diff --git a/man/cado.1 b/man/cado.1 index 7b3693f..3724f6c 100644 --- a/man/cado.1 +++ b/man/cado.1 @@ -15,7 +15,7 @@ cado \- Capability Ambient DO ] .SH DESCRIPTION -Cado permits to delegate capabilities to users. +Cado allows the system administrator to delegate capabilities to users. Cado is a capability based sudo. Sudo allows authorized users to run programs as root (or as another user), cado allows authorized users to run programs with specific (ambient) capabilities. diff --git a/man/cadrop.1 b/man/cadrop.1 index ec9d360..11aac7e 100644 --- a/man/cadrop.1 +++ b/man/cadrop.1 @@ -14,7 +14,7 @@ cadrop \- Capability Ambient Drop ] .SH DESCRIPTION -Cadrop permits to drop (ambient) capabilities. +Cadrop allows users to drop (ambient) capabilities. Cadrop launches the command indicated as a parameter ($SHELL if omitted) dropping all the capabilities listed in the capability_list. diff --git a/man/scado.1 b/man/scado.1 index 2b21d75..9b9a9de 100644 --- a/man/scado.1 +++ b/man/scado.1 @@ -20,8 +20,8 @@ scado \- Script Capability Ambient DO .SH DESCRIPTION -\fBcado(1)\fR permits to delegate capabilities to users. -Users can grant a subset of these ambient capabilities to trusted programs. +\fBcado(1)\fR allows the system administrator to delegate capabilities to users. +Users can grant a subset of these ambient capabilities to trusted programs. Each user can define their own list of trusted programs and which capabilities to grant, using a scado file. \fBcado -S\fR or \fBcado --scado\fR run those trusted programs without any further authentication. In this way it is also possible to run programs requiring specific capabilities within a bash script. diff --git a/src/cado.c b/src/cado.c index 8434334..06dcac2 100644 --- a/src/cado.c +++ b/src/cado.c @@ -71,7 +71,7 @@ void usage(char *progname) { fprintf(stderr," -f, --force do not display warnings, do what is allowed\n"); fprintf(stderr," -v, --verbose generate extra output\n"); fprintf(stderr," -S, --scado check scado pre-authorization for scripts\n"); - fprintf(stderr," -s, --setcap set the minimun caps for %s (root access)\n",progname); + fprintf(stderr," -s, --setcap set the minimum caps for %s (root access)\n",progname); exit(1); }