--- RICHARD FERNANDEZ <[EMAIL PROTECTED]> wrote: > > Did you edit the sudoers file using visudo -f > "file" > > Yes. > > > Show us the sudoers file using cat -etu "file". > > # cat -etu /usr/local/etc/sudoers > > /tmp/sudoers.richf > # less /tmp/sudoers.richf > # sudoers file. > # > # This file MUST be edited with the 'visudo' command > as root. > <snip> > > # User privilege specification > root ALL=ALL > webuser ALL = (ALL) NOPASSWD: ALL > > > > Has this user ever successfully logged in? > > Yes, the user is set up w/o a login shell, but in > the course of testing > I've given him login access. Doesn't make a > difference. > > > > > derek > > > > Thanks derek. >
the cat -etu will show us any funky unneeded control characters. if the user has never signed in and the admin never ran passwd user passwd -f user and then that user never went into make his/her password permenant then yes it would matter b/c the passwd is not set. Here is a working sample on me of my work production systems: ovuser OVSYS = (root) NOPASSWD: /opt/OV/bin/, /opt/OV/bin/OpC/, /opt/OV/bi n/OpC/install/, /opt/OV/bin/OpC/utils/, /opt/OV/contrib/OpC/, /data/data00/sbin/, / data/data00/sbin/pre-exec/, /data/data00/sbin/post-exec/, /sbin/init.d/smtp_message _interceptor, /db/u01/app/oracle/product/9.2.0/bin/, /opt/OV/support/, /var/opt/OV/ bin/instrumentation/, /usr/local/ovo8x, /usr/local/sbin/init.d/,/opt/CSCOpx/bin/, sudoedit /etc/opt/OV/share/conf/C/filters __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com -- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED] <http://learn.perl.org/> <http://learn.perl.org/first-response>