1994-05-27 12:33:43 +00:00
|
|
|
.\" Copyright (c) 1980, 1990, 1993
|
|
|
|
.\" The Regents of the University of California. All rights reserved.
|
|
|
|
.\"
|
|
|
|
.\" Redistribution and use in source and binary forms, with or without
|
|
|
|
.\" modification, are permitted provided that the following conditions
|
|
|
|
.\" are met:
|
|
|
|
.\" 1. Redistributions of source code must retain the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer.
|
|
|
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer in the
|
|
|
|
.\" documentation and/or other materials provided with the distribution.
|
|
|
|
.\" 3. All advertising materials mentioning features or use of this software
|
|
|
|
.\" must display the following acknowledgement:
|
|
|
|
.\" This product includes software developed by the University of
|
|
|
|
.\" California, Berkeley and its contributors.
|
|
|
|
.\" 4. Neither the name of the University nor the names of its contributors
|
|
|
|
.\" may be used to endorse or promote products derived from this software
|
|
|
|
.\" without specific prior written permission.
|
|
|
|
.\"
|
|
|
|
.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
.\" SUCH DAMAGE.
|
|
|
|
.\"
|
1997-07-22 07:39:43 +00:00
|
|
|
.\" @(#)login.1 8.2 (Berkeley) 5/5/94
|
1999-08-28 01:08:13 +00:00
|
|
|
.\" $FreeBSD$
|
1994-05-27 12:33:43 +00:00
|
|
|
.\"
|
1997-07-22 07:39:43 +00:00
|
|
|
.Dd May 5, 1994
|
1994-05-27 12:33:43 +00:00
|
|
|
.Dt LOGIN 1
|
2001-07-10 14:16:33 +00:00
|
|
|
.Os
|
1994-05-27 12:33:43 +00:00
|
|
|
.Sh NAME
|
|
|
|
.Nm login
|
|
|
|
.Nd log into the computer
|
|
|
|
.Sh SYNOPSIS
|
1997-07-22 07:39:43 +00:00
|
|
|
.Nm
|
1994-05-27 12:33:43 +00:00
|
|
|
.Op Fl fp
|
|
|
|
.Op Fl h Ar hostname
|
|
|
|
.Op Ar user
|
|
|
|
.Sh DESCRIPTION
|
|
|
|
The
|
1997-07-22 07:39:43 +00:00
|
|
|
.Nm
|
1994-05-27 12:33:43 +00:00
|
|
|
utility logs users (and pseudo-users) into the computer system.
|
|
|
|
.Pp
|
|
|
|
If no user is specified, or if a user is specified and authentication
|
|
|
|
of the user fails,
|
1997-07-22 07:39:43 +00:00
|
|
|
.Nm
|
1994-05-27 12:33:43 +00:00
|
|
|
prompts for a user name.
|
|
|
|
Authentication of users is done via passwords.
|
|
|
|
.Pp
|
|
|
|
The options are as follows:
|
|
|
|
.Bl -tag -width Ds
|
|
|
|
.It Fl f
|
|
|
|
The
|
|
|
|
.Fl f
|
|
|
|
option is used when a user name is specified to indicate that proper
|
|
|
|
authentication has already been done and that no password need be
|
|
|
|
requested.
|
|
|
|
This option may only be used by the super-user or when an already
|
|
|
|
logged in user is logging in as themselves.
|
|
|
|
.It Fl h
|
|
|
|
The
|
|
|
|
.Fl h
|
|
|
|
option specifies the host from which the connection was received.
|
|
|
|
It is used by various daemons such as
|
|
|
|
.Xr telnetd 8 .
|
|
|
|
This option may only be used by the super-user.
|
|
|
|
.It Fl p
|
|
|
|
By default,
|
1997-07-22 07:39:43 +00:00
|
|
|
.Nm
|
1994-05-27 12:33:43 +00:00
|
|
|
discards any previous environment.
|
|
|
|
The
|
|
|
|
.Fl p
|
|
|
|
option disables this behavior.
|
|
|
|
.El
|
|
|
|
.Pp
|
|
|
|
If the file
|
1999-01-11 09:07:42 +00:00
|
|
|
.Pa /var/run/nologin
|
1994-05-27 12:33:43 +00:00
|
|
|
exists,
|
1997-07-22 07:39:43 +00:00
|
|
|
.Nm
|
1996-01-30 13:52:50 +00:00
|
|
|
displays its contents to the user and exits.
|
1994-05-27 12:33:43 +00:00
|
|
|
This is used by
|
|
|
|
.Xr shutdown 8
|
|
|
|
to prevent users from logging in when the system is about to go down.
|
|
|
|
.Pp
|
1994-08-22 19:56:14 +00:00
|
|
|
If the file
|
1996-07-03 01:20:09 +00:00
|
|
|
.Pa /etc/login.access
|
|
|
|
exists,
|
1997-07-22 07:39:43 +00:00
|
|
|
.Nm
|
1996-07-03 01:20:09 +00:00
|
|
|
checks to see if the user and host pair are specifically allowed or denied
|
|
|
|
access.
|
1997-01-22 02:45:16 +00:00
|
|
|
Login access may also be controlled via the login class, which provides
|
|
|
|
allow and deny records based on time, tty and remote host name.
|
1996-07-03 01:20:09 +00:00
|
|
|
.Pp
|
|
|
|
If the file
|
1994-08-22 19:56:14 +00:00
|
|
|
.Pa /etc/fbtab
|
|
|
|
exists,
|
1997-07-22 07:39:43 +00:00
|
|
|
.Nm
|
1994-08-22 19:56:14 +00:00
|
|
|
changes the protection and ownership of certain devices specified in this
|
|
|
|
file.
|
|
|
|
.Pp
|
1998-01-07 10:42:57 +00:00
|
|
|
If the file
|
|
|
|
.Pa /etc/skeykeys
|
2001-07-15 08:06:20 +00:00
|
|
|
exists,
|
1998-01-07 10:42:57 +00:00
|
|
|
.Nm
|
|
|
|
will offer S/key password validation if the user has an entry in the file.
|
|
|
|
.Pa /etc/skey.access
|
|
|
|
controls from which hosts and/or networks the use of S/key passwords are
|
|
|
|
obligated.
|
|
|
|
.Pp
|
1994-05-27 12:33:43 +00:00
|
|
|
Immediately after logging a user in,
|
1997-07-22 07:39:43 +00:00
|
|
|
.Nm
|
1994-05-27 12:33:43 +00:00
|
|
|
displays the system copyright notice, the date and time the user last
|
|
|
|
logged in, the message of the day as well as other information.
|
|
|
|
If the file
|
|
|
|
.Dq Pa .hushlogin
|
|
|
|
exists in the user's home directory, all of these messages are suppressed.
|
|
|
|
This is to simplify logins for non-human users, such as
|
|
|
|
.Xr uucp 1 .
|
|
|
|
.Nm Login
|
|
|
|
then records an entry in the
|
|
|
|
.Xr wtmp 5
|
|
|
|
and
|
|
|
|
.Xr utmp 5
|
1997-07-22 07:39:43 +00:00
|
|
|
files and executes the user's command interpreter.
|
1994-05-27 12:33:43 +00:00
|
|
|
.Pp
|
1997-07-22 07:39:43 +00:00
|
|
|
.Nm Login
|
|
|
|
enters information into the environment (see
|
1994-05-27 12:33:43 +00:00
|
|
|
.Xr environ 7 )
|
|
|
|
specifying the user's home directory (HOME), command interpreter (SHELL),
|
|
|
|
search path (PATH), terminal type (TERM) and user name (both LOGNAME and
|
|
|
|
USER).
|
1997-01-22 02:45:16 +00:00
|
|
|
Other environment variables may be set due to entries in the login
|
|
|
|
class capabilities database, for the login class assigned in the
|
|
|
|
user's system passwd record.
|
|
|
|
The login class also controls the maximum and current process resource
|
|
|
|
limits granted to a login, process priorities and many other aspects of
|
|
|
|
a user's login environment.
|
1994-05-27 12:33:43 +00:00
|
|
|
.Pp
|
1999-09-08 15:40:46 +00:00
|
|
|
Some shells may provide a builtin
|
1997-07-22 07:39:43 +00:00
|
|
|
.Nm
|
1999-09-14 11:46:04 +00:00
|
|
|
command which is similar or identical to this utility.
|
|
|
|
Consult the
|
1999-09-08 15:40:46 +00:00
|
|
|
.Xr builtin 1
|
|
|
|
manual page.
|
1994-05-27 12:33:43 +00:00
|
|
|
.Sh FILES
|
|
|
|
.Bl -tag -width /var/mail/userXXX -compact
|
1994-08-22 19:56:14 +00:00
|
|
|
.It Pa /etc/fbtab
|
|
|
|
changes device protections
|
1998-01-07 10:42:57 +00:00
|
|
|
.It Pa /etc/login.access
|
|
|
|
login access control table
|
1997-01-22 02:45:16 +00:00
|
|
|
.It Pa /etc/login.conf
|
|
|
|
login class capabilities database
|
1994-05-27 12:33:43 +00:00
|
|
|
.It Pa /etc/motd
|
|
|
|
message-of-the-day
|
1999-01-11 09:07:42 +00:00
|
|
|
.It Pa /var/run/nologin
|
1994-05-27 12:33:43 +00:00
|
|
|
disallows logins
|
1998-01-07 10:42:57 +00:00
|
|
|
.It Pa /etc/skey.access
|
|
|
|
skey password control table
|
|
|
|
.It Pa /etc/skeykeys
|
|
|
|
skey password database
|
1994-05-27 12:33:43 +00:00
|
|
|
.It Pa /var/run/utmp
|
|
|
|
current logins
|
1997-07-22 07:39:43 +00:00
|
|
|
.It Pa /var/log/lastlog
|
|
|
|
last login account records
|
1994-05-27 12:33:43 +00:00
|
|
|
.It Pa /var/log/wtmp
|
|
|
|
login account records
|
|
|
|
.It Pa /var/mail/user
|
|
|
|
system mailboxes
|
|
|
|
.It Pa \&.hushlogin
|
|
|
|
makes login quieter
|
1998-10-09 06:38:33 +00:00
|
|
|
.It Pa /etc/auth.conf
|
|
|
|
configure authentication services
|
2001-03-27 19:40:51 +00:00
|
|
|
.It Pa /etc/pam.conf
|
|
|
|
if
|
|
|
|
.Nm
|
|
|
|
is configured with PAM support, it uses
|
|
|
|
.Pa /etc/pam.conf
|
|
|
|
entries with service name
|
|
|
|
.Dq login
|
1994-05-27 12:33:43 +00:00
|
|
|
.El
|
|
|
|
.Sh SEE ALSO
|
1999-09-08 15:40:46 +00:00
|
|
|
.Xr builtin 1 ,
|
1994-05-27 12:33:43 +00:00
|
|
|
.Xr chpass 1 ,
|
1999-09-08 15:40:46 +00:00
|
|
|
.Xr csh 1 ,
|
1994-05-27 12:33:43 +00:00
|
|
|
.Xr passwd 1 ,
|
|
|
|
.Xr rlogin 1 ,
|
1998-01-07 10:42:57 +00:00
|
|
|
.Xr skey 1 ,
|
1994-05-27 12:33:43 +00:00
|
|
|
.Xr getpass 3 ,
|
1994-08-22 19:56:14 +00:00
|
|
|
.Xr fbtab 5 ,
|
1996-07-03 01:20:09 +00:00
|
|
|
.Xr login.access 5 ,
|
1997-01-22 02:45:16 +00:00
|
|
|
.Xr login.conf 5 ,
|
1999-02-01 21:04:15 +00:00
|
|
|
.Xr nologin 5 ,
|
1998-01-07 10:42:57 +00:00
|
|
|
.Xr skey.access 5 ,
|
1994-05-27 12:33:43 +00:00
|
|
|
.Xr utmp 5 ,
|
1996-12-23 23:09:55 +00:00
|
|
|
.Xr environ 7 ,
|
1998-12-01 17:05:08 +00:00
|
|
|
.Xr nologin 8 ,
|
|
|
|
.Xr pam 8
|
1994-05-27 12:33:43 +00:00
|
|
|
.Sh HISTORY
|
|
|
|
A
|
1997-07-22 07:39:43 +00:00
|
|
|
.Nm
|
|
|
|
utility appeared in
|
1994-05-27 12:33:43 +00:00
|
|
|
.At v6 .
|