1.\" Copyright (c) 1990, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. 9.\" 2. Redistributions in binary form must reproduce the above copyright 10.\" notice, this list of conditions and the following disclaimer in the 11.\" documentation and/or other materials provided with the distribution. 12.\" 3. All advertising materials mentioning features or use of this software 13.\" must display the following acknowledgement: 14.\" This product includes software developed by the University of 15.\" California, Berkeley and its contributors. 16.\" 4. Neither the name of the University nor the names of its contributors 17.\" may be used to endorse or promote products derived from this software 18.\" without specific prior written permission. 19.\" 20.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 21.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" @(#)passwd.1 8.1 (Berkeley) 6/6/93 33.\" 34.Dd June 6, 1993 35.Dt PASSWD 1 36.Os BSD 4 37.Sh NAME 38.Nm passwd 39.Nd modify a user's password 40.Sh SYNOPSIS 41.Nm passwd 42.Op Fl l 43.Op Ar user 44.Sh DESCRIPTION 45.Nm Passwd 46changes the user's Kerberos password. First, the user is prompted for their 47current password. 48If the current password is correctly typed, a new password is 49requested. 50The new password must be entered twice to avoid typing errors. 51.Pp 52The new password should be at least six characters long and not 53purely alphabetic. 54Its total length must be less than 55.Dv _PASSWORD_LEN 56(currently 128 characters). 57Numbers, upper case letters and meta characters 58are encouraged. 59.Pp 60Once the password has been verified, 61.Nm passwd 62communicates the new password information to 63the Kerberos authenticating host. 64.Bl -tag -width flag 65.It Fl l 66This option causes the password to be updated only in the local 67password file, and not with the Kerberos database. 68When changing only the local password, 69.Xr pwd_mkdb 8 70is used to update the password databases. 71.El 72.Pp 73To change another user's Kerberos password, one must first 74run 75.Xr kinit 1 76followed by 77.Xr passwd 1 . 78The super-user is not required to provide a user's current password 79if only the local password is modified. 80.Sh FILES 81.Bl -tag -width /etc/master.passwd -compact 82.It Pa /etc/master.passwd 83The user database 84.It Pa /etc/passwd 85A Version 7 format password file 86.It Pa /etc/passwd.XXXXXX 87Temporary copy of the password file 88.El 89.Sh SEE ALSO 90.Xr chpass 1 , 91.Xr kerberos 1 , 92.Xr kinit 1 , 93.Xr login 1 , 94.Xr passwd 5 , 95.Xr kpasswdd 8 , 96.Xr pwd_mkdb 8 , 97.Xr vipw 8 98.Rs 99.%A Robert Morris 100.%A Ken Thompson 101.%T "UNIX password security" 102.Re 103.Sh HISTORY 104A 105.Nm passwd 106command appeared in 107.At v6 . 108