12-05-2018 10:05 AM
Hello everyone,
I'm looking for a file to get a root access on Cisco ISE.
It requires this patch but I'm unable to find anywhere (root-patch file for Cisco ISE 2.4)
The file name is :
ssh-rootpatch-hrpsshnodisk.tar.gz
Could anyone please provide the link, please?
Regards,
B
Solved! Go to Solution.
12-05-2018 10:08 AM
12-05-2018 10:20 AM
The root key that accompanies the root patch also expires. So even if you were to find both online somewhere that someone shared, it likely wouldn't work.
12-05-2018 10:08 AM
12-05-2018 10:15 AM
Hi Jason,
Thanks, So I should stop looking for it.
I did read this on Cisco docs and other blogs as well.
Regards,
B
12-05-2018 10:20 AM
The root key that accompanies the root patch also expires. So even if you were to find both online somewhere that someone shared, it likely wouldn't work.
12-05-2018 10:50 AM
- And it shouldn't be , if you are using open-source (Linux) as the underlying carrier-engine for ISE , then let users benefit from this too (open-source mindfulness) , when there are special problems,
M.
12-05-2018 10:54 AM
12-05-2018 11:02 AM
- Cute, that seems more like a 1000-year action plan,,,,,! :-)
M.
12-05-2018 11:05 AM
12-05-2018 11:49 AM
- It >is< a technical issue; in the sense that an ISE customer shouldn't depend on a CISCO TAC case with long latency , when just needing to clear a ./tmp or /var/tmp on ISE which is usually production critical, But I don't want to end up in a war-style discussion either. Thanks for your advises.
M.
12-05-2018 12:07 PM
12-05-2018 03:07 PM - edited 12-06-2018 11:53 AM
The guys on the Community forum know that I have ranted about this before but I am glad I am not the only one. And as Jason points out all the time, the PM's are not on these forums (which I think is a mistake and a shame). Other Cisco products allow customers to get root access and it's not a technical advantage to block users from root access. It's a CYA strategy and probably resulted from one nasty incident where one customer did something stupid and ruined it for all of us forever more.
The other fact is that if you get hold of this root patch, you can play around with it all you want - the cert lasts quite long actually. So that in itself is a weak deterrent.
I have submitted numerous enhancements via the feedback form but I don't know where it ends up. It would be nice to see how our suggestions are tracking.
12-05-2018 03:21 PM
05-11-2020 08:10 AM
If you can stop ISE VM, just mount ISE disks under another Linux VM where you have all the rights and do the cleanup. Also, having access to the ISE disks will give you the option to add an account with shell access and you can add it to sudoers. End of your stress...
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide