Annotation of src/usr.bin/login/login.1, Revision 1.1.1.1
1.1 deraadt 1: .\" $NetBSD: login.1,v 1.7 1995/08/31 22:52:33 jtc Exp $
2: .\"
3: .\" Copyright (c) 1980, 1990, 1993
4: .\" The Regents of the University of California. All rights reserved.
5: .\"
6: .\" Redistribution and use in source and binary forms, with or without
7: .\" modification, are permitted provided that the following conditions
8: .\" are met:
9: .\" 1. Redistributions of source code must retain the above copyright
10: .\" notice, this list of conditions and the following disclaimer.
11: .\" 2. Redistributions in binary form must reproduce the above copyright
12: .\" notice, this list of conditions and the following disclaimer in the
13: .\" documentation and/or other materials provided with the distribution.
14: .\" 3. All advertising materials mentioning features or use of this software
15: .\" must display the following acknowledgement:
16: .\" This product includes software developed by the University of
17: .\" California, Berkeley and its contributors.
18: .\" 4. Neither the name of the University nor the names of its contributors
19: .\" may be used to endorse or promote products derived from this software
20: .\" without specific prior written permission.
21: .\"
22: .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23: .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24: .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25: .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26: .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27: .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28: .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29: .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30: .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31: .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32: .\" SUCH DAMAGE.
33: .\"
34: .\" @(#)login.1 8.2 (Berkeley) 5/5/94
35: .\"
36: .Dd May 5, 1994
37: .Dt LOGIN 1
38: .Os BSD 4
39: .Sh NAME
40: .Nm login
41: .Nd log into the computer
42: .Sh SYNOPSIS
43: .Nm login
44: .Op Fl fp
45: .Op Fl h Ar hostname
46: .Op Ar user
47: .Sh DESCRIPTION
48: The
49: .Nm login
50: utility logs users (and pseudo-users) into the computer system.
51: .Pp
52: If no user is specified, or if a user is specified and authentication
53: of the user fails,
54: .Nm login
55: prompts for a user name.
56: Authentication of users is done via passwords.
57: Alternately, the user can enter the password "s/key", in which case
58: S/Key authentication of users is performed, as descibed in
59: .Xr skey 1 .
60: S/Key is a Trademark of Bellcore.
61: .Pp
62: The options are as follows:
63: .Bl -tag -width Ds
64: .It Fl f
65: The
66: .Fl f
67: option is used when a user name is specified to indicate that proper
68: authentication has already been done and that no password need be
69: requested.
70: This option may only be used by the super-user or when an already
71: logged in user is logging in as themselves.
72: .It Fl h
73: The
74: .Fl h
75: option specifies the host from which the connection was received.
76: It is used by various daemons such as
77: .Xr telnetd 8 .
78: This option may only be used by the super-user.
79: .It Fl p
80: By default,
81: .Nm login
82: discards any previous environment.
83: The
84: .Fl p
85: option disables this behavior.
86: .El
87: .Pp
88: If the file
89: .Pa /etc/nologin
90: exists,
91: .Nm login
92: displays its contents to the user and exits.
93: This is used by
94: .Xr shutdown 8
95: to prevent users from logging in when the system is about to go down.
96: .Pp
97: Immediately after logging a user in,
98: .Nm login
99: displays the system copyright notice, the date and time the user last
100: logged in, the message of the day as well as other information.
101: If the file
102: .Dq Pa .hushlogin
103: exists in the user's home directory, all of these messages are suppressed.
104: This is to simplify logins for non-human users, such as
105: .Xr uucp 1 .
106: .Nm Login
107: then records an entry in the
108: .Xr wtmp 5
109: and
110: .Xr utmp 5
111: files and executes the user's command interpreter.
112: .Pp
113: Login enters information into the environment (see
114: .Xr environ 7 )
115: specifying the user's home directory (HOME), command interpreter (SHELL),
116: search path (PATH), terminal type (TERM) and user name (both LOGNAME and
117: USER).
118: .Pp
119: The standard shells,
120: .Xr csh 1
121: and
122: .Xr sh 1 ,
123: do not fork before executing the
124: .Nm login
125: utility.
126: .Sh FILES
127: .Bl -tag -width /var/mail/userXXX -compact
128: .It Pa /etc/motd
129: message-of-the-day
130: .It Pa /etc/nologin
131: disallows logins
132: .It Pa /var/run/utmp
133: current logins
134: .It Pa /var/log/lastlog
135: last login account records
136: .It Pa /var/log/wtmp
137: login account records
138: .It Pa /var/mail/user
139: system mailboxes
140: .It Pa \&.hushlogin
141: makes login quieter
142: .El
143: .Sh SEE ALSO
144: .Xr chpass 1 ,
145: .Xr passwd 1 ,
146: .Xr rlogin 1 ,
147: .Xr skey 1 ,
148: .Xr getpass 3 ,
149: .Xr utmp 5 ,
150: .Xr environ 7
151: .Sh HISTORY
152: A
153: .Nm login
154: appeared in
155: .At v6 .