Date: Wed, 04 Apr 2001 02:34:39 -0700 From: "Crist J. Clark" <cjclark@alum.mit.edu> To: Kris Kirby <kris@catonic.net> Cc: Crist Clark <crist.clark@globalstar.com>, freebsd-chat@FreeBSD.ORG, Peter Radcliffe <pir@pir.net> Subject: Re: su change? Message-ID: <3ACAEAAF.F7434509@alum.mit.edu> References: <Pine.BSF.4.21.0104040232400.94241-100000@spaz.huntsvilleal.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Kris Kirby wrote:
>
> On Tue, 3 Apr 2001, Crist Clark wrote:
> > Ummm... This page says,
> >
> > 7.My Sun is in full-security mode (can't even boot without password)
> > and I don't know the EEPROM password. How do I fix this? (Replace chip)
> >
> > "Replace chip." You know a trick? I'd be curious. I had an admin do
> > this once ('course, with our Sun contract, a tech replaced the chip
> > the same day, no big deal).
>
> Smashing ^C like a mad monkey once SunOS starts over the com-console (no
> keyboard) is another...
>
> ^C^C^C^C #
> # fsck -p
> # mount -a
> # eeprom (-flags to change password)
>
> Then reboot, remove the security (since you now know the password). I
> honestly didn't think IPXs would be *that* easy to break into...
That's in full-security mode? In full-security mode, the machine will
not go past the boot prompt without a password. It will not start
going into multi-user mode; the OS never will start to boot.
However, that method would be relevant to the start of this thread,
how to get access when /etc/passwd is munged.
--
Crist J. Clark cjclark@alum.mit.edu
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-chat" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3ACAEAAF.F7434509>
