Changeset 3c0f868f for postlfs


Ignore:
Timestamp:
12/22/2005 03:32:33 AM (18 years ago)
Author:
Archaic <archaic@…>
Branches:
10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 12.0, 12.1, 6.2, 6.2.0, 6.2.0-rc1, 6.2.0-rc2, 6.3, 6.3-rc1, 6.3-rc2, 6.3-rc3, 7.10, 7.4, 7.5, 7.6, 7.6-blfs, 7.6-systemd, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, gnome, kde5-13430, kde5-14269, kde5-14686, kea, ken/TL2024, ken/inkscape-core-mods, ken/tuningfonts, krejzi/svn, lazarus, lxqt, nosym, perl-modules, plabs/newcss, plabs/python-mods, python3.11, qt5new, rahul/power-profiles-daemon, renodr/vulkan-addition, systemd-11177, systemd-13485, trunk, upgradedb, xry111/intltool, xry111/llvm18, xry111/soup3, xry111/test-20220226, xry111/xf86-video-removal
Children:
2130862
Parents:
589e525
Message:

Removed the obsolete sed in sudo and added a note to use visudo to edit the sudoers file.

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@5453 af4574ff-66df-0310-9fd7-8a98e5e911e0

File:
1 edited

Legend:

Unmodified
Added
Removed
  • postlfs/security/sudo.xml

    r589e525 r3c0f868f  
    8484    the following commands:</para>
    8585
    86 <screen><userinput>sed -i -e 's/CDPATH",/&amp;\n    "SHELLOPTS",\n    "PS4",/' env.c
    87 ./configure --prefix=/usr --libexecdir=/usr/lib \
     86<screen><userinput>./configure --prefix=/usr --libexecdir=/usr/lib \
    8887    --enable-noargs-shell --with-ignore-dot --with-all-insults \
    8988    --enable-shell-sets-home &amp;&amp;
     
    9897  <sect2 role="commands">
    9998    <title>Command Explanations</title>
    100 
    101     <para><command>sed -i -e 's/CDPATH",/&amp;\n    "SHELLOPTS",\n    "PS4",/'
    102     env.c</command>:  This command adds two environment variables to a list of
    103     variables to be excluded from the target environment.  It solves a
    104     security problem.</para>
    10599
    106100    <para><option>--enable-noargs-shell</option>: This switch allows
     
    160154      <para>For details, see <command>man sudoers</command>.</para>
    161155
     156      <note>
     157        <para>The <application>Sudo</application> developers highly recommend
     158        using the <command>visudo</command> program to edit the
     159        <filename>sudoers</filename> file. This will provide basic sanity
     160        checking like syntax parsing and file permission to avoid some possible
     161        mistakes that could lead to a vulnerable configuration.</para>
     162      </note>
     163
    162164    </sect3>
    163165
     
    173175
    174176      <seglistitem>
    175         <seg>sudo and sudoedit</seg>
     177        <seg>sudo, sudoedit, and visudo</seg>
    176178        <seg>sudo_noexec.so</seg>
    177179        <seg>None</seg>
     
    208210      </varlistentry>
    209211
     212      <varlistentry id="visudo">
     213        <term><command>visudo</command></term>
     214        <listitem>
     215          <para>allows for safer editing of the <filename>sudoers</filename>
     216          file.</para>
     217          <indexterm zone="sudo visudo">
     218            <primary sortas="b-visudo">visudo</primary>
     219          </indexterm>
     220        </listitem>
     221      </varlistentry>
     222
     223
    210224      <varlistentry id="sudo_noexec">
    211225        <term><filename class='libraryfile'>sudo_noexec.so</filename></term>
Note: See TracChangeset for help on using the changeset viewer.