Run the command with the primary group set to _\bg_\br_\bo_\bu_\bp instead
of the primary group specified by the target user's password
database entry. The _\bg_\br_\bo_\bu_\bp may be either a group name or a
- numeric group ID (GID) prefixed with the `#' character (e.g.
+ numeric group ID (GID) prefixed with the `#' character (e.g.,
#0 for GID 0). When running a command as a GID, many shells
require that the `#' be escaped with a backslash (`\'). If
no -\b-u\bu option is specified, the command will be run as the
-\b-u\bu _\bu_\bs_\be_\br, -\b--\b-u\bus\bse\ber\br=_\bu_\bs_\be_\br
Run the command as a user other than the default target user
(usually _\br_\bo_\bo_\bt). The _\bu_\bs_\be_\br may be either a user name or a
- numeric user ID (UID) prefixed with the `#' character (e.g.
+ numeric user ID (UID) prefixed with the `#' character (e.g.,
#0 for UID 0). When running commands as a UID, many shells
require that the `#' be escaped with a backslash (`\'). Some
security policies may restrict UIDs to those listed in the
command line arguments.
Environment variables to be set for the command may also be passed on the
- command line in the form of _\bV_\bA_\bR=_\bv_\ba_\bl_\bu_\be, e.g.
+ command line in the form of _\bV_\bA_\bR=_\bv_\ba_\bl_\bu_\be, e.g.,
LD_LIBRARY_PATH=_\b/_\bu_\bs_\br_\b/_\bl_\bo_\bc_\ba_\bl_\b/_\bp_\bk_\bg_\b/_\bl_\bi_\bb. Variables passed on the command line
are subject to restrictions imposed by the security policy plugin. The
_\bs_\bu_\bd_\bo_\be_\br_\bs policy subjects variables passed on the command line to the same
file distributed with s\bsu\bud\bdo\bo or https://www.sudo.ws/license.html for
complete details.
-Sudo 1.8.25 March 21, 2018 Sudo 1.8.25
+Sudo 1.8.26 October 6, 2018 Sudo 1.8.26
.\" Agency (DARPA) and Air Force Research Laboratory, Air Force
.\" Materiel Command, USAF, under agreement number F39502-99-1-0512.
.\"
-.TH "SUDO" "8" "March 21, 2018" "Sudo @PACKAGE_VERSION@" "System Manager's Manual"
+.TH "SUDO" "8" "October 6, 2018" "Sudo @PACKAGE_VERSION@" "System Manager's Manual"
.nh
.if n .ad l
.SH "NAME"
(GID)
prefixed with the
\(oq#\(cq
-character (e.g.
+character (e.g.,
\fR#0\fR
for GID 0).
When running a command as a GID, many shells require that the
(UID)
prefixed with the
\(oq#\(cq
-character (e.g.
+character (e.g.,
\fR#0\fR
for UID 0).
When running commands as a UID, many shells require that the
Environment variables to be set for the command may also be passed
on the command line in the form of
\fIVAR\fR=\fIvalue\fR,
-e.g.\&
+e.g.,
\fRLD_LIBRARY_PATH\fR=\fI/usr/local/pkg/lib\fR.
Variables passed on the command line are subject to restrictions
imposed by the security policy plugin.
.\" Agency (DARPA) and Air Force Research Laboratory, Air Force
.\" Materiel Command, USAF, under agreement number F39502-99-1-0512.
.\"
-.Dd March 21, 2018
+.Dd October 6, 2018
.Dt SUDO @mansectsu@
.Os Sudo @PACKAGE_VERSION@
.Sh NAME
.Pq GID
prefixed with the
.Ql #
-character (e.g.
+character (e.g.,
.Li #0
for GID 0).
When running a command as a GID, many shells require that the
.Pq UID
prefixed with the
.Ql #
-character (e.g.
+character (e.g.,
.Li #0
for UID 0).
When running commands as a UID, many shells require that the
Environment variables to be set for the command may also be passed
on the command line in the form of
.Ar VAR Ns = Ns Ar value ,
-e.g.\&
+e.g.,
.Ev LD_LIBRARY_PATH Ns = Ns Pa /usr/local/pkg/lib .
Variables passed on the command line are subject to restrictions
imposed by the security policy plugin.
network_addrs=list
A space-separated list of IP network addresses and
- netmasks in the form "addr/netmask", e.g.
+ netmasks in the form "addr/netmask", e.g.,
"192.168.1.2/255.255.255.0". The address and netmask
pairs may be either IPv4 or IPv6, depending on what the
operating system supports. If the address contains a
user's home directory.
sudoedit=bool
- Set to true when the -\b-e\be flag is is specified or if
- invoked as s\bsu\bud\bdo\boe\bed\bdi\bit\bt. The plugin shall substitute an
- editor into _\ba_\br_\bg_\bv in the c\bch\bhe\bec\bck\bk_\b_p\bpo\bol\bli\bic\bcy\by() function or
- return -2 with a usage error if the plugin does not
- support _\bs_\bu_\bd_\bo_\be_\bd_\bi_\bt. For more information, see the
- _\bc_\bh_\be_\bc_\bk_\b__\bp_\bo_\bl_\bi_\bc_\by section.
+ Set to true when the -\b-e\be flag is specified or if invoked
+ as s\bsu\bud\bdo\boe\bed\bdi\bit\bt. The plugin shall substitute an editor
+ into _\ba_\br_\bg_\bv in the c\bch\bhe\bec\bck\bk_\b_p\bpo\bol\bli\bic\bcy\by() function or return -2
+ with a usage error if the plugin does not support
+ _\bs_\bu_\bd_\bo_\be_\bd_\bi_\bt. For more information, see the _\bc_\bh_\be_\bc_\bk_\b__\bp_\bo_\bl_\bi_\bc_\by
+ section.
timeout=string
User-specified command timeout. Not all plugins
file distributed with s\bsu\bud\bdo\bo or https://www.sudo.ws/license.html for
complete details.
-Sudo 1.8.25 June 1, 2018 Sudo 1.8.25
+Sudo 1.8.26 October 6, 2018 Sudo 1.8.26
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.TH "SUDO_PLUGIN" "5" "June 1, 2018" "Sudo @PACKAGE_VERSION@" "File Formats Manual"
+.TH "SUDO_PLUGIN" "5" "October 6, 2018" "Sudo @PACKAGE_VERSION@" "File Formats Manual"
.nh
.if n .ad l
.SH "NAME"
A space-separated list of IP network addresses and netmasks in the
form
\(lqaddr/netmask\(rq,
-e.g.\&
+e.g.,
\(lq192.168.1.2/255.255.255.0\(rq.
The address and netmask pairs may be either IPv4 or IPv6, depending on
what the operating system supports.
sudoedit=bool
Set to true when the
\fB\-e\fR
-flag is is specified or if invoked as
+flag is specified or if invoked as
\fBsudoedit\fR.
The plugin shall substitute an editor into
\fIargv\fR
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd June 1, 2018
+.Dd October 6, 2018
.Dt SUDO_PLUGIN @mansectform@
.Os Sudo @PACKAGE_VERSION@
.Sh NAME
A space-separated list of IP network addresses and netmasks in the
form
.Dq addr/netmask ,
-e.g.\&
+e.g.,
.Dq 192.168.1.2/255.255.255.0 .
The address and netmask pairs may be either IPv4 or IPv6, depending on
what the operating system supports.
.It sudoedit=bool
Set to true when the
.Fl e
-flag is is specified or if invoked as
+flag is specified or if invoked as
.Nm sudoedit .
The plugin shall substitute an editor into
.Em argv
policy information in LDAP, please see sudoers.ldap(4).
C\bCo\bon\bnf\bfi\big\bgu\bur\bri\bin\bng\bg s\bsu\bud\bdo\bo.\b.c\bco\bon\bnf\bf f\bfo\bor\br s\bsu\bud\bdo\boe\ber\brs\bs
- s\bsu\bud\bdo\bo consults the sudo.conf(4) file to determine which policy and and I/O
+ s\bsu\bud\bdo\bo consults the sudo.conf(4) file to determine which policy and I/O
logging plugins to load. If no sudo.conf(4) file is present, or if it
contains no Plugin lines, s\bsu\bud\bdo\boe\ber\brs\bs will be used for policy decisions and
I/O logging. To explicitly configure sudo.conf(4) to use the s\bsu\bud\bdo\boe\ber\brs\bs
Starting with s\bsu\bud\bdo\bo 1.8.5, it is possible to specify optional arguments to
the s\bsu\bud\bdo\boe\ber\brs\bs plugin in the sudo.conf(4) file. These arguments, if
- present, should be listed after the path to the plugin (i.e. after
+ present, should be listed after the path to the plugin (i.e., after
_\bs_\bu_\bd_\bo_\be_\br_\bs_\b._\bs_\bo). Multiple arguments may be specified, separated by white
space. For example:
A user name, uid, group, gid, netgroup, nonunix_group or nonunix_gid may
be enclosed in double quotes to avoid the need for escaping special
characters. Alternately, special characters may be specified in escaped
- hex mode, e.g. \x20 for space. When using double quotes, any prefix
+ hex mode, e.g., \x20 for space. When using double quotes, any prefix
characters must be included inside the quotes.
The actual nonunix_group and nonunix_gid syntax depends on the underlying
User_Aliases it can contain Runas_Aliases. Note that user names and
groups are matched as strings. In other words, two users (groups) with
the same uid (gid) are considered to be distinct. If you wish to match
- all user names with the same uid (e.g. root and toor), you can use a uid
+ all user names with the same uid (e.g., root and toor), you can use a uid
instead (#0 in the example given).
Host_List ::= Host |
host's network interfaces and, if the network number corresponds to one
of the hosts's network interfaces, will use the netmask of that
interface. The netmask may be specified either in standard IP address
- notation (e.g. 255.255.255.0 or ffff:ffff:ffff:ffff::), or CIDR notation
- (number of bits, e.g. 24 or 64). A host name may include shell-style
+ notation (e.g., 255.255.255.0 or ffff:ffff:ffff:ffff::), or CIDR notation
+ (number of bits, e.g., 24 or 64). A host name may include shell-style
wildcards (see the _\bW_\bi_\bl_\bd_\bc_\ba_\br_\bd_\bs section below), but unless the host name
command on your machine returns the fully qualified host name, you'll
need to use the _\bf_\bq_\bd_\bn option for wildcards to be useful. Note that s\bsu\bud\bdo\bo
characters in a _\bU_\bs_\be_\br _\bS_\bp_\be_\bc_\bi_\bf_\bi_\bc_\ba_\bt_\bi_\bo_\bn (`=', `:', `(', `)') is optional.
The following characters must be escaped with a backslash (`\') when used
- as part of a word (e.g. a user name or host name): `!', `=', `:', `,',
+ as part of a word (e.g., a user name or host name): `!', `=', `:', `,',
`(', `)', `\'.
S\bSU\bUD\bDO\bOE\bER\bRS\bS O\bOP\bPT\bTI\bIO\bON\bNS\bS
terminal, _\bu_\bs_\be_\b__\bp_\bt_\by has no effect.
A malicious program run under s\bsu\bud\bdo\bo may be capable of
- injecting injecting commands into the user's terminal
- or running a background process that retains access to
- the user's terminal device even after the main program
- has finished executing. By running the command in a
+ injecting commands into the user's terminal or running
+ a background process that retains access to the user's
+ terminal device even after the main program has
+ finished executing. By running the command in a
separate pseudo-pty, this attack is no longer possible.
This flag is _\bo_\bf_\bf by default.
%{seq}
expanded to a monotonically increasing base-36
sequence number, such as 0100A5, where every two
- digits are used to form a new directory, e.g.
+ digits are used to form a new directory, e.g.,
_\b0_\b1_\b/_\b0_\b0_\b/_\bA_\b5
%{user}
%{runas_user}
expanded to the login name of the user the
- command will be run as (e.g. root)
+ command will be run as (e.g., root)
%{runas_group}
expanded to the group name of the user the
- command will be run as (e.g. wheel)
+ command will be run as (e.g., wheel)
%{hostname}
expanded to the local host name without the
file permissions will always include the owner read and
write bits, even if they are not present in the
specified mode. When creating I/O log directories,
- search (execute) bits are added to to match the read
- and write bits specified by _\bi_\bo_\bl_\bo_\bg_\b__\bm_\bo_\bd_\be. Defaults to
- 0600 (read and write by user only).
+ search (execute) bits are added to match the read and
+ write bits specified by _\bi_\bo_\bl_\bo_\bg_\b__\bm_\bo_\bd_\be. Defaults to 0600
+ (read and write by user only).
This setting is only supported by version 1.8.19 or
higher.
username The login name of the user who ran s\bsu\bud\bdo\bo.
- ttyname The short name of the terminal (e.g. "console", "tty01", or
- "pts/0") s\bsu\bud\bdo\bo was run on, or "unknown" if there was no
+ ttyname The short name of the terminal (e.g., "console", "tty01",
+ or "pts/0") s\bsu\bud\bdo\bo was run on, or "unknown" if there was no
terminal present.
cwd The current working directory that s\bsu\bud\bdo\bo was run in.
file distributed with s\bsu\bud\bdo\bo or https://www.sudo.ws/license.html for
complete details.
-Sudo 1.8.26 September 24, 2018 Sudo 1.8.26
+Sudo 1.8.26 October 6, 2018 Sudo 1.8.26
.\" Agency (DARPA) and Air Force Research Laboratory, Air Force
.\" Materiel Command, USAF, under agreement number F39502-99-1-0512.
.\"
-.TH "SUDOERS" "5" "September 24, 2018" "Sudo @PACKAGE_VERSION@" "File Formats Manual"
+.TH "SUDOERS" "5" "October 6, 2018" "Sudo @PACKAGE_VERSION@" "File Formats Manual"
.nh
.if n .ad l
.SH "NAME"
\fBsudo\fR
consults the
sudo.conf(@mansectform@)
-file to determine which policy and and I/O logging plugins to load.
+file to determine which policy and I/O logging plugins to load.
If no
sudo.conf(@mansectform@)
file is present, or if it contains no
sudo.conf(@mansectform@)
file.
These arguments, if present, should be listed after the path to the plugin
-(i.e.\& after
+(i.e., after
\fIsudoers.so\fR).
Multiple arguments may be specified, separated by white space.
For example:
may be enclosed in double quotes to avoid the
need for escaping special characters.
Alternately, special characters
-may be specified in escaped hex mode, e.g.\& \ex20 for space.
+may be specified in escaped hex mode, e.g., \ex20 for space.
When
using double quotes, any prefix characters must be included inside
the quotes.
user names and groups are matched as strings.
In other words, two
users (groups) with the same uid (gid) are considered to be distinct.
-If you wish to match all user names with the same uid (e.g.\&
+If you wish to match all user names with the same uid (e.g.,
root and toor), you can use a uid instead (#0 in the example given).
.nf
.sp
if the network number corresponds to one of the hosts's network
interfaces, will use the netmask of that interface.
The netmask may be specified either in standard IP address notation
-(e.g.\& 255.255.255.0 or ffff:ffff:ffff:ffff::),
-or CIDR notation (number of bits, e.g.\& 24 or 64).
+(e.g., 255.255.255.0 or ffff:ffff:ffff:ffff::),
+or CIDR notation (number of bits, e.g., 24 or 64).
A host name may include shell-style wildcards (see the
\fIWildcards\fR
section below),
.PP
The following characters must be escaped with a backslash
(\(oq\e\(cq)
-when used as part of a word (e.g.\& a user name or host name):
+when used as part of a word (e.g., a user name or host name):
\(oq\&!\(cq,
\(oq=\&\(cq,
\(oq:\&\(cq,
.sp
A malicious program run under
\fBsudo\fR
-may be capable of injecting injecting commands into the user's
+may be capable of injecting commands into the user's
terminal or running a background process that retains access to the
user's terminal device even after the main program has finished
executing.
.TP 6n
\fR%{seq}\fR
expanded to a monotonically increasing base-36 sequence number, such as 0100A5,
-where every two digits are used to form a new directory, e.g.\&
+where every two digits are used to form a new directory, e.g.,
\fI01/00/A5\fR
.PD
.TP 6n
.TP 6n
\fR%{runas_user}\fR
expanded to the login name of the user the command will
-be run as (e.g.\& root)
+be run as (e.g., root)
.TP 6n
\fR%{runas_group}\fR
expanded to the group name of the user the command will
-be run as (e.g.\& wheel)
+be run as (e.g., wheel)
.TP 6n
\fR%{hostname}\fR
expanded to the local host name without the domain name
The file permissions will always include the owner read and
write bits, even if they are not present in the specified mode.
When creating I/O log directories, search (execute) bits are added
-to to match the read and write bits specified by
+to match the read and write bits specified by
\fIiolog_mode\fR.
Defaults to 0600 (read and write by user only).
.sp
\fBsudo\fR.
.TP 14n
ttyname
-The short name of the terminal (e.g.\&
+The short name of the terminal (e.g.,
\(lqconsole\(rq,
\(lqtty01\(rq,
or
.\" Agency (DARPA) and Air Force Research Laboratory, Air Force
.\" Materiel Command, USAF, under agreement number F39502-99-1-0512.
.\"
-.Dd September 24, 2018
+.Dd October 6, 2018
.Dt SUDOERS @mansectform@
.Os Sudo @PACKAGE_VERSION@
.Sh NAME
.Nm sudo
consults the
.Xr sudo.conf @mansectform@
-file to determine which policy and and I/O logging plugins to load.
+file to determine which policy and I/O logging plugins to load.
If no
.Xr sudo.conf @mansectform@
file is present, or if it contains no
.Xr sudo.conf @mansectform@
file.
These arguments, if present, should be listed after the path to the plugin
-(i.e.\& after
+(i.e., after
.Pa sudoers.so ) .
Multiple arguments may be specified, separated by white space.
For example:
may be enclosed in double quotes to avoid the
need for escaping special characters.
Alternately, special characters
-may be specified in escaped hex mode, e.g.\& \ex20 for space.
+may be specified in escaped hex mode, e.g., \ex20 for space.
When
using double quotes, any prefix characters must be included inside
the quotes.
user names and groups are matched as strings.
In other words, two
users (groups) with the same uid (gid) are considered to be distinct.
-If you wish to match all user names with the same uid (e.g.\&
+If you wish to match all user names with the same uid (e.g.,
root and toor), you can use a uid instead (#0 in the example given).
.Bd -literal
Host_List ::= Host |
if the network number corresponds to one of the hosts's network
interfaces, will use the netmask of that interface.
The netmask may be specified either in standard IP address notation
-(e.g.\& 255.255.255.0 or ffff:ffff:ffff:ffff::),
-or CIDR notation (number of bits, e.g.\& 24 or 64).
+(e.g., 255.255.255.0 or ffff:ffff:ffff:ffff::),
+or CIDR notation (number of bits, e.g., 24 or 64).
A host name may include shell-style wildcards (see the
.Sx Wildcards
section below),
.Pp
The following characters must be escaped with a backslash
.Pq Ql \e
-when used as part of a word (e.g.\& a user name or host name):
+when used as part of a word (e.g., a user name or host name):
.Ql \&! ,
.Ql =\& ,
.Ql :\& ,
.Pp
A malicious program run under
.Nm sudo
-may be capable of injecting injecting commands into the user's
+may be capable of injecting commands into the user's
terminal or running a background process that retains access to the
user's terminal device even after the main program has finished
executing.
.Bl -tag -width 4n
.It Li %{seq}
expanded to a monotonically increasing base-36 sequence number, such as 0100A5,
-where every two digits are used to form a new directory, e.g.\&
+where every two digits are used to form a new directory, e.g.,
.Pa 01/00/A5
.It Li %{user}
expanded to the invoking user's login name
expanded to the name of the invoking user's real group ID
.It Li %{runas_user}
expanded to the login name of the user the command will
-be run as (e.g.\& root)
+be run as (e.g., root)
.It Li %{runas_group}
expanded to the group name of the user the command will
-be run as (e.g.\& wheel)
+be run as (e.g., wheel)
.It Li %{hostname}
expanded to the local host name without the domain name
.It Li %{command}
The file permissions will always include the owner read and
write bits, even if they are not present in the specified mode.
When creating I/O log directories, search (execute) bits are added
-to to match the read and write bits specified by
+to match the read and write bits specified by
.Em iolog_mode .
Defaults to 0600 (read and write by user only).
.Pp
The login name of the user who ran
.Nm sudo .
.It ttyname
-The short name of the terminal (e.g.\&
+The short name of the terminal (e.g.,
.Dq console ,
.Dq tty01 ,
or
Records of type TS_GLOBAL cannot be locked for a long period of time
since doing so would interfere with other s\bsu\bud\bdo\bo processes. Instead, a
separate lock record is used to prevent multiple s\bsu\bud\bdo\bo processes using the
- same terminal (or parent process ID) from from prompting for a password
- as the same time.
+ same terminal (or parent process ID) from prompting for a password as the
+ same time.
S\bSE\bEE\bE A\bAL\bLS\bSO\bO
sudoers(4), sudo(1m)
file distributed with s\bsu\bud\bdo\bo or https://www.sudo.ws/license.html for
complete details.
-Sudo 1.8.25 December 21, 2017 Sudo 1.8.25
+Sudo 1.8.26 October 6, 2018 Sudo 1.8.26
.\" Automatically generated from an mdoc input file. Do not edit.
.\"
-.\" Copyright (c) 2017 Todd C. Miller <Todd.Miller@sudo.ws>
+.\" Copyright (c) 2017-2018 Todd C. Miller <Todd.Miller@sudo.ws>
.\"
.\" Permission to use, copy, modify, and distribute this software for any
.\" purpose with or without fee is hereby granted, provided that the above
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.TH "SUDOERS_TIMESTAMP" "5" "December 21, 2017" "Sudo @PACKAGE_VERSION@" "File Formats Manual"
+.TH "SUDOERS_TIMESTAMP" "5" "October 6, 2018" "Sudo @PACKAGE_VERSION@" "File Formats Manual"
.nh
.if n .ad l
.SH "NAME"
Instead, a separate lock record is used to prevent multiple
\fBsudo\fR
processes using the same terminal (or parent process ID) from
-from prompting for a password as the same time.
+prompting for a password as the same time.
.SH "SEE ALSO"
sudoers(@mansectform@),
sudo(@mansectsu@)
.\"
-.\" Copyright (c) 2017 Todd C. Miller <Todd.Miller@sudo.ws>
+.\" Copyright (c) 2017-2018 Todd C. Miller <Todd.Miller@sudo.ws>
.\"
.\" Permission to use, copy, modify, and distribute this software for any
.\" purpose with or without fee is hereby granted, provided that the above
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd December 21, 2017
+.Dd October 6, 2018
.Dt SUDOERS_TIMESTAMP @mansectform@
.Os Sudo @PACKAGE_VERSION@
.Sh NAME
Instead, a separate lock record is used to prevent multiple
.Nm sudo
processes using the same terminal (or parent process ID) from
-from prompting for a password as the same time.
+prompting for a password as the same time.
.Sh SEE ALSO
.Xr sudoers @mansectform@ ,
.Xr sudo @mansectsu@
line options.
The _\bI_\bD should either be a six character sequence of digits and upper case
- letters, e.g. 0100A5, or a pattern matching the _\bi_\bo_\bl_\bo_\bg_\b__\bf_\bi_\bl_\be option in the
+ letters, e.g., 0100A5, or a pattern matching the _\bi_\bo_\bl_\bo_\bg_\b__\bf_\bi_\bl_\be option in the
_\bs_\bu_\bd_\bo_\be_\br_\bs file. When a command is run via s\bsu\bud\bdo\bo with _\bl_\bo_\bg_\b__\bo_\bu_\bt_\bp_\bu_\bt enabled in
the _\bs_\bu_\bd_\bo_\be_\br_\bs file, a TSID=ID string is logged via syslog or to the s\bsu\bud\bdo\bo
log file. The _\bI_\bD may also be determined using s\bsu\bud\bdo\bor\bre\bep\bpl\bla\bay\by's list mode.
tty _\bt_\bt_\by _\bn_\ba_\bm_\be
Evaluates to true if the command was run on the
specified terminal device. The _\bt_\bt_\by _\bn_\ba_\bm_\be should be
- specified without the _\b/_\bd_\be_\bv_\b/ prefix, e.g. _\bt_\bt_\by_\b0_\b1
+ specified without the _\b/_\bd_\be_\bv_\b/ prefix, e.g., _\bt_\bt_\by_\b0_\b1
instead of _\b/_\bd_\be_\bv_\b/_\bt_\bt_\by_\b0_\b1.
user _\bu_\bs_\be_\br _\bn_\ba_\bm_\be
session includes long pauses. When the -\b-m\bm option is
specified, s\bsu\bud\bdo\bor\bre\bep\bpl\bla\bay\by will limit these pauses to at most
_\bm_\ba_\bx_\b__\bw_\ba_\bi_\bt seconds. The value may be specified as a floating
- point number, e.g. _\b2_\b._\b5. A _\bm_\ba_\bx_\b__\bw_\ba_\bi_\bt of zero or less will
+ point number, e.g., _\b2_\b._\b5. A _\bm_\ba_\bx_\b__\bw_\ba_\bi_\bt of zero or less will
eliminate the pauses entirely.
-\b-n\bn, -\b--\b-n\bno\bon\bn-\b-i\bin\bnt\bte\ber\bra\bac\bct\bti\biv\bve\be
file distributed with s\bsu\bud\bdo\bo or https://www.sudo.ws/license.html for
complete details.
-Sudo 1.8.26 October 5, 2018 Sudo 1.8.26
+Sudo 1.8.26 October 6, 2018 Sudo 1.8.26
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.TH "SUDOREPLAY" "8" "October 5, 2018" "Sudo @PACKAGE_VERSION@" "System Manager's Manual"
+.TH "SUDOREPLAY" "8" "October 6, 2018" "Sudo @PACKAGE_VERSION@" "System Manager's Manual"
.nh
.if n .ad l
.SH "NAME"
The
\fIID\fR
should either be a six character sequence of digits and
-upper case letters, e.g.\&
+upper case letters, e.g.,
\fR0100A5\fR,
or a pattern matching the
\fIiolog_file\fR
\fItty name\fR
should be specified without the
\fI/dev/\fR
-prefix, e.g.\&
+prefix, e.g.,
\fItty01\fR
instead of
\fI/dev/tty01\fR.
will limit these pauses to at most
\fImax_wait\fR
seconds.
-The value may be specified as a floating point number, e.g.\&
+The value may be specified as a floating point number, e.g.,
\fI2.5\fR.
A
\fImax_wait\fR
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd October 5, 2018
+.Dd October 6, 2018
.Dt SUDOREPLAY @mansectsu@
.Os Sudo @PACKAGE_VERSION@
.Sh NAME
The
.Em ID
should either be a six character sequence of digits and
-upper case letters, e.g.\&
+upper case letters, e.g.,
.Li 0100A5 ,
or a pattern matching the
.Em iolog_file
.Ar tty name
should be specified without the
.Pa /dev/
-prefix, e.g.\&
+prefix, e.g.,
.Pa tty01
instead of
.Pa /dev/tty01 .
will limit these pauses to at most
.Em max_wait
seconds.
-The value may be specified as a floating point number, e.g.\&
+The value may be specified as a floating point number, e.g.,
.Em 2.5 .
A
.Em max_wait
Starting with s\bsu\bud\bdo\bo 1.8.12, v\bvi\bis\bsu\bud\bdo\bo will also parse the arguments to the
_\bs_\bu_\bd_\bo_\be_\br_\bs plugin to override the default _\bs_\bu_\bd_\bo_\be_\br_\bs path name, UID, GID and
file mode. These arguments, if present, should be listed after the path
- to the plugin (i.e. after _\bs_\bu_\bd_\bo_\be_\br_\bs_\b._\bs_\bo). Multiple arguments may be
+ to the plugin (i.e., after _\bs_\bu_\bd_\bo_\be_\br_\bs_\b._\bs_\bo). Multiple arguments may be
specified, separated by white space. For example:
Plugin sudoers_policy sudoers.so sudoers_mode=0400
file distributed with s\bsu\bud\bdo\bo or https://www.sudo.ws/license.html for
complete details.
-Sudo 1.8.25 January 26, 2018 Sudo 1.8.25
+Sudo 1.8.26 October 6, 2018 Sudo 1.8.26
.\" Agency (DARPA) and Air Force Research Laboratory, Air Force
.\" Materiel Command, USAF, under agreement number F39502-99-1-0512.
.\"
-.TH "VISUDO" "8" "January 26, 2018" "Sudo @PACKAGE_VERSION@" "System Manager's Manual"
+.TH "VISUDO" "8" "October 6, 2018" "Sudo @PACKAGE_VERSION@" "System Manager's Manual"
.nh
.if n .ad l
.SH "NAME"
\fIsudoers\fR
path name, UID, GID and file mode.
These arguments, if present, should be listed after the path to the plugin
-(i.e.\& after
+(i.e., after
\fIsudoers.so\fR).
Multiple arguments may be specified, separated by white space.
For example:
.\" Agency (DARPA) and Air Force Research Laboratory, Air Force
.\" Materiel Command, USAF, under agreement number F39502-99-1-0512.
.\"
-.Dd January 26, 2018
+.Dd October 6, 2018
.Dt VISUDO @mansectsu@
.Os Sudo @PACKAGE_VERSION@
.Sh NAME
.Em sudoers
path name, UID, GID and file mode.
These arguments, if present, should be listed after the path to the plugin
-(i.e.\& after
+(i.e., after
.Pa sudoers.so ) .
Multiple arguments may be specified, separated by white space.
For example: