3 .\" Author: [FIXME: author] [see http://docbook.sf.net/el/author]
4 .\" Generator: DocBook XSL Stylesheets v1.75.2 <http://docbook.sf.net/>
6 .\" Manual: Commandes de gestion du syst\(`eme
7 .\" Source: Commandes de gestion du syst\(`eme
10 .TH "CHPASSWD" "8" "16/02/2011" "Commandes de gestion du syst\(`em" "Commandes de gestion du syst\(`em"
11 .\" -----------------------------------------------------------------
12 .\" * Define some portability stuff
13 .\" -----------------------------------------------------------------
14 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
15 .\" http://bugs.debian.org/507673
16 .\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html
17 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
20 .\" -----------------------------------------------------------------
21 .\" * set default formatting
22 .\" -----------------------------------------------------------------
23 .\" disable hyphenation
25 .\" disable justification (adjust text to left margin only)
27 .\" -----------------------------------------------------------------
28 .\" * MAIN CONTENT STARTS HERE *
29 .\" -----------------------------------------------------------------
31 chpasswd \- Mettre \(`a jour des mots de passe par lot
33 .HP \w'\fBchpasswd\fR\ 'u
34 \fBchpasswd\fR [\fIoptions\fR]
39 command reads a list of user name and password pairs from standard input and uses this information to update a group of existing users\&. Each line is of the format:
41 \fInom_utilisateur\fR:\fImot_de_passe\fR
44 By default the supplied password must be in clear\-text, and is encrypted by
45 \fBchpasswd\fR\&. Also the password age will be updated, if present\&.
47 The default encryption algorithm can be defined for the system with the ENCRYPT_METHOD variable of
48 /etc/login\&.defs, and can be overwiten with the
56 first update the password in memory, and then commit all the changes to disk if no errors occured for any users\&.
58 Cette commande est destin\('ee aux gros syst\(`emes pour lesquels un nombre importants de comptes sont cr\('e\('es en une seule fois\&.
61 Les options disponibles pour la commande
65 \fB\-c\fR, \fB\-\-crypt\-method\fR
67 Use the specified method to encrypt the passwords\&.
69 The available methods are DES, MD5, NONE, and SHA256 or SHA512 if your libc support these methods\&.
72 \fB\-e\fR, \fB\-\-encrypted\fR
74 Indique que les mots de passe fournis sont chiffr\('es\&.
77 \fB\-h\fR, \fB\-\-help\fR
79 Afficher un message d\*(Aqaide et quitter\&.
82 \fB\-m\fR, \fB\-\-md5\fR
84 Permettre d\*(Aqutiliser le chiffrement MD5, plut\(^ot que DES, lorsque les mots de passe fournis ne sont pas chiffr\('es\&.
87 \fB\-s\fR, \fB\-\-sha\-rounds\fR
89 Use the specified number of rounds to encrypt the passwords\&.
91 The value 0 means that the system will choose the default number of rounds for the crypt method (5000)\&.
93 A minimal value of 1000 and a maximal value of 999,999,999 will be enforced\&.
95 You can only use this option with the SHA256 or SHA512 crypt method\&.
97 By default, the number of rounds is defined by the SHA_CRYPT_MIN_ROUNDS and SHA_CRYPT_MAX_ROUNDS variables in
102 Pensez \(`a fixer les permissions ou umask afin d\*(Aqemp\(^echer la lecture par les autres utilisateurs des fichiers non chiffr\('es\&.
104 You should make sure the passwords and the encryption method respect the system\*(Aqs password policy\&.
107 Les variables de configuration suivantes de
109 modifient le comportement de cet outil\ \&:
111 \fBENCRYPT_METHOD\fR (cha\(^ine ce caract\(`eres)
113 D\('efinit les algorithmes de chiffrement par d\('efaut du syst\(`eme pour coder les mots de passes (si aucun algorithme n\*(Aqa \('et\('e indiqu\('e sur la ligne de commandes)\&.
115 Il peut prendre une de ces valeurs\ \&:
162 Remarque\ \&: ce param\(`etre remplace la variable
163 \fBMD5_CRYPT_ENAB\fR\&.
166 \fBMD5_CRYPT_ENAB\fR (bool\('een)
168 Indicate if passwords must be encrypted using the MD5\-based algorithm\&. If set to
169 \fIyes\fR, new passwords will be encrypted using the MD5\-based algorithm compatible with the one used by recent releases of FreeBSD\&. It supports passwords of unlimited length and longer salt strings\&. Set to
171 if you need to copy encrypted passwords to other systems which don\*(Aqt understand the new algorithm\&. Default is
174 This variable is superceded by the
176 variable or by any command line option used to configure the encryption algorithm\&.
178 This variable is deprecated\&. You should use
179 \fBENCRYPT_METHOD\fR\&.
182 \fBSHA_CRYPT_MIN_ROUNDS\fR (nombre), \fBSHA_CRYPT_MAX_ROUNDS\fR (nombre)
189 \fISHA512\fR, this defines the number of SHA rounds used by the encryption algorithm by default (when the number of rounds is not specified on the command line)\&.
191 With a lot of rounds, it is more difficult to brute forcing the password\&. But note also that more CPU resources will be needed to authenticate users\&.
193 If not specified, the libc will choose the default number of rounds (5000)\&.
195 The values must be inside the 1000\-999999999 range\&.
198 \fBSHA_CRYPT_MIN_ROUNDS\fR
200 \fBSHA_CRYPT_MAX_ROUNDS\fR
201 values is set, then this value will be used\&.
204 \fBSHA_CRYPT_MIN_ROUNDS\fR
206 \fBSHA_CRYPT_MAX_ROUNDS\fR, the highest value will be used\&.
212 Informations sur les comptes des utilisateurs\&.
217 Informations s\('ecuris\('ees sur les comptes utilisateurs\&.
222 Configuration de la suite des mots de passe cach\('es \(Fo\ \&shadow password\ \&\(Fc\&.