
\fBuserdel\fR
|
||||||
|
command are:
|
||||||
.TP
|
.TP
|
||||||
\fB\-r\fR
|
\fB\-r\fR
|
||||||
Files in the user's home directory will be removed along with the home directory itself and the user's mail spool\&. Files located in other file systems will have to be searched for and deleted manually\&.
|
Files in the user's home directory will be removed along with the home directory itself and the user's mail spool. Files located in other file systems will have to be searched for and deleted manually.
|
||||||
|
|
||||||
.SH "FILES"
|
.SH "FILES"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fI/etc/group\fR
|
\fI/etc/group\fR
|
||||||
group account information
|
group account information
|
||||||
@ -54,10 +37,10 @@ user account information
|
|||||||
\fI/etc/shadow\fR
|
\fI/etc/shadow\fR
|
||||||
secure user account information
|
secure user account information
|
||||||
.SH "EXIT VALUES"
|
.SH "EXIT VALUES"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The \fBuserdel\fR command exits with the following values:
|
The
|
||||||
|
\fBuserdel\fR
|
||||||
|
command exits with the following values:
|
||||||
.TP
|
.TP
|
||||||
\fI0\fR
|
\fI0\fR
|
||||||
success
|
success
|
||||||
@ -79,19 +62,21 @@ can't update group file
|
|||||||
.TP
|
.TP
|
||||||
\fI12\fR
|
\fI12\fR
|
||||||
can't remove home directory
|
can't remove home directory
|
||||||
|
|
||||||
.SH "CAVEATS"
|
.SH "CAVEATS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBuserdel\fR will not allow you to remove an account if the user is currently logged in\&. You must kill any running processes which belong to an account that you are deleting\&. You may not remove any NIS attributes on an NIS client\&. This must be performed on the NIS server\&.
|
\fBuserdel\fR
|
||||||
|
will not allow you to remove an account if the user is currently logged in. You must kill any running processes which belong to an account that you are deleting. You may not remove any NIS attributes on a NIS client. This must be performed on the NIS server.
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBchfn\fR(1), \fBchsh\fR(1), \fBpasswd\fR(1), \fBgpasswd\fR(8), \fBgroupadd\fR(8), \fBgroupdel\fR(8), \fBgroupmod\fR(8), \fBuseradd\fR(8), \fBusermod\fR(8)
|
\fBchfn\fR(1),
|
||||||
|
\fBchsh\fR(1),
|
||||||
|
\fBpasswd\fR(1),
|
||||||
|
\fBgpasswd\fR(8),
|
||||||
|
\fBgroupadd\fR(8),
|
||||||
|
\fBgroupdel\fR(8),
|
||||||
|
\fBgroupmod\fR(8),
|
||||||
|
\fBuseradd\fR(8),
|
||||||
|
\fBusermod\fR(8)
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||||
<refentry id='userdel.8'>
|
<refentry id='userdel.8'>
|
||||||
<!-- $Id: userdel.8.xml,v 1.8 2005/06/30 19:26:08 kloczek Exp $ -->
|
<!-- $Id: userdel.8.xml,v 1.9 2005/08/10 07:45:10 kloczek Exp $ -->
|
||||||
<refmeta>
|
<refmeta>
|
||||||
<refentrytitle>USERDEL</refentrytitle>
|
<refentrytitle>USERDEL</refentrytitle>
|
||||||
<manvolnum>8</manvolnum>
|
<manvolnum>8</manvolnum>
|
||||||
@ -111,7 +111,7 @@
|
|||||||
<para><command>userdel</command> will not allow you to remove an account if
|
<para><command>userdel</command> will not allow you to remove an account if
|
||||||
the user is currently logged in. You must kill any running processes
|
the user is currently logged in. You must kill any running processes
|
||||||
which belong to an account that you are deleting. You may not remove
|
which belong to an account that you are deleting. You may not remove
|
||||||
any NIS attributes on an NIS client. This must be performed on the NIS
|
any NIS attributes on a NIS client. This must be performed on the NIS
|
||||||
server.
|
server.
|
||||||
</para>
|
</para>
|
||||||
</refsect1>
|
</refsect1>
|
||||||
|
136
man/usermod.8
136
man/usermod.8
@ -1,102 +1,93 @@
|
|||||||
.\"Generated by db2man.xsl. Don't modify this, modify the source.
|
.\" ** You probably do not want to edit this file directly **
|
||||||
.de Sh \" Subsection
|
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.0).
|
||||||
.br
|
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||||
.if t .Sp
|
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||||
.ne 5
|
.TH "USERMOD" "8" "08/09/2005" "" ""
|
||||||
.PP
|
.\" disable hyphenation
|
||||||
\fB\\$1\fR
|
.nh
|
||||||
.PP
|
.\" disable justification (adjust text to left margin only)
|
||||||
..
|
.ad l
|
||||||
.de Sp \" Vertical space (when we can't use .PP)
|
.SH "NAME"
|
||||||
.if t .sp .5v
|
|
||||||
.if n .sp
|
|
||||||
..
|
|
||||||
.de Ip \" List item
|
|
||||||
.br
|
|
||||||
.ie \\n(.$>=3 .ne \\$3
|
|
||||||
.el .ne 3
|
|
||||||
.IP "\\$1" \\$2
|
|
||||||
..
|
|
||||||
.TH "USERMOD" 8 "" "" ""
|
|
||||||
.SH NAME
|
|
||||||
usermod \- Modify a user account
|
usermod \- Modify a user account
|
||||||
.SH "SYNOPSIS"
|
.SH "SYNOPSIS"
|
||||||
.ad l
|
|
||||||
.hy 0
|
|
||||||
.HP 8
|
.HP 8
|
||||||
\fBusermod\fR [\-c\ \fIcomment\fR] [\-d\ \fIhome_dir\fR\ [\-m]] [\-e\ \fIexpire_date\fR] [\-f\ \fIinactive_days\fR] [\-g\ \fIinitial_group\fR] [\-G\ \fIgroup1\fR\ [\fI,group2,\fR...\ \fI,\fR\ [\fIgroupN\fR]\ [\-a]]] [\-l\ \fIlogin_name\fR] [\-p\ \fIpasswd\fR] [\-s\ \fIshell\fR] [\-u\ \fIuid\fR\ [\-o]] [\fB\-L\fR | \fB\-U\fR] \fIlogin\fR
|
\fBusermod\fR [\-c\ \fIcomment\fR] [\-d\ \fIhome_dir\fR\ [\-m\ ]] [\-e\ \fIexpire_date\fR] [\-f\ \fIinactive_days\fR] [\-g\ \fIinitial_group\fR] [\-G\ \fIgroup1\fR\ [\ \fI,group2,\fR...\ \fI,\fR\ [\fIgroupN\fR]\ [\-a]\ ]] [\-l\ \fIlogin_name\fR] [\-p\ \fIpasswd\fR] [\-s\ \fIshell\fR] [\-u\ \fIuid\fR\ [\-o\ ]] [\-L \-U] \fIlogin\fR
|
||||||
.ad
|
|
||||||
.hy
|
|
||||||
|
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The \fBusermod\fR command modifies the system account files to reflect the changes that are specified on the command line\&.
|
The
|
||||||
|
\fBusermod\fR
|
||||||
|
command modifies the system account files to reflect the changes that are specified on the command line.
|
||||||
.SH "OPTIONS"
|
.SH "OPTIONS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
The options which apply to the \fBusermod\fR command are:
|
The options which apply to the
|
||||||
|
\fBusermod\fR
|
||||||
|
command are:
|
||||||
.TP
|
.TP
|
||||||
\fB\-c\fR \fIcomment\fR
|
\fB\-c\fR \fIcomment\fR
|
||||||
The new value of the user's password file comment field\&. It is normally modified using the \fBchfn\fR(1)utility\&.
|
The new value of the user's password file comment field. It is normally modified using the
|
||||||
|
\fBchfn\fR(1)utility.
|
||||||
.TP
|
.TP
|
||||||
\fB\-d\fR \fIhome_dir\fR
|
\fB\-d\fR \fIhome_dir\fR
|
||||||
The user's new login directory\&. If the \fB\-m\fR option is given the contents of the current home directory will be moved to the new home directory, which is created if it does not already exist\&.
|
The user's new login directory. If the
|
||||||
|
\fB\-m\fR
|
||||||
|
option is given the contents of the current home directory will be moved to the new home directory, which is created if it does not already exist.
|
||||||
.TP
|
.TP
|
||||||
\fB\-e\fR \fIexpire_date\fR
|
\fB\-e\fR \fIexpire_date\fR
|
||||||
The date on which the user account will be disabled\&. The date is specified in the format \fIYYYY\-MM\-DD \fR\&.
|
The date on which the user account will be disabled. The date is specified in the format
|
||||||
|
\fIYYYY\-MM\-DD \fR.
|
||||||
.TP
|
.TP
|
||||||
\fB\-f\fR \fIinactive_days\fR
|
\fB\-f\fR \fIinactive_days\fR
|
||||||
The number of days after a password expires until the account is permanently disabled\&. A value of 0 disables the account as soon as the password has expired, and a value of \-1 disables the feature\&. The default value is \-1\&.
|
The number of days after a password expires until the account is permanently disabled. A value of 0 disables the account as soon as the password has expired, and a value of \-1 disables the feature. The default value is \-1.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-g\fR \fIinitial_group\fR
|
\fB\-g\fR \fIinitial_group\fR
|
||||||
The group name or number of the user's new initial login group\&. The group name must exist\&. A group number must refer to an already existing group\&. The default group number is 1\&.
|
The group name or number of the user's new initial login group. The group name must exist. A group number must refer to an already existing group. The default group number is 1.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-G\fR \fIgroup1\fR[\fI ,group2,\&.\&.\&., \fR [\fIgroupN\fR]]]
|
\fB\-G\fR \fIgroup1\fR[\fI ,group2,..., \fR [\fIgroupN\fR]]]
|
||||||
A list of supplementary groups which the user is also a member of\&. Each group is separated from the next by a comma, with no intervening whitespace\&. The groups are subject to the same restrictions as the group given with the \fB\-g\fR option\&. If the user is currently a member of a group which is not listed, the user will be removed from the group\&. This behaviour can be changed via \fB\-a\fR option, which appends user to the current supplementary group list\&.
|
A list of supplementary groups which the user is also a member of. Each group is separated from the next by a comma, with no intervening whitespace. The groups are subject to the same restrictions as the group given with the
|
||||||
|
\fB\-g\fR
|
||||||
|
option. If the user is currently a member of a group which is not listed, the user will be removed from the group. This behaviour can be changed via
|
||||||
|
\fB\-a\fR
|
||||||
|
option, which appends user to the current supplementary group list.
|
||||||
.TP
|
.TP
|
||||||
\fB\-l\fR \fIlogin_name\fR
|
\fB\-l\fR \fIlogin_name\fR
|
||||||
The name of the user will be changed from \fIlogin \fR to \fIlogin_name\fR\&. Nothing else is changed\&. In particular, the user's home directory name should probably be changed to reflect the new login name\&.
|
The name of the user will be changed from
|
||||||
|
\fIlogin \fR
|
||||||
|
to
|
||||||
|
\fIlogin_name\fR. Nothing else is changed. In particular, the user's home directory name should probably be changed to reflect the new login name.
|
||||||
.TP
|
.TP
|
||||||
\fB\-L\fR
|
\fB\-L\fR
|
||||||
Lock a user's password\&. This puts a '!' in front of the encrypted password, effectively disabling the password\&. You can't use this option with \fB\-p\fR or \fB\-U\fR\&.
|
Lock a user's password. This puts a '!' in front of the encrypted password, effectively disabling the password. You can't use this option with
|
||||||
|
\fB\-p\fR
|
||||||
|
or
|
||||||
|
\fB\-U\fR.
|
||||||
.TP
|
.TP
|
||||||
\fB\-o\fR
|
\fB\-o\fR
|
||||||
When used with the \fB\-u\fR option, this option allows to change the user ID to a non\-unique value\&.
|
When used with the
|
||||||
|
\fB\-u\fR
|
||||||
|
option, this option allows to change the user ID to a non\-unique value.
|
||||||
.TP
|
.TP
|
||||||
\fB\-p\fR \fIpasswd\fR
|
\fB\-p\fR \fIpasswd\fR
|
||||||
The encrypted password, as returned by \fBcrypt\fR(3)\&.
|
The encrypted password, as returned by
|
||||||
|
\fBcrypt\fR(3).
|
||||||
.TP
|
.TP
|
||||||
\fB\-s\fR \fIshell\fR
|
\fB\-s\fR \fIshell\fR
|
||||||
The name of the user's new login shell\&. Setting this field to blank causes the system to select the default login shell\&.
|
The name of the user's new login shell. Setting this field to blank causes the system to select the default login shell.
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fB\-u\fR \fIuid\fR
|
\fB\-u\fR \fIuid\fR
|
||||||
The numerical value of the user's ID\&. This value must be unique, unless the \fB\-o\fR option is used\&. The value must be non\-negative\&. Values between 0 and 99 are typically reserved for system accounts\&. Any files which the user owns and which are located in the directory tree rooted at the user's home directory will have the file user ID changed automatically\&. Files outside of the user's home directory must be altered manually\&.
|
The numerical value of the user's ID. This value must be unique, unless the
|
||||||
|
\fB\-o\fR
|
||||||
|
option is used. The value must be non\-negative. Values between 0 and 999 are typically reserved for system accounts. Any files which the user owns and which are located in the directory tree rooted at the user's home directory will have the file user ID changed automatically. Files outside of the user's home directory must be altered manually.
|
||||||
.TP
|
.TP
|
||||||
\fB\-U\fR
|
\fB\-U\fR
|
||||||
Unlock a user's password\&. This removes the '!' in front of the encrypted password\&. You can't use this option with \fB\-p\fR or \fB\-L\fR\&.
|
Unlock a user's password. This removes the '!' in front of the encrypted password. You can't use this option with
|
||||||
|
\fB\-p\fR
|
||||||
|
or
|
||||||
|
\fB\-L\fR.
|
||||||
.SH "CAVEATS"
|
.SH "CAVEATS"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBusermod\fR will not allow you to change the name of a user who is logged in\&. You must make certain that the named user is not executing any processes when this command is being executed if the user's numerical user ID is being changed\&. You must change the owner of any crontab files manually\&. You must change the owner of any at jobs manually\&. You must make any changes involving NIS on the NIS server\&.
|
\fBusermod\fR
|
||||||
|
will not allow you to change the name of a user who is logged in. You must make certain that the named user is not executing any processes when this command is being executed if the user's numerical user ID is being changed. You must change the owner of any crontab files manually. You must change the owner of any at jobs manually. You must make any changes involving NIS on the NIS server.
|
||||||
.SH "FILES"
|
.SH "FILES"
|
||||||
|
|
||||||
.TP
|
.TP
|
||||||
\fI/etc/passwd\fR
|
\fI/etc/passwd\fR
|
||||||
user account information
|
user account information
|
||||||
@ -107,12 +98,17 @@ secure user account information
|
|||||||
\fI/etc/group\fR
|
\fI/etc/group\fR
|
||||||
group account information
|
group account information
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
\fBchfn\fR(1), \fBchsh\fR(1), \fBpasswd\fR(1), \fBcrypt\fR(3), \fBgpasswd\fR(8), \fBgroupadd\fR(8), \fBgroupdel\fR(8), \fBgroupmod\fR(8), \fBuseradd\fR(8), \fBuserdel\fR(8)\&.
|
\fBchfn\fR(1),
|
||||||
|
\fBchsh\fR(1),
|
||||||
|
\fBpasswd\fR(1),
|
||||||
|
\fBcrypt\fR(3),
|
||||||
|
\fBgpasswd\fR(8),
|
||||||
|
\fBgroupadd\fR(8),
|
||||||
|
\fBgroupdel\fR(8),
|
||||||
|
\fBgroupmod\fR(8),
|
||||||
|
\fBuseradd\fR(8),
|
||||||
|
\fBuserdel\fR(8).
|
||||||
.SH "AUTHOR"
|
.SH "AUTHOR"
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
Julianne Frances Haugh (jockgrrl@ix\&.netcom\&.com)
|
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.3//EN"
|
||||||
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
"http://www.oasis-open.org/docbook/xml/4.3/docbookx.dtd">
|
||||||
<refentry id='usermod.8'>
|
<refentry id='usermod.8'>
|
||||||
<!-- $Id: usermod.8.xml,v 1.11 2005/07/07 14:25:48 kloczek Exp $ -->
|
<!-- $Id: usermod.8.xml,v 1.12 2005/08/09 17:49:32 kloczek Exp $ -->
|
||||||
<refmeta>
|
<refmeta>
|
||||||
<refentrytitle>usermod</refentrytitle>
|
<refentrytitle>usermod</refentrytitle>
|
||||||
<manvolnum>8</manvolnum>
|
<manvolnum>8</manvolnum>
|
||||||
@ -206,7 +206,7 @@
|
|||||||
<listitem>
|
<listitem>
|
||||||
<para>The numerical value of the user's ID. This value must be
|
<para>The numerical value of the user's ID. This value must be
|
||||||
unique, unless the <option>-o</option> option is used. The value
|
unique, unless the <option>-o</option> option is used. The value
|
||||||
must be non-negative. Values between 0 and 99 are typically
|
must be non-negative. Values between 0 and 999 are typically
|
||||||
reserved for system accounts. Any files which the user owns and
|
reserved for system accounts. Any files which the user owns and
|
||||||
which are located in the directory tree rooted at the user's
|
which are located in the directory tree rooted at the user's
|
||||||
home directory will have the file user ID changed automatically.
|
home directory will have the file user ID changed automatically.
|
||||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user