Sponsored Content
Full Discussion: root lockout
Top Forums UNIX for Dummies Questions & Answers root lockout Post 43826 by newbieadmin on Sunday 23rd of November 2003 08:23:33 AM
Old 11-23-2003
Error root lockout

Hi, I am extremely new to UNIX and was recently promoted to administer the system for a small company. Anyhow, the time came for passwords to change, and I made the huge mistake of entering in the command (as root)

passwd -l

After logging out (oblivious to what would happen next), the root account could no longer be accessed. After researching why, I've discovered that the "-l" command locks out the account. After hours of searching the internet, the most common (and possbily only) solution is

1. boot UNIX into Single-User Mode
2. mount
3. edit passwd file
4. reboot

The only problem is I am so new to UNIX, I don't even know how to boot into Single-User Mode. I've tried typing in the following commands while logged in as a normal user

boot -s OR
init S

The UNIX box returns an error message saying that access is denied to the boot and init commands. I believe these are commands that only a superuser can access, and root was the only superuser on this particular system. To make matters worse, the old system administrator left things in a shamble. I have no boot disk; all I have is what I believe to be possible backups to the software that our company uses. I am running UNIX System V, if that helps.

Any help or feedback would be greatly appreciated. Thanks!
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Lockout Users

I am using AIx 4.3.3 and was wondering what the command was to keep users from logging in. I want to be able to do maintenance and keep the users out. Can anyone help? (7 Replies)
Discussion started by: cgillett
7 Replies

2. AIX

user lockout...

Hi, We are using 4.3.3.0 and I would like to make a global change to the "number of failed logins before user account is locked" Any ideas, other than using SMIT one user at a time.... ??? Thanks... Craig. (2 Replies)
Discussion started by: stumpy
2 Replies

3. AIX

lockout su for 1 user

I want to know if there is any easy way of stopping 1 user from using su? perferabily any su but I can make do with not allow him to su to root but allow other user to su to root. (3 Replies)
Discussion started by: daveisme
3 Replies

4. Red Hat

Account lockout policy

Hi all; I m using Red Hat Enterprise Linux Server release 5.1 (Tikanga) and I'm trying to setup password lockout policy so that a user account locks out after 3 failed attempts. Here are the entires of my /etc/pam.d/system-auth #%PAM-1.0 # This file is auto-generated. # User changes... (1 Reply)
Discussion started by: maverick_here
1 Replies

5. UNIX and Linux Applications

Account lockout using Openldap

What is the best way to implement account lockout in openldap? I have an openldap server with Ubuntu desktop client connecting to it for authentication. I want he accounts to locked out after say 5 failed authentication attempts I have enabled ppolicy layout in slapd.conf. overlay ppolicy... (0 Replies)
Discussion started by: nitin09
0 Replies

6. Red Hat

Account Lockout on Redhat

On a redhat linux 4 server, how to find if there is an account lockout duration is set. Is it configured under pam or /etc/shadow? what entries I need to find out? Is it pam_time.so module? I desperately need an answer because on one of the servers, no one was able to login through any account... (4 Replies)
Discussion started by: Tirmazi
4 Replies

7. Red Hat

Account lockout

having account lockout issues with an RHEL 5 server. My users are getting locked out for 10 minutes after one failed login attempt even though /etc/pam.d/sshd is configured for 5 failed attempts: auth include system-auth auth required pam_tally2.so deny=5 onerr=fail... (1 Reply)
Discussion started by: nerdalert
1 Replies

8. Solaris

Secman lockout

Greetings, I work with a Solaris Sun Server V240 system (GCCS) and have run into a problem where I can't seem to unlock my SECMAN account at the NON-GLOBAL level. I have access to all global accounts to include sysadmin and secman. I have access to the non-global sysadmin account and root... (4 Replies)
Discussion started by: TLAMGUY
4 Replies

9. Red Hat

RHEL4.8 no notification on PAM lockout

Good day. I have setup hardening the password (test system so far) prior to doing any work on production. Here is what I have set. Snippet from /etc/pam.d/system-auth auth required /lib/security/$ISA/pam_env.so auth required /lib/security/$ISA/pam_tally.so... (3 Replies)
Discussion started by: smurphy_it
3 Replies
SULOGIN(8)						Linux System Administrator's Manual						SULOGIN(8)

NAME
sulogin - Single-user login SYNOPSIS
sulogin [ -e ] [ -p ] [ -t SECONDS ] [ TTY ] DESCRIPTION
sulogin is invoked by init(8) when the system goes into single user mode. (This is done through an entry in inittab(5).) Init also tries to execute sulogin when the boot loader (e.g., grub(8)) passes it the -b option. The user is prompted Give root password for system maintenance (or type Control-D for normal startup): If the root account is locked, no password prompt is displayed and sulogin behaves as if the correct password were entered. sulogin will be connected to the current terminal, or to the optional device that can be specified on the command line (typically /dev/con- sole). If the -t option is used then the program only waits the given number of seconds for user input. If the -p option is used then the single-user shell is invoked with a dash as the first character in argv[0]. This causes the shell process to behave as a login shell. The default is not to do this, so that the shell will not read /etc/profile or $HOME/.profile at startup. After the user exits the single-user shell, or presses control-D at the prompt, the system will (continue to) boot to the default runlevel. ENVIRONMENT VARIABLES
sulogin looks for the environment variable SUSHELL or sushell to determine what shell to start. If the environment variable is not set, it will try to execute root's shell from /etc/passwd. If that fails it will fall back to /bin/sh. This is very valuable together with the -b option to init. To boot the system into single user mode, with the root file system mounted read/write, using a special "fail safe" shell that is statically linked (this example is valid for the LILO bootprompt) boot: linux -b rw sushell=/sbin/sash FALLBACK METHODS
sulogin checks the root password using the standard method (getpwnam) first. Then, if the -e option was specified, sulogin examines these files directly to find the root password: /etc/passwd, /etc/shadow (if present) If they are damaged or nonexistent, sulogin will start a root shell without asking for a password. Only use the -e option if you are sure the console is physically protected against unauthorized access. AUTHOR
Miquel van Smoorenburg <miquels@cistron.nl> SEE ALSO
init(8), inittab(5). 17 Jan 2006 SULOGIN(8)
All times are GMT -4. The time now is 03:29 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy