📄 login.defs.5
字号:
.\"$Id: login.defs.5,v 1.6 2005/06/03 10:20:10 kukuk Exp $.\" Copyright 2004 Thorsten Kukuk.\" Copyright 1991 - 1993, Julianne Frances Haugh and Chip Rosenthal.\" All rights reserved..\".\" Redistribution and use in source and binary forms, with or without.\" modification, are permitted provided that the following conditions.\" are met:.\" 1. Redistributions of source code must retain the above copyright.\" notice, this list of conditions and the following disclaimer..\" 2. Redistributions in binary form must reproduce the above copyright.\" notice, this list of conditions and the following disclaimer in the.\" documentation and/or other materials provided with the distribution..\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors.\" may be used to endorse or promote products derived from this software.\" without specific prior written permission..\".\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION).\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF.\" SUCH DAMAGE..TH LOGIN 5.SH NAME/etc/login.defs \- Login configuration.SH DESCRIPTIONThe.I /etc/login.defsfile defines the site-specific configuration for the shadow loginsuite. This file is required. Absence of this file will not preventsystem operation, but will probably result in undesirable operation..PPThis file is a readable text file, each line of the file describingone configuration parameter. The lines consist of a configurationname and value, seperated by whitespace. Blank lines and commentlines are ignored. Comments are introduced with a `#' pound sign andthe pound sign must be the first non-white character of the line..PPParameter values may be of four types: strings, booleans, numbers,and long numbers. A string is comprised of any printable characters.A boolean should be either the value ``yes'' or ``no''. An undefinedboolean parameter or one with a value other than these will be givena ``no'' value. Numbers (both regular and long) may be either decimalvalues, octal values (precede the value with ``0'') or hexadecimalvalues (precede the value with ``0x''). The maximum value of theregular and long numeric parameters is machine-dependant..PPThe following configuration items are provided:.\".IP "CHARACTER_CLASS (string)"User accounts and Group names have to match the regex expressionof this variable..\".IP "CHFN_AUTH (boolean)"If.IR yes ,the.B chfnand.B chshprograms will ask for password before making any changes, unlessrun by the superuser..\".IP "CHFN_RESTRICT (string)"This parameter specifies which values in the.I gecosfield of the.I passwdfile may be changed by regular users using the.B chfnprogram. It can be any combination of letters.IR f ,.IR r ,.IR w ,.IR h ,for Full name, Room number, Work phone, and Home phone, respectively.If not specified, only the superuser can make any changes..\".IP "DEFAULT_HOME (boolean)"If the home directory of a user is not reachable, should theuse be allowed to login ?.\".IP "ENV_PATH (string)"This parameter must be defined as the search path for regular users.When a login with UID other than zero occurs, the PATH environmentparameter is initialized to this value..\".IP "ENV_ROOTPATH (string)"This parameter must be defined as the search path for root..\".IP "FAIL_DELAY (number)"Delay time in seconds after each failed login attempt..\".IP "FTMP_FILE (string)"If defined and the file exist, login failures will be logged herein a utmp format..BR last ,when invoked as.BR lastb ,will read /var/log/btmp, so you should use this file if any..\".IP "GID_MAX (number)".IP "GID_MIN (number)"Range of group IDs to choose from for the.B groupaddprogram..\".IP "HUSHLOGIN_FILE (string)"This parameter is used to establish ``hushlogin'' conditions. Thereare two possible ways to establish these conditions. First, if thevalue of this parameter is a filename and that file exists in theuser's home directory then ``hushlogin'' conditions will be in effect.The contents of this file are ignored; its mere presence triggers``hushlogin'' conditions. Second, if the value of this parameter isa full pathname and either the user's login name or the user's shellis found in this file, then ``hushlogin'' conditions will be in effect.In this case, the file should be in a format similar to:.nf.sp.ft I demo /usr/lib/uucp/uucico \0\0. \0\0. \0\0..ft R.sp.fiIf this parameter is not defined, then ``hushlogin'' conditions willnever occur. When ``hushlogin'' conditions are established, themessage of the day, last successful and unsuccessful login display,mail status display, and password aging checks are suppressed. Notethat allowing hushlogin files in user home directories allows the userto disable password aging checks. See MOTD_FILE andLASTLOG_ENAB for related information. Futures enabled through PAMmodules are not affected by this. pam_mail will show if there isnew mail or not..\".IP "LASTLOG_ENAB (boolean)"If.IR yes ,and if the.I /var/log/lastlogfile exists, then a successful user login will be recorded to thisfile. Furthermore, if this option is enabled then the times of themost recent successful and unsuccessful logins will be displayed tothe user upon login. If ``hushlogin'' conditions are ineffect, then both the successful and unsuccessful login informationwill be suppressed..\".IP "LOG_UNKFAIL_ENAB (boolean)"If.I yesthen unknown usernames will be included when a login failure isrecorded. Note that this is a potential security risk; a common loginfailure mode is transposition of the user name and password, thus thismode will often cause passwords to accumulate in the failure logs.If this option is disabled then unknown usernames will be suppressedin login failure messages..\".IP "LOGIN_RETRIES (number)"Number of login attempts allowed before the.B loginprogram exits..\".IP "LOGIN_TIMEOUT (number)"Time in seconds after the.B loginprogram exits if the user doesn't type his password..\".IP "MOTD_FILE (string)"This parameter specifies a colon-delimited list of pathnames to ``messageof the day'' files.If a specified file exists, then its contents are displayed to the userupon login.If this parameter is not defined or ``hushlogin'' login conditions arein effect, this information will be suppressed..\".IP "PASS_MIN_DAYS (number)"The minimum number of days allowed between password changes. Any passwordchanges attempted sooner than this will be rejected. If not specified, azero value will be assumed..\".IP "PASS_MAX_DAYS (number)"The maximum number of days a password may be used. If the password isolder than this, then the account will be locked. If not specified,a large value will be assumed..\".IP "PASS_WARN_AGE (number)"The number of days warning given before a password expires. A zero meanswarning is given only upon the day of expiration, a negative value meansno warning is given. If not specified, no warning will be provided..\".IP "SYSTEM_GID_MAX (number)"Max group ID value used by automatic gid selection in groupadd for system groups.IP "SYSTEM_GID_MIN (number)"Min group ID value used by automatic gid selection in groupadd for system groups.\".IP "SYSTEM_UID_MAX (number)"Max user ID value used by automatic uid selection in useradd for system accounts.IP "SYSTEM_UID_MIN (number)"Min user ID value used by automatic uid selection in useradd for system accounts.\".IP "TTYGROUP (string or number)"The group ownership of the terminal is initialized to this groupname or number. One well-known security attack involves forcing terminalcontrol sequences upon another user's terminal line. This problemcan be averted by disabling permissions which allow other users toaccess the terminal line, but this unfortunately prevents programssuch as.B writefrom operating. Another solution is to use a version of the.B writeprogram which filters out potentially dangerous character sequences,make this program ``setgid'' to a special group, assign group ownershipof the terminal line to this special group, and assign permissions of\fI0620\fR to the terminal line. The TTYGROUP definition has beenprovided for just this situation. If this item is not defined, thenthe group ownership of the terminal is initialized to the user's groupnumber. See TTYPERMS for related information..\".IP "TTYPERM (number)"The login terminal permissions are initialized to this value. Typicalvalues will be \fI0622\fR to permit others write access to the lineor \fI0600\fR to secure the line from other users. If not specified,the terminal permissions will be initialized to \fI0622\fR. SeeTTYGROUP for related information..\".IP "TTYTYPE_FILE (string)"This parameter specifies the full pathname to a file which maps terminallines to terminal types. Each line of the file contains a terminaltype and a terminal line, seperated by whitespace, for example:.nf.sp.ft I vt100\0 tty01 wyse60 tty02 \0\0.\0\0\0 \0\0. \0\0.\0\0\0 \0\0. \0\0.\0\0\0 \0\0..ft R.sp.fiThis information is only used to initialize the TERM environment parameterwhen it does not already exist.A line starting with a ``#'' pound sign will be treated as a comment.If this paramter is not specified, the file does not exist, or the terminalline is not found in the file, then the TERM environment parameter will notbe set..\".IP "UID_MAX (number)"Max user ID value for automatic uid selection in useradd.IP "UID_MIN (number)"Min user ID value for automatic uid selection in useradd.\".IP "UMASK (number)"The permission mask is initialized to this value. It is used byuseradd and newusers for creating new home directories. If not specified,the permission mask will be initialized to \fI0077\fR..\".IP "USERADD_CMD (string)"If defined, this command is run after adding a user with \fBuseradd\fR.It can, for example, rebuild the NIS maps in this script..\".IP "USERDEL_PRECMD (string)"If defined, this command is run before removing a user with \fBuserdel\fR.It should remove any at/cron/print jobs etc. owned by the user to beremoved (passed as the first argument)..\".IP "USERDEL_POSTCMD (string)"If defined, this command is run after removing a user with \fBuserdel\fR.It can, for example, rebuild any NIS database etc. to remove the account from it..\".SH CROSS REFERENCEThe following cross reference shows which programs in the shadow loginsuite use which parameters..na.IP login 12DEFAULT_HOME ENV_PATH ENV_ROOTPATH FAIL_DELAY FTMP_FILEHUSHLOGIN_FILE LASTLOG_ENAB LOG_UNKFAIL_ENAB LOGIN_RETRIES LOGIN_TIMEOUTMOTD_FILE TTYPERM TTYTYPE_FILE.IP newusers 12PASS_MAX_DAYS PASS_MIN_DAYS PASS_WARN_AGE UMASK.IP passwd 12OBSCURE_CHECKS_ENAB PASS_MAX_LEN PASS_MIN_LEN PASS_ALWAYS_WARNCRACKLIB_DICTPATH PASS_CHANGE_TRIES.IP pwconv 12PASS_MAX_DAYS PASS_MIN_DAYS PASS_WARN_AGE.ad.SH BUGSSome of the supported configuration parameters are not documented in thismanual page..SH SEE ALSO.BR login (1),.BR passwd (5).SH AUTHORSJulianne Frances Haugh (jockgrrl@ix.netcom.com).brThorsten Kukuk (kukuk@thkukuk.de)
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -