source: postlfs/security/sudo.xml@ a5b9f1e

10.0 10.1 11.0 11.1 11.2 11.3 12.0 12.1 8.4 9.0 9.1 bdubbs/svn elogind kea ken/TL2024 ken/inkscape-core-mods ken/tuningfonts lazarus lxqt plabs/newcss plabs/python-mods python3.11 qt5new rahul/power-profiles-daemon renodr/vulkan-addition trunk upgradedb xry111/intltool xry111/llvm18 xry111/soup3 xry111/test-20220226 xry111/xf86-video-removal
Last change on this file since a5b9f1e was a5b9f1e, checked in by DJ Lucas <dj@…>, 5 years ago

Use wheel group for sample configuration of sudo.
Added pam_wheel.so configuration to /etc/pam.d/su.
update-usbids.service and upadate-pciids.service depend on network-online.target. Fixes #11249.

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@20738 af4574ff-66df-0310-9fd7-8a98e5e911e0

  • Property mode set to 100644
File size: 11.4 KB
RevLine 
[cf341b4]1<?xml version="1.0" encoding="ISO-8859-1"?>
[6732c094]2<!DOCTYPE sect1 PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
3 "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
[cf341b4]4 <!ENTITY % general-entities SYSTEM "../../general.ent">
5 %general-entities;
6
[06915b3]7 <!ENTITY sudo-download-http "http://www.sudo.ws/dist/sudo-&sudo-version;.tar.gz">
[926d146d]8 <!ENTITY sudo-download-ftp "ftp://ftp.sudo.ws/pub/sudo/sudo-&sudo-version;.tar.gz">
[10513885]9 <!ENTITY sudo-md5sum "833084947d98e7745b94845f4b7a8a9a">
10 <!ENTITY sudo-size "3.1 MB">
11 <!ENTITY sudo-buildsize "38 MB (with tests)">
[714b5e4c]12 <!ENTITY sudo-time "0.4 SBU (with tests)">
[cf341b4]13]>
14
[bcd2922]15<sect1 id="sudo" xreflabel="Sudo-&sudo-version;">
[cf341b4]16 <?dbhtml filename="sudo.html"?>
17
18 <sect1info>
[e19ad480]19 <othername>$LastChangedBy$</othername>
20 <date>$Date$</date>
[cf341b4]21 </sect1info>
22
23 <title>Sudo-&sudo-version;</title>
24
25 <indexterm zone="sudo">
[bcd2922]26 <primary sortas="a-Sudo">Sudo</primary>
[cf341b4]27 </indexterm>
28
29 <sect2 role="package">
30 <title>Introduction to Sudo</title>
31
[bcd2922]32 <para>
33 The <application>Sudo</application> package allows a system administrator
34 to give certain users (or groups of users) the ability to run
35 some (or all) commands as
36 <systemitem class="username">root</systemitem> or another user while
37 logging the commands and arguments.
38 </para>
[cf341b4]39
[cdd5a33b]40 &lfs83_checked;
[a8d3d55a]41
[cf341b4]42 <bridgehead renderas="sect3">Package Information</bridgehead>
43 <itemizedlist spacing="compact">
44 <listitem>
[bcd2922]45 <para>
46 Download (HTTP): <ulink url="&sudo-download-http;"/>
47 </para>
[cf341b4]48 </listitem>
49 <listitem>
[bcd2922]50 <para>
51 Download (FTP): <ulink url="&sudo-download-ftp;"/>
52 </para>
[cf341b4]53 </listitem>
54 <listitem>
[bcd2922]55 <para>
56 Download MD5 sum: &sudo-md5sum;
57 </para>
[cf341b4]58 </listitem>
59 <listitem>
[bcd2922]60 <para>
61 Download size: &sudo-size;
62 </para>
[cf341b4]63 </listitem>
64 <listitem>
[bcd2922]65 <para>
66 Estimated disk space required: &sudo-buildsize;
67 </para>
[cf341b4]68 </listitem>
69 <listitem>
[bcd2922]70 <para>
71 Estimated build time: &sudo-time;
72 </para>
[cf341b4]73 </listitem>
74 </itemizedlist>
75
76 <bridgehead renderas="sect3">Sudo Dependencies</bridgehead>
77
78 <bridgehead renderas="sect4">Optional</bridgehead>
[bcd2922]79 <para role="optional">
80 <xref linkend="linux-pam"/>,
81 <xref linkend="mitkrb"/>,
82 <xref linkend="openldap"/>,
[6b4f8529]83 <xref linkend="server-mail"/> (that provides a
84 <command>sendmail</command> command),
85 <ulink url="http://www.openafs.org/">AFS</ulink>,
[06915b3]86 <ulink url="http://www.fwtk.org/">FWTK</ulink>, and
[8dfc5c3]87 <ulink url="&sourceforge-dl;/opie/">Opie</ulink>
[06915b3]88<!-- <ulink url="http://www.rsa.com/node.aspx?id=1156">SecurID</ulink>-->
[bcd2922]89 </para>
[b35e86b2]90
[3597eb6]91 <para condition="html" role="usernotes">User Notes:
[bcd2922]92 <ulink url="&blfs-wiki;/sudo"/>
93 </para>
[cf341b4]94 </sect2>
95
96 <sect2 role="installation">
97 <title>Installation of Sudo</title>
98
[bcd2922]99 <para>
[6e5d584]100 Install <application>Sudo</application> by running the following commands:
[bcd2922]101 </para>
[cf341b4]102
[1c69133]103<!-- Developer: apparently it is disabled by default, although in configure it
104is written otherwise -disable-static \-->
[b9d56ad4]105<screen><userinput>./configure --prefix=/usr \
[edaee95]106 --libexecdir=/usr/lib \
[1a657ca]107 --with-secure-path \
[b9d56ad4]108 --with-all-insults \
109 --with-env-editor \
110 --docdir=/usr/share/doc/sudo-&sudo-version; \
[9dabcf3]111 --with-passprompt="[sudo] password for %p: " &amp;&amp;
[cf341b4]112make</userinput></screen>
113
[bcd2922]114 <para>
[6b4f8529]115 To test the results, issue: <command>env LC_ALL=C make check 2&gt;&amp;1
116 | tee ../make-check.log</command>. Check the results with <command>grep
[ecd8cc2]117 failed ../make-check.log</command>. One test, test3, is known to fail
118 if the tests are run as the root user.
[bcd2922]119 </para>
[21755bc]120
[bcd2922]121 <para>
122 Now, as the <systemitem class="username">root</systemitem> user:
123 </para>
[cf341b4]124
[2809c8c]125<screen role="root"><userinput>make install &amp;&amp;
126ln -sfv libsudo_util.so.0.0.0 /usr/lib/sudo/libsudo_util.so.0</userinput></screen>
[cf341b4]127
128 </sect2>
129
130 <sect2 role="commands">
131 <title>Command Explanations</title>
132
[663b79c2]133 <para>
[edaee95]134 <parameter>--libexecdir=/usr/lib</parameter>: This switch controls where
[663b79c2]135 private programs are installed. Everything in that directory is a library, so
136 they belong under <filename class="directory">/usr/lib</filename> instead of
137 <filename class="directory">/usr/libexec</filename>.
[8466229]138 </para>
139
140 <para>
141 <parameter>--with-secure-path</parameter>: This switch transparently adds
142 <filename class="directory">/sbin</filename> and <filename
143 class="directory">/usr/sbin</filename> directories to the
144 <envar>PATH</envar> environment variable.
[663b79c2]145 </para>
146
[bcd2922]147 <para>
[f3d174f]148 <parameter>--with-all-insults</parameter>: This switch includes all the
[bcd2922]149 <application>sudo</application> insult sets.
150 </para>
[cf341b4]151
[bcd2922]152 <para>
[f3d174f]153 <parameter>--with-env-editor</parameter>: This switch enables use of the
[bcd2922]154 environment variable EDITOR for <command>visudo</command>.
155 </para>
[8890b85f]156
[f3d174f]157 <para>
[ecea644]158 <parameter>--with-passprompt</parameter>: This switch sets the password prompt.
[f3d174f]159 </para>
160
[14c71e0]161 <para>
[f586237]162 <option>--without-pam</option>: This switch avoids building
163 <application>Linux-PAM</application> support when
164 <application>Linux-PAM</application> is installed on the system.
[14c71e0]165 </para>
[17b685f1]166<!-- See the developer note above before the configure command
[b9d56ad4]167 <xi:include xmlns:xi="http://www.w3.org/2001/XInclude"
[f1d7196]168 href="../../xincludes/static-libraries.xml"/>-->
[b9d56ad4]169
[33d90fe]170 <note>
[bcd2922]171 <para>
172 There are many options to <application>sudo</application>'s
173 <command>configure</command> command. Check the
174 <command>configure --help</command> output for a complete list.
175 </para>
[33d90fe]176 </note>
[cf341b4]177
[2809c8c]178 <para>
[f586237]179 <command>ln -sfv libsudo_util...</command>: Works around a bug in the
[2809c8c]180 installation process, which links to the previously installed
181 version (if there is one) instead of the new one.
182 </para>
183
[cf341b4]184 </sect2>
185
186 <sect2 role="configuration">
187 <title>Configuring Sudo</title>
188
189 <sect3 id="sudo-config">
190 <title>Config File</title>
191
[7a47afc]192 <para>
193 <filename>/etc/sudoers</filename>
194 </para>
[cf341b4]195
196 <indexterm zone="sudo sudo-config">
197 <primary sortas="e-etc-sudoers">/etc/sudoers</primary>
198 </indexterm>
199
200 </sect3>
201
202 <sect3>
203 <title>Configuration Information</title>
204
[bcd2922]205 <para>
206 The <filename>sudoers</filename> file can be quite complicated. It
207 is composed of two types of entries: aliases (basically variables) and
208 user specifications (which specify who may run what). The installation
[b4c31a6]209 installs a default configuration that has no privileges installed for
210 any user.
[bcd2922]211 </para>
[cf341b4]212
[bcd2922]213 <para>
214 One example usage is to allow the system administrator to execute
215 any program without typing a password each time root privileges are
216 needed. This can be configured as:
217 </para>
[bccbdaea]218
[ed025d6]219<screen># User alias specification
[b4c31a6]220User_Alias ADMIN = <replaceable>YourLoginId</replaceable>
[cf341b4]221
222# Allow people in group ADMIN to run all commands without a password
223ADMIN ALL = NOPASSWD: ALL</screen>
224
[a5b9f1e]225 <para>
226 Another common configuration is to allow members of the wheel group to
227 execute all commands after providing their own credientials. Use the
228 following command to edit default <filename>/etc/sudoers</filename>
229 file as the <systemitem class="username">root</systemitem> user:
230 </para>
231
232<screen role="nodump"><userinput>sed '/wheel.*) ALL/s/^# //' -i.bak /etc/sudoers</userinput></screen>
233
[bcd2922]234 <para>
235 For details, see <command>man sudoers</command>.
236 </para>
[cf341b4]237
[3c0f868f]238 <note>
[bcd2922]239 <para>
240 The <application>Sudo</application> developers highly recommend
241 using the <command>visudo</command> program to edit the
242 <filename>sudoers</filename> file. This will provide basic sanity
[b4c31a6]243 checking like syntax parsing and file permission to avoid some
244 possible mistakes that could lead to a vulnerable configuration.
[bcd2922]245 </para>
[3c0f868f]246 </note>
247
[bcd2922]248 <para>
[14c71e0]249 If <application>PAM</application> is installed on the system,
250 <application>Sudo</application> is built with
[b4c31a6]251 <application>PAM</application> support. In that case, issue the
252 following command as the <systemitem class="username">root</systemitem>
253 user to create the <application>PAM</application> configuration file:
[bcd2922]254 </para>
[8890b85f]255
[add8d4f]256<screen role="root"><userinput>cat &gt; /etc/pam.d/sudo &lt;&lt; "EOF"
257<literal># Begin /etc/pam.d/sudo
[b3a4f60]258
259# include the default auth settings
260auth include system-auth
261
262# include the default account settings
263account include system-account
264
265# Set default environment variables for the service user
266session required pam_env.so
267
268# include system session defaults
269session include system-session
270
[add8d4f]271# End /etc/pam.d/sudo</literal>
[b3a4f60]272EOF
273chmod 644 /etc/pam.d/sudo</userinput></screen>
[fd7e0ed6]274
[cf341b4]275 </sect3>
276
277 </sect2>
278
279 <sect2 role="content">
280 <title>Contents</title>
281
282 <segmentedlist>
283 <segtitle>Installed Programs</segtitle>
[9d53187]284 <segtitle>Installed Libraries</segtitle>
[cf341b4]285 <segtitle>Installed Directories</segtitle>
286
287 <seglistitem>
[bcd2922]288 <seg>
[a1e0f76]289 sudo, sudoedit (symlink), sudoreplay, and visudo
[bcd2922]290 </seg>
291 <seg>
[6b4f8529]292 group_file.so, libsudo_util.so,
293 sudoers.so, sudo_noexec.so, and system_group.so
[bcd2922]294 </seg>
295 <seg>
[7a47afc]296 /etc/sudoers.d,
[b378aa0]297 /usr/lib/sudo,
[06915b3]298 /usr/share/doc/sudo-&sudo-version;, and
299 /var/{lib,run}/sudo
[bcd2922]300 </seg>
[cf341b4]301 </seglistitem>
302 </segmentedlist>
303
304 <variablelist>
305 <bridgehead renderas="sect3">Short Descriptions</bridgehead>
306 <?dbfo list-presentation="list"?>
307 <?dbhtml list-presentation="table"?>
308
309 <varlistentry id="sudo_prog">
310 <term><command>sudo</command></term>
311 <listitem>
[bcd2922]312 <para>
313 executes a command as another user as permitted by
314 the <filename>/etc/sudoers</filename> configuration file.
[cf341b4]315 </para>
316 <indexterm zone="sudo sudo">
317 <primary sortas="b-sudo">sudo</primary>
318 </indexterm>
319 </listitem>
320 </varlistentry>
321
322 <varlistentry id="sudoedit">
323 <term><command>sudoedit</command></term>
324 <listitem>
[bcd2922]325 <para>
[a1e0f76]326 is a symlink to <command>sudo</command> that implies the
[bcd2922]327 <option>-e</option> option to invoke an editor as another user.
328 </para>
[cf341b4]329 <indexterm zone="sudo sudoedit">
330 <primary sortas="b-sudoedit">sudoedit</primary>
331 </indexterm>
332 </listitem>
333 </varlistentry>
334
[72d90b67]335 <varlistentry id="sudoreplay">
336 <term><command>sudoreplay</command></term>
[3c0f868f]337 <listitem>
[bcd2922]338 <para>
[72d90b67]339 is used to play back or list the output
340 logs created by <command>sudo</command>.
[bcd2922]341 </para>
[72d90b67]342 <indexterm zone="sudo sudoreplay">
343 <primary sortas="b-sudoreplay">sudoreplay</primary>
[3c0f868f]344 </indexterm>
345 </listitem>
346 </varlistentry>
347
[72d90b67]348 <varlistentry id="visudo">
349 <term><command>visudo</command></term>
[61b8305]350 <listitem>
[bcd2922]351 <para>
[72d90b67]352 allows for safer editing of the <filename>sudoers</filename>
353 file.
[bcd2922]354 </para>
[72d90b67]355 <indexterm zone="sudo visudo">
356 <primary sortas="b-visudo">visudo</primary>
[61b8305]357 </indexterm>
358 </listitem>
359 </varlistentry>
[3c0f868f]360
[cf341b4]361 </variablelist>
362
363 </sect2>
364
365</sect1>
Note: See TracBrowser for help on using the repository browser.