3
3
.\" Generator: DocBook XSL Stylesheets v1.73.2 <http://docbook.sf.net/>
5
5
.\" Manual: User Commands
6
6
.\" Source: User Commands
8
.TH "PASSWD" "1" "03/04/2008" "User Commands" "User Commands"
8
.TH "PASSWD" "1" "15/04/2009" "User Commands" "User Commands"
9
9
.\" disable hyphenation
11
11
.\" disable justification (adjust text to left margin only)
22
command changes passwords for user accounts\. A normal user may only change the password for his/her own account, while the superuser may change the password for any account\.
22
command changes passwords for user accounts\&. A normal user may only change the password for his/her own account, while the superuser may change the password for any account\&.
24
also changes account information, such as the full name of the user, the user\'s login shell, or his/her password expiry date and interval\.
24
also changes the account or associated password validity period\&.
25
25
.SS "Modifiche delle password"
27
The user is first prompted for his/her old password, if one is present\. This password is then encrypted and compared against the stored password\. The user has only one chance to enter the correct password\. The superuser is permitted to bypass this step so that forgotten passwords may be changed\.
27
The user is first prompted for his/her old password, if one is present\&. This password is then encrypted and compared against the stored password\&. The user has only one chance to enter the correct password\&. The superuser is permitted to bypass this step so that forgotten passwords may be changed\&.
29
After the password has been entered, password aging information is checked to see if the user is permitted to change the password at this time\. If not,
29
After the password has been entered, password aging information is checked to see if the user is permitted to change the password at this time\&. If not,
31
refuses to change the password and exits\.
33
The user is then prompted twice for a replacement password\. The second entry is compared against the first and both are required to match in order for the password to be changed\.
35
Then, the password is tested for complexity\. As a general guideline, passwords should consist of 6 to 8 characters including one or more characters from each of the following sets:
31
refuses to change the password and exits\&.
33
The user is then prompted twice for a replacement password\&. The second entry is compared against the first and both are required to match in order for the password to be changed\&.
35
Then, the password is tested for complexity\&. As a general guideline, passwords should consist of 6 to 8 characters including one or more characters from each of the following sets:
38
38
\h'-04'\(bu\h'+03'lettere minuscole
46
46
\h'-04'\(bu\h'+03'segni di punteggiatura
49
Care must be taken not to include the system default erase or kill characters\.
49
Care must be taken not to include the system default erase or kill characters\&.
51
will reject any password which is not suitably complex\.
51
will reject any password which is not suitably complex\&.
52
52
.SS "Suggerimenti per password utente"
54
The security of a password depends upon the strength of the encryption algorithm and the size of the key space\. The
54
The security of a password depends upon the strength of the encryption algorithm and the size of the key space\&. The
56
System encryption method is based on the NBS DES algorithm and is very secure\. The size of the key space depends upon the randomness of the password which is selected\.
58
Compromises in password security normally result from careless password selection or handling\. For this reason, you should not select a password which appears in a dictionary or which must be written down\. The password should also not be a proper name, your license number, birth date, or street address\. Any of these may be used as guesses to violate system security\.
60
Your password must be easily remembered so that you will not be forced to write it on a piece of paper\. This can be accomplished by appending two small words together and separating each with a special character or digit\. For example, Pass%word\.
62
Other methods of construction involve selecting an easily remembered phrase from literature and selecting the first or last letter from each word\. An example of this is:
65
\h'-04'\(bu\h'+03'Non chiedere per chi suona la campana
69
\h'-04'\(bu\h'+03'che produce
73
\h'-04'\(bu\h'+03'NcXcslc
76
You may be reasonably sure few crackers will have included this in their dictionaries\. You should, however, select your own methods for constructing passwords and not rely exclusively on the methods given here\.
56
System encryption method is based on the NBS DES algorithm and is very secure\&. The size of the key space depends upon the randomness of the password which is selected\&.
58
Compromises in password security normally result from careless password selection or handling\&. For this reason, you should not select a password which appears in a dictionary or which must be written down\&. The password should also not be a proper name, your license number, birth date, or street address\&. Any of these may be used as guesses to violate system security\&.
60
You can find advices on how to choose a strong password on http://en\&.wikipedia\&.org/wiki/Password_strength
85
69
This option can be used only with
87
and causes show status for all users\.
71
and causes show status for all users\&.
90
74
\fB\-d\fR, \fB\-\-delete\fR
92
Delete a user\'s password (make it empty)\. This is a quick way to disable a password for an account\. It will set the named account passwordless\.
76
Delete a user\'s password (make it empty)\&. This is a quick way to disable a password for an account\&. It will set the named account passwordless\&.
95
79
\fB\-e\fR, \fB\-\-expire\fR
97
Immediately expire an account\'s password\. This in effect can force a user to change his/her password at the user\'s next login\.
81
Immediately expire an account\'s password\&. This in effect can force a user to change his/her password at the user\'s next login\&.
100
84
\fB\-h\fR, \fB\-\-help\fR
102
Mostra un messaggio di aiuto ed esce\.
86
Mostra un messaggio di aiuto ed esce\&.
105
89
\fB\-i\fR, \fB\-\-inactive\fR \fIINACTIVE\fR
107
This option is used to disable an account after the password has been expired for a number of days\. After a user account has had an expired password for
91
This option is used to disable an account after the password has been expired for a number of days\&. After a user account has had an expired password for
109
days, the user may no longer sign on to the account\.
93
days, the user may no longer sign on to the account\&.
112
96
\fB\-k\fR, \fB\-\-keep\-tokens\fR
114
Indicate password change should be performed only for expired authentication tokens (passwords)\. The user wishes to keep their non\-expired tokens as before\.
98
Indicate password change should be performed only for expired authentication tokens (passwords)\&. The user wishes to keep their non\-expired tokens as before\&.
117
101
\fB\-l\fR, \fB\-\-lock\fR
119
Lock the named account\. This option disables an account by changing the password to a value which matches no possible encrypted value, and by setting the account expiry field to 1\.
103
Lock the password of the named account\&. This option disables a password by changing it to a value which matches no possible encrypted value (it adds a \(aa!\(aa at the beginning of the password)\&.
105
Note that this does not disable the account\&. The user may still be able to login using another authentication token (e\&.g\&. an SSH key)\&. To disable the account, administrators should use
106
\fBusermod \-\-expiredate 1\fR
107
(this set the account\'s expire date to Jan 2, 1970)\&.
109
Users with a locked password are not allowed to change their password\&.
122
112
\fB\-m\fR, \fB\-\-mindays\fR \fIMIN_DAYS\fR
124
114
Set the minimum number of days between password changes to
125
\fIMIN_DAYS\fR\. A value of zero for this field indicates that the user may change his/her password at any time\.
115
\fIMIN_DAYS\fR\&. A value of zero for this field indicates that the user may change his/her password at any time\&.
128
118
\fB\-q\fR, \fB\-\-quiet\fR
133
123
\fB\-r\fR, \fB\-\-repository\fR \fIREPOSITORY\fR
140
130
\fB\-S\fR, \fB\-\-status\fR
142
Display account status information\. The status information consists of 7 fields\. The first field is the user\'s login name\. The second field indicates if the user account is locked (L), has no password (NP), or has a usable password (P)\. The third field gives the date of the last password change\. The next four fields are the minimum age, maximum age, warning period, and inactivity period for the password\. These ages are expressed in days\.
132
Display account status information\&. The status information consists of 7 fields\&. The first field is the user\'s login name\&. The second field indicates if the user account has a locked password (L), has no password (NP), or has a usable password (P)\&. The third field gives the date of the last password change\&. The next four fields are the minimum age, maximum age, warning period, and inactivity period for the password\&. These ages are expressed in days\&.
145
135
\fB\-u\fR, \fB\-\-unlock\fR
147
Unlock the named account\. This option re\-enables an account by changing the password back to its previous value (to value before using
137
Unlock the password of the named account\&. This option re\-enables a password by changing the password back to its previous value (to the value before using the
149
option), and by resetting the account expiry field\.
139
option), and by resetting the account expiry field\&.
152
142
\fB\-w\fR, \fB\-\-warndays\fR \fIWARN_DAYS\fR
154
Set the number of days of warning before a password change is required\. The
144
Set the number of days of warning before a password change is required\&. The
156
option is the number of days prior to the password expiring that a user will be warned that his/her password is about to expire\.
146
option is the number of days prior to the password expiring that a user will be warned that his/her password is about to expire\&.
159
149
\fB\-x\fR, \fB\-\-maxdays\fR \fIMAX_DAYS\fR
161
Set the maximum number of days a password remains valid\. After
162
\fIMAX_DAYS\fR, the password is required to be changed\.
151
Set the maximum number of days a password remains valid\&. After
152
\fIMAX_DAYS\fR, the password is required to be changed\&.
164
154
.SH "AVVISI/CAVEAT"
166
Non tutte le opzioni potrebbero essere supportate\. Il controllo della complessità delle password varia da sistema a sistema\. L\e\'utente deve poter selezionare la possibilità di selezionare una password che ritenga sufficientemente complessa\. Gli utenti potrebbero non essere in condizione di modificare la propria password se NIS è abilitato e loro non hanno fatto il login sul server NIS\.
156
Non tutte le opzioni potrebbero essere supportate\&. Il controllo della complessità delle password varia da sistema a sistema\&. L\e\'utente deve poter selezionare la possibilità di selezionare una password che ritenga sufficientemente complessa\&. Gli utenti potrebbero non essere in condizione di modificare la propria password se NIS è abilitato e loro non hanno fatto il login sul server NIS\&.
167
157
.SH "CONFIGURATION"
169
159
The following configuration variables in
170
\fI/etc/login\.defs\fR
160
\fI/etc/login\&.defs\fR
171
161
change the behavior of this tool:
173
163
\fBENCRYPT_METHOD\fR (string)
175
This defines the system default encryption algorithm for encrypting passwords (if no algorithm are specified on the command line)\.
165
This defines the system default encryption algorithm for encrypting passwords (if no algorithm are specified on the command line)\&.
177
167
It can take one of these values:
197
187
Note: this parameter overrides the
198
188
\fBMD5_CRYPT_ENAB\fR
201
Note: if you use PAM, it is recommended to set this variable consistently with the PAM modules configuration\.
191
Note: if you use PAM, it is recommended to set this variable consistently with the PAM modules configuration\&.
204
194
\fBMD5_CRYPT_ENAB\fR (boolean)
206
Indicate if passwords must be encrypted using the MD5\-based algorithm\. If set to
207
\fIyes\fR, new passwords will be encrypted using the MD5\-based algorithm compatible with the one used by recent releases of FreeBSD\. It supports passwords of unlimited length and longer salt strings\. Set to
196
Indicate if passwords must be encrypted using the MD5\-based algorithm\&. If set to
197
\fIyes\fR, new passwords will be encrypted using the MD5\-based algorithm compatible with the one used by recent releases of FreeBSD\&. It supports passwords of unlimited length and longer salt strings\&. Set to
209
if you need to copy encrypted passwords to other systems which don\'t understand the new algorithm\. Default is
199
if you need to copy encrypted passwords to other systems which don\'t understand the new algorithm\&. Default is
212
202
This variable is superceded by the
213
203
\fBENCRYPT_METHOD\fR
214
variable or by any command line option used to configure the encryption algorithm\.
216
This variable is deprecated\. You should use
217
\fBENCRYPT_METHOD\fR\.
219
Note: if you use PAM, it is recommended to set this variable consistently with the PAM modules configuration\.
204
variable or by any command line option used to configure the encryption algorithm\&.
206
This variable is deprecated\&. You should use
207
\fBENCRYPT_METHOD\fR\&.
209
Note: if you use PAM, it is recommended to set this variable consistently with the PAM modules configuration\&.
222
212
\fBOBSCURE_CHECKS_ENAB\fR (boolean)
224
Enable additional checks upon password changes\.
214
Enable additional checks upon password changes\&.
227
217
\fBPASS_ALWAYS_WARN\fR (boolean)
229
Warn about weak passwords (but still allow them) if you are root\.
219
Warn about weak passwords (but still allow them) if you are root\&.
232
222
\fBPASS_CHANGE_TRIES\fR (number)
234
Maximum number of attempts to change password if rejected (too easy)\.
224
Maximum number of attempts to change password if rejected (too easy)\&.
237
227
\fBPASS_MAX_LEN\fR (number), \fBPASS_MIN_LEN\fR (number)
239
Number of significant characters in the password for crypt()\.
229
Number of significant characters in the password for crypt()\&.
240
230
\fBPASS_MAX_LEN\fR
241
is 8 by default\. Don\'t change unless your crypt() is better\. This is ignored if
231
is 8 by default\&. Don\'t change unless your crypt() is better\&. This is ignored if
242
232
\fBMD5_CRYPT_ENAB\fR
247
237
\fBSHA_CRYPT_MIN_ROUNDS\fR (number), \fBSHA_CRYPT_MAX_ROUNDS\fR (number)
254
\fISHA512\fR, this defines the number of SHA rounds used by the encryption algorithm by default (when the number of rounds is not specified on the command line)\.
256
With a lot of rounds, it is more difficult to brute forcing the password\. But note also that more CPU resources will be needed to authenticate users\.
258
If not specified, the libc will choose the default number of rounds (5000)\.
260
The values must be inside the 1000\-999999999 range\.
244
\fISHA512\fR, this defines the number of SHA rounds used by the encryption algorithm by default (when the number of rounds is not specified on the command line)\&.
246
With a lot of rounds, it is more difficult to brute forcing the password\&. But note also that more CPU resources will be needed to authenticate users\&.
248
If not specified, the libc will choose the default number of rounds (5000)\&.
250
The values must be inside the 1000\-999999999 range\&.
262
252
If only one of the
263
253
\fBSHA_CRYPT_MIN_ROUNDS\fR
265
255
\fBSHA_CRYPT_MAX_ROUNDS\fR
266
values is set, then this value will be used\.
256
values is set, then this value will be used\&.
269
259
\fBSHA_CRYPT_MIN_ROUNDS\fR
271
\fBSHA_CRYPT_MAX_ROUNDS\fR, the highest value will be used\.
261
\fBSHA_CRYPT_MAX_ROUNDS\fR, the highest value will be used\&.
275
265
\fI/etc/passwd\fR
277
informazioni sugli account utente\.
267
informazioni sugli account utente\&.
280
270
\fI/etc/shadow\fR
282
Informazioni sicure sugli account di utenti\.
272
Informazioni sicure sugli account di utenti\&.
284
274
.SH "VALORI RESTITUITI"