--- RICHARD FERNANDEZ <[EMAIL PROTECTED]> wrote:

> > Did you edit the sudoers file using visudo -f
> "file"
> 
> Yes.
> 
> > Show us the sudoers file using cat -etu "file".
> 
> # cat -etu /usr/local/etc/sudoers >
> /tmp/sudoers.richf
> # less /tmp/sudoers.richf
> # sudoers file.
> #
> # This file MUST be edited with the 'visudo' command
> as root.
> <snip>
> 
> # User privilege specification
> root     ALL=ALL
> webuser  ALL = (ALL) NOPASSWD: ALL
> 
> 
> > Has this user ever successfully logged in?
> 
> Yes, the user is set up w/o a login shell, but in
> the course of testing
> I've given him login access. Doesn't make a
> difference.
> 
> > 
> > derek
> > 
> 
> Thanks derek.
> 

the cat -etu will show us any funky unneeded control
characters.
if the user has never signed in and the admin never
ran passwd user
passwd -f user and then that user never went into make
his/her password permenant then yes it would matter
b/c the passwd is not set.

Here is a working sample on me of my work production
systems:

ovuser          OVSYS = (root) NOPASSWD: /opt/OV/bin/,
/opt/OV/bin/OpC/, /opt/OV/bi
n/OpC/install/, /opt/OV/bin/OpC/utils/,
/opt/OV/contrib/OpC/, /data/data00/sbin/, /
data/data00/sbin/pre-exec/,
/data/data00/sbin/post-exec/,
/sbin/init.d/smtp_message
_interceptor, /db/u01/app/oracle/product/9.2.0/bin/,
/opt/OV/support/, /var/opt/OV/
bin/instrumentation/, /usr/local/ovo8x,
/usr/local/sbin/init.d/,/opt/CSCOpx/bin/, sudoedit
/etc/opt/OV/share/conf/C/filters



__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 

-- 
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
<http://learn.perl.org/> <http://learn.perl.org/first-response>


Reply via email to