# *REQUIRED*  
# The default PATH settings, for superuser and normal users.
# (they are minimal, add the rest in the shell startup files)
ENV_SUPATH	PATH=/sbin:/bin:/usr/sbin:/usr/bin
ENV_PATH	PATH=/bin:/usr/bin

#   Directory where mailboxes reside, _or_ name of file, relative to the home directory.  
#  If you _do_ define both, MAIL_DIR takes precedence.
MAIL_DIR	/var/spool/mail
#MAIL_FILE	.mail

# Password aging controls:
#	PASS_MAX_DAYS	Maximum number of days a password may be used.
#	PASS_MIN_DAYS	Minimum number of days allowed between password changes.
#	PASS_MIN_LEN	Minimum acceptable password length.
#	PASS_WARN_AGE	Number of days warning given before a password expires.
PASS_MAX_DAYS	99999
PASS_MIN_DAYS	0
#PASS_MIN_LEN	5  *np
PASS_WARN_AGE	7

########## end of required entries #########
# Enable "syslog" logging of su activity - in addition to sulog file logging.
# SYSLOG_SG_ENAB does the same for newgrp and sg.
SYSLOG_SU_ENAB		yes
SYSLOG_SG_ENAB		yes
 
# su activity is log file.
#SULOG_FILE	/var/log/sulog

#Root logins will be allowed only upon these devices.
#full pathname of a file containing device names or
# a ":" delimited list of device names.  
CONSOLE		/etc/securetty

# name of file whose presence which will inhibit non-root logins.  
# The contents of this file should be a message indicating why logins are inhibited.
#NOLOGINS_FILE	/etc/nologin  *np

CONSOLE	console:tty01:tty02:tty03:tty04

# ":" delimited list of "message of the day" files to be displayed upon login.
#MOTD_FILE	/etc/motd  *np
#MOTD_FILE	/etc/motd:/usr/lib/news/news-motd  *np

# file will be output before each login prompt.

# file which inhibits all the usual chatter during the login sequence.  
# If a full pathname, then hushed mode will be enabled if the  user's name or shell are found in the file.  
# If not a full pathname, then hushed mode will be enabled if the file exists in the user's home directory.
HUSHLOGIN_FILE	.hushlogin
#HUSHLOGIN_FILE	/etc/hushlogins

# either a TZ environment parameter spec or the
# fully-rooted pathname of a file containing such a spec.
#ENV_TZ		TZ=CST6CDT  *np
#ENV_TZ		/etc/tzname  *np

ISSUE_FILE	/etc/issue  *np

# file which maps tty line to TERM environment parameter.
# Each line of the file is in a format something like "vt100  tty01".
#TTYTYPE_FILE	/etc/ttytype

# the command name to display when running "su -".  
# For example, if this is defined as "su" then a "ps" will display the
# command is "-su".  
# If not defined, then "ps" would display the
# name of the shell actually being run, e.g. something like "-sh".
SU_NAME		su

# an HZ environment parameter spec.
# for Linux/x86
#ENV_HZ		HZ=100  *np
# For Linux/Alpha...
#ENV_HZ		HZ=1024  *np

# Terminal permissions
#	TTYGROUP	Login tty will be assigned this group ownership.
#	TTYPERM		Login tty will be set to this permission.
# If you have a "write" program which is "setgid" to a special group
# which owns the terminals, define TTYGROUP to the group number and
# TTYPERM to 0620.  Otherwise leave TTYGROUP commented out and assign
# TTYPERM to either 622 or 600.
TTYGROUP	tty
TTYPERM		0600

# Login configuration initializations:
#	ERASECHAR	Terminal ERASE character ('\010' = backspace).
#	KILLCHAR	Terminal KILL character ('\025' = CTRL/U).
#	UMASK		Default "umask" value.
#	ULIMIT		Default "ulimit" value.
# The ERASECHAR and KILLCHAR are used only on System V machines.
# The ULIMIT is used only if the system supports it.
# (now it works with setrlimit too; ulimit is in 512-byte units)
# Prefix these values with "0" to get octal, "0x" to get hexadecimal.
ERASECHAR	0177
KILLCHAR	025
UMASK		022
#ULIMIT		2097152  *np

#
# user must be listed as a member of the first gid 0 group
# in /etc/group (called "root" on most Linux systems) to be able to "su"
# to uid 0 accounts.  If the group doesn't exist or is empty, no one
# will be able to "su" to uid 0.
#SU_WHEEL_ONLY	yes  *np

# If compiled with cracklib support, where are the dictionaries
#CRACKLIB_DICTPATH	/usr/lib/cracklib_dict  *np

# Min/max values for automatic uid selection in useradd
UID_MIN			 1000
UID_MAX			60000

# Min/max values for automatic gid selection in groupadd
GID_MIN			  100
GID_MAX			60000

# Max number of login retries if password is bad
LOGIN_RETRIES		3

# Max time in seconds for login
LOGIN_TIMEOUT		60

# Delay in seconds before being allowed another attempt after a login failure
FAIL_DELAY		3

# Enable logging and display of /var/log/faillog login failure info.
#FAILLOG_ENAB		yes  *np

# Enable display of unknown usernames when login failures are recorded.
LOG_UNKFAIL_ENAB	no

# Enable logging of successful logins
LOG_OK_LOGINS		no

# login failures will be logged here in a utmp format.
# last, when invoked as lastb, will read /var/log/btmp, so...
#FTMP_FILE	/var/log/btmp  *np 

# Enable logging and display of /var/log/lastlog login time info.
#LASTLOG_ENAB		yes  *np

# Enable checking and display of mailbox status upon login.
# Disable if the shell startup files already check for mail
# ("mailx -e" or equivalent).
#MAIL_CHECK_ENAB		no  *np

# Enable checking of time restrictions specified in /etc/porttime.
#PORTTIME_CHECKS_ENAB	yes  *np

# Enable setting of ulimit, umask, and niceness from passwd gecos field.
#QUOTAS_ENAB		yes  *np

# Maximum number of attempts to change password if rejected (too easy)
#PASS_CHANGE_TRIES	5  *np

# Warn about weak passwords (but still allow them) if you are root.
#PASS_ALWAYS_WARN	yes  *np

# Number of significant characters in the password for crypt().
# Default is 8, don't change unless your crypt() is better.
# Ignored if MD5_CRYPT_ENAB set to "yes".
#PASS_MAX_LEN		8  *np

# Require password before chfn/chsh can make any changes.
#CHFN_AUTH		yes  *np

# Which fields may be changed by regular users using chfn  
# any combination of letters "frwh" 
# full name, room number, work  phone, home phone
# If not defined, no changes are allowed.
# For backward compatibility, "yes" = "rwh" and "no" = "frwh".
CHFN_RESTRICT		rwh

# Password prompt (%s will be replaced by user name).
# XXX - it doesn't work correctly yet, for now leave it commented out
# to use the default which is just "Password: ".
#LOGIN_STRING		"%s's Password: "  *np

# If set to "yes", new passwords will be encrypted using the MD5-based
# algorithm compatible with the one used by recent releases of FreeBSD.
# It supports passwords of unlimited length and longer salt strings.
# Set to "no" if you need to copy encrypted passwords to other systems
# which don't understand the new algorithm.  Default is "no".
# Only if compiled with MD5_CRYPT defined:
#MD5_CRYPT_ENAB	yes  *np

# Enable additional checks upon password changes.
#OBSCURE_CHECKS_ENAB	yes  *np

# List of groups to add to the user's supplementary group set
# when logging in on the console (as determined by the CONSOLE setting).  
# Default is none.
#
# Use with caution - it is possible for users to gain permanent
# access to these groups, even when not logged in on the console.
# How to do it is left as an exercise for the reader...
#CONSOLE_GROUPS		floppy:audio:cdrom

# Should login be allowed if we can't cd to the home directory?
# Default in no.
DEFAULT_HOME	yes

# login environment will be read from .
#  Every line should be in the form name=value.
#ENVIRON_FILE	/etc/environment  *np

# this command is run when removing a user.
# It should remove any at/cron/print jobs etc. owned by
# the user to be removed (passed as the first argument).
#USERDEL_CMD	/usr/sbin/userdel_local


# Enable setting of the umask group bits to be the same as owner bits
# (examples: 022 -> 002, 077 -> 007) for non-root users, if the uid is
# the same as gid, and username is the same as the primary group name.
#
# This also enables userdel to remove user groups if no members exist.
USERGROUPS_ENAB yes




# *np 	(NOT SUPPORTED WITH PAM)