Re: [CentOS] Lost root access
Hi James, On Wed, 2011-02-02 at 14:44 +, James Bensley wrote: > So on a virtual server the root password was no longer working (as in > I couldn't ssh in anymore). Any chance PermitRootLogin is set to "no" in /etc/ssh/sshd_config? Regards, Leonard. -- mount -t life -o ro /dev/dna /genetic/research ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Lost root access
On Thu, Feb 3, 2011 at 3:14 PM, Rafa Grimán wrote: > On Thursday 03 February 2011 20:42 Robert Heller wrote >> At Thu, 3 Feb 2011 20:12:17 +0100 CentOS mailing list > wrote: >> > Hi :) >> > >> > On Thursday 03 February 2011 14:59 Giles Coochey wrote >> > >> > > On 03/02/2011 14:40, Rafa Griman wrote: >> > > > Hi :) >> > > > >> > > > On Wed, Feb 2, 2011 at 3:44 PM, James Bensley > wrote: >> > > >> So on a virtual server the root password was no longer working (as >> > > >> in I couldn't ssh in anymore). Only I and one other know it and >> > > >> neither of us have changed it. No other account had the correct >> > > >> privileges to correct this so I'm wondering, if I had mounted that >> > > >> vdi as a secondary device on another VM, browsed the file system >> > > >> and delete /etc/shadow would this have wiped all users passwords >> > > >> meaning I could regain access again? >> > > >> >> > > >> (This is past tense because its sorted now but I'm curious if this >> > > >> would have worked? And if not, what could I have done?). >> > > > >> > > > As the other said: DON'T delete /etc/shadow. >> > > > >> > > > Someone also mentioned you could modify the hash in /etc/shadow. This >> > > > will work if you are root or have the right permissions with sudo. >> > > > >> > > > If you can reboot the system, what really works great is passing the >> > > > following option to the kernel on the lilo/grub screen when the >> > > > system >> > > > >> > > > boots: >> > > > init=/bin/bash >> > > > >> > > > This will give you a shell without being asked for a password (unless >> > > > the sys admin has done his homework ;) Now that you have shell access >> > > > >> > > > ... you are in charge so you can: >> > > > - mount the / partition and chroot >> > > > >> > > > - edit /etc/shadow and delete the password hash >> > > > >> > > > - whatever you can imagine ... you decide ;) >> > > >> > > That would do it... There is single-user-mode (runlevel 1), just add >> > > the word single to the kernel parameters line before bootup >> > > >> > > It will give you the same result and mount stuff without the need to >> > > chroot etc... >> > >> > Yes, but S|Single|1 asks for root password to login ... And he doesn't >> > have the root password ;) >> >> RedHat / RHEL / CentOS does not do that! > > > True, just tried it with RHEL 6 and CentOS 5.3. Well it should ask for a > passwd ... at least IMHO. > > Then again ... an admin should configure grub/lilo to ask for a password if > you > pass parameters to the kernel during boot time :) > > >> At least never on any of my >> machines -- is there some config option for that? Yes, for manual fchk >> it does, but not otherwise. > > > I'll check, but no idea. In CentOS 5, use "~~:S:wait:/sbin/sulogin" in "/etc/inittab" to enter runlevel S with a password. In CentOS 6, use "SINGLE=/sbin/sushell" in "/etc/sysconfig/init" to enter runlevel S without a password (default) and "SINGLE=/sbin/sulogin" in "/etc/sysconfig/init" to enter runlevel S with a password. ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Lost root access
On Thu, 2011-02-03 at 14:42 -0500, Robert Heller wrote: > At Thu, 3 Feb 2011 20:12:17 +0100 CentOS mailing list > wrote: > > > > Yes, but S|Single|1 asks for root password to login ... > > And he doesn't have the root password ;) > RedHat / RHEL / CentOS does not do that! At least never on any of my > machines -- Agreed. Adding 'single' to the kernel boot line boots up in run level 1 and no password is required. My system is 2.6.18-194.32.1.el5 #1 SMP Wed Jan 5 17:52:25 EST 2011 x86_64 x86_64 x86_64 GNU/Linux -- With best regards, Paul. England, EU. ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Lost root access
Hey !!! On Thursday 03 February 2011 20:42 Robert Heller wrote > At Thu, 3 Feb 2011 20:12:17 +0100 CentOS mailing list wrote: > > Hi :) > > > > On Thursday 03 February 2011 14:59 Giles Coochey wrote > > > > > On 03/02/2011 14:40, Rafa Griman wrote: > > > > Hi :) > > > > > > > > On Wed, Feb 2, 2011 at 3:44 PM, James Bensley wrote: > > > >> So on a virtual server the root password was no longer working (as > > > >> in I couldn't ssh in anymore). Only I and one other know it and > > > >> neither of us have changed it. No other account had the correct > > > >> privileges to correct this so I'm wondering, if I had mounted that > > > >> vdi as a secondary device on another VM, browsed the file system > > > >> and delete /etc/shadow would this have wiped all users passwords > > > >> meaning I could regain access again? > > > >> > > > >> (This is past tense because its sorted now but I'm curious if this > > > >> would have worked? And if not, what could I have done?). > > > > > > > > As the other said: DON'T delete /etc/shadow. > > > > > > > > Someone also mentioned you could modify the hash in /etc/shadow. This > > > > will work if you are root or have the right permissions with sudo. > > > > > > > > If you can reboot the system, what really works great is passing the > > > > following option to the kernel on the lilo/grub screen when the > > > > system > > > > > > > > boots: > > > > init=/bin/bash > > > > > > > > This will give you a shell without being asked for a password (unless > > > > the sys admin has done his homework ;) Now that you have shell access > > > > > > > > ... you are in charge so you can: > > > > - mount the / partition and chroot > > > > > > > > - edit /etc/shadow and delete the password hash > > > > > > > > - whatever you can imagine ... you decide ;) > > > > > > That would do it... There is single-user-mode (runlevel 1), just add > > > the word single to the kernel parameters line before bootup > > > > > > It will give you the same result and mount stuff without the need to > > > chroot etc... > > > > Yes, but S|Single|1 asks for root password to login ... And he doesn't > > have the root password ;) > > RedHat / RHEL / CentOS does not do that! True, just tried it with RHEL 6 and CentOS 5.3. Well it should ask for a passwd ... at least IMHO. Then again ... an admin should configure grub/lilo to ask for a password if you pass parameters to the kernel during boot time :) > At least never on any of my > machines -- is there some config option for that? Yes, for manual fchk > it does, but not otherwise. I'll check, but no idea. Rafa -- "We cannot treat computers as Humans. Computers need love." Happily using KDE 4.5.5 :) ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Lost root access
Rafa Grimán wrote: > On Thursday 03 February 2011 14:59 Giles Coochey wrote >> On 03/02/2011 14:40, Rafa Griman wrote: >> > On Wed, Feb 2, 2011 at 3:44 PM, James Bensley >> wrote: >> >> So on a virtual server the root password was no longer working (as in >> >> I couldn't ssh in anymore). Only I and one other know it and neither >> >> of us have changed it. No other account had the correct privileges to >> >> correct this so I'm wondering, if I had mounted that vdi as a >> >> secondary device on another VM, browsed the file system and delete >> >> /etc/shadow would this have wiped all users passwords meaning I could >> >> regain access again? >> >> >> That would do it... There is single-user-mode (runlevel 1), just add the >> word single to the kernel parameters line before bootup > > Yes, but S|Single|1 asks for root password to login ... And he doesn't > have the root password ;) Boot from a rescue CD/DVD, then chroot and use passwd. mark ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Lost root access
At Thu, 3 Feb 2011 20:12:17 +0100 CentOS mailing list wrote: > > Hi :) > > On Thursday 03 February 2011 14:59 Giles Coochey wrote > > On 03/02/2011 14:40, Rafa Griman wrote: > > > Hi :) > > > > > > On Wed, Feb 2, 2011 at 3:44 PM, James Bensley wrote: > > >> So on a virtual server the root password was no longer working (as in > > >> I couldn't ssh in anymore). Only I and one other know it and neither > > >> of us have changed it. No other account had the correct privileges to > > >> correct this so I'm wondering, if I had mounted that vdi as a > > >> secondary device on another VM, browsed the file system and delete > > >> /etc/shadow would this have wiped all users passwords meaning I could > > >> regain access again? > > >> > > >> (This is past tense because its sorted now but I'm curious if this > > >> would have worked? And if not, what could I have done?). > > > > > > As the other said: DON'T delete /etc/shadow. > > > > > > Someone also mentioned you could modify the hash in /etc/shadow. This > > > will work if you are root or have the right permissions with sudo. > > > > > > If you can reboot the system, what really works great is passing the > > > following option to the kernel on the lilo/grub screen when the system > > > > > > boots: > > > init=/bin/bash > > > > > > This will give you a shell without being asked for a password (unless > > > the sys admin has done his homework ;) Now that you have shell access > > > > > > ... you are in charge so you can: > > > - mount the / partition and chroot > > > > > > - edit /etc/shadow and delete the password hash > > > > > > - whatever you can imagine ... you decide ;) > > > > That would do it... There is single-user-mode (runlevel 1), just add the > > word single to the kernel parameters line before bootup > > > > It will give you the same result and mount stuff without the need to > > chroot etc... > > > Yes, but S|Single|1 asks for root password to login ... And he doesn't have > the root password ;) RedHat / RHEL / CentOS does not do that! At least never on any of my machines -- is there some config option for that? Yes, for manual fchk it does, but not otherwise. > >Rafa > -- Robert Heller -- 978-544-6933 / hel...@deepsoft.com Deepwoods Software-- http://www.deepsoft.com/ () ascii ribbon campaign -- against html e-mail /\ www.asciiribbon.org -- against proprietary attachments ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Lost root access
Hi :) On Thursday 03 February 2011 14:59 Giles Coochey wrote > On 03/02/2011 14:40, Rafa Griman wrote: > > Hi :) > > > > On Wed, Feb 2, 2011 at 3:44 PM, James Bensley wrote: > >> So on a virtual server the root password was no longer working (as in > >> I couldn't ssh in anymore). Only I and one other know it and neither > >> of us have changed it. No other account had the correct privileges to > >> correct this so I'm wondering, if I had mounted that vdi as a > >> secondary device on another VM, browsed the file system and delete > >> /etc/shadow would this have wiped all users passwords meaning I could > >> regain access again? > >> > >> (This is past tense because its sorted now but I'm curious if this > >> would have worked? And if not, what could I have done?). > > > > As the other said: DON'T delete /etc/shadow. > > > > Someone also mentioned you could modify the hash in /etc/shadow. This > > will work if you are root or have the right permissions with sudo. > > > > If you can reboot the system, what really works great is passing the > > following option to the kernel on the lilo/grub screen when the system > > > > boots: > > init=/bin/bash > > > > This will give you a shell without being asked for a password (unless > > the sys admin has done his homework ;) Now that you have shell access > > > > ... you are in charge so you can: > > - mount the / partition and chroot > > > > - edit /etc/shadow and delete the password hash > > > > - whatever you can imagine ... you decide ;) > > That would do it... There is single-user-mode (runlevel 1), just add the > word single to the kernel parameters line before bootup > > It will give you the same result and mount stuff without the need to > chroot etc... Yes, but S|Single|1 asks for root password to login ... And he doesn't have the root password ;) Rafa -- "We cannot treat computers as Humans. Computers need love." Happily using KDE 4.5.5 :) ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Lost root access
On Wed, Feb 2, 2011 at 11:35 AM, wrote: > > Well, if you could get on the system at all, and had sudo privileges, no > problem. Well, the point was actually if you did not have sudo access to change the password, what else could you do. I.e., you had sudo to edit a particular file or do something else, but not run passwd. ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Lost root access
On 03/02/2011 14:40, Rafa Griman wrote: Hi :) On Wed, Feb 2, 2011 at 3:44 PM, James Bensley wrote: So on a virtual server the root password was no longer working (as in I couldn't ssh in anymore). Only I and one other know it and neither of us have changed it. No other account had the correct privileges to correct this so I'm wondering, if I had mounted that vdi as a secondary device on another VM, browsed the file system and delete /etc/shadow would this have wiped all users passwords meaning I could regain access again? (This is past tense because its sorted now but I'm curious if this would have worked? And if not, what could I have done?). As the other said: DON'T delete /etc/shadow. Someone also mentioned you could modify the hash in /etc/shadow. This will work if you are root or have the right permissions with sudo. If you can reboot the system, what really works great is passing the following option to the kernel on the lilo/grub screen when the system boots: init=/bin/bash This will give you a shell without being asked for a password (unless the sys admin has done his homework ;) Now that you have shell access ... you are in charge so you can: - mount the / partition and chroot - edit /etc/shadow and delete the password hash - whatever you can imagine ... you decide ;) That would do it... There is single-user-mode (runlevel 1), just add the word single to the kernel parameters line before bootup It will give you the same result and mount stuff without the need to chroot etc... -- Best Regards, Giles Coochey NetSecSpec Ltd NL T-Systems Mobile: +31 681 265 086 NL Mobile: +31 626 508 131 GIB Mobile: +350 5401 6693 Email/MSN/Live Messenger: gi...@coochey.net Skype: gilescoochey smime.p7s Description: S/MIME Cryptographic Signature ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Lost root access
Hi :) On Wed, Feb 2, 2011 at 3:44 PM, James Bensley wrote: > So on a virtual server the root password was no longer working (as in > I couldn't ssh in anymore). Only I and one other know it and neither > of us have changed it. No other account had the correct privileges to > correct this so I'm wondering, if I had mounted that vdi as a > secondary device on another VM, browsed the file system and delete > /etc/shadow would this have wiped all users passwords meaning I could > regain access again? > > (This is past tense because its sorted now but I'm curious if this > would have worked? And if not, what could I have done?). As the other said: DON'T delete /etc/shadow. Someone also mentioned you could modify the hash in /etc/shadow. This will work if you are root or have the right permissions with sudo. If you can reboot the system, what really works great is passing the following option to the kernel on the lilo/grub screen when the system boots: init=/bin/bash This will give you a shell without being asked for a password (unless the sys admin has done his homework ;) Now that you have shell access ... you are in charge so you can: - mount the / partition and chroot - edit /etc/shadow and delete the password hash - whatever you can imagine ... you decide ;) HTH Rafa ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Lost root access
On 2 Feb 2011 16:36, wrote: > > Well, if you could get on the system at all, and had sudo privileges, no > problem. > > mark No sudo priv's, remote VM so ssh only to a stanard user not in sudoers. --James. (This email was sent from a mobile device) ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Lost root access
On 2 Feb 2011 15:07, "Robert Heller" wrote: > > At Wed, 2 Feb 2011 14:44:01 + CentOS mailing list wrote: > > > > > So on a virtual server the root password was no longer working (as in > > I couldn't ssh in anymore). Only I and one other know it and neither > > of us have changed it. No other account had the correct privileges to > > correct this so I'm wondering, if I had mounted that vdi as a > > secondary device on another VM, browsed the file system and delete > > /etc/shadow would this have wiped all users passwords meaning I could > > regain access again? > > No, it would not have. It would have resulted in NOONE having access. > > What you could have done is chroot to the secondary device on the other > VM and then simply reset the root password with the passwd command. > Of course! Good idea, thanks. --James. (This email was sent from a mobile device) ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Lost root access
On Wed, Feb 2, 2011 at 9:44 AM, James Bensley wrote: > So on a virtual server the root password was no longer working (as in > I couldn't ssh in anymore). Only I and one other know it and neither > of us have changed it. No other account had the correct privileges to > correct this so I'm wondering, if I had mounted that vdi as a > secondary device on another VM, browsed the file system and delete > /etc/shadow would this have wiped all users passwords meaning I could > regain access again? > > (This is past tense because its sorted now but I'm curious if this > would have worked? And if not, what could I have done?). Deleting /etc/shadow is *BAD*. You just blew away everyone's password, and will cause enormous confusion. If you can't restore it, use "pwunconv" to turn off the use of /etc/shadow, and "pwconv" to re-enable it. The passwords will be locked, I believe: then you can mount the idle filesystem, do a "chroot" to the idle filesystem, and run "passwd root" to set a new password. ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Lost root access
Kwan Lowe wrote: > On Wed, Feb 2, 2011 at 9:44 AM, James Bensley wrote: >> So on a virtual server the root password was no longer working (as in >> I couldn't ssh in anymore). Only I and one other know it and neither >> of us have changed it. No other account had the correct privileges to > Anyhoo, coincidentally I was thinking of ways to change a root > password on a 24/7 system. Some of the things I tested was to > overwrite some of the cron scripts that I had access to, create a suid > binary on a trusted and mounted fs (i.e., no root squash, noexec not > enabled), exec a shell from with a sudo command that had shell out > capability, etc.. Well, if you could get on the system at all, and had sudo privileges, no problem. mark ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Lost root access
On Wed, Feb 2, 2011 at 9:44 AM, James Bensley wrote: > So on a virtual server the root password was no longer working (as in > I couldn't ssh in anymore). Only I and one other know it and neither > of us have changed it. No other account had the correct privileges to > correct this so I'm wondering, if I had mounted that vdi as a > secondary device on another VM, browsed the file system and delete > /etc/shadow would this have wiped all users passwords meaning I could > regain access again? :) Nope... would lock everyone out!! You can change the shadow to a known hash and that should work. But going through that exercise, though interesting, would not be the most direct method. Had you changed the default expiration setttings on the system? You can run the "chage" command to see the settings on different users. Also you may want to check the faillog. Is this system Internet accessible? I'd be very leery of trusting that system until you determine what caused it to lock out. Anyhoo, coincidentally I was thinking of ways to change a root password on a 24/7 system. Some of the things I tested was to overwrite some of the cron scripts that I had access to, create a suid binary on a trusted and mounted fs (i.e., no root squash, noexec not enabled), exec a shell from with a sudo command that had shell out capability, etc.. > (This is past tense because its sorted now but I'm curious if this > would have worked? And if not, what could I have done?). > > -- > Regards, > James. > > http://www.jamesbensley.co.cc/ > > There are 10 kinds of people in the world; Those who understand > Vigesimal, and J others...? > ___ > CentOS mailing list > CentOS@centos.org > http://lists.centos.org/mailman/listinfo/centos > ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Lost root access
At Wed, 2 Feb 2011 14:44:01 + CentOS mailing list wrote: > > So on a virtual server the root password was no longer working (as in > I couldn't ssh in anymore). Only I and one other know it and neither > of us have changed it. No other account had the correct privileges to > correct this so I'm wondering, if I had mounted that vdi as a > secondary device on another VM, browsed the file system and delete > /etc/shadow would this have wiped all users passwords meaning I could > regain access again? No, it would not have. It would have resulted in NOONE having access. What you could have done is chroot to the secondary device on the other VM and then simply reset the root password with the passwd command. > > (This is past tense because its sorted now but I'm curious if this > would have worked? And if not, what could I have done?). > -- Robert Heller -- 978-544-6933 / hel...@deepsoft.com Deepwoods Software-- http://www.deepsoft.com/ () ascii ribbon campaign -- against html e-mail /\ www.asciiribbon.org -- against proprietary attachments ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Lost root access
On 02/02/2011 15:44, James Bensley wrote: So on a virtual server the root password was no longer working (as in I couldn't ssh in anymore). Only I and one other know it and neither of us have changed it. No other account had the correct privileges to correct this so I'm wondering, if I had mounted that vdi as a secondary device on another VM, browsed the file system and delete /etc/shadow would this have wiped all users passwords meaning I could regain access again? (This is past tense because its sorted now but I'm curious if this would have worked? And if not, what could I have done?). If you can edit /etc/shadow then you could have changed roots password. Depending on your access (console required) you could have booted to single-user mode and edited /etc/shadow that way. I would not recommend deleting the /etc/shadow file at all... don't think that would gain you access. -- Best Regards, Giles Coochey NetSecSpec Ltd NL T-Systems Mobile: +31 681 265 086 NL Mobile: +31 626 508 131 GIB Mobile: +350 5401 6693 Email/MSN/Live Messenger: gi...@coochey.net Skype: gilescoochey smime.p7s Description: S/MIME Cryptographic Signature ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
[CentOS] Lost root access
So on a virtual server the root password was no longer working (as in I couldn't ssh in anymore). Only I and one other know it and neither of us have changed it. No other account had the correct privileges to correct this so I'm wondering, if I had mounted that vdi as a secondary device on another VM, browsed the file system and delete /etc/shadow would this have wiped all users passwords meaning I could regain access again? (This is past tense because its sorted now but I'm curious if this would have worked? And if not, what could I have done?). -- Regards, James. http://www.jamesbensley.co.cc/ There are 10 kinds of people in the world; Those who understand Vigesimal, and J others...? ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos