3 .\" Author: [FIXME: author] [see http://docbook.sf.net/el/author]
4 .\" Generator: DocBook XSL Stylesheets v1.75.2 <http://docbook.sf.net/>
6 .\" Manual: System Management Commands
7 .\" Source: System Management Commands
10 .TH "CHPASSWD" "8" "16/02/2011" "System Management Commands" "System Management Commands"
11 .\" -----------------------------------------------------------------
12 .\" * Define some portability stuff
13 .\" -----------------------------------------------------------------
14 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
15 .\" http://bugs.debian.org/507673
16 .\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html
17 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
20 .\" -----------------------------------------------------------------
21 .\" * set default formatting
22 .\" -----------------------------------------------------------------
23 .\" disable hyphenation
25 .\" disable justification (adjust text to left margin only)
27 .\" -----------------------------------------------------------------
28 .\" * MAIN CONTENT STARTS HERE *
29 .\" -----------------------------------------------------------------
31 chpasswd \- aggiorna le password in modo non interattivo
33 .HP \w'\fBchpasswd\fR\ 'u
34 \fBchpasswd\fR [\fIopzioni\fR]
39 command reads a list of user name and password pairs from standard input and uses this information to update a group of existing users\&. Each line is of the format:
41 \fInome_utente\fR:\fIpassword\fR
44 By default the supplied password must be in clear\-text, and is encrypted by
45 \fBchpasswd\fR\&. Also the password age will be updated, if present\&.
47 The default encryption algorithm can be defined for the system with the ENCRYPT_METHOD variable of
48 /etc/login\&.defs, and can be overwiten with the
56 first update the password in memory, and then commit all the changes to disk if no errors occured for any users\&.
58 Questo comando \(`e appositamente pensato per grossi sistemi in cui si abbia la necessit\(`a di creare molti account nello stesso momento\&.
63 accetta le seguenti opzioni:
65 \fB\-c\fR, \fB\-\-crypt\-method\fR
67 Use the specified method to encrypt the passwords\&.
69 The available methods are DES, MD5, NONE, and SHA256 or SHA512 if your libc support these methods\&.
72 \fB\-e\fR, \fB\-\-encrypted\fR
74 Le password fornite sono in forma cifrata\&.
77 \fB\-h\fR, \fB\-\-help\fR
79 Mostra un messaggio di aiuto ed esce\&.
82 \fB\-m\fR, \fB\-\-md5\fR
84 Usa la cifratura MD5 anzich\('e DES quando le password fornite non sono cifrate\&.
87 \fB\-s\fR, \fB\-\-sha\-rounds\fR
89 Use the specified number of rounds to encrypt the passwords\&.
91 The value 0 means that the system will choose the default number of rounds for the crypt method (5000)\&.
93 A minimal value of 1000 and a maximal value of 999,999,999 will be enforced\&.
95 You can only use this option with the SHA256 or SHA512 crypt method\&.
97 By default, the number of rounds is defined by the SHA_CRYPT_MIN_ROUNDS and SHA_CRYPT_MAX_ROUNDS variables in
102 Remember to set permissions or umask to prevent readability of unencrypted files by other users\&.
104 You should make sure the passwords and the encryption method respect the system\*(Aqs password policy\&.
107 The following configuration variables in
109 change the behavior of this tool:
111 \fBENCRYPT_METHOD\fR (string)
113 This defines the system default encryption algorithm for encrypting passwords (if no algorithm are specified on the command line)\&.
115 It can take one of these values:
162 Note: this parameter overrides the
167 \fBMD5_CRYPT_ENAB\fR (boolean)
169 Indicate if passwords must be encrypted using the MD5\-based algorithm\&. If set to
170 \fIyes\fR, new passwords will be encrypted using the MD5\-based algorithm compatible with the one used by recent releases of FreeBSD\&. It supports passwords of unlimited length and longer salt strings\&. Set to
172 if you need to copy encrypted passwords to other systems which don\*(Aqt understand the new algorithm\&. Default is
175 This variable is superceded by the
177 variable or by any command line option used to configure the encryption algorithm\&.
179 This variable is deprecated\&. You should use
180 \fBENCRYPT_METHOD\fR\&.
183 \fBSHA_CRYPT_MIN_ROUNDS\fR (number), \fBSHA_CRYPT_MAX_ROUNDS\fR (number)
190 \fISHA512\fR, this defines the number of SHA rounds used by the encryption algorithm by default (when the number of rounds is not specified on the command line)\&.
192 With a lot of rounds, it is more difficult to brute forcing the password\&. But note also that more CPU resources will be needed to authenticate users\&.
194 If not specified, the libc will choose the default number of rounds (5000)\&.
196 The values must be inside the 1000\-999999999 range\&.
199 \fBSHA_CRYPT_MIN_ROUNDS\fR
201 \fBSHA_CRYPT_MAX_ROUNDS\fR
202 values is set, then this value will be used\&.
205 \fBSHA_CRYPT_MIN_ROUNDS\fR
207 \fBSHA_CRYPT_MAX_ROUNDS\fR, the highest value will be used\&.
213 informazioni sugli account utente\&.
218 Informazioni sicure sugli account di utenti\&.
223 Shadow password suite configuration\&.