Grub 2 Password Protection in debian?

Multi tool use
up vote
1
down vote
favorite
I do as the following
- run grub-mkpasswd-pbkdf2 to get a string
- nano /boot/grub/grub.cfg
- add two lines
- set superusers="putyourusernamehere"
- password putyourusernamehere grub.pbkdf2 (omitted)
When I reopen my computer,it can't work,how can I take grub 2 Password Protection in debian ?
debian password-protection grub
migrated from stackoverflow.com Oct 16 '12 at 4:41
This question came from our site for professional and enthusiast programmers.
add a comment |
up vote
1
down vote
favorite
I do as the following
- run grub-mkpasswd-pbkdf2 to get a string
- nano /boot/grub/grub.cfg
- add two lines
- set superusers="putyourusernamehere"
- password putyourusernamehere grub.pbkdf2 (omitted)
When I reopen my computer,it can't work,how can I take grub 2 Password Protection in debian ?
debian password-protection grub
migrated from stackoverflow.com Oct 16 '12 at 4:41
This question came from our site for professional and enthusiast programmers.
add a comment |
up vote
1
down vote
favorite
up vote
1
down vote
favorite
I do as the following
- run grub-mkpasswd-pbkdf2 to get a string
- nano /boot/grub/grub.cfg
- add two lines
- set superusers="putyourusernamehere"
- password putyourusernamehere grub.pbkdf2 (omitted)
When I reopen my computer,it can't work,how can I take grub 2 Password Protection in debian ?
debian password-protection grub
I do as the following
- run grub-mkpasswd-pbkdf2 to get a string
- nano /boot/grub/grub.cfg
- add two lines
- set superusers="putyourusernamehere"
- password putyourusernamehere grub.pbkdf2 (omitted)
When I reopen my computer,it can't work,how can I take grub 2 Password Protection in debian ?
debian password-protection grub
debian password-protection grub
edited Jan 5 '16 at 10:27
Vagnerr
2721411
2721411
asked Oct 1 '12 at 11:18
Dada Lili
migrated from stackoverflow.com Oct 16 '12 at 4:41
This question came from our site for professional and enthusiast programmers.
migrated from stackoverflow.com Oct 16 '12 at 4:41
This question came from our site for professional and enthusiast programmers.
add a comment |
add a comment |
2 Answers
2
active
oldest
votes
up vote
2
down vote
Debian 8 (jessie) stores Grub 2 password parameters within the directory /etc/grub.d/
. Inside this directory there are only scripts used to generate the configuration file.
So you can create a new script (e.g. /etc/grub.d/01_users
) with the following content:
#!/bin/bash
cat <<EOF
set superusers="putyourusernamehere"
password putyourusernamehere grub.pbkdf2 grub.pbkdf2.sha512.10000.3450C89...
EOF
All the above lines are part of the file, because it is a script whose output will go in the final configuration file. Since it is a script, it will only be processed if it is executable (chmod a+x ...
).
As an alternative, you may put just the lines you need in one of the existing files that are tweaked to output their own contents. Here you can see how /etc/grub.d/40_custom
substitutes the shell with a tail command returning script contents starting from the third line:
#!/bin/sh
exec tail -n +3 $0
set superusers="putyourusernamehere"
password putyourusernamehere grub.pbkdf2 grub.pbkdf2.sha512.10000.3450C89...
In some Ubuntu derivatives (e.g. Mint 19) the format of the password changed as follows:
#!/bin/sh
exec tail -n +3 $0
set superusers=putyourusernamehere
password_pbkdf2 putyourusernamehere grub.pbkdf2.sha512.10000.3450C89...
You may want to add "--unrestricted" to the menu entries you want to boot without a password. For example within the file 10_linux
:
10_linux:CLASS="--class gnu-linux --class gnu --class os --unrestricted"
Finally launch update-grub2
to generate the final configuration file /boot/grub/grub.cfg
.
Do you meancat << EOF
?
– G-Man
Jun 14 '15 at 9:00
@G-Man indeed txs
– Enos D'Andrea
Jun 14 '15 at 18:38
add a comment |
up vote
0
down vote
Read this. Official documentation from the debian-based OS: Ubuntu. Maybe it can help
add a comment |
2 Answers
2
active
oldest
votes
2 Answers
2
active
oldest
votes
active
oldest
votes
active
oldest
votes
up vote
2
down vote
Debian 8 (jessie) stores Grub 2 password parameters within the directory /etc/grub.d/
. Inside this directory there are only scripts used to generate the configuration file.
So you can create a new script (e.g. /etc/grub.d/01_users
) with the following content:
#!/bin/bash
cat <<EOF
set superusers="putyourusernamehere"
password putyourusernamehere grub.pbkdf2 grub.pbkdf2.sha512.10000.3450C89...
EOF
All the above lines are part of the file, because it is a script whose output will go in the final configuration file. Since it is a script, it will only be processed if it is executable (chmod a+x ...
).
As an alternative, you may put just the lines you need in one of the existing files that are tweaked to output their own contents. Here you can see how /etc/grub.d/40_custom
substitutes the shell with a tail command returning script contents starting from the third line:
#!/bin/sh
exec tail -n +3 $0
set superusers="putyourusernamehere"
password putyourusernamehere grub.pbkdf2 grub.pbkdf2.sha512.10000.3450C89...
In some Ubuntu derivatives (e.g. Mint 19) the format of the password changed as follows:
#!/bin/sh
exec tail -n +3 $0
set superusers=putyourusernamehere
password_pbkdf2 putyourusernamehere grub.pbkdf2.sha512.10000.3450C89...
You may want to add "--unrestricted" to the menu entries you want to boot without a password. For example within the file 10_linux
:
10_linux:CLASS="--class gnu-linux --class gnu --class os --unrestricted"
Finally launch update-grub2
to generate the final configuration file /boot/grub/grub.cfg
.
Do you meancat << EOF
?
– G-Man
Jun 14 '15 at 9:00
@G-Man indeed txs
– Enos D'Andrea
Jun 14 '15 at 18:38
add a comment |
up vote
2
down vote
Debian 8 (jessie) stores Grub 2 password parameters within the directory /etc/grub.d/
. Inside this directory there are only scripts used to generate the configuration file.
So you can create a new script (e.g. /etc/grub.d/01_users
) with the following content:
#!/bin/bash
cat <<EOF
set superusers="putyourusernamehere"
password putyourusernamehere grub.pbkdf2 grub.pbkdf2.sha512.10000.3450C89...
EOF
All the above lines are part of the file, because it is a script whose output will go in the final configuration file. Since it is a script, it will only be processed if it is executable (chmod a+x ...
).
As an alternative, you may put just the lines you need in one of the existing files that are tweaked to output their own contents. Here you can see how /etc/grub.d/40_custom
substitutes the shell with a tail command returning script contents starting from the third line:
#!/bin/sh
exec tail -n +3 $0
set superusers="putyourusernamehere"
password putyourusernamehere grub.pbkdf2 grub.pbkdf2.sha512.10000.3450C89...
In some Ubuntu derivatives (e.g. Mint 19) the format of the password changed as follows:
#!/bin/sh
exec tail -n +3 $0
set superusers=putyourusernamehere
password_pbkdf2 putyourusernamehere grub.pbkdf2.sha512.10000.3450C89...
You may want to add "--unrestricted" to the menu entries you want to boot without a password. For example within the file 10_linux
:
10_linux:CLASS="--class gnu-linux --class gnu --class os --unrestricted"
Finally launch update-grub2
to generate the final configuration file /boot/grub/grub.cfg
.
Do you meancat << EOF
?
– G-Man
Jun 14 '15 at 9:00
@G-Man indeed txs
– Enos D'Andrea
Jun 14 '15 at 18:38
add a comment |
up vote
2
down vote
up vote
2
down vote
Debian 8 (jessie) stores Grub 2 password parameters within the directory /etc/grub.d/
. Inside this directory there are only scripts used to generate the configuration file.
So you can create a new script (e.g. /etc/grub.d/01_users
) with the following content:
#!/bin/bash
cat <<EOF
set superusers="putyourusernamehere"
password putyourusernamehere grub.pbkdf2 grub.pbkdf2.sha512.10000.3450C89...
EOF
All the above lines are part of the file, because it is a script whose output will go in the final configuration file. Since it is a script, it will only be processed if it is executable (chmod a+x ...
).
As an alternative, you may put just the lines you need in one of the existing files that are tweaked to output their own contents. Here you can see how /etc/grub.d/40_custom
substitutes the shell with a tail command returning script contents starting from the third line:
#!/bin/sh
exec tail -n +3 $0
set superusers="putyourusernamehere"
password putyourusernamehere grub.pbkdf2 grub.pbkdf2.sha512.10000.3450C89...
In some Ubuntu derivatives (e.g. Mint 19) the format of the password changed as follows:
#!/bin/sh
exec tail -n +3 $0
set superusers=putyourusernamehere
password_pbkdf2 putyourusernamehere grub.pbkdf2.sha512.10000.3450C89...
You may want to add "--unrestricted" to the menu entries you want to boot without a password. For example within the file 10_linux
:
10_linux:CLASS="--class gnu-linux --class gnu --class os --unrestricted"
Finally launch update-grub2
to generate the final configuration file /boot/grub/grub.cfg
.
Debian 8 (jessie) stores Grub 2 password parameters within the directory /etc/grub.d/
. Inside this directory there are only scripts used to generate the configuration file.
So you can create a new script (e.g. /etc/grub.d/01_users
) with the following content:
#!/bin/bash
cat <<EOF
set superusers="putyourusernamehere"
password putyourusernamehere grub.pbkdf2 grub.pbkdf2.sha512.10000.3450C89...
EOF
All the above lines are part of the file, because it is a script whose output will go in the final configuration file. Since it is a script, it will only be processed if it is executable (chmod a+x ...
).
As an alternative, you may put just the lines you need in one of the existing files that are tweaked to output their own contents. Here you can see how /etc/grub.d/40_custom
substitutes the shell with a tail command returning script contents starting from the third line:
#!/bin/sh
exec tail -n +3 $0
set superusers="putyourusernamehere"
password putyourusernamehere grub.pbkdf2 grub.pbkdf2.sha512.10000.3450C89...
In some Ubuntu derivatives (e.g. Mint 19) the format of the password changed as follows:
#!/bin/sh
exec tail -n +3 $0
set superusers=putyourusernamehere
password_pbkdf2 putyourusernamehere grub.pbkdf2.sha512.10000.3450C89...
You may want to add "--unrestricted" to the menu entries you want to boot without a password. For example within the file 10_linux
:
10_linux:CLASS="--class gnu-linux --class gnu --class os --unrestricted"
Finally launch update-grub2
to generate the final configuration file /boot/grub/grub.cfg
.
edited Dec 1 at 3:21
answered Jun 14 '15 at 6:38


Enos D'Andrea
1279
1279
Do you meancat << EOF
?
– G-Man
Jun 14 '15 at 9:00
@G-Man indeed txs
– Enos D'Andrea
Jun 14 '15 at 18:38
add a comment |
Do you meancat << EOF
?
– G-Man
Jun 14 '15 at 9:00
@G-Man indeed txs
– Enos D'Andrea
Jun 14 '15 at 18:38
Do you mean
cat << EOF
?– G-Man
Jun 14 '15 at 9:00
Do you mean
cat << EOF
?– G-Man
Jun 14 '15 at 9:00
@G-Man indeed txs
– Enos D'Andrea
Jun 14 '15 at 18:38
@G-Man indeed txs
– Enos D'Andrea
Jun 14 '15 at 18:38
add a comment |
up vote
0
down vote
Read this. Official documentation from the debian-based OS: Ubuntu. Maybe it can help
add a comment |
up vote
0
down vote
Read this. Official documentation from the debian-based OS: Ubuntu. Maybe it can help
add a comment |
up vote
0
down vote
up vote
0
down vote
Read this. Official documentation from the debian-based OS: Ubuntu. Maybe it can help
Read this. Official documentation from the debian-based OS: Ubuntu. Maybe it can help
answered Oct 31 '12 at 20:56
Nehal J Wani
408615
408615
add a comment |
add a comment |
Thanks for contributing an answer to Super User!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Some of your past answers have not been well-received, and you're in danger of being blocked from answering.
Please pay close attention to the following guidance:
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f488275%2fgrub-2-password-protection-in-debian%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
CSYtb BHDFi,1VM8M2,o7vPaA8qL5e3M1XceH6EKxOCOODq60ciZezN7Fdf wczD,O05r IBx3Mx7mxEvmL0GVhYtjwn