Ubuntu Root Passwork Gotcha?
Russell Cook
bike_oz at yahoo.com.au
Thu Jul 28 09:56:12 UTC 2005
I take a fairly simple approach.
I set a root password so if my account ever gets corrupt (including the
sudoers file) I can get into the system. However, I use sudo for all
maintenance and just keep the root account as backup. This works for me.
On Wed, 2005-07-27 at 22:17 -0700, William Chapman wrote:
> To Rooters & non-Rooters alike:
>
> Being something of a Linux noob, my position on the much-debated issue
> of root account management in Ubuntu has been to accept the party-line
> and work with the root account disabled. After a solid couple of
> months of intensive Ubuntu hacking & mangling, I've consistently been
> able to achieve desired results, and have grown comfortable with the
> policy, while actually beginning to understanding why it might be a
> sound idea!
>
> But after encountering the situation described below, I think I may
> have to reconsider. Perhaps others would be willing to weigh-in to
> correct my possible flawed analysis & likely lack of understanding.
> As always, your comments will be much appreciated.
>
> Situation:
>
> An unpleasant experience involving an ssh session (a test case with
> both client & server hosts lan'ed in my lab) in which the ssh client
> process was manually killed (it became a zombie, but wouldn't die),
> and its host rebooted by me. Immediately upon commanding the reboot I
> look at the ssh server host and realized that the session had still
> been active. (I had only imagined exiting the session.)
>
> (I won't go into why I was doing this, except to say it was related to
> establishing ssh sessions with WinXP-Linux dual-boot PCs set up so
> both OS environments on a given machine share identical host keys. It
> can be done!)
>
> The result of this was a situation along the lines of "...can't read
> ~/.ICEauthority...". and being forced into a recovery session from
> the gnome login screen (trouble starting gdm, I suppose). That file's
> owner was now root instead of me. After a quick chown & chmod, I was
> able to reboot, restore the correct permissions and all was well.
> (Not counting my unsolved ssh problems.)
>
> HOWEVER, during the process, I wanted very much to reboot and select
> the second default Ubuntu configuration offered by Grub, which is
> labeled, "(recovery mode)". I tried this, and at the opportune time,
> the boot process asked for a root password. As I suspected, my
> password would not suffice, as the root account was, of course,
> disabled. Upon rejecting the offered password, the boot process
> charged into a normal, default session. (Try it!)
>
> Issue:
>
> (1) The way I recon, the Grub recovery mode option is inconsistent
> with Ubuntu root account policy, and, therefore, cannot serve its
> intended purpose. Because when you really need it, you won't be able
> to use it! It could still have utility, but only in controlled
> situations where you add the root account in anticipation of going
> down that path. If my logic is flawed, please correct me.
>
> (2) If (1) is correct, perhaps the setup of the "recovery mode" could
> be changed (for Ubuntu) to allow a superuser id as an alternate to
> root.
>
> Comments?
>
> Kindly,
>
> Bill Chapman
>
Kind Regards Russell
==================
www.windsorcycles.com.au
bikes.no-ip.info
Linux user #369094
==================
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ubuntu.com/archives/ubuntu-users/attachments/20050728/b283c901/attachment.html>
More information about the ubuntu-users
mailing list