-22/Mar/2000 1.6.3 1
+26/Mar/2000 1.6.3 1
-s The -s (_\bs_\bh_\be_\bl_\bl) option runs the shell specified by the
_\bS_\bH_\bE_\bL_\bL environment variable if it is set or the shell
- as specified in _\bp_\ba_\bs_\bs_\bw_\bd(5).
+ as specified in _\bp_\ba_\bs_\bs_\bw_\bd(4).
-22/Mar/2000 1.6.3 2
+26/Mar/2000 1.6.3 2
-H The -H (_\bH_\bO_\bM_\bE) option sets the _\bH_\bO_\bM_\bE environment
variable to the homedir of the target user (root by
- default) as specified in _\bp_\ba_\bs_\bs_\bw_\bd(5). By default, s\bs\bs\bsu\bu\bu\bud\bd\bd\bdo\bo\bo\bo
+ default) as specified in _\bp_\ba_\bs_\bs_\bw_\bd(4). By default, s\bs\bs\bsu\bu\bu\bud\bd\bd\bdo\bo\bo\bo
does not modify _\bH_\bO_\bM_\bE.
-S The -S (_\bs_\bt_\bd_\bi_\bn) option causes s\bs\bs\bsu\bu\bu\bud\bd\bd\bdo\bo\bo\bo to read the password
-22/Mar/2000 1.6.3 3
+26/Mar/2000 1.6.3 3
give away files.
E\bE\bE\bEX\bX\bX\bXA\bA\bA\bAM\bM\bM\bMP\bP\bP\bPL\bL\bL\bLE\bE\bE\bES\bS\bS\bS
- Note: the following examples assume suitable _\bs_\bu_\bd_\bo_\be_\br_\bs(5)
+ Note: the following examples assume suitable _\bs_\bu_\bd_\bo_\be_\br_\bs(4)
entries.
To get a file listing of an unreadable directory:
-22/Mar/2000 1.6.3 4
+26/Mar/2000 1.6.3 4
-22/Mar/2000 1.6.3 5
+26/Mar/2000 1.6.3 5
directory, setuid shell scripts are generally safe).
S\bS\bS\bSE\bE\bE\bEE\bE\bE\bE A\bA\bA\bAL\bL\bL\bLS\bS\bS\bSO\bO\bO\bO
- _\bl_\bo_\bg_\bi_\bn_\b__\bc_\ba_\bp(3), _\bs_\bu_\bd_\bo_\be_\br_\bs(5), _\bv_\bi_\bs_\bu_\bd_\bo(8), _\bs_\bu(1).
+ _\bl_\bo_\bg_\bi_\bn_\b__\bc_\ba_\bp(3), _\bs_\bu_\bd_\bo_\be_\br_\bs(4), _\bv_\bi_\bs_\bu_\bd_\bo(1m), _\bs_\bu(1).
-22/Mar/2000 1.6.3 6
+26/Mar/2000 1.6.3 6
''' $RCSfile$$Revision$$Date$
'''
''' $Log$
-''' Revision 1.2 2000/03/23 00:35:58 millert
-''' Add FreeBSD login.conf support (untested on BSD/OS) based on a patch from
-''' Michael D. Marchionna.
-''' configure now does substitution on the man pages, allowing us to
-''' fix up the paths and set the section correctly. Based on an idea
-''' from Michael D. Marchionna.
+''' Revision 1.3 2000/03/27 03:26:23 millert
+''' Use @mansectsu@ and @mansectform@ in the man page bodies as well.
'''
'''
.de Sh
.nr % 0
.rr F
.\}
-.TH sudo @mansectsu@ "1.6.3" "22/Mar/2000" "MAINTENANCE COMMANDS"
+.TH sudo @mansectsu@ "1.6.3" "26/Mar/2000" "MAINTENANCE COMMANDS"
.UC
.if n .hy 0
.if n .na
.Ip "-s" 4
The \f(CW-s\fR (\fIshell\fR) option runs the shell specified by the \fI\s-1SHELL\s0\fR
environment variable if it is set or the shell as specified
-in \fIpasswd\fR\|(5).
+in \fIpasswd\fR\|(@mansectform@).
.Ip "-H" 4
The \f(CW-H\fR (\fI\s-1HOME\s0\fR) option sets the \fI\s-1HOME\s0\fR environment variable
to the homedir of the target user (root by default) as specified
-in \fIpasswd\fR\|(5). By default, \fBsudo\fR does not modify \fI\s-1HOME\s0\fR.
+in \fIpasswd\fR\|(@mansectform@). By default, \fBsudo\fR does not modify \fI\s-1HOME\s0\fR.
.Ip "-S" 4
The \f(CW-S\fR (\fIstdin\fR) option causes \fBsudo\fR to read the password from
standard input instead of the terminal device.
keep a user from creating his/her own timestamp with a bogus
date on system that allow users to give away files.
.SH "EXAMPLES"
-Note: the following examples assume suitable \fIsudoers\fR\|(5) entries.
+Note: the following examples assume suitable \fIsudoers\fR\|(@mansectform@) entries.
.PP
To get a file listing of an unreadable directory:
.PP
(if your OS supports the /dev/fd/ directory, setuid shell scripts
are generally safe).
.SH "SEE ALSO"
-\fIlogin_cap\fR\|(3), \fIsudoers\fR\|(5), \fIvisudo\fR\|(8), \fIsu\fR\|(1).
+\fIlogin_cap\fR\|(3), \fIsudoers\fR\|(@mansectform@), \fIvisudo\fR\|(@mansectsu@), \fIsu\fR\|(1).
.rn }` ''
.IX Title "sudo @mansectsu@"
The C<-s> (I<shell>) option runs the shell specified by the I<SHELL>
environment variable if it is set or the shell as specified
-in passwd(5).
+in passwd(@mansectform@).
=item -H
The C<-H> (I<HOME>) option sets the I<HOME> environment variable
to the homedir of the target user (root by default) as specified
-in passwd(5). By default, B<sudo> does not modify I<HOME>.
+in passwd(@mansectform@). By default, B<sudo> does not modify I<HOME>.
=item -S
=head1 EXAMPLES
-Note: the following examples assume suitable sudoers(5) entries.
+Note: the following examples assume suitable sudoers(@mansectform@) entries.
To get a file listing of an unreadable directory:
=head1 SEE ALSO
-login_cap(3), sudoers(5), visudo(8), su(1).
+login_cap(3), sudoers(@mansectform@), visudo(@mansectsu@), su(1).
-22/Mar/2000 1.6.3 1
+26/Mar/2000 1.6.3 1
-22/Mar/2000 1.6.3 2
+26/Mar/2000 1.6.3 2
-22/Mar/2000 1.6.3 3
+26/Mar/2000 1.6.3 3
-22/Mar/2000 1.6.3 4
+26/Mar/2000 1.6.3 4
-22/Mar/2000 1.6.3 5
+26/Mar/2000 1.6.3 5
-22/Mar/2000 1.6.3 6
+26/Mar/2000 1.6.3 6
-22/Mar/2000 1.6.3 7
+26/Mar/2000 1.6.3 7
-22/Mar/2000 1.6.3 8
+26/Mar/2000 1.6.3 8
-22/Mar/2000 1.6.3 9
+26/Mar/2000 1.6.3 9
-22/Mar/2000 1.6.3 10
+26/Mar/2000 1.6.3 10
-22/Mar/2000 1.6.3 11
+26/Mar/2000 1.6.3 11
-22/Mar/2000 1.6.3 12
+26/Mar/2000 1.6.3 12
-22/Mar/2000 1.6.3 13
+26/Mar/2000 1.6.3 13
-22/Mar/2000 1.6.3 14
+26/Mar/2000 1.6.3 14
-22/Mar/2000 1.6.3 15
+26/Mar/2000 1.6.3 15
S\bS\bS\bSE\bE\bE\bEE\bE\bE\bE A\bA\bA\bAL\bL\bL\bLS\bS\bS\bSO\bO\bO\bO
- _\bs_\bu_\bd_\bo(8), _\bv_\bi_\bs_\bu_\bd_\bo(8), _\bs_\bu(1), _\bf_\bn_\bm_\ba_\bt_\bc_\bh(3).
+ _\bs_\bu_\bd_\bo(1m), _\bv_\bi_\bs_\bu_\bd_\bo(1m), _\bs_\bu(1), _\bf_\bn_\bm_\ba_\bt_\bc_\bh(3).
-22/Mar/2000 1.6.3 16
+26/Mar/2000 1.6.3 16
-22/Mar/2000 1.6.3 17
+26/Mar/2000 1.6.3 17
''' $RCSfile$$Revision$$Date$
'''
''' $Log$
-''' Revision 1.4 2000/03/23 04:09:53 millert
-''' Add support for wildcards in the hostname.
+''' Revision 1.5 2000/03/27 03:26:23 millert
+''' Use @mansectsu@ and @mansectform@ in the man page bodies as well.
'''
'''
.de Sh
.nr % 0
.rr F
.\}
-.TH sudoers @mansectform@ "1.6.3" "22/Mar/2000" "FILE FORMATS"
+.TH sudoers @mansectform@ "1.6.3" "26/Mar/2000" "FILE FORMATS"
.UC
.if n .hy 0
.if n .na
\& /etc/netgroup List of network groups
.Ve
.SH "SEE ALSO"
-\fIsudo\fR\|(8), \fIvisudo\fR\|(8), \fIsu\fR\|(1), \fIfnmatch\fR\|(3).
+\fIsudo\fR\|(@mansectsu@), \fIvisudo\fR\|(@mansectsu@), \fIsu\fR\|(1), \fIfnmatch\fR\|(3).
.rn }` ''
.IX Title "sudoers @mansectform@"
=head1 SEE ALSO
-sudo(8), visudo(8), su(1), fnmatch(3).
+sudo(@mansectsu@), visudo(@mansectsu@), su(1), fnmatch(3).
D\bD\bD\bDE\bE\bE\bES\bS\bS\bSC\bC\bC\bCR\bR\bR\bRI\bI\bI\bIP\bP\bP\bPT\bT\bT\bTI\bI\bI\bIO\bO\bO\bON\bN\bN\bN
v\bv\bv\bvi\bi\bi\bis\bs\bs\bsu\bu\bu\bud\bd\bd\bdo\bo\bo\bo edits the _\bs_\bu_\bd_\bo_\be_\br_\bs file in a safe fashion, analogous
- to _\bv_\bi_\bp_\bw(8). v\bv\bv\bvi\bi\bi\bis\bs\bs\bsu\bu\bu\bud\bd\bd\bdo\bo\bo\bo locks the _\bs_\bu_\bd_\bo_\be_\br_\bs file against
+ to _\bv_\bi_\bp_\bw(1m). v\bv\bv\bvi\bi\bi\bis\bs\bs\bsu\bu\bu\bud\bd\bd\bdo\bo\bo\bo locks the _\bs_\bu_\bd_\bo_\be_\br_\bs file against
multiple simultaneous edits, provides basic sanity checks,
and checks for parse errors. If the _\bs_\bu_\bd_\bo_\be_\br_\bs file is
currently being edited you will receive a message to try
shell if the editor used by v\bv\bv\bvi\bi\bi\bis\bs\bs\bsu\bu\bu\bud\bd\bd\bdo\bo\bo\bo allows shell escapes.
S\bS\bS\bSE\bE\bE\bEE\bE\bE\bE A\bA\bA\bAL\bL\bL\bLS\bS\bS\bSO\bO\bO\bO
- _\bs_\bu_\bd_\bo(8), _\bv_\bi_\bp_\bw(8).
+ _\bs_\bu_\bd_\bo(1m), _\bv_\bi_\bp_\bw(1m).
''' $RCSfile$$Revision$$Date$
'''
''' $Log$
-''' Revision 1.3 2000/03/27 03:07:35 millert
-''' Typo: @sysconf@ -> @sysconfdir@
+''' Revision 1.4 2000/03/27 03:26:24 millert
+''' Use @mansectsu@ and @mansectform@ in the man page bodies as well.
'''
'''
.de Sh
\fBvisudo\fR [ \fB\-s\fR ] [ \fB\-V\fR ]
.SH "DESCRIPTION"
\fBvisudo\fR edits the \fIsudoers\fR file in a safe fashion, analogous to
-\fIvipw\fR\|(8). \fBvisudo\fR locks the \fIsudoers\fR file against multiple
+\fIvipw\fR\|(@mansectsu@). \fBvisudo\fR locks the \fIsudoers\fR file against multiple
simultaneous edits, provides basic sanity checks, and checks
for parse errors. If the \fIsudoers\fR file is currently being
edited you will receive a message to try again later. In the
There is no easy way to prevent a user from gaining a root shell if
the editor used by \fBvisudo\fR allows shell escapes.
.SH "SEE ALSO"
-\fIsudo\fR\|(8), \fIvipw\fR\|(8).
+\fIsudo\fR\|(@mansectsu@), \fIvipw\fR\|(@mansectsu@).
.rn }` ''
.IX Title "visudo @mansectsu@"
=head1 DESCRIPTION
B<visudo> edits the I<sudoers> file in a safe fashion, analogous to
-vipw(8). B<visudo> locks the I<sudoers> file against multiple
+vipw(@mansectsu@). B<visudo> locks the I<sudoers> file against multiple
simultaneous edits, provides basic sanity checks, and checks
for parse errors. If the I<sudoers> file is currently being
edited you will receive a message to try again later. In the
=head1 SEE ALSO
-sudo(8), vipw(8).
+sudo(@mansectsu@), vipw(@mansectsu@).