Annotation of src/usr.bin/login/login.1, Revision 1.1
1.1 ! deraadt 1: .\" $NetBSD: login.1,v 1.7 1995/08/31 22:52:33 jtc Exp $
! 2: .\"
! 3: .\" Copyright (c) 1980, 1990, 1993
! 4: .\" The Regents of the University of California. All rights reserved.
! 5: .\"
! 6: .\" Redistribution and use in source and binary forms, with or without
! 7: .\" modification, are permitted provided that the following conditions
! 8: .\" are met:
! 9: .\" 1. Redistributions of source code must retain the above copyright
! 10: .\" notice, this list of conditions and the following disclaimer.
! 11: .\" 2. Redistributions in binary form must reproduce the above copyright
! 12: .\" notice, this list of conditions and the following disclaimer in the
! 13: .\" documentation and/or other materials provided with the distribution.
! 14: .\" 3. All advertising materials mentioning features or use of this software
! 15: .\" must display the following acknowledgement:
! 16: .\" This product includes software developed by the University of
! 17: .\" California, Berkeley and its contributors.
! 18: .\" 4. Neither the name of the University nor the names of its contributors
! 19: .\" may be used to endorse or promote products derived from this software
! 20: .\" without specific prior written permission.
! 21: .\"
! 22: .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
! 23: .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
! 24: .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
! 25: .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
! 26: .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
! 27: .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
! 28: .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
! 29: .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
! 30: .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
! 31: .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
! 32: .\" SUCH DAMAGE.
! 33: .\"
! 34: .\" @(#)login.1 8.2 (Berkeley) 5/5/94
! 35: .\"
! 36: .Dd May 5, 1994
! 37: .Dt LOGIN 1
! 38: .Os BSD 4
! 39: .Sh NAME
! 40: .Nm login
! 41: .Nd log into the computer
! 42: .Sh SYNOPSIS
! 43: .Nm login
! 44: .Op Fl fp
! 45: .Op Fl h Ar hostname
! 46: .Op Ar user
! 47: .Sh DESCRIPTION
! 48: The
! 49: .Nm login
! 50: utility logs users (and pseudo-users) into the computer system.
! 51: .Pp
! 52: If no user is specified, or if a user is specified and authentication
! 53: of the user fails,
! 54: .Nm login
! 55: prompts for a user name.
! 56: Authentication of users is done via passwords.
! 57: Alternately, the user can enter the password "s/key", in which case
! 58: S/Key authentication of users is performed, as descibed in
! 59: .Xr skey 1 .
! 60: S/Key is a Trademark of Bellcore.
! 61: .Pp
! 62: The options are as follows:
! 63: .Bl -tag -width Ds
! 64: .It Fl f
! 65: The
! 66: .Fl f
! 67: option is used when a user name is specified to indicate that proper
! 68: authentication has already been done and that no password need be
! 69: requested.
! 70: This option may only be used by the super-user or when an already
! 71: logged in user is logging in as themselves.
! 72: .It Fl h
! 73: The
! 74: .Fl h
! 75: option specifies the host from which the connection was received.
! 76: It is used by various daemons such as
! 77: .Xr telnetd 8 .
! 78: This option may only be used by the super-user.
! 79: .It Fl p
! 80: By default,
! 81: .Nm login
! 82: discards any previous environment.
! 83: The
! 84: .Fl p
! 85: option disables this behavior.
! 86: .El
! 87: .Pp
! 88: If the file
! 89: .Pa /etc/nologin
! 90: exists,
! 91: .Nm login
! 92: displays its contents to the user and exits.
! 93: This is used by
! 94: .Xr shutdown 8
! 95: to prevent users from logging in when the system is about to go down.
! 96: .Pp
! 97: Immediately after logging a user in,
! 98: .Nm login
! 99: displays the system copyright notice, the date and time the user last
! 100: logged in, the message of the day as well as other information.
! 101: If the file
! 102: .Dq Pa .hushlogin
! 103: exists in the user's home directory, all of these messages are suppressed.
! 104: This is to simplify logins for non-human users, such as
! 105: .Xr uucp 1 .
! 106: .Nm Login
! 107: then records an entry in the
! 108: .Xr wtmp 5
! 109: and
! 110: .Xr utmp 5
! 111: files and executes the user's command interpreter.
! 112: .Pp
! 113: Login enters information into the environment (see
! 114: .Xr environ 7 )
! 115: specifying the user's home directory (HOME), command interpreter (SHELL),
! 116: search path (PATH), terminal type (TERM) and user name (both LOGNAME and
! 117: USER).
! 118: .Pp
! 119: The standard shells,
! 120: .Xr csh 1
! 121: and
! 122: .Xr sh 1 ,
! 123: do not fork before executing the
! 124: .Nm login
! 125: utility.
! 126: .Sh FILES
! 127: .Bl -tag -width /var/mail/userXXX -compact
! 128: .It Pa /etc/motd
! 129: message-of-the-day
! 130: .It Pa /etc/nologin
! 131: disallows logins
! 132: .It Pa /var/run/utmp
! 133: current logins
! 134: .It Pa /var/log/lastlog
! 135: last login account records
! 136: .It Pa /var/log/wtmp
! 137: login account records
! 138: .It Pa /var/mail/user
! 139: system mailboxes
! 140: .It Pa \&.hushlogin
! 141: makes login quieter
! 142: .El
! 143: .Sh SEE ALSO
! 144: .Xr chpass 1 ,
! 145: .Xr passwd 1 ,
! 146: .Xr rlogin 1 ,
! 147: .Xr skey 1 ,
! 148: .Xr getpass 3 ,
! 149: .Xr utmp 5 ,
! 150: .Xr environ 7
! 151: .Sh HISTORY
! 152: A
! 153: .Nm login
! 154: appeared in
! 155: .At v6 .