security consequences.
To prevent the disclosure of potentially sensitive information, s\bsu\bud\bdo\bo
disables core dumps by default while it is executing (they are re-enabled
- for the command that is run). To aid in debugging s\bsu\bud\bdo\bo crashes, you may
- wish to re-enable core dumps by setting ``disable_coredump'' to false in
- the sudo.conf(4) file as follows:
+ for the command that is run). This historical practice dates from a time
+ when most operating systems allowed setuid processes to dump core by
+ default. To aid in debugging s\bsu\bud\bdo\bo crashes, you may wish to re-enable
+ core dumps by setting ``disable_coredump'' to false in the sudo.conf(4)
+ file as follows:
Set disable_coredump false
The s\bsu\bud\bdo\bo.\b.c\bco\bon\bnf\bf file also supports the following front end settings:
disable_coredump
- Core dumps of s\bsu\bud\bdo\bo itself are disabled by default. To aid in
+ Core dumps of s\bsu\bud\bdo\bo itself are disabled by default to prevent
+ the disclosure of potentially sensitive information. To aid in
debugging s\bsu\bud\bdo\bo crashes, you may wish to re-enable core dumps by
setting ``disable_coredump'' to false in s\bsu\bud\bdo\bo.\b.c\bco\bon\bnf\bf as follows:
Set disable_coredump false
- Note that most operating systems disable core dumps from setuid
- programs, including s\bsu\bud\bdo\bo. To actually get a s\bsu\bud\bdo\bo core file you
- will likely need to enable core dumps for setuid processes. On
- BSD and Linux systems this is accomplished in the sysctl
- command. On Solaris, the coreadm command is used to configure
- core dump behavior.
+ All modern operating systems place restrictions on core dumps
+ from setuid processes like s\bsu\bud\bdo\bo so this option can be enabled
+ without compromising security. To actually get a s\bsu\bud\bdo\bo core
+ file you will likely need to enable core dumps for setuid
+ processes. On BSD and Linux systems this is accomplished in
+ the sysctl command. On Solaris, the coreadm command is used to
+ configure core dump behavior.
This setting is only available in s\bsu\bud\bdo\bo version 1.8.4 and
higher.
disable_coredump
Core dumps of
\fBsudo\fR
-itself are disabled by default.
+itself are disabled by default to prevent the disclosure of potentially
+sensitive information.
To aid in debugging
\fBsudo\fR
crashes, you may wish to re-enable core dumps by setting
.fi
.RS 10n
.sp
-Note that most operating systems disable core dumps from setuid programs,
-including
-\fBsudo\fR.
+All modern operating systems place restrictions on core dumps
+from setuid processes like
+\fBsudo\fR
+so this option can be enabled without compromising security.
To actually get a
\fBsudo\fR
core file you will likely need to enable core dumps for setuid processes.
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd December 4, 2014
+.Dd August 9, 2015
.Dt SUDO @mansectform@
.Os Sudo @PACKAGE_VERSION@
.Sh NAME
.It disable_coredump
Core dumps of
.Nm sudo
-itself are disabled by default.
+itself are disabled by default to prevent the disclosure of potentially
+sensitive information.
To aid in debugging
.Nm sudo
crashes, you may wish to re-enable core dumps by setting
Set disable_coredump false
.Ed
.Pp
-Note that most operating systems disable core dumps from setuid programs,
-including
-.Nm sudo .
+All modern operating systems place restrictions on core dumps
+from setuid processes like
+.Nm sudo
+so this option can be enabled without compromising security.
To actually get a
.Nm sudo
core file you will likely need to enable core dumps for setuid processes.
\fBsudo\fR
disables core dumps by default while it is executing (they are
re-enabled for the command that is run).
+This historical practice dates from a time when most operating
+systems allowed setuid processes to dump core by default.
To aid in debugging
\fBsudo\fR
crashes, you may wish to re-enable core dumps by setting
.\" Agency (DARPA) and Air Force Research Laboratory, Air Force
.\" Materiel Command, USAF, under agreement number F39502-99-1-0512.
.\"
-.Dd August 7, 2015
+.Dd August 9, 2015
.Dt SUDO @mansectsu@
.Os Sudo @PACKAGE_VERSION@
.Sh NAME
.Nm
disables core dumps by default while it is executing (they are
re-enabled for the command that is run).
+This historical practice dates from a time when most operating
+systems allowed setuid processes to dump core by default.
To aid in debugging
.Nm
crashes, you may wish to re-enable core dumps by setting