Linux.pl
Opcje wyszukiwania podręcznika man:
Lista stron man zaczynających się od znaku:
A   B   C   D   E   F   G   H   I   J   K   L   M   N   O   P   Q   R   S   T   U   V   W   X   Y   Z   ALPHA   NUM   OTHER   ALL
DOVEADM-PW(1)                       Dovecot                      DOVEADM-PW(1)

NAME
       doveadm-pw - Dovecot's password hash generator and validator

SYNOPSIS
       doveadm [GLOBAL OPTIONS] pw -l

       doveadm  [GLOBAL  OPTIONS] pw [-p password] [-r rounds] [-s scheme] [-u
       user] [-V]

       doveadm [GLOBAL OPTIONS] pw -t hash [-p password] [-u user]

DESCRIPTION
       doveadm pw is used to generate password hashes for  different  password
       scheme s and optionally verify the generated hash.

       All  generated  password  hashes  have  a  {scheme} prefix, for example
       {SHA512-CRYPT.HEX}. All passdbs have a  default  scheme  for  passwords
       stored  without the {scheme} prefix. The default scheme can be overrid-
       den by storing the password with the scheme prefix.

       If you want to use this feature to verify or generate passwords without
       configuring Dovecot first, you can use doveadm -O pw to do so.

GLOBAL OPTIONS
       Global doveadm(1)

       -D

           Enables verbosity and debug messages.

       -O

           Do  not  read any config file, just use defaults. The dovecot_stor-
           age_version setting defaults to the  latest  version,  but  can  be
           overridden with

       -k

           Preserve  entire  environment for doveadm, not just import_environ-
           ment setting.

       -v

           Enables verbosity, including progress counter.

       -i instance-name

           If using multiple Dovecot instances, choose the config  file  based
           on this instance name.

           See instance_name setting for more information.

       -c config-file

           Read  configuration from the given config-file. By default it first
           reads config socket, and  then  falls  back  to  /etc/dovecot/dove-
           cot.conf. You can also point this to config socket of some instance
           running compatible version.

       -o setting=value

           Overrides the configuration setting from  /etc/dovecot/dovecot.conf
           and from the userdb with the given value. In order to override mul-
           tiple settings, the -o option may be specified multiple times.

OPTIONS
       -l

           List all supported password scheme s and exit successfully.

           There are up to three optional password schemes:  BLF-CRYPT  (Blow-
           fish  crypt), SHA256-CRYPT and SHA512-CRYPT. Their availability de-
           pends on the system's currently used libc.

       -p password

            was given doveadm(1) will prompt interactively  for  one.  (Beware
           that  using  this  option  means the plain text password will be in
           your shell history!)

       -r rounds

           The password scheme s BLF-CRYPT, SHA256-CRYPT and SHA512-CRYPT sup-
           ports  a  variable number of encryption rounds. The following table
           shows the minimum/maximum number of encryption rounds  per  scheme.
           When  the  -r  option  was omitted the default number of encryption
           rounds will be applied.

           | Scheme | Minimum | Maximum | Default  |  |  ------  |  -------  |
           -------  |  -------  |  | BLF-CRYPT | 4 | 31 | 5 | | SHA256-CRYPT |
           1000 | 999999999 | 5000 | | SHA512-CRYPT | 1000 | 999999999 |  5000
           |

       -s scheme

           The  password  scheme  which  should be used to generate the hashed
           password. By default the CRYPT scheme will be used (with  the  $2y$
           bcrypt format). It is also possible to append an encoding suffix to
           the scheme. Supported encoding  suffixes  are:  .b64,  .base64  and
           .hex.

           See also password_schemes for more details about password schemes.

       -t hash

            option. When no password was specified, doveadm(1) will prompt in-
           teractively for one.

       -u user

            name must also be given, because the user name is a  part  of  the
           generated  hash.  For more information about Digest-MD5 please read
           also auth_digest_md5. For other schemes, this is not required.

       -V

           When this option is given, the hashed password will  be  internally
           verified.  The  result  of the verification will be shown after the
           hashed password, enclosed in parenthesis.

EXAMPLE
       An ARGON2ID hash (best security at time of this writing, though can  be
       heavy on a busy server):

         doveadm pw -s ARGON2ID
         ``ldas;l;als;las;lkas

       Enter    new    password:    Retype    new   password:   {ARGON2ID}$ar-
       gon2id$v=19$m=65536,t=3,p=1$AOrrkaFmGxCFtX+NCSHFkg$N3rlzYFqyNkCwrO-
       ingnDJ/qDQ09yGHgQa8PQfbu7rIE

         Alternatively, a SHA512-CRYPT hash:

         ```sh
         doveadm pw -s SHA512-CRYPT

         Enter new password:
         Retype new password:
         {SHA512-CRYPT}$6$qAvxfQ2UbA1QTXSg$SB2aMEK76DBObt.KqTjF5.yDMceaD3dkG2UvrKQD0rZ9PKii/VAn.VS0nBsDqJX18kXieMi8AWJr0f7Ae9dAp/

REPORTING BUGS
       Report  bugs, including doveconf -n output, to the Dovecot Mailing List
       <dovecot@dovecot.org>. Information about reporting  bugs  is  available
       at: https://dovecot.org/bugreport.html

SEE ALSO
       doveadm(1)

78ffb79                           March 2025                     DOVEADM-PW(1)

Czas wygenerowania: 0.00012 sek.


Created with the man page lookup class by Andrew Collington.
Based on a C man page viewer by Vadim Pavlov
Unicode soft-hyphen fix (as used by RedHat) by Dan Edwards
Some optimisations by Eli Argon
Caching idea and code contribution by James Richardson

Copyright © 2003-2025 Linux.pl
Hosted by Hosting Linux.pl