| # | |
| # /etc/login.defs - Configuration control definitions for the login package. | |
| # | |
| # Three items must be defined: MAIL_DIR, ENV_SUPATH, and ENV_PATH. | |
| # If unspecified, some arbitrary (and possibly incorrect) value will | |
| # be assumed. All other items are optional - if not specified then | |
| # the described action or option will be inhibited. | |
| # | |
| # Comment lines (lines beginning with "#") and blank lines are ignored. | |
| # | |
| # Modified for Linux. --marekm | |
| # REQUIRED for useradd/userdel/usermod | |
| # Directory where mailboxes reside, _or_ name of file, relative to the | |
| # home directory. If you _do_ define MAIL_DIR and MAIL_FILE, | |
| # MAIL_DIR takes precedence. | |
| # | |
| # Essentially: | |
| # - MAIL_DIR defines the location of users mail spool files | |
| # (for mbox use) by appending the username to MAIL_DIR as defined | |
| # below. | |
| # - MAIL_FILE defines the location of the users mail spool files as the | |
| # fully-qualified filename obtained by prepending the user home | |
| # directory before $MAIL_FILE | |
| # | |
| # NOTE: This is no more used for setting up users MAIL environment variable | |
| # which is, starting from shadow 4.0.12-1 in Debian, entirely the | |
| # job of the pam_mail PAM modules | |
| # See default PAM configuration files provided for | |
| # login, su, etc. | |
| # | |
| # This is a temporary situation: setting these variables will soon | |
| # move to /etc/default/useradd and the variables will then be | |
| # no more supported | |
| MAIL_DIR /var/mail | |
| #MAIL_FILE .mail | |
| # | |
| # Enable logging and display of /var/log/faillog login failure info. | |
| # This option conflicts with the pam_tally PAM module. | |
| # | |
| FAILLOG_ENAB yes | |
| # | |
| # Enable display of unknown usernames when login failures are recorded. | |
| # | |
| # WARNING: Unknown usernames may become world readable. | |
| # See #290803 and #298773 for details about how this could become a security | |
| # concern | |
| LOG_UNKFAIL_ENAB no | |
| # | |
| # Enable logging of successful logins | |
| # | |
| LOG_OK_LOGINS no | |
| # | |
| # Enable "syslog" logging of su activity - in addition to sulog file logging. | |
| # SYSLOG_SG_ENAB does the same for newgrp and sg. | |
| # | |
| SYSLOG_SU_ENAB yes | |
| SYSLOG_SG_ENAB yes | |
| # | |
| # If defined, all su activity is logged to this file. | |
| # | |
| #SULOG_FILE /var/log/sulog | |
| # | |
| # If defined, file which maps tty line to TERM environment parameter. | |
| # Each line of the file is in a format something like "vt100 tty01". | |
| # | |
| #TTYTYPE_FILE /etc/ttytype | |
| # | |
| # If defined, login failures will be logged here in a utmp format | |
| # last, when invoked as lastb, will read /var/log/btmp, so... | |
| # | |
| FTMP_FILE /var/log/btmp | |
| # | |
| # If defined, the command name to display when running "su -". For | |
| # example, if this is defined as "su" then a "ps" will display the | |
| # command is "-su". If not defined, then "ps" would display the | |
| # name of the shell actually being run, e.g. something like "-sh". | |
| # | |
| SU_NAME su | |
| # | |
| # If defined, file which inhibits all the usual chatter during the login | |
| # sequence. If a full pathname, then hushed mode will be enabled if the | |
| # user's name or shell are found in the file. If not a full pathname, then | |
| # hushed mode will be enabled if the file exists in the user's home directory. | |
| # | |
| HUSHLOGIN_FILE .hushlogin | |
| #HUSHLOGIN_FILE /etc/hushlogins | |
| # | |
| # *REQUIRED* The default PATH settings, for superuser and normal users. | |
| # | |
| # (they are minimal, add the rest in the shell startup files) | |
| ENV_SUPATH PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin | |
| ENV_PATH PATH=/usr/local/bin:/usr/bin:/bin:/usr/local/games:/usr/games | |
| # | |
| # Terminal permissions | |
| # | |
| # TTYGROUP Login tty will be assigned this group ownership. | |
| # TTYPERM Login tty will be set to this permission. | |
| # | |
| # If you have a "write" program which is "setgid" to a special group | |
| # which owns the terminals, define TTYGROUP to the group number and | |
| # TTYPERM to 0620. Otherwise leave TTYGROUP commented out and assign | |
| # TTYPERM to either 622 or 600. | |
| # | |
| # In Debian /usr/bin/bsd-write or similar programs are setgid tty | |
| # However, the default and recommended value for TTYPERM is still 0600 | |
| # to not allow anyone to write to anyone else console or terminal | |
| # Users can still allow other people to write them by issuing | |
| # the "mesg y" command. | |
| TTYGROUP tty | |
| TTYPERM 0600 | |
| # | |
| # Login configuration initializations: | |
| # | |
| # ERASECHAR Terminal ERASE character ('\010' = backspace). | |
| # KILLCHAR Terminal KILL character ('\025' = CTRL/U). | |
| # UMASK Default "umask" value. | |
| # | |
| # The ERASECHAR and KILLCHAR are used only on System V machines. | |
| # | |
| # UMASK is the default umask value for pam_umask and is used by | |
| # useradd and newusers to set the mode of the new home directories. | |
| # 022 is the "historical" value in Debian for UMASK | |
| # 027, or even 077, could be considered better for privacy | |
| # There is no One True Answer here : each sysadmin must make up his/her | |
| # mind. | |
| # | |
| # If USERGROUPS_ENAB is set to "yes", that will modify this UMASK default value | |
| # for private user groups, i. e. the uid is the same as gid, and username is | |
| # the same as the primary group name: for these, the user permissions will be | |
| # used as group permissions, e. g. 022 will become 002. | |
| # | |
| # Prefix these values with "0" to get octal, "0x" to get hexadecimal. | |
| # | |
| ERASECHAR 0177 | |
| KILLCHAR 025 | |
| UMASK 022 | |
| # | |
| # Password aging controls: | |
| # | |
| # PASS_MAX_DAYS Maximum number of days a password may be used. | |
| # PASS_MIN_DAYS Minimum number of days allowed between password changes. | |
| # PASS_WARN_AGE Number of days warning given before a password expires. | |
| # | |
| PASS_MAX_DAYS 99999 | |
| PASS_MIN_DAYS 0 | |
| PASS_WARN_AGE 7 | |
| # | |
| # Min/max values for automatic uid selection in useradd | |
| # | |
| UID_MIN 1000 | |
| UID_MAX 60000 | |
| # System accounts | |
| #SYS_UID_MIN 100 | |
| #SYS_UID_MAX 999 | |
| # | |
| # Min/max values for automatic gid selection in groupadd | |
| # | |
| GID_MIN 1000 | |
| GID_MAX 60000 | |
| # System accounts | |
| #SYS_GID_MIN 100 | |
| #SYS_GID_MAX 999 | |
| # | |
| # Max number of login retries if password is bad. This will most likely be | |
| # overriden by PAM, since the default pam_unix module has it's own built | |
| # in of 3 retries. However, this is a safe fallback in case you are using | |
| # an authentication module that does not enforce PAM_MAXTRIES. | |
| # | |
| LOGIN_RETRIES 5 | |
| # | |
| # Max time in seconds for login | |
| # | |
| LOGIN_TIMEOUT 60 | |
| # | |
| # Which fields may be changed by regular users using chfn - use | |
| # any combination of letters "frwh" (full name, room number, work | |
| # phone, home phone). If not defined, no changes are allowed. | |
| # For backward compatibility, "yes" = "rwh" and "no" = "frwh". | |
| # | |
| CHFN_RESTRICT rwh | |
| # | |
| # Should login be allowed if we can't cd to the home directory? | |
| # Default in no. | |
| # | |
| DEFAULT_HOME yes | |
| # | |
| # If defined, this command is run when removing a user. | |
| # It should remove any at/cron/print jobs etc. owned by | |
| # the user to be removed (passed as the first argument). | |
| # | |
| #USERDEL_CMD /usr/sbin/userdel_local | |
| # | |
| # Enable setting of the umask group bits to be the same as owner bits | |
| # (examples: 022 -> 002, 077 -> 007) for non-root users, if the uid is | |
| # the same as gid, and username is the same as the primary group name. | |
| # | |
| # If set to yes, userdel will remove the user's group if it contains no | |
| # more members, and useradd will create by default a group with the name | |
| # of the user. | |
| # | |
| USERGROUPS_ENAB yes | |
| # | |
| # Instead of the real user shell, the program specified by this parameter | |
| # will be launched, although its visible name (argv[0]) will be the shell's. | |
| # The program may do whatever it wants (logging, additional authentification, | |
| # banner, ...) before running the actual shell. | |
| # | |
| # FAKE_SHELL /bin/fakeshell | |
| # | |
| # If defined, either full pathname of a file containing device names or | |
| # a ":" delimited list of device names. Root logins will be allowed only | |
| # upon these devices. | |
| # | |
| # This variable is used by login and su. | |
| # | |
| #CONSOLE /etc/consoles | |
| #CONSOLE console:tty01:tty02:tty03:tty04 | |
| # | |
| # List of groups to add to the user's supplementary group set | |
| # when logging in on the console (as determined by the CONSOLE | |
| # setting). Default is none. | |
| # | |
| # Use with caution - it is possible for users to gain permanent | |
| # access to these groups, even when not logged in on the console. | |
| # How to do it is left as an exercise for the reader... | |
| # | |
| # This variable is used by login and su. | |
| # | |
| #CONSOLE_GROUPS floppy:audio:cdrom | |
| # | |
| # If set to "yes", new passwords will be encrypted using the MD5-based | |
| # algorithm compatible with the one used by recent releases of FreeBSD. | |
| # It supports passwords of unlimited length and longer salt strings. | |
| # Set to "no" if you need to copy encrypted passwords to other systems | |
| # which don't understand the new algorithm. Default is "no". | |
| # | |
| # This variable is deprecated. You should use ENCRYPT_METHOD. | |
| # | |
| #MD5_CRYPT_ENAB no | |
| # | |
| # If set to MD5 , MD5-based algorithm will be used for encrypting password | |
| # If set to SHA256, SHA256-based algorithm will be used for encrypting password | |
| # If set to SHA512, SHA512-based algorithm will be used for encrypting password | |
| # If set to DES, DES-based algorithm will be used for encrypting password (default) | |
| # Overrides the MD5_CRYPT_ENAB option | |
| # | |
| # Note: It is recommended to use a value consistent with | |
| # the PAM modules configuration. | |
| # | |
| ENCRYPT_METHOD SHA512 | |
| # | |
| # Only used if ENCRYPT_METHOD is set to SHA256 or SHA512. | |
| # | |
| # Define the number of SHA rounds. | |
| # With a lot of rounds, it is more difficult to brute forcing the password. | |
| # But note also that it more CPU resources will be needed to authenticate | |
| # users. | |
| # | |
| # If not specified, the libc will choose the default number of rounds (5000). | |
| # The values must be inside the 1000-999999999 range. | |
| # If only one of the MIN or MAX values is set, then this value will be used. | |
| # If MIN > MAX, the highest value will be used. | |
| # | |
| # SHA_CRYPT_MIN_ROUNDS 5000 | |
| # SHA_CRYPT_MAX_ROUNDS 5000 | |
| ################# OBSOLETED BY PAM ############## | |
| # # | |
| # These options are now handled by PAM. Please # | |
| # edit the appropriate file in /etc/pam.d/ to # | |
| # enable the equivelants of them. | |
| # | |
| ############### | |
| #MOTD_FILE | |
| #DIALUPS_CHECK_ENAB | |
| #LASTLOG_ENAB | |
| #MAIL_CHECK_ENAB | |
| #OBSCURE_CHECKS_ENAB | |
| #PORTTIME_CHECKS_ENAB | |
| #SU_WHEEL_ONLY | |
| #CRACKLIB_DICTPATH | |
| #PASS_CHANGE_TRIES | |
| #PASS_ALWAYS_WARN | |
| #ENVIRON_FILE | |
| #NOLOGINS_FILE | |
| #ISSUE_FILE | |
| #PASS_MIN_LEN | |
| #PASS_MAX_LEN | |
| #ULIMIT | |
| #ENV_HZ | |
| #CHFN_AUTH | |
| #CHSH_AUTH | |
| #FAIL_DELAY | |
| ################# OBSOLETED ####################### | |
| # # | |
| # These options are no more handled by shadow. # | |
| # # | |
| # Shadow utilities will display a warning if they # | |
| # still appear. # | |
| # # | |
| ################################################### | |
| # CLOSE_SESSIONS | |
| # LOGIN_STRING | |
| # NO_PASSWORD_CONSOLE | |
| # QMAIL_DIR | |