table of contents
PASSWD(1) | User Commands | PASSWD(1) |
NAME¶
passwd - change user password
SYNOPSIS¶
passwd [options] [LOGIN]
DESCRIPTION¶
The passwd command changes passwords for user accounts. A normal user may only change the password for their own account, while the superuser may change the password for any account. passwd also changes the account or associated password validity period.
Password Changes¶
The user is first prompted for their old password, if one is present. This password is then encrypted and compared against the stored password. The user has only one chance to enter the correct password. The superuser is permitted to bypass this step so that forgotten passwords may be changed.
After the password has been entered, password aging information is checked to see if the user is permitted to change the password at this time. If not, passwd refuses to change the password and exits.
The user is then prompted twice for a replacement password. The second entry is compared against the first and both are required to match in order for the password to be changed.
Then, the password is tested for complexity. passwd will reject any password which is not suitably complex. Care must be taken not to include the system default erase or kill characters.
Hints for user passwords¶
The security of a password depends upon the strength of the encryption algorithm and the size of the key space. The legacy UNIX System encryption method is based on the NBS DES algorithm. More recent methods are now recommended (see ENCRYPT_METHOD). The size of the key space depends upon the randomness of the password which is selected.
Compromises in password security normally result from careless password selection or handling. For this reason, you should not select a password which appears in a dictionary or which must be written down. The password should also not be a proper name, your license number, birth date, or street address. Any of these may be used as guesses to violate system security.
As a general guideline, passwords should be long and random. It's fine to use simple character sets, such as passwords consisting only of lowercase letters, if that helps memorizing longer passwords. For a password consisting only of lowercase English letters randomly chosen, and a length of 32, there are 26^32 (approximately 2^150) different possible combinations. Being an exponential equation, it's apparent that the exponent (the length) is more important than the base (the size of the character set).
You can find advice on how to choose a strong password on http://en.wikipedia.org/wiki/Password_strength
OPTIONS¶
The options which apply to the passwd command are:
-a, --all
-d, --delete
-e, --expire
-h, --help
-i, --inactive INACTIVE
-k, --keep-tokens
-l, --lock
Note that this does not disable the account. The user may still be able to login using another authentication token (e.g. an SSH key). To disable the account, administrators should use usermod --expiredate 1 (this set the account's expire date to Jan 2, 1970).
Users with a locked password are not allowed to change their password.
-n, --mindays MIN_DAYS
-q, --quiet
-r, --repository REPOSITORY
-R, --root CHROOT_DIR
-P, --prefix PREFIX_DIR
-S, --status
-u, --unlock
-w, --warndays WARN_DAYS
-x, --maxdays MAX_DAYS
Passing the number -1 as MAX_DAYS will remove checking a password's validity.
-s, --stdin
CAVEATS¶
Password complexity checking may vary from site to site. The user is urged to select a password as complex as he or she feels comfortable with.
Users may not be able to change their password on a system if NIS is enabled and they are not logged into the NIS server.
CONFIGURATION¶
The following configuration variables in /etc/login.defs change the behavior of this tool:
ENCRYPT_METHOD (string)
It can take one of these values: DES (default), MD5, SHA256, SHA512. MD5 and DES should not be used for new hashes, see crypt(5) for recommendations.
Note: this parameter overrides the MD5_CRYPT_ENAB variable.
MD5_CRYPT_ENAB (boolean)
This variable is superseded by the ENCRYPT_METHOD variable or by any command line option used to configure the encryption algorithm.
This variable is deprecated. You should use ENCRYPT_METHOD.
OBSCURE_CHECKS_ENAB (boolean)
PASS_ALWAYS_WARN (boolean)
PASS_CHANGE_TRIES (number)
PASS_MAX_LEN (number), PASS_MIN_LEN (number)
SHA_CRYPT_MIN_ROUNDS (number), SHA_CRYPT_MAX_ROUNDS (number)
With a lot of rounds, it is more difficult to brute force the password. But note also that more CPU resources will be needed to authenticate users.
If not specified, the libc will choose the default number of rounds (5000), which is orders of magnitude too low for modern hardware.
The values must be inside the 1000-999,999,999 range.
If only one of the SHA_CRYPT_MIN_ROUNDS or SHA_CRYPT_MAX_ROUNDS values is set, then this value will be used.
If SHA_CRYPT_MIN_ROUNDS > SHA_CRYPT_MAX_ROUNDS, the highest value will be used.
FILES¶
/etc/passwd
/etc/shadow
/etc/login.defs
EXIT VALUES¶
The passwd command exits with the following values:
0
1
2
3
4
5
6
SEE ALSO¶
chpasswd(8), makepasswd(1), passwd(5), shadow(5), login.defs(5), usermod(8).
The following web page comically (yet correctly) compares the strength of two different methods for choosing a password: "https://xkcd.com/936/"
06/18/2024 | shadow-utils 4.16.0 |