⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 su.1

📁 早期freebsd实现
💻 1
字号:
.\" Copyright (c) 1988, 1990, 1993, 1994.\"	The Regents of the University of California.  All rights reserved..\".\" Redistribution and use in source and binary forms, with or without.\" modification, are permitted provided that the following conditions.\" are met:.\" 1. Redistributions of source code must retain the above copyright.\"    notice, this list of conditions and the following disclaimer..\" 2. Redistributions in binary form must reproduce the above copyright.\"    notice, this list of conditions and the following disclaimer in the.\"    documentation and/or other materials provided with the distribution..\" 3. All advertising materials mentioning features or use of this software.\"    must display the following acknowledgement:.\"	This product includes software developed by the University of.\"	California, Berkeley and its contributors..\" 4. Neither the name of the University nor the names of its contributors.\"    may be used to endorse or promote products derived from this software.\"    without specific prior written permission..\".\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION).\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF.\" SUCH DAMAGE..\".\"	@(#)su.1	8.2 (Berkeley) 4/18/94.\".Dd April 18, 1994.Dt SU 1.Os.Sh NAME.Nm su.Nd substitute user identity.Sh SYNOPSIS.Nm su.Op Fl Kflm.Op Ar login.Sh DESCRIPTION.Nm Surequests the Kerberos password for.Ar login(or for.Dq Ar login Ns .root ,if no login is provided), and switches tothat user and group ID after obtaining a Kerberos ticket granting ticket.A shell is then executed..Nm Suwill resort to the local password file to find the password for.Ar loginif there is a Kerberos error.If.Nm suis executed by root, no password is requested and a shellwith the appropriate user ID is executed; no additional Kerberos ticketsare obtained..PpBy default, the environment is unmodified with the exception of.Ev USER ,.Ev HOME ,and.Ev SHELL ..Ev HOMEand.Ev SHELLare set to the target login's default values..Ev USERis set to the target login, unless the target login has a user ID of 0,in which case it is unmodified.The invoked shell is the target login's.This is the traditional behavior of.Nm su ..PpThe options are as follows:.Bl -tag -width Ds.It Fl KDo not attempt to use Kerberos to authenticate the user..It Fl fIf the invoked shell is.Xr csh 1 ,this option prevents it from reading the.Dq Pa .cshrcfile..It Fl lSimulate a full login.The environment is discarded except for.Ev HOME ,.Ev SHELL ,.Ev PATH ,.Ev TERM ,and.Ev USER ..Ev HOMEand.Ev SHELLare modified as above..Ev USERis set to the target login..Ev PATHis set to.Dq Pa /bin:/usr/bin ..Ev TERMis imported from your current environment.The invoked shell is the target login's, and.Nm suwill change directory to the target login's home directory..It Fl mLeave the environment unmodified.The invoked shell is your login shell, and no directory changes are made.As a security precaution, if the target user's shell is a non-standardshell (as defined by.Xr getusershell 3 )and the caller's real uid isnon-zero,.Nm suwill fail..El.PpThe.Fl land.Fl moptions are mutually exclusive; the last one specifiedoverrides any previous ones..PpOnly users in group 0 (normally.Dq wheel )can.Nm suto.Dq root ..PpBy default (unless the prompt is reset by a startup file) the super-userprompt is set to.Dq Sy \&#to remind one of its awesome power..Sh SEE ALSO.Xr csh 1 ,.Xr login 1 ,.Xr sh 1 ,.Xr kinit 1 ,.Xr kerberos 1 ,.Xr passwd 5 ,.Xr group 5 ,.Xr environ 7.Sh ENVIRONMENTEnvironment variables used by.Nm su :.Bl -tag -width HOME.It Ev HOMEDefault home directory of real user ID unless modified asspecified above..It Ev PATHDefault search path of real user ID unless modified as specified above..It Ev TERMProvides terminal type which may be retained for the substituteduser ID..It Ev USERThe user ID is always the effective ID (the target user ID) after an.Nm suunless the user ID is 0 (root)..El.Sh HISTORYA.Nmcommand appeared in.At v7 .

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -