3 .\" Author: [FIXME: author] [see http://docbook.sf.net/el/author]
4 .\" Generator: DocBook XSL Stylesheets v1.75.2 <http://docbook.sf.net/>
6 .\" Manual: Systemhanteringskommandon
7 .\" Source: Systemhanteringskommandon
10 .TH "CHGPASSWD" "8" "16-02-2011" "Systemhanteringskommandon" "Systemhanteringskommandon"
11 .\" -----------------------------------------------------------------
12 .\" * Define some portability stuff
13 .\" -----------------------------------------------------------------
14 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
15 .\" http://bugs.debian.org/507673
16 .\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html
17 .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
20 .\" -----------------------------------------------------------------
21 .\" * set default formatting
22 .\" -----------------------------------------------------------------
23 .\" disable hyphenation
25 .\" disable justification (adjust text to left margin only)
27 .\" -----------------------------------------------------------------
28 .\" * MAIN CONTENT STARTS HERE *
29 .\" -----------------------------------------------------------------
31 chgpasswd \- uppdatera gruppl\(:osenord i satsl\(:age
33 .HP \w'\fBchgpasswd\fR\ 'u
34 \fBchgpasswd\fR [\fIflaggor\fR]
39 command reads a list of group name and password pairs from standard input and uses this information to update a set of existing groups\&. Each line is of the format:
41 \fIgruppnamn\fR:\fIl\(:osenord\fR
43 By default the supplied password must be in clear\-text, and is encrypted by
46 The default encryption algorithm can be defined for the system with the ENCRYPT_METHOD variable of
47 /etc/login\&.defs, and can be overwiten with the
53 This command is intended to be used in a large system environment where many accounts are created at a single time\&.
56 Flaggorna som g\(:aller f\(:or kommandot
60 \fB\-c\fR, \fB\-\-crypt\-method\fR
62 Use the specified method to encrypt the passwords\&.
64 The available methods are DES, MD5, NONE, and SHA256 or SHA512 if your libc support these methods\&.
67 \fB\-e\fR, \fB\-\-encrypted\fR
69 Ins\(:anda l\(:osenord \(:ar i ett krypterat format\&.
72 \fB\-h\fR, \fB\-\-help\fR
74 Visa hj\(:alpmeddelande och avsluta\&.
77 \fB\-m\fR, \fB\-\-md5\fR
79 Anv\(:and MD5\-kryptering ist\(:allet f\(:or DES n\(:ar ins\(:anda l\(:osenord inte \(:ar krypterade\&.
82 \fB\-s\fR, \fB\-\-sha\-rounds\fR
84 Use the specified number of rounds to encrypt the passwords\&.
86 The value 0 means that the system will choose the default number of rounds for the crypt method (5000)\&.
88 A minimal value of 1000 and a maximal value of 999,999,999 will be enforced\&.
90 You can only use this option with the SHA256 or SHA512 crypt method\&.
92 By default, the number of rounds is defined by the SHA_CRYPT_MIN_ROUNDS and SHA_CRYPT_MAX_ROUNDS variables in
97 Kom ih\(oag att st\(:alla in r\(:attigheter eller umask f\(:or att f\(:orhindra l\(:asning av okrypterade filer f\(:or andra anv\(:andare\&.
99 You should make sure the passwords and the encryption method respect the system\*(Aqs password policy\&.
102 The following configuration variables in
104 change the behavior of this tool:
106 \fBENCRYPT_METHOD\fR (string)
108 This defines the system default encryption algorithm for encrypting passwords (if no algorithm are specified on the command line)\&.
110 It can take one of these values:
157 Note: this parameter overrides the
162 \fBMAX_MEMBERS_PER_GROUP\fR (number)
164 Maximum members per group entry\&. When the maximum is reached, a new group entry (line) is started in
166 (with the same name, same password, and same GID)\&.
168 The default value is 0, meaning that there are no limits in the number of members in a group\&.
170 This feature (split group) permits to limit the length of lines in the group file\&. This is useful to make sure that lines for NIS groups are not larger than 1024 characters\&.
172 If you need to enforce such limit, you can use 25\&.
174 Note: split groups may not be supported by all tools (even in the Shadow toolsuite)\&. You should not use this variable unless you really need it\&.
177 \fBMD5_CRYPT_ENAB\fR (boolean)
179 Indicate if passwords must be encrypted using the MD5\-based algorithm\&. If set to
180 \fIyes\fR, new passwords will be encrypted using the MD5\-based algorithm compatible with the one used by recent releases of FreeBSD\&. It supports passwords of unlimited length and longer salt strings\&. Set to
182 if you need to copy encrypted passwords to other systems which don\*(Aqt understand the new algorithm\&. Default is
185 This variable is superceded by the
187 variable or by any command line option used to configure the encryption algorithm\&.
189 This variable is deprecated\&. You should use
190 \fBENCRYPT_METHOD\fR\&.
193 \fBSHA_CRYPT_MIN_ROUNDS\fR (number), \fBSHA_CRYPT_MAX_ROUNDS\fR (number)
200 \fISHA512\fR, this defines the number of SHA rounds used by the encryption algorithm by default (when the number of rounds is not specified on the command line)\&.
202 With a lot of rounds, it is more difficult to brute forcing the password\&. But note also that more CPU resources will be needed to authenticate users\&.
204 If not specified, the libc will choose the default number of rounds (5000)\&.
206 The values must be inside the 1000\-999999999 range\&.
209 \fBSHA_CRYPT_MIN_ROUNDS\fR
211 \fBSHA_CRYPT_MAX_ROUNDS\fR
212 values is set, then this value will be used\&.
215 \fBSHA_CRYPT_MIN_ROUNDS\fR
217 \fBSHA_CRYPT_MAX_ROUNDS\fR, the highest value will be used\&.
223 Gruppkontoinformation\&.
228 S\(:aker gruppkontoinformation\&.
233 Shadow password suite configuration\&.
240 \fBlogin.defs\fR(5)\&.