mirror of
https://github.com/sudo-project/sudo.git
synced 2025-08-30 13:58:05 +00:00
Be very clear that the password required is the user's not root's
This commit is contained in:
74
sudo.cat
74
sudo.cat
@@ -17,7 +17,12 @@ DDDDEEEESSSSCCCCRRRRIIIIPPPPTTTTIIIIOOOONNNN
|
|||||||
file. The real and effective uid and gid are set to match
|
file. The real and effective uid and gid are set to match
|
||||||
those of the target user as specified in the passwd file
|
those of the target user as specified in the passwd file
|
||||||
(the group vector is also initialized when the target user
|
(the group vector is also initialized when the target user
|
||||||
is not root).
|
is not root). By default, ssssuuuuddddoooo requires that users
|
||||||
|
authenticate themselves with a password (NOTE: this is the
|
||||||
|
user's password, not the root password). Once a user has
|
||||||
|
been authenticated, a timestamp is updated and the user
|
||||||
|
may then use sudo without a password for a short period of
|
||||||
|
time (five minutes by default).
|
||||||
|
|
||||||
ssssuuuuddddoooo determines who is an authorized user by consulting
|
ssssuuuuddddoooo determines who is an authorized user by consulting
|
||||||
the file _/_e_t_c_/_s_u_d_o_e_r_s. By giving ssssuuuuddddoooo the -v flag a user
|
the file _/_e_t_c_/_s_u_d_o_e_r_s. By giving ssssuuuuddddoooo the -v flag a user
|
||||||
@@ -53,15 +58,10 @@ OOOOPPPPTTTTIIIIOOOONNNNSSSS
|
|||||||
with a short description for each. This option is
|
with a short description for each. This option is
|
||||||
useful in conjunction with _g_r_e_p(1).
|
useful in conjunction with _g_r_e_p(1).
|
||||||
|
|
||||||
-h The -h (_h_e_l_p) option causes ssssuuuuddddoooo to print a usage
|
|
||||||
message and exit.
|
|
||||||
|
|
||||||
-v If given the -v (_v_a_l_i_d_a_t_e) option, ssssuuuuddddoooo will update
|
|
||||||
the user's timestamp, prompting for the user's
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
15/Nov/1999 1.6 1
|
22/Nov/1999 1.6 1
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -70,6 +70,11 @@ OOOOPPPPTTTTIIIIOOOONNNNSSSS
|
|||||||
sudo(8) MAINTENANCE COMMANDS sudo(8)
|
sudo(8) MAINTENANCE COMMANDS sudo(8)
|
||||||
|
|
||||||
|
|
||||||
|
-h The -h (_h_e_l_p) option causes ssssuuuuddddoooo to print a usage
|
||||||
|
message and exit.
|
||||||
|
|
||||||
|
-v If given the -v (_v_a_l_i_d_a_t_e) option, ssssuuuuddddoooo will update
|
||||||
|
the user's timestamp, prompting for the user's
|
||||||
password if necessary. This extends the ssssuuuuddddoooo timeout
|
password if necessary. This extends the ssssuuuuddddoooo timeout
|
||||||
to for another N minutes (where N is defined at
|
to for another N minutes (where N is defined at
|
||||||
installation time and defaults to 5 minutes) but does
|
installation time and defaults to 5 minutes) but does
|
||||||
@@ -119,15 +124,10 @@ RRRREEEETTTTUUUURRRRNNNN VVVVAAAALLLLUUUUEEEES
|
|||||||
configuration/permission problem or if ssssuuuuddddoooo cannot execute
|
configuration/permission problem or if ssssuuuuddddoooo cannot execute
|
||||||
the given command. In the latter case the error string is
|
the given command. In the latter case the error string is
|
||||||
printed to stderr. If ssssuuuuddddoooo cannot _s_t_a_t(2) one or more
|
printed to stderr. If ssssuuuuddddoooo cannot _s_t_a_t(2) one or more
|
||||||
entries in the user's PATH an error is printed on stderr.
|
|
||||||
(If the directory does not exist or if it is not really a
|
|
||||||
directory, the entry is ignored and no error is printed.)
|
|
||||||
This should not happen under normal circumstances. The
|
|
||||||
most common reason for _s_t_a_t(2) to return "permission
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
15/Nov/1999 1.6 2
|
22/Nov/1999 1.6 2
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -136,6 +136,11 @@ RRRREEEETTTTUUUURRRRNNNN VVVVAAAALLLLUUUUEEEES
|
|||||||
sudo(8) MAINTENANCE COMMANDS sudo(8)
|
sudo(8) MAINTENANCE COMMANDS sudo(8)
|
||||||
|
|
||||||
|
|
||||||
|
entries in the user's PATH an error is printed on stderr.
|
||||||
|
(If the directory does not exist or if it is not really a
|
||||||
|
directory, the entry is ignored and no error is printed.)
|
||||||
|
This should not happen under normal circumstances. The
|
||||||
|
most common reason for _s_t_a_t(2) to return "permission
|
||||||
denied" is if you are running an automounter and one of
|
denied" is if you are running an automounter and one of
|
||||||
the directories in your PATH is on a machine that is
|
the directories in your PATH is on a machine that is
|
||||||
currently unreachable.
|
currently unreachable.
|
||||||
@@ -185,15 +190,10 @@ SSSSEEEECCCCUUUURRRRIIIITTTTYYYY NNNNOOOOTTTTE
|
|||||||
|
|
||||||
ssssuuuuddddoooo will not honor timestamps set far in the future.
|
ssssuuuuddddoooo will not honor timestamps set far in the future.
|
||||||
Timestamps with a date greater than current_time + 2 *
|
Timestamps with a date greater than current_time + 2 *
|
||||||
TIMEOUT will be ignored and sudo will log and complain.
|
|
||||||
This is done to keep a user from creating his/her own
|
|
||||||
timestamp with a bogus date on system that allow users to
|
|
||||||
give away files.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
22/Nov/1999 1.6 3
|
||||||
15/Nov/1999 1.6 3
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -202,6 +202,11 @@ SSSSEEEECCCCUUUURRRRIIIITTTTYYYY NNNNOOOOTTTTE
|
|||||||
sudo(8) MAINTENANCE COMMANDS sudo(8)
|
sudo(8) MAINTENANCE COMMANDS sudo(8)
|
||||||
|
|
||||||
|
|
||||||
|
TIMEOUT will be ignored and sudo will log and complain.
|
||||||
|
This is done to keep a user from creating his/her own
|
||||||
|
timestamp with a bogus date on system that allow users to
|
||||||
|
give away files.
|
||||||
|
|
||||||
EEEEXXXXAAAAMMMMPPPPLLLLEEEESSSS
|
EEEEXXXXAAAAMMMMPPPPLLLLEEEESSSS
|
||||||
Note: the following examples assume suitable _s_u_d_o_e_r_s(5)
|
Note: the following examples assume suitable _s_u_d_o_e_r_s(5)
|
||||||
entries.
|
entries.
|
||||||
@@ -250,16 +255,11 @@ EEEENNNNVVVVIIIIRRRROOOONNNNMMMMEEEENNNNTTTT
|
|||||||
|
|
||||||
|
|
||||||
FFFFIIIILLLLEEEESSSS
|
FFFFIIIILLLLEEEESSSS
|
||||||
/etc/sudoers List of who can run what
|
|
||||||
/var/run/sudo Directory containing timestamps
|
|
||||||
|
|
||||||
ssssuuuuddddoooo utilizes the following environment variables:
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
22/Nov/1999 1.6 4
|
||||||
15/Nov/1999 1.6 4
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -268,6 +268,11 @@ FFFFIIIILLLLEEEESSSS
|
|||||||
sudo(8) MAINTENANCE COMMANDS sudo(8)
|
sudo(8) MAINTENANCE COMMANDS sudo(8)
|
||||||
|
|
||||||
|
|
||||||
|
/etc/sudoers List of who can run what
|
||||||
|
/var/run/sudo Directory containing timestamps
|
||||||
|
|
||||||
|
ssssuuuuddddoooo utilizes the following environment variables:
|
||||||
|
|
||||||
PATH Set to a sane value if SECURE_PATH is set
|
PATH Set to a sane value if SECURE_PATH is set
|
||||||
SHELL Used to determine shell to run with -s option
|
SHELL Used to determine shell to run with -s option
|
||||||
USER Set to the target user (root unless the -u option
|
USER Set to the target user (root unless the -u option
|
||||||
@@ -317,15 +322,10 @@ CCCCAAAAVVVVEEEEAAAATTTTSSSS
|
|||||||
|
|
||||||
If users have sudo ALL there is nothing to prevent them
|
If users have sudo ALL there is nothing to prevent them
|
||||||
from creating their own program that gives them a root
|
from creating their own program that gives them a root
|
||||||
shell regardless of any '!' elements in the user
|
|
||||||
specification.
|
|
||||||
|
|
||||||
Running shell scripts via ssssuuuuddddoooo can expose the same kernel
|
|
||||||
bugs that make setuid shell scripts unsafe on some
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
15/Nov/1999 1.6 5
|
22/Nov/1999 1.6 5
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -334,6 +334,11 @@ CCCCAAAAVVVVEEEEAAAATTTTSSSS
|
|||||||
sudo(8) MAINTENANCE COMMANDS sudo(8)
|
sudo(8) MAINTENANCE COMMANDS sudo(8)
|
||||||
|
|
||||||
|
|
||||||
|
shell regardless of any '!' elements in the user
|
||||||
|
specification.
|
||||||
|
|
||||||
|
Running shell scripts via ssssuuuuddddoooo can expose the same kernel
|
||||||
|
bugs that make setuid shell scripts unsafe on some
|
||||||
operating systems (if your OS supports the /dev/fd/
|
operating systems (if your OS supports the /dev/fd/
|
||||||
directory, setuid shell scripts are generally safe).
|
directory, setuid shell scripts are generally safe).
|
||||||
|
|
||||||
@@ -386,11 +391,6 @@ SSSSEEEEEEEE AAAALLLLSSSSOOOO
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
22/Nov/1999 1.6 6
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
15/Nov/1999 1.6 6
|
|
||||||
|
|
||||||
|
|
||||||
|
@@ -50,7 +50,11 @@ sudo - execute a command as another user
|
|||||||
<STRONG>sudo</STRONG> allows a permitted user to execute a <EM>command</EM> as the superuser or another user, as specified in the sudoers file. The
|
<STRONG>sudo</STRONG> allows a permitted user to execute a <EM>command</EM> as the superuser or another user, as specified in the sudoers file. The
|
||||||
real and effective uid and gid are set to match those of the target user as
|
real and effective uid and gid are set to match those of the target user as
|
||||||
specified in the passwd file (the group vector is also initialized when the
|
specified in the passwd file (the group vector is also initialized when the
|
||||||
target user is not root).
|
target user is not root). By default, <STRONG>sudo</STRONG>
|
||||||
|
requires that users authenticate themselves with a password (NOTE: this is
|
||||||
|
the user's password, not the root password). Once a user has been
|
||||||
|
authenticated, a timestamp is updated and the user may then use sudo
|
||||||
|
without a password for a short period of time (five minutes by default).
|
||||||
|
|
||||||
<P>
|
<P>
|
||||||
<STRONG>sudo</STRONG> determines who is an authorized user by consulting the file <EM>/etc/sudoers</EM>. By giving <STRONG>sudo</STRONG> the <CODE>-v</CODE> flag a user can update the time stamp without running a <EM>command.</EM>
|
<STRONG>sudo</STRONG> determines who is an authorized user by consulting the file <EM>/etc/sudoers</EM>. By giving <STRONG>sudo</STRONG> the <CODE>-v</CODE> flag a user can update the time stamp without running a <EM>command.</EM>
|
||||||
|
13
sudo.man
13
sudo.man
@@ -2,8 +2,8 @@
|
|||||||
''' $RCSfile$$Revision$$Date$
|
''' $RCSfile$$Revision$$Date$
|
||||||
'''
|
'''
|
||||||
''' $Log$
|
''' $Log$
|
||||||
''' Revision 1.39 1999/11/16 05:42:28 millert
|
''' Revision 1.40 1999/11/23 05:43:16 millert
|
||||||
''' get rid of references to sudo-bugs. Now mention the web site or the sudo@ alias
|
''' Be very clear that the password required is the user's not root's
|
||||||
'''
|
'''
|
||||||
'''
|
'''
|
||||||
.de Sh
|
.de Sh
|
||||||
@@ -96,7 +96,7 @@
|
|||||||
.nr % 0
|
.nr % 0
|
||||||
.rr F
|
.rr F
|
||||||
.\}
|
.\}
|
||||||
.TH sudo 8 "1.6" "15/Nov/1999" "MAINTENANCE COMMANDS"
|
.TH sudo 8 "1.6" "22/Nov/1999" "MAINTENANCE COMMANDS"
|
||||||
.UC
|
.UC
|
||||||
.if n .hy 0
|
.if n .hy 0
|
||||||
.if n .na
|
.if n .na
|
||||||
@@ -200,7 +200,12 @@ sudo \- execute a command as another user
|
|||||||
superuser or another user, as specified in the sudoers file. The
|
superuser or another user, as specified in the sudoers file. The
|
||||||
real and effective uid and gid are set to match those of the target
|
real and effective uid and gid are set to match those of the target
|
||||||
user as specified in the passwd file (the group vector is also
|
user as specified in the passwd file (the group vector is also
|
||||||
initialized when the target user is not root).
|
initialized when the target user is not root). By default, \fBsudo\fR
|
||||||
|
requires that users authenticate themselves with a password
|
||||||
|
(NOTE: this is the user's password, not the root password). Once
|
||||||
|
a user has been authenticated, a timestamp is updated and the
|
||||||
|
user may then use sudo without a password for a short period of time
|
||||||
|
(five minutes by default).
|
||||||
.PP
|
.PP
|
||||||
\fBsudo\fR determines who is an authorized user by consulting the
|
\fBsudo\fR determines who is an authorized user by consulting the
|
||||||
file \fI/etc/sudoers\fR. By giving \fBsudo\fR the \f(CW-v\fR flag a user
|
file \fI/etc/sudoers\fR. By giving \fBsudo\fR the \f(CW-v\fR flag a user
|
||||||
|
7
sudo.pod
7
sudo.pod
@@ -50,7 +50,12 @@ B<sudo> allows a permitted user to execute a I<command> as the
|
|||||||
superuser or another user, as specified in the sudoers file. The
|
superuser or another user, as specified in the sudoers file. The
|
||||||
real and effective uid and gid are set to match those of the target
|
real and effective uid and gid are set to match those of the target
|
||||||
user as specified in the passwd file (the group vector is also
|
user as specified in the passwd file (the group vector is also
|
||||||
initialized when the target user is not root).
|
initialized when the target user is not root). By default, B<sudo>
|
||||||
|
requires that users authenticate themselves with a password
|
||||||
|
(NOTE: this is the user's password, not the root password). Once
|
||||||
|
a user has been authenticated, a timestamp is updated and the
|
||||||
|
user may then use sudo without a password for a short period of time
|
||||||
|
(five minutes by default).
|
||||||
|
|
||||||
B<sudo> determines who is an authorized user by consulting the
|
B<sudo> determines who is an authorized user by consulting the
|
||||||
file F</etc/sudoers>. By giving B<sudo> the C<-v> flag a user
|
file F</etc/sudoers>. By giving B<sudo> the C<-v> flag a user
|
||||||
|
Reference in New Issue
Block a user