version 1.8, 2002/01/14 00:11:44 |
version 1.9, 2002/01/16 18:09:13 |
|
|
--cache-file=FILE |
--cache-file=FILE |
Cache test results in FILE |
Cache test results in FILE |
|
|
--help |
--config-cache, -C |
|
Alias for `--cache-file=config.cache' |
|
|
|
--help, -h |
Print the usage/help info |
Print the usage/help info |
|
|
--no-create |
--no-create, -n |
Do not create output files |
Do not create output files |
|
|
--quiet, --silent |
--quiet, --silent, -q |
Do not print `checking...' messages |
Do not print `checking...' messages |
|
|
Directory and file names: |
Directory and file names: |
|
|
command line. |
command line. |
|
|
--with-bsdauth |
--with-bsdauth |
Enable support for BSD authentication on BSD/OS. This option |
Enable support for BSD authentication on BSD/OS and OpenBSD. |
assumes --with-logincap as well. It is not possible to mix |
This option assumes --with-logincap as well. It is not |
BSD authentication with other authentication methods (and there |
possible to mix BSD authentication with other authentication |
really should be no need to do so). Note that only the newer |
methods (and there really should be no need to do so). Note |
BSD authentication API is supported. If you don't have |
that only the newer BSD authentication API is supported. |
/usr/include/bsd_auth.h then you cannot use this. |
If you don't have /usr/include/bsd_auth.h then you cannot |
|
use this. |
|
|
|
--disable-saved-ids |
|
Disable use of POSIX saved IDs. Normally, sudo will try to |
|
use POSIX saved IDs if they are supported. However, some |
|
implementations are broken. If sudo aborts with an error like: |
|
"seteuid(0): Operation not permitted" |
|
you probably need to disable POSIX saved ID support. |
|
|
--disable-sia |
--disable-sia |
Disable SIA support. This is the "Security Integration Architecture" |
Disable SIA support. This is the "Security Integration Architecture" |
on Digital UNIX. If you disable SIA sudo will use its own |
on Digital UNIX. If you disable SIA sudo will use its own |
|
|
the "#define HAVE_LSEARCH 1" line in config.h and add lsearch.o |
the "#define HAVE_LSEARCH 1" line in config.h and add lsearch.o |
to the LIBOBJS line in the Makefile. |
to the LIBOBJS line in the Makefile. |
|
|
It is not possible to access the sudoers file via NFS on Linux. |
If you are using a Linux kernel older than 2.4 it is not possible |
This is due to a bug in the Linux client-side NFS implementation. |
to access the sudoers file via NFS. This is due to a bug in |
It has been fixed in the developement kernel but, as of Aug 27, |
the Linux client-side NFS implementation that has since been |
1999, the fixes have not made it into the mainstream kernel. |
fixed. There is a workaround on the sudo ftp site, linux_nfs.patch, |
There is a workaround on the sudo ftp site, linux_nfs.patch, |
if you need to NFS-mount sudoers on older Linux kernels. |
if you need to NFS-mount sudoers on Linux. |
|
|
|
Mac OS X: |
Mac OS X: |
It has been reported that for sudo to work on Mac OS X it must |
It has been reported that for sudo to work on Mac OS X it must |