Sponsored Content
Special Forums Cybersecurity lost root password using (SAM) trusted security Post 99129 by Perderabo on Wednesday 15th of February 2006 02:02:10 AM
Old 02-15-2006
Since the instruction are to delete the u_pwd field, maybe someone already did that and you actually have some other problem? Did someone else already try to remedy the problem? Or are you actually editing root's profile? That wasn't what the suggestion said to do. There is no way to guess what file you are looking at from your post... maybe you have the wrong file entirely. Read "man 4 authcap". It is customary but not requred for u_pwd to be on a separate line, could that be the problem? Other than that, it beats me. Smilie
 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Root Password Lost !!!

I've forgotten root password on one of Solaris machines, i searched in forumes to find a similar case but there's no proceudre here to reinintialize root password, cause most of related commands & even single user mode needs root password that i don't have. Any solution would be helpful. --rgrds,... (9 Replies)
Discussion started by: nikk
9 Replies

2. UNIX for Advanced & Expert Users

I lost my password root

Hello ... I lost my password root ! maybe someone can to help me to log in HP_UX, i started the server in " Singel - User" and i changed my password to new password and it`s not working .. what i must to do ??? (4 Replies)
Discussion started by: yanly
4 Replies

3. UNIX for Advanced & Expert Users

Lost Root Password

I have recently become the sys adm guy for our unix systems here for my shop. I have a pretty good understanding of the system, but there is just some stuff that I don't know. Right now one of those things is to recover the password for a unix system. I know that there is a way that you can use... (2 Replies)
Discussion started by: GlockCW
2 Replies

4. Answers to Frequently Asked Questions

Lost root password / Can't login as root

We have quite a few threads about this subject. I have collected some of them and arranged them by the OS which is primarily discussed in the thread. That is because the exact procedure depends on the OS involved. What's more, since you often need to interact with the boot process, the... (0 Replies)
Discussion started by: Perderabo
0 Replies

5. Linux

how to access root priveliges if root password is lost

wish to know how to access root password it root password is forgotten in linux (1 Reply)
Discussion started by: wojtyla
1 Replies

6. UNIX for Dummies Questions & Answers

Root Password Lost

I'm attempting to blank out the root user password on a machine that we have forgotten the password for. I have been using the advice posted on this site to boot from CDROM in single user mode, then mounting the root slice and editing the /etc/shadow file. Each time I save the shadow file and... (1 Reply)
Discussion started by: gonzotonka
1 Replies

7. UNIX for Advanced & Expert Users

Help with Lost Root Password

This is a common question im sure... I bought a RS/6000 Model 240. Aix 4.3.3 loaded. No root password was supplied to me, but I do have the install media (4 disks). I want to drop into maint mode. So I place the cd into the drive, restart the box ( by pressing the power button, since i do not have... (3 Replies)
Discussion started by: JoeJohnSmith
3 Replies

8. SCO

unixware 7.1.4 lost root password

I dont have the cds, what can i do? (2 Replies)
Discussion started by: sopapa
2 Replies

9. SCO

Lost root Password - OpenServer 6

Hi All, It seems that someone in my organization had changed the root password on a SCO Openserver 6 box. Apparently, there are no emergency boot disks. I think they were never created because there is no floppy drive on the machine. I've tried to use the Openserver 6 media installations... (2 Replies)
Discussion started by: gseyforth
2 Replies

10. Solaris

Lost Root Password on VXVM Encapsulated Root Disk

Hi All Hope it's okay to post on this sub-forum, couldn't find a better place I've got a 480R running solaris 8 with veritas volume manager managing all filesystems, including an encapsulated root disk (I believe the root disk is encapsulated as one of the root mirror disks has an entry under... (1 Reply)
Discussion started by: sunnyd76
1 Replies
sulogin(8)						      System Manager's Manual							sulogin(8)

NAME
sulogin - single-user login program (Enhanced Security) SYNOPSIS
/sbin/sulogin DESCRIPTION
The sulogin program is run by the init process on the console terminal when entering single-user mode. The sulogin program checks the sys- tem configuration to determine whether entering single-user mode requires entering the root password. If it does not, then sulogin execs /sbin/sh with its argv[0] set to "-". That same exec is also done if the root password is correctly entered. The decision to enter the single-user mode depends on the state of the system configuration files. If the files cannot be read, then defaults are assumed (as described below). Therefore, the loss of a configuration file does not prevent access to the system console for repairing the problem. The sulogin program first checks the /etc/rc.config file for a the SECURE_CONSOLE variable. If such a variable is present, and it is set to a true value (either "TRUE", "ON", "YES", or "1"), then the program asks for the root password. The value of the SECURE_CONSOLE vari- able is checked in a case-independent fashion, and only a minimal match is necessary. Thus, the value is really checked against the fol- lowing regular expression: ^([Tt]|1|[Yy]|[Oo][Nn]).* If the SECURE_CONSOLE variable is present, but does not have one of the true values, then sulogin does not ask for the root password, but simply execs /sbin/sh as previously described. If the SECURE_CONSOLE variable is not found in the /etc/rc.config file, or if that file is missing or unreadable, then an attempt is made to obtain the value of the console firmware setting of the SECURE variable, using the GSI_PROM_ENV function of the getsysinfo() system call. If the check determines the console commands are password- protected, the sulogin program requests the root password. If sulogin has made the decision to request the root password, it also determines whether BASE or ENHANCED security should be used to vali- date that password. This is done using the value of the SECURITY variable from the /etc/rc.config file, unless that file was not readable, in which case the /etc/sia/matrix.conf file is read, looking for a line beginning with the string "siad_ses_init=", and containing either "(OSFC2," or "(BSD,". If the /etc/rc.config file was readable, but the SECURITY variable was not set, then BASE security is assumed. (This is how the /sbin/init.d/security script initializes the /etc/sia/matrix.conf file, as well). If the /etc/rc.config file can not be read and the /etc/sia/matrix.conf file either can not be read or does not have an appropriate siad_ses_init line, then the sulogin program checks to see whether the /etc/passwd file contains a valid entry for root and whether the getespwnam("root") function returns a valid extended profile. If both profile entries exist, but only one has a valid encrypted password field, that profile (and thus that security policy) is used. If both passwords are valid, the BASE security policy is used. Once the sulogin program has determined which security policy to use, it checks whether that policy has a valid account entry for user root (if not already checked while determining which policy to use), and whether that entry has a password that can be matched. If the password is impossible to match, or if no valid root profile exists, then sulogin prints a warning and execs /sbin/sh as previously described. For BASE security, a null encrypted password field for root causes the program to exec /sbin/sh without complaining. If there is a matchable root password, sulogin prints out "Single-user root login" and prompts for the password. If the entered password does not match (after the appropriate encryption if non-null), the program waits for 5 seconds (to deter break-in attempts, displays "Sorry", and re-prompts. If the program is interrupted or receives and end-of-file condition while attempting to read a password from the console terminal, it simply exits. This normally causes init to enter multi-user mode (It depends on system configuration information in /etc/inittab, specifically the entry marked with "initdefault", which ships at run-level "3"). This may also cause init to prompt for a run level, or to restart the sulogin program. Finally, if a password was collected, and it did match, the exec of /sbin/sh is done. If that exec fails, the reason for the failure is displayed, and the program sleeps for 5 seconds before exiting. Upon exiting control of the console is returned to the init process, as previously described for interrupt or end-of-file. FILES
/etc/rc.config /etc/sia/matrix.conf /etc/passwd /tcb/files/auth.db (/tcb/files/auth/r/root) RELATED INFORMATION
login(1), getpwnam(3), getespwnam(3), dispcrypt(3), matrix.conf(4), init(8) Security delim off sulogin(8)
All times are GMT -4. The time now is 01:09 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy