Check root password changes done via single user mode
freebsd at qeng-ho.org
Tue Mar 3 12:55:12 UTC 2015
On 03/03/2015 09:20, Ricardo Martín wrote:
> Indeed, that would be a way of checking the password change, but I was
> more interested in whether such a change could be flagged as being
> carried out from single user mode.
> Or in another words whether the root's passwords has been reset
> accessing the machine during the boot process.
> On 03/03/15 09:50, Daniel Peyrolon wrote:
>> What I would do is storing a copy of root's password hash somewhere, and
>> compare it with the recent one.
>> The hash can be read at master.passwd (check passwd(5)).
>> El mar., 3 de marzo de 2015 a las 9:02, Ricardo Martín (<
>> fluxwatcher at gmail.com>) escribió:
>>> hi all,
>>> wondering which would be the best approach to script check if the root
>>> password has been changed via single user mode.
What threat model are you considering? If you're worried about someone
without normal root access but with access to the console rebooting into
single user mode and changing the password, mark the console as insecure
in /etc/ttys, and then the root password will be needed to log in even
As Bruce Schneier says, there's no such thing as perfect security, it
all depends on what costs (in money, time, or effort) attacker and
defender are prepared to pay.
Those who do not learn from computing history are doomed to
More information about the freebsd-questions