Inthe evening I wanted to come back and restarte the Firewall as the last step mentioned in the blog post. But now I wasn't able to sign in anymore. It always just states that the Login Failed. I also tried the old password in case it didn't update it properly but still the same.
Is it possible that there is some issue due to the fact that my new password contains signs like "*[/%"? And how would I get back access to the system, prefereably without having to reset the whole thing?
sorry I missed it. I think the basic question is whether you have physical access to the appliance. If yes, I would proceed from point 4. You will need a keyboard and an HDMI monitor. This is probably the easiest and fastest way to solve the problem.
Thanks for clarification. I have a rather easy access to one of the two Firewalls. The other one is in a different city. But I will have a look today at the closer one and if that works will plan to do the same on the second one as well. Unless there is some way to do it safely from remote. But so far I haven't found anything along that lines.
The thing who confuses me, I created another admin account which was able to login to the user portal but not the admin portal. So I thought that either changed the permissions long time ago to non-admin. Turns out the user still had admin permissions and even after changing the passwort (set it to the same value again) or completely recreate the user with the same username and password I still wasn't able to login to the admin console. Funny enough the system didn't give me any error at this point - it just wouldn't let me login.
What DID work was creating another admin user with a different username and password and here I was also able to login properly. So for me it sounds like Sophos does have an issue with certain usernames / passwords / combinations of the two. If that is the case I have to say I find it very troubling.
Recently I had to reset the admin password for an array that was not in production. The problem was it would give me the nmessage "Waiting for GiveBack" but since I didn't know the admin password I couldn't give the command on the active controller. So It was a little challenging because of the clustering.
4. When Controller 1 says "Press Control C" to stop boot process (Or something like that.) then Press Control-C. This will take you to the "Loader-A" menu. (This is needed because you have to pause the bootup of this controller. Otherwise when you chose option 3 on Controller2, Controller 1 will be finished booting and controller 2 will hang at "Waiting for Giveback")
Then move your serail cable back to controller 1. At the "Loader-A" prompt type autoboot. It will come up to a screen "waiting for GiveBack" At this point on Controller 2 you can issue the give back command.
I've searched online for how to recover/reset the admin password. This article on Negear's website suggests going to from a browser. A login window is supposed to pop up, and then step 2 is that I should click "cancel".
First of all, when I go to
orbilogin.com I don't see a login window; I see a popup window asking me to enable smart parent controls on my router. It seems I am already logged in. When I click "logout", I'm taken to a screen that says "thank you for using the Netgear web-based router configuration utility. Goodbye." and there is no option to login again.
If I then try to log in again, I get a "this site can't be reached.
oribilogin.com refused to connect" error message in my browser. Or, it just logs me in again (without prompting me for my password).
What this looks like (to me) is that the Orbi was set up using the Orbi "app" and this is the first time you have attempted to use the Orbi web interface. Seems like it thinks you want to set up the Orbi from scratch, and (by implication) the web administrative password was never set.
Thanks. I was able to get into the interface a couple of times. I got to a screen where you can reset the password, but the current password is required to do that, and that's the one that isn't working.
Now, I'm trying to get back into the interface and it keeps giving me 500 Internal Server errors. I see the menu of options (Home, Internet, Wireless, Attached Devices, etc.) on the left, but then there's just a spinning gear and "Please wait a moment" in the main area of the screen.
=cMw4ePACgc4 Alas, if the current password is not accepted (three times in a row) and the Password Recovery option that pops up (after three tries) also fails, the ONLY way to create a new password is to do a Factory Reset. (a pain in a "rear part of the anatomy")
My nighthawk app stopped working and I have not been able to log back in or recover my password. Contacted Netgear support and they told me my complementary support ran out at the end of June. Therefore for just resetting the password, they want me to sign a support contract for $189.00. I am really dissapointed. The router works fine, but because of this, for the money they want to just reset my nighthawk app, I can get a new router, and it will certainly not be a Netgear product. This is my third netgear product and will definitely be the last!
Hi did you get this solved. I have a brand new My Cloud Mirror and same issue.
I can access via web browser but cannot access via windows PC.
Tried admin and Admin
Tried a reset of device by inserting paperclip into rest button on back
still no access
I have had similar issues with another device and it was corrected with a firmware update. I had switched to a shorter password and after a later firmware update realized I could use a longer password. I am sure there is still al limit. I like using really long passwords, some are like 30 characters.
Of course, you should also protect against offline cracking, where the attacker has somehow captured a SIP INVITE and can test guesses locally, with his purpose-built cracking hardware. The fastest GPUs can try almost 1,000,000,000 passwords per second. A rack of 32 could come close to 1e18 passwords per year and could crack a 15-character password in an average of 384 million years.
I'm no security expert but if someone has enough rights on your system to run this script, then they have enough rights to figure it out, too. It took me under 15 minutes to find a "user" table in the Laserfiche database, and a few seconds more to spot the "password" column.
As a part of standard security audits, we like to rotate the local admin password we have on our mac computers every so often. This worked well enough a year ago, however I did notice some outlier computers where there was an error saying that the admin password could not be changed due to the Secure Token. When I most recently tried to run the same script that previously worked, not only did it not change the local admin password, it seems to wipe it completely where I can no longer login using either the new or old passwords.
I've tried many different workarounds to try and get the local password to change, including using Jamf's built in Local Account Management policy, and using scripts with the sysadminctl command and have thus far been unsuccessful. Some things I found in my reserach are that there must always be an admin account present on a mac, and one client must always have a SecureToken assigned before login. The most recent workaround I tried is listed below, wherein I created a new local admin account using Local Account Management (admintemp), and then tried to use that admin account to turn off the SecureToken for the administrator before changing the password and re-enabling it.
My plan was to just delete the admintemp account once I was done, but I can't even get the local admin password to change no matter what I do. I also tried to just delete the local admin account and re-create it with the new password I want, but that didn't work either because the account has a secure token.
Finally figured out a solution to this! After many attempts to get the sysadminctl command to work, I had zero success and it would always either wipe the password without changing it, give me the secureToken error, or just hang up and never complete. Using the Files and Processes payload though, I was finally able to rotate our local admin password. To do so, use the below CLI command in the Files and Processes payload.
You cannot rotate the password on a Secure Token holding account with JAMF. When you are creating the "new" local admin account, it does not have a Secure Token. So, Your "new" admin account cannot rotate the "main" admin accounts password as it has a secure token.
You would need to acquire a tool specifically designed for account Maintenance like CyberArk EPM that can use a secure token (providing it is given a token) to rotate passwords. This kind of account maintenance is really outside of JAMFs wheelhouse.
I checked the admintemp account I created via Jamf policy using terminal and confirmed that it also did have a Secure Token applied to it. Can an account with a Secure Token also not modify another account with a Secure Token?
An account with a secure token, can rotate the password of another account with a secure token. However, keep in mind. Anything you do in CLI is in plaintext, so the user name and password can be picked up by lots of network tools and on the device itself.
Once you know what if any users have a secure token, if you know. there password, you could use the commands that you reference abnbove or other scripting solutions to use the account that has a token to grant one to the accounts that do not.
Thank you for this tool. I've gotten to the point where I can get the script I run to "succeed" on the client computer, however it doesn't actually set a new password. The below script doesn't actually set a new password, it just wipes out the existing one without setting a new one.
I'm thinking maybe just remove the reset portion and see if -newPassword alone will set a new password. It's really annoying as right now I'm having to re-image my test station after every attempt since the account keeps getting its password wiped out.
3a8082e126