Switch to SpeakEasy.net DSL

The Modular Manual Browser

Home Page
Manual: (OSF1-V5.1-alpha)
Apropos / Subsearch:
optional field

authck(8)							    authck(8)


  authck - Checks internal consistency of the authentication databases
  (Enhanced Security)


  /tcb/bin/authck [ options ]


  NOTE:	 At least one of the -a, -p, -t, or -f flags is	required.

  -a  Turns on the -p, -t, and -f flags	collectively.

  -f  Examines the file	control	database for syntax and	value specification
      errors. Each entry is examined to	verify that the	syntax is correct and
      that values such as user names, group names, modes, object types,	and
      other security attributes, depending on the system configuration,	are
      valid. Checks are	also made to ensure that continuation lines are	han-
      dled properly in ASCII files and that each entry is terminated with the
      chkent field. Errors detected in the file	control	database cannot	be
      corrected	by authck since	in most	cases the command is unable to deter-
      mine what	the entry should contain. Instead, errors are detected and
      correction of these errors is left to the	system administrator.

  -p  Checks the protected password database (user profiles).  The cross-
      references between the protected password	database and /etc/passwd are
      checked to make sure that	they are mutually consistent.  Then fields in
      the protected password database are checked for reasonable values.  For
      instance,	all timestamps of past events are checked to make sure that
      they have	times less than	the times returned by time().

  -t  Checks the fields	in the terminal	control	database for reasonable
      values.  All timestamps of past events are checked to make sure they
      have times less than those returned by time().

  -v  Provides running diagnostics as the program proceeds.  It	also produces
      warnings on unusual conditions that may not cause	program	errors.


  The authck program checks both the overall structure and internal field
  consistency of all components	of the authentication databases. It reports
  all problems it finds.  To invoke this program you must log in as root.


  If authck did	not detect any inconsistencies,	it exits with a	status of 0
  (zero).  If the user is not authorized, authck exits with a status of	1.
  If the user specifies	the wrong argument syntax, authck exits	with a status
  of 2.	 Otherwise, authck exits with status equal to the number of incon-
  sistencies found.


	     Specifies the command path.

	     System password file.

  /tcb/files/auth.db, /var/tcb/files/auth.db
	     Protected password	database.

	     File control database.

	     Terminal control database.

	     System defaults database.


  Functions: getprdfent(3), getprpwent(3), getprtcent(3), getprfient(3)

  Files: authcap(4), default(4), files(4), prpasswd(4),	ttys(4)