regen
This commit is contained in:
66
sudoers.cat
66
sudoers.cat
@@ -61,7 +61,7 @@ DDEESSCCRRIIPPTTIIOONN
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
1.6.8 June 6, 2004 1
|
1.6.8 June 8, 2004 1
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -127,7 +127,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
1.6.8 June 6, 2004 2
|
1.6.8 June 8, 2004 2
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -193,7 +193,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
1.6.8 June 6, 2004 3
|
1.6.8 June 8, 2004 3
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -259,7 +259,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
1.6.8 June 6, 2004 4
|
1.6.8 June 8, 2004 4
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -325,7 +325,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
1.6.8 June 6, 2004 5
|
1.6.8 June 8, 2004 5
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -391,7 +391,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
1.6.8 June 6, 2004 6
|
1.6.8 June 8, 2004 6
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -457,7 +457,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
1.6.8 June 6, 2004 7
|
1.6.8 June 8, 2004 7
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -523,7 +523,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
1.6.8 June 6, 2004 8
|
1.6.8 June 8, 2004 8
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -589,7 +589,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
1.6.8 June 6, 2004 9
|
1.6.8 June 8, 2004 9
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -655,7 +655,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
1.6.8 June 6, 2004 10
|
1.6.8 June 8, 2004 10
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -721,7 +721,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
1.6.8 June 6, 2004 11
|
1.6.8 June 8, 2004 11
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -787,7 +787,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
1.6.8 June 6, 2004 12
|
1.6.8 June 8, 2004 12
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -853,7 +853,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
1.6.8 June 6, 2004 13
|
1.6.8 June 8, 2004 13
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -919,7 +919,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
1.6.8 June 6, 2004 14
|
1.6.8 June 8, 2004 14
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -985,7 +985,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
1.6.8 June 6, 2004 15
|
1.6.8 June 8, 2004 15
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -1051,7 +1051,7 @@ EEXXAAMMPPLLEESS
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
1.6.8 June 6, 2004 16
|
1.6.8 June 8, 2004 16
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -1117,7 +1117,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
1.6.8 June 6, 2004 17
|
1.6.8 June 8, 2004 17
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -1183,7 +1183,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
1.6.8 June 6, 2004 18
|
1.6.8 June 8, 2004 18
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -1249,7 +1249,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
1.6.8 June 6, 2004 19
|
1.6.8 June 8, 2004 19
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -1301,7 +1301,7 @@ PPRREEVVEENNTTIINNGG SSHHEELLLL EESSCCAAPPEESS
|
|||||||
To tell whether or not ssuuddoo supports _n_o_e_x_e_c, you can run
|
To tell whether or not ssuuddoo supports _n_o_e_x_e_c, you can run
|
||||||
the following as root:
|
the following as root:
|
||||||
|
|
||||||
\# sudo -V | grep "dummy exec"
|
sudo -V | grep "dummy exec"
|
||||||
|
|
||||||
If the resulting output contains a line that begins with:
|
If the resulting output contains a line that begins with:
|
||||||
|
|
||||||
@@ -1315,7 +1315,7 @@ PPRREEVVEENNTTIINNGG SSHHEELLLL EESSCCAAPPEESS
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
1.6.8 June 6, 2004 20
|
1.6.8 June 8, 2004 20
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -1333,10 +1333,17 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
|||||||
ported.
|
ported.
|
||||||
|
|
||||||
To enable _n_o_e_x_e_c for a command, use the NOEXEC tag as doc<6F>
|
To enable _n_o_e_x_e_c for a command, use the NOEXEC tag as doc<6F>
|
||||||
umented in the User Specification section above. If you
|
umented in the User Specification section above. Here is
|
||||||
are unsure whether or not your system is capable of sup<75>
|
that example again:
|
||||||
porting _n_o_e_x_e_c you can always just try it out and see if
|
|
||||||
it works.
|
aaron shanty = NOEXEC: /usr/bin/more, /usr/bin/vi
|
||||||
|
|
||||||
|
This allows user aaaarroonn to run _/_u_s_r_/_b_i_n_/_m_o_r_e and
|
||||||
|
_/_u_s_r_/_b_i_n_/_v_i with _n_o_e_x_e_c enabled. This will prevent those
|
||||||
|
two commands from executing other commands (such as a
|
||||||
|
shell). If you are unsure whether or not your system is
|
||||||
|
capable of supporting _n_o_e_x_e_c you can always just try it
|
||||||
|
out and see if it works.
|
||||||
|
|
||||||
Note that disabling shell escapes is not a panacea. Pro<72>
|
Note that disabling shell escapes is not a panacea. Pro<72>
|
||||||
grams running as root are still capable of many poten<65>
|
grams running as root are still capable of many poten<65>
|
||||||
@@ -1374,13 +1381,6 @@ SSEEEE AALLSSOO
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
1.6.8 June 8, 2004 21
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
1.6.8 June 6, 2004 21
|
|
||||||
|
|
||||||
|
|
||||||
|
@@ -149,7 +149,7 @@
|
|||||||
.\" ========================================================================
|
.\" ========================================================================
|
||||||
.\"
|
.\"
|
||||||
.IX Title "SUDOERS @mansectform@"
|
.IX Title "SUDOERS @mansectform@"
|
||||||
.TH SUDOERS @mansectform@ "June 6, 2004" "1.6.8" "MAINTENANCE COMMANDS"
|
.TH SUDOERS @mansectform@ "June 8, 2004" "1.6.8" "MAINTENANCE COMMANDS"
|
||||||
.SH "NAME"
|
.SH "NAME"
|
||||||
sudoers \- list of which users may execute what
|
sudoers \- list of which users may execute what
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
@@ -1283,7 +1283,7 @@ To tell whether or not \fBsudo\fR supports \fInoexec\fR, you can run
|
|||||||
the following as root:
|
the following as root:
|
||||||
.PP
|
.PP
|
||||||
.Vb 1
|
.Vb 1
|
||||||
\& \e# sudo -V | grep "dummy exec"
|
\& sudo -V | grep "dummy exec"
|
||||||
.Ve
|
.Ve
|
||||||
.PP
|
.PP
|
||||||
If the resulting output contains a line that begins with:
|
If the resulting output contains a line that begins with:
|
||||||
@@ -1304,9 +1304,17 @@ manual pages for the dynamic linker (usually ld.so, ld.so.1, dyld,
|
|||||||
dld.sl, rld, or loader) to see if \f(CW\*(C`LD_PRELOAD\*(C'\fR is supported.
|
dld.sl, rld, or loader) to see if \f(CW\*(C`LD_PRELOAD\*(C'\fR is supported.
|
||||||
.PP
|
.PP
|
||||||
To enable \fInoexec\fR for a command, use the \f(CW\*(C`NOEXEC\*(C'\fR tag as documented
|
To enable \fInoexec\fR for a command, use the \f(CW\*(C`NOEXEC\*(C'\fR tag as documented
|
||||||
in the User Specification section above. If you are unsure whether
|
in the User Specification section above. Here is that example again:
|
||||||
or not your system is capable of supporting \fInoexec\fR you can always
|
.PP
|
||||||
just try it out and see if it works.
|
.Vb 1
|
||||||
|
\& aaron shanty = NOEXEC: /usr/bin/more, /usr/bin/vi
|
||||||
|
.Ve
|
||||||
|
.PP
|
||||||
|
This allows user \fBaaron\fR to run \fI/usr/bin/more\fR and \fI/usr/bin/vi\fR
|
||||||
|
with \fInoexec\fR enabled. This will prevent those two commands from
|
||||||
|
executing other commands (such as a shell). If you are unsure
|
||||||
|
whether or not your system is capable of supporting \fInoexec\fR you
|
||||||
|
can always just try it out and see if it works.
|
||||||
.PP
|
.PP
|
||||||
Note that disabling shell escapes is not a panacea. Programs running
|
Note that disabling shell escapes is not a panacea. Programs running
|
||||||
as root are still capable of many potentially hazardous operations
|
as root are still capable of many potentially hazardous operations
|
||||||
|
Reference in New Issue
Block a user