On Thu, Jul 14, 2005 at 09:55:16AM -0400, John Von Essen wrote:
> Boot with 1st CD, goto the Fixit Shell (will need 2nd CD). From there you
> have to manually mount the / filesystem and edit passwd (just clear out
> the passwd, root::). However, do an fsck on the device first (you may have
> to reb
In <[EMAIL PROTECTED]>, John Von Essen <[EMAIL PROTECTED]> typed:
> Boot with 1st CD, goto the Fixit Shell (will need 2nd CD).
You an boot the second CD directly.
http://www.mired.org/consulting.html
Independent Network/Unix/Perforce consultant, email for more information.
_
This is a friendly reminder that we are collecting status reports.
Submissions are due tomorrow (July 15). If you are planning to submit
something, but won't be able to make the formal deadline - please let us
know, we are willing to extend the deadline a bit for a broader turnout.
Looking fo
Boot with 1st CD, goto the Fixit Shell (will need 2nd CD). From there you
have to manually mount the / filesystem and edit passwd (just clear out
the passwd, root::). However, do an fsck on the device first (you may have
to reboot afterwards) since if you have any fragmentation following an
unclean
Amandeep wrote:
> Hi all,
First, please do Not cross post, we have a rule about that !
... so I dropped cc freebsd-questions@freebsd.org,
> Is there a way to reset the root passwd without reinstalling FreeBSD 4.7.
>
> Thanks in advance
>
> Aman
passwd root
[ Except maybe ]
Various th
Jeremie Le Hen wrote:
> Hi Christophe,
>
> a quick glance at the archives whould have helped you.
I also experienced the problem and read the thread. I don't believe
anybody found and shared a way to solve it. The conclusion of the thread
was that the problem is more in the application then in Fr
On Thu, Jul 14, 2005 at 02:16:31PM +0400, Vyacheslav Sotnikov wrote:
> but what to do if i have "console insecure" in /etc/ttys?
In the linux world, you would simply boot a live cd like knoppix,
open a root shell in the live system and chroot into your installed
system to get root access witho
On 2005-07-14 00:22, "M. Warner Losh" <[EMAIL PROTECTED]> wrote:
> In message: <[EMAIL PROTECTED]>
> Giorgos Keramidas <[EMAIL PROTECTED]> writes:
> : I couldn't agree more. Helping source-level compatibility, as much as
> : this can be accomplished for kernel code, is definitely a plu
Vyacheslav Sotnikov wrote:
but what to do if i have "consoleinsecure" in /etc/ttys?
I believe you can
Boot cdrom
Pick "Change system manager's password"
Type the new password.
Worked fine from /stand/sysinstall, but you have to be root to do that
from the command line :-)
--Al
John Von Essen пишет:
boot single user...
mount -u /
mount -a
Then use vipw or passwd to clear out or change root password. If you
shutdown the system un-cleanly, you may have to do an fsck / as
fragmentation will prevent the filesystem from being mounted
read-write-able.
-john
but what
Good day.
Playing with OPIE I've noticed that the /etc/opiekeys have mode 644. As I
remember there was a vulnurability related to this permissions for S/Key. But
at that times that file was named /etc/skeykeys and it was created with
permissions 600, so FreeBSD was not vulnerable to the disction
11 matches
Mail list logo