home *** CD-ROM | disk | FTP | other *** search
- Xref: sparky comp.sys.sgi.admin:29 comp.security.misc:2297
- Path: sparky!uunet!gossip.pyramid.com!olivea!sgigate!sgi!fido!anchovy.wpd.sgi.com!casey
- From: casey@anchovy.wpd.sgi.com (Casey Schaufler)
- Newsgroups: comp.sys.sgi.admin,comp.security.misc
- Subject: Re: [Q] C2 security or Shadow...
- Keywords: C2, NIS, security
- Message-ID: <1gnr70INNpn6@fido.asd.sgi.com>
- Date: 16 Dec 92 18:06:24 GMT
- References: <1992Dec15.062659.7909@worak.kaist.ac.kr>
- Organization: Silicon Graphics, Inc., Mountain View, CA
- Lines: 15
- NNTP-Posting-Host: anchovy.wpd.sgi.com
-
-
- The architecture of NIS (YP prior to the trademark's owner's objection)
- precludes it's applicability at the C2 (or any higher) level. Shadow
- passwords (available in an upcoming IRIX release) must be hidden from the
- general public. NIS, however, is a public service which will distribute
- the information to everyone. NIS cannot be used to distribute shadow
- passwords, as it will not hide them from unprivileged users. NIS does not
- allow databases to be restricted to the super-user.
-
- Sun has (or did at one point have) a PROPRIETARY extension involving
- a daemon (pwauthd) and some deep-under-the-covers-magic-in-libc to provide
- shadow passwords in a YP environment, but I do not believe that interface
- has ever been published.
-
- -casey
-