|Source Repository:||Repository:Gentoo Portage Tree|
Summary: Allows users or groups to run commands as other users
- Use SHA2 from dev-libs/libgcrypt instead of sudo's internal SHA2.
- Let sudo print insults when the user types the wrong password.
- Use SHA2 from dev-libs/openssl instead of sudo's internal SHA2.
- Allow sudo to send emails with sendmail.
Funtoo-Stable Going AwayAs we move towards the next generation of Funtoo Linux, funtoo-stable is being retired.
New Ports-2017 tree and KitsFuntoo has a new ports-2017 tree, and introducing kits! (BETA)
# emerge sudo
Instead of editing
/etc/sudoers, you may drop individual configuration files into the
The sudo configuration file is located @
/etc/sudoers. When editing this file be very careful to not introduce syntax errors. Several other linux distributions use
visudo to edit
$ su -c 'nano /etc/sudoers'
%wheel ALL=(ALL) NOPASSWD: ALL
Add your user to the wheel group to enable sudo:
$ su -c 'gpasswd -a $USER wheel'Either log out, and in again or restart:
$ su -c 'shutdown -r now'
Disabling Root Access By Password
To better secure a system, one may desire to disable root logins by password.
$ sudo passwd -ld rootto access root:
$ sudo suRoot can also be accessed by logging in via ssh keys, or as a restricted user then sudo su as above.
Users that want bash completion with sudo need to run this once.
$ echo "complete -cf sudo" >> $HOME/.bashrc
Passing Environment Variables
To pass environment variables to the temporary root use the -E flag.
$ sudo -E echo 'hello world'
If your user has aliases you wish to use under sudo you must alias sudo with a space first:
$ echo "alias sudo='sudo '" >> $HOME/.bashrc