home bbs files messages ]

Just a sample of the Echomail archive

<< oldest | < older | list | newer > | newest >> ]

 Message 21249 
 The Natural Philosopher to Chris Green 
 Re: Can't get into headless pi, password 
 26 Jan 25 09:57:58 
 
INTL 3:770/1 3:770/3
REPLYADDR tnp@invalid.invalid
REPLYTO 3:770/3.0 UUCP
MSGID:  c0781256
REPLY:  0021e820
PID: SoupGate-Win32 v1.05
On 26/01/2025 09:47, Chris Green wrote:
> The Natural Philosopher  wrote:
>> On 25/01/2025 22:34, Chris Green wrote:
>>> I am trying to set up a new, headless Pi 4B.  I have copied the 'lite'
>>> image to a USB drive and created the empty 'ssh' file in the boot
>>> partition.
>>>
>>> It boots OK and the ssh deamon is running but the default username
>>> 'pi' and password 'raspberry' don't work. How on earth do I get into
>>> it to start it up?
>>>
>>> I can edit files on the USB drive OK so I can add and modify entries
>>> in /etc/passwd and /etc/shadow. So all I actually need to do is set it
>>> up so the user 'pi' has no password but I'm not doing too well at
>>> doing that at the moment.
>>>
>>> Any ideas, or other ways to get into it?
>>>
>>
>> Others have told you how to use the imager, but IIRC all that does is
>> set up a file in the VFAT partition....
>>
>> Here is a shameless cut'n paste
>>
>>      Write the Raspberry Pi OS image to your SD card as normal
>>      Mount the newly written /boot partition on the Pi on your computer
>>      Create an empty file named ssh, without a file type / ending. On
>> Linux and macOS, this is easily done with touch ssh if you’re in the
>> right directory. This tells the OS to enable SSH access right away.
>>      Next, create a user with a password on the SD card as that’s not
>> done automatically anymore.
>>          Create an encrypted password for your new Raspberry Pi user. On
>> Linux and macOS, this can be done with OpenSSL. For added security,
>> write the new password into a masked shell variable so it doesn’t show
>> up in your computer’s shell history:
>>
>>          [morph@void ~]$ read -s pw
>>          [morph@void ~]$ echo "$pw" | openssl passwd -6 -stdin
>>
>> $6$4E2z6hQOGLZCK5ZN$ESo2r/tO7Sy1Xmyp/bFzQ0A8zNNMhOoj0XocoGVbc
PVLcHlDr/kQiRvv/vOfdopLkylTVQSfK4n97SR9VGGF1
>>
>>
>>          the long random string is your encrypted password. Next, create
>> another file next to the ssh file on the SD card’s boot partition named
>> userconf.txt.
>>          Open userconf.txt with your favourite text editor and in the
>> first and only line enter your desired username and the encrypted
>> password, separated by a colon. It should look like this:
>> morph:$6$4E2z6hQOGLZCK5ZN$ESo2r/tO7Sy1Xmyp/bFzQ0A8zNNMhOoj0Xo
oGVbc8PVLcHlDr/kQiRvv/vOfdopLkylTVQSfK4n97SR9VGGF1
>>
>>
>> And that’s it. Unmount your card, pop it into the Pi, connect it to your
>> network and boot. You should now be able to SSH into it using your new
>> credentials. No monitor needed.
>>
> I think an ssh key will be easier! :-)
>

I didn't find it so.


Essentially you need to create a file userconf.txt with one line

user:

in the root of the VFAT boot partition

And if you have a linux system already, you can cut and paste  it out of
your own /etc/shadow

Plus an empty file called ssh. Using 'touch ssh'

Hardly rocket science


--
Climate is what you expect but weather is what you get.
Mark Twain

--- SoupGate-Win32 v1.05
 * Origin: Agency HUB, Dunedin - New Zealand | Fido<>Usenet Gateway (3:770/3)
SEEN-BY: 19/38 105/81 106/201 128/187 129/305 153/757 7715 154/110
SEEN-BY: 218/700 840 220/70 226/17 30 100 227/114 229/110 111 114
SEEN-BY: 229/200 206 275 300 317 400 426 428 470 550 616 664 700 705
SEEN-BY: 266/512 267/800 291/111 292/854 310/31 320/219 322/757 342/200
SEEN-BY: 396/45 460/58 633/280 281 418 420 509 2744 712/848 770/1
SEEN-BY: 770/3 100 330 340 772/210 220 230 902/26 2320/105 5020/400
SEEN-BY: 5075/35
PATH: 770/3 1 633/280 229/426


<< oldest | < older | list | newer > | newest >> ]

(c) 1994,  bbs@darkrealms.ca