1
0

passwd 2.0 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374
  1. .TH PASSWD 1
  2. .SH NAME
  3. passwd, netkey, iam \- change user password
  4. .SH SYNOPSIS
  5. .B passwd
  6. [
  7. .I username\fR[@\fPdomain\fR]\fP
  8. ]
  9. .PP
  10. .B netkey
  11. .PP
  12. .B auth/iam
  13. [
  14. .I username
  15. ]
  16. .SH DESCRIPTION
  17. .I Passwd
  18. changes the invoker's Plan 9 password and/or APOP secret.
  19. The Plan 9 password is used to login to a terminal while
  20. the APOP secret is used for a number of external services:
  21. POP3, IMAP, and VPN access. The optional argument specifies
  22. the user name and authentication domain to use if different
  23. than the one associated with the machine
  24. .I passwd
  25. is run on.
  26. .PP
  27. The program first prompts for the old Plan 9 password in the specified
  28. domain to establish
  29. identity.
  30. It then prompts for changes to the password and the
  31. secret.
  32. New passwords and secrets must be typed twice, to forestall mistakes.
  33. New passwords must be sufficiently hard to guess.
  34. They may be of any length greater than seven characters.
  35. .PP
  36. .I Netkey
  37. uses the password to encrypt network challenges.
  38. It is a substitute for a SecureNet box.
  39. .PP
  40. These commands may be run only on a terminal, to avoid
  41. transmitting clear text passwords over the network.
  42. .PP
  43. .I Auth/iam
  44. can be run only by the the host owner (the user specified as the contents of
  45. .BR /dev/hostower ).
  46. With it both the identity and password of the host owner may
  47. be changed. For example, if start a terminal and log in as
  48. .LR tor ,
  49. you may later change identity to
  50. .LR supertor .
  51. If the host owner changes, all processes running as the host owner
  52. also change their identity to the new user id.
  53. .PP
  54. Without an argument,
  55. .I Auth/iam
  56. just sets the password of the host owner.
  57. This can be used on machines like the Bitsy which have no
  58. possibility of user input until the bootstrap procedure has already
  59. started a number of processes.
  60. .SH FILES
  61. .B /dev/key
  62. .SH SOURCE
  63. .B /sys/src/cmd/auth/passwd.c
  64. .br
  65. .B /sys/src/cmd/auth/netkey.c
  66. .SH "SEE ALSO"
  67. .IR encrypt (2),
  68. .IR cons (3),
  69. .IR securenet (8)
  70. .PP
  71. Robert Morris and Ken Thompson,
  72. ``UNIX Password Security,''
  73. .I AT&T Bell Laboratories Technical Journal
  74. Vol 63 (1984), pp. 1649-1672