xref: /freebsd/share/man/man5/passwd.5 (revision 23f282aa31e9b6fceacd449020e936e98d6f2298)
1.\" Copyright (c) 1988, 1991, 1993
2.\"	The Regents of the University of California.  All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\"    notice, this list of conditions and the following disclaimer.
9.\" 2. Redistributions in binary form must reproduce the above copyright
10.\"    notice, this list of conditions and the following disclaimer in the
11.\"    documentation and/or other materials provided with the distribution.
12.\" 3. All advertising materials mentioning features or use of this software
13.\"    must display the following acknowledgement:
14.\"	This product includes software developed by the University of
15.\"	California, Berkeley and its contributors.
16.\" 4. Neither the name of the University nor the names of its contributors
17.\"    may be used to endorse or promote products derived from this software
18.\"    without specific prior written permission.
19.\"
20.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\"     From: @(#)passwd.5	8.1 (Berkeley) 6/5/93
33.\" $FreeBSD$
34.\"
35.Dd September 29, 1994
36.Dt PASSWD 5
37.Os
38.Sh NAME
39.Nm passwd
40.Nd format of the password file
41.Sh DESCRIPTION
42The
43.Nm passwd
44files are files consisting of newline separated records, one per user,
45containing ten colon (``:'') separated fields.  These fields are as
46follows:
47.Pp
48.Bl -tag -width password -offset indent
49.It name
50User's login name.
51.It password
52User's
53.Em encrypted
54password.
55.It uid
56User's id.
57.It gid
58User's login group id.
59.It class
60User's login class.
61.It change
62Password change time.
63.It expire
64Account expiration time.
65.It gecos
66General information about the user.
67.It home_dir
68User's home directory.
69.It shell
70User's login shell.
71.El
72.Pp
73Lines whose first non-whitespace character is a pound-sign (#)
74are comments, and are ignored.  Blank lines which consist
75only of spaces, tabs or newlines are also ignored.
76.Pp
77The
78.Ar name
79field is the login used to access the computer account, and the
80.Ar uid
81field is the number associated with it.  They should both be unique
82across the system (and often across a group of systems) since they
83control file access.
84.Pp
85While it is possible to have multiple entries with identical login names
86and/or identical user id's, it is usually a mistake to do so.  Routines
87that manipulate these files will often return only one of the multiple
88entries, and that one by random selection.
89.Pp
90The login name must never begin with a hyphen (``-''); also, it is strongly
91suggested that neither upper-case characters nor dots (``.'') be part
92of the name, as this tends to confuse mailers.  No field may contain a
93colon (``:'') as this has been used historically to separate the fields
94in the user database.
95.Pp
96The password field is the
97.Em encrypted
98form of the password.
99If the
100.Ar password
101field is empty, no password will be required to gain access to the
102machine.  This is almost invariably a mistake.
103Because these files contain the encrypted user passwords, they should
104not be readable by anyone without appropriate privileges.
105Administrative accounts have a password field containing an asterisk
106.Ql \&*
107which disallows normal logins.
108.Pp
109The group field is the group that the user will be placed in upon login.
110Although this system supports multiple groups (see
111.Xr groups 1 )
112this field indicates the user's primary group.
113Secondary group memberships are selected in
114.Pa /etc/group .
115.Pp
116The
117.Ar class
118field is a key for a user's login class.
119Login classes are defined in
120.Xr login.conf 5 ,
121which is a
122.Xr termcap 5
123style database of user attributes, accounting, resource and
124environment settings.
125.Pp
126The
127.Ar change
128field is the number in seconds,
129.Dv GMT ,
130from the epoch, until the
131password for the account must be changed.
132This field may be left empty or set to 0 to turn off the
133password aging feature.
134.Pp
135The
136.Ar expire
137field is the number in seconds,
138.Dv GMT ,
139from the epoch, until the
140account expires.
141This field may be left empty or set to 0 to turn off the account
142aging feature.
143.Pp
144The
145.Ar gecos
146field normally contains comma (``,'') separated subfields as follows:
147.Pp
148.Bd -unfilled -offset indent
149fullname		user's full name
150office		user's office location
151wphone		user's work phone number
152hphone		user's home phone number
153.Ed
154.Pp
155This information is used by the
156.Xr finger 1
157program, and the first field used by the system mailer.
158If an ampersand
159.Ql \&&
160character appears within the fullname field, programs that
161use this field will substitute it with a capitalized version
162of the account's login name.
163.Pp
164The user's home directory is the full
165.Tn UNIX
166path name where the user
167will be placed on login.
168.Pp
169The shell field is the command interpreter the user prefers.
170If there is nothing in the
171.Ar shell
172field, the Bourne shell
173.Pq Pa /bin/sh
174is assumed.
175For security reasons, if the shell is set to a script that disallows
176access to the system (the
177.Xr nologin 8
178script, for example), care should be taken not to import any environment
179variables.  With
180.Xr sh 1 ,
181this can be done by specifying the
182.Fl p
183flag.
184Check the specific shell documentation to determine how this is
185done with other shells.
186.Sh YP/NIS INTERACTION
187.Ss Enabling access to NIS passwd data
188The system administrator can configure
189.Tn FreeBSD
190to use NIS/YP for
191its password information by adding special records to the
192.Pa /etc/master.passwd
193file.
194These entries should be added with
195.Xr vipw 8
196so that the changes can be properly merged with the hashed
197password databases and the
198.Pa /etc/passwd
199file (
200.Pa /etc/passwd
201should never be edited manually). Alternatively, the administrator
202can modify
203.Pa /etc/master.passwd
204in some other way and then manually update the password databases with
205.Xr pwd_mkdb 8 .
206.Pp
207The simplest way to activate NIS is to add an empty record
208with only a plus sign (`+') in the name field, such as this:
209.Bd -literal -offset indent
210+:::::::::
211
212.Ed
213The `+' will tell the
214.Xr getpwent 3
215routines in
216.Tn FreeBSD Ns 's
217standard C library to begin using the NIS passwd maps
218for lookups.
219.Pp
220Note that the entry shown above is known as a
221.Em wildcard
222entry, because it matches all users (the `+' without any other information
223matches everybody) and allows all NIS password data to be retrieved
224unaltered.
225However, by
226specifying a username or netgroup next to the `+' in the NIS
227entry, the administrator can affect what data are extracted from the
228NIS passwd maps and how it is interpreted.
229Here are a few example
230records that illustrate this feature (note that you can have several
231NIS entries in a single
232.Pa master.passwd
233file):
234.Bd -literal -offset indent
235-mitnick:::::::::
236+@staff:::::::::
237+@permitted-users:::::::::
238+dennis:::::::::
239+ken:::::::::/bin/csh
240+@rejected-users::32767:32767::::::/bin/false
241
242.Ed
243Specific usernames are listed explicitly while netgroups are signified
244by a preceding `@'. In the above example, users in the ``staff'' and
245``permitted-users'' netgroups will have their password information
246read from NIS and used unaltered.
247In other words, they will be allowed
248normal access to the machine.
249Users ``ken'' and ``dennis,'' who have
250been named explicitly rather than through a netgroup, will also have
251their password data read from NIS, _except_ that user ``ken'' will
252have his shell remapped to
253.Pa /bin/csh .
254This means that value for his shell specified in the NIS password map
255will be overridden by the value specified in the special NIS entry in
256the local
257.Pa master.passwd
258file.
259User ``ken'' may have been assigned the csh shell because his
260NIS password entry specified a different shell that may not be
261installed on the client machine for political or technical reasons.
262Meanwhile, users in the ``rejected-users'' netgroup are prevented
263from logging in because their UIDs, GIDs and shells have been overridden
264with invalid values.
265.Pp
266User ``mitnick'' will be be ignored entirely because his entry is
267specified with a `-' instead of a `+'. A minus entry can be used
268to block out certain NIS password entries completely; users who's
269password data has been excluded in this way are not recognized by
270the system at all.
271(Any overrides specified with minus entries are
272also ignored since there is no point in processing override information
273for a user that the system isn't going to recognize in the first place.)
274In general, a minus entry is used to specifically exclude a user
275who might otherwise be granted access because he happens to be a
276member of an authorized netgroup.
277For example, if ``mitnick'' is
278a member of the ``permitted-users'' netgroup and must, for whatever
279the reason, be permitted to remain in that netgroup (possibly to
280retain access to other machines within the domain), the administrator
281can still deny him access to a particular system with a minus entry.
282Also, it is sometimes easier to explicitly list those users who aren't
283allowed access rather than generate a possibly complicated list of
284users who are allowed access and omit the rest.
285.Pp
286Note that the plus and minus entries are evaluated in order from
287first to last with the first match taking precedence.
288This means
289the system will only use the first entry that matches a particular user.
290If, for instance, we have a user ``foo'' who is a member of both the ``staff''
291netgroup and the ``rejected-users'' netgroup, he will be admitted to
292the system because the above example lists the entry for ``staff''
293before the entry for ``rejected-users.''
294If we reversed the order,
295user ``foo'' would be flagged as a ``rejected-user'' instead and
296denied access.
297.Pp
298Lastly, any NIS password database records that do not match against
299at least one of the users or netgroups specified by the NIS access
300entries in the
301.Pa /etc/master.passwd
302file will be ignored (along with any users specified using minus
303entries). In our example shown above, we do not have a wildcard
304entry at the end of the list; therefore, the system will not recognize
305anyone except
306``ken,'' ``dennis,'' the ``staff'' netgroup and the ``permitted-users''
307netgroup as authorized users.
308The ``rejected-users'' netgroup will
309be recognized but all members will have their shells remapped and
310therefore be denied access.
311All other NIS password records
312will be ignored.
313The administrator may add a wildcard entry to the
314end of the list such as:
315.Bd -literal -offset indent
316+:::::::::/usr/local/bin/go_away
317
318.Ed
319This entry acts as a catch-all for all users that don't match against
320any of the other entries.
321.Pa /usr/local/bin/go_away
322can be a short shell script or program
323that prints a message telling the user that he is not allowed access
324to the system.
325This technique is sometimes useful when it is
326desirable to have the system be able to recognize all users in a
327particular NIS domain without necessarily granting them login access.
328See the above text on the shell field regarding security concerns when using
329a shell script as the login shell.
330.Pp
331The primary use of this
332.Pa override
333feature is to permit the administrator
334to enforce access restrictions on NIS client systems.
335Users can be
336granted access to one group of machines and denied access to other
337machines simply by adding or removing them from a particular netgroup.
338Since the netgroup database can also be accessed via NIS, this allows
339access restrictions to be administered from a single location, namely
340the NIS master server; once a host's access list has been set in
341.Pa /etc/master.passwd ,
342it need not be modified again unless new netgroups are created.
343.Sh NOTES
344.Ss Shadow passwords through NIS
345.Tn FreeBSD
346uses a shadow password scheme: users' encrypted passwords
347are stored only in
348.Pa /etc/master.passwd
349and
350.Pa /etc/spwd.db ,
351which are readable and writable only by the superuser.
352This is done
353to prevent users from running the encrypted passwords through
354password-guessing programs and gaining unauthorized access to
355other users' accounts.
356NIS does not support a standard means of
357password shadowing, which implies that placing your password data
358into the NIS passwd maps totally defeats the security of
359.Tn FreeBSD Ns 's
360password shadowing system.
361.Pp
362.Tn FreeBSD
363provides a few special features to help get around this
364problem.
365It is possible to implement password shadowing between
366.Tn FreeBSD
367NIS clients and
368.Tn FreeBSD
369NIS servers.
370The
371.Xr getpwent 3
372routines will search for a
373.Pa master.passwd.byname
374and
375.Pa master.passwd.byuid
376maps which should contain the same data found in the
377.Pa /etc/master.passwd
378file.
379If the maps exist,
380.Tn FreeBSD
381will attempt to use them for user
382authentication instead of the standard
383.Pa passwd.byname
384and
385.Pa passwd.byuid
386maps.
387.Tn FreeBSD Ns 's
388.Xr ypserv 8
389will also check client requests to make sure they originate on a
390privileged port.
391Since only the superuser is allowed to bind to
392a privileged port, the server can tell if the requesting user
393is the superuser; all requests from non-privileged users to access
394the
395.Pa master.passwd
396maps will be refused.
397Since all user authentication programs run
398with superuser privilege, they should have the required access to
399users' encrypted password data while normal users will only
400be allowed access to the standard
401.Pa passwd
402maps which contain no password information.
403.Pp
404Note that this feature cannot be used in an environment with
405.No non- Ns Tn FreeBSD
406systems.
407Note also that a truly determined user with
408unrestricted access to your network could still compromise the
409.Pa master.passwd
410maps.
411.Ss UID and GID remapping with NIS overrides
412Unlike
413.Tn SunOS
414and other operating systems that use Sun's NIS code,
415.Tn FreeBSD
416allows the user to override
417.Pa all
418of the fields in a user's NIS
419.Pa passwd
420entry.
421For example, consider the following
422.Pa /etc/master.passwd
423entry:
424.Bd -literal -offset indent
425+@foo-users:???:666:666:0:0:0:Bogus user:/home/bogus:/bin/bogus
426
427.Ed
428This entry will cause all users in the `foo-users' netgroup to
429have
430.Pa all
431of their password information overridden, including UIDs,
432GIDs and passwords.
433The result is that all `foo-users' will be
434locked out of the system, since their passwords will be remapped
435to invalid values.
436.Pp
437This is important to remember because most people are accustomed to
438using an NIS wildcard entry that looks like this:
439.Bd -literal -offset indent
440+:*:0:0:::
441
442.Ed
443This often leads to new
444.Tn FreeBSD
445administrators choosing NIS entries for their
446.Pa master.passwd
447files that look like this:
448.Bd -literal -offset indent
449+:*:0:0::::::
450
451.Ed
452Or worse, this
453.Bd -literal -offset indent
454+::0:0::::::
455
456.Ed
457.Sy DO _NOT_ PUT ENTRIES LIKE THIS IN YOUR
458.Sy Pa master.passwd
459.Sy FILE!!
460The first tells
461.Tn FreeBSD
462to remap all passwords to `*' (which
463will prevent anybody from logging in) and to remap all UIDs and GIDs
464to 0 (which will make everybody appear to be the superuser). The
465second case just maps all UIDs and GIDs to 0, which means that
466.Pa all users will appear to be root!
467.Pp
468.Ss Compatibility of NIS override evaluation
469When Sun originally added NIS support to their
470.Xr getpwent 3
471routines, they took into account the fact that the
472.Tn SunOS
473password
474.Pa /etc/passwd
475file is in plain
476.Tn ASCII
477format.
478The
479.Tn SunOS
480documentation claims that
481adding a '+' entry to the password file causes the contents of
482the NIS password database to be 'inserted' at the position in
483the file where the '+' entry appears.
484If, for example, the
485administrator places the +:::::: entry in the middle of
486.Pa /etc/passwd,
487then the entire contents of the NIS password map would appear
488as though it had been copied into the middle of the password
489file.
490If the administrator places the +:::::: entry at both the
491middle and the end of
492.Pa /etc/passwd ,
493then the NIS password map would appear twice: once in the middle
494of the file and once at the end.
495(By using override entries
496instead of simple wildcards, other combinations could be achieved.)
497.Pp
498By contrast,
499.Tn FreeBSD
500does not have a single
501.Tn ASCII
502password file: it
503has a hashed password database.
504This database does not have an
505easily-defined beginning, middle or end, which makes it very hard
506to design a scheme that is 100% compatible with
507.Tn SunOS .
508For example,
509the
510.Fn getpwnam
511and
512.Fn getpwuid
513functions in
514.Tn FreeBSD
515are designed to do direct queries to the
516hash database rather than a linear search.
517This approach is faster
518on systems where the password database is large.
519However, when
520using direct database queries, the system does not know or care
521about the order of the original password file, and therefore
522it cannot easily apply the same override logic used by
523.Tn SunOS .
524.Pp
525Instead,
526.Tn FreeBSD
527groups all the NIS override entries together
528and constructs a filter out of them.
529Each NIS password entry
530is compared against the override filter exactly once and
531treated accordingly: if the filter allows the entry through
532unaltered, it's treated unaltered; if the filter calls for remapping
533of fields, then fields are remapped; if the filter calls for
534explicit exclusion (i.e. the entry matches a '-' override),
535the entry is ignored; if the entry doesn't match against any
536of the filter specifications, it's discarded.
537.Pp
538Again, note that the NIS '+' and '-' entries
539themselves are handled in the order in which they were specified
540in the
541.Pa /etc/master.passwd
542file since doing otherwise would lead to unpredictable behavior.
543.Pp
544The end result is that
545.Tn FreeBSD Ns 's
546provides a very close approximation
547of
548.Tn SunOS Ns 's
549behavior while maintaining the database paradigm, though the
550.Xr getpwent 3
551functions do behave somewhat differently from their
552.Tn SunOS
553counterparts.
554The primary differences are:
555.Bl -bullet -offset indent
556.It
557Each NIS password map record can be mapped into the password
558local password space only once.
559.It
560The placement of the NIS '+' and '-' entries does not necessarily
561affect where NIS password records will be mapped into
562the password space.
563.El
564.Pp
565In %99 of all
566.Tn FreeBSD
567configurations, NIS client behavior will be
568indistinguishable from that of
569.Tn SunOS
570or other similar systems.
571Even
572so, users should be aware of these architectural differences.
573.Pp
574.Ss Using groups instead of netgroups for NIS overrides
575.Tn FreeBSD
576offers the capability to do override matching based on
577user groups rather than netgroups.
578If, for example, an NIS entry
579is specified as:
580.Bd -literal -offset indent
581+@operator:::::::::
582
583.Ed
584the system will first try to match users against a netgroup called
585`operator'. If an `operator' netgroup doesn't exist, the system
586will try to match users against the normal `operator' group
587instead.
588.Ss Changes in behavior from older versions of FreeBSD
589There have been several bug fixes and improvements in
590.Tn FreeBSD Ns 's
591NIS/YP handling, some of which have caused changes in behavior.
592While the behavior changes are generally positive, it is important
593that users and system administrators be aware of them:
594.Bl -enum -offset indent
595.It
596In versions prior to 2.0.5, reverse lookups (i.e. using
597.Fn getpwuid )
598would not have overrides applied, which is to say that it
599was possible for
600.Fn getpwuid
601to return a login name that
602.Fn getpwnam
603would not recognize.
604This has been fixed: overrides specified
605in
606.Pa /etc/master.passwd
607now apply to all
608.Xr getpwent 3
609functions.
610.It
611Prior to
612.Fx 2.0.5 ,
613netgroup overrides did not work at
614all, largely because
615.Tn FreeBSD
616did not have support for reading
617netgroups through NIS.
618Again, this has been fixed, and
619netgroups can be specified just as in
620.Tn SunOS
621and similar NIS-capable
622systems.
623.It
624.Tn FreeBSD
625now has NIS server capabilities and supports the use
626of
627.Pa master.passwd
628NIS maps in addition to the standard Sixth Edition format
629.Pa passwd
630maps.
631This means that you can specify change, expiration and class
632information through NIS, provided you use a
633.Tn FreeBSD
634system as
635the NIS server.
636.El
637.Sh FILES
638.Bl -tag -width /etc/master.passwd -compact
639.It Pa /etc/passwd
640.Tn ASCII
641password file, with passwords removed
642.It Pa /etc/pwd.db
643.Xr db 3 -format
644password database, with passwords removed
645.It Pa /etc/master.passwd
646.Tn ASCII
647password file, with passwords intact
648.It Pa /etc/spwd.db
649.Xr db 3 -format
650password database, with passwords intact
651.El
652.Sh SEE ALSO
653.Xr chpass 1 ,
654.Xr login 1 ,
655.Xr passwd 1 ,
656.Xr getpwent 3 ,
657.Xr login_getclass 3 ,
658.Xr yp 4 ,
659.Xr login.conf 5 ,
660.Xr adduser 8 ,
661.Xr pw 8 ,
662.Xr pwd_mkdb 8 ,
663.Xr vipw 8
664.Sh BUGS
665User information should (and eventually will) be stored elsewhere.
666.Pp
667The YP/NIS password database makes encrypted passwords visible to
668ordinary users, thus making password cracking easier unless you use
669shadow passwords with the
670.Pa master.passwd
671maps and
672.Tn FreeBSD Ns 's
673.Xr ypserv 8
674server.
675.Pp
676Unless you're using
677.Tn FreeBSD Ns 's
678.Xr ypserv 8 ,
679which supports the use of
680.Pa master.passwd
681type maps,
682the YP/NIS password database will be in old-style (Sixth Edition) format,
683which means that site-wide values for user login class, password
684expiration date, and other fields present in the current format
685will not be available when a
686.Tn FreeBSD
687system is used as a client with
688a standard NIS server.
689.Sh COMPATIBILITY
690The password file format has changed since
691.Bx 4.3 .
692The following awk script can be used to convert your old-style password
693file into a new style password file.
694The additional fields
695.Dq class ,
696.Dq change
697and
698.Dq expire
699are added, but are turned off by default.
700These fields can then be set using
701.Xr vipw 8
702or
703.Xr pw 8 .
704.Bd -literal -offset indent
705BEGIN { FS = ":"}
706{ print $1 ":" $2 ":" $3 ":" $4 "::0:0:" $5 ":" $6 ":" $7 }
707.Ed
708.Sh HISTORY
709A
710.Nm
711file format appeared in
712.At v6 .
713The YP/NIS functionality is modeled after
714.Tn SunOS
715and first appeared in
716.Fx 1.1
717The override capability is new in
718.Fx 2.0 .
719The override capability was updated to properly support netgroups
720in
721.Fx 2.0.5 .
722Support for comments first appeared in
723.Fx 3.0 .
724