You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: FAQ.md
+18-1Lines changed: 18 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -89,6 +89,23 @@ Sadly, this is not a frequently asked question. But it should be! We are not gra
89
89
90
90
We admire the "mad sandwich" that original sudo has, but it would be wrong to rip that off.
91
91
92
+
## Why doesn't sudo-rs insult me when I mistype my password?
93
+
94
+
One of the sudo-rs developers has suffered at the hands of a [BOFH](https://en.wikipedia.org/wiki/Bastard_Operator_From_Hell) who thought it was funny to force the `sl` command (see https://github.com/mtoyoda/sl) on users. He has sadly lost his sense of humour as a result.
95
+
96
+
You *can* however get insulted by sudo-rs (and every other program that uses PAM!) by using https://github.com/cgoesche/pam-insults. The results will look like this:
97
+
98
+
```sh
99
+
$ sudo -s
100
+
[sudo: authenticate] Password: **************
101
+
[sudo] Did you forget your password or just your brain?
102
+
[sudo: authenticate] Password: **************
103
+
[sudo] Congratulations! You've just won the 'Most Consistent Incorrect Password Entry' award.
104
+
```
105
+
and so on.
106
+
107
+
https://github.com/cgoesche/pam-insults is under development and appears to aim at multi-lingual support, so why not help the author out?
108
+
92
109
## Comparisons with other tools
93
110
94
111
General remark: we try to honestly represent the advantages and disadvantages in this section, but of course we are hardly unbiased. At the same time, we are not trying to sell you anything, and respect any resources individual developers or companies invest in bringing more open source options to users.
@@ -230,4 +247,4 @@ If you discover a vulnerability in sudo-rs, follow the instructions in our [secu
230
247
231
248
Yes! In fact, we also believe that the newer code base, written in a safer language, actually lends itself well forbeing more accepting of outside contributions. Multiple features/bugsin sudo-rs have already been implemented/fixes by external contributors.
232
249
233
-
We have a [contributors' guide](https://github.com/trifectatechfoundation/sudo-rs/blob/main/CONTRIBUTING.md) which lists some of the things to be mindful of. Happy hacking!
250
+
We have a [contributors' guide](https://github.com/trifectatechfoundation/sudo-rs/blob/main/CONTRIBUTING.md) which lists some of the things to be mindful of. Happy hacking!
0 commit comments