diff --git a/ChangeLog b/ChangeLog index 8c5d018b..210fe5ae 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,3 +1,9 @@ +2007-11-22 Nicolas François + + * man/chpasswd.8.xml: Document the variables used by chpasswd. + The definitions are copied from login.defs. I should try to use a + less error prone process for this. + 2007-11-22 Nicolas François * man/login.defs.5.xml: Use for the values set by diff --git a/man/chpasswd.8.xml b/man/chpasswd.8.xml index 8a3e8afd..59473135 100644 --- a/man/chpasswd.8.xml +++ b/man/chpasswd.8.xml @@ -128,6 +128,122 @@ + + CONFIGURATION + + The following configuration variables in + /etc/login.defs change the behavior of this + tool: + + + + + (boolean) + + + Indicate if passwords must be encrypted using the MD5-based + algorithm. If set to yes, new + passwords will be encrypted + using the MD5-based algorithm compatible with the one used by + recent releases of FreeBSD. It supports passwords of + unlimited length and longer salt strings. Set to + no if you + need to copy encrypted passwords to other systems which don't + understand the new algorithm. Default is + no. + + + This variable is superceded by the + variable or by any command + line option. + + + This variable is deprecated. You should use + . + + + Note: if you use PAM, it is recommended to set this variable + consistently with the PAM modules configuration. + + + + + (string) + + + This defines the system default encryption algorithm for + encrypting passwords (if no algorithm are specified on the + command line). + + + It can take one of these values: + + + DES (default) + + + MD5 + + + SHA256 + + + SHA512 + + + + + Note: this parameter overrides the + variable. + + + Note: if you use PAM, it is recommended to set this variable + consistently with the PAM modules configuration. + + + + + (number) + (number) + + + When is set to + SHA256 or + SHA512, this defines the number of + SHA rounds used by the encryption algorithm by default (when + the number of rounds is not specified on the command line). + + + With a lot of rounds, it is more difficult to brute forcing + the password. But note also that more CPU resources will be + needed to authenticate users. + + + If not specified, the libc will choose the default number of + rounds (5000). + + + The values must be inside the 1000-999999999 range. + + + If only one of the or + values is set, then this + value will be used. + + + If > + , the highest value will + be used. + + + + + + FILES