From owner-freebsd-questions Tue Dec 23 18:55:53 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.7/8.8.7) id SAA04078 for questions-outgoing; Tue, 23 Dec 1997 18:55:53 -0800 (PST) (envelope-from owner-freebsd-questions) Received: from germanium.xtalwind.net (germanium.xtalwind.net [205.160.242.5]) by hub.freebsd.org (8.8.7/8.8.7) with ESMTP id SAA04072 for ; Tue, 23 Dec 1997 18:55:46 -0800 (PST) (envelope-from jack@germanium.xtalwind.net) Received: from localhost (localhost.xtalwind.net [127.0.0.1]) by germanium.xtalwind.net (8.8.8/8.8.7) with SMTP id VAA08168 for ; Tue, 23 Dec 1997 21:56:08 -0500 (EST) Date: Tue, 23 Dec 1997 21:56:08 -0500 (EST) From: jack To: freebsd-questions@FreeBSD.ORG Subject: Re: Lost root password In-Reply-To: <199712240043.TAA02258@host.cnwl.igs.net> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-questions@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk On Tue, 23 Dec 1997, grcuerrier wrote: > One of my techs entered a new root password, which he has forgotten. Is > there any way a user with "wheel" access can reset the root password > without having to redo the whole server? Root can do almost anything. A user in the wheel group, with the root password, can become root and do almost anything. Users who have not proven themselves to be 150% reliable should not have root access. If there is a need for a user to so a few `root things' you should be using sudo, available in the ports collection. > Strange question I know. I thought possibly there would be a way upon > power up. Any ideas would be greatly appreciated. Boot to single user, mount your disks, set the password. -------------------------------------------------------------------------- Jack O'Neill Finger jacko@diamond.xtalwind.net or jack@xtalwind.net http://www.xtalwind.net/~jacko/pubpgp.html #include for my PGP key. PGP Key fingerprint = F6 C4 E6 D4 2F 15 A7 67 FD 09 E9 3C 5F CC EB CD enriched, vcard, HTML messages > /dev/null --------------------------------------------------------------------------