LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > SUSE / openSUSE
User Name
Password
SUSE / openSUSE This Forum is for the discussion of Suse Linux.

Notices


Reply
  Search this Thread
Old 06-16-2006, 09:40 AM   #16
broch
Member
 
Registered: Feb 2005
Distribution: Slackware-current 64bit
Posts: 465

Rep: Reputation: 32

Quote:
Funny also
to be able to run init , you need to be root (you've put a # in front), so whats the point of going into root again?
And then, on a lot of distro like debian and i bet a lot others, you fortunatly need root password to enter single user mode.
So it doesn't work...
Yes funny, suggesting that you are using software not really understanding how it works:

When you see GRUB menu with choices (SUSE, Failsafe, Floppy) add (this is possible - under choice name you will see sign and line:
|____________
you can write there...
init 1

then because this is singe mode, you will be not asked for root password (I hope that you can grasp meaning of this)
simply mount /etc and blank root password
well this is known so no reason to explain one more time
 
Old 06-16-2006, 10:22 AM   #17
nx5000
Senior Member
 
Registered: Sep 2005
Location: Out
Posts: 3,307

Rep: Reputation: 57
Now you're talking of grub, not the same!
And still on my grub on my machines which have a default install... it is not possible, you need to provide the password..
must be specific to suse..
 
Old 06-16-2006, 11:01 AM   #18
broch
Member
 
Registered: Feb 2005
Distribution: Slackware-current 64bit
Posts: 465

Rep: Reputation: 32
yup, you are right, the one (suse) distributed by Novell.
If you can't do this, call Novell, they will explain it with pictures how to append init 1 to first grub menu before you boot kernel.
At this point you don't need password.

Quote:
Now you're talking of grub, not the same!
And still on my grub on my machines which have a default install... it is not possible, you need to provide the password..
of course I am talking about grub (this is not dirty trick). This option allow to boot installed kernel in specific mode. This (init 1) is precisely designed for such mishaps.
can't help you, read more about password recovery


this is a reference because you seem to be lost:
http://www-uxsup.csx.cam.ac.uk/pub/d...rub.basic.html

Pay attention to this section:
Quote:
In GRUB, all boot parameters can be changed prior to booting. For example, errors made when editing the menu file can be corrected in this way. Boot commands can also be entered interactively over a kind of input prompt (see Section 8.3.1.3, “Editing Menu Entries during the Boot Procedure”). GRUB offers the possibility of determining the location of the kernel and the initrd prior to booting. In this way, you can even boot an installed operating system for which no entry exists in the boot loader configuration.
and also this:
http://www-uxsup.csx.cam.ac.uk/pub/d...ub.menu.change

Quote:
In the graphical GRUB boot menu, select the operating system to boot with the arrow keys. If you select a Linux system, you can enter additional boot parameters at the boot prompt. To edit individual menu entries directly, press Esc to exit the splash screen and press E. Changes made in this way only apply to the current boot procedure and are not adopted permanently.
this is exactly what I was suggesting. This way you can appent init 1
and boot kernel in single mode (without password)


So you do have strange distribution (this can be done with any distro. See reasons above), if you are unable to do this.
I am o.k. (not sure about you)

Last edited by broch; 06-16-2006 at 11:03 AM.
 
Old 06-16-2006, 11:18 AM   #19
nx5000
Senior Member
 
Registered: Sep 2005
Location: Out
Posts: 3,307

Rep: Reputation: 57
You seem to have strong deficency of memory (yours, not your machine), so I recall what you were saying, and what I had quoted.

Code:
run
#init 1
and you will be logged as root (single mode) and without even asking about password! Jeezz
This is stupid and you were not mentionning grub.
In any case, with my strange linux distro (called debian have a look), both of your methods fail completly. So I guess this old insecurity is still present in your amazing distribution (Novell? humm.. no comment)

I don't want to waste my time talking with you anymore, just wanted to clear things, go back to your leet mac hacking, have fun.

ps:
It's not because you were not precise/wrong that you need to be arrogant.

/me ROTFL
 
Old 06-16-2006, 11:29 AM   #20
broch
Member
 
Registered: Feb 2005
Distribution: Slackware-current 64bit
Posts: 465

Rep: Reputation: 32
I am loosing patience:
my first notion about init 1 was to answer this:
Quote:
#Originally Posted by abisko00
I would rather not give instructions how to crack a system. How do we know that gamesfan9000 is talking about his own machine?
then I said this:
Quote:
Ever heard about runlevels?

run
#init 1
and you will be logged as root (single mode) and without even asking about password! Jeezz
do you understand the context?
where did I mentioned multiuser level?
I said
"run init 1"
and this is corect statement: you actually run init 1 if appended to GRUB. So my statement is correct. That is all.

By the way can you append variables to GRUB as Novell states or you do have something seriously messed up?

Last edited by broch; 06-16-2006 at 12:19 PM.
 
Old 07-23-2006, 08:24 PM   #21
Vincent_Vega
Member
 
Registered: Nov 2003
Location: South Jersey
Distribution: Slackware, Raspbian, Manjaro
Posts: 826

Rep: Reputation: 31
All of this security stuff...I think the paranoid people, and it's not terrible to be paranoid, should disable booting from their CDROM by way of a BIOS password, and restrict their kernels. That should pretty much stop anyone from accessing a system they don't own, right??
That's my
 
Old 07-23-2006, 08:45 PM   #22
spooon
Senior Member
 
Registered: Aug 2005
Posts: 1,755

Rep: Reputation: 51
Quote:
Originally Posted by Vincent_Vega
All of this security stuff...I think the paranoid people, and it's not terrible to be paranoid, should disable booting from their CDROM by way of a BIOS password, and restrict their kernels. That should pretty much stop anyone from accessing a system they don't own, right??
That's my
* set a bootloader password
* set the boot order so that hard drive boots first (before CD, floppy, USB, network, etc.)
* set a BIOS password
* and physically lock the case with a decent lock so they don't clear the CMOS or remove the drive
 
Old 07-24-2006, 07:09 PM   #23
Vincent_Vega
Member
 
Registered: Nov 2003
Location: South Jersey
Distribution: Slackware, Raspbian, Manjaro
Posts: 826

Rep: Reputation: 31
Yes, pretty much exactly what I said but thank you for being more precise for those who might not have understood me. I didn't go so far as the case lock though. If someone is going to disassemble my computer in my house, I may have bigger problems to deal with!!!
 
Old 07-25-2006, 12:11 AM   #24
broch
Member
 
Registered: Feb 2005
Distribution: Slackware-current 64bit
Posts: 465

Rep: Reputation: 32
Quote:
should disable booting from their CDROM by way of a BIOS password, and restrict their kernels. That should pretty much stop anyone from accessing a system they don't own, right??

remove battery for a minute and BIOS password is reset and all settings restored to factory defaults.

So one can secure box only by preventing physical access.


However: first question was about resetting root password, not about security.

Last edited by broch; 07-25-2006 at 12:12 AM.
 
Old 07-25-2006, 10:32 PM   #25
Vincent_Vega
Member
 
Registered: Nov 2003
Location: South Jersey
Distribution: Slackware, Raspbian, Manjaro
Posts: 826

Rep: Reputation: 31
Again, in the case of pulling the battery, you have to open the tower. If you're dealing with that type of situation - as opposed to someone just dropping in a bootable CD or using boot options - then you need to find a new place to put your computer!
Yes, this was about resetting a password but it sidetracked a bit...maybe someone learned something they didn't plan on learning.
 
Old 07-25-2006, 10:42 PM   #26
broch
Member
 
Registered: Feb 2005
Distribution: Slackware-current 64bit
Posts: 465

Rep: Reputation: 32
Quote:
Again, in the case of pulling the battery, you have to open the tower. If you're dealing with that type of situation - as opposed to someone just dropping in a bootable CD or using boot options - then you need to find a new place to put your computer!
either someone has access to your box, then BIOS options are worthless, or not, then BIOS options are waste of time.

Protecting against access to CDROM suggests that there is access to the box, in this case BIOS password will not protect against anything.

Booting from CD and accesing system requires time. If someone has that much time, then opening box is not a big deal.
 
Old 01-28-2010, 07:53 AM   #27
tommurdock
LQ Newbie
 
Registered: Oct 2006
Posts: 2

Rep: Reputation: 0
Quote:
Originally Posted by RBEmerson View Post
broch, a big +1!!!

abisko00: never forget a cardinal rule about the Internet: "On the Internet, nobody can tell if you're a dog". Maybe gamesfan9000 is a most evil cracker, maybe he's just a newbie who hasn't learned the Linux way yet, and maybe he is a dog. If we all assumed the first assumption, there'd be no point to having this site; any piece of advice might support some dark and evil scheme. Let it go, abisko00, let it go...
This is an excellent response to any frantic suspicion Internet viewer. Yes, we have to do our best to avid the Hackers trap, but not on expense on Internet at large which become a part of our daily life.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
How to recover lost Root password in Suse Enterprise 9.0 manya Linux - Security 3 02-05-2006 06:56 AM
ow to create script change a user's password? passwd expects input from keyboard.. Arodef Linux - General 1 03-02-2005 10:40 PM
URGENT: Need to verify user's password in Linux proghrammatically vigosh_j Programming 5 01-26-2005 06:56 AM
Lol I forgot a user's password urzumph Linux - Security 4 03-04-2004 05:00 AM
changing a regular user's password using root Pete Dogg Linux - General 2 11-28-2003 10:49 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > SUSE / openSUSE

All times are GMT -5. The time now is 04:31 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration