1d_passwd(4) File Formats d_passwd(4)
2
3
4
6 d_passwd - dial-up password file
7
9 /etc/d_passwd
10
11
13 A dial-up password is an additional password required of users who
14 access the computer through a modem or dial-up port. The correct pass‐
15 word must be entered before the user is granted access to the computer.
16
17
18 d_passwd is an ASCII file which contains a list of executable programs
19 (typically shells) that require a dial-up password and the associated
20 encrypted passwords. When a user attempts to log in on any of the ports
21 listed in the dialups file (see dialups(4)), the login program looks at
22 the user's login entry stored in the passwd file (see passwd(4)), and
23 compares the login shell field to the entries in d_passwd. These
24 entries determine whether the user will be required to supply a dial-up
25 password.
26
27
28 Each entry in d_passwd is a single line of the form:
29
30 login-shell:password:
31
32
33
34
35 where
36
37 login-shell The name of the login program that will require an addi‐
38 tional dial-up password.
39
40
41 password An encrypted password. Users accessing the computer
42 through a dial-up port or modem using login-shell will
43 be required to enter this password before gaining access
44 to the computer.
45
46
47
48 d_passwd should be owned by the root user and the root group. The file
49 should have read and write permissions for the owner (root) only.
50
51
52 If the user's login program in the passwd file is not found in d_passwd
53 or if the login shell field in passwd is empty, the user must supply
54 the default password. The default password is the entry for
55 /usr/bin/sh. If d_passwd has no entry for /usr/bin/sh, then those users
56 whose login shell field in passwd is empty or does not match any entry
57 in d_passwd will not be prompted for a dial-up password.
58
59
60 Dial-up logins are disabled if d_passwd has only the following entry:
61
62 /usr/bin/sh:*:
63
64
65
67 Example 1 Sample d_passwd file.
68
69
70 Here is a sample d_passwd file:
71
72
73 /usr/lib/uucp/uucico:q.mJzTnu8icF0:
74 /usr/bin/csh:6k/7KCFRPNVXg:
75 /usr/bin/ksh:9df/FDf.4jkRt:
76 /usr/bin/sh:41FuGVzGcDJlw:
77
78
79
80 Generating An Encrypted Password
81 The passwd (see passwd(1)) utility can be used to generate the
82 encrypted password for each login program. passwd generates encrypted
83 passwords for users and places the password in the shadow (see
84 shadow(4)) file. Passwords for the d_passwd file will need to be gener‐
85 ated by first adding a temporary user id using useradd (see user‐
86 add(1M)), and then using passwd(1) to generate the desired password in
87 the shadow file. Once the encrypted version of the password has been
88 created, it can be copied to the d_passwd file.
89
90
91 For example:
92
93 1. Type useradd tempuser and press Return. This creates a user
94 named tempuser.
95
96 2. Type passwd tempuser and press Return. This creates an
97 encrypted password for tempuser and places it in the shadow
98 file.
99
100 3. Find the entry for tempuser in the shadow file and copy the
101 encrypted password to the desired entry in the d_passwd
102 file.
103
104 4. Type userdel tempuser and press Return to delete tempuser.
105
106
107 These steps must be executed as the root user.
108
110 /etc/d_passwd dial-up password file
111
112
113 /etc/dialups list of dial-up ports requiring dial-up passwords
114
115
116 /etc/passwd password file
117
118
119 /etc/shadow shadow password file
120
121
123 passwd(1), useradd(1M), dialups(4), passwd(4), shadow(4)
124
126 When creating a new dial-up password, be sure to remain logged in on at
127 least one terminal while testing the new password. This ensures that
128 there is an available terminal from which you can correct any mistakes
129 that were made when the new password was added.
130
131
132
133SunOS 5.11 2 Sep 2004 d_passwd(4)