how to recover root passwd if bootloader password in not set
Linux - GeneralThis Linux forum is for general Linux questions and discussion.
If it is Linux Related and doesn't seem to fit in any other forum then this is the place.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
As near as I can tell, that won't work on a current installation of Debian Etch, and I wouldn't want it to ... If someone can verify that I am wrong, I'd appreciate it.
The OP noted that FC5 is in use, and it certainly will work on that release. Any system that uses lilo or grub as a boot loader will allow this operation (I assume Etch uses one or the other).
This is not a security issue; physical access to a machine implies absolute control.
I have not been able to do it. I only added to this thread because I have not gotten any further responses on the one linked here. I am simply looking for verification one way or the other.
I see from the other thread that Debian requires a password even in single user mode. That sounds like security, but it's not. Since you have physical access, boot Knoppix or any live Linux CD/DVD), open a terminal, and change the (liveCD) root password. Edit /etc/shadow (the liveCD one) and copy the hash to the /etc/shadow on the system root for the real system. You've just changed the password, the old fashioned way.
Last edited by macemoneta; 03-09-2007 at 09:51 AM.
I acknowledged on the other thread that it could be done with a live CD ... As I view it, that requires considerably more sophistication than the method described above. Given time, certainly, root can be compromised, but not in 30 seconds or less by a relatively unknowledgable user..
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.