summaryrefslogtreecommitdiff
path: root/sys/man/1/passwd
diff options
context:
space:
mode:
authorTaru Karttunen <taruti@taruti.net>2011-03-30 16:49:47 +0300
committerTaru Karttunen <taruti@taruti.net>2011-03-30 16:49:47 +0300
commitb41b9034225ab3e49980d9de55c141011b6383b0 (patch)
tree891014b4c2e803e01ac7a1fd2b60819fbc5a6e73 /sys/man/1/passwd
parentc558a99e0be506a9abdf677f0ca4490644e05fc1 (diff)
Import sources from 2011-03-30 iso image - sys/man
Diffstat (limited to 'sys/man/1/passwd')
-rwxr-xr-xsys/man/1/passwd59
1 files changed, 59 insertions, 0 deletions
diff --git a/sys/man/1/passwd b/sys/man/1/passwd
new file mode 100755
index 000000000..d15461e3b
--- /dev/null
+++ b/sys/man/1/passwd
@@ -0,0 +1,59 @@
+.TH PASSWD 1
+.SH NAME
+passwd, netkey \- change or verify user password
+.SH SYNOPSIS
+.B passwd
+[
+.IR username [@ domain ]
+]
+.PP
+.B netkey
+.SH DESCRIPTION
+.I Passwd
+changes the invoker's Plan 9 password and/or APOP secret.
+The Plan 9 password is used to login to a terminal while
+the APOP secret is used for a number of external services:
+POP3, IMAP, and VPN access. The optional argument specifies
+the user name and authentication domain to use if different
+than the one associated with the machine
+.I passwd
+is run on.
+.PP
+The program first prompts for the old Plan 9 password in the specified
+domain to establish
+identity.
+It then prompts for changes to the password and the
+secret.
+New passwords and secrets must be typed twice, to forestall mistakes.
+New passwords must be sufficiently hard to guess.
+They may be of any length greater than seven characters.
+.PP
+.I Netkey
+prompts for a password to encrypt network challenges.
+It is a substitute for a SecureNet box.
+.PP
+These commands may be run only on a terminal, to avoid
+transmitting clear text passwords over the network.
+.SH SOURCE
+.B /sys/src/cmd/auth/passwd.c
+.br
+.B /sys/src/cmd/auth/netkey.c
+.SH "SEE ALSO"
+.I readnvram
+in
+.IR authsrv (2),
+.IR encrypt (2),
+.IR cons (3),
+.IR auth (8),
+.IR securenet (8)
+.PP
+Robert Morris and Ken Thompson,
+``UNIX Password Security,''
+.I AT&T Bell Laboratories Technical Journal
+Vol 63 (1984), pp. 1649-1672
+.SH BUGS
+Now that
+.I cpu
+connections are always encrypted, the only good reason
+to require that these commands be run only on terminals
+is concern that the CPU server might be subverted.