Date: Fri, 26 May 2006 16:59:28 -0400 From: Bill Moran <wmoran@collaborativefusion.com> To: Adrian Pavone <wingot@eftel.com> Cc: polina_mnouskina@yahoo.com, greenwood.andy@gmail.com, mmiranda@123.com.sv, freebsd-questions@freebsd.org Subject: Re: Problems booting operating system and with root password Message-ID: <20060526165928.1b255ffc.wmoran@collaborativefusion.com> In-Reply-To: <4477616D.40606@eftel.com> References: <20060526184500.29026.qmail@web54701.mail.yahoo.com> <3ee9ca710605261240o1957520u50075f6ae2d826aa@mail.gmail.com> <4477657D.90701@123.com.sv> <4477616D.40606@eftel.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Adrian Pavone <wingot@eftel.com> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Miguel wrote:
> > Andy Greenwood wrote:
> >
> >> I don't know what you mean by kernel errors on boot, but you can
> >> recover your root password by booting into single user mode and then
> >> running passwd.
> >
> > Hi, i have a similar problem, i forgot my root password and the server
> > its in a remote colocation site, is there a way to recover the encrypted
> > password and crackit some way, i have my normal account (which is in
> > wheel group), i even know that the root's pass begings with
> > MAG_"something", but i really cant remember the complete root's pass,
> > rebooting in single user mode is my best bet?
>
> It is easiest if the system's single user mode hasn't been locked down
Yes, but that is generally not a good idea at a colo, unless you have some
kind of physical security on the box.
> If single user mode HAS been locked down (ie. needs the root password),
> then you will need a boot disc so you can chroot to your FreeBSD system
> from another, or so you can directly edit the /etc/passwd or /etc/shadow
> file.
FYI: secure single password mode is default: meaning that the system assumes
that anyone that can physically access the system should be able to use
single user mode without a password.
You have to make changes to /etc/ttys to get a paranoid console that asks for
a password.
> The password hash *MIGHT* also be in one of those two files, depending
> on your configuration.
Linux, Linux, Linux.
FreeBSD has no /etc/shadow. There's /etc/passwd and /etc/master.passwd.
The password hash is readible by root only, so that doesn't help if you
only have a mortal account.
Unless you've specifically set up something else to work around this
problem, you _must_ get physical access to fix it.
In the future, try installing sudo or using PKI to protect yourself from
lost passwords.
--
Bill Moran
Be calm.
Morpheus
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20060526165928.1b255ffc.wmoran>
