version 1.8.2.1, 2002/01/18 16:14:46 |
version 1.9, 2002/01/03 03:49:16 |
|
|
.\" Automatically generated by Pod::Man version 1.15 |
.\" Automatically generated by Pod::Man version 1.15 |
.\" Wed Jan 16 16:36:10 2002 |
.\" Sun Dec 30 12:24:30 2001 |
.\" |
.\" |
.\" Standard preamble: |
.\" Standard preamble: |
.\" ====================================================================== |
.\" ====================================================================== |
|
|
.\" ====================================================================== |
.\" ====================================================================== |
.\" |
.\" |
.IX Title "sudoers 5" |
.IX Title "sudoers 5" |
.TH sudoers 5 "1.6.5" "January 16, 2002" "MAINTENANCE COMMANDS" |
.TH sudoers 5 "1.6.4" "December 30, 2001" "MAINTENANCE COMMANDS" |
.UC |
.UC |
.SH "NAME" |
.SH "NAME" |
sudoers \- list of which users may execute what |
sudoers \- list of which users may execute what |
|
|
changes that behavior such that the real \s-1UID\s0 is left as the invoking |
changes that behavior such that the real \s-1UID\s0 is left as the invoking |
user's \s-1UID\s0. In other words, this makes \fBsudo\fR act as a setuid |
user's \s-1UID\s0. In other words, this makes \fBsudo\fR act as a setuid |
wrapper. This can be useful on systems that disable some potentially |
wrapper. This can be useful on systems that disable some potentially |
dangerous functionality when a program is run setuid. Note, however, |
dangerous functionality when a program is run setuid. |
that this means that sudo will run with the real uid of the invoking |
|
user which may allow that user to kill \fBsudo\fR before it can log a |
|
failure, depending on how your \s-1OS\s0 defines the interaction between |
|
signals and setuid processes. |
|
.Ip "env_reset" 12 |
.Ip "env_reset" 12 |
.IX Item "env_reset" |
.IX Item "env_reset" |
If set, \fBsudo\fR will reset the environment to only contain the |
If set, \fBsudo\fR will reset the environment to only contain the |