3 .\" Author: [FIXME: author] [see http://docbook.sf.net/el/author]
4 .\" Generator: DocBook XSL Stylesheets v1.75.1 <http://docbook.sf.net/>
6 .\" Manual: Polecenia użytkownik\('ow
7 .\" Source: Polecenia użytkownik\('ow
10 .TH "PASSWD" "1" "07/24/2009" "Polecenia użytkownik\('ow" "Polecenia użytkownik\('ow"
11 .\" -----------------------------------------------------------------
12 .\" * set default formatting
13 .\" -----------------------------------------------------------------
14 .\" disable hyphenation
16 .\" disable justification (adjust text to left margin only)
18 .\" -----------------------------------------------------------------
19 .\" * MAIN CONTENT STARTS HERE *
20 .\" -----------------------------------------------------------------
22 passwd \- zmiana has\(/la użytkownika
24 .HP \w'\fBpasswd\fR\ 'u
25 \fBpasswd\fR [\fIopcje\fR] [\fILOGIN\fR]
30 command changes passwords for user accounts\&. A normal user may only change the password for his/her own account, while the superuser may change the password for any account\&.
32 also changes the account or associated password validity period\&.
33 .SS "Password Changes"
35 The user is first prompted for his/her old password, if one is present\&. This password is then encrypted and compared against the stored password\&. The user has only one chance to enter the correct password\&. The superuser is permitted to bypass this step so that forgotten passwords may be changed\&.
37 After the password has been entered, password aging information is checked to see if the user is permitted to change the password at this time\&. If not,
39 refuses to change the password and exits\&.
41 The user is then prompted twice for a replacement password\&. The second entry is compared against the first and both are required to match in order for the password to be changed\&.
43 Then, the password is tested for complexity\&. As a general guideline, passwords should consist of 6 to 8 characters including one or more characters from each of the following sets:
53 lower case alphabetics
78 Care must be taken not to include the system default erase or kill characters\&.
80 will reject any password which is not suitably complex\&.
81 .SS "Hints for user passwords"
83 The security of a password depends upon the strength of the encryption algorithm and the size of the key space\&. The legacy
85 System encryption method is based on the NBS DES algorithm\&. More recent methods are now recommended (see
86 \fBENCRYPT_METHOD\fR)\&. The size of the key space depends upon the randomness of the password which is selected\&.
88 Compromises in password security normally result from careless password selection or handling\&. For this reason, you should not select a password which appears in a dictionary or which must be written down\&. The password should also not be a proper name, your license number, birth date, or street address\&. Any of these may be used as guesses to violate system security\&.
90 You can find advices on how to choose a strong password on http://en\&.wikipedia\&.org/wiki/Password_strength
95 posiada następujące opcje:
97 \fB\-a\fR, \fB\-\-all\fR
99 This option can be used only with
101 and causes show status for all users\&.
104 \fB\-d\fR, \fB\-\-delete\fR
106 Delete a user\'s password (make it empty)\&. This is a quick way to disable a password for an account\&. It will set the named account passwordless\&.
109 \fB\-e\fR, \fB\-\-expire\fR
111 Immediately expire an account\'s password\&. This in effect can force a user to change his/her password at the user\'s next login\&.
114 \fB\-h\fR, \fB\-\-help\fR
116 Wyświetlenie komunikatu pomocy i zakończenie dzia\(/lania\&.
119 \fB\-i\fR, \fB\-\-inactive\fR\fINIEAKTYWNE\fR
121 This option is used to disable an account after the password has been expired for a number of days\&. After a user account has had an expired password for
123 days, the user may no longer sign on to the account\&.
126 \fB\-k\fR, \fB\-\-keep\-tokens\fR
128 Indicate password change should be performed only for expired authentication tokens (passwords)\&. The user wishes to keep their non\-expired tokens as before\&.
131 \fB\-l\fR, \fB\-\-lock\fR
133 Lock the password of the named account\&. This option disables a password by changing it to a value which matches no possible encrypted value (it adds a \(aa!\(aa at the beginning of the password)\&.
135 Note that this does not disable the account\&. The user may still be able to login using another authentication token (e\&.g\&. an SSH key)\&. To disable the account, administrators should use
136 \fBusermod \-\-expiredate 1\fR
137 (this set the account\'s expire date to Jan 2, 1970)\&.
139 Users with a locked password are not allowed to change their password\&.
142 \fB\-n\fR, \fB\-\-mindays\fR \fIMIN_DAYS\fR
144 Utawia minimalną liczbę dni pomiędzy zmianami has\(/la na
145 \fIMIN_DAYS\fR\&. Wartość zerowa oznacza, że użytkownik może je zmieniać w dowolnym czasie\&.
148 \fB\-q\fR, \fB\-\-quiet\fR
153 \fB\-r\fR, \fB\-\-repository\fR\fIREPOZYTORIUM\fR
160 \fB\-S\fR, \fB\-\-status\fR
162 Display account status information\&. The status information consists of 7 fields\&. The first field is the user\'s login name\&. The second field indicates if the user account has a locked password (L), has no password (NP), or has a usable password (P)\&. The third field gives the date of the last password change\&. The next four fields are the minimum age, maximum age, warning period, and inactivity period for the password\&. These ages are expressed in days\&.
165 \fB\-u\fR, \fB\-\-unlock\fR
167 Unlock the password of the named account\&. This option re\-enables a password by changing the password back to its previous value (to the value before using the
172 \fB\-w\fR, \fB\-\-warndays\fR\fIDNI_OSTRZ\fR
174 Set the number of days of warning before a password change is required\&. The
176 option is the number of days prior to the password expiring that a user will be warned that his/her password is about to expire\&.
179 \fB\-x\fR, \fB\-\-maxdays\fR\fIMAX_DNI\fR
181 Set the maximum number of days a password remains valid\&. After
182 \fIMAX_DAYS\fR, the password is required to be changed\&.
186 Password complexity checking may vary from site to site\&. The user is urged to select a password as complex as he or she feels comfortable with\&.
188 Users may not be able to change their password on a system if NIS is enabled and they are not logged into the NIS server\&.
191 The following configuration variables in
193 change the behavior of this tool:
195 \fBENCRYPT_METHOD\fR (string)
197 This defines the system default encryption algorithm for encrypting passwords (if no algorithm are specified on the command line)\&.
199 It can take one of these values:
247 Note: this parameter overrides the
252 \fBMD5_CRYPT_ENAB\fR (boolean)
254 Indicate if passwords must be encrypted using the MD5\-based algorithm\&. If set to
255 \fIyes\fR, new passwords will be encrypted using the MD5\-based algorithm compatible with the one used by recent releases of FreeBSD\&. It supports passwords of unlimited length and longer salt strings\&. Set to
257 if you need to copy encrypted passwords to other systems which don\'t understand the new algorithm\&. Default is
260 This variable is superceded by the
262 variable or by any command line option used to configure the encryption algorithm\&.
264 This variable is deprecated\&. You should use
265 \fBENCRYPT_METHOD\fR\&.
268 \fBOBSCURE_CHECKS_ENAB\fR (boolean)
270 Enable additional checks upon password changes\&.
273 \fBPASS_ALWAYS_WARN\fR (boolean)
275 Warn about weak passwords (but still allow them) if you are root\&.
278 \fBPASS_CHANGE_TRIES\fR (number)
280 Maximum number of attempts to change password if rejected (too easy)\&.
283 \fBPASS_MAX_LEN\fR (number), \fBPASS_MIN_LEN\fR (number)
285 Number of significant characters in the password for crypt()\&.
287 is 8 by default\&. Don\'t change unless your crypt() is better\&. This is ignored if
293 \fBSHA_CRYPT_MIN_ROUNDS\fR (number), \fBSHA_CRYPT_MAX_ROUNDS\fR (number)
300 \fISHA512\fR, this defines the number of SHA rounds used by the encryption algorithm by default (when the number of rounds is not specified on the command line)\&.
302 With a lot of rounds, it is more difficult to brute forcing the password\&. But note also that more CPU resources will be needed to authenticate users\&.
304 If not specified, the libc will choose the default number of rounds (5000)\&.
306 The values must be inside the 1000\-999999999 range\&.
309 \fBSHA_CRYPT_MIN_ROUNDS\fR
311 \fBSHA_CRYPT_MAX_ROUNDS\fR
312 values is set, then this value will be used\&.
315 \fBSHA_CRYPT_MIN_ROUNDS\fR
317 \fBSHA_CRYPT_MAX_ROUNDS\fR, the highest value will be used\&.
323 Informacja o kontach użytkownik\('ow\&.
328 Informacje chronione o użytkownikach\&.
333 Konfiguracja pakietu shadow\&.
335 .SH "KOD ZAKOŃCZENIA"
339 kończy dzia\(/lanie z następującymi wartościami kod\('ow zakończenia:
343 poprawne zakończenie dzia\(/lania programu
353 nieprawid\(/lowa kombinacja opcji
358 unexpected failure, nothing done
376 nieprawid\(/lowy argument opcji