Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I am using debian sarge with gnome and kdm. I am new to most of the linux topics. I would like to know if I can give full root permission to a ordinary user account? I want a user to have essentially access to all system resources. Gnome/kdm will not allow me to login as root, so this is why I ask the previous question. If there is a way to login to gnome as root this may also work for me?
Thank you.
One of the main security advantages of linux is that you don't run everything with access to all system resources. If you need to do something as root just use either su or sudo.
Gnome/kdm will not allow me to login as root, so this is why I ask the previous question. If there is a way to login to gnome as root this may also work for me?
Check your gdm.conf file and make sure that AllowRoot is set to 1 (by default it's set to 0). To be honest though, it's set that way for a reason. Allowing root X sessions can be a bit dangerous and you really should be logging in as a regular user and then using "su -" to become root temporarily. Granting normal users administrative privileges using sudo and /etc/sudoers is probably a more sane alternative as well. Giving full blown root access to non-root users is a bad idea and modifying /etc/passwd is an exceptionally bad idea as it will bork your logging.
how ????
for that u have to do some editing in password file.
-- Really don't do that, it's a good way to hose your ability to log in.[*]Do use "su" or "sudo"[*]In KDE there is "Terminal Program - Super User Mode" under "System" in the K Menu. It even has a nice pale yellow background to remind you to be careful.[*]There is also "kdesu" available.[/list=1]
i ussually dont log into x with root but i did once just to do one ting is tha okay? sorry i know its a newb questoin but im curious. and what would happen if i kept using root like normal?
The main issue with logging in as root all the time is just the potential for disaster. Since root has total permissions you can do really horrible things.
Suppose for example you're in /home/myusername which is owned by myusername. Under /home there are also other directories for username1, username2, username3 all owned by their respective usernames.
You decide you want to remove all your dot files (.profile, .bashrc etc...). Not thinking for a moment you type "rm -rf .*".
As user, myusername this would remove everything under /home/myusername (forgot about the "." file that is a reference to the current directory - oops!).
Luckilly it would do no other damange because even though it would try to also erase ".." which is a reference to /home it would fail because you don't have permissions (assuming you didn't give everyone write permissions on the same group to all home directories). However as root it would erase ALL of /home because it has permission.
You are saying to yourself about now "What kind of idiot would do THAT?". The sad answer is almost anyone who has ever worked on Unix/Linux has done or will do something similar at some point. Not running as root all the time protects you from your own brain cramps or unintended actions of simple commands that you haven't thought all the way through.
Last edited by MensaWater; 10-05-2005 at 10:01 AM.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.