× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Hopefully there is another user profile on the system with *ALLOBJ and *SECADM special authority that you can use to reset the i5/OS QSECOFR password. Otherwise, it's backup, initialize, load LIC from PID, restore the balance of the system, aka: Bad news.

Jim Oberholtzer
Chief Technical Architect
Agile Technology Architects


On 4/12/2012 8:42 AM, Jerry C. Adams wrote:
I'm guessing that the QSECOFR password wasn't included either when he bought
the machine. A company that I worked for years ago had the same problem: No
QSECOFR password. But we booted the system into DST and used either the
22222222 or 11111111 profile to change the password for QSECOFR. That was,
if I remember correctly, a V3 something machine.

Jerry C. Adams
IBM i Programmer/Analyst
Sir, you have tasted two whole worms; you have hissed all my mystery
lectures and been caught fighting a liar in the quad, you will leave Oxford
by the next town drain. - Rev. William Spooner
--
A&K Wholesale
Murfreesboro, TN
615-867-5070

-----Original Message-----
From:midrange-l-bounces@xxxxxxxxxxxx
[mailto:midrange-l-bounces@xxxxxxxxxxxx] On Behalf Of Jim Oberholtzer
Sent: Thursday, April 12, 2012 8:18 AM
To: Midrange Systems Technical Discussion
Subject: Re: Load source on old 9406-720

Your chances of finding the DST password are about the same as that of a
snowball inside a blast furnace, not gonna happen.

Use Larry's suggestion and from the console, signed on as QSECOFR, issue the
CHGDSTPWD *DEFAULT command.

Jim Oberholtzer
Chief Technical Architect
Agile Technology Architects


On 4/12/2012 7:31 AM, Roberto José Etcheverry Romero wrote:
> If you have 22222222 access you could SEE which disk is the
> loadsource, just go to the rackconfig and it will be marked with *
> > From there, take the serial number and just take each disk.
> To aid in your hacking, stop all parity protection (one less abstraction
layer).
> And good luck i doubt the users/pass are stored in plaintext.
> You could also dump an op21 and look at the lic code part...
>
> Keep us posted, i'm curious about this.
>
> best regards,
>
> Roberto
>
> On Thu, Apr 12, 2012 at 8:12 AM, DrFranken<midrange@xxxxxxxxxxxx> wrote:
>> > Well I can tell you it's the top cage, left disk unit, ALMOST
certainly.
>> > It's possible that it's the 2nd disk from the left.
>> >
>> > Now on this quest to find the DST Password with a disk
>> > editor...... Yeah good luck with that.
>> >
>> > I believe they are encrypted, and worse in EBCDIC so noodling for
>> > recognizable stuff will be hard.
>> >
>> > Why don't you run CHGDSTPWD and reset the QSECOFR DST profile that
way?
>> >
>> > - Larry "DrFranken" Bolhuis
>> >
>> > On 4/12/2012 6:44 AM, Jim Donoghue wrote:
>>> >> I have this old 9406-720. It has five drives in the cage on the
>>> >> top left side (below the control panel), and two in the cage
>>> >> below it. How do I find out which is the load source? I can only
access DST with the '22222222'
>>> >> user ID. I need to find the load source device so I can poke
>>> >> into it with a disk editor and hopefully find where the DST
passwords are stored.
>>> >>
>>> >> Thanks,
>>> >>
>>> >> Jim
>> > --
--

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:
Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.