# *REQUIRED* # The default PATH settings, for superuser and normal users. # (they are minimal, add the rest in the shell startup files) ENV_SUPATH PATH=/sbin:/bin:/usr/sbin:/usr/bin ENV_PATH PATH=/bin:/usr/bin # Directory where mailboxes reside, _or_ name of file, relative to the home directory. # If you _do_ define both, MAIL_DIR takes precedence. MAIL_DIR /var/spool/mail #MAIL_FILE .mail # Password aging controls: # PASS_MAX_DAYS Maximum number of days a password may be used. # PASS_MIN_DAYS Minimum number of days allowed between password changes. # PASS_MIN_LEN Minimum acceptable password length. # PASS_WARN_AGE Number of days warning given before a password expires. PASS_MAX_DAYS 99999 PASS_MIN_DAYS 0 #PASS_MIN_LEN 5 *np PASS_WARN_AGE 7 ########## end of required entries ######### # Enable "syslog" logging of su activity - in addition to sulog file logging. # SYSLOG_SG_ENAB does the same for newgrp and sg. SYSLOG_SU_ENAB yes SYSLOG_SG_ENAB yes # su activity is log file. #SULOG_FILE /var/log/sulog #Root logins will be allowed only upon these devices. #full pathname of a file containing device names or # a ":" delimited list of device names. CONSOLE /etc/securetty # name of file whose presence which will inhibit non-root logins. # The contents of this file should be a message indicating why logins are inhibited. #NOLOGINS_FILE /etc/nologin *np CONSOLE console:tty01:tty02:tty03:tty04 # ":" delimited list of "message of the day" files to be displayed upon login. #MOTD_FILE /etc/motd *np #MOTD_FILE /etc/motd:/usr/lib/news/news-motd *np # file will be output before each login prompt. # file which inhibits all the usual chatter during the login sequence. # If a full pathname, then hushed mode will be enabled if the user's name or shell are found in the file. # If not a full pathname, then hushed mode will be enabled if the file exists in the user's home directory. HUSHLOGIN_FILE .hushlogin #HUSHLOGIN_FILE /etc/hushlogins # either a TZ environment parameter spec or the # fully-rooted pathname of a file containing such a spec. #ENV_TZ TZ=CST6CDT *np #ENV_TZ /etc/tzname *np ISSUE_FILE /etc/issue *np # file which maps tty line to TERM environment parameter. # Each line of the file is in a format something like "vt100 tty01". #TTYTYPE_FILE /etc/ttytype # the command name to display when running "su -". # For example, if this is defined as "su" then a "ps" will display the # command is "-su". # If not defined, then "ps" would display the # name of the shell actually being run, e.g. something like "-sh". SU_NAME su # an HZ environment parameter spec. # for Linux/x86 #ENV_HZ HZ=100 *np # For Linux/Alpha... #ENV_HZ HZ=1024 *np # Terminal permissions # TTYGROUP Login tty will be assigned this group ownership. # TTYPERM Login tty will be set to this permission. # If you have a "write" program which is "setgid" to a special group # which owns the terminals, define TTYGROUP to the group number and # TTYPERM to 0620. Otherwise leave TTYGROUP commented out and assign # TTYPERM to either 622 or 600. TTYGROUP tty TTYPERM 0600 # Login configuration initializations: # ERASECHAR Terminal ERASE character ('\010' = backspace). # KILLCHAR Terminal KILL character ('\025' = CTRL/U). # UMASK Default "umask" value. # ULIMIT Default "ulimit" value. # The ERASECHAR and KILLCHAR are used only on System V machines. # The ULIMIT is used only if the system supports it. # (now it works with setrlimit too; ulimit is in 512-byte units) # Prefix these values with "0" to get octal, "0x" to get hexadecimal. ERASECHAR 0177 KILLCHAR 025 UMASK 022 #ULIMIT 2097152 *np # # user must be listed as a member of the first gid 0 group # in /etc/group (called "root" on most Linux systems) to be able to "su" # to uid 0 accounts. If the group doesn't exist or is empty, no one # will be able to "su" to uid 0. #SU_WHEEL_ONLY yes *np # If compiled with cracklib support, where are the dictionaries #CRACKLIB_DICTPATH /usr/lib/cracklib_dict *np # Min/max values for automatic uid selection in useradd UID_MIN 1000 UID_MAX 60000 # Min/max values for automatic gid selection in groupadd GID_MIN 100 GID_MAX 60000 # Max number of login retries if password is bad LOGIN_RETRIES 3 # Max time in seconds for login LOGIN_TIMEOUT 60 # Delay in seconds before being allowed another attempt after a login failure FAIL_DELAY 3 # Enable logging and display of /var/log/faillog login failure info. #FAILLOG_ENAB yes *np # Enable display of unknown usernames when login failures are recorded. LOG_UNKFAIL_ENAB no # Enable logging of successful logins LOG_OK_LOGINS no # login failures will be logged here in a utmp format. # last, when invoked as lastb, will read /var/log/btmp, so... #FTMP_FILE /var/log/btmp *np # Enable logging and display of /var/log/lastlog login time info. #LASTLOG_ENAB yes *np # Enable checking and display of mailbox status upon login. # Disable if the shell startup files already check for mail # ("mailx -e" or equivalent). #MAIL_CHECK_ENAB no *np # Enable checking of time restrictions specified in /etc/porttime. #PORTTIME_CHECKS_ENAB yes *np # Enable setting of ulimit, umask, and niceness from passwd gecos field. #QUOTAS_ENAB yes *np # Maximum number of attempts to change password if rejected (too easy) #PASS_CHANGE_TRIES 5 *np # Warn about weak passwords (but still allow them) if you are root. #PASS_ALWAYS_WARN yes *np # Number of significant characters in the password for crypt(). # Default is 8, don't change unless your crypt() is better. # Ignored if MD5_CRYPT_ENAB set to "yes". #PASS_MAX_LEN 8 *np # Require password before chfn/chsh can make any changes. #CHFN_AUTH yes *np # Which fields may be changed by regular users using chfn # any combination of letters "frwh" # full name, room number, work phone, home phone # If not defined, no changes are allowed. # For backward compatibility, "yes" = "rwh" and "no" = "frwh". CHFN_RESTRICT rwh # Password prompt (%s will be replaced by user name). # XXX - it doesn't work correctly yet, for now leave it commented out # to use the default which is just "Password: ". #LOGIN_STRING "%s's Password: " *np # If set to "yes", new passwords will be encrypted using the MD5-based # algorithm compatible with the one used by recent releases of FreeBSD. # It supports passwords of unlimited length and longer salt strings. # Set to "no" if you need to copy encrypted passwords to other systems # which don't understand the new algorithm. Default is "no". # Only if compiled with MD5_CRYPT defined: #MD5_CRYPT_ENAB yes *np # Enable additional checks upon password changes. #OBSCURE_CHECKS_ENAB yes *np # List of groups to add to the user's supplementary group set # when logging in on the console (as determined by the CONSOLE setting). # Default is none. # # Use with caution - it is possible for users to gain permanent # access to these groups, even when not logged in on the console. # How to do it is left as an exercise for the reader... #CONSOLE_GROUPS floppy:audio:cdrom # Should login be allowed if we can't cd to the home directory? # Default in no. DEFAULT_HOME yes # login environment will be read from . # Every line should be in the form name=value. #ENVIRON_FILE /etc/environment *np # this command is run when removing a user. # It should remove any at/cron/print jobs etc. owned by # the user to be removed (passed as the first argument). #USERDEL_CMD /usr/sbin/userdel_local # Enable setting of the umask group bits to be the same as owner bits # (examples: 022 -> 002, 077 -> 007) for non-root users, if the uid is # the same as gid, and username is the same as the primary group name. # # This also enables userdel to remove user groups if no members exist. USERGROUPS_ENAB yes