.\" Copyright (c) 1993 Michael Haardt (michael@moria.de),
.\" Fri Apr 2 11:32:09 MET DST 1993
.\"
-.\" %%%LICENSE_START(GPLv2+_DOC_FULL)
-.\" This is free documentation; you can redistribute it and/or
-.\" modify it under the terms of the GNU General Public License as
-.\" published by the Free Software Foundation; either version 2 of
-.\" the License, or (at your option) any later version.
-.\"
-.\" The GNU General Public License's references to "object code"
-.\" and "executables" are to be interpreted as the output of any
-.\" document formatting or typesetting system, including
-.\" intermediate and printed output.
-.\"
-.\" This manual is distributed in the hope that it will be useful,
-.\" but WITHOUT ANY WARRANTY; without even the implied warranty of
-.\" MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-.\" GNU General Public License for more details.
-.\"
-.\" You should have received a copy of the GNU General Public
-.\" License along with this manual; if not, see
-.\" <http://www.gnu.org/licenses/>.
-.\" %%%LICENSE_END
+.\" SPDX-License-Identifier: GPL-2.0-or-later
.\"
.\" Modified Sun Jul 25 10:46:28 1993 by Rik Faith (faith@cs.unc.edu)
.\" Modified Sun Aug 21 18:12:27 1994 by Rik Faith (faith@cs.unc.edu)
.\" Modified Sun Jun 18 01:53:57 1995 by Andries Brouwer (aeb@cwi.nl)
.\" Modified Mon Jan 5 20:24:40 MET 1998 by Michael Haardt
.\" (michael@cantor.informatik.rwth-aachen.de)
-.TH PASSWD 5 2012-05-03 "Linux" "Linux Programmer's Manual"
+.TH passwd 5 (date) "Linux man-pages (unreleased)"
.SH NAME
passwd \- password file
.SH DESCRIPTION
The
-.IR /etc/passwd
+.I /etc/passwd
file is a text file that describes user login accounts for the system.
It should have read permission allowed for all users (many utilities, like
.BR ls (1)
basic assumption used to be that of a friendly user-community.
These days many people run some version of the shadow password suite, where
.I /etc/passwd
-has an \(aqx\(aq character in the password field,
+has an \[aq]x\[aq] character in the password field,
and the encrypted passwords are in
.IR /etc/shadow ,
which is readable by the superuser only.
.IR /etc/shadow ,
is an empty string, login is allowed without even asking for a password.
Note that this functionality may be intentionally disabled in applications,
-or configurable (for example using the "nullok" or "nonull" arguments to
-pam_unix.so).
+or configurable (for example using the
+.RB \[dq] nullok \[dq]
+or
+.RB \[dq] nonull \[dq]
+arguments to
+.BR pam_unix (8)).
.PP
If the encrypted password in
.I /etc/passwd
.PP
Regardless of whether shadow passwords are used, many system administrators
use an asterisk (*) in the encrypted password field to make sure
-that this user can not authenticate him- or herself using a
+that this user can not authenticate themself using a
password.
(But see NOTES below.)
.PP
.PP
Each line of the file describes a single user,
and contains seven colon-separated fields:
-.sp
-.RS
+.PP
+.in +4n
+.EX
name:password:UID:GID:GECOS:directory:shell
-.RE
-.sp
+.EE
+.in
+.PP
The field are as follows:
.TP 12
.I name
.TP
.I password
This is either the encrypted user password,
-an asterisk (*), or the letter \(aqx\(aq.
+an asterisk (*), or the letter \[aq]x\[aq].
(See
.BR pwconv (8)
-for an explanation of \(aqx\(aq.)
+for an explanation of \[aq]x\[aq].)
.TP
.I UID
The privileged
shell field yields the same result and additionally allows the use of
.BR su (1).
.SH SEE ALSO
+.BR chfn (1),
+.BR chsh (1),
.BR login (1),
.BR passwd (1),
.BR su (1),
.BR getpwent (3),
.BR getpwnam (3),
.BR group (5),
-.BR shadow (5)
+.BR shadow (5),
+.BR vipw (8)