From 85ca18776aa487b06b9d5ab7459b8f837ba637f3 Mon Sep 17 00:00:00 2001 From: Timothy Pearson Date: Fri, 2 Dec 2011 22:36:59 -0600 Subject: Initial kde-tde rename --- tde-i18n-en_GB/docs/kdebase/kdesu/index.docbook | 80 ++++++++++++------------- 1 file changed, 40 insertions(+), 40 deletions(-) (limited to 'tde-i18n-en_GB/docs/kdebase/kdesu/index.docbook') diff --git a/tde-i18n-en_GB/docs/kdebase/kdesu/index.docbook b/tde-i18n-en_GB/docs/kdebase/kdesu/index.docbook index 81c03aeb271..5f1d74613f8 100644 --- a/tde-i18n-en_GB/docs/kdebase/kdesu/index.docbook +++ b/tde-i18n-en_GB/docs/kdebase/kdesu/index.docbook @@ -1,8 +1,8 @@ - + + @@ -12,7 +12,7 @@ The &kdesu; handbook +>The &tdesu; handbook &kdesu; is a graphical front end for the &UNIX; &tdesu; is a graphical front end for the &UNIX; su command. @@ -75,14 +75,14 @@ >Introduction Welcome to &kdesu;! &kdesu; is a graphical front end for the &UNIX; Welcome to &tdesu;! &tdesu; is a graphical front end for the &UNIX; su command for the K Desktop Environment. It allows you to run a program as different user by supplying the password for that user. &kdesu; is an unprivileged program; it uses the system's command for the K Desktop Environment. It allows you to run a program as different user by supplying the password for that user. &tdesu; is an unprivileged program; it uses the system's su. &kdesu; has one additional feature: it can remember passwords for you. If you are using this feature, you only need to enter the password once for each command. See for more information on this and a security analysis. +>&tdesu; has one additional feature: it can remember passwords for you. If you are using this feature, you only need to enter the password once for each command. See for more information on this and a security analysis. This program is meant to be started from the command line or from - + Using &kdesu; +>Using &tdesu; Usage of &kdesu; is easy. The syntax is like this: +>Usage of &tdesu; is easy. The syntax is like this: kdesutdesu USER kdesutdesu -vThis specifies the program to run as root. It has to be passed in one argument. So if, for example, you want to start a new file manager, you would enter at the prompt: kdesu This option allow efficient use of &kdesu; in This option allow efficient use of &tdesu; in .desktop files. It tells &kdesu; to examine the file specified by files. It tells &tdesu; to examine the file specified by FILE. If this file is writable by the current user, &kdesu; will execute the command as the current user. If it is not writable, the command is executed as user . If this file is writable by the current user, &tdesu; will execute the command as the current user. If it is not writable, the command is executed as user USER (defaults to root). , it is taken as an absolute filename. Otherwise, it is taken as the name of a global &kde; configuration file. For example: to configure the K display manager, kdm, you could issue kdesu Stop the kdesu daemon. See .Stop the tdesu daemon. See . @@ -295,8 +295,8 @@ >Configuration &kdesu; comes with a control module named kcmkdesu&tdesu; comes with a control module named kcmtdesu. You can find it in the K menu under You can instruct &kdesu; remember passwords you enter by checking the You can instruct &tdesu; remember passwords you enter by checking the keep password check box. If this checked, you can enter a timeout value in the text field below it. This is the amount of time, in minutes, that the password will be remembered. The default is not to remember passwords. @@ -345,12 +345,12 @@ >X authentication The program you execute will run under the root user id and will generally have no authority to access your X display. &kdesu; gets around this by adding an authentication cookie for your display to a temporary The program you execute will run under the root user id and will generally have no authority to access your X display. &tdesu; gets around this by adding an authentication cookie for your display to a temporary .Xauthority file. After the command exits, this file is removed. If you don't use X cookies, you are on your own. &kdesu; will detect this and will not add a cookie but you will have to make sure that root is allowed to access to your display. +>If you don't use X cookies, you are on your own. &tdesu; will detect this and will not add a cookie but you will have to make sure that root is allowed to access to your display. @@ -361,21 +361,21 @@ > &kdesu; uses the sytem's &tdesu; uses the sytem's su for acquiring priviliges. In this section, I explain the details of how &kdesu; does this. +> for acquiring priviliges. In this section, I explain the details of how &tdesu; does this. Because some su implementations (&ie; the one from &RedHat;) don't want to read the password from stdin, &kdesu; creates a pty/tty pair and executes , &tdesu; creates a pty/tty pair and executes su with it's standard filedescriptors connected to the tty. To execute the command the user selected, rather than an interactive shell, &kdesu; uses the argument with suInstead of executing the user command directly with su, &kdesu; executes a little stub program called kdesu_stub. This stub (running as the target user), requests some information from &kdesu; over the pty/tty channel (the stub's stdin and stdout) and then executes the user's program. The information passed over is: the X display, an X authentication cookie (if available), the , &tdesu; executes a little stub program called tdesu_stub. This stub (running as the target user), requests some information from &tdesu; over the pty/tty channel (the stub's stdin and stdout) and then executes the user's program. The information passed over is: the X display, an X authentication cookie (if available), the PATH and the command to run. The reason why a stub program is used is that the X cookie is private information and therefore cannot be passed on the command line. @@ -407,7 +407,7 @@ >Password Checking &kdesu; will check the password you entered and gives an error message if it is not correct. The checking is done by executing a test program: &tdesu; will check the password you entered and gives an error message if it is not correct. The checking is done by executing a test program: /bin/true. If this succeeds, the password is assumed to be correct. @@ -418,28 +418,28 @@ >Password Keeping For your comfort, &kdesu; implements a For your comfort, &tdesu; implements a keep password feature. If you are interested in security, you should read this paragraph. Allowing &kdesu; to remember passwords opens up a (small) security hole in your system. Obviously, &kdesu; does not allow anybody but your user id to use the passwords, but, if done without caution, this would lower Allowing &tdesu; to remember passwords opens up a (small) security hole in your system. Obviously, &tdesu; does not allow anybody but your user id to use the passwords, but, if done without caution, this would lower root's security level to that of a normal user (you). A hacker who breaks into your account, would get root access. &kdesu; tries to prevent this. The security scheme it uses is, in my opinion at least, reasonably safe and is explained here. +> access. &tdesu; tries to prevent this. The security scheme it uses is, in my opinion at least, reasonably safe and is explained here. &kdesu; uses a daemon, called kdesud&tdesu; uses a daemon, called tdesud. The daemon listens to a &UNIX; socket in /tmp for commands. The mode of the socket is 0600 so that only your user id can connect to it. If password keeping is enabled, &kdesu; executes commands through this daemon. It writes the command and for commands. The mode of the socket is 0600 so that only your user id can connect to it. If password keeping is enabled, &tdesu; executes commands through this daemon. It writes the command and root's password to the socket and the daemon executes the command using su, as describe before. After this, the command and the password are not thrown away. Instead, they are kept for a specified amount of time. This is the timeout value from in the control module. If another request for the same command is coming within this time period, the client does not have to supply the password. To keep hackers who broke into your account from stealing passwords from the daemon (for example, by attaching a debugger), the daemon is installed set-group-id nogroup. This should prevent all normal users (including you) from getting passwords from the kdesudtdesud process. Also, the daemon sets the DISPLAY environment variable to the value it had when it was started. The only thing a hacker can do is execute an application on your display. @@ -460,13 +460,13 @@ >Author &kdesu; +>&tdesu; Copyright 2000 &Geert.Jansen; &kdesu; is written by &Geert.Jansen;. It is somewhat based on Pietro Iglio's &kdesu;, version 0.3. Pietro and I agreed that I will maintain this program in the future. +>&tdesu; is written by &Geert.Jansen;. It is somewhat based on Pietro Iglio's &tdesu;, version 0.3. Pietro and I agreed that I will maintain this program in the future. The author can be reached through email at &Geert.Jansen.mail;. Please report any bugs you find to me so that I can fix them. If you have a suggestion, feel free to contact me. -- cgit v1.2.1