On 22 Mar 2024 20:01 -0400, from ler...@gmail.com (Lee):
> The IPv4 address space is only 32 bits long. Scanning 2^32 = about
> 4,000,000,000 addresses for an open port is easily doable.
> The IPv6 address space is a bit harder... Let's just say that 7/8th
> of the IPv6 address space is reserved[
On 22 Mar 2024 17:26 +0500, from avbe...@gmail.com (Alexander V. Makartsev):
> This is because of how IPv4 network address translation (NAT) works, to
> allow multiple LAN hosts to connect to Internet with single IP address
> assigned by Internet Service Provider (ISP).
A NAT router might also
On Fri, Mar 22, 2024 at 9:02 AM Jan Krapivin wrote:
>
> The thing that bothers me are words: "any computer (and a fortiori any
> server) connected to the Internet is regularly targeted by automated
> connection attempts"
Change it to "any computer (and a fortiori any server) >>using IPv4
and di
On 22.03.2024 14:57, Jan Krapivin wrote:
чт, 21 мар. 2024 г. в 22:34, Alexander V. Makartsev :
This conclusion seems less than optimal to me.
By condemning yourself to type 12+ character password every time
you 'sudo' would really hurt accessibility and usability of your
home c
On Fri, 22 Mar 2024 12:57:20 +0300
Jan Krapivin wrote:
> чт, 21 мар. 2024 г. в 22:34, Alexander V. Makartsev
> :
>
> > This conclusion seems less than optimal to me.
> > By condemning yourself to type 12+ character password every time you
> > 'sudo' would really hurt accessibility and usability
чт, 21 мар. 2024 г. в 22:34, Alexander V. Makartsev :
> This conclusion seems less than optimal to me.
> By condemning yourself to type 12+ character password every time you
> 'sudo' would really hurt accessibility and usability of your home computer
> and for no good reason.
>
> If we focus solel
On 20.03.2024 20:28, Jan Krapivin wrote:
I must mention that "32 characters" is only my guess.
In the Handbook it is said: "The root user's password should be long
(12 characters or more) and impossible to guess."
Also, i must again say that in my case we speak just about a humble
home deskt
>
> You don't need a threat model to understand why writing a password on a
> paper is generally a bad practice.
>
> But since you invest this much energy on defending a bad practice, I'll
> let you keep the trend alone.
>
I have written down key passwords which I keep in my wallet. To get my
wall
On Wed, Mar 20, 2024 at 3:50 PM Pierre-Elliott Bécue wrote:
>
> De : Lee
> À : Pierre-Elliott Bécue
> Cc : Debian Users ML
> Date : 20 mars 2024 20:40:52
> Objet : Re: Root password strength
>
> > On Wed, Mar 20, 2024 at 1:47 PM Pierre-Elliott Bécue wrote:
> >
On Wed, Mar 20, 2024 at 2:34 PM Pierre-Elliott Bécue wrote:
>
> Jeffrey Walton wrote on 20/03/2024 at 19:16:16+0100:
>
> [...]
> >> Noone asks someone to remember more than two or three passwords. The
> >> rest belongs to a password manager.
> >
> > Huh? This is discussed in detail in Peter Gutm
De : Lee
À : Pierre-Elliott Bécue
Cc : Debian Users ML
Date : 20 mars 2024 20:40:52
Objet : Re: Root password strength
> On Wed, Mar 20, 2024 at 1:47 PM Pierre-Elliott Bécue wrote:
>>
>> Brad Rogers wrote on 20/03/2024 at 18:39:30+0100:
>>> On Wed, 20 Mar 2024 1
On Wed, Mar 20, 2024 at 1:47 PM Pierre-Elliott Bécue wrote:
>
> Brad Rogers wrote on 20/03/2024 at 18:39:30+0100:
> > On Wed, 20 Mar 2024 17:09:31 +0100
> > Pierre-Elliott Bécue wrote:
> >
> > Hello Pierre-Elliott,
> >
> >>Most of the time, writing down a password is a very bad idea.
> >
> > Not
John Hasler wrote on 20/03/2024 at 19:35:42+0100:
> Pierre-Elliott Bécue writes:
>> My home sees plenty different people coming in. Some I trust, some I
>> trust less. Also videocalls is a nice way to get a paper password
>> recorded (and yes it happens).
>
> I keep my passwords in a small book t
tomas writes:
> Actually, I use between pwgen -n 8 (user pw) and pwgen -n 16 (LUKS
> encryption).
-n is the default for pwgen. Note that this slightly reduces the size
of the search space. Unfortunately many sites require it.
> I memorize the most important of them.
I memorize the ones I use m
Brad Rogers wrote on 20/03/2024 at 19:03:48+0100:
> [[PGP Signed Part:No public key for 0F3EE001F02A3E20 created at
> 2024-03-20T19:03:48+0100 using RSA]]
> On Wed, 20 Mar 2024 18:46:04 +0100
> Pierre-Elliott Bécue wrote:
>
> Hello Pierre-Elliott,
>
>>You have a rather bad cybersecurity approac
Pierre-Elliott Bécue writes:
> My home sees plenty different people coming in. Some I trust, some I
> trust less. Also videocalls is a nice way to get a paper password
> recorded (and yes it happens).
I keep my passwords in a small book the size of a passport and I secure
it the same way I secure
Jeffrey Walton wrote on 20/03/2024 at 19:16:16+0100:
> On Wed, Mar 20, 2024 at 1:45 PM Pierre-Elliott Bécue wrote:
>>
>>
>> Jeffrey Walton wrote on 20/03/2024 at 18:30:34+0100:
>>
>> > On Wed, Mar 20, 2024 at 12:51 PM Pierre-Elliott Bécue
>> > wrote:
>> >>
>> >> Jeffrey Walton wrote on 20/03
On Wed, 20 Mar 2024 18:46:04 +0100
Pierre-Elliott Bécue wrote:
Hello Pierre-Elliott,
>You have a rather bad cybersecurity approach.
I use password generators and vaults for all my passwords. Nothing
wrong with my cyber-security.
Also note that I put 'written down' in single quotes - it was me
Michael Kjörling <2695bd53d...@ewoof.net> wrote on 20/03/2024 at 19:04:10+0100:
> On 20 Mar 2024 18:46 +0100, from p...@debian.org (Pierre-Elliott Bécue):
Most of the time, writing down a password is a very bad idea.
>>>
>>> Not in your own home. And in any event, it depends where one keeps
On Wed, Mar 20, 2024 at 1:45 PM Pierre-Elliott Bécue wrote:
>
>
> Jeffrey Walton wrote on 20/03/2024 at 18:30:34+0100:
>
> > On Wed, Mar 20, 2024 at 12:51 PM Pierre-Elliott Bécue
> > wrote:
> >>
> >> Jeffrey Walton wrote on 20/03/2024 at 17:19:46+0100:
> >>
> >> > On Wed, Mar 20, 2024 at 12:09
On 20 Mar 2024 17:07 +0100, from p...@debian.org (Pierre-Elliott Bécue):
> Let's stop to overcomplexify, the best course of action for passwords
> you need to remember are passphrases, and to this matter, Randall nailed
> the matter properly.
If you're referring to https://xkcd.com/936/ I believe
On 20 Mar 2024 18:46 +0100, from p...@debian.org (Pierre-Elliott Bécue):
>>> Most of the time, writing down a password is a very bad idea.
>>
>> Not in your own home. And in any event, it depends where one keeps that
>> 'written down' password.
>>
>> And if it *does* become an issue at home, you
On Wed, Mar 20, 2024 at 11:02:41AM -0500, John Hasler wrote:
> Use one of the password generating programs such as pwgen to produce a
> 12 character random password. Write it down.
Actually, I use between pwgen -n 8 (user pw) and pwgen -n 16 (LUKS encryption).
I memorize the most important of the
Brad Rogers wrote on 20/03/2024 at 18:39:30+0100:
> On Wed, 20 Mar 2024 17:09:31 +0100
> Pierre-Elliott Bécue wrote:
>
> Hello Pierre-Elliott,
>
>>Most of the time, writing down a password is a very bad idea.
>
> Not in your own home. And in any event, it depends where one keeps that
> 'written
Jeffrey Walton wrote on 20/03/2024 at 18:30:34+0100:
> On Wed, Mar 20, 2024 at 12:51 PM Pierre-Elliott Bécue wrote:
>>
>> Jeffrey Walton wrote on 20/03/2024 at 17:19:46+0100:
>>
>> > On Wed, Mar 20, 2024 at 12:09 PM Pierre-Elliott Bécue
>> > wrote:
>> >>
>> >> John Hasler wrote on 20/03/202
On Wed, 20 Mar 2024 17:09:31 +0100
Pierre-Elliott Bécue wrote:
Hello Pierre-Elliott,
>Most of the time, writing down a password is a very bad idea.
Not in your own home. And in any event, it depends where one keeps that
'written down' password.
And if it *does* become an issue at home, you've
On Wed, Mar 20, 2024 at 12:51 PM Pierre-Elliott Bécue wrote:
>
> Jeffrey Walton wrote on 20/03/2024 at 17:19:46+0100:
>
> > On Wed, Mar 20, 2024 at 12:09 PM Pierre-Elliott Bécue
> > wrote:
> >>
> >> John Hasler wrote on 20/03/2024 at 16:58:01+0100:
> >>
> >> > Pierre-Elliott Bécue writes:
> >>
John Hasler wrote on 20/03/2024 at 17:21:20+0100:
> Pierre-Elliott Bécue writes:
>> Writing down a password is a bad idea.
>
> Why?
Because anyone falling on the paper with the password can do a lot of
harm. Because you can't control what this paper will become with
certainty, while it's easier
Jeffrey Walton wrote on 20/03/2024 at 17:19:46+0100:
> On Wed, Mar 20, 2024 at 12:09 PM Pierre-Elliott Bécue wrote:
>>
>> John Hasler wrote on 20/03/2024 at 16:58:01+0100:
>>
>> > Pierre-Elliott Bécue writes:
>> >> A phrase you will easily remember but that would be hardcore to guess
>> >> thro
On 20/03/2024 23:19, Jeffrey Walton wrote:
The network attacker cannot (yet) reach through a
monitor and read a sticky note.
It may be visible during a video call performed from a smartphone.
Pierre-Elliott Bécue writes:
> Writing down a password is a bad idea.
Why?
--
John Hasler
j...@sugarbit.com
Elmwood, WI USA
On Wed, Mar 20, 2024 at 12:09 PM Pierre-Elliott Bécue wrote:
>
> John Hasler wrote on 20/03/2024 at 16:58:01+0100:
>
> > Pierre-Elliott Bécue writes:
> >> A phrase you will easily remember but that would be hardcore to guess
> >> through social engineering is perfect.
> >
> > Better is a random s
John Hasler wrote on 20/03/2024 at 17:02:41+0100:
> Use one of the password generating programs such as pwgen to produce a
> 12 character random password. Write it down.
Most of the time, writing down a password is a very bad idea.
--
PEB
signature.asc
Description: PGP signature
John Hasler wrote on 20/03/2024 at 16:58:01+0100:
> Pierre-Elliott Bécue writes:
>> A phrase you will easily remember but that would be hardcore to guess
>> through social engineering is perfect.
>
> Better is a random string that you write down. When people try to
> generate phrases that meet t
Use one of the password generating programs such as pwgen to produce a
12 character random password. Write it down.
--
John Hasler
j...@sugarbit.com
Elmwood, WI USA
On 20 Mar 2024 10:58 -0500, from j...@sugarbit.com (John Hasler):
>> A phrase you will easily remember but that would be hardcore to guess
>> through social engineering is perfect.
>
> Better is a random string that you write down. When people try to
> generate phrases that meet those requirement
Pierre-Elliott Bécue writes:
> A phrase you will easily remember but that would be hardcore to guess
> through social engineering is perfect.
Better is a random string that you write down. When people try to
generate phrases that meet those requirements they usually fail.
--
John Hasler
j...@su
Michael Kjörling <2695bd53d...@ewoof.net> wrote on 20/03/2024 at 16:16:41+0100:
> On 20 Mar 2024 15:45 +0100, from p...@debian.org (Pierre-Elliott Bécue):
>>> it should be like 32 symbols with special symbols? Or this paragraph
>>> in a handbook is rather paranoid?
>>
>> It's not paranoid.
>
> F
I must mention that "32 characters" is only my guess.
In the Handbook it is said: "The root user's password should be long (12
characters or more) and impossible to guess."
Also, i must again say that in my case we speak just about a humble home
desktop, without a ""ssh" access"" or whatever comp
On 20 Mar 2024 15:45 +0100, from p...@debian.org (Pierre-Elliott Bécue):
>> it should be like 32 symbols with special symbols? Or this paragraph
>> in a handbook is rather paranoid?
>
> It's not paranoid.
For 82 symbols (mixed-case alphanumeric plus 20 special characters),
32 characters is equiv
Jan Krapivin wrote on 19/03/2024 at 15:42:55+0100:
> I read Debian Administrator's handbook now. And there are such words:
>
> The root user's password should be long (12 characters or more) and
> impossible to guess. Indeed, any computer (and a fortiori any server)
> connected to the Intern
On Wed, Mar 20, 2024 at 09:23:58AM -0400, Jeffrey Walton wrote:
[...]
> > Also, are you saying that you do not let users rotate their keys
> > themselves; and if so, why on Earth not?
>
> Key continuity has turned out to be a better security property than
> key rotation. It is wise to avoid grat
On Wed, Mar 20, 2024 at 7:03 AM Michael Kjörling <2695bd53d...@ewoof.net> wrote:
>
> On 20 Mar 2024 15:46 +0800, from jeremy.ard...@gmail.com (jeremy ardley):
> > Regarding certificates, I issue VPN certificates to be installed on each
> > remote device. I don't use public key.
>
> What exactly is
jeremy ardley wrote:
>
> On 20/3/24 19:03, Michael Kjörling wrote:
> > On 20 Mar 2024 15:46 +0800, fromjeremy.ard...@gmail.com (jeremy ardley):
> > > [users are locked out from uploading their public key using ssh-copy-id]
> > So the private keys aren't private, thereby invalidating a lot of
> >
On 20 Mar 2024 12:17 +0100, from to...@tuxteam.de:
>>> For ssh use I issue secret keys to each user and maintain matching public
>>> keys in LDAP servers [...]
>
>> So the private keys aren't private, thereby invalidating a lot of
>> assumptions inherent in public key cryptography.
>
> We are usi
On 20 Mar 2024 19:21 +0800, from jeremy.ard...@gmail.com (jeremy ardley):
>>> Regarding certificates, I issue VPN certificates to be installed on each
>>> remote device. I don't use public key.
>>
>> What exactly is this "certificate" that you speak of? In typical
>> usage, it means a public key p
On 20/3/24 19:03, Michael Kjörling wrote:
On 20 Mar 2024 15:46 +0800, fromjeremy.ard...@gmail.com (jeremy ardley):
Regarding certificates, I issue VPN certificates to be installed on each
remote device. I don't use public key.
What exactly is this "certificate" that you speak of? In typical
On Wed, Mar 20, 2024 at 11:03:16AM +, Michael Kjörling wrote:
> On 20 Mar 2024 15:46 +0800, from jeremy.ard...@gmail.com (jeremy ardley):
> > Regarding certificates, I issue VPN certificates to be installed on each
> > remote device. I don't use public key.
>
> What exactly is this "certificat
On 20 Mar 2024 15:46 +0800, from jeremy.ard...@gmail.com (jeremy ardley):
> Regarding certificates, I issue VPN certificates to be installed on each
> remote device. I don't use public key.
What exactly is this "certificate" that you speak of? In typical
usage, it means a public key plus some surr
On 20/3/24 13:32, to...@tuxteam.de wrote:
How will a "VPN" with a "certificate" (whatever that means in this > context) be more secure than a SSH (assuming key pair
authentication, > not password)? > > They are doing the same dance (key
exchange, key pair validation, > session key establishme
On Wed, Mar 20, 2024 at 02:01:44AM -0400, Jeffrey Walton wrote:
> On Wed, Mar 20, 2024 at 1:32 AM wrote:
> >
> > On Wed, Mar 20, 2024 at 04:22:29AM +0800, jeremy ardley wrote:
> >
> > > A 'safer' implementation will not even expose an ssh port. Instead there
> > > will be a certificate based VPN w
On Wed, Mar 20, 2024 at 1:32 AM wrote:
>
> On Wed, Mar 20, 2024 at 04:22:29AM +0800, jeremy ardley wrote:
>
> > A 'safer' implementation will not even expose an ssh port. Instead there
> > will be a certificate based VPN where you first need a certificate to
> > connect and then you need a separat
On Wed, Mar 20, 2024 at 04:22:29AM +0800, jeremy ardley wrote:
> A 'safer' implementation will not even expose an ssh port. Instead there
> will be a certificate based VPN where you first need a certificate to
> connect and then you need a separate certificate to log in as root. A
> further enhanc
Michael Kjörling <2695bd53d...@ewoof.net> wrote:
> For most values of "you", most attackers don't care about _your_
> account, or _your_ system; they care about _any_ account, or _any_
> system. Actually targeted attacks do happen, but very rarely compared
> to what might be thought of as attacker
On 19/3/24 23:02, Greg Wooledge wrote:
On Tue, Mar 19, 2024 at 05:42:55PM +0300, Jan Krapivin wrote:
The root user's password should be long (12 characters or more) and
impossible to guess. Indeed, any computer (and a fortiori any server)
connected to the Internet is regularly targeted by auto
On Tue, Mar 19, 2024 at 03:49:06PM +, debian-u...@howorth.org.uk wrote:
> Dan Ritter wrote:
> > Check whether you are running ssh:
> >
> > /sbin/service ssh status
>
> It's not called ssh; it is sshd
> Also nowadays it's more usual to say
>
> $ systemctl status sshd
On Debian, the systemd
On 19 Mar 2024 17:42 +0300, from daydreamer199...@gmail.com (Jan Krapivin):
> The thing is my password is very easy now, and i haven't thought about
> *"automated
> connection attempts"*, that sounds rather... scary? My password is easy
> because i am not afraid of direct physical access to the com
Dan Ritter wrote:
> Jan Krapivin wrote:
> > I read Debian Administrator's handbook now. And there are such
> > words:
> >
> > The root user's password should be long (12 characters or more) and
> > impossible to guess.
> ...
>
>
> > The thing is my password is very easy now, and i haven't
Greg Wooledge writes:
> On Tue, Mar 19, 2024 at 05:42:55PM +0300, Jan Krapivin wrote:
>> The root user's password should be long (12 characters or more) and
>> impossible to guess. Indeed, any computer (and a fortiori any server)
>> connected to the Internet is regularly targeted by automated con
Am Tue, 19 Mar 2024 17:42:55 +0300
schrieb Jan Krapivin :
> The thing is my password is very easy now
The simplest thin is to change that now.
, and i haven't thought about *"automated connection attempts"*,
> that sounds rather... scary?
Those attempts happen if a server software (like SSH, Te
Jan Krapivin wrote:
> I read Debian Administrator's handbook now. And there are such words:
>
> The root user's password should be long (12 characters or more) and
> impossible to guess.
...
> The thing is my password is very easy now, and i haven't thought about
> *"automated
> connection at
On Tue, Mar 19, 2024 at 05:42:55PM +0300, Jan Krapivin wrote:
> The root user's password should be long (12 characters or more) and
> impossible to guess. Indeed, any computer (and a fortiori any server)
> connected to the Internet is regularly targeted by automated connection
> attempts with the m
> The threats are different for:
>
> - a laptop that travels and can be stolen
> - a desktop that does not leave your residence
> - a server that accepts connections from the outside world
>
>
> Check whether you are running ssh:
>
It is a simple home desktop PC
*@deb:~$ /sbin/service ssh status*
> Do you have some kind of remote access enabled or do you intend to in
> the near future?
>
No and no. Its just a simple home PC.
>
> If not, then you do not need to worry. Even less if you have a firewall
> to block any service that might appear by mistake.
>
I have UFW (gufw) enabled.
Thank
Jan Krapivin (12024-03-19):
> The thing is my password is very easy now, and i haven't thought about
> *"automated
> connection attempts"*, that sounds rather... scary? My password is easy
> because i am not afraid of direct physical access to the computer.
Hi.
Do you have some kind of remote acc
Timothy M Butterworth writes:
> On Tue, May 30, 2023 at 2:03 AM hlyg wrote:
>
>
> On 5/30/23 12:37, to...@tuxteam.de wrote:
> >
> > This seems to have been discussed like eight years ago:
> >
> > https://lists.debian.org/debian-live/2015/05/msg00081.html
> >
>
On Tue, 2023-05-30 at 00:05 -0400, Timothy M Butterworth wrote:
>
>
> On Tue, May 30, 2023 at 12:02 AM hlyg wrote:
> > Thank bw! internet search also shows that live is password, but
> > it's not
> > correct
> >
>
>
> Live is the password you use with sudo as there is no root password
> set.
On Tue, May 30, 2023 at 2:03 AM hlyg wrote:
>
> On 5/30/23 12:37, to...@tuxteam.de wrote:
> >
> > This seems to have been discussed like eight years ago:
> >
> >https://lists.debian.org/debian-live/2015/05/msg00081.html
> >
> > Perhaps it should go into a FAQ.
> >
> > Cheers
>
>
> Thank tomas
On 5/30/23 12:37, to...@tuxteam.de wrote:
This seems to have been discussed like eight years ago:
https://lists.debian.org/debian-live/2015/05/msg00081.html
Perhaps it should go into a FAQ.
Cheers
Thank tomas!
many packages break because of empty password? some other distro have no
On Tue, May 30, 2023 at 07:52:21AM +0800, hlyg wrote:
> debian-live-11.0.0-i386-lxde.iso
>
> do you know root password of cd above?
the "standard" Debian live user is "user" with password "live"
>
> why do they create root password of live cd?
This seems to have been discussed like eight years
On Tue, May 30, 2023 at 12:02 AM hlyg wrote:
> Thank bw! internet search also shows that live is password, but it's not
> correct
>
Live is the password you use with sudo as there is no root password set.
i have rebooted,
>
> > probably something like this
> > https://en.wikipedia.org/wiki/Prin
Thank bw! internet search also shows that live is password, but it's not
correct
i have rebooted,
probably something like this
https://en.wikipedia.org/wiki/Principle_of_least_privilege
.
i think they disclaim all responsibilities, they can use empty password,
as some other distro do
On 04/12/2013 05:20 AM, Guido Martínez wrote:
> You can, by booting from some other media and changing the /etc/shadow
> file. Or running a chroot, but I would suggest you take a look at your
> keymap configuration.
> If your password has non alphanumeric characters then it's likely that
> what you
95% of the time, replies go to the list only, you need to be subscribed.
(Silly, I know -- since it's an open list!)
It is also list policy that you don't CC posters unless requested.
I assume new posters expect a personal reply.
On Thu, Apr 11, 2013 at 06:14:48AM -0400, Robert B McKittrick wrote:
On Fri, 2013-04-12 at 00:20 -0300, Guido Martínez wrote:
> You can, by booting from some other media and changing the /etc/shadow
> file. Or running a chroot, but I would suggest you take a look at your
> keymap configuration.
> If your password has non alphanumeric characters then it's likely that
You can, by booting from some other media and changing the /etc/shadow
file. Or running a chroot, but I would suggest you take a look at your
keymap configuration.
If your password has non alphanumeric characters then it's likely that
what you inputted during the install is not what you really mean
Robert B McKittrick wrote:
> my system 6.0.7 does not recognize the root password I gave it when
> installing. is there any way to reset root without reinstalling?
Use the installer disk in "rescue mode".
Here is the official documentation for it:
http://www.debian.org/releases/stable/i386/ch0
On 27/03/13 12:44 PM, Robert B McKittrick wrote:
my system 6.0.7 does not recognize the root password I gave it when
installing. is there any way to reset root without reinstalling?
bob
Boot from a rescue CD (such as your install CD, or system rescue CD).
mkdir /mnt (if it doesn't exist)
mount
On 11 Apr 2013, Darac Marjal wrote:
> On Wed, Mar 27, 2013 at 12:44:27PM -0400, Robert B McKittrick wrote:
> > my system 6.0.7 does not recognize the root password I gave it when
> > installing. is there any way to reset root without reinstalling?
> > bob
>
> Yes. First of all, how are you attempt
The Wednesday 27 March 2013 17:44:27, Robert B McKittrick wrote :
> my system 6.0.7 does not recognize the root password I gave it when
> installing. is there any way to reset root without reinstalling?
> bob
What about a on the net, something like lost root password debian?
It would have give yo
On Wed, Mar 27, 2013 at 12:44:27PM -0400, Robert B McKittrick wrote:
> my system 6.0.7 does not recognize the root password I gave it when
> installing. is there any way to reset root without reinstalling?
> bob
Yes. First of all, how are you attempting to use the root password? SSH
is usually con
On Fri, Jun 22, 2012 at 12:31 AM, Mark Allums wrote:
> On 6/21/2012 9:58 AM, Richard Owlett wrote:
>> Brian wrote:
>>> On Thu 21 Jun 2012 at 13:55:49 +0100, Darac Marjal wrote:
On Thu, Jun 21, 2012 at 07:37:52AM -0500, Richard Owlett wrote:
> The new install will not accept root passwor
Ahoj,
Dňa Thu, 21 Jun 2012 23:31:31 -0500 Mark Allums napísal:
> If you gave root a password during install, then you should
if you was used national keyboard (i don't know how it is in english) for
root password, you can go to problems, because installer do not follow the
keyboard choice dur
On 6/21/2012 9:58 AM, Richard Owlett wrote:
Brian wrote:
On Thu 21 Jun 2012 at 13:55:49 +0100, Darac Marjal wrote:
On Thu, Jun 21, 2012 at 07:37:52AM -0500, Richard Owlett wrote:
But ;)
The new install will not accept root password. User password is
fine.
That may be intended. I don't thin
Kamaraju Kusumanchi wrote:
Scarletdown wrote:
I have tried everything I could think of at the moment, short of doing
the dreaded OS reinstall (apt-get --reinstall install x-window-system
kde and apt-get --reinstall install kde did not fix it either.) I
would really prefer to not have to reinsta
This might be the best advice but mine still works in KDE so there may be
somthing amiss. I had this happen when I was mucking around with PAM files
attempting to get LDAP to work. (OK, NO logins worked!) Go in using the
Knoppix CD and fixed that--what else was changed to cause the problem?)
On
Scarletdown wrote:
Earlier today, I had a complete system freezeup for some reason. All
I could do to recover was power down and boot back up. However, when
kdm tried to run, I was dropped to a text login prompt.
I went ahead and logged in as root and did an apt-get --reinstall
install kdm;
On Sunday 11 April 2004 09:18 pm, Scarletdown wrote:
>Earlier today, I had a complete system freezeup for some reason. All I
>could do to recover was power down and boot back up. However, when kdm
>tried to run, I was dropped to a text login prompt.
>
>I went ahead and logged in as root and did a
Paul Johnson wrote:
> Scarletdown <[EMAIL PROTECTED]> writes:
>
>
>>I know the password is good, because I am able to login as root from a
>>text-prompt, and can also SSH in as root from another system; so I am
>>suspecting a problem with KDE itself. As another test, I tried
logging in to
>>KDE a
Paul Johnson wrote:
Scarletdown <[EMAIL PROTECTED]> writes:
I know the password is good, because I am able to login as root from a
text-prompt, and can also SSH in as root from another system; so I am
suspecting a problem with KDE itself. As another test, I tried logging in to
KDE as root from k
Scarletdown <[EMAIL PROTECTED]> writes:
> I know the password is good, because I am able to login as root from a
> text-prompt, and can also SSH in as root from another system; so I am
> suspecting a problem with KDE itself. As another test, I tried logging in to
> KDE as root from kdm, and that
I use a really helpful utility called "chtpw". It's actually a mini
mandrake kernel on a floppy or cd. It was originally built as a utility to
reset windows admin passwords (which is also the original reason I
downloaded it).
However, you can use it also to boot into single user mode. It has a
On (03/02/04 21:45), Wolfgang Pfeiffer wrote:
> On Tue, 2004-02-03 at 14:19, Quartenoud Francois wrote:
> > Hi, I have change the root password on a Debian 3.0. I make a mistake
> > during
> > the typing, I cannot retrieve the password.
> > I try to reboot with typing "linux single" on Lilo, but
Hi,
On Tue, 2004-02-03 at 14:19, Quartenoud Francois wrote:
> Hi, I have change the root password on a Debian 3.0. I make a mistake
> during
> the typing, I cannot retrieve the password.
> I try to reboot with typing "linux single" on Lilo, but the system
> ask the
> root password.
> I try to
On Tue, Feb 03, 2004 at 03:00:05PM +0100, Andreas Janssen wrote:
> Hello
>
> Quartenoud Francois (<[EMAIL PROTECTED]>) wrote:
>
> > Hi, I have change the root password on a Debian 3.0. I make a mistake
> > during the typing, I cannot retrieve the password. I try to reboot
> > with typing "linux
Hello
Quartenoud Francois (<[EMAIL PROTECTED]>) wrote:
> Hi, I have change the root password on a Debian 3.0. I make a mistake
> during the typing, I cannot retrieve the password. I try to reboot
> with typing "linux single" on Lilo, but the system ask the root
> password. I try to type "linux
Quartenoud Francois wrote:
Hi, I have change the root password on a Debian 3.0. I make a mistake
during
the typing, I cannot retrieve the password.
I try to reboot with typing "linux single" on Lilo, but the system
ask the
root password.
I try to type "linux init=/bin/sh" on lilo without su
Quartenoud Francois wrote:
Hi, I have change the root password on a Debian 3.0. I make a mistake
during
the typing, I cannot retrieve the password.
I try to reboot with typing "linux single" on Lilo, but the system ask the
root password.
I try to type "linux init=/bin/sh" on lilo without suc
Yildiz, Murat wrote:
Hi,
if I want to login remotely I have to enter the root password 2 times.It
asks the password again after the first time.
Why does it accept the same password at the second time?
Hi,
im sure it's a pam issue. I assume you use ssh for remote login, so
could you please po
On Mon, 28 Jan 2002 16:00:28 -0800
"Karsten M. Self" wrote:
> on Fri, Jan 25, 2002 at 07:01 PM -0500, Brian J. Zuk ([EMAIL PROTECTED])
> wrote:
> > I'd recommend Tom's Root Boot disk(http://www.toms.net/rb/). The boot
> > disk maker will run in Linux or Windows(shuts down windows and runs
> > L
1 - 100 of 148 matches
Mail list logo