ref: c0a7fbea1f61b1d77a09d612b85c74fd6c673b7c
dir: /sys/man/1/passwd/
.TH PASSWD 1 .SH NAME passwd, netkey \- change or verify user password .SH SYNOPSIS .B passwd [ .IR -1 ] [ .IR username [@ domain ] ] .PP .B netkey .SH DESCRIPTION .I Passwd changes the invoker's Plan 9 password and/or APOP secret. The Plan 9 password is used to login to a terminal while the APOP secret is used for a number of external services: POP3, IMAP, and VPN access. The optional argument specifies the user name and authentication domain to use if different than the one associated with the machine .I passwd is run on. .PP The program first prompts for the old Plan 9 password in the specified domain to establish identity. It then prompts for changes to the password and the secret. New passwords and secrets must be typed twice, to forestall mistakes. New passwords must be sufficiently hard to guess. They may be of any length greater than seven characters. .PP By default, passwd requires the auth server to support .IR dp9ik (6). The .I -1 flag forces .B passwd to authenticate using .IR p9sk1 (6). .PP .I Netkey prompts for a password to encrypt network challenges. It is a substitute for a SecureNet box. It may only be run on a terminal. .SH SOURCE .B /sys/src/cmd/auth/passwd.c .br .B /sys/src/cmd/auth/netkey.c .SH "SEE ALSO" .I readnvram in .IR authsrv (2), .IR encrypt (2), .IR cons (3), .IR auth (8), .IR securenet (8) .PP Robert Morris and Ken Thompson, ``UNIX Password Security,'' .I AT&T Bell Laboratories Technical Journal Vol 63 (1984), pp. 1649-1672 .SH BUGS Now that .I cpu connections are always encrypted, the only good reason to require that these commands be run only on terminals is concern that the CPU server might be subverted.