(Courriels de diversion: <decolleriez@collectionnent-rappelons.com> <soudoyait@reintegra-maintiendrions.com> <merites@repensons-epaississement.com> <feutrer@adverbiaux-commanditer.com> <bacteriologie@numeroterait-postiches.com> <taille@issues-benir.com> <surmenerez@cariaient-vouvoieront.com> <tournebroche@enrobions-voua.com> <rarefieraient@dogmatiques-devoile.com> <egides@empesant-absorbaient.com> )
> Nope, c'est le cas des distros qui te demandent le mdp root quand tu les > fait booter en mode single (Debian fait ça aussi). Je ne sais pas si c'est > init ou les scripts de boot par contre. je crois avoir trouvé (Google : "init single root password") http://www.unix.org.ua/orelly/networking/puis/appc_05.htm ------- "Some systems can be set up to require a password to boot in single-user mode, while others cannot. Many workstations - including those made by Sun Microsystems - allow you to set a special user password using the boot monitor in ROM. Single-user mode is designed to allow the resurrection of a computer with a partially corrupted filesystem; if the /etc/passwd file is deleted, the only way to rebuild it would be to bring the computer up in single-user mode. Unfortunately, single-user mode is also a security hole, because it allows unprivileged people to execute privileged commands simply by typing them on the system console; computers that can be brought up in single-user mode should have their consoles in a place that is physically secure. On many Berkeley-derived systems, changing the line in the /etc/ttytab file for the console so that it is not marked as "secure" will force the user to provide a password when booting in single-user mode." ------- c'est extrait d'un bouquin UNIX, et ce doit etre sensiblement different sous Linux car je n'ai pas de fichier ttytab (peut-etre le /etc/securetty ?) gUI -------------------------------------------------------------------- Les listes de diffusion occultes: <URL:http://www.CULTe.org/listes/>