Add more information in the manpage. - sup - small tool for privilege escalation
HTML git clone git://bitreich.org/sup git://enlrupgkhuxnvlhsf6lc3fziv5h2hhfrinws65d7roiv6bfj7d652fid.onion/sup
DIR Log
DIR Files
DIR Refs
DIR Tags
DIR README
DIR LICENSE
---
DIR commit e50cc7dcf0d0b8f8550a70d2155739c64b024c15
DIR parent a1433c21cfd8539d3c34a0d40cc18022dcbfd0c6
HTML Author: parazyd <parazyd@dyne.org>
Date: Mon, 8 Jul 2019 18:05:06 +0200
Add more information in the manpage.
Diffstat:
M sup.1 | 6 ++++--
1 file changed, 4 insertions(+), 2 deletions(-)
---
DIR diff --git a/sup.1 b/sup.1
@@ -1,4 +1,4 @@
-.TH SUP 1 2019-07-02
+.TH SUP 1 2019-07-08
.SH NAME
sup \- scale user privileges
.SH SYNOPSIS
@@ -14,7 +14,9 @@ sup \- scale user privileges
sup is a minimal privilege escalation utility that allows normal users
to run other programs as different user and group. It is "secured" by
hardcoding SHA256 sums of the executables into itself to decide if a
-user is actually authorized to run the requested command.
+user is actually authorized to run the requested command. The way sup
+works is that it is installed as a setuid binary and is statically
+linked to avoid any possible LD_PRELOAD trickery.
.TP
The configuration is done in config.h at compile time.
.SH OPTIONS