On Tue, 5 Feb 2008, Clay Fandre wrote:

> s/doesn't have a password/doesn't have a password that you know/

I can believe that because (A) it makes sense [as Florin suggested -- a 
random string would be optimal] and (B) several people have said it.

One respondent suggested that this command will allow the user to change 
the root password:

$ sudo passwd root

But usually the first step in running the passwd command is to enter the 
existing password, which you don't know (doesn't it work that way for root 
passwords).  This may not be an important issue, but it is still possible 
to change the root password by editing the /etc/shadow file -- you just 
have to know the encrypted form of your password.  This can be obtained as 
follows:

perl -le 'print crypt("password", "salt");'

...where 'password' is the unencrypted password and 'salt' is the salt 
string (only the first two characters are used) for the crypt command. The 
first two characters of the output are the salt.  If you have root 
permissions on a UNIX/Linux machine, you can check that this works by 
reading /etc/shadow, entering your password and the first two characters 
of your encrypted password as your salt.  This is your salt:

sudo egrep '^username:' /etc/shadow | gawk -F':' '{print $2}' | cut -c -2

...where 'username' is your user name.  I tried it and it worked 
perfectly.

(It is not a great idea to run the perl command from the command line 
because it will leave your password in your command history, so it would 
be safer to write the perl command into a one-line script, execute it, and 
delete it.)

Mike