ftpd.8 (22989) | ftpd.8 (24242) |
---|---|
1.\" Copyright (c) 1985, 1988, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 16 unchanged lines hidden (view full) --- 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" @(#)ftpd.8 8.2 (Berkeley) 4/19/94 | 1.\" Copyright (c) 1985, 1988, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 16 unchanged lines hidden (view full) --- 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" @(#)ftpd.8 8.2 (Berkeley) 4/19/94 |
33.\" $Id$ | 33.\" $Id: ftpd.8,v 1.13 1997/02/22 14:21:27 peter Exp $ |
34.\" 35.Dd April 19, 1994 36.Dt FTPD 8 37.Os BSD 4.2 38.Sh NAME 39.Nm ftpd 40.Nd 41Internet File Transfer Protocol server --- 198 unchanged lines hidden (view full) --- 240This allows users to utilize the metacharacters 241.Dq Li \&*?[]{}~ . 242.Pp 243.Nm Ftpd 244authenticates users according to five rules. 245.Pp 246.Bl -enum -offset indent 247.It | 34.\" 35.Dd April 19, 1994 36.Dt FTPD 8 37.Os BSD 4.2 38.Sh NAME 39.Nm ftpd 40.Nd 41Internet File Transfer Protocol server --- 198 unchanged lines hidden (view full) --- 240This allows users to utilize the metacharacters 241.Dq Li \&*?[]{}~ . 242.Pp 243.Nm Ftpd 244authenticates users according to five rules. 245.Pp 246.Bl -enum -offset indent 247.It |
248The login name must be in the password data base, 249.Pa /etc/pwd.db , | 248The login name must be in the password data base |
250and not have a null password. 251In this case a password must be provided by the client before any 252file operations may be performed. 253If the user has an S/Key key, the response from a successful USER 254command will include an S/Key challenge. The client may choose to respond 255with a PASS command giving either a standard password or an S/Key 256one-time password. The server will automatically determine which type of 257password it has been given and attempt to authenticate accordingly. See --- 122 unchanged lines hidden --- | 249and not have a null password. 250In this case a password must be provided by the client before any 251file operations may be performed. 252If the user has an S/Key key, the response from a successful USER 253command will include an S/Key challenge. The client may choose to respond 254with a PASS command giving either a standard password or an S/Key 255one-time password. The server will automatically determine which type of 256password it has been given and attempt to authenticate accordingly. See --- 122 unchanged lines hidden --- |