2
0
mirror of https://github.com/sudo-project/sudo.git synced 2025-08-30 13:58:05 +00:00

Be very clear that the password required is the user's not root's

This commit is contained in:
Todd C. Miller
1999-11-23 05:43:16 +00:00
parent c977b43ca6
commit 1f0fa1814b
4 changed files with 57 additions and 43 deletions

View File

@@ -17,7 +17,12 @@ DDDDEEEESSSSCCCCRRRRIIIIPPPPTTTTIIIIOOOONNNN
file. The real and effective uid and gid are set to match file. The real and effective uid and gid are set to match
those of the target user as specified in the passwd file those of the target user as specified in the passwd file
(the group vector is also initialized when the target user (the group vector is also initialized when the target user
is not root). is not root). By default, ssssuuuuddddoooo requires that users
authenticate themselves with a password (NOTE: this is the
user's password, not the root password). Once a user has
been authenticated, a timestamp is updated and the user
may then use sudo without a password for a short period of
time (five minutes by default).
ssssuuuuddddoooo determines who is an authorized user by consulting ssssuuuuddddoooo determines who is an authorized user by consulting
the file _/_e_t_c_/_s_u_d_o_e_r_s. By giving ssssuuuuddddoooo the -v flag a user the file _/_e_t_c_/_s_u_d_o_e_r_s. By giving ssssuuuuddddoooo the -v flag a user
@@ -53,15 +58,10 @@ OOOOPPPPTTTTIIIIOOOONNNNSSSS
with a short description for each. This option is with a short description for each. This option is
useful in conjunction with _g_r_e_p(1). useful in conjunction with _g_r_e_p(1).
-h The -h (_h_e_l_p) option causes ssssuuuuddddoooo to print a usage
message and exit.
-v If given the -v (_v_a_l_i_d_a_t_e) option, ssssuuuuddddoooo will update
the user's timestamp, prompting for the user's
15/Nov/1999 1.6 1 22/Nov/1999 1.6 1
@@ -70,6 +70,11 @@ OOOOPPPPTTTTIIIIOOOONNNNSSSS
sudo(8) MAINTENANCE COMMANDS sudo(8) sudo(8) MAINTENANCE COMMANDS sudo(8)
-h The -h (_h_e_l_p) option causes ssssuuuuddddoooo to print a usage
message and exit.
-v If given the -v (_v_a_l_i_d_a_t_e) option, ssssuuuuddddoooo will update
the user's timestamp, prompting for the user's
password if necessary. This extends the ssssuuuuddddoooo timeout password if necessary. This extends the ssssuuuuddddoooo timeout
to for another N minutes (where N is defined at to for another N minutes (where N is defined at
installation time and defaults to 5 minutes) but does installation time and defaults to 5 minutes) but does
@@ -119,15 +124,10 @@ RRRREEEETTTTUUUURRRRNNNN VVVVAAAALLLLUUUUEEEES
configuration/permission problem or if ssssuuuuddddoooo cannot execute configuration/permission problem or if ssssuuuuddddoooo cannot execute
the given command. In the latter case the error string is the given command. In the latter case the error string is
printed to stderr. If ssssuuuuddddoooo cannot _s_t_a_t(2) one or more printed to stderr. If ssssuuuuddddoooo cannot _s_t_a_t(2) one or more
entries in the user's PATH an error is printed on stderr.
(If the directory does not exist or if it is not really a
directory, the entry is ignored and no error is printed.)
This should not happen under normal circumstances. The
most common reason for _s_t_a_t(2) to return "permission
15/Nov/1999 1.6 2 22/Nov/1999 1.6 2
@@ -136,6 +136,11 @@ RRRREEEETTTTUUUURRRRNNNN VVVVAAAALLLLUUUUEEEES
sudo(8) MAINTENANCE COMMANDS sudo(8) sudo(8) MAINTENANCE COMMANDS sudo(8)
entries in the user's PATH an error is printed on stderr.
(If the directory does not exist or if it is not really a
directory, the entry is ignored and no error is printed.)
This should not happen under normal circumstances. The
most common reason for _s_t_a_t(2) to return "permission
denied" is if you are running an automounter and one of denied" is if you are running an automounter and one of
the directories in your PATH is on a machine that is the directories in your PATH is on a machine that is
currently unreachable. currently unreachable.
@@ -185,15 +190,10 @@ SSSSEEEECCCCUUUURRRRIIIITTTTYYYY NNNNOOOOTTTTE
ssssuuuuddddoooo will not honor timestamps set far in the future. ssssuuuuddddoooo will not honor timestamps set far in the future.
Timestamps with a date greater than current_time + 2 * Timestamps with a date greater than current_time + 2 *
TIMEOUT will be ignored and sudo will log and complain.
This is done to keep a user from creating his/her own
timestamp with a bogus date on system that allow users to
give away files.
22/Nov/1999 1.6 3
15/Nov/1999 1.6 3
@@ -202,6 +202,11 @@ SSSSEEEECCCCUUUURRRRIIIITTTTYYYY NNNNOOOOTTTTE
sudo(8) MAINTENANCE COMMANDS sudo(8) sudo(8) MAINTENANCE COMMANDS sudo(8)
TIMEOUT will be ignored and sudo will log and complain.
This is done to keep a user from creating his/her own
timestamp with a bogus date on system that allow users to
give away files.
EEEEXXXXAAAAMMMMPPPPLLLLEEEESSSS EEEEXXXXAAAAMMMMPPPPLLLLEEEESSSS
Note: the following examples assume suitable _s_u_d_o_e_r_s(5) Note: the following examples assume suitable _s_u_d_o_e_r_s(5)
entries. entries.
@@ -250,16 +255,11 @@ EEEENNNNVVVVIIIIRRRROOOONNNNMMMMEEEENNNNTTTT
FFFFIIIILLLLEEEESSSS FFFFIIIILLLLEEEESSSS
/etc/sudoers List of who can run what
/var/run/sudo Directory containing timestamps
ssssuuuuddddoooo utilizes the following environment variables:
22/Nov/1999 1.6 4
15/Nov/1999 1.6 4
@@ -268,6 +268,11 @@ FFFFIIIILLLLEEEESSSS
sudo(8) MAINTENANCE COMMANDS sudo(8) sudo(8) MAINTENANCE COMMANDS sudo(8)
/etc/sudoers List of who can run what
/var/run/sudo Directory containing timestamps
ssssuuuuddddoooo utilizes the following environment variables:
PATH Set to a sane value if SECURE_PATH is set PATH Set to a sane value if SECURE_PATH is set
SHELL Used to determine shell to run with -s option SHELL Used to determine shell to run with -s option
USER Set to the target user (root unless the -u option USER Set to the target user (root unless the -u option
@@ -317,15 +322,10 @@ CCCCAAAAVVVVEEEEAAAATTTTSSSS
If users have sudo ALL there is nothing to prevent them If users have sudo ALL there is nothing to prevent them
from creating their own program that gives them a root from creating their own program that gives them a root
shell regardless of any '!' elements in the user
specification.
Running shell scripts via ssssuuuuddddoooo can expose the same kernel
bugs that make setuid shell scripts unsafe on some
15/Nov/1999 1.6 5 22/Nov/1999 1.6 5
@@ -334,6 +334,11 @@ CCCCAAAAVVVVEEEEAAAATTTTSSSS
sudo(8) MAINTENANCE COMMANDS sudo(8) sudo(8) MAINTENANCE COMMANDS sudo(8)
shell regardless of any '!' elements in the user
specification.
Running shell scripts via ssssuuuuddddoooo can expose the same kernel
bugs that make setuid shell scripts unsafe on some
operating systems (if your OS supports the /dev/fd/ operating systems (if your OS supports the /dev/fd/
directory, setuid shell scripts are generally safe). directory, setuid shell scripts are generally safe).
@@ -386,11 +391,6 @@ SSSSEEEEEEEE AAAALLLLSSSSOOOO
22/Nov/1999 1.6 6
15/Nov/1999 1.6 6

View File

@@ -50,7 +50,11 @@ sudo - execute a command as another user
<STRONG>sudo</STRONG> allows a permitted user to execute a <EM>command</EM> as the superuser or another user, as specified in the sudoers file. The <STRONG>sudo</STRONG> allows a permitted user to execute a <EM>command</EM> as the superuser or another user, as specified in the sudoers file. The
real and effective uid and gid are set to match those of the target user as real and effective uid and gid are set to match those of the target user as
specified in the passwd file (the group vector is also initialized when the specified in the passwd file (the group vector is also initialized when the
target user is not root). target user is not root). By default, <STRONG>sudo</STRONG>
requires that users authenticate themselves with a password (NOTE: this is
the user's password, not the root password). Once a user has been
authenticated, a timestamp is updated and the user may then use sudo
without a password for a short period of time (five minutes by default).
<P> <P>
<STRONG>sudo</STRONG> determines who is an authorized user by consulting the file <EM>/etc/sudoers</EM>. By giving <STRONG>sudo</STRONG> the <CODE>-v</CODE> flag a user can update the time stamp without running a <EM>command.</EM> <STRONG>sudo</STRONG> determines who is an authorized user by consulting the file <EM>/etc/sudoers</EM>. By giving <STRONG>sudo</STRONG> the <CODE>-v</CODE> flag a user can update the time stamp without running a <EM>command.</EM>

View File

@@ -2,8 +2,8 @@
''' $RCSfile$$Revision$$Date$ ''' $RCSfile$$Revision$$Date$
''' '''
''' $Log$ ''' $Log$
''' Revision 1.39 1999/11/16 05:42:28 millert ''' Revision 1.40 1999/11/23 05:43:16 millert
''' get rid of references to sudo-bugs. Now mention the web site or the sudo@ alias ''' Be very clear that the password required is the user's not root's
''' '''
''' '''
.de Sh .de Sh
@@ -96,7 +96,7 @@
.nr % 0 .nr % 0
.rr F .rr F
.\} .\}
.TH sudo 8 "1.6" "15/Nov/1999" "MAINTENANCE COMMANDS" .TH sudo 8 "1.6" "22/Nov/1999" "MAINTENANCE COMMANDS"
.UC .UC
.if n .hy 0 .if n .hy 0
.if n .na .if n .na
@@ -200,7 +200,12 @@ sudo \- execute a command as another user
superuser or another user, as specified in the sudoers file. The superuser or another user, as specified in the sudoers file. The
real and effective uid and gid are set to match those of the target real and effective uid and gid are set to match those of the target
user as specified in the passwd file (the group vector is also user as specified in the passwd file (the group vector is also
initialized when the target user is not root). initialized when the target user is not root). By default, \fBsudo\fR
requires that users authenticate themselves with a password
(NOTE: this is the user's password, not the root password). Once
a user has been authenticated, a timestamp is updated and the
user may then use sudo without a password for a short period of time
(five minutes by default).
.PP .PP
\fBsudo\fR determines who is an authorized user by consulting the \fBsudo\fR determines who is an authorized user by consulting the
file \fI/etc/sudoers\fR. By giving \fBsudo\fR the \f(CW-v\fR flag a user file \fI/etc/sudoers\fR. By giving \fBsudo\fR the \f(CW-v\fR flag a user

View File

@@ -50,7 +50,12 @@ B<sudo> allows a permitted user to execute a I<command> as the
superuser or another user, as specified in the sudoers file. The superuser or another user, as specified in the sudoers file. The
real and effective uid and gid are set to match those of the target real and effective uid and gid are set to match those of the target
user as specified in the passwd file (the group vector is also user as specified in the passwd file (the group vector is also
initialized when the target user is not root). initialized when the target user is not root). By default, B<sudo>
requires that users authenticate themselves with a password
(NOTE: this is the user's password, not the root password). Once
a user has been authenticated, a timestamp is updated and the
user may then use sudo without a password for a short period of time
(five minutes by default).
B<sudo> determines who is an authorized user by consulting the B<sudo> determines who is an authorized user by consulting the
file F</etc/sudoers>. By giving B<sudo> the C<-v> flag a user file F</etc/sudoers>. By giving B<sudo> the C<-v> flag a user