*** UNIX MANUAL PAGE BROWSER ***

A Nergahak database for man pages research.

Navigation

Directory Browser

1Browse 4.4BSD4.4BSD
1Browse Digital UNIXDigital UNIX 4.0e
1Browse FreeBSDFreeBSD 14.3
1Browse MINIXMINIX 3.4.0rc6-d5e4fc0
1Browse NetBSDNetBSD 10.1
1Browse OpenBSDOpenBSD 7.7
1Browse UNIX v7Version 7 UNIX
1Browse UNIX v10Version 10 UNIX

Manual Page Search

Manual Page Result

0 Command: authck | Section: 8 | Source: Digital UNIX | File: authck.8.gz
authck(8) System Manager's Manual authck(8) NAME authck - Checks internal consistency of the authentication database (Enhanced Security) SYNOPSIS /tcb/bin/authck [ options ] FLAGS Turns on the -p, -t, and -f flags collectively. Examines the file control database for syntax and value specification errors. Each entry is examined to verify that the syntax is correct and that values such as user names, group names, modes, object types, and other security attributes depending on the system configuration are valid. Checks are also made to ensure that continuation lines are han- dled properly in ascii files and that each entry is terminated with the chkent field. Errors detected in the file control database cannot be corrected by authck since in most cases the command is unable to deter- mine what the entry should contain. Instead, errors are detected and correction of these errors is left to the ISSO. Checks the protected password database. The cross-references between the protected password database and /etc/passwd are checked to make sure that they are mutu- ally consistent. Then fields in the protected password database are checked for reasonable values. For instance, all timestamps of past events are checked to make sure that they have times less than the times returned by time(). Checks the fields in the terminal control database for reasonable values. All timestamps of past events are checked to make sure they have times less than those returned by time(). Provides running diagnostics as the program proceeds. It also produces warnings on unusual conditions that may not cause program er- rors in Trusted Computing Base (TCB) programs. DESCRIPTION The authck program checks both the overall structure and internal field consistency of all components of the authentication database. It re- ports all problems it finds. To invoke this program you must log in as root. EXIT VALUES If authck did not detect any inconsistencies, it exits with a status of 0 (zero). If the user is not authorized, authck exits with a status of 1. If the user specifies the wrong argument syntax, authck exits with a status of 2. Otherwise, authck exits with status equal to the number of inconsistencies found. FILES Specifies the command path. System password file. Protected password database. File control database. Terminal control database. File control database. System defaults database. RELATED INFORMATION Functions: getprdfent(3), getprpwent(3), getprtcent(3), getprfient(3) Files: authcap(4), default(4), files(4), prpasswd(4), ttys(4) delim off authck(8)

Navigation Options