From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from pigeon.gentoo.org ([208.92.234.80] helo=lists.gentoo.org) by finch.gentoo.org with esmtp (Exim 4.60) (envelope-from ) id 1N9hbc-0004TM-Lb for garchives@archives.gentoo.org; Sun, 15 Nov 2009 16:05:36 +0000 Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id B9530E0B89 for ; Sun, 15 Nov 2009 16:05:35 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) by pigeon.gentoo.org (Postfix) with ESMTP id 26588E0955 for ; Sun, 15 Nov 2009 14:41:20 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp.gentoo.org (Postfix) with ESMTP id BADF865115 for ; Sun, 15 Nov 2009 14:41:19 +0000 (UTC) X-Virus-Scanned: amavisd-new at gentoo.org X-Spam-Score: -3.131 X-Spam-Level: X-Spam-Status: No, score=-3.131 required=5.5 tests=[AWL=-0.532, BAYES_00=-2.599] Received: from smtp.gentoo.org ([127.0.0.1]) by localhost (smtp.gentoo.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VCzSQO+qltRt for ; Sun, 15 Nov 2009 14:41:13 +0000 (UTC) Received: from lo.gmane.org (lo.gmane.org [80.91.229.12]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTP id B82BE66DB6 for ; Sun, 15 Nov 2009 14:41:11 +0000 (UTC) Received: from list by lo.gmane.org with local (Exim 4.50) id 1N9gHo-0005XZ-Hl for gentoo-user@gentoo.org; Sun, 15 Nov 2009 15:41:04 +0100 Received: from athedsl-394538.home.otenet.gr ([79.131.93.40]) by main.gmane.org with esmtp (Gmexim 0.1 (Debian)) id 1AlnuQ-0007hv-00 for ; Sun, 15 Nov 2009 15:41:04 +0100 Received: from realnc by athedsl-394538.home.otenet.gr with local (Gmexim 0.1 (Debian)) id 1AlnuQ-0007hv-00 for ; Sun, 15 Nov 2009 15:41:04 +0100 X-Injected-Via-Gmane: http://gmane.org/ To: gentoo-user@lists.gentoo.org From: Nikos Chantziaras Subject: [gentoo-user] Re: Block root user from login on xorg GUI Date: Sun, 15 Nov 2009 16:40:48 +0200 Organization: Lucas Barks Message-ID: References: <200911122001.57860.michaelkintzios@gmail.com> <200911142146.24629.dirk.heinrichs@online.de> <200911150050.42839.alan.mckinnon@gmail.com> <200911151022.25803.dirk.heinrichs@online.de> Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-15; format=flowed Content-Transfer-Encoding: 7bit X-Complaints-To: usenet@ger.gmane.org X-Gmane-NNTP-Posting-Host: athedsl-394538.home.otenet.gr User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.4pre) Gecko/20091019 Thunderbird/3.0b4 In-Reply-To: <200911151022.25803.dirk.heinrichs@online.de> Sender: news X-Archives-Salt: 8f5a58ae-1c7f-442e-b7e9-b253dc4c8594 X-Archives-Hash: b8a1f1a674595c9108363d6d141c082b On 11/15/2009 11:22 AM, Dirk Heinrichs wrote: > > SELinux allows to spread the tasks root needs to do or can do accross several > roles. Of course, if only one single person has root access to the system this > doesn't make sense. But we're talking about cases where several people (incl. > the malicious attacker) have root access. So you can very well configure a > (SE-)Linux system so that "root" can't do everything. So how do you get your machine back if you forbid yourself to change its configuration then?