Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

passwd(1) [ultrix man page]

passwd(1)						      General Commands Manual							 passwd(1)

       passwd - create or change password

       passwd [-aefs] [name]

       The  command  lets you or the superuser change your password.  When you enter the command, the program prompts you for the old password and
       then for the new password.  Next, the program asks you for the new password again, to verify that you have typed it correctly.	Note  that
       the passwords are not displayed on the screen.

       Your  new password must meet the length requirements specified by the superuser.  To review these requirements, refer to the file. (This is
       a read-only file.)

       If your system is running with increased security, you may have to choose a password from a list of randomly generated  passwords,  or  you
       may  need  authorization  to  change your password.  At higher security levels, you may be prohibited from changing your password until its
       minimum lifetime has expired, as specified in the Authorization Database.

       If you are running the BIND/Hesiod service, your password will be updated automatically on the server.

       -a   Supply a list of randomly generated passwords.  (See the Examples section.)

       -e   Use an extended protocol when communicating with a prompter program.  As a result, the standard input and output (used by is  sent	to
	    this program.

       -f   Change the finger information, not the password. The finger program provides information about current ULTRIX users, such as login and
	    terminal name, idle time and office location.

       -s   Change the login shell of the password file, not the password entry.

       If you use a hardcopy terminal, you must destroy all print outs of valid passwords.

       The following example illustrates the -a option, which displays a list of randomly generated passwords and  their  suggested  pronunciation
       with hyphens.  The hyphens delineate the syllables of the passwords:
       passwd -a abcd
       Changing password for abcd

       Here are some suggested passwords:

       ryegd	       ryeg-di
       aswurku	       a-swurk-u
       ryedok	       ryed-ok
       teleccs	       tel-ec-cos
       wahislas        wa-hi-slas

       Enter new password:

       Password must be at least 6 characters long, password unchanged
	    Your password does not meet the minimum length requirement specified in

       Warning: Only the first 8 characters of the password are significant
	    Your password exceeds the maximum length requirement specified in

       Permission denied
	    You do not have the privilege to change your password. The minimum lifetime has not expired.

       Password is not different enough, unchanged
	    Your new password must be different from your old password.

       Password must be different than logname, and not resemble previous password
	    Your new password must be different from your login name.

       Verification failed, password unchanged
	    You misspelled the verification of your new password.

       Password file

       Authorization data base directory

       Authorization data base page

       Data base service selection and security configuration file
			   Only the superuser and members of the group can access the and files.

See Also
       chfn(1), chsh(1), finger(1), login(1), shexp(1), yppasswd(1yp), passwd(5yp), edauth(8), vipw(8)
       Guide to System Environment Setup
       Security Guide for Users
       Security Guide for Administrators
       "Password Security: A Case History", Supplementary Documents, Volume 3: System Manager


Check Out this Related Man Page

passwd(5)							File Formats Manual							 passwd(5)

       passwd - password file

       The file is an ASCII file that contains the following information for each user:

	      Login name
	      Password field
	      User ID
	      Group ID
	      User's real name, office, extension, home phone
	      Initial working directory
	      Program to use as Shell

       Each  line  in the file represents a user entry.  Each field within a user entry is separated from the next by a colon.	Each user entry is
       separated from the next by a new line.  If the password field is null, no password is demanded; if the Shell field is null, then is used.

       This file resides in directory Because the password, if present, is encrypted, the file has general read permission and can  be	used,  for
       example, to map user IDs to names.

       The  ``user's  real name'' can contain an ampersand (&), meaning insert the login name.	This information is set by the command and used by
       the command.

       Appropriate precautions must be taken to lock the file against changes if it is to be edited with a text editor.  The command does the nec-
       essary locking.

       If  the system is running UPGRADE security level and an asterisk appears in the password field, or if the system is running ENHANCED level,
       then the content of the password field is ignored and the password for the account is located in the authentication database. See  and  the
       Security Guide for Administrators for more information.

       The  files  and	if they exist, contain the hashed version of the file.	If present, they are used by the and functions to retrieve entries
       rapidly.  See for more information.

       The database can be distributed in a network by a naming service, such as Yellow Pages or BIND/Hesiod.  See the Guide to the  Yellow  Pages
       Service or the Guide to the BIND/Hesiod Service for setup information.

       The ``name'' can contain only lowercase ASCII characters a to z and the numbers 0 to 9.

See Also
       chfn(1), finger(1), login(1), passwd(1), crypt(3), getpwent(3), auth(5), group(5), adduser(8), mkpasswd(8), vipw(8)
       Guide to the BIND/Hesiod Service
       Guide to the Yellow Pages Service
       Security Guide for Administrators

Man Page