Sponsored Content
Special Forums Cybersecurity lost root password using (SAM) trusted security Post 99129 by Perderabo on Wednesday 15th of February 2006 02:02:10 AM
Old 02-15-2006
Since the instruction are to delete the u_pwd field, maybe someone already did that and you actually have some other problem? Did someone else already try to remedy the problem? Or are you actually editing root's profile? That wasn't what the suggestion said to do. There is no way to guess what file you are looking at from your post... maybe you have the wrong file entirely. Read "man 4 authcap". It is customary but not requred for u_pwd to be on a separate line, could that be the problem? Other than that, it beats me. Smilie
 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Root Password Lost !!!

I've forgotten root password on one of Solaris machines, i searched in forumes to find a similar case but there's no proceudre here to reinintialize root password, cause most of related commands & even single user mode needs root password that i don't have. Any solution would be helpful. --rgrds,... (9 Replies)
Discussion started by: nikk
9 Replies

2. UNIX for Advanced & Expert Users

I lost my password root

Hello ... I lost my password root ! maybe someone can to help me to log in HP_UX, i started the server in " Singel - User" and i changed my password to new password and it`s not working .. what i must to do ??? (4 Replies)
Discussion started by: yanly
4 Replies

3. UNIX for Advanced & Expert Users

Lost Root Password

I have recently become the sys adm guy for our unix systems here for my shop. I have a pretty good understanding of the system, but there is just some stuff that I don't know. Right now one of those things is to recover the password for a unix system. I know that there is a way that you can use... (2 Replies)
Discussion started by: GlockCW
2 Replies

4. Answers to Frequently Asked Questions

Lost root password / Can't login as root

We have quite a few threads about this subject. I have collected some of them and arranged them by the OS which is primarily discussed in the thread. That is because the exact procedure depends on the OS involved. What's more, since you often need to interact with the boot process, the... (0 Replies)
Discussion started by: Perderabo
0 Replies

5. Linux

how to access root priveliges if root password is lost

wish to know how to access root password it root password is forgotten in linux (1 Reply)
Discussion started by: wojtyla
1 Replies

6. UNIX for Dummies Questions & Answers

Root Password Lost

I'm attempting to blank out the root user password on a machine that we have forgotten the password for. I have been using the advice posted on this site to boot from CDROM in single user mode, then mounting the root slice and editing the /etc/shadow file. Each time I save the shadow file and... (1 Reply)
Discussion started by: gonzotonka
1 Replies

7. UNIX for Advanced & Expert Users

Help with Lost Root Password

This is a common question im sure... I bought a RS/6000 Model 240. Aix 4.3.3 loaded. No root password was supplied to me, but I do have the install media (4 disks). I want to drop into maint mode. So I place the cd into the drive, restart the box ( by pressing the power button, since i do not have... (3 Replies)
Discussion started by: JoeJohnSmith
3 Replies

8. SCO

unixware 7.1.4 lost root password

I dont have the cds, what can i do? (2 Replies)
Discussion started by: sopapa
2 Replies

9. SCO

Lost root Password - OpenServer 6

Hi All, It seems that someone in my organization had changed the root password on a SCO Openserver 6 box. Apparently, there are no emergency boot disks. I think they were never created because there is no floppy drive on the machine. I've tried to use the Openserver 6 media installations... (2 Replies)
Discussion started by: gseyforth
2 Replies

10. Solaris

Lost Root Password on VXVM Encapsulated Root Disk

Hi All Hope it's okay to post on this sub-forum, couldn't find a better place I've got a 480R running solaris 8 with veritas volume manager managing all filesystems, including an encapsulated root disk (I believe the root disk is encapsulated as one of the root mirror disks has an entry under... (1 Reply)
Discussion started by: sunnyd76
1 Replies
default(4)						     Kernel Interfaces Manual							default(4)

NAME
default - system default database file for a trusted system SYNOPSIS
DESCRIPTION
The system default database is unique in that it defines system-wide global parameters for a trusted system. It is designed to provide values for users and devices on a global scale rather than requiring an administrator to replicate values in user or device databases when they are all the same. In addition to being easier to specify global values, it is also much easier to make a global system change if nec- essary. The system default database is made up of four types of values: system-wide parameters These are parameters that do not have corresponding specifications in any other trusted system database. If a system-wide parameter is not specified in the default database, then it is undefined. user parameters These parameters are typically specified in a protected password database file. terminal control parameters These parameters are typically specified in the terminal control database file. device assignment parameters These parameters are typically specified in the device assignment database file. System default parameters may be specified for fields found in the protected password, terminal control, and device assignment databases. When a specific entry is retrieved from one of these databases, a structure called, ufld that contains all of the explicitly specified val- ues, is provided to the caller. A second structure, called sfld, is also provided which defines those values supplied from the system default database. Each of these structures has a corresponding flag structure called uflg and sflg, respectively, that indicates which fields in each structure have been specified and are valid for use. Programs honor the user or device specific value first if one is pro- vided. Otherwise, the program may choose to use the system default value if one has been specified. If neither value is specified, the program may supply a reasonable default value or abort. For descriptions of the specific fields provided by the protected password, terminal control, and device assignment databases, see the cor- responding manual pages listed in the section for those databases. The following fields are unique to the system default database and can not be specified in any of the other system databases. This name is set to the string "default". This flag field indicates whether or not boot authentication is required to boot the machine. If authentication is required, it is performed by the system init(1M) program prior to completing system boot. EXAMPLES
The following is an example of a typical system default database. Refer to authcap(4) for descriptions of the file and line formats. default: :d_name=default: :d_boot_authenticate@: :u_pwd=*: :u_minchg#0:u_maxlen#10:u_exp#15724800:u_life#31449600: :u_pickpw@:u_genpwd@:u_restrict@:u_nullpw@: :u_genchars@:u_genletters@: :u_maxtries#5:u_lock: :t_logdelay#2:t_maxtries#10: :chkent: This system default database defines the four different types of values which are supported. First, values that can be assigned on a sys- tem-wide only basis are defined. Boot authentication at system startup is not enabled. Login programs will provide password expiration warnings if the password expires in less than 604800 seconds from the current system time (this translates into 60*60*24*7 or 7 days). The system default database also defines numerous protected password database default values. Fields that begin with correspond to pro- tected password fields. Similarly, fields starting with the prefix are terminal control database fields. These field types are used to supply system-wide default values if a user or device specific value is not supplied by the corresponding database. See the appropriate manual pages listed in the section for these databases for a complete description of the applicable fields. WARNINGS
HP-UX 11i Version 3 is the last release to support trusted systems functionality. FILES
system default database file for a trusted system; see authcap(4) protected password database files; see prpwd(4) terminal control database file; see ttys(4) device assignment database file; see devassign(4) AUTHOR
was developed by HP. SEE ALSO
getprdfent(3), authcap(4), devassign(4), prpwd(4), ttys(4). TO BE OBSOLETED default(4)
All times are GMT -4. The time now is 02:51 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy