From nobody  Fri Jun  6 02:13:50 1997
Received: (from nobody@localhost)
          by hub.freebsd.org (8.8.5/8.8.5) id CAA09396;
          Fri, 6 Jun 1997 02:13:50 -0700 (PDT)
Message-Id: <199706060913.CAA09396@hub.freebsd.org>
Date: Fri, 6 Jun 1997 02:13:50 -0700 (PDT)
From: bhaugeec@francophonie.org
To: freebsd-gnats-submit@freebsd.org
Subject: Lost administrator password
X-Send-Pr-Version: www-1.0

>Number:         3800
>Category:       misc
>Synopsis:       Lost administrator password
>Confidential:   no
>Severity:       critical
>Priority:       high
>Responsible:    freebsd-bugs
>State:          closed
>Quarter:
>Keywords:
>Date-Required:
>Class:          support
>Submitter-Id:   current-users
>Arrival-Date:   Fri Jun  6 02:20:00 PDT 1997
>Closed-Date:    Fri Jun 6 04:46:33 PDT 1997
>Last-Modified:  Fri Jun  6 04:52:02 PDT 1997
>Originator:     Chetanand BHAUGEERUTTY
>Release:        2.1.0
>Organization:
ACCT
>Environment:
Intel Pentium
>Description:
Our system administrator has left the company without leaving the administrator password. Is there a way to crack the password?	
>How-To-Repeat:

>Fix:

>Release-Note:
>Audit-Trail:
State-Changed-From-To: open->closed 
State-Changed-By: jkh 
State-Changed-When: Fri Jun 6 04:46:33 PDT 1997 
State-Changed-Why:  
1. This is totally inappropriate for a PR.  PRs are for reporting 
problems or requesting enhancements to FreeBSD, not for reporting 
site-specific problems. 

2. Given that the true administrators would simply boot single user 
and change the password from the console, there's a high likelyhood 
that the submitters of this PR aren't the legitimate admins at all 
and it would thus be irresponsible to furnish any information at all 
about cracking passwords. 
>Unformatted:
