=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/sudo/Attic/INSTALL,v retrieving revision 1.6.4.1 retrieving revision 1.7 diff -c -r1.6.4.1 -r1.7 *** src/usr.bin/sudo/Attic/INSTALL 2002/01/18 16:14:44 1.6.4.1 --- src/usr.bin/sudo/Attic/INSTALL 2002/01/03 03:49:16 1.7 *************** *** 1,4 **** ! Installation instructions for Sudo 1.6.5 ======================================== Sudo uses a `configure' script to probe the capabilities and type --- 1,4 ---- ! Installation instructions for Sudo 1.6.3 ======================================== Sudo uses a `configure' script to probe the capabilities and type *************** *** 68,83 **** --cache-file=FILE Cache test results in FILE ! --config-cache, -C ! Alias for `--cache-file=config.cache' ! ! --help, -h Print the usage/help info ! --no-create, -n Do not create output files ! --quiet, --silent, -q Do not print `checking...' messages Directory and file names: --- 68,80 ---- --cache-file=FILE Cache test results in FILE ! --help Print the usage/help info ! --no-create Do not create output files ! --quiet, --silent Do not print `checking...' messages Directory and file names: *************** *** 196,222 **** command line. --with-bsdauth ! Enable support for BSD authentication on BSD/OS and OpenBSD. ! This option assumes --with-logincap as well. It is not ! possible to mix BSD authentication with other authentication ! methods (and there really should be no need to do so). Note ! that only the newer BSD authentication API is supported. ! If you don't have /usr/include/bsd_auth.h then you cannot ! use this. - --disable-root-mailer - By default sudo will run the mailer as root when tattling - on a user so as to prevent that user from killing the mailer. - With this option, sudo will run the mailer as the invoking - user which some people consider to be safer. - - --disable-saved-ids - Disable use of POSIX saved IDs. Normally, sudo will try to - use POSIX saved IDs if they are supported. However, some - implementations are broken. If sudo aborts with an error like: - "seteuid(0): Operation not permitted" - you probably need to disable POSIX saved ID support. - --disable-sia Disable SIA support. This is the "Security Integration Architecture" on Digital UNIX. If you disable SIA sudo will use its own --- 193,205 ---- command line. --with-bsdauth ! Enable support for BSD authentication on BSD/OS. This option ! assumes --with-logincap as well. It is not possible to mix ! BSD authentication with other authentication methods (and there ! really should be no need to do so). Note that only the newer ! BSD authentication API is supported. If you don't have ! /usr/include/bsd_auth.h then you cannot use this. --disable-sia Disable SIA support. This is the "Security Integration Architecture" on Digital UNIX. If you disable SIA sudo will use its own *************** *** 600,610 **** the "#define HAVE_LSEARCH 1" line in config.h and add lsearch.o to the LIBOBJS line in the Makefile. ! If you are using a Linux kernel older than 2.4 it is not possible ! to access the sudoers file via NFS. This is due to a bug in ! the Linux client-side NFS implementation that has since been ! fixed. There is a workaround on the sudo ftp site, linux_nfs.patch, ! if you need to NFS-mount sudoers on older Linux kernels. Mac OS X: It has been reported that for sudo to work on Mac OS X it must --- 583,594 ---- the "#define HAVE_LSEARCH 1" line in config.h and add lsearch.o to the LIBOBJS line in the Makefile. ! It is not possible to access the sudoers file via NFS on Linux. ! This is due to a bug in the Linux client-side NFS implementation. ! It has been fixed in the developement kernel but, as of Aug 27, ! 1999, the fixes have not made it into the mainstream kernel. ! There is a workaround on the sudo ftp site, linux_nfs.patch, ! if you need to NFS-mount sudoers on Linux. Mac OS X: It has been reported that for sudo to work on Mac OS X it must