From owner-freebsd-questions Tue Nov 14 21:13:50 2000 Delivered-To: freebsd-questions@freebsd.org Received: from donkeykong.gpcc.itd.umich.edu (donkeykong.gpcc.itd.umich.edu [141.211.2.163]) by hub.freebsd.org (Postfix) with ESMTP id DDB0337B4D7 for ; Tue, 14 Nov 2000 21:13:43 -0800 (PST) Received: from seawolf.gpcc.itd.umich.edu (smtp@seawolf.gpcc.itd.umich.edu [141.211.2.153]) by donkeykong.gpcc.itd.umich.edu (8.8.8/4.3-mailhub) with ESMTP id AAA07461; Wed, 15 Nov 2000 00:13:42 -0500 (EST) Received: from localhost (timcm@localhost) by seawolf.gpcc.itd.umich.edu (8.8.8/5.1-client) with ESMTP id AAA07030; Wed, 15 Nov 2000 00:13:42 -0500 (EST) Date: Wed, 15 Nov 2000 00:13:42 -0500 (EST) From: Tim McMillen X-Sender: timcm@seawolf.gpcc.itd.umich.edu To: "Zaitsau, Andrei" Cc: "'Ben Weaver'" , "'questions@FreeBSD.ORG'" Subject: RE: Help In-Reply-To: <054F7DAA9E54D311AD090008C74CE9BD01766DDA@exchange.panasonicfa.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG On Tue, 14 Nov 2000, Zaitsau, Andrei wrote: > Ben, > I have a small question also regarding password issue... > What if I have single user mode also protected with root password? > So without root password I am unable to use single user mode.. > Will Fixit disk work? Yes a boot floppy or bootable cd will still be able to go into single user mode. You can disable booting from floppy and cdrom in the Bios and password protect the BIOS. If you do that someone can take out the BIOS battery and reset the BIOS and clear the password, then boot from floppy. You can physically remove the floppy drive and the CDROM drive and lock the case. Someone that wants to compromise the computer bad enough can break into the computer and reinstall a floppy and boot from that. You could break the motherboard connectors for the floppy and the cdrom. Then somebody could still steal the harddrive(s). If you really wanted to keep anybody from getting a hold of the data you could break the hard drive. For an idea of why even that may not be good enough, see: http://www.cs.auckland.ac.nz/~pgut001/secure_del.html > Any solutions for that? Yes. Physical Security. There's no substitute for it. Depends on how bad you need to protect your data, as to how paranoid you need to be and what lengths you need to go to. Obviously few of the above steps need be taken by most of us. You pick your level of security by how much you need. Of course there's always encrypted everything. :) Tim > Thanks. > > -----Original Message----- > From: Ben Weaver [mailto:sid67@tranquility.net] > Sent: Tuesday, November 14, 2000 4:39 PM > To: Ing. Urias Manuel Coronel Urias > Cc: questions@FreeBSD.ORG > Subject: Re: Help > > > That's a pretty easy fix: > > Reboot the server into single user mode. Once you get to a command prompt, > you can do a mount -a to mount everything in your /etc/fstab. Then do a > passwd to change the password for root. Do a ^D and it will boot into > multi-user mode. > > -Ben > > On Tue, Nov 14, 2000 at 11:29:43AM -0700, Ing. Urias Manuel Coronel Urias > wrote: > > Dear friends; > > > > I'm an administrator of one of the servers using freeBSD at this office > but I haven't had a course of administration, and I forgot the root's > password, How can I change the password of root again. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message