components/sudo/TESTING
branchs11u3-sru
changeset 7762 1bc3a3aa3178
parent 7409 f574f35f5142
--- a/components/sudo/TESTING	Tue Mar 14 09:01:51 2017 -0700
+++ b/components/sudo/TESTING	Wed Mar 15 15:37:18 2017 -0700
@@ -17,9 +17,9 @@
 
 openssl dgst -sha224 /usr/bin/ls # make note of the hash
 
-# Add this line to sudoers (replace UID by your user ID and HASH by the ls
-# hash):
-<UID> ALL = sha224:<HASH> /usr/bin/ls
+# Add this line to sudoers (replace LOGIN by your user login name and
+# HASH by the ls hash):
+<LOGIN> ALL = sha224:<HASH> /usr/bin/ls
 
 # This should work (asking you a password first)
 sudo /usr/bin/ls /
@@ -54,19 +54,19 @@
 sudo rm *
 sudo /usr/sbin/audit -s
 sudo auditreduce * | praudit -s
-> file,1970-01-01 00:00:00.000 +00:00,
-> file,2014-03-27 10:34:23.000 +00:00,
+  file,1970-01-01 00:00:00.000 +00:00,
+  file,2014-03-27 10:34:23.000 +00:00,
 
 # Make sure that since the first run we can see new auditing record
 sudo auditreduce * | praudit -s
-> file,2014-03-27 10:34:23.000 +00:00,
-> header,158,2,AUE_sudo,,10.0.2.15,2014-03-27 10:34:23.735 +00:00
-> subject,vmarek,root,staff,vmarek,staff,2295,3108723863,5096 202240 10.0.2.2
-> path,/var/share/audit
-> path,/usr/sbin/auditreduce
-> cmd,argcnt,1,20140327103420.not_terminated.S12-43,envcnt,0,
-> return,success,0
-> file,2014-03-27 10:34:23.000 +00:00,
+  file,2014-03-27 10:34:23.000 +00:00,
+  header,158,2,AUE_sudo,,10.0.2.15,2014-03-27 10:34:23.735 +00:00
+  subject,vmarek,root,staff,vmarek,staff,2295,3108723863,5096 202240 10.0.2.2
+  path,/var/share/audit
+  path,/usr/sbin/auditreduce
+  cmd,argcnt,1,20140327103420.not_terminated.S12-43,envcnt,0,
+  return,success,0
+  file,2014-03-27 10:34:23.000 +00:00,
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 
@@ -95,32 +95,32 @@
 # Solaris privileges
 
 # Add this to the end sudoers keeping the 'ALL ALL=(ALL:ALL) NOPASSWD: ALL' above
-<UID> ALL = () PRIVS="basic,dtrace_kernel,dtrace_proc,dtrace_user" NOPASSWD: /usr/sbin/dtrace, /usr/bin/bash
+<LOGIN> ALL = () PRIVS="basic,dtrace_kernel,dtrace_proc,dtrace_user" NOPASSWD: /usr/sbin/dtrace, /usr/bin/bash
 
 # Just your regular id
 id
-> uid=157888(vmarek) gid=10(staff)
+  uid=157888(vmarek) gid=10(staff)
 
 # Sudo normally turning you into root via the 'ALL ALL=(ALL:ALL) NOPASSWD: ALL' line
 sudo id
-> uid=0(root) gid=0(root)
+  uid=0(root) gid=0(root)
 
 # For bash it should leave your ID and just grant dtrace privileges
 sudo bash -c 'id; ppriv $$'
 uid=157888(vmarek) gid=10(staff)
-> 2296:   bash -c id; ppriv $$
-> flags = <none>
->         E: basic,dtrace_kernel,dtrace_proc,dtrace_user
->         I: basic,dtrace_kernel,dtrace_proc,dtrace_user
->         P: basic,dtrace_kernel,dtrace_proc,dtrace_user
->         L: basic,dtrace_kernel,dtrace_proc,dtrace_user
+  2296:   bash -c id; ppriv $$
+  flags = <none>
+          E: basic,dtrace_kernel,dtrace_proc,dtrace_user
+          I: basic,dtrace_kernel,dtrace_proc,dtrace_user
+          P: basic,dtrace_kernel,dtrace_proc,dtrace_user
+          L: basic,dtrace_kernel,dtrace_proc,dtrace_user
 
 # dtrace functionality
 sudo dtrace -l -n 'syscall::b*:entry'
->    ID   PROVIDER            MODULE                          FUNCTION NAME
-> 11282    syscall                                                 brk entry
-> 11550    syscall                                            brandsys entry
-> 11642    syscall                                                bind entry
+     ID   PROVIDER            MODULE                          FUNCTION NAME
+  11282    syscall                                                 brk entry
+  11550    syscall                                            brandsys entry
+  11642    syscall                                                bind entry
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%