On Wed, Sep 28, 2005 at 05:14:31PM -0700, James Blanford wrote:
> Package: libpam-modules
> Version: 0.79-1

> I used to be able to su from root to any other account without entering
> a password.  Now a password is requested.  This breaks at least the
> updatedb script.  Please revert the SELinux passwd class permissions
> check.

Please explain why the SELinux patch is to blame.  The SELinux changes should
have zero impact unless you have an SELinux-enabled kernel, *and* you have
SELinux turned on at boot time.

This patch is in use in Fedora and the latest upstream version of Linux-PAM,
and is the one given to me by the folks working on SELinux in Debian.  I
can't say that I actually understand *why* pam_rootok should be making this
library call (which, from an SELinux standpoint, must be advisory in
nature), but I'm not willing to remove it outright without being presented
with an argument that I can in turn relay to upstream.

After only minimal research into the SELinux API I have some minor concerns
about the quality of the patch, but that doesn't tell me that it's *wrong*;
it's very possible that this behavior is intentional, and that what's needed
here is an update to the Debian SELinux policy.

-- 
Steve Langasek                   Give me a lever long enough and a Free OS
Debian Developer                   to set it on, and I can move the world.
[EMAIL PROTECTED]                                   http://www.debian.org/

Attachment: signature.asc
Description: Digital signature

Reply via email to