svn commit: r53262 - in head/en_US.ISO8859-1/books/handbook: network-servers security

Sergey Kandaurov pluknet at FreeBSD.org
Thu Jul 18 11:31:36 UTC 2019


Author: pluknet
Date: Thu Jul 18 11:31:35 2019
New Revision: 53262
URL: https://svnweb.freebsd.org/changeset/doc/53262

Log:
  Consistent use of /usr/sbin/nologin.
  
  PR:		239121

Modified:
  head/en_US.ISO8859-1/books/handbook/network-servers/chapter.xml
  head/en_US.ISO8859-1/books/handbook/security/chapter.xml

Modified: head/en_US.ISO8859-1/books/handbook/network-servers/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/network-servers/chapter.xml	Wed Jul 17 07:12:10 2019	(r53261)
+++ head/en_US.ISO8859-1/books/handbook/network-servers/chapter.xml	Thu Jul 18 11:31:35 2019	(r53262)
@@ -1802,19 +1802,19 @@ nis_client_enable="YES"</programlisting>
 	<screen>basie&prompt.root; <userinput>cat /etc/master.passwd</userinput>
 root:[password]:0:0::0:0:The super-user:/root:/bin/csh
 toor:[password]:0:0::0:0:The other super-user:/root:/bin/sh
-daemon:*:1:1::0:0:Owner of many system processes:/root:/sbin/nologin
-operator:*:2:5::0:0:System &:/:/sbin/nologin
-bin:*:3:7::0:0:Binaries Commands and Source,,,:/:/sbin/nologin
-tty:*:4:65533::0:0:Tty Sandbox:/:/sbin/nologin
-kmem:*:5:65533::0:0:KMem Sandbox:/:/sbin/nologin
-games:*:7:13::0:0:Games pseudo-user:/usr/games:/sbin/nologin
-news:*:8:8::0:0:News Subsystem:/:/sbin/nologin
-man:*:9:9::0:0:Mister Man Pages:/usr/share/man:/sbin/nologin
-bind:*:53:53::0:0:Bind Sandbox:/:/sbin/nologin
+daemon:*:1:1::0:0:Owner of many system processes:/root:/usr/sbin/nologin
+operator:*:2:5::0:0:System &:/:/usr/sbin/nologin
+bin:*:3:7::0:0:Binaries Commands and Source,,,:/:/usr/sbin/nologin
+tty:*:4:65533::0:0:Tty Sandbox:/:/usr/sbin/nologin
+kmem:*:5:65533::0:0:KMem Sandbox:/:/usr/sbin/nologin
+games:*:7:13::0:0:Games pseudo-user:/usr/games:/usr/sbin/nologin
+news:*:8:8::0:0:News Subsystem:/:/usr/sbin/nologin
+man:*:9:9::0:0:Mister Man Pages:/usr/share/man:/usr/sbin/nologin
+bind:*:53:53::0:0:Bind Sandbox:/:/usr/sbin/nologin
 uucp:*:66:66::0:0:UUCP pseudo-user:/var/spool/uucppublic:/usr/libexec/uucp/uucico
-xten:*:67:67::0:0:X-10 daemon:/usr/local/xten:/sbin/nologin
-pop:*:68:6::0:0:Post Office Owner:/nonexistent:/sbin/nologin
-nobody:*:65534:65534::0:0:Unprivileged user:/nonexistent:/sbin/nologin
+xten:*:67:67::0:0:X-10 daemon:/usr/local/xten:/usr/sbin/nologin
+pop:*:68:6::0:0:Post Office Owner:/nonexistent:/usr/sbin/nologin
+nobody:*:65534:65534::0:0:Unprivileged user:/nonexistent:/usr/sbin/nologin
 -bill:::::::::
 +:::::::::
 
@@ -2075,18 +2075,18 @@ ellington&prompt.user; <userinput>ypcat -k netgroup.by
 	user entries without allowing them to login into the servers.
 	This can be achieved by adding an extra line:</para>
 
-      <programlisting>+:::::::::/sbin/nologin</programlisting>
+      <programlisting>+:::::::::/usr/sbin/nologin</programlisting>
 
       <para>This line configures the client to import all entries but
 	to replace the shell in those entries with
-	<filename>/sbin/nologin</filename>.</para>
+	<filename>/usr/sbin/nologin</filename>.</para>
 
       <!-- Been there, done that, got the scars to prove it - ue -->
       <para>Make sure that extra line is placed
 	<emphasis>after</emphasis>
 	<literal>+ at IT_EMP:::::::::</literal>.  Otherwise, all user
 	accounts imported from <acronym>NIS</acronym> will have
-	<filename>/sbin/nologin</filename> as their login
+	<filename>/usr/sbin/nologin</filename> as their login
 	shell and no one will be able to login to the system.</para>
 
       <para>To configure the less important servers, replace the old
@@ -2095,14 +2095,14 @@ ellington&prompt.user; <userinput>ypcat -k netgroup.by
 
       <programlisting>+ at IT_EMP:::::::::
 + at IT_APP:::::::::
-+:::::::::/sbin/nologin</programlisting>
++:::::::::/usr/sbin/nologin</programlisting>
 
       <para>The corresponding lines for the workstations
 	would be:</para>
 
       <programlisting>+ at IT_EMP:::::::::
 + at USERS:::::::::
-+:::::::::/sbin/nologin</programlisting>
++:::::::::/usr/sbin/nologin</programlisting>
 
       <para>NIS supports the creation of netgroups from other
 	netgroups which can be useful if the policy regarding user
@@ -2134,12 +2134,12 @@ USERBOX   IT_EMP  ITINTERN USERS</programlisting>
 	system contains two lines starting with <quote>+</quote>.
 	The first line adds a netgroup with the accounts allowed to
 	login onto this machine and the second line adds all other
-	accounts with <filename>/sbin/nologin</filename> as shell.  It
-	is recommended to use the <quote>ALL-CAPS</quote> version of
-	the hostname as the name of the netgroup:</para>
+	accounts with <filename>/usr/sbin/nologin</filename> as shell.
+	It is recommended to use the <quote>ALL-CAPS</quote> version
+	of the hostname as the name of the netgroup:</para>
 
       <programlisting>+@<replaceable>BOXNAME</replaceable>:::::::::
-+:::::::::/sbin/nologin</programlisting>
++:::::::::/usr/sbin/nologin</programlisting>
 
       <para>Once this task is completed on all the machines, there is
 	no longer a need to modify the local versions of

Modified: head/en_US.ISO8859-1/books/handbook/security/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/security/chapter.xml	Wed Jul 17 07:12:10 2019	(r53261)
+++ head/en_US.ISO8859-1/books/handbook/security/chapter.xml	Thu Jul 18 11:31:35 2019	(r53262)
@@ -191,7 +191,7 @@
       <screen>&prompt.root; <userinput>pw lock <replaceable>toor</replaceable></userinput></screen>
 
       <para>The second method is to prevent login access by changing
-	the shell to <filename>/sbin/nologin</filename>.  Only the
+	the shell to <filename>/usr/sbin/nologin</filename>.  Only the
 	superuser can change the shell for other users:</para>
 
       <screen>&prompt.root; <userinput>chsh -s /usr/sbin/nologin <replaceable>toor</replaceable></userinput></screen>


More information about the svn-doc-head mailing list