02-15-2006
Hi! Thanks for you reply!
I am trying to do this, as suggested by alwayslearningunix:
mount -a to mount all filesystems. cd into the /tcb/files/auth/r directory, cp the root file, then edit it and delete the line beginning ":u_pwd". You can then change root passwd in the normal manner.
However, i cannot find the :u_pwd. No one tried to remedy our problem because our knowledge in unix is very limited.I believe the root account is locked because of too many incorrect logon attempts. I tried doin what is suggested below but i can't find "/usr/lbin/modprpw -k root.
Btw, we are using Digital Unix V4.0D. Please help me!!
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
I've forgotten root password on one of Solaris machines, i searched in forumes to find a similar case but there's no proceudre here to reinintialize root password, cause most of related commands & even single user mode needs root password that i don't have.
Any solution would be helpful.
--rgrds,... (9 Replies)
Discussion started by: nikk
9 Replies
2. UNIX for Advanced & Expert Users
Hello ...
I lost my password root !
maybe someone can to help me to log in HP_UX,
i started the server in " Singel - User" and i changed my
password to new password and it`s not working ..
what i must to do ??? (4 Replies)
Discussion started by: yanly
4 Replies
3. UNIX for Advanced & Expert Users
I have recently become the sys adm guy for our unix systems here for my shop. I have a pretty good understanding of the system, but there is just some stuff that I don't know. Right now one of those things is to recover the password for a unix system.
I know that there is a way that you can use... (2 Replies)
Discussion started by: GlockCW
2 Replies
4. Answers to Frequently Asked Questions
We have quite a few threads about this subject. I have collected some of them and arranged them by the OS which is primarily discussed in the thread. That is because the exact procedure depends on the OS involved. What's more, since you often need to interact with the boot process, the... (0 Replies)
Discussion started by: Perderabo
0 Replies
5. Linux
wish to know how to access root password it root password is forgotten in linux (1 Reply)
Discussion started by: wojtyla
1 Replies
6. UNIX for Dummies Questions & Answers
I'm attempting to blank out the root user password on a machine that we have forgotten the password for. I have been using the advice posted on this site to boot from CDROM in single user mode, then mounting the root slice and editing the /etc/shadow file. Each time I save the shadow file and... (1 Reply)
Discussion started by: gonzotonka
1 Replies
7. UNIX for Advanced & Expert Users
This is a common question im sure... I bought a RS/6000 Model 240. Aix 4.3.3 loaded. No root password was supplied to me, but I do have the install media (4 disks). I want to drop into maint mode. So I place the cd into the drive, restart the box ( by pressing the power button, since i do not have... (3 Replies)
Discussion started by: JoeJohnSmith
3 Replies
8. SCO
I dont have the cds, what can i do? (2 Replies)
Discussion started by: sopapa
2 Replies
9. SCO
Hi All,
It seems that someone in my organization had changed the root password
on a SCO Openserver 6 box.
Apparently, there are no emergency boot disks. I think they were never
created because there is no floppy drive on the machine. I've tried to
use the Openserver 6 media installations... (2 Replies)
Discussion started by: gseyforth
2 Replies
10. Solaris
Hi All
Hope it's okay to post on this sub-forum, couldn't find a better place
I've got a 480R running solaris 8 with veritas volume manager managing all filesystems, including an encapsulated root disk (I believe the root disk is encapsulated as one of the root mirror disks has an entry under... (1 Reply)
Discussion started by: sunnyd76
1 Replies
LEARN ABOUT DEBIAN
pam_unix2
pam_unix2(8) Reference Manual pam_unix2(8)
NAME
pam_unix2 - Standard PAM module for traditional password authentication
DESCRIPTION
The pam_unix2 PAM module is for traditional password authentication. It uses standard calls from the glibc NSS libraries to retrieve and
set account information as well as authentication. Usually this is obtained from the the local files /etc/passwd and /etc/shadow or from a
NIS map.
The options can be added in the PAM configuration files for every single service. /etc/security/pam_unix2.default defines, which password
encryption algorithm should be used in case of a password change.
OPTIONS
The following options may be passed to all types of management groups except session:
debug A lot of debug information is printed with syslog(3).
nullok Normally the account is disabled if no password is set or if the length of the password is zero. With this option the user is
allowed to change the password for such accounts. This option does not overwrite a hardcoded default by the calling process.
use_first_pass
The default is, that pam_unix2 tries to get the authentication token from a previous module. If no token is available, the user is
asked for the old password. With this option, pam_unix2 aborts with an error if no authentication token from a previous module is
available.
The following additional options may be passed to the passwd rules of this modules:
nisdir=<path>
This options specifies a path to the source files for NIS maps on a NIS master server. If this option is given, the passwords of NIS
accounts will not be changed with yppasswd(1), instead the local passwd and shadow files below <path> will be modified. In conjunc-
tion with rpasswdd(8) and pam_make rpc.yppasswdd(8) can be replaced with a more secure solution on the NIS master server.
use_authtok
Set the new password to the one provided by the previously stacked password module. If this option is not set, pam_unix2 would ask
the user for the new password.
One of the following options may be passed to the session rules of this modules:
debug Some messages (login time, logout time) are logged to syslog with priority LOG_DEBUG.
trace Some messages (login time, logout time) are logged to syslog with priority LOG_NOTICE.
none No messages are logged. This is the default.
The acct management does not recognize any additional options. For root, password and login expire are ignored, only on aging warning is
printed. If no shadow information exists, it always returns success.
FILES
/etc/security/pam_unix2.default
SEE ALSO
login(1), passwd(1), pam.conf(8), pam.d(8), pam_pwcheck(8), pam(8), rpasswd(1), rpasswdd(8), rpc.yppasswdd(8), yppasswd(1)
pam_unix2 August 2006 pam_unix2(8)