Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 04 Apr 2001 02:34:39 -0700
From:      "Crist J. Clark" <cjclark@alum.mit.edu>
To:        Kris Kirby <kris@catonic.net>
Cc:        Crist Clark <crist.clark@globalstar.com>, freebsd-chat@FreeBSD.ORG, Peter Radcliffe <pir@pir.net>
Subject:   Re: su change?
Message-ID:  <3ACAEAAF.F7434509@alum.mit.edu>
References:  <Pine.BSF.4.21.0104040232400.94241-100000@spaz.huntsvilleal.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Kris Kirby wrote:
> 
> On Tue, 3 Apr 2001, Crist Clark wrote:
> > Ummm... This page says,
> >
> >   7.My Sun is in full-security mode (can't even boot without password)
> >     and I don't know the EEPROM password. How do I fix this? (Replace chip)
> >
> > "Replace chip." You know a trick? I'd be curious. I had an admin do
> > this once ('course, with our Sun contract, a tech replaced the chip
> > the same day, no big deal).
> 
> Smashing ^C like a mad monkey once SunOS starts over the com-console (no
> keyboard) is another...
> 
> ^C^C^C^C #
> # fsck -p
> # mount -a
> # eeprom (-flags to change password)
> 
> Then reboot, remove the security (since you now know the password). I
> honestly didn't think IPXs would be *that* easy to break into...

That's in full-security mode? In full-security mode, the machine will
not go past the boot prompt without a password. It will not start
going into multi-user mode; the OS never will start to boot.

However, that method would be relevant to the start of this thread,
how to get access when /etc/passwd is munged.
-- 
Crist J. Clark                                   cjclark@alum.mit.edu

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-chat" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3ACAEAAF.F7434509>