summaryrefslogtreecommitdiffstats
path: root/upstream/fedora-40/man5/securetty.5
diff options
context:
space:
mode:
Diffstat (limited to 'upstream/fedora-40/man5/securetty.5')
-rw-r--r--upstream/fedora-40/man5/securetty.535
1 files changed, 35 insertions, 0 deletions
diff --git a/upstream/fedora-40/man5/securetty.5 b/upstream/fedora-40/man5/securetty.5
new file mode 100644
index 00000000..279a81d6
--- /dev/null
+++ b/upstream/fedora-40/man5/securetty.5
@@ -0,0 +1,35 @@
+.\" Copyright (c) 1993 Michael Haardt (michael@moria.de),
+.\" Fri Apr 2 11:32:09 MET DST 1993
+.\"
+.\" SPDX-License-Identifier: GPL-2.0-or-later
+.\"
+.\" Modified Sun Jul 25 11:06:27 1993 by Rik Faith (faith@cs.unc.edu)
+.TH securetty 5 2023-10-31 "Linux man-pages 6.06"
+.SH NAME
+securetty \- list of terminals on which root is allowed to login
+.SH DESCRIPTION
+The file
+.I /etc/securetty
+contains the names of terminals
+(one per line, without leading
+.IR /dev/ )
+which are considered secure for the transmission of certain authentication
+tokens.
+.P
+It is used by (some versions of)
+.BR login (1)
+to restrict the terminals
+on which root is allowed to login.
+See
+.BR login.defs (5)
+if you use the shadow suite.
+.P
+On PAM enabled systems, it is used for the same purpose by
+.BR pam_securetty (8)
+to restrict the terminals on which empty passwords are accepted.
+.SH FILES
+.I /etc/securetty
+.SH SEE ALSO
+.BR login (1),
+.BR login.defs (5),
+.BR pam_securetty (8)