]>
Commit | Line | Data |
---|---|---|
1815bff5 A |
1 | .\" Copyright (c) 1990, 1993 |
2 | .\" The Regents of the University of California. All rights reserved. | |
3 | .\" | |
4 | .\" Redistribution and use in source and binary forms, with or without | |
5 | .\" modification, are permitted provided that the following conditions | |
6 | .\" are met: | |
7 | .\" 1. Redistributions of source code must retain the above copyright | |
8 | .\" notice, this list of conditions and the following disclaimer. | |
9 | .\" 2. Redistributions in binary form must reproduce the above copyright | |
10 | .\" notice, this list of conditions and the following disclaimer in the | |
11 | .\" documentation and/or other materials provided with the distribution. | |
12 | .\" 3. All advertising materials mentioning features or use of this software | |
13 | .\" must display the following acknowledgement: | |
14 | .\" This product includes software developed by the University of | |
15 | .\" California, Berkeley and its contributors. | |
16 | .\" 4. Neither the name of the University nor the names of its contributors | |
17 | .\" may be used to endorse or promote products derived from this software | |
18 | .\" without specific prior written permission. | |
19 | .\" | |
20 | .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND | |
21 | .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
22 | .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
23 | .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE | |
24 | .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
25 | .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
26 | .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
27 | .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
28 | .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
29 | .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
30 | .\" SUCH DAMAGE. | |
31 | .\" | |
32 | .\" @(#)passwd.1 8.1 (Berkeley) 6/6/93 | |
33 | .\" | |
34 | .Dd June 6, 1993 | |
35 | .Dt PASSWD 1 | |
36 | .Os BSD 4 | |
37 | .Sh NAME | |
38 | .Nm passwd | |
39 | .Nd modify a user's password | |
40 | .Sh SYNOPSIS | |
41 | .Nm passwd | |
42 | .Op Fl l | |
43 | .Op Ar user | |
44 | .Sh DESCRIPTION | |
45 | .Nm Passwd | |
46 | changes the user's Kerberos password. First, the user is prompted for their | |
47 | current password. | |
48 | If the current password is correctly typed, a new password is | |
49 | requested. | |
50 | The new password must be entered twice to avoid typing errors. | |
51 | .Pp | |
52 | The new password should be at least six characters long and not | |
53 | purely alphabetic. | |
54 | Its total length must be less than | |
55 | .Dv _PASSWORD_LEN | |
56 | (currently 128 characters). | |
57 | Numbers, upper case letters and meta characters | |
58 | are encouraged. | |
59 | .Pp | |
60 | Once the password has been verified, | |
61 | .Nm passwd | |
62 | communicates the new password information to | |
63 | the Kerberos authenticating host. | |
64 | .Bl -tag -width flag | |
65 | .It Fl l | |
66 | This option causes the password to be updated only in the local | |
67 | password file, and not with the Kerberos database. | |
68 | When changing only the local password, | |
69 | .Xr pwd_mkdb 8 | |
70 | is used to update the password databases. | |
71 | .El | |
72 | .Pp | |
73 | To change another user's Kerberos password, one must first | |
74 | run | |
75 | .Xr kinit 1 | |
76 | followed by | |
77 | .Xr passwd 1 . | |
78 | The super-user is not required to provide a user's current password | |
79 | if only the local password is modified. | |
80 | .Sh FILES | |
81 | .Bl -tag -width /etc/master.passwd -compact | |
82 | .It Pa /etc/master.passwd | |
83 | The user database | |
84 | .It Pa /etc/passwd | |
85 | A Version 7 format password file | |
86 | .It Pa /etc/passwd.XXXXXX | |
87 | Temporary copy of the password file | |
88 | .El | |
89 | .Sh SEE ALSO | |
90 | .Xr chpass 1 , | |
91 | .Xr kerberos 1 , | |
92 | .Xr kinit 1 , | |
93 | .Xr login 1 , | |
94 | .Xr passwd 5 , | |
95 | .Xr kpasswdd 8 , | |
96 | .Xr pwd_mkdb 8 , | |
97 | .Xr vipw 8 | |
98 | .Rs | |
99 | .%A Robert Morris | |
100 | .%A Ken Thompson | |
101 | .%T "UNIX password security" | |
102 | .Re | |
103 | .Sh HISTORY | |
104 | A | |
105 | .Nm passwd | |
106 | command appeared in | |
107 | .At v6 . |