home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!charon.amdahl.com!pacbell.com!sgiblab!munnari.oz.au!metro!dmssyd.syd.dms.CSIRO.AU!ditsydh.syd.dit.CSIRO.AU!degsyd.syd.deg.csiro.au!ip_boss
- From: ip_boss@degsyd.syd.deg.csiro.au (Jack Churchill)
- Newsgroups: comp.unix.ultrix
- Subject: Re: Using YP/NIS
- Message-ID: <1992Nov7.121002.165@degsyd.syd.deg.csiro.au>
- Date: 7 Nov 92 12:10:02 +1000
- References: <Bx75qz.3Ko@cck.coventry.ac.uk> <1992Nov5.071608.26394@arb-phys.uni-dortmund.de>
- Organization: CSIRO, Exploration Geoscience
- Lines: 50
-
- In article <1992Nov5.071608.26394@arb-phys.uni-dortmund.de>, wb@arb-phys.uni-dortmund.de (Wilhelm B. Kloke) writes:
- > In article <Bx75qz.3Ko@cck.coventry.ac.uk> ccx009@cch.coventry.ac.uk (Adam Bentley) writes:
- >>
- >>Hi there,
- >> we're thinking of using YP/NIS to distribute among other things,
- >> password entries. Can anyone out there give me any ideas or
- >> thoughts on YP/NIS and its reliablity. We would intend to use it
- >> on Sequent Symmetries (Dynix) and DEC Stations (Ultrix). Does anyone
- >> have any advice on whether we should use it or not? The main thing we
- >> want to be able to do is
- >>
- >> 1. Hide the passwd file
- >> 2. Distribute the passwd file
- >>
- >> I assume both of these can be acheived. We are also looking at
- >> writing our own shadow password stuff, replacing the getpw*
- >> calls in libc with our own routines of the same name. This
- >> however will invlove the re-compilation of a lot of other programs,
- >> which may well use YP/NIS if its running.
- > I doubt that you will get what you want. You habe to remove ypcat from
- > your system or at least to restrict the use to root or wheel. You have
- > to remove the YP routines from your libraries because otherwise any user
- > could compile his own ypcat. This will not help either because the bad
- > guy has access to the sources of those also. The protocol of YP has to
- > be changed for this. Probably Kerberos is the thing you ar looking for.
-
- NIS is widely used yet I keep seeing bad things said about it. Why? I
- also see some people have problems using DEC's UPGRADE or ENHANCED mode
- and usually are forced to go back to normal BSD security. What's the
- best method in a mixed environment? Just NFS mount the relevant things
- instead? Even in an Ultrix-only environment I like to know what
- people's feelings are towards UPGRADE and ENHANCED security. Is UPGRADE
- a reasonable compromise so that some "unsupported" packages can be
- tricked into thinking the normal BSD passwd file is ok but the real
- password file is hidden (i.e., shadow password file) and is the one used
- for normal logins? Also, when NIS or some other method is used to
- service things like a common password file, isn't it a major problem if
- the server goes down? I don't know but I like the idea of having
- standalone workstations and just centralising e-mail and NFS disks. At
- least the users can log onto their own machines whilst the server is
- down for whatever reason, to perform some local tasks. I know, it all
- depends but I like some feedback to improve my limited understanding of
- unix systems (I'm from a VMS background).
-
- --
- Jack N. Churchill | J.Churchill@syd.deg.csiro.au
- CSIRO Division of Exploration Geoscience | churchill@decus.com.au
- PO Box 136 North Ryde NSW 2113 | Phone: +61 2 887 8884
- Australia | Fax: +61 2 887 8909
- ** Unless otherwise specified, the opinions expressed here are my own. **
-