On Mon, 25 Jun 2012, Robert Hajime Lanning wrote:

On 06/25/12 16:59, Michael C Tiernan wrote:
How business continuity is maintained across catastrophic events.

How, when everything else has hit the fan, can "I" a "trusted admin" working in the data center get access into our systems where even the networking is down? There are times that in preparation of bring up the data center from a dead stop, I need to log into some systems and run fsck's (or other such tasks) before everything else is live.


In those situations, on the console, I just boot with "init=/bin/sh".
It is way easier than dealing with password secrecy procedures.
This includes the fact that the password is still a secret.

"Passwords? We don't need no stinkin' passwords!" :)

There is that, although that doesn't work for all systems (much harder to do on a windows system or an appliance)

Also, a sufficiently paranoid environment will have disabled that.

I've also seen some systems where enough system configuration was done in the initramfs before really booting the system, that bringing up the system manually was "non trivial". I try very hard to avoid creating such systems.

but it is a important tool to keep in mind.

David Lang

Can I, after getting the root password of a system in an emergency, flag a password as "exposed" but not "compromised" requiring the password to be changed and re-synced at the next possible opportunity when "normal" operation has been restored.

Is there a way to generate password displays using clear concise (unabigous) language for reading over the phone or other verbal exchange including, should it be required, printing. (i.e. Password=bwFq display as "[bravo][whisky][FOXTROT][golf]")



_______________________________________________
Discuss mailing list
[email protected]
https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
http://lopsa.org/

Reply via email to