1.\" Copyright (c) 1988, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. 9.\" 2. Redistributions in binary form must reproduce the above copyright 10.\" notice, this list of conditions and the following disclaimer in the 11.\" documentation and/or other materials provided with the distribution. 12.\" 3. All advertising materials mentioning features or use of this software 13.\" must display the following acknowledgement: 14.\" This product includes software developed by the University of 15.\" California, Berkeley and its contributors. 16.\" 4. Neither the name of the University nor the names of its contributors 17.\" may be used to endorse or promote products derived from this software 18.\" without specific prior written permission. 19.\" 20.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 21.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" From: @(#)passwd.5 8.1 (Berkeley) 6/5/93 33.\" $FreeBSD$ 34.\" 35.Dd September 29, 1994 36.Dt PASSWD 5 37.Os 38.Sh NAME 39.Nm passwd 40.Nd format of the password file 41.Sh DESCRIPTION 42The 43.Nm passwd 44files are files consisting of newline separated records, one per user, 45containing ten colon (``:'') separated fields. These fields are as 46follows: 47.Pp 48.Bl -tag -width password -offset indent 49.It name 50User's login name. 51.It password 52User's 53.Em encrypted 54password. 55.It uid 56User's id. 57.It gid 58User's login group id. 59.It class 60User's login class. 61.It change 62Password change time. 63.It expire 64Account expiration time. 65.It gecos 66General information about the user. 67.It home_dir 68User's home directory. 69.It shell 70User's login shell. 71.El 72.Pp 73Lines whose first non-whitespace character is a pound-sign (#) 74are comments, and are ignored. Blank lines which consist 75only of spaces, tabs or newlines are also ignored. 76.Pp 77The 78.Ar name 79field is the login used to access the computer account, and the 80.Ar uid 81field is the number associated with it. They should both be unique 82across the system (and often across a group of systems) since they 83control file access. 84.Pp 85While it is possible to have multiple entries with identical login names 86and/or identical user id's, it is usually a mistake to do so. Routines 87that manipulate these files will often return only one of the multiple 88entries, and that one by random selection. 89.Pp 90The login name must never begin with a hyphen (``-''); also, it is strongly 91suggested that neither upper-case characters nor dots (``.'') be part 92of the name, as this tends to confuse mailers. No field may contain a 93colon (``:'') as this has been used historically to separate the fields 94in the user database. 95.Pp 96The password field is the 97.Em encrypted 98form of the password. 99If the 100.Ar password 101field is empty, no password will be required to gain access to the 102machine. This is almost invariably a mistake. 103Because these files contain the encrypted user passwords, they should 104not be readable by anyone without appropriate privileges. 105Administrative accounts have a password field containing an asterisk 106.Ql \&* 107which disallows normal logins. 108.Pp 109The group field is the group that the user will be placed in upon login. 110Although this system supports multiple groups (see 111.Xr groups 1 ) 112this field indicates the user's primary group. 113Secondary group memberships are selected in 114.Pa /etc/group . 115.Pp 116The 117.Ar class 118field is a key for a user's login class. 119Login classes are defined in 120.Xr login.conf 5 , 121which is a 122.Xr termcap 5 123style database of user attributes, accounting, resource and 124environment settings. 125.Pp 126The 127.Ar change 128field is the number in seconds, 129.Dv GMT , 130from the epoch, until the 131password for the account must be changed. 132This field may be left empty or set to 0 to turn off the 133password aging feature. 134.Pp 135The 136.Ar expire 137field is the number in seconds, 138.Dv GMT , 139from the epoch, until the 140account expires. 141This field may be left empty or set to 0 to turn off the account 142aging feature. 143.Pp 144The 145.Ar gecos 146field normally contains comma (``,'') separated subfields as follows: 147.Pp 148.Bd -unfilled -offset indent 149fullname user's full name 150office user's office location 151wphone user's work phone number 152hphone user's home phone number 153.Ed 154.Pp 155This information is used by the 156.Xr finger 1 157program, and the first field used by the system mailer. 158If an ampersand 159.Ql \&& 160character appears within the fullname field, programs that 161use this field will substitute it with a capitalized version 162of the account's login name. 163.Pp 164The user's home directory is the full 165.Tn UNIX 166path name where the user 167will be placed on login. 168.Pp 169The shell field is the command interpreter the user prefers. 170If there is nothing in the 171.Ar shell 172field, the Bourne shell 173.Pq Pa /bin/sh 174is assumed. 175For security reasons, if the shell is set to a script that disallows 176access to the system (the 177.Xr nologin 8 178script, for example), care should be taken not to import any environment 179variables. With 180.Xr sh 1 , 181this can be done by specifying the 182.Fl p 183flag. 184Check the specific shell documentation to determine how this is 185done with other shells. 186.Sh YP/NIS INTERACTION 187.Ss Enabling access to NIS passwd data 188The system administrator can configure 189.Tn FreeBSD 190to use NIS/YP for 191its password information by adding special records to the 192.Pa /etc/master.passwd 193file. 194These entries should be added with 195.Xr vipw 8 196so that the changes can be properly merged with the hashed 197password databases and the 198.Pa /etc/passwd 199file ( 200.Pa /etc/passwd 201should never be edited manually). Alternatively, the administrator 202can modify 203.Pa /etc/master.passwd 204in some other way and then manually update the password databases with 205.Xr pwd_mkdb 8 . 206.Pp 207The simplest way to activate NIS is to add an empty record 208with only a plus sign (`+') in the name field, such as this: 209.Bd -literal -offset indent 210+::::::::: 211 212.Ed 213The `+' will tell the 214.Xr getpwent 3 215routines in 216.Tn FreeBSD Ns 's 217standard C library to begin using the NIS passwd maps 218for lookups. 219.Pp 220Note that the entry shown above is known as a 221.Em wildcard 222entry, because it matches all users (the `+' without any other information 223matches everybody) and allows all NIS password data to be retrieved 224unaltered. 225However, by 226specifying a username or netgroup next to the `+' in the NIS 227entry, the administrator can affect what data are extracted from the 228NIS passwd maps and how it is interpreted. 229Here are a few example 230records that illustrate this feature (note that you can have several 231NIS entries in a single 232.Pa master.passwd 233file): 234.Bd -literal -offset indent 235-mitnick::::::::: 236+@staff::::::::: 237+@permitted-users::::::::: 238+dennis::::::::: 239+ken:::::::::/bin/csh 240+@rejected-users::32767:32767::::::/bin/false 241 242.Ed 243Specific usernames are listed explicitly while netgroups are signified 244by a preceding `@'. In the above example, users in the ``staff'' and 245``permitted-users'' netgroups will have their password information 246read from NIS and used unaltered. 247In other words, they will be allowed 248normal access to the machine. 249Users ``ken'' and ``dennis,'' who have 250been named explicitly rather than through a netgroup, will also have 251their password data read from NIS, _except_ that user ``ken'' will 252have his shell remapped to 253.Pa /bin/csh . 254This means that value for his shell specified in the NIS password map 255will be overridden by the value specified in the special NIS entry in 256the local 257.Pa master.passwd 258file. 259User ``ken'' may have been assigned the csh shell because his 260NIS password entry specified a different shell that may not be 261installed on the client machine for political or technical reasons. 262Meanwhile, users in the ``rejected-users'' netgroup are prevented 263from logging in because their UIDs, GIDs and shells have been overridden 264with invalid values. 265.Pp 266User ``mitnick'' will be be ignored entirely because his entry is 267specified with a `-' instead of a `+'. A minus entry can be used 268to block out certain NIS password entries completely; users who's 269password data has been excluded in this way are not recognized by 270the system at all. 271(Any overrides specified with minus entries are 272also ignored since there is no point in processing override information 273for a user that the system isn't going to recognize in the first place.) 274In general, a minus entry is used to specifically exclude a user 275who might otherwise be granted access because he happens to be a 276member of an authorized netgroup. 277For example, if ``mitnick'' is 278a member of the ``permitted-users'' netgroup and must, for whatever 279the reason, be permitted to remain in that netgroup (possibly to 280retain access to other machines within the domain), the administrator 281can still deny him access to a particular system with a minus entry. 282Also, it is sometimes easier to explicitly list those users who aren't 283allowed access rather than generate a possibly complicated list of 284users who are allowed access and omit the rest. 285.Pp 286Note that the plus and minus entries are evaluated in order from 287first to last with the first match taking precedence. 288This means 289the system will only use the first entry that matches a particular user. 290If, for instance, we have a user ``foo'' who is a member of both the ``staff'' 291netgroup and the ``rejected-users'' netgroup, he will be admitted to 292the system because the above example lists the entry for ``staff'' 293before the entry for ``rejected-users.'' 294If we reversed the order, 295user ``foo'' would be flagged as a ``rejected-user'' instead and 296denied access. 297.Pp 298Lastly, any NIS password database records that do not match against 299at least one of the users or netgroups specified by the NIS access 300entries in the 301.Pa /etc/master.passwd 302file will be ignored (along with any users specified using minus 303entries). In our example shown above, we do not have a wildcard 304entry at the end of the list; therefore, the system will not recognize 305anyone except 306``ken,'' ``dennis,'' the ``staff'' netgroup and the ``permitted-users'' 307netgroup as authorized users. 308The ``rejected-users'' netgroup will 309be recognized but all members will have their shells remapped and 310therefore be denied access. 311All other NIS password records 312will be ignored. 313The administrator may add a wildcard entry to the 314end of the list such as: 315.Bd -literal -offset indent 316+:::::::::/usr/local/bin/go_away 317 318.Ed 319This entry acts as a catch-all for all users that don't match against 320any of the other entries. 321.Pa /usr/local/bin/go_away 322can be a short shell script or program 323that prints a message telling the user that he is not allowed access 324to the system. 325This technique is sometimes useful when it is 326desirable to have the system be able to recognize all users in a 327particular NIS domain without necessarily granting them login access. 328See the above text on the shell field regarding security concerns when using 329a shell script as the login shell. 330.Pp 331The primary use of this 332.Pa override 333feature is to permit the administrator 334to enforce access restrictions on NIS client systems. 335Users can be 336granted access to one group of machines and denied access to other 337machines simply by adding or removing them from a particular netgroup. 338Since the netgroup database can also be accessed via NIS, this allows 339access restrictions to be administered from a single location, namely 340the NIS master server; once a host's access list has been set in 341.Pa /etc/master.passwd , 342it need not be modified again unless new netgroups are created. 343.Sh NOTES 344.Ss Shadow passwords through NIS 345.Tn FreeBSD 346uses a shadow password scheme: users' encrypted passwords 347are stored only in 348.Pa /etc/master.passwd 349and 350.Pa /etc/spwd.db , 351which are readable and writable only by the superuser. 352This is done 353to prevent users from running the encrypted passwords through 354password-guessing programs and gaining unauthorized access to 355other users' accounts. 356NIS does not support a standard means of 357password shadowing, which implies that placing your password data 358into the NIS passwd maps totally defeats the security of 359.Tn FreeBSD Ns 's 360password shadowing system. 361.Pp 362.Tn FreeBSD 363provides a few special features to help get around this 364problem. 365It is possible to implement password shadowing between 366.Tn FreeBSD 367NIS clients and 368.Tn FreeBSD 369NIS servers. 370The 371.Xr getpwent 3 372routines will search for a 373.Pa master.passwd.byname 374and 375.Pa master.passwd.byuid 376maps which should contain the same data found in the 377.Pa /etc/master.passwd 378file. 379If the maps exist, 380.Tn FreeBSD 381will attempt to use them for user 382authentication instead of the standard 383.Pa passwd.byname 384and 385.Pa passwd.byuid 386maps. 387.Tn FreeBSD Ns 's 388.Xr ypserv 8 389will also check client requests to make sure they originate on a 390privileged port. 391Since only the superuser is allowed to bind to 392a privileged port, the server can tell if the requesting user 393is the superuser; all requests from non-privileged users to access 394the 395.Pa master.passwd 396maps will be refused. 397Since all user authentication programs run 398with superuser privilege, they should have the required access to 399users' encrypted password data while normal users will only 400be allowed access to the standard 401.Pa passwd 402maps which contain no password information. 403.Pp 404Note that this feature cannot be used in an environment with 405.No non- Ns Tn FreeBSD 406systems. 407Note also that a truly determined user with 408unrestricted access to your network could still compromise the 409.Pa master.passwd 410maps. 411.Ss UID and GID remapping with NIS overrides 412Unlike 413.Tn SunOS 414and other operating systems that use Sun's NIS code, 415.Tn FreeBSD 416allows the user to override 417.Pa all 418of the fields in a user's NIS 419.Pa passwd 420entry. 421For example, consider the following 422.Pa /etc/master.passwd 423entry: 424.Bd -literal -offset indent 425+@foo-users:???:666:666:0:0:0:Bogus user:/home/bogus:/bin/bogus 426 427.Ed 428This entry will cause all users in the `foo-users' netgroup to 429have 430.Pa all 431of their password information overridden, including UIDs, 432GIDs and passwords. 433The result is that all `foo-users' will be 434locked out of the system, since their passwords will be remapped 435to invalid values. 436.Pp 437This is important to remember because most people are accustomed to 438using an NIS wildcard entry that looks like this: 439.Bd -literal -offset indent 440+:*:0:0::: 441 442.Ed 443This often leads to new 444.Tn FreeBSD 445administrators choosing NIS entries for their 446.Pa master.passwd 447files that look like this: 448.Bd -literal -offset indent 449+:*:0:0:::::: 450 451.Ed 452Or worse, this 453.Bd -literal -offset indent 454+::0:0:::::: 455 456.Ed 457.Sy DO _NOT_ PUT ENTRIES LIKE THIS IN YOUR 458.Sy Pa master.passwd 459.Sy FILE!! 460The first tells 461.Tn FreeBSD 462to remap all passwords to `*' (which 463will prevent anybody from logging in) and to remap all UIDs and GIDs 464to 0 (which will make everybody appear to be the superuser). The 465second case just maps all UIDs and GIDs to 0, which means that 466.Pa all users will appear to be root! 467.Pp 468.Ss Compatibility of NIS override evaluation 469When Sun originally added NIS support to their 470.Xr getpwent 3 471routines, they took into account the fact that the 472.Tn SunOS 473password 474.Pa /etc/passwd 475file is in plain 476.Tn ASCII 477format. 478The 479.Tn SunOS 480documentation claims that 481adding a '+' entry to the password file causes the contents of 482the NIS password database to be 'inserted' at the position in 483the file where the '+' entry appears. 484If, for example, the 485administrator places the +:::::: entry in the middle of 486.Pa /etc/passwd, 487then the entire contents of the NIS password map would appear 488as though it had been copied into the middle of the password 489file. 490If the administrator places the +:::::: entry at both the 491middle and the end of 492.Pa /etc/passwd , 493then the NIS password map would appear twice: once in the middle 494of the file and once at the end. 495(By using override entries 496instead of simple wildcards, other combinations could be achieved.) 497.Pp 498By contrast, 499.Tn FreeBSD 500does not have a single 501.Tn ASCII 502password file: it 503has a hashed password database. 504This database does not have an 505easily-defined beginning, middle or end, which makes it very hard 506to design a scheme that is 100% compatible with 507.Tn SunOS . 508For example, 509the 510.Fn getpwnam 511and 512.Fn getpwuid 513functions in 514.Tn FreeBSD 515are designed to do direct queries to the 516hash database rather than a linear search. 517This approach is faster 518on systems where the password database is large. 519However, when 520using direct database queries, the system does not know or care 521about the order of the original password file, and therefore 522it cannot easily apply the same override logic used by 523.Tn SunOS . 524.Pp 525Instead, 526.Tn FreeBSD 527groups all the NIS override entries together 528and constructs a filter out of them. 529Each NIS password entry 530is compared against the override filter exactly once and 531treated accordingly: if the filter allows the entry through 532unaltered, it's treated unaltered; if the filter calls for remapping 533of fields, then fields are remapped; if the filter calls for 534explicit exclusion (i.e. the entry matches a '-' override), 535the entry is ignored; if the entry doesn't match against any 536of the filter specifications, it's discarded. 537.Pp 538Again, note that the NIS '+' and '-' entries 539themselves are handled in the order in which they were specified 540in the 541.Pa /etc/master.passwd 542file since doing otherwise would lead to unpredictable behavior. 543.Pp 544The end result is that 545.Tn FreeBSD Ns 's 546provides a very close approximation 547of 548.Tn SunOS Ns 's 549behavior while maintaining the database paradigm, though the 550.Xr getpwent 3 551functions do behave somewhat differently from their 552.Tn SunOS 553counterparts. 554The primary differences are: 555.Bl -bullet -offset indent 556.It 557Each NIS password map record can be mapped into the password 558local password space only once. 559.It 560The placement of the NIS '+' and '-' entries does not necessarily 561affect where NIS password records will be mapped into 562the password space. 563.El 564.Pp 565In %99 of all 566.Tn FreeBSD 567configurations, NIS client behavior will be 568indistinguishable from that of 569.Tn SunOS 570or other similar systems. 571Even 572so, users should be aware of these architectural differences. 573.Pp 574.Ss Using groups instead of netgroups for NIS overrides 575.Tn FreeBSD 576offers the capability to do override matching based on 577user groups rather than netgroups. 578If, for example, an NIS entry 579is specified as: 580.Bd -literal -offset indent 581+@operator::::::::: 582 583.Ed 584the system will first try to match users against a netgroup called 585`operator'. If an `operator' netgroup doesn't exist, the system 586will try to match users against the normal `operator' group 587instead. 588.Ss Changes in behavior from older versions of FreeBSD 589There have been several bug fixes and improvements in 590.Tn FreeBSD Ns 's 591NIS/YP handling, some of which have caused changes in behavior. 592While the behavior changes are generally positive, it is important 593that users and system administrators be aware of them: 594.Bl -enum -offset indent 595.It 596In versions prior to 2.0.5, reverse lookups (i.e. using 597.Fn getpwuid ) 598would not have overrides applied, which is to say that it 599was possible for 600.Fn getpwuid 601to return a login name that 602.Fn getpwnam 603would not recognize. 604This has been fixed: overrides specified 605in 606.Pa /etc/master.passwd 607now apply to all 608.Xr getpwent 3 609functions. 610.It 611Prior to 612.Fx 2.0.5 , 613netgroup overrides did not work at 614all, largely because 615.Tn FreeBSD 616did not have support for reading 617netgroups through NIS. 618Again, this has been fixed, and 619netgroups can be specified just as in 620.Tn SunOS 621and similar NIS-capable 622systems. 623.It 624.Tn FreeBSD 625now has NIS server capabilities and supports the use 626of 627.Pa master.passwd 628NIS maps in addition to the standard Sixth Edition format 629.Pa passwd 630maps. 631This means that you can specify change, expiration and class 632information through NIS, provided you use a 633.Tn FreeBSD 634system as 635the NIS server. 636.El 637.Sh FILES 638.Bl -tag -width /etc/master.passwd -compact 639.It Pa /etc/passwd 640.Tn ASCII 641password file, with passwords removed 642.It Pa /etc/pwd.db 643.Xr db 3 -format 644password database, with passwords removed 645.It Pa /etc/master.passwd 646.Tn ASCII 647password file, with passwords intact 648.It Pa /etc/spwd.db 649.Xr db 3 -format 650password database, with passwords intact 651.El 652.Sh SEE ALSO 653.Xr chpass 1 , 654.Xr login 1 , 655.Xr passwd 1 , 656.Xr getpwent 3 , 657.Xr login_getclass 3 , 658.Xr yp 4 , 659.Xr login.conf 5 , 660.Xr adduser 8 , 661.Xr pw 8 , 662.Xr pwd_mkdb 8 , 663.Xr vipw 8 664.Sh BUGS 665User information should (and eventually will) be stored elsewhere. 666.Pp 667The YP/NIS password database makes encrypted passwords visible to 668ordinary users, thus making password cracking easier unless you use 669shadow passwords with the 670.Pa master.passwd 671maps and 672.Tn FreeBSD Ns 's 673.Xr ypserv 8 674server. 675.Pp 676Unless you're using 677.Tn FreeBSD Ns 's 678.Xr ypserv 8 , 679which supports the use of 680.Pa master.passwd 681type maps, 682the YP/NIS password database will be in old-style (Sixth Edition) format, 683which means that site-wide values for user login class, password 684expiration date, and other fields present in the current format 685will not be available when a 686.Tn FreeBSD 687system is used as a client with 688a standard NIS server. 689.Sh COMPATIBILITY 690The password file format has changed since 691.Bx 4.3 . 692The following awk script can be used to convert your old-style password 693file into a new style password file. 694The additional fields 695.Dq class , 696.Dq change 697and 698.Dq expire 699are added, but are turned off by default. 700These fields can then be set using 701.Xr vipw 8 702or 703.Xr pw 8 . 704.Bd -literal -offset indent 705BEGIN { FS = ":"} 706{ print $1 ":" $2 ":" $3 ":" $4 "::0:0:" $5 ":" $6 ":" $7 } 707.Ed 708.Sh HISTORY 709A 710.Nm 711file format appeared in 712.At v6 . 713The YP/NIS functionality is modeled after 714.Tn SunOS 715and first appeared in 716.Fx 1.1 717The override capability is new in 718.Fx 2.0 . 719The override capability was updated to properly support netgroups 720in 721.Fx 2.0.5 . 722Support for comments first appeared in 723.Fx 3.0 . 724