Hi OSF Managers ,
Because of the number of messages I got after summarizing the problem the
first time , I thouhgt of doing another summary to make it more
comprehensive and to thank again all those who replied as soon as they
got the message .
------------------------------------------------------------
Thanks to the following people :
1) Kurt Carlson :
He suggested the following :
Easiest way is to boot to single user mode: 'b -fl s'
and issue passwd.
If you happen to be running C2 (enhanced security) you
can also fix by zapping the tcb file for root with a known
hashed password. Kurt Carlson, U of Alaska
2) Dr. Marco Luchini
He Suggesetd the following :
Just shut the system down and reboot to single user.
# shutdown -h now
>>> boot -fl s
Then you may want to mount /usr - I use /sbin/bcheckrc - and then vi
/etc/passwd. You don't need to enter the root passwd to enter single
user mode.
I don't run enhanced security myself. I seem to recall you need to wipe
out the file /tcb/files/auth/r/root. See map authcap.
I don't know if single user requires you to enter the root passwd under
enhanced security. If it doesn't the above will be OK. If it does, you
need to boot from CD, the enter the system admin shell, mount the root
partition and wipe the above file.
I forgot to mention you should also know that in single user, the root
partition is mounted read-only. To remount it read-write use:
# mount -u /
This is buried deep in man mount...
3) Larry Griffith
Bring the system down to single user mode (if you are locked
out of root, try hitting the reset switch and issuing a suitable boot
command for your hardware). Type "login" at the shell prompt. At
least on my machine (3000 with v3.2c) it will log you in w/o a
password. Issue the passwd command and then press control-D to return
to multi-user mode.
Incidentally, the existence of this procedure emphasizes the
need for insuring the physical security of your CPUs!
Larry
4) Pacemaker
OK, this should be easy. If you are running enhanced (C2) seurity. Go
into the /tcb/files/auth/r/ and edit the root file...
you should see the des encryption feild there. Thats what will need to be
changed.
compile this up and it will give you a password
#include <stdio.h>
#include <unistd.h>
main()
{
printf("%s", crypt("passwd", "Ar"));
}
that will give you the encryption to put in there so your password is
'passwd' change the 'passwd' to anything you would like :)
5) Akihito 'ycos' Yakoshi
Reboot your system (so, re-set SW or Power SW , It's very risky )
Watch the boot message hard!
Pless <Ctrl>+C at fsck(8) running. You can cancel boot only this timmimg.
If fsck was stopped, the system stop at single-user mode (root).
This methods is very risky. You must be take any backup.
6) Alan Rollow
Find the reset button... The particulars depend on the system, but
but most have a reset button near the power switch. The larger
8200, 8400 and DEC 7000/10000 systems will have a console that
supports type ^P to get the attention of the console. From there
you can type HALT to stop the system. To boot to single user,
most every Alpha supports using "-fl s" as an option to the boot
command.
7) Alan B. Scott
You might try one of the following:-
>>>boot -fl s
#mount -u /
Then edit the /etc/passwd file, (believe you may have to use the
'vi'
editor) removing the encrypted password entry.
Then run up the system.
-----------------------------------------------
The solution was :
I didn't even need to shutdown the system after I found that I have RW
to the file root in tcb , which belongs the group auth , just changed
the file , logged in to root with no passwd , changed it again as root , and
I am done . It was quite easy .
Thanks to every one, replied or those who will reply .
Deya
-------------------------------------------------------------------------
Deya Motawie Tel(O): (015) 414130
University Of Technology, Sydney P.O. Box 123, Broadway NSW 2007
-------------------------------------------------------------------------
Received on Mon Jul 15 1996 - 13:50:50 NZST