Annotation of src/usr.bin/sudo/sudo.8, Revision 1.5
1.1 millert 1: .rn '' }`
1.5 ! millert 2: ''' $RCSfile: sudo.8,v $$Revision: 1.4 $$Date: 2000/04/10 02:28:36 $
1.4 millert 3: '''
4: ''' $Log: sudo.8,v $
1.5 ! millert 5: ''' Revision 1.4 2000/04/10 02:28:36 millert
! 6: ''' Remove extra backslash, noted by marc@snafu.org
! 7: '''
1.4 millert 8: ''' Revision 1.3 2000/03/27 03:44:38 millert
9: ''' sudo 1.6.3; see http://www.courtesan.com/sudo/current.html for a list
10: ''' of changes.
1.1 millert 11: '''
1.3 millert 12: ''' Revision 1.3 2000/03/27 03:26:23 millert
13: ''' Use 8 and 5 in the man page bodies as well.
1.1 millert 14: '''
15: '''
16: .de Sh
17: .br
18: .if t .Sp
19: .ne 5
20: .PP
21: \fB\\$1\fR
22: .PP
23: ..
24: .de Sp
25: .if t .sp .5v
26: .if n .sp
27: ..
28: .de Ip
29: .br
30: .ie \\n(.$>=3 .ne \\$3
31: .el .ne 3
32: .IP "\\$1" \\$2
33: ..
34: .de Vb
35: .ft CW
36: .nf
37: .ne \\$1
38: ..
39: .de Ve
40: .ft R
41:
42: .fi
43: ..
44: '''
45: '''
46: ''' Set up \*(-- to give an unbreakable dash;
47: ''' string Tr holds user defined translation string.
48: ''' Bell System Logo is used as a dummy character.
49: '''
50: .tr \(*W-|\(bv\*(Tr
51: .ie n \{\
52: .ds -- \(*W-
53: .ds PI pi
54: .if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
55: .if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
56: .ds L" ""
57: .ds R" ""
58: ''' \*(M", \*(S", \*(N" and \*(T" are the equivalent of
59: ''' \*(L" and \*(R", except that they are used on ".xx" lines,
60: ''' such as .IP and .SH, which do another additional levels of
61: ''' double-quote interpretation
62: .ds M" """
63: .ds S" """
64: .ds N" """""
65: .ds T" """""
66: .ds L' '
67: .ds R' '
68: .ds M' '
69: .ds S' '
70: .ds N' '
71: .ds T' '
72: 'br\}
73: .el\{\
74: .ds -- \(em\|
75: .tr \*(Tr
76: .ds L" ``
77: .ds R" ''
78: .ds M" ``
79: .ds S" ''
80: .ds N" ``
81: .ds T" ''
82: .ds L' `
83: .ds R' '
84: .ds M' `
85: .ds S' '
86: .ds N' `
87: .ds T' '
88: .ds PI \(*p
89: 'br\}
90: .\" If the F register is turned on, we'll generate
91: .\" index entries out stderr for the following things:
92: .\" TH Title
93: .\" SH Header
94: .\" Sh Subsection
95: .\" Ip Item
96: .\" X<> Xref (embedded
97: .\" Of course, you have to process the output yourself
98: .\" in some meaninful fashion.
99: .if \nF \{
100: .de IX
101: .tm Index:\\$1\t\\n%\t"\\$2"
102: ..
103: .nr % 0
104: .rr F
105: .\}
1.3 millert 106: .TH sudo 8 "1.6.3" "26/Mar/2000" "MAINTENANCE COMMANDS"
1.1 millert 107: .UC
108: .if n .hy 0
109: .if n .na
110: .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'
111: .de CQ \" put $1 in typewriter font
112: .ft CW
113: 'if n "\c
114: 'if t \\&\\$1\c
115: 'if n \\&\\$1\c
116: 'if n \&"
117: \\&\\$2 \\$3 \\$4 \\$5 \\$6 \\$7
118: '.ft R
119: ..
120: .\" @(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2
121: . \" AM - accent mark definitions
122: .bd B 3
123: . \" fudge factors for nroff and troff
124: .if n \{\
125: . ds #H 0
126: . ds #V .8m
127: . ds #F .3m
128: . ds #[ \f1
129: . ds #] \fP
130: .\}
131: .if t \{\
132: . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
133: . ds #V .6m
134: . ds #F 0
135: . ds #[ \&
136: . ds #] \&
137: .\}
138: . \" simple accents for nroff and troff
139: .if n \{\
140: . ds ' \&
141: . ds ` \&
142: . ds ^ \&
143: . ds , \&
144: . ds ~ ~
145: . ds ? ?
146: . ds ! !
147: . ds /
148: . ds q
149: .\}
150: .if t \{\
151: . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
152: . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
153: . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
154: . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
155: . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
156: . ds ? \s-2c\h'-\w'c'u*7/10'\u\h'\*(#H'\zi\d\s+2\h'\w'c'u*8/10'
157: . ds ! \s-2\(or\s+2\h'-\w'\(or'u'\v'-.8m'.\v'.8m'
158: . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
159: . ds q o\h'-\w'o'u*8/10'\s-4\v'.4m'\z\(*i\v'-.4m'\s+4\h'\w'o'u*8/10'
160: .\}
161: . \" troff and (daisy-wheel) nroff accents
162: .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'
163: .ds 8 \h'\*(#H'\(*b\h'-\*(#H'
164: .ds v \\k:\h'-(\\n(.wu*9/10-\*(#H)'\v'-\*(#V'\*(#[\s-4v\s0\v'\*(#V'\h'|\\n:u'\*(#]
165: .ds _ \\k:\h'-(\\n(.wu*9/10-\*(#H+(\*(#F*2/3))'\v'-.4m'\z\(hy\v'.4m'\h'|\\n:u'
166: .ds . \\k:\h'-(\\n(.wu*8/10)'\v'\*(#V*4/10'\z.\v'-\*(#V*4/10'\h'|\\n:u'
167: .ds 3 \*(#[\v'.2m'\s-2\&3\s0\v'-.2m'\*(#]
168: .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]
169: .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'
170: .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'
171: .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]
172: .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]
173: .ds ae a\h'-(\w'a'u*4/10)'e
174: .ds Ae A\h'-(\w'A'u*4/10)'E
175: .ds oe o\h'-(\w'o'u*4/10)'e
176: .ds Oe O\h'-(\w'O'u*4/10)'E
177: . \" corrections for vroff
178: .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'
179: .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'
180: . \" for low resolution devices (crt and lpr)
181: .if \n(.H>23 .if \n(.V>19 \
182: \{\
183: . ds : e
184: . ds 8 ss
185: . ds v \h'-1'\o'\(aa\(ga'
186: . ds _ \h'-1'^
187: . ds . \h'-1'.
188: . ds 3 3
189: . ds o a
190: . ds d- d\h'-1'\(ga
191: . ds D- D\h'-1'\(hy
192: . ds th \o'bp'
193: . ds Th \o'LP'
194: . ds ae ae
195: . ds Ae AE
196: . ds oe oe
197: . ds Oe OE
198: .\}
199: .rm #[ #] #H #V #F C
200: .SH "NAME"
201: sudo \- execute a command as another user
202: .SH "SYNOPSIS"
1.3 millert 203: \fBsudo\fR \fB\-V\fR | \fB\-h\fR | \fB\-l\fR | \fB\-L\fR | \fB\-v\fR | \fB\-k\fR | \fB\-K\fR | \fB\-s\fR |
1.5 ! millert 204: [ \fB\-H\fR ] [\fB\-S\fR ] [ \fB\-b\fR ] | [ \fB\-p\fR prompt ] [ \fB\-c\fR \fIclass\fR|\fI-\fR ]
! 205: [ \fB\-a\fR \fIauth_type\fR ]
1.3 millert 206: [ \fB\-u\fR username/#uid ] \fIcommand\fR
1.1 millert 207: .SH "DESCRIPTION"
208: \fBsudo\fR allows a permitted user to execute a \fIcommand\fR as the
209: superuser or another user, as specified in the sudoers file. The
210: real and effective uid and gid are set to match those of the target
211: user as specified in the passwd file (the group vector is also
1.2 millert 212: initialized when the target user is not root). By default, \fBsudo\fR
213: requires that users authenticate themselves with a password
214: (NOTE: this is the user's password, not the root password). Once
215: a user has been authenticated, a timestamp is updated and the
216: user may then use sudo without a password for a short period of time
217: (five minutes by default).
1.1 millert 218: .PP
219: \fBsudo\fR determines who is an authorized user by consulting the
220: file \fI/etc/sudoers\fR. By giving \fBsudo\fR the \f(CW-v\fR flag a user
221: can update the time stamp without running a \fIcommand.\fR
222: The password prompt itself will also time out if the user's password is
223: not entered with N minutes (again, this is defined at configure
224: time and defaults to 5 minutes).
225: .PP
226: If a user that is not listed in the \fIsudoers\fR file tries to run
227: a command via \fBsudo\fR, mail is sent to the proper authorities,
228: as defined at configure time (defaults to root). Note that the
229: mail will not be sent if an unauthorized user tries to run sudo
230: with the \f(CW-l\fR or \f(CW-v\fR flags. This allows users to determine
231: for themselves whether or not they are allowed to use \fBsudo\fR.
232: .PP
233: \fBsudo\fR can log both successful an unsuccessful attempts (as well
234: as errors) to \fIsyslog\fR\|(3), a log file, or both. By default \fBsudo\fR
235: will log via \fIsyslog\fR\|(3) but this is changeable at configure time.
236: .SH "OPTIONS"
237: \fBsudo\fR accepts the following command line options:
238: .Ip "-V" 4
239: The \f(CW-V\fR (\fIversion\fR) option causes \fBsudo\fR to print the
240: version number and exit.
241: .Ip "-l" 4
242: The \f(CW-l\fR (\fIlist\fR) option will list out the allowed (and
243: forbidden) commands for the user on the current host.
244: .Ip "-L" 4
245: The \f(CW-L\fR (\fIlist\fR defaults) option will list out the parameters
246: that may be set in a \fIDefaults\fR line along with a short description
247: for each. This option is useful in conjunction with \fIgrep\fR\|(1).
248: .Ip "-h" 4
249: The \f(CW-h\fR (\fIhelp\fR) option causes \fBsudo\fR to print a usage message and exit.
250: .Ip "-v" 4
251: If given the \f(CW-v\fR (\fIvalidate\fR) option, \fBsudo\fR will update the
252: user's timestamp, prompting for the user's password if necessary.
253: This extends the \fBsudo\fR timeout to for another N minutes
254: (where N is defined at installation time and defaults to 5
255: minutes) but does not run a command.
256: .Ip "-k" 4
257: The \f(CW-k\fR (\fIkill\fR) option to \fBsudo\fR invalidates the user's timestamp
258: by setting the time on it to the epoch. The next time \fBsudo\fR is
259: run a password will be required. This option does not require a password
260: and was added to allow a user to revoke \fBsudo\fR permissions from a .logout
261: file.
262: .Ip "-K" 4
263: The \f(CW-K\fR (sure \fIkill\fR) option to \fBsudo\fR removes the user's timestamp
264: entirely. This option does not require a password.
265: .Ip "-b" 4
266: The \f(CW-b\fR (\fIbackground\fR) option tells \fBsudo\fR to run the given
267: command in the background. Note that if you use the \f(CW-b\fR
268: option you cannot use shell job control to manipulate the command.
269: .Ip "-p" 4
270: The \f(CW-p\fR (\fIprompt\fR) option allows you to override the default
271: password prompt and use a custom one. If the password prompt
272: contains the \f(CW%u\fR escape, \f(CW%u\fR will be replaced with the user's
273: login name. Similarly, \f(CW%h\fR will be replaced with the local
274: hostname.
1.5 ! millert 275: .Ip "\-c" 4
! 276: .IX Item "-c"
! 277: The \fB\-c\fR (\fIclass\fR) option causes \fBsudo\fR to run the specified command
! 278: with resources limited by the specified login class. The \fIclass\fR
! 279: argument can be either a class name as defined in /etc/login.conf,
! 280: or a single '\-' character. Specifying a \fIclass\fR of \f(CW\*(C`\-\*(C'\fR indicates
! 281: that the command should be run restricted by the default login
! 282: capibilities for the user the command is run as. If the \fIclass\fR
! 283: argument specifies an existing user class, the command must be run
! 284: as root, or the \fBsudo\fR command must be run from a shell that is already
! 285: root. This option is only available on systems with \s-1BSD\s0 login classes
! 286: where \fBsudo\fR has been configured with the \-\-with-logincap option.
! 287: .Ip "\-a" 4
! 288: .IX Item "-a"
! 289: The \fB\-a\fR (\fIauthentication type\fR) option causes \fBsudo\fR to use the
! 290: specified authentication type when validating the user, as allowed
! 291: by /etc/login.conf. The system administrator may specify a list
! 292: of sudo-specific authentication methods by adding an \*(L"auth-sudo\*(R"
! 293: entry in /etc/login.conf. This option is only available on systems
! 294: that support \s-1BSD\s0 authentication where \fBsudo\fR has been configured
! 295: with the \-\-with-bsdauth option.
1.1 millert 296: .Ip "-u" 4
1.3 millert 297: The \f(CW-u\fR (\fIuser\fR) option causes \fBsudo\fR to run the specified command
1.1 millert 298: as a user other than \fIroot\fR. To specify a \fIuid\fR instead of a
299: \fIusername\fR, use \*(L"#uid\*(R".
300: .Ip "-s" 4
301: The \f(CW-s\fR (\fIshell\fR) option runs the shell specified by the \fI\s-1SHELL\s0\fR
302: environment variable if it is set or the shell as specified
303: in \fIpasswd\fR\|(5).
304: .Ip "-H" 4
305: The \f(CW-H\fR (\fI\s-1HOME\s0\fR) option sets the \fI\s-1HOME\s0\fR environment variable
306: to the homedir of the target user (root by default) as specified
307: in \fIpasswd\fR\|(5). By default, \fBsudo\fR does not modify \fI\s-1HOME\s0\fR.
1.3 millert 308: .Ip "-S" 4
309: The \f(CW-S\fR (\fIstdin\fR) option causes \fBsudo\fR to read the password from
310: standard input instead of the terminal device.
1.1 millert 311: .Ip "--" 4
312: The \f(CW--\fR flag indicates that \fBsudo\fR should stop processing command
313: line arguments. It is most useful in conjunction with the \f(CW-s\fR flag.
314: .SH "RETURN VALUES"
315: \fBsudo\fR quits with an exit value of 1 if there is a
316: configuration/permission problem or if \fBsudo\fR cannot execute the
317: given command. In the latter case the error string is printed to
318: stderr. If \fBsudo\fR cannot \fIstat\fR\|(2) one or more entries in the user's
319: \f(CWPATH\fR an error is printed on stderr. (If the directory does not
320: exist or if it is not really a directory, the entry is ignored and
321: no error is printed.) This should not happen under normal
322: circumstances. The most common reason for \fIstat\fR\|(2) to return
323: \*(L"permission denied\*(R" is if you are running an automounter and one
324: of the directories in your \f(CWPATH\fR is on a machine that is currently
325: unreachable.
326: .SH "SECURITY NOTES"
327: \fBsudo\fR tries to be safe when executing external commands. Variables
328: that control how dynamic loading and binding is done can be used
329: to subvert the program that \fBsudo\fR runs. To combat this the
330: \f(CWLD_*\fR, \f(CW_RLD_*\fR, \f(CWSHLIB_PATH\fR (HP\-UX only), and \f(CWLIBPATH\fR (AIX
331: only) environment variables are removed from the environment passed
332: on to all commands executed. \fBsudo\fR will also remove the \f(CWIFS\fR,
333: \f(CWENV\fR, \f(CWBASH_ENV\fR, \f(CWKRB_CONF\fR, \f(CWKRB5_CONFIG\fR, \f(CWLOCALDOMAIN\fR,
334: \f(CWRES_OPTIONS\fR and \f(CWHOSTALIASES\fR variables as they too can pose a
335: threat.
336: .PP
337: To prevent command spoofing, \fBsudo\fR checks "." and "" (both denoting
338: current directory) last when searching for a command in the user's
339: PATH (if one or both are in the PATH). Note, however, that the
340: actual \f(CWPATH\fR environment variable is \fInot\fR modified and is passed
341: unchanged to the program that \fBsudo\fR executes.
342: .PP
343: For security reasons, if your OS supports shared libraries and does
344: not disable user-defined library search paths for setuid programs
345: (most do), you should either use a linker option that disables this
346: behavior or link \fBsudo\fR statically.
347: .PP
348: \fBsudo\fR will check the ownership of its timestamp directory
1.3 millert 349: (\fI/var/run/sudo\fR by default) and ignore the directory's contents if
350: it is not owned by root and only writable by root. On systems that
351: allow non-root users to give away files via \fIchown\fR\|(2), if the timestamp
352: directory is located in a directory writable by anyone (eg: \fI/tmp\fR),
353: it is possible for a user to create the timestamp directory before
354: \fBsudo\fR is run. However, because \fBsudo\fR checks the ownership and
355: mode of the directory and its contents, the only damage that can
356: be done is to \*(L"hide\*(R" files by putting them in the timestamp dir.
357: This is unlikely to happen since once the timestamp dir is owned
358: by root and inaccessible by any other user the user placing files
359: there would be unable to get them back out. To get around this
360: issue you can use a directory that is not world-writable for the
361: timestamps (\fI/var/adm/sudo\fR for instance) or create \fI/var/run/sudo\fR
362: with the appropriate owner (root) and permissions (0700) in the
363: system startup files.
1.1 millert 364: .PP
365: \fBsudo\fR will not honor timestamps set far in the future.
366: Timestamps with a date greater than current_time + 2 * \f(CWTIMEOUT\fR
367: will be ignored and sudo will log and complain. This is done to
368: keep a user from creating his/her own timestamp with a bogus
369: date on system that allow users to give away files.
370: .SH "EXAMPLES"
371: Note: the following examples assume suitable \fIsudoers\fR\|(5) entries.
372: .PP
373: To get a file listing of an unreadable directory:
374: .PP
375: .Vb 1
376: \& % sudo ls /usr/local/protected
377: .Ve
378: To list the home directory of user yazza on a machine where the
379: filesystem holding ~yazza is not exported as root:
380: .PP
381: .Vb 1
382: \& % sudo -u yazza ls ~yazza
383: .Ve
384: To edit the \fIindex.html\fR file as user www:
385: .PP
386: .Vb 1
387: \& % sudo -u www vi ~www/htdocs/index.html
388: .Ve
389: To shutdown a machine:
390: .PP
391: .Vb 1
392: \& % sudo shutdown -r +15 "quick reboot"
393: .Ve
394: To make a usage listing of the directories in the /home
395: partition. Note that this runs the commands in a sub-shell
396: to make the \f(CWcd\fR and file redirection work.
397: .PP
398: .Vb 1
399: \& % sudo sh -c "cd /home ; du -s * | sort -rn > USAGE"
400: .Ve
401: .SH "ENVIRONMENT"
402: \fBsudo\fR utilizes the following environment variables:
403: .PP
404: .Vb 13
405: \& PATH Set to a sane value if SECURE_PATH is set
406: \& SHELL Used to determine shell to run with -s option
407: \& USER Set to the target user (root unless the -u option
408: \& is specified)
409: \& HOME In -s or -H mode (or if sudo was configured with
410: \& the --enable-shell-sets-home option), set to
411: \& homedir of the target user.
412: \& SUDO_PROMPT Used as the default password prompt
413: \& SUDO_COMMAND Set to the command run by sudo
414: \& SUDO_USER Set to the login of the user who invoked sudo
415: \& SUDO_UID Set to the uid of the user who invoked sudo
416: \& SUDO_GID Set to the gid of the user who invoked sudo
417: \& SUDO_PS1 If set, PS1 will be set to its value
418: .Ve
419: .SH "FILES"
420: .PP
421: .Vb 2
422: \& /etc/sudoers List of who can run what
1.3 millert 423: \& /var/run/sudo Directory containing timestamps
1.1 millert 424: .Ve
425: .SH "AUTHORS"
426: Many people have worked on \fBsudo\fR over the years, this
427: version consists of code written primarily by:
428: .PP
429: .Vb 2
430: \& Todd Miller
431: \& Chris Jepeway
432: .Ve
433: See the HISTORY file in the \fBsudo\fR distribution for a short history
434: of \fBsudo\fR.
435: .SH "BUGS"
436: If you feel you have found a bug in sudo, please submit a bug report
1.2 millert 437: at http://www.courtesan.com/sudo/bugs/
1.1 millert 438: .SH "DISCLAIMER"
439: \fBSudo\fR is provided ``AS IS'\*(R' and any express or implied warranties,
440: including, but not limited to, the implied warranties of merchantability
441: and fitness for a particular purpose are disclaimed.
442: See the LICENSE file distributed with \fBsudo\fR for complete details.
443: .SH "CAVEATS"
444: There is no easy way to prevent a user from gaining a root shell if
445: that user has access to commands allowing shell escapes.
446: .PP
447: If users have sudo \f(CWALL\fR there is nothing to prevent them from creating
448: their own program that gives them a root shell regardless of any \*(L'!\*(R'
449: elements in the user specification.
450: .PP
451: Running shell scripts via \fBsudo\fR can expose the same kernel bugs
452: that make setuid shell scripts unsafe on some operating systems
453: (if your OS supports the /dev/fd/ directory, setuid shell scripts
454: are generally safe).
455: .SH "SEE ALSO"
1.4 millert 456: \fIsudoers\fR\|(5), \fIvisudo\fR\|(8), \fIsu\fR\|(1).
1.1 millert 457:
458: .rn }` ''
459: .IX Title "sudo 8"
460: .IX Name "sudo - execute a command as another user"
461:
462: .IX Header "NAME"
463:
464: .IX Header "SYNOPSIS"
465:
466: .IX Header "DESCRIPTION"
467:
468: .IX Header "OPTIONS"
469:
470: .IX Item "-V"
471:
472: .IX Item "-l"
473:
474: .IX Item "-L"
475:
476: .IX Item "-h"
477:
478: .IX Item "-v"
479:
480: .IX Item "-k"
481:
482: .IX Item "-K"
483:
484: .IX Item "-b"
485:
486: .IX Item "-p"
487:
488: .IX Item "-u"
489:
490: .IX Item "-s"
491:
492: .IX Item "-H"
493:
1.3 millert 494: .IX Item "-S"
495:
1.1 millert 496: .IX Item "--"
497:
498: .IX Header "RETURN VALUES"
499:
500: .IX Header "SECURITY NOTES"
501:
502: .IX Header "EXAMPLES"
503:
504: .IX Header "ENVIRONMENT"
505:
506: .IX Header "FILES"
507:
508: .IX Header "AUTHORS"
509:
510: .IX Header "BUGS"
511:
512: .IX Header "DISCLAIMER"
513:
514: .IX Header "CAVEATS"
515:
516: .IX Header "SEE ALSO"
517: