- Timestamp:
- 06/26/2013 06:30:40 PM (11 years ago)
- Branches:
- 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 12.0, 12.1, 7.10, 7.4, 7.5, 7.6, 7.6-blfs, 7.6-systemd, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, gnome, kde5-13430, kde5-14269, kde5-14686, kea, ken/TL2024, ken/inkscape-core-mods, ken/tuningfonts, krejzi/svn, lazarus, lxqt, nosym, perl-modules, plabs/newcss, plabs/python-mods, python3.11, qt5new, rahul/power-profiles-daemon, renodr/vulkan-addition, systemd-11177, systemd-13485, trunk, upgradedb, xry111/intltool, xry111/llvm18, xry111/soup3, xry111/test-20220226, xry111/xf86-video-removal
- Children:
- 663b22b2
- Parents:
- 858aaf8e
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
postlfs/security/sudo.xml
r858aaf8e r7a47afc 140 140 </para> 141 141 142 <!--143 <para>144 <option>--without-pam</option>: This switch disables the use of145 <application>PAM</application> authentication. Omit if you have146 <application>Linux PAM</application> installed.147 </para>148 149 <para>150 <option>--without-sendmail</option>: This switch disables the use of151 sendmail. Remove if you have a sendmail compatible MTA.152 </para>153 154 -->155 142 <note> 156 143 <para> … … 169 156 <title>Config File</title> 170 157 171 <para><filename>/etc/sudoers</filename></para> 158 <para> 159 <filename>/etc/sudoers</filename> 160 </para> 172 161 173 162 <indexterm zone="sudo sudo-config"> … … 249 238 <segmentedlist> 250 239 <segtitle>Installed Programs</segtitle> 251 240 <segtitle>Installed Libraries</segtitle> 252 241 <segtitle>Installed Directories</segtitle> 253 242 254 243 <seglistitem> 255 244 <seg> 256 sudo, sudoedit, sudoreplay and visudo245 sudo, sudoedit, sudoreplay, and visudo 257 246 </seg> 258 247 <seg> 259 group_file.so, sudoers.so, system_group.so, and sudo_noexec.so 248 group_file.so, sudoers.so, system_group.so, and 249 sudo_noexec.so 260 250 </seg> 261 251 <seg> 262 /etc/sudoers.d, /var/lib/sudo, /usr/lib/sudo, and 263 /usr/share/doc/sudo-&sudo-version; 252 /etc/sudoers.d, 253 /usr/lib/sudo, 254 /usr/share/doc/sudo-&sudo-version;, and 255 /var/lib/sudo 264 256 </seg> 265 257 </seglistitem> … … 322 314 </listitem> 323 315 </varlistentry> 324 <!-- 325 <varlistentry id="sudoers"> 326 <term><filename class='libraryfile'>sudoers.so</filename></term> 327 <listitem> 328 <para> 329 is default sudo security policy module. 330 </para> 331 <indexterm zone="sudo sudoers"> 332 <primary sortas="c-sudoers">sudoers.so</primary> 333 </indexterm> 334 </listitem> 335 </varlistentry> 336 337 <varlistentry id="sudo_noexec"> 338 <term><filename class='libraryfile'>sudo_noexec.so</filename></term> 339 <listitem> 340 <para> 341 enables support for the "noexec" functionality which prevents 342 a dynamically-linked program being run by sudo from executing 343 another program (think shell escapes). 344 </para> 345 <indexterm zone="sudo sudo_noexec"> 346 <primary sortas="c-sudo_noexec">sudo_noexec.so</primary> 347 </indexterm> 348 </listitem> 349 </varlistentry> 350 --> 316 351 317 </variablelist> 352 318
Note:
See TracChangeset
for help on using the changeset viewer.