public inbox for linux-newbie@vger.kernel.org
 help / color / mirror / Atom feed
* root password
@ 2005-03-30  7:16 Ankit Jain
  2005-03-30 14:36 ` Ray Olszewski
       [not found] ` <16974.37459.930871.583279@gargle.gargle.HOWL>
  0 siblings, 2 replies; 14+ messages in thread
From: Ankit Jain @ 2005-03-30  7:16 UTC (permalink / raw)
  To: admin

hi

i have forgotten my root pasword. i had installed
redhat linux 9.0 kernel version 2.4 with grub loader.
if somebody can tell me how to change the password
without logging.

thanks

ankit


		
__________________________________ 
Do you Yahoo!? 
Yahoo! Small Business - Try our new resources site!
http://smallbusiness.yahoo.com/resources/ 
-
To unsubscribe from this list: send the line "unsubscribe linux-newbie" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.linux-learn.org/faqs

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: root password
  2005-03-30  7:16 root password Ankit Jain
@ 2005-03-30 14:36 ` Ray Olszewski
  2005-04-01 16:23   ` Tobias Hirning
  2005-04-01 16:55   ` Eric Bambach
       [not found] ` <16974.37459.930871.583279@gargle.gargle.HOWL>
  1 sibling, 2 replies; 14+ messages in thread
From: Ray Olszewski @ 2005-03-30 14:36 UTC (permalink / raw)
  To: linux-newbie

At 11:16 PM 3/29/2005 -0800, Ankit Jain wrote:
>hi
>
>i have forgotten my root pasword. i had installed
>redhat linux 9.0 kernel version 2.4 with grub loader.
>if somebody can tell me how to change the password
>without logging.


The normal solution to this sort of problem is to boot the system using a 
rescue disk (floppy or CD, depending on your hardware); mount the 
filesystem with the password problem at some convenient mount point; and 
delete the root password entry from /etc/shadow . Then reboot normally, log 
in as root (with no password) and set a new root password. Do all of this 
with the system disconnected from the Internet, of course, until you have a 
new root password in place.

Any other suggestion of how to become root without knowing the root 
password is a technique for breaking into systems, and I (and I hope 
everyone else) will not give advice on that publicly, in this forum or 
anywhere else.



-
To unsubscribe from this list: send the line "unsubscribe linux-newbie" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.linux-learn.org/faqs

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: root password
  2005-03-30 14:36 ` Ray Olszewski
@ 2005-04-01 16:23   ` Tobias Hirning
  2005-04-01 16:52     ` Eric Bambach
  2005-04-01 16:55   ` Eric Bambach
  1 sibling, 1 reply; 14+ messages in thread
From: Tobias Hirning @ 2005-04-01 16:23 UTC (permalink / raw)
  To: linux-newbie

[-- Attachment #1: Type: text/plain, Size: 637 bytes --]

Hi Ray!
> [...]
> Any other suggestion of how to become root without knowing the root
> password is a technique for breaking into systems, and I (and I
> hope everyone else) will not give advice on that publicly, in this
> forum or anywhere else.
Why shouldn't we know how the bad can break into our systems?
I think it's always better to know exactly how they do it.
Tobias

-- 
GPG-Fingerprint: C39E 5381 7721 8613 B5C9  CFAF 54FC B8DB D02D 7085
Registered Linux-User #367044
Registered Linux-Machine #262062
9x6=42
Diese E-Mail wurde mit einer fortgeschrittenen elektronischen
Signatur nach §2 2. d) SigG signiert.


[-- Attachment #2: Type: application/pgp-signature, Size: 189 bytes --]

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: root password
  2005-04-01 16:23   ` Tobias Hirning
@ 2005-04-01 16:52     ` Eric Bambach
  2005-04-01 18:03       ` Tobias Hirning
  0 siblings, 1 reply; 14+ messages in thread
From: Eric Bambach @ 2005-04-01 16:52 UTC (permalink / raw)
  To: Tobias Hirning; +Cc: linux-newbie

On Friday 01 April 2005 10:23 am, Tobias Hirning wrote:
> Hi Ray!
>
> > [...]
> > Any other suggestion of how to become root without knowing the root
> > password is a technique for breaking into systems, and I (and I
> > hope everyone else) will not give advice on that publicly, in this
> > forum or anywhere else.
>
> Why shouldn't we know how the bad can break into our systems?
> I think it's always better to know exactly how they do it.
> Tobias

Kernel parameter line init=/bin/(ba)sh (most effective IMO)
Boot cd/disk/ etc.
Physically removing the hard drive
Get the shadow file and crack
Overwrite the shadow file with an exploit
Sniff the password from telnet/unsecure services

...And many more, these just came off the top of my head.

-- 
----------------------------------------
--EB

> All is fine except that I can reliably "oops" it simply by trying to read
> from /proc/apm (e.g. cat /proc/apm).
> oops output and ksymoops-2.3.4 output is attached.
> Is there anything else I can contribute?

The latitude and longtitude of the bios writers current position, and
a ballistic missile.

                --Alan Cox LKML-December 08,2000 

----------------------------------------
-
To unsubscribe from this list: send the line "unsubscribe linux-newbie" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.linux-learn.org/faqs

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: root password
  2005-03-30 14:36 ` Ray Olszewski
  2005-04-01 16:23   ` Tobias Hirning
@ 2005-04-01 16:55   ` Eric Bambach
  2005-04-01 18:23     ` Ray Olszewski
  1 sibling, 1 reply; 14+ messages in thread
From: Eric Bambach @ 2005-04-01 16:55 UTC (permalink / raw)
  To: Ray Olszewski; +Cc: linux-newbie

On Wednesday 30 March 2005 08:36 am, Ray Olszewski wrote:
> Any other suggestion of how to become root without knowing the root
> password is a technique for breaking into systems, and I (and I hope
> everyone else) will not give advice on that publicly, in this forum or
> anywhere else.

I respectfully disagree. How will sysadmins ever know how to secure their 
systems unless they know HOW break-ins occur. Certainly most hacking doesnt 
come from boot CDs but having a more informed sysadmin is infinitely better 
than one that only discovers how to make their system more secure *AFTER* 
being broken into.

What you are saying is that security through obscurity is good and there have 
been countless rebuttals on just how horrible security though obscurity is in 
99% of the situations. The only reason for S.T.O. is a company that found an 
exploit and is giving lead-time to the vendor to patch their vulnerable 
software.

-- 
----------------------------------------
--EB

> All is fine except that I can reliably "oops" it simply by trying to read
> from /proc/apm (e.g. cat /proc/apm).
> oops output and ksymoops-2.3.4 output is attached.
> Is there anything else I can contribute?

The latitude and longtitude of the bios writers current position, and
a ballistic missile.

                --Alan Cox LKML-December 08,2000 

----------------------------------------
-
To unsubscribe from this list: send the line "unsubscribe linux-newbie" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.linux-learn.org/faqs

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: root password
  2005-04-01 16:52     ` Eric Bambach
@ 2005-04-01 18:03       ` Tobias Hirning
  2005-04-02 18:53         ` Ray Olszewski
  0 siblings, 1 reply; 14+ messages in thread
From: Tobias Hirning @ 2005-04-01 18:03 UTC (permalink / raw)
  To: eric; +Cc: linux-newbie

[-- Attachment #1: Type: text/plain, Size: 602 bytes --]

Hi Ray!
On Friday, 1. April 2005 18:52 Ray wrote:
>> [...]
> [..]
> Get the shadow file and crack
Yeah, I've done this on a big system and about 90% of the users used 
weak passwords.
> [...]
> Sniff the password from telnet/unsecure services
Who is still using telnet? I wouldn't use telnet on a secure net 
either.
Tobias

-- 
GPG-Fingerprint: C39E 5381 7721 8613 B5C9  CFAF 54FC B8DB D02D 7085
Registered Linux-User #367044
Registered Linux-Machine #262062
http://counter.li.org
Diese E-Mail wurde mit einer fortgeschrittenen elektronischen
Signatur nach §2 2. d) SigG signiert.

[-- Attachment #2: Type: application/pgp-signature, Size: 189 bytes --]

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: root password
  2005-04-01 16:55   ` Eric Bambach
@ 2005-04-01 18:23     ` Ray Olszewski
  2005-04-01 23:57       ` J.
  2005-04-02  0:56       ` Peter
  0 siblings, 2 replies; 14+ messages in thread
From: Ray Olszewski @ 2005-04-01 18:23 UTC (permalink / raw)
  To: linux-newbie

At 10:55 AM 4/1/2005 -0600, Eric Bambach wrote:
>On Wednesday 30 March 2005 08:36 am, Ray Olszewski wrote:
> > Any other suggestion of how to become root without knowing the root
> > password is a technique for breaking into systems, and I (and I hope
> > everyone else) will not give advice on that publicly, in this forum or
> > anywhere else.
>
>I respectfully disagree. How will sysadmins ever know how to secure their
>systems unless they know HOW break-ins occur. Certainly most hacking doesnt
>come from boot CDs but having a more informed sysadmin is infinitely better
>than one that only discovers how to make their system more secure *AFTER*
>being broken into.
>
>What you are saying is that security through obscurity is good and there have
>been countless rebuttals on just how horrible security though obscurity is in
>99% of the situations. The only reason for S.T.O. is a company that found an
>exploit and is giving lead-time to the vendor to patch their vulnerable
>software.

I wasn't quite saying that, and I apologize if my abbreviated presentation 
led you down that path. My reluctance was specific to this context, in 
which someone was asking not how to secure a system, but how to become root 
without knowing the root password. That it was his own system he wanted to 
break into certainly is relevant, but, on a public list, it is not the only 
consideration.

I do believe that sysadmins need to know how to secure thair systems. There 
are plenty of sites on the Internet, and books and articles in print, that 
offer this sort of help. And one can learn how to secure systems without 
receiving detailed tutorials in how to exploit common holes (buffer 
overflows, overprivileged daemons, weak passwords, and so on).

But I also believe that giving step-by-step instructions for how to break 
into systems, on a list intended for beginners, is not the best way to make 
this information public. That sort of help is a bit more than fighting 
"security through obscurity" by identifying vulnerabilities, in my opinion 
... it amounts to tutoring crackers, something I personally do not care to 
do. Particularly in the context of the actual question, which involved a 
system that the poster (presumably) had physical access to, so could retake 
control of with a rescue disk.

If you (and Tobias, and anyone else) feel differently, then you should act 
on your beliefs and provide this sort of information on request, I suppose. 
So I do apologize for the suggestion that my personal view here should 
restrict what you and others do. Please feel free to provide any 
information of this sort that you have, and be sure I will not criticize 
you for doing so.


-
To unsubscribe from this list: send the line "unsubscribe linux-newbie" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.linux-learn.org/faqs

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: root password
  2005-04-01 18:23     ` Ray Olszewski
@ 2005-04-01 23:57       ` J.
  2005-04-02  0:56       ` Peter
  1 sibling, 0 replies; 14+ messages in thread
From: J. @ 2005-04-01 23:57 UTC (permalink / raw)
  To: linux-newbie

On Fri, 1 Apr 2005, Ray Olszewski wrote:

> At 10:55 AM 4/1/2005 -0600, Eric Bambach wrote:
> >On Wednesday 30 March 2005 08:36 am, Ray Olszewski wrote:
> > > Any other suggestion of how to become root without knowing the root
> > > password is a technique for breaking into systems, and I (and I hope
> > > everyone else) will not give advice on that publicly, in this forum or
> > > anywhere else.
> >
> >I respectfully disagree. How will sysadmins ever know how to secure their
> >systems unless they know HOW break-ins occur. Certainly most hacking doesnt
> >come from boot CDs but having a more informed sysadmin is infinitely better
> >than one that only discovers how to make their system more secure *AFTER*
> >being broken into.
> >
> >What you are saying is that security through obscurity is good and there have
> >been countless rebuttals on just how horrible security though obscurity is in
> >99% of the situations. The only reason for S.T.O. is a company that found an
> >exploit and is giving lead-time to the vendor to patch their vulnerable
> >software.
> 
> I wasn't quite saying that, and I apologize if my abbreviated presentation 
> led you down that path. My reluctance was specific to this context, in 
> which someone was asking not how to secure a system, but how to become root 
> without knowing the root password. That it was his own system he wanted to 
> break into certainly is relevant, but, on a public list, it is not the only 
> consideration.
> 
> I do believe that sysadmins need to know how to secure thair systems. There 
> are plenty of sites on the Internet, and books and articles in print, that 
> offer this sort of help. And one can learn how to secure systems without 
> receiving detailed tutorials in how to exploit common holes (buffer 
> overflows, overprivileged daemons, weak passwords, and so on).
> 
> But I also believe that giving step-by-step instructions for how to break 
> into systems, on a list intended for beginners, is not the best way to make 
> this information public. That sort of help is a bit more than fighting 
> "security through obscurity" by identifying vulnerabilities, in my opinion 
> ... it amounts to tutoring crackers, something I personally do not care to 
> do. Particularly in the context of the actual question, which involved a 
> system that the poster (presumably) had physical access to, so could retake 
> control of with a rescue disk.
> 
> If you (and Tobias, and anyone else) feel differently, then you should act 
> on your beliefs and provide this sort of information on request, I suppose. 
> So I do apologize for the suggestion that my personal view here should 
> restrict what you and others do. Please feel free to provide any 
> information of this sort that you have, and be sure I will not criticize 
> you for doing so.

If anyone can break into `A', `Your', `Someone's' OS, by following only a
few steps with ease - The World should know. 

Since it is only then that Users are able to define quality.

J.

-
To unsubscribe from this list: send the line "unsubscribe linux-newbie" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.linux-learn.org/faqs

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: root password
  2005-04-01 18:23     ` Ray Olszewski
  2005-04-01 23:57       ` J.
@ 2005-04-02  0:56       ` Peter
  1 sibling, 0 replies; 14+ messages in thread
From: Peter @ 2005-04-02  0:56 UTC (permalink / raw)
  To: Ray Olszewski; +Cc: linux-newbie

On Fri, 2005-04-01 at 10:23 -0800, Ray Olszewski wrote:

(snipped)
> 
> If you (and Tobias, and anyone else) feel differently, then you should
> act 
> on your beliefs and provide this sort of information on request, I
> suppose. 
> So I do apologize for the suggestion that my personal view here
> should 
> restrict what you and others do. Please feel free to provide any 
> information of this sort that you have, and be sure I will not
> criticize 
> you for doing so.

Ray,

I just want to say that over the two years I have been subscribed to
this list, I have learnt a great deal from you, both about Linux, and
about integrity and attention to detail. Your contributions have always
been considered, thorough, to the point and helpful.

We have all, I think, learnt much about how to trouble-shoot our
problems, just from reading the way you go about it.

I personally feel that your response in this case is a model of respect
and openness, and thoroughly in keeping with what I think are the best
traditions of free and open-source software. 

Most of us, I hope, can see both sides of this issue.

Thank you for your continuing contribution to the list. I don't often
see acknowledgements of this kind on lists, but I think this one is
deserved.

Sincerely, 

Peter Garrett

-
To unsubscribe from this list: send the line "unsubscribe linux-newbie" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.linux-learn.org/faqs

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: root password
  2005-04-01 18:03       ` Tobias Hirning
@ 2005-04-02 18:53         ` Ray Olszewski
  2005-04-02 19:11           ` Tobias Hirning
  0 siblings, 1 reply; 14+ messages in thread
From: Ray Olszewski @ 2005-04-02 18:53 UTC (permalink / raw)
  To: linux-newbie

At 08:03 PM 4/1/2005 +0200, Tobias Hirning wrote:
>Hi Ray!
>On Friday, 1. April 2005 18:52 Ray wrote:
> >> [...]
> > [..]
> > Get the shadow file and crack
>Yeah, I've done this on a big system and about 90% of the users used
>weak passwords.
> > [...]
> > Sniff the password from telnet/unsecure services
>Who is still using telnet? I wouldn't use telnet on a secure net
>either.
>Tobias

I don't, from these fragments, recognize what message you are replying to, 
Tobias. But your quoting makes it appear that the two suggestions you 
respond to are mine, and I just wanted to make it clear that they are not. 
Neither would have been responsive to the message that started this thread 
... a user who forgot his own root password looking for a workaround.

In a modern setting, neither of these suggestions is very useful ... only 
amazingly insecure systems would be vulnerable to either approach.

"Get the shadow file" is not a trivial step in the instructions (How to 
travel in time: 1. Purchase or construct a flux capacitor; 2. Install it in 
a DeLorean); normally it requires root access.  So anyone who can get this 
file has already figured out how to get root access, at least in a limited 
way. I am a bit surprised at your 90% claim; when I've done this (in my 
onetime role as a sysadmin), I found maybe 3-5% of users had weak passwords 
(by the standards of the cracking software of the time).

And while telnet continues to have very limited, specialized uses (for some 
embedded systems, it is the only service available), you are right that no 
host that pretends to be even minimally secure should be running a telnet 
daemon.


-
To unsubscribe from this list: send the line "unsubscribe linux-newbie" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.linux-learn.org/faqs

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: root password
  2005-04-02 18:53         ` Ray Olszewski
@ 2005-04-02 19:11           ` Tobias Hirning
  0 siblings, 0 replies; 14+ messages in thread
From: Tobias Hirning @ 2005-04-02 19:11 UTC (permalink / raw)
  To: linux-newbie

[-- Attachment #1: Type: text/plain, Size: 1531 bytes --]

Am Samstag, 2. April 2005 20:53 schrieben Sie:
> At 08:03 PM 4/1/2005 +0200, Tobias Hirning wrote:
>> [...]
>
> I don't, from these fragments, recognize what message you are
> replying to, Tobias.
Sorry about that, yes I was replying to your mail.

> But your quoting makes it appear that the two 
> suggestions you respond to are mine, and I just wanted to make it
> clear that they are not. Neither would have been responsive to the
> message that started this thread ... a user who forgot his own root
> password looking for a workaround.
I don't want to start such a big thread.
> [...]
> "Get the shadow file" is not a trivial step in the instructions
> (How to travel in time: 1. Purchase or construct a flux capacitor;
> 2. Install it in a DeLorean); normally it requires root access.  So
> anyone who can get this file has already figured out how to get
> root access, at least in a limited way. I am a bit surprised at
> your 90% claim; when I've done this (in my onetime role as a
> sysadmin), I found maybe 3-5% of users had weak passwords (by the
> standards of the cracking software of the time).
Yes, I don't told, that it was the shadow file of a school, with only 
8 character passwords and DES-encryption.
> [...]
Tobias

-- 
GPG-Fingerprint: C39E 5381 7721 8613 B5C9  CFAF 54FC B8DB D02D 7085
Registered Linux-User #367044
Registered Linux-Machine #262062
http://counter.li.org
Diese E-Mail wurde mit einer fortgeschrittenen elektronischen
Signatur nach §2 2. d) SigG signiert.

[-- Attachment #2: Type: application/pgp-signature, Size: 189 bytes --]

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re[2]: root password *reset root password with grub*
       [not found] ` <16974.37459.930871.583279@gargle.gargle.HOWL>
@ 2005-04-03  3:04   ` Kev
  2005-04-03  3:53     ` joy merwin monteiro
  0 siblings, 1 reply; 14+ messages in thread
From: Kev @ 2005-04-03  3:04 UTC (permalink / raw)
  To: Glynn Clements; +Cc: linux-newbie


> 
> Ankit Jain wrote:
> 
> > i have forgotten my root pasword. i had installed
> > redhat linux 9.0 kernel version 2.4 with grub loader.
> > if somebody can tell me how to change the password
> > without logging.
> 

first you have to boot the computer in single user mode, with single
user mode you dont need to root password.

To get into single user mode from GRUB, highlight the linux operating system you want to boot.
After the line is highlighted, press 'e'. 'e' will get you into the GRUB
editor. Next, highlight the line that begins with "kernel" and press 'e'
again. 'e' the second time will allow you to edit the "kernel" line. Add
the word "single" to the end of the line, "single" will tell the kernel
to boot into single user mode. After adding the word "single", press
"Enter" and then 'b' to boot the operating system.

one you got in to the single user mode, type passwd and change the root
password.

To leave single user mode, there are a number of possibilities, 
you can always execute a "shutdown" or "reboot" command, or you can
simply type "exit". When you type "exit", you will leave single user
mode and the operating system will continue to boot normally.


Kev.........
-
To unsubscribe from this list: send the line "unsubscribe linux-newbie" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.linux-learn.org/faqs

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Re[2]: root password *reset root password with grub*
  2005-04-03  3:04   ` Re[2]: root password *reset root password with grub* Kev
@ 2005-04-03  3:53     ` joy merwin monteiro
  2005-04-04  3:39       ` Glynn Clements
  0 siblings, 1 reply; 14+ messages in thread
From: joy merwin monteiro @ 2005-04-03  3:53 UTC (permalink / raw)
  To: Kev; +Cc: Glynn Clements, linux-newbie

Hi,

My Debian System asks for a password even in single mode...
Your solutino would probably work on RH and variants....
Which is OK in this case, but in case somesone needs to know...

Joy

On Apr 3, 2005 8:34 AM, Kev <savage-garden@hanikamail.com> wrote:
> 
> >
> > Ankit Jain wrote:
> >
> > > i have forgotten my root pasword. i had installed
> > > redhat linux 9.0 kernel version 2.4 with grub loader.
> > > if somebody can tell me how to change the password
> > > without logging.
> >
> 
> first you have to boot the computer in single user mode, with single
> user mode you dont need to root password.
> 
> To get into single user mode from GRUB, highlight the linux operating system you want to boot.
> After the line is highlighted, press 'e'. 'e' will get you into the GRUB
> editor. Next, highlight the line that begins with "kernel" and press 'e'
> again. 'e' the second time will allow you to edit the "kernel" line. Add
> the word "single" to the end of the line, "single" will tell the kernel
> to boot into single user mode. After adding the word "single", press
> "Enter" and then 'b' to boot the operating system.
> 
> one you got in to the single user mode, type passwd and change the root
> password.
> 
> To leave single user mode, there are a number of possibilities,
> you can always execute a "shutdown" or "reboot" command, or you can
> simply type "exit". When you type "exit", you will leave single user
> mode and the operating system will continue to boot normally.
> 
> 
> Kev.........
> -
> To unsubscribe from this list: send the line "unsubscribe linux-newbie" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
> Please read the FAQ at http://www.linux-learn.org/faqs
> 


-- 
people always turn away,
from the eyes of a stranger...
Afraid to know
what lies behind the stare.......
    --QueensRyche
-
To unsubscribe from this list: send the line "unsubscribe linux-newbie" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.linux-learn.org/faqs

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: Re[2]: root password *reset root password with grub*
  2005-04-03  3:53     ` joy merwin monteiro
@ 2005-04-04  3:39       ` Glynn Clements
  0 siblings, 0 replies; 14+ messages in thread
From: Glynn Clements @ 2005-04-04  3:39 UTC (permalink / raw)
  To: joy_mm; +Cc: Kev, linux-newbie


joy merwin monteiro wrote:

> My Debian System asks for a password even in single mode...
> Your solutino would probably work on RH and variants....
> Which is OK in this case, but in case somesone needs to know...

That's why I suggested using "init=/bin/sh". That will never ask for a
password.

-- 
Glynn Clements <glynn@gclements.plus.com>
-
To unsubscribe from this list: send the line "unsubscribe linux-newbie" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.linux-learn.org/faqs

^ permalink raw reply	[flat|nested] 14+ messages in thread

end of thread, other threads:[~2005-04-04  3:39 UTC | newest]

Thread overview: 14+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2005-03-30  7:16 root password Ankit Jain
2005-03-30 14:36 ` Ray Olszewski
2005-04-01 16:23   ` Tobias Hirning
2005-04-01 16:52     ` Eric Bambach
2005-04-01 18:03       ` Tobias Hirning
2005-04-02 18:53         ` Ray Olszewski
2005-04-02 19:11           ` Tobias Hirning
2005-04-01 16:55   ` Eric Bambach
2005-04-01 18:23     ` Ray Olszewski
2005-04-01 23:57       ` J.
2005-04-02  0:56       ` Peter
     [not found] ` <16974.37459.930871.583279@gargle.gargle.HOWL>
2005-04-03  3:04   ` Re[2]: root password *reset root password with grub* Kev
2005-04-03  3:53     ` joy merwin monteiro
2005-04-04  3:39       ` Glynn Clements

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox