From owner-freebsd-security Thu Jul 1 6:33:55 1999 Delivered-To: freebsd-security@freebsd.org Received: from burka.carrier.kiev.ua (burka.carrier.kiev.ua [193.193.193.107]) by hub.freebsd.org (Postfix) with ESMTP id D8A7E14CAB for ; Thu, 1 Jul 1999 06:33:45 -0700 (PDT) (envelope-from netch@lucky.net) Received: (from netch@localhost) by burka.carrier.kiev.ua (8.Who.Cares/Guinness_Is_Better) id QAA25528; Thu, 1 Jul 1999 16:33:43 +0300 (EEST) (envelope-from netch) Date: Thu, 1 Jul 1999 16:33:43 +0300 (EEST) From: Valentin Nechayev Message-Id: <199907011333.QAA25528@burka.carrier.kiev.ua> To: freebsd-security@freebsd.org Subject: Re: kill!!! In-Reply-To: <0428AD6295E1D211AC4400A0C969E8A236F185@orsmsx43.jf.intel.com> Organization: Lucky Netch Incorporated User-Agent: tin/pre-1.4-980226 (UNIX) (FreeBSD/2.2.6-RELEASE (i386)) Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org At Wed, 30 Jun 1999 11:42:09 -0700, in article <0428AD6295E1D211AC4400A0C969E8A236F185@orsmsx43.jf.intel.com> Jackson, Douglas H wrote to sita.freebsd.security: JDH> There are a number of ways to deal with a lost root password. JDH> You can always boot to single user mode with no password. No, if "console" entry in /etc/ttys has "insecure" flag, you must type down root password to enter the single user mode shell. JDH> You could also use su2, which would allow you to have a number of JDH> different passwords which each allow you root access. Or one can create accounts root_a, root_b, ... ;) Or one can patch sudo utility to use another password file... ;) -- -- Valentin Nechayev netch@lucky.net II:LDXIII/MCMLXXII.CCC To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message