2 # /etc/login.defs - Configuration control definitions for the login package.
4 # Three items must be defined: MAIL_DIR, ENV_SUPATH, and ENV_PATH.
5 # If unspecified, some arbitrary (and possibly incorrect) value will
6 # be assumed. All other items are optional - if not specified then
7 # the described action or option will be inhibited.
9 # Comment lines (lines beginning with "#") and blank lines are ignored.
11 # Modified for Linux. --marekm
13 # REQUIRED for useradd/userdel/usermod
14 # Directory where mailboxes reside, _or_ name of file, relative to the
15 # home directory. If you _do_ define MAIL_DIR and MAIL_FILE,
16 # MAIL_DIR takes precedence.
19 # - MAIL_DIR defines the location of users mail spool files
20 # (for mbox use) by appending the username to MAIL_DIR as defined
22 # - MAIL_FILE defines the location of the users mail spool files as the
23 # fully-qualified filename obtained by prepending the user home
24 # directory before $MAIL_FILE
26 # NOTE: This is no more used for setting up users MAIL environment variable
27 # which is, starting from shadow 4.0.12-1 in Debian, entirely the
28 # job of the pam_mail PAM modules
29 # See default PAM configuration files provided for
32 # This is a temporary situation: setting these variables will soon
33 # move to /etc/default/useradd and the variables will then be
39 # Enable logging and display of /var/log/faillog login failure info.
40 # This option conflicts with the pam_tally PAM module.
45 # Enable display of unknown usernames when login failures are recorded.
47 # WARNING: Unknown usernames may become world readable.
48 # See #290803 and #298773 for details about how this could become a security
53 # Enable logging of successful logins
58 # Enable "syslog" logging of su activity - in addition to sulog file logging.
59 # SYSLOG_SG_ENAB does the same for newgrp and sg.
65 # If defined, all su activity is logged to this file.
67 #SULOG_FILE /var/log/sulog
70 # If defined, file which maps tty line to TERM environment parameter.
71 # Each line of the file is in a format something like "vt100 tty01".
73 #TTYTYPE_FILE /etc/ttytype
76 # If defined, login failures will be logged here in a utmp format
77 # last, when invoked as lastb, will read /var/log/btmp, so...
79 FTMP_FILE /var/log/btmp
82 # If defined, the command name to display when running "su -". For
83 # example, if this is defined as "su" then a "ps" will display the
84 # command is "-su". If not defined, then "ps" would display the
85 # name of the shell actually being run, e.g. something like "-sh".
90 # If defined, file which inhibits all the usual chatter during the login
91 # sequence. If a full pathname, then hushed mode will be enabled if the
92 # user's name or shell are found in the file. If not a full pathname, then
93 # hushed mode will be enabled if the file exists in the user's home directory.
95 HUSHLOGIN_FILE .hushlogin
96 #HUSHLOGIN_FILE /etc/hushlogins
99 # *REQUIRED* The default PATH settings, for superuser and normal users.
101 # (they are minimal, add the rest in the shell startup files)
102 ENV_SUPATH PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
103 ENV_PATH PATH=/usr/local/bin:/usr/bin:/bin:/usr/games
106 # Terminal permissions
108 # TTYGROUP Login tty will be assigned this group ownership.
109 # TTYPERM Login tty will be set to this permission.
111 # If you have a "write" program which is "setgid" to a special group
112 # which owns the terminals, define TTYGROUP to the group number and
113 # TTYPERM to 0620. Otherwise leave TTYGROUP commented out and assign
114 # TTYPERM to either 622 or 600.
116 # In Debian /usr/bin/bsd-write or similar programs are setgid tty
117 # However, the default and recommended value for TTYPERM is still 0600
118 # to not allow anyone to write to anyone else console or terminal
120 # Users can still allow other people to write them by issuing
121 # the "mesg y" command.
127 # Login configuration initializations:
129 # ERASECHAR Terminal ERASE character ('\010' = backspace).
130 # KILLCHAR Terminal KILL character ('\025' = CTRL/U).
131 # UMASK Default "umask" value.
133 # The ERASECHAR and KILLCHAR are used only on System V machines.
135 # UMASK usage is discouraged because it catches only some classes of user
136 # entries to system, in fact only those made through login(1), while setting
137 # umask in shell rc file will catch also logins through su, cron, ssh etc.
139 # At the same time, using shell rc to set umask won't catch entries which use
140 # non-shell executables in place of login shell, like /usr/sbin/pppd for "ppp"
143 # Therefore the use of pam_umask is recommended (Debian package libpam-umask)
144 # as the solution which catches all these cases on PAM-enabled systems.
146 # This avoids the confusion created by having the umask set
147 # in two different places -- in login.defs and shell rc files (i.e.
150 # For discussion, see #314539 and #248150 as well as the thread starting at
151 # http://lists.debian.org/debian-devel/2005/06/msg01598.html
153 # Prefix these values with "0" to get octal, "0x" to get hexadecimal.
157 # 022 is the "historical" value in Debian for UMASK when it was used
158 # 027, or even 077, could be considered better for privacy
159 # There is no One True Answer here : each sysadmin must make up his/her
164 # Password aging controls:
166 # PASS_MAX_DAYS Maximum number of days a password may be used.
167 # PASS_MIN_DAYS Minimum number of days allowed between password changes.
168 # PASS_WARN_AGE Number of days warning given before a password expires.
175 # Min/max values for automatic uid selection in useradd
181 # Min/max values for automatic gid selection in groupadd
187 # Max number of login retries if password is bad. This will most likely be
188 # overriden by PAM, since the default pam_unix module has it's own built
189 # in of 3 retries. However, this is a safe fallback in case you are using
190 # an authentication module that does not enforce PAM_MAXTRIES.
195 # Max time in seconds for login
200 # Which fields may be changed by regular users using chfn - use
201 # any combination of letters "frwh" (full name, room number, work
202 # phone, home phone). If not defined, no changes are allowed.
203 # For backward compatibility, "yes" = "rwh" and "no" = "frwh".
208 # Should login be allowed if we can't cd to the home directory?
214 # If defined, this command is run when removing a user.
215 # It should remove any at/cron/print jobs etc. owned by
216 # the user to be removed (passed as the first argument).
218 #USERDEL_CMD /usr/sbin/userdel_local
221 # This enables userdel to remove user groups if no members exist.
223 # Other former uses of this variable such as setting the umask when
224 # user==primary group are not used in PAM environments, thus in Debian
229 # Instead of the real user shell, the program specified by this parameter
230 # will be launched, although its visible name (argv[0]) will be the shell's.
231 # The program may do whatever it wants (logging, additional authentification,
232 # banner, ...) before running the actual shell.
234 # FAKE_SHELL /bin/fakeshell
237 # If defined, either full pathname of a file containing device names or
238 # a ":" delimited list of device names. Root logins will be allowed only
239 # upon these devices.
241 # This variable is used by login and su.
243 #CONSOLE /etc/consoles
244 #CONSOLE console:tty01:tty02:tty03:tty04
247 # List of groups to add to the user's supplementary group set
248 # when logging in on the console (as determined by the CONSOLE
249 # setting). Default is none.
251 # Use with caution - it is possible for users to gain permanent
252 # access to these groups, even when not logged in on the console.
253 # How to do it is left as an exercise for the reader...
255 # This variable is used by login and su.
257 #CONSOLE_GROUPS floppy:audio:cdrom
260 # Only works if compiled with MD5_CRYPT defined:
261 # If set to "yes", new passwords will be encrypted using the MD5-based
262 # algorithm compatible with the one used by recent releases of FreeBSD.
263 # It supports passwords of unlimited length and longer salt strings.
264 # Set to "no" if you need to copy encrypted passwords to other systems
265 # which don't understand the new algorithm. Default is "no".
267 # This variable is used by chpasswd, gpasswd and newusers.
271 ################# OBSOLETED BY PAM ##############
273 # These options are now handled by PAM. Please #
274 # edit the appropriate file in /etc/pam.d/ to #
275 # enable the equivelants of them.
284 #PORTTIME_CHECKS_ENAB
300 ################# OBSOLETED #######################
302 # These options are no more handled by shadow. #
304 # Shadow utilities will display a warning if they #
307 ###################################################
311 # NO_PASSWORD_CONSOLE