Date: Wed, 04 Apr 2001 02:34:39 -0700 From: "Crist J. Clark" <cjclark@alum.mit.edu> To: Kris Kirby <kris@catonic.net> Cc: Crist Clark <crist.clark@globalstar.com>, freebsd-chat@FreeBSD.ORG, Peter Radcliffe <pir@pir.net> Subject: Re: su change? Message-ID: <3ACAEAAF.F7434509@alum.mit.edu> References: <Pine.BSF.4.21.0104040232400.94241-100000@spaz.huntsvilleal.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Kris Kirby wrote: > > On Tue, 3 Apr 2001, Crist Clark wrote: > > Ummm... This page says, > > > > 7.My Sun is in full-security mode (can't even boot without password) > > and I don't know the EEPROM password. How do I fix this? (Replace chip) > > > > "Replace chip." You know a trick? I'd be curious. I had an admin do > > this once ('course, with our Sun contract, a tech replaced the chip > > the same day, no big deal). > > Smashing ^C like a mad monkey once SunOS starts over the com-console (no > keyboard) is another... > > ^C^C^C^C # > # fsck -p > # mount -a > # eeprom (-flags to change password) > > Then reboot, remove the security (since you now know the password). I > honestly didn't think IPXs would be *that* easy to break into... That's in full-security mode? In full-security mode, the machine will not go past the boot prompt without a password. It will not start going into multi-user mode; the OS never will start to boot. However, that method would be relevant to the start of this thread, how to get access when /etc/passwd is munged. -- Crist J. Clark cjclark@alum.mit.edu To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-chat" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3ACAEAAF.F7434509>