Bug 543970 (rootlogin)
Summary: | SELinux is preventing /usr/libexec/gdm-session-worker "write" access on /root. | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | vmsysprog |
Component: | selinux-policy | Assignee: | Daniel Walsh <dwalsh> |
Status: | CLOSED WONTFIX | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | medium | Docs Contact: | |
Priority: | low | ||
Version: | 12 | CC: | adamus1117, adrian1h, alfonsomoras, bhernco, bill, bkahn, chavesdocarmo, cjm, darkkitten, dazeminu, dilamar.martinez, don-redhat-z6y, dwalsh, etusha, istanbulcu, jerianjer, john_antony40, kassabon14, kingbiotech, lee, matthewdahouse, mgrepl, M.M.Nour.aoi, neoh.ys, papseddy, rosegun38, sherifkhan, simon.lewis, tan_shiruban, vulpe |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | i386 | ||
OS: | Linux | ||
Whiteboard: | setroubleshoot_trace_hash:9b2e46a20f09ea3c3282023fceab3a5b200bfc886ffb099b599bf0130c7176d5 | ||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2009-12-03 16:01:19 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 677991, 712686 |
Description
vmsysprog
2009-12-03 15:53:19 UTC
Logging in directly as root from X Windows is not supported with SELinux, It is considered too dangerous and the amount/type of policy that would needed to be written, would allow too much access. Either put the machin in permissive mode when you login as root, or login as a normal user and use su or sudo to reach root. *** Bug 543972 has been marked as a duplicate of this bug. *** *** Bug 541639 has been marked as a duplicate of this bug. *** *** Bug 544475 has been marked as a duplicate of this bug. *** *** Bug 545412 has been marked as a duplicate of this bug. *** *** Bug 547931 has been marked as a duplicate of this bug. *** *** Bug 547933 has been marked as a duplicate of this bug. *** *** Bug 548997 has been marked as a duplicate of this bug. *** *** Bug 533636 has been marked as a duplicate of this bug. *** *** Bug 541153 has been marked as a duplicate of this bug. *** *** Bug 550210 has been marked as a duplicate of this bug. *** *** Bug 550364 has been marked as a duplicate of this bug. *** *** Bug 550659 has been marked as a duplicate of this bug. *** *** Bug 550661 has been marked as a duplicate of this bug. *** *** Bug 551460 has been marked as a duplicate of this bug. *** *** Bug 551485 has been marked as a duplicate of this bug. *** *** Bug 551504 has been marked as a duplicate of this bug. *** *** Bug 551905 has been marked as a duplicate of this bug. *** *** Bug 551654 has been marked as a duplicate of this bug. *** *** Bug 551653 has been marked as a duplicate of this bug. *** *** Bug 551652 has been marked as a duplicate of this bug. *** *** Bug 551903 has been marked as a duplicate of this bug. *** *** Bug 543062 has been marked as a duplicate of this bug. *** *** Bug 557549 has been marked as a duplicate of this bug. *** *** Bug 557550 has been marked as a duplicate of this bug. *** *** Bug 557945 has been marked as a duplicate of this bug. *** *** Bug 559328 has been marked as a duplicate of this bug. *** *** Bug 559619 has been marked as a duplicate of this bug. *** *** Bug 559617 has been marked as a duplicate of this bug. *** *** Bug 560280 has been marked as a duplicate of this bug. *** *** Bug 560363 has been marked as a duplicate of this bug. *** *** Bug 560836 has been marked as a duplicate of this bug. *** *** Bug 560837 has been marked as a duplicate of this bug. *** *** Bug 561533 has been marked as a duplicate of this bug. *** *** Bug 562161 has been marked as a duplicate of this bug. *** *** Bug 563088 has been marked as a duplicate of this bug. *** *** Bug 565282 has been marked as a duplicate of this bug. *** *** Bug 565644 has been marked as a duplicate of this bug. *** *** Bug 567990 has been marked as a duplicate of this bug. *** *** Bug 570873 has been marked as a duplicate of this bug. *** *** Bug 568323 has been marked as a duplicate of this bug. *** *** Bug 574653 has been marked as a duplicate of this bug. *** *** Bug 577661 has been marked as a duplicate of this bug. *** *** Bug 585524 has been marked as a duplicate of this bug. *** *** Bug 587358 has been marked as a duplicate of this bug. *** *** Bug 592629 has been marked as a duplicate of this bug. *** *** Bug 595530 has been marked as a duplicate of this bug. *** *** Bug 599121 has been marked as a duplicate of this bug. *** *** Bug 599125 has been marked as a duplicate of this bug. *** *** Bug 630492 has been marked as a duplicate of this bug. *** (In reply to comment #1) > Logging in directly as root from X Windows is not supported with SELinux, It > is considered too dangerous and the amount/type of policy that would needed to > be written, would allow too much access. > > > Either put the machin in permissive mode when you login as root, or login as a > normal user and use su or sudo to reach root. So tell me again why should not be allowed to trash my own machine.... You can go right a head. I would tell you to disable SELinux or put it in permissive mode and go to town. But a security mechanism is not going to allow what looks like apps attacking the /root directory and other capabilities that come along with logging in as root. |