Deleted Added
full compact
passwd.5 (50476) passwd.5 (57695)
1.\" Copyright (c) 1988, 1991, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 16 unchanged lines hidden (view full) ---

25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" From: @(#)passwd.5 8.1 (Berkeley) 6/5/93
1.\" Copyright (c) 1988, 1991, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 16 unchanged lines hidden (view full) ---

25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" From: @(#)passwd.5 8.1 (Berkeley) 6/5/93
33.\" $FreeBSD: head/share/man/man5/passwd.5 50476 1999-08-28 00:22:10Z peter $
33.\" $FreeBSD: head/share/man/man5/passwd.5 57695 2000-03-02 14:54:02Z sheldonh $
34.\"
35.Dd September 29, 1994
36.Dt PASSWD 5
37.Os
38.Sh NAME
39.Nm passwd
40.Nd format of the password file
41.Sh DESCRIPTION

--- 143 unchanged lines hidden (view full) ---

185done with other shells.
186.Sh YP/NIS INTERACTION
187.Ss Enabling access to NIS passwd data
188The system administrator can configure
189.Tn FreeBSD
190to use NIS/YP for
191its password information by adding special records to the
192.Pa /etc/master.passwd
34.\"
35.Dd September 29, 1994
36.Dt PASSWD 5
37.Os
38.Sh NAME
39.Nm passwd
40.Nd format of the password file
41.Sh DESCRIPTION

--- 143 unchanged lines hidden (view full) ---

185done with other shells.
186.Sh YP/NIS INTERACTION
187.Ss Enabling access to NIS passwd data
188The system administrator can configure
189.Tn FreeBSD
190to use NIS/YP for
191its password information by adding special records to the
192.Pa /etc/master.passwd
193file. These entries should be added with
193file.
194These entries should be added with
194.Xr vipw 8
195so that the changes can be properly merged with the hashed
196password databases and the
197.Pa /etc/passwd
198file (
199.Pa /etc/passwd
200should never be edited manually). Alternatively, the administrator
201can modify

--- 13 unchanged lines hidden (view full) ---

215.Tn FreeBSD Ns 's
216standard C library to begin using the NIS passwd maps
217for lookups.
218.Pp
219Note that the entry shown above is known as a
220.Em wildcard
221entry, because it matches all users (the `+' without any other information
222matches everybody) and allows all NIS password data to be retrieved
195.Xr vipw 8
196so that the changes can be properly merged with the hashed
197password databases and the
198.Pa /etc/passwd
199file (
200.Pa /etc/passwd
201should never be edited manually). Alternatively, the administrator
202can modify

--- 13 unchanged lines hidden (view full) ---

216.Tn FreeBSD Ns 's
217standard C library to begin using the NIS passwd maps
218for lookups.
219.Pp
220Note that the entry shown above is known as a
221.Em wildcard
222entry, because it matches all users (the `+' without any other information
223matches everybody) and allows all NIS password data to be retrieved
223unaltered. However, by
224unaltered.
225However, by
224specifying a username or netgroup next to the `+' in the NIS
225entry, the administrator can affect what data are extracted from the
226specifying a username or netgroup next to the `+' in the NIS
227entry, the administrator can affect what data are extracted from the
226NIS passwd maps and how it is interpreted. Here are a few example
228NIS passwd maps and how it is interpreted.
229Here are a few example
227records that illustrate this feature (note that you can have several
228NIS entries in a single
229.Pa master.passwd
230file):
231.Bd -literal -offset indent
232-mitnick:::::::::
233+@staff:::::::::
234+@permitted-users:::::::::
235+dennis:::::::::
236+ken:::::::::/bin/csh
237+@rejected-users::32767:32767::::::/bin/false
238
239.Ed
240Specific usernames are listed explicitly while netgroups are signified
241by a preceding `@'. In the above example, users in the ``staff'' and
242``permitted-users'' netgroups will have their password information
230records that illustrate this feature (note that you can have several
231NIS entries in a single
232.Pa master.passwd
233file):
234.Bd -literal -offset indent
235-mitnick:::::::::
236+@staff:::::::::
237+@permitted-users:::::::::
238+dennis:::::::::
239+ken:::::::::/bin/csh
240+@rejected-users::32767:32767::::::/bin/false
241
242.Ed
243Specific usernames are listed explicitly while netgroups are signified
244by a preceding `@'. In the above example, users in the ``staff'' and
245``permitted-users'' netgroups will have their password information
243read from NIS and used unaltered. In other words, they will be allowed
244normal access to the machine. Users ``ken'' and ``dennis,'' who have
246read from NIS and used unaltered.
247In other words, they will be allowed
248normal access to the machine.
249Users ``ken'' and ``dennis,'' who have
245been named explicitly rather than through a netgroup, will also have
246their password data read from NIS, _except_ that user ``ken'' will
247have his shell remapped to
248.Pa /bin/csh .
249This means that value for his shell specified in the NIS password map
250will be overridden by the value specified in the special NIS entry in
251the local
252.Pa master.passwd
250been named explicitly rather than through a netgroup, will also have
251their password data read from NIS, _except_ that user ``ken'' will
252have his shell remapped to
253.Pa /bin/csh .
254This means that value for his shell specified in the NIS password map
255will be overridden by the value specified in the special NIS entry in
256the local
257.Pa master.passwd
253file. User ``ken'' may have been assigned the csh shell because his
258file.
259User ``ken'' may have been assigned the csh shell because his
254NIS password entry specified a different shell that may not be
255installed on the client machine for political or technical reasons.
256Meanwhile, users in the ``rejected-users'' netgroup are prevented
257from logging in because their UIDs, GIDs and shells have been overridden
258with invalid values.
259.Pp
260User ``mitnick'' will be be ignored entirely because his entry is
261specified with a `-' instead of a `+'. A minus entry can be used
262to block out certain NIS password entries completely; users who's
263password data has been excluded in this way are not recognized by
260NIS password entry specified a different shell that may not be
261installed on the client machine for political or technical reasons.
262Meanwhile, users in the ``rejected-users'' netgroup are prevented
263from logging in because their UIDs, GIDs and shells have been overridden
264with invalid values.
265.Pp
266User ``mitnick'' will be be ignored entirely because his entry is
267specified with a `-' instead of a `+'. A minus entry can be used
268to block out certain NIS password entries completely; users who's
269password data has been excluded in this way are not recognized by
264the system at all. (Any overrides specified with minus entries are
270the system at all.
271(Any overrides specified with minus entries are
265also ignored since there is no point in processing override information
266for a user that the system isn't going to recognize in the first place.)
267In general, a minus entry is used to specifically exclude a user
268who might otherwise be granted access because he happens to be a
272also ignored since there is no point in processing override information
273for a user that the system isn't going to recognize in the first place.)
274In general, a minus entry is used to specifically exclude a user
275who might otherwise be granted access because he happens to be a
269member of an authorized netgroup. For example, if ``mitnick'' is
276member of an authorized netgroup.
277For example, if ``mitnick'' is
270a member of the ``permitted-users'' netgroup and must, for whatever
271the reason, be permitted to remain in that netgroup (possibly to
272retain access to other machines within the domain), the administrator
273can still deny him access to a particular system with a minus entry.
274Also, it is sometimes easier to explicitly list those users who aren't
275allowed access rather than generate a possibly complicated list of
276users who are allowed access and omit the rest.
277.Pp
278Note that the plus and minus entries are evaluated in order from
278a member of the ``permitted-users'' netgroup and must, for whatever
279the reason, be permitted to remain in that netgroup (possibly to
280retain access to other machines within the domain), the administrator
281can still deny him access to a particular system with a minus entry.
282Also, it is sometimes easier to explicitly list those users who aren't
283allowed access rather than generate a possibly complicated list of
284users who are allowed access and omit the rest.
285.Pp
286Note that the plus and minus entries are evaluated in order from
279first to last with the first match taking precedence. This means
287first to last with the first match taking precedence.
288This means
280the system will only use the first entry that matches a particular user.
281If, for instance, we have a user ``foo'' who is a member of both the ``staff''
282netgroup and the ``rejected-users'' netgroup, he will be admitted to
283the system because the above example lists the entry for ``staff''
289the system will only use the first entry that matches a particular user.
290If, for instance, we have a user ``foo'' who is a member of both the ``staff''
291netgroup and the ``rejected-users'' netgroup, he will be admitted to
292the system because the above example lists the entry for ``staff''
284before the entry for ``rejected-users.'' If we reversed the order,
293before the entry for ``rejected-users.''
294If we reversed the order,
285user ``foo'' would be flagged as a ``rejected-user'' instead and
286denied access.
287.Pp
288Lastly, any NIS password database records that do not match against
289at least one of the users or netgroups specified by the NIS access
290entries in the
291.Pa /etc/master.passwd
292file will be ignored (along with any users specified using minus
293entries). In our example shown above, we do not have a wildcard
294entry at the end of the list; therefore, the system will not recognize
295anyone except
296``ken,'' ``dennis,'' the ``staff'' netgroup and the ``permitted-users''
295user ``foo'' would be flagged as a ``rejected-user'' instead and
296denied access.
297.Pp
298Lastly, any NIS password database records that do not match against
299at least one of the users or netgroups specified by the NIS access
300entries in the
301.Pa /etc/master.passwd
302file will be ignored (along with any users specified using minus
303entries). In our example shown above, we do not have a wildcard
304entry at the end of the list; therefore, the system will not recognize
305anyone except
306``ken,'' ``dennis,'' the ``staff'' netgroup and the ``permitted-users''
297netgroup as authorized users. The ``rejected-users'' netgroup will
307netgroup as authorized users.
308The ``rejected-users'' netgroup will
298be recognized but all members will have their shells remapped and
299therefore be denied access.
300All other NIS password records
309be recognized but all members will have their shells remapped and
310therefore be denied access.
311All other NIS password records
301will be ignored. The administrator may add a wildcard entry to the
312will be ignored.
313The administrator may add a wildcard entry to the
302end of the list such as:
303.Bd -literal -offset indent
304+:::::::::/usr/local/bin/go_away
305
306.Ed
307This entry acts as a catch-all for all users that don't match against
308any of the other entries.
309.Pa /usr/local/bin/go_away
310can be a short shell script or program
311that prints a message telling the user that he is not allowed access
314end of the list such as:
315.Bd -literal -offset indent
316+:::::::::/usr/local/bin/go_away
317
318.Ed
319This entry acts as a catch-all for all users that don't match against
320any of the other entries.
321.Pa /usr/local/bin/go_away
322can be a short shell script or program
323that prints a message telling the user that he is not allowed access
312to the system. This technique is sometimes useful when it is
324to the system.
325This technique is sometimes useful when it is
313desirable to have the system be able to recognize all users in a
314particular NIS domain without necessarily granting them login access.
315See the above text on the shell field regarding security concerns when using
316a shell script as the login shell.
317.Pp
318The primary use of this
319.Pa override
320feature is to permit the administrator
326desirable to have the system be able to recognize all users in a
327particular NIS domain without necessarily granting them login access.
328See the above text on the shell field regarding security concerns when using
329a shell script as the login shell.
330.Pp
331The primary use of this
332.Pa override
333feature is to permit the administrator
321to enforce access restrictions on NIS client systems. Users can be
334to enforce access restrictions on NIS client systems.
335Users can be
322granted access to one group of machines and denied access to other
323machines simply by adding or removing them from a particular netgroup.
324Since the netgroup database can also be accessed via NIS, this allows
325access restrictions to be administered from a single location, namely
326the NIS master server; once a host's access list has been set in
327.Pa /etc/master.passwd ,
328it need not be modified again unless new netgroups are created.
329.Sh NOTES
330.Ss Shadow passwords through NIS
331.Tn FreeBSD
332uses a shadow password scheme: users' encrypted passwords
333are stored only in
334.Pa /etc/master.passwd
335and
336.Pa /etc/spwd.db ,
336granted access to one group of machines and denied access to other
337machines simply by adding or removing them from a particular netgroup.
338Since the netgroup database can also be accessed via NIS, this allows
339access restrictions to be administered from a single location, namely
340the NIS master server; once a host's access list has been set in
341.Pa /etc/master.passwd ,
342it need not be modified again unless new netgroups are created.
343.Sh NOTES
344.Ss Shadow passwords through NIS
345.Tn FreeBSD
346uses a shadow password scheme: users' encrypted passwords
347are stored only in
348.Pa /etc/master.passwd
349and
350.Pa /etc/spwd.db ,
337which are readable and writable only by the superuser. This is done
351which are readable and writable only by the superuser.
352This is done
338to prevent users from running the encrypted passwords through
339password-guessing programs and gaining unauthorized access to
353to prevent users from running the encrypted passwords through
354password-guessing programs and gaining unauthorized access to
340other users' accounts. NIS does not support a standard means of
355other users' accounts.
356NIS does not support a standard means of
341password shadowing, which implies that placing your password data
342into the NIS passwd maps totally defeats the security of
343.Tn FreeBSD Ns 's
344password shadowing system.
345.Pp
346.Tn FreeBSD
347provides a few special features to help get around this
357password shadowing, which implies that placing your password data
358into the NIS passwd maps totally defeats the security of
359.Tn FreeBSD Ns 's
360password shadowing system.
361.Pp
362.Tn FreeBSD
363provides a few special features to help get around this
348problem. It is possible to implement password shadowing between
364problem.
365It is possible to implement password shadowing between
349.Tn FreeBSD
350NIS clients and
351.Tn FreeBSD
366.Tn FreeBSD
367NIS clients and
368.Tn FreeBSD
352NIS servers. The
369NIS servers.
370The
353.Xr getpwent 3
354routines will search for a
355.Pa master.passwd.byname
356and
357.Pa master.passwd.byuid
358maps which should contain the same data found in the
359.Pa /etc/master.passwd
371.Xr getpwent 3
372routines will search for a
373.Pa master.passwd.byname
374and
375.Pa master.passwd.byuid
376maps which should contain the same data found in the
377.Pa /etc/master.passwd
360file. If the maps exist,
378file.
379If the maps exist,
361.Tn FreeBSD
362will attempt to use them for user
363authentication instead of the standard
364.Pa passwd.byname
365and
366.Pa passwd.byuid
367maps.
368.Tn FreeBSD Ns 's
369.Xr ypserv 8
370will also check client requests to make sure they originate on a
380.Tn FreeBSD
381will attempt to use them for user
382authentication instead of the standard
383.Pa passwd.byname
384and
385.Pa passwd.byuid
386maps.
387.Tn FreeBSD Ns 's
388.Xr ypserv 8
389will also check client requests to make sure they originate on a
371privileged port. Since only the superuser is allowed to bind to
390privileged port.
391Since only the superuser is allowed to bind to
372a privileged port, the server can tell if the requesting user
373is the superuser; all requests from non-privileged users to access
374the
375.Pa master.passwd
392a privileged port, the server can tell if the requesting user
393is the superuser; all requests from non-privileged users to access
394the
395.Pa master.passwd
376maps will be refused. Since all user authentication programs run
396maps will be refused.
397Since all user authentication programs run
377with superuser privilege, they should have the required access to
378users' encrypted password data while normal users will only
379be allowed access to the standard
380.Pa passwd
381maps which contain no password information.
382.Pp
383Note that this feature cannot be used in an environment with
384.No non- Ns Tn FreeBSD
398with superuser privilege, they should have the required access to
399users' encrypted password data while normal users will only
400be allowed access to the standard
401.Pa passwd
402maps which contain no password information.
403.Pp
404Note that this feature cannot be used in an environment with
405.No non- Ns Tn FreeBSD
385systems. Note also that a truly determined user with
406systems.
407Note also that a truly determined user with
386unrestricted access to your network could still compromise the
387.Pa master.passwd
388maps.
389.Ss UID and GID remapping with NIS overrides
390Unlike
391.Tn SunOS
392and other operating systems that use Sun's NIS code,
393.Tn FreeBSD

--- 8 unchanged lines hidden (view full) ---

402.Bd -literal -offset indent
403+@foo-users:???:666:666:0:0:0:Bogus user:/home/bogus:/bin/bogus
404
405.Ed
406This entry will cause all users in the `foo-users' netgroup to
407have
408.Pa all
409of their password information overridden, including UIDs,
408unrestricted access to your network could still compromise the
409.Pa master.passwd
410maps.
411.Ss UID and GID remapping with NIS overrides
412Unlike
413.Tn SunOS
414and other operating systems that use Sun's NIS code,
415.Tn FreeBSD

--- 8 unchanged lines hidden (view full) ---

424.Bd -literal -offset indent
425+@foo-users:???:666:666:0:0:0:Bogus user:/home/bogus:/bin/bogus
426
427.Ed
428This entry will cause all users in the `foo-users' netgroup to
429have
430.Pa all
431of their password information overridden, including UIDs,
410GIDs and passwords. The result is that all `foo-users' will be
432GIDs and passwords.
433The result is that all `foo-users' will be
411locked out of the system, since their passwords will be remapped
412to invalid values.
413.Pp
414This is important to remember because most people are accustomed to
415using an NIS wildcard entry that looks like this:
416.Bd -literal -offset indent
417+:*:0:0:::
418

--- 27 unchanged lines hidden (view full) ---

446When Sun originally added NIS support to their
447.Xr getpwent 3
448routines, they took into account the fact that the
449.Tn SunOS
450password
451.Pa /etc/passwd
452file is in plain
453.Tn ASCII
434locked out of the system, since their passwords will be remapped
435to invalid values.
436.Pp
437This is important to remember because most people are accustomed to
438using an NIS wildcard entry that looks like this:
439.Bd -literal -offset indent
440+:*:0:0:::
441

--- 27 unchanged lines hidden (view full) ---

469When Sun originally added NIS support to their
470.Xr getpwent 3
471routines, they took into account the fact that the
472.Tn SunOS
473password
474.Pa /etc/passwd
475file is in plain
476.Tn ASCII
454format. The
477format.
478The
455.Tn SunOS
456documentation claims that
457adding a '+' entry to the password file causes the contents of
458the NIS password database to be 'inserted' at the position in
479.Tn SunOS
480documentation claims that
481adding a '+' entry to the password file causes the contents of
482the NIS password database to be 'inserted' at the position in
459the file where the '+' entry appears. If, for example, the
483the file where the '+' entry appears.
484If, for example, the
460administrator places the +:::::: entry in the middle of
461.Pa /etc/passwd,
462then the entire contents of the NIS password map would appear
463as though it had been copied into the middle of the password
485administrator places the +:::::: entry in the middle of
486.Pa /etc/passwd,
487then the entire contents of the NIS password map would appear
488as though it had been copied into the middle of the password
464file. If the administrator places the +:::::: entry at both the
489file.
490If the administrator places the +:::::: entry at both the
465middle and the end of
466.Pa /etc/passwd ,
467then the NIS password map would appear twice: once in the middle
491middle and the end of
492.Pa /etc/passwd ,
493then the NIS password map would appear twice: once in the middle
468of the file and once at the end. (By using override entries
494of the file and once at the end.
495(By using override entries
469instead of simple wildcards, other combinations could be achieved.)
470.Pp
471By contrast,
472.Tn FreeBSD
473does not have a single
474.Tn ASCII
475password file: it
496instead of simple wildcards, other combinations could be achieved.)
497.Pp
498By contrast,
499.Tn FreeBSD
500does not have a single
501.Tn ASCII
502password file: it
476has a hashed password database. This database does not have an
503has a hashed password database.
504This database does not have an
477easily-defined beginning, middle or end, which makes it very hard
478to design a scheme that is 100% compatible with
479.Tn SunOS .
480For example,
481the
482.Fn getpwnam
483and
484.Fn getpwuid
485functions in
486.Tn FreeBSD
487are designed to do direct queries to the
505easily-defined beginning, middle or end, which makes it very hard
506to design a scheme that is 100% compatible with
507.Tn SunOS .
508For example,
509the
510.Fn getpwnam
511and
512.Fn getpwuid
513functions in
514.Tn FreeBSD
515are designed to do direct queries to the
488hash database rather than a linear search. This approach is faster
489on systems where the password database is large. However, when
516hash database rather than a linear search.
517This approach is faster
518on systems where the password database is large.
519However, when
490using direct database queries, the system does not know or care
491about the order of the original password file, and therefore
492it cannot easily apply the same override logic used by
493.Tn SunOS .
494.Pp
495Instead,
496.Tn FreeBSD
497groups all the NIS override entries together
520using direct database queries, the system does not know or care
521about the order of the original password file, and therefore
522it cannot easily apply the same override logic used by
523.Tn SunOS .
524.Pp
525Instead,
526.Tn FreeBSD
527groups all the NIS override entries together
498and constructs a filter out of them. Each NIS password entry
528and constructs a filter out of them.
529Each NIS password entry
499is compared against the override filter exactly once and
500treated accordingly: if the filter allows the entry through
501unaltered, it's treated unaltered; if the filter calls for remapping
502of fields, then fields are remapped; if the filter calls for
503explicit exclusion (i.e. the entry matches a '-' override),
504the entry is ignored; if the entry doesn't match against any
505of the filter specifications, it's discarded.
506.Pp

--- 24 unchanged lines hidden (view full) ---

531the password space.
532.El
533.Pp
534In %99 of all
535.Tn FreeBSD
536configurations, NIS client behavior will be
537indistinguishable from that of
538.Tn SunOS
530is compared against the override filter exactly once and
531treated accordingly: if the filter allows the entry through
532unaltered, it's treated unaltered; if the filter calls for remapping
533of fields, then fields are remapped; if the filter calls for
534explicit exclusion (i.e. the entry matches a '-' override),
535the entry is ignored; if the entry doesn't match against any
536of the filter specifications, it's discarded.
537.Pp

--- 24 unchanged lines hidden (view full) ---

562the password space.
563.El
564.Pp
565In %99 of all
566.Tn FreeBSD
567configurations, NIS client behavior will be
568indistinguishable from that of
569.Tn SunOS
539or other similar systems. Even
570or other similar systems.
571Even
540so, users should be aware of these architectural differences.
541.Pp
542.Ss Using groups instead of netgroups for NIS overrides
543.Tn FreeBSD
544offers the capability to do override matching based on
572so, users should be aware of these architectural differences.
573.Pp
574.Ss Using groups instead of netgroups for NIS overrides
575.Tn FreeBSD
576offers the capability to do override matching based on
545user groups rather than netgroups. If, for example, an NIS entry
577user groups rather than netgroups.
578If, for example, an NIS entry
546is specified as:
547.Bd -literal -offset indent
548+@operator:::::::::
549
550.Ed
551the system will first try to match users against a netgroup called
552`operator'. If an `operator' netgroup doesn't exist, the system
553will try to match users against the normal `operator' group

--- 8 unchanged lines hidden (view full) ---

562.It
563In versions prior to 2.0.5, reverse lookups (i.e. using
564.Fn getpwuid )
565would not have overrides applied, which is to say that it
566was possible for
567.Fn getpwuid
568to return a login name that
569.Fn getpwnam
579is specified as:
580.Bd -literal -offset indent
581+@operator:::::::::
582
583.Ed
584the system will first try to match users against a netgroup called
585`operator'. If an `operator' netgroup doesn't exist, the system
586will try to match users against the normal `operator' group

--- 8 unchanged lines hidden (view full) ---

595.It
596In versions prior to 2.0.5, reverse lookups (i.e. using
597.Fn getpwuid )
598would not have overrides applied, which is to say that it
599was possible for
600.Fn getpwuid
601to return a login name that
602.Fn getpwnam
570would not recognize. This has been fixed: overrides specified
603would not recognize.
604This has been fixed: overrides specified
571in
572.Pa /etc/master.passwd
573now apply to all
574.Xr getpwent 3
575functions.
576.It
577Prior to
578.Fx 2.0.5 ,
579netgroup overrides did not work at
580all, largely because
581.Tn FreeBSD
582did not have support for reading
605in
606.Pa /etc/master.passwd
607now apply to all
608.Xr getpwent 3
609functions.
610.It
611Prior to
612.Fx 2.0.5 ,
613netgroup overrides did not work at
614all, largely because
615.Tn FreeBSD
616did not have support for reading
583netgroups through NIS. Again, this has been fixed, and
617netgroups through NIS.
618Again, this has been fixed, and
584netgroups can be specified just as in
585.Tn SunOS
586and similar NIS-capable
587systems.
588.It
589.Tn FreeBSD
590now has NIS server capabilities and supports the use
591of

--- 97 unchanged lines hidden ---
619netgroups can be specified just as in
620.Tn SunOS
621and similar NIS-capable
622systems.
623.It
624.Tn FreeBSD
625now has NIS server capabilities and supports the use
626of

--- 97 unchanged lines hidden ---