1 .\" $NetBSD: login.conf.5,v 1.22 2008/11/18 13:04:04 reed Exp $
3 .\" Copyright (c) 1995,1996,1997 Berkeley Software Design, Inc.
4 .\" All rights reserved.
6 .\" Redistribution and use in source and binary forms, with or without
7 .\" modification, are permitted provided that the following conditions
9 .\" 1. Redistributions of source code must retain the above copyright
10 .\" notice, this list of conditions and the following disclaimer.
11 .\" 2. Redistributions in binary form must reproduce the above copyright
12 .\" notice, this list of conditions and the following disclaimer in the
13 .\" documentation and/or other materials provided with the distribution.
14 .\" 3. All advertising materials mentioning features or use of this software
15 .\" must display the following acknowledgement:
16 .\" This product includes software developed by Berkeley Software Design,
18 .\" 4. The name of Berkeley Software Design, Inc. may not be used to endorse
19 .\" or promote products derived from this software without specific prior
20 .\" written permission.
22 .\" THIS SOFTWARE IS PROVIDED BY BERKELEY SOFTWARE DESIGN, INC. ``AS IS'' AND
23 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 .\" ARE DISCLAIMED. IN NO EVENT SHALL BERKELEY SOFTWARE DESIGN, INC. BE LIABLE
26 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 .\" BSDI login.conf.5,v 2.19 1998/02/19 23:39:39 prb Exp
41 .Nd login class capability data base
47 file describes the various attributes of login classes.
48 A login class determines what styles of authentication are available
49 as well as session resource limits and environment setup.
50 While designed primarily for the
53 it is also used by other programs, e.g.,
55 which need to set up a user environment.
57 The class to be used is normally determined by the
59 field in the password file (see
61 The class is used to look up a corresponding entry in the
64 A special class called
66 will be used (if it exists) if the field in the password file is empty.
70 for a description of the file layout.
72 .Bd -literal -offset indent
73 classname|Description entry:\\
77 :lastcapability=value:
82 file are either boolean or use a `=' to separate the capability
84 The types are described after the capability table.
85 .Bl -column minpasswordlen program default
86 .It Sy Name Type Default Description
89 .It Sy copyright Ta file Ta "" Ta
90 File containing additional copyright information.
93 displays it before the welcome message.)
96 .It Sy coredumpsize Ta size Ta "" Ta
97 Maximum coredump size limit.
100 .It Sy cputime Ta time Ta "" Ta
104 .It Sy datasize Ta size Ta "" Ta
105 Maximum data size limit.
108 .It Sy filesize Ta size Ta "" Ta
109 Maximum file size limit.
112 .It Sy host.allow Ta string Ta "" Ta
113 A comma-separated list of host name or IP address patterns
114 from which a class is allowed access.
115 Access is instead denied from any hosts preceded
118 Patterns can contain the
126 entry is checked before
128 (Currently used only by
132 .It Sy host.deny Ta string Ta "" Ta
133 A comma-separated list of host name or IP address patterns
134 from which a class is denied access.
137 although a matched pattern that has been negated with
140 (Currently used only by
144 .It Sy hushlogin Ta bool Ta Li false Ta
152 .It Sy ignorenologin Ta bool Ta Li false Ta
158 .It Sy login-retries Ta number Ta 10 Ta
159 Maximum number of login attempts allowed.
162 .It Sy login-backoff Ta number Ta 3 Ta
163 Number of login attempts after which to start random back-off.
166 .It Sy maxproc Ta number Ta "" Ta
167 Maximum number of process.
170 .It Sy memorylocked Ta size Ta "" Ta
171 Maximum locked in core memory size limit.
174 .It Sy memoryuse Ta size Ta "" Ta
175 Maximum in core memoryuse size limit.
178 .It Sy minpasswordlen Ta number Ta "" Ta
179 The minimum length a local password may be.
185 .It Sy nologin Ta file Ta "" Ta
186 If the file exists it will be displayed
187 and the login session will be terminated.
190 .It Sy openfiles Ta number Ta "" Ta
191 Maximum number of open file descriptors per process.
194 .\"XX .It Sy password-dead Ta time Ta Li 0 Ta
195 .\"XX Length of time a password may be expired but not quite dead yet.
196 .\"XX When set (for both the client and remote server machine when doing
197 .\"XX remote authentication), a user is allowed to log in just one more
198 .\"XX time after their password (but not account) has expired. This allows
199 .\"XX a grace period for updating their password.
202 .It Sy passwordtime Ta time Ta "" Ta
205 to set next password expiry date.
208 .It Sy password-warn Ta time Ta Li 2w Ta
209 If the user's password will expire within this length of time then
210 warn the user of this.
213 .It Sy path Ta path Ta Li "/bin /usr/bin" Ta
218 .It Sy priority Ta number Ta "" Ta
219 Initial priority (nice) level.
222 .It Sy requirehome Ta bool Ta Li false Ta
223 Require home directory to login.
226 .It Sy sbsize Ta size Ta "" Ta
227 Maximum socket buffer size limit.
230 .It Sy setenv Ta list Ta "" Ta
231 Comma or whitespace separated list
232 of environment variables and values to be set.
233 Commas and whitespace can be escaped using \e\e.
236 .It Sy shell Ta program Ta "" Ta
237 Session shell to execute rather than the shell specified in the password file.
240 environment variable will contain the shell specified in the password file.
243 .It Sy stacksize Ta size Ta "" Ta
244 Maximum stack size limit.
247 .It Sy tc Ta string Ta "" Ta
248 A "continuation" entry, which must be the last capability provided.
249 More capabilities are read from the named entry.
250 The capabilities given before
252 override those in the entry invoked by
256 .It Sy term Ta string Ta Li su Ta
257 Default terminal type if not able to determine from other means.
260 .It Sy umask Ta number Ta Li 022 Ta
262 Should always have a leading
264 to assure octal interpretation.
269 .It Sy welcome Ta file Ta Li /etc/motd Ta
270 File containing welcome message.
277 The resource limit entries
289 actually specify both the maximum and current limits (see
291 The current limit is the one normally used,
292 although the user is permitted to increase the current limit to the
294 The maximum and current limits may be specified individually by appending
299 to the capability name (e.g.,
302 .Sy openfiles-cur Ns No ) .
305 will never define capabilities which start with
309 these are reserved for external use (unless included through contributed
312 The argument types are defined as:
313 .Bl -tag -width programxx
316 If the name is present, then the boolean value is true;
317 otherwise, it is false.
320 Path name to a text file.
323 A comma or whitespace separated list of values.
328 implies the number is expressed in hexadecimal.
331 implies the number is expressed in octal.
332 Any other number is treated as decimal.
335 A space separated list of path names.
338 is the first character in the path name, the
340 is expanded to the user's home directory.
343 A path name to program.
346 A number which expresses a size in bytes.
347 It may have a trailing
349 to multiply the value by 512, a
351 to multiply the value by 1 K (1024), and a
353 to multiply the value by 1 M (1048576).
357 A time may be expressed as a series of numbers
358 which are added together.
359 Each number may have a trailing character to
360 represent time units:
364 Indicates a number of 365 day years.
367 Indicates a number of 7 day weeks.
370 Indicates a number of 24 hour days.
373 Indicates a number of 60 minute hours.
376 Indicates a number of 60 second minutes.
379 Indicates a number of seconds.
382 For example, to indicate 1 and 1/2 hours, the following string
388 .Bl -tag -width /etc/login.conf.db -compact
389 .It Pa /etc/login.conf
390 login class capability database
391 .It Pa /etc/login.conf.db
392 hashed database built with
406 configuration file appeared in