# # Default /etc/sudo.conf file # # Sudo plugins: # Plugin plugin_name plugin_path plugin_options ... # # The plugin_path is relative to /usr/libexec/sudo unless # fully qualified. # The plugin_name corresponds to a global symbol in the plugin # that contains the plugin interface structure. # The plugin_options are optional. # # The sudoers plugin is used by default if no Plugin lines are present. #Plugin sudoers_policy sudoers.so #Plugin sudoers_io sudoers.so #Plugin sudoers_audit sudoers.so # # Sudo askpass: # Path askpass /path/to/askpass # # An askpass helper program may be specified to provide a graphical # password prompt for "sudo -A" support. Sudo does not ship with its # own askpass program but can use the OpenSSH askpass. # # Use the OpenSSH askpass #Path askpass /usr/X11R6/bin/ssh-askpass # # Use the Gnome OpenSSH askpass #Path askpass /usr/libexec/openssh/gnome-ssh-askpass # # Sudo device search path: # Path devsearch /dev/path1:/dev/path2:/dev # # A colon-separated list of paths to check when searching for a user's # terminal device. # #Path devsearch /dev/pts:/dev/vt:/dev/term:/dev/zcons:/dev/pty:/dev # # Sudo command interception: # Path intercept /path/to/sudo_intercept.so # # Path to a shared library containing replacements for the execv(), # execve() and fexecve() library functions that perform a policy check # to verify the command is allowed and simply return an error if not. # This is used to implement the "intercept" functionality on systems that # support LD_PRELOAD or its equivalent. # # The compiled-in value is usually sufficient and should only be changed # if you rename or move the sudo_intercept.so file. # #Path intercept /usr/libexec/sudo/sudo_intercept.so # # Sudo noexec: # Path noexec /path/to/sudo_noexec.so # # Path to a shared library containing replacements for the execv(), # execve() and fexecve() library functions that just return an error. # This is used to implement the "noexec" functionality on systems that # support LD_PRELOAD or its equivalent. # # The compiled-in value is usually sufficient and should only be changed # if you rename or move the sudo_noexec.so file. # #Path noexec /usr/libexec/sudo/sudo_noexec.so # # Sudo plugin directory: # Path plugin_dir /path/to/plugins # # The default directory to use when searching for plugins that are # specified without a fully qualified path name. # #Path plugin_dir /usr/libexec/sudo # # Sudo developer mode: # Set developer_mode true|false # # Allow loading of plugins that are owned by non-root or are writable # by "group" or "other". Should only be used during plugin development. #Set developer_mode true # # Core dumps: # Set disable_coredump true|false # # By default, sudo disables core dumps while it is executing (they # are re-enabled for the command that is run). # To aid in debugging sudo problems, you may wish to enable core # dumps by setting "disable_coredump" to false. # #Set disable_coredump false # # User groups: # Set group_source static|dynamic|adaptive # # Sudo passes the user's group list to the policy plugin. # If the user is a member of the maximum number of groups (usually 16), # sudo will query the group database directly to be sure to include # the full list of groups. # # On some systems, this can be expensive so the behavior is configurable. # The "group_source" setting has three possible values: # static - use the user's list of groups returned by the kernel. # dynamic - query the group database to find the list of groups. # adaptive - if user is in less than the maximum number of groups. # use the kernel list, else query the group database. # #Set group_source static # # Sudo interface probing: # Set probe_interfaces true|false # # By default, sudo will probe the system's network interfaces and # pass the IP address of each enabled interface to the policy plugin. # On systems with a large number of virtual interfaces this may take # a noticeable amount of time. # #Set probe_interfaces false # # Sudo debug files: # Debug program /path/to/debug_log subsystem@priority[,subsyste@priority] # # Sudo and related programs support logging debug information to a file. # The program is typically sudo, sudoers.so, sudoreplay, or visudo. # # Subsystems vary based on the program; "all" matches all subsystems. # Priority may be crit, err, warn, notice, diag, info, trace, or debug. # Multiple subsystem@priority may be specified, separated by a comma. # #Debug sudo /var/log/sudo_debug all@debug #Debug sudoers.so /var/log/sudoers_debug all@debug
Name | Type | Size | Permission | Actions |
---|---|---|---|---|
X11 | Folder | 0755 |
|
|
apparmor | Folder | 0755 |
|
|
apparmor.d | Folder | 0755 |
|
|
ca-certificates | Folder | 0755 |
|
|
cloud | Folder | 0755 |
|
|
cron.d | Folder | 0755 |
|
|
dbus-1 | Folder | 0755 |
|
|
default | Folder | 0755 |
|
|
depmod.d | Folder | 0755 |
|
|
dhcp | Folder | 0755 |
|
|
gss | Folder | 0755 |
|
|
ifplugd | Folder | 0755 |
|
|
init.d | Folder | 0755 |
|
|
iproute2 | Folder | 0755 |
|
|
ld.so.conf.d | Folder | 0755 |
|
|
libnl-3 | Folder | 0755 |
|
|
logrotate.d | Folder | 0755 |
|
|
modprobe.d | Folder | 0755 |
|
|
modules-load.d | Folder | 0755 |
|
|
netplan | Folder | 0755 |
|
|
network | Folder | 0755 |
|
|
pam.d | Folder | 0755 |
|
|
plymouth | Folder | 0755 |
|
|
polkit-1 | Folder | 0755 |
|
|
profile.d | Folder | 0755 |
|
|
python3.10 | Folder | 0755 |
|
|
rsyslog.d | Folder | 0755 |
|
|
security | Folder | 0755 |
|
|
skel | Folder | 0755 |
|
|
ssh | Folder | 0755 |
|
|
ssl | Folder | 0755 |
|
|
sudoers.d | Folder | 0755 |
|
|
sysctl.d | Folder | 0755 |
|
|
system-image | Folder | 0755 |
|
|
systemd | Folder | 0755 |
|
|
udev | Folder | 0755 |
|
|
ufw | Folder | 0755 |
|
|
update-motd.d | Folder | 0755 |
|
|
vim | Folder | 0755 |
|
|
wpa_supplicant | Folder | 0755 |
|
|
writable | Folder | 0755 |
|
|
xdg | Folder | 0755 |
|
|
.pwd.lock | File | 0 B | 0600 |
|
adduser.conf | File | 2.96 KB | 0644 |
|
bash.bashrc | File | 2.26 KB | 0644 |
|
bash_completion | File | 45 B | 0644 |
|
bindresvport.blacklist | File | 367 B | 0644 |
|
ca-certificates.conf | File | 6.14 KB | 0644 |
|
crypttab | File | 54 B | 0644 |
|
deluser.conf | File | 604 B | 0644 |
|
e2scrub.conf | File | 685 B | 0644 |
|
environment | File | 106 B | 0644 |
|
ethertypes | File | 1.77 KB | 0644 |
|
fstab | File | 37 B | 0644 |
|
group | File | 741 B | 0644 |
|
gshadow | File | 613 B | 0640 |
|
host.conf | File | 92 B | 0644 |
|
hostname | File | 1 B | 0644 |
|
hosts | File | 159 B | 0644 |
|
hosts.allow | File | 411 B | 0644 |
|
hosts.deny | File | 711 B | 0644 |
|
inputrc | File | 1.71 KB | 0644 |
|
issue | File | 27 B | 0644 |
|
issue.net | File | 16 B | 0644 |
|
ld.so.cache | File | 10.59 KB | 0644 |
|
ld.so.conf | File | 34 B | 0644 |
|
legal | File | 267 B | 0644 |
|
libaudit.conf | File | 191 B | 0644 |
|
localtime | File | 118 B | 0644 |
|
login.defs | File | 10.5 KB | 0644 |
|
lsb-release | File | 104 B | 0644 |
|
machine-id | File | 0 B | 0644 |
|
mime.types | File | 70.34 KB | 0644 |
|
modules | File | 195 B | 0644 |
|
motd | File | 591 B | 0644 |
|
File | 0 B | 0 |
|
|
netconfig | File | 767 B | 0644 |
|
nsswitch.conf | File | 559 B | 0644 |
|
os-release | File | 177 B | 0644 |
|
passwd | File | 1.48 KB | 0644 |
|
profile | File | 582 B | 0644 |
|
protocols | File | 2.86 KB | 0644 |
|
resolv.conf | File | 1 B | 0644 |
|
rpc | File | 887 B | 0644 |
|
services | File | 12.51 KB | 0644 |
|
shadow | File | 823 B | 0640 |
|
shells | File | 128 B | 0644 |
|
subgid | File | 0 B | 0644 |
|
subuid | File | 0 B | 0644 |
|
sudo.conf | File | 4.47 KB | 0644 |
|
sudo_logsrvd.conf | File | 9.17 KB | 0644 |
|
sudoers | File | 1.63 KB | 0440 |
|
timezone | File | 8 B | 0644 |
|
ucf.conf | File | 1.23 KB | 0644 |
|
xattr.conf | File | 681 B | 0644 |
|