Add intercept_authenticate sudoers option, defaults to false.

By default, sudoers will not require authentication of commands run
via an intercepted session.  To require authenticaton of subsequent
commands, enable intercept_authenticate in sudoers.
This commit is contained in:
Todd C. Miller
2021-08-09 15:50:26 -06:00
parent 13b89e9103
commit 788708c9ff
9 changed files with 68 additions and 3 deletions

View File

@@ -3049,6 +3049,25 @@ above as well as the
section at the end of this manual.
This flag is
\fIoff\fR
by default.
.sp
This setting is only supported by version 1.9.8 or higher.
.TP 18n
intercept_authenticate
If set, commands run by an intercepted process must be authenticated
when the user's time stamp is not current.
For example, if a shell is run with
\fIintercept\fR
enabled, as soon as the invoking user's time stamp is out of date,
subsequent commands will need to be authenticated.
This flag has no effect unless the
\fIintercept\fR
flag is enabled or the
\fIINTERCEPT\fR
tag has been set for the command.
This flag is
\fIoff\fR
by default.
.sp
This setting is only supported by version 1.9.8 or higher.
.TP 18n

View File

@@ -2871,6 +2871,24 @@ above as well as the
section at the end of this manual.
This flag is
.Em off
by default.
.Pp
This setting is only supported by version 1.9.8 or higher.
.It intercept_authenticate
If set, commands run by an intercepted process must be authenticated
when the user's time stamp is not current.
For example, if a shell is run with
.Em intercept
enabled, as soon as the invoking user's time stamp is out of date,
subsequent commands will need to be authenticated.
This flag has no effect unless the
.Em intercept
flag is enabled or the
.Em INTERCEPT
tag has been set for the command.
This flag is
.Em off
by default.
.Pp
This setting is only supported by version 1.9.8 or higher.
.It netgroup_tuple