]> granicus.if.org Git - shadow/commitdiff
Document the variables used by chpasswd. The definitions are copied from
authornekral-guest <nekral-guest@5a98b0ae-9ef6-0310-add3-de5d479b70d7>
Fri, 23 Nov 2007 19:58:10 +0000 (19:58 +0000)
committernekral-guest <nekral-guest@5a98b0ae-9ef6-0310-add3-de5d479b70d7>
Fri, 23 Nov 2007 19:58:10 +0000 (19:58 +0000)
login.defs. I should try to use a less error prone process for this.

ChangeLog
man/chpasswd.8.xml

index 8c5d018bf091f77f3fbb38bf95451748ce22f53a..210fe5ae68a772f8c66f27e25e55d491d17f0911 100644 (file)
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,9 @@
+2007-11-22  Nicolas François  <nicolas.francois@centraliens.net>
+
+       * man/chpasswd.8.xml: Document the variables used by chpasswd.
+       The definitions are copied from login.defs. I should try to use a
+       less error prone process for this.
+
 2007-11-22  Nicolas François  <nicolas.francois@centraliens.net>
 
        * man/login.defs.5.xml: Use <replaceable> for the values set by
index 8a3e8afd3bb2222b93713170b3d9e88fd4108b26..594731357cd52b0b06ad02ebd9d6c8ae9790c184 100644 (file)
     </para>
   </refsect1>
 
+  <refsect1 id='configuration'>
+    <title>CONFIGURATION</title>
+    <para>
+      The following configuration variables in
+      <filename>/etc/login.defs</filename> change the behavior of this
+      tool:
+    </para>
+    <!--********************************************************************
+      **                                                                  **
+      **             Definitions copied from login.def.5.xml              **
+      **                                                                  **
+      ********************************************************************-->
+    <variablelist>
+      <varlistentry>
+       <term><option>MD5_CRYPT_ENAB</option> (boolean)</term>
+       <listitem>
+         <para>
+           Indicate if passwords must be encrypted using the MD5-based
+           algorithm. If set to <replaceable>yes</replaceable>, new
+           passwords will be encrypted
+           using the MD5-based algorithm compatible with the one used by
+           recent releases of FreeBSD. It supports passwords of
+           unlimited length and longer salt strings. Set to
+           <replaceable>no</replaceable> if you
+           need to copy encrypted passwords to other systems which don't
+           understand the new algorithm. Default is
+           <replaceable>no</replaceable>.
+         </para>
+         <para>
+           This variable is superceded by the
+           <option>ENCRYPT_METHOD</option> variable or by any command
+           line option.
+         </para>
+         <para>
+          This variable is deprecated. You should use
+          <option>ENCRYPT_METHOD</option>.
+         </para>
+         <para>
+           Note: if you use PAM, it is recommended to set this variable
+           consistently with the PAM modules configuration.
+         </para>
+       </listitem>
+      </varlistentry>
+      <varlistentry>
+       <term><option>ENCRYPT_METHOD</option> (string)</term>
+       <listitem>
+         <para>
+           This defines the system default encryption algorithm for
+           encrypting passwords (if no algorithm are specified on the
+           command line).
+         </para>
+         <para>
+           It can take one of these values:
+           <itemizedlist>
+             <listitem>
+               <para><replaceable>DES</replaceable> (default)</para>
+             </listitem>
+             <listitem>
+               <para><replaceable>MD5</replaceable></para>
+             </listitem>
+             <listitem>
+               <para><replaceable>SHA256</replaceable></para>
+             </listitem>
+             <listitem>
+               <para><replaceable>SHA512</replaceable></para>
+             </listitem>
+           </itemizedlist>
+         </para>
+         <para>
+           Note: this parameter overrides the
+           <option>MD5_CRYPT_ENAB</option> variable.
+         </para>
+         <para>
+           Note: if you use PAM, it is recommended to set this variable
+           consistently with the PAM modules configuration.
+         </para>
+       </listitem>
+      </varlistentry>
+      <varlistentry>
+       <term><option>SHA_CRYPT_MIN_ROUNDS</option> (number)</term>
+       <term><option>SHA_CRYPT_MAX_ROUNDS</option> (number)</term>
+       <listitem>
+         <para>
+           When <option>ENCRYPT_METHOD</option> is set to
+           <replaceable>SHA256</replaceable> or
+           <replaceable>SHA512</replaceable>, this defines the number of
+           SHA rounds used by the encryption algorithm by default (when
+           the number of rounds is not specified on the command line).
+         </para>
+         <para>
+           With a lot of rounds, it is more difficult to brute forcing
+           the password. But note also that more CPU resources will be
+           needed to authenticate users.
+         </para>
+         <para>
+           If not specified, the libc will choose the default number of
+           rounds (5000).
+         </para>
+         <para>
+           The values must be inside the 1000-999999999 range.
+         </para>
+         <para>
+           If only one of the <option>SHA_CRYPT_MIN_ROUNDS</option> or
+           <option>SHA_CRYPT_MAX_ROUNDS</option> values is set, then this
+           value will be used.
+         </para>
+         <para>
+           If <option>SHA_CRYPT_MIN_ROUNDS</option> &gt;
+           <option>SHA_CRYPT_MAX_ROUNDS</option>, the highest value will
+           be used.
+         </para>
+       </listitem>
+      </varlistentry>
+    </variablelist>
+  </refsect1>
+
   <refsect1 id='files'>
     <title>FILES</title>
     <variablelist>