(Courriels de diversion: <decolleriez@collectionnent-rappelons.com> <soudoyait@reintegra-maintiendrions.com> <merites@repensons-epaississement.com> <feutrer@adverbiaux-commanditer.com> <bacteriologie@numeroterait-postiches.com> <taille@issues-benir.com> <surmenerez@cariaient-vouvoieront.com> <tournebroche@enrobions-voua.com> <rarefieraient@dogmatiques-devoile.com> <egides@empesant-absorbaient.com> )



> Nope, c'est le cas des distros qui te demandent le mdp root quand tu les 
> fait booter en mode single (Debian fait ça aussi). Je ne sais pas si c'est 
> init ou les scripts de boot par contre.

je crois avoir trouvé (Google : "init single root password")

http://www.unix.org.ua/orelly/networking/puis/appc_05.htm

-------
"Some systems can be set up to require a password to boot in single-user mode, 
while others cannot.

Many workstations - including those made by Sun Microsystems - allow you to set 
a special user password using the boot monitor in ROM.

Single-user mode is designed to allow the resurrection of a computer with a 
partially corrupted filesystem; if the /etc/passwd file is deleted, the only way 
to rebuild it would be to bring the computer up in single-user mode.

Unfortunately, single-user mode is also a security hole, because it allows 
unprivileged people to execute privileged commands simply by typing them on the 
system console; computers that can be brought up in single-user mode should have 
their consoles in a place that is physically secure. On many Berkeley-derived 
systems, changing the line in the /etc/ttytab file for the console so that it is 
not marked as "secure" will force the user to provide a password when booting in 
single-user mode."

-------

c'est extrait d'un bouquin UNIX, et ce doit etre sensiblement different sous 
Linux car je n'ai pas de fichier ttytab (peut-etre le /etc/securetty ?)

gUI

--------------------------------------------------------------------
Les listes de diffusion occultes: <URL:http://www.CULTe.org/listes/>