From 24acf3686de17cc10018c3892822314f9eecc240 Mon Sep 17 00:00:00 2001 From: Eugeni Dodonov Date: Tue, 13 Jan 2009 22:43:40 +0000 Subject: Updated man page and version. --- man/C/msec.8 | 38 +++++++++++++++++++++++++++++++++++++- 1 file changed, 37 insertions(+), 1 deletion(-) (limited to 'man/C') diff --git a/man/C/msec.8 b/man/C/msec.8 index 0663c14..8740db4 100644 --- a/man/C/msec.8 +++ b/man/C/msec.8 @@ -1,5 +1,5 @@ .ds q \N'34' -.TH msec 0.60.3 msec "Mandriva Linux" +.TH msec 0.60.4 msec "Mandriva Linux" .SH NAME msec \- Mandriva Linux security tools .SH SYNOPSIS @@ -201,6 +201,15 @@ MSEC parameter: \fIACCEPT_BROADCASTED_ICMP_ECHO\fP Accepted values: \fIyes, no\fP +.TP 4 +.B \fIenable_sudo\fP +Enables support for sudo application, which allows users to run applications using system account. If yes, users must autenticate themselves using password. If this parameter is set to 'wheel', users must belong to the 'wheel' group to be able to use sudo + +MSEC parameter: \fIENABLE_SUDO\fP + +Accepted values: \fIyes, no, wheel\fP + + .TP 4 .B \fIallow_xserver_to_listen\fP The argument specifies if clients are authorized to connect to the X server on the tcp port 6000 or not. @@ -417,6 +426,15 @@ MSEC parameter: \fICHECK_PROMISC\fP Accepted values: \fIyes, no\fP +.TP 4 +.B \fIenable_apparmor\fP +Enables support for AppArmor security framework + +MSEC parameter: \fIENABLE_APPARMOR\fP + +Accepted values: \fIyes, no\fP + + .TP 4 .B \fIallow_x_connections\fP Allow/Forbid X connections. Accepted arguments: yes (all connections are allowed), local (only local connection), no (no connection). @@ -561,6 +579,15 @@ MSEC parameter: \fIALLOW_USER_LIST\fP Accepted values: \fIyes, no\fP +.TP 4 +.B \fInotify_warn\fP +Enables support for security notifications using libnotify. This allows the security notifications to be delivered directly to the users' desktop + +MSEC parameter: \fINOTIFY_WARN\fP + +Accepted values: \fIyes, no\fP + + .TP 4 .B \fIallow_remote_root_login\fP Allow/Forbid remote root login via sshd. You can specify yes, no and without-password. See sshd_config(5) man page for more information. @@ -632,6 +659,15 @@ MSEC parameter: \fITTY_WARN\fP Accepted values: \fIyes, no\fP + +.TP 4 +.B \fIenable_policykit\fP +Enables support for PolicyKit framework, which allows ordinary users to run system application + +MSEC parameter: \fIENABLE_POLICYKIT\fP + +Accepted values: \fIyes, no\fP + .RE .SH NOTES Msec applications must be run by root. -- cgit v1.2.1