- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Superuser
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-18-2002 09:06 AM
04-18-2002 09:06 AM
Superuser
On one of our HPOV UNIX boxes, it seems as if everyone lost their superuser priviledge. Does anyone know who to get this back? Thanks!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-18-2002 09:09 AM
04-18-2002 09:09 AM
Re: Superuser
su ? if so, has root passwd changed ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-18-2002 09:11 AM
04-18-2002 09:11 AM
Re: Superuser
you can do following.
1. Identify which users needs superuser access.
2. replace the UID of the person in /etc/passwd file by 0. (0 is the super user ID)
3. REplace group ID with 3
You are all set now.
-pap
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-18-2002 09:11 AM
04-18-2002 09:11 AM
Re: Superuser
control in /etc/passwd you must have 3 in foruth columns
if you can't write passwd because you don't have the privilege, you must boot in single user
regards
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-18-2002 09:14 AM
04-18-2002 09:14 AM
Re: Superuser
Pap - I like your answer and will find someone who has a clue about UNIX to give it a try. Thanks!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-18-2002 09:29 AM
04-18-2002 09:29 AM
Re: Superuser
I am glad that you like my answer.
Thanks again.
-pap
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-18-2002 09:30 AM
04-18-2002 09:30 AM
Re: Superuser
Regards,
Ike
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-18-2002 09:33 AM
04-18-2002 09:33 AM
Re: Superuser
We are aware SU account can do serious damage, but at this time we can't even stop netmon. We have a stale host file that we need to fix.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-18-2002 09:36 AM
04-18-2002 09:36 AM
Re: Superuser
A final thought, the reason they may have "lost" superuser access is simply because they have it. When "regular" users have that level access & are not familiar with UNIX, bad things can happen.
Users w/little UNIX knowledge can completely erase filesystems & even ALL files on the server itself.
I would strongly suggest you find out just exactly how users were obtaining root level permissions - I suspect they were using the su - root command to become root after logging in with their own ID.
This is the preferred way to do it & users should only be allowed to do so if it's absolutely necessary.
If you set everyone's ID to 0 then they will ALWAYS be root & will be able to do bad things the ENTIRE time they are logged on.
More likely cause is the possibility that a user, while root, changed the root PW & this can be easily reset. Or another possibilty is that the passwd file has been corrupted or even erased.
These causes should be investigated before you set users' ID to 0.
And more fundamentally the reason WHY users NEED to be root in the first place should be evaluated - there are loads of alternatives than letting everyone have keys to the store.
My 2 cents,
Jeff
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-18-2002 09:40 AM
04-18-2002 09:40 AM
Re: Superuser
Those are all good points. If people keep responding to my issue, I might run out of points.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-18-2002 10:01 AM
04-18-2002 10:01 AM
Re: Superuser
Ok now lets attack the problem.
I'm assuming the root PW is not being accepted
Check the date on the /etc/passwd file - is it very recent? This indicates that the passwd file has been changed recently & possibly when the root PW was changed.
If so inquire if any user AT THIS TIME is logged in AND the root user.
You can determine if they're root with the whoami command
If so run the passwd command on this session & set a PW - this will be the new root PW - alternative is to set it BACK to the known PW.
If the /etc/passwd file date is old, old enough that you know people had access, then display it with
more /etc/passwd
The file is a 7 field, colon delimited, file. The 2nd field is the encrypted PW field. Are there multiple chars in the 2nd field for the root user? If there's none then root currently has NO password & root can be accessed simply by entering w/o input on the PW request.
Is there an asterisk in the field. Then login has been disabled for the root user & the system will have to be taken down & brought up in single-user to set a PW for root.
If there are mult chars in the field, then root does have a PW & if it can't be determined then you'll have to do the same as if login denied.
Also check to see if the file is corrupted. i.e. "mangled", incomplete lines, strange chars, etc. There is a command, pwck, that will check the passwd file integrity - but I believe you have to be root to run it.
If the file IS corrupt OR missing AND you have a recent backup you could restore the /etc/passwd file from it to recover acccess.
HTH,
Jeff