funny customers

Per Engelbrecht per at xterm.dk
Wed Sep 22 02:40:43 PDT 2004


Hi Alex

>
>> I'm administering a mid-size serverhosting site and have a problem
>> with customers enabling root passwd in single-user mode.
>> It's the same customers that set up fake payment sites, do serious
>> hacking  (i.e. not good, productive hacking) mailspamming and so
>> on.
>
>> In order to collect information for a criminal case (yes, in some
>> cases we go all the way) I need a way to get into these boxes
>> (mostly
>> FreeBSD's) but I can't think of a way to disable the prompt for
>> root passwd in single-user mode.
> to disable root password checking on single user mode entrance
> in /etc/ttys:
> change line:
>> console none                            unknown off insecure
> to
>> console none                            unknown off secure

I know how to enable it, that's not the problem.
The problem is the opposit - how do I disable it after I bruce-force the
customer off the net and want access to the box ?

At first I thought of setting 'chflags' on the /etc/ttys file, but
customers can change securelevel as they please = won't help.

But right now I need a way to bypass (I don't think it's possible) the
single_user mode root login feature.

respectfully
/per
per at xterm.dk




>
>
> if using serial line for access in single user mode, try to change
> line
>>ttyd0   "/usr/libexec/getty std.9600"   dialup  on insecure
> to
>>ttyd0   "/usr/libexec/getty std.9600"   dialup  on secure
>
>
>
> --
> Best regards,
> Alex D. Griazin
> Apollo Phone network engineer
> e-mail:  alex at apollophone.ru
> ICQ UIN: 22898964
> Phone:   +7 (812) 140-5-999





More information about the freebsd-isp mailing list