Usually graphical root login is (or should be) prevented. Point? Root user shouldn't need graphical tools, running X session as root is just not something you are supposed to do. So with Mandriva, try to press CTRL+ALT+F1 (or trough F6) to get into a console and see if you can login as root there (note: on console nothing is printed on screen when typing a password; root user's name is
root with non-capital letters).
On Ubuntu it's the same except, like you said yourself, root account is locked/frozen initially. This is because of security; on Ubuntu
sudo is configured for the first user created during setup, so that the user you create when installing Ubuntu can use
sudo (which asks for that user's password) to run commands as root. Users created afterwards don't have sudo access unless given permissions. Usage:
after which you're asked for the user's password. To unlock root account, you could simply
to change the root's password to some known value, after which I think it should work (an account can be locked for example by adding some letter to the user's password field in /etc/shadow that includes a character that's not supposed to be there, like !)
You can configure your system (or rather login manager, like GDM or KDM) so that root login is allowed, but I discourage doing so. If you are ok with the fact that it might open some security holes, go ahead, but if you're interested in maximizing security, that's one step
EDIT: because some users find using
sudo instead of a root login irritating, I'd like to ask to think about it twice.
sudo is a way to run commands with root privileges but without logging in as root; users who are granted access to it don't need to know the root password, and it can be configured so that only certain users can use it (at all), and those users who can use it can only run certain commands (For example) with it, while others are not permitted to be run (therefore a user can use
sudo to run
mount if it's needed, but so that the same user can't change root password using
passwd or any editor to clear the password field from the shadow file). It can be configured to let the users run some commands as root without a password being asked (though I dislike that), to make the system usage more flexible if there are no other means. Using
sudo means that a user has to be, usually, in the
sudo group and that
/etc/sudoers is configured to let them use some command(s) with sudo (file should only be accessible to root; other users than the admin user shouldn't have full sudo access, because if they had, they could alter the file and have unlimited root access). Some users use
su to switch their terminal login to another user, for example to become root, but I prefer sudo over su in that case because using
su means you'll have to type root password (to become root) so that can't obviously be given for every user, and because it's a login (whereas
sudo runs a command, and when it exits, the user doesn't have root permissions anymore -- unless configured so that
sudo "remembers" the user for some time), it means that when a executed program ends, the login is in a usual case left open which isn't a good thing.
Some (usually new) users learn to use only root account all the time, mainly because they've used to that in Windows and because "things work more easily and I don't have to type root password every now and then". That's a bad way, as those people should have already learned from Windows (running as root and doing something foolish may make the system wulnerable to straight attacks, in addition to a lot of other things). For security it's better to stick using regular user accounts, and configure things once so that regular users don't have to use root permissions. Some things just need root permissions and can't be configured (for a reason or another) to run under non-root permissions, and in that case things like
sudo come in handy. Actually these days using root account is not vital except in some rare situations, so I understand completely the Ubuntu way of locking it -- new users don't often even miss it before somebody tells them they need to have a root login. And the best thing is, when it's needed, it can be opened. Having it locked means simply that it's more difficult to use by the bad folks too
As a final (side?)note, opening a root account even after you've "lost/forgotten" the password isn't that difficult. It becomes difficult only after you or somebody else has hardened the system enough, and that means quite a lot of work; most of the regularly installed Linux systems can be easily "hacked" (it's not even hacking, really) with a single reboot (so..remember to set a bootloader password to protect configuring boot parameters!) And after you've done everything to make the box safe you find out somebody just stole your harddisk which wasn't
completely well enough encrypted. Oh, well..