[svn-upgrade] Integrating new upstream version, shadow (4.0.3)

This commit is contained in:
nekral-guest 2007-10-07 11:45:14 +00:00
parent 37dc61340b
commit 4903ce068e
189 changed files with 10332 additions and 1435 deletions

117
ChangeLog
View File

@ -1,3 +1,108 @@
2002-03-13 Tomasz K³oczko <kloczek@pld.org.pl>
* TODO: updated.
* man/it/Makefile.am, man/id/Makefile.am, man/id/adduser.8, man/id/useradd.8, man/Makefile.am, man/cs/Makefile.am, man/fr/Makefile.am, configure.in, NEWS:
added cs, de, fr, id, it, ko man pages to ac/am.
2002-03-12 Tomasz K³oczko <kloczek@pld.org.pl>
* po/fr.po, po/ja.po, po/ko.po, po/pl.po, po/sv.po, po/uk.po, po/cs.po, po/de.po, po/el.po:
"make update-po"
* po/de.po, NEWS, configure.in:
added de translation (by Frank Schmid <frank@cs-schmid.de>).
* NEWS: added info about Solar patch for man pages.
2002-03-10 Tomasz K³oczko <kloczek@pld.org.pl>
* man/it/usermod.8, man/it/vigr.8, man/it/vipw.8, man/it/adduser.8, man/it/chfn.1, man/it/chsh.1, man/it/gpasswd.1, man/it/groupadd.8, man/it/groupdel.8, man/it/groupmod.8, man/it/groups.1, man/it/grpck.8, man/it/grpconv.8, man/it/grpunconv.8, man/it/id.1, man/it/lastlog.8, man/it/login.1, man/it/newgrp.1, man/it/passwd.1, man/it/passwd.5, man/it/pwconv.8, man/it/pwunconv.8, man/it/shadow.5, man/it/useradd.8, man/it/userdel.8, man/id/adduser.8, man/id/chsh.1, man/id/login.1, man/fr/adduser.8, man/fr/chage.1, man/fr/chpasswd.8, man/fr/chsh.1, man/fr/faillog.5, man/fr/gpasswd.1, man/fr/groups.1, man/fr/id.1, man/fr/newgrp.1, man/fr/passwd.1, man/fr/passwd.5, man/fr/shadow.5, man/fr/su.1, man/fr/useradd.8, man/fr/userdel.8, man/fr/usermod.8, man/es/login.1, man/es/passwd.1, man/es/su.1, man/de/chsh.1, man/de/groups.1, man/de/login.1, man/de/passwd.1, man/de/su.1, man/cs/passwd.5, man/cs/shadow.5:
added some raw cs, de, es, fr, id, it man pages from national
man pages translation projects (all man pages not yet added to Makefile.am
files because all need some work).
* man/hu/chfn.1, man/hu/id.1:
added id(1) chfn(1) from hu man pages translation project (it need some work
because this documents describes GNU version id and chfn from util-linux).
* man/hu/Makefile.am, man/hu/login.1:
added login(1) man page from hu man pages translation project.
* po/POTFILES.in: updated (suath.c moved to src/).
* src/Makefile.am: added su_SOURCES with "su.c suauth.c".
* libmisc/Makefile.am:
remove suauth.c from libmisc_la_SOURCES (varialbles and functions from
this file are usesd only in su).
* libmisc/Attic/suauth.c, src/suauth.c: move suauth.c o src/.
* libmisc/Attic/suauth.c:
move "struct passwd pwent" outside #ifdef SU_ACCESS.
2002-03-09 Andrzej Krzysztofowicz <ankry@pld.org.pl>
* man/pl/chage.1, man/pl/chfn.1, man/pl/chsh.1, man/pl/expiry.1, man/pl/gpasswd.1, man/pl/groups.1, man/pl/id.1, man/pl/login.1, man/pl/newgrp.1, man/pl/passwd.1, man/pl/su.1:
- sync with en versions
* man/login.1, man/newgrp.1, man/passwd.1, man/su.1, man/chage.1, man/chfn.1, man/chsh.1, man/expiry.1, man/gpasswd.1, man/groups.1, man/id.1:
- update to chage.1; formatting/typo fixes
2002-03-09 Tomasz K³oczko <kloczek@pld.org.pl>
* po/uk.po, po/ko.po, po/pl.po, po/sv.po, po/ja.po, po/cs.po, po/el.po, po/fr.po:
"make update-po"
2002-03-09 Andrzej Krzysztofowicz <ankry@pld.org.pl>
* man/pt_BR/groupadd.8, man/pt_BR/groupdel.8, man/pt_BR/groupmod.8, man/pt_BR/shadow.5, man/pl/userdel.8, man/pl/usermod.8, man/pl/sulogin.8, man/pl/useradd.8, man/pl/pwconv.8, man/pl/su.1, man/pl/mkpasswd.8, man/pl/newgrp.1, man/pl/passwd.5, man/pl/pwauth.8, man/pl/login.defs.5, man/pl/chpasswd.8, man/pl/groupadd.8, man/pl/groupdel.8, man/pl/groupmems.8, man/pl/groupmod.8, man/pl/groups.1, man/pl/grpck.8, man/pl/id.1, man/pl/login.1, man/hu/groups.1, man/hu/newgrp.1, man/ja/groupadd.8, man/ja/groupdel.8, man/ja/groupmod.8, man/ja/groups.1, man/ja/grpck.8, man/ja/id.1, man/ja/lastlog.8, man/ja/login.1, man/ja/login.defs.5, man/ja/mkpasswd.8, man/ja/newgrp.1, man/ja/passwd.5, man/ja/pw_auth.3, man/ja/pwauth.8, man/ja/pwck.8, man/ja/shadow.5, man/ja/su.1, man/ja/sulogin.8, man/ja/useradd.8, man/ja/userdel.8, man/ja/usermod.8, man/ja/vipw.8, man/groupadd.8, man/groupdel.8, man/groupmems.8, man/groupmod.8:
- further "SEE ALSO" references sorting
2002-03-08 Tomasz K³oczko <kloczek@pld.org.pl>
* man/pwck.8, man/pwconv.8, man/shadow.5, man/su.1, man/sulogin.8, man/useradd.8, man/userdel.8, man/usermod.8, man/vipw.8, man/Makefile.am, man/chpasswd.8, man/groupadd.8, man/groupdel.8, man/groupmod.8, man/groups.1, man/grpck.8, man/id.1, man/login.1, man/login.defs.5, man/mkpasswd.8, man/newgrp.1, man/newusers.8, man/passwd.5, man/pw_auth.3, man/pwauth.8:
merged shadow-4.0.0-owl-man.patch by Solar Designer <solar@openwall.com>.
* NEWS: updated for 4.0.3.
* libmisc/Attic/suauth.c, libmisc/utmp.c, src/login.c, src/su.c:
swapped utent dnd pwent efinition/extern and now shadow source can be configured
--with-shared (fix by Dimitar Zhekov <jimmy@is-vn.bg>).
2002-03-07 Tomasz K³oczko <kloczek@pld.org.pl>
* configure.in: start prepare 4.0.3.
* src/Makefile.am:
use ln -sf instead ln -s in install-exec-hok (fix pointed by Dimitar Zhekov
<jimmy@is-vn.bg>).
2002-03-02 Andrzej Krzysztofowicz <ankry@pld.org.pl>
* man/pl/passwd.1: sync with en version
* man/passwd.1: - they -> his/her, user's
- typos
- fix sentence about "writing down"
* man/passwd.1: relocation by NAKANO Takeo
2002-02-28 Andrzej Krzysztofowicz <ankry@pld.org.pl>
* man/hu/passwd.1: missing "-"
* man/ja/passwd.5, man/ja/shadow.5, man/ja/shadowconfig.8:
- updated to man-pages-ja-20020215
2002-02-23 Andrzej Krzysztofowicz <ankry@pld.org.pl>
* po/cs.po, po/fr.po, po/pl.po, po/sv.po, po/uk.po, man/pl/useradd.8:
- typos in pl/useradd.8; commented out unsupported -r option description
- useradd "usage" formatting fixes
- fix translation in uk.po
2002-02-18 Tomasz K這czko <kloczek@pld.org.pl>
* configure.in: release 4.0.2.
@ -786,7 +891,7 @@
2000-08-26 Marek Micha趾iewicz <marekm@pld.org.pl>
* contrib/Makefile.am, contrib/groupmems.shar, doc/LSM, po/el.po, po/fr.po, po/pl.po, po/sv.po, doc/README.mirrors, src/vipw.c, src/Makefile.am, src/chage.c, src/chfn.c, src/chpasswd.c, src/chsh.c, src/dpasswd.c, src/expiry.c, src/faillog.c, src/gpasswd.c, src/groupadd.c, src/groupdel.c, src/groupmod.c, src/groups.c, src/grpck.c, src/grpconv.c, src/grpunconv.c, src/id.c, src/lastlog.c, src/login.c, src/logoutd.c, src/mkpasswd.c, src/newgrp.c, src/newusers.c, src/passwd.c, src/pwck.c, src/pwconv.c, src/pwunconv.c, src/su.c, src/sulogin.c, src/useradd.c, src/userdel.c, src/usermod.c, lib/Makefile.am, lib/commonio.c, lib/commonio.h, lib/defines.h, lib/dialchk.h, lib/dialup.h, lib/encrypt.c, lib/getdef.c, lib/getdef.h, lib/groupio.c, lib/groupio.h, lib/prototypes.h, lib/pwauth.c, lib/pwio.c, lib/pwio.h, lib/rad64.c, lib/sgroupio.c, lib/sgroupio.h, lib/shadowio.h, lib/tcfsio.h, libmisc/chkname.h, libmisc/chowndir.c, libmisc/copydir.c, libmisc/entry.c, libmisc/failure.h, libmisc/getdate.h, libmisc/hushed.c, libmisc/loginprompt.c, libmisc/setupenv.c, libmisc/suauth.c, libmisc/sulog.c, man/Makefile.am, man/chage.1, man/chfn.1, man/chpasswd.8, man/chsh.1, man/dpasswd.8, man/faillog.5, man/faillog.8, man/groupadd.8, man/groupdel.8, man/groupmod.8, man/groups.1, man/grpck.8, man/id.1, man/lastlog.8, man/login.1, man/login.defs.5, man/logoutd.8, man/mkpasswd.8, man/newgrp.1, man/newusers.8, man/passwd.1, man/passwd.5, man/pl/Makefile.am, man/pl/groupadd.8, man/pl/groupdel.8, man/pl/groupmod.8, man/pl/useradd.8, man/pl/userdel.8, man/pl/usermod.8, man/porttime.5, man/pw_auth.3, man/pwauth.8, man/pwck.8, man/shadow.3, man/shadow.5, man/su.1, man/sulogin.8, man/useradd.8, man/userdel.8, man/usermod.8, etc/login.defs.hurd, etc/login.defs.linux, doc/ANNOUNCE, doc/Attic/CHANGES, doc/README, doc/README.linux, doc/README.pam, doc/WISHLIST, debian/login.copyright, debian/passwd.copyright, debian/secure-su.copyright, Attic/mkinstalldirs, configure.in, Makefile.am:
* contrib/Makefile.am, contrib/groupmems.shar, doc/LSM, po/el.po, po/fr.po, po/pl.po, po/sv.po, doc/README.mirrors, src/vipw.c, src/Makefile.am, src/chage.c, src/chfn.c, src/chpasswd.c, src/chsh.c, src/dpasswd.c, src/expiry.c, src/faillog.c, src/gpasswd.c, src/groupadd.c, src/groupdel.c, src/groupmod.c, src/groups.c, src/grpck.c, src/grpconv.c, src/grpunconv.c, src/id.c, src/lastlog.c, src/login.c, src/logoutd.c, src/mkpasswd.c, src/newgrp.c, src/newusers.c, src/passwd.c, src/pwck.c, src/pwconv.c, src/pwunconv.c, src/su.c, src/sulogin.c, src/useradd.c, src/userdel.c, src/usermod.c, lib/Makefile.am, lib/commonio.c, lib/commonio.h, lib/defines.h, lib/dialchk.h, lib/dialup.h, lib/encrypt.c, lib/getdef.c, lib/getdef.h, lib/groupio.c, lib/groupio.h, lib/prototypes.h, lib/pwauth.c, lib/pwio.c, lib/pwio.h, lib/rad64.c, lib/sgroupio.c, lib/sgroupio.h, lib/shadowio.h, lib/tcfsio.h, libmisc/Attic/suauth.c, libmisc/chkname.h, libmisc/chowndir.c, libmisc/copydir.c, libmisc/entry.c, libmisc/failure.h, libmisc/getdate.h, libmisc/hushed.c, libmisc/loginprompt.c, libmisc/setupenv.c, libmisc/sulog.c, man/Makefile.am, man/chage.1, man/chfn.1, man/chpasswd.8, man/chsh.1, man/dpasswd.8, man/faillog.5, man/faillog.8, man/groupadd.8, man/groupdel.8, man/groupmod.8, man/groups.1, man/grpck.8, man/id.1, man/lastlog.8, man/login.1, man/login.defs.5, man/logoutd.8, man/mkpasswd.8, man/newgrp.1, man/newusers.8, man/passwd.1, man/passwd.5, man/pl/Makefile.am, man/pl/groupadd.8, man/pl/groupdel.8, man/pl/groupmod.8, man/pl/useradd.8, man/pl/userdel.8, man/pl/usermod.8, man/porttime.5, man/pw_auth.3, man/pwauth.8, man/pwck.8, man/shadow.3, man/shadow.5, man/su.1, man/sulogin.8, man/useradd.8, man/userdel.8, man/usermod.8, etc/login.defs.hurd, etc/login.defs.linux, doc/ANNOUNCE, doc/Attic/CHANGES, doc/README, doc/README.linux, doc/README.pam, doc/WISHLIST, debian/login.copyright, debian/passwd.copyright, debian/secure-su.copyright, Attic/mkinstalldirs, configure.in, Makefile.am:
*** empty log message ***
1999-08-27 Marek Micha趾iewicz <marekm@pld.org.pl>
@ -811,7 +916,7 @@
1998-12-28 Marek Micha趾iewicz <marekm@pld.org.pl>
* src/usermod.c, src/userdel.c, src/useradd.c, src/sulogin.c, src/su.c, src/pwunconv.c, src/pwconv.c, src/pwck.c, src/passwd.c, src/newusers.c, src/newgrp.c, src/mkpasswd.c, src/logoutd.c, src/login.c, src/lastlog.c, src/id.c, src/grpunconv.c, src/grpconv.c, src/grpck.c, src/groups.c, src/groupmod.c, src/groupdel.c, src/groupadd.c, src/gpasswd.c, src/faillog.c, src/expiry.c, src/dpasswd.c, src/chsh.c, src/chpasswd.c, src/chfn.c, src/chage.c, po/Attic/doit, po/POTFILES.in, po/el.po, src/Makefile.am, man/usermod.8, man/userdel.8, man/useradd.8, man/sulogin.8, man/su.1, man/shadow.5, man/shadow.3, man/pwck.8, man/pwauth.8, man/pw_auth.3, man/porttime.5, man/passwd.5, man/passwd.1, man/newusers.8, man/newgrp.1, man/mkpasswd.8, man/logoutd.8, man/login.defs.5, man/login.1, man/lastlog.8, man/id.1, man/grpck.8, man/groups.1, man/groupmod.8, man/groupdel.8, man/groupadd.8, man/faillog.8, man/faillog.5, man/dpasswd.8, man/chsh.1, man/chpasswd.8, man/chfn.1, man/chage.1, libmisc/xmalloc.c, libmisc/sub.c, libmisc/suauth.c, libmisc/shell.c, libmisc/setupenv.c, libmisc/pam_pass.c, libmisc/obscure.c, libmisc/mail.c, libmisc/login_desrpc.c, libmisc/limits.c, libmisc/failure.c, libmisc/env.c, libmisc/console.c, libmisc/chowntty.c, libmisc/age.c, libmisc/addgrps.c, libmisc/Makefile.am, lib/strerror.c, lib/pwauth.c, lib/prototypes.h, lib/getpass.c, lib/getdef.c, lib/dialchk.c, lib/defines.h, lib/Makefile.am, doc/WISHLIST, doc/README.platforms, doc/README.mirrors, doc/README.linux, doc/README, doc/LSM, doc/Attic/CHANGES, debian/secure-su.copyright, debian/passwd.copyright, debian/login.copyright, debian/control, debian/changelog, configure.in, acconfig.h, Makefile.am:
* src/usermod.c, src/userdel.c, src/useradd.c, src/sulogin.c, src/su.c, src/pwunconv.c, src/pwconv.c, src/pwck.c, src/passwd.c, src/newusers.c, src/newgrp.c, src/mkpasswd.c, src/logoutd.c, src/login.c, src/lastlog.c, src/id.c, src/grpunconv.c, src/grpconv.c, src/grpck.c, src/groups.c, src/groupmod.c, src/groupdel.c, src/groupadd.c, src/gpasswd.c, src/faillog.c, src/expiry.c, src/dpasswd.c, src/chsh.c, src/chpasswd.c, src/chfn.c, src/chage.c, po/Attic/doit, po/POTFILES.in, po/el.po, src/Makefile.am, man/usermod.8, man/userdel.8, man/useradd.8, man/sulogin.8, man/su.1, man/shadow.5, man/shadow.3, man/pwck.8, man/pwauth.8, man/pw_auth.3, man/porttime.5, man/passwd.5, man/passwd.1, man/newusers.8, man/newgrp.1, man/mkpasswd.8, man/logoutd.8, man/login.defs.5, man/login.1, man/lastlog.8, man/id.1, man/grpck.8, man/groups.1, man/groupmod.8, man/groupdel.8, man/groupadd.8, man/faillog.8, man/faillog.5, man/dpasswd.8, man/chsh.1, man/chpasswd.8, man/chfn.1, man/chage.1, libmisc/xmalloc.c, libmisc/sub.c, libmisc/Attic/suauth.c, libmisc/shell.c, libmisc/setupenv.c, libmisc/pam_pass.c, libmisc/obscure.c, libmisc/mail.c, libmisc/login_desrpc.c, libmisc/limits.c, libmisc/failure.c, libmisc/env.c, libmisc/console.c, libmisc/chowntty.c, libmisc/age.c, libmisc/addgrps.c, libmisc/Makefile.am, lib/strerror.c, lib/pwauth.c, lib/prototypes.h, lib/getpass.c, lib/getdef.c, lib/dialchk.c, lib/defines.h, lib/Makefile.am, doc/WISHLIST, doc/README.platforms, doc/README.mirrors, doc/README.linux, doc/README, doc/LSM, doc/Attic/CHANGES, debian/secure-su.copyright, debian/passwd.copyright, debian/login.copyright, debian/control, debian/changelog, configure.in, acconfig.h, Makefile.am:
*** empty log message ***
1998-07-24 Marek Micha趾iewicz <marekm@pld.org.pl>
@ -855,7 +960,7 @@
1997-12-08 Marek Micha趾iewicz <marekm@pld.org.pl>
* src/userdel.c, src/usermod.c, src/Attic/shadowconfig.sh, src/su.c, src/sulogin.c, src/useradd.c, src/passwd.c, src/pwck.c, src/pwconv.c, src/pwunconv.c, src/newgrp.c, src/newusers.c, src/logoutd.c, src/mkpasswd.c, src/grpconv.c, src/grpunconv.c, src/id.c, src/lastlog.c, src/login.c, src/groupadd.c, src/groupdel.c, src/groupmod.c, src/groups.c, src/grpck.c, src/chsh.c, src/dpasswd.c, src/expiry.c, src/faillog.c, src/gpasswd.c, src/Makefile.am, src/chage.c, src/chfn.c, src/chpasswd.c, old/Makefile.am, old/pwconv.8, old/vipw.8, man/Makefile.am, man/limits.5, man/pwconv.8, man/shadowconfig.8, man/vipw.8, libmisc/tz.c, libmisc/ulimit.c, libmisc/utmp.c, libmisc/valid.c, libmisc/xmalloc.c, libmisc/strtoday.c, libmisc/suauth.c, libmisc/sub.c, libmisc/sulog.c, libmisc/ttytype.c, libmisc/salt.c, libmisc/setugid.c, libmisc/setup.c, libmisc/setupenv.c, libmisc/shell.c, libmisc/rlogin.c, libmisc/motd.c, libmisc/myname.c, libmisc/obscure.c, libmisc/pam_pass.c, libmisc/pwd2spwd.c, libmisc/pwd_init.c, libmisc/login_access.c, libmisc/login_desrpc.c, libmisc/login_krb.c, libmisc/loginprompt.c, libmisc/mail.c, libmisc/hushed.c, libmisc/isexpired.c, libmisc/limits.c, libmisc/list.c, libmisc/log.c, libmisc/failure.h, libmisc/fields.c, libmisc/getdate.c, libmisc/getdate.h, libmisc/getdate.y, libmisc/entry.c, libmisc/env.c, libmisc/failure.c, libmisc/chowndir.c, libmisc/chowntty.c, libmisc/console.c, libmisc/copydir.c, libmisc/age.c, libmisc/basename.c, libmisc/chkname.c, libmisc/chkname.h, libmisc/chkshell.c, lib/strdup.c, lib/strerror.c, lib/strstr.c, lib/utent.c, libmisc/Makefile.am, libmisc/addgrps.c, lib/sgroupio.c, lib/shadow.c, lib/shadowio.c, lib/spdbm.c, lib/sppack.c, lib/rename.c, lib/rmdir.c, lib/sgetgrent.c, lib/sgetpwent.c, lib/sgetspent.c, lib/rad64.c, lib/pwauth.c, lib/pwdbm.c, lib/pwent.c, lib/pwio.c, lib/pwpack.c, lib/mkdir.c, lib/port.c, lib/prototypes.h, lib/putgrent.c, lib/putpwent.c, lib/putspent.c, lib/gsdbm.c, lib/gshadow.c, lib/gspack.c, lib/lockpw.c, lib/md5.c, lib/md5crypt.c, lib/grdbm.c, lib/grent.c, lib/groupio.c, lib/grpack.c, lib/getpass.c, lib/dialup.c, lib/encrypt.c, lib/fputsx.c, lib/getdef.c, lib/commonio.c, lib/commonio.h, lib/defines.h, lib/dialchk.c, lib/dialchk.h, doc/Attic/automake-1.0.diff, etc/limits, etc/login.defs.linux, lib/Makefile.am, doc/Attic/CHANGES, doc/README.linux, doc/README.mirrors, doc/WISHLIST, debian/login.conffiles, debian/login.postinst, debian/passwd.postinst, debian/porttime, debian/rules, debian/secure-su.README, debian/securetty, contrib/pwdauth.c, debian/changelog, debian/control, Attic/aclocal.m4, Attic/shadow-utils.spec, acconfig.h, configure.in, Makefile.am:
* src/userdel.c, src/usermod.c, src/Attic/shadowconfig.sh, src/su.c, src/sulogin.c, src/useradd.c, src/passwd.c, src/pwck.c, src/pwconv.c, src/pwunconv.c, src/newgrp.c, src/newusers.c, src/logoutd.c, src/mkpasswd.c, src/grpconv.c, src/grpunconv.c, src/id.c, src/lastlog.c, src/login.c, src/groupadd.c, src/groupdel.c, src/groupmod.c, src/groups.c, src/grpck.c, src/chsh.c, src/dpasswd.c, src/expiry.c, src/faillog.c, src/gpasswd.c, src/Makefile.am, src/chage.c, src/chfn.c, src/chpasswd.c, old/Makefile.am, old/pwconv.8, old/vipw.8, man/Makefile.am, man/limits.5, man/pwconv.8, man/shadowconfig.8, man/vipw.8, libmisc/tz.c, libmisc/ulimit.c, libmisc/utmp.c, libmisc/valid.c, libmisc/xmalloc.c, libmisc/Attic/suauth.c, libmisc/strtoday.c, libmisc/sub.c, libmisc/sulog.c, libmisc/ttytype.c, libmisc/salt.c, libmisc/setugid.c, libmisc/setup.c, libmisc/setupenv.c, libmisc/shell.c, libmisc/rlogin.c, libmisc/motd.c, libmisc/myname.c, libmisc/obscure.c, libmisc/pam_pass.c, libmisc/pwd2spwd.c, libmisc/pwd_init.c, libmisc/login_access.c, libmisc/login_desrpc.c, libmisc/login_krb.c, libmisc/loginprompt.c, libmisc/mail.c, libmisc/hushed.c, libmisc/isexpired.c, libmisc/limits.c, libmisc/list.c, libmisc/log.c, libmisc/failure.h, libmisc/fields.c, libmisc/getdate.c, libmisc/getdate.h, libmisc/getdate.y, libmisc/entry.c, libmisc/env.c, libmisc/failure.c, libmisc/chowndir.c, libmisc/chowntty.c, libmisc/console.c, libmisc/copydir.c, libmisc/age.c, libmisc/basename.c, libmisc/chkname.c, libmisc/chkname.h, libmisc/chkshell.c, lib/strdup.c, lib/strerror.c, lib/strstr.c, lib/utent.c, libmisc/Makefile.am, libmisc/addgrps.c, lib/sgroupio.c, lib/shadow.c, lib/shadowio.c, lib/spdbm.c, lib/sppack.c, lib/rename.c, lib/rmdir.c, lib/sgetgrent.c, lib/sgetpwent.c, lib/sgetspent.c, lib/rad64.c, lib/pwauth.c, lib/pwdbm.c, lib/pwent.c, lib/pwio.c, lib/pwpack.c, lib/mkdir.c, lib/port.c, lib/prototypes.h, lib/putgrent.c, lib/putpwent.c, lib/putspent.c, lib/gsdbm.c, lib/gshadow.c, lib/gspack.c, lib/lockpw.c, lib/md5.c, lib/md5crypt.c, lib/grdbm.c, lib/grent.c, lib/groupio.c, lib/grpack.c, lib/getpass.c, lib/dialup.c, lib/encrypt.c, lib/fputsx.c, lib/getdef.c, lib/commonio.c, lib/commonio.h, lib/defines.h, lib/dialchk.c, lib/dialchk.h, doc/Attic/automake-1.0.diff, etc/limits, etc/login.defs.linux, lib/Makefile.am, doc/Attic/CHANGES, doc/README.linux, doc/README.mirrors, doc/WISHLIST, debian/login.conffiles, debian/login.postinst, debian/passwd.postinst, debian/porttime, debian/rules, debian/secure-su.README, debian/securetty, contrib/pwdauth.c, debian/changelog, debian/control, Attic/aclocal.m4, Attic/shadow-utils.spec, acconfig.h, configure.in, Makefile.am:
*** empty log message ***
1997-10-01 Marek Micha趾iewicz <marekm@pld.org.pl>
@ -895,7 +1000,7 @@
1997-01-08 Marek Micha趾iewicz <marekm@pld.org.pl>
* src/groupadd.c, lib/commonio.c, README, src/useradd.c, src/userdel.c, src/usermod.c, src/Attic/pwconv5.c, src/pwconv.c, src/su.c, src/passwd.c, src/pwck.c, src/grpunconv.c, src/login.c, src/logoutd.c, src/newgrp.c, src/grpck.c, src/grpconv.c, src/faillog.c, src/gpasswd.c, src/groupmod.c, src/chage.c, src/chfn.c, src/chsh.c, src/expiry.c, libmisc/ttytype.c, libmisc/utmp.c, libmisc/strtoday.c, libmisc/suauth.c, libmisc/shell.c, libmisc/failure.c, libmisc/log.c, libmisc/loginprompt.c, libmisc/myname.c, lib/shadowio.h, libmisc/Makefile.am, libmisc/chkname.c, lib/sgetpwent.c, lib/sgroupio.c, lib/sgroupio.h, lib/shadow.c, lib/shadowio.c, lib/pwent.c, lib/pwio.c, lib/pwio.h, lib/groupio.c, lib/groupio.h, lib/gshadow.c, lib/prototypes.h, lib/putgrent.c, lib/defines.h, lib/faillog.h, lib/getdef.c, doc/README.linux, doc/WISHLIST, etc/login.defs.linux, lib/Makefile.am, doc/Attic/CHANGES, doc/HOWTO, acconfig.h, configure.in:
* src/groupadd.c, lib/commonio.c, README, src/useradd.c, src/userdel.c, src/usermod.c, src/Attic/pwconv5.c, src/pwconv.c, src/su.c, src/passwd.c, src/pwck.c, src/grpunconv.c, src/login.c, src/logoutd.c, src/newgrp.c, src/grpck.c, src/grpconv.c, src/faillog.c, src/gpasswd.c, src/groupmod.c, src/chage.c, src/chfn.c, src/chsh.c, src/expiry.c, libmisc/ttytype.c, libmisc/utmp.c, libmisc/Attic/suauth.c, libmisc/strtoday.c, libmisc/shell.c, libmisc/failure.c, libmisc/log.c, libmisc/loginprompt.c, libmisc/myname.c, lib/shadowio.h, libmisc/Makefile.am, libmisc/chkname.c, lib/sgetpwent.c, lib/sgroupio.c, lib/sgroupio.h, lib/shadow.c, lib/shadowio.c, lib/pwent.c, lib/pwio.c, lib/pwio.h, lib/groupio.c, lib/groupio.h, lib/gshadow.c, lib/prototypes.h, lib/putgrent.c, lib/defines.h, lib/faillog.h, lib/getdef.c, doc/README.linux, doc/WISHLIST, etc/login.defs.linux, lib/Makefile.am, doc/Attic/CHANGES, doc/HOWTO, acconfig.h, configure.in:
*** empty log message ***
1996-10-27 Marek Micha趾iewicz <marekm@pld.org.pl>
@ -910,7 +1015,7 @@
1996-09-20 Marek Micha趾iewicz <marekm@pld.org.pl>
* src/usermod.c, src/su.c, src/sulogin.c, src/useradd.c, src/userdel.c, src/newusers.c, src/passwd.c, src/pwck.c, src/grpck.c, src/login.c, src/logoutd.c, src/newgrp.c, src/groupdel.c, src/groupmod.c, src/chsh.c, src/dpasswd.c, src/gpasswd.c, src/groupadd.c, src/Attic/Makefile.in, src/chage.c, src/chfn.c, src/Makefile.am, libmisc/shell.c, libmisc/suauth.c, libmisc/sub.c, libmisc/ttytype.c, libmisc/env.c, libmisc/setugid.c, libmisc/setupenv.c, libmisc/chowntty.c, lib/prototypes.h, lib/getdef.c, doc/Attic/CHANGES, doc/WISHLIST:
* src/usermod.c, src/su.c, src/sulogin.c, src/useradd.c, src/userdel.c, src/newusers.c, src/passwd.c, src/pwck.c, src/grpck.c, src/login.c, src/logoutd.c, src/newgrp.c, src/groupdel.c, src/groupmod.c, src/chsh.c, src/dpasswd.c, src/gpasswd.c, src/groupadd.c, src/Attic/Makefile.in, src/chage.c, src/chfn.c, src/Makefile.am, libmisc/Attic/suauth.c, libmisc/shell.c, libmisc/sub.c, libmisc/ttytype.c, libmisc/env.c, libmisc/setugid.c, libmisc/setupenv.c, libmisc/chowntty.c, lib/prototypes.h, lib/getdef.c, doc/Attic/CHANGES, doc/WISHLIST:
*** empty log message ***
1996-09-10 Marek Micha趾iewicz <marekm@pld.org.pl>
@ -931,6 +1036,6 @@
* lib/md5.h: 960810 - first version under cvs
* lib/defines.h, lib/dialup.h, lib/faillog.h, lib/getdef.h, lib/grdbm.c, lib/grent.c, lib/groupio.h, lib/grpack.c, lib/gsdbm.c, lib/gshadow_.h, lib/gspack.c, lib/lastlog_.h, lib/md5.c, lib/md5crypt.c, lib/mkdir.c, lib/port.h, lib/prototypes.h, lib/putgrent.c, lib/putpwent.c, lib/putspent.c, lib/pwauth.h, lib/pwdbm.c, lib/pwent.c, lib/pwio.h, lib/pwpack.c, lib/rcsid.h, lib/rename.c, lib/rmdir.c, lib/sgetgrent.c, lib/sgetpwent.c, lib/sgetspent.c, lib/sgroupio.h, lib/shadow.c, lib/shadow_.h, lib/shadowio.c, lib/shadowio.h, lib/spdbm.c, lib/sppack.c, lib/strdup.c, lib/strstr.c, lib/utent.c, src/Attic/Makefile.in, src/Makefile.am, src/chpasswd.c, src/dpasswd.c, src/faillog.c, src/groupadd.c, src/groupdel.c, src/groupmod.c, src/grpck.c, src/lastlog.c, src/logoutd.c, src/mkpasswd.c, src/newusers.c, src/pwck.c, src/useradd.c, src/userdel.c, src/usermod.c, lib/Attic/Makefile.in, lib/Makefile.am, lib/commonio.c, lib/dialchk.c, lib/dialup.c, lib/encrypt.c, lib/fputsx.c, lib/getdef.c, lib/getpass.c, lib/groupio.c, lib/gshadow.c, lib/lockpw.c, lib/port.c, lib/pwauth.c, lib/pwio.c, lib/rad64.c, lib/sgroupio.c, libmisc/age.c, libmisc/basename.c, libmisc/chkname.c, libmisc/chowndir.c, libmisc/chowntty.c, libmisc/console.c, libmisc/copydir.c, libmisc/entry.c, libmisc/env.c, libmisc/failure.c, libmisc/fields.c, libmisc/hushed.c, libmisc/isexpired.c, libmisc/limits.c, libmisc/list.c, libmisc/log.c, libmisc/login_access.c, libmisc/login_desrpc.c, libmisc/login_krb.c, libmisc/loginprompt.c, libmisc/mail.c, libmisc/motd.c, libmisc/obscure.c, libmisc/pwd2spwd.c, libmisc/rlogin.c, libmisc/salt.c, libmisc/setugid.c, libmisc/setup.c, libmisc/setupenv.c, libmisc/shell.c, libmisc/strtoday.c, libmisc/suauth.c, libmisc/sub.c, libmisc/sulog.c, libmisc/ttytype.c, libmisc/tz.c, libmisc/ulimit.c, libmisc/utmp.c, libmisc/valid.c, libmisc/xmalloc.c, man/Attic/Makefile.in, man/Makefile.am, man/chage.1, man/chfn.1, man/chpasswd.8, man/chsh.1, man/dpasswd.8, man/faillog.5, man/faillog.8, man/gpasswd.1, man/groupadd.8, man/groupdel.8, man/groupmod.8, man/groups.1, man/grpck.8, man/id.1, man/lastlog.8, man/login.1, man/login.access.5, man/login.defs.5, man/logoutd.8, man/mkpasswd.8, man/newgrp.1, man/newusers.8, man/passwd.1, man/passwd.5, man/porttime.5, man/pw_auth.3, man/pwauth.8, man/pwck.8, man/pwconv.8, man/pwunconv.8, man/shadow.3, man/shadow.5, man/su.1, man/suauth.5, man/sulogin.8, man/useradd.8, man/userdel.8, man/usermod.8, Attic/Makefile.in, Attic/aclocal.m4, Attic/config.h.in, Attic/configure, Attic/install-sh, Attic/mkinstalldirs, Attic/stamp-h.in, Makefile.am, README, acconfig.h, configure.in, libmisc/Attic/Makefile.in, libmisc/Makefile.am, libmisc/addgrps.c:
* lib/defines.h, lib/dialup.h, lib/faillog.h, lib/getdef.h, lib/grdbm.c, lib/grent.c, lib/groupio.h, lib/grpack.c, lib/gsdbm.c, lib/gshadow_.h, lib/gspack.c, lib/lastlog_.h, lib/md5.c, lib/md5crypt.c, lib/mkdir.c, lib/port.h, lib/prototypes.h, lib/putgrent.c, lib/putpwent.c, lib/putspent.c, lib/pwauth.h, lib/pwdbm.c, lib/pwent.c, lib/pwio.h, lib/pwpack.c, lib/rcsid.h, lib/rename.c, lib/rmdir.c, lib/sgetgrent.c, lib/sgetpwent.c, lib/sgetspent.c, lib/sgroupio.h, lib/shadow.c, lib/shadow_.h, lib/shadowio.c, lib/shadowio.h, lib/spdbm.c, lib/sppack.c, lib/strdup.c, lib/strstr.c, lib/utent.c, src/Attic/Makefile.in, src/Makefile.am, src/chpasswd.c, src/dpasswd.c, src/faillog.c, src/groupadd.c, src/groupdel.c, src/groupmod.c, src/grpck.c, src/lastlog.c, src/logoutd.c, src/mkpasswd.c, src/newusers.c, src/pwck.c, src/useradd.c, src/userdel.c, src/usermod.c, lib/Attic/Makefile.in, lib/Makefile.am, lib/commonio.c, lib/dialchk.c, lib/dialup.c, lib/encrypt.c, lib/fputsx.c, lib/getdef.c, lib/getpass.c, lib/groupio.c, lib/gshadow.c, lib/lockpw.c, lib/port.c, lib/pwauth.c, lib/pwio.c, lib/rad64.c, lib/sgroupio.c, libmisc/Attic/suauth.c, libmisc/age.c, libmisc/basename.c, libmisc/chkname.c, libmisc/chowndir.c, libmisc/chowntty.c, libmisc/console.c, libmisc/copydir.c, libmisc/entry.c, libmisc/env.c, libmisc/failure.c, libmisc/fields.c, libmisc/hushed.c, libmisc/isexpired.c, libmisc/limits.c, libmisc/list.c, libmisc/log.c, libmisc/login_access.c, libmisc/login_desrpc.c, libmisc/login_krb.c, libmisc/loginprompt.c, libmisc/mail.c, libmisc/motd.c, libmisc/obscure.c, libmisc/pwd2spwd.c, libmisc/rlogin.c, libmisc/salt.c, libmisc/setugid.c, libmisc/setup.c, libmisc/setupenv.c, libmisc/shell.c, libmisc/strtoday.c, libmisc/sub.c, libmisc/sulog.c, libmisc/ttytype.c, libmisc/tz.c, libmisc/ulimit.c, libmisc/utmp.c, libmisc/valid.c, libmisc/xmalloc.c, man/Attic/Makefile.in, man/Makefile.am, man/chage.1, man/chfn.1, man/chpasswd.8, man/chsh.1, man/dpasswd.8, man/faillog.5, man/faillog.8, man/gpasswd.1, man/groupadd.8, man/groupdel.8, man/groupmod.8, man/groups.1, man/grpck.8, man/id.1, man/lastlog.8, man/login.1, man/login.access.5, man/login.defs.5, man/logoutd.8, man/mkpasswd.8, man/newgrp.1, man/newusers.8, man/passwd.1, man/passwd.5, man/porttime.5, man/pw_auth.3, man/pwauth.8, man/pwck.8, man/pwconv.8, man/pwunconv.8, man/shadow.3, man/shadow.5, man/su.1, man/suauth.5, man/sulogin.8, man/useradd.8, man/userdel.8, man/usermod.8, Attic/Makefile.in, Attic/aclocal.m4, Attic/config.h.in, Attic/configure, Attic/install-sh, Attic/mkinstalldirs, Attic/stamp-h.in, Makefile.am, README, acconfig.h, configure.in, libmisc/Attic/Makefile.in, libmisc/Makefile.am, libmisc/addgrps.c:
New file.

17
NEWS
View File

@ -1,4 +1,19 @@
$Id: NEWS,v 1.27 2002/01/31 10:38:39 kloczek Exp $
$Id: NEWS,v 1.31 2002/03/13 09:30:52 kloczek Exp $
shadow-4.0.2 => shadow-4.0.3
- added variouse cs, de, fr, id, it, ko man pages found mainly in national
man pages translations projects (this documents are not synced with
current en version but you know .. "Documentations is lik sex. When it is
good it very very good. Whet it is bad it is better than nothing."). Any
changes for syncing this are welcome and for anyone who will want maintain
this documents directly I can give cvs write access to project resources.
- added new de translation (by Frank Schmid <frank@cs-schmid.de>).
- fixed building --with-shared: swapped utent (in src/login.c and
libmisc/utmp.c) and pwent (in libmisc/suauth.c and src/su.c)
definition/extern (by Dimitar Zhekov <jimmy@is-vn.bg>).
- minor changes and updates in man pages (also merged
shadow-4.0.0-owl-man.patch by Solar Designer <solar@openwall.com>).
shadow-4.0.1 => shadow-4.0.2

2
TODO
View File

@ -2,8 +2,6 @@
# "*" partialy exist/implemented
# "+" done
- fix building shadow utils without PAM enabled,
- fix nscd flushing databases on change (I'm still not shure where it will
be bether add this on shadow or on PAM level),

28
configure vendored
View File

@ -1421,7 +1421,7 @@ fi
# Define the identity of the package.
PACKAGE=shadow
VERSION=4.0.2
VERSION=4.0.3
cat >>confdefs.h <<EOF
#define PACKAGE "$PACKAGE"
@ -10343,7 +10343,7 @@ EOF
echo "${ECHO_T}yes" >&6
fi
ALL_LINGUAS="cs el fr ja ko pl sv uk"
ALL_LINGUAS="cs de el fr ja ko pl sv uk"
if test -n "$ac_tool_prefix"; then
# Extract the first word of "${ac_tool_prefix}ranlib", so it can be a program name with args.
set dummy ${ac_tool_prefix}ranlib; ac_word=$2
@ -12141,7 +12141,7 @@ echo "${ECHO_T}$LINGUAS" >&6
INTL_LIBTOOL_SUFFIX_PREFIX=
ac_config_files="$ac_config_files Makefile intl/Makefile po/Makefile.in doc/Makefile man/Makefile man/hu/Makefile man/ja/Makefile man/pl/Makefile man/pt_BR/Makefile libmisc/Makefile lib/Makefile src/Makefile contrib/Makefile debian/Makefile etc/Makefile etc/pam.d/Makefile shadow.spec"
ac_config_files="$ac_config_files Makefile intl/Makefile po/Makefile.in doc/Makefile man/Makefile man/cs/Makefile man/de/Makefile man/fr/Makefile man/hu/Makefile man/id/Makefile man/it/Makefile man/ja/Makefile man/ko/Makefile man/pl/Makefile man/pt_BR/Makefile libmisc/Makefile lib/Makefile src/Makefile contrib/Makefile debian/Makefile etc/Makefile etc/pam.d/Makefile shadow.spec"
cat >confcache <<\_ACEOF
# This file is a shell script that caches the results of configure
# tests run on this system so they can be shared between configure
@ -12466,8 +12466,14 @@ do
"po/Makefile.in" ) CONFIG_FILES="$CONFIG_FILES po/Makefile.in" ;;
"doc/Makefile" ) CONFIG_FILES="$CONFIG_FILES doc/Makefile" ;;
"man/Makefile" ) CONFIG_FILES="$CONFIG_FILES man/Makefile" ;;
"man/cs/Makefile" ) CONFIG_FILES="$CONFIG_FILES man/cs/Makefile" ;;
"man/de/Makefile" ) CONFIG_FILES="$CONFIG_FILES man/de/Makefile" ;;
"man/fr/Makefile" ) CONFIG_FILES="$CONFIG_FILES man/fr/Makefile" ;;
"man/hu/Makefile" ) CONFIG_FILES="$CONFIG_FILES man/hu/Makefile" ;;
"man/id/Makefile" ) CONFIG_FILES="$CONFIG_FILES man/id/Makefile" ;;
"man/it/Makefile" ) CONFIG_FILES="$CONFIG_FILES man/it/Makefile" ;;
"man/ja/Makefile" ) CONFIG_FILES="$CONFIG_FILES man/ja/Makefile" ;;
"man/ko/Makefile" ) CONFIG_FILES="$CONFIG_FILES man/ko/Makefile" ;;
"man/pl/Makefile" ) CONFIG_FILES="$CONFIG_FILES man/pl/Makefile" ;;
"man/pt_BR/Makefile" ) CONFIG_FILES="$CONFIG_FILES man/pt_BR/Makefile" ;;
"libmisc/Makefile" ) CONFIG_FILES="$CONFIG_FILES libmisc/Makefile" ;;
@ -12481,7 +12487,7 @@ do
"default-1" ) CONFIG_COMMANDS="$CONFIG_COMMANDS default-1" ;;
"default-2" ) CONFIG_COMMANDS="$CONFIG_COMMANDS default-2" ;;
"config.h" ) CONFIG_HEADERS="$CONFIG_HEADERS config.h" ;;
*) { { echo "$as_me:12484: error: invalid argument: $ac_config_target" >&5
*) { { echo "$as_me:12490: error: invalid argument: $ac_config_target" >&5
echo "$as_me: error: invalid argument: $ac_config_target" >&2;}
{ (exit 1); exit 1; }; };;
esac
@ -12754,7 +12760,7 @@ done; }
esac
if test x"$ac_file" != x-; then
{ echo "$as_me:12757: creating $ac_file" >&5
{ echo "$as_me:12763: creating $ac_file" >&5
echo "$as_me: creating $ac_file" >&6;}
rm -f "$ac_file"
fi
@ -12772,7 +12778,7 @@ echo "$as_me: creating $ac_file" >&6;}
-) echo $tmp/stdin ;;
[\\/$]*)
# Absolute (can't be DOS-style, as IFS=:)
test -f "$f" || { { echo "$as_me:12775: error: cannot find input file: $f" >&5
test -f "$f" || { { echo "$as_me:12781: error: cannot find input file: $f" >&5
echo "$as_me: error: cannot find input file: $f" >&2;}
{ (exit 1); exit 1; }; }
echo $f;;
@ -12785,7 +12791,7 @@ echo "$as_me: error: cannot find input file: $f" >&2;}
echo $srcdir/$f
else
# /dev/null tree
{ { echo "$as_me:12788: error: cannot find input file: $f" >&5
{ { echo "$as_me:12794: error: cannot find input file: $f" >&5
echo "$as_me: error: cannot find input file: $f" >&2;}
{ (exit 1); exit 1; }; }
fi;;
@ -12846,7 +12852,7 @@ for ac_file in : $CONFIG_HEADERS; do test "x$ac_file" = x: && continue
* ) ac_file_in=$ac_file.in ;;
esac
test x"$ac_file" != x- && { echo "$as_me:12849: creating $ac_file" >&5
test x"$ac_file" != x- && { echo "$as_me:12855: creating $ac_file" >&5
echo "$as_me: creating $ac_file" >&6;}
# First look for the input files in the build tree, otherwise in the
@ -12857,7 +12863,7 @@ echo "$as_me: creating $ac_file" >&6;}
-) echo $tmp/stdin ;;
[\\/$]*)
# Absolute (can't be DOS-style, as IFS=:)
test -f "$f" || { { echo "$as_me:12860: error: cannot find input file: $f" >&5
test -f "$f" || { { echo "$as_me:12866: error: cannot find input file: $f" >&5
echo "$as_me: error: cannot find input file: $f" >&2;}
{ (exit 1); exit 1; }; }
echo $f;;
@ -12870,7 +12876,7 @@ echo "$as_me: error: cannot find input file: $f" >&2;}
echo $srcdir/$f
else
# /dev/null tree
{ { echo "$as_me:12873: error: cannot find input file: $f" >&5
{ { echo "$as_me:12879: error: cannot find input file: $f" >&5
echo "$as_me: error: cannot find input file: $f" >&2;}
{ (exit 1); exit 1; }; }
fi;;
@ -12987,7 +12993,7 @@ cat >>$CONFIG_STATUS <<\EOF
rm -f $tmp/in
if test x"$ac_file" != x-; then
if cmp -s $ac_file $tmp/config.h 2>/dev/null; then
{ echo "$as_me:12990: $ac_file is unchanged" >&5
{ echo "$as_me:12996: $ac_file is unchanged" >&5
echo "$as_me: $ac_file is unchanged" >&6;}
else
ac_dir=`$as_expr X"$ac_file" : 'X\(.*[^/]\)//*[^/][^/]*/*$' \| \

View File

@ -1,6 +1,6 @@
dnl Process this file with autoconf to produce a configure script.
AC_INIT(lib/dialchk.c)
AM_INIT_AUTOMAKE(shadow, 4.0.2)
AM_INIT_AUTOMAKE(shadow, 4.0.3)
AM_CONFIG_HEADER(config.h)
dnl Some hacks...
@ -282,7 +282,7 @@ else
AC_MSG_RESULT(yes)
fi
ALL_LINGUAS="cs el fr ja ko pl sv uk"
ALL_LINGUAS="cs de el fr ja ko pl sv uk"
AM_GNU_GETTEXT
AC_OUTPUT([
@ -291,8 +291,14 @@ AC_OUTPUT([
po/Makefile.in
doc/Makefile
man/Makefile
man/cs/Makefile
man/de/Makefile
man/fr/Makefile
man/hu/Makefile
man/id/Makefile
man/it/Makefile
man/ja/Makefile
man/ko/Makefile
man/pl/Makefile
man/pt_BR/Makefile
libmisc/Makefile

View File

@ -49,7 +49,6 @@ libmisc_la_SOURCES = \
setupenv.c \
shell.c \
strtoday.c \
suauth.c \
sub.c \
sulog.c \
ttytype.c \

View File

@ -157,7 +157,6 @@ libmisc_la_SOURCES = \
setupenv.c \
shell.c \
strtoday.c \
suauth.c \
sub.c \
sulog.c \
ttytype.c \
@ -184,8 +183,8 @@ am_libmisc_la_OBJECTS = addgrps.lo age.lo basename.lo chkname.lo \
login_desrpc.lo login_krb.lo loginprompt.lo mail.lo motd.lo \
myname.lo nscd.lo obscure.lo pam_pass.lo pwd2spwd.lo \
pwdcheck.lo pwd_init.lo rlogin.lo salt.lo setugid.lo setup.lo \
setupenv.lo shell.lo strtoday.lo suauth.lo sub.lo sulog.lo \
ttytype.lo tz.lo ulimit.lo utmp.lo valid.lo xmalloc.lo
setupenv.lo shell.lo strtoday.lo sub.lo sulog.lo ttytype.lo \
tz.lo ulimit.lo utmp.lo valid.lo xmalloc.lo
libmisc_la_OBJECTS = $(am_libmisc_la_OBJECTS)
DEFAULT_INCLUDES = -I. -I$(srcdir) -I$(top_builddir)
CPPFLAGS = @CPPFLAGS@
@ -211,11 +210,11 @@ depcomp = $(SHELL) $(top_srcdir)/depcomp
@AMDEP_TRUE@ $(DEPDIR)/rlogin.Plo $(DEPDIR)/salt.Plo \
@AMDEP_TRUE@ $(DEPDIR)/setugid.Plo $(DEPDIR)/setup.Plo \
@AMDEP_TRUE@ $(DEPDIR)/setupenv.Plo $(DEPDIR)/shell.Plo \
@AMDEP_TRUE@ $(DEPDIR)/strtoday.Plo $(DEPDIR)/suauth.Plo \
@AMDEP_TRUE@ $(DEPDIR)/sub.Plo $(DEPDIR)/sulog.Plo \
@AMDEP_TRUE@ $(DEPDIR)/ttytype.Plo $(DEPDIR)/tz.Plo \
@AMDEP_TRUE@ $(DEPDIR)/ulimit.Plo $(DEPDIR)/utmp.Plo \
@AMDEP_TRUE@ $(DEPDIR)/valid.Plo $(DEPDIR)/xmalloc.Plo
@AMDEP_TRUE@ $(DEPDIR)/strtoday.Plo $(DEPDIR)/sub.Plo \
@AMDEP_TRUE@ $(DEPDIR)/sulog.Plo $(DEPDIR)/ttytype.Plo \
@AMDEP_TRUE@ $(DEPDIR)/tz.Plo $(DEPDIR)/ulimit.Plo \
@AMDEP_TRUE@ $(DEPDIR)/utmp.Plo $(DEPDIR)/valid.Plo \
@AMDEP_TRUE@ $(DEPDIR)/xmalloc.Plo
COMPILE = $(CC) $(DEFS) $(DEFAULT_INCLUDES) $(INCLUDES) $(AM_CPPFLAGS) \
$(CPPFLAGS) $(AM_CFLAGS) $(CFLAGS)
LTCOMPILE = $(LIBTOOL) --mode=compile $(CC) $(DEFS) $(DEFAULT_INCLUDES) \
@ -317,7 +316,6 @@ distclean-compile:
@AMDEP_TRUE@@am__include@ @am__quote@$(DEPDIR)/setupenv.Plo@am__quote@
@AMDEP_TRUE@@am__include@ @am__quote@$(DEPDIR)/shell.Plo@am__quote@
@AMDEP_TRUE@@am__include@ @am__quote@$(DEPDIR)/strtoday.Plo@am__quote@
@AMDEP_TRUE@@am__include@ @am__quote@$(DEPDIR)/suauth.Plo@am__quote@
@AMDEP_TRUE@@am__include@ @am__quote@$(DEPDIR)/sub.Plo@am__quote@
@AMDEP_TRUE@@am__include@ @am__quote@$(DEPDIR)/sulog.Plo@am__quote@
@AMDEP_TRUE@@am__include@ @am__quote@$(DEPDIR)/ttytype.Plo@am__quote@

View File

@ -41,12 +41,12 @@
#include <stdio.h>
#include "rcsid.h"
RCSID("$Id: utmp.c,v 1.9 2001/11/06 16:18:08 kloczek Exp $")
RCSID("$Id: utmp.c,v 1.10 2002/03/08 04:30:30 kloczek Exp $")
#if HAVE_UTMPX_H
extern struct utmpx utxent;
struct utmpx utxent;
#endif
extern struct utmp utent;
struct utmp utent;
extern struct utmp *getutent();
extern struct utmp *getutline();

View File

@ -1,4 +1,7 @@
# subdirectories for translated manual pages
SUBDIRS = cs de fr hu id it ja ko pl pt_BR
man_MANS = \
adduser.8 \
chage.1 \
@ -8,6 +11,7 @@ man_MANS = \
expiry.1 \
faillog.5 \
faillog.8 \
getspnam.3 \
gpasswd.1 \
groupadd.8 \
groupdel.8 \
@ -42,6 +46,7 @@ man_MANS = \
EXTRA_DIST = $(man_MANS) \
dpasswd.8 \
getspnam.3 \
groups.1 \
id.1 \
pw_auth.3 \
@ -49,6 +54,3 @@ EXTRA_DIST = $(man_MANS) \
shadow.3 \
shadowconfig.8 \
sulogin.8
# subdirectories for translated manual pages
SUBDIRS = hu ja pl pt_BR

View File

@ -13,6 +13,8 @@
@SET_MAKE@
# subdirectories for translated manual pages
SHELL = @SHELL@
srcdir = @srcdir@
@ -107,6 +109,8 @@ am__include = @am__include@
am__quote = @am__quote@
install_sh = @install_sh@
SUBDIRS = cs de fr hu id it ja ko pl pt_BR
man_MANS = \
adduser.8 \
chage.1 \
@ -116,6 +120,7 @@ man_MANS = \
expiry.1 \
faillog.5 \
faillog.8 \
getspnam.3 \
gpasswd.1 \
groupadd.8 \
groupdel.8 \
@ -151,6 +156,7 @@ man_MANS = \
EXTRA_DIST = $(man_MANS) \
dpasswd.8 \
getspnam.3 \
groups.1 \
id.1 \
pw_auth.3 \
@ -159,9 +165,6 @@ EXTRA_DIST = $(man_MANS) \
shadowconfig.8 \
sulogin.8
# subdirectories for translated manual pages
SUBDIRS = hu ja pl pt_BR
subdir = man
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
CONFIG_HEADER = $(top_builddir)/config.h
@ -237,6 +240,45 @@ uninstall-man1:
rm -f $(DESTDIR)$(man1dir)/$$inst; \
done
man3dir = $(mandir)/man3
install-man3: $(man3_MANS) $(man_MANS)
@$(NORMAL_INSTALL)
$(mkinstalldirs) $(DESTDIR)$(man3dir)
@list='$(man3_MANS) $(dist_man3_MANS) $(nodist_man3_MANS)'; \
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
for i in $$l2; do \
case "$$i" in \
*.3*) list="$$list $$i" ;; \
esac; \
done; \
for i in $$list; do \
if test -f $(srcdir)/$$i; then file=$(srcdir)/$$i; \
else file=$$i; fi; \
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
inst=`echo $$inst | sed -e 's/^.*\///'`; \
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
echo " $(INSTALL_DATA) $$file $(DESTDIR)$(man3dir)/$$inst"; \
$(INSTALL_DATA) $$file $(DESTDIR)$(man3dir)/$$inst; \
done
uninstall-man3:
@$(NORMAL_UNINSTALL)
@list='$(man3_MANS) $(dist_man3_MANS) $(nodist_man3_MANS)'; \
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
for i in $$l2; do \
case "$$i" in \
*.3*) list="$$list $$i" ;; \
esac; \
done; \
for i in $$list; do \
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
inst=`echo $$inst | sed -e 's/^.*\///'`; \
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
echo " rm -f $(DESTDIR)$(man3dir)/$$inst"; \
rm -f $(DESTDIR)$(man3dir)/$$inst; \
done
man5dir = $(mandir)/man5
install-man5: $(man5_MANS) $(man_MANS)
@$(NORMAL_INSTALL)
@ -446,7 +488,7 @@ check: check-recursive
all-am: Makefile $(MANS)
installdirs: installdirs-recursive
installdirs-am:
$(mkinstalldirs) $(DESTDIR)$(man1dir) $(DESTDIR)$(man5dir) $(DESTDIR)$(man8dir)
$(mkinstalldirs) $(DESTDIR)$(man1dir) $(DESTDIR)$(man3dir) $(DESTDIR)$(man5dir) $(DESTDIR)$(man8dir)
install: install-recursive
install-exec: install-exec-recursive
@ -494,7 +536,7 @@ install-exec-am:
install-info: install-info-recursive
install-man: install-man1 install-man5 install-man8
install-man: install-man1 install-man3 install-man5 install-man8
installcheck-am:
@ -510,7 +552,8 @@ uninstall-am: uninstall-info-am uninstall-man
uninstall-info: uninstall-info-recursive
uninstall-man: uninstall-man1 uninstall-man5 uninstall-man8
uninstall-man: uninstall-man1 uninstall-man3 uninstall-man5 \
uninstall-man8
.PHONY: $(RECURSIVE_TARGETS) GTAGS all all-am check check-am clean \
clean-generic clean-libtool clean-recursive distclean \
@ -519,15 +562,16 @@ uninstall-man: uninstall-man1 uninstall-man5 uninstall-man8
info-recursive install install-am install-data install-data-am \
install-data-recursive install-exec install-exec-am \
install-exec-recursive install-info install-info-am \
install-info-recursive install-man install-man1 install-man5 \
install-man8 install-recursive install-strip installcheck \
installcheck-am installdirs installdirs-am \
install-info-recursive install-man install-man1 install-man3 \
install-man5 install-man8 install-recursive install-strip \
installcheck installcheck-am installdirs installdirs-am \
installdirs-recursive maintainer-clean maintainer-clean-generic \
maintainer-clean-recursive mostlyclean mostlyclean-generic \
mostlyclean-libtool mostlyclean-recursive tags tags-recursive \
uninstall uninstall-am uninstall-info-am \
uninstall-info-recursive uninstall-man uninstall-man1 \
uninstall-man5 uninstall-man8 uninstall-recursive
uninstall-man3 uninstall-man5 uninstall-man8 \
uninstall-recursive
# Tell versions [3.59,3.63) of GNU make to not export all variables.
# Otherwise a system limit (for SysV at least) may be exceeded.

View File

@ -1,4 +1,4 @@
.\"$Id: chage.1,v 1.8 2001/01/25 10:43:50 kloczek Exp $
.\"$Id: chage.1,v 1.9 2002/03/09 19:22:29 ankry Exp $
.\" Copyright 1990 - 1994 Julianne Frances Haugh
.\" All rights reserved.
.\"
@ -37,7 +37,7 @@ chage \- change user password expiry information
[\fB-E \fIexpiredate\fR] [\fB-W \fIwarndays\fR] \fIuser\fR
.TP 6
\fBchage\fR
\fB-l\fR \fIuser\fR
\fB-l \fIuser\fR
.SH DESCRIPTION
\fBchage\fR changes the number of days between password changes and the
date of the last password change.
@ -76,26 +76,25 @@ being able to use the system again.
.PP
The \fB-I\fR option is used to set the number of days of inactivity after
a password has expired before the account is locked.
A user whose account is locked must contact the system administrator before
being able to use the system again.
The \fIinactive\fR option is the number of days of inactivity. A value of
0 disables this feature.
A user whose account is locked must contact the system administrator before
being able to use the system again.
.PP
The \fB-W\fR option is used to set the number of days of warning before a
password change is required.
The \fIwarndays\fR option is the number of days prior to the password
expiring that a user will be warned her password is about to expire.
.PP
All of the above values are stored exactly as days when the shadow
password file is used, but are converted to and from weeks when the
standard password file is used.
Because of this conversion, rounding errors may result.
.PP
If none of the options are selected, \fBchage\fR operates in an interactive
fashion, prompting the user with the current values for all of the fields.
Enter the new value to change the field, or leave the line blank to use
the current value.
The current value is displayed between a pair of \fB[ ]\fR marks.
.SH NOTE
The \fBchage\fR program requires shadow password file to be available.
Its functionality is not available when passwords are stored in the
passwd file.
.SH FILES
/etc/passwd \- user account information
.br
@ -104,4 +103,4 @@ The current value is displayed between a pair of \fB[ ]\fR marks.
.BR passwd (5),
.BR shadow (5)
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
Julianne Frances Haugh <jockgrrl@ix.netcom.com>

View File

@ -1,4 +1,4 @@
.\"$Id: chfn.1,v 1.7 2001/01/25 10:43:50 kloczek Exp $
.\"$Id: chfn.1,v 1.8 2002/03/09 19:22:29 ankry Exp $
.\" Copyright 1990 - 1994 Julianne Frances Haugh
.\" All rights reserved.
.\"
@ -27,7 +27,7 @@
.\" SUCH DAMAGE.
.TH CHFN 1
.SH NAME
chfn \- change user name and information
chfn \- change real user name and information
.SH SYNOPSIS
.TP 5
\fBchfn\fR
@ -40,12 +40,12 @@ chfn \- change user name and information
phone number information for a user's account.
This information is typically printed by \fBfinger\fR(1) and similiar
programs.
A normal user may only change the fields for their own account,
A normal user may only change the fields for her own account,
the super user may change the fields for any account.
Also, only the super user may use the \fB-o\fR option to change the
undefined portions of the GCOS field.
undefined portions of the GECOS field.
.PP
The only restrictions placed on the contents of the fields is that no
The only restriction placed on the contents of the fields is that no
control characters may be present, nor any of comma, colon, or equal sign.
The \fIother\fR field does not have this restriction, and is used to
store accounting information used by other applications.
@ -61,4 +61,4 @@ Without options, chfn prompts for the current user account.
.SH SEE ALSO
.BR passwd (5)
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
Julianne Frances Haugh <jockgrrl@ix.netcom.com>

View File

@ -1,4 +1,4 @@
.\"$Id: chpasswd.8,v 1.9 2001/12/22 05:40:01 kloczek Exp $
.\"$Id: chpasswd.8,v 1.10 2002/03/08 04:39:11 kloczek Exp $
.\" Copyright 1991, Julianne Frances Haugh
.\" All rights reserved.
.\"
@ -54,7 +54,7 @@ The input file must be protected if it contains unencrypted passwords.
.SH SEE ALSO
.\" mkpasswd(8), passwd(1), useradd(1)
.BR passwd (1),
.BR useradd (8),
.BR newusers (8)
.BR newusers (8),
.BR useradd (8)
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)

View File

@ -1,4 +1,4 @@
.\"$Id: chsh.1,v 1.7 2001/01/25 10:43:50 kloczek Exp $
.\"$Id: chsh.1,v 1.8 2002/03/09 19:22:29 ankry Exp $
.\" Copyright 1990, Julianne Frances Haugh
.\" All rights reserved.
.\"
@ -35,24 +35,24 @@ chsh \- change login shell
.SH DESCRIPTION
\fBchsh\fR changes the user login shell.
This determines the name of the user's initial login command.
A normal user may only change the login shell for their own account,
A normal user may only change the login shell for her own account,
the super user may change the login shell for any account.
.PP
The only restrictions placed on the login shell is that the
command name must be listed in \fI/etc/shells\fR, unless the
invoker is the super-user, and then any value may be added.
An account with a restricted login shell may not change
their login shell.
her login shell.
For this reason, placing \fB/bin/rsh\fR in \fI/etc/shells\fR
is discouraged since accidentally changing to a restricted
shell would prevent the user from every changing their login
shell would prevent the user from every changing her login
shell back to its original value.
.PP
If the \fB-s\fR option is not selected, \fBchsh\fR operates in an interactive
fashion, prompting the user with the current login shell.
Enter the new value to change the field, or leave the line blank to use
the current value.
The current value is displayed between a pair of \fB[ ]\fR marks.
Enter the new value to change the shell, or leave the line blank to use
the current one.
The current shell is displayed between a pair of \fB[ ]\fR marks.
.SH FILES
/etc/passwd \- user account information
.br
@ -61,4 +61,4 @@ The current value is displayed between a pair of \fB[ ]\fR marks.
.BR chfn (1),
.BR passwd (5)
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
Julianne Frances Haugh <jockgrrl@ix.netcom.com>

8
man/cs/Makefile.am Normal file
View File

@ -0,0 +1,8 @@
mandir = @mandir@/cs
man_MANS = \
passwd.5 \
shadow.5
EXTRA_DIST = $(man_MANS)

290
man/cs/Makefile.in Normal file
View File

@ -0,0 +1,290 @@
# Makefile.in generated automatically by automake 1.5 from Makefile.am.
# Copyright 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001
# Free Software Foundation, Inc.
# This Makefile.in is free software; the Free Software Foundation
# gives unlimited permission to copy and/or distribute it,
# with or without modifications, as long as this notice is preserved.
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY, to the extent permitted by law; without
# even the implied warranty of MERCHANTABILITY or FITNESS FOR A
# PARTICULAR PURPOSE.
@SET_MAKE@
SHELL = @SHELL@
srcdir = @srcdir@
top_srcdir = @top_srcdir@
VPATH = @srcdir@
prefix = @prefix@
exec_prefix = @exec_prefix@
bindir = @bindir@
sbindir = @sbindir@
libexecdir = @libexecdir@
datadir = @datadir@
sysconfdir = @sysconfdir@
sharedstatedir = @sharedstatedir@
localstatedir = @localstatedir@
libdir = @libdir@
infodir = @infodir@
includedir = @includedir@
oldincludedir = /usr/include
pkgdatadir = $(datadir)/@PACKAGE@
pkglibdir = $(libdir)/@PACKAGE@
pkgincludedir = $(includedir)/@PACKAGE@
top_builddir = ../..
ACLOCAL = @ACLOCAL@
AUTOCONF = @AUTOCONF@
AUTOMAKE = @AUTOMAKE@
AUTOHEADER = @AUTOHEADER@
INSTALL = @INSTALL@
INSTALL_PROGRAM = @INSTALL_PROGRAM@
INSTALL_DATA = @INSTALL_DATA@
INSTALL_SCRIPT = @INSTALL_SCRIPT@
INSTALL_HEADER = $(INSTALL_DATA)
transform = @program_transform_name@
NORMAL_INSTALL = :
PRE_INSTALL = :
POST_INSTALL = :
NORMAL_UNINSTALL = :
PRE_UNINSTALL = :
POST_UNINSTALL = :
host_alias = @host_alias@
host_triplet = @host@
AMTAR = @AMTAR@
AS = @AS@
AWK = @AWK@
BUILD_INCLUDED_LIBINTL = @BUILD_INCLUDED_LIBINTL@
CATALOGS = @CATALOGS@
CATOBJEXT = @CATOBJEXT@
CC = @CC@
CPP = @CPP@
DATADIRNAME = @DATADIRNAME@
DEPDIR = @DEPDIR@
DLLTOOL = @DLLTOOL@
ECHO = @ECHO@
EXEEXT = @EXEEXT@
GENCAT = @GENCAT@
GLIBC21 = @GLIBC21@
GMOFILES = @GMOFILES@
GMSGFMT = @GMSGFMT@
INSTALL_STRIP_PROGRAM = @INSTALL_STRIP_PROGRAM@
INSTOBJEXT = @INSTOBJEXT@
INTLBISON = @INTLBISON@
INTLLIBS = @INTLLIBS@
INTLOBJS = @INTLOBJS@
INTL_LIBTOOL_SUFFIX_PREFIX = @INTL_LIBTOOL_SUFFIX_PREFIX@
LIBCRACK = @LIBCRACK@
LIBCRYPT = @LIBCRYPT@
LIBICONV = @LIBICONV@
LIBMD = @LIBMD@
LIBPAM = @LIBPAM@
LIBSKEY = @LIBSKEY@
LIBTCFS = @LIBTCFS@
LIBTOOL = @LIBTOOL@
LN_S = @LN_S@
MKINSTALLDIRS = @MKINSTALLDIRS@
MSGFMT = @MSGFMT@
OBJDUMP = @OBJDUMP@
OBJEXT = @OBJEXT@
PACKAGE = @PACKAGE@
POFILES = @POFILES@
POSUB = @POSUB@
RANLIB = @RANLIB@
STRIP = @STRIP@
U = @U@
USE_INCLUDED_LIBINTL = @USE_INCLUDED_LIBINTL@
USE_NLS = @USE_NLS@
VERSION = @VERSION@
YACC = @YACC@
am__include = @am__include@
am__quote = @am__quote@
install_sh = @install_sh@
mandir = @mandir@/cs
man_MANS = \
passwd.5 \
shadow.5
EXTRA_DIST = $(man_MANS)
subdir = man/cs
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
CONFIG_HEADER = $(top_builddir)/config.h
CONFIG_CLEAN_FILES =
DIST_SOURCES =
NROFF = nroff
MANS = $(man_MANS)
DIST_COMMON = Makefile.am Makefile.in
all: all-am
.SUFFIXES:
mostlyclean-libtool:
-rm -f *.lo
clean-libtool:
-rm -rf .libs _libs
distclean-libtool:
-rm -f libtool
$(srcdir)/Makefile.in: Makefile.am $(top_srcdir)/configure.in $(ACLOCAL_M4)
cd $(top_srcdir) && \
$(AUTOMAKE) --gnu man/cs/Makefile
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
cd $(top_builddir) && \
CONFIG_HEADERS= CONFIG_LINKS= \
CONFIG_FILES=$(subdir)/$@ $(SHELL) ./config.status
uninstall-info-am:
man5dir = $(mandir)/man5
install-man5: $(man5_MANS) $(man_MANS)
@$(NORMAL_INSTALL)
$(mkinstalldirs) $(DESTDIR)$(man5dir)
@list='$(man5_MANS) $(dist_man5_MANS) $(nodist_man5_MANS)'; \
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
for i in $$l2; do \
case "$$i" in \
*.5*) list="$$list $$i" ;; \
esac; \
done; \
for i in $$list; do \
if test -f $(srcdir)/$$i; then file=$(srcdir)/$$i; \
else file=$$i; fi; \
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
inst=`echo $$inst | sed -e 's/^.*\///'`; \
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
echo " $(INSTALL_DATA) $$file $(DESTDIR)$(man5dir)/$$inst"; \
$(INSTALL_DATA) $$file $(DESTDIR)$(man5dir)/$$inst; \
done
uninstall-man5:
@$(NORMAL_UNINSTALL)
@list='$(man5_MANS) $(dist_man5_MANS) $(nodist_man5_MANS)'; \
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
for i in $$l2; do \
case "$$i" in \
*.5*) list="$$list $$i" ;; \
esac; \
done; \
for i in $$list; do \
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
inst=`echo $$inst | sed -e 's/^.*\///'`; \
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
echo " rm -f $(DESTDIR)$(man5dir)/$$inst"; \
rm -f $(DESTDIR)$(man5dir)/$$inst; \
done
tags: TAGS
TAGS:
DISTFILES = $(DIST_COMMON) $(DIST_SOURCES) $(TEXINFOS) $(EXTRA_DIST)
top_distdir = ../..
distdir = $(top_distdir)/$(PACKAGE)-$(VERSION)
distdir: $(DISTFILES)
@for file in $(DISTFILES); do \
if test -f $$file; then d=.; else d=$(srcdir); fi; \
dir=`echo "$$file" | sed -e 's,/[^/]*$$,,'`; \
if test "$$dir" != "$$file" && test "$$dir" != "."; then \
$(mkinstalldirs) "$(distdir)/$$dir"; \
fi; \
if test -d $$d/$$file; then \
cp -pR $$d/$$file $(distdir) \
|| exit 1; \
else \
test -f $(distdir)/$$file \
|| cp -p $$d/$$file $(distdir)/$$file \
|| exit 1; \
fi; \
done
check-am: all-am
check: check-am
all-am: Makefile $(MANS)
installdirs:
$(mkinstalldirs) $(DESTDIR)$(man5dir)
install: install-am
install-exec: install-exec-am
install-data: install-data-am
uninstall: uninstall-am
install-am: all-am
@$(MAKE) $(AM_MAKEFLAGS) install-exec-am install-data-am
installcheck: installcheck-am
install-strip:
$(MAKE) $(AM_MAKEFLAGS) INSTALL_PROGRAM="$(INSTALL_STRIP_PROGRAM)" \
`test -z '$(STRIP)' || \
echo "INSTALL_PROGRAM_ENV=STRIPPROG='$(STRIP)'"` install
mostlyclean-generic:
clean-generic:
distclean-generic:
-rm -f Makefile $(CONFIG_CLEAN_FILES) stamp-h stamp-h[0-9]*
maintainer-clean-generic:
@echo "This command is intended for maintainers to use"
@echo "it deletes files that may require special tools to rebuild."
clean: clean-am
clean-am: clean-generic clean-libtool mostlyclean-am
distclean: distclean-am
distclean-am: clean-am distclean-generic distclean-libtool
dvi: dvi-am
dvi-am:
info: info-am
info-am:
install-data-am: install-man
install-exec-am:
install-info: install-info-am
install-man: install-man5
installcheck-am:
maintainer-clean: maintainer-clean-am
maintainer-clean-am: distclean-am maintainer-clean-generic
mostlyclean: mostlyclean-am
mostlyclean-am: mostlyclean-generic mostlyclean-libtool
uninstall-am: uninstall-info-am uninstall-man
uninstall-man: uninstall-man5
.PHONY: all all-am check check-am clean clean-generic clean-libtool \
distclean distclean-generic distclean-libtool distdir dvi \
dvi-am info info-am install install-am install-data \
install-data-am install-exec install-exec-am install-info \
install-info-am install-man install-man5 install-strip \
installcheck installcheck-am installdirs maintainer-clean \
maintainer-clean-generic mostlyclean mostlyclean-generic \
mostlyclean-libtool uninstall uninstall-am uninstall-info-am \
uninstall-man uninstall-man5
# Tell versions [3.59,3.63) of GNU make to not export all variables.
# Otherwise a system limit (for SysV at least) may be exceeded.
.NOEXPORT:

57
man/cs/passwd.5 Normal file
View File

@ -0,0 +1,57 @@
.TH PASSWD 5 "19. března 1997" "Linux" "Linux - příručka programátora"
.do hla cs
.do hpf hyphen.cs
.SH JMÉNO
passwd \- seznam hesel uživatelů
.SH POPIS
.B Passwd
je čitelný textový soubor, který obsahuje seznam uživatelů systému a hesel,
která musejí použít pro přístup. Seznam hesel uživatelů by měl být s právy
pro čtení pro každého, což v pořádku, protože jsou hesla zašifrována, ale
zápisová práva má jenom superuživatel. Jestliže vytvoříte nový login,
nechejte pole pro heslo prázdné a použijte \fBpasswd\fP(1) pro doplnění.
Hvězdička nebo něco podobného v poli hesel značí, že tento uživatel se nemůže
přihlásit přes \fBlogin\fP(1). Jestliže je váš kořenový adresář v
.IR /dev/ram,
tak musíte uložit změněný soubor hesel do vašeho kořenového adresáře na
disketě něž systém vypnete. Jestliže chcete
vytvořit skupinu uživatelů, jejich GID musí být stejná a musí pro ni
existovat záznam v souboru \fI/etc/group\fP, nebo skupina nebude existovat.
.PP
Každý řádek tvoří jeden záznam, který má následující formát:
.sp
.RS
login_name:passwd:UID:GID:user_name:directory:shell
.RE
.sp
Popis jednotlivých polí:
.sp
.RS
.TP 1.0in
.I login_name
přihlašovací jméno uživatele systému
.TP
.I password
zašifrované heslo uživatele
.TP
.I UID
číselná identifikace uživatele (user ID)
.TP
.I GID
číselná identifikace skupiny (group ID)
.TP
.I user_name
(volitelné) poznámka (často celé jméno uživatele)
.TP
.I directory
domovský adresář uživatele ($HOME)
.TP
.I shell
program, který je spuštěn po úspěšném přihlášení (jestliže je prázdný,
použije se
.IR /bin/sh ).
.RE
.SH SOUBORY
.I /etc/passwd
.SH DALŠÍ INFORMACE
.BR passwd "(1), " login "(1), " group (5)

64
man/cs/shadow.5 Normal file
View File

@ -0,0 +1,64 @@
.TH SHADOW 5
.do hla cs
.do hpf hyphen.cs
.SH JMÉNO
shadow \- soubor se zašifrovanými hesly
.SH POPIS
.I shadow
obsahuje informace o zašifrovaných heslech uživatelských účtů a
volitelně může obsahovat informace o stárnutí hesel. Soubor obsahuje
.IP "" .5i
Přihlašovací jméno
.IP "" .5i
Zašifrované heslo
.IP "" .5i
Počet dnů od 1. ledna 1970, kdy bylo heslo naposledy změněno
.IP "" .5i
Počet dnů, po jejichž uplynutí může být heslo změněno
.IP "" .5i
Počet dnů, po jejichž uplynutí musí být heslo změněno
.IP "" .5i
Počet dnů před lhůtou, kdy je uživatel varován, že heslo vyprší
.IP "" .5i
Počet dnů, po jejichž uplynutí po propadnutí hesla je zablokován účet.
.IP "" .5i
Počet dnů od 1. ledna 1970, kdy byl účet zablokován
.IP "" .5i
Rezervované pole
.PP
Pole hesla musí být vyplněno. Zašifrované heslo se skládá ze 13 až 24
znaků z 64 prvkové množiny znaků (a až z, A až Z, 0 až 9, \. a
/). \fIcrypt(3)\fR obsahuje detailní informace o tom, jak
interpretovat tento řetězec.
.PP
Datum poslední změny hesla je dáno počtem dní od 1. ledna 1970. Heslo
nesmí býti znovu změněno dokud řádně neuplyne specifikovaný počet dní,
a musí být změněno po uplynutí maximálního počtu dní. Pokud je
minimální počet dnů platnosti hesla vyšší než maximální počet
povolených dní, heslo nemůže být změněno uživatelem.
.PP
Účet je považován za neaktivní a bude zablokován, jestliže heslo není
změněno během určeného počtu dní po vypršení platnosti hesla. Účet
bude také zablokován v určený den nezávisle na ostatních informacích o
vypršení hesla.
.PP
Tyto informace o heslu a době jeho platnosti mají prioritu před
informacemi uloženými v souboru \fB/etc/passwd\fR.
.PP
Tento soubor nesmí být čitelný řádnými uživateli, má-li být
ochrana hesel účinná.
.SH SOUBORY
/etc/passwd \- informace o uživatelských účtech
.br
/etc/shadow \- zašifrovaná hesla uživatelů
.SH DALŠÍ INFORMACE
chage(1),
login(1),
passwd(1),
su(1),
sulogin(1M),
shadow(3),
passwd(5),
pwconv(8),
pwunconv(8)

8
man/de/Makefile.am Normal file
View File

@ -0,0 +1,8 @@
mandir = @mandir@/de
man_MANS = \
chsh.1 \
passwd.1
EXTRA_DIST = $(man_MANS)

290
man/de/Makefile.in Normal file
View File

@ -0,0 +1,290 @@
# Makefile.in generated automatically by automake 1.5 from Makefile.am.
# Copyright 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001
# Free Software Foundation, Inc.
# This Makefile.in is free software; the Free Software Foundation
# gives unlimited permission to copy and/or distribute it,
# with or without modifications, as long as this notice is preserved.
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY, to the extent permitted by law; without
# even the implied warranty of MERCHANTABILITY or FITNESS FOR A
# PARTICULAR PURPOSE.
@SET_MAKE@
SHELL = @SHELL@
srcdir = @srcdir@
top_srcdir = @top_srcdir@
VPATH = @srcdir@
prefix = @prefix@
exec_prefix = @exec_prefix@
bindir = @bindir@
sbindir = @sbindir@
libexecdir = @libexecdir@
datadir = @datadir@
sysconfdir = @sysconfdir@
sharedstatedir = @sharedstatedir@
localstatedir = @localstatedir@
libdir = @libdir@
infodir = @infodir@
includedir = @includedir@
oldincludedir = /usr/include
pkgdatadir = $(datadir)/@PACKAGE@
pkglibdir = $(libdir)/@PACKAGE@
pkgincludedir = $(includedir)/@PACKAGE@
top_builddir = ../..
ACLOCAL = @ACLOCAL@
AUTOCONF = @AUTOCONF@
AUTOMAKE = @AUTOMAKE@
AUTOHEADER = @AUTOHEADER@
INSTALL = @INSTALL@
INSTALL_PROGRAM = @INSTALL_PROGRAM@
INSTALL_DATA = @INSTALL_DATA@
INSTALL_SCRIPT = @INSTALL_SCRIPT@
INSTALL_HEADER = $(INSTALL_DATA)
transform = @program_transform_name@
NORMAL_INSTALL = :
PRE_INSTALL = :
POST_INSTALL = :
NORMAL_UNINSTALL = :
PRE_UNINSTALL = :
POST_UNINSTALL = :
host_alias = @host_alias@
host_triplet = @host@
AMTAR = @AMTAR@
AS = @AS@
AWK = @AWK@
BUILD_INCLUDED_LIBINTL = @BUILD_INCLUDED_LIBINTL@
CATALOGS = @CATALOGS@
CATOBJEXT = @CATOBJEXT@
CC = @CC@
CPP = @CPP@
DATADIRNAME = @DATADIRNAME@
DEPDIR = @DEPDIR@
DLLTOOL = @DLLTOOL@
ECHO = @ECHO@
EXEEXT = @EXEEXT@
GENCAT = @GENCAT@
GLIBC21 = @GLIBC21@
GMOFILES = @GMOFILES@
GMSGFMT = @GMSGFMT@
INSTALL_STRIP_PROGRAM = @INSTALL_STRIP_PROGRAM@
INSTOBJEXT = @INSTOBJEXT@
INTLBISON = @INTLBISON@
INTLLIBS = @INTLLIBS@
INTLOBJS = @INTLOBJS@
INTL_LIBTOOL_SUFFIX_PREFIX = @INTL_LIBTOOL_SUFFIX_PREFIX@
LIBCRACK = @LIBCRACK@
LIBCRYPT = @LIBCRYPT@
LIBICONV = @LIBICONV@
LIBMD = @LIBMD@
LIBPAM = @LIBPAM@
LIBSKEY = @LIBSKEY@
LIBTCFS = @LIBTCFS@
LIBTOOL = @LIBTOOL@
LN_S = @LN_S@
MKINSTALLDIRS = @MKINSTALLDIRS@
MSGFMT = @MSGFMT@
OBJDUMP = @OBJDUMP@
OBJEXT = @OBJEXT@
PACKAGE = @PACKAGE@
POFILES = @POFILES@
POSUB = @POSUB@
RANLIB = @RANLIB@
STRIP = @STRIP@
U = @U@
USE_INCLUDED_LIBINTL = @USE_INCLUDED_LIBINTL@
USE_NLS = @USE_NLS@
VERSION = @VERSION@
YACC = @YACC@
am__include = @am__include@
am__quote = @am__quote@
install_sh = @install_sh@
mandir = @mandir@/de
man_MANS = \
chsh.1 \
passwd.1
EXTRA_DIST = $(man_MANS)
subdir = man/de
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
CONFIG_HEADER = $(top_builddir)/config.h
CONFIG_CLEAN_FILES =
DIST_SOURCES =
NROFF = nroff
MANS = $(man_MANS)
DIST_COMMON = Makefile.am Makefile.in
all: all-am
.SUFFIXES:
mostlyclean-libtool:
-rm -f *.lo
clean-libtool:
-rm -rf .libs _libs
distclean-libtool:
-rm -f libtool
$(srcdir)/Makefile.in: Makefile.am $(top_srcdir)/configure.in $(ACLOCAL_M4)
cd $(top_srcdir) && \
$(AUTOMAKE) --gnu man/de/Makefile
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
cd $(top_builddir) && \
CONFIG_HEADERS= CONFIG_LINKS= \
CONFIG_FILES=$(subdir)/$@ $(SHELL) ./config.status
uninstall-info-am:
man1dir = $(mandir)/man1
install-man1: $(man1_MANS) $(man_MANS)
@$(NORMAL_INSTALL)
$(mkinstalldirs) $(DESTDIR)$(man1dir)
@list='$(man1_MANS) $(dist_man1_MANS) $(nodist_man1_MANS)'; \
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
for i in $$l2; do \
case "$$i" in \
*.1*) list="$$list $$i" ;; \
esac; \
done; \
for i in $$list; do \
if test -f $(srcdir)/$$i; then file=$(srcdir)/$$i; \
else file=$$i; fi; \
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
inst=`echo $$inst | sed -e 's/^.*\///'`; \
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
echo " $(INSTALL_DATA) $$file $(DESTDIR)$(man1dir)/$$inst"; \
$(INSTALL_DATA) $$file $(DESTDIR)$(man1dir)/$$inst; \
done
uninstall-man1:
@$(NORMAL_UNINSTALL)
@list='$(man1_MANS) $(dist_man1_MANS) $(nodist_man1_MANS)'; \
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
for i in $$l2; do \
case "$$i" in \
*.1*) list="$$list $$i" ;; \
esac; \
done; \
for i in $$list; do \
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
inst=`echo $$inst | sed -e 's/^.*\///'`; \
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
echo " rm -f $(DESTDIR)$(man1dir)/$$inst"; \
rm -f $(DESTDIR)$(man1dir)/$$inst; \
done
tags: TAGS
TAGS:
DISTFILES = $(DIST_COMMON) $(DIST_SOURCES) $(TEXINFOS) $(EXTRA_DIST)
top_distdir = ../..
distdir = $(top_distdir)/$(PACKAGE)-$(VERSION)
distdir: $(DISTFILES)
@for file in $(DISTFILES); do \
if test -f $$file; then d=.; else d=$(srcdir); fi; \
dir=`echo "$$file" | sed -e 's,/[^/]*$$,,'`; \
if test "$$dir" != "$$file" && test "$$dir" != "."; then \
$(mkinstalldirs) "$(distdir)/$$dir"; \
fi; \
if test -d $$d/$$file; then \
cp -pR $$d/$$file $(distdir) \
|| exit 1; \
else \
test -f $(distdir)/$$file \
|| cp -p $$d/$$file $(distdir)/$$file \
|| exit 1; \
fi; \
done
check-am: all-am
check: check-am
all-am: Makefile $(MANS)
installdirs:
$(mkinstalldirs) $(DESTDIR)$(man1dir)
install: install-am
install-exec: install-exec-am
install-data: install-data-am
uninstall: uninstall-am
install-am: all-am
@$(MAKE) $(AM_MAKEFLAGS) install-exec-am install-data-am
installcheck: installcheck-am
install-strip:
$(MAKE) $(AM_MAKEFLAGS) INSTALL_PROGRAM="$(INSTALL_STRIP_PROGRAM)" \
`test -z '$(STRIP)' || \
echo "INSTALL_PROGRAM_ENV=STRIPPROG='$(STRIP)'"` install
mostlyclean-generic:
clean-generic:
distclean-generic:
-rm -f Makefile $(CONFIG_CLEAN_FILES) stamp-h stamp-h[0-9]*
maintainer-clean-generic:
@echo "This command is intended for maintainers to use"
@echo "it deletes files that may require special tools to rebuild."
clean: clean-am
clean-am: clean-generic clean-libtool mostlyclean-am
distclean: distclean-am
distclean-am: clean-am distclean-generic distclean-libtool
dvi: dvi-am
dvi-am:
info: info-am
info-am:
install-data-am: install-man
install-exec-am:
install-info: install-info-am
install-man: install-man1
installcheck-am:
maintainer-clean: maintainer-clean-am
maintainer-clean-am: distclean-am maintainer-clean-generic
mostlyclean: mostlyclean-am
mostlyclean-am: mostlyclean-generic mostlyclean-libtool
uninstall-am: uninstall-info-am uninstall-man
uninstall-man: uninstall-man1
.PHONY: all all-am check check-am clean clean-generic clean-libtool \
distclean distclean-generic distclean-libtool distdir dvi \
dvi-am info info-am install install-am install-data \
install-data-am install-exec install-exec-am install-info \
install-info-am install-man install-man1 install-strip \
installcheck installcheck-am installdirs maintainer-clean \
maintainer-clean-generic mostlyclean mostlyclean-generic \
mostlyclean-libtool uninstall uninstall-am uninstall-info-am \
uninstall-man uninstall-man1
# Tell versions [3.59,3.63) of GNU make to not export all variables.
# Otherwise a system limit (for SysV at least) may be exceeded.
.NOEXPORT:

36
man/de/chsh.1 Normal file
View File

@ -0,0 +1,36 @@
.\"
.\" Copyright 1993 Sebastian Hetze und der/die in der Sektion
.\" AUTOR genannten Autor/Autoren
.\"
.\" Dieser Text steht unter der GNU General Public License.
.\" Er darf kopiert und verändert, korrigiert und verbessert werden.
.\" Die Copyright und Lizenzbestimmung müssen allerdings erhalten
.\" bleiben. Die Hinweise auf das LunetIX Linuxhandbuch, aus dem
.\" dieser Text stammt, dürfen nicht entfernt werden.
.\"
.TH CHSH 1 "1. Juli 1993" "LunetIX Linuxhandbuch" "Dienstprogramme für Benutzer"
.SH BEZEICHNUNG
chsh \- ändert den Loginshell Eintrag in der Paßwortdatei
.SH SYNTAX
.B chsh
.RI [ Benutzer ]
.RI [ Shell ]
.SH BESCHREIBUNG
.B chsh
ermöglicht es jedem eingetragenen Benutzer, seine Loginshell selbst, das
heißt ohne Hilfe des Superusers (root) zu verändern. Die Loginshell wird
in der Paßwortdatei /etc/passwd festgelegt. Diese Datei kann nur mit
Rootprivilegien verändert werden. Um auch den anderen Anwendern das
Verändern des Eintrages zu erlauben, läuft das
.B chsh
Programm SUID root. Das heißt, bei seiner Ausführung wird die effektive
Benutzerkennung des Superusers gesetzt. Um die Systemsicherheit trotzdem
zu gewährleisten, können nur Programme, die in der Datei /etc/shells
eingetragen sind als Loginshell benutzt werden.
.PP
Normalerweise kann ein Anwender nur seine eigene Loginshell ändern. Der
Superuser selbst kann das Programm aber auch für andere Benutzer anwenden,
indem er den Benutzernamen in der Kommandozeile angibt.
.SH AUTOR
Peter Orbaek

39
man/de/passwd.1 Normal file
View File

@ -0,0 +1,39 @@
.\"
.\" Copyright 1993 Sebastian Hetze und der/die in der Sektion
.\" AUTOR genannten Autor/Autoren
.\"
.\" Dieser Text steht unter der GNU General Public License.
.\" Er darf kopiert und verändert, korrigiert und verbessert werden.
.\" Die Copyright und Lizenzbestimmung müssen allerdings erhalten
.\" bleiben. Die Hinweise auf das LunetIX Linuxhandbuch, aus dem
.\" dieser Text stammt, dürfen nicht entfernt werden.
.\"
.TH PASSWD 1 "1. Juli 1993" "LunetIX Linuxhandbuch" "Dienstprogramme für Benutzer"
.SH BEZEICHNUNG
passwd \- ändert das Paßwort zum System
.SH SYNTAX
.B passwd
.RI [ Username ]
.SH BESCHREIBUNG
Die Paßwörter aller Benutzer werden in der Datei /etc/passwd gespeichert.
Diese Datei ist lesbar aber schreibgeschützt. Um dem Benutzer die
Möglichkeit zu geben, sein eigenes Paßwort zu ändern, läuft
.B passwd
SUID
.BR root ".
Deshalb hat der Anwender zur Laufzeit des Programms Rootprivilegien und darf
in die Datei schreiben.
.PP
Bei einigen Linuxinstallationen wird das Benutzerpaßwort in einer separaten
Datei namens
.B shadow
gespeichert, um den normalen Benutzern den Lesezugriff auf diese Daten zu
verwehren. Die Einzelheiten zu diesem Paßwortsystem sind in den englischen
Manualpages beschrieben.
.SH SIEHE AUCH
.BR chsh (1),
.BR newgrp (1)
und das LunetIX Linuxhandbuch
.SH AUTOR
Peter Orbaek

View File

@ -1,7 +1,7 @@
.\"$Id: expiry.1,v 1.2 2001/01/25 10:43:50 kloczek Exp $
.\"$Id: expiry.1,v 1.3 2002/03/09 19:22:29 ankry Exp $
.\" Copyright 1990 - 1994 Julianne Frances Haugh
.\" All rights reserved.
.\" Modified for expiry by Ben Collins <bcollins@debian.org, 1999
.\" Modified for expiry by Ben Collins <bcollins@debian.org>, 1999
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
@ -44,4 +44,4 @@ changes when required. It is callable as a normal user command.
.BR passwd (5),
.BR shadow (5)
.SH AUTHOR
Ben Collins (bcollins@debian.org)
Ben Collins <bcollins@debian.org>

20
man/fr/Makefile.am Normal file
View File

@ -0,0 +1,20 @@
mandir = @mandir@/fr
man_MANS = \
adduser.8 \
chage.1 \
chpasswd.8 \
chsh.1 \
faillog.5 \
gpasswd.1 \
newgrp.1 \
passwd.1 \
passwd.5 \
shadow.5 \
useradd.8 \
userdel.8 \
usermod.8
EXTRA_DIST = $(man_MANS) \
groups.1

382
man/fr/Makefile.in Normal file
View File

@ -0,0 +1,382 @@
# Makefile.in generated automatically by automake 1.5 from Makefile.am.
# Copyright 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001
# Free Software Foundation, Inc.
# This Makefile.in is free software; the Free Software Foundation
# gives unlimited permission to copy and/or distribute it,
# with or without modifications, as long as this notice is preserved.
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY, to the extent permitted by law; without
# even the implied warranty of MERCHANTABILITY or FITNESS FOR A
# PARTICULAR PURPOSE.
@SET_MAKE@
SHELL = @SHELL@
srcdir = @srcdir@
top_srcdir = @top_srcdir@
VPATH = @srcdir@
prefix = @prefix@
exec_prefix = @exec_prefix@
bindir = @bindir@
sbindir = @sbindir@
libexecdir = @libexecdir@
datadir = @datadir@
sysconfdir = @sysconfdir@
sharedstatedir = @sharedstatedir@
localstatedir = @localstatedir@
libdir = @libdir@
infodir = @infodir@
includedir = @includedir@
oldincludedir = /usr/include
pkgdatadir = $(datadir)/@PACKAGE@
pkglibdir = $(libdir)/@PACKAGE@
pkgincludedir = $(includedir)/@PACKAGE@
top_builddir = ../..
ACLOCAL = @ACLOCAL@
AUTOCONF = @AUTOCONF@
AUTOMAKE = @AUTOMAKE@
AUTOHEADER = @AUTOHEADER@
INSTALL = @INSTALL@
INSTALL_PROGRAM = @INSTALL_PROGRAM@
INSTALL_DATA = @INSTALL_DATA@
INSTALL_SCRIPT = @INSTALL_SCRIPT@
INSTALL_HEADER = $(INSTALL_DATA)
transform = @program_transform_name@
NORMAL_INSTALL = :
PRE_INSTALL = :
POST_INSTALL = :
NORMAL_UNINSTALL = :
PRE_UNINSTALL = :
POST_UNINSTALL = :
host_alias = @host_alias@
host_triplet = @host@
AMTAR = @AMTAR@
AS = @AS@
AWK = @AWK@
BUILD_INCLUDED_LIBINTL = @BUILD_INCLUDED_LIBINTL@
CATALOGS = @CATALOGS@
CATOBJEXT = @CATOBJEXT@
CC = @CC@
CPP = @CPP@
DATADIRNAME = @DATADIRNAME@
DEPDIR = @DEPDIR@
DLLTOOL = @DLLTOOL@
ECHO = @ECHO@
EXEEXT = @EXEEXT@
GENCAT = @GENCAT@
GLIBC21 = @GLIBC21@
GMOFILES = @GMOFILES@
GMSGFMT = @GMSGFMT@
INSTALL_STRIP_PROGRAM = @INSTALL_STRIP_PROGRAM@
INSTOBJEXT = @INSTOBJEXT@
INTLBISON = @INTLBISON@
INTLLIBS = @INTLLIBS@
INTLOBJS = @INTLOBJS@
INTL_LIBTOOL_SUFFIX_PREFIX = @INTL_LIBTOOL_SUFFIX_PREFIX@
LIBCRACK = @LIBCRACK@
LIBCRYPT = @LIBCRYPT@
LIBICONV = @LIBICONV@
LIBMD = @LIBMD@
LIBPAM = @LIBPAM@
LIBSKEY = @LIBSKEY@
LIBTCFS = @LIBTCFS@
LIBTOOL = @LIBTOOL@
LN_S = @LN_S@
MKINSTALLDIRS = @MKINSTALLDIRS@
MSGFMT = @MSGFMT@
OBJDUMP = @OBJDUMP@
OBJEXT = @OBJEXT@
PACKAGE = @PACKAGE@
POFILES = @POFILES@
POSUB = @POSUB@
RANLIB = @RANLIB@
STRIP = @STRIP@
U = @U@
USE_INCLUDED_LIBINTL = @USE_INCLUDED_LIBINTL@
USE_NLS = @USE_NLS@
VERSION = @VERSION@
YACC = @YACC@
am__include = @am__include@
am__quote = @am__quote@
install_sh = @install_sh@
mandir = @mandir@/fr
man_MANS = \
adduser.8 \
chage.1 \
chpasswd.8 \
chsh.1 \
faillog.5 \
gpasswd.1 \
newgrp.1 \
passwd.1 \
passwd.5 \
shadow.5 \
useradd.8 \
userdel.8 \
usermod.8
EXTRA_DIST = $(man_MANS) \
groups.1
subdir = man/fr
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
CONFIG_HEADER = $(top_builddir)/config.h
CONFIG_CLEAN_FILES =
DIST_SOURCES =
NROFF = nroff
MANS = $(man_MANS)
DIST_COMMON = Makefile.am Makefile.in
all: all-am
.SUFFIXES:
mostlyclean-libtool:
-rm -f *.lo
clean-libtool:
-rm -rf .libs _libs
distclean-libtool:
-rm -f libtool
$(srcdir)/Makefile.in: Makefile.am $(top_srcdir)/configure.in $(ACLOCAL_M4)
cd $(top_srcdir) && \
$(AUTOMAKE) --gnu man/fr/Makefile
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
cd $(top_builddir) && \
CONFIG_HEADERS= CONFIG_LINKS= \
CONFIG_FILES=$(subdir)/$@ $(SHELL) ./config.status
uninstall-info-am:
man1dir = $(mandir)/man1
install-man1: $(man1_MANS) $(man_MANS)
@$(NORMAL_INSTALL)
$(mkinstalldirs) $(DESTDIR)$(man1dir)
@list='$(man1_MANS) $(dist_man1_MANS) $(nodist_man1_MANS)'; \
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
for i in $$l2; do \
case "$$i" in \
*.1*) list="$$list $$i" ;; \
esac; \
done; \
for i in $$list; do \
if test -f $(srcdir)/$$i; then file=$(srcdir)/$$i; \
else file=$$i; fi; \
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
inst=`echo $$inst | sed -e 's/^.*\///'`; \
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
echo " $(INSTALL_DATA) $$file $(DESTDIR)$(man1dir)/$$inst"; \
$(INSTALL_DATA) $$file $(DESTDIR)$(man1dir)/$$inst; \
done
uninstall-man1:
@$(NORMAL_UNINSTALL)
@list='$(man1_MANS) $(dist_man1_MANS) $(nodist_man1_MANS)'; \
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
for i in $$l2; do \
case "$$i" in \
*.1*) list="$$list $$i" ;; \
esac; \
done; \
for i in $$list; do \
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
inst=`echo $$inst | sed -e 's/^.*\///'`; \
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
echo " rm -f $(DESTDIR)$(man1dir)/$$inst"; \
rm -f $(DESTDIR)$(man1dir)/$$inst; \
done
man5dir = $(mandir)/man5
install-man5: $(man5_MANS) $(man_MANS)
@$(NORMAL_INSTALL)
$(mkinstalldirs) $(DESTDIR)$(man5dir)
@list='$(man5_MANS) $(dist_man5_MANS) $(nodist_man5_MANS)'; \
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
for i in $$l2; do \
case "$$i" in \
*.5*) list="$$list $$i" ;; \
esac; \
done; \
for i in $$list; do \
if test -f $(srcdir)/$$i; then file=$(srcdir)/$$i; \
else file=$$i; fi; \
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
inst=`echo $$inst | sed -e 's/^.*\///'`; \
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
echo " $(INSTALL_DATA) $$file $(DESTDIR)$(man5dir)/$$inst"; \
$(INSTALL_DATA) $$file $(DESTDIR)$(man5dir)/$$inst; \
done
uninstall-man5:
@$(NORMAL_UNINSTALL)
@list='$(man5_MANS) $(dist_man5_MANS) $(nodist_man5_MANS)'; \
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
for i in $$l2; do \
case "$$i" in \
*.5*) list="$$list $$i" ;; \
esac; \
done; \
for i in $$list; do \
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
inst=`echo $$inst | sed -e 's/^.*\///'`; \
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
echo " rm -f $(DESTDIR)$(man5dir)/$$inst"; \
rm -f $(DESTDIR)$(man5dir)/$$inst; \
done
man8dir = $(mandir)/man8
install-man8: $(man8_MANS) $(man_MANS)
@$(NORMAL_INSTALL)
$(mkinstalldirs) $(DESTDIR)$(man8dir)
@list='$(man8_MANS) $(dist_man8_MANS) $(nodist_man8_MANS)'; \
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
for i in $$l2; do \
case "$$i" in \
*.8*) list="$$list $$i" ;; \
esac; \
done; \
for i in $$list; do \
if test -f $(srcdir)/$$i; then file=$(srcdir)/$$i; \
else file=$$i; fi; \
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
inst=`echo $$inst | sed -e 's/^.*\///'`; \
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
echo " $(INSTALL_DATA) $$file $(DESTDIR)$(man8dir)/$$inst"; \
$(INSTALL_DATA) $$file $(DESTDIR)$(man8dir)/$$inst; \
done
uninstall-man8:
@$(NORMAL_UNINSTALL)
@list='$(man8_MANS) $(dist_man8_MANS) $(nodist_man8_MANS)'; \
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
for i in $$l2; do \
case "$$i" in \
*.8*) list="$$list $$i" ;; \
esac; \
done; \
for i in $$list; do \
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
inst=`echo $$inst | sed -e 's/^.*\///'`; \
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
echo " rm -f $(DESTDIR)$(man8dir)/$$inst"; \
rm -f $(DESTDIR)$(man8dir)/$$inst; \
done
tags: TAGS
TAGS:
DISTFILES = $(DIST_COMMON) $(DIST_SOURCES) $(TEXINFOS) $(EXTRA_DIST)
top_distdir = ../..
distdir = $(top_distdir)/$(PACKAGE)-$(VERSION)
distdir: $(DISTFILES)
@for file in $(DISTFILES); do \
if test -f $$file; then d=.; else d=$(srcdir); fi; \
dir=`echo "$$file" | sed -e 's,/[^/]*$$,,'`; \
if test "$$dir" != "$$file" && test "$$dir" != "."; then \
$(mkinstalldirs) "$(distdir)/$$dir"; \
fi; \
if test -d $$d/$$file; then \
cp -pR $$d/$$file $(distdir) \
|| exit 1; \
else \
test -f $(distdir)/$$file \
|| cp -p $$d/$$file $(distdir)/$$file \
|| exit 1; \
fi; \
done
check-am: all-am
check: check-am
all-am: Makefile $(MANS)
installdirs:
$(mkinstalldirs) $(DESTDIR)$(man1dir) $(DESTDIR)$(man5dir) $(DESTDIR)$(man8dir)
install: install-am
install-exec: install-exec-am
install-data: install-data-am
uninstall: uninstall-am
install-am: all-am
@$(MAKE) $(AM_MAKEFLAGS) install-exec-am install-data-am
installcheck: installcheck-am
install-strip:
$(MAKE) $(AM_MAKEFLAGS) INSTALL_PROGRAM="$(INSTALL_STRIP_PROGRAM)" \
`test -z '$(STRIP)' || \
echo "INSTALL_PROGRAM_ENV=STRIPPROG='$(STRIP)'"` install
mostlyclean-generic:
clean-generic:
distclean-generic:
-rm -f Makefile $(CONFIG_CLEAN_FILES) stamp-h stamp-h[0-9]*
maintainer-clean-generic:
@echo "This command is intended for maintainers to use"
@echo "it deletes files that may require special tools to rebuild."
clean: clean-am
clean-am: clean-generic clean-libtool mostlyclean-am
distclean: distclean-am
distclean-am: clean-am distclean-generic distclean-libtool
dvi: dvi-am
dvi-am:
info: info-am
info-am:
install-data-am: install-man
install-exec-am:
install-info: install-info-am
install-man: install-man1 install-man5 install-man8
installcheck-am:
maintainer-clean: maintainer-clean-am
maintainer-clean-am: distclean-am maintainer-clean-generic
mostlyclean: mostlyclean-am
mostlyclean-am: mostlyclean-generic mostlyclean-libtool
uninstall-am: uninstall-info-am uninstall-man
uninstall-man: uninstall-man1 uninstall-man5 uninstall-man8
.PHONY: all all-am check check-am clean clean-generic clean-libtool \
distclean distclean-generic distclean-libtool distdir dvi \
dvi-am info info-am install install-am install-data \
install-data-am install-exec install-exec-am install-info \
install-info-am install-man install-man1 install-man5 \
install-man8 install-strip installcheck installcheck-am \
installdirs maintainer-clean maintainer-clean-generic \
mostlyclean mostlyclean-generic mostlyclean-libtool uninstall \
uninstall-am uninstall-info-am uninstall-man uninstall-man1 \
uninstall-man5 uninstall-man8
# Tell versions [3.59,3.63) of GNU make to not export all variables.
# Otherwise a system limit (for SysV at least) may be exceeded.
.NOEXPORT:

1
man/fr/adduser.8 Normal file
View File

@ -0,0 +1 @@
.so man8/useradd.8

113
man/fr/chage.1 Normal file
View File

@ -0,0 +1,113 @@
.\" Copyright 1990 - 1994 Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: chage.1,v 1.1 2002/03/10 07:41:04 kloczek Exp $
.\"
.TH CHAGE 1 "1 Novembre 2001"
.SH NOM
chage \- Changer les informations d'expiration du mot de passe d'un
utilisateur.
.SH SYNOPSIS
.TP 6
\fBchage\fR
[\fB-m \fImin\fR] [\fB-M \fImax\fR]
[\fB-d \fIdernier\fR] [\fB-I \fIinactive\fR]
.br
[\fB-E \fIexpire\fR] [\fB-W \fIalerte\fR] \fIutilisateur\fR
.TP 6
\fBchage\fR
\fB-l\fR \fIutilisateur\fR
.SH DESCRIPTION
\fBchage\fR modifie le nombre de jours entre les changements de mot de passe
ainsi que la date du dernier changement.
Cette information est utilisée par le système pour déterminer quand un
utilisateur doit changer son mot de passe.
La commande \fBchage\fR est réservée au Super-utilisateur, sauf pour l'option
\fB-l\fR, qui peut être utilisée par un utilisateur non privilégié pour savoir
quand son mot de passe ou sont compte doit expirer.
.PP
Avec l'option \fB-m\fR, la valeur de \fImin\fR représente le nombre minimum
de jours entre chaque changement de mot de passe.
Une valeur de zéro pour ce champ indique que l'utilisateur peut changer
son mot de passe n'importe quand.
.PP
Avec l'option \fB-M\fR, la valeur de \fImax\fR représente le nombre maximum
de jours pendant lesquels un mot de passe est valide.
Quand \fImax\fR plus \fIdernier\fR est inférieur à la date courante,
l'utilisateur est obligé de changer son mot de passe avant de pouvoir
utiliser son compte.
Cet évènement peut être déclenché plus tôt grâce à l'option \fB-W\fR
qui prévient l'utilisateur à l'avance avec un message d'alerte.
.PP
Avec l'option \fB-d\fR, la valeur \fIdernier\fR est le numéro du
jour depuis le 1er Janvier 1970, où le mot de passe a été changé la
dernière fois.
La date peut aussi être exprimée dans le format YYYY-MM-DD (ou le format
utilisé plus communément dans votre région).
.PP
L'option \fB-E\fR est utilisée pour définir une date à partir de laquelle
le compte de l'utilisateur ne sera plus accessible.
La valeur \fIexpire\fR est le numéro du jour depuis le 1er Janvier 1970
après lequel le compte sera bloqué.
La date peut aussi être exprimée dans un format YYYY-MM-DD (ou le format
plus communément utilisé dans votre région).
Un utilisateur dont le compte est bloqué doit contacter l'administrateur
système pour pouvoir utiliser le système à nouveau.
.PP
L'option \fB-I\fR est utilisée pour définir le nombre de jours d'inactivité,
après qu'un mot de passe a expiré, avant que le compte ne soit bloqué.
Un utilisateur dont le compte est bloqué doit contacter l'administrateur
système avant de pouvoir utiliser le système à nouveau.
La valeur \fIinactive\fR est le nombre de jours d'inactivité. Une valeur
de 0 désactive cette fonction.
.PP
L'option \fB-W\fR est utilisée pour définir le nombre de jours d'alerte
avant que le changement de mot de passe ne soit obligatoire.
La valeur \fIalerte\fR est le nombre de jours précédent l'expiration
pendant lesquels un utilisateur sera prévenu que son mot de passe est
sur le point d'expirer.
.PP
Toutes les valeurs ci-dessus sont stockées au jour près quand le fichier
«\~shadow password\~» est utilisé, mais sont converties en semaines
quand le fichier de mots de passe standard est utilisé.
À cause de cette conversion, des erreurs d'arrondis peuvent apparaître.
.PP
Si aucune de ces options n'est donnée, \fBchage\fR utilise un mode
interactif, demandant confirmation à l'utilisateur pour les valeurs de tous
les champs. Entrez la nouvelle valeur pour changer la valeur du champ, ou
laissez la ligne vide pour utiliser la valeur courante.
La valeur courante est affichée entre crochets.
.SH FICHIERS
/etc/passwd \- informations des comptes utilisateurs.
.br
/etc/shadow \- fichier «\~shadow password\~».
.SH VOIR AUSSI
.BR passwd (5),
.BR shadow (5)
.SH TRADUCTION
Olivier Marin, 2001.

65
man/fr/chpasswd.8 Normal file
View File

@ -0,0 +1,65 @@
.\" Copyright 1991, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: chpasswd.8,v 1.1 2002/03/10 07:41:04 kloczek Exp $
.\"
.TH CHPASSWD 8
.SH NOM
\fBchpasswd\fR - met à jour le fichier de mots de passe par lot
.SH SYNOPSIS
\fBchpasswd [-e]\fR
.SH DESCRIPTION
\fBchpasswd\fR lit un fichier contenant des paires de nom d'utilisateur
et mot de passe depuis l'entrée standard et utilise cette information
pour mettre à jour un groupe d'utilisateurs existants. Sans l'option -e,
les mots de passe fournis doivent être en clair. Si l'option -e est
utilisée, les mots de passe doivent être fournis cryptés. Chaque ligne
est au format
.sp 1
\fInom_d_utilisateur\fR:\fImot_de_passe\fR
.sp 1
L'utilisateur doit exister.
Le mot de passe fourni sera crypté si nécessaire, et l'âge du mot de passe
sera mis à jour, s'il est présent.
.PP
Cette commande est destinée à être utilisée dans un environnement où de nombreux
comptes sont créés en même temps.
.SH AVERTISSEMENTS
.\" The \fBmkpasswd\fR command must be executed afterwards to update the
.\" DBM password files.
Le fichier d'entrée doit être correctement protégé s'il contient des mots de
passe en clair.
.\" This command may be discarded in favor of the newusers(8) command.
.SH VOIR AUSSI
.\" mkpasswd(8), passwd(1), useradd(1)
.BR passwd (1),
.BR useradd (8),
.BR newusers (8)
.SH AUTEUR
Julianne Frances Haugh <jfh@austin.ibm.com>
.SH TRADUCTION
Amand Tihon <amand@alrj.org>

57
man/fr/chsh.1 Normal file
View File

@ -0,0 +1,57 @@
.\"
.\" chsh.1 -- change your login shell
.\" (c) 1994 by salvatore valente <svalente@athena.mit.edu>
.\"
.\" this program is free software. you can redistribute it and
.\" modify it under the terms of the gnu general public license.
.\" there is no warranty.
.\"
.\" $Author: kloczek $
.\" $Revision: 1.1 $
.\" $Date: 2002/03/10 07:41:04 $
.\"
.\" Traduction 22/04/1997 par Christophe Blaess (ccb@club-internet.fr)
.\"
.TH CHSH 1 "22 Avril 1997" Linux "Manuel de l'utilisateur Linux"
.SH NOM
chsh \- Changer le shell appelé à la connexion.
.SH SYNOPSIS
.B chsh
[\ \-s\ shell\ ] [\ \-l\ ] [\ \-u\ ] [\ \-v\ ] [\ utilisateur\ ]
.SH DESCRIPTION
.B chsh
est invoqué pour changer le shell qui est appelé lors de la connexion de
l'utilisateur.
Si aucun shell n'est mentionné sur la ligne de commande,
.B chsh
va en réclamer un.
.SH SHELLS VALIDES
.B chsh
acceptera le nom complet (avec chemin d'accès) de tout fichier exécutable
sur le système. Néanmoins, il affichera un message d'avertissement si le
shell n'est pas mentionné dans le fichier
.IR /etc/shells .
.SH OPTIONS
.TP
.I "\-s, \-\-shell"
Indiquer le shell de connexion désiré.
.TP
.I "\-l, \-\-list-shells"
Afficher la liste des shells mentionnés dans
.I /etc/shells
puis quitter.
.TP
.I "\-u, \-\-help"
Afficher un message d'aide puis quitter.
.TP
.I "-v, \-\-version"
Afficher un numéro de version, puis quitter.
.SH "VOIR AUSSI"
.BR login (1),
.BR passwd (5),
.BR shells (5)
.SH AUTEURS
Salvatore Valente <svalente@mit.edu>
.SH TRADUCTION
Christophe Blaess, 1997.

60
man/fr/faillog.5 Normal file
View File

@ -0,0 +1,60 @@
.\" Copyright 1989 - 1994, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.TH FAILLOG 5
.SH NOM
faillog \- Fichier de trace d'échecs de login
.SH DESCRIPTION
.I faillog
maintient le décompte des échecs de login et la limite associés à
chaque compte. Ce fichier est à enregistrements de taille fixe,
indexés par l'UID numérique. Chaque enregistrement contient le nombre
d'échecs de login depuis la dernière réussite, le nombre maximum
d'échecs avant que le compte ne soit désactivé, la ligne sur laquelle
le dernier échec de login a eu lieu et la date du dernier échec de
login\&.
.PP
La structure des enregistrements est la suivante\ :
.DS
struct faillog {
short fail_cnt;
short fail_max;
char fail_line[12];
time_t fail_time;
};
.DE
.SH FICHIERS
/var/log/faillog \- Fichier de trace d'échecs de login
.SH VOIR AUSSI
.BR faillog (8)
.SH AUTEUR
Julianne Frances Haugh <jfh@austin.ibm.com>
.SH TRADUCTION
Pascal Terjan <CMoi@tuxfamily.org>

69
man/fr/gpasswd.1 Normal file
View File

@ -0,0 +1,69 @@
.\" Copyright 1996, Rafal Maszkowski, rzm@pdi.net
.\" All rights reserved. You can redistribute this man page and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of the
.\" License, or (at your option) any later version.
.\"
.\" $Id: gpasswd.1,v 1.1 2002/03/10 07:41:04 kloczek Exp $
.\"
.TH GPASSWD 1
.SH NOM
gpasswd \- administre le fichier /etc/group
.br
.SH SYNOPSIS
.B gpasswd \fIgroupe\fR
.br
.B gpasswd
.B -a
\fIutilisateur\fR \fIgroupe\fR
.br
.B gpasswd
.B -d
\fIutilisateur\fR \fIgroupe\fR
.br
.B gpasswd
.B -R
\fIgroupe\fR
.br
.B gpasswd
.B -r
\fIgroupe\fR
.br
.B gpasswd
.RB [ -A
\fIutilisateur\fR,...]
.RB [ -M
\fIutilisateur\fR,...]
\fIgroupe\fR
.br
.SH DESCRIPTION
.B gpasswd
est utilisé pour administrer le fichier /etc/group (ainsi que le fichier /etc/gshadow
si l'option SHADOWGRP a été définie lors de la compilation).
Chaque groupe peut avoir des administrateurs, des membres ainsi qu'un mot de passe.
Les administrateurs systèmes possèdent les droits d'administrateur de groupe et de membre, il peuvent utiliser l'option \fB-A\fR pour définir le(s) administrateur(s) de groupe et l'option \fB-M\fR pour en définir les membres
.PP
Un administrateur de groupe peut ajouter ou supprimer des utilisateurs en utilisant respectivement les options \fB-a\fR et \fB-d\fR . Les administrateurs peuvent utiliser l'option \fB-r\fR pour supprimer le mot de passe d'un groupe. Lorsque aucun mot de passe n'est défini, seul les membres d'un groupe peuvent utiliser
.BR newgrp (1)
pour en faire partie. L'option \fB-R\fR désactive l'accès au groupe via la commande
.BR newgrp (1)
.PP
.B gpasswd
exécuté par un administrateur de groupe suivit d'un nom de groupe, affiche simplement l'invite de changement de mot de passe du groupe. Si un mot de passe est défini alors seul les membres du groupe peuvent utiliser la commande
.BR newgrp (1)
sans entrer de mot de passe, les non-membres doivent le fournir.
.SH FICHIERS
/etc/group \- Identification des groupes
.br
/etc/gshadow \- Identification masquée des groupes
.SH VOIR AUSSI
.BR newgrp (1),
.BR groupadd (8),
.BR groupdel (8),
.BR groupmod (8),
.BR grpck (8)
.br
.SH TRADUCTION
Maxime Mastin, 2001.

37
man/fr/groups.1 Normal file
View File

@ -0,0 +1,37 @@
.\" Traduction 09/01/1997 par Christophe Blaess (ccb@club-internet.fr)
.\"
.TH GROUPS 1L "9 Janvier 1997" FSF "Manuel de l'utilisateur Linux"
.SH NOM
groups \- Afficher les groupes auxquels appartient un utilisateur.
.SH SYNOPSIS
.B groups
[utilisateur...]
.br
.B groups
{\-\-help,\-\-version}
.SH DESCRIPTION
Cette page de manuel documente la version GNU de
.BR groups .
.B groups
affiche le noms des groupes supplémentaires de chaque
.IR utilisateur
indiqué, ou ceux du processus en cours si rien n'est précisé.
Si plusieurs utilisateurs sont mentionnés, le nom de chacun d'entre
eux est affiché avant la liste de ses groupes.
.PP
La liste des groupes est équivalente au résultat de la commande `id \-Gn'.
.SS OPTIONS
Quand la version GNU de
.B groups
est invoquée avec un seul argument, les options suivantes sont reconnues :
.TP
.I "\-\-help"
Afficher un message d'aide sur la sortie standard et terminer normalement.
.TP
.I "\-\-version"
Afficher un numéro de version sur la sortie standard et terminer normalement.
.SH TRADUCTION
Christophe Blaess, 1997.

32
man/fr/newgrp.1 Normal file
View File

@ -0,0 +1,32 @@
.\" Original author unknown. This man page is in the public domain.
.\" Modified Sat Oct 9 17:46:48 1993 by faith@cs.unc.edu
.TH NEWGRP 1 "9 October 1993" "Linux 1.2" "Manuel du Programmeur Linux"
.SH NOM
newgrp \- se connecter sous un nouveau groupe
.SH SYNOPSIS
.BI "newgrp [ " groupe " ]"
.SH DESCRIPTION
.B Newgrp
change le groupe de l'appelant, de la même manière que
.BR login (1).
Le même utilisateur reste connecté, et le répertoire courant
reste inchangé, mais l'évaluation des droits d'accès aux fichiers
se fait en fonction du nouvel identifiant de groupe.
.LP
Si aucun groupe n'est spécifié, le GID est échangé pour celui du login initial.
.LP
.SH FICHIERS
.I /etc/group
.br
.I /etc/passwd
.SH "VOIR AUSSI"
.BR login "(1), " group (5)
.SH AUTEUR
Version originale par Michael Haardt. Désormais maintenu par
Peter Orbaek (poe@daimi.aau.dk).
.SH TRADUCTION
Sébastien Mahé, 2001

162
man/fr/passwd.1 Normal file
View File

@ -0,0 +1,162 @@
.\" Copyright Red Hat Software, Inc., 1998, 1999.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, and the entire permission notice in its entirety,
.\" including the disclaimer of warranties.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. The name of the author may not be used to endorse or promote
.\" products derived from this software without specific prior
.\" written permission.
.\"
.\" ALTERNATIVELY, this product may be distributed under the terms of
.\" the GNU Public License, in which case the provisions of the GPL are
.\" required INSTEAD OF the above restrictions. (This clause is
.\" necessary due to a potential bad interaction between the GPL and
.\" the restrictions contained in a BSD-style copyright.)
.\"
.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
.\" WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
.\" DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
.\" INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
.\" (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
.\" SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
.\" STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
.\" OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.\" Copyright (c) Cristian Gafton, 1998, <gafton@redhat.com>
.\"
.\" Traduction 21/08/2000 par Frédéric Delanoy (fdelanoy@info.fundp.ac.be)
.\"
.TH PASSWD 1 "21 Août 2000" PAM "Manuel de l'utilisateur Linux"
.SH NOM
passwd \- mettre à jour les marques d'authentification d'un utilisateur.
.SH SYNOPSIS
.B passwd [-k] [-l] [-u [-f]] [-d] [-S] [nom_utilisateur]
.sp 2
.SH DESCRIPTION
Passwd est utilisé pour mettre à jour la (les) marque(s) d'authentification d'un utilisateur. Passwd est configuré pour travailler grâce à l'
.BR "API Linux-PAM" ". "
Il s'initialise principalement en tant que service "passwd" avec
.I Linux-PAM
et utilise les modules
.I "password"
configurés pour authentifier et ensuite mettre à jour le mot de passe d'un utilisateur.
.sp
Une entrée du fichier de configuration de
.I Linux-PAM
pour ce service serait :
.br
.br
#
.br
# entrée de service de mot de passe effectuant une
.br
# vérification de force d'un mot de passe
.br
# proposé avant de le mettre à jour.
.br
#
.br
passwd password requisite \\
.br
/usr/lib/security/pam_cracklib.so retry=3
.br
passwd password required \\
.br
/usr/lib/security/pam_pwdb.so use_authtok
.br
#
.sp
Notez qu'aucun autre type de module n'est requis pour le fonctionnement correct de cette application.
.SH OPTIONS
.IP \fB-k\fR
L'option,
.BR -k ", "
est utilisée pour indiquer que la mise à jour ne devrait être effectuée que pour les marques d'identifications (mots de passe); l'utilisateur conserve ses marques non expirés.
.IP \fB-l\fR
Cette option est utilisé pour verrouiller le compte spécifié, et n'est disponible que pour root. Le verrouillage est effecuté en rendant le mot de passe crypté invalide (en le préfixant par un !).
.IP \fB--stdin\fR
Cette option est utilisée pour indiquer que \fBpasswd\fR doit lire le nouveau mot de passe à partir de l'entrée standard, qui peut être un tube.
.IP \fB-u\fR
L'inverse de l'option précédente - il déverrouillera le mot de passe du compte en supprimant le préfixe "!". Cette option n'est disponible que pour root. Par défaut, \fBpasswd\fR refusera de créer un compte sans mot de passe associé (il ne déverrouillera pas un compte contenant uniquement ! pour mot de passe). L'option \fB-f\fR outrepassera cette protection.
.IP \fB-d\fR
C'est une façon rapide pour désactiver un mot de passe pour un compte. Il supprimera le besoin du mot de passe pour un compte donné. Disponible uniquement pour root.
.IP \fB-S\fR
Cela affiche une information courte sur le statut du mot de passe pour un compte donné. Disponible uniquement pour root.
.SH "Rappelez-vous les deux principes suivants"
.IP \fBProtégez\ votre\ mot de passe.\fR
N'écrivez nulle part votre mot de passe - mémorisez-le. En particulier, ne le laissez pas n'importe où et ne le placez pas non plus dans un fichier non crypté ! Utilisez des mots de passe non reliés sur des systèmes contrôlés par différentes organisations. Ne divulguez ni ne partagez votre mot de passe, en particulier à quelqu'un disant prétendant faire partie d'un support technique, ou à un vendeur. Ne laissez personne regarder votre mot de passe pendant que vous le tapez. N'entrez pas votre mot de passe sur un ordinateur auquel vous ne faites pas confiance, ou si les "choses" ont l'air amusantes; quelqu'un pourrait être en train d'essayer de détourner votre mot de passe. Utilisez votre mot de passe pour une période limitée et modifiez-le périodiquement.
.IP \fBChoisisser un mot de passe difficile à deviner.\fR
.I passwd
essaiera de vous empêcher de choisir un mot de passe réellemnt mauvais, mais il n'est pas infaillible; créez votre mot de passe sagement. N'utilisez rien que vous pouvez trouver dans un dictionnaire (dans n'importe quel langue ou jargon). N'utilisez pas de nom (incluant celui d'un conjoint, d'un parent, d'un enfant, d'un animal domestique, d'un personnage imaginaire, d'un personnage célèbre, ou d'un endroit connu), ou de variation sur votre nom personnel ou de compte. N'utilisez aucune information personnelle qui soit accessible (comme votre numéro de téléphone, votre plaque d'immatriculation ou votre numéro de sécurité sociale), ou sur les personnes de votre entourage. N'utilisez pas une date d'anniversaire ou un motif simple comme "azerty", "qwerty", "abc" ou "aaa"). N'utilisez aucun élément cité ci-dessus suivi ou précédé par un chiffre. Au lieu de cela, utilisez un mélange de lettres minuscules et majuscules, de chiffres et de signes de ponctuation. Utiliseez des mots de passe longs (disons d'au moins 8 caractères). Vous pourriez utiliser une paire de mots avec un signe de ponctuation inséré, une phrase de passe (une séquence de mots compréhensible), ou la première lettre de chaque mot dans une phrase de passe.
.SH ""
Ces principes sont partiellement imposés par le système, mais uniquement partiellement. Une certaine vigilance de votre côté rendra le système beaucoup plus sûr.
.SH "VALEUR DE RETOUR"
En cas de succès,
.B passwd
se terminera avec une valeur de retour de 0. Une valeur de retour de 1 indique qu'une erreur s'est produite. Les erreurs textuelles sont écrites dans le flux d'erreur standard.
.SH "CONFORMITÉ À"
.br
.BR Linux-PAM
(Pluggable Authentication Modules pour Linux).
.br
Notez que si votre distribution de Linux-PAM se conforme au Standard de Système de fichiers de Linux, vous pouvez trouver les modules dans
.I /lib/security/
au lieu de /usr/lib/security/, comme indiqué dans l'exemple.
.SH "FICHIERS"
.br
.B /etc/pam.d/passwd
- le fichier de configuration de
.BR Linux-PAM
.SH BOGUES
.sp 2
Inconnus.
.SH "VOIR AUSSI"
.BR pam "(8), "
et
.BR pam_chauthok "(2). "
.sp
Pour des informations plus complètes sur la façon de configurere cette application avec
.BR Linux-PAM ", "
voyez le
.BR "Linux-PAM System Administrators' Guide" " at "
.br
.I "<http://parc.power.net/morgan/Linux-PAM/index.html>"
.SH AUTEUR
Cristian Gafton <gafton@redhat.com>
.SH TRADUCTION
Frédéric Delanoy, 2000.

149
man/fr/passwd.5 Normal file
View File

@ -0,0 +1,149 @@
.\" Copyright (c) 1993 Michael Haardt (u31b3hs@pool.informatik.rwth-aachen.de), Fri Apr 2 11:32:09 MET DST 1993
.\"
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
.\"
.\" The GNU General Public License's references to "object code"
.\" and "executables" are to be interpreted as the output of any
.\" document formatting or typesetting system, including
.\" intermediate and printed output.
.\"
.\" This manual is distributed in the hope that it will be useful,
.\" but WITHOUT ANY WARRANTY; without even the implied warranty of
.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
.\" License along with this manual; if not, write to the Free
.\" Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139,
.\" USA.
.\"
.\" Modified Sun Jul 25 10:46:28 1993 by Rik Faith (faith@cs.unc.edu)
.\" Modified Sun Aug 21 18:12:27 1994 by Rik Faith (faith@cs.unc.edu)
.\" Modified Sun Jun 18 01:53:57 1995 by Andries Brouwer (aeb@cwi.nl)
.\"
.\" Traduction 17/10/1996 par Christophe Blaess (ccb@club-internet.fr)
.\" Mise à jour 18/05/1998 (LDP-man-pages-1.19)
.\"
.TH PASSWD 5 "18 Mai 1998" Linux "Manuel de l'administrateur Linux"
.SH NOM
passwd \- Fichier des mots de passe.
.SH DESCRIPTION
.B Passwd
est un fichier de texte qui contient la liste des comptes sur le système,
ainsi que des informations utiles sur ces comptes, comme l'identification
de l'utilisateur, du groupe, le répertoire personnel, le shell, etc.
Souvent, ce fichier contient également le mot de passé chiffré de l'utilisateur.
Le fichier des mots
de passe doit permettre la lecture par tout le monde (de nombreux
utilitaires comme
.IR ls (1)
l'utilisent pour convertir les UID en noms d'utilisateur).
Par contre seul le Super\-User doit disposer de droits d'écriture sur
le fichier.
Au bon vieux temps, aucun problème de sécurite ne se posait avec ce
droit de lecture général. Chacun pouvait consulter les mots de passe
cryptés, mais le matériel était trop lent pour pouvoir décrypter un
mot de passe bien choisi. De plus le principe de base d'Unix reposait
sur une communaute soudée d'utilisateurs sans intentions néfastes.
Actuellement, il est de plus en plus recommandé d'utiliser des
systèmes de masquage des mots de passe, comme
.BR shadow
avec lequel le fichier
.I /etc/passwd
contient des * à la place des mots de passe, et où ces derniers sont
stockés sous forme cryptée dans
.I /etc/shadow
qui n'est lisible que par le Super-utilisateur.
Que le masquage des mots de passe soit utilisé ou non, de nombreux
administrateurs systèmes utilisent un astérique dans le champ
'mot de passe' pour s'assurer que l'utilisateur en question ne
pouirra pas se connecter (Voir le paragrahe Notes plus bas).
Si vous devez créer un nouvel utilisateur, placez un astérique dans le champ
'mot de passe', puis utilisez la commande \fBpasswd\fP(1) pour le mettre à jour.
Si la racine du système de fichiers est sur un disque RAM, vous devez penser
à copier sur le disque physique les modifications du fichier des mots de passe
avant d'arrêter le systeme. Vous devez également vérifier à ce moment les
droits d'accès au fichier.
Si vous désirez créer des groupes d'utilisateurs, leur champ GID doivent
correspondre à une entree du fichier
.IR /etc/group (5).
Il doit y avoir, dans le fichier des mots de passe, une ligne par utilisateur,
avec le format suivant :
.sp
.RS
account:passwd:UID:GID:GECOS:directory:shell
.RE
.sp
Les divers champs sont les suivants :
.sp
.RS
.TP 1.0in
.I account
Le nom que l'utilisateur utilisera pour se connecter, il ne devrait normalement
pas contenir de majuscules
.TP
.I password
La représentation encryptée (optionnelle) du mot de passe.
.TP
.I UID
L'ID numérique de l'utilisateur.
.TP
.I GID
L'ID numérique du groupe principal de l'utilisateur.
.TP
.I GECOS
Ce champ est optionnel et n'a qu'un rôle informatif. Il contient généralement
le nom complet de l'utilisateur. GECOS signifie "General Electric Comprehensive
Operating System", qui fut renommé GCOS quand la division "gros systèmes" de
General Electric a été vendue a Honeywell. Dennis Ritchie raconte:
"Il arrivait que l'on envoie des sortie d'impression ou des résultats de
traitements différés vers une machine GCOS. Le champ GCOS du fichier password
était un endroit classique pour glisser des informations dans la carte
$IDENT. Pas très élégant..."
.TP
.I directory
Le répertoire de connexion de l'utilisateur (variable d'
.IR environnement (5)
$HOME).
.TP
.I shell
Le programme à exécuter après la phase de connexion (par défaut
.IR /bin/sh ).
Si ce fichier n'existe pas, l'utilisateur ne pourra pas se connecter avec
.BR login (1).
.RE
.SH NOTES
Si vous désirez créer des groupes d'utilisateurs, leurs champs GIDs doivent
être identiques, et il doit y avoir une entrée correspondante dans le fichier
.IR /etc/group .
Si le mot de passe crypté est rempli avec un astérisque, l'utilisateur ne
pourra pas se connecter avec
.BR login (1),
mais pourra toujours le faire avec
.BR rlogin (1),
lancer des processus en utilisant
.BR rsh (1),
.BR cront (1),
.BR at (1),
ou des filtres de courrier, etc...
La modification du champ "Shell" a généralement les mêmes effets, et autorise
toujours l'utilisation de
.BR su (1).
.SH FICHIERS
.I /etc/passwd
.SH "VOIR AUSSI"
.BR passwd "(1), " login "(1), " group "(5), " shadow (5).
.SH TRADUCTION
Christophe Blaess, 1997.

92
man/fr/shadow.5 Normal file
View File

@ -0,0 +1,92 @@
.\" Copyright 1989 - 1990, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: shadow.5,v 1.1 2002/03/10 07:41:04 kloczek Exp $
.\"
.TH SHADOW 5
.SH NOM
shadow \- fichiers de mots de passe cryptés
.SH DESCRIPTION
.I /etc/shadow
contient les mots de passe cryptés des utilisateurs [ Ndt : plus exactement, le résultat du cryptage d'une chaîne de longueur nulle
avec le mot de passe comme clé de cryptage ] ainsi qu'éventuellement des informations sur l'âge des mots de passe :
.IP "" .5i
Nom de login
.IP "" .5i
mot de passe crypté
.IP "" .5i
Nombre de jours écoulés depuis le 1er janvier 1970 jusqu'au dernier changement de mot de passe
.IP "" .5i
Nombre de jours durant lesquels le mot de passe est encore valide
.IP "" .5i
Nombre de jours après lesquels le mot de passe doit être changé
.IP "" .5i
Nombre de jours avant l'expiration du mot de passe impliquant l'avertissement de l'utilisateur
.IP "" .5i
Nombre de jours après l'expiration provoquant la desactivation du compte
.IP "" .5i
Numéro du jour depuis le 1er janvier 1970 à partir duquel le compte a été désactivé
.IP "" .5i
Champs réservé
.PP
Le champs
.I mot de passe
doit être rempli.
Le mot de passe crypté comprend 13 à 24 caractères pris dans
l'alphabet réduit a-z, A-Z, 0-9, \. et /.
Consultez \fBcrypt\fR(3) pour plus d'information sur le traitement de cette chaîne.
.PP
La date de dernière modification du mot de passe est donné par le nNombre de jours écoulés depuis le 1er janvier 1970 jusqu'au dernier changement de mot de passe.
Le mot de passe ne peut être changé jusqu'à ce que le nombre de jours indiqués soit écoulé, et doit être changé après que le nombre maximum de jours indiqué.
Si le nomnre minimum de jours requis est plus grand que le nombre maximum de jours de vailidé, ce mot de passe
.B ne peut pas
être changé par l'utilisateur.
.PP
Un compte est considéré comme inactif et est désactivé si le mot de passe n'est pas changé dans l'intervalle spécifié après l'expiration du mot de passe.
Un compte est également désactivé le jours indiqué quelque soit les autres informations d'expiration.
.PP
Cette information est prioritaire sur toutes les autres champs présents dans \fI/etc/passwd\fR.
.PP
Ce fichier \fBne doit pas être\fR accessible en lecture par les utilisateurs normaux afin de maintenir la sécurité des mots de passe, en particuliers contre les attaques aux dictionnaires.
.SH FICHIERS
/etc/passwd - information sur les comptes des utilisateurs
.br
/etc/shadow - mots de passe cryptés des utilisateurs
.SH VOIR AUSSI
.BR chage (1),
.BR login (1),
.BR passwd (1),
.BR su (1),
.BR sulogin (8),
.BR shadow (3),
.BR passwd (5),
.BR pwconv (8),
.BR pwunconv (8)
.SH AUTEUR
Julianne Frances Haugh (jfh@tab.com)
.SH TRADUCTION
.RI "Thierry Vignaud <" tvignaud@mandrakesoft.com ">, 1999"

161
man/fr/useradd.8 Normal file
View File

@ -0,0 +1,161 @@
.\" Copyright 1991 - 1994, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: useradd.8,v 1.1 2002/03/10 07:41:04 kloczek Exp $
.\"
.\" Traduction 26/09/00 par Frédéric Delanoy (fdelanoy@info.fundp.ac.be)
.\"
.TH USERADD 8
.SH NOM
useradd \- Créer un nouvel utilisateur ou mettre à jour l'information par défaut sur un nouvel utilisateur
.SH SYNOPSIS
.TP 8
.B useradd
.\" .RB [ -A
.\" .RI { method | \fBDEFAULT\fR "},... ]"
.RB [ -c
.IR commentaire ]
.RB [ -d
.IR rép_perso ]
.br
.RB [ -e
.IR date_expiration ]
.RB [ -f
.IR inactive_time ]
.br
.RB [ -g
.IR groupe_initial ]
.RB [ -G
.IR groupe [,...]]
.br
.RB [ -m " [" -k
.IR rép_squelette ] " |" " " -M ]
.RB [ -p
.IR mot_de_passe ]
.br
.RB [ -s
.IR shell ]
.RB [ -u
.IR uid " ["
.BR -o ]]
.RB [ -n ]
.RB [ -r ]
.I login
.TP 8
.B useradd
\fB-D\fR
[\fB-g\fI groupe_défaut\fR]
[\fB-b\fI rép_perso_défaut\fR]
.br
[\fB-f\fI inactivité\fR]
[\fB-e\fI date_expiration_défaut\fR]
.br
[\fB-s\fI shell_défaut\fR]
.SH DESCRIPTION
.SS Création de nouveaux utilisateurs
Quand elle est invoquée sans l'option \fB-D\fR, la commande \fBuseradd\fR crée un nouveau compte utilisateur qui utilise les valeurs spécifiées sur la ligne de commandes, et les valeurs par défaut du système. Le nouveau compte utilisateur sera inséré dans les fichiers du système quand c'est nécessaire, le répertoire personnel sera créé, et les fichiers initiaux copiés, cela dépendant des options présentes en ligne de commandes. La version fournie avec Red Hat Linux crée un groupe pour chaque utilisateur ajouté au système, à moins que l'option \fB-n\fR ne soit fournie. Les options qui s'appliquent à la commande \fBuseradd\fR sont :
.\" .IP "\fB-A {\fImethod\fR|\fBDEFAULT\fR},..."
.\" The value of the user's authentication method.
.\" The authentication method is the name of a program which is responsible
é.\" for validating the user's identity.
.\" The string \fBDEFAULT\fR may be used to change the user's authentication
.\" method to the standard system password method.
.\" This is a comma-separated list of program names.
.\" It may include \fBDEFAULT\fR exactly once.
.IP "\fB-c \fIcommentaire\fR"
Le champ de commentaire du fichier de mots de passe du nouvel utilisateur.
.IP "\fB-d \fIrép_perso\fR"
Le nouvel utilisateur sera créé en utilisant \fIrép_perso\fR comme valeur du répertoire de connexion de l'utilisateur. Le comportement par défaut est de concaténer le nom de \fIlogin\fR au \fIrép_perso_défaut\fR, et de l'utiliser en tant que nom de répertoire de connexion.
.IP "\fB-e \fIdate_expiration\fR"
La date à laquelle le compte de l'utilisateur sera désactivé. La date est spécifiée dans le format \fIAAAA-MM-JJ\fR.
.IP "\fB-f \fIjours_inactifs\fR"
Le nombre de jours suivant l'expiration d'un mot de passe après lequel le compte est définitivement désactivé. Une valeur de 0 désactive le compte dès que le mot de passe a expiré, et une valeur de -1 désactive cette caractéristique. La valeur par défaut est de -1.
.IP "\fB-g \fIgroupe_initial\fR"
Le nom du groupe ou le numéro du groupe de connexion initial de l'utilisateur. Le nom du groupe doit exister. Un numéro de groupe doit se référer à un groupe préexistant. Le numéro de groupe par défaut est de 1.
.IP "\fB-G \fIgroupe,[...]\fR"
Une liste de groupes supplémentaires auxquels fait également partie l'utilisateur. Chaque groupe est séparé du suivant par une virgule, sans espace entre les deux. Les groupes sont soumis aux mêmes restrictions que celui donné avec l'option \fB-g\fR. Le comportement par défaut pour l'utilisateur est de n'appartenir qu'au groupe initial.
.IP \fB-m\fR
Le répertoire personnel de l'utilisateur sera créé s'il n'existe pas déjà. Les fichiers contenus dans \fIrép_squelette\fR seront copiés dans le répertoire personnel si l'option \fB-k\fR est employée; sinon, les fichiers contenus dans \fIrép_squelette\fR seront utilisés à la place. Tous les répertoires contenus dans \fIrép_squelette\fR ou dans \fI/etc/skel\fR seront également créés dans le répertoire personnel de l'utilisateur. L'option \fB-k\fR n'est valide qu'en conjonction avec l'option \fB-m\fR. Le comportement par défaut est de ne pas créer le répertoire, et de ne copier aucun fichier.
.IP \fB-M\fR
Le répertoire personnel de l'utilisateur ne sera pas créé, même si les réglages globaux au système présents dans \fI/etc/login.defs\fR consistent en la création de répertoires personnels.
.IP \fB-n\fR
Un groupe de même nom que l'utilisateur ajouté au système sera créé par défaut. Cette option désactivera ce comportement spécifique de Red Hat Linux.
.IP \fB-r\fR
Cette option est utilisée pour créer un compte système, çàd un utilisateur avec un UID plus petit que la valeur de UID_MIN définie dans
\fI/etc/login.defs\fR. Notez que \fBuseradd\fR ne créera pas de répertoire personnel pour un tel utilisateur, et ce quel que soit le réglage par défaut présent dans \fI/etc/login.defs\fR. Vous devez spécifier l'option \fB-m\fR si vous désirez la création d'un répertoire personnel pour un tel utilisateur. C'est une option ajoutée par Red Hat.
.IP "\fB-p \fImot_de_passe\fR"
Le mot de passe crypté, comme renvoyé par \fBcrypt\fR(3). Le comportement par défaut est de désactiver le compte.
.IP "\fB-s \fIshell\fR"
Le nom du shell de connexion de l'utilisateur. Le comportement par défaut est de laisser ce compte vide, ce qui fait sélectionner au système le shell de connexion par défaut.
.IP "\fB-u \fIuid\fR"
La valeur numérique de l'ID de l'utilisateur. Cette valeur doit être unique, à moins que l'option \fI-o\fR ne soit utilisée. La valeur doit être non négative. Le comportement par défaut est d'utiliser la plus petite valeur d'ID plus grande que 99, et plus grande que celle de n'importe quel autre utilisateur. Les valeurs comprises entre 0 et 99 sont typiquement réservées pour les comptes systèmes.
.SS Modifier les valeurs par défaut.
Quand il est invoqué avec l'option \fB-D\fR, \fBuseradd\fR soit affichera les valeurs actuelles par défaut, soit mettra à jour les valeurs par défaut via la ligne de commandes. Les options valides sont
.IP "\fB-b \fIrép_perso\fR"
Le préfixe de chemin initial pour un nouveau répertoire personnel d'utilisateur. Le nom de l'utilisateur sera suffixé à la fin de \fIrép_perso\fR pour créer le nom du nouveau répertoire si l'option \fB-d\fI n'est pas utilisée pendant la création d'un nouveau compte.
.IP "\fB-e \fIdate_expiration_défaut\fR"
La date à laquelle le compte utilisateur sera désactivé.
.IP "\fB-f \fIinactivité\fR"
Le nombre de jours après l'expiration d'un mot de passe avant que le compte ne soit désactivé.
.IP "\fB-g \fIgroupe_défaut\fR"
Le nom de groupe ou l'ID du groupe initial d'un nouvel utilisateur. Le groupe nommé doit exister, et un ID de groupe numérique doit déjà exister en tant qu'ID de groupe.
.IP "\fB-s \fIshell_défaut\fR"
Le nom du shell de connexion d'un nouvel utilisateur. Le programme nommé sera utilisé pour tous les futurs nouveaux comptes.
.PP
Si aucune option n'est spécifiée, \fBuseradd\fR affichera les valeurs par défaut du moment.
.SH NOTES
L'administrateur système est responsable du placement des fichiers d'utilisateur par défaut dans le répertoire \fI/etc/skel\fR.
.br
Cette version de \fIuseradd\fR a été modifiée par Red Hat pour se conformer à la convention utilisateur/groupe de RedHat.
.SH INCONVÉNIENTS
Vous ne pouvez pas ajouter d'utilisateur à un groupe NIS. Cela doit être effectué sur le serveur NIS.
.SH FICHIERS
\fB/etc/passwd\fR - information sur les comptes utilisateurs
.br
\fB/etc/shadow\fR - information sécurisée sur les comptes utilisateurs
.br
\fB/etc/group\fR - information de groupes
.br
\fB/etc/default/useradd\fR - information par défaut
.br
\fB/etc/login.defs\fR - réglages globaux du système
.br
\fB/etc/skel\fR - répertoire contenant les fichiers utilisés par défaut
.SH "VOIR AUSSI"
.BR chfn (1),
.BR chsh (1),
.BR crypt (3),
.BR groupadd (8),
.BR groupdel (8),
.BR groupmod (8),
.BR passwd (1),
.BR userdel (8),
.BR usermod (8)
.SH AUTEUR
Julianne Frances Haugh (jfh@bga.com)
.SH TRADUCTION
Frédéric Delanoy, 2000.

64
man/fr/userdel.8 Normal file
View File

@ -0,0 +1,64 @@
.\" Copyright 1991 - 1994, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: userdel.8,v 1.1 2002/03/10 07:41:04 kloczek Exp $
.\"
.\" Traduction 27/09/2000 par Frédéric Delanoy (fdelanoy@info.fundp.ac.be)
.\"
.TH USERDEL 8
.SH NOM
userdel \- Effacer un compte utilisateur et les fichiers associés
.SH SYNOPSIS
.B userdel
[\fB-r\fR]
.I login
.SH DESCRIPTION
La commande \fBuserdel\fR modifie les fichiers des comptes du système, en supprimant toutes les entrées qui se réfèrent à \fIlogin\fR. L'utilisateur nommé doit exister.
.SH OPTIONS
.IP \fB-r\fR
Les fichiers présents dans le répertoire personnel de l'utilisateur seront supprimés en même temps que le répertoire lui-même. Les fichiers situés dans d'autres systèmes de fichiers devront être recherchés et éliminés manuellement.
.SH FICHIERS
/etc/passwd - information sur les comptes utilisateurs
.br
/etc/shadow - information sécurisée sur les comptes utilisateurs
.br
/etc/group - information de groupes
.SH INCONVÉNIENTS
\fBuserdel\fR ne vous permet pas de supprimer un compte si l'utilisateur en question est actuellement connecté. Vous devez tuer tous les processus en cours d'exécution appartenant à l'utilisateur possédant le compte que vous êtes en train de supprimer. Vous ne pouvez pas supprimer d'attribut NIS d'un client NIS. Cela doit être effectué sur le serveur NIS.
.SH "VOIR AUSSI"
.BR chfn (1),
.BR chsh (1),
.BR groupadd (8),
.BR groupdel (8),
.BR groupmod (8),
.BR passwd (1),
.BR useradd (8),
.BR usermod (8)
.SH AUTEUR
Julianne Frances Haugh (jfh@bga.com)
.SH TRADUCTION
Frédéric Delanoy, 2000.

124
man/fr/usermod.8 Normal file
View File

@ -0,0 +1,124 @@
.\" Copyright 1991 - 1994, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: usermod.8,v 1.1 2002/03/10 07:41:04 kloczek Exp $
.\"
.\" Traduction 27/09/2000 par Frédéric Delanoy (fdelanoy@info.fundp.ac.be)
.\"
.TH USERMOD 8
.SH NOM
usermod \- modifier un compte utilisateur
.SH SYNOPSIS
.TP 8
.B usermod
.\" .RB [ -A
.\" .RI { method | \fBDEFAULT\fR "},... ]"
.RB [ -c
.IR commentaire ]
.RB [ -d
.IR rép_perso " ["
.BR -m ]]
.br
.RB [ -e
.IR date_expiration ]
.RB [ -f
.IR inactivité ]
.br
.RB [ -g
.IR groupe_initial ]
.RB [ -G
.IR groupe [,...]]
.br
.RB [ -l
.IR nom_connexion ]
.RB [ -p
.IR mot_de_passe ]
.br
.RB [ -s
.IR shell ]
.RB [ -u
.IR uid " ["
.BR -o ]]
.RB [ -L | -U ]
.I login
.SH DESCRIPTION
La commande \fBusermod\fR modifie les fichiers des comptes du système pour refléter les modifications qui ont été spécifiées sur la ligne de commandes. Les options qui s'appliquent à la commande \fBusermod\fR sont
.\" .IP "\fB-A \fImethod\fR|\fBDEFAULT\fR"
.\" The new value of the user's authentication method.
.\" The authentication method is the name of a program which is responsible
.\" for validating the user's identity.
.\" The string \fBDEFAULT\fR may be used to change the user's authentication
.\" method to the standard system password method.
.IP "\fB-c \fIcommentaire\fR"
La nouvelle valeur du fichier du champ de commentaire du fichier de mot de passe de l'utilisateur. Il est normalement modifié en utilisant l'utilitaire \fBchfn\fR(1).
.IP "\fB-d \fIrép_perso\fR"
Le nouveau répertoire de connexion de l'utilisateur. Si l'option \fB-m\fR est fournie, le contenu du répertoire personnel actuel sera déplacé dans le nouveau répertoire personnel, qui sera créé si nécessaire.
.IP "\fB-e \fIdate_expiration\fR"
La date à laquelle le compte utilisateur sera désactivé. La date est spécifiée dans le format \fIAAAA-MM-JJ\fR.
.IP "\fB-f \fIjours_inactifs\fR"
Le nombre de jours suivant l'expiration d'un mot de passe après lequel le compte est définitivement désactivé. Une valeur de 0 désactive le compte dès que le mot de passe a expiré, et une valeur de -1 désactive cette caractéristique. La valeur par défaut est de -1.
.IP "\fB-g \fIgroupe_initial\fR"
Le nom du groupe ou le numéro du groupe de connexion initial de l'utilisateur. Le nom du groupe doit exister. Un numéro de groupe doit se référer à un groupe préexistant. Le numéro de groupe par défaut est de 1.
.IP "\fB-G \fIgroupe,[...]\fR"
Une liste de groupes supplémentaires auxquels fait également partie l'utilisateur. Chaque groupe est séparé du suivant par une virgule, sans espace entre les deux. Les groupes sont soumis aux mêmes restrictions que celles données avec l'option \fB-g\fR. Si l'utilisateur fait actuellement partie d'un groupe qui n'est pas listé, l'utilisateur sera supprimé du groupe.
.IP "\fB-l \fInom_connexion\fR"
Le nom de l'utilisateur passera de \fIlogin\fR à \fIlogin_name\fR. Rien d'autre n'est modifié. En particulier, le répertoire personnel de l'utilisateur devra probablement être changé pour refléter le nouveau nom de connexion.
.IP "\fB-p \fImot_de_passe\fR"
Le mot de passe crypté, comme renvoyé par \fBcrypt\fR(3).
.IP "\fB-s \fIshell\fR"
Le nom du nouveau shell de connexion de l'utilisateur. Si shell n'est pas fourni, le système sélectionnera le shell de connexion par défaut.
.IP "\fB-u \fIuid\fR"
La valeur numérique de l'ID de l'utilisateur. Cette valeur doit être unique, à moins que l'option \fI-o\fR ne soit utilisée. La valeur doit être non négative. Les valeurs comprises entre 0 et 99 sont typiquement réservées aux comptes systèmes. Tous les fichiers possédés par l'utilisateur et qui sont situés dans le sous-arbre de répertoires "débutant" au répertoire personnel de l'utilisateur verront leur ID d'utilisateur automatiquement modifié. Les fichiers situés à l'extérieur du répertoire personnel de l'utilisateur doivent être modifiés à la main.
.IP "\fB-L\fR"
Verrouiller le mot de passe d'un utilisateur. Cette option ajoute un `!' devant le mot de passe crypté, ce qui désactive le mot de passe. Vous ne pouvez pas utiliser cette option avec \fI-p\fR ou \fI-U\fR.
.IP "\fB-U\fR"
Déverrouiller le mot de passe d'un utilisateur. Cela supprime le `!' situé devant le mot de passe crypté. Vous ne pouvez pas utiliser cette option avec \fI-p\fR ou \fI-L\fR.
.SH INCONVÉNIENTS
\fBusermod\fR ne vous permet pas de modifier le nom d'un utilisateur qui est actuellement connecté. Vous devez être sûr que l'utilisateur nommé n'est pas en train d'exécuter un quelconque programme quand cette commande est exécutée si l'UID numérique de l'utilisateur est modifié. Vous devez modifier le nom du propriétaire de tous les fichiers \fIcrontab\fR manuellement. Vous devez modifier le nom du propriétaire de n'importe quel travail \fIat\fR manuellement. Vous devez effectuer les modifications impliquant NIS sur le serveur NIS.
.SH FICHIERS
/etc/passwd - information sur les comptes utilisateurs
.br
/etc/shadow - information sécurisée sur les comptes utilisateurs
.br
/etc/group - information de groupes
.SH "VOIR AUSSI"
.BR chfn (1),
.BR chsh (1),
.BR crypt (3),
.BR groupadd (8),
.BR groupdel (8),
.BR groupmod (8),
.BR passwd (1),
.BR useradd (8),
.BR userdel (8)
.SH AUTEUR
Julianne Frances Haugh (jfh@bga.com)
.SH TRADUCTION
Frédéric Delanoy, 2000.

1
man/getspnam.3 Normal file
View File

@ -0,0 +1 @@
.so shadow.3

View File

@ -1,26 +1,26 @@
.\" $Id: gpasswd.1,v 1.4 2001/01/27 02:55:52 kloczek Exp $
.\" Copyright 1996, Rafal Maszkowski, rzm@pdi.net
.\"$Id: gpasswd.1,v 1.5 2002/03/09 19:22:29 ankry Exp $
.\" Copyright 1996, Rafal Maszkowski <rzm@pdi.net>
.\" All rights reserved. You can redistribute this man page and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of the
.\" License, or (at your option) any later version.
.\"
.TH GPASSWD 1
.SH NAME
gpasswd \- administer the /etc/group file
.br
.SH SYNOPSIS
\fBgpasswd\fR \fIgroup\fR
\fBgpasswd \fIgroup\fR
.br
\fBgpasswd\fR \fB-a\fR \fIuser\fR \fIgroup\fR
\fBgpasswd -a \fIuser\fR \fIgroup\fR
.br
\fBgpasswd\fR \fB-d\fR \fIuser\fR \fIgroup\fR
\fBgpasswd -d \fIuser\fR \fIgroup\fR
.br
\fBgpasswd\fR \fB-R\fR \fIgroup\fR
\fBgpasswd -R \fIgroup\fR
.br
\fBgpasswd\fR \fB-r\fR \fIgroup\fR
.br
\fBgpasswd\fR [\fB-A\fR \fIuser\fR,...] [\fB-M\fR \fIuser\fR,...] \fIgroup\fR
\fBgpasswd -r \fIgroup\fR
.br
\fBgpasswd\fR [\fB-A \fIuser\fR,...] [\fB-M\fR \fIuser\fR,...] \fIgroup\fR
.SH DESCRIPTION
.B gpasswd
is used to administer the /etc/group file (and /etc/gshadow
@ -55,3 +55,5 @@ without a password, non-members must supply the password.
.BR groupdel (8),
.BR groupmod (8),
.BR grpck (8)
.SH AUTHOR
Rafal Maszkowski <rzm@pdi.net>

View File

@ -1,4 +1,4 @@
.\"$Id: groupadd.8,v 1.8 2001/01/27 02:55:52 kloczek Exp $
.\"$Id: groupadd.8,v 1.10 2002/03/09 11:16:14 ankry Exp $
.\" Copyright 1991, Julianne Frances Haugh
.\" All rights reserved.
.\"
@ -50,11 +50,11 @@ Values between 0 and 99 are typically reserved for system accounts.
.SH SEE ALSO
.BR chfn (1),
.BR chsh (1),
.BR useradd (8),
.BR userdel (8),
.BR usermod (8),
.BR passwd (1),
.BR groupdel (8),
.BR groupmod (8)
.BR groupmod (8),
.BR useradd (8),
.BR userdel (8),
.BR usermod (8)
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)

View File

@ -1,4 +1,4 @@
.\"$Id: groupdel.8,v 1.8 2001/01/27 02:55:52 kloczek Exp $
.\"$Id: groupdel.8,v 1.10 2002/03/09 11:16:14 ankry Exp $
.\" Copyright 1991 - 1993, Julianne Frances Haugh
.\" All rights reserved.
.\"
@ -47,11 +47,11 @@ You must remove the user before you remove the group.
.SH SEE ALSO
.BR chfn (1),
.BR chsh (1),
.BR useradd (8),
.BR userdel (8),
.BR usermod (8),
.BR passwd (1),
.BR groupadd (8),
.BR groupmod (8)
.BR groupmod (8),
.BR useradd (8),
.BR userdel (8),
.BR usermod (8)
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)

View File

@ -1,4 +1,4 @@
.\"$Id: groupmod.8,v 1.8 2001/01/27 02:55:52 kloczek Exp $
.\"$Id: groupmod.8,v 1.10 2002/03/09 11:16:14 ankry Exp $
.\" Copyright 1991, Julianne Frances Haugh
.\" All rights reserved.
.\"
@ -52,11 +52,11 @@ The name of the group will be changed from \fIgroup\fR to
.SH SEE ALSO
.BR chfn (1),
.BR chsh (1),
.BR useradd (8),
.BR userdel (8),
.BR usermod (8),
.BR passwd (1),
.BR groupadd (8),
.BR groupdel (8)
.BR groupdel (8),
.BR useradd (8),
.BR userdel (8),
.BR usermod (8)
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)

View File

@ -1,4 +1,4 @@
.\"$Id: groups.1,v 1.8 2001/01/27 02:55:52 kloczek Exp $
.\"$Id: groups.1,v 1.10 2002/03/09 19:22:29 ankry Exp $
.\" Copyright 1991 - 1994, Julianne Frances Haugh
.\" All rights reserved.
.\"
@ -27,11 +27,11 @@
.\" SUCH DAMAGE.
.TH GROUPS 1
.SH NAME
groups \- Display current group ID names
groups \- display current group names
.SH SYNOPSIS
\fBgroups\fR [\fIuser\fR]
.SH DESCRIPTION
\fBgroups\fR displays the current group ID names or values. If the value
\fBgroups\fR displays the current group names or ID values. If the value
does not have a corresponding entry in \fI/etc/group\fR, the value will be
displayed as the numerical group value. The optional \fIuser\fR parameter
will display the groups for the named \fIuser\fR.
@ -44,8 +44,8 @@ effective group ID.
/etc/group \- group information
.SH SEE ALSO
.BR newgrp (1),
.BR getuid (2),
.BR getgid (2),
.BR getgroups (2)
.BR getgroups (2),
.BR getuid (2)
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
Julianne Frances Haugh <jockgrrl@ix.netcom.com>

View File

@ -1,4 +1,4 @@
.\"$Id: grpck.8,v 1.8 2001/08/14 21:11:18 malekith Exp $
.\"$Id: grpck.8,v 1.9 2002/03/08 04:39:11 kloczek Exp $
.\" Copyright 1992 - 1993, Julianne Frances Haugh
.\" All rights reserved.
.\"
@ -80,10 +80,10 @@ performed then, it just sorts.
.br
/etc/passwd \- user information
.SH SEE ALSO
.BR groupmod (8),
.BR group (5),
.BR passwd (5),
.BR shadow (5)
.BR shadow (5),
.BR groupmod (8)
.SH DIAGNOSTICS
The \fBgrpck\fR command exits with the following values:
.IP 0 5

View File

@ -4,6 +4,7 @@ mandir = @mandir@/hu
man_MANS = \
chsh.1 \
gpasswd.1 \
login.1 \
newgrp.1 \
passwd.1 \
sg.1

View File

@ -111,6 +111,7 @@ mandir = @mandir@/hu
man_MANS = \
chsh.1 \
gpasswd.1 \
login.1 \
newgrp.1 \
passwd.1 \
sg.1

View File

@ -25,7 +25,7 @@
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: groups.1,v 1.1 2001/11/13 23:28:50 ankry Exp $
.\" $Id: groups.1,v 1.2 2002/03/09 11:16:16 ankry Exp $
.\"
.TH GROUPS 1
.SH NÉV
@ -46,9 +46,9 @@ A felhaszn
/etc/group \- információ a csoportokról
.SH LÁSD MÉG
.BR newgrp (1),
.BR getuid (2),
.BR getgid (2),
.BR getgroups (2)
.BR getgroups (2),
.BR getuid (2)
.SH AUTHOR
Julianne Frances Haugh (jfh@tab.com)
.SH MAGYAR FORDÍTÁS

131
man/hu/login.1 Normal file
View File

@ -0,0 +1,131 @@
.\" Copyright 1989 - 1994, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: login.1,v 1.1 2002/03/10 07:34:02 kloczek Exp $
.\"
.TH LOGIN 1
.SH NÉV
login \- Új kapcsolat felvétele a rendszerrel (bejelentkezés)
.SH ÁTTEKINTÉS
.B login
.RI [ felhasználónév " [" környezeti változók ]]
.SH LEÍRÁS
A
.B login
programot a rendszerbe való belépésre használjuk. Általában nem
közvetlenül használjuk, hanem automatikusan meghívásra kerül, amikor a
.I login:
promptra válaszként beírjuk a felhasználónevünket.
A
.B login
a shell szempontjából különleges kezelésû lehet és elôfordulhat, hogy
nem hívható meg alfolyamatként. Tipikus példa erre, amikor a
.B login
parancsot a shell \fBexec login\fR -ként értelmezi, tehát az új
bejelentkezés elõtt az aktuálisból való kilépésre készteti a
felhasználót.
Ha nem login shellbõl próbáljuk meg a \fBlogin\fR parancsot végrehajtani,
hibaüzenetet kapunk.
.PP
Amikor a \fIlogin:\fR promptnál kerül meghívásra, lehetõség van a
felhasználónév után környezeti változók megadására, \fBNÉV=ÉRTÉK\fR.
formában, azonban nem minden változót tudunk ily módon szabályozni:
például a \fBPATH\fR, \fBHOME\fR és a \fBSHELL\fR nem kaphat itt értéket,
továbbá az \fBIFS\fR letiltásra kerülhet, ha a \felhasználó login shellje
a fB/bin/sh\fR.
.PP
Ezután a jelszavunkat kell megadnunk. A beírt karakterek nem jelennek meg
a képernyõn, megelõzvén a 'leskelõdést'. Ha többször hibás jelszót adunk
meg, a \fBlogin\fR kilép, és a kapcsolat megszakad.
.PP
Ha a jelszavunk érvényességi ideje korlátozott, a rendszer továbblépés
elõtt felszólíthat a jelszó megváltoztatására. Ez azt jelenti, hogy a
jelszavunk lejárt, nem érvényes, vagy hamarosan le fog járni. A régi
jelszavunkat is esetleg meg kell adni ellenõrzésképpen, majd az általunk
választott új jelszót. A témában lásd: \fBpasswd \fR(1)
.PP
Sikeres bejelentkezés után néhány rendszerüzenetet kapunk, és a postaládánk
állapotáról némi visszajelszést. A rendszerüzenetfájl (\fI/etc/motd\fR)
kiíratását letilthatjuk egy 0 byte hosszúságú \fI.hushlogin\fR file
létrehozásával a login könyvtárunkban. A posta állapotától függõen a
következõ üzenetek valamelyikét kapjuk: "\fBYou have new mail.\fR" (Új
levél van), "\fBYou have mail.\fR" (Levél van), vagy "\fBNo Mail.\fR"
(Nincs levél).
.PP
A felhasználói- (UID) és a csoportazonosítónk (GID) beállításra kerül az
\fI/etc/passwd\fR alapján. A \fB$HOME\fR, \fB$SHELL\fR,
\fB$PATH\fR, \fB$LOGNAME\fR és a \fB$MAIL\fR környezeti változók
beállításra kerülnek a passwd adatbázis megfelelõ mezõi alapján.
Az ulimit, umask és a nice is értéket kaphat a GECOS mezõ tartalma
alapján.
.PP
Néhány rendszeren a \fB$TERM\fR változó is értéket kap, miként az a
\fI/etc/ttytype\fR-ban meg van írva.
.PP
Végrehajtódhat a parancsértelmezõnk inicializációs scriptje is. Ez ügyben
lásd a megfelelõ kézikönyv-oldalt.
.SH FIGYELMEZTETÉSEK
.PP
A \fBlogin\fR ezen verziója sok fordítási opcióval rendelkezik, bár csak
néhány közülük az, ami használatban lehet egyes speciális gépeken.
.PP
A fájlok elhelyezkedése a rendszerkonfigurációk különbözõségébõl adódóan
változhat.
.SH FÁJLOK
/etc/utmp \- az aktuális bejelentkezések listája
.br
/etc/wtmp \- az elõzõ (eddigi) bejelentkezések listája
.br
/etc/passwd \- felhasználói account-okra vonatkozó információk
.br
/etc/shadow \- titkosított jelszavak és érvényességi idõ-információk
.br
/etc/motd \- rendszerüzenet file
.br
/etc/nologin \- nem-root felhasználók belépésének tiltása
.br
/etc/ttytype \- termináltípusok listája
.br
$HOME/.profile \- inicializációs script az alapértelmezett shellhez
.br
$HOME/.hushlogin \- korlátozza a rendszerüzenetek megjelenítését
.br
.SH LÁSD MÉG
.PP
.BR getty (8),
.BR mail (1),
.BR passwd (1),
.BR sh (1),
.BR su (1),
.\" .BR d_passwd (5),
.BR passwd (5),
.BR nologin (5)
.SH SZERZÕ
Julianne Frances Haugh (jfh@bga.com)
.SH MAGYAR FORDÍTÁS
Niedermayer Miklós <mico@musician.org>

View File

@ -26,7 +26,7 @@
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: newgrp.1,v 1.1 2001/11/13 23:28:50 ankry Exp $
.\" $Id: newgrp.1,v 1.2 2002/03/09 11:16:16 ankry Exp $
.\"
.TH NEWGRP 1
.SH NÉV
@ -79,8 +79,8 @@ lehet sz
.br
/etc/group \- csoportinfomációk
.SH LÁSD MÉG
.BR login (1),
.BR id (1),
.BR login (1),
.BR su (1)
.SH SZERZÔ
Julianne Frances Haugh (jfh@bga.com)

View File

@ -28,7 +28,7 @@
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: passwd.1,v 1.1 2001/11/13 23:28:50 ankry Exp $
.\" $Id: passwd.1,v 1.2 2002/02/28 13:54:22 ankry Exp $
.\"
.TH PASSWD 1 "" \" -*- nroff -*-
.SH NÉV
@ -36,7 +36,7 @@ passwd \- Felhaszn
.SH ÁTTEKINTÉS
\fBpasswd\fR [\fB-f\fR|\fB-s\fR] [\fInév\fR]
.br
\fBpasswd\fR [\fB-g\fR] [\fB-r\fR|\fBR\fR] \fIcsoport\fR
\fBpasswd\fR [\fB-g\fR] [\fB-r\fR|\fB-R\fR] \fIcsoport\fR
.br
\fBpasswd\fR [\fB-x\fR \fImax\fR] [\fB-n\fR \fImin\fR]
[\fB-w\fR \fIfigy\fR] [\fB-i\fR \fIinakt\fR] \fInév\fR

View File

@ -1,4 +1,4 @@
.\"$Id: id.1,v 1.8 2001/01/27 02:55:52 kloczek Exp $
.\"$Id: id.1,v 1.10 2002/03/09 19:22:29 ankry Exp $
.\" Copyright 1991, Julianne Frances Haugh
.\" All rights reserved.
.\"
@ -29,7 +29,7 @@
.SH NAME
id \- Display current user and group ID names
.SH SYNOPSIS
\fBid\fR [\fB-a\fR]
\fBid [\fB-a\fR]
.SH DESCRIPTION
\fBid\fR displays the current real and effective user and group ID names or
values. If the value does not have a corresponding entry in
@ -41,8 +41,8 @@ set on systems which support multiple concurrent group membership.
.br
/etc/group \- group information
.SH SEE ALSO
.BR getuid (2),
.BR getgid (2),
.BR getgroups (2)
.BR getgroups (2),
.BR getuid (2)
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
Julianne Frances Haugh <jockgrrl@ix.netcom.com>

10
man/id/Makefile.am Normal file
View File

@ -0,0 +1,10 @@
mandir = @mandir@/id
man_MANS = \
adduser.8 \
chsh.1 \
login.1 \
useradd.8
EXTRA_DIST = $(man_MANS)

331
man/id/Makefile.in Normal file
View File

@ -0,0 +1,331 @@
# Makefile.in generated automatically by automake 1.5 from Makefile.am.
# Copyright 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001
# Free Software Foundation, Inc.
# This Makefile.in is free software; the Free Software Foundation
# gives unlimited permission to copy and/or distribute it,
# with or without modifications, as long as this notice is preserved.
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY, to the extent permitted by law; without
# even the implied warranty of MERCHANTABILITY or FITNESS FOR A
# PARTICULAR PURPOSE.
@SET_MAKE@
SHELL = @SHELL@
srcdir = @srcdir@
top_srcdir = @top_srcdir@
VPATH = @srcdir@
prefix = @prefix@
exec_prefix = @exec_prefix@
bindir = @bindir@
sbindir = @sbindir@
libexecdir = @libexecdir@
datadir = @datadir@
sysconfdir = @sysconfdir@
sharedstatedir = @sharedstatedir@
localstatedir = @localstatedir@
libdir = @libdir@
infodir = @infodir@
includedir = @includedir@
oldincludedir = /usr/include
pkgdatadir = $(datadir)/@PACKAGE@
pkglibdir = $(libdir)/@PACKAGE@
pkgincludedir = $(includedir)/@PACKAGE@
top_builddir = ../..
ACLOCAL = @ACLOCAL@
AUTOCONF = @AUTOCONF@
AUTOMAKE = @AUTOMAKE@
AUTOHEADER = @AUTOHEADER@
INSTALL = @INSTALL@
INSTALL_PROGRAM = @INSTALL_PROGRAM@
INSTALL_DATA = @INSTALL_DATA@
INSTALL_SCRIPT = @INSTALL_SCRIPT@
INSTALL_HEADER = $(INSTALL_DATA)
transform = @program_transform_name@
NORMAL_INSTALL = :
PRE_INSTALL = :
POST_INSTALL = :
NORMAL_UNINSTALL = :
PRE_UNINSTALL = :
POST_UNINSTALL = :
host_alias = @host_alias@
host_triplet = @host@
AMTAR = @AMTAR@
AS = @AS@
AWK = @AWK@
BUILD_INCLUDED_LIBINTL = @BUILD_INCLUDED_LIBINTL@
CATALOGS = @CATALOGS@
CATOBJEXT = @CATOBJEXT@
CC = @CC@
CPP = @CPP@
DATADIRNAME = @DATADIRNAME@
DEPDIR = @DEPDIR@
DLLTOOL = @DLLTOOL@
ECHO = @ECHO@
EXEEXT = @EXEEXT@
GENCAT = @GENCAT@
GLIBC21 = @GLIBC21@
GMOFILES = @GMOFILES@
GMSGFMT = @GMSGFMT@
INSTALL_STRIP_PROGRAM = @INSTALL_STRIP_PROGRAM@
INSTOBJEXT = @INSTOBJEXT@
INTLBISON = @INTLBISON@
INTLLIBS = @INTLLIBS@
INTLOBJS = @INTLOBJS@
INTL_LIBTOOL_SUFFIX_PREFIX = @INTL_LIBTOOL_SUFFIX_PREFIX@
LIBCRACK = @LIBCRACK@
LIBCRYPT = @LIBCRYPT@
LIBICONV = @LIBICONV@
LIBMD = @LIBMD@
LIBPAM = @LIBPAM@
LIBSKEY = @LIBSKEY@
LIBTCFS = @LIBTCFS@
LIBTOOL = @LIBTOOL@
LN_S = @LN_S@
MKINSTALLDIRS = @MKINSTALLDIRS@
MSGFMT = @MSGFMT@
OBJDUMP = @OBJDUMP@
OBJEXT = @OBJEXT@
PACKAGE = @PACKAGE@
POFILES = @POFILES@
POSUB = @POSUB@
RANLIB = @RANLIB@
STRIP = @STRIP@
U = @U@
USE_INCLUDED_LIBINTL = @USE_INCLUDED_LIBINTL@
USE_NLS = @USE_NLS@
VERSION = @VERSION@
YACC = @YACC@
am__include = @am__include@
am__quote = @am__quote@
install_sh = @install_sh@
mandir = @mandir@/id
man_MANS = \
adduser.8 \
chsh.1 \
login.1 \
useradd.8
EXTRA_DIST = $(man_MANS)
subdir = man/id
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
CONFIG_HEADER = $(top_builddir)/config.h
CONFIG_CLEAN_FILES =
DIST_SOURCES =
NROFF = nroff
MANS = $(man_MANS)
DIST_COMMON = Makefile.am Makefile.in
all: all-am
.SUFFIXES:
mostlyclean-libtool:
-rm -f *.lo
clean-libtool:
-rm -rf .libs _libs
distclean-libtool:
-rm -f libtool
$(srcdir)/Makefile.in: Makefile.am $(top_srcdir)/configure.in $(ACLOCAL_M4)
cd $(top_srcdir) && \
$(AUTOMAKE) --gnu man/id/Makefile
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
cd $(top_builddir) && \
CONFIG_HEADERS= CONFIG_LINKS= \
CONFIG_FILES=$(subdir)/$@ $(SHELL) ./config.status
uninstall-info-am:
man1dir = $(mandir)/man1
install-man1: $(man1_MANS) $(man_MANS)
@$(NORMAL_INSTALL)
$(mkinstalldirs) $(DESTDIR)$(man1dir)
@list='$(man1_MANS) $(dist_man1_MANS) $(nodist_man1_MANS)'; \
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
for i in $$l2; do \
case "$$i" in \
*.1*) list="$$list $$i" ;; \
esac; \
done; \
for i in $$list; do \
if test -f $(srcdir)/$$i; then file=$(srcdir)/$$i; \
else file=$$i; fi; \
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
inst=`echo $$inst | sed -e 's/^.*\///'`; \
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
echo " $(INSTALL_DATA) $$file $(DESTDIR)$(man1dir)/$$inst"; \
$(INSTALL_DATA) $$file $(DESTDIR)$(man1dir)/$$inst; \
done
uninstall-man1:
@$(NORMAL_UNINSTALL)
@list='$(man1_MANS) $(dist_man1_MANS) $(nodist_man1_MANS)'; \
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
for i in $$l2; do \
case "$$i" in \
*.1*) list="$$list $$i" ;; \
esac; \
done; \
for i in $$list; do \
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
inst=`echo $$inst | sed -e 's/^.*\///'`; \
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
echo " rm -f $(DESTDIR)$(man1dir)/$$inst"; \
rm -f $(DESTDIR)$(man1dir)/$$inst; \
done
man8dir = $(mandir)/man8
install-man8: $(man8_MANS) $(man_MANS)
@$(NORMAL_INSTALL)
$(mkinstalldirs) $(DESTDIR)$(man8dir)
@list='$(man8_MANS) $(dist_man8_MANS) $(nodist_man8_MANS)'; \
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
for i in $$l2; do \
case "$$i" in \
*.8*) list="$$list $$i" ;; \
esac; \
done; \
for i in $$list; do \
if test -f $(srcdir)/$$i; then file=$(srcdir)/$$i; \
else file=$$i; fi; \
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
inst=`echo $$inst | sed -e 's/^.*\///'`; \
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
echo " $(INSTALL_DATA) $$file $(DESTDIR)$(man8dir)/$$inst"; \
$(INSTALL_DATA) $$file $(DESTDIR)$(man8dir)/$$inst; \
done
uninstall-man8:
@$(NORMAL_UNINSTALL)
@list='$(man8_MANS) $(dist_man8_MANS) $(nodist_man8_MANS)'; \
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
for i in $$l2; do \
case "$$i" in \
*.8*) list="$$list $$i" ;; \
esac; \
done; \
for i in $$list; do \
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
inst=`echo $$inst | sed -e 's/^.*\///'`; \
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
echo " rm -f $(DESTDIR)$(man8dir)/$$inst"; \
rm -f $(DESTDIR)$(man8dir)/$$inst; \
done
tags: TAGS
TAGS:
DISTFILES = $(DIST_COMMON) $(DIST_SOURCES) $(TEXINFOS) $(EXTRA_DIST)
top_distdir = ../..
distdir = $(top_distdir)/$(PACKAGE)-$(VERSION)
distdir: $(DISTFILES)
@for file in $(DISTFILES); do \
if test -f $$file; then d=.; else d=$(srcdir); fi; \
dir=`echo "$$file" | sed -e 's,/[^/]*$$,,'`; \
if test "$$dir" != "$$file" && test "$$dir" != "."; then \
$(mkinstalldirs) "$(distdir)/$$dir"; \
fi; \
if test -d $$d/$$file; then \
cp -pR $$d/$$file $(distdir) \
|| exit 1; \
else \
test -f $(distdir)/$$file \
|| cp -p $$d/$$file $(distdir)/$$file \
|| exit 1; \
fi; \
done
check-am: all-am
check: check-am
all-am: Makefile $(MANS)
installdirs:
$(mkinstalldirs) $(DESTDIR)$(man1dir) $(DESTDIR)$(man8dir)
install: install-am
install-exec: install-exec-am
install-data: install-data-am
uninstall: uninstall-am
install-am: all-am
@$(MAKE) $(AM_MAKEFLAGS) install-exec-am install-data-am
installcheck: installcheck-am
install-strip:
$(MAKE) $(AM_MAKEFLAGS) INSTALL_PROGRAM="$(INSTALL_STRIP_PROGRAM)" \
`test -z '$(STRIP)' || \
echo "INSTALL_PROGRAM_ENV=STRIPPROG='$(STRIP)'"` install
mostlyclean-generic:
clean-generic:
distclean-generic:
-rm -f Makefile $(CONFIG_CLEAN_FILES) stamp-h stamp-h[0-9]*
maintainer-clean-generic:
@echo "This command is intended for maintainers to use"
@echo "it deletes files that may require special tools to rebuild."
clean: clean-am
clean-am: clean-generic clean-libtool mostlyclean-am
distclean: distclean-am
distclean-am: clean-am distclean-generic distclean-libtool
dvi: dvi-am
dvi-am:
info: info-am
info-am:
install-data-am: install-man
install-exec-am:
install-info: install-info-am
install-man: install-man1 install-man8
installcheck-am:
maintainer-clean: maintainer-clean-am
maintainer-clean-am: distclean-am maintainer-clean-generic
mostlyclean: mostlyclean-am
mostlyclean-am: mostlyclean-generic mostlyclean-libtool
uninstall-am: uninstall-info-am uninstall-man
uninstall-man: uninstall-man1 uninstall-man8
.PHONY: all all-am check check-am clean clean-generic clean-libtool \
distclean distclean-generic distclean-libtool distdir dvi \
dvi-am info info-am install install-am install-data \
install-data-am install-exec install-exec-am install-info \
install-info-am install-man install-man1 install-man8 \
install-strip installcheck installcheck-am installdirs \
maintainer-clean maintainer-clean-generic mostlyclean \
mostlyclean-generic mostlyclean-libtool uninstall uninstall-am \
uninstall-info-am uninstall-man uninstall-man1 uninstall-man8
# Tell versions [3.59,3.63) of GNU make to not export all variables.
# Otherwise a system limit (for SysV at least) may be exceeded.
.NOEXPORT:

1
man/id/adduser.8 Normal file
View File

@ -0,0 +1 @@
.so man8/useradd.8

53
man/id/chsh.1 Normal file
View File

@ -0,0 +1,53 @@
.\"
.\" chsh.1 -- change your login shell
.\" (c) 1994 by salvatore valente <svalente@athena.mit.edu>
.\"
.\" this program is free software. you can redistribute it and
.\" modify it under the terms of the gnu general public license.
.\" there is no warranty.
.\"
.\" $Author: kloczek $
.\" $Revision: 1.1 $
.\" $Date: 2002/03/10 07:41:05 $
.\"
.TH CHSH 1 "October 13 1994" "chsh" "Linux Reference Manual"
.SH NAMA PERINTAH/PROGRAM
chsh \- merubah shell login
.SH RINGKASAN
.B chsh
[\ \-s\ shell\ ] [\ \-l\ ] [\ \-u\ ] [\ \-v\ ] [\ username\ ]
.SH PENJELASAN
.B chsh
digunakan untuk merubah shell login Anda.
Bila shell tidak diberikan pada baris perintah maka
.B chsh
menampilkan prompt untuk memasukkan shell.
.SS SHELL-SHELL YANG BENAR
.B chsh
akan menerima pathname lengkap dari file executable pada sistem.
Walau demikian, akan menampilkan peringatan bila shell tidak terdapat
dalam file
.I /etc/shells .
.SH OPTION
.TP
.I "\-s, \-\-shell"
Menentukan shell login Anda.
.TP
.I "\-l, \-\-list-shells"
Menampilkan daftar shell yang ada dalam
.I /etc/shells
dan keluar atau exit.
.TP
.I "\-u, \-\-help"
Menampilkan cara penggunaan program.
.TP
.I "-v, \-\-version"
Menampilkan informasi versi program.
.SH "LIHAT JUGA"
.BR login (1),
.BR passwd (5),
.BR shells (5)
.SH PEMBUAT
Salvatore Valente <svalente@mit.edu>
.SH PENTERJEMAH
Rizqy Syarief <rizqy@rad.net.id>

311
man/id/login.1 Normal file
View File

@ -0,0 +1,311 @@
.\" Copyright 1993 Rickard E. Faith (faith@cs.unc.edu)
.\" May be distributed under the GNU General Public License
.TH LOGIN 1 "4 November 1996" "Util-linux 1.6" "Linux Programmer's Manual"
.SH NAME
login \- masuk ke system
.SH SYNOPSIS
.BR "login [ " name " ]"
.br
.B "login \-p"
.br
.BR "login \-h " hostname
.br
.BR "login \-f " name
.SH PENJELASAN
.B login
digunakan ketika hendak masuk ke sebuah system. Ia juga dapat digunakan
untuk berpindah dari satu user ke user lainnya kapan saja (shell-shell yang
modern mendukung kemampuan ini).
Jika tidak diikuti oleh sebuah argumen
.B login
system akan menanyakan nama user/username.
Jika user tersebut
.I bukan
root, dan jika terdapat file
.I /etc/nologin
isi file tersebut akan tercetak di layar, kemudian login dihentikan.
Biasanya ini dilakukan untuk mencegah login ketika system sedang dimatikan.
Jika terdapat pembatasan akses tertentu pada user sebagaimana terdapat di
.IR /etc/usertty ,
hal tersebut harus dipenuhi, atau login akan ditolak dan pesan
.B syslog
akan dibuat. Lihat section pada "Special Access Restrictions".
Jika user adalah root, maka login harus dijalankan pada tty yang terdapat
di
.IR /etc/securetty .
Kegagalan akan dicatat pada log melalui fasilitas
.B syslog .
Setelah kondisi-kondisi tersebut dicek, anda akan dimintai password untuk
kemudian dicek (jika ada password untuk username tersebut). Anda dapat
mencoba sepuluh kali sebelum
.B login
dimatikan, tapi setelah kegagalan yang ketiga, respon yang diberikan
akan sangat lamban. Kegagalan login akan dilaporkan melalui fasilitas
.B syslog .
Fasilitas ini juga dapat digunakan untuk melaporkan login yang berhasil.
Jika file
.I .hushlogin
ditemukan, maka login secara "quiet" dilaksanakan (hal ini menonaktifkan
pengecekan mail dan tidak menampilkan waktu login terakhir dan pesan
yang ada untuk hari itu). Namun, jika terdapat file
.I /var/log/lastlog
, waktu login terakhir akan ditampilkan (dan kegiatan login yang sekarang
akan dicatat).
Kegiatan administratif secara acak, seperti mengeset UID dan GID untuk tty
akan dilakukan. Variabel environment TERM dibuatkan, jika ia sudah ada
(variabel environment lain akan dibuatkan jika option
.B \-p
digunakan). Kemudian variable environment HOME, PATH, SHELL, TERM, MAIL
dan LOGNAME ditetapkan. Default PATH merujuk ke
.I /usr/local/bin:/bin:/usr/bin:.
untuk user biasa, dan ke
.I /sbin:/bin:/usr/sbin:/usr/bin
untuk root. Terakhir, jika login yang sedang dilakukan bukan login "quiet",
pesan hari ini akan ditampilkan dan file dengan nama yang sama dengan user
pada
.I /usr/spool/mail
akan diperiksa, dan sebuah pesan ditampilkan jika besar file tersebut tidak
nol.
Kemudian, shell untuk user berjalan. Jika shell untuk user tidak ditentukan
pada
.BR /etc/passwd ,
maka akan digunakan
.B /bin/sh
. Jika directory tidak ditentukan pada
.IR /etc/passwd ,
maka
.I /
digunakan (home directiry diperiksa pada file
.I .hushlogin
seperti dijelaskan sebelumnya).
.SH OPTION
.TP
.B \-p
digunakan oleh
.BR getty (8)
untuk memberi tahu bahwa
.B login
tidak mengubah environment
.TP
.B \-f
Used to skip a second login authentication. This specifically does
Digunakan untuk melewatkan pengecekan tahap kedua ketika login. Biasanya
.B tidak
berjalan untuk, dan kelihatannya tidak dapat berjalan dengan baik pada Linux.
.TP
.B \-h
Digunakan oleh server lain (misalnya
.BR telnetd (8))
to pass the name of the remote host to
untuk melewatkan nama remote host ketika
.B login
sehingga dapat ditempatkan pada utmp dan wtmp. HAnya superuser yang dapat
menggunakan option ini.
.SH "PEMBATASAN AKSES TERTENTU/SPECIAL ACCESS RESTRICTIONS"
File
.I /etc/securetty
mencatat nama-nama tty dimana root boleh login. Nama device tty yang tidak
berawalan /dev/ harus ditentukan pada setiap barisnya. Jika file tersebut
tidak ditemukan, root boleh login di tty mana saja.
.PP
File
.I /etc/usertty
Menentukan tambahan batasan akses tertentu untuk user tertentu. Jika
file ini tidak ditemukan, tak ada tambahan batasan akses yang diterapkan.
File ini terdiri dari beberapa bagian. Ada tiga bagian yang mungkin
ada : CLASSES, GROUPS dan USERS. Bagian CLASSES mendefinisikan kelas tty
dan pola nama host, bagian GROUPS mendefinisikan tty dan nama host yang
diperbolehkan berdasarkan per group, dan bagian USERS mendefinisikan tty
dan host yang diperbolehkan berdasarkan per user.
.PP
Panjang setiap baris pada file ini tidak boleh lebih dari 255 karakter.
Komentar diawali oleh karakter # yang berlaku hingga akhir baris.
.PP
.SS "Bagian CLASSES"
Bagian CLASSES dimulai dengan kata CLASSES pada baris awal dalam
huruf besar semua. Setiap baris berikutnya hingga permulaan bagian baru
atau akhir file terdiri dari urutan kata-kata yang dipisahkan oleh tab
atau spasi. Tiap baris mendefinisikan kelas tty dan pola host.
.PP
Kata yang terdapat pada awal baris dijadikan sebuah definisi untuk
sekumpulan nama untuk tty dan pola host yang ditentukan pada akhir baris.
Kumpulan nama ini dapat digunakan untuk bagian GROUPS berikutnya atau
bagian USERS. Nama kelas tidak boleh didefinisikan sebagai bagian
dari sebuah kelas untuk menghindari masalah kelas rekursif.
.PP
Contoh bagian CLASSES:
.PP
.nf
.in +.5
CLASSES
myclass1 tty1 tty2
myclass2 tty3 @.foo.com
.in -.5
.fi
.PP
File di atas mendefinisikan
.I myclass1
dan
.I myclass2
sebagai sebelah kanan yang saling berhubungan.
.PP
.SS "Bagian GROUPS"
Bagian GROUPS mendefinisikan tty dan host yang diperbolehkan berdasarkan
per group UNIX. Jika seorang user adalah anggota sebuah group menurut
.I /etc/passwd
dan
.I /etc/group
dan jika sebuah group disebutkan pada bagian GROUPS di
.I /etc/usertty
maka user diberikan akses jika memang itu group-nya.
.PP
Bagian GROUPS diawali oleh kata GROUPS dalam huruf besar semua pada permulaan
baris dan tiap baris selanjutnya merupakan urutan kata-kata yang dipisahkan
oleh spasi atau tab. Kata pertama pada sebuah baris adalah nama group dan
sisanya menentukan tty dan host dimana anggota group tersebut boleh
mendapatkan akses. Ketentuan ini dapat mengikutsertakan kelas yang telah
didefinisikan pada bagian CLASSES sebelumnya.
.PP
Contoh bagian GROUPS
.PP
.nf
.in +0.5
GROUPS
sys tty1 @.bar.edu
stud myclass1 tty4
.in -0.5
.fi
.PP
Contoh ini menentukan bahwa anggota group
.I sys
boleh log in pada tty1 dan dari host-host yang terdapat pada domain
bar.edu. User yang terdapat pada group
.I stud
boleh log in dari host-host/tty-tty yang ditentukan pada kelas myclass1
atau dari tty4
.PP
.SS "Bagian USERS"
Bagian USERS dimulai dengan kata USERS dalam huruf besar semua pada awal
baris, dan tiap baris berikutnya adalah urutan kata-kata yang dipisahkan
oleh tab atau spasi. Kata pertama pada sebuah baris adalah username
dan sisanya merupakan definisi tentang tty dan host tempat user boleh
log in. Ketentuan ini dapat melibatkan kelas yang didefinisikan pada
bagian CLASSES sebelumnya dan. Jika tak ada header bagian yang tercantum
pada awal file, bagian pertama secara defaults adalah bagian USERS.
.PP
Contoh penggunaan bagian USERS:
.PP
.nf
.in +0.5
USERS
zacho tty1 @130.225.16.0/255.255.255.0
blue tty3 myclass2
.in -0.5
.fi
.PP
KEtentuan ini mengizinkan zacho hanya boleh login pada tty1 dan dari
host-host yang alamat IP-nya terletak di kisaran 130.225.16.0 \-
130.225.16.255, dan user bernama blue boleh log in dari tty3 dan apa
saja yang disebutkan pada kelas myclass2.
.PP
Mungkin terdapat sebuah baris pada bagian USERS yang dimulai dengan
sebuah username bernama *. Ini adalah aturan default dan ia akan
diterapkan pada user yang tidak tercantum pada baris-baris definisi.
.PP
Jika user ditemukan pada baris USERS dan GROUPS maka user tersebut boleh
mengakses dari gabungan tty/host yang disebutkan pada ketentuan tersebut.
.SS Origins
Ketentuan mengenai tty dan pola host yang digunakan sebagai ketentuan
pada kelas, group dan user disebut origin. Sebuah origin bisa memiliki
format berikut:
.IP o
Nama sebuah device tty tanpa awalan /dev/, contohnya tty1 atau ttyS0.
.PP
.IP o
String @localhost, artinya user boleh melakukan telnet/rlogin
dari local host ke host yang sama. Ini juga membolehkan user untuk
menjalankan perintah: xterm -e /bin/login.
.PP
.IP o
Sebuah akhiran nama domain seperti @.some.dom, artinya user boleh
melakukan rlogin/telnet dari host mana saja yang nama domainnya berakhiran
@.some.dom
.PP
.IP o
Kisaran alamat IPv4, ditulis @x.x.x.x/y.y.y.y dimana x.x.x.x adalah
alamat IP pada notasi desimal biasa dan y.y.y.y adalah bitmask dalam
notasi yang sama yang menentukan bit mana pada alamat tersebut untuk
dibandingkan dengan alamat IP dari remote host. Contohnya @130.225.16.0/
255.255.254.0 berarti user boleh rlogin/telnet dari host mana saja yang
alamat IP-nya berada pada kisaran 130.225.16.0 \- 130.225.17.255.
.PP
Origin di atas boleh diawali oleh penentuan waktu menurut syntax:
.PP
.nf
timespec ::= '[' <day-or-hour> [':' <day-or-hour>]* ']'
day ::= 'mon' | 'tue' | 'wed' | 'thu' | 'fri' | 'sat' | 'sun'
hour ::= '0' | '1' | ... | '23'
hourspec ::= <hour> | <hour> '\-' <hour>
day-or-hour ::= <day> | <hourspec>
.fi
.PP
Contohnya, origin [mon:tue:wed:thu:fri:8\-17]tty3 berarti log in
diperbolehkan pada hari senin hingga jumat pukul 8:00 dan 17:59 (5:59
pm) pada tty3. Ini juga menunjukkan bahwa kisaran jam (seperti 10)
menandakan waktu berkisar antara 10:00 dan 10:59.
.PP
Jika tidak menentukan waktu untuk tty atau nama host berarti lo gin
dari origin tersebut diperbolehkan untuk setiap waktu. Jika anda
memberikan awalan waktu, yakinkan untuk menentukan baik kumpulan hari
dan waktu yang agak dilebihkan. Penentuan waktu tidak boleh berisi
spasi.
.PP
Jika tidak ada aturan diberikan maka user yang tidak ditemukan pada
.I /etc/usertty
boleh log in dari mana saja.
.PP
.SH FILES
.nf
.I /var/run/utmp
.I /var/log/wtmp
.I /var/log/lastlog
.I /usr/spool/mail/*
.I /etc/motd
.I /etc/passwd
.I /etc/nologin
.I /etc/usertty
.I .hushlogin
.fi
.SH "SEE ALSO"
.BR init (8),
.BR getty (8),
.BR mail (1),
.BR passwd (1),
.BR passwd (5),
.BR environ (7),
.BR shutdown (8)
.SH BUGS
Linux, tidak seperti sistem operasi draconian, tidak mengecek quota.
Option tidak resmi pada BSD
.B \-r
tidak dapat digunakan. Ini mungkin dibutuhkan oleh program

214
man/id/useradd.8 Normal file
View File

@ -0,0 +1,214 @@
.\" Copyright 1991 - 1994, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Pendistribusian dan penggunaan dalam bentuk source dan binary, dengan
.\" atau tanpa modifikasi, diperbolehkan asal syarat-syarat ini dipenuhi :
.\" 1. Pendistribusian source code harus mempertahankan tulisan copyright
.\" di atas, persyaratan ini, dan disclaimer berikut.
.\" 2. Pendistribusian dalam bentuk binary harus menampilkan copyright di atas,
.\" persyaratan ini, dan disclaimer yang tercantum pada dokumentasi dan/
.\" atau keterangan lainnya yang terdapat pada distribusi ini.
.\" 3. Nama Julianne F. Haugh atau nama-nama kontributor lainnya tidak boleh
.\" digunakan sebagai jaminan atau untuk mempromosikan produk yang berasal
.\" dari software ini tanpa izin khusus tertulis.
.\"
.\" SOFTWARE INI DISEDIAKAN OLEH JULIE HAUGH DAN PARA KONTRIBUTOR DALAM BENTUK
.\" "APA ADANYA" DAN SEGALA PERNYATAAN ATAU JAMINAN, TERMASUK, TAPI TIDAK
.\" TERBATAS PADA, JAMINAN DALAM PENJUALAN DAN PENYESUAIAN UNTUK MAKSUD
.\" TERTENTU DILUAR TANGGUNG JAWABNYA. JULIE HAUGH DAN PARA KONTRIBUTOR TIDAK
.\" BERTANGGUNG JAWAB PADA KERUSAKAN SECARA LANGSUNG, TIDAK LANGSUNG, KEBETULAN,
.\" TERTENTU, SESUAI CONTOH ATAU KERUSAKAN BERUNTUN (TERMASUK, TAPI TIDAK
.\" TERBATAS PADA MENDAPATKAN PRODUK DENGAN CARA PERTUKARAN ATAU JASA;
.\" KEHILANGAN DATA, ATAU PROFIT; ATAU TERHENTINYA BISNIS) YANG MENGAKIBATKAN
.\" DAN SECARA TEORI BERTANGGUNG JAWAB, MESKIPUN DALAM PERJANJIAN, BERTANGGUNG
.\" JAWAB PENUH, ATAU TORT (TERMASUK KECEROBOHAN ATAU SEBALIKNYA) YANG TIMBUL
.\" KARENA KESALAHAN DALAM MENGGUNAKAN SOFTWARE INI, BAHKAN JIKA TELAH
.\" DIPERINGATKAN SEBELUMNYA TENTANG KEMUNGKINAN AKAN KERUSAKAN TERSEBUT.
.\"
.\" $Id: useradd.8,v 1.1 2002/03/13 09:30:55 kloczek Exp $
.\"
.TH USERADD 8
.SH NAME
useradd \- Membuat user baru atau memperbarui informasi tentang user baru
.SH SYNOPSIS
.TP 8
.B useradd
.\" .RB [ -A
.\" .RI { method | \fBDEFAULT\fR "},... ]"
.RB [ -c
.IR comment ]
.RB [ -d
.IR home_dir ]
.br
.RB [ -e
.IR expire_date ]
.RB [ -f
.IR inactive_time ]
.br
.RB [ -g
.IR initial_group ]
.RB [ -G
.IR group [,...]]
.br
.RB [ -m " [" -k
.IR skeleton_dir ] " |" " " -M ]
.RB [ -s
.IR shell ]
.br
.RB [ -u
.IR uid " ["
.BR -o ]]
.RB [ -n ]
.RB [ -r ]
.I login
.TP 8
.B useradd
\fB-D\fR
[\fB-g\fI default_group\fR]
[\fB-b\fI default_home\fR]
.br
[\fB-f\fI default_inactive\fR]
[\fB-e\fI default_expire_date\fR]
.br
[\fB-s\fI default_shell\fR]
.SH PENJELASAN
.SS Membuat User Baru
Jika digunakan tanpa option \fB-D\fR, perintah \fBuseradd\fR menciptakan
sebuah user account baru dengan menggunakan nilai yang terdapat pada
baris perintah dan nilai default dari system.
User account yang baru tersebut akan dimasukkan ke system files seperlunya,
home directory akan dibuatkan, dan initial files di-copy-kan, tergantung
option yang terdapat pada baris perintah.
Versi yang terdapat pada Red Hat Linux akan membuat sebuah group untuk
setiap user yang didaftarkan pada system, jika \fB-b\fR tidak diberikan.
Option yang dapat digunakan pada perintah \fBuseradd\fR adalah
.\" .IP "\fB-A {\fImethod\fR|\fBDEFAULT\fR},..."
.\" Nilai milik user dalam metode autentikasi/pengecekan.
.\" Metode autentikasi/pengecekan adalah nama sebuah program yang bertanggung
.\" jawab untuk memeriksa identitas user.
.\" String \fBDEFAULT\fR dapat digunakan untuk mengubah metode autentikasi
.\" menjadi metode password system yang standar.
.\" Daftar tersebut berisi nama-nama program, yang dipisahkan oleh koma.
.\" \fBDEFAULT\fR hanya dapat dicantumkan sekali saja.
.\"
.\"
.\"
.IP "\fB-c \fIcomment\fR"
Komentar pada file password milik user baru.
.IP "\fB-d \fIhome_dir\fR"
User baru akan diciptakan dengan \fIhome_dir\fR sebagai lokasi directory
login-nya.
Default-nya adalah menambahkan nama \fIlogin\fR pada \fIdefault_home\fR
dan menggunakannya sebagai nama directory login.
.IP "\fB-e \fIexpire_date\fR"
Tanggal ketika user account dimatikan.
Tanggal ditulis dalam format \fIMM/DD/YY\fR.
.IP "\fB-f \fIinactive_days\fR"
Jumlah hari setelah sebuah password kadaluarsa hingga account
tersebut dimatikan secara permanen.
Nilai 0 mematikan account segera setelah password kadaluarsa,
dan nilai -1 mematikan fungsi ini.
Nilai default-nya adalah -1.
.IP "\fB-g \fIinitial_group\fR"
Nama group atau angka initial login group.
Nama group harus sudah ada. Seorang anggota group harus merujuk
pada group yang sudah ada.
Nilai group default-nya adalah 1.
.IP "\fB-G \fIgroup,[...]\fR"
Daftar group tambahan yang juga merupakan group-nya user.
Setiap group dipisahkan oleh koma, tanpa diikuti spasi.
Group juga mengikuti aturan yang diberikan dengan option \fB-g\fR.
Default-nya hanyalah untuk user yang terdaftar pada group awal.
.IP \fB-m\fR
Home directory milik user akan dibuatkan jika belum ada.
File yang terdapat pada \fIskeleton_dir\fR atau \fI/etc/skel\fR
akan dibuatkan pada home directory milik user.
Option \fB-k\fR hanya valid jika bertemu option \fB-m\fR.
Dafault-nya adalah tidak membuat directory dan tidak meng-copy
segala file.
.IP \fB-M\fR
Home directory milik user tidak akan dibuatkan, bahkan jika setting
system pada \fI/etc/login.defs\fR ditujukan untuk membuat home
directory.
.IP \fB-n\fR
Sebuah group yang namanya sama dengan user akan ditambahkan ke dalam
system secara default. Option ini akan mematikan kebiasaan tersebut
yang terdapat pada Red Hat Linux.
.IP \fB-r\fR
Flag ini digunakan untuk membuat sebuah system account. Yaitu, user
dengan UID yang lebih kecil dari UID_MIN yang tercantum pada
\fI/etc/login.defs\fR. Harap diingat bahwa \fBuseradd\fR tidak akan
membuat home directory untuk user semacam ini, menghiraukan setting
default yang terdapat di \fI/etc/login.defs\fR.
Anda harus menyebutkan option \fB-m\fR jika ingin membuat home directory
untuk sebuah system account yang akan dibuat.
Ini adalah option yang ditambahkan oleh Red Hat.
.IP "\fB-s \fIshell\fR"
Nama login shell milik user.
Default-nya adalah membiarkan field ini kosong, yang menyebabkan
system untuk memilih login shell yang default.
.IP "\fB-u \fIuid\fR"
Nilai user ID secara numerik.
Nilai ini harus unique, kecuali jika option \fI-o\fR digunakan.
Nilai tersebut tidak boleh negatif.
Default-nya adalah menggunakan nilai ID yang lebih besar dari 99
dan lebih besar dari semua user lain.
Nilai di antara 0 dan 99 biasanya disiapkan untuk system aacount.
.SS Mengubah nilai-nilai default.
Ketika digunakan dengan option \fB-D\fR, \fBuseradd\fR akan
menampilkan nilai default, atau memperbarui nilai default baru
yang terdapat pada baris perintah.
Option yang dapat digunakan adalah
.IP "\fB-b \fIdefault_home\fR"
Awalan path untuk home directory milik user baru.
Nama user akan ditambahkan setelah akhir \fIdefault_home\fR
ketika membuat nama directory baru jika option \fB-d\fI tidak
disebutkan dalam membuat account baru.
.IP "\fB-e \fIdefault_expire_date\fR"
Tanggal ketika user account dimatikan.
.IP "\fB-f \fIdefault_inactive\fR"
Jumlah hari setelah password kadaluarsa sebelum account
dimatikan.
.IP "\fB-g \fIdefault_group\fR"
Nama group atau ID sebagai group awal user baru.
Nama group yang disebut harus sudah ada dan nomor group ID
harus mempunyai entry.
.IP "\fB-s \fIdefault_shell\fR"
Nama untuk login shell milik user baru.
Nama program yang disebutkan akan digunakan untuk semua user
account baru mendatang.
.PP
Jika tidak ada option yang disebutkan, \fBuseradd\fR menampilkan
nilai default yang ada saat ini.
.SH NOTES
The system administrator is responsible for placing the default
user files in the \fI/etc/skel\fR directory.
.br
Versi useradd ini dimodifikasi oleh Red Hat agar cocok dengan
ketentuan mengenai user/group.
.SH CAVEATS
Anda tidak dapat menambahkan user pada grou NIS.
Ini harus dilakukan pada server NIS.
.SH FILES
\fB/etc/passwd\fR \- informasi tentang user account
.br
\fB/etc/shadow\fR \- informasi user account yang terlindung
.br
\fB/etc/group\fR \- informasi tentang group
.br
\fB/etc/default/useradd\fR \- informasi tentang nilai default
.br
\fB/etc/login.defs\fR \- system-wide settings
.br
\fB/etc/skel\fR \- directory yang mengandung default files
.SH LIHAT JUGA
.BR chfn (1),
.BR chsh (1),
.BR groupadd (8),
.BR groupdel (8),
.BR groupmod (8),
.BR passwd (1),
.BR userdel (8),
.BR usermod (8)
.SH AUTHOR
Julianne Frances Haugh (jfh@tab.com)

30
man/it/Makefile.am Normal file
View File

@ -0,0 +1,30 @@
mandir = @mandir@/it
man_MANS = \
adduser.8 \
chfn.1 \
chsh.1 \
gpasswd.1 \
groupadd.8 \
groupdel.8 \
groupmod.8 \
groups.1 \
grpck.8 \
grpconv.8 \
grpunconv.8 \
lastlog.8 \
login.1 \
newgrp.1 \
passwd.1 \
passwd.5 \
pwconv.8 \
pwunconv.8 \
shadow.5 \
useradd.8 \
userdel.8 \
usermod.8 \
vigr.8 \
vipw.8
EXTRA_DIST = $(man_MANS)

391
man/it/Makefile.in Normal file
View File

@ -0,0 +1,391 @@
# Makefile.in generated automatically by automake 1.5 from Makefile.am.
# Copyright 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001
# Free Software Foundation, Inc.
# This Makefile.in is free software; the Free Software Foundation
# gives unlimited permission to copy and/or distribute it,
# with or without modifications, as long as this notice is preserved.
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY, to the extent permitted by law; without
# even the implied warranty of MERCHANTABILITY or FITNESS FOR A
# PARTICULAR PURPOSE.
@SET_MAKE@
SHELL = @SHELL@
srcdir = @srcdir@
top_srcdir = @top_srcdir@
VPATH = @srcdir@
prefix = @prefix@
exec_prefix = @exec_prefix@
bindir = @bindir@
sbindir = @sbindir@
libexecdir = @libexecdir@
datadir = @datadir@
sysconfdir = @sysconfdir@
sharedstatedir = @sharedstatedir@
localstatedir = @localstatedir@
libdir = @libdir@
infodir = @infodir@
includedir = @includedir@
oldincludedir = /usr/include
pkgdatadir = $(datadir)/@PACKAGE@
pkglibdir = $(libdir)/@PACKAGE@
pkgincludedir = $(includedir)/@PACKAGE@
top_builddir = ../..
ACLOCAL = @ACLOCAL@
AUTOCONF = @AUTOCONF@
AUTOMAKE = @AUTOMAKE@
AUTOHEADER = @AUTOHEADER@
INSTALL = @INSTALL@
INSTALL_PROGRAM = @INSTALL_PROGRAM@
INSTALL_DATA = @INSTALL_DATA@
INSTALL_SCRIPT = @INSTALL_SCRIPT@
INSTALL_HEADER = $(INSTALL_DATA)
transform = @program_transform_name@
NORMAL_INSTALL = :
PRE_INSTALL = :
POST_INSTALL = :
NORMAL_UNINSTALL = :
PRE_UNINSTALL = :
POST_UNINSTALL = :
host_alias = @host_alias@
host_triplet = @host@
AMTAR = @AMTAR@
AS = @AS@
AWK = @AWK@
BUILD_INCLUDED_LIBINTL = @BUILD_INCLUDED_LIBINTL@
CATALOGS = @CATALOGS@
CATOBJEXT = @CATOBJEXT@
CC = @CC@
CPP = @CPP@
DATADIRNAME = @DATADIRNAME@
DEPDIR = @DEPDIR@
DLLTOOL = @DLLTOOL@
ECHO = @ECHO@
EXEEXT = @EXEEXT@
GENCAT = @GENCAT@
GLIBC21 = @GLIBC21@
GMOFILES = @GMOFILES@
GMSGFMT = @GMSGFMT@
INSTALL_STRIP_PROGRAM = @INSTALL_STRIP_PROGRAM@
INSTOBJEXT = @INSTOBJEXT@
INTLBISON = @INTLBISON@
INTLLIBS = @INTLLIBS@
INTLOBJS = @INTLOBJS@
INTL_LIBTOOL_SUFFIX_PREFIX = @INTL_LIBTOOL_SUFFIX_PREFIX@
LIBCRACK = @LIBCRACK@
LIBCRYPT = @LIBCRYPT@
LIBICONV = @LIBICONV@
LIBMD = @LIBMD@
LIBPAM = @LIBPAM@
LIBSKEY = @LIBSKEY@
LIBTCFS = @LIBTCFS@
LIBTOOL = @LIBTOOL@
LN_S = @LN_S@
MKINSTALLDIRS = @MKINSTALLDIRS@
MSGFMT = @MSGFMT@
OBJDUMP = @OBJDUMP@
OBJEXT = @OBJEXT@
PACKAGE = @PACKAGE@
POFILES = @POFILES@
POSUB = @POSUB@
RANLIB = @RANLIB@
STRIP = @STRIP@
U = @U@
USE_INCLUDED_LIBINTL = @USE_INCLUDED_LIBINTL@
USE_NLS = @USE_NLS@
VERSION = @VERSION@
YACC = @YACC@
am__include = @am__include@
am__quote = @am__quote@
install_sh = @install_sh@
mandir = @mandir@/it
man_MANS = \
adduser.8 \
chfn.1 \
chsh.1 \
gpasswd.1 \
groupadd.8 \
groupdel.8 \
groupmod.8 \
groups.1 \
grpck.8 \
grpconv.8 \
grpunconv.8 \
lastlog.8 \
login.1 \
newgrp.1 \
passwd.1 \
passwd.5 \
pwconv.8 \
pwunconv.8 \
shadow.5 \
useradd.8 \
userdel.8 \
usermod.8 \
vigr.8 \
vipw.8
EXTRA_DIST = $(man_MANS)
subdir = man/it
mkinstalldirs = $(SHELL) $(top_srcdir)/mkinstalldirs
CONFIG_HEADER = $(top_builddir)/config.h
CONFIG_CLEAN_FILES =
DIST_SOURCES =
NROFF = nroff
MANS = $(man_MANS)
DIST_COMMON = Makefile.am Makefile.in
all: all-am
.SUFFIXES:
mostlyclean-libtool:
-rm -f *.lo
clean-libtool:
-rm -rf .libs _libs
distclean-libtool:
-rm -f libtool
$(srcdir)/Makefile.in: Makefile.am $(top_srcdir)/configure.in $(ACLOCAL_M4)
cd $(top_srcdir) && \
$(AUTOMAKE) --gnu man/it/Makefile
Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status
cd $(top_builddir) && \
CONFIG_HEADERS= CONFIG_LINKS= \
CONFIG_FILES=$(subdir)/$@ $(SHELL) ./config.status
uninstall-info-am:
man1dir = $(mandir)/man1
install-man1: $(man1_MANS) $(man_MANS)
@$(NORMAL_INSTALL)
$(mkinstalldirs) $(DESTDIR)$(man1dir)
@list='$(man1_MANS) $(dist_man1_MANS) $(nodist_man1_MANS)'; \
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
for i in $$l2; do \
case "$$i" in \
*.1*) list="$$list $$i" ;; \
esac; \
done; \
for i in $$list; do \
if test -f $(srcdir)/$$i; then file=$(srcdir)/$$i; \
else file=$$i; fi; \
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
inst=`echo $$inst | sed -e 's/^.*\///'`; \
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
echo " $(INSTALL_DATA) $$file $(DESTDIR)$(man1dir)/$$inst"; \
$(INSTALL_DATA) $$file $(DESTDIR)$(man1dir)/$$inst; \
done
uninstall-man1:
@$(NORMAL_UNINSTALL)
@list='$(man1_MANS) $(dist_man1_MANS) $(nodist_man1_MANS)'; \
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
for i in $$l2; do \
case "$$i" in \
*.1*) list="$$list $$i" ;; \
esac; \
done; \
for i in $$list; do \
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
inst=`echo $$inst | sed -e 's/^.*\///'`; \
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
echo " rm -f $(DESTDIR)$(man1dir)/$$inst"; \
rm -f $(DESTDIR)$(man1dir)/$$inst; \
done
man5dir = $(mandir)/man5
install-man5: $(man5_MANS) $(man_MANS)
@$(NORMAL_INSTALL)
$(mkinstalldirs) $(DESTDIR)$(man5dir)
@list='$(man5_MANS) $(dist_man5_MANS) $(nodist_man5_MANS)'; \
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
for i in $$l2; do \
case "$$i" in \
*.5*) list="$$list $$i" ;; \
esac; \
done; \
for i in $$list; do \
if test -f $(srcdir)/$$i; then file=$(srcdir)/$$i; \
else file=$$i; fi; \
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
inst=`echo $$inst | sed -e 's/^.*\///'`; \
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
echo " $(INSTALL_DATA) $$file $(DESTDIR)$(man5dir)/$$inst"; \
$(INSTALL_DATA) $$file $(DESTDIR)$(man5dir)/$$inst; \
done
uninstall-man5:
@$(NORMAL_UNINSTALL)
@list='$(man5_MANS) $(dist_man5_MANS) $(nodist_man5_MANS)'; \
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
for i in $$l2; do \
case "$$i" in \
*.5*) list="$$list $$i" ;; \
esac; \
done; \
for i in $$list; do \
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
inst=`echo $$inst | sed -e 's/^.*\///'`; \
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
echo " rm -f $(DESTDIR)$(man5dir)/$$inst"; \
rm -f $(DESTDIR)$(man5dir)/$$inst; \
done
man8dir = $(mandir)/man8
install-man8: $(man8_MANS) $(man_MANS)
@$(NORMAL_INSTALL)
$(mkinstalldirs) $(DESTDIR)$(man8dir)
@list='$(man8_MANS) $(dist_man8_MANS) $(nodist_man8_MANS)'; \
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
for i in $$l2; do \
case "$$i" in \
*.8*) list="$$list $$i" ;; \
esac; \
done; \
for i in $$list; do \
if test -f $(srcdir)/$$i; then file=$(srcdir)/$$i; \
else file=$$i; fi; \
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
inst=`echo $$inst | sed -e 's/^.*\///'`; \
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
echo " $(INSTALL_DATA) $$file $(DESTDIR)$(man8dir)/$$inst"; \
$(INSTALL_DATA) $$file $(DESTDIR)$(man8dir)/$$inst; \
done
uninstall-man8:
@$(NORMAL_UNINSTALL)
@list='$(man8_MANS) $(dist_man8_MANS) $(nodist_man8_MANS)'; \
l2='$(man_MANS) $(dist_man_MANS) $(nodist_man_MANS)'; \
for i in $$l2; do \
case "$$i" in \
*.8*) list="$$list $$i" ;; \
esac; \
done; \
for i in $$list; do \
ext=`echo $$i | sed -e 's/^.*\\.//'`; \
inst=`echo $$i | sed -e 's/\\.[0-9a-z]*$$//'`; \
inst=`echo $$inst | sed -e 's/^.*\///'`; \
inst=`echo $$inst | sed '$(transform)'`.$$ext; \
echo " rm -f $(DESTDIR)$(man8dir)/$$inst"; \
rm -f $(DESTDIR)$(man8dir)/$$inst; \
done
tags: TAGS
TAGS:
DISTFILES = $(DIST_COMMON) $(DIST_SOURCES) $(TEXINFOS) $(EXTRA_DIST)
top_distdir = ../..
distdir = $(top_distdir)/$(PACKAGE)-$(VERSION)
distdir: $(DISTFILES)
@for file in $(DISTFILES); do \
if test -f $$file; then d=.; else d=$(srcdir); fi; \
dir=`echo "$$file" | sed -e 's,/[^/]*$$,,'`; \
if test "$$dir" != "$$file" && test "$$dir" != "."; then \
$(mkinstalldirs) "$(distdir)/$$dir"; \
fi; \
if test -d $$d/$$file; then \
cp -pR $$d/$$file $(distdir) \
|| exit 1; \
else \
test -f $(distdir)/$$file \
|| cp -p $$d/$$file $(distdir)/$$file \
|| exit 1; \
fi; \
done
check-am: all-am
check: check-am
all-am: Makefile $(MANS)
installdirs:
$(mkinstalldirs) $(DESTDIR)$(man1dir) $(DESTDIR)$(man5dir) $(DESTDIR)$(man8dir)
install: install-am
install-exec: install-exec-am
install-data: install-data-am
uninstall: uninstall-am
install-am: all-am
@$(MAKE) $(AM_MAKEFLAGS) install-exec-am install-data-am
installcheck: installcheck-am
install-strip:
$(MAKE) $(AM_MAKEFLAGS) INSTALL_PROGRAM="$(INSTALL_STRIP_PROGRAM)" \
`test -z '$(STRIP)' || \
echo "INSTALL_PROGRAM_ENV=STRIPPROG='$(STRIP)'"` install
mostlyclean-generic:
clean-generic:
distclean-generic:
-rm -f Makefile $(CONFIG_CLEAN_FILES) stamp-h stamp-h[0-9]*
maintainer-clean-generic:
@echo "This command is intended for maintainers to use"
@echo "it deletes files that may require special tools to rebuild."
clean: clean-am
clean-am: clean-generic clean-libtool mostlyclean-am
distclean: distclean-am
distclean-am: clean-am distclean-generic distclean-libtool
dvi: dvi-am
dvi-am:
info: info-am
info-am:
install-data-am: install-man
install-exec-am:
install-info: install-info-am
install-man: install-man1 install-man5 install-man8
installcheck-am:
maintainer-clean: maintainer-clean-am
maintainer-clean-am: distclean-am maintainer-clean-generic
mostlyclean: mostlyclean-am
mostlyclean-am: mostlyclean-generic mostlyclean-libtool
uninstall-am: uninstall-info-am uninstall-man
uninstall-man: uninstall-man1 uninstall-man5 uninstall-man8
.PHONY: all all-am check check-am clean clean-generic clean-libtool \
distclean distclean-generic distclean-libtool distdir dvi \
dvi-am info info-am install install-am install-data \
install-data-am install-exec install-exec-am install-info \
install-info-am install-man install-man1 install-man5 \
install-man8 install-strip installcheck installcheck-am \
installdirs maintainer-clean maintainer-clean-generic \
mostlyclean mostlyclean-generic mostlyclean-libtool uninstall \
uninstall-am uninstall-info-am uninstall-man uninstall-man1 \
uninstall-man5 uninstall-man8
# Tell versions [3.59,3.63) of GNU make to not export all variables.
# Otherwise a system limit (for SysV at least) may be exceeded.
.NOEXPORT:

1
man/it/adduser.8 Normal file
View File

@ -0,0 +1 @@
.so man8/useradd.8

74
man/it/chfn.1 Normal file
View File

@ -0,0 +1,74 @@
.\" $Id: chfn.1,v 1.1 2002/03/10 07:41:06 kloczek Exp $
.\"
.\" chfn.1 -- change your finger information
.\" (c) 1994 by salvatore valente <svalente@athena.mit.edu>
.\"
.\"
.\" Traduzione in italiano di Giovanni Bortolozzo <borto@dei.unipd.it>
.\" Agosto 1996
.\"
.\" this program is free software. you can redistribute it and
.\" modify it under the terms of the gnu general public license.
.\" there is no warranty.
.\"
.\" $Author: kloczek $
.\" $Revision: 1.1 $
.\" $Date: 2002/03/10 07:41:06 $
.\"
.\" " for hilit19
.TH CHFN 1 "13 ottobre 1994" "chfn" "Linux Reference Manual"
.SH NOME
chfn \- cambia le proprie "finger information"
.SH SINTASSI
.B chfn
[\ \-f\ nome_vero\] [\ \-o\ ufficio\] [\ \-p\ telefono_ufficio\]
[\ \-h\ telefono_casa\] [\ \-u\ ] [\ \-v\ ] [\ nome_utente\]
.SH DESCRIZIONE
.B chfn
è usato per cambiare le proprie finger information. Queste informazioni sono
salvate nel file
.IR /etc/passwd ,
e sono mostrate dal programma
.BR finger .
Il comando
.B finger
di Linux mostra quattro porzioni di informazione che possono essere
cambiati tramite
.BR chfn :
il proprio nome vero, l'ufficio e il numero di telefono di quest'ultimo, e il
proprio numero di telefono di casa.
.SS LINEA DI COMANDO
Ognuno delle quattro porzioni può essere specificata nella linea di comando.
Se non viene passata alcuna informazione sulla linea di comando,
.B chfn
entra in modo interattivo.
.SS MODO INTERATTIVO
Nel modo interattivo,
.B chfn
chiederà ognuno dei campi. Al prompt, possono essere immesse le nuove
informazioni, o premere return per non cambiare il campo. L'immissione della
parola chiave "none" cancella il campo.
.SH OPZIONI
.TP
.I "\-f, \-\-full-name"
Specifica il proprio nome reale.
.TP
.I "\-o, \-\-office"
Specifica il numero del proprio ufficio.
.TP
.I "\-p, \-\-office-phone"
Specifica il numero di telefono del proprio ufficio.
.TP
.I "\-h, \-\-home-phone"
Specifica il numero di telefono di casa.
.TP
.I "\-u, \-\-help"
Mostra un messaggio d'aiuto ed esce.
.TP
.I "-v, \-\-version"
Mostra informazioni sulla versione ed esce.
.SH "VEDERE ANCHE"
.BR finger (1),
.BR passwd (5)
.SH AUTORE
Salvatore Valente <svalente@mit.edu>

58
man/it/chsh.1 Normal file
View File

@ -0,0 +1,58 @@
.\" $Id: chsh.1,v 1.1 2002/03/10 07:41:06 kloczek Exp $
.\"
.\" chsh.1 -- change your login shell
.\" (c) 1994 by salvatore valente <svalente@athena.mit.edu>
.\"
.\" Traduzione in italiano di Giovanni Bortolozzo <borto@dei.unipd.it>
.\" Agosto 1996
.\" Aggiornamento alla 2.9 di Roberto Pertile <triplej@iol.it>
.\" Maggio 1999
.\" this program is free software. you can redistribute it and
.\" modify it under the terms of the gnu general public license.
.\" there is no warranty.
.\"
.\" $Author: kloczek $
.\" $Revision: 1.1 $
.\" $Date: 2002/03/10 07:41:06 $
.\"
.TH CHSH 1 "7 ottobre 1998" "chsh" "Linux Reference Manual"
.SH NOME
chsh \- cambia la shell di login
.SH SINTASSI
.B chsh
[\ \-s\ shell\ ] [\ \-l\ ] [\ \-u\ ] [\ \-v\ ] [\ nome_utente\ ]
.SH DESCRIZIONE
.B chsh
è usato per cambiare la propria shell di login.
Se nella linea di comando non viene fornita una shell,
.B chsh
ne chiede una.
.SS SHELL VALIDE
.B chsh
accetterà l'intero percorso di qualunque file eseguibile nel sistema.
Tuttavia, emetterà un messaggio di avviso se la shell non è elencata nel
file
.I /etc/shells.
D'altra parte, può anche essere configurato in modo tale da accettare solo
shell elencate in questo file, a meno che sia eseguito da root.
.SH OPZIONI
.TP
.I "\-s, \-\-shell"
Specifica la propria shell di login.
.TP
.I "\-l, \-\-list-shells"
Stampa la lista delle shell elencate in
.I /etc/shells
ed esce.
.TP
.I "\-u, \-\-help"
Stampa un messaggio sull'uso ed esce.
.TP
.I "-v, \-\-version"
Stampa informazioni sulla versione ed esce.
.SH "VEDERE ANCHE"
.BR login (1),
.BR passwd (5),
.BR shells (5)
.SH AUTORE
Salvatore Valente <svalente@mit.edu>

76
man/it/gpasswd.1 Normal file
View File

@ -0,0 +1,76 @@
.\" Copyright 1996, Rafal Maszkowski, rzm@pdi.net
.\" All rights reserved. You can redistribute this man page and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of the
.\" License, or (at your option) any later version.
.\"
.\" $Id: gpasswd.1,v 1.1 2002/03/10 07:41:06 kloczek Exp $
.\"
.\" Traduzione in italiano a cura di Isabella Ruocco <isacher@nettaxi.com>
.\" luglio 1999
.\"
.TH GPASSWD 1
.SH NOME
gpasswd \- amministra il file /etc/group
.br
.SH SINTASSI
.B gpasswd \fIgruppo\fR
.br
.B gpasswd
.B -a
\fIutente\fR \fIgruppo\fR
.br
.B gpasswd
.B -d
\fIutente\fR \fIgruppo\fR
.br
.B gpasswd
.B -R
\fIgruppo\fR
.br
.B gpasswd
.B -r
\fIgruppo\fR
.br
.B gpasswd
.RB [ -A
\fIutente\fR,...]
.RB [ -M
\fIutente\fR,...]
\fIgruppo\fR
.br
.SH DESCRIZIONE
.B gpasswd
viene usato per amministrare il file /etc/group (ed il file /etc/gshadow
se compilato con SHADOWGRP definito). Ogni gruppo può avere amministratori,
membri ed una password. L'amministratore di sistema può usare l'opzione \fB-A\fR
per definire l'amministratore/gli amministratori di gruppo e l'opzione \fB-M\fR
per definire i membri ed ha tutti i diritti degli amministratori di gruppo e
dei membri.
.PP
L'amministratore di gruppo può aggiungere e rimuovere utenti usando
rispettivamente le opzioni \fB-a\fR e \fB-d\fR. Gli amministratori possono usare
l'opzione \fB-r\fR per rimuovere la password di gruppo. Quando non è
impostata alcuna password solo i membri del gruppo possono usare
.BR newgrp (1)
per unirsi al gruppo. L'opzione \fB-R\fR disabilita l'accesso al gruppo tramite
il comando
.BR newgrp (1).
.PP
.B gpasswd
invocata da un amministratore di gruppo con il solo nome del gruppo richiede
solamente la password di gruppo. Se la password è impostata i membri possono ancora
usare
.BR newgrp (1)
senza la password, i non-membri devono fornire la password.
.SH FILE
/etc/group \- informazioni sui gruppi
.br
/etc/gshadow \- informazioni sul gruppo shadow
.SH VEDERE ANCHE
.BR newgrp (1),
.BR groupadd (8),
.BR groupdel (8),
.BR groupmod (8),
.BR grpck (8)

66
man/it/groupadd.8 Normal file
View File

@ -0,0 +1,66 @@
.\" Copyright 1991, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: groupadd.8,v 1.1 2002/03/10 07:41:06 kloczek Exp $
.\"
.\" Traduzione in italiano a cura di Isabella Ruocco <isacher@nettaxi.com>
.\" luglio 1999
.\"
.TH GROUPADD 8
.SH NOME
groupadd \- Crea un nuovo gruppo
.SH SINTASSI
.B groupadd
[\fB-g\fI gid \fR[\fB-o\fR]]
.I gruppo
.SH DESCRIZIONE
Il comando \fBgroupadd\fR crea un nuovo account di gruppo usando i valori
specificati sulla linea di comando ed i valori predefiniti dal sistema.
Il nuovo gruppo verrà aggiunto ai file di sistema che lo necessitano.
Le opzioni che si applicano al comando \fBgroupadd\fR sono
.IP "\fB-g \fIgid\fR"
Il valore numerico dell'identificatore (ID) del gruppo.
Questo valore deve essere univoco, a meno che non venga usata l'opzione \fB-o\fR.
Il valore deve essere non-negativo.
La scelta predefinita è quella di usare il minimo valore di ID superiore a 99
e superiore a qualunque altro gruppo.
Valori tra 0 e 99 sono tipicamente riservati per account di sistema.
.SH FILE
/etc/group \- informazioni sugli account di gruppo
.br
/etc/gshadow \- informazioni sicure sugli account di gruppo
.SH VEDERE ANCHE
.BR chfn (1),
.BR chsh (1),
.BR useradd (8),
.BR userdel (8),
.BR usermod (8),
.BR passwd (1),
.BR groupdel (8),
.BR groupmod (8)
.SH AUTORE
Julianne Frances Haugh (jfh@tab.com)

63
man/it/groupdel.8 Normal file
View File

@ -0,0 +1,63 @@
.\" Copyright 1991 - 1993, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: groupdel.8,v 1.1 2002/03/10 07:41:06 kloczek Exp $
.\"
.\" Traduzione in italiano a cura di Isabella Ruocco <isacher@nettaxi.com>
.\" luglio 1999
.\"
.TH GROUPDEL 8
.SH NOME
groupdel \- Rimuove un gruppo
.SH SINTASSI
.B groupdel
.I gruppo
.SH DESCRIZIONE
Il comando \fBgroupdel\fR modifica i file di account di sistema, rimuovendo
tutte le voci che si riferiscono a \fIgruppo\fR.
Il gruppo nominato deve esistere.
.PP
Occorre controllare manualmente tutti i filesystem per assicurarsi che non
rimanga alcun file avente come ID di gruppo del file il gruppo specificato.
.SH CAVEAT
Non si può rimuovere il gruppo primario di qualche utente esistente.
Occorre rimuovere l'utente prima di rimuovere il gruppo.
.SH FILE
/etc/group \- informazioni sui gruppi
.br
/etc/gshadow \- informazioni sicure sui gruppi
.SH VEDERE ANCHE
.BR chfn (1),
.BR chsh (1),
.BR useradd (8),
.BR userdel (8),
.BR usermod (8),
.BR passwd (1),
.BR groupadd (8),
.BR groupmod (8)
.SH AUTORE
Julianne Frances Haugh (jfh@tab.com)

69
man/it/groupmod.8 Normal file
View File

@ -0,0 +1,69 @@
.\" Copyright 1991, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: groupmod.8,v 1.1 2002/03/10 07:41:06 kloczek Exp $
.\"
.\" Traduzione in italiano a cura di Isabella Ruocco <isacher@nettaxi.com>
.\" luglio 1999
.\"
.TH GROUPMOD 8
.SH NOME
groupmod \- Modifica un gruppo
.SH SINTASSI
.B groupmod
[\fB-g\fI gid \fR[\fB-o\fR]]
[\fB-n\fI nome_gruppo \fR]
.I gruppo
.SH DESCRIZIONE
Il comando \fBgroupmod\fR modifica i file di account del sistema in modo
da riflettere i cambiamenti che sono specificati sulla linea di comando.
Le opzioni che si applicano al comando \fIgroupmod\fR sono
.IP "\fB-g \fIgid\fR"
Il valore numerico dell'identificatore (ID) del gruppo.
Questo valore deve essere univoco, a meno che non venga usata l'opzione
\fB-o\fR.
Il valore deve essere non-negativo.
Valori tra 0 e 99 sono tipicamente riservati per gruppi di sistema.
Occorre modificare manualmente l'ID di gruppo di tutti i file
il cui ID di gruppo è quello vecchio.
.IP "\fB-n \fInome_gruppo\fR"
Il nome del gruppo verrà modificato da \fIgruppo\fR a \fInome_gruppo\fR.
.SH FILE
/etc/group \- informazioni sui gruppi
.br
/etc/gshadow \- informazioni sicure sui gruppi
.SH VEDERE ANCHE
.BR chfn (1),
.BR chsh (1),
.BR useradd (8),
.BR userdel (8),
.BR usermod (8),
.BR passwd (1),
.BR groupadd (8),
.BR groupdel (8)
.SH AUTORE
Julianne Frances Haugh (jfh@tab.com)

46
man/it/groups.1 Normal file
View File

@ -0,0 +1,46 @@
.\" $Id: groups.1,v 1.1 2002/03/10 07:41:06 kloczek Exp $
.\" Italian manpages for GNU sh-utils-1.16.
.\" Copyright (C) 1997 Free Software Foundation, Inc.
.\" Giovanni Bortolozzo <borto@dei.unipd.it>, 1997.
.\"
.\" Traduzione di Giovanni Bortolozzo <borto@dei.unipd.it>
.\" Maggio 1997
.\"
.\"" for hilit19
.TH GROUPS 1 "GNU Shell Utilities" "FSF"
.SH NOME
groups \- mostra i gruppi in cui è presente l'utente
.SH SINTASSI
.B groups
[nomeutente...]
.br
.B groups
{\-\-help,\-\-version}
.SH DESCRIZIONE
Questa documentazione non è mantenuta da lungo tempo e potrebbe essere
inaccurata o incompleta. La documentazione in Texinfo è ora la fonte
autorevole.
.PP
Questa pagina di manuale documenta la versione GNU di
.BR groups .
.B groups
mostra i nomi dei gruppi supplementari in cui è presente ogni
.I nomeutente
dato, o del processo corrente se non ne è dato nessuno. Se sono dati
dei nomi di utenti, il nome di ogni utente è stampato prima della
lista dei gruppi dell'utente.
.PP
La lista dei gruppi è equivalente all'output del comando `id \-Gn'.
.SS OPZIONI
Quando GNU
.B groups
è chiamato con un solo argomento sono riconosciute le seguenti
opzioni:
.TP
.I "\-\-help"
Mostra nello standard output un messaggio d'aiuto ed esce con successo.
.TP
.I "\-\-version"
Mostra nello standard output informazioni sulla versione ed esce con
successo.

108
man/it/grpck.8 Normal file
View File

@ -0,0 +1,108 @@
.\" Copyright 1992 - 1993, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: grpck.8,v 1.1 2002/03/10 07:41:06 kloczek Exp $
.\"
.\" Traduzione in italiano a cura di Isabella Ruocco <isacher@nettaxi.com>
.\" luglio 1999
.\"
.TH GRPCK 8
.SH NOME
grpck \- verifica l'integrità dei file di gruppo
.SH SINTASSI
\fBgrpck\fR [\fB-r\fR] [\fIgruppo\fR \fIshadow\fR]
.SH DESCRIZIONE
\fBgrpck\fR verifica l'integrità delle informazioni di autenticazione del
sistema.
Vengono controllate tutte le voci in \fI/etc/group\fR e \fI/etc/gshadow\fR
per verificare che la voce abbia il formato appropriato e dati validi
in ciascun campo.
Viene richiesto all'utente di rimuovere le voci che sono formattate
impropriamente o che hanno altri errori incorreggibili.
.P
Vengono fatti controlli per verificare che ogni voce abbia
.sp
.in +.5i
- il corretto numero di campi
.br
- un nome univoco di gruppo
.br
- una lista valida di membri ed amministratori
.in -.5i
.sp
.P
Le verifiche sul corretto numero di campi e sul nome univoco del gruppo
sono fatali.
Se la voce ha un numero errato di campi, all'utente verrà richiesto di
cancellare l'intera riga.
Se l'utente non risponde affermativamente, vengono omessi tutti gli
ulteriori controlli.
Verrà richiesta la cancellazione di una voce avente il nome del gruppo duplicato,
ma i rimanenti controlli verranno ugualmente effettuati.
Tutti gli altri errori sono avvertimenti e l'utente è incitato ad eseguire
il comando \fBgroupmod\fR per correggere l'errore.
.P
I comandi che operano sul file \fI/etc/group\fR non sono in grado di alterare
voci corrotte o duplicate.
In quelle circostanze dovrebbe essere usato \fBgrpck\fR per rimuovere la voce
scorretta.
.SH OPZIONI
Come modalità predefinita, \fBgrpck\fR opera sui file \fI/etc/group\fR ed
\fI/etc/gshadow\fR.
L'utente può selezionare file alternativi con i parametri \fIgruppo\fR e
\fIshadow\fR.
Inoltre, l'utente può eseguire il comando in modalità di sola lettura
specificando l'opzione \fB-r\fR.
Questa fa in modo che venga risposto \fBno\fR a tutte le domande che riguardano
i cambiamenti senza l'intervento dell'utente.
.SH FILE
/etc/group \- informazioni sugli account di gruppo
.br
/etc/gshadow \- password crittate e informazioni sugli amministratori di gruppo
.br
/etc/passwd \- informazioni sugli utenti
.SH VEDERE ANCHE
.BR groupmod (8),
.BR group (5),
.BR passwd (5),
.BR shadow (5)
.SH DIAGNOSTICA
Il comando \fBgrpck\fR esce con i seguenti valori:
.IP 0 5
Successo
.IP 1 5
Errore di sintassi
.IP 2 5
Una o più voci di gruppo scorrette
.IP 3 5
Impossibile aprire i file di gruppo
.IP 4 5
Impossibile eseguire il lock dei file di gruppo
.IP 5 5
Impossibile aggiornare i file di gruppo
.SH AUTORE
Julianne Frances Haugh (jfh@tab.com)

58
man/it/grpconv.8 Normal file
View File

@ -0,0 +1,58 @@
.\" $Id: grpconv.8,v 1.1 2002/03/10 07:41:06 kloczek Exp $
.\" Traduzione in italiano di Isabella Ruocco <isacher@nettaxi.com>
.\" Giugno 1999
.TH PWCONV 8 "26 sep 1997"
.SH NOME
pwconv, pwunconv, grpconv, grpunconv \- convertono a e da password e gruppi shadow.
.SH SINTASSI
.B pwconv
.br
.B pwunconv
.br
.B grpconv
.br
.B grpunconv
.SH DESCRIZIONE
Questi quattro programmi agiscono tutti sui file normali e e oscurati (shadow)
delle password e dei gruppi:
.IR /etc/passwd ", " /etc/group ", " /etc/shadow ", e " /etc/gshadow .
.B pwconv
.RI "crea " shadow " da " passwd " e, in modo opzionale, da un preesistente " shadow .
.B pwunconv
.RI "crea " passwd " da " passwd " e " shadow " e quindi rimuove " shadow .
.B grpconv
.RI "crea " gshadow " da " group " e, in modo opzionale, da un preesistente " gshadow .
.B grpunconv
.RI "crea " group " da " group " e " gshadow " e quindi rimuove " gshadow .
Ciascun programma, prima della conversione, acquisisce i lock necessari.
.BR pwconv " e " grpconv
sono simili. Per prima cosa vengono rimosse le voci nel file oscurato che non esistono
nel file principale. Quindi vengono aggiornate le voci oscurate che
non hanno `x' come password nel file principale. Vengono aggiunte le eventuali voci
oscurate mancanti. Infine, le password nel file principale vengono
sostituite con `x'. Questi programmi possono essere usati per le conversioni iniziali
così come per aggiornare il file oscurato se il file principale viene editato
a mano.
.B pwconv
userà i valori di
.BR PASS_MIN_GIORNI ", " PASS_MAX_GIORNI ", e " PASS__GIORNI_PREAVVISO
da
.I /etc/login.defs
quando si aggiungono nuove voci a
.IR /etc/shadow .
.RB "Analogamente, " pwunconv " e " grpunconv
sono simili. Le password nel file principale vengono aggiornate
dal file oscurato. Voci che esistono nel file principale ma non
nel file oscurato vengono lasciate stare. Infine, viene rimosso il file oscurato.
Alcune informazioni sull'invecchiamento delle password vengono perse da
.BR pwunconv .
Questo convertirà quello che potrà.
.SH "VEDERE ANCHE"
.BR login.defs (5),
.BR shadowconfig (8)

1
man/it/grpunconv.8 Normal file
View File

@ -0,0 +1 @@
.so man8/grpconv.8

66
man/it/lastlog.8 Normal file
View File

@ -0,0 +1,66 @@
.\" Copyright 1992, Phillip Street and Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" @(#)lastlog.8 3.3 08:24:58 29 Sep 1993 (National Guard Release)
.\" $Id: lastlog.8,v 1.1 2002/03/10 07:41:06 kloczek Exp $
.\"
.\" Traduzione in italiano a cura di Isabella Ruocco <isacher@nettaxi.com>
.\" luglio 1999
.\"
.TH LASTLOG 8
.SH NOME
lastlog \- esamina il file lastlog
.SH SINTASSI
.B lastlog
.RB [ -u
.IR uid ]
.RB [ -t
.IR giorni ]
.SH DESCRIZIONE
\fBlastlog\fR formatta e stampa il contenuto dell'ultimo log di login,
\fI/var/log/lastlog\fR. Verranno stampati \fBnome-login\fR, \fBporta\fR,
e \fBdata_ultima_connessione\fR.
Il comportamento predefinito (senza opzioni) è quello di stampare le voci di
lastlog in ordine di UID.
Digitando l'opzione \fB-u \fInome-login\fR verrà stampato solo il
record di \fInome-login\fR.
Digitando \fB-t \fIgiorni\fR verranno stampate solo le ultime connessioni
più recenti di \fIgiorni\fR.
L'opzione \fB-t\fR sovrascrive l'uso di \fB-u\fR.
.PP
Se l'utente non si è mai connesso verrà mostrato, al posto della porta e della
data, il messaggio \fB"**Never logged in**"\fR (**Mai connesso**).
.SH FILE
/var/log/lastlog \- file di connessione lastlog
.SH CAVEAT
Grandi lacune nei numeri di uid provocheranno una prolungata esecuzione del
programma lastlog senza alcun output sullo schermo (i.e. se mmdf=800 e l'ultimo
uid=170, sembrerà che il programma rimanga appeso mentre elabora gli uid 171-799).
.SH AUTORI
Julianne Frances Haugh (jfh@tab.com)
.br
Phillip Street

334
man/it/login.1 Normal file
View File

@ -0,0 +1,334 @@
.\" $Id: login.1,v 1.1 2002/03/10 07:41:06 kloczek Exp $
.\" Copyright 1993 Rickard E. Faith (faith@cs.unc.edu)
.\" May be distributed under the GNU General Public License
.\" Può essere distribuito sotto la GNU General Public License
.\"
.\" Traduzione in italiano di Giovanni Bortolozzo <borto@dei.unipd.it>
.\" Agosto 1996
.\" Aggiornamento alla 2.9 di Roberto Pertile <triplej@iol.it>
.TH LOGIN 1 "4 novembre 1996" "Util-linux 1.6" "Linux Programmer's Manual"
.SH NOME
login \- accede al sistema
.SH SINTASSI
.BR "login [ " nome " ]"
.br
.B "login \-p"
.br
.BR "login \-h " nome_host
.br
.BR "login \-f " nome
.SH DESCRIZIONE
.B login
viene utilizzato quando si accede a un sistema. Può
anche venire usato per passare da un utente a un altro in qualunque momento
(le shell più recenti tuttavia hanno un supporto incorporato per questa
caratteristica).
Se non sono forniti argomenti,
.B login
chiede il nome dell'utente.
Se l'utente
.I non
é root, e se esiste
.IR /etc/nologin ,
vengono stampati sullo schermo i contenuti di questo file e viene
terminata l'operazione.
Ciò viene usato, tipicamente, per impedire collegamenti quando il sistema
sta per essere spento.
Se per l'utente sono specificate particolari restrizioni di accesso in
.IR /etc/usertty ,
esse devono venire rispettate, altrimenti il tentativo di collegamento
riceverà un diniego e verrà generato un messaggio di
.BR syslog .
Si veda la sezione sulle "Restrizioni Speciali sull'Accesso".
Se l'utente è root, allora il collegamento deve avvenire da una tty
elencata in
.IR /etc/securetty .
I fallimenti saranno registrati dai servizi di
.BR syslog .
Dopo la verifica di queste condizioni, verrà richiesta e controllata
la password (se è necessaria per quell'utente). Sono consentiti dieci
tentativi prima che
.B login
termini, tuttavia dopo i primi tre, la risposta comincerà a diventare
molto lenta.
I collegamenti falliti vengono riferiti dai servizi di
.BR syslog .
Questi servizi sono inoltre usati per riferire qualsiasi collegamento
riuscito di root.
Se esiste il file
.IR .hushlogin ,
allora verrà eseguito un collegamento "silenzioso" (disabilitando il
controllo della posta, la stampa dell'orario dell'ultimo collegamento
e del messaggio del giorno). Altrimenti, se esiste
.IR /var/log/lastlog ,
viene stampata la data e ora dell'ultimo collegamento (e viene registrato
il collegamento in atto).
Sono eseguiti compiti amministrativi vari, come impostare lo UID e il GID
della tty. Viene conservata la variabile d'ambiente TERM, se esiste (le altre
variabili d'ambiente vengono conservate se si usa l'opzione
.BR \-p ).
Quindi vengono impostate le variabili d'ambiente HOME, PATH, SHELL, TERM,
MAIL e LOGNAME. PATH viene predefinito come
.I /usr/local/bin:/bin:/usr/bin:.
per gli utenti normali e come
.I /sbin:/bin:/usr/sbin:/usr/bin
per root. Infine, se non si tratta di un collegamento "silenzioso", viene
stampato il messaggio del giorno, viene controllato il file col nome
dell'utente in
.IR /usr/spool/mail ,
e stampato un messaggio se esso ha lunghezza non-zero.
Viene poi lanciata la shell dell'utente. Se non è specificata nessuna
shell per l'utente in
.BR /etc/passwd ,
allora viene usata
.BR /bin/sh .
Se non sono specificate directory in
.IR /etc/passwd ,
allora viene usata
.I /
(la directory home viene controllata dal file
.I .hushlogin
descritto sopra).
.SH OPZIONI
.TP
.B \-p
Usata da
.BR getty (8)
per dire a
.B login
di non distruggere l'ambiente.
.TP
.B \-f
Usata per saltare la seconda autentifica di collegamento. Ciò,
specificamente,
.B non
funziona per root, e non sembra funzionare bene sotto Linux.
.TP
.B \-h
Usata da altri server (per esempio,
.BR telnetd (8))
per passare il nome dell'host remoto a
.B login
onde poterlo collocare in utmp e wtmp. Solo il superutente può usare
quest'opzione.
.SH "RESTRIZIONI SPECIALI SULL'ACCESSO"
Il file
.I /etc/securetty
elenca il nome delle tty sulle quali può collegarsi root. Su ogni linea deve
essere specificato un nome di dispositivo tty senza il prefisso /dev/. Se
il file non esiste, a root è permesso di collegarsi da qualunque tty.
.PP
Il file
.I /etc/usertty
specifica restrizioni di accesso ulteriori per specifici utenti. Se questo
file non esiste, non viene imposta alcuna ulteriore restrizione d'accesso.
Il file consiste di una sequenza di sezioni. Ci sono tre possibili tipi di
sezione: CLASSES, GROUPS e USERS. Una sezione CLASSES definisce la classe di
tty consentiti e i modelli di hostname, una sezione GROUPS definisce tty e
host consentiti in base al gruppo, una sezione USERS definisce tty e host
consentiti in base all'utente.
.PP
Ogni riga di questo file può avere una lunghezza massima di 255 caratteri. I
commenti iniziano con un carattere # e si estendono fino al termine della
riga.
.PP
.SS "La sezione CLASSES"
Una sezione CLASSES incomincia con la parola CLASSES, all'inizio della riga
e tutta in maiuscole. Ognuna delle righe che seguono, fino
all'inizio di una nuova sezione o alla fine del file, consistono in una
sequenza di parole separate da tabulazioni o spazi. Ogni riga definisce
una classe di tty e modelli di host.
.PP
La parola all'inizio di una riga viene definita come un nome collettivo
per le tty e i modelli di host specificati nel resto della riga. Questo
nome collettivo può essere usato in ogni sezione successiva GROUPS o
USERS. Nessuno di tali nomi di classi deve essere parte della definizione
di una classe, per evitare problemi con classi ricorsive.
.PP
Un esempio di sezione CLASSES:
.PP
.nf
.in +.5
CLASSES
mia_classe1 tty1 tty2
mia_classe2 tty3 @.foo.com
.in -.5
.fi
.PP
Ciò definisce le classi
.I mia_classe1
e
.I mia_classe2
corrispondenti a quello che hanno a destra.
.PP
.SS "La sezione GROUPS"
Una sezione GROUPS definisce i tipi consentiti di tty e host in base al
gruppo Unix. Se un utente è membro di un gruppo Unix in accordo a
.I /etc/passwd
e
.I /etc/group
e tale gruppo è menzionato in una sezione GROUPS in
.I /etc/usertty
allora l'utente ha il permesso di accesso se lo ha il gruppo.
.PP
Una sezione GROUPS incomincia con la parola GROUPS, tutta in maiuscole,
all'inizio di una riga, ogni riga seguente è una sequenza di parole
separate da spazi o tabulazioni. La prima parola di una riga è il nome
del gruppo e il resto delle parole sulla riga specificano le tty e gli host
dai quali è consentito accesso ai membri di quel gruppo. Queste
specificazioni possono comportare l'uso di classi definite nelle precedenti
sezioni CLASSES.
.PP
Esempio di una sezione GROUPS:
.PP
.nf
.in +0.5
GROUPS
sys tty1 @.bar.edu
stud mia_classe1 tty4
.in -0.5
.fi
.PP
Questo esempio specifica che i membri del gruppo
.I sys
possono collegarsi da tty1 e da host nel dominio bar.edu. Gli utenti nel
gruppo
.I stud
possono collegarsi dagli host/tty specificati nella classe mia_classe1 o
da tty4.
.PP
.SS "La sezione USERS"
Una sezione USERS comincia con la parola USERS tutta in maiuscolo all'inizio
di una riga, e ogni riga successiva è una sequenza di parole separate da
spazi o tabulazioni. La prima parola in una riga è un nome di utente e a
quell'utente è permesso di collegarsi dai tty e dagli host menzionati nel
resto della riga. Queste specificazioni possono comportare classi definite
in precedenti sezioni CLASSES. Se non viene specificata alcuna intestazione
all'inizio del file, la prima sezione è predefinita come sezione USERS.
.PP
Esempio di una sezione USERS:
.PP
.nf
.in +0.5
USERS
zacho tty1 @130.225.16.0/255.255.255.0
blue tty3 mia_classe2
.in -0.5
.fi
.PP
Ciò consente all'utente zacho di collegarsi solo sul tty1 e dagli host con
indirizzi IP nell'intervallo 130.225.16.0 \- 130.225.16.255, e all'utente
blue consente di collegarsi dal tty3 e da qualunque cosa sia stato
specificato in mia_classe2.
.PP
Ci può essere una riga nella sezione USERS che comincia con un nome di
utente di *. Questa è una regola predefinita e verrà applicata a
qualsiasi utente che non corrisponda ad alcuna altra riga.
.PP
Se un utente corrisponde sia a una riga USERS sia a una riga GROUPS
allora all'utente è consentito l'accesso risultante dall'unione di tutti i
tty/host menzionati in tali specificazioni.
.SS Origini
Le specifiche di tty e i modelli di host usate nella specificazione degli
accessi di classi, gruppi e utenti si chiamano origini. Una stringa origine
può avere uno dei seguenti formati:
.IP o
Il nome di un dispositivo tty senza il prefisso /dev/, per esempio tty1 o
ttyS0.
.PP
.IP o
La stringa @localhost, che significa che all'utente è permesso di fare
telnet/rlogin dall'host locale allo stesso host. Questo consente inoltre
all'utente, per esempio, di eseguire il comando: xterm -e /bin/login.
.PP
.IP o
Il suffisso di un nome di dominio come @.some.dom, che significa che
l'utente può fare rlogin/telnet da qualsiasi host il cui nome di dominio
abbia il suffisso
.some.dom.
.PP
.IP o
Un intervallo di indirizzi IPv4 , scritto @x.x.x.x/y.y.y.y dove x.x.x.x
è l'indirizzo IP nella consueta notazione decimale puntata, e
y.y.y.y è una bitmask nella stessa notazione che specifica quali bit
nell'indirizzo devono essere confrontati con l'indirizzo IP dell'host remoto.
Per esempio, @130.225.16.0/255.255.254.0 vuol dire che l'utente può fare
rlogin/telnet da qualsiasi host il cui indirizzo IP sia nell'intervallo
130.225.16.0 \- 130.225.17.255.
.PP
Qualunque delle suddette origini può essere prefissata da una
specificazione di tempo secondo la sintassi:
.PP
.nf
spec_ora ::= '[' <giorno-o-ora> [':' <giorno-o-ora>]* ']'
giorno ::= 'mon' | 'tue' | 'wed' | 'thu' | 'fri' | 'sat' | 'sun'
ora ::= '0' | '1' | ... | '23'
spec_ora ::= <ora> | <ora> '\-' <ora>
giorno-o-ora ::= <giorno> | <spec_ora>
.fi
.PP
Per esempio, l'origine [mon:tue:wed:thu:fri:8\-17]tty3 significa che il
collegamento è consentito dal lunedì al venerdì fra le 8:00 e le 17:59
(5:59 p.m.) dalla tty3. Questo mostra anche che un intervallo di ore a\-b
include tutti gli istanti fra a:00 e b:59. La specificazione di una singola
ora (come 10) significa l'intervallo di tempo fra le 10:00 e le 10:59.
.PP
La mancata specificazione di qualsiasi prefisso di tempo per una tty o host
significa che il collegamento da quella origine è permesso in qualunque
momento. Se dato un prefisso di tempo, ci si accerti di specificare sia un
insieme di giorni sia una una o più ore o intervalli di ore. Una
specificazione di ore non può comprendere nessuno spazio bianco.
.PP
Se non è data alcuna regola predefinita allora gli utenti che non
corrispondano ad alcuna riga di
.I /etc/usertty
possono collegarsi da qualunque posto, come è il comportamento standard.
.PP
.SH FILE
.nf
.I /var/run/utmp
.I /var/log/wtmp
.I /var/log/lastlog
.I /usr/spool/mail/*
.I /etc/motd
.I /etc/passwd
.I /etc/nologin
.I /etc/usertty
.I .hushlogin
.fi
.SH "VEDERE ANCHE"
.BR init (8),
.BR getty (8),
.BR mail (1),
.BR passwd (1),
.BR passwd (5),
.BR environ (7),
.BR shutdown (8)
.SH BACHI
Linux, a differenza di altri sistemi operativi draconiani, non controlla le
quote di spazio.
Non è supportata l'opzione non documentata del BSD
.BR \-r .
Ciò potrebbe essere richiesto da alcuni programmi di
.BR rlogind (8) .
.SH AUTORE
Derivato dal BSD login 5.40 (5/9/89) da Michael Glad (glad@daimi.dk) per HP-UX
.br
Portato a Linux 0.12: Peter Orbaek (poe@daimi.aau.dk)

34
man/it/newgrp.1 Normal file
View File

@ -0,0 +1,34 @@
.\" $Id: newgrp.1,v 1.1 2002/03/10 07:41:06 kloczek Exp $
.\" Original author unknown. This man page is in the public domain.
.\" Modified Sat Oct 9 17:46:48 1993 by faith@cs.unc.edu
.\"
.\" Traduzione in italiano di Giovanni Bortolozzo <borto@dei.unipd.it>
.\" Agosto 1996
.\"
.\" " for hilit19
.TH NEWGRP 1 "9 ottobre 1993" "Linux 1.2" "Linux Programmer's Manual"
.SH NOME
newgrp \- logga in un nuovo gruppo
.SH SINTASSI
.BI "newgrp [ " gruppo " ]"
.SH DESCRIZIONE
.B Newgrp
cambia l'identificatico del gruppo (GID) del suo chiamante, in modo analogo a
.BR login (1).
La stessa persona rimane loggata, e non è cambiata la directory corrente,
ma i calcoli sui permessi d'accesso ai file sono fatti rispetto a nuovo
group ID.
.LP
Se non è specificato alcun gruppo, il GID è posto pari al GID di login.
.LP
.SH FILE
.I /etc/group
.br
.I /etc/passwd
.SH "VEDERE ANCHE"
.BR login "(1), " group (5)
.SH AUTORE
All'inizio era Michael Haardt. Attualmente mantenuto da
Peter Orbaek (poe@daimi.aau.dk).

57
man/it/passwd.1 Normal file
View File

@ -0,0 +1,57 @@
.\" $Id: passwd.1,v 1.1 2002/03/10 07:41:06 kloczek Exp $
.\" Copyright 1992 Rickard E. Faith (faith@cs.unc.edu)
.\" May be distributed under the GNU General Public License
.\"
.\" Traduzione in italiano di Giovanni Bortolozzo <borto@dei.unipd.it>
.\" Agosto 1996
.\"
.\" " for hilit19
.TH PASSWD 1 "22 giugno 1994" "Linux 1.2" "Linux Programmer's Manual"
.SH NOME
passwd \- cambia la password
.SH SINTASSI
.BR "passwd [ " utente " [ " password " ] ]"
.SH DESCRIZIONE
Senza alcun argomento
.B passwd
cambierà la password per l'attuale utente. Per prima cosa all'utente è chiesta
la vecchia password, dopo di che, per evitare errori di battitura, va immessa
per due volte la nuova password. La nuova password deve essere lunga almeno
sei caratteri ed essere composta sia da maiuscole che da minuscole o da
caratteri non alfabetici. La nuova password non deve essere uguale alla
vecchia password, e non deve coincidere con il nome dell'utente.
Le forme a uno e due argomenti possono essere usate solo dal superuser. Usando
la forma ad un argomento, il superuser può cambiare la password per
quell'utente. Al superuser non è chiesta la vecchia password, e non sono
applicate le regole per le password valide, poiché il superuser potrebbe
avere valide ragioni per scegliere una password che non ne sia conforme.
La forma a due argomenti assegna ad
.I utente
la password passata come secondo argomento. Ciò può essere utile quando
si deve assegnare a molti utenti una password iniziale.
Passando una stringa vuota come secondo argomento si cancella la password
dell'utente.
.SH FILE
.I /etc/passwd
.br
.I /etc/shells
.SH "VEDERE ANCHE"
.BR chsh (1),
.BR chfn (1)
.SH BACHI
Sono permesse password composte solo da numeri.
.br
Non viene prodotto nessun messaggio d'avviso se il superuser sceglie una
password ``scadente''.
.br
Le opzioni
.B \-f
e
.B \-s
non sono supportare.
.SH AUTORE
Peter Orbaek (poe@daimi.aau.dk)

136
man/it/passwd.5 Normal file
View File

@ -0,0 +1,136 @@
.\" $Id: passwd.5,v 1.1 2002/03/10 07:41:06 kloczek Exp $
.\" Copyright (c) 1993 Michael Haardt (u31b3hs@pool.informatik.rwth-aachen.de)
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
.\" Traduzione in italiano di Giovanni Bortolozzo <borto@dei.unipd.it>
.\" Agosto 1996
.\"
.\" This is free documentation; you can redistribute it and/or
.\" modify it under the terms of the GNU General Public License as
.\" published by the Free Software Foundation; either version 2 of
.\" the License, or (at your option) any later version.
.\"
.\" The GNU General Public License's references to "object code"
.\" and "executables" are to be interpreted as the output of any
.\" document formatting or typesetting system, including
.\" intermediate and printed output.
.\"
.\" This manual is distributed in the hope that it will be useful,
.\" but WITHOUT ANY WARRANTY; without even the implied warranty of
.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
.\" GNU General Public License for more details.
.\"
.\" You should have received a copy of the GNU General Public
.\" License along with this manual; if not, write to the Free
.\" Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139,
.\" USA.
.\"
.\" Modified Sun Jul 25 10:46:28 1993 by Rik Faith (faith@cs.unc.edu)
.\" Modified Sun Aug 21 18:12:27 1994 by Rik Faith (faith@cs.unc.edu)
.\" Modified Sun Jun 18 01:53:57 1995 by Andries Brouwer (aeb@cwi.nl)
.\" Modified Mon Jan 5 20:24:40 MET 1998 by Michael Haardt
.\" (michael@cantor.informatik.rwth-aachen.de)
.TH PASSWD 5 "5 gennaio 1988" "Linux" "Linux Programmer's Manual"
.SH NOME
passwd \- file delle password
.SH DESCRIZIONE
.B Passwd
è un file di testo che contiene un elenco degli account sul sistema, e
per ciascuno di questi riporta alcune informazioni utili come user ID,
group ID, home directory, ecc. Spesso contiene anche le password
criptate di ciascun account. Il file delle password dovrebbe avere
permessi di lettura per tutti (molte utility, come
.BR ls (1),
ne fanno uso per associare lo user ID allo user name), ma permesso di
scrittura solo per il superuser.
.PP
Nei buoni tempi andati, il permesso di lettura per tutti non era un
grosso problema: chiunque poteva leggere le password criptate, ma i
calcolatori erano troppo lenti per decifrare una password scelta
bene. Soprattutto, si supponeva di lavorare fra amici. Oggigiorno,
molti usano una qualche versione di shadow password (chiavi ombra), in
cui
.I /etc/passwd
contiene degli * al posto delle password criptate, che a loro volta
sono nel file \fI/etc/shadow\fP, che solo il superuser può leggere.
.PP
Sia che si utilizzino o meno le shadow password, molti amministratori di
sistema usano un asterisco nel campo della password per far sì che un
utente non possa autenticarsi con una password (vedi le note più
sotto).
.PP
Se si crea una nuova login, si metta un asterisco nel campo della
password, e poi si usi il programma
.BR passwd (1)
per riempirlo.
.PP
C'è una voce per riga, ed ogni riga ha il formato:
.sp
.RS
account:passwd:UID:GID:GECOS:directory:shell
.RE
.sp
Il significato dei campi è il seguente:
.sp
.RS
.TP 1.0in
.I account
il nome dell'utente nel sistema. Non dovrebbe contenere maiuscole.
.TP
.I password
la password criptata o un asterisco.
.TP
.I UID
l'identificativo numerico dell'utente (UID = User IDentifier).
.TP
.I GID
l'identificativo numerico del gruppo principale per l'utente (GID =
Group IDentifier).
.TP
.I GECOS
Questo campo è opzionale e viene usato solo per fornire
informazioni. Di solito contiene il nome per esteso dell'utente. GECOS
sta per General Electric Comprehensive Operating System, (sistema
operativo comprensivo della General Electric), ribattezzato GCOS
quando la divisione grandi sistemi della GE fu venduta alla
Honeywell. Dennis Ritchie riferì: «A volte dovevamo spedire una stampa
o un gruppo di lavori alla macchina GCOS. Il campo del gcos nel file
delle password era un posto in cui sbattere le informazioni per la
$IDENTcard. Per niente elegante.»
.TP
.I directory
la $HOME directory dell'utente.
.TP
.I shell
il programma lanciato al login (se è vuoto, viene usato
.BR /bin/sh ).
Se punta ad un programma che non esiste, l'utente non potrà avere
accesso tramite
.BR login (1).
.RE
.SH NOTE
Se si vuole creare un gruppo di utenti, il loro GID deve
essere uguale e ci deve essere una voce nel file \fI/etc/group\fP, o il
gruppo non esisterà.
.PP
Se la password criptata è un asterisco, l'utente non potrà fare login
tramite
.BR login (1).
ma potrà ugualmente accedere al suo account usando
.BR rlogin (1),
far girare processi esistenti o iniziarne nuovi con
.BR rsh (1),
.BR cron (1),
.BR at (1)
o filtri per la posta, ecc. Bloccare un account semplicemente
modificando il campo della shell ha lo stesso effetto e in più
permette l'uso di
.BR su (1).
.SH FILE
.I /etc/passwd
.SH "VEDERE ANCHE"
.BR passwd (1),
.BR login (1),
.BR su (1),
.BR group (5),
.BR shadow (5)

58
man/it/pwconv.8 Normal file
View File

@ -0,0 +1,58 @@
.\" $Id: pwconv.8,v 1.1 2002/03/10 07:41:06 kloczek Exp $
.\" Traduzione in italiano di Isabella Ruocco <isacher@nettaxi.com>
.\" Giugno 1999
.TH PWCONV 8 "26 sep 1997"
.SH NOME
pwconv, pwunconv, grpconv, grpunconv \- convertono a e da password e gruppi shadow.
.SH SINTASSI
.B pwconv
.br
.B pwunconv
.br
.B grpconv
.br
.B grpunconv
.SH DESCRIPTION
Questi quattro programmi agiscono tutti sui file normali e e oscurati (shadow)
delle password e dei gruppi:
.IR /etc/passwd ", " /etc/group ", " /etc/shadow ", e " /etc/gshadow .
.B pwconv
.RI "crea " shadow " da " passwd " e, in modo opzionale, da un preesistente " shadow .
.B pwunconv
.RI "crea " passwd " da " passwd " e " shadow " e quindi rimuove " shadow .
.B grpconv
.RI "crea " gshadow " da " group " e, in modo opzionale, da un preesistente " gshadow .
.B grpunconv
.RI "crea " group " da " group " e " gshadow " e quindi rimuove " gshadow .
Ciascun programma, prima della conversione, acquisisce i lock necessari.
.BR pwconv " e " grpconv
sono simili. Per prima cosa vengono rimosse le voci nel file oscurato che non esistono
nel file principale. Quindi vengono aggiornate le voci oscurate che
non hanno `x' come password nel file principale. Vengono aggiunte le eventuali voci
oscurate mancanti. Infine, le password nel file principale vengono
sostituite con `x'. Questi programmi possono essere usati per le conversioni iniziali
così come per aggiornare il file oscurato se il file principale viene editato
a mano.
.B pwconv
userà i valori di
.BR PASS_MIN_GIORNI ", " PASS_MAX_GIORNI ", e " PASS_GIORNI_PREAVVISO
da
.I /etc/login.defs
quando si aggiungono nuove voci a
.IR /etc/shadow .
.RB "Analogamente, " pwunconv " e " grpunconv
sono simili. Le password nel file principale vengono aggiornate
dal file oscurato. Voci che esistono nel file principale ma non
nel file oscurato vengono lasciate stare. Infine, viene rimosso il file oscurato.
Alcune informazioni sull'invecchiamento delle password vengono perse da
.BR pwunconv .
Questo convertirà quello che potrà.
.SH "VEDERE ANCHE"
.BR login.defs (5),
.BR shadowconfig (8)

1
man/it/pwunconv.8 Normal file
View File

@ -0,0 +1 @@
.so man8/pwconv.8

102
man/it/shadow.5 Normal file
View File

@ -0,0 +1,102 @@
.\" Copyright 1989 - 1990, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: shadow.5,v 1.1 2002/03/10 07:41:06 kloczek Exp $
.\"
.\" Traduzione in italiano di Isabella Ruocco <isacher@nettaxi.com>
.\" Giugno 1999
.\"
.TH SHADOW 5
.SH NOME
shadow \- file crittato delle password
.SH DESCRIZIONE
.I shadow
contiene le informazioni sulle password crittate per gli account degli utenti
e, opzionalmente, informazioni sull'invecchiamento delle password.
E' incluso
.IP "" .5i
Nome di login
.IP "" .5i
Password crittata
.IP "" .5i
Giorni a partire dal 1 gennaio 1970 in cui la password è stata cambiata l'ultima volta
.IP "" .5i
Giorni prima che la password possa essere modificata
.IP "" .5i
Giorni dopo i quali la password deve essere modificata
.IP "" .5i
Giorni prima della scadenza della password in cui l'utente viene avvertito
.IP "" .5i
Giorni dopo la scadenza della password in cui l'account viene disabilitato
.IP "" .5i
Giorni a partire dal 1 gennaio 1970 dopo i quali l'account viene disabilitato
.IP "" .5i
Campo riservato
.PP
Il campo password deve essere riempito.
La password crittata è composta da un numero compreso tra 13 e 24 di caratteri dei
64 caratteri alfabetici
da a fino a z, da A a Z, da 0 a 9, \. e /.
Fate riferimento a \fBcrypt\fR(3) per dettagli riguardanti il modo in cui questa stringa
viene interpretata.
.PP
La data dell'ultima modifica della password è specificata come il numero
di giorni dal 1 gennaio 1970.
La passowrd non può essere modifcata nuovamente prima che sia passato
il numero di giorni previsto, e deve essere cambiata dopo il massimo numero
di giorni.
Se il minimo numero di giorni richiesto è superiore del
massimo numero di giorni permesso, questa password non potrà
essere modificata dall'utente.
.PP
Un account viene considerato inattivo e viene disabilitato se
la password non viene modificata entro il numero di giorni specificato
dopo la scadenza della password.
Un account sarà anche disabilitato il giorno specificato
senza tener conto di altre informazioni sulla scadenza della password.
.PP
Questa informazione ha la precedenza nei confronti di qualunque informazione sulla password o sulla scadenza della password
presente in \fI/etc/passwd\fR.
.PP
Questo file non deve essere leggibile dagli utenti normali se si vuole mantenere
la sicurezza sulle password.
.SH FILE
/etc/passwd \- informazioni sull'account dell'utente
.br
/etc/shadow \- password crittate degli utenti
.SH VEDERE ANCHE
.BR chage (1),
.BR login (1),
.BR passwd (1),
.BR su (1),
.BR sulogin (8),
.BR shadow (3),
.BR passwd (5),
.BR pwconv (8),
.BR pwunconv (8)
.SH AUTORE
Julianne Frances Haugh (jfh@tab.com)

197
man/it/useradd.8 Normal file
View File

@ -0,0 +1,197 @@
.\" Copyright 1991 - 1994, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: useradd.8,v 1.1 2002/03/10 07:41:06 kloczek Exp $
.\"
.\" Traduzione in italiano a cura di Isabella Ruocco <isacher@nettaxi.com>
.\" luglio 1999
.\"
.TH USERADD 8
.SH NOME
useradd \- Crea un nuovo utente o aggiorna le informazioni predefinite per
i nuovi utenti
.SH SINTASSI
.TP 8
.B useradd
.\" .RB [ -A
.\" .RI { metodo | \fBPREDEFINITO\fR "},... ]"
.RB [ -c
.IR commento ]
.RB [ -d
.IR home_dir ]
.br
.RB [ -e
.IR data_scadenza ]
.RB [ -f
.IR tempo_inattività ]
.br
.RB [ -g
.IR gruppo_iniziale ]
.RB [ -G
.IR gruppo [,...]]
.br
.RB [ -m " [" -k
.IR dir_scheletro ]]
.RB [ -s
.IR shell ]
.br
.RB [ -u
.IR uid " ["
.BR -o ]]
.I login
.TP 8
.B useradd
\fB-D\fR
[\fB-g\fI gruppo_predefinito\fR]
[\fB-b\fI home_predefinita\fR]
.br
[\fB-f\fI inattività_predefinita\fR]
[\fB-e\fI data_scadenza_predefinita\fR]
.br
[\fB-s\fI shell_predefinita\fR]
.SH DESCRIZIONE
.SS Creare Nuovi Utenti
Quando viene invocato senza l'opzione \fB-D\fR, il comando \fBuseradd\fR
crea un nuovo account di utente usando i valori specificati sulla linea di
comando ed i valori predefiniti dal sistema.
Il nuovo account di utente verrà aggiunto ai file di sistema che lo necessitano,
verrà creata la home directory, e lì verranno copiati i file iniziali, a seconda
delle opzioni sulla linea di comando.
Le opzioni che si applicano al comando \fBuseradd\fR sono
.\" .IP "\fB-A {\fImetodo\fR|\fBPREDEFINITO\fR},..."
.\" Il valore del metodo di autenticazione dell'utente.
.\" Il metodo di autenticazione è il nome di un programma che è responsabile
.\" della validazione dell'identità dell'utente.
.\" La stringa \fBPREDEFINITO\fR può essere usata per cambiare il metodo di
.\" autenticazione dell'utente con il metodo standard di sistema delle
.\" password.
.\" Questa è una lista di nomi di programmi separati da virgole.
.\" Può includere \fBPREDEFINITO\fR esattamente una volta.
.IP "\fB-c \fIcommento\fR"
Il campo commento del nuovo utente nel file password.
.IP "\fB-d \fIhome_dir\fR"
Il nuovo utente verrà creato usando \fIhome_dir\fR come valore per la
directory di login dell'utente.
Il comportamento predefinito è di appendere il nome \fIlogin\fR a
\fIhome_predefinita\fR ed usare quella come nome di directory di login.
.IP "\fB-e \fIdata_scadenza\fR"
La data in cui verrà disabilitato l'account dell'utente.
La data è specificata nel formato \fIMM/GG/AA\fR.
.IP "\fB-f \fIgiorni_inattività\fR"
Il numero di giorni dopo la scadenza della password fino a quando l'account
verrà permanentemente disabilitato.
Un valore pari a 0 disabilita l'account non appena è scaduta la password,
ed un valore pari a -1 disabilita questa caratteristica.
Il valore predefinito è -1.
.IP "\fB-g \fIgruppo_iniziale\fR"
IL nome o numero del gruppo iniziale di login dell'utente.
Il nome del gruppo deve esistere. Un numero di gruppo deve fare riferimento
ad un gruppo già esistente.
Il numero di gruppo predefinito è 1.
.IP "\fB-G \fIgruppo,[...]\fR"
Una lista di gruppi supplementari di cui l'utente è altresì membro.
Ciascun gruppo è separato dal successivo da una virgola, senza spazi
bianchi intermedi.
I gruppi sono soggetti alle stesse restrizioni del gruppo dato con
l'opzione \fB-g\fR.
Il comportamento predefinito è che l'utente appartenga solo al gruppo
iniziale.
.IP \fB-m\fR
La home directory dell'utente verrà creata se non esiste.
I file contenuti in \fIdir_scheletro\fR saranno copiati nella home directory
se viene usata l'opzione \fB-k\fR, altrimenti verranno usati i file
contenuti in \fI/etc/skel\fR.
Anche tutte le directory contenute in \fIdir_scheletro\fR o \fI/etc/skel\fR
verranno create nella home directory dell'utente.
L'opzione \fB-k\fR è valida solo in congiunzione con l'opzione \fB-m\fR.
Il comportamento predefinito è di non creare la directory e di non copiarvi
alcun file.
.IP "\fB-s \fIshell\fR"
Il nome della shell di login dell'utente.
Il comportamento predefinito è di lasciare vuoto questo campo, che fa sì che
il sistema selezioni la shell di connessione predefinita.
.IP "\fB-u \fIuid\fR"
Il valore numerico dell'ID dell'utente.
Questo valore deve essere univoco, a meno che non venga usata l'opzione
\fI-o\fR.
Il valore deve essere non-negativo.
Il comportamento predefinito è di usare il minimo valore di ID superiore a 99
e superiore a quello di ogni altro utente.
Valori tra 0 e 99 sono tipicamente riservati per account di sistema.
.SS Cambiare i valori predefiniti
Quando invocato con l'opzione \fB-D\fR, \fBuseradd\fR o mostrerà i valori
predefiniti correnti, oppure aggiornerà i valori predefiniti dalla linea
di comando.
Le opzioni valide sono
.IP "\fB-b \fIhome_predefinita\fR"
Il prefisso del percorso per la home directory del nuovo utente.
Il nome dell'utente verrà aggiunto alla fine di \fIhome_predefinita\fR
per creare il nome della nuova directory se non viene usata l'opzione \fB-d\fI
quando si crea un nuovo account.
.IP "\fB-e \fIdata_scadenza_predefinita\fR"
La data in cui l'account dell'utente verrà disabilitato.
.IP "\fB-f \fIinattività_predefinita\fR"
Il numero di giorni dopo la scadenza di una password prima che l'account
venga disabilitato.
.IP "\fB-g \fIgruppo_predefinito\fR"
Il nome o ID del gruppo iniziale per un nuovo utente.
Il gruppo nominato deve esistere, ed un ID numerico di gruppo deve avere una
voce esistente.
.IP "\fB-s \fIshell_predifinita\fR"
Il nome della shell di login per un nuovo utente.
Il programma nominato verrà usato per tutti gli account dei futuri nuovi
utenti.
.PP
Se non è specificata alcuna opzione, \fBuseradd\fR mostra i valori predefiniti
correnti.
.SH NOTE
L'amministratore di sistema è responsabile del posizionamento dei file
predefiniti degli utenti nella directory \fI/etc/skel\fR.
.SH CAVEAT
Non è possibile aggiungere un utente ad un gruppo NIS.
Questo deve essere fatto sul server NIS.
.SH FILE
/etc/passwd \- informazioni sugli account di utenti
.br
/etc/shadow \- informazioni sicure sugli account di utenti
.br
/etc/group \- informazioni sui gruppi
.br
/etc/default/useradd \- informazioni predefinite
.br
/etc/skel \- directory contenente i file predefiniti
.SH VEDERE ANCHE
.BR chfn (1),
.BR chsh (1),
.BR groupadd (8),
.BR groupdel (8),
.BR groupmod (8),
.BR passwd (1),
.BR userdel (8),
.BR usermod (8)
.SH AUTORE
Julianne Frances Haugh (jfh@tab.com)

72
man/it/userdel.8 Normal file
View File

@ -0,0 +1,72 @@
.\" Copyright 1991 - 1994, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: userdel.8,v 1.1 2002/03/10 07:41:06 kloczek Exp $
.\"
.\" Traduzione in italiano a cura di Isabella Ruocco <isacher@nettaxi.com>
.\" luglio 1999
.\"
.TH USERDEL 8
.SH NOME
userdel \- Rimuove l'account di un utente ed i file relativi
.SH SINTASSI
.B userdel
[\fB-r\fR]
.I login
.SH DESCRIZIONE
Il comando \fBuserdel\fR modifica i file di account del sistema, rimuovendo
tutte le voci che si riferiscono a \fIlogin\fR.
L'utente nominato deve esistere.
.IP \fB-r\fR
I file nella home directory dell'utente verranno rimossi insieme alla home
directory stessa.
I file collocati in altri file system dovranno essere ricercati e rimossi
manualmente.
.SH FILE
/etc/passwd \- informazioni sugli account di utenti
.br
/etc/shadow \- informazioni sicure sugli account di utenti
.br
/etc/group \- informazioni sui gruppi
.SH CAVEAT
\fBuserdel\fR non permetterà di rimuovere alcun account se l'utente è
attualmente connesso.
Occorre uccidere qualunque processo in esecuzione che appartenga ad un account
che si sta rimuovendo.
Non è possibile rimuovere nessun attributo NIS su un client NIS.
Questo deve essere fatto sul server NIS.
.SH VEDERE ANCHE
.BR chfn (1),
.BR chsh (1),
.BR groupadd (8),
.BR groupdel (8),
.BR groupmod (8),
.BR passwd (1),
.BR useradd (8),
.BR usermod (8)
.SH AUTORE
Julianne Frances Haugh (jfh@tab.com)

151
man/it/usermod.8 Normal file
View File

@ -0,0 +1,151 @@
.\" Copyright 1991 - 1994, Julianne Frances Haugh
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. Neither the name of Julianne F. Haugh nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY JULIE HAUGH AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL JULIE HAUGH OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: usermod.8,v 1.1 2002/03/10 07:41:07 kloczek Exp $
.\"
.\" Traduzione in italiano a cura di Isabella Ruocco <isacher@nettaxi.com>
.\" luglio 1999
.\"
.TH USERMOD 8
.SH NOME
usermod \- Modifica l'account di un utente
.SH SINTASSI
.TP 8
.B usermod
.\" .RB [ -A
.\" .RI { metodo | \fBPREDEFINITO\fR "},... ]"
.RB [ -c
.IR commento ]
.RB [ -d
.IR home_dir " ["
.BR -m ]]
.br
.RB [ -e
.IR data_scadenza ]
.RB [ -f
.IR tempo_inattività ]
.br
.RB [ -g
.IR gruppo_iniziale ]
.RB [ -G
.IR gruppo [,...]]
.br
.RB [ -l
.IR nome_login ]
.RB [ -s
.IR shell ]
.br
.RB [ -u
.IR uid " ["
.BR -o ]]
.I login
.SH DESCRIZIONE
Il comando \fBusermod\fR modifica i file di account di sistema in modo da
riflettere le modifiche specificate sulla linea di comando.
Le opzioni che si applicano al comando \fBusermod\fR sono
.\" .IP "\fB-A \fImetodo\fR|\fBPREDEFINITO\fR"
.\" Il nuovo valore del metodo di autenticazione dell'utente.
.\" Il metodo di autenticazione è il nome di un programma che è responsabile
.\" della validazione dell'identità dell'utente.
.\" La stringa \fBPREDEFINITO\fR può essere usata per cambiare il metodo di
.\" autenticazione dell'utente con il metodo standard di sistema delle
.\" password.
.IP "\fB-c \fIcommento\fR"
Il campo commento del nuovo utente nel file password.
Normalmente viene modificato usando l'utilità \fBchfn\fR(1).
.IP "\fB-d \fIhome_dir\fR"
La nuova directory di login dell'utente.
Se è data l'opzione \fB-m\fR il contenuto della home directory corrente
sarà spostato nella nuova home directory, che viene creata se non esiste già.
.IP "\fB-e \fIdata_scadenza\fR"
La data in cui l'account dell'utente verrà disabilitato.
La data è specificata nel formato \fIMM/GG/AA\fR.
.IP "\fB-f \fIgiorni_inattività\fR"
Il numero di giorni dopo la scadenza di una password prima che l'account
venga permanentemente disabilitato.
Un valore pari a 0 disabilita l'account non appena la password è scaduta,
ed un valore pari a -1 disabilita la caratteristica.
Il valore predefinito è -1.
.IP "\fB-g \fIgruppo_iniziale\fR"
Il nuome o numero del nuovo gruppo di connessione dell'utente.
Il nome del gruppo deve esistere. Un numero di gruppo deve riferirsi ad un
gruppo già esistente.
Il numero di gruppo predefinito è 1.
.IP "\fB-G \fIgruppo,[...]\fR"
Una lista di gruppi supplementari di cui l'utente è altresì membro.
Ciascun gruppo è separato dal successivo da una virgola, senza spazi bianchi
intermedi.
I gruppi sono soggetti alle stesse restrizioni del gruppo dato con l'opzione
\fB-g\fR.
Se l'utente è attualmente membro di un gruppo che non è elencato, l'utente
verrà rimosso dal gruppo.
.IP "\fB-l \fInome_login\fR"
Il nome dell'utente verrà cambiato da \fIlogin\fR a \fInome_login\fR.
Niente altro viene cambiato.
In particolare, la home directory dell'utente dovrebbe probabilmente
essere modificata in modo da riflettere il nuovo nome di login.
.IP "\fB-s \fIshell\fR"
Il nome della nuova shell di login dell'utente.
Lasciando questo campo vuoto si fa in modo che il sistema selezioni la shell
di connessione predefinita.
.IP "\fB-u \fIuid\fR"
Il valore numerico dell'ID dell'utente.
Questo valore deve essere univoco, a meno che non venga usata l'opzione
\fI-o\fR.
Questo valore deve essere non-negativo.
Valori tra 0 e 99 sono tipicamente riservati ad account di sistema.
Tutti i file che l'utente possiede e che sono posiszionati nell'albero di
directory avente come radice la home directory dell'utente avranno l'ID utente del
file cambiato automaticamente.
I file fuori della home directory dell'utente devono essere modificati
manualmente.
.SH CAVEAT
\fBusermod\fR non permetterà di modificare il nome di un utente che è
attualmente connesso.
Occorre essere certi che l'utente nominato non sta eseguendo alcun processo
quando questo comando viene eseguito se l'ID numerico dell'utente sta per
essere cambiato.
Occorre cambiare il proprietario di ogni file crontab manualmente.
Occorre cambiare il proprietario di ogni job manualmente.
Occorre fare qualunque cambiamento che riguarda NIS sul server NIS.
.SH FILE
/etc/passwd \- informazioni sugli account di utenti
.br
/etc/shadow \- informazioni sicure sugli account di utenti
.br
/etc/group \- informazioni sui gruppi
.SH VEDERE ANCHE
.BR chfn (1),
.BR chsh (1),
.BR groupadd (8),
.BR groupdel (8),
.BR groupmod (8),
.BR passwd (1),
.BR useradd (8),
.BR userdel (8)
.SH AUTORE
Julianne Frances Haugh (jfh@tab.com)

1
man/it/vigr.8 Normal file
View File

@ -0,0 +1 @@
.so man8/wipw.8

31
man/it/vipw.8 Normal file
View File

@ -0,0 +1,31 @@
.\" $Id: vipw.8,v 1.1 2002/03/10 07:41:07 kloczek Exp $
.\" Traduzione in italiano di Isabella Ruocco <isacher@nettaxi.com>
.\" Giugno 1999
.TH VIPW 8 "26 sep 1997"
.SH NOME
vipw, vigr \- editano i file delle password, dei gruppi, delle password oscurate, o dei gruppi oscurati.
.SH SINTASSI
.BR vipw " [-s]"
.br
.BR vigr " [-s]"
.SH DESCRIZIONE
.BR vipw " e " vigr
editeranno i file
.IR /etc/passwd " ed " /etc/group ", rispettivamente."
Con l'opzione
.B -s
, editeranno la versione oscurata di quei file,
.IR /etc/shadow " ed " /etc/gshadow ", rispettivamente.
I programmi imposteranno i lock appropriati per evitare la corruzione dei file.
Quando cercano un editor, i programmi prima proveranno
con la variabile d'ambiente
.BR VISUAL ,
poi con la variabile d'ambiente
.BR EDITOR ,
e infine con l'editor predefinito,
.BR vi .
.SH "VEDERE ANCHE"
.BR passwd (5),
.BR group (5),
.BR shadow (5)

View File

@ -25,7 +25,7 @@
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: groupadd.8,v 1.2 2001/11/16 17:01:32 ankry Exp $
.\" $Id: groupadd.8,v 1.3 2002/03/09 11:16:16 ankry Exp $
.\"
.\" Japanese Version Copyright (c) 1997 Kazuyoshi Furutaka
.\" all rights reserved.
@ -58,11 +58,11 @@ groupadd \-
.SH ´ØÏ¢¹àÌÜ
.BR chfn (1),
.BR chsh (1),
.BR useradd (8),
.BR userdel (8),
.BR usermod (8),
.BR passwd (1),
.BR groupdel (8),
.BR groupmod (8)
.BR groupmod (8),
.BR useradd (8),
.BR userdel (8),
.BR usermod (8)
.SH Ãø¼Ô
Julianne Frances Haugh (jockgrrl@ix.netcom.com)

View File

@ -25,7 +25,7 @@
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: groupdel.8,v 1.2 2001/11/16 17:01:32 ankry Exp $
.\" $Id: groupdel.8,v 1.3 2002/03/09 11:16:16 ankry Exp $
.\"
.\" Japanese Version Copyright (c) 1997 Kazuyoshi Furutaka
.\" all rights reserved.
@ -55,11 +55,11 @@ groupdel \-
.SH ´ØÏ¢¹àÌÜ
.BR chfn (1),
.BR chsh (1),
.BR useradd (8),
.BR userdel (8),
.BR usermod (8),
.BR passwd (1),
.BR groupadd (8),
.BR groupmod (8)
.BR groupmod (8),
.BR useradd (8),
.BR userdel (8),
.BR usermod (8)
.SH Ãø¼Ô
Julianne Frances Haugh (jockgrrl@ix.netcom.com)

View File

@ -25,7 +25,7 @@
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: groupmod.8,v 1.2 2001/11/16 17:01:32 ankry Exp $
.\" $Id: groupmod.8,v 1.3 2002/03/09 11:16:16 ankry Exp $
.\"
.\" Japanese Version Copyright (c) 1997 Kazuyoshi Furutaka
.\" all rights reserved.
@ -61,11 +61,11 @@ groupmod \-
.SH ´ØÏ¢¹àÌÜ
.BR chfn (1),
.BR chsh (1),
.BR useradd (8),
.BR userdel (8),
.BR usermod (8),
.BR passwd (1),
.BR groupadd (8),
.BR groupdel (8)
.BR useradd (8),
.BR userdel (8),
.BR usermod (8),
.SH Ãø¼Ô
Julianne Frances Haugh (jockgrrl@ix.netcom.com)

View File

@ -25,7 +25,7 @@
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: groups.1,v 1.1 2001/11/16 17:00:58 ankry Exp $
.\" $Id: groups.1,v 1.2 2002/03/09 11:16:16 ankry Exp $
.\"
.\" Japanese Version Copyright (c) 2001 Maki KURODA
.\" all right reserved,
@ -53,8 +53,8 @@ groups \-
/etc/group \- グループ情報
.SH 関連項目
.BR newgrp (1),
.BR getuid (2),
.BR getgid (2),
.BR getgroups (2)
.BR getgroups (2),
.BR getuid (2)
.SH 著者
Julianne Frances Haugh (jockgrrl@ix.netcom.com)

View File

@ -25,7 +25,7 @@
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: grpck.8,v 1.2 2001/11/16 17:01:32 ankry Exp $
.\" $Id: grpck.8,v 1.3 2002/03/09 11:16:16 ankry Exp $
.\"
.\" Japanese Version Copyright (c) 1997 Kazuyoshi Furutaka
.\" all rights reserved.
@ -84,10 +84,10 @@ grpck \-
.br
/etc/passwd \- ユーザに関する情報
.SH 関連項目
.BR groupmod (8),
.BR group (5),
.BR passwd (5),
.BR shadow (5)
.BR shadow (5),
.BR groupmod (8)
.SH 返り値
\fBgrpck\fRコマンドは以下の戻り値を返して終了する:
.IP 0 5

View File

@ -25,7 +25,7 @@
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: id.1,v 1.1 2001/11/16 17:00:53 ankry Exp $
.\" $Id: id.1,v 1.2 2002/03/09 11:16:16 ankry Exp $
.\"
.\" Japanese Version Copyright (c) 2000 ISHIKAWA Keisuke
.\" all rights reserved.
@ -48,10 +48,8 @@ id \-
.br
/etc/group \- グループ情報
.SH 関連項目
.BR getuid (2),
.BR getgid (2),
.BR getgroups (2)
.BR getgroups (2),
.BR getuid (2)
.SH 著者
Julianne Frances Haugh (jockgrrl@ix.netcom.com)

View File

@ -26,7 +26,7 @@
.\" SUCH DAMAGE.
.\"
.\" @(#)lastlog.8 3.3 08:24:58 29 Sep 1993 (National Guard Release)
.\" $Id: lastlog.8,v 1.2 2001/11/16 17:01:32 ankry Exp $
.\" $Id: lastlog.8,v 1.3 2002/03/09 11:16:16 ankry Exp $
.\"
.\" Japanese Version Copyright (c) 1997 Kazuyoshi Furutaka
.\" all rights reserved.
@ -72,5 +72,3 @@ uid 171-799
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
.br
Phillip Street

View File

@ -25,7 +25,7 @@
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: login.1,v 1.2 2001/11/16 17:01:32 ankry Exp $
.\" $Id: login.1,v 1.3 2002/03/09 11:16:16 ankry Exp $
.\"
.\" Japanese Version Copyright (c) 1997 Kazuyoshi Furutaka
.\" all rights reserved.
@ -192,16 +192,14 @@ $HOME/.hushlogin \-
.br
.SH ´ØÏ¢¹àÌÜ
.PP
.BR getty (8),
.BR mail (1),
.BR passwd (1),
.BR sh (1),
.BR su (1),
.BR login.defs (5),
.\" .BR d_passwd (5),
.BR login.defs (5),
.BR nologin (5),
.BR passwd (5),
.BR nologin (5)
.BR getty (8)
.SH Ãø¼Ô
Julianne Frances Haugh (jockgrrl@ix.netcom.com)

View File

@ -25,7 +25,7 @@
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: login.defs.5,v 1.2 2001/11/16 17:01:32 ankry Exp $
.\" $Id: login.defs.5,v 1.3 2002/03/09 11:16:16 ankry Exp $
.\"
.\" Japanese Version Copyright (c) 1997 Kazuyoshi Furutaka
.\" all rights reserved.
@ -576,13 +576,11 @@ ENV_HZ ENV_SUPATH ENV_TZ MAIL_DIR QUOTAS_ENAB TTYPERM
この man ページに書かれていない設定パラメータもある。
.SH 関連項目
.BR login (1),
.BR passwd (5),
.BR faillog (5),
.BR passwd (5),
.BR porttime (5),
.BR faillog (8)
.SH 著者
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
.br
Chip Rosenthal (chip@unicom.com)

View File

@ -25,7 +25,7 @@
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: mkpasswd.8,v 1.2 2001/11/16 17:01:32 ankry Exp $
.\" $Id: mkpasswd.8,v 1.3 2002/03/09 11:16:16 ankry Exp $
.\"
.\" Japanese Version Copyright (c) 1997 Kazuyoshi Furutaka
.\" all rights reserved.
@ -80,8 +80,8 @@ mkpasswd \- passwd
.br
/etc/gshadow \- shadowしたグループ情報
.SH 関連項目
.BR passwd (5),
.BR group (5),
.BR passwd (5),
.BR shadow (5)
.SH 著者
Julianne Frances Haugh (jockgrrl@ix.netcom.com)

View File

@ -25,7 +25,7 @@
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: newgrp.1,v 1.2 2001/11/16 17:01:32 ankry Exp $
.\" $Id: newgrp.1,v 1.3 2002/03/09 11:16:16 ankry Exp $
.\"
.\" Japanese Version Copyright (c) 1997 Kazuyoshi Furutaka
.\" all rights reserved.
@ -76,8 +76,8 @@ sg \-
.br
/etc/group \- グループ情報
.SH 関連項目
.BR login (1),
.BR id (1),
.BR login (1),
.BR su (1)
.SH 著者
Julianne Frances Haugh (jockgrrl@ix.netcom.com)

View File

@ -25,7 +25,7 @@
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: passwd.5,v 1.2 2001/11/16 17:01:33 ankry Exp $
.\" $Id: passwd.5,v 1.4 2002/03/09 11:16:16 ankry Exp $
.\"
.\" Japanese Version Copyright (c) 1997 Kazuyoshi Furutaka
.\" all rights reserved.
@ -44,9 +44,9 @@ passwd \-
.IP "" .5i
オプションの暗号化されたパスワード
.IP "" .5i
ユーザID番号
ユーザ ID 番号
.IP "" .5i
グループID番号
グループ ID 番号
.IP "" .5i
ユーザ名もしくはコメント欄
.IP "" .5i
@ -54,44 +54,44 @@ passwd \-
.IP "" .5i
ユーザのコマンドインタプリタ
.PP
パスワードがshadowされている場合、パスワード欄を埋めてはならない。
shadowパスワードを用いている場合、暗号化されたパスワードは
\fI/etc/shadow\fRに書かれている。
暗号化されたパスワードは、アルファベットaからz、AからZ、0から9
及び\.と/.の64文字から作られた13文字からなる。
この文字列がどのように解釈されるかの詳細は、\fBcrypt\fR(3)を
パスワードが shadow されている場合、パスワード欄を埋めてはならない。
shadow パスワードを用いている場合、暗号化されたパスワードは
\fI/etc/shadow\fR に書かれている。
暗号化されたパスワードは、アルファベット a から z、A から Z、0 から 9
及び \. と / の 64 文字から作られた 13 文字からなる。
この文字列がどのように解釈されるかの詳細は、\fBcrypt\fR(3)
参照のこと。
.PP
オプションで、パスワードに続いてパスワード有効期限が、
コンマで区切って同じ文字集合の文字を使って記されていることもある。
コンマで区切って同じ文字集合の文字を使って記されていることもある。
パスワード有効期限は、パスワード自身と同じ文字集合から作られている。
最初の文字には、パスワードが何週間有効かが記されている。
二番目の文字は、何週間経てばユーザがパスワードを変更できるかを与える。
最後の二文字には、最後にパスワードを変更したのは1970年1月から何週間
最後の二文字には、最後にパスワードを変更したのは 1970 1 月から何週間
経過した時であるかを表す。
パスワードの有効期限が過ぎた時は、ユーザは新しいパスワードを設定
しなくてはならない。
.PP
コメント欄は、\fBfinger\fR(1)等の様々なシステムユーティリティに利用される。
コメント欄には更に3つの数値が記入されていても良い。
コメント欄は、\fBfinger\fR(1) 等の様々なシステムユーティリティに利用される。
コメント欄には更に 3 つの数値が記入されていても良い。
それらは、
.IP "" .5i
pri= \- niceの初期設定値
pri= \- nice の初期設定値
.IP "" .5i
umask= \- umaskの初期設定値
umask= \- umask の初期設定値
.IP "" .5i
ulimit= \- ulimitの初期設定値
ulimit= \- ulimit の初期設定値
.PP
これらの欄は互いに、またコメント欄の別のフィールドと、コンマを用いて
区別されている。
.PP
ホームディレクトリ欄にはログイン時の作業ディレクトリ名が記されている。
\fBlogin\fRはこの情報を用いて環境変数\fBHOME\fRの内容を設定する。
\fBlogin\fR はこの情報を用いて環境変数 \fBHOME\fR の内容を設定する。
.PP
コマンドインタプリタ欄にはユーザのコマンド言語インタプリタもしくは
最初に実行するプログラムの名前を記す。
\fBlogin\fRはこの情報を用いて環境変数\fBSHELL\fRの内容を設定する。
この欄に何も記されていない場合は、ディフォルト値として\fB/bin/sh\fR
\fBlogin\fR はこの情報を用いて環境変数 \fBSHELL\fR の内容を設定する。
この欄に何も記されていない場合は、ディフォルト値として \fB/bin/sh\fR
使用する。
.SH ファイル
/etc/passwd \- ユーザのアカウント情報
@ -99,9 +99,9 @@ ulimit= \- ulimit
.BR login (1),
.BR passwd (1),
.BR su (1),
.BR sulogin (8),
.BR shadow (5),
.BR pwconv (8),
.BR pwunconv (8)
.BR pwunconv (8),
.BR sulogin (8)
.SH 著者
Julianne Frances Haugh (jockgrrl@ix.netcom.com)

View File

@ -25,7 +25,7 @@
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: pw_auth.3,v 1.2 2001/11/16 17:01:33 ankry Exp $
.\" $Id: pw_auth.3,v 1.3 2002/03/09 11:16:16 ankry Exp $
.\"
.\" Japanese Version Copyright (c) 1997 Kazuyoshi Furutaka
.\" all rights reserved.
@ -137,6 +137,6 @@ pwauth \-
.BR su (1),
.BR useradd (8),
.BR userdel (8),
usermod(8)
.BR usermod (8)
.SH AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)

View File

@ -25,7 +25,7 @@
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: pwauth.8,v 1.2 2001/11/16 17:01:33 ankry Exp $
.\" $Id: pwauth.8,v 1.3 2002/03/09 11:16:16 ankry Exp $
.\"
.\" Japanese Version Copyright (c) 1997 Kazuyoshi Furutaka
.\" all rights reserved.
@ -61,9 +61,9 @@ pwauth \-
.BR login (1),
.BR passwd (1),
.BR su (1),
.BR pw_auth (3),
.BR useradd (8),
.BR userdel (8),
.BR usermod (8),
.BR pw_auth (3)
.BR usermod (8)
.SH Ãø¼Ô
Julianne Frances Haugh (jockgrrl@ix.netcom.com)

View File

@ -25,7 +25,7 @@
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" $Id: pwck.8,v 1.2 2001/11/16 17:01:33 ankry Exp $
.\" $Id: pwck.8,v 1.3 2002/03/09 11:16:16 ankry Exp $
.\"
.\" Japanese Version Copyright (c) 1997 Kazuyoshi Furutaka
.\" all rights reserved.
@ -89,10 +89,10 @@ pwck \-
.br
/etc/group \- グループに関する情報
.SH 関連項目
.BR usermod (8),
.BR group (5),
.BR passwd (5),
.BR shadow (5)
.BR shadow (5),
.BR usermod (8)
.SH 返り値
\fBpwck\fRコマンドは以下の戻り値を返して終了する:
.IP 0 5

Some files were not shown because too many files have changed in this diff Show More